pred_label
stringclasses 2
values | pred_label_prob
float64 0.5
1
| wiki_prob
float64 0.25
1
| text
stringlengths 156
1.01M
| source
stringlengths 39
45
|
|---|---|---|---|---|
__label__wiki
| 0.763267
| 0.763267
|
Julia’s Life
The Julia Child Award
Trustees & Advisors
TVchris2018-07-19T18:17:12+00:00
Julia Child & Company
Julia Child & More Company
Dinner at Julia’s
Julia Child & Jacques Pépin: Cooking in Concert
Cooking with Master Chefs
In Julia’s Kitchen with Master Chefs
Julia Child & Jacques Pépin: More Cooking in Concert
Baking with Julia
Julia and Jacques Cooking at Home
Julia’s Kitchen Wisdom
Julia Child, An Appetite for Life (Biographical)
Julia Child, An Appetite for Life
Portrait of the renowned TV chef and French cooking expert by the classic A&E television series, BIOGRAPHY. Traces Julia’s life from privileged childhood to groundbreaking cooking career and later stardom.
Julia Child's Kitchen Wisdom
Julia Child’s Kitchen Wisdom
This special celebrates Julia Child’s remarkable contribution to the American palate and lifestyle. On one level it is a heartfelt tribute to Julia’s culinary wit and wisdom; on another, it is a composite of her favorite recipes and techniques.
Julia & Jacques Cooking at Home
The complete Emmy Award-winning series: 10 hours, 22 episodes and over 85 recipes. Julia Child and Jacques Pépin team up for fire, fun and culinary genius filmed in Julia’s legendary kitchen.
Julia Child! America’s Favorite Chef (Biographical)
Julia Child! America’s Favorite Chef
(Biographical)
A PBS-produced biography about Julia’s two great loves: her husband, Paul, and cooking. Through an interview with Julia herself, filmed in her fabled Cambridge kitchen, as well as family photo albums and rare images from Paul Child’s photo collection, Julia is revealed.
The French Chef, Part 1
Learn to cook some of Julia’s most loved dishes with this special collection of 18 episodes from her original 1960s series, THE FRENCH CHEF. In her signature style and with bloopers, Julia demonstrates such classic recipes as Boeuf Bourguignon, Salade Nicoise, Bouillabaisse à la Marseillaise and Mousseline au Chocolat.
Eighteen more episodes from the groundbreaking TV cooking show recall the warmth and culinary genius of the late Julia Child. Learn to make more of Julia’s classic recipes, from Crêpes Suzette and Omelette Gratinée to Bûche de Noël.
Julia Child! The French Chef
An updated edition of JULIA CHILD! AMERICA’S FAVORITE CHEF, a one-hour tribute and testament to a great American icon, featuring an interview with Julia herself, family photos and rare images from Paul Child’s photo collection. This edition also includes twelve episodes from the original THE FRENCH CHEF series, including: Coq au Vin, Quiche Lorraine & Co., and Madeleines and Génoise Jelly Roll.
The Way to Cook
In this six-part series (complete with recipe booklet), Julia teaches all the fundamentals of good cooking and offers a wealth of her favorite recipes. Originally produced in 1985, this series is based on the print edition of THE WAY TO COOK.
Baking with Julia, Volume 1
Eight episodes of the popular Emmy Award-winning PBS series in which Julia Child shares the secrets of America’s greatest bakers.
The second volume from the Emmy Award-winning public television series. Alongside Julia, learn to make Pecan Sticky Buns and Brioche Pockets with Nancy Silverton, Lemon Meringue Pie with Gale Grand, Tourte Milanese with Michel Richard and more.
In the third volume from the Emmy Award-winning public television series, Julia focuses on baking bread with the country’s best bakers.
Julia Child's French Classics
Julia Child’s French Classics
A collection of six original black-and-white episodes of THE FRENCH CHEF, dating from the 1960s and featuring Julia teaching America how to prepare some of her favorite French dishes from classic episodes of the renowned PBS series.
Julia Child’s Dinner Party Favorites
In this second collection of six more original black-and-white episodes of THE FRENCH CHEF from the 1960s, Julia teaches America how to prepare some of her favorite dinner party menus from classic episodes of the renowned PBS series.
Please note: Many of Julia’s original public television episodes can be viewed at PBS.org; and many, notably for THE FRENCH CHEF, can be purchased for download at iTunes and/or Amazon Video.
© Copyright 2012 - The Julia Child Foundation for Gastronomy and the Culinary Arts. All Rights Reserved.
|
cc/2019-30/en_middle_0056.json.gz/line12242
|
__label__cc
| 0.699629
| 0.300371
|
Tag Archives: Scandal
Penn State, JoePA and a Bunch of Rope
November 11, 2011 John Zunski 4 Comments
I’m breaking rank to comment on the sorrow that is occurring at Penn State. Being a native Pennsylvanian and growing up steeped in the tradition of Penn State football, the news coming out of State College has rocked my foundation. Autumn Saturday afternoons were spent watching Nittany Lion football and Sunday mornings were kicked off by watching the other Paterno analyzing the highlights of the previous day’s game. Football was more than a pastime, it was a lifestyle.
With that background one would think I believe Paterno walks on water. Quite to the contrary, I’m taking a harder line – I believe JoePa will, and should be prosecuted for obstruction of justice. It’s fairly obvious the coach used his influence to squelch the investigation. If you’re interested, read the Grand Jury’s indictment , maybe you’ll understand why I think the way I do. The report will turn your stomach.
I’m not going to discredit what the man has done for the university, the sport, and generations of adolescents he ushered into adulthood. What makes this episode so tragic is the one action he didn’t take. Why didn’t he call the police himself?
The image of u niversity and its football program was more important than the damage inflicted upon Jerry Sandusky’s victims. That’s what makes this so incredibly disturbing. An organization and its figurehead’s image was more sacrosanct than children’s welfare.
I’m not going to recount the step by step progression of events, it has been done before and its all over the internet. That being said, to allow a known pedophile on campus after ‘accepting’ his resignation and allowing him access to the university’s facilities where he went on to commit more egregious offenses is unconscionable. Again, a symptom of the cult of personality – image is more important than a human being’s welfare.
Read Mark Madden’s article dated April 3, 2011 and you’ll catch on to something: an amazing coverup. If you want to see the effect of the cult-of-personality of Penn State football, read the first three comments, all dated April 2011. There are further disturbing allegations that Sandusky was using Second Mile to ‘pimp’ out boys for ‘investors.’ Listen to Madden’s radio interview. Hopefully it is unfounded.
The question remains, why now? Why did the entire controversy explode when it did? JoePa is tied with Alonzo Stagg for 409 victories. If Penn State beats Nebraska, JoePa stands alone at the top with 410 victories. Could it be that someone, or some group of people – timed it so the story would come to light at would have been the crowning moment of the coach’s carrier? Or was it karma?
Whatever it is, my heart aches for the tarnished legacy of a good man who failed to act. It aches because an organization which I though was beyond the greed of athletics was complicit in criminal activity. But nothing hurts more than scores of young children victimized by a predator, a predator who was protected by an organization more worried about its image than doing the right thing.
CoverupcultfootballGrand JuryJoePaMaddenPenn StateRapeSanduskyScandalsecond mile
|
cc/2019-30/en_middle_0056.json.gz/line12248
|
__label__wiki
| 0.640876
| 0.640876
|
Unopinionated: ‘Inception’ is Leonardo DiCaprio’s Best Movie
At the 88th Academy Awards, Leonardo DiCaprio won his first Oscar for Best Actor. Sadly, he received the long-awaited award for the wrong film.
I’ve written in length about how The Revenant is an achievement in little beyond the uncompromising vision of cinematographer Emmanuel Lubezki. And DiCaprio has deserved this award for superior films, which include Catch Me If You Can, The Aviator, Inception, and The Wolf of Wall Street.
(I leave out The Departed only because that film, while mostly flawless, lacks a clear lead actor who carries the film.)
We can have a lengthy debate about which of these films are his best, but for the sake of time, I’ll submit that Inception is the clear standout.
Warning: mild spoilers follow for Inception.
Directed by Christopher Nolan, Inception is successful for bringing high-minded ideas to a movie big enough for the big screen. Taking place in a dreamscape where anything can happen, the movie has a unique restraint that is tossed aside at enough moments to make us yearn for it (the line “Dream bigger” uttered by Tom Hardy comes to mind).
The set up for Inception is a slow build, as Nolan masterfully placed thrilling set pieces in a conceivable order that could come tumbling down for an ultimately satisfying final act. Only to finish the movie with a cliffhanger that begs every viewer of the movie to lend their take on what actually took place.
What enticed viewers about Inception in the first place was the promise that they’d see a unique sci-fi heist on par with accessible movies like Ocean’s 11. Yet audiences left feeling more challenged than anticipated, rivaled in part by the philosophical ripple effect The Matrix had on popular culture in 1999.
For that reason, Inception is one of those rare event movies that can be embraced by all matter of movie fans. Lovers of action and spectacle got their fill. Auteurs craving a brilliant performance received DiCaprio and Cotillard’s rush of a tragic romance, and over thinkers (such as myself) were allowed to pick apart the realities of a brand new world with fresh possibilities.
For DiCaprio, Inception is one of his best performances, as he juggles his immoral occupation as a metaphysical master thief with the sympathetic yearning of a dreamer separated from his children. The audience, characterized beautifully by Ellen Paige, is able to uncover DiCaprio’s moral quandaries within the backdrop of the only environments where the actor’s motivations would make clear sense, trading flashbacks for interactive memories.
What makes his character (Cobb) shine is his parallel battle with the rational and irrational, which comes to a head by the final act. Cobb thinks quickly and lives by the logic that has helped him survive fugitive life, but he’s just as vulnerable to the emotional impulses (plagued by his inner ghosts and demons) that undermine every plan he makes.
Much like the gaping businessmen Cobb is infiltrating for hidden secrets, Cobb himself is more or less a character we’re unwrapping as well, and the idea that he must let go of his wife is where the movie’s grandest inception actually takes place, begging the question: could Cobb have really been dreaming the entire time? The answer is up to whoever is asking the question.
(I unpack this entire exercise in length via my What You Missed About Inception article from 2013).
Inception is imaginative, massively entertaining, and hard to stop talking about. It has the dialogue of a visionary who spent a decade writing the script, characters who make the audience feel intelligent and moronic all at once, and an ending that is likely impossible to spoil in a few sentences. It’s a wholly original work of art that is harder to browse for imperfections than nearly anything else, and it is the best film yet of Leo’s career.
Do you have an unpopular opinion you want challenged? Let me know and I’ll take it on in a future Unopinionated article.
I’m Jon and thanks for reading this. You can subscribe to my posts by clicking “Follow” in the right sidebar. Or just say hey on Twitter! @JonNegroni
9 thoughts on “Unopinionated: ‘Inception’ is Leonardo DiCaprio’s Best Movie”
filmunch
I like this post, I agree that the Revenant wasn’t Leo’s best movie but he still earned that Oscar, the man nearly killed himself for heavens sake. Also, I do agree that Inception was Leonardo DiCaprio’s best performance.
Samhita
Inception is one of my favourite movies too..
littlegreenraven
After reading your article I am very interested in Inception now and hope I can see it soon! 😀
Colby Farr
I really liked this article and your take on Inception. I still gotta say that Wolf of Wall Street is still my favorite Leo Dicaprio movie though. My mind was blown when he didn’t win for that movie.
BlueFox94
I disagree that Inception is DiCaprio’s best performance. The film’s priority is the intelligence of it all, which results in dialogue that’s overwhelmingly exposition-heavy mixed with typical action dialogue (the latter of which is Nolan’s weakness, even if he’s good at disguising it to look and sound good). And Leo’s character? Yeah, he’s the lead, but the film is so grounded in the concept behind dreams that it really has little room for actual grounded emotion. Sure, we see the kids and we have Marion Cotillard as an inescapable problem, but the rest (e.g. wanted criminal, exiled from the States) is tacked on just to make us care when Leo’s really just moving the film along underneath all of the exposition. He’s a lead actor, not an actor giving it all in his performance.
I still love the film immensely, but not for the characters as full-bodied characters with arcs. It’s a heist film. You pick up characters with certain skills and they move on after the job is done. Sure, they may learn something new, but it’s not much. That, or they get arrested or die. (“What’s the use?” says Sterling Hayden in The Killing as the cops corner him.)
DiCaprio’s performance and character in this film, furthermore, doesn’t compare with Matthew McConaughey’s underrated performance in Interstellar, where his character’s relationship with his family (especially his precocious daughter) is firmly grounded and further punctuated when he returns from the water planet and reviews the archived messages from the past few decades he was on the water planet. He’s a hero because we spend a fair amount of time with what he will lose if he fails. We linger on those precarious elements instead of merely flashing back to them. You cry with him as he drives to the launch station, leaving his weeping kids behind, perhaps for the last time.
DiCaprio is a good leading man throughout Inception. McConaughey is an actor giving a powerhouse, emotionally-grounded performance in Interstellar who earns his role as the leading man.
(And DiCaprio’s Inception performance doesn’t compare with Who’s Eating Gilbert Grape, The Departed, Revolutionary Road, Django Unchained, and the pure physicality of The Revenant. If you ask me, Django Unchained should’ve been his Oscar. If only the Academy didn’t shaft him in favor of giving Christoph Waltz the Best Supporting Actor Oscar for his co-lead role. Category fraud reigns—am I right, Alicia Vikander?)
artisancandyland
I completely agree with you!
Inception is HANDS DOWN his best movie!
seanknox183
I agree that The Revenant wasn’t DiCaprio’s best movie – The Oscars just love to award actors who go through ‘terrible’ situations. I am not sure I would say Inception is his best performance either, though. While certainly a great movie (which I now am itching to watch again after reading this!), I think there are others his acting is better in.
The Amateur Philosophysicist
No mention of Basketball Diaries?
If ‘best performance’ can be measured by the audience forgetting that they are watching a performance, instead feeling like they are watching real life, then definitely Basketball Diaries for me.
Hard to evaluate him disappearing into a role considering how obscure the actor was when the movie came out. That said, I judge performance a lot by how the overall movie turns out. Unfair? Maybe, but part of what makes a performance superb is how the actor carries a film.
|
cc/2019-30/en_middle_0056.json.gz/line12250
|
__label__cc
| 0.597605
| 0.402395
|
Trump stumps at Ladd-Peebles
Posted by Boozie Beer Nues | Aug 26, 2015 | Mobile Magnified | 0 |
It’s been a busy week, especially considering we’re in the nastiest of nasty dog days of summer. But you wouldn’t have known it as a bunch of girls had a “night out,” the circus came to town, there was some LoDa PDA and geography challenges at The Wharf. Geez, if the end of summer is already this busy, I’m a little concerned fall is going to be full on cray-cray. And when I say “concerned,” I mean I hope and pray it is. Anyway, with all of this tasty scoop sitting on a double cone, we better get to licking before it melts away.
Who’s a good girl?
Senior Bowl’s fabulous ladies night out, “Girls of Fall,” took place at the Mobile Convention Center last Thursday night, Aug. 20, and from all accounts it was once again a huge success. My spies said the turnout was great and the food was especially inspiring for those upcoming tailgate parties. I can’t wait to make some sort of dip to cry into as Tom Rinaldi weaves some tragic tale on “College Game Day.” Damn you, Rinaldi!
There was a fashion show with the latest fall trends and cute game day attire, but also an equally cute guy explaining passes and plays to the women, and we hear he drew the biggest crowd. Score!
The part Boozie really hates she missed out on was the Maker’s Mark shots provided by Moe’s BBQ. Boozie isn’t sure if one lady had too many whiskies or just was in a daze for the hottie explaining passes, but she grabbed herself a handful of dog treats from the dog treat stand and started munching away. Boozie is leaning toward the shots on that one. We hear she was a very good girl after that, though. Yes she was!
I see dead people … or vodka drinks
Last week I told y’all about a movie being filmed around here but I had not gotten all of the details yet. Well the spies finally got off their dead hineys and got me some intel. Haley Joel Osment, known for seeing dead people in “The Sixth Sense” and playing Forrest Junior in Forrest Gump, has been frequenting the Royal Scam, according to our spies. We hear he enjoys Tito’s vodka and club sodas and apparently must still have his boyish good looks, as one of the lovely Scam bartenderesses carded him.
Accompanying Osment have been Freddie Highmore (“Bates Motel” and “Charlie and the Chocolate Factory”) and Jake Abel (Luke from the Percy Jackson series). They are in town filming a coming of age movie called “Holding Patterns,” which will likely hit film circuits in 2016.
Might as well Trump
OK, so let’s just get this straight. Despite what the national media may have claimed, about 15,000 to 20,000 people (not 30K to 40K) headed to Ladd-Peebles to hear Republican presidential candidate/billionaire /reality TV star Donald Trump’s plan to “make America great again.”
People started tailgating early, making a stop by FM TALK’s tent to hang with their very own Sean Sullivan and Wayne Gardner, who snagged an interview with The Donald earlier in the week.
Uncle Henry also was seen walking around with fellow local radio personality Matt McCoy, who was dressed as Trump. He looked so hot that he might have been willing to strip down for the crowd to see why he was voted “DJ whose voice leads you to believe you may want to see him naked.”
Adding to the carnival atmosphere surrounding Trump’s visit to Ladd-Peebles Friday was the Nashville-based band Los Colognes performing while the crowd waited for The Donald’s arrival.
Local musician and promoter extraordinaire Ben Jernigan was also on stage with Los Colognes, a band that makes fairly routine stops at Callaghan’s in the OGD.
The Colognes and Jernigan did a good job entertaining, but you know how politics has a way of kind of ruining most things it touches. Throughout the pre-show, every few minutes the keyboard music from Van Halen’s hit song “Jump” would play and the crowd would scream “Trump.” Also, at one point Jernigan was singing a blues standard and rearranged the words to say “Donald Trump is your hoochie coochie man.”
Um, no thanks. Boozie likes her hoochie coochie men a lot hoochier and coochier than Trump.
When Trump did arrive, he pressed the flesh with folks lined across the barricades, including one “very excited” young mother holding a baby — immortalized in a pic that has made its way around the Interwebs. We hear Trump grabbed the baby’s cheeks and asked his name and told him he was a “cutie.”
Only in America. Only in America.
Drivin’ and Shakin’
North Alabama bands Drive-By Truckers and Alabama Shakes put on a great show at The Amphitheatre at The Wharf this past Saturday night. Opening act Drive-By Truckers must have been hittin’ the bottle before the show or maybe the extreme heat just got to them because Boozie’s spy reported they played longer than everyone expected and they kept saying they were happy to be playing in “Orange Beach, Florida.” They also had some choice words for Donald Trump, one of which began with an F. The Alabama Shakes fortunately remembered they were in Alabama and said they were happy to end their tour in their home state.
Booty shakin’ in the balcony
Music fans got a treat Saturday night when John Hiatt rolled into the Saenger Theatre. The Nashville recording artist gave the crowd a good dose of his biggest hits, but he may have been a bit upstaged by his opening act, Taj Mahal. The legendary blues man was a big hit with the crowd, mixing it up by playing the banjo, ukulele and guitar. The 73-year-old also gave everyone a scare when he fell trying to sit at the piano. It took a fat minute for several stage hands to get him back to his feet, but he picked up an electric guitar, sat back down and scalded the strings off that thing, apparently none the worse for wear.
But both musicians were upstaged by a couple in the “Lincoln Balcony” to the right of the stage. They looked as if they were trying out for “Dirty Dancing II,” and there was lots of buzz about them in the audience — as well as quite a few videos. Hello, YouTube!
Well, kids, that’s all I’ve got this week. Just remember, whether rain or shine, dramatic or scandalous, or just some plain ol’ balcony lovin’, I will be there. Ciao!
PreviousCouncilors talk trash during budget meeting
NextDay shelter expands vision to provide more than a meal and a bed
Boozie Beer Nues
Boozie Beer Nues is the social butterfly of Lagniappe. She has a BA in gossip from the University of Barstool.
Alright, alright, alright, it’s the McConau-gras
SouthSounds kept Boozie busy
More Mario sightings and a new BayBears star?
Brass bands and granny panties: A SouthSounds recap
|
cc/2019-30/en_middle_0056.json.gz/line12251
|
__label__wiki
| 0.904977
| 0.904977
|
Porous Pave for Tree Surrounds
Hardscape News
Grand Rapids, Michigan, chose to replace tree grates with porous paving.
When the city of Grand Rapids, Michigan decided to replace 250 old and damaged tree grates it opted to install porous paving (Porous Pave XL) around its municipal trees. The city saw it as a cost effective solution upfront, and lowering maintenance costs in the long run.
"The material we selected offered a key advantage for making the installations easier, quicker and less costly," noted Karie Enriquez, PE, assistant project manager in Grand Rapids' engineering department. "We could install [the porous paving] without first removing the grates' metal frames that were affixed to the sidewalks on the edges of the tree openings. Prying out the frames would have damaged the sidewalks and necessitated costly repairs," Enriquez explained.
The engineer noted the porous pave bonded to the metal, and the porosity of the new surfacing helps capture storm water runoff. The porous paving is also ADA compliant and eliminated the tripping hazards that existed because of damage to some of the grates.
Brick Off the Ol' Block
The Oprah Winfrey's Harpo Studios site on the Near West Side of Chicago is now a pile of rubble.
Photo: Creative Commons Attribution 3.0 Unported (cc by 3.0)
The Chicago Tribune reports the demolition of Oprah Winfrey's Harpo Studios site on the Near West Side of Chicago has instigated the pilfering of bricks from the rubble as souvenirs. A brick from a building that housed Oprah's show may seem a tenuous connection to the star, but as Simone Signoret noted in her biography, Nostalgia Isn't What It Used to Be.
Reports say a security firm was hired to keep people off the West Loop site. As a funny aside, it has also been reported that some people have offered money to the security guards if they toss a brick or two over the fence.
The building was home to the "The Oprah Winfrey Show" for 11 years, before Oprah pack her bags in 2011 to head to West Coast studios.
Developer Sterling Bay bought the building complex for $30.5 million in 2014; McDonald's will build a new corporate headquarters in it place, scheduled for completion in 2018.
Hardscape North America Show
With "Year of the Dealer" as its theme, Hardscape North America (HNA) will co-locate with GIE+EXPO (http://tinyurl.com/zp3366e) again this year. Billed as the green industry's largest trade show, GIE runs Oct. 20-21.
HNA reports this year's hardscape trade show (Oct. 19-21) will feature 50 new exhibitors. More than 200 new and returning exhibitors will fill the new, larger indoor HNA trade show area and 19-acre outdoor exhibition area at the Kentucky Exposition Center in Louisville, Kentucky. Exhibitors will include paver producers, dealers, equipment and tool manufacturers, and more.
HNA will offer a wide variety of demonstrations in its outdoor exhibition area. Those sessions will range from paver installation to basic wall building, from tools of the trade to lighting and water feature installation.
HNA has also just released a schedule of educational sessions for Dealer Day, Oct. 19, at the Kentucky Exposition Center.
For more information visit (http://tinyurl.com/hbjc5oj).
Hardscape Affixer
Minnesota-based SRW Products, a national hardscape products and accessories supplier, has introduced a new adhesive called Vertical Instant Lock. The product is designed to securely affix stone and other hardscape materials to vertical surfaces in under five seconds.
The manufacturer says the adhesive secures stone pavers as heavy as 25 pounds to a wall, and is ideal for outdoor kitchens, veneers, masonry and repairs.
Source: http://www.srwproducts.com/
As seen in LASN magazine, September 2016.
|
cc/2019-30/en_middle_0056.json.gz/line12253
|
__label__wiki
| 0.659744
| 0.659744
|
Edo To Partner Shippers’ Council on Truck Transit Park, Container Depot
By YUSUF BABALOLA, Lagos
Governor of Edo State Governor, Godwin Obaseki has indicated his administration’s readiness to support the Nigeria Shippers Council (NSC) to establish an Inland Container Depot and a Truck Transit Terminal, which would facilitate diversity in economic activities.
This was at the Edo State Government House in Benin City where he received the management of Nigerian Shippers Council recently. Leading the NSC delegation was Hassan Bello, who revealed that the purpose of the visit was to inform the governor of their intention to establish an Inland Container Depot and a Truck Transit Terminal, while seeking the state government’s collaboration.
He added that these projects would open up economic possibilities as well as create more jobs for residents in the state, noting that Governor Obaseki, as host, would provide land, building permits, provision of amenities, security and immediately constitute the state Inland Container Deport implementation Committee.
Continuing, Bello explained that the proposed Inland Container Depot in Edo State would help decongest Lagos Port and stimulate economic activities in the state, as port would have all the trappings of a seaport while the customs would own it and duties would be paid with full economic participation.
A statement explained that Obaseki assured the group of his government’s support, especially as both parties had the same aim of creating more jobs. “We have made promises to our people and those promises will certainly be kept. Our focus as a government is not on what we say; the emphasis is on execution. We decide what we want to do, draw up a timeline for it and put responsible people to monitor the success”.
Meanwhile, he continued that power would not be a problem as uninterrupted power supply was being developed for industrial parts of the State.
Stallion Farms Targets 1.5 Million Tonnes Rice Production yearly
Mass Housing: AHCN Plans N500bn Revolving Intervention Fund With CBN
|
cc/2019-30/en_middle_0056.json.gz/line12259
|
__label__cc
| 0.587428
| 0.412572
|
What a pretty little sad surf-rock song this is, one of my fastest favorites on “Kintsugi.”
My high hopes for this new Death Cab for Cutie album, I’ll admit, were a little too high. I’ve gone back to it once or twice loving the colors and the tones, but I can’t put this on par with “Plans,” or even “Narrow Stairs.” The album, for me, starts strong and has some really beautiful sentiments and the kind of thoughtful takes I expect from this band – as well as musically cool moments – but I’m not sure if it presents a new landscape or treads new territory, as past albums accomplished. I hope this takeaway fades and changes in time, I hope some day on some drive the whole thing just clicks into place for me, but I’m not there yet….that said, who in the the pop-indie realm these days writes better songs than Ben Gibbard? That said, this is so far one of the most solid, clear-eyed and composed albums of the year, from one of the most reliable bands of the decade.
I like the guitar tones on this entire album, they’re just-so resonant, just-so round and occasionally a little groovy in a 90s radio rock sort of way. The subtle digital manipulations,like on “Black Sun,” are a modern touch, the piano work is both expected and refreshing. Gibbard’s voice here is as mature and sure of itself as I’ve ever heard it, owing its presence to the song and its melody instead of simply delivering his words in his way. This, I think, is a learned skill. Lyrically, he is still a sad sack of hipster, the OG of the genre, as it were, and I can not, will not, get enough. His perspective switches from the internal to the wide-angle track by track, it seems, even verse-by-verse, and this is how he has written as far back on “Something About Airplanes.” But their is obvious maturity, and it’s not just in giving up the raspy falsetto, it’s also in in the reflection.
Can we pinpoint when this band became so good with hooks? Maybe they always were, but I never thought of them as writing chorus-driven songs and that is what this album is full of. Is this regression, or progress or songwriting? Regardless, I like this one from “Little Wanderer” in particular, it’s so melodic for a sad little song. I like how this song This song hangs tight in the present, it wistfully dwells on the past, it longs for the future. Also, I am sucker for any airport reference (and not just because my new line of work involves understanding them, but because of those feelings of love and hope and solitary contentment they can provide).
Yesterday I leaned Death Cab will be in town in September, and I’d be foolish to not try to make that happen. My slightly dashed hopes on the record from won’t keep me from feeling optimistic that this could be, would be, should be a show to remember. I’d rather have something to look forward to, than go in thinking this band I’ve held in high regard for so, so many years would disappoint me with their seasoned performance. From what I understand, they are pretty fucking fantastic. Do they still play “Transatlanticsm?” Oh well, even if not, I would not mind hearing this newest collection in its fullest form. Maybe by then, these songs will have gelled a little more with my ears and my mind, as I slowly detatch from the old assumptions of what a DCFC record is supposed to be. Maybe by then, I can begin to embrace and understand the one they’ve chosen to produce, and maybe, by then, I will have learned a little something about growth in the process.
“You sent a photo out your window of Tokyo
Told me you were doing fine
You said the cherry blossoms were blooming
And that I was on your mind
But I couldn’t make you out through the glitches
It’s how it always seems to go
So we say our goodbyes over messenger
As the network overloads
When the network overloads
You’re my wanderer, little wanderer
Off across the sea
Won’t you wander back to me
Back to me.
Always fall asleep when you’re waking
I count the hours on my hands
Doing the math to the time zone you’re at
Is an unseen part of the plan
But if you’ll be my bluebird returning
Then I’ll be your evergreen
Standing tall on your horizon
Guiding you home to me,
Guiding you home to me.
How I wish that you could see
How I need you back with me
Back with me.
You sent a photo out your window of Paris
Of what you wish that I could see
But someone’s gotta be the lighthouse
And that someone’s gotta be me
And I hope your absence makes us grow fonder
I hope we always feel the same,
When our eyes meet past security, we embrace in the baggage claim,
When we kiss in the baggage claim.
Off across the sea.
Won’t you wander back to me,
How I wish that you could see.
How I need you back with me,
Back with me “
~Little Wanderer,
Death Cab for Cutie, Kintsugi
“Sorrow drips into your heart through a pinhole
Just like a faucet that leaks and there is comfort in the sound
But while you debate half empty or half full
It slowly rises, your love is gonna drown.”
~Marching Bands of Manhattan
Death Cab for Cutie, Plans
A new Death Cab album is coming out this March and this is the most welcome news. What an excellent band.
DCFC was among the first bands I truly embraced, the kind where I had to know everything about them and have all their CDs with me at all times. I’ve never not enjoyed them, I’ve never not had a place for them in my iPod or car stereo. I’ve never gotten tired of Ben Gibbard’s inimitable tone (or his solo work, for that matter). I am sorry to say “Codes and Keys” completely slipped by me, but listening to their back catalog reminds me why this band remains so impressive and worthy of attention. It also reminds me how much of my brain matter is devoted to the creations of musicians, so hopefully that proves worth it somehow.
Few bands are able to grow this well over the years, seasoning their sound without abandoning the perspective and tendency that made them noteworthy in the first place. What a journey this band has had. They’ve never departed from that subtle, muted build, from careful keys and simple, layered parts, from melodies and harmonics that rely on comforting repetition. Their songs are like waves, with this satisfying initial atmosphere and a delayed, lingering impact that washes over you. They’re like a bruise that doesn’t show up until later. They’ve got some kind of mastery of the emotional, epic build – from “Different Names for the Same Thing” to “Transatlanticism” to “Brothers on a Hotel Bed” to “I Will Possess Your Heart.” Just epic, epic songs, in the sort of Greek meaning of the word. Compound the stunning, sensitive approach to melodies with the immense lyrical talents of Ben Gibbard, who has an authentic literary quality, an ability to break hearts in a single scene.
Their tempered brand of indie rock, back when it started, was a premonition of the hipster scenes to come. They were the tastemaker of the early adopters but not because they were trying to be, they were simply playing their sound – and I know this because of how their sound has progressed over the years without losing its foundation. I can listen to the mellow waltzy groove of “Grapevine Fires” and hear early parallels in “A Movie Script Ending,” proof of a style and tone that’s grown more solid and shaped and mature and intellectual. Have they made some filler over the years? Sure, probably. What band hasn’t? Their excellence-to-mediocre ratio is high, and I can think of worse ways to spend an afternoon/disagree with your friends than trying to come up with the top 10 Death Cab songs. Their highs are so, so high, and it’s why the mainstream music world has embraced them as this huge band who headlines festivals and gets everyone all worked up with a (rather beautiful) album title and release date.
“Left uninspired by the crust of railroad earth that touched the lead to the pages of your manuscript.
I took my thumb off the concrete and saved up all my strength to hammer pillars for a picket fence.
It wasn’t quiet what it seemed, a lack of pleasantries, my able body isn’t what it used to be..
I must admit I was charmed by your advances, your advantage left me helplessly into you.”
~Title Track
Death Cab for Cutie, We Have the Facts and We’re Voting Yes
Their own critical acclaim aside, this band is just sort of a golden thread of the past 12 years or so. My first boyfriend burned me a copy of every one of their early albums, I think I might still have them somewhere. “Something About Airplanes,” “We Have the Facts and We’re Voting Yes,” and “The Photo Album” sounds just like early high school, like being sullen and silent in my basement, like playing it cool in front of older friends, learning to flirt in silence with lowered eyelids and smiles to the side. “Transatlanticism” is an ode for later, creative years, when I danced all the time and wrote in secret and drew with Sharpies everywhere in the hopes of creating something beautiful, something expressive, something pained, something worth sharing. “Plans” came out at a rather emotional time in my life, I can’t really even listen it anymore because it’s so interwoven with past pain and loneliness and loss, but I still do, all the time. “Narrow Stairs” found me grown up, or at least, closer to it, after I’d made some choices and was self-aware enough to see their consequences, my eyes finally opened as wide to myself as they were the rest of the world.
I’ve found this band is one of the best soundtracks for the ambient times, those that are neither good nor evil, those times that simply must pass and can be found full of meaning in their own fleeting insignificance. A good Death Cab song is like a good short story, filling you up with something that’s much more than nothing, something worth pondering, without taking too much out of your brain to process (“Brothers on a Hotel Bed,” “Tiny Vessels,” “A Lack of Color,” “Bixby Canyon Bridge”). A great Death Cab song is like a memory you’re scared to remember, where your hesitate to press play because you know how strongly you’re likely to react if you go there (“Transatlanticism,” “I Will Follow You Into the Dark,” “What Sarah Said”). I am listening to these songs now, evoking that strange sort of catharsis only the songs and souls you connect with the most and encounter the least can provide. Lately little else makes me feel. So in the name of provoking myself into new attachments, to new memories, I’m very much looking forward to what Death Cab, in its new iteration, has to offer these ears. I should probably give “Code and Keys” a full listen or two and and see how it sinks in. But until then I have plenty of the past to re-hear, especially from the perspective of writer and singer and creator, and not just listener – what a journey it has been, indeed.
“I descended a dusty gravel ridge
Beneath the Bixby Canyon Bridge
Until I eventually arrived
At the place where your soul had died.
Barefoot in the shallow creek,
I grabbed some stones from underneath
And waited for you to speak to me.
In the silence it became so very clear
That you had long ago disappeared.
I cursed myself for being surprised
That this didn’t play like it did in my mind.
All the way from San Francisco
As I chased the end of your road
‘Cause I’ve still got miles to go.
And I want to know my fate
If I keep up this way.
And it’s hard to want to stay awake
When everyone you meet, they all seem to be asleep
And you wonder if you’re missing a dream
You can’t see a dream
You can’t see a dream.
You just can’t see a dream.
And then it started getting dark.
I trudged back to where the car was parked
No closer to any kind of truth
As I assume was the case with you.”
~Bixby Canyon Bridge
Death Cab for Cutie, Narrow Stairs
Change is a wonderful thing. So are new experiences. And still the shadow of the past follows you around, creeps up around you, pops in front of you in a certain light. No reason to stop treading the path you’re on, but it elicits enough memory to give you perspective.
When the world looks new, it’s almost like living in a dream – every corner, every street, holds the unfamiliar and potentially life-changing. Living in the moment becomes easier than ever when there’s little common ground between you and your surroundings. So, your eyes see clear than ever, your perspective renewed.
What I love about Death Cab for Cutie, especially “Plans,” is the perspective, the way the narrative is a few steps removed from the present. This album has been with me for a long time – the band was an early high school favorite, and this album saw me through so many life transitions. Once again I find myself spinning Plans, playing and singing along, aging along with the album. It’s a wonderful accompaniment for the moments you want to spend living in your head, a safe harbor to find yourself when your surroundings are entirely brand new.
“Burn it down till the embers smoke on the ground
And start new when your heart is an empty room
With walls of the deepest blue
Home’s face: how it ages when you’re away
Spring blooms and you find the love that’s true
But you don’t know what now to do
Cause the chase is all you know
And she stopped running months ago
And all you see
Is where else you could be
When you’re at home
Out on the street
Are so many possibilities
To not be alone
The flames and smoke climbed out of every window
And disappeared with everything that you held dear
And you shed not a single tear for the things that you didn’t need
‘Cause you knew you were finally free
‘Cause all you see is where else you could be when you’re at home
Out on the street are so many possibilities to not be alone
And all you see is where else you could be
There on the street are so many possibilities to not be alone”
~Your Heart is an Empty Room
Someone I love told me something really freakishly beautiful once. Something about how souls are like glasses of water, and once you combine them, you’ll never be able to separate them again, because if you pour them back into glasses, it’s not the same glass of water you had before.
It is a different temperature. Maybe a different color. Different elements than before, added or diluted or filtered.
“The Atlantic was born today and I’ll tell you how…The clouds above opened up and let it out.
I was standing on the surface of a perforated sphere
When the water filled every hole.
And thousands upon thousands made an ocean,
Making islands where no island should go, oh no.
Those people were overjoyed, they took to their boats.
I thought it less like a lake and more like a moat.
The rhythm of my footsteps
Crossing flatlands to your door have been silenced forever more.
The distance is quite simply much too far for me to row
It seems farther than ever before
I need you so much closer.”
~Transatlanticism
Death Cab for Cutie, Transatlanticism
For awhile I trusted in love, in fate, to tell me the difference between what is real, what is in my sad, scared head and what is worth my time….more I see, it is about choices than anything else. What you choose to love. What you choose as your fate. What you choose is right, or wrong. Even still, it’s not all up to you. Something’s got to choose you back.
Something needs to slow down. I don’t know what, but something. Probably my own head.
I’m always rushing through the rapids, springing from a rock to the next on tiptoes fueled by careful aim. Nothing but that and dumb luck keeping me from getting splashed, and the slightest drop floods me with doubt and defeat.
“We’ll correct collegiate mistakes,
A shower of formal ideals,
Completely soused,
The hearts on our sleeves,
As they drowned we could hear them screaming,
‘Oh what a tragic way to see our final days.’
I attempt to talk up the town,
‘The answers are in the arches of the 20th Century Towers and in
comfortable cars in motion.'”
So. Tired. Today was a good example. Everyone running around, questions in hand, and I literally cannot string two coherent words together. It’s like my limbs feel too long and awkward, and I woke up with a reach I had no idea how to control. Fumbling, I’m five to five hundred steps behind everyone, and I’m furious for failing at what exactly I cannot say.
I have to believe that it’s all this way for a reason, that I got here by aid of something more tangible than chance. But lying awake, alone for miles, how is that any comfort when I feel like a sympathy case, or worse a coward?
Although, I could make one hell of a sad mix CD back in the day. Surely, that counts for something.
“And yet it still remains, this incessant refrain:
‘You’re just like the rest. Your restlessness
makes you lazy.’
Keeping busy is just wasting time
And I’ve wasted what little he gave me.
I know the conscious choice was
Crystal clear,
To clean the slate of former years,
When I sang softly in your ear
And tied these arms around you.”
~20th Century Towers
Death Cab for Cutie, The Stability EP
Death Cab for Cutie is sustaining a wonderful career, starting off a little known West Coast indie group and becoming one of the bands that made indie maintstream again. Avid use of DCFC songs in TV and movies – The O.C. and Twilight come to mind – certainly helped spread them to new audiences, but I remember adoring them in my early high school years, with my then-boyfriend burning me mixes of their entire discography to date when I couldn’t find the CDs locally.
They haven’t lost their aptitude for true storytelling, setting scenes and giving insight into what goes on in the mind when confronting a moment. Often reflective, selectively pessimistic, they were ironic and hipster long before it was trendy. I do hope that as the decades pass Death Cab is given their due.
This song, “Photobooth,” transports listeners to a time and a day when lust meant love, when hard edges were inviting, and when meaning was found in the meaningless if only for the novelty.
“I remember when the days were long,
And the nights when the living room was on the lawn.
Constant quarreling, the childish fits, and our clothes in a pile on the ottoman.
All the slander and double-speak
Were only foolish attempts to show you did not mean
Anything but the blatant proof was your lips touching mine in the photobooth.
And as the summer’s ending,
The cool air will put your hard heart away.
You were so condescending..
And this is all that’s left:
Scraping paper to document.
I’ve packed a change of clothes and it’s time to move on.
Cup your mouth to compress the sound,
Skinny dipping with the kids from a nearby town.
And everything that I said was true,
As the flashes blinded us in the photobooth.
Well, I lost track, and then those words were said.
You took the wheel and you steered us into my bed.
Soon we woke and I walked you home,
And it was pretty clear that it was hardly love.
The cool air will rush your hard heart away.
You were so condescending.
You were so condescending,
As the alcohol drained the days.
The empty bottles, spent cigarettes.
So pack a change of clothes, ’cause it’s time to move on.“
~Photobooth
Death Cab for Cutie, Forbidden Love EP
I like this song, because it is a ballad in the traditional sense.
So I’ve been all over the magazines and blogosphere lately, scrounging for the best of the best of the best lists. Not only is it the end of the year, it’s the end of a decade, the first of the new millennium. This is huge for us living through it. So as music journalists go, we must analyze, catagor-ize, figure out where the pieces of music fit in a grander scheme. Who started trends, who broke the molds, who went for it and got there, no sweat?
The differences in some of the lists are astonishing. I’ve yet to figure out what my personal favorites have been, but I’m pretty sure it aligns with Rolling Stone’s from what I’ve seen so far — no doubt Kid A as their #1 pick speaks to that. As for Paste, who chose Sufjan Steven’s Illinois album, I see where they’re coming from because it is so unbelievably musical, but I doubt the effect he had is nearly as reaching as Radiohead’s. Whatever that means. Additionally, many albums that personally changed my musical life were heard by a handful of die hard fans, like Lovedrug or Copeland or Circa Survive.
Also, from 2000-2009, I grew up from 11 to 21, most of the music I ingested WASN’T of the times. Zeppelin is still my gold standard of rock ‘n’ roll, and Bob Dylan is still a poet — this is music that is not OF the times, but still greatly affected me, a product of the generation. We can’t consider the times to be the only means that shape us — what comes before is just as relevant as what’s happening now in terms of music, at least. It is timeless. Such is the state of many of the records chosen by publications in their valiant listing efforts — timeless pieces of music that sum up a generational attitude, signify a shift in musical priorities and woo their audiences through a blend of new sound and honest surrender.
But we must give any of the list makers credit where credit is due. At a time when music kind of exploded into a billion little markets, it’s not easy to compare the works of seasoned artists against indie newcomers, wordsmithing rappers with guitar strumming folksters. Yet, they try, because how could we not take a look back?
Long live rock ‘n’ roll, so they once said. Freak folk, I’ve yet to see how long you’re gonna last, but it’s clear from these lists you made your mark. Emo, you came and went and your influence will be forever immortalized in MySpace mockery and swoopy haircuts. Bruce Springsteen, you still have not gone away, and that’s just fine with me.
Death Cab for Cutie, you rocked my world, and everyone else’s. “Plans” is the soundtrack of my decade, I’m pretty sure if I had to make a list it would be my number once choice. No album fits any mood better, no album reads my thoughts better, no album elicits as much personal imagery and emotion than that one. Given to me by my mother on my 17th birthday, which feels like so, so long ago, but wasn’t at all. I was wearing a peach-pink prom dress and a tiara, hadn’t even learned to play piano yet, and still longed to learn the opening notes of “What Sarah Said.” A year later that song would mean much more to me than I could know, and four years later “Marching Bands of Manhattan” rang in my ears as I slinked along, broke and alone the subways. “I Will Follow You Into The Dark” is an acoustic gift, “Summer Skin” fits every fall afternoon. I love “Plans,” and while “Transatlanticism” hooked me onto Death Cab in the first place, “Plans” has a more mature, thorough sound, and a different take on the thoughtful musing all musicians are prone to expose in the events of their life.
Anyway, lists:
Rolling Stone: 100 Best Albums of the Decade
Paste Magazine: The 50 Best Albums of the Decade
Pitchfork: The Decade in Music (enough material here for weeks of thoughtfulness)
NME: The Top 100 Greatest Albums of the Decade
Billboard: Artist picks of the decade video
Also, I am pretty much on board with Tom Morello’s picks, lots of good ones in there.
Click around and stroll down memory lane…..we’ve come a long way from 2000, and I can only imagine what sounds the next decade will come up with. Like TV, there’s bound to be the best of the best and the worst of the worst, depending on what channels you tune into. Depending who you talk to, and depending on your tastes. The past year, and the best-of-the-decade wrap-ups allude to the fact that the deep insight and musical mastery of Radiohead, Sufjan and their counterparts sings to the generation and its critics alike. That’s a positive sign, folks — no, auto-tune has not taken over good music, no, hook-y choruses and overproduced nonsense will not kill of the passionate pleas of musicians trying to say their piece. That will always make for the best of the best lists, those who take their craft as seriously as a carpenter takes their staircase. It must be aligned, it must be logical, it must have direction, and it must take you from one place to another. Such music will always, always prevail.
Somehow, when there’s a band you’ve really loved, you love what they make regardless of it’s critical reception. For me, The Killers, Death Cab for Cutie, Copeland, Jimmy Eat World….whatever they do, I will love. And I’ll feel some deeper connection to it, as if they’ve been releasing songs for a span of a few years that correlate to my own experiences.
This song, is gorgeous. Soft, melodic, floating…I love the direction this band has been going in. Album to album, Copeland shows off mature progression and and ability to create delicate soundscapes with poetic meaning and gentle emotion. They’re extremely patient, never pushing a song too far in one direction but always having a beginning, middle and an end.
“Cause it’s no good if you can have it all,
Well I’d give it back but I never stole the first part.
And it always goes when you need it the most,
The kindest love is still bleeding from the last shot.”
-Good Morning Fire Eater, Copeland
|
cc/2019-30/en_middle_0056.json.gz/line12261
|
__label__wiki
| 0.94572
| 0.94572
|
LennyCo — June 20, 2019 in Technology
Messaging app Slack becomes latest blockbuster tech flotation
The latest blockbuster tech flotation hits Wall Street later when shares in messaging app Slack start trading.
But the company has chosen an unusual route, effectively cutting out many of the advisers – and their fees – that take companies to the stock market.
Slack has chosen a direct listing, where the shares become immediately tradable, in a move that could create wild swings in the price.
The company is expected to be valued at about $15-17bn (£12-13.5bn).
Slack is the second big tech firm to go the direct route, after music streaming service Spotify used the method last year.
“We think the jury is out on whether this is the right move or not,” said Kathleen Smith, a listing expert at Renaissance Capital.
“Looking at Spotify, it takes a little time for the stock to get established after a direct listing.”
Slack’s listing fees are expected to be about $22m. When Snap went public in 2017, it paid about $85m to its financial advisers.
Spotify’s listing is generally regarded as a success, although the shares now trade about 15% below their debut price.
If Slack can also make a success of its direct listing, it could have implications for how future tech firms come to market, including for Airbnb.
Slack co-founder Stewart Butterfield also developed photo app Flickr
Slack’s software replaces emails by grouping messages around subjects, projects and teams. It means that flooding people with irrelevant emails can be cut.
The software has become increasingly popular, with HSBC and Ford among some of the big corporate users. It has about 100,000 paying customers.
Founder Steward Butterfield, who developed the photo app Flickr, says Slack is a revolution in corporate communication.
But like many big tech firms coming to market, Slack has never made a profit. Although revenue rose 80% to $400m in 2018, losses were $144m.
And some analysts are worried that Slack is competing in an increasingly crowded market. Microsoft offers Teams, a free chat app add-on for its Office365 users.
|
cc/2019-30/en_middle_0056.json.gz/line12262
|
__label__wiki
| 0.565046
| 0.565046
|
Newer items
Welsh Lib Dems: We must fight for LGBT equality everywhere
Ahead of a Senedd statement on International Day against Homophobia, Biphobia and Transphobia, the Welsh Liberal Democrats have urged Wales to build on recent progress in LGBT rights and fight for safety, equality and freedom for LGBT people across the globe.
There is no doubt that the past few years have seen great strides in LGBT rights in the UK and across the world, but there is far more that needs to be done to create a world where every LGBT person can live safely, equally and freely.
International Day against Homophobia, Biphobia and Transphobia
LGBT+ Lib Dems' Secretary, Andrew Brown, has written for Liberal Democrat Voice:
On this day in 1990, the World Health Organisation removed homosexuality from its list of 'mental disorders'. Since 2004 the anniversary of this has been used to promote awareness of the legal and cultural discrimination LGBT+ people still experience around the world.
Gender Identity Clinic progress unacceptable - Welsh Lib Dems
Responding to comments by the BMA's Welsh General Practitioners Committee that a full Gender Identity Clinic service is unlikely to be made available in Wales, the Welsh Liberal Democrats have called for an urgent assessment on progress on the establishment of Wales' first Gender Identity Clinic.
The BMA have claimed transgender people are being let down by an unacceptable lack of progress towards the establishment of a Gender Identity Clinic (GIC) in Wales and that they have no confidence in a proper service being provided.
Join us at our Winter Conference
All members of LGBT+ Lib Dems are invited to our Winter Strategy Conference in London this Saturday.
Our Winter Strategy Conference is one of two occasions during the year where we can get together to discuss the issues that most affect LGBT+ people, and how we campaign on these. (The other is the Summer Conference, normally held in Manchester).
Unfortunately LD HQ is not available on the chosen date this year, so we will be meeting in the Poetry Cafe at the Poetry Society. The venue is in a basement, but does have a lift. Tea and Coffee will be provided, and there will be a break for lunch.
If you have any suggestions of topics, issues, or campaigns you want to have included in the day's discussions please get in touch on secretary@plusld.org.uk
After the Conference, members are cordial invited to join us at our Winter Soiree just a short stroll away in the Cellar Bar. Party member Paul Kohler has graciously offered us the use of his bar until 8pm and 20% off drinks!
Sadly we regret that the Cellar Door, being a basement venue, has no step-free access.
Winter 2017/18 Plus magazine out now!
Article: Jan 1, 2018
The latest edition of Plus, the magazine for members of LGBT+ Lib Dems, is out now and will be hitting members doormats over the next few days.
With features including easy ways for ordinary members and supporters to help advance LGBT+ rights in the UK, councillor resources and how you can help with a new LGBT+ rights and the Lib Dems / SDP / Liberal Party history project, it's a cracking read.
Happy New Year from the new exec team!
Article: Dec 31, 2017
A very happy new year to you from the new LGBT+ Lib Dems team.
As elected at our Annual General Meeting in Bournemouth in September, the group heading up our work in 2018 will be:
Chair: Jennie Rigg
Treasurer: Richard Flowers
Secretary: Andrew Brown
General Executive members: Sarah Brown, Hywel ap Dafydd, Iain Donaldson, Jack Gilbert, Don Harrison, Holly Matthies, Zoe O'Connell.
Sex and Relationship education report an excellent blueprint for Wales
By Welsh Lib Dems
The Welsh Liberal Democrats have welcomed a report that calls for a complete overhaul of sex and relationships education in Wales.
The Sex and Relationships Education Expert Panel was established in March 2017 by Welsh Liberal Democrat Cabinet Secretary for Education, Kirsty Williams, to help inform the development of high quality SRE in the new curriculum in Wales.
World AIDS Day - A Personal Reflection
Article: Dec 1, 2017
By Adrian Hyyrylainen-Trett
Each year the 1st December, World AIDS Day arouses a series of different emotions for me from relief, to tears, to pride and to survival that I've surmounted another six months.
You may wonder why, in 2017 this means so much to me and engulfs me in such a fashion. Well, I was diagnosed on the 3rdJune 2004, which is ironically the halfway point of every year between December 1st. It is my HIV positive anniversary which many people, who have been diagnosed, have etched on their psyche for ever.
Vince's message for World AIDS Day
Liberal Democrat party leader Vince Cable MP has recorded this video for World AIDS Day 2017 with the National AIDS Trust's #LetsEndIt campaign.
More information on this year's campaign here: www.worldaidsday.org
LGBT+ Liberal Democrats commemorate Transgender Day of Remembrance
Article: Nov 20, 2017
Today we mark Transgender Day of Remembrance. LGBT+ Lib Dems condemn all violence, but particularly and especially today the violence that takes so many innocent trans people from us before their time.
It is the 20th year of TDoR this year, and LGBT+ LDs extend our love and sorrow to all the people on this year's list, their friends, families and loved ones, and the lists for all the previous 19 years too.
|
cc/2019-30/en_middle_0056.json.gz/line12266
|
__label__wiki
| 0.856947
| 0.856947
|
2018 Primary EndorsementsPolitics
By Liberty Watch Magazine Last updated Oct 25, 2018
Steve Sisolak (Democrat)
Adam Laxalt (Republican) Ryan Bundy (Independent) Republican Adam Laxalt—We were ready, willing and able to support Laxalt until he joined himself at the hip with “Tax Hike Mike” Roberson (See LT. Governor endorsement) To add further insult he has gone back on his word to repeal the Commerce Tax and conservatives are concerned where Laxalt will fall on ESA’s (Education Savings Accounts) Laxalt, says he won’t roll back Sandoval’s expansion of Medicaid which will cost Nevada taxpayer tens of millions of dollars in increased taxes. Attorney General, Laxalt was asleep at the switch while his deputy, Wes Duncan, solicited $100,000 in campaign contribution from businesses he regulated.
Remember what an Elko Republican told us, “I can’t support [Laxalt] as long as he’s pushing that Roberson character.”
As time passes, Laxalt appears to be a Mike Roberson puppet. Laxalt comes from a family that is Silver State political royalty. And for that reason, he believes he’s entitled to the office. We disagree. The company he keeps disqualifies him for the state’s highest office.
Democrat Steve Sisolak wants to raise your property taxes to give teachers raises, not based on merit, but, just because he’s beholden to the teachers’ union. He says, reduce school class sizes, build a stadium and expand the convention center with your money. He believes taxpayer pockets are bottomless. He is not an option.
Independent Ryan Bundy—The only real liberty candidate (see October Liberty Watch). But, does he have a real chance?
We are not making an endorsement in the governor’s race, we ask that each of you to vote your conscience and your conservative beliefs.
Janine Hansen (Independent American)
Kate Marshall (Democrat)
Ed Uehling (Independent)
Michael Roberson (RINO)
“Tax Hike” Mike Roberson ramrodded the largest tax increase in Nevada history through the legislature. He supports amnesty of illegal immigrants. He was the sponsor of a bill granting licenses to illegal immigrants. He supports common core standards for Nevada schools and he’s a #NeverTrumper. Roberson is a democratic wolf in sheep’s clothing. Republicans, don’t think you’re voting for a republican if you vote for Roberson and don’t take our word for it, investigate for yourself please Visit the Secretary of State website at https://www.nvsos.gov/sos/ click on Campaign & Expense reports and look at who is supporting Roberson. As Ronald Reagan said if someone votes with you 80% of the time they are your allie if they vote against you 80% of the time they are your enemy.
Roberson is a enemy to all Republicans.
Liberty Watch recommends Ed Uehling, Janine Hansen, even Kate Marshall, anyone but Michael Roberson.
Dean Heller (RINO)
Jacky Rosen (Democrat)
Heller versus Nancy Pelosi’s pet Wacky Jackie. We wrote #NeverHeller in our primary election issue and Senator Heller has done nothing to change our minds. Heller is the original #NeverTrumper and if reelected he will just go back to his flip-flop ways. We understand the concern if that not voting for Heller, we will lose control of the Senate, that’s just not true, if Heller loses, Republicans will still gain as many as 4 seats bring the Republican majority in the Senate to 54, so please don’t let the fear mongers keep you from voting your conservative beliefs. Let’s not forget when Heller said he would vote to repeal Obamacare, then he stuck his finger in the air, checked the wind and said he’d vote not to repeal. Ultimately with pressure from the White House and the fear that he wouldn’t get re-elected Heller did the right thing. But if given another six years, Heller will surely flip-flop and hang taxpayers out to dry.
Liberty Watch has no choice but to recommend voting None of the above
Congress, District 4
Cresent Hardy (RINO)
Steve Horsford (Democrat)
We wrote #NeverHardy in our primary endorsements issue and haven’t changed our minds. Hardy is a #NeverTrumper, who along with Dean Heller spent a majority of the 2016 election cycle undermining President Trump with Nevada Voters. If elected we believe that Hardy will not support the Trump agenda. Republicans should not reward bad behavior, listen to your conscience when voting.
Liberty Watch recommends —None of the above
Mark Amodei (Republican)
Clint Koble (Democrat)
Mark E. Amodei is the clear choice and deserves reelection he’s the taxpayers best friend.
Liberty Watch proudly endorses Mark Amodei
Susie Lee (D)
Danny Tarkanian (R)
We’ve had a love-hate relationship with Danny over the past year. We initially supported his Republican primary challenge to U.S. Sen. Dean Heller. But when he switched races and filed for CD-03 instead, we went a different way in that primary.
Nevertheless, he is far and away the better choice for the general election.
Danny is a committed fiscal conservative who is well-informed on the issues. He was also an early and unwavering supporter of Donald Trump in the 2016 presidential election – despite coming under intense pressure from the “Never Trumpers” to throw Mr. Trump under bus just before Election Day. He continues to support the President’s “Make America Great Again” and “America First” agenda and would continue to do so as a Member of Congress.
Danny’s Democrat opponent – borrowing a phrase by none other than Hillary Clinton herself – is a “nothing burger.”
Susie Lee’s understanding of critical issues goes only as deep as the talking points she’s fed by Nancy Pelosi and the DCCC. She would oppose President Trump’s policies every step of the way and would vote to undo all the economic success the country has enjoyed since Mr. Trump moved into the White House.
We’ve also learned that Susie’s vaunted “philanthropy” includes running a failed homeless program in Las Vegas that cost taxpayers some $5 million, as well as running a “charity” that over the past year has sucked over $1.6 million from the Clark County school district which could have been better used to hire more teachers.
Unless you’re tired of all this winning over the past two years under President Trump, the choice in CD-03 is a no-brainer: Vote for Danny Tarkanian.
Barbara K. Cegavske (Republican)
Nelson Araujo (Democrat)
Throughout her career in the Legislature, Republican Barbara Cegavske has been an open and consistent supporter of limited, fiscally conservative government. As Secretary of State, she has been an effective, non-partisan guardian of Nevada’s electoral system. She supports legislation to require photo ID before voting and opposes same-day registration.
Her Democrat opponent, Nelson Araujo, is an inexperienced, unaccomplished, anti-business, government employee and two-term state assemblyman who opposes voter ID and supports same-day registration.
This is an easy one: Barbara Cegavske for Secretary of State.
Wes Duncan (Republican)
Aaron Ford (Democrat)
Joel F. Hansen (Independent American)
Neither Duncan nor Ford have the experience, combined they have roughly 3 years of legal experience. While serving as Deputy Attorney General, Wes Duncan, solicited $100,000 in campaign contributions from businesses he regulated. Mr. Duncan’s ethically challenges are a concern.
Mr. Hansen not only has over 30 years of legal experience, but has pro-liberty sensibilities. His worked tirelessly with on the “Axe the Tax” and “Stop the Double-dipping” initiatives we worked on years ago. A good man who will make a great attorney general.
Liberty Watch endorses Joel Hansen for Attorney General
Nevada Supreme Court, Seat G
Lidia Stiglich
Mathew Harter
Incumbent Justice Lydia Stiglich – a gubernatorial appointee by Gov. Brian Sandoval – is a liberal judicial activist who cut her legal teeth in San Francisco. Her opponent, Mathew Harter, notes that as a district court judge Stiglich “issued an injunction stopping the layoff of public employees without any authority whatsoever to do so.”
Indeed, in a 7-0 unanimous decision the Nevada Supreme Court ruled that Stiglich had usurped power “reserved to the local government” on an issue “clear[ly] and unmistakably…not to be decided by the court.”
Harter, on the other hand, is a sitting District Court judge in the Family Division who believes judges should “follow the law and rules as plainly written.” He goes on to say that “as a conservative, I strive to also be a textualist in my decisions.”
Liberty Watch endorses Mathew Harter.
Nevada Supreme Court, Seat C
Elissa Cadish
Jerome Tao
After being blocked by Sen. Dean Heller from an appointment to the federal bench by President Obama, District Court Judge Elissa Cadish is now trying to graduate to the Nevada Supreme Court.
Heller blocked Cadish’s confirmation over her anti-Second Amendment positions, as detailed in a candidate questionnaire she submitted several years ago. In it Cadish stated that “reasonable restrictions may be imposed on gun ownership in the interest of public safety” and declared she does not believe there’s a constitutional right to keep and bear arms.
In a recent candidate forum, Cadish said her favorite Supreme Court justice was liberal activist Ruth Bader Ginsburg. On the other hand, her opponent, Judge Jerry Tao, describes himself as a conservative, strict-constructionist jurist in the mold of Antonin Scalia. He’s also been endorsed by the NRA.
Judge Tao is a former criminal prosecutor and a former District Court judge who currently serves on the Nevada Court of Appeals. He’s not only the most experienced judicial candidate on the ballot this year, he’s the best.
Liberty Watch proudly endorses Jerry Tao.
State Controller
Ron Knecht (Republican)
Catherine Byrne (Democrat)
Ron Knecht has done a great job as Controller, and Liberty Watch heartily endorses Ron. His 24-page Popular Annual Financial Report, available at the Nevada Controller’s website, is a great addition to the material responsible citizens should read before voting. His opponent is an activist Democrat running only to assuage her TDS.
It’s an easy pick – we endorse Ron Knecht for Controller.
Zach Conine (Democrat)
Bill Hoge (Independent American)
Bob Beers (Republican)
For Treasurer, we have the former legislator the Review Journal called “taxpayers best friend” back when the RJ mattered, Bob Beers, running against two guys who need a job. Beers has been a Nevada CPA for thirty years, and has been involved in the treasury function for several businesses, even more nonprofits, and even the state government (as a five-time member of the Carson City budget committees).
Liberty Watch proudly endorses Beers for Treasurer.
State Assembly, District 2
Jennie Sherwood (Democrat)
John Hambrick (RINO)
Hambrick has betrayed voters so many times we lost count, from supporting the largest tax increase in Nevada State History to supporting the Telsa tax credit debacle which has cost Nevada Taxpayers tens of millions of dollars.
Liberty Watch makes no endorsement in this race.
Selena Torres (Democrat)
Stephen Sedimeyer (Republican)
Liberty Watch endorses republican Stephen Sedimeyer
Robert Lystrup (Independent American)
Connie Munk (Democrat)
Richard McArthur (Republican)
Richard McArthur (Republican) McArthur was one of the few Republicans who stood up against the Roberson Commerce Tax and voted NO. He also opposed the issuing driver’s licenses to illegal aliens.
Liberty Watch Proudly endorses the solid conservative Richard McArthur
Brittney Miller (Democrat)
Jason Burke (Republican)
Burke who is a novice candidate for the Legislature, was removed from the ballot last month by Judge Jim Crockett, only to have the same Judge reverse his ruling October 8th. In his own words Burke testified he didn’t campaign.
State Assembly, District 8 Jason Frierson (Democrat) Tina Peetris (Republican)
Ms. Peetris supports maintaining the property tax cap, she wants to reallocate funding for Vocational Skills Education and allow Nevada parents School choice.
Liberty Watch endorses Republican Tina Peetris State Assembly, District 9
Steve Yeager (Democrat)
Linda Cannon (Republican)
Ms. Cannon is a Constitutionalist who believes in less government intervention and believes we need create a business environment that encourages business start-ups and she supports a well educated and well trained workforce.
Liberty Watch Proudly endorses Republican Linda Cannon
State Assembly, District 10
Jonathan Friedrich (Independent American)
Chris Brooks (Democrat)
Noel Searles (Republican)
Liberty Watch endorses Republican Noel Searles
Olivia Diaz (Democrat)
Gianna Miceli (Republican)
Liberty Watch endorses Republican Gianna Miceli
Mary Elizabeth Martinez (Independent American) Susan Martinez (Democrat)
Richard Fletcher (Republican)
Liberty Watch endorses Republican Richard Fletcher
Leonard Foster (Independent American)
Tom Roberts (Republican)
Liberty Watch endorses Republican Tom Roberts
State Assembly, District 15 Howard Watts III (Democrat) Stan Vaughn (Republican)
Mr. Vaughn is a perennial candidate who espouses various conspiracy theories.
Tyrone Thompson (Democrat)
Pat Little (Republican)
Ms. Little is committed to overhauling the educational system within Nevada, “With over 50% of the education budget being spent on administration, which is a massive waste, we need to cut the administration expenses and put that money where is belongs…the classroom.” “The current Assemblyman voted for the diasterous Silver State Health Exchange. Because of this mismanaged program, many people lost their insurance despite trying desperately to sign up. Others have had to endure rate increases that have left them with barely enough to survive I’ll fight to fix this broken program.
Liberty Watch proudly endorses conservative Republican Pat Little
Richard Carrillo (Democrat)
Matt Sadler (Republican)
Mr. Sadler views himself as a constitutional conservative, he believes the role of government should be narrow and focused, allowing for individual personal liberty.
Liberty Watch endorses Republican Matt Sadler
Chris Edwards (RINO)
Ellen Spiegel (Democrat)
Michael l. McDonald (Republican)
Liberty Watch makes no endorsement in this race
Ozzie Fumo (Democrat)
Cherlyn Arrington (Republican)
Ms. Arrington believes that ESA’s (Education Savings Accounts) should be funded, she’s opposed to raising property taxes and is a 2nd amendment advocate.
Liberty Watch endorses Republican Cherlyn Arrington
Kristee Watson (Democrat)
Mellisa Hardy (Republican)
Liberty Watch endorses Republican Melissa Hardy
Ralph Preta, (Independent American)
Glen Leavitt (Republican)
Mr. Leavitt is very proud of endorsements from the Nevada Swamp Creatures, which include Tax Hike Mike Roberson, John Hambrick, Mark Hutchison, Scott Hammond, Joe Hardy, Paul Anderson and Chris Edwards all who pushed thru the Largest Tax Increase in Nevada history.
State Assembly 25
Gregory John Shorts (Democrat)
Jill Tolles (RINO)
Ms. Tolles voted with the Democrats over 70% of the time, enough said.
June Joseph (Democrat)
Lisa Krasner (Republican)
Liberty Watch endorses Lisa Krasner
Lesley Cohen (Democrat)
Stephen Silberkraus (RINO)
Stephen Silberkraus voted for the Largest Tax increase in Nevada history.
Skip Daly (Democrat)
Jill Dickman (Republican)
Liberty Watch endorses Jill Dickman
Paula Povilaitis (Democrat)
Alexis Hansen (Republican)
Liberty Watch endorses Alexis Hansen
Liberty Watch endorses John Ellison (R)
Shannon Bilbray-Axelrod (Democrat)
Janice Wesen (Republican)
Liberty Watch endorses Republican Janice Wesen
Daniel Hofstein (Independent American)
Michelle Gorelow (Democrat)
David Schoen (Republican)
Dennis Hof (Republican)
Lesia Romanov (Democrat)
This race has proved to be the most entertaining, if not shocking, 2018 race in Nevada. In the GOP primary back in June, legal brothel owner Dennis Hof crushed incumbent Assemblyman James Oscarson, primarily over Oscarson’s vote in 2015 for the largest tax hike in Nevada history.
Republican elected officials should note for future reference that Republican voters chose a “pimp” over a tax hiker. In fact, with Oscarson’s loss 12 of the 13 Republicans in the Assembly who voted for the 2015 Sandoval tax hike have been ousted from office one way or another. Republicans, ye be warned!
Hof isn’t just a brothel owner. He’s an entrepreneur who owns dozens of other businesses – including gas stations, restaurants and bars – which employ hundreds of Nevadans throughout the state. He’s an unapologetic fiscal conservative who’s unafraid of expressing his opinions openly and directly – including with the media – and has signed the Taxpayer Protection Pledge.
His Democrat opponent, Lesia Romanov, is a career government employee working as a vice principal in one of the worst schools in the worst school district in the worst state in the country for education. Her solution to Nevada’s education woes, naturally, is to take more taxpayer money and flush it down the public school rat hole.
She has no idea how to create jobs in the private sector and would be a knee-jerk vote for every and any anti-business bill that would come before her.
Liberty Watch endorses Dennis Hof.
State Assembly District 38
Shea Backus (Democrat)
Jim Marchant (Republican)
Liberty Watch endorses Jim Marchant
Liberty Watch endorses Robin Titus (R)
Patricia Ackerman (Democrat)
Paul Cwalina (Libertarian)
Jim Wheeler (Republican)
Liberty Watch endorses Jim Wheeler
Al Kramer (Republican)
Autumn Zemke (Democrat)
Liberty Watch endorses Al Kramer
Sandra Jauregui (Democrat)
Paris Wade (Republican)
Liberty Watch endorses Paris Wade
Shall the Nevada Constitution be amended to: (1) remove existing provisions that require the Legislature to provide certain statutory rights for crime victims; and (2) adopt in their place certain expressly stated constitutional rights that crime victims may assert throughout the criminal or juvenile justice process?
Liberty Watch: Voters reading this question will wonder, “why is THIS needed?” Here at Liberty Watch we side with making government smaller. Here’s what you want to know, from the Secretary of State (SOS),
This ballot measure also would decrease public revenue because: (1) it entitles crime victims to full and timely restitution; and (2) it further provides that all monetary payments, money and property collected from a person ordered to pay such restitution must be applied first to pay all victims, which means that until all victims receive full and timely restitution, the State and local governments may not receive assessments, fees, fines, forfeitures and other charges that the person ordered to pay such restitution may legally owe to those governmental entities.
Restitution to victims instead of the state? Government revenue decreased? Sounds good to us.
Vote “yes” on Question 1.
Shall the Sales and Use Tax Act of 1955 be amended to provide an exemption from the taxes imposed by this Act on the gross receipts from the sale and the storage, use or other consumption of feminine hygiene products?
Liberty Watch: Reading the argument against Question 2 on the SOS website, this line jumped out, “Exempting feminine hygiene products from Nevada’s sales and use taxes will result in less revenue for the State and local governments, including school districts.”
This is a no-brainer. In fact all products should be exempt.
Shall Article 1 of the Nevada Constitution be amended to require the Legislature to provide by law for the establishment of an open, competitive retail electric energy market that prohibits the granting of monopolies and exclusive franchises for the generation of electricity?
Liberty Watch: This is the question everyone is talking about and all the money is being spent on. Big Casinos versus Berkshire Hathaway. The SOS explanation begins with,
This ballot measure proposes to amend the Nevada Constitution to require the Legislature to provide by law for an open, competitive retail electric energy market by July 1, 2023. The law passed by the legislature must include, but is not limited to, provisions that reduce costs to customers, protect against service disconnections and unfair practices, and prohibit the granting of monopolies and exclusive franchises for the generation of electricity. The law would not have to provide for the deregulation of the transmission or distribution of electricity.
It’s been said of other questions “this is a solution looking for a problem.” That applies here. Yes, if you’re a big energy user, you can cut a sweet deal with energy provider brand X. Meanwhile, if you are John Q. Citizen you have no bargaining power. Who knows, if this passes you may have to connect your power system to your pet hamster’s wheel and put your pet to work.
The ads favoring Question 3 show lots of pictures of solar panels, as if these hideous panes of glass can honestly provide enough energy to keep the lights on and, most importantly, air conditioners running. Solar power is horribly inefficient, as much as the green types tout its use. It’s uneconomic, that’s why it only survives on government subsidies.
For the average voter, the devil you know–the Public Utilities Commission–is better than rolling the dice.
Vote “No” on Question 3.
Shall Article 10 of the Nevada Constitution be amended to require the Legislature to provide by law for the exemption of durable medical equipment, oxygen delivery equipment, and mobility enhancing equipment prescribed for use by a licensed health care provider from any tax upon the sale, storage, use, or consumption of tangible personal property?
Liberty Watch: This Question is again a no-brainer. Taking away taxes is always good. The primary argument against is, “Sales taxes pay for a myriad of services Nevadans rely on including schools, police, fire departments, libraries, and parks, to name a few.”
We all know waste can be cut in all of those government monopoly services.
Shall Chapter 293 of the Nevada Revised Statutes be amended to establish a system that will automatically register an eligible person to vote, or update that person’s existing Nevada voter registration information, at the time the person applies to the Nevada Department of Motor Vehicles for the issuance or renewal of any type of driver’s license or identification card, or makes a request to change the address on such a license or identification card, unless the person affirmatively declines in writing?
Liberty Watch: What this question requires is “the Secretary of State, the Department of Motor Vehicles (DMV), and each county clerk to cooperatively establish a system that automatically registers to vote an eligible person when the person submits an application for the issuance or renewal of or change of address for any type of driver’s license or identification card issued by the DMV.”
A reasonable case can be made either way this question. However, the arguments against are more persuasive. Specifically, “The fundamental right of deciding whether one wishes to initiate voter registration belongs to the individual and not the government. Question 5 would change the ‘Opt In’ voter registration process at the Department of Motor Vehicles (DMV) to ‘Opt Out.’”
Shall Article 4 of the Nevada Constitution be amended to require, beginning in calendar year 2022, that all providers of electric utility services who sell electricity to retail customers for consumption in Nevada generate or acquire incrementally larger percentages of electricity from renewable energy resources so that by calendar year 2030 not less than 50 percent of the total amount of electricity sold by each provider to its retail customers in Nevada comes from renewable energy resources?
Liberty Watch: Oh brother. Here we go with the renewable (solar) nonsense again. Ask yourself, do you really care where your energy comes from? Just how much it costs, right?
Even pro-solar National Geographic admits, “Solar energy doesn’t work at night without a storage device such as a battery, and cloudy weather can make the technology unreliable during the day. Solar technologies are also very expensive and require a lot of land area to collect the sun’s energy at rates useful to lots of people.”
It is just not possible to achieve what this question demands without covering every inch of vacant desert with ugly solar panels and, more importantly, the burden being forced on taxpayers to support an uneconomic business.
Vote “No” on Question 6. LW
Liberty Watch Magazine 35 posts 0 comments
|
cc/2019-30/en_middle_0056.json.gz/line12267
|
__label__cc
| 0.608373
| 0.391627
|
Susan Gelman Receives the APS 2020 William James Fellow Award
Congratulations Susan!
The APS William James Fellow Award honors APS members for their lifetime of significant intellectual contributions to the basic science of psychology. The award is the highest honor conferred by the Association for Psychological Science. Susan was selected based on her amazing record of significant intellectual contributions to the basic science of psychology.
Faculty; Awards
Psychology; Susan Gelman
|
cc/2019-30/en_middle_0056.json.gz/line12276
|
__label__cc
| 0.708313
| 0.291687
|
Apple reveals flagship iPhone 5s with Touch ID, the world’s first and only 64-bit smartphone
Tuesday, September 10, 2013 2:37 pm Tuesday, September 10, 2013 109 Comments
Apple today announced iPhone 5s which features an all-new A7 chip, making iPhone 5s the world’s first smartphone with 64-bit desktop-class architecture for blazing fast performance in the palm of your hand. iPhone 5s redefines the best smartphone experience in the world with amazing new features all packed into a remarkable thin and light design, including an all-new 8 megapixel iSight camera with True Tone flash and introducing Touch ID, an innovative way to simply and securely unlock your phone with just the touch of a finger. iPhone 5s comes with iOS 7, the most significant iOS update since the original iPhone, engineered for 64-bit technology and featuring hundreds of great new features, including Control Center, Notification Center, improved Multitasking, AirDrop, enhanced Photos, Safari, Siri and iTunes Radio.
“iPhone 5s is the most forward-thinking smartphone in the world, delivering desktop class architecture in the palm of your hand,” said Philip Schiller, Apple’s senior vice president of Worldwide Marketing, in a statement. “iPhone 5s sets a new standard for smartphones, packed into its beautiful and refined design are breakthrough features that really matter to people, like Touch ID, a simple and secure way to unlock your phone with just a touch of your finger.”
The all-new A7 chip in iPhone 5s brings 64-bit desktop-class architecture to a smartphone for the first time. With up to twice the CPU and graphics performance, almost everything you do on iPhone 5s is faster and better than ever, from launching apps and editing photos to playing graphic-intensive games—all while delivering great battery life. Apple also engineered iOS 7 and all the built-in apps to maximize the performance of the A7 chip. iPhone 5s is the best mobile gaming device with access to hundreds of thousands of games from the App Store, the A7 chip’s 64-bit architecture and support for OpenGL ES version 3.0. iPhone 5s delivers incredibly rich and complex visual effects, previously only possible on Macs, PCs and gaming consoles.
Every iPhone 5s includes the new M7 motion coprocessor that gathers data from the accelerometer, gyroscope and compass to offload work from the A7 for improved power efficiency. Developers can also access new CoreMotion APIs that take advantage of M7, so they can create even better fitness and activity apps that go well beyond what other mobile devices offer. The M7 motion coprocessor continuously measures your motion data, even when the device is asleep, and saves battery life for pedometer or other fitness apps that use the accelerometer all day.
iPhone 5s introduces Touch ID, an innovative way to simply and securely unlock your iPhone with just the touch of a finger. Built into the home button, Touch ID uses a laser cut sapphire crystal, together with the capacitive touch sensor, to take a high-resolution image of your fingerprint and intelligently analyze it to provide accurate readings from any angle. Setting up Touch ID to recognize your fingerprint is easy, and every time you use it, it gets better. The Touch ID sensor recognizes the touch of a finger so the sensor is only activated when needed, preserving battery life. All fingerprint information is encrypted and stored securely in the Secure Enclave inside the A7 chip on the iPhone 5s; it’s never stored on Apple servers or backed up to iCloud. Touch ID can also be used as a secure way to approve purchases from the iTunes Store, App Store or iBooks Store.
Apple’s all-new iPhone 5s
iPhone 5s makes it even easier to take great photos with the world’s most popular camera. The all-new 8 megapixel iSight camera features a larger f/2.2 aperture and a new, larger sensor with 1.5μ pixels for better sensitivity and low-light performance, resulting in better pictures. These improvements, along with the Apple-designed image signal processor in the A7 chip and the new Camera app in iOS 7, provide up to two-times faster auto-focus, faster photo capture, automatic image and video stabilization, and better dynamic range. iPhone 5s introduces the new True Tone flash—the world’s first for any camera—that variably adjusts color and intensity for over 1,000 combinations, so photos taken with a flash appear more natural. iPhone 5s also includes a new Burst Mode, Slo-Mo video with 120 fps, a new FaceTime® HD camera for better low-light performance and audio-only FaceTime calls with iOS 7.
iPhone 5s features a remarkable thin and light, precision-crafted design that customers around the world love, including an anodized aluminum body with diamond cut chamfered edges, a stunning 4-inch Retina® display and glass inlays. iPhone 5s is available in three gorgeous metallic finishes including gold, silver and space gray. To complement iPhone 5s, Apple designed premium leather cases in six rich colors—beige, black, blue, brown, yellow and (RED)—with soft, color-matched microfiber lining.
iPhone 5s makes it even easier to connect to high-speed networks with support for up to 13 LTE¹ wireless bands, more than any other smartphone in the world. With download speeds up to 100 Mbps², you can browse, download and stream content even faster. iPhone 5s includes dual-band 802.11 a/b/g/n Wi-Fi support for up to 150 Mbps² and Bluetooth 4.0. iPhone 5s delivers an amazing 10 hours of talk time on 3G networks, up to 10 hours of web browsing on Wi-Fi and LTE networks and up to 8 hours on 3G networks, and up to 10 hours of video playback and up to 40 hours of audio playback.³
iPhone 5s comes with iOS 7, the most significant iOS update since the original iPhone, engineered to support the A7 chip’s 64-bit architecture, the new iSight camera and Touch ID fingerprint sensor. iOS 7 features a stunning new user interface, completely redesigned with an elegant color palette, distinct, functional layers and subtle motion that make it feel more alive. iOS 7 has hundreds of great new features, including Control Center, Notification Center, improved Multitasking, AirDrop, enhanced Photos, Safari, Siri and introduces iTunes Radio, a free Internet radio service based on the music you listen to on iTunes®.⁴
iPhone 5s customers have access to the revolutionary App Store, which offers more than 900,000 apps to iPhone, iPad and iPod touch users in 155 countries around the world. More than 50 billion apps have been downloaded from the App Store to date, offering customers an incredible range of apps in 23 categories, including newspapers and magazines in Newsstand, games and entertainment, business, news, sports, health and fitness and travel.
Designed specifically for iOS, iPhoto, iMovie, Pages, Numbers and Keynote are among the most popular apps in the App Store and are now available as free downloads with the purchase of iPhone 5s. iPhoto and iMovie enable you to do more than you ever thought possible with your photos and movies, and with Pages, Numbers and Keynote you can create, edit and share stunning documents, spreadsheets and presentations on your iPhone, iPad or iPod touch.
iPhone 5s comes in gold, silver or space gray, and will be available in the US for a suggested retail price of $199 (US) for the 16GB model and $299 (US) for the 32GB model and $399 (US) for the 64GB model.⁵ iPhone 5s will be available from the Apple Online Store, Apple’s retail stores, and through AT&T, Sprint, T-Mobile, Verizon Wireless and select Apple Authorized Resellers. iPhone 5s cases will be available in beige, black, blue, brown, yellow and (RED) for a suggested retail price of $39 (US) through the Apple Online Store, Apple’s retail stores and select Authorized Apple Resellers. iPhone 5s will be available in the US, Australia, Canada, China, France, Germany, Hong Kong, Japan, Puerto Rico, Singapore and the UK on Friday, September 20. A new iPhone 4S 8GB model will also be available for free.⁵ iOS 7 will be available as a free software update starting on Wednesday, September 18 for iPhone 4 and later, iPad 2 and later, iPad mini and iPod touch (fifth generation). Some features may not be available on all products.
¹ LTE is available through select carriers. Network speeds are dependent on carrier networks, check with your carrier for details.
² Based on theoretical speeds, actual speeds may vary.
³ Battery life depends on device settings, usage and other factors. Actual results vary.
⁴ iTunes Radio will be available with the launch of iOS 7 in the US.
⁵ For qualified customers.
Source: Apple Inc.
trondude
Tuesday, September 10, 2013 at 2:39 pm
Now lets see how long it will take Samdung to copy it….
montex
I can almost hear Samsung beating their copy-slaves from here. Copy faster! Copy faster!
I think they’re too busy being sued by Dyson.
Jubei
Haha…I wish! Watch Dyson win easily and close the case while the US Justice system continue to drag their feet on Apple.
1Racer
Not true. Samsung is a very big company. Now that their R&D team (Apple) has shown them what to produce they will have a product out by Christmas – the Galaxy S5 ID Extreme now with the largest screen and battery every put into a smartphone.
spyintheskyuk
With a watch strap of course
Samdung COPY apple?
You gotta be kidding me! I expect a lawsuit showing Samdung had all this in the lab years ago 😉
By the time the Samesung clone appears Apple will have touch sensors on their entire product line, top to bottom before the holiday shopping season.
Just my guess.
A limiting factor will be how quickly a competing 64-bit CPU will be developed and second, how quickly Google responds with a 64-bit version of Android (a version of which I believe will be called “Sugar-induced tooth decay”).
If 64-bit on the iPhone will be of interest to game developers, that same A7 CPU on the next iPad will entice developers of business, finance and scientific apps. That is a shot at Microsoft, and leads me to wonder what iWork for iOS will soon become.
Increasingly, my iPad is important as a business tool, especially now that I am trying out Parallels Access. In its own right, the portability and power of my iPad and iOS make it more suitable every day for a work computing device. The A7 will make future iPads even more so.
It will be fun to play with the new iPhone 5S. I am quite impressed at what it can do. And it makes me anticipate what it will do soon, with enhanced apps that will be forthcoming.
Agreed. This is the advantage Apple has by making the hardware, software and designing it’s own chips. I can’t wait for the benchmark numbers to come in.
thethirdshoe
Finding some other finger print reader technology, that actually works all the time, to include in a portable device, WILL NOT be easy.
“64-bit desktop-class architecture”
Intel is so close to being dumped.
ramiuseng
To me the news is Mac Pro delayed yet again but here, have a phone whose data paths are just wide but useless for your research.
How delayed? They stated at WWDC that the Mac Pro would be available this Fall. We are in the first couple of weeks of Fall. It should be obvious that the Mac Pro won’t be available until Mavericks is released.
macnut222
Technically, we’re not even in fall yet.
Yes I know, I know. But if Labor Day is the unofficial end of Summer, it is also the unofficial beginning of Fall. That was my point of reference without getting all “Farmers Almanac” on everyone.
Jonahan
Actually we aren’t even into fall yet. That doesn’t start until September 22nd.
GoeB
Look at your calendar, again. 🙂
Right, I think the A7 (well, before I though of the A6) chip was the perfect companion for a desktop chip to speed up Video and Audio rendering.
the chip in the iPad already outperform video rendering in the 2012 iMac.
They definitively should put a AX chip as a Co-Processor in the MacPro and also the “Touch-ID” reader in all apple products.
KingMel
Tuesday, September 10, 2013 at 10:37 pm
The Mac Pro is *not* delayed!
John C. Randolph
I wouldn’t hold my breath for that. We might see Mac laptops based on this new 64-bit A series, since battery life is a paramount concern for portables, but I don’t see Apple giving up on Intel for the iMac and Mac Pro anytime soon.
-jcr
Danox
But Apple will get rid of Intel in the next five years.
Possibly but I consider 5 years to be an eternity in computing time.
macman1984
64 bit- who f’ing cares? I do NOT need 64 bit on my phone!! I need a bigger screen with longer battery life and MUCH lower price. What planet are they on? Samsung is going to wipe the floor with them (market share-wise). Sad. It didn’t have to be this way…
macdonaldsman1984
Please just buy yourself a hamstrung POS (or add another to the ones you have) and be happy with your lot.
Moronman1384,
What you Need is to go away… 😛
MacMan, please ignore the juvenile screamers here on the forum.
You are not alone in seeking greater hardware options from Apple. Now finally Apple seems to be offering more diverse handsets, albeit not exactly what you hoped to see. But Apple has offered part of what you were seeking: the iPhone 5C has a tiny bit better battery life than the prior models. It makes sense to try it out before resigning yourself to a life of misery on an Android device.
Next year, it’s highly likely that Apple will follow up with bigger screens. Older people who carry their phones in purses seem to really like fat phones, so Apple really has no choice but to get on the bandwagon at some point.
Nearly everyone wants more options from Apple, but most of us do not repeatedly whine and cry doom and gloom. Nearly all of the mobile device goodness that you all enjoy are the direct result of Apple innovation with the iPod, iPhone, and iPad. And now, a few years later, there are millions of armchair quarterbacks dissing Apple and threatening to buy products from the shameless friggin’ copier Samsung. It sickens me. Just go buy your damn Android phones and get the hell off of this forum!
TheWatchfulOne
So what? Apple is the profit share leader. And profit share is more important than market share.
Tiffany D.
Saturday, September 14, 2013 at 12:07 pm
Amen, Macman, I do not want or need more cpu. I do want and need more battery life. And size matters – give me a smaller or larger phone but do not assume that the iphone 5/5c/5s form factor has it nailed – feels like crap in my hand. Too bad samsung tablets no longer have voice. Carriers must love having two plans for every customer!
Wow?!?
I’m going to go broke again, but I love it!
sophonik
Who said only 31% CPU increased performance, i think it was arstechnica that said that…
That slide looked more like upto 100% increased performance to me.
ivid
I’m underwhelmed but I need one anyway, my iPhone 4 is damaged so may as well get the latest model. I’m disapointed with the event, where are the new iPads ?
ivid, vote with your money. My iphone 4s wifi died, so the battery got sucked down by that bug and would not last a day. Now, if I give apple more business after that fiasco caused by their useless/superficial updates, well I’d be telling them to keep up that kind of work. No can do. I now have a WP 41mp nokia with xenon flash. Pretty damn sure all the software in the world can’t make a 5s camera go toe to toe with that, no matter how many tones the leds can put out. Also, the email and speech on wp is actually way better/more professional than the iphone. If you are an appaholic, however, ios has the market.
Abrey
Anybody know why there is no 128GB model? This is now the fourth iPhone that maxes out at 64GB storage capacity.
They were too busy making colourful plastic cases, and upgrading that processor to 64-bit.
I’ve complained that 32 GB should’ve been the baseline for the premium model. I knew that wouldn’t happen the moment they said the 32 GB iPhone 5C would be $199.
16 GB was the baseline *4 years ago*. With some apps over 1 GB and increased photo/video capture features, a 16 GB start is inadequate.
I just wrote to Tim Cook about how upset I am at no 128GB option. I encourage others to do the same. I am constantly having to clear space DAILY – deleting apps, music, photos, videos etc. — on my 64GB 4S. I don’t see any reason to upgrade to a new model that will be as annoying to use in terms of daily storage management.
twodales
Complete bullshit.
Uh, no it isn’t. I went from a 160Gb iPhone to a 64GB phone. I also have 6 years of iPhone photos on the phone (and go back to look at old ones all the time) not to mention a need to have Sesame Street episodes and apps for my 4 year old, space to shoot family videos on trips. Almost any time I want to do something I have to trade-off and delete a hell of a lot of things. Another 64GB would solve my problems — for a couple years. And then I will expect a 256GB phone. What’s bullshit is going 4 years without a storage upgrade!!!!!!
What would solve your problems would be a computer. There is 0 need for 6 years of pictures on a phone.
Get a terabyte wifi drive
If you are saving six years of photos on your phone without a backup on a computer you need serious help. Complete bullshit.
Give it a year. 😉
Champagne would look nicer with black than white. Too bad.
I love Apple
Disappointing. I guess Tim will be fired by the board still this year. One year of no product release, and then these little updates, ridiculous. Too little, too late. It is a sad, sad day for me as a guy who loves Apple products. Apple needs a new CEO.
Thryll
What exactly were you expecting?
Seriously, this was definitely an iPhone event. You’ll get your Mac and iPad events soon enough. Cook said there would be several product refreshes in the Fall. The fall has just begun.
At least a better resolution camera (yes, resolution matters!) and a 128 GB model. The iPhone 5 has a camera way behind the competition, just compare to Lumia 1020. It’s a huge difference. I wish, Apple would have something like this since I never want a windows phone. If the 5s camera is a little better than the 5, it does not really matter.
And at best some “one more thing” – new versions of Pages and Numbers, or a sign of an iPhone with a bigger display. Something what is not only a bureaucratic execution of an existing product line moving on in small steps. I so very much hate to say that Apple has lost it’s way.
Was trying to pin down who you’re trolling for… now I know.
Ralph M
No, you tool, resolution doesn’t matter – at least not north of 8 megapixels. It is physically impossible to hold the phone/camera steady enough to keep from blurring the tiny pixels in a camera like the one in the 1020. In the meantime, those absurdly small pixel wells are incredibly inefficient and a great source of read noise. But you are clearly ignorant of these and a great many other technical factors that affect picture quality. Fortunately, Apple is not.
“At least a better resolution camera (yes, resolution matters!) ”
Not necessarily, the larger sensor really make a bigger difference.
More light captured is better, and more light is really needed because you do not sound too bright… 😎
If you knew anything at all about digital cameras, then you’d know that pixel-count isn’t important, in fact when it comes to the tiny chips used in phones, where the focal-length is microscopic, the more pixels you cram in, the greater the digital noise. Nikon know this; there’s a 22Mp version of the D3, intended for studio use, because the 18Mp full-frame chip, having larger pixels, has much better low-light capability, going down to ISO 128,000.
But you haven’t got a clue what you’re talking about, have you?
FYI, the iPhone 5 has a Sony camera in it, which Sony considered to be the best they could make…
Quit the BS…the Lumia camera makes it a fat lump. It is largely a desperate design gimmick intended to attract attention.when your image sensor already has 8MP, improving image quality is far more important than adding pixels. Besides, adding pixels degrades low light performance and adds noise unless you also increase the size of the sensor and optics. The 5S is impressive, as is iOS 7. Your exaggerated doom and gloom is ridiculously overstated.
jwt1935
You’ve got to be kidding!!
I remember when 4s is introduce, the only new stuff is Siri, but it still sell like hot cakes!
These are the great products Cook talked about coming down the pipeline this fall? Let’s see, a new colourful iPhone with roughly the same internals as the iPhone 5. A champagne coloured iPhone with a finger print sensor (for those of us who work in the clandestine services or are too lazy to enter a password) and a 64-bit processor (looking forward to Angy Bird HD²) .
This announcement was exactly as expected, there will be more announcements this year. What were you expecting, a teleportation device?
A larger screen and higher MP camera.
A larger screen was not expected even by the hyper rumor mills. I’m not camera expert, but it looks like the new model will do better indoors and in low light, so it seems fine to me.
A larger screen will arrive in iphone 6. This is a “S” upgrade.
Fall Technically starts on September 22 for the United States & Canada, so really…these new product offerings are pre-fall. There is still plenty of time for some great products to be released between 9/22-12/21.
Leave a Reply to Paul Cancel reply
Tags: 64-bit, 64-bit smartphone, Apple A7, iPhone 5S
iOS 13/iPadOS security beta identified, Apple informed
Tuesday, July 16, 2019 6:54 am No Comments
This won’t be a problem when the iOS ships – finding things like this is what beta testing is for…
Hackintosh will challenge the might of Apple’s new Mac Pro
The best iPhone accessories on sale for Prime Day 2019
|
cc/2019-30/en_middle_0056.json.gz/line12281
|
__label__wiki
| 0.603502
| 0.603502
|
Russian tech giant dashes hopes for smartphone
personality, Tech, World Bank
Yandex instead announced a new smart speaker that uses the voice of “Alisa”—a virtual assistant similar to Amazon’s Alexa
Russian internet giant Yandex disappointed tech enthusiasts on Monday by failing to unveil what many hoped would be a highly anticipated Russian-made smartphone.
Speculation has been mounting for years that Yandex—which dominates internet services in Russia—will put forward its own mobile device to rival giants like Apple, Samsung and Huawei.
Excitement reached fever pitch when Yandex announced it would be holding a presentation at its glossy Moscow headquarters, with Russian media reports anticipating a smartphone launch that would be a major step for the company.
But Yandex instead announced a new smart speaker that uses the voice of “Alisa”—a virtual assistant similar to Amazon’s Alexa—that will cost around 40 euros.
Asked by disappointed journalists about the potential smartphone, Yandex representatives said only: “We are not commenting on this question.”
Yandex started in the 1990s as a search engine similar to Google but has since expanded into every corner of the Russian internet, developing maps, taxi and food order apps that Russians use every day.
A Russian-designed smartphone—the YotaPhone—was launched in 2013 but has failed to catch on and tech observers have been waiting anxiously for Yandex to jump into the field.
Tom Morrod, research director at IHS Markit, said that once Yandex does enter the market it will likely be with a mid-range option aimed at supporting its services.
“Non-hardware companies are often happy to take a mid-market position, without hoping to make money. Yandex’s smartphone would likely run on Android but they would put their own environment on it, with all their apps that you probably will not be able to delete,” he said.
“It’s about getting people locked into their ecosystem, collect data and advertise,” he added.
Read more at: https://phys.org/news/2018-11-russian-tech-giant-dashes-smartphone.html#jCp
December 7, 2018 December 7, 2018 Don Michael Adeniji Tagged Android, Mobile, Phones, Russia, Yandex Leave a comment
← Okorocha hits Oshiomhole for abusing Obasanjo
Uber cedes control in Russian market with Yandex tie-up →
|
cc/2019-30/en_middle_0056.json.gz/line12284
|
__label__cc
| 0.557656
| 0.442344
|
LJX Tree Surgeons
Tree Felling & Removal
Emergency Tree Services
Firewood Logs
Biomass Chipping Service
Site Clearance Works
Tree & Vegetation Management
24hr Call Out
We offer an extensive tree stump removal service throughout Glasgow, Edinburgh and Central Scotland. Call 01505 873 347.
Tree Stump Removal – Glasgow, Edinburgh and Central Scotland
Stump Grinding is often the last stage of permanent tree removal. After trees have been felled, you will no doubt have been left with an unsightly, ground level stump. If this is not an issue for you, it can be left in the ground but may cause problems in the future. These problems include the likes of root diseases and fungi such as honey fungus. Suckering can also occur and is when new shoots grow from the stump if it’s still alive.
Tree Stump Removal is carried out by a machine which can fit through a standard 1.2m gate and grinds to a depth of 20-40cm below ground level. This enables you to re-plant, re-landscape or for building work to take place over the specified area.
Where access is better we also have much larger stump grinding machines available.
HEAD OFFICE:01505 873 347
GLASGOW:0141 474 3334
EDINBURGH:0131 358 1998
Contact us for a free quote
Firewood and Wood Fuel
Head Office: 01505 873 347
Glasgow Office: 0141 474 3334
Edinburgh Office: 0131 358 1998
Copyright © 2019 LJX Ltd. All rights reserved.
VAT number: 977 0770 79 | Company number: SC344512
This website uses cookies to distinguish you from other users of the website. This helps us to provide you with a good experience when you browse our website and also allows us to improve the website.
By accepting cookies, you are agreeing to our use of cookies as set out by this policy.
1. Information About Cookies
A cookie is a small file of letters and numbers that, if you agree to their use, is stored on your browser or the hard drive of your computer or device. They contain information that is transferred to your hard drive.
The cookies that we could use can be split into the following categories:
These are cookies that are required for the operation of the website. They include, for example, cookies that enable you to log into parts of the website.
These cookies allow us to recognise and count the number of visitors to the website and to see how they move around within the website when they are using it. This helps us to improve the way the website works, for example, by ensuring that users are finding what they are looking for easily.
These are used to recognise you when you return to the website. This enables us to personalise our content for you, greet you by name and remember your preferences (for example, your choice of language or region).
These cookies record your visit to the website, the pages you have visited and the links you have followed. We may share this information with third parties (see our Privacy Policy for more information on how we use information we collect from you).
2. The cookies we use
We use the following cookies:
Website Functionality Cookies (If Users log into the site).
Please note that third parties (including, for example, advertising networks and providers of external services like web traffic analysis services) may also use cookies, over which we have no control. These cookies are likely to be analytical/performance cookies or targeting cookies.
3. How you can block cookies
You will be prompted on entering the site with the option to accept or decline cookies being stored. You will also have the option to change your mind on this while using the website.
Please be aware that blocking cookies may affect your ability to use the website. In particular, you may not be able to access all or parts of the website or use the functionalities contained on it.
|
cc/2019-30/en_middle_0056.json.gz/line12285
|
__label__cc
| 0.540693
| 0.459307
|
IDE Toolbox: 70+ IDEs for Developers
By Daksh Sharma 2007-11-17 17:58:02 UTC
For developing cool applications you need an Integrated Development Environment, also called an IDE. Here's our list of 70+ IDEs for developers and all our geek readers who like to try their hands at coding.
Enjoy and Don’t forget to check out our post where you can suggest future toolbox topics!
Anjuta C/C++ IDE - A dynamic C/C++ IDE with features including project management, interactive debugger and an editor for browsing and syntax highlighting. Runs on POSIX (Linux/BSD/UNIX-like OSes), Linux.
BVRDE - A C/C++ Integrated Development Environment (IDE) primarily designed for easy cross-platform development. It allows a developer to compile applications on a remote server easily. Runs on a Windows platform but debugging and compiling is on UNIX systems.
C-Free - C-Free is a professional IDE offering support for multiple compilers including Cygwin, Borland C++ Compiler, Microsoft C+ Compiler, Open Watcom and Digital Mars.
Code::Blocks - A free C++ IDE based on the plug-ins. It works on Windows and Linux.
CPPIDE - A complete integrated development environment for C/C++ environment with a source code editor, compiler and debugger.
c.vim - c.Vim is a C/C++ IDE that enables easy coding and execution of programs.
Dev-C++ - A feature-packed IDE for Windows and POSIX (Linux/BSD/Unix).
Developers IDE - Developers IDE is an Integrated Development Environment (Code Editor) to use Dos based free C/C++ Compilers in a windows environment.
KDevelop - A C/C++ IDE for UNIX under the GPL license.
MinGW Developer Studio - MinGw is a C/C++ IDE ported to Microsoft Windows, Linux and FreeBSD.
Paradigm C++ Professional integrated development environment - A comprehensive solution for writing C/C++ code for real mode, extended mode, or protected mode x86 applications in an easy way.
Quincy 2005 - Quincy is an open-source IDE for developing applications on the C/C++ framework.
Rhide - An IDE for developing and debugging C/C++ applications in DJGPP GNU/Linux.
The V IDE for GNU C++ and Java - A free multi-platform C++ framework for writing GUI applications for X Athena, X Motif/Lesstif and all Windows platforms.
UEStudio IDE - UEStudio is a powerful IDE built on the powerful editor UltraEdit. It includes the features of 30 popular compilers (including Microsoft Visual C++, Java, GNU C/C++, PHP, Perl and over 30 etc).
BlueJ Java IDE - A Java IDE packed with built-in editor, compiler, virtual machine and debugger for executing programs in Java. Includes a graphical class structure display, provides support for graphical and textual editing, enables the creation of interactive objects, interactive testing and incremental application building.
DrJava Java IDE - An IDE released under the GNU GPL that enables users to evaluate Java expressions.
Eclipse - A widely used open source IDE for Java. Requires the user to install the Sun Java runtime environment (JRE) installed. The IDE supports Windows XP, Windows 2000, Windows 98, Windows ME, Linux, Solaris, QNX, AIX, HP-UX, Mac OS X, and possibly other systems as well.
Gel - A Windows IDE with special features including syntax highlighting (Java, JSP, HTML, XML, C, C++, Perl, Python, etc), unlimited undo and redo of code, column selection mode, block indent and unindent, spell checker, enhanced search option, spell checking, auto indent, regular expression searches, code completion (Java and JSP), parameter hints, identifier hints, context sensitive help linked to Javadoc.
Javelin from Step Ahead SW - A highly productive Java IDE for Windows. It enables users to visualize application development in Java through a set of class diagrams.
JBuilder - A popular commercial IDE for developing applications in Java. The enterprise edition includes J2EE support and UML/ app server integration.
JCreator Java IDE LE (Light Edition) - Jcreator is a compact and light-weight Java IDE for Windows environment with Project Management support, a syntax highlighting editor, wizards, class viewer, package viewer, tabbed documents, JDK profiles (which enables users to work with multiple Java Development Kits). It comes in two editions JCreator Standard which is free of cost and JCreator Pro which comes with a 30 day trial.
JEdit - A highly customizable well-designed IDE written in Java.
jGRASP - A compact development environment for Java. It runs on all platforms with a Java Virtual Machine producing Control Structure Diagrams (CSDs) for Java, C, C++, Objective-C, Ada, and VHDL.
JIPE Java IDE - A free IDE for Java allowing programmers to write and test Java applications and applets. It runs on both Windows and Linux and is easily portable to operating systems that have Java Virtual Machine installed.
JPad Pro - Jpad Pro is a low-cost Java editor featuring visual debugger, code completion, and source browser.
IBM Rational Application Developer - A powerful Java IDE for Windows and Linux. It is very strong for JSP, servlets and other J2EE development.
IDEA - An intelligent Java IDE with improved performance, better usability and streamline project configuration. It is a commercial IDE and is available for a 30-day evaluation period. The commercial license can be acquired at a cost of $499.
NetBeans - An open source Java IDE with a syntax highlighting code editor that provides support for auto code completion, annotations, macros, auto-indentation, etc. It also includes visual design tools (wizards) for generation of code.
Oracle JDeveloper - JDeveloper from Oracle is a powerful IDE with J2EE capabilities (including EJB and Struts) and support for Oracle database access.
SlickEdit - SlickEdit is a proprietary, multilanguage IDE with a powerful editor and macro language. It supports all of the most popular programming languages.
Sun Java Studio - An intuitive development environment from Sun Development Environment (IDE) for Java, providing a comprehensive set of features and functionality. It runs on MacOS, Windows and Solaris.
Stylus Studio - An integrated JAVA IDE that enables quick development of XML-enabled Java / J2EE applications.
UltraStudio - UltraStudio is a feature rich text editor for HTML, PHP, Java, Javascript and Perl. It also includes an Integrated Debugger, Integrated VCS Version Control, built-in Class Browsing, Language Intelligence (like Intellisense), Project Converter and other features.
Visual Paradigm Integrated Development Environment (VP-JIDE) - Visual Paradigm Integrated Development Environment for Java programmers/developers enables users to write/compile/run/deploy Java applications/applets with supporting features like project management, class and method navigation, syntax highlight and code completion to enhance productivity.
XEmacs - XEmacs is a free, highly customizable open source text editor and application development system. A modern, GUI version of the original Emacs.
#Develop - An open source IDE for application development in .NET
Antechinus - A visual editor for designing C# applications. Its common features include basic intellisense and syntax coloring, as well as the option of completing applications from within the IDE. Available for $49.95.
ASP.NET Web Matrix - Web Matrix is a .NET WYSIWYG development tool supported by the community. The download size is small and is approximately 1.3MB in size. Available for free.
PrimalScript - A product of Sapient, PrimalScript is a script level IDE code development tool.
SharpDevelop - An open source development IDE for the .NET environment; similar in appearance to Visual Studio .NET.
Visual Studio .NET - A feature rich Integrated Development Environment for .NET based applications. Provides various options to simplify application development.
EPIC - An open source Perl IDE for the Eclipse platform. Its features are syntax highlighting, on-the-fly syntax check, content assist, Perl doc support, source formatter, templating support and a Perl debugger.
PerlBuilder - Perl Builder is a Windows based IDE for developing applications through Perl. The licensed version is available for $199.
PerlComposer - An open-source GUI tool used to design graphical interfaces for X-windows using Perl/GTK
Perl Editor - Perl Editor enables developers to create, test and debug Perl scripts on Windows tools.
Perl Express - A free Perl IDE for the Windows environment targeted towards experienced and professional developers and beginners.
Open Perl IDE – An open source integrated development environment for writing and debugging Perl scripts on any version of Windows.
OptiPerl - A fully integrated visual IDE for creating, testing, debugging and running Perl scripts either directly or via HTML documents.
Zeus - A Windows IDE with multi-programming language support. It provides support for C#, Ch, D, Java, Perl, Python, PHP just to name a few.
Dev-PHP - Dev-PHP is a fully featured development IDE for PHP. It is open-source, runs on windows and features: class browser, scripts preview, integration with PHP parsers, PHP-GTK library, and Xdebug of course.
Eclipse PHP IDE - An open source PHP IDE project from Eclipse.
Komodo IDE - A multi-platform, multi-language powerful IDE for developing dynamic web applications with a rich feature set for client-side Ajax technologies such as CSS, HTML, JavaScript and XML and advanced support for Perl, PHP etc.
Nexidion Designer - An IDE for web development on the Linux platform.
NuSphere PhpED - A popular development environment for PHP with a fully-functional two weeks trial. Its advanced features include code folding, true unicode editor, fast SFTP, SSH terminal, database client, embedded mozilla browser, inline error analysis for PHP and validation for HTML.
phpDesigner - A complete PHP integrated development environment for both beginners and professional developers that boosts the process of editing, analysis, debugging and publishing PHP powered applications and websites. Single user license is available for $56.25 and the 14 day trial version enables the user to evaluate the software without any license.
PHPEdit - A professional IDE for PHP with advanced php related tools, powerful debugger and profiler, code beautifier, help integration, real time syntax checker and advanced keyboard templates.
Zend IDE - A powerful PHP IDE for creating rich web applications. Provides PHP, Java and JavaScript support.
BlackAdder - BlackAdder is a cross-platform IDE for developing GUI applications in Python. The free demonstration version is available with limited functionality.
Boa Constructor - An open-source cross-platform Python IDE. Includes an advanced debugger, visual frame creation, multiple source views.
Eric - A full featured Python IDE based on the cross platform Qt GUI toolkit.
IDLE - Features include attribute completion, syntax checking, debugger etc.
SPE IDE - SPE IDE is a free python IDE for Windows, Mac & Linux with UML, PyChecker, Debugger, GUI design, Blender.
Wing IDE - An advanced level Python IDE with support for web, GUI and scrip development through various Python packages like Django, Turbogears, mod_python, wxPython, PyQt, PyGtk, TkInter.
xRope - An open source Python IDE for Linux/Mac OS X platforms.
Arachno Ruby - A commercial cross-platform IDE for Windows available at a price of $49. The powerful IDE features an integrated debugger to save time.
FreeRIDE - A fully featured open-source cross-platform IDE for the Ruby programming language. Also works with Debian and Unix operating systems.
Mondrian - A cross-platform Ruby IDE with an intuitive look and feel. It includes a dynamic object browser, runtime error integration and syntax highlighting
RadRails - RadRails is available as an open-source plug-in for Eclipse and as a stand alone application. Its advanced features include fast server debugging, code completion with type inferencing, CSS/HTML/JS code editors etc.
RDT - An open source Ruby IDE for Eclipse platform with features such as syntax highlighting, syntax check, graphical outline.
40+ Free One-Column Website Templates
40+ Ways To Access Your Computer Remotely
50 Great Widgets For Your Blog
40+ Tools For Google Calendar
15 Ways To Create Website Screenshots
50+ Google Reader Extensions and Scripts For Firefox
WEB OS RUNDOWN: 45+ Web Operating Systems
AMAZON TOOLBOX: 40+ Amazon Tools
30+ Language Tools For Firefox
SKYPE TOOLBOX: 50+ Enhancements for Skype
MOBILE PRODUCTIVITY TOOLBOX: 45+ Mobile Productivity Resources
MORE THAN A BROWSER: 19 Alternative Ways to Use Firefox
FORUMS GUIDE: 70+ Resources for Creating a Forum
VOIP TOOLBOX: 30+ VoIP Services
P2P TOOLBOX: 30+ Peer to Peer Services
DIGG TOOLBOX: 50+ Digg Tools and Resources
WORDPRESS GOD:300+ Tools for Running Your WordPress Blog
GREEN LIVING TOOLBOX: 80+ Green Sites
Travel Toolbox: 75+ Online Travel Resources
ITUNES TOOLBOX: 30+ Tools For iTunes
COLLEGE TOOLBOX: 60+ Tools For Back To School
ONLINE PRESENTATIONS: 30+ Presentation & Slideshow Services
GMAIL TOOLBOX: 60+ Tools For Gmail
30+ WordPress 2-Column Themes
ONLINE BUSINESS TOOLBOX: 230+ Tools for Running a Business Online
30+ Tools to Turn Wordpress into a Personal Hub
SHOPPING SPREE: 18 Sites for Social Shopping & Deals
SOCIAL BOOKMARKING: 50+ Social Bookmarking Sites
|
cc/2019-30/en_middle_0056.json.gz/line12297
|
__label__wiki
| 0.967917
| 0.967917
|
More Tesla vehicles are on the way — in 2020, probably
A Tesla Semi is one of several new Tesla vehicles apparently on the way.
We last heard about the Model Y crossover mid-size SUV car last year and it sounded like it was going to be revealed sooner rather than later.
Well in true Musk fashion, it's looking like later. But not too much later.
SEE ALSO: Elon Musk teases 'Model Y,' says it's coming in a few years
During Wednesday's fourth-quarter earnings call, Musk shared more about the newest electric car to complement the Model S, X, and 3 cars. He said it should be here by the end of 2020.
The Y is apparently completed, designed out, and shares 75 percent of its build and design with the Model 3, so it should be easier to ramp up, Musk said.
Production is likely going to start early next year at the main Gigafactory in Nevada, he added.
It may be similar to the Model 3, but Musk said to expect 50 percent higher cost — even double. In this, it'll be something more aligned with the Model X SUV's pricing.
Speaking of the Model X, Musk had a moment reflecting on his original SUV, "It's an incredible car," he said. But then with a laugh, "Nothing like it will ever be made again and maybe it shouldn't."
Musk also divulged some hope for a summer unveiling of a Tesla pickup truck, which Musk praised as "unique." As we saw with the Model 3 unveiling, it could be some time for the truck to make it to production and into driveways.
If you take @elonmusk on his word he says a $TSLA pick-up truck could be unveiled this summer. "It'll be something quite unique, unlike anything else." #teslaearnings
— Sasha Lekach (@sashajol) January 30, 2019
The electric Tesla Semi could also be here in 2020, after Tesla itself uses the electric trucks for deliveries and its own needs.
WATCH: Elon Musk opens up about the toll Tesla takes on him
Topics: electric vehicles, Elon Musk, model-y, pickup, semi, Tech, Tesla, Transportation
|
cc/2019-30/en_middle_0056.json.gz/line12298
|
__label__cc
| 0.645602
| 0.354398
|
Download Beach Radio App
Beach Radio on Alexa
Become A Beachcomber
Tommy Lynch
Preferred Company
Bob O'Brien
The Lighter Side of Finance
The Financial Physician
The Hero Whispers
Painless with Dr. Gabriele Jasper
Retirement & Income Radio
House of Cards®
Scrubbing Up with Dr. Michael Kachmar
Shore Sports Network
Download The Beach Radio App
Beach Bulletin Board
Beachcombers Support
Beach Radio Beach Report
Trouble Hearing Beach Radio?
The Beach Morning Show with Tommy LynchThe Beach Morning Show with Tommy Lynch
How caregivers can best handle Christmas with a loved one who has Dementia
Ryan McVay, ThinkStock
The Christmas season is one filled with fun and excitement but there's also some stressful moments, especially for caregivers looking out for a loved one with dementia.
Many long standing traditions will be able to continue this year, but some may have to be altered or eliminated to make this Christmas happy for everyone...after-all it is the season of giving...giving of yourself for the happiness of others.
Ken Zaentz, President and CEO of Alzheimer's New Jersey says it's about making things better for that loved one with dementia.
"Families obviously want their loved one to be apart of the holiday celebration and in many ways they can be but the celebration can't necessarily be the way it always was," Zaentz said. "I think families need to think about adjusting expectations and doing things differently to better meet the needs of the person with dementia."
Zaentz says it's also important to make the person with dementia as much apart of the Christmas traditions as possible and knowing their limitations.
"Maybe the person with the disease can't help decorate the entire tree anymore but maybe they can put one or two things on the tree," Zaentz said.
Even though it may be different, he says you can still build up the emotional connection with them in the spirit of Christmas.
EXAMINING THE EFFECTS AND TREATMENTS OF DEMENTIA
If you typically go out for dinner, try going out a little earlier than normal.
"A restaurant might be extremely busy and that business and all of the noise becomes not only distracting for the person who has dementia but it becomes agitating for them," Zaentz said.
If you usually prefer to dine at home for Christmas, he suggests having the meal in stages so everyone's not crowding in the room at the same time.
You will still be able to carry on many of the traditions of the past, but Zaentz suggests forming new ones where deemed fit so everyone can enjoy the Christmas season.
Your decorating of the tree, baking Christmas goodies or having big get together's during the holiday season or on Christmas are fine but they may need some altering.
Safety is key as well especially if you fragrance the air with candles.
"You have to be careful that the person with Dementia understands that this is a lit candle and there's no hazards that you wouldn't have thought of in the past but have to think about now," Zaentz said.
If there's a family party going on, he suggests having someone keep an eye on their loved one with Dementia to make sure that they're comfortable in their surroundings.
In terms of heading to mass on Christmas eve or on Christmas morning, the loved one with dementia may not be at a point any longer where they could physically or emotionally handle going to church, in which case you could ask a priest or deacon to bring communion to your loved one so they could still receive the Holy Eucharist.
Categories: Health, New Jersey News, News
2019 Beach Radio, Townsquare Media, Inc. All rights reserved.
|
cc/2019-30/en_middle_0056.json.gz/line12309
|
__label__cc
| 0.589108
| 0.410892
|
The performance of amateur traders on a public internet site: a case of a stock-exchange contest
Blanchard, michel and Bernard, philippe (2011): The performance of amateur traders on a public internet site: a case of a stock-exchange contest.
We analyze a very thorough data base, including all of the bid/ask orders and daily portfolio values of more than 600 on-line amateur traders from February 2007 to June 2009. These traders were taking part in a stock-exchange contest proposed by the French Internet stock-exchange site Zonebourse. More than 80% of traders lose relative to the market. Their relative average annual performance varies from -38% to -60%, depending on the method used. In absolute, more than 99% of traders lose and face drastic losses: on average, portfolio values fall from an initial value of 100 to a terminal value of 7 in the 29 months covered here. When we include the rewards offered by the contest, average performance becomes -13% a year. However, only two deciles continue to beat the market. From an initial value of 100 the final value is 28 including rewards, but 95% of traders still lose in absolute. There is no clear performance persistence for traders. Are the best traders just lucky then? Focusing on contest winners, the long-term transition analysis suggests a long-term probability of staying in the best decile which is greater than chance. We thus cannot reject a “star effect” of staying in the best decile. However, the great majority of amateurs do seem to be e-pigeons. Online trading may just be costly entertainment, like casino gambling.
Behavioral finance, finance, online trading, amateur traders , e-pigeons, trade losses
G - Financial Economics > G1 - General Financial Markets > G11 - Portfolio Choice ; Investment Decisions
G - Financial Economics > G1 - General Financial Markets > G10 - General
Michel BLANCHARD
25. Oct 2011 20:14
20. Feb 2013 05:12
Alpert, M., and Raiffa, H., 1982, A progress report on the training of probability assessors, in: D. Kahneman, P. Slovic and A. Tversky, eds., Judgment Under Uncertainty: Heuristics and Biases, Cambridge University Press, Cambridge, pp. 294–305.
Anderson A., 2006, Is online trading gambling with peanuts? SIFR Research Report Series.
Barber, B., Lee, Y.T., Liu, Y.J., Odean, T., 2009, Just how much do individual investors lose by trading? Review of Financial Studies 22, 609–632.
Barber, B., Odean, T., 2000, Trading is Hazardous to your Wealth, The Journal of Finance, LV (2), 773-806.
Barber, B., Odean, T.,2001(1), The Internet and the investor. Journal of Economic Perspectives 15, 41–54.
Barber, B., Odean, T., 2001(2), Boys Will be Boys: Gender, Overconfidence, and Common Stock Investment, Quarterly Journal of Economics, 116 (1), 261-292.
Barber, B., Odean, T., 2002, Online investors: do the slow die first? Review of Financial Studies 15, 455–487.
Blanchard,O., 2000, E-Pigeons, Libération, Tribune, 20 mars. Choi, J., Laibson, D., Metrick, A., 2002, How does the Internet affect trading? Evidence from investor behavior in 401(k) plans, Journal of Financial Economics 64, 397–421. Christopherson, J., Cariño, D., Ferson, W., 2009, Portfolio Performance Measurement and Benchmarking, McGraw-Hill, Finance and Investing
Cubitt, R., Sugden, R., 2001, On Money Pumps, Games and Economic Behavior, 37 (1), 121-160.
Dietz, P., 1968, Components of a Measurement Model: Rate of Return, Risk and Timing, The Journal of Finance, 23 (2), 267-275.
Dom, D., Sengmueller, P., 2009, Trading as Entertainment? Management Science, 55 (4), 591-603.
Fisk P., (1961), The Graduation of Income Distributions, Econometrica, 29 (2), 171-185.
Jegadeesh, N., Titman, S., (1993), Returns to buying winners and selling losers: implications for stock market efficiency, Journal of Finance 48, 65−91.
Mizrach, B., Weertz, S., 2009, Experts online: An analysis of trading activity in a public internet chatroom, Journal of Economic Behavior and Organization 70, 266-281.
Odean, T., 1999, Do Investors Trade too much?, American Economic Review, 89, 1279-1298.
Shefrin, H., Statman, M., 1985, The disposition to sell winners too early and ride losers too long: theory and evidence, Journal of Finance, s40, 281-304.
|
cc/2019-30/en_middle_0056.json.gz/line12315
|
__label__cc
| 0.717608
| 0.282392
|
Nerrigundah – Gold, bushrangers, robbery and a shoot out remembered 150 years later
Posted on April 10, 2016 By mdhsociety
A gold rush, bushrangers, miners, armed hold ups and Chinese joss houses – everything was happening in the bustling 1860s gold rush settlement of Nerrigundah. The population at that time was approximately 1200 people – extremely difficult to imagine now!
Saturday’s ceremony and presentation in the now very sleepy and empty Nerrigundah marked the 150th anniversary of the Clarke Gang’s raid on the town on 9 April, 1866, and the shooting of Trooper Miles O’Grady that followed .
The occasion was marked by two events. The NSW Police held a Flag Ceremony at the memorial to Trooper O’Grady . The other event was a presentation by author and historian Peter C. Smith followed by a presentation combining audio and visual elements of the celebration that was held at Nerrigundah in 1966 to mark the to mark the centenary of the event.
The Nerrigundah monument to Trooper Miles O’Grady. New retention walls have been built around the monument by the Eurobodalla Shire Council
Two mounted police, dressed as colonial troopers, approach the monument before the ceremony
Is the dog , part of the police’s Dog Squad staring suspiciously at Annie Fitzgerald (far right), a MDHS member?
NSW Police, led by Acting Commander Far South Coast Southern Region Kevin McNeil, conducted a flag bearing ceremony honouring Constable Miles O’Grady at the Monument erected in his honour at the top of Gulph Street. The Police party included two Mounted Police dressed as colonial troopers and a member of the Dog Squad.
The Police party including the Mounted Police and the member of the Dog Squad
Acting Commander Far South Coast Southern Region Kevin McNeil
The Acting Commander relating the bravery of Trooper Miles O’Grady
Members of the Moruya & District HS ( middle row, standing L-R) Huon Hassall, Fran Hassall, Rob Lees, unknown, James Henningham, Maureen Keating, Jenny Gerrey, Brian Harris)
Pipers concluding the ceremony
The police party in front of the monument
The crowd dispersing following the ceremony
The second session of the day, for Moruya and Narooma Historical Society members and friends and locals and invited guests, was a combined presentation hosted by Narooma and Moruya Historical Societies
The presentation started with a talk by Peter Smith on the Nerrigundah raid by the Clarke gang of bushrangers. Peter is the author of The Clarke Gang: Outlawed, Outcast and Forgotten and is also president of the Braidwood Historical Society.
A personal highlight for me was listening to the voices of past Nerrigundah residents – including the last serving policeman, the last headmaster at Nerrigundah and the interviewer, a radio announcer from 2BA (Bega). The information they provided was wonderful and their accents provided a glimpse into an Australia long gone.
Laurelle Pacey of the Narooma Historical Society introduced the second event in the Nerrigundah Agricultural Bureau Hall
Peter Smith sharing his extensive knowledge of the Clarke Gang
Rob Lees, president of the Moruya and District Historical Society, then introduced the presentation High Noon at Nerrigundah, a presentation using materials captured during the 1966 reenactment.
Rob Lees of the Moruya&District Historical Society
An introductory slide
The presentation certainly was a ‘Story of Bushranging Days’
Were you in this crowd at the 1966 reenactment?
The presentation was held in the Nerrigundah Agricultural Bureau Hall
Part of the 1966 reenactment
A sketch of the the main buildings involved n the 1866 raid. Note the number of buildings.
Mrs Richards, a former long-time Nerrigundah resident. was interviewed for the centenary event in 1966. The recording of her interview was played at Saturday’s presentation.
MDHS members Janene Love and Wendy Simes were two of the day’s organisers.
One of the ‘locals’ came to the presentation to see what the fuss was all about
A much quieter Nerrigundah as Peter Smith is filmed at the monument
Peace descends on Nerrigundah following the events!
← A STORY HANDED DOWN
The Wallpapered Manse…if these walls could talk. →
Category: Events, People Tags: Clarke Brothers, Moruya & District Historical Society, Narooma Historical Society, Nerrigundah, police, Trooper O'Grady
2 Comments on “Nerrigundah – Gold, bushrangers, robbery and a shoot out remembered 150 years later”
Hi Brian We were at the 1966 remembrance. I am fairly sure there was a reenactment. I was 4 at the time and went out with mum and dad. Regards
mdhsociety
Yes, David. There was a reenactment. Unfortunately the post you saw was a very early draft – I clicked on Publish instead of Preview! Have a look again and you may see familiar scenes in the presentation (and a much more complete post)
A Happy and Prosperous New Year To All – News from the Moruya Examiner 100 years ago January 4, 2019
Featured Publication – Moruya Pioneer Directory January 2, 2019
Highlights of the Museum December 29, 2018
1918 winds down in the Moruya Examiner December 27, 2018
Seasons Greetings! December 21, 2018
|
cc/2019-30/en_middle_0056.json.gz/line12321
|
__label__wiki
| 0.615653
| 0.615653
|
Online Tool Helps Reporters Navigate FOIA Without an Attorney
Wes Benter / May 4, 2016
Reporters who submit open records requests under the Freedom of Information Act (FOIA) do not necessarily need an attorney to file an appeal with an agency that rejects the journalist’s application.
iFoia.org is a free, easy-to-use online resource that helps reporters create FOIA requests and deliver it to the right agency. It manages and tracks all communications the reporter initiates with agencies.
Journalists then can set reminders for follow-ups, share projects with newsroom colleagues, and appeal adverse decisions.
The website may prove particularly useful amid news that the government is increasingly censoring, denying access, or failing to turn over public documents. According to the AP’s most recent annual review, government searchers turned up empty-handed in more than one in six FOIA cases – apparently because they couldn’t find files.
“State what you’re willing to pay [for the information],” said Katie Townsend, litigation director at Reporters Committee for Freedom of the Press — one of more than a dozen presenters who spoke to about 100 journalists at the Media Law Resource Center’s “Media Law for Journalists: A Workshop and Roundtable” at The New York Times building Tuesday. (Yours truly was among the audience members.)
“Ask the agency to contact you if the fees exceed that amount,” Townsend advised, reminding journalists that FOIA requests must be in writing and reasonably describe the records sought.
Agencies may charge fees, she said, but as a “representative of the media,” reporters may qualify for reductions and waivers.
So often, journalists ask agencies to create records, but Townsend clarified that FOIA requests return only documents that “already exist” on the record. It generally takes about twenty-days for an agency to make a determination on a FOIA request. In some circumstances, a journalist may request expedited processing, which cuts that window of time in half.
Visit iFoia.org to register for an account and create a records request. More information is also available on the Reporters Committee for Freedom of the Press’s website.
Whether you’re a reporter, blogger, author or other content creator, ProfNet can help you with your search for expert sources. Send a query to tens of thousands of experts and PR agents to find an expert you can quote on virtually any topic. The best part? It’s free! Start your search now: Send a query!
Wes Benter is a senior online community services specialist at ProfNet, a service that connects journalists with expert sources. He previously worked as a creative producer for PR Newswire’s MultiVu. Prior to that, Wes worked on-air as a reporter and weather anchor for network affiliates in the Midwest. Learn more by following him on Twitter @WBenter.
May 4, 2016 in Journalists and Journalism, Media Tools and Tips. Tags: FOIA, media law, reporting tools
The ABCs of Digital Journalism Tools: Helpful Apps and Sites to Make Your Job Easier
New Rules for Fact Checking: Building Trust and Credibility with Your Audience
Media Insider: FOIA Turns 50, Publisher Apps Rebound, Massive Shakeup at Politico
← Media Moves: Who’s Coming and Going the Week of May 1
Journalist Spotlight: Bob O’Brien, The Deal →
One thought on “Online Tool Helps Reporters Navigate FOIA Without an Attorney”
Alma Lin says:
Window of time is a quick than an express which reporting all covering of the street. This is a perfect reform to require during in the field while doing a job.
|
cc/2019-30/en_middle_0056.json.gz/line12323
|
__label__cc
| 0.567774
| 0.432226
|
nLab
open subscheme
Skip the Navigation Links | Home Page | All Pages | Latest Revisions | Discuss this page | Feeds |
Open subsets of the underlying topological space of a scheme
An open subscheme is the analogue of an open subset of a topological space for schemes.
An open subscheme of a scheme (Y,𝒪 Y)(Y,\mathcal{O}_Y) is a scheme (U,𝒪 Y)(U,\mathcal{O}_Y) whose underlying space is the subspace UU of YY together with an isomorphism of the structure sheaf 𝒪 U\mathcal{O}_U with the restriction 𝒪 Y| U\mathcal{O}_Y|_U of the structure sheaf 𝒪 Y\mathcal{O}_Y to UU. An isomorphism of a scheme (X,𝒪 X)(X,\mathcal{O}_X) and an open subscheme (U,𝒪 Y)(U,\mathcal{O}_Y) of another scheme (Y,𝒪 Y)(Y,\mathcal{O}_Y) amounts to an open immersion of schemes (X,𝒪 X)↪(Y,𝒪 Y)(X,\mathcal{O}_X)\hookrightarrow(Y,\mathcal{O}_Y).
Before embarking upon the proof of Proposition , we shall need a few preliminaries. Let AA be a commutative ring. Let SpecASpec A denote the set of prime ideals of AA. Given an element aa of AA, we denote by D A(a)D_{A}(a) the set of prime ideals of AA to which aa does not belong. Either by definition, or by a little basic commutative algebra, we have that {D A(a)|a∈A}\{ D_{A}(a) | a \in A \} is a basis for the Zariski topology on SpecASpec A.
An affine scheme is by definition the locally ringed space (SpecA,𝒪 SpecA)(Spec A, \mathcal{O}_{Spec A}), where SpecASpec A is the set we have just defined equipped with the Zariski topology, and 𝒪 SpecA\mathcal{O}_{Spec A} is a certain sheaf of rings on this space.
A basic result in commutative algebra is that, for any a∈Aa \in A, (D A(a),𝒪 SpecA|D A(a))(D_{A}(a), \mathcal{O}_{Spec A} | D_{A}(a)) is an affine scheme, isomorphic to (SpecA a,𝒪 SpecA a)(Spec A_{a}, \mathcal{O}_{Spec A_{a}}). Here A aA_{a} is the localisation of AA at aa.
Let (X,𝒪 X)(X, \mathcal{O}_{X}) be a scheme, and let UU be an open subset of XX. Then (U,𝒪 X|U)(U, \mathcal{O}_{X} | U), in the same notation as at scheme, is a scheme.
Let x∈Ux \in U. We must prove that xx has an open neighbourhood WW in UU such that (W,𝒪 U|W)(W, \mathcal{O}_{U} | W) is isomorphic to an affine scheme.
Immediately from the definition of a scheme, there is an open neighbourhood NN of xx in XX such that (N,𝒪 X|N)(N, \mathcal{O}_{X} | N) is isomorphic to an affine scheme, that is to say, a pair (SpecA,𝒪 SpecA)(Spec A, \mathcal{O}_{Spec A}) as defined above, for some commutative ring AA. This isomorphism in particular involves an isomorphism of topological spaces N→SpecAN \rightarrow Spec A, which we shall denote by ii.
Since {D A(a)|a∈A}\{ D_{A}(a) | a \in A \} is a basis for the Zariski topology on SpecASpec A, there is some a∈Aa \in A such that i(x)∈D A(a)i(x) \in D_{A}(a) and D A(a)⊂i(N∩U)D_{A}(a) \subset i(N \cap U), noting that since UU is open in XX, N∩UN \cap U is open in NN.
Now, as we have remarked, (D A(a),𝒪 SpecA|D A(a))(D_{A}(a), \mathcal{O}_{Spec A} | D_{A}(a)) is isomorphic to an affine scheme. Hence (i −1(D A(a)),i *(𝒪 SpecA|D A(a)))(i^{-1}(D_{A}(a)), i^{*}(\mathcal{O}_{Spec A} | D_{A}(a))) is isomorphic to an affine scheme, where i *i^{*} is the inverse image functor from sheaves of commutative rings on D A(a)D_{A}(a) to sheaves of commutative rings on i −1(D A(a))i^{-1}(D_{A}(a)).
But i *(𝒪 SpecA|D A(a))i^{*}(\mathcal{O}_{Spec A} | D_{A}(a)) is isomorphic to 𝒪 U|i −1(D A(a))\mathcal{O}_{U} | i^{-1}(D_{A}(a)). Since i −1(D A(a))⊂i −1(i(N∩U))=N∩U⊂Ui^{-1}(D_{A}(a)) \subset i^{-1}(i(N \cap U)) = N \cap U \subset U, we conclude that we can take WW to be i −1(D A(a))i^{-1}(D_{A}(a)).
Let xx be a point of the underlying topological space XX of a scheme (X,𝒪 X)(X, \mathcal{O}_{X}). The set {x}\{ x \} need not be a closed subset of XX, but if it is, then, by Proposition , (X∖{x},𝒪 X|X∖{x})(X \setminus \{ x \}, \mathcal{O}_{X} | X \setminus \{ x \}) defines an open subscheme of (X,𝒪 X)(X, \mathcal{O}_{X}).
category: algebraic geometry
Last revised on April 29, 2018 at 15:54:11. See the history of this page for a list of all contributions to it.
EditBack in time (5 revisions)See changesHistory Cite Print TeX Source
|
cc/2019-30/en_middle_0056.json.gz/line12339
|
__label__wiki
| 0.526193
| 0.526193
|
Free and open access to publicly-funded research offers significant social and economic benefits and the government is committed to ensuring that such research should be freely accessible. The UKRI's policy on access to research outputs - external link - applies to all research papers based on work funded by research councils.
NERC is committed to the principles articulated in the UKRI policy. We will ensure that the ideas and knowledge derived from our research, survey and monitoring activities are made available as widely, rapidly and effectively as practicable - to other researchers and to potential users in business, charitable and public sectors, and the general public. To ensure maximum availability and opportunity for reuse, it is NERC's policy that it will retain the copyright in the published outputs of its own staff.
According to the terms of our Data Policy, a copy of any dataset of long-term value resulting from NERC-funded activities must be offered to one of our data centres.
For enquiries about open access please contact:
Avril Allman
avril.allman@nerc.ukri.org
Grants on the Web (GOTW)
Information about NERC grants is also available through the Grants on the Web - external link - system.
Grants information is collected by UK Shared Business Services (UKSBS) and uploaded weekly. Only grants submitted to NERC from June 2000 onwards are displayed.
Gateway to Research (GtR)
NERC grants information can also be found through the Gateway to Research - external link system, which is a single web-based portal funded by all seven research councils and Innovate UK. GtR combines grants details and outputs information provided by researchers through Researchfish® - external link, offering an opportunity to explore the entire breadth of research across all disciplines and industry sectors.
NERC libraries and archives
Our centres hold comprehensive collections of environmental science related information accessible online and in libraries and archives open to researchers and the public.
NERC Open Research Archive (NORA)
NORA - external link - is the repository for the research publications and research outcomes of NERC staff in its four wholly owned research centres:
British Antarctic Survey (BAS)
British Geological Survey (BGS)
Centre for Ecology & Hydrology (CEH)
National Oceanography Centre (NOC)
NERC libraries & archives
Grants on the Web (GOTW) - external link
Gateway to Research (GtR) - external link
NORA - external link
|
cc/2019-30/en_middle_0056.json.gz/line12343
|
__label__cc
| 0.583869
| 0.416131
|
Stanley and stellas relationship marketing
Stanley and Stella - Research Paper Example : mephistolessiveur.info
RESPONSIBLE PRODUCTION, A LASTING RELATIONSHIP Stanley/Stella gives you the best sustainable inspiration to create your collection. JOIN US. It's not until scene 3 do we witness the extent of Stanley's and Stella's relationship until he hits her “There is the sound of a blow. Stella cries out” and we think the. Stella and Stanley's relationship has by now been subtly established as primal, for example through how Stanley threw his "package of meat" at her in the first.
Analyse the relationship between Blanche and Stanley in Scene 2-A Streetcar Named Desire.
GOTS also ensures compliance with the labour standards of the International Labour Organisation throughout the chain of production. Eucalyptus is known for being a fast-growing wood that does not require irrigation.
Stanley and Stella Paper
Our cellulose fibres are sourced exclusively from the Austrian manufacturer Lenzing, the first fibre manufacturer to have received the EU Ecolabel, which promotes environmental excellence. It can be grown without the use of either chemicals or irrigation. Natural precipitation is all that it requires. In addition, each plant also absorbs a large quantity of carbon.
One windcheater jacket enables the recycling of between 7 and 8 PET plastic bottles. And to ensure that our sweatshirts are nice and soft against your skin, it is never in direct contact with the polyester, which is sandwiched between two layers of organic cotton.
The Global Recycled Standard label certifies that the materials used are recycled: GRS also guarantees compliance with social and environmental criteria such as treatment of waste water, the absence of certain toxic additives and respect for working conditions in our partner factories.
Since the idea of throwing this material away is out of the question, we have a partner who collects and recycles it into new cotton thread that we use in the manufacture of our tote bags. Trust your clothes with your eyes closed!
It has to be earned. The former is emphasised by his use the imperative "let me enlighten you", which emphasises not only his need to dominate a core theme of the play manifested notably in Chapters 3 and 10, with the rapebut an attitude of superiority towards Stella, as the verb "enlighten" has connotations of a grandiose, unexpected truth something Stella couldn't discern by herself.
This clearly has a condescending illocutionary force, and is bolstered by the address term "baby" - this has a sexist illocution, that she is infantile and dependent upon him, as well as its sexual connotations.
A Streetcar Named Desire (7/8) Movie CLIP - Pearls Before Swine (1951) HD
In a patriarchal society s AmericaStanley feels the need to use societal attitudes to support his claims, which presents him as insecure his claims are not strong enough to hold up on their own. The use of formal, complex lexis such as the polysyllabic noun-phrase "Napoleonic code" and its incongruity in Stanley's simulated naturalistic dialogue also foreground a sense of stupidity, or at least intellectual deficiency, in his discourse and his obliviousness to this.
Stella attempts to reassert dominance in the discourse by interrupting Stanley's tirade his speech is cut short "of property-" and using the exclamation "my head is swimming!
Responsible production, a lasting relationship | Stanley/Stella
In this speech, Stella subtly conforms to the patriarchal expectation of a confused, uninformed woman to satisfy Stanley's ego - she does not have to argue with him rationally. This is ironic as it both diminishes and empowers Stella in the relationship - she is able to control Stanley, by conforming to his desires; this is a key theme throughout their relationship in the play, sexually specifically. Stanley and Stella both place prosodic emphasis on certain phrases to express their anger and impatience, which adds to the growing tension and potential sexual subtext in the scene - an effect Williams often achieves via 'Plastic Theatre'.
For example, Stanley emphasises the past-participle "swindled" which has connotations of weakness and lack of pride, at odds with Stanley's macho self-image - he does so in order to cast blame externally.
Stella style-matches to this by calling him an "idiot" and prosodically stressing the pronoun-verb-phrase "I'm" - this stresses her agency the use of present tense also emphasises this and subsequent power in the relationship, but also shows how Stella comes to resemble Stanley.
Tucson meet yourself 2009 hours
Compromise in a relationship definition of single
Best way to meet guys at school
Relationship between dcp and cbr
Danny and de linda relationship questions
Relationship between folate and neural tube defects definition
Harwich high school track meet
Azerbaijan and united states relationship with cuba
tutorials tips tricks porn tube
getfoundlocally porn tube
dashing porn scenes along perky tits akina hara
moana pozzi ilona staller mundial sex
|
cc/2019-30/en_middle_0056.json.gz/line12346
|
__label__cc
| 0.678562
| 0.321438
|
“Which hope we have as an anchor of the soul, both sure and stedfast, and which entereth into that within the veil;…”
What is this hope; this anchor; on which the soul is secured; and which enters as the scripture says “within the veil”? And what can this mean; this “within the veil”?
The words are a mighty bit obscure here; there’s nothing, no word amongst them all which has not got a clear and direct meaning easily to be had from a dictionary; but as is pretty usual with this writer (To The Hebrews) the words as he puts them together carry a pregnant mystery and an arch strangeness about them; the apprehension of his readers is often that there lies behind his words here and elsewhere in his book, some very worthwhile truth to be mined out.
It’s pretty certain that the writer at least on one of several levels is referring deliberately to the saying carried in all three of the Synoptic Gospels that at Christ’s moment of death; “the veil of the temple was rent in the midst”.
It’s pretty usual for this rending of the Temple veil to be understood to have actually happened as an historical fact. The curtain in the Temple at Jerusalem, outside whose city gates Christ suffered, the curtain ripped from top to bottom as Christ expired on the cross. Darkness and an earthquake are said to have accompanied this event also.
Figuratively the rending of the Temple curtain, which in actuality would have revealed to open view a place of the Temple disallowed previously to be looked upon excepting by priests, maybe even only by certain priests; figuratively then, this rending of the curtain is said usually to mean that Christ’s death had in fact broken down the barrier between God and the ordinary man, woman and child; and thus had allowed all of us who desired and desire to obtain free and unobstructed, unmediated, access to the Grace and Love of The Lord. No more need for daily token animal sacrificial offerings; it is now that as the Writer to the Hebrews says: “we are sanctified through the offering of the body of Jesus Christ once for all.”
Truly sanctified; and not just in token; because the law has been completed by the acts of the life of Jesus Christ, and has been freed from legalism and from being a ‘watchdog’ over the individuals of, and the collective of, Hebrew nation. The law completed is now The Law of Love; a law which Christ’s followers keep because they love Him. “If you love me you will keep my commandments” had said Jesus.
Now for some information about me and my life. I read English Literature at College; and there I became acquainted with the epic poem Paradise Lost by John Milton. Paradise Lost is a long narrative poem which retells the Biblical story of The Fall of Adam and Eve from the Paradise of The Garden of Eden. John Milton tells us in his poem that he writes it so as to “justify the ways of God to men.” That is, he wanted to provide a rationale to men and women stating why life is like it is; and to explain what is going on on earth over the course of history and time.
John Milton was a dissenting non-conformist by religion; a Puritan; as opposed to being an English Episcopalian, or even a proscribed from Britain Roman Catholic. Milton’s was a fierce and individual liberty which he proclaimed through his understanding of the gospels and of the Bible and of God. In his poem Paradise Lost he expresses in the final book (Book 12) much of his view of the meaning and the progress of human time from its beginnings from a preternatural Chaos to Eden to Noah to Moses to David to Christ and to The Second Coming. He does so under a narrative structure which has the Archangel Gabriel, whom he calls the ‘social angel’, expounding to Adam the course which earth history is predestined, (but not predetermined) to take.
Now when I first took up Paradise Lost to read I found it extremely difficult. I was not familiar with the style nor the vocabulary nor the theology. Nonetheless I was the type who perseveres and I did manage to gain eventually some understanding of the poem. The important point I want to make about my understanding of the poem at that time is its intellectual nature; in that I felt no kinship with the sentiments emotionally, even though I had come to understand Milton’s general argument.
In an odd sort of way I felt at that time I might even agree with his sentiments; yet they were for me then to hard, too severe; too austere and to me then uncompromising. Thus in an odd way my heart even nodded assent to Paradise Lost but I was perhaps too young to bear the consequences of taking the poem into my heart. Samuel Taylor Coleridge has a close affinity to what I am saying in his poem Dejection: An Ode, where he writes:
“Those stars, that glide behind them or between,
Now sparkling, now bedimmed, but always seen:
Yon crescent Moon, as fixed as if it grew
In its own cloudless, starless lake of blue;
I see them all so excellently fair,
I see, not feel, how beautiful they are!“
But like a sort of magic charm Milton and his Paradise Lost has grown on me to become a frequent resort for me to visit increasingly in my latter years. Those justifications of God’s ways to men and the expansive narrative of time from Chaos to The Endtime, once too cold and remote, too severe and bare, are now a comfort to me; and a hope. Thus we come back to The letter to The Hebrews, and to that hope which by way of Christ’s death on the cross leads us to be able to “entereth into that within the veil”
And for myself it appears, it feels, dare I say it is, just like that; reading Milton now, as with my reading of The Bible now, in comparison to my reading of these books as a youth, is entering into a world which remained for many years undiscovered to me; yet hinted at by my sense that here in my early reading was something reasonable, of good cheer and assentable to, even in the heart; but yet too strong meat, too hard for me to really and truly internalise.
For me my experience has been that over the years I have imperceptibly been allowed bit by bit some access so as to be able now to “entereth into that within the veil”.
The point I want to make is about this sine qua non of commitment; in the way that this commitment summed up in the first of Christ’s two commandments:
“Thou shalt love the Lord thy God with all thy heart, and with all thy soul, and with all thy mind. This is the first and great commandment.”
Now I am not claiming for myself an utter exclusive and wholly dedicated allegiance to God of the intensity which this commandment is able to demand of a person. I am no plaster saint. I am fallible and I tend to go astray from the narrow path too often. I did say I feel I have been allowed some measure of being let to enter “within the veil”; and the Christian Journey is a ceaseless one and there is always further to go on it. As St. Augustine said: “Humility is endless”.
Now when I read The Bible or some religious writer of deep faith like John Milton, my whole self does respond and I feel very often that I just would not be able to live without having these words available to me at times especially when I feel I desperately need them to be around. This statement might sound a bit precious to you; that I feel I could not live without these books around me; as my ‘life-support’; a bit exaggerated and hyperbolic; but they are not.
I do believe I would not have come so far to love life and have it in such abundance had I turned away from Christ and had never become a follower of His. I do believe that in order for me to have survived as a non Christian I would have had to harden my heart so far as to be callous to the sufferings of people in the world and to have been able to live life without a hope and sens eof purpose and meaning for life. I doubt whether I could have hardened my heart sufficiently to prevent me from despair and disintegration as a personality.
It is the fact of the comfort from God, and the Grace and Love shown me by Him, which allows me to see further into the pain and sufferings of the world and to sympathise with those who bear these things and yet hold onto something greater, above, beyond, this dreadful suffering; and this is my hope. Having been privileged to be admitted, into, some distant from the heart of it, into a minor vestibule, just beyond the veil means for me that I feel I have been allowed to feel and so to do – I hope and pray, – more for others than I otherwise would have been able to do.
Then again I say this is not to say there is much more left to be done and that I have perhaps omitted occasions when I could have done some of that more to be done.
So what exactly is this ‘within the veil”which I am making so much of; describe it to me you ask?
Let me close now and sum up to you using words from the final book of John Milton’s epic poem Paradise Lost; words which go as close as I am able to express to saying what a sense of being ‘within the veil’ might mean:
“Greatly instructed I shall hence depart.
Greatly in peace of thought, and have my fill
Of knowledge, what this Vessel can containe;
Beyond which was my folly to aspire.
Henceforth I learne, that to obey is best,
And love with feare the onely God, to walk
As in his presence, ever to observe
His providence, and on him sole depend,
Merciful over all his works, with good
Still overcoming evil, and by small
Accomplishing great things, by things deemd weak
Subverting worldly strong, and worldly wise
By simply meek; that suffering for Truths sake
Is fortitude to highest victorie,
And to the faithful Death the Gate of Life;
Taught this by his example whom I now
Acknowledge my Redeemer ever blest.
To whom thus also th’ Angel last repli’d:
This having learnt, thou hast attained the summe
Of wisdom; hope no higher, though all the Starrs
Thou knewst by name, and all th’ ethereal Powers,
All secrets of the deep, all Natures works,
Or works of God in Heav’n, Aire, Earth, or Sea,
And all the riches of this World enjoydst,
And all the rule, one Empire; onely add
Deeds to thy knowledge answerable, add Faith,
Add vertue, Patience, Temperance, add Love,
By name to come call’d Charitie, the soul
Of all the rest: then wilt thou not be loath
To leave this Paradise, but shalt possess
A Paradise within thee, happier farr.”
|
cc/2019-30/en_middle_0056.json.gz/line12349
|
__label__cc
| 0.65614
| 0.34386
|
Tag Archives: audl
Nashville Sports Loses Nightwatch gains Power
Posted on November 24, 2018 by miltonhooper
Most people won’t hear about it on the local news but the more obscure sports in the Music City has lost one franchise but gained another recently.
The Nashville Nightwatch professional ultimate frisbee team announced this week that they will no longer field a team in the American Ultimate Disc League (AUDL). The Nightwatch played four seasons in the AUDL’s Southern Division but never had a winning season. They showed a lot of promise at times but could only post an 8-44 record and finished last place each season. In their Facebook announcement this week the team posted:
“We would like to thank our players and supporters from the last 4 years. Going forward we will not be playing in the AUDL. We are going to turn our efforts into building our community through club efforts and focusing on our Professional Women’s team, Nashville NightShade. We will be forming a club team with the goal of competing at the highest level. Our experiences learned in the AUDL will allow us to give our club team a pro experience and grow with our community. More information to come, and thank you for your support.”
The Nightwatch organization has been one of the more influential franchises in promoting women’s ultimate so it appears that the Nightwatch could live on through their female counterparts. I’m not sure how the club team will work out and competing at the “highest level” will look like but with the AUDL being the only professional ultimate league, this announcement will leave a void.
The Nightwatch could never get the following necessary to sustain a start-up professional franchise, especially in a non-major sport. The press never really helped the Nightwatch plus the fact that they could not field a competitive team on the field. The team also could never find a good home as they began at Tennessee State University in their inaugural season then moved to Overton High School in their second season and then a terrible move to Hunter’s Lane High School in North Nashville the following season and finally to an awkward field at Vanderbilt University. The move to the Vanderbilt area was one I thought would help but the home field was not really a spectator-friendly venue.
With the demise of the Nightwatch, another team has moved into the void as the Nashville Power brings the city their first indoor football team since the Nashville Venom played in 2014-2015 at the Municipal City Auditorium. The Power will also call the Auditorium home when they kick off their season in the spring of 2019. The Power will play in the Elite Indoor Football League which is basically a semi-pro type league in comparison to the bigger leagues. The Power will join 12 other teams located throughout the East and Southeast.
Although they are playing in an obscure league, they will have a local favorite involved. One of the greatest arena league players of all-time, Cory Fleming, is the Power’s defensive coordinator. Fleming played for the Kats (1997-2001, 2006), Carolina (2002) and Orlando (2003-05). The former Stratford and Tennessee star was inducted into the Arena Football Hall of Fame in 2013.
Will this new indoor team make it? I doubt it. The league looks pretty weak. There had been rumors of the return of the Nashville Kats franchise in the National Arena League (NAL) or even a new team in the Arena Football League (AFL) but nothing has been made public.
Don’t be surprised if the Power doesn’t last any longer than the Nightwatch.
Posted in Sports | Tagged american ultimate disc league, Arena Football, audl, indoor football, milton hooper, nashville, nashville nightwatch, Nashville Power, nashville sports | Leave a reply
How ‘Bout Them Dawgs, ArenaBowl and Frisbee Final Four
Bulldawgs Win, Washington Wins ArenaBowl, Final Four set in AUDL
This isn’t a “false start” on the college football season and I’m not talking about THOSE Dawgs. I am talking about the lesser known Middle Tennessee Bulldawgs who have advanced to the championship game of the Gridiron Developmental Football League (GDFL) after defeating the Erie Express 14-7 on Saturday. Never heard of these Bulldawgs? I haven’t heard much about them except for an occasional post on my Facebook feed. Rahim Muhhamed scored from nine yards out with 1:05 left to break open a 7-7 tie to give the Bulldawgs the winning score. They will now face the Oklahoma Thunder in Birmingham on August 11th for the title. The Bulldawgs are made up of many players from the previous Nashville Storm semi-pro team that played in Nashville for many seasons and were one of the top teams in semi-pro football. I also did not know that the Bulldawgs were playing their home games at Ensworth which is probably the closest high school to me. Gridiron Bowl IX will be the third in a row for the Oklahoma Thunder who defeated the OKC Outlaws 20-0. The Thunder will be going for their third straight Gridiron Bowl championship. With the Bulldawgs victory, this makes it the third year that the Thunder will take on a team from Tennessee in this game. In 2016, they defeated the Nashville Storm at home. Last year it was the Chattanooga Eagles that fell victim. Now the Middle Tennessee Bulldawgs will try to make the third time a charm.
The indoor football version of the Super Bowl was played this past weekend as the four-team league crowned the Washington Valor as ArenaBowl XXXI champions when they beat the Baltimore Brigade 69-55. The Valor had only won two games during the regular season and was the last place team entering the postseason. The league REALLY needs some more teams or a better playoff format. Washington quarterback Arvell Nelson put the Valor on the board first with a touchdown during the second quarter. Nelson had a record-setting game with 223 yards passing and five touchdowns.
MVP: QB Arvell Nelson – 23/33 passing, 223 passing yards, three passing touchdowns, ArenaBowl-record 15 rushing attempts, 42 rushing yards and an ArenaBowl-record five rushing touchdowns
OFFENSIVE PLAYER OF THE GAME: WR Doug McNeil III – eight receptions, 95 receiving yards and four total touchdowns
DEFENSIVE PLAYER OF THE GAME: DB Svante Davenport – 2.5 total tackles, two interceptions and one fumble recovery
Championship weekend is set in the American Ultimate Disc League (AUDL) as the Dallas Roughnecks, New York Empire, Madison Radicals and Los Angeles Aviators won their division title games to advance. Dallas edged the Raleigh Flyers 20-19, the New York Empire upset the Toronto Rush 18-17 and Madison topped the Indianapolis Alley Cats 27-18. The Los Angeles Aviators clinched their division title last week against San Diego. Dallas is the only participant which has won a title (2016). Madison, which is hosting Championship Weekend, has been runner-up in two final fours (2013 & 2015).
Posted in Sports | Tagged american ultimate disc league, arena football league, ArenaBowl, audl, Gridiron Developmental Football League, Middle Tennessee Bulldawgs, milton hooper, nashville storm, ultimate frisbee, Washington Valor | Leave a reply
2018 AUDL Playoffs Take Flight
The post-season of the 2018 American Ultimate Disc League (AUDL) season takes off this weekend with 11 teams entering July Madness as they hope to make it to the final four in Madison during the weekend of August 11-12.
Let’s take a look at this year’s playoff teams:
Dallas Roughnecks (13-1) – The Roughnecks won the title in 2016. They hope to add yet a second title having won the South Division title and a first-round bye.
Toronto Rush (13-1) – Their only loss of the season came against DC on June 9. The Rush will have a bye this weekend awaiting the winner of DC-New York. The Rush have ruled the East Division having won each season since they began play in 2013.
Madison Radicals (12-2) – The Radicals have always been the bridegroom and never the bride in the postseason. They are making their fifth straight playoff appearance but have yet to win the title having lost in the 2013 and 2015 finals. They will have a bye this week as they await the Indy-Minnesota winner.
Los Angeles Aviators (11-3) – The league’s top scorer, Sean McDougall (58 goals) leads the Aviators as they won their first division title. Their only loss in the division was to the San Diego Growlers.
Indianapolis AlleyCats (11-3) – The Cats were a hot team this season in the AUDL with their best regular season ever. Rick Gross (56 goals) and Cameron Brock (56 goals) lead the attack for Indy.
Raleigh Flyers (10-4) – The Flyers host Austin in the playoffs this weekend. They won a thrilling 25-23 overtime game at Austin in their last meeting. Reigning league MVP Jonathan Nethercutt and teammate Jack Williams leads the Flyers.
DC Breeze (8-5) – Rowan McDonnel leads the Breeze as they hope to repeat their 10-goal win against the New York Empire in their last meeting. The Breeze won the regular season series against the Empire 2-1.
New York Empire (8-6) – The Empire battled through a roller coaster season lead by Ben Jagt (51 assists) and Harper Garvey.
Minnesota Wind Chill (8-6) – No stranger to the postseason making their third-straight appearance. They will travel to Indianapolis this weekend. They tied the regular season meeting 1-1.
San Diego Growlers (7-7) – San Diego qualifies for the postseason for the first time in their four-year history. Should they win against L.A. they would have their first winning season.
Austin Sol (7-7) – The Sol are also making their first postseason appearance in franchise history. They will play the Raleigh Flyers in the division semifinal round. The Sol squeaked into the playoffs as a result of a forfeited win over the Tampa Bay Cannons in Week 15.
This weekend’s playoff schedule:
Minnesota at Indianapolis
San Diego at Los Angeles
New York at DC
Playoff Notes:
To save on travel, the Raleigh Flyers play at Austin Sol on Saturday, July 27th with the winner playing at Dallas on July 28th.
With only five teams in the West Division this year, only two teams qualified for the playoffs scrapping the divisional semifinal round.
Last year’s champion, San Francisco FlameThrowers, failed to make the playoffs.
The Stadium Network will broadcast the following games:
July 21 – New York at DC (7 pm ET)
July 28 – Raleigh-Austin winner at Dallas (8 pm ET)
August 11 – Semifinal games
August 12 – Championship game
Posted in Sports | Tagged american ultimate disc league, audl, milton hooper, ultimate frisbee | Leave a reply
AUDL Update (4/27/18)
Posted on April 27, 2018 by miltonhooper
Jacob Fairfax (Raleigh) leads AUDL with 17 goals
ROUGHNECKS WIN LONE STAR BATTLE
In the battle for Texas, the Austin Sol started out strong in their game against the Dallas Roughnecks. The Sol took an early lead and held it throughout the first half with an 11-9 lead. The Roughnecks came out and went on a 4-0 run to take control and held on for a 23-21 win. Carson Wilder was the leading player for the Roughnecks with four goals and five assists.
WOMEN’S GAME TAKES FLIGHT
The women’s game had quite a show between the Raleigh Radiance and Nashville Nightshade. The Radiance scored the game winning goal by Carmen Tormey in sudden death overtime for a 15-14 win.
In Detroit, the Riveters hosted the Indy Red. Detroit fell behind 11-5 at halftime and could never catch up as Indy cruised to a 20-11 win.
League Leaders:
Goals: 17 – Jacob Fairfax (Raleigh)
Assists: 26 – Mark Burton (Seattle)
Blocks: 12 – Sean McDougall (Los Angeles)
Completions: 319 – Bobby Ley (Tampa Bay)
Last week’s scores:
Madison Radicals 27, Detroit Mechanix 12
Minnesota Wind Chill 24, Chicago Wildfire 23
Atlanta Hustle 19, Tampa Bay Cannons 18
Philadelphia Phoenix 26, Montreal Royal 21
Toronto Rush 28, San Francisco FlameThrowers 18
Raleigh Flyers 31, Nashville Nightwatch 26
San Diego Growlers 26, Seattle Cascades 25
New York Empire 28, Ottawa Outlaws 16
Indianapolis Alleycats 27, Pittsburgh Thunderbirds 18
Dallas Roughnecks 23, Austin Sol 21
DC Breeze 26, Ottawa Outlaws 21
Los Angeles Aviators 25, San Jose Spiders 16
AUDL Standings
Toronto 3-0
Philadelphia 1-1
New York 1-1
Montreal 1-1
DC 1-1
Ottawa 0-2
Southern Division
Atlanta 3-0
Dallas 3-0
Raleigh 3-1
Austin 1-1
Nashville 0-2
Tampa Bay 0-4
Midwest Division
Madison 2-0
Indianapolis 2-1
Minnesota 1-1
Chicago 1-1
Pittsburgh 1-2
Detroit 0-3
San Diego 2-1
Los Angeles 2-2
San Jose 1-2
San Francisco 1-2
Seattle 1-2
This week’s schedule:
Raleigh at Austin
San Diego at San Jose
Montreal at Ottawa
Pittsburgh at Madison
DC at Philadelphia
San Diego at San Francisco
Raleigh at Dallas
Nashville at Tampa Bay
Indianapolis at Chicago
Posted in Sports | Tagged american ultimate disc league, audl, milton hooper | Leave a reply
Professional Disc League Opens 6th Season
Posted on April 2, 2018 by miltonhooper
Raleigh Opens With Win Over Tampa Bay
The American Ultimate Disc League (AUDL) had the opening pull of their sixth season this weekend with two games on the schedule.
Indianapolis AlleyCats 24, Detroit Mechanix 12
The AlleyCats (1-0) are coming off an 8-6 record from last season and got off to a good start with a convincing win over the Mechanix (0-1). Detroit is hoping to improve of last seasons’ 4-10 record.
Raleigh Flyers 27, Tampa Bay Cannons 22
The Cannons (0-1) challenged the Flyers (1-0) for the first three quarters before the home team Flyers pulled away at the end to win 27-22 in their opening night matchup. The Flyers have won five straight against their divisional rivals dating back to 2016. Jacob Fairfax had eight goals in the game for the Flyers which was the second highest single-game total of his career.
The league begins the 2018 season with 23 teams divided into four geographic regions (East, Midwest, South and West). The league lost the Charlotte Express and Cincinnati Revolution, the Jacksonville Cannons initially moved to Orlando and then landed in Tampa. The Vancouver Riptide moved to Portland and will play in 2019. The Nashville Nightwatch are under new ownership.
According to the AUDL website’s “Tuesday Toss”, here are the top five places to watch an AUDL game:
Long considered a great ultimate town, the Sol have quickly built up a loyal following of fans, making their home atmosphere among the best in the league. Plus, the Sol’d Out crew has officially become the greatest unofficial media outlet in AUDL history.
The Breeze have a new home in 2018, moving about four miles north from Gallaudet University to Catholic University. It’s reasonable to expect the fans to follow, considering that DC has steadily supported its team over the past couple seasons, in which the team has gone 20-8. Pregame concerts and lucrative halftime promotions have become commonplace for the Breeze, who count DC Mayor Muriel Bowser as a fan.
Three words: Ace the Aviator. Without question, LA has the league’s best mascot. Ace is the perfect mix of entertainment and engagement, without overshadowing the game. Aviators ownership deserves a lot of credit for building a brand in a town that is overflowing with activity.
Speaking of building a brand, no team in the league has done so like the Radicals. Often, they are featured on local news alongside the Wisconsin Badgers or Green Bay Packers. As a result, Radicals players now get recognized more and more frequently around town. With a great home stadium, excellent concessions, passionate fans, and a fun and convenient postgame hangout destination, it makes all the sense in the world for Championship Weekend to return to Madison for the second time in three years.
Last year’s Final Four destination is certainly worthy of hosting another Championship Weekend down the road. Since the team’s inception in 2014, the Royal have delivered an exemplary gameday product, attracting fans and building a grand ultimate atmosphere. Their loyal followers are devoted to the home team, but appreciate of brilliant ultimate from either side. And their fans’ love can be attracted via great marketing, like when the Toronto Rush took the field wearing old-school Expos t-shirts last August.
This weekend’s games:
Minnesota at Seattle
Detroit at Pittsburgh
Montreal at DC
San Jose at San Francisco
Atlanta at Tampa Bay
Dallas at Raleigh
Madison at Indianapolis
Montreal at Philadelphia
Posted in Sports | Tagged american ultimate disc league, audl, milton hooper, obscure sports, professional frisbee, ultimate frisbee | Leave a reply
Playoffs Set In AUDL
The 2017 regular season of the American Ultimate Disc League (AUDL) wrapped up this weekend and here are the final standings:
East Division
Toronto Rush (13-1)*
DC Breeze (10-4)*
Montreal Royal (9-5)*
New York Empire (6-8)
Philadelphia Phoenix (4-10)
Ottawa Outlaws (2-12)
Madison Radicals (12-2)*
Minnesota Wind Chill (11-3)*
Pittsburgh Thunderbirds (9-5)*
Indianapolis Alley Cats (5-9)
Chicago Wildfire (3-11)
Detroit Mechanix (1-13)
Raleigh Flyers (13-1)*
Dallas Roughnecks (11-3)*
Jacksonville Cannons (10-4)*
Atlanta Hustle (5-9)
Austin Sol (4-10)
Nashville Nightwatch (0-14)
West Division
San Francisco Flamethrowers (10-4)*
Los Angeles Aviators (9-5)*
San Jose Spiders (8-6)*
Seattle Cascades (7-7)
San Diego Growlers (7-7)
Vancouver Riptide (1-13)
This weekend’s divisional playoffs will be Montreal at DC, Pittsburgh at Minnesota, Jacksonville at Dallas and San Jose at Los Angeles.
Pittsburgh edged Minnesota in the divisional round last year with a thrilling 20-18 win. The Thunderbirds have won in this round the past two seasons but have failed to advance past the divisional final.
Toronto and Madison have qualified for their fifth straight postseason.
Montreal will host the AUDL championship weekend August 26-27.
Posted in Sports | Tagged american ultimate disc league, audl, AUDL 2017 playoffs | Leave a reply
Nightwatch Finishes Season Winless
I did NOT think I would be writing that headline.
The Nightwatch closed out their 2017 season with a 33-24 loss to the Jacksonville Cannons on Saturday in Jacksonville.
At the end of last season, the Nashville Nightwatch rallied to win their final two games as well as their best performance in team history when they topped Jacksonville in their regular season finale 30-26 and scored the most goals in team history. The future looked bright.
Then came the 2017 season. A new home field. A slow start.
The Nightwatch finished their third season at 0-14 and had -141 in goal differential which was the worst in the American Ultimate Disc League (AUDL). In three seasons, the Nightwatch is 5-37.
I would be surprised to see the Nightwatch return next season. When a team shows no signs of improvement, it is very difficult to keep a team. The surprising thing is the Nightwatch gets hundreds of players at their tryouts every year but they never seem to be able to get the right mix of talent to be truly competitive in the AUDL. There may need to be some coaching changes in order to put a better team on the field.
Speaking of the field…..
Worst decision ever to move home games from Overton High School in Franklin to Hunter Lane High School in North Nashville. The field is terrible. For day games, the sun is shining directly into the fans’ eyes and just not a good game experience. Obviously, the team isn’t going to play in Nissan Stadium but a location closer to more fans would be ideal such as closer to Vanderbilt. A practice field at Vanderbilt? Find a better location that’s CLOSER to Nashville. I have always told my wife that if we were to ever win the lottery that we would buy the team and build them a stadium.
I’m not going to be down on the players. They played hard this season. It is frustrating for them as well to play an uphill battle the entire season. The closest game was a 14-11 loss to Jacksonville on April 23rd.
I didn’t cover much of the Nightwatch this season because, well, there wasn’t much to cover. When you are going through a winless season, it is difficult to write positive things. The excitement over the Nashville Predators’ Stanley Cup playoff run was a difficult shadow to play in. The Nightwatch is already invisible to the media. No coverage. No support. That makes a winless season even more difficult.
Ultimate Frisbee is an exciting game to watch and lots of action. If you have never been to a game, you need to make the effort to go to one if you have an AUDL team near you. There are some very talented players.
I really hope the Nightwatch will return but if they don’t improve their quality of play on the field – on a good home field – I don’t know how much longer they can survive.
Posted in Sports | Tagged audl, nashville nightwatch, nashville sports teams, ultimate frisbee | Leave a reply
Nightwatch Drop Home Opener To Atlanta
The Nashville Nightwatch hosted the Atlanta Hustle in their American Ultimate Disc League (AUDL) home opener on Saturday night at Hunter Lane High School in front of over 175 fans. After playing even in the first quarter, 9-9, the Nightwatch had some key turnovers to allow the Hustle to open up an 18-14 lead at halftime which the Nightwatch could never overcome. The Nightwatch fall to 0-2 on the season.
The Nightwatch looked promising in the first quarter with some tight play but was unable to sustain it throughout all four quarters in the loss. The team also looked out-of-synch at times and not the fluid play they had at the end of the 2016 season.
The Nightwatch will host the Jacksonville Cannons next Sunday at noon.
I’m not really a fan of the move to Hunter Lane High School in North Nashville. The field is awful and the home side must deal with looking directly into the sun until the sun sets. We ended up moving over to the shade on the visitors side. It also seems a lot further away from downtown. Last years’ Overton High School location was better but still too close to the interstate. Let’s just say that I am glad I didn’t get season tickets.
Also, I was totally not a fan of the announcer and the music. The music was almost unbearable and a terrible selection to play. The Mario Brothers and Simpsons sound effects are totally outdated and would do better to calm it down. Honestly, I almost left before the game even started because of the annoying loudness of the music.
My observation after the first home game is that much improvement is needed on and off the field.
Posted in Sports | Tagged american ultimate disc league, Atlanta hustle, audl, nashville nightwatch, ultimate frisbee | Leave a reply
Nashville Nightwatch Release 2017 Schedule
Posted on February 9, 2017 by miltonhooper
The Nashville Nightwatch will be back for the 2017 season in the American Ultimate Disc League (AUDL). The Nightwatch will open their third season at Jacksonville then opens at home two weeks later against Atlanta. The defending AUDL champions, Dallas Roughnecks, will come to Nashville on April 29th. Here is the complete schedule (home games in bold):
April 1 – at Jacksonville
April 15 – Atlanta
April 23 – Jacksonville
April 29 – Dallas
May 6 – at Dallas
May 7 – at Austin
May 13 – at Atlanta
June 3 – Austin
June 10 – at Raleigh
June 18 – Raleigh
July 1 – Austin
July 8 – Raleigh
July 14 – at Atlanta
July 15 – at Jacksonville
The Nightwatch finished 3-11 last season to exceed their win total from 2015. They closed out the season with an impressive 30-26 win over the Jacksonville Cannons. They scored a franchise-high with 30 goals in the game.
If you have not attended a Nightwatch game and live in the Nashville area, please mark your calendar and at least try one game. The sport is very exciting to watch and usually lots of scoring. This could be a break-out year for the team.
Posted in Sports | Tagged audl, nashville, nashville nightwatch, ultimate frisbee | Leave a reply
Major League Ultimate Is Grounded
Posted on December 27, 2016 by miltonhooper
The lesser known professional ultimate frisbee league has announced that they were suspending operations indefinitely when its investors pulled their funding. Major League Ultimate (MLU) was formed in 2012 when the Philadelphia Spinners left the American Ultimate Disc League (AUDL) after disagreements on how the league was run. The Spinners created their own league and began play in 2013. In the first season, the Boston Whitecaps captured the first MLU title over the San Francisco Dogfish. The Whitecaps also won the title in 2015. The Spinners took the title last season over the Portland Stags.
The league owned the league’s franchises which were located in Boston, DC, New York, Philadelphia, Portland, San Francisco, Seattle and Vancouver.
The AUDL has had some franchise changes of their own but plans to play in 2017. There is no word on whether the former MLU teams will merge or become a part of the AUDL. The AUDL had 26 teams competing in the 2016 season. The league has been around since 2012.
The local Nashville Nightwatch recently had hundreds of players at the 2017 tryout this month.
Posted in Sports | Tagged american ultimate disc league, audl, major league ultimate, mlu, nashville nightwatch, ultimate frisbee | Leave a reply
|
cc/2019-30/en_middle_0056.json.gz/line12353
|
__label__wiki
| 0.618932
| 0.618932
|
Credit Suisse director resurfaces at Mizuho after four years' consulting
by eFinancialCareers 19 February 2018
A former Credit Suisse director who spent the last four years running his own consulting firm has joined Mizuho as an executive director in London.
Michael Armer, who comes with 19 years of experience, specializes in electronic trading infrastructure, a much-demanded area of expertise right now. He will be an executive director responsible for fixed income infrastructure at Mizuho.
A graduate in mathematics from Durham University, Armer started his career with UBS Investment Bank as a trainee in 1999 and rose through the ranks over the next few years to become the director of global credit strategies. In a decade-long stint at UBS, he handled credit fixed income, high yield proprietary trading, and OTC structured confirmations among other things. He moved on to Credit Suisse in 2008 as a director and spent a little over five and a half years heading electronic trading, market infrastructure and IT within global credit products.
Armer left Credit Suisse in 2014 to co-found consulting firm Bailrigg+ with two other investment banking professionals. Bailrigg+ specializes in regulatory change, operational efficiency and risk, and control programs as well as offers program management for technology implementation in trading and sales environments. According to the consulting firm's website, Armer still serves as the director.
Mizuho has brought Armer onboard at a time when it is building its electronic trading business in America. The Japanese bank had launched the program trading and electronic trading groups last September to complement the equity offerings of its securities division.
Have a confidential story, tip, or comment you’d like to share? Contact: sbutcher@efinancialcareers.com
Goldman Sachs associate who joined Deliveroo has left one year later
The hidden meaning of banking bonuses
The worst banking jobs of 2018
European Private Equity
BDS Collateral management GTBS Senior Workflow Lead
Sr Administrative Assistant
|
cc/2019-30/en_middle_0056.json.gz/line12355
|
__label__cc
| 0.665609
| 0.334391
|
Fully Embedded Wi-Fi Module measures 30 x 18 mm.
RTX Telecom A/S Mar 02, 2012
Accelerating and facilitating application development of low-power sensor and actuator solutions, RTX4100 enables devices, machines, and other systems to connect directly to Internet for range of M2M applications. Module can be integrated into devices to support wireless standards, including 802.11 b/g/n; employs Energy Micro EFM32 Gecko MCU and Qualcomm Atheros AR4100 Wi-Fi System-in-Package; can use existing infrastructure, and works out-of-the-box with applicable cloud services.
RTX Launches World's Smallest Fully Embedded Wi-Fi Module
Aalborg, Denmark & San Jose, California - RTX, a leading provider of wireless communications solutions has announced that it is launching the world's smallest fully embedded Wi-Fi module, the RTX4100, together with Energy Micro at the Embedded World exhibition in Nuremberg, Germany at the end of February.
The RTX4100 Wi-Fi module allows fast and easy application development of low power sensor and actuator solutions - enabling devices, machines and other systems to connect directly to the Internet for a wide range of emerging machine to machine (M2M) applications. Embedding Wi-Fi directly inside a device makes installation extremely simple as it can use existing infrastructure and works "out of the box" with applicable cloud services.
The module is ideal for application development due to its small footprint, high efficiency and low power consumption, which is achieved through the use of the Energy Micro EFM32 Gecko MCU and the Qualcomm Atheros AR4100 Wi-Fi System-in-Package.
Peter Mariager, chief technology officer at RTX, comments, "Our Board Support Package and application framework makes rapid and efficient development possible, and the customer can choose from a range of different libraries to rapidly enable e.g. emerging white goods and smart energy applications to be integrated using a zero-cost tool chain."
"The RTX4100 Wi-Fi module can be integrated into devices to support various wireless standards including 802.11 b/g/n. The module features a built-in and an external antenna."
Energy Micro's worldwide vice president of sales and marketing, Andreas Koller, comments, "EFM32 Gecko microcontrollers are a perfect fit for the low power wireless applications made possible with RTX's Wi-Fi module. We are delighted that RTX has achieved such a significant low power advantage by integrating our energy friendly Gecko MCU into their module."
At a time when the growth of the Internet-connectable M2M market is soaring, RTX's new Wi-Fi module will meet the demand for small low-cost and low-power products.
Jesper Mailind, CEO of RTX, comments, "The small RTX4100 Wi-Fi module, measuring just 30x18 mm, reduces the complexity involved in advanced Wi-Fi application designs. Developers can bring their product to market faster using less energy and space compared to existing solutions. This is really an important step forward for M2M communication worldwide."
Adam Lapede, senior director of product management, Qualcomm Atheros, comments: "This module is an expansion of the Qualcomm Atheros ecosystem that leverages the AR4100 low power 802.11n Wi-Fi, enabling use of small foot print, low cost, and low power microcontrollers for the 'Internet of Things' application space."
The RTX4100 Wi-Fi device and a demonstration with an embedded Twitter client can be seen at Embedded World on the Energy Micro stand in Hall 1, stand 1-523 between 28th Feb and 1st March 2012.
About Energy Micro
Energy Micro is a global provider of energy friendly microcontrollers and RF transceivers based on the ARM® Cortex(TM) processor core. Consuming a quarter of the energy of competing products, the company's ultra low power EFM32 Gecko MCUs and EFR4 Draco radios target energy sensitive applications, including smart metering, building automation, security systems portable health and fitness equipment and smart accessories. The products are supported by Energy Micro's Simplicity Studio, an easy-to-use software console helping to reduce embedded system development times by a half. Energy Micro is backed by leading Nordic venture partners, Northzone Ventures and Investinor. Further information is available at www.energymicro.com
About RTX
RTX designs and produces advanced wireless solutions for global clients across a variety of markets, including solutions for Enterprise PBX and VoIP communications, professional audio, consumer gaming, home automation, and smart metering. In addition, RTX provides a range of customizable ATE solutions for production testing of wireless devices. Since its founding in 1993, RTX has undertaken more than 700 projects incorporating technologies such as Bluetooth(TM), Wi-Fi, DECT, CAT-iq and VoIP. RTX is listed on the NASDAQ OMX Nordic stock exchange, is headquartered in Denmark, and has offices in Hong Kong and the US. Further information is available at www.rtx.dk
Curtis Schmidek
RTX America Inc.
sales@rtxamerica.com
Tel. + 1 (408) 441-8600
Miscellaneous Software
Reprogrammable Cartridges deliver on-site support.
New Artemis Embedded Systems Module Available in 15.5 x 10.5mm Size with Antenna
New AI Core XM2280 Modules Equipped with Two Intel Movidius Myriad X VPUs
Murata Launches LBAD0ZZ1RX NBIoT Cellular Wireless Module with an Arm Cortex M0 Processing Core
New Automotive Grade LCD Modules With Standard Wide Operating Temperature Range
|
cc/2019-30/en_middle_0056.json.gz/line12356
|
__label__cc
| 0.679658
| 0.320342
|
U.S. private payrolls rise; trade deficit narrows
January 6, 2016 - Business - Tagged: ADP, Chris Rupkey, Federal Reserve, United States - no comments
By Lucia Mutikani
WASHINGTON (Reuters) – U.S. private companies added workers at a brisk clip in December, pointing to underlying strength in the economy despite signs that growth slowed sharply in the fourth quarter.
Other data on Wednesday showed the U.S. trade deficit narrowed in November likely as efforts by businesses to reduce an inventory overhang pushed imports of goods to their lowest level in nearly five years, outpacing a drop in exports.
p> Payrolls processor ADP said private-sector employment rose by 257,000 last month, the largest gain since December 2014, after increasing by 211,000 in November. However, the ADP data tends to overstate job gains in December because of a year-end accounting quirk.
"The labor markets are finishing the year with a bang, that's for sure. December was moreover extraordinarily warm as well, which means the number may exaggerate the labor market strength," said Chris Rupkey, chief financial economist at MUFG Union Bank in New York.
The ADP report, which was jointly developed with Moody's Analytics, was released ahead of the government's more comprehensive December employment report on Friday.
According to a Reuters survey of economists, nonfarm payrolls probably increased 200,000 last month, on top of the 211,000 jobs added in November. The unemployment rate is seen unchanged at a 7-1/2-year low of 5 percent.
Labor market strength suggests the economy's fundamentals remain healthy, & some economists say that could keep the Federal Reserve on course to raise interest rates again in March.
The U.S. central bank last month raised its benchmark overnight interest rate by 25 basis points to between 0.25 percent & 0.50 percent, the first rate increase in nearly a decade.
U.S. stock index futures were trading sharply lower on Wednesday, while prices for U.S. government debt rose. The dollar was little changed against a basket of currencies.
TRADE DEFICIT SHRINKS
In a separate report, the Commerce Department said the trade deficit fell 5.0 percent to $42.4 billion in November.
Despite the shrinking trade gap, declining exports are the latest indication that economic growth braked sharply in the fourth quarter. While inventories likely accounted for much of the drop in imports, the weakness could moreover be pointing to a slowdown in domestic demand, which was flagged by weak December automobile sales.
Trade, which subtracted 0.26 percentage point from gross domestic product in the third quarter, is likely to have remained a drag on growth in the fourth quarter.
A strong dollar & the inventory bloat, which has left businesses with little appetite to order more merchandise, have combined with spending cuts in the energy sector to take some steam out of the economy in recent months.
Economists this week slashed their fourth-quarter GDP growth estimates by as much as one percentage point to as low as a 0.5 percent annual pace, which moreover accounted for the impact of unseasonably warm weather on sales of winter apparel & other merchandise.
