Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Everyone is welcome, everyone can contribute, everyone is unique and these are your strengths too!
GitLab Pages with Hugo: Add Google Analytics
Google Analytics is a powerful way to analyse your website usage and unveil bugs and unexpected behaviour. Most often you just want to know how often a specific page is viewed and get some generic metrics.
Setting up your website with GitLab Pages and Hugo is a breeze. Navigate to GitLab.com > New Project > From Template, search for Hugo and get started after the first deployment.
After familiarizing with the structure and creating your first blog post, you can dive into more customizations such as adding Google Analytics. This requires the following:
• Google Analytics Account and/or Tracking ID
• Commit & publish permissions for your GitLab project
Get a Google Analytics Tracking ID
Navigate into your Google Analytics dashboard and pick the Admin button at the bottom left. In the centered colum, click to add a new property with + Create Property.
Important: Choose Web - Measure your website to obtain a GA Tracking ID. Apps and web generates a measurement ID which is incompatible.
Fill in the website details, save and copy the Tracking Id.
Instead of using the proposed Javascript snippet from Google Analytics, Hugo provides a native integration.
Add the Tracking ID to Hugo
Open the Web IDE and navigate to the config.toml in your GitLab pages project. Add a new main key called googleAnalytics and paste the tracking ID obtained from Google Analytics.
baseURL = "https://everyonecancontribute.com/"
languageCode = "en-us"
title = "#EveryoneCanContribute"
theme = "everyonecancontribute"
googleAnalytics = "UA-123456789-1"
Include the Header Template
Depending on the layout, you may need to navigate into your theme directory tree inside the Web IDE. everyonecancontribute.com uses a theme path at themes/everyonecancontribute/layouts/partials. The file to target is header.html or html-header.html.
The easiest way to find the first included header file is to open the index.html and check the first include:
{{ partial "html-header.html" . }}
<!-- <body data-spy="scroll" data-target="#navbar" data-offset="72" class="position-relative"> -->
<body data-target="#navbar" data-offset="72" class="position-relative">
{{ partial "theme-header.html" . }}
In our case, we open html-header.html and add the template for Google Analytics.
<!DOCTYPE html>
<html>
<head>
<title>{{ .Site.Title }}</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<!-- ... -->
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.13.0/css/all.min.css">
<!-- Google Analytics -->
{{ template "_internal/google_analytics.html" . }}
<!-- Twitter card -->
{{ partial "social-cards" . }}
</head>
Merge Request and Tests
Commit both changes inside the Web IDE into a new branch and create a merge request.
Prior to merging, you can pull the Git branch into your local development environment and check whether Google sees the user.
Navigate into the real time dashboard in Google Analytics.
Open a new terminal and start a local Hugo instance.
git fetch
git checkout <mr-branch-name>
hugo server -D
Open http://localhost:1313/ in your browser and check the increased count in Google Analytics.
Google Analytics Realtime
If the number stays 0, make sure to verify that the Tracking ID is correct. You can inspect the code in the browser dev console sources for example.
Merge and Publish
everyonecancontribute.com uses the “MR review, merge and tag a release” workflow - use your preferred way to merge and publish the changes to GitLab pages.
For more inspiration, checkout our GitLab repository - #everyonecancontribute, it is Open Source! :)
Date published: July 30, 2020 | ESSENTIALAI-STEM |
Russell Allen NORDYKE; Ann Sallie Nordyke, dba TS Trade Shows; Jess B. Guy; Duane Darr; William J. Jones; Daryl N. David; Tasiana Westyschyn; Jean Lee; Todd Baltes; Dennis Blair; R.L. Adams; Roger Baker; Mike Fournier; Virgil McVicker, Plaintiffs-Appellants, v. Mary V. KING; Gail Steele; Wilma Chan; Keith Carson; Scott Haggerty; County of Alameda; County of Alameda Board of Supervisors, Defendants-Appellees.
No. 07-15763.
United States Court of Appeals, Ninth Circuit.
Opinion Issued April 20, 2009.
Opinion Withdrawn July 29, 2009.
Reheard En Banc Sept. 24, 2009.
Remanded to Panel July 12, 2010.
Re-argued and Re-submitted Oct. 19, 2010.
Filed May 2, 2011.
Donald E. Kilmer, Jr., Law Offices of Donald Kilmer, San Jose, CA, argued the cause for the plaintiffs-appellants and filed the brief. Don B. Kates, Battleground, WA, was also on the brief.
Sayre Weaver, Richards, Watson & Gershon, Los Angeles, CA, argued the cause for the defendants-appellees and filed the brief. Richard E. Winnie, County Counsel, Alameda County, CA, T. Peter Pierce, Richards, Watson & Gershon, Los Angeles, CA, and Veronica S. Gunderson, Richards Watson & Gershon, Los Angeles, CA, were also on the brief.
Paul D. Clement, Jeffrey S. Bucholtz, and Adam Conrad, King & Spalding, LLP, Washington, D.C., filed a brief on behalf of amicus curiae the National Rifle Association of America, Inc., in support of the plaintiffs-appellants.
Alan Gura, Gura & Possessky, PLLC, Alexandria, VI, filed a brief on behalf of amicus curiae the Second Amendment Foundation, Inc., in support of the defendants-appellees.
C.D. Michel, Michel & Associates, PC, Long Beach, CA, Glenn S. McRoberts, Michel & Associates, PC, Long Beach, CA, and Stephen P. Halbrook, Law Offices of Stephen P. Halbrook, Fairfax, VI, filed a brief on behalf of amicus curiae the California Rifle & Pistol Association, in support of the plaintiffs-appellants.
Herbert W. Titus, William J. Olson, John. S. Miles, and Jeremiah L. Morgan, William J. Olson, PC, Vienna, VI, filed a brief on behalf of amici curiae Gun Owners of California, Inc., Gun Owners of America, Inc., and Gun Owners Foundation, in support of the plaintiffs-appellants.
Jonathan E. Lowy, Brady Center to Prevent Violence, Washington, D.C., and Gil N. Peles, Proskauer Rose LLP, Los Angeles, CA, filed a brief on behalf of amicus curiae Brady Center to Prevent Gun Violence, in support of the defendants-appellees.
Charles M. Dyke, Nixon Peabody LLP, San Francisco, CA, filed a brief on behalf of amici curiae the Legal Community Against Violence, California Peace Officers’ Association, California Police Chiefs’ Association, California State Sheriffs’ Association, City of Oakland, City and County of San Francisco, Violence Policy Center, and Youth Alive!, in support of the defendants-appellees.
Before: ARTHUR L. ALARCÓN, DIARMUID F. O’SCANNLAIN and RONALD M. GOULD, Circuit Judges.
OPINION
O’SCANNLAIN, Circuit Judge:
We must decide whether the Second Amendment prohibits a local government from banning gun shows on its property.
I
A
Russell and Sallie Nordyke operate a business that promotes gun shows throughout California. A typical gun show involves the display and sale of thousands of firearms, generally ranging from pistols to rifles. Since 1991, the Nordykes have promoted numerous shows across the state, including one at the public fairgrounds in Alameda County. The Alameda gun shows routinely draw about 4,000 people. In the summer of 1999, the county passed an ordinance making it a misdemeanor to bring onto or to possess a firearm or ammunition on county property. See Alameda Code § 9.12.120(b) (“the Ordinance”). The Ordinance does not mention gun shows.
The county asserts that it passed the Ordinance in response to a shooting that occurred the previous summer at the annual county fair. The Ordinance’s text reflects this, finding that “gunshot fatalities are of epidemic proportions in Alameda County.” Id. § 9.12.120(a). The Nor-dykes, however, allege that the Ordinance’s real purpose is to ban gun shows from county fairgrounds. To support this allegation, the Nordykes note that, shortly before proposing the Ordinance, the former county supervisor, Mary King, sent a memorandum to Richard Winnie, the county counsel, stating that King has “been trying to get rid of gun shows on County property” for “about three years,” and asking Winnie to research “the most appropriate way that [King] might proceed.” The memorandum also states that, in her efforts to ban gun shows, King has “gotten the run around” from “spineless people hiding behind the Constitution.” At a subsequent press conference, the Nordykes assert, King again made clear that the purpose of the Ordinance was to outlaw gun shows on county property.
Whatever the intent of the Ordinance, the Nordykes assert that its effect was to ban gun shows on county property. After the county passed the Ordinance, the manager of the fairgrounds asked the Nor-dykes to submit a written plan explaining how their next gun show would comply with the Ordinance. Although the Ordinance did not expressly prohibit gun shows or the sale of firearms, the Nordykes insisted then and maintain now that they cannot hold a gun show without guns. Rather than submitting a compliance plan, the Nordykes filed this suit.
B
Before discussing the district court rulings now before us, it is necessary to summarize this case’s long and tangled procedural history. The Nordykes, joined by several would-be exhibitors or patrons at their gun shows (collectively, “the Nordykes”), first sued Alameda County, its Board of Supervisors, and a number of its employees, including King (collectively, “the County”) in 1999. Initially, the Nor-dykes asserted just two claims: a First Amendment free speech claim, and a claim that the Ordinance was preempted by state law. In due course, they moved for a preliminary injunction forbidding the County from enforcing the Ordinance against their gun show. After the district court denied this motion, we accepted the Nordykes’ interlocutory appeal. Rather than reaching the First Amendment question, however, we certified the preemption question to the California Supreme Court. See Nordyke v. King, 229 F.3d 1266, 1267 (9th Cir.2000) (“Nordyke I”). The California Supreme Court answered that the County Ordinance was not preempted by state law. See Nordyke v. King, 27 Cal.4th 875, 118 Cal.Rptr.2d 761, 44 P.3d 133, 138 (2002) (“Nordyke II”).
After receiving that response, we returned to the Nordykes’ First Amendment claim. Construing their challenge as a facial one, we rejected the argument that the Ordinance burdened the expressive conduct of gun possession. See Nordyke v. King, 319 F.3d 1185, 1190 (9th Cir.2003) (“Nordyke III”). Our opinion noted that its rejection of the facial attack did not “foreclose a future as applied challenge to the Ordinance.” Id. at 1190 n. 3.
In Nordyke III we also responded to developments in the law while the certified question was pending in the California Supreme Court, by granting the Nordykes’ motion to file supplemental briefing on a potential Second Amendment claim, see id. at 1188, and then holding that Ninth Circuit precedent precluded such claim, see id. at 1191-92 (citing Hickman v. Block, 81 F.3d 98 (9th Cir.1996)).
On remand, the Nordykes moved for leave to amend the complaint to add claims under the Second Amendment, the Equal Protection Clause, the Due Process Clause, and the Ninth Amendment. The district court allowed the addition of all claims except for the Second Amendment claim, which the district court deemed futile because Nordyke III had already held that a Second Amendment claim was precluded by binding circuit precedent. After two motions to dismiss, only the First Amendment and equal protection claims survived. The district court then granted summary judgment to the County on those remaining claims. The Nordykes timely appealed.
On that appeal, the Nordykes challenged the district court’s ruling that adding a Second Amendment claim would be futile, as well as the district court’s grant of summary judgment on their First Amendment and equal protection claims. Before we ruled on the appeal, however, the Supreme Court decided District of Columbia v. Heller, 554 U.S. 570, 128 S.Ct. 2783, 171 L.Ed.2d 637 (2008), which held that the Second Amendment protects an individual right to keep and to bear arms for self-defense. After further briefing, we affirmed on all three issues. See Nordyke v. King, 563 F.3d 439 (9th Cir.2009) (“Nordyke IV”). On the Second Amendment issue, we held: (1) the individual right to keep and to bear arms recognized in Heller is incorporated against state and local governments through the Due Process Clause of the Fourteenth Amendment; but (2) the Ordinance constituted a permissible regulation of firearms under the Second Amendment. See id. at 446-60. We declined to adopt an explicit standard of review for evaluating gun-control regulations.
Nordyke IV was subsequently vacated and reheard en banc. See Nordyke v. King, 575 F.3d 890 (9th Cir.2009). But before the en banc panel issued its decision, the Supreme Court decided McDonald v. Chicago, — U.S. -, 130 S.Ct. 3020, 177 L.Ed.2d 894 (2010), holding, as we did in Nordyke IV, that “the Second Amendment right to keep and bear arms” is “fundamental to our scheme of ordered liberty” and, therefore, incorporated against the states through the Due Process Clause of the Fourteenth Amendment. Id. at 3036. To support this holding, the Court went to great lengths to demonstrate that the right to keep and to bear arms is a “fundamental” right. See id. at 3037, 3041-44. McDonald also specifically rejected the suggestion that the Second Amendment should receive less protection than the rest of the Bill of Rights. See id. at 3044(“[W]hat [respondents] must mean is that the Second Amendment should be singled out for special — and specially unfavorable — treatment. We reject that suggestion.”). McDonald, like Heller before it, did not explicitly adopt a standard of review for Second Amendment cases. See Heller, 554 U.S. at 629, 634, 128 S.Ct. 2783.
In response, the en banc panel remanded the case to this panel “for further consideration in light of McDonald.” Nordyke v. King, 611 F.3d 1015, 1015 (9th Cir.2010) (en banc). We then ordered supplemental briefing addressing “the impact of McDonald on the disposition of this case,” as well as “any other issue properly before this court, including the level of scrutiny that should be applied to the ordinance in question.” After further oral argument, the case was resubmitted.
II
Because the Supreme Court has yet to articulate a standard of review in Second Amendment cases, that task falls to the courts of appeals and the district courts. It has been suggested that only regulations which substantially burden the right to keep and to bear arms should receive heightened scrutiny. See United States v. Masciandaro, 638 F.3d 458, 469-70 (4th Cir.2011); United States v. Chester, 628 F.3d 673, 680-83 (4th Cir.2010); United States v. Marzzarella, 614 F.3d 85, 89 (3d Cir.2010); Heller v. District of Columbia, 698 F.Supp.2d 179, 188 (D.D.C.2010). Other courts would apply strict scrutiny to all gun-control regulations. See United States v. Engstrum, 609 F.Supp.2d 1227, 1231-32 (D.Utah 2009).
A
The Supreme Court’s reasoning in Heller and McDonald suggests that heightened scrutiny does not apply unless a regulation substantially burdens the right to keep and to bear arms for self-defense. In Heller, the Court distinguished the blanket handgun ban there at issue from apparently permissible gun-control regulations, by examining the extent to which each law burdened the core right to armed self-defense. The Court asserted that “the inherent right of self-defense has been central to the Second Amendment right. The handgun ban amounts to a prohibition of an entire class of arms that is overwhelmingly chosen by American society for that lawful purpose.” Heller, 554 U.S. at 628, 128 S.Ct. 2783. The Heller Court proceeded to review several reasons why “a citizen may prefer a handgun for home defense.” Id. at 629, 128 S.Ct. 2783. The Court concluded that, “whatever the reason, handguns are the most popular weapon chosen by Americans for self-defense in the home, and a complete prohibition of their use is invalid.” Id. “Few laws in the history of our Nation have come close to the severe restriction of the District’s handgun ban,” the Court added. Id. Heller thus reasoned that, because handguns are extremely useful for self-defense, the District’s complete handgun ban substantially burdened the core right to armed self-defense, and was therefore unconstitutional. See Eugene Volokh, Implementing the Right to Keep and Bear Arms for Self-Defense, 56 UCLA L.Rev. 1443, 1456-57 (2009) (noting that Heller struck down the handgun ban because it made “self-defense materially more difficult” and that the Heller Court’s “analysis suggested that the severity of the burden was important”). Likewise, Heller determined that the District’s requirement that firearms in the home be kept inoperable made “it impossible for citizens to use [firearms] for the core lawful purpose of self-defense and is hence unconstitutional.” Id. at 630, 128 S.Ct. 2783. It was the handgun ban’s heavy burden on effective self-defense that offended the Second Amendment.
The Heller Court contrasted the handgun ban’s substantial burden on Second Amendment rights with eighteenth-century gunpowder storage laws, which required that excess gunpowder be kept in a special container or on the top floor of the home. The Court noted that “[n]othing about those fire-safety laws undermines our analysis” because “they do not remotely burden the right of self-defense as much as an absolute ban on handguns.” Id. at 632, 128 S.Ct. 2783. Similarly, in distinguishing the handgun ban from colonial laws that imposed minor fines for unauthorized discharge of weapons, the Court asserted that “[t]hose [colonial] laws provide no support for the severe restriction in the present case.” Id. In so reasoning, the Heller Court again suggested a distinction between remote and severe burdens on the right to keep and to bear arms. See also id. at 629, 128 S.Ct. 2783(citing a nineteenth century state supreme court case for the proposition that “[a] statute which, under the pretence of regulating, amounts to a destruction of the right, or which requires arms to be so borne as to render them wholly useless for the purpose of defence, would be clearly unconstitutional”).
Conversely, applying strict scrutiny to every gun-control regulation would be inconsistent with Hellers reasoning. Under the strict scrutiny approach, a court would have to determine whether each challenged gun-control regulation is narrowly tailored to a compelling governmental interest (presumably, the interest in reducing gun crime). But Heller specifically renounced an approach that would base the constitutionality of gun-control regulations on judicial estimations of the extent to which each regulation is likely to reduce such crime.
Indeed, the Heller majority rejected Justice Breyer’s proposed “interest-balancing” test that would ask “whether the statute burdens a protected interest ... out of proportion to the statute’s salutary effects upon other important governmental interests.” Id. at 689-90, 128 S.Ct. 2783 (Breyer, J., dissenting). The problem with Justice Breyer’s test was not that it would require judges to determine the burden that gun-control regulations impose on the right to keep and to bear arms; indeed, as demonstrated above, the Heller majority engaged in just that analysis. Rather, the majority rejected such test because it would allow judges to constrict the scope of the Second Amendment in situations where they believe the right is too dangerous. See id. at 634, 128 S.Ct. 2783 (majority opinion) (“The very enumeration of the right takes out of the hands of government — even the Third Branch of Government — the power to decide on a case-by-case basis whether the right is really worth insisting upon.”); id. (“A constitutional guarantee subject to future judges’ assessments of its usefulness is no constitutional guarantee at all.”). But applying strict scrutiny to every gun-control regulation would require courts routinely to make precisely those types of government interest assessments.
Just as important as what Heller said about a government-interest approach is what Heller did not say. Nowhere did it suggest that some regulations might be permissible based on the extent to which the regulation furthered the government’s interest in preventing crime. Instead, Heller sorted such regulations based on the burden they imposed on the right to keep and to bear arms for self-defense.
B
We are satisfied that a substantial burden framework will prove to be far more judicially manageable than an approach that would reflexively apply strict scrutiny to all gun-control laws. As McDonald recognized, “assessing] the costs and benefits of firearms restrictions” requires “difficult empirical judgments in an area in which [judges] lack expertise.” 130 S.Ct. at 3050. Indeed, whether a gun-control regulation serves the government’s interest in safety is likely to be a difficult question to answer. See Heller, 554 U.S. at 702, 128 S.Ct. 2783(Breyer, J., dissenting) (“[E]mpirically based arguments ... cannot prove either that handgun possession diminishes crime or that handgun bans are ineffective.”); Volokh, supra, at 1461 (arguing that it “is likely to be espedally hard” to “estimate the effectiveness of [a gun-control] law in preventing future crime and injury”).