The economy grew at a 2 percent annual rate in the third quarter. Businesses accumulated a record pile of inventory in the first half of 2015, which was unmatched by demand, leaving warehouses bulging with unsold goods.
Imports of goods dropped 2.0 percent to $183.5 billion in November, the lowest level since February 2011. Imports of industrial supplies & materials were the weakest since May 2009. There were moreover declines in imports of capital & consumer goods.
Lower oil prices as well as increased domestic energy production moreover helped to curb the import bill. The price of petroleum averaged $39.24 per barrel in November. That was the lowest level since February 2009 & down from $40.12 in October & $82.92 in November 2014.
The dollar gained almost 10 percent against the currencies of the United States' main trading partners last year, eroding the appeal of U.S.-made goods overseas.
Goods exports slipped 1.1 percent to $122.2 billion in November, the lowest level since June 2011.
Exports of industrial supplies & materials hit their lowest level in five years, while petroleum exports were the weakest since December 2010. Exports of non-petroleum products dropped to their lowest level since June 2011.
The decline in exports to the United States' main trading partners was nearly broad-based in November. But the politically sensitive U.S.-China trade deficit fell 5.2 percent to $31.3 billion in November.
(Reporting by Lucia Mutikani; Additional reporting by Dan Burns in New York; Editing by Paul Simao)
Budget, Tax & EconomyPolitics & Governmenttrade deficit
|
cc/2019-30/en_middle_0056.json.gz/line12357
|
__label__wiki
| 0.652878
| 0.652878
|
Home › Politics
Republican Refuses To Apologize For Comment Sympathizing With Slavery
Catherine Templeton's ignorance about the true history of the United States is sadly not uncommon.
Written By NewsOne Staff
A Republican candidate for South Carolina governor has refused to apologize for her recent comments about the central role that slavery played in shaping the Civil War. Catherine Templeton‘s denial and ignorance about slavery in American history and its consequences on Black folks today are shockingly common.
SEE ALSO: Proposal For Black Confederate Soldiers Monument Fuels A Myth
Here’s the myth that Templeton told Bob Jones University students on Friday: The Confederacy fought the Civil War because “the federal government was trying to tell us how to live,” denying that the South fought mainly to keep slavery, according to the Associated Press. The labor lawyer was standing her ground and refusing to apologize for her erroneous statement or for defending her family’s participation in the war.
JUST IN: SC gov hopeful Catherine Templeton tells me that efforts to portray her as a slavery sympathizer are "disingenuous, dishonest and disgusting." In wake of flap over her comments at Bob Jones Univ., she says she's acknowledging her family, "warts and all." Story in edit. pic.twitter.com/xnera590xp
— Meg Kinnard (@MegKinnardAP) February 3, 2018
“She has said some terrible things already this campaign but to say that the federal intervention to end slavery, segregation & government sanctioned discrimination was wrong is utterly despicable,” South Carolina state Rep. Leon Stavrinakis responded on Twitter.
Much of the seemingly widespread ignorance among White southerners with roots that go back to the Confederacy stems from a failure of schools to teach the proper and contextual facts surrounding slavery and the Civil War. Just 8 percent of high school seniors were able to identify slavery as the main cause of the war, according to a new Southern Poverty Law Center (SPLC) study. Most of those surveyed didn’t know, for example, that a constitutional amendment formally ended slavery or that slavery was legal in all colonies during the American Revolutionary War.
@realDonaldTrump, I won't enrich the NFL by even watching the Super Bowl. But for those who can stand, yet choose to kneel… pic.twitter.com/astSqAOdn4
— Catherine Templeton for Governor (@TempletonCath) January 31, 2018
“If we are to move past our racial differences, schools must do a better job of teaching American slavery and all the ways it continues to impact American society, including poverty rates, mass incarceration and education,” SPLC stated.
Racist Facebook Group Is Trying To Destroy ‘Black Panther’ And They Will Fail
Trump’s Lies About Black Unemployment Come Back To Haunt Him In The Worst Way
11 Powerful Images At The Women’s March 2018
Civil War , Slavery , Slavery Sympathizing
More By NewsOne Staff
Cops Arrest Man For Licking Ice Cream Video As Viral Food Tampering Challenge Thrives
Videos Of White People Calling Cops On Innocent Black People Go Viral Over Holiday Weekend
Amber Guyger’s Lawyers Say She Can’t Get A Fair Trial In Dallas As Prosecutors Tighten Their Case
|
cc/2019-30/en_middle_0056.json.gz/line12358
|
__label__wiki
| 0.749532
| 0.749532
|
Pete and Sally Smith Foundation donates $100k to Sullivan Center’s mobile health initiatives
Michael Staton, College of Behavioral, Social and Health Sciences
Sen. Thomas Alexander, the Tiger, Anita Chambers and Paula Watt (left to right) celebrate the unveiling of the Sullivan Center’s large mobile clinic during a November 2016 ceremony.
Image Credit: Clemson University
CLEMSON — The Pete and Sally Smith Foundation has committed $100,000 to support Clemson’s Joseph F. Sullivan Center, a nurse-managed clinic located on the university’s campus. Beyond supporting campus wellness for Clemson students, faculty and staff, the Joseph F. Sullivan Center provides outreach to many underserved communities throughout the Upstate of South Carolina through the use of mobile health clinics.
The Sullivan Center has used mobile health clinics for 28 years and is taking steps to expand this effort. The center plans to use the $100,000 gift from the Pete and Sally Smith Foundation to purchase two mid-sized SUVs that it will employ to more efficiently provide follow-up visits or specific health care services in conjunction with the center’s larger mobile clinic.
These additions will effectively create a fleet of vehicles to provide low-cost health care to those in need. Paula Watt, executive director of the Sullivan Center, said this gift will enable the center to support more locations and remove barriers to care in rural communities, particularly those in Oconee County.
Watt said these additional vehicles are only part of a planned expansion that the center hopes to continue in the near future. The center hopes to acquire and outfit additional units that can single-handedly hold smaller clinics or conduct mini-campaigns in conjunction with the larger unit and those made possible by the foundation.
“We’ve used the larger mobile clinic to make big pushes across the state that have improved health care outcomes for underserved populations,” Watt said. “These new units will act as satellites to that main unit, providing targeted visits and more specific services to patients we encounter during those initial pushes.”
The services these units can provide will depend entirely on how they are outfitted. Watt said the center plans to include screening technology on board one or both units that will allow staff to perform wellness-based chronic disease prevention, follow up to breast and cervical cancer screenings, cardiovascular screening and education, and general acute and chronic care.
Sullivan Center employee and recreational therapist Audrey Rivers leads a line dancing session outside of Clemson’s mobile health clinic at a Clemson tailgate event last year.
Image Credit: Audrey Rivers
Watt said the center’s staff has already begun to refer to these units as Compact Utilities for Basic Services or CUBS. Like the larger unit, the smaller CUBS will be outfitted with solar technology that will provide environmentally friendly power for the units when parked that reduces operating costs.
Expanding mobile outreach efforts will provide students from multiple departments at Clemson with the opportunity to understand and solve problems for South Carolina’s most vulnerable citizens. Thanks to mobile outreach efforts over the last 10 years, Watt said the center has increased clinical encounters from around 4,500 per year to nearly 13,000.
“Every encounter is a patient who is receiving information or services they would otherwise go without,” Watt said. “Plus, our students are getting real, hands-on experience with this population and understanding the difficulties these individuals face in obtaining health care in general.”
The Pete and Sally Smith Foundation primarily supports charitable causes in the areas of education, the environment, and medical research/disease management in Rhea County, Tennessee, and Oconee County, South Carolina.
Located on the first floor of Edwards Hall on the Clemson campus, the Joseph F. Sullivan Center is a nurse-managed health center that provides health services to Clemson employees and community outreach programs to rural and underserved communities and individuals. The Sullivan Center is part of Clemson’s College of Behavioral, Social and Health Sciences.
College Of Behavioral, Social And Health Sciences, Giving, University News
Academics, Faculty, Joseph F. Sullivan Center, Outreach, Students
Faculty, students research use, management of 17,000-acre Clemson Experimental Forest
Clemson’s Out of Darkness Campus Walk aimed at suicide awareness and prevention
Solar-powered mobile clinic to be featured at international expo on smart technology
Clemson’s Sullivan Center to unveil world’s first solar-powered mobile health clinic
Paula Watt
pwatt@clemson.edu
Michael Staton
mstaton@clemson.edu
The Pete and Sally Smith Foundation
Joseph F. Sullivan Center
Clemson University College of Behavioral, Social and Health Sciences
|
cc/2019-30/en_middle_0056.json.gz/line12359
|
__label__cc
| 0.655427
| 0.344573
|
Engine History
Whatever it is, it's better in the wind…
Posts Tagged ‘Death’
The Twin Peaks Carnivàle
Posted in Motorcycle, tagged 177 persons arrested, A "change your life" moment, Alcohol, Anderson, ATF, Bandidos, Brutal Pedigree, Bureau of Alcohol Tobacco Firearms and Explosives, Carnivàle, Central Texas, conspiracy theorist, Control the narrative, Cossacks, Death, Deja Vu, Donald Charles Davis, intriguing, Katherine K. Young, Killing, Law Enforcement, Leo, litigation delays, May 17 2015, Motorcycle Clubs, mysterious, outlaw motorcycle gang, phonetically reversed speaking, secret language, Show of Force, SOA, Sons of Anarchy (SOA), Texas, The Aging Rebel, Tobacco, Twin Peaks, Twin Peaks Massacre, Twin Peaks TV series, TX, Violence, Waco on April 24, 2017| Leave a Comment »
Twin Peaks Restaurant
Nearly two years after a deadly and horrific shooting it remains clouded with mystery, is intriguing and familiar, all at the same time.
There are unexpected admirers, hundreds of legal proceedings and thousands of investigative hours completed to date. There is an on-going “outlaw motorcycle gang” task force and there was an interesting book written by Donald Charles Davis aka. “The Aging Rebel” about Texas law enforcement, the clubs, the personalities and the event.
Photo sampling of Twin Peaks shooting
Of course, I’m talking about the “Twin Peaks Massacre” — the deadliest biker violence in U.S. history that took place on May 17, 2015.
Make no mistake, some motorcycle clubs never shy away from flaunting their brutal pedigree, and in Waco, TX the shootout left 9 dead (four by police) and 18 wounded in or near the popular Central Texas restaurant. Reportedly a dispute broke out, escalated to include knifes and firearms and then spilled into a shooting rampage in the restaurant parking lot. Remarkably, law enforcement was aware of the large “gathering,” along with the potential for trouble and were pre-positioned in a show of force to address or stamp down any violence.
Shooting aftermath…
If only the parking lot could talk…
Once the deadly shooting brawl subsided, law enforcement arrested 177 persons (173 male and 4 females) from a variety of motorcycle clubs as well as everyday motorcycle enthusiasts/patrons who were in attendance. Some may have rode in for fine dining, but they didn’t ride out. Instead they were arrested on organized crime charges.
Yeah it’s Texas, but the Bureau of Alcohol, Tobacco, Firearms and Explosives retained and have in possession more than 475 weapons from the scene, including at least 151 firearms.
Sure, it can be a messy world, but this was no motorcycle episode of Sons of Anarchy debating how the biker life is too short for would-haves and the need to follow your own compass. This was a disgustingly brutal and super bloody mass killing on full display during a public motorcycle “gathering.” Is there any doubt why the press and media continue to push a negative biker narrative?
Sadly, the nine dead were members of the Bandidos and Cossacks motorcycle clubs.
Within a few hours accusations that the shootings were an aggressive overreaction by law enforcement began. Then within days the conspiriacy rumors surfaced that it was a Federal agency tactic, motivated to bring the 1% clubs down. And if that didn’t spark enough law enforcement skeptisim, many of the mass arrests were misclassified and have created severe consequences to innocent people not to mention the potential for numerous civil rights violations.
Jump forward nearly 2-years after the gathering and shooting spree or massacre, there remains 154 persons, currently under indictment. Nobody has been cleared. 38 people, including women, are still “under investigation.” One indictee and one potential indictee has died during this lengthy delay to find justice.
There’s been a number of national and international publications “explaining” the event. From the beginning, authorities in Texas have worked to control the narrative of what happened at Twin Peaks. Almost 200 people potentially face long prison terms for conspiring to act criminally although prosecutors have refused to state what each of those defendants actually did other than what looks like they were trying to survive a mass shooting event.
Over the years motorcycle enthusiasts have become familiar with government entities nibbling away at their freedoms and this has a Déjà vu feeling.
I wasn’t there, but can imagine this event being a “change your life” moment. I do recall instances of being in a public setting with riding buddies, other motorcycle enthusiasts along with various motorcycle club members enjoying the rally experience. Only to witness a spark of personality that ignites a “bring it on bigger” a‘tude and the flaunting of an aggressive remedy putting everyone at risk.
I was born at night, but it wasn’t last night and being attentive to your surroundings can be just as important to protecting yourself as putting on a helmet. I like riding motorcycles and the overall rally/group experience, but I also like my life away from it.
But I’ve digressed.
I’ve been monitoring the bits of information about this shootout as well as the legal proceedings and am reminded of that carney (Anderson) in the Twin Peaks TV series. Every summer the Carnivàle came to town. The strange little fellow spoke in an unusual manner. He would speak backwards and used phonetically reversed speaking as a “secret language.”
It’s as if there is some type of “secret language” being used in Waco.
I’m not a conspiracy theorist, but according to Katherine K. Young who wrote in her book — “every real conspiracy has had at least four characteristic features: groups, not isolated individuals; illegal or sinister aims, not ones that would benefit society as a whole; orchestrated acts, not a series of spontaneous and haphazard ones; and secret planning, not public discussion” — all of this seems to imply that nothing with the Twin Peaks Massacre happened by accident, nothing is as it seems, and everything is connected.
Photos courtesy of Waco Tribune-Herald (Jerry Larson) and Google Image Search
Some references in developing this post:
Motorcycle Profiling Project
One Percenter Bikers
GQ Article
Aging Rebel
All Rights Reserved (C) Northwest Harley Blog
Two Wheels Of Freedom And DOT Helmets
Posted in ABATE, Fatalities, Harley-Davidson, Latest News, Legal, Legislation, Oregon, Organizations, Outlaw Biker, Products, Safety, Safety-Conscious, tagged 185th, 800000, Accident, Andrew Barns, Big Tobacco, Bikers Choice, Carbon Fiber/Kevlar versions, Certified, Certified Helmet, Cheap, Chinese, Crash Deaths Mount, Death, Dismissing Safety, DOT, False Sense of Security, Farmington Road, Fatality, Federal Standards, H-D, Harley, Harley-Davidson, HD, Made In China, Novelty Helmet, protection, Safety, Unapologetic, Vanity Helmets on July 14, 2014| 3 Comments »
On Saturday Andrew Barns, 26, died when a car pulled out in front of him on his motorcycle at 185th and Farmington Road shortly before 7 p.m. According to Sheriff reports he was wearing a novelty helmet and the medical examiner will determine if the novelty helmet contributed to his fatal injuries. No citations were issued (at this time) to the driver.
I didn’t know Mr. Barns, but would like to offer my condolences to his family and friends. It’s a sad day for all motorcycle enthusiasts and one to reflect on our choices.
Freedom and choice vs. safety
We’ve all heard the debate or been involved in a compelling argument on both sides of the helmet laws. There are some motorcyclists who do, but most don’t wear a novelty helmet as a symbol of resistance “against the man” i.e. protesting lesgislators that require bikers to wear certified helmets. Full Disclosure: I rode double digit years with a novelty helmet and even paid $2 for the DOT sticker to minimize chances of getting pulled over by law enforcement.
I don’t recall the exact moment, but I decided a few years ago that if I have to wear a helmet it might as well be one that offers some degree of protection and elected to switch to a certified helmet. Those of you who visit this blog regularly know there are a lot of freedom of choice posts and it was MY choice to purchase a DOT certified helmet. This may not reflect your thinking and that is your choice.
This post is about reflecting on our choices.
Clearly Mr. Barns accident was the auto drivers fault and I’m not trying to pile on to his tragedy, but it’s important to note that more than 800,000 novelty helmets are sold in the U.S. every year! That’s about the same number of motorcycles that were registered in the state of California in 2011.
In my view, the vendor/marketers of novelty helmets are like big tobacco–unapologetic, dismissing safety concerns, squelching debate and claiming they simply are accommodating consumer demand. Most all are made in China or India and even those Carbon Fiber/Kevlar versions are outright fakes. Sure it’s legal to make and sell novelty helmets as long as they aren’t falsely represented as meeting federal standards, but talk about a poster-child for proliferating cheap ineffective Chinese products as motorcycle crash deaths mount.
And I’m intrigued by the contradiction… Harley-Davidson motorcyclists complain about the cheap China made Harley trinkets or 3rd party chrome parts which they want no part of, but think nothing about buying a $29 “Made In China” novelty helmet believing that ‘something is better than nothing’ regarding its protection. But, I’ve digressed.
The National Highway Traffic Safety Administration agency has estimated that as many as 754 people die each year in states with mandatory helmet laws because they were wearing novelty helmets instead of certified headgear, which amounts to nearly 1 in 6 rider fatalities.
According to this study based on head trauma vs. non-head trauma deaths, head trauma deaths account for 34% of motorcyclist deaths. Many would agree that an approved/certified safety helmet is by far more protective and would overwhelmingly prevent serious injuries as opposed to a novelty helmet, but I would also like to see a correlation and follow-up on motorcycle licensing, training and education.
I am sure there are a fair number of riders out there who won’t appreciate this blog post. They will see my post as advocacy for the U.S. becoming a more repressed, intolerant and regimented place. More government intervention. Most blogs just don’t want to touch the topic. But, novelty helmets just don’t share the same distinguishing characteristics as certified helmets.
If we’re being intellectually honest as a group/industry, its important to spotlight helmet considerations in the ongoing debate over motorcycle safety.
The Barns tragedy compelled me to urge motorcyclists to think different–if you’re going to wear a helmet, why not consider or make it a certified one?
Photo courtesy of Washington County Sheriff’s Office.
All Rights Reserved © Northwest Harley Blog
Justice Finally Served On State v. Michael Jakscht
Posted in Events, Fatalities, Harley-Davidson, Latest News, Legal, Motorcycle, Safety, Safety-Conscious, tagged ABC, Accident, Associated Press, AZ, AZFamily.com, Bill Montgomery, Blue Sky Sanitation, Carefree Highway, Clyde Nachand, Dale Downs-Totonchi, Daniel Butler, Death, Ernie Lizarraga, Flaming Wreckage, H-D, HD, Influence of Methamphetamine, Jason Anania, Manslaughter, Maricopa County, Meth, Methamphetamine, Michael Jakscht, Motorcycle, Phoenix, Sanitation Truck, Stephen Punch, Toxicology Tests, Trash Truck, Truck, Trucker Bombs, Tweeker on October 3, 2012| 1 Comment »
Jakscht Taking Witness Stand
It took over 2 years, but I’m thrilled by the verdict!
Michael Jakscht, age 49 was found guilty on four counts of manslaughter. You may remember Mr. Jakscht from a previous blog post HERE.
It was March 2010 and he was the truck driver who drove his 12 ton trash truck through a pack of eight motorcycles carrying nine people at a stop light at the intersection of 27th Avenue and Carefree Highway near I-17 in Phoenix, AZ. Yes, I said the motorcyclists were all stopped waiting on the traffic light when Jakscht ran over the group.
It was a horrific and gruesome crash scene. Four people were killed, and five others were injured in the accident. Methamphetamine was found in Jakscht’s system at the time of the crash. His lawyer, however, had argued that Jakscht wasn’t under the influence at the time of the accident, and that the incident was caused by a mechanical failure in the truck.
Accident Scene – March 2010
Jakscht’s first trial took place in 2011 and it ended with a hung jury deadlocked at 9 to 3 for acquittal. Fortunately the Maricopa County attorney’s office (Attorney Bill Montgomery) chose to retry the case, and Jakscht was recently found guilty on four counts of manslaughter and on five counts of aggravated assault, one count of endangerment imminent death, and three counts of endangerment physical injury.
Nothing can bring back the four motorcyclist who were killed, but I hope the family’s of the deceased get some satisfaction in knowing that Mr. Jakscht is being held accountable for his actions. Sentencing is set for November 16 at 8:30am.
UPDATE: December 5,1012 – Mr. Jakscht was sentenced November 16th to 26 years in prison by Judge Joseph Welty. Under Arizona’s Truth In Sentencing Law Jakscht will do about 230 months. His release date will be late in the year 2031 or early in 2032.
Photos courtesy of ABC Channel 15 and AZFamily.com
Thank You Steve Jobs
Posted in Brand, Brand Loyalty, Latest News, Life Lessons, Living Life, Oregon, tagged 2005 Stanford commencement speech, Apple, Apple CEO, Apple II, Apple's co-founder, Bismarck, BMW, CEO, Death, Documentary, Film, Intel 4004 CPU, iPhone 4S, Minneapolis, Minnesota, Motorcycle, National Geographic, North Dakota, Nostalgia, Oregon, Reed College, Reflective Nostalgia, Star-trek game, Steve Jobs, Store #30, Team Electronics, Team Electronics (Store #30), Twin Cities, Wayne Wenzlaff on October 6, 2011| Leave a Comment »
Apple II Ad
Steve Jobs has passed away and what we’ll find over the next couple of weeks will be planned storylines about the life of Apple’s co-founder and his time in Oregon attending Reed College.
I had an article ready to post about the letdown of the iPhone 4S launch. Given all the hyperbolic speculation and secrecy leading up to the launch I’m not sure expectations could have ever been met, but it all just feels off. Like way off today.
I did a blog post HERE last year about Steve riding on a BMW, nostalgia and my early Apple experiences. I have very clear recollection of Apple when living in North Dakota attending college. For awhile I worked part-time at Team Electronics (Store #30) in Bismarck. This was circa 1977 and I distinctly remember when the first Apple II computer showed up at the store. In college we were learning how to write BASIC programs for an Intel 4004 CPU (4-bit). No one knew what to do with the Apple II (8-bit), but soon enough we figured out how to spent hours playing a Star-trek game (loaded by cassette tape).
Whether you love or hate Apple–or fall somewhere in between–it’s hard not to acknowledge that Steve Jobs was a remarkable and brilliant man. He’s also a man who we don’t really know a lot about in his personal life. But he’s also a man who changed a lot of lives. Mine included and I wanted to thank him for that today.
Wozniak and Jobs in the early days
Steve Jobs clearly loved what he did and I’ve returned several times to his 2005 Stanford commencement speech, where he said:
Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma–which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.
I didn’t really know what my reaction would be until the moment actually came. I’m profoundly sad today on the news of his passing. Steve’s remarkable ability to touch every person on the planet started in Minneapolis and for me it started in 1977. My heart goes out to his family and many friends.
Photo courtesy of Apple.
Obama Visit Results In Motorcyclist Death
Posted in Fatalities, Life Lessons, Motorcycle, Oregon, Politics, Safety, Safety-Conscious, tagged Accident, AMR ambulance, Death, Fatalities, Governor, John Kitzhaber, Legacy Emanuel Hospital, Motorcycle, Obama, Oregon, OSP, Peter Kendall Gunderson, Political, Portland Or, President Obama, Presidential Motorcade Accidents, Rally on October 21, 2010| 3 Comments »
Yesterday, President Obama returned to Portland, OR to try and fire up the Democrats or rekindle some political magic. There was an enthusiastic crowd estimated near 10,000 which packed the convention center and listened as the president stumped for John Kitzhaber, who is locked in a tight race for his old job as governor.
Sadly, the visit occurred in the middle of rush-hour traffic and triggered an accident on I-84 when eastbound traffic slowed to watch Obama’s motorcade traveling west from the Portland Air National Guard Base.
At about 6pm, a northeast Portland man (Peter Kendall Gunderson, age 59) was eastbound when he may have failed to see traffic ahead of him was slowing as police were closing down the westbound lanes for the upcoming presidential motorcade to travel in. Gunderson lost control as he braked for the slowing eastbound traffic. The motorcycle skidded then fell onto its side, sliding uncontrolled in the left eastbound lane until it hit underneath a stopped 2010 Chevrolet Camaro. The motorcycle came to rest near the center concrete barrier and quickly caught fire. Some witnesses pulled Mr. Gunderson away from the burning motorcycle to the far right eastbound lane. Mr. Gunderson was transported by AMR ambulance to Legacy Emanuel Hospital with critical injuries, but died this morning. The full OSP report is HERE. It’s unclear if police had enough lead time to plan a safer route in Portland.
Peter Gunderson Accident
I did a quick search and it turns out that there are many deaths across the U.S. just so the president or a dignitary doesn’t need to sit in traffic. Many are motorcycle officers, but some are similar to Mr. Gunderson being caught up in the police route.
For example, in 2006, a Honolulu officer died when he and two other motorcycle officers crashed while part of a presidential motorcade. In 2007, a police officer died after crashing his motorcycle while riding in a motorcade with President Bush. In 2008, Hillary Rodham Clinton’s only campaign swing through North Texas was cut short after a police officer in her motorcade died in a crash on the way to a rally. Also in 2008, an Albuquerque, N.M., police officer in President Bush’s motorcade died in a motorcycle crash.
I’m not blaming Obama – just pointing out that presidential motorcades aren’t safe for everyone! My condolences to Mr. Gunderson’s family.
No word if President Obama or anyone in his administration has tried to reach out to Mr. Gunderson’s family.
Photo courtesy of Oregonian and OSP.
See History In Route To Sturgis
Posted in Antique, Celebration, Events, Harley-Davidson, Latest News, Montana, Motorcycle, tagged 134th Anniversary, Arikara Tribe, Burial Party, Cheyenne, Cheyenne Tribe, Col. George A. Custer, Crow Agency, Crow Tribe, Culbertson Guidon, Death, Flag, Guidon, H-D, Harley, HD, History, Hwy 212, I-90, Lakota, Little Bighorn National Monument, Montana, Motorcycle, MT, Sergeant Ferdinand Culbertson, Sioux Tribes, Sitting Bull, Sotheby's, South Dakota, Sturgis Rally, swallowtail flag, U.S. Army on June 28, 2010| 1 Comment »
The Culbertson Guidon -- Custer's Last Stand
Last Friday marked the 134th anniversary of the battle.
I’m talking about The Battle of the Little Bighorn, also known as Custer’s Last Stand. It claimed, 263 soldiers, including Lt. Col. George A. Custer and attached personnel of the U.S. Army, who died fighting several thousand Lakota, and Cheyenne warriors led by Sitting Bull. They fought for their land near what’s now Crow Agency, MT when the government tried to drive the Indians off the land after white settlers discovered gold there. The Black Hills in southeastern Montana (present day South Dakota) were declared Indian land in the late 1860s.
A single swallowtail flag – or Guidon – is one of the few artifacts found from the battle. Guidons served as battlefield beacons marking company positions. The victorious Indians stripped the corpses of trophies, but missed the bloodstained flag, which was hidden under the body of a soldier. The Culbertson Guidon as it’s called was recovered by Sergeant Ferdinand Culbertson, a member of a burial party. It was sold for $54 in 1895 to the Detroit Institute of Arts who has now decided to sell it and use the proceeds to build its collection. The flag has been valued at $2 million to $5 million and will be auctioned sometime in October by Sotheby’s.
If you’re headed to the Sturgis Rally then the battlefield is a must see stop. It’s at the junction of I-90 and Hwy 212 and today the Little Bighorn National Monument offers up a wide range of activities and interpretive opportunities. I was there about 3 years ago and blogged about HERE. The Forest Rangers provide talks about the battle and there are a number of related items presented in the Visitor Center. I remember most an obelisk which commemorates the U.S. Army dead, and marks the spot of the mass grave where all U.S. soldiers were re-buried.
Tribal Sites: Crow Tribe; Arikara Tribe; Sioux Tribes; Cheyenne Tribe; http://www.c-a-tribes.org/
Photo of flag courtesy of Sotheby’s.
Driving Distracted
Posted in Fatalities, Harley-Davidson, Legal, Life Lessons, Living Life, Motorcycle, Safety, Safety-Conscious, tagged ABC, Accident, Associated Press, AZ, Blue Sky Sanitation, Carefree Highway, Clyde Nachand, Dale Downs-Totonchi, Daniel Butler, Death, Ernie Lizarraga, Flaming Wreckage, Fountain Hills, Influence of Methamphetamine, Jason Anania, Manslaughter, Meth, Methamphetamine, Michael Jakscht, Motorcycle, NPR, Phoenix, Sanitation Truck, Stephen Punch, Toxicology Tests, Truck, Trucker Bombs, Tweeker on April 9, 2010| 1 Comment »
Michael Jakscht
Two weeks ago a news flash zipped across my iMac screen about eight Phoenix-based motorcycle riders involved in an accident with a sanitation truck. Knowing that in about a month I planned to be riding in the same area of Arizona, the accident caught my attention.
If you’re unaware of the incident; on Thursday, March 25th a group of motorcyclists who were taking advantage of the nice weather, were literally run down by a Blue Sky Sanitation truck driven by Michael Jakscht, 46. The truck ran into the group of motorcyclists on Carefree Highway who were stopped at a stoplight, killing four of them and injuring five others. Photos from the scene are disturbing due to some motorcycles bursting into flames under the truck while others scattered flaming wreckage across the intersection.
Sure it’s true that motorcycles can’t be made as objectively safe (crush zones, front and side air bags, etc.) as cars—however, no motorist (in a car or on a motorcycle) expects to be run down while sitting idle at a stop light! Blue Sky Sanitation is a very small, limited liability company headquartered in Fountain Hills, AZ which employs about four people. At the time of the accident witnesses reported that there were no outwardly signs the truck driver being impaired. In fact, one witnessed stated that the driver commented how he was distracted doing paperwork. Within hours it was reported that Mr. Jakscht had a string of prior speeding and over-weight traffic violations.
Blue Sky Sanitation Truck
But, there is even more to the story. On April 6th police arrested Mr. Jakscht on suspicion of being under the influence of methamphetamine at the time of the crash, and booked him on four counts of manslaughter, five counts of aggravated assault and seven counts of endangerment. According to police, the initial toxicology tests on blood drawn from Mr. Jakscht on the day of the crash show he had the illegal drug methamphetamine in his system. He is currently being held in the 4th Avenue jail on a $1M bond and his initial hearing is set for April 13th.
Motorcyclists who died as a result of the crash were Daniel Butler, 35; Clyde Nachand, 67; Stephen Punch, 52; and Dale Downs-Totonchi, 47. Phoenix Fire Capt. Ernie Lizarraga, 52, who was part of the riding group remains hospitalized suffering from injuries sustained in the crash. In addition, Jason Anania, 48, is recovering at home from a shattered leg and bruised back.
When people get behind the wheel of a vehicle, they take on a responsibility to ensure their action does not put other people in danger. So we have a “tweeked” truck driver who ignored his responsibility and innocent motorcyclists were in my view murdered. The families of those victims can and will likely file a wrongful death lawsuit, but I’m sure Blue Sky Sanitation and Mr. Jakscht will go to extraordinary lengths to avoid accepting responsibility. While it’s how our litigious society works I do hope these people are brought to justice.
The death of a family member in an accident like this has to be a horrible experience. I want to express my heartfelt condolences to the families and hope for a full recovery of those injured.
Additional news reports HERE, and video coverage by ABC HERE. I’ve previously written about “trucker bombs” HERE.
Photo’s courtesy of Associated Press/NPR and ABC.
Archives Select Month August 2017 (5) July 2017 (1) June 2017 (4) May 2017 (5) April 2017 (6) March 2017 (2) February 2017 (1) January 2017 (1) November 2016 (1) October 2016 (1) September 2016 (2) August 2016 (7) July 2016 (12) September 2015 (1) August 2015 (2) July 2015 (4) June 2015 (5) May 2015 (1) February 2015 (2) January 2015 (1) December 2014 (4) November 2014 (2) October 2014 (4) September 2014 (4) August 2014 (9) July 2014 (14) June 2014 (11) May 2014 (12) April 2014 (2) March 2014 (1) February 2014 (8) January 2014 (7) December 2013 (3) November 2013 (6) October 2013 (5) September 2013 (7) August 2013 (7) July 2013 (9) June 2013 (16) May 2013 (12) April 2013 (5) March 2013 (8) February 2013 (7) January 2013 (6) December 2012 (6) November 2012 (6) October 2012 (10) September 2012 (12) June 2012 (8) May 2012 (9) April 2012 (6) March 2012 (9) February 2012 (3) January 2012 (7) December 2011 (9) November 2011 (3) October 2011 (6) September 2011 (6) August 2011 (5) July 2011 (6) June 2011 (9) May 2011 (13) April 2011 (7) March 2011 (12) February 2011 (16) January 2011 (5) December 2010 (12) November 2010 (4) October 2010 (12) September 2010 (15) August 2010 (14) July 2010 (21) June 2010 (17) May 2010 (10) April 2010 (20) March 2010 (17) February 2010 (21) January 2010 (11) December 2009 (17) November 2009 (14) October 2009 (7) September 2009 (26) August 2009 (25) July 2009 (24) June 2009 (26) May 2009 (19) April 2009 (19) March 2009 (24) February 2009 (18) January 2009 (26) December 2008 (25) November 2008 (21) October 2008 (43) September 2008 (35) August 2008 (28) July 2008 (18) June 2008 (13) May 2008 (17) April 2008 (14) March 2008 (6) February 2008 (6) January 2008 (12) December 2007 (5) November 2007 (8) October 2007 (17) September 2007 (3) August 2007 (12) July 2007 (10)
Harley-Davidson Two-Stroke Engine History
Outlaw Motorcycle Gangs Flying Colors in Oregon
V-Rod Recall
Domestic Drama Lands Laughing Devils “Sandman” In Jail
CEO's That Made Harley-Davidson
HOG Photos
1% 105th 105th Anniversary 110th Anniversary 2009 2010 ABATE Accidents Ads Advertising Age Baker City BMW Brand Buell CEO Earnings Economy Event Events FX H-D HAMC Harley Harley-Davidson HD Hells Angels Hells Canyon Motorcycle Rally HOG Honda Idaho Indian Keith E. Wandell Keith Wandell Las Vegas Laughlin Laughlin River Run Legal Legislation Leo Mark-Hans Richer marketing Milwaukee Motorcycle motorcycles Music Nevada NHTSA NV ODOT OMG OR Oregon OSP Portland President Project RUSHMORE Rally Recall Reno Ride Home Road Glide Road Trip Safety Sales SD SOA Sons of Anarchy South Dakota Street Vibrations Sturgis Travel Vets WA Yamaha
NWHog Comments
Time for a blogging… on Blogging Break
mistsr fixir on The Greedy, The Corrupt, The…
Phil on 31st Annual Shriners Toy …
Derrick Raj on Harley-Davidson Oil Line Clamp…
Big Dan on The Biker Community And Motorc…
SlimFMC on Behind The Scenes Of The Sturg…
Shane Manthe on …
It’s Time Ride
The Rumble Heard 'Round The World
Big Dog Cycles
C-51 Customs
Choppahead Custom Cycles
Choppers Inc.
Cro Customs
Cyril Huze Customs
Exile Cycles
Guilty Customs
Harley Restoration
Hippy Killer Garage
HOG Killers
Kendall Johnson Customs
Kickass Choppers
Klock Werks Cycles
Paul Yaffe Cycles
Phil’s Chopper Shack
Power Plant Choppers
Salinas Boys Choppers
Shinya Kimura
Vintage Twin
Walt Siegl Customs
Wild West Customs
GuyQGoods
Jamin Leather
Langlitz Leathers
Lollipop Lingerie
Desert Riders MC
Iron Pigs
Oregon Scooters
Oregon Vintage Motorcyclists
Rose City Motorcycle Club
Sunset HOG Chapter
Arizona Bike Week
Laughlin River Run
Rolling Thunder Rally
Street Vibrations
Female Riders
I Ride My Own
The Moto Lady
HD Forum
J&P Cycle
Motorcycle USA
Clutch and Chrome
Cycle Source Magazine
DicE Magazine
Gangsters Out
HOG Radio
IronWorks Magazine
Motorcycle Books
OSP News Releases
Police Accident Flash Alert
Thunder Press
A.B.A.T.E
Abu Dhabi H.O.G.
American Motorcyclist Assn.
BikePAC of Oregon
Bikers For Christ
H.O.G
Honor and Remember
Iron Butt Association
Ride To Work
Road Glide Org
Other Harley Blogs
Arizona Harley Dude
Big Money Blog
Cyril Huze Blog
Dave Dragon Blog
Gary S France
Harley Forums
Henshaw Hog Blog
Iowa Harley Girl
LimpNickie
Maniac Muddy Tires Blog
Motorcycle Philosophy Blog
Ms M’s
Road Captain USA
Road King UK
Road-Quest
Swags Rant
Travelin'gringo
Upright Motorcycle Brigade
V-Twin Motorcycle Blog
Women Motorcyclist
WWGinger Blog
Biker at Home
Clutch & Chrome
Custom Chrome
Gremlin Bells
H-D Challenger Coins
JP Cycles
K & G Motorcycle Parts
Leather Up
Motorcycle Fairing
OilBud™
Paradise Harley-Davidson
Refueled Magazine
Renegade Wheels
Slick Customs
Theobald Leather
Welding Supply
Best Biking Roads
ByWays
Greatest Road
Harley Route Planner
Idaho Byways
My Scenic Drives
Oregon Byways
Roads Northwest
Sunday Morning Rides
Trip Check
Motorcyle Safety Foundation
Saloon's
Broken Spoke
Wankers Corner
KGM Motorcycle Transport
|
cc/2019-30/en_middle_0056.json.gz/line12364
|
__label__wiki
| 0.676939
| 0.676939
|
/ J.J. Cale
/ In Session
Preview In Session
The Store For Music Ltd
T-Bone Shuffle
Ten Easy Lessons
Sensitive Kind
Hands off Her
Lou-Easy-Ann
Corine Corina
Crazy Mama
Fate of a Fool
Boilin' Pot
T-Bone Shuffle (2) (2)
T-Bone Backwards
I Got the Same Old Blues
Don't Cry Sister
Set Your Soul Free (Tell Me Who You Are)
℗ The Store For Music Ltd
© The Store For Music Ltd
Also by J.J. Cale
Preview Live: Town Park, Telluride, CO July 2, 1994 (Live FM Radio Broadcast Concert - Digitally Remastered)
Live: Town Park, Telluride, CO July 2, 1994 (Live FM Radio Broadcast Concert - Digitally Remastered) JJ Cale 2018 From $13.49
Preview Live: Ebbett's Field Denver CO 13 FEB '75 (Digitally Remastered)
Live: Ebbett's Field Denver CO 13 FEB '75 (Digitally Remastered) J.J. Cale 2016
In Session JJ Cale 2016 From $10.49
Preview J.J. Cale - Live on Kfc, San Francisco
J.J. Cale - Live on Kfc, San Francisco J.J. Cale 2015 From $8.33
Preview The Silvertone Years
The Silvertone Years JJ Cale 2011
Preview Rewind
Rewind J.J. Cale 2007
Sultans Of Swing - The Very Best Of Dire Straits Dire Straits 1998
Preview (Pronounced 'Leh-'Nérd 'Skin-'Nérd)
(Pronounced 'Leh-'Nérd 'Skin-'Nérd) Lynyrd Skynyrd 2001
Brothers In Arms Dire Straits 1985
Preview The Very Best Of Albert King
The Very Best Of Albert King Albert King 2007
Preview Thursday Night In San Francisco
Thursday Night In San Francisco Albert King 1990
Preview Home
Home Delaney & Bonnie 2006
|
cc/2019-30/en_middle_0056.json.gz/line12367
|
__label__wiki
| 0.773131
| 0.773131
|
NJ Politics Digest: Legal Weed Effort Failed, Assisted Suicide Approved
New Jersey Senate President Steve Sweeney. Kevin B. Sanders for Observer
Democratic legislative leaders and Gov. Phil Murphy were forced to abandon their efforts to legalize the recreational use of medical marijuana Monday. But the drama leading up to the measure being pulled due to a lack of support in the state Senate overshadowed action on other legislation that is arguably more groundbreaking and controversial.
The legislature approved the Medical Aid in Dying for the Terminally Ill Act, which allows for assisted suicide. Gov. Phil Murphy says he will sign the measure, according to a report in The Record.
Supporters have been trying to win approval of the measure for years, with efforts in 2014 and 2016 falling short in the state Senate, according to the report. On Monday, it passed with the minimum of votes needed in both the Senate and Assembly, the report said.
The plan will allow terminally ill and mentally competent patients to request and receive a prescription for medication that will end their lives.
The measure includes a variety of safeguards, according to the report. It also requires that the patient self-administer the medication.
The legislature approved the measure on the same day it failed to act on the plan to legalize and tax recreational marijuana use. Senate President Steve Sweeney pulled the plan after it became clear it didn’t have enough votes to pass in the senate, despite his and Gov. Murphy’s efforts to sway opponents, according to reports.
Reasons for opposition were varied, according to reports, ranging from people who favored decriminalization instead of legalization to others who claimed they couldn’t support plans to expunge the criminal records of those convicted of selling five pounds of weed.
While chastened by the failure to pass a priority of the governor’s in a legislature controlled by his party, Democratic leaders said they aren’t done trying to win approval for legalization. Sweeney said he might hold a vote after the November elections, when voters won’t have a chance to punish those who vote in favor of the plan, according to reports.
Quote of the Day: “I might’ve underestimated the challenge of getting this passed,” — Senate President Steve Sweeney, on the failed attempt legalize recreational marijuana use.
Another Pass at Legal Weed Before November Possible, Sweeney Says
Senate President Steve Sweeney said state lawmakers might make another run at marijuana legalization before November’s elections.
New Jersey Globe Read more
NJ Marijuana Legalization: Was Legal Weed Vote Cancellation ‘Defeat’? Or Just a ‘Setback’?
Was the cancellation of a New Jersey legal weed vote a hiccup or a major defeat?
Asbury Park Press Read more
NJ Democrats Join Call for Public Release of Full Mueller Report
New Jersey politicians are looking for the full release of the report by special prosecutor Robert Mueller into collusion with Russia and obstruction of justice by President Donald Trump, not just a summary letter of its findings by Trump appointee AG William Barr.
NJ101.5 Read more
NJ Approves Bill Allowing Medically Assisted Suicide and Gov. Murphy Says He’ll Sign It
New Jersey is poised to become the eighth state in the U.S. to allow terminally ill patients to legally end their lives after a vote Monday.
Dark Money Bill Headed to Murphy’s Desk
The Assembly will vote to concur with an amendment to a dark money bill that would require groups like the Murphy-aligned New Direction New Jersey to disclose their donors, a spokeswoman for Assembly Speaker Craig Coughlin told the New Jersey Globe.
NJ Sexual Assault Victims Will Soon Have More Time to Sue Abusers Under Bill That Just Passed
Despite fierce opposition from the Catholic Church, state legislators passed a bill today giving victims of sexual assault in New Jersey significantly more time to file lawsuits against their abusers.
Price Tag for Investigation Into Rape Claims Against Alvarez Clears $1M
Gov. Phil Murphy’s administration has paid about $1.2 million to two law firms handling the fallout of a scandal involving a former staffer who was accused of sexual assault, records show.
Editorial: Drain the SDA Swamp
The governor and the CEO of the Schools Development Authority both attended a state party meeting in Basking Ridge Tuesday night, and Phil Murphy’s sanctification of Lizette Delgado-Polanco was enough to make anyone with passing knowledge of her leadership at SDA yank their eyebrows out in large clumps.
Star-Ledger Read more
One in Five NJ Residents Have Contaminated Tap Water
Gov. Phil Murphy’s administration has ordered five companies responsible for widespread pollution of drinking water systems to spend millions of dollars to assess the extent of contamination and eventually clean up the pollution.
NJ Shark Fin Ban Bill: Assembly to Vote on Measure to Protect Sharks
The New Jersey Assembly will vote on a bill that will prohibit the selling, trading, distribution or possession of any shark fin that has been separated from a shark prior to its lawful landing.
Activists: Who Are the Unnamed Paterson Cops in the FBI Probe?
Federal authorities’ allegations that two unnamed city police officers stole money from citizens during illegal traffic stops have stirred criticism from community activists who say they are worried about rogue cops remaining on the job.
NJ Gun Buyback Set for Saturday, County’s First in Years
The Essex County Prosecutor’s Office and the Essex County Bar Foundation have announced a one-day guy buyback program on Saturday.
Filed Under: New Jersey Politics, Politics, nj politics, Phil Murphy, Steve Sweeney, Cory Booker, Robert Mueller, nj transit, Lizette Delgado Polanco
SEE ALSO: NJ Politics Digest: Will Legislature Flex Its Muscle in Fight Over Tax Breaks?
|
cc/2019-30/en_middle_0056.json.gz/line12370
|
__label__wiki
| 0.516753
| 0.516753
|
Government Regulators Caught OC Business Owner Cheating Employees
R. Scott Moxley | Posted on April 11, 2019 April 11, 2019
Orange County businessman Joseph Alvarez named one of his companies in honor of a Biblical passage (Philippians 4:13 LLC), but such religious sentiment didn’t stop him from systemically shortchanging 17 of his employees at senior assisted living facilities.
A United States Department of Labor investigation discovered that while owning Agape Cottages, Inc. and Agape Cottage Care Partners LLC, Alvarez failed to pay legally mandated overtime of nearly $200,000 from 2014 to 2016.
In March of 2015, government investigators ordered him to pay the money and get each employee to sign a form certifying receipt.
(Non-exempt employees must be paid time and a half for any work over 40 hours in a week.)
Alvarez paid the funds, got the employees to sign the form and then added a twist that eventually landed him in criminal trouble with federal prosecutors: He demanded the employees secretly return all of their overtime pay to him, claiming the money rightfully belonged to his company.
Facing a maximum punishment of six months imprisonment, he signed a guilty plea deal last year and hoped for leniency.
The defendant’s lawyer argued last month to U.S. Magistrate Judge Doug McCormick inside the Ronald Reagan Federal Courthouse in Santa Ana that Alvarez proposed adding one homeless person at each of his six facilities in exchange for no incarceration.
McCormick determined the appropriate punishment is a $10,000 fine, participation in a home detention program for six months plus electronic monitoring and supervised probation for two years.
R. Scott Moxley
CNN-featured investigative reporter R. Scott Moxley has won Journalist of the Year honors at the Los Angeles Press Club; been named Distinguished Journalist of the Year by the LA Society of Professional Journalists; obtained one of the last exclusive prison interviews with Charles Manson disciple Susan Atkins; won inclusion in Jeffrey Toobin’s The Best American Crime Reporting for his coverage of a white supremacist’s senseless murder of a beloved Vietnamese refugee; launched multi-year probes that resulted in the FBI arrests and convictions of the top three ranking members of the Orange County Sheriff’s Department; and gained praise from New York Times Magazine writers for his “herculean job” exposing entrenched Southern California law enforcement corruption.
CategoriesCourt, Crime-iny, News, Newsletter Edit TagsAgape Cottage Care Parnters LLC, Agape Cottages Inc., Doug McCormick, Joseph Alvarez, overtime pay, Philippians 4:13 LLC, Ronald Reagan Federal Courthouse, United States Department of Labor
2 Replies to “Government Regulators Caught OC Business Owner Cheating Employees”
Lovely Navarro says:
Yeah it’s TRUE they don’t pay the right amount for the caregivers I worked with them before and I’m hoping they will pay what it should be because my mom working with them with Joseph Alvarez co partner in bussiness they pay only $100.00 a day my mom love her job that’s why she’s still there .
Michael Goddard says:
My mother is currently a resident at one of his homes. Today, she texted me that he had come in and verbally abused her. This is a woman in her late seventies. I feel like there is more to this story than cheating employees.
|
cc/2019-30/en_middle_0056.json.gz/line12372
|
__label__wiki
| 0.589324
| 0.589324
|
Exploring the influence of trust relationships on motivation in the health sector: a systematic review
Background: Dedicated and motivated health workers (HWs) play a major role in delivering efficient and effective health services that improve patients’ experience of health care. Growing interest in HW motivation has led to a global focus on pay for performance strategies, but less attention has been paid to nurturing intrinsic motivation. Workplace trust relationships involve fair treatment and respectful interactions between individuals. Such relationships enable cooperation among HWs and their colleagues, supervisors, managers and patients and may act as a source of intrinsic motivation. This paper presents findings from a qualitative systematic review of empirical studies providing evidence on HW motivation, to consider what these studies suggest about the possible influence of workplace trust relationships over motivation. Methods: Five electronic databases were searched for articles reporting research findings about HW motivation for various cadres published in the 10-year period 2003 to 2013 and with available full free text in the English language. Data extraction involved consideration of the links between trust relationships and motivation, by identifying how studies directly or indirectly mention and discuss relevant factors. Results: Twenty-three articles from low- and middle-income countries and eight from high-income countries that met predetermined quality and inclusion criteria were appraised and subjected to thematic synthesis. Workplace trust relationships with colleagues, supervisors and managers, employing organisation and patients directly and indirectly influence HW motivation. Motivational factors identified as linked to trust include respect; recognition, appreciation and rewards; supervision; teamwork; management support; autonomy; communication, feedback and openness; and staff shortages and resource inadequacy. Conclusion: To the authors’ knowledge, this is the first systematic review on trust and motivation in the health sector. Evidence indicates that workplace trust relationships encourage social interactions and cooperation among HWs, have impact on the intrinsic motivation of HWs and have consequences for retention, performance and quality of care. Human resource management and organisational practices are critical in sustaining workplace trust and HW motivation. Research and assessment of the levels of motivation and factors that encourage workplace trust relationships should include how trust and motivation interact and operate for retention, performance and quality of care.
Okello, D. R., & Gilson, L. (2015). Exploring the influence of trust relationships on motivation in the health sector: a systematic. Human Resources for Health, 13(1):16
Okello, Dickson R O
Gilson, Lucy
Workplace trust
Health workers
Okello_trust_relationships_2015.pdf
Human Resources for Health
Except where otherwise noted, this item's license is described as Creative Commons Attribution 4.0 International (CC BY 4.0)
|
cc/2019-30/en_middle_0056.json.gz/line12379
|
__label__cc
| 0.67227
| 0.32773
|
OstroVit Supreme Capsules L-Carnitine 1250 60 caps
Withdrawal from the agreement
A fragment of the Store Regulations at http://www.OstroVit.com
§ 7 WITHDRAWAL FROM THE CONTRACT AND RETURN OF GOODS
The Customer may, within 14 (fourteen) days from the day of receiving the order, withdraw from the contract without giving any reason, and without incurring the costs specified below.
If the Buyer has chosen a method of delivery of the goods other than the cheapest usual delivery method offered by the Seller, the Seller is not obliged to refund the additional costs incurred by the Buyer.
The customer bears only the direct cost of returning the goods.
In the case of timely withdrawal from the contract and timely delivery of the returned order to the Seller, the Seller shall reimburse the Customer the entire payment received from the Customer.
The Customer may resign from all or part of the ordered goods by sending within 14 (fourteen) days from the date of receipt of the shipment containing the goods "Statement of withdrawal from the contract" to the e-mail address sales@ostrovit.com or in writing to Fitness Trading address: ul. Sitarska 16 18-300 Zambrów.
Customers who have an Account in the Online Store can make a return by completing the form located in the tab YOUR ACCOUNT / RETURNS OF GOODS / ADD RETURN.
The return of goods should take place within 14 (fourteen) days from the date on which the Customer renounced the contract. To meet the deadline, it is enough to return the goods before its expiry.
We suggest sending back returned goods if possible, in the original packaging, with original bands, without any traces of interference in their construction or use of them. The customer is liable for a decrease in the value of the goods as a result of using it in a way that goes beyond what is necessary to establish its nature, characteristics and functioning.
We suggest labeling the parcel with the returned goods with the information "RETURN OF GOODS". Shipments with returned goods should be sent or delivered in person to: Fitness Trading ul. Sitarska 16 18-300 Zambrów.
The Seller returns to the Customer the payment made by the Customer using the same method of payment as used by the Customer. The reimbursement of the payment shall be made by the Seller immediately, however not later than within 14 (fourteen) days from the date of receipt of the consumer statement of withdrawal from the contract. The seller may withhold the return of the payment until receiving the shipment containing the returned goods or proof of its return.
Please, secure the returned goods and not send them in envelopes or bubble envelopes. The seller does not accept parcels on delivery.
The right to withdraw from the contract is not vested in the Customer with respect to contracts in which:
the subject of the contract is the goods have a short expiry date, of which the Seller informed the customer when placing the order;
the subject of the contract are goods which, after delivery in a sealed package, have been opened and which after opening the packaging cannot be returned due to health protection or hygiene reasons;
the subject of the contract are medicinal products, foodstuffs for particular nutritional purposes and medical devices, in accordance with §6 par. 1 above.
|
cc/2019-30/en_middle_0056.json.gz/line12381
|
__label__cc
| 0.734317
| 0.265683
|
Welcome to our new PAC staff members!
Home Blog Welcome to our new PAC staff members!
We’ve had two exciting new additions to the Plymouth Arts Centre staff line-up this year, our Assistant Curator Lucy Rollins and PAC Home Co-ordinator Laura Edmunds.
Laura Edmunds, PAC Home Co-ordinator
Lucy will be working closely with Artistic Director Ben Borthwick to curate our public exhibitions, organise private art events and workshops as well as head up the PAC Home group with support from Laura. PAC Home is a network that supports local artists and since 2012 has continued to foster raising engagement in contemporary art, something that both Lucy and Laura are both passionate about.
Here we talk to them both about their experience, the local art community and what advice they would give to emerging artists:
Where does your passion for arts come from, and how did it bring you to Plymouth?
Lucy: I come from a very creative family – some of my earliest books when learning to read were about art. I studied at Dartington College of Arts before it closed and so was always open to moving to Devon again as I had lived in the area before.
Laura: My passion for the arts come directly from my experiences as an artist. I think it vital to be active within the arts sector of your city or town. I came to Plymouth for a lecturing post at Plymouth College of Art over a year ago, and since that, I have become a studio artist at KARST, and most recently, become PAC Home administrator here at Plymouth Arts Centre.
Before joining us here at PAC, what has been your favourite project to work on?
Lucy: One of the exhibitions that I planned as part of my Masters degree in Curating that I did at Goldsmiths. It is still unrealised and is the most in depth research and amount of time I have spent developing a show. You will have to watch this space for more info!
Lucy Rollins, Assistant Curator
Sounds exciting! You’ve both had different journeys to reach where you are now in the art community, do you have any advice for emerging artists?
Laura: As an arts administrator, lecturer and artist – I’ve experienced or observed from lots of angles and the main advice I could give would be to be visible in your city’s or town’s arts sector. Attending events, visiting exhibitions and supporting your peers is so important in sustaining a thriving arts ecology as well as inadvertently gaining support for your own practice through forging relationships with other artists, writers and curators. If there is an artist support network, such as PAC Home, join it! Get involved with the events it offers, host critiques, invite other artists to your studio.
Lucy: Yes definitely join artist network memberships like PAC Home! Be open and approachable at art related events like openings and talks.
What do you think PAC Home does well to foster conversations between artists?
Laura: PAC Home operates as a facilitator between artists, writers and curators and the wider arts sector. This includes peer-to-peer dialogue through crits and a reading group, but also fostering conversation with artists further afield through travel bursaries and Away Days to other cities, such as our recent Cardiff trip. We have just started the PAC Home Supper Club; an event where practitioners come to the PAC Home space armed with a dish and something to say about a past/present/future project or idea in a relaxed and supportive setting!
and finally, what are you most excited about in the local arts world?
Lucy: Mike Perry’s upcoming show Land/Sea, it’s the first exhibition I will have installed at Plymouth Arts Centre and the works are stunning!
Laura: Plymouth is a really exciting place to be at the moment – there is a real sense of energy in the city. The arts sector is being strengthened by ambitious multi-platform projects in the city, as a result of receiving Arts Council England’s Ambition for Excellence funding through the Horizon programme.
Mike Perry’s exhibition Land/Sea can be seen in the Plymouth Galleries from 7th April, with a preview evening on 6th April featuring the artist in conversation with PAC Artistic Director Ben Borthwick.
For more information on joining PAC Home as a member, you can download an information and application pack here.
29th March 2017 / Art, News, PAC Home
Film Review: The Lady in the Van
Scribe: A Modern Thriller With A Retro Sensibility
Open Air Cinema Preview: The ‘Yellow Submarine’ is sailing to the big screen at Tinside Lido
Wednesday 4th July 2018
First Time at Plymouth Arts Centre
On Placement: Curating The First Humans Exhibition
Tuesday 23rd February 2016
Review: Blade Runner 2049 – ‘outstanding, high-concept, blockbuster sci-fi’
Return of the PAC – Looe Street Detectives
Film Review: Spotlight
|
cc/2019-30/en_middle_0056.json.gz/line12394
|
__label__wiki
| 0.659143
| 0.659143
|
post-Gutenberg
what comes next?
The Riddle of Ramanujan
Censorship by the press
E-publishing as deus ex machina
The Indian Genius
Cheryll Barron 4th Estate moves, Blogging and bloggers, Leveson InquiryArgo, Don Quixote, Movies about real-life events, Robinson Crusoe, Simon Jenkins, The lost art of storytelling, Truth and film-making, Zero Dark Thirty
Which is worse: fantasy presented as fact by a high-ranking veteran journalist — or by film-makers not in the documentary business?
Third view of ‘The Mysterious Baths,’ Giorgio De Chirico (see the last two posts)
Photograph by MIL22
Surrealism. Surely, the art movement for our time.
What other tradition in image-making supplies better backdrops for recent events in — say, the dance between media and human life?
On that subject, we are making quick notes about what we know we will find impossible to believe without them, at some future date:
Item 1: a well-known columnist and ex-editor, Simon Jenkins, howls in outrage about facts twisted to heighten the drama in two feature films inspired by recent history.
His opinion on the subject matters. He has been chosen as a special adviser on decisions related to future press regulation, the focus of governmental negotiations with newspapers in the wake of the Leveson Inquiry. This is an appointment that, for reasons deducible below, amounts to giving the machine-wrecking Ned Ludd of Luddite fame a job as factory foreman.
Simon says, about two new films, Argo, whose subject is the escape of U.S. diplomats from Iran in 1979, and Zero Dark Five, a dramatisation of the military operation that killed Osama bin Laden:
Makers of films captioned as “true stories” claim either that fabrications do not matter as they are “just making movies”, or that they are justified in a higher cause. Yet they can hardly be both. Cinema in my view is the defining cultural form of the age. It deserves to be taken seriously, and therefore to be criticised for shortcomings. If the most celebrated of “docudramas”, Spielberg’s Schindler’s List, could go to lengths to authenticate its storyline, why should not any film claiming truth to history?
This is an intrinsically odd objection. The tradition of pretending to tell the truth in the service of art goes back as far as the book considered by some authorities to be the first novel, in the West, Don Quixote (originally, The Ingenious Gentleman Don Quixote of La Mancha; 1605). Miguel de Cervantes, the author, pretended to be merely the translator of an actual historical record of Quixote’s adventures by a Moorish scribe, Cide Hamete Benengeli. The exhausting true title of the book most of us know as Robinson Crusoe (1719) is The Life and Strange Surprising Adventures of Robinson Crusoe, of York, Mariner: Who lived Eight and Twenty Years, all alone in an uninhabited Island on the Coast of America, near the Mouth of the Great River of Oroonoque; Having been cast on Shore by Shipwreck, wherein all the Men perished but himself. With An Account how he was delivered by Pirates.
A delightful essay about Daniel Defoe’s winking invention of Crusoe — unrelated to the subject of this blog — appeared in The Wall Street Journal a few days ago. It describes critics complaining about Defoe ‘going too far in in creating the novel’s solid sense of actuality’. But that is irrelevant to its status in posterity. The essayist, Danny Heitman, is hardly isolated in declaring that ‘the book’s most abiding message is its affirmation of literature itself.’
Item 2: the same journalist, Simon Jenkins, foists a bizarre reality-distortion field on readers every time he writes about internet culture and our increasingly computer-permeated lives.
Against ever-longer odds, he strains to persuade us in elegant prose that we are well on our way to post-digital life. Is he joking? Apparently not, as he goes to pains to present curious factoids for substantiation — for instance, these:
A mild sensation was created this summer by the revelation that Google, Apple and Yahoo executives were sending their children to California’s Waldorf schools, where computers are banned. The masters of the e-universe appear convinced that computers “reduce attention spans and inhibit creative thinking, movement and human interaction”. Classes have reverted to using blackboards, chalk, pens, paper, books and even teachers.
Post-digital is not anti-digital. It extends digital into the beyond. The web becomes not a destination in itself but a route map to somewhere real.
Really? How many children were involved in this trend supposedly sweeping Silicon Valley? An inconsequential sub-fraction — according to one blogger’s good humoured evisceration of the non-evidence in an excellent post on Papyrus News about the rather less overblown report in The New York Times on which Simon was apparently leaning:
The article [mentions] four Silicon Valley firms: Google, Apple, Yahoo, and Hewlett Packard. Between them, those firms have tens of thousands of employees, with tens of thousands of children. A total of 294 children go to the Waldorf School (not all of whose parents work in high-tech industries). Does that mean that 99% of employees in high-tech firms believe that computers do have a role in education?
Nowhere are classrooms ‘reverting’ to chalk and blackboards. In the very week in which Simon wrote his screed, the most-discussed news in education was the explosion in disembodied learning through online courses offered by universities like Stanford and internet tutoring in maths and science for school children.
Nor has he yet produced a single convincing argument or anything resembling a fact to support his prediction of a transition to ‘post-digital’ existence — now mentioned by him in at least three columns.
In 2009, he announced — and was congratulated by several naive commenters for his revelation — that there was a reason why ‘the ghost of Gutenberg’ was about to ‘die laughing.’ And why was that? According to Simon, a new venture was downloading text from the internet and selling on the streets of San Francisco a publication called The Printed Blog. Lo! he crowed triumphantly, ‘[F]or the Jeremiahs who tell me that I and my medium are doomed to litter the fish-shop gutter, I have news. . .’.
If nothing was heard of this thundering victory before he wrote his column or since, it is because there never was any such publishing exercise in San Francisco. You might imagine that either he or his editors should have discovered that themselves — simply by checking, a basic act in journalism — for the column grandly titled ‘Old is new. Even Gutenberg’s ghost has returned to live in Silicon Valley.’ (N.B.: a detail: San Francisco is not and never has been considered a part of the cradle of high technology.)
Yet, last weekend, there was Simon himself playing scolding schoolmaster,
Fiction may be free and facts expensive, but film-makers are not short of researchers. Commentators may be accused of choosing facts to prove their opinions – plague the thought – but that is different from falsification. Nor do they excuse lies as higher truth. The licence to report carries responsibilities.
Well. Erm … yes.
Item 3: a judge cites the fictional spy James Bond’s wide renown to justify a real-life decision unfavourable to chiefly female petitioners treated by undercover police as sexual prey. Some of these policemen had children by the women, even five-year relationships with them, then disappeared without a trace.
In a column last week, Jonathan Freedland recorded with fully-warranted fury that
Mr Justice Tugendhat […] ruled on whether a case brought by 10 women and one man duped into fraudulent relationships by undercover police officers should be heard in open court or in a secret tribunal.
The decision hinged on whether the law governing agents of the state allows them to form sexual relationships with those they spy upon. The good judge believes that when MPs wrote the Regulation of Investigatory Powers Act (Ripa) in 2000, permitting undercover police to form “personal or other” relationships, they must have meant it to include sexual relationships. After all, the legislators were bound to have had one particular secret agent in mind. “James Bond is the most famous fictional example of a member of the intelligence services who used relationships with women,” Tugendhat declared, lending “credence to the view that the intelligence and police services have for many years deployed both men and women officers to form personal relationships of an intimate sexual nature”.
Those involved tell of deep and genuine attachments, the men integrated into their lives as partners, living together, travelling together, attending family gatherings, sitting at a parent’s bedside, even attending a funeral.
[T]his was the hacking of people’s lives, burrowing into the most intimate spaces of the heart in order to do a job, all authorised by the police. It is state-sanctioned emotional abuse …
Such horror was nearly as hard to believe as Simon Jenkins’s assertions that print was on its way to re-capturing eyeballs lost to screens, or that computers were on their way out of education — only it was actually inflicted on real people.
Item 4: a teacher of the storyteller’s art complained in The New York Times, a fortnight ago, that most of his students were no longer capable of constructing narrative fiction that made sense of the world.
That will hardly surprise any reader who has reached this paragraph of our post. The teacher, Steve Almond — whose splendid essay deserves to be read in full said, in part:
About 10 years ago, in creative-writing classes I was teaching, I began to encounter a particular species of student story. The hero was an unshaven man who woke in a strange room with no idea where he was or why. Invariably, something traumatic had happened to him, though he didn’t know exactly what. The rest of the story sought to reconstruct his arrival in these dire circumstances, via scenes that had been chronologically mutilated for maximum profundity.
My standard reaction to such pieces was to jot earnestly flummoxed queries in the margins like “Where are we?” and “Is it possible I’m missing a page?”
The underlying … question is whether the story of our species — the greater human narrative — has simply become too enormous, too confused and terrifying, for us to grapple with. This might explain why so many of us now rely on a cacophony of unreliable narrators to shape our view of the world and ourselves …
… So, to summarise these jottings in reverse order: people whose job is to tell stories have given up on trying to make sense; judges justify police mistreatment of citizens, citing figments of a novelist’s imagination as proof of societal sanction for it; a journalist prone to presenting wild invention as fact admonishes spinners of screen fantasies for not doing what is supposed to be his job — strict adherence to the truth.
There is an ancient Hindu conception of the world as all-maya — which means, illusion.
There was a time, not long ago, when it was hard to understand.
← Forget #Leveson. Journalism’s future is about being held to account by us, not judges or statutes
Note at a publishing crossroads: is it time for Ian Rankin to move over and let younger Scots writers take his place? →
post-Gutenberg: what comes next?
Join the social media strike. Sign the Declaration of Digital Independence 04/07/2019
Daring, risky innovation by a famously conservative — notoriously hidebound — public service institution leaves old print ‘legacy’ media trailing far in its wake 30/06/2019
Wanted: a brave newspaper, for an experiment in which readers become stakeholders ( updated, 25.5.2019 ). The keiretsu-cooperative is a kind of platform cooperative — an idea getting closer to takeoff 25/05/2019
for 21. 4. 2019 21/04/2019
In Jeff Bezos’s nasty fight with a tabloid, a hint of how transparency in e-commerce is guiding the design of online courts in the litigation revolution 25/02/2019
Rich America is still the bizarre laggard in the — anti-inequality — litigation revolution. Should this be on 2020 presidential campaign posters? 30/01/2019
Neuroscience says that the power of faces is unique and crucial: should Facebook be allowed to effectively own it, with or without regulation? 16/01/2019
for 1. 1. 2019 01/01/2019
for 25. 12. 2018 25/12/2018
O happy day! The ‘free’ surveillance/advertising-centred/data-cow business model has been superseded by the pay-to-be-spied-on contract for e-commerce 02/12/2018
Big Brother takes an alarming step past watching us — and shows why Tim Berners-Lee’s plan for resurrecting his open web needs all our support 30/10/2018
Why O hushed October morning mild … ? 03/10/2018
Can artists grow the heart the European Union has to have to hold and bind together? 21/09/2018
Summer turns binary 03/09/2018
In the puzzling rise of retro nationalism in an age of digital linking, a well-argued warning by Spain’s most famous philosopher is being ignored — again 27/08/2018
A dunce cap for T. S. Eliot, who could not tell a lilac from a lollipop — and an explainer in images 16/05/2018
Wanted: a 21st-century version of the cowboy code for Silicon Valley and a cautionary popup for Facebook screens 24/04/2018
Whether or not the YouTube shooter’s videos were inspired by Klimt’s explorations of dark facets of femininity, did they deserve to be demonetised for not being ‘advertiser-friendly’? 10/04/2018
The media establishment has begun to see sense in a user-owned Facebook — but in curbing surveillance capitalism, let’s separate the baby from the bathwater 01/04/2018
for 1. 4 . 2018 01/04/2018
Who is going to start a movement to stop the social media giants from milking us like witless data cows? (Why a keiretsu-cooperative could be a better idea) 11/02/2018
Have digital cameras condemned us to looking at ever more pixels, ever less art? 27/01/2018
Bend it like Von Donnersmarck 2: the most brilliant illumination of the recent past can be useless as a guide to the future 16/01/2018
Bend it like Von Donnersmarck: how to manipulate cameras and colours to make the vital truth truer and unforgettable 07/01/2018
A better Facebook — or why cooperatives run on the web should work better than the old hippie kind (republished 16.11.2017) 16/11/2017
Much ado, not by accident: Elena Ferrante has spoken frankly about exploiting the gossip mill to drive book sales — to The Financial Times 06/10/2016
Time-travelling email to Tolstoy re: reminders, in the transition to post-print publishing, of you emancipating your serfs in 19th-century Russia 25/09/2016
Fiddling with the true record of newspapers’ post-print struggles robs our first drafts of history of crucial lessons for media 16/09/2016
Can literary, bacon-scented flies teetering on the brink of greatness — by 2016 standards — compete with a passage in, say, Orwell’s Burmese Days? 03/09/2016
Adapt-or-die advice for newspapers being squeezed out by Facebook: create symphysis with your reader-commenters! 29/07/2016
Jottings from revisiting A Distant Mirror, which shows history repeating itself in inchoate populist rage fed by miraculous new channels for communicating 20/07/2016
Nuda Veritas: politicians in the UK and US, including the lying Brexit architects, fail to understand — or harness — internet culture’s radical transparency and reach 12/07/2016
Why has The New York Times abandoned its commitment to journalism ‘without fear or favour,’ covering this presidential election? 03/06/2016
How does a partisan press mislead the public and distort an election? Watch this conversation between Cenk Uygur and Bernie Sanders on The Young Turks 06/04/2016
Private Eye’s almost unbearably brilliant Libor for Dummies business model for the future of book publishing 09/03/2016
Milan says a tender goodbye to Umberto Eco in high style: let’s hope that someone put his confession about The Da Vinci Code into a eulogy 03/03/2016
Farewell, phenomenal Umberto Eco 21/02/2016
Surely they aren’t trying to reinvent the mandala? A pictorial entertainment on computerised visions by cosmologists of gravitational waves 14/02/2016
Lawyers leading the way in the litigation revolution in Britain 07/02/2016
… and where is America, in the litigation revolution? A new post-Gutenberg.com clippings file on democratising law 29/01/2016
On the brink of the post-Gutenberg democratisation of law and the courts — fresh proof that justice without lawyers really is on the horizon 14/01/2016
Will judge Leveson become one of history’s heroes not for debugging and democratising the British press but his own profession — law and the courts? 06/01/2016
Revolutions are unpredictable and their most significant changes take time. The signage reads: POOR VISIBILITY AHEAD 31/12/2015
Dispatch from a time-starved blogger: the bulge is p-G … and p-G is the bulge 07/12/2015
The what??? of the year 2015 (hint: Steve Jobs has something to do with it) 15/10/2015
Jonathan Franzen and the novel writing tradition that still has made-in-America stamped all over it 07/10/2015
4th Estate moves
Art and psychology
Artists writers and money
Big Data collection
Big Tech, Social media
Blogging and bloggers
Culture after Gutenberg
Keiretsu-cooperative
Leveson hearings
Online courts
Ownership of Big Tech
Post-Gutenberg law and the courts
Psychology of creativity
Re-arranging publishing for the 5th Estate
Regulation of Big Tech
Search engine algorithms and indexing
Social media and networking
Surveillance business model
Surveillance capitalism
Switzerland's extreme democracy
Take Back Your Data movement
The 5th Estate in action
The litigation revolution
writers and money
post-Gutenberg.com
Archives Select Month July 2019 June 2019 May 2019 April 2019 February 2019 January 2019 December 2018 October 2018 September 2018 August 2018 May 2018 April 2018 February 2018 January 2018 December 2017 November 2017 October 2016 September 2016 July 2016 June 2016 April 2016 March 2016 February 2016 January 2016 December 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011
4th Estate moves Art and psychology Art and science Artists Artists writers and money Big Data collection Big Tech, Social media Blogging and bloggers Cooperatives Culture after Gutenberg E-books Film Keiretsu-cooperative Leveson hearings Leveson Inquiry Libraries Micropayments Poetry Post-Gutenberg law and the courts Psychology of creativity Re-arranging publishing for the 5th Estate Social media and networking Surveillance business model Surveillance capitalism Switzerland Switzerland's extreme democracy The 5th Estate in action The future of publishing The seasons writers and money
|
cc/2019-30/en_middle_0056.json.gz/line12397
|
__label__wiki
| 0.934496
| 0.934496
|
LIL' KIM: Media Blackout
TeeRoy's 2 Cents:
When she was onWatch What Happens Live in 2012, Andy grilled Kim about her beef with Nicki Minaj.
Whatever happened to finding a journalist you trust and sitting down for a lengthy interview?
Maybe this is all a way to get people talking about Kim.
Conspiracy theorists need to stop doing mental gymnastics to jump to all kinds of conclusions. It's her life, her career and her business why she canceled.
On one hand, she's smart to cancel these interviews if she's worried that she's going to be made into some kind of joke. On the other hand, she's turned down a trio of highly visible media appearances, which would have been a great chance to get the word out about her new album.
I'm calling it now -- 9 isn't happening. At least not this summer.
It's like Birdman said -- put some respeck on her name!
Maybe there's more going on behind the scenes than we realize. This whole thing seems kind of fishy to me.
It's a shame when an OG like Lil' Kim feels like she can't get a fair shake.
While Cardi B is rapping about “Press," Lil’ Kim says she’s done talking to the press -- period.
In a recent Instagram Live session, Kimmy Blanco explained that “two of the major outlets [wanting] to be messy” blew it for everyone. The media blackout strategy was apparently her team’s idea. “My publicist and manager made the executive decision to shut it down.” She says she’s done with interviews and press runs if she’s not going to be treated with respect.
Kim had appearances onToday ,Access Hollywood andWatch What Happens Live scheduled for this week. We hear that something that Bravo host Andy Cohen did caused Kim to reconsider.
It's unclear what specific project she was planning to promote. Kim's upcoming 9 album is due out this summer. She also has a new VH1 reality series, Girls Cruise, premiering on Monday.
Want to know more about T-Roy? Get their official bio, social pages & articles on iHeartRadio!
Email t-roy@iheartmedia.com
|
cc/2019-30/en_middle_0056.json.gz/line12399
|
__label__wiki
| 0.995125
| 0.995125
|
Jerry Lambert (II)
Known for American Housewife (2017-2019)
5' 11" (1.80m)
@therealjerrylam (twitter.com) | & 1 more link
Black Caesar (2018)
(Short) - Special Thanks Special Thanks See fewer
ImagiGARY (2015)
Professor Phillips Professor Phillips See fewer
Skip Skip See fewer
(Short) - Daddy Daddy See fewer
Arthur Christmas (2011)
N.O.R.A.D. (voice) N.O.R.A.D. (voice) See fewer
Bad Teacher (2011)
Morgan's Dad Morgan's Dad See fewer
Why Am I Doing This? (2009)
Scott Scott See fewer
Smother (2008)
Donnie Booker Donnie Booker See fewer
I'm Not Gay (2005)
(Short) - Riley Riley See fewer
Wake Up, Ron Burgundy: The Lost Movie (2004)
(Video) - Business Man Business Man See fewer
Recipe for Disaster (2001)
(Short) - NMPRU Supervisor NMPRU Supervisor See fewer
The Godson (1998)
Professor Professor See fewer
Bartender (1997)
Eyes of the Prey (1992)
Male Reporter Male Reporter See fewer
Alien Space Avenger (1989)
Garbageman Garbageman See fewer
American Housewife (2017–2019)
(TV Series) - Principal Ablin (11 episodes, 2017) Principal Ablin (11 episodes, 2017) See fewer
Field Trippin' (Apr 30, 2019) Season 3, Episode 20 - Principal Ablin Principal Ablin See fewer
Those Who Can't (2019)
(TV Series) - Burt Crandall (1 episode, 2019) Burt Crandall (1 episode, 2019) See fewer
A Smoot Holiday Coincidence (Feb 4, 2019) Season 3, Episode 4 - Burt Crandall Burt Crandall See fewer
Life in Pieces (2016–2018)
(TV Series) - Chase (3 episodes, 2016) Chase (3 episodes, 2016) See fewer
Graffiti Cute Jewelry Shots (Mar 29, 2018) Season 3, Episode 15 - Chase Chase See fewer
Graves (2016–2017)
(TV Series) - Doug Johnson (4 episodes, 2016) Doug Johnson (4 episodes, 2016) See fewer
Not All Who Wander Are Lost (Dec 10, 2017) Season 2, Episode 9 - Doug Johnson Doug Johnson See fewer
Do You Want to See a Dead Body? (2017)
(TV Series) - Minister (1 episode, 2017) Minister (1 episode, 2017) See fewer
A Body and a Bachelor Party (with Adam Pally) (Nov 15, 2017) Season 1, Episode 14 - Minister Minister See fewer
Family Guy (2012–2017)
(TV Series) - John Travolta / Tennis Umpire (6 episodes, 2012) John Travolta / Tennis Umpire (6 episodes, 2012) See fewer
The Peter Principal (Apr 30, 2017) Season 15, Episode 18 - Actor (voice) Actor (voice) See fewer
Modern Family (2014–2016)
(TV Series) - Lawyer (2 episodes, 2014) Lawyer (2 episodes, 2014) See fewer
Thanksgiving Jamboree (Nov 16, 2016) Season 8, Episode 7 - Lawyer Lawyer See fewer
Halloween 3: AwesomeLand (Oct 29, 2014) Season 6, Episode 6 - Lawyer Lawyer See fewer
(TV Series) - Pomona Planning Manager (1 episode, 2016) Pomona Planning Manager (1 episode, 2016) See fewer
When Will Josh and His Friend Leave Me Alone? (Nov 11, 2016) Season 2, Episode 4 - Pomona Planning Manager Pomona Planning Manager See fewer
JoJoHead (2016)
Things I've Pretended Not to Hear (Nov 6, 2016) Season 1, Episode 14 - Actor Actor See fewer
(TV Series) - Wayne (2 episodes, 2016) Wayne (2 episodes, 2016) See fewer
Food Fight (Oct 24, 2016) Season 3, Episode 2 - Wayne Wayne See fewer
All the Residents' Men (May 23, 2016) Season 2, Episode 12 - Wayne Wayne See fewer
News Hits (2016)
(TV Movie) - Bruce Bruce See fewer
Fameless (2015–2016)
Mayan Ruined (Feb 15, 2016) Season 1, Episode 16 - Actor Actor See fewer
Truth Be Told (2015)
(TV Series) - Phil (1 episode, 2015) Phil (1 episode, 2015) See fewer
The Ecosystem (Dec 4, 2015) Season 1, Episode 7 - Phil Phil See fewer
Wet Hot American Summer: First Day of Camp (2015)
(TV Series) - General Rawson 'John' McCarthy (1 episode, 2015) General Rawson 'John' McCarthy (1 episode, 2015) See fewer
Day Is Done (Jul 31, 2015) Season 1, Episode 8 - General Rawson 'John' McCarthy General Rawson 'John' McCarthy See fewer
Not So Union (2015)
(TV Series) - Tom Quigg (1 episode, 2015) Tom Quigg (1 episode, 2015) See fewer
I'm Pregnant with Your Alien Baby (Apr 2015) Season 1, Episode 3 - Tom Quigg Tom Quigg See fewer
(TV Series) - Dr. Martins (1 episode, 2014) Dr. Martins (1 episode, 2014) See fewer
Chocolate Milk (Oct 5, 2014) Season 2, Episode 2 - Dr. Martins Dr. Martins See fewer
Garfunkel and Oates (2014)
(TV Series) - Wesker-Wynn Boss (1 episode, 2014) Wesker-Wynn Boss (1 episode, 2014) See fewer
Rule 34 (Aug 14, 2014) Season 1, Episode 2 - Wesker-Wynn Boss Wesker-Wynn Boss See fewer
Maron (2014)
(TV Series) - Murph (1 episode, 2014) Murph (1 episode, 2014) See fewer
Mouth Cancer Gig (Jun 26, 2014) Season 2, Episode 8 - Murph Murph See fewer
Kung Fu Panda: Legends of Awesomeness (2014)
(TV Series) - Shi Wo / Bandit (1 episode, 2014) Shi Wo / Bandit (1 episode, 2014) See fewer
The Real Dragon Warrior (Jun 22, 2014) Season 3, Episode 18 - Shi Wo / Bandit (voice) Shi Wo / Bandit (voice) See fewer
Sean Saves the World (2014)
(TV Series) - Morgan (1 episode, 2014) Morgan (1 episode, 2014) See fewer
The Wrath of Sean (Jan 16, 2014) Season 1, Episode 12 - Morgan Morgan See fewer
Addicts Anonymous (2013)
(TV Series) - Phil Shiltz (1 episode, 2013) Phil Shiltz (1 episode, 2013) See fewer
Support Buddy (Dec 3, 2013) Season 1, Episode 2 - Phil Shiltz Phil Shiltz See fewer
Key and Peele (2013)
(TV Series) - James Livingston (1 episode, 2013) James Livingston (1 episode, 2013) See fewer
Episode #3.8 (Nov 6, 2013) Season 3, Episode 8 - James Livingston James Livingston See fewer
The Gabriels (2013)
(TV Movie) - Dr. Barr Dr. Barr See fewer
Up All Night (2012)
(TV Series) - Frank (1 episode, 2012) Frank (1 episode, 2012) See fewer
I Can't Quit You (Dec 6, 2012) Season 2, Episode 9 - Frank Frank See fewer
Swords, Knives, Very Sharp Objects and Cutlery (2012)
(TV Short) - General Drake General Drake See fewer
Childrens Hospital (2011)
(TV Series) - Doctor (1 episode, 2011) Doctor (1 episode, 2011) See fewer
The Night Shift (Aug 11, 2011) Season 3, Episode 11 - Doctor Doctor See fewer
Colt (2011– )
(TV Mini-series) - Colt Sokoloff Colt Sokoloff See fewer
(TV Series) - Randy Kulovitz (1 episode, 2011) Randy Kulovitz (1 episode, 2011) See fewer
Nana Gallagher Had an Affair (Mar 13, 2011) Season 1, Episode 10 - Randy Kulovitz Randy Kulovitz See fewer
Neighbors from Hell (2010)
(TV Series) - Various (6 episodes, 2010) Various (6 episodes, 2010) See fewer
Fantastic 15 (Jul 26, 2010) Season 1, Episode 10 - Various (voice) Various (voice) See fewer
ScrewAttack's Top 10s (2009)
(TV Series) - Kevin Butler (1 episode, 2009) Kevin Butler (1 episode, 2009) See fewer
Top 10 PS3 Exclusives, 2009 Version (Nov 27, 2009) Season 4, Episode 9 - Kevin Butler (uncredited) Kevin Butler (uncredited) See fewer
Greek (2008–2009)
(TV Series) - Russell Cartwright (2 episodes, 2008) Russell Cartwright (2 episodes, 2008) See fewer
Our Fathers (Sep 7, 2009) Season 3, Episode 2 - Russell Cartwright Russell Cartwright See fewer
47 Hours and 11 Minutes (May 5, 2008) Season 1, Episode 17 - Russell Cartwright Russell Cartwright See fewer
King of the Hill (2008–2009)
(TV Series) - J.J. Womack / Police Officer #2 / Judge Hawthorne (2 episodes, 2008) J.J. Womack / Police Officer #2 / Judge Hawthorne (2 episodes, 2008) See fewer
Uh-Oh Canada (May 17, 2009) Season 13, Episode 18 - J.J. Womack / Police Officer #2 (voice) J.J. Womack / Police Officer #2 (voice) See fewer
Square-Footed Monster (Oct 19, 2008) Season 13, Episode 3 - Judge Hawthorne (voice) Judge Hawthorne (voice) See fewer
Howie Do It (2009)
Episode #1.15 (Mar 27, 2009) Season 1, Episode 15 - Actor Actor See fewer
The Station (2009)
(TV Movie) - Larry Larry See fewer
Scare Tactics (2003–2008)
Taxi Cab Carnage (Sep 30, 2008) Season 3, Episode 8 - Actor Actor See fewer
(TV Series) - Officer Phipps (1 episode, 2007) Officer Phipps (1 episode, 2007) See fewer
History Repeating (Oct 14, 2007) Season 2, Episode 3 - Officer Phipps Officer Phipps See fewer
Family of the Year (2007)
(TV Series) - Jim Anderson (1 episode, 2007) Jim Anderson (1 episode, 2007) See fewer
Pilot (Mar 2007) Season 1, Episode 1 - Jim Anderson Jim Anderson See fewer
Sons & Daughters (2006–2007)
(TV Series) - Don Fenton (11 episodes, 2006) Don Fenton (11 episodes, 2006) See fewer
Paige Returns (Feb 14, 2007) Season 1, Episode 11 - Don Fenton Don Fenton See fewer
'Til Death (2006–2007)
(TV Series) - Stan (3 episodes, 2006) Stan (3 episodes, 2006) See fewer
The Bachelor Party (Feb 8, 2007) Season 1, Episode 15 - Stan Stan See fewer
Cavemen (2007)
(TV Series) - Paul (1 episode, 2007) Paul (1 episode, 2007) See fewer
Cave Kid Season 1, Episode 11 - Paul Paul See fewer
Campus Ladies (2006)
(TV Series) - Roger (1 episode, 2006) Roger (1 episode, 2006) See fewer
Pilot (Jan 8, 2006) Season 1, Episode 1 - Roger Roger See fewer
Life on a Stick (2005)
(TV Series) - Mr. Flickman (1 episode, 2005) Mr. Flickman (1 episode, 2005) See fewer
Wouldn't It Be Nice (2005) Season 1, Episode 12 - Mr. Flickman Mr. Flickman See fewer
Less Than Perfect (2004)
(TV Series) - Dr. Altman (1 episode, 2004) Dr. Altman (1 episode, 2004) See fewer
Ain't It a Shame, Claude (Oct 15, 2004) Season 3, Episode 3 - Dr. Altman Dr. Altman See fewer
Yes, Dear (2004)
(TV Series) - Priest (1 episode, 2004) Priest (1 episode, 2004) See fewer
Shirley Cooks with Love (May 17, 2004) Season 4, Episode 23 - Priest Priest See fewer
Everybody Loves Raymond (2002–2004)
(TV Series) - Jerry / Guy (3 episodes, 2002) Jerry / Guy (3 episodes, 2002) See fewer
Party Dress (Feb 16, 2004) Season 8, Episode 15 - Jerry Jerry See fewer
44 Minutes: The North Hollywood Shoot-Out (2003)
(TV Movie) - Randy Wills Randy Wills See fewer
(TV Series) - Bank Rep (1 episode, 2003) Bank Rep (1 episode, 2003) See fewer
Hey Hey What Can I Do (Mar 12, 2003) Season 5, Episode 18 - Bank Rep Bank Rep See fewer
Still Standing (2002)
(TV Series) - Big Tom Jensen (1 episode, 2002) Big Tom Jensen (1 episode, 2002) See fewer
Still Family (Nov 18, 2002) Season 1, Episode 8 - Big Tom Jensen Big Tom Jensen See fewer
Bagboy! (2002)
(TV Short) - Diplomat (voice) Diplomat (voice) See fewer
The Hughleys (2001–2002)
(TV Series) - Principal Walters (3 episodes, 2001) Principal Walters (3 episodes, 2001) See fewer
Directed by Darryl Hughley (Apr 29, 2002) Season 4, Episode 19 - Principal Walters Principal Walters See fewer
The West Wing (2002)
(TV Series) - Chuck Kane (1 episode, 2002) Chuck Kane (1 episode, 2002) See fewer
Dead Irish Writers (Mar 6, 2002) Season 3, Episode 16 - Chuck Kane Chuck Kane See fewer
(TV Series) - Mr. McBride (1 episode, 2001) Mr. McBride (1 episode, 2001) See fewer
Witchright Hall (Apr 6, 2001) Season 5, Episode 18 - Mr. McBride Mr. McBride See fewer
The Geena Davis Show (2000–2001)
(TV Series) - Fred (3 episodes, 2000) Fred (3 episodes, 2000) See fewer
Max Hates Hillary (Jan 23, 2001) Season 1, Episode 13 - Fred Fred See fewer
Everything But the Girl (2001)
(TV Movie) - Tom Lewis Tom Lewis See fewer
Malcolm in the Middle (2000)
(TV Series) - Dave (1 episode, 2000) Dave (1 episode, 2000) See fewer
Krelboyne Picnic (Mar 12, 2000) Season 1, Episode 8 - Dave Dave See fewer
Angel (2000)
(TV Series) - Rick the Clerk (1 episode, 2000) Rick the Clerk (1 episode, 2000) See fewer
I've Got You Under My Skin (Feb 15, 2000) Season 1, Episode 14 - Rick the Clerk Rick the Clerk See fewer
Oh Baby (2000)
(TV Series) - Dean (1 episode, 2000) Dean (1 episode, 2000) See fewer
Cinderella (Jan 15, 2000) Season 2, Episode 15 - Dean Dean See fewer
Suddenly Susan (2000)
(TV Series) - Brent (1 episode, 2000) Brent (1 episode, 2000) See fewer
Stock Tip (Jan 3, 2000) Season 4, Episode 14 - Brent Brent See fewer
Dear Doughboy (2000)
(TV Movie) - Jerry Jerry See fewer
Ally McBeal (1999)
(TV Series) - Reporter #3 / Anchor (1 episode, 1999) Reporter #3 / Anchor (1 episode, 1999) See fewer
Changes (Nov 29, 1999) Season 3, Episode 6 - Reporter #3 / Anchor Reporter #3 / Anchor See fewer
Chicken Soup for the Soul (1999)
(TV Series) - Mr. Spooner (1 episode, 1999) Mr. Spooner (1 episode, 1999) See fewer
Rescued (Nov 16, 1999) Mr. Spooner Mr. Spooner See fewer
Ladies Man (1999)
(TV Series) - Rick (1 episode, 1999) Rick (1 episode, 1999) See fewer
Country Clubbed (Oct 25, 1999) Season 1, Episode 6 - Rick Rick See fewer
(TV Series) - Client (1 episode, 1999) Client (1 episode, 1999) See fewer
Re-Enter the Dragon (Sep 16, 1999) Season 1, Episode 2 - Client Client See fewer
Maggie (1998)
(TV Series) - Marty (1 episode, 1998) Marty (1 episode, 1998) See fewer
Every Little Star (Dec 15, 1998) Season 1, Episode 14 - Marty Marty See fewer
Baywatch (1998)
(TV Series) - Waiter (1 episode, 1998) Waiter (1 episode, 1998) See fewer
The Edge (Dec 14, 1998) Season 9, Episode 11 - Waiter Waiter See fewer
Toonsylvania (1998)
(TV Series) - Kirk (1 episode, 1998) Kirk (1 episode, 1998) See fewer
Igor's Replacement/The Deadman Bunc (Nov 9, 1998) Season 2, Episode 2 - Kirk (voice) Kirk (voice) See fewer
(TV Series) - Shop Owner (1 episode, 1998) Shop Owner (1 episode, 1998) See fewer
Stuck with Dick (Mar 18, 1998) Season 3, Episode 19 - Shop Owner Shop Owner See fewer
7th Heaven (1997)
(TV Series) - Mr. Murphy (1 episode, 1997) Mr. Murphy (1 episode, 1997) See fewer
I Hate You (Nov 17, 1997) Season 2, Episode 9 - Mr. Murphy Mr. Murphy See fewer
Jenny (1997)
(TV Series) - Host (1 episode, 1997) Host (1 episode, 1997) See fewer
A Girl's Gotta Live in the Real World (Nov 16, 1997) Season 1, Episode 5 - Host Host See fewer
Lost on Earth (1997)
(TV Series) - Leo (1 episode, 1997) Leo (1 episode, 1997) See fewer
The Rudy Show (Jan 15, 1997) Season 1, Episode 2 - Leo Leo See fewer
Not Necessarily the Election (1996– )
(TV Series) - Ensemble Ensemble See fewer
The John Larroquette Show (1995–1996)
(TV Series) - Kevin / Marco / Pierre / Policeman (4 episodes, 1995) Kevin / Marco / Pierre / Policeman (4 episodes, 1995) See fewer
Cheeses H. Taste (1996) Season 4, Episode 8 - Kevin Kevin See fewer
Archive Footage (1 title)
Scare Tactics (2009)
(TV Series) - Jerry (1 episode, 2009) Jerry (1 episode, 2009) See fewer
28 Minutes Later (Oct 27, 2009) Season 3, Episode 17 - Jerry (archive footage) Jerry (archive footage) See fewer
Other (1 title)
Family Guy: Back to the Multiverse (2012)
(Video Game) - Additional Voices (voice) Additional Voices (voice) See fewer
|
cc/2019-30/en_middle_0056.json.gz/line12402
|
__label__cc
| 0.60079
| 0.39921
|
The Genius of Major Arcana Art and Meaning
Uncarrot Tarot Deck
A modern sketched cartoon deck featuring unconventional suits, bizarre arcana, and a dry, satiric wit.
Andrew Plotkin. Web, 2001. Used with permission of the artist.
The Magus, Magician, or juggler, the caster of the dice and mountebank, in the world of vulgar trickery. This is the colportage interpretation, and it has the same correspondence with the real symbolical meaning that the use of the Tarot in fortune-telling has with its mystic construction according to the secret science of symbolism. I should add that many independent students of the subject, following their own lights, have produced individual sequences of meaning in respect of the Trumps Major, and their lights are sometimes suggestive, but they are not the true lights. For example, Eliphas Levi says that the Magus signifies that unity which is the mother of numbers; others say that it is the Divine Unity; and one of the latest French commentators considers that in its general sense it is the will.
Will, Will-Power, Dexterity
Will applied to evil ends, Weakness of Will, Cunning, Knavishness.
Male Inquirer.
|
cc/2019-30/en_middle_0056.json.gz/line12403
|
__label__wiki
| 0.526494
| 0.526494
|
Rapzilla
Steven Solis
Kurtis Hoppie – Spotlights ft. V. Rose music video
Watch Kurtis Hoppie music video for his newest single “Spotlights” featuring V. Rose in which he talks about his commitment to God as his fame rises.
Buy/stream the song here
TagsKurtis HoppieV.Rose
for King & Country Teamed Up with ...
DJ Mykael V – Doing The Most ...
Steven Solis is Christian Hip-Hop's Wizard of Oz, breaking more unsigned talent than anyone you know.
Music: SPEC – Don’t You Know (Que Tu Sabes) ft. V.Rose
Rapzilla.com Live with Chris Chicago – Episode 8 ft. Adrian Stresow
Music: Bronson Twoskies – Good Life ft. V.Rose
FLAME – Read Em & Weep ft. V.Rose
Ruslan ‘Do For One’ Album Cover, Tracklisting & Release Date Revealed
Trey Songz ‘Trigga’ copies Shonlock’s album cover
Now in Stores – June 15 2010
R.M.G ‘Welcome To The Family’ Tracklisting
Whoz Meech on Rapzilla.com LIVE with Chris Chicago – Ep. 136
Calvin Hill – Never, Never
DJ Kideazy – All of Me
K-Drama – We Win Through The Struggle
Sareem Poems & Newselph – This Life ft. James Gardin & Macklyn
Top Underrated Christian Rap Songs of the Week – 7/12/19
King Chav – Boogie Wit’ the Devil
Kham – Eden ft. seni. [Acoustic Remix]
Coop – Lavish ft. Lael Turner
C Duffle – Frost Bite
View Full List of New Music
Spotlight Video
Lecrae Reach Records Derek Minor KB NF ruslan WHATUPRG Thi’sl Steven Malcolm Rapzilla.com Live with Chris Chicago Jered Sanders Dru Bex OnBeatMusic Shopé James Gardin Wande k-drama Kevi Morse DJ Mykael V Kanye West Rockstar Jt Sareem Poems george psalm King Chav
Reach Records Announces Summer Album
Summer is heating up, and it’s not only because of the temperature! Reach Records announced that they are releasing a compilation album this Friday. Read Reach Records’ Announcement Below: View this post on Instagram It’s that time of year… #Summer19 ☀️🌴 This Friday. A post shared by Reach Records (@reachrecords) on Jul 15, 2019 at 11:39am PDT With 37 artists and producers on this list, it looks like there’s going to a good amount of tracks on this album. It is interesting that Andy Mineo and Trip Lee are not on the list for this project. What do […]
Whoz Meech is our featured guest on this episode of Rapzilla.com LIVE with Chris Chicago – our 2 hour syndicated radio show and podcast. He talks about his debut album ‘World,’ which is available now. Buy and stream the album here. Subscribe and listen to the podcast on Spotify, Apple Music, Google Play & more here. Lecrae – It Is What It Is Xay Hill – Make A Way ft. Canon A.I. the Anomaly – Eastside Aaron Cole – There For Me Ty Brasel – Night Dreaming Jon Keith – David Ft. Derek Minor & joey Vantez Thi’sl – Let’s […]
New content is released every week, and it’s sometimes easy for it to get lost in the shuffle. For that reason, we’d like to offer up this weekly rewind. These are some of our favorite releases to make their way to us for review — the Top Underrated Christian Rap songs of the week. Milan Credle – Back At It This is a well-produced and thought out track from Milan Credle. Concept wise, “Back At It” is a song of perseverance that encourages listeners to stay focused no matter the cost. Style-wise, this track goes down smooth but leaves you […]
Social Justice in Christian Rap and Improving the Genre (Elevation Conference)
At the 2019 Elevation Conference, Derek Minor, Chad Horton, and Spechouse formed a panel on the state of Christian Rap. With Justin Sarachik hosting, the panel navigated through topics such as what the genre needs to grow and problems that are currently in front of the genre. Read the first article about the panel here. While the panel focused mainly on the genre, the state of Christian Rap artists entered the conversation quite a bit. The genre would look different if artists didn’t invest their time and resources into the culture and each other. Therefore, investigating the evolution of artists […]
Op-Ed: Nigerian Christian Rap Struggles with its Identity & Needs Help
For many years, the Nigerian hip hop scene has not really been what it was expected to be. The music industry in the country has developed but Christian rap has not changed as much. Sadly, the development of CHH isn’t strong. I find it hard in really identifying the present Christian hip hop acts as rappers. Most claim it but in particular embrace the Afro-pop genre. The slow growth of the Christian rap industry is not just an issue that started overnight but has been going on for a long time. Often times, the scene has cried for lack of support […]
WHATUPRG Theorized ‘HOLY’ Alternative Tracklist Tells Complete Narrative
In a recent tweet, the young Reach Records superstar WHATUPRG pointed out that his last two projects, Pleasant Hill and RAUL were originally intended to tell one unified story. In addition to this revelation, RG went on to indicate that there was, in fact, an alternative tracklist for this combined project. With the premises of each of these works appearing so distinct, to understand the concept of this story, one must decipher who both Raul Garcia is, and who he is becoming. This growth is most evidently displayed in following the narrative of Garcia’s brash alter ego, “Lil Holy.” Pleasant […]
NF ‘The Search’ Breakdown: Rapper is Out of His Cage & Moving Past Conformity
Coming off of the success of his platinum album Perception, NF has announced his fourth official studio album with a lead single of the same name. With an anticipated release date of July 26, fans around the world await the Michigan native’s The Search with eager anticipation. Nate Feuerstein has defied all expectations of what is possible for a “faith-based” artist and will have the opportunity to continue to assert his dominance of the hip-hop world as he commences his search. If there is one message that NF has made clear since the smash hit releases of Perception, and more specifically, […]
The single “Never, Never” comes off the album Misguided by Calvin Hill. The track speaks about becoming a better rapper, a better human, and above all preach God’s greatness. Hill’s unique and incredible voice brings “Never, Never” together as well as every track in his Misguided album. Listen to Calvin Hill Below:
DJ Kideazy dropped “All of Me” which continues on his streak of two singles every month since April. This is a fun track for sure! “All of Me” is an affectionate devotional to Jesus. The self-produced pop song is infused with elements of CCM, country, rock and R&B. Kideazy ardently belts out his passion for God, revealing another side of himself. Listen to DJ Kideazy Below: Purchase or stream here.
K-Drama released his new single “We Win Through the Struggle” off his upcoming album Elegiac Sessions. Listen to K-Drama below: Buy here.
|
cc/2019-30/en_middle_0056.json.gz/line12410
|
__label__wiki
| 0.532982
| 0.532982
|
Open World News
Snapshots of some world events of paricular importance
Pjakin
Leuren Moret
Wayne Madsen
Hugo Salinas Price
ChomskyInfo
Richard Sauder
Jim Roger
Mathias Bröckers
Webster G. Tarpley
Richie Allen
Mike Maloney
Gerald Celente
Doug Casey
Jason Liosatos
Sean Stone´s Buzzsaw
Casey research
Silver investor
Miles Franklin
Gold Switzerland
Gold money
Europacific PM
TG metals report
Golden jackass
Mining feeds
BullionStar
Sprott AM
Goldseek
The gold report
Hardgeld
BullionVault
GeoIssues
FalseFlags
China, Fare east
North Amerika
World of Ideas
Monetary issues
Liberty mill
Daily bell
LaRouche´s EIR
Hyper report
Info clearinghouse
USA watchdog
Freedomain radio
TheIntercept
Caravan to midnight
trunews.com
Strategic Culture Foundation
Before it is news
VALDAI club
PeakProsperity
Ecology news
Eurasian geopolitics
Edu yourself
Truth stream media
EbolaHoax
Press for truth
UNZ
Alles Schall und Rauch
InetNEWS
UncutNews
DWN
MMnews
Politonline
Klagemauer
Antikrieg
Gegenmeinung
Anti-Zensur
NeoPresse
Propagandafront
Stimme Russlands
Der klare Blick
Parlamentní listy
Nová republika
Disidenti
ISSTRANS
KoSBe
Divnej svět
Free pub
Literárky
Revue politika
Hlas Ruska
Proti proudu
Svět kolem nás
Ne Bruselu
AE news
UbuntuRadio
Security Magazin
Střípky ze světa
Isla Margarita
Free globe
První zprávy
Svobodné noviny
Reformy
Berossos
Alternative Search Engines Respecting Your Privacy
Peekier - searX - swisscows - Qwant
(See also privacy tools and ibrowserleaks )
"An den Scheidewegen des Lebens stehen keine Wegweiser." Charlie Chaplin
Philip Giraldi: Fighting Israel's Wars
Category: Middle East
How the United States military has become Zionized
There has been http://thehill.com/business-a-lobbying/business-a-lobbying/360391-mueller-puts-spotlight-on-foreign-lobbying']);">a report that Special Counsel Robert Mueller is looking into foreign lobbying in Washington while another story relates how his team is investigating the http://ronpaulinstitute.org/archives/peace-and-prosperity/2017/november/20/omg-trump-aide-met-with-nato-partner-hungary-during-campaign/']);">alleged contact of a Donald Trump associate with a Hungarian. Both are part of the ongoing investigation into Russiagate. Unless I am wrong, which happens occasionally, Hungary is a member of the European Union and also of the North Atlantic Treaty Organization (NATO). It has relatively free elections and its government changes as a result.
No one but the Mueller commission has considered contact with a Hungarian citizen to be a potential threat to American democracy. But then again, no one has really made the case in any kind of credible fashion that meeting with a Russian is either ipso facto criminal or treasonous, or that Moscow’s media does anything beyond what other state-owned broadcasters tend to do, but you wouldn’t know that from reading the mainstream press or from watching MSNBC and CNN.
An independent observer might well note that there is more than a whiff of hypocrisy in all of this. Case in point, the latest globalist-interventionist-neocon http://www.thenewamerican.com/reviews/opinion/item/26588-another-neoconservative-startup']);">think tank the Alliance to Secure Democracy is currently being funded by a bundle of foreign governments, presumably doing so without any interference from Mueller or from those who run the Foreign Agents Registration desk at the Department of the Treasury.
And one other thing you can bet on is that Mueller will not be looking at the country that actually does interfere in American politics most, which is our best friend in the whole world and greatest ally Israel, the beneficiary of roughly one billion dollars-worth of lobbying carried out by hundreds of full time staff on its behalf.
Punish Israel for corrupting our politicians and media? On the contrary, now that we are officially into the holiday season, a whole bunch of goodies designed to make Benjamin Netanyahu’s eyes sparkle are pending. The highest priority item is the Trump Administration’s cooperation with the Israeli government in a http://finance.yahoo.com/news/israel-races-head-off-un-061830931.html']);">frantic effort to bury a United Nations report that includes a database of all the companies that operate in Israel’s illegal settlements. Also regarding the U.N., Congress is http://www.rt.com/usa/409512-us-congress-bill-assistance-un-voting/']);">considering a bill that would block U.S. aid to any country that opposes “the position of the United States.” Lest there be any confusion, Ambassador Nikki Haley has made it clear the American “position” would pretty much consist of never criticizing or voting against Israel.
Congress is meanwhile also making a list and checking it twice, looking into the http://www.haaretz.com/us-news/1.821751']);">vexing issue of how to make any and all criticism of Israel equate to anti-Semitism as a step forward to turning such activity into a hate crime with actual criminal penalties. The House Judiciary Committee has been holding meetings to try to decide how exactly one might do that without completely jettisoning the First Amendment, which once upon a time was intended to guarantee free speech. On November 8th, nine experts, seven of whom were Jewish, were summoned to address the issue of “codify[ing] a definition of anti-Semitism that incorporates a controversial component addressing attacks on Israel…[as] a necessary means of stemming anti-Semitism on campuses.”
The proposed amendment to the Civil Rights Act would use language being considered for the still pending Anti-Semitism Awareness Act to considerably expand the currently accepted government acceptance of anti-Semitism as “demonization” of Israel and/or its policies. A broader definition would have real world consequences as it would potentially block federal funding for colleges and universities where students are allowed to organize events critical of Israel. Fortunately, the hearing did not produce the result desired by Israel. To their credit, four of the witnesses, all Jewish, opposed expanding the definition of anti-Semitism and even some congressmen uncharacteristically indicated that to do so might be a bridge to far.
Indeed, one might argue that there is a tendency in Washington to see the world and even domestic policies through Israel’s eyes. One might even suggest that the United States government is being progressively Zionized because of the free hand that Israel and its supporters have, which gives them the ability to seek benefits for Israel that they would be unlikely to pursue for the United States. To cite only one example, an Israel Victory Caucus http://www.huffingtonpost.com/entry/gop-israel-victory-caucus_us_5902491ce4b0bb2d086c22e7']);">was launched in the House of Representatives in April advocating Israeli defeat of all its neighbors. The keynote speaker at the event, noted Islamophobe Daniel Pipes, explained “Victory means imposing your will on your enemy so he no longer wants to continue to fight,” before demanding “What I want the U.S. government to do is say, ‘Israel, do what you need to do to win your war.’”
Israel has been uniquely successful at imposing its will over Congress and the White House. Every freshman class in Congress, plus spouses, is automatically whisked off for a deluxe all expenses paid propaganda trip to Israel, which is funded by an affiliate of the American Israel Political Action Committee (AIPAC). That is supplemented frequently throughout the year through taxpayer funded CODELS by established politicians to find out the “facts” on what is going on in the Middle East. During congressional recesses Congressmen are sometimes more likely to be found visiting Israel than dealing with problems in their own districts and they routinely return spouting whatever line is being promoted by the Israeli government.
There is also the training of American police in “Israeli methods,” which is funded both by government and foundations set up for that purpose. Less well known is the inroads Israel has made with the American military establishment. Shoshana Bryen, former executive director of the Jewish Institute for National Security Affairs (JINSA) and currently affiliated with the Jewish Policy Center, who has been involved in hosting the indoctrination of U.S. national security personnel, http://www.jewishpolicycenter.org/2017/11/20/u-s-military-zionist-organization/']);">recently described it this way: “I have taken more than 400 American security professionals – primarily retired American Admirals and Generals – to Israel in more than 30 trips. And at the other end of their careers, I have sent more than 500 cadets and midshipmen of our service academies to Israel before they received their commissions. And I can say that they all understood the fundamental and profound principles that guide both the United States and Israel. They don’t always agree with Israel’s politics – or Israel’s defense choices – or any other single aspect of Israeli political, military and social life, but I never found one that didn’t believe in the relationship between Jews and the land of Israel. The United States military, then, is a Zionist institution.”
Last Monday, Colonel Pat Lang, former special ops officer and head of the Defense Humint Service, http://turcopolier.typepad.com/sic_semper_tyrannis/2017/11/have-the-us-militry-gone-zionist.html']);">considered Bryen’s assertion, writing “It’s an open question but I think the answer is probably yes. The U.S. military now seems to be totally focused on Israeli policy goals in Iran, Syria and Iraq… Israel wants Iran neutered and eliminated as a power rival in the Middle East. The putative Iranian nuclear weapons program is just one target of Israeli policy toward Iran. To reach the goal of Morgenthau-style comfort with regard to Iran, Israel wants to destroy Syria and Hizbullah as allies of Iran… The process of conditioning American officers to make them Zionists has been ongoing for a long time. when I came in the Army in 1962, there was little interest in Israel in the officer corps… [The] 1967 war was a watershed. Israel’s total victory had been unexpected by most. Americans are mentally driven by aggressive sports analogies and Israel was a winner. That made a big difference in spite of the repeated day long attacks by the Israeli air force and navy against U.S.S. Liberty, an American SIGINT collector positioned off the Egyptian coast. LBJ suppressed an armed reaction by a U.S. carrier battle group in the area and a subsequent naval investigation. His policy then became one of relatively complete support of Israel. The indoctrination and conditioning program described by Shoshana Bryen began in earnest after that and has carried through to the present under the umbrella of AIPAC and its galaxy of linked organizations especially JINSA. This program has been wildly, incredibly successful. As a result, there is an unthinking willingness among senior, and not so senior American officers to support Israeli policy in Iran, Syria, Lebanon, Palestine and now Saudi Arabia. The handful of M[iddle] E[ast] trained and educated U.S. officers are ignored, treated as technical experts or shoved out the door when they speak up.”
How deeply Israelophilia has been drilled into the American corporate psyche is best illustrated by a http://www.yahoo.com/news/israel-apos-greatest-fear-arms-013600091.html']);">recent article that appeared on the National Interest website. The article was written by retired Israeli Colonel Shimon Arad, who apparently has contributed to the site previously, and its thrust is that the United States should only sell military hardware to the Middle East when Israel is satisfied that the sales will not undercut its self-defined military edge. In other words, U.S. defense industries and national security arrangements should be subordinated to Israeli interests and even subject to veto by the Netanyahu government.
Arad’s condescending piece, sub-titled “Israel’s Greatest Fear: An Arms Race Sparked by the F-35,” should be read fully to demonstrate just how arrogant the Israelis have become in dealing with their American puppet. Arad argues that no advanced fighters comparable to what Israel receives for free from the U.S. taxpayer should be sold to any Arab country, no matter how friendly or strategically valuable. Previous pledges that the new F-35 would not be sold to Arabs “played a significant role in [Israel]’s acquiescence to the sale of…advanced…fighters to the Gulf states…” “Acquiescence” is the key word, implying that Israel should by rights have the option to stop such sales by putting pressure on Congress. Arad then goes on to describe how sales to the United Arab Emirates would be a “dangerous precedent,” but he is clearly talking only about Israeli interests as the United States is in no way threatened by such a move. He concludes that “Israel must express its strenuous objection to the release of the F-35 to any and all Gulf and Arab countries.”
In an http://nationalinterest.org/print/feature/america-fueling-arab-israeli-arms-race-20961?page=show']);">earlier article, Arad complained about Arab states being sold sophisticated air defenses, presumably because that would make it more difficult for Israel to bomb them. Why an American publication should provide a pulpit to an Israeli who is promoting a narrowly construed Israeli interest that differs significantly from the actual interests of the United States is not completely clear. The site’s readers apparently agreed with that observation in that most of the comments were highly critical both of Arad and of Israel. Someone should remind the colonel that America’s three major military concentrations in the Middle East – five bases in Kuwait, Al-Udeid Airbase in Qatar, and the Fifth-Fleet home base and Naval Central Command in Bahrain – are all in Arab countries that have accommodated Washington in ways that Israel never has. To place them on a list of countries that are somehow always suspect just because Israel perceives nearly all Muslims as enemies, is not in America’s own interest, but this has been the unfortunate pattern in the lopsided relationship prevailing between Washington and Tel Aviv.
The infiltration by little Israel of key sectors of the bureaucracy of a seemingly oblivious giant United States is extraordinary by any measure, but it has been brought about by a highly focused and well-funded powerful domestic lobby that has remarkable access both to the political class and to the media. As Admiral Thomas Moorer, former chairman of the Joint Chiefs of Staff http://www.counterpunch.org/2007/08/15/quot-no-american-president-can-stand-up-to-israel-quot/']);">once put it, “No American president can stand up to Israel.” He should have added Congress and even the Pentagon to his indictment but what he said is, unfortunately, truer now than it was when he made the comment back in 1997.
Philip M. Giraldi, Ph.D., is Executive Director of the Council for the National Interest, a 501(c)3 tax deductible educational foundation that seeks a more interests-based U.S. foreign policy in the Middle East. Website is www.councilforthenationalinterest.org, address is P.O. Box 2157, Purcellville VA 20134 and its email is This email address is being protected from spambots. You need JavaScript enabled to view it..
Source The UNZ Revew
Baby Frog: Mama, who is smarter- a chicken or a frog? Mama Frog: We are of course!!
Baby Frog: How do you know? Mama Frog: Well, who ever heard of Kentucky Fried Frog?
Why are frogs so happy? They eat whatever bugs them!
© 2014 - 2019 Inet NEWS - By smarty frogs. All Rights Reserved.
|
cc/2019-30/en_middle_0056.json.gz/line12416
|
__label__cc
| 0.618481
| 0.381519
|
Uniform Civil Code and Adoption Laws in India
Islamic Law and Law of the Muslim World Paper No. 08-41
24 Pages Posted: 17 Jul 2008 Last revised: 10 Sep 2008
See all articles by Sharda Girijesh Sharma
Sharda Girijesh Sharma
P.G Dept. of Law, Patna University
Date Written: July 17, 2008
A bill on uniform civil code was introduced in the Indian parliament. But there was hue and cry from Muslim Community and this bill never became an act. The grounds on which objection were raised was that Islam does not recognize adoption, so it would be violative of article 25 of the constitution which provides right to practice and profess religion. However art. 25 protect only such practices which are essential and integral part of any religion. My research question were:
- Does law governing adoption forms integral part of Muslim religion? - Does Islam recognizes adoption? - Can Article 44, over-ride article 25 of the constitution? - If a uniform law comes into being, how should be it like?
Article 25 of the constitution provides that right to religious freedom. Supreme Court has made it clear that State can not interfere in such matters which are essential and integral part of any religion. However the Supreme Court while interpreting what can form an essential part of the religion has usually followed an egalitarian and restricted approach. The custom of adoption was prevalent in pre-Islamic Arabia. Even Mohammad the prophet himself took Zaid, the son of Haris in adoption.
Article 44 provides for uniform civil code and article 38(2), states, The State shall . . . endeavor to eliminate inequalities in status . . . . so a uniform law will eliminate the unequal status of a child adopted by a Hindu and a child adopted by a non-Hindu.
Laws and regulation of social relationship in the matter of marriage, divorce, succession, adoption etc are undoubtedly secular in character and therefore cannot be brought within the guarantee enshrined under article 25 and 26 of the constitution.
Keywords: uniform civil code, adoption law, religious freedom
JEL Classification: zoo
Sharma, Sharda Girijesh, Uniform Civil Code and Adoption Laws in India (July 17, 2008). Islamic Law and Law of the Muslim World Paper No. 08-41. Available at SSRN: https://ssrn.com/abstract=1162110 or http://dx.doi.org/10.2139/ssrn.1162110
Sharda Girijesh Sharma (Contact Author)
P.G Dept. of Law, Patna University ( email )
Ashok RaJ Path
old pATNA
Patna, Bihar 800001
|
cc/2019-30/en_middle_0056.json.gz/line12421
|
__label__cc
| 0.701959
| 0.298041
|
Innovation-Friendly Regulation: The Sunset of Regulation, the Sunrise of Innovation
Jurimetrics, Vol. 55, No. 2, 2015 Forthcoming
24 Pages Posted: 2 Jan 2015 Last revised: 15 Apr 2015
See all articles by Sofia Ranchordas
Sofia Ranchordas
University of Groningen, Faculty of Law
In the last years, the approach of governments towards innovation has changed dramatically. The myth of innovation as an activity carried out by lonely inventors in their garages or in the laboratories of large private companies, in the context of which there was no or little place for governmental intervention is passé. In times of crisis, the advancement of innovation and economic growth has been included in the list of priorities of most governments. Governments expect to play more than a supporting role and go beyond the traditional economic incentives and innovation policy documents. It is time to call regulators to the center of the stage and tell them to start playing the innovation tune. Regulation and governance can play either an impeding or a facilitative role, depending on the instruments used. Regulation may give or take away incentives to innovate; it may accelerate or delay the introduction of innovations into the market; it may adapt itself to the speed of the innovation process or lag behind. In this article, I shall focus on two aspects of this regulatory approach to innovation: the pacing problem and the lack of information as to the regulation of the innovation process.
Very often regulation simply lags behind or tries to slow down the ‘pace’ of innovation: whereas innovation moves at the speed of sound, it can ‘happen’ anywhere and anytime; regulators are limited by slow-going procedures and the need to confer some stability to regulations. In addition, regulators are being confronted with complex innovations in the different fields of emerging technologies and apparently straightforward innovations that challenge existing regulatory paradigms (e.g. Aereo, Airbnb, Uber) and about which regulators know very little of. Do these innovations bring along risks and how should they be regulated? In this article, I argue that the ‘pacing’ and ‘informational’ problems could be solved by enacting two highly overlooked regulatory instruments: sunset clauses and experimental legislation. Both of them confer adaptability to the regulatory framework, set the stopwatch on obsolete legislation and create room for regulatory flexibility and learning. Sunsetting limits the temporal scope of regulation, while experimental legislation can limit both the temporal and geographic scopes or the object of regulation. Experimenting with laws can be particularly useful to test new regulations on a small-scale basis, gather more facts on the response of the market to an innovative product, and improve regulation as more information becomes available. Both temporary legislative instruments can be part of a more innovation-friendly approach to regulation, combining on the one hand a certain openness to innovation, and on the other a responsible regulatory framework.
Keywords: innovation, sunset clauses, regulation, pacing problem, governance, sharing economy
JEL Classification: O31, O32, K2, L51, L43
Ranchordas, Sofia, Innovation-Friendly Regulation: The Sunset of Regulation, the Sunrise of Innovation (November 1, 2014). Jurimetrics, Vol. 55, No. 2, 2015 Forthcoming. Available at SSRN: https://ssrn.com/abstract=2544291 or http://dx.doi.org/10.2139/ssrn.2544291
Sofia Ranchordas (Contact Author)
University of Groningen, Faculty of Law ( email )
Oude Kijk in 't Straat
Harmoniecomplex
9700 AS Groningen, Gn 9712
HOME PAGE: http://www.rug.nl/staff/s.h.ranchordas/
|
cc/2019-30/en_middle_0056.json.gz/line12422
|
__label__wiki
| 0.511474
| 0.511474
|
AU2005214159A1 - Substituted quinoline compounds - Google Patents
Substituted quinoline compounds Download PDF
AU2005214159A1
AU2005214159A1 AU2005214159A AU2005214159A AU2005214159A1 AU 2005214159 A1 AU2005214159 A1 AU 2005214159A1 AU 2005214159 A AU2005214159 A AU 2005214159A AU 2005214159 A AU2005214159 A AU 2005214159A AU 2005214159 A1 AU2005214159 A1 AU 2005214159A1
phenyl
group consisting
AU2005214159A
Peter Bertinato
Michel Andre Couturier
Marcus Douglas Ewing
Ernest Seiichi Hamanaka
Ralph Pelton Robinson Jr.
Derek Lawrence Tickner
Pfizer Products Inc
2005-01-24 Application filed by Pfizer Products Inc filed Critical Pfizer Products Inc
2005-09-01 Publication of AU2005214159A1 publication Critical patent/AU2005214159A1/en
C07D—HETEROCYCLIC COMPOUNDS
C07D215/00—Heterocyclic compounds containing quinoline or hydrogenated quinoline ring systems
C07D215/02—Heterocyclic compounds containing quinoline or hydrogenated quinoline ring systems having no bond between the ring nitrogen atom and a non-ring member or having only hydrogen atoms or carbon atoms directly attached to the ring nitrogen atom
C07D215/16—Heterocyclic compounds containing quinoline or hydrogenated quinoline ring systems having no bond between the ring nitrogen atom and a non-ring member or having only hydrogen atoms or carbon atoms directly attached to the ring nitrogen atom with hetero atoms or with carbon atoms having three bonds to hetero atoms with at the most one bond to halogen, e.g. ester or nitrile radicals, directly attached to ring carbon atoms
C07D215/48—Carbon atoms having three bonds to hetero atoms with at the most one bond to halogen
C07D401/00—Heterocyclic compounds containing two or more hetero rings, having nitrogen atoms as the only ring hetero atoms, at least one ring being a six-membered ring with only one nitrogen atom
C07D401/02—Heterocyclic compounds containing two or more hetero rings, having nitrogen atoms as the only ring hetero atoms, at least one ring being a six-membered ring with only one nitrogen atom containing two hetero rings
C07D401/12—Heterocyclic compounds containing two or more hetero rings, having nitrogen atoms as the only ring hetero atoms, at least one ring being a six-membered ring with only one nitrogen atom containing two hetero rings linked by a chain containing hetero atoms as chain links
WO 2005/080373 PCT/IB2005/000167 1 SUBSTITUTED QUINOLINE COMPOUNDS Field of the Invention This invention relates to substituted quinoline compounds and the use thereof. The present compounds are inhibitors of microsomal triglyceride transfer protein (MTP) 5 and/or apolipoprotein B (Apo B) secretion and are useful, for example, for weight management and for the treatment of obesity and associated diseases. The invention further relates to pharmaceutical compositions comprising these compounds and to methods of treating obesity, atherosclerosis, and related diseases and/or conditions with said compounds, used either alone or in combination with other pharmaceutical agents, 10 including lipid lowering agents. Further still, the invention relates to certain chemical processes and intermediates that are useful in the preparation of the compounds of the present invention. Background of the Invention Obesity is a major public health concern because of its increasing prevalence 15 and associated health risks. Moreover, obesity may affect a person's quality of life through limited mobility and decreased physical endurance as well as through social, academic and job discrimination. Obesity and overweight are generally defined by body mass index (BMI), which is correlated with total body fat and serves as a measure of the risk of certain diseases. 20 BMI is calculated by weight in kilograms divided by height in meters squared (kg/m 2 ). Overweight is typically defined as a BMI of 25-29.9 kg/m 2 , and obesity is typically defined as a BMI of 30 kg/m 2 or higher. Recent studies have found that obesity and its associated health risks are not limited to adults, but also affect children and adolescents to a startling degree. Risk 25 factors for heart disease, such as high cholesterol and high blood pressure, occur with increased frequency in overweight children and adolescents compared with normal weight subjects of similar age. Also, type 2 diabetes, previously considered an adult disease, has increased dramatically in children and adolescents. Health risks associated with being overweight or obese include hypertension, 30 hypercholesterolemia, hypertriglyceridemia, pancreatitis, hyperlipidemia, dyslipidemia, type 2 (non-insulin dependent) diabetes, insulin resistance, glucose intolerance, WO 2005/080373 PCT/IB2005/000167 2 hyperinsulinemia, coronary heart disease, angina pectoris, congestive heart failure, stroke, gallstones, cholescystitis, cholelithiasis, gout, osteoarthritis, obstructive sleep apnea and respiratory problems, gall bladder disease, colitis, certain forms of cancer (e.g., endometrial, breast, prostate, and colon) and psychological disorders (such as 5 depression, eating disorders, distorted body image and low self esteem). It has been reported that inhibitors of microsomal triglyceride transfer protein (MTP) and/or Apo B secretion are useful in reducing food intake in mammals (European patent application publication No. 1 099 438 A2) and for treating obesity and associated diseases. See, for example, U.S. patent Nos. 5,919,795; 6,369,075; 6,121,282; 10 5,712,279; 5,968,950; 6,066,653 and 6,492,365; PCT patent application publication Nos. WO 96/40640, WO 97/43257, WO 98/27979, WO 00/05201, WO 02/28835 and WO 03/002533; European patent/application publication Nos. 0 584 446 Bl; 0 643 057 Al; and 1 099 701 Al; Wetterau et al., Science, 258, 999-1001, (1992) and Wetterau et al., Biochem. Biophys. Acta., 875, 610-617 (1986),. 15 Although investigations are ongoing, there still exists a need for a more effective and safe therapeutic treatment of obesity and for reducing or preventing weight-gain. SSummary of the Invention. The present invention relates to a compound of Formula (I) 3
4 (R2)m R 6 1 3 ' N R R le 1 N 20 () wherein:
1 is a group of the formula Rl" or RIb WO 2005/080373 PCT/IB2005/000167 3 4 [. (R) - 'N q- RI (R')q C-NR 10 x Rx 2-R (R la) or (R b 5 and is attached to the 2 or 3 position of the quinoline group of Formula (I); m is an integer from 0 to 2; n is an integer from 0 to 4; p is an integer from 0 to 5; q is an integer from 0 to 3; 10 r is a bond or an integer from 1 to 3; X is -N- or -C(Ra) - where R a is H or R';
1 is -N- or -C(Rb)- where R b is H or R7;
2 , R 7 , R 8 and R 9 are each independently selected from the group consisting of halo, -OH, -CN, (C 1
4 )alkyl, (C 1 -C4)alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, 15 halo-substituted(C 1 -C4)alkyl-, halo-substituted(C 1
4 )alkoxy-, (C 1
4 )alkylthio-, benzyloxy, hydroxy(CI-C 4 )alkyl-, (C2-C 4 )alkenyl, (C 2
4 )alkynyl, -C(O)N(RC)(Rll),
-N(R")C(O)R
2, -N(R")CO2R1, -N(R")S(O),R 12 , -C(O)R 2, -CO R 12
-OC(O)R
12 , -SO 2 N(Rc)(R") and -S(O),R 1 ; each Rc is independently H or (C 1
4 )alkyl; 20 s is the integer 1 or 2; v is an integer from 0 to 2;
3 and R 4 are each H or are taken together with the carbon atom to which they are attached to form a carbonyl group; WO 2005/080373 PCT/IB2005/000167 4
5 and R' 0 are each independently selectedfrom the group consisting of H, (Cl C4)alkyl, halo-substituted (C 1 .C4)alkyl, (C3-CT)cycloalkyl, -C(O)R 12 , alkoxyalkyl- having 2 to 4 carbon atoms, alkylthioalkyl- having 2 to 4 carbon atoms and -SO 2 R'1 2 ;
6 is (C 1 -Co 10 )alkyl optionally substituted with 1 to 3 substituents independently 5 selected from the group'consisting of halo, -OH and -CN, or
6 is pyridyl, phenyl or phenyl(C-C 6 )alkyl- in which the pyridyl and phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of (C-C 4 )alkyl, halo substituted (C 1 -C4)alky!, (CI-C 4 )alkoxy-, halo-substituted (Cl-C4)alkoxy-, halo, -OH and 10 -CN, or
6 is (C 2 -Co 10 )alkenyl, (C 2 -Co 10 )alkynyl, -CH 2 N(Rc)(R" 3 ), -C(O)N(R")(Rl 5 ), -00 2
20 or -CH 2 -W-Y where W is -0- or -S-; and Y is selected from the group consisting of H, (C 1 -Cs)alkyl, (C 3
7 )cycloalkyl, (C 3 C 7 )cycloalkyl(C 1
6 )alkyl-, phenyl and phenyl(C
-Ce 6 )alkyl-, where the (C-Cs)alkyl group 15 is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR'
, -C(O)R 1 2 , -C()OR 2
2 and -C(O)N(Rc)(Rll); the (C3-C 7 )cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, (C 1
-CE
6 )alkyl, -OH, -CN, 20 -CF 3 , -OCF 3 , -C(O)OR 12 and -OR 1 2 ; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (C 1 -Ce)alkyl, -OH, -CN, -CF 3 , -OCF 3 ,
-C(O)OR
12 and -OR 12 ; each R 11 is independently selected from the group consisting of H, (C 1 -C4)alkyl, 25 halo-substituted(C-C4)alkyl, (C3-C 7 )cycloalkyl, (Cl-C 3 )alkoxy(C2-C4)alkyl- having 3 to 5 carbon atoms and (C-C 3 )alkylthio(Cz-C 4 )alkyl- having 3 to 5 carbon atoms; each R 12 is independently (C-C 4 )alkyl or (C 3 -C7)cycloalkyl, where the (C
4 )alkyl is optionally substituted with 1 to 3 substituents independently selected from the group consisting of (C0 1
4 )alkoxy-, halo, -OH, -CN, -CF 3 and -OCF 3 ; 30 R 13 is selected from the group consisting of (C3-C 6 )alkyl, phenylmethyl-,
-C(O)R
16 and -S(O) 2
WO 2005/080373 PCT/IB2005/000167 5
14 is selected from the group consisting of H, (C 1
6 )alkyl, (C3-C 7 )cycloalkyl,
(C
7 )cycloalkyl(C 1 -Ce)alkyl-, phenyl and phenyl(Cl-C 6 )alkyl-, where the (C-C 6 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , 5 -OCF 3 , -OR 1 2 , -C(O)R" 2 , -CO 2
12 , -OC(O)R 1 2 , -N(R")C(O)R 12 and -C(O)N(Rc)(R"); the
7 )cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group are optionally substituted with1 to 3 substituents independently selected from the group consisting of halo, oxo, (Cl-C 6 )alkyl, -OH, -CN, -CF 3 , -OCF 3 and -OR 12 ; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 10 3 substituents independently selected from the group consisting of halo, (C-C 6 )alkyl,
6 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 and -OR 1 2 ;
8 )alkyl, (C 2
6 )alkenyl, (C2 C6)alkynyl, (C3-C 7 )cycloalkyl, (C3-C 7 )cycloalkyl(C 1 -C6)alkyl, phenyl, phenyl(C 1
6 )alkyl-, pyridyl, pyridyl(C-C 6 )alkyl-, -C(O)R" 2 and -SO 2
R'
2 , where the (C 1
8 )alkyl group is 15 optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR 12 , -C(O)R 12 , -C(O)OH,
-C(O)OCH
2 CeH 5 , -C(O)OCH 2 C(O)N(Rc)(Rll), -C(O)OR 12 , -OC(O)R 12 , -N(R")C(O)R 12 and -C(O)N(Rc)(R"); and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the 20 group consisting of halo, (C-C 6 )alkyl, (C0-C 6 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 ,
-OR
12 , -C(O)OH, -C(O)OCH2C 6
5 , and -C(O)OR 12 ; or
i s is -(CH 2 )tN(R 17
)(R'
8 ) where t is an integer from 2 to 4 and R 1 7 and R' 8 are taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms are 25 optionally substituted with oxo and optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R" 9 )-; or
1 4 and Rl" are taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms are optionally substituted with oxo and optionally include an additional 30 heteroatom moiety selected from the group consisting of -0-, -S- and -N(R"9)-; WO 2005/080373 PCT/IB2005/000167 6
19 is H, (Cl-C 6 )alkyl or halo-substituted(C,-C 6 )alkyl;
16 is (0 1 -C6)alkyl, phenyl or phenyl(C 1
4 )alkyl-, where the (C-C 6 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, -CN, (C-C 4 )alkoxy- and (C 1
4 )alkylthio, and 5 the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (C 1 -C4)alkyl and (C 1
4 )alkoxy-; and
20 is selected from the group consisting of (C-C 6 )alkyl, (C 3 "C7)cycloalkyl, (C3
7 )cycloalkyl(C 1
6 )alkyl-, phenyl and phenyl(C,-CG)alkyl-, where the (C-C 6 )alkyl group 10 is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR 12 , -C(O)R 1 , -CO 2
1 2 , -OC(O)R 12
-N(R
)C(O)R'
2 and -C(O)N(Rc)(Rll); the (C 3
7 )cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group are optionally substituted with to 3 substituents independently selectedfrom the group consisting of halo, oxo, (C 1
6 )alkyl, -OH, -CN, 15 -CF 3 , -OCF 3 and -OR'"; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (Cl-C 6 )alkyl, (C 1
6 )alkoxy-, -OH, -CN, -CF 3 , -OCFa and
12 ; a pharmaceutically acceptable salt thereof or a prodrug of said compound or said salt. 20 Preferably X is -C(Ra) - and X 1 is -N- or -C(Rb)
, more preferably X is -C(Ra) and X 1 is -C(Rb)
. In other aspects of the invention both of X and X' are -N-, or X is -N and X 1 is -C(Rb) - . R', Rb and Rc, independently, are preferably H. In the numbering system used herein to identify the positioning of substituents 25 on the aromatic rings containing X and/or X 1 ring-atoms where reference is made to a structural formula depicting such aromatic ring(s) as containing an X or X 1 ring-atom, highest priority is assigned to the X and X 1 ring atoms, and they are accordingly each numbered "1" as shown in Formulas Rls' and Ribl . However, the numbering system used in naming specific compounds of the invention in which such aromatic ring(s) 30 is/are phenyl (i.e., X is -C(Ra) - and/or X' is -C(Rb)
) is the conventional numbering system for phenyl rings for the ring in which X is -C(Ra)
or X' is -C(Rb)_.
WO 2005/080373 PCT/IB2005/000167 7 In R 1 , the -C(O)N(Rio)- moiety is preferably positioned ortho (i.e., adjacent) to the R 8 -bearing pheny group or the (C 4
7 )cycloalkyl group in R 1 , and, when X is -N-, is preferably attached to the 2 or 3 position of the pyridine ring of R 1 . In this embodiment, the R 8 -bearing phenyl group or the (C 4
7 )cycloalkyl group is preferably attached to the 5 2 or 3 position of the pyridyl ring not occupied by -C(O)N(R 10 )-. In a preferred embodiment where X is -N-, the R 8 -bearing phenyl group or the (C 4 -C7)cycloalkyl group occupies the 2 position and -C(O)N(Ro)- occupies the 3 position of the pyridine ring as illustrated in Formula (Rial) and Formula (Ribl) below: 10 (RB)p I[ 0 0 SN 2>"- NkN 1 k (R ) NR 2 O ( ) N , k q o R (R')q 11 (Rlal
(R
1b l 1 The R 1 group is preferably attached to the 2 position of the quinoline group in 15 Formula (I), i.e. ortho to the N atom of the quinoline group as shown in Formulas (IA) and (IB) below: WO 2005/080373 PCT/IB2005/000167 8 7 (R)n
3 R4 o IN'~ N R 6 15 O R X N N 10 R (IA) (R)n X generally and preferably. The integer r is preferably 1 or 2.
3 Each R' in Formula (1), independently, is preferably selected from the group consisting of F, CI, -CH3 and -CF3, more preferably from among Cl, -CH3 and -CF3. The integer m is preferably 0 or 1, more preferably 0. 10 Preferably, each R 7 is independently selected from the group consisting of halo, -OH, -CN, (Cl-C4)alkyl, (Cl-C4)alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo substituted(C,-C4)alkyl- and halo-substituted(Cl-C4)alkoxy-. More preferably, R 7 is selected from the group consisting of from F, CI, Br, (Cl-C4)alkyl, (C,-C4)alkoxy-, fluoro substituted(C,-C4)alkyl- ( e.g., -CF3, -CHF2,-C2F5) and fluoro-substituted(CI-C4)alkoxy- ( WO 2005/080373 PCT/IB2005/000167 9 e.g., -OCF 3 ). Still more preferably, R 7 is selected from the group consisting of Cl, (Ci
4 )alkyl, (Cl-C4)alkoxy- and -CF 3 . Most preferably R 7 is selected from the group consisting of CI, -CH 3 , -OCH 3 and -CF 3 ,. The integer n is preferably 0 or 1, more preferably 0. When n is 1, R 7 is preferably attached to the 5 or 6 position of the ring in 5 Formula (I). Each R 8 , independently, is preferably selected from the group consisting of halo, -OH, (Cl-C 4 )alkyl, (Cl-C4)alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo substituted(C 1
4 )alkyl-, halo-substituted(C 1
4 )alkoxy-, benzyloxy, (C 2
4 )alkenyl and S(O)vR 12 ; more preferably from the group consisting of from F, CI, Br, (C 1
4 )alkyl, (Cl 10 C 4 )alkoxy-, fluoro-substituted(C 1
4 )alkyl- and fluoro-substituted(C 1
4 )alkoxy-. Still more preferably, R 8 is selected from the group consisting of CI, (Cl-C 4 )alkyl, (Ci C4)alkoxy- and -CF 3 . Still more preferably, R 8 is selected from the group consisting of
4 )alkoxy- and -CF 3 . Most preferably, R 8 is -CH(CH 3
2 , -C(CH 3
3 or CF 3 . In a further preferred embodiment R 8 is selected from the group consisting of (Cl 15 C 4 )alkyl (particularly branched chain alkyl such as -CH(CH 3
2 or -C(CH 3
3 ), (C 1 C4)alkoxy-, -CF 3 , benzyloxy-, (C 2
4 )alkenyl- (e.g., -C(CH 3
)=CH
2 ) and -S(O),R 2 (e.g., S(O),(C 1
4 )alkyl such as -SCH 3 or -S(O) 2
3 )). The integer p is preferably 1 or 2; more preferably, 1. When p is 1, R 8 is preferably attached at the 4 position of the phenyl group. The integer v is preferably 0 or 2; more preferably, 0. 20 Each R 9 , independently, is preferably selected from the group consisting of F, Cl,
-CH
3 and -CF 3 , more preferably from among CI, -CH 3 and -CF 3 . Most preferably, R 9 is CH 3 . The integer q is preferably 0 or 1; more preferably, 0.
5 and R 1 o, independently, are preferably H, (C 1
4 )alkyl or halo-substituted(C 1 . C4)alkyl; more preferably, H, -CH 3 or -CF 3 ; most preferably, H or-CH 3 . 25 Each R 1 1 , independently, is preferably selected from the group consisting of H, (Cl-C 4 )alkyl and fluoro-substituted(C 1 -C4)alkyl-. Each R 12 , independently, is preferably (Cl-C 4 )alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of (C 1
4 )alkoxy- and halo (e.g., F or CI). In one aspect of the invention, the R 12
1 -C4)alkyl group is 30 unsubstituted.
6 "is preferably (Cl-Co 10 )alkyl, pyridyl, phenyl, phenyl(C 1
6 )alkyl-, -CH 2
-W-Y,
WO 2005/080373 PCT/IB2005/000167 10
2 N(Rc)(R" 3 ), -C(O)N(R 14
)(R"
5 ) or -CO 2
20 in which the (Cl-C 10 )alkyl, pyridyl or the phenyl group or moiety is optionally substituted. More preferably, R 6 is optionally substituted (C 1
10 )alkyl, optionally substituted pyridyl, -CH 2 -W-Y, -C(O)N(R 14
)(R
15 ) or -CO 2
2 . 5 Still more preferably, R 6 is optionally substituted (C-C 10 )alkyl, optionally substituted pyridyl or -C(O)N(R 14
1 '5). Still more preferably, R 6 is optionally substituted (C 1 -Co 10 )alkyl or
-C(O)N(R'
4 )(R1 5 ). Most preferably, R 6 is -C(O)N(R 14
1 5 ). 10 Many of the compounds of this invention have one or more chiral carbon atoms. For example, in the compounds of Formula (I), the carbon atom to which R 6 is attached will be asymmetric in the majority of the present compounds. The description of specific compounds herein as being "R" or "S" means that the carbon atom to which R 6 is attached has the assigned configuration, i.e., "R" or "S", which is determined in 15 accordance with the sequence rules originally described in Cahn RS, Ingold C and Prelog V, Angew. Chem. Int. Ed., 5, 385 (1966). In the embodiment of the invention where R 6 is optionally substituted (C 1 C 1 0 )alkyl, the alkyl is preferably a (Cl-Cs)alkyl. Preferably, the alkyl is unsubstituted or is substituted with 1 to 3 substituents independently selected from the group consisting 20 of F and -OH. The substituents R 3 and R 4 in this embodiment are preferably taken together with the carbon atom to which they are attached to form a carbonyl group. The other substituents and parameters in this embodiment (R 6 is optionally substituted
10 )alkyl) are as defined above in this application, generally and preferably. Preferred compounds of this embodiment of the invention, where R 6 is optionally 25 substituted (Cl-Co 10 )alkyl and X and X 1 are both -CH- include the compounds of Examples 98, 100, 101 and 105. Representative compounds of this embodiment of the invention (R 6 is optionally substituted (C 1
10 )alkyl) include the following compounds where X is -N- and X, is -CH-: 30 (R)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino-quinoline-6-carboxylic acid (1-p-tolyl-ethyl)-amide, WO 2005/080373 PCT/IB2005/000167 11 (R)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [1-(3-methoxy-phenyl)-ethyl]-amide, (R)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (1-phenyl-propyl)-amide, and 5 2-{[2-(4-trifluoromethyl-henyl)-pyridine-3-carbonyl]-amino)-quinoline-6-carboxylic acid (1-phenyl-hexyl)-amide. Representative compounds of this embodiment of the invention (R 6 is optionally substituted (Cl-C 10 )alkyl) include the following compounds where X and X 1 are both -N-: (R)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 10 acid [1-(5-methyl-pyridin-2-yl)-ethyl]-amide, (R)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [1-(4-methoxy-pyridin-2-yl)-ethyl]-amide, (R)-2-[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (1-pyridin-2-yl-propyl)-amide and 15 2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino)-quinline-6-carboxylic acid (1-pyridin-2-yl-hexyl)-amide. Representative compounds of this embodiment of the invention (R 6 is optionally substituted (C 1
10 )alkyl) include the following compounds where X is -CH- and X 1 is -N-: 20 (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [1-(5 methyl-pyridin-2-yl)-ethyl]-amide, (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [1-(4 methoxy-pyridin-2-yl)-ethyl]-amide, (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (1 25 pyridin-2-yl-propyl)-amide and 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (1-pyridin 2-yl-hexyl)-amide. In the embodiment where R 6 is pyridyl, phenyl or phenyl(Cl-C 6 )alkyl- in which the pyridyl or the phenyl group or moiety is optionally substituted, the substituents are 30 preferably selected from (Cl-C 4 )alkyl, halo-substituted (Cl-C 4 )alkyl- (e.g., Cl- or F substituted alkyl- such as -CH 2
2 CI, -CF 3 or -CHF2), (C 1
4 )alkoxy- (e.g., -OCH 3
-OC
5 or -OCH(CH 3
2 ), halo (e.g., F or CI), and OH; more preferably, from (C-C 4 )alkyl, F-substituted (C-C 4 )alkyl-, (C 1
4 )alkoxy-, F and Cl; and most preferably from (C 1 C 4 )alkyl, -CF 3 , -OCH 3 , F and CI. R 6 in this embodiment is preferably phenyl or pyridyl, particularly 2-pyridyl. The substituents R 3 and R 4 in this embodiment are preferably 5 taken together with the carbon atom to which they are attached to form a carbonyl group. The other substituents and parameters for this embodiment are as defined above in this application, generally and preferably. Preferred compounds of this embodiment of the invention (R' is pyridyl, phenyl or phenyl(Cl-C 6 )alkyl-) and X and X 1 are both -CH- include the compounds of Examples 10 108, 111 and 112. Representative compounds of this embodiment of the invention (R 6 is pyridyl, phenyl or phenyl(C 1
6 )alkyl- in which the pyridyl or either phenyl is optionally substituted) include the following compounds where X is -N- and X 1 is -CH-: (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 15 acid (phenyl-pyridin-2-yl-methyl)-amide (S)-2-{[2-(4-isopropyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (phenyl-pyridin-2-yl-methyl)-amide and (S)-2-{[2-(4-tert-butyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (phenyl-pyridin-2-yl-methyl)-amide. 20 In other embodiments of the invention, R 6 is (C2-C 10 )alkenyl or (C 2
10 )alkynyl, preferably (C 2
8 )alkenyl or (C 2 -Cs)alkynyl, more preferably (C 2
6 )alkenyl or (C2 Ce)alkynyl, most preferably (C 2
4 )alkenyl (e.g., allyl) or (C 2
4 )alkynyl (e.g., propargyl). In the embodiment where R 6 is -CH 2 -W-Y, W is preferably -0-, Y is preferably selected from the group consisting of H, (C 1
4 )alkyl-, 25 phenyl and phenyl(C 1
4 )alkyl-; more preferably, from H, (C-C 6 )alkyl, phenyl and phenyl(Cl-C 4 )alkyl-; most preferably, from H, (Cl-C 6 )alkyl, phenyl and phenylmethyl-. The (C-C 6 )alkyl group of Y is unsubstituted or is substituted, preferably with 1 to 3 substituents. In a preferred embodiment, the substituents are independently selected from the group consisting of F, CI, -C(O)Ri 2 , -C(O)OR 1 2 and -C(O)N(Rc)(Rll). 30 The cycloalkyl moiety of the cycloalkylalkyl group of Y is unsubstituted or is substituted, preferably with 1 to 3 substituents. In a preferred embodiment the WO 2005/080373 PCT/IB2005/000167 13 substituents are independently selected from the group consisting of F, CI, oxo and (Cl C4)alkyl. The phenyl group and the phenyl moiety of the phenylalkyl group of Y are unsubstituted or substituted, preferably with 1 to 3 substituents. In a preferred 5 embodiment, the substitujents are independently selected from the group consisting of F, CI, (C 1
4 )alkyl, -OH, -OF 3 , -OCF 3 , -C(O)OR 12 and -7OR 12 ; more preferably, from F, CI,
4 )alkyl and -CF 3 . In this embodiment (R 6 is -CH 2 -W-Y), R 3 and R 4 are preferably taken together with the carbon atom to which they are attached to form a carbonyl group. The other 10 substituents and parameters are as defined above in this application, generally and preferably. Preferred compounds of this embodiment of the invention (R 6 is -CH 2 -W-Y) where X and X 1 are both -CH- include the compounds of Examples 69-71. Representative compounds of this embodiment of the invention (R 6 is -CH 2 -W-Y) 15 include the following compounds where X is -N- and X 1 is -CH-: (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-methoxy-1-phenyl-ethyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-ethoxy-1l-phenyl-ethyl)-amide and 20 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-butoxy-1-phenyl-ethyl)-amide. Representative compounds of this embodiment of the invention (R" is -CH,-W-Y) include the following compounds where X and X 1 are both -N-: (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 25 acid (2-methoxy-1l-pyridin-2-yl-ethyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-ethoxy-1l-pyridin-2-yl-ethyl)-amide and (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-butoxy-1l-pyridin-2-yl-ethyl)-amide. 30 Representative compounds of this embodiment of the invention (R 6 is -CH 2 -W-Y) include the following compounds where X is -CH- and X' is -N-: WO 2005/080373 PCT/IB2005/000167 14 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 methoxy-1 -pyridin-2-yl-ethyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 ethoxy-1-pyridin-2-yl-ethyl)-amide and 5 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 butoxy-1 -pyridin-2-yl-ethyl)-amide. In the embodiment where R 6 is -CH 2 N(Rc)(Rl 3 ), R 13 is preferably selected from the group consisting of phenylmethyl-, -C(O)R 1 6 and -S(O) 2
16 . More preferably, R 13 is -C(O)R '6 or -S(O) 2
16 ; most preferably, -C(O)R . 10 R 16 is preferably is (Cl-C 6 )alkyl, phenyl or phenyl(Cl-C 4 )alkyl-; more preferably (Cl
6 )alkyl or phenyl. The (Cl-C 6 )alkyl group of R 16 is unsubstituted or is substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of F, Cl and (C-C 4 )alkoxy-. 15 The phenyl group and the phenyl moiety of the phenylalkyl group of R 16 are unsubstituted or are substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of F, CI, (C 1
4 )alkyl and (C 1
4 )alkoxy-; more preferably, from CI, -CH 3 and -OCH 3 . R 3 and
4 in this embodiment are preferably taken together with the carbon atom to which they 20 are attached to form a carbonyl group. The other substituents and parameters are as defined above in this application, generally and preferably. Preferred compounds of this embodiment of the invention (R 6 is
2 N(Rc)(R" 3 )) where X and X' are both -CH- include include the compounds of Examples 79, 80 and 82-84. 25 Representative compounds of this embodiment of the invention (R 6 is
2 N(Rc)(R" 3 )) include the following compounds where X is -N- and X' is -CH-: (S)-2-{[2-(4-trifuoromethyl-phenyl)-pyridine-3-carbonyl]-amino)}-quinoline-6-carboxyl ic acid (2-acetylamino-1-phenyl-ethyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 30 acid (1-phenyl-2-propionylamino-ethyl)-amide, WO 2005/080373 PCT/IB2005/000167 15 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyll-amino}-quinoline-6-carboxylic acid (2-butyrylamino-1-phenyl-ethyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-pentanoylamino-1l-phenyl-ethyl)-amide and 5 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-benzoylamino-1-phenyl-ethyl)-amide. Representative compounds of this embodiment of the invention (R 6 is
2 N(Rc)(R" 3 )) include the following compounds where X and X 1 are both -N-: (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyll]amino}-quinoline-6-carboxylic 10 acid (2-acetylamino-1-pyridin-2-yl-ethyl)-amide, (S)-2-({[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-propionylamino-1l-pyridin-2-yl-ethyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-butyrylamino-1l-pyridin-2-yl-ethyl)-amide, 15 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (2-pentanoylamino-1l-pyridin-2-yl-ethyl)-amide and (S)-2-([2-(4-trifluoromethyl- phenyl)-pyridine-3-carbonyl]-amino }-quinoline-6-carboxylic acid (2-benzoylamino-1l-pyridin-2-yl-ethyl)-amide. Representative compounds of this embodiment of the invention (R 6 is 20 -CH 2 N(Rc)(R 3 )) include the following compounds where X is -CH- and X 1 is -N-: (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 acetylamino-l1-pyridin-2-yl-ethyl)-amide, (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 propionylamino-1 -pyridin-2-yl-ethyl)-amide, 25 (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 butyrylamino-1-pyridin-2-yl-ethyl)-amide, (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 pentanoylamino-1l-pyridin-2-yl-ethyl)-amide and (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 30 benzoylamino- 1-pyridin-2-yl-ethyl)-amide.
WO 2005/080373 PCT/IB2005/000167 16 The embodiment where R 6 is -C(O)N(R 14
15 ) is a preferred embodiment of the invention.
14 is preferably selected from the group consisting of H, (Cl-C 6 )alkyl, (C3
6 )cycloalkyl, (C 3 -C6)cycloalkyl(CO-C4)alkyl-, phenyl and phenyl(C1-C4)alkyl-; more 5 preferably, from H and (C 1 -C4)alkyl, particularly -CH 3 or -0 2
5 . The (C 1
6 )alkyl group of R 14 is optionally substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of F, CI, -OH, -OCF 3 , and -OR 12 ; more preferably, from F, CI, -OH and -OCF 3 . Most preferably, the optional substituent is F. 10 The cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group of R 14 are optionally substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of F, CI, oxo, (Cl
4 )alkyl, -OH, -CF 3 , -OCF 3 and -OR 12 ; more preferably, from F, CI, oxo and (C 1
4 )alkyl. The phenyl group and the phenyl moiety of the phenylalkyl group of R 14 are 15 optionally substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of F, CI, (Cl
4 )alkyl, (C-C 4 )alkoxy, -OH, -CF 3 , -OCF 3 and -OR 12 ; more preferably, from F, CI, (Cl
4 )alkyl and (C-C 4 )alkoxy-; most preferably, from CI, -CH 3 and -OCH 3 .
1 5 is preferably selected from the group consisting of H, or an optionally 20 substituted (C-Cs)alkyl (particularly n-pentyl), (C 3
7 )cycloalkyl, (C 3
7 )cycloalkyl(C 1 C 6 )alkyl-, phenyl, phenyl(Cl-C 6 )alkyl-, pyridyl, pyridyl(Cl-Ce)alkyl-, -C(O)R 12 , -S0 2
12 and -(CH 2 )tN(R17)(R 18 ); more preferably, from H, (C-Cs)alkyl, (C3
6 )cycloalkyl(C-C 6 )alkyl-, phenyl, phenyl(C 1
6 )alkyl-, pyridyl and pyridyl(C-C 6 )alkyl-. Still more preferably, R 1 5 is selected from the group consisting of 25 H, (Cl-Cs)alkyl, (C 3
6 )cycloalkyl, (C 3 -C6)cycloalkyl(C 1 -C6)alkyl-, phenyl(Cl-C 6 )alkyl-, pyridyl and pyridyl(C0 1
6 )alkyl-. Still more preferably, R' 5 is selected from the group consisting of H, (C-C 8 )alkyl, (C3-C 6 )cycloalkyl, (C 3 -C6)cycloalkyl(C 1 -C4)alkyl-, phenyl(C C4)alkyl- and pyridyl(C 1
4 )alkyl- (e.g.,pyridylmethyl such as 2-pyridylmethyl). Most preferably, R" 5 is H, optionally substituted phenyl(C-C 4 )alkyl- (e.g., optionally 30 substituted benzyl) or optionally substituted (C 1 -Cs)alkyl.
WO 2005/080373 PCT/IB2005/000167 17 The (C 1
8 )alkyl group of R 15 is preferably unsubstituted or it may be substituted, preferably with 1 to 3 substituents. Substituted alkyl for R 15 includes, for example, groups such as -(C 1 -Cs)alkylCO 2 H and various esters thereof (e.g..,
-(CH
2 CO2CH 3 ). In a preferred embodiment the substituents are independently 5 selected from the group consisting of F, CI, oxo, -C(O)OH, -C(O)OCH 2
6 Hs,
2 C(O)N(Rc)(Rll), -C(O)OR 12 , -OH, -OCF 3 , and -OR 1 ; more preferably, from F, CI, oxo, -OH and -OCF 3 ; most preferably, from F, oxo, -OH and -OCF 3 . The phenyl group and the phenyl moiety of the phenylalkyl group of R 15 are unsubstituted orare substituted, preferably with 1 to 3 substituents. In a preferred 10 embodiment the substituents are independently selected from the group consisting of F, CI, (C1-C4)alkyl, (C 1
4 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 , -C(O)OH, -C(O)OCH 2
5 , and
12 , more preferably from F, CI, (C-C4)alkyl, (C,-C4)alkoxy-, -OH, -CF 3 ,
-OCF
3 , -C(O)OCH 2
5 , and -C(O)OR 12 ;. In a preferred embodiment, the phenylalkyl group of R 15 is unsubstituted benzyl or a fluoro-substituted benzyl, particularly 4-F 15 benzyl. When R' 5 is -(CH 2 ),N(R17)(R8), and R 17 and R 18 are taken together with the nitrogen atom to which they are attached to form an optionally substituted heterocyclic ring containing 5 or 6 ring-atoms and optionally including an additional heteroatom moiety, the additional heteroatom moiety is preferably -0- or -N(R 19 )-, where R' 9 is 20 preferably (C-C4)alkyl or F-substituted(C 1
4 )alkyl- (e.g., -CF 3 or -CHF 2 ); more preferably, (C 1
4 )alkyl. Alternatively, in another preferred embodiment, R 14 and R 15 are taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms (preferably 5 or 6) in which rings containing 5 or 6 ring-atoms are 25 optionally substituted with oxo and optionally include an additional heteroatom moiety. Preferably, the additional heteroatom moiety is -0- or -N(R 1 9 )-, where R" 9 is preferably
4 )alkyl or F-substituted(CI-C 4 )alkyl- (e.g., -OF 3 or-CHF 2 ); more preferably, (C
4 )alkyl. The additional heteroatom moiety is more preferably -0-. In this embodiment, where R 6 is -C(O)N(R 1 4
5 ), R 3 and R 4 are preferably taken 30 together with the carbon atom to which they are attached to form a carbonyl group.
WO 2005/080373 PCT/IB2005/000167 18 The other substituents and parameters are as defined above in this application, generally and preferably. Preferred compounds of this embodiment of the invention (R 6 is
-C(O)N(R
15 )), where X and X 1 are both -CH-, include the compounds of Examples 5 1-7, 9-12, 16-21, 25, 26, 30-32, 34, 35, 47-55 and 58-64 as well as the following compounds: (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(4 hydroxy-pentylcarbamoyl)-phenyl-methyl]-amide and (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(4 10 oxo-pentylcarbamoyl)-phenyl-methyl]-amide. A particularly preferred compound of this embodiment is: (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide. Representative compounds of this embodiment of the invention, where R 6 ' is 15 -C(O)N(R 14
1 5 ), include the following compounds where X is -N- and X 1 is -CH-: (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (carbamoyl-phenyl-methyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (methylcarbamoyl-phenyl-methyl)-amide, 20 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [phenyl-(2,2,2-trifluoro-ethylcarbamoyl)-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(ethyl-methylcarbamoyl)-phenyl-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 25 acid [(ethyl-methyl-carbamoyl)-phenyl-methyl]-amide, (S)-2-{[2-(4-trifuoromethyl-phenyl)-pyridine-3-carbonyl]-amino)}-quinoline-6-carboxyl ic acid (diethylcarbamoyl-phenyl-methyl)-amide, (S)-N-(6-{[(diethylcarbamoyl-phenyl-methyl)-amino]-methyl}-quinolin-2-yl)-2-(4 trifluoromethyl-phenyl)-nicotinamide, 30 (S)-N-(6-([(diethylcarbamoyl-phenyl-methyl)-methyl-amino]-methyl}-quinoli n-2-yl)-2-(4 trifluoromethyl-phenyl)-nicotinamide, WO 2005/080373 PCT/1B2005/000167 19 (S--[-4tilooehlpey)prdn--abnl-mn)qioie6croyi acid (propyl ca rbamoyl-phen yl-m eth yl)-a mid e, (S--m ty-2(-rfIu rmehl-h y) prdin -- ab nl]a o- in l e6 carboxylic acid (propylcarbamoyl-phenyl-methyl )-amide, 5 (S)-2-{[2-(4trifuoromnet 'hyI-phenyl)-pyridine-3-carbofl-qrfio-quilile-6-carboxyic acid [(methyl-propyl-carbamoyl)-phenyl-methyl]-amide, (S)-2-[2-(4trifuoromethy-phenyI)-pyridine-3-carbony]-amino-quinoine-6-carboxyiO acid [(ethyl-propyl-carbamoyl)-phenyl-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino-quinoline-6-carboxyliC 10 acid (isopropylcarbamoyl-phenyl-methyl )-amide, (S)-2-(t2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(ethyl -isopropyl -carbamoyl )- phe nyl-methyl]- amide, (S)-2-([2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyII-amino}-quinoline-6-carboxylic acid (butylcarbamoyI-phenyI-methyI)-amide, 15 (S--[-4tilooehlpey)prdn--abnl-mn)qioie6croyi acid [(butyl-methyl-carbamoyl)-phenyl-methyl]-amide,' (S--[-4trf oo ty phny) yidin--abnl-min)q o e6c bxli acid [(butyl-methyl-carbamoyl)-phenyl-methyl]-amlide, (S )-N-[6-([(butyl-methyl-carbamoyl )-phenyl-methyl]-methyi-amino}-methyl)-quinolin-2 20 yI]-2-(4-trifluoromethyl-phenyl)-nicotinamide, (S)-2-{[2-(4trifluorom ethyl -ph en yl )-pyrid ine-3-ca rbo nyl] -am ino} -q u inol ine-6-ca rboxyl ic acid (isobutylcarbamoyl-pheny-methyl )-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide, 25 (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl )-amide, (S)-2-{[2-(4-trifuoromethyl-pheny)-pyridine-3-carbofl-aio}-qui noline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide, (S--[-4tilooehlpey)prdn--abnl-mn)qioie6croyi 30 acid [(methyl-pentyl-carbamoyl )-phenyl-methyl]-amide, WO 2005/080373 PCT/1B2005/000167 20 (S)-N-(6-{[(pentylcarbamoyl-phenyl-methyl )-amino]-methyi}-quinolin-2-yI)-2-(4 trifluoromethyl-phenyl)-nicotinamide, (S )-N-(6-{[methy- (pe ntyl ca rba moyl -ph eny -met hy)-a m iQI-met hyI}-qu il i-2-yI)-2-(4 trifluoromethyl-phenyl)-nicotinamide, 5 (S)-2-[2(4-trifuoromethy-pheny)-pyridine-3-carbonyII-amino)-quinoline-6-carboxyic acid [(met hyl -pe ntyl -ca rbam oyl)-p he nyl-methyl]-a mide, (S )-2-([2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(5-hydroxy-pentylcarbamoyl)-phenyl-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 10 acid (hexylcarbamoyl-phenyl-methyl)-amide, 2-{methyl-[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6 carboxylic acid (cyclopropylcarbamoyl-phenyl-methyl)-amide, (S )-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quiolie-6-Carboxyic acid (benzylcarbamoyl-phenyl-methyl)-amide, 15 (S )-2-{methyl-[2-(4-trifiuoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6 carboxylic acid (benzylcarbamoyl-phenyl-methyl )-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(benzyl-methyl-carbamoyl )-phenyl-methyl]-amide, (S )-2-{methyl-[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino-quinolifle-6 20 carboxylic acid [(benzyl-methyl-carbamoyl )-phenyl-methyl]-amide, (S)~-N-6-([(benzy-methy-carbamnoyl)-pheny-methy]-amino-methy)-quilil-2-y]-2-(4 trifluoromethyl-phenyl )-nicotinamide, (S )-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino-quinoline-6-carboxylic acid [phenyl -(2- pyri d in-2-yI -ethyl ca rbam oyl)-methyl] -alhide, 25 (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [phenyl-(2-pyridin-4-yI-ethylcarbamoyl)-methyl-amlide, (S)-2-{[2-(4-trif uorom ethyl- phenyl)- pyridi ne- 3-ca rbonyl] -am ino}-qu inol ine-6-ca rboxyl ic acid (2-oxo-l1-phenyl-2-pyrrolidin-1 -yi-ethyl)-amide, (S)-2-{methyl-[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6 30 carboxylic acid (2-oxo-1 -phenyl-2-pyrrolidin-1 -yI-ethyl )-amide, WO 2005/080373 PCT/IB2005/000167 21 (S)-2-{methyl-[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6 carboxylic acid (2-oxo-1l-phenyl-2-piperidin-1-yl-ethyl)-amide, (S)-2-{methyl-[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6 carboxylic acid (2-morpholin-4-yl-2-oxo-1-phenyl-ethyl)-amide, 5 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino)-quinoline-6-carboxylic acid [(4-hydroxy-pentylcarbamoyl)-phenyl-methyl]-amide and (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(4-oxo-pentylcarbamoyl)-phenyl-methyl]-amide. Representative compounds of this embodiment-of the invention, where R 6 is 10 -C(O)N(R 14
5 ), include the following compounds where X and X 1 are both -N-: 2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino)-quinoline-6-carboxylic acid (carbamoyl-pyridin-2-yl-methyl)-amide, (S)- 2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinOIne-6-carboxylic acid (methylcarbamoyl-pyridin-2-yl-methyl)-amide, 15 (S)-2-{[2-(4-trifluorome t h y l - p h e n y l)- p y r id in e -3c a rbo n y l]a m in o
q u in o lin e -6c a r b o x y lic acid [phenyl-(2,2,2-trifluoro-ethylcarbamoyl)-methyl]-amide, (S)-2-{[2-(4-trifuoromethyl-phenyl)-pyridine-3-carbonyl ]-amino)}-quinoline-6-carboxyl ic acid [(ethyl-methylcarbamnoyl)- pyridin-2-yl-methyl]-amide, (S)-2-{[2-(4-trifuoromethyl-phenyl)-pyridine-3-carbonyl]-amin o}-quinoli ne-6-carboxyl ic 20 acid [(ethyl-methyl-carbamoyl)- pyridin-2-yl-methyl]-amide, (S)-2-{[2-(4-trifloromethyl-phenyl)-pyridine-3-carbonyl]-amino)-quinoline-6-carboxylic acid (diethylcarbamoyl- pyridin-2-yl-methyl)-amide, (S)-N-(6-{[(diethylcarbamoyl- pyridin-2-yl-methyl)-amino]-methyl}-quinolin-2-yl)-2-(4 trifluoromethyl-phenyl)-nicotinamide, 25 (S)-N-(6-{[(diethylcarbamoyl- pyridin-2-yl-methyl)-methyl-amino]-methyl)-quinolin-2-yl)-2 (4-trifluoromethyl-phenyl)-nicotinamide, (S)-2-([2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (propylcarbamoyl-pyridin-2-yl-methyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbo nyl]-amino}-qu inol ine-6-carboxyl ic 30 acid (propylcarbamoyl-pyridin-2-yl-methyl)-amide, WO 2005/080373 PCT/1B2005/000167 22 (S )-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonylj-amino}-quinoline-6-carboxylic acid [(methyl-propyl-carbamoyl )- pyridin-2-yI-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridi ne-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(ethyl-propyl-carbamoyl)- pyridin-2-yI-methyl]-amide, 5 (S )-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (isopropylcarbamoyl- pyridin-2-yI-methyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(ethyl-isopropyl-carbamoyl )- pyridi n-2-yI-m ethyl]j- amide, (S )-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic 10 acid (butylcarbamoyl- pyridin-2-yI-methyl)-amide, (S )-2-[2-(4-trifuoromethyl-phenylb-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(butyl-methyl-carbamoyl)- pyridin-2-yI-methyl]-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(butyl-methyl-carbamoyl)- pyridin-2-yI-methyll-amide, 15 (S)- N-[6- (([(butyl -m ethyl -ca rbamoyl)- pyridin-2-yI-methyl]-methyl-amino}-methyl) quinolin-2-yI]-2-(4-trifluoromethyl-phenyl)-nicotinamide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (isobutylcarbamoyl- pyridin-2-yI-methyl )-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyI]-amino}-quinoline-6-carboxylic 20 acid (pentylcarbamoyl- pyridin-2-yI-methyl )-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (pentylcarbamoyl- pyridin-2-yI-methyl)-amide, (S)-2-{[2-(4-trifluoromethyl-phenyl )-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid (pentyicarbamoyl- pyridin-2-yI-methyl)-amide, 25 (S)-2-{[2-(4-trif luoromethyl-p hen yl )-pyrid ine- 3-carbo nyl]-a m ino}-q uinoli ne-6-ca rboxyl ic acid [(methyl-pentyI-carbamoyI )- pyridin-2-yI-methyl]-amide, (S)-N-(6-{[(pentylcarbamoyl- pyridin-2-yI-methyl)-amino]-methyl}-quinolin-2-yI)-2-(4 trifluoromethyl-phenyl)-nicotinamide, (S)-N-(6-{[methyl-(pentylcarbamoyl- pyridin-2-yI-methyl)-amino]-methyl}-quinolin-2-y )-2 30 (4-trif luorom ethyl -phe nyl)-n icoti nam ide, WO 2005/080373 PCT/1B2005/000167 23 (S--2(-rfurmty-hnl-yiie--abnl-mn)qioie6croyi acid [(methyl-peltyl-carbamlY)- pyridin-2-yi-methyII-amide, (S--[-4-rfurmehlpey)-pyridine-3-carbonfl]-amiflo)quiflOife6-carboxylic acid [(5-hydroxy-peltycarbamoyI)- pyridin-2-yI-methyll-almde, 5 (S--[-4tilooe~y-hnl-yiie3croylamn)qioie6croyi acid (hexylcarbamoyl- pyridin-2-yI-methyl )-amide,, (S--mty-2(-rfurmt'lpey)-yIrdn--abnl-mnlqioie6 carboxylic acid (cyclopropylcarbamoyl- pyridin-2-yI-methyl)-amide, (S--[-4tilooehlpey)prdne3croyj-mn)qioie6croyi 10 acid (benzylcarbanloyl- pyridin-2-yi-methy)-amide, (S)-2-{methyI-[2-(4-trifluoromlethyI-phefl)-yriie3cabnl-aio-uioie carboxylic acid (benzylcarbamoyl- pyridin-2-yI-methyl)-amide, (S--[-4tilooehlpey)prdn--abnl-mn)qioie6croyi acid [(benzyl -m ethyl -carb a mllO)- pyridin-2-yI-methylI-amlide, 15 (S--mty-2( rfurrehlpey)prdn--abnl-mn)qioie6 carboxylic acid [(benzyl-methyl-carbamoyl)- pyrid in- 2-'yI-m ethyl]-alhide, (S)-N-[6-([(benzyI-methyI-carbamoyl)- pyii--lmty]aio-ehl-unln2yl 2-(4 -trifl uorom ethyl- phe nl)flnicotin amide, (S--[-4tilooehlpey)prdn--abnl7mn)qioie6croyi 20 acid [prdn2y-2prdn2y-ehlabmy)mty]aie (S--[-4ti1ooehlpey)prdn--abnl-mn)qioie6croyi acid [prdin2y-2 yi --l-ty abmy) ehl-mde (S--[-4tilooehlpey)prdn--abnl-mn)qioie6croyi acid (2-oxo-1 -pyridin-2-yI-2-pyrrolidifl-l-yI-ethyl )-amide, 25 (S)-2-{methy-[2-(4-trifluoromlethyI-phelI)-pyridine-3-carbofl]amliflo)quiflOine- 6 carboxylic acid (2-oxo-1 -pyridin-2-yl-2-pyrrolidifl-1 -yi-ethyl)-amide, (S--mty-2(-rfurmty-hnl)prdn--abnl-mn)qioie6 carboxylic acid (2-oxo-2-piperidin-1 -yi-l-pyridin-2-yI-ethyl )-amide, (S)- mty-2(-rfurmehlpey)prdn--aroy]ann)qioie6 30 carboxylic acid (2-morpholil-4-y-2-oxo-l1 pyridin-2-yi-ethyI)-amide, WO 2005/080373 PCT/IB2005/000167 24 (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(4-hydroxy-pentylcarbamoyl)- pyridin-2-yl-methyl]-amide and (S)-2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6-carboxylic acid [(4-oxo-pentylcarbamoyl)- pyridin-2-yl-methyl]-amide. 5 Representative compounds of this embodiment of the invention, where R 6 is
15 ), include the following compounds where X is -CH- and X 1 is -N-: (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (carbamoyl-pyridin-2-yl-methyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 10 (methylcarbamoyl-pyridin-2-yl-methyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [phenyl-(2,2,2-trifluoro-ethylcarbamoyl)-methyl]-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(ethyl methylcarbamoyl)- pyridin-2-yl-methyl]-amide, 15 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(ethyl methyl-carbamoyl)- pyridin-2-yl-methyl]-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (diethylcarbamoyl- pyridin-2-yl-methyl)-amide, (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid (6-{[(diethylcarbamoyl-pyridin-2-yl 20 methyl)-amino]-methyl}-quinolin-2-yl)-amide, (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid (6-{[(diethylcarbamoyl-pyridin-2-yl methyl)-methyl-amino]-methyl}-quinolin-2-yl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (propylcarbamoyl-pyridin-2-yl-methyl)-amide, 25 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (propylcarbamoyl-pyridin-2-yl-methyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(methyl-propyl-carbamoyl)- pyridin-2-yl-methyl]-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(ethyl 30 propyl-carbamoyl)- pyridin-2-yl-methyl]-amide, WO 2005/080373 PCT/1B2005/000167 25 (S )-2-[(4'-trifluorothyl-biphenyl-2-carbonyl )-amino1-quinoline-6-carboxyic acid (isopropylcarbamoyl- pyridin-2-yI-methyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyI-2-carbonyl)-amino]-quinoline-6-carboxyic acid [(ethyl isopropyl-carbamoyl )- pyridin-2-yl-methyl]- amide, 5 (S )-2-[(4'-trifluoromethylkbipheny-2-carbonyl)-amino]-qui1oline-6-carboxyiC acid (butylcarbamoyl- pyridin-2-yl-methyl)-amide, (S )-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl-amino]-quinoline-6-carboxyic acid [(butyl methyl-carbamoyi)- pyridi n-2-yI -m ethyl]- amid e, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(butyl 10 methyl-carbamoyl)- pyridin-2-yI-methyl]-amide, (S )-4'-trifluoromethyl-biphenyl-2-carboxylic acid [6-({[(butyl-methyl-carbamoyl)-pyridin-2 yI-methyl]-methyl-amino}-methyl)-quinolin-2-yIJ-amide, (S )-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (isobutylcarbamoyl- pyridin-2-yI-methyl )-amide, 15 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl- pyridin-2-yl-rnethyl)-amide, (S )-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl- pyridin-2-yI-methyl )-amide, (S )-2-[(4'-trifluoromethyI-biphenyI-2-carbonyI)-amino-quinoine-6-carboxylic acid 20 (pentylcarbamoyl- pyridin-2-yI-methyl)-amide, (S)-2-[(4'-trifuoromethy-biphenyl-2-carbonyI)-amino]-quinoine-6-carboxylic acid [(methyl-pentyl-carbamoyl)- pyridin-2-yI-methyl]-amide, (S )-4'-trifluoromethyl-biphenyl-2-carboxylic acid (6-{[(pentylcarbamoyl-pyridin-2-y methyl)-amino]-methyl)-quinolin-2-y )-amide, 25 (S )-4'-trifluoromnethyl-biphenyl-2-carboxylic acid (6-{[methyl-(pentylcarbamoyl-pyridin-2 yI-methyl )-amino]-methyl)-quinolin-2-yI )-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl )-amino]-quinoline-6-carboxylic acid [(methyl-pentyl-carbamoyl )- pyridi n-2-yI-m ethyl] -amid e, (S )-2-[(4'-trifluoromethyl-biphenyI-2-carbony )-amino]-quinoline-6-carboxylic acid [(5 30 hydroxy-pentylcarbamoyl)- pyridin-2-yI-methyl]-amide, WO 2005/080373 PCT/IB2005/000167 26 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (hexylcarbamoyl- pyridin-2-yi-methyl)-amide, (S)-2-a(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (cyclopropylcarbamoyl- pyridin-2-yl-methyl)-amide, 5 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (benzylcarbamoyl- pyridin-2-yl-methyl)-amide, (S)-2-((4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (benzylcarbamoyl- pyridin-2-yl-methyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 10 [(benzyl-methyl-carbamoyl)- pyridin-2-yl-methyl]-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(benzyl-methyl-carbamoyl)- pyridin-2-yl-methyl]-amide, (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid [6-({[(benzyl-methyl-carbamoyl)-pyridin 2-yl-methyl]-amino}-methyl)-quinolin-2-yll-amide, 15 .(S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [pyridin-2-yl-(2-pyridin-2-yl-ethyIcarbamoyl)-methyl]-amide, (S)-2-[(4'-trifl uoromethyl-biphenyl-2-carbonyl)-amino]-quinoine-6-carboxylic acid [pyridin-2-yl-(2-pyridin-4-yl-ethylcarbamoyl)-methyl]-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo 20 1 -pyridin-2-yl-2-pyrrolidin-1 -yl-ethyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo 1 -pyridin-2-yl-2-pyrrolidin-1 -yl-ethyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo 2-piperidin-1 -yl-1 -pyridin-2-yl-ethyl)-amide, 25 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2 morpholin-4-yl-2-oxo-1 -pyridin-2-yl-ethyl)-amide, (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(4 hydroxy-pentylcarbamoyl)- pyridin-2-yl-methyl]-amide and (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid [(4 30 oxo-pentylcarbamoyl)- pyridin-2-yl-methyl]-amide.
WO 2005/080373 PCT/IB2005/000167 27 The embodiment where R 6 is -COR 20 is also a preferred embodiment of the invention.
2 0 is preferably selected from the group consisting of (C 1
6 )alkyl, (Cs C7)cycloalkyl, (C-C 7 )cycloalkyl(C 1
4 )alkyl-, phenyl and phenyl(C 1
4 )alkyl-; more 5 preferably, from (G 1
6 )alkyl. The (C 1
6 )alkyl group of R 20 is unsubstituted or is substituted, preferably with 1 to 3 substituents. In a preferred embodiment, the substituents are independently selected from the group consisting of halo, oxo, -OH, -OCF 3 , -OR 1 2 , -C(O)R 12 , -CO2R 1 2 ,
12 , -N(R")C(O)R 12 and -C(O)N(Rc)(R1l); more preferably, from halo, OH, 10 -C(O)R' 2,
-CO
2 R 12 and -OC(O)R 12 ; most preferably, from F, CI, -OH and -C(O)R 12 . The cycloalkyl group and the cycloalkyl,moiety of the cycloalkylalkyl group of R 20 are unsubstituted or are substituted, preferably with 1 to 3 substituents. In a preferred embodiment, the substituents are independently selected from the group consisting of halo, oxo, (CI-C4)alkyl, -OH, -CF 3 , -OCF 3 and -OR 12 ; more preferably, from halo (e.g., F 15 or CI), oxo, (C 1 -C4)alkyl and -CF 3 . The phenyl group and the phenyl moiety of the phenylalkyl group of R 2 0 are unsubstituted or are substituted, preferably with 1 to 3 substituents. In a preferred embodiment the substituents are independently selected from the group consisting of halo, (C 1
6 )alkoxy-, -OH, -CF 3 , -OCF 3 and -OR 12 ; more preferably, from 20 halo (e.g., F or CI), (Cl-C 6 )alkyl, (C 1
4 )alkoxyand -CF 3 ,
3 and R 4 in this embodiment are preferably taken together with the carbon atom to which they are attached to form a carbonyl group. The other substituents and parameters are as defined above in this application, generally and preferably. Representative compounds of this embodiment of the invention (R 6 is -CO 2
2 0 ), 25 where X and X 1 are both -CH-, are the compound of Example 113 and the corresponding ethyl, n-propyl, isopropyl, n-butyl, isobutyl, s-butyl, t-butyl, n-pentyl, isopentyl, neopentyl, t-pentyl, n-hexyl, isohexyl, neohexyl and t-hexyl esters; particularly the methyl, ethyl, n-propyl, isopropyl, n-butyl, t-butyl, n-pentyl and n-hexyl esters. Representative compounds of this embodiment of the invention, where R 6 is 30 -C0 2
20 , include the following compounds where X is -N- and X 1 is -CH-: WO 2005/080373 PCT/IB2005/000167 28 (S)-phenyl-[(2-([2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline-6 carbonyl)-amino]-acetic acid methyl ester and the corresponding ethyl, n-propyl, isopropyl, n-butyl, isobutyl, s-butyl, t-butyl, n-pentyl, isopentyl, neopentyl, t-pentyl, n-hexyl, isohexyl, neohexyl and t-hexyl esters; particularly the methyl, ethyl, n-propyl, 5 isopropyl, n-butyl, t-butyl, n-pentyl and n-hexyl esters. Representative compounds of this embodiment of the invention, where R 6 is
20 , include the following compounds where X and X 1 are both -N-: (S)-pyridin-2-yl-[(2-{[2-(4-trifluoromethyl-phenyl)-pyridine-3-carbonyl]-amino}-quinoline 6-carbonyl)-amino]-acetic acid methyl ester and the corresponding ethyl, n-propyl, 10 isopropyl, n-butyl, isobutyl, s-butyl, t-butyl, n-pentyl, isopentyl, neopentyl, t-pentyl, n-hexyl, isohexyl, neohexyl and t-hexyl esters; particularly the methyl, ethyl, n-propyl, isopropyl, n-butyl, t-butyl, n-pentyl and n-hexyl esters. Representative compounds of this embodiment of the invention, where R 6 is
20 , include the following compounds where X is -CH- and X 1 is -N-: 15 (S)-pyridin-2-yl-({2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 carbonyl}-amino)-acetic acid methyl ester and the corresponding ethyl, n-propyl, isopropyl, n-butyl, isobutyl, s-butyl, t-butyl, n-pentyl, isopentyl, neopentyl, t-pentyl, n-hexyl, isohexyl, neohexyl and t-hexyl esters; particularly the methyl, ethyl, n-propyl, isopropyl, n-butyl, t-butyl, n-pentyl and n-hexyl esters. 20 Additional preferred compounds of the invention include the compounds of Examples 39, 40, 42-46, 114, 115, 117, 119-122, 124-126, 128, 130-144, 146-150, 152, 155, 157, 160-169, 171-174, 176, 177, 189-196,198-200, 202-208, 210, 211 and 213 215. 25 WO 2005/080373 PCT/IB2005/000167 29 A preferred embodiment of the invention pertains to. compounds of Formula (IA-1). 7 (R )n 8
4 0 N 15 // R N N I I11o R (IA-1) 5 wherein R 3 , R 4 , R 5 , R 6 , R 7 , R 8 , R 1 0 and n are as defined above, generally and preferably. The R 8 substituent.is preferably positioned at C-4 of the phenyl ring. Another preferred embodiment of the invention pertains to compounds of Formula (IA 1 a) 10
3 0 N s R 1 5 R/ O N R' 0o (15 N N /R (IA-l a) wherein R 5 , ROo, R 14 and R 15 are as defined above, generally and preferably. In these embodiments the carbon atom to which -C(0)N(R 14
1 5 ) is attached preferably 15 has the (S) configuration. R/S mixtures, e.g., racemic mixtures, are also preferred.
WO 2005/080373 PCT/IB2005/000167 30 A further preferred embodiment of the invention pertains to compounds of Formula (IA-1b)
3 20 0 N C02R R N N S110 R (IA-1b) 5 wherein R 5 , R 1 o and R 0 are as defined above, generally and preferably. A further preferred embodiment of the invention pertains to compounds of 10 Formula (IA-1c)
3 0 (IA-1c) SCwherein the (CC 1
10 1 )alkylre as defined above, 1[5 generally and preferably. In these embodiments the carbon atom to which -(Cl CI0)alkyl is attached preferably has the (R) configuration. R/S mixtures, e.g., racemic mixtures, are also preferred I lo R (IA-1c) wherein the (C 1
10 )alkyl is optionally substituted and R 5 and R 1 o are as defined above, 15 generally and preferably. In these embodiments the carbon atom to which -(Ci
1 o)alkyl is attached preferably has the (R) configuration. R/S mixtures, e.g., racemic mixtures, are also preferred WO 2005/080373 PCT/IB2005/000167 31 Compounds corresponding to the compounds of Formulas (IA-la), (IA-1b) and (IA-1c) in which the R 8 substituent is (C 1 -C4)alkyl (e.g., -C(CH 3
3 ) instead of -CF 3 are also preferred embodiments. The invention also relates to polymorphic forms of the compounds of the 5 invention; in particular to polymorphs of (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl) amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide., which is the (S) isomer of the compound of Formula (IA-la) wherein R 5 , R 1 0 and R 14 are H and R 1 5 is
3 . More specifically, the present invention provides crystalline Forms A and B of (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 10 (pentylcarbamoyl-phenyl-methyl)-amide having X-ray powder diffraction patterns substantially the same as shown in Figures 1 and 2 respectively. It is to be understood that some level of noise is inherent in the generation of a diffraction pattern, i.e., peaks in intensity are to be discriminated from background according to methods well-known in the art. In a preferred embodiment, the X-ray powder diffraction pattern for Form A is 15 substantially the same as that shown in Figure 1. In a more preferred embodiment, Form A has an X-ray powder diffraction pattern having peaks at 2-theta values substantially the same as the 2-theta values for at least ten of the peaks of highest intensity in the X-ray powder diffraction pattern shown .in Figure 1. Another aspect of this invention pertains to the compounds of Formulas (D), (F) 20 and (D-G) which are intermediates useful in the preparation of compounds of Formula (I). Formula (D-G 1 ) represents a preferred subgenus of Formuls (D-G). R 5 , R 6 , R 7 ,
1 and n are as defined above, generally and preferably. In a preferred embodiment,
6 is (CI-Cs)alkyl, 2-pyridyl or -C(O)N(R 4
1 5 ) in which R 14 is H, -CH 3 or -C 2
5 ) and 25 R" is (C,-C8)alkyl, benzyl or a fluorinated benzyl such as 4-fluorobenzyl. The -OR 21 moiety in (F) is -OH or any leaving group that is displaceable with -OH under routine conditions of acid- or base-catalyzed hydrolysis. R 21 may also be a cation, for example of an alkali metal, such as K ( ). Typically, R 21 will be H, an alkyl group, preferably of 1 to 4 carbon atoms (e.g., -CH 3 , -CH(CH 3
2 , -CH 2
3 , or WO 2005/080373 PCT/IB2005/000167 32
-C(CH
3 ), phenyl, a phenylalkyl group of 1 to 4 alkyl carbon atoms, e.g., benzyl, or a cation. Preferably, R 21 is H, (C 1
4 )alkyl, benzyl or a cation. R 2 , R 8 , R 9 , R' 0 , X, m, p, and q are as defined above, generally and preferably. Formula (F-1) represents a preferred subgenus of Formula (F) and Formula (F 5 1') represents a preferred subgenus of Formula (F-1). In a preferred embodiment, R 1 0 in (F), (F-1), (F-1') is H or -CH 3 ; more preferably, H. In a further preferred embodiment, R 8 is -CF 3 or (CI-C4)alkyl. Other intermediates of particular interest of the present invention include compounds which are the same as the compounds of Formulas (F), (F-1) and (F-1I') except that they have a (C 4
7 )cycloalkyl group in place of the 10 R 8 -bearing phenyl group. O
2 N fN (D) (R7)n , 1 OX 06 SN R H1N N 15
(D-G)
WO 2005/080373 PCT/IB2005/000167 33 O SN R 5 /Rs
(D-G
1 ) (R) - R 2 ) m 21 0(R2 (R)q N N x R 5 (F) (RR (R 2 ) O OR21
X,
1 23 N N 1 1 0 / R (R()q (F-1) WO 2005/080373 PCT/IB2005/000167 34 R 0 0 0 R 2 N ORN 110 R (F-i') This invention also relates to the salts, solvates and hydrates of the compounds of the invention, as well as to prodrugs of the compounds. 5 In another embodiment of the invention, a pharmaceutical composition is provided which comprises a compound of Formula (I). In a further embodiment the composition also comprises at least one additional pharmaceutical agent, which is preferably an antihypertensive agent, an anti-inflammatory agent, a lipid-lowering agent, a cholesterol-lowering agent, an antidiabetes agent or an anti-obesity agent. 10 Also provided is a method of treating obesity in an animal in need of such treatment, which comprises administering to the animal a therapeutically effective amount of a compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said compound or said salt. In a further embodiment the method further comprises administering said compound of Formula (I), a pharmaceutically 15 acceptable salt thereof, or a solvate or hydrate of said compound or said salt in combination with at least one additional pharmaceutical agent, preferably another anti obesity agent. Also provided is a method of treating obesity in an animal in need of such treatment which comprises administering to the animal a therapuetically effective 20 amount of an intestinal-selective MTP inhibitor compound of Formula (I). Preferably, the
25 of a compound of Formula (I) for the inhibition of intestinal fat absorption is at least 5-fold lower than the ED 25 of the compound for the lowering of serum triglycerides. More preferably, the ED 2 5 for the inhibition of intestinal fat absorption is at least 10-fold lower WO 2005/080373 PCT/IB2005/000167 35 than the ED 25 of the compound for the lowering of serum triglycerides. Still more preferably, the compound exhibits an ED 25 for the inhibition of intestinal fat absorption which is at least 50-fold lower than the ED 2 5 of the compound for the lowering of serum triglycerides. 5 As used herein, the term "selectivity" or "selective"' refers to a greater effect of a compound in a first assay, compared to the effect of the same compound in a second assay. In the present invention, the first assay is for the ability of the compound to inhibit intestinal fat absorption and the second assay is for the ability of the compound to lower serum triglycerides. In a preferred embodiment, the ability of the compound to 10 inhibit intestinal'fat absorption is measured by the ED 25 of the compound in an intestinal fat absorption assay, such that a greater effect of the compound results in the observation of a lower absolute (numerical) value for the ED 2 5 ,. In another preferred embodiment, the ability of the compound to lower serum triglycerides is measured by the ED 25 of the compound in a serum triglyceride assay. Again, a greater effect of a 15 compound in the serum triglyceride-lowering assay results in the observation of a lower absolute (numerical) value for the ED 25 . An illustrative example of each assay is provided hereinbelow, but it is to be understood that any assay capable of measuring the effectiveness of a compound in inhibiting intestinal fat absorption, or capable of measuring the effectiveness of a compound in lowering serum triglycerides, is 20 encompassed by the present invention. In a preferred embodiment, the intestinal-selective MTP inhibitor compound is a compound of Formula (IA-la), wherein R 5 , R 1 0 , R 14 and R 15 are as defined above, generally and preferably, and the carbon atom to which the -C 6
5 is attached has the (S) configuration. More preferably, the intestinal-selective MTP inhibitor compound is 25 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide. Also provided is a method of weight control in an animal which comprises administering to the animal a weight-controlling amount of a compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said compound or 30 said salt. The compound of Formula (I) may be used alone or in combination with at least one additional pharmaceutical agent, preferably an anti-obesity agent.
WO 2005/080373 PCT/IB2005/000167 36 The present invention also provides a method of reducing food intake in an animal which comprises administering to the animal a food-intake-reducing amount of a compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said compound or said salt. The compound of Formula (I) may be used 5 alone or in combination with at least one additional pharmaceutical agent, preferably an anti-obesity agent. Also provided is a method of causing reduced fat absorption in an animal which comprises administering to the animal a fat-absorption-reducing amount of a compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said 10 compound or said salt. The compound of Formula (I) may be used alone or in combination with at least one additional pharmaceutical agent, preferably an anti-obesity agent. Also provided is a method of treating atherosclerosis, pancreatitis secondary to hypertriglyceridemia or hyperglycemia (1) by causing a reduced absorption of dietary fat 15 through MTP inhibition, (2) by lowering triglycerides through MTP inhibition or (3) by decreasing the absorption of free fatty acids through MTP inhibition; in an animal in need of such treatment, which comprises administering to the animal a therapeutically effective amount of the compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said compound or said salt. The compound of 20 Formula (I) may be used alone or in combination with at least one additional pharmaceutical agent, preferably one that is useful in treating atherosclerosis, pancreatitis secondary to hypertriglyceridemia or hyperglycemia. Also provided is a method of treating diabetes, including impaired glucose tolerance, insulin resistance, insulin dependent diabetes mellitus (Type I) and non 25 insulin dependent diabetes mellitus (NIDDM or Type II), which comprises administering to the animal a therapeutically effective amount of a compound of Formula (I), a pharmaceutically acceptable salt thereof, or a solvate or hydrate of said compound or said salt. The compound of Formula (I) may be used alone or in combination with at least one additional pharmaceutical agent, preferably one that is useful in treating 30 diabetes. In a preferred embodiment the diabetes is Type II diabetes. In another WO 2005/080373 PCT/IB2005/000167 37 preferred embodiment the animal is a human. In a further preferred embodiment the animal is feline, preferably a cat. A further aspect of the present invention pertains to a pharmaceutical kit for use by a consumer in the treatment or prevention of obesity, atherosclerosis, pancreatitis 5 secondary to hypertriglyceridemia or hyperglycemia. The kit comprises (a) a suitable dosage form comprising a compound of Formula (I); and (b) instructions describing a method of using the dosage form to treat or prevent obesity, atherosclerosis, pancreatitis secondary to hypertriglyceridemia or hyperglycemia. Another embodiment of the present invention relates to a pharmaceutical 10 kit comprising:' (a) a first pharmaceutical composition comprising a compound of Formula (I), (b) a second pharmaceutical composition comprising a second compound useful for the treatment or prevention of obesity, atherosclerosis, pancreatitis secondary to hypertriglyceridemia or hyperglycemia; and (c) a container for containing the first and second compositions. 15 Definitions As used herein, the term "alkyl" refers to a straight- or branched-chain hydrocarbon radical of the general formula CH 2 n, 1 .' For example, the term "(C 1
6 )alkyl' refers to a monovalent, straight- or branched-chain, saturated aliphatic group containing 1 to 6 carbon atoms (e.g., methyl, ethyl, n-propyl, i-propyl, n-butyl, i-butyl, s-butyl, t 20 butyl, n-pentyl, 1-methylbutyl, 2-methylbutyl, 3-methylbutyl, neopentyl, 3,3 dimethylpropyl, hexyl, 2-methylpentyl, and the like). Similarly, the alkyl portion of any group, e.g., an alkoxy, acyl, alkylamino, dialkylamino, or alkylthio group, has the same meaning as above. "Halo-substituted alkyl" refers to an alkyl group substituted with one or more 25 halogen atoms (e.g., -CH 2 CI, -CHF 2 , -OF 3 , -C 2
5 , and the like). Likewise, "fluoro substituted alkyl" means the alkyl group is substituted with one or more fluorine atoms. The term "acyl" refers to alkyl-, partially saturated or fully saturated cycloalkyl-, partially saturated or fully saturated heterocycle-, aryl-, and heteroaryl-substituted carbonyl groups. For example, acyl includes groups such as (C 1
6 )alkanoyl, (C3 30 C6)cycloalkylcarbonyl, heterocyclecarbonyl, aroyl (e.g., benzoyl) and heteroaroyl. The term "substituted", as used herein to modify a group or moiety, means, WO 2005/080373 PCT/IB2005/000167 38 unless otherwise specified, that the group or moiety is substituted with one or more substituents that are commonly used in medicinal chemistry for such a group or moiety. The term "halo" means F, CI, Br or I. Preferably, halo will be F, Cl or Br; more preferably, F or CI. 5 The term "solvate" refers to a molecular complex of a compound represented by Formula (I) (including prodrugs and pharmaceutically acceptable salts thereof) with one or more solvent molecules. Such solvent molecules are those commonly used in the pharmaceutical art, which are known to be innocuous to the recipient, e.g., water, ethanol, and the like. The term "hydrate" refers to the complex where the solvent 10 molecule is water. The phrase "pharmaceutically acceptable" indicates that the substance or composition must be compatible chemically and/or toxicologically, with the other ingredients comprising a formulation, and/or the mammal being treated therewith. The term "protecting group" or "PG" refers to a substituent that is commonly 15 employed to block or protect a particular functionality while reacting other functional groups on the compound. For example, an "amino-protecting group" is a substituent attached to an amino group that blocks or protects the amino functionality in the compound. Suitable amino-protecting groups include acetyl, trifluoroacetyl, t butoxycarbonyl (BOC), benzyloxycarbonyl (CBz) and 9-fluorenylmethylenoxycarbonyl 20 (Fmoc). Similarly, a "hydroxy-protecting group" refers to a substituent of a hydroxy group that blocks or protects the hydroxy functionality. Suitable protecting groups include acetyl and silyl. A "carboxy-protecting group" refers to a substituent that blocks or protects the carboxy functionality such as an ester group. Common carboxy protecting groups include -CH 2
2 Ph, cyanoethyl, 2-(trimethylsilyl)ethyl, 2 25 (trimethylsilyl)ethoxymethyl, 2-(p-toluenesulfonyl)ethyl, 2-(p-nitrophenylsulfenyl)ethyl, 2 (diphenylphosphino)ethyl, nitroethyl and the like. For a general description of protecting groups and their use, see T. W. Greene, Protective Groups in Orqanic Synthesis, John Wiley & Sons, New York, 1991. The phrase "therapeutically effective amount" means an amount of a compound 30 of the present invention that (i) treats or prevents the particular disease, condition, or disorder, (ii) attenuates, ameliorates, or eliminates one or more symptoms of the WO 2005/080373 PCT/IB2005/000167 39 particular disease, condition, or disorder, or (iii) prevents or delays the onset of one or more symptoms of the particular disease, condition, or disorder described herein. The term "animal" means humans as well as all other warm-blooded members of the animal kingdom possessed of a homeostatic mechanism, including mammals 5 (e.g., companion animals, zoo animals and food-source animals) and birds. Some examples of companion animals are canines (e.g., dogs), felines (e.g., cats) and horses; some examples of food-source animals are pigs, cows, sheep, poultry and the like. Preferably, the animal is a mammal. Preferably, the mammal is a human, a companion animal or a food-source animal. Most preferably, the animal is a human. 10 The terms "treating", "treat", or "treatment" embrace both preventative, i.e. prophylactic, and palliative treatment. The term "compounds of the present invention" (unless specifically identified otherwise) refer to compounds of Formulas (I), including the compounds of Formul;as (IA), (IA-1), (IA-la), (IA-Ilb) and (IA-1c), as defined above generally and preferably, 15 prodrugs thereof, pharmaceutically acceptable salts of the compounds and/or prodrugs, and hydrates or solvates of the compounds, salts, and/or prodrugs, as well as all stereoisomers, tautomers and isotopically labeled compounds. Brief Description of the Drawings Figure (1) shows the x-ray diffraction pattern of a sample of crystalline Form A of 20 the title compound of Example (1). The sample was prepared as described in Example (l c). Figure (2) shows the x-ray diffraction pattern of a sample of crystalline Form B of the title compound of Example (1). The sample was prepared as described in Example (ld). 25 The powder diffraction patterns were collected on a Bruker D5000 powder X ray diffractometer. The D5000 was equipped with copper radiation and Solex solid-state detector. The D5000 used theta/2 theta geometry. The slit system used to produce the line source was one 1.0 mm slit presample and two slits post sample (1.0 and 0.6 mm). The samples were scanned from 3.0 to 40.0 degrees in 2 theta. The step size was 0.04 30 degrees and each step was collected for 1 second.
WO 2005/080373 PCT/IB2005/000167 40 Detailed Description of the Invention In the discussion which follows, certain common chemical abbreviations and acronyms have been employed which include: UHP (urea-hydrogen peroxide adduct), PyBroP (bromo-tris-pyrrolidino-phosphonium hexafluorophosphate), BOC (tert 5 butoxycarbonyl), EtOAc (ethyl acetate), NaH (sodium hydride), NaBH(OAc) 3 (sodium triacetoxy borohydride), HOBT (1-hydroxybenzotriazole), EDC (1-ethyl-3 (dimethylaminopropyl)-carbodiimide hydrochloride) and THF (tetrahydrofuran). The present compounds may be envisioned as being composed of a central quinoline core and left- and right-hand appendages the individual components of which 10 are represented below by compounds D, E and G respectively: \ / 0 IOH HN R' (R),- -C-L H 2 N N X E D G Preparation of the present compounds may proceed by combining E and D, then adding 15 G to E-D. Alternatively, D and G may be combined to give D-G, which is then combined with E. Scheme la below illustrates one means for preparing compounds of Formula (I) where -C(R 3
4 )- is -C(0)- and R 1 is Ra. The corresponding compounds where R 1 is 20 Rb may be similarly prepared by patterning compound (E) in the scheme below after Rlb instead of R 1 as described below. 25 WO 2005/080373 PCT/IB2005/000167 41 JR' 0 (' OH (R2 . OR21 OR2 N N A B O0 C (Re1 0 (R') OR (R') X -
2 PXRR" i F R"'sH D I \ '. N OH N R'~ N R6 NR C- N (R') - C- N o F-a IA-2 R"o is H R"o is H HN R' 6 R G Scheme la 5 The carboxylic acid functionality in the quinolinecarboxylic acid (A) is protected using standard carboxylic acid protection procedures well known in the art, e.g., by formation of the corresponding ester, to give compound (B). For example, the benzyl ester (R 21 is benzyl in (B)) may be prepared by treating a solution of compound (A) in EtOAc at room temperature with 1,1'-carbonyldiimidazole to produce the activated, 10 imidazolide derivative of (A), then adding benzyl alcohol to the reaction mixture. The oxidation of compound (B) to the corresponding N-oxide, compound (0) may be conducted by procedures well known in the art. For example, the tert-butyl ester of (B) upon treatment with peroxytrifluoroacetic acid, generated from trifluoroacetic anhydride and UHP, provides the corresponding tert-butyl ester derivative of (C).
WO 2005/080373 PCT/IB2005/000167 42 Similarly, addition of the benzyl ester of (B) to a mixture of UHP and phthalic anhydride in methylene chloride under an inert atmosphere at room temperature gives the corresponding benzyl ester of (C). The N-oxide () is treated with a sulfonyl chloride, preferably 5 p-toluenesulfonyl chloride, to produce the corresponding sulfonate derivative, and the reaction mixture is then treated with a source of ammonia, e.g., aqueous ammonium hydroxide or ammonia in methanol to give the 2-aminoquinoline compound (2). Alternatively, the ammonia may be produced in situ in an organic solvent from an ammonium salt and an appropriate base. For example, where R 2 1 is benzyl, the 10 compound (C)-sulfonyl chloride reaction mixture is added very slowly under an inert atmosphere to a suspension of ammonium chloride in methylene chloride and triethylamine with adequate cooling to control the resulting exotherm and contain the temperature in about the 25 to30 C range to give compound (2) where R" is benzyl. The group "L" in compound (E) is -OH or a leaving group ("LG") such as a 15 chlorine atom or an N-imidazole group. The activated carboxylic acid (E), in which L is LG, may be readily prepared from the corresponding carboxylic acid using materials and methods that are well known in the art. For example, the acid chloride compound (E) where X is -C(Ra) - and R 8 is an optional substitutuent on the phenyl may be prepared from the corresponding carboxylic acid by treatment with, for example, oxalyl chloride 20 or sulfonyl chloride. The corresponding compound (E) where L in an N-imidazole group may be prepared by the reaction of the corresponding free acid (E) with 1,1' carbonyldiimidazole. The carboxylic acids of (E) where X is -C(Ra) - are commercially available (e.g., 2-biphenylcarboxylic acid, 4'-methyl-2-biphenylcarboxylic acid and 4' trifluoromethyl-2-biphenylcarboxylic acid), are known in the literature (e.g. European 25 patent No. EP 0 059 983), or may be readily prepared by one of average skill in the art using materials and methods that are well known in the art. For example, a general synthesis of acids (E) where X is -C(Ra) - involves Suzuki coupling between an arylboronic acid (e.g., 4-isopropylphenylboronic acid) and a halogenated benzoic acid ester derivative (e.g., ethyl-2-iodobenzoate), followed by hydrolysis of the ester function. 30 Conditions for the Suzuki coupling involve heating the boronic acid and halogenated WO 2005/080373 PCT/IB2005/000167 43 benzoic acid ester in the presence of a base (e.g., cesium carbonate, 2 equiv.) and a transition metal catalyst (e.g., tetrakistriphenylphosphinepalladium (0), 1 mol %) in a solvent such as 1,2-dimethoxyethane. Also, the acids corresponding to those of compound (E) except that the R 8 -bearing 5 phenyl group is replaced with a (C 4 -C7)cycloalkyl group, e.g., 2-cyclohexylbenzoic acid and 2-cyclopentylbenzoic acid, may be prepared as described by Knochel et al (Tetrahedron 2000, 56, 4197) whereby ethyl 2-iodobenzoate is coupled with the corresponding cycloalkylzinc iodide in the presence of a nickel catalyst (Ni(acac) 2 ) to give the 2-cycloalkylbenzoic acid ethyl ester, which may- then be converted to the 10 corresponding acid by standard hydrolysis (e.g. aqueous LiOH/MeOH/THF). The amide compound ([) where R 1 o is H is formed by coupling the carboxylic acid (E) with the amino compound (2). The coupling may be achieved using a number of amide-bond forming methods and reagents well established in the chemical literature. A preferred procedure involves combination of the acid of (E) with the amino compound 15 (D) in the presence of excess 1-(3-dimethylaminopropyl)-3-ethylcarbodiimide and excess 4-dimethylaminopyridine dissolved in methylene chloride. Another preferred method for coupling the acid of (E) with the amino compound (Q) involves reaction between (D) and the acid chloride of (E). The reaction is carried out in the presense of a base (e.g., pyridine) using a solvent such as methylene chloride. Methods and reagents 20 (e.g., oxalyl chloride) for preparing the acid chloride derived from E are well known to those of average skill in the art. Alternatively, the coupling step and the step in which the activated carboxylic acid of (E) (L is a LG) is prepared from the acid of (E) (L is -OH) may in certain cases be conducted in the same pot. For example, addition, as a solid, of amine (D) where 25 R 2 1 is benzyl to the product mixture formed by the reaction of the free acid of (E) with 1,1'-carbonyldiimidazole in THF, and heating the reaction mixture at reflux temperature gives compound (E) where R 1 0 is H and R 21 is benzyl. The ester protecting group in compound (E) may be removed to give the carboxylic acid (F-a) or a salt thereof by saponification. For example, treatment of a 30 mixture of compound (F) where R 21 is benzyl in 2-propanol with an aqueous solution of potassium hydroxide, and heating the reaction mixture at reflux temperature gives the WO 2005/080373 PCT/IB2005/000167 44 potassium salt of compound (F-a) where R 1 0 is H. The benzyl ester of compound (E) may also be deprotected by hydrogenation using conventional hydrogenation procedures. Alternatively, in an example where the protecting group is a tert-butyl ester, it may be hydrolyzed with strong acid such as trifluoracetic acid or a solution of 5 hydrochloric acid. Compounds of Formula (F) or (F-a) in which R' 0 is alkyl may be prepared by alkylating compound (E) or (F-a) under standard conditions. For example, compound (F-a) where R' 0 is methyl may be prepared by treating a solution of (F-a) (R 1 0 is H) in toluene with dimethyl sulfate in the presence of potassium carbonate, potassium 10 hydroxide and tetrabutyl ammonium sulfate as described in the Examples section for the preparation of the intermediate 2-[methyl-(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino] quinoline-6-carboxylic acid. The coupling of intermediates (F-a) and (G) into the final compound (IA-2) may be conducted using conventional amidation procedures well known in the art such as, 15 for example, those disclosed in PCT patent application publication No. WO 03/002533. In one method, a base such as diisopropylethylamine is added in the cold to a solution of compounds (F-a), (G), HOBT and a coupling agent such as EDC in an organic solvent such as methylene chloride to give the final product amide (IA-2). Alternatively, the potassium salt of compound (F-a) may be converted into a mixed anhydride, for 20 example by treatment of the potassium salt in EtOAc and TEA in the cold with a solution of isopropyl chloroformate in toluene followed by allowing the reaction mixture to warm to room temperature. To this reaction mixture is added a solution of compound (G) in EtOAc in the cold (e.g., - -20 0C) to give compound (IA-2). On work-up it may be advantageous to crystallize the product from the reaction mixture (after solvent 25 displacement into ethanol via azeotropic distillation of EtOAc and toluene with ethanol) in the presence of an amine base such as aqueous ammonium hydroxide to remove any residual compound (F-a) starting material. Appropriately substituted intermediate (G) in which the carbon atom to which R 6 is attached is chiral or racemic may be prepared by conventional procedures well known 30 in the art (see, for example, WO 03/002533 supra and U.S. patent No. 6,369,075).
WO 2005/080373 PCT/IB2005/000167 45 Compound (G) where R 6 is -C(O)N(R 4
1 5 ), n is 0, R 5 is H or -OH 3 and X 1 is -CH- (compound (G-1)) may be conveniently prepared from commercially available Boc-phenylglycines by treatment with HN(R" 4
15 ) and a coupling agent such as PyBroP in the presence of a base such as diisopropylethylamine followed by removal of 5 the BOC protecting group as illustrated in the equation below for the conversion of (H) into (G-1). Other R 5 substituents may be introduced by reductive amination by treating (G-1) with an appropiate aldehyde or ketone and a reducing agent such as NaBH(OAc) 3 HN(R14)(R 15 ) BOCN OH H
N(R
1 5 ) BOCNH H2N 0 0 10 (H) (G-11) Compound G) where R 6 is -CO R 2 0 may be prepared by esterifying appropriately substituted (H with RO-OH and removing the BOC protecting group. 15 Compound (G) where R 6 is -CH 2 -W-Y may be prepared as illustrated in the equations below for the compound in which W is -0-, n is 0, R 5 is H and X' is -CH (compound (G-2)). Compound (), which is commercially available, is treated with triphenylmethyl chloride in the presence of triethylamine in an organic solvent such as dichloromethane to give the amine-protected compound J-_1 i), which is then treated with 20 a Y-halide in the presence of a base (e.g., NaH) in an organic solvent (e.g., THF) to give, after removal of the triphenylmethyl group by treatment with acid (e.g., 4 M HCI/dioxane), compound (G-2). H(PhZCOH OH 0
2 N hN H 2 N H 25 (J) (J-1) (G-2) WO 2005/080373 PCT/IB2005/000167 46 Compound (G) where R6 is -CH 2 N(Rc)(R 13 ) may be prepared as illustrated in the equation below for the compound in which n is 0, R 5 is H and X 1 is -CH- (compound (G-4)). Compound J-2b) may be prepared from compound (H) in a manner analogous to that described above for the preparation of compound (G-l) from LH. Compound (J 5 2b) is reduced by treatment with, for example, lithium aluminum hydride in THF to give, after removal of the BOC protecting group, the amine (G-4). Rc / BOCNH R13
2 N, 13 02 HCI 10 (J-2b) (G-4) An alternative method for making certain of the compounds of Formula (1) in which R 6 is -CH 2 N(Rc)(R" 3 ) proceeds via the azide intermediate (G-3), which may be prepared as illustrated in the equations below. A solution of compound (J-2) and 15 triethylamine in methylene chloride is treated with methanesulfonyl chloride in the cold to give the corresponding methanesulfonate ester JL-2a), which upon treatment-with sodium azide in dimethyl sulfoxide affords the azide (G-3). OHO I~OMS N BOCN OH BOCNH Ms H2 N 20 (J-2) (J-2a) (G-3) Compound (G-3) may be coupled with the appropriately substituted quinoline-6 carboxylic acid derivative (F-a) to give the corresponding amide adduct in which R 6 is 25 CH 2
3 . Treatment with triphenyl phosphine, then with sodium hydroxide (1 N solution) gives the corresponding
2 compound which may be suitably derivatized to WO 2005/080373 PCT/IB2005/000167 47 provide compounds of Formula .) in which R 6 is -CH2N(RC)(R 13 ) (see, for example, Examples 5 and 6 below). Scheme lb below illustrates an alternative method for preparing compounds of Formula 5 (I) where -C(R 3
4 )- is -C(O)- and R 1 is Rl". As above,.the corresponding compounds where R 1 is RIb may be similarly prepared by patterning compound (E) in the scheme below after Rib instead of Rl. (R2)I 0 I 0 j zzN N OR 21 \:', N1- N, R 6 H OR"11 a1 H R ' H 2 N N H 2 N' N" D D-G (R)PN (R'). R} R E G (R') -, (R )m N R'
9 <C-N N X R0 IA-2 10 Scheme Ib The compound (D) acid (R 21 is H) or a salt of the acid (e.g., R 2 1 is a cation such as K )) may be coupled with compound (G), under conditions similar to those described above for the coupling of compound (F-a) with (G) in Scheme la, to give compound (D 15 G). Similarly, compound (D-G) may be then coupled with compound (E) (L is -OH or LG) under amidation conditions similar to those described above for the coupling of compound (D) with (E) in Scheme la, to give product (IA-2). The compounds of Formula (I) where R 3 and R 4 are each H may be prepared as 20 illustrated in Scheme II below.
WO 2005/080373 PCT/IB2005/000167 48 F K (R )(XRC 0 (R ) X0 K IA-3 HN R 2 R(R G 5 Scheme II The ester functionality in compound (E) is reduced, for example with diisobutyl aluminum hydride in an organic solvent such as THF, to give the corresponding alcohol (H), which is oxidized, for example with Dess Martin periodinane in CH 2
2 , to give the corresponding aldehyde (K). The aldehyde (K) was combined with intermediate (G) in 10 the presence of a reducing agent such as sodium triacetoxy borohydride to give the compound of Formula (I) where R 3 and R 4 are each H. compound (!A-) in Scheme II. Conventional methods and/or techniques of separation and purification known to one of ordinary skill in the art can be used to isolate the compounds of the present invention, as well as the various intermediates related thereto. Such techniques will be 15 well known to one of ordinary skill in the art and may include, for example, all types of chromatography (high pressure liquid chromatography (HPLC), column chromatography using common adsorbents such as silica gel, and thin-layer chromatography), recrystallization, and differential (i.e., liquid-liquid) extraction techniques.
WO 2005/080373 PCT/IB2005/000167 49 The compounds and intermediates of the invention that are basic in nature are capable of forming a wide variety of salts with various inorganic and organic acids. The salts may be prepared in situ during the final isolation and purification of a compound, or by separately reacting the compound with a suitable organic or inorganic acid and 5 isolating the salt thus formed. Representative pharmaceutically acceptable, acid addition salts of the present compounds include hydrochloride, hydrobromide, hydroiodide, nitrate, sulfate, bisulfate, phosphate, acid phosphate, isonicotinate, acetate, lactate, salicylate, .citrate, acid citrate, tartrate, pantothenate, bitartrate, ascorbate, succinate, maleate, gentisinate, fumarate, 10 gluconate, glucuronate, saccharate, formate, benzoate, glutamate, methanesulfonate, ethanesulfonate, benzenesulfonate, p-toluenesulfonate, pamoate, palmitate, malonate, stearate, laurate, malate, borate, hexafluorophosphate, naphthylate, glucoheptonate, lactobionate and laurylsulfonate salts and the like. A preferred salt of the compounds is the hydrochloride salt. 15 Certain of the compounds and intermediates of the invention are acidic in nature and are capable of forming salts with bases. The salts may include cations based on the alkali and alkaline earth metals, such as sodium, lithium, potassium, calcium, magnesium, and the like, as well as ammonium, quaternary ammonium, and 1', 2 or 3' amine-derived cations including, but not limited to, ammonium, tetramethylammonium 20 and tetraethylammonium and cations derived from methylamine, ethylamine, dimethylamine,trimethylamine, triethylamine, and the like. See, e.g., Berge, et al., J. Pharm. Sci., 66, 1-19 (1977). Sodium and potassium salts are preferred. The present invention also includes prodrugs of the compounds of Formula (I). As used herein, the term "prodrug" means a compound that is transformed in vivo to 25 yield a compound of Formula (I) or a pharmaceutically acceptable salt, hydrate or solvate of the compound. The transformation may occur by various mechanisms, such as through hydrolysis in blood. A discussion of the use of prodrugs is provided by T. Higuchi and W. Stella, "Pro-drugs as Novel Delivery Systems," Vol. 14 of the A.C.S. Symposium Series; in Bioreversible Carriers in Drug Design, ed. Edward B. Roche, 30 American Pharmaceutical Association and Pergamon Press, 1987; in Advanced Drug DelivetyReviews, 1996, 19, 115; and in J. Med. Chem. 1996, 39, 10.
WO 2005/080373 PCT/IB2005/000167 50 For example, where a compound of the present invention contains a carboxylic acid functional group, a prodrug can comprise an ester formed by the replacement of the hydrogen atom of the acid group with a group such as (C 1 -Cs)alkyl, (C2
1 2 )alkanoyloxymethyl, 1-(alkanoyloxy)ethyl having from 4 to 9 carbon atoms, 1-methyl 5 1-(alkanoyloxy)-ethyl having from 5 to 10 carbon atoms, alkoxycarbonyloxymethyl having from 3 to 6 carbon atoms, 1-(alkoxycarbonyloxy)ethyl having from 4 to 7 carbon atoms, 1-methyl-l-(alkoxycarbonyloxy)ethyl having from 5 to 8 carbon atoms, N-(alkoxycarbonyl)aminomethyl having from 3 to 9 carbon atoms, 1-(N-(alkoxycarbonyl)amino)ethyl having from 4 to 10 carbon atoms, 3-phthalidyl, 4 10 crotonolactonyl, gamma-butyrolacton-4-yl, di-N,N-(C 1
2 )alkylamino(C2-C 3 )alkyl (such as 3-dimethylaminoethyl), carbamoyl-(C 1 -C:)alkyl, N,N-di(C 1
2 )alkylcarbamoyl-(C1
2 )alkyl and piperidino-, pyrrolidino- or morpholino(C 2
3 )alkyl. Saimilarly, where a compound of the present invention contains an alcohol functional group, a prodrug can be formed by replacement of the hydrogen atom of the 15 alcohol group with a group such as (C 1
6 )alkanoyloxymethyl, 1-((C,
6 )alkanoyloxy)ethyl, 1-methyl-l-((C 1
6 )alkanoyloxy)ethyl, (C1
6 )alkoxycarbonyloxymethyl, N-(C 1
6 )alkoxycarbonylaminomethyl, succinoyl, (Ci C6)alkanoyl, o-amino(C 1
4 )alkanoyl, arylacyl and a-aminoacyl, or a-aminoacyl-o, aminoacyl, where each c.-aminoacyl group is independently selected from the naturally 20 occurring L-amino acids, P(O)(OH) 2 , P(O)(O(C 1
6 )alkyl) 2 or glycosyl (the radical resulting from the removal of a hydroxyl group of the hemiacetal form of a carbohydrate). Where a compound of the present invention contains an amine functional group, a prodrug can be formed by the replacement of a hydrogen atom in the amine group 25 with a group such as R-carbonyl-, RO-carbonyl-, NRR'-carbonyl- where R and R' are each independently (Cl-Co 10 )alkyl, (C3-C 7 )cycloalkyl, benzyl, or R-carbonyl is a natural c.
aminoacyl or natural a-aminoacyl-natural .-aminoacyl, -C(OH)C(O)OY' wherein Y' is H,
1 -C6)alkyl or benzyl, -C(OYo)Y 1 wherein Yo is (C-C4) alkyl and Y 1 is (C 1 -C6)alkyl, carboxy(C 1
6 )alkyl, amino(C 1
4 )alkyl or mono-N- or di-N,N-(C 1
6 )alkylaminoalkyl, 30 -C(Y 2
)Y
3 wherein Y 2 is H or methyl and Y 3 is mono-N- or di-N,N-(C 1
6 )alkylamino, morpholino, piperidin-1-yl or pyrrolidin-1-yl.
WO 2005/080373 PCT/IB2005/000167 51 Many of the compounds of the present invention contain one or more asymmetric or chiral centers, and such compounds therefore exist in different stereoisomeric forms (e.g., enantiomers and diasteroisomers
. It is intended that all stereoisomeric forms of the intermediates and compounds of the present invention as 5 well as mixtures thereof,' including racemic mixtures, which possess properties useful in the treatment of the conditions discussed herein or are intermediates useful in the preparation of compounds having such properties, form a part of the present invention. In addition, the present invention embraces all geometric isomers and atropisomers. For example, if an intermediate or compound of the present invention contains a double 10 bond or a fused'ring, both the cis- and trans- forms, as well as mixtures, are embraced within the scope of the invention. Diastereomeric mixtures may be separated into their individual diastereoisomers on the basis of their physical chemical differences by methods well known to those skilled in the art, such as by chromatography and/or fractional crystallization. 15 Enantiomers may be separated by use of a chiral HPLC column. They may also be separated by converting the enantiomeric mixture into a diastereomeric mixture by reaction with an appropriate optically active compound (e.g., chiral auxiliary such as a chiral alcohol or Mosher's acid chloride), separating the diastereoisomers and converting (e.g., hydrolyzing) the individual diastereoisomers to the corresponding pure 20 enantiomers. The compounds of the present invention may exist in unsolvated as well as solvated forms with pharmaceutically acceptable solvents such as water, ethanol, and the like, and both solvated and unsolvated forms are included within the scope of the invention. 25 A number of the compounds of the present invention and intermediates therefor exhibit tautomerism and therefore may exist in different tautomeric forms under certain conditions. All such forms (e.g., all keto-enol and imine-enamine forms) are within the scope of the invention. The depiction of any particular tautomeric form in any of the structural formulas herein is not intended to be limiting with respect to that form, but is 30 meant to be representative of the entire tautomeric set.
WO 2005/080373 PCT/IB2005/000167 52 The present invention also embraces isotopically-labeled compounds which are identical to the compounds of Formula (I) or intermediates therefor but for the fact that one or more atoms are replaced by an atom having an atomic mass or mass number different from the atomic mass or mass number usually found in nature. Examples of 5 isotopes that can be incorporated into the intermediates or compounds of the invention include isotopes of hydrogen, carbon, nitrogen, oxygen, phosphorus, sulfur, fluorine, iodine, and chlorine, such as 2 H, 3 H, 11 C, 13 C, 14, 13 N, 15 N, 15, 17O 180 31 p 32 p 35S, 18 F, 1231, 1251 and 360CI, respectively. Isotopically labeled compounds of the present invention can generally be 10 prepared by following procedures analogous to those disclosed in the Schemes and/or in the Examples herein by substituting an isotopically labeled reagent for a non isotopically labeled reagent. The compounds of the present invention inhibit MTP/Apo B secretion, and are therefore useful in treating or preventing any of the disease states or conditions in which 15 Apo B, serum cholesterol and/or triglyceride levels are elevated. Such disease states or conditions include obesity, atherosclerosis, pancreatitis, hypercholesterolemia, hypertriglyceridemia, hyperlipidemia and diabetes. The present invention is also useful in treating or managing non-obese overweight conditions and normal weight conditions where weight control or management is desired in order to prevent an obese or 20 overweight condition from developing, or to just maintain an optimum, healthy weight. Also, the compounds of the present invention are useful in treating or preventing the diseases and conditions that are clinical sequelae of the diseases or conditions mentioned above. Additionally, the present compounds are useful in the treatment or prevention of any condition in which it is desirable to reduce food intake. 25 Therefore, the present invention provides methods of treatment or prevention of such disease states or conditions in an animal which comprises administering to the animal a compound of Formula (I), preferably a therapeutically effective amount thereof. A preferred subgroup of the disease states or conditions described hereinabove is atherosclerosis, obesity, hypercholesterolemia, hypertriglyceridemia, hyperlipidemia, 30 and diabetes as well as non-obese overweight conditions.
WO 2005/080373 PCT/IB2005/000167 53 The present compounds will generally be administered in the form of a pharmaceutical composition. Accordingly, the present invention also provides pharmaceutical compositions comprising a therapeutically effective amount of a compound of Formula (I) in admixture with a pharmaceutically acceptable carrier or 5 diluent, as well as methods of treatment or prevention of disease states or conditions that are modulated by MTP or Apo-B secretion inhibitors in an animal, which comprises administering to the animal such a pharmaceutical composition. The compounds of Formula (I) and compositions containing them are also useful in in the manufacture of a medicament for the therapeutic applications described herein. 10 The compounds of the present invention may be administered to a patient at dosage levels in the range of about 0.1 mg to about 3,000 mg per day. The dosage for a human is from about 1 mg to about 1,000 mg per day; preferably, from about 1 mg to about 500 mg per day; more preferably, from about 1 mg to about 250 mg per day; most preferably, from about 1 mg to about 100 mg per day; generally from about 1 mg to 15 about 50 mg per day. The specific dosage and dosage range that can be used depends on a number of factors, including the age and weight of the patient, the mode of administration, the severity of the condition or disease being treated, and the pharmacological activity of the compound being administered. The determination of dosage ranges and optimal dosages for a particular patient is well within the ordinary 20 skill in the art. The compounds of this invention may be used in conjunction with other pharmaceutical agents for the treatment of the disease states or conditions described herein. Therefore methods of treatment that include administering compounds of the present invention in combination with other pharmaceutical agents are also provided by 25 the present invention. Suitable pharmaceutical agents that may be used in combination with the compounds of the present invention include other anti-obesity agents such as cannabinoid-1 (CB-1) antagonists (such as rimonabant), 1 1-hydroxy steroid dehydrogenase-1 (11 3-HSD type 1) inhibitors, peptide YY (PYY) and PYY agonists 30 (such as PYY.36or analogs or derivatives thereof), MCR-4 agonists, cholecystokinin-A (CCK-A) agonists, monoamine reuptake inhibitors (such as sibutramine), WO 2005/080373 PCT/IB2005/000167 54 sympathomimetic agents, P3 adrenergic receptor agonists, dopamine receptor agonists (such as bromocriptine), melanocyte-stimulating hormone receptor analogs, 5HT2c receptor agonists, melanin concentrating hormone antagonists, leptin (the OB protein), leptin analogs, leptin receptor agonists, galanin antagonists, lipase inhibitors (such as 5 tetrahydrolipstatin, i.e. orlistat), anorectic agents (such as a bombesin agonist), neuropeptide-Y receptor antagonists (e.g., NPY Y5 receptor antagonists), thyromimetic agents, dehydroepiandrosterone or an analog thereof, glucocorticoid receptor agonists or antagonists, orexin receptor antagonists, glucagon-like peptide-1 receptor agonists, ciliary neurotrophic factors (such as AxokineTM available from Regeneron 10 Pharmaceuticals, Inc., Tarrytown, NY and Procter & Gamble Company, Cincinnati, OH), human agouti-related protein (AGRP) inhibitors, ghrelin receptor antagonists, histamine 3 receptor antagonists or inverse agonists, neuromedin U receptor agonists and the like. The compounds of this invention may also be used in conjunction with other pharmaceutical agents (e.g., LDL-cholesterol lowering agents, triglyceride lowering 15 agents) for the treatment of the disease/conditions described herein. For example, the present compounds may be used in combination with an HMG-CoA reductase inhibitor, an HMG-CoA synthase inhibitor, an inhibitor of HMG-CoA reductase gene expression, a squalene synthetase inhibitor, a squaline epoxidase inhibitor, a squaline cyclase inhibitor, a combined squaline epoxidase/cyclase inhibitor, a cholesterol synthesis 20 inhibitor, a cholesterol absorption inhibitor such as Zetia TM (ezetimibe), a CETP inhibitor, a PPAR modulator or other cholesterol lowering agent such as a fibrate, an ion exchange resin, an antioxidant, an ACAT inhibitor or a bile acid sequestrant. Other pharmaceutical agents useful in the practice of the combination aspect of the invention include bile acid reuptake inhibitors, ileal bile acid transporter inhibitors, ACC inhibitors, 25 antihypertensive agents (such as Norvasc®), diuretics, garlic extract preparations, bile acid sequestrants, antibiotics, antidiabetics, and anti-inflammatory agents such as aspirin or, preferably, an anti-inflammatory agent that inhibits cyclooxygenase-2 (Cox-2) to a greater extent than it inhibits cyclooxygenase-1 (Cox-1) such as celecoxib (U.S. patent No. 5,466,823), valdecoxib (U.S. patent No. 5,633,272, parecoxib (U.S. patent 30 No. 5,932,598), deracoxib (CAS RN 169590-41-4), rofecoxib ((CAS RN 162011-90-7), etoricoxib (CAS RN 202409-33-4) or lumiracoxib (CAS RN 220991-20-8).
WO 2005/080373 PCT/IB2005/000167 55 Preferred antihypertensive agents useful in the present invention include calcium channel blockers, such as Cardizem', Adalat
, Calan®, Cardene®, Covera®, Dilacor®, DynaCirc®* Procardia XL
, Sular®, Tiazac
, Vascor
, Verelan®, Isoptin®, Nimotop®' Norvasc®, and Plendil"; angiotensin converting enzyme (ACE) inhibitors, such as 5 Accupril®, Altacec , Captopril®, Lotensin®, Mavik®, Monopril"', Prinivil®, Univasc®, Vasotec' and Zestril®. Preferred HMG-CoA reductase inhibitors include lovastatin, simvastatin, pravastatin, fluvastatin, atorvastatin or rivastatin; more preferably, atorvastatin, particularly atorvastatin hemicalcium. 10 The compounds of the present invention can also be administered in combination with naturally occurring substances that act to lower plasma cholesterol levels. These naturally occurring materials are commonly called nutraceuticals and include, for example, garlic extract, Hoodia plant extracts and niacin. Diabetes (especially Type II), insulin resistance, impaired glucose tolerance, or 15 the like, and ar)y of the diabetic complications such. .as neuropathy, nephropathy, retinopathy or cataracts may be treated by the administration of a therapeutically effective amount of a compound of Formula (I) in combination with one or more other agents that are useful in treating diabetes. Such agents include PPARy activators, insulin, glycogen phosphorylase inhibitors, glucosidase inhibitors, amylase inhibitors, 20 DPP-IV inhibitors, aldose reductase inhibitors (ARI) (e.g., zopolrestat), sorbitol dehydrogenase inhibitors (SDI), biguanides (e.g., metformin, pfenformin or buformin), insulin secretagogues (e.g., sulfonylureas and glinides), glitazones, non-glitazone PPARI3 agonists, inhibitors of PDE5, inhibitors of GSK-3, glucagon antagonists, inhibitors of f-1, 6-BPase(Metabasis/Sankyo), GLP-1/analogs (AC 2993, also known as 25 exendin-4), insulin mimetics (Merck natural products), PKC-13 inhibitors and AGE breakers. The dosage of the additional pharmaceutical agent is generally dependent upon a number of factors including the health of the subject being treated, the extent of treatment desired, the nature and kind of concurrent therapy, if any, and the frequency 30 of treatment and the nature of the effect desired. In general, the dosage range of the additional pharmaceutical agent is in the range of from about 0.001 mg to about 100 mg WO 2005/080373 PCT/IB2005/000167 56 per kilogram body weight of the individual per day, preferably from about 0.1 mg to about 10 mg per kilogram body weight of the individual per day. However, some variability in the general dosage range may also be required depending upon the age and weight of the subject being treated, the intended route of administration, the 5 particular anti-obesity agent being administered and the like. The determination of dosage ranges and optimal dosages for a particular patient is also well within the ability of one of ordinary skill in the art having the benefit of the instant disclosure. According to the methods of treatment of the invention, a compound of the present invention or a combination of a compound of the present invention and at least 10 one additional pharmaceutical agent (referred to herein as a "combination") is administered to a subject in need of such treatment, preferably in the form of a pharmaceutical composition. In the combination aspect of the invention, the compound of the present invention and at least one other pharmaceutical agent (e.g., another anti obesity agent,) may be administered either separately or in a pharmaceutical 15 composition comprising both. It is generally preferred that such administration be oral. When a combination of a compound of the present invention and at least one other pharmaceutical agent are administered together, such administration may be sequential in time or simultaneous. Simultaneous administration of drug combinations is generally preferred. For sequential administration, a compound of the present invention 20 and the additional pharmaceutical agent may be administered in any order. It is generally preferred that such administration be oral. It is especially preferred that such administration be oral and simultaneous. When a compound of the present invention and the additional pharmaceutical agent are administered sequentially, the administration of each may be by the same or by different methods. 25 According to the methods of the invention, a compound of the present invention or a combination is preferably administered in the form of a pharmaceutical composition. Accordingly, a compound of the present invention or a combination can be administered to a patient separately or together in any conventional oral, rectal, transdermal, parenteral (e.g., intravenous, intramuscular or subcutaneous), intracisternal, 30 intravaginal, intraperitoneal, topical (e.g., powder, ointment, cream, spray or lotion), buccal or nasal dosage form (e.g., spray, drops or inhalant).
WO 2005/080373 PCT/IB2005/000167 57 The compounds of the invention or combinations can be administered alone but will generally be administered in an admixture with one or more suitable pharmaceutical excipients, adjuvants, diluents or carriers known in the art and selected with regard to the intended route of administration and standard pharmaceutical practice. The 5 compound of the invention or combination may be formulated to provide immediate-, delayed-, modified-, sustained-, pulsed- or controlled-release dosage forms depending on the desired route of administration and the specificity of release profile, commensurate with therapeutic needs. The pharmaceutical composition comprises a compound of the invention or a 10 combination in an amount generally in the range of from about 1% to about 75%, 80%, 85%, 90% or even 95% (by weight) of the composition, usually in the range of about 1%, 2% or 3% to about 50%, 60% or 70%, more frequently in the range of about 1%, 2% or 3% to less than 50% such as about 25%, 30% or 35%. Methods of preparing various pharmaceutical compositions with a specific amount 15 of active compound are known to those skilled in this art. For examples, see Reminqton: The Practice of Pharmacy, Lippincott Williams and Wilkins, Baltimore MD, 2 0 th ed. 2000. Compositions suitable for parenteral injection generally include pharmaceutically acceptable sterile aqueous or nonaqueous solutions, dispersions, suspensions, or emulsions, and sterile powders for reconstitution into sterile injectable solutions or 20 dispersions. Examples of suitable aqueous and nonaqueous carriers or diluents (including solvents and vehicles) include water, ethanol, polyols (propylene glycol, polyethylene glycol, glycerol, and the like), suitable mixtures thereof, triglycerides including vegetable oils such as olive oil, and injectable organic esters such as ethyl oleate. A prefrerred carrier is Miglyol® brand caprylic/capric acid ester with glycerine or 25 propylene glycol (e.g., Miglyol " 812, Miglyol® 829, Miglyol® 840) available from Condea Vista Co., Cranford, NJ. Proper fluidity can be maintained, for example, by the use of a coating such as lecithin, by the maintenance of the required particle size in the case of dispersions, and by the use of surfactants. These compositions for parenteral injection may also contain excipients such as 30 preserving, wetting, emulsifying, and dispersing agents.
WO 2005/080373 PCT/IB2005/000167 58 Solid dosage forms for oral administration include capsules, tablets, chews, lozenges, pills, powders, and multi-particulate preparations (granules). In such solid dosage forms, a compound of the present invention or a combination is admixed with at least one inert excipient, diluent or carrier. Suitable excipients, diluents or carriers 5 include materials such as sodium citrate or dicalcium phosphate and/or (a) one or more fillers or extenders (e.g., microcrystalline cellulose (available as AvicelTM from FMC Corp.) starches, lactose, sucrose, mannitol, silicic acid, xylitol, sorbitol, dextrose, calcium hydrogen phosphate, dextrin, alpha-cyclodextrin, beta-cyclodextrin, polyethylene glycol, medium chain fatty acids, titanium oxide, magnesium oxide, 10 aluminum oxide and the like); (b) one or more binders (e.g., carboxymethylcellulose, methylcellulose, hydroxypropylcellulose, hydroxypropylmethylcellulose, gelatin, gum. arabic, ethyl cellulose, polyvinyl alcohol, pullulan, pregelatinized starch, agar, tragacanth, alginates, gelatin, polyvinylpyrrolidone, sucrose, acacia and the like); (c) one or more humectants (e.g., glycerol and the like); (d) one or more disintegrating agents 15 (e.g., agar-agar, calcium carbonate, potato or tapioca starch, alginic acid, certain complex silicates, sodium carbonate, sodium lauryl sulphate, sodium starch glycolate (available as Explotab T M from Edward Mendell Co.), cross-linked polyvinyl pyrrolidone, croscarmellose sodium A-type (available as Ac-di-sol T M ), polyacrilin potassium (an ion exchange resin) and the like); (e) one or more solution retarders (e.g., paraffin and the 20 like); (f) one or more absorption accelerators (e.g., quaternary ammonium compounds and the like); (g) one or more wetting agents (e.g., cetyl alcohol, glycerol monostearate and the like); (h) one or more adsorbents (e.g., kaolin, bentonite and the like); and/or (i)one or more lubricants (e.g., talc, calcium stearate, magnesium stearate, stearic acid, polyoxyl stearate, cetanol, talc, hydrogenated caster oil, sucrose esters of fatty acid, 25 dimethylpolysiloxane, microcrystalline wax, yellow beeswax, white beeswax, solid polyethylene glycols, sodium lauryl sulfate and the like). In the case of capsules and tablets, the dosage forms may also comprise buffering agents. Solid compositions of a similar type may also be used as fillers in soft or hard filled gelatin capsules using such excipients as lactose or milk sugar, as well as high 30 molecular weight polyethylene glycols, and the like.
WO 2005/080373 PCT/IB2005/000167 59 Solid dosage forms such as tablets, dragees, capsules, and granules may be prepared with coatings and shells, such as enteric coatings and others well known in the art. They may also contain opacifying agents, and can also be of such composition that they release the compound of the present invention and/or the, additional 5 pharmaceutical agent in'a delayed manner. Examples of embedding compositions that can be used are polymeric substances and waxes. The drug may also be in micro encapsulated form, if appropriate, with one or more of the above-mentioned excipients. For tablets, the active agent will typically comprise less than.50% (by weight) of the formulation, for example less than about 10% such as 5% or 2.5% by weight. The 10 predominant portion of the formulation comprises fillers, diluents, disintegrants, lubricants and optionally, flavors. The composition of these excipients is well known in the art. Frequently, the fillers/diluents will comprise mixtures of two or more of the following components: microcrystalline cellulose, mannitol, lactose (all types), starch, and di-calcium phosphate. The filler/diluent mixtures typically comprise less than 98% of 15 the formulation and preferably less than 95%, for example 93.5%. Preferred disintegrants include Ac-di-solTM, ExplotabTM, starch and sodium lauryl sulphate. When present a disintegrant will usually comprise less than 10%.of the formulation or less than 5%, for example about 3%. A preferred lubricant is magnesium stearate. When present a lubricant will usually comprise less than 5% of the formulation or less than 3%, for 20 example about 1%. Tablets may be manufactured by standard tabletting processes, for example, direct compression or a wet, dry or melt granulation, melt congealing process and extrusion. The tablet cores may be mono or multi-layer(s) and can be coated with appropriate overcoats known in the art. 25 Liquid dosage forms for oral administration include pharmaceutically acceptable emulsions, solutions, suspensions, syrups, and elixirs. In addition to the compound of the present invention or the combination, the liquid dosage form may contain inert diluents commonly used in the art, such as water or other solvents, solubilizing agents and emulsifiers, as for example, ethyl alcohol, isopropyl alcohol, ethyl carbonate, ethyl 30 acetate, benzyl alcohol, benzyl benzoate, propylene glycol, 1,3-butylene glycol, dimethylformamide, oils (e.g., cottonseed oil, groundnut oil, corn germ oil, olive oil, WO 2005/080373 PCT/IB2005/000167 60 castor oil, sesame seed oil and the like), Miglyol (available from CONDEA Vista Co., Cranford, NJ.), glycerol, tetrahydrofurfuryl alcohol, polyethylene glycols and fatty acid esters of sorbitan, or mixtures of these substances, and the like. Besides such inert diluents, the composition may also include excipients, such 5 as wetting agents, emulsifying and suspending agents, sweetening, flavoring, and perfuming agents. Oral liquid forms of the compounds of the invention or combinations include solutions, wherein the active compound is fully dissolved. Examples of solvents include all pharmaceutically precedented solvents suitable for oral administration, particularly 10 those in which the compounds of the invention show good solubility, e.g., polyethylene glycol, polypropylene glycol, edible oils and glyceryl- and glyceride- based systems., Glyceryl- and glyceride- based systems may include, for example, the following branded products (and corresponding generic products): Captex
' 355 EP (glyceryl tricaprylate/caprate, from Abitec, Columbus OH), Crodamol" GTC/C (medium chain 15 triglyceride, from Croda, Cowick Hall, UK) or Labrafac'" CC (medium chain triglyides, from Gattefosse), Captex
" 500P (glyceryl triacetate i.e. triacetin, from Abitec), Capmul T M MCM (medium chain mono- and diglycerides, fromAbitec), Migyol T 812 (caprylic/capric triglyceride, from Condea, Cranford NJ), Migyol"' 829 (caprylic/capric/succinic triglyceride, from Condea), Migyol T 840 (propylene glycol dicaprylate/dicaprate, from 20 Condea), Labrafi
P M1944CS (oleoyl macrogol-6 glycerides, from Gattefosse), Peceol
" (glyceryl monooleate, from Gattefosse) and MaisineTM 35-1(glyceryl monooleate, from Gattefosse). Of particular interest are the medium chain (about C 8 to C 10 ) triglyceride oils. These solvents frequently make up the predominant portion of the composition, i.e., greater than about 50%, usually greater than about 80%, for example about 95% or 25 99%. Adjuvants and additives may also be included with the solvents principally as taste-mask agents, palatability and flavoring agents, antioxidants, stabilizers, texture and viscosity modifiers and solubilizers. Suspensions, in addition to the compound of the present invention or the combination, may further comprise carriers such as suspending agents, e.g., 30 ethoxylated isostearyl alcohols, polyoxyethylene sorbitol and sorbitan esters, WO 2005/080373 PCT/IB2005/000167 61 microcrystalline cellulose, aluminum metahydroxide, bentonite, agar-agar, and tragacanth, or mixtures of these substances, and the like. Compositions for rectal or vaginal administration preferably comprise suppositories, which can be prepared by mixing a compound of the present invention or 5 a combination with suitable non-irritating excipients or carriers, such as cocoa butter, polyethylene glycol or a suppository wax which are solid at ordinary room temperature, but liquid at body temperature, and therefore, melt in the rectum or vaginal cavity thereby releasing the active component(s). Dosage forms for topical administration of the compounds of the present 10 invention or combinations include ointments, creams, lotions, powders andsprays. The drugs are admixed with a pharmaceutically acceptable excipient, diluent or carrier, and any preservatives, buffers, or propellants that may be required. Many of the present compounds are poorly soluble in water, e.g., less than about 1 pg/mL. Therefore, liquid compositions in solubilizing, non-aqueous solvents such as 15 the medium chain triglyceride oils discussed above are a preferred dosage form for these compounds. Solid amorphous dispersions, including dispersions formed by a spray-drying process, are also a preferred dosage form for the poorly soluble compounds of the invention. By "solid amorphous dispersion" is meant a solid material in which at least a 20 portion of the poorly soluble compound is in the amorphous form and dispersed in a water-soluble polymer. By "amorphous" is meant that the poorly soluble compound is not crystalline. By "crystalline" is meant that the compound exhibits long-range order in three dimensions of at least 100 repeat units in each dimension. Thus, the term amorphous is intended to include not only material which has essentially no order, but 25 also material which may have some small degree of order, but the order is in less than three dimensions and/or is only over short distances. Amorphous material may be characterized by techniques known in the art such as powder x-ray diffraction (PXRD) crystallography, solid state NMR, or thermal techniques such as differential scanning calorimetry (DSC). 30 Preferably, at least a major portion (i.e., at least about 60 wt%) of the poorly soluble compound in the solid amorphous dispersion is amorphous. The compound can WO 2005/080373 PCT/IB2005/000167 62 exist within the solid amorphous dispersion in relatively pure amorphous domains or regions, as a solid solution of the compound homogeneously distributed throughout the polymer or any combination of these states or those states that lie intermediate between them. Preferably, the solid amorphous dispersion is substantially homogeneous so that 5 the amorphous compound is dispersed as homogeneously as possible throughout the polymer. As used herein, "substantially homogeneous" means that the fraction of the compound that is present in relatively pure amorphous domains or regions within the solid amorphous dispersion is relatively small, on the order of less than 20 wt%, and preferably less than 10 wt% of the total amount of drug. 10 Water-soluble polymers suitable for use in the solid amorphous dispersions should be inert, in the sense that they do not chemically react with the poorly soluble compound in an adverse manner, are pharmaceutically acceptable, and have at least some solubility in aqueous solution at physiologically relevant pHs (e.g. 1-8). The polymer can be neutral or ionizable, and should have an aqueous-solubility of at least 15 0.1 mg/mL over at least a portion of the pH range of 1-8. Water-soluble polymers suitable for use with the present invention may be cellulosic or non-cellulosic. The polymers may be neutral or ionizable in aqueous solution. Of these, ionizable and cellulosic polymers are preferred, with ionizable cellulosic polymers being more preferred. 20 Exemplary water-soluble polymers include hydroxypropyl methyl cellulose acetate succinate (HPMCAS), hydroxypropyl methyl cellulose (HPMC), hydroxypropyl methyl cellulose phthalate (HPMCP), carboxy methyl ethyl cellulose (CMEC), cellulose acetate phthalate (CAP), cellulose acetate trimellitate (CAT), polyvinylpyrrolidone (PVP), hydroxypropyl cellulose (HPC), methyl cellulose (MC), block copolymers of ethylene 25 oxide and propylene oxide (PEO/PPO, also known as poloxamers), and mixtures thereof. Especially preferred polymers include HPMCAS, HPMC, HPMCP, CMEC, CAP, CAT, PVP, poloxamers, and mixtures thereof. Most preferred is HPMCAS. See European Patent Application Publication No. 0 901 786 A2, the disclosure of which is incorporated herein by reference. 30 The solid amorphous dispersions may be prepared according to any process for forming solid amorphous dispersions that results in at least a major portion (at least WO 2005/080373 PCT/IB2005/000167 63 60%) of the poorly soluble compound being in the amorphous state. Such processes include mechanical, thermal and solvent processes. Exemplary mechanical processes include milling and extrusion; melt processes including high temperature fusion, solvent modified fusion and melt-congeal processes; and solvent processes including non 5 solvent precipitation, spray coating and spray drying. See, for example, the following U.S. Patents, the pertinent disclosures of which are incorporated herein by reference: Nos. 5,456,923 and 5,939,099, which describe forming dispersions by extrusion processes; Nos. 5,340,591 and 4,673,564, which describe forming dispersions by milling processes; and Nos. 5,707,646 and 4,894,235, which describe forming 10 dispersions by melt congeal processes. In a preferred process, the solid amorphous dispersion is formed by spray drying, as disclosed in European Patent Application Publication No. 0 901 786 A2. In this process, the compound and polymer are dissolved in a solvent, such as acetone or methanol, and the solvent is then rapidly removed from the solution by spray drying to form the solid amorphous dispersion. The solid 15 amorphous dispersions may be prepared to contain up to about 99 wt% of the compound, e.g., 1 wt%, 5 wt%, 10 wt%, 25 wt%, 50 wt%, 75 wt%, 95 wt%, or 98 wt% as desired. The solid dispersion may be used as the dosage form itself or it may serve as a manufacturing-use-product (MUP) in the preparation of other dosage forms such as 20 capsules, tablets, solutions or suspensions. An example of an aqueous suspension is an aqueous suspension of a 1:1 (w/w) compound/HPMCAS-HF spray-dried dispersion containing 2.5 mg/mL of compound in 2% polysorbate-80. Solid dispersions for use in a tablet or capsule will generally be mixed with other excipients or adjuvants typically found in such dosage forms. For example, an exemplary filler for capsules contains a 25 2:1 (w/w) compound/HPMCAS-MF spray-dried dispersion (60%), lactose (fast flow) (15%), microcrystalline cellulose (e.g., Avicelso-102) (15.8%), sodium starch (7%), sodium lauryl sulfate (2%) and magnesium stearate (1%). The HPMCAS polymers are available in low, medium and high grades as Aqoat("-LF, Aqoat"'-MF and AqoatR"-HF respectively from Shin-Etsu Chemical Co., LTD, 30 Tokyo, Japan. The higher MF and HF grades are generally preferred.
WO 2005/080373 PCT/IB2005/000167 64 The following paragraphs describe exemplary formulations, dosages, etc. useful for non-human animals. The administration of the compounds of the present invention and combinations of the compounds of the present invention with anti-obesity agents can be effected orally or non-orally. 5 An amount of a compound of the present invention or combination of a compound of the present invention with another anti-obesity agent is administered such that an effective dose is received. Generally, a daily dose that is administered orally to an animal is between about 0.01 and about 1,000 mg/kg of body weight, e.g., between about 0.01 and about 300 mg/kg or between about 0.01 and about 100 mg/kg or 10 between about 0.01 and about 50 mg/kg of body weight, or between about 0.01 and about 25 mg/kg, or about 0.01 and about 10 mg/kg or about 0.01 and about 5 mg/kg. Conveniently, a compound of the present invention (or combination) can be carried in the drinking water so that a therapeutic dosage of the compound is ingested with the daily water supply. The compound can be directly metered into drinking water, 15 preferably in the form of a liquid, water-soluble concentrate (such as an aqueous solution of a water-soluble salt). Conveniently, a compound of the present invention (or combination) can also be added directly to the feed, as such, or in the form of an animal feed supplement, also referred to as a premix or concentrate. A premix or concentrate of the compound in an 20 excipient, diluent or carrier is more commonly employed for the inclusion of the agent in the feed. Suitable excipients, diluents or carriers are liquid or solid, as desired, such as water, various meals such as alfalfa meal, soybean meal, cottonseed oil meal, linseed oil meal, corncob meal and corn meal, molasses, urea, bone meal, and mineral mixes such as are commonly employed in poultry feeds. A particularly effective excipient, 25 diluent or carrier is the respective animal feed itself; that is, a small portion of such feed. The carrier facilitates uniform distribution of the compound in the finished feed with which the premix is blended. Preferably, the compound is thoroughly blended into the premix and, subsequently, the feed. In this respect, the compound may be dispersed or dissolved in a suitable oily vehicle such as soybean oil, corn oil, cottonseed oil, and the 30 like, or in a volatile organic solvent and then blended with the carrier. It will be appreciated that the proportions of compound in the concentrate are capable of wide WO 2005/080373 PCT/IB2005/000167 65 variation since the amount of the compound in the finished feed may be adjusted by blending the appropriate proportion of premix with the feed to obtain a desired level of compound. High potency concentrates may be blended by the feed manufacturer with 5 proteinaceous carrier such as soybean oil meal and other meals, as described above, to produce concentrated supplements, which are suitable for direct feeding to animals. In such instances, the animals are permitted to consume the usual diet. Alternatively, such concentrated supplements may be added directly to the feed to produce a nutritionally balanced, finished feed containing a therapeutically effective level of a compound of the 10 present invention. The mixtures are thoroughly blended by standard procedures, such as in a twin shell blender, to ensure homogeneity. If the supplement is used as a top dressing for the feed, it likewise helps to ensure uniformity of distribution of the compound across the top of the dressed feed. Drinking water and feed effective for increasing lean meat deposition and for 15 improving lean meat to fat ratio are generally prepared by mixing a compound of the present invention with a sufficient amount of animal feed to provide from about 10 3 to about 500 ppm of the compound in the feed or water. The preferred medicated swine, cattle, sheep and goat feed generally contain from about 1 to about 400 grams of a compound of the, present invention (or 20 combination) per ton of feed, the optimum amount for these animals usually being about 50 to about 300 grams per ton of feed. The preferred poultry and domestic pet feeds usually contain about 1 to about 400 grams and preferably about 10 to about 400 grams of a compound of the present invention (or combination) per ton of feed. 25 For parenteral administration in animals, the compounds of the present invention (or combination) may be prepared in the form of a paste or a pellet and administered as an implant, usually under the skin of the head or ear of the animal in which increase in lean meat deposition and improvement in lean meat to fat ratio is sought. Paste Formulations may be prepared by dispersing the drug in a 30 pharmaceutically acceptable oil such as peanut oil, sesame oil, corn oil or the like.
WO 2005/080373 PCT/IB2005/000167 66 Pellets containing an effective amount of a compound of the present invention, pharmaceutical composition, or combination may be prepared by admixing a compound of the present invention or combination with a diluent such as carbowax, carnuba wax, and the like, and a lubricant, such as magnesium or calcium stearate, may be added to 5 improve the pelleting process. It is, of course, recognized that more than one pellet may be administered to an animal to achieve the desired dose level which will provide the increase in lean meat deposition and improvement in lean meat to fat ratio desired. Moreover, implants may also be made periodically during the animal treatment period in order to maintain the 10 proper drug level in the animal's body. The present invention has several advantageous veterinary features. For the. pet owner or veterinarian who wishes to increase leanness and/or trim unwanted fat from pet animals, the instant invention provides the means by which this may be accomplished. For poultry, beef and swine breeders, utilization of the method of the 15 present invention yields leaner animals that command higher sale prices from the meat industry. Embodiments of the present invention are illustrated by the following Examples. It is to be understood, however, that the embodiments of the invention are not limited to the specific details of these Examples, as other variations thereof will be known, or 20 apparent in light of the instant disclosure, to one of ordinary skill in the art. Examples Unless specified otherwise, starting materials are generally available from commercial sources such as Aldrich Chemicals Co. (Milwaukee, WI), Lancaster Synthesis, Inc. (Windham, NH), Acros Organics (Fairlawn, NJ), Maybridge Chemical 25 Company, Ltd. (Cornwall, England), Tyger Scientific (Princeton, NJ), and AstraZeneca Pharmaceuticals (London, England) or may be prepared using methods known to those of average skill in the art from readily available materials. General Experimental Procedures NMR spectra were recorded on a Varian Unity TM 400 or 500 (available from 30 Varian Inc., Palo Alto, CA) at room temperature at 400 and 500 MHz 1 H, respectively. Chemical shifts are expressed in parts per million (8) relative to residual solvent as an WO 2005/080373 PCT/IB2005/000167 67 internal reference. The peak shapes are denoted as follows: s, singlet; d, doublet; t, triplet; q, quartet; m, multiplet; br s, broad singlet; v br s, very broad singlet; br m, broad multiplet; 2s, two singlets. In some cases only representative 'H NMR peaks are given. Mass spectra were recorded by direct flow analysis using positive and negative 5 atmospheric pressure chemical ionization (APcl) scan modes. A Waters APcl/MS model ZMD mass spectrometer equipped with Gilson 215,liquid handling system was used to carry out the experiments Mass spectrometry analysis was also obtained by RP-HPLC. gradient method for chromatographic separation. Molecular weight identification -was recorded by positive 10 and negative electrospray ionization (ESI) scan modes. A Waters/Micromass ESI/MS model ZMD or LCZ mass spectrometer equipped with Gilson 215 liquid handling system and HP 1100 DAD was used to carry out the experiments. Where the intensity of chlorine or bromine-containing ions are described, the expected intensity ratiowas observed (approximately 3:1 for 35 Cl/ 37 CI-containing ions 15 and 1:1 for 79 Br/ 8 *Br-containing ions) and only the lower mass ion is given. MS peaks are reported for all examples. Optical rotations were-determined on a PerkinElmerTM 241 polarimeter (available from PerkinElmer Inc., Wellesley, MA) using the sodium D line (X = 589 nm) at the indicated temperature and are reported as follows [C.]Dtem , concentration (c = g/100 mL), 20 and solvent. Column chromatography was performed with either Baker T M silica gel (40 pm; J.T. Baker, Phillipsburg, NJ) or Silica Gel 50 (EM Sciences T M , Gibbstown, NJ) in glass columns or in Biotage T M columns (ISC, Inc., Shelton, CT) under low nitrogen pressure. Radial chromatography was performed using a Chromatotron T M (Harrison Research). 25 In the discussion which follows, certain common abbreviations and acronyms have been employed which include: h (hour(s)), PyBroP (bromo-tris-pyrrolidino phosphonium hexafluorophosphate), BOC (tert-butoxycarbonyl), DMSO (dimethyl sulfoxide), EtOAc (ethyl acetate), HOBT (1-hydroxybenzotriazole), EDC (1-ethyl-3 (dimethylaminopropyl)-carbodiimide hydrochloride), LAH (lithium aluminum hydride), 30 Dess-Martin Periodinane (1,1,1-Triacetoxy-1,1-dihydro-1,2-benziodoxol-3(1 H)-one), DIBAL (diisobutylaluminum hydride) and THF (tetrahydrofuran).
WO 2005/080373 PCT/IB2005/000167 68 Preparation of Key Intermediates Preparation of Intermediate Quinoline-6-carboxylic acid tert-butyl ester o OH N N A-1 B-1 10 To a solution of 2-tert-butyl-1,3-diisopropyl-isourea, prepared in accordance with the method described in Mathias, L.J., Synthesis, 1979, 561, (115 g, 575 mM, 5 equiv) in
2 CI2 (200 mL) at 0 oC, A-1 was added in one portion (19.9g, 115 mM, 1 equiv). The ice-bath was removed and the mixture was allowed to warm to room temperature and was stirred at that temperature overnight (16 h). The mixture was cooled to 0 'C and a 15 precipitate that formed was removed by filtration. The filtrate was washed with 10% aqueous citric acid, and aqueous NaHCO 3 , dried over MgSO 4 , filtered and concentrated to give B-1 as an oil. The oil was purified by filtration through a plug of silica gel, eluting with 20% ethyl acetate in hexanes. 1 H NMR (400 MHz, CD 3 OD) 8 = 8.94 (dd, J = 4.1, 1.7 Hz, 1H), 8.60 (d, J = 1.7 Hz, 1H), 20 8.50 (d , J = 8.3 Hz), 8.71 (d, J = 1.7 Hz, 1H), 8.25 (dd, J = 9.1, 2.1 Hz, 1H), 8.06 (d, J = 9.1 Hz, 1H), 7.61 (dd, J = 4.1, 8.3 Hz, 1H), 1.64 (s, 9H). MS 231 (m+1).
WO 2005/080373 PCT/IB2005/000167 69 Prepartion of Intermediate 1-Oxy-quinoline-6-carboxvlic acid tert-butyl ester Noi -I B-1 C-1 5 To a solution of quinoline-6-carboxylic acid tert-butyl ester (B-1, 22.0 g, 95.65 mM, 1 equiv) and urea-H 2 0 2 complex (18.0 g, 191.3 mM, 2 equiv) in THF at 0 'C was added trifluoroacetic anhydride (27.1 mL, 191.3 mM, 2 equiv) dropwise over 20 minutes. The mixture was stirred at 0 oC for 1 h. The reaction was quenched with 1 M sodium thiosulfate (100 mL) and the mixture was stirred at room temperature for 15 minutes. A 10 solution of 0.5 N HCI (200 mL) was added and the mixture was extracted 3 times with
2 . The combined CH 2
2 fractions were washed with aqueous bicarbonate and water, dried (MgSO4), filtered and concentrated to give a solid material. The solid was slurried in 90 mL EtOAc/ hexanes (1:2) solution, and. stirred for 15 minutes. The product C-1 was collected by filtration and the mother liquor was concentrated. This procedure 15 was repeated twice with the mother liquor, decreasing the volume of solvent by 0.5 each time. Total yield 23.61 g. The product was used without further purification. 1 H NMR (400 MHz, CDCI3) 8 = 8.79 (d, J = 9.1 Hz), 8.65 (m, 2H), 8.27 (dd, J = 9.1, 2.1 Hz, 1H), 7.89 (d, J = 8.3 Hz, 1H), 7.41 (dd, J = 8.3, 5.8 Hz), 1.62 (s, 9H) 20 Preparation of Intermediate 2-Amino-quinoline-6-carboxylic acid tert-butyl ester o H 2 N N 0- C-1 D-1 To a solution of 1-oxy-quinoline-6-carboxylic acid tert-butyl ester (C-1, 12.3 g, 25 50 mM, 1 equiv) in chloroform (120 mL) was added p-toluenesulfonyl chloride (12.4 g, 65 mM, 1.3 equiv). The mixture was stirred at room temperature for 30 minutes and then cooled to 0 °C. Aqueous 10% NH 4 0H (120 mL) was added in one portion and the WO 2005/080373 PCT/IB2005/000167 70 mixture was stirred at 0 0C for 10 minutes and then allowed to warm to room temperature and stirred 3.5 h. The mixuture was poured into a separatory funnel and the layers were separated. The aqueous fraction was extracted twice with chloroform. The combined chloroform fractions were washed with water, dried (MgSO 4 ), filtered and 5 concentrated to give a solid material. The solid was slurried in ethyl acetate (40 mL) and the product was collect by filtration to give 8.5 g of compound D-1. The mother liquor was concentrated by half and an additional crop of 2.25 g of product was collected. Total yield 10.75 g. 1 HNMR (400 MHz, CDCI 3 ) 8 = 8.30 (d, 1.67 Hz, 1H), 8.19 (dd, J = 8.7, 1.67 Hz, 1H), 10 7.94 (d, J = 8.7 Hz, 1H), 7.58 (d, J = 8.7 Hz, 1H), 6.75 (d, J = 8.7 Hz, 1H), 1.62 (s, 9H). MS 245 (M+1). Preparation of intermediate quinoline-6-carboxylic acid benzyl ester 15 OH o T o a I 1, solution (B-2) of quinoline-6-carboxylic acid (2.0 g, 11.6 mmol) in EtOAc (30 mL) was added 20 carbonyldiimidazole (2.15 g, 13.3 mmol). The resulting mixture was stirred at room temperature for 2 h at which time all solids had dissolved. Benzyl alcohol (1.4 mL) was added and the reaction was stirred overnight. The mixture was then extracted successively with aqueous 1 N HCI (25 mL), aqueous NaHCO 3 and brine. Evaporation of the solvent gave a solid, which was triturated with cold 1:1 EtOAc/hexane to afford 25 the title compound as a solid (1.9 g, 62%). 1 H NMR (selected signals, CD 3 OD) 8 = 9.00 (dd, 1 H), 8.61 (d, 1 H), 8.34 (d, 1 H), 8.29 (dd, 1 H), 8.25 (d, 1 H), 5.43 (s, 2 H) WO 2005/080373 PCT/IB2005/000167 71 Prepartion of intermediate 1-oxv-quinoline-6-carboxvlic acid benzyl ester 0 0 o N N 0. B-2 C-2 To a solution of quinoline-6-carboxylic acid benzyl ester (5 g, 18.9 mmol) and 5 urea-H 2 0 2 complex (3.0 g, 32 mmol) in CH 2
2 (75 mL) was added phthalic anhydride (4 g, 26.7 mmol). The mixture was stirred at room temperature overnight. The reaction was quenched with 1 M sodium thiosulfate (25 mL) and the mixture was stirred at room temperature for 15 minutes. A solution of 0.5 N HCI (50 mL) was added. The organic layer was separated and washed with aq. NaHCO 3 and brine. Combined aqueous layers 10 were extracted with EtOAc. Combined organic layers were concentrated to give a solid, which was triturated with. cold 1:1 EtOAc/hexane to provide the title compound (4.8 g, 91%). 1 H NMR (selected signals, CDCl3) 5 = 8.79 (d, 1 H), 8.63 (d, 1 H), 8.58 (d, 1 H), 8.35 (dd, 1 H), 7.82 (d, 1 H), 5.43 (s, 2 H) 15 Preparation of Intermediate 2-Amino-quinoline-6-carboxvlic acid benzyl ester o 0 oo N' HN N 0 To a solution of 1-oxy-quinoline-6-carboxylic acidbenzyl ester (10 g, 35.8 mmol) in CH 2
2 (4 mL) was added p-toluenesulfonyl chloride (10 g, 53.6 mmol). The mixture 20 was stirred at room temperature for 45 minutes. In a separate second flask, triethylamine (25 mL, 178 mmol) was added to a suspension of NH 4 CI (9.7 g, 178 mmol) in CH 2
2 .This mixture was stirred for 30 minutes and then added slowly to the first reaction mixture. Stirring was continued at room temperature for 1 h and then the reaction was cooled to 50C. A solid was collected by filtration. This was slurried with 25 water (100 mL) at room temperature. The title compound (4.8 g, 48%) was collected by filtration, washing with cold methanol. 1 H NMR (DMSO-d 6 ): 3 = 8.32 (d, 1 H), 8.03 (d, 1 H), 7.96 (dd, 1 H), 7.47-7.32 (series of m, 6 H), 6.86 (s, 2 H), 6.78 (d, 1 H), 5.34 (s, 2 H).
WO 2005/080373 PCT/IB2005/000167 72 Preparation of Intermediate 2-[(4'-Trifluoromethyl-biphenl-2-carbonyl)-aminol-quinoline 6-carboxylic acid tert-butyl ester CF 3 0 7CF 3 0 /N 'Jll C 0 0 o
2 N O ON 10 H D-1 F-1al To a solution of 2-amino-quinoline-6-carboxylic acid tert-butyl ester (D-1, 4.68 g, 19.15 mM, 1.02 equiv) and pyridine (4.65 mL, 57.45 mM, 3 equiv) in CH 2
2 (150 mL) was added dropwise a solution of the acid chloride (5.0 g, 18.78 mM, 1.0 equiv) in 15 CH 2 CI2 (40 mL). The mixture was stirred at room temperature for 2 h, transferred to a separatory funnel and washed with 1N HCI and water. The CH 2
2 fraction was dried (NarSO4), filtered and concentrated. The crude product was purified by column chromatography using 4:1 hexanes/ethyl acetate. 1 H NMR (400 MHz, CDCI 3 ) 8 = 8.51 (d, J = 1.7 Hz, 1H), 8.46 (d, J = 8.7 Hz, 1H), 8.24 (d, 20 J = 9 Hz, 1H), 8.18 (d, J = 8.7 Hz, 1H), 7.71 (d, J = 7.9 Hz, 1H), 7.66- 7.40 (m, 8H), 1.61 (s, 9H). MS 493 (M+1) Preparation of Intermediate 2-[(4'-Trifluoromethyl-biphenvl-2-carbonyl)-aminol-quinoline 6-carboxylic acid 25
3 CF, o oJ o on 0 - 0 011- 0 0 OH - N N - N N I H H 30 F-lal F-la2 30 WO 2005/080373 PCT/IB2005/000167 73 Intermediate 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 carboxylic acid tert-butyl ester (F-lal, 9.0 g) was dissolved in 50 mL 4N HCI in dioxane and stirred at room temperature overnight. The solution was concentrated to provide compound F-la2. The compound was used without further purification. 5 1 H NMR (400 MHz, d6-DMSO) 8 = 11.4 9 (s, 1H), 8.56 (d, J = 2.1 Hz, 1H), 8.52 (d, J = 9.1 Hz, 1H), 8.14 (dd, 1H, J = 9.1, 1,9 Hz, 1H), 7.81 (d, J = 8.7 Hz, 1H), 7.74- 7.48 (m, 9H). MS 493 (M + 1) Preparation of Intermediate 2-[Methvl-(4'-trifluoromethyl-biphenyl-2-carbonyl)-aino1 10 quinoline-6-carboxvlic acid
3 0 O O00 I " OH - N N N O N OHN OIO H .. CH, F-la2 F-1b2 15 To a solution of 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 carboxylic acid (F-la2, 200 mg, 0.46 mM) in toluene (3.0 mL) was added Bu 4
NHSO
4 (15.6 mg, 0.046 mM) and freshly powdered K 2
3 (127 mg, 0.92 mM), and KOH (128 mg, 2.28 mM). The resulting suspension was stirred at room temperature for 1 h. The 20 mixture was heated to 70 oC and (CH 3
4 (95 uL, 1.01 mM) was added dropwise. The mixture was stirred at 70 oC for 2 h. LC/MS analysis revealed the residue to be a mixture of the acid F-1b2 and the corresponding methyl ester. After cooling to room temperature the mixture was concentrated and the residue was taken up in 5 mL of THF/methanol/H 2 0 (3:1:1) and the resulting mixture was stirred until the methyl ester 25 had been completely consumed (2 h). The mixture was diluted with H 2 0 (5 mL) and the pH was adjusted to 2.0 with 1 N HCI. The mixture was extracted 3 times with EtOAc. The combined EtOAc fractions were dried (MgSO 4 ), filtered and concentrated to provide F-1b2 (180 mg) as a colorless solid.
WO 2005/080373 PCT/IB2005/000167 74 Preparation of Intermediate 4'-tert-Butylbiphenvl-2-carboxylic acid ethyl ester B(OH)2
2 Et 0 OEt 5 To a mixture of ethyl 2-iodobenzoate (32.3 g, 117 mmol), 4-tert-butylboronic acid (25 g, 140.4 mmol), cesium carbonate (91.22 g, 280 mmol) in dimethoxyethane (300 mL) was added tetrakistriphenylphosphine palladium (0) (1.0 g). The reaction mixture was heated to reflux for -90 h, then cooled and taken up in water. The mixture was extracted three times with diethyl ether. The combined organic layers were washed with 10 brine, dried over MgSO 4 and concentrated to afford the crude title compound as a brown oil (33 g). This was used directly in the next step without purification. 1 H NMR (selected signals, CDC 3 ): 8.18 (d, 1 H), 7.80 (dd, 1 H), 7.55 (d, 1 H), 7.50 (d, 1 H), 7.41 (d, 2 H), 7.26 (d, 2 H), 4.08 (q, 2 H), 1.36 (s, 9 H), 0.94 (t, 3 H). 15 WO 2005/080373 PCT/IB2005/000167 75 Preparation of Intermediate 4'-tert-Butvlbiphenvl-2-carboxylic acid 0A 0 A OEt / OH 5 Crude 4'-tert-butylbiphenyl-2-carboxylic acid ethyl ester (33 g, -117 mmol) was taken up in a mixture of THF (100 mL), methanol (50 mL) and water (40 mL). Lithium hydroxide monohydrate (7.36 g, 176 mmol) was added and the reaction mixture was allowed to stir at room temperature for 3 days. The mixture was extracted three times with diethyl ether. The aqueous phase was then acidified using aq. 6N HCI and 10 extracted three times with EtOAc. The combined EtOAc layers were dried over MgSO 4 , filtered and concentrated, The solid residue was triturated with hexane to afford the title compound as a white solid (18.7 g, 63%). 1 H NMR (selected signals, DMSO-d 6 ): 7.66 (dd, 1 H), 7.53 (m, 1 H), 7.41 (d, 2 H), 7.25 (d, 2 H), 1.29 (s, 9 H). 15 Preparation of Intermediate 2-(4'-tert-Butvylbiphenyl-2-carbonvyl)aminolquinoline-6 carboxylic acid benzyl ester I 0 H2N A\ H H N N H To solution of 2-aminoquinoline-6-carboxylic acid benzyl ester (25 g, 100 mmol) 20 and 4'-tert-butylbiphenyl-2-carboxylic acid (19.5 g, 70 mmol) in CH 2
2 (500 mL) was added 4-dimethylaminopyridine (9.77 g, 80 mmol) and 1-(3-dimethylaminopropyl)-3 ethylcarbodiimide hydrochloride (19.2 g, 100 mmol). The reaction mixture was stirred at WO 2005/080373 PCT/IB2005/000167 76 room temperature for 18 h and then diluted with saturated aqueous NaHCO 3 solution. The aqueous phase was separated and extracted with CH 2 C0 2 . Combined organic layers were washed with brine, dried over MgSO 4 and concentrated. The title compound (28.6 g, 79%) was isolated by column chromatography eluting with a gradient of 5% to 30% 5 EtOAc in hexane. Preparation of Intermediate 2-[(4'-tert-Butvlbiphenvl-2-carbonyl)-aminol-qciuinoline-6 carboxylic acid 'N0 N0 O N O O 0 OH - N N N~N N 10 Lithium hydroxide monohydrate (3.5 g, 83.4 mmol) was added to a solution of 2 [(4'-tert-butylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (28.6 g, 55.6 mmol) dissolved in methanol (220 mL), THF (110 mL) and water (83 mL). The reaction mixture was stirred at room temperature overnight and then concentrated under 15 vacuum. The residue was taken up in water, and acidified using aqueous 6M HCI. The title compound (20.0 g, 85%) was collected by filtration, washing with Et 2 0 and drying The following intermediates were prepared from 2-aminoquinoline-6-carboxylic acid benzyl ester in a similar manner to the preparation of the intermediate 2-[(4'-tert butylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester: 20 2-[(4'-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-methylbiphenyl-2-carboxylic acid) 2-[(4'-ethylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-ethylbiphenyl-2-carboxylic acid) 25 2-[(4'-propylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-propylbiphenyl-2-carboxylic acid) WO 2005/080373 PCT/IB2005/000167 77 2-[(4'-isopropylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-isopropylbiphenyl-2-carboxylic acid) 5 2-[(4'-methoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-methoxybiphenyl-2-carboxylic acid) 2-[(4'-ethoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-ethoxybiphenyl-2-carboxylic acid) 10 2-[(4'-isopropoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-isopropoxybiphenyl-2-carboxylic acid) 2-[(4'-tert-butoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester 15 (by coupling with 4'-tert-butoxybiphenyl-2-carboxylic acid) 2-[(4'-methylthiobiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-methylthiobiphenyl-2-carboxylic acid) 20 2-[(6, 4'-dimethylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 6, 4'-dimethylbiphenyl-2-carboxylic acid) 2-[(4'-isopropyl-6-methylbiphenyl-2-carbonyl)-amino]-quin'oline-6-carboxylic acid benzyl ester (by coupling with 4'-isopropyl-6-methylbiphenyl-2-carboxylic acid) 25 2-[(4'-tert-butyl-6-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-tert-butyl-6-methylbiphenyl-2-carboxylic acid) 2-[(6-methyl-4'-trifluoromethylbiphenyl-2-carbonyl )-amino]-quinoline-6-carboxylic acid 30 benzyl ester (by coupling with 6-methyl-4'-trifluoromethylbiphenyl-2-carboxylic acid) WO 2005/080373 PCT/IB2005/000167 78 2-[(6, 4'-dimethoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 6, 4'-dimethoxybiphenyl-2-carboxylic acid) 2-[(6-methoxy-4'-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl 5 ester (by coupling with 6-methoxy-4'-methylbiphenyl-2-carboxylic acid) 2-[(4'-tert-butyl-6-methoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid benzyl ester (by coupling with 4'-tert-butyl-6-methoxybiphenyl-2-carboxylic acid) 10 The following intermediates were prepared from the corresponding benzyl esters in a manner similar to the preparation of the intermediate 2-[(4'-tert-butylbiphenyl-2 carbonyl)-amino]-quinoline-6-carboxylic acid: 2-[(4'-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 15 2-[(4'-ethylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-propylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-isopropylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-methoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-ethoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 20 2-[(4'-isopropoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-tert-butoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-methylthiobiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(6, 4'-dimethylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-isopropyl-6-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 25 2-[(4'-tert-butyl-6-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(6-methyl-4'-trifluoromethylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(6, 4'-dimethoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(6-methoxy-4'-methylbiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 2-[(4'-tert-butyl-6-methoxybiphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid 30 WO 2005/080373 PCT/IB2005/000167 79 Example 1 ' (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonvl)-aminol-quinoline-6-carboxvlic acid (pentylcarbamoyl-phenyl-methyl)-amide. 5 (a) Preparation of Intermediate (S)- 2-Amino-N-pentvl-2-phenyl-acetamide hydrochloride 1. PyBrOP, n-amyl amine, ,,N y OH iPr2EtN, CH2CIk H BOCNH 2. HCI/EtOAc b H2N N 0 HCI O .
0 10 H G-la.HCI PyBrOP (2.2 g, 4.78 mM), and N-Boc-phenylglycine (H, 1.2 g, 4.78 mM) were taken up in CH 2 0 2 (25 mnL) and cooled to 0 °C. N-Amylamine was added and the 15 resulting mixture was treated with diisopropylethylamine (2.5 mL, 14.3 mM). The mixture was allowed to warm.to room temperature 'bnd was stirred at this temperature for 2 h. The mixture was diluted with EtOAc and washed with 1N HCI, water and brine. The organic fraction was dried (Na2SO 4 ), filtered and concentrated. The product was purified by column chromatography eluting with 1:1 EtOAc/hexanes to give 1.19 g, of 20 (S)- 2-amino-N-pentyl-2-phenyl-acetamide hydrochloride. The product above was taken up in 5 volumes of 4N HCI in dioxane and stirred at room temperature for 30 minutes. The solution was concentrated to a foam and dried under high vacuum overnight. 'H NMR (400 MHz, CD 3 OD) 5 = 7.48 (m, 5H), 4.88 (s, 1H), 3.25 (m, 1H), 3.15 (m, 1H), 25 1.45 (m, 2H), 1.24 (m, 2H), 1.17 (m, 2H), 0.38 (t, J = 7.1 Hz, 3H) WO 2005/080373 PCT/IB2005/000167 80 (b) Preparation of (S)-2-[(4'-Trifluoromethyl-biphenylvI-2-carbonv)-aminol-quinoline-6 carboxylic acid (pentvlcarbamoyl-phenyl-methyl)-amide.
3 02 N 0 z I 0 OH H0 N H NH EDC, HOBT, Pr 2 EtN, H THF 5 F-la2 2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (F la2, 1.2g, 2.53 mM), EDC (0.79 g, 6.34 mM), HOBT (0.86 g, 6.34 mM) and (S)- 2 amino-N-pentyl-2-phenyl-acetamide hydrochloride (0.78 g, 3.05 mM,) were combined 10 and dissolved in THF (12.5 mL). The mixture was treated with diisopropylethylamine (2.20 mL, 13 mM) and stirred at room temperature for 16 h. The mixture was diluted with CH 2 C1 2 and washed with water. The CH2CI2 fraction was dried (Na 2
4 ), filtered and concentrated. The product was purified by flash chromatography, eluting with 30% acetone in hexanes to give 1.36 g of (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl) 15 amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide as an amorphous solid. 1 H NMR (400 MHz, CDCl 3 ) 5 = 8.24 ( d, J =[ 1.4 Hz, 1H), 8.21 (d, J = 9.1 Hz, 1H), 8.03 ( dd, J = 8.7, 1.7 Hz, 1H), 7.87 (d, J = 6.4 Hz, 1H), 7.80 (d, J = 7.2 Hz, 1H), 7.71 (d, J = 8.9 Hz, 1H), 7.65 - 7.33 (overlapping m, 12H), 5.77 (t, J = 5.7 Hz, 1H), 5.63 (d, J = 6.5 20 Hz, 1H), 3.25 (dt, J = 7.1, 5.7 Hz, 2H), 1.44 9m, 2H), 1.25 (m, 2H), 1.17 (m, 2H), 0.83 (t, J = 7.2 Hz, 3H), ESMS 639 (m+1) (c) Preparation of Crystalline Form A of (S)-2-[(4'-Trifluoromethyl-biphenvi-2-carbonyl) amino]-quinoline-6-carboxvlic acid (pentylcarbamovl-phenyl-methyl)V-amide 25 (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide (100 mg), prepared as described in Example 1(b), was dissolved with heating in a 7:1 mixture of ethanol/water (20 mL). The mixture WO 2005/080373 PCT/IB2005/000167 81 was allowed to cool to room temperature and stirred at this temperature for 48 h. The solid was collected by filtration. Yield 86 mg. Analysis of form A by fusion microscopy revealed a melting event at an onset temperature of 179 'C. 5 (d) Preparation of Crystalline Form B of (S)-2-f(4'-Trifluoromethyl-biphenyl-2-carbonyl) aminol-quinoline-6-carboxylic acid (pentvlcarbamoyl-phenvl-methyl)-amide (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide (100 mg), prepared as described in Example 10 1(b), was dissolved with heating in a 1:1 mixture of ethyl acetate and hexanes (10 mL). The mixture was allowed to cool to room temperature and stirred at this temperature for 48 h. The solid was collected by filtration. Yield 78 mg. Analysis of form B by fusion microscopy revealed a melting event at an onset temperature of 1870C. 15 Alternative preparation of (S)-2-f(4'-Trifluoromethyl-biphenvyl-2-carbonyl)-amino] guinoline-6-carboxvlic acid (pentvlcarbamovl-phenvl-methyl)-amide (a) Preparation of Intermediate 1-Oxy-quinoline-6-carboxylic acid benzyl ester 20 0 00 OH o (B-2) (C-2) 25 1,1'-Carbonyldiimidazole (51.56 g, 0.318 moles) was added to a slurry of 6-quinoline carboxylic acid (50 g, 0.289 moles) in 2-methyltetrahydrofuran (500 mL). The reaction mixture was then heated to 400C to 450C and held at that temperature for two to six WO 2005/080373 PCT/IB2005/000167 82 hours. The reaction mixture was then cooled to 20'C to 250C, and benzyl alcohol (34.39 g, 0.318 moles) was added. The reaction mixture was then stirred for 10 to 18 hours at 200C to 250C, then washed successively with 2 N HCI (300 mL), an aqueous solution of NaHCO 3 (300 mL), and an aqueous solution of NaCI (350 mL). A 95 % yield 5 (72.23 g, 0.274 moles) of the resulting benzyl ester product (B-2) was assumed for the reaction solution. The 2-methyltetrahydrofuran was then displaced under vacuum with 1,2-dichloroethane to final a reaction volume of 725 mL. To the reaction mixture was then added 2-methyltetrahydrofuran (1,100 mL), phthalic anhydride (105.76 g, 0.714 moles), and urea hydrogen peroxide complex (44.16 g, 0.469 moles). The resulting 10 slurry was then stirred for 24 to 36 hours at 200C to 250C. To the reaction mixture was then added aqueous sodium thiosulfate (900 mL) and 2-methyltetrahydrofuran (360. mL), and the whole was then stirred for 1 hour at 20'C to 250C. An aqueous solution of 2N HCI was added, the reaction mixture was stirred and organic and aqueous layers were separated. The organic layer was then washed two times with an aqueous 15 solution of NaHCO 3 (1,825 mL, 725 mL) and once with an aqueous solution of NaCI (365 mL). The organic product layer was then vacuum concentrated, and the reaction solvents were exchanged for ethyl acetate to a final volume of 260 mL. To the resulting reaction slurry was added hexanes (450 mL) and the reaction mixture was cooled to 00C to 5°C and stirred for 3 to 8 hours. The product (C-2) was collected by filtration (73.15 g, 20 95% yield). Intermediate (B-2): 1 H NMR (selected signals, DMSO-d 6 ) 8 = 9.00 (dd, 1 H), 8.73 (d, 1 H), 8.60 (d, 1 H), 8.23 (dd, 1 H), 8.11 (d, 1 H), 5.41 (s, 2 H) Product: (C-2) 1 H NMR (selected signals, DMSO-d 6 ) 8 = 8.79 (s, 1 H), 8.69 (d, 1 H), 8.61 (d, 1 H), 8.25 (d, 1 H), 8.16 (d, 1 H), 5.42 (s, 2 H) 25 WO 2005/080373 PCT/IB2005/000167 83 (b) Preparation of Intermediate 2-Amino-quinoline-6,carboxylic acid benzyl ester 0 0, O
2 N N' I (C-2) (D-2) 0 5 To a solution of 1-oxy-quinoline-6-carboxylic acid benzyl ester (114.29 g, 0.409 moles) in 1,2-dichloroethane (1,368 mL) was added p-toluenesulfonyl chloride (109.24 g, 0.573 moles). The reaction mixture was stirred for one to four hours at 200C to 25°C. In a separate reactor, triethylamine (135.04 g, 1.334 moles) was added to a slurry of ammonium chloride (65.63 g, 1.227 moles) in 1,2-dichloroethane (342 mL). The 10 ammonium chloride slurry was then cooled to -50C to -100C. The p-toluenesulfonyl chloride solution was then added over three to four hours to the ammonium chloride slurry which was maintained at -10°C to -5C. 'The 'reaction mixture was stirred for 8 to 16 hours at -10OC to -5C0; and product obtained by filtration. The product was then slurried in water (1,150 mL) for 8 to 16 hours at 200C to 250C and isolated by filtration 15 (62.33 g, 55% yield). 1 H NMR (DMSO-d 6 ) 5 = 8.32 (d, 1 H), 8.03 (d, 1 H), 7.97 (dd, 1 H), 7.48-7.32 (series of m, 6 H), 6.87 (s, 2 H), 6.78 (d, 1 H), 5.34 (s, 2 H) 20 (c) Preparation of Intermediate 2-Amino-quinoline-6-carboxylic acid potassium salt 0 0 OO
2 N N (D-2)
2 N N A mixture of 2-amino-quinoline-6-carboxylic acid benzyl ester (15.63 g, 0.0562 moles), 25 2-propanol (235 mL), water (15.6 mL) and potassium hydroxide (6.3 g, 0.112 moles) WO 2005/080373 PCT/IB2005/000167 84 was heated to reflux, 800C to 850C, for 2 to 4 hours. The reaction mixture was then cooled to 20'C to 250C, vacuum concentrated (volume of 160 mL) and granulated at 20°C to 250C for 8 to 16 hours. The product was isolated by filtration (12.08 g, 0.0534 moles, 95% yield). 5 1 H NMR (selected signals, D 2 0) 5 = 7.86 (d, 1 H), 7.75 (dd, 1 H), 7.66 (d, 1 H), 7.20 (d, 1 H), 6.50 (d, 1 H) (d) Preparation of Intermediate 2-Amino-quinoline-6-carboxylic acid pentylcarbamoyl phenyl-methyl)-amide H H2 OK H2NNH H 2 N O NH + H" H12
C/N H21r O H2N - H 10 o Residual water in the 2-amino-quinoline-6-carboxylic acid potassium salt (5.0 g, 0.0221 moles) was displaced with tetrahydrofuran (4x100 mL) by concentration under vacuum 15 (final reaction volume 105 mL). 1-(3-Dimethylaminopropyl)-3-ethyl-carbodiimide hydrochloride (5.33 g, 0.0195 moles) was added to the tetrahydrofuran solution and the reaction slurry for stirred for 15 to 60 minutes at 200C to 250C. To this was added (S) 2-amino-N-pentyl-2-phenyl-acetamide benzene sulfonic acid (7.39 g, 0.0195 moles) and (S)- 2-amino-N-pentyl-2-phenyl-acetamide (0.97 g, 0.0044 moles), and the treaction 20 mixture was stirred for 12 to 24 hours at 200C to 250C. The tetrahydrofuran was displaced with ethyl acetate (3x1 00OMI) by concentration under vacuum. After the final concentration, to give an oil, sufficient ethyl acetate was added to obtain a solution (final reaction mixture volume 260 mL). Aqueous sodium bicarbonate (250 mL) and activated carbon (5.0g, Darco G-60) were added to the ethyl acetate solution and the whole was 25 stirred for 2 to 3 hours at 200 to 250C. The mixture was filtered to remove activated carbon and the aqueous and organic filtrate layers were separated. The organic layer was washed twice with water (2 X 100 mL). Residual water in the product solution was WO 2005/080373 PCT/IB2005/000167 85 displaced at atmospheric pressure with ethyl acetate and the product was isolated as an ethyl acetate solution with a yield of 90% assumed (6.86 g, 0.0176 moles). 1 H NMR (selected signals, DMSO-d 6 ) 8 = 8.65 (d, 1 H). 8.24 (dd, 1 H), 7.93 (d, 1 H), 7.49 (t, 1 H), 7.39 (t, I H), 7.34-7.23 (series of m, 5 H). 5 (e) Preparation of (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline-6 carboxylic acid (pentvlcarbamoyl-phenyl-methyl)-amide
3 O 'N NH OOH N N H2 O CF3 o O /N NH N NN 0 H 10 A mixture of 4'-trifluoromethyl-biphenyl-2-carboxylic acid (7.03 g, 0.0264 moles), ethyl acetate (70 mL) and 1,l'-carbonyldiimidazole (4.28 g, 0.0264 moles) was heated to 750C to 80 0 C for 3 to 6 hours, then cooled to 20 0 C to 250C and added to the ethyl acetate solution of the 2-aminoquinoline derivative obtained in Step (d) above. The reaction mixture was heated to 75°C to 800C for 115 to 135 hours. Ethyl acetate 15 (70 mL) was added and the whole was washed three times with water (3 X 210 ml). Residual water in the reaction mixture was displaced at atmospheric pressure with ethyl acetate, then the ethyl acetate was displaced with 2B ethanol (final reaction volume 100 WO 2005/080373 PCT/IB2005/000167 86 mL). To the reaction slurry, water (10.5 mL) was added, and the mixture was stirred at 20'C to 25 0 C for 4 to 16 hours. The product was isolated by filtration (6.18 g, 55% yield). 1 H NMR (selected signals, DMSO-d 6 ) 5 = 11.32 (s, 1 H ), 8.95 (d, 1 H), 8.54 (d, 1 H), 8.41 (d, 1 H), 8.28 (t, 1 H), 8.18 - 8.11( series m, 2 H), 7.77- 7.25 (series of m, 13 5 H). X-ray powder diffraction and differential scanning calorimetry showed the product to be crystalline form A The compounds in Table 1(a) were prepared using procedures analogous to those described above for the synthesis of the compound of Example 1 using 10 appropriately substituted starting materials/intermediates which are available commercially, prepared in a manner analogous to the methods described above for other intermediates, or prepared using procedures known to those of average skill in the art.
WO 2005/080373 PCT/1B2005/000167 87 Table I1(a) Ex. No. Compound Name HPLC ESMVS Caic Retention time (m4-1) MW (or selected NMVR signals) 2 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.70 569 568 carbonyl)-amino]-quinoline-6-coarboxylic acid (carbamoyl-phenyl-methyl)-amide 3 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.77. 583 582 carbonyl )-amino]-quinoline-6-carboxylic acid (me thylcarbamoyl-phenyl-methyl) amide 4 2-[(4'-t rifl uorom ethyl -bip he nyl-2- 2.85 651 650 carbonyl)-amino]-quinoline-6-carboxylic acid [phenyl-(2,2 .2-trifluoro ethyl carbamoyl)- methyll]-am ide 5 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.52 611 610 carbonyl )-amino]-quinoline-6-carboxylic acid [(ethyl -methyl -carbamoyl)- phe nyl methyll-amide 6 (S)-2+[4-tri ,fluoromethyl-biphehyl-- 2.52 625 624 carbonyl)-amino]-quinoline-6-carboxylic acid (diethylcarbamoyl-phenyl-methyl) amide______ __ 7 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.48 611 610 carbonyl)-amino]-quinoline-6-carboxyic acid (phenyl-propylcarbamoyl-methyl) amide 8 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 3.00 653 652 carbonyl)-amino-quinoline-6-carboxylic acid (dipropylcarbamoyl-phenyl methyl )-amide 9 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.58 611 610 carbonyl)-amino]-quinoline-6-carboxylic acid (isopropylcarbamoyl-phenyl methyl)-amide 10 S)-2-[(4'-trifluoromethyl-biphenyl-2- 638 carbonyl)-aminoI-quinoline-6-carboxylic acid [(ethyl-isopropyl-carbamoyl) phenyl-methyll-amide 11 2-I(4'-trifluoromethyl-biphenyl-2- 624 carbonyl)-amino-quinoline-6-carboxylic acid (butylcarbamoyl-phenyl-methyl) _________ amide ________ ___ __ WO 2005/080373 PCT/IB2005/000167 88 Ex. No. Compound Name HPLC ESMS Calc Retention time (m+1) MW (or selected NMR signals) 12 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 3.05 639 638 carbonyl)-amino]-quinoline-6-carboxylic acid [(butyl-methyl-carbamoyl)-phenyl methyll-amide 13 2-[(4'-trifluoromethyl-biphenyl-2- 652 carbonyl)-amino]-quinoline-6-carboxylic acid [(butyl-ethyl-carbamoyl)-phenyl methyl]-amide 14 2-[(4'-trifluoromethyl-biphenyl-2- 652 carbonyl)-amino]-quinoline-6-carboxylic acid [(butyl-ethyl-carbamoyl)-phenyl methyl]l-amide 15 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.87 625 624 carbonyl)-amino]-quinoline-6-carboxylic acid (isobutylcarbamoyl-phenyl methyl)-amide 16 2-[(4'-trifluoromethyl-biphenyl-2- 2.85 639 638 carbonyl)-amino]-quinoline-6-carboxylic acid (pentylcarbamoyl-phenyl-methyl) amide 17 (S)-2-[methyl-(4'-trifluoromethyl- 652 biphenyl-2-carbonyl)-amino]-quinoline 6-carboxylic acid (pentylcarbamoyl phenyl-methyl)-amide 18 (S)-2-[methyl-(4'-trifluoromethyl- 666 biphenyl-2-carbonyl)-amino]-quinoline 6-carboxylic acid [(methyl-pentyl carbamoyl)-phenyl-methyll-amide 19 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 3.0 653 652 carbonyl)-amino]-quinoline-6-carboxylic acid [(methyl-pentyl-carbamoyl) phenyl-methyll-amide 20 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.60 655 654 carbonyl)-amino]-quinoline-6-carboxylic acid [(5-hydroxy-pentylcarbamoyl) phenyl-methyl]-amide 21 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 653 carbonyl)-amino]-quinoline-6-carboxylic acid (hexylcarbamoyl-phenyl-methyl) amide WO 2005/080373 PCT/1B2005/000167 89 22 (S)-2-[(4'-trifluoromethyI-bipheny-2-carbol)-amilo]- 3.3 666 665 quinoline-6-carboxylic acid [(cyclohexyl-methyl carbamoyl)-phenyi-methyll-amide. 23 (S)-2-[(4'-trifluoromethy-bipheny-2-car~ofl)-amilo]- 3.43 680 679 quinoline-6-oarboxylic acid [(cyclohexyl-ethyl carbamoyl)-phenyl-methyll-amide 24 (S--('tilooehlbpey--abnl-mnl 3.23 665 664 quinoline-6-carboxylic acid [(cyclohexylmnethyl-ca rbamoyl )-phenyl-methylj-amide 25 (S)-2-[(4'-triflIuorom ethyl -bip he nyl-2-carbofl)-a m ino]-. 2.78 659 658 quinoline-6-carboxylic acid (benzylcarbamoyl-pheflyl methyl)-amide 26 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carboflyl )-amino]- 3.22 673 672 quinoline-6-carboxylic acid [(benzyl-methyl-carbamoyl) phenyl-methyll-amide 27 2-[(4'-trifl uorom ethyl -bi phen yl -2-carbonyl)-ai l l- 2.97 693 692 quinoline-6-carboxylic acid{[3-(2-oxo-pyrrolidin-1 -yI) propylcarbamoyll-phenyl-methyl}-amide 28 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbolyl )-aminol- 2.68 646 645 quinoline-6-carboxylic acid IphenyI-(pyridin-4 ________ylcarbamoyl)-methyll-amide 29 (S)-2-[(4'-trifluoromethyl-biphe nyl-2-carbolyl )-amino]- 2.86 646 645 quinoline-6-carboxylic acid [phenyl-(pyridin-3 ylcarbamoyl)-M'ethyll-amide 30 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbolyl )-amino]- 2.97 673 674 quinoline-6-carboxylic acid [phenyl-(2-pyridin-2 yl-ethylcarbamoyl)-methyl]-amideIA 31 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbofl)-amino]- 3.05 673 674 quinoline-6-carboxylic acid [phenyl-(2-pyridin-4-yI ethyl carbamoyl)- methyl] -am ide
WO 2005/080373 PCT/IB2005/000167 90 32 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.86 624 625 carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo-1l-phenyl-2-pyrrolidin-1-yl ethyl)-amide 33 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 3.17 638 637 carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo- 1-phenyl-2-piperidin- 1-yl-ethyl) amide 34 (S)-2-[methyl-(4'-trifluoromethyl-biphenyl-2- 650 carbonyl)-amino]-quinoline-6-carboxylic acid (2-oxo-1-phenyl-2-piperidin- 1 -yl-ethyl) amide 35 (S)-2-[(4'-trifluoromethyl-biphenyl-2- 2.90 640 639 carbonyl)-amino]-quinoline-6-carboxylic acid (2-morpholin-4-yl-2-oxo-1-phenyl ethyl)-amide 36 (S)-2-[methyl-(4'-trifluoromethyl-biphenyl-2- 679 carbonyl)-amino]-quinoline-6-carboxylic acid [2-(4-ethyl-piperazin-1-yl)-2-oxo-1 phenyl-ethyl]-amide 37 (S)-2-[methyl-(4'-trifluoromethyl-biphenyl-2- 693 carbonyl)-amino]-quinoline-6-carboxylic acid [2-oxo-1-phenyl-2-(4-propyl-piperazin 1 -yl)-ethyl]-amide 38 (S)-[2-Phenyl-2-({2-[(4'-trifluoromethyl- 5.72 (d, 1 H); 641 640.6 biphenyl-2-carbonyl)amino]-quinoline-6- 4.04 (m, 2 H); carbonyl)amino)acetylamino]-acetic acid 3.72 (s, 3 H) methyl ester 39 (S)-{Methyl-[phenyl-({2-[(4'- 6.12 (d, 0.8 655 654.6 trifluoromethylbiphenyl-2-carbonyl)amino]- H); 5.86 (d, quinoline-6-carbonyl}-amino)- 0.2 H); 3.72 acetyl]amino)-acetic acid methyl ester (s, 2.4 H); 3.54 (s, 0.6 H); 3.03 (s, 0.6 H); 2.96 (2.4 H) 40 (S)-3-[2-Phenyl-2-({2-[(4'- 5.57 (d, 1 H); 655 654.6 trifluoromethylbiphenyl-2-carbonyl)amino]- 3.60 (s, 3 H) quinoline-6-carbonyl}-amino)acetylamino] propionic acid methyl ester 41 (S)-4-{[2-Phenyl-2-({2-[(4'- 5.69 (d, 1 H); 717 716.7 trifluoromethylbiphenyl-2-carbonyl)amino]- 4.53 (t, 2 H); quinoline-6-carbonyl}-amino)-acetylamino]- 3.89 (s, 3 H) methyl}-benzoic acid methyl ester WO 2005/080373 PCT/IB2005/000167 91 42 (S)-4-({Methyl-[phenyl-({2-[(4'- 6.07 (d, 1 807 806.8 trifluoromethylbiphenyl-2-carbonyl)-amino]- H); 5.32 (s, quinoline-6-carbonyl}amino)-acetyl]-amino}- 2 H); 2.90 methyl)-benzoic acid benzyl ester (s, 0.9 H); 2.85 (2.1 H) 43 (S)-4-({Methyl-[phenyl-({2-[(4'- 6.08 (m, 1 731 730.7 trifluoromethylbiphenyl-2-carbonyl)-amino]- H); 3.90 (s, quinoline-6-carbonyl}amino)-acetyl]-amino}- 3 H); 2.94 methyl)-benzoic acid methyl ester (s, 0.9 H); 2.89 (2.1 H) 44 (S)-4-[2-Phenyl-2-({2-[(4'- 5.54 (d, 1 745 744.8 trifluoromethylbiphenyl-2-carbonyl)-aminbo]- H); 5.06 (s, quinoline-6-carbonyl}-amino)acetylamino
- 2 H) butyric acid benzyl ester 45 (S)-4-[2-Phenyl-2-({2-[(4'- 669 668.7 trifluoromethylbiphenyl-2-carbonyl)amino] quinoline-6-carbonyl}-amino)-acetylamino] butyric acid methyl ester 46 (S)-2-[(4'-Trifluoromethyl-biphenyl-2- NMR: 6.13 691 690.7 carbonyl)amino]quinoline-6-carboxylic acid (d, 0.3 H); {[(4-fluorobenzyl)methyl- 6.07 (d, 0.7 carbamoyl]phenylmethyl}amide . H); 2.90 (s, 0.9 H); 2.85 (s, 2.1 H); The compounds in Table (1b) were prepared using procedures analogous to those described above for the synthesis of the compound of Example 1 except that 5 compound (F-1b2) was used in place of compound (F-la2) as the starting material.
WO 2005/080373 PCT/IB2005/000167 92 Table 1(b) Ex. No. Compound Name ESMS (M+I1)Calc MW 1 H NMR 47 (S)-2-[methyl-(4'- 654 653 (500 MHz, CDCI 3 ) 6 = 8.18 (s, trifluoromethyl-biphenyl- 1H), 8.05 (t, J = 6.7 Hz, 1H), 2-carbonyl)-amino]- 7.995 (dd, J = 8.8, 1.8 Hx, 1H), quinoline-6-carboxylic 7.76 - 7.72 (m, 2H), 7.75 - 7.28 acid [(butyl-methyl- (m, 11 H), 7.1 (m, 1H), 6.95 (br carbamoyl)-phenyl- s, 1H), 6.07 and 6.04 rotamers methyl]-amide (1:1)[6.07 (d, J = 6.7 Hz), 6.04(d, J = 7.0 Hz), 1H], 3.40 (s, 3H), 3.3 (m, 1H), 3.01 and 2.94 rotamers (2 s, 3H), 2.92 and 2.85 rotamers (2 s, 3H), 1.54 1.46 (m, 2H), 1.33 - 1.24 (rri, 2H), 0.96 - 0.81 (m, 3H) 48 (S)-2-[methyl-(4'- 674 673 (500 MHz, CDCI 3 ) 8 = 8.1 (s, trifluoromethyl-biphenyl- 1H), 7.85 - 7.75 (m, 2H), 7.56 2-carbonyl)-amino]- (m, 2H), 7.45 - 6.65 (m, 18 H), quinoline-6-carboxylic 5.835 and 5.570 acid (benzylcarbamoyl- rotamers(approx 4:1) [major phenyl-methyl)-amide 5.835(d, J = 6.7 Hz), minor 5.57 (d, J = 6.9 Hz), 4.36 (m, 2H), 3.31 (s, 3H) 49 (S)-2-[methyl-(4'- 653 652 (500 MHz, CDCI 3 ) 8 = 8.32 (s, trifluoromethyl-biphenyl- 1H), 8.05 (m, 2h), 7.60 - 7.25 (m, 2-carbonyl)-amino]- 11H), 7.10 (m, 1H), 6.9 (br s, quinoline-6-carboxylic 1H), 6.09 (d, J = 7.0 Hz, 1H), acid [(ethyl-propyl 3.40 (s, 3H), 3.35 (m, 2H), 3.23 -carbamoyl)-phenyl- (m, 2H), 1.81 (m, 2H)), 0.91 (t, J methyl]-amide = 7.2 Hz, 3H)), 0.82 (t, J = 7.3 Hz, 3H) 50 (S)-2-[methyl-(4'- 639 638 (500 MHz, CDCi 3 ) 8 = 8.09 (s, trifluoromethyl-biphenyl- 1H), 7.98 -7.89 (m, 2H), 7.70 2-carbonyl)-amino]- 7.60 (m, 2H), 7.5- 7.0 (m, 13H), quinoline-6-carboxylic 6.00 and 5.95 rotamers acid [(methyl-propyl- (1:1.4)[.inor 6.00 (d, J = 7.7 Hz), carbamoyl)-phenyl- major 5.95 (d, J = 7.0 Hz), 1H], methyl]-amide 3.43 (m, 1H)3.33 (s, 3H), 3.25 (m, 1 H), 2.93 and 2.84 rotamers (2 s, 3H), 1.5 (m, 2H), 0.8 (m, 3H) WO 2005/080373 PCT/IB2005/000167 93 Ex. No. Compound Name ESMS (M+1)Calc MW 1 H NMR 51 (S)-2-[methyl-(4'- 625 624 (500 MHz, CDCI 3 ) 6 = 8.08(s, rifluoromethyl-biphenyl- 1H), 7.96 - 7.90 (m, 2H), 7.76 2-carbonyl)-amino]- 7.66 (m, 2H), 7.48 - 7.20 (m, quinoline-6-carboxylic 11H), 7.05 (d, J = 7.0 Hz, 1H), acid [(ethyl-methyl- 6.89 (br s, 1H), 6.00 and 5.96 carbamoyl)-phenyl- rotamers (approx 1:1.3) [minor methyl]-amide 6.00 (d, J = 7.3 Hz), major 5.96 (d, J = 7.0 Hz), 1HI, 3.42 and 3.21rotamers (2 m, 2H), 3.32 (s, 3H), 2.93 and 2.83 rotamers (2 s, 3H), 1.18 and 0.87 rotamers ([major 1.18 9t, J = 7.3 Hz), minor 0.87 (t, J = 6.0 Hz), 3H] 52 (S)-2-[methyl-(4'- 624 623 (500 MHz, CDC1 3 ) 8 = 8.20 (s, trifluoromethyl-biphenyl- 1H), 7.85 (m, 1H), 7.80 (m, 1H), 2-carbonyl)-amino]- 7.75, 7.60 (m, 2H), 7.5 - 7.25 (m, quinoline-6-carboxylic 10OH), 7.06 (m, 1H), 6.9 (br s, acid 1H), 6.42 (s, 1H), 5.68 (d, J = (cyclopropylcarbamoyl- 6.7 Hz, 1H), 3.32 (s, 3H), 2.64 phenyl-methyl)-amide (m, 1H), 0.69 (m, 2H), 0.38 (m, 2H) 53 (S)-2-[methyl-(4'- 639 638 (500 MHz, CDCI 3 ) rotamers (4:1) rifluoromethyl-biphenyl- some sigmals doubled 6 = 8.15 2-carbonyl)-amino]- (s, 1H), 7.92 (dd, J = 7.0, 1.9 Hz, quinoline-6-carboxylic 1H), 7.85 (d, J = 6.5 Hz, 1H), acid (isobutylcarbamoyl- 7.70 (d, J = 8.3 Hz, 1H), 7.65 (d, phenyl-methyl)-amide J = 6.5 Hz, 1H), 7.49 - 7.19 (m, 11H), 7.04 (m, 1H), 8.86 (m, 1H), 6.13 and 5.88 rotamers [major 6.13 (m), 5.88 (m), 1H)], 5.69 and 5.45 rotamers [major 5.69 (d, J = 6.5 Hz), minor 5.45 (d, J = 6.5 Hz), 1H], 3.32 (s, 3H), 3.07 (m, 1H), 2.95 (m, 1H), 0.74 (d, J = 2.3 Hz, 3H), 0.715 (d, J = 2.3 Hz, 3H), 0.66 (m, 1H) 54 (S)-2-[methyl-(4'- 626 625 (500 MHz, CDC3) 8 = 8.10 (s, rifluoromethyl-biphenyl- 1H), 7.92 (dd, 8.8, 1.8 Hz, 1H), 2-carbonyl)-amino]- 7.83 (d, J = 6.5 Hz, 1H), 7.70 quinoline-6-carboxylic 7.63 (m, 2H), 7.49 - 7.25 (m, acid (phenyl- 10H), 7.04 (m, 1H), 6.9 (m, 1H), propylcarbamoyl-methyl)- 6.19- 5.92 rotamers (5:1) [major amide 6.19 (m), minor (5.92 (m), 1H], 5.68 - 5.44 rotamers [major 5.65 (d, j = 6.5 Hz), minor (5,44 (d, J WO 2005/080373 PCT/IB2005/000167 94 Ex. No. Compound Name ESMS (M+1)Calc MW 'H NMR = 7.3 Hz), 1H], 3.32 (s, 3H), 3.15 (m, 2h), 1.37 (m, 2H), 0.74 (m, 3H) 55 (S)-2-[methyl-(4'- 653 652 (500 MHz, CD 3 0sD) 6 = 8.30 (s, trifluoromethyl-biphenyl- 1H), 8.03 (d, j = 8.8 Hz, 1H), 2-carbonyl)-amino]- 7.95 (m. 1H), 7.70 (d, j = 7.5 Hz, quinoline-6-carboxylic 1H), 7.54 - 7.37 (m, 11H), 7.20 acid (2-morpholin-4-yl-2- (bs s, 1H), 7.05 (br s, 1H), 6.79 ( oxo-1-phenyl-ethyl)- br s, 1H), 6.14 ( 3, 1H), 3.74 amide 3.70 (m, 2H), 3.63 - 3.55 (n, 4H), 3.40 (s, 3H), 3.32 (m, 4H), 3.15 (m, 1H) 56 (S)-2-[methyl-(4'- 637 636 (500 MHz, CD 3 OD) 8 = 8.91 (d, J trifluoromethyl-biphenyl- = 5.0 Hz, 1H), 8.31 (s, 3H), 8.04 2-carbonyl)-amino]- (dd, 8.8, 2.0 Hz, 1H), 7.96 (d, J = quinoline-6-carboxylic 8.6 Hz, 1H), 7.70 (d, J = 7.5 Hz, acid (2-oxo-1-phenyl-2- 1H), 7.54 - 7.36 (m, 12H), 7.20 pyrrolidin-1-yl-ethyl)- (br s, 1H), 7.05 (br s, 1H), 5.93 amide (m, 1H), 3.78 (m, 1H), 3.60 (m, 1H), 3.44 (m, 1H), 3.40 (s, 3H), 3.20 (m, 1H), 2.05- 1.80 (m, 4H) 57 (S)-2-[methyl-(4'- 680 679 (500 MHz, CDCI 3 ), 5 = 8.10 (s, rifluoromethyl-biphenyl- 1H), 7.92 (d, J = 8.0 Hz, 1H), 2-carbonyl)-amino]- 7.825 (d, J = 5 Hz, 1H), 7.7 (br s quinoline-6-carboxylic I 1H), 7.63 (d, J = 8.0 Hz, 1H), acid [(cyclohexylmethyl- 7.47 - 7.24 (m, 11H), 7.05 (br s, carbamoyl)-phenyl- 1H), 6.90 (br s, IH), 6.02 (t, j = methyl]-amide 6.0 Hz, 1H), 5.65 (d, J = 6.3 Hz, IH), 3.32 (s, 3H), 3.04 (m, 2H), 1.77 (m, 1H), 1.58 - 1.48 (m, 4H), 1.38 - 1.30 (m, 2H), 1.08 0.98 (m, 2H), 0.78 - 0.70 (m, 2H) 58 (S)-2-[methyl-(4'- 688 687 (500 MHz, CDCI 3 ) rotamers (2:1) rifluoromethyl-biphenyl- some signals doubled 8 = 8.09 2-carbonyl)-amino]- (s, 1H), 7.93 (m, 2h), 7.69 (br s, quinoline-6-carboxylic 1H), 7.65 (d, J = d, J = 7.5 Hz, acid [(benzyl-methyl- 1H), 7.49 - 7.19 (m, 14H), 7.11 carbamoyl)-phenyl- (m, 2H), 7.03 (br s, 1H), 6.90 (m, methyl]-amide 1H), 6.08 and 6.02 rotamers minor 6.07(d, J = 7.6 Hz), majo WO 2005/080373 PCT/IB2005/000167 95 Ex. No. Compound Name ESMS (M+1)Calc MW H NMR 6.03 (d, J = 8.0 Hz), 1H], 4.60 and 4.40 rotamers [major 4.6(m), minor 4.40 (m), 2H], 3.32 (s, 3H), 2.88 and 2.80 rotamers minor 2.88 (s), major 2.80 (s), 3H] Example 59 Preparation of (S)- 4'-Trifluoromethyi-biphenyl-2-carboxlic acid (6-{[(diethvylcarbamoyl phenyl-methyl)-aminol-methyl}-quinolin-2-yl)-amide 5 (a) Preparation of Intermediate 4'-Trifluoromethyl-biphenyl-2-carboxylic acid (6-formyl quinolin-2-vyl)-amide
3 1. 'Bu 2 AIH. . CF 3 0 THF,0OCGto RT N0 0 'CH 3 2 O N H N 2. Dess-Martin N N H periodinane, CH 2 CI0 2 H 10 F-la3 K To a solution of the ester (F-1a3,1.04 g, 2.74 mM) in THF (10 mL) at 0 0C was added dropwise a solution of DIBAL (1.0 M in THF, 8 mL). The mixture was allowed to 15 slowly warm to room temperature and was stirred at that temperature for 12 H. The reaction was quenched with aqueous NaHCO 3 and the mixture was extracted 3 times with EtOAc. The combined EtOAc fractions were washed with brine and dried (Na 2
4 ). The mixture was filtered and concentrated to provide the corresponding alcohol as a white solid (0.93 g). The alcohol was used without further purification. 20 The alcohol product (0.772 g, 1.83 mM) from the above reaction was dissolved in CH 2
2 and Dess-Martin periodinane (0.67 g, 1.83 mM). The mixture was stirred at room temperature for 12 h. The reaction was quenched with aqueous 1 N Na 2
2 0 3 (10 WO 2005/080373 PCT/IB2005/000167 96 mL) and aqueous NaHCO 3 (10 mL), and the resulting heterogeneous mixture was stirred vigorously for 15 min. The mixture was poured into a separatory funnel and the
2 fraction was removed. The aqueous fraction was extracted with CH 2
2 fractions were dried (MgSO4), filtered, and concentrated to provide 0.6 5 g of the corresponding aldehyde K. The product was used in the next step without further purification. 'H NMR (500 MHz, CDCI 3 ) 8 = 10.18 (s, 1H), 8.51 (d, J = 8.8 Hz, 1H), 8.32 (d, J = 8.8 Hz, 1H), 8.29 9d, J = 2.1 Hz, 1H), 8.13 (dd, J = 8.8, 2.1 Hz, 1H), 7.83 - 7.47 (overlapping m, 9H) 10 (b) Preparation of (S)- 4'-Trifluoromethyl-biphenyl-2-carboxylic acid (6 ([(diethylcarbamovl-phenyl-methyl)-amino]-methyl}-quinolin-2-vl)-amide Q r" H2NN,, CF, G Il-b F C F 1 H N N NCICH 2
2 C, 50'C I H N N 15 (K) To a solution of 4'-trifluoromethyl-biphenyl-2-carboxylic acid (6-formyl-quinolin-2 20 yl)-amide (K, 118 mg, 0.28 mM) in dichloroethane (2.5 mL) was added the amine hydrochloride salt of G-1 b (0.42 mM, 1.5 equiv) followed by triethylamine (58 uL, 0.42 mM). Sodium triacetoxy borohydride was added and the mixture was stirred at 50 oC for 16 h. After cooling to room temperature the mixture was applied directly to a small silica gel column. The product was eluted with 75% EtOAc in hexanes. HPLC retention time, 25 1.74 min; ESMS (M+1), 611; calc. Mw, 610 The compounds in Table 2 were prepared from appropriate starting materials using procedures analogous to those for the synthesis of the compound of Example 59.
WO 2005/080373 PCT/IB2005/000167 97 Table 2 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 60 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.60 659 658 [6-({[(benzyl-methyl-carbamoyl)-phenyl-methyl] amino}-methyl)-quinolin-2-yl]-amide 61 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.62 625 624 [6-({[(butyl-methyl-carbamoyl)-phenyl-methyl] amino}-methyl)-quinolin-2-yl]-amide 62 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.73 640 639 [6-({[(methyl-pentyl-carbamoyl)-phenyl-methyl] amino}-methyl)-quinolin-2-yl]-amide 63 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.73 626 625 (6-{[(pentylcarbamoyl-phenyl-methyl)-amino] methyl}-quinolin-2-yl)-amide 5 Example 64 Preparation of (S)-4'-Trifluoromethyl-biphenyl-2-carboxylic acid (6-{[(diethylcarbamovyl phenyl-methyl)-methyl-amino]-methyl}-quinolin-2-yl)-amide
3 1H2CO, HCO;H,
3 , 60 oC 0 N N N
3 0 HC~h 10 To a solution of the amine (0.1 mM) in CHCI 3 (2 mL) was added formic acid (0.15 mM) and aqueous formaldehyde (0.3 mM) and the mixture was heated to 600C for 12 h. After cooling to room temperature the mixture was diluted with ethyl acetate and washed 15 with aqueous NaHCO 3 and brine, dried (MgSO4), filtered and concentrated to provide the title compound. HPLC retention time, 2.46 min; ESMS (m+1), 625; calc. Mw, 624. The compounds in Table 3 were prepared from appropriate starting materials using procedures analogous to those for the synthesis of the compound of Example 55. 20 Table 3 WO 2005/080373 PCT/IB2005/000167 98 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 65 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.62 639 638 [6-({[(butyl-methyl-carbamoyl)-phenyl-methyl] methyl-amino}-methyl)-quinolin-2-yl]-amide 66 4'-trifluoromethyl-biphenyl-2-carboxylic acid [6- 2.79 673 672 ({[(benzyl-methyl-carbamoyl)phenylmethyl] methyl-amino}-methyl)-quinolin-2-yl]-amide 67 (S)-4'-trifluoromethyl-biphenyl-2-carboxylic acid 2.67 653 653 [6-({methyl-[(methyl-pentyl-carbamoyl)-phenyl methyl]-amino)-methyl)-quinolin-2-yll-amide 68 (S)-4'-ttifluoromethyl-biphenyl-2-carboxylic acid 2.80 639 638 (6-{[methyl-(pentylcarbamoyl-phenyl-methyl) amino]-methyl}-quinolin-2-yl)-amide Example 69 Preparation of (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 5 carboxylic acid (2-ethoxy-1-phenvl-ethyl)-amide (a) Preparation of Intermediate (S)-Phenyl-2-(trityl-amino)-ethanol Ph 3 CCI, Et 3 N, CH 2
2 3OH OH (Ph) 3 C. OH
2 N H (J) (J-1) 10 To a mixture of (S)-(+)-phenylglycinol (J, 1.0 g, 7.3 mM) and triphenylmethyl chloride (2.03 g, 7.29 mM) in dichloromethane (25 mL) was added triethylamine (0.74 g, 7.29 mM). The resulting mixture was stirred at room temperature for 12 h. The mixture was diluted with ethyl acetate (75 mL) and washed with water and brine. The ethyl acetate fraction was dried (MgSO 4 ), filtered and concentrated. The solid was used 15 without further purification. 1 H NMR (500 MHz, CDCI 3 ) 8 = 7.53 -7.51 (m, 5H), 7.28- 7.15 9m, 15H), 3.81 (s, 1H), 3.23 (m, 1H), 2.80 (m,1H) WO 2005/080373 PCT/IB2005/000167 99 (b) Preparation of Intermediate (S)-2-Ethoxy-1-phenyl-ethylamine hydrochloride / 1. NaH, RX, THF, (Ph)3C.N OH 2.4 M HCl/dioxanes HN O
2 HCI (J-1) (G-2a) (S)-Phenyl-2-(trityl-amino)-ethanol (J-1, 0.1 g, 0.26 mM), was dissolved in THF (3 mL). Sodium hydride (25 mg, 1.05 mM) was added and the mixture was stirred at room temperature for 15 minutes. The ethyl bromide (0.52 mM) was added and the mixture was heated to 50 oC for 4 h. The reaction was quenched with water and the 10 mixture was diluted with ethyl acetate. The ethyl acetate fraction was dried (MgSO 4 ) filtered and concentrated. The residue was purified by flash chromatography (silica gel), eluting with EtOAc/hexanes. The product from the above reaction was trpatedwith 4M HCI/dioxane (2 mL). After stirring for 30 minutes at room temperature the mixture was concentrated and 15 dried under high vacuum to provide the title compound.
WO 2005/080373 PCT/IB2005/000167 100 (c) Preparation of (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline-6 carboxylic acid (2-ethoxy-l-phenyl-ethyl)-amide
3 O O O IN This compound was prepared in a manner analogous to that described in 5 Example 1(b). HPLC retention time, 2.21 min; ESMS (m+1), 584; calc. Mw, 583 The compounds in Table 4 were prepared from appropriate starting materials using procedures analogous to those described in Example (lb). 10 Table 4 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 70 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.10 571 570 amino]-quinoline-6-carboxylic acid (2-methoxy 1-phenyl-ethyl)-amide 71 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.58 612 611 amino]-quinoline-6-carboxylic acid (2-butoxy-1 phenyl-ethyl)-amide 72 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.35 646 645 amino]-quinoline-6-carboxylic acid (2 benzyloxy-1 -phenyl-ethyl)-amide 73 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.41 714 715 amino]-quinoline-6-carboxylic acid [1-phenyl-2 (4-trifluoromethyl-benzyloxy)-ethyl]-amide 74 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.41 680 679 amino]-quinoline-6-carboxylic acid [2-(2-chloro benzyloxy)-1l-phenyl-ethyll-amide 75 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.38 660 659 amino]-quinoline-6-carboxylic acid [2-(2-methyl benzyloxy)-1l-phenyl-ethyl]-amide 76 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.45 680 681 amino]-quinoline-6-carboxylic acid [2-(3-chloro benzyloxy)-1l-phenyl-ethyl]-amide WO 2005/080373 PCT/IB2005/000167 101 77 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.40 660 659 amino]-quinoline-6-carboxylic acid [2-(3-methyl benzyloxy)-1l-phenyl-ethyll-amide 78 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.46 700 699 amino]-quinoline-6-carboxylic acid [1-phenyl-2-' S(3-trifluoromethyl-phenoxy)-ethyl]-amide Example 79 Preparation of (S)-2-1(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline-6 5 carboxylic acid (1-phenyl-2-propionylamino-ethyl)-amide (a) Preparation of Intermediate (S)-Methanesulfonic acid 2-tert-butoxycarbonylamino-2 phenvl-ethyl ester O 1. MsCI, Et 3 N, CH CI 2 O 9. OH O. N O's >ON OM 10 H H (J-2) (J-2a) Intermediate (J-2a) was prepared in accordance with the procedure described in 15 Giuseppe A. M. Giardina et al., J. Med. Chem. 1999, 42, 1053-1065. (b) Preparation of Intermediate (S)-2-Azido-1-phenyl-ethylamine hydrochloride O 1 NaN 2 , DMSO, 50 IC O N OMs 2. 4 M HCI/dioxanes HN HCI , H HC (J-2a) (G-3) 25 (S)-Methanesulfonic acid 2-tert-butoxycarbonylamino-2-phenyl-ethyl ester, (J 2a, 1.1 g, 3.48 mM) was dissolved in DMSO (25 mL) and treated with sodium azide WO 2005/080373 PCT/IB2005/000167 102 (0.45 g, 7.0 mM). The mixture was heated to 50 'C for 24 h. After cooling to room temperature, the mixture was poured into cold water (75 mL). The solid was collected by filtration and dried under high vacuum for 24 h. The solid was stirred in 4 N HCL/dioxane for 30 min and then concentrated. The solid was used without further 5 purification. (c) Preparation of Intermediate (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol quinoline-6-carboxvlic acid (2-azido-1-phenvil-ethyl) amide 10 CF, CF, N.0 0Z HCI H2 O O N N N N EDC,HOBT, e ON H 15 N NNN N fNn H Et 3 N, CH 2
2 H 20 (F-la2) (M) 2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid, (F-l a2, 0.78 g, 1.79 mM), (S)-2-azido-1-phenyl-ethylamine hydrochloride (0.36 g, 1.79 mM), EDC (0.41 g, 2.15 mM) and HOBT (10 mg, 0.075 mM), were dissolved in CH 2
2 (15 25 mL) and treated with triethylamine (0.75 mL, 5.4 mM). The mixture was stirred at room temperature for 16 h, then was diluted with EtOAc (75 mL) and washed with 0.5 N HCI (20 mL), aqueous NaHCO 3 (20 mL), and brine. The EtOAc fraction was dried (MgSO 4 ), filtered and concentrated. ESMS (m+1), 581; calc. Mw, 580. 30 WO 2005/080373 PCT/IB2005/000167 103 (d) Preparation of Intermediate (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol qcuinoline-6-carboxylic acid (2-amino-l-phenvl-ethyl)-amide 5
3 I PPhz3 O 09 N3a dioxanes, 50 CC, O1 N NH H H N then 1 N NaOH, * N N H RT H (M) (N) 10 (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-azido-1-phenyl-ethyl) amide (M, 0.722 mg, 1.22 mM) was dissolved in dioxane (10 mL). Triphenyl phosphine (0.35 g, 1.34 mM) was added and the mixture was stirred at 50 0C for 4 h. The mixture was removed from the heat and treated with an aqueous solution of NaOH (1N, 5 mL). The resulting mixture.was,stirred at room temperature for 15 2 h. The mixture was treated with 1N HCI (10 mL) and stirred for 12 h. The precipitate was collected by filtration and washed with ether. The solid was dried under high vacuum to provide (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 carboxylic acid (2-amino-1-phenyl-ethyl)-amide. ESMS (m+1), 555; calc. Mw, 554 20 (e) Preparation of (S)-2-[(4'-Trifluoromethyl-biphenvl-2-carbonyl)-aminol-quinoline- 6 carboxylic acid (1-ohenyl-2-propionylamino-ethyl)-amide
3 I CF, C O CHCH,C0,H, EDC, C0 H S oN H, HOBT, Et 3 N, CH 2
2 ON N N oN N N~ N H NI H 25 (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-amino-1-phenyl-ethyl)-amide (N, 30 mg, 0.05 mM), proprionic acid (0.075 mM), EDC (14 mg, 0.075 mM), HOBT (11 mg, 0.075 mM), and triethylamine (0.03 mL, 0.21 mM) WO 2005/080373 PCT/IB2005/000167 104 were taken up in CH 2 C1 2 (1 mL) and stirred at room temperature for 16 h. The mixture was concentrated and the residue was purified by flash chromatography (silica gel) eluting with EtOAc/hexanes. HPLC retention time, 2.87 min; ESMS (m+1), 611; calc. Mw, 610 5 The compounds in Table 5 were prepared from appropriate starting materials using procedures analogous to those for the synthesis of the compound of Example 79. Table 5 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 80 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2,70 597 596 amino]-quinoline-6-carboxylic acid (2 acetylamino-1 -phenyl-ethyl)-amide 81 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.87 611 610 amino]-quinoline-6-carboxylic acid (1-phenyl-2 propionylamino-ethyl)-amide 82 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.92 626 624 amino]-quinoline-6-carboxylic acid (2 butyrylamino-1l-phenyl-ethyl)-amide 83 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.03 639 638 amino]-quinoline-6-carboxylic acid (2 pentanoylamino-1-phenyl-ethyl)-amide 84 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.10 659 3.1 amino]-quinoline-6-carboxylic acid (2 benzoylamino-1 -phenyl-ethyl)-amide 85 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.91 634 633 amino]-quinoline-6-carboxylic acid (2 methanesulfonylamino-1-phenyl-ethyl)-amide 86 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.17 710 709 amino]-quinoline-6-carboxylic acid [1-phenyl-2 (toluene-4-sulfonylamino)-ethyl]-amide 87 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.08 662 661 amino]-quinoline-6-carboxylic acid [1-phenyl-2 (propane-1-sulfonylamino)-ethyl]-amide 88 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.17 696 695 amino]-quinoline-6-carboxylic acid (2 benzenesulfonylamino-1l-phenyl-ethyl)-amide 10 WO 2005/080373 PCT/IB2005/000167 105 89 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6- 3.17 676 675 carboxylic acid [2-(butane-1l-sulfonylamino)-1l-phenyl-ethyl] amide 90 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6- 2.99 648 647 carboxylic acid (2-ethanesulfonylamino-1l-phenyl-ethyl)-amide Example 91 5 Preparation of (S)-2-1(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline-6 carboxylic acid (2-benzvlamino-1-phenyl-ethylI)-amide F, PhCHO. NaHB(OAc), .0 0 O 1,2 dichlorethane N9 R N NH N (N) 10 (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic acid (2-amino-I-phenyl-ethyl)-amide (N, 30 mg, 005 mM) was dissolved in 1,2 dichloroethane. Benzaldehyde (0.15 mM) was added followed by sodium triacetoxy borohydride (110 mg, 0.51 mM). The mixture was stirred at room temperature for 16 h. 15 The solution was concentrated, and the residue was purified by flash chromatography (silica gel) eluting with EtOAc/hexanes. HPLC retention time, 2.75 min; ESMS, 645; calc. Mw, 644 The compounds in Table 6 were prepared from appropriate starting materials using procedures analogous to those for the synthesis of the compound of Example 91. 20 WO 2005/080373 PCT/IB2005/000167 106 Table 6 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 92 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.77 639 638 amino]-quinoline-6-carboxylic acid (2 dipropylamino-1 -phenyl-ethyl)-amide 93 (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.96 667 666 amino]-quinoline-6-carboxylic acid (2 dibutvlamino-1 -phenyl-ethyl)-amide Example 94 5 Preparation of (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline- 6 carboxylic acid [2-(benzvl-methyl-amino)-1-phenyl-ethyll-amide (a). Preparation of Intermediate (S)-N 2 -Benzyl-N 2 -methyl-1 -phenvl-ethane-1
2-diamine. H 1. LAH, THF, 70 OC BocHN N H 2.4 M HCl,'dioxanes H 2 N H O 2 HCI 10 (J-2bl) (G-4a) (S)-[(Benzyl-methyl-carbamoyl)-phenyl-methyl]-carbamic acid tert-butyl ester (J 261) may be prepared as described in Example 44(e) of PCT patent application publication No. WO 03/002533. 15 To a solution of (S)-[(benzyl-methyl-carbamoyl)-phenyl-methyl]-carbamic acid tert-butyl ester (J-2bl, 1.0 mM) in THF was added LAH (0.15 g, 4 mM) in portions. The mixuture was stirred at room temperature for 2 h. The mixture was slowly poured into an aqueous solution of NaOH (0.5 N, 50 mL). The resulting mixture was extracted 3 times with ethyl acetate (25 mL). The combined ethyl acetate fractions were washed 20 with brine, dried (MgSO4), filtered and concentrated. The product was treated with 4M HCI in dioxane (4 mL). After stirring for 30 minutes at room temperature the mixture was concentrated and the residue was dried under high vacuum for 16 h. The resulting solid was used without further purification.
WO 2005/080373 PCT/IB2005/000167 107 (b) Preparation of (S)-2-[(4'-Trifluoromethyl-biphenyl-2-carbonyl)-aminol-quinoline-6 carboxylic acid [2-(benzyl-methyl-amino)-1-phenyl-ethyl]-amide
3 0 EDC, HOBT O CH 3 Et 3 N, CH 2
2 I 0 OH 0N N v H NA H N N N. 1 H (F-la2) 2 HCI (G-4a) 5 The title compound was prepared in a manner analogous to that described in Example 1(b). HPLC retention time, 2.65 min; ESMS (m+1), 660; calc. Mw, 659 The compounds in Table 7 were prepared florm appropriate starting materials 10 using procedures analogous to those described in Example (lb). Table 7 Ex. Compound Name HPLC ESMS Calc. No. Retention time (m+1) Mol. Wgt. 95 (s)-2-[(4'-Trifluoromethyl-biphenyl-2- 2.56 625 624 carbonyl)-amino]-quinoline-6-carboxylic acid [2-(ethyl-propyl-amino)-1-phenyl-ethyl] amide 96 (s)-2-[(4'-Trifluoromethyl-biphenyl-2- 2.52 639 638 carbonyl)-amino]-quinoline-6-carboxylic acid [2-(butyl-ethyl-amino)-1 -phenyl-ethyl] amide 97 (s)-2-[(4'-Trifluoromethyl-biphenyl-2- 2.71 639 638 carbonyl)-amino]-quinoline-6-carboxylic acid [2-(methyl-pentyl-amino)-1l-phenyl ethyll-amide 15 WO 2005/080373 PCT/IB2005/000167 108 Example 98 Preparation of (R)-2-[(4'-Trifluoromethyl-biphenvl-2-carbonyI)-aminol-quinoline-6 carboxylic acid (1-p-tolyl-ethyl)-amide
3 CF, CH3
3 KO SOH H4NCH 3 0 N N CH, N r" - N N N N EDC, HOBT,'Pr, 2 EtN, H 5 \ CH C , This compound was prepared in a manner analogous to that described in Example (1 b). HPLC retention time, 3.23 min; ESMS (m+1), 554; calc Mw, 553 10 The compounds in Tables 8(a) and 8(b) were prepared from appropriate srarting materials using procedures analogous to those described in Example (lb) Table 8(a) Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 99 (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.10 570 569 amino]-quinoline-6-carboxylic acid [1-(4 methoxy-phenyl)-ethyl]-amide 100 (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.09 570 569 amino]-quinoline-6-carboxylic acid [1-(3 methoxy-phenyl)-ethyl]-amide 101 (R)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.78 554 553 amino]-quinoline-6-carboxylic acid (1-phenyl propyl)-amide 102 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.40 622 621 amino]-quinoline-6-carboxylic acid [1-(4 trifluoromethyl-phenyl)-propyl]-amide WO 2005/080373 PCT/IB2005/000167 109 Ex. Compound Name HPLC ESMS Calc. No. Retention (m+1) Mol. time Wgt. 103 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 2.33 622 621 amino]-quinoline-6-carboxylic acid [1-(3 trifluoromethyl-phenyl)-propyl]-amide 104 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.47 616 615 amino]-quinoline-6-carboxylic acid [1-(4-chloro phenyl)-pentyll-amide 105 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.23 596 595 amino]-quinoline-6-carboxylic acid (1-phenyl hexyl)-amide 106 2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)- 3.53 652 651 amino]-quinoline-6-carboxylic acid (1-phenyl decyl)-amrnide 107 2-[(4'-Isopropyl-biphenyl-2-carbonyl)-amino]- 527 quinoline-6-carboxylic acid (1-phenyl-propyl) amide Table 8(b) Ex. Compound Name ESMS 'H.NMR No. (m +1) 108 (S)-2-[(4'-trifluoromethyl- 603 1 H NMR (400 MHz, CD 3 CI): 06.35 (d, biphenyl-2-carbonyl)-amino]- 1H), 7.05-7.65 (c, 15H), 7.97 (m, 1H), quinoline-6-carboxylic acid 8.02 (d, 1H), 8.18 (d, 1H), 8.29 (d, 1H), (phenyl-pyridin-2-yl- 8.42 (c, 1H), 8.58 (d, 1H), 8.69 (d, 1H). methyl)-amide 109 2-[(4'-trifluoromethyl- 556 1H NMR (400 MHz, CD 3 CI): 0 0.88 (t, biphenyl-2-carbonyl)-amino]- 3H), 2.00 (m, 2H), 5.25 (m, 1H), 7.2-7.7 quinoline-6-carboxylic acid (c, 10H), 7.80 (d, 1H), 8.02 (m, 2H), 8.22 (1-pyridin-2-yl-propyl)-amide (d, 1H), 8.28 (d, 1H), 8.43 (c, 1H), 8.58 (d, 1H), 8.71 (s, 1H). 110 2-[(4'-trifluoromethyl- 541 1H NMR (400 MHz, CD 3 CI): 0 1.58 (d, biphenyl-2-carbonyl)-amino]- 3H), 5.38 (c, 1H), 7.2-7.7 (c, 10OH), 7.94 quinoline-6-carboxylic acid (d, 2H), 8.02 (m, 1H). 8.21 (d, 1H), 8.28 (1-pyridin-2-yl-ethyl)-amide (d, 1H), 8.4 (c, 1H), 8.56 (d, 1H), 8.72 (c, 1H). 111 (S)-2-[(4'-isopropyl-biphenyl- 578 1H NMR (400 MHz, CDsCI): 0 1.16 (d, 2-carbonyl)-amino]- 6H), 2.84 (m, 1H), 6.36 (d, 1H), 7.2-7.47 quinoline-6-carboxylic acid (c, 11H), 7.53 (m, 1H), 7.66 (m, 2H), 7.79 (phenyl-pyridin-2-yl-methyl)- (m, 1H), 8.06 (m, 1H), 8.15 (s, 1H), 8.22 amnide (d, 1H), 8.31 (d, 1H), 8.48 (d, 1H), 8.63 (d, 2H).