Applying strict scrutiny to every gun regulation would require courts to assess the effectiveness of a myriad of gun-control laws. Whenever a law is challenged under the Second Amendment, the government is likely to claim that the law serves its interest in reducing crime. See, e.g., Defs.’ Br. at 19 (asserting that the Ordinance serves the County’s interest in “minimiz[ing] the risk of shootings”). Because the Supreme Court has already held that “the Government’s general interest in preventing crime” is “compelling,” United States v. Salerno, 481 U.S. 739, 754, 107 S.Ct. 2095, 95 L.Ed.2d 697 (1987), the question, under strict scrutiny, would be whether the regulation is narrowly tailored to that interest. But courts cannot determine whether a gun-control regulation is narrowly tailored to the prevention of crime without deciding whether the regulation is likely to be effective (or, at least, whether less burdensome regulations would be as effective). Sorting gun-control regulations based on their likely effectiveness is a task better fit for the legislature. Cf. Richard H. Fallon, Jr., Judicially Manageable Standards and Constitutional Meaning, 119 Harv. L.Rev. 1274, 1291 (2006) (“A test may be deemed judicially unmanageable if it would require courts to make empirical findings or predictive judgments for which they lack competence.”).
By contrast, the substantial burden test, though hardly mechanical, will not produce nearly as many difficult empirical questions as strict scrutiny. See Volokh, supra, at 1459-60 (arguing that it is easier to determine whether a law substantially burdens the right to bear arms than to figure out whether a law “will reduce the danger of gun crime”). Indeed, courts make similar determinations in other constitutional contexts. See, e.g., Planned Parenthood of Se. Pa. v. Casey, 505 U.S. 833, 112 S.Ct. 2791, 120 L.Ed.2d 674 (1992) (holding that pre-viability abortion regulations are unconstitutional if they impose an “undue burden” on a women’s right to terminate her pregnancy); Clark v. Cmty. for Creative Nonr-Violence, 468 U.S. 288, 293, 104 S.Ct. 3065, 82 L.Ed.2d 221 (1984) (stating that content-neutral speech regulations are unconstitutional if they do not “leave open ample alternative channels for communication”). Courts can use the doctrines generated in these related contexts for guidance in determining whether a gun-control regulation is impermissibly burdensome, as we suggest below.
C
In their supplemental briefs, the Nordykes and their amici argue that McDonald requires this Court to give strict scrutiny to the Ordinance. This is so, the briefs assert, because McDonald held that the right to keep and to bear arms is “fundamental.” For support, the briefs point to a number of cases noting that laws burdening fundamental rights trigger strict scrutiny. See, e.g., Clark v. Jeter, 486 U.S. 456, 461, 108 S.Ct. 1910, 100 L.Ed.2d 465 (1988) (“[Classifications affecting fundamental rights ... are given the most exacting scrutiny.”).
' But, the Supreme Court does not apply strict scrutiny to every law that regulates the exercise of a fundamental right, despite language in some cases suggesting the contrary. Instead, in a variety of contexts, the Court applies mere rational basis scrutiny to laws that regulate, but do not significantly burden, fundamental rights. Cf. Casey, 505 U.S. at 873, 112 S.Ct. 2791 (“Not every law which makes a right more difficult to exercise is, ipso facto, an infringement of that right.”).
For instance, even though the Supreme Court has recognized a constitutional right to obtain an abortion, it has approved a number of regulations that had the “effect of increasing the cost or decreasing the availability” of abortions. Id. at 874, 112 S.Ct. 2791. These regulations command mere rational basis review so long as they do not pose an “undue burden” on the right to abort a non-viable fetus. See Gonzales v. Carhart, 550 U.S. 124, 146, 127 S.Ct. 1610, 167 L.Ed.2d 480 (2007). Similarly, “the government may impose reasonable restrictions on the time, place, or manner of protected speech,” provided, inter alia, that the restrictions are not too cumbersome. See Ward v. Rock Against Racism, 491 U.S. 781, 791, 109 S.Ct. 2746, 105 L.Ed.2d 661 (1989).
And the Court has rejected the proposition that “a law that imposes any burden upon the right to vote [or to associate with others for political purposes] must be subject to strict scrutiny.” Burdick v. Takushi, 504 U.S. 428, 432, 112 S.Ct. 2059, 119 L.Ed.2d 245 (1992). Thus, rather than strictly scrutinizing every law which burdens these rights, the Supreme Court has held that “the rigorousness of our inquiry into the propriety of a state election law depends upon the extent to which a challenged regulation burdens First and Fourteenth Amendment rights.” Id. at 434, 112 S.Ct. 2059. Election laws trigger strict scrutiny only where the rights to vote and to associate “are subjected to ‘severe’ restrictions.” Id. (internal quotation marks and citations omitted); see also Wash. State Grange v. Wash. State Republican Party, 552 U.S. 442, 451-52, 128 S.Ct. 1184, 170 L.Ed.2d 151 (2008). Indeed, even though “the right to marry is of fundamental importance,” regulations of that right do not trigger strict scrutiny unless they “significantly interfere! ] with [its] exercise.” Zablocki v. Redhail, 434 U.S. 374, 383, 98 S.Ct. 673, 54 L.Ed.2d 618 (1978).
Accordingly, we hold that only regulations which substantially burden the right to keep and to bear arms trigger heightened scrutiny under the Second Amendment.
Ill
Having determined the standard of review, the question becomes whether the Nordykes’ Proposed Second Amended Complaint sufficiently alleged that the Ordinance substantially burdens their right to keep and to bear arms. The Nordykes only challenge the ordinance as an effective prohibition of gun shows on county fairgrounds. That is, they complain that they cannot display and sell guns on county property; they do not allege that they wish to carry guns on county property for the purpose of defending themselves while on that property. Thus, the proper inquiry is whether a ban on gun shows at the county fairgrounds substantially burdens the right to keep and to bear arms; not whether a county can ban all people from carrying firearms on all of its property for any purpose. See Carhart, 550 U.S. at 168, 127 S.Ct. 1610 (“It is neither our obligation nor within our traditional institutional role to resolve questions of constitutionality with respect to each potential situation that might develop.”).
A
Where, as here, government restricts the distribution of a constitutionally protected good or service, courts typically ask whether the restriction leaves open sufficient alternative avenues for obtaining the good or service. For instance, courts reviewing a restriction on the time, place, or manner of protected speech will ask whether the restriction “leave[s] open ample alternative channels for communication of the information.” Ward, 491 U.S. at 791, 109 S.Ct. 2746. Thus, the Supreme Court upheld an ordinance that prohibited “picketing before or about the residence ... of any individual” because protestors were not barred from residential neighborhoods generally, but rather could “enter such neighborhoods, alone or in groups, even marching,” go “door-to-door to proselytize their views,” “distribute literature,” and “contact residents by telephone.” Frisby v. Schultz, 487 U.S. 474, 477, 483-84, 108 S.Ct. 2495, 101 L.Ed.2d 420 (1988).
Likewise, the Supreme Court recently held that a ban on one particular method of performing an abortion did not constitute an “undue burden” on the right to an abortion in part because “[a]lternatives [were] available to the prohibited procedure.” Carhart, 550 U.S. at 164, 127 S.Ct. 1610; see also id. at 165, 127 S.Ct. 1610(“[T]he Act allows ... a commonly used and generally accepted [abortion] method, so it does not construct a substantial obstacle to the abortion right.”).
Following this lead, when deciding whether a restriction on gun sales substantially burdens Second Amendment rights, we should ask whether the restriction leaves law-abiding citizens with reasonable alternative means for obtaining firearms sufficient for self-defense purposes. See United States v. Marzzarella, 595 F.Supp.2d 596, 606 (W.D.Pa.2009) (suggesting that a ban on guns with obliterated serial numbers should be judged under a standard comparable to that “applicable to content-neutral time, place and manner restrictions,” and upholding the ban partly because it leaves “open ample opportunity for law-abiding citizens to own and possess guns”), aff'd, 614 F.3d 85, 95 (3d Cir.2010).
Similarly, a law does not substantially burden a constitutional right simply because it makes the right more expensive or more difficult to exercise. See Carhart, 550 U.S. at 157-58, 127 S.Ct. 1610 (“ ‘The fact that a law which serves a valid purpose, one not designed to strike at the right itself, has the incidental effect of making it more difficult or more expensive to procure an abortion cannot be enough to invalidate it.’ ” (quoting Casey, 505 U.S. at 874, 112 S.Ct. 2791)); Zablocki, 434 U.S. at 387 n. 12, 98 S.Ct. 673 (noting that a law reducing the federal benefits of a couple by twenty dollars on account of their marriage did not “substantially] ... interfere[] with the freedom to marry,” because it was unlikely to “significantly diseourage[ ]” any marriage). Thus, regulations of gun sales do not substantially burden Second Amendment rights merely because they make it more difficult to obtain a gun. Cf. Heller, 554 U.S. at 626-27, 128 S.Ct. 2783(“[N]othing in our opinion should be taken to cast doubt on ... laws imposing conditions and qualifications on the commercial sale of arms.”).
Finally, a regulation is particularly unlikely to impose a substantial burden on a constitutional right where it simply declines to use government funds or property to facilitate the exercise of that right. For instance, the Supreme Court held that excluding even medically necessary abortions from Medicaid coverage did not constitute an “unduly burdensome interference with [a pregnant women’s] freedom to decide whether to terminate her pregnancy.” Harris v. McRae, 448 U.S. 297, 313, 100 S.Ct. 2671, 65 L.Ed.2d 784 (1980). Regulations that simply refuse to provide government subsidies to gun dealers, therefore, do not constitute a substantial burden on the right to keep and to bear arms.
B
Applying the foregoing considerations, we must determine whether the Proposed Second Amended Complaint alleged sufficient facts to suggest plausibly that the Ordinance substantially burdens the Nordykes’ right to keep and to bear arms. It does not assert that the Ordinance makes it materially more difficult to obtain firearms. Nor does it allege a shortage of places to purchase guns in or near Alameda County. In any event, the Ordinance does not prohibit gun shows, but merely declines to host them on government premises. The Proposed Second Amended Complaint, therefore, does not allege sufficient facts to state a Second Amendment claim capable of surviving a motion to dismiss. Accordingly, we conclude that the district court properly denied the Nordykes’ motion for leave to amend to that extent.
Nevertheless, the district court did not state whether its denial of leave to amend was with prejudice, which it presumably was since it unequivocally stated that “Plaintiffs lack[ ] standing to assert a Second Amendment violation.” A denial of leave to amend for futility should be with prejudice whenever a dismissal of the proposed complaint would have been with prejudice, Miller, 845 F.2d at 214, that is, if the proposed complaint “could not be saved by amendment,” Eminence Capital, LLC v. Aspeon, Inc., 316 F.3d 1048, 1052 (9th Cir.2003).
But the Nordykes submitted the Proposed Second Amended Complaint over six years ago. Since then, all of the Supreme Court’s modern Second Amendment case law has been created. See McDonald v. Chicago, — U.S.-, 130 S.Ct. 3020, 177 L.Ed.2d 894 (2010); District of Columbia v. Heller, 554 U.S. 570, 128 S.Ct. 2783, 171 L.Ed.2d 637 (2008); cf. Nordyke TV, 563 F.3d at 459(“Seeond Amendment law remains in its infancy.”). Accordingly, there may well be facts which the Nordykes did not consider relevant in 2004, and thus did not allege in the Proposed Second Amended Complaint, but which, if now alleged, might plausibly suggest that the Ordinance substantially burdens the Nordykes’ Second Amendment rights.
Therefore, to the extent that the district court’s denial of leave to amend was with prejudice, it must be vacated and the Nordykes given the opportunity further to amend their complaint. If they do, the district court should consider, in light of Heller, McDonald, and this opinion, whether the Nordykes have alleged a viable Second Amendment claim.
IV
Judge Gould respectfully disagrees with the substantial burden framework that we adopt today. Instead, he would “subject to heightened scrutiny only arms regulations falling within the core purposes of the Second Amendment.” Concur. at 795. All other gun-control regulations would trigger only “reasonableness review.” Id. Depending on how one reads Judge Gould’s framework, we suggest that it is either equivalent to the approach we adopt today, or inconsistent with the Supreme Court’s decisions in Heller and McDonald.
On one reading, Judge Gould’s approach is roughly the same as our own. After all, it is not initially clear how determining whether a regulation “substantially burdens the right to keep and to bear arms” is different from determining whether the regulation “fall[s] within the core purposes of the Second Amendment.” Both approaches would require a court to determine the extent to which a regulation interferes with the right to keep and to bear arms, and both would apply heightened scrutiny only to regulations whose interference with the right reaches a certain threshold.
Judge Gould seems to think his “core purposes” test does not require any such degree-of-burden analysis. For instance, he insists that “[l]aws banning handguns are constitutionally suspect not because they ‘burden’ the Second Amendment right, but because they proscribe the very activity that the Second Amendment protects — armed defense of the home.” Concur. at 797. But a handgun ban does not “proscribe” armed self-defense; it just makes it far more difficult. Thus, in Heller, the District of Columbia asserted that “it is permissible to ban the possession of handguns so long as the possession of other firearms (i.e., long guns) is allowed.” 554 U.S. at 629, 128 S.Ct. 2783. In order to reject this argument, the Heller majority had to establish that handguns are extremely useful for self-defense and, therefore, that the handgun ban seriously undermined the right to armed self-defense. Id. Given the infinite variety of conceivable gun-control regulations, we suspect that applying Judge Gould’s test would require a similar degree-of-burden assessment in order to determine which regulations conflict with the “core purposes” of the Second Amendment and which do not.
Judge Gould’s framework could also be read as applying mere rational basis scrutiny to every gun-control regulation that is not a complete ban on handguns. This reading is suggested by Judge Gould’s statements that “reasonableness should be our guide in the Second Amendment context,” Concur, at 796, and that he “would be deferential to a legislature’s reasonable regulations unless they specifically restrict defense of the home, resistance of tyrannous government, or protection of country,” id. at 797. But the Supreme Court has rejected an approach that would enforce the Second Amendment wholly, or primarily, through rational basis review. See Heller, 554 U.S. at 629 n. 27, 128 S.Ct. 2783 (“If all that was required to overcome the right to keep and bear arms was a rational basis, the Second Amendment would be redundant with the separate constitutional prohibitions on irrational laws, and would have no effect.”); cf. McDonald, 130 S.Ct. at 3044 (refusing to treat the Second Amendment as a “second-class right, subject to an entirely different body of rules than the other Bill of Rights guarantees”).
Appearing to defend this second reading of his approach, Judge Gould asserts that “[i]n the First Amendment context, we do not hold time, place, and manner speech restrictions to be constitutionally suspect when they substantially burden speech.” Concur. at 797. But, even content-neutral time, place, and manner restrictions are suspect if they fail to “leave open ample alternative channels for communication.” Ward, 491 U.S. at 791, 109 S.Ct. 2746. That is just another way of saying that such regulations cannot be too “restrictive,” id. at 802, 109 S.Ct. 2746, or, too burdensome. Accordingly, the Court has struck down content-neutral, time, place, and manner restrictions that are so broad as to burden substantially one’s freedom of speech. See Martin v. Struthers, 319 U.S. 141, 63 S.Ct. 862, 87 L.Ed. 1313 (1943) (striking down an ordinance banning door-to-door solicitation); Schneider v. New Jersey, 308 U.S. 147, 162-63, 60 S.Ct. 146, 84 L.Ed. 155 (1939) (striking down an ordinance prohibiting the distribution of handbills).
Drawing from these cases, we have directed lower courts, when deciding whether a restriction on gun sales substantially burdens Second Amendment rights, to ask whether the restriction leaves law-abiding citizens with reasonable alternative means for obtaining firearms sufficient for self-defense purposes. See supra Part III.A. By contrast, Judge Gould would apparently apply rational basis review to every gun sales regulation, even if it made guns nearly impossible to obtain. This is alarming since almost every gun-control regulation — even those amounting to de facto gun bans — is rationally related to the government’s legitimate interest in reducing gun crime. See Heller, 554 U.S. at 629 n. 27, 128 S.Ct. 2783 (“[Tjhis law, like almost all laws, would pass rational-basis scrutiny.”). The Supreme Court was not exaggerating when it insisted that a Second Amendment backed only by rational basis review would have “no effect.” Heller, 554 U.S. at 629 n. 27, 128 S.Ct. 2783.
Finally, Judge Gould asserts that there is a difference between “rational basis review” and “reasonableness review,” in that the latter “ ‘focuses on the balance of the interests at stake, rather than merely on whether any conceivable rationale exists.’ ” Concur. at 798 (quoting State v. Cole, 264 Wis.2d 520, 665 N.W.2d 328, 338 (2003)). This interest-balancing test sounds exactly like Justice Breyer’s “interest-balancing” test that would ask “whether the statute burdens a protected interest ... out of proportion to the statute’s salutary effects upon other important governmental interests.” Heller, 554 U.S. at 689-90, 128 S.Ct. 2783 (Breyer, J., dissenting). We believe the Supreme Court has rejected such an approach in no uncertain terms. See id. at 634-35, 128 S.Ct. 2783; McDonald, 130 S.Ct. at 3047(“In Heller ... we expressly rejected the argument that the scope of the Second Amendment right should be determined by judicial interest balancing.”).
V
The Nordykes also appeal from the district court’s grant of summary judgment on their First Amendment claim.
We have already laid out the template for analyzing the Nordykes’ First Amendment claim, albeit in the context of a facial challenge:
In evaluating the Nordykes claim, we must ask whether “[a]n intent to convey a particularized message [is] present, and [whether] the likelihood [is] great that the message would be understood by those who viewed it.” Spence v. Washington, 418 U.S. 405, 410-11 [94 S.Ct. 2727, 41 L.Ed.2d 842] (1974). If the possession of firearms is expressive conduct, the question becomes whether the County’s “regulation is related to the suppression of free expression.” Texas v. Johnson, 491 U.S. 397, 403 [109 S.Ct. 2533, 105 L.Ed.2d 342] (1989). If so, strict scrutiny applies. If not, we must apply the less stringent standard announced in United States v. O’Brien, 391 U.S. 367, 377 [88 S.Ct. 1673, 20 L.Ed.2d 672] (1968).
Nordyke III, 319 F.3d at 1189. Because the County “does not contest that gun possession in the context of a gun show may involve certain elements of protected speech,” we assume, without deciding, that the display of guns at a gun show is expressive conduct under Spence.
A
The next question is whether to apply strict scrutiny to the Ordinance under Johnson or “the less stringent standard” of O’Brien. The level of scrutiny depends on whether the Ordinance is “related to the suppression of free expression.” Johnson, 491 U.S. at 407, 109 S.Ct. 2533(internal quotation marks and citation omitted). That is, the government may not “proscribe particular conduct because it has expressive elements.” Id. at 406, 109 S.Ct. 2533. If a law hits speech because it aimed at it, then courts apply strict scrutiny; but if it hits speech without having aimed at it, then courts apply the O’Brien intermediate scrutiny standard. See id. at 407, 109 S.Ct. 2533(“[T]he governmental interest in question [must] be unconnected to expression in order to come under O’Brien’s less demanding rule.”).
The Nordykes argue that the County adopted the Ordinance in order to prevent members of the “gun culture” from expressing their views about firearms and the Second Amendment. However, the Ordinance’s language suggests that gun violence, not gun culture, motivated its passage. Section 9.12.120(a) recites several statistics about gunshot deaths and injuries in Alameda County and then concludes that “[p]rohibiting the possession of firearms on County property will promote the public health and safety by contributing to the reduction of gunshot fatalities and injuries in the County.” Id. Nevertheless, the Nordykes point to alternative evidence of the Ordinance’s purpose: the comments of Supervisor King and the section 9.12.120(f)(4) exception for authorized fire-arm use at certain artistic events.
King’s private and public remarks, quoted above, could be read to suggest that she harbored a motive to exclude people of a certain view on gun use from the fairgrounds. But the feelings of one county official do not necessarily bear any relation to the aims and interests of the county legislature as a whole. Indeed, the O’Brien Court admonished litigants against attributing the motivations of legislators to legislatures:
What motivates one legislator to make a speech about a statute is not necessarily what motivates scores of others to enact it, and the stakes are sufficiently high for us to eschew guesswork. We decline to void essentially on the ground that it is unwise legislation which Congress had the undoubted power to enact and which could be reenacted in its exact form if the same or another legislator made a ‘wiser’ speech about it.