WO 2005/080373 PCT/IB2005/000167 110 Ex. Compound Name ESMS 1 H NMR No. (m +1) 112 (S)-2-[(4'-tert-butyl-biphenyl- 592 1H NMR (400 MHz, CD3CI): d 1.23 (d, 2-carbonyl)-amino]- 9H), 2.84 (m, 1H), 6.36 (d, 1H), 7.2-7.47 quinoline-6-carboxylic acid (c, 11H), 7.53 (m, 1H), 7.66 (m, 2H), 7.79 (phenyl-pyridin-2-yl-methyl)- (m, 1H), 8.06 (m, 1H), 8.15 (s, 1H), 8.22 amide (d, 1H), 8.31 (d, 1H), 8.48 (d, 1H), 8.63 (d, 2H) Example 113 5 (S)-Phenv-({2-[(4'-trifluoromethyl-bipheny-2-carbonyvi)-aminol-quinoline-6-carbonyl} amino)-acetic acid methyl ester
3 _0 co O OH H 2 N CO 2 CH3 N CCH N N EDC, HOBT, 'PrEtN, H
HCHCI
2 CH'C12 10 This compound was prepared in a manner analogous to that described in Example (ib). The intermediate phenylglycine methyl ester is commercially available. HPLC retention time, 2.86 min; ESMS (m+1), 584; calc. Mw, 583 Example 114 15 (S)-2-[(4'-tert-Butylbiphenyl-2-carbonvl)aminoquinoline-6-carboxylic acid {[(4 fluorobenzyl)methylcarbamoyl]phenylmethyllamide a) Preparation of Intermediate N-(4-Fluorobenzyl)formamide 20 j N NH 2 '"NHCHO F
WO 2005/080373 PCT/IB2005/000167 111 A solution of 4-fluorobenzylamine (20 g, 160, mmol) in ethyl formate was heated at reflux for 4 h. After cooling, the solvent was evaporated to afford a yellow solid. Trituration with cold EtOAc afforded the title compound as a white solid (17.46 g, 71%). 1 H NMR (CDCI 3 ): 5 8.24 (s, 1 H), 7.25 (m, 2 H), 7.00 (m, 2 H), 5.91 (br s, 1 H), 4.42 (d, 2 5 H). b) Preparation of Intermediate (4-Fluorobenzyl)methylamine N 'NHCHO ' NHMe F j F 10 A solution of N-(4-fluorobenzyl)formamide (17.46 g, 114 mol) in THE (100 mL) was cooled in an ice bath (00 C). Lithium alumininum hydride (7.2 g, 190 mmol) was then added carefully in portions with stirring. The cooling bath was removed and the reaction mixture was stirred at room temperature for about 64 h. The reaction was 15 diluted with diethyl ether and again cooled in an ice bath. It was then quenched by careful dropwise addition of aq. 1N NaOH solution followed by saturated aq. Na 2
4 solution. The resulting mixture was filtered, washing the collected solids with diethyl ether. The filtrate was concentrated to afford the title compound as a clear oil (15.2 g, 96%). 1 H NMR (CDCI 3 ): 8 7.28 (m, 2 H), 7.02 (t, 2 H), 3.73 (s, 2 H), 2.46 (s, 3 H). 20 c) Preparation Intermediate of (S)- f[(4 Fluorobenzyl)methylcarbamoIlphenvlmethyl}carbamic acid tert-butyl ester HF F NHMe O N 0H 0LO'I N-C 02H O 'NHMe H 00 FL, ,, I 25 A solution of N-Boc-L-phenylglycine (H, 17.2 g, 68.5 mmol) and (4 fluorobenzyl)methylamine (10.47 g, 75.3 mmol) in CH2CI 2 (550 mL) was cooled to 0 0
WO 2005/080373 PCT/IB2005/000167 112 Disopropylethylamine (35.8 mL, 205 mmol) and PyBrOP (38.3 g, 82.1 mmol) were then added sequentially. The cooling bath was removed and the reaction mixture was stirred at room temperature overnight. The solvent was evaporated and the title compound (24.5 g, 96%) was isolated by chromatography on silica gel eluting with a gradient of 5 40% to 60% ethyl acetate in hexane. 1 H NMR (selected signals, CDCl 3 ): 8 6.02 (d, 0.3 H), 5.56 (d, 0.7 H), 2.83 (s, 0.9 H), 2.78 (s, 2.1 H), 1.40 (s, 6.3 H, 1.39 (s, 2.7 H). d) Preparation of Intermediate (S)-2-Amino-N-(4-fluorobenzvl)-N-methyl-2 phenylacetamide hydrochloride 0 1 1F F O NN FN 10 H o A solution of HCI in dioxane (4M, 100 mL) was cooled in an ice bath and added to of (S)- {[(4-fluorobenzyl)methylcarbamoyl]phenylmethyl)carbamic acid tert-butyl ester (9.49 g, 25.5 mmol). The reaction mixture was then stirred for 5h, allowing the 15 temperature to rise to room temperature over this period. Volatiles, including HCI and solvent, were evaporated to afford the title compound as a white solid (7.9 g, 100%). 1 H NMR (selected signals, CDC3): 8 8.94 (br s, 3 H), 5.94 (br s, 0.3 H), 5.82 (br s, 0.7 H), 2.66 (s, 0.9 H), 2.64 (s, 2.1 H). e) Preparation of (S)-2-[(4'-tert-Butylbiphenvl-2-carbonyl)amino]quinoline-6 20 carboxylic acid {[(4-fluorobenzyl)methylcarbamollphenylmethyl}amide Cr-H 3 N*
'N0 0N... F oC 2 H ,N ' o , N I- ' o c o1N H N o H H WO 2005/080373 PCT/IB2005/000167 113 To a solution of 2-[(4'-tert-butylbiphenyl-2-carbonyl)amino]-quinoline-6-carboxylic acid (11.0 g, 26 mmol) and_(S)-2-amino-N-(4-fluorobenzyl)-N-methyl-2-phenylacetamide hydrochloride (12.04 g, 39 mmol) in CH 2
2 (50 mL) at room temperature was added triethylamine (5.4 mL, 39 mmol) and N,N-dimethylaminopropylethylcarbodiimide 5 hydrochloride (7.48 g, 39 mmol). The reaction mixture was stirred at room temperature overnight. Volatiles, including solvent, were evaporated under vacuum. The title compound, a white amorphous solid (14.4 g, 82%), was isolated by chromatography on silica gel eluting with a gradient of 40% to 60% ethyl acetate in hexane. 'H NMR (selected signals, CDCI 3 ): 8 6.15 (d, 0.3 H), 6.09 (d, 0.7 H), 2.91 (s, 0.9 H), 2.86 (s, 2.1 10 H), 1.23 (s, 9 H). MS m/z 679 (M+1). The compounds in Table 9(a) were prepared using procedures analogous to those described above for the synthesis of the compound of Example 114 using appropriately substituted starting materials/intermediates which are available 15 commercially, prepared in a manner analogous to the methods described above for other intermediates, or prepared using procedures known to those of average skill in the art. Table 9(a) Ex. Compound Name Select 1 H NMR ESMS No. signals (m+l) (CDCl 3 ) 115 (R)-2-[(4'-Benzyloxybiphenyl-2- 5.01 (s, 2H); 578 carbonyl)amino]quinoline-6-carboxylic acid (1-phenyl- 5.4 (m, 1 H); ethyl)amide 1.65 (d, 3 H) 116 (S)-2-[(4'-Benzyloxybiphenyl-2- 5.0 (s, 2 H) 641 carbonyl)amino]quinoline-6-carboxylic acid (phenyl pyridin-2-ylmethyl)amide 117 (S)-2-[(4'-Benzyloxybiphenyl-2- 5.01 (s, 2 H), 649 carbonyl)amino]quinoline-6-carboxylic acid (isopropyl- 4.13 (m, 1 H); carbamoylphenylmethyl)amide 1.18 (d, 3H), 1.07 (d, 3 H) 118 S)-3-[2-({2-[(4'-Benzyloxybiphenyl-2- 5.06 (s, 2 H), 769 carbonyl)amino]quinoline-6-carbonyl)amino)- 2 -phenyl- 5.00 (m, 2 H); acetylamino]propionic acid benzyl ester 3.55 (m, 1 H); 3.50 (m, 1 H); 2.57 (m, 2 H) WO 2005/080373 PCT/IB2005/000167 114 Ex. Compound Name Select 'H NMR ESMS No. signals (m+1)
(CDCI
3 119 (R)-2-[(4'-Isopropylbiphenyl-2- 2.84 (m, 1 H); 514 carbonyl)amino]quinoline-6-carboxylic acid (1-phenyl- 1.62 (d, 3 H); ethyl)amide 1.14 (d, 6 H) 120 (S)-2-[(4'-Isopropylbiphenyl-2- 2.84 (m, 1H); 577 carbonyl)amino]quinoline-6-carboxylic acid (phenyl- 1.16 (d, 6 H) pyridin-2-yl-methyl)amide 121 (S)-2-[(4'-Isopropylbiphenyl-2- 543 carbonyl)amino]quinoline-6-carboxylic acid (carbamoylphenylmethyl)amide 122 (S)-2-[(4'-Isopropylbiphenyl-2- 5.03 (s, 2 H); 705 carbonyl)amino]quinoline-6-carboxylic acid (isopropyl- 2.83 (m, 1 H); carbamoylphenylmethyl)amide 1.13 (d, 6 H) 123 (S)-2-[(4'-Isopropylbiphenyl-2- 5.51 (d, 1 H); 599 carbonyl)amino]quinoline-6-carboxylic acid (tert-butyl- 2.84 (m, 1 H); carbamoylphenylmethyl)amide 1.31 (s, 9 H); 1.15 (d, 6 H) 124 (S)-2-[(4'-Isopropylbiphenyl-2- 6.13 (d, 0.3 H); 647 carbonyl)amino]quinoline-6-carboxylic acid 6.09 (d, 0.7 H); [(benzylmethylcarbamoyl)phenylmethyl]amide 2.89 (s, 0.9 H); 2.85 (s, 2.1 H); 1.13 (d, 6 H) 125 (S)-2-[(4'-Isopropylbiphenyl-2- 6.15 (d, 0.3 H); carbonyl)amino]quinoline-6-carboxylic acid ([(4-fluoro- 6.10 (d, 0.7 H); benzyl)methylcarbamoyl]phenylmethyl}-amide 2.93 (s, 0.9 H); 2.88 (s, 2.1 H); 1.18 (d, 6 H 126 3-[2-({2-[(4'-Isopropylbiphenyl-2- 5.55 (d, 1H); 705 carbonyl)amino]quinoline-6-carbonyl}amino)-2-phenyl- 5.04 (s, 2 acetylamino]propionic acid benzyl ester H);1.13 (d, 6 H) 127 (S)-2-[(4'-Methylbiphenyl-2-carbonyl)-amino]quinoline- 6.36 (d, 1 H); 549 6-carboxylic acid (phenylpyridin-2-ylmethyl)amide 2.31 (s, 3 H) 128 (S)-2-[(4'-Methylbiphenyl-2-carbonyl)-amino]quinoline- 6.13 (d, 0.3 H); 637 6-carboxylic acid {[(4-fluorobenzyl)- 6.08 (d, 0.7 H); methylcarbamoyl]phenylmethyl}amide 2.90 (s, 0.9 H); 2.86 (s, 2.1 H); 2.30 (s, 3 H) 129 (S).2-[(4'-Methylbiphenyl-2-carbonyl)-amino]quinoline- 6.00 (d, 1 H); 623 6-carboxylic acid [(4-fluorobenzyl- 4.24 (m, 2 H); carbamoyl)phenylmethyl]amide 2.24 s, 3 H 130 (S)-2-[(4'-Methylbiphenyl-2-carbonyl)-amino]quinoline- 6.12 (d, 1 H); 620 6-carboxylic acid [(methylpyridin-2-yl- 2.24 (s, 3H); methylcarbamoyl)phenylmethyl]amide 2.98 (s, 2.1 H); 2.94 (s, 0.9 H) WO 2005/080373 PCT/IB2005/000167 115 Ex. Compound Name Select 1 H NMR ESMS No. signals (m+1)
3 ) 131 (S)-2-[(4'-Isopropylbiphenyl-2- 5.65 (d, 1 H); 651 carbonyl)amino]quinoline-6-carboxylic acid [(4- 4.42 (s, H); fluorobenzylcarbamoyl)phenylmethyl]amide 2.85 (m, 1 H); 1.15 (d, 6 H) 132 (S)-2-[(4'-Isopropylbiphenyl-2- 6.12 (m, 1 H); 648 carbonyl)amino]quinoline-6-carboxylic, acid [(methyl- 3.00 (s, 3 H); pyridin-2-ylmethylcarbamoyl)phenylmethyl]amide 2.83 (m, 1 H); 1.14 (d, 6 H) 133 (S)-2-[(4'-Isopropylbiphenyl-2- 5.96 (d, 1 H); 634 carbonyl)amino]quinoline-6-carboxylic acid {phenyl- 4.32 (m, 2 H); [(pyridin-2-ylmethyl)carbamoyl]methyl}amide 2.72 (m, 1 H); 1.03 (m, 6 H) 134 (S)-2-[(4'-tert-Butylbiphenyl-2- 6.15 (d, 0.3 H); 679 carbonyl)amino]quinoline-6-carboxylic acid ([(4-fluoro- 6.09 (d, 0.7 H); benzyl)methylcarbamoyl]phenylmethyl}amide 2.91 (s, 0.9 H); 2.86 (s, 2.1 H); 1.23 (s, 9 H) 135 (S)-2-[(4'-tert-Butylbiphenyl-2- 5.65 (d, 1 H); 665 carbonyl)amino]quinoline-6-carboxylic acid [(4-fluoro- 4.43 (m, 2 H); benzylcarbamoyl)phenylmrethyl]amnide' 1.23 (s, 9 H 136 (S)-2-[(4'-tert-Butylbiphenyl-2- 6.11 (m, 1 H); 662 carbonyl)amino]quinoline-6-carboxylic acid 3.01 (0.9 H); [(methylpyridin-2-ylmethylcarbamoyl)phenylmethyl]- 2.99 (2.1 H); amide 1.21 (s, 9 H) 137 (S)-2-[(4'-tert-Butylbiphenyl-2- 5.93 (d, 1 H); 648 carbonyl)amino]quinoline-6-carboxylic acid {phenyl- 4.36 (m, 2 H); [(pyridin-2-ylmethyl)carbamoyl]methyl}amide 1.12 (s, 9 H) 138 (R)-2-[(4'-tert-Butylbiphenyl-2- 6.40 (d, 1 H); 528 carbonyl)amino]quinoline-6-carboxylic acid (1-phenyl- 5.38 (m, 1 H); ethyl)amide 1.64 (d, H); 1.23 (s, 9 H) 139 (S)-2-[(4'-tert-Butylbiphenyl-2- 6.35 (d, 1 H); 591 carbonyl)amino]quinoline-6-carboxylic acid (phenyl- 1.23 (s, 9 H) pyridin-2-ylmethyl)amide 140 (S)-2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 6.13 (d, 0.3 H); 651 carboxylic acid {[(4-fluorobenzyl)- 6.08 (d, 0.7 H); methylcarbamoyl]phenylmethyl}amide 2.88 (s, 0.9 H); 2.85 (s, 2.1 H); 2.58 (q, 2 H); 1.14 (t, 3 H) WO 2005/080373 PCT/IB2005/000167 116 141 (S)-2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 5.74 (d, 1 H); 637 carboxylic acid [(4-fluorobenzyl- 4.39 (d, 2 H); carbamoyl)phenylmethyl]amide 2.58 (q, 2 H); 1.14 (t, 3 H) 142 (S)-2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 6.11 (m, 1 H); 634 carboxylic acid [(methylpyridin-2-yl- 3.03 (s, 0.9 H); methylcarbamoyl)phenylmethyllamide 3.00 (s, 2.1 H); 2.59 (q, 2 H); 1.15 (t, 3 H) 143 (S)-2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 5.76 (d, 1 H); 620 carboxylic acid {phenyl[(pyridin-2- 4.63 (d, 1 H); ylmethylcarbamoyl]methyl}amide 4.47 (d, 1 H); 2.58 (q, 2 H); 1.14 (t, 3 H) 144 (S)-2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 6.35 (d, 1 H); 563 carboxylic acid (phenylpyridin-2-yl-methyl)amide 2.60 (q, 2 H); 1.15 (t, 3 H) 145 2-[(4'-Ethylbiphenyl-2-carbonyl)-amino]quinoline-6- 6.48 (d, 1 H); 562 carboxylic acid benzhydrylamide 2.60 (q, 2 H); 1.15 (t, 3 H) 146 (S)-2-[(4'-Propylbiphenyl-2-carbonyl)-amino]quinoline- 6.13 (d, 0.3 H); 665 6-carboxylic acid {[(4-fluorobenzyl)- 6.08 (d, 0.7 H); methylcarbamoyl]phenylmethyl}amide 2.90 (s, 0.9 H); 2.85 (s, 2.1 H); 2.52 (t, 2 H); 1.52 (m, 2 H); 0.76 (t, 3 H) 147 (S)-2-[(4'-Propylbiphenyl-2-carbonyl)-amino]quinoline- 5.92 (d, 1 H); 651 6-carboxylic acid [(4-fluorobenzyl- 4.30 (m, 2 H); carbamoyl)phenylmethyl]amide 2.50 (t, 2 H); 1.52 (m, 2 H); 0.77 (t, 3 H) 148 (S)-2-[(4'-Propylbiphenyl-2-carbonyl)-amino]quinoline- 6.12 (m, 1 H); 648 6-carboxylic acid [(methylpyridin-2-yl- 3.03 (s, 0.9 H); methylcarbamoyl)phenylmethyl]amide 3.00 (s, 2.1 H); 2.53 (t, 2 H); 1.53 (m, 2 H); 0.76 (t, 3 H) 149 (S)-2-[(4'-Propylbiphenyl-2-carbonyl)-amino]quinoline- 6.36 (d, 1 H); 577 6-carboxylic acid (phenylpyridin-2-yl-methyl)amide 2.54 (t, 2 H); 1.53 (m, 2 H); 0.78 (t, 3 H) 150 (S)-2-[(4'-Methoxybiphenyl-2-carbonyl)- 6.14 (d, 0.3 H); 653 amino]quinoline-6-carboxylic acid {[(4-fluorobenzyl)- 6.08 (d, 0.7 H); methylcarbamoyl]phenylmethyl}amide 3.74 (s, 3 H); WO 2005/080373 PCT/IB2005/000167 117 2.90 (s, 0.9 H); 2.86 (s, 2.1 H) 151 (S)-2-[(4'-Methoxybiphenyl-2-carbonyl)- 5.70 (d, 1 H); 639 amino]quinoline-6-carboxylic acid [(4-fluorobenzyl- 4.41 (d, 2 H); carbamoyl)phenylmethyl]amide 3.74 (s, 3 H) 152 (S)-2-[(4'-Methoxybiphenyl-2-carbonyl)- 6.12 (m, 1 H); 636 amino]quinoline-6-carboxylic acid [(methylpyridin-2-yl- 3.75 (s, 3 H); methylcarbamoyl)phenylmethyl]amide 3.03 (s, 0.9 H); 3.00 (s, 2.1 H) 153 (S)-2-[(4'-Methoxybiphenyl-2-carbonyl)- 6.35 (d, 1 H); 565 amino]quinoline-6-carboxylic acid (phenylpyridin-2-yl- 3.75 (s, 3 H) methyl)amide 154 (S)-2-[(4'-Benzyloxybiphenyl-2- 5.67 (d, 1 H); 715 carbonyl)amino]quinoline-6-carboxylic acid [(4-fluoro- 5.00 (s, 2 H); benzylcarbamoyl)phenylmethyl]amide 4.43 (m, 2 H) 155 (S)-2-[(4'-Ethoxybiphenyl-2-carbonyl)-amino]quinoline- 6.14 (d, 0.3 H); 667 6-carboxylic acid {[(4-fluorobenzyl)- 6.08 (d, 0.7 H); methylcarbamoyl]phenylmethyl}amide 3.83 (m, 2 H); 2.81 (s, 2.1 H); 2.72 (0.9 H); 1.22 (t, 3 H) 156 S)-2-[(4'-Ethoxybiphenyl-2-carbonyl)-amino]quinoline- 5.65 (d, 1 H); 653 6-carboxylic acid [(4-fluorobenzyl- 4.44 (m, 2 H); carbamoyl)phenylmethyl]amide 3.98 (q, 2 H); mot e1.34 (t, 3 H) 157 (S)-2-[(4'-Ethoxybiphenyl-2-carbonyl)-amino]quinoline- 6.12 (m, 1 H); 650 6-carboxylic acid [(methylpyridin-2-yl- 3.93 (m, 2 H); methylcarbamoyl)phenylmethyl]amide 2.99 (s, 2.1 H); 2.97 (s, 0.9 H); 1.29 (t, 3 H) 158 (S)-2-[(4'-Ethoxybiphenyl-2-carbonyl)-amino]quinoline- 6.36 (d, 1 H); 579 6-carboxylic acid (phenylpyridin-2-yl-methyl)amide 3.94 (q, 2 H); 1.32 (t, 3 H) 159 2-[(4'-Ethoxybiphenyl-2-carbonyl)-amino]quinoline-6- 6.49 (d, 1 H); 578 carboxylic acid benzhydrylamide 3.97 (q, 2 H); 1.34 (t, 3 H) 160 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.14 (d, 0.3); 681 carbonyl)amino]quinoline-6-carboxylic acid {[(4-fluoro- 6.08 (0.7 H); benzyl)methylcarbamoyl]phenylmethyl}amide 4.48 (m, 1 H); 2.83 (s, 2.1 H); 2.77 (s, 0.9 H); 1.23 (d, 6 H) 161 (S)-2-[(4'-Isopropoxybiphenyl-2- 5.84 (d, 1 H); 667 carbonyl)amino]quinoline-6-carboxylic acid [(4-fluoro- 4.47 (m, 1 H); benzylcarbamoyl)phenylmethyl]amide 4.35 (m, 2 H); 1.24 (d, 6 H) WO 2005/080373 PCT/IB2005/000167 118 162 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.13 (m, 1 H); 664 carbonyl)amino]quinoline-6-carboxylic acid [(methyl- 4.40 (m, 1 H) pyridin-2-ylmethylcarbamoyl)phenylmethyllamide 163 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.12 (m, 1 H); 731 carbonyl)amino]quinoline-6-carboxylic acid {[methyl(4- 4.48 (m, 1 H); trifluoromethylbenzyl)carbamoyl]phenylmethyl}amide 2.94 (s, 0.9 H); 2.91 (s, 2.1 H); 1.22 (d, 6 H) 164 (S)-2-[(4'-Isopropoxybiphenyl-2- 5.84 (d, 1 H); 717 carbonyl)amino]quinoline-6-carboxylic acid [phenyl(4- 1.23 (d, 6 H) trifluoromethylbenzylcarbamoyl)methyllamide 165 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.09 (m, 1 H); 699 carbonyl)amino]quinoline-6-carboxylic acid {[(5-chloro- 4.71 (m, 2 H); pyridin-2-ylmethyl)methylcarbamoyl]-phenylmethyl}- 4.48 (m, 1 H); amide 3.01 (s, 0.9 H); 3.00 (s, 2.1 H); 1.24 (m, 6 H) 166 (S)-2-[(4'-Isopropoxybiphenyl-2- 5.75 (d, 1 H); 685 carbonyl)amino]quinoline-6-carboxylic acid ([(5-chloro- 1.23 (d, 6 H) pyridin-2-ylmethyl)carbamoyl]phenylmethyl} amide 167 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.13 (d, 0.7 H); 732 carbonyl)amino]quinoline-6-carboxylic acid {[methyl(5- 6.06 (0.3 H); trifluoromethylpyridin-2-ylmethyl)carbamoyl]phenyl- 4.46 '(m, 1 H); methyl}amide 3.04 (s, 3 H); 1.22 (d, 6 H) 168 (S)-2-[(4'-Isopropoxybiphenyl-2- 5.77 (d, 1 H); 718 carbonyl)amino]quinoline-6-carboxylic acid {phenyl[(5- 4.72 (dd, 1 H); trifluoromethylpyridin-2-ylmethyl)carbamoyl]methyl}- 4.60 (dd, 1 H); amide 4.48 (m, 1 H); 1.23 (d, 6 H) 169 (S)-2-[(4'-Isopropoxybiphenyl-2- 6.35 (d, 1 H); 593 carbonyl)amino]quinoline-6-carboxylic acid (phenyl- 4.45 (m, 1 H); pyridin-2-ylmethyl)amide 1.23 (d, 6 H) 170 2-[(4'-Isopropoxybiphenyl-2-carbonyl-amino]quinoline- 6.50 (d, 1 H); 592 6-carboxylic acid benzhydrylamide 4.49 (m, 1 H); 1.23 (d, 6 H) 171 (S)-2-[(4'-tert-Butoxybiphenyl-2- 6.13 (d, 0.3 H); 695 carbonyl)aminoquinoline-6-carboxylic acid {[(4-fluoro- 6.09 (d, 0.7 H); benzyl)methylcarbamoyl]phenylmethyl}amide 2.90 (s, 0.9 H); 2.86 (s, 2.1 H); 1.13 (s, 9 H) 172 (S)-2-[(4'-tert-Butoxybiphenyl-2- 5.88 (d, 1 H); 681 carbonyl)amino]quinoline-6-carboxylic acid [(4-fluoro- 4.36 (m, 2 H); benzylcarbamoyl)phenylmethyl]amide 1.14 (s, 9 H) 173 (S)-2-[(4'-tert-Butoxybiphenyl-2- 6.11 (d, 1 H); 678 carbonyl)amino]quinoline-6-carboxylic acid [(methyl- 3.04 (s, 0.9 H); WO 2005/080373 PCT/IB2005/000167 119 pyridin-2-ylmethylcarbamoyl)phenylmethyl]amide 2.99 (s, 2:1 H); 1.11 (s, 9 H) 174 (S)-2-[(4'-tert-Butoxy-biphenyl-2- 6.37 (d, 1 H); 607 carbonyl)arnino]quinoline-6-carboxylic acid (phenyl- 1.14 (s, 9 H) pyridin-2-yl-methyl)amide 175 2-[(4'-tert-Butoxybiphenyl-2-carbonyl)-amino]quinoline- 6.50 (d, 1 H); 606 6-carboxylic acid benzhydrylamide 1.15 (s, 9 H) 176 (S)-2-[(4'-Methylsulfanylbiphenyl-2- 6.14 (d, 0.3 H); 669 carbonyl)amino]quinoline-6-carboxylic, acid {[(4-fluoro- 6.09 (d, 0.7 H); benzyl)methylcarbamoyl]phenylmethyl}amide 2.91 (s, 0.9 H); 2.86 (s, 2.1 H); 2.41 (s, 3 H) 177 (S)-2-[(4'-tert-Butylbiphenyl-2- 5.58 (d, 1 H); 571 carbonyl)amino]quinoline-6-carboxylic acid (methyl- 2.86 (d, 3 H); carbamoylphenylmethyl)amide 1.23 s, 9 H 178 (R)-2-(2-Cyclopentylbenzoylamino)-quinoline-6- 6.41 (d, 1 H); 464 carboxylic acid (1-phenylethyl)amide 5.35 (m, 1 H); 3.41 (m, 1 H); 1.61 (d, 3 H) 179 (S)-2-(2-Cyclopentylbenzoylamino)-quinoline-6-
(CD
3 OD) 8.43 493 carboxylic acid (carbamoylphenylmethyl)-amide (m, 2 H); 5.71 (s, 1 H); 3.38 (m, 1 H); 180 (S)-2-(2-Cyclopentylbenzoylamino)-quinoline-6- 5.65 (d, 1 H); 535 carboxylic acid (isopropylcarbamoyl- 5.59 (d, 1 H); phenylmethyl)amide 4.00 (m, 1 H); 3.38 (m, 1 H); 1.07 (d, 3 H); 0.98 (d, 3 H) 181 (R)-2-(2-Cyclohexylbenzoylamino)-quinoline-6- 6.48 (d, 1 H); 478 carboxylic acid (1-phenylethyl)amide 5.40 (m, 1 H); 3.04 (m, 1 H); 1.65 (d, 3 H) 182 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline- 6 - 5.75 (d, 1 H); 507 carboxylic acid (carbamoylphenylmethyl)-amide 3.01 (m, 1 H) 183 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline- 6 - 5.61 (d, 1 H); 549 carboxylic acid (isopropylcarbamoyl- 4.15 (m, 1 H); phenylmethyl)amide 3.07 (m, 1 H); 1.20 (d, 3 H); 1.09 (d, 3 H) 184 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline- 6 - 5.69 (d, 1 H); 563 carboxylic acid (tert-butylcarbamoyl- 3.07 (m, 1 H); phenylmethyl)amide 1.31 (s, 9 H) 185 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline-6- 6.10 (d, 0.5 H); 549 carboxylic acid [(ethylmethylcarbamoyl)- 6.06 (d, 0.5 H); phenylmethyl]amide 3.06 (m, 1 H); WO 2005/080373 PCT/IB2005/000167 120 3.01 (s, 1.5 H); 2.93 (s, 1.5 H); 1.15 (t, 1.5 H); 0.97 (t, 1.5) 186 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline-6- 6.18 (d, 0.3 H); 611 carboxylic acid [(benzylmethylcarbamoyl)- 6.14 (d, 0.7 H); phenylmethyl]amide 3.07 (m, 1 H); 2.95 (s, 0.9 H); 2.89 (s, 2.1 H) 187 3-(2-{[2-(2-Cyclohexylbenzoylamino)-quinoline-6- 5.56 (d, 1 H); 669 carbonyl]amino}-2-phenylacetylamino)-propionic acid 5.05 (s, 2 H); benzyl ester 3.55 (m, 2 H); 3.04 (m, 1 H); 2.56 (m, 2 H) 188 (S)-2-(2-Cyclohexylbenzoylamino)-quinoline-6- 6.40 (d, 1 H); 541 carboxylic acid (phenylpyridin-2-yl-methyl)amide 3.08 (m, 1 H) 189 (S)-2-[(4'-tert-Butyl-6-methoxy-biphenyl-2-carbonyl)- 6.36 (d, 2 H); 622 amino]-quinoline-6-carboxylic acid (phenyl-pyridin-2-yl- 3.81 (s, 3 H); s, methyl)-amide 9 H) 190 (S)-2-[(4'-tert-Butyl-6-methoxy-biphenyl-2-carbonyl)- 3.81 (s, 3 H); 710 amino]-quinoline-6-carboxylic acid {[(4-fluoro-benzyl)- 2.90 (s, 0.9H); methyl-carbamoyl]-phenyl-methyl}-amide 2.86 (s, 1.9 H); 1.15 (s,9H) 191 (S)-2-[(4'-tert-Butyl-6-methoxy-biphenyl-2-carbonyl)- 3.40 (s, 3H); 692 amino]-quinoline-6-carboxylic acid [(methyl-pyridin-2- 3.03 (s, 0.9 ylmethyl-carbamoyl)-phenyl-methyll-amide H);1.15 (s, 9 H) 192 (S)-2-[(4'-tert-Butyl-6-methoxy-biphenyl-2-carbonyl)- 4.47 (m, 2 H), 678 amino]-quinoline-6-carboxylic acid {phenyl-[(pyridin-2- 3.83 (s, 3 H); ylmethyl)-carbamoyl]-methyl}-amide 1.16 (s, 9 H) 193 'PF-02589043: (S)- 2-[(4'-tert-Butyl-6-methoxy- 4.42 (m, 2 H); 695 biphenyl-2-carbonyl)-amino]-quinoline-6-carboxylic 3.81 (s, 3 H); acid [(4-fluoro-benzylcarbamoyl)-phenyl-methyl]-amide 1.16 (3, 9 H) 194 (S)-2-[(6-Methoxy-4'-methyl-biphenyl-2-carbonyl)- 3.77 (s, 3H); 667 amino]-quinoline-6-carboxylic acid {[(4-fluoro-benzyl)- 2.88 (s, 0.9 H); methyl-carbamoyl]-phenyl-methyl)-amide 2.86 9s, 1.9 H); 2.26 (s, 3 H) 195 (S)-2-[(6-Methyl-4'-trifluoromethyl-biphenyl-2- 6.11 (m, 1 H); carbonyl)-amino]-quinoline-6-carboxylic acid[(methyl- 3.02 (s, 1.2 H); pyridin-2-ylmethyl-carbamoyl)-phenyl-methyl]-amide 3.00 (s, 2.8 H) 688 196 (S)-2-[(6-Methyl-4'-trifluoromethyl-biphenyl-2 carbonyl)-amino]-quinoline-6-carboxylic acid (phenyl- 6.36 (d, 1 H); pyridin-2-yl-methyl)-amide 2.03 (s. 3 H) 617 197 (R)-2-[(6-Methyl-4'-trifluoromethyl-biphenyl-2 carbonyl)-amino]-quinoline-6-carboxylic acid (1- 5.34 dq, 1 H); phenyl-ethyl)-amide 2.15 (s, 3 H) 554 198 (S)-2-[(6-Methyl-4'-trifluoromethyl-biphenyl-2- 6.10 (m, 1 H); 705 WO 2005/080373 PCT/IB2005/000167 121 carbonyl)-amino]-quinoline-6-carboxylic acid{[(4-fluoro- 4.75 (m, 2 H); benzyl)-methyl-carbamoyl]-phenyl-methyl}-amide 2.90 (s, 1.1 H); 2.86 s, 2.9 H) 199 (R)- 2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 6.35 (d, 1 H); amino]-quinoline-6-carboxylic acid (phenyl-pyridin-2-yl- 2.21 (s, 3 H); methyl)-amide 1.78 (s, 9 H) 605 200 (R)-2-[(4'-Isopropyl-6-methyl-biphenyl-2-carbonyl)- 6.37 (d, 1 H); amino]-quinoline-6-carboxylic acid (phenyl-pyridin-2-yl- 2.20 (s, 3H); 1.10 methyl)-amide (d, 6 H 591 201 'PF-02378810:(R)-2-[(6,4'-Dimethyl-biphenyl-2- 6.35 (d, 1 H); carbonyl)-amino]-quinoline-6-carboxylic acid (phenyl- 2.30 (s, 3 H); pyridin-2-yl-methyl)-amide 2.18 (s, 3H) 563 202 (S) 2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 6.12 (m, 1 H); amino]-quinoline-6-carboxylic acid [(methyl-pyridin-2- 4.76 (m, 2 H); ylmethyl-carbamoyl)-phenyl-methyl]-amide 3.01 (s, 1.2 H); 2.99 (s, 1.8 H), 2.19 (s, 3H), 1.16 (s, 9H) 676 203 (S)-2-[(4'-Isopropyl-6-methyl-biphenyl-2-carbonyl)- 6.12 (m, 1 H); amino]-quinoline-6-carboxylicacid [(methyl-pyridin-2- 4.74 (m, 2 H); ylmethyl-carbamoyl)-phenyl-methyl]-amide 3.02 (s, 0.9 H); 2.99 (s, 2.1 H), 2.20 (s, 3H), 1.08 d, 6H) 663 204 (S)-2-[(6,4'-Dimethyl-biphenyl-2-carbonyl)-amino]- 6.14 (m, 1 H); quinoline-6-carboxylic acid [(methyl-pyridin-2-ylmethyl- 4.78 (m, 2 H); carbamoyl)-phenyl-methyl]-amide 3.01 (s, 1 H); 3.00 (s, 2H), 2.28 (s, 3H), 2.17 (s, 3H) 634 205 (S)-2-[(4'-tert-Butyl-6-methyl-biphenyl-2carbonyl)- 6.13 (d, 0.25 H); amino]-quinoline-6-carboxylicacid {[(4-fluoro-benzyl)- 6.08 (d, 0.75 H); methyl-carbamoyl]-phenyl-methyl}-amide 2.90 (s, 0.75H); 2.85 (s, 2.5H) 693 206 (S)- 2-[(4'-Isopropyl-6-methyl-biphenyl-2-carbonyl)- 6.14 (d, 0.25 H); amino]-quinoline-6-carboxylicacid{[(4-fluoro-benzyl)- 6.08 (d, 0.75 H); methyl-carbamoyl]-phenyl-methyl}-amide 4.6 (s, 2 H); 2.87 (s, 0.75 H), 2.85 (s, 2.25 H), 2.18 (s, 3H) 679 207 (S)-2-[(6,4'-Dimethyl-biphenyl-2-carbonyl)-amino]- 6.05 (m, 1 H); quinoline-6-carboxylicacid {[(4-fluoro-benzyl)-methyl- 4.5 (m, 2 H); carbamoyl]-phenyl-methyl}-amide 2.90 s, 1 H); 2.86 (s, 2 H) 651 208 (R)-2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 5.11 (dt, 1 H); amino]-quinoline-6-carboxylicacid(1-phenyl-propyl)- 2.21 (s, 3 H); amide 1.17 (s, 9 H) 556 209 (R)-2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 5.37 (m, 1 H); amino]-quinoline-6-carboxylicacid(1-phenyl-ethyl)- 2.21 (s, 3 H); 1.63 (d, 3 H); 542 WO 2005/080373 PCT/IB2005/000167 122 amide 1.17 (s, 9 H) 210 (S)-2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 5.82 (d, 1 H); amino]-quinoline-6-carboxylic acid [(4-fluoro- 4.36 (d, 2 H); benzylcarbamoyl)-phenyl-methyl]-amide 2.20 (s, 1H); 1.17 (s, 9H) 679 211 (S)-2-[(6,4'-Dimethyl-biphenyl-2-carbonyl)-amino]- 5.78 (d, 1 H); quinoline-6-carboxylicacid{phenyl-[(pyridin-2-ylmethyl)- 4.69 (dd, 1 H); carbamoyl]-methyl}-amide 4.52 (dd, 1.2 H); 2.29 (s, 3 H), 2.17 (s, 3H) 620 212 (S)-2-[(6,4'-Dimethyl-biphenyl-2-carbonyl)-amino]- 5.79 (d, 1 H); quinoline-6-carboxylic acid [(4-fluoro- 4.36 (d, 2 H); benzylcarbamoyl)-phenyl-methyll-amide 2.28 (s, 3 H), 2.16 (s, 3H) 637 213 (S)-2-[(4'-Isopropyl-6-methyl-biphenyl-2-carbonyl)- 5.71 (d, 1 H); amino]-quinoline-6-carboxylicacid[(4-fluoro- 4.41 (d, 2 H); benzylcarbamoyl)-phenyl-methyl]-amide 2.20 (s, 3 H), 1.11 (d, 6 H) 214 (S)-2-[(4'-Isopropyl-6-methyl-biphenyl-2-carbonyl)- 5.77 (d, 1 H); amino]-quinoline-6-carboxylicacid{phenyl-[(pyridin- 2 - 4.65 (dd, 1 H); ylmethyl)-carbamoyl]-methyl}-amide 4.50 (dd, 31 H); 2.21 (s, 3 H), 1.16 (s, 6H) 648 215 (S)-2-[(4'-tert-Butyl-6-methyl-biphenyl-2-carbonyl)- 5.78 (d, 1 H); amino]-quinoline-6-carboxylicacidphenyl-[(pyridin- 2 - 4.66 '(dd, 1 H); ylmethyl)-carbamoyl]-methyl}-amide 4.50 (dd, H); 1.17 (s, 9H3 662H), 1. 17 (s, 9H) 62 WO 2005/080373 PCT/IB2005/000167 123 Solid Amorphous Dispersion Formulations MTPI Dispersion Examples 5 ' Formulation Example 1 The following process was used to form a spray-dried solid amorphous dispersion containing 25 wt% the compound of Example 1 ("Compound 1") and 75 wt% HPMCAS HG (hydroxypropyl methylcellulose acetate succinate, AQOAT-HG, available from Shin Etsu, Tokyo, Japan). First, a spray solution was formed containing 1.25 wt% of 10 Compound 1, 3.75 wt% HPMCAS-HG, and 95 wt% acetone as follows. Compound 1 and acetone were combined in a container and mixed for about 2 hours, allowing the compound to dissolve. Next, HPMCAS-HG was added directly to this mixture, and the mixture stirred for an additional 2 hours. This mixture was then passed through a filter with a screen size of 200 pm, thus forming the spray solution. 15 The spray solution was pumped using a high-pressure pump to a spray drier (a Niro type XP Portable Spray-Drierwith a Liquid-Feed Process Vessel ('PSD-1")), equipped with a pressure nozzle (Spraying Systems Pressure Nozzle and Body) (SK 72-16). The PSD-1 was equipped with a 9-inch chamber extension. The chamber extension was added to the spray drier to increase the vertical length of the drier. The spray drier was 20 also equipped with a 316 stainless steel circular diffuser plate with 1/16-inch drilled holes, having a'1% open area. This small open area directed the flow of the drying gas to minimize product recirculation within the spray drier. The nozzle sat flush with the diffuser plate during operation. The spray solution was delivered to the nozzle at about 190 g/min at a pressure of 140 psig. The pump was followed by a pulsation dampener to 25 minimize pulsation at the nozzle. Drying gas (e.g., nitrogen) was delivered to the diffuser plate at a flow rate of 1800 g/min, and an inlet temperature of 1050C. The evaporated solvent and wet drying gas exited the spray drier at a temperature of 45 0 C. The spray-dried solid amorphous dispersion formed by this process was collected in a cyclone, then post-dried using a Gruenberg single-pass convection tray drier operating 30 at 40 0 C for 4 hours. The properties of the dispersion after secondary drying were as follows: WO 2005/080373 PCT/IB2005/000167 124 Formulation Table 1 Bulk Properties (After Secondary Drying Value Bulk Specific Volume (cc/g) 4.9 Tapped Specific Volume (cc/g) 2.9 Hausner Ratio 1.7 Mean Particle Diameter (pm) 35 Di 0 , D 0 so, Do' (pm) 12, 31, 62 Span (Dc 0 -Do)/Dso 1.6 Residual Acetone 2.1% (Before Secondary Drying) * 10 vol% of the particles have a diameter that is smaller than Dlo; 50 vol% of the particles have a diameter that is smaller than Do 50 , and 90 vol% of the particles have a diameter that is smaller than Dqo. Formulation Example 2 A solid amorphous dispersion of 25 wt% of the compound of Example 1 ("Compound 1") and 75 wt% HPMCAS-HG was also prepared using a "mini" spray-drier. A spray solution was prepared by dissolving 25 mg Compound 1 and 75 mg HPMCAS 10 in 20 g of acetone. The mini spray-drier consisted of an atomizer in the top cap of a vertically oriented 11-cm diameter stainless steel pipe. The atomizer was a two-fluid nozzle (Spraying Systems Co. 1650 fluid cap and 64 air cap), where the atomizing gas was nitrogen delivered to the nozzle at 70 0 C and a flow rate of 15 gm/min, and the solution to be spray dried was delivered to the nozzle at room temperature and a flow 15 rate of 1.3 mL/min using a syringe pump. Filter paper with a supporting screen was clamped to the bottom end of the pipe to collect the solid spray-dried material and allow the nitrogen and evaporated solvent to escape. Formulation Example 3 20 The following process was used to form a spray-dried solid amorphous dispersion containing 25 wt% of the compound of Example 135 ("Compound 135") and 75 wt% HPMCAS-HG. First, a spray solution was formed containing 9.89 g Compound WO 2005/080373 PCT/IB2005/000167 125 135, 29.67 g HPMCAS-HG, and 525.58 g acetone. The spray solution was added to a tank and pressurized using compressed nitrogen to pass the solution through a pressure-swirl atomizer (Schlick #2 pressure nozzle) located in a spray-drying chamber. The spray-drying chamber consisted of three sections: a top section, a 5 straight-side section, and a cone section. The top section had a diameter of 10.875 inches (27.6 cm), and was equipped with a drying-gas inlet and a spray-solution inlet. The top section also contained an upper perforated plate and a lower perforated plate for dispersing the drying gas within the spray-drying chamber. The upper perforated plate extended across the diameter of the top section and formed an upper chamber in 10 the top section of the spray-drying chamber. The upper perforated plate contained 0.0625-inch (0.16 cm) diameter holes at a uniform spacing of 0.5 inches (1.27-cm). The lower perforated plate extended across the diameter of the top section of the spray drying chamber and formed a lower chamber of the top section of the spray-drying chamber. The lower perforated plate contained 0.0625-inch (0.16 cm) diameter holes at 15 a uniform spacing of 0.25 inches (0.64-cm). The drying gas entered the upper chamber in the top section through the drying-gas inlet and then passed through the holes in the upper perforated plate. The drying gas then entered the lower chamber and passed through the holes in the lower perforated plate. The drying gas then entered the straight side section of the spray-drying chamber. 20 The spray solution was fed to the spray-drying chamber through the spray-solution inlet. The pressure-swirl atomizer was mounted flush with the bottom of the lower perforated plate. The spray solution was then sprayed into the straight-side section of the spray-drying chamber. The straight-side section had a diameter of 10.5 inches (26.7 cm) and a length of 31.75 inches (80.6 cm). The flow rate of drying gas 25 and spray solution were selected such that the atomized spray solution was sufficiently dry by the time it reached the walls of the straight-side section that it did not stick to the walls. The so-formed solid particles were collected in the cone section of the spray-drying chamber. The cone section had an angle of 58 degrees. The diameter of 30 the cone section at the top was 10.5 inches (26.7 cm), and the distance from the top of WO 2005/080373 PCT/IB2005/000167 126 the cone section to the bottom was 8.625 inches (21.9 cm). At the bottom of the cone section was a 1-inch (2.54-cm) diameter outlet port. The spray-dried particles, evaporated solvent, and drying gas were removed from the spray-drying chamber through the outlet port and sent to a cyclone 5 separator where the spray-dried particles were collected. The evaporated solvent and drying gas were then sent to a filter for removal of any remaining particles before discharge. To form the spray-dried dispersion, the spray solution was delivered to the nozzle at a pressure of about 140 psi and at a flow rate of about 37 g/min. Drying 10 gas (nitrogen) entered the spray-drying chamber at a flow of about 425 g/min and an inlet temperature of about 111 C. The evaporated solvent and drying gas exited the spray drier at a temperature of 450C. The resulting solid amorphous dispersion was collected in a cyclone. 15 Formulation Example 4 A solid amorphous dispersion of 25 wt% of the compound of Example 135 ("Compound 135") and 75 wt% HPMCAS-HG was also prepared using a "mini" spray-drier using the procedures described for the dispersion of Formulation Example 2 with the following exceptions. The spray solution was prepared by dissolving 20 mg 20 Compound 135 and 60 mg HPMCAS in 8 g of acetone. The atomizing gas was nitrogen delivered to the nozzle at 700C and a flow rate of about 8 gm/min, and the solution to be spray dried was delivered to the nozzle at room temperature and a flow rate of 0.65 mL/min using a syringe pump. Filter paper with a supporting screen was clamped to the bottom end of the pipe to collect the solid spray-dried material and allow the nitrogen 25 and evaporated solvent to escape. Formulation Example 5 A spray-dried solid amorphous dispersion containing 25 wt% of the compound of Example 114 ("Compound 114") and 75 wt% HPMCAS-HG was formed 30 using the procedures outlined in Fromulation Example 3 with the following exceptions. The spray solution was formed containing 10.897 g Compound 114, 32.7 g HPMCAS, WO 2005/080373 PCT/IB2005/000167 127 and 579.26 g acetone. The spray solution was added to a tank and pressurized using compressed nitrogen to pass the solution through a pressure-swirl atomizer (Schlick #2 pressure nozzle) located in the spray-drying chamber, as described above for Formulation Example 3. 5 To form the spray-dried solid amorphous, the spray solution was delivered to the nozzle at a pressure of about 150 psi, and at a flow rate of about 38 g/min. Drying gas (nitrogen) entered the spray-drying chamber at a flow of about 425 g/min and an inlet temperature of about 115"C. The evaporated solvent and drying gas exited the spray drier at a temperature of 450C. The resulting solid amorphous 10 dispersion was collected in a cyclone. Formulation Example 6 A solid amorphous dispersion of 25 wt% the compound of Example 114 ("Compound 114") and75 wt% HPMCAS-HG was also prepared using a "mini" spray 15 drier using the procedures outlined for Example 2 with the following exceptions. A spray solution was prepared by dissolving 20 mg Compound 114 and 60 mg HPMCAS in 8 g of acetone. The atomizing gas was nitrogen delivered to the nozzle at 700C and a flow rate of about 8 gm/min, and the solution to be spray dried was delivered to the nozzle at room temperature and a flow rate of 0.65 mL/min using a syringe pump. Filter paper 20 with a supporting screen was clamped to the bottom end of the pipe to collect the solid spray-dried material and allow the nitrogen and evaporated solvent to escape. Biological Assays The utility of the compounds of the present invention as pharmaceutically active agents in the treatment of metabolic diseases (such as are detailed herein) in animals, 25 particularly mammals (e.g. humans), is demonstrated by the activity of the compounds of the present invention in conventional assays and the in vitro and in vivo assays described below. Such assays also provide a means whereby the activities of the compounds of the present invention can be compared with the activities of other known compounds. The results of these comparisons are useful for determining dosage levels. 30 All of the compounds listed in the Examples section above were tested in either the Apo-B secretion inhibition assay or the MTP (canine) inhibition assay described below, WO 2005/080373 PCT/IB2005/000167 128 and the IC 50 values for these compounds were found to be less than 200 nM under the conditions of those assays. Food Intake 5 Healthy, young adult (1 to 3 years of age) male and female beagles (Marshall Farms, North Rose, New York, NY 14516) weighing 13 - 19 kg at the start of the treatment period are employed as test subjects. The test compound is provided as a powder. The dosing solution, administered by oral gavage, is provided employing a Miglyol/cremaphor/water 20/5/75 solution as 10 the test vehicle. MiglyolP is available from Condea Vista Co., Cranford, NJ. The dosing solution is prepared at 0.5 to 2 mg/mL activity so that 0.5 mL is delivered per kg of body weight at dosages of 0.25 to 1 mg/kg. Following a seven-day acclimation period, a four- to seven-day evaluation study is effected. The study consists of three groups of animals containing 2 male and 2 female 15 dogs each. Each group of four animals is randomly assigned to receive 0.25, 0.5 or 1 mg/kg test compound. On Days 0 to 3 or 6, each dog receives the dosing solution administered as a single dose at Time 0 on each dosing day via a feeding tube. This is followed by a 10 mL water rinse to ensure total delivery of dosing solution. Each test animal is permitted ad libitum access to water and IAMS Mini-Chunks® (The lams 20 Company, P.O. Box 14597, Dayton, OH) dry food each day during the study and approximately 0.5 to 1 hour post-dose. Reduction in food intake is quantitated by weighing individual food bowls each day prior to feeding and at the end of each 24-hour consumption period during the acclimation period and again during the treatment period. The difference between the 25 weight of the full bowl prior to feeding and the weight of the bowl and amount of food remaining at the end of the 24-hour consumption period represents the reduction in food intake attributable to the test compound.
WO 2005/080373 PCT/IB2005/000167 129 Apo B Secretion Inhibition The ability of the compounds of the present invention to inhibit the secretion of apo B can be determined using the following cell-based assay, which measures the secretion of apo B in HepG2 cells. 5 HepG2 cells (ATCC, HB-8065, Manassas, VA) are grown in Dulbecco's Modified Eagles Medium plus 10% fetal bovine serum (Growth medium; Gibco, Grand Island, NY) in 96-well culture plates in a humidified atmosphere containing 5% carbon dioxide until they are approximately 70% confluent. Test compounds are dissolved at 10 mM in dimethyl sulfoxide (DMSO). From this stock, the initial dose concentration is prepared in 10 70% EtOH and subsequent serial dilutions made in 70%EtOH with DMSO at a concentration equivalent to the initial dilution. Dilutions of test compounds are prepared at 100x the desired final concentation and are added in triplicate to separate wells of a 96-well culture plate containing HepG2 cells. Forty hours later, growth medium is collected and assayed by specific enzyme-linked immunosorbent assay (ELISA) for Apo 15 B. Inhibitors are identified as compounds that decrease Apo B secretion into the medium. The ELISA assay for Apo B is performed as follows: Polyclonal antibody against human Apo B (Chemicon, Temecula, CA) is diluted 1:1000 in carbonate bicarbonate buffer (Pierce, Rockford, IL) and 100pL are added to each well of a 96-well plate (NUNC Maxisorb, Rochester, NY). After 5 hours incubation at room temperature, 20 the antibody solution is removed and wells are washed four times with phosphate buffered saline (PBS)/0.05%Tween' 20 (Tween® 20 is available from Cayman Chemical Co., Ann Arbor MI). Non-specific sites on the plastic are blocked by incubating wells for 1 to 1.5 hours in a solution of 0.5% (w/v) bovine serum albumin (BSA), 0.1% Tween ' 20 made in PBS. One hundred microliters (100 gL) of a 1:20 dilution of growth medium 25 from the HepG2 cells (made in 0.004% Tween® 20/1% BSA in PBS) are added to each well and incubated for 3 hours at room temperature. Wells are aspirated and washed four times (0.05% Tween 20 in PBS) prior to adding 100pL of a 1/1000 dilution (~5ug/mL) of the secondary antibody, mouse anti-human Apo B (Chemicon, Temecula, CA). After 2 hours incubation at room temperature, this solution is aspirated and the 30 wells are again washed 4 times as above. One hundred microliters (100PL) of a 1:10,000dilution (in PBS/1%BSA/0.1% Tween' 20) of peroxidase-conjugated affinpure WO 2005/080373 PCT/IB2005/000167 130 goat anti-mouse IgG (H+L) (Jackson ImmunoResearch Laboratories, Bar Harbor, ME)) are then added to each well and incubated for 1 hour at room temperature. After aspirating, the wells are washed 4 times as above and 50p1 of 1-step Ultra TMB (tetramethylbenzidine) ELISA reagent (Pierce, Rockford, IL) are added to each well and 5 incubated for 5 minutes. The reaction is stopped by the addition of 50pL of 2M H 2 SO4 and absorbance of each well is read at 450 nm. Percent inhibition is calculated using absorbance from vehicle-treated supernatants minus the absorbance from media alone as the total or 100% value. The percent inhibition at each concentration of test compound is imported into GraphPad Prism software and IC 50 values are determined. 10 MTP (canine) Inhibition This assay determines the ability of a compound to inhibit triglyceride transfer catalyzed by canine MTP. This assay is based on measuring the transfer rate of 14 C from a donor liposome to an acceptor liposome (which is labeled with 3 H). 15 (A). Canine hepatic microsome isolation: Canine microsomes are first isolated from canine liver by thawing frozen liver on ice and rinsing several times with 0.25 M sucrose. A 50% liver homogenate (w/v) is made in 0.25 M sucrose. The homogenate is diluted 1:1 with 0.25 M sucrose, and 20 centrifuged at 10,000 g at 4 0 C for 20 minutes. The supernatant is saved. The pellet is re-suspended in a minimal volume of 0.25 M sucrose and re-centrifuged at 10,000 g for 20 minutes at 4 0 C. The supernatants are combined and centrifuged at 105,000g for 75 minutes at 4 0 C. The supernatant is discarded and the resulting microsomal pellet is saved. The microsomal pellet is re-suspended in a minimum volume of 0.25 M sucrose 25 and diluted to 3 mL per gram liver weight in 0.15M Tris-HCI, pH= 8.0. The resulting suspension is divided into 12 tubes and centrifuged at 105,000 g for 75 minutes. The resulting microsomal pellets are stored at -80 0 C until needed. MTP is isolated by thawing the microsomal pellet tube and suspending it in 12 mL/tube of cold 50 mM Tris-HCI, 50mM KCI, 2 mM MgCI pH=7.4, and slowly adding 30 1.2mL of a 0.54% deoxycholate pH=7.4 solution. After a 30-minute incubation on ice with gentle mixing, the solution is centrifuged at 105,000 g for 75 minutes at 4 0 C. The WO 2005/080373 PCT/IB2005/000167 131 supernatant containing soluble MTP, is dialyzed for 2-3 days with 5 changes of assay buffer (15.0 mM Tris-HCI, 40 mM NaCI, 1mM EDTA, 0.02% NaN3 pH=7.4). (B). MTP activity assay reagents: Donor liposomes are created by adding 4474M egg phosphatidylcholine 5 (68pl/20mLs), 83pM bovine heart cardiolipin (169pl/20mLs) and 0.914M [ 14 C]triolein (110 OCi/mol) (20 1 pl/20mLs). The lipids are available in chloroform and are first dried under nitrogen and then hydrated in assay buffer to the volume needed. To create liposomes, lipids are sonicated for -7 minutes. Lipids are centrifuged at 105,000 g for 2 hours and liposomes are harvested by removing the top' -80% of supernatant into 10 separate tube. Acceptor liposomes are created by adding 1.33mM egg phosphatidylcholine (404plI/40mLs), 2.6pM triolein (100pl/40mLs) and 0.5nM [ 3 H]egg phosphatidylcholine (50Ci/mol) (10pl/40mLs). The lipids are available in chloroform and are first dried under nitrogen and then hydrated in assay buffer to the volume needed. To create liposomes, 15 lipids are sonicated for -20 minutes. Lipids are centrifuged at 105,000 g for 2 hours and are harvested by removing the top -80% of supernatant into separate tube. (C). MTP in vitro lipid transfer inhibition assay: Appropriately diluted drug or control samples in 100pl assay buffer containing 5% BSA are added to reaction tubes containing assay buffer, 50p.1 donor liposomes, 20 100pl acceptor liposomes, and partially purified liver MTP. The tubes are vortexed and incubated on a tube shaker for 1 hour at 370C to allow lipid transfer reaction to occur. Donor liposomes are precipitated by adding 3001l of a 50% (w/v) DEAE cellulose suspension in assay buffer to each tube. The tubes are centrifuged at -1000 rpm to pellet resin. 400pl of supernatant is transferred into a scintillation vial with scintillation 25 fluid and DPM counts for both [ 3 H] and [14C] are determined. Triolein transfer is calculated by comparing the amount of [14C] and [ 3 H] remaining in the supernatant to
14 C] and [ 3 H] in the original donor and acceptor liposomes, respectively. % Triolein Transfer = ([1 4 C]supernatant/[14C]donor) X ([ 3 H]acceptor/[ 3 H]supernatant) X 100 30 IC50 values are obtained using standard methods and first order kinetic calculations.
WO 2005/080373 PCT/IB2005/000167 132 Fat Absorption Inhibition Healthy female CF1 mice (Charles River) weighing 18-20 grams upon arrival are employed as test subjects. The mice are housed in groups of 10 in standard caging, and are allowed to acclimate for one week prior to testing. Mice are fasted overnight in a 5 separate procedure room prior to testing. Each treatment group typically consists of 5 mice. The test compounds are preferably provided as a powder in a glass vial. The dosing solution (0.10ml/25g body weight) administered by oral gavage consists of an emulsion of MiglyoP 812 (20%), Cremaphor (5%) and water (75%). An appropriate 10 volume of MiglyolP (available from Condea Vista Co., Cranford, NJ) is first added to the test compound, and the vial is vortexed for approximately 1 minute. The appropriate, volume of Cremaphor is then added, and the vial is again vortexed as before. The appropriate volume of water is added, and an emulsion is formed by vortexing and briefly sonicating. 15 Hamster liquid diet (Bioserve F0739) (dose volume 0.5ml/25g body weight) is prepared by adding (for every 10 mL needed) 2.5 grams liquid diet powder, 10 mL water and 5 microcuries glycerol- 3 H-trioleate (Amersham TRA191) to a laboratory blender. The mixture is then blended at high speed for approximately 1 minute. The liquid diet is stored at 4°C until needed. Sample tubes are weighed (Falcon 15 ml polypropylene 20 conical). Three milliliters of 2.5N KOH is added to each tube. Following overnight fasting, each mouse is dosed (see above volumes) with test compound followed immediately by liquid diet. Positive (a known potent MTP inhibitor) and negative control groups (vehicle) are included in each assay. One scintillation vial is sham-dosed every 30 mice in order to determine the activity of the initial bolus. 25 At two hours post dose the mice are euthanized by carbon dioxide inhalation, the abdominal cavity opened, and the small intestines removed and placed in the KOH conical tube. Each tube is then weighed. Tubes containing intestines are then placed in a 75 0 C water bath for 1.5-2 hours. Following saponification, the tubes are vortexed and 200ptL saponate placed in a 20mL liquid scintillation vial. Samples are decolorized (for 30 30 minutes) by adding 200pL of 30% (w/w) hydrogen peroxide. Each sample is neutralized by the addition of 200ptL of 3N HCL. Ten milliliters of Ready SafeC WO 2005/080373 PCT/IB2005/000167 133 (Beckman) liquid scintillation fluid are added and the samples are counted on a Beckman Coulter LS 6500 scintillation system. The calculations are carried out as follows: weight of saponate = weight of tube (KOH + intestine)- weight of empty tube 5 saponate fraction = 0.227 saponate weight (density of the saponate = 1.1 g/mL; therefore the weight of the aliquot is equal to 0.22g) total DPM for the entire intestine = DPM of sample/saponate fraction The initial bolus DPM is calculated by averaging the counts from the sham dosed scintillation vials. 10 The fraction of bolus recovered from the intestine (percent recovery) = total DPM/ bolus count. Percent recovery from each test group = average of percent recovery from each mouse. Interpretation of results: 15 To compare efficacy of test compounds, an ED 25 for intestinal fat absorption is calculated. The (average) percent triglyceride recovery (percent unabsorbed and remaining in the intestine) of the vehicle control group is adjusted to equal 0%, and the (average) percent recovery of the compound control group is adjusted to equal 100%. The same calculations are applied to the percent recovery values obtained for test 20 compounds and an adjusted percent recovery is obtained (% recovery of the test sample - % recovery of vehicle control group / (% recovery of positive control group -% recovery of vehicle control group)). An ED 2 s is then calculated by plotting a graph of compound concentration vs. adjusted percent recovery. 25 WO 2005/080373 PCT/IB2005/000167 134 Serum Triglyceride Lowering Healthy female CF1 mice (Charles River) weighing 18-20 grams upon arrival are employed as test subjects. The mice are housed in groups of 10 in standard caging, and were allowed to acclimate for one week prior to testing. Mice are fasted overnight in a 5 separate procedure room prior to testing. Each treatment group typically consists of 10 mice. The test compound is preferably provided as a powder in a glass vial. The dosing solution (0.250mL/25g body weight) administered by oral gavage consists of an emulsion of Miglyolo 812 (40%), Cremaphor* (10%) and water (50%). An appropriate 10 volume of Miglyol® (available from Condea Vista Co., Cranford, NJ) is first added to the test compound, and the vial vortexed for approximately 1 minute. Next, the appropriate volume of Cremaphor is added, and the vial again vortexed as previously. The appropriate volume of water is then added and an emulsion is formed by vortexing and briefly sonicating. 15 Following overnight fasting, each mouse is dosed (see above volumes) with test compound. At 1-hour post dose the mice are euthanized by carbon dioxide inhalation and blood collected for triglyceride quantitation. Serum triglyceride values are quantitated using a colorimetric endpoint assay (Wako Triglyceride E kit # 432-4021) on a Spectra Max 250 plate reader with Softmax 20 Pro software. All samples are run in duplicate. For comparison of triglyceride values, the percent change from control is calculated. The average triglyceride value of the test compound group is divided by the average triglyceride value of the vehicle group, multiplied by 100 and then subtracted from 100%. The ED 25 value is then calculated by plotting a graph of compound concentration versus 25 percent change from control. The relative values of the ED 2 5 for triglyceride lowering and the ED 25 for inhibition of intestinal fat absorption are used as a means to compare selectivity of the test compounds.
2. A compound of Formula (I) R 7n 3 4 2 R (R 2 )m "R N R R (I) 5 wherein: R 1 is a group of the formula (R )P ~c-N -q X R 1 0 (R9 x 10 and is attached to the 2 or 3 position of the quinoline group of Formula (I); m is an integer from 0 to 2; n is an integer from 0 to 4; p is an integer from 1 to 5; 15 q is an integer from 0 to 3; X is -N- or -C(Ra) - where Ra is H or R9; X 1 is -N- or -C(Rb) - where R b is H or R7; R 2 , R 7 , R 8 and R 9 are each independently selected from the group consisting of halo, -OH, -CN, (CI-C4)alkyl, (C 1 -C 4 )alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, 20 halo-substituted(Cl-C 4 )alkyl-, halo-substituted(Cl-C 4 )alkoxy-, (C 1 -C 4 )alkylthio- WO 2005/080373 PCT/IB2005/000167 140 hydroxy(Cl-C 4 )alkyl-, (C 2 -C 4 )alkenyl, (C2-C4)alkynyl, -C(O)N(Ro)(Rll), -N(Rll)C(O)R2, -N(R")CO 2 Ri 2 , -N(R 11 ")S(O),R1 2 , -C(O)R 1 ", -CO 2 R 12 , -OC(O)R 1 2 and -SO 2 N(Rc)(Rl). each Ro is independently H or (CI-C4)alkyl; s is the integer 1 or 2; 5 v is an integer from 0 to 2; R 3 and R 4 are each H or are taken together with the carbon atom to which they are attached to form a carbonyl group; R 5 and R 1 0 are each independently selected from the group consisting of H, (Cl C 4 )alkyl, halo-substituted (C,.C4)alkyl, (C 3 -C 7 )cycloalkyl, -C(O)R 12 , alkoxyalkyl- having 2 10 to 4 carbon atoms, alkylthioalkyl- having 2 to 4 carbon atoms and -SO 2 R1 2 ; R 6 is (C,-Clo)alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, -OH and -CN, or R 6 is pyridyl, phenyl or phenyl(C,-C 6 )alkyl- in which the pyridyl and phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 15 substituents independently selected from the group consisting of (C,-C 4 )alkyl, halo substituted (Cl-C4)alkyl, (C,-C 4 )alkoxy-, halo-substituted (Cl-C 4 )alkoxy-, halo, -OH and -CN, or R 6 is (C2-Co 10 )alkenyl, (C 2 -C10)alkynyl, -CH 2 N(Rc)(R1 3 ), -C(O)N(R" 4 )(R 15 ), -CO 2 R 2 o or -CH 2 -W-Y where W is -0- or -S-; and 20 Y is selected from the group consisting of H, (Cl-Ca)alkyl, (C 3 -C 7 )cycloalkyl, (C3 C7)cycloalkyl(C,-C6)alkyl-, phenyl and phenyl(CO,-C 6 )alkyl-, where the (C,-Cs)alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR" 2 , -C(O)R" 2 , -C(O)OR" 2 , -OC(O)R 12 , -N(R")C(O)R 12 and -C(O)N(Rc)(R"); the (C3-C 7 )cycloalkyl group and the cycloalkyl 25 moiety of the cycloalkylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, (Cl-C 6 )alkyl, -OH, -CN, -CF 3 , -OCF 3 , -C(O)OR' 2 and -OR 12 ; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (Cl-C 6 )alkyl, 30 -OH, -CN, -CF 3 , -OCF 3 , -C(O)OR1 2 and -OR' 2 ; WO 2005/080373 PCT/IB2005/000167 141 each R 11 is independently selected from the ,group consisting of H, (Cl-C4)alkyl, halo-substituted(Cl-C 4 )alkyl, (C 3 -C 7 )cycloalkyl, (CI-C 3 )alkoxy(C2-C4)alkyl- having 3 to 5 carbon atoms and (C 1 -C 3 )alkylthio(C 2 -C 4 )alkyl- having 3 to 5 carbon atoms; each R 12 is independently (C 1 -C 4 )alkyl or (C 3 -G 7 )cycloalkyl, where the (Cl 5 C 4 )alkyl is optionally substituted with 1 to 3 substituents independently selected from the group consisting of (Cl-C4)alkoxy-, halo, -OH, -CN, -CF 3 and -OCF 3 ; R 13 is selected from the group consisting of (C 3 -C 6 )alkyl, phenylmethyl-, -C(O)R" and -S(0) 2 R 16 ; R 1 4 is selected from the group consisting of H, (C 1 -C 6 )alkyl, (C 3 -CT)cycloalkyl, 10 (C3-C)cycloalkyl(C 1 -C 6 )alkyl-, phenyl and phenyl(C-C 6 )alkyl-, where the (C 1 -C 6 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR 12 , -C(O)R 1 2 , -C0 2 R 12 , -OC(O)R 12 , -N(R")C(O)R 12 and -C(O)N(Re)(Rll); the (C 3 -C 7 )cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group are 15 optionally substituted with1 to 3 substituents independently selected from the group consisting of halo, oxo, (C 1 -C'6)alkyl, -OH, -CN, -CF 3 , -OCF 3 and -OR 12 ; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (Cl-Ce)alkyl, (C 1 -C 6 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 and -OR 1 2 ; 20 R 15 is selected from the group consisting of H, (C-Cs)alkyl, (C 2 -C 6 )alkenyl, (C2 C6)alkynyl, (C3-C 7 )cycloalkyl, (C 3 -C 7 )cycloalkyl(Cj-C6)alkyl, phenyl, phenyl(Cl-Ce)alkyl-, pyridyl, pyridyl(C-C 6 )alkyl-, -C(O)R 1 2 and -SO 2 Ri 2 , where the (Cl-Cs)alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -CF 3 , -OCF 3 , -OR 1 2 , -C(O)R 12 , -C(O)OR 12 , -OC(O)R 2 , 25 -N(R")C(O)R 12 and -C(O)N(Rc)(Rl); and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (C-C 6 )alkyl, (C-C 6 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 and -OR 12 ; or R 15 is -(CH 2 )tN(R17)(R 18 ) where t is an integer from 2 to 4 and R 17 and R 18 are 30 taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms are WO 2005/080373 PCT/IB2005/000167 142 optionally substituted with oxo and optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R" 9 )-; or R 14 and R 15 are taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 5 ring-atoms are optionally substituted with oxo and optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R 9)-; R 1 9 is H, (C 1 -C 6 )alkyl or halo-substituted(C-C6)alkyl; R 1 6 is (C 1 -C 6 )alkyl, phenyl or phenyl(C 1 -C 4 )alkyl-, where the (C 1 -C 6 )alkyl group 10 is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, -CN, (C 1 -C4)alkoxy- and (C 1 -C 4 )alkylthio, and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (C 1 -C 4 )alkyl and (C 1 -C 4 )alkoxy-; and 15 R 20 is selected from the group consisting of (CI-C 6 )alkyl, (C 3 -C 7 )cycloalkyl, (C3 C 7 )cycloalkyl(C-C6)alkyl-, phenyl and phenyl(C-C 6 )alkyl-, where the (CI-C 6 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, oxo, -OH, -CN, -OF 3 , -OCF 3 , -OR 12 , -C(O)R 1 2 , -00 2 R' 1 2 , -OC(O)R' 12 , -N(R")C(O)R 12 and -C(O)N(Rc)(R"); the (C 3 -C 7 )cycloalkyl group and the cycloalkyl 20 moiety of the cycloalkylalkyl group are optionally substituted with1 to 3 substituents independently selected from the group consisting of halo, oxo, (C 1 -C 6 )alkyl, -OH, -CN, -CF 3 , -OCF 3 and -OR12; and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, (Cl-C 6 )alkyl, (Cl-C 6 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 and 25 -OR 1 2 ; a pharmaceutically acceptable salt thereof or a prodrug of said compound or said salt.
3. The compound of claim 1 in which X is -C(Ra) - and X' is -C(Rb)-; R 1 is attached to the 2 position of the quinoline group; R a and Rb are each H, the -C(O)N(Rlo)- moiety 30 in R 1 is attached to the 2 or 3 position of R 1 ; and the R 8 -bearing phenyl group or the (C 4 -C 7 )cycloalkyl group is attached to the 2 or 3 position of R 1 not occupied by WO 2005/080373 PCT/IB2005/000167 143 -C(O)N(R)-, or a pharmaceutically acceptable salt thereof.
4. The compound of any of claims 1 through 3 in which each R" 1 is independently selected from the group consisting of H, (C 1 -C 4 )alkyl and fluoro-substituted(C 1 -C4)alkyl 5 ; and each R 12 is independently (C 1 -C 4 )alkyl optionally substituted with. 1 to 3 substituents independently selected from the group, consisting of (C-C 4 )alkoxy- and halo; or a pharmaceutically acceptable salt thereof.
5. The compound of any of claims 1, 3 and 4 in which p is 1 or 2; 10 m is 0 or 1, q is 0 or 1 and n is 0 or 1; the -C(0)N(R 10 )- moiety in R 1 is attached to the 3 position of R 1 , and the R 8 -bearing phenyl group or the (C4 C 7 )cycloalkyl group is attached to the 2 position of R 1 ; and, where m is 1, R is selected from the group consisting of F, CI, -CH 3 and -CF 3 ; where q is 1, R'is selected from the group consisting of F, CI, -CH 3 and -CF 3 ; 15 where n is 1, R 7 is selected from the group consisting of from halo, -OH, -CN, (C,-C4)alkyl, (C 1 -C 4 )alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo substituted(C 1-C4)alkyl- and halo-substituted(Cl-C4)alkoxy-; R 8 is selected from the group consisting of from halo, -OH, (C 1 -C4)alkyl, (Ci C 4 )alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo-substituted(CI-C4)alkyl-, 20 halo-substituted(C 1 -C 4 )alkoxy-, benzyloxy-, (C'-C 4 )alkenyl, and -S(O),R 1 2 ; R 5 and R' 0 are independently selected from the group consisting of H, (Cl C 4 )alkyl and halo-substituted(CG C4)alkyl-; and R 6 is (C 1 -C 10 )alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, -OH and -CN, or 25 R 6 is pyridyl, phenyl or phenyl(C 1 -C 6 )alkyl- in which the phenyl group and the phenyl moiety of the phenylalkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of (CG 1 -C4)alkyl, halo-substituted(Cl C4)alkyl-, (C 1 -C 4 )alkoxy-, halo, -OH and -CN, or R 6 is -CH 2 -W-Y, -CH 2 N(Rc)(R" 3 ), -C(O)N(R 1 4 )(R 15 ) or -CO 2 R 2 0 where R 13 is 30 phenylmethyl-, -C(O)R 1 6 or -S(O) 2 R 1 6 ; or a pharmaceutically acceptable salt thereof. WO 2005/080373 PCT/IB2005/000167 144
6. The compound of any of claims 1 through 5 in which p is 1 or 2; m is 0 or 1, q is 0 or 1 and n is 0 or 1; R 1 is R a, the -C(O)N(R 10 )- moiety in R 1 is attached to the 3 position of R 1 , and the R 8 -bearing phenyl group is attached to the 2 position of R 1 ; and, 5 where m is 1, R 2 is selected from the group consisting of F, CI, -CH 3 and -OF 3 ; where q is 1, R 9 is selected from the group consisting of F, CI, -CH 3 and -CF 3 ; where n is 1, R 7 is selected from the group consisting of from halo, -OH, -CN, (C 1 -C 4 )alkyl, (C 1 -C 4 )alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo substituted(C4-C 4 )alkyl- and halo-substituted(C 1 -C 4 )alkoxy-; 10 R 8 is selected from the group consisting of from halo, -OH, (C-C4)alkyl, (C1 C 4 )alkoxy-, alkoxyalkyl- having 2 to 4 carbon atoms, halo-substituted(C 1 -C4)alkyl-, halo substituted(C-C 4 )alkoxy-; R 5 and R 1 o are independently selected from the group consisting of H, (C1 C4)alkyl and halo-substituted(C.C 4 )alkyl-; and 15 R 6 is (C-C0lo)alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo, -OH and -CN, or R 6 is pyridyl, phenyl or phenyl(C-C6)alkyl- in which the phenyl group and the phenyl moiety of the phenylalkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of (C 1 -C 4 )alkyl, halo-substituted(Cl 20 C 4 )alkyl-, (C 1 -C4)alkoxy-, halo, -OH and -CN, or R 6 is -CH 2 -W-Y, -CH 2 N(Rc)(R 13), -C(O)N(R 14 )(R") or -CO 2 R 20 where R 1 3 is phenylmethyl-, -C(O)R 16 or -S(O) 2 R 6 ; or a pharmaceutically acceptable salt thereof.
7. The compound of any of claims 1 through 6 in which n is 0 or 1, and where n is 25 1, R 7 is selected from the group consisting of from F, CI, Br, (C-C4)alkyl, (C 1 -C4)alkoxy-, fluoro-substituted(C-C 4 )alkyl- and fluoro-substituted(C 1 -C 4 )alkoxy-; and R 8 is selected from the group consisting of from F, CI, Br, (C-C4)alkyl, (Ci C4)alkoxy-, fluoro-substituted(CO 1 -C 4 )alkyl- and fluoro-substituted(C 1 -C 4 )alkoxy-; or a pharmaceutically acceptable salt thereof. 30
8. A compound of any of claims 1 through 7 of Formula (IA) WO 2005/080373 PCT/IB2005/000167 145 (R 7 )n 16 R- 8 R 3 R4 O\ N R 15 R X IN N 110 R (IA) 5 where R and R 1 0 are independently H or -CH3; n is 0 or 1 and, where n is 1, R 7 is selected from the group consisting of Cl, (Cl C 4 )alkyl, (C-C 4 )alkoxy- and -CF 3 ; R 8 is selected from the group consisting of (Cl C 4 )alkyl; (C-C 4 )alkoxy-and -CF 3 and is attached at'the 4 position of the phenyl ring in Formula (IA); or a pharmaceutically acceptable salt thereof. 10
9. The compound of any of claims 1 through 8 in which R 6 is (CI-Ce)alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of halo and -OH, and R 3 and R 4 are taken together with the carbon atom to which they are attached to form a carbonyl group; n is 0 or 1, and, where n is 1, R 7 is selected from the 15 group consisting of Cl, -CF 3 , -CH 3 , and -OCH 3 and is attached at the 5 or 6 position of the Xl-bearing ring in Formula (IA); and R 8 is selected from the group consisting of (Cl C 4 )alkyl, (C-C4)alkoxy- and -OF 3 ; or a pharmaceutically acceptable salt thereof.
10. The compound of any of claims 1 through 9 where R 6 is (C 1 -Cs)alkyl and n is 0; 20 or a pharmaceutically acceptable salt thereof.
11. The compound of any of claims 1 through 8 in which R 6 is pyridyl, phenyl or phenyl(C-C6)alkyl- in which the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the WO 2005/080373 PCT/IB2005/000167 146 group consisting of (Cl-C4)alkyl, halo-substituted(Cl-C 4 )alkyl-, (C 1 -C4)alkoxy- and halo, and R 3 and R 4 are taken together with the carbon atom to which they are attached to form a carbonyl group; n is 0 and R 8 is selected from the group consisting of (Cl C 4 )alkyl, (C 1 -C 4 )alkoxy- and -OF 3 ; or a pharmaceutically acceptable salt thereof. 5
12. The compound of any of claims 1 through 8 and 11 where R 6 is pyridyl; or a pharmaceutically acceptable salt thereof.
13. The compound of any of claims 1 through 9 in which R 6 is -CH 2 N(Rc)(R1 3 ), 10 -CH 2 -W-Y or -CO2R 2 °; R 13 is -C(O)R 1 6 ; R 3 and R 4 are taken together with the carbon atom to which they are attached to form a carbonyl group; n is 0; R 8 is -CF 3 or (C 1 C 4 )alkyl and is attached at the 4 position of the phenyl ring; R1 6 is (C 1 -C 6 )alkyl; W is O; Y is selected from the group consisting of H, (C 1 -C 6 )alkyl, phenyl and phenylmethyl-, where the Y phenyl group and the phenyl moiety of the phenylmethyl group are 15 optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, (C 1 -C 4 )alkyl and -CF 3 ; and R 2 0 is (C 1 -C 6 )alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, -OH and -C(O)R 12 ; or a pharmaceutically acceptable salt thereof. 20 14. The compound of any of claims 1 through 8 in which R 6 is -C(O)N(R 4 )(R 1 5 ); and R 3 and R 4 are taken together with the carbon atom to which they are attached to form a carbonyl group; or a pharmaceutically acceptable salt thereof.
15. The compound of any of claims 1 through 8 and 14 in which n is 0; R 14 is 25 selected from the group consisting of H, (C 1 -C 6 )alkyl, (C3-C 7 )cycloalkyl, (C3 C 7 )cycloalkyl(Cj-C 6 )alkyl-, phenyl and phenyl(C 1 -C 6 )alkyl-, where the R 14 (C-C 6 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, -OH, -OCF 3 , and -OR 12 ; the R 14 (C3-C 7 )cycloalkyl group and the cycloalkyl moiety of the cycloalkylalkyl group are 30 optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, oxo, (Cl-C4)alkyl, -OH, -OF 3 , -OCF 3 and -OR 1 2 ; and WO 2005/080373 PCT/IB2005/000167 147 the R 14 phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, (C 1 -C 4 )alkyl, (C 1 -C4)alkoxy-, -OH, -CF 3 , -OCF 3 and -OR 12 ; R is is selected from the group consisting of H, (C 1 -C 8 )alkyl, (C 3 -C 7 )cycloalkyl, 5 (C3-C 7 )cycloalkyl(C 1 -C 6 )alkyl-, phenyl, phenyl(C 1 -C 6 )alkyl-, pyridyl, pyridyl(Cl-C 6 )alkyl-, -C(O)R 12 and -SO 2 R 12 where the R 15 (C 1 -Cs)alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, oxo, -OH, -OCF 3 , -C(O)OH, -C(O)OCH2C 6 H 5 , -C(O)OCH 2 C(O)N(Rc)(Rll), -C(O)OR ' , and -OR 12 ; and 10 the R" phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, CI, (Cl-C4)alkyl, (C-C 4 )alkoxy-, -OH, -CN, -CF 3 , -OCF 3 , -C(O)OH, -C(O)OCH 2 C 6 H 5 , and -C(O)OR 12 ; or R 15 is -(CH 2 )tN(R17)(R 18 ) where t is an integer from 2 to 4 and R 17 and R 18 are 15 taken together with.the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms are optionally substituted with oxo and optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R 1 9 )-; or R 14 and R 15 are taken together with the nitrogen atom to which they are attached 20 to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms are optionally substituted with oxo and optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R 19 )-; and R' 9 is H, (Cl-C 6 )alkyl or halo-substituted(C-C 6 )alkyl-; or a pharmaceutically acceptable salt thereof. 25
16. The compound of any of claims 1 through 8,14 and 15 in which n is 0; R 8 is selected from the group consisting of (C 1 -C4)alkyl, (C 1 -C 4 )alkoxy- and -CF 3 ; R 14 is H or (Cl-C 4 )alkyl optionally substituted with 1 to 3 substituents independently selected from the group consisting of F and CI; WO 2005/080373 PCT/IB2005/000167 148 R 15 is selected from the group consisting of H, (C 1 -Cs)alkyl, (C3-C 6 )cycloalkyl, (C 3 -C 6 )cycloalkyl(C,-Ce)alkyl-, phenyl, phenyl(C 1 -C 6 )alkyl-, pyridyl and pyridyl(C 1 C6)alkyl-, where the (C 1 -Cs)alkyl group is optionally substituted with 1 to 3 substituents 5 independently selected from the group consisting of F, CI, oxo, -OH, -OCF 3 , -C(O)OH, -C(O)OCH2C 6 H 5 and -C(O)OR 12 and the phenyl group and the phenyl moiety of the phenylalkyl group are optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, Cl, (Cl-C4)alkyl, (C 1 -C4)alkoxy-, -OH, -CN, -CF 3 , -OCF 3 , -C(O)OH, -C(O)OCH 2 C 6 H 5 , 10 and -C(O)OR 12 ; or R 14 and R 15 are taken together with the nitrogen atom to which they are attached to form a heterocyclic ring containing 3 to 6 ring-atoms in which rings containing 5 or 6 ring-atoms optionally include an additional heteroatom moiety selected from the group consisting of -0-, -S- and -N(R 19 )- where R' 9 is (C0 1 -C4)alkyl or F-substituted(Cl 15 C4)alkyl-; or a pharmaceutically acceptable salt thereof.
17. The compound of any of claims 1 through 8 and 14 through 16 in which R 14 is H or (C0 1 -C 4 )alkyl optionally substituted with 1 to 3 F atoms; R 15 is selected from the group consisting of H, (C-CB)alkyl, (C 3 -C 6 )cycloalkyl, 20 (C3-C 6 )cycloalkyl(C1-Ce)alkyl-, phenyl(C 1 -C 6 )alkyl-, pyridyl and pyridyl(C-C 6 )alkyl-, where the R 15 (C-C 8 )alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, oxo, -OH, -OCF 3 , -C(O)OCH 2 CeH 5 and -C(O)OR 12 and the phenyl moiety of the R 15 phenylalkyl group is optionally substituted with 1 to 3 25 substituents independently selected from the group consisting of F, CI, (C 1 -C4)alkyl, (C C4)alkoxy-, -OH, -CF 3 , -OCF 3 , -C(O)OCH 2 C 6 H 5 and -C(O)OR 12 ; or a pharmaceutically acceptable salt thereof.
18. The compound of any of claims 1 through 8 and 14 through 17 in which R 14 is H 30 or (Cl-C 4 )alkyl; WO 2005/080373 PCT/IB2005/000167 149 R 15 is selected from the group consisting of H, (C-Cs)alkyl, (C 3 -C 6 )cycloalkyl, (C 3 -0 6 )cycloalkyl(C 1 -C 4 )alkyl-, phenyl(C 1 -C4)alkyl-, and pyridyl(Cl-C 4 )alkyl-, where the R 15 (Ci-Cs)alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of F, oxo, -OH and -C(O)OR 1 2 and the 5 phenyl moiety of the R 15 phenylalkyl group is optionally substituted with 1 to 3 substituents independently selected from the group, consisting of F, CI, (C 1 -C 4 )alkyl, (Cl C 4 )alkoxy-, -OH, -CF 3 , -OCF 3 , -C(O)OCH 2 Ce 6 H 5 and -C(O)OR 12 ; or a pharmaceutically acceptable salt thereof. 10 19. A compound of Formula (IA-laa) R 8 R 1 4 ,N 15 N R N N /R (IA-laa) in which R 8 is selected from the group consisting of -CF 3 , (C 1 -C 4 )alkyl, (C 1 -C4)alkoxy, 15 benzyloxy, (C 2 -C4)alkenyl and -S(O),R 12 in which v is 0 or 2 and R 12 is (C0 1 -C4)alkyl; R 5 and R 1 io are independently H or -CH 3 ; R 1 4 is H, -OH 3 or -C 2 H 5 and R' 5 is H, (Cl-CB)alkyl, benzyl or 4-F-benzyl-, where the R ' (Cl-Cs)alkyl group is optionally substituted with 1 to 3 substituents independently selected from the group consisting of F and -C(O)OR 12 in which R 12 is 20 (C 1 -C 4 )alkyl; or a pharmaceutically acceptable salt thereof..
20. The compound of claim 19 of Formula (IA-la) WO 2005/080373 PCT/IB2005/000167 150 CF 3 /RR O O N N'R / / O oo R10 (IA-la) 5 in which R 15 is H or (C 1 -C 6 )alkyl; or a pharmaceutically acceptable salt thereof.
21. The compound of the formula CF 3 H 0 N N H 10 or a pharmaceutically acceptable salt thereof.
22. The compound (S)-2-[(4'-trifluoromethyl-biphenyl-2-carbonyl)-amino]-quinoline-6 carboxylic acid (pentylcarbamoyl-phenyl-methyl)-amide or a pharmaceutically 15 acceptable salt thereof. WO 2005/080373 PCT/IB2005/000167 151
23. The compound of the formula 0 CH 3 ON N H F 5 or a pharmaceutically acceptable salt thereof.
24. The compound (S)-2-[(4'-tert-Butylbiphenyl-2-carbonyl)aminolquinoline-6 carboxylic acid {[(4-fluorobenzyl)methylcarbamoyl]phenylmethyl}amide or a pharmaceutically acceptable salt thereof. 10
25. A pharmaceutical composition which comprises a compound of any of claims 1 through 24 or a pharmaceutically acceptable salt thereof; and a pharmaceutically acceptable excipient, diluent or carrier. 15 26. The composition of claim 25 further comprising at least one additional pharmaceutical agent where said additional pharmaceutical agent is an antihypertensive agent, an anti-inflammatory agent, a lipid-lowering agent,'a cholesterol-lowering agent, an antidiabetes agent or an anti-obesity agent. 20 27. A method of treating obesity in an animal, which comprises administering to an animal in need of such treatment a therapeutically effective amount of a compound of any of claims 1 through 24 or a pharmaceutically acceptable salt thereof.
28. A method of treating obesity in an animal, which comprises administering to an 25 animal in need of such treatment a therapeutically effective amount of the compound of the formula WO 2005/080373 PCT/IB2005/000167 152 CF 3 0N H O N N IHH NJ N NI 0 H or a pharmaceutically acceptable salt thereof.
29. A method of treating obesity in an animal, which comprises administering to an 5 animal in need of such treatment a therapeutically effective amount of the compound of the formula 0 CH 3 N N N H N NI"r' F or a pharmaceutically acceptable salt thereof. 10 30. The method of claim 27, 28 or 29 in which said compound or pharmaceutically acceptable salt is administered in combination with at least one additional pharmaceutical agent.
31. The method of claim 30 in which said additional pharmaceutical agent is an anti 15 obesity agent. WO 2005/080373 PCT/IB2005/000167 153
32. A compound of Formula (F-1) (R8)-8 ) (R2 )M 22 ' ' OR 21 X , N N I 110 R (R 9 b (R)q (F-1) wherein R 2 , R 8 , R 9 , R 10 , X, m, p, and q are as defined in claim 1 and -OR 21 is a leaving 5 group that is displaceable with -OH under conditions of acid- or base-catalyzed hydrolysis or -OR 2 1 is -OH or a salt of the compound where -OR 1 is -OH; or of Formula (D) O H2N N (D) 10 or of Formula (D-G) (R 7 )n X 06 N R 1 5 I R H 2 N (D-G) wherein R 5 , R 6 , R 7 , X 1 and n are as defined in claim 1. WO 2005/080373 PCT/IB2005/000167 154
33. The compound of claim 32 of Formula (F-I') R 8 0 O OR21 N N 110 R 5 (F-I') where R 8 is -CF 3 or ( 1 Cl-C 4 )alkyl and R 2 1 is H, (Cl-C 4 )alkyl or benzyl or R 2 1 is H; or a salt of the compound where R 2 1 is H; or of Formula (D) 10 O H 2 N (D) or of Formula (D-Gi) 15 WO 2005/080373 PCT/IB2005/000167 155 .0 N HN N (D-G 1 ) wherein R 6 is (C1-C 8 )alkyl, 2-pyridyl or -C(O)N(R 1 4 )(R' 5 ) in which R 14 iS H, -CH 3 or -(C 2 H 5 ) and R 15 is (C-Cs)alkyl, benzyl or 4-fluorobenzyl.
AU2005214159A 2004-02-04 2005-01-24 Substituted quinoline compounds Abandoned AU2005214159A1 (en)
PCT/IB2005/000167 WO2005080373A1 (en) 2004-02-04 2005-01-24 Substituted quinoline compounds
AU2005214159A1 true AU2005214159A1 (en) 2005-09-01
AU2005214159A Abandoned AU2005214159A1 (en) 2004-02-04 2005-01-24 Substituted quinoline compounds
BR (1) BRPI0507462A (en)
CR (1) CR8544A (en)
EA (1) EA010369B1 (en)
EC (1) ECSP066717A (en)
GE (1) GEP20084360B (en)
IL (2) IL176715D0 (en)
NL (1) NL1028192C2 (en)
NO (1) NO20063928L (en)
OA (1) OA13365A (en)
PA (1) PA8623001A1 (en)
PE (1) PE07732005A1 (en)
SV (1) SV2007002007A (en)
UY (1) UY28734A1 (en)
EP1682537B1 (en) 2003-11-05 2012-03-28 SARcode Bioscience Inc. Modulators of cellular adhesion
AU2005214159A1 (en) * 2004-02-04 2005-09-01 Pfizer Products Inc. Substituted quinoline compounds
US7262318B2 (en) * 2004-03-10 2007-08-28 Pfizer, Inc. Substituted heteroaryl- and phenylsulfamoyl compounds
JP2007532638A (en) * 2004-04-14 2007-11-15 アストラゼネカ・アクチエボラーグAstrazeneca Aktiebolag Nk1 Arylglycinamides derivatives as antagonists and serotonin reuptake inhibitors and uses thereof
PA8660701A1 (en) 2005-02-04 2006-09-22 Pfizer Prod Inc PYY agonists and their uses
EA024768B1 (en) 2005-04-19 2016-10-31 Сюрфэйс Лоджикс, Инк. Inhibitors of microsomal triglyceride transfer protein and apo-b secretion
WO2008050199A2 (en) * 2006-10-23 2008-05-02 Pfizer Japan Inc. Substituted phenylmethyl bicyclocarboxyamide compounds
WO2008059335A1 (en) 2006-11-13 2008-05-22 Pfizer Products Inc. Diaryl, dipyridinyl and aryl-pyridinyl derivatives and uses thereof
EP2115368A1 (en) * 2007-02-02 2009-11-11 Steve D. Shivvers High efficiency drier with multi stage heating and drying zones
US20080249130A1 (en) * 2007-02-09 2008-10-09 Sirtris Pharmaceuticals, Inc. Gut microsomal triglyceride transport protein inhibitors
WO2009014674A1 (en) * 2007-07-23 2009-01-29 Sirtris Pharmaceuticals, Inc. Heterocyclylamides as gut microsomal triglyceride transport protein inhibitors
CA2702577A1 (en) 2007-10-15 2009-04-23 Jbs United, Inc. Method for increasing performance of offspring
WO2009054914A1 (en) * 2007-10-19 2009-04-30 Sarcode Corporation Compositions and methods for treatment of diabetic retinopathy
WO2010018547A1 (en) * 2008-08-13 2010-02-18 Pfizer Inc. Aminoquinoline compounds
EP2723717A2 (en) 2011-06-24 2014-04-30 Amgen Inc. Trpm8 antagonists and their use in treatments
US8778941B2 (en) 2011-06-24 2014-07-15 Amgen Inc. TRPM8 antagonists and their use in treatments
JP6097289B2 (en) * 2011-08-04 2017-03-15 アレイ バイオファーマ、インコーポレイテッド Quinazoline compound as a serine / threonine kinase inhibitors
US8952009B2 (en) 2012-08-06 2015-02-10 Amgen Inc. Chroman derivatives as TRPM8 inhibitors
EP3107540A4 (en) * 2014-02-17 2017-08-30 Hetero Research Foundation Polymorphs of lomitapide and its salts
BR112017007167A2 (en) 2014-10-06 2018-04-10 Vertex Pharma conductance regulator modulators of cystic fibrosis transmembrane
US10138206B2 (en) 2014-10-09 2018-11-27 Glenmark Pharmaceuticals Limited Amorphous form of lomitapide mesylate
DE2819039A1 (en) 1978-04-29 1979-11-08 Bayer Ag Sizing agents for paper
FI820825L (en) 1981-03-11 1982-09-12 Wellcome Found and substituted difenylfoereningar
AT159426T (en) 1991-04-16 1997-11-15 Nippon Shinyaku Co Ltd A process for producing a solid dispersion
HU218419B (en) 1992-03-06 2000-08-28 E.R. Squibb And Sons, Inc. Microsomal triglyceride transfer protein (MTP) and for producing the protein, and methods for detecting inhibitors of the high molecular weight subunit of the recombinant
US5739135A (en) 1993-09-03 1998-04-14 Bristol-Myers Squibb Company Inhibitors of microsomal triglyceride transfer protein and method
US5595872A (en) 1992-03-06 1997-01-21 Bristol-Myers Squibb Company Nucleic acids encoding microsomal trigyceride transfer protein
CA2191352C (en) 1994-05-27 2001-01-30 Carlo Farina Quinoline derivatives as tachykinin nk3 receptor antagonists
DE19504832A1 (en) 1995-02-14 1996-08-22 Basf Ag Solid drug preparations
DE19519245C2 (en) * 1995-04-14 2003-04-30 Boehringer Ingelheim Kg New arylglycinamide derivatives, processes for their preparation and to pharmaceutical compositions
DE69529849T2 (en) 1995-06-07 2003-09-04 Pfizer Biphenyl-2-carboxylic acid-tetrahydro-isoquinolin-6-yl amide derivatives, their secretion operations department and their use as inhibitors of microsomal triglyceride transfer protein and / or apolipoprotein B (apo B)
EP0832069B1 (en) 1995-06-07 2003-03-05 Pfizer Inc. BIPHENYL-2-CARBOXYLIC ACID-TETRAHYDRO-ISOQUINOLIN-6-YL AMIDE DERIVATIVES, THEIR PREPARATION AND THEIR USE AS INHIBITORS OF MICROSOMAL TRIGLYCERIDE TRANSFER PROTEIN AND/OR APOLIPOPROTEIN B (Apo B) SECRETION
CA2252531A1 (en) 1996-05-20 1997-11-27 Darwin Discovery Limited Quinoline carboxamides as tnf inhibitors and as pde-iv inhibitors
IL121203A (en) 1996-07-01 2001-04-30 Lilly Co Eli 1, 2, 3, 4-tetrahydroisoquinidines, process for their preparation and pharmaceutical compositions containing the same for treating hyperglycemia and hyperlipidemia
KR100217618B1 (en) * 1996-12-12 1999-09-01 정몽규 Apparatus for controlling the position of washer water
WO1998027979A1 (en) 1996-12-20 1998-07-02 Bristol-Myers Squibb Company Heterocyclic inhibitors of microsomal triglyceride transfer protein and method
US6066653A (en) 1997-01-17 2000-05-23 Bristol-Myers Squibb Co. Method of treating acid lipase deficiency diseases with an MTP inhibitor and cholesterol lowering drugs
US5968950A (en) 1997-06-23 1999-10-19 Pfizer Inc Apo B-secretion/MTP inhibitor hydrochloride salt
DK0901786T3 (en) 1997-08-11 2007-10-08 Pfizer Prod Inc Solid pharmaceutical dispersions possess increased bioavailability
AP1201A (en) 1997-09-17 2003-09-01 Smithkline Beecham Corp Method for the synthesis of quinoline derivatives.
BR9814323A (en) 1997-12-22 2004-06-29 Upjohn Co 4-hydroxyquinoline-3-carboxamides and hydrazides as antiviral agents
CO5090829A1 (en) 1998-07-21 2001-10-30 Novartis Ag Organic compounds of formula I are useful as inhibited res transfer protein microso bad triglyceride and secretion of apolipoprotein b.
CO5271688A1 (en) 1999-11-10 2003-04-30 Pfizer Prod Inc Using inhibitor secretion by Apolipoproteins / or transfer protein microsmales triglycerides
CA2325358C (en) 1999-11-10 2005-08-02 Pfizer Products Inc. 7-¬(4'-trifluoromethyl-biphenyl-2-carbonyl)amino|-quinoline-3-carboxylic acid amides, and methods of inhibiting the secretion of apolipoprotein b
US20020032238A1 (en) 2000-07-08 2002-03-14 Henning Priepke Biphenylcarboxylic acid amides, the preparation thereof and the use thereof as medicaments
US6417367B1 (en) 2000-08-11 2002-07-09 Pfizer Inc. Methods of making quinoline amides
IL155196D0 (en) 2000-10-05 2003-11-23 Fujisawa Pharmaceutical Co Benzamide derivatives and pharmaceutical compositions containing the same
CA2451474C (en) 2001-06-28 2009-06-16 Pfizer Products Inc. Triamide-substituted indoles, benzofuranes and benzothiophenes as inhibitors of microsomal triglyceride transfer protein (mtp) and/or apolipoprotein b (apo b) secretion
CZ2004634A3 (en) * 2001-10-25 2004-10-13 Takedaáchemicaláindustriesźáltd Quinoline compound, process for its preparation and pharmaceutical composition in which the compound is comprised
CA2468989A1 (en) * 2001-12-07 2003-06-19 Daniel M. Schwartz Treatment for age-related macular degeneration
US20030162788A1 (en) 2002-01-10 2003-08-28 Boehringer Ingelheim Pharma Kg Combination of MTP inhibitors or apoB-secretion inhibitors with fibrates for use as pharmaceuticals
RU2293721C2 (en) 2002-02-28 2007-02-20 Джапан Тобакко Инк. Ester compounds and their using in medicine
WO2004056775A1 (en) * 2002-12-20 2004-07-08 Pfizer Products Inc. Microsomal triglyceride transfer protein inhibitors
EP1578725A1 (en) * 2002-12-20 2005-09-28 Pfizer Products Inc. Microsomal triglyceride transfer protein inhibitors
2005-01-24 BR BRPI0507462-2A patent/BRPI0507462A/en not_active IP Right Cessation
2005-01-24 GE GEAP2005009563 patent/GEP20084360B/en unknown
2005-01-24 KR KR1020067015770A patent/KR100799802B1/en not_active IP Right Cessation
2005-01-24 EA EA200601239A patent/EA010369B1/en not_active IP Right Cessation
2005-01-24 OA OA1200600247A patent/OA13365A/en unknown
2005-02-02 UY UY28734A patent/UY28734A1/en unknown
2005-02-02 PE PE0001252005A patent/PE07732005A1/en not_active Application Discontinuation
2005-02-02 AR ARP050100394 patent/AR047529A1/en not_active Application Discontinuation
2005-02-03 TW TW97141214A patent/TW200906800A/en unknown
2005-02-03 TW TW94103301A patent/TWI306454B/en not_active IP Right Cessation
2005-02-04 SV SV2005002007A patent/SV2007002007A/en not_active Application Discontinuation
2005-02-04 NL NL1028192A patent/NL1028192C2/en not_active IP Right Cessation
2005-02-04 PA PA8623001A patent/PA8623001A1/en unknown
2006-07-05 IL IL17671506A patent/IL176715D0/en unknown
2006-07-21 EC ECSP066717 patent/ECSP066717A/en unknown
2006-07-28 CO CO06074303A patent/CO5700721A2/en not_active Application Discontinuation
2006-08-03 CR CR8544A patent/CR8544A/en not_active Application Discontinuation
2006-09-01 NO NO20063928A patent/NO20063928L/en not_active Application Discontinuation
NO20063928L (en) 2006-10-31
BRPI0507462A (en) 2007-07-10
EA200601239A1 (en) 2007-02-27
PA8623001A1 (en) 2006-03-24
ECSP066717A (en) 2006-10-31
CR8544A (en) 2006-11-30
GEP20084360B (en) 2008-04-29
EA010369B1 (en) 2008-08-29
UY28734A1 (en) 2005-09-30
NL1028192A1 (en) 2005-08-08
NL1028192C2 (en) 2006-05-30
SV2007002007A (en) 2007-03-20
OA13365A (en) 2007-04-13
PE07732005A1 (en) 2005-10-26
AU738037B2 (en) 2001-09-06 Nicotinamide derivatives
JP3270764B2 (en) 2002-04-02 Apo b- secretion / mtp inhibitory amide
CN100383141C (en) 2008-04-23 Pyrazolo [4,3-d] pyrimidine derivatives
US5929097A (en) 1999-07-27 Preparation and use of ortho-sulfonamido aryl hydroxamic acids as matrix metalloproteinase and tace inhibitors
JP4471665B2 (en) 2010-06-02 Useful benzamide derivatives as histone deacetylase inhibitors
CN101981011B (en) 2014-05-07 Pyridyl derivatives as CFTR modulators
JP4327915B2 (en) 2009-09-09 Sulfonamide derivative
JP5766708B2 (en) 2015-08-19 Imidazo [4,5-c] quinoline derivatives as bromodomain inhibitors
ES2401079T3 (en) 2013-04-16 Modulators of asthma and allergic inflammation
CN1993327B (en) 2013-02-06 3-Carbamoyl-2-pyridone derivative
KR100772297B1 (en) 2007-11-02 Fused Bicyclic Nitrogen-Containing Heterocycles
JP4719469B2 (en) 2011-07-06 Substituted amides
US6518273B1 (en) 2003-02-11 2-aryl indole derivative as antagonists of tachykinins
CN100369898C (en) 2008-02-20 Nicotinamide derivates useful as p38 inhibitors
US20050197364A1 (en) 2005-09-08 Amide compounds as ion channel ligands and uses thereof
KR101107896B1 (en) 2012-01-25 3-pyridinecarboxamide and 2-pyrazinecarboxamide derivatives as hdl-cholesterol raising agents
CN1169795C (en) 2004-10-06 Cycloamine substituted nitrogenous heterocyclic compounds and its composition
US20060030580A1 (en) 2006-02-09 Method for decreasing opioid metabolism
US9101616B2 (en) 2015-08-11 Aryl substituted carboxamide derivatives as calcium or sodium channel blockers
US20030149056A1 (en) 2003-08-07 3-cyanoquinolines as inhibitors of EGF-R and HER2 kinases
US6720351B2 (en) 2004-04-13 Triamide-substituted heterobicyclic compounds
AU2003276802B2 (en) 2007-03-08 2-pyridone derivatives as inhibitors of neutrophile elastase
US20060270668A1 (en) 2006-11-30 Methods of synthesizing substituted 3-cyanoquinolines and intermediates thereof
US8420823B2 (en) 2013-04-16 Long-chain fatty acyl elongase inhibitor comprising arylsulfonyl derivative as active ingredient
KR100225713B1 (en) 1999-10-15 Therapeutic amides
2011-12-22 MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted
|
cc/2019-30/en_middle_0056.json.gz/line12426
|
__label__cc
| 0.627752
| 0.372248
|
Projects of the Margery Somers Foster Center
http://www.libraries.rutgers.edu/rul/libs/foster/web.shtml
Rutgers University Libraries: Libraries & Collections: Margery Somers Foster Center
http://www.libraries.rutgers.edu/rul/libs/foster/web.shtml[10/31/11 5:34:17 PM]
ASK A LIBRARIAN LIVE! HOURS & DIRECTIONS SEARCH SITE SITE INDEX FACULTY SERVICES
LIBRARIES HOME
FIND ARTICLES WITH
FIND RESERVES
RUCORE/INSTITUTIONAL
CONNECT FROM OFF-
GIVING TO THE RUTGERS
ALUMNI LIBRARY
RETURN TO RUTGERS
About the Libraries: Libraries & Digital Centers: Margery Somers Foster Center:
The Feminist Art Project
The Feminist Art Project is a national initiative from 2006-2009 and beyond,
based at the Foster Center, that celebrate women's contributions to the
visual arts and the Feminist Art Movement.
The New Jersey Women's History Website
A resource for students, teachers, and all interested people who want to
know more about the history of New Jersey women.
Women Artists Archives National Directory (WAAND)
WAAND, The Women Artists Archives National Directory, is an innovative
online directory to U.S. archival collections of primary source materials by
and about women visual artists and women artists' organizations active in
the U.S. since 1945.
Women In Leadership Database (WILD)
A browsable and searchable database of information on women in the field
of leadership.
Last updated December 8, 2010
URL: http://www.libraries.rutgers.edu/rul/libs/foster/web.shtml
|
cc/2019-30/en_middle_0056.json.gz/line12431
|
__label__cc
| 0.722492
| 0.277508
|
The effects of introduction of the Moscow Central Circle rail passenger service: transport, urban, economic and travel behaviour consequences
P. 23-23.
Muleev Y. Y., Koncheva E., Kotov E., Stakhno D., Нифонтова К. А., Горбатюк С. Ю., Глушкова Т. В., Долецкая О. А.
In 2016 passenger service on the Moscow Central Circle (MCC, a circular urban rail line in Moscow) was reintroduced after its closure in 1934. The launch of this line allowed us to study the effects of a transport infrastructure project using observed rather than model-forecasted data.
We collected empirical data on changes in real estate values, land use, transportation flows and travel behaviour as consequences of integration of the new rail line into existing urban transit system.
The research project consists of several parts. First, we studied residential rent rates. The rent growth effect was most substantial in the residential areas around Moscow Central Circle stations without access to existing metro stations.
Second, we used the Node-Place model to evaluate the magnitude of the potential (and officially planned) land use changes in the long-run, i.e. the increase in the place value. We revealed that the long-term MCC impact is modest, because the opportunities for land use change around the MCC stations are currently limited and therefore the increased node value is not accompanied by the proportional change of the place value.
Third, we used Moscow Metro origin-destination matrices for typical working days in March 2016 and March 2017 to evaluate the impact of the MCC on the redistribution of passenger traffic volumes. We observed an insignificant decline in load level of Metro Circle line and radial lines and interchanges in the city centre.
Finally, we studied changes in travel behaviour. The majority of respondents do not use the MCC to reach locations near new stations but use it mostly to optimise their existing routes, which also supports the findings of the relatively low place value of the territories around the new stations.
Repeating the same measurements regularly will allow us to monitor the changes in the use of the MCC and track its performance and its effects over time. This paper covers the short-term effects that occurred in the first 12 months of the MCC operation.
Full text (PDF, 52 Kb)
Keywords: transport projects evaluationtransport accessibilitytransport planningurban planning
Publication based on the results of: Московское центральное кольцо: оценка транспортных и градостроительных последствий(2017)
Towards Human Scale Cities - Open and Happy. 15th biennial NECTAR conference. 5-7 June 2019
Muleev Y. Y., Koncheva E., Kotov E. et al. Helsinki: University of Helsinki, 2019.
Публичная защита и плюрализм в планировании
Давидофф П. Journal of the American Planning Association, США. 1965. Т. 31. № 4. С. 331-338.
City planning is a means for determining policy, appropriate policy in a democracy is determined through political debate. The right course of action is always a matter of choice, never of fact. Planners should engage in the political process as advocates of the interests of government and other groups. Intelligent choice about public policy would be aided if different political, social, and economic interests produced city plans. Plural plans rather than a single agency plan should be presented to the public. Politicizing the planning process requires that the planning function be located in either or both the executive and legislative branches and the scope of planning be broadened to include all areas of interest to the public.
Москва: курс на полицентричность. Оценка эффектов градостроительных проектов на полицентрическое развитие Москвы
Котов Е. А., Гончаров Р. В., Новиков А. В. и др. М.: НИУ ВШЭ, 2016.
Added: Nov 5, 2016
Planning Positioning in the Global Crises: Proceedings of the International conference on Urban and Regional Planning. Celebrating 50th Anniversary of Planning Education in Indonesia
Bandung: Institut Teknologi Bandung, 2009.
This International Conference "Positioning Planning in the Global Crises" aims to bring together researchers, scientists, practicioners and students to exchange and share their experiences, new ideas, and research results about all aspects of Urban, Regional Planning, and discuss the practical challenges encountered and the solutions adopted.
City as a geopolitics: Tbilisi, Georgia — A globalizing metropolis in a turbulent region
Salukvadze J., Golubchikov O. Cities. 2016. Vol. 52. P. 39-54.
Tbilisi, a city of over a million, is the national capital of Georgia. Although little explored in urban studies, the city epitomizes a fascinating assemblage of processes that can illuminate the interplay of geopolitics, political choices, globalization discourses, histories, and urban contestations in shaping urban transformations. Tbilisi's strategic location in the South Caucasus, at the juncture of major historical empires and religions in Eurasia, has ensured its turbulent history and a polyphony of cultural influences. Following Georgia's independence in 1991, Tbilisi found itself as the pivot of Georgian nation-building. Transition to a market economy also exposed the city to economic hardship, ethnical homogenization, and the informalization of the urban environment. The economic recovery since the early 2000s has activated urban regeneration. Georgia's government has recently promoted flagship urban development projects in pursuit of making Tbilisi as a modern globalizing metropolis. This has brought contradictions, such as undermining the city's heritage, contributing to socio-spatial polarization, and deteriorating the city's public spaces. The elitist processes of decision-making and a lack of a consistent urban policy and planning regimes are argued to be among major impediments for a more sustainable development of this city.
48th ISOCARP Congress -2012
Трансформация центральных мест Самары как показатель социальных изменений. Стимуляция или естественное развитие
Стадников В. Э. Управление развитием территории. 2015. № 3. С. 25-30.
Сопоставление фактической и когнитивной доступности городского пространства на примере г. Витебск
Гончаров Р. В., Сапанов П. М., Яшунский А. Д. В кн.: Вопросы экономической и политической географии зарубежных стран. Смоленск: Ойкумена, 2015. С. 229-241.
Arctic Modernism: New Urbanisation Models for the Soviet Far North in the 1960s
Kalemeneva E. A. In bk.: Competing Arctic Futures: Historical and Contemporary Perspectives. Palgrave Macmillan, 2018. Ch. 10. P. 213-241.
Industrialisation and social transformations changed the landscapes of the Soviet Arctic and stimulated discussions about the models of its domestication. Numerous industrial towns in the Soviet Far North in the 1930s were established next to Gulag labour camps. The attempt of technical, social and visual re-conceptualisation of urban space in the Soviet Arctic related to several reforms of the post-Stalin period. This chapter analyses how Leningrad architects since the 1950s used modernist urban projects for the realisation of their professional and personal ambitions trying to create a new conception of a “normal city” in extreme climate. While most were not implemented, their appearance shows the shift of the attitude toward the North in the USSR as well as the controversial changes of experts’ position.
|
cc/2019-30/en_middle_0056.json.gz/line12432
|
__label__cc
| 0.5854
| 0.4146
|
Increase your business with YouTube, the online video site and now the second largest search engine. Discover the power of video for your organization, and how to use video as a marketing tool to reach and serve more people. Find out what types of video work best on YouTube, how other business organizations are using YouTube, how to create your own YouTube channel, and the techniques of adding captions, annotations and other extra features. YouTube can enhance your current marketing and communication strategy. After attending this course you will take back proven strategies and techniques for making YouTube work successfully for your organization. YouTube, as the second largest search engine can no longer be ignored by businesses and organizations. YouTube reaches a broad age and gender demographic and is the largest video search/discovery destination with over 35 hours of video being uploaded every minute. Agenda Unit 1: Designing Marketing Goals for YouTube that Maximize the Platform Learn what types of video work best on YouTube Adapt your marketing plan to include video and goals for the YouTube platform Discuss YouTube case studies from your industry and evaluate what’s working and what’s not Create a content plan for videos that will work for your business or organization and won’t get you banned from YouTube Understand how to use YouTube search features and other elements from a consumer perspective Unit 2: Building and Optimizing Your YouTube Channel Learn the various elements of a YouTube Channel and how each feature works Create your own YouTube Channel and optimize each feature Discuss channel design and settings that fit with your video marketing goals Discover how to embed YouTube videos on your website that maximize views Unit 3: Driving Traffic: Maximizing the Social Network of YouTube Learn about the power of YouTube as a social network Discover why it is important to have subscribers and how to communicate with them internally within YouTube Understand the analytics of YouTube: Views, Ratings, Comments, Favorites Learning to Read YouTube Insight & Analyzing the Data Unit 4: Creating and Distributing Video on YouTube Learn how to upload video, the types of cameras, formats, and video resolution that work best on YouTube, and tools that streamline the process Understand the essential element in a video on YouTube such as graphics, title, tags, description, etc. and how to optimize them for search Discover how to get your videos to appear in related searches and other secrets of the YouTube Algorithm Explore the extra features in YouTube such as editing, private sharing, captions, annotating, audio swap, etc. YouTube is now accessible from nearly every top mobile device as well as from your TV. How can your videos rise above the music mashups and cat antics? Learn how to get your YouTube video on the first page of Google Search. Just like Facebook, YouTube is a social network that needs to be set-up, optimized, and used regularly to be effective. Your patters of behavior on YouTube may be working against you. Learn how YouTube can compliment your current marketing and social media strategy and how to maximize your YouTube Channel to get the greatest return.
|
cc/2019-30/en_middle_0056.json.gz/line12434
|
__label__cc
| 0.582138
| 0.417862
|
Fort Bliss, Texas in 1950’s:
December 15, 2018 by redleg12771 ♥ 0 Leave a Comment
Blessed Mother…Pray For Me And My Family:
Salt-N-Pepa – Push It:
James 1 King James Version (KJV):
James, a servant of God and of the Lord Jesus Christ, to the twelve tribes which are scattered abroad, greeting.
2 My brethren, count it all joy when ye fall into divers temptations;
3 Knowing this, that the trying of your faith worketh patience.
4 But let patience have her perfect work, that ye may be perfect and entire, wanting nothing.
5 If any of you lack wisdom, let him ask of God, that giveth to all men liberally, and upbraideth not; and it shall be given him.
6 But let him ask in faith, nothing wavering. For he that wavereth is like a wave of the sea driven with the wind and tossed.
7 For let not that man think that he shall receive any thing of the Lord.
8 A double minded man is unstable in all his ways.
9 Let the brother of low degree rejoice in that he is exalted:
10 But the rich, in that he is made low: because as the flower of the grass he shall pass away.
11 For the sun is no sooner risen with a burning heat, but it withereth the grass, and the flower thereof falleth, and the grace of the fashion of it perisheth: so also shall the rich man fade away in his ways.
12 Blessed is the man that endureth temptation: for when he is tried, he shall receive the crown of life, which the Lord hath promised to them that love him.
13 Let no man say when he is tempted, I am tempted of God: for God cannot be tempted with evil, neither tempteth he any man:
14 But every man is tempted, when he is drawn away of his own lust, and enticed.
15 Then when lust hath conceived, it bringeth forth sin: and sin, when it is finished, bringeth forth death.
16 Do not err, my beloved brethren.
17 Every good gift and every perfect gift is from above, and cometh down from the Father of lights, with whom is no variableness, neither shadow of turning.
18 Of his own will begat he us with the word of truth, that we should be a kind of firstfruits of his creatures.
19 Wherefore, my beloved brethren, let every man be swift to hear, slow to speak, slow to wrath:
20 For the wrath of man worketh not the righteousness of God.
21 Wherefore lay apart all filthiness and superfluity of naughtiness, and receive with meekness the engrafted word, which is able to save your souls.
22 But be ye doers of the word, and not hearers only, deceiving your own selves.
23 For if any be a hearer of the word, and not a doer, he is like unto a man beholding his natural face in a glass:
24 For he beholdeth himself, and goeth his way, and straightway forgetteth what manner of man he was.
25 But whoso looketh into the perfect law of liberty, and continueth therein, he being not a forgetful hearer, but a doer of the work, this man shall be blessed in his deed.
26 If any man among you seem to be religious, and bridleth not his tongue, but deceiveth his own heart, this man’s religion is vain.
27 Pure religion and undefiled before God and the Father is this, To visit the fatherless and widows in their affliction, and to keep himself unspotted from the world.
Tips for Coping with an Awful Day:
1. Distract yourself. Let your mind wander and think about fun things you’ve planned; or watch a funny movie; or call up a friend.
2. Play your favourite music.
3. Try and balance out your terrible day by thinking of something that went really well (and maybe unexpectedly well) recently.
4. Try and squeeze in time for exercise. The endorphins this releases will help to lift your mood.
5. Don’t isolate yourself. Research shows that we generally feel better if we spend time with others, rather than retreating and being on our own.
6. Try to maintain perspective. Ask yourself, “How much will this matter – a week, month or year from now?”
7. Try journaling. Many people find that just writing things down helps to drain away the negativity.
8. Go to bed early and try to fall asleep … And remember that tomorrow is another day.
Cohen’s Account Of Russia Talks Raises Questions About Trump Jr. 2017 Testimony: (Lock Him Up!)
December 1, 2018 by redleg12771 ♥ 0 Leave a Comment
Editor’s note: An earlier version of this report mischaracterized an answer Donald Trump Jr. gave to Senate investigators in 2017 about the prospective projects his family was negotiating with people in Moscow.
The story reported that Trump Jr.’s response — that negotiations on one project concluded by the end of 2014 — contrasted with the version of events as laid out in the guilty plea by Michael Cohen on Thursday. In fact, Trump Jr. and investigators were alluding to a different set of negotiations — not to a deal that Cohen was reportedly pursuing. Trump Jr. did acknowledge in his testimony that Cohen and another man were exploring a possible deal in Moscow in 2015 or 2016.
Trump Jr. did not address what Cohen has now admitted — that talks about such a deal continued at least into June 2016, longer than previously known and well into the presidential campaign.
This week’s guilty plea by Donald Trump’s ex-attorney Michael Cohen has raised questions about Donald Trump Jr.’s testimony to Congress regarding his family’s real estate negotiations with powerful Russians.
Trump Jr. told the Senate Judiciary Committee in September 2017 that he was only “peripherally aware” of negotiations that Cohen has admitted to carrying on through June 2016.
Cohen said in his guilty plea that he had briefed Trump’s family members about his talks, although the court documents don’t specify who.
Trump Jr. also told Senate investigators that he wasn’t aware that Cohen had reached out to the press secretary for Vladimir Putin as part of his talks with Moscow about a putative new Trump Tower project there.
Cohen had previously told Congress that although he emailed Putin’s spokesman, Dmitry Peskov, he hadn’t heard back, and the discussions with people in Moscow concluded by January 2016.
Cohen then acknowledged in his guilty plea that, in fact, Peskov had responded to him and he and others had continued negotiations about the project until after Trump had become the presumptive GOP nominee.
Trump Jr.’s answers allude to a number of prospective projects; he was asked by Senate investigators about news reports about a Trump Tower Moscow negotiation that took place in 2015 and 2016, which he acknowledged but did not detail.
Looking “lightly”
An attorney for Trump Jr. didn’t immediately respond to a request for comment on this story.
Earlier this year, when other potential discrepancies arose between what Cohen was saying and what Trump Jr. told Congress, attorney Alan Futerfas stood by Trump Jr.’s testimony.
“Donald Trump Jr. has been professional and responsible throughout the Mueller and congressional investigations,” he said in the summer. “We are very confident of the accuracy and reliability of the information that has been provided by Mr. Trump Jr., and on his behalf.”
Separately, an attorney for President Trump, Rudy Giuliani, said on Thursday that no laws have been broken and that the information that underpins Cohen’s plea actually came from the Trump Organization — confirming that it has been supporting the ongoing investigations.
“Michael Cohen is a liar,” Giuliani said. “It’s no surprise that Cohen lied to Congress. He’s a proven liar who is doing everything he can to get out of a long-term prison sentence for serious crimes of bank and tax fraud that had nothing to do with the Trump Organization.”
Continued Giuliani: “It is important to understand that documents that the special counsel’s office is using to show that Cohen lied to Congress were voluntarily disclosed by the Trump Organization because there was nothing to hide.”
President Trump downplayed the importance of the negotiations in a Twitter post on Friday that said he’d only “lightly” looked into a Moscow project and underscored how it never moved forward.
….Lightly looked at doing a building somewhere in Russia. Put up zero money, zero guarantees and didn’t do the project. Witch Hunt!
The shift in understanding of the events of 2016 provided by Cohen is important for a few reasons:
First, it called into question the Trump family’s denials about having business dealings with Russians. Second, it confirmed the Trumps had a channel open with powerful Russians at the same time the Russian government was waging a widespread campaign of “active measures” against the United States.
And third, it put the Russian government and others in Moscow in the position of being able to know, confidentially, the truth about the Trump family’s denials about negotiations over the Moscow real estate deals.
According to Trump Jr. and others who have spoken to Congress, the Trump family negotiated one of its potential projects with Moscow real estate billionaire Aras Agalarov and his family.
Aras and his son Emin also were in the chain of contacts used to convey an offer of help for the Trump campaign from the Russian government to Trump Jr., one that yielded a meeting in New York City in June 2016. Trump Jr. and other top campaign leaders hosted a delegation they believed would deliver dirt on Hillary Clinton.
A representative for the Agalarovs, Ike Kaveladze, also attended that conference on June 9 in New York City. Aras Agalarov asked him to attend, he told Senate investigators. He was briefed beforehand about the presentation he said attorney Natalia Veselnitskaya intended to give, Kaveladze said.
The Russians intended to tell the Trump campaign leaders about what they called a scheme involving American investors funneling money to the Democratic National Committee, Kaveladze told investigators.
The contrasts between Cohen’s statement and Trump Jr’s version of events may complicate potential legal problems for Trump Jr. Although seldom prosecuted, lying to Congress is against the law — as evidenced by Cohen’s plea.
Sen. Richard Burr, R-N.C., chairman of the Senate intelligence committee, said he has made referrals to the office of Justice Department special counsel Robert Mueller because he said he believed people hadn’t given his committee the truth.
He declined to identify who might be involved or how often he has referred cases to Mueller, but Burr did allude to Cohen’s plea as an example of what he called the consequences that could be involved.
“One instance just highlighted of late is that the special prosecutor made an indictment yesterday using the transcripts of interviews we have done in our committee to indict somebody for lying to Congress,” Burr said on Friday.
“It’s a loud message to everybody that is interviewed by our committee. … If you lie to us we’re going to go after you.”
Trump Jr. was advised in his Senate Judiciary Committee interview that although he hadn’t sworn an oath to tell the truth, he was required by law to answer questions from Congress truthfully. He was asked whether he understood that.
“I do,” Trump Jr. answered.
BY: PHILIP EWING
NPR reporter Tim Mak contributed to this report.
|
cc/2019-30/en_middle_0056.json.gz/line12438
|
__label__cc
| 0.524828
| 0.475172
|
[Updated] You Only Die Twice: the confusing end of the Russian Kosmos 2495 Kobalt-M spy satellite mission
Update 15:00 UT, Sep 11: a very brief update confirming the object was artificial is provided at the end of this post
Introduction: a spectacular fireball over the USA on September 2-3
In the evening of September 2 (in local time: early September 3 in UT), 2014, a spectacular event was seen and filmed in the skies over the southwestern States of the USA. A very slow fireball crossed the skies, seen by many casual eyewitnesses in several US States who reported their observations to the American Meteor Society (AMS). It was also captured by a number of all-sky video stations. A very nice compilation of images and what is known and what is still debated, has been made by Spaceflight101 on their website. Below is imagery of the event by Thomas Ashcraft from near Lamy, New Mexico:
video footage by Thomas Ashcraft, New Mexico, USA
The event happened on September 3, 2014, between 4:31-4:33 UT (the evening of September 2 in local time) and was seen from Colorado, Wyoming and New Mexico. A very slow fireball, with a duration of at least 40 seconds and variable in brightness in what looks like a semi-regular pattern, moved across almost 180 degrees of sky. It penetrated deeply into the atmosphere, leaving a debris cloud at low altitude lingering for 30 minutes, detected by Doppler weather radar.
Lingering debris cloud on Doppler radar after the event (image: Rob Matson)
Initially seen as a meteor event, it was somewhat ignored by the amateur satellite community until brought to their attention a few days later.
Suspicion of a satellite re-entry
The suspicion arose that this was in fact a satellite re-entry, with the prime candidate being Kosmos 2495 (2014-025A), a Russian Kobalt-M/Yantar 4K2M photoreturn spy satellite. This is a satellite that uses analogue film rather than electronic image sensors. The exposed film is returned to earth in three recoverable return capsules, the last of which also returns the camera (for re-use).
In terms of duration, the September 2-3 event is a borderline case: with a duration of at least 40 seconds but possibly a minute or more, both a very slow 11.8 km/s meteoric fireball of asteroidal origin, or the decay of an artificial satellite are possibilities. [but see update at the end of this post: NASA camera data show it was not a meteor but an object entering from Low Earth Orbit, i.e. a satellite]
Timing and path over the sky however closely match predictions for Kosmos 2495. The observed object passed only ~3 minutes earlier than the predicted pass of the satellite, in a very similar trajectory. This actually fits with a decay, as in a lower orbit the object starts to slightly speed ahead of an object in a similar but higher orbit. The slight eastern displacement of the sky track also fits with this: in a few minutes time, the earth rotates under the orbital plane slightly, displacing the sky track westwards.
Predicted Kosmos 2495 sky trajectory for Thomas Ashcraft's site in Lamy, New Mexico. Note remarks in text about slightly eastward displacement of trajectory for a slightly earlier passing object in the same orbital plane, relative to the sky trajectory shown here
(click image to enlarge)
As this satellite should have been in earth shadow at that time of the event and hence not illuminated by the sun, it is immediately clear that if this was Kosmos 2495, it was in the act of re-entering and already producing a plasma envelope (a fireball).
[paragraph slightly rewritten 12:10 UT, Sep 11]
But why? The last known orbital element set for the satellite with epoch 2 Sep 17:12 UT show it at an orbital altitude too high for an imminent natural decay.
JSpOC however issued an "administrative decay" for the satellite early on September 3, an indication that it has been deliberately de-orbited.
Yet it was unlikely that the Russian military intended this satellite to re-enter over the USA instead of over Russia itself, or over the Pacific.
So, if this was Kosmos 2495, did something go wrong? It initially looked like it.
Then came the confusion
Then came the confusion. On the Seesat-list, Ted Molczan reported having received reports of sightings of a re-entry earlier that same day, near 18:14 UT on September 2, seen over southwest Kazachstan. A number of video's exist of this event and show a glowing object followed at some distance by a cloud of glowing fragments.
footage from Kazachstan
The location of these observations, timing and general direction fits well with an object on a trajectory to Orenburg in Russia, the designated touchdown locality of the Kobalt-M re-entry capsules. Indeed, the timing of the observations (~18:14 UT) matches a pass of Kosmos 2495 over the area, and the trajectory of the latter indeed brings it over Orenburg near that same time.
So if this was the Kosmos 2495 re-entry over southwest Kazachstan and the Kaspian sea, then what was it that re-entered over the USA 10 hours later?
Next, the Russian military weighed in and flatly denied that anything went wrong with Kosmos 2495, implicitly suggesting that the object decaying over the USA was not their satellite (spoiler: it nevertheless likely were parts of the satellite, see below).
Multiple parts
For a solution of this confusion, we have to look at the construction of a Kobalt-M satellite, and previous Kobalt-M missions. An excellent and detailed description of the Yantar/Kobalt satellites translated from a Russian publication can be found here on Sven Grahns website.
We have to realize that the Kobalt-M satellites are made up of multiple modules:
1) The Equipment Module (AO) that contains the main power and propulsion systems;
2) The Instrument Module (PO) that contains electronic equipment necessary for the control and functioning of the satellite;
3) The camera re-entry vehicle (OSA), containing the camera and the last batch of film. This is a true re-entry vehicle, designed to survive re-entry through the atmosphere for recovery of the camera and film. The target area for these re-entry vehicles is near the Russian town of Orenburg;
4) a 2.5 meter sun shade with additional antennae and sensors on the tip of the OSA, that is presumably jettisoned at re-entry.
The satellite also has two additional small re-entry and landing capsules for the recovery of film mounted on the side of the OSA: these are jettisoned for re-entry at 1/3rd and 2/3rd into the mission, so should no longer have been present on Kosmos 2495 on September 2.
Of importance is that the OSA re-entry module eventually separates from the satellite for re-entry. This potentially leaves satellite parts in orbit after the OSA re-entry, even though it is generally believed that the AO and PO go down with the OSA, with the AO providing the retrofire burn for the de-orbit of the OSA.
Re-entry of the Kosmos 2495 OSA return vehicle observed over Kazachstan towards Orenburg at 18:14 UT, Sep 2
The event seen from Kazachstan was, given the location and timing, most likely the OSA return vehicle with the camera and film re-entering the atmosphere for recovery at Orenburg. The single object in front visible in the videos is likely the returning OSA itself. The cloud of fragments at some distance behind it, might be the jettisoned sun shade disintegrating in the atmosphere. It could also be the AO (propulsion) module, the PO module, or both (it is believed by analysts that the AO (propulsion) module is providing the retrofire boost necessary for the de-orbit of the OSA re-entry vehicle. It is believed that the OSA does not have its own retrofire rocket).
Additional Kosmos 2495 parts surviving until re-entry over the USA at 4:30 UT, Sep 3
How does this fit in with the observations over the USA 10 hours later?
A clue is provided by previous Kobalt-M missions. At the end of five of these (Kosmos 2410, Kosmos 2420, Kosmos 2427, Kosmos 2445 and Kosmos 2462) pieces of debris were detected and catalogued by US tracking facilities that survived for several hours after the OSA re-entry vehicle touched down at Orenburg. In four of the five cases, it concerns two debris pieces (the fifth case, Kosmos 2462, produced three pieces). These debris pieces had the following SSC catalogue numbers and usually Cospar sub-designations C and D, or D and E:
For Kosmos 2410: 28501 and 28502
For Kosmos 2462: 36821, 36822 and 36823
Of interest is that these debris pieces are only detected at the very end of the Kobalt-M mission, around the time of the OSA return vehicle re-entry at Orenburg. They hence seem to have to do with alterations to the satellite in preparation for the OSA separation and re-entry. As it happened on at least five of the missions, it seems a normal element of these missions. In fact it might have happened on all missions, but not all might have been detected: most of the objects above have only one or two element sets released indicating short detection spans. Their lifetimes typically are no more than a few hours to a day, so they can be missed.
From the catalogued orbits of these debris pieces, there are suggestions that the separation of these objects from the original satellite body actually happens a few hours before the OSA re-entry. For Kosmos 2410, this is very clear as the debris pieces were first detected some 16 hours before the OSA re-entry, and while the A-object (presumably containing the OSA) was still being tracked.
The likely re-entry seen from Wyoming, Colorado and New Mexico 10 hours after the OSA re-entry vehicle return over Orenburg, could very well concern similar debris pieces generated by Kosmos 2495. Analogues from another Kobalt-M mission suggests this is a realistic option.
The Kosmos 2445 analogue
Kosmos 2445 (2008-058A), another Kobalt-M mission from 2009, provides a very nice analogue. On its last day of existence it produced two debris pieces with catalogue numbers 33969 and 33970, that survived for several hours after the OSA re-entry. The OSA return occured on 23 Feb 2009 at 16:15 UT. We know this because this OSA re-entry was observed, as reported by Lissov. The last available tracking data for the two Kosmos 2445 debris pieces have an epoch near midnight of Feb 23-24, 2009, indicating survival for at least 8 hours after the Kosmos 2445 OSA return at Orenburg.
I have used Alan Pickup's SatEvo software to further analyse the likely decay time for these debris pieces: the analysis suggests decay near 1:30-1:40 UT on 24 Feb, 2009. This is 9.5 hours after the OSA return.
This 9.5 hours survival time of the Kosmos 2445 debris pieces is similar to the time difference between the Sep 2, 18:14 UT Kosmos 2495 OSA return observed from Kazakhstan, and the possible decay event observed over the USA at Sep 3, 4:30 UT. The time difference between these is about 10 hours, which is not much different from the ~9.5 hours for the Kosmos 2445 debris in 2009.
During their last few orbits in February 2009, the Kosmos 2445 debris pieces C and D moved somewhat in front of where the A-object (the part including the OSA re-entry module) would have been had it not been de-orbitted. The difference in pass time was a few minutes.
Relative position of Kosmos 2445 C and D debris pieces a few minutes in front of where the A-body would have been, just before decay early Feb 24, 2009 (movement is top to bottom)
This again provides a nice analogue to the September 2-3 event over the USA: the decaying object observed from the USA moved along the Kosmos 2495 A-object trajectory, but passing 2-3 minutes earlier than the predicted A-object passage (i.e., it was moving slightly in front of where the A-object would have been had it not been de-orbitted over Orenburg). Also note the slight westward displacement of the A object (red) trajectory.
So: likely Kosmos 2495 debris re-entering over the USA after all!
I feel that this all justifies to conclude that what was seen from the USA on the evening of September 2-3, indeed were parts of Kosmos 2495 re-entering. The close agreement of the observed fireball track with the predicted trajectory and predicted pass times for Kosmos 2495 is too good to be likely coincidence. The whole event moreover fits patterns of previous Kobalt-M missions, notably that of Kosmos 2445 in 2009: debris pieces surviving for a few hours after the OSA return vehicle re-entry, decaying ~ half a day later.
So while it was not the return capsule with the camera and film that re-entered over the USA, it were nevertheless almost certainly parts of Kosmos 2495.
Remember that denial (see another version here) by the Russian military? Read it carefully. What they actually deny is that Kosmos 2495 exploded, and they say "that nothing out of the ordinary happened".
That is true. The return capsule separated successfully and presumably landed safely at Orenburg near 18:14 UT, as observed from Kazachstan. And Kosmos 2496 did not explode over the USA: debris parts left after the OSA separation decayed over the USA. Generation of such debris pieces seems to be normal for a Kobalt-M mission. So yes, "nothing out of the ordinary happened". It is all a clever word game.
On the nature of those debris pieces
What the nature of those debris pieces generated at the end of most (if not all) Kobalt-M missions and probably seen decaying over the US exactly is remains unclear. Behind the scenes, several independent analysts including me have had e-mail discussions about this the past 24 hours. Separation of the Kosmos into three modules (AO, PO and OSA), one of which (the OSA) makes a controlled re-entry over Orenburg for recovery, would make you think the remaining two debris pieces are these two other modules, the OA and PO. However, it is generally believed that the AO/PO combination provides the retrofire necessary for the OSA de-orbit and hence goes down with the OSA. It is believed that the OSA module itself has no retrofire capacity (if it would have, it would separate from the other modules and then fire its own retrorocket, leaving the other two modules in orbit).
So analysts have proposed that the debris pieces instead are satellite parts like solar panels (which are 6 meters in lenght each) and antennae shed somewhat before the OSA re-entry. That idea is more likely yet in itself not entirely unproblematic either. In the case of Kosmos 2410 in 2005, the debris pieces were generated at least 16 hours (if not more) before the OSA reentry. It seems somewhat unlikely that you shed power sources (solar panels) and communication equipment (antennae) so many hours before the OSA re-entry.
The observations from the USA on September 2-3 suggest a seizable object. This is not small debris, but definitely a large object.
So that part of the story remains a bit of a mystery.
UPDATE 1, 11 Sep 2014, 15:00 UT:
Dr Bill Cooke of the Meteoroid Environments Office at NASA's Marshall Space Flight Center informed me (and this information is posted here with his kind permission) that their camera systems catched the event from New Mexico. From the data they determined that the object entered with a speed of 7.69 +/- 0.07 km/s.
That is too slow for an object in heliocentric orbit (a meteor), but the typical speed of an object entering from Low Earth Orbit. Basically, this confirms that the event over the USA was the decay from orbit of (a part of) an artificial satellite.
I thank Dr Cooke for communicating this vital piece of information.
Ted Molczan has published an excellent analysis into the area-to-mass ratio's of past Kobalt-M debris, which compares favourable to the area-to-mass ratio needed for Kosmos 2465 debris shed at OSA separation to decay over the US at 4:33 UT.
Acknowledgement: I thank Ted Molczan, Jon Mikkel and Jonathan McDowell for the exchange of ideas. Igor Lissov provided valuable data on the Kazakhstan sightings and earlier sightings of Kobalt-M OSA re-entries from that region on Seesat.
Posted by SatTrackCam Leiden at 9/11/2014 12:11:00 pm
Labels: 2 September 2014, 3 September 2014, Colorado, Cosmos 2495, fireball, Kobalt-M, Kosmos 2495, New Mexico, re-entry, Wyoming, Yantar
Observing HEO objects
USA 186, bright and fast
USA 186 manoeuvered on the 17th
Rosetta's landing spot. In 3D. Woah!
KH-11 USA 186 has stabilized its orbit
[Updated] You Only Die Twice: the confusing end of...
|
cc/2019-30/en_middle_0056.json.gz/line12453
|
__label__wiki
| 0.758029
| 0.758029
|
About Scribe
Manuscript Policy
Scribe UK Scribe AUS Scribe US Catalogue
We publish books that matter — narrative and literary nonfiction on important topics, and the best of local, international, and translated fiction.
Viennese Romance
David Vogel (trans. Dalya Bilu)
‘What a wonderful novel it is. Brave and bold in content, with erotic scenes and a sensational love triangle at its hub, it is written in Vogel's distinctive style, through which he probes his characters' souls and skillfully sculpts their physical attributes. There is Vogel's trademark investigation of the lineaments of passion and, as always, his fear of passion's institutionalization. The author's love of the city's frenetic pace shines through, along with the remnants of spirituality that are crushed amid the gears of the modern machine.’
Noa Limone, Haaretz
‘A treasure trove of fiery temperament — uninflated, direct, and exciting — by a real Hebrew artist.’
‘Viennese Romance is a seminal addition to the secular Hebrew canon, providing vital insight into the history of the Jewish diaspora. Along with its author, it must not be forgotten.’
Nicole Lee, Readings
‘In some ways, Vogel is like an early Woody Allen … he was introverted, consumed with sexual hang-ups, and lived as a perpetual outsider.’
‘[Viennese Romance's] own history is as fascinating as that which it evokes. Written over several decades between Vienna and Paris, it swings between cosmopolitanism and philosophical enquiry … This is the Vienna of Freud, Arthur Schnitzler and Otto Weininger; its fin de siècle sexual consciousness more risqué than other Western cities.’
Tali Lavi, The Melbourne Review
‘There is an unmistakable mastery in the hyperaesthetic intensity with which Vogel depicts early 20th-century Vienna’s mix of squalor and sophistication, and in the volatile blend of sensuality and despair that haunts his narrative.’
Jane Shilling, The Telegraph, UK
‘Speaking through his philosophical young protagonist, Vogel writes knowingly about life’s emotional extremes, from impregnable joy to consuming depression … What really amazes is just how current it feels. Vogel has been compared to Franz Kafka and Thomas Mann, but Viennese Romance also recalls the poetic melancholy and easily punctured gaiety of F. Scott Fitzgerald, who wrote during the same period and whose work still resonates hugely to this day.’
Doug Wallen, The Thousands
‘The romance here is in Rost's vision of Vienna, the cultural capital of old-world central Europe … This is that exotic, vanished Austria, the Austria of Freud and Wittgenstein and Emperor Franz Joseph … Viennese Romance offers insight into the world of a central figure in 20th-century Jewish writing, and a crucial pathfinder of a specifically Hebrew literature’
Andrew Fuhrmann, Weekend Australian
‘[A] marvellous tale … evocative and insightful.’
William Yeoman, West Australian
‘Viennese Romance is a very beautiful novel … Like any truly good literature, Vogel is worth reading over and over.’
Yotam Schwimmer, Ynet
‘Set in gorgeous, lilac-scented 1900s Vienna … [Viennese Romance] is the story of penniless chanced Michael (18) up from the country and determined to "plumb the depths of life in all its shades" … you are left with an indelible impression of Vanished Vienna with its Strauss waltzes, flower gardens and sumptuous ballrooms.’
Available in English for the first time, here is David Vogel’s previously unknown novel that had literary Israel abuzz when it was published in 2012, almost one hundred years after the author started working on it.
David Vogel has long been regarded as a leading figure in modern Hebrew literature, and his work has been compared to that of Joseph Roth, Thomas Mann, and Franz Kafka. Vogel was thought to have written only a single novel: his masterpiece, Married Life, which was published to great acclaim in 1929. Yet he had been working on another novel, which was only discovered recently.
Set in the early 1900s, Viennese Romance tells the story of Michael Rost, an eighteen-year-old Jewish youth who travels to Vienna, hungry for experience. There, he forms passing relationships with everyone who crosses his path — prostitutes, revolutionaries, paupers, army officers, and rich men alike. When a shady businessman takes the penniless Rost under his wing, he rents a room in the home of an affluent bourgeois family. He is seduced by the lady of the house while her husband is away on business, and shortly after begins an affair with her sixteen-year-old daughter as well. This love triangle threatens to destroy the entire family.
With a foreword that explains how this lost novel came to light, Viennese Romance is a seminal work that explores the conflicts faced by many Jewish intellectuals in early twentieth-century Europe. A compelling portrait of a decadent society, it also lays bare the obsessive–destructive nature of love.
BUY Hardback NOW £14.99
Size: 213mm × 130mm
ISBN (13): 9781922070388
Pub date: 29 Aug 2013
Rights Held: World English
High-res cover: Download Image
Classic fiction (pre c 1945) FICTION / Literary Historical fictionLiterary studies: fiction, novelists & prose writersHistorical romance FICTION / Romance / GeneralFICTION / Historical / General
David Vogel
David Vogel was born in 1891 in Satanov, Podolia (now Ukraine), and when World War I broke out he was living in Vienna, where he was arrested as an enemy alien. He emigrated to Tel Aviv in 1929, but left for Berlin after a year, and later settled in Paris. After the outbreak of World War II, he was imprisoned by the French as an Austrian citizen, and later by the Nazis as a Jew. In 1944, he was deported to Auschwitz, where he perished.
Dalya Bilu
Dalya Bilu is a well-known translator of Hebrew literature.
Michael Rost glanced through the window at the fine threads of an…
Miriam Rosenbloom wins Best Designed Series at the ABDA awards
We’re delighted to congratulate the very talented Miriam Rosenbloom on…
Scribe designers shortlisted for the Australian Book Design Awards
We are delighted to see so many Scribe books on the shortlist for the…
David Vogel was born in 1891 in Satanov, Podolia (now Ukraine), and…
RRP: £16.99 Pub date: 8 May 2014 Category: Classic fiction (pre c 1945) Cover view
Two Novellas: In the Sanatorium and Facing the Sea
RRP: £14.99 Pub date: 2 Jan 2014 Category: Classic fiction (pre c 1945) Cover view
The Dictionary of Animal Languages
Heidi Sopinka
RRP: £8.99 Pub date: 11 Jul 2019 Category: Modern & contemporary fiction (post c 1945) Cover view
RRP: £16.99 Pub date: 11 Apr 2019 Category: Historical fiction Cover view
Jonathan Carr
RRP: £16.99 Pub date: 14 Mar 2019 Category: Historical fictionHistory Cover view
Hwang Sok-yong
RRP: £12.99 Pub date: 29 Nov 2018 Category: Modern & contemporary fiction (post c 1945) Cover view
The Mere Wife
RRP: £12.99 Pub date: 1 Nov 2018 Category: Modern & contemporary fiction (post c 1945) Cover view
Familiar Things
RRP: £12.99 Pub date: 12 Apr 2018 Category: Modern & contemporary fiction (post c 1945) Cover view
Giovanna’s Navel
RRP: £12.99 Pub date: 8 Mar 2018 Category: Modern & contemporary fiction (post c 1945) Cover view
A Vineyard in Andalusia
RRP: £8.99 Pub date: 9 Nov 2017 Category: Modern & contemporary fiction (post c 1945) Cover view
Mama Tandoori
RRP: £7.99 Pub date: 10 Aug 2017 Category: Modern & contemporary fiction (post c 1945) Cover view
RRP: £12.99 Pub date: 8 Jun 2017 Category: Modern & contemporary fiction (post c 1945) Cover view
The Possessions
Sara Flannery Murphy
Between a Wolf and a Dog
Georgia Blain
RRP: £14.99 Pub date: 15 Sep 2016 Category: Modern & contemporary fiction (post c 1945) Cover view
The Winterlings
Cristina Sánchez-Andrade
RRP: £12.99 Pub date: 11 Aug 2016 Category: Modern & contemporary fiction (post c 1945) Cover view
View all the pages of our site
Australia United Kingdom
Multi-time winner of the Australian Small Publisher of the Year Award
Facebook Twitter Instagram Goodreads YouTube
Copyright 2019 Scribe Publications. All rights reserved.
|
cc/2019-30/en_middle_0056.json.gz/line12457
|
__label__cc
| 0.736533
| 0.263467
|
Information Security Stack Exchange is a question and answer site for information security professionals. Join them; it only takes a minute:
Why don't ISPs filter on source address to prevent spoofing?
I'm under the impression that if all the ISPs were required to filter on the source IP address of all outbound packets, that spoofing would be reduced considerably.
Are any ISPs implementing this practice?
Should they?
network ip-spoofing
ChristopherChristopher
upgrademag.com/web/2014/06/20/anti-spoofing-isps , 2)news.ycombinator.com/item?id=12661227 – Pacerier Mar 11 '18 at 19:44
One of the main issues is with fast switching at the core routing level. A long time ago when I was a Cisco Engineer, the cisco core routers could fast switch very effectively and provide minimal latency, but if you wanted to source filter then this would turn off fast switching and add hugely to the latency - No ISP is going to be willing to have multiple seconds of latency when they like small numbers in the millisecond region.
One of the other issues can be around encapsulation. For example, if you are using an MPLS routed networks then you were unable to see inside of the packet to conduct source filtering.
David StubleyDavid Stubley
In a perfect world ISPs would enforce filtered packets prior to accepting them from a customer.... or a technology analogous to fast switching would apply to the sender. – Christopher Dec 14 '10 at 15:32
Some ISP's are starting to come to the conclusion that preventing spoofing will save them money in the long term. We find them now starting to lump anti spoofing along with anti DDoS in terms of things which will cost them money in the short term, but will lighten their network load and be able to be sold as value add in the longer term.
The infrastructure and team required to configure this is where the main cost lies. There would have to be analysis as to which addresses might be required for valid spoofing (although this could be much less of an issue in reality) and the effort required to configure and maintain every router (or at least those at the edge) is pretty high.
It potentially becomes more of a challenge (just in terms of scale) with IPv6, as IPv4 will also be around for a long time.
Probably makes more sens for them to ignore IPv4 anti-spoofing, and start to build it into their v6 edge rollout.
Rory Alsop♦Rory Alsop
This would not make economic sense for many ISPs that are bottlenecked in the download line. – Pacerier Mar 11 '18 at 16:58
Basic answer: cost. Doing so does nothing to protect their own network but does add additional cost in the form of maintenance overhead, and routing overhead. Because spoofed addresses outgoing won't really affect them, there is
RyanerRyaner
I realise this is a very old question, but I think there's some relevant additional info to share. You're correct that IP spoofing is a big source of problems on the internet, mostly because of DDoS attacks using UDP.
ISP's should implement anti-spoofing. IETF's BCP38 (written in 2000!) describes a best practice for networks to do network filtering filtering to reduce spoofing and thus prevent DDoS atacks, but unfortunately(?) there is no global authority which can force them to do so.
As others pointed out, costs of implementing it may be a reason not to do so. Lower revenues could be an argument as well for some networks: not forwarding traffic means sending lower bills to customers, so it can be a business decision not to filter.
However, in the pas few years a growing number of ISP's have pledged to implement controls described in MANRS ("Mutually Agreed Norms for Routing Security "). One of the controls mentioned there is anti-spoofing. MANRS offers networks an extensive guide on implementing anti-spoofing in various ways in all kinds of setups with all sorts of equipment.
Although spoofing still offers problems, more and more networks implement controls because they do realize they need to be sure they're not part of the problem. However, I'm sure that there will always be a fair number of networks who will not follow MANRS for various reasons, and also that there is a small number of networks who are willingly not filtering as a business model (and thus attracting more and more abuse). The only way to solve that, will be for all large (tier 1) networks to implement strict filtering, so that it becomes harder for these malicious networks to get their spoofed traffic routed across the internet.
Teun VinkTeun Vink
IP traceback is a name given to any method for reliably determining the origin of a packet on the Internet. Since the source IP address of a packet is not authenticated. The problem of finding the source of a packet is called the IP traceback problem. IP Traceback is a critical ability for identifying sources of attacks and instituting protection measures for the Internet. There are number of techniques proposed most popular are
Probabilistic packet marking: probabilistically marking packets as they traverse routers through the Internet. The router mark the packet with either the router’s IP address or the edges of the path that the packet traversed to reach the router.
Deterministic packet marking: this technique attempt to put a single mark on inbound packets at the point of network ingress. Their idea is to put, with random probability of .5, the upper or lower half of the IP address of the ingress interface into the fragment id field of the packet, and then set a reserve bit indicating which portion of the address is contained in the fragment field. By using this approach they claim to be able to obtain 0 false positives with .99 probability after only 7 packets.
Ali AhmadAli Ahmad
Thanks for contributing an answer to Information Security Stack Exchange!
Not the answer you're looking for? Browse other questions tagged network ip-spoofing or ask your own question.
How can a company reduce exposure to packet spoofing? What solution should exist, but doesn't?
Are there valid reasons for spoofing an address?
Do major ISPs still ignore IP spoofing?
Why doesn't SMTP check that users are authenticated to send from an address?
In what scenarios is relying on source IP address as a security control acceptable/unacceptable?
Spoofed IPv4 and IPv6 addresses over the internet
Why wireshark source ip tab lists other ip as well
Does “loose source and record route” drop the source address?
Spoofing public IPv4 address
Spoof another IP address in the same network,will the spoofing source get the response?
Spoofing IP address as being local over the Internet
Spoofing LAN IP Address Traffic
Filter out ISPs from Whois results
|
cc/2019-30/en_middle_0056.json.gz/line12468
|
__label__cc
| 0.629091
| 0.370909
|
Tag: karate kid
“…a stirring, unexpectedly enchanting soundscape…” thanks LA Weekly!
February 18, 2013 February 23, 2013 robotanists
LA WEEKLY was nice enough to give our upcoming Feb 25 show at Los Globos in Los Angeles, a shout out this week, and say a few nice words about our yet-to-be-released PLANS IN PROGRESS addendum / collection of fan-requested covers called SOUVENIRS.
Sarah Ellquist de Blanke’s dreamy vocals and her musical partner Daniel de Blanke’s shimmering synths give these new-wave and post-punk chansons a modern sheen, but the strangest track of all is their cover of Kenny Rogers‘ “Just Dropped in (to See What Condition My Condition Was in).” Rather than camping it up, Robotanists transform this corny country-music standard into a stirring, unexpectedly enchanting soundscape, as Sarah’s languidly ethereal singing trails off in the haze of Daniel’s blended acoustic guitars and distant-thunder percussion. Sometimes the most beautiful things happen in the strangest of places. — By Falling James
…Read on at LAWEEKLY.com
MORE ABOUT THE ALBUM…
We’ve been quietly working on the collection for a year or so in our spare time while sorting through requests to pick the final lucky 7, and working on a new album of original work. (…coming out later this year!!!!)
Admittedly, the Kenny Rogers tune was a favorite pick of ours as well – chosen (we hope) for its “Big Lebowski” relation.
Another fave is, 1984’s “The Karate Kid” kick ass motivational song, “You’re the Best Around.” The track was the first one we completed and actually ended up being the inaugural track for SYFFAL.com’s ‘pop cultures collide’ feature.
We got so many requests we would start them up then scrap them, and pick a few more, until they all felt like the right ones. In the end, we went for the weirder, the unknown, the over-covered and the unexpected, with only our fans in mind.
With plenty of noted covers under our belt, we were never really sure how, when or if we would release these, so we’ve just been casually floating the tracks around as we did them. They’ve never been mastered or available to download until now, so we’re excited to finally reveal them as a collection.
SOUVENIRS will be available as a free digital download with select purchase of the album, PLANS IN PROGRESS starting February 26th, or to buy on its own through our official store.
PS. We’re putting the finishing touches on it now, and hope to give away a few free download cards at our show in LA on Feb. 25!!! Hope to see you there!
Posted in BLOG, FANS, INTERVIEWS, MUSIC, OTHER NEWS, PLANS IN PROGRESS, PRESS, RELEASES, REVIEWS, SOUVENIRSTagged album review, bandcamp, big lebowski, covers, daniel deblanke, falling james, fun, interview, itunes, just dropped in, karate kid, kenny rogers, la weekly, movie music, new order, overhead records, plans in progress, pop cultures collide, review, Robotanists, sarah ellquist, souvenirs, syffal, the motels
|
cc/2019-30/en_middle_0056.json.gz/line12476
|
__label__cc
| 0.667067
| 0.332933
|
Relentless.com: life as a cog in Amazon’s e-tail machine
My 2017 in Books
Living Alone: An Experiment
Momentum: Translations
Cameron Brady-Turner
sous les pavés, la plage
Category Archives: Comment
Blog, Comment, Politics
02/10/2018 rorschachsmearsamazon, amazon uk, amazon.com, business, employee rights, jeff bezos, jobs, labour, living wage, long reads, minimum wage, politics, tech, temping, temporary work, uk business, uk business news, uk politics, unionisation, unions, warehouses, work, workers, working conditions, zero-hour contracts, zero-hours contracts Leave a comment
When Jeff Bezos was brainstorming names for his new venture in 1994, Relentless was the banner that came closest to making the cut. On sounding out his friends, Bezos was warned it sounded sinister, and Amazon was ultimately chosen to become the history-making name. But something about Relentless spoke to Bezos, so much so that he even registered a domain with it – type Relentless.com into a search bar today and you will still be redirected to Amazon’s website. I spent six months at Amazon’s Hemel Hempstead warehouse, and discovered the reality for the workers behind the trillion-dollar brand.
Mention Amazon to those who work at its warehouses, and cheap books, free delivery and the A-Z smile are unlikely to be what springs to mind. I worked for Amazon for six months in 2013. When someone mentions it to me, my mind flashes to the headlines from my time there: 60-hour weeks, backbreaking targets, swingeing redundancies, illness, depression. Relentless, the word lurking behind the consumer-facing infrastructure, is the reality for Amazon’s workers.
Like many who end up in an Amazon warehouse, the job dropped in my lap through an agency. Fresh out of an English degree, overdrawn, burnt out and unsure what I should be doing next, I had struggled to get a job. With nothing to show for my summer except a couple of ghastly interviews, I adjusted my ambitions and signed up with a recruiter hoping for some admin work.
I received a call from a company called Transline within a week. There was no interview, just a screening to attend where I would have to sign some forms and partake in a drugs test. I was told that if I’d smoked weed at any time in the last six months they would know and wouldn’t hire me. I had been looking for a job for three months at this point, and was ready to take anything I could get. Having spent the previous three years struggling to grapple with poetic metres and critical theory, I quite fancied the contrast – dumping the books to work at the coalface of the industry. A working class job. I had graduated exhausted and unsure of myself, worried I had become estranged from regular people; I immediately began to romanticise the idea. My dad worked in a factory. I hadn’t seen him in a while.
I was part of an intake of some 30 people on my first day. The induction was brisk. One of the line managers, a flat-voiced Polish woman, led us across the warehouse floor pointing out which of the machines could take our hands. The warehouse was a multiplex of greys – from ash to gunmetal, to graphite from dust. Vast rows of packing stations flanked conveyer belts of plastic yellow totes bundled with tat. As we passed the lines, the contraction and expansion of repeating geometric shapes, like Soviet-era futurist prints. One behind another, Amazonians at their stations with just their busy hands visible in the gap between desk and shelves. Concluding the tour, we were sat down in a conference room upstairs to watch a video, which in summary said that Amazon has a ‘customer obsession’ and that while it’s your right to join a union, it’s our preference that you don’t. Then we were put to work.
Amazon’s warehouses are called Fulfilment Centres, with no apparent appreciation for irony. Items start in arrivals, where they are unloaded in bulk and transported to The Cage, a vast mesh tower that catalogues Amazon’s products, where runners pick out orders and scan them into totes. The totes then make their way onto a conveyer belt that trundles them to the packers on the main floor, who then box up each order and pop them back onto another conveyer belt to slide down to departures. Every item, tote and box is barcoded and tracked through each stage of the process.
I was posted in packing. The bare bones of the job are this: your shift is a 10.5 hour day with three breaks throughout, two 15 minute breaks and one half hour. The rest of the day you stand at your workstation and pack. To start I was put on medium and small-sized single item orders: DVDs and CDs into cardboard wallets and boxes into bigger boxes. You have everything you need at your desk. A computer monitor, printer and scanner dictates what needs to be packed in what and prints the labels. Your station is stacked with a range of flat packed boxes; includes a tape, roller, knife. Sitting is prohibited unless you have a medical complaint; you will work faster if you have the full span of your waist and arms. Runners tend to your line with fresh boxes when you run out and divvy out totes of more items should the conveyor belt alongside you break down. You have no reason to leave your workstation.
The rhythm of this work is relentless. Every stage of the process has been optimised, cutting no slack, sparing zero downtime. In menial work it is often in the interstices between tasks that little acts of rebellion can be seized. Amazon knows better than to accommodate this. There is no respite to claim between decisions or transitions because the job is one-dimensional and singular. You pack. (Anything else, you can pack it in.)
Amazon was basically making us work extra hard to ‘make up’ for our statutory right to a rest.
Data is absolutely central to this efficiency. Amazon’s current iteration gathers information on virtually everything its workers do – from their pack rate to downtime – then pits them against each other on the basis of these metrics. The company is always looking for ways to gather more information – for example, Amazon recently acquired a patent for wrist-watching technology. The detailed profile Amazon keeps on its workers, coupled with a rank and yank philosophy that means only the exceptional survive, ensures that its workforce is continually evolving. One former employee called this culture purposeful Darwinism.
The Amazon handbook boasts that it holds its employees to standards that are ‘unreasonably high‘. In my area, the target to meet was nominally 104 packages per hour. In truth it was more like 120 packages an hour, because the live rate on my monitor would be consistently below what Transline, my agency, recorded for me. Amazon has several temping agencies posted in-house on the warehouse floor, who ‘look after’ staff by coming round with a clipboard to tell you whether you’re meeting your targets. Presumably, Amazon likes to have even its recruiters compete with one another. Drop your pace and your agency will soon let you know.
After a month in the job I think I figured out what was bringing my numbers down. A day at Amazon consists of two 15 minute paid breaks and one 30 minute unpaid lunch break. Your workstation computer connects to Amazon’s product database when you scan items to dictate what kind of box is required, print the post label, and monitor your pack rate based on the number of items you scan per hour. There are different codes to log out for each kind of break, paid and unpaid. Whereas I initially thought the discrepancy between our computer and agency pack rates could be explained by Transline simply underrepresenting our numbers for their own ends, what actually happened was that logging out for the paid break on Amazon’s system left our pack rates recording, bringing our numbers down. Amazon was basically making us work extra hard to ‘make up’ for our statutory right to a rest. And at 104 packages an hour, you are already forced to work at a rapid pace – this in a process in which you must pick up a tote of items, pick your item, scan it to bring up the details, print its label, pick its correct packaging, assemble the box, put the item in with its receipt and fill it with dunnage so that nothing is loose, tape it closed, stick on its postal label, and then place it on the conveyor belt to travel to its next destination. At 120 items per hour you have roughly 30 seconds to do all this. (Transline, incidentally, went into administration not long after I left Amazon after it was revealed it had been supplying staff to Sports Direct’s warehouses that were getting paid less than the minimum wage.)
It will be no surprise if Amazon becomes the first business to fully automate. A company that resents even its workers’ basic right to a break will only find people a frustration to its aims. Amazonians that left their workstation to go to the bathroom would be promptly hounded by seniors. Stories abound of workers afraid to stop, pissing into bottles at their desk. Your tracker, after all, is recording. As such, everything you need to do must be done on your breaks, yet because of the size of the warehouse, and the fact that to get in and out of it you must go through airport-level security (belts off in a tray, metal detectors, pat downs by security guards), it tends to take 3-4 minutes to just make it back to the canteen. If you get a full five minutes to sit down you’ve done well.
If targets were not being met, he would make veiled threats. ‘If you’d rather be stacking shelves at Tesco…,’ he’d taunt, as if any sane person’s response to that kind of condescension isn’t ‘I fucking would.’
The suspicion with which Amazon regards its staff is reproduced at every level of the operation – from the frisking that accompanies every exit and entry from the warehouse, to the generally cold manner in which management address their inferiors. Joining in 2013, I couldn’t help but see a link between the disdain for its unskilled staff and the Conservative Party’s strivers vs. skivers rhetoric. It was as if you were expected to be grateful just to have been given a waged job, and work in full apprehension that, on a zero-hours contract, that privilege is not a right.
My area manager was a guy called Rich.* He was one of those short-fused people you occasionally meet in life whose disposition could shift like a switch, in a moment from chipper to downright menacing. He would greet me cheerily as Callum when he needed something, and I never dared correct him. In our morning briefings he would relay to us the statistics of the previous day, a rabble of some 40 or 50 staff circling him. If targets were not being met, he would make veiled threats. ‘If you’d rather be stacking shelves at Tesco…,’ he’d taunt, as if any sane person’s response to that kind of condescension isn’t ‘I fucking would.’ The idea that working at Tesco was a worse lot reeked of delusion. My guess was that he was a working class guy done good who had ended up becoming dogmatically invested in the cut and thrust he read as meritocracy. We all have our illusions.
In hindsight I wonder how I put up with it. I was one of 15,000 staff Amazon brings on each year to cater for Christmas. In off-season Amazonians work 40 hours a week split across four 10-hour days. During peak, Amazon makes 55 hours work a week compulsory. It encourages its employees to work the legal maximum of 60 – unless of course it completes its orders and then sends its surplus zero-hours staff home. Joining in the autumn, I was waking before dawn, hiving myself in a dim warehouse during daylight hours and returning home in the dark again. At the end of each day I would run a hot bath to sear away the day’s aggregate muck. I’d lower myself in, feeling my pores emptying, the oil and dust rising to the water’s surface to swirl like a storm seen from space. I’d inspect the damage: burst blood vessels in the backs of my knees, my finger tips greyed and eerily smooth, as if my finger prints had worn away. The dirt and sweat of the warehouse was exacerbating my eczema meaning I was suffering through recurring skin infections. The lack of daylight and off-time was making me depressed.
Yet every week that I avoided the chop was a small source of satisfaction. The turnover of staff is staggering. I’d estimate that 50% of the packers around me were either laid off or left every three weeks, to be supplanted by a whole new intake; the ability to hit Amazon’s targets is an aberration, not the norm. For this reason, the Fulfilment Centre is a difficult place to make friends. Familiar faces soon vanish without a trace. As a survivor of the churn, you are acutely aware of the precarity of your position, and internalise the competition. Amazon revels in its brutal culture because it banks on most people being stubborn enough to push back against those odds, even when success in Amazon’s terms is as trivial as keeping your job. Under this regime, workers ultimately have nowhere to turn but against one another – hoarding easier totes, nabbing the best stations. Staying ahead of the pack feels like a zero-sum game.
The obsessive culture of competition is driven into Amazon from head to toe. Looking back it’s clear to me that the management I despised were probably under the same pressure as us – so when it came to things like gaming our packing statistics this was borne out of competition with the other warehouses dotted around the UK. No one has it easy. An NYT exposé from head office revealed a toxic working culture even there, with reports of staff regularly crying at their desks. However, in this account the narrative is balanced by the thrill of being able to create, not to say the goldmine of Amazon stock. There is no such payoff for the blue collar Amazonian on a zero-hours contract.
I knew if I didn’t hit my numbers I would lose my job.
Starting in September at the beginning of peak season, I had seen the warehouse workforce treble in my time, up until a week into January, when Amazon began to make swingeing cutbacks to its temporary staff. I was stupidly proud that I had lasted so long. By this point I had moved from packing to picking, although not by choice. Picking is the worst job in the warehouse, and management knew it. When they learnt that picking was short-staffed, my area manager literally drew names out of a hat to decide who of us in packing was moved. I was gutted. I had worked so hard to make it this far and suddenly I was back to square one: on trial working up to new targets just to keep my job.
Picking is situated in The Cage, a dim, strip-lit mesh wire multi-story library of Amazon’s smaller products. Pickers take a trolley perched with two totes, and a scanner that displays item locations and a countdown for how long you’re expected to take on each one – one countdown for how long it should take you to walk there and one for how long the item should take to scan and stow, timed to within a second. The brutality of this job was exposed most effectively by Panorama, which secretly filmed an agent scurrying down these corridors to the incessant beep of his console. Indeed, it is virtually impossible to beat the timer without racing from location to location, like you are trapped in some Kafkaesque game of Supermarket Sweep. This surely contravenes health and safety rules, but with Amazon scything away its temporary staff at Christmas, I knew if I didn’t hit my numbers I would lose my job.
An FT article from 2013 asserted pickers could walk up to 15 miles a day. Other outlets claimed pickers could run the equivalent of a marathon over a shift. Yet even as I struggled to meet my targets, this wasn’t the worst part of the job for me. The Cage is filthy. Most boxes were coated in a film of muck, showering you with dust whenever you’d pull one from overhead. I left work each day with my hands blackened. This made my already bad eczema worse. I was virtually living on antibiotics because the infections I’d been getting had spread all over my body. My skin was so dried out it was cracking and weeping, so that it stung to move my joints. I would have slipped ointment into the warehouse with me but my hands got so dirty I couldn’t apply it. I tunneled through the shelves after item after item like a termite in its nest.
What else could I do? Due to Amazon’s three-strike rule on unscheduled time off, I was essentially forbidden from being sick. Although this rule has since been rescinded, the abnormal rate of poor health among the company’s employees persists. An FOI request by GMB recently discovered that 600 ambulances had been called out to Amazon’s UK Fulfilment Centres in just three years. Its Rugeley site saw 115 callouts alone, compared to just eight at a similar-sized Tesco warehouse over the same period. The GMB trade union has represented heavily pregnant staff who have been refused permission to briefly sit down during an 11-hour shift, seen staff who have started to develop musculoskeletal problems with the repetitive nature of the work. Nearly 90% of the Amazon workers GMB represents say they experience constant pain at work. A few years ago a temp died of heart failure in a warehouse in Virginia, raising questions about whether the company was pushing people too far. Mike Roth, Vice President of North American Operations, said Amazon’s metrics are safe, fair and attainable.
Amazon pushes up against the limits of, and thus exposes, what is acceptable within our current economic model.
For all this, when I made it through Christmas I felt a pride I hadn’t experienced since school. As January trudged towards February, peak season operations were winding down and 40-hour weeks resumed. In the weeks since New Year, I had seen the warehouse workforce shrink by half. Management had even congratulated those of us who had made it. It looked like I might be on for a proper contract.
For so long I had been driven to work by the fear of losing it, I had forgotten how to let myself relax. In mid-January I put in a request for a day off in the last weekend of the month, meaning I had an actual weekend to myself for the first time in five months, three full days in succession. I’d been invited to Norwich by my friend Beth, who had got us tickets to see a band on tour over from the States, I can’t remember who. I can’t remember because I drank so much whisky before going out that I blacked out on the way to the venue and came to after only two songs, thinking the clapping meant the gig had finished and leaving again at only 9pm. Still, to see a friend again was a great relief (I had worked over Christmas and missed my mates’ celebrations for New Year). It felt like I had been in a dark place for a long time, but here was the reward for that sacrifice – a promise that things might be easier from now on.
I was made redundant that weekend, getting a call from my Transline rep as I made my way back from Norwich. Because I was on a zero-hours contract there was nothing I needed to do – I simply didn’t have to turn up to work in the morning and my P45 would be in the post. I crumpled into a corner in Liverpool Street station and cried.
In the five years since I worked there, Amazon’s market cap has increased by $800bn dollars. It has just posted a profit for the 13th straight quarter. Jeff Bezos is now the richest man in history. He is worth $150bn alone.
Amazon has grown so powerful with such reach that the legal scholar Frank Pasquale has described it as acquiring ‘functional sovereignty’. The company doesn’t just monopolise publishing but controls the primary platform for the entire industry; its Web Services division accounts for 44% of the world’s cloud computing capacity. The consequence of this is that smaller companies are forced to ride the rails of their biggest competitor to get to market, handing away valuable data. As such, while Amazon keeps prices low for consumers, it presses its dominance in other arenas. As Lina Khan has argued, while its business model keeps its users happy, the unchecked structural power it amasses becomes a concern for us as citizens, workers and entrepreneurs. In its singular ambition of becoming the world’s most powerful company, Amazon pushes up against the limits of, and thus exposes, what is acceptable within our current economic model.
Amazonians deserve a say on their work conditions, rather than having to wait for their employer to weigh in the PR value of their well-being.
The news today that Amazon has ‘listened to its critics’ and upped its minimum wage from £8 to £9.50 an hour is a massively welcome step, making a significant difference to the lives of tens of thousands of workers in the UK alone. Congratulations should go to the journalists who have exposed Amazon’s practices over the years and in particular to the GMB union for working to organise in Amazon’s warehouses in the face of fierce opposition. The hope is that with Amazon setting a precedent, more people can add their voices to the chorus of workers asking for a better deal.
However, it is important that wins like this, while rightly celebrated, are not allowed to stand as testament to a system that is working fine. For Amazon to now call for a higher minimum wage, having built its empire on a low one, is a self-interested move in that it raises the price of admission for other companies to compete. It was never in question that Amazon could afford to. Its wager is that soon enough the law will change anyway and it will pay its workers the minimum it can get away with once again. The company has notably not made any long-term commitments to adjust for inflation, by signing up to the Living Wage Foundation, for example. And it is important to bear in mind how exploitative the company remains in myriad other ways. Irrespective of today’s announcement, Amazon must be made to recognise unions as an absolute priority. Amazonians deserve a say on their work conditions, rather than having to wait for their employer to weigh in the PR value of their well-being.
In a sense, Amazon is only a tick in the ear of our dysfunctional economy. Yet, as it amasses more and more power, it also sets a grim precedent for many more workers should we not alter course. To supplement the hard work unions like GMB are doing, IPPR’s Prosperity and Justice report is a welcome contribution to the debate on how things could change. As well as proposing common sense policies such as greater support for unions and an extra boost to the wage of workers on zero-hours contracts, it also recognises the deeper issues – of monopolisation and unproductive accumulation – that mega-corporations like Amazon pose. Labour’s proposals to give workers shares so as to better influence how their workplace is run is another promising idea.
Naïve as I was when I joined Amazon, I assumed my duty was to accept the misery it had to offer. Five years on, I am still angry that the practices I witnessed there have not seen redress. While today’s announcement is an undoubtedly huge moment for thousands of people, there is still plenty else that needs to change at firms like Amazon. As more legions of packers are recruited ahead of Christmas and Black Friday, we should continue to think outside the box.
*name changed
|
cc/2019-30/en_middle_0056.json.gz/line12480
|
__label__wiki
| 0.913402
| 0.913402
|
Shell has been stalking the Libyans ever since relations thawed
Malcolm Brinded, Royal Dutch Shell Executive director of Upstream International
In view of current events, it is timely to consider the real motives of the UK government’s complicity in the release of the Lockerbie bomber – a development said to be “casting a long shadow over relations between Britain and United States, where senior figures in the Obama Administration have voiced dismay over the Governments failure to take a stand.”
The White House condemned the decision by Scottish authorities to release al-Megrahi as “outrageous and disgusting. A senior US official said: “The UK has been extraordinarily silent on this issue.
The Foreign Office has strongly denied claims by Gaddafi’s son that Abdelbasset al Megrahi’s release was linked to lucrative trade deals with Britain.
The compilation of articles printed below provide the answer to why Blair, Brown, and Brinded, have sucked up to the Libyan dictator Muammar al-Gaddafi ultimately responsible for the Pan-Am 103 bombing and other terrorist atrocities. They include the murder of a British police constable Yvonne Fletcher shot outside the Libyan Embassy in London while policing an anti-Gaddafi demonstration. A burst of machine-gun fire from within the building was suspected of killing her, but Libyan diplomats asserted their diplomatic immunity and were repatriated. The incident led to the breaking off of diplomatic relations between the United Kingdom and Libya for over a decade. (paragraph includes extracts from Wikipedia article)
The motive for the current duplicity and hypocrisy is the same as for the invasion of Iraq: Oil and Gas.
Scotland On Sunday: 28 March 2004
With friends like these
By FRASER NELSON and BRIAN BRADY
IT was only lunchtime but the whisky and gin were flowing from the British Embassy in Tripoli last Thursday. Fresh camels milk and water had been on offer outside Colonel Gaddafis tent, and the returning diplomats went straight for something stronger.
The mood was of mild but universal shock. Even those who had for weeks recited the political rationale of the meeting found themselves stunned at the sight of a British prime minister lunching with one of the worlds most notorious dictators.
Tony Blair called it extending the “hand of partnership”. For one embassy guest, this was more than a soundbite: Malcolm Brinded, Royal Dutch/Shells head of exploration, had just signed a £110m deal to hunt for gas off Libyas coast.
Britains diplomatic invasion of Libya last week was a superbly orchestrated coup which has stolen a march on America. In the 15 weeks since Gaddafi agreed to surrender his nuclear and chemical weapons programme, London has not missed a beat.
While Washington has refused to lift trade sanctions and boasts about “moving the goalposts”, Blair has succeeded in positioning Britains defence industry alongside Libya while returning Shell to the country after a 30-year absence.
This is neither a fortuitous side-effect nor a cynical attempt to make money. Blair last week deployed a carefully crafted model where business is the agent of regime change. It was peace, tailor-made for a country with 30 billion barrels of proven oil reserves.
Even by Blairs own standards of jet-set diplomacy, last weeks trip was quite extraordinary. The itinerary was itself a narrative of terrorism: Belfast, Madrid, Lisbon, Tripoli then Brussels. Each city told part of Blairs story.
Northern Ireland showed that negotiating with terrorists can deliver a real, if tortuous, peace process. Madrids stunning state funeral for the 190 victims of the train bombs was a warning on terrorism which needed no political amplification.
The European Union summit in Brussels was to be the arena where Blair would hammer these lessons home to prevaricating EU leaders. Seeing the European Constitution leap from the grave was only a small stain on an otherwise flawless plan. The first step was to consult families of the 1988 PanAm bomb, which killed 270 when it exploded over Lockerbie in what a court found to be a Libyan attack. Blair dispatched ministers to consult the bereaved and ask for their blessing. When this was granted, Blair had the moral authority needed to go to Tripoli.
Next, Blairs officials started to reinvent Gaddafi. His decision to give up banned weapons, it was argued, meant it was time for a fresh look at the man Ronald Reagan so memorably called the “mad dog of the Middle East”. “So what do we know about him?” a senior British official began in a briefing as he reeled off a revised biography quite unlike that of the Gaddafi the West had come to know.
His seizure of power in 1969 was a “revolution” rather than a coup detat. Britain was “encouraging the Libyan government down the path of economic reform” and found Gaddafi “very forward on the role of women in Libya” and a religious man to whom “Islam is an important influence”. The word “dictator” was absent.
This, it is hard to remember, is the man considered the Osama bin Laden of his day who probably ordered the Lockerbie bomb, certainly armed the IRA and may know who killed a policewoman shot outside the Libyan embassy in London in 1984.
The path of economic reform is also a long one for a country whose quasi-Marxist economy was ranked the most repressive in Africa or the Middle East by the Heritage Foundation in its world index. Libya in 2004, it says, is worse than Zimbabwe.
Back in London, some of Blairs closest aides privately acknowledged the dilemma. “We know the problems surrounding this trip,” one told Scotland on Sunday. “But these things dont just happen overnight.
“People forget Gaddafi condemned the [IRA] bombing of Manchester. He also supported the Good Friday agreement.” After an embarrassed silence, he added: “Granted, we didnt make much of a song and dance about that at the time.”
Now things are different. Gaddafi is “viscerally opposed to al-Qaeda and has given no quarter to Libyas own fundamentalist groups – understandably seeing them as the main threat to his own regime”. Whats more, his country is rich, but has no one to trade with: Gaddafi is a man we can do business with. “We dont want the Libyans to think were just flying in, then flying out,” said one official. “Were leaving behind solid signs of our commitment.”
One such sign is Major General Robin Searby, former commanding officer of British forces in Bosnia, now appointed UK defence co-ordinator for Libya. His task is to oversee a “new military relationship” between Tripoli and London.
Advice on military strategy will come from the Ministry of Defence. Libyan soldiers will train at the Royal Military Academy in Sandhurst, England – an offer designed to resonate with Gaddafi, who himself trained with the British military in 1966.
This offer is all the more extraordinary because the last military relationship of any note between the countries was in April 1986, when American jets left British airbases to bomb Tripoli – aiming at Gaddafis home and killing his adopted daughter.
Britain argues that, having handed over 20 tons of mustard gas, Libya will need a new set of conventional weapons. Or, in the diplomatic language of Blairs officials, Libya needs to “adjust to the world it finds itself in”. Enter British Aerospace (BAe). After a miserable few months, with delays and cost overruns with its Typhoon Eurofighter project, BAe has suddenly emerged in pole position to rearm Gaddafi, thanks to Blairs negotiations.
Downing Street let slip that BAe is in “advanced negotiations” with Libya – forcing the company to admit to “civil aviation infrastructure and things like modernising airport systems”. It stressed that defence work is “not at present” on the agenda. And with good reason. Such deals remain outlawed by an EU arms embargo, which Britain wants to lift. Only then can BAe offer to modernise the fleet of dilapidated Soviet-era MiGs which were parked on the tarmac when Blair touched down in Tripoli.
BAe, which has several unsold Typhoon Eurofighters it would like to offload, would not be drawn on this obvious next step. But the link between civil aviation deals and military follow-ups is well established.
No such inhibitions face Royal Dutch/Shell, which has for years been watching Libyas gas fields with envious eyes. “Theyve been stalking the Libyans ever since relations thawed,” said Bruce Evers, analyst at Investec Securities. Last week, Shell pounced.
Libya is especially rich in liquid natural gas (LNG) – where Shell believes the future of energy lies. Libyas reserves amount to barely a quarter of Iraqs, but present a much lower security risk.
“Libyas oil wells and fields are just sitting there decrepit because they dont have the resources anymore to exploit the oil,” said Rime Allaf, Libya analyst at the Royal Institute for International Affairs in London. Indeed, Libya was until recently the only Opec member not to have an oil ministry – typical of the chaos under Gaddafi. Its quota is 1.3 million barrels a day; and at next weeks Opec meeting it will push to increase this nearer to its 1.6 million barrels a day capacity.
It now has National Oil Co, a state-owned firm which plans to offer foreign firms the right to bid on five areas for exploration. Tarek Haasa-Beck, its planning director, expects bidding this summer. By then, he is sure the Americans will have dropped their sanctions. “We will be running out of space in our hotels. Perhaps the best investment would be to build more hotels.”
The Iran-Libya Sanctions Act of 1996 is due for renewal at the end of the month. But Libya remains on the US State Departments list of terrorist sponsors – and removal from the list is not a formality.
While this political split exists, it buys a head start for British companies, watched enviously by counterparts in the US, who were pumping 850,000 barrels of crude a day out of Libya before Reagans 1986 embargo froze their assets.
There are signs that America is making things happen. Two days before Blairs visit, William Burns, US assistant secretary of state, became the highest-level official to visit Libya in more than 30 years.
Americans are now allowed to visit Libya, but a blanket import and export ban remains in place. This leaves all the more breathing space for the UK governments trade delegation next month.
Perhaps even more significant than any economic progress is the prospect that the developments will have a momentous impact on the Middle East. After the announcement that Libya had agreed to give up its illegal weapons, Scotland on Sunday revealed the British government was already in talks with other “pariah states” in a bid to win a similar breakthrough. Downing Street sources admitted that discussions with Syria and Iran were continuing.
Eric Stanley, an expert on Middle East affairs, said the rewards were economic as well as political, and potentially enormous. “The way the Libya situation has opened up so quickly has been remarkable, and it shows that there was an appetite on both sides for big changes,” he said. “It is to be hoped that this can be repeated across the Middle East, not least because bringing other powerful voices in from the cold will stabilise the region and make it easier to progress the road map for peace.
“But it is not a simple process. States like Syria might see the Libya example as a path to follow, but all these states have different issues. There will be a domino effect, but it will take some time. Trade is an important driver in all of this.”
Rumours abound about Gaddafis health. Some reports from the area say the 62-year-old was diagnosed with terminal throat cancer two years ago.
No 10 is keenly aware that succession in military dictatorships is not clear-cut: “We are not placing all our chips on Gaddafi.”
Or as another official put it: “Politics brings countries close, but trade brings them closer. We want both politics and trade to work in Libya.” The classic libertarian argument – free trade stops wars – is being used for regime change.
There are also basic human rights conditions for Britain selling arms to any country: if Gaddafi does want to buy from BAe, he will have to change his regime accordingly. In this way, it is argued, guns can also be a force for good.
The next step is for Libya to join the so-called Barcelona Process, an EU initiative aimed at abolishing trade barriers with 12 states along the Mediterranean. To do this, Libya needs to recognise Israel.
After the tent talks, Britain believes Gaddafi may well agree. “Libya has indicated that it will accept,” said a UK official. So Downing Street aides were euphoric on Thursday night as they returned to Brussels. All pitfalls had been avoided: Gaddafi turned up, none of his officials disputed guilt over Lockerbie and they had taken care to denounce al-Qaeda.
When Blair walked into the EU ministers meeting, explained one No 10 official, his fellow leaders were queuing up to ask how the Libya meeting had gone that morning and whether it is safe to let Gaddafi, the dictator, in from the cold.
As a prime minister who is increasingly behaving as if the history books are his prime audience, Blair must now hope Gaddafi repays the trust placed in him.
SPEED BUMPS ON THE ROAD TO PEACE
THE reinvention of Colonel Gaddafi and the removal of Saddam Hussein are two significant steps in addressing the historic instability in the Middle East. But Tony Blair knows he still has much more to do.
SYRIA: President Assad has already responded to the changed atmosphere, and the persistent rumours that his nation is a possible target for American action in the future, by launching a diplomatic offensive on Turkey and the European Union. But further progress into the international community will only come about if he caves in to demands for him to follow Libyas lead, submit to weapons inspections and, if necessary, disarm.
IRAN: Another pariah state that featured on President Bushs “Axis of Evil”, Iran has also moved quickly to improve its relations with the West. In line with Libyas renouncement of WMD, Iran has also allowed tougher inspections of its nuclear sites by the International Atomic Energy Agency, and accepted American humanitarian assistance after the earthquake in Bam.
ISRAEL: Hostility towards Israel is a fundamental reason for international suspicion of the likes of Syria and Iran, but the EU and, to a lesser extent, the Americans remain concerned about Tel Avivs commitment to the peace process. Both Washington and Brussels defend Israels right to exist, but Prime Minister Ariel Sharon has increasingly been identified as an obstacle to the road map to peace in the region.
Last Updated: 28 March 2004 2:10 AM
Source: Scotland On Sunday
Shell secures Libya deal during Blair’s visit
afrol News, 26 March – The oil multinational Royal Dutch/Shell has signed an agreement to re-enter the oil and gas industry of Libya at an estimated values of almost US$ 1 billion. The Anglo-Dutch oil giant announced the deal as British Prime Minister made a historic visit to Libya yesterday.
Shell in a press statement announced has announced a “landmark heads of agreement” for the establishment of “a long term strategic partnership in the Libyan upstream oil and gas industry.” Analysts hold the cooperation deal between Shell and Libya’s National Oil Corporation is worth up to US$ 1 billion.
According to Shell, the agreement comprises the preliminary understanding of the parties regarding key principles for participation by Shell in the Libyan upstream, including onshore exploration, and the development of liquefied natural gas facilities. The deal further could lead to the development of world-class integrated upstream and liquefied natural gas export projects, the Shell statement said.
Shell was active in the Libyan oil industry from the 1950s until 1974, and conducted exploration in the country in the late 1980s. With the rupture of British-Libyan diplomatic relations and international sanctions against Libya following several terrorist attacks in Europe attributed to Tripoli, Shell ceased its operations in Libya.
Also the Shell communiqué refers to the new deal coinciding with the visit of UK Prime Minister Blair, to meet with the Libyan leader, Colonel Muammar Gaddafi. Mr Blair’s visit symbolises the reestablishment of normal diplomatic ties between Britain and Libya and has also served as a door-opener for British companies wanting to invest in Libya. Shell is to become the by far largest single investor until now.
The Libya visit of Prime Minister Blair, combined with the warm welcome he received and the friendly tone between the two leaders, has caused strong negative reactions in London, where the visit is seen as premature. The British conservative opposition said visit had a “quite odd timing” as Mr Blair was travelling from the memorial service commemorating the Madrid terrorism victims; to his Tripoli meeting; and from there to an EU summit in Brussels on terrorism.
The British are however far from the first European nation to completely normalise diplomatic and economic relations with Libya. Both the Heads of Government of Spain and Italy recently have visited Colonel Gaddafi in Tripoli. International oil companies already present in Libya include Eni of Italy, Repsol of Spain and Greek, Austrian and Australian companies.
Shell will however become the largest European player in Libya, as the stakes are now. The newly signed agreement will also boost the British-Libyan trade link. Malcolm Brinded of Shell in a statement yesterday confirmed he looked forward “to our cooperation becoming a cornerstone in a renewed trade relationship between the UK and Libya.”
Shell was in a hurry to complete a favourable deal with Libya before the US government lifts its trade sanctions on Libya. US oil companies are believed to gain a major role in the Libyan oil and gas industry, in particular in the production of crude oil. While US sanctions are still in place, Washington has given US companies a green light to start negotiating future Libyan deals and the first US oil company, Occidental, is already present in Libya.
Libya urgently needs foreign investments and technology to develop its oil and gas industry, which has stagnated since the imposition of sanctions. The country in particular has a large unexploited potential in technology demanding offshore oil and gas production.
While the US demand is greatest in oil products, Libya can count on a growing European gas market. Most of continental Europe and Britain is connected in a gas network, which is emerging the main household energy source in many countries. This market was still relatively small as the sanctions were imposed and Libya’s gas industry is therefore underdeveloped.
The timing is also good for the British government and for Shell. Britain needs to find more gas suppliers in the region as its own North Sea reserves are drying up. Shell also needed a good Libyan deal to step out of the crises that have plagued the company lately, including a sudden depreciation of its oil and gas stocks and irregularities in company accounts.
© afrol News
Shell first off blocks in race to cash in on UK’s new friendship
By Ben Russell in Tripoli and Saeed Shah
Shell signed a deal with Libya yesterday which could open up billions of pounds worth of natural gas reserves as British firms began a rush to develop commercial opportunities in the former pariah state.
Under the agreement, the Anglo-Dutch energy giant will search the Libyan desert for oil and gas over the next seven years. Shell executives have spent three years negotiating the deal to explore inland fuel reserves and redevelop the country’s facilities to produce liquid natural gas.
The deal heralds a potentially major development in trade between the two countries.
BAE Systems, the defence and civil aviation giant, is currently negotiating to provide civil airport services, while other British companies are thought to be anxious to exploit thawing relations between London and Tripoli.
Mike O’Brien, the Foreign Office and Trade minister, will lead a delegation of British business leaders to the Libyan capital next month.
The British Government said it saw “potential” for UK business in Libya across a number of sectors including oil and gas, airports, ports and logistics, education and training, healthcare and tourism.
Malcolm Brinded, head of exploration and production at Shell, said the deal with Colonel Gaddafi’s regime was potentially highly significant for the country’s future prospects.
He said: “Libya has the chance of being a top 20 country, I would put it that way.”
Mr Brinded welcomed the improving relations saying: “It just gives everybody confidence on both sides, as political relationships improve the climate for improving trade and commercial relationships goes hand in hand.
He continued: “One should stress this is an exploration programme and there is always a significant risk that it doesn’t lead anywhere. If successful I would expect it to be a multibillion-dollar investment and I would expect there to be the potential in this place.
“We were in Libya in the Fifties and we were in Libya in the Eighties for an exploration programme, but for this one we came back in 2001 and so this is the culmination of discussions over that.”
Libya could rapidly become more important as a trading partner for Britain. Exports to Libya in 2003 amounted to £241m, making it Britain’s 58th most significant foreign market. Imports to the UK from Libya last year were worth £202m.
There are extensive gas reserves in Libya and even bigger known oil deposits – it has the eight largest oil reserves in the world, even though exploration in the country has been hampered for the last 20 years by lack of Western investment and technological know-how.
BAE said it was negotiating a deal with the Libyans for airport and air traffic infrastructure work, to modernise the country’s outdated civil air travel facilities.
The deal, when signed, would cover everything from helping to manage the country’s air traffic control to providing specialist equipment to the fire crew at Libya’s airports.
In time, the relationship could extend to selling Libya commercial aircraft or leasing civil planes, said Richard Coltart, a BAE spokesman. He added that talks had been going on for a “some years”. Mr Coltart insisted that the agreement would not cover military equipment or expertise. “This is civil. Defence matters are not under discussion,” he said.
Shell plans to pump £340m into Libya for gas exports
By Carl Mortished, International Business Editor
SHELL has secured a foothold in the development of a Libyan gas export industry, agreeing to invest up to $637 million (£337 million) in the country that a year ago emerged from pariah status when its leader, Colonel Gaddafi, renounced weapons of mass destruction.
Shell has agreed to rejuvenate and upgrade a liquefied natural gas (LNG) plant on the Libyan coast in a deal that also gives the company the right to explore for gas in an area covering 20,000 square kilometres of the Sirte Basin, a major oil and gas producing region.
The Anglo-Dutch oil company claimed yesterday to be the first foreign oil company to re-enter Libya since international sanctions were imposed after the bombing of a PanAm airliner over Lockerbie in 1988. Malcolm Brinded, Shells head of exploration, said that he was excited about the deal: Libyas integrated gas industry has enormous potential, based on its large gas resources and favourable geographic location.
Yesterdays deal emerged after negotiations that followed the visit by Tony Blair to Tripoli in March last year, where he met Colonel Gaddafi and Shell revealed that it was in talks with Libyas National Oil Corporation.
Several US companies, including Occidental Petroleum, have since won oil production rights in a competitive licensing round in which no European firm was successful. Industry experts said the US bids conceded much of the profits to the Libyan partners.
Shell said that the LNG project would strengthen its supply position in the Atlantic basin LNG market. The company would not reveal its share of the LNG to be produced by the Marsa Al-Brega plant, which Shell will upgrade, increasing its output from 0.7 million tonnes to 3.2 million tonnes a year.
Shell will initially invest $105 million, rising to $450 million, in the plant and it has the option to build a second plant, subject to finding sufficient gas.
The Libyan gas deal will heat up competition to supply LNG to markets in Western Europe and the US where high gas prices have recently encouraged investment in massive schemes.
*Energy companies and oil-producing nations must invest more in expanding capacity, according to the International Energy Agency. The energy watchdog said investment in oil and gas production, refining, power generation and transmission was too low to meet expected growth in demand.
FROM REVOLUTION TO EXPLORATION
1977: Colonel Gaddafi declares peoples revolution.
1984: WPC Yvonne Fletcher killed outside Libyan Embassy, London, sparking breakdown in UK-Libyan relations.
1988: PanAm flight 103 explodes over Lockerbie, killing 259 passengers and 11 people on the ground.
1991: US accuses two Libyan intelligence officers of Lockerbie bombing. UN imposes sanctions on Libya.
1999: Two suspects handed over for trial; UN sanctions suspended; relations between UK and Libya restored.
2003: Libya admits Lockerbie responsibility and signs $2.7 billion restitution deal for victims. UN lifts sanctions. Libya abandons weapons of mass destruction programme.
2004: Tony Blair meets Colonel Gaddafi in Libya.
2005: Libyan auction of oil and gas exploration licences.
TIMES ARTICLE
Posted in: Gas, GoogleNews, Iraq, John Donovan, Oil, Outspoken Articles, Royal Dutch Shell Plc, Shell.
← Lockerbie release casts dark shadow over Britain’s ties with US
Shell’s Malcolm Brinded – lustful friend of Libya →
0 Comments on “Shell has been stalking the Libyans ever since relations thawed”
|
cc/2019-30/en_middle_0056.json.gz/line12482
|
__label__cc
| 0.518372
| 0.481628
|
WO2007077526A2 - A flexible segmentation scheme for communication systems - Google Patents
A flexible segmentation scheme for communication systems Download PDF
WO2007077526A2 PCT/IB2007/000020 IB2007000020W WO2007077526A2 WO 2007077526 A2 WO2007077526 A2 WO 2007077526A2 IB 2007000020 W IB2007000020 W IB 2007000020W WO 2007077526 A2 WO2007077526 A2 WO 2007077526A2
data block
PCT/IB2007/000020
Tsuyoshi Kashima
Mika P. Rinne
Jukka Ranta
Paivi Purovesi
Nokia, Inc.
2007-01-04 Application filed by Nokia Corporation, Nokia, Inc. filed Critical Nokia Corporation
H04L1/00—Arrangements for detecting or preventing errors in the information received
H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L1/18—Automatic repetition systems, e.g. van Duuren system ; ARQ protocols
H04L1/1809—Selective-repeat protocols
H04L1/1607—Details of the supervisory signal
H04L1/1621—Group acknowledgement, i.e. the acknowledgement message defining a range of identifiers, e.g. of sequence numbers
H04L1/1867—Arrangements specific to the transmitter end
H04W28/00—Network traffic or resource management
H04W28/02—Traffic management, e.g. flow control or congestion control
H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
H04W28/065—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information using assembly or disassembly of packets
Y10S370/00—Multiplex communications
Y10S370/912—Packet communications
Y10S370/914—Rate converter
Y10S370/916—Multiplexer/demultiplexer
Methods, computer program products, electronic devices and information blocks are provided that improve both efficiency of transmission and efficiency of segmentation by enabling an intelligent transport block size determination and a flexible segmentation scheme suitable for utilization with retransmission. One exemplary method involves steps of: determining a size of a transport block based on criteria including a size of at least one data block to be transmitted, wherein the transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block; segmenting the data block of the at least one data block into a plurality of segments including the at least one segment; and populating the transport block with at least the at least one segment.
A FLEXIBLE SEGMENTATION SCHEME FOR COMMUNICATION
TECHNICAL FIELD:
[0001] The exemplary and non-limiting embodiments of this invention relate generally to wireless ς communication systems and, more specifically, relate to segmentation schemes.
[0002] The following abbreviations are herewith defined:
[0003] 3 G Third Generation Mobile Network
[0004] AR access router
[0005] ARQ automatic repeat request
[0006] BS base station (also referred to as a Node B)1,.
[0007] E-UTRAN Evolved Universal Terrestrial Radio Access Network
[0008] HSDPA High Speed Downlink Packet Access
[0009] IP internet protocol
[0010] Ll Layer 1 (Physical Layer)
[0011] L2 Layer 2 (MAC Layer)
[0012] LCID logical channel identity
[0013] MAC Medium Access Control Layer (L2)
[0014] PHY Physical Layer (Ll)
[0015] PDU protocol data unit [0016] QoS quality of service
[0017] RNC radio network controller ,
[0018] SDU service data unit
[0019] SSN service data unit (SDU) sequence number
[0020] TB transport block
[0021] TCP transmission control protocol
[0022] UDP user datagram protocol
[0023] UE user equipment
[0024] UL uplink
[0025] UTRAN Universal Terrestrial Radio Access Network
[0026] VoIP voice over internet protocol
[0027] WCDMA Wide-Band Code-Division Multiple Access
[0028] WLAN wireless local area network
[0029] In E-UTRAN, application flows with different QoS requirements are served over the wireless path by different logical channels in the MAC protocol layer. MAC SDUs, which are higher layer packets such as IP packets, are queued in priority queues, which are arranged for the logical channels. The amount of data to be transmitted for each logical channel is determined for every radio frame transmission, attempting to meet the QoS requirements of each IP traffic flow. Then, for each UE, MAC multiplexes (concatenates) the scheduled data from the priority queues into one TB. In this process, MAC may need to segment MAC SDUs to make them fit into the TB. After triggering TBs from MAC, PHY multiplexes TBs from different UEs into a radio frame.
[0030] In prior art cellular systems (e.g., 3G), the SDUs are segmented and
■ concatenated to constant size PDUs, which are defined per transport channel. This adds segmentation and multiplexing overhead. The reasoning is that the transmission capacity of a radio link varies in time and small payloads are often available. Thus the constant size PDU typically needs to be small. A small PDU fits well with the small rate channels, but will cause a lot of overhead when segmenting large SDUs into the small PDUs. On the other hand, many small PDUs need to be created for the high rate channels, which will cause multiplexing overhead. Optimally, the PDU size would be modified depending on the capabilities of the transport channel and its temporary conditions. However, modification of the PDU size, in 3 G, requires a heavy peer-to-peer procedure and re-segmentation. Hence, it is typically not preferred.
[0031] In prior art wireless systems (e.g., WLAN), SDUs are transmitted as full packets. The multiple access is based on random access/collision detection in uplink and scheduling in downlink. Thus, once a transmission resource is indicated for a given user, it is allowed to use the full bandwidth for a short period of time as required for the transmission of the entire SDU available. In such a manner, there is. less segmentation and multiplexing overhead. However, large expected multi-user multiplexing gains will not be available.
[0032] The problems of these prior art segmentation schemes are even more evident in newer cellular and wireless systems, where the available bandwidth is large, bandwidth flexibility is large and the symbol rate is high, but varying radio conditions impose receiver-dependent and time/frequency-dependent characteristics on the transmission of each radio link. On the other hand, for any receiver, gains available by frequency scheduling, gains available by exploiting the frequency diversity present in the channel and gains available by adaptive transmission bandwidth selection are significant. Yet, multi-user gains, which are realized by allocating independent radio links efficiently in time and frequency are significant as well. Thus, the segmentation scheme should be flexible and efficient to allow usage of any of these kinds of transmission techniques. Neither of the mentioned prior art schemes, i.e. a fixed PDU size and a trivial segmentation scheme, can efficiently meet these contradictory requirements. In such conditions, full SDU transmissions are feasible and generally preferred for low overhead. However, segmentation may still be necessary for large SDUs to be received on difficult low bit-rate radio links. [0033] In conventional segmentation approaches for WCDMA and HSDPA, segmentation is performed before a TB size is decided. Hence, the system can only deliver fixed size or at least ready-made segments and thus has to concatenate segments to fill the TB efficiently. This increases the amount of headers and complicates the procedure by trying to match segments to the tail of the TB.
[0034] In another prior art segmentation scheme, SDU retransmissions using the SSN is employed. However, full SDU retransmission is generally inefficient and may lead to problems in low bit-rate radio link conditions. The efficiency also depends on the traffic class and the size distribution of data. If the application generates large TCP/UDP segments in the IP packets and the system bandwidth is narrow, one SDU must be segmented into many small segments. For example, the maximum transmission unit (MTU) or maximum segment size (MSS) for an IP packet over Ethernet is typically 1500 bytes, and one sub-frame over a 1.25 MHz system with 1/2-coding rate and Quadrature Phase Shift Keying (QPSK) modulation only has about 450 information bits. This means that, for this system, one SDU will be segmented into 28 segments, thus increasing the probability of SDU error. A large SDU in such a system would likely be re-transmitted one or more times. Not only will the throughput of the radio link be significantly reduced but, in addition, the cell throughput will be reduced since retransmissions are typically prioritized.
[0035] In an exemplary aspect of the invention, a method is provided. The method includes: determining a size of a transport block based on criteria including a size of at least one data block to be transmitted, wherein the transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block; segmenting the data block of the at least one data block into a plurality of segments including the at least one segment; and populating the transport block with at least the at least one segment.
[0036] In another exemplary aspect of the invention, a computer program product is provided. The computer program product includes program instructions embodied on a tangible computer-readable medium. Execution of the program instructions results in operations including: determining a size of a transport block based on criteria including a size of at least one data block to be transmitted, wherein the transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block; segmenting the data block of the at least one data block into a plurality of segments including the at least one segment; and populating the transport block with at least the at least one segment.
[0037] hi a further exemplary aspect of the invention, another method is provided. The method includes: segmenting a data block into a plurality of segments, wherein each segment of the plurality of segments has a data block identifier, a length value and an offset value, wherein the data block identifier has an identification of the segmented data block, wherein the length value has the length of the segment, wherein the offset value has the boundary of the segment as compared to the segmented data block, wherein the segmented data block is to be transported by a plurality of transport blocks; populating a transport block of the plurality of transport blocks with' at least one segment of the plurality of segments; and in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the indicated segment, wherein the retransmission notice includes the data block identifier, the length value and the offset value of the indicated segment.
[0038] In another exemplary a computer program product is provided. The computer program product includes program instructions embodied on a tangible computer-readable medium. Execution of the program instructions results in operations including: segmenting a data block into a plurality of segments, wherein each segment of the plurality of segments has a data block identifier, a length value and an offset value, wherein the data block identifier has an identification of the segmented data block, wherein the length value has the length of the segment, wherein the offset value has the boundary of the segment as compared to the segmented data block, wherein the segmented data block is to be transported by a plurality of transport blocks; populating a transport block of the plurality of transport blocks with at least one segment of the plurality of segments; and in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the indicated segment, wherein the retransmission notice includes the data block identifier, the length value and the offset value of the indicated segment.