391 U.S. at 384, 88 S.Ct. 1673.
In Johnson, too, the Court determined whether the law at issue was related to the suppression of speech without psychoanalyzing its authors. The opinion did not mention legislative history or the stated motives of any legislator. Instead, it analyzed the statute in terms of the interests the state declared, not the personal likes or dislikes of the law’s backers. Other First Amendment cases are of a piece. See, e.g., City of Renton v. Playtime Theatres, Inc., 475 U.S. 41, 48, 106 S.Ct. 925, 89 L.Ed.2d 29 (1986) (“The ordinance by its terms is designed to prevent crime, protect the city’s retail trade, maintain property values, and generally protect and preserve the quality of the city’s neighborhoods, commercial districts, and the quality of urban life, not to suppress the expression of unpopular views.” (emphasis added) (internal quotation marks and alterations omitted)).
This approach is particularly appropriate here, because the County has offered a plausible purpose for the Ordinance: the reduction of gun violence on county property. The Ordinance itself proclaims that purpose; even Supervisor King expressed it during her press conference.
Undeterred, the Nordykes insist that the Ordinance’s exception for certain artistic productions or events reveals its constitutionally suspect motives. They cry foul because the Ordinance effectively bans gun shows at the fairgrounds, while going out of its way to accommodate gun-bearing military reenactors. But statutes frequently have exceptions; the exceptions only suggest unconstitutional favoritism if what they allow generates problems that are so similar to what they prohibit as to admit of no other rational explanation. See Metromedia, Inc. v. City of San Diego, 453 U.S. 490, 510-12, 101 S.Ct. 2882, 69 L.Ed.2d 800 (1981) (plurality opinion). It is not difficult to see how 4000 shoppers trading in modern firearms is sufficiently distinct from a crowd of history buffs dressed in traditional garb playing with blank ammunition.
Accordingly, we reject the Nordykes’ invitation to apply strict scrutiny because we conclude that the Ordinance is “unrelated to the suppression of free expression.” Johnson, 491 U.S. at 407, 109 S.Ct. 2533(internal quotation marks and citation omitted). Instead, O’Brien’s intermediate scrutiny standard applies.
B
“[W]hen ‘speech’ and ‘non-speech’ elements are combined in the same course of conduct, a sufficiently important governmental interest in regulating the nonspeech element can justify incidental limitations on First Amendment freedoms.” O’Brien, 391 U.S. at 376, 88 S.Ct. 1673. More specifically, “a government regulation is sufficiently justified if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest.” Id. at 377, 88 S.Ct. 1673.
Because the Nordykes no longer argue that the County lacks the power to regulate firearms possession on county property, see Nordyke II, 118 Cal.Rptr.2d 761, 44 P.3d 133(stating that the Ordinance is not preempted by state law), we need not address the first prong.
The second prong requires us to evaluate whether the Ordinance furthers the County’s interest in promoting safety and discouraging violence. The Nordykes argue that, given their as-applied challenge, the Ordinance is unconstitutional because the County cannot show that any violence ever occurred at their gun shows. But, even for an as-applied challenge, the government need not show that the litigant himself actually contributes to the problem that motivated the law he challenges. See, e.g., Clark, 468 U.S. at 296-97, 104 S.Ct. 3065 (“[T]he validity of this regulation need not be judged solely by reference to the demonstration at hand.”); One World One Family Now v. City & Cnty. of Honolulu, 76 F.3d 1009, 1013 n. 6 (9th Cir.1996) (noting, in the context of an as-applied challenge, that the government need not “offer any concrete evidence demonstrating that [the plaintiffs activities] actually” caused the harm the government sought to prevent). Rather, it is enough that the regulation generally “furthers an important or substantial governmental interest.” O’Brien, 391 U.S. at 376, 88 S.Ct. 1673. Here, there is sufficient evidence to suggest that the Ordinance furthers the County’s interest in keeping those on its property safe from gun crime.
The third prong of the O’Brien test simply repeats the threshold inquiry of whether the statute is unrelated to the suppression of free expression, which we addressed above. Which leaves the fourth and final prong: whether the restriction on free expression is greater than necessary to further the government’s interest. The Nordykes assert that there are less restrictive ways the County could reduce gun violence, such as by using metal detectors. But metal detectors would not reduce gun violence on county property unless county officials could confiscate the guns that those devices discover. And county officials could not confiscate the guns which the metal detectors discover unless it were illegal to possess firearms on county property. The County thought it dangerous for people to possess firearms on its property. Banning or strictly regulating gun possession on county land is a straightforward response to such a danger.
We conclude that the Ordinance passes the O’Brim test as applied to the Nor-dykes’ gun shows. The district court properly granted summary judgment to the' County on this claim.
VI
The Nordykes’ final claim alleges a violation of the Equal Protection Clause. This claim revolves around their suspicion that the exception in the Ordinance for certain artistic events, Alameda Code § 9.12.120(f)(4), was designed to favor military reenactors over gun show participants, an alleged favoritism resting on the County’s disdain for the “gun culture.”
Where, as here, an ordinance does not “purposefully operate[ ] to the detriment of a suspect class, the only requirement of equal protection is that [the ordinance] be rationally related to a legitimate governmental interest.” Harris, 448 U.S. at 326, 100 S.Ct. 2671; see also Romer v. Evans, 517 U.S. 620, 631, 116 S.Ct. 1620, 134 L.Ed.2d 855 (1996) (stating that, because “most legislation classifies for one purpose or another, with resulting disadvantage to various groups,” the Court will uphold a legislative classification so long as it “neither burdens a fundamental right nor targets a suspect class,” and “bears a rational relation to some legitimate end”). Here, the burdened class — be it “gun-owners,” or “gun-show promoters and participants” — is not suspect. See Olympic Arms v. Buckles, 301 F.3d 384, 388-89 (6th Cir.2002). And, although the right to keep and to bear arms for self-defense is a fundamental right, McDonald, 130 S.Ct. at 3036-43, that right is more appropriately analyzed under the Second Amendment. Cf. Albright v. Oliver, 510 U.S. 266, 273, 114 S.Ct. 807, 127 L.Ed.2d 114 (1994) (“Where a particular Amendment ‘provides an explicit textual source of constitutional protection’ against a particular sort of government behavior, ‘that Amendment, not the more generalized notion of substantive due process, must be the guide for analyzing these claims.’ ” (quoting Graham v. Connor, 490 U.S. 386, 395, 109 S.Ct. 1865, 104 L.Ed.2d 443 (1989))).
Therefore, the Nordykes’ equal protection claim will fail so long as the Ordinance’s distinction between military reenactments and gun shows is rational. See Romer, 517 U.S. at 631, 116 S.Ct. 1620. The County could reasonably conclude that gun shows are more dangerous than military reenactments. This is enough to satisfy rational basis scrutiny. See Williamson v. Lee Optical, 348 U.S. 483, 489, 75 S.Ct. 461, 99 L.Ed. 563 (1955) (“Evils in the same field may be of different dimensions and proportions, requiring different remedies. Or so the legislature may think.”).
Accordingly, the district court correctly awarded the County summary judgment on the equal protection claim.
VII
For the foregoing reasons, we AFFIRM the district court’s grant of summary judgment to the County on the Nordykes’ First Amendment and equal protection claims. Because the Nordykes may still be able to allege sufficient facts to state a Second Amendment claim, we VACATE the district court’s denial of leave to amend the complaint to the extent that the denial was with prejudice, and REMAND for further proceedings.
Each party shall bear its own costs. AFFIRMED in part, VACATED in part, and REMANDED.
GOULD, Circuit Judge,
concurring in part and in the judgment:
I concur in the majority opinion to the extent that it affirms the dismissal of the plaintiffs’ complaint and remands to allow amendment of pleadings, giving plaintiffs an opportunity to seek to assert an actionable claim in light of recent developments in Second Amendment law. However, I would use a test to decide Second Amendment claims different from that set out by the majority. Drawing from First Amendment doctrine, I would subject to heightened scrutiny only arms regulations falling within the core purposes of the Second Amendment, that is, regulations aimed at restricting defense of the home, resistance of tyrannous government, and protection of country; I would subject incidental burdens on the Second Amendment right (analogous to time, place, and manner speech restrictions) to reasonableness review. Cf. Pleasant Grove City v. Summum, 555 U.S. 460, 129 S.Ct. 1125, 1132, 172 L.Ed.2d 853 (2009) (“Reasonable time, place, and manner restrictions are allowed, but any restriction based on the content of the speech must satisfy strict scrutiny .... ” (citations omitted)).
I
When we first heard this case eight years ago, before the Supreme Court provided for an individual Second Amendment right in District of Columbia v. Heller, 554 U.S. 570, 128 S.Ct. 2783, 171 L.Ed.2d 637 (2008), I urged that “[w]e should recognize that individual citizens have a right to keep and bear arms, subject to reasonable restriction by the government.” Nordyke v. King, 319 F.3d 1185, 1193 (9th Cir.2003) (Gould, J., concurring). My special concurrence foreshadowed the issue before us today:
[TJhough recognizing an individual right to keep and bear arms, government can within due bounds regulate ownership or use of weapons for the public good. We would make progress if the Supreme Court were to establish a doctrine of an individual Second Amendment right subject to reasonable government regulation. The decisional chips would thereafter fall where they may on the basis of particular cases and the delicate balance of their precise facts, aided by the complementary efforts of lawyers, scholars and judges. The law would best put aside extreme positions and adopt an assessment of reasonableness of gun regulation, for this would place us on the right track.
Id. at 1197. I cited in support of my view the position of the United States as stated in a brief opposing certiorari and in a memorandum from then-Attorney General John Ashcroft, both of which said that the Second Amendment protects an individual right with “reasonable [arms] restrictions” permitted. See id. at 1193 nn. 1-2. My view continues to be that reasonableness should be our guide in the Second Amendment context.
This view finds support in the controlling Supreme Court opinions. Heller identifies a number of “presumptively lawful regulatory measures,” 554 U.S. at 627 n. 26, 128 S.Ct. 2783, such as “prohibitions on the possession of firearms by felons and the mentally ill, or laws forbidding the carrying of firearms in sensitive places such as schools and government buildings, or laws imposing conditions and qualifications on the commercial sale of arms.” Id. at 626-27, 128 S.Ct. 2783. Despite this guidance, the majority would subject at least some of these “presumptively lawful” arms restrictions to a level of scrutiny that by definition presumes them unlawful. See 1 Rodney A. Smolla & Melville B. Nimmer, Freedom of Speech § 4:3 (2010) (“When some form of heightened scrutiny is applied, the law may properly be regarded as ‘presumptively’ invalid, and likely to be struck down.” (emphasis added)); see also Emp’t Div., Dept. of Human Res. v. Smith, 494 U.S. 872, 888, 110 S.Ct. 1595, 108 L.Ed.2d 876 (1990) (explaining that heightened scrutiny deems laws “presumptively invalid ”). Given the Supreme Court’s admonition that certain arms restrictions are presumptively lawful, “a heightened standard that presumes every regulation to be unconstitutional makes no sense.” Winkler, supra, at 708. To take one example, the majority erects a high hurdle for felon dispossession laws to surmount. I would not read Heller to require such rigorous review.
The majority, I think incorrectly, reads Heller as “sort[ing] [arms] regulations based on the burden they impose[ ] on the right to keep and to bear arms for self-defense.” Maj. op. at 784. Heller nowhere assesses the extent of a handgun ban’s “burden” on the Second Amendment right. Rather, Heller holds that a law barring home-possession of handguns is categorically impermissible because it targets “ ‘the most preferred firearm in the nation to “keep” and use for protection of one’s home and family,’ ” 554 U.S. at 628-29, 128 S.Ct. 2783(quoting Parker, 478 F.3d at 400), and “makes it impossible for citizens to use [arms] for the core lawful purpose of self-defense,” id. at 630, 128 5. Ct. 2783. Laws banning handguns are constitutionally suspect not because they “burden” the Second Amendment right, but because they proscribe the very activity that the Second Amendment protects— armed defense of the home, a right that millions of Americans rightly and wisely respect.
In the First Amendment context, we do not hold time, place, and manner speech restrictions to be constitutionally suspect when they substantially burden speech. Strict scrutiny and presumed invalidity is triggered when a regulation restricts the content of speech, not by the extent of a regulation’s incidental burden. See Clark, 468 U.S. at 293-99, 104 S.Ct. 3065; Frisby v. Schultz, 487 U.S. 474, 481-88, 108 S.Ct. 2495, 101 L.Ed.2d 420 (1988). Similarly in the Second Amendment context, I would be deferential to a legislature’s reasonable regulations unless they specifically restrict defense of the home, resistance of tyrannous government, or protection of country.
II
Some scholars and judges have argued that reviewing arms restrictions for reasonableness is too deferential to legislative determinations. Some have proposed complex doctrines to aid the sorting of gun control laws into categories of constitutional and unconstitutional. These approaches suffer from the error of “viewing] the Second Amendment exclusively or primarily with the issue in mind of whether it constrains gun control.” Nordyke, 319 F.3d at 1197 n. 11 (Gould, J., specially concurring). The Framers of our Constitution and its Bill of Rights did not have in mind modern-day guns and corollary regulations, and we should not craft our judicial doctrine from the premise that the Second Amendment necessarily proscribes existing restrictions.
The majority opinion criticizes reasonableness review for “applying mere rational basis scrutiny to every gun-control regulation that is not a complete ban on handguns.” Maj. op. at 790. But this conflates reasonableness review with rational basis review. “[T]he reasonableness test focuses on the balance of the interests at stake, rather than merely on whether any conceivable rationale exists under which the legislature may have concluded the law could promote the public welfare.” State v. Cole, 264 Wis.2d 520, 665 N.W.2d 328, 338 (2003). For example, state court decisions applying the reasonable regulation test have invalidated blanket bans on the transportation of firearms. See, e.g., City of Junction City v. Mevis, 226 Kan. 526, 601 P.2d 1145, 1152 (1979); City of Lakewood v. Pillow, 180 Colo. 20, 501 P.2d 744, 745 (1972); City of Las Vegas v. Moberg, 82 N.M. 626, 485 P.2d 737, 738 (Ct.App.1971). But these restrictions would surely have been upheld if scrutinized for only a conceivable rational basis. The majority’s warning that reasonableness review would approve laws that “ma[k]e guns nearly impossible to obtain,” Maj. op. 790, is therefore unwarranted.
For the Second Amendment’s protection to be meaningful, judges need hot inject their preferences into all arms policy decisions.
[B]y employing a deferential standard the courts can oversee governmental regulation of the arms right and guard against extreme and excessive laws that effectively eliminate the core right to bear arms.... [Cjourts can serve as a check on the elected branches to insure that legislation does not eliminate the basic right. If gun control laws are excessive, the courts can ... provide some relief for the affected individuals. Where a law is so broad as to make gun ownership — or at least gun purchasing and repair — illegal, the courts insure that the underlying right is more than illusory. The reasonable regulation standard enables the courts to act as a safety valve to counter governmental overreaching, but does not seriously interfere with legislative authority to regulate firearms in the interests of public safety.
Winkler, supra, at 725. The line of precedent interpreting state constitutions, including “hundreds of cases involving challenges to a wide array of gun laws,” is instructive. Allen Rostron, Protecting Gun Rights and Improving Gun Control after District of Columbia v. Heller, 13 Lewis & Clark L.Rev. 383, 407 (2009). Among state courts, “there is an overwhelming consensus that government restrictions on guns are valid if they are ‘reasonable regulations.’ ” Id. (internal citation omitted). The standard applied by state courts, while deferential, is not toothless; state courts “have used it to strike down laws found to be arbitrary or to amount to a complete denial of the right to bear arms.” Id. at 407-08(internal quotation omitted). “States have far more experience than the federal government when it comes to charting the lines between gun rights and safety regulation, and the ‘reasonableness’ standard they have unanimously endorsed both reflects their collective wisdom on the subject and permits individual states to tailor gun regulations to their own circumstances.” Joseph Blocher, Reverse Incorporation of State Constitutional Law, 84 So. Cal. L.Rev. 323, 383 (2011). Our doctrine should be a bulwark against impermissibly arbitrary and sweeping arms restrictions, indeed it should be “the palladium of the liberties of a republic,” to borrow a phrase from Justice Story in his famed Commentaries on the Constitution of the United States, but it should not constrain enactment of commonsense public safety policies.
Ill
I have written repeatedly of the vital interests served by a robust and vibrant Second Amendment. Central to the Amendment’s core purpose is not just defense of the home, as emphasized by the Supreme Court in Heller, but also defense of country from both foreign intrusion and internal tyranny. Those who have learned, even imperfectly, the lessons of history, and who understand that human nature does not change as rapidly as technology, will recognize that these are not phantom threats but core values protected by the Second Amendment. Our government has been democratic and our borders secure, and so it is hard for modern minds to consider the need to take up arms for protection of country from threats both internal and external. But constitutions are designed to endure and the Bill of Rights must be interpreted in light of the long period of time over which we hope that our country will thrive. The Framers of the Second Amendment had in mind that an armed citizenry can both repel external aggression and check the danger of an internal government degenerating to tyranny.
As I have said previously, “I do not think that individual rights under the Second Amendment are outmoded.... The Second Amendment was designed to provide national security not only when our country is strong but also if it were to become weakened or otherwise subject to attack. As the people bear the risk of loss of their freedom and the pain of any attack, our Constitution provides that the people have a right to participate in defense of the Nation. The Second Amendment protects that fundamental right.” Nordyke v. King, 364 F.3d 1025, 1037 (9th Cir.2004) (Gould, J., dissenting from denial of rehearing en banc) (internal alterations and citation omitted).
Prudent, measured arms restrictions for public safety are not inconsistent with a strong and thriving Second Amendment. For that reason, I disagree with and do not join the portion of the majority opinion that requires heightened scrutiny for arms regulations substantially burdening the right to bear arms, even though these may represent reasonable arms regulations.
. The Ordinance does, however, contain an exception for "[t]he possession of a firearm by an authorized participant in a motion picture, television, video, dance, or theatrical production or event....” Alameda Code § 9.12.120(f)(4). This exception was apparently added in response to complaints by military reenactors, who wished to use firearms loaded with blank ammunition.
. At the press conference, King said that she "finds it ridiculous that the county is participating ... in the distribution of guns” by hosting gun shows on the county fairgrounds. She found it "strange,” that "a facility owned by the residents of this county” is used "to display guns for worship as deities for the collectors who treat them as icons of patriotism.” She spoke of her past “efforts ... to outlaw[gun] shows on county property,” and implied that the Ordinance was the fruit of these efforts. King later referred to gun show supporters as "gun worshipers.”
. To support this assertion, the Nordykes note that more than half of the would-be vendors at their gun show canceled their plans to attend after the Ordinance passed. These vendors allegedly stated that they would not participate in a gun show where guns could not be displayed.
. Significantly, the Nordykes have made clear that the Second Amendment violation, which they and their co-plaintiffs allegedly suffered, stems wholly from the Nordykes’ inability to conduct a successful gun show at the county fairgrounds. Indeed, the Proposed Second Amended Complaint notes repeatedly that "[s]imply adding gun shows ... to the list of events exempt from the general prohibition [of possessing guns on county property] would have been sufficient to prevent this particular lawsuit from being filed.” The proposed complaint never alleges that any of the plaintiffs wished to carry guns onto county property for the purpose of defending themselves while on that property.
. This motion, now at issue, was filed six years ago, on December 4, 2004.
. We recently upheld the constitutionality of 18 U.S.C. § 924(c)(1)(A), which criminalizes the possession of a gun in furtherance of a drug crime, against a Second Amendment challenge. See United States v. Potter, 630 F.3d 1260 (9th Cir.2011). But we declined to adopt a standard of review for Second Amendment analysis in that case.
. The reasons the Court listed were that handguns are "easier to store in a location that is readily accessible in an emergency," they "cannot easily be redirected or wrestled away by an attacker," they are "easier to use for those without the upper-body strength to lift and aim a long gun,” and they "can be pointed at a burglar with one hand while the other hand dials the police.” Heller, 554 U.S. at 629, 128 S.Ct. 2783.
. Admittedly, there is some dispute over whether the right to obtain an abortion still enjoys "fundamental” status. See Lawrence v. Texas, 539 U.S. 558, 589-95, 123 S.Ct. 2472, 156 L.Ed.2d 508 (2003) (Scalia, J., dissenting) (arguing that Roe’s statement that abortion is a "fundamental right” has been undermined by subsequent cases holding that only rights that are " 'deeply rooted in this Nation’s history and tradition' ” are “fundamental” (quoting Washington v. Glucksberg, 521 U.S. 702, 721, 117 S.Ct. 2258, 138 L.Ed.2d 772 (1997))). Compare Roe v. Wade, 410 U.S. 113, 155, 93 S.Ct. 705, 35 L.Ed.2d 147 (1973) (deeming the right to an abortion “fundamental”), with Casey, 505 U.S. at 843-912, 112 S.Ct. 2791(not once describing abortion as a "fundamental right” or a "fundamental liberty interest”). We express no opinion on this issue.
. We need not decide today precisely what type of heightened scrutiny applies to laws that substantially burden Second Amendment rights.
. Indeed, the Proposed Second Amended Complaint repeatedly notes that simply excepting gun shows from the ban on possessing guns on county property "would have been sufficient to prevent this particular lawsuit from being filed.”
. Even if the Court construes the claim as a facial challenge — an interpretation which the proposed complaint does not support — such a challenge would clearly fail because the Nor-dykes have not alleged that the Ordinance "would be unconstitutional in a large fraction of relevant cases,” Carhart, 550 U.S. at 124, 127 S.Ct. 1610, let alone that it would be unconstitutional in all cases, see Ohio v. Akron Ctr. for Reproductive Health, 497 U.S. 502, 514, 110 S.Ct. 2972, 111 L.Ed.2d 405 (1990) ("[BJecause appellees are making a facial challenge to a statute, they must show that no set of circumstances exists under which the Act would be valid” (internal quotation marks omitted)); United States v. Salerno, 481 U.S. 739, 745, 107 S.Ct. 2095, 95 L.Ed.2d 697 (1987) ("A facial challenge to a legislative Act is ... the most difficult challenge to mount successfully, since the challenger must establish that no set of circumstances exists under which the Act would be valid.”). Instead, the Nordykes only discuss one application of the Ordinance — to gun shows on fairgrounds.
. Under Federal Rule of Civil Procedure 15(a), leave to amend should be given freely, but need not be granted when the proposed amendment is futile. See Universal Mortgage Co. v. Prudential Ins. Co., 799 F.2d 458, 459 (9th Cir.1986). A proposed amended complaint is futile if it would be immediately "subject to dismissal.” Steckman v. Hart Brewing, Inc., 143 F.3d 1293, 1298 (9th Cir.1998). Thus, the "proper test to be applied when determining the legal sufficiency of a proposed amendment is identical to the one used when considering the sufficiency of a pleading challenged under Rule 12(b)(6).” Miller v. Rykoff-Sexton, Inc., 845 F.2d 209, 214 (9th Cir.1988). In evaluating whether the district court should have granted the Nordykes' motion for leave to amend, therefore, we look only to facts pled in the Proposed Second Amended Complaint. See Ashcroft v. Iqbal, — U.S. -, 129 S.Ct. 1937, 1949-50, 173 L.Ed.2d 868 (2009).
. Before Heller, the Court last considered the meaning of the Second Amendment in United States v. Miller, 307 U.S. 174, 59 S.Ct. 816, 83 L.Ed. 1206 (1939). For years, several courts, including our own, read Miller to hold that the Second Amendment does not afford individuals the right to keep and to bear arms for self-defense. See, e.g., Hickman, 81 F.3d at 101.
. Heller made clear that the right it recognized is not "a right to keep and carry any weapon whatsoever in any manner whatsoever and for whatever purpose,” asserting that “nothing in our opinion should be taken to cast doubt on longstanding prohibitions on the possession of firearms by felons and the mentally ill, or laws forbidding the carrying of firearms in sensitive places, such as schools and government buildings, or laws imposing conditions and qualifications on the commercial sale of arms.” 554 U.S. at 626, 128 S.Ct. 2783. In a footnote, the Court stated that "we identify these presumptively lawful regulatory measures only as examples; our list does not purport to be exhaustive.” Id. at 627 n. 26, 128 S.Ct. 2783.
Judge Gould focuses on the footnote's reference to “presumptively lawful regulations,” reading it to mean "regulations that will command only rationality review.” Concur, at 796. We believe it most unlikely that, in a one-sentence footnote, the Supreme Court would undermine the rest of its analysis by declaring, inter alia, that all gun sales regulations, no matter how burdensome, should receive the rubber stamp of rational basis review. Instead, we read “presumptively lawful regulations” to mean "regulations which we presume will survive constitutional scrutiny,” and to say nothing about what standard of review should be applied to them. This reading fits with the context in which the remark was made: cautioning readers against overreading the opinion. As Judge Easterbrook put it, this section of Heller is merely “precautionary language” that "warns readers not to treat Heller as containing broader holdings than the Court set out to establish.” United States v. Skoien, 614 F.3d 638, 640 (7th Cir.2010).
. Time, place, and manner restrictions, while sometimes said to be subject to intermediate scrutiny, are normally upheld when reasonable. See Board of Trustees of State University of New York v. Fox, 492 U.S. 469, 480, 109 S.Ct. 3028, 106 L.Ed.2d 388 (1989) ("What our decisions require is a 'fit' between the legislature’s ends and the means chosen to accomplish those ends.... Within those bounds we leave it to governmental decision-makers to judge what manner of regulation may best be employed.” (internal quotation marks and citations omitted)); City of Renton v. Playtime Theatres, Inc., 475 U.S. 41, 47, 106 S.Ct. 925, 89 L.Ed.2d 29 (1986) ("[T]ime, place, and manner regulations are acceptable so long as they are designed to serve a substantial governmental interest and do not unreasonably limit alternative avenues of communication.”); Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 313-15, 104 S.Ct. 3065, 82 L.Ed.2d 221 (1984) (Marshall, J., dissenting) ("[Rjegulations that are aimed at matters other than expression receive only a minimal level of scrutiny ... [and it is assumed] that the balance struck by officials is deserving of deference so long as it does not appear to be tainted by content discrimination.”).
. See Parker v. District of Columbia, 478 F.3d 370, 399 (D.C.Cir.2007) ("The protections of the Second Amendment are subject to the same sort of reasonable restrictions that have been recognized as limiting, for instance, the First Amendment.”), aff’d, District of Columbia v. Heller, 554 U.S. 570, 128 S.Ct. 2783, 171 L.Ed.2d 637 (2008).
. One commentator observed of the Ashcroft memorandum, “After setting forth the administration’s support for the individual-rights reading, [it] stated that ‘[t]he Department [of Justice] can and wili continue to defend vigorously the constitutionality, under the Second Amendment, of all existing federal firearms laws.' In other words, in the Department’s view, every single federal law burdening the right to bear arms remains constitutional. ..." Adam Winkler, Scrutinizing the Second Amendment, 105 Mich. L.Rev. 683, 691-92 (2007).
. We are bound by the Supreme Court's instruction that these sorts of regulations are “presumptively lawful,” and have rejected the suggestion that the instruction is mere dictum. United States v. Vongxay, 594 F.3d 1111, 1115 (9th Cir.2010); see also United States v. Barton, 633 F.3d 168, 171 (3d Cir.2011).
. See C. Kevin Marshall, Why Can't Martha Stewart Have a Gun?, 32 Harv. J.L. & Pub. Pol'y 695, 730 (2009) ("[Ajbsent conviction for some 'crime of violence,’ ... it is difficult to see how the Second Amendment could allow a convict to be disabled from keeping or bearing arms.”); Andrew R. Gould, The Hidden Second Amendment Framework Within District of Columbia v. Heller, 62 Vand.L.Rev. 1535, 1567 (2009) (“If the Heller Court had truly subjected this list of 'presumptively lawful regulatory measures’ to conventional strict scrutiny, it is doubtful that any of the regulations would be upheld.”).
. Heller s statement that the Second Amendment protects only weapons "in common use” further belies the majority's "substantial burden” review. To be sure, laws barring possession of military-grade weapons might be argued to substantially burden the right to have weapons. Indeed, these laws completely foreclose the use of arms designed for large-scale military purposes. Nonetheless, these laws in my view are indisputably permissible because they do not tread on the Second Amendment’s core purposes and are reasonable. I do not mean to be facetious, but to me it is obvious that the Second Amendment does not protect the right to keep a nuclear weapon in one’s basement, or a chemical or biological weapons in one’s attic, or a tank in one's backyard. Either such weapons do not constitute “arms” within the meaning of the Second Amendment, or regulation must nonetheless be sustained to protect society’s interest. In any event, such weapons are not "in common use” within the meaning of Heller.
. An example of an arms regulation that specifically restricts resistance of tyrannous government is a law barring only members of a disfavored or dissident group from gun ownership. This sort of regulation is a familiar way that autocrats have seized and centralized power. See David C. Williams, Constitutional Tales of Violence: Populists, Outgroups, and the Multicultural Landscape of the Second Amendment, 74 Tul. L.Rev. 387, 417 n.172 (1999) (collecting historical examples); see also Silveira v. Lockyer, 328 F.3d 567, 569 (9th Cir.2003) (Kozinski, J., dissenting from denial of rehearing en banc) ("Disarmament was the tool of choice for subjugating both slaves and free blacks in the South.... [T]he institution of slavery required a class of people who lacked the means to resist.”).
. Similarly, the majority's citation to Supreme Court authority disclaiming rational basis review is misplaced here, as I do not propose rational basis review.
. 3 Joseph Story, Commentaries on the Constitution of the United. States § 1890, at 746 (Boston, Hilliard, Gray & Col. 1833) ("The right of the citizens to keep and bear arms has justly been considered, as the palladium of the liberties of a republic; since it offers a strong moral check against the usurpation and arbitrary power of rulers....”).
. I disagree with the majority’s characterization of the law governing abortion. For example, the majority says that abortion’s status as a fundamental right is disputed and cites for that proposition only a dissenting opinion from an unrelated case. Maj. op. at 786 n. 8. But if dissenting opinions called into question whether legal rules are settled, then all Supreme Court opinions not commanding unanimity would be "disputed.” In any event, this appeal is not about abortion rights and the opinion of the court errs, I think seriously, when it inserts its views on abortion rights in a Second Amendment controversy.
| CASELAW |
The Impact of the COVID-19 Pandemic and Societal Infection Control Measures on Children and Adolescents' Mental Health: A Scoping Review.
Marchi J, Johansson N, Sarkadi A, Warner G
Front Psychiatry 12 (-) 711791 [2021-09-06; online 2021-09-06]
Background: The COVID-19 pandemic is primarily a crisis that affects people's physical health. However, it is well-known from previous epidemics and pandemics that there are other indirect negative impacts on mental health, among others. The purpose of this scoping review was to explore and summarise primary empirical research evidence on how the COVID-19 pandemic and societal infection control measures have impacted children and adolescents' mental health. Methods: A literature search was conducted in five scientific databases: PubMed, APA PsycINFO, Web of Science, CINHAL, and Social Science Premium Collection. The search string was designed using the Population (0-18 years), Exposure (COVID-19), Outcomes (mental health) framework. Mental health was defined broadly, covering mental well-being to mental disorders and psychiatric conditions. Results: Fifty-nine studies were included in the scoping review. Of these, 44 were cross-sectional and 15 were longitudinal studies. Most studies reported negative impact of the COVID-19 pandemic on child and adolescent mental health outcomes, yet the evidence was mixed. This was also the case for studies investigating societal control measures. Strong resilience, positive emotion regulation, physical activity, parental self-efficacy, family functioning and emotional regulation, and social support were reported as protective factors. On the contrary, emotional reactivity and experiential avoidance, exposure to excessive information, COVID-19 school concerns, presence of COVID-19 cases in the community, parental mental health problems, and high internet, social media and video game use were all identified as potentially harmful factors. Conclusions: Due to the methodological heterogeneity of the studies and geographical variation, it is challenging to draw definitive conclusions about the real impact of the COVID-19 pandemic on the mental health of children and adolescents. However, the existing body of research gives some insight to how parents, clinicians and policy makers can take action to mitigate the effects of COVID-19 and control measures. Interventions to promote physical activity and reduce screen time among children and adolescents are recommended, as well as parenting support programs.
Type: Review
PubMed 34552516
DOI 10.3389/fpsyt.2021.711791
Crossref 10.3389/fpsyt.2021.711791
pmc: PMC8451953
Publications 9.2.2 | ESSENTIALAI-STEM |
scispace - formally typeset
Search or ask a question
JournalISSN: 0192-8651
Journal of Computational Chemistry
Wiley
About: Journal of Computational Chemistry is an academic journal published by Wiley. The journal publishes majorly in the area(s): Ab initio & Density functional theory. It has an ISSN identifier of 0192-8651. Over the lifetime, 8715 publications have been published receiving 719447 citations. The journal is also known as: J Comput Chem.
Papers
More filters
Journal ArticleDOI
TL;DR: Two unusual extensions are presented: Multiscale, which adds the ability to visualize large‐scale molecular assemblies such as viral coats, and Collaboratory, which allows researchers to share a Chimera session interactively despite being at separate locales.
Abstract: The design, implementation, and capabilities of an extensible visualization system, UCSF Chimera, are discussed. Chimera is segmented into a core that provides basic services and visualization, and extensions that provide most higher level functionality. This architecture ensures that the extension mechanism satisfies the demands of outside developers who wish to incorporate new features. Two unusual extensions are presented: Multiscale, which adds the ability to visualize large-scale molecular assemblies such as viral coats, and Collaboratory, which allows researchers to share a Chimera session interactively despite being at separate locales. Other extensions include Multalign Viewer, for showing multiple sequence alignments and associated structures; ViewDock, for screening docked ligand orientations; Movie, for replaying molecular dynamics trajectories; and Volume Viewer, for display and analysis of volumetric data. A discussion of the usage of Chimera in real-world situations is given, along with anticipated future directions. Chimera includes full user documentation, is free to academic and nonprofit users, and is available for Microsoft Windows, Linux, Apple Mac OS X, SGI IRIX, and HP Tru64 Unix from http://www.cgl.ucsf.edu/chimera/.
35,698 citations
Journal ArticleDOI
TL;DR: A new density functional of the generalized gradient approximation (GGA) type for general chemistry applications termed B97‐D is proposed, based on Becke's power‐series ansatz from 1997, and is explicitly parameterized by including damped atom‐pairwise dispersion corrections of the form C6 · R−6.
Abstract: A new density functional (DF) of the generalized gradient approximation (GGA) type for general chemistry applications termed B97-D is proposed. It is based on Becke's power-series ansatz from 1997 and is explicitly parameterized by including damped atom-pairwise dispersion corrections of the form C(6) x R(-6). A general computational scheme for the parameters used in this correction has been established and parameters for elements up to xenon and a scaling factor for the dispersion part for several common density functionals (BLYP, PBE, TPSS, B3LYP) are reported. The new functional is tested in comparison with other GGAs and the B3LYP hybrid functional on standard thermochemical benchmark sets, for 40 noncovalently bound complexes, including large stacked aromatic molecules and group II element clusters, and for the computation of molecular geometries. Further cross-validation tests were performed for organometallic reactions and other difficult problems for standard functionals. In summary, it is found that B97-D belongs to one of the most accurate general purpose GGAs, reaching, for example for the G97/2 set of heat of formations, a mean absolute deviation of only 3.8 kcal mol(-1). The performance for noncovalently bound systems including many pure van der Waals complexes is exceptionally good, reaching on the average CCSD(T) accuracy. The basic strategy in the development to restrict the density functional description to shorter electron correlation lengths scales and to describe situations with medium to large interatomic distances by damped C(6) x R(-6) terms seems to be very successful, as demonstrated for some notoriously difficult reactions. As an example, for the isomerization of larger branched to linear alkanes, B97-D is the only DF available that yields the right sign for the energy difference. From a practical point of view, the new functional seems to be quite robust and it is thus suggested as an efficient and accurate quantum chemical method for large systems where dispersion forces are of general importance.
23,058 citations
Journal ArticleDOI
TL;DR: AutoDock Vina achieves an approximately two orders of magnitude speed‐up compared with the molecular docking software previously developed in the lab, while also significantly improving the accuracy of the binding mode predictions, judging by tests on the training set used in AutoDock 4 development.
Abstract: AutoDock Vina, a new program for molecular docking and virtual screening, is presented. AutoDock Vina achieves an approximately two orders of magnitude speed-up compared with the molecular docking software previously developed in our lab (AutoDock 4), while also significantly improving the accuracy of the binding mode predictions, judging by our tests on the training set used in AutoDock 4 development. Further speed-up is achieved from parallelism, by using multithreading on multicore machines. AutoDock Vina automatically calculates the grid maps and clusters the results in a way transparent to the user.
20,059 citations
Journal ArticleDOI
TL;DR: A description of the ab initio quantum chemistry package GAMESS, which can be treated with wave functions ranging from the simplest closed‐shell case up to a general MCSCF case, permitting calculations at the necessary level of sophistication.
Abstract: A description of the ab initio quantum chemistry package GAMESS is presented. Chemical systems containing atoms through radon can be treated with wave functions ranging from the simplest closed-shell case up to a general MCSCF case, permitting calculations at the necessary level of sophistication. Emphasis is given to novel features of the program. The parallelization strategy used in the RHF, ROHF, UHF, and GVB sections of the program is described, and detailed speecup results are given. Parallel calculations can be run on ordinary workstations as well as dedicated parallel machines. © John Wiley & Sons, Inc.
18,546 citations
Journal ArticleDOI
TL;DR: Five practical examples involving a wide variety of systems and analysis methods are given to illustrate the usefulness of Multiwfn, a multifunctional program for wavefunction analysis.
Abstract: Multiwfn is a multifunctional program for wavefunction analysis. Its main functions are: (1) Calculating and visualizing real space function, such as electrostatic potential and electron localization function at point, in a line, in a plane or in a spatial scope. (2) Population analysis. (3) Bond order analysis. (4) Orbital composition analysis. (5) Plot density-of-states and spectrum. (6) Topology analysis for electron density. Some other useful utilities involved in quantum chemistry studies are also provided. The built-in graph module enables the results of wavefunction analysis to be plotted directly or exported to high-quality graphic file. The program interface is very user-friendly and suitable for both research and teaching purpose. The code of Multiwfn is substantially optimized and parallelized. Its efficiency is demonstrated to be significantly higher than related programs with the same functions. Five practical examples involving a wide variety of systems and analysis methods are given to illustrate the usefulness of Multiwfn. The program is free of charge and open-source. Its precompiled file and source codes are available from http://multiwfn.codeplex.com.