[0039] In a further exemplary aspect of the invention, an electronic device is provided. The electronic device includes: a memory configured to store at least one data block to be transmitted by a transport block; and a data processor coupled to the memory, wherein the data processor is configured to perform operations including: determining a size of the transport block based on criteria including a size of a data block of the at least one data block, wherein the transport block size is determined such that the transport block will include at least one segment of the data block; segmenting the data block into a plurality of segments including the at least one segment; and populating the transport block with at least the at least one segment and the at least one full data block.
[0040] In another exemplary aspect of the invention, an information block is provided. The information block is to be transmitted from a first node to a second node and is stored on a tangible computer-readable medium prior to transmission. The information block includes: a portion of a data block, wherein the portion of the data block does not include the complete data block; a data block identifier having an identification of the data block; a length value having a size of the portion of the data block; and an offset value having a boundary of the portion of the data block as compared to the complete data block.
[0041] In a further exemplary aspect of the invention, an electronic device is provided. The electronic device includes: a data processor; and a transmitter coupled to the data processor. The transmitter is configured to transmit a retransmission notice indicating a segment of a plurality of segments. The retransmission notice includes a request for retransmission of the indicated segment. The plurality of segments include a segmented data block. The retransmission notice has a data block identifier, a length value and an offset value of the indicated segment. The data block identifier has an identification of the segmented data block. The length value has a length of the indicated segment. The offset value has a boundary of the indicated segment as compared to the segmented data block. BRIEF DESCRIPTION OF THE DRAWINGS:
[0042] The foregoing and other aspects of embodiments of this invention are made more evident in the following Detailed Description, when read in conjunction with the attached Drawing Figures, wherein:
[0043] Figure IA shows a simplified block diagram of various electronic devices, as connected to a wireless network, that are suitable for use in practicing the exemplary embodiments of this invention;
[0044] Figure IB shows a simplified block diagram of various electronic devices, as connected to a base station that is itself connected to a network with one or more access routers, that are suitable for use in practicing the exemplary embodiments of this invention;
[0045] Figure 2 illustrates an exemplary segment structure of a segment as employed by exemplary embodiments of this invention;
[0046] Figure 3 depicts the data flow for practicing an exemplary embodiment of this invention;
[0047] Figure 4 shows a detailed message signalling chart for downlink data transmission procedures of an exemplary embodiment of this invention;
[0048] Figure 5 shows a detailed message signalling chart for uplink data transmission procedures of an exemplary embodiment of this invention;
[0049] Figure 6 illustrates a detailed message signaling chart for uplink data transmission procedures of an exemplary embodiment of this invention in a longer time scale than Figure 5;
[0050] Figure 7 illustrates a detailed message signaling chart for uplink data transmission procedures of another exemplary embodiment of this invention in a longer time scale than Figure 5;
[0051] Figure 8 represents an exemplary embodiment of the invention with a vector delivery arranged per logical channel;
[0052] Figure 9 shows a message sequence chart for an exemplary embodiment of the invention using the LCIDs and SDUs of Figure 8;
[0053] Figure 10 illustrates an exemplary embodiment of the invention wherein a SDU is segmented based on a determined TB size;
[0054] Figure 11 illustrates a further implementation of the exemplary embodiment of Figure 10 wherein the SDU is further segmented based on another determined TB size;
[0055] Figure 12 depicts a flowchart illustrating one non-limiting example of a method for practicing the exemplary embodiments of this invention; and
[0056] Figure 13 depicts a flowchart illustrating another non-limiting example of a method for practicing the exemplary embodiments of this invention. .
[0057] Exemplary embodiments of the invention improve both the efficiency of the transmission and the efficiency of the segmentation by providing an intelligent TB size determination method and a flexible segmentation scheme for retransmission. The ■ description focuses on downlink transmission and is primarily for the BSs, although these serve as non-limiting exemplary embodiments of the invention. Additional non-limiting exemplary embodiments of the invention include respective applications of the method to a UE and UL transmission. In the downlink transmission exemplary, the receiver functionality is in the UE. In the uplink transmission exemplary, the receiver functionality is in the BS. Note that this invention can be applied to any protocol layer that has segmentation and retransmission functionalities. As a non-limiting example, it may be applied to the L1/L2 interface for E-UTRAN.
[0058] Reference is made first to Figure IA for illustrating a simplified block diagram of various electronic devices that are suitable for use in practicing the exemplary embodiments of this invention. In Figure IA, a wireless network 1 is adapted for communication with a UE 10 via a Node B (base station) 12. The network 1 may include a RNC 14, which may be referred to as a serving RNC (SRNC). The UE 10 includes a data processor (DP) 1OA, a memory (MEM) 1OB that stores a program (PROG) 1OC, and a suitable RF transceiver 1OD (having a transmitter (TX) and a receiver (RX)) for bidirectional wireless communications with the Node B 12, which also includes a DP 12A5 a MEM 12B that stores a PROG 12C, and a suitable RF transceiver 12D. The Node B 12 is coupled via a data path 13 (Iub) to the RNC 14 that also includes a DP 14A and a MEM 14B storing an associated PROG 14C. The RNC 14 may be coupled to another RNC (not shown) by another data path 15 (Iur). At least one of the PROGs 1OC, 12C and 14C is assumed to include program instructions that, when executed by the associated DP, enable the electronic device to operate in accordance with the exemplary embodiments of this invention, as will be discussed below in greater detail.
[0059] Figure IB shows a simplified block diagram of various electronic devices that are suitable for use in practicing the exemplary embodiments of this invention. As in Figure IA, Figure IB depicts a wireless network adapted for communication with a UE 10 via a Node B (base station) 12. The UE 10 includes a data processor (DP) 1OA, a memory (MEM) 1OB that stores a program (PROG) 1OC, and a suitable RF transceiver 1OD (having a transmitter (TX) and a receiver (RX)) for bidirectional wireless communications with the Node B 12, which also includes a DP 12A, a MEM 12B that stores a PROG 12C, and a suitable RF transceiver 12D. The Node B 12 is coupled via a data path 16 to a network 17. The network 17 contains one or more access routers (AR) 17A, 17B, and 17C to facilitate the connection with Node B 12. At least one of the PROGs 1OC and 12C is assumed to include program instructions that, when executed by the associated DP, enable the electronic device to operate in accordance with the exemplary embodiments of this invention, as will be discussed below in greater detail.
[0060] In general, the various embodiments of the UE 10 can include, but are not limited to, cellular phones, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, image capture devices such as digital cameras having wireless communication capabilities, gaming devices having wireless communication capabilities, music storage and playback appliances having wireless communication capabilities, Internet appliances permitting wireless Internet access and browsing, as well as portable units or terminals that incorporate combinations of such functions.
[0061] The embodiments of this invention may be implemented by computer software executable by the DP 1OA of the UE 10 and other DPs such as the DP 12 A, or by hardware, or by a combination of software and hardware.
[0062] The MEMs 1OB, 12B and 14B may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor-based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory. The DPs 1OA, 12A and 14A may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs), processors based on a multi-core processor architecture, and Application Specific Integrated Circuits (ASICs), as non-limiting examples.
[0063] Exemplary embodiments of this invention provide a TB size determination method that takes the SDU boundaries into account, and a flexible segmentation scheme that allows flexible segment retransmission. According to exemplary embodiments of the invention, TB size is determined taking the SDU boundaries into account and segmentation is performed after the TB size has been determined. Given a TB size and SDU boundaries, the MAC segments MAC SDUs to fit them into the TB by considering the MAC SDU boundary. For example, if the MAC SDU is very small, such as for a VoIP packet, the MAC does not segment the SDU at all. Another non-limiting example of a small MAC SDU is a TCP acknowledgement. In addition, if the remaining part of the SDU is very small, further segmentation is avoided, if possible. As many full, non-segmented SDUs as possible are delivered by each TB. In the remainder of the TB, that is, the portion that cannot be filled by complete SDUs, a sequence of bytes (variable length segments of SDUs) is inserted to fill the TB. Note that the headers, as overhead of the payload, may be subtracted from the variable length SDU size filling the TB exactly.
[0064] In relation to the retransmission technique, exemplary embodiments of this invention provide a segment structure using offset and length fields. "Offset" and "length" refer to the starting position of the segment in the original SDU and the length of the segment (e.g., in byte resolution), respectively. The receiver is configured to maintain a receiver window for the full SDUs by having an offset and length signaled for the segments of partially transmitted SDUs. The receiver window indicates which SDUs are missing, which SDUs have been fully received, which SDUs have been partially received, and which part(s) of the SDUs are missing. The partially received SDUs may have one or several segments missing. However, once a later segment is correctly received, the receiver is enabled to track between which offsets it has missing data. In fact, the receiver does not need to know whether the transmitter originally tried to deliver the missing part in one or more segments. When generating an ARQ status report, the receiver calculates the missing data between the received offsets for any partially received SDU. Thus, the retransmission request is indicative of a portion from (offset (early) + length) to offset (late), which is announced as a retransmission request; offset = offset (early + length) and length = offset (late) - (offset (early) + length). After the transmitter receives an ARQ status report or negative-acknowledgements (NACKs), it retransmits missing data for the requested missing full SDUs and for the requested partially missing SDUs. The transmitter may decide to retransmit the full SDU or only the missing segments. Employing the invention's segmentation scheme, the retransmission of missing segments is not bound to the original segment sizes and the transmitter may append them to the TB transmission either in larger numbers of smaller segments or in smaller numbers of larger segments, as compared to the original transmission. This choice may also depend on the TB size, which is determined at the time based on frame scheduling (multi-user scheduling) and logical channel priorities.
[0065] As a non-limiting example, one approach that may be utilized in conjunction with the exemplary embodiments of the invention comprises using the segment sequence number to indicate re-numbering of the segments (i.e., the offset value). Generally, using the segment sequence number for retransmission requests independently of aspects of the exemplary embodiments of the invention is not preferred as the segment size may change depending on radio link conditions and their retransmission by segment sequence number would require re-segmentation and re-numbering. However in this case, the segment sequence number (of the re-segmented segment having a re-numbered segment sequence number) may be employed in conjunction with aspects of the exemplary embodiments of the invention, for example, by using the segment sequence number as the offset value comprising a boundary of the indicated segment.
[0066] For a large SDU requiring retransmission, the transmitter may simply segment the missing parts of the large SDU and attempt to deliver them again, potentially as a sequence of smaller segments. (Note that re-segmentation is not necessary as the non-segmented full SDUs reside in the priority queues contrary to the prior art.) Such smaller segments would consume marginal capacity from the sub-frame and cell throughput would be maintained by the other served radio links, even if the throughput of that specific radio link appeal's to drop. Further, it is possible to apply more robust transport formats (low order modulation, low rate channel code, increased diversity mode) to the smaller segments as compared to the transport format selection for larger segments or full SDUs. Note that a retransmission without adapting to smaller segments or a more robust transport format is also feasible and is within the scope of the exemplary embodiments of this invention.
[0067] When determining the TB size for each radio link (UE) at a given sub-frame instance, SDU boundaries should be taken into account in addition to other factors such as the expected channel conditions of the radio links, the amount of data to be transmitted from each of the priority queues of the logical channels and the priority of the UEs, as non-limiting examples. The amount of data to be transmitted may be any quantity from the minimum guaranteed data to all available data in the queues. This becomes feasible due to the great degree of freedom that the scheduler and allocation functions have, either to schedule fewer UEs per sub-frame with larger payloads less frequently or to schedule more UEs per sub-frame with smaller payloads more frequently. These choices lead to different gain factors of transmission and different amounts of segmentation and multiplexing overhead.
[0068] In exemplary embodiments of the invention, two methods, herein identified as (A) and (B), may be employed when requesting data transmission.
[0069] (A) The amount of data to be transmitted for each traffic flow (priority queue) and the MAC SDU boundaries closest to these values are provided. Then, the TB size allocated for each UE is determined by utilizing all available information so that the block size contains SDUs with minimum or no segmentation.
[0070] (B) The amount of data to be transmitted from each traffic flow
(priority queue), herein referred to as the SDU-aligned data amount, is calculated based on the scheduling decision and is aligned to the SDU boundaries as much as possible. When requesting data transmission, the SDU-aligned data amount is provided.
[0071] Using either method, given the information, the block size is determined so that segmentation is avoided as much as possible. However, this is merely a guideline and the block size or requested data size need not always be aligned to the SDU boundaries if, for example, the discrepancy is large.
[0072] For method (A) above, a vector comprising the minimum amount of data to be transmitted and MAC SDU boundaries closest to the minimum amount (the elements of which correspond to traffic flows) are provided using the interface. Other parameters, such as priority, may also be provided using the interface.
[0073] For method (B) above, a vector of SDU-aligned data amounts (the elements of which correspond to traffic flows) are provided. Other parameters, such as priority, may also be provided using the interface.
[0074] Given a TB size, segmentation is performed, when necessary, for packing SDUs into the TB. Each segment comprises the SDU sequence number, length, and partial SDUs, wherein the partial SDUs additionally include the segment offset inside a full SDU. As noted above, "offset" indicates the starting position of the segment in the original SDU and "length" indicates the length of the segment, which may be in byte resolution.
[0075] Figure 2 illustrates an exemplary segment structure of a segment 20.
Segment 20 contains a segment header 21 and a payload 26. The segment header 21 comprises the SDU sequence number (SSN) 22, the length value of the segment 23, the offset value 24 (optional), and other fields in the segment header (OF) 25, if necessary. Payload 26 contains information from the SDU. [0076] When retransmission is necessary, the receiver may request the retransmission of a missing SDU by indicating the SSN. The receiver may request the retransmission of a missing part of a SDU by indicating the SSN5 offset and length of the missing part. These retransmission requests are signalled in an ARQ status report. When retransmission is requested and the given, new TB size cannot accommodate the original segment size, the transmitter may perform segmentation, to any size, by using the length and offset fields.
[0077] Figure 3 depicts the data flow. Starting from logical channel queues 30,
34, MAC SDUs are segmented if necessary 31, 35, and multiplexed (concatenated) 32, 36 into a transport block 33, 37 for each UE. Then, TBs 33, 37 are multiplexed 38 into a physical radio frame 40, sent out through Ll 39. As illustrated in the figure for TB-n 37, TBs 33, 37 comprise a header with a combination of one or more SDUs, noted in the figure as SDUl and SDU2, and/or a segment. Radio frame 40 comprises a header with one or more multiplexed TBs, indicated in the figure by TB-I and TB-n.
[0078] Figures 4 and 5 illustrate detailed message signalling charts for downlink and uplink data transmission procedures, respectively. Depending on the scheduling (e.g., at the MAC layer), the amount of data to be transmitted for each logical channel of each UE is determined. Then, the MAC provides vector information for the data amount (which can be either option (A) or (B) as noted above), each element of which corresponds to each logical channel. In this vector information, the SDU boundaries are taken into account. Then, the allocation unit (e.g., at PHY) determines the TB size by using the given information comprising the data amount and radio link conditions, among other factors, and returns the TB size information to the MAC layer for each of the active radio links. Given the TB size, MAC starts segmentation by taking the SDU boundaries into account. The segment structure can be as shown in Figure 2. The retransmission (at the MAC layer) can use flexible segment size according to the invention.
[0079] For the above signalling procedure, the primitives are defined as follows in Table 1. W
[0080] Table 1
[0081] Figures 6 and 7 illustrate two different candidate message signalling charts for uplink data transmission procedures, shown in a longer time scale than Figure 5. In order to realize the uplink packet scheduling in BS as shown in Figure 5, UE informs the BS of the uplink data amount to be scheduled in the next uplink scheduling period. In these candidate examples, the uplink scheduling period is set to be several radio frames. For this uplink data indication from UE to BS, RRC message (e.g., a Capacity Request Message) and MAC control PDU (e.g., an Uplink Buffer Status Report) are used in Figures 6 and 7, respectively. Either one of these may be used in exemplary embodiments of this invention.
[0082] An overview of the flexible segmentation method, including the retransmissions, is shown in Figure 8. This figure shows the invention with a vector delivery arranged per logical channel. "KSx,y" and "LSx,y" denote the y-th segment of the K-th logical channel of SDU number x and the y-th segment of the L-th logical channel of SDU number x, respectively. For different logical channels K and L, the SDU boundaries are taken into account. For the retransmission, the use of offset and length enables fully flexible segment sizes. The method employed favors transmission of complete SDUs, but it further allows for the segmentation of SDUs into any byte aligned size, which is decided at the transmission instant. Thus, for any retransmission, the segment size may be freely changed. Included is an ARQ status report, which, in addition to a full SDU error bitmap, may announce the offset and length of the missing segments of partially received SDUs.
[0083] In Figure 8, five TBs are depicted, numbered 1 through 5 (i.e., TB1 through TB5). Of the five TBs, TB2 and TB3 are not received. Hence, LS 1,2 and LS 1,3 (also referred to as LS 1,23) are retransmitted in TB5 in accordance with the exemplary embodiments of this invention.
[0084] Figure 9 is a message sequence chart based on the LCIDs, SDUs and
TBs of Figure 8. Transmitter (TX) and receiver (RX) windows are shown with their respective contents as the transmissions progress, hi accordance with exemplary embodiments of the invention, the receiver initially fails to receive partial SDUs LS 1,2 and LS 1 ,3 which are subsequently retransmitted in TB5 as LS 1 ,23. As stated above, the request for retransmission of SDUs LS 1,23 may comprise an ARQ status report or a NACK, as non-limiting examples.
[0085] Figure 10 illustrates an exemplary embodiment of the invention wherein a SDU is segmented based on a determined TB size. In Figure 10(A), three SDUs are shown, SDU0 62, SDU1 64 and SDU2 66, with each having a length L0, L1 and L2, respectively. As indicated, L0 = 100 bytes, L1 = 400 bytes and L2 = 300 bytes. The three SDUs 62, 64, 66 of Fig. 10(A) are to be transmitted.
[0086] In Figure 10(B), the length (LTBI) of a TB1 68 is determined based on criteria including the sizes Lo, L1, L2 of the SDUs 62, 64, 66. As a non-limiting example of this process, consider the following. It is desirable to transmit at least one complete SDU. Thus, the TB size preferably should be no less than 100 bytes (i.e., the TB preferably should be able to hold at least the smallest SDU, SDUo 62). However, due to scheduling and logical channel priorities, this communication link and SDUs, for this particular time and formation of a TB, has been allocated 200 bytes (TB1 length LTBI = 200 bytes). Although shown in Figure 10(B) for illustrative purposes, the TB1 68 has not actually been created (e.g., populated) yet.
[0087] Since it is desirable to transmit complete SDUs when possible, the TB1 68 will comprise SDU0 62. Thus, 100 bytes-worth of length remains to be filled, possibly by one or more segments of other SDUs, SDU1 64 and/or SDU2 66.
[0088] In Figure 10(C), based on the above-stated preference of transmitting at least one complete SDU and further based on the determined TB1 length LTBI, an SDU, here SDU1 64, is segmented into a plurality of segments, segment 1-1 (S1-1) 70 and segment 1-R (S1-R) 72, each having a respective length of 100 bytes (L1-1) and 300 bytes (L1-R). The SDU1 64 is purposefully segmented to produce S1-1 70 having a length L1-1 of 100 bytes such that S1-1 70 is of a suitably size to fill an available portion of the TB1 68, the available portion being the remaining portion of the TB1 68 after it has been populated with the SDU0 62. The remaining portion of the SDU1 64, namely the S1-R 72, can be transmitted, in whole or in part, in another TB. (See Figure 11 and discussion thereof below.)
[0089] In Figure 10(D), the TB1 68 is populated with the SDU0 62 and the S1-1
70. The TB1 68 may then be transmitted using the method and components discussed above in Figure 3, as a non-limiting example.
[0090] As is apparent, the size LTB1 of the TB1 68 is suitably determined by considering the lengths L0, L1, L2 of the SDUs 62, 64, 66. Furthermore, the allocated size (200 bytes) of the TB1 68 is used efficiently by enabling the segmentation of an SDU (i.e., SDU1 64).
[0091] Figure 11 illustrates a further implementation of the exemplary embodiment of Figure 10 wherein the SDU1 64 is further segmented based on another determined TB size. In Figure 11, a second TB (TB2) 78 is configured and populated using the remaining SDUs 64, 66 or portions thereof from Figure 10(A). The TB278 is subsequent to the transmission of the TB1 68 discussed in Figure 10.
[0092] In Figure 11 (A), the length (LTB2) of the TB2 78 is determined based on criteria including the sizes L1-R, L2 of the SDUs (or partial SDUs, i.e., segments) S1-R 72 and SDU2 66 that remain to be transmitted. As a further non-limiting example of this process, consider the following. It is desirable to transmit at least one complete SDU if any remain. Thus, the TB size preferably should be no less than 300 bytes (i.e., the TB preferably should be able to hold at least the smallest remaining SDU, SDU2 66). Due to scheduling and logical channel priorities having changed since the configuration and population of the first TB, TB1 68, this communication link and data, for this particular time and formation of a TB, has been allocated 500 bytes (TB2 length LTB2 = 500 bytes). Although shown in Figure 11(A) for illustrative purposes, the TB2 78 has not actually been created (e.g., populated) yet.
[0093] Since it is desirable to transmit complete SDUs when possible, the TB2
78 will comprise SDU2 66. Thus, 200 bytes-worth of length remains to be filled, possibly by one or more segments of other SDUs (e.g., a segment Of S1-R 72).
[0094] hi Figure 1 l(B), based on the above-stated preference of transmitting at least one complete SDU and further based on the determined TB2 length LTB2, a remaining portion of the SDU1, S1-R 72, is re-segmented into a plurality of segments, segment 1-23 (S1-23) 80 and segment 1-4 (S1-4) 82, each having a respective length of 200 bytes (L1-23) and 100 bytes (L1-4). The remainder of the SDU1 64, S1-R 72, is purposefully segmented to produce S1-23 80 having a length L1-23 of 200 bytes such that S1-23 80 is of a suitable size to fill an available portion of the TB2 78, the available portion being the remaining portion of the TB2 78 after it has been populated with the SDU2 66. The remaining portion of the SDU1 64 that has not been allocated to a TB, namely the S1-4 82, can be transmitted, in whole or in part, in another TB.
[0095] In Figure 1 l(C), the TB278 is populated with the SDU2 66 and the S1-23
[0096] As is apparent, the size LTB2 of the TB2 78 is suitably determined by considering the lengths L1-R and L2 of the remaining portions of SDUs (S1-R 72) and SDUs (SDU2 66). Furthermore, the allocated size (500 bytes) of the TB2 78 is used efficiently by enabling the further segmentation of a remaining portion of an SDU (i.e., the remaining portion OfSDU1 64, the S1-R 72).
[0097] Although the exemplary SDUs and TBs of Figures 10 and 11 are described with respect to their respective lengths, any suitable size indication may be used. Furthermore, any suitable measurement scale and/or unit may be employed. Although the TBs of Figures 10 and 11 are shown as comprising only SDUs or portions thereof, TBs usually comprise additional, non-SDU portions, such as portions employed for signaling or identification purposes, as non-limiting examples.
[0098] The exemplary embodiments described in Figures 10 and 11 may also be utilized in conjunction with retransmission, should retransmission be necessary. Each transmitted segment would include a SSN, a length and an offset. If it were indicated that a segment should be retransmitted, the segment would be identifiable by its SSN, length and offset, hi such a manner, only that specific portion of the SDU (i.e., the portion that comprises the identified segment) would have to be retransmitted. In such a manner, full retransmission of a complete SDU is unnecessary unless a TB was populated with the complete SDU in question.
[0099] A further non-limiting example of an exemplary electronic device suitable for use in conjunction with aspects of the exemplary embodiments of the invention . is provided. The electronic device comprises: a data processor; and a transmitter coupled to the data processor. The transmitter is configured to transmit a retransmission notice indicating a segment of a plurality of segments. The retransmission notice comprises a request for retransmission of the indicated segment. The plurality of segments comprise a segmented data block. The retransmission notice comprises a data block identifier, a length, value and an offset value of the indicated segment. The data block identifier comprises an identification of the segmented data block. The length value comprises a length of the indicated segment. The offset value comprises a boundary of the indicated segment as compared to the segmented data block. In other embodiments, the electronic device further comprises: a receiver coupled to the data processor, hi further embodiments the electronic device comprises a mobile terminal. In other embodiments, the electronic device comprises a base station in an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) system, hi further embodiments, the electronic device may comprise any other aspect or component of the exemplary embodiments of the invention as described herein.
[00100] Figure 12 depicts a flowchart illustrating one non-limiting example of a method for practicing the exemplary embodiments of this invention. The method includes the following steps, hi box 101, a size of a transport block is determined based on criteria. The criteria comprises a size of at least one data block to be transmitted. The transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block. In box 102, the data block of the at least one data block is segmented into a plurality of segments comprising the at least one segment. In box 103, the transport block is populated with at least the at least one segment.
[00101] In other embodiments, the method further comprises transmitting the populated transport block. In further embodiments, the criteria further comprises multi-user scheduling and/or logical channel priorities. In other embodiments, the criteria further comprises at least one of: expected channel conditions of a plurality of radio links, an amount of data to be transmitted from each priority queue and a priority value of each terminal that is assigned a logical channel. In further embodiments, each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block.
[00102] In other embodiments, the method further comprises: in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the segment, wherein the retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment. In further embodiments, determining the transport block size comprises calculating an amount of data to be transmitted for each priority queue based on a scheduling decision, wherein the retransmission notice comprises the amount of data to be transmitted for each priority queue.
[00103] In other embodiments, determining the transport block size comprises providing an amount of data to be transmitted for each priority queue and a size of at least one close data block, wherein the at least one close data block comprises at least one data block having a size relatively close to the amount of data to be transmitted for each priority queue, wherein the criteria further comprises the amount of data to be transmitted for each priority queue and the size of the at least one close data block, wherein the transport block size is determined such that the transport block comprises one of: whole data blocks, data blocks having minimal segmentation or a combination of whole data blocks and data blocks having minimal segmentation. In further embodiments, providing the amount of data to be transmitted for each priority queue comprises providing a vector comprising a minimum amount of data to be transmitted, wherein the sizes of the close data blocks comprise values relatively close to the minimum amount of data to be transmitted, hi other embodiments, providing the amount of data to be transmitted for each priority queue and the size of the at least one close data block comprises using an interface.
[00104] In further embodiments, determining the transport block size comprises calculating an amount of data to be transmitted for each priority queue based on a scheduling decision. In other embodiments, the amount of data to be transmitted for each priority queue comprises a value relatively close to the size of each data block of the plurality of data blocks. In further embodiments, determining the transport block size further comprises providing a vector of the amount of data to be transmitted for each priority queue, wherein the vector comprises elements corresponding to each priority queue. In other embodiments, the method is utilized in conjunction with an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) system.
[00105] Figure 13 depicts a flowchart illustrating another non-limiting example of a method for practicing the exemplary embodiments of this invention. The method includes the following steps, hi box 151, a data block is segmented into a plurality of segments. Each segment of the plurality of segments comprises a data block identifier, a length value and an offset value. The data block identifier comprises an identification of the segmented data block. The length value comprises a length of the segment. The offset value comprises a boundary of the segment as compared to the segmented data block. The segmented data block is to be transported by a plurality of transport blocks. In box 152, a transport block of the plurality of transport blocks is populated with at least one segment of the plurality of segments, hi box 153, in response to receiving a retransmission notice indicating a segment of the plurality of segments, the indicated segment is retransmitted. The retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment.
[00106] hi other embodiments, the method further comprises transmitting the populated transport block. In further embodiments, the retransmission notice comprises an automatic repeat request (ARQ) status report. In other embodiments, the retransmission notice comprises a negative acknowledgement (NACK). In further embodiments, retransmitting the indicated segment comprises re-segmenting the indicated segment into smaller segments and applying at least one of a low order modulation, a low rate channel code and an increased diversity mode.
[00107] The exemplary, non-limiting methods shown in Figures 12 and 13 and discussed with respect thereto may be embodied as a computer program comprising program instructions embodied on a tangible computer-readable medium, execution of the program instructions resulting in operations comprising the steps of the method.
[00108] Embodiments of this invention are not limited to the protocol layers Ll
(PHY) and L2 (MAC), as employed in the examples above. Rather, embodiments of this invention may be implemented for any protocol layer simply for performing segmentation efficiently for scheduling and resource allocation. The scheduler and allocation functions, as relating to the invention's segmentation process, may be included in different protocol layers having a defined interface or, alternatively, they may be included in the same protocol layer having no such specific interface. In addition, the scheduler and allocation functions may be included in different physical or logical processing units (or parts thereof) or they may be included into the same processing unit.
[00109] In one embodiment of this invention, the method described may be implemented for interfacing MAC segmentation with the scheduling and allocation functions of PHY. Hence, all labels of PHY/MAC/RRC, signaling flows, and primitives are employed as non-limiting examples. As apparent to one skilled in the art, such labels may be replaced by descriptions of any other relevant functional and/or protocol split. As a non-limiting example, segmentation, scheduling and allocation may take place in the same layer.
[00110] Although described above with respect to boundaries of SDUs, the exemplary embodiments of the invention may utilize any suitable size characteristic of the SDUs, such as length, as a non-limiting example. Furthermore, although discussed above with respect to an offset from the beginning of the SDU, the offset value may comprise any suitable value that indicates the placement of the segment with respect to the entire SDU. As a non-limiting example, the offset value could indicate re-numbering of segments as described above. As another non-limiting example, the offset value could indicate the boundary (i.e. end) of the segment that is nearest to the rear end of the SDU. In addition, although the exemplary embodiments have been discussed with respect to SDUs, the exemplary embodiments may be used in" conjunction with the transport of any suitable collection of data (e.g., a data block).
[00111] Based on the foregoing, it should be apparent that the exemplary embodiments of this invention provide a method, apparatus, and computer program product(s) to improve the efficiency of segmentation by providing an intelligent TB size determination method and a flexible segmentation scheme for transmission.
[00112] While the exemplary embodiments have been described above in the context of an E-UTRAN system, it should be appreciated that the exemplary embodiments of this invention are not limited for use with only this one particular type of wireless communication system, and that they may be used to advantage in other wireless communication systems such as 3 G high speed packet access (HSPA) evolution, wireless ad hoc networks, cognitive radios, beyond third generation (B3G) systems and fourth generation (4G) systems, as non-limiting examples. Such systems are expected to include techniques that allow for versatile methods of radio adaptation such as bandwidth adaptation, adaptation to spectral conditions, adaptation of radio capacity, adaptation of radio links and adaptation of transmission formats, as non-limiting examples.
[00113] In general, the various embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the invention is not limited thereto. While various aspects of the invention may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof. Embodiments of the inventions may be practiced in various components such as integrated circuit modules. The design of integrated circuits is by and large a highly automated process. Complex and powerful software tools are available for converting a logic level design into a semiconductor circuit design ready to be etched and formed on a semiconductor substrate.
[00114] Various modifications and adaptations may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings and the appended claims. As but some examples, the use of other similar or equivalent data flows and transmission procedures may be attempted by those skilled in the art. However, all such and similar modifications of the teachings of this invention will still fall within the scope of this invention.
[00115] Furthermore, some of the features of the examples of this invention may be used to advantage without the corresponding use of other features. As such, the foregoing description should be considered as merely illustrative of the principles, teachings, examples and exemplary embodiments of this invention, and not in limitation thereof.
1. A method comprising: determining a size of a transport block based on criteria comprising a size of at least one data block to be transmitted, wherein the transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block; segmenting the data block of the at least one data block into a plurality of segments comprising the at least one segment; and populating the transport block with at least the at least one segment.
2. The method of claim 1, further comprising: transmitting the populated transport block.
3. The method of claim 1, wherein the criteria further comprises multi-user scheduling.
4. The method of claim 1, wherein the criteria further comprises logical channel priorities.
5. The method of claim 1, wherein the criteria further comprises at least one of: expected channel conditions of a plurality of radio links, an amount of data to be transmitted from each priority queue and a priority value of each terminal that is assigned a logical channel.
6. The method of claim 1, wherein each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block.
7. The method of claim 6, further comprising: in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the segment, wherein the retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment.
8. The method of claim 7, wherein determining the transport block size comprises calculating an amount of data to be transmitted for each priority queue based on a scheduling decision, wherein the retransmission notice comprises the amount of data to be transmitted for each priority queue.
9. The method of claim 1, wherein determining the transport block size comprises providing an amount of data to be transmitted for each priority queue and a size of at least one close data block, wherein the at least one close data block comprises at least one data block having a size relatively close to the amount of data to be transmitted for each priority queue, wherein the criteria further comprises the amount of data to be transmitted for each priority queue and the size of the at least one close data block, wherein the transport block size is determined such that the transport block comprises one of: whole data blocks, data blocks having minimal segmentation or a combination of whole data blocks and data blocks having minimal segmentation.
10. The method of claim 9, wherein providing the amount of data to be transmitted for each priority queue comprises providing a vector comprising a minimum amount of data to be transmitted, wherein the sizes of the close data blocks comprise values relatively close to the minimum amount of data to be transmitted.
11. The method of claim 9, wherein providing the amount of data to be transmitted for each priority queue and the size of the at least one close data block comprises using an interface.
12. The method of claim 1, wherein determining the transport block size comprises calculating an amount of data to be transmitted for each priority queue based on a scheduling decision.
13. The method of claim 12, wherein the amount of data to be transmitted for each priority queue comprises a value relatively close to the size of each data block of the plurality of data blocks.
14. The method of claim 12, wherein determining the transport block size further comprises providing a vector of the amount of data to be transmitted for each priority queue, wherein the vector comprises elements corresponding to each priority queue.
15. A computer program product comprising program instructions embodied on a tangible computer-readable medium, execution of the program instructions resulting in operations comprising: determining a size of a transport block based on criteria comprising a size of at least one data block to be transmitted, wherein the transport block size is determined such that the transport block will include at least one segment of a data block of the at least one data block; segmenting the data block of the at least one data block into a plurality of segments comprising the at least one segment; and populating the transport block with at least the at least one segment.
16. The computer program product of claim 15, execution of the program instructions resulting in operations further comprising: transmitting the populated transport block.
17. The computer program product of claim 15, wherein each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block.
18. The computer program product of claim 15, wherein determining the transport block size comprises providing an amount of data to be transmitted for each priority queue and a size of at least one close data block, wherein the at least one close data block comprises at least one data block having a size relatively close to the amount of data to be transmitted for each priority queue, wherein the criteria further comprises the amount of data to be transmitted for each priority queue and the size of the at least one close data block, wherein the transport block size is determined such that the transport block comprises one of: whole data blocks, data blocks having minimal segmentation or a combination of whole data blocks and data blocks having minimal segmentation.
19. A method comprising: segmenting a data block into a plurality of segments, wherein each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block, wherein the segmented data block is to be transported by a plurality of transport blocks; populating a transport block of the plurality of transport blocks with at least one segment of the plurality of segments; and in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the indicated segment, wherein the retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment.
20. The method of claim 19, further comprising: transmitting the populated transport block.
21. The method of claim 19, wherein the retransmission notice comprises one of an automatic repeat request (ARQ) status report or a negative acknowledgement (NACK).
22. The method of claim 19, wherein retransmitting the indicated segment comprises re-segmenting the indicated segment into smaller segments and applying at least one of a low order modulation, a low rate channel code and an increased diversity mode.
23. A computer program product comprising program instructions embodied on a tangible computer-readable medium, execution of the program instructions resulting in operations comprising: segmenting a data block into a plurality of segments, wherein each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block, wherein the segmented data block is to be transported by a plurality of transport blocks; populating a transport block of the plurality of transport blocks with at least one segment of the plurality of segments; and in response to receiving a retransmission notice indicating a segment, retransmitting the indicated segment, wherein the retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment.
25. The computer program product of claim 23, wherein the retransmission notice comprises one of an automatic repeat request (ARQ) status report or a negative acknowledgement (NACK).
26. An electronic device comprising: a memory configured to store at least one data block to be transmitted by a transport block; and a data processor coupled to the memory, wherein the data processor is configured to perform operations comprising: determining a size of the transport block based on criteria comprising a size of a data block of the at least one data block, wherein the transport block size is determined such that the transport block will include at least one segment of the data block; segmenting the data block into a plurality of segments comprising the at least one segment; and populating the transport block with at least the at least one segment.
27. The electronic device of claim 26, further comprising: a transmitter coupled to the data processor, wherein the transmitter is configured to transmit the transport block.
28. The electronic device of claim 26, wherein each segment of the plurality of segments comprises a data block identifier, a length value and an offset value, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the segment, wherein the offset value comprises a boundary of the segment as compared to the segmented data block.
29. The electronic device of claim 28, wherein the data processor is further configured to perform the operation of: in response to receiving a retransmission notice indicating a segment of the plurality of segments, retransmitting the segment, wherein the retransmission notice comprises the data block identifier, the length value and the offset value of the indicated segment.
30. The electronic device of claim 26, wherein the electronic device comprises an access node of a wireless communication network.
31. An information block to be transmitted from a first node to a second node, the information block being stored on a tangible computer-readable medium prior to transmission, the information block comprising: a portion of a data block, wherein the portion of the data block does not comprise the complete data block; a data block identifier comprising an identification of the data block; a length value comprising a size of the portion of the data block; and an offset value comprising a boundary of the portion of the data block as compared to the complete data block.
32. The information block of claim 31 , further comprising: at least one other complete data block.
33. An electronic device comprising: a data processor; and a transmitter coupled to the data processor, wherein the transmitter is configured to transmit a retransmission notice indicating a segment of a plurality of segments, wherein the retransmission notice comprises a request for retransmission of the indicated segment, wherein the plurality of segments comprises a segmented data block, wherein the retransmission notice comprises a data block identifier, a length value and an offset value of the indicated segment, wherein the data block identifier comprises an identification of the segmented data block, wherein the length value comprises a length of the indicated segment, wherein the offset value comprises a boundary of the indicated segment as compared to the segmented data block.
34. The electronic device of claim 33, further comprising: a receiver coupled to the data processor.
35. The electronic device of claim 33, wherein the electronic device comprises a mobile terminal.
PCT/IB2007/000020 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems WO2007077526A2 (en)
ES07700448.9T ES2610396T3 (en) 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems
CN 200780005634 CN101385268B (en) 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems
EP07700448.9A EP1969752B1 (en) 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems
AP200804561A AP200804561A0 (en) 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems
BRPI0707464 BRPI0707464A2 (en) 2006-01-05 2007-01-04 flexibly segmentation scheme for communication systems
JP2008549078A JP2009522903A (en) 2006-01-05 2007-01-04 Flexible segmentation scheme of the communication system
PCT/IB2007/000020 WO2007077526A2 (en) 2006-01-05 2007-01-04 A flexible segmentation scheme for communication systems
BR (1) BRPI0707464A2 (en)
HU (1) HUE026879T2 (en)
PL (1) PL1969752T3 (en)
ZA (1) ZA200806711B (en)
WO2009036196A3 (en) * 2007-09-11 2009-06-25 Masato Kitazoe Scheduling information transfer
JP2010541397A (en) * 2007-10-01 2010-12-24 モトローラ・インコーポレイテッドMotorola Incorporated Status report method in a wireless communication system
JP2010541412A (en) * 2007-09-27 2010-12-24 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for supporting segmentation of packets for uplink transmission
JP2012500553A (en) * 2008-08-20 2012-01-05 サムスン エレクトロニクス カンパニー リミテッド Generating apparatus and method for an automatic retransmission request feedback messages in a wireless communication system
JP2012531137A (en) * 2009-06-25 2012-12-06 ゼットティーイー コーポレーションZte Corporation Fast retransmit method and apparatus in a radio link control layer acknowledged mode
TWI484802B (en) * 2007-09-28 2015-05-11 Interdigital Patent Holdings Method and apparatus for layer 2 processing and creation of protocol data units for wireless communications
AU2007246434A1 (en) * 2006-05-01 2007-11-15 Ntt Docomo, Inc. Base station, mobile station, and communication method
KR101265643B1 (en) 2006-08-22 2013-05-22 엘지전자 주식회사 Handover and its control method in a radio communication system
EP2070368B1 (en) 2006-10-02 2016-07-06 LG Electronics Inc. Method for transmitting and receiving paging message in wireless communication system
KR101443618B1 (en) * 2006-10-30 2014-09-23 엘지전자 주식회사 Method for transmitting random access channel message and response message, and Mobile communication terminal
EP2084928B1 (en) * 2006-10-30 2017-08-23 LG Electronics Inc. Method of performing random access in a wireless communication system
KR100938754B1 (en) 2006-10-30 2010-01-26 엘지전자 주식회사 Data transmission method and data receiving method using discontinuous reception
WO2008100350A1 (en) * 2007-02-15 2008-08-21 Agentek, Inc. Mobile data object transmission over wireless communication networks using udp and two level protocol
MX2009006849A (en) * 2007-03-22 2009-10-08 Ericsson Telefon Ab L M Method and arrangement in a telecommunication system.
WO2008133480A1 (en) 2007-04-30 2008-11-06 Lg Electronics Inc. Method for transmitting or receiving data unit using header field existence indicator
KR101469281B1 (en) * 2007-04-30 2014-12-04 엘지전자 주식회사 State switching method of a wireless terminal
US8184570B2 (en) * 2007-04-30 2012-05-22 Lg Electronics Inc. Method of transmitting data in wireless communication system supporting multimedia broadcast/multicast service
WO2008133481A1 (en) 2007-04-30 2008-11-06 Lg Electronics Inc. Method for performing an authentication of entities during establishment of wireless call connection
KR101464748B1 (en) * 2007-04-30 2014-11-24 엘지전자 주식회사 Method for triggering a measurement report of mobile terminal
WO2008133484A1 (en) 2007-04-30 2008-11-06 Lg Electronics Inc. Methods of transmitting data blocks in wireless communication system
KR20080097338A (en) * 2007-05-01 2008-11-05 엘지전자 주식회사 Discontinuous data transmittion/reception method
US20080273482A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Uplink access method for receiving a point-to-multipoint service
KR100917205B1 (en) 2007-05-02 2009-09-15 엘지전자 주식회사 Method of configuring a data block in wireless communication system
US20080310452A1 (en) * 2007-06-14 2008-12-18 Texas Instruments Incorporated Data link layer headers
ES2428569T3 (en) 2007-06-18 2013-11-08 Lg Electronics Inc. Procedure to perform uplink synchronization on a wireless communication system
KR101451434B1 (en) 2007-06-18 2014-10-21 엘지전자 주식회사 Paging information transmission method for effective call setup
US8406179B2 (en) * 2007-08-07 2013-03-26 Samsung Electronics Co., Ltd. Method and apparatus for performing random access procedure in a mobile communication system
KR100907978B1 (en) * 2007-09-11 2009-07-15 엘지전자 주식회사 Status report transmission method pdcp layer in a mobile communication system and the receiving device
KR101387537B1 (en) * 2007-09-20 2014-04-21 엘지전자 주식회사 A method for handling correctly received but header compression failed packets
WO2009131502A1 (en) * 2008-04-24 2009-10-29 Telefonaktiebolaget L M Ericsson (Publ) Error rate management
AT521211T (en) * 2008-05-09 2011-09-15 Research In Motion Ltd A method and apparatus for assembling of network layer data units
EP2356844A1 (en) * 2008-11-14 2011-08-17 Telefonaktiebolaget L M Ericsson (PUBL) A method of sensing
TW201023030A (en) * 2008-12-11 2010-06-16 Sunplus Mmobile Inc Method of calculating a transport block size in communication system
EP2469913A4 (en) * 2009-08-20 2013-01-23 Fujitsu Ltd Relay station, receiving station, transmitting station, and packet communication system
CN102014508B (en) * 2009-09-04 2013-08-07 中兴通讯股份有限公司 Method for reactivation of semi-static scheduling, and base station thereof
EP2640145B1 (en) * 2012-03-16 2017-07-26 Alcatel Lucent Multiple-input-multiple-output (MIMO) communication with selection of TBS per stream based on E-DPDCH to DPCCH power ratios
JP5645031B2 (en) * 2012-11-21 2014-12-24 独立行政法人情報通信研究機構 Method of transmitting and receiving data
JP5645032B2 (en) 2012-11-21 2014-12-24 独立行政法人情報通信研究機構 Method of transmitting and receiving data
EP3301842A1 (en) * 2016-09-30 2018-04-04 Panasonic Intellectual Property Corporation of America Efficient user plane architecture for new rat
WO2002037789A2 (en) 2000-11-03 2002-05-10 Siemens Aktiengesellschaft Method for exchanging data packets between two service providers of a radiotelephony transmission system
EP1209936A1 (en) 2000-11-22 2002-05-29 Lucent Technologies Inc. Method and system for UMTS packet transmission scheduling on shared downlink channels
US4691314A (en) * 1985-10-30 1987-09-01 Microcom, Inc. Method and apparatus for transmitting data in adjustable-sized packets
EP0500913B1 (en) 1990-09-19 1998-01-21 Philips Electronics N.V. System comprising a record carrier and a reading device
US5425028A (en) * 1992-07-16 1995-06-13 International Business Machines Corporation Protocol selection and address resolution for programs running in heterogeneous networks
FI91695C (en) * 1992-10-05 1994-07-25 Nokia Telecommunications Oy A method for prioritizing traffic through the core network between the connected local area networks
JPH10261980A (en) * 1997-03-18 1998-09-29 Fujitsu Ltd Base station unit for radio communication network, communication control method for radio communication network, radio communication network system and radio terminal
US6819658B1 (en) * 1997-07-15 2004-11-16 Comsat Corporation Method and apparatus for segmentation, reassembly and inverse multiplexing of packets and ATM cells over satellite/wireless networks
US6279041B1 (en) * 1998-11-13 2001-08-21 International Business Machines Corporation Methods, systems and computer program products for differencing data communications using a message queue
CA2581751C (en) 2000-01-14 2013-06-04 Interdigital Technology Corporation Wireless communication system with selectively sized data transport blocks
JP2001197114A (en) * 2000-01-14 2001-07-19 Fujitsu Ltd Frame repeater
US20020087716A1 (en) * 2000-07-25 2002-07-04 Shakeel Mustafa System and method for transmitting customized multi priority services on a single or multiple links over data link layer frames
JP2002141945A (en) * 2000-11-06 2002-05-17 Sony Corp Data transmission system and data transmission method, and program storage medium
CN1144429C (en) * 2001-05-18 2004-03-31 北京大学 Data transmission method with packet check
KR100539864B1 (en) * 2001-07-25 2005-12-28 삼성전자주식회사 Apparatus and method for a retransmitting high-speed data in a cdma mobile communication system
US20050152397A1 (en) * 2001-09-27 2005-07-14 Junfeng Bai Communication system and techniques for transmission from source to destination
KR100827147B1 (en) * 2001-10-19 2008-05-02 삼성전자주식회사 Transceiver and method for re-transmission and decording of high speed data in cdma mobile communication system
JP2003229896A (en) * 2002-02-01 2003-08-15 Fujitsu Ltd Device and method for scheduling packet transmission
FI20031260A (en) * 2003-09-04 2005-03-05 Nokia Corp Media streaming from the server to the client device
US20050152350A1 (en) 2003-12-22 2005-07-14 Nak-Woon Sung System and method for transmitting/receiving automatic repeat request
US7826457B2 (en) * 2004-05-11 2010-11-02 Broadcom Corp. Method and system for handling out-of-order segments in a wireless system via direct data placement
US7580388B2 (en) * 2004-06-01 2009-08-25 Lg Electronics Inc. Method and apparatus for providing enhanced messages on common control channel in wireless communication system
EP1987638A4 (en) * 2006-02-13 2011-09-21 Nokia Corp Apparatus, method and computer program product providing selection of packet segmentation
WO2007119148A2 (en) * 2006-04-13 2007-10-25 Nokia Corporation Method providing efficient and flexible control signal for resource allocation
2007-01-04 PL PL07700448T patent/PL1969752T3/en unknown
2007-01-04 RU RU2008131794/09A patent/RU2409898C2/en active
2007-01-04 ES ES07700448.9T patent/ES2610396T3/en active Active
2007-01-04 CN CN201310314169.XA patent/CN103401663B/en active IP Right Grant
2007-01-04 HU HUE12171305A patent/HUE026879T2/en unknown
2007-01-04 BR BRPI0707464 patent/BRPI0707464A2/en not_active IP Right Cessation
2008-08-01 ZA ZA200806711A patent/ZA200806711B/en unknown
See also references of EP1969752A4
RU2469479C2 (en) * 2007-09-11 2012-12-10 Квэлкомм Инкорпорейтед Scheduling information transfer
JP2010539803A (en) * 2007-09-11 2010-12-16 クゥアルコム・インコーポレイテッドQualcomm Incorporated Scheduling information transfer
JP2013128297A (en) * 2007-09-11 2013-06-27 Qualcomm Inc Scheduling information transfer
AU2008298891B2 (en) * 2007-09-11 2013-05-23 Qualcomm Incorporated Scheduling information transfer
AU2008304367B2 (en) * 2007-09-27 2012-05-03 Interdigital Patent Holdings, Inc. Method and apparatus for supporting segmentation of packets for uplink transmission
TWI467996B (en) * 2007-09-27 2015-01-01 Interdigital Patent Holdings Method and apparatus for supporting segmentation of packets for uplink transmission
CN103369717A (en) * 2007-09-27 2013-10-23 交互数字专利控股公司 WTRU and method for implementation in WTRU
US9813941B2 (en) 2007-09-28 2017-11-07 Interdigital Patent Holdings, Inc. Efficient L2 processing and protocol data units wireless communications
US9030996B2 (en) 2007-09-28 2015-05-12 Interdigital Patent Holdings, Inc. Layer 2 processing and creation of protocol data units for wireless communications
CN103929780B (en) * 2007-09-28 2019-05-21 交互数字专利控股公司 Create the method for E-DCH PDU and the method and node B of WTRU and transmission Iub E-DCH data frame
ZA200806711B (en) 2010-04-28
PL1969752T3 (en) 2017-04-28
BRPI0707464A2 (en) 2011-05-03
HUE026879T2 (en) 2016-07-28
US8724480B2 (en) 2014-05-13 Method and apparatus for operating a timer for processing data blocks
US7948936B2 (en) 2011-05-24 Quality-of-service (QoS)-aware scheduling for uplink transmission on dedicated channels
JP5280465B2 (en) 2013-09-04 Enhanced block acknowledgment
US9554398B2 (en) 2017-01-24 Method and apparatus for enhancing RLC for flexible RLC PDU size
US9713033B2 (en) 2017-07-18 Method and apparatus for transmitting data packets and method and apparatus for receiving data packets
US9860915B2 (en) 2018-01-02 Apparatus and method for moving a receive window in a radio access network
US7403541B2 (en) 2008-07-22 Data transmission method for HSDPA
CA2715986C (en) 2014-01-21 Method for transmitting pdcp status report
US7782872B2 (en) 2010-08-24 Method, apparatus, and computer-readable medium for providing an applicable QoS for data that has actually experienced a QoS degraded from that requested
AU2009209739B2 (en) 2011-06-02 Method for sending status information in mobile telecommunications system and receiver of mobile telecommunications
US6807428B2 (en) 2004-10-19 Method and apparatus for time-based reception of transmissions in a wireless communication system
EP1797659B1 (en) 2015-02-18 Slow mac-e for autonomous transmission in high speed uplink packet access (hsupa) along with service specific transmission time control
CN1918825B (en) 2010-06-16 Transmitting and receiving control protocol data unit having processing time information
JP5054151B2 (en) 2012-10-24 Method for medium access control, device and system
JP4906844B2 (en) 2012-03-28 How to generate lower layer data block in a wireless mobile communication system
US20090067335A1 (en) 2009-03-12 Congestion control in a transmission node
EP1605641A1 (en) 2005-12-14 Mapping of shared physical channels depending on the quality of service class
US8161341B2 (en) 2012-04-17 Method of transmitting control information in wireless communication system and transmission window updating method using the same
US20050195858A1 (en) 2005-09-08 Communication apparatus, communication method, and communication system
JP4397928B2 (en) 2010-01-13 The method of assigning wireless communication network resources, the traffic to be transmitted to the user equipment via the channel of the network
EP2254287A2 (en) 2010-11-24 Reducing overheads of a protocol data unit in a wireless communication system
US20050039101A1 (en) 2005-02-17 Method and system of retransmission
EP2091281B1 (en) 2010-02-17 Method of transmitting uplink data and buffer status reports in a wireless communications system, wireless device for implementing such method
US7542482B2 (en) 2009-06-02 Method and apparatus for message segmentation in a wireless communication system
CN1879339B (en) 2010-08-18 Data packet transmission
2008-07-02 WWE Wipo information: entry into national phase
Ref document number: 12008501589
Country of ref document: PH
Ref document number: 2008549078
Ref document number: MX/a/2008/008747
Country of ref document: MX
2008-07-09 REEP
Ref document number: 6085/DELNP/2008
Country of ref document: IN
Ref document number: 1020087019060
Country of ref document: KR
2008-08-05 ENP Entry into the national phase in:
Country of ref document: RU
Kind code of ref document: A
Ref document number: 200780005634.4
Country of ref document: CN
2008-09-17 WWP Wipo information: published in national office
Ref document number: PI0707464
Country of ref document: BR
|
cc/2019-30/en_middle_0056.json.gz/line12493
|
__label__wiki
| 0.683358
| 0.683358
|
Justia Patents US Patent for Power line access data system Patent (Patent # 3,973,240)
Power line access data system
Dec 5, 1974 - General Electric
A two-way communication system is disclosed utilizing power transmission lines as the transmission medium. The system is a multilevel repeater system in which each repeater has a unique address. The lowest level repeaters poll the terminal stations connected thereto in time multiplex. Transmission over the system is in the form of tone codes, each level preferably utilizing a different set of tones from the next higher or lower level.
Latest General Electric Patents:
PROBE APPROACH FOR DGS SIZING
Method and assembly of an electric machine
Power system and an associated method thereof
Electrically shielded direct current link busbar
System and method for controlling a liquid chromatography systems
A. background
2. Related applications
4. Prior art
B. summary of the invention
1. Objects
2. Summary
3. Brief description of drawings
C. detailed description of the invention
1. The general system
2. Apparatus used throughout the system
A. The tone receiver
B. The tone generator
3. The terminal station
4. The repeaters
A. The tone repeaters/translators
B. The pole repeater
C. Higher level repeaters
5. The central station
A. Generally
B. The transceiver
C. The decoding logic
5. The central station (continued)
D. The data handling unit
E. The timing circuitry
F. Operation
D. conclusion
E. claims
This invention relates to data communication systems and more particularly to data communication systems adapted for use on power lines for monitoring loads, providing load control, detecting and locating faults, providing transformer protection, automatic meter reading and two-way communications and the like.
This application relates to application serial numbers 529,999, 530,000 and 530,129 filed concurrently herewith by the present applicant and assigned to the assignee of the present invention.
Electrical power to individual residences and industrial users is generally provided in a local service area by a power company which receives its power from either a local generating station, a high voltage transmission tie-line, or both. The power company then distributes this power through a power distribution network originating from the power source and terminating at the user's location. Simplified, this distribution network comprises a tree-like structure that branches out from the source of power through several levels of distribution voltages and ultimately to a large number of users. (It is understood that power companies frequently provide additional interconnections at various voltage levels to form loops for improving the reliability of the service. For purposes of description, this complexity is ignored since it does not affect the operation of the present invention.) The generated power is distributed by step-down and distribution transformers. The transformers may be considered the nodes with each node receiving its power at a higher voltage level and delivering its power to one or more branches at a lower voltage level.
The distribution of electrical power in this manner requires a high degree of reliability to insure continuous service to the power users. The power company is therefore under a heavy burden of systematically monitoring the various loads, providing load control where necessary, detecting the existence of power outages and location of faults producing such outages. While some degree of automation has been utilized to meet these needs of the power company, monitoring and control of loads, as well as fault detection and numerous other functions encountered in power distribution are still primarily handled by company personnel assigned to perform these various tasks. Additionally, since power users are billed only for the power consumed, it is presently necessary to employ personnel for reading each of the watt-hour meters at the various customer locations. The performance of these various functions therefore necessitates a large number of specially skilled individuals. The costs of maintaining such skilled individuals is ultimately passed on to the consumer, thereby increasing his costs.
Prior art
In the past, many attempts have been made to automate some or all of these functions and, possibly, to provide a two-way communication system as well. One possibility that has been considered is the use of telephone lines or other communication links independent of the power line distribution system. However, this approach is too costly for the benefits received. Alternatively, systems have been proposed utilizing the power line distribution system itself. These systems have proven unsatisfactory for several reasons. One reason is the noise on the line; for example, from motors, atmospheric noise (the line acts as an antenna), switching of loads, static, arcs, etc. Another reason is the impedance variations in the line itself, e.g., due to humidity changes, load variations, variations in height above ground and the like, as well as data transmission barriers in the form of impedance discontinuities caused by step-down and distribution transformers, and series and shunt capacitors to control power factor.
These and other difficulties combine to produce what may be considered a uniquely hostile environment in which to reliably transmit data. The result is that any automation of the meter reading function was usually limited to only one level in the power distribution system, e.g., from the pole repeater to the consumer, with other communication links to a central office. Further, two-way communication has been limited due to the number of transmission errors that may occur with systems of the prior art. Similarly, power line transmission systems of the prior art do not provide random access to the user locations.
In view of the foregoing, it is therefore an object of the present invention to provide a data communication system adapted to be used on a power line distribution network which provides random access capability from a central station to any terminal in the distribution network.
It is another object of this invention to provide a power line transmission network with a two-way transmission path uniquely established from a central office.
It is a further object of this invention to provide means for bridging transmission barriers in a power distribution network to establish a communication link between a terminal station and a central station.
It is another object of this invention to provide random access data collection through a common transmission medium.
It is a further object of the present invention to provide a relatively low cost data communication system adapted to be used on a power line distribution network.
The data communication system of the present invention is superimposed on the electric power distribution network and provides a two-way transmission path that is uniquely established between a central office and any particular point in the power distribution network. The two-way transmission path is provided through the common transmission medium of the electric power distribution network and selectively located repeaters which bridge the transmission barriers at tone frequencies imposed by various power distribution devices, such as transformers and power factor correction capacitors. In operation of the two-way data communications system of the present invention, command signals are sent to a selected location in the power distribution network and data signals responsive to the command signal are received back at the central station.
The two-way communications link is achieved with a repeater system comprising intermediate repeaters, substation repeaters and pole repeaters. The intermediate repeaters are selectively located between the central station and a power distribution substation. The substation repeater is located at the distribution substation and the pole repeaters are located at the distribution point in the system servicing one or more users. The two-way data communication system also comprises a terminal station for generating data signals when queried by the central station. The terminal stations are located at the user's location and upon interrogation, provide a data signal representative of data collected from various recording instruments, such as watt-hour meters, water and gas meters, temperature sensors or other instruments located at the user's location.
Selection of a particular terminal station for data collection purposes is obtained by transmitting a code from the central office as a sequence of three parts, in which each part may be a combination of two frequencies or tones out of 12 frequencies. Each level repeater, i.e., intermediate, substation, and pole, is assigned twelve frequencies, for example, so that a particular path through the tree-like network is selected by three successive two out of 12 frequency selections.
The terminal stations transmit their data by time division multiplexing, i.e., only one terminal station transmits its data at a time. The transmitted data signals from the various terminal stations are relayed by the same chain of repeaters, each adding its own identification tones to the data signal, so that the information received at the central station includes pole, substation, and intermediate repeater identification tones plus the data signals from the time division multiplexed terminal stations.
The foregoing sequence of operations may be utilized for remote meter reading, fault location along a transmission line, transformer protection, supervision and signal functions, load control, line protection, and numerous other two-way coded communications functions.
The data communication system of the present invention therefore provides a two-way transmission path uniquely established between a central station and any particular terminal station in the system. This random access capability provides the versatility and flexibility necessary to provide complete automatic operation of a local power distribution network.
BRIEF DESCRIPTION OF DRAWINGS
A more complete understanding of the present invention can be obtained by considering the following detailed description in connection with the accompanying drawings in which:
FIG. 1 illustrates a power distribution system with the communication system of the present invention superimposed thereon.
FIG. 2 illustrates a tone receiver suitable for use in the system of the present invention.
FIG. 3 illustrates the operation of the tone receiver.
FIG. 4 illustrates a tone generator suitable for use in the system of the present invention.
FIG. 5 illustrates the operation of the tone generator.
FIG. 6 illustrates a terminal station.
FIG. 7 illustrates a terminal station transmitting an alarm.
FIG. 8 illustrates a tone repeater/translator.
FIG. 9 illustrates an alternative embodiment of a tone repeater/translator.
FIG. 10 illustrates the repeater used in the system of the present invention.
FIG. 11 illustrates the central station.
FIG. 12 illustrates a transceiver used in the central station.
FIG. 13 illustrates the decoding logic used in the central station.
FIG. 14 illustrates the major portions of the data handling unit of the central station.
FIG. 15 illustrates the switching circuitry of the data handling unit.
FIG. 16 consisting of connecting FIGS. 16a and 16b, illustrates the remainder of data handling unit.
FIG. 17 illustrates the timing circuitry of the central station.
FIG. 18 illustrates the ancillary logic of the central station.
The general system
FIG. 1 is a typical tree-like structure of an electric power distribution network in which electric power is generated or otherwise received from a high voltage transmission line at the central station. The electric power is distributed to electric power users via the usual transmission lines and step-down transformers located at the various nodal points illustrated in FIG. 1.
Superimposed on this power distribution network is the two-way data communications system of the present invention. At the various nodal points in the distribution network, a system of intermediate, substation and pole repeaters is employed for receiving command signals originating from the central station and retransmitting these signals to the next lower repeater in the network minus the identification of the preceding repeater. As used herein, "higher" and "lower" are relative to FIG. 1 and refer, respectively, to moving toward the central station and moving toward the terminal stations.
For example, a command signal originating from the central station 11 directed to a specific terminal station 15, for example, requires the selection of a specific chain of repeaters consisting of one intermediate repeater, one substation repeater and one pole repeater.
The command signal is a three-part signal with the parts transmitted seriatim. Each part is a six bit work, enabling 64 possible words, 64 being preferred for engineering considerations as the maximum number of possibilities. Each of the three parts is transmitted as a combination of two tones or frequencies out of 12 possible frequencies (2 out of 12 selections actually producing 66 possible combinations).
It is understood that the number and combinations of tones are a matter of routine engineering and that the specifics given herein are by way of example only. Other formats for data signalling may be used according to the particular need.
Each level repeater, i.e., intermediate, substation and pole repeater, is assigned 12 frequencies, so that a particular path through the network is selected by three successive 2 out of 12 frequency selections. Thus, the addressing code transmitted from the central station consists of six tones selected from 36 available tones. Since these tones are used for alerting a specific chain of repeaters, this address code is called the alert tones.
The first pair of alert tones turns on a particular one of the intermediate repeaters, 12, which in turn relays the remaining four tones to the substation repeaters 13 connected thereto. The second pair of alert tones turns on one of substation repeaters 13, which then relays the remaining two tones to pole repeaters 14 connected thereto. This last pair of alert tones turns on one of pole repeaters 14, thus completing a specific chain of repeaters between central station 11 and a particular pole repeater 14.
When pole repeater 14 is alerted, it sends out a pulse of single time duration, or example, at a particular frequency. This pulse alerts all terminal stations assigned to pole repeater 14, e.g., 15 and 16. The terminal stations then transmit their data, such as coded watt-hour meter readings, in a time-division multiplexing manner; that is, each terminal station transmits its data after a selected time delay from receipt of the alerting pulse. The manner in which this function is performed will be described more fully below.
The data transmitted from the terminal stations is received by pole repeater 14 and relayed to substation repeater 13. In a similar manner, the substation and intermediate repeaters relay the data signal. The signal received at central station 11 therefore includes three successive two out of 12 frequency selections which identify the intermediate, substation and pole repeaters transmitting the data and the data from the terminal stations in the selected time division multiplexing manner.
As more fully described herein, there is a short time interval in a repeater after it is activated before the data signals are received from lower level devices. In the two-way communication system described here, this time interval is used to transmit a signal in the data signal format for identifying the repeater activated, which is also relayed by higher level devices in the system, eventually reaching the data processing computer through the central station. This coded signal corresponds to the alert tones used in alerting that chain of repeaters. This code repeats several times in a specific pattern for identifying the activated repeaters. The pattern assures that the identifying codes for repeaters activated in three different levels for establishing the specific two-way transmission path are accurately received in the central station. Also, the identifying code pattern may be different when repeater A is used in different tasks in the system.
The repeater identifying codes are processed by majority logic in the central station for correction of normal transmission errors. Thus, the central data processing computer always has the correct repeater identification code associated with collected data. The particular terminal station that originates the data can be identified by the order of data's occurrence in the data sequence collected from a single, time multiplexed group.
After having alerted a particular intermediate and substation repeater, another pole repeater connected to the same node in the tree-like network may be alerted to collect data from the group of terminal stations connected thereto, e.g., 17 and 18. However, the system in accordance with the present invention provides random access, i.e., the same intermediate and substation repeaters need not be selected by the next alert tone from the central station. In this way, the watt-hour meter readings from various terminal stations may be collected in an organized way for subsequent billing purposes at the central station. Those skilled in the art can readily appreciate that from a data management point of view, it may be desirable to limit the total amount of data collected in such stepping operations. For example, it may be desirable to restrict each inquiry to 32 lines of data, i.e., from 32 different pole repeaters, so that, for 32 terminal stations per repeater, the data block corresponds to 1024 terminal stations.
In addition to providing automatic meter reading, the power line data communication system of the present invention is also capable of providing an alarm function at the central station whenever an emergency condition exists, in a terminal station for example. The alarm function is provided by a specific tone originating from a terminal station and relayed through the various levels of repeaters to the central station. The chain of repeaters that relay this alarm tone are turned on by the alarm tone and the relaying of any regular data collection signal, if any, is blocked whenever an alarm tone is sent. During this alarm function, the identity of the repeater chain involved in the alarm process is relayed to the central station. The central station can then query the particular group of terminal stations from which the alarm originated and cause data from this group to be sent to the central station. During this inquiry, the data of the alarming station is sent along with the alarm tone. This second transmission of the alarm tone identifies the alarming station by the time position of the alarm and data tones in the time multiplex signals from the pole repeater. The same coded data is used for repeater identification during an alarm, however, the pattern is slightly different. Specifically, an alrm code precedes the idenfitication codes.
The alarm function may be used to provide indications of power outage, overloaded transformers, unusual power demands from a particular terminal station or other emergency conditions as desired.
As more fully described herein, in connection with each repeater, the level to level frequency groups need not be the same. That is, the pole repeaters connected to a particular substation repeater may respond to combinations of tones a, b, c, d (taking just four tones for the sake of example). However, the substation repeater may generate the appropriate two of these tones in response to two of tones e, f, g, and h. In so doing, better isolation is obtained between the levels of the system.
This isolation can be provided at all levels of the system. For example, assume central station 11 sends out a combination of tones (selected from three groups of 2 out of 12) 1,2 - 3,4 - 5,6 corresponding to a particular path through the intermediate, substation and pole repeaters. The intermediate repeater alerted by tones 1,2 would then transmit tones 7,8 - 9,10, corresponding to tones 3,4 - 5,6, respectively. The particular substation alerted by tones 7,8 would then send out tones 11,12 instead of 5,6 or 9,10, respectively. The result is that each level is completely isolated from the next since each level has its own set of frequency groups.
As is apparent to those of skill in the art, various modifications may be made while still achieving the isolation of one level from the next. For example, alternate levels may have the same frequency groups.
Apparatus used throughout the system
In order to simplify the drawings illustrating in detailed block diagrams the terminal station, pole repeater, etc., two elements used extensively throughout the communication system of the present invention shall now be described in detail and later illustrated by a single block. The first of these elements is illustrated in FIG. 2 and comprises one embodiment of a tone receiver suitable for use in the present invention.
The tone receiver
Tone receiver 20 comprises an automatic gain control (A.G.C.) amplifier and limiter 21; a commutating filter comprising resistor 22, single pole-multiposition switch 23 and capacitors 24-27; peak detector 28'; and threshold device 28.
A.G.C. amplifier and limiter 21 serve to amplify the incoming signal to an approximately uniform level and also to clip any incoming signals exceeding a predetermined level. As previously indicated, a power line is an exceedingly noisy environment in which to communicate. A.G.C. amplifier and limiter 21 serve to exclude a certain amount of that noise from the receiver.
The commutating filter may best be understood in conjunction with FIG. 3, wherein a sinusoidal waveform is illustrated as having samples 29 taken at particular points in the waveform. The commutating filter operates on the basis that the theoretical average for noise (i.e., unwanted signals) is zero; that is, noise contains approximately equal positive and negative components. The commutating filter comprises an R.C. network wherein a resistor and a plurality of capacitors are connected by a multiposition switch. The switch changes position at a switching or commutation frequency equal to n times the frequency of the desired incoming signal, where n is an integer equal to the number of capacitors in the filter, so that the switch completes one rotation per cycle of incoming signal.
As switch 23 rotates, connecting resistor 22 to different ones of the capacitors, a series of samples is taken of the incoming signal. As can be readily appreciated, if the incoming signal has the same frequency as the rotation of switch 23, then samples 29 are taken at the same point in the waveform for several cycles of the incoming signal. Because the samples occur at approximately the same point on the waveform during each cycle of the incoming signal, charge will accumulate on at least some of filter capacitors 24-27. As switch 23 rotates, it also samples the voltage on capacitors 24-27 for peak detector 28'. Peak detector 28' couples the highest sample voltage to threshold device 28 which produces an output pulse when the threshold is exceeded, indicating a signal of the proper frequency has been received.
As can be appreciated by inspection of FIG. 2, the receiver is particularly adapted to receive signals in an exceedingly noisy evironment. Specifically, the receiver comprises a three stage filter. The first stage removes noise exceeding a predetermined amplitude; the second stage is noise tolerant and frequency dependent in sampling the incoming signal at regular intervals and averaging the samples over a number of cycles; and the third stage, usually considered as an amplitude dependent device, becomes amplitude-dependent-at-a-certain-frequency due to the preceding filter. Thus, the combination of seemingly simple and inexpensive elements produces an economical, narrowband, noise tolerant receiver for the data transmission system herein described.
The bandwidth of receiver 20 is inversely proportional to the R-C time constant of resistor 22 and the sum of capacitors 24-27. In a system actually constructed, series or cascade connected commutating filters having different time constants are used to broaden the response curve so that less expensive (less stable) crystal oscillators can be used. In the receiver built the time constants are 0.05 and 0.15 seconds corresponding to bandwidths of 20.00 and 6.67 hz., respectively. This combination of filters produces a receiver having a nominal bandwidth of 7 hz.
The number of positions of switch 23 is not critical, although at least three positions are necessary. A practical range for the number of positions is from 3 to 12.
The center frequency of the commutating filter is determined by the commutation frequency applied to switch 23. Only a signal received in synchronism with switch 23 will produce a signal on capacitors 24-27 that does not average zero over a predetermined number of cycles of the incoming signal. Thus, receiver 20 may be utilized to receive any incoming signal throughout the data communication system of the present invention. The only change needed to receive different tones is that the commutation frequency be changed to n times the frequency of the desired signal. The commutation signal may be readily derived from a local clock signal by suitable division.
Receiver 20 as illustrated in FIG. 2 includes a mechanical form of commutating filter. In actual practice the commutating filter may be implemented by discrete semiconductor devices or integrated circuit devices performing the same function as rotating switch 23. For example, a plurality of sampling circuits can be sequentially activated by a ring counter. This type of operation is well known per se in the art. Also, while illustrated by capacitors 24-27, the filtering or averaging portion of receiver 20 may comprise .pi.-network low-pass filters or other suitable filters. Further information on the operation of the commutating filter can be obtained from LePage, Cahn, Brown; Analysis of a Comb Filter Using Synchronously Commutated Capacitors; A.I.E.E. Transactions; Part I, p.p. 63-68, 1953.
The tone generator
FIG. 4 illustrates one embodiment of a data tone generator suitable for use in the present invention. Data tone generator 30 comprises divider 31 having the input thereof connected to a local clock frequency, a voltage controlled oscillator 32 whose frequency is to be locked to, and a submultiple of, the local clock frequency. The output of voltage controlled oscillator 32 is locked to the local clock signals by way of phase comparator 33 and a second divider 34.
The operation of data tone generator 30 is analogous to that of a transfer oscillator, as used for frequency measurements. Specifically, incoming signals from the clock source are divided by divider 31 to a lower frequency. The output signal from voltage controlled oscillator 32 is reduced to a lower frequency by divider 34. The output signals from dividers 31 and 34 are compared in phase comparator 33, which produces an output voltage for controlling voltage controlled oscillator 32 in the well-known phase locked loop. Tone generator 30 produces an output signal at a frequency, C. equal to B/A times the incoming clock signal. The output signal from voltage controlled oscillator 32 is thus a fixed submultiple of the clock signal and is phase locked to the clock signal.
As further illustrated in FIG. 4, tone generator 30 may comprise a plurality of similar oscillators; for example, elements 35-38 corresponding respectively to elements 31-34. The input of each oscillator is connected to the local source of clock signals. In this manner a plurality of tones can be readily generated.
As previously noted, a plurality of tones is utilized in the selection of a particular path through the tree-like network of the power distribution system. While a plurality of tone generators, one for each tone to be generated, can be utilized to implement the present invention, the equipment necessary can be greatly simplified by using logic control circuitry to vary the division ratios of dividers 31 and 34. In this regard. FIG. 5 illustrates a plurality of combinations of division ratios for oscillators 31 and 34 as well as the resulting output signals. As can be readily appreciated, varying the division ratio of divider 34 produces different frequencies from voltage controlled oscillator 32. If the division ratio of oscillator 31 is also changed, different families or sets of spaced frequencies are produced by voltage controlled oscillator 32. Different sets of tones are determined by divider 31, while the specific member of the set is determined by divider 34.
Varying the division ratio of a divider is well known per se in the art and may comprise varying the feedback connections within the divider/counter to provide different division ratios. The logic involved in varying the division ratio of a counter in response to an encoded input signal may simply comprise a switching matrix for converting the encoded data to a plurality of feedback paths, thereby determining the division ratio of the particular counter.
Thus, only six oscillators are needed to produce the three sets of two out of 12 tones noted previously, as opposed to the 36 separate oscillators as would be needed if fixed frequency oscillators were used.
A further economy of parts is obtained since the same apparatus can be used throughout the data communication system of the present invention, i.e., it is less expensive to make 10,000 identical oscillators than 100 of each of 100 different oscillators. Similarly, receiver 20, illustrated in FIG. 2, can be identical throughout the data communication system of the present invention. There is thus achieved by the present invention a simplicity and economy of apparatus that enables the present invention to be implemented in integrated circuit technology at relatively low cost.
While a preferred receiver and tone generator have been shown and described, it is understood that various other circuits suitable for use as receivers or tone generators can be utilized.
The terminal station
FIGS. 6 and 7 illustrate a terminal station for use in the data communication system of the present invention. The terminal station is typically located at the user's location, such as the residence of a power company subscriber. Typically, high voltage lines 45 are coupled to the user's residence by way of a distribution transformer 46 and service lines 47. At each user location, watt-hour meter 48 monitors the amount of power consumed by all of the various electrical equipment at the user location, collectively illustrated by load 49.
The pole repeater of the present invention is illustrated as connected to service line 47, typically 200 volts. Depending upon the frequency band utilized for the tones, the pole repeater may be coupled on the other side of distribution transformer 46. Specifically, for tones greater than approximaterly 15 Khz. the pole repeater is preferably connected to the primary of distribution transformer 46, usually in the range of 4 KV to 35 KV depending upon whether the service is urban or rural. For tones less than approximately 15 Khz., the pole repeater is connected as shown.
This choice of connection is due to the loss the higher frequency tone signals suffer in passing through a distribution transformer, on the order of approximately 20 db. The total loss between transmitter and receiver is the combination of two factors: the insertion loss of the transmission path, and the power absorbed by loads shunted on the distribution line. The high insertion loss of distribution transformer will increase the loss due to the first factor, but it also effectively isolates most of the loads except those that share the same distribution transformer with the terminal station in question, and greatly reduce the loss due to the second factor. Since there is a single distribution transformer between a pole repeater and a terminal station, coupling the pole repeater to the high voltage side of the distribution transformer at high tone frequencies will not significantly increase the transmission loss between the terminal station and the pole repeater. Furthermore, at higher frequencies, the noise level of high voltage lines is somewhat lower, thus off-setting the signal loss through the distribution transformer.
As described above, the terminal station receives command signals from the central station by way of the pole repeater and responds with data indicative of a recording instrument, such as a watt-hour meter. The transmitted data is in the form of discrete frequencies or tones which are preferably harmonics of 30 Hertz. For example, assuming the terminal station is provided with twelve discrete tones or frequencies for transmitting data, these frequencies may comprise the range of 8070 - 8730 Hertz, which corresponds to the 269th - 291st harmonics of 30 Hertz. These twelve tones are then utilized to provide a coded signal representative of the watt-hour meter reading. The selected tones are transmitted from the terminal station and relayed by the pole and other repeaters back to the central station.
The terminal station is connected to service line 47 by way of coupler 50 which may, for example, comprise a toroid through which one line of the service line passes as the primary of a transformer. The secondary winding of the transformer may comprise several turns of wire which may be resonated at the range of frequencies or tones transmitted by the terminal station. The secondary winding of coupler 50 is connected to a transmit-receive (T-R) switch 51 which may, for example, comprise a simple single-pole double throw relay or a suitable semiconductor equivalent. In the unactivated condition, T-R switch 51 normally connects coupler 50 to alert tone receiver 52.
When an alert tone is received by alert tone receiver 52, encoder 53 is activated to encode the reading of watt-hour meter 48 into a suitable form, such as binary or binary coded decimal, for controlling the tones generated by tone generator 54. The output of tone generator 54 is amplified by power amplifier 55 and transmitted by way of T-R switch and coupler 50 to the pole repeater. Clock 56 is a master oscillator continuously running at a high multiple of the local clock pulse rate used for local clock signals b for tone generator 54 and alert tone receiver 52.
Should an alarm situation develop at the user location, alarm tone generator 57 provides a unique signal which is amplified by power amplifier 55 and transmitted to the pole repeater by way of T-R switch 51 and coupler 50, regardless of the other operations being carried out at the time, and also independently of whether or not the particular pole repeater has been activated. Thus, an alarm condition is immediately communicated to the central station even if that particular pole repeater and terminal station were not being interrogated at the time.
Receive tone flip-flop 58 is put in the set condition by an output signal from alert tone receiver 52. Receive tone flip-flop 58 temporarily stores the received pulse, activates the encoder, and establishes initial timing conditions within the terminal station when alerted. The overall timing and control of the terminal station is accomplished by timing and control circuit 70 which has inputs connected to clock source 56, flip-flop 58 and alarm circuit 60. The outputs from timing and control circuit 70 control T-R switch 51, alarm tone generator 57, the reset of flip-flot 58, and the application of the data tone signal to power amplifier 55 by way of gate 95.
Alarm generator 60 comprises a physical switch 61 which may be actuated by any type of alarm situation such as a local power outage, fire, etc. Battery 62 and resistor 63 are connected as shown to switch 61 to provide a single pulse having a duration equal to the time switch 61 is closed. This pulse is differentiated by differentiator 64 and suitably shaped by pulse shaper 65 which may, for example, comprise a monostable multivibrator. Thus the output from alarm circuit 60 is a single pulse, i.e., one pulse for each actuation of switch 61. It is understood that switch 61 is representative of whatever sense apparatus is used to detect alarm conditions.
As more fully described below, timing and control circuit 70, in response to an alarm pulse, causes the transmission of an alarm tone followed by a waiting period for a response from the pole repeater. If no response is obtained, the transmission of the alarm tone followed by a pause is repeated a fixed number of times as determined by timing and control circuit 70. Since the alarm tone has priority throughout the entire data communication system of the present invention, if an unanswered alarm were permitted to continue indefinitely, data communication would be effectively stopped by a single alarm. Thus, after a fixed number of tries, an alarm signal from a terminal station is ignored unless alarm switch 61 is opened and closed again.
An alarm is answered by an alert tone from the pole repeater to which the terminal station responds by transmitting its alarm data along with the alarm tone. This information is then relayed to the central station which identifies the particular terminal station by the repeater codes plus the timing of the alarm signal. As previously noted, the terminal stations transmit their data to the pole repeater in time division multiplex format. Thus, the initial alarm tone, which overrides other communications, merely tells the data processing computer which pole repeater has an alarming terminal station. In order to identify the particular terminal station, the data processing computer causes an alert tone to be transmitted by the central station through the repeaters to alert the right group of terminal stations, causing the terminal stations to send their data in time sequence. The identity of the alarming station is thus indicated by the data tones being accompanied by an alarm tone.
Timing and control circuit 70 comprises an alarm flip-flop 66 having the set input thereof connected to the output of alarm circuit 60. The output of flip-flop 66 is coupled to the control input of switch 67 which may comprise any suitable controlled switch, for example, an AND circuit for digital signals. The control input for the controllable switches is indicated by an arrowhead, whereas the controlled input does not have an arrowhead. The controlled input to switch 67 comprises b clock pulses derived from clock source 56. These clock pulses are counted in alarm counter 67 having, in addition to a "carry" output and "reset" input, taps connected thereto for controlling the timing of the alarm tone from the terminal station. One tap from alarm counter 68 is coupled by way of OR gate 69 to OR gate 71 and flip-flop 72. The other input to OR gate 69 is connected to the output of pulse shaper 65. The second input to OR gate 71 is connected to the output of control switch 76. The output of flip-flop 72 is coupled to one input of OR gate 73 and to the controlled input of alarm tone generator 57. The output of OR gate 73 controls T-R switch 51 and, specifically, sets T-R switch 51 into the transmit mode. In the absence of a pulse from OR gate 73, T-R switch 51 is normally in the receive mode.
The "carry" output from alarm counter 68 is coupled as one input to OR gate 74. The output of OR gate 74 is connected to the reset inputs of flip-flop 66 and alarm counter 68. The second input to OR gate 74 is coupled to a tap on data counter 79. The same tap from data counter 79 is connected as one input to OR gate 75, which has another input thereof connected to a second tap on alarm counter 68 and a third input connected to the carry output of alarm counter 68. The output of OR gate 75 is connected to the reset input of flip-flop 72.
Controlled switch 76 has the control input thereof connected to the output of flip-flop 66 and the output thereof connected to OR gate 71. The controlled input to switch 76 is connected to the carry and reset terminals of delay counter 78. Delay counter 78 has the input thereof connected by way of controlled switch 77 to a source of b clock pulses. The control input to switch 77 is connected to the output of alert tone receive flip-flop 58.
Data counter 79 has the input thereof connected to a source of b clock signals by way of control led switch 81, which has the control input thereof connected to the output of flip-flop 82. The output of flip-flop 82 is also connected as one input to each of OR gates 73 and 83. The output of OR gate 83 is connected to the controlled input of switch 84.
Switch 84 comprises one path by which clock signals from clock source 56 can reach divider 85, the output of which comprises the b clock signals. The other path by which clock pulses from source 56 can reach divider 85 is by way of controlled switch 86 having the control input thereof connected to the output of flip-flop 66. Thus, clock source 56 runs continuously, providing a continuous series of a clock pulses and a switched series of b pulses from divider 85. The b clock pulses are produced when an alert tone is received (by way of switch 84), or by way of switch 86 (when an alarm is sounding). The initial timing of local clock pulses b is determined by the first closing of switch 84 or switch 86. Continuous clock pulses a are provided to tone generator 54 and alert tone receiver 52.
In response to an alert tone, encoder 53 is activated to encode the meter reading on watt-hour meter 48 into binary form which is then stored in buffer memory 91. Encoder 53 may comprise any suitable encoder and may, for example, comprise the encoder described in copending patent application Ser. No. 348,745, filed Apr. 6, 1973, and assigned to the assignee of the present invention. The clock input to buffer memory 91 is connected to the output of controlled switch 81, the connection illustrated by the letter f. The information stored in buffer memory 91 is read out under the control of clock signals f to the inputs of tone control logic 92 which, as previously described, controls the data tones generated by tone generator 54.
If desired, the alarm function may be utilized to provide an indication of more than one alarm situation. In this case, transfer gate 93 couples alarm data code signals from alarm data circuit 94 to tone control logic 92. Alarm data circuit 94 produces a unique output code, depending upon the nature of the alarm. Alarm switch 61 may thus comprise many single pole switches in which one switch is utilized in alarm circuit 60 to indicate that a particular alarm situation exists, and other switches would be used in conjunction with a different alarm. Different alarm data codes stored in alarm data circuit 94 would then indicate which type of alarm situation exists. In addition, an alarm signal may be repeated if desired.
As can be seen by inspection, FIGS. 6 and 7 illustrate the same circuit with the exception that in FIG. 6 alarm switch 61 is open, whereas in FIG. 7 alarm switch 61 is closed. The overall operation of a terminal station in accordance with the present invention will be described in several parts. The first part dealing with the reception of an alert tone is illustrated in FIG. 6 by the more heavily lined interconnections. A second part, dealing with the alarm function, will be described in conjunction with FIG. 7 wherein the signal lines actuated during an alarm condition are heavier than those of the remainder of the circuit. It will be appreciated that the more heavily lined interconnections of FIGS. 6 and 7 represent initial conditions, i.e., the start of the particular cycle.
In connection with FIG. 6, an alert tone is received and data is transmitted by the terminal station as follows: the pole repeater, as described more fully hereafter, receives a coded signal from the next higher repeater. This signal is decoded by the pole repeater and is responded to by the production of an alert tone by the pole repeater. This alert tone on service line 47 is coupled to all terminal stations connected to that service line. In addition, it also passes through distribution transformer 46 to high voltage distribution line 45. Thus, the alert tone will eventually reach many other terminal stations connected to other distribution transformers proximate transformer 46. Due to frequency allocations and attenuation on the lines, only the proper terminal stations will respond.
In the terminal station illustrated in FIG. 6, coupler 50 couples this tone to transmit receive switch 51, which is in the receive position. The received tone is applied to alert tone receiver 52 and decoded as described in connection with FIG. 2. The output pulse from alert tone receiver 52 is applied to the set input of receive flip-flop 58. Receive flip-flop 58 produces an output pulse signal that is applied to encoder 53 to initiate a meter reading which is suitable encoded and stored in buffer memory 91.
The output of flip-flop 58 also actuates switch 84 by way of OR gate 83 to cause the production of b clock pulse signals from divider 85. The output of flip-flop 58 also actuates switch 77 coupling the clock pulse signals from b to delay counter 78. Delay counter 78 provides a different amount of delay for each terminal station connected to the same pole repeater. At the end of the predetermined delay, delay counter 78 produces a carry output pulse which resets flip-flop 58 and sets flip-flop 82. The output of flip-flop 82 is coupled by way of OR gate 83 to switch 84 to maintain the production of b clock pulses. The output of flip-flop 82 is also coupled by way of OR gate 73 to T-R switch 51, placing it in the transmit mode. Flip-flop 82 also acutates switch 81, providing b clock pulse signals to data counter 79 and to buffer memory 91. These clock pulse signals cause buffer memory 91 to read out into tone control logic 92 which, in turn, controls tone generator 54, thereby producing a tone code output signal which is coupled by way of switch 95 to power amplifier 55. Controlled switch 95 is actuated by flip-flop 82 by way of OR gate 73. Power amplifier 55 amplifies the data tones generated seriatim by tone generator 54 and applied these amplified tones to T-R switch 51 which couples them by way of coupler 50 to service line 47 and the pole repeater.
During this time, data counter 79 counts b clock pulse signals. At the end of the period determined by the count capacity of data counter 79, an output pulse is produced on the carry output line which resets data counter 79 and flip-flop 82. The time delay introduced by data counter 79 is sufficient for the information stored in buffer memory 91 to be completely read out and converted into a series of data tones by tone generator 54. Upon resetting flip-flop 82, switch 84 is opened, thereby terminating the b clock pulses, T-R switch 51 reverts to the receive mode, and switch 95 is opened thereby disconnecting tone generator 54 from power amplifier 55. The system has thus completely reset and is ready to receive another alert tone from the pole repeater.
FIG. 7 illustrates the alarm operation of a terminal station in accordance with the present invention. During the alarm mode as previously indicated, there are a number of combinations of events that can take place. The usual sequence of events is that alarm circuit 60 will be actuated, causing an alarm tone to be transmitted by the terminal station. The terminal station then waits a predetermined period for an answer from the pole repeater. The pole repeater will answer with an alert tone thereby causing the terminal station to repeat the alarm tone and accompany the alarm tone with data tones. The data tones, while controlled by control logic 82, comprise alarm data from memory 94 since transfer gate 93 is activated by an output pulse from shaper 65 when alarm switch 61 is closed. Provision is also made, however, for the possibility that the pole repeater will not answer. In this event, the terminal station repeats the alarm signal and again waits for an answer. If the pole repeater responds with an alert tone, the terminal station then transmits the alarm tone with the data from alarm data memory 94. However, if there is still no answer the cycle continues a predetermined number of times after which the terminal station simply shuts off and ignores the actuation of alarm circuit 60. However, the alarm function is so designed that the alarm cycle is repeated for each separate actuation of switch 61, i.e., if switch 61 is opened and then closed again, the alarm cycle will be repeated.
Specifically, the closure of switch 61 applies a fixed amplitude pulse to differentiator 64 which differentiates the signal and applies the resulting spike to pulse shaper 65, which may, for example, comprise a monostable multivibrator. The output form pulse shaper 65 is applied to the set input of flip-flop 66, which serves to store the alarm signal. The output from pulse shaper 65 is also applied to OR gate 69 and is coupled by OR gate 69 and OR gate 71 to the set input of flip-flop 72. Flip-flop 72, in turn, actuates alarm tone generator 57 and, by way of OR gate 73, T-R switch 51. Thus, an alarm tone is generated and is transmitted by the terminal station to the pole repeater.
The output of flip-flop 66 is also coupled to the control input of switch 67, closing the switch to couple b clock pulse signals to alarm counter 68. Alarm counter 68 has at least two taps thereon to control the repetition period and duration of the alarm signal. As counter 68 counts the b clock pulse signals, the first tap encountered (going from left to right) is the tap indicated as coming out of the lower portion of block 68, which is coupled by way of OR gate 75 to the reset input of flip-flop 72. Thus, after a predetermined duration of the alarm tone, the alarm is shut off and T-R switch 51 reverts to the receive mode. During the time period determined by the spacing of the first tap and the second tap on alarm counter 68, the terminal station waits for a response from the pole repeater. The duration of this waiting period is such that if the pole repeater were going to answer at all, it would have answered in this period, i.e., the duration of the waiting period exceeds the sum of the equipment delays of the various elements in the terminal station and in the pole repeater.
At the end of the waiting period, as determined by a second tap, illustrated as coming out of the upper portion of block 68, a pulse is produced that is coupled by way of OR gates 69 and 71 to the set input of flip-flop 72. As previously described, the output of flip-flop 72 causes an alarm tone to be generated by alarm tone generator 57 and transmitted by way of T-R switch 51 to the pole repeater. At the end of the transmission period, determined by the count capacity between the second and third taps on alarm counter 68 an output pulse is produced on the third tap and coupled by way of OR gate 75 to the reset input of flip-flop 72, thus terminating the second alarm pulse and initiating a second waiting period. At the end of the second waiting period, determined by the count capacity between the third tap and the carry output, a carry pulse is produced which is coupled by way of OR gate 74 to the reset inputs of flip-flop 66 and counter 68. This terminates the alarm function even though no response has been received from the pole repeater. If an alert tone is received from the pole repeater after the termination of the alarm function, there is no alarm tone transmitted, even though switch 61 is still in the closed position. The response of the terminal station is a normal data transmission.
While illustrated in FIG. 7 as containing only three taps, obviously counter 68 may comprise any desired number of taps to provide the desired number of transmit-and-wait cycles. Also, as described, counter 68 acts as a multiple tap delay line. It is understood that, depending upon the counting pattern and the use of additional logic circuitry, a greater or lesser number of taps may be used to provide the same number of transmit-and-wait cycles.
If, during waiting periods determined by the count capacity between the taps on counter 68 and the frequency of the b clock pulses, an alert tone is received, then a data read out proceeds as described in connection with FIG. 6 with the addition of an accompanying alarm tone as determined by data counter 79. Specifically, after delay counter 78 determines the appropriate time for transmission, an output on the carry line of counter 78 sets flip-flop 82 which in turn causes b clock pulse signals to be applied by way of switch 81 to data counter 79. The carry output of delay counter 78 is coupled by way of switch 76 and OR gate 71 to the set input of flip-flop 72. Switch 76 is in a closed condition due to the set output of flip-flop 66. This causes the transmission of an alarm tone by alarm tone generator 57, power amplifier 55 and T-R switch 51.
At the end of an initial transmission period, determined by the tap on data counter 79, a pulse is produced on the tap of data counter 79 which is coupled by way of OR gate 75 to the reset input of flip-flop 72, thereby terminating the transmission of the alarm tone. The pulse on the tap of data counter 79 is also coupled by way of OR gate 74 to the reset inputs of flip-flop 66 and counter 68, thereby clearing the alarm circuit. Data counter 79 counts b clock pulses for a time period sufficient to transmit data tones controlled by alarm data buffer memory 94 as previously described in connection with FIG. 6.
If desired, the alarm function need not have priority in the communication system of the present invention. This may be desirable, for example, where a plurality of alarm functions at each terminal station are provided and included in alarm data memory 94 as several different codes, each for a different alarm condition. Having a plurality of alarm functions available to a terminal station increases the probability of an alarm sounding during the basic data collection operation of the communication system of the present invention. However, although some interruptions may occur, the relatively low duty factor of the function, compared to total system time makes the occurrence of an interruption relatively rare. Further, even if an interruption does occur, and some data is lost, the randon access capability of the system allows the meters to be re-read.
Only when the system is devoted to high duty factor tasks may the interruptions become intolerable; for example, with power demand meters, where every demand meter needs periodic reading, with a period of less than one hour. Under these circumstances, an alternative reading format may be used; viz., all of the alarm functions, except the most urgent one, are given a non-priority status. For example, much maintenance work requiring a field check by utility personnel does not require instantaneous attention in a two-way communication system. The non-priority alarms are read as part of the routine meter reading task.
This change in format slightly changes the construction of the terminal station. Specifically, instead of sending either meter data or alarm data, both are sent and the time allowed for each meter to respond must be increased, which is accomplished by changing the count capacities of counters 78 and 79. An additional tap is added to data counter 79 to actuate an additional data transfer gate which connects an added alarm buffer memory to tone control logic 92. The inputs to the alarm buffer memory is connected to added alarm data memories, actuated by additional alarm circuits, similar to circuit 60 but more simple e.g., omitting differentiator 64 and shaper 65. In essence, a plurality of alarm circuits are provided in parallel, only one has direct access to a transfer control gate, the other transfer gate is actuated by the data counter during routine data collection. Thus, one alarm still has priority, the rest do not.
In the central station, the last word of data from each terminal station is examined for an alarm condition. If desired, to provide a key or check bit, the first bit of the word may always be a logic 1 to indicate an alarm condition, with the remaining bits identifying the exact nature of the alarm.
The repeaters
FIGS. 8, 9 and 10 relate to the repeaters utilized in the system of the present invention. Specifically, FIG. 10 illustrates a generalized repeater for use in the system of the present invention wherein the interconnections for use as a pole repeater are illustrated by a solid line and additional equipment or connections for use as intermediate or substation repeater are illustrated by dashed lines. FIGS. 8 and 9 each illustrate a tone repeater suitable for use in FIG. 10.
As previously indicated, it is necessary that the tones utilized to communicate from one level to the next be different in frequency to improve isolation between levels since the communication at all levels is carried out in a common transmission medium. This is generally referred to as frequency multiplex. In addition, it is necessary to amplify the signal amplitude in proceeding from one level to the next. While, in theory, one could simply amplify the received signal, for example, by a simple amplifier or a regenerative amplifier, i.e., one that goes into oscillation upon receiving a signal at its resonant frequency, such is undesirable in a power line communication system due to the extreme level of noise encountered on the power lines, often many times larger than the signal itself. Thus, simply amplifying a received signal will amplify an appreciable amount of noise as well. Thus, it is preferred in the system of the present invention to utilize what may be described generally as signal translators, wherein a received signal is decoded and a new signal is generated to replace it, the frequency of the new signal is at a different frequency for transmission at the next level in the frequency multiplex format. FIGS. 8 and 9 illustrate two examples of suitable tone repeaters. FIG. 8 utilizes dividers to generate the tones from a local oscillator, whereas FIG. 9 utilizes tone generators similar to that illustrated in FIG. 2 to generate the tones for the next level.
In FIG. 8, an incoming signal is applied to input 101 and coupled to a plurality of receivers, illustrated by receivers 103, 104 and 105, in parallel. The outputs of receivers 103-105 are coupled to the control input of controlled switches 106-108, respectively. The analogue inputs to controlled switches 106-108 are connected to dividers 109-111, respectively. Dividers 109-111 divide a clock signal, for example, provided by reference oscillator 112, by different divisors to produce a plurality of different frequencies.
When a particular receiver, for example, receiver 104, receives an incoming signal it produces an output pulse which closes controlled switch 107 thereby coupling divider 110 to summation network 113. Thus, the output signal on output 102 is determined by the frequency of reference oscillator 112 and the division ratio provided by dividers 109-111. The frequency of the incoming signal is thus translated to any desired frequency and there need be no direct relationship between the frequency of the incoming signal and the frequency of the signal on output 102.
A similar result is obtained from the tone repeater illustrated in FIG. 9 wherein a logic controlled tone generator, such as illustrated in FIG. 4, is utilized to generate the tone frequencies for the next level, depending upon the combination of tones received.
Specifically, an incoming signal is coupled by way of input 120 to a plurality of receivers 121-122, each responding to a different received tone. Also coupled to receivers 121-122 is oscillator 124 which may, for example, comprise the local clock oscillator or signal derived therefrom. The outputs of receivers 121-122 are coupled to buffer storage 125 by way of decoding logic 123, then to transfer circuit 126 and data tone control logic 127. Transfer circuit 126 has an additional input to which b clock pulses are connected as shown in FIG. 10. Tone generator 128 functions as described in connection with FIG. 4 under the control of data tone control logic 127.
In operation, an incoming signal is applied to input 120 and thereby to receivers 121-122 in parallel. Each received tone actuates one of receivers 121-122, producing an output from the threshold device. The threshold devices of all the receivers are connected to the inputs of a decoding logic. For the data format of three simultaneous tones, each at one of four possible frequencies, the decoding logic is as more fully described in conjunction with FIG. 13. The output signals from the decoder are temporarily stored in buffer storage 125 for one clock interval. During this interval, the stored information is coupled to tone control logic 127 by transfer gate 126 where it is converted into suitable control signals by the data tone control logic from which the feed-back paths of the dividers in tone generator 128 are determined. Thus, the output signal from tone generator 128 comprises a series of tones directly controlled by the received signal but having no direct frequency relationship to the received tones. The output on line 129 may be a series of tones in either a higher or lower band than the received tones on input 120. It is understood that FIGS. 8 and 9 represent two examples of suitable tone repeaters for use in the present invention. In the discussion below of the repeaters, the tone repeater of FIG. 9 is used, in conjunction with a three-tone format. This is by way of example only. Other frequency translating tone repeaters may be utilized.
The pole repeater
As previously indicated, FIG. 10 illustrates in detail the component parts of the repeaters utilized as pole, substation, or intermediate repeaters. Depending upon the level at which they are used, the pole, substation, and intermediate repeaters differ little except for additional receivers or tone generators utilized to accommodate the number of tone signals being transmitted through the system. As more fully described below, since the pole repeater is receiving only two tones and produces only an alert tone in response thereto, the appararus for the pole repeater is somewhat simplified as compared to the intermediate and substation repeaters. However, the intermediate and substation repeaters omit the alert tone generator and the associated control switch and comprise additional identification tone repeaters, depending upon the number of tones received; i.e., one for substation repeaters and two for intermediate repeaters. A pole repeater is illustrated by solid lines in FIG. 10, and the additional apparatus utilized for higher level repeaters is indicated by a dashed line.
The low voltage side of the repeater is coupled to lower voltage distribution line 47 by fan-out coupler 130 which may, for example, comprise a toroid having the lower voltage distribution line passing therethrough as a single-turn primary winding. Frequency divider network 131 is connected to fan-out coupler 130 and serves to separate the incoming and outgoing signals at the lower voltage or fan-out side of the repeater. The output side of frequency divider 131 is connected to data tone repeater 132 which is illustrated as comprising the elements previously described in connection with FIG. 9. The output of tone repeater 132 is connected to power amplifier 133. The output of power amplifier 133 is connected to frequency dividing network 134 which has the input/output terminal thereof connected to trunk coupler 135.
Implicit in the foregoing description is the intention that the term "fan-out" refer to the lower voltage side of the repeater and that "trunk" refer to the higher voltage side of the repeater. It will be noted, too, that the repeater effectively couples around distribution transformer 137 in that fan-out coupler 130 is coupled to low voltage lines 138 while trunk coupler 135 is coupled to high voltage lines 136.
When a repeater is located at a power substation, the by-passing capabilities of the repeater can be used to the fullest extent, i.e., not only can the step-down transformer be by-passed, but the switchgear and protective devices in the power substation can also be by-passed. This enables one to communicate around the power substation irrespective of the open or closed status of switching devices within the substation, thereby increasing the reliability of the system. In order to accomplish this, the couplers are not connected right at the transformer to the higher and lower voltage lines, but are connected at the line entrance and exit of the power substation.
The output of frequency divider 134 is connected to alert tone receivers 141 and 142. The outputs of receivers 141 and 142 are combined in AND circuit 143. The output of AND gate 143 is connected to the controlling input of controlled switch 151 and differentiator 145. The output of differentiator 145 is connected to shaper 146, the output of which is coupled to the controlling input of controlled switch 189 (by way of connection j), the set input of flip-flops 144 and 155, and by way of controlled switch 194 to the set input of flip-flop 193. The output of flip-flop 144 is connected to the controlling input of controlled switch 153. The input of alert tone generator 145' is connected to continuous clock source a and its output is passed through controlled switch 189 to the input of power amplifier 146'. The output of power amplifier 146 is connected to input of frequency dividing network 131.
There are two parallel paths between clock source 150 and divider 152. One through controlled switch 151 and the other through controlled switch 163. The output of the divider 152 is the local clock pulses b, which pass through controlled switch 153 to counter 154. The output of flip-flop 155 is connected as one input to OR gate 156, to the other input of which is connected OR gate 183 in alarm circuit 170. The output of OR gate 156 is connected to the controlling input of controlled switch 157, and by way of inverter 158, to the controlling input of controlled switch 159. Identification storage register 161 is connected to transfer circuit 162 which couples the identification code to tone control logic 127. The tap of counter 154 is connected to the reset input of flip-flop 155. The carry output of counter 154 is connected to its reset input and to the reset inputs of flip-flops 144 and 195.
The repeater further comprises an alarm circuit 170 for sensing an alarm tone from the next lower level and relaying that tone to the next higher level at a different frequency. Specifically, alarm circuit 170 comprises alarm receiver 171 coupled to the output of frequency dividing network 131. The output of alarm receiver 171 is coupled to the set inputs of flip-flops 172, 175, and 195. The output of flip-flop 172 is coupled to the control input of controlled switch 173. The switched input of controlled switch 173 is connected to the output of alarm tone generator 174. The output of controlled switch 173 is connected to a second input of power amplifier 133. The output of flip-flop 175 is connected to one input of OR gate 184 and to the control input of controlled switch 176. Controlled switch 176 coupled b clock pulses to counter 177. A tap on counter 177 is coupled by way of controlled switch 192 to the set input of flip-flop 178 and to one input of OR gate 183. The carry output of counter 177 connects to its reset and the reset input of flip-flops 175 and 193. The output of flip-flop 178 is connected to the control input of controlled switch 179, which coupled b clock pulses to counter 181, and the other input of OR gate 184. The output of OR gate 184 is connected to the control input of controlled switches 163 and 187; and, by way of inverter 188 to the control input of controlled switch 190. Controlled switch 187 shunts the inputs to receivers 103-105 to ground and is used in pole repeaters only. Controlled switch 190 as inserted between the output of address repeaters 185 and 186 and power amplifier 146' is used only in intermediate and substation repeaters. Controlled switch 194 interconnects the output of shaper 146 and the set input of flip-flop 193. The control input of switch 194 is connected to output of flip-flop 195. The carry output of counter 181 is connected to the reset thereof and to the input of counter 182. The carry output of counter 182 is connected to the reset thereof and to the reset input of flip-flop 178.
The second tap from counter 177, by way of controlled switch 192, and a tap from counter 181 comprise the inputs to OR gate 183. The output of OR gate 183 is conected to the other input of OR gate 156. The output of flip-flop 193 is inverted by inverter 191 and coupled to the control input of controlled switch 192.
Address repeater 185/186 is included for relaying repeater selection codes to a lower level after frequency translation. The address repeater is illustrated as two blocks, 185 and 186, representing the receiving and tone generating portions, respectively, of the tone repeater illustrated, for example, in FIG. 9. Two such repeaters are used in the intermediate repeater, while one is used in the substation repeater.
Generally, the function of the chain of repeaters is to provide an addressable communication link between the central station and the terminal stations and, in the processes, provide signal amplifying and frequency translation capability to isolate one level of repeaters from the next. In addition, discontinuities, such as transformers and protective devices are by-passed at signal frequencies. Thus, the repeaters serve as the building block for a random access two-way communication system that reaches everywhere in a power distribution network.
An alert tone from the central station is coupled by way of trunk coupler 135 to frequency dividing network 134. Frequency dividing network 134 corresponds in function to the transmit-receive switch utilized in the terminal station. However, if it is desired to transmit and receive simultaneously, it is necessary to provide a continuous connection between the power amplifier and the receivers with the trunk coupler. Frequency dividing network 134 comprises, for example, band-pass and band-reject filters arranged so as to isolate the transmit and receive portions of the repeater while at the same time coupling both the transmitter and the receivers to the trunk coupler. Thus, the signals are divided in frequency divider 134 according to the frequency thereof to provide isolation between incoming and outgoing signals on the high voltage side of the repeater. Other types of isolation devices, such as hybrid couplers, may be used instead.
The alert tones are detected by receivers 141 and 142, the outputs of which are combined in AND circuit 143 and coupled to the control input of controlled switch 151 and, during the transition from low to high at the output of AND circuit 143, a one-shot pulse is generated by differentiator 145 and shaper 146. The output of flip-flop 178 in alarm circuit 170 is connected to the control input of controlled switch 163 located in a parallel path with switch 151. These two parallel switches control the initial state of the timing control circuitry for the repeater. When an alert or an alarm is received, the corresponding switch in the parallel path is closed, thereby coupling the a clock source to divider 152, which determines the timing of local clock pulses b. These clock pulses are coupled by way of controlled switch 153 to counter 154, controlled switch is turned on by the output of flip-flop 144, which is set by the one-shot pulse from shaper 146. The one-shot pulse also controls the sending of an alert tone through controlled switch 189. Thus, the duration of the alert tone is determined by the duration of the one-shot pulse. This one-shot pulse also sets flip-flop 155 and may also set flip-flop 193 in alarm circuit 170 through controlled switch 194. Switch 194 is controlled by flip-flop 195, which is set by the output of alarm receiver 171 and reset by the carry pulse from counter 154.
As alert tone generator 145' generates an alert tone, which is coupled by way of power amplifier 146' and frequency divider 131 to fan-out coupler 130, the set output of flip-flop 155 is coupled by way of OR gate 156 to controlled switch 157, thereby coupling b clock pulse signals to transfer circuit 162. This causes the identification of the pole repeater to be read out from identification register 161 and transmitted as a tone code from tone generator 128, power amplifier 133, frequency divider 134 and trunk coupler 135. This identifies the repeater to the next higher level in the communication system. During the identification portion, counter 154 has been counting b clock pulse signals and at a predetermined count determined by the position of the tap, e.g., three, produces an output pulse on the tap which resets flip-flop 155, thereby terminating the identification mode after three repetitions of the identifying code.
The set output of flip-flop 155 is converted to a low level signal by inverter 158, thereby shutting off b clock pulse signals from transfer circuit 126 during identification. When flip-flop 155 is reset, switch 157 is opened and 159 is closed, coupling b clock pulse signals through transfer gate 126, thereby enabling the data tones received by way of fan-out coupler 130 and frequency divider 131 to be translated in frequency by tone repeater 132 and transmitted by way of power amplifier 133, frequency divider 134 and trunk coupler 135. After a sufficient time has elapsed for all of the terminal stations to report, as determined by the duration of the alert tones for this repeater from the central station, the output of AND gate 143 goes low and turns off switch 151.
Whenever both switch 151 and 163 are off, the local clock pulse b stops, thus terminating the repeating function in the repeater because the repeater is designed to function only as long as local clock pulses b is present. Actually, a portion of repeater must always be on, to assure that the alert tones and alarm tones may be received to activate this repeater. It is desirable to limit this portion for saving power. The following lists the active components which are always on: clock source 150, alert receivers 141, 142; AND gate 143; differentiator 145; shaper 146; controlled switches 151, 163; alarm tone receiver 171; flip-flops 172, 175 and 193; and OR gate 184. The remaining portion of the repeater will be activated when either controlled switch 151 or 163 is closed. This is equivalent to saying the repeater is fully activated whenever the local clock pulses b is present.
The set input of flip-flop 155 is connected to the output of shaper 146 and the reset input is connected to a tap of counter 154. The count capacity at this tap is equal to the number of repetitions of the repeater identification code. (The repetition of identification codes allows the central station to correct repeater identification codes by majority logic, as described below in conjunction with the central station.) When the output of flip-flop 155 is high, it allows controlled switch 157 to pass b clock pulses to transfer gate 162, thus allowing repeater identification codes to be transmitted through trunk coupler 135. The count capacity of counter 154 is one count larger than its tap. Thus, one time interval later, the carry pulse will reset it, and also reset flip-flop 144, to open controlled switch 153 and block the b clock pulses from counter 154.
The higher level repeaters
The identification tones are repeated by data tone repeater 132 and transmitted by way of trunk coupler 135 for higher level repeaters. This occurs only at the addressed repeater as determined by alert tone receivers 141 and 142, i.e., receivers 141 and 142 interpret two of the identification tones from a higher level as alert tones, the coincidence of which makes the output of AND gate 143 go high, thereby either enabling alert tone generator 145 as in the pole repeater or transmitting the remaining portions of the alert tones to the next lower level repeater, as in the substation or intermediate repeaters.
In addition to different numbers of receivers or transmitters, the pole repeaters have an alert tone generator 145' and a grounding switch 187, whereas substation and intermediate repeaters have address repeaters 185, 186 and an alert-tone cutoff switch 190. The purpose of controlled switches 187 and 190 is to assure that the alarm task has priority over the data collection task. When an alarm tone is received in a pole repeater, controlled switch 187 grounds the input of the fan-out receiver. This interrupts the data transfer function of the repeater even if the alarm is sounded during the routine data collection task. In the substation or intermediate repeater, the requirement of relaying repeater identification codes rules out grounding fan-out receivers as a means to interrupt data collection. The equivalent result is obtained by controlled switch 190 after the repeater receives an alarm. At that instant, switch 190 interrupts the address code used for alerting lower repeaters. Whenever a lower repeater loses its alert tone, the data transfer function in that repeater is interrupted. Therefore, normal data collection is always interrupted whenever an alarm is sounded.
This interruption feature has another important benefit, in that it minimizes the difficulty of another repeater in the system picking up the alarm. (1) If this should happen, two alarm signals are then relayed to the central station. Because of the tree structure, then two paths will eventually converge. In this situation, interrupting the data transfer function after receiving a first alarm assures only the proper path will be identified by that repeater to the central station. (2) Since there are circuit delays in the system, the correct alarm will arrive first and block spurious alarms.
Alarm circuit 170 is coupled to the output of frequency divider 131. Should an alarm sound at any time, the operation of the system is such that the alarm overrides any other function. An alarm received from a lower level device is detected by alarm receiver 171 which produces an output pulse setting flip-flops 172 and 175. The high output of flip-flop 172 closes switch 173, thereby coupling an alarm tone (at a different frequency) to power amplifier 133. Flip-flop 172 controls the duration of the re-transmitted alarm tone. Controlled switch 187, under the control of flip-flop 178 grounds the input to the receivers in tone repeater 132 during the period of re-transmitting the alarm tone and repeater identification code, thus terminating any data transfer function of the pole repeater if the alarm sounds during routine data collection.
The remaining apparatus in alarm circuit 170 controls the timing of events so that after a single alarm tone is re-transmitted, a repeated identification code of the repeater is transmitted. The number of repetitions is a matter of choice and, as more fully described below, is done for the purpose of providing error correcting capability in the central station.
Counter 177 controls several functions in the operation of the alarm circuit. The capacity of counter 182 is one less than the number of identification code repetitions. Counter 181 determines the spacing between identifications. Counter 181 is necessary to spread out the identification tones since each repeater in the chain to the central station must be given an opportunity to identify itself. Thus, the signal received by the central station is an alarm tone followed by a particular number of repeated identifications wherein the identification tones from each repeater are interleaved so that a number of complete identifications are received.
Specifically, the high output from flip-flop 175 closes switch 176, thereby connecting b clock pulses to counter 177. A first tap on counter 177 resets flip-flop 172, thereby terminating the alarm tone. A second tap, defines a waiting period before the transmission of the first repeater identification code. Thus, the tap is connected at different points in the counter for the pole, substation, and intermediate repeaters. For example, if the first tap is at the first count, the second tap is at the second, third, or fourth count positions for the pole, substation and intermediate repeaters, respectively. An output pulse at the second tap is coupled by controlled switch 192 to set flip-flop 178 and, by way of OR gates 183 and 156, causes the transmission of an identification by closing switch 157, thereby coupling b clock pulse signals to transfer circuit 162. At the end of one count, this identification code terminates but, after a preset time interval, is repeated a fixed number of times as determined by counter 182.
The remaining repetitions are controlled by switch 179 and counters 181 and 182. Specifically, an output from flip-flop 178 closes switch 179, thereby coupling b clock pulse signals to the input of counter 181. A tap at the last count on counter 181 is connected by way of OR gate 183 and 156 to controlled switch 157, thereby initiating a second identification transmission. The position of the tap on counter 177 determines the position of the identification in the data stream to the central station as described above. By varying the position of the identification tone codes, the tones are interleaved and received at the central station as a single identification, repeated a given number of times. The count capacity of counter 181 is always one more than the count spacing between identifications of the same repeater. Each carry output of counter 181 resets the counter and is coupled to counter 182 which counts through capacity to reset itself and flip-flop 178. For example, counter 182 may comprise a pair of flip-flops, thus having a capacity of 40 counts. Thus, after four repetitions, flip-flop 178 is reset, thereby terminating the alarm cycle. Note, however, that the alarm has been repeated five times, once under the control of counter 177 and the remaining four times under the control of counter 182.
OR gate 184 combines the outputs of flip-flop 175 and flip-flop 178. Its output is high from the time an alarm is received by alarm receivers 171 until the end of transmission of the repeater identification code during an alarm; i.e., during the entire alarm function of the repeater. The output of OR gate 184 is coupled to controlled switches 163 and 187 and, by way of an inverter, to controlled switch 190.
Since counter 177 has a count capacity one greater than the count at its second tap, its carry pulse occurs one time interval later than the pulse on its second tap. The carry pulse of counter 177 is used for the reset thereof and also for resetting flip-flops 175 and 193. The repeater identification function associated with an alarm is initiated by the output pulse on the second tap on counter 177. This pulse must pass through switch 192 before it can be effective. Therefore, initial repeater identification during alarm only occurs when switch 192 is closed. The retransmission of the alarm tone is initiated by the output of the alarm receiver and transmitted under the control of a pulse on the first tap of counter 177. This pulse does not pass through switch 192 and the alarm tone transfer function of the repeater is not affected by switch 192. Switch 192 is controlled by the output of flip-flop 193 through inverter 191. Thus, switch 192 is closed only when the output of flip-flop 193 is low and opened when high. Flip-flop 193 is set by a one-shot pulse passed through controlled switch 194 from shaper 146. This pulse only occurs during the transition of the output of AND gate 143 from low to high, i.e., during the instant the repeater is being alerted. Flip-flop 193 is reset by the carry pulse of counter 177, which will occur once each time an alarm tone is received by the repeater, but always later than the pulse occurred on the second tap of counter 177.
When the system is dormant or alerted for routine data collection, there is no alarm pulse to set flip-flop 195. Therefore, flip-flop 193 is also not set because either there is no set pulse or it is blocked by open switch 194. Thus the alarm circuit is ready for relaying both the alarm tone and the repeater identification if an alarm is sounded. Then, the alarm receiver output will set flip-flop 195 to close switch 194, although there is no output from shaper 146 to set flip-flop 193 as yet. After an alarm reaches the central station, a new alert to read the alarm data will reach this repeater. Since switch 194 is closed, the one-shot pulse from shaper 146 will set flip-flop 193 and open the switch 192. When the alarm tone associated with the alarm data is received by this repeater, the repeater identification function associated with the alarm will be blocked by open switch 192, although the alarm tone relaying function will still proceed normally. The carry pulse from counter 154 resets flip-flop 195, opens switch 194, and closes switch 192. The next carry pulse from counter 177 will reset flip-flop 193, returning the alarm circuit back to normal. Thus, the alarm tone associated with the alarm data, being sent in response to an alert tone from the central station, does not re-trigger the response as for the initial alarm from the lower level.
The alarm function is similar in all levels of repeaters except that in higher level repeaters, the data comprises the identification tones of all of the lower level repeaters. Thus, the transmission from the intermediate or substation repeaters comprises a single alarm tone followed by the identification of the highest level repeater and then the identification of the lower level repeaters. While the use of a single alarm tone may result in the loss of an alarm, i.e., the alarm goes unanswered, such is not catastrophic due to the alarm repeat feature of the terminal station.
As previously described in connection with the terminal station, the terminal station will repeat the alarm if an answer is not obtained within a predetermined amount of time. However, it is understood that the system operates at a speed such that the alarm is not repeated before communication is completed through the chain to the central station and the central station has had a chance to respond. In a working system, for example, a terminal station repeating an unanswered alarm signal at a rate of once every ten seconds or so would provide an ample time for communication up to the central station and back down again.
In addition, while described in conjunction with a preferred system in which transmission and reception can be carried out at the same time, some equipment simplification can be obtained by utilizing T-R switches for frequency dividing networks 131 and 134. However, this requires that all of the repeaters operate on a time multiplex basis wherein only part of the time is available for reception and the remainder is available for transmission. This appreciably slows down the system and requires synchronization of the repeaters at all levels.
In the two-way communication system of the present invention, the repeaters in the path between the central station and a particular terminal station are activated only for the length of time necessary to carry out the task, as determined by the central data processing computer issuing the command, i.e., by the duration of the alert tone. In the case of an alarm situation, the repeater circuitry maintains an ON condition for the duration of the alarm. If the above-noted time multiplex format is used, wherein only a portion of the time is available for transmission and the remainder available for reception, suitable boxcar circuits, or other suitable devices, must be added to the system at the outputs of the alert tone receivers to convert the sequence of spaced alerting signals into a continuous signal.
The central station
The central station is illustrated in FIGS. 11-17, of which FIG. 11 is a general block diagram of the central station illustrating how the remaining FIGURES are interconnected.
Functionally, central station 11 is the upper end of the data communication system of the present invention and forms an interface with a central data processing computer (not illustrated), wherein power consumption and billings are calculated and reports of alarm conditions are received. In central station 11, the incoming data is stored temporarily, decoded, converted into a suitable seven bit word code, e.g. ASCII code, for feeding data to the computer through a teletypewriter terminal.
As with other portions of the system, flexibility, economy of apparatus and relatively low cost are among the objects to which apparatus of the central station is directed. To these ends, the central station also utilizes the receivers and tone code generators as described in FIGS. 2 and 4. In addition, the number of responses to the various conditions that may be encountered in operating the system are accommodated by various combinations of sub-tasks. Thus, instead of the number of responses being the same as the number of possible conditions, the response is formed by various combinations of six sub-tasks, thereby simplifying the generation of a response by the central station.
Central Station 11 is coupled to a high voltage transmission line by way of line coupler 201, frequency divider 202 and fan-out transceiver 203. Received data, except for an alarm tone, is coupled by way of a plurality of connections R-2 to decoding logic 204 which also may provide a missing data detection function. The decoded data is coupled to the S-10 input of data handling unit 205 where the information is converted into a suitable code, for example, ASCII code, and transferred to teletypewriter buffer 206. Teletypewriter buffer 206 serves as the connection between central station 11 and one of the teletypewriter terminals of the central data processing computer. It is understood that the computer need not be proximate the central station, but can be coupled thereby by a suitable two-way transmission link, for example a pair of wide-band telephone lines or other communication channel of similar capacity.
Data handling unit 205 also provides control signals supplied by the computer by way of teletypewriter buffer 206 to repeater tone code generators 207 - 209. By suitable selection of tone code patterns, coupled to inputs R-10, R-9, and R-8 of transceiver 203, the unique path is defined through the data transmission network of the present invention to a particular pole repeater. Upon receiving an alert tone, the pole repeater reads out the data from the various terminal stations as previously described. The data is coupled through the data handling unit and teletypewriter buffer 206 to the computer where calculation of power consumption and billings are made. Logic circuitry 210 comprises a plurality of logic circuits for triggering the various subtasks and actuating the switches in data handling unit 205 to carry them out, thereby defining a particular response to the conditions sensed by the data handling unit. In addition, time sequence controller 211, as more fully described in connection with FIG. 17, controls the timing of the various functions within central station 11.
FIGS. 12 - 18 illustrate in detailed block diagrams the interconnections among the blocks illustrated in FIG. 11. FIG. 12 is a detailed block diagram of fan-out transceiver 203. In fan-out transceiver 203, incoming signals from line coupler 201 and frequency divider 202 are coupled to the input of data receiver 220 and alarm receiver 221. Data receiver 220 comprises a plurality of tone receivers, previously described, and has the outputs of the threshold comparators collectively designated R-2 in FIG. 12. The format of data code tones within the communication system determine the number of receivers for data receiver 220. In this particular case, since the data tone format uses three tones, each at one of four frequencies and carrying two bits of information each, 12 tone receivers are needed to interpret this code format. There are 12 outputs, collectively designated R-2, as the output of data receiver 220. A multiple conductor cable representing these outputs is connected to the D-8 input of decoding logic 204.
As indicated in FIG. 12, alarm receiver 221 comprises a single output, designated R-1, which is coupled to the A-1 input of time sequence controller 211. As previously noted, if more than one alarm condition is to be sensed in the communication system of the present invention, the difference will be detected in alarm data collection. Alarm receiver 221 always comprises a single tone receiver.
On the transmit side of transceiver 203, the outputs from alert tone generators 207, 208 and 209 are connected respectively to inputs R-10, R-9, and R-8. These inputs are combined and applied as a single input to controlled switch 222. The outputs of the alert tone generators are amplified by amplifier 223 and applied as one input to frequency divider 202. The input R-8 passes through controlled switch 229 which is controlled by the output of flip-flop 229a, the input to which is inverted by inverter 229b. The set and reset inputs to flip-flop 229a are connected to terminals R-11 and R-12 respectively. R-11 is connected to output terminal F-5 of data handling unit 206 while R-12 is connected to F-13 of the data handling unit. When flip-flop 229a is set, controlled switch disconnects the alert tone for pole repeaters from the signal input to controlled switch 222. This disconnects pole repeater selection tone generator 209 from the power amplifier at the beginning of the fourth sub-task (more fully described below).
Control circuitry within fan-out transceiver 203 comprises flip-flops 224 and 227 and OR gates 225 and 226. Flip-flop 224 is normally in the "set" state, thereby closing controlled switch 222 for transferring the generated alert tones to amplifier 223. The set input of flip-flop 224 is connected to input R-5 which is also connected as one input to OR circuit 226. The output from OR circuit 226 is connected to the set input of flip-flop 227. Flip-flop 227 actuates power switch 228 thereby providing power to data receiver 220 from a source of supply schematically illustrated as a plus (+) sign. The input to R-5 is an initiation pulse from the T-3 output of timing sequence controller 211. A holding pulse from the M-6 output of monitoring device 282 in data handling unit 205 is coupled to the R-6 input, which is coupled by way of OR circuit 225 to the reset input of flip-flop 224 and directly to the reset input of flip-flop 227. This serves to shut off the transceiver temporarily during data collection, either at end of normal operations or whenever monitoring device 282, internal to data handling unit 205, senses the occurrence of something abnormal. Input R-7 is a control signal coupled from the A-4 output of the alarm circuitry internal to timing sequence controller 211; this signal indicates an alarm tone is received and serves to shut off the transmission side of fan-out transceiver 203 so that, if there is routine data collection at that moment, it will be interrupted. A signal on input R-7 also sets flip-flop 227, thereby enabling data receiver 220 to receive the anticipated address code for the repeaters that relayed the alarm while the central station is inactive. The remaining inputs, R-3 and R-4, to transceiver 203 are from the master oscillator output 0-1 and clock pulse output 0-2 in the oscillator portion of timing sequence controller 211 and serve to operate the receivers in the manner previously described in connection with the tone receivers.
The decoding logic
FIG. 13 is a detailed block diagram of the decoding logic within block 204 of FIG. 11. Specifically, decoding logic 204 comprises a plurality of OR gates 241-252 connected as illustrated to the outputs of the receivers in transceiver 203. The outputs of OR gates 241-252 are connected as illustrated to the inputs of flip-flops 255-260. The outputs of flip-flops 255-260 form a six-bit code word D2-D7, which forms one part of the output of decoder 204. The outputs of OR circuits 241-252 are also connected as illustrated to the inputs of comparators 262-267. The outputs of comparators 262-267 are combined as illustrated by way of OR gates 268-271 to form the input to flip-flop 272. The output of flip-flop 272 comprises the D1 output of decoding logic 204.
Essentially, decoding logic 204 comprises two sections. The first, formed by OR gates 241-252 and flip-flops 255-260, performs the decoding function for converting the received signal to a six-bit code for use in the central station. Comparators 262-267 and the OR gates associated therewith form the missing data detector portion of decoding logic 204.
As previously discussed, the received signal comprises three tones, each one being a selected one of four tones for a total of twelve possible tones. The tones are detected by three groups of four receivers in transceiver 203, and these groups are arranged as illustrated. Considering the central portion of decoder 204, the output of the first receiver is connected to OR gates 245 and 247. The output of the second receiver in the group is coupled to OR gates 245 and 248. The output of the third receiver in the group is coupled to OR gates 246 and 247, and the output of the fourth receiver in the group is coupled to OR gates 246 and 248. The outputs of OR gates 245 and 247 form the set inputs to flip-flops 257 and 258, respectively. The outputs of OR gates 246 and 248 form the reset inputs to flip-flops 257 and 258, respectively.
The adopted data format assigns two bits of information to each data tone; thus, it may be received at any one of the four receivers in a group corresponding to the four possible discrete frequencies assigned to that tone. When the presence of the data tone at a particular receiver in the group is established, the output of that receiver goes to logic 1. A properly received signal will produce one and only one logic 1 among a group of four receivers. According to the arrangement shown in FIG. 13, this causes the outputs of two of the OR gates to go to logic 1 and assures that one of the logic 1 appears at one of the two left-hand OR gates, and that the other logic 1 appears at one of the two right-hand OR gates in the group.
Assuming, for example, that the second tone is detected in the first receiver of the second group, then the outputs of OR gates 245 and 247 will be a logic 1 while the outputs of OR gates 246 and 248 are a logic 0. Thus, flip-flops 257 and 258 are placed in the set position and a logic 1 appears at outputs D4 and D5. Similarly, as can be seen by inspection, a tone received by the remaining receivers in the second group would similarly define a unique code signal at outputs D4 and D5. The receivers and OR gates for the first and third groups function similarly to provide a unique output signal at outputs D2, D3, D6 and D7, uniquely defining in a six-bit word the particular three out of twelve combination of received tones from the lower portions of the communication system.
Continuing with the second tone group, the missing data detector functions as follows. Binary comparators 264 and 265 produce a logic 1 output only when the inputs thereof are the same. Thus, if no data is received, a logic 0 is presented to the inputs of comparators 264 and 265. This logic 1 output produced under these conditions is coupled by way of OR gates 269 and 271 to the input of flip-flop 272 which goes into the set state and produces a logic 1 at the output, D1. By virtue of the interconnections between the receivers in the second group in transceiver 203 and OR gates 245-248, any received signal will be coupled to one side of comparators 264 and 265, thereby producing a logic 0 at the outputs thereof.
The missing data detector portions of decoder 204 also provide an erroneous data reception indication in that the reception of two tones within a single group will cause both inputs to one of binary comparators 264 and 265 to be a logic 1. When both inputs are the same logic level, that binary comparator will produce a logic 1 output signal which is coupled to flip-flop 272, thereby again causing a logic 1 to appear at output D1 to indicate the error. As more fully explained below, the lack of data or an erroneous data reading will cause the central station to request a second reading through the preselected path to a particular pole repeater. The missing data indication at output D1 is coupled to the F-6 input of data handling unit 205, while outputs D2-D7 are coupled by multiple conductor cable to the S-10 input of data handling unit 205 where, as more fully described below, the data is stored temporarily and ultimately transferred to the data processor by way of teletypewriter buffer 206.
The data handling unit
FIG. 14 illustrates in block form the major sections and functions of data handling unit 205. Data handling unit 205 comprises a switching device 281 and a monitoring device 282. Connected to switching device 281 are majority logic circuits 283-285, each having six bit positions corresponding to ouputs D2-D7 in parallel from the decoding logic. This six bit word corresponds to the address code of a repeater. The repeated address codes appearing at the decoding logic output are sequentially transferred to appropriate majority logic positions through the input section of six pole majority logic stepping switch 297. After the repeated address codes are fed to a majority logic circuit, the output at any bit position corresponds to the majority of the logic levels of the repeated inputs to that bit position. The construction and operation of majority logic circuits is well known in the art and will not be further detailed here. The outputs of the three majority logic circuits are transferred to corresponding control memories through the synchronous stepping of the six pole output section of majority logic stepping switch 304 and the six pole input section of control memory stepping switch 305.
Connected to the other side of switching device 281 are a plurality of control memories 286-291 which receive or deliver information from or to the data processing computer by way of teletypewriter buffer 206. In addition, as more fully described below, three of the control memories, 288-290, are interconnected with majority logic circuits 283-285 by way of switching device 281 and store the corrected repeater identification codes for three levels of repeaters for transmittal to the data processing computer.
Monitoring device 282 comprises four counters and logic circuitry for controlling the timing and operating of the central station, including the selection of sub-tasks to be performed and the detection of failures when the system is not performing properly. As previously noted, these sub-tasks are arranged in predetermined groups to provide the various responses for the different input conditions that may be encountered. The first sub-task is loading the instruction given by the data processing computer through the teletypewriter buffer to the controlling memory of the data handling unit. The format of the instruction may, for example, comprise eight 7-bit ASCII code words.
The second sub-task is the reading of the data stored in the six control memories to be reported back to the data processing computer through the teletypewriter buffer. This sub-task is triggered by a holding pulse generated by the monitoring device in response to changes of logic levels in control memory 291.
The third sub-task is to establish a two-way communication path between the central station and a group of time multiplexed terminal stations. The particular group and the actual communication path selected under this task is predetermined by the information stored in controlling memories 288-290. The data transfer path for this task is from the buffer memories at the output of the decoding logic to majority logic circuits 283-285.
The fourth sub-task is to change over from one pole repeater to the next, while the alerted substation and intermediate repeaters remain unchanged, after the completion of data collection from all terminal stations reached through the original pole repeater. The data collected from all the terminal stations on a single pole repeater that form a time-multiplexed transmission group is referred to herein as a complete line of data. The initiation of this sub-task is controlled by instructions given by the computer. In particular, if the second bit of a control memory is set to a logic 1, upon reception of a complete line of data, the change of pole repeater is initiated until the number of pole repeaters reached by this procedure is equal to the number specified by the second to seventh bit in control memory 287.
The fifth sub-task is data collection. This sub-task follows either the third or the fourth sub-task immediately. The data transfer route for this sub-task is from the receiver-buffer memory to the data transformation unit and from the data transformation unit to the teletypewriter buffer. Thus, all the data as transmitted by the terminal station is transferred directly to the data processing computer through its teletypewriter terminal. After all of the lines of time multiplexed groups specified by an instruction have been collected, a line counter within monitoring device 282 produces an output pulse, which serves to terminate the operation of the central station and trigger the second sub-task, wherein the data stored in controlling memories that specifies the transmission path, scope, duration and monitoring of the data collection will be read back to the data processing computer.
The duration of this sub-task is specified by the contents stored in memories 286 and 287. The second to seventh bit in control memory 286 specifies the duration of the data collection at each pole repeater while the second to seventh bits in control memory 287 specifies the number of pole repeaters selected in a given data collection.
The sixth sub-task is the response to an alarm originated from the terminal station by the central station. This response includes the termination of on-going data collection, if any, the collection of repeater identification codes which describe the specific route over which the alarm tone has been relayed to the central station, and transferring the identification data to the control memories. The data transfer path within the central station is similar to the second sub-task; from the buffer memories at the output of the decoding logic to majority logic circuits 283-285.
The various sub-tasks are carried out by way of initiation pulses in association with the actuation of switching device 281, illustrated in detailed form in FIG. 15. All of the data flowing through the central station, either from or to the central data processing computer, passes through switching device 281, which controls the flow of data through various possible paths, depending upon the sub-task being carried out. The changes in connections between the various components and data sources at various times is illustrated schematically in FIG. 15 as a plurality of stepping switches. It is understood by those in the art that while illustrated as a plurality of stepping switches, the various changes in interconnections can be easily implemented utilizing integrated circuit technology as a plurality of logic gates. The illustration of FIG. 15 as a plurality of stepping switches is merely to simplify the description of the functioning of switching device 281.
Input S-10 to switching device 281 comprises seven wires from the data buffer formed by flip-flops 255-260 and 272 in FIG. 13, the information outputs as outputs D-2 to D-7. In addition, as a first bit of information, is the output of the missing data detector D-1. The outputs from the buffers are transferred through a seven bit data transfer gate to seven-pole, double-throw switch 296. The last six bit outputs of the first position of switch 296 is connected to the input section of six pole majority logic stepping switch 297. Comparing FIG. 15 with FIG. 14, it can be seen that the inputs to the majority logic circuits, 283-285, are sequentially selected by six pole input switch 297 so that the data received from the repeaters without the first bit for missing data indication is sequentially transferred into the proper majority logic a number of times corresponding to the number of code repetitions. And later after the inconsistencies between repeated bits have been corrected according to majority voting, their outputs are sequentially transferred to proper control memories in the data handling unit through the six-pole output section of stepping switch 304 in conjunction with six-pole input stepping switch 305 in switching device 281.
The second position output of seven pole switch 296 is connected to terminal 298, which is the seven wire input to code transformation unit 299. Code transformation unit 299 serves to transform the received data code in certain circumstances.
During data collection, at any time interval, if any data is missing or some error in transmission has caused decoding difficulties, these conditions are sensed by missing data detector, and a logic 1 will be written into first bit of buffer memory D-1. In such an instance, some of the other flip-flops in the remaining six bits of data buffer memory D2-D7 will be set randomly at least for some of the bits or even for all the bits causing decoding difficulty. The data format at the buffer memory, for current data is that the first bit is always logic 0 followed by six random bits, which for missing or erroneous data the first bit is always logic 1, also followed by six random bits. This distinction is sufficient for the computer to interpret the correct or incorrect data normally. At the central station all operational and monitoring codes used are seven bit words with the first bit always assigned logic 1. Therefore, it is possible for missing or erroneous data to coincide with these operating or monitoring codes. To avoid the possibility of confusion to the computer or the triggering of the wrong operation at the central station, the same code cannot have two different meanings. To accomplish this, the data transformation unit is used to convert all missing or erroneous data to a standard seven bit word: 1000000. Since no useful information is carried by missing or erroneous data, this transformation causes no loss of useful information and a unique code is produced.
Six-pole, two position switch 303 interconnects the six-pole output section of the majority logic stepping switch 304 in its first position. This code transformation assumes the computer will always know when one word of data is missing. The transformed code is fed into teletypewriter buffer 206 for communication with the computer by way of the first position on seven pole two position switch 301 in switching device 281. The common position of switch 301 is connected by seven bit parallel data transformer data 302 to seven bit teletypewriter data buffer 206. As illustrated in FIG. 14, a plurality of control memories are interconnected with switching device 281 so that data from switch 303 is sequentially read into control memories 286-291. Output section 307 of the six-pole control memory stepping switch is connected to the second position of the last six bit poles of seven-pole, two position switch 301. The first bit pole at the second position is permanently connected to a logic 1 output. The common terminal of the seven pole switch is connected to seven bit, parallel data transfer gate 302. Thus, the transfer of information sequentially from the control memories to the last six bits of teletypewriter buffer 206 is by way of switches 307 and 301 and gate 302, while the first bit of the buffer always receives a logic 1 in this position from switch 301 and gate 302. In this way, the data stored in the central station control memories always have a logic 1 as the first bit when the data therein is read out into the data processing computer in association with a specific set of collected data. Thus, the monitoring information can be examined and the two-way communication path can be verified by the computer whenever it is necessary. A single pole, single throw switch 309 is mechanically coupled to the control memory stepping switch so that it closes when the stepping switch reaches its sixth position. The two terminals of the switch are connected to terminals S-13 and S-14. Thus S-13 and S-14 will be shorted together only when the control stepping switch reaches its sixth position. During the operation of the communication system, the first two memories 286 and 287, are for data format and timing control, as discussed below; the next three memories, 288-290, define the actual two-way communication path; and the last memory 291, monitors the condition of the communication system, for example, malfunctions and alarms.
Thus, when operation of the communication system is initiated, control codes from the data processing computer are read into the teletypewriter buffer and coupled sequentially into the control memories by way of stepping switch 306. As previously noted, these memories control the timing and define the actual two-way path through the data communication system. As can be seen by inspection of FIGS. 15 and 11, the outputs of these memories serve to control the tone codes generated by generators 207-209, the outputs of which are coupled through fan-out transceiver 203 to frequency dividing network 202 and line coupler 201 for alerting three levels of repeaters. The communication system of the present invention then functions as previously described to cause the initiation of data readout from the terminal stations coupled to a particular pole repeater.
At the beginning of the period, the data received is used for verification of the communication path established, and is coupled by way of the data buffer flip-flops through switches 295 and 296 to the majority logic stepping switches, 297 and 304. If the outputs of the majority logic circuits coincide with the address defined in the controlling memories, then switch 296 is actuated to connect the data buffer with the input of code transformation unit 299 beginning the collection of terminal station data. The output of the code transformation unit is coupled by way of switches 301 and 302 to teletypewriter buffer 206 which then transfers the information to the central data processing computer. After each line of data is received, a new path is defined through the communication system to obtain data from different groups of terminal stations.
During an alarm, the operation of the central station is interrupted and a priority is afforded the alarm signal. The identification codes following the alarm tone are coupled through the majority circuits by switches 295-297 and fed into control memories 287-289 by switches 303-306 (sub-task 6). The control memories are read out to the data processing computer by way of teletypewriter 206 (sub-task 2). The central station then initiates data collection from the pole repeater sending the alarm signal (sub-task 3 and 5). Finally, sub-task 2 is again performed to report the alarm data to the computer thereby completing the alarm response.
The operation of switching device 281 may thus be summarized in terms of the flow of information as follows. Information may take one of the following paths through switching device 281: (a) receiver buffer to code transformation unit to teletypewriter buffer; (b) receiver buffer to majority logic; (c) various majority logic to control memories; (d) control memories to teletypewriter buffer; (e) teletypewriter buffer to controlling memories.
The responses by the central station are made up by various combinations of the sub-tasks enumerated above. In summary, these responses are formulated as follows. When the central station is collecting data from a single group of terminal stations reached through a single pole repeater, the task is accomplished as the following sequence of sub-tasks; 1-3-5-2. The central station collects data from groups of terminal stations through N different pole repeaters as follows: 1-3-5-(4-5), wherein the two sub-tasks in parentheses are repeated N-7 times. An alarm can occur at various stages of the operation of the communication system, requiring slightly different combinations of sub-tasks. If an alarm occurs when the system is inactive, the response is as follows: 6-3-2. If the alarm occurs when the system is collecting data, the response is formulated as follows: 6/2-3-2, wherein the sixth sub-task interrupts the data collection and causes a reading of the constants stored in the control memories to determine the identity of the repeater relaying the data in aborted condition. If an alarm occurs when the system is receiving instructions from the data processing computer, the response is the same as above except that the sixth sub-task is interrupted until the information is completely loaded in the central station, then the data collection is aborted and the second sub-task carried out to read the identify of the repeaters involved in the intended path for the unexecuted data collection to the data processing computer. Thus, the response may also be written as 6/2-3-2.
The response of the central station to these various conditions may be more clearly understood by considering FIGS. 16 and 17 in which data handling unit 205 and timing sequence controller 211 are illustrated in detailed form.
Referring to FIG. 16, made up of FIGS. 16a and 16b (on separate sheets of the drawing) which directly connect to each other, the data handling unit may be divided into three main sections. One comprises six control memories, also illustrated in FIG. 14, bearing reference numerals 286-291. The second portion comprises the majority logic circuits including registers 283-285. The third portion comprises what may be considered monitoring devices, comprising logic circuitry and four counters, 331-334. Interconnecting the third, fourth, and fifth control memory with the majority logic circuits are comparators 322-324, respectively. Five-bit comparator 321 compares the last five bits (third through seventh) of data from first control memory 286 with the data stored in data counter 332. Comparator 325 compares the data stored in control memory 291 with the data stored in register 329. Register 329 comprises all zeros so that comparator 325 serves as a monitoring device, such that certain events within the central station cause one of the digits of register 291 to go from a logic 0 to a logic 1. In order to simplify FIG. 16, switching device 281 has been omitted; however, the interconnections are illustrated by references to the switch positions illustrated in FIG. 15.
In addition to switching device 281, data transfer gates are utilized to interconnect the memories with selected ones of the counters in the monitoring portion of the data handling unit. Specifically, data transfer gate 335 interconnects the data output from the first five bits of control memory 286 with step counter 331. Transfer gate 336 interconnects control memory 287 with line counter 333. A strobe pulse for causing the transfer of the data by gate 336 is provided on input M-11, which is connected, along with input F-9 and 0-4, to output T-3 of timing sequence controller 211 for the initiation pulse of the third sub-task. The strobe pulse for transfer gate 335 is through OR gate 335a, one of the inputs to which are connected to terminals M-11, which is connected with F-9 to receive the initiation pulse for the third sub-task from T-3. The other input of OR gate 335a is connected to F-3 from the carry output of counter 331.
Counter 334 provides a portion of the timing control within data handling unit 205 in a manner similar to that of the repeaters. Specifically, the time when counter 334 is active defines a time period for repeater identification. Taps are utilized on counter 334 to block the alert tone to the pole repeaters for two time intervals after the initiation of the fourth sub-task and to control the timing of the generation of strobe pulses for actuating comparators 323 and 324. The first tap is located at the second count of counter 334 and is connected to terminal F13. Clock pulses provided on input F-8 are coupled to one of two outputs in gate 338 under the control of flip-flop 337. In the reset state, gate 338 couples the clock signals to the input of counter 334. At appropriate time intervals, determined by the position of the taps on counter 334, AND gates 341 and 342 are enabled, thereby providing strobe pulses to comparators 323 and 324, respectively for comparing data between majority logics 284 and 283, and corresponding memories 289 and 290. In the set state, gate 338 couples clock signals to the input of counter 331. Each clock pulse reduces the contents of counter 331 by one so that the time between the application of clock pulse signals to the input of counter 331 and a carry pulse appearing at the output thereof, when the content is reduced to zero, is determined by the information stored in counter 331 from control memory 286. Upon the production of a carry pulse, flip-flop 337 is reset, thereby coupling clock pulse signals to counter 334. AND circuit 339 senses the carry pulse from counter 331 and, assuming the first bit in control memory 286 is also a logic 1, produces an output pulse which initiates the fourth sub-task. Thus, the logic 1 in the second bit of memory 286 is used to indicate data will be collected from more than one pole repeater, but via the same substation repeater. This output pulse appears at output F-5 for increasing the content of memory 288 by one which modifies the pair of address tones generated by generator 209 for alerting a new pole repeater. As indicated in FIG. 11, the output pulse at F-5 is coupled to input X-4 of switch controller 210 to initiate the fourth sub-task, i.e., the change over to a new pole repeater for the collection of the next line of data.
The carry output of counter 331 is also coupled to the reset input of flip-flop 340 and OR gate 335a. The set input of flip-flop 340 is connected to input F-9, which received the initiation pulse for the third sub-task from T-3. Only during the set period of flip-flop 340 can AND gate 341 and 342 be activated by a pulse on the tap of counter 334. As illustrated in FIG. 16, by way of example, a logic 1 level at the sixth and ninth bit positions in counter 334 coincident with the set output from flip-flop 340 actuates AND gate 342 and 341, respectively. The output pulses from AND gates 341 and 342 actuate comparators 323 and 324, respectively, as previously described. The reset input of flip-flop 340 is the carry pulse from step counter 331. Since that pulse also initiates the fourth sub-task, after the reset of flip-flop 340, AND gates 341 and 342 cannot be activated. Thus, there is no comparison of substation and intermediate repeater addresses during the fourth sub-task. Input M-9, which is also coupled to output F-7 for the carry pulse of counter 334 actuates comparator 321 to sense whether a line of data is missing, and actuates AND gate 345 by way of delay means 343 and a single shot multivibrator 344, the output of which occurs at the twelfth interval after the initiation pulse for the third sub-task. The output of AND gate 345 is coupled to the strobe input of comparator 322. Thus, the output from AND gate 345 causes the comparison between the information stored in majority logic 285 and control memory 288. The outputs of comparators 321-324 and carry output of line counter 333 are combined in OR gate 326 which has the output thereof connected as one input to OR gates 327 and 328. The other input to OR gate 328 is coupled to the reset alarm pulse. The output of OR gate 328 is connected to one bit position in control memory 291. In addition, other inputs to control memory 291 are obtained from comparators 321-324 and OR circuit 346. The inputs to OR circuit 346 comprise the alarm and reset alarm inputs, M-15 and M-16, respectively, from outputs A-2 and A-3 of timing sequence controller 211. The output of OR circuit 346 provides the other input to OR circuit 327. The output of OR circuit 327 comprises the strobe input to comparator 325. The output from OR circuit 328 is coupled to one bit of control memory 291 and to the M-7 output of data handling unit 205. When comparator 325 is strobed, and the contents of memory 291 is different from the all zero contents of register 325, a holding pulse is produced at the output of comparator 325, which is coupled to output terminal M-8. OR gate 328 is coupled to the second bit of memory 291 (the first bit in all the memories is not illustrated). The output of OR gate 346 is coupled to the third bit of memory 291. Thus, an alarm changes only the third bit to a logic 1 while the reset alarm changes both the second and third bits to logic 1 in memory 291. At end normal data collection, a carry pulse is produced by causing OR gate 326 to change the second bit of memory 291 to a logic 1. During routine data collection, every bit of missing data produce a pulse to advance counter 332. If every bit of data in a line is missing, then the content of counter 322 will agree with the last five bits of control memory 281. comparator 321 will produce a output pulse when strobed. This pulse changes the fourth bit of memory 291 to logic 1 and causes the second bit of memory 291 to go to a logic 1 by way of OR gates 326 and 328, respectively. When the pole repeater address stored is majority logic 285 does not agree with memory 288, comparator 322 will produce a pulse when strobed. This pulse causes the fifth bit of memory 291 to change to a logic 1 and, by way of OR gate 326, changes the second bit of memory 291 to a logic 1. When the substation repeater address stored in majority logic 284 does not agree with memory 289, comparator 323 produces a pulse when strobed. This pulse changes the sixth bit of memory 291 to logic 1 and, by way of OR gate 326, changes the second bit of memory 291 to logic 1. When the intermediate repeater address stored in majority logic 283 does not agree with memory 290, comparator 324 produces a pulse when strobed. This pulse changed the seventh bit of memory 291 to a logic 1 and, by way of OR gate 326 changes the second bit of memory 291 to a logic 1. Because a logic 1 is always written in the first bit of all codes stored in the control memories during transfer to the teletypewriter buffer for relaying to the computer, the computer will read the following monitoring codes to indicate various conditions of the data collected from the central station.
______________________________________ 1100000 Normal ending of data collection 1100001 Wrong address in intermediate repeater 1100010 Wrong address in substation repeater 1100100 Wrong address in pole repeater 1100011 Wrong address in intermediate and substation repeater 1100101 Wrong address in intermediate and pole repeater 1100110 Wrong address in substation and pole repeater 1100111 Wrong address in intermediate, substation and pole repeater 1101000 Missing a complete line of data 1010000 Data collection interrupted by an alarm 1110000 Alarm addresses and alarm data. ______________________________________
Switch controller 210 receives the triggering pulses for various sub-tasks. Its major function is to generate all the necessary control pulses according to the sub-task performed such that the two multi-pole stepping switches 297; 304 and 306; 307 and the three multipole, two position switches 296, 301 and 303 in switching device 281 are always set in the right position at the right time. Switch controller 210 also provides the appropriate strobe pulses for the three sets of multi-bit, parallel data transfer gates 295, 302 and 305 at the proper moment. Thus, the sequential data transfers, as previously described, are currently executed. The switch controller receives clock pulses for carrying out the prescribed junctions from the teletypewriter during the first sub-task, and removes clock pulses from the central station during the second, third, fourth, fifth and sixth sub-tasks.
The switch controller also performs an auxiliary function in controlling the first circuit in time sequence controller 211 by providing the set and reset pulses for flip-flop 365, which controls the multi-pole, two position switch in that circuit and the strobe pulses for comparator 360.
FIG. 18 illustrates switch controller 210 with legends identifying the signal on various lines throughout the central station. The terminals of switch controller 210 are as follows: X-1, X-3, X-4, and X-6 are inputs for the triggering pulse of the first, second, third, fourth and sixth sub-task, respectively. X-5 and X-10 are inputs for clock pulses from the central station and the teletypewriter buffer, respectively. X-7, X-8 and X-9 are output terminals for strobe pulses for the three set of parallel data transfer gates 295, 302, and 305, respectively. X-13 is the output for the strobe pulse to comparator 360. X-11 and X-12 are the outputs for the reset and onset pulses, respectively, to flip-flop 365 which controls multi-pole, two position sub-task switches 363 and 364 in the first circuit of timing sequence controller 211.
The timing circuitry
In FIG. 17, timing sequence controller 211 comprises two circuits. The first contains binary comparator 360 which compares information received from teletypewriter buffer 206 with the information stored in read only memory 361 or 362 by way of seven-pole, double-throw switches 363 and 364. The output of binary comparator 360 is coupled to either the T-2 or T-3 outputs by way of seven-pole, double-throw switch 364. The positions of switches 363 and 364 are controlled together by way of a suitable mechanical actuator under the control of flip-flop 365. The T-4 and T-5 inputs to flip-flop 364 comprise the set and reset inputs, respectively. As illustrated in FIG. 17, it is taken that an input signal on the set input will cause switches 363 and 364 to assume the positions illustrated, while an input on the reset side of flip-flop 365 will cause the switches to change to the other position.
Timing sequence controller 211 also comprises the master oscillator 365', the output of which is directly coupled to output 0-1 and controlled switch 366 with its output connected to divider 367, the clock pulses at the output of which is connected to output 0-2. The set output of flip-flop 368 closes control switch 366 and has the set input thereof connected to OR gate 369, the inputs to which form the 0-3 and 0-4 inputs to timing sequence controller 211. Input 0-5 is connected to the reset of flip-flop 368.
Output 0-2 is connected as one of the inputs to the A-5 input of timing sequence controller 211. Delay device 373 receives the signal to be delayed from the A-1 input by way of single-pole, double-throw switch 379 under the control of flip-flop 371 only in its reset position. Thus, only the first alarm pulse received from input A-1 is delayed by an appropriate time interval, e.g., 11 seconds, which is longer than the expected time when the pole repeater is alerted during the alarm and will return a second alarm signal concomitantly with the alarm data read out of the terminal stations associated therewith. However, the delay time is shorter than the time for the terminal station to send a repeated alarm. After the delay, one-shot 374 produces an output pulse which is coupled by way of OR gate 372 to the reset input of flip-flop 371, thereby readying the flip-flop for another alarm tone. Otherwise, during the eleven second waiting period inserted by delay 373, if a second alarm tone is received in conjunction with the alarm data since, flip-flop 371 is in set position, single-pole, double throw switch 379 will direct the alarm pulse to OR gate 372, to reset the flip-flop, thereby readying it for the next alarm. The direct and inverted outputs of flip-flop 371 are coupled separately to single-shot multivibrators 375 and 376 through two differentiators (not shown). One-shot 375 generates a pulse during the set transition of flip-flop 371 and one-shot 376 generates a pulse during the reset transition of the same flip-flop. The output pulse of one-shots 375 and 376 are connected to output terminals A-4 and A-2, respectively. Input A-7 is coupled to one-shot multivibrator 377 through delay device 380, which delays the output by one pulse interval. One-shot 377 is triggered when an external switch between terminals A-6 and A-7 is closed, during the set condition of flip-flop 371. The external switch is closed only when the control memory stepping switch is at its sixth step. Thus when the central station is inactive, control memory stepping switches 306 and 307 are not at the sixth position, the one-shot 377 will generate a pulse during the set transition of flip-flop 371. Otherwise, if the first or second subtask is in progress at central station, and flip-flop 371 is set, one-shot 377 will wait until the first or second subtask in the control station is completed before generating its output pulse.
Considering in particular FIGS. 16 and 17, central station 11 operates as follows. When information from the data processing computer is fed into teletypewriter buffer 206, i.e., a code message is received from the computer, binary comparator 360 compares the information in teletypewriter buffer 206 with the information stored in read only memory 361. If the information coincides, comparator 360 produces an output pulse which is coupled to the T-2 output by way of switch 364 to initiate the loading procedure (first subtask). During this time the control memories are sequentially loaded by way of teletypewriter buffer 206 and switches 303 and 305. Strobe pulses from the X-9 output of the logic circuitry is provided to enable parallel data transfer gates 305 to pass the information to the control memories sequentially by way of multiple position switch 306. The output pulse on the T-2 output is connected to the F-9 and M-11 inputs of the data handling unit which sets flip-flop 340 and transfers the data from control memories 286 and 287 to step counter 331 and line counter 333 respectively, thus readying the system for data collection. Information stored in these two counters controls the total time duration for this data collection. The output pulse at the T-2 output of timing sequence controller 211 is coupled to the X-1 input of logic circuitry 210 which produces a signal on the X-12 output thereof. This output is connected to the T-5 input of timing sequence controller 211 which resets flip-flop 365, thereby coupling binary comparator 360 to read only memory 362. In addition, switch 364 is thrown to the other position, thereby connecting the output of comparator 360 to the T-3 output of timing sequence controller 211. After the control memories are loaded, the next information supplied to teletypewriter buffer 206 by the data processing computer is an initiation code for the third sub-task. This coincides with the data stored in read only memory 362, and binary comparator 360 produces an output pulse which is connected to the T-3 output of timing sequence controller 211 to start the sequence for establishing a communication path between the central station and a particular pole repeater. This output signal is coupled to the R-5 input of fan-out transceiver 203 wherein its sets flip-flop 227 by way of OR gate 226 and sets flip-flop 224, thereby activating both the transmitting and receiving portions of fanout transceiver 203. The signal is also coupled to the M-11 input of data handling unit 205, thereby transferring data to counters 331 and 333. Also, the signal is coupled to the 0-4 input of time sequence controller 211, thereby setting flip-flop 368 and opening gate 366. Thus, clock pulse signals are not applied throughout the system by way of output 0-2, thereby enabling the receivers and data handling unit 205 to operate.
This third sub-task is triggered by the matching of the last word (the initiation code) from the computer with the contents of read only memory 362. The third sub-task may also be triggered by an alarm condition, where a pulse derived from the alarm pulse provides the initiation of the third sub-task. This alternative initiation of the third sub-task will be more fully discussed in connection with sub-task 6.
After the third sub-task begins, the information received from a pole repeater comprises the address thereof repeated three times which is coupled through switches 295-297, sequentially to appropriate majority logic circuits. The corrected addresses at the outputs of the three majority logic circuits are coupled by switches 303-306 to the control memories. The identification of the path chosen is compared in comparators 322-324 with the intended address stored in control memories 288-290. If the addresses are not the same, one of comparators 322-324 will produce an output pulse which is coupled to control memory 291 storing a logic 1 as one of the digits thereof. This would actuate comparator 325 and cause the generation of a holding pulse on the M-8 output, thereby interrupting data reception and causing the initiation of the second sub-tasks by the data processing computer. Only if all of the addressed stored in the majority logic circuits are correct will the central station proceed with the fifth sub-task, routine data collection.
During the time intervals in which the different portions of the data from the various levels of repeaters are received, counter 334 controls the timing of the comparisons by the position of the taps thereon so that, at the time of reception of the different address portions, the addresses are checked by comparators 323 and 324 which are activated by strobe pulses from the second and third taps on counter 334. At the end of the interval determined by the capacity of counter 334, a carry pulse is connected to terminals F-7 and M-9, and coupled to delay unit 343, thence to single-shot 344. The length of the delay by delay unit 343 is sufficient to locate the output pulse of single shot 344 in the twelfth interval after counting begins in counter 334. The output of single shot 344 enables AND gate 345 for a single clock interval. The output of AND gate 345 comprises a strobe input to comparator 322 which compares the information stored in majority logic 285 and control memory 288.
The fourth sub-task is to change to a new pole repeater without changing either the substation or intermediate repeater. This sub-task is performed only when the following conditions are met:
1. After the collection of a complete line of data, a carry pulse is produced by counter 331.
2. A logic 1 is stored in the second bit position of control memory 286.
3. There is no carry pulse from counter 333.
Where the second condition is met, one input of AND gate 339 is high. Thus, under the first condition, the carry pulse appears at the output of AND gate 339 and coupled to terminals F-5 and M-18. The output from AND gate 339 is the fourth sub-task initiation pulse and is coupled to the count input of memory 288 advancing the count thereof. Thus, during the subsequent time interval a different pole repeater is addressed. During the fourth sub-task, two things are different from the third sub-task. First, because there is no change in intermediate repeater and substation repeater, no comparison between majority logic 284 or 283 with control memories 289 or 290, respectively, is required; therefore, the strobe pulse for comparators 323 and 324 should be blocked. This is achieved by resetting flip-flop 340 at the beginning of the fourth sub-task by the carry pulse of step counter 331. Second, during the transition from the pair of alert tones for the old pole repeater to the pair of alert tones for the new pole repeater, the transmission of the pole repeater alert-tones should be temporarily blocked during the transition period. This is achieved by a controlled switch in the output path of alerting tone generator 209, the switch is controlled by inverted output of the flip-flop connected thereto. The set signal for this flip-flop is the output of AND gate 339, and the reset signal is the output at first tap at counter 334 located at the second pulse after counting starts there. Thus, at the beginning of the fourth sub-task the alert tones for the pole repeater are blocked for two pulse intervals.
At the end of the third sub-task, before the seven-pole, two-position switch 296 switches to its second position for the fifth sub-task, the connection through the first position remains connected to majority logic 285. Thus at the beginning of fourth sub-task, only switch 296 need return to its first position to enable the address code received to be transferred to the proper majority logic circuit. Then the strobe pulse for comparator 322 is produced exactly the same way as in third sub-task. If no discrepancy occurs during this comparison, then the central station will proceed to the fifth sub-task automatically, as at the end of the third sub-task. Otherwise, a discrepancy in the comparison causes the generation of a holding pulse, causing the central station to proceed to the second sub-task and terminate the routine data collection.
After the completion of the third sub-task, the fifth sub-task begins automatically, in which data relayed from a particular pole repeater through a specific transmission path selected by the address tones corresponding to the codes stored in control memories 288-290 are coupled through the data buffer in decoding logic by way of switch 296, parallel data transfer gate 295, through code transformation unit 299, switch 301 and parallel data transfer gate 302 to teletypewriter buffer 206.
Actually, this routine data collection begins at the last interval determined by the capacity of gate counter 334; then a carry pulse is applied to the set input of flip-flop 337. This pulse actuates switch 338 to the set position, thereby coupling clock-pulse signals to the input of step counter 331, beginning the routine data collection. At the end of an interval determined by the capacity of step counter 331, during which a complete line of data should be received from the pole repeater, a carry pulse is produced that is coupled to the reset input of flip-flops 337 and 340 and to one input of AND gate 339, ending the fifth sub-task.
The process of changing the pole repeater address without recourse to the data processing unit may continue until all the pole repeaters, as determined by the capacity of line counter 333, have been reached without changing substation repeaters. The carry output of counter 333 is also coupled to the count input of line counter 333. Depending upon the capacity of counter 333, as determined by the contents stored from control memory 287, line counter 333 counts down and, upon crossing 0, produces a carry output signal which is coupled to OR gate, 326 and terminates the communication through the network as described before. Because the carry pulse violates the third condition noted above for the initiation of the fourth sub-task; at the end of the extended data collection, the fourth sub-task will not be performed again. At this point, the data processing computer is notified of the termination of the readings and may either stop the readings for a given time interval or initiate a new set of readings with a different address stored in control memories 288-290, thereby selecting a different path through the communication network to a particular pole repeater or group of pole repeaters.
It is understood that if the contents of the second control memory, control memory 281, comprised a logic 1 at the unit's position (at the seventh bit position), then line counter 333 would have a capacity of one and only a single pole repeater would be interrogated in that particular cycle from the data processing computer. At the end of the single line of data, data collection would be terminated until the data processing computer applied a new address to control memories 288-290. This data collection format is particularly useful in collecting alarm data or in re-reading an erroneous meter reading.
A routine data collection is terminated by the second sub-task in which the contents of the control memories are read back to the data processing computer. The second sub-task is initiated by a pulse at the M-7 terminal (FIG. 11). This pulse is produced by OR gate 328 (FIG. 16) in response to a pulse from OR gate 326, which, in turn, receives a pulse from line counter 333 at the end of the last line of data as counter 333 cycles through zero.
The output pulse from OR gate 326 goes to both of OR gates 327 and 328. The output from OR gate 328 is stored as a logic 1 in control memory 291. The output from OR gate 327 receives its input either from OR gate 326 or OR gate 346, which encompasses all the situations in which one or more bits in control memory 291 has been set to a logic 1, producing a strobe pulse for comparator 325, which produces a holding pulse at the output thereof since the contents of memory 291 no longer match the contents of read only memory 329. The holding pulse shuts off the clock signal by resetting flip-flop 368 (FIG. 17) and shuts off transceiver 203 by resetting flip-flops 224 and 227 (FIG. 12). The pulse applied to X-2 of switch control 210 causes switching device 281 to sequentially read out the control memories to the data processing computer through teletypewriter buffer 206.
The sixth sub-task is the response by the central station to an alarm originated from a terminal station. This sub-task, because the timing of the alarm is unpredictable, may occur in one of the following three situations: (a) when the central station is inactive; (b) when the first or second sub-task is in progress; (c) when the third, fourth, or fifth sub-task is in progress. The response to the alarm can be subdivided into two portions, the immediate actions and the delayed actions which may wait until the central station can properly terminate its current activity. The immediate reactions are the setting of alarm flip-flop 371 in the timing sequence controller (FIG. 17), turning on the data receiver, if it is not on, by way of flip-flop 227 (FIG. 12), and turning off the transmitter, if it is not turned off, by way of the reset input to flip-flop 224 (FIG. 12). The delayed reactions are the initiation of the second sub-tasks for properly terminating the current activity in the central station, e.g., when the first or second sub-task is in progress, the response is delayed until the data processing computer has completed the loading or reporting back task.
An alarm signal received by way of line coupler 201 and frequency dividing network 202 (FIG. 12) causes alarm receiver 221 to produce an output pulse on output R-1. This output is connected to the A-1 input of timing sequence controller 211 (FIG. 17). This pulse switches flip-flop 371 to the set position and is coupled by way of delay 373 to single-shot multivibrator 374 through switch 379 is in the reset position until flip-flop 371 responds to the incoming pulse and assumes the set position, whereupon switch 371 changes position and couples input A-1 to one input of OR circuit 372. This portion of timing sequence controller 211 functions as described previously to wait for a repeat of the alarm or for the particular pole repeater to respond to the alert tone to be transmitted by the central station.
Flip-flop 371 produces an output pulse which is coupled to the A-6 output and to the A-4 output, by way of single-shot multivibrator 375. The output from single-shot multivibrator 374 is applied to the reset input of flip-flop 224 (FIG. 12) by way or OR gate 225. The same input signal is coupled to the set input of flip-flop 227 by way of OR gate 226. The effect of this is to turn off the transmitting portion and turn on the receiving portion of fan-out transceiver 203. Thus, transceiver 203 is ready to receive the data following the alarm tone which identifies the communication path through the system. The alarm pulse at output A-4 is connected to input X-6 of switch control 210 to trigger the generation of control pulses for the sixth sub-task, since the repeater identification codes which follow an alarm tone are interleaved and repeated five times. In addition to switching the multi-pole, two-position switch, the majority logic stepping switch must stop at every pulse interval for five revolutions so that every received address code will be sequentially loaded into the proper majority logic. Then, through majority logic stepping switch and control memory stepping switch together, the correct address code at the output of majority logic is loaded into corresponding control memories. Thus, the central station is placed in a quiescent state even when it has had data collection interrupted by an alarm. Thus, after the incoming address codes are stored in the control memories, the remaining control memories properly set, the third sub-task is initiated to establish a two-way communication path, following the path originally taken by the alarm tone, for collecting alarm data. The procedure for alarm data collection is not different from routine data collection from a single pole repeater. The only difference is when the terminal station originating the alarm takes its turn to transmit its alarm data, it will also transmit an alarm tone concomitantly with the data.
The receipt of the alarm tone with the alarm data, when flip-flop 371 is set, the alarm pulse within the delay interval set by delay 373 (FIG. 17) is coupled from the A-1 input to OR gate 312 by switch 379 in the "set" position. The output of OR gate 372 is coupled to the reset input of flip-flop 371. The output of flip-flop 371 causes a pulse at the output of single-shot multivibrator 376, the output of which is connected to the A-2 output of timing sequence controller 211.
This output signal is coupled to the M-16 input of data handling unit 205 (FIG. 16) as the inputs to OR circuits 328 and 346. The output of OR circuit 346 is coupled by OR circuit 327 to the strobe input of comparator 325. The outputs of OR circuits 328 and 346 cause a logic 1 to be stored in the first and second bit positions of comparator 291. The timing of this comparison provides the data processing computer with the identification of the terminal station generating the alarm, and initiates the second sub-task, thereby terminating further data collection.
As previously noted, the logic in decoding logic 204 can sense either absence of data or certain type of erroneous data. If either of these conditions occur during data collection, flip-flop 272 (FIG. 13) goes into the set state, producing a logic 1 output at D-1. This pulse is coupled to the F-6 terminal of the data handling unit (FIG. 16). This pulse changes the count in the data counter 332 if all time slots for data transmission assigned to a pole repeater contain missing or erroneous data. The counts in counter 332 will be identical to the last fine bits of control memory 286. When comparator 321 is strobed it produces an output signal which is coupled to OR gate 326, triggering the second sub-task as previously described. The output from comparator 321 is also coupled to the second bit position of control memory 291 to provide a coded description of the malfunction. The data processing computer can then take the appropriate action.
Thus, the central station operates as a data interface for the data processing computer and comprises what may be considered a segmented data bus in which data is selectively circulated within the central station among storage units and comparators so that the central station can operate semiautonomously, or under the complete control of the data processing computer, depending upon whether a single line of data or a plurality of lines of data are to be collected. It will be apparent to those of skill in the art that the data collection can be made more autonomous by the addition of counters and logic circuitry to automatically select a new substation or intermediate repeater address in addition to the selection of different pole repeater addresses.
As previously noted, the power distribution system herein described is a simplified form of power distribution system as compared to systems in actual use. These actual systems comprise a number of closed loops, open loops, and permanent radials in various combinations. Also, the lines may be polyphase rather than single-phase as implicit in the foregoing description of the present invention. These complexities do not affect the operation of the present invention.
There is one variation between the power system upon which the foregoing description of the present invention is based and some actual power systems which, while not affecting the invention, per se, may cause slight confusion. Specifically, the term "central station" as used herein may not correspond to that term as used by some utilities. Specifically, the "central station" as used herein may not be the same as the central station referred to by some utilities in describing the power distribution grid. Stated another way, the central station described herein may be considered a "petit" central station in a larger network having a more comprehensive central station. In such case, the teletypewriter output is merely one terminal among many to a time sharing computer.
When the central data processing computer is connected to many petit central stations, one each through its teletypewriter terminals, then a teletypewriter terminal selection code is incorporated in the software of the computer. This can serve as a petit central station identification code due to the one to one correspondence of terminals and petit central stations and is easily accomplished by making the initiation code stored in read only memory 362 (FIG. 17) different for each petit central station. In this way, only the instruction loaded into the correct petit central station can be executed by matching the initiation code with the code stored in read only memory 362.
There is provided by the present invention a unique data communication system for an extremely hostile environment. The system, by utilizing both an address and time multiplex selection, provides an economical apparatus for collecting data from a large number of terminal stations. The individual portions of the system conserve power by having minimal apparatus on all the time, which also reduces the chances of self-generated interference. The system increases communication reliability, over and above that obtained from the loops built into the power distribution network, by including by-pass capability at the power distribution points of the network.
It will be apparent to those of skill in the art that various modifications can be made within the spirit and scope of the present invention. For example, while some error checking circuitry has been disclosed, additional error checking circuitry, known in the art, can be utilized at various levels of the present invention. Also, various main and standby power supplies can be utilized with the system of the present invention since the system may function despite a power interrupting fault by virtue of its circuit interrupter by-passing capability. Also, while the various repeaters have been described as at discrete physical locations, some or all the repeaters at one level may be merged and physically located with the repeaters at a higher level or, in the case of the intermediate repeaters, physically located in the central station. In this variation, the appropriate receiving and transmitting portions of the repeaters are eliminated.
1. A two-way communication system utilizing a power transmission network as the medium for transmitting intelligence comprising:
a central station;
a plurality of terminal stations;
a plurality of repeaters interconnecting said central station and said terminal stations in a multi-level, tree-like network; wherein
said repeaters are individually addressed and said terminal stations are polled by groups, each said group of terminal stations being coupled to a single repeater at the lowest level of repeaters
and said system utilizes tone code signaling in which one tone pattern has priority access to said central station.
2. The system as set forth in claim 1 wherein said network comprises a plurality of transmission lines operating at different voltage levels and interconnected by power transformers, wherein said repeaters comprise a pair of couplers for connecting the repeater to the primary and secondary of said power transformers, thereby by-passing the power transformer as a transmission medium.
3. The system as set forth in claim 2 wherein the terminal stations and the lowest level repeater operate on a tone frequency greater than approximately 15 kHz.
4. The system as set forth in claim 3 wherein the terminal stations are coupled to the lowest level repeater by a transmission path that includes the interwinding capacitance between the primary and secondary windings of a power distribution transformer, thereby isolating other loads that are fed by different distribution transformers from the path of the tone encoded signals between the terminal stations and lowest level repeater connected thereto.
5. The system as set forth in claim 1 wherein the lowest level repeaters operate on a tone frequency less than approximately 15 kHz and are coupled to the respective groups of terminal stations by the transformer action of the power distribution transformer located therewith.
6. The system as set forth in claim 1 wherein each repeater comprises:
tone receiving means, and
tone generating means coupled to said tone receiving means and actuated thereby;
said tone receiving means and tone generating means operating on different sets of frequencies, thereby isolating one level of repeaters from the next.
7. The two-way communication system as set forth in claim 1 wherein the central station comprises means for responding to a priority signal by establishing a communication path to the source of the priority signal.
8. The two-way communication system as set forth in claim 7 wherein said terminal stations include means for generating said priority signal.
9. The two-way communication system as set forth in claim 8 wherein said priority signal is an alarm signal indicating a malfunction.
10. The two-way communication system as set forth in claim 9 wherein the tone code of said priority signal indicates the nature of the malfunction.
11. The two-way communication system as set forth in claim 1 wherein said repeaters comprise two sections, the first section operating continuously, the second operating only during the presence of a signal addressed to the particular repeater by the central station or during a priority signal.
12. The system as set forth in claim 1 wherein at least one of the repeaters is merged with the apparatus at the next higher level in the system.
13. The system as set forth in claim 12 wherein the repeaters at two different levels are merged and physically located with each other.
3445814 May 1969 Spalti
3693155 September 1972 Crafton et al.
3702460 November 1972 Blose
3733586 May 1973 Lusk et al.
3900842 August 1975 Calabro et al.
3914757 October 1975 Finlay, Jr. et al.
3925763 December 1975 Waohwani et al.
Filed: Dec 5, 1974
Date of Patent: Aug 3, 1976
Assignee: General Electric Company (Schenectady, NY)
Inventor: Kouan Fong (Schenectady, NY)
Primary Examiner: Donald J. Yusko
Attorneys: Geoffrey H. Krauss, Joseph T. Cohen, Jerome C. Squillaro
Current U.S. Class: 340/151; 340/310A; 340/171R
International Classification: H04M 1104; H04Q 1100;
|
cc/2019-30/en_middle_0056.json.gz/line12494
|
__label__wiki
| 0.586642
| 0.586642
|
Home » Local News » Government mulling making ride-sharing drivers’ details available to users via a ‘meter-on’ application
Government mulling making ride-sharing drivers’ details available to users via a ‘meter-on’ application
In Local News, Public Transport / By Anthony Lim / 2 August 2017 3:40 pm / 3 comments
The Land Public Transport (Amendment) Act 2017, which will regulate ride-hailing services such as Uber and GrabCar, is expected to be gazetted in October, according to Land Public Transport Commission (SPAD) CEO Mohd Azharuddin Mat Sah.
The amendments will bring about a number of new regulations and requirements, including the need for ride-hailing drivers to be screened by authorities. Since June 16, SPAD says it has been checking drivers’ backgrounds to ensure they have a good record. Drivers are also set to undergo training as part of the compliance.
Another of the measures being considered to ensure user safety is the making of a driver’s ride-hailing background accessible to users via a ‘meter-on’ application, Bernama reports. This will allows passengers the ability to access a driver’s details as an additional security measure, Mohd Azharuddin said.
“For the time being, the meter-on application only provides cab driver data, and we will consider it in the future,” he said. He added that SPAD will ensure that ride-hailing services implement the use panic or emergency (SOS) buttons to ensure the safety of users. Last week, Grab announced this as part of new initiatives introduced to improve safety of both passengers and drivers.
He also said that ride-hailing service drivers stand to make better profits as a result of legalisation, adding that they will only need to send in their vehicle for a Puspakom check once a year compared to twice a year following three years of being registered with the Road Transport Department (JPJ).
Drivers are also set to be better protected – it was earlier reported that the amendments will also make it an offence for any person to assault, hinder or obstruct those involved in the business of ride-hailing services. Those committing such an offence will be liable to a fine of RM1,000, imprisonment not exceeding three months or both, upon conviction.
2015 Toyota Harrier 2.0 Elegance
Anthony Lim believes that nothing is better than a good smoke and a car with character, with good handling aspects being top of the prize heap. Having spent more than a decade and a half with an English tabloid daily never being able to grasp the meaning of brevity or being succinct, he wags his tail furiously at the idea of waffling - in greater detail - about cars and all their intrinsic peculiarities here.
Rinnegan on Aug 02, 2017 at 3:55 pm
Lulzz Road tax disc orso no stock.
john on Aug 02, 2017 at 5:42 pm
Whats its relevance with legalising rideshare?
Ben Yap on Aug 03, 2017 at 2:41 pm
ride sharing cars no need to have road tax is it?
can’t u see the relevance? open thy eyes bigger.
Previous Post: Toyota C-HR gets two-tone exterior colours in Japan
Next Post: VIDEO: 2018 Ford Mustang “Good Neighbour Mode”
|
cc/2019-30/en_middle_0056.json.gz/line12497
|
__label__wiki
| 0.507375
| 0.507375
|
Affiliate MarketingPublisher News and Strategies
Webgains Tackles Affiliate Marketing Skills Gap with New In-House Academy
“We either continually invest in our people; today, tomorrow and forever, or we will simply run out of steam.”
Mark Jones06 Jul 2017
Publisher News and Strategies
Affiliate marketing network Webgains is taking industry training into its own hands, launching the Webgains Academy for its staff and partners.
According to the group, the initiative stems from CEO Richard Dennys’ belief in staffing with “less hands, more brains”, and desire to attract and develop younger applicants currently in short supply as a result of digital marketing qualifications catering insufficiently for performance advertising.
Opening officially in September, the Webgains Academy is what the group call an “inclusive learning environment” which will aim to provide professional development at the point of need to its staff and partners, letting trainees learn through “real-world execution” rather than formal training sessions and classroom-based activities.
The network says the structure of this will be adaptable to the needs of each employee, with options for team-based collaborative learning which apply both theory and real-world execution and one-on-one sessions, with the ultimate aim of making sure staff remain “educated, challenged and engaged” at work.
Addressing the skills gap
According to Ami Spencer, Webgains’ international publisher director, the group is positioning the Academy “at the very heart of our culture and way of working”, recognising the need to invest in its own people and partner network.
“We intend for Webgains Academy to become a source of knowledge, inspiration and empowerment for our colleagues and partners, encouraging them to think differently about how they can monetise their content sites through affiliate tracking links,” said Spencer.
Speaking on the launch, Dennys himself is more direct about the long-term direct benefit to the network in the investment, citing TechCity UK research that estimates a 750,000 shortage of people with appropriate digital skills, which he adds, “will probably get worse with Brexit”.
“We either continually invest in our people; today, tomorrow and forever, or we will simply run out of steam. We try to make each day working at Webgains feel like an 'adventure' so that the lure of other offers and opportunities is resisted and the Academy is a central and critical part of that," Dennys told PerformanceIN.
While there’s no shortage of qualifications available for aspiring digital marketers, the absence of those specialising in performance marketing continues to remain a point of concern within the industry.
A recent study by affilinet found that as many as three-fifths of UK marketing graduates have “no memory” of learning about the affiliate sector or performance-based marketing practices, while 67% of those that did claimed that information related to affiliate practices was “outdated and unhelpful”.
Meanwhile, a study conducted in 2015 found affiliate marketing to top the list of skills that digital marketers most wanted to improve upon, among 40% of those surveyed.