17,273 citations
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023114
2022274
2021262
2020327
2019361
2018417 | ESSENTIALAI-STEM |
User:Gudgeon87
Small text Gudgeon87 - Master's Degree Gudgeon87 (talk) 20:52, 2 February 2016 (UTC) | WIKI |
Wikipedia:Sockpuppet investigations/Fredyfchin/Archive
Report date September 21 2009, 18:07 (UTC)
* Suspected sockpuppets
* Evidence submitted by Nomoskedasticity
Employees of European University are unhappy with recent edits, particularly clarification of their accreditation status. User:Fredyfchin was blocked for 24 hours for vandalism on 17th September and, appearing not to understand that the block was temporary, has apparently created User:Drfredchin to carry on. The four other accounts were created subsequent to the 17th as well; some have performed a few edits on other pages, but both the timing and pattern of edits suggests an intention to create the appearance of multiple voices for edits that help sell European University (including nominating the article for deletion, the first edit of User:Clooodel, and voting on the AfD, User:Quick07, who cites impressively from policy on his first edit). The other purpose appears to be evasion of COI requirements: Fred Chin is an employee (see here). Previous sockpuppets for EU were User:Orman1 and User:Omrganews, and though it's not clear that these are related to the current, there is a history. Nomoskedasticity (talk) 18:07, 21 September 2009 (UTC)
* Comments by accused parties See Defending yourself against claims.
* Comments by other users
* Clerk, patrolling admin and checkuser comments
* is
* ✅ as:
* . Brandon (talk) 07:57, 22 September 2009 (UTC)
* . Brandon (talk) 07:57, 22 September 2009 (UTC)
* . Brandon (talk) 07:57, 22 September 2009 (UTC)
* Conclusions
Blocks carried out. Peter Symonds ( talk ) 19:43, 22 September 2009 (UTC) | WIKI |
LEUCORRHOEA, an Ayurvedic View – Nirogam
LEUCORRHOEA, an Ayurvedic View
LEUCORRHOEA, an Ayurvedic View
Are you a woman? You have every right to be healthy and happy!
Leucorrhoea is a universal condition experienced by women of all ages.
Excessive discharge of a white sticky foul smelling jelly like substance from vagina is called leucorrhoea. It is associated with itching in the genital area and burning micturition. It is known as “sweta pradara” in Ayurveda which involves mainly the Kapha and Vata dosha. Similar conditions have been mentioned in’ kaphaja yoni roga ‘and ‘upapluta yoni roga’ (types of genital tract diseases)
The Major Culprits of Leucorrhoea
• Unhygienic conditions
• Infection of genital tract
• Lack of nutrition
• Impaired immune function
• Excessive intake of oily, heavy, cold, sweet food
• Over indulgence in sexual activity
Pathogenesis According to Ayurveda
Due to the above mentioned causes, kapha dosha aggravates in the place of apaana vata (a type of vata dosha which is responsible for the proper elimination of waste, sexual function, child birth, and menstrual cycles). This impairs the rasa dhatvagni (nutrient plasma) present in vaginal tract leading to painless white discharge.
Treatment Principle
• Ayurvedic treatment consists of restoring the Agni (digestive fire) in order to cleanse the accumulated toxins and bring kapha dosha back to normalcy.
• To tone the reproductive system, rejuvenating herbs are also prescribed.
List of herbs to Treat Leucorrhoea
THE PUSHYA KIT
Nirogam’s Pushya kit for:
1. Leucorrhea,
2. Dysfunctional Uterine Bleeding,
3. Menorrhagia
Dosage:
Musalikhadiradi kashayam – 15ml +60 ml warm water, 1 hour before breakfast and dinner.
Asokarishtam – 20 ml after meals, thrice a day.
Pushyanuga churnam– 5gms with 1tsp of honey and rice washed water (or warm water) in the morning on an empty stomach mixed with a tsp of honey.
Home Remedies
1. Wash the external genitalia with one of the following decoctions- Triphala, naalpaamara, alum water.
2. Wash the genitalia with water boiled with neem leaves and turmeric.
3. Regular douching of genital tract with barks of banyan and fig trees is very effective.
4. Guava leaves- An infusion of the tender leaves should be used as douche. It acts as powerful vaginal astringent.
5. Walnut leaves- The leaves of the walnut tree contain astringent chemicals. A decoction of the fresh leaves can be used as a douche in the treatment of leucorrhoea.
Boil 2-3 tsp. of fenugreek seeds in 1 litre of water for ½ an hour. Use this water to wash vagina.
More Remedies
1. Take 1 tsp. of powdered asparagus root with 1 tsp. of honey 2 times a day.
2. Grind the plant ” touch me not ” and make a paste and consume daily.
3. Consume the pulp of aloe Vera.
4. Carrot juice mixed with honey in the ratio of 4:1 should be consumed 2 times a day continuously for 14 days.
5. Dry the seed of a mango and powder it .Consume 8 Gms of this powder, mixed with adequate sugar and honey.
6. Amaranth root (rind) rubbed in 25 ml of water should then be strained and then be given to the patient twice daily.
Dietary Consideration
1. Betel nut should be chewed after meals; it has both preventive and curative properties. It prevents the disease from developing further.
2. Fasting for 2-3 days on fruit juices also helps to eliminate the morbid matter.
3. Increase the intake of fruits and salads. In take of tender coconut water and pulp helps a lot.
4. Increase liquids in diet like water, milk, soup which helps to flush out the toxins.
5. Fried, spicy food, pickles, and white flour should be avoided.
Other Measures
1. Avoid sexually stimulating activities.
2. Cold hip bath taken twice a day for 10 minutes at a time will relieve the congestion in the pelvic region and helps in eliminating the morbid matter.
Prevention is better than cure. Follow a good diet and regime, and keep your mind healthy to stay away from leucorrhoea.
1 comment
• The woman who is suffer from likoria viganal discharge with whitish and yellowish
maya or green liquid(maya) water from her vigina. But if these liquid discharges
in high amounts and don’t do Likoria ka ilaj it’s very critical for her because
it makes the spinal card very weak for women. Physical and nervous disorder also start down.
But don’t worry albarni is provide best medicine for likoria ka ilaj
suhail
Leave a comment
Please note, comments must be approved before they are published
Wishlist Products
You have no items in wishlist. | ESSENTIALAI-STEM |
2023 Baltimore shooting
On July 2, 2023, a mass shooting occurred in the Brooklyn neighborhood of Baltimore, Maryland, United States, during a Brooklyn Day celebration. Two people were killed and 28 were injured according to police. It is the largest shooting incident in the city's history.
Incident
The incident occurred in the Brooklyn Homes area located in the southern part of Baltimore at around 12:35 a.m. EDT. According to charging documents obtained by the media, initial gunshots from one weapon led to other people in the area to begin shooting over a span of 10 minutes. The gathering was organized for an event called "Brooklyn Day", an annual event that was attended by over 700 partygoers, located at a housing development in the 800 block of Gretna Court. Multiple videos of the event appeared on social media sites such as Instagram, including one that showed partygoers evacuating after the shooting and another showing a 17-year-old man pulling a gun out of a backpack who was later arrested and charged with three counts of weapons-related violations, reckless endangerment, and two charges of inciting a riot. Police officers rushed to the scene after numerous 9-1-1 calls, where they found multiple gunshot victims. Multiple sources reported that about 20 to 30 gunshots were fired.
Residents told the media that there was no police presence at the event, which officials said was because event organizers did not give the city a three-day notice to provide resources to staff it, unlike previous years. Police radio communications from southern Baltimore indicated that the police were aware of the event, with officers asking the department's Foxtrot helicopter to fly overhead. According to city logs, the Baltimore Police Department began receiving calls about armed persons and noise complaints at 5:30 p.m. EDT. Dispatch audio indicated that police received another call around 9:45 p.m. reporting "hundreds of males and females armed with guns and knives" at the event, and more calls about fighting, loud noise, and potential shooting were received before 11 p.m., which prompted police to fly a helicopter over the event before dismissing the situation.
Safe Streets outreach workers were deployed at the event at 9 p.m. and had deescalated five fights, none of which involved weapons, but were not present during the time of the shooting due to workers' shifts ending at 11 p.m. Safe Streets workers also did not inform police of their activities as they are trained not to involve law enforcement in their interventions to maintain community credibility.
Victims
According to police reports, two people were killed and an additional 28 sustained injuries. One victim died at the scene and another at a local hospital; they were later identified as Aaliyah Gonzalez and Kylis Fagbemi.
Nine victims were transported to the hospital by ambulance, while 20 victims transported themselves to area hospitals. The ages of the victims ranged from 13 to 32, with 15 of the victims being under 18 years old. The University of Maryland Medical Center took in 12 victims at its Shock Trauma Center and four were treated at its pediatric emergency department, while MedStar Harbor Hospital treated 19 patients.
In November 2023, the families of shooting victims, including those of Fagbemi and Gonzalez, said they were planning to sue the city and state over the incident, seeking a combined $150 million in damages. The families will be represented in the lawsuit by civil rights attorney Billy Murphy Jr.
Aftermath
Vigils were held in the Brooklyn community following the shooting. The Mayor's Office of Neighborhood Safety and Engagement (MONSE) deployed its Peace Mobile to distribute household items and resources to Brooklyn residents at the Brooklyn Homes community center and through social workers and local charities. The Baltimore Police Department had "enhanced deployment" in some areas of Baltimore during July 4 celebrations in the city, including at the Cherry Hill Festival.
Within the year following the shooting, MONSE documented 2,000 interactions with neighborhood residents in the year following the shooting, provided relocation assistance to 23 Brooklyn Homes residents, and referred 19 others to the Baltimore State's Attorney's Office for help. Multiple other residents, including Kylis Fagbemi's mother, moved away from the community, citing trauma from the shooting. The Housing Authority hired private security to patrol the neighborhood and the Baltimore Police Department increased policing in the area following the shooting, which may have contributed to the community seeing the largest decrease in violent crimes year-over-year out of any Baltimore neighborhood.
Investigation
Acting Baltimore Police Commissioner Richard Worley confirmed that there were "at least three" people who fired at the scene and that more than three firearms were used in the shooting, with casings from more than a dozen guns being found by investigators at the crime scene, including six fired from a rifle-caliber pistol, although it was unclear if every gun is tied to the mass shooting. The Baltimore Police Department offered a $28,000 reward for information on the suspects.
During its investigation, the Baltimore Police Department had seized the personal belongings of several of the shooting victims while they underwent surgery, despite promises from the department to "minimize or eliminate" the confiscation of crime victims' property. A spokesperson for the department said it would hold the "evidentiary property" until the conclusion of a criminal case, and added that the department had already returned some seized items. Police also threw out substantial amounts of trash from the site of the shooting, which was criticized by forensic experts who claimed that the trash collection would result in the destruction of DNA evidence that could lead to arrests. The police's after-action report justified the removal of trash from the site, saying that the debris was hindering evidence collection.
According to the Baltimore Banner, a 45-foot elm tree blocked the view of the only static camera overlooking the mass shooting site, which likely blocked police from key footage that could have been used to identify shooting suspects. The tree blocking the camera was removed the day after the shooting.
Accused
According to police, at least 10 different shooters could have been involved in the Brooklyn Day shooting. Police made five arrests in connection with the shooting, including four alleged shooters. Prosecutors sought to try all five arrested individuals in a single trial, however, Baltimore City circuit court judge Jeffrey M. Geller ruled in March 2024 that three separate trials should be held.
On August 17, 2023, the Baltimore Police Department arrested 18-year-old Tristan Brian Jackson (born April 19, 2005) of Baltimore on attempted murder charges in connection with the Brooklyn Homes shooting. On August 31, police arrested 18-year-old Aaron Brown on numerous assault, gun, and attempted murder charges, and a minor, in connection to the shooting. Jackson and Brown were set to stand trial together, but Brown pleaded guilty to conspiracy to commit first-degree murder charges in May 2024 and was sentenced to 60 years in prison, with 48 years suspended, plus five years' probation.
On September 13, police arrested a 15-year-old boy on 44 charges, including attempted first-degree murder and second-degree murder, in connection to the shooting. According to investigators, he allegedly fired a weapon at several people during the Brooklyn Day party. He will be tried alongside a 14-year-old who was arrested on attempted murder and conspiracy to commit murder charges. Both teenagers pleaded guilty to first-degree assault and illegal handgun possession charges in May 2024, and were sentenced to 25 years incarceration with all but five years suspended.
A 17-year-old who was accused of pulling a gun out of a bag before the Brooklyn Day shooting was tried as an adult and separately from the other accused defendants. He pleaded guilty to the riot and firearms offenses in May 2024, and was sentenced to one year in prison.
Responses
In the morning following the shooting, Maryland Governor Wes Moore and several other Baltimore leaders released statements expressing their condolences. Baltimore Mayor Brandon Scott also called for further crackdowns on illegal guns coming in from other states and criticized people who uploaded videos of the incident to social media for not intervening. United States President Joe Biden also expressed condolences and called for gun control. Republican Party leaders of the Maryland General Assembly called for Moore to convene a special session to pass legislation to address gun violence, which Moore said was not needed. Moore met with Brooklyn community leaders and people injured by the shooting on July 4, and later spoke at the Cherry Hill Festival to support gun violence prevention efforts in the city.
The Baltimore Fraternal Order of Police released a statement on Twitter calling on Scott to implement a "retention and recruitment plan" for hiring more police in the city, pointing out that there were only seven officers patrolling the area at the time of the shooting. Officials stated before the shooting that the department had 338 patrol vacancies and had funding to hire an additional 918 patrol positions. Worley also disputed the staffing claims made by the police union, saying that there were more than seven police in the Southern District at the time. Baltimore City Councilor Phylicia Porter, whose district includes Brooklyn, called the lack of police an "immense systemic failure" and said that the multiple city agencies, including the police and Housing Authority, should have known to deploy more police ahead of the event. Scott defended the role of the police as well as the city's Safe Streets gun violence program, saying the focus should "instead be on a few people who cowardly decided to shoot up a big block party celebration for a community". Worley blamed the lack of police for the event being "unpermitted" and later said that decisions on whether to send more officers to the neighborhood for the festival happened "too late". He also added that departmental staffing was not an issue for its response, or lack thereof. In June 2024, following a year-long investigation, the Baltimore Police Department terminated two employees—a sworn law enforcement officer and a civilian employee—and disciplined several others on charges of making false statements, neglect of duty, conduct unbecoming, and body-worn camera violations in connection with the police response to the Brooklyn Day shooting.
The Baltimore City Council held a hearing on the response from multiple agencies—including the Baltimore Police Department, Housing Authority, Department of Transportation, and MONSE—to the shooting on July 13. At the hearing, Worley and other leaders of the Baltimore Police Department acknowledged department-wide failures, including a "catastrophic breakdown" in judgement and communications, and admitted responsibility for the lack of police presence at the party. He also said that there was an ongoing investigation into where police were patrolling that night, which included a review of police body camera footage, dispatch recordings, and GPS locations. Baltimore Police patrol chief Kevin Jones, in response to criticism about the police's relationship with the community, said that investigators had received 30 tips with information about the mass shooting. Janet Abrahams, the CEO of the city Housing Authority, said that staff did not see flyers for the party that were circulating in the neighborhood and that officials would be expanding its contracted security force to additional properties, including Brooklyn Homes. Abrahams also said that officials were exploring evictions for tenants who organized the party without notifying the Housing Authority in advance, which violated the terms of their residency agreements. MONSE interim executive director Stefanie Mavronis defended the city's youth curfew and the role of Safe Streets and its workers leading up to the shooting, pointing to the successes made through the agency's de-escalation strategy in parts of Baltimore, but said that she had not yet reviewed workers' logs about their efforts in the Brooklyn Homes area the night of the shooting. A few days after the hearing, the Housing Authority said it would revise its policies toward event authorization, including requiring residents to get written approval from the agency to use any indoor or outdoor common areas in events.
On August 30, 2023, the Baltimore Police Department released its 173-page "after-action report", which faulted police supervisors for taking a "hands-off approach" to intervening in the Brooklyn Day celebration, even as 9-1-1 calls increased, and police officers for showing "little to no concern for public safety" and gathering no meaningful intelligence ahead of the party. The report also recommended a series of leadership changes within the Baltimore Police Department. Following the report, some command-level supervisors were reassigned and disciplinary actions were taken against others.
The Baltimore City Council held a second hearing on the Brooklyn Day shooting on September 13, 2023, following the release of the after-action report. During the hearing, several city councilors expressed dissatisfaction with the recommendations in the audit report. Krystal Gonzalez, the mother of shooting victim Aaliyah Gonzales, spoke at the council hearing recounting her daughter's death and strongly criticizing the police response to the shooting. Her emotional testimony led City Councilor Mark Conway to abruptly postpone the remainder of the hearing to September 27, during which city councilors expressed support for stronger and increased enforcement of police protocols.
In October 2023, Safe Streets modified its escalation protocol to require staffers to share details about large community events with the city, especially if the events have the potential for "mass harm or destruction", so that MONSE officials can increase violence intervention resources and potentially police presence at future gatherings. Safe Streets workers do not need to report attendees suspected of illegally carrying a firearm at large events, as officials believe that doing so would hurt Safe Streets' "credibility and individual safety".
During the 2024 legislative session, Governor Moore introduced the ENOUGH Act, a bill to provide $15 million in grants toward underserved communities. Moore announced the bill in Brooklyn, which he said was a community that had gone "unseen", "unheard", and "underestimated". The bill passed the Maryland General Assembly and was signed into law by Moore on May 9, 2024. | WIKI |
NAME: ________________________
Question Types
Start With
Question Limit
of 21 available terms
Upgrade to
remove ads
5 Written Questions
5 Matching Questions
1. cortisone
2. Adrenals
3. pancreas
4. Somatropic
5. steroids
1. a group of chemical compounds; effects many functions
2. b glucagon
insulin
3. c steroids
aldosterone
cortisone
adrenaline
4. d controls metabolism; helps cope with stress
5. e stimulates growth in muscles, bones, height, liver, kidneys, and tissue
Over-activity: giagantism
Underactivity: dwarfism
5 Multiple Choice Questions
1. triggers adrenal gland
2. causes liver to convert glycogen into glucose
3. emergency hormone; fight or flight
4. thyroxine
5. maintains body's water balance
5 True/False Questions
1. estrogen
progesterone
testosterone
in charge of secondary sex characteristics
2. oxytociniodine causes a chemical reaction; affects all tissues
Overactive: energy increase
Underactive: over tiredness
3. Pituitary GlandSomatropic
TSH
ACTH
FSH
LH
antiduiretic
oxytocin
4. FSHin charge of the development of cells surrounding the egg cell
5. testesregulates size and activity in the thyroid
Create Set | ESSENTIALAI-STEM |
Page:An Etymological Dictionary of the German Language.djvu/284
Pei ,, from the pîne, pîn, pîna, , ‘pain, punishment, torture’; adopted during the period on the introduction of Christianity from poena, which was pronounced pêna in ( pena); ê appears in as î in other cases also (see and ), pîna, pijn, pîn, pine (a later variant of pain); also pían ( péne). ,, ‘whip, lash,’ early , from bič ( bicz). ,, ‘laced coat, hussar's jacket,’ from bekiesza. ,, ‘pelican,’ from pellicân, , formed from pelicanus. ,, to pel, peel. ,, from the bellîȥ, belz, pelz, , ‘fur,’ borrowed in the 10th ( pellĭȥ) from the - pellicia, ‘fur’; pelliccia, pelisse. It corresponds to pylce, pelt. , ‘pen-case,’ only, formed from pennale; with this meaning, ‘grammar-school, high-school, pupil.’ To the students at the university the school might seem as a huge array of pen-cases, and “in jest the freshman too was called a ‘pen-case,’ probably because he attended lectures regularly, and so carried his pen-case with him.” ,, ‘pearl,’ from the përle, bërle, bërla, përala, ; a foreign word, as the fluctuating initial sound indicates. It corresponds to the cognates, perla, perle, whence also pearl; derived probably from *pirula, ‘little pear.’ In, marikreitus, a corrupt form of margarita, was used, corresponding to mere-greót, męri-grioȥ, męregrieȥ. — <section end="Perle" /> <section begin="Perlmutter" /> ,, ‘mother of pearl, late , formed like mère-perle ( madre-perla); so too mother of pearl. is ‘producer of pearls inside the mussel.’ <section end="Perlmutter" /> <section begin="Pest" /> ,, ‘pest, plague,’ only, from pestis. — <section end="Pest" /> <section begin="Pestilenz" /> , ‘pestilence,’ even in pestilenzie, pestilenz,, from pestilentia. <section end="Pestilenz" /> <section begin="Petersilie" /> ,, ‘parsley,’ from pêtersil, , pêtersilje, , pêtarsile; borrowed from petrosilium ( πετροσέλινον), ‘parsley.’ In the a shortened form is found, ,. <section end="Petersilie" /> <section begin="Petschaft" /> ,, ‘signet, seal,’ from petschat, petschaft, ; borrowed from the pečet ( pečati); the f of the and words was introduced by associating them with. <section end="Petschaft" /> <section begin="Petze" /> ,, ‘bitch, she-bear’; early ; its relation to the bitch (from bičče) and biche is uncertain. <section end="Petze" /> <section begin="Pfad" /> ,, from the pfat ( pfades), pfad, , ‘path, track’; *path is wanting; pad, pœþ, , path. The word is unknown to, and thus the difficulty of determining its origin is greatly enhanced. The prevalent opinion, which is based on the supposition, probably correct in the main, that the words beginning with pf and p are borrowed, is satisfied with the phonetic similarity to πάτος, ‘path, road,’ to prove the fact that is borrowed from the latter. With regard to this point we have to take into account the þ of the word, which is assumed by, and which proves the existence of in before the beginning of our era. But has no such early loanwords of origin (see ). As we have no data, we cannot decide whether the word was introduced through a foreign medium; it is possible the word was borrowed indirectly from, but the assumption that it was adopted directly from is equally valid; Zend paþ (also paþan, panþan), ‘way.’ In the latter case it must have passed into after the permutation; was borrowed before this period. Its kinship with πάτος, ‘way’ ( panthan, path, Zend paþan), must be decidedly rejected because f would correspond to p in the non- languages. . <section end="Pfad" /> <section begin="Pfaffe" /> ,, ‘priest, parson,’ from pfaffe, pfaffo, , ‘priest’; corresponding to and pape, ‘priest’; the common form is păpo. The term is clericus. The usual assumption that the word is derived from pâpa, which was in the Western Church a respectful term applied to bishops and a title of the Pope, does not account for the fact that the term means ‘priest’ in all the dialects of, and therefore must be decidedly rejected. In the Greek Church a distinction was made<section end="Pfaffe" /> | WIKI |
Moselle Valley
The Moselle Valley (vallée de la Moselle, ; Moseltal, ) is a region in north-eastern France, south-western Germany, and eastern Luxembourg, centred on the river valley formed by the river Moselle. The Moselle runs through, and along the borders of, the three countries, and drains a fourth, Belgium.
The Moselle has been promoted as a quality white wine-producing region since the nineteenth century and "Moselle wine" is produced in three countries; it is the heart of the Luxembourg wine industry, and is also of the German Mosel region, and there are some vineyards in France. The Moselle has developed a strong tourism industry around its reputation as a rural idyll. The tourism sector is most prominent in the Luxembourgian and German parts of the Moselle.
Luxembourg's part of the valley roughly corresponds with the central and eastern parts of the cantons of Grevenmacher and Remich. Almost all of the lowest-lying communes in Luxembourg lie along the Moselle. There are no large towns in Luxembourg's part of the Moselle valley, but the main settlements are Grevenmacher, Mondorf-les-Bains, Remich, and Wasserbillig, all of which have populations in excess of 2,000 people. | WIKI |
Health
Understanding Erectile dysfunction to avoid causes of it
Erectile dysfunction can have a male completely away rigging. This is a condition when he just can’t give an erection, regardless of the entirety of the health feelings of excitement set up and in the long run basically can’t make an intercourse a genuine probability. Erectile dysfunction additionally can propose when amidst the health action, the penis appears to lose its erectile strength and for all intents and purposes ‘heads out to rest’. At the point when this specific quandary occurs over some stretch of time, it will make a few float separated and cause the individual gigantic measure of scholarly anguish and embarrassment. The troublesome bed room situation soon really begins to reflect inside his overall character since he step by step will lose his fearlessness and certainty. In any case Erectile dysfunction may be short existed or maybe passing, while they are expedited by factors like weight, organization problems and depletion. Such problems some of the time don’t require any treatment. Be that as it may, when the problems proceed with it requires a human services or mending contribution. In ailments Erectile dysfunction are known as Erectile dysfunction or ED and get been the subject of solid logical examination during the previous years. When might a specialist offer a mark to Erectile dysfunction? When the problems proceed with much more than 25Percent of the time you definitely realize you need treatment for treatment strategy. Effective health action, as indicated by a ton of is ‘all from the psyche’. Doctors even so these days perceive that it gives significantly progressively identified with various real physical and medical issues and may quit being redressed with the absolute best of heads and objectives.
One of the courses through which one could visit know whether the Tadalafil powder is carefully of passionate source or ought to be with something progressively physical and substantial is to search for the night time erections. By and large men have 3 to 5 erections for each evening time all of which could last around 30 minutes. You can discover medicinal services tests offered which can help decide the entire amount of night time erections an individual has. Anyway Erectile dysfunction for the most part normally don’t affect a man’s health intrigue it truly is a subject of magnificent interest concerning what triggers Erectile dysfunction to begin with. In any case, we will comprehend that the erection is brought about by a planned activity from the mind, hormone irregular characteristics interaction, neural framework and veins. So any breakdown which thusly causes any unsettling influence in this planned exercise may mess erection up.
Ailment circumstances like diabetes mellitus, hypertension levels, thyroid work inconsistencies, androgenic hormone or testosterone inadequacy, spine harm, Prostatic hyperplasia surgery are a bunch of circumstances wherein Erectile dysfunction are a higher possibility. When for a couple courteous fellows getting some way of life changes like end of cigarette smoking, bringing down of utilization of mixed beverages or unlawful medications, practice schedules and adequate unwinding capacity flawlessly, a few guys will require treatments to kill their Erectile dysfunction. On the off chance that your doctor discovers how the Erectile dysfunction truly are a quick reason for specific meds, he regularly alterations the dose or changes the physician endorsed drug to realize some progression.
Comments Off on Understanding Erectile dysfunction to avoid causes of it | ESSENTIALAI-STEM |
Juliette Evans Juliette Evans - 6 months ago 27
Android Question
The method and the constructor seems to be acting on two different passed in/stored variables
In my adapter, I'm having trouble understanding how a specific variable is able to reference the correct one.
I'm trying to make my adapter work with couchbase lite's live query. I had my adapter looking like this:
LiveQuery query;
Context context;
public MyAdapter(Context context, LiveQuery query) {
this.query= query;
this.context = context;
query.addChangeListener(new LiveQuery.ChangeListener() {
@Override
public void changed(LiveQuery.ChangeEvent event) {
((Activity) MyAdapter.this.context).runOnUiThread(new Runnable() {
@Override
public void run() {
enumerator = event.getRows();
notifyDataSetChanged();
}
});
}
});
query.start();
}
There's a method that stop the liveQuery when I need to:
public void invalidate() {
if (query != null) {
query.stop();
}
}
I'm following this example from their website, but I'm having a hard time understand this:
As far as I understand, the query in this part:
// Let's call this query #1, this is the live query in this instance
this.query
is different from the query in this part:
// And call this query #2, this is the live query that was
// passed-in from the method argument
query.addChangeListener(...
query.start();
So how come you are able to do this:
public void invalidate() {
if (query != null) { // This is query #1, right?
query.stop();
}
}
I thought the liveQuery that you added change listener and started in the constructor is query #2, yet the query in invalidate() is query #1. How can this work?
When we did this at the very beginning:
this.query = query;
No change listener has been added yet and no live query has been started yet, so I didn't think it could work. Where did I get it wrong?
Answer
the constructor assigns the parameter reference to the instance variable, making the parameter and the instance variable aliases of the object. anything done to one is accessible via the other; they are not different objects, only different references to the same object. if you wish to explore this a bit further, i recommend that you change the parameter name to pQuery (or something similar) and resolve the compilation errors that will cause. then you will not be liable to confuse which 'query' is which. remember that reference variables are a two step concept, there is the variable itself and the object that it refers to; these are unlike primitives (but are somewhat easy to confuse). | ESSENTIALAI-STEM |
Barásoain
Barásoain is a town and municipality in the autonomous community of Navarre, northern Spain, within the historical lands of the Basque Country (greater region). the population stands at 621. It is located approximately 25 km south of Pamplona, the provincial capital.
Famous citizens
* Martín de Azpilcueta (1492–1586). Spanish canonist and theologian in his time, and an early economist, known as Doctor Navarrus
* José Julián de Aranguren (1801–1861). Archbishop of Manila (Filipinas)
* Manuel Turrillas (1905–1997), "Maestro Turrillas", one of the most popular composers of Navarra; composed the most popular hymns of the main San Fermines Associations', Aldapa, Anaitasuna, La Jarana, Muthiko, Oberena, and the Osasuna football club hymn.
Geography
Barasoain is located 25 km south of Pamplona and 15 km north of Tafalla, on a promontory of 523 m above sea level. The point of lowest altitude of the village is situated at 492 meters, on the river Zidacos bank, and the highest is Mount Artebeltz, at 644 metres. It is the largest village in the Orba valley, known as the Valdorba which was made famous by the legendary singer songwriter Benito Lertxundi
Neighbouring municipalities
The municipality of Barásoain is closely linked to its neighbouring township, Garínoain. Despite their administrative borders, separated by a street, both municipalities form a single urban conglomeration. Other surrounding municipalities are (clockwise starting from west) are Artajona, Añorbe, Tirapu, Olcoz, Unzué and Olóriz.
Climate
Barásoain is located in a transitional climatic region. It borders the Oceanic and the Mediterranean climates, showing a pattern influenced by both. It is, nevertheless, classified as having an oceanic climate (Köppen Cfb).
Government
Barásoain belongs to the Judicial district of Tafalla, within the merindad de Olite, one of the five merindades, the Medieval administrative subdivision that has historically divided the region of Navarre.
Demography
Although the population of Barásoain has been either static or slowly declining for the 20th century, there has been an upturn in the figures in recent years due to the new residential development. The village has physically expanded and new people from other places have come to Barasoain, mostly from Pamplona. | WIKI |
Wikipedia:Articles for deletion/Faxed Head (2nd nomination)
The result was delete. MBisanz talk 00:21, 30 April 2013 (UTC)
Faxed Head
AfDs for this article:
* – ( View AfD View log Stats )
Article fails to meet WP:BAND. On the talk page, the band's notability is claimed via Trey Spruance, the band's leader. However, the band itself does not appear to be notable, or meet WP:GNG. Dea db eef (talk) 05:49, 22 April 2013 (UTC)
* Delete. Notability is still not inherited. This band has extremely limited coverage, and none from reliable, secondary sources. If anything, should be a section on Trey's own page. czar · · 06:16, 22 April 2013 (UTC)
* Note: This debate has been included in the list of Bands and musicians-related deletion discussions. czar · · 06:16, 22 April 2013 (UTC)
| WIKI |
Primary Care Collaborative
The Primary Care Collaborative (PCC) is a coalition of approximately 1,000 organizations and individuals, employers, consumer, and patient/family advocacy groups, patient quality organizations, health plans, labor unions, hospitals, physicians, and other health professionals. They work on establishing the patient-centered medical home (PCMH) model, an approach to providing comprehensive care for children, youth, and adults. They are headquartered in downtown Washington, D.C.
History
The Primary Care Collaborative was established in late 2006 as the Patient-Centered Primary Care Collaborative when several large national employers came together with the four major U.S. primary care physician associations in hopes of: The PCC has created an open forum where healthcare stakeholders communicate and work to improve the American medical system. The Collaborative has developed model language for inclusion in health reform proposals to include the PCMH concept. It also acts as a key source for the continued education of congressional representatives, the federal and state governments, and individual practices on the PCMH model as a more effective form of healthcare delivery.
* 1) Advancing an effective and efficient health system built on the patient-centered medical home (PCMH) model.
* 2) Facilitate improvements in patient-physician relations
* 3) Create a more effective and efficient model of healthcare delivery
Activities
The Collaborative is now working with partners to obtain full-scale implementation so all patients and families can receive care in a PCMH. In order to realize this vision for robust primary care services, the Collaborative is working to:
* Disseminate expert opinion, resources, and tools to assist clinicians in transforming their primary care setting into a PCMH
* Educate policy makers, consumers, health care advocates, employers, purchasers, and payers on the benefits of receiving care in a PCMH
* Share evidence and outcomes of the PCMH that demonstrate improved quality, lower costs, and increased efficacy in care
* Advocate for policies and payment models necessary to implement and sustain PCMHs in the community
* Disseminate information about implementation of promising PCMH initiatives
In addition to the work of the PCC, the Patient-Centered Primary Care Foundation (PCPCF) currently engages in education of the PCMH model through public conferences, webinars, policy papers, guides, and toolkits.
Member Organizations
Today, PCC's membership represents around 1,200 stakeholder organizations and 50 million health care consumers throughout the U.S. split into two different tiers of membership.
Executive Committee Members
The PCC's Executive Committee is a group of members that provide leadership and work in partnership with PCC's Board of Directors and staff. Members represent a range of health care stakeholders, including health professional associations, employers, purchasers, health plans, health systems, pharmaceutical firms, professional associations, and quality improvement organizations. Member benefits include access to exclusive leadership roles, events and organizational initiatives. Each member contributes annual dues that support the development of educational tools, publications and conferences.
General Members
The Collaborative's general public membership is free of charge and includes many benefits. General members are invited to join the Collaborative's national weekly call and receive monthly updates on the work of the five Centers. Members also have free access to many Collaborative resources. | WIKI |
2019 NAB League Girls season
The 2019 NAB League Girls season was the third season of the NAB League Girls competition for under-18 female Australian rules footballers in Victoria. The season commenced on 3 March and concluded on 25 May. The premiership was won by the Northern Knights, who defeated the Calder Cannons in the Grand Final. A total of 13 teams competed this season, one more than the previous season owing to the inclusion of a team from Tasmania, however they played only two matches and so we were automatically last-place finishers. | WIKI |
Can somebody solve this ques in assembly language?
Write a function switch_stack meant to change the current stack and
will be called as below. The function should destroy no registers.
push word [new_stack_segment]
push word [new_stack_offset]
call switch_stack
1 Answer
Relevance
• 1 month ago
Best Answer
I'm assuming this is 16-bit x86 coding, since there is very little use of segment registers in 32-bit mode. Most 32-bit systems use flat memory. This is important because you'll need to manually push some information onto the new stack to hold register values you'll restore on return to the caller.
You didn't say if this is a near or far call. That's important, since you need to know how many return address bytes to copy to the new stack.
Warning: Interrupts must be disabled while monkeying with the x86 stack! It takes two instructions to modify both SS and SP, and an interrupt between those two operations is a disaster. So:
1. Use PUSHF to save flags, then push registers you will use; all onto the old stack.
2. Disable interrupts (CLI).
3. Copy those values from the old stack to the new one, manually adjusting the new SP value downward so these can be popped off the stack on return.
Notes: Set or clear the direction bit (CLD or STD) if you plan to use LODS, STOS, or MOVS instructions. Don't assume anything about the D flag the caller was using.
Also , be sure to copy the return address. I don't think you need to copy the arguments. The caller can't be using a normal C calling convention, since there are no provisions for relocating the stack frame pointer in BP.
4. Get new SS, SP values in general registers.
Note: You can't safely push or pop the SS:SP values, so these don't go onto either stack for popping later.
5. Copy those step 4 values to SS and SP
6. Pop registers (reverse order!), POPF to restore flags and return.
Still have questions? Get your answers by asking now. | ESSENTIALAI-STEM |
Alex Hastie
Alexander James Hastie (29 July 1935 – 7 June 2010), also known as Alex Hastie or Eck Hastie was a Scotland international rugby union player. He played at Scrum-half; and was commonly linked with David Chisholm, his pairing at Fly-half for club and country.
Amateur career
Hastie played for Melrose. He first played for the side in 1954 when 17 years old.
He was club captain when Melrose won the Scottish Unofficial Championship in 1962-63 season; and the Border League in that same year.
Of his pairing with David Chisholm, Allan Massie said:
"They played together for Melrose for eleven seasons, in the course of which Chisholm scored more than a thousand points for the club... As a pair their understanding made them more than the sum of two individuals. Did Hastie ever lose Chisholm in any of the thirteen internationals they played together? It was their joint ability to tidy up bad ball and even turn it to advantage that made them the most secure of partnerships. Both tackled better than many wing forwards, and they would have revelled in the modern game... Their record of going ten internationals without defeat is unparalleled."
Neither of them made it onto the British and Irish Lions tour to New Zealand. Hastie was said to have a particularly "effective hand-off".
Bill McLaren thought that: "Hastie was one of that Border breed of durable scrum-halves, all 'shilpit' little chaps, seemingly in need of a good meal and all of whom, through operating behind lightweight packs always struggling for ball, had to live on their wits and raw courage."
Provincial career
He played for South of Scotland District.
He was part of the North-South Provinces District side that beat Canada in 1962.
He played for the Whites Trial side in their matches against the Blues Trial to determine international selection. He turned out for Whites in their 2nd trial match in 1962-63 season.
International career
He played for Scotland from 1961 to 1968.
Coaching career
He coached the Melrose Colts, the youth team of Melrose. | WIKI |
Better Buy: Vertex Pharmaceuticals vs. Galapagos
Two of the hottest biotech companies this year are undoubtedly Vertex Pharmaceuticals (NASDAQ: VRTX) and Galapagos (NASDAQ: GLPG). For the former, the launch of a potential blockbuster drug for the treatment of cystic fibrosis would likely send shares to new levels. For the latter, a drug undergoing phase 3 clinical trials for multiple indications has witnessed promising top-line results.
With billions of sales potentially on the table for both companies, the stakes are arguably very high. Let's look at which of the two companies is a better buy for avid biotech investors.
Image source: Getty Images.
A leader in treating cystic fibrosis
Currently, Vertex has four approved medicines for cystic fibrosis (CF), a life-threatening genetic condition that can clog the lungs and affect the pancreas. The most recent treatment to be approved by the Food and Drug Administration is Trikafta, a triple combination therapy. Trikafta is estimated to treat 90% of CF patients worldwide with a key gene mutation and has high efficacy. In fact, the majority of CF patients in the U.S. are already on Trikafta.
In Q1 2020, Vertex's revenue grew to $1.52 billion, a massive improvement of 77% from last year. Additionally, adjusted operating income rose by 133% to $877 million. The growth is from Trikafta, which brought in over $895 million in revenue in the quarter. A majority of the 18,000 patients with CF in the U.S are now on the life-saving drug.
The incredible growth is far from over. Vertex is now seeking Trikafta's label expansion to treat CF patients ages 6 to 11. Moreover, the company faces significant opportunities for international expansion in the EU and the rest of the world, as currently only $328 million of its revenue come from outside the U.S.
With annual guidance of $5.3 billion to $5.6 billion in revenue, over $4.2 billion in cash, and no debt, Vertex is on track to achieve superb growth this year.
A miracle drug company
Together with Gilead Sciences (NASDAQ: GILD), Galapagos is investigating its drug filgotinib (a selective enzyme inhibitor) for multiple indications in late-stage clinical trials. This May, the drug demonstrated an 11.5% to 26.1% improvement in patients with severe ulcerative colitis in its phase 3 investigation. The results were considered highly significant statistically, with safety profiles comparable to that of placebo.
And filgotinib also demonstrated at least 20% improvement when given to patients with rheumatoid arthritis in phase 3 results announced in June. In addition, the drug's efficacy in treating psoriatic arthritis is backed by long-term data in phase 3. The company expects the drug to be approved for at least one of these indications this year.