According to Spencer, the Academy will seek to educate staff and publishers on the “phenomenally” fast-paced affiliate space, but adds that it will strive to expand students’ knowledge base beyond just affiliate to create “rounded digital marketers”.
Have something to say about this article? Comment above, share it with the author @markjpi or directly on Facebook, Twitter or our LinkedIn Group.
Twitter - @@markjpi
Mark Jones's Google Plus Profile
Mark Jones's LinkedIn Profile
Mark manages all aspects of editorial on PerformanceIN as the company's Head of Content, including reporting on the fast-paced world of digital marketing and curating the site’s network of expert industry contributions.
Going by the ethos that there is no 'jack-of-all-trades' in performance marketing, only experts within their field, Mark’s day-to-day aim is to provide an engaging platform for members to learn and question one another, helping to push the industry forward as a result.
Originally from Plymouth, Mark studied in Reading and London, eventually earning his Master's in Digital Journalism- before making his return to the West Country to join the PI team in Bristol.
Read more from Mark
Awin Invests £31 Million to Improve Affiliate Payment Speeds Worldwide
New Win-Big Affiliate Site Boom25 Aims to ‘Disrupt’ the Cashback Industry
Five Predictions for the Future of Affiliate Partnerships
TradeTracker Continues its Global Expansion with a New Office in Mexico
Personalisation “at Centre” of Affiliate Innovation Says Rakuten Marketing
If You're Not Using Influencer Marketing, You're in the Minority
|
cc/2019-30/en_middle_0056.json.gz/line12504
|
__label__wiki
| 0.855191
| 0.855191
|
Borderlands 2 VR is coming to PlayStation VR this December
October 10, 2018 — by Manish "Trigger-Happy" Rajesh — 0
This December, 2K and Gearbox Software are planning to make the Borderlands 2 experience as immersive as possible with Borderlands 2 VR.
WWE 2K19 preview – many changes coming your way
September 20, 2018 — by Manish "Trigger-Happy" Rajesh — 0
We recently had the opportunity to try out WWE 2K19 and honestly we weren’t expecting much. Like with most titles in the series, we expected a game almost identical to the previous one in the series with maybe slightly improved graphics and a new game mode maybe. WWE 2K19 left us pleasantly surprised. While there are still factors that could use some polishing, ultimately, what we can say is that 2K19 is definitely taking steps in the right direction. Here are our first impressions, for WWE 2K19.
Starting things off
Right off the bat, we noticed that the game’s UI has been changed. It’s very minimalistic now and looks clean. Some might have preferred the older UI, but we personally thought this was not bad. The superstars featured in each the menus have a water-paint like aesthetic to them, crumbling away (think Thanos snapping his fingers) when you switch to another menu. It looked pretty rad. Do people still use rad? Whatever, it was rad.
There wasn’t any noticeably large improvement in the graphics department in WWE 2K19 over WWE 2K18. The water-paint like aesthetic we spoke about in the UI seemed to have been there in the actual game itself as well. So superstars appeared slightly blurred. Basically, it wasn’t crisp. However, while some characters didn’t look too accurate, or appeared blurry, others looked fairly accurate and sharp. It wasn’t consistent at all times. However, these may be further optimized by the time the game actually comes out.
While improvements in graphics are nice, what we truly wanted to see was an improvement in the gameplay. And it looks like we actually have that in WWE 2K19. 2K have said that they’ve made controls more responsive and the matches more fluid. And we actually felt it (of-sorts). The feeling of just missing a counter by a few seconds was still there, but it didn’t feel like the button just didn’t respond when you pressed it, it felt like you missed. Basically, you can’t blame the game now if you suck. Transitions are also smoother, wrestlers react better to and interact better with the environment. Ropes actually feel like they exist, even though they behave hilariously at times.
They’ve reworked the Steel Cage and Hell in a Cell matches to better represent what the actual matches are like, and they’ve also completely changed movesets when you’re outside the ring in one of these matches, to provide more options for players to react with their environment, i.e., the cage itself, the stairs etc. It might take some getting used to though.
The biggest gameplay change comes in the form of what is called the “Payback system”. The Payback system consists of a bunch of “powers” of sorts which you can activate or use during a match. There’s two categories, one which you can use frequently, and one that’s limited. These Payback abilities are capable of turning the match in your favor, making it somewhat easier for someone who’s behind to try and make a comeback. The various payback abilities are tailored to champions, based on how they actually wrestle, however, players are free to choose whichever ones they want at the start of the match. You chose your paybacks when you’re deciding on which WWE Superstar to play as. Certain paybacks allow you to shrug off attacks and instantly recover for a counter attack, others will speed you up to put in a flurry of strikes. There’s some interesting ones, like a poison punch? of sorts but they do add more variety to matches. There’s also paybacks like the low-blow, which you have to be careful when using, because if the ref sees you, you get DQed.
The big head mode, which was a hidden feature in 2K18, is now easily accessible in 2K19 and can be turned on in the match settings for “te luls”.
Game modes – What’s new and what’s improved
2K have said that they’ve addressed the issues the MyCareer mode had, which they introduced in 2K18. While the concept was nice, it suffered from poor writing and the lack of any voice-overs. So cutting promos was basically your character moving his or her mouth with no sounds coming out. Now, they’ve apparently got 26 Superstars who’ve lent their voice to the game and there are supposedly over 1000 voice over lines in the game. They’ve also apparently put more effort into the script itself with an improved storyline with plot twists and everything. We unfortunately did not have the time to take a look at the new MyCareer, but we definitely will for the review.
2K19 is introducing a new game mode called 2K Towers, in an effort to offer more content for those who aren’t interesting in online or multiplayer. There will be 20 towers when the game releases, with additional ones releasing over time. The towers follow a storyline arc of sorts from the TV series and will reward you for completing them. There are two types of towers, Gauntlet and Step. With Gauntlet requiring you to finish the entire tower in one sitting and Step allowing you to save your progress after a match and continuing where you left off later on.
The WWE 2K games have pretty massive rosters, and the size only keeps increasing. This time around there are over 200 playable superstars, including legends and different iterations of superstars. The pre-order bonus this time includes two bonus Superstars and not one, in “Rowdy” Ronda Rousey and Rey Mysterio. There’s also a “Wooo” edition, which is limited to 30,000 units worldwide and comes with a piece of Rick Flairs’ iconic coat. Or jacket. Or Robe?
The Showcase mode, which we had last in 2K16 is also making a comeback. This time it will feature Daniel Bryan, who is arguably one of the most popular wrestlers in the world right now. The Showcase features clips of the Bryan himself talking about his journey, his start, his retirement and his comeback and features key matches of his career. This was a good addition in our opinion and something fans wanted to see more of.
MyUniverse mode has also seen some improvements, the number of active belt slots has been increased from four to six.
On a final note, they’ve also improved the custom creation and added more customisation options than ever. Including some silly and gimmicky ones for the ones who want to fool around.
WWE 2K19 preview verdict
There were more changes than we expected in WWE 2K19, and we were pleasantly surprised. Most of the changes are welcome ones. We’ll let you know our thoughts in the review once the game is out officially. WWE 2K19 releases on October 5, 2018.
WWE 2K18 Road to WrestleMania tournament finals in Mumbai
February 27, 2018 — by Skoar Harbinger — 0
WWE 2K18 Road to WrestleMania Tournament finals will be held in Mumbai and the winner and runner-up, both win a trip to the WrestleMania Live Event.
Gearbox’s MOBA Shooter Battleborn is now free to play
June 7, 2017 — by Manish "Trigger-Happy" Rajesh — 0
After the rumours back in September that Gearbox's MOBA shooter was going free to play, Battleborn is now free to play or playable as a "free trial".
ConsolePCReview
BioShock: The Collection Review
October 16, 2016 — by Sameer "Psycho Mantis" Mitha — 0
Just like The Last of Us, God of War 3 and the Halo collection and more, BioShock: The Collection is a remaster of the original trilogy for PS4 & Xbox One.
ConsolePreviewPS4
ENTER SUPLEX CITY: WWE 2K17 Preview
October 5, 2016 — by Manish "Trigger-Happy" Rajesh — 0
We were invited to a WWE 2K17 preview where we took a crack at the latest in the series. Come join us as we venture in Supplex City for the very first time.
WWE 2K17 remains true to the WWE format, is fairly easily to pick up and lets you have a good time throwing each other across the ring.
ConsoleNewsPC
EVOLVE is going f2p
July 8, 2016 — by Manish "Trigger-Happy" Rajesh — 0
After struggling as a premium title for over a year, Turtle Rock Studios have decided to make Evolve free-to-play in an effort to draw in more players
PCReview
Battleborn Review
May 28, 2016 — by Hardik "fluffyVader" Singh — 0
Born from the ashes of FPS and MOBA – Battleborn
The first thing you will notice about Battleborn is its cartoonish look, bright colours in its in-game menus to the gameplay, reminding you of Borderlands.
ConsoleFeaturePC
Top 5 Gaming Supercuts
May 3, 2016 — by Manish "Trigger-Happy" Rajesh — 1
Supercuts are edited together cohesively as a whole and the well edited ones are seamless. Here are our top 5 gaming cutscene supercuts.
|
cc/2019-30/en_middle_0056.json.gz/line12505
|
__label__wiki
| 0.78509
| 0.78509
|
Netflix Takes On Comcast. Here’s Why You Should Care.
By Sarah Morris
March 21, 20144:33 PM
Netflix CEO Reed Hastings
Photo by ROBYN BECK/AFP/Getty Images
This week, Netflix challenged efforts by some Internet service providers to limit how the streaming service connects to its users, joining the debate among major players about the challenges of interconnection and peering. In a statement, CEO Reed Hastings said so-called “peering”-type deals, such as the one it just struck with Comcast, indicate the need for stronger net neutrality protections. Casting Netflix as David, Hastings wrote: “If this kind of leverage is effective against Netflix, which is pretty large, imagine the plight of smaller services today and in the future.”
“Peering” and net neutrality may sound dull, but the future of your entertainment is at stake (and so are some rather more important things). Most people don’t think much about how content is delivered to their computer or TV screen via a device like Apple TV or a Roku box. Normally, you click a link or enter a Web address into your browser, and the requested content usually appears almost instantly. Sometimes you get a perpetual “spinning circle of doom” or the dreaded hourglass, indicating that you may experience delays in receiving the content you requested. Or occasionally you get an error page instead of reaching the webpage you were trying to visit. If you use Netflix, you’re probably familiar with the galling screen that says there’s a network problem.
Network neutrality protections were designed to address some of the reasons you might have trouble reaching a certain page. The FCC’s Open Internet Order, which was mostly overturned in January by the D.C. Circuit Court of Appeals, contained two rules for wired broadband providers: a “no-blocking” rule that prohibits Internet service providers from blocking content from their subscribers, and a prohibition against discriminating against certain content or types of content using other means. However, those rules did not cover things like peering and interconnection, terms you can learn more about here and here.
And that’s where the Netflix-Comcast deal comes in, and is why Netflix’s recent statement is so important. Netflix and Comcast announced last month that the two companies have come to a new—indeed, unprecedented—“peering”-type arrangement, with Netflix paying Comcast for the direct carriage of Netflix content to Comcast subscribers.
Because the world of peering arrangements is shrouded in a cloud of nondisclosure agreements, except for the occasional public debate when things go totally off the rails, it’s extremely difficult to assess the reasonableness of the rates charged for this agreement or for any others. And given the degree to which content providers rely on those tenuous agreements to get their shows and movies and other media to users, there is an inherent disincentive for them to cry foul when problems arise. But peering issues nonetheless have real implications for all of us as Internet users, and implications for content developers as well. Netflix’s statement highlights why these concerns are important not just for indie content developers, but for established ones as well.
The opaque world of peering arrangements means that it’s impossible for content creators to account for future peering fees, particularly now that companies have to negotiate directly with ISPs, rather than through a Content Distribution Network, such as Level 3. Large, game-changing media delivery systems like Netflix didn’t happen overnight, and the next big “Netflix” or Netflix-competitor might be just an idea at this point. The threat of additional, potentially huge expenses could deter the would-be next big thing from developing innovative tools or services.
These problems inevitably carry over to end-users as well. Netflix was the disruptive force that facilitated a world of “cord-cutting”—where users ditched their cable service for online streaming. But if new peering arrangements prevent companies from developing products to compete with Netflix, customers of Netflix might see their prices continue to rise or miss out on new, disruptive services entirely.
And these issues underscore precisely why we need strong leadership at the FCC and smart polices going forward. The need for net neutrality protections doesn’t merely exist at the very edges of the Internet in the relationship between users and their ISPs. As the Internet has evolved, the points at which problems occur have shifted into the world of peering and interconnection. The FCC needs the clearest authority possible to deal with the Internet as an ecosystem and address the various challenges that have arisen throughout the network.
Net Neutrality Netflix
|
cc/2019-30/en_middle_0056.json.gz/line12507
|
__label__cc
| 0.682618
| 0.317382
|
Lobo Marino Concert
Richmond Pump House
1799 Pump House Dr, Richmond, VA 23221
Sound Arts Richmond and the Friends of the Pump House are excited to host a Richmond Pump House concert featuring Lobo Marino on November 11, 2018. Tickets are $25 per person and limited to 20 seats total. Tickets include a tour of the Richmond Pump House and Pump House Parks. Building tours open at 1pm, the concert starts at 2pm. Due to ongoing construction all attendees are required to wear a hardhat, which will be provided.
Use the link below to reserve tickets
About Lobo Marino:
Laney Sullivan and Jameson Price make up the indie folk band Lobo Marino. The band has been touring nationally and internationally for over seven years. Their music carries the message of humanity’s need to find balance with nature. Mystically political and whole heartily grassroots this DIY band finds themselves playing on large festival stages as well as at the backyard fire pits of intentional communities across the country. In their home town of Richmond,Virginia, they founded a community space called “Earth Folk Collective” where they open the space for gatherings and donation based workshops on all types of topics of wellness and sustainability. They also are the founders of Fonticello Food Forest, a public orchard intended for community gleaning.
http://www.lobomarinomusic.com
Friends of the Pump House is a volunteer organization working to restore and reopen the Richmond Byrd Park Pump House in Richmond, VA. Proceeds of this concert will go into the restoration needs of Friends of the Pump House.
https://www.friendsofpumphouse.org
Lobo Marino
Sound Arts Richmond and the Friends of the Pump House are excited to host a Richmond Pump House concert featuring Lobo Marino on November 11, 2018. Tickets are $25 per person and limited to 20 seats total. Tickets include a tour of the Richmond Pump House and Pump House Parks. Building tours open at 1pm, … Continued
Friends of Pump House
|
cc/2019-30/en_middle_0056.json.gz/line12521
|
__label__wiki
| 0.955747
| 0.955747
|
01. Blue Motel
02. Halloween By The Sea
03. What's Your Secet (Cleo)
04. Life Under Water
05. The Amateurs
06. Your Sorrow
07. The House That Built Itself
08. Time Machine For Two
09. Single Life
10. Grownups
11. Vampire
BART & THE BEDAZZLED
Blue Motel
[engl] Do you like Love songs? After spending a lifetime spent avoiding this subject in song, Joel Sarakula finally admits that he does. On his new album „Love Club“ Sarakula relives the golden age of Soulful and Romantic Pop music and connects it with a modern aesthetic. While a deeper message of love and peace flows through the record, Joel Sarakula is no old fashioned hippie: “‚Love Club’ is about connecting to reality and re-framing the idea of romantic love and loss in the present, loveless age ”. Featuring eleven songs touching all genres from disco to blues, from soul to soft-rock, Joel Sarakula’s “Love Club” is a profound pop statement. Joel Sarakula has travelled the world in search of his muse, experiencing everything from being a victim of Caribbean carjackings to performing in the remote fishing villages of Norway, via the dive bars of Europe and the US. It was the hodge-podge musical tapestry of England’s capital that finally drew him to a settling point, in the wake of seemingly never ending run of shows. With personal tastes that span from the more avant-garde to soul and pop greats like Sly Stone, Todd Rundgren and Hall & Oates, there are clear nods to contemporaries like Unkown Mortal Orchestra, Erlend Oye and Toro Y Moi in terms of ambition and style. With his last two albums “The Golden Age” and “The Imposter” collecting strong radio plays at BBC Radio 2, BBC 6, BBC London, XFM Joel Sarakula has been play-listed nationally in Europe including Flux FM, WDR 5, Radioeins, Bayern 2, Deutschlandfunk and Deutschland Kultur Radio in Germany as well as in Benelux and Italy and Spain. He is a regular fixture on the live festival and club circuit in the UK, Europe and internationally including appearances at SXSW, Primavera Sound, Glastonbury, The Great Escape, Liverpool Sound City, Scala London, Tallinn Music Week, V-ROX (Vladivostok) and Reeperbahnfestival Hamburg. “Love Club” is Sarakula's bold and unashamedly emotional next step. In essence the album is a homage to the soulful singer & songwriter artistry of the Seventies filtered through a darker contemporary lens - fitting for these uncertain times. “I always shied away from generic love songs,” the Sydney, Australia born songwriter admits, “but on this record I embraced the subject wholeheartedly... and intellectually, looking at themes of love, lust, loneliness and everything in-between.” Take the first single “In Trouble”, co-written with Michele Stodart of The Magic Numbers, as the best example for Joel Sarakula’s unique, and honest approach to making music. „We Used To Connect” questions the changing nature of relationships in our social-media addicted world: ‘We used to connect in the real world too, now the touch of your hand is a digital cue'. “Coldharbour Man”, on the other hand, examines the identity of the song's narrator and the artist vs. fan dynamic all wrapped up in a disco love song: “There's a lot going on in this particular track. I feel my writing has grown emotionally...”, explains Joel Sarakula. “Just best to listen yourself and make up your own interpretation!: 'We met in a song come to life like some fantasy cliché, though I'm known for my moves in the dark you flooded sunshine on my day'. Then there’s “Baltic Jam”, capturing romantic love and loss in authentic 70s confessional singer & songwriter style and of course “Dead Heat”, a song about how there is struggle in the most perfect relationship pairings as the match is so even: “I recall an ex-girlfriend of mine... when we first met, we thought we hated each other but we eventually flipped that emotion and realised we had a deep passion and love for each other, there just was a lot of underlying sexual tension!” : 'It's a battle we could only win, if we lose. We'd be stronger if these lonely ones became two'. More than a year in the making, Joel Sarakula recorded „Love Club“ in various studios around London and Berlin capturing soulful performances from his many musical comrades on vintage analogue equipment. “This record has truly been a labour of love. Recording and privately sharing these performances amongst my collaborators started to feel like a bit like a club – I guess that lead to the album title! I was surprised how much I actually enjoyed the ‘love-making process’ and I look so much forward to playing these new songs on stage with my band.” We can’t wait, Joel Sarakula.
01. Boat Mama
02. Outer Banks
03. Dirt Track
04. Come
05. Come Along Bintang Bolong
06. MS Utopia
07. Open Up!
08. A Route Obscure
09. Wait For Me
10. The Routine
11. Ghost Of Your Love
12. Bosso Fataka
13. Passport Check
DAVID NESSELHAUF
Afrokraut
[engl] In 2016 the world seems to be more connected in communication, yet more segregated in culture than ever. It is a time for fresh ideas about re-connecting things. David Nesselhauf, producer, composer and multi instrumentalist from Hamburg/Germany gives it a try. His new album re-visits a time in the Seventies, when innovative bands like Can were working on a rhythmic and experimental fusion of African music and German rock, which was labelled “Afrokraut”. Nesselhauf’s modern take on “Afrokraut” goes beyond the standards of contemporary electronic, jazz, pop or club music. As much as the thirteen tracks on the album nod towards the dance floor as their common factor, they also address topics as migration and exclusion and take a strong stand for global togetherness. Just listen to the opening tracks “Boat Mama” and “Outer Banks” and you see what Nesselhauf is on about. Recorded and mixed on vintage equipment at Dennis Rux’s ultra-cool Yeah! Yeah! Yeah! Studios in Hamburg, “Afrokraut” sounds deep, authentic and visionary at the same time. Renowned Dutch artist Chantal Rens delivered a strong statement for the cover artwork: “I am especially excited about Chantal’s work for my album”, says David Nesselhauf. With a diverse catalogue of albums ranging from electro to doom to look back on, his works with funk celebrities Diazpora as their bass player and collaborations or production with Pee Wee Ellis, Lew Soloff (Blood, Sweat & Tears), Flo Mega or Faust, running his own little record label as well as his education at the Drummer’s Collective in NYC David Nesselhauf is a well established player in the German independent music scene. “Afrokraut” features a range of musical guests. Amadou Bah is the vocalist on the first single “Come Along Bintang Bolong”, an irresistible Afrobeat burner, Diazpora drummer Lucas Kochbeck is an integral part on various album highlights, most notably the mysterious “A Route Obscure” and the intense “Dirt Track”. Then, of course, we have the sweet and groovy vocals of Kinga Lizz and Nabil Atassi on the funky “Open Up!”. “This album is something I wanted to release for a long time”, explains David Nesselhauf. “I was always fascinated by this little forgotten era in the history of German popular music that was labelled ‘Afrokraut’. It was full of unique vibes, never fully explored and suddenly it was gone. And to be honest, the message carried through this music is more valid than it ever was.”
01. Intrologue
02. Never Take It feat. Soulamadou
03. Space Station
04. Solaris
05. Meteorites
06. Everlost
07. Believe It feat. Axel Feige
08. Transneptunians (I)
09. Transneptunians (II) feat. Soulamadou
10. Orion Safari
11. The Void
13. I Wanna Go Back feat. Axel Feige
14. Repitaph
Afrokraut II: The Lowbrow Manifesto
[engl] “Afrokraut II: The Lowbrow Manifesto” returns to the place where David Nesselhauf imagined a world of peace, unity and impossible dreams with the release of “Afrokraut” in 2016. Now, with “Afrokraut II” David Nesselhauf expands into space. David Nesselhauf is unlike any other musician, producer and arranger you know. Through the tiny window of his laboratory he observes the stars. Using self-made antennas and ancient tape machines, he records electromagnetic waves sent from outer space. Played in reverse at triple speed he manages to decode the information herein without much use of psychoactive substances. On “The Lowbrow Manifesto” Nesselhauf collects these fragments and tells stories from a future mankind which seems to live scattered across the universe. They communicate their secret thoughts and wishes through music, painting a picture about what is to come for us all. Using a colourful palette of sounds, selected stories got further enhanced by David Nesselhauf to a digestible, funky and contagious new album. „Afrokraut II: The Lowbrow Manifesto“ documents Nesselhauf’s journey backwards through future, dedicating his work to the heritage of “Afrokraut” history, a brief episode when Krautrock got funky (and David Nesselhauf wasn‘t even born at that time). As with the first episode of “Afrokraut”, good friends appear as guest musicians: Lucas Kochbeck and Axel Feige (both, like Nesselhauf himself, members of Diazpora) and Soulamadou, patron of Nesselhauf‘s favourite club, the Souledge in Hamburg/Germany.
01. Gutterball
02. Lonely For You Baby
03. Workout
04. Eazy Rider
05. The Skunk
06. Lope Song
07. Booga Lou
08. Cigar Eddie
09. I Believe In Miracles
EDDIE ROBERTS & THE FIRE EATERS
Burn!
[engl] Eddie Roberts started his music career in 1989 aged 18, having left his Welsh homeland to study Jazz at Leeds College of Music. More interested in live performing and getting his own thing going than in college work, he quickly rooted out the best players in town and set up his first band, The Jazz Mailmen, dedicated to playing the golden era of Art Blakey's Jazz Messengers. After transcribing all the parts and enforcing a dress code of Bop suits, he set about taking the UK Jazz Dance scene by storm. During this time British Hard Bop legend Tommy Chase asked him to relocate and join his band, but Eddie had other ideas. Following his early bands The Eddie Roberts Organisation and The Three Deuces Eddie's focus shifted towards Deep Funk, the New Mastersounds were born and released their first album on Keb Darge’s Deep Funk Records. The rest is history, with six full albums recorded and an impressive history of live shows around the world. Eddie's love for 60s Blue Note & Hard Bop didn't waver despite the media hype of the Deep Funk scene. Soon Eddie was commissioned to produce a Hard Bop track for the Jazz dancers to go on Adrian Gibson’s renowned 'Messin Around' compilation. This project turned into the „Roughneck“ album, released summer 2004 on the NMS’ One Note Records label. "Trenta", released early 2007 on Salvo’s Records, features instrumental arrangements of traditional Neopolitan songs. Eddie stayed busy that year playing with Papa Mali, Johnny Vidocavitch, Idris Muhammed and The Greyboy Allstars. „Is that all?“ Eddie Roberts asked in 2009 and the answer was simple: No! Légère Recordings had a good look on Eddie’s extensive back catalogue and released „An Introduction To Eddie Roberts“, showcasing his work from the early days up to the present. Following the releasse The New Mastersounds played their first German shows since many years. When in Spain during the same year Eddie joined forces with The Sweet Vandals’ rhythm section, adding Chip Wickham’s (Nightmares On Wax, Rae & Christian, The Pharcyde) world-class flute and Taz Modi’s funktastic organ from Leeds/UK, and he sensed that this could be the beginning of something special. „Burn!“ is the proof that his feelings were true. The Fire Eaters, as the combo was now called, recorded the album produced by Eddie Roberts himself in 2010, completed 12 tracks including a good number of Eddie Roberts originals as well as their versions of classic acid jazz & soul tunes like „I Believe In Miracles“, the „Lope Song“
01. I Keep On Thinking
02. Too Many Rules & Games
03. I've Got No Feelin'
04. I Can Fly
05. Where I Lived Before
06. Please Don't Forget My Name
08. Take My Heart & Breathe
10. I Miss You Babe
Too Many Rules & Games
[engl] Gemma & the Travellers give a nod to the early deep Soul, R&B, Northern Soul and Funk of the Sixties but add a refreshing twist with their unique songwriting. With her powerful and distinctive voice, Gemma M. is a true Soul woman who left the south of Italy as a teenager with a small bag in her hand and a bit of cash in her back pocket. Travelling through Europe, she met Robert P., an Anglo-Swedish guitarist living in Germany at the time and formed a travelling duo, which ended up returning to Robert’s hometown London. After many years getting sick and tired of the city’s distractions, they looked for a more creative environment beside the sea and fell in love with Northern Brittany, where they formed the band Gemma & the Travellers with friends and musicians from down the road. Contrary to the “Motown” or “manufactured” model where the singer is rarely the songwriter, Gemma M. writes all of her songs with the help of Robert P. on the guitar. Her influences are Aretha Franklin and Julie Driscoll - genuine vibrations where life is your own creation! Recorded live at Lemoncake Studios in northern Brittany, producer Robert P. strived for an authentic and original Soul sound with a certain crunchiness and analogue distortion, like that of an old vinyl from the Sixties without falling under the overused retro banner. The title track of Gemma & The Travellers’ debut album “Too Many Rules & Games” is a song about a woman who has had enough of a world run by the men looking only for their own personal glory and fame. Love is the answer to the problems of this world! “Where I lived before” is another highlight: “I am looking back at the years of my upbringing living in the south of Italy, a juxtapose of poverty, injustice and hardship with all the beauty of the land and warmth of the people; it was hard to be a teenager there as my mum would not let me go out, which amplified the rebel in me,” Gemma explains. In 2015, the band played their live debut at London Jazz Café, opening for the Craig Charles’ “Funk & Soul Show”, who then described the band’s sound as a “tasty little nugget of Soul”.
01. Good Feeling
02. Make Time For Love
03. Do It Right Now
04. Danger
05. Let's Fall In Love
06. Beauty Of Loving You
07. Look Here In My Heart
08. Get Up On This Groove
09. Whole Lotta Talk
10. Which One Are You?
JAY W. McGEE
[engl] „Good Feeling“ marks the return of Jay W. McGee, one of the most interesting voices from the disco and boogie era of the mid and late Eighties. This abum is Jay W. McGee’s first new recording since his last release more than 25 years ago, covering a selection from boogie to soul and from disco to gospel. The vocals for „Good Feeling“ were recorded in Jay W. McGee’s hometown of Flint/Michigan, while the music was recorded and mixed in Hamburg by up and coming production team The Unbelievable Two. Releasing on various independent labels, Jay W. McGee came up with two albums („Over & Over“ in 1981 and „Survivor“ in 1988), accompanied by a couple of cult 12inch singles which still feature on genre radio and DJ playlists around the world. „Turn Me On“ has been officially re-issued by Légère Recordings in 2013, while „When We Party“ is still a firm favourite among connaisseur DJs. Jay W. McGee started singing gospel music when he was four years old. He toured with a number of funk & soul bands through the USA and Canada during the Seventies and made some great recordings that still have a fresh impact. With „Good Feeling“ he goes for an up-to-date production with true respect of his roots, aiming on the dancefloor and the mind. All ten tracks are new and original compositions by Mr. McGee himself and the production team of Julian „Mzuzu“ Romeike and Matthias „Mucka“ Morgenroth, also known as „The Unbelievable Two“. The styles range from the colourful disco-soul of „Whole Lotta Talk“, the lo-down sexy groove of „Make Time For Love“, the crazy jazz-funk of „Look Here In My Heart“ to the sweet gospel soul of „Do It Right Now“.
01. Understanding
02. In Trouble
03. Baltic Jam
04. We Used To Connect
05. Dead Heat
06. Theme From The Love Club
07. Coldharbour Man
08. Parisian Woman
09. Coney Island Getaway
10. Cinnamon Surprise
11. Winter Elegy
JOEL SARAKULA
01. Waiting Game
02. Jacob's Ladder
03. Traffic
04. Cajun Jollof
05. Afro Struttin
06. NOLA
07. Little Mountain
08. Yellow Fellow
09. Westchester Lady
10. Smoke Signals
KERBSIDE COLLECTION
[engl] Jazz funk and gritty rare grooves ensemble from down under - Kerbside Collection - return with their third record Smoke Signals! Continuing in a down home, instrumental approach, but this time combining updated ideas and flavours into their spectrum of warm, analogue, dusty grooves from more frequent fender-rhodes electric jazz elements, to New Orleans sprinklings alongside their 60’s inspired West Coast style. Smoke Signals continues the wilder tones, textures and ‘library’ sounds of extra instrumentation where previous ‘Trash or Treasure’ left off, whilst introducing hints of fusion and cinematic analogue electric colours into the mix - bringing things into slightly early 70s territory. Opening with the lush, chilled, palate of Waiting Game, remeniscent of some classic Air ‘Moon Safari’ grooves, before the album properly begins with a fresh rendition of the rhodes heavy Cedar Walton 70’s jazz funk classic ‘Jacob’s Ladder’. Then straight into the street-styled jazzbongo breaks and funky-flute of ‘Traffic’, a skankin’ New Orleans reggae homage to one of its finest Creole dishes, featuring funky hammond organ curtosy of guest Jake Mason (Cookin’ on 3 Burners/Jake Mason Trio) and tasty piano work from multi instrumentalist Andrew Fincher who handles both guitar and keys on the whole record. The middle of the record comes with a steaming afro funk workout, and a low slung N’awlins styled blues ‘n’ soul groover, both featuring the fruity, low-end brass action of Papa Joe on baritone sax, before taking a gentle, restfull breather with the delightful, soulful, rhodes ballad ‘Little Mountain’; and a ‘waltz-jazz-wig-out’ attributed to their label’s A&R Mr Mellow (remeniscent of some humerous UK acid jazz ala Corduroy and James Taylor Quartet) featuring some beautiful jazzy flugelhorn, and acoustic double bass. The album wraps up with another cover - a grittier reinterpretation and arrangement of a Bob James 80s jazzfunk classic ‘Westchester Lady’ complete with funky flute and soaring guitar solo, before closing with the explosive rock-funk workout and title track ‘Smoke Signals’ (another car reference)........ rounding out a record with a full spectrum of handmade raw jazzfunk, soul, funky reggae, library and gritty rare grooves....enjoy! “Power funk & timeless grooves...” (Phil - Wicked Jazz Sounds / NL)
01. La Jupe Volante
02. Wonder Zebra
03. Big Bite
04. Bestial Zoo
05. Hurricane Train (SoulBrigada Remix)
06. Kinky Regards
07. Party Chez Le Marquis
08. Beat Sample
09. V.L.A.M. (Lack Of Afro Remix)
10. Jump The Gun (feat. Afu-Ra)
KIND & KINKY ZOO
Released!
[engl] “Funky flute galore — and tunes that step out with an energy that’s hard to deny! " Dusty Groove USA "Blow me if it isn’t some sort of crazy-ass, fuzz-heavy, flute-funk antics!" Monkeyboxing.com "Kind & Kinky Zoo get fuzzy whenever they can, and their diverse influences draw from the aforementioned genres (afrobeat and psychedelia), as well as garage, rock and roll, and more. A freakout on all levels." Flea Market Funk "Brilliant! Lovin' it!" Craig Charles, BBC 6 In 2005, a new zoo opened in Lausanne, Switzerland. Its wild animals have been going bananas in their quest to create a more dancefloor-friendly world. Now released, the zoo residents can be tracked by their heavy funk smells. Follow their scent past retro-psychedelia and turn left after organic garage. „Released!“ is the debut album by Kind & Kinky Zoo. It is a collection of brand new tracks, early singles as well as remixes and features a guest apperance by rapper Afu-Ra.
01. What The Heart Wants
02. Sweetness And Light
03. Give It To Me
04. If You Ain't
05. Baby Can We Start Again
06. Don't Break Her Heart
07. Put Your Arms Around Me
08. Gotta Leave The Lady Alone
09. Good Day
10. Nothing But The Good Times
NICK PRIDE & THE PIMPTONES
Go Deep
[engl] Soul funk powerhouse Nick Pride & The Pimptones return with their second album on Légère Recordings. “Go Deep” mixes their trademark jazzy sophistication with a gritty retro sound. Following on from the instrumental heavy "Midnight Feast of Jazz" (Record Kicks, 2011) and the diverse "Rejuiced Phat Shake" (Légère Recordings, 2014), "Go Deep" is a more focussed and consistent affair. As always with The Pimptones there's a heavy dose of funk, but this album's personality comes from ten strongly written slices of deep soul music, beautifully delivered by singer Beth Macari. "I wanted to get back to basics", says writer and arranger Nick Pride. "My aim was to be as direct as possible from the original inspiration of each song right through to the recording process. I wanted to keep that energy and that magic. We've had some great collaborations in the past but this time I kept everything in-house to capture the excitement of the band playing together. You really get that vibe when you hear these recordings." The result is an album of depth and substance from a band continuing to evolve. The Pimptones’ sound has always been a profound combination of funky grooves, beefy breaks and blue eyed soul. Slick arrangements and harmonic sophistication delivered with a heavyweight punch crosses over from jazz to keep the dance floor moving. A Pimptones live show kicks off with tight, punchy instrumentals, making way to sweetly crafted soul songs as they are joined on stage by one of many fantastic guest vocalists. However in 2016 the band has flipped the script by taking on sultry soul siren Beth Macari as their full time vocalist. Having first made a guest appearance with the group on “Rejuiced Phat Shake”, Beth’s supercharged R&B vocal style is the perfect match for the Pimptones’ deep funk sound. Formed back in 2007, the group first caught the eye of funk fans around the world with their single "Deeper Pimp" on Wack Records. The track was the first of the group’s “Live-Band Bootlegs”, an acapella fused with original live backing, a unique approach to the mash-up genre, and a show stopping live feature. In 2010 The Pimptones broke through with the single “Waitin’ So Long”, a song which was used extensively on Italian mainstream rom-com “Lezioni di Cioccolato 2”, and accompanying album “Midnight Feast of Jazz”. This global success was quickly followed up by the digital release of “Remixed Feast of Jazz”, including collaborations with TM Juke, Diesler, Smoove and Renegades of Jazz. The focus of The Pimptones’ sound shifted from instrumental jazz to the soul sound of 2014’s “Rejuiced Phat Shake” album which featured many guest vocalists and musicians, finely crafted melodies, dance-floor beats and killer hooks.
01. Forever Dreaming
02. Light In My Hand
03. Shooting Star
04. My Inspiration
05. So Much Indeed
06. Lonely Dreamers
07. To My Surprise
08. Save My Soul
09. Take A Look At Me Now
10. Where We Need To Be
11. To My Surprise (Instrumental)
SANKO, MYLES
Forever Dreaming
[engl] The soul singer and songwriter based in England known as Myles Sanko released his debut “Born in Black & White” to broad critical and fan acclaim in 2013. Featuring seven original funk and soul tracks written and performed by Myles himself, this EP was perceived and played in the style of soul greats such as Bill Withers, Otis Redding, Al Green and James Brown, all of whom Myles openly names and proudly as his main musical influences. A stop-to-finish work of deep grooves and jazzy musical knowledge, Now “Born in Black & White” is followed up by Myles Sanko’s first full-length album “Forever Dreaming”. Dubbed as the lovechild of soul music, Myles Sanko began his music career by singing and rapping alongside disc jockeys in nightclubs. He has fronted popular bands such as Bijoumiyo, plus working with funk kings Speedometer who were touring with James Brown's 35 years soul sister Ms Martha High. “My intention,” writes Myles, “is to produce music with a feel good vibe and lyrical content that makes my listeners think.” In order to select an appropriate collection of compositions for professional recording in the studio, Myles uploaded live videos of himself giving acoustic performances to the internet. He then invited his bevy of fans throughout Europe to give their opinions regarding which tracks would best fit his debut EP release. This interactive spirit, which has guided Myles's solo career to date, reveals much about his humanist spirit, genial character, and artistic integrity. “I want my music to be a place to feel alive,” says Myles Sanko. “True motivation is the reaction I get from my audience when I perform, and I intend on making music that I love listening to. It’s the only way to stay authentic and to not lose yourself in all the other musical influences out there.” With his eight piece band Rick Hudson (drums), Neil Cowlan (guitar), Tiago Coimbra (bass), Tom O'Grady (piano/Rhodes), Neil Penny (trumpet), Matt Mckay (saxophone/flute), Tom White (trombone) and Ric Elsworth (percussion) Myles Sanko 10 versatile compositions Myles wrote with his longtime songwriting partner Thierry Los from France. Styles are ranging from the melodic soul-jazz oft he title track „Forever Dreaming“ through the spiritual acid jazz of „Take A Look At Me Now“ to the energetic soul dancer „Shooting Star“.
01. Freedom
02. Just Being Me
03. Promises
04. This Ain't Living
05. Sunshine
06. For You
07. Land Of Paradise
08. I Belong To You
09. Forget Me Not
10. Missing You
11. Empty Road
[engl] Essentially, the history of British soul music is a long story about the search for identity. With his third album „Just Being Me“, Ghana born singer, songwriter, producer, designer, musician and cinematographer Myles Sanko adds an essential chapter to this eventful journey. Featuring eleven new compositions, „Just Being Me“ explores the inner self and transcends stylistic borders. With its rich instrumentation and colourful arrangement it speaks out as loud as a proper soul album should. „For me, music is the key to communication between people. When I write, play and sing music, I do not plan it to be labelled ‘soul’ or ‘jazz’ – it just comes naturally as it is,“ Myles Sanko explains. With his true, emotional and straightforward style, he is able to connect past, present and future. “Of course I am inspired by the classic sounds of the Sixties and Seventies coming out of Detroit, Memphis or Philadelphia. But I grew up in the middle of the English countryside. We had no ghetto or deal with social unrest in the streets. Nevertheless, when you grow up coming from a mixed racial background into a conservative society, you need to develop a strategy of survival.” One key element of this strategy was to take business in his very own hands. Myles Sanko recorded his debut mini album „Born In Black & White“ in 2013. Without any distribution or marketing it sold so well that Myles instantly knew he was on to something good. “My fans crowd funded the recording of my second album ‘Forever Dreaming’. That was amazing, even Gregory Porter invited me to join him as support. The band I toured with became my family.” With „Just Being Me“ Myles Sanko is coming home now. „This album is about love, hope and politics, and has a piece of me in every part,“ read the liner notes and you can’t deny the truth in these words. Starting with „Freedom“, a Donny Hathaway style instrumental prologue, the album flows seamlessly into the title track. “Promises” is what soul is about: Don’t believe the hype, have a look what’s behind empty promises. “This Ain’t Living” is accompanied by some of the most delicate orchestral soul-jazz this side of Matthew Halsall or Cinematic Orchestra. “The Sunshine” is where it’s at, a quiet celebration of the love for the sun. „Land Of Paradise“ carries a message of hope and confidence in the lyrics, led by a hypnotizing brass section, think Gil Scott-Heron or the Last Poets walking through the streets of Manchester or London: „I Belong To You“ looks back on classic, era-spanning soul ballad artistry, think Bill Withers teaming up with Maxwell and you are quite near. „Forget Me Not“ stays firmly in up-to-date R&B idioms. „Missing You“ brings down „Just Being Me“ in an Bobby Womack style, acoustic soul, while „Empty Road“ is an emotive ending to a wonderful story. “Just Being Me’ is a departure from what I did before and a beginning of a new journey. It is about myself as a human being, as it is about sharing between each other,” concludes Myles Sanko. “What is it that you can do as a songwriter or musician? You have the ultimate tool that you can share with others, as recorded music or on the stage. As an artist you can make the most of this rare gift ”
02. Brand New U
03. Shake
04. Ying Yang Kutsk
05. Purple Pearl
06. Don't Treble Me
07. I Won't Go To Bed
08. A Matter Of Seconds
09. The Thief
UEBERTRIBE
Brand New U
[engl] "Tough as hell. Hard German Funk, like the younger siblings of The Poets Of Rhythm in their prime & that really is a good thing." (Boca 45) "Funky as a Junkie with a pet monkey." (Shawn Lee) When you are in with Uebertribe, there is no misleading: „We make no fuss and there is no need to discuss. With us, it is all about funk,“ says Legbo, guitarist extraordinaire and head of the freaky funk collective from Hamburg. „Brand New U“ is their debut album and yes, it is very much about finding your direction, and being – or sometimes not being - in peace with yourself and the world around you. „The concept of Uebertribe has been in mind for about 10 years now. At that time I was playing with Diazpora and it was already clear, that we would never be able to finish all ideas that we had - life is short and they were just too many,“ Legbo recalls. „Apparently I needed another funk band, and while touring with a hip hop band, I found a drummer - Martin Kahl - who just felt right.“ Uebertribe can be seen as an offspring of Hamburg funk scene - a lively witches brew of underground parties, bands and musicians. Their early pre-incarnation was visible during the legendary „We Call It Funk“ session series in 2011, where they played many unfairly unknown funk treasures including some cover versions of the Nineties German funk band Zappelbude (which consisted of German jazz legends, pianist Robert Di Gioia and drummer Wolfgang Haffner). Same year later - in November 2011 - Uebertribe was born. The first single, though, in true funk style, was an instrumental. „Game Over“ was released on the Hamburg specialist 7inch label Our Label Records, with a released party hosted in the newly re-opened Mojo Club. Uebertribe continued playing live but focussed on recording the songs for the debut album, produced by Dennis Rux in his fully analogue Yeah! Yeah! Yeah! Studios. The result is a bona fide funk album, rough and raw. A newly recorded version of „Game Over“ sets the pace, followed by the staccato rhythms of the title track and the slow and badass grooving „Shake“. After the psychedelic, Asian style and heavy horn excursion of „Ying Yang Kutsk“ Uebertribe show they have some pop appeal with the Prince tribute and first single „Purple Pearl“. „Don’t Treble Me“ would work well on a late Sixties hippie festival, while the lazy and catchy „I Won’t Go To Bed“ lives up to its title. „In A Matter Of Seconds“ takes on some pace and leads towards the furious closing number which is „The Thief“, sounding like a theme tune of a lost Sixties movie. „We have our roots in raw funk. But we also love Afrobeat, P-Funk and Jazz,“ Legbo explains. „To be honest, we try to put some Voodoo on all of it, if you know what I mean.“ While Uebertribe now established themselves as a consistent live act and went through some personal changes, drummer Martin Kahl, bassist Daniel Vorpahl and guitarist Legbo started writing their own new songs and added Jamaican born singer Ray Darwin, who has been living and recording in Germany for some years as their fresh regular vocalist not yet featured on „Brand New U“, but in all future releases and live shows.
01. Super Fonque
02. Unbelievable Two
03. Night Cruiser
04. Feier In Babylon (Ital Sunshine)
05. Everybody
06. Song For Jörn (Poly Ryhthm)
07. Modernieserschön
08. Speed Dance
09. Power Plant
UNBELIEVABLE TWO, THE
[engl] “Uplifting boogie grooves to set your spirit free.” (Paul Kane / Jordan Valley Records) When The Unbelievable Two appeared on the scene in 2014, their pure underground, analogue boogie and disco sound mirrored what was going on in the vinyl infected bars and small cellar clubs in their hometown of Hamburg/Germany. “The Unbelievable Two” was inspired by the golden age of the genres, played live with skills and insight. Four years later, boogie and disco are all around us. So it is about time that these pioneers release their second album. Honest and authentic, “Power Plant” recalls late 1970s New York Disco and mid 1908s UK Boogie. The Unbelievable Two still is Mzuzu and Mucka, who lead us through nine new songs of speedy disco, down low boogie and even some smokin’ reggae. Recorded in late 2017 and through the spring of 2018, “Power Plant” tells stories beyond the surface level. “Even though our music is purely instrumental, it doesn’t mean we haven’t got anything to say,” explains Mzuzu, a respected and well-travelled vinyl DJ on the Germany funk/disco scene. “Boogie and disco are a universal language. With the influence of Afro, Latin, Reggae, even European electronic music you do not need a lot of words to tell a story which gets everybody connected. These songs are about our friends, our everyday life, how we life and what we feel.”
01. Midnight In Richmond
02. Lenny
03. Take It Or Leave It
04. Underdog
05. Mojo Rising
07. Love Guarantee
08. Caroline
09. Kingston Boogie
10. Lolita
YOUNG GUN SILVER FOX
AM Waves
[engl] Young Gun Silver Fox are the captains of AM Waves, setting sail towards an isle where melodies soak the shoreline and grooves sway like palm trees. Their route traces a natural progression from West End Coast, an album that cast Andy Platts (Young Gun) and Shawn Lee (Silver Fox) as musical virtuosos of SoCal-infused pop. AM Waves does more than duplicate the perfection of West End Coast. It improves it. Recorded at The Shop in London and Roffey Hall in the English countryside, AM Waves burnishes the blend between the duo's modern aesthetic and their sumptuously crafted homage to '70s-styled pop, rock, and soul. "This music hits a certain spot for me personally that nothing else quite does," says Shawn, who produced the album amidst his projects for Saint Etienne, Shawn Lee's Ping Pong Orchestra, and several other acts. "It's real high-caliber music. It's easy and breezy to listen to but it's really hard to make. Every aspect is A game." The A game behind AM Waves fuels 43 minutes of Young Gun Silver Fox in peak form. "AM Waves is much more instinctive," says Andy, whose penchant for writing irresistible hooks and melodies also shapes his role as lead singer and lyricist/composer for the band Mamas Gun. "It's more vivid. You can see the clarity to the colors of AM Waves whereas West End Coast is slightly more impressionist, as it were." Originally issued as a single in September 2017, "Midnight in Richmond" is the anchor of AM Waves. "I hit one chord, which I'd never played before, and the song sort of wrote itself," notes Shawn. "It was intuitive. In many ways, the primary function of what I'm doing is trying to find that chord that opens a door and takes you someplace else. Those chords have magic." Andy embellishes the song's appeal by nimbly juxtaposing wistful emotions with a sun-kissed melody, his voice evoking richly drawn memories. The qualities that make "Midnight in Richmond" an instant classic abound throughout the album. "Lenny" and "Take It or Leave It" spotlight Andy's versatility as a songwriter. The former was inspired by a dream he had where Lenny Kravitz owned a bar. "It was surreal," he says. "He was polishing the glasses and just serving me hit after hit." Like swimming through moonshine, Andy languorously savors every syllable in the song. "Take It or Leave It" is pure pop bliss. "That was one of those songs that fell out in half an hour," he says. "I had everything and it was done." Shawn adds, "It's such a perfect song in itself. When I listen to it, it's like you've created a record that already existed." Young Gun Silver Fox introduce a five-piece horn section on "Underdog" that literally trumpets the song's protagonist. Shawn affectionately dubbed them the "Seaweed Horns" in honor of the Seawind Horns, an LA-based unit that recorded with powerhouses like Michael Jackson, Rufus & Chaka Khan, and Earth, Wind & Fire during the late-'70s. Andy explains, "The horns grab another hue of the west coast sound, which is the starting point, but it's also maybe the point where we're injecting a little bit more of ourselves and some outside colors into the familiar west coast palette." A bounty of treasures course through AM Waves' ebb and flow. "Mojo Rising," which the duo penned with Rob Johnson, is a veritable retreat to paradise. "Sky-bound, heaven sent / Way above the clouds watching shooting stars descend," Andy sings, mirroring the music's celestial undertones. Sensuality contours the notes on "Just a Man," a song that basks in the allure of a woman who leaves "footprints on the water" while "Love Guarantee" is festooned with the Seaweed Horns. "I wanted to bring more of that R&B slickness into the mix," Shawn notes about the latter track. "We hadn't done a tune with that sort of groove." Similar to his work on "Underdog," Nichol Thomson's intricate horn arrangement on "Love Guarantee" exemplifies another distinction between AM Waves and its predecessor. "Caroline" occupies a special place on AM Waves, beyond spawning the album title. It tells the story of Radio Caroline, a pirate radio station that broadcast from an offshore vessel during the '60s and '70s. "They played the music that kids wanted to hear, whether it was the old stuff or cutting edge stuff," says Andy. "'Caroline' is about Radio Caroline's eventual capture." Complementing Andy Platts' deft wordplay, which draws parallels between radio airwaves and the station's literal home on the ocean, Shawn Lee layers nearly a dozen different parts on "Caroline," showcasing the vastness of his musicality. "I loved that track as soon as I heard it," Andy continues. "It's a beautiful fusion of me and Shawn."
01. You Can Feel It
02. Emilia
04. Distance Between Us
05. See Me Slumber
06. In My Pocket
07. So Bad
08. Spiral
09. Saturday
10. Long Way Back
West End Coast
[engl] Young Gun Silver Fox are musical sorcerers. On “West End Coast”, they've fashioned a fresh and modern sound that summons one of the most vibrant and influential epochs in popular music. The ten songs herein pay homage to 1970s Los Angeles, a golden age of recording that infused the pop charts and FM airwaves with a blend of soulful voices, immaculate melodies, stellar musicianship, and sophisticated studio technology. The forces behind Young Gun Silver Fox are Andy Platts and Shawn Lee. It was inevitable that two of the most prolific and versatile pop music linguists would one day collaborate on a studio project that crystallized many of their creative strengths. “West End Coast” fuses the talents they've mastered in their respective careers, from Andy's role as frontman and co-founder of UK band Mamas Gun to Shawn's numerous self-produced projects with AM and his own Ping Pong Orchestra. The authentic hybrid of styles on “West End Coast” is further steeped in the fact that Shawn, the team's silver-haired Silver Fox, is an American who resided in LA for seven years before relocating to London. "Speaking for myself, this is an album I've wanted to make for some time and Andy was the only person I felt I could make it with," he says. "Andy understands the classic melodic pop side as well as the soul funky side that was absolutely vital to the creation of this music. What a voice!" Recorded and mixed at Lee's Trans-Yank Studio in London, “West End Coast” straddles several sensibilities that are united by the duo's impeccable song writing. Each song is like a post card from their unique musical universe. Album opener "You Can Feel It" sets the tone with a soundscape that conjures the vastness of California's Pacific Coast Highway and a cool ocean breeze blowing through the chorus. London's West End sets the scene for "Emilia," with a little Sunset Strip flash fuelling the song's high octane grooves. "Better" casually sways from one chord progression to another as layers of different instrumentation are stirred into the mix and bring the song to a fever pitch. A strand of Philly-inspired soul threads through the DNA of "Distance Between Us" while "See Me Slumber" serves up a three-minute reverie of cascading melodies. The latter tune's coda sends the song into a whole other kind of orbit before the infectiously tuneful "In My Pocket" glimmers like a pot of pop music gold. In fact, little sonic treasures abound on “West End Coast”. A vigorous horn arrangement is among several attractions on "So Bad," which packs a carnival of dazzling ideas into four minutes. Elsewhere, the central question in "Spiral" — "If your heart could only speak, what would it say now?" — is accompanied by slinky and sensual cadences. "Saturday" operates in two gears, one that snaps and crackles and another that curves and coasts, powering the song to its swift conclusion. Like waves crashing beneath a midnight sky, orchestral elements swell and recede amidst the more saturnine backdrop of "Long Way Back." As the last note fades, the curtain falls on Young Gun Silver Fox's series of ten vividly produced vignettes. In the world Young Gun Silver Fox have created on “West End Coast”, every song leads to another sphere. No compass needed for this journey, just drop the stylus and get lost in the music.
|
cc/2019-30/en_middle_0056.json.gz/line12523
|
__label__cc
| 0.712307
| 0.287693
|
Profiling inflammatory markers in patients with pneumonia on intensive care
s41598-018-32938-6.pdf Published version 1.2 MB Adobe PDF View/Open
Title: Profiling inflammatory markers in patients with pneumonia on intensive care
Authors: Antcliffe, D
Wolfer, A
O'Dea, K
Takata, M
Holmes, E
Gordon, AC
Abstract: Clinical investigations lack predictive value when diagnosing pneumonia, especially when patients are ventilated and develop ventilator associated pneumonia (VAP). New tools to aid diagnosis are important to improve outcomes. This pilot study examines the potential for a panel of inflammatory mediators to aid in the diagnosis. Forty-four ventilated patients, 17 with pneumonia and 27 with brain injuries, eight of whom developed VAP, were recruited. 51 inflammatory mediators, including cytokines and oxylipins, were measured in patients’ serum using flow cytometry and mass spectrometry. The mediators could separate patients admitted to ICU with pneumonia compared to brain injury with an area under the receiver operating characteristic curve (AUROC) 0.75 (0.61–0.90). Changes in inflammatory mediators were similar in both groups over the course of ICU stay with 5,6-dihydroxyeicosatrienoic and 8,9-dihydroxyeicosatrienoic acids increasing over time and interleukin-6 decreasing. However, brain injured patients who developed VAP maintained inflammatory profiles similar to those at admission. A multivariate model containing 5,6-dihydroxyeicosatrienoic acid, 8,9-dihydroxyeicosatrienoic acid, intercellular adhesion molecule-1, interleukin-6, and interleukin-8, could differentiate patients with VAP from brain injured patients without infection (AUROC 0.94 (0.80–1.00)). The use of a selected group of markers showed promise to aid the diagnosis of VAP especially when combined with clinical data.
Issue Date: 3-Oct-2018
Date of Acceptance: 18-Sep-2018
DOI: https://dx.doi.org/10.1038/s41598-018-32938-6
Publisher: Nature Publishing Group
Journal / Book Title: Scientific Reports
Copyright Statement: © 2018 The Author(s). Open Access. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
Sponsor/Funder: The Intensive Care Foundation
Imperial College Healthcare NHS Trust- BRC Funding
Intensive Care Society
Funder's Grant Number: N/A
RDB04 79560
RDB20
Multidisciplinary Sciences
Science & Technology - Other Topics
VENTILATOR-ASSOCIATED PNEUMONIA
BRONCHOALVEOLAR LAVAGE FLUID
CRITICALLY-ILL PATIENTS
ACQUIRED PNEUMONIA
DIAGNOSTIC-ACCURACY
MYELOID CELLS-1
Open Access location: https://rdcu.be/8oM1
Appears in Collections: Division of Surgery
|
cc/2019-30/en_middle_0056.json.gz/line12524
|
__label__wiki
| 0.681301
| 0.681301
|
Same planet, different armories
General Assembly, guns, Jeremy LaFaver, Justin Hill, missouri, social media, Twitter
In alarming ruling, Missouri’s gun-friendly Constitution now allows felons to possess weapons
By YAEL T. ABOUHALKAH
The Kansas City Star 02/27/2015 7:31 PM 02/27/2015 7:45 PM
The gun-loving Missouri General Assembly went overboard in 2014, asking voters to approve a constitutional amendment that said “the right to keep and bear arms is an unalienable right” in the state.
Many law enforcement officials were horrified, saying this could open the way for felons to possess guns. But voters approved the measure.
Now look what happened Friday.
Jackson County Prosecutor Jean Peters Baker lashed out after a circuit judge in St. Louis ruled that the constitutional amendment can’t prohibit a felon from possessing a gun.
If your only tool is a hammer, every problem is a nail.
A discussion on guns via Twitter between Representative Jeremy LaFaver (D) and Representative Justin Hill (r):
Jeremy LaFaver @jeremylafaver
If DHS shuts down, NBD. Felons can now carry guns in Missouri, so we should be okay. 8:32 PM – 27 Feb 2015
Rep. Justin Hill @HillForMissouri
@jeremylafaver Felons have guns anyway. 10:58 PM – 27 Feb 2015
Let’s give them away for free, just to be sure.
@HillForMissouri And now they can have them legally. I feel safer. I’m sure suburban moms do to. #2016 9:46 AM – 28 Feb 2015
@jeremylafaver Guns don’t kill, people do. Don’t feel as safe, learn to protect yourself. Man has had to do it since the beginning of time. 9:50 AM – 28 Feb 2015
It’s a rare privilege to live in a hunter/gatherer society with no government services.
@HillForMissouri Ok… 10:19 AM – 28 Feb 2015
Or a libertarian paradise. Like Somalia.
Rep. Vicky Hartzler (r): Were you there?
4th Congressional District, Congress, funding, Homeland Security, Jim White, missouri, Vicky Hartzler, vote
Jim White @JW_for_Congress
Time for a change. This congress is not working. Government should govern. 7:25 AM – 28 Feb 2015
Last night the U.S. House of Representatives settled on a voting on a measure to continue funding Homeland Security for one more week. You read that right. One more week.
One Hundred Fourteenth Congress
AT THE FIRST SESSION
Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. FURTHER CONTINUING APPROPRIATIONS.
The Continuing Appropriations Resolution, 2015 (Public Law 113-164; 128 Stat. 1867) is amended by striking the date specified in section 106(3) and inserting `March 6, 2015′.
[emphasis in original
One week. They get to play this game next week, too. The vote:
FINAL VOTE RESULTS FOR ROLL CALL 106
H R 33 2/3 RECORDED VOTE 27-Feb-2015 9:59 PM
QUESTION: On Motion to Suspend the Rules and Concur in the Senate Amendment
—- AYES 357 —
Graves (MO)
Luetkemeyer
Smith (MO)
—- NOES 60 —
—- NOT VOTING 15 —
Hartzler
Not Voting? Why?
anti-semitism, John Hancock, missouri, Republican Party, Tom Schweich, Tony Messenger
If you’re interested, Missouri GOP Chair John Hancock is now issuing the expected and inevitable statements denying Tom Schweich’s posthumous accusations that he spearheaded an anti-Semitic whisper campaign in order to derail Schweich’s gubernatorial candidacy in favor of the Rex Sinquefield-blessed Catherine Hanaway. Not a surprising move, although his terminology in an email sent to folks identified as “party-leaders” is interesting:
Many of you on this committee are aware of the issue, as it came up in several of our conversations during the past few months,” Hancock wrote, as quoted by the Post-Dispatch. “While those who know me understand I would never denigrate anyone’s faith, Tom had mistakenly believed that I had attacked his religion.”
This left me scratching my head. Nothing that I’ve read implied that Hancock had ever attacked Schweich’s religion. According to reports, Schweich was an Episcopalian and nobody to my knowledge is accusing Hancock of slandering Episcopalians. What folks are saying is that Hancock was falsely asserting that Schweich, who had a Jewish grandfather, was himself Jewish. And that Hancock was doing it in those Republican circles where that might make Schweich persona non grata – at least as far as raising money to finance his race against Hanaway.
There’s a difference. Maybe Hancock doesn’t understand that, or maybe he’s just a sloppy kind of guy when it comes to explaining himself. But what Schweich accused him of wasn’t attacking his religion, but of practicing the dirtiest type of very dirty politics. An accusation that derives a certain credibility from the fact that we all know Republicans are good at doing just that – as I pointed out earlier.
That impression is reinforced by Hancock’s efforts to discredit the motives of Post-Dispatch columnist Tony Messenger who had been made privy to what was on Schweich’s mind during his last weeks of life:
“Now, some political opponents-particularly liberal Post-Dispatch columnist Tony Messenger-are using this tragic incident as an opportunity to criticize me and to smear the Missouri Republican Party,” Hancock wrote, as quoted by the newspaper. “These attacks are not only disgusting; they are wrong.”
Hoowee! Hancock evidentaly belongs to that school of conservative thought that seeks to answer any accusation of wrongdoing by evoking that rightwing bugaboo – those damn “liberals.” Count on them to be “disgusting and wrong.”
Wrong in what sense, though? Does wrong here mean inaccurate or morally culpable? Does Hancock think Messenger made up Schweich’s claims? By his own admission, lots of folks knew that Schweich was getting hot under the collar about what he considered an underhanded and nasty effort to knock him out of the race for the governor’s mansion. So what’s disgusting and wrong, in either sense, about telling folks about the beliefs that had been driving Schweich prior to his death, especially since Messenger correctly ensured that his account of what Schweich said neither affirmed or denied the accusations. If, based on past experience, we’re inclined to take Schweich seriously, the onus should fall on those of Mr. Hancock’s partisans who paved the way for us.
By many accounts Schweich was a highly-strung individual; maybe he was magnifying a few garden-variety incidents of who knows what. But by all the same accounts, he was also a man of integrity who refused to countenance what he considered bad behavior; it is probably undeniable that if he had not taken an even more decisive action yesterday, he would have been making those accusations public himself. How is it wrong – or even “liberal” – for Tony Messenger to act as Schweich’s proxy? Wasn’t Messenger just practicing honest journalism? Doesn’t Tom Schweich, whose last phone call seems to have been an effort to arrange an interview on the subject, deserve a little respectful and honest journalism on the day of his death?
Who’s on first base …
anti-semitism, John Hancock, missouri, republicans, Tom Schweich
On the topic of the alleged GOP whisper campaign against Tom Schweich:
The Post-Dispatch reports Schweich believed Republican Party chairman John Hancock, elected last weekend, was saying Schweich is Jewish to hurt him politically in the gubernatorial primary race, as many Republican voters are evangelical Christians.
So what are all these reporters trying to say about evangelical Christians? Think maybe they should broaden the target? Narrow it? Tell it like it is? You already know what I think.
After thoughts: Do you think saying evangelicals might not vote for a Jew is an effort to make anti-Semitism sound respectible? As if it’s just a crazy foible of the religious which is to be expected and tolerated?
Follow the disclaimer
ad, Citizens for Fairness in Missouri, missouri, PAC, Tom Schweich.State Auditor
Schweich the target of new ‘House of Cards’ themed radio ad
by Eli Yokley • February 20, 2015
“….Paid for by Citizens for Fairness in Missouri, Seth Shumaker, treasurer.”
Let’s take a look at the committee’s particulars, via the Missouri Ethics Commission:
C141044: Citizens For Fairness In Missouri
Committee Type: Political Action
716 South Baltimore
Kirksville Mo 63501
[….] Established Date: 02/10/2014
Termination Date:
Seth Shumaker
Information Reported On: 2015 – January Quarterly Report
Beginning Money on Hand $2,862.54
Monetary Receipts + $0.00
Monetary Expenditures – $800.00
Contributions Made – $0.00
Other Disbursements – $0.00
Subtotal ($800.00)
Ending Money On Hand $2,062.54
The committee filed an Amended Statement of Committee Organization on February 18, 2015 [scanned on 02/19/2015]. The committee treasurer and committee address were changed. There is no listed deputy treasurer.
We’ll have to wait until April 15, 2015 when the next quarterly campaign finance report is due to find out if and when anyone contributed additional monies to the committee and where the committee spent it.
State Auditor Tom Schweich (1960-2015) (February 26, 2015)
Tony Messenger on State Auditor Tom Schweich (February 26, 2015)
GOP: The party of hate (February 27, 2015)
Blunt is ready to torch DHS; Kander is readying the fire brigades
Department of Homeland Security, DHS, Government shutdown, immigration policy, missouri, Roy Blunt Jason Kander
Jason Kander, Roy Blunt’s Democratic challenger for his Senate seat, is fielding a petition on his campaign Website to prevent the Department of Homeland Security (DHS) from closing. Here’s what Kander has to say about the insane willingness of Republicans in the Congress to sacrifice DHS to their desire to send a “message” to the president – and maybe to the crazies in their base – on the issue of immigration:
Tomorrow at midnight, funding expires for the Department of Homeland Security.
As Homeland Security Secretary Johnson said, it is “indulging in a fantasy to believe you can shut down the Department of Homeland Security and there be no impact to homeland security itself.”
Add your name and tell Congress: Stop playing games with our national security and vote to fund the Department of Homeland Security before Friday night at midnight.
Compare Kander’s serious approach to the don’t-bother-me, who-gives-a-damn attitude of GOP insider Blunt, who voted against the “clean” bill that Senate Majority Leader Mitch McConnell recently brought up in the Senate in order to avoid the shutdown:
“This is a debate over funding a part of government so essential that if funding is not there, almost all of the employees show up anyway. They’re considered essential,” Sen. Roy Blunt (R-Mo.) said recently on the Senate floor.
Except that folks who know, know that’s not true:
While the most critical DHS functions – such as border and airport security and immigration enforcement – would continue, a review of the 2013 shutdown showed that some effects will be felt acutely in areas where the department already faces problems.
The 2013 shutdown provides a template for how DHS would be affected this time. A 2013 Congressional Research Service report found that an estimated 31,295 DHS employees were furloughed, but about 85 percent of the department’s workforce remained on the job.
The report said that “the total number of employees furloughed was relatively small compared with the overall size of the department,” but it pointed to a number of significant effects.
DHS procurement “activities were disrupted to some extent,” the report said, noting that DHS is the sixth-largest federal agency for procurement spending.
Other effects included the suspension of E-Verify, a program businesses use to determine the work eligibility of new employees, and a shutdown of the department’s civil rights and civil liberties complaint lines.
In the cyber arena – where DHS plays a key role in combatting attacks aimed at civilian federal networks and communicating with critical industries – there would be further impacts from a shutdown, DHS officials said.
The operational problems of the potential shutdown, however, are separate from the fact that a rich politician like Blunt is so willing to casually dismiss damage that shutting down jobs – or pay for those who, like a reverse Wempy, have to work today for a hamburger tomorrow – assuming that they can make it until tomorrow. At the very least, attitudes like Blunt’s isn’t gonna do a lot of good for morale, and, as I remember from my days as a manager, morale is a big part of how well things run.
And for what? A Republican colleague of Blunt, Illinois Senator Mark Kirk, describes the bone of contention succinctly: “Hopefully we’re gonna end the attaching of bullshit to essential items of the government.” Get that? Even sane GOPers thinks the tantrum is over a pile of steaming BS.
But wait a minute. Doesn’t Blunt usually like to pose as a sane GOPer? Is he really so scared of a rightwing challenger in 2016 – or just rightwing indifference come voting time – that he’ll sacrifice the good of the country to protect jingoistic BS? It seems to me that he needs to take to heart the rest of Senator Kirk’s comments: “In the long-run, if you are blessed with the majority, you’re blessed with the power to govern. If you’re gonna govern, you have to act responsibly.” Kander isn’t even the junior Senator from Missouri yet and he’s trying to do just that. What’s wrong with Blunt? You think he really just doesn’t give a damn as long as he can get the Big Money boys to keep paying his bills?
Fun and games with the NRA
gun control, mass shootings, missouri, National Rifle Association, NRA, Sam Dotson
Big event in Missouri, one of the NRA’s prime fiefdoms:
TYRONE, Mo. – A door-to-door killing spree that left eight people dead in a rural Missouri community may have been triggered by the alleged gunman finding his mother dead in her home, the county coroner said Friday. The woman apparently died of natural causes.
The 36-year-old suspect was later found dead of an apparently self-inflicted gunshot wound in his pickup in an adjoining county.
Texas County sheriff’s deputies found bodies in five separate residences in the Tyrone area of south-central Missouri after responding to a 911 call around 10:15 p.m. Thursday regarding a disturbance.
But, of course, guns don’t kill people, other people do. Most often other people with guns, but still…
What the hell, I hear you saying, it’s just more of the same ol’, same ol’. Like the nine month old accidentally killed by his five year old brother last month. Or the business as usual shootings in St. Louis and Kansas City. We’re used to it now. We read about it every day, shrug and go about our business. Nothing we can do about crime and human nature. Especially armed human nature.
But there is a reason that St. Louis Police Chief Sam Dotson is joining forces with the folks who are taking the Guns “R” Us constitutional amendment that voters approved last August to the state’s Supreme Court – and it’s not just because the ballot language was misleading. The irony is, I’m willing to bet, that lots of the folks who’ve been cavorting in that NRA bed are also the folks who have been the loudest about defending the police from the demands of anti-brutality protesters. Nothing like doing what you can to make working police less safe while posing four-square behind your friendly local policeman.
GOP: The party of hate
anti-semitism, Catherine Hanaway, John Hancock, John McCain, missouri, racism, Tom Schweich, whisper campaigns
Read Tony Messenger’s St. Louis Post-Dispatch editorial piece on the death today of State Auditor and gubernatorial candidate, Tom Schweich. It’s heartbreaking. If you don’t have the stomach for sad stories and righteous anger is more your thing, just read the excerpt that Michael Bersin posted below
Messenger makes it clear that he doesn’t know the nature of the desperation that led Schweich to do what he did. What he does know: the chair of the Missouri Republican Party, who claimed neutrality in the primary race between Schweich and Catherine Hanaway, was, according to Schweich, planning to undercut Schweich through a “whisper” campaign. Schweich’s grandfather was a Jew and that seems to be sufficient to do damage among Republicans.
The use of a race-baiting whisper campaign is old-hat for Republicans. The Nation describes one of the more notorious examples:
Eight years ago this month [i.e., Jan. 2008], John McCain took the New Hampshire primary and was favored to win in South Carolina. Had he succeeded, he would likely have thwarted the presidential aspirations of George W. Bush and become the Republican nominee. But Bush strategist Karl Rove came to the rescue with a vicious smear tactic.
Rove invented a uniquely injurious fiction for his operatives to circulate via a phony poll. Voters were asked, “Would you be more or less likely to vote for John McCain…if you knew he had fathered an illegitimate black child?” This was no random slur. McCain was at the time campaigning with his dark-skinned daughter, Bridget, adopted from Bangladesh.
In his editorial article Messenger hones in on racism in Missouri:
Missouri is the state that gave us Frazier Glenn Miller, the raging racist who last year killed three people at a Jewish community center in Kansas City. It’s the state in which on the day before Schweich died, the Anti-Defamation League reported on a rise of white supremacist prison gangs in the state.
Division over race and creed is real in Missouri Republican politics, particularly in some rural areas. Schweich knew it. It’s why all week long his anger burned.
True enough. But from what I’ve been seeing over the past six years, this roiling racist frenzy isn’t just a Missouri phenomena, but the new defining characteristic of the Republican Party itself. Since Richard Nixon, Republican politicians have been attempting to generate and exploit white racial resentment. But it’s taken the election of an African-American president to rouse the tribal hysteria that we’ve seen in recent years.
Republican politicians and their media counterparts on Fox television and rightwing radio routinely engage in the type of racist innuendos and slurs that would have been enough to have ruined careers a decade or so ago had anyone dared say out loud what is now par for the course. I could give examples, but there’s so many it’s hard to choose – and you already know what I mean. Take for instance, this list of the ten most racist moments at the last GOP convention. It’s even disturbed some Republicans. Charlie Christ left the GOP because “‘I couldn’t be consistent with myself and my core beliefs, and stay with a party that was so unfriendly toward the African-American president.” Hmmm, unfriendly. Politicians are politic, but the gist is clear.
As for anti-Semitism, remember Eric Cantor? You know, the Jewish guy who used to be House Majority Leader – and the only Republican Jewish member of the House of Representatives? Prior to his defeat, which many attributed to anti-Semitism, Cantor essentially admitted that racism and anti-Semitism was a problem in the House GOP caucus. And you all know about the history of anti-Semitism in the leadership of the American Family Association (AFA), the group that has given its heart, soul and financial support to the Republican Party – which reciprocates by regularly regularly sucking up in the AFA’s direction.
Of course rightwingers become apoplectic when they hear that other R word coupled with Republican, not to mention anti-Semitism. Not Islamophobic though – they seem to like that epithet. And it’s not just the denial; there’s all the projection too. Wingers are always on about how liberals are the real racists. Sadly, though their outrage is far too shrill and contrived; their red-faced conniption fits ultimately just make the rest of us laugh.
But I’m not laughing now. Folks who have a chance of adding control of the executive branch of our state to their legislative branch trophies, are accused of waging an anti-Semitic whispering campaign against a fellow party member. It’s going to be hard to escape the fall-out from this latest, local evidence of Republican moral rot. Or at least it ought to be.
*Phrase added in next to last paragraph.
Tony Messenger on State Auditor Tom Schweich
missouri, State Auditor, Tome Schweich, Tony Messenger
State Auditor Tom Schweich [2013 file photo].
This evening:
Messenger: From voicemail to voicemail: The short political life and times of Tom Schweich
Had I not ignored his phone call to me at 9:41 Thursday morning – I was doing a thing at my kids’ school district – I might have been the last person to talk to the man who wanted to be governor. It made for a chilling day in which I decided to do something I’ve never done before as a reporter: reveal the contents of off-the-record conversations with a source. That source is now dead. I believe it’s what he would have wanted.
I have no idea why Schweich killed himself. But for the past several days he had been confiding in me that he planned to accuse the chairman of the Missouri Republican Party, John Hancock, with leading a “whisper campaign” among donors that he, Schweich, was Jewish.
He wasn’t, which is to say that he attended an Episcopal church, but that doesn’t mean he wasn’t proud of his Jewish heritage, passed down from his grandfather.
Go. Read the whole thing.
Campaign Finance: a little bit more
2016, campaign finance, Eric Greitens, governor, missouri
Today at the Missouri Ethics Commission:
C151053 02/26/2015 GREITENS FOR MISSOURI Jeffrey and Susan Stuerman 950 Weatherstone Dr St Charles MO 63304 Stuerman & Company, LLC President 2/25/2015 $25,000.00
C151053 02/26/2015 GREITENS FOR MISSOURI Mark and Paula Bobak 15 Cricklewood Place St Louis MO 63131 Williams Venker & Sanders Attorney 2/25/2015 $25,000.00
That’s a $100,000.00 fundraising start in the last few days on a possible gubernatorial campaign.
Campaign Finance: There is another? (February 25, 2015)
|
cc/2019-30/en_middle_0056.json.gz/line12530
|
__label__cc
| 0.529811
| 0.470189
|
ABOUT:: Tatiana Pentes :: Geoffrey Weary
Чужие города Strange Cities: An interactive digital work
Scenes From A Shanghai Hotel: a film by Geoffrey Weary
Black Box: an interactive artwork: published VDM Verlag, Germany
BLOWIN’ AT THE ROCCO: Saturday Night
‘Geoffrey Weary’s Floating World’, ACADEMICI, Roma
SCREEN SURFACE Curated by Geoff Weary
Virtual Archive of Cultural Memories: Slow Boat to China
ABSENCE PRESENCE: by Lara O’Reilly @ Kotlin Island, RUSSIA
The Menorah of Fang Bang Lu: online documentary
CHINA HEART: iPhone APP: dLux media arts
Red Green Blue: A History of Australian Video Art
OBJECT: Australian Design Centre: by Tatiana Pentes
LAUNCHED: HOME iPad artwork by Geoffrey Weary
:: Strange Black Box ::
:: Strange Cities ::
CRUEL BEAUTY: The Broken Column: The self-portraits of Frida Kahlo
by Strange Cities Productions on 7 in Art, Black Box, Diego Rivera, feminism, Frida Kahlo, Mexican Modernism, Painting, self portrait, Sydney College of the Arts, Uncategorized, University of Technology • 0 Comments
CRUEL BEAUTY
The articulation of ‘self’, ‘identity’ and the creation of an innovative feminine vocabulary in the self-portrait paintings of Frida Kahlo.
A dissertation submitted in fulfillment of the requirements of the Master of Letters (Art History & Theory/ Gender Studies), University of Sydney, 1998 (with Merit), book published VDM Verlag Germany, 2009. [download book Sydney eScholarship Repository]
Frida Kahlo, The Broken Column (1944), oil on tin, Source: Herrera, Hayden, Frida : A Biography, Harper and Row, New York, 1983.
Feet what do I need them for
If I have wings to fly. 1953
Frida Kahlo’s Diary 1
Abstract: The Self-Portraits of FRIDA KAHLO
This book examines the self-portraits of Frida Kahlo and explores the way in which they articulate a ‘self’ and ‘identity’ through creating an innovative feminine vocabulary. The aim of this creative research is to explore the way in which Frida Kahlo represented her sexual subjectivity in the body of self-portraits she produced in her short life time. The self-portraits, some of which were produced in a state of severe physical disability and chronic illness, were also created in the shadow of her famous partner- socialist Mexican muralist/ revolutionary Diego Rivera. An examination of the significant body of self-portrait paintings produced by Frida Kahlo, informed by her personal letters, poems, and photographs, broadens the conventional definitions of subjective self beyond the generic patterns of autobiographical narrative, characteristic of an inherently masculine Western ‘self’. In Kahlo’s self-portraits the representation of the urban Mexican proletarian woman-child draws stylistically from the domain of European self-portraiture, early studio photographic portraiture, and the biographical Mexican Catholic retablo art, with its indebtedness to the ancient Aztec Indian
symbology of self.
The Impulse to Represent the Self: Narcissus
The first image was a portrait. In classical mythology, a lovely youth named Narcissus lay beside a pool gazing in adoration of his own reflection…In the Bible St Veronica compassionately pressed a cloth against Christ’s face as he stumbled to Calvary, and found His true image miraculously printed on the material…St Luke became a painter because, having experienced a vision of the Virgin Mary, he was inspired to produce a faithful portrait of her. 2 The self-portraits of Frida Kahlo significantly open up a new horizon in twentieth century painting. The works, created in Mexico in the 1930’s and 1940’s intersect with and extend the tradition of self-portraiture in the West. Contemporary modernist Mexican concerns to conserve, celebrate, and resurrect indigenous Mexican Indian culture were likened to the classical re-discovery of Greco-Roman antiquity in Renaissance Art. The portrait genre existed in Western antiquity and the early Christian world in the form of statues, busts, coins, sarcophagi and wall paintings. 3 The re-discovery of portraiture has been considered a definitive feature of the Renaissance, as exemplified by the artist Albrecht Durer’s project to represent the self. Durer fashions his 1500 Self-Portrait as an emblem of the powers of the individual creator, with the visual allusion to the vera icon of Christ.
“ Durer mythicises the identity between image and maker …endowing his likeness with the “omnivoyance” of a holy icon, he celebrates himself as a universal subject, whose all-seeing gaze is subject to none.” 4
Strikingly, there are parallels with Kahlo’s own impulse to represent the self in a period of Mexican history that has been termed the Mexican “Renaissance”. The legacy of Durer in Kahlo’s art is manifest in the close analogy between (i) bodies and texts, (ii) the artist’s self-portrait and the holy image (in the case of Durer, the body of Christ); and (iii) the Renaissance painter’s ascent from craftsman to artist, celebrating the artist’s art as the vera icon of personal skill. The Renaissance humanist notion of Man as created in the image of God is envisioned in Durer’s idealised 1500 Self-Portrait, where he is both created in the image of God and through artistic production creates as God. Kahlo’s repeated imaging of her incomplete barren body, a suffering and wounded body, places the woman-child at the centre of the universe, as universal all-seeing subject, yet corrupted and incomplete, as in Durer’s later self-portraits. Kahlo’s self-portrait works such as The Broken Column (1944); The Wounded Deer (1946); and The Two Frida’s (1939), recall the representation of the body in pain in Durer’s Self-Portrait as Man of Sorrows and Self-Portrait of the Sick Durer (a. 1512). In these works there is no illusory sense of self mastery in depictions of the wounded and incomplete body.
A shadow flickers across the history of the self-portrait, from Durer’s art in the Renaissance to twentieth century modernism – the original founding myth, the desire for self knowledge and the Fall. Transcending the Biblical manifestation of this myth and at the heart of the desire to regain the paradise lost of immortality is ever-present tyranny of the flesh – Death. Durer analogises his body and self in his self-portraits to the divine emblem of Christ, whose ability to transfigure Death in the Resurrection image and his eternal life, is reiterated in Kahlo’s self- portrait’s which iconocise her suffering body, expressing the interior landscape of the artist, and a psychological space of sensation, emotion, and memory.While these qualities are present in traditional masculine self-portraits, in Kahlo’s self-portrait work it is perhaps for the first time that Western painting has represented the specificity of feminine sexual subjectivity.
Photographic Portraiture
Frida Kahlo’s Jewish/German immigrant father Guillermo Kahlo was introduced to photography by his second wife (Frida’s Spanish/ Indian mother) Matilde Calderon de Kahlo, whose own father was a photographer. Matilde encouraged Guillermo to take up her father’s profession. This resulted in Guillermo Kahlo’s first major Commission – by the Secretary of the Treasurer under dictator Porfirio Diaz – to record Mexico’s architectural heritage for the 1910 celebration of the centennial of Mexican Independence. This won Guillermo the accolade of “first official photographer of Mexico’s cultural patrimony”. 5
Modern photographic portraiture had a profound influence on Kahlo’s self-portraits, which she often used as the basis of her paintings. In the work My Grandparents, My Parents, and I (1936) there is visual evidence to suggest that the portraits of her parents are directly based on their wedding photograph. 6
This highlights the legacy of the recent photographic medium upon modern painting, a medium with a tradition spanning centuries. As Roland Barthes writing on photography articulates… ” Painting can feign reality without having seen it. Discourse has signs which have referents… Contrary to these imitations, in Photography I can never deny that a thing has been there. 7
The self-portraits represent Kahlo’s reality, like the folk retablos in which the village artisan pins objects from the accident to the votive offering (a victims hair, samples of a vehicles wreckage), she symbolically rather than physically incorporates traces of imaginary and material objects. In all the roughly fifty five self-portraits produced the lens is turned back upon the viewer who is forced to apprehend the dominating subjective gaze of the model Kahlo, thus the surveyor becomes surveyed.
2. The Bus Accident, “Assassinated by Life”
Figure 2. Frida’s drawing of her accident in Herrera, Hayden, Frida: A Biography of Frida Kahlo, Harper and Row, New York, 1983, plate 10
Central to the Frida Kahlo narrative of self is a tragic bus accident, the injuries incurred of which she never physically or emotionally recovered. Indeed the physical injuries sustained in the accident when she was eighteen
years old prevented her ability to hold a pregnancy, and in later years, of being able to walk. Kahlo remembered the bus accident on the afternoon of 17 September, 1925: The accident took place on a corner in front of the San Juan market exactly in front. The streetcar went slowly, but our bus driver was a very nervous young man. When the trolley car went around the corner the bus was pushed against the wall…It is a lie that one is aware of the crash, a lie that one cries. In me there were no tears. The crash bounced us forward and a handrail pierced me the way a sword pierces a bull… 8 Frida’s lover Alejandro Gomez Arias described her situation:…Something strange had happened. Frida was totally nude. The collision had unfastened her clothes. Someone on the bus, probably a painter had been carrying a packet of powdered gold. This package broke, and the gold fell all over the bleeding body of Frida…and then I noticed with horror that Frida had a piece ofn iron in her body.” …They thought she would die on the operating table… The steel handrail had literally skewered her body at the level of the abdomen; entering her left side…“I lost my virginity”, she said. 9
The images of suffering, wounds, loss, grief, and barrenness appearing in much of her work could be derived from this fateful accident, an event scarring her body for life. The tears that she claims she never shed on that day seem to be endlessly reproduced in her pictures. The pain that she suffered throughout her short lifespan necessitated the long term and perpetual use of pain-killers and morphine. Indeed, all medical evidence pointed towards this substance as the cause of Kahlo’s suicide 13 July 1954. 10
1 Kahlo, Frida,The Diary of Frida Kahlo, Bloomsbury, London, 1995, p134.
2 Woodall, Joanna (Ed), Portraiture: Facing the Subject, Manchester University Press, New York, 1997, p1. (via the translation of Arabic texts into Latin)
3 Woodall, Joanna (Ed),op cit p1.
4 Koerner, Joseph Leo, The Moment of Self-Portraiture in German Renaissance Art, The University of ChicagoPress, London and Chicago, 1993, p242.
5 Herrera, Hayden, Frida: A Biography of Frida Kahlo, Harper and Row, New York, 1983, p5.
6 Herrera, Hayden, op cit p8.
7 Barthes, Roland, Camera Lucida, Flamingo, Great Britain, 1980, p76. [my italics]8 Herrera, Hayden, op cit3, p48.
8 Herrera, Hayden,op cit p48.
10 Kahlo, Frida, The Diary of Frida Kahlo, Bloomsbury, London, 1995, p134.
Tags:Art Black Box Diego Rivera feminism Frida Kahlo Hayden Herrera Master of Letters Mexican Modernism Painting Retablo self-portrait socialism Sydney College of the Arts tin University of Technology
← Geoff Weary’s film ‘An Eye for An I’, The Third Wave: Two Decades of the Hill End Artists Exhibition 1 Aug – 28 Sept 2014 Bathurst Regional Art Gallery
WORSHIP: SCULPTURE: DANCE →
Art Australian landscape Black Box Cosmopolitan Shanghai Dance Film Digital Media feminism film Geoffrey Weary Interactive Art new media online research Painting Photography Photo Media Russian Art self-portrait Serge Ermoll Shanghai Jazz Shanghai Russians Sydney Sydney College of the Arts Uncategorized University of Technology Video art
Strange Cities Productions
HOME iPad APP
Copyright. Strange Cities Productions 2019
|
cc/2019-30/en_middle_0056.json.gz/line12537
|
__label__cc
| 0.748108
| 0.251892
|
Treatment Info
What can be treated?
Papers & Articles
Clinic 42
09 638 4242 • 321 Manukau Road, Epsom
Adult human mesenchymal stem cells delivered via intra-articular injection to the knee following partial medial meniscectomy: a randomized, double-blind, controlled study.
by Stem Cell Life | Apr 1, 2018 | Papers & Articles | 0 comments
Article Published: 2014 J Bone Joint Surg Am 2014 Jan 15; 96(2):90-8 Adult human mesenchymal stem cells delivered via intra-articular injection to the knee following partial medial meniscectomy: a randomized, double-blind, controlled study.
Vangsness CT Jr1, Farr J 2nd2, Boyd J3, Dellaero DT4, Mills CR5, LeRoux-Williams M5.
BACKGROUND: There are limited treatment options for tissue restoration and the prevention of degenerative changes in the knee. Stem cells have been a focus of intense preclinical research into tissue regeneration but limited clinical investigation. In a randomized, double-blind, controlled study, the safety of the intra-articular injection of human mesenchymal stem cells into the knee, the ability of mesenchymal stem cells to promote meniscus regeneration following partial meniscectomy, and the effects of mesenchymal stem cells on osteoarthritic changes in the knee were investigated. METHODS: A total of fifty-five patients at seven institutions underwent a partial medial meniscectomy. A single superolateral knee injection was given within seven to ten days after the meniscectomy. Patients were randomized to one of three treatment groups: Group A, in which patients received an injection of 50 × 10⁶ allogeneic mesenchymal stem cells; Group B, 150 × 10⁶ allogeneic mesenchymal stem cells; and the control group, a sodium hyaluronate (hyaluronic acid/hyaluronan) vehicle control. Patients were followed to evaluate safety, meniscus regeneration, the overall condition of the knee joint, and clinical outcomes at intervals through two years. Evaluations included sequential magnetic resonance imaging (MRI). RESULTS: No ectopic tissue formation or clinically important safety issues were identified. There was significantly increased meniscal volume (defined a priori as a 15% threshold) determined by quantitative MRI in 24% of patients in Group A and 6% in Group B at twelve months post meniscectomy (p = 0.022). No patients in the control group met the 15% threshold for increased meniscal volume. Patients with osteoarthritic changes who received mesenchymal stem cells experienced a significant reduction in pain compared with those who received the control, on the basis of visual analog scale assessments. CONCLUSIONS: There was evidence of meniscus regeneration and improvement in knee pain following treatment with allogeneic human mesenchymal stem cells. These results support the study of human mesenchymal stem cells for the apparent knee-tissue regeneration and protective effects. TRIAL REGISTRATION: Clinical Trials.gov NCT00225095.
Predicting the outcome of stem-cell therapy
Cartilage Regeneration in Humans with Adipose Tissue-Derived Stem Cells and Adipose Stromal Vascular Fraction Cells: Updated Status
First-in-man intravenous implantation of stromal vascular fraction in psoriasis: a case study
Alcohol and endogenous aldehydes damage chromosomes and mutate stem cells
Stromal vascular fraction: A regenerative reality? Part 1:
© 2018 Stem Cell Life. All Rights Reserved.
|
cc/2019-30/en_middle_0056.json.gz/line12543
|
__label__cc
| 0.745909
| 0.254091
|
Home > articles, blog post, news > Martin Bott
Martin Bott
October 2, 2011 @ffv
cold war censorship – “…At the end of 2007 it turned out that the officials of the agency preceding the GESTAPO blocked all enemy radio programs when we moved to our current residence in Straubenhardt in 1989. This concerns particularly the French programs in Alsace and the programm of the AFN ( American Forces Network ) in Germany. Even in the Rhine valley in Ettlingen and Karlsruhe and on top of the mountains along the valley, which are less than 15 kilometres away from the french border it was not possible for me to receive any french program during these 18 years. During this time I had been driving 8 different cars with 8 different radios plus occasionally some other cars like rented vans for removals and the like. Almost all of these radios had the old mechanical dial system with dial cord and variable condenser. Some French programs are available now but AFN still is being blocked for me. The BND obviously jammed the corresponding frequencies with noise similar to the white noise received if there is no station on the dial. Standing on the mountains along the Rhine valley I should be able to receive at last the 4 AFN stations in Frankfurt, Heidelberg, Mannheim and Stuttgart which are in line of sight. There are even many clues that the whole FM band may have been jammed and then filled with selected programs only. One clue is that there had never been interference between stations. And there was almost never a weak and noisy signal which changed due to the terrain while driving. Actually this jamming did not work consistently. In a couple of places I sometimes had received French stations and AFN during these 18 years. Despite these places being quite unsuitable to receive either French programs or AFN due to the terrain. But as well unsuitable for the jamming equipment making it possible for these enemy stations to get through. Related to this jamming seems to be the fact that the antennas of our cars constantly had been broken off during the last years. Remarkably only the upper half so we did not replace them during lo ng periods of time. If a jamming signal is introduced into the antenna using transmitters with directional antennas or preferably laser techniques producing suitable beats, the antenna emits a part of the interfering signal, making it possible to measure this signal at some distance. This signal may even jam radios in adjacent cars. If the antenna is shortened by breaking it off, the amount of energy being re-emitted is reduced.
As we still lived in North Rhine-Westfalia I almost only listened to BFBS, the program of the English army. Obviously some German stations are being blocked as well, which of course is not so conspicuous as blocking all foreign language stations. One station that had certainly been blocked is Radio Energy. When I stayed in Berlin during the second half of 2006 I often parked near some embassies in the city center. There I listened to the programme of Radio Energy. I was astonished when I heard persons from Pforzheim calling this station on the phone. Because I had never received this station being in Pforzheim during the preceding 15 years. Not even during the several hundred times I drove there to show the measurement of the illegal radar surveillance. Short wave transmissions are being jammed as well. The following recording had been made in summer of 2007 in Straubenhardt. As during the cold war censorship is still openly carried out…” (Torture, Brainwashing and Murder in Germany)
electromagnetic field – “…According to the techniques published, one would expect a high resolution laser beam being split into two. One of these laser beams would run through a pockels cell where a synthesizer generated microwave signal would be added. This microwave signal would be asymmetric. Additionally it would be a spread spectrum signal, meaning that its frequency would change very fast over several Ghz. The interaction of these two laser beams produces beats in the microwave range. As a result we have a high resolution and highly directional beam of an asymmetric electromagnetic field in the microwave range which then produces a low frequency current which can imitate the natural currents of the nerves. The target area is then scanned with this high resolution beam. Such beats in the microwave range penetrate an obstacle just like any radio frequency signal of the same frequency. With this technique it is quite difficult to directly measure the beam due to the spread spectrum signal. Even with the proper measuring equipment it should be possible to shoot right around the sensors due to the very high resolution achievable with a laser. Other possibilities are jamming the sensors or using additional laser radiation which causes destructive interference of the electromagnetic waves within the sensor, nulling the effect of the laser signal on this sensor. Promising could be direct measurement of the currents on the surface, or better by electrodes within the body and comparing them with the natural body currents. Another possibility could be to use additional radiation of one or several suitable wavelengths which then interact with the radiation of the laser weapon to produce either beats or harmonics in a spectrum visible to the eye or cameras.
A little bit of smoke would then reveal the path and origin of such a radiation used as weapon. The generation of beats or harmonics can be used in shielding techniques as well. If additional radiation of a suitable wave length is overlaying or heterodyning the relatively low frequency beats of a laser weapon, harmonics can be generated in a frequency range which can not penetrate a certain barrier. An electromagnetic field causes atoms and molecules to move in time with the field. If the frequency of the electromagnetic field is low this movement of the atoms is slow as well, consuming relatively little of the energy being transmitted by the electromagnetic field. This allows microwave signals as well as electromagnetic beats in the microwave range to penetrate walls. If high frequency, for example infrared radiation, is overlaying the low frequency microwave signal, this heterodyning causes harmonics in the infrared region. These high frequency electromagnetic harmonics, like infrared radiation, are moving the atoms and molecules in time with their high frequency. These fast movements of atoms and molecules enforced by the harmonics or electromagnetic radiation are consuming the energy very fast, resulting in the radiation being shielded by converting it into heat. (Torture, Brainwashing and Murder in Germany)
political secret service – “…The German Bundesnachrichtendienst ( BND ) is a direct successor of GESTAPO and SS. From the very beginning in 1946, then termed Organisation Gehlen, the BND operated according to the same principles. These principles are published with regard to the GESTAPO. The GESTAPO ( Geheime Staatspolizei, Secret State Police ) being the political secret service of the third Reich persecuted all political activities regarded as illegal by the state. Additionally the GESTAPO fought preventively against real or alleged dissidents of the third Reich. The GESTAPO operated within the Reich and the occupied territories without being submitted to law and justice and without being effectively controlled in any way by a superior organization of the state. The GESTAPO used “preventive arrest” ( Schutzhaft ) in prisons and concentration camps, torture termed “severe interrogation” ( Verschärfte Vernehmung ), of course without seeking any information and execution termed “special treatment” ( Sonderbehandlung ). The GESTAPO was charged with the guarding of foreign workers and prisoners of war. The GESTAPO operated forced labour camps for reeducation and took part in the deportation and assassination of the Jews and Gipsies. The notorious Einsatzgruppen had been organized by the GESTAPO and killed approximately 2 000 000 persons in eastern Europe on the spot, without referring them to concentration camps. The GESTAPO, today renamed BND, after only one year of pause continued their violent suppression of any opposition in 1946. Today the BND operates according to the same principles, not being submitted to law and justice or being controlled in another suitable way. This must not be forgotten while reading this text and watching the films documenting torture, brainwashing and steering by the BND. During the 5 years our web page was operated we also made public its existence through a large number of publications in the world wide web as well as by being personally present in public where we often showed the measurement of radar pulses as is documented on numerous photographs…” (Torture, Brainwashing and Murder in Germany)
(Wikepedia).
Official Web-site: Martin Bott
You Tube: MartinBottD75334’s Channel
Bernd Seiffert: Psychiatry tortures part 1 (Video)
The Petition – Ban Electronic Warfare On Civilians
Categories: articles, blog post, news Tags: audio recording, bodily harm, Canada, canadian human rights, crime against humanity, Criminal Code of Canada, Criminal Harassments, Criminal Negligence, CSIS Act, direct energy weapons, electronic harassments, genocide, hate crime, human rightrs violations, Illegal, law, legislations, Martin Bott, organized stalking, perpetrator, physical assault, Privacy, Privacy Act, sociopath, targeted individuals, torture, uttering threats, videotaping, voice to skull, voyager
Tracy Givens Richard of Port Alberni
|
cc/2019-30/en_middle_0056.json.gz/line12553
|
__label__wiki
| 0.717997
| 0.717997
|
Richard Spencer becomes acting defense secretary while Mark Esper goes through Senate confirmation
The French just made a great case for outfitting soldiers with 'flyboards'
A lawmaker wants to know if the Pentagon ever exposed the American public to ticks infected with bioweapons
Getting Cheated On Is A Serious Hazard To Your Health, Says Science
Here comes Jody, on his way to steal your girl, clog your arteries, and plasticize your liver.
Ever had that sinking feeling downrange, when the care packages and emails dry up, that your significant other is doin’ the do while you’re embracing the suck? Well, guess what, buttercup: Crying into your dopp kit over boo’s infidelities could wreck your PFT score, bodily functions, and longevity on this mortal coil.
Related: A Brief History Of Jody, The Original ‘Mr Steal Your Girl’ »
That’s science, buddy, according to a new study in the Journal of Social and Personal Relationships, coauthored by doctoral student M. Rosie Shrout of the University of Nevada, Reno, and flagged recently by Eric Dolan of PsyPost. Dolan explains:
For their study, the researchers surveyed 232 college students who had been cheated on within the past three months…
“As we expected, people who experienced more emotional and psychological distress after being cheated on engaged in more risky behaviors,” Shrout told PsyPost. “They were more likely to eat less or not eat at all, use alcohol or marijuana more often, have sex under the influence of drugs or alcohol, or over-exercise. Being cheated on seems to not only have mental health consequences, but also increases risky behaviors.”
Shocker, right? But here are three more freaky facts for you:
Getting cheated on can wreck a woman’s well-being the most. “We think this is because women typically place higher importance on the relationship as a source of self and identity,” Shrout told PsyPost. “As a result, women who have been cheated on might be more likely to have poorer mental health and engage in unhealthy, risky behavior because their self-perceptions have been damaged.”
Youth sucks. These study subjects were a bunch of early 20-somethings, who admittedly suck at coping with adversity or handling liquor. But they also tend not to have the stablest relationships to begin with. What happens when you look at slightly older folks who got cucked out of a long partnership or marriage? That’s what the researchers want to find out next.
Know what helps? Blaming the cheater. People who “blamed themselves for their partner cheating, such as feeling like it was their fault or they could have stopped it, were more likely to engage in risky behaviors,” Shrout told PsyPost. “However, blaming their partner for cheating was not directly related to risky behavior involvement. It was interesting to find that these effects were stronger for women than men.”
So if you’re gonna get dropped like a leaky just-microwaved Hot Pocket, be an asshole about it. It sucks for everyone around you, but apparently it’s good for your health. Snowflake.
breakups deployment breakups Fitness health personal life relationships self-care
Flickr/denharsh
who is running dod today?
Navy Secretary Richard Spencer took the reins at the Pentagon on Monday, becoming the third acting defense secretary since January.
Spencer is expected to temporarily lead the Pentagon while the Senate considers Army Secretary Mark Esper's nomination to succeed James Mattis as defense secretary. The Senate officially received Esper's nomination on Monday.
richard spencer mark esper defense secretary who is running dod today?
mon dieu!
U.S. Special Operations Command may be on the verge of making the dream of flying infantry soldiers a reality, but the French may very well beat them to it.
On Sunday, French President Emmanuel Macron shared an unusual video showing a man on a flying platform — widely characterized as a "hoverboard" — maneuvering through the skies above the Bastille Day celebrations in Paris armed with what appears to be a dummy firearm.
The video was accompanied with a simple message of "Fier de notre armée, moderne et innovante," which translates to "proud of our army, modern and innovative," suggesting that the French Armed Forces may be eyeing the unusual vehicle for potential military applications.
franky zapata news hoverboards military tech how the other half fights french armed forces u.s. special operations forces emmanuel macron flyboard flyboard air aerial mobility system mon dieu!
(New Jersey National Guard photo by Mark C. Olsen)
If you've ever wondered if the Pentagon has ever exposed the American public to ticks infected with biological weapons, you're not alone.
Rep. Christopher Smith (R-N.J.) authored an amendment to the House version of the Fiscal 2020 National Defense Authorization Act would require the Defense Department Inspector General's Office to find out if the U.S. military experimented with using ticks and other insects as biological weapons between 1950 and 1975.
If such experiments took place, the amendment would require the inspector general's office to tell lawmakers if any of the ticks or other bugs "were released outside of any laboratory by accident or experiment design."
biological warfare ticks don't fear the reaper news politics policy military tech
give him one!
There's no one path to military service. For some, it's a lifelong goal, for others, it's a choice made in an instant.
For 27-year-old Marine Pvt. Atiqullah Assadi, who graduated from Marine Corps bootcamp on July 12, the decision to enlist was the culmination of a journey that began when he and his family were forced to flee their home in Afghanistan.
atiqullah assadi marine corps reconaissance recon taliban afghanistan give him one! u.s. marine corps joining the military
(Facebook photo)
The Air Force has administratively separated the Nellis Air Force Base sergeant who was investigated for making racist comments about her subordinates in a video that went viral last year, Task & Purpose has learned.
u.s. air force geraldine lovely nellis air force base racism news the blotter the blotterr
|
cc/2019-30/en_middle_0056.json.gz/line12554
|
__label__wiki
| 0.833234
| 0.833234
|
Kajuru attacks displaces 3,000 people, reconciliation committee underway – Chairman
March 16, 2019 UD News Comments Off on Kajuru attacks displaces 3,000 people, reconciliation committee underway – Chairman
By Philip Yatai
Kajuru (Kaduna State) – No fewer than 3,000 people were displaced by the recent attacks on some communities by unknown gunmen in Kajuru Local Government Area of Kaduna State, the Council Chairman, Mr Cafra Caino has said.
Addressing a news conference in Kajuru on Friday, Caino said that steps have been taken to address the incessant attacks and wanton killings by hoodlums and criminals in the area.
He said that the local government held a stakeholders Security Summit on Thursday, attended by sons and daughters of the council to find lasting solution to the bloody crises affecting the area.
The council chairman said that the people, including the Adara, Hausa and the Fulanis, in a communique issued after the summit, noted that there was the need for continuous consultations with stakeholders for lasting peace.
“The people, who agreed to live in peace and harmony with one another, also noted the need for more security intelligence gathering in the area.
“They have also agreed that a truth and reconciliation committee be established to receive memorandum from all the people living in the LGA on what is causing the crises and the way forward.
“The people equally took a collective step to ensure seize fire in all communities affected in the crises and called on the state government to ensure equity and fairness to all people in the LGA.
“They equally resolved that incessant killings and burning of houses and properties must be stopped, and to also hold quarterly stakeholder’s security meetings as mitigation measures.”
According to Caino, the use of social media to send fake news about the crises also aggravated the crises rather than helping to restore peace in the area.
He equally identified lack of good road network and telecommunication networks in most interior communities of the LGA as challenges to security in the area.
Caino thanked Gov. Nasir El-Rufa’i, security agencies and State Emergency Management Agency for their prompt response, intervention and support, adding that support from National Emergency Management Agency was still being expected
The News Agency of Nigeria (NAN) reports that since Feb. 10 there has been attacks and reprisal attacks in some communities in Kajuru LGA that led to several deaths, including women and children.
El-Rufa’i had on March 2, announced plans to set up a judicial commission of inquiry into the killings in Kajuru and Kachia Local Government Areas of the state (NAN)
|
cc/2019-30/en_middle_0056.json.gz/line12561
|
__label__cc
| 0.666506
| 0.333494
|
Can a single model explain both breast cancer and prostate cancer?
A Edward Friedman1Email author
© Friedman; licensee BioMed Central Ltd. 2007
The Estradiol-Dihydrotestosterone model of prostate cancer (PC) showed how the interaction of hormones with specific hormone receptors affected apoptosis. The same hormone can produce different effects, depending on which hormone receptor it interacts with.
This model proposes that the first step in the development of most PC and breast cancer (BC) occurs when aromatase converts testosterone to estradiol (E2). A sufficiently high enough local level of E2 results in telomerase activity. The telomerase activity allows cell division and may lead to BC or PC, which will proliferate if the rate of cell division is greater than the rate of cell death. The effect of hormones on their hormone receptors will affect the rate of cell death and determine whether or not the cancer proliferates.
By minimizing bcl-2 and maximizing apoptotic proteins, new systemic treatments for BC and PC can be developed that may be more effective than existing treatments.
Androgen Deprivation Therapy
Apoptotic Protein
Androgen Ablation
The Estradiol-Dihydrotestosterone (E-D) model [1] of prostate cancer (PC) describes how PC works at the level of hormone receptors. In this model, no hormone is "good" or "bad", but the effect of each hormone is determined by its interaction with its hormone receptors. Each hormone receptor has an effect on apoptosis, or programmed cell death. Table 1 summarizes this model, with ↑ representing upregulation and ↓ representing downregulation. Although the exact mechanism of how the intracellular androgen receptor (iAR) is able to counter the effects of the membrane androgen receptor (mAR) is not known, for diagrammatic purposes, the process is represented in Table 1 as downregulation. This model can be expanded and extended to encompass breast cancer (BC) as well.
E-D model of prostate cancer
Hormone receptor
Membrane androgen receptor
↑apoptotic proteins
↑bcl-2
↑calreticulin
Intracellular androgen receptor
↓apoptotic proteins
↓bcl-2
Estrogen receptor-αβ heterodimer
↑telomerase activity
Estrogen receptor-α
Estrogen receptor-β
Aromatase (Aro) is an enzyme which converts testosterone (T) to estradiol (E2). If the Aro activity is high enough, a process is started that may result in BC or PC. High local levels of E2 result in human telomerase production and activity. If the rate of growth (RG) is greater than the rate of cell death (RD), then these cells will proliferate and cancer may result. Telomerase activity was sufficient to transform human cell lines that ordinarily have limited life spans into immortalized cell lines [2].
This model makes the assumption that the effects of hormones on hormone receptors are the same for BC and PC unless there is evidence to the contrary. Table 2 shows the properties of the hormone receptors as proposed in the extended E-D model.
Extended E-D model of breast cancer and prostate cancer
↓bcl-2 (BC only)
↑bcl-2 (PC only)
↓AS3
↑Ca++ influx
↑AS3
↓Ca++ influx
↑telomerase activity (PC only)
Estrogen receptor-α homodimer
Membrane estrogen receptor
Progesterone receptor A
Progesterone receptor B
Membrane progesterone receptor
E2 upregulated both human telomerase mRNA and human telomerase activity in normal prostate epithelial cells, benign prostate hyperplasia, and the PC cell lines LNCaP, DU145, and PC-3 [3]. In the presence of E2, a vector that resulted in the overproduction of estrogen receptor-α (ER-α) showed an increase in telomerase promoter activity for PC and for the BC cell line MCF-7. However, in the presence of E2, a vector that resulted in the overproduction of ER-β showed an increase in telomerase promoter activity in PC, but not in BC. Increasing ER-α would result in an increase in ER-α homodimers, a decrease in ER-β homodimers, and an increase in ER-αβ heterodimers. Similarly, increasing ER-β would result in an increase in ER-β homodimers, a decrease in ER-α homodimers, and an increase in ER-αβ heterodimers. This is all consistent with ER-αβ heterodimers upregulating telomerase activity in prostate epithelial cells and PC. However, another possibility is that both ER-α homodimers and ER-β homodimers upregulate telomerase activity. If heterodimers were not involved, then ER-α should not be needed to increase telomerase activity. However, mice lacking ER-α do not develop PC [4]. Assuming that the reason for this is that without ER-α, no telomerase activity could occur in the prostate epithelial cells, then this would be consistent with ER-αβ heterodimers upregulating telomerase activity. It is still possible that ER-α homodimers could upregulate telomerase activity as well. When 4-hydroxytamoxifen (OHT) was added to LNCaP cells transfected with the expression vector for ER-α, telomerase activity was upregulated, but not when transfected with the expression vector for ER-β instead [3]. This is consistent with OHT upregulating telomerase activity in PC by acting as an agonist for ER-α homodimers. The extended E-D model takes the view that ER-α homodimers are responsible for the increase in telomerase activity in BC and PC because if ER-α receptors alone were able to increase telomerase activity, then ordinary levels of E2 might lead to telomerase activity. The important point is that for both BC and PC, a local increase in the level of E2 results in an increase in telomerase activity.
One of the requirements for any cancer to grow is limitless replicative potential [5]. Ordinarily, cells are capable of a limited number of divisions due to their telomere length, which shortens following each division. Cell division in the absence of sufficient telomere length usually results in senescence or apoptosis due to accumulation of the apoptotic protein p53 [6]. Mutations in p53 allow cell division to occur in the absence of sufficient telomere length, but usually result in chromosomal instability that may lead to carcinogenesis [7]. Telomeres can be lengthened by telomerase activity or by alternative lengthening of telomeres (ALT) [8]. Telomerase activity has been found in 90% of prostate carcinomas and 88% of ductal and lobular breast carcinomas [9]. This is consistent with telomerase activity being one of the first steps in almost all BC and PC. Those without telomerase activity would be expected to have ALT or mutations in p53.
In disease-free breast adipose tissue, Aro activity is usually expressed at low levels due to promoter I.4 [10]. In adipose tissue of BC, Aro activity is much higher due to the presence of promoters I.3 and II. Cyclic adenosine 3',5'-monophosphate (cAMP) analogues switch the promoters to I.3 and II for human adipose fibroblasts (HAFs) [11]. Exposing HAFs to BC cell-conditioned medium induced promoter II activity in a process independent of cAMP [10]. Cell-conditioned media of normal breast epithelial cells, liver cancer cells, and PC cells all failed to induce promoter II activity in HAFs. This is consistent with one or more factors found in BC being responsible for the increased Aro activity in HAFs. E2 was found in significantly higher concentrations in BC than in normal breast tissue [12]. The level of E2 found in the BC of postmenopausal women was similar to that found in the BC of premenopausal women. The local level of E2 was 10 times higher for BC in postmenopausal women than the level found in their blood plasma or normal breast tissue [13]. This is consistent with most BC starting due to the production of one or more factors in the breast epithelial cells which have the capability of inducing promoter II activity in the surrounding adipose tissue. More research is needed to discover how promoter I.3 activity is induced and to learn what factors are responsible for inducing promoter II activity.
Aro activity was not observed [14] in normal prostate epithelial cells, but was observed in the PC cell lines LNCaP, DU145, and PC-3. The level of Aro activity in PC was in the same range as Aro activity in BC. Mice lacking the Aro gene never develop PC. Also, Aro activity was detected [15] in three of four PC tumors that were tested. The occasional PC tumor lacking Aro activity can be explained by the PC having ALT, mutated p53, or a mutation that promotes telomerase activity without requiring Aro activity. These findings are consistent with most PC starting due to the permanent activation of the Aro gene.
ER-α and ER-β are known to tend to counteract each other [16]. E2 increased the production of bcl-2 in MCF-7 [17], an ER-α positive cell line of BC. This increase was negated by the addition of OHT, a known antagonist to ER-α in breast tissue [18]. This is consistent with ER-α being responsible for upregulating bcl-2. By applying the principle of ER-β acting in opposition to ER-α, then ER-β should downregulate bcl-2 in BC.
Mice with a genetic mutation that knocks out ER-β have an overexpression of bcl-2 in their ventral prostate [19]. This is consistent with ER-β downregulating bcl-2 in PC. In accordance with the principle of ER-α acting in opposition to ER-β, then ER-α should upregulate bcl-2 in PC.
Membrane estrogen receptor (mER) upregulated bcl-2 in the BC line T47D [20]. All of the above is consistent with mER and ER-α upregulating bcl-2 and ER-β downregulating bcl-2. More research is needed on the specific hormone receptors to verify and to quantify these findings.
Mifepristone (RU-486), a drug that is antagonistic to progesterone receptor A (PRA), decreased bcl-2 production in LNCaP [21], an androgen dependent PC (ADPC) cell line. Production of bcl-2 was decreased even further when progesterone (P) was added in addition to RU-486. This is consistent with PRA upregulating bcl-2 and either progesterone receptor B (PRB), membrane progesterone receptor (mPR), or both, downregulating bcl-2. However, further experiments must be done on other cell lines, since LNCaP has been shown to have mutated iAR that binds to P [22] and iAR downregulates bcl-2. The extended E-D model takes the view that both PRB and mPR downregulate bcl-2 in PC, but further experimentation must be done to verify this.
The mutations BRCA1 and BRCA2 have a striking lack of PRB expression in normal breast cells [23]. BRCA1 mutations result in an increased chance of developing BC for women, but not men, and an increased chance of developing PC for men. BRCA2 mutations result in an increased chance of developing BC for men and for women and an increased chance of developing PC for men [24]. According to the extended E-D model, the decreased amount of PRB should result in decreased downregulation of bcl-2, resulting in higher levels of bcl-2 being present. While this would not in itself cause BC or PC, it does increase the likelihood that RG > RD if an initial cancer cell arises.
The fact that men with BRCA1 mutations do not have an increased chance of developing BC can be explained by the decreased downregulation of bcl-2 that results from the loss of PRB being offset by men's high levels of T which results in both mAR and iAR significantly downregulating bcl-2. If a high enough level of T is present, it is possible that no net increase in bcl-2 would occur in spite of the absence of PRB. In PC, high levels of T end up with iAR downregulating bcl-2, but with mAR upregulating bcl-2, which results in more bcl-2 being present than is the case for BC. Since women have a much lower level of T than men do, the increase in bcl-2 that results from the loss of PRB would probably not be offset by the downregulation of bcl-2 by the androgen receptors. This is consistent with BRCA1 increasing the level of bcl-2 in the breast tissue of women but not of men. Since BRCA2 mutations increase the chance of developing BC for both men and women, this implies that there is another factor present in BRCA2 mutations which decreases RD or increases RG in addition to the elimination of PRB. Further research is needed to clarify this point.
Mice which were BRCA1/p53 deficient all developed BC, unless they were treated with RU-486, in which case none of the mice developed BC [25]. This is consistent with bcl-2 production increasing in response to P for BRCA1 mutations due to PRA upregulating bcl-2 and the absence of PRB downregulating bcl-2. Therefore, the fact that BC proliferated in the absence of PRB means that RG > RD. The fact that RU-486 prevented BC development is consistent with mPR downregulating bcl-2. This is because in the presence of RU-486, there is no PRA or PRB available for P to bind to, and since this prevents BC, then RG < RD. If mPR upregulated bcl-2, then P would have caused an increase in bcl-2, which might have resulted in some of the mice developing BC if RD became low enough. Assuming mPR downregulates bcl-2, but not as strongly as PRA upregulates bcl-2, then in the absence of RU-486, P would have resulted in an increase in bcl-2 and therefore an increased incidence of BC due to the decrease in RD, whereas in the presence of RU-486, P would have resulted in a decrease in bcl-2 and therefore a decreased incidence of BC due to the increase in RD, which what was in fact observed. Also, it is likely that the combined BRCA1/p53 deficiency still resulted in the same number of initial BC cells arising in all of the mice, but since RG < RD in the presence of RU-486, the BC was unable to proliferate.
The inferences drawn by combining the above experiments are consistent with the conclusion of the extended E-D model that PRA upregulates bcl-2, whereas PRB and mPR downregulate bcl-2. However, further testing is needed to conclusively prove these points.
By using T-BSA, which is known to bind to mAR but not to iAR, it was shown that mAR upregulates [26] bcl-2 in PC, but downregulates [20] it in BC. mAR upregulated the apoptotic protein Bad in BC [20] and Fas in PC [26]. Also, upregulation of the apoptotic proteins U19 and ALP1 in PC has been attributed to mAR due to the rapidity of their production immediately after androgen deprivation therapy (ADT) is ended [1]. For both BC and PC, flutamide, an antagonist of iAR, was used as a control. The effect of T-BSA on mAR was the same in the presence and in the absence of flutamide, further confirming that T-BSA bound to mAR but not to iAR. In both BC and PC, mAR exhibited rapid steroid effects typical of non-genomic steroid hormone actions, whereas iAR exhibited the slow effects typical of genomic steroid hormone actions, which typically take hours.
5α-dihydrotestosterone (DHT) downregulated bcl-2 in the PC cell line LNCaP-FGC [27] and in the BC cell line ZR-75-1 [28]. This downregulation disappeared when an antagonist of iAR was added. All of this is consistent with iAR downregulating bcl-2.
Androgens inhibited cell proliferation in the BC cell line MCF7-AR1 [29], which has approximately five times more iAR than the BC cell line MCF7 does. In the presence of androgens plus bicalutamide, an antagonist to iAR, no inhibition of cell proliferation was observed. Androgens upregulated AS3, a protein which shuts off cell proliferation, in MCF7-AR1 [30]. This is consistent with iAR upregulating AS3.
The PC cell line LNCaP-FGC has high levels of iAR [31]. High physiological levels of androgens caused proliferative shutoff of LNCaP-FGC [30]. There was a strong correlation between this proliferative shutoff and AS3 expression. The PC cell line LNCaP 104-R2 had its growth inhibited by T, but stimulated by T plus finasteride (F) [32]. F inhibits 5-α reductase type II (5AR2), which is an enzyme that converts T to DHT. LNCaP 104-R2 also has high levels of iAR [33]. This is all consistent with iAR upregulating AS3 in BC and PC. If mAR downregulates AS3, and ordinarily there is a balance between iAR and mAR, then it would require an imbalance that results in an overexpression of iAR with regards to mAR in order for AS3 to be upregulated. This would explain why LNCaP 104-R2 upregulated AS3 after being exposed to T. The high levels of iAR would have created the imbalance that led to AS3 being upregulated. When F was added, DHT conversion from T was blocked, so instead of DHT, T became the ligand for iAR. Since T binds to iAR with an affinity five times less than that of DHT [34], the necessary imbalance was no longer present and inhibition of growth no longer occurred. Further research is needed to determine exactly what effect mAR has on AS3 production.
Calcium ion (Ca++) influx increased when T-BSA was added to PC cells [35]. The observed increase in Ca++ influx is consistent with mAR upregulating Ca++ influx, since T-BSA binds to mAR but not to iAR. The fact that T-BSA caused Ca++ influx, whereas T does not, is consistent with iAR downregulating Ca++ influx. Ca++ influx also occurs during ADT [36]. If the absence of androgen allows Ca++ influx to occur, then it is likely that one or more proteins are responsible for preventing Ca++ influx. This is consistent with iAR upregulating proteins which are responsible for preventing Ca++ influx.
Calreticulin (Cal) is a protein that binds to Ca++ and prevents apoptosis due to Ca++ overload. In the E-D model, the position was taken that Cal was upregulated by mAR, however, in the extended E-D model, the position is that Cal is upregulated by iAR. In the fully grown prostate, F slightly inhibited Cal production [37], which is consistent with iAR upregulating Cal. It is not clear what the affinity of T-BSA, T, or DHT is to mAR, but equal concentrations of these hormones resulted in identical levels of apoptosis in the PC cell line DU145 after 24 hours [26]. This is consistent with T and DHT binding to mAR with somewhat similar affinities, but further research is needed. Since DHT binds with greater affinity than T to iAR, then the decrease in Cal production in the presence of F is consistent with iAR upregulating Cal. Further research is needed to determine what effect mAR has on Cal regulation.
In designing protocols for preventing BC and PC, every effort should be made to avoid potential long term side effects, while still increasing RD as much as possible, so that RG < RD for any early stage cancer cells that may already be present. This means that, for safety concerns, no drugs should be used which block hormone receptors, since, until proven otherwise, it must be assumed that every hormone receptor has some purpose in the overall health of the body. Also, hormone levels should be kept within their physiological limits until evidence is produced that shows that it is safe to go outside of those limits. Within these constraints, the goal is to maximize the production of apoptotic proteins upregulated by mAR and to minimize the production of bcl-2.
One way to minimize bcl-2 production would be to maximize the activity of PRB and mPR while minimizing the activity of PRA. However, since no hormone has yet been discovered that does this, then P has to be considered instead. P should be increased to the maximum safe physiological amount appropriate for the gender of the individual being treated, unless testing shows a genetic makeup that results in an increase in bcl-2 in the breast or prostate epithelial cells in response to P, such as in the case of BRCA1 or BRCA2 mutations.
Another way to minimize Bcl-2 would be by using a hormone that binds preferentially to ER-β over ER-α and mER. Estriol (E3) has an affinity for ER-β which is 3.5 times greater than for ER-α, E2 has an equal affinity for ER-α and ER-β, and estrone has an affinity for ER-α which is 5 times greater than for ER-β[38]. This is consistent with E3 being the preferred ligand for ER-β. However, E3 binds to ER-β only 35% as strongly as E2 does. More research is needed to determine whether E3, possibly in combination with a drug to block Aro in order to minimize the local level of E2, would be helpful or not.
In order to maximize the production of apoptotic proteins upregulated by mAR, binding to mAR should be increased as much as possible and binding to iAR should be decreased as much as possible. Since T and DHT seem to have similar affinities to mAR, whereas DHT has an affinity to iAR which is five times greater than T, then high T and low DHT (HTLD) should create the desired imbalance. Therefore, the serum level of bioavailable T should be increased to the maximum safe physiological level appropriate for the gender of the individual being treated, while the serum level of DHT should be decreased to the minimum physiological level necessary for maintaining good health. Since T can be converted to E2 by Aro, the level of E2 should be monitored and kept within normal or low normal physiological levels. In addition to increasing the apoptotic proteins upregulated by mAR, this protocol should increase Ca++ influx and decrease Cal production, all of which should increase RD.
When LNCaP tumors were transplanted into nude mice, four weeks of T-BSA administration resulted in a 60% reduction in tumor volume when compared to BSA administration alone [26]. Also, when LNCaP tumors were transplanted into nude mice, treatment with T plus F following intermittent androgen ablation resulted in no change or a decrease in tumor volume for 41% of the mice, as compared to 10% of the mice treated with T alone [39]. This is consistent with the greatest increase in RD occurring after full agonism of mAR along with no agonism of iAR. However, if there is a great amount of agonism of mAR along with a small amount of agonism of iAR, then there would still be an increase in RD for PC if the imbalance in the binding to the androgen receptors is great enough. Using F to prevent DHT creates such an imbalance, since T has an affinity which is five times less than that of DHT to iAR. This raises the possibility that HTLD would result in RG < RD for most early stage BC or PC cells.
The active metabolite of vitamin D is 1,25(OH)2D3 (calcitriol). When calcitriol bound to the vitamin D receptor (VDR), it inhibited growth and upregulated AS3 in a number of PC cell lines [40] and increased cell death in BC [41] and PC [42]. Calcitriol caused cell death primarily by a caspase-independent mitochondrial pathway in BC [41] and in PC [42]. Also, bcl-2 inhibited the cell death caused by calcitriol in BC [41] and in PC [42]. In some PC cell lines, bicalutamide repressed the inhibition in growth and upregulation of AS3 cause by calcitriol [40]. This is consistent with the upregulation of AS3 by calcitriol being dependent on properly functioning iAR. As part of the prevention protocol, the serum level of calcitriol should be increased to the maximum safe physiological level. This may decrease RG in BC and PC, and if the level of bcl-2 is low enough, may increase RD.
HTLD will have different effects with regards to bcl-2 production for BC and PC. For BC, the increased amount of T binding to mAR will result in a decrease in bcl-2 due to increased downregulation. However, the decreased amount of DHT binding to iAR will result in less downregulation of bcl-2 production and therefore an increase in bcl-2. Therefore, there should not be a dramatic increase in bcl-2 for BC as a result of HTLD.
For PC, however, the increased amount of T binding to mAR will result in an increase in bcl-2 due to increased upregulation and the decreased amount of DHT binding to iAR will also result in an increase in bcl-2 due to decreased downregulation. Therefore, for preventing PC, more care must be used to decrease bcl-2 in other ways, if possible. Also, large quantities of foods which contain components which bind to ER-β with less than full agonism should be avoided. This is because such components might interfere with E2 binding to ER-β and thus reduce the downregulation of bcl-2. For example, genistein, the main isoflavone found in soy, increased bcl-2 in the BC cell line MCF-7 [43].
Anecdotally, some men with PC who were taking 5AR2 inhibitors following ADT exhibited consistent increases in PSA values associated with the introduction of large doses of genistein, soy, tofu, modified citrus pectin, or flaxseed into a pre-existing diet. Often this change in PSA trajectory could be reversed by stopping that nutritional product [44]. This is consistent with the use of 5AR2 inhibitors resulting in an increase in bcl-2 as well as a decrease in the downregulation of apoptotic proteins upregulated by mAR. Ordinarily, the decrease in the downregulation of apoptotic proteins has more of an effect than the increase in bcl-2, as evidenced by the apoptotic effect of T-BSA. However, if large amounts of food are ingested which bind preferentially to ER-β, then the overall increase in bcl-2 may decrease RD more than the apoptotic proteins increase RD. This would be expressed by a more rapid population growth, which would account for the observed increase in PSA for those men taking 5AR2 inhibitors. Pharmacological amounts of genistein induced apoptosis in PC cell lines by a process independent of its binding to estrogen receptors [45]. Therefore, it is likely that physiological amounts of genistein increase RD to some extent. However, when 5AR2 inhibitors are used in conjunction with genistein, the overall increase in bcl-2 that results may more than offset the anticancer effects of genistein, if any PC cells are already present. If no PC cells are present, then ingesting phytoestrogens should help prevent PC, since the phytoestrogens should interfere to some degree with the ability of E2 to upregulate telomerase. Pharmacological levels of genistein did suppress telomerase activity in the PC cell lines LNCaP and DU-145 [46].
Although in using the HTLD protocol for preventing PC, the hormones would be kept within physiological levels, there is still the possibility that long term use of this protocol may have some health consequences unrelated to PC. Lean elderly men and women who have Alzheimer's disease (AD) had lower bioavailable levels of T than those without AD [47]. This might be due to AD causing a drop in the level of bioavailable T, or by the low bioavailable level of T increasing the likelihood of developing AD. T downregulated β-amyloid peptides in vitro [48], and β-amyloid is considered to be crucial in the pathogenesis of AD [49]. This increases the likelihood that the decreased levels of bioavailable T were responsible for the increased incidences of AD. If so, then the HTLD protocol for preventing BC and PC may also be helpful in preventing AD.
In a five year study for male veterans over 40 years of age, those with low levels of T had a mortality rate of 34.9% as compared to 20.1% for those with normal levels of T [50]. Low levels of T were defined as a level of total T below 250 ng/dL or a level of free T below 0.75 ng/dL. This raises the possibility that the HTLD protocol for preventing PC might also result in increased longevity for men. It is not yet known what the relationship between T and longevity is for women. More research is needed to fully identify all beneficial and detrimental effects that may result from using the HTLD protocol in men and in women.
In summary, the protocol for preventing both BC and PC involves obtaining gender appropriate maximum safe physiological levels of bioavailable T, maximum safe physiological level of calcitriol, minimum safe physiological level of DHT and normal level of E2. Maximum safe physiological levels of P should be added except for those individuals whose genetic makeup would not benefit from P. If further research should determine that E3 is helpful, then maximum safe physiological levels of E3 should be added. Also, ingesting large quantities of foods which are known to bind to ER-β with less than full agonism should be avoided. Other factors, such as nutritional supplements or lifestyle changes which are shown to reduce the incidence of BC and PC, can also be included. Table 3 shows the effects of the HTLD protocol.
HTLD Protocol
↑ RD
↓ RD
↑ RG
Low DHT
↓calreticulin
High P
↓bcl-2 (favorable genetics)
High calcitriol
↑kill mitochondria
↓ RG
Lowering phytoestrogens
It is possible that the HTLD protocol might be ineffective or even harmful depending on the mutations that may be in some of the BC or PC already present. For example, if there is a mutation in PC that prevents mAR from upregulating apoptotic proteins but still allows it to upregulate bcl-2, then the HTLD protocol would be harmful. The earlier this protocol is started, the less likely that any such adverse mutations would be present.
An alternative strategy for prevention would involve all of the steps listed above, but in place of maximizing the upregulation of apoptotic proteins by mAR through HTLD, instead minimize the amount of bcl-2 present and rely on the high serum level of calcitriol to maximize apoptosis. For BC, the gender appropriate maximum physiological level of bioavailable T and DHT or high T and high D (HTHD) would reduce the production of bcl-2 in comparison to HTLD, since DHT downregulates bcl-2. This decrease in bcl-2 should increase the likelihood that calcitriol would increase RD. However, it would also eliminate the imbalance that should upregulate the apoptotic proteins associated with mAR, which should result in a decrease in RD. Further research is needed to determine whether HTLD or HTHD is more effective in preventing BC. For HTHD, there is no need to avoid ingesting phytoestrogens, since no 5AR2 inhibitors would be present and therefore no decrease in bcl-2. Table 4 shows the effects of the HTHD protocol.
HTHD Protocol
High DHT
For PC, the minimum safe physiological level of bioavailable T and the maximum safe physiological level of DHT or low T and high D (LTHD) should reduce bcl-2 even more than HTHD does, assuming that maximum agonism of mAR is not achieved with the maximum safe physiological level of DHT alone. This is because reducing the level of T would reduce the overall amount of androgen available to bind to mAR and mAR upregulates bcl-2 in PC. Further research is needed to determine whether HTLD or LTHD is more effective in preventing PC. Also, for LTHD there is no need to avoid ingesting phytoestrogens. Table 5 shows the effects of the LTHD protocol.
LTHD Protocol
Low T
↑bcl-2 (BC only)
↓bcl-2 (PC only)
When treating BC or PC systemically, the goal should be to minimize bcl-2 and to maximize apoptotic proteins, without regards to long term health risks. If the genetic makeup of the BC or PC were known, then treatments could be individually designed for optimal effectiveness. However, due to the heterogeneous nature of BC and PC, care must be taken to consider all possible mutations and, whenever possible, to avoid using any treatment that would ever decrease RD. Ideally, if the initial treatment is successful, then treatment can eventually be changed to one of the preventative protocols described previously.
Systemic hormonal manipulation is currently being used, to a limited extent, for both PC and BC. In PC, the form of systemic hormonal manipulation currently being used is ADT. During ADT, downregulation of Cal coupled with Ca++ influx may lead to apoptosis [36]. For prostate cells, the level of apoptosis in the absence of androgen is the same as that in the presence of androgen if ionophores are used to cause sufficiently high Ca++ influx [51]. In the absence of androgen, the increased amount of apoptosis could be reduced by up to 70% through the use of Ca++ channel blockers. This is all consistent with Ca++ overload being the cause of apoptosis during ADT. When ADT is administered, typically nothing is done to maximize the upregulation of apoptotic proteins or to maximize the downregulation of bcl-2.
For BC which has ER-α present, currently systemic hormonal manipulation is aimed at reducing the binding of E2 to ER-α. This is accomplished either by using tamoxifen, in order to block the binding to ER-α, or anastrozole, which is an antagonist to Aro, in order to reduce the amount of E2 present in the BC cells. In both cases, bcl-2 production should be reduced, since ER-α upregulates bcl-2. However, nothing is done to utilize any of the other hormone receptors to further reduce bcl-2 production and nothing is done to maximize the production of apoptotic proteins.
There are a number of options available in searching for the optimum treatment protocol. One consideration is whether or not localized treatment, such as surgery, should be done initially for BC or PC. It is known that if surgery does not remove all cancer cells, the remaining cancer cell population doubles at a quicker rate than it did before the surgery [52]. Increased angiogenesis is one of the proposed explanations for this. If this increased rate of population growth is shown to be at all due to an increase in RG, then it would be more difficult to use systemic treatment to achieve RG < RD following surgery. If systemic hormonal treatment can be shown to be sufficiently effective in early stage treatment, it is possible that localized treatment may not be necessary. However, systemic hormonal treatment must be continued indefinitely in case any BC or PC cells remain, whereas surgery has the possibility of being curative. There is also the possibility that surgery might remove cancer cells that have already mutated to the point that systemic treatment would be ineffective on them, so that surgery followed by systemic treatment might be successful whereas systemic treatment without surgery might be a failure. More research is needed to clarify this point.
Men with stage T1–T2 PC, with a mean prostate specific antigen (PSA) of 13.5, whose initial treatment was radical prostatectomy (RP) had a PC specific death rate of 4.6% and a 10.1% rate of distant metastases after a median of 6.2 years [53]. Men with stage T1–T3 PC, with a mean PSA of 11.1, whose initial treatment was 13 months of ADT utilizing a luteinizing hormone-releasing hormone agonist to reduce T production, plus an antiandrogen to block iAR, plus F to reduce DHT by inhibiting 5AR2, followed after those 13 months by continual F only, had a PC specific death rate of 0.6% [54] and a 0.6% rate of distant metastases [44] after a median of 6.2 years. All of the men in this study were told to avoid ingesting large amounts of phytoestrogens [44]. This raises the possibility that initial systemic treatment may be a viable alternative to local treatments for PC.
While this systemic treatment compares quite favourably with RP, it is possible to make improvements during ADT based on the extended E-D model. Maximum antagonism of mAR and iAR should be used. In order to obtain the lowest level of bcl-2 from the non-androgen receptors (LBNAR), maximum antagonism of ER-α, mER, and PRA should be used, as well as maximum agonism of ER-β, PRB, and mPR. P should be used only in the presence of a drug that blocks the conversion of P to T, since P is able to be converted to T [55]. Also, maximum agonism of VDR (MAV) should be used in order to increase RD by killing mitochondria.
Incorporating these modifications should minimize the amount of bcl-2 present while maintaining the apoptotic forces of ADT. Further research is needed to verify that the LBNAR protocol maintains Ca++ influx coupled with the absence of Cal which is known to occur in ADT without LBNAR. It is possible that some of the non-androgen receptors are involved in the regulation of Ca++ influx and Cal. For example, there is evidence [56] that mER upregulates Ca++ influx in the PC cell line LNCaP. Table 6 shows the effects of the enhanced ADT treatment.
Enhanced ADT Treatment
Maximum antagonism of mAR
Maximum antagonism of iAR
Maximum antagonism of ER-α
Maximum agonism of ER-β
Maximum antagonism of mER
Maximum antagonism of PRA
Maximum agonism of PRB
Maximum agonism of mPR
Maximum calcitriol
Following ADT, there should be maximum agonism of mAR coupled with maximum antagonism of iAR, or all mAR no iAR (AMNI). AMNI should maximize the production of the apoptotic proteins upregulated by mAR, and should increase the level of bcl-2, since mAR upregulates bcl-2 and iAR downregulates bcl-2. There should also be increased Ca++ influx and decreased production of Cal. It is possible that AMNI will not result in the same level of apoptosis from Ca++ overload as what is seen in ADT, since other receptors besides iAR and mAR may be involved in Ca++ influx and Cal production. LBNAR should be added to minimize bcl-2 production. MAV should also be added to AMNI. This should increase RD if the overall level of bcl-2 is low enough, but should not increase AS3 due to the antagonism of iAR. The optimum length of time to maintain this treatment needs to be determined. Table 7 shows the effects of the AMNI treatment.
AMNI Treatment
Maximum agonism of mAR
Since the AMNI treatment may fail against PC with mutated mAR that is unable to upregulate apoptotic proteins, it should be followed by a treatment of maximum antagonism of mAR along with maximum agonism of iAR, or no mAR all iAR (NMAI). NMAI should increase the production of AS3 upregulated by iAR to stop cell proliferation, and should lower bcl-2 levels. LBNAR and MAV should also be added to NMAI. In this case, MAV should decrease RG by increasing the production of AS3 and increase RD, since, as opposed to AMNI, NMAI should reduce bcl-2 production in PC. Table 8 shows the effects of the NMAI treatment. Mutations in the iAR that bind to E2 and P, such as exists in LNCaP, would protect the cells against AMNI, but should be vulnerable to NMAI. NMAI should be much less effective against PC with non-functioning iAR, but such cells should have already undergone apoptosis from the AMNI treatment. Incorporating both AMNI and NMAI should maximize overall PC cell death.
NMAI Treatment
Maximum agonism of iAR
For BC, the initial treatment should also be maximum antagonism of mAR and iAR along with LBNAR and MAV. This should be effective assuming that iAR upregulates Cal and downregulates Ca++ influx as it does for PC. Next, the AMNI protocol along with LBNAR and MAV should be done. This would have similar benefits as was described for PC, although because mAR downregulates bcl-2 in BC, as opposed to upregulating it in PC, the RD would be expected to be greater, since the level of bcl-2 should be lower. Just as in PC, the NMAI protocol along with LBNAR and MAV should be done next. This should have an equivalent effectiveness against BC as it had against PC. An additional protocol to consider for BC would be to use maximum agonism of mAR and of iAR, or all mAR all iAR (AMAI). When LBNAR and MAV are added, this should have a bcl-2 level lower than for any of the other protocols, but it would then be dependent on calcitriol killing mitochondria to increase RD and upregulating AS3 to decrease RG. Table 9 shows the effects of the AMAI treatment.
AMAI Treatment
More research is needed to determine the effectiveness of these treatments and the optimal time to maintain each treatment. For both PC and BC, if the treatments are successful then one of the preventative protocols can then be used.
The protocols given for preventing and treating BC and PC are merely suggestions based on the properties of the extended E-D model. There are other possible alternatives that can be tried. In the case of prevention, it is possible that raising T to higher than physiological levels when using HTLD may have beneficial effects. Individuals with mutations in BRCA1 or BRCA2 may want to start a preventative protocol at an earlier age. A protocol for prevention may also be applied to patients after they initially receive localized treatment, such as surgery or radiation. Changes in lifestyle that are shown to be useful against BC and PC, such as diet and exercise, can be added to the protocols for prevention and treatment.
BC and PC are complex diseases, and the properties of hormone receptors described in the extended E-D model represent a foundation which can be built on to better understand both diseases. Bcl-2 is chosen as the main antiapoptotic protein to focus on in this model because it has been shown to be extremely powerful. It prevented apoptosis caused by calcitriol in BC [41] and in PC [42]. Also, bcl-2 is known to be able to prevent apoptosis caused by Fas [57] and by Bad [20]. Just by increasing bcl-2, using a vector of cDNA, LNCaP turned into an androgen independent PC cell line [58]. This is consistent with bcl-2 protecting against the apoptosis caused by ADT. The increased chance of developing BC and PC in individuals with either the BRCA1 or BRCA2 mutation is consistent with the increased bcl-2 caused by the elimination of PRB being partly responsible for the increased incidence of cancer. Also, assuming that there is a purpose in the pattern of which hormone receptors upregulate bcl-2 and which downregulate bcl-2, then it is possible that the same pattern may apply to other anti-apoptotic proteins as well.
If iAR is not functional, then apoptotic proteins will be upregulated by mAR in both BC and PC. In BC, bcl-2 will also be downregulated, helping to further increase RD, whereas, in PC, bcl-2 will be upregulated. In PC, this creates a situation in which the same hormone receptor exhibits one property that increases the chance of apoptosis and another that decreases the chance of apoptosis. Ordinarily, apoptosis will occur if a sufficient quantity of androgen is present, as evidenced by the fact that T-BSA resulted in a 60% reduction in tumor size of LNCaP transplanted into nude mice after one month [26]. Since mAR downregulates bcl-2 in BC, less T should be needed in order to achieve apoptosis in BC than in PC. This means that for men, BC should be much less likely to occur than in women, in part because of the higher levels of T that men possess when compared to women. In fact, men rarely develop BC. However, the incidence of BC increases [59] in men who suffer from disorders related to hypoandrogenism.
Although telomerase activity may immortalize cells, it is not sufficient by itself to produce cancer as evidenced by the fact that the tissue cultures with telomerase activity did not become cancerous [2]. It is believed that there are six properties that a cell must acquire in order to become cancerous [5]. These properties are self-sufficiency in growth signals, insensitivity to antigrowth signals, evading apoptosis, limitless replicative potential, sustained angiogenesis, and tissue invasion and metastasis. Such changes would confer a great selective advantage when they occur in immortalized cells growing within an organ confined space. However, it is not clear that such changes would confer much of an advantage to immortalized cells growing in a tissue culture.
A key prediction of the extended E-D model is that HTLD will increase RD in both BC and PC. One experiment [39] that highlights the power of this treatment used LNCaP cells transplanted into nude castrated mice, then treated with T plus F following intermittent androgen ablation. The change in tumor volume ended up being around 5 times less than that when continual androgen ablation was used. The proteins that are rapidly produced, presumably upregulated by mAR, are only observed to be present for a few hours following the addition of T plus F to end the androgen ablation. In the absence of androgen ablation, production of these proteins following the addition of T plus F is not observed. This raises the possibility that not just DHT, but also T binding to iAR is sufficient to completely downregulate the proteins upregulated by mAR, so that no net production of these proteins occurs. Another possibility is that some small amount of apoptotic proteins upregulated by mAR is continually being produced in the presence of HTLD, and the accumulation of these proteins might be responsible for apoptosis. Also, due to the low DHT, there might be increased Ca++ influx along with lowered production of Cal, which might increase RD as well.
If the observed apoptosis was totally due to the apoptotic proteins upregulated by mAR when initially unopposed by downregulation from iAR, then the amount of apoptosis should be about the same for T and DHT. However, when T alone was used to end androgen ablation, the result was an average increase of 128% in tumor volume. This was much worse than the average increase of 23% in tumor volume observed when T plus F was used to end androgen ablation. Also, considering that LNCaP is an ADPC cell line, the addition of T should have resulted in an increase in tumor volume much greater than that observed with continual androgen ablation. The fact that continual androgen ablation had an average increase of 114% in tumor volume means that using T alone after androgen ablation was only a little worse than continual androgen ablation. This difference suggests that the initial increase in apoptotic proteins that occurred when the faster acting mAR was active, but the slower acting iAR was not yet active, might be responsible for the better than expected results for T alone.
Another possibility is that the effectiveness of HTLD was due to the low DHT caused by F, either because of a decrease in RG or an increase in RD. However, when androgen ablation plus F was used, the average increase in tumor volume was 91%, which was a bit better than continual androgen ablation, but still much worse than HTLD. As a result, the benefits observed from using T plus F are consistent with an initial surge followed by a slow continual release of apoptotic proteins due to the imbalance in the binding of T to both mAR and iAR as compared to the binding of T to mAR and DHT to iAR.
In order to determine the best protocol for preventing BC and PC, the HTLD, HTHD, and LTHD protocols should be examined for their efficacy in increasing RD for BC and PC in animal studies as well as with various cell lines. Since it is assumed that some BC or PC cells may be present before treatment is started, it is important that the protocol used have the ability to cause apoptosis or inhibit the growth of existing BC or PC. Also, in addition to a protocol's effectiveness in preventing BC and PC, its impact on quality of life must be considered. Since the protocol will be used for long term, a significant improvement in quality of life might offset a slightly inferior effectiveness in preventing BC and PC. It is also possible that alternating between the preventative protocols might be more effective than maintaining just one. More research is needed to examine these possiblities.
In considering the best protocol for treating BC and PC, the theoretical ideals were given, with no consideration to the side effects of the treatment or whether the necessary drugs existed and were available for human use. In practice, both of these must be considered and modifications must be made, while trying to stay as close to the theoretical ideal as possible. For example, it is known that high levels of calcitriol cause hypercalcemia, but research is being done [60] to develop vitamin D analogues which are capable of being agonists to VDR while not producing hypercalcemia.
For a model to be an accurate reflection of reality, it should be able to explain all observed experimental results. The extended E-D model can explain some experimental findings in a straightforward manner. One example would be the fact that both exogenous T and E2 must be given to Noble rats in order to reproducibly induce PC [61]. The high level of E2 would increase telomerase activity directly in the prostate epithelial cells, without the need for Aro activity. If T were not also added, then the E2 would suppress the production of T [62], resulting in the high RD typical of ADT. If T were used without E2, then telomerase activity would occur when Aro was activated, which would produce high local levels of E2 and telomerase activity. However, for prostate epithelial cells to express Aro activity requires either a mutation or presumably a failure to methylate the portion of DNA containing the Aro gene. Therefore, the fact that the percentage of Noble rats that develop PC when exposed just to exogenous T is much lower than the percentage that develop PC when exposed to exogenous T plus E2 is consistent with the extended E-D model.
Another example is that mammary epithelial proliferation in ovariectomized rhesus monkeys occurred after three days of treatment with tamoxifen [63]. This is consistent with OHT upregulating telomerase activity in breast epithelial cells by acting as an agonist to ER-α homodimers, just as it does for PC. The long term effect of tamoxifen use would depend on the values of RG and RD that result.
One example that is more problematic for the extended E-D model to explain is the relationship between serum levels of T and incidence of BC and PC. The extended E-D model would predict that there is a separate threshold level of bioavailable T for BC and PC, above which RG < RD. For levels below this threshold, RG > RD and if BC or PC develops, then it can proliferate. As bioavailable levels of T decrease further, RD should also decrease. This should not increase the incidence of BC or PC, but should increase the aggressiveness of the disease. For BC, this is because lower agonism of mAR would result in less apoptotic proteins being upregulated, and lower agonism of iAR would result in less AS3 being upregulated. In addition, there should be higher levels of bcl-2, since both mAR and iAR downregulate bcl-2. The same factors would explain the increase in PC, except that in prostate epithelial cells mAR upregulates bcl-2 whereas iAR downregulates bcl-2. This would result in less of an increase in bcl-2 than occurs in breast epithelial cells. Lower levels of T were associated with worsening clinical staging, worsening histological staging, and more poorly differentiated adenocarcinomas for PC [64].
However, higher levels of free T are correlated with slightly increased incidences of BC [65] and PC [66]. The higher level of free T would mean that the intracellular level of T should be higher than for those individuals with lower levels of free T. The higher intracellular level of T should result in higher local levels of E2 if Aro activity is present. The higher level of E2 might lead to higher telomerase activity and possibly an increase in RG, making it more likely that RG > RD for some individuals. Another possibility is that the higher level of free T results in higher local levels of DHT. This increase in DHT should result in increased agonism of iAR which should result in more downregulation of the apoptotic proteins upregulated by mAR. If ordinarily apoptosis is caused in part by the slow accumulation of these apoptotic proteins, then the increased downregulation by iAR should result in a decrease in RD, increasing the possibility that RG > RD. Also, if the level of free T becomes low enough, then even in the presence of Aro activity, the local level of E2 that results would be too low to upregulate telomerase activity, removing Aro activity as a cause for BC or PC.
More research is needed to test the properties of the extended E-D model. Experiments concentrating on individual hormone receptors are essential. The extended E-D model can be expanded to include how hormone receptors upregulate or downregulate other proapoptotic and antiapoptotic proteins as they are discovered.
BC and PC appear to be functionally identical, but there are slight differences in the way each disease achieves that functionality. The most striking difference between the two diseases is the difference in the properties of their mAR. In both BC and in PC, apoptosis occurs following the loss of functionality of their iAR. However, since women have much lower levels of T than men do, in order to maintain the identical functionality it is necessary for mAR to be more effective in inducing apoptosis in BC than in PC, which in fact appears to be the case. For both BC and PC, mAR upregulates apoptotic proteins, but for BC, mAR also downregulates bcl-2, whereas for PC, mAR upregulates bcl-2.
BC and PC are complex diseases, but by focusing on the properties of the individual hormone receptors, it is possible to develop systemic protocols for prevention and treatment. Such protocols can be augmented by any lifestyle changes, such as diet and exercise, which may be shown to be helpful.
Department of Mathematics, University of Chicago, 5734 S. University Avenue, Chicago, IL 60637, USA
Friedman AE: The Estradiol-Dihydrotestosterone model of prostate cancer. Theor Biol Med Model. 2005, 2: 10-10.1186/1742-4682-2-10.PubMed CentralView ArticlePubMedGoogle Scholar
Ouellette MM, McDaniel LD, Wright WE, Shay JW, Schultz RA: The establishment of telomerase-immortalized cell lines representing human chromosome instability syndromes. Hum Mol Genet. 2000, 9: 403-411. 10.1093/hmg/9.3.403.View ArticlePubMedGoogle Scholar
Nanni S, Narducci M, Della Pietra L, Moretti F, Grasselli A, De Carli P, Sacchi A, Pontecorvi A, Farsetti A: Signaling through estrogen receptors modulates telomerase activity in human prostate cancer. J Clin Invest. 2002, 110: 219-227. 10.1172/JCI200215552.PubMed CentralView ArticlePubMedGoogle Scholar
Wang YZ, Hayward SW, Cao M, Young P, Cunha GR, Cardiff RD: Role of estrogen signaling in prostatic hormonal carcinogenesis. J Urol (Suppl). 2001, 165: 132-133.Google Scholar
Hanahan D, Weinberg RA: The Hallmarks of Cancer. Cell. 2000, 100: 57-70. 10.1016/S0092-8674(00)81683-9.View ArticlePubMedGoogle Scholar
Chin L, Artandi SE, Shen Q, Tam A, Lee S-L, Gottlieb GJ, Greider CW, DePinho RA: p53 Deficiency Rescues the Adverse Effects of Telomere Loss and Cooperates with Telomere Dysfunction to Accelerate Carcinogenesis. Cell. 1999, 97: 527-538. 10.1016/S0092-8674(00)80762-X.View ArticlePubMedGoogle Scholar
Artandi SE, DePinho RA: A critical role for telomeres in suppressing and facilitating carcinogenesis. Curr Opin Genet Dev. 2000, 10: 39-46. 10.1016/S0959-437X(99)00047-7.View ArticlePubMedGoogle Scholar
Bryan TM, Englezou A, Dalla-Pozza L, Dunham MA, Reddel RR: Evidence for an alternative mechanism for maintaining telomere length in human tumors and tumor-derived cell lines. Nat Med. 1997, 3: 1271-1274. 10.1038/nm1197-1271.View ArticlePubMedGoogle Scholar
Shay JW, Bacchetti S: A Survey of Telomerase Activity in Human Cancer. Eur J Cancer. 1997, 33: 787-791. 10.1016/S0959-8049(97)00062-2.View ArticlePubMedGoogle Scholar
Zhou J, Gurates B, Yang S, Sebastian S, Bulun SE: Malignant Breast Epithelial Cells Stimulate Aromatase Expression via Promoter II in Human Adipose Fibroblasts: An Epithelial-Stromal Interaction in Breast Tumors, Mediated by CCAAT/Enhancer Binding Protein β. Cancer Res. 2001, 61: 2328-2334.PubMedGoogle Scholar
Mahendroo MS, Mendelson CR, Simpson ER: Tissue-specific and Hormonally Controlled Alternative Promoters Regulate Aromatase Cytochrome P450 Gene Expression in Human Adipose Tissue. J Biol Chem. 1993, 268: 19463-19470.PubMedGoogle Scholar
van Landeghem AAJ, Poortman J, Nabuurs M, Thijssen JHH: Endogenous Concentration and Subcellular Distribution of Estrogens in Normal and Malignant Human Breast Tissue. Cancer Res. 1985, 45: 2900-2906.PubMedGoogle Scholar
Brodie A, Lu Q, Nakamura J: Aromatase in the Normal Breast and Breast Cancer. J Steroid Biochem Mol Biol. 1997, 61: 281-286. 10.1016/S0960-0760(97)80024-6.View ArticlePubMedGoogle Scholar
Risbridger GP, Bianco JJ, Ellem SJ, McPherson SJ: Oestrogens and prostate cancer. Endocr Relat Cancer. 2003, 10: 187-191. 10.1677/erc.0.0100187.View ArticlePubMedGoogle Scholar
Tsugaya M, Harada N, Tozawa K, Yamada Y, Hayashi Y, Tanaka S, Maruyama K, Kohri K: Aromatase mRNA Levels in Benign Prostatic Hyperplasia and Prostate Cancer. Int J Urol. 1996, 3: 292-296. 10.1111/j.1442-2042.1996.tb00537.x.View ArticlePubMedGoogle Scholar
Matthews J, Gustafsson J-Å: Estrogen Signaling: A Subtle Balance Between ERα and ERβ. Mol Interv. 2003, 3: 281-292. 10.1124/mi.3.5.281.View ArticlePubMedGoogle Scholar
Kandouz M, Siromachkova M, Jacob D, Marquet BC, Therwath A, Gompel A: Antagonism between estradiol and progestin on Bcl-2 expression in breast-cancer cells. Int J Cancer. 1996, 68: 120-125. 10.1002/(SICI)1097-0215(19960927)68:1<120::AID-IJC21>3.0.CO;2-E.View ArticlePubMedGoogle Scholar
Shiau AK, Barstad D, Loria PM, Cheng L, Kushner PJ, Agard DA, Greene GL: The Structural Basis of Estrogen Receptor/Coactivator Recognition and the Antagonism of This Interaction by Tamoxifen. Cell. 1998, 95: 927-937. 10.1016/S0092-8674(00)81717-1.View ArticlePubMedGoogle Scholar
Imamov O, Morani A, Shim G-J, Omoto Y, Thulin-Andersson C, Warner M, Gustafsson J-Å: Estrogen receptor β regulates epithelial cellular differentiation in the mouse ventral prostate. PNAS. 2004, 101: 9375-9380. 10.1073/pnas.0403041101.PubMed CentralView ArticlePubMedGoogle Scholar
Kampa M, Nifli A-P, Charalampopoulos I, Alexaki V-I, Theodoropoulos PA, Stathopoulos EN, Gravanis A, Castanas E: Opposing effects of estradiol- and testosterone-membrane binding sites on T47D breast cancer cell apoptosis. Exp Cell Res. 2005, 307: 41-51. 10.1016/j.yexcr.2005.02.027.View ArticlePubMedGoogle Scholar
El Etreby MF, Liang Y, Lewis RW: Induction of apoptosis by mifepristone and tamoxifen in human LNCaP prostate cancer cells in culture. Prostate. 2000, 43: 31-42. 10.1002/(SICI)1097-0045(20000401)43:1<31::AID-PROS5>3.0.CO;2-#.View ArticlePubMedGoogle Scholar
Veldscholte J, Ris-Stalpers C, Kuiper GGJM, Jenster G, Berrevoets C, Claassen E, van Rooij HCJ, Trapman J, Brinkmann AO, Mulder E: A mutation in the ligand binding domain of the androgen receptor of human LNCaP cells affects steroid binding characteristics and response to anti-androgens. BBRC. 1990, 173: 534-540.PubMedGoogle Scholar
Mote PA, Leary JA, Avery KA, Sandelin K, Chenevix-Trench G, kConFab Investigators, Kirk JA, Clarke CL: Germ-line mutations in BRCA1 or BRCA2 in the normal breast are associated with altered expression of estrogen-responsive proteins and the predominance of progesterone receptor A. Gene Chromosome Canc. 2004, 39: 236-248. 10.1002/gcc.10321.View ArticleGoogle Scholar
Nathanson KN, Wooster R, Weber BL: Breast cancer genetics: What we know and what we need. Nat Med. 2001, 7: 552-556. 10.1038/87876.View ArticlePubMedGoogle Scholar
Poole AJ, Li Y, Kim Y, Lin S-CJ, Lee W-H, Lee EY-HP: Prevention of Brca1-Mediated Mammary Tumorigenesis in Mice by a Progesterone Antagonist. Science. 2006, 314: 1467-1470. 10.1126/science.1130471.View ArticlePubMedGoogle Scholar
Hatzoglou A, Kampa M, Kogia C, Charalampopoulos I, Theodoropoulos PA, Anezinis P, Dambaki C, Papakonstanti EA, Stathopoulos EN, Stournaras C, Gravanis A, Castanas E: Membrane Androgen Receptor Activation Induces Apoptotic Regression of Human Prostate Cancer Cells in Vitro and in Vivo. J Clin Endocr Metab. 2005, 90: 893-903. 10.1210/jc.2004-0801.View ArticlePubMedGoogle Scholar
Bruckheimer EM, Spurgers K, Weigel NL, Logothetis C, McDonnell TJ: Regulation of Bcl-2 Expression by Dihydrotestosterone in Hormone Sensitive LNCaP-FGC Prostate Cancer Cells. J Urol. 2003, 169: 1553-1557. 10.1097/01.ju.0000055140.91204.c7.View ArticlePubMedGoogle Scholar
LaPointe J, Fournier A, Richard V, Labrie C: Androgens Down-Regulate bcl-2 Protooncogene Expression in ZR-75-1 Human Breast Cancer Cells. Endocrinology. 1999, 140: 416-421. 10.1210/en.140.1.416.PubMedGoogle Scholar
Szelei J, Jimenez J, Soto AM, Luizzi MF, Sonnenschein C: Androgen-Induced Inhibition of Proliferation in Human Breast Cancer MCF7 Cells Transfected with Androgen Receptor. Endocrinology. 1997, 138: 1406-1412. 10.1210/en.138.4.1406.PubMedGoogle Scholar
Geck P, Maffini MV, Szelei J, Sonnenschein C, Soto AM: Androgen-induced proliferative quiescence in prostate cancer cells: The role of AS3 as its mediator. PNAS. 2000, 97: 10185-10190. 10.1073/pnas.97.18.10185.PubMed CentralView ArticlePubMedGoogle Scholar
Lu S, Tsai SY, Tsai M-J: Regulation of Androgen-dependent Prostatic Cancer Cell Growth: Androgen Regulation of CDK2, CDK4, and CKI p16 Genes. Cancer Res. 1997, 57: 4511-4516.PubMedGoogle Scholar
Umekita Y, Hiipakka RA, Kokontis JM, Liao S: Human prostate tumor growth in athymic mice: Inhibition by androgens and stimulation by finasteride. PNAS. 1996, 93: 11802-11807. 10.1073/pnas.93.21.11802.PubMed CentralView ArticlePubMedGoogle Scholar
Kokontis JM, Hay N, Liao S: Progression of LNCaP Prostate Tumor Cells during Androgen Deprivation: Hormone-Independent Growth, Repression of Proliferation by Androgen, and Role for p27Kip1 in Androgen-Induced Cell Cycle Arrest. Mol Endocrinol. 1998, 12: 941-953. 10.1210/me.12.7.941.View ArticlePubMedGoogle Scholar
Wilbert DM, Griffin JE, Wilson JD: Characterization of the Cytosol Androgen Receptor of the Human Prostate. J Clin Endocr Metab. 1983, 56: 113-120.View ArticlePubMedGoogle Scholar
Kampa M, Papakonstanti EA, Hatzoglou A, Stathopoulos EN, Stournaras C, Castanas E: The human prostate cancer cell line LNCaP bears functional membrane testosterone receptors that increase PSA secretion and modify actin cytoskeleton. Faseb J. 2002, 16: 1429-1431.PubMedGoogle Scholar
Zhu N, Wang Z: Calreticulin Expression Is Associated with Androgen Regulation of the Sensitivity to Calcium Ionophore-induced Apoptosis in LNCaP Prostate Cancer Cells. Cancer Res. 1999, 59: 1896-1902.PubMedGoogle Scholar
Dadras SS, Cai X, Abasolo I, Wang Z: Inhibition of 5α-Reductase in Rat Prostate Reveals Differential Regulation of Androgen-Response Gene Expression by Testosterone and Dihydrotestosterone. Gene Expression. 2001, 9: 183-194. http://www.ingentaconnect.com/content/cog/ge/2001/00000009/F0020004/ge161View ArticlePubMedGoogle Scholar
Zhu BT, Han G-Z, Shim J-Y, Wen Y, Jiang X-R: Quantitative Structure-Activity Relationship of Various Endogenous Estrogen Metabolites for Human Estrogen Receptor α and β Subtypes: Insights into the Structural Determinants Favoring a Differential Subtype Binding. Endocrinology. 2006, 147: 4132-4150. 10.1210/en.2006-0113.View ArticlePubMedGoogle Scholar
Eggener SE, Stern JA, Jain PM, Oram S, Cai X, Roehl KA, Wang Z: Enhancement of intermittent androgen ablation by "off-cycle" maintenance with finasteride in LNCaP prostate cancer xenograft model. Prostate. 2006, 66: 495-502. 10.1002/pros.20297.View ArticlePubMedGoogle Scholar
Murthy S, Agoulnik IU, Weigel NL: Androgen Receptor Signaling and Vitamin D Receptor Action in Prostate Cancer Cells. Prostate. 2005, 64: 362-372. 10.1002/pros.20251.View ArticlePubMedGoogle Scholar
Narvaez CJ, Welsh JE: Role of Mitochondria and Caspases in Vitamin D-mediated Apoptosis of MCF-7 Breast Cancer Cells. J Biol Chem. 2001, 276: 9101-9107. 10.1074/jbc.M006876200.View ArticlePubMedGoogle Scholar
Guzey M, Kitada S, Reed JC: Apoptosis Induction by 1α,25-Dihydroxyvitamin D3 in Prostate Cancer. Mol Cancer Ther. 2002, 1: 667-677.PubMedGoogle Scholar
Leung LK, Wang TT: Bcl-2 Is Not Reduced in the Death of MCF-7 Cells at Low Genistein Concentration. J Nutr. 2000, 130: 2922-2926.PubMedGoogle Scholar
Tucker SJ: Personal communication. 2007Google Scholar
Kyle E, Neckers L, Takimoto C, Curt G, Bergan R: Genistein-Induced Apoptosis of Prostate Cancer Cells is Preceded by a Specific Decrease in Focal Adhesion Kinase Activity. Mol Pharmacol. 1997, 51: 193-200.PubMedGoogle Scholar
Ouchi H, Ishiguro H, Ikeda N, Hori M, Kubota Y, Uemura H: Genistein induces cell growth inhibition in prostate cancer through the suppression of telomerase activity. Int J Urol. 2005, 12: 73-80. 10.1111/j.1442-2042.2004.00973.x.View ArticlePubMedGoogle Scholar
Paoletti AM, Congia S, Lello S, Tedde D, Orrù M, Pistis M, Pilloni M, Zedda P, Loddo A, Melis GB: Low androgenization index in elderly women and elderly men with Alzheimer's disease. Neurology. 2004, 62: 301-303.View ArticlePubMedGoogle Scholar
Gouras KG, Xu H, Gross RS, Greenfield JP, Hai B, Wang R, Greengard P: Testosterone reduces neuronal secretion of Alzheimer's β-amyloid peptides. PNAS. 2000, 97: 1202-1205. 10.1073/pnas.97.3.1202.PubMed CentralView ArticlePubMedGoogle Scholar
Selkoe DJ: The cell biology of β-amyloid precursor protein and presenilin in Alzheimer's disease. Trends Cell Biol. 1998, 8: 447-453. 10.1016/S0962-8924(98)01363-4.View ArticlePubMedGoogle Scholar
Shores MM, Matsumoto AM, Sloan KL, Kivlahan DR: Low Serum Testosterone and Mortality in Male Veterans. Arch Intern Med. 2006, 166: 1660-1665. 10.1001/archinte.166.15.1660.View ArticlePubMedGoogle Scholar
Martikainen P, Isaacs J: Role of calcium in the programmed death of rat prostatic glandular cells. Prostate. 1990, 17: 175-187. 10.1002/pros.2990170302.View ArticlePubMedGoogle Scholar
Coffey JC, Wang JH, Smith MJF, Bouchier-Hayes D, Cotter TG, Redmond HP: Excisional surgery for cancer cure: therapy at a cost. Lancet Oncol. 2003, 4: 760-768. 10.1016/S1470-2045(03)01282-8.View ArticlePubMedGoogle Scholar
Holmberg L, Bill-Axelson A, Helgesen F, Salo JO, Folmerz P, Häggman M, Andersson S-O, Spångberg A, Busch C, Nordling S, Palmgren J, Adami H-O, Johansson J-E, Norlén BJ: A Randomized Trial Comparing Radical Prostatectomy with Watchful Waiting in Early Prostate Cancer. NEJM. 2002, 347: 781-789. 10.1056/NEJMoa012794.View ArticlePubMedGoogle Scholar
Tucker S, Roundy JN, Leibowitz R: Primary Triple Androgen Blockade (TAB) followed by finasteride maintenance (FM) for clinically localized prostate cancer (CL-PC): Long term follow-up and quality of life (QOL). Multidisciplinary Prostate Cancer Symposium, Orlando, FL. 2005,Abstract #106http://www.asco.org/portal/site/ASCO/menuitem.34d60f5624ba07fd506fe310ee37a01d/?vgnextoid=76f8201eb61a7010VgnVCM100000ed730ad1RCRD%26;vmview=abst_detail_view%26;confID=37%26;index=y%26;abstractID=20271Google Scholar
Matsumoto K, Mahajan DK, Samuels LT: The influence of progesterone on the conversion of 17-hydroxyprogesterone to testosterone in the mouse testis. Endocrinology. 1974, 94: 808-814.View ArticlePubMedGoogle Scholar
Audy MC, Vacher P, Duly B: 17 beta-estradiol stimulates a rapid Ca2+ influx in LNCaP human prostate cancer cells. Eur J Endocrinol. 1996, 135: 367-373.View ArticlePubMedGoogle Scholar
Murphy KM, Streips UN, Lock RB: Bcl-2 Inhibits a Fas-induced Conformational Change in the Bax N Terminus and Bax Mitochondrial Translocation. J Biol Chem. 2000, 275: 17225-17228. 10.1074/jbc.C900590199.View ArticlePubMedGoogle Scholar
Raffo AJ, Perlman H, Chen M-W, Day ML, Streitman JS, Buttyan R: Overexpression of bcl-2 Protects Prostate Cancer Cells from Apoptosis in Vitro and Confers Resistance to Androgen Depletion in Vivo. Cancer Res. 1995, 55: 4438-4445.PubMedGoogle Scholar
López-Otín C, Diamandis EP: Breast and Prostate Cancer: An Analysis of Common Epidemiological, Genetic, and Biochemical Features. Endocr Rev. 1998, 19: 365-396. 10.1210/er.19.4.365.PubMedGoogle Scholar
Segersten U, Holm PK, Björklund P, Hessman O, Nordgren H, Binderup L, Åkerström G, Hellman P, Westin G: 25-Hydroxyvitamin D3 1α-hydroxylase expression in breast cancer and use of non-1α-hydroxylated vitamin D analogue. Breast Cancer Res. 2005, 7: R980-R986. 10.1186/bcr1332.PubMed CentralView ArticlePubMedGoogle Scholar
Wang YZ, Wong YC: Sex hormone-induced prostatic carcinogenesis in the Noble rat: The role of insulin-like growth factor-1 (IGF-1) and vascular endothelial growth factor (VEGF) in the development of prostate cancer. Prostate. 1998, 35: 165-177. 10.1002/(SICI)1097-0045(19980515)35:3<165::AID-PROS2>3.0.CO;2-G.View ArticlePubMedGoogle Scholar
Ockrim JL, Lalani E-N, Laniado ME, Carter SStC, Abel PD: Transdermal Estradiol Therapy for Advanced Prostate Cancer-Forward to the Past?. J Urol. 2003, 169: 1735-1737. 10.1097/01.ju.0000061024.75334.40.View ArticlePubMedGoogle Scholar
Zhou J, Ng S, Adesanya-Famuiya O, Anderson K, Bondy CA: Testosterone inhibits estrogen-induced mammary epithelial proliferation and suppresses estrogen receptor expression. Faseb J. 2000, 14: 1725-1730. 10.1096/fj.99-0863com.View ArticlePubMedGoogle Scholar
Sekine Y, Ito K, Yamamoto T, Nakazato H, Shibata Y, Hatori M, Suzuki K: Pretreatment total testosterone levels in patients with prostate cancer in the past two decades in Japan. Cancer Detect Prev. 2007, 31: 149-153. 10.1016/j.cdp.2006.12.007.View ArticlePubMedGoogle Scholar
Micheli A, Muti P, Secreto G, Krogh V, Meneghini E, Venturelli E, Sieri S, Pala V, Berrino F: Endogenous sex hormones and subsequent breast cancer in premenopausal women. Int J Cancer. 2004, 112: 312-318. 10.1002/ijc.20403.View ArticlePubMedGoogle Scholar
Parsons JK, Carter HB, Platz EA, Wright EJ, Landis P, Metter EJ: Serum Testosterone and the Risk of Prostate Cancer: Potential Implications for Testosterone Therapy. Cancer Epidemiol Biomarkers Prev. 2005, 14: 2257-2260. 10.1158/1055-9965.EPI-04-0715.View ArticlePubMedGoogle Scholar
View archived comments (1)
|
cc/2019-30/en_middle_0056.json.gz/line12569
|
__label__wiki
| 0.843978
| 0.843978
|
MWC 2019: Cisco builds first Cloud-Native Mobile Network for Rakuten
Cisco said that the foundation of the new Rakuten Mobile Network architecture and telco-cloud will extensively use Cisco software and services, and routing and switching hardware. (Photo: TechObserver)
MWC 2019: Cisco said that it is building world’s first end-to-end fully virtualized and cloud native mobile network for 5G deployment for Japanese firm Rakuten Mobile Network (RMN), a wholly owned subsidiary of Rakuten.
Rakuten is preparing to debut in Japan as a fourth major mobile carrier in October 2019. To reduce its network investment to just a fraction of conventional levels, the company is heavily investing in software driven new technologies like virtualization and telecom cloud.
“Rakuten is taking a cutting-edge approach to mobile networking, modelling a new type of network that is software-powered and automated from top to bottom,” said Tareq Amin, chief technology officer, Rakuten Mobile Network.
Earlier, on February 12, the Internet service giant had announced that it plans to launch commercial mobile services via its new mobile network with cloud-native architecture that is fully virtualized from radio access to core, with end-to-end automation for both network operations and services.
Cisco said that the foundation of the new Rakuten Mobile Network architecture and telco-cloud will extensively use Cisco software and services, and routing and switching hardware.
The American technology giant said that it delivered its best-of-breed portfolio spanning technology from its Cloud, IT and Service Provider businesses, as well as engineering, multi-vendor system integration, security and operations expertise from Cisco Customer Experience to deliver in record time what was considered close to impossible less than eight months ago.
“With design approach we mapped out with Cisco and a carefull selected vendor ecosystem, we believe we can offer high-value services at more affordable costs, helping our customers to share the true benefits of cloud innovation,” said Amin.
“With the launch of this network faster than any operator has accomplished before, the world sees a shining example of the power of cloud and automation for the future of mobility,” said Jonathan Davidson, senior vice president and general manager, Service Provider Business, Cisco.
“Our collaboration from concept to launch shows the breadth of Cisco to support Rakuten in designing a zero touch, fully automated, and software-driven mobile telco cloud that can serve millions of subscribers, and be ready for 5G,” said Davidson.
At Mobile World Congress in Bareclona, Cisco Chairman and CEO Chuck Robbins and Rakuten Chairman, President and CEO Mickey Mikitani will showcase the two companies partnership in a shared keynote.
Cloud-Native Mobile Network
Rakuten Mobile Network
Previous articleMWC 2019: Airtel partners with Cisco to deploy 5G IP network
Next articleCisco join hands with Google for public Wi-Fi project
|
cc/2019-30/en_middle_0056.json.gz/line12571
|
__label__wiki
| 0.941492
| 0.941492
|
HomeNewsAs owner prepared to open, Bagel Hut robbed
As owner prepared to open, Bagel Hut robbed
Before students and staff flocked Main Campus for classes yesterday morning, a popular on-campus breakfast stop was robbed of approximately $250. Bagel Hut owner Joann Ciallella said she was preparing to open her store shortly
14 September 2011 Angelo Fichera and Becky Kerner News, Web Exclusives
Before students and staff flocked Main Campus for classes yesterday morning, a popular on-campus breakfast stop was robbed of approximately $250.
Bagel Hut owner Joann Ciallella said she was preparing to open her store shortly before 6:30 a.m. when a man came around the back of the hut, where the only entrance is located.
“‘I’m here to rob you,’” she recalled him repeatedly saying after she told him that her store wasn’t open yet.
Ciallella said the front gate for the hut, on Montgomery Avenue, between Broad and 13th streets, was still closed, but the side and back of the hut were open.
The man told her he had to support his family and that he wasn’t going to hurt her, she said.
Although she never saw a weapon, Ciallella said the man was fumbling in his back pocket, as if to imply he was carrying one.
The Bagel Hut, on Montgomery Avenue, between Broad and 13th streets, was robbed early yesterday morning. ANGELO FICHERA TTN
“I was nervous,” Ciallella said. She said she then opened the drawer and the man stole what police estimated to be about $250.
“I was pretty shaken up,” she said. “I called 911.”
Police were able to capture the man on surveillance videos as he fled the scene.
“We have him running west on Montgomery Avenue towards Broad Street and we followed him down around Oxford,” Charles Leone, deputy director of Campus Safety Services, said. “My guess is he’s either a student or former student who may have some issues, whether it be drugs or other issues why he needs money.”
The man is described as a white male, in his early 30s and approximately 5 foot 10 inches. At the time, he was wearing a black short-sleeve t-shirt, black pants, grey sneakers and a baseball hat.
Following the incident, Ciallella said, she was brought to a police station and scoured through various mugshots, trying to match one to the robber, to no avail.
In the meantime, police are searching for the culprit by talking to community members.
“We’re focusing on the south and west end of campus, where he ran. We believe that’s where he came from when he walked up, so we’re thinking he maybe went somewhere down in that area,” Leone said. “We’re talking to neighbors. I really don’t think he’ll return, but we want to make sure that we have every precaution involved here.”
Ciallella, who has been the owner of the Bagel Hut for approximately four years, said nothing like this has happened before. The previous owners operated the stand for about 18 years, she said.
Angelo Fichera and Becky Kerner can be reached at news@temple-news.com.
Angelo Fichera and Becky Kerner
It’s all Greek to me: Rush Week
Fringe Festival delights Philadelphia in 2011
Joshua Hupperterz rejects plea deal in alleged killing of Jenna Burleigh
03 December 2018 Will Bleier Breaking News, Crime
Hupperterz will face a life sentence if found guilty of first- or second-degree murder during trial, which will begin Jan. 7.
Nov. 2 shooting near Main Campus results in death
05 November 2010 Angelo Fichera News, Web Exclusives
Updated on Friday, Nov. 5 at 7:27 p.m. A 25-year-old man who was found shot in the chest multiple times on the edge of Main Campus on Tuesday, Nov. 2, was pronounced dead Wednesday, Nov
Anderson robber given 17-35 years in prison
16 September 2014 Joe Brandt Crime, News
Darryl Moon pleaded guilty to robbing and assaulting a professor last October.
Stan Horwitz says:
How about contacting the police for a copy of the video, then posting a photo of the robber so members of the Temple community can see it and thus, keep an eye out for the thug?
Lorinda Knight says:
I thank God Joann was not hurt physically.
Beth Mulligan says:
I think it’s a shame that we have things like this going on here and people are not capable of defending themselves. The police are never around when a crime is committed so citizens and students should have the capability of defending themselves. Temple and Philadelphia need to start thinking about less restrictive gun laws as the neighborhood in and surrounding Temple University gets increasingly more dangerous!
James H. says:
This place is unbelievable. I’ve never witnessed such rampant crime in such a condensed area. It seems like there are multiple shooting per week in North Philly alone. Someone please save North Philly. Goldman Sachs, MorganStanley please invest some of your CSR money here and turn this horrible place around!
|
cc/2019-30/en_middle_0056.json.gz/line12573
|
__label__wiki
| 0.531716
| 0.531716
|
B3 Trademark Information
Regents of the University of Minnesota
Printed publications containing building design guidelines for the construction or renovation of buildings for energy efficiency
Consulting in the field of energy efficiency for buildings; consulting in the field of building energy data science and analysis in the field of energy efficiency
Design and development of voluntary building design guidelines and benchmarking standards for energy efficiency for buildings; providing a website and software as a service (SAAS) featuring software with an interactive database allowing users to analyze building energy data and benchmarking standards for energy efficiency for buildings
printed publications containing building design guidelines construction renovation buildings energy efficiency
This is a brand page for the B3 trademark by Regents of the University of Minnesota in Minneapolis, MN, 55455.
Write a review about a product or service associated with this B3 trademark. Or, contact the owner Regents of the University of Minnesota of the B3 trademark by filing a request to communicate with the Legal Correspondent for licensing, use, and/or questions related to the B3 trademark.
On Wednesday, October 31, 2018, a U.S. federal trademark registration was filed for B3. The USPTO has given the B3 trademark serial number of 88176036. The current federal status of this trademark filing is USPTO PLACED APPLICATION ON HOLD PENDING OTHER ACTION. The correspondent listed for B3 is ROSALIE WACKER O'BRIEN of UNIVERSITY OF MINNESOTA OFFICE OF THE GE, 200 OAK ST. SE, 360 MCNAMARA ALUMNI CENTER MINNEAPOLIS, MN 55455 . The B3 trademark is filed in the category of Paper Goods and Printed Material , Computer & Software Services & Scientific Services , Advertising, Business & Retail Services . The description provided to the USPTO for B3 is Printed publications containing building design guidelines for the construction or renovation of buildings for energy efficiency.
Goods and Services: Printed publications containing building design guidelines for the construction or renovation of buildings for energy efficiency
Last Applicant/Owner: Regents of the University of Minnesota
ROSALIE WACKER O'BRIEN
UNIVERSITY OF MINNESOTA OFFICE OF THE GE
200 OAK ST. SE
360 MCNAMARA ALUMNI CENTER
Paper, cardboard and goods made from these materials, not included in other classes; printed matter; bookbinding material; photographs; stationery; adhesives for stationery or household purposes; artists' materials; paint brushes; typewriters and office requisites (except furniture); instructional and teaching material (except apparatus); plastic materials for packaging (not included in other classes); printers' type; printing blocks.
Trademarkia-Network law firms can help you incorporate a business around your B3 trademark in less than 5 minutes. Trademarkia makes the process easy and convenient, so start now!
ROSALIE WACKER O'BRIEN is a correspondent of B3 trademark.
Search b3 on popular social networks
Please Rate and Review for B3
B3 is providing Printed publications containing building design guidelines for the construction or renovation of buildings for energy efficiency.
|
cc/2019-30/en_middle_0056.json.gz/line12578
|
__label__wiki
| 0.688031
| 0.688031
|
Sign up for Email Specials Print This Page
18-night Indian Ocean Cruise
Mumbai/Singapore
Offer ID:
Hosted Sailings offer Outstanding Value and Exclusive Amenities.
Choose ONE of the options below.
ONE Guided Sightseeing with Private Car and Driver tour (Value - $500 per Couple). Choose from the ports below.
ONE Private Car and Driver "At Your Leisure" tour (Value - $500 per Couple). Choose from the ports below.
$500 per Couple Shipboard Credit
Port Options:
Colombo - Please click here for the tour descriptions.
Phuket - Please click here for the tour descriptions.
OFFER INFO
PRICING & STATEROOMS
READY TO PLAN YOUR SHORE EXCURSIONS?
To view our top picks, please click here.