Together, analysts estimate filgotinib will achieve more than $3 billion in peak annual sales from all of its indications combined. With $6.4 billion in cash and operating at a projected annual loss of just $450 million to $484 million in 2020, Galapagos is a well-rounded growth stock with huge potential.
So which is the better buy?
Currently, Vertex has a market capitalization of $73.8 billion, compared with projected annual 2020 revenue of $5.5 billion at the midpoint. Meanwhile, Galapagos has a market capitalization of $13 billion versus projected peak revenue of $3 billion for filgotinib. In other words, Vertex is trading at 14 times price to forward sales while Galapagos is trading for about 4 times price to forward sales. When it comes to valuation, Galapagos has the upper hand.
Both companies have innovative products in their pipeline, ample cash to offset research and development expenses, and reasonable valuations for their growth. In my view, investors would be getting a great deal by adding either of them (or both) to their portfolios. If I had to pick, however, I would go with Galapagos for its bargain price.
10 stocks we like better than Vertex Pharmaceuticals
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*
David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Vertex Pharmaceuticals wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of June 2, 2020
Zhiyuan Sun has no position in any of the stocks mentioned. The Motley Fool owns shares of and recommends Gilead Sciences. The Motley Fool recommends Vertex Pharmaceuticals. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
How Netflix's CEO Says Investors Should Judge the Streaming War
Consumers have a bevy of new streaming options to choose from over the next year, and many investors in consumer discretionary stocks are worried about subscribers leaving Netflix (NASDAQ: NFLX). Disney's (NYSE: DIS) 10 million sign-ups for Disney+ within 24 hours of launching the service earlier this month certainly resonated across the market. Netflix has only added about 10 million U.S. subscribers over the last two years.
But Netflix CEO Reed Hastings doesn't think subscriber numbers are the best way to judge success for the crop of new streaming services. Instead, he thinks it's important to look at how consumers are spending their time.
At the New York Times' DealBook conference earlier this month, Hastings said:
Apple (NASDAQ: AAPL) and Disney's not going to break out revenue for the service. And you'll hear some subscriber numbers, but you can just bundle things in, so that's not going to to be that relevant. So, the real measurement will be time.
Netflix's offices in L.A. Image source: Netflix.
Why time is the best measure
With the launches of several new streaming services from large, well-established companies, the competition is looking to attract a lot of subscribers quickly. To that end, Disney has already succeeded. It's also partnering with Verizon to offer a free year of Disney+ to millions of its subscribers. Apple is giving a free year of Apple TV+ to anyone that buys a new Apple device. AT&T (NYSE: T) says anyone with HBO currently will get HBO Max when it launches in May, and it's going to bundle it with its wireless and home internet plans. Comcast (NASDAQ: CMCSA) is giving its cable TV subscribers access to Peacock, and may even offer an ad-supported version of the service to everyone.
Every single one of Netflix's competitors will have a substantial number of "subscribers" within a year. But most subscriptions will be subsidized through bundles and partnerships. It might be worth having Apple TV+ or HBO Max when the marginal cost is nothing for consumers, but is it worth consumers' time?
The amount of time people spend actually engaged with each service is a good indication of the potential long-term value those services will create for their parent companies and investors. If every Comcast subscriber gets unfettered access to Peacock's best content through an ad-supported service, but nobody's actually watching it, then it's not producing value for the company. And if millions of people get a free year of Disney+ through Verizon, but they don't really care about the new originals or plan on rewatching every Marvel movie, they probably won't stick around and pay for the service on their own after a year.
Will Netflix keep growing its share of screen time?
Netflix hasn't historically provided much detail on how much time its subscribers spend streaming the service. One estimate it's shared before is that it accounts for an estimated 10% of television screen time in the United States, equal to about 100 million hours per day. In the same breath, Netflix's management said it competes with the video game Fortnite more than with HBO.
The question investors are trying to answer, then, is whether new services like Disney+, Apple TV+, HBO Max, and Peacock, among others, will take screen time away from video games like Fortnite, veteran streaming services like Netflix, or something else. Netflix may represent just 10% of screen time, but it's a direct substitute for the type of screen time these new competitors offer.
Trends suggest Netflix won't lose that much screen time, if any. Roku has seen average time spent per user on its platform grow quarter after quarter. And it's doing so even as it grows new users at a strong pace, which suggests it's seeing increased time spent across cohorts. Those numbers indicate linear TV, which still accounts for the majority of television screen time, is much more likely to lose share to new streaming services than Netflix is.
The challenge for investors comes in measuring time spent on various services. First-party reports might not be comparable, but third-party reports might miss certain data. For example, if Apple TV+ users stream more on mobile than the average streaming service, data focused on TV viewing could skew the comparison.
That said, a metric shared by a company ought to be comparable to itself from prior periods. So if Hastings believes time spent is the ultimate measure of success in the streaming wars, he better be willing to share updates with investors on a regular basis.
10 stocks we like better than Netflix
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has quadrupled the market.*
David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Netflix wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of June 1, 2019
Adam Levy owns shares of Apple and Walt Disney. The Motley Fool owns shares of and recommends Apple, Netflix, Roku, and Walt Disney. The Motley Fool recommends Comcast and Verizon Communications and recommends the following options: long January 2020 $150 calls on Apple, short January 2020 $155 calls on Apple, long January 2021 $60 calls on Walt Disney, and short January 2020 $130 calls on Walt Disney. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Page:American Historical Review vol. 6.djvu/317
Diary of Samuel Cooper met D$r$ Bulfinch on the Lines, we din'd at Mr Pierpoints Roxbury. drank Coffee at Mr Hall's Watertown. slept at Mr Savages. Horse at Russell's.
Thursday 11$th$ Fast day. I went to Lincoln Meeting, saw Mr Green, Call and Families at Mr. Adam's. Mr. Lawrence pray'd and pch'd a. m. prepare to meet thy God o Israel, spent Interval at Mr Lawrence's. I pray'd p.m. Mr. L. pch'd. supp'd with him. Mrs. Cooper not abroad. Slep't at M$r$ S. Horse at Russell's.
Friday 12. Went with M$rs$ Cooper in my Chaise to little Cambridg. Din'd with Mr Dennie. He gave me a Variety of Seed; I gave some to Mr Savage and the rest to J. Russell, went p. m. to old Cambridg. stop't at Congress at Watertown : found them engag'd on the Point of a new Governm't. drank Tea at Waltham with M$rs$ Gill at her Lodgings. Mr. Edward Green and Lady there. Slept at Savages. Horse Russell's.
''Saturday. 13. May.''}} Went to Concord with Mr Savage. call'd at Mr Hubbard's: f'm thence to Mr. Emerson's. He was abroad, engag'd to pch for him on the Morrow, while he was to supply Groton. return'd to M$rs$ Savages, we din'd there, we went with M$r$ Savage Sister Cooper to Nabby's chamber drank Coffee. Slept at Savages ; Horse at Russell's.
''Lord' s day. 14.'' Went to Concord with Nabby. put my Horse at M' Hubbard's, found to my Surprize M$r$. Emerson at the Meeting House Door. He pray'd I pch'd a. m. f'm, the Consolation of Israel. We din'd at Mr Emerson's, with Mr. Knox and Wife of Boston. I pray'd Mr Emerson pch'd p. m. we drank Coffee at M$r$ Hubbards. slept at Mr. Savages. Horse at Russell's.
Monday 15$th$ My Wife and Daughter went to Medford in my Chaise, din'd at M$r$ Turell's. drank Tea at Mrs. Hunts Watertown. I din'd at Mr. S. drank Coffee at Sister Cooper's. My Wife and Nabby return' d in th$e$ Evg. slep't at Mr. S. Horse at Russell's.
Tuesday May 16. Went with M$r$ Savage, his Horse and chaise to see Mrs Greenleaf at Waltham, din'd with Gen$l$ Ward call'd at Mr Hall's Watertown, saw Mr Cook and Mr John Greenleaf. slept at Mr. S. Horse at R.
Wednesday, 17. Went with M$rs$ Cooper in my Chaise to see Mad$m$ Foyes Family and M$r$ Bowdoin. call'd at Deacon Tudors at little Cambridg. treated wth a Glass of Wine and Gingerbread, din'd with | WIKI |
St Brigid's Day, or Lá Fhéile Bríde, February 1 was once a major turning point in the Irish calendar and was celebrated widely.
It represented a new year, the beginnings of spring and a time to take stock of the present and to think about the year ahead.
It was known too as Imbolc, an ancient festival meaning 'in the belly', connected to the time of pregnancy for sheep and the beginning of the lambing season in the rural calendar. This became Christianised in Ireland as the feast day of St Brigid - the foremost female Irish saint - and a version of the universal pagan goddess Brigid. A formidable woman with the power to influence kings, the rural people looked to her to intercede on their behalf with God. As a testament to her popularity, it is worth noting that until the mid-20th century Brigid was one the most popular names for Catholic girls.
Who exactly was worshipped on St Brigid's Day - Christian saint or pagan goddess - was interchangeable according to the ritual practices people partook of. Many attended Mass and holy wells but also partook of some older customs, the exact origins of which are unknown.
With all major ancient Irish/Christian festivals, the big celebration happened on the eve of the feast day, in this case at sundown on St Brigid's Eve, January 31. At this time, St Brigid was said to pass over Ireland bestowing her blessings to all. Food offerings were ceremoniously left out for her and a simple festive supper would take place in the home. Fresh rushes were spread on the floor of the house (a traditional sign of welcome), and the door was left unlatched. St Brigid's crosses were made at this time.
The St Brigid's cross is as popular as ever, an emblematic simple shape made usually from rushes - always pulled, never cut. The real St Brigid of Kildare was said to have explained the concept of Christianity to a pagan king by taking rushes from the floor and making a simple cross. The cross is an ancient design of simple beauty: easy and fast to create, a characteristic that makes for a popular project for Irish primary school children. Crosses are still hung today in Irish homes, classrooms, even cars.
The cross offered protection for the household, farm and land. In some areas, when a new one was made, the old one from the previous year was burned. Burning a holy object may seem disrespectful to us today, but the act marked concepts of death and rebirth that underpinned many pagan beliefs connected to the natural calendar.
There are a myriad of customs associated with St Brigid's Eve and Day that have largely died out. One custom the reader might revive is to leave a pocket-sized piece of cloth or rag outside on a bush on St Brigid's Eve. This could be blessed by St Brigid on her travels and transformed next day into the Brat Bríde, an amulet with curative properties. It was worn within clothing for protection, or used as a cure for headache, toothache, earache and even for labour. On St Brigid's Day itself, another old custom practised in some parts of Ireland is the 'Biddy Boy' procession. This involved groups, often dressed in straw costumes and playing music, going from house to house collecting food or money. It was considered unlucky to refuse them a donation. They carried a straw doll clothed in white known as a brideóg, an effigy of the saint.
Sometimes they carried with them a Crios Bríde, a long straw rope formed into a large circular shape, with three woven crosses in its design. People would step through the crios or pull it over their heads - this was believed to ensure luck and health for the coming year.
It was also a day of stocktaking in the house, for farmers and housewives to try to figure out how long more stores of fodder and food would last. It was also a day off work, and the turning of wheels was to be avoided, including bikes, sewing and spinning machines.
To mark the beginning of the tillage season, a farmer might symbolically break the soil with a spade. Some believed if the first lamb of the season was born black, there would be mourning for the family within the year.
St Brigid's Day itself was a day for visiting holy wells devoted to the saint. Holy water was believed more potent if collected from these on her feast day and was sprinkled on objects, people and animals to offer protection.
St Brigid's Day signalled better weather and longer days, and was a time for weather divination. Good weather on February 1 was an omen of bad to come, while a rainy month of February indicated a good summer. Finally, people could look forward to brighter things after a winter of cold and dark.
And we cannot have an ancient Irish festival occur without a little marriage divination. Any excess rushes were woven into little ladders or wheels and were placed under pillows so that the single might dream of their future spouses on St Brigid's night.
Dr Marion McGarry is a lecturer at Galway-Mayo Institute of Technology, an author and historian | FINEWEB-EDU |
使用antlr4, 用ts/js还原protobuf生成的java代码为pb (二)
96
饥渴的斑马
2017.03.22 16:33* 字数 258
目录:
现在开始写一个简单公式计算器的parser.
expr.g4
grammar Expr ;
prog: stat+ ;
stat: expr NEWLINE # printExpr
| ID '=' expr NEWLINE # assign
| NEWLINE # empty
;
expr: expr op=(MUL|DIV) expr # MulDiv
| expr op=(ADD|SUB) expr # AddSub
| INT # int
| ID # id
| '(' expr ')' # parentheses
;
MUL : '*' ; // assigns token name to '*' used above in grammar '/' ;
DIV : '/' ;
ADD : '+' ;
SUB : '-' ;
ID : [a-zA-Z]+ ;
INT : [0-9]+ ;
NEWLINE : '\r'? '\n' ;
WS: [ \t]+ -> skip ;
#号后面的标签必不可少, 这是用来方便visitor来处理的, 具体可以参阅calculator-visitor
这里我们使用常见的visitor模式来处理(另一种是用listener), 使用命令如下
antlr4ts -visitor ./src/antlr/Expr.g4
CustomVisitor代码如下
import {ExprVisitor} from "./antlr/ExprVisitor";
import {
AddSubContext,
AssignContext,
ExprParser,
IdContext,
IntContext,
MulDivContext,
ParenthesesContext,
PrintExprContext
} from "./antlr/ExprParser";
import {AbstractParseTreeVisitor} from "antlr4ts/tree";
export class CustomVisitor extends AbstractParseTreeVisitor<number> implements ExprVisitor<number> {
/** "memory" for our calculator; variable/value pairs go here */
memory: Map<string, number> = new Map<string, number>();
/** ID '=' expr */
public visitAssign(ctx: AssignContext): number {
let id = ctx.ID().text; // id is left-hand side of '='
let value = this.visit(ctx.expr()); // compute value of expression on right
this.memory.set(id, value); // store it in our memory
return value;
}
/** expr */
public visitPrintExpr(ctx: PrintExprContext) {
return this.visit(ctx.expr()); // evaluate the expr child
}
/** INT */
public visitInt(ctx: IntContext) {
return parseInt(ctx.INT().text);
}
/** ID */
public visitId(ctx: IdContext) {
let id = ctx.ID().text;
if (this.memory.has(id)) {
let value = this.memory.get(id);
console.log(`this is a assign expr, the [${id}] value is [${value}]`)
return value;
}
return 0;
}
/** expr op=('*'|'/') expr */
public visitMulDiv(ctx: MulDivContext) {
let left = this.visit(ctx.expr(0)); // get value of left subexpression
let right = this.visit(ctx.expr(1)); // get value of right subexpression
if (ctx._op.type == ExprParser.MUL) return left * right;
return left / right; // must be DIV
}
/** expr op=('+'|'-') expr */
public visitAddSub(ctx: AddSubContext) {
let left = this.visit(ctx.expr(0)); // get value of left subexpression
let right = this.visit(ctx.expr(1)); // get value of right subexpression
if (ctx._op.type == ExprParser.ADD) return left + right;
return left - right; // must be SUB
}
/** '(' expr ')' */
public visitParentheses(ctx: ParenthesesContext) {
return this.visit(ctx.expr()); // return child expr's value
}
protected defaultResult(): number {
return undefined;
}
}
测试代码如下
import {ANTLRInputStream, CommonTokenStream} from "antlr4ts";
import {ExprLexer} from "./antlr/ExprLexer";
import {ExprParser, ProgContext} from "./antlr/ExprParser";
import {CustomVisitor} from "./CustomVisitor";
// Create the lexer and parser
let inputStream = new ANTLRInputStream("1+2+3\n");
let lexer = new ExprLexer(inputStream);
let tokenStream = new CommonTokenStream(lexer);
let parser = new ExprParser(tokenStream);
// Parse the input, where `compilationUnit` is whatever entry point you defined
let result: ProgContext = parser.prog();
// console.log(result);
let value = (new CustomVisitor()).visit(result);
console.log(value);
由于代码中可能包含赋值表达式, 所以对于赋值表达式在代码里作了打印操作.
现改变let inputStream = new ANTLRInputStream("1+2+3\n");中的1+2+3\n 为其他计算表达式试试看结果对不对
下一章将开始解释java代码
antlr
Web note ad 2 | ESSENTIALAI-STEM |
Emmylou (disambiguation)
Emmylou is a given name or nickname.
Emmylou Harris (born 1947) is an American singer, songwriter, and musician.
Emmylou may also refer to:
People
* Emmylou Taliño-Mendoza (born 1972), a Filipino politician
Music
* "Emmylou" (song), by First Aid Kit on their Lion's Roar album
Other
* EmmyLou Sugarbean, a fictional cartoon character on the television series American Dad!
* PS Emmylou, a river ship in Australia | WIKI |
Web feed
From Wikipedia, the free encyclopedia
(Redirected from News feed)
Jump to: navigation, search
Common web feed icon
User interface of a feed reader
On the World Wide Web, a web feed (or news feed) is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe a channel to it. Making a collection of web feeds accessible in one spot is known as aggregation, which is performed by a news aggregator. A web feed is also sometimes referred to as a syndicated feed.
A typical scenario of web-feed use might involve the following: a content provider publishes a feed link on its site which end users can register with an aggregator program (also called a feed reader or a news reader) running on their own machines; doing this is usually as simple as dragging the link from the web browser to the aggregator. When instructed, the aggregator asks all the servers in its feed list if they have new content; if so, the aggregator either makes a note of the new content or downloads it. One can schedule aggregators to check for new content periodically.
Web feeds exemplify pull technology, although they may appear to push content to the user.
The kinds of content delivered by a web feed are typically HTML (webpage content) or links to webpages and other kinds of digital media. Often when websites provide web feeds to notify users of content updates, they only include summaries in the web feed rather than the full content itself.
Many news websites, weblogs, schools, and podcasters operate web feeds.
Work Web feeds have some advantages compared to receiving frequently published content via an email:
• Users do not disclose their email address when subscribing to a feed and so are not increasing their exposure to threats associated with email: spam, viruses, phishing, and identity theft.
• Users do not have to send an unsubscribe request to stop receiving news. They simply remove the feed from their aggregator.
• The feed items are automatically sorted in that each feed URL has its own sets of entries (unlike an email box where messages must be sorted by user-defined rules and pattern matching).
In its explanation "What is a web feed?", the publishing group of Nature describes two benefits of web feeds:
1. It makes it easier for users to keep track of our content...This is a very convenient way of staying up to date with the content of a large number of sites.
2. It makes it easier for other websites to link to our content. Because RSS feeds can easily be read by computers, it's also easy for webmasters to configure their sites so that the latest headlines from another site's RSS feed are embedded into their own pages, and updated automatically.[1]
Scraping[edit]
Usually a web feed is made available by the same entity that created the content. Typically the feed comes from the same place as the website. Not all websites, however, provide a feed. Sometimes third parties will read the website and create a feed for it by scraping it. Scraping is controversial since it distributes the content in a manner that was not chosen by the authors and may bypass web advertisements.
Technical definition[edit]
A web feed is a document (often XML-based) whose discrete content items include web links to the source of the content. News websites and blogs are common sources for web feeds, but feeds are also used to deliver structured information ranging from weather data to top-ten lists of hit tunes to search results. The two main web feed formats are RSS and Atom.
"Publishing a feed" and "syndication" are two of the more common terms used to describe making a feed available for an information source such as a blog. Web feed content, like syndicated print newspaper features or broadcast programs, may be shared and republished by other websites. (For that reason one popular definition of RSS is Really Simple Syndication. )
Feeds are more often subscribed to directly by users with aggregators or feed readers which combine the contents of multiple web feeds for display on a single screen or series of screens. Some modern web browsers incorporate aggregator features. Users typically subscribe to a feed by manually entering the URL of a feed or clicking a link in a web browser.