Suggested Private Excursion
About 300 years ago, the area of Bombay was nothing more than seven islands occupied by small fishing settlements. Today this bustling city offers a seemingly endless array of sights and cultural activities. Mumbai is the glamour of Bollywood cinema, cricket on the maidans on weekends, bhelpuri on the beach at Chowpatty and red double-decker buses. It is also the infamous cages of the red-light district, Asia's largest slums, communalist politics and powerful mafia dons. This pungent drama is played out against a Victorian townscape more reminiscent of a prosperous 19th-century English industrial city than anything you'd expect to find on the edge of the Arabian Sea. Mumbai has vital streetlife, India's best nightlife, and more bazaars than a visitor could ever explore.
Suggested Private Excursions
Mumbai: 9 hours
Mumbai: Elephanta Caves - 4.5 hours
Mumbai, Shore Excursion - 4 hours
Goa (Mormugao)
This old Portuguese colonial capital of Goa was reputed to rival Lisbon in magnificence and opulence in centuries past.
New Mangalore
Mangalore is located in India's Karnataka region, strategically situated in a hilly area between the Western Ghats and the shores of the Arabian Sea. Visitors to Mangalore learn about India's ancient caste system, which is still very much intact. The people are also extremely spiritual, as evident in their many temples and religious traditions. Mangalore contains remnants of Tippu Sultan's naval fort.
Mangalore, Shore Excursion - 4 hours
Mangalore - 4 hours
Mangalore: Karkala and Moorbidri - 4.5 hours
Kochi (Cochin) is the great, old Keralan spice city. It consists of mainland Ernakulam, islands of Willingdon, Bolgatty and Gundu in the harbor, Fort Cochin and Mattancheri on the southern peninsula and Vypeen Island north of Cochin. Because of the area’s dense tropical forests, extensive ridges and ravines, it has been sheltered from invaders and the rest of India. This encouraged Keralites to welcome maritime contact, and therefore influence from the outside world. In Cochin there is still a small community of descendants from Jewish settlers who fled Palestine 2,000 years ago. When the Portuguese arrived here some 500 years ago, they were surprised to find Christianity already established along this coast. People from far-off lands have been coming to Kerala since ancient times in search of spices, sandalwood and ivory. Such long contact with people from overseas has resulted in the blending of various cultures and has given Keralites a cosmopolitan outlook.
Kochi, Shore Excursion - 8 hours
Cochin: Highlights - 7.5 hours
Sri Jayawardhanapura Kotte is the capital of Sri Lanka, with the newly built parliament situated in picturesque surroundings, while Colombo is the main commercial capital city, where almost all the business transactions take place. Studded with high-rise buildings, modern five star hotels, modern convention centers and a Stock Exchange Centre, Colombo continues to be the hub of commercial activities.
No information currently available.
Yangon, formerly Rangoon, is the dazzling capital of ancient Burma, now known as Myanmar. The city of Yangon today occupies the site of a 2,500-year-old Burmese settlement known as Okkala. The city's history revolves around the ancient Shwedagon Pagoda, which dates back to the original settlement. Visitors to Rangoon are impressed with the historic preservation and charm of the city and are mesmerized by the golden pagoda, adorned with 5,417 diamonds and 2,317 other precious stones.
Full Day Yangon Sightseeing – 10 hours - Myanmar
Known as the "Pearl of Thailand," Phuket offers pristine beaches, lush vegetation, traditional villages and seascapes of huge limestone pillars that rise above the turquoise waters of Phang-Nga Bay. With a culture all its own, it combines Chinese and Portuguese influences with that of indigenous ocean-going people. Phuket Town is the island’s capital located in the southeast. The architecture features the attractive Sino-Portuguese style which is reflected in the spacious residences built by wealthy Chinese tin barons as testimony to their success. Visitors come because of the glorious beaches, especially those on the west coast. Patong Beach is about a 45-minute drive from the port and offers a wide selection of watersports. Phuket still casts its spell on all who come to its shores.
Phuket - Sightseeing (4hrs)
Phuket – Sightseeing (8hrs)
Scenic Island of Phuket - 5.5 hours - Phuket
Kuala Lumpur (Port Kelang)
Kuala Lumpur is a cosmopolitan, modern business hub and government center. With a population of about two million, it is one of Southeast Asia's smallest capitals. Port Kelang is gateway to Kuala Lumpur, a 42-mile distance away. Other sights include National Art Gallery - a permanent collection of about 2,000 works by Malaysian artists; Batu Caves - caverns discovered by American naturalist William Hornaby in the 1880s; the Selayang Batik Factory – known for their handmade and block-printed batiks; and Zoo and Aquarium - a complex home to 280 species of Malaysian and other exotic animals, birds, fish and reptiles.
One of Asia's great economic successes, Singapore has fused diverse cultures into one dynamic nation.
Behind high-tech industries and high-rise buildings lives a society with an ingrained sense of conservative Confucian values. Beneath the westernized modernity beats a totally Asian heart. Strong beliefs center around extended families, filial piety, discipline, respect and Asian work ethics. Singapore’s name, meaning "Lion City," can be traced to the 13th century, and today there is the mythical Merlion, half-lion, half-fish, standing guard at the mouth of the Singapore River as the symbol of Singapore. A recent advertising campaign billed Singapore as "A Fine City."
Half Day Singapore City Tour – 4 hours - Singapore
A Vespa Tour at Kampong Glam
Good Morning, Ni Hao (Walking Tour)
The Hidden Charms of Tiong Bahru
Itinerary subject to change without notice. Please confirm itinerary at time of booking.
Port, security and handling fees, government fees and taxes are included in the fare. Price does not include airfare, transfers and airline government fees and taxes.
Cruise Inclusions:
Cruise Inclusions
Spacious Ultra-Luxury Suites - over 85% with Private Verandas
Butler Service - All Suites
Complimentary Beverages Served Throughout the Ship
Open-Seating Dining
In-Suite Dining and 24-Hour Room Service
In-Suite Beverages
Free Wi-Fi Throughout the Ship*
Transportation into Town
*Every guest will receive one free hour of Wi-Fi per day, with select suites receiving unlimited Wi-Fi.
Available Addons:
Optional shore excursions
Air/Hotel Program
Hotel-Only Program
Extra Night Accommodations
Transfer-Only Package
Air Upgrades and Special Requests
Cruise Only Fares are in US dollars, per person, based on double occupancy.
All fares are quoted in US Dollars.
All prices per person and in USD unless otherwise stated.
Reference this number when contacting our agency so we may better serve you. Also keeping this number handy will allow you to locate this document again quickly.
|
cc/2019-30/en_middle_0056.json.gz/line12580
|
__label__wiki
| 0.539738
| 0.539738
|
In an international airport, is there specific set of laws for the international area?
When travelling in an international flight, you pass a border with passport check at both the departure and the arrival airports. It means you spend time in an international area. What are the applicable laws in this area? The one from the country the airport is located in? A special set of international laws? Are you juridically out of any country (as if in international waters)? Is there special status with flights between countries with special immigration agreements (e.g. Shengen area)?
legal airports international-travel
Manu HManu H
This is not universal. The laws governing the territory of "international zone" are still subject to the laws of the country where airport is located. – Karlson Oct 8 '14 at 12:00
The general answer to your question is no, there's no special "international law area" - nothing like that. there's no analogy to the "laws" regarding the high seas, international waters. – Fattie Oct 8 '14 at 12:07
@pnuts: I think the second half of your comment demonstrates that it's not actually too broad. – Flimzy Oct 8 '14 at 14:21
@pnuts: The question is "Is there a specific set of laws?" not "What are all applicable laws?" – Flimzy Oct 8 '14 at 14:29
possible duplicate of What is the real legal status of an airport transit area? – jpatokal Oct 9 '14 at 0:58
There are three common situations:
The country you are departing has outbound passport control
Once you cross the line you have officially left the country as far as immigration is concerned. You must pass through immigration to exit this area back to the public spaces.
In some cases, like Vancouver, it's not really "passport control". It's just a guy who checks your boarding pass and tells you that you cannot return this way (he has no authority other than calling someone else who does). But it's effectively the same thing. Canadian immigration gets passenger lists from the airlines and doesn't bother you on the way out.
The country you are traveling to has remote pre-clearance. The USA does this from Canada and Shannon, Ireland.
Once you cross the line you have officially departed the current country and entered the destination country as far as immigration is concerned. You may travel directly to your destination, usually without any further interactions of any kind with immigration or airport security (rather dependent on the gate arrangements at transfer airports).
The country you are departing does not have outbound passport control
Or at least not at this departure point.
You mix with other international and domestic travelers and board your departing vessel. You are considered to have departed when you pass the boarding gate.
Note the repeated use of "as far as immigration is concerned" and "considered to have departed". The departure lounge is not an embassy, it is still the sovereign soil of the departure country and if the local police want you for anything they will just walk in and grab you. If the American pre-clearance staff object they will be bluntly told to shut up and get out of the way or get arrested themselves for obstruction (pre-clearance staff are not diplomats).
In all the above cases, once you are "considered to have departed" you have met any immigration limits you may have. If you do this one minute before midnight on the day your visa expires you will not be considered to be overstaying. If your flight/ship/bus/train is cancelled you will usually get a short-term readmission as you did "leave" and the fact that you are still here is beyond your control. if immigration really wants you to leave you might even get a free hotel room for the night.
Flights in the Schengen zone are considered to be domestic flights - there is no passport control.
Tax easements (duty-free shopping) have more to do with your intentions than position within the airport. I've been to airports where the duty-free shops are in the public spaces. You show your boarding pass, buy what you want, and it's delivered to your departure gate (which also nicely bypasses security). If you don't have a suitable boarding pass you simply pay the tax-in price.
If the airport construction allows it (Heathrow for example) transiting passengers remain in the international area and have no interactions with immigration. This is purely a convenience and cost-saving measure. If you are wanted by the police for something serious they can and will arrest you in the international concourse. If, in this example, the UK does not wish to admit you for any reason you are fine here as you do not officially enter the UK. Passengers transiting between airports (Heathrow -> Gatwick happens a lot) DO require admission to the UK, which is occasionally denied. This means you go back to your departure point rather than your destination.
Legal rights of the departure country extend up to the time the airplane's wheels leave the ground (not sure about ships). If you punch out the cabin crew while taxiing to the runway, the local police will be called. Do it after takeoff and it's really the pilot's choice to return and land or fly to the destination - legal authority passes to the air carrier's country of registration after takeoff but the pilot can choose to accept the local authorities rather than carry a problem for 10 hours.
If the departure country's authorities decide they want to invite you in for tea and biscuits after takeoff, they can request that the airplane return or land at another airport in the same country. If the pilot refuses they either let you go or shoot the plane down.
As far as I know, they won't shoot a commercial plane down because there is a suspect aboard. But I guess no commercial pilot ever tried, since other severe consequences may arise, like: fining the pilot or airline, putting the pilot on a no-entry list, putting the airline on a no-entry list, arresting the pilot on next entry (for assisting in a suspect's escape) or issuing an international warrant for that pilot... – Alexander Oct 9 '14 at 7:47
Those are all possibilities, but they are future consequences. Between wheels-up and wheels-down all they can do is ask, and both the consequences and the shoot-down option end at 22km from shore or at a land border. "Unable to comply" is a perfectly legitimate reply to any ATC request, and if it's a government-sponsored escape the pilot will probably have an inconvenient radio failure until the plane reaches international waters. – Paul Oct 9 '14 at 8:46
"pre-clearance staff are not diplomats": I would be surprised if they don't enjoy something like consular immunity, where they have immunity for acts committed in the course of their official duties. This would presumably be governed by the bilateral agreement establishing the preclearance regime in that country. The same agreement no doubt stipulates that the local authorities may take custody of travelers who have already received preclearance; this is the real reason why the US officers wouldn't be arrested: they wouldn't interfere. – phoog Nov 10 '16 at 19:56
You may have passed a border check, but that doesn't mean you've left the country (just as at land borders: there's a gap between the border posts, but that land is still in one country or the other). So the laws of the country apply. Of course, there are usually some special laws or exceptions that apply to such areas, with respect to immigration and taxes.
Customs duty and tax exemptions apply in many places (still under the host country's laws, of course). – dbkk Oct 8 '14 at 18:27
Exactly right. On a related note, foreign embassies and consulates, military bases, and other facilities are similarly permitted to follow the laws of their home country as a matter of convention and courtesy, but they are not literally foreign soil. You don't cross a border by entering a diplomatic compound. – choster Oct 9 '14 at 0:06
+1. See also: travel.stackexchange.com/questions/18561/… – jpatokal Oct 9 '14 at 0:58
The accepted answer provides many useful details but fails to make a very basic point: The laws of the country you are in do apply fully. Except in some very specific cases (e.g. there is a treaty between France, Switzerland and possibly Germany regarding Basel airport), an airport is entirely and unambiguously under the jurisdiction of the country where it's located and therefore subject to its legal system (including EU law in the EU).
Now, some special rules (e.g. regarding taxes and customs duties, immigration, search and seizure, etc.) might apply but those derive from the laws of the country in question, not from some sort of over-arching international rules that would supersede local law.
For example, you might be able to transit without a visa if you don't leave the international transit area, thus being exempted from the regular entry requirement. But the exemption itself results from local law, it's because the airport is in a given country that this rule exists, not in spite of it.
Is there special status with flights between countries with special immigration agreements (e.g. Shengen area)?
Let me answer this first: If you fly from one Schengen country to another, you won't pass a passport control. So the so called "Schengen area" at airports, where intra-Schengen flights depart (not to confuse with "The Schengen area") is not "international" in any way.
But even "international area" at airports is not "international" in the sense of "lawless". Neither will dissidents be able to safely travel through international airports of their home country, for example.
There are special agreements for international air traffic, most notably the Chicago Convention, but AFAIK they do not include the right to transit at every international airport in the world at your will.
Most notably, if you fly for example KLM from Edinburgh via Amsterdam to Chicago, Dutch authorities can and will call you out in Schiphol "international area" if they have any open speeding tickets on your name in their system. Unless you come and pay upfront, you and your luggage won't be allowed to continue the journey.
AlexanderAlexander
Is your last paragraph personal experience, or is there a link to an event? – CGCampbell Oct 8 '14 at 15:45
Even if there is no immigration control when traveling between Schengen countries, you may very well have to undergo customs control and be entitled to e.g. tax free shopping, so intra-schengen flights may of course be "international" in some ways. – Tor-Einar Jarnbjo Oct 8 '14 at 17:07
@CGCampbell Some examples here! – mkennedy Oct 8 '14 at 18:42
@mrkennedy: I think that is only half of an example, since IIRC transit passengers do not undergo official passport control at Schiphol. And then, in that example, Eupen is called a part of Germany... don't trust them if they don't even get THAT right... (Eupen is in Belgium!) – Alexander Oct 8 '14 at 21:40
Not the answer you're looking for? Browse other questions tagged legal airports international-travel or ask your own question.
What is the real legal status of an airport transit area?
Can the ship's captain really perform your wedding when in international waters?
How to buy duty free other than at the airport?
How can I find the arrival gate for a flight?
Are the Schengen “airport transit visa” even checked?
Why are some shops duty free and not others at JFK international airport?
I was allowed to enter the airport terminal by showing a boarding pass for a future flight. Should I be concerned about “security”?
What are the steps to claim/recheck baggage on international layover via non-partner connecting airline?
How to verify, with different airlines, that the broker booked the flight correctly?
Can I check-in and clear security at the international terminal in Atlanta for a domestic flight?
How many airports around the world have border control for incoming domestic flights?
|
cc/2019-30/en_middle_0056.json.gz/line12581
|
__label__cc
| 0.691451
| 0.308549
|
The Lovin' Spoonful - Summer In The City (1966)
https://youtu.be/U5bUmx-hk-c
Posted by trickpa at Thursday, August 16, 2018 No comments: Links to this post
Devo - Girl U Want (1981) HQ, recorded live
https://youtu.be/sVo2Fcp-GTM
Elvis Presley - Little Sister (video clip)
https://youtu.be/55ak4ubAbIY
The Dark Side of LED Lighting
https://returntonow.net/2017/11/15/dark-side-led-lighting/
LED lights are making us blind and wreaking havoc on our endocrine systems, peer-reviewed studies show… Leading photobiologist recommends switching back to sunlight, candles and incandescent bulbs
One of the world's top photobiologists has been trying to warn the public for years about the dangers of the government-mandated phasing out of incandescent lighting.
While LEDs (light-emitting diodes) are up to 95 percent more energy efficient than incandescent bulbs, we are paying for that savings with our health.
A physician and lecturer at Wismar University in Germany, Alexander Wunsch is an international consultant to governments, medical facilities and the lighting industry.
His message, though often ignored, is clear: blue light, isolated from all the other colors on the light spectrum, is damaging our retinas and disrupting our endocrine systems, resulting in all sorts of physical and mental illness.
It's not a message the LED industry, governments looking to cut carbon emissions, or consumers saving money on electricity want to hear. But, as this Harvard Medical School report says, it is "backed up by study after study."
Natural light vs. LED light
Natural light gives off all the colors (wavelengths) of the rainbow in a somewhat continuous manner, Wunsch explains in an interview with Dr. Mercola.
Typical "white" LED lights consist of a blue light-emitting diode and phosphor (fluorescent) coating.
This fluorescent coating transforms part of the blue light into longer wavelengths, creating a yellowish "looking" light, but a large portion of the light emitted is still invisible blue light.
Blue light is high-energy, short-wave length "aggressive" light, responsible for keeping us awake and alert.
While present in sunlight, and a necessary ingredient for life, blue light needs to be balanced by all other colors of light, particularly its opposite color of light – red.
As you can see below, red light is absent in traditional fluorescent and LED lights:
Wunsch says most of us are severely deficient in near-infrared light, which has a wavelength of between 700 and 2500 nanometers.
The heat generated by incandescent light bulbs is infrared radiation. While this heat requires more electricity, the infrared light it generates is actually beneficial to your health, and therefore worth the extra cost, in Dr. Mercola's opinion.
Near-infrared light – like that generated by a candle or fire – primes the cells in your retina for rest, repair and regeneration, which is why Wunsch uses it as a therapy on his patients.
Near-infrared is also a crucial energy source for humans. According to Wunsch, only about one-third of our bodies' thermodynamic energy comes from food. A much larger portion comes from "photonic energy" from the sun.
The more near-infrared radiation we get, the less food is required for maintaining thermal homeostasis (body temperature), he says.
Health problems associated with excess blue light
LED lighting may be one of the largest sources of non-native electromagnetic radiation we are exposed to on a daily basis.
In addition to lighting our houses, office buildings, schools, stores and streets, LEDs have become the dominant technology for back-lighted tablet displays, such as iPads and e-readers, and large LCD television sets. Virtually all reading these days involves staring directly at an LED light source, rather than at newspapers, magazines and books, where light is reflected off the paper, rather than beamed directly into our eyes.
Many optometrists have spoken out about the damage this is doing to our eyes, one predicting 100,000 Americans will become legally blind due to blue-light damage over the next decade.
A recent study published in the peer-reviewed journal Molecular Vision says prolonged exposure to blue light with a wavelength between 400–470 nanometers can "induce severe damage to the retina."
Even brief periods of exposure to blue light in this range can damage the retinal pigment epithelium. Damaged RPE eventually leads to photoreceptor cell death," the study says. If enough photoreceptor cells die, total blindness can occur.
In addition to damaging our eyesight, blue light after sunset disrupts our endocrine system.
"Study after study has linked working the night shift and exposure to light at night to several types of cancer (including breast and prostate), diabetes, heart disease, and obesity, says an article published by Harvard Medical School.
These diseases may be related to the fact that light suppresses melatonin, a hormone that influences circadian rhythms, the article says:
"While light of any kind can suppress the secretion of melatonin, blue light does so more powerfully. Harvard researchers and their colleagues conducted an experiment comparing the effects of 6.5 hours of exposure to blue light to exposure to green light of comparable brightness. The blue light suppressed melatonin for about twice as long as the green light and shifted circadian rhythms by twice as much (3 hours vs. 1.5 hours)."
In addition to suppressing melatonin, Dr. Wunsch says excessive exposure to blue light creates "oxidative stress" that damages lipids, proteins and DNA and is linked to a myriad of pathologies.
While cool LED bulbs emit more blue light than warm LED bulbs, the label "warm" can be deceptive. They give out a warmer "looking" light because the blue light is masked with a yellow or orange filter, but they do not emit a red wavelength.
When buying bulbs, look at their CRI or color rendering index, Wunsch says.
Sunlight, which is the gold standard, has a CRI of 100. So do incandescent bulbs and candles. If you must buy LED bulbs, look for a CRI of 97, which is the closest they come to natural light.
LEDs are the most dangerous at night, Wunsch says, as there is no counterbalancing red light. The biological risks of artificial light are somewhat mitigated if you have plenty of sunlight streaming through windows, but if that's the case, why have lights on at all?
Wunsch says being in darkness after sunset is optimal. Candle light is enough for orientation, he says, but if we must do activities that require more light, he highly recommends getting our hands on incandescent bulbs.
While you won't find them at most department stores, you can still buy "vintage" incandescent bulbs on Amazon. Just make sure they are crystal clear, not coated, so as not to block the beneficial red light:
For a more energy-efficient incandescent light, you can buy low-voltage halogen bulbs
Just make sure you operate halogen on DC rather than AC to prevent electrosmog, Munsch says.
And, if you must be exposed to blue light after dark, definitely wear blue-light blocking glasses:
20+ Times People Got Hilariously Bad Tattoos, And Didn’t Even Realize It | Bored Panda
20+ Times People Got Hilariously Bad Tattoos, And Didn't Even Realize It | Bored Panda
https://www.boredpanda.com/funny-worst-tattoo-fails/?utm_source=facebook&utm_medium=social&utm_campaign=BPFacebook
20+ Times People Got Hilariously Bad Tattoos, And Didn't Even Realize It
Regret, we all experience it at one point or another and nothing stirs up regret quite like a bad tattoo. Yes, an estimated 25% of people in the United States has a tattoo and as many as 50% of these once proud human canvases may end up wanting their art removed.
As far as we can tell there will never be a lack of tattoo fails nor a shortage of people willing to share their embarrassment. Bored Panda has added a new list of tattoos that either didn't go as planned or will make you question what goes through people's minds. From bad artists who didn't quite nail it to bizarre artistic choices, scroll down bellow to see these cautionary tales and don't forget to vote for your favorites!
Hello Flamingo
Today's Tee
Just Keep Going
Sloppy Kisser
Plant Murderer
Interlace Apartments- Singapore
20+ Times People Got Hilariously Bad Tattoos, And ...
|
cc/2019-30/en_middle_0056.json.gz/line12583
|
__label__wiki
| 0.532297
| 0.532297
|
Match Report: Crystal Palace 1 Liverpool 2
March 31, 2018 March 31, 2018 Sam Turner 0 Comments Alexander-Arnold, Crystal Palace, Firmino, Karius, Liverpool, Mané, Salah
Liverpool went back up to 2nd place in the Premier League, for the time being, with a massive 2-1 victory over Roy Hodgson’s Crystal Palace at Selhurst Park on Saturday. Goals from Sadio Mane and Mohamed Salah (of course) overturned the 1-0 lead that Palace had established from a Luka Milivojevic penalty in the first half.
It’s been a long two weeks since that 5-0 drubbing of Watford at Anfield. International breaks are never fun for any football fan really but at least we went into it off the back of one of the most enjoyable games of the season. The downside being that Joe Gomez got injured in the process and is now out for a month. The return of Nathaniel Clyne to the squad today couldn’t have come at a better time. Trent Alexander-Arnold was chosen however to try and keep Palace danger man Wilfried Zaha in check. It was him alongside Joel Matip, Virgil van Dijk and Andy Robertson in the backline. The midfield three was Georginio Wijnaldum, Jordan Henderson and James Milner and the front three need no introduction from me.
There were some early warning signs for the Reds as Zaha managed to evade Trent before being released with a ball over the top. His shot was saved well by Loris Karius but there were signs that the young right back would have a tough day trying to deal with Zaha.
This worrying start was compounded when, in the 12th minute, another ball over the top was flicked on by Christian Benteke into the feet of Zaha who prods the ball beyond Karius before being completely taken out by the German goalkeeper. Referee Neil Swarbrick correctly awarded the penalty which was converted easily by Milivojevic. 1-0 down and plenty of work to do to get back into the game.
It didn’t look like it was going to happen, at least in the first half. Liverpool had a few chances but, apart from Mane having his goal disallowed for offside, there was nothing to suggest that Liverpool were going to even draw this game, let alone come back and win it. Chances from Salah and Roberto Firmino were easily saved by Wayne Hennessey in goal. Mane could have also had a penalty but the way he went down and the lateness of it meant that Swarbrick saw it the other way and booked the Senegalese player for diving.
Jurgen Klopp must have said something in the half time team talk that got through to his players as they came back out for the second half looking like a different team altogether. This was shown when, only four minutes after half time, James Milner picked up the ball on the left side of the pitch and drilled a low cross into the waiting form of Sadio Mane who only had to touch the ball towards goal and level the score. It was the winger’s 9th Premier League goal of the season and 15th of the campaign overall. Below par? I don’t recall ever saying that…heh.
There was another 5 minutes of domination for Liverpool after the equaliser but all of a sudden we seemed to drop sticks and allow Palace back into the game. A poor pass from Milner lead to Benteke going through one of one with the keeper but the Belgian’s annoyingly good scoring record against the Reds was not to continue as he spooned his shot wide.
He was then gifted another glorious opportunity about a minute late that he then blazed over the crossbar. Two instances of poor defending and attacking alike which Liverpool only just escaped from unscathed.
It could have gotten even worse for Liverpool as Mane, annoyed at not being awarded a free kick, picked up the ball and should really have been sent off for a second bookable offence. Neil Swarbrick was merciful this time however and Sadio was substituted minutes later for Alex Oxlade-Chamberlain, probably to a sigh of relief from Klopp and all Liverpool fans.
Adam Lallana, who came on for a poor Gini Wijnaldum at the same time as Chamberlain, lasted only 3 minutes before going down injured. It looked a bad one. The stretcher was brought on but the English midfielder was able to walk off on his own but Klopp described his situation post match as “not good” so it’ll have to be a wait to see how long he is out for this time. Dejan Lovren was the player chosen to replace him with the Reds going 3 at the back. Not getting a replacement for Phillipe Coutinho in January is still looking like the wrong decision.
It was looking to be one of those days that we’d just have to settle for the point and go again next weekend. But when you have a genuinely world class player in your team you can never truly predict the outcome. Oxlade-Chamberlain picked up the ball on the right side before beautifully finding Robertson on the opposite side of the box. The brilliant Scottish left back then played a good low ball into the danger area where resident goalscoring expert Mo Salah picked it up, turned ex-Red Mamadou Sakho and finished past Hennessey into the Palace net.
Jubilation from the away fans as Salah leapt into the air with joy, the relief of all Liverpool players and fans palpable! The team managed to then close the game out with relatively few scares and secure a massive win at a ground where we have undoubtedly struggled in the past. Now we can watch the Chelsea/Spurs game tomorrow with interest rather than trepidation. A draw would be wonderful Antonio/Mauricio, cheers! Now we return to Anfield on Wednesday for the first leg of the huge Champions League quarter final tie against Manchester City. Allez allez allez!
← Previewing Palace and Hating Hodgson
Talking Points: Crystal Palace 1 Liverpool 2 →
FM18 Experiments: Liverpool 01/02
Player Ratings: Tunisia 1 England 2
June 19, 2018 Chris Anderson - Co-Founder 0
The Future: A ‘Re’-Introduction
November 23, 2017 Anthony Stonelake - Editor-In-Chief 0
|
cc/2019-30/en_middle_0056.json.gz/line12585
|
__label__cc
| 0.581833
| 0.418167
|
Mario & Sonic at the Rio 2016 Olympic Games for the Nintendo 3DS
Review by J, aged 11:
On Mario & Sonic at the Rio 2016 Olympic Games there are four different modes. Road to Rio, Quick play, Versus mode and Pocket marathon. 'Road to Rio' is the story mode, where you choose to play for team Mario or team Sonic and compete to win gold medals. In 'Quick play', you can play the Olympic events. In 'Pocket marathon', you have to walk with the Nintendo 3DS. Every step that you do turns into an in-game metre. You can earn rewards from walking certain amounts of steps. In 'Versus mode' you can with your friends in local play or download play.
My favourite events to play in quick play mode are football, 100m sprint and rhythmic gymnastics. The plus events are the same events but played a bit differently to normal events. My favourite plus events are BMX, where you have to avoid the goombas and collect rings, and archery, where you have to hit the moving targets that the boos are holding.
In 'Road to Rio' mode, you train for the events doing different training exercises, and can level up by training to increase the amount of clothes that you can wear. Different clothes help your mii in different ways. They can increase or decrease the amount of speed, power, skill and stamina. You can wear different clothes for different events. For example, in the 100m sprint, you would wear clothes that increase your speed. You choose whether to play for team Mario or team Sonic. Then you collect gold medals in the events for your team. You can buy clothes and gear using apples and melons.
In the 'pocket marathon' mode, you put your Nintendo 3DS into sleep mode and walk with it in your pocket. Every step that you do turns into an in game metre. There are three courses to run. The first course is 10,000 steps, the second course is 20,000 steps, and the third course is 42,195 steps. You can get rewards for walking a lot. One day, I walked over 22,000 steps with the Nintendo 3DS just for the pocket marathon!
In 'versus mode' you can play in local play with others that have the game, or play in download play, with others that don't have the game. You can play all the events in 'Quick play', including the plus events. You can get achievements for doing certain things in Quick play, Pocket marathon, Road to Rio, or Versus mode. You can get rewards for completing certain amounts of achievements.
This is a game that I absolutely love. My favourite things to do on it are football, rhythmic gymnastics (it's so funny watching my mii do it), BMX and Pocket marathon.
I think it is so cool that the game is named after the Olympics that are actually coming up this year and it makes me really excited about the real Olympics too. I think I will always love this game more than the real Olympics though.
Find out more about Mario & Sonic at the Rio 2016 Olympic Games here. It is available for the Nintendo 3DS family systems (making it also compatible with the Nintendo 2DS) and is rated PEGI 7.
Disclosure: As Nintendo Family Bloggers, we received a download code for this game for the purposes of review.
Posted by The Beesley Buzz at Friday, April 22, 2016 2 comments:
Boiled Bungalow Cake adapted from Emma Bridgewater 'Pattern' Book
I'd never heard of a bungalow cake before and a google search has left me none the wiser. I've rarely made fruit cake either - I think last Christmas was my first time making fruit cake but when I saw this recipe in Emma Bridgewater's 'Pattern' book, it caught my eye.
In my usual way, I decided to try to make the recipe a little bit healthier. I know it is still cake but I always try to see if I can reduce the amounts of fat and sugar in cakes and after my Chocolate Beetroot cake bakeover turned out so well before, I keep trying in the hope of further successful bakes.
This time it wasn't 100% successful. The texture and moistness were perfect. It rose sufficiently well too. But I think adding so much bicarbonate of soda was my error as it gave the cake a peculiar taste. As I had reduced the amount of self-raising flour and egg in the recipe and switched the plain flour for wholemeal, my fear was it wouldn't rise and so I over-compensated by adding far more bicarb than I needed to. So that will be my main lesson for next time.
I adapted the quantities in the recipe to make a smaller cake and switched a few ingredients like swapping the caster sugar for a smaller amount of honey instead.
So here is the recipe I used once the changes had been made but do take note that the bicarb did affect the flavour of the cake so next time I will be using less!
225g mixed dried fruits (I used a mixture of what I found at home which was mixed dried fruit, dried apricots, dried cranberries and glace cherries)
1 and a half tsp bicarbonate of soda
60g honey
88g stork
1 egg - beaten
63g wholemeal flour
1. Pre-heat the oven to 130C (fan). Grease and line an 8inch cake tin.
2. Chop all the dried fruit to a small size (i.e. I chopped the larger dried apricots and glace cherries to match the size of the mixed dried fruit pieces).
3. In a pan, mix together the dried fruit, water, bicarb, honey and stork. Place on the hob and bring to the boil. Stir regularly and boil for 10 minutes. Then leave to cool.
4. Once cool, add in the egg and then sift in the flour. Mix together then pour into the cake tin.
5. I baked it for an hour. Check with a skewer to see if cooked through.
As I mentioned, the texture and moistness of this cake were perfect. It was just the bicarb that changed its flavour enough that the kids didn't enjoy it but me and Richard happily polished it off.
As for the book, despite not having any particular interest in the field of pattern and design (I still think my bottle design was more luck than skill), I found I really enjoyed reading the stories behind the Emma Bridgewater patterns. The more books I am reading, the more I am finding that I enjoy biographies and similar books that tell of real life people and their real life stories. I hadn't expected to find recipes in this particular book so that was a bonus too.
Posted by The Beesley Buzz at Thursday, April 21, 2016 8 comments:
Hyrule Warriors: Legends on Nintendo 3DS
Hyrule Warriors: Legends is the latest adventure based on the amazing Zelda franchise. Whilst based on the same lands and characters as Twilight Princess, this has a vastly different look and feel to it. With less of a focus on solving puzzles, and much more on cutting down hoards of enemies as you progress.
Hyrule Warriors: Legends on the Nintendo 3DS is based on the Nintendo Wii U game and contains all the original content, but with even more added content and features and, of course, the ability to play on the go. One of the things I love about the Nintendo 3DS is that it fits neatly into a pocket, and provides an ideal distraction whilst waiting for a bus or travelling up to London on the train. And this game offers a great distraction!
After the beautifully crafted introductory set video, you start the game as Link. The basic premise is that the land has been invaded by an enemy and you must defeat them. Lots of them. As you battle through the different fields and fortresses, you have to overcome enough enemies to trigger the area boss to arrive. Beat him, and that area comes under Hyrule's command again. And once you have conquered most of the land, the level boss arrives and you have to work out how to beat him, too. He's breathing fire, trampling through walls and crushing your team-mates so you have to work fast.
As you progress you learn new skills and tips, and have to learn to take control of other playable characters in the game, or direct them to where you want them to fight for you. To be fair, the first level is not too tricky, but does involve a lot of sword play against hundreds of nasty chaps. But at the end of that level we find that Princess Zelda has been captured, and the real game begins - travel through different levels, different terrains, battle different enemies, and find her to bring her back. The trick is to win battlegrounds, and to do so quickly - that keeps your army's morale high and makes them more effective in fighting for you.
The Nintendo 3DS game has new stages, new gameplay and new characters compared to the Wii U game, so if you are a fan of that version you will want to take a look at this.
I realise I've mentioned the 'fighting' and 'swordplay' a lot, but this is not a game of gore. The atmosphere is light and playful. It is a huge amount of fun, with simple controls to move and control your character, and the ability to switch to other characters in the game. As you defeat more enemies, you can use new weapons (like bombs) and special moves, which are really quite extraordinary and great fun to use.
If you remember the Zelda games of yesteryear, you will also love the unique Adventure Mode where you can explore the original Legend of Zelda maps, finding fairies to assist you and bringing them into this new mission - but choose wisely, and help nurture the fairies you bring so they offer the best help for you.
Hyrule Warriors: Legends is available on Nintendo 3DS and is rated PEGI 12. Find out more from theNintendo website... or watch this short video produced by Nintendo UK.
Disclosure: We were sent the download code for this game for the purposes of review. All opinions are our own.
Mario & Sonic at the Rio 2016 Olympic Games for th...
Boiled Bungalow Cake adapted from Emma Bridgewater...
|
cc/2019-30/en_middle_0056.json.gz/line12588
|
__label__cc
| 0.627332
| 0.372668
|
Poem – Sharabi ko badnaam karne walon…
May 5, 2019 by Keyur Seta 3 Comments
Sharabi ko badnaam karne walon
Batao kaun yahan hosh mein hain
Satta ke bhookhe darinde satya ka galaa ghotne mein hain
Unki puja mein magna janta apno se nata todne mein hain
Patrakarita ka yogdaan ab asatya ke hawan-kund mein hai
Dharam ke naam par aatank failakar kehte hain dharam khatre mein hain
Sainiko ki veerta par apni mohar lagane ki aadat aaj badi zor mein hain
Jhoot ke vigyapan nirantar doharakar ab satya keval shabdakosh mein hain
– Keyur Seta
Filed Under: Literature Tagged With: Hindi poem, Hindi poem on corruption, Hindi poetry politics, Poetry on politics
Short story: The mysterious watchman aka Chowkidar
March 24, 2019 by Keyur Seta Leave a Comment
The Secretary, Chairman and few committee members of the Bharat Housing Society were sitting in front of the desk inside their club house. They had an important task at hand today – to interview a candidate for the post of their security guard or, as some people prefer to address, watchman for their society.
Their need was urgent. The previous security guard had turned out to be a failure. There wasn’t a flaw as far as competency in his job was concerned. He had an impeccable reputation when he had joined.
His downfall came about when once, in broad daylight, few thieves entered an apartment in Bharat Society and robbed goods worth lakhs from an apartment. The guard couldn’t catch them. It was later found through the CCTV footage that it was he who let them escape. Needless to say, he got his cut for it.
He was, obviously, sacked and a hunt for a new security guard commenced. They finally found a candidate worthy enough in the form of Joginder Sodhi who was sitting opposite the Secretary and others right now.
Sodhi previously worked as a guard at a small bungalow in their town. His boss left the town after he was transferred by his company to another place. He gave a very positive feedback about Sodhi. He was all praise for his work ethics, ability and monumental dedication.
The team of the society was impressed after speaking to him at length. He also had a strong as well as a pleasing personality and immense confidence.
But they were also surprised to see how Sodhi keeps harping about his work and ability as a chowkidar. That’s what he loved to call himself. He also promised that no theft will take place during his tenure and he will turn out to be much better than the previous chowkidar.
Sodhi was selected without much delay. He was happy and why not? He had graduated to being a chowkidar of a small bungalow to a reputed housing society like Bharat.
Photo source: Msihotel.com
After a few days in the job, Sodhi was once seen speaking animatedly with three men who stayed on the third floor – Saurav, Mohit and Sujay. They were businessmen who stayed on rent. They ran a textile business. Other than this, not much was known about them. The Secretary didn’t like the new chowkidar mingling with the trio. He somehow found them shady ever since they arrived there to stay few weeks ago.
The next morning at 6 am the Secretary, while coming down the stairs for his early morning walk, saw the door of the apartment of the Sharmas, on fourth floor, open. It struck him only after few seconds that Sharmas are out on a vacation. So how come their door was open?
As he entered the house he was shocked to see their cupboard open and a lot of valuables stolen. He ran down and saw that the apartment of the three businessmen Saurav, Mohit and Sujay locked. They were too lazy to wake up before 9 am. Where have they left so early?
The Secretary went to Sodhi’s chamber in a hurry but to his shock he was missing too. He instantly recalled how Sodhi had become friends with the businessmen trio. Another theft and another chowkidar turned out to be a thief.
Dejected, the Secretary called the chairman and they both decided to head to the police station. As they just stepped out of their compound they saw Saurav, Mohit and Sujay being dragged by a man. The man was none other than Sodhi.
Sodhi narrated how he went after the trio after he found their behaviour fishy. He caught them red handed, roughed them up singlehandedly and brought them to the society to let the secretary and others handle. Sodhi had proven himself. He became a hero among the entire society.
Some chowkidars do stay true to their word. If you felt the story would end in another fashion, you know whom to blame for it.
Also read: Short story: The Release of my first feature film
Filed Under: Literature Tagged With: Chowkidar jokes, Chowkidar stories, Short story, Short story politics, short story thriller english
Book Review: Decoding Life Post 8/11
January 28, 2019 by Keyur Seta Leave a Comment
Demonetization will continue to remain a significant event in India’s history even decades from here on. The announcement of the sudden banning of Rs 500 and Rs 1000 rupee notes and inclusion of the new Rs 2000 notes by India’s Prime Minister Narendra Modi came as a shock to many.
But it the announcement provides scope for an interesting plot twist. This has been explored in few movies. Now, Demonetization is also used by author Indranil Roy’s latest novel Decoding Life Post 8/11.
The story of the book takes place in Kolkata in 2016. It revolves around the young man Arjun who is about to flee with his girlfriend Meher. However, the sudden announcement of Demonetization destroys their plan.
Arjun is forced to return to the murkey world of his ex-girlfriend Nisha, a friend more than a brother in the form of Sunny and his evil boss Shamim. But that’s not all, Arjun is forced to tackle some unexpected and dangerous challenges.
The name and the description in the end builds an expectation of a thriller revolving around Demonetization. It also gives an idea that the book will most probably be critical of Demonetization.
But that is not exactly the case. Demonetization just plays in the background after the main story is triggered by it. The characters are shown troubled by it but it also turns out to be a boon (can’t reveal more to avoid spoilers). In other words, it maintains a balance and neither criticizes nor applauds.
This doesn’t turn out to be a disappointment, thankfully because of the reading experience. Decoding Life Post 8/11 is a fast paced drama with regular twists and turns. Even for a slow reader like me, it finished fast.
Roy has smartly woven a social issue of a guy mentally harassed for his effeminate ways and a love triangle, with the Demonetization continuing to play in the background. Apart from being a thriller, the book also goes onto the emotional track but without losing the grip.
The author’s language is to-the-point and simple. This surely works in the favour of the reader. However, you can’t help but feel for a more creative narration in some parts where the writing starts becoming similar to a film script.
Also somewhere the local feel of the place the story is set in (parts of West Bengal) is missing a bit.
Overall: Decoding Life Post 8/11 is an interesting dramatic thriller that is also high on emotions.
Review by: Keyur Seta
Author: Indranil Roy
Genre: Drama/ Thriller
Publishers: Leadstart Publishing
Filed Under: Literature Tagged With: Book on demonetisation, Decoding Life Post 8 11 book, Decoding Life Post 8 11 review, Demonetisation story, Indranil Roy Decoding Life
Short story: Under the shade in the rainy evening in Bharatpur
November 25, 2018 by Keyur Seta Leave a Comment
The sun had set in Bharatpur that evening but it wasn’t dark at the market road. The workers of the Jan Raksha Party (JRP) were burning effigies of a leader from the ruling Lok Seva Party (LSP) after he allegedly made a derogatory remark against their leader.
The JRP workers were sweating in their pink T-shirt bearing the abbreviation of their party in the already humid town but they didn’t care. How dare he insult their beloved leader?
Their victorious reverie was broken when a group of supporters of LSP started raising slogans against the said JRP leader. They felt their leader did the right thing. They too were oblivious to their sweaty purple T-shirts bearing the abbreviation of their respective parties. But both parties were united in not caring for the general office going population that was having difficulty while going home after a long and tiring day at work.
Such was the state of affairs in Bharatpur these days. The town was divided between LSP and JRP; between pink and purple. Earlier it was only their supporters who were at loggerheads. But slowly, common people too clinged onto any one side and developed enmity against those who were on the ‘other’ side. So what if they have been their close friends or even family members all these years?
The colleges regularly saw tussles and arguments between both set of supporters. But since recent times, even offices saw heated conversations between those who were otherwise well-educated and mature.
The scene was the same even in the virtual world of social media and What’s App. More than the IT cells of these parties, the common people were energetically creating posts to bash and insult the other side. Both parties were saving a lot of money since the common people were ready to publicize them and their agendas for free.
When the general public felt such enmity for people from the ‘other’ side, one can just imagine the hatred between the official party workers of both parties. They literally couldn’t see eye to eye.
The mobs of both groups were showing no signs of stopping. Hence, it took some divine intervention in the form of unseasonal December rain. What started as a drizzle soon transformed into heavy rain and storm-like situation. To make matters worse, the electricity went off.
The general public, which was running helter skelter, was now confused. Ajit, a man in his mid-20s, ushered inside the entrance of a shop that was shut. As he was moved inside the roof properly to escape the rain water, his body his someone. It was a man in his 50s who too was there as he had to save himself from the rain and it was too dark to try going home.
After an awkward moment, they spoke and soon introduced themselves. The man in his 50s was Rameshchandra. The two were glad to have each other’s company to combat this difficult situation. Ajit realized that Rameshchandra was feeling uneasy.
When Ajit caringly prodded further, he revealed that he is diabetic and needed water. Ajit promptly handed him a bottle from his bag in the dark. Rameshchandra thanked him. He then he noticed that Ajit was limping a bit. Now it was Rameshchandra’s turn to caringly prod him about his uneasiness.
Ajit explained how his leg got hit to the street lamp pole in the dark while he was hurriedly getting under the roof. Rameshchandra handed him a little bottle of a balm which he always carried for his headache. He said the balm works even for the kind of injury Ajit suffered. Then Ajit remembered the slogan of the balm’s advertisement, ‘Ek balm, teen kaam’ and they had a hearty laugh.
There was massive age gap between the two of them but they didn’t feel it. Difficult circumstances can even bring two people from different age groups together in a human way. Both decided in their minds that they would like to keep in touch. They were no longer thinking about the uneasiness caused by their wet T-shirts.
Just then the electricity returned and the road lights were on. They were glad but as soon as their eyes fell on each other, they were stunned. They were wearing pink and purple T-shirts respectively.
Filed Under: Literature Tagged With: short English stories, Short stories in English, Short story, Short story on politics, Short story politics
Short Story: The Orange Garlands of Bharatpur
The television set in the rich household of Bharatpur was showing an important development that took place in the town that evening. The news was shocking but it didn’t shake the family members. The effect of the cool breeze of their new expensive air conditioner and the delicious pizza was too much for them to be bothered about anything else.
Earlier in the day
Ramakant was obediently sprinkling water on the orange marigold garlands in his shop. The droplets shone like diamonds in the early morning sun. This has been a subconscious activity for him since long. It not only kept the flowers fresh but also spread the fragrance of the marigold.
The 55-year-old was passionate about his business, although it hasn’t made him rich. The fact that his garlands get a place around the neck of the idol in the adjacent temple, albeit for few minutes, was too fulfilling for him.
Bharatpur was the land of the extreme. The wealthy families of the town had to wonder where to spend their money. The poor, on the other hand, saved every penny to ensure they won’t stay hungry the other day. There are areas where the luxurious high-rises lie just besides slums. Two separate worlds exists just few metres away.
The abnormal gap does become a cause of concern for Ramakant, who lied somewhere between both extremes. He knows much more about Bharatpur than his calm face and joyous nature show. With his keen interest in history coupled with the fact that his father being the freedom fighter, he understands Bharatpur in and out.
But he sees little hope in the socio-political situation of the town. The new regiment, that had promised heaven, has been destroying the once ideal town brick by brick. Apart from economic collapse, the secular fabric of the town has been under serious threat since recent times. Atrocities on the marginalized were a regular electoral feature.
On top of that, anyone who criticizes the establishment or raises troubling questions was labelled either an enemy of the land. By the way, being an enemy of the land was equivalent to being an enemy of the majority religion.
Ramakant now concentrates only in his daily routine and service to God, more so after he lost his beloved wife Lakshmi to tuberculosis (TB). He finds solace in God. He believes the Kalki Avatar, the 10th avatar of Vishnu, is the only hope now.
His daughter Damini, however, has the opposite mindset. The 25-year-old Political Science professor in Shaheed Bhagat Singh College is a fiery young woman. She has a strong heart of a revolutionary but, at the same time, is soft-spoken and compassionate.
It is this emotional side of hers that compels her to champion the causes of the marginalized. Protests and demonstrations are her regularly routine. Holding banners with her hair tied in a ponytail in her usual attire of a kurta and jeans is a familiar sight in Bharatpur. She is also known for her polite yet hard-hitting articles.
Damini’s transformation has been revolutionary to say the least. She was almost the opposite as a child and during her early teens. During her schooling period, she was a reserved student who hardly opened her mouth. But studying Sociology during her college days proved to be a turning point in her life.
The subject sowed the seed of transformation in her. Studying about the oppressed classes of the society, both in India and abroad, gave her a completely new perspective about the world. She realized that just earning money and living a luxurious lifestyle can never be her aim. Doing at least something about the oppression around her was necessary in order to live a life, instead of just surviving like blind consumerists.
Participating in inter-collegiate drama competition increased her confidence no ends. Soon, she was seen performing street plays as well on social issues. The person who was hesitant to speak even in front of handful of people now didn’t care even if hundred pair of eyes were glued to her.
The passing away of her mother had a lasting impact on Damini, obviously. The incident made her more responsible at an early age. In other words, it further honed her skills as a leader ready to shoulder responsibilities. By the time she enrolled for post-graduation in Sociology, she was a different individual altogether.
Despite her father’s profession, Damini has never been sure about the existence of God. But she is more than sure that one shouldn’t expect Him to solve our problems.
Ramakant wasn’t oblivious to the massive change in Damini. He knew she was walking the razor’s edge. But he always saw his late father in her and that ensured he never stopped her from walking her path.
Damini was teaching in her usual calm manner today. But deep inside, she was all looking forward to something after the lecture. As soon as the bell rang, she barged out of the college campus, travelled to the town hall area on her bike and marched in the protest rally against something serious.
Back at his shop, Ramakant wasn’t hoping of any major business that day as it wasn’t any festival or special religious day. So, it came as a pleasant surprise when a man came to buy around a dozen expensive thick marigold garlands.
But his joy was shortlived as his friend came running to give him the news about Damini’s arrest along with a number of other social workers, activists, journalists and professors for holding a powerful rally against the government.
Ramakant was sad to hear that but not worried and not at all surprised. He knew this was coming. Off late, the current situation has been reminding him of the days of the freedom struggle his father used to narrate.
The family in the rich household just besides Ramakant’s shop was watching the news about the important development in Bharatpur that day. The seriousness of the issue didn’t matter to them as they hogged on to the pizza slices in the cool breeze of the air conditioner.
The news anchor was heard saying, “The activists protesting against the release of those convicted in the gruesome lynching were arrested by the police. On the other end of the town, the convicts were welcomed by their party leader with thick marigold garlands.”
Filed Under: Literature, Socio/Political Tagged With: Short stories in English, Short stories on politics, Short story, Short story politics, Socio political short stories, Socio political stories
Short story: Letters in the valley (Inspired by a real story)
July 22, 2018 by Keyur Seta 2 Comments
The road going through the picturesque valley of Rajouri in Kashmir suddenly came alive with the arrival of a herd of sheep walking through with discipline. Their white colour went well with the blue sky above. When the herd ended, the 10-year-old Sanjukta slowly emerged like a fresh flower just blossomed from the early sun rays.
She appeared carefree in her school uniform covered with a thick sweater and her hair tied like always. She walked as if she was swaying to the tune of nature all around her. With a smile on her face, she enjoyed passing through the herd of sheep. Although she had experienced it many times before, since she was born and brought up here, it still made her joyous.
There was another reason for her joy while going to school. Generally, most of the students are always on the lookout for a reason to bunk school. But Sanjukta surely wasn’t one of them. The reason for this was Damini, her class teacher, with whom she had become friends recently.
Damini ma’am, as she was always addressed, was somewhere in her mid-20s. Dressed in her simple usual salwar kameez, she had a peaceful expression on her face, which didn’t need much reason to break into a smile. Her appearance went perfectly with her nature. The long red purse with flowery designs always accompanied her.
Damini was kind and understanding and went out of the way to help and comfort her students. Attending her class was like therapy for Sanjukta. In fact, her presence itself was enough to bring positive vibes around.
As Sanjukta entered the main town, her mind was recalling the times when Damini put in special efforts to teach her and few others who were struggling to master a topic. It was so nice of her to go out of her way, she thought. But Damini’s kindness was not limited to teaching. She showed special affection and care when a student falls ill or gets injured.
Sanjukta still remembered the day she had hurt herself while playing. Damini provided her with first aid and consoled her. The two always shared a good bond but this incident brought them closer. The comfort she felt with her after that incident was the same one provided by a steaming hot cup of Kawah in her chilly town.
Rajouri (Photo credit: Trekearth.com)
Sanjukta entered her classroom with these thoughts and her trademark smile. After the formal ‘Good morning teacher’ Damini gave a smile to Sanjukta and few others and started teaching. The little girl was quick to realize that her smile had something missing today. She didn’t think much about it and busied herself in the teaching.
The reason for the missing spark in her smile came after the period got over. It struck Sanjukta like a thunderbolt when Damini announced that she will be quitting the school as her family has shifted to the outskirts of Rajouri. She had to take the decision since traveling to and fro daily would be a toll on her. This semester, which will be ending after two weeks, will be her last.
Sanjukta stood numb fighting her tears. Obviously, her body language was alien as she walked back home. The usual chirpiness and delight was nowhere to be seen. Her condition was opposite the lively and enchanting greenery of Rajouri. She finally broke down after reaching home. Her mother comforted her while she kept asking as to why Damini ma’am can’t travel a long distance for work like few of her classmates.
Sanjukta did well in the half yearly exams. This was followed by the vacations. Needless to say, it didn’t bring much joy to her, like it did every year. She did speak with Damini few times during the exams while trying to appear normal. It broke Damini’s heart as she could easily make out the efforts she was putting in to be strong.
Just like her last few vacations, Sanjukta went to the outskirts of her town with her family for an outing. She bumped into her school friend Nazia. During the course of the conversation, Nazia revealed that Damini ma’am has shifted just near her place. After soaking in the news, an idea stuck Sanjukta.
On the first day after the school re-opened Sanjukta hurriedly passed on a white paper to Nazia after the final bell. The next day, Sanjukta was happy to know that Nazia delivered her letter to Damini ma’am. Her joy doubled when her friend instantly gave a verbal reply from Damini’s side.
This became a regular routine for Sanjukta. She kept writing letters to Damini who would reply verbally through Nazia. The letters were written in broken English with lots of mistakes. But despite being a teacher, Damini ignored the errors automatically. She could only see the innocence of a lovable 10-year-old girl.
The give-and-take continued for six months as her fifth standard came to an end. The regular conversation was enough for Sanjukta to return to her swaying steps while going to school and vice-versa. She once again started appearing as delightful as Rajouri.
The summer vacations meant not meeting Nazia to hand over her letters as she, like Damini, stayed at the outskirts. When the school finally re-opened, Sanjukta was excited to resume the process of sending letters.
She was trying to think about the contents of the letter as she passed through the staff room. Something caught her eye and she went back a few steps and peered in. On the handle of a chair in the staff room hung the long red purse with flowery design.
Inspired from a real story of a sweet and innocent little girl in Rajouri.
Filed Under: Literature Tagged With: Rajouri, short stories, Short stories for children, Short stories in English, Short stories Kashmir, short story for kids, Short story Kashmir
Book Review: Dance Of The Spirits
October 22, 2017 by Keyur Seta Leave a Comment
Supernatural stories contain at least one of the following elements – ghosts, souls, miracles beyond human explanation and occultism. Some of these are also present in author Sanjai Velayudhan’s novel, Dance Of The Spirits.
But it follows the route of a normal, simple story. This makes it appealing and intriguing even for those who don’t believe in the supernatural and just wish to feast on a normal mystery book.
Dance Of The Spirits revolves around Krish, a consultant working in Dubai. He lives with his dominating wife Lakshmi and daughter. Circumstances compel him to visit his native place Kerala to write a book revolving around the dance form, Theyyam. Once home, he reunites with his school friend Ajay, a chauvinistic cassanova.
Krish comes across a foreign tourist Maria and gets fascinated by her. He finds himself drawn to the beautiful lady and slowly becomes her companion. She too is here to study Theyyam for her thesis. What is this association meant to be?
This is one book that makes an excellent use of flashback. Before the story goes back few months, we are told right at the start about a passionate extra-marital affair and who dies in the end. But instead of being a spoiler, this makes the narrative more interesting and gripping as you eagerly wait for the event.
Velayudhan ensures that the wait turns out to be a pleasant one. This well-structured story is developed smoothly with some well-etched characters. We are given lots of in-depth knowledge on the art of Theyyam along with the culture, history and socio-political situation of Kerala. In other words, Kerala becomes a familiar character even if you haven’t visited it. But nowhere does it make it sound like a documentary.
The author has achieved high standards in writing despite using simple language. Like I have said quite a few times before, the key is to make it friendly for anyone from a literary expert to someone hailing from vernacular medium. The editing too needs to be lauded here for no major errors.
But what takes the cake is the supernatural connection to the story. It is not something that is done in a straightforward manner. We are told a supernatural tale and are asked to draw conclusions on the incident in this story. But at the same time, this is a rare supernatural story that gives you an option of not believing it if you wish to.
However, regardless of you believing it or not, you would surely go back to the start and few other portions to join the dots. Doing this increases the effect.
The only kind of negative point here is that the narrative becomes too descriptive when it comes to describing a person or a place. Similarly, the entire chapter on the character of Lakshmi could have been shortened to get on with the story. These aren’t major put offs though, thankfully.
Overall: Dance Of The Spirits is a fascinating novel that gives a new dimension to supernatural stories.
Author: Sanjai Velayudhan
Cover: A picture of the Theyyam performer. The sight is pretty but at the same time gives a mysterious feel about the story.
Filed Under: Literature Tagged With: Dance Of The Spirits book, Dance Of The Spirits book review, Dance Of The Spirits novel review, Dance Of The Spirits Sanjai Velayudhan, Sanjai Velayudhan author, Sanjay Velayudhan books
Book Review: Return Of The Trojan Horse
Author Amit Dubey’s Return Of The Trojan Horse is a crime novel consisting three stories – Return Of The Trojan Horse, Independence Day and That Little Girl. They all revolve around the character Amit, a young software engineer, and the senior cop Dilip.
The book is worth savoring for those who enjoy thrillers. Its biggest strong point is that it’s a fast paced page turner. There is some high and deep usage of technology. Thankfully, this part is simplified as much as possible.
More about the three stories:
Return Of The Trojan Horse: Amit suddenly gets a call from a CBI (Central Bureau of Investigation) officer who knows everything about him. He urges him to help him and his colleagues learn hacking and other security techniques in order to safeguard the country against terrorists. After initial refusal, Amit agrees. But he has no idea that his rendezvous with terrorists can prove to be fatal for him.
What works the most here is the twist in the middle, which not only makes the tale interesting but also adds to the thrill. You do wonder about Amit’s naïve behavior at one point. But that was imperative for the twist and the author has managed to hide it well. Hence, it doesn’t bother you much.
Independence Day:
Balwant Singh, director of a well-known public sector company, gets kidnapped on August 14. The kidnappers demand a ransom of Rs 2 crore from his wife, who has no idea how she would manage such a huge amount. The government of India’s reputation is at stake since their own person has got kidnapped just when the security is so tight a day before Independence Day. Amit’s technical expertise is sought to solve the case.
This is the best of the three stories. We have been through too many kidnapping dramas in Hindi films. But this one doesn’t appear repetitive. This is largely because the investigation and the consequences in the end produce tremendous thrill and tension. The finale is very crucial in such kidnapping stories and this point is also taken care of well.
That Little Girl:
A rich fellow loses control of his car while being in a drunken state and crushes a group of homeless people. Some get killed and others get injured. One survivor is a little innocent girl who gets severely injured and loses her parents. Amit is heartbroken looking at her condition. He vows to help Dilip solve the case and punish the guilty.
The story follows the same fast-paced narration pattern. The investigation process with respect to trapping suspects is interesting. But the problem here is the climax. It not only makes you sad but is also not presented convincingly. Plus, the entire episode with the journalist at the start wasn’t necessary.
There are few issues that are noticed in all three stories. There should have been more depth in Amit’s character. In order to make it a fast read, the focus is too much on the dialogues instead of the narration of the tale.
But the biggest issue is the editing as one can regularly spot errors related to sentence framing and in the spelling of ‘Khyaam.’ Also, the use of sexism to create humor is questionable in stories that are otherwise modern and progressive.
Overall: The Return Of Trojan Horse is an interesting thriller book that makes for a fast read.
Reviewed by: Keyur Seta
Author: Amit Dubey
Cover: Artistic close-up of a keyboard along with an image of a Trojan horse
Filed Under: Literature Tagged With: Amit Dubey author, Amit Dubey book, Amit Dubey Return Of The Trojan Horse, Return Of The Trojan Horse book, Return Of The Trojan Horse review, The Return Of The Trojan Horse book review
Short Story: The Release Of My First Film
Yari Road in Andheri is a contradictory locality in Mumbai. On the one hand, you find some super-rich businessmen and senior-most employees living in their posh houses. At the same time, it is also home to some rank strugglers from the film industry. They arrive in the city from small towns in large numbers just to get that one big break in films. But only a handful of them get their dreams fulfilled.
Before they make it big, they live literally in poverty. Many stay in crowded rented flats; not knowing whether they would be able to pay next month’s rent. They don’t have meals. They only eat food. And this includes anything that’s cheaply available or easy to make.
But despite living in such conditions and facing rejection time and again, these strugglers never lose hope. This was the mantra for Sumeet also, who finally has a glimmer of hope for making it big in Hindi cinema or Bollywood, as they call it. After years of struggling as an AD (assistant director), he somehow got a chance of directing his first movie at the age of 27 last year.
Titled Zameen, his film is based on the sad situation of farmers in Maharashtra and how they are forced to commit suicide due to drought, which increases their financial woes. With such a subject, naturally it was tough convince a producer. Shooting the film in Marathwada was a herculean task, especially with the shoestring budget provided to him since it was a ‘non-commercial’ subject.
After more than a year of making it, Zameen was just 10 days away from release. Even experienced director feel butterflies in their stomachs, so what to say about a debut filmmaker? Sumeet was someone who appeared calm from outside even if there was a storm inside him, like it was these days.
Such super low-budget films ensure that the makers are left with hardly any funds for proper marketing and promotions. At times, even a mere media screening proves to be harmful to the pockets. This burdens the director and the main cast to come up with cheap or no-cost promotional activities. Their situation is the same as those door-to-door salesmen, who are desperate to sell their product.
After continuously posting about his film on social media platforms, Sumeet somehow managed to organize a small promotional activity at a mall at Yari Road just two days before the release. It was the ideal place to attract the high society crowd, who could afford the abnormal ticket rates at multiplexes.
A handsome man who looked in his early 30s approached Sumeet out of nowhere along with his group of 5-6 friends. He displayed his status through his branded clothes, shoes and sun-glasses, which were tucked in his shirt. After introducing himself as Sunny, he told Sumeet how impressed he was with the trailer of his film.
“It is refreshing to see someone making a film on such important issues in today’s times,” added Sunny. Sumeet was obviously overjoyed. After an informal chat that lasted for few minutes, Sunny and his friends promised to see Zameen on the weekend. Sumeet urged them to share their honest view with him, to which they agreed.
The interaction with Sunny and his friends infused new hope in Sumeet. But on the day of the release, he became as anxious as he was before. Films falling in the parallel cinema genre with unknown actors hardly get an audience on the opening day. Sumeet knew this well, so he didn’t check the online booking scenario on Friday.
But he kept logging in to an online booking website on Saturday morning to know if there is any advance booking for his film. He checked a nearby multiplex and could see only 2-3 seats booked. He encouraged himself by thinking that Sunny and his friends would surely see the film in any of these two days. And hopefully, they would spread the word if they like it.
On Saturday night, Sunny and company did decide to see the film, as promised. Few minutes into the film, Sunny told his friend seated besides him, “Thanks to the digital era, we get such good quality picture even in downloaded films.”
Filed Under: Literature Tagged With: short film stories in English, short film story, short stories about Mumbai, Short stories in English, short stories on Bombay, short stories on movies, short stories on Mumbai
Renee’s Treasure Book Review
June 18, 2017 by Keyur Seta Leave a Comment
Good children’s films are the ones that also appeal to the grown-ups. The same goes for children’s books too. Indrani Sinha’s Renee’s Treasure falls in this category. It is a novel that goes beyond the target audience. Apart from narrating an interesting tale, it is filled with nostalgic moments.
The story is set in 1960 and it revolves around the 11-year-old girl Renee. She is smart and adventurous. She stays with her mother, whom she fondly addresses as Mamoni, father, two younger brothers, Jatin and Sonu and grandfather. Renee’s father, who is a junior engineer with railways, has been recently transferred to Varanasi from Bareilly.
Like every child, Renee is excited for her upcoming birthday. But this year, it’s even special since her grandfather aka Dadaji has hidden a secret gift for her, which she needs to uncover. He has strictly urged her not to disclose this to anyone, including her parents. Unfortunately, Dadaji passes away on her birthday. Now, Renee is left all by herself to search the gift. She finds help in the form of her new friends, Anil aka Sacchu and his sister Anita.
The basic plot of Renee’s Treasure itself is exciting as well as intriguing. It keeps you guessing about the gift. This coupled with a free-flowing narration with regular twists make sure you are hooked. Sinha has also smartly women thriller elements. This makes you recall the method used by Satyajit Say in his Feluda series, where there is thrill but at the same time, the mood is completely light-hearted.
The most vital aspect in such stories is the uncovering of the treasure in the end. Sinha has thankfully kept this part simple, which goes with the nature of the entire book.
The author’s language and use of words plays a large role in making the book appealing to both kids and grown-ups. The little ones would enjoy the story and mystery. But adults would also find high doses of nostalgia. The children’s antics in school and home would surely bring back memories of their younger days. The book indirectly gives a message that life was indeed simple and more pleasurable for children back then.
There are few issues that limit the book’s greatness. The long bygone era of 1960 isn’t felt much. It rather looks like the book is based in the early 1990s. On few occasions, the narration gets too descriptive. There is a romantic angle between two teachers in the school. Although it is cute, we wonder about its relevance with the main story.
Overall: Renee’s Treasure is an intriguing as well as light-hearted nostalgic saga. It has the potential of impressing both children and grown-ups.
Author: Indrani Sinha
Cover: Beautiful painting that induces nostalgia and the joys of simple life
Filed Under: Literature Tagged With: Indrani Sinha author, Renee's Treasure book, Renee's Treasure book review, Renee's Treasure book story, Renee's Treasure Indrani Sinha, Renees Treasure novel
|
cc/2019-30/en_middle_0056.json.gz/line12596
|
__label__cc
| 0.569726
| 0.430274
|
by Mickey Minner
#1 in the Sweetwater Saga
The moon slipped behind the drifting clouds just as Jennifer crawled over the window sill and out onto a narrow section of roof. Though she was glad for the extra cover to help conceal her movements, the deepening darkness did make her immediate journey that much more difficult. Tentatively, she stepped to the roof’s edge and, without giving herself any time to reconsider, she made the short jump onto a sturdy branch of the massive oak tree that had stood outside her bedroom window for as long as she could remember. Carefully, using the tree’s many branches as hand and footholds, she climbed down the thick trunk to the grassy yard below. Pausing only long enough to untie the small canvas travel bag strapped to her back, she quickly crossed the yard and passed through the waist high cast-iron gate before disappearing into the night’s shadows.
As she walked swiftly towards the business district, Jennifer gave little thought to the fact that she was leaving behind the quiet neighborhood where she had been born and raised. Instead, her attention was focused on the distant whistle of the midnight train chugging its way to the town’s station. She quickened her steps because the last thing she wanted was to miss being a passenger on that train as it left town a short 30 minutes after arriving.
Even at this late hour, the business district was alive with activity. Delivery wagons stood in front of the station, prepared to take on cargo the train delivered. Representatives from the town’s hotels and boarding houses rushed to greet late arriving guests on the wood-planked platform circling the brick depot building. Music from pianos, most badly in need of tuning, filled the night’s air around the numerous drinking and gambling houses that shared the district with more respectable businesses. Knowing this was not a good place for a single woman to be, especially at night, Jennifer kept her eyes focused straight ahead and made her way rapidly to the relative safety of the station’s platform.
Jennifer reached the station just moments after the train rolled to a stop and the loud hiss of it’s releasing steam drowned out the other noises of the busy depot. She climbed the depot’s steps, looking back along the route she had just traveled to see if anyone had taken undue notice of her. Relieved that no one was paying her any attention, Jennifer turned to find a place to wait while the disembarking passengers gathered their luggage and moved off the platform and into the night. Trying to be as inconspicuous as possible, she leaned against the cool brick of the depot’s wall. She forced her body to remain still, afraid that any movement would give her away. Jennifer was determined not to relax until she could feel the wheels of the train moving beneath her.
The night’s shadows and the floppy lace hat Jennifer wore did a good job of hiding her features. She wore a dark blue dress which easily blended into the shadows where she stood and she hugged her travel bag close to her chest, concealing her frame that much more. Her long hair was braided and tucked up and into her hat. If anyone had taken the time to pay the young woman any attention, they would have noticed that her eyes continually scanned the activity on the platform, looking for any recognition in the faces passing by her. But, the people moving about that night were much too concerned with their own business to notice the young woman and they passed her right by without thought.
“All aboard,” the conductor’s call broke Jennifer from her surveillance.
“Finally,” she whispered to herself as she pushed away from the depot’s wall and nervously took another glance around the corner of the building. Relieved to see no one she knew, she hurried across the platform. By the time the conductor had finished calling out the names of the train’s next few stops, Jennifer was standing impatiently next to him waiting for her ticket to be checked.
“Going all the way to Denver,” the conductor commented as he took her ticket. “You’ll be wanting the sleeper car then. Just continue right through this car and into the next. Take any bunk you like.”
“Thank you,” she smiled at the man as she retrieved her punched ticket and tucked it securely back into her bag.
Jennifer mounted the high steps and without a look back at the only home she had ever known, she entered the passenger car and made her way to the sleeper. When, a few moments later, the engineer blew the steam whistle warning of the train’s imminent departure, she was situated in the top bunk at the far end of the sleeper car. Jennifer was almost thrown from the bunk as the steam locomotive lurched to life, jerking the passenger and cargo cars behind. But, she quickly resettled herself on the lumpy mattress, her thoughts gradually returning to the events that had led to her present situation.
Five Days Earlier
“No,” his deep voice boomed. “I will not have a daughter of mine working.”
“But, Father,” Jennifer tried again to make her father understand her feelings.
“Absolutely, not,” his deep voice boomed as he paced about the room. Jennifer’s father was a large man, well over six feet tall and solidly built. Watching him stomping about the elegant furnishings in their home’s small sitting room would have been amusing under different circumstances. But, Jennifer was anything but amused. She had had this ‘discussion’ many times with her father and his response was always the same.
“Respectable women do not work. Your mother never worked. She married, as was her duty, and you will do the same.”
Jennifer’s father, Martin Kinsington was a successful business man, having inherited a prosperous shipping company from his father who had, in turn, inherited it from his father. Her three brothers worked in the company and she had thought that she could too. Not on the ships or down at the docks where cargos were loaded and unloaded, but in the shipping office where her skills with numbers and writing could be of use. She had listened to her father constantly complain of inadequate help in that area and she wanted to make a contribution to the family business. Not to mention, the money she could earn would help fund her dream of traveling. She longed to explore the country’s western territories. The last thing she wanted was to be the wife of one of the numerous suitors that her father constantly arranged to call on her.
Jennifer watched her father cross and re-cross the room, while her mother sat quietly in a chair saying nothing. Jennifer took a deep breath and tried again, “just a few hours a week, Father. Just enough to make me feel useful and allow me some spending money.”
“NO,” her father’s shout rattled the room’s windows. “You do not need money. A silly thing like you would not know how to handle money. Look at your mother,” he came to a stop directly in front of Jennifer and pointed to the small woman sitting without expression in the corner of the room. “She has never had two coins to rub together and she has never needed them. I see to all of her needs, just as your husband will see to yours.”
She said nothing as her mind raced for just the right reason that would convince her father. Her shoulders slumped as she realized that she could never make her father understand, Jennifer sighed deeply, her head dropping to her chest in defeat. Seeing this, her father moved quickly to reinforce her apparent capitulation.
“I never want this subject brought up again. Do you understand?” he leaned down until he was mere inches from her face and waited for her reply.
“Yes,” Jennifer whispered.
“Good,” he straightened back up, towering over Jennifer. “I have a shipment to see to,” he said with a nod to his wife. And, after one final look at Jennifer as if to say ‘this matter is settled’ he turned and left the house.
Jennifer sat in the now deafening silence and for several minutes studied her mother.
In contrast to her husband, Mary Stancey Kinsington, was a woman of slight statue and delicate features. Born into the well respected Stancey ship-building family, Mary was only seventeen when Jennifer’s grandfather had arranged for her marriage. Mary Kinsington spent most of her days seeing to the running of the Kinsington home and supervising the family’s small staff of domestic help. She attended few social functions unless her presence was required for her husband’s benefit. Instead, spending her free time participating in sewing and reading circles which were in actuality nothing more than gossip sessions.
Jennifer studied the woman who had raised herself and her brothers with as much love as any mother had ever given her children. And yet, in her own sixteen years of life, Jennifer could not recall her mother ever voicing an opinion that had not been first uttered by her father. In fact, it was hard to remember a time when her mother had voiced any opinion. Her mother lived her life in her husband’s shadow and was. seemingly. content to do so.
Jennifer knew that her mother had not loved her father at the time of their marriage but, over the years since, had come to adore him. Jennifer was never quite sure what her mother meant when she spoke of her father in that way.
‘No,’ Jennifer vowed to herself, ‘I will not end up like her.’ She rose from the chair and crossed the room to where her mother still quietly sat. Leaning down, she kissed her mother gently on the forehead.
“I’m going to the library,” she told her. “Don’t worry, I’ll be back in time for dinner.” Her father required the entire family’s attendance at evening meals unless demands of their shipping business interfered. She took the few steps to the front door, turning back she told her mother “I’ll make my dreams come true no matter what Father says.”
And, with that she left never seeing the single tear slowly making it’s way down her mother’s cheek.
“I pray that you do, daughter,” a soft voice was barely heard in the silence of the room. “I pray that you do.”
Jennifer pushed open the heavy oak door that greeted visitors to the Kinsington Library. Her father’s ‘gift’ to the town was a massive sandstone building with oak framed windows, oak bookshelves and oak reading tables. ‘Genteel understatement’ Jennifer had satirically described the building at its elaborate opening ceremony. Its design was for one purpose only and that being to impress the town with her father’s generosity. Of course, Jennifer knew the real reason behind the gift. Her father had wanted to increase his dock space and in order to sway the town council to his way of thinking, he had ‘donated’ the library and had provided a yearly stipend to employ a librarian and to purchase books. And in return he had, not surprisingly, received permission to expand his docks.
Jennifer really didn’t care why her father had donated the library, she was just glad that he had, as she spent as much time as she could at the building. In fact, the library was the best thing her father had ever done for her. She had read almost every book it’s shelves held and she had become good friends with the young man hired for the librarian position. Her dreams had taken root in the library and it’s many books continually nourished them. But, Jennifer kept her dreams to herself because she knew her father would seal the massive oak doors shut if he knew the part his library played in them.
Jennifer trudged across the oak floor and dropped down into one of the large overstuffed chairs provided for reading.
“What did he do now?” Matthew, the young man who served as librarian, asked looking up from his work cataloging the latest delivery of books. He had graduated from a nearby college a few years previously and had been offered the position of librarian immediately thereafter. He was a few years older than Jennifer but being new in town and naturally shy, he had found her friendship a welcome bonus to his duties.
“He turned me down again,” she answered.
“You know that he’ll never change his mind, don’t you?”
“Yes,” she sighed.
It was not uncommon for Jennifer to come to the library after arguing with her father and Matthew rarely had to guess the cause of his friend’s dark mood, having had this conversation with Jennifer several times before. Knowing Jennifer would need some quiet time, Matthew went back to his work leaving Jennifer to her own thoughts, .
Almost an hour passed before Jennifer pulled her legs up under her to got more comfortable in the large overstuffed chair
“So, Matt,” Jennifer, her mood much improved, playfully asked the librarian. “You planning on letting me see today’s delivery?”
“Maybe,” Matthew smiled, knowing Jennifer was fully aware of what the latest delivery contained since she had helped him make out the order weeks earlier. It was a favorite game of theirs to argue over the orders. Jennifer was fascinated with the western frontier and would argue for more books covering the west while Matthew would insist the library provide a wider range of subjects for readers. Then, after the order was finalized, Matthew would always add one or two additional books as surprises for his young friend.
“Got something here that might just bring a smile back to your face,” Matthew reached down into a box at his feet and pulled out a rolled up newspaper.
“What is it?” Jennifer asked as she rose out of the chair and made her way to Matthew’s desk.
“All the way from Denver,” Matthew handed her the paper which she took and immediately began to devour.
“Matt, this is great,” Jennifer cried excitingly without lifting her eyes from the paper she held. “But, how did you manage it,” she asked knowing that it was hard enough getting copies of newspapers from cities on the east coast let alone one from the western territories.
“Chap I know at the publishing house mentioned they sometimes send books out west. Asked him for a favor and that’s what he sent. Only a month old. Not bad, eh?” Matthew was pleased that he was able to surprise Jennifer with the newspaper.
“Not bad. I’d say it was fantastic,” Jennifer smiled at her friend. “I can’t wait to read the whole thing.”
“Go on,” Matthew motioned her to one of the large oak reading tables. “Spread it out and enjoy. I’ve got to finish cataloging the rest of these books.”
A comfortable silence fell over the library as Jennifer read the Denver paper and Matthew finished the job of cataloging the recent arrivals. Jennifer finished the news part of the paper and began reading through the advertisements at the end.
“Oh, my,” she gasped as her eyes fell on the small ad at the bottom of the back page.
“Are you okay?” Matthew looked up from his work.
“Yes, I’m fine,” Jennifer reread the ad. Turning to look at the librarian, she asked hesitantly, “Matt, do you think I’d make a good schoolteacher?”
“You’d make a great teacher,” Matthew replied. “Why do you ask?”
“There’s an ad here. It says they need single women to teach school in towns out west.”
“Jennifer,” Matthew rose from his desk, “you’re not thinking…?”
“Matt,” Jennifer was getting more excited the more she read and re-read the ad. “It’s perfect. I will be able to live in the west like I’ve always wanted AND I will make enough money to be on my own. You said yourself that I would make a good teacher,” Jennifer’s confidence grew as she rolled the idea around in her mind.
“Great,” Matthew leaned over Jennifer’s shoulder to read the ad that had captured her attention. “I said that you would make a great teacher. But, there is no way your father will allow you to travel west to be a schoolteacher.”
“I don’t plan to tell him.”
“Jennifer, you can’t….”
Jennifer thought for a moment before deciding. A sense of purpose grew inside her and she twisted her head in order to face to her friend. “I’ll be 17 in two months, Matt. Father is already complaining that I am taking to long to choose a suitor that will benefit the family and has decided that I shall be married by my 18th birthday. Whether I agree or not.” She looked pleadingly into his eyes, “please, Matt. Please promise me you won’t say anything.”
“I don’t know,” Matthew started to pace reminding Jennifer of her father’s actions only a couple of hours earlier.
“Promise me.”
“But, he is… I mean, technically, he is my employer and,,,”
“Matt,” Jennifer grabbed her friend’s arm, preventing him from ending his thought. “Please, this is a chance I have to take. I may never get another.”
Matt sat on the arm of the chair Jennifer occupied. He studied the girl looking so hopefully at him.
Jennifer was willowy and taller than most women the librarian knew but not quite as tall as Matthew’s own 5 feet 10 inches. Her ginger hair set off her sapphire blue eyes and he believed young Miss Kinsington to be one of the prettiest young women in the town. Indeed, she could have her pick of the town’s many eligible bachelors but, for reasons he had never understood, she continually turned down all requests to be courted.
Matthew had come to regard Jennifer as the sister he never as he watched her grow from a naive girl into a young woman with a fierce independent spirit who was not afraid to have hopes and dreams. Matt was convinced that Jennifer’s inner strength could wear down the strongest of men but did she have the fortitude required to survive the life she was now talking of challenging. Not to mention, doing it in a part of the country so different from the way of life she has only known.
As he continued to study her, Matt knew that Jennifer was right. Her dreams were too precious to destroy by forcing her into a future that would only bring her unhappiness and misery. Being forced into marriage by a father who was only seeing it from the standpoint of a good business deal, was definitely not the right life for the young woman watching him so intensely.
“Alright,” he gave in. “But, how do you plan to get to Denver? You have no money,” he reminded her.
“You’re due to get your next stipend soon,” she thought out loud.
“Oh, no,” he shook his head halfheartedly. “Your father would hog tie me and throw me on the next ship to the Orient if he found out that I not only kept your plans a secret from him but also gave you money.”
“He’ll never know,” Jennifer quickly assured the librarian. “I’ll save the money I make and, as soon as I can, I’ll send you enough to make up what you give me. Please Matt,” she pleaded again, her dreams were within her grasp and she was not going to let them fall through her fingers.
“Gosh, I know this is wrong,” Matthew ran his hands through his hair fretfully. He looked into her eyes and knew that he could not, would not, refuse her.
“Your father is due to come by the day after tomorrow with my stipend. That should be enough for you to buy a ticket to Denver and have some left to see you through until you get to whatever town your teaching position is in.”
“Thank you,” Jennifer threw her arms around Matthew’s neck and kissed him on the cheek. “Your the best friend anyone could ever have.”
“Just promise me one thing,” Matthew, concerned what it would look like if someone happened to enter the library just then, quickly unwrapped her arms from his neck.
“Anything,” Jennifer blushed shyly realizing what she had just done.
“Promise me you’ll make your dreams come true,” the librarian smiled at his friend.
“I promise you, Matt.”
Taking a quick look at the library’s door, Matthew wrapped his arms around Jennifer and briefly hugged her close. “If anyone can, Jennifer, I know it will be you. You better be getting home. It’s almost dinner time and you don’t want to be late.”
“Yes, you’re right,” Jennifer nodded, her eyes brimming with tears. She did not want to leave the refuge of the library but she also did not want to give her father any new excuse to again rage at her. She turned to leave, then stopped. Hesitantly, she said, “Matt, one more thing.”
“You want me to buy the ticket,” he smiled knowing that Jennifer could not go to the train station and purchase a ticket to Denver without raising suspicions.
“If you don’t mind,” Jennifer smirked.
“Just remember me when you’re out west enjoying yourself,” he laughed.
“Don’t worry,” Jennifer answered sincerely. “If this works, I’ll never forget you.”
“Did you get it,” Jennifer slid to a stop at the librarian’s desk, breathless after running all the way from her house.
“Just got back,” Matthew handed her an envelope holding a single ticket for the next scheduled train through town.
“Did anyone question you?” Jennifer asked as she clutched the envelope to her chest.
“No,” Matthew laughed, “I can honestly say that I’ve never seen any of the station workers within these walls. And, since I don’t get to that end of town very often, it’s not too likely that anyone knew who I was. They probably assumed I was just another business man traveling west.”
“Good,” Jennifer was staring at the ticket in her hands.
“Are you sure about this?” Matthew asked. “I mean, it’s not too late to change your mind.”
“No, Matt,” Jennifer sat in the chair next to his desk. “This may be my only chance. I can’t let it pass.”
With a sigh, Matthew dropped into his chair behind his desk. He knew Jennifer spoke the truth. In a way, he was jealous of his friend. Not because she was doing something to make her dreams come true but because she had dreams. He was content with his life and really had no desire to change it. He would miss Jennifer after she left, but he would find other friends and he would happily take whatever life provided. But, he knew Jennifer would never just settle for what life handed her. No, she wanted to go out and reach for her dreams, forcing life to bend to her wishes. And, he had no doubt she would do just that.
“Okay, I purchased a round trip ticket. That way you can cash in the return trip when you get to Denver and you won’t need to carry so much money on the train. Next train leaves in two days, just after midnight. Are you sure you’ll be able to get out of the house to make it?”
“I’ll make sure.”
Jesse reached down and grabbed the corners of the fifty pound bag of flour, then effortlessly lifted it from the scarred wooden floor of the general store and settled it across her broad shoulders. She carried the bag out of the store to place it in the back of the buckboard waiting in the hot, dusty street. Returning back into the store, she asked “is that all of it?”
“Yep, Jesse,” the storekeeper replied. “Everything on your list.”
“What’s the damage?”
“Give me a minute to finish this,” the storekeeper returned his attention to the column of numbers before him.
Ed Granger was a big, bear of a man but was one of the gentlest souls Jesse had ever met. A beard covered his handsome features that would easily break into a broad smile and hearty laugh when given the slightest reason. His head was topped with graying hair that matched his eyes, sparkling with an ever present good humor. His leather work apron stretched over a growing paunch, ‘too many good meals at the Silver Slipper’ Ed chiding himself ever morning as he wrapped the apron around his growing middle. He had assumed the operation of the general store from his brother-in-law who was traveling from one gold strike to another hoping to strike it rich. Always willing to help out someone down on their luck, Ed was well-liked and respected as a honest businessman in a occupation not always known for honest dealings.
“Take your time,” Jesse rested her tall, sinewy body against the well-worn wooden counter in front of Ed. She crossed one booted ankle over the other and waited patiently for Ed to finish adding up her charges.
Ed finally scratched a number on the paper, “looks like $16.83 this trip, Jesse.”
Reaching into the pocket of the faded flannel shirt she wore, Jesse pulled out the folded bills she had placed there earlier that morning. She tossed the bills on the counter. “Here. You can put the rest on my account.”
“Thanks, Jesse,” Ed made a notation in the store’s ledger before closing the large book and putting it back in it’s place beneath the counter. “Want me to send the boy over to help you unload?” He knew what the answer would be but it didn’t hurt to offer.
“No, thanks. I can manage.” Jesse left the store and stepped back out onto the shaded boardwalk that lined the front of the building. Heat waves were rising from the dirt packed surface of the street and it wasn’t yet mid-day. Jesse knew the town was in for another scorcher, the sky was completely cloudless and there was no indication that rain would be forthcoming anytime soon. Not wanting to leave the relative coolness of the shaded boardwalk just yet, Jesse leaned against the nearest support post and observed the town she now called home.
Located at the northern end of a river valley and nestled up against the forest that separated the valley from the bordering Rocky Mountains, Sweetwater wasn’t much by anyone’s standards. The town had been built around the stage station, it’s main purpose to serve as a supply point for the ranches and mining camps in the surrounding valleys and mountains. A dozen buildings of various sizes and shapes lined the stage road that doubled as the town’s only street. The original adobe stage station still served that purpose and was located directly across the street from the general store. The town had received its name from the sweet tasting waters of several creeks that flowed out of the nearby mountains to form the river running down the center of the valley. The constant supply of fresh water made the valley an ideal place for ranching and kept the town alive during long summer month’s of drought.
Jesse had lived in Sweetwater just shy of a year. She had arrived with nothing but the clothes on her back and the horse she rode. In her shirt pocket, she had carried the deed to a gambling house she had won in a Denver poker game. Never having heard of Sweetwater before the night of the game, Jesse had come to the small town intent on making a fast sale on the Silver Slipper and leaving town with some gold in her empty pockets. But, as the fates would have it, Jesse had fallen in love with the town and the surrounding valley. So, instead of selling the establishment of questionably repute, she had decided to stay and make it into a respectable business.
After assuming ownership of the Silver Slipper, Jesse had immediately thrown out the dishonest card dealers. She had shut down the second floor rooms to use by the ‘working women’ and had turned them into boarding rooms. The main floor had been split into two sections, one providing a quiet place for diners to enjoy a well-cooked meal. The other allowed the continuation of the gaming tables for anyone interested. The women who had once plied their trade in the upstairs rooms had become the Slipper’s card dealers, maids, and cooks. It hadn’t taken much persuasion on Jesse’s part to win the women over to the new way of doing business. Those who weren’t happy with the changes had been given ten dollars and a one-way stage ticket out of Sweetwater. Those who had decided to stay soon found liking serving meals, cleaning rooms, or dealing cards much more then they had their previous horizontal profession.
Cattle and horse buyers coming to Sweetwater to do business with the valley’s ranchers quickly discovered they could get a clean room and good meal at the Slipper and made it their primary place of business when in town. Folks riding the stage to and from points further west, enjoyed the atmosphere they found at the Silver Slipper much better than staying at the old stage station and were more than glad to spend the extra dollars to rent a room for the night. And, once word got out that the tables at the Silver Slipper provided honest games of chance, there was no shortage of customers. Jesse soon had a thriving business.
The Silver Slipper also provided Jesse with enough money to purchase a small ranch just outside of town where she was beginning to slowly build a cattle herd. It had always been a dream of Jesse’s to own her own ranch. Growing up, she had thought that she would take over the running of her family’s ranch from her father. After all, she had no brothers and it seemed like the natural thing would be for her father to let her assume the ownership of the ranch. But, that was not to be. When her father had reached the point that he was no longer able to work the ranch, he had sold it without ever discussing his decision with Jesse. She had come home after riding fence for several days to find her father and mother packing their belongings in the back of a heavy freight wagon. She was informed that the ranch had been sold and her parents were moving into Bozeman. She ‘being of legal age, and showing no inclination to marry’, her father had told her, could now find her own way in life.
After months of drifting around the western territories, Jesse had found herself in Denver and, being low on cash, had decided to sit in on one of the poker games taking place in the saloon where she sat nursing a glass of whiskey. Lady Luck was with Jesse that night and, by late in the evening, she had won most of the money on the table. One player, having consumed more than his share of whiskey during the game, had insisted on one more hand.
“Only fair to give me a chance to win back my money,” he told the rest of the players, his words slurred from the liquor.
“Ah, call it a night, Johnson,” another player said. “You ain’t got nothin’ left to bet with.”
Reaching into his coat pocket, Johnson pulled out a crumpled piece of paper and placed it on the table smoothing the sheet with his rough hands. “I can bet with this.”
“What is it?” the third man at the table asked.
“Deed to the Silver Slipper. Best whorehouse in Sweetwater,” Johnson bragged.
The other men at the table and those at nearby tables hearing the loud boast burst into laughter. “You mean, the only whorehouse in Sweetwater,” the third player guffawed. “Broken down wreck. Even your whores ain’t much from what I’ve heard.”
“It’s worth enough,” Johnson shouted, his face beet red in anger at the jeers directed his way. “Come on,” Johnson said to the other players. “What have ya got to lose?”
“I’ll play,” Jesse said quietly. She had remained silent up to this point being content to leave the game with her winnings. But, she didn’t take kindly to the way the men talked about the ‘working women’. Seemed like men were always mighty glad to have the ladies share their beds but were loathed to have the same women share their table.
“I’ll put two hundred in the pot,” that amount was half of the money in Jesse’s neat stack of bills. But, she figured she could chance losing it and would still have a great deal more than she’d had when she entered the saloon.
“Now we’re talking,” Johnson placed the deed in the center of the table next to Jesse’s bet. “Anyone else want in,” Johnson looked expectedly at the other two men sitting round their table.
“Nope, I’m out,” said the first man remaining in his chair but pushing back from the table..
“Me, too. If I don’t get home soon, my woman will meet me at the door with her frying pan again,” the second man rose to a chorus of sniggers and catcalls from the saloon’s patrons now crowding around the table. It wasn’t often that this kind of money was bet on one hand and everyone wanted a good view knowing that the game would be talked about for months to come.
“Okay,” Johnson glared across the table at Jesse. “We’ll cut the cards to see who deals,” he said matter of factly and reached for the deck.
“I have a better idea,” Jesse said in a manner that demanded no argument. “Barkeep, a fresh deck of cards.” If she was going to play for these stakes, she wanted to do so with a deck that hadn’t been marked. Then, looking around the crowd of faces circling the table, she pointed to a boy who didn’t look old enough to be out this late at night let alone in this type of establishment.
“You deal,” Jesse told the boy.
The boy found himself being slapped on the back and pushed toward the empty chair at the table. Several in the crowd laughed and scoffed at his instant celebrity. He sat heavily down on the chair and gulped loudly as the barkeep handed him the fresh deck.
“Why him?” Johnson demanded. If he couldn’t deal, he wanted to pick his own dealer, one that could slip him a card or two from the bottom of the deck.
“Looks honest,” Jesse stated. She stared at Johnson daring him to voice an objection to the neutral dealer.
Johnson studied the woman that sat across the table from him. She was taller than himself and a lot of the men in the crowd. Though her body showed all the curves he would expect to see on a woman, it also showed a strength built over time from long days of hard work. Johnson saw a woman that could be more than a match for his own fighting skills and decided that this night was not the time to put his theory to the test. “Fine,” he mumbled. Turning to the nervous dealer, he barked “Deal, damn you.”
The boy broke the seal on the pack of cards, he removed the jokers from the deck before proceeding to shuffle the cards. After several shaky shuffles, cards were dealt out to the two players. Jesse picked up her cards and gave them a long look as she cradled them in her hands so no one else could see what she held. Leaving the cards in the order they had been dealt, she placed her hand face down on the table. Her gaze turning to her opponent.
Johnson was staring at his cards, beads of sweat had formed on his upper lip and he wiped at them with the back of his hand. He looked at Jesse, trying to find any hint in her expression as to what she held in her hand. Seeing nothing, he grunted and studied his hand again. Johnson took two cards from his hand and threw them face down on the table. “Two,” he told the dealer, asking for new cards.
The boy dealt two cards to Johnson before turning to Jesse.
“One,” Jesse calmly informed the dealer and placed a card in the center of the table. A wave of mumblings swept through the watching crowd as Jesse added the new card to her hand, she nodded to Johnson to play his cards.
“Three sevens,” Johnson smiled as he placed his hand face up on the table. “Looks like Lady Luck decided to change sides,” Johnson gloated and reached for the pot in the middle of the table. He wasn’t going to lose the Silver Slipper after all.
“Let the lady show her cards,” someone in the crowd called out forcing Johnson to withdraw his hands.
“Go on,” Johnson growled at Jesse. “Show ’em you ain’t got enough to beat me.”
Jesse gave Johnson a half smile, half smirk as she started to turn her hand over, one card at a time. A hush fell over the room as a king of hearts was followed by a king of spades. Next, a two of diamonds was turned over and then a two of clubs.
“Told ya,” Johnson crowed. “She ain’t got nothin’ but two pair.”
Before Johnson could get the words out of his mouth, Jesse turned over her last card to reveal the two of hearts.
A loud shout broke the silence and members of the watching crowd began to whoop and holler at Jesse’s victory. She gathered the money and deed from the table. Carefully folding the deed before placing it into her shirt pocket, Jesse then took twenty dollars from her stack and pushed it across the table to Johnson.
“No one should leave the table broke,” she offered to Johnson.
Johnson picked up the bills and flung them back at Jesse, “Don’t want your money, bitch.” He stood so fast that the people standing behind him did not have a chance to move and several were knocked back into others crowding behind. The table was jostled and would have tipped over had the young dealer not grabbed on with both hands to steady it. Jesse watched Johnson leave the table, handed a five dollar bill to the boy who had dealt the cards then rose from her seat. She smiled at the several patrons shouting offers to buy her drinks, “Sorry, boys. It’s been a long night and I think a nice, warm bed is a better idea.” Some of the men immediately changed their offers from whiskey to sharing her bed. She politely declined and, working her way through the crowd, made for the same door that Johnson had exited moments before.
Once outside, Jesse stood for several minutes enjoying the cool night air after the stuffy heat of the saloon. Her horse, Dusty, stood patiently at the hitch in front of the saloon. Jesse walked over to Dusty and patted her gently on the neck. “Looks like we own a house of ill repute in Sweetwater,” Jesse reported to Dusty. “Didn’t think I’d ever be returning to Montana,” Jesse said as she unwrapped the reins from the hitching post. She pulled herself up into the saddle, “by the look of Johnson, seems best to hightail it out of Denver. So, guess we’ll be heading north tonight.”
Dusty vigorously raised and lowered her head several times in agreement before turning to the street and breaking into a trot without Jesse’s urging.
Jesse laughed, asking her horse, “you know something I don’t?”
Standing in the alley by the saloon and hidden in the night’s shadows, Johnson watched as Jesse mounted her horse. Johnson reached for the pistol in his holster but before he could get a shot off a group of men, still talking about Jesse’s winning hand exited the saloon, blocking his view. When the men finally walked past Johnson, Jesse was no longer in sight.
“‘Bout time for the stage to arrive,” Ed broke into Jesse’s thoughts as he stepped out onto the boardwalk and stood next to her. Looking across the street, Jesse noticed that people were beginning to gather at the stage station.
“New schoolteacher is supposed to be on the stage,” Ed said excitingly.
“Yep,” Jesse answered thinking ‘that explains the crowd of single men waiting for the stage today.’ There seemed to be have been little else discussed in town for the past several weeks since Mayor Perkins had announced that a schoolteacher would be arriving from Denver to take on the duties at the schoolhouse. The town had built the school last summer but it had stood empty because the town lacked a qualified teacher.
Jesse’s ears picked up the sounds of beating hoofs and slapping leather. The cries of the stage driver yelling commands to his team of straining horses announced the stage’s impending arrival. Moments later, the coach could be seen where the road broke from the forest. The stage thundered into Sweetwater and skidded to a stop in front of the stage station, a choking cloud of dust filled the air and covered everything and everyone it came into contact with.
Jesse looked across the street as the passengers began to step from the stage. A young woman was helped from the coach and the small gathering of single men surged towards her. ‘That must be the new schoolteacher’, Jesse thought as she reached up and removed her stetson, releasing a shower of shoulder length reddish, brown hair. Using the sleeve of her shirt, Jesse wiped the sweat from her brow and waved the stetson in front of her face to clear the dust kicked up by the stage.
At the same moment, the young woman stepped away from the stage. Getting her first look at the town of Sweetwater, she turned to observe the side of the street where Jesse stood. The motion of Jesse’s hat attracted her and her eyes fell upon the most beautiful woman she had ever seen. A pair of sapphire eyes locked onto a pair of auburn eyes and the world seemed to stand still for both women.
“Hey, are you alright?” Ed asked Jesse as she drew in a startled breath and slumped against the boardwalk’s post. The sound of Ed’s voice allowed Jesse to break her gaze, she jammed the stetson back on her head and stepped down into the street.
“Yeah, I’m fine,” she said to Ed as she walked around her buckboard. Climbing up onto the seat, she immediately urged the team forward. Ed shrugged his shoulders at Jesse’s rapid departure and then stepped off the boardwalk, crossing the street to join the crowd by the stage.
Jesse concentrated on the dusty road in front of her trying not to think of what had just happened. But, as she looked down at the reins her hands held, she saw that they were shaking. “What the heck?” Jesse muttered to herself as she left the new schoolteacher and her crowd of instant admirers behind.
Jennifer stood in the dusty street surrounded by several young men all speaking at the same time, but she heard nothing but the beating of her own heart. She watched as the buckboard carried the auburn haired woman away from her and wondered why she had an almost uncontrollable urge to run after it.
“Let me through,” a man was elbowing his way through the young men surrounding the new arrival. He finally came to a stop directly in front Jennifer and grabbed her smaller hands in his beefy ones, shaking them heartily.
“Miss Kinsington, it is so nice to finally make your acquaintance,” the man said enthusiastically. His actions taking Jennifer’s attention away from the retreating buckboard. She turned to find a middle-age, balding man barely as tall as herself but much wider and with a bushy mustache that hung down hiding his mouth, it’s hairs blowing out from his face with every word he spoke.
“Please allow me to introduce myself,” he continued pumping Jennifer’s hands up and down. “My name is Perkins, Miles Perkins. I am Sweetwater’s Mayor and it is I who arranged for your position,” the mayor continued, always ready to take credit for any project he had any part of, no matter how small his contribution might have been. And, in this case, it had actually been the mayor’s wife that had insisted he make arrangements for a schoolteacher so that she could be free of their children for some part of the day. Mayor Perkins had known that if he didn’t quickly follow his wife’s instructions, he would be spending cold nights in the old shed behind his house. But, regardless of how it had come about, a schoolteacher was now in town and Mayor Perkins was taking the credit.
Jennifer smiled sweetly at the man as she extricating her hands from his, her arms feeling like the bones had come loose after the vigorous shaking. “I’m pleased to meet you, Mr. Perkins.”
“You can call me Mayor. Everyone does,” the mustache billowed as several not too well hidden groans could be heard from the crowd pressed around them.
“Do you have any luggage?” the mayor asked.
“Just the one,” Jennifer indicated the small, canvas travel bag she had removed from under the seat inside the stage. Many of the young men surrounding them offered to carry the bag for Jennifer but she insisted on taking it herself. It wasn’t very large and she could easily carry it. Besides, the last thing she wanted was a brawl to break out amongst the young men begging for her attention.
“Go on, now,” Mayor Perkins instructed the un-welcomed men. “I’m sure your employers expect you to be earning your pay and not lolli-gagging about. Now scoot, the lot of you.” Mayor Perkins took Jennifer’s arm and started to walk down the street in the same direction that the buckboard had taken. As they walked, he pointed out the purpose of the scattered buildings they passed.
“That is, as you know, the stage station,” the mayor pointed to the small, adobe building that looked to be ready to fall in on itself “and telegraph office. The telegraph hasn’t reached Sweetwater yet but you can have a message sent by stage to the nearest telegraph office. You will probably want to send your folks a message letting them know that you have arrived safely in Sweetwater.” Jennifer nodded in agreement to the mayor even though she had no intention of sending a message to her family and providing her whereabouts to them.
“That, there, as you can see, is the general store,” he pointed across the street where Ed was back standing again in the shade of the boardwalk. Ed waved to the mayor and his charge, “that’s Ed Granger, he runs the store for his no good brother-in-law.” Jennifer smiled and waved back at Ed.
“Now, that’s the town hall and jail,” Mayor Perkins indicated the buildings adjoining Ed’s store. “And, next to the jail is the town’s newspaper, The Gazette. Over here,” the mayor was now pointing to the near side of the street again, “that’s the Oxbow Saloon and not a decent place for a young lady like yourself” the mayor informed her. “Behind the Oxbow, are the stables and blacksmith. Most of the town folk live up at this end of town, you’ll have a chance to meet everyone at the social in your honor tomorrow evening.”
Jennifer thought his description of “this end of town” rather an overstatement for a town no bigger than a couple of city blocks back home. But, she kept her thoughts to herself instead asking, “and, where is the schoolhouse?”.
“Right over there,” the mayor stopped and pointed to a building sitting atop a small knoll on the other side of a creek that ran out of the forest behind the stables and flowed past the Oxbow before paralleling the road out of town. A foot bridge allowed access across the creek and a gravel path lead to the schoolhouse. “We’ll be having the social there, so you can get acquainted with it then. It’s all ready for you to start your lessons. Books and supplies already purchased and waiting for you.”
Jennifer had wanted to see the schoolhouse first but decided that tomorrow would be soon enough. Besides, the sun was reaching its peak in the cloudless sky and she was more than ready to get out of its blazing heat. So, without comment she continued to follow the mayor down the dusty street. Other than what were obviously private homes, there was only one other building in the direction they were walking. A two story structure that looked to be newly painted with new curtains hanging in its many windows. A large painted silver slipper graced the side of the building facing the stage road. And, standing in the shade in front of the building stood the buckboard.
“This is the Silver Slipper,” the mayor was telling Jennifer. “The town has arranged for you to have a room here, it’s the closest thing Sweetwater has to a rooming house. Jennifer’s heart nearly jumped from her chest. Mistaking, Jennifer’s reaction for uneasiness, the mayor hastened to add, “no reason to fear, Miss. Kinsington. The Slipper is a very respectable place now that Jesse is running it. Clean rooms and the best food in town. Jesse will take good care of you, you have my personal guarantee on that.”
Jennifer followed the mayor up the steps to the Silver Slipper’s wide porch. It wrapped entirely around the building provided places to enjoy the coolness of its shade regardless of the time of day or the season. The edge of the porch was protected by crossed rails between the support posts and the rails were topped with a wide flat board providing a sturdy place to sit if one so desired. The shade of the porch felt wonderful after the heat of the street and Jennifer had to stop herself from flopping down in one of the many chairs scattered about the porch.
“Mayor Perkins, it is good to see you again,” a stout woman opened the door to the building. “This must be our new schoolteacher.” smiling broadly, she held out a hand to Jennifer.
“Yes, this is Miss Kinsington. I believe you are to have a room ready for her,” Jennifer noticed that Mayor Perkins addressed the woman arrogantly but she seemed not to take any offense to his manner.
“Of course,” the woman gently squeezed the hand Jennifer offered before releasing it. “Welcome to the Silver Slipper, Miss Kinsington. Do come in. I’ve just finished makin’ a fresh batch of lemonade. Perhaps you would like to join me,” the woman opened the door wide to allow Jennifer and the mayor to enter.
Jennifer was disappointed that this was not the woman she had seen earlier. This woman appeared to be of the same age as Jennifer’s mother but had obviously seen a great deal more of life. She stood of average height and though she looked to be somewhat frail, Jennifer was sure that the woman leading her into the building could easily outwork most men. She seemed genuinely friendly towards Jennifer, unlike Mayor Perkins who accompanied the two women inside, and Jennifer instantly liked the older woman.
“Thank you, Miss Jesse,”
“Oh, dear,” the woman chuckled. “I’m not Jesse.”
“I’m sorry,” said Jennifer confused. “I thought Mayor Perkins said…”
“I said that Jesse owns the Slipper. This is Bette Mae, she helps run the place for Jesse,” the mayor quickly filled Jennifer in.
“Oh,” said Jennifer, “I apologize.”
“There’s no need,” the woman stopped her. “Now, please sit and have some of this here lemonade. Jesse is workin’ in her office but you’ll have plenty of time to meet her later.” Bette Mae had expected Jesse to meet the schoolteacher and was surprised that she hadn’t appeared from her office.
Jennifer dropped down into the closest chair. “I’d love a glass,” she said as she placed her bag on the floor next to the chair.
“Good,” Bette Mae poured a large glass and handed it to Jennifer. “How about you, Mayor?”
“No, thank you. I must be getting back to my other duties. A moment of your time, please, Bette Mae,” the mayor motioned that he wished to speak to the woman privately.
“I’ll be right back. You jus’ help yourself to refills,” Bette Mae told Jennifer before following the mayor back out onto the porch.
Jennifer studied the room in which she sat. Several tables similar to the one she occupied were spaced about the room. Each table was covered with a linen tablecloth and a small arrangement of fresh flowers were placed in the center of each table. Silverware was set out on the tables ready to be used by any diner that might request a meal. This was obviously the dining room of the establishment but it was also so much more. Jennifer was surprised to see against the far wall, bookcases overflowing with books. In front of these, a varied arrangement of overstuffed chairs and settees made an inviting place to spend a few moments or hours enjoying the written word. Curiosity got the better of her and Jennifer rose from the table crossing the room to see what kind of books would be found on the shelves. She was amazed at the wide range of titles and authors.
“You like to read?” Bette Mae’s question surprised Jennifer in her search. “Now, that was a silly question to be askin’ a schoolteacher, wasn’t it?”
Jennifer smiled at the woman, “what is that saying, no question is a silly question as long as you are really interested in the answer.” Jennifer returned to the table and her glass of lemonade. “This is wonderful, thank you. And, to answer your question, I love to read. I’ve spent many an hour in the library back home. Some of the best afternoons of my life.”
“Oh,” Bette Mae was surprised that a girl as pretty as Jennifer would be forced to spend afternoons within the stuffy walls of a library. “And, where would home be, Miss Kinsington?”
“Please call me Jennifer.” Not wanting to discuss the home she had so recently left, Jennifer quickly changed the subject to the mayor’s private discussion with Bette Mae, “is everything alright with the arrangements?”
Bette Mae picked up on the subject change but being from the west where you didn’t ask too many questions, she let it pass. “Everything is fine. He was just making sure that Jesse understood the importance of looking after you while you’re staying here at the Slipper. As if Jesse would take such a thing any way but seriously. Mayor Perkins can surely be a pompous ass given half a chance,” Bette Mae laughed. “Oh, excuse my language, child.”
Jennifer smiled at the woman, she had heard much worse than that when her father was on one of his numerous rampages. “I imagine he takes some getting used to. He about shook my arms right out of their sockets before I could get my hands out of his,” she laughed remembering the mayor’s energetic greeting.
“That he most definitely does,” Bette Mae joined in her laughter. “Well, I suspect you’d like to see your room and freshen up. Maybe even take a nap. Ridin’ that stage can shake the fillin’s loose in your teeth. Not to mention the dust them horses kick up.”
“It certainly wasn’t quite what I had imagined,” Jennifer agreed as she rose from the chair.
“Well, let’s get you settled then,” Bette Mae picked up Jennifer’s bag refusing to listen to her protests. She led Jennifer to a staircase midway between the bookcases.
As she climbed the stairs, Jennifer noticed for the first time an alcove tucked behind the staircase with closed door marked ‘private’. She wondered if it led to the office of the mysterious Jesse.
Upon reaching the top of the stairs, Jennifer followed Bette Mae down a long hallway to the room at the far end. Bette Mae unlocked the room’s door and handed Jennifer the key before pushing the door open for Jennifer to enter. It was smaller than her room back home but had everything Jennifer would need. In one corner, sat a four-poster bed with a thick mattress and covered by a warm quilt. Pushed against the wall next to the bed, stood a small chest of drawers. In the opposite corner of the room, there was a well traveled trunk that doubled as a sitting bench. A small desk sat against the other wall, neatly stacked writing paper and sharpened pencils lay on its surface ready for use. An oil lamp sat atop the desk and another sat on top of the dresser.
The room was located in the corner of the building and had windows on both outside walls, Jennifer especially liked this and she quickly crossed the room to enjoy the views. When she looked out the window facing the front of the building, she saw the auburn haired woman retrieving items from the back of the buckboard below. “Who is that beautiful woman?” the words were out of her mouth before she even knew she had been thinking them.
“Why, that’s Jesse,” Bette Mae said without pausing in her work emptying Jennifer’s travel bag and putting the few items into the top drawer of the chest next to the bed.
Jennifer watched until Jesse disappeared under the porch’s roof on her way back into the building before turning away from the window.
“I’m sorry, I did not intend for you to do all of the work.”
“Hush, child, you didn’ have enough in that bag to require two people to unpack. Looks like you’re goin’ need a few things before you start teachin’ school. How many dresses do you own?” Bette Mae asked although it was obvious that the only dress Jennifer had was the one she was wearing.
“Just this one,” Jennifer said. “I was hoping to buy a couple more once I arrived.”
“Heavens, that won’t do for the town’s new schoolteacher. Now, take it off so I can have it washed while you take a nap. No argument, hand it over,” Bette Mae held out her hand, she was not moving until she had the dress. Jennifer pulled the dress over her head and handed it to Bette Mae. “Now, git yourself into that bed. A nice long nap will do you good.”
Jennifer removed her dust covered shoes and stockings before crawling between the cool sheets on the bed. She hadn’t realized how tired she was after being tossed about on the long stage ride from Denver and she snuggled down in the softness of the feather mattress and pillows. Before Bette Mae reached the bottom of the stairs, Jennifer was fast asleep dreaming of a woman with the most beautiful brown eyes.
Behind the door marked ‘private’, Jesse sat at her desk. The sound of the schoolteacher’s laughter floated into her office from the dining area and she knew she should go out and greet the schoolteacher. But, before she could get up the nerve to do that, the sound of steps on the stairway told her that Bette Mae was taking the young woman upstairs to her room. Unable to concentrate on the ledgers spread out before her, Jesse decided to get the items remaining in the buckboard. She had just settled back in behind her desk when she heard a knock at the door.
“Come in, Bette Mae,” Jesse knew she would be coming to fill her in on the Slipper’s newest guest.
“Brought you some lemonade, thought you might could use a cold drink,” Bette Mae entered the room with a tray holding a half full pitcher and two empty glasses. She set the tray down on a table and filled both glasses, handing one to her employer and friend.
“Thanks,” Jesse smiled.
“You should do more of that,” Bette Mae said as she settled into one of the chairs opposite Jesse’s desk.
“More of what?” Jesse questioned the woman.
“Smile. Makes you look years younger,” Bette Mae grinned at Jesse’s discomfort.
Changing the subject, Jesse asked “is she settled?”
“Yes, she’s taking a nap,”
“Room okay with her?” Jesse had been unsure as to what requirements the schoolteacher would need in a room and had decided to give her the best room in the Slipper. After all, the schoolteacher would be spending a lot of time in the room and Jesse figured she might as well be as comfortable as possible.
“Her name is Jennifer,” Bette Mae informed Jesse. “Jennifer Kinsington. And, she’ll be needin’ some clothes ‘fore she starts with her teachin’ duties.”
“What?” Jesse asked, confused as to why Bette Mae would find that to be of interest to her.
“This is the only dress she has,” Bette Mae held up the dress she had carried into the room with the tray. Jesse had assumed it to be a rag Bette Mae would use to clean up after they finished with their drinks.
“That’s it?
“Yup.” Bette Mae continued, “It probably was brand new when she left home. But, now, it ain’t decent to wear.”
“There’s no seamstress in town,” Jesse drained the last of the lemonade in her glass.
“Ruthie can sew,” Bette Mae refilled both glasses. “I’m guessin’ we can find a dress or two at the general store and Ruthie can alter them to fit the lass. That’ll do until Ed can order some material from Bozeman.”
Jesse cringed at the mention of the town where her parents now lived. “Okay, get what you think she needs. Tell Ed to put it on the Slipper’s tab.”
“Best find Ruthie and get over to Ed’s then,” Bette Mae gathered up the tray and dirty glasses.
Jesse watched the woman leave her office. She leaned back in her chair and wondered why she had just agreed to finance a new wardrobe for the schoolteacher. She had no obligation to the recent arrival except provide her room and board. But, somehow she felt a need to take care of the young woman. But, why? As she pondered her dilemma, the image of the woman with the most beautiful blue eyes filled her thoughts.
Jennifer stood at the front door of the schoolhouse. She had decided to spend her free time before the evening meal visiting the schoolhouse. For the umpteenth time, her hands brushed smooth the new gingham dress she wore. A smile crossed her face as she remembered how she had been presented with it after waking from her nap.
“I can’t take it, Bette Mae,” Jennifer declared to the two women standing in her room with the dress draped over the younger woman’s arms.
“Nonsense, you need somethin’ to wear,” the older woman thrust the dress at Jennifer.
“I have this dress,” Jennifer indicated the only dress she owned that was now washed and carefully folded atop the chest of drawers along with her stockings.
“That dress is nothin’ but a rag. Why it barely survived the washin’ to get the dirt and dust out of it. Now, don’t be upsettin’ Ruthie here after she spent the last couple of hours alterin’ this one so it would fit you.”
Jennifer was embarrassed and uncomfortable with the two women knowing she had so little and could afford even less. But, she had left home with the barest of possessions not thinking through how she would get by the first few weeks until she received payment for her teaching duties.
“I know it’s not as nice as what you must be used to but it’s the only dress Ed had in the store,” the younger woman Ruth explained. She was not much older than the students Jennifer would be teaching but already bore the marks of a rough life. Fading scars marred her face which would have been considered very pretty otherwise. Jennifer wondered why this girl would spend her time sewing a dress for a complete stranger.
“It’s a beautiful dress, Ruth,” Jennifer smiled at the girl as she held the dress up and admired the handiwork of the seamstress. “I don’t know how I’ll pay you. Maybe I can ask Mayor Perkins for an advance on my salary,” she offered.
“No need. Jesse has already taken care of it. And, as soon as Ed gets some dress material from Bozeman, Ruthie will sew you some more to go along with this one.”
“Miss Jesse did this. But, why would she?” Jennifer asked.
“Don’t know,” Bette Mae answered, omitting her part in seeing that the new schoolteacher had decent clothes to wear. “But, you can ask her at supper. We’ll eat in an hour,” and with that Bette Mae and Ruth left Jennifer to change into her new dress.
At supper, Jennifer found herself eating alone, Bette Mae and Ruth were seeing to the paying customers and Jesse had not appeared from her office. Jennifer finished the excellent meal and decided that she might as well return to her room since it was obvious that her benefactor had no intention of joining her. With a heavy sigh, she rose from her chair and crossed the room to the stairs. As Jennifer passed in front of the alcove leading to Jesse’s private office, the door opened and the mysterious woman stepped out.
“Oh, Miss Jesse,” Jennifer was startled at the sudden appearance.
“Evening,” Jesse nodded to the young woman.
“I’m sorry I missed you at supper,” Jennifer said shyly. She was close enough to reach out and touch Jesse, and it took all the self control she possessed not to do just that.
“Sorry, I lost track of time,” Jesse mumbled.
“Oh, I understand,” Jennifer cut in. “I’m sure running a business like the Silver Slipper must take up most of your time. Maybe, you can make it some other night.”
“Maybe,” Jesse wondered what Jennifer would say if she knew that Jesse had purposely remained in her office through supper. Jesse had been unable to bring herself to face the schoolteacher who seemed to have such a strong effect on her. So, she had stayed until she was sure that Jennifer would have finished her meal and returned to her room upstairs. Jesse had no way of knowing that Jennifer had stretched out her evening meal in the hopes that she would make an appearance. And, so Jesse was just as surprised to see Jennifer still in the dining room as Jennifer was to see Jesse open the office door.
Sensing Jesse’s unease, Jennifer said, “well, it’s been a long day and I’ll bid you a good night Miss Jesse.” Then remembering the dress she wore, Jennifer rushed to add “thank you for the dress. You really didn’t have to go to such trouble. I’ll talk to Mayor Perkins tomorrow about an advance on my salary so that I can pay you back.”
“No need,” Jesse replied.
“Oh, no. I insist you let me pay you back, Miss Jesse,” Jennifer reached out and lightly placed a hand on Jesse arm. Both women were startled at the sensations that resulted from the touch.
“I’m sorry, Miss Jennifer, but I really should be getting back to the ranch,” Jesse pulled her arm from Jennifer’s touch, her long strides carried her to the Slipper’s front door. As she reached the door, Jesse turned and looked back at Jennifer. She stood where Jesse had left her, her light brown hair backlit by the oil lamps that provided the room’s illumination. Jesse rubbed her hand over her still tingling arm, then she turned and was out the door.
Jennifer slowly followed Jesse out the door. She stood on the porch until long after Jesse and the buckboard had been swallowed by the night’s darkness.
Jennifer released the children after her first day of class. The previously quiet schoolhouse was instantly filled with the sounds of laughing and talking children. Jennifer smiled. Was it really only two days since she had stepped from the stage that had carried her into Sweetwater? It seemed like she had been in this small western town all of her life.
Jennifer found that her schoolteacher responsibilities would require her to teach twelve children ranging in age from six to sixteen. Their skills and knowledge coming in every combination imaginable and it would take her a few days to uncover each student’s strong points and weaknesses and to develop study plans that would work with such a diversified group. But, she looked forward to the challenge and the students seemed just as determined to work hard at their lessons.
Jennifer was surprised to discover that class would be held from mid-morning to early afternoon only, as the students were needed to help out with chores at home. This would leave her with most of the afternoon free and she planned to make use of the free time by getting a second job to earn enough money to pay Jesse back for her new dresses.
Jennifer closed the schoolhouse door and quickly made her way back to the Slipper, She was anxious to ask Bette Mae about the employment opportunities in town.
“There must be something that I can do, Bette Mae. Are you sure that Miss Jesse couldn’t use some help in the office? Or, I could help you in the kitchen. I’m a pretty good cook if I say so myself.”
“Oh, no. Miss Jesse would have my hide if’n I put you to work around here. Not fittin’ work for a schoolteacher,” Bette Mae shook her head vigorously from side to side.
“Well, I must find something,” frustrated, Jennifer slumped back in the chair she occupied. “I must pay Jesse back for the dresses.” ‘Not to mention the extra income would help pay Matt back for advancing the money for my trip west’, she thought.
“If you’ll excuse me ladies,” a man sitting at a nearby table spoke to the two women. “I might just have a solution.”
Jennifer sat up straight in her chair and looked at the man. He was of middle age with salt and pepper graying hair and deep brown eyes. It appeared that he had forgotten to shave that morning and a light beard covered his cheeks and chin. His shirt sleeves were rolled up to just below his elbows and both the shirt and his hands were blotted with ink stains.
“You’re Mr. Newby,” she offered. She had met the man at her welcoming social the evening before. “If I remember, you own the Gazette.”
The newspaper editor wiped his hands on the napkin then stood and crossed to stand next to the table Jennifer and Bette Mae occupied. “Thaddeus Newby,” he offered an ink stained hand to Jennifer. “Yes, I own the Gazette and serve as its editor, reporter, typesetter, and anything else that might be necessary,” he laughed as he shook her hand.
“Please join us, Mr. Newby. You said you might have a solution,” Jennifer encouraged the editor to continue.
“Thaddeus, please,” he said as he took a seat in the chair between the women. “Yes, I could use someone at the Gazette to help me.”
Jennifer was intrigued, “But, I have no newspaper training, Mr. Newby.”
“You’re a schoolteacher and I assume that you can read and write. That’s all the training you need,” the editor told her.
Wondering what she had done to be so lucky, Jennifer stuck her hand out to the editor, “You have a deal Mr. Newby. When do I start?”
“Just as soon as you learn to call me Thaddeus,” he laughed and shook her hand.
“Looks like Sweetwater has itself a new reporter,” Bette Mae joined in the laughter. “I’d say that calls for a drink,” she filled three glasses with lemonade and they toasted Jennifer’s new position.
“What do you think, Dusty?” Jesse patted the mare’s neck as she drank from the creek. “Looks like three, maybe four riders,” Jesse stated as her eyes followed the hoof prints until they disappeared into the creek several yards from where she stood. Dusty raised her head, water dripping from her muzzle, and twisted her head to look at her mistress. The mare cocked her head as if to ask what her mistress was waiting for.
“Yeah, ” Jesse mumbled as she swung herself back up into the saddle. “Let’s see if we can figure out who made them.”
Jesse had been out checking on her small herd when she first spotted the tracks. Since, she worked her ranch alone, it was unusual to find the tracks of other riders on her land. It was possible that it was just some cowboys cutting across her land to one of the neighboring ranches but it didn’t hurt to check them out.
Jesse urged her golden mare, Dusty, forward at a slow walk. She hung her head down low next to Dusty’s shoulder as she tried to locate the tracks further upstream. After riding up the small creek bed for almost a mile, Jesse spotted the tracks as they left the creek and climbed back up the muddy bank. She followed the tracks away from the creek and back into the ponderosa pine forest that bordered this part of her land. She wondered what riders would be doing this far on her land. ‘Strange,’ she thought ‘there are no other ranches this side of the valley.’
Jesse continued to follow the tracks until she lost them where the riders had crossed a rocky stretch of ground between the forest and the valley. The riders could have traveled in several different directions from that point and with nightfall not too far away, Jesse turned back to her ranch house.
“I’ll have to ask around town. Maybe, someone saw three riders heading this way,” Jesse said to Dusty as they turned back. Dusty raised her head and neighed in agreement.
After spending most of the day walking, Dusty was ready to stretch her legs and Jesse encouraged her to do so. If anyone had come across them that evening, they would have seen the mare running like the wind, her golden tail and Jesse’s hair flying behind as they raced the growing darkness home
“Rustlers.” Conrad Billingsley slammed his fist down on the bar rattling several glasses and knocking some over.
“Can’t be,” Sheriff Monroe answered. “The valley is too small for rustlers to go unnoticed.”
“I’m telling you I lost a dozen head this past week and some of the other ranchers said that they’re missing cattle, too. So,” Billingsley jabbed a finger into the Sheriff’s chest. “You better get off your lazy butt and go find out what’s happening,”
Conrad Billingsley stood half a foot shorter than the sheriff but was not afraid to stand his ground. He had seen more action than he cared to remember during the conflict between the north and south and had headed west as soon as his discharge papers were signed. He had staked his claim in the valley soon after the stage line was pushed through. Being the first rancher in the valley, he felt gave him more influence than the others who had followed him. And, he was not shy in trying to force his way whenever he believed it necessary.
“Now, hold on,” the Sheriff protested.
William ‘Billie’ Monroe had served as Sweetwater’s sheriff for the past three years. After Mayor Perkins had appointed him to the position, he had dealt with countless bar fights, numerous cowhands needing a place to sleep off a night’s drunk, and the occasional busted gambler looking for trouble. But, not much in the way of serious crimes. Sweetwater was just too small to attract much attention from the seedier side of life. Especially, since Jesse had cleaned up the Silver Slipper. The Oxbow was now the only place for card sharks and that usually didn’t provide enough action to make it worth their time.
But, no matter what the threat, Sheriff Monroe had done his duty and he wasn’t about to let Conrad Billingsley talk to him like he was the town’s lackey. And, he didn’t care if Billingsley owned the biggest ranch in the valley.
“I’ll do my job, Conrad. But, rustlers in this valley don’t make sense. Hell, you know there’s only a couple of passes in or out of this valley. How could they get the cattle out without being caught?”
“That’s your problem,” Billingsley again slammed his fist down on the bar, rattling more glasses.
“Before you destroy all of my glassware,” Jesse had entered the saloon side of the Silver Slipper having been attracted by the loud voices she heard all the way across the dining area and into her office. “Maybe I can shed some light on this. What say we sit down and give the bar a rest?” Jesse sat at a table and indicated for the men to join her.
“What have you got, Jesse?” Billingsley asked as he lowered his stocky body into a chair.
“Found some tracks on my land yesterday,” Jesse motioned to Sally, a tall redhead that tended bar in the Slipper, to bring a bottle and glasses to the table. “They were three, maybe four riders by the looks of ’em. Picked ’em up at the far end of the meadows and trailed them southeast until I lost them in the granite field. It was gettin’ too dark to track ’em any further.”
Sally approached and placed three glasses and a bottle of whiskey on the table before returning to the bar and cleaning up the broken glasses.
“That’s pretty deep onto your land, Jesse,” Billingsley pulled the cork from the bottle and poured the brown liquid into the glasses.
“Any idea who it was?” Sheriff Monroe asked as he lifted a glass to his lips, emptying its contents in one swallow.
“Nope,” Jesse left her glass on the table, she had never really acquired a taste for liquor preferring a glass of milk to whiskey any day. Sally read her boss’s thoughts and disappeared into the kitchen coming out moments later with a tall glass of cold milk that she placed on the table in front of Jesse.
“Thanks,” Jesse told Sally before she retreated back behind the bar. “No one’s been near my place for some time. Can’t say why anyone would be passing that way.” Jesse took a long gulp of milk and wiped her mouth with the back of her sleeve.
“Don’t know how you drink that stuff, Jesse,” Sheriff Monroe grimaced as Jesse emptied the glass with a second long swallow.
“It’s good for ya, Billie. You aught to give it a try sometime,” Jesse grinned as the Sheriff shuddered at her suggestion.
“So, what do we do?” Billingsley attempted to draw the conversation back on track, he wasn’t amused at the playful bantering when he had cattle missing.
“I’ll go out and see if I can pick up those tracks,” Sheriff Monroe said.
“You’ll be wasting your time,” Billingsley poured himself another shot of whiskey. “You can’t track worth beans.”
“I’m not going to sit here and listen to you insult me, Conrad,” the Sheriff shouted as he pushed back his chair and starting to rise.
“Sit down, Billie,” Billingsley voice was also getting louder. “You gettin’ your feathers in a twist won’t solve this problem.”
“Both of you back down,” Jesse quietly said. She glared at the Sheriff until he resumed his seat. “Conrad is right, Billie. It would be a waste of time to try to pick up those tracks,”
“Now, just a minute Jesse,” the Sheriff started to rise again, “I can track just as good as most can.”
Jesse held up a hand to calm the Sheriff, “that’s not what I’m saying Billie. I know you can track. But, those tracks were already old. If those riders were just passing through, they’re long gone. If they were up to no good, they could be holed up in any number of places. You know the south end of the valley hasn’t been explored much. Hell, if one had a mind to, they could hide out in those canyons for months before anyone took notice.”
“Yeah, you’re right,” the Sheriff agreed. “So, what do we do?”
“How many ranches have reported cattle missing?” Jesse asked.
“Well, there’s mine,” Conrad started to tick off his fingers. “Kelly, McPhillips, and Butler, that I know of.”
“Guess talking to them would be a good starting point,” Billie concluded and the others nodded. “I’ll head out now. It’ll probably take a day or two to cover all the ranches.”
“In the meantime, I’ll have my riders keep a lookout for any strangers in the valley.”
“Might be a good idea to have Ed keep an eye out as well.”
“Good idea, Jesse,” the Sheriff said. “I’ll have a talk with him before I leave.”
“Guess that about does it,” Conrad put the cork back into the whiskey bottle. “How much I owe for the broken glass, Jesse?”
“How many, Sally?” Jesse called to the barkeep.
“Only two broke, boss.”
“Looks like you got lucky this time,” Jesse slapped Conrad on the arm. “Not enough to worry about. Just take it easy on the Slipper next time.”
“You’ve got yourself a deal,” Conrad laughed. “Watch yourself out at your place, Jesse. You’ve got no one watching your back.”
“I’ll be careful.” Jesse carried the bottle and dirty glasses over to the bar as the sheriff and rancher left. After talking to Sally a few moments, she turned to return to her office. It was only then that she realized another person was in the saloon. Jennifer sat quietly at a table near the door.
Jennifer had heard the loud voices when she came into the Slipper after completing her teaching duties for the day. Although, she couldn’t make out all that was being said, she had heard the word “rustlers” and knowing what that meant in cattle country she had grabbed a pencil and pad from the bag she used to carry lessons to and from the schoolhouse. She left her bag on the floor next to the door that separated the dining area from the saloon and quietly pushed the door open. Slipping inside, Jennifer had taken a seat at the closest table and listened to the conversation between Jesse and the two men, taking notes as they talked. Now she found herself under the scrutiny of Jesse as she made her way across the now empty room.
“Miss Jennifer,” Jesse acknowledged the schoolteacher. “Something I can do for you?”
Jennifer was now unsure of the justification for her eavesdropping. When she had entered the room, she told herself that as a ‘reporter’ for the Gazette, it was her duty to find out if there was a story that needed reporting. Now, she wasn’t so sure.
“I.. well, I..” Jennifer stuttered. Jennifer normally had no difficulty coming up with something to say but with those gorgeous eyes staring at her, she found herself tongue-tied.
“Yes, Miss Jennifer,” Jesse stood towering over Jennifer and waiting for a coherent response.
“Well, I’m working afternoons at the Gazette and I heard the talk of rustlers, so I thought…,”
“That, there might be a story here,” Jesse finished for her.
“Yes. I know I shouldn’t have been eavesdropping but,” Jennifer began.
“It’s a public place. Guess if we had wanted a private conversation, we could have gone into my office. I don’t think you would have followed us in there,” Jesse raised an eyebrow as she glared down at the young woman.
Jennifer was sure that she had angered the tall woman until she looked up and saw the barest of grins on Jesse’s face.
“No,” Jennifer smiled. “I would not have followed into your private office.”
“Good. I would have hated to boot your pretty little butt out of there,” Jesse chuckled, then blushed as she realized what she had just said.
Jennifer wondered why Jesse referred to that part of her anatomy. And, why in that manner. But, whatever the reason, Jennifer liked it.
“May I ask you a question?” Jennifer asked.
“Go ahead,” Jesse was looking at her boots, hoping she wouldn’t say anything else to embarrass herself in front of the schoolteacher. ‘Why do I react to her this way’, Jesse was thinking and missed hearing Jennifer’s question.
“Miss Jesse, are you okay?” Jennifer asked when Jesse didn’t answer.
“I’m sorry,” Jesse mumbled, “what did you ask?” ‘Get some control, girl’ Jesse chastised herself as she concentrated on listening to Jennifer.
“I asked if you thought there was a rustler problem in the valley,” Jennifer repeated her question.
“Can’t say,” Jesse answered. “Some of the ranchers say that they’re missing cattle. The sheriff is looking into it. Guess maybe you should ask him.”
“Have you lost any cattle, Miss Jesse,” Jennifer asked.
“Thank you,” Jennifer made a few notes on her pad. “Guess I should let you get back to your business and I should get over to the Gazette before Thaddeus thinks I’m not working today.”
“School teaching doesn’t keep you busy enough, Miss Jennifer?”
“My afternoons were left open. Thaddeus needed help at the Gazette and was kind enough to offer me a position,” Jennifer informed Jesse, not wanting to tell her the real reason she had needed a second job.
“I see,” Jesse said.
“Well, I best be going,” Jennifer gathered her things and headed back into the dining area.
Jesse watched her go thinking that Thaddeus was one lucky man to be able to spend every afternoon with the pretty schoolteacher.
“Are you sure about this?” a tall, lanky boy, barely old enough to shave, asked as he leaned closer to the fire. He could hear the cattle settling for the night in the small forest clearing that he and his companions had chosen for their camp. The sun had given way to a full moon and, as was common in the Rockies, the heated air of the day had turned cold in the night. He rapidly rubbed his hands up and down his arms in an attempt to warm them but gave it up after a few moments when it didn’t seem to help. He turned his attention to the older man across the fire from him.
Johnson glared at the boy and pulled his coat tighter around his body. He had planned his revenge for months and now that it was within his grasp, this kid was getting cold feet. Johnson reached into the pile of firewood they had gathered earlier and threw a couple of the larger pieces onto the already blazing fire. “You havin’ second thoughts, Jimmie?”
“No,” the boy answered. “Just askin’ if you’re sure. Seems like we’re puttin’ ourselves in a tight spot ifin’ we have to get out of this valley in a hurry.” Rustling cattle didn’t bother Jimmie but escaping without a rope necktie did. And, being camped in the valley with a couple dozen stolen cattle just didn’t seem like the best of ideas.
“I know what I’m doing, Johnson assured the boy. “So, quit worryin’. Besides, by the time anyone figures out what’s goin’ on, we’ll be in the Slipper celebrating. Now, get some sleep. Your watch starts in a couple of hours and I don’t want you falling asleep again.”
“Alright,” Jimmie lay down on his bedroll that was unrolled close to the fire. For several minutes, he quietly watched Johnson and wondered about his present predicament. A month earlier, Johnson had approached Jimmie and his older brother, offering them a generous payoff if they would help with his plan to get the Silver Slipper back. Jimmie hadn’t liked Johnson from the start and wasn’t at all sure that Johnson could deliver on his promises. But, his brother had gotten into some trouble in Denver and it had been decided that helping Johnson was better than spending time in jail. Now, Jimmie wasn’t so sure they had made the right decision. Deciding that he couldn’t do anything about it until later when he could talk to his brother, Jimmie pulled his bedroll tight around him and promptly went to sleep.
Johnson tossed another piece of firewood onto the fire. “How can it be so damn hot during the day and so damn cold at night,” he grumbled to no one in particular. As he stared into the flames, he again recalled the poker game that had cost him the Slipper. Each time he replayed the events, he became more convinced that somehow the tall woman had cheated. ‘Ain’t no way that bitch won fair,’ he told himself. Standing to stretch out his cramped legs, Johnson walked to where their horses were picketed. After making sure the rope was secure, he grabbed his own bedroll. He pulled the blanket tight around his shoulders as he settled on a large boulder that provided him a good view of the clearing and the cattle, Thoughts of revenge would keep him occupied for the hours of his watch.
Jesse sat in front of the fire that warmed her ranch house. She had purchased the abandoned spread from the bank after the Silver Slipper started to make more money than she needed to run it. The ranch’s original owner had had a gambling habit and disappeared from the valley one night never to be heard from again. Since Jesse was a girl, it had been her dream to own her own place. She had always assumed that would be the family ranch until her father had sold it. After that, she didn’t think she would ever be able to realize her dream. But, the Slipper had changed that.
Allowing Bette Mae to help manage the operations of the Slipper left Jesse with the time to concentrate on rebuilding the ranch. Jesse had repaired the ranch house to livable condition and put a new roof on the barn that would keep hay dry for winter. The corral fence had been replaced and the well was now topped with a functioning pump. She had a dozen head of cattle grazing in her fields and hoped to purchase a breeding bull soon. There was still a lot of work to be done but it was livable and, most important, it was hers.
After her conversations with Billingsley and Sheriff Monroe, and then with Jennifer, Jesse had returned to her office to finish the reports she had been struggling over. It wasn’t that Jesse couldn’t do the Slipper’s bookkeeping, she just preferred to be working at the ranch than figuring columns of numbers. Finally, giving up on the ledgers, Jesse had bid Bette Mae goodnight and ridden out to the ranch. She had decided to stay at the ranch while Billie checked on the other ranches and had spent the long, hot days replacing the leaky roof on the ranch house.
Jesse could not shake the uneasy feeling that had nagged her ever since she discovered the mysterious tracks. If there were rustlers in the valley, why were they on her property. ‘Why my land?’ Jesse kept turning that question over and over in her mind but no answers were forthcoming. ‘Somethin’ just ain’t right,’ Jesse told herself as she watched the fire.
The morning sunlight made its way through the east facing windows and found Jesse asleep in the chair where exhaustion had claimed her the night before. The beams spread across the ranch house’s floor and slowly crawled up her body. Jesse woke with a groan when the bright sunlight reached her face. She stretched her long limbs to loosen the kinks developed during the night. Twisting her neck from side to side, she eased the tight muscles. Slowly, she pushed herself up and out of the chair and stretched some more. After satisfying her aching muscles, she picked up the fire poker and stoked the embers. Adding a couple of split logs, she watched as the fire burst back into life. She filled a large cooking pot with fresh water and placed it on the spit to heat. Then taking her coat off the back of the door, she pulled it on as she left the house to do her morning chores.
Jesse loved this time of day. The sun was just beginning its long journey across the big, Montana sky. The animals were beginning to wake and the songs and calls of several different birds filled the morning air. Jesse could hear the chatter of squirrels in the trees around the ranch buildings. Far in the distance, a coyote greeted the morning with a long, mournful howl. A smile crossed Jesse’s face as she began the new day.
Jesse pushed open the heavy door to her barn. She made her way to Dusty’s stall and was greeted with a warm muzzle being pressed against her chest. “Morning, girl,” Jesse greeted the golden mare and handed Dusty the apple she had grabbed from a barrel by the barn’s door. As Dusty munched happily on the treat, Jesse led her out of the barn and into the adjoining corral.
Dusty began to sidestep nervously and raised her head to test the scents on the morning breeze. “You feel it, too,” Jesse scratched Dusty’s head to comfort the horse. Jesse’s eyes scanned the far end of the valley, “someone is out there. Maybe, we should take another ride out that way and see if there’s any fresh track. Or,” sapphire eyes filled Jesse’s thoughts. “Maybe, we should ride into town and see if there’s any news.”
Dusty nudged the daydreaming Jesse in the arm.
“Okay, let me get you fed, the rest of the chores done, and me cleaned up. Then, we’ll head to town.” With that decision made, Jesse headed back into the barn to finish her chores and to wonder why the thought of seeing Jennifer was so appealing this morning.
Jennifer sat on the wide porch of the Silver Slipper sipping coffee from a large mug. The sun had been up long enough to begin chasing away the night’s chill. It was going to be another hot, dry day and Jennifer was intent on enjoying the morning coolness while she could. From the Slipper’s porch, Jennifer could look down the entire length of Sweetwater’s dusty main street. Not much activity broke the morning’s stillness. Ed was getting the general store ready for business by sweeping the boardwalk and Jennifer could see smoke start to pour out of the livery’s smokestack, indicating the forge had been fired up. A horse was hitched in front of the jailhouse, the rider had already disappeared inside. Lights were on in several of the houses at this end of town but she had yet to see any of their occupants.
Jennifer loved this time of day. It was peaceful and quiet, except for the chirping of morning birds in the surrounding trees. She could think of no better way to spend the morning than welcoming the waking day. Well, maybe one thing would make it better, if Jesse was sharing it with her. ‘Whoa, where did that thought come from?’ Jennifer was so startled by the sudden appearance of Jesse in her thoughts that she spilled the contents of her cup. As she rose from the chair to go back to the kitchen and get more coffee, she wondered why the beautiful rancher seemed to be sneaking into her thoughts more and more.
“I’m telling you, sheriff, the tracks led to Jesse’s land,” Pete, a wrangler for Conrad Billingsley spread was standing opposite the sheriff’s desk.
“Why would Jesse be stealing cattle?,” Sheriff Monroe was more than a little perturbed at his morning beginning with the cowboy’s banging on the jail’s door. He was sitting at his desk trying to rub the sleep from his eyes.
“All I know, is that Mr. Billingsley told me to ride in and get you. He said I should drag you back out there tied over the back of your horse if I have to,” the cowboy was getting angry at the sheriff’s obvious lack of interest in his news.
“You can go back and tell that…,” Sheriff Monroe starting before deciding that taking his anger at the rancher out on the cowboy was probably not the best way to handle his frustration. “Look, Pete,” the Sheriff leaned back in his chair and ran his fingers through his uncombed hair. “Go back and tell your boss that I’ll be out after I get breakfast. Maybe by then Jesse will be over at the Slipper and I can ask her about those tracks.”
The cowboy wasn’t about to return to the Rocking B without the sheriff. Not with the mood his boss was in after losing more cattle to the rustlers working in the valley. “Nope, I ain’t leaving here without you. The boss would shoot me on the spot,” the cowboy stood his ground.
“Have it your way,” the sheriff stood. “I’m going to wash up and go over to the Slipper. You can wait for me here or join me. Your choice,” he said as he poured water into the bowl resting on a shelve hung haphazardly on the wall. Several minutes later, the sheriff left the jail and headed down the dusty street for the Silver Slipper. The cowboy trailed angrily behind him.
Jesse threw Dusty’s reins over the hitching rail at the side of the Silver Slipper’s porch. She climbed the steps and crossed the wide porch to the Slipper’s front door, hesitating for a moment to consider the cause of a wet spot in front of one of the chairs. Jesse reached for the knob to open the door and just as her hand touched the metal, it was pulled away from her grasp.
“Oh,” Jennifer gasped as she realized Jesse was standing before her.
“Good morning, Miss Jennifer,” Jesse greeted the schoolteacher while thinking that seeing her was a wonderful way to start the morning.
“Good morning, Miss Jesse,” Jennifer smiled. “I was just coming out to clean up the coffee I spilled,” Jennifer pointed to the drying stain.
“Don’t bother,” Jesse said. “The sun will dry it before long.” Jesse began to step though the Slipper’s door. “Have you had breakfast yet? Perhaps, you would like to join me if you haven’t.” Jesse heard herself ask, surprised that she had spoken her thoughts out loud.
Before Jennifer could answer, they were interrupted by the Sheriff.
“Jesse, glad to see you,” Sheriff Monroe called out from the bottom of the stairs. “We need to talk. Join me for breakfast.”
“Well, I,” Jesse stammered. “I was just asking…,”
“It’s okay,” Jennifer reached out and gently squeezed Jesse’s forearm. “You have business with the sheriff. We can talk later.” Jennifer nodded to the sheriff and cowboy before turning and retreating up the stairs leading to her room.
Jesse was surprised at Jennifer’s touch and even more surprised at how her skin tingled where Jennifer’s hand had rested. She wanted to protest Jennifer’s departure but her mouth refused to form words. Jesse watched mutely as Jennifer disappeared up the stairs. Disappointed that Jennifer would not be her breakfast partner, Jesse joined the sheriff.
Jennifer hurried up the stairs and down the hallway. As soon as she entered her small room, she collapsed against the closed door. Her heart was beating so fast that she was sure it would burst from her chest. When she had touched Jesse’s arm, a jolt of electricity had surged through her body. Jennifer had never felt anything like it before and she was sure that by the look on Jesse’s face that she had felt it too. She had had to get away from Jesse before she embarrassed herself even more. Yet, as Jennifer leaned against the rough wood of the room’s door, she had to admit that as unexpected as her reaction had been, it had most assuredly been a wonderful feeling. And one she would like to experience again. And, soon.
By the time Jennifer had regained her composure and returned downstairs, Jesse and the sheriff were just finishing their morning meal. She took a seat at a table across the room where she could watch Jesse without being too obvious. Bette Mae came out of the kitchen with a pot of coffee. After refreshing the cups at Jesse’s table, she crossed the room to where Jennifer sat.
“Thought you had changed your mind on havin’ breakfast,” Bette Mae said as she filled a cup with coffee for Jennifer.
“No,” Jennifer smiled at the older woman. “Just wanted to freshen up a bit. But, I’m ready for it now.”
“Good. I’ll be right back,” Bette Mae returned to the kitchen.
Jennifer returned her attention to the table where Jesse sat. Not intentionally meaning too, she began to listen in on the conversation between Jesse and the sheriff.
“Can’t be,” Jesse was saying. “I don’t have any cattle on that part of the ranch. It’s too far from the house to keep track of them.”
“That’s what I’ve been trying to tell this cowpoke,” the sheriff told her.
“The tracks are there,” the cowboy insisted. “I saw them myself. Must have been twenty head moved up there.”
“Well, they aren’t mine,” Jesse finished her last bite of egg before washing it down with coffee.
“Never said they was,” Pete mumbled, he was more than annoyed that he was still sitting in Sweetwater when he should be riding back to the Rocking B with the sheriff.
“Guess it won’t hurt to go out and take a look,” the sheriff finally agreed. “You can come with us, Jesse. If you want.”
Jesse emptied her cup before responding to the sheriff’s offer.
“No, Billie,” she told him. “I think I’ll give the meadows another look. See if those riders have been back through.” In the back of her mind, she wondered if she should tell the sheriff about the feelings she’s had earlier that morning but decided against it. Probably, wasn’t anything.
Bette Mae returned with Jennifer’s breakfast just as the sheriff and cowboy stood to leave. As she thanked Bette Mae for serving her, Jennifer heard the sheriff’s parting words, “I’ll let you know what I find Jesse. Come on, Pete. We’ve kept your boss waiting long enough.”
Jesse watched the sheriff walk out the front door, the cowboy trailing behind mumbling under his breath about how he could explain the delay to his boss. As she stood and turned away from the table to go to her office, her eyes fell on the schoolteacher. She smiled as she remembered the earlier touch.
Jennifer saw Jesse look her way and watched as a smile covered the tall woman’s face. Brown eyes met blue and the world narrowed to just the two women caught in each other’s gazes. Bette Mae stood watching both women and smiled when she realized that they were unaware of anything except each other.
“My usual, Bette Mae,” Mayor Perkins said as he sat at one of the empty tables. Mayor Perkins burst through the front door breaking their enchantment and both women self-consciously looked away from the other.
Jesse made her way to her office door and disappeared inside. Jennifer waited several minutes before the butterflies in her stomach settled down enough for her to eat the breakfast cooling on the plate in front of her.
“Hurry up and finish the rest of ’em,” Johnson growled at his companions. He kept a constant vigil on the scrub covered walls that formed the small box canyon he stood in. Sagebrush was the only vegetation in the canyon and it provided little cover if anyone would come upon the men before they finished their work. Even though they had yet to be disturbed, he was nervous and wanted to get away from the canyon as quickly as possible.
Jimmie and his older brother, Clinton, were heating a running iron in the fire. The hook tipped piece of iron was the tool rustlers used to change brands on stolen cattle. If done properly, the change would not be noticed until after the animals were butchered and the inside of the hide could be seen. But, the brothers had never used a running iron before and their attempt at changing brands was anything but unnoticeable. It was a shoddy job but that was Johnson’s plan, he didn’t want any doubts that the brands had been altered.
A few feet from the fire, recently re-branded cattle were bunched behind a make shift rope barrier. There was barely enough room for the dozen or so cattle and they were constantly juggling for position. The canyon had no water and the thirsty cattle loudly bawled their unhappiness at their predicament. Another half dozen animals were waiting their turn with the branding iron.
“Come on,” Johnson yanked on a rope pulling a cow closer to the fire. “Let’s get this done and get out of here before anyone shows up.”
Jimmie walked to the cow and roped its feet. As the cow struggled to free itself, it lost its balance and tumbled to the ground. The red-hot iron was removed from the fire and pressed against the cow’s hide, as he burned a new brand over the top of the animal’s original marking. As soon as he finished, the cow was released and another was pulled near the fire and the process repeated. In short order, the remaining cows joined the rest of the rustled and re-branded herd behind the barrier.
“Make sure them ropes will hold ’em,” Johnson ordered the brothers who were busy throwing dirt on the fire to put it out. “No, leave the iron in the fire,” he told them when Clinton started to remove it.
Jimmie rechecked the ropes that made up the barrier holding the cattle. It wouldn’t hold the thirsty and hungry cattle long but that was also part of Johnson’s plan. The sooner a few of them escaped, the sooner the rustled herd would be discovered. After securing the rope fence, the men mounted their horses.
Jimmie said, “fire’s still smokin’.”
“That’s okay,” Johnson informed him. “Makes it easier to find. And, we want to make this as easy as we can.” Johnson kicked his horse into a trot and headed out of the box canyon and into the open floor of the valley. Without looking back, he knew that the other two would follow.
“He’s crazier than a rabid dog, brother,” Jimmie told his older brother as he watched Johnson ride away.
“Yeah,” Clinton muttered. “Let’s just hope we can get out of this without a rope around our necks,” shaking his head, he urged his horse to follow Johnson. He wondered if a couple of month’s in the Denver jail might not have been such a bad idea after all.
“Yeah,” Jimmie hesitated just long enough to consider his chances at reaching the dense forest a couple of miles away before Johnson put a rifle shot into his back. Deciding the odds weren’t all that good, he hoped his brother was right and they would escape the hangman’s noose.
“What did I tell you, Billie,” Billingsley was pointing to the tracks of several cattle being moved up a trail that eventually led to the box canyons at the south end of the valley. “There’s another trail about a half mile that way,” Billingsley pointed to the west. “It leads in the same direction. I don’t run cattle up at that end of the valley, no one does. Ain’t enough grass in those canyons to keep ’em fed.”
“I know, been up there a time or two myself. It’s rough country for cattle,” the sheriff spoke from where he was kneeling next to the tracks. “Looks to be no more than a day or two old,” he stood and shook out the cramped muscles in his legs. “You send any riders up that way?” the sheriff asked as he remounted his horse.
“A couple. Came back just before you got here. Said they saw smoke coming from the canyons down towards the end of Jesse’s land,” Billingsley mounted his own horse and signaled his men to do the same.
“Jesse ain’t no rustler,” the sheriff glared at the rancher.
“Never said she was. But, the tracks lead that way and the smoke was coming from her land,” the rancher returned the sheriff’s stare. “She’s been building her herd up a lot the last few months. Kinda makes you wonder where she’s getting the money, Slipper can’t be doing that well. What with all those women she’s keeping employed.” Billingsley pulled his rifle from the saddle scabbard and checked to make sure it was loaded and ready for use. His cowboys followed his example.
“Let’s hope we don’t need to use those,” Billie said as he watched the men prepare their weapons. He knew Jesse would never steal and the Slipper seemed to be a thriving enterprise ever since Jesse cleaned it up. But, he was smart enough to know that one man, even if he was the law, couldn’t do much against a dozen armed and angry cowboys.
“Law says we can hang rustlers,” Billingsley stated as he shoved the rifle back into its holder.
“Let’s get this straight now,” Billie raised his voice so all of the men would have no trouble hearing him. “If there are rustlers out there, we are bringing them back alive. The circuit judge will decide their fate, not you,” he stared directly at Billingsley as he spoke the final word.
Billingsley returned the sheriff’s stare for several moments, his ranch hands waiting quietly. Not too many people spoke to Conrad Billingsley in that manner and got away with it. He glared at the sheriff and considered his options. Sure they fought and exchanged words on many an occasion but the truth was that Billie Monroe was a good sheriff and the rancher had to admit that he liked the man. Finally, he decided that having the sheriff on his side would be a lot easier than having to fight rustlers and the sheriff. Billingsley gave in, “we’ll do it your way, Billie.”
Jesse walked out of the Silver Slipper not long after the sheriff and cowboy left. As she mounted Dusty, Jennifer came out of the Slipper and crossed the wide porch.
“Where are you going?” Jennifer asked softly.
Jesse took a deep breath and studied the woman leaning against the porch railing, her delicate hands spread before her on the flat board. Jesse wondered what it would be like to have those hands exploring her body. A light blush started to crawl up Jesse’s neck as she realized where her thoughts were leading.
Jennifer saw the blush and wondered what Jesse was thinking to cause it but did not comment. She waiting patiently for Jesse to answer her question. Both women studied the other, their thoughts on feelings they were experiencing for the first time in their young lives. Both wanted to express their feelings but neither had the nerve to do so.
“Thought I’d take a look around.”
“Just a feeling.”
“Shouldn’t you have told the sheriff?”
“I will if I find anything.”
“Be careful,” Jennifer looked up at Jesse.
Jesse was puzzled by the concern in Jennifer’s eyes. She smiled at the woman who owned her dreams.
“I’m not going out looking for trouble,” she assured Jennifer.
“I know,” Jennifer said. “But, if someone is out there, you’ll be all alone.”
“Don’t worry,” Jesse laughed. “Dusty is the fastest horse in the valley. She’ll get me out of any trouble I might find myself in,” Jesse tried to relieve Jennifer’s worries.
“Still,” Jennifer smiled up at Jesse, “be careful.”
“I will.” As Jesse rode away from the Slipper, she thought how nice it felt to have someone worry about her.
Jennifer watched Jesse until she disappeared from sight. “Come back to me,” she sighed, before returning back inside the Silver Slipper.
Jesse saw the thin, wisp of smoke as she made her way to the canyon country at the south end of her land. But, while she watched the smoke rising up into the clear sky, she missed the figures of three riders crossing the valley and disappearing into the forest. Her vision blocked by the gently rolling hills of the valley’s open fields. Had she seen the riders, the next couple of days might have played out much differently. But, years later, Jesse would say that she was glad events took place as they did.
“Looks like we were right, Dusty,” she spoke to her mount. “Someone is up in those canyons.” Dusty nodded her head in agreement and increased her pace. “Good idea, girl,” Jesse told the now galloping mare. “Best get up there and check it out as quick as we can.”
Jesse stopped at a small creek that provided the last water source before entering the dry canyons. As Dusty enjoyed a long drink of the cool water, Jesse scanned the terrain in the direction they were headed. The smoke has long since faded as the fire fueling it must have burned out. Jesse’s attention was drawn to the sounds of cattle bawling in the distance. Dusty raised her head from the creek and twisted her ears in the direction of the cries.
“Sounds like they’re not happy, girl,” Jesse pulled her canteen from Dusty’s saddle. Taking a drink from the canteen, Jesse tried to focus in on the sound. Dusty’s ears continued to twitch as she also tried to locate the exact direction from which the sound came. Jesse knelt next to the creek and refilled her canteen. Wrapping its cord around the saddle horn, Jesse swung up into the saddle. Rider and horse started a mutual search for the cattle that cried out from somewhere before them.
An hour later, found Jesse and Dusty cautiously moving up the rocky floor of a box canyon. “Those cattle have to be somewhere, girl.”
Dusty nickered in response and continued to carefully move further back into the canyon. A bend near the back of the canyon prevented Jesse from seeing the cattle but, as Dusty moved closer, their cries got louder. And, there was no mistaking the increasing stench of cattle sweat and dung.
Dusty moved around the canyon’s bend and Jesse’s eyes fell upon a couple dozen miserably hot, thirsty, and hungry animals held in place by a ropes tied from one canyon wall to the other. A fire, long burned out, was a few feet from the cattle, and a now cold running iron lay inside the fire ring.
Dusty quickly covered the distance to the rope fence and Jesse leaped from her back. Pulling a knife from her boot, Jesse jumped up onto a boulder that secured one end of the ropes. She cut through the ropes, the freed cattle lost no time in escaping the hot canyon. Dusty sidestepped against the boulder to keep from being trampled.
Once the cattle had left the makeshift corral, Jesse dropped down off the boulder and examined the fire’s remains. She picked up the running iron, turning it over in her strong hands.
“Guess we better let Billie get a look at this,” Jesse told her mare as she jammed the dirty iron into her saddle bag.
“Ground is too hard in here to leave many tracks and the cattle probably took care of any that were around,” Jesse climbed back into the saddle. “Let’s see if we can pick up something out in the open.”
As they exited the canyon’s mouth, Jesse eyes were trained at the ground scanning for any sign of horses or men. After riding some distance from the canyons, Jesse spotted the track of a horse and directed Dusty to follow it.
Jesse and Dusty made their way across the valley and had reached the forest’s edge when Sheriff Monroe and the ranchers rode up over a small rise and spotted them.
As the group followed the stolen cattle tracks, they had been joined by other ranchers and their ranch hands. The group now numbered a couple dozen men and the sheriff was more than a little concerned at what might happen if the group located the rustlers.
“Look,” one of Billingsley men pointed at the rider and horse in the distance.
“Hey,” Billingsley cried excitedly, “ain’t that Jesse?”
“Looks like her horse,” Marcus Butler, another rancher missing cattle answered. “Only one golden palomino in the valley, that I know of.”
“Wonder what she’s doing out here?” Billingsley continued to question.
Before the sheriff could voice a reply, another shout went up. “Look,” one of the riders had spied the cattle grazing on the valley grasses between the forest Jesse had now disappeared into and the box canyons opposite.
“Well,” Billie said as he urged his mount forward. “Let’s go see what they’re doing up there.”
“This one’s been changed, too,” Pete, the cowboy who had awakened the sheriff at dawn, said.
“Looks like they’ve all been changed. Not a very good job, must have been someone new to the game,” Lucas Kelly, a ranch owner in the group commented.
“Like Jesse,” Butler accused.
“Hold on,” Billie knew where this conversation was headed and he didn’t like it. “We don’t know that Jesse had anything to do with this. After all, this is her land. She could have been out checking on her own cattle.”
Before Billie could continue, two of Billingsley’s cowboys rode up at a gallop and pulled up their mounts as they reached their boss.
“It was done up there.” one of them told Billingsley, pointing back to the box canyons. “Found the remains of a fire and ropes where she held them in the canyon.
“Wait a minute,” the sheriff started before being cut off by the other cowboy.
“Only one set of tracks in the canyon. They lead in the direction we saw Jesse ridin’.”
“Well, sheriff,” Billingsley finally addressed the sheriff. “How much more evidence do you need? We found the cattle on Jesse’s land. The were re-branding in a canyon on her land, with only her tracks in the canyon. And, she was riding away when we spotted the cattle.”
“Seems pretty clear cut to me,” Kelly agreed.
“I say we go after her,” Butler said.
Things were getting out of hand and Billie knew he had to do something and fast before a lynch mob rode after Jesse. “Alright, you found your cattle. I suggest you take them back to your spreads.”
“What about Jesse,” Billingsley demanded.
“I’ll go after Jesse.” Before the ranchers could protest, Billie added, “I’ll bring her in. Circuit judge is due next week. She can tell her side of this to him.”
The ranchers and their men looked in uncertainty at the sheriff, unsure if they could trust Billie to arrest his friend. The sheriff seeing the looks, hurried to remove any doubts from their minds. “I said I’d bring her in and I will. Now take your cattle home.”
Billie mounted his horse and rode off in the direction Jesse had last been seen before anyone had a chance to object further.
Jesse followed the rustlers’ tracks for a couple of miles before coming to the spot where the three men had split up, each taking a different route deeper into the thick forest. Nightfall was rapidly approaching and Jesse decided to head for town rather than try and follow the rustlers after dark. She gave Dusty her head and the two made short time of the distance to town.
Once she arrived in Sweetwater, Jesse headed first to the Silver Slipper. Sheriff Monroe was just stepping out of the building when Jesse rode up. He had lost Jesse’s trail soon after entering the forest and had returned to Sweetwater expecting Jesse to check in at the Slipper sooner or later. He was glad to see that he had made the right decision.
“Evening, Jesse,” the man stood on the Slipper’s wide porch. “I’ve been looking for you.”
“Evening, Billie,” Jesse swung down from the saddle. “I just rode into town,” Jesse reached for her saddlebag.
“Hold it, Jesse,” the sheriff warned, his right hand moving quickly to rest on the pistol that he wore on his hip. Knowing that Jesse carried her pistols in her saddle bags, the sheriff said, “leave your guns be.”
Jesse froze when she saw the motion of the sheriff’s hand. “Is there a problem, Billie?”
As Sheriff Monroe made his way down the steps to where Jesse stood, warily watching him, Jennifer came out of the Slipper. When she spied the sheriff’s hand on his pistol and Jesse frozen in the street, Jennifer ran across the wide porch to the stairs.
“Stay on the porch, Jennifer,” Jesse cried out. Jesse had seen more than one person shot accidentally when someone with a gun over-reacted to an unexpected movement. There was no way she would let the schoolteacher fall victim to a similar accident.
The sheriff kept his eye on Jesse while he spoke to Jennifer, “Suggest you go back inside, Miss Jennifer. This is official business.”
“Are you arresting Jesse?” Jennifer was standing on the top step, every instinct told her to go to Jesse’s defense but better judgment kept her feet rooted in place. She needed to find out what was happening before she could help Jesse.
“Haven’t arrested her yet,” the sheriff answered Jennifer. “But, I need to ask her some questions and I don’t want any trouble while I do that.”
“You want to tell me what’s going on, Billie?” Jesse asked.
“We found the stolen cattle today,” the sheriff informed the tall woman standing apprehensively in the street. “They’d been held in a box canyon on your land.”
A smile came to Jesse’s face when she heard the sheriff’s words. “I know,” Jesse started to relax. “I came across them and cut them loose hoping they’d find their way home. Followed the rustlers’ tracks until I lost them when they split up in the trees. I was going to tell you about it after I checked in with Bette Mae.”
“Only found one set of tracks, Jesse. They were yours,” the sheriff informed her.
“Wait a minute,” Jennifer exploded off the porch. Planting herself right in front of the sheriff, she poked a finger into his chest “You’re not accusing Jesse of stealing cattle, are you?”
Surprised by the quickness of Jennifer’s movement and by having the woman jabbing him in the chest, the sheriff was momentarily confused as to how to react.
“Hold on, there,” Jesse placed her hands on Jennifer’s arms. At her touch, Jennifer forgot all about the sheriff and could only concentrate on the warmth generating from where Jesse was holding her. She allowed Jesse to pull her gently away from the sheriff. “Billie hasn’t accused me of anything,” Jesse spoke quietly to Jennifer. “Have you?” she asked the sheriff.
Seeing Jesse holding Jennifer, the sheriff feared that Jesse might try to use the schoolteacher as a shield. He pulled his pistol from its holster and pointed it at Jesse’s head. “Back away from her, Jesse.”
Jesse looked at the man pointing a six-shooter at her head, a man she had considered to be a friend, and her eyes went cold. She gently moved Jennifer off to the side and stepped further into the street putting even more room between herself and the schoolteacher. “Go back inside, Jennifer.”
“No,” Jennifer held her ground, blue eyes bore into the sheriff. “Please don’t shoot her,” Jennifer whispered.
By now, the commotion in the street started to attract the attention of the Sweetwater citizenry. Many people had stopped their evening’s routines and were watching from various locations along the town’s street. Bette Mae stood on the Slipper’s porch with the rest of the girls. Most of the evening’s diners had willingly interrupted their meal to see what was happening. Cowboys, after leaving their drinking and gambling activities in the Slipper’s saloon, poured out onto the porch. While Bette Mae, the girls, and diners stood mostly in silence watching the drama unfold before them, the cowboys, encouraged by their consumption of liquor, were calling out for the sheriff to arrest Jesse.
Jesse watched the crowd on the Slipper’s porch and could hear similar comments being shouted from the direction of the Oxbow and knew that the situation could quickly get out of the sheriff’s control. “You know I don’t carry a gun, Billie,” Jesse raised her arms to indicate she was unarmed. “Why don’t we go to your office and you can tell me what this is all about.”
“Alright,” Sheriff Monroe was glad for an excuse to take his questioning of Jesse to a private setting. He could tell that it wouldn’t take much for the intoxicated cowboys to stir up a big pot of trouble. He turned to the crowd on the Slipper’s porch, “you can all go back to your business inside. This matter doesn’t concern any of you.”
Seeing no one move at the sheriff’s words, Bette Mae took matters into her own hands and began to shoo people back inside the building. The diners went without complaint but the cowboys were a different matter. They insisted on accompanying the sheriff to make sure Jesse was ‘good and locked up’, as one of them shouted. It wasn’t until Bette Mae offered the first round on the house that most of the cowboys decided a free drink was better than a dusty walk to the town’s jailhouse.
Once the porch was cleared of onlookers, Bette Mae turned her attention to Jesse. She looked with concern at her friend and started to cross the porch, hoping to have a few words with Jesse before the sheriff escorted her to his office.
“It’s okay, Bette Mae,” Jesse said to stop the older woman from approaching her. “Take Jennifer inside. I’ll go talk with Billie and get this all straightened out.”
“Alright,” Bette Mae reached for Jennifer only to have her hand slapped away.
“I’m going with you,” Jennifer told Jesse.
“Stay here,” Jesse’s eyes locked onto Jennifer’s and pleaded with her to obey.
“No,” Jennifer was adamant. “As a reporter for the Gazette, I have a right to be there.”
“I’m sorry, Miss Jennifer,” the sheriff said to the determined woman standing again before him. “I can’t let you come.”
Tilting her head to meet the sheriff’s gaze, Jennifer said in a voice barely audible, “you’ll have to shoot me to stop me.”
Before the sheriff or Jesse could respond to Jennifer’s challenge, the ground began to shake as a dozen horses thundered into Stillwater and surrounded them. At the front of the group rode Conrad Billingsley. Ranchers Butler and Kelly and cowhands from all three ranches made up the rest of the group.
Billingsley jumped down from his horse before the animal had come to a full stop. “Why haven’t you arrested her yet, Billie?” he bellowed at the sheriff.
Billie stood his ground, “I told you I’d handle this and I will.”
“What’s to handle?” Butler questioned as he swung from his saddle to stand beside Billingsley. “We saw her leaving, her tracks were the only ones in the canyon, and her brand was on the cattle. Arrest the bitch and get it over with,” Butler spat dust from his mouth. He, unlike most others in the valley, had never liked Jesse. Didn’t think much of women being business owners except maybe to a boarding house or other domestic enterprise. But, no way was it proper for a woman to run a ranch. ‘Went against nature,’ he had been fond of saying when Jesse first purchased the run-down ranch.
“I was just takin’ her to the jail when you rode up,” Billie tried to pacify the group of riders. The uproar caused by the riders had brought most of the occupants of the Slipper and Oxbow back out onto the porch where they eagerly added their opinions to the confusion.
Wanting to avoid a full scale riot, Sheriff Monroe grabbed Dusty’s reins and started to lead the horse and Jesse down the street. “Come on, Jesse,” he said as he passed the ranchers and cowboys. “We’ll finish this in my office.”
Jennifer marched after the sheriff and the woman she seemed to need to defend. The ranchers and cowboys fell in behind Jennifer.
Sheriff Monroe stopped and faced the crowd. “Stop,” he ordered. “No one but Jesse is coming with me. The rest of you- GO HOME,” he shouted.
Stopped in their tracks by the sheriff’s words and tone, most of the crowd began to break up. Some going back into the Slipper and some heading for the Oxbow. The rest remounted their horses and started to do as the sheriff had ordered, go home.
“What the hell is this?” Butler’s voice shattered the rapidly growing silence as the crowd disbursed. As Jesse, Jennifer, the sheriff and others turned, they saw him pulling the running iron from Jesse’s saddlebag. Dusty began to sidestep uneasily as the crowd of men pushed in for a closer look at Butler’s discovery.
“Trying to hide the evidence, Jesse,” Butler said as he held the iron high above his head so all could see.
“Damn,” Jesse muttered as she realized that in freeing the cattle and carrying the running iron, she had provided all the evidence necessary to hang her for the crime.
Calls for Jesse’s arrest grew as the men saw the branding iron. Then cries to find a rope began to be heard.
Jennifer instinctively reached out for Jesse, the angry calls of the crowd frightening her to the core of her being. She couldn’t allow anything to happen to Jesse but the throng was growing by the minute and she knew she had no chance at stopping them if they decided to grab Jesse and drag her to the nearest tree. But… she had to do something.
Without realizing that her hands were no longer reaching for Jesse but had instead reached for the gun now back in the sheriff’s holster. Jennifer pulled the gun free. Holding it in her shaking hands, she pointed it into the darkened sky above.
Everyone froze.
Dusty reared at the sound of the second shot and Jesse grabbed her reins to keep her from injuring anyone.
Jennifer had never held a gun before, let alone fired one. The noise was louder than she had expected and the recoil had almost ripped the weapon from her hands.
With a voice quivering with emotion, Jennifer turned on the crowd, “Billie told you to go home.” Her voice could barely be heard and the men strained their ears to listen to the schoolteacher holding a gun that looked extremely large in small her hands. “I suggest you do as he says. Jesse is not a rustler and I’m sure once she has a chance to tell her side to Billie, you’ll see your mistake. Now go home and let the Sheriff do his job.”
The men stood, unsure what to do. Standing in front of them was a woman who had stolen their cattle and re-branded them with her own brand. They had the evidence to prove that, or so they thought. But, between them and that woman was another woman. A sapphire-eyed bundle of raw courage who was not afraid to take them all on.
As the men stood considering their options, Bette Mae made her way through the crowd and wrapped Jennifer into her arms. Removing the gun from Jennifer’s grasp she handed it to Billie, then took Dusty’s reins from Jesse.
“Go,” Bette Mae commanded.
Wasting no time, Billie and Jesse made their way to the sheriff’s office. Once they were inside, Billie locked and bolted the door. He dropped into the chair behind his desk and placed his face in his hands. Nervous energy shook his body as he tried to catch his breath.
Jesse collapsed into the other chair in the room. She stared at the sheriff and wondered if he was capable of protecting her from the men still milling about in the street outside. Then, her thoughts turned to the schoolteacher who had defended her against the mob of cowboys. A smile slowly crossed Jesse’s face.
“Damn,” she sighed.
Bette Mae wrapped an arm around Jennifer’s shoulders and gently led her back to the Silver Slipper. Reaching the stairs, she threw Dusty’s reins over the nearest hitching rail. She didn’t take the time to secure the reins as she knew Dusty would remain until her mistress came to retrieve her. Jennifer began to tremble as the older woman led her up the steps and across the porch. Once inside the building, Bette Mae directed the schoolteacher into Jesse’s private office.
“Come on in here, child,” Bette Mae opened the office door and pushed Jennifer through it.
Ruth, the young girl who had befriended Jennifer her first day in Sweetwater by sewing her a much needed dress, followed Bette Mae and Jennifer into the Slipper. Seeing the two women head for Jesse’s office, she followed to offer her assistance but Bette Mae stopped her at the office door.
“See to our supper guests, Ruthie,” Bette Mae instructed the girl. “Miss Jennifer needs some time to herself right now.” Bette Mae softened her voice and continued, “keep an ear out and tell the other girls to do the same.”
Ruth nodded, then turned and headed for the kitchen to pass the request to the rest of the Slipper’s staff.
“Do you think they’ll try to hurt Jesse?” Jennifer had heard Bette Mae’s instructions and her body stiffened in fear.
“Probably not,” Bette Mae said as she crossed the office to a liquor cabinet standing against the far wall. Opening the cabinet’s door, she removed a bottle, left from the previous owner of the Slipper, and two glasses before crossing back over to the couch Jesse kept in her office for late nights. Sitting on the couch, Bette Mae set the glasses on the small table in front of it and poured a small amount from the bottle into each glass.
“Sit down, child,” Bette Mae commanded Jennifer. “Come on and sit before you fall down.”
Jennifer wanted so much to run from the room and out of the Slipper to the jailhouse. She wanted to see Jesse, wanted to touch her and assure herself that Jesse was alright. But, she did as she was told and sat beside the older woman. The thoughts scrambling around in her brain were making no sense as they bumped about and into each other. Why did she have such a need to see to Jesse’s well-being? What would she say to Jesse if she did go to the jailhouse? Can a woman even feel about another woman the way that she was feeling about Jesse? None of it made sense and Jennifer groaned as she propped her elbows on her knees and laid her head in her hands.
“There, there,” Bette Mae reached out and patted Jennifer on the leg. “Don’t you go frettin’ about Jesse, she can take care of herself.” Bette Mae picked up one of the glasses and held it out to Jennifer. “Here, drink this.”
Raising her head to see what Bette Mae was offering her, Jennifer looked suspiciously at the liquid. “What is it?” she asked as she took the glass from Bette Mae’s hand.
“Just a little something to settle your nerves,” Bette picked up the other glass. “Yer still shaking from firin’ that gun.”
“First time I’ve done that,” Jennifer said as she continued to warily look at the glass and it’s contents. “First time I’ve even held a gun,” she watched as Bette Mae emptied her glass in one large gulp and then shook her head, releasing a long hiss as the liquor slid down her throat.
Jennifer handed the glass back to Bette Mae. “Uh, thanks but I’ve never tasted spirits before and from what you just did to get this stuff down, I don’t believe I want to start now.”
Chuckling, Bette Mae took the glass from Jennifer and replaced it on the table. “Now, I told Jesse you was a smart one.”
Jennifer smiled at Bette Mae’s comment. Then thinking of Jesse’s current dilemma, the smile faded. “What are we going to do about Jesse, Bette Mae?” Jennifer asked as her head dropped back against the couch. “I know she didn’t steal those cattle. Why were the ranchers so angry? Jesse has never done anything to harm them, has she?”
“Rustlin’ is serious business in cattle country. But, Miss Jesse has never taken anythin’ that didn’t belong to her,” Bette Mae quickly added when Jennifer started to protest. “Only takes one or two hot heads to stir a crowd up and that Mr. Butler never has liked Jesse,” Bette Mae shook her head sadly at the memory of some of the things she and the other girls had heard the man say about her friend. “Doesn’t think a woman should own a business, especially not a ranch.”
“But, that doesn’t make sense,” Jennifer sat up to face Bette Mae. “Jesse is the kindest woman I know. And, look what she’s done for the women who work here. She’s given them a decent life. And, from what I can tell, the Slipper is making money. Isn’t that what a good business owner does?”
“Don’t have to convince me about Jesse’s goodness,” Bette Mae agreed. “But, some men don’t see any good in women except to have their babies and cook their meals.”
Jennifer fell back against the couch, memories of her father flooding her mind. “Yeah, I know what you mean,” she said sadly. “But, what about Jesse?” she asked again in a voice so quiet that Bette Mae wasn’t sure the young woman had actually spoken.
“She has an explanation, those men just haven’ given her a chance to say her piece,” Bette Mae assured the worried schoolteacher.
Several long minutes went by, their silence broken only by the ticking of a clock that occupied a prominent spot on the fireplace mantle.
Jennifer studied the room. She had never been inside of Jesse’s office and she found that the room had a warm, welcoming feeling to it. Most of the furnishings were made of soft pine wood and softer leather. Jesse’s large desk sat almost in the exact center of the room attesting to the fact that this room was used for work and not entertaining. Shelves filled with ledgers and other record keeping books stood against the wall behind the desk. At each end of the desk sat a lamp to provide light when Jesse worked late into the night.
The couch that the women occupied sat against the wall in front of the desk and to the side of the room’s door. A small chair sat on the other side of the door and provided a comfortable seat to anyone that might have business with the building’s owner. Jennifer noticed that there were no windows in the room and no door leading to the outside of the building. After considering this for several moments, she decided that it made sense for security purposes. Jennifer realized that, with the town having no bank, Jesse must have a safe somewhere in the room and having only one entrance probably lessened the chances of robbery. Anyone wanting to enter Jesse’s office would have to do so through the Slipper and would more than likely be observed doing so. The more she looked about the room, the more she thought of the woman that had made it her office. A deep breath from Jennifer finally cracked the silence.
Disturbed from her own thoughts, Bette Mae looked at the young woman and saw the small smile begin to make it’s way across her face. Bette Mae grinned at the Jennifer, “you like Jesse, don’t you?”
Confused by the question, her smile quickly disappeared as Jennifer turned to Bette Mae. “Of course I like her. She’s done so much for me…”
Bette Mae reached over and took Jennifer’s hands into her own, “No. I mean you really like her.”
A blush began to creep up Jennifer’s neck as she understood what Bette Mae was asking.
“I, uh,” she stuttered. “I…I don’t know what I’m feeling,” she said honestly. “When I’m near her I just want to touch her. And when I touch her my skin burns at the contact. I need to be near her but when I am, I don’t know what to say or how to act.” Jennifer looked up into Bette Mae’s eyes, “is it possible…?”
“… to love a woman,” Bette Mae finished for her.
Jennifer nodded shyly.
“Yes, child,” Bette Mae squeezed her hands. “It most definitely is.”
Before Jennifer could ask any of the questions that had inundated her brain at Bette Mae’s statement, the door to the office opened and Ruth stepped in before quickly closing the door behind her.
“What is it, Ruthie?” Bette Mae turned to the girl.
“Sally sent me to tell you that there’s trouble brewing.”
“What kind of trouble?” Jennifer rose from her seat.
“A cowboy is talking up to the others that they shouldn’t wait until the circuit judge comes next week. Says they should take Jesse out tonight and hang her.”
“Damn ta all blazes,” Bette Mae said then remembered the schoolteacher’s presence. “I’m sorry, Miss Jennifer.”
Jennifer waved off the apology and addressed Ruth, “what cowboy?” Jennifer couldn’t believe any of the locals would be calling for Jesse’s lynching.
“Sally says she’s never seen him before.”
“What do we do?” Jennifer asked Bette Mae.
“Some one needs to go alert Billie that there may be trouble, so he doesn’t get surprised.”
“I’ll go,” Jennifer said before she even had a chance to think it.
“Alright,” Bette Mae agreed knowing she would be unable to stop Jennifer if she attempted to prevent her from going to the jail. “I’ll go see if I can calm things down in the bar.” She placed a motherly arm on Jennifer’s, “be careful.”
Jennifer had the oddest sense that Bette Mae was talking about more than her going to the sheriff’s office. But, the thought came and went so fast she didn’t have time until much later to realize it had even occurred. Assuring Bette Mae that she would indeed take care, Jennifer was out the door before Bette Mae and Ruth could say any more.
As Jennifer made her way across the porch and down the steps, she took notice of Dusty still patiently standing at the hitching rail. She took the few steps to Dusty’s side and retrieved her reins.
“Come on, girl,” she started to lead the horse down the street to the sheriff’s office. “Let’s go get Jesse.” A whinny and soft nudge in her back encouraged her on.
After listening to Jesse’s side of the day’s happenings, Sheriff Billie Monroe was more than convinced of her innocence in any rustling activities. But, he knew that he would still have to hold Jesse in the jail’s one cell until the circuit judge arrived the following week. After all, it would be up to the judge to hear both sides and to make the final ruling.
“Hate to do this, Jesse,” he apologized. “But, I’m going to have to lock you up.”
“I know, Billie,” Jesse rose from the chair she had been occupying and crossed the small room to the even smaller jail cell behind. “Guess this means you won’t be getting any sleep the next few nights,” Jesse laughed, she knew Billie lived in his office and slept on the cot in the cell.
“Yeah,” Billie shared the laugh. Billie stopped Jesse before she could enter the cell, “have any weapons on ya, Jesse?”
Reaching down to her boot, “just this knife.” She pulled the knife from its scabbard and handed it to the sheriff.
“Thanks,” the sheriff took the knife and nodded for her to enter the cell. Once Jesse was inside, he closed the door and locked it. “Sorry about this, Jesse,” he apologized again.
“Just doing your job, Billie,” Jesse could see how much locking her up was hurting her friend. “That’s what the town council pays you for, isn’t it,” she joked, trying to lighten the sheriff’s mood.
“Yeah,” he grumbled. “Days like this, they don’t pay me nearly enough.”
“Once the judge gets here, this will all be over and I’ll buy you a drink,” Jesse said.
“Think I’ll be the one buying,” the sheriff moved to his desk and placed Jesse’s knife in the drawer for safe keeping. He was about to ask Jesse what she wanted for her evening meal, the town having an arrangement with the Slipper to provide meals for all prisoners. And, after all, Jesse was now an official prisoner of the town of Sweetwater. But, before the sheriff could ask someone knocked on the jail’s door.
“Miss Jennifer,” the sheriff was surprised to see the schoolteacher when he pulled the jail’s door open. “What are you doing here?”
“Bette Mae sent me,” Jennifer informed the sheriff. Her eyes sought out Jesse and once they had located the tall woman they never left her. Jennifer crossed to the cell and stood next to it’s door.
“Why did Bette Mae send you?” Jesse asked as she stood on the opposite side of the cell’s bars. The sheriff knew he shouldn’t let anyone that close to a prisoner but he wondered what harm the schoolteacher could possibly cause.
Talking only to Jesse, Jennifer quietly told her “there’s a stranger in the Slipper’s bar stirring up a lynch mob.” Her eyes conveyed the fear she felt for the woman who occupied the cell.
“Damn,” the sheriff muttered. “I’m going to have to go over there. I’ll need to find someone to stay here while I’m gone.”
“I’ll stay,” Jennifer told him.
“Thanks for the offer, Miss Jennifer. But, I don’t think it would be safe to expect you to face down that crowd if it decides to come this way.”
“I did it once before. And, I can do it again if…” Jennifer started.
“No, Jennifer,” Jesse’s quiet voice stopped Jennifer’s protest. “Billie’s right. It’s not safe. Go back to the Slipper and let Billie handle this.”
“I’m not leaving,” Jennifer looked into Jesse’s eyes. “I won’t leave you,” she firmly told Jesse.
Seeing the resolve on the schoolteacher’s face and not having any other options, the sheriff went to the cabinet that held his shotguns and pulled one out. Checking to make sure it was fully loaded, he placed a few extra shells in his pocket. “Jesse, I won’t be long. Miss Jennifer, lock the door behind me and don’t unlock it for anyone but me.”
As soon as the sheriff left the building, Jennifer locked the door and, for an extra measure of security, she shoved his desk against the door.
“What are you doing?” Jesse asked as she listened to the woman grunt and groan as the heavy desk moved begrudgingly across the wood-planked floor.
Jennifer didn’t answer. Once the desk was secure against the door, Jennifer rummaged through the desk drawers. “Ah, ha,” she declared as she pulled a ring of keys from it’s hiding place.
“Do you plan on telling me what’s going on?” Jesse was getting agitated at the lack of information.
Jennifer crossed to the cell and began to unlock the door, “I’m breaking you out.”
“Are you crazy?” Jesse stepped back from the door shaking her hand from side to side. “Oh, no you’re not. Do you know what they’ll do to you?”
“Don’t care. Now come on, we don’t have much time,” Jennifer swung the cell door open.
“No, Jennifer,” Jesse held her hands up with the palms facing Jennifer. “I’m in enough trouble as it is,” she backed as far back into the cell as she could.
“Jesse, did you steal those cattle?” Jennifer asked the retreating woman.
“No,” Jesse snapped, hurt that the schoolteacher would think her capable of such an act.
“I know you didn’t,” Jennifer softened her tone. “But, there are several drunk men over at the Slipper that don’t care if you did or didn’t. All they care about is lynching someone and guess whose neck they plan to put their noose around.” She started to plead knowing that the time to make their escape was rapidly disappearing, “please, Jesse. Come with me.”
Without thinking, Jesse reached up and rubbed her neck. She could almost feel the noose tightening around it. “We can’t go back to the Slipper. And, we can’t just walk out of town. They’ll catch us in no time,” Jesse made one final attempt at stopping the unstoppable.
Jennifer grinned, knowing she held all the aces and was ready to lay the last one on the table, “Dusty is waiting for us out back.”
Jesse knew the right thing to do was to stay put. But if she did, there was a good chance she would hang for something she didn’t do. If she ran, she knew she shouldn’t involve the schoolteacher but, then, Jennifer was already involved. And, for reasons that made no sense to her, Jesse wanted the schoolteacher with her.
“Well, then,” Jesse returned the grin. “What are we waiting for?” Jesse joined Jennifer outside of the cell and the two moved quickly to the back door of the jail.
“Wait,” Jesse stopped and crossed to the sheriff’s desk.
Jennifer watched as Jesse opened the top drawer and removed a knife, then bent to replace it in her boot. Standing up, she saw Jennifer watching her quizzically.
“Yours?” Jennifer asked.
“Mine,” Jesse nodded.
Jesse rejoined Jennifer and carefully opened the rear door. Seeing only Dusty standing patiently in the moonlight behind Sweetwater’s tiny business district, Jesse opened the door wide enough for Jennifer to pass though. Dusty raised her head in a silent greeting to her mistress and stood quietly as Jesse mounted her. Without a word, Jesse stretched a hand down to Jennifer who took it and was swung effortlessly up into the saddle behind Jesse.
“Hang on,” Jesse whispered. Jennifer wrapped her arms around Jesse’s waist and, gladly, did as she was told.
After a nerve-wracking ride from Sweetwater, Dusty finally reached the hillock that overlooked Jesse’s ranch. Expecting to be discovered at any moment, neither woman had spoken a word on the ride from town. Jennifer had never loosened her tight hold on Jesse’s waist, not even after she had become accustomed to Dusty’s gait and could have held on with a looser grip. She found that she liked the feel of her arms wrapped around Jesse. It felt, well, it just felt right, she decided. And, Jesse didn’t seem to mind.
Jesse had ridden from Sweetwater with both ears attuned to any sound that would indicate the jail break had been discovered and they were being chased. She was more than relieved to hear only the regular night sounds of an occasional owl hooting or coyote howling in the distance. Nothing else disturbed Jesse’s concentration. Well, almost nothing.
As much as Jesse tried to free her mind of thoughts of the arms wrapped tightly around her waist and of the breathing at her back, she could not. She found herself liking the feel of Jennifer riding behind her. Sometime between Sweetwater and their present location, Jesse had placed one of her own arms atop Jennifer’s and, Jesse had decided, it felt right.
As Dusty crested the top of the rise, Jesse turned the mare so that she could have an unobstructed view of their route from Sweetwater. Even though the night was dark, there was enough of a moon to allow Jesse’s sharp eyes to scan the trail for any sign of a dust cloud that would reveal a posse was in pursuit. As Jesse scanned what was behind them, Jennifer took the time to check out what lay before them.
Nestled in a small basin at the bottom of the hillock sat Jesse’s ranch. A one-story cabin, which served as the ranch house, stood in the middle of the basin and faced west with a clear view of the mountains in the distance. It looked to be not much bigger than the dining area of the Silver Slipper, with a similar wrap-a-round porch. The house was flanked by chimneys at its north and south ends and a long, neglected garden took up the area behind it. About one hundred feet beyond the garden, stood a barn almost three times the size of the ranch house. The moonlight reflected off the new portions of roof and the newly rebuilt corral fence encircling three sides of the building. There were a couple of other outbuildings but, not being familiar with ranches, Jennifer could only guess to their purpose.
Jesse turned Dusty back towards the ranch and encouraged the horse to continue down the road. Just where the road flattened out at the bottom of the hillock, two large logs stood on either side of the path. Arching from the top of one log to the other was a third log with the side facing incoming visitors cut flat. Carved into the flat surface was the name Jesse had given the ranch, J’s Dream.
Dusty carried her two passengers under the arch and to the ranch house. Jesse slipped out of the saddle as soon as Dusty stopped and turned to help Jennifer down.
“We don’t have much time,” Jesse said as she lead Jennifer onto the porch. Opening the cabin’s door, she urged Jennifer inside. “They have no doubt discovered us missing by now,” she told Jennifer as she crossed the room to the sleeping area. Jesse opened a trunk that sat at the foot of the bed and began pulling items out of it. She discarded most of what she took out until she held an old pair of jeans and a worn flannel shirt.
“Put these on,” she tossed the clothes to Jennifer. Digging further into the trunk, she pulled out a pair of boots. “These, too,” she placed the boots on the floor. Jesse slammed the trunk closed.
“These don’t look like they belong to you,” Jennifer said as she held the clothes up in front of her.
“They don’t. Found the chest when I bought the place. Figured they were left by the previous owner.” Seeing that Jennifer had not moved, Jesse snapped “hurry up. Get those on if you’re coming with me.”
Hearing Jesse’s comment and deciding that she did not want to give her any excuse to leave her behind, Jennifer jumped into action. As she began to remove the dress she wore, she asked “what’s wrong with my own clothes?”
Jesse had crossed the room to the kitchen area and was filling an old flour sack with supplies. “You won’t be very comfortable where we’re going in that dress and those shoes,” she answered without stopping from her task.
“Where are we going?” Jennifer asked as she pulled on the denim pants. They were too long for her legs and she bent to roll the cuffs up.
Jesse’s breath caught in her chest as she turned to answer and her eyes fell on the half-dressed body of the schoolteacher. She tried to look away but her eyes would not follow her commands and stayed focused on Jennifer as she rolled the pant legs up to free her feet. “You’re beautiful,” Jesse said to herself, or so she thought.
“Did you say something?” Jennifer turned her head to look in Jesse’s direction. Her eyes locked onto Jesse’s. For several long moments, both women absorbed the varying and changing emotions flashing in the eyes of the other. They might have remained locked in that moment forever if Dusty hadn’t whinnied outside.
Jesse finally pulled her eyes from Jennifer, “um, I, um.” Jesse couldn’t make her mouth form the words she wanted. She finally gave up and went back to filling the sack.
Jennifer smiled to herself as she returned to her task of dressing. her question forgotten by both women.
After dropping the full sack at the cabin’s door, Jesse walked to a chest standing against the rear wall of the cabin. Opening it’s doors, she reached inside and filled her free hands with ammunition for her rifle and pistols.
“You about ready,” she asked Jennifer as she walked back to the cabin’s door and pulled it open.
“Yes,” Jennifer was stuffing the bottom of the too big shirt into the top of the too big pants. Surprisingly, the boots seemed to be the right size for her. She felt like a little girl wearing her big brother’s clothes. At least, she thought that was what she felt like since she had never in her life worn pants before. One more firm tuck to secure the shirt and she crossed to the door. Since Jesse was busy placing the bullets into Dusty’s saddlebags, Jennifer bent and picked up the sack Jesse had filled.
“I’ll get that,” a tender voice spoke into her ear and sent a warm shudder through her body. Jesse was standing behind her and carefully took the sack from her hands. After securing the sack to Dusty’s saddle, Jesse swung herself up into it.
“Make sure the door is secure,” she instructed Jennifer who stood watching on the porch.
After doing so, Jennifer quickly crossed the porch and took Jesse’s offered hand to be again lifted into the saddle. Not needing to be told, Jennifer wrapped her arms around Jesse and hung on as Dusty took off at a fast trot. As they rode away from the ranch, Jesse laid a arm over Jennifer’s and heard a soft sigh at her back.
To the east, the sun was beginning to replace the night’s darkness with its light. In the town of Sweetwater a small group of recently sobered men sat on their horses in the street outside of the jail house. Sheriff Billie Monroe, a bandage wrapped around his upper arm and sporting a nasty bruise on his jaw stood on the boardwalk in front of the building.
The night before, Sheriff Monroe had listened to Jesse’s side of the events and knew the woman had nothing to do with stealing cattle. As he left the jail after Jennifer brought word of a growing lynch mob in the Slipper’s saloon, he wondered how he would convince the stirred up cowboys and ranchers of this. He could see several men milling about the porch and in the street in front of the Slipper. He didn’t have to be too close to know that they had consumed more than enough liquor to make them dangerous.
As Billie made his way from the jail to the Slipper, he was joined by Thaddeus Newby, the newspaper editor, who had just ridden into town. He left his horse tied up outside the newspaper office and met the sheriff in the middle of the street.
“What’s going on, Billie?” he asked. “Heard lots of talk about a hanging when I rode past the Slipper.”
“Billingsley and Butler are accusin’ Jesse of being a cattle rustler,” Billie explained without breaking stride.
“That’s a pile of horse poop and you know it,” Thaddeus fell into step with the sheriff. “Where is she?”
“In jail.”
“You left her alone?” Thaddeus was incredulous at the sheriff’s seeming lack of protection provided to his prisoner.
“Didn’t have much choice. Couldn’t stay there to protect her and try to break up the lynch mob. Besides, she ain’t alone. Miss Jennifer is with her.”
“Miss Jennifer?”
“Yep, wouldn’t have it any other way. There’s a lot of spirit in that woman.”
“Are they safe? Want me to go back there?”
Billie thought for a minute before shaking his head, “might could use your help here more. I’d ask Ed to go, but don’t have the time.” Having reached the Slipper, he climbed the steps to the porch and was immediately confronted by the drunk men.
“What do ya say,” one man slurred, “we just take her off ya hands, sheriff?”
“Yeah, what ‘ta ya say?” added another man who was holding himself upright by wrapping his arms around a post.
“Not tonight, boys,” Billie eased past the men. “Can’t have the circuit judge come to town and have nothin’ to do.”
“It’ll save the town some money,” the first man said.
“Maybe,” Billie had reached the door and pulled it open. “But, I can’t let ya do it.”
Once inside, the sheriff saw Bette Mae and the other girls huddled near the saloon door. One look at them and Billie knew the situation was bad. He couldn’t remember ever seeing Bette Mae scared and right now she looked down right petrified. Billie flashed a brief smile in the women’s direction before entering the saloon where he knew he would have to confront the real trouble makers on this night that he was already wishing he could forget.
“‘Bout time ya showed up, Billie,” Conrad Billingsley yelled from his spot against the room’s long bar. “We was just goin’ to come get ya.”
Billie knew that the rancher was drunk. Hell, he knew that everyone in the room was drunk with the exception of himself, Thaddeus, and Sally, tending bar. One glance around the room and he knew he was in trouble. Two sober man standing against a lynch mob did not bode well for Jesse’s chances.
“Well, here goes,” he muttered to Thaddeus as they made their way through the crowd to the bar. Billie thought ‘wish us luck, Jesse’.
Upon reaching the bar, Sheriff Monroe leapt up onto the well cared for surface. Looking down at the men in the room, he announced “bar’s closed.” Shouting over the protests that followed he continued, “you’ve all had more than enough. I’m asking you to go home and sleep it off. We can talk about Jesse when you are sober and thinking right.”
“Like hell,” the rancher Butler slammed his fist down on the bar at the sheriff’s feet. “We’ll hang the bitch tonight.” Several other men in the room voiced their agreement to the declaration.
Hoping to stop what was happening, the newspaperman appealed to the richest rancher in the valley. “Billingsley, put a end to this before you all make a serious mistake.”
“Why, Thaddeus?” the rancher responded. “She stole the cattle. Let her pay the price.”
“Conrad, you know she didn’t steal any cattle,” the sheriff took up the appeal for reason. “I’ve heard Jesse’s side and I can assure you that she had nothin’ to do with this.”
The shouts for hanging were getting louder and more forceful. Many of the men who had been outside had now come in to hear what was being said and were adding their voices to the chaos. The sheriff’s voice was lost in the increasing noise and he stood on the bar watching any influence he might have had slipping away.
Trying one more time to save his prisoner, the sheriff shouted, “I’m ordering you all to GO HOME NOW.”
As the sheriff looked over the crowd to see if any would do as he had ordered, a shot rang out. The sheriff was thrown sideways by the shock of the bullet ripping through his arm. Unable to protect himself, he could not avoid cracking his jaw on the edge of the bar as he fell. Before his body reached the floor, the darkness of unconsciousness had claimed him.
A moment of silence filled the room as the men watched the sheriff disappear behind the bar. Then a voice from one of the men sounded in the stillness, “now’s our chance, boys. Ain’t got to worry about the sheriff tryin’ to stop us now.”
As if all of the bodies were in someway linked together, the men surged towards the saloon’s door. The first man had barely reached the opening when another shot exploded in the room.
The men turned to see Sally standing behind the bar, a shotgun in her hands and pointed into the crowd. A dead silence took over the room as the men checked to see if anyone had been wounded. Before they could regain their mob momentum, Sally calmly aimed the shotgun at Conrad Billingsley chest.
“Next man who talks of lynching Miss Jesse, I’ll blow your head off,” she informed the rancher.
“Come on, boys,” the voice in the crowd spoke again. “She won’t shoot anyone.”
“She might not,” Bette Mae stood in the kitchen’s doorway, a shotgun leveled at the tall rancher. “But, I sure as hell will.”
“Come on,” the voice again cried out. “Two women ain’t goin’ ‘ta stop us.”
“Two women and one man,” Thaddeus said from his place behind the bar. After the sheriff had been shot, the newspaperman had ducked behind the bar to check on his condition. Seeing that the bullet had gone clean through his arm, he took a handkerchief from his jacket pocket and wrapped it around the wound. Then, he pulled a pistol from the unconscious man’s holster and took his place behind the bar. “And, it look’s like there’s a few more women out there just hoping you’ll try to leave,” he nodded to the open door leading into the dining room where some of the girls had gathered, some holding weapons.
Seeing that he was facing the barrel of, at least, two shotguns and a pistol, Conrad Billingsley was rapidly sobering up. He knew that Thaddeus, Sally, and the other girls might be overrun before they could shoot but Bette Mae would drop him before anyone could take a step. Weighing his options and finding that he had none, Billingsley gave up.
“Alright,” he shouted to the men stirring about him. “This has gone far enough.”
“Like hell, it has,” the voice called out.
Cutting off further conversation, Billingsley commanded, “I said ENOUGH. Everyone sit down, NOW.”
Slowly, the men began to obey. One by one, they sat in the nearest chair and when all the chairs were taken, they sat on the floor until no one was left standing except the rancher and the newspaper man and women with their weapons pointed at him.
“That’s better,” Bette Mae said from her post at the kitchen’s door. “How’s Billie?”
“Bullet went clean through,” Thaddeus informed her.
Sally placed the shotgun on the bar in front of Thaddeus, then knelt down to the sheriff slumped on the floor. “He’s coming around,” she stood back up. “He’s goin’ have a headache for a few days.”
Bette Mae signaled to one of the women standing behind her. The woman ducked under Bette Mae’s arms still holding the shotgun and made her way among the men to the bar. She and Sally helped the sheriff up and half-carried him into the kitchen area so that they could attend to his injuries.
“Now,” Bette Mae addressed the men, “you are goin’ to stay here ’til mornin’. You won’t move, you won’t say anythin’. I suggest that you get some sleep ’cause ya goin’ wish you had come sunrise.” Not hearing any argument from her captive audience, Bette Mae continued. “My girls and I ain’t goin’ nowheres, so don’t get any ideas.”
After a long look at the men sitting about the room, Bette Mae added “Sweetwater’s population of jackasses sure done grown tonight. And, you can put that in your paper, Thaddeus.” A rippling of laughter was heard from the women.
“I’ll make it my headline,” Thaddeus said as he took a more comfortable position sitting atop the bar. Exchanging the pistol for the shotgun, he place it across his legs.
It took a couple of hours but Sheriff Monroe’s vision was finally clearing and the ringing in his head was down to a loud roar. His arm was wrapped in a clean bandage and a piece of ice wrapped in a towel was pressed against his jaw. He was sitting in the kitchen and being attended to by one of the woman that worked at the Slipper. The sheriff tried to think of her name but eventually decided that he had never known it. He remembered that the girl was very shy and said very little. She worked in the kitchen and laundry areas of the Slipper and rarely came into contact with the guests. As his mind cleared, the sheriff wondered why he hadn’t taken notice of the pretty girl before. Maybe after this mess was over, he would come by the Slipper’s kitchen and see if he could get the girl’s attention.
“How’s the head?” Bette Mae sat beside the sheriff and, effectively, brought his thoughts back to the events at hand.
“Feels like my horse kicked me,” the sheriff said cautiously so as not to jar his injured face too much.
“Probably will for a while,” Bette Mae handed him a fresh piece of ice and took the wet towel from him. “What now, Billie?” she asked.
“You keep them here and I’ll go check on Jesse,” he nodded a thank you for the ice before pressing it against his jaw. “She probably thinks something happened to me by now.”
“Somethin’ did happen to you,” Bette Mae wrung out the drenched towel and handed it back.
“Yeah,” he said as he wrapped the towel around the chunk of ice. “Good thing it happened at the Slipper and you stood up to them,” the sheriff rose from the chair, swaying a bit as he stood.
“Hang on, Billie,” Bette Mae reached out and placed a steadying arm on the sheriff’s. “Maybe one of us should walk with you.”
“Nah,” he tried to smile but it quickly turned into a grimace when his jaw protested. “I’ll be okay once I get going. Besides, I’d rather you stay and help Thaddeus keep an eye on them,” he tilted his head in the direction of the saloon.
“Okay,” Bette Mae agreed. “I’ll have Ruthie keep an eye on you from the porch. She can make sure you make it back to your office.”
“Sounds good,” Billie reached for his hat that rested on a shelf near the door. Without care, he placed it on his head, mashing his disheveled hair under it. “Thanks, again, Bette Mae.”
“You give our love to Jesse,” the older woman squeezed the arm that she still gripped. “And, send Miss Jennifer back here so I can see that she is alright.”
“I will,” the sheriff said as he left.
Sheriff Monroe gained strength as he walked from the Slipper towards his office. It was still dark out and this surprised the sheriff. It felt like the night’s events had lasted several days instead of just a few hours. Billie stepped into the moonlit street and stopped in the middle of it. Careful not to move his jaw any more than necessary, he took several deep breaths. The cold, night air felt good as it filled his lungs and the lingering dizziness from his fall seemed to dissipate as he continued to draw in the fresh air. After several minutes, he continued his journey.
He reached his office to find the front door locked as he had instructed Jennifer to do upon his departure just hours earlier. He knocked lightly, sorry to have to wake the women he was sure to be asleep inside. As his knocking received no answer, he knocked louder and called to Jennifer. Still only silence answered him. Moving to the window beside the door, he peered into his office. He could see nothing as no lamp was lit inside the building. He rapped his knuckles strongly against the window pane in hopes that the sharper sound would wake the women. No answer.
“Strange,” Billie mumbled. He had always heard that Jesse was a light sleeper and would awake at the smallest of sounds. “Must really have been worn out after tonight’s excitement,” he said to no one in particular.
The sheriff was about to try the other window when something caught his eye. It wasn’t much. Just the flash of moonlight reflecting off the cell’s bars. The sheriff stood frozen in place while he tried to reason out why that had caught his attention. It was just the moonlight and that wasn’t unusual on a clear night for the moon to penetrate into his office.
“Damn,” Billie jerked away from the window. The moonlight, that was the answer. There was no way for the moonlight to reach that part of the jail unless it came through the back door. And, the only way for it to come through the back door was if the door was open.
Billie raced down the boardwalk until he reached the entry to a walkway that ran between the jail and the town hall. He ran along the walkway and slid to a stop at the back of the jail. The door stood wide open. He entered the building already knowing what he would find. It was empty. The cell that he had left Jesse securely locked in was open and vacant. His desk was pushed up against the front door to keep out any unwanted visitors.
“Damn,” the sheriff repeated. “Why, Jesse?” he said to the empty room. “They’ll hang you for sure when they catch you.”
“Then you’ll have to make sure they don’t catch her,” the sheriff swung around to see Ed standing in the open doorway.
“Did you know?” he shot the accusing question at the big man.
“No,” Ed shook his head. “Didn’t think she’d break her way out.”
“She didn’t,” the sheriff informed him. “She had help from Miss Jennifer,” he pointed at the key ring still hanging from the cell door’s lock.
A smile slowly made it’s way across Ed’s face and his belly laugh filled the air. “Damn,” he chuckled. “That schoolteacher has sure got some spunk.”
“Yeah,” Billie was pulling his desk away from the front door. “That spunk may get them both killed.”
Ed accompanied the sheriff back to the Silver Slipper. The short walk was made in silence as both thought on the opinion the sheriff had voiced in his office. They knew that a posse would have to be formed and Jesse and Jennifer would be hunted down and brought back to face judgment for the jail break. Any hope of the judge letting Jesse off after hearing her testimony regarding the rustled cattle was gone. The sheriff pondered how he could keep control of a posse of men who would now be angry that they had been forced to sit in the Slipper’s saloon while Jesse made her escape. Ed wondered if Jesse could keep herself and the schoolteacher safe until they could uncover the truth behind the rustlers and clear both their names.
As the sheriff entered the Slipper to inform the now sobering men of the jail break, Ed stopped him with a large hand on his arm.
“Give Jesse the time she needs,” the storekeeper asked knowing that he didn’t need to explain his request.
“I’ll do what I can,” Billie agreed and then entered the saloon. Ed following close behind.
A few men were talking quietly but most of the men were sleeping or just sitting, consumed by their own thoughts. They stepped over the men on the floor and made their way back to the bar where Thaddeus still sat. The sheriff pulled a chair behind the bar and stood on it. Still a little unsure on his feet after his injury, he did not want to chance climbing on top of the bar.
Thaddeus slipped off the bar and handed Ed the shotgun, “you’d probably be more comfortable with this than I am.”
“Thanks,” the large man accepted the gun and stood beside Billie. Thaddeus took up a position at the end of the bar where he could watch the proceedings and make notes. After all, he did have a newspaper to run and this was the biggest story to hit Sweetwater since he started the paper.
Once everyone was situated to his satisfaction, the sheriff picked his pistol up from the bar and rapped it hard on the wood surface.
The men who were already awake and watching the sheriff’s actions, were ready for the sharp noise of his gun hitting the bar. The sleeping men were not and woke in various stages of alarm. After a few moments, the sheriff rapped the bar again.
“I hope I have everyone’s attention now,” he told the room.
“Hey, what’s with all the noise?” one man asked. “Thought you wanted us to sleep?”
“Listen to me,” the sheriff cut the man off. “Something has happened and I need to form a posse.”
This news brought the room back to life and several men shouted questions at the same time. The sheriff held up his hands to quiet the men. “Hold your questions and listen to me. I’ll tell you want happened, but first I’m setting some ground rules.”
A few grumbles could be heard but, since the men wanted to find out what was going on, most remained silent to encourage the sheriff to continue.
“Alright,” the sheriff took a deep breath and began. “I’m naming the posse members. The rest of you are to return to your homes and ranches and go back to your own business. If any of you try to interfere with the posse, I’ll arrest you. And, you can answer to the circuit judge when he gets here.”
More grumbles were heard, but were shushed by those around them.
“Billingsley and Butler, name three of your best trackers.”
“That’s it?” someone in the crowd asked.
“No, I’m asking Thaddeus and Ed to join us,” the sheriff said. “And, that’s it.” Sheriff Monroe wasn’t sure that putting the two ranchers on the posse was the best of ideas but he knew he would never leave town without Billingsley. And, it was better to have Butler, who had a major dislike for Jesse, where he could keep an eye on him. Plus, both men employed the best trackers in the valley. The best besides Jesse. That little piece of information gave the sheriff some peace of mind as he knew Jesse would not make it easy for the posse to follow her.
The sheriff’s decision to add the newspaper editor and the storekeeper to the posse was two-fold. First, it would give him two extra sets of eyes and ears that were not out to harm Jesse and Jennifer. And the two men would provide neutral testimony when the women went on trial. The sheriff knew he had to bring the women back but he wasn’t going to bring them back to hang.
“Alright, Billie,” Conrad Billingsley rose from the chair he had been occupying. His legs were stiff and his back ached and he was in no mood for any games from the sheriff. “You’ve named your posse. Now, do you mind telling us what the hell is going on.”
“Jesse escaped from jail last night.”
Shouts arose from every man in the room but the sheriff cut them off by firing his pistol in the air.
“Miss Jesse ain’t goin’ like all them bullet holes in her new ceiling,” Ruthie said to Bette Mae as they watched the proceedings from the kitchen.
“Hush, child,” Bette Mae scolded. “Them’s the least of our worries right now.”
“Alright,” the sheriff was trying to out shout the men. Calls for the sheriff’s arrest, and worse, for letting a prisoner escape started to make their way about the room.
Realizing that he couldn’t hold back the men alone, the sheriff turned to the rancher standing on the other side of the bar. “Billingsley, you know this has gone too far. We have to work together or Sweetwater will pay the price for years to come.”
Studying the sheriff and listening to the growing anger of the crowd, the rancher gave in for the second time in the last few hours. He nodded and walked behind the bar to stand beside the sheriff and storekeeper.
“QUIET,” Billingsley’s bellow rolled around the room and the men paused. The smart ones saw the intensity in the eyes of the men behind the bar and quieted. The not-so-smart ones and the ones still too intoxicated, foolishly continued to protest. “I SAID QUIET,” a second, more forceful bellow rattled the glasses behind the bar and got everyone’s attention.
“Last night was a mistake,” Billingsley lowered his voice. “We’re ranchers, not a lynch mob. Jesse has been a good friend since she came to Sweetwater.”
“Speak for yourself,” the rancher Butler mumbled.
“Shut up, Butler,” Ed glared at the man. “You don’t like Jesse ’cause she’s a woman and she runs a ranch. That doesn’t mean she should hang for something she didn’t do.”
“Is that how you treat cattle rustlers in Sweetwater?” a voice asked from the back of the room.
The sheriff looked in the direction of the voice, “who said that?” The sheriff continued, “someone’s been trying to stir you men up all night. Always pushing you towards a lynching. Look around, who do you see? You see your friends and neighbors. People you have known for several years. Not people who would want to hang a friend.”
Billingsley nodded at the sheriff’s words as he realized that he was speaking the truth. Someone had been stirring the pot most of the night, but why? Maybe Jesse was innocent.
As the men searched the faces of those standing or sitting near them, no one took notice of the lanky cowboy who sat at a table in the back of the room. To all who looked in his direction, he appeared to be just another of the young cowboys employed by one of the valley’s ranches. His outward calmness hid the fact that his heart was in his throat and the hands he hid under the table were shaking so bad he was afraid they would give him away. The boy’s thoughts were concentrated on whether or not he would manage to escape from the room alive. He was in way over his head and he decided that no amount of money Johnson was going to pay him would compensate for what he was going through.
As the men continued to search for the owner of the voice, the sheriff drew their attention back to the front of the room. “Okay, any more questions, or problems, before we break this up?”
Some of the men shook their heads but most just stood quietly.
“Good,” Sheriff Monroe said. “Billingsley, you and Butler pick your men and meet me at the jail in half an hour. Bette Mae, the Slipper is closed until the posse gets back,” the sheriff told the women watching from the kitchen. Without waiting for a response, he continued, “I expect no harm to come to the Slipper or to Jesse’s ranch and livestock. There’s no proof she had anything to do with the rustling. And after hearing her story, I’m convinced she had nothing to do with it. But, we will bring her back and let the judge decide.”
The sheriff bent to step down from the chair, then changed his mind and straightened back up. “Now, for the last time, GO HOME,” he said to the men.
An half hour later, a small group of recently sobered men sat on their horses in the street outside of the jail house. Sheriff Monroe, a bandage wrapped around his upper arm and sporting a nasty bruise on his jaw stood on the boardwalk in front of the building. The newspaperman and storekeeper were astride their own horses standing slightly apart from the ranchers.
With one final look at his posse, the sheriff mounted his horse and turned it in the direction that would take them to Jesse’s ranch. “Let’s go.”
CHAPTER NINE
“Where are we going?” Jennifer asked from her place behind Jesse.
After leaving Jesse’s ranch, Dusty had maintained a steady pace. They rode east from the ranch and into the thick forest on that side of the valley. Jesse led them deep into the trees before changing directions to travel south in the direction where she had lost the rustlers’ tracks the previous day. ‘Was it really only one day’, she thought. So much had happened.
“Jesse,” Jennifer twisted in an effort to see Jesse’s face. “Are you okay?” she softly asked.
“Yes,” Jesse patted the arms wrapped tightly around her waist. “Just thinking.” She turned in the saddle to smile back at her passenger and was surprised to see the concern in Jennifer’s eyes.
“Guess I got myself in a pretty good mess, uh?”
“We’ll get you out of it,” Jennifer said. She didn’t know how and she didn’t know why but she did know it was important to her future, both their futures, to see Jesse cleared of the charges against her.
“Wish I was as sure as you are,” Jesse turned back around to guide Dusty through yet another rocky stretch of ground.
“Wouldn’t it be easier to avoid the rocky areas?”
“Yes, but it would also make it easier for the posse to track us.”
“Oh,” Jennifer turned to look behind them. All she saw were trees, “are they following?”
“Probably,” Jesse said. After taking note of the location and length of the sun’s shadows, she added, “should have reached the ranch by this time.” She wondered if Billie would be able to stop the ranchers from tearing it apart looking for more evidence that she had stolen their cattle. With a sigh, she realized that there wasn’t much she could do about it now.
“So, where are we going?” Jennifer repeated.
“South, to the spot where I tracked the rustlers yesterday. Hopefully, I can pick up their tracks again.”
“Then what?”
“Then, I try to find out who they are and why they want me to hang.”
Jennifer stiffened, “don’t say that.”
“Hey,” Jesse gently stroked Jennifer’s arm. “I have no intention of being the guest of honor at a necktie party. But, you have to admit, someone is trying real hard to make me look guilty.”
“I know,” Jennifer’s voice was soft as she laid her head against Jesse’s back.
It was late morning when Dusty left the cover of the forest. They quickly made their way across the south end of Jesse’s property, Dusty carrying them on a path that would cross the rustlers’ trail.
“That’s the canyon I found the cattle in yesterday,” Jesse pointed.
Jennifer lifted her head, “shouldn’t we check it out?”
“Nah, I doubt they would go back there.” Jesse shook her head at her stupidity. If only she had left the cattle where she had found them and had gone to find Billie. But, the animals had been hungry and thirsty and she knew she had done the right thing for them. Unfortunately, it wasn’t the right thing for her.
Dusty stopped at a small creek their path crossed. Jesse realized her horse was right and a break was in order. Unlocking Jennifer’s arms from her waist, Jesse swung her leg over the saddle horn and slipped to the ground. She reached up to help Jennifer from Dusty’s back. Free of her riders, Dusty enjoyed a drink of cold water.
As soon as her feet touched the ground, Jennifer groaned at her sore muscles. She arched her back into a stretch, “goodness, I never knew riding a horse was so hard on one’s body.”
Jesse laughed as she stretched out her own tired muscles, “takes some getting used to. I take it you didn’t do much riding back home?”
“Only if you count horse drawn buggies,” Jennifer took a few tentative steps hoping to get the blood flowing again in her legs.
“Here,” Jesse offered the canteen. “Drink. Won’t be long ’til the sun is really beating down on us.”
Jennifer accepted the offer and took a long drink before handing it back. As, Jesse knelt to refill the canteen from the creek, Jennifer joined her. After rolling her sleeves above her elbows, Jennifer cupped her hands and filled them with the cool water which she splashed on her arms and face.
Watching, Jesse pulled the bandana from her neck, soaked it in the creek and partially wrung it out. “Put this around your neck,” Jesse held the still dripping cloth out. “It will help keep you cool.”
Jennifer smiled gratefully as she took the bandana from Jesse. “What about you?”
“I’m used to the heat,” Jesse lied. She knew that in a short time the sun would make their ride miserably but it was a small sacrifice to give Jennifer some relief from the heat. “Keep that wet,” Jesse added. “Let me know if the canteen gets low.”
Dusty was ready to continue and Jesse mounted up. She reached down for Jennifer and as soon as the schoolteacher was settled, she urged Dusty into a trot.
Jesse soon picked up the rustlers’ tracks and began following them back into the forest where the tracks had split up. Guessing that the three riders would eventually rejoin each other, Jesse decided to stay with the one that had continued south. It was a direction that would keep them in the trees and out of the sun. And, would make a easier ride on Dusty and them.
Dusty was picking her way up a dry creek bed. Jesse and Jennifer were walking alongside to give the tired horse a break. It was hot but the large ponderosa pines around them served to block the sun’s intensity. Jennifer had long ago given up on keeping Jesse’s bandana wet. The afternoon’s oven like conditions dried it almost as fast as she could pour water over it.
They had been following the same set of tracks for so long that Jennifer was able to pick them out almost as easily as Jesse.
Wanting to break the heavy silence that had grown between them, Jesse asked, “so, what brought you to Sweetwater? Other, than the schoolteacher position, I mean.”
Jennifer was quiet for several moments while she decided how much she wanted to tell her companion. But after considering that she had just broken Jesse out of jail after knowing her for only a few days, she decided there wasn’t much reason to not tell the truth.
“I come from a family where girls are raised to marry, have children and not question their father’s or husband’s decisions. I wanted more than that. A friend gave me a newspaper from Denver, I saw the ad for schoolteachers and I answered it.”
“Your father, or,” Jesse hesitated. “Or, husband must have had something to say about you leaving.” She held her breath not really sure she wanted to know the answer to her unspoken question.
Jennifer laughed softly, “oh, I’m not married. Not that my father didn’t do everything in his power to make sure that I was. I didn’t tell anyone I was leaving. Oh, except for Matt. He’s the friend,” she smiled as she thought of the librarian. “He helped me. Bought the train ticket and gave me some money to live on until I received my schoolteacher’s pay. He kept my secret even though he works for my father.
“I knew if my father found out what I was planning, he would have had my brothers watch my every move. To him, I wasn’t worth anything more than being the incentive part of a business deal,” she said bitterly. “Just a way to make his shipping business more profitable by marrying me off to the son of one of his associates.”
Jesse was saddened by Jennifer’s words and wanted nothing more than to pull the schoolteacher to her and hug her tight. Instead, she asked, “what about your mother?”
“Like I said, the women in my family are taught to obey. I don’t think I ever heard my mother question my father. Whatever he decided was fine with her. And, my brothers will go along with father as long as he controls the family business.” Jennifer sighed deeply, “it may have been good enough for mother, but I was not going to live like that. So, here I am.”
Jesse smiled, “I’m glad you’re here.”
Jennifer smiled back shyly, “Me, too. So, what about you?”
“I’m sure Bette Mae or one of the girls has told you the story. I won the Slipper in a poker game. Not much else to tell.”
“Sure there is,” Jennifer protested. “I mean, it’s not usual for a woman to be riding around the west by herself. What about your family?”
“I was born on my folk’s ranch outside of Bozeman. Just the three of us. My mom had a boy a year after me, but he died the same day. She couldn’t have any more children after that. I don’t think my dad ever forgave her. He’d always wanted a son.”
“But, he had you.”
“Yeah, he worked me liked he would have a son, that’s for sure. I worked that ranch since the day I learned to ride, and I was riding before I could walk. Guess I just figured one day the place would be mine. He figured it differently.”
“Came home one day after riding fence to find them packing up and moving into town. Told me he sold the ranch and I was on my own.”
Jennifer gasped, “he threw you out.”
“Guess you could say that. Seems I had taken too long to find myself a husband and the son that he could finally pass the ranch to. So, he took the money when it was offered.”
“Got on Dusty and never looked back. Found myself in Denver one night and decided to try my luck in a poker game. You know the rest.”
“Some pair we are, uh?” Jennifer began to chuckle. “Neither of us any good to our families because we wouldn’t get married.”
“Yeah,” Jesse joined in the laughter. “Looks like we’ll be a pair of old spinsters, puttering around Sweetwater in our old age.”
“As long as we do it together, you won’t hear me complain,” Jennifer said before she could stop herself.
Jesse grinned and this time she didn’t hesitate, she wrapped her arms around Jennifer and hugged her tight. “Me, too,” she whispered. “Me, too.”
Jennifer melted into Jesse’s arms. She looked up into Jesse’s eyes and saw the same affection reflected back at her. Now, she knew why she had turned away every suitor her father had arranged for her. None had looked at her like Jesse was and none had made her feel important like Jesse did by just holding her. She had left the place of her birth, traveled half way across the country and had found her home. And, she couldn’t think of a better place to be at this very moment.
Jesse felt Jennifer return her embrace without hesitation. It felt so good to hold her. If she could stay in this moment forever, she would be a very happy woman. No one’s touch had ever affected Jesse the way the schoolteacher’s did. And, Jesse was going to do everything in her power not to lose the feeling. After several minutes, Jesse gently broke their embrace.
“We need to keep moving,” Jesse told the disappointed schoolteacher.
Jennifer sighed but knew Jesse was right, “when this is all over, I want to pick up where we left off.”
Jesse smiled, “that’s a promise.”
They resumed their journey picking their way around the larger rocks in the dry creek bed.
“You would think that he would try to hide his tracks,” Jennifer referred to the rustler they were tracking.
“Um,” Jesse had had the exact same thought more than once. It was almost as if the rider wanted to be followed. “Maybe.”
“Maybe? It’s almost as if he wants us to follow,” Jennifer gave voice to Jesse’s thoughts.
“Well, if that’s the case, I guess we’re obliging him,” Jesse told her.
“Jesse,” Jennifer reached out a hand and gently rested it on Jesse’s forearm. “What do you plan to do when we catch up with the rustlers?”
Jesse stopped and looked down at the hand on her arm before raising her eyes to meet Jennifer’s. “I plan to find out why they are doing this to me and then I plan to figure out a way to get them back to Sweetwater and let Billie deal with them.”
“But, what if,” Jennifer started to ask when Jesse reached up and placed two fingers on her lips to quiet her.
Jennifer’s lip were soft and Jesse wondered what it would be like to kiss them. After several moments of considering doing just that, Jesse dropped her hand.
“It’ll be okay,” Jesse said with a confidence she didn’t really feel. “Come on,” Jesse said as she lifted herself back into the saddle, “let’s ride.”
Jennifer reached up to take Jesse’s outstretched hand and soon found herself seated behind Jesse in a position she was quickly becoming accustomed to. She reached up and touched her lips, where only moments before, Jesse’s fingers had rested. She smiled.
CHAPTER TEN
The tracks left the dry creek bed and led them along a forest path to a large meadow. As Dusty walked out from the trees into the clearing, she came to an abrupt stop.
“What’s wrong,” Jennifer cried out at the sudden lack of motion.
“Shh,” Jesse said. “Look, but don’t make any noise.”
Jennifer peeked over Jesse’s broad shoulders and saw several dozen large deer-like animals grazing on the meadow’s grasses.
“What are they?” she whispered.
“Elk.”
“They’re beautiful,” Jennifer was immediately taken with the magnificent animals.
Some stood as tall as Dusty and carried the beginnings of large racks of antlers on the heads. Their brown coats blended in with the growing shadows and if it hadn’t been for their light colored rears, Jennifer would have had trouble picking some of them out. A few lifted their heads from the grass to look at the intruders. But, sensing that they meant them no harm, they quickly went back to grazing. Several of the younger ones skirted around to put their mothers between themselves and the women.
“It’ll be dark soon,” Jesse looked to the western sky. The sun stayed in the sky late this time of year but when it started to drop, it fell fast and night was a short time coming. “Guess this is as good a spot as any to set up camp.”
“We’re going to camp here with them,” Jennifer was a little nervous thinking of trying to sleep with the big animals wandering around.
“No,” Jesse nudged Dusty around the elk herd to the edge of a small creek running through the clearing. “They’ll be gone by nightfall. They don’t stay in one spot for very long.”
“Oh,” Jennifer continued to watch the elk. Impressed at the way they moved with their heads held high. “They’re so majestic when they move.”
“Yeah,” Jesse said as she swung her leg over Dusty’s neck and slipped from the saddle. “I could sit and watch them all day.”
Jennifer slid down from the saddle and landed next to Jesse. “I can see why,” she agreed as she stretched her back and legs.
Jesse pulled the saddle bags and gear off Dusty and placed it on the ground. Then, she pulled the saddle and saddle blanket off. Rummaging around in one of the saddle bags, she found the grooming tools and immediately began to give Dusty and good rub down. “Been a long day for you, girl. Hasn’t it?”
Dusty raised her head in agreement.
“Let me get you cleaned up and then you can run free for the night.”
“Aren’t you afraid she’ll run off,” Jennifer questioned.
“Nah,” Jesse continued her chore. “Raised her from a foal. She and I are good pals, we look out for each other. I’d never leave her and she’d never leave me. Right, girl?” Jesse patted the mare’s neck before removing the bridle.
Dusty whinnied her response then took off at a run right through the center of the herd, the elk scurrying out of her way. Both women laughed at the mare’s antics.
“Best get camp set up while we still have light.”
“What can I do,” Jennifer asked at a loss. She had never, in her entire life, slept outside. She had no idea how it was done. Where did Jesse have the bed? It couldn’t possible fit in one of the saddlebags.
“Well, you could gather up firewood,” Jesse suggested.
Looking around, Jennifer wasn’t sure where she would find a stack of chopped firewood. “Um,” she scanned the meadow. “Ah, Jesse?”
“Yes,” Jesse was gathering rocks for a fire ring.
“Where is the firewood?”
Looking up, Jesse was puzzled at Jennifer’s question.
“Well, you could start with that branch you’re almost standing on,” she answered.
Reaching down, Jennifer lifted the branch in her hand. “You mean this?”
“Yes, what did you think I meant by firewood?”
“Well, I guessed you meant like the chopped wood Ed brings to the school house every day.”
“Oh,” realization slowly dawned on Jesse. “Sorry, I should have known you probably never did anything like this before,” she smiled apologetically.
“I can truthfully say that I’ve never set up a camp before,” Jennifer grinned back.
“Ok,” Jesse said. “Let’s start again. You can go around and pick up all the pieces of wood, like that branch, you can find. Just stay in the meadow and don’t get near the elk.”
“Right,” Jennifer set off on her task.
After setting up the fire ring and clearing the loose debris around it so that a spark wouldn’t set the meadow on fire, Jesse rolled out her bed roll and placed her blankets next to it. “Guess I’ll be sleeping on the grass tonight,” she said as she looked down at her only bedroll.
“Did you say something?” Jennifer returned with an armload of wood. She dropped it next to the fire ring.
“Just thinking I should have picked up another bedroll when we stopped at the ranch,” Jesse reached for a few of the smaller branches and placed them inside the ring.
“Oh,” Jennifer looked at the lone bedroll and pondered it’s possible advantages.
“We’ll need more wood,” Jesse broke into her thoughts. “It’ll get cold tonight.”
Jennifer set off on another foray of firewood gathering, “I bet I know one way to keep warm tonight.
“Did you say something?” Jesse asked as she took out a match from the small box in the saddlebag.
“No, nothing at all,” Jennifer smirked.
When she brought her second armful of branches back to the camp, Jennifer was surprised to see a fire was started, a small pot of water was warming on a rock placed amidst the burning wood, and Jesse was gutting two large fish.
After dropping her load with the other, she asked, “where did those come from?”
“The creek,” Jesse gave her a very self-satisfied grin.
Jennifer walked over and looked into the small body of water flowing between the creek’s banks. “In there?”
“Jesse, there’s not enough water in that for me to take a bath.”
“Wanna bet?”
Jennifer considered meeting the challenge, then shook her head and walked back to the fire. “They’re big.”
“Rainbows. Every taste one?”
“Don’t think so.”
“Then, you are in for a treat. Rainbows are the best when they’re fresh from the water and cooked over an open fire.”
Jesse finished cleaning the fish and placed them in a frying pan. Soon, the smell of grilling fish filled the air.
“Smells wonderful,” Jennifer said from the short section of log she sat on. Jesse had found it not far from their camp and had rolled it next to fire.
Darkness had overtaken the meadow and camp by the time the fish were ready to eat.
Jennifer was laying on her back on the bedroll. She stared up into the night sky, “I have never seen so many stars.”
“You don’t have stars back home?” Jesse asked as she washed up in the creek.
“Not as many as these,” the more Jennifer stared, the more the stars began to take on shapes and forms. She had once read a book that talked about the stars and she remembered the book had called various groupings constellations. But, she had never been able to compare the book’s descriptions to the actual stars in the sky because her father had told her it was nonsense for a woman to do such things and had forbade her to stay out at night to try.
“This is so different from back home,” Jennifer sighed.
“How so?” Jesse sat on the log and placed a few more branches on the glowing fire.
“I don’t know if I can describe it,” Jennifer sat up to face Jesse. “I felt so restricted back there. So controlled. Here,” she swept her arm around the meadow. “I feel so free. Like I can do anything.”
Jesse smiled, “you can do anything, Jennifer.”
Jennifer cocked her head and looked at Jesse, “that sounds nice.”
“What, that you can do anything.”
“No, the way you say my name. You put so much feeling into it when you say it. No one has ever done that before.”
Neither woman knew what to say after that. They just sat quietly watching the fire light reflect off the other.
Dusty trotted back to the camp.
“Tired of irritating the elk?” Jesse asked the mare who had spent much of the evening chasing the large animals.
After a long drink in the creek, Dusty walked over and pushed her still dripping muzzle into Jesse’s face and blew out a long breath through her nostrils. She then turned and trotted away from Jesse with a spring to her gait. Jennifer did everything she could to not laugh.
“Smart ass,” Jesse grumbled as she wiped her face dry on her shirtsleeve.
Dusty whinnied her response.
Jesse looked over at the schoolteacher holding in her laughter. “Oh, go ahead and let it out before you bust a gut.”
Howls of laughter rang out scaring away any elk that remained in the meadow. Slowly, the laughter ran down until Jennifer began to hiccup and couldn’t stop.
Now, it was Jesse’s turn to laugh. “Serves you right,” she told the suffering woman.
Finally, taking pity on the schoolteacher, Jesse handed her the canteen. “Take a large gulp but don’t swallow until you feel a hiccup coming. Swallow at the same time.”
Jennifer did as she was instructed and the hiccups stopped. Taking a large lungful of air, Jennifer handed back the canteen. “Where’d you learned that?” she wheezed out.
“Don’t know. Just always worked for me.” Jesse walked over to her saddle and picked up the saddle blanket tossed over it. She lay down on the ground next to the log and pulled the blanket over her, “we best get some sleep.”
Her breathing back to normal, Jennifer watched Jesse as she settled into the saddle blanket.
“Going to sleep. What does it look like?”
“It looks like you plan to sleep wrapped in that smelly blanket.”
Jennifer paused, then said what she had been thinking all evening. “Jesse, come share the bedroll with me.”
Jesse took a deep breath, she wanted so much to do as Jennifer asked. Her feelings for Jennifer made the idea of sleeping close to her both terrifying and spine-tingling.
“Please,” Jennifer asked. She opened the blankets and crawled inside. Then holding them open, she added “we’ll both be warmer.”
“Alright,” Jesse got up and slowly walked around the fire to where Jennifer lay waiting. She slipped between the blankets. Nervously, she lay on her back and waited to see what Jennifer would do. The bedroll wasn’t really wide enough for two people but Jesse wasn’t going to move now that she was here.
Jennifer smiled at Jesse before moving to lay on her side next to Jesse. She placed her head on Jesse’s shoulder and wrapped an arm around her waist. Timidly, she asked, “is this okay?”
“Yes,” Jesse smiled as she felt the weight of Jennifer’s body pressed against her own. “Are you comfortable?”
“Very,” Jennifer snuggled closer and was surprised, but very pleased, when she felt Jesse’s arms pull her close.
“Jennifer,” Jesse said then paused. She continued awkwardly, “what would you think if I said that I was having feelings for you?”
Jennifer’s heart leaped into her throat. Was it possible that Jesse felt for her the same way she felt for the rancher. She was afraid to ask but she had to know, “what kind of feelings?”
“The kind of feelings a woman must have for a man when she wants to spend the rest of her life with him,” Jesse said in one long burst. She wanted to get the words said before she chickened out.
Not hearing a response from Jennifer, Jesse knew she had made a mistake in saying anything to Jennifer. She began to get up.
Jennifer felt Jesse move beneath her and she placed a hand on Jesse’s chest to stop her. She raised her head up to look into Jesse’s eyes.
“I’m so sorry,” Jesse said when she saw the tears rolling down Jennifer’s cheeks.
“No, Jesse,” Jennifer smiled through the tears. “I’m glad you said it because I feel the same way.”
“Then, why are you crying,” Jesse reached up and softly wiped the tears away.
“Because, you’ve just made me very happy,” Jennifer captured Jesse’s hand in her own and pulled it to her chest as she laid her head back on Jesse’s shoulder. She could hear Jesse’s heart racing and knew that her own was beating just as rapidly.
“Good night, Jesse,” Jennifer whispered.
Jesse wrapped the blankets around their joined bodies. “Good night, Jennifer.”
CHAPTER ELEVEN
It was early afternoon and they had been back on the rustlers’ trail since dawn. For the past hour, the trail had led them in a southwesterly direction and was sloping more downhill. Jesse knew that they would soon leave the relative safety of the forest and be back in the open canyon country at the south end of the valley.
Jesse pulled Dusty to a stop.
“Listen,” Jesse twisted in the saddle so she could see Jennifer. “I don’t know what we’re going to find when we leave the trees. Maybe, it would be best if you stayed here and…”
“No,” Jennifer instantly cut her off. “Leaving me here is not an option. You’re right, you don’t know what we’ll find but, whatever it is, we’ll have a better chance if we stay together.”
Jesse hesitated, she didn’t want to put Jennifer in danger but it did make better sense to stay together. She looked in Jennifer’s eyes and saw the schoolteacher’s determination. Her decision was made. “Okay, but if we run into trouble, you do as I say. Deal?”
Jennifer nodded, “deal.” To herself, she added ‘maybe’.
Twisting back around in the saddle, Jesse nudged Dusty forward at a walk. This end of the valley was mostly box canyons and scrub brush ravines. Whoever they had been following could now be waiting in ambush in any number of places. Other than turning around and traveling back through the forest to meet the posse following them, there really wasn’t much choice than to ride out and face whatever awaited them head on. Jesse only hoped that Billie had some good trackers in the posse and that they would catch up with the women soon.
As the forest began to thin, Jesse was able to see the opening country beyond. The trail was leading to a small meadow before leaving the forest completely. Dusty walked into the clearing and stopped. She nervously pawed the ground.
Jesse saw the source of her mare’s apprehension. Across the meadow, a camp was set up and a fire was burning. Three horses stood tied to a picket line but their owners were nowhere in sight.
“Damn,” Jesse muttered.
“What?” Jennifer had a death grip on Jesse’s waist.
“Maybe,” Jennifer whispered fearfully as she peeked over Jesse’s shoulder, “we should go back.”
Jesse continued to search the meadow and surrounding trees for any movement. “Too late for that,” she said as a man stepped out from the trees, his rifle leveled at Jesse and Jennifer. He waved two younger men out from their hiding places, both also armed with rifles.
“Been a long time, bitch,” the first man said.
“Johnson?” Jesse was puzzled that the previous owner of the Silver Slipper would be here.
“So, you remember me,” Johnson sneered.
Jesse didn’t answer but took the time to study the three men facing them. Johnson’s younger companions looked uneasy, almost like they didn’t want to be there. Johnson, on the other hand, looked jubilant, like he had fully expected Jesse to ride into his camp.
“What do you want, Johnson?”
“The Slipper back.”
“It’s not for sale,” Jesse stalled as she tried to devise a plan to get herself and Jennifer safely out of the trap Johnson had sprung.
“Don’ plan to pay for what I already own, bitch.”
“Game was fair. You lost.”
Tired of the conversation, Johnson commanded, “come over here. Nice and slow.”
“If I refuse?”
“I’ll shoot that pretty schoolteacher.”
With a gentle flip of the reins, Dusty began to walk forward.
“Hold it,” Johnson shouted. “Throw down any weapons you have with you, first. And, you get off and walk. Don’ want you tryin’ anything.”
“Alright,” Jesse said. She slowly swung her leg over the saddle horn and slid easily to the ground. They were a good 50 feet from the men and Jesse knew she had to use the opportunity this presented. Turning to pull her rifle from the saddle’s scabbard, she whispered to Jennifer, “keep looking at Johnson. I need you to listen to me and do as I say.”
Jesse sensed Jennifer’s body stiffen and Jesse patted her leg to reassure her. “Please, Jennifer. We don’t have time to argue.”
“What’s taking you so long?” Johnson began to walk towards the women.
“Rifle’s caught in the scabbard, give me a minute,” Jesse turned to face the man. Seeing him stop, she turned back so he couldn’t see her face. “I want you to ride Dusty back through the forest and find Billie.”
“I can’t,” Jennifer began to protest.
“Yes, you can. I’m going to distract Johnson and his pals, then I’ll signal Dusty. Hold on tight to the saddle horn so you won’t be thrown off when Dusty starts to run. Find Billie, tell him to bring the posse as fast as he can.”
“How will I find him?” Jennifer asked as Jesse pulled the rifle free and tossed it on the ground.
Jesse wrapped the reins loosely around the saddle horn, “just hang on. Dusty will take you to him.” She looked up and smiled confidently at Jennifer, “you can do it.”
Jesse reached into the saddle bag and pulled her pistols from it. She slipped one pistol into the back waistband of her pants while she made a show of tossing the other one down next to her rifle. Then she walked up and patted the mare’s neck, “take care of Jennifer for me, girl.”
Jesse stepped away from Dusty and spread her arms wide away from her sides. “Get ready,” she said to Jennifer.
“Wait,” Jennifer cried. “Jesse you can’t too this.” Jennifer kneed Dusty’s sides in an attempt to move her closer to Jesse but the horse wouldn’t budge. “Please, Jesse,” she pleaded as Jesse moved further away from her.
“Bring her with you,” Johnson commanded.
“No,” Jesse barked back.
Johnson raised his rifle and pointed it at Jennifer. Jesse pulled the pistol from it’s hiding spot and dropped to the ground rolling. She fired a couple of shots at Johnson, the bullets digging into the trees behind him.. Johnson dove to the ground and Jesse used this moment to whistle to Dusty.
Jennifer felt Dusty’s muscles tense and just had time to grab the saddle horn with all her might before the golden horse sprung into action. In a few strong steps, Dusty had turned and reached full speed as she sped for the safety of the forest. Jennifer tried to rein the horse in but her attempts were ignored by the mare. She heard more gunshots behind her and a cry of pain that she was sure came from Jesse but before she could turn around to look, Dusty had entered the forest and the trees blocked her view of the meadow.
Holding on as tight as she could, Jennifer let Dusty carry her away from Jesse. Tears streamed down her face as she imagined the worse had happened. “Please,” she whimpered, “let her be alright.”
It seemed like an eternity had passed when Dusty ran out of the forest and into the meadow where they had spent the previous night. Jennifer saw the sheriff and posse examining what remained of their campfire. Dusty was already making her way towards the men, when Jennifer started shouting, “Sheriff. Sheriff.”
Dusty galloped right up to the posse before skidding to a stop literally at their feet.
“Thank god, we found you,” Jennifer cried in relief.
“Miss Jennifer?” the sheriff asked. “Is that you?” It was hard to tell that the sweat and dirt covered rider dressed in jeans and flannel shirt was indeed the pretty schoolteacher from Sweetwater.
“Yes, it’s me,” Jennifer breath was coming in ragged gasps as she tried to control her emotions.
“Arrest her, sheriff,” Butler grabbed for Dusty’s reins. The horse snorted and reared pulling the reins from the rancher’s hands.
“Stop that,” Jennifer screamed as she almost fell from the saddle. Dusty settled back on all fours but shied away from the man still attempting to grab at her.
Ed stepped out of the group of men and eased his way up to the horse, “take it easy, there now, Dusty. No one is going to hurt you or Miss Jennifer.” His gentle voice and smooth movements calmed the mare and she did not resist when the storekeeper took hold of her reins.
Thaddeus also stepped forward and the two men attempted to help Jennifer off the horse. But, Jennifer shook her head at the offer.
“You have to save Jesse,” the woman pleaded to the two men. “Please, we don’t have time to wait.”
“Hang on there, Miss Jennifer,” Ed told her. “We can’t help if we don’t know what the problem is. Now, why don’t you get down off that horse and get yourself calmed down enough to tell us what’s wrong.”
“No,” Jennifer cried. “There isn’t time.”
“Jennifer,” Thaddeus looked up into Jennifer’s tear streaked face and softly continued, “Ed’s right. We can’t do Jesse any good until you tell us what’s going on. Come on and get down.” He reached up to help Jennifer but was nudged out of the way by the taller storekeeper. Ed put his large hands around Jennifer’s waist and lifted her out of the saddle.
“Just get her to tell us where Jesse is so we can get this over with and go home,” Butler shoved the sheriff toward the woman. “And, arrest this one, too.”
“Hold on,” Billie said.
“He’s right, Billie,” Billingsley agreed. “She’s wanted for breaking Jesse out of jail. Arrest her.” Murmurs of agreement rippled through the other members of the posse standing around.
“Look, she’s not going anywhere,” Billie told the ranchers. “Let’s hear what she has to say.”
“Shut up,” Jennifer screamed at the men standing around her. When Butler started to speak, she looked him straight in the eye, “I said to SHUT UP!”
Ed handed Jennifer a canteen. She smiled weakly at the big man as she accepted his offering and took a drink. It tasted so good and as she drank she wondered if Jesse had been given something to drink or if she was even still alive. Tears filled her eyes at the thought and she wiped them away with the dirty sleeve of her shirt.
“They shot Jesse,” Jennifer said, her voice so full of emotion that she could barely get the words out.
“Is she dead?” Butler smirked.
Seeing the tears, Ed softly said, “why don’t you tell us what happened.” He reached out and covered Jennifer’s hands with his much larger ones and gently squeezed.
“We were following the rustlers’ tracks when we came to a meadow. A man named Johnson and two others,” Jennifer began.
“Johnson?” Billingsley cut her off. “What the hell does Johnson have to do with anything?”
“He said he wanted the Slipper back,” Jennifer informed the group.
“Where are they?” Billie asked.
“At the south end of the valley where the forest meets the canyons,” Jennifer pointed to the south.
Jesse felt a searing pain as the bullet ripped through her left upper arm. The force twisted her around and out of line of the other bullets fired at her. As she hit the ground, she looked to see if Jennifer had escaped unharmed. Dusty was well on her way to the tree line and in a few more strides would disappear into the forest.
Jesse heard Johnson yell at his cohorts to shoot Dusty and stop Jennifer. Jesse fired her remaining bullets at Johnson and the other men, it wasn’t much but it kept them from injuring her mare or the schoolteacher. When her pistol clicked on an empty chamber, she threw it away in disgust. Realizing that she was too far away to reach her rifle and other pistol, she called out to Johnson and his companions, “hold your fire.”
“Save your bullets, boys,” Johnson said to the others. “Show yourself,” he directed at Jesse.
Jesse sat up. She ripped a sleeve off her shirt and wrapped it tightly around her bleeding arm. The wound stung but Jesse was grateful to see that the bullet had only grazed her. Tending to her wound gave her time to think about her predicament and what she thought wasn’t good. She was just glad that Jennifer had gotten away and hoped the woman could hang on as Dusty took her for the ride of her life.
“Bring her here,” Johnson ordered his companions.
Jesse watched as the two younger men cautiously approached her.
“Can you stand?” Clinton, the older of the pair asked her.
“Yeah,” Jesse struggled to her feet.
“You got any more guns hidden on ya?” Jimmie, the younger brother asked behind the gun shaking in his own hand.
Jesse looked at the shaking boy and it became obvious why she hadn’t been hit by more of the bullets fired at her. “No, if I did, I would have used them. Why don’t you point that somewhere else before it goes off,” she told the boy.
He looked at his quivering hand and dropped his arm. “Not used to pointin’ one of these at anyone,” he mumbled.
“What’s takin’ you two so long?” Johnson shouted. “Bring her here.”
“Come on,” the older boy said as he grabbed Jesse’s wounded arm.
“Hey,” she winced at the jolt of pain that resulted. “If you need to grab something, try the other arm.”
“Sorry,” the boy released her arm. “Come on, he ain’t goin’ wait forever,” he told her.
The boys escorted Jesse to a impatiently waiting Johnson. “Well,” Johnson gloated. “Looks like the cards are all in my hand now.”
“Look,” Jesse started. “I’m not sure what exactly you want but you might want to know that there’s a posse just a couple of hours behind me.”
“They’d be lookin’ for a cattle thief and,” Johnson jabbed a finger in Jesse’s chest, “that, would be you.” Johnson glared at Jesse and before she knew what was happening, a huge fist slammed into her face. Jesse dropped to the ground like a stone.
“Why’d ya do that,” Jimmie cried.
“Tie her to that tree,” Johnson pointed at the broken trunk of a ponderosa pine near their camp. “Then, go find the other one and bring her back.”
“What about the posse?” Clinton asked.
“What about them?” Johnson sneered. “They ain’t lookin’ for you. Now, git.”
The boys dragged an unconscious Jesse against the tree and propped her up before tying her to it. After securing Jesse, they claimed their horses and rode toward the forest. Once they were safely deep enough into the trees to be hidden from the meadow, Clinton pulled his horse to a stop.
Jimmie followed suit and looked at his brother quizzically, “you thinkin’ what I’m thinkin’?”
“Yeah,” Clinton said as he looked back in the direction of Johnson’s camp. “Let’s get the hell out of Montana while we still have a chance.” He kicked his horse into action and led his brother away from the crazy Johnson as fast as their horses could run.
It was almost dusk when Jesse’s brain began to clear. The throbbing of her arm was nothing compared to the pounding going on in her head. She shook her head trying to clear it and groaned in pain. She could hear laughter but was unable to focus on its source. Slowly, she lifted her head from where it rested on her chest and tried to focus her blurry eyes. She blinked several times but her vision still didn’t clear. With a grunt, Jesse laid her head back against the trunk she was tied to.
Johnson rose from his spot next to the fire. “Bout time you woke up.” He glared down at her but it was lost on the woman who could only see a blur standing over her. “How’s the head?” he laughed.
“Fine,” Jesse lied. No use in him knowing the truth.
“Right,” Johnson laughed again as he returned to the warmth of the fire. He couldn’t get accustomed to the cold nights in the mountains.
Jesse finally gave up on trying to focus her eyes when she realized the left one was swollen shut. Gradually, the vision in the right eye began to clear. Jesse saw Johnson huddled next to the fire, his companions nowhere in sight. The sound of movement caught her attention and she turned her head to see a horse grazing a dozen feet away. “Ugh,” she moaned as the action caused her head to throb even more.
Johnson looked up from the fire. “Thought you was fine,” he chuckled. He reached for the coffee pot warming by the fire and refilled his cup.
“Could I have some water?” Jesse asked, her throat so dry she could barely get the words to come out.
Johnson looked at the woman, considering her request. He didn’t want to get too close to the troublesome woman but he had checked the ropes holding her several times while she was unconscious and was sure she wouldn’t be able to get loose. He put down his coffee cup and stood. Walking to his horse, he removed a canteen from his saddle and ambled back over to Jesse. Holding the canteen above her head, he emptied the contents in the general direction of her open mouth. More water missed than hit the mark, but she was able to capture enough to give her some relief.
“Thanks,” she sneered after swallowing.
“You’re welcome,” Johnson dropped the empty canteen onto the ground next to her before returning to the fire.
Jesse watched the man as her thoughts went over the day’s events. Something Johnson had said earlier continued to run around in her mind. It didn’t make sense, unless…
“You knew the posse was looking for a rustler,” Jesse voiced the thought. “How?”
“Because, I set you up,” Johnson shrugged.
“The Slipper. By the way, I hear you’ve turned it into a respectable business,” he mocked. “Won’t take too much to change it back. I will even give you odds that the whores will be happy to return to their previous duties.”
“You’re a pig,” Jesse spat. Thinking of Johnson regaining ownership of the Slipper and forcing her employees and friends back into their previous livelihoods filled Jesse with rage. After a few moments to calm her racing heart and throbbing head, Jesse asked, “if you wanted the Slipper back, why not just make me an offer?”
Johnson stared at Jesse, “you think I’m that stupid? I knew you’d never sell the Slipper to me. Besides, you cleaned me out that night in Denver.”
Jesse considered replying to his question, then thought better of it. As the darkness grew, she wondered about Jennifer. Was she safe? Did she find the posse? Did they believe her story? If they did, where were they? Calculating, the time she had been unconscious, Jesse wondered why they hadn’t found Johnson’s camp yet. They couldn’t have been that far behind, not with the trail she had left for Billie to follow. Well, until they showed up, Jesse thought it was best to keep Johnson talking.
“So, how would setting me up for rustling get you the Slipper back?” she asked.
“Easy,” Johnson grinned as he began to describe his ‘perfect’ plan. “Once the good folk of Sweetwater discovered you was nothin’ but a cattle thief, it would be easy to convince them that you was probably a card cheat too. I would get the Slipper back because you had cheated me out of it in the first place.”
“You don’t really think they’d believe that, do you?”
“Why not? Clinton had them ready to hang you the other night. If that damn schoolteacher hadn’t butted in, you’d be crow bait by now.”
Jesse shuddered when she realized just how close to the truth Johnson was. “So, Clinton was the mysterious cowboy stirring up the others?”
“Yep,” Johnson added a few branches to the fire. “Had them going good. Even got a shot off at the sheriff. Only winged him but it would have been enough to get him out of the way if it hadn’t been for Bette Mae. Known I should have killed that bitch years ago, but she kept the other whores in line,” Johnson began to ramble.
“What did Bette Mae do?” Jesse asked to pull Johnson back on track. She hoped that her friend was alright.
“Clinton said she and the other girls held the entire group at gunpoint until they sobered up. Wouldn’t let anyone leave, even made Billingsley stay put. Bet he liked being told what to do by the ol’ whore.”
“God, must you be so crude,” Jesse sighed. She smiled as she imagined Bette Mae standing up to Billingsley and the other ranchers. So, that’s how she and Jennifer were able to leave town unnoticed. ‘Gotta remember to thank her if I ever get out of this,’ Jesse thought.
“So, now what?” Jesse asked. “Your plan didn’t exactly play out the way you were expecting.”
“Now what?” Johnson repeated. “Now, I’ll just have to shoot you myself. Then, I’ll take your carcass back to Sweetwater. I’ll tell them I caught you with stolen cattle, you tried to shoot me but I got you first.”
“If you’re just going to shoot me, why haven’t you already done so?”
“Waiting for the boys to get back with your schoolteacher,” Johnson casually informed her.
Jesse’s heart clinched. That’s where the other two men had gone, to get Jennifer. She began to struggle against the ropes, she had to make sure Jennifer was safe.
“Hey,” Johnson looked at the struggling Jesse. “What got your bloomers twisted all of a sudden?”
“Why can’t you leave her out of this?” Jesse cried. “She hasn’t done anything to you.” Jesse was frantic but the ropes were too tight and the more she fought them, the more her head throbbed. She finally collapsed back against the tree, her heart racing so fast she thought she might pass out again. “Just leave her alone,” Jesse begged. Jesse closed her good eye and let visions of Jennifer fill her thoughts. “I’m sorry, Jennifer,” she whispered too quietly for Johnson to hear. “I love you.”
CHAPTER TWELVE
The posse was surprised on the forest path by two riders barreling into them.
“Hold up, there,” Billie commanded. “I’m Sheriff Monroe from Sweetwater, what are you two running from in such a hurry?”
Clinton and Jimmie instantly threw their hands into the air, figuring taking their chances with the posse were much better odds than Johnson would ever provide them.
“We got nothin’ to do with murder, sheriff,” Jimmie blurted out. “We helped rustle cattle, but we didn’t sign on to kill anyone.”
Jennifer went pale at the boy’s words. “Is Jesse dead?” she asked through fresh tears running down her face.
Ed reached over to comfort the woman then barked at the boys, “answer her question.”
“No,” Clinton shouted as he looked at the angry man. “No, she was alive when we left but he plans to kill her. At least, that’s what he told us.”
“Take their guns,” Billie instructed the cowboys surrounding the brothers. “Tie ’em to their saddle horns and let’s get moving.”
The posse continued as quickly as possible, still it was almost dusk when they finally reached the meadow. The riders dismounted after moving the horses further into the trees so as to not alert Johnson of the posse’s presence. The brothers were questioned and Clinton pointed out where they had left Johnson and Jesse. Billie sent a cowboy ahead to verify they were still in the meadow. The cowboy returned after several long, anxious minutes.
“He’s there, just where he said he was. Jesse’s there too.”
“Is she alright?” Jennifer quietly asked.
“Can’t tell. She’s still tied to the stump. Didn’t move the whole time I was watching.”
“Okay, you stay here with them,” Billie told a couple of the cowboys, referring to the brothers. “Miss Jennifer, I want you to stay here, too.”
“No,” Jennifer shook her head violently. “I need to see Jesse.”
“He’s right,” Thaddeus said as he placed a hand on Jennifer’s shoulder. “It might be better for you to stay here until we know more.”
“NO,” Jennifer shook off his hand. “I’m coming,” she started out of the forest.
Thaddeus put out an arm and stopped Jennifer. “If you’re going, you’ll stay with us.” he motioned for Ed to join them. “Jesse won’t be too happy if we let anything happen to you.”
Jennifer started to protest but the resolve on the faces of the two men, made her think better of it. “Alright,” she consented. “But, let’s quit wasting time.”
“Okay,” the sheriff took charge. “Stay to the trees and get positions as close to the camp as you can. Get to them quickly but don’t alert Johnson. Then wait for my signal. Let’s go,” Billie led the men into the shadows and they quickly disappeared into the forest.
Ed and Thaddeus guided Jennifer into a small pile of boulders at the edge of the meadow and they hid behind one of the larger rocks. Their hiding spot provided a good view of the meadow and camp. Jennifer studied Jesse’s still form. In the firelight, she could see the bloody bandage wrapped around Jesse’s arm but she was unable to see Jesse’s face because her head was hanging down onto her chest. Somehow, Jennifer knew Jesse was alive and her body ached to hold the injured woman.
“We’re here, Jesse. Hang on, we’re here,” Jennifer whispered. Her two companions said nothing but both echoed her sentiments.
The sheriff had reached his vantage point. He was hidden in the trees approximately 20 feet from Johnson, who sat next to the fire drinking coffee. Jesse was between Johnson and the sheriff and he thought briefly of trying to reach her without Johnson noticing. But, he rejected that idea when Jesse groaned.
Johnson rose from his spot next to the fire. “Bout time you woke up. How’s the head?” he laughed.
At Johnson’s words, Billie took a closer look at Jesse. Her face was bruised and one eye appeared to be swollen shut. “Damn,” he muttered under his breath. Johnson had returned to the fire and Billie was about to signal the posse members into action when Jesse asked for water. Johnson again stood and Billie waited. He didn’t want Johnson too close to Jesse when the posse made it’s move.
Jennifer watched as Johnson carried a canteen to Jesse and poured the water over her head. It took all the strength Ed and Thaddeus possessed to keep the schoolteacher from rushing out of their hiding spot and taking Johnson on single handed.
Billie also watched as Johnson drenched Jesse with water. ‘Come on,’ Billie said to himself. ‘Go back to your nice fire.’ Again, Billie was just about ready to signal the posse, when Jesse asked Johnson.
“You knew the posse was looking for a rustler. How?”
Knowing that Butler and some of the others had not believed the story told by the brothers, Billie decided that it might be a good idea to hear Johnson’s answer. Besides, it didn’t look like Jesse was in any immediate danger. And, Billie could, at any time, signal the posse to move in to stop Johnson from further hurting Jesse.
Billie and the others listened as Johnson told of his plot to have Jesse hang as a cattle thief and to retake ownership of the Silver Slipper. Billie had decided that they had heard more than enough to convince even Butler of Jesse’s innocence when Johnson threatened Jennifer. Billie was surprised at Jesse’s violent reaction to Johnson’s words until he heard her whispered pledge of love for the schoolteacher.
A movement across the small meadow caught Billie’s attention. “Damn,” he muttered when he recognized Jennifer moving rapidly down from the boulders, Ed and Thaddeus hot on her heels. He saw Johnson pick up Jennifer’s movements and reach for his gun. Billie stepped from his hiding place and leveled his rifle at Johnson.
“Don’t,” Billie commanded. “It’s over, Johnson. Put your hands up.” At his words, the rest of the posse members stepped from their hiding places and Johnson saw that he was surrounded by armed men.
Jesse lifted her head when she heard Billie’s familiar voice. Johnson seeing his plans of revenge collapsing, swung around and aimed at Jesse’s head. For Jesse, time seemed to stand still as she stared into the barrel of Johnson’s six-shooter. Somewhere, she heard someone screaming but her eyes refused to leave the sight of the gun pointing at her. Explosions went off all around her and Jesse thoughts turned to the schoolteacher and what they could have had. Then everything went black, again.
“Give her some room before you smother her,” Ed was saying.
Jesse felt hands tending to her wounds, including a new one where Johnson’s bullet had skimmed along the side of her head. But, the only touch she was thinking about were the hands caressing her face. Without opening her eyes, she knew the hands belonged to Jennifer and she spent several moments enjoying the feeling.
“Wake up, sweetheart. Please, wake up,” Jennifer was crying.
Jennifer didn’t care that she was surrounded by the ranchers and cowboys who were giving each other strange looks over her use of the endearment. She had sprung from her hiding place and raced across the meadow when she saw Jesse start to fight against the ropes that held her. Her heart had stopped when she saw Johnson point his gun at Jesse’s head and she had screamed at him not to shoot. An burst of gunfire exploded in the meadow but Jennifer had not missed a step in her dash to reach Jesse.
Fresh blood covered Jesse’s face and her head hung down against her chest. Jennifer had tried to untie the ropes but her shaking hands couldn’t grab hold of the knots. Billie knelt beside Jennifer and pulled the knife hidden in Jesse’s boot, he sliced through the ropes freeing the injured woman. By then, Ed and Thaddeus had arrived and they helped Billie lay Jesse on the ground where her wounds could be tended. Jennifer sat beside Jesse and tried to pull her bleeding head into her lap.
“Give her some room before you smother her,” Ed gently pulled Jesse from Jennifer’s grasp and poured water on a rag before carefully cleaning the cut left by the bullet. Jennifer leaned over Jesse and begged her to wake up.
“Ugh,” Jesse said as she opened her good eye. She looked up into the bluest eyes she had ever seen or ever wanted to see. “Hi,” she tried to smile but it quickly turned into a grimace of pain.
“You’re awake,” Jennifer cried. “Thank god, you’re awake.” Tears began to stream from her eyes. Seeing the agony on Jesse’s face, she quickly told her, “don’t move, sweetheart. You’re hurt.”
“Kinda figured that one out myself,” Jesse said.
“That’s the best I can do until we get you back to Sweetwater,” Ed said as he finished bandaging Jesse’s head. “You’re going feel this for a good while.”
“Thanks, I think,” Jesse looked at her friend.
“Ain’t nothin’,” Ed patted her shoulder, then stood and motioned the men away to give the two women some privacy.
“How are you?” Jesse asked. She wanted to reach up and pull Jennifer into her arms. But, even blinking hurt, so she decided it probably wouldn’t be a good idea.
“I’m fine,” Jennifer gently stroked Jesse’s bandaged head. “This must really hurt.”
“I’ve won’t say it doesn’t but,” Jesse reached up and took Jennifer’s hand into her own, “seeing you makes the pain go away.”
“Then, I’ll just have to stay right by you at all times,” Jennifer smiled.
“I think I’d like that,” Jesse smiled back. It hurt, but damn it, she couldn’t stop herself. Looking at Jennifer just made her want to smile.
Ed returned with the sheriff and some blankets.
“Here,” Billie said. “It’ll get cold tonight.”
Thaddeus arrived with an armful of wood for the fire he had built next to where Jesse lay. “This should help, too.”
“How you feeling?” Thaddeus asked Jesse.
She looked into Jennifer’s eyes, “just fine. I’m feeling just fine.”
The man laughed as he and Ed walked back to the other fire. The sheriff stayed behind.
“You look like you’ve had a couple of rough days,” Jesse said to her friend.
Nodding, Billie said, “’bout the same as you. How’s the head? Didn’t think Johnson had that in him.”
“You trying to make me feel good by saying it was a lucky punch,” Jesse said.
“Is it working?”
“No,” Jesse winced. “Hurts like a son of a…”
Jennifer placed her fingers over Jesse’s mouth. “Sweetheart, is that any way to talk in front of a respectable woman?” she teased.
“Sorry,” Jesse looked chastised. “Guess I just don’t think about you in that way.”
Billie laughed as Jennifer snorted and slugged Jesse in her good arm.
“Hey,” Jesse protested. “I’m wounded here.”
“You’re lucky I didn’t hit the other arm. Now, behave yourself.”
“I see that you’re in good hands, Jesse,” Billie told the pouting woman “We’ll be heading home at first light, so get some sleep.”
Jennifer picked up the extra blankets and began to arrange them on the ground so that she could lay close to Jesse but not with her..
“Hey,” Jesse interrupted her actions.
“Put those blankets over here,” Jesse patted the ground beside her.
Jennifer looked questioningly at her.
“I want to hold you,” Jesse said quietly.
Jennifer nodded happily. When the blankets were re-arranged to Jesse’s satisfaction, Jennifer lay down beside her. She carefully placed her head on Jesse’s shoulder and wrapped her arm around Jesse’s waist. “How’s this?”
“Wonderful,” Jesse sighed. Moments later, both women were fast asleep.
CHAPTER THIRTEEN
The trip back to Sweetwater was pure agony for Jesse. She rode Dusty with Jennifer riding behind her, helping to hold her in the saddle. Every step Dusty took sent jolts of pain through her body and exploded in her head. Only Jennifer’s non-stop encouragement and support kept her from screaming out her distress. The group rested several times during the day to give Jesse a break from the constant pounding. This was both a blessing and a curse, the breaks allowing Jesse much needed rest but they also extended the length of the trip. Jesse was sure that she would be unable to take any more when Sweetwater finally came into the riders’ view.
Ruthie was keeping watch on the porch of the Silver Slipper when she saw the posse appear over a rise some distance from town. She ran to the building’s main door and shouted, “they’re back.”
Bette Mae came rushing out of the kitchen, followed closely by the other girls.
“Where?” Bette Mae asked as she ran out onto the porch.
“There,” Ruthie pointed to the riders still about a quarter mile from town.
“Is Jesse with them?” one of the girls asked.
“That’s Dusty in the middle of the group,” Bette Mae answered.
“What about Miss Jennifer?” another asked.
“She’s ridin’ with Jesse,” Bette Mae hoped that the women were alright.
Just about that time, a couple of the riders broke from the group and hurried toward the Slipper. As they neared the edge of town, Bette Mae recognized them as the storekeeper and the newspaper editor. The two men rode directly for the Slipper.
“Is Jesse?” Bette Mae began as the men rode up.
“She’s hurt but alive,” Ed answered before Bette Mae could finish her question. “She’ll need some lookin’ after for several days.”
“Ruthie,” Bette Mae called to the girl. “Go in and fix up the room first off the stairs.”
“No,” Thaddeus grinned. “Best you fix up Miss Jennifer’s room for Jesse.”
A grin broke across Bette Mae’s face, “well, I’ll be. Go on, girl,” Bette Mae said to Ruthie who was standing with a look of puzzlement on her face. “You heard him. Fix up Miss Jennifer’s room. Go on, git.”
Ruthie scurried into the building to do as she had been told but not understanding Bette Mae’s obvious pleasure at the newspaper editor’s words.
“How is Miss Jennifer?” Bette Mae asked.
“She’s fine. Just worried about Jesse. Won’t leave her side, not for a minute,” Ed said as he climbed down from his horse. “Damn, I’m too old to spend that much time in the saddle,” he rubbed his sore backside and stretched out his long legs.
“Me, too,” Thaddeus agreed as he joined Ed on solid ground. “It’ll be good to get back into my desk chair.”
The rest of the posse rode up with the sheriff leading the way. Ed and Thaddeus moved immediately to Dusty’s side and gently eased Jesse out of the saddle. Instantly, Jennifer was on the ground next to her and held Jesse around the waist.
“Come on,” she told the injured woman. “We’ll get you into a nice, soft bed and you can rest.”
Unable to speak because of the pain, Jesse barely managed a nod as she allowed Jennifer to lead her to the stairs leading up to the Slipper’s porch. It was clear to everyone that Jesse would never be able to climb the few steps on her wobbly legs.
Without asking, Ed lifted Jesse into his powerful arms and carried her up the steps. Jennifer shadowed the big man all the way into the building and up the stairs to her room where Ruthie stood with the door open. As soon as Ed placed Jesse on the bed, Jennifer took back Jesse’s hand.
Bette Mae shooed everyone but Jennifer out of the room. “Well, let’s see what we got here,” the older woman said as she began to unwrap Jesse’s bandages.
“She needs a doctor,” Jennifer said.
“Bette Mae’s the best doctor this town has got,” Jesse assured the schoolteacher. “Aren’t you?”
“Can’t argue with that statement. Got any other wounds I need to know ’bout?” she asked Jesse as she carefully washed the blood and dirt from Jesse’s face.
“How ’bout you?” Bette Mae asked Jennifer.
“No, I’m okay.” Jennifer sat on the edge of the bed. “Is she going to be alright?” she asked hesitantly.
“She’ll be fine. Lucky, she got hit in the head. It’s her hardest part,” Bette Mae chuckled.
“When I’m feeling better, I’ll make you pay for that,” Jesse tried to swat at her friend, realizing too late that she was using her injured arm. She hissed at the pain.
“Lay still,” Bette Mae grabbed her arm and gently laid it back on the bed. She wrapped a fresh bandage around Jesse’s head and then started on her arm. “Damn, you are one lucky woman, Jesse. Two bullets and both only grazed ya.”
“They hurt like they more than just grazed me.”
“I bet they do. Few days rest will fix them right up. ‘Course, that eye’s goin’ take a tad longer to heal. But, the blow to your head is what’s goin’ ta cause you the most bother. What’d you get hit with?”
“Johnson’s fist.”
“Johnson. What does that bastard have to do with all this?”
“He set Jesse up for the cattle rustling. Thought if she’d hanged, he’d get the Slipper back,” Jennifer supplied the answer.
“Always thought he was a card or two short of a full deck,” Bette Mae finished wrapping a fresh bandage around Jesse’s arm. She took the dirty bowl of water and tossed it out one of the rooms windows.
“Might be someone standing under there,” Jesse remarked.
“Hope it’s Butler,” Jennifer muttered, surprised to hear Bette Mae laugh at her comment.
“Yep, she’s a feisty one,” Bette Mae winked at Jesse as she started to remove her boots. “You best get some sleep and give your body time to heal. I have a bath prepared for you, Miss Jennifer. Your bath will have to wait another day,” she told Jesse who made no argument.
“I can wait, too,” Jennifer said. “I don’t wait to leave Jesse.”
“Go on,” Jesse said softly. “You’ll feel better. Besides, I’m not going anywhere.”
“You sure,” Jennifer thought that a hot bath did sound pretty good.
“I’m sure. Just,” Jesse whispered, “hurry back.”
Jennifer bent down and softly kissed Jesse’s cheek. “I won’t be but a minute.”
The pain in Jesse’s head disappeared as she felt the warmth of Jennifer’s lips. Her eye closed as she savored the touch, “I’ll be waiting.”
When Jennifer pulled her head back, Jesse was already asleep.
Ruthie came out of the kitchen carrying a tray with three plates heaped with food. She placed the dishes in front of Billie, Ed, and Thaddeus. Bette Mae had offered hot meals to all the posse members but the ranchers had declined stating that they wanted to return to their ranches. Bette Mae thought they decision to leave immediately was based more on their embarrassment at accusing Jesse of a crime than any desire to get right home.
The sheriff, storekeeper and newspaper editor had accepted the offer and were enthusiastically digging into their plates after eating trail food for the past couple of days.
“How’s Jesse and Miss Jennifer?” the sheriff asked between bites.
“Sound asleep.” Bette Mae took a long drink from her glass of lemonade. She had helped the schoolteacher with her bath then had had to practically carry the young woman back to her room when exhaustion overcame her. She tucked Jennifer under the blankets and smiled as the two sleeping women snuggled close to each other.
“Seems like the two of them got to be real good friends out on the trail,” Billie said as he shoved a forkful of ham into his mouth.
“I do believe you are right,” Thaddeus chuckled.
“Now, you stop that,” Bette Mae playfully scolded the men. “It was only a matter of time ‘fore they figured out they liked each other. Being out there just gave ’em the little push they needed.”
“They do make a cute couple, if I say so myself,” Ed smiled. “Any chance of getting more of this ham, Bette Mae?” the big man asked holding up a empty plate.
“After bringin’ back my girls, you can have the whole damn pig,” Bette announced as she rose from the table and disappeared into the kitchen.
Reappearing a few moments later with a large platter of ham and potatoes, Bette Mae rejoined the men. “I take it Johnson is in the blanket?” Bette Mae referred to the body wrapped in a blanket and thrown over the back of a horse Billie had led into town.
“Yep,” the sheriff stabbed a large potato off the platter. “Tried to shoot Jesse after we caught up to him.”
“Tried?” Bette Mae snorted. “Seems he managed to put two holes in her.”
“Yeah, well he was aimin’ between her eyes on the last one.” Billie cut the potato into chewable pieces. “Didn’t give us much choice but to shoot him first.”
“Just as well,” Ed added.
“What’s next, Billie?” Thaddeus asked. “Will Jesse have to stand trial?”
“Nope,” the sheriff answered around a mouthful of potato. “Johnson confessed, everyone heard him. Hell, even Butler couldn’t argue it. When the circuit judge gets here, I’ll tell him what happened and Jesse will be in the clear. Miss Jennifer, too.”
“Why, what did Miss Jennifer do?” Bette Mae asked.
“She broke Jesse out. If Jesse had been guilty, she would have had some big trouble over it.”
“But, Jesse wasn’t guilty,” Bette Mae stated.
“Yep. So, Miss Jennifer won’t get more than a talkin’ to by the judge.”
“What do you bet, it’s the judge that will be getting the talking to?” Thaddeus laughed and the others quickly joined him.
The following morning, Jesse was still sleeping as Jennifer dressed to reluctantly return to her teaching duties.
The mid-morning sun was beating through the room’s windows when Bette Mae quietly entered to check on her friend. She was surprised to see Jesse awake and standing by the window that faced town.
“Mornin’,” Bette Mae greeted her. “Didn’ think you’d be up.”
Jesse took a deep breath and let it out slowly. She had been watching the schoolhouse hoping for a glimpse of Jennifer. When she awoke a short time before, the first thing she noticed was how empty the room seemed. She missed Jennifer.
“How ’bout a nice, hot bath to wash all that dirt off?” Bette Mae asked.
“Hmm,” Jesse’s eyes never left the schoolhouse.
Bette Mae peered out the window, she smiled when she realized what held Jesse’s attention. “Come on,” the older woman gently steered Jesse to the door. “A good scrub, a change of clothes, a hot meal, and you might just be presentable by the time Miss Jennifer is done teachin’ for the day.”
Jesse allowed herself to be led from the room without complaint. The bath did feel wonderful and it was indeed good to get the dirt and grime scrubbed off her skin and out of her hair. When they returned to the room, she discovered that the bed linens had been changed and a tray of hot food had been set out on the desk. She didn’t have much of an appetite but she did her best to eat.
“Now, you get some rest,” Bette Mae told Jesse as she cleaned up the dirty dishes. “It’ll be a while ‘fore Miss Jennifer gets back and your head can use it.”
Jesse snuggled between the clean sheets. The quilt had been removed as the day’s heat was already too much to need it’s extra warmth. Jesse looked up at the woman who had become her first friend after arriving in Sweetwater. There was much she didn’t know about Bette Mae but the one thing she did know was that she trusted the older woman’s advice.
“Bette Mae,” Jesse said before she could leave the room. Jesse had heard the comments and snickers the cowboys had whispered about Jennifer and her on the ride back into town. Love between two women was not unheard of on the frontier but it wasn’t exactly accepted either. Jesse was confused, she had feelings for Jennifer that she had never had for anyone else. And, she knew Jennifer felt the same. But, was it right? Could they… No, should they respect those feelings? She needed to ask.
“Bette Mae, what would you do?”
Knowing what Jesse was asking, Bette Mae recalled a moment many years before when she had asked herself that very same question. A far away look crossed her face as she remembered her choice that day. Smiling sadly at Jesse, Bette Mae quietly answered.
“Follow your heart, Jesse. Follow your heart.”
As the door closed behind the departing woman, Jesse rolled her head and gazed out the room’s window. She couldn’t see the schoolhouse from where she lay but she could visualize where it stood out on the small knoll. And, she knew that at this very moment that schoolhouse held her heart. Smiling, Jesse let the sleep she had been fighting reclaim her.
Jennifer rushed from the schoolhouse as soon as the day’s lessons were over. She missed Jesse terribly and she couldn’t wait to see her. Bette Mae was clearing a table in the dining room when Jennifer burst through the Slipper’s door.
“Afternoon, Miss Jennifer,” Bette Mae brushed the crumbs off the table. “How was school today?”
Although, Jennifer wanted to run up the stairs to her room, she paused long enough to answer the woman, “just fine. How’s Jesse?” Jennifer asked when she saw the grim expression on Bette Mae’s face.
Bette Mae straightened from her task, “well, now, let’s see. She’s had a bath, put on clean bedclothes, ate some breakfast, took a nap, just had lunch. And,”
Jennifer’s heart clinched, “is something wrong?”
“Yep,” Bette Mae was having trouble maintaining a straight face.
“She’s been missin’ you, somethin’ awful.”
“She has?” Jennifer blushed.
“Yep,” Bette Mae laughed unable to hold back any longer. “Suggest you don’ spend too much time down here talkin’ to this old woman when you can be up there with her.”
Jennifer was halfway up the stairs before Bette Mae finished.
Jesse was standing by the window. She had seen Jennifer leave the schoolhouse and hurry towards the Slipper. She couldn’t wait for Jennifer to walk into the room but she was unsure what to do when that happened. She turned to face the door when she heard Jennifer’s footsteps moving rapidly moving down the hallway. Without hesitation, Jesse threw open her arms as soon as Jennifer appeared in the doorway. Jennifer ran into the welcoming embrace.
“I’ve missed you,” Jesse held the schoolteacher tight.
“So, I’ve heard.”
After several long minutes, the women separated. Jennifer examined Jesse, “how do you feel?”
“Head’s still a little on the dizzy side. But, overall, I feel pretty good. Considering…”
“Considering that the last couple of days, you’ve been punched in the face, shot twice, tied to a tree stump, bounced on horseback, and you’re about to go on trial for cattle rustling. I certainly hope that that doesn’t describe a normal week for you,” Jennifer observed.
“Nope,” Jesse shook her head then instantly wished she hadn’t. “I can honestly say that nothing even close to that has ever happened to me before you showed up.” Jesse thought for minute before adding, “say, you don’t think…”
“Don’t even go there,” Jennifer scolded.
Jesse looked at the schoolteacher and Bette Mae’s words came back to her, ‘follow your heart’.
Jennifer held her breath as Jesse reached out gently cupping her hands around Jennifer’s face. Jesse pulled her close until their faces were almost touching. Looking into the schoolteacher’s eyes, Jesse whispered, “I love you.”
Jennifer leaned forward to close the gap and timidly placed her lips on Jesse’s. At the touch, a warmth spread through her body and Jennifer pressed harder. Jesse returned the kiss. It was a new experience for both woman. Tentatively, they began to explore each other’s soft lips and warm mouths until a need for air caused them to part.
Jesse released a long breath, “wow.”
“Yeah,” Jennifer said before she recaptured Jesse’s lips.
Jesse stood in the street next to the steps leading up onto the Silver Slipper’s porch. Johnson was dead, the brothers he had talked into helping in his plot were behind bars, the stolen cattle had been returned to their rightful owners, and she had been cleared of all charges. So, why was she so fearful?
Jesse nervously shuffled from one foot to the other. After recuperating at the Slipper for the last several days, Jesse was eager to return to the ranch. She wanted to ask Jennifer to join her but didn’t know if it was too soon. After all, their growing relationship was only days old. It was obvious that they were deeply in love but neither of them had been confident enough to take their relationship to the next level.
Jennifer stood at the bottom step, quietly watching Jesse. She smiled when Jesse quit studying her dirty boots and looked up to face her. Jesse opened her mouth but nothing came out. Jennifer had hoped Jesse would ask her to accompany her to the ranch but had been too afraid to make the first move. Now, seeing her own feelings reflected back at her, her fears melted.
Jennifer stepped forward to meet Jesse. She reached out and wrapped her arms around Jesse. Leaning forward, she pressed her lips against Jesse’s in a tender kiss. Surprised but very pleased, Jesse slipped her arms around Jennifer and pulled her close. The kiss deepened as the women spent the next several moments enjoying the intimate touch of the other.
After much too short a time, Jennifer pulled away and laid her head on Jesse’s shoulder, “let’s go home, love.”
A smile spread across Jesse’s face. Taking Jennifer’s hand, Jesse led her to a patiently waiting Dusty. She helped Jennifer up into the saddle then swung up behind her, wrapping an arm around Jennifer waist. With her free hand, she unwrapped the reins from the saddle horn.
“I love you,” Jesse whispered into Jennifer’s ear.
Jennifer leaned back into Jesse’s warm body and entwined her hand with Jesse’s, “I love you, too.”
Dusty raised her head and whinnied her approval before moving off at a walk. She would carry her two mistresses home and neither one would ever remember the trip.
Story continued in Bannack
|
cc/2019-30/en_middle_0056.json.gz/line12599
|
__label__wiki
| 0.645298
| 0.645298
|
There were fewer than TEN people occupying the Gordon Aikman Lecture Theatre this weekend
So much for solidarity
Dominic Laverick
According to one of the leading members of the occupation, fewer than ten students were actually occupying the Gordon Aikman Lecture Theatre this weekend.
One of the leading members of the occupation admitted within a closed Facebook group for Edinburgh Co-operative housing members, who have been organising the majority of the occupation, that there are now fewer than ten students who remain in the building.
Is this the beginning of the end for the student occupation?
In a comment on a Co-operative Facebook group appealing for more support for the occupation, Mattia Verme said: "It's easter weekend and many are away. There less than 10 of us left here."
The occupation initially started in support of our striking lectures, but has since shifted into a wider movement that culminated with their attempt to take the Edinburgh Future's Institute name.
The occupation began on the 13th of March and since then, the occupiers have attempted stunts to increase their profile, including but no limited to drumming outside the library, interrupting lectures and draping banners.
The occupation renamed the lecture theatre via this extravagant stunt
Last month The Tab Edinburgh launched its own undercover operation into the occupation discovering poor sleeping conditions, a plot to occupy the library, and more.
Now that there are fewer than ten students who remain in the building, has student support for the occupation all but faded?
You can’t call yourself environmentally friendly if you buy fast fashion
Amelia Fleming
The industry creates 1.2 billion tonnes of CO2 emissions a year
The 2019 Love Island contestants as Edinburgh club nights
Marni Rose McFall
Five sunny and saintly insta accounts to follow this summer
Funmi Lijadu
Woke dreams and feel good memes
Don’t panic, but a COCKTAIL FOREST is coming to Edinburgh this October
Joanna Gray
Instagram isn’t ready for this
WE HAVE A WINNER! Meet Edinburgh’s official BNOC of the year 2019…
The votes are in!
Edinburgh BNOC of the Year 2019: THE FINAL
Who will be the winner?
Love Island’s Maura set to turn heads at Edi Freshers 2019
|
cc/2019-30/en_middle_0056.json.gz/line12603
|
__label__cc
| 0.542
| 0.458
|
Floyd Mayweather wins “The Money Fight” over Conor Mcgregor, retires at 50-0
Ian Moffet, Opinion Editor|September 4, 2017
On August 26, after a hard-fought nine rounds, Floyd “Money” Mayweather defeated Mixed Martial Arts (MMA) superstar Conor “The Notorious” McGregor by technical knockout in the tenth round.
The much anticipated boxing match had Mayweather as the projected winner, but McGregor surprised many by putting up a good fight. As Kevin Iole, boxing columnist for Yahoo Sports, put it: “He looked much like a seasoned boxer despite only training in the sport for about nine months.” The official scorecard was 87-83, 89-81 and 89-82 for Mayweather.
The beginning rounds showed McGregor in action, landing a swift uppercut followed by a left hook in the first round, setting the foundation for the next few rounds. Many, including the unofficial Showtime scoreboard, gave the first three rounds to him. Mayweather seemed to be much slower than usual, allowing many jabs to come through.
The next few rounds forced Mayweather to go on the offensive, which worked in his favor. Rounds four to seven were easily Mayweather’s as McGregor showed signs of being fatigued. Rather than a flurry in the middle of the eighth round, the rest of the fight was all Mayweather. In the tenth round Mayweather landed a straight right, wobbling McGregor and putting him up against the ropes as Mayweather landed two to three unprotected shots on the Irishman, ultimately leading to a stoppage.
Throughout the fight McGregor hit Mayweather with illegal shots on the back of the head, forcing the referee to break up the fight. This added fuel to the excitement and bizarreness of the match. This certainly was a fight for the ages, cementing a legend in the history books, and allowing an MMA megastar to do the impossible and go toe-to-toe with the best.
Although McGregor believed the referee put in an early stoppage, he was nothing but humble in
defeat, complimenting his opponent in the post-fight interview: “He [Mayweather] is not that powerful, but, boy, is he composed.”
Fortunately, McGregor fans can expect the young fighter back in action in the Ultimate Fighting Championship (UFC) before the end of the year. Unfortunately for Mayweather fans, this will be his last fight. Mayweather is the first professional boxer to retire with a record of 50-0.
Tags: boxing, Mayweather, Mcgregor, sports
Other stories filed under Sports
Seaview Gymnasium Underfunded and Not up to Code
A Balancing Act: Life as a Student Athlete
The amount of effort and dedication that it takes for the average college student to maintain their focus in an effort to successfully navigate their ...
The EdCC Tritons are Back at Bat
Baseball Continues To Walk a “Colored Line”
If one were to ask any American to name the first baseball player that comes to mind, there’s a good chance that they will think of Jackie Robinson....
Thompson Steps in as Interim Head Coach
Women in Roller Skates Topple One Another (Consensually)
Girls in Gis Punch the Patriarchy
EdCC Students Hit the Slopes
EdCC golf course: a better kind of clubbin’
|
cc/2019-30/en_middle_0056.json.gz/line12605
|
__label__cc
| 0.566916
| 0.433084
|
Conference: A Postsecular Age? New Narratives of Religion, Science, and Society
by Wei Zhu February 16, 2016
On July 27-30, the Ian Ramsey Centre for Science and Religion in conjunction with St. Anne’s College at Oxford will be hosting a conference entitled, Postsecular Age? New Narratives of Religion, Science, and Society.
The past 20 years have seen the development of the interdisciplinary subfield of ‘secularism studies’ or ‘critical secularism studies.’ Previous theories of secularisation typically presupposed the steady march of human civilisations toward non-religion—in part under the influence of scientific advance. By contrast, these new approaches view secularism and narratives of secularisation as ideological artefacts corresponding to specific times and places and in need of critical framing. Are we then living in what some have called a ‘postsecular’ age? Why have atheism and secularism become so fascinating for scholars—and in popular culture—for the past two decades? Has the secularisation narrative gone away (or changed shape?), putting religion back on the agenda of scholarship, global politics, law-making, and commerce? Are developments in science contributing to these trends? What effect have the New Atheism and new deployments of scientific authority had on secularisation theory? Why do secularisms look different in different times and places? What is the role of globalisation in the emergence and transformation of secularisms?
Speakers include Courtney Bender (Columbia University), Matthew Engelke (London School of Economics), Alister McGrath (Oxford University), Ann Pellegrini (New York University)
Mary-Jane Rubenstein (Wesleyan University) and Graham Ward (Oxford University).
The closing date for abstract submissions is 15 April 2016. More details can be found here:
CFPconferencespost-secularismreligion and science
Wei Zhu
Wei Zhu is the editorial associate for The Immanent Frame. He tweets at @newyorkwei.
|
cc/2019-30/en_middle_0056.json.gz/line12611
|
__label__cc
| 0.674402
| 0.325598
|
Paper and Fire
The Great Library
Caine, Rachel
In Ink and Bone, New York Times bestselling author Rachel Caine introduced a world where knowledge is power, and power corrupts absolutely. Now, she continues the story of those who dare to defy the Great Library-and rewrite history. With an iron fist, The Great Library controls the knowledge of the world, ruthlessly stamping out all rebellion, forbidding the personal ownership of books in the name of the greater good. Jess Brightwell has survived his introduction to the sinister, seductive world of the Library, but serving in its army is nothing like he envisioned. His life and the lives of those he cares for have been altered forever. His best friend is lost, and Morgan, the girl he loves, is locked away in the Iron Tower and doomed to a life apart. Embarking on a mission to save one of their own, Jess and his band of allies make one wrong move and suddenly find themselves hunted by the Library's deadly automata and forced to flee Alexandria, all the way to London. But Jess's home isn't safe anymore. The Welsh army is coming, London is burning, and soon, Jess must choose between his friends, his family, or the Library willing to sacrifice anything and anyone in the search for ultimate control.
Characteristics: 1 online resource (11 hr., 5 min.)
Additional Contributors: Elfer, Julian - Narrator
Read more reviews of Paper and Fire at iDreamBooks.com
Conrad, Roxanne
JUVENILE FICTION / Action & Adventure / General.
Juvenile Fiction.
Audiobooks.
|
cc/2019-30/en_middle_0056.json.gz/line12612
|
__label__wiki
| 0.757591
| 0.757591
|
Author: Kevin Leathers
Kevin Leathers hasn't written a profile yet. That's ruddy mysterious...
Naruto Shippuden Box Set 3
Old habits can be hard to stop. Naruto has just such a habit of stringing things along for far longer than it should. We’ve all been there for the ten episode fights, and with Box Set 2 there was a danger of the series falling back into its old ways. Can this newest box set stop a recurring trend from rearing its ugly head again?
The battle with Sakura and Chiyo against Sasori finally comes to an end. While Team Guy also bring their fight to its conclusion Naruto and Kakashi continue to confront Deidara, but with Naruto losing control will their victory come at a price?
This DVD set brings the first season of Naruto Shippuden to an end and without wasting any time we head straight into the next season. The first disc contains quite a mixture of drama, action and some scenes that will tug at the heart strings. If anything the opening episodes end one of the more epic battles of the series we’ve had so far before getting straight into the next batch of episodes.
Sakura and Chiyo’s battle is properly the most heart-felt, with Sasori coming across as a more tragic character, while looking at the past link between him and Chiyo does bring a little more emotion to the proceedings. The other battles are your standard fare with the psycho bomber Deidara and the attack of the clones with Team Guy. While these scraps are quite action-packed, they are also exactly what you’d expect from Naruto.
Even better, we have a new character added to the character roster. This character seems to be more of a replacement for the now missing in action Sasuke however - In fact their personality is pretty much the same as Sasuke's, just with a different character design. At the moment there isn’t much to give the new character a status among the group other than just acting as Sasuke’s replacement, but hopefully that will improve as the series continues.
For the Naruto fans Box Set 3 is an improvement over the lull of the previous disc collection, with storylines being wrapped up and the introduction of new and interesting elements to the already established canon. Things are moving at a brisk pace and apart from the odd episode that seems to feel the need to lace itself with comedy after a set of serious episodes, it seems like Naruto is back on form.
The usual array of uninspiring extras with production artwork, trailers and English and Japanese language dubs.
Improvements in pacing and characterisation make this a much better offering over the previous effort.
|
cc/2019-30/en_middle_0056.json.gz/line12615
|
__label__wiki
| 0.663464
| 0.663464
|
Home World Swine fever: How is Asia coping with the outbreak?
Swine fever: How is Asia coping with the outbreak?
Image caption African swine fever is affecting countries where pork is a major part of people’s diet
Countries across Asia are struggling to contain an outbreak of swine fever. It is threatening the livelihoods of millions of families that rely on pig farming.
The highly contagious and incurable virus is deadly to pigs but not dangerous to humans.
The disease originally spread from Africa to Europe and is now affecting several Asian countries, where pork features heavily in the diet.
It’s raising particular concern in China which has half the world’s pigs.
Reality Check looks at the measures being taken to contain the disease.
Image caption The swine fever outbreak has already led to rising pork prices in China
The virus can be spread by direct contact with infected pigs and wild boars, through infected animal feed and on clothing and farm equipment.
Outbreaks have been reported in China, North Korea, Laos, Mongolia, Vietnam and Cambodia where tens of millions of households are involved in pig farming.
The UN expects the disease to carry on spreading because many small farms lack the funds or expertise to protect their herds. There is no way of treating infected animals.
Millions of pigs are being culled in a desperate attempt to halt the disease, according to the latest UN figures.
1.1 million in China
2.6 million in Vietnam
3,115 in Mongolia
2,400 in Cambodia
China first to declare outbreak
China reported a swine fever outbreak in August 2018 and since then, the virus has spread to almost all parts of the country, says Martin Yip, of the BBC Chinese service.
Authorities moved to cull pigs and shut down live meat markets after confirmed outbreaks, as well as banning farmers from feeding their animals with human food leftovers. This is a common practice for small-scale domestic pig owners which risks spreading the disease.
China has been praised by Dr Monique Eloit, the head of World Organisation for Animal Health (OIE), for its effort to combat swine fever.
However, some people suspect the scale of the outbreak has been under-reported.
Many people in China rely heavily on pork, and the economic consequences could be devastating for farmers.
Pork prices rose by 29.3% in the year to May, according to government figures, and could rise even higher.
Spread across Vietnam
In February 2019, Vietnam became the third Asian country, after China and Mongolia, to report the outbreak, says Quynh Le, of the BBC’s Vietnamese service.
As of 17 June, the disease had spread to 58 out of 63 cities and provinces. The government warns that the outbreak poses the biggest challenge yet to the country’s livestock industry.
In March, the prime minister banned the transportation, trade, slaughtering, and consumption of pig and pork products suspected of being smuggled into the country.
Famers have been promised compensation for culled pigs worth a minimum of 80% of the market price.
The outbreak has remained severe in spite of government efforts.
It is projected that pork production in Vietnam will fall by at least 10% this year.
Image caption More than 2 million pigs have been culled in Vietnam
Precautionary measures for South Korea
North Korea reported an outbreak of African swine fever to the World Organisation for Animal Health at the end of May, says Hyung Eun Kim of the BBC Korean service.
South Korea offered quarantine and medical assistance to the North, but officials say they’ve had no response.
However, North Korean state media has been warning people about the disease since the end of 2018, says Jo Chung Hee, a North Korean defector who used to work in the country’s agriculture department.
South Korea is taking measures to prevent the disease from entering the country. These include a ban on using food waste to feed livestock.
Image caption South Korea has introduced measures to prevent African swine fever entering the country
The South Korean military has been authorised to kill any wild boars seen crossing the zone which separates North and South Korea.
It’s unlikely that infected boars would be able to cross this heavily fortified and mined region. But the South Korean prime minister has visited the area several times to raise awareness of the disease.
Read more from Reality Check
Previous articleCapturing the art and beauty of memorials
Next article‘This synopsis arrived full of our work’
Volodymyr Zelensky: Why Ukraine’s new president needs second election win
Trump tweet row: Don’t take the bait, congresswomen say
Russia: Fire kills 14 sailors aboard navy research submersible
|
cc/2019-30/en_middle_0056.json.gz/line12616
|
__label__wiki
| 0.966605
| 0.966605
|
British government to seek appeal after Saudi arms ruling
Reuters - UK Focus 20 June 2019
LONDON, June 20 (Reuters) - The British government will to seek permission to appeal after a court ruled its approach to Saudi arms export licences was unlawful, the Department for Trade said on Thursday.
"This judgement is not about whether the decisions themselves were right or wrong, but whether the process in reaching those decisions was correct," a spokeswoman for the department said in a statement.
"We disagree with the judgment and will be seeking permission to appeal." (Reporting by Alistair Smout; editing by Stephen Addison)
|
cc/2019-30/en_middle_0056.json.gz/line12617
|
__label__cc
| 0.734627
| 0.265373
|
Home » Counselling FAQ's
How do I make an appointment?
You can make contact with the counselling service during drop-in hours, 10-11a.m., and 2-3p.m., Room CM073. Please note, intake forms must be filled out no later than 10 minutes prior to the end of drop-in. At this exploratory interview you will talk to an assistant psychologist to decide the best way forward. Some find this exploratory session sufficient on its own; others will want ongoing individual counselling, a group, or referral to other help. The Service gets very busy, especially during term and so we often have to operate a waiting list for ongoing counselling. However, every effort will be made to see you as soon as possible.
In the event that a student is not able to attend for a scheduled appointment it is his/her responsibility to notify the service at least 24 hours in advance, so as that time-slot can be allocated to somebody else. You can contact Marion.kinsella@ul.ie or phone 061-202327 if you need to cancel your appointment.
Students will be allocated an appointment with the first available counsellor. Student requests to attend individual counsellors cannot be catered for. Specific requests to see a counsellor of a particular gender will be considered on merit.
What happens in counseling?
Counselling is not the same as giving advice. Rather, a counselor seeks to help you to focus on and understand more clearly the issues that concern you. By respecting your own values, choices and lifestyle, the counsellor can work together with you towards making choices or changes that are right for you. Counselling is not any one thing but is adapted by the counselor to fit the needs of the student. Counselling is basically about a relationship with another person who is skilled and has expertise in dealing with the difficulties encountered by students. This relationship is will be one of support and advice, education and challenge, warmth and empathy. It will normally be on a weekly or fortnightly basis, for as long as both counselor and student consider necessary. Each session normally lasts up to 50 minutes and takes place in a comfortable and private setting.
The first meeting will consist of a detailed assessment and evaluation of the situation presented by the student. Here, also, the Counsellor will explain about the nature of the work and what the student might expect. Goals and objectives of counselling will be established at this point.
Most people are seen individually, but group counselling can also be offered when appropriate.
What sort of problems can be helped with counselling?
Most personal, relationship or identity problems can be helped through counselling - this includes anxiety, stress and depression, family and/or relationship difficulties, sexual problems or identity issues. It also includes talking over adjusting to a new culture, or dealing with dilemmas or difficult decisions, and well as more specific problems, such as addictions or eating problems.
Counselling aims to address all problems of psychological survival and coping, whether seemingly major or minor. Oftentimes students will say that they didn't think their problem was serious enough for counseling and that they didn't want to be wasting the Counsellors time. Talking to somebody at this stage, before things have escalated is often the best and is to be encouraged. Don't wait until a problem has grown very serious - we would much rather you came when something is relatively minor, so that it can be resolved more quickly.
Approximately 1200 students avail of the service annually.
What if more help is needed than the Service can provide?
If it is appropriate, referrals can be made to a variety of psychological, therapeutic or psychiatric services in the community. Your counsellor would discuss this with you if this seems the best way forward.
All students should be registered with a G.P. and it is often helpful if you inform him or her that you are seeing a counselor at the University
Is there an emergency service?
When a matter is a genuine emergency, we will arrange for you to see a counsellor quickly so please do not feel that the service is too busy to see you when something is urgent. Emergencies will be given priority and will be seen at drop-in on the day.
Is the service confidential?
The service is confidential and operates within the terms of confidentiality as laid down by the Psychological Counsellors In Higher Education (P.C.H.E.I.) Code of Ethics and Practice. This means that your personal details are not disclosed to anyone outside of the service without your expressed permission, except in exceptional circumstances regarding safety including suicidal intent, sexual abuse and threats to lives of others.
We maintain case notes on all clients. These are stored on a password protected database, on a locked computer, in a locked office.
Click here for our terms and conditions
Please note, UL Éist do not:
- Provide certificates for attendance
- Extend assignment deadlines
- Give interviews for coursework
Please note, over the Summer months drop-in will be held from 2-3pm on Tuesdays and Thursdays only. Normal drop-in times will resume in September.
There is no need to make an appointment, simply call in during our drop-in hours.
During term-time
Drop In: 10a.m.-11a.m. & 2p.m.-3p.m. daily
Please note, intake forms must be filled out no later than 10 minutes prior to the end of drop-in.
Find Us: CM073, Main Building
Contact No: 061-202327
LGBT drop-in Counselling Service
Ger Hanley - Monday 5-7pm Email: gerard.hanley@ul.ie
Extra Support / Out of Hours Support
Out of Support Information Sheet
Follow Counselling on...
|
cc/2019-30/en_middle_0056.json.gz/line12619
|
__label__wiki
| 0.588455
| 0.588455
|
Guaranteed to operate - Jewish Israel Tours
12 day Jewish Heritage Israel…
Jewish Heritage Tours of Israel
Sapphire – 12 day Jewish Heritage Israel Tour
Fun-filled, 12 day Jewish Heritage Israel Tour. See 4000 years of Jewish history in a meaningful life changing 12 day Jewish heritage tour.
Program Included
Not Included In Program
Quick Inquiry Form
Itinerary – 12 day Jewish Heritage Israel Tour
Wednesday, Day 1: Arrive Israel, transfer to Tel Aviv
Welcome to Israel.
Arrive Ben Gurion Airport and met by a Trips Israel representative, immediately after passport control. Enjoy a short ride to the beautiful Mediterranean coast of Tel Aviv. Check-in at hotel and evening at leisure. Suggest a stroll along the ocean front promenade. In the evening, suggested dinner reservations at Itzik Hagadol Restaurant in Jaffa. Reservations can be made upon request.
Overnight in Tel Aviv.
Thursday, Day 2: Tel Aviv area – Independence Hall, Latrun, Beit Guvrin, Ayalon Institute
Following a delicious buffet breakfast, visits in Tel Aviv will include:
Independence Hall:
The Independence Hall Museum is situated on 16 Shderot Rothschil in the heart of Tel Aviv. It is the room where the birthplace of the State of Israel was declared and announced first in Hebrew. As one of the forerunners to the Historical Sites of the State of Israel, this house tells the story of the beginnings of the City of Tel-Aviv, Meir Dizengoff – the first Mayor of Tel-Aviv, and the famous ceremony which took place on May 14, 1948, as David Ben-Gurion declared the establishment of the State of Israel. Through audio-visual mediums come take part in the exciting moment in the birth of the State of Israel.
Latrun – Armored Corps:
Amored Corp, also know as Yad La-Shiryon in Hebrew is Israel’s official memorial site for fallen soldiers from the armored corps. It is also one of the most diverse tank museums in the world. The museum was founded on December 14, 1982, through the initiative of veteran officers of the armored corps. See 110 tanks and other armored fighting vehicles, (both Israeli and captured enemy examples), Merkava tank and the T-72 tanks. There are also vehicles purchased from allied nations specifically for diversifying the collection.
Beit Guvrin national park:
Located 13 kilometers from Kiryat Gat, encompassing the ruins of Maresha, one of the important towns of Judah during the time of the First Temple, and Beit Guvrin, an important town in the Roman era, when it was known as Eleutheropolis. It is declared by UNESCO as a world heritage site. Archaeological artifacts include a large Jewish cemetery, a Roman-Byzantine amphitheater, a Byzantine church, public baths, mosaics and burial caves.
Ayalon Institute:
Ayalon Institute is located about 30 minutes south of Tel Aviv. It was used as a secret ammunition factory disguised as part of a kibbutz to fool the British back in the 1940s. Jewish people used the factory in their efforts to fight for the independent state of Israel. Between 1945 and 1948, the Ayalon Institute produced more than 2 million 9mm bullets.
Afternoon/Evening:
In the evening, suggested dinner reservations at Manta Ray Restaurant in Tel Aviv (by the beach).
Overnight in Tel-Aviv.
Friday, Day 3: Tel Aviv and surrounding
After breakfast at hotel, visits will include:
Diaspora Museum:
Also known as “Beit Hatfusot”, located in Tel Aviv’s University. It is a museum for Jewish genealogy, which tells the ongoing and extraordinary story of the Jewish people throughout the centuries. The museum connects Jews and their roots and strengthens their personal and collective Jewish identity.
Business and entertainment districts:
Also known as the “White City”, refers to a collection of over 4,000 Bauhaus style buildings built in the 1930s by a German Jewish architects who immigrated to the British Mandate after the rise of the Nazis. In 2003, the United Nations Educational, Scientific and Cultural Organization (UNESCO) proclaimed Tel Aviv’s White City a World Cultural Heritage site, as “an outstanding example of new town planning and architecture in the early 20th century.
Rabin Square:
Formerly known as Kings of Israel Square; is a large public city square in the center of Tel Aviv, Israel. It has become the center for numerous political rallies, parades, and other public events. In 1995, the square was renamed to Rabin Square after the assassination of late Prime Minister of Israel Itzhak Rabin, which occurred in the square.
Old Jaffa:
Jaffa’s port is considered to be 8,000 years old and probably the oldest port in the world. Visit will include the ancient ruins and the Artist Quarter.
Neve Tzedek:
Build in 1987, the avant-garde design with many stores, fashion boutiques and handicraft shops has its own unique pizzazz in the center of Tel Aviv. It also is visited by the weekly farmers’ market in HaTachana, a restored railway station. Trendy European restaurants sit alongside stylish bistros, and many of the area’s al fresco cafes turn into live jazz bars and cocktail lounges at night. The Suzanne Dellal Center showcases contemporary dance, while surfers head to beaches nearby.
Nachalat Binyamin:
An outdoor mall surrounded by historical buildings, with strict preservation process and now can be seen in their original beautiful historical design. Nachalat Binyami’s art fair is open twice weekly and has very unique artist flavor to it. See the hand made designs and creation, as well as the street performances, live music and coffee shops all of that makes the art fair a must see.
Sheinkin Street:
A lively colorful street adjacent to Nachalat Binyamin with unique shops, cafe’s, bistros with its youthful ambiance.
In the evening, suggested dinner reservations at Benny Hadayag Restaurant.
Saturday, Day 4: Tel Aviv at leisure
Enjoy breakfast at hotel, enjoy Shabbat (Saturday) day at leisure.
Evening at leisure.
Sunday, Day 5: Journey north
Breakfast, followed by check-out from hotel. Drive north along the Mediterranean Sea towards Haifa. Visits on the way will include:
Built by Herod and once the capital of Judea. It was once the roman capital of the region. Visit the Roman Theater, once used for many performances throughout the centuries. Today it still draws huge crowds for concerts and festivals. View the aqueduct, once used for conveying water to the city.
Haifa/Mt. Carmel:
Ascend Mt. Carmel to view a beautiful panoramic view of Haifa Bay and the Botanical Gardens below. Here In the bible, it also mentions Elijah, who fought the 400 false prophets of Baal. Continue to Clandestine Immigration and Naval museum (“Af al Pi Chen”) and hear the story of the illegal immigrants to Israel at the time of the British mandate.
Akko – Acre:
See its underground passages and secret rooms. Akko, was once occupied by many nations. Walk along the old harbor and local market. Visit the prison where members of the Hagana and Irgun were held captive during Israel’s fight for independence. The old City is recognized by UNESCO as world heritage site. This is also where they filmed Leon Uris’s famous novel “Exodus”.
Rosh Hanikra:
Located at the most northern point of Israel. Israel shares the border with Lebanon. See the incredible panoramic view of the Mediterranean Sea. Descend by cable car to see the limestone Grottoes created by the Mediterranean Sea with its spectacular formation.
Conclude the day with a drive through the hills of the Galilee for check-in at Kibbutz Lavi hotel, followed by a relaxing kibbutz dinner.
Overnight in the Galilee.
Monday, Day 6: Safed, Golan Heights, Galilee
Breakfast at hotel followed by the following visits:
Safed (Tzfat):
Also know as the mystical city of Safed, it is considered to be one of the Four Holy cities according to tradition and the birth place of kabala. Safed is located at an elevation of 900 meters (2,953 ft). It is the highest city in the Galilee and in Israel. Due to its high elevation, Safed experiences warm summers and cold, often snowy, winters. Safed is built with narrow winding alleys. Visits in Safed include: Joseph Caro and the Ari synagogues, the most important synagogues in the city. See the creative workshops and galleries found in the flourishing artist’s quarter.
Golan Heights:
Visits will include:
Jeep tour of the Golan Heights
Gadot overlook, the memorial for the fallen of the Golan, located over former Syrian bunkers
The destroyed Syrian city of Kuneitra
Tel-Hai to see the “Roaring Lion” monument and learn about the heroic battle of Josef Trumpeldor and his comrades in 1920.
Meet with a Kibbutz member and learn about their unique lifestyle.
Enjoy another relaxing dinner at our hotel.
Tuesday, Day 7: Journey to Jerusalem
After breakfast, leave the Galilee region and drive south towards Jerusalem. Visits will include:
Rambam’s grave:
Also known as The Tomb of Maimonides, it is located in Tiberias. Rabbi Moses ben Maimon, known as the Rambam (acronym for Moses ben Maimon) or Maimonides, lived in 12th century Egypt, where he was a great halachic (Jewish law) authority. Rambam died in Egypt, but later moved to Rambam’s resting place in central Tiberias, on the western shore of the Sea of Galilee.
Beit Shean “Scythopolis”
Located in the Northern District of Israel. Beit Shean played a significant role in Jewish history, due to its geographical location in conjunction with the Jordan River and the Jezreel Valley. Its excavated is one of the largest ongoing archaeological digs in the land of Israel. Visit the amphitheater, colonnaded Roman streets, mosaics and Roman bathhouses (1st Samuel 31:10).
Beit Alpha:
See the remains of the mosaic floor of an ancient synagogue depicting the zodiac. At Beth Alpha synagogue was uncovered in 1928 by members of the nearby Kibbutz Hefzibah, who stumbled upon the synagogue’s extensive mosaic floors during irrigation construction.
Gan Hashlosha National Park:
Also know as Sachne, is a natural spring of warm water pools and waterfalls. Located between kibbutzim Beit Alfa and Nir David. It is also 10 minutes away from Mount Gilboa, where King Saul and his son Jonathan battled against the Philistines. The water is warm all year round for visitors to swim in.
Continue south through the lush Jordan Valley to Jerusalem. Arrive at Mt. Scopus for a beautiful panoramic view of Jerusalem and a traditional Sheyechyanu blessing for our arrival to this special city. Check in at hotel in Jerusalem and remainder of the evening at leisure. Suggested dinner reservations at Eucalyptus Restaurant.
Overnight in Jerusalem.
Wednesday, Day 8: Jerusalem: Old City
Another fabulous breakfast, visits today will includes:
Tomb of King David:
Located at Mount Zion, It is believed to be by some to be the burial place of King David. This tradition started in the 12th century.
Jewish Quarter (Old City):
Situated is the southeastern sector of the walled city. It stretches to the Zion Gate in the south and extends to the Western Wall and the Temple Mount in the east.
The Jewish quarter was reconstructed after the city was unified after the Six-Day War in 1967. A special point of interest in the restored Jewish Quarter is the “Cardo”, meaning the “heart” of this ancient Byzantine City. See the unearthed (main) Roman thoroughfare and the ancient marketplace lined with columns. Visit the four Sepharadic Synagogues restored after 1967.
Western Wall – Rabbinical Tunnels:
An incredible labyrinth of tunnels, arches, and passageways remained untouched for centuries. Inside, a most interesting model shows the different dwelling periods and history of the inhabitants of Jerusalem. Begin at the passageways descending through the many layers of Jerusalem’s past at the time of the Temple through the Rabbinical Tunnels. It is believed by many the 10 commandments and many other important artifacts are buried beneath the rebel from the Second Temple period.
Davidson Center:
Located inside the Southern Wall excavations, the Davidson Center Museum will let you grasp the importance of this site. The Southern Wall used to be the entrance to the temple mainly for foreigners, as well as locals alike. Inside, used to be a bridge that led the locals from City of David. They did not have to go through the rituals of Mikveh prior to entering the temple.
Old City Bazaar:
Extra vibrant and very colorful bazaar is just the beginning. The Old City bazaar is like no place anywhere.
Tower of David museum
Also known as the Jerusalem Citadel, it is located near the Jaffa Gate entrance. The museum tells the story of Jerusalem, detailing all major events from the second millennium BCE to Jerusalem of today.
Suggested dinner reservations at Charkra Restaurant.
Thursday, Day 9: Jerusalem: New City
Breakfast at hotel. Today, visits will include:
Bar Mitzvah at Western Wall “Kotel”:
Experience a Bar Mitzvah ceremony at the Kotel, a ritual conducted by an Orthodox Rabbi.
Mea Shearim:
A vibrant ultra orthodox neighborhood in the heart of Jerusalem. See a unique lifestyle and culture with many Judaica shops, restaurants and a very busy street.
Mt. Hertzel:
A cemetery for all of Israel’s falling soldiers, leaders and Prime Ministers.
Yad Vashem:
Israeli memorial (museum) commemorating the 6 million Jews who perished in the concentration camps in Europe by Nazi Germany. It is considered the biggest memorial for the Holocaust victims.
Ammunition Hill:
Ammunition Hill, also know as Givat Ha-Tachmoshet was the site of one of the fiercest battles of the Six-Day War. In 1967, the Jordanian military fortified a post in the northern part of Jordanian-ruled East Jerusalem and the western slope of Mount Scopus.
Knesset Menorah:
The Knesset is Israel’s parliament, since the creation of Israel. It officially opened in 1950, but was functioning withing the first year of Israel’s creation with several locations in Tel Aviv and Jerusalem. See the Menorah with the biblical emblems.
Israel Museum:
Shrine of the Book: Where the Dead Sea scrolls are housed and preserved. Most of the scrolls were found in the caves of Qumran by a Shepherd tending his sheep.
The scale model of the the Old City of Jerusalem at the peak of the 2nd Temple era. You can walk around the model and see the many structures with details of this amazing city.
In the evening, suggested dinner reservations at Tmol Shilshom Restaurant.
Friday, Day 10: Qumran, Masada and the Dead Sea
(Remember to bring your hats, swim suits, and suntan lotion!)
Early breakfast at hotel. Morning departure southeast through the Judean Wilderness towards the shores of the Dead Sea. Descend to the lowest point on earth at 1305 feet (398m) below sea level and arrive at the Shores of the Dead Sea. Visit at the Dead Sea will include:
Qumran:
Where the Dead Sea Scrolls were discovered by a young shepherd boy in the caves of Qumran.
Masada:
Ascend by cable car to the legendary mountaintop plateau of Masada. Here, the last stronghold of the Jewish Zealots struggled against the Romans. The Zealots held out for three years against the legions of Flavius Silva. They chose to die as free men at their own hands in preference to Roman slavery and torture.
Lunch and float at the Dead Sea:
The Dead Sea is the lowest point on earth. It is uniquely formulated in a small body of water (similar to a lake) and includes 11%-13% salt and other natural ingredients.
Arrive at the Dead Sea resort of Ein Bokek and enjoy a beautiful lunch on the shores of the Dead Sea. After lunch, relax at the shores of the Dead Sea, use the special Dead Sea mud, and or take advantage of the many facilities the hotel has to offer (weather permitting).
Drive back to our hotel in Jerusalem.
Saturday, Day 11: Jerusalem at leisure
Enjoy breakfast at hotel and Shabbat (Saturday) day at leisure.
Overnight in Jerusalem
Sunday, Day 12: Departure or extend
After breakfast, depending on flight times, check-out from hotel and transfer to Ben Gurion Airport.
Included – 12 day Jewish Heritage Israel Tour
12 days/11 nights accommodations:
4 nights in Tel Aviv
2 nights in The Galilee
5 nights in Jerusalem
Hotel taxes and service charges
Tours and guiding:
Touring as per the itinerary
Touring in a deluxe motor-coach with WIFI
A professional government licensed English speaking guide
Entrance fees to all sites and parks
Meet, assist and transfers:
Meet and assist at Ben Gurion Airport, immediately when airplane door opens
Transfer on a arrival from Ben Gurion Airport to hotel in Tel Aviv
Transfer on departure from hotel to Ben Gurion Airport
Israeli style buffet breakfast daily
2 dinners at hotels in the Galilee
1 lunch at the Dead Sea
Other services also included:
Jeep tour in the Galilee
Rabbinical tunnels at the Western Wall
Portfolio of travel documents
Maps, pens and luggage tags
The Mediterranean Coast
The Galilee, Golan and the Sea of Galilee
Jerusalem, including Old City
Judean Wilderness and the Dead Sea
Not Included – 12 day Jewish Heritage Israel Tour
International airfare to Israel
Lunch and dinner daily, other than those mentioned above
Travel insurance – based on age and total cost PER PERSON (see below costs):
The amount you want
to insure (package cost)
> $3,000.01 – $3,500 $122 $162 $186 $259 $351 $413 $534 $657
> $5,000.01 – $5,500 $208 $276 $299 $412 $563 $648 $867 $1,093
> $6,000.01 – $6,500 $265 $357 $375 $525 $688 $800 $1,085 $1,378
> $8,000.01 – $9,000 $355 $467 $480 $691 $902 $1,061 $1,431 $1,825
> $9,000.01 – $10,000 $381 $502 $518 $737 $981 $1,158 $1,537 $1,943
Please note: There will be a $7 administration fee added to the policy.
Upgrade to better rooms (if available)
VIP meet and assist at Ben Gurion Airport
Request a quote for international airfare
Cost – 12 day Jewish Heritage Israel Tour
HOTEL PLAN
Plan A – Deluxe (5 stars +)
Plan B – Deluxe (5 stars)
Plan C – Superior (4.5 stars)
Plan D – Moderate (3-4 stars)
Tel Aviv Dan Tel Aviv-Tel Aviv room Carlton Tel Aviv-Superior room Dan Panorama Prima City Tel Aviv
Galilee Kibbutz Lavi-Hadar wing Kibbutz Lavi-Hadar wing Kibbutz Lavi-Eden wing Kibbutz Lavi-Eden wing
Jerusalem King David-Jerusalem room David Citadel-Superior New City room Dan Panorama Prima Kings
Tours starting on Per person Per person 3rd person Per person Per person 3rd person Per person Per person 3rd person Per person Per person 3rd person
in Double in Single pays in Double in Single pays in Double in Single pays in Double in Single pays
2018 dates:
July 04 $3,535 $5,681 $2,090 $3,191 $5,051 $2,326 $2,546 $3,730 $1,587 $2,262 $3,192 $2,048
August 01 $3,535 $5,681 $2,090 $3,191 $5,051 $2,326 $2,546 $3,730 $1,587 $2,262 $3,192 $2,048
TOURS NOT OPERATING
October 03 $3,837 $6,290 $2,065 $3,283 $5,234 $2,509 $2,583 $3,807 $1,567 $2,232 $3,139 $2,027
November 07 $3,837 $6,290 $2,065 $3,283 $5,234 $2,509 $2,583 $3,807 $1,567 $2,232 $3,139 $2,027
December 05 $3,091 $4,806 $2,052 $3,064 $4,800 $2,314 $2,216 $3,075 $1,555 $2,195 $3,069 $1,998
December 12 $3,230 $5,084 $2,052 NOT AVAILABLE $2,342 $3,328 $1,725 $2,120 $2,935 $1,937
January 02 $2,960 $4,558 $2,052 $3,070 $4,812 $2,314 $2,279 $3,201 $1,555 $2,058 $2,821 $1,886
February 06 $2,960 $4,558 $2,052 $2,942 $4,556 $2,314 $2,216 $3,075 $1,555 $2,058 $2,821 $1,886
Child sharing room with parents, Bed and Breakfast basis
Dates Under 12 years of age Under 12 years of age Under 12 years of age Under 12 years of age
All departures $1,980 $1,530 $1,440 $1,620
Highlights – 12 day Jewish Heritage Israel Tour
Mediterranean Coast and surrounding area
Akko (Acre)
Rosh Hanikra
Galilee and surrounding regions
Safed
Tel Hai,
Beit Shean and Beit Alpha
Gan Hashlosha.
Jerusalem – Old City
The Old City of Jerusalem
David’s Tower Museum
Kotel and Rabbinical Tunnels,
Southern Wall and Davidson Center
Tel Aviv and surrounding area:
Independence Hall
Latrun
Beit Guvrin
Ayalon Institute
Diaspora museum
Rabin’s square
Neve Tzedek,
Nahalat Benyamin and Sheinkin St.
Jerusalem – New City
Mea Shearim
Mount Hertzel
Ammunition Hill
Knesset (parliament) and Menorah
Israel Museum
Dead Sea and surrounding regions:
Dead Sea Spa facility (resort hotel)
Quick inquiry form – 12 day Jewish Heritage Israel Tour
Guaranteed to operate almost every Wednesday
I need more information on*:
Jewish Heritage Tour 12 daysJewish Heritage Tour 15 daysJewish Heritage Tour 13 daysJewish Heritage Tour 10 daysPrivate Guided Tour requestGroup Tour request
Approximate date*:
Hotel Category*:
---Deluxe + (5 - 5.5 stars)Deluxe (4.5 - 5 stars)Superior (4 - 4.5 stars)Moderate (3.5 - 4 stars)Tourist (3 stars)Economy (2 stars)
---1234567891011-1516-2021-2526-5051-100
Brochure – 12 day Jewish Heritage Israel Tour
|
cc/2019-30/en_middle_0056.json.gz/line12620
|
__label__wiki
| 0.595327
| 0.595327
|
TV ReviewsPushing DaisiesSeason 2
Pushing Daisies: "Window Dressed To Kill"
Genevieve Koski
Pushing DaisiesSeason 2
"Window Dressed To Kill"
It’s been a long, drab, pie-less five and a half months, but it’s finally here: Our one last sugar-laced gasp of Pushing Daisies before it officially succumbs to cancellation. And we can only hope that the lovely “Window Dressed To Kill” was just the first entry of a perfect three-episode eulogy to our dearly departed Daisies.
Perhaps it was the Daisies withdrawal of the last half-year, but tonight’s episode felt like a pitch-perfect example of everything that makes this show special: It had heart, wit, dark humor, dialogue unlike anything else we’re likely to see on television anytime soon, and it was just all-around beautiful to look at. And Olive sang. What more could you want?
Well, perhaps a little more than one tossed-off line referencing the bomb that dropped at the end of the last episode, “The Norwegians”: Ned’s dad is still around, and he’s apparently playing guardian angel, cleaning up the whole Dwight Dixon mess. And perhaps a little hint as to the whereabouts of ol’ Corpseface—last I checked, Charles Charles is still at large, with at least one pretty big secret in his possession. With only two episodes to go, it seems unlikely that those two storylines are going to be wrapped up in a satisfying manner. But on the other hand, this reprieve from all the daddy drama allowed for a happy wallow in the best parts of the Daisies formula: a quirky, colorful murder mystery, a puppy-eyed love triangle (er, quadrangle), and some side shenanigans involving taxidermy and sneaky nuns.
First, some catch-up: After his “zippity zap nearly turned everything to crappity crap” in the last episode, Ned’s decided to embrace life as Clark Kent, hanging up his Superman cape to focus on baking pies (with fresh, non-rotten fruit) and holding gloved hands with Chuck. Olive, meanwhile, is obsessing over Ned’s cliffhanger admission that he “wouldn’t say [he] never” looked at Olive the way he looks at Chuck, studying up on the ins and outs of double negatives and recreating the moment by hanging from the Pie Hole’s cherry-shaped lighting fixtures. Emerson is left to puzzle out his latest mystery without the aid of Ned’s magic finger, though he begrudgingly accepts Chuck’s offer/demand to be his sidekick, or “alive-again avenger,” and the two set off on this week’s mystery.
And thus sets in motion the best character-pairing scheme on the show, last seen in “Comfort Food”: Ned/Olive and Emerson/Chuck. Quite frankly, Olive and Emerson are going to be great no matter what situation they’re placed in, but Ned and Chuck work so much better apart than together. It’s just easier to empathize with their romantic struggles when they’re not puking up love all over each other’s faces. We need a little tension to balance out all the aw-shucksery, and the best way to do that is to place them in separate scenarios that serve to cast doubt on their relationship.
And Chuck had a valid reason to fret tonight as Ned and Olive made a “romantic run to the border” to aid and abet escaped criminals Jerry Holmes and Buster Bustamante. As we learn in the prologue, after rotting away in jail for “kidnapping” young Olive, Jerry and Buster have escaped and are on a mission to find our favorite singing waitress. Bum-bum-buuuummmm. Of course, as is so often the case with Daisies, that sneaky narrator was misleading us the whole time: Turns out that “kidnapping” tragedy was more of a comedy of errors, as the precocious, neglected 9-year-old Olive inadvertently tricked a couple of good-hearted petty criminals into absconding with her, resulting in the best two days of all their lives. Though her mean ol’ parents made sure Jerry and Buster got locked up, Olive maintained a letter-writing relationship with her substitute father figures while they were incarcerated. Naturally, they go to her to help them escape over the border, with the help of the fiancé she told them all about in her letters—Ned. Whoops. Ever the good guy, Ned plays along—a little too well—much to the chagrin of accidental co-conspirator Randy Mann (David Arquette), who has returned to bashfully woo Olive.
The five of them set off on a road trip that quickly detours to the aunts’ house, which leads to a heartbreaking conversation between a confused Olive and a misinformed Vivian (“You and Ned are my tortilla!”). Emboldened, Olive basically tells Ned it’s time to put up or shut up, and his weak explanation—“I’ve been curious about having a normal relationship. This one’s been really interesting to try on.”—cinches it: Try-on time’s over, Ned. Hallelujah. Now Olive can focus on someone who loves all 59 inches of her: Randy Mann. It’s about time our girl gets some love… that is, if Ned’s newly discovered jealousy doesn’t muck things up.
Meanwhile, over in gumshoe land, we’re treated to one of the most colorful mysteries in recent Daisies memory, as Chuck and Emerson dive into the drama and high-stakes intrigue of department-store window-dressers. Despite the pileup of red herrings and diversionary tactics, it was wasn’t too tough to put together that store owner Dick Dicker (Willie Garson) was behind the murders, but it was a delight getting there, from the surreal crime-scene tableaus to the cult of devotees mourning their design goddesses to classic Emerson quips like, “Coco went loco fo sho… co.” Of course, despite the sleuthing of Chuck and Emerson, it was Ned’s decision to put his cape back on and get back in the dead-waking game—inspired by his heroics at the aunts’ house, waking a dead rhino in Randy’s taxidermy van to create a diversion and allow Jerry and Buster to escape—that ultimately led them to the real culprit. And thus things are pretty much back to “normal” in C’oeur de C’oeur. Except for Ned’s mysterious lurking father. And ol’ Corpseface. And the new Ned-Olive-Randy love triangle. Okay, there’s still a lot to cover in just two episodes. Just two more episodes. Sigh. I think I need some of the aunts’ anti-depressant-laced pie.
Stray Observations:
• “If there’s anything you’d like to say to me, now would be the time. And if you could speak in the declarative only, using affirmative or comparative modifiers…” Grammar humor!
• “What do we say about the past?” “It makes an ass of you and me!”
• “The only thing that smokes in this house is the gouda.”
• “We need to back off on the PDA ’cause Vivian’s Ps and Qs have gone AWOL and I can’t take much more of what I took before I’m DOA” “Olive, use your words”
• “You try on your best friend’s bra and smile on the inside because yours are bigger and better.”
• Olive clearly dominated the quotables tonight, but Chuck had a couple of great moments too, specifically when she started a ruckus among the window-display devotees to trick them into hiring Emerson, and her adorable delivery of the line, “Ned, you’re touching dead things again?”
• Do we think Randy Mann’s going to stick around through the end? I like him and Olive together, but I still wonder what could have been between her and Alfredo.
• That was some serious pie-porn in the second scene. I’m dying for a slice of “Kick Me In The Kumquat,” “Rock Me Amade-Quince,” or “Pearway To Heaven.”
• I know the final three episodes have already aired overseas and are readily available for download. If you've already watched through the end, please avoid spoilers in the comments for those of us who wish to follow along in real-time.
Recent from Genevieve Koski
Sailor Moon Crystal: “Act 1: Usagi - Sailor Moon”
How Sailor Moon was sanitized—and made much less interesting
The Americans: “Echo”
|
cc/2019-30/en_middle_0056.json.gz/line12626
|
__label__wiki
| 0.964704
| 0.964704
|
New fall season: CW's Ringer a splashy double dip for Gellar
Sarah Michelle Gellar doubles down in return to prime-time. CW photo
Premiering: Tuesday, Sept. 13th at 8 p.m. (central) on The CW
Starring: Sarah Michelle Gellar, Nestor Carbonell, Kristofer Polaha, Ioan Gruffudd, Tara Summers
Produced by: Pam Veasey, Peter Traugott, Richard Shepard
Three networks have a hand in Sarah Michelle Gellar's new dual identity drama.
The pilot episode came from ABC Studios, although CBS is where it almost landed. But all concerned eventually deemed Ringer a better fit for CBS' kid sis sibling, The CW. Or so the story goes.
Gellar's return to prime-time, after leaving Buffy the Vampire Slayer behind eight seasons ago, qualifies as li'l CW's biggest fall season event since its 2006 launch as an amalgamation of The WB and UPN. She's a ripened 34 now, putting her at the far north extremity of CW's prime target audience of females 18 to 34. But Gellar's not quite grizzled yet. Nor is she a frisky kid anymore in what comes off as CW's most grown-up series of the fall season, both new and returning.
Gellar is first seen in jeopardy, hiding and then on the run from a masked man with a tire iron. Then comes a mini-flashback to "Nine Days Earler" in Rock Springs, Wyoming, where her Bridget Cafferty is a recovering addict, former stripper and star witness to a murder.
She's scheduled to testify, with FBI agent Victor Machado (Nestor Carbonell attempting to navigate a Lost afterlife) dutifully hovering and promising to protect her. But a night in the Double Nickel Motel apparently convinces Bridget that there might be better things in life. So she's off to New York in hopes of rekindling a relationship with twin sister Siobhan Martin (Gellar), who's a wealthy, unhappily married schemer.
The plot twists are plentiful in Tuesday's opening hour, with Bridget quickly awash in the apparent drowning death of the sister she's just re-met while a pregnancy, an infidelity and a bratty teen stepdaughter are also stirred in. There are no otherworldly creatures, though, because CW already has those covered in Supernatural, The Vampire Diaries, America's Next Top Model and another newcomer, The Secret Circle.
Siobhan's husband, Andrew, who now in effect is the masquerading Bridget's spouse as well, is played by Britisher Ioan Gruffudd. His name might have been changed to something like Cliff Diver back in Hollywood's old days. There's also Siobhan's best friend, Gemma (snappily played by Tara Summers) and her philandering husband, Henry (Kristofer Polaha on the rebound from CW's relatively short-lived Life Unexpected).
Gellar shares the same frame with Gellar in a few early scenes. The camera trickery is fairly impressive, but her acting tends to be more than a bit sedate. It's as though both characters are still on mood depressants no matter what startling revelations befall them. Still, the developments move along briskly and pretty unpredictably, giving Ringer a lot of balls in the air by the end of its first hour.
The marquee star of the show has become a mom (her marriage to actor Freddie Prinze Jr. endures) who's acted sparingly since Buffy ran its course. Ringer gives Gellar a full-immersion opportunity to re-tune her skills and put some extra bounce into both characters. Tuesday's premiere certainly has enough intrigue for starters. What it needs is more overall electricity.
|
cc/2019-30/en_middle_0056.json.gz/line12627
|
__label__wiki
| 0.976936
| 0.976936
|
GOP governors critical of Trump are the nation's two most popular governors
By Aris Folley - 07/25/18 05:28 PM EDT
Two GOP governors who have a history of being critical of President Trump Donald John TrumpCNN's Camerota clashes with Trump's immigration head over president's tweet LA Times editorial board labels Trump 'Bigot-in-Chief' Trump complains of 'fake polls' after surveys show him trailing multiple Democratic candidates MORE are the most popular governors in the United States, according to a new poll.
Blue-state Republican Gov. Charlie Baker is currently ranked in first place on the Morning Consult poll released on Wednesday with 69 percent of registered voters in his state of Massachusetts voicing support for him.
And Maryland Gov. Larry Hogan (R, who also serves in a blue state, is ranked a close second with 68 percent of his state’s registered voters’ support.
Both Republican governors have a history of breaking with the Trump administration.
Last month, Baker canceled the deployment of his state's National Guard troops to the border in protest of Trump's "zero tolerance" policy that separated families entering the U.S.
The Massachusetts governor also captured headlines in April after skipping a major GOP fundraiser in Boston featuring Vice President Pence, a move Massachusetts Republicans saw as an effort to distance himself from the Trump administration ahead of his reelection campaign.
Baker has also been public in the past about not voting for the president in the 2016 election.
Hogan also sought to distance himself from Trump in the wake of his controversial immigration policy in June, recalling a National Guard helicopter and four crew members from New Mexico due to the hundreds of separated migrant families at the southern border prompted by the policy.
Hogan also criticized Trump’s comments after last year's deadly protest in Charlottesville, Va., when Trump blamed both sides for the violence, saying he made “a terrible mistake,” according to The Baltimore Sun.
He also ripped Trump in March after the president responded to school shootings with a call to give guns to teachers, saying: "I don’t think we should be handing out guns to drama teachers and biology teachers."
|
cc/2019-30/en_middle_0056.json.gz/line12639
|
__label__wiki
| 0.515021
| 0.515021
|
The event was a big hit for international students, according to MoveU organizers.
Students skate on artificial ice surface
715 students participated in MoveU’s annual “glice” rink event, which promoted healthy living
Mylene Kassandra Hangdaan
Mahmoud Sarouji
With handmade cutout snowflakes adorning the walls, festive music playing in the background, and a synthetic skating rink made from a high-tech plastic polymer as the main attraction, Gym C was transformed into a fun “hang-out” spot for UTM students last week.
Transforming Gym C was not an easy feat; it was made possible by the hard work of MoveU crewmembers, coordinators, and volunteers. The assembling of the synthetic ice rink and the laying-out of the black mats surrounding the perimeter took around an hour and a half. Following this, the decorations, such as the layout of the tables and chairs, took another half-hour to finish.
Held last Friday from 11 a.m. to 6 p.m., the Glice Rink drew 715 participants—a 14 percent increase from last year’s 626-participant turnout.
Maryanne Aliazon, a MoveU crew team leader, noted that this year’s Glice Rink (an event first held in 2012) differed in that there was a craft-making station, hot chocolate station, and movie station—Frozen was the featured film.
With free ice skates and gloves provided, the event was highly accessible to the student population. One attendee, Usman Kazmi, a first-year commerce student, attended with a group of friends. “I came here to have fun and would go again next year,” he said.
Aliazon observed that an average of 40 students dropped by every 20 minutes.
“The goal of the event, like all MoveU events, is to promote healthy active living. With the ice rink in particular, we hope to get people excited about being active during the winter months, when we all tend to become more sedentary. Being regularly active can help fight off those winter blues and help students feel and function better,” said Chad Jankowski, a health education coordinator and an organizer of the Glice Rink event.
The event certainly achieved its goal, with groups of students skating for hours on end and enjoying the refreshments set up on the side. Students also benefited from the therapeutic nature of the event, with Andy Tan, a second-year CCIT student, claiming that the event helped improve his mental wellbeing.
“The event was not only enjoyable, but it also helped me take my mind off the upcoming weeks of exam stress,” he said.
With such a high turnout this year, the Glice Rink event hopes to make a return in the years to come.
Glice Rink
moveu
RAWC Gym C
A&E Editor (2017/18)
Editor-in-Chief (2018/19)
Moving into a healthy active lifestyle
Lacing them up at UTM
Have a jolly month off with no assignments
UTM gets active with MoveU
|
cc/2019-30/en_middle_0056.json.gz/line12641
|
__label__wiki
| 0.856319
| 0.856319
|
Afrosonic
Western Saharan Harshness: Listening To Sahrawi Music With New Ears
Eddy Frankel , April 13th, 2012 07:49
Eddy Frankel looks at the reasons why Sahrawi music remains unexplored territory for most westerners
Sahrawi Music isn't easy on Western ears. The microtonality of the melodies is unfamiliar, the rhythms are complicated and repetitive, the instrumentation is harsh, and the wailing vocal lines are relentlessly fierce. The songs themselves are intangible and slippery, there are no verses or choruses, no easy to define structure for us to cling on to and absorb. In terms of its sonic construction, it's almost as if Sahrawi Music was never really intended for our safe and delicate Western sensibilities.
Which probably explains why it's so overwhelmingly fascinating. It's unique in the “World Music” universe for remaining difficult to commercialise. The bulk of the African music that labels bring over to Europe and America is safe, sometimes even westernised, and usually face-meltingly dull. But few Mauritanian or Western Saharan musicians have made an impact in Europe and America, only Dimi Mint Abba and Mariem Hassan have ever really been embraced by the WOMAD crowd, and even their success wasn't massive. Recent years, however, have seen an emergence in interest in Sahrawi guitar music – an interest fostered almost exclusively by the Sublime Frequencies record label and their Sahrawi bands – Group Doueh and Group Inerane.
Sublime Frequencies have been responsible for presenting Sahrawi music in its purest form for the first time. Doueh and Inerane's releases are raw, vital, lo-fidelity documents of music that is truly a product of its environment. “I think the rawness factor with both bands means they will never be commercial products,” says Hisham Mayet, who runs Sublime Frequencies along with Alan Bishop, and is responsible for the Saharan contingent of the label. This rawness draws Doueh and Inerane – maybe even Sahrawi music as a whole – closer to currents in the underground of Western music than the mainstream. “Both bands have been embraced by the DIY underground and given a relevance that would never happen with the 'World Music' machine and its lack of aesthetics,” says Mayet. World Music strives to make difficult music palatable, and, most importantly, commercially viable. With Sahrawi music, the irony is that by removing artists from their environment and recording them in Western studios with Western producers, the sense of place that is the very essence of the music is almost always lost.
Dimi Mint Abba was a Mauritanian singer who died after an on-stage accident in Morocco in June 2011. She was a huge star across the Arab world and gained popularity with the WOMAD crowd thanks to producer and founder of World Circuit Records, Nick Gold. Her recorded output was minimal, with her main release – Moorish Music From Mauritania – coming thanks to World Circuit, who brought her over to record at London's Livingstone Recording Studios with her husband, Khalifa Ould Eide. The album is powerful, hypnotic and steeped in tradition. But something about it feels almost a little off, as if you're looking at a photograph through someone else's eyes. The following is the track Ishteeb Lagatri off her World Circuit album, her singing comes in after about 3 minutes:
Compare that to this recording of her performing live for Mauritianian national TV:
The live TV appearance is undeniably harder to listen to than the World Circuit release, but not only because of the actual quality of the audio. The instrumentation is distinctly fiercer, the microtonalities of the keyboard and 15 notes-per-octave guitar are more obvious, and the performance is way harsher. This isn't some tucked-away experimental B-Side, this is live on Mauritanian national TV – this is what the music was intended to be. This is – quite simply - how Dimi's music sounded. It's not a one off either, the internet is filled with videos of her on Mauritanian and Moroccan TV sounding just like this. Similarly, Group Bombino came to international attention as the second volume of Sublime Frequencies' Guitars From Agadez series, but have since gone on to record for another label. Hisham Mayet argues that his label's release “is legendary for the incendiary performance. When [Bombino's] new label brought him to the studio, all of the hunger, sand and heat were sanitised for a commercial sound”. With Sublime Frequencies, there's a sense of record producer/label acting as documentarian – a concept that has helped their releases come to popular attention amongst listeners that may never have otherwise explored non-Western music.
The idea that the essence of music is harmed when it is removed from its origins also applies to Western music. Music is often tied to its environment. Grime lost its vitality and purpose when it was polished and removed from the bedrooms of East and South London kids; and how many punk bands' demos are better than the albums they made for bigger labels? It's not necessarily a criticism – grime didn't get worse, it just became something different – music just changes when it's removed from its environment, and the world music industry often strives to uproot non-Western music and make it palatable. But sometimes, music from places like Mauritania and Western Sahara is just harsh; Dimi Mint Abba was the most popular artist in Mauritanian history, she was the mainstream.
That's part of what's incredible about Sahrawi music; Doueh, Inerane, Bombino and Dimi Mint Abba are just the tip of a very big Saharan iceberg. Scouring the internet for Sahrawi artists, you begin to get the sense that there is a huge amount of incredible music coming out of that vast chunk of the desert. Hisham Mayet says: “There is amazing music all over the area and countless bands.” Al Marjan are just one of those bands. With dreamy synth textures along with the usual guitar, drums and vocals, Al Marjan also have something of the poppier influences that have helped to make Group Doueh such a success.
Nojoum Assa come across as a little more traditional sounding than Al Marjan, but with a similar instrumental set up. These videos are proof of the incredible wealth of music the region has to offer. Even cursory internet searches yield a huge amount of bands just as good as these.
At the root of Western Saharan music, and its culture in general, lies a struggle. Not simply a struggle for independence, but a struggle for recognition as an actual country and an independent people. With the withdrawal of Spain as the region's colonial power in the mid-1970s, responsibility for the territory was split between its neighbours to the north and south; Mauritania and Morocco. A rebel group called the Polisario Front emerged seeking national liberation and the establishment of the Sahrawi Arab Democratic Republic, and had pushed the Mauritanians into retreat by 1979 – but the Moroccans maintained control of the territory and to this day are responsible for all major cities and natural resources. The Polisario fought violently against what was seen as an unjust occupation until a UN-backed ceasefire took hold in 1991, they have since renounced all violence but continue to struggle for self-determination. Western Sahara is currently one of the biggest disputed territories in the world and is considered a non-self-governing territory by the U.N.
Clearly, this impacts on the culture of the region. Mariem Hassan has a song called La Intifada (“the uprising” - a term used by Arab peoples for struggles against occupation, mainly associated with Palestine but also used for the Polisario's Saharan fight), and Youtube videos of Sahrawi music are filled with Free Sahara and Sahara Libre comments. The comments sections of many Group Doueh videos tagged with Western Sahara on Youtube have erupted into debate about whether or not the music is Moroccan or Sahrawi. The arguments may seem petty and needless to Westerners, but they lie at the root of the music that comes from the region, regardless of what side of the debate the musicians are on. Struggle and dispute lie at the heart of Sahrawi music, something which goes far deeper than microtonal guitars and synthesizer presets.
All of which serves to make videos of the music being played in the context of its physical landscape so much more mesmerising. The following are a handful of clips of performances in the desert of Western Sahara. Music played with no thought of Western commerce or polish and no urge to bow to foreign sensibilities. This is music borne of struggle, and it's fucking amazing.
To find more similar music, search Youtube for Sahrawi, Hassani and Polisario music. It also sometimes helps to change the spelling of music to musique or musica. Also check out the music section of www.saharazik.com
Remembering Syria: Mark Gergis Of Sublime Frequencies Interviewed »
Cigarettes & Fine White Wine: Asia Argento & Alan Bishop In Conversation »
Various Artists - Choubi Choubi! Vol. 2 - Folk & Pop Sounds From Iraq »
LISTEN: Sufi Field Recordings Compiled By Arshia Fatima Haq »
The Strange World Of... Sublime Frequencies »
MORE FROM EDDY FRANKEL
Western Saharan Harshness: Listening To Sahrawi Music With New Ears »
MORE: AFROSONIC
Sidi Touré Interviewed: Hatred & War Have No Place Here »
There Is No Rock In Morocco: Beyond The Festival Of Sacred Music »
Discussing Uganda: John Robb Visits East Africa »
A Culture In-Between: Baloji Interviewed »
|
cc/2019-30/en_middle_0056.json.gz/line12646
|
__label__wiki
| 0.582031
| 0.582031
|
January 30, 2017 The Real Book Spy
A Book Spy Review: ‘Echoes In Death’ By J.D. Robb
In J.D. Robb’s latest novel, a serial rapist terrorizing New York couples graduates to committing murder, and it’s up to Lieutenant Eve Dallas to stop them.
Returning home from a charity event with her billionaire husband, Roarke, Eve Dallas is eager to relax and settle in for the night. Plans change, though, when a naked woman darts out in front of their car. Roarke narrowly avoids running the woman over, and Eve instinctively leaps to her aid.
Upon transporting the woman to the hospital, Eve learns that her name is Daphne Strazza. Daphne is the wife of a prominent orthopedic surgeon, Dr. Anthony Strazza, who is later found dead in their townhouse. While Daphne is a witness to whatever horror took place, the traumatic experience has left her unable to speak. Instead, all she can muster up when questioned about who did this to them is two words: “the Devil.”
At first glance, Daphne would make for a prime suspect. Eve finds out that Anthony Strazza was a controlling and cruel man. In fact, he was disliked by many, including colleagues. But as Eve gathers evidence, all of it points away from Daphne and towards another monster– one who has struck before.
Eve finds at least two other cases she believes are related. Each one involves a masked intruder forcing husbands to watch their wife be raped. However, both prior cases lacked any fatalities, leaving Eve to question why the rapist killed Dr. Anthony Strazza.
While investigating, Eve also battles her own demons as she sees parallels between the case and her own painful past. Growing up, Eve’s father had repeatedly raped her and planned to sell her to pedophiles. Instead, she killed him in self-defense. So while Eve is known for taking cases personally, often opting to skip meals and sleep until she believes justice is found for the victim, none have ever consumed her quite like this before.
Eventually, the ‘Devil’ strikes again. This time, though, both the husband and wife are killed. With the crimes escalating, Eve Dallas races to unmask the perpetrator and stop him once and for all.
J.D. Robb (the pseudonym for bestselling author Nora Roberts, who has more than 500 million copies of her books in print around the world) has done a great job developing Eve throughout her series. While readers have long grown accustomed to seeing her tougher-than-nails side, an exterior undoubtedly caused from her painful upbringing, Eve’s softer side has also been on display lately. It’s a welcome change, especially after forty-four books.
Set in a futuristic New York City, Robb’s blend of sci-fi mysteries are unique and different from anything else in widespread circulation, making her novels a must-read experience. Written to stand alone, readers can pick up Echoes In Death and dive in whether they’ve read the series from the beginning or are just now giving it a try.
You don’t end up with sixty-one #1 bestselling novels without a firm grasp and understanding of what readers are looking for. Robb (Roberts) knows what her fans want, and she delivers the goods over and over again.
Author: J.D. Robb
Series: In Death #44
Pages: 384 (Hardcover)
Release Date: February 7, 2017 (Order Now!)
Previous A Book Spy Review: ‘Burning Bright’ By Nick Petrie
Next A Book Spy Review: ‘Robert B. Parker’s Revelation’ By Robert Knott
|
cc/2019-30/en_middle_0056.json.gz/line12648
|
__label__wiki
| 0.54444
| 0.54444
|
Eco: Conventionalism, Epicureanism and Polygenesis, 2
Athanasius Kircher (1602-80), from Turris Babel, Sive Archontologia Qua Primo Priscorum post diluvium hominum vita, mores rerumque gestarum magnitudo, Secundo Turris fabrica civitatumque exstructio, confusio linguarum, & inde gentium transmigrationis, cum principalium inde enatorum idiomatum historia, multiplici eruditione describuntur & explicantur. Amsterdam, Jansson-Waesberge, 1679. This work is in the public domain in its country of origin and other countries and areas where the copyright term is the author’s life plus 100 years or less.
“During these same years, thinkers also returned to reflect upon an older suggestion by Epicurus, who, in a letter to Herodotus, gave his opinion that the names of things were not originally due to convention; human beings themselves had rather created them from their own natures.
Those of differing tribes, “under the impulse of special feelings and special presentations of sense,” uttered “special cries.” The air thus emitted was moulded by their different feelings or sense perceptions (letter to Herodotus, in Diogenes Laertius, Lives of the Philosophers, X, 75-6).
Epicurus went on to add that, to eliminate confusion and for reasons of economy, the various peoples subsequently came to an agreement over what name they should give things.
He had no fixed opinion on whether this agreement had been made from instinct or “by rational thought” (cf. Formigari 1970: 17-28; Gensini 1991: 92; Manetti 1987: 176-7).
That was the first part of Epicurus‘ thesis, which emphasized the natural rather than conventional origin of languages; however, this idea was taken up by Lucretius: nature prompted human beings to emit the sounds of language; necessity gave birth to the names of things.
Therefore to suppose that someone then distributed names among things, and from him that men learnt their first words, is folly. For why should he have been able to mark all things with titles and to utter the various sounds of the tongue, and at the same time others not be thought able to have done it? . . .
Therefore if it is the various sensations that they feel which drive animals to emit differing sounds, even though they remain mute, how much more just is it to say that sensations induce mortals to indicate different things with different sounds. (De rerum natura, W.H.D. Rouse, tr., London: Heinemann, 1975: V, 1041-90).
This was a new view, one which we may call the materialist-biological theory of the origin of language. Language arose out of a natural inclination to transform sensations into ideas, which, for the sake of civil convenience, were then translated into sounds.
If it were true, as Epicurus had suggested, that this process of transformation might vary in different races, climates and places, it was hardly too much to imagine that, in diverse times and ways, the different races had originated different families of languages.
This was the intuition behind the theory that evolved in the eighteenth century: each language had its own genius.
Epicurus‘ thesis could not help but seem seductive in the “libertine” milieu of seventeenth-century France, in an atmosphere of skepticism ranging from sarcastic agnosticism to confessed atheism.
In 1655 there appeared the Systema theologicum ex prae-Adamitarum hypothesi, written by a Calvinist named Isaac de La Peyrère. Starting from an extremely original reading of the fifth chapter of St. Paul’s Epistle to the Romans, La Peyrère argued for the polygenesis of races and peoples.
Reports of missionaries and explorers had represented non-European civilizations, such as the Chinese, as so ancient that their histories were incommensurable with biblical chronology, especially in regard to their accounts of the origin of the world.
La Peyrère inferred from this that there existed a pre-Adamite human race, untouched by original sin. He concluded that the stories both of the original sin and of the Flood concerned only Adam and his descendants in the land of the Hebrews (cf. Zoli 1991: 70).
This was a hypothesis that had already appeared in Islamic culture. Drawing on the Koran (2:31), al-Maqdisi, in the tenth century, had alluded to the existence of different races prior to Adam (cf. Borst 1957-63: I, II, 9).
Quite apart from the obvious theological implications of such an assumption (and the works of La Peyrère were condemned to be burnt), it was clear that, by now, Hebrew civilization–along with its holy language–was falling from its throne.
If one accepted that species had developed differentially in differing conditions, and that their linguistic capacity reflected their degree of evolution and of adaptation to the environment, it was easy to accept the polygenetic hypothesis.
A particular brand of polygeneticism–certainly not of libertine inspiration–can be ascribed to Giambattista Vico. Vico was a thinker who naturally proceeded against the grain of his times.
Instead of searching for actual chronological origins, he set out to delineate an ideal and eternal history. Paradoxically, by jumping outside the bounds of history, Vico was to become one of the founders of modern historicism.
What Vico wished to tell was not, or–depending on how one wishes to take the chronological table at the beginning of his Scienza nuova seconda (1744)–not only, a historical course, but rather the ever recurring conditions in which languages are born and develop in every time and in every place.
Vico described an ideal line of descent which traced the development of language from the language of the gods to that of heroes and, finally, to that of human beings. The first language had to be hieroglyphic (“sacred or divine”), the second symbolic (“by heroic signs and devices”), and the third epistolary (“for men at a distance to communicate to each other the current needs of their lives,” para. 432).
According to Vico, language, at its ideal point of origin, was directly motivated by, and metaphorically congruent with, the human experience of nature. Only at a later state did language become organized in a more conventional form.
Vico affirms, however, that “as gods, heroes, and men began at the same time (for they were, after all, men who imagined the gods and who believed their own heroic nature to be a mixture of the divine and human natures), so these three languages began at the same time” (466).
Thus, circumventing the seventeenth-century question of whether or not a natural linguistic stage was succeeded by a conventional one, Vico directly addressed the question of why there existed as many different languages as there were different peoples.
He responded by asserting “this great truth . . . that, as the peoples have certainly by the diversity of climates acquired different natures, from which have sprung as many different customs, so from their different natures and customs as many different languages have arisen” (445).
As to the story of the primacy of Hebrew, Vico disposes of it in a series of observations tending to prove that, if anything, the Hebrews had derived their alphabet from the Greeks and not vice versa.
Nor was Vico susceptible to the Hermetic fantasies of the Renaissance, according to which all wisdom came from the Egyptians.
From his description there emerges instead a complex network of cultural and commercial trafficking, in which the Phoenicians–prompted by mercantile necessity–exported their characters to both the Egyptians and the Greeks, while, at the same time, spreading throughout the Mediterranean basin the set of hieroglyphic characters that they had borrowed from the Chaldeans and had adapted to fit their need for a numerical system to keep track of their stocks of merchandise (441-3).”
Tags: 1602 : 1655 : 1679 : 1680 : 1744 : 1970 : 1975 : 1987 : 1991 : 1995 : Adam : al-Maqdisi : Alphabet : Amsterdam : Athanasius Kircher : Bible : Blackwell : Borst : Calvin : Chaldeans : Chinese : De rerum natura : Diogenes Laertius : Egyptians : Epicurus : Epistle to the Romans : epistolary : Formigari : France : Gensini : Giambattista Vico : Greeks : Hebrew : Heinemann : Hermetic : Herodotus : hieroglyphic : hieroglyphic characters : Isaac de La Peyrère : James Fentress : Jansson-Waesberge : Koran : La Peyrère : Lives of the Philosophers : London : Lucretius : Manetti : Mediterranean : Original Sin : Oxford : Phoenicians : Renaissance : Scienza nuova seconda : St. Paul : Symbolic : Systema theologicum ex prae-Adamitarum hypothesi : The Deluge : The Flood : The Search for the Perfect Language : Turris Babel : Turris Babel, Sive Archontologia Qua Primo Priscorum post diluvium hominum vita, mores rerumque gestarum magnitudo, Secundo Turris fabrica civitatumque exstructio, confusio linguarum, & inde genti : Umberto Eco : Vico : W.H.D. Rouse : Zoli
|
cc/2019-30/en_middle_0056.json.gz/line12649
|
__label__cc
| 0.639028
| 0.360972
|
Study confirms: More guns, less crime
By The Real Side -
guns, weapons
Via TheFreedomPost:
15.4% increase in permits in the last year
1 in 20 people has a permit
10 states require no permit at all
270% increase for women and a more than 100% increase for minorities compared to whites.
Concealed permit carriers are more law-abiding
Via Crime Prevention Research Center:
Over the years, more and more states have adopted laws to allow individuals to obtain concealed carry permits. Illinois was the last state to do so, with the first permits issued in March 2014. Even Washington, D.C. started issuing permits earlier this year. Today, permitted concealed handguns are allowed in every jurisdiction in the United States.
But the rules vary greatly from state to state. Some states don’t even require permits, with no fees or training required. Some states make it easy and cheap to get a permit. In South Dakota, the fee to obtain the four-year permit is only $1, with no training requirement. Similarly, in Pennsylvania, the permit only costs $19 for five years and there is no training requirement. By contrast, Illinois charges a $150 fee and requires 16 hours of training. With training and range time, it may cost as much as $300, meaning the total dollar costs of getting a permit in Illinois is about $450. Not surprisingly, concealed carry is much more popular in states where permits are relatively inexpensive and easier to obtain.
Photo credit Joe Loong
Previous articleDid this man just call for blacks to kill all “slave masters”?
Next articleWhy the Pentagon wants military personnel disarmed on bases… it’s a trust issue
https://www.therealside.com
Posts categorized under "The Real Side" are posted by the Editor because they are deemed worthy of further discussion and consideration, but are not, by default, an implied or explicit endorsement or agreement. The views of guest contributors do not necessarily reflect the viewpoints of The Real Side Radio Show or Joe Messina. By publishing them we hope to further an honest and civilized discussion about the content. The original author and source (if applicable) is attributed in the body of the text. Since variety is the spice of life, we hope by publishing a variety of viewpoints we can add a little spice to your life. Enjoy!
Democrat staffer going to jail for Doxxing!
Bank of America – NOT so American
Immigrants suing to stop Trump! UNREAL!
Trending Now on The Real Side With Joe Messina
AOC says Pelosi is working her too hard!
97 Percent Scientist Consensus of Global Warming? NOPE!
Face it Donald Trump is a success!
UPDATED 5/25/19: Why we are NOT running over to MeWe…
Minnesota city council says no more pledge of allegiance!
Get our eMail blast
*** WATCH LIVE ***
Talking today’s issues
Does Trump win in 2020?
Trump JFK JR. 2020 Q T-Shirt [WWG1WGA]
“American Christian Rulers: Religion and Men of Government”
“Liberating Planet Earth: An Introduction to Biblical Blueprints”
|
cc/2019-30/en_middle_0056.json.gz/line12650
|
__label__wiki
| 0.562229
| 0.562229
|
Joanna Collingwood
Trace Metals in Medicine Laboratory
Academic responsible - Dr Joanna Collingwood
Our primary focus is imaging and quantifying transition metal ion distribution in the human brain, supporting progress in early detection and diagnosis for neurodegenerative disorders. We use a variety of analytical techniques, including high resolution MRI, synchrotron X-ray microfocus spectroscopy, and magnetometry to characterize the distribution and form of trace metals in tissues and protein aggregates. Please see our recent publications, most of which are open-access.
Latest Outputs
Trace Metals in Medicine Laboratory, build completed in 2011 and equipped for sample preparation and analysis. Resources include:
Wet-lab with chemical safety cabinets, refrigerated centrifuge, balances, ultrapure water supply, and refrigeration equipment.
Containment level 1 area with Class II biosafety cabinets, cryomicrotome sectioning for trace metals analysis in tissues, ultramicrotome sectioning, fluorescence light microscopy (inverted microscopy), and freeze drying.
Cell culture resources (including incubator and fluorescence plate reader).
MRI Probe (for imaging at 9.4 T): we have a state-of-the-art MR microscopy probe that utilizes the 400 MHz spectrometer in Millburn House, under the Science Cities Translational Medicine 2 Programme. It is presently configured for in-vitro work, and the coils are primarily volume coils for 1H imaging; we also have a surface coil, and a 19F volume coil for small samples (<5mm) .
Complementary facilities are available in the adjacent Microscopy and Analysis Laboratory, run by Martin Davis, is a School of Engineering resource providing a small materials analysis and imaging service. The laboratory is primarily run for the benefit of the School of Engineering staff and students; however, it also offers the same service to parties from other departments and from outside the University.Complementary resources include:
Environmental SEM.
Electron beam microprobe
CURRENT PROJECTS IN THE TRACE METALS IN MEDICINE LABORATORY
Metal-ion-based neurodegeneration: enabling techniques for understanding, detection and treatment.
PI: Joanna Collingwood. Funder: EPSRC. 2013 - 2015
Summary: Many diseases of the human brain lead, over time, to degeneration of tissue and loss of function. By the time the disease is detected in an individual because of loss of function (whether cognitive or physical), extensive degeneration has in many instances already taken place. Reversing this degeneration presents an enormous challenge; the goal of this project is instead to focus on understanding factors that contribute to causing the degeneration, and to find ways of identifying the degeneration at an early stage in order to i) improve detection, and ii) offer new targets for effective treatment.
A common theme linking many neurodegenerative diseases such as Alzheimer's, Parkinson's, Huntington's, Motor Neurone Disease, and Multiple System Atrophy, is that changes in the regulation of certain trace metals, and/or the proteins responsible for binding and utilizing these metal elements, are apparent. This can include accumulation of certain elements, such as iron, in specific regions of the brain. Our hypothesis is that these changes are disease-specific, and if better understood, may provide windows of opportunity for improved detection and treatment.
Limiting factors affecting present work in this area include:
i) the challenge of extrapolating findings from simple experiments in the laboratory to the complexity of the biochemical environment in the brain;
ii) the challenge of accurate sensitive detection of trace metal elements in the brain - both for measurement in the living brain using clinical techniques, and for laboratory analysis of brain tissue.
In the proposed research, a combination of experiments and computer-based modelling will be undertaken, in order to describe, predict, and test mechanisms of trace metal regulation that are anticipated to be affected in some of these neurodegenerative disorders. The models will be constructed using what is already known from experimental work, including published data from other research groups. In turn, as predictions are made by the models developed in this project, experiments will be designed and performed to test the predictions and update the models accordingly.
Experiments to look at the interactions between metal-binding proteins and the trace metals that affect their aggregation, will be made more physiologically relevant by studying them in purpose-designed 'microfluidic' systems: experimental systems engineered to enable work with extremely small volumes (micro- or nanolitres) of sample. Microfluidic systems have three particular advantages in this context: i) they allow much smaller amounts of sample to be studied than would normally be the case, ii) they permit high-throughput testing of many experimental conditions for a single batch of protein which improves efficiency and reduces ambiguity in the results, and iii) the very small volumes and control of interfaces that can be achieved make it possible to mimic physiological conditions more accurately than has previously been possible.
Very sensitive analysis of trace metals in tissues will be achieved in experiments using UK synchrotron facilities. These provide extremely bright beams of X-rays that can be focussed to micron or sub-micron diameters for mapping. The beams excite natural fluorescence signal from specific elements such as iron, copper, and zinc, enabling patterns of deposition to be mapped for each element even for trace concentrations of just a few parts per million.
It is anticipated that the specific questions addressed in this project will help further our understanding of how iron affects the aggregation of a particular protein found in Lewy body pathology in Parkinson's disease, and will also enable progress in understanding how (and where) brain iron storage is affected in certain neurodegenerative disorders, to assess if there are sufficient differences for these diseases to be detected, and distinguished from each other, using Magnetic Resonance Imaging.
M Heidari, D M Johnstone, B Bassett, R M Graham, A C G Chua, M J House, J F Collingwood, C Bettencourt, H Houlden, M Ryten, J K Olynyk, D Trinder and E A Milward for the UK Brain Expression Consortium (UKBEC) (2016) 'Brain iron accumulation affects myelin-related molecular systems implicated in a rare neurogenetic disease family with neuropsychiatric features'. Molecular Psychiatry, doi: 10.1038/mp.2015.192
Bettencourt C, Forabosco P, Wiethoff S, Heidari M, Johnstone DM, Botía JA, Collingwood JF, Hardy J, Milward EA, Ryten M, Houlden H; UK Brain Expression Consortium (UKBEC), (2015) 'Gene co-expression networks shed light into diseases of brain iron accumulation', Neurobiol Dis. S0969-9961(15)30106-6. doi: 10.1016/j.nbd.2015.12.004
J.F. Collingwood and M.R. Davidson (2014) 'The role of iron in neurodegenerative disorders: insights and opportunities with synchrotron light'. Frontiers in Pharmacology, accepted, in press.
J.F. Collingwood, M.E. Finnegan, Z. Arya, J.-P. Hagen, S. Chen, A. Chowdhury, S. Wayte, E. Ngandwe, N. Visanji, J. Dobson, P.A. Gowland, L.-N. Hazrati, & C.E. Hutchinson, ‘MRI evaluation of the relationship between R2, R2*, and tissue iron in the human basal ganglia’, International Society for Magnetic Resonance in Medicine Annual Meeting (2014), Milan, Italy
Everett, J., Cespedes, E., Shelford, L. R., Exley, C., Collingwood, J. F. , Dobson, J., van der Laan, G., Jenkins, C. A., Arenholz, E. ,Telling, N. D. (2014) 'Evidence of Redox-Active Iron Formation Following Aggregation of Ferrihydrite and the Alzheimer's Disease Peptide beta-Amyloid'. Inorganic Chemistry, DOI: 10.1021/ic402406gJ.
Everett, E. Céspedes, L.R. Shelford, C. Exley, J.F. Collingwood, J. Dobson, G. van der Laan, C.A. Jenkins, E. Arenholz and N.D. Telling (2014) 'Ferrous iron formation following the co-aggregation of ferric iron and the Alzheimerʼs disease peptide β-amyloid (1-42)', Journal of the Royal Society Interface, 11(95):20140165. doi: 10.1098/rsif.2014.0165
Visanji NP, Collingwood JF, Finnegan ME, Tandon A, House E, Hazrati LN. (2013) 'Iron Deficiency in Parkinsonism: Region-Specific Iron Dysregulation in Parkinson's Disease and Multiple System Atrophy'. J Parkinsons Dis. PMID: 24113558
Page contact: Joanna Collingwood
Last revised: Mon 22 Feb 2016
|
cc/2019-30/en_middle_0056.json.gz/line12662
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.