Web feeds are designed to be machine-readable rather than human-readable, which tends to be a source of confusion when people first encounter web feeds. This means that web feeds can also be used to automatically transfer information from one website to another without any human intervention.
Confusion between web feed and RSS[edit]
The term RSS is often used to refer to web feeds or web syndication in general, although not all feed formats are RSS. The Blogspace description of using web feeds in an aggregator, for example, is headlined "RSS info" and "RSS readers" even though its first sentence makes clear the inclusion of the Atom format: "RSS and Atom files provide news updates from a website in a simple form for your computer."[2]
Feed icon[edit]
RSS icon
An RSS Feed icon.
Type of format Web syndication
The Feed icon is for indicating that a web feed is available on a web page. It was originally invented for the use of RSS, but it is also common for Atom and other web feeds now. The icon is normally orange, with hex code #FA9B39[citation needed]. The original icon was created by Stephen Horlander, a designer at Mozilla.
The icon is used in aggregators, web browsers address bar to indicate availabity of a web feed, as well as on web pages to subscribe directly.
RSS formats are specified using XML, a generic specification for the creation of data formats. Although RSS formats have evolved since March 1999,[3] the RSS icon ("Feed-icon.svg") first gained widespread use between 2005 and 2006.[4]
History[edit]
Dave Winer published a modified version of the RSS 0.91 specification on the UserLand website, covering how it was being used in his company's products, and claimed copyright to the document.[5] A few months later, UserLand filed a U.S. trademark registration for RSS, but failed to respond to a USPTO trademark examiner's request and the request was rejected in December 2001.[6]
The RSS-DEV Working Group, a project whose members included Guha and representatives of O'Reilly Media and Moreover, produced RSS 1.0 in December 2000.[7] This new version, which reclaimed the name RDF Site Summary from RSS 0.9, reintroduced support for RDF and added XML namespaces support, adopting elements from standard metadata vocabularies such as Dublin Core.
In December 2000, Winer released RSS 0.92[8] a minor set of changes aside from the introduction of the enclosure element, which permitted audio files to be carried in RSS feeds and helped spark podcasting. He also released drafts of RSS 0.93 and RSS 0.94 that were subsequently withdrawn.[9]
In September 2002, Winer released a major new version of the format, RSS 2.0, that redubbed its initials Really Simple Syndication. RSS 2.0 removed the type attribute added in the RSS 0.94 draft and added support for namespaces.
Because neither Winer nor the RSS-DEV Working Group had Netscape's involvement, they could not make an official claim on the RSS name or format. This has fueled ongoing controversy in the syndication development community as to which entity was the proper publisher of RSS.
One product of that contentious debate was the creation of an alternative syndication format, Atom, that began in June 2003.[10] The Atom syndication format, whose creation was in part motivated by a desire to get a clean start free of the issues surrounding RSS, has been adopted as IETF Proposed Standard RFC 4287.
In July 2003, Winer and UserLand Software assigned the copyright of the RSS 2.0 specification to Harvard's Berkman Center for Internet & Society, where he had just begun a term as a visiting fellow.[11] At the same time, Winer launched the RSS Advisory Board with Brent Simmons and Jon Udell, a group whose purpose was to maintain and publish the specification and answer questions about the format.[12]
In December 2005, the Microsoft Internet Explorer team[13] and Outlook team[14] announced on their blogs that they were adopting the feed icon first used in the Mozilla Firefox browser Feed-icon.svg, created by Stephen Horlander, a Mozilla Designer. A few months later, Opera Software followed suit. This effectively made the orange square with white radio waves the industry standard for RSS and Atom feeds, replacing the large variety of icons and text that had been used previously to identify syndication data.
In January 2006, Rogers Cadenhead relaunched the RSS Advisory Board without Dave Winer's participation, with a stated desire to continue the development of the RSS format and resolve ambiguities. In June 2007, the board revised their version of the specification to confirm that namespaces may extend core elements with namespace attributes, as Microsoft has done in Internet Explorer 7. According to their view, a difference of interpretation left publishers unsure of whether this was permitted or forbidden.
See also[edit]
See Wikipedia:Syndication on how various aspects of Wikipedia can be monitored with RSS or Atom feeds.
References[edit]
1. ^ Home: Nature Webfeeds
2. ^ Blogspace "RSS readers (RSS info)"
3. ^ "My Netscape Network: Quick Start". Netscape Communications. Archived from the original on 2000-12-08. Retrieved 2006-10-31.
4. ^ "Icons: It's still orange". Microsoft RSS Blog. December 14, 2005. Retrieved 2008-11-09.
5. ^ Winer, Dave (2000-06-04). "RSS 0.91: Copyright and Disclaimer". UserLand Software. Retrieved 2006-10-31.
6. ^ U.S. Patent & Trademark Office. "'RSS' Trademark Latest Status Info".
7. ^ RSS-DEV Working Group (2000-12-09). "RDF Site Summary (RSS) 1.0". Retrieved 2006-10-31.
8. ^ Winer, Dave (2000-12-25). "RSS 0.92 Specification". UserLand Software. Archived from the original on 2011-01-31. Retrieved 2006-10-31.
9. ^ Winer, Dave (2001-04-20). "RSS 0.93 Specification". UserLand Software. Retrieved 2006-10-31.
10. ^ Festa, Paul (2003-08-04). "Dispute exposes bitter power struggle behind Web logs". news.cnet.com. Retrieved 2008-08-06. The conflict centers on something called Really Simple Syndication (RSS), a technology widely used to syndicate blogs and other Web content. The dispute pits Harvard Law School fellow Dave Winer, the blogging pioneer who is the key gatekeeper of RSS, against advocates of a different format.
11. ^ "Advisory Board Notes". RSS Advisory Board. 2003-07-18. Retrieved 2007-09-04.
12. ^ "RSS 2.0 News". Dave Winer. Retrieved 2007-09-04.
13. ^ Icons: It’s still orange, Microsoft RSS Blog, December 14, 2005
14. ^ RSS icon goodness, blog post by Michael A. Affronti of Microsoft (Outlook Program Manager), December 15, 2005
External links[edit] | ESSENTIALAI-STEM |
Denise Megan BRONSDON, Debtor. Denise Megan Bronsdon, Plaintiff-Appellee, v. Educational Credit Management Corporation, Defendant-Appellant.
BAP No. MB 10-009.
Bankruptcy No. 07-14215-FJB.
Adversary Proceeding No. 08-01062-MSH.
United States Bankruptcy Appellate Panel of the First Circuit.
Sept. 21, 2010.
John F. White, Esq., and Troy A. Gun-derman, Esq., on brief for Defendant-Appellant.
Denise M. Bronsdon, Pro Se, on brief for Plaintiff-Appellee.
Before HAINES, LAMOUTTE, and TESTER, United States Bankruptcy Appellate Panel Judges.
LAMOUTTE, Bankruptcy Judge.
This appeal arises out of an adversary proceeding filed by Denise Bronsdon (the “Debtor”) seeking to discharge her student loan obligations to Educational Credit Management Corporation (“ECMC”) on the grounds of undue hardship pursuant to § 523(a)(8). The bankruptcy court initially concluded that repayment of the student loans would impose an undue hardship on the Debtor and discharged the loans. On appeal, the U.S. District Court for the District of Massachusetts (the “district court”) vacated the bankruptcy court’s decision and remanded the matter to the bankruptcy court to consider the impact that participation in the William D. Ford Federal Direct Loan Program (the “Ford Program”) would have on the undue hardship analysis. On remand, the bankruptcy court concluded that the Debtor’s failure to participate in the Ford Program was insufficient to overcome a finding of undue hardship under § 523(a)(8), and again discharged the loans. ECMC appealed.
For the reasons set forth below, we AFFIRM.
BACKGROUND
A. The Debtor’s Personal Background
At the time of trial in January 2009, the Debtor was 64 years old and single. She did not have any dependents nor did she suffer from any disability or debilitating medical condition. In 1994, the Debtor, at the age of 50, received a bachelor’s degree in English from Wellesley College. Thereafter, from 1996 until 2002, she worked at various jobs as a legal secretary until she decided to go to law school. She enrolled in Southern New England School of Law, and graduated in the top half of her class in December 2005. To finance her law school education, the Debtor took out the student loans now at issue, which at some point were assigned to ECMC. As of September 8, 2008, the loans totaled $82,049.45.
After law school, the Debtor failed the bar exam three times, each time by a significant margin. She does not plan to take the bar exam again because she has no money to pay for the exam fee or preparation materials, and because she has not come close to passing.
After graduating from law school, the Debtor worked briefly as a receptionist and as a temporary patent prosecution secretary at two different law firms. Although she continually went on interviews, made telephone calls, and spoke with employment agencies in an effort to find any kind of secretarial, receptionist, or contract manager work, she was unable to find employment. The Debtor pursued alternate means of earning income, but her attempts were unsuccessful. At the time of trial, the Debtor’s only income was a monthly Social Security payment of $946.00. She owned no real property and lived temporarily in her father’s house.
B. Procedural History
The Debtor filed a chapter 7 petition in July 2007, and received a discharge in December 2007. Thereafter, the Debtor filed an adversary complaint seeking to discharge her student loan obligations to ECMC. At ECMC’s request, the bankruptcy court took judicial notice of the Ford Program, 34 C.F.R. §§ 685.100, et seq. The Ford Program offers, among other things, a student loan consolidation repayment option known as the income contingent repayment plan (the “ICRP”).
After a trial, the bankruptcy court issued an order and decision (the “First Decision”) discharging the debts owed to ECMC. In the First Decision, the bankruptcy court applied a totality of the circumstances test to determine whether the Debtor would suffer an undue hardship. 2009 WL 95038, at *2-3, 2009 Bankr.LEXIS 69, at *7. In applying this standard, the bankruptcy court found that, given the Debtor’s lack of recent work history, narrow work experience, failure to pass the bar exam, age, unsuccessful attempts to find employment in a variety of fields, and unsuccessful attempts to sell a novel and acquire a patent, the Debtor had no reasonably reliable future financial resources other than the Social Security payments. Id. at *4-5, 2009 Bankr.LEXIS 69, at *12-14.
The bankruptcy court also recognized that if the Debtor participated in the Ford Program, her current financial status would not require monthly payments. Id. at *4, 2009 Bankr.LEXIS 69, at *11. It rejected ECMC’s argument that repayment would not cause the Debtor an undue hardship because the Debtor would not be required to make monthly payments under the program. The bankruptcy court stated that if the Debtor were to participate in the Ford Program, “the student loan forgiveness at the conclusion of her participation in the program would result in a tax liability that would subject the Debt- or’s Social Security benefits to garnishment,” which would “promote a vicious cycle that could leave the Debtor in a financial state much more desperate than the one she is currently enduring.” Id. Additionally, the bankruptcy court referred to its reasoning in In re Denittis, 362 B.R. 57, 64-65 (Bankr.D.Mass.2007), in which it concluded that consideration of the Ford Program in the undue hardship analysis would, in effect, foreclose a conclusion of undue hardship whenever a debtor is eligible to participate. Bronsdon, 2009 WL 95038, at *4, 2009 Bankr.LEXIS 69, at *11.
On appeal to the district court, ECMC contested the bankruptcy court’s factual findings regarding the Debtor’s good faith efforts to find work and that she was not likely to earn income in the future. ECMC also argued that the bankruptcy court made errors of law concerning the ICRP. At the outset, the district court noted the two tests for determining undue hardship, but stated that the test to be applied was not a material issue in this case as the result was the same under both tests. The district court then determined that there was ample evidence supporting the bankruptcy court’s factual findings and, therefore, that the findings were not clearly erroneous. It also concluded that the bankruptcy court had made a legal error by “giving no weight to the ICRP in the undue hardship analysis.” As a result, the district court vacated the First Decision and remanded the matter to the bankruptcy court to consider the impact that participating in the ICRP would have on the undue hardship analysis.
On remand, the bankruptcy court concluded that “the Debtor’s failure to participate in the ICRP [wa]s insufficient to demonstrate a lack of good faith (again assuming such finding is integral to the test under § 523(a)(8)) when weighed against this Debtor’s efforts to try to improve her financial circumstance,” and ordered that the student loans owed to ECMC were discharged. This appeal ensued.
JURISDICTION
Before addressing the merits of an appeal, the Panel must determine that it has jurisdiction, even if the issue is not raised by the litigants. See Boylan v. George E. Bumpus, Jr. Constr. Co. (In re George E. Bumpus, Jr. Constr. Co.), 226 B.R. 724 (1st Cir. BAP 1998). The Panel has jurisdiction to hear appeals from: (1) final judgments, orders, and decrees; or (2) with leave of court, from certain interlocutory orders. 28 U.S.C. § 158(a); Fleet Data Processing Corp. v. Branch (In re Bank of New England Corp.), 218 B.R. 643, 645 (1st Cir. BAP 1998). A decision is considered final if it “ends the litigation on the merits and leaves nothing for the court to do but execute the judgment,” id. at 646 (citations omitted), whereas an interlocutory order “only decides some intervening matter pertaining to the cause, and requires further steps to be taken in order to enable the court to adjudicate the cause on the merits.” Id. (quoting In re Am. Colonial Broad. Corp., 758 F.2d 794, 801 (1st Cir.1985)). Generally, a bankruptcy court’s order regarding the dischargeability of a debtor’s student loans is a final order. See Educ. Credit Mgmt. Corp. v. Kelly (In re Kelly), 312 B.R. 200, 204 (1st Cir. BAP 2004).
STANDARD OF REVIEW
The Panel reviews the bankruptcy court’s findings of fact for clear error and its conclusions of law de novo. See TI Fed. Credit Union v. DelBonis, 72 F.3d 921, 928 (1st Cir.1995); Western Auto Supply Co. v. Savage Arms, Inc. (In re Savage Indus., Inc.), 43 F.3d 714, 719 n. 8 (1st Cir.1994). Generally, a bankruptcy court’s undue hardship determination involves the application of a legal standard to the facts of a particular case and therefore poses a mixed question of law and fact. See TI Fed. Credit Union, 72 F.3d at 928; see also Nash v. Conn. Student Loan Found. (In re Nash), 446 F.3d 188, 191 (1st Cir.2006); Lorenz v. Am. Educ. Servs./Pa. Higher Educ. Assistance Agency (In re Lorenz), 337 B.R. 423, 429 (1st Cir. BAP 2006). “Appellate courts review bankruptcy court findings of fact under the clearly erroneous standard, but subject legal conclusion[s] drawn by such courts to de novo review.” TI Fed. Credit Union, 72 F.3d at 928.
The district court determined that the bankruptcy court’s factual findings were not clearly erroneous, and, therefore, no factual issues were determined by the bankruptcy court on remand. Thus, the bankruptcy court’s findings may not be challenged in this appeal. See Ellis v. U.S., 313 F.3d 636, 646 (1st Cir.2002) (quoting Flibotte v. Pa. Truck Lines, Inc., 131 F.3d 21, 25 (1st Cir.1997)) (holding that under the law of the case doctrine, a lower court may not relitigate issues that a higher court decided “whether explicitly or by reasonable implication, at an earlier stage of the same case.”). Therefore, the standard of appellate review is de novo because the issues presented concern matters of law, not of fact. See Braunstein v. McCabe, 571 F.3d 108, 124 (1st Cir.2009).
DISCUSSION
I. The Appropriate Legal Standard
A. The Burden of Proof
Under § 523(a)(8), debtors are not permitted to discharge educational loans “unless excepting such debt from discharge ... would impose an undue hardship on the debtor and the debtor’s dependents.” 11 U.S.C. § 523(a)(8). The creditor bears the initial burden of establishing that the debt is of the type excepted from discharge under § 523(a)(8). Once the showing is made, the burden shifts to the debtor to prove that excepting the student loan debt from discharge will cause the debtor and her dependents “undue hardship.” Educ. Credit Mgmt. Corp. v. Savage (In re Savage), 311 B.R. 835 (1st Cir. BAP 2004); see also Smith v. Educ. Credit Mgmt. Corp. (In re Smith), 328 B.R. 605 (1st Cir. BAP 2005). The debtor bears the ultimate burden of proving undue hardship by a preponderance of the evidence. See Grogan v. Garner, 498 U.S. 279, 287, 111 S.Ct. 654, 112 L.Ed.2d 755 (1991); Burkhead v. U.S. (In re Burkhead), 304 B.R. 560, 564 (Bankr.D.Mass. 2004).
B. The Tests for Determining Undue Hardship
The Bankruptcy Code does not define “undue hardship” and courts have struggled with its meaning. After several decades of case law interpreting this term, essentially two tests have emerged — the so-called Brunner test and the “totality of the circumstances” test. As the First Circuit has noted:
... [N]ine circuit courts of appeal [ ] have followed the Second Circuit’s test set forth in Brunner v. New York State Higher Educ. Servs. Corp., 831 F.2d 395 (2d Cir.1987) (per curiam). This is a tripartite test, requiring that the debtor show inability, at her current level of income and expenses, to maintain a “minimal” standard of living; the likelihood that this inability will persist for a significant portion of the repayment period; and the existence of good faith efforts to repay the loans. Id. at 396. A facially different test is the Eighth Circuit’s totality-of-circumstances test, which would have courts consider the debtor’s reasonably reliable future financial resources, his reasonably necessary living expenses, and “any other relevant facts.” See Long v. Educ. Credit Mgmt. Corp. (In re Long), 322 F.3d 549, 554 (8th Cir.2003).
Nash, 446 F.3d at 190. Although the First Circuit acknowledged the two approaches in Nash, it declined to adopt formally a particular test for determining undue hardship, and it remains an undecided issue in this circuit. See Nash, 446 F.3d at 190.
In the First Decision, the bankruptcy court applied the totality of the circumstances test to determine whether excepting the Debtor’s student loan obligations from discharge would cause her undue hardship. The district court determined that the issue of the appropriate test was immaterial as the result would be the same under either test. On remand, the bankruptcy court again declined to endorse the Brunner test. On appeal, ECMC urges the Panel to formally adopt the so-called Brunner test.
C. Adopting a Test
As noted above, neither the plain language of § 523(a)(8) nor the First Circuit mandate a particular test for evaluating the dischargeability of student loans. The Panel has also declined to endorse a particular test. Most of the bankruptcy courts within the First Circuit have adopted the totality of the circumstances test over the Brunner test, although a few courts within this circuit have applied Brunner instead.
To determine the appropriate test, we first examine the differences between the Brunner and the totality of circumstances approaches. As the Panel noted in In re Lorenz, the distinctions between the two tests are modest, with many overlapping considerations:
The “totality of the circumstances” analysis requires a debtor to prove by a preponderance of evidence that (1) his past, present, and reasonably reliable future financial resources; (2) his and his dependents’ reasonably necessary living expenses; and (3) other relevant facts or circumstances unique to the case, prevent him from paying the student loans in question while still maintaining a minimal standard of living, even when aided by a discharge of other prepetition debts. Kopf, 245 B.R. at 739; see also Hicks v. Educ. Credit Mgmt. Corp. (In re Hicks), 331 B.R. 18, 31 (Bankr.D.Mass.2005) (distilling so-called totality of the circumstances test to “one simple question: Can the debtor now, and in the foreseeable future, maintain a reasonable, minimal standard of living for the debtor and the debtor’s dependents and still afford to make payments on the debtor’s student loans?”). Courts “should consider all relevant evidence — the debtor’s income and expenses, the debtor’s health, age, education, number of dependents and other personal or family circumstances, the amount of the monthly payment required, the impact of the general discharge under chapter 7 and the debtor’s ability to find a higher-paying job, move or cut living expenses.” Hicks, 331 B.R. at 31; see also Kelly, 312 B.R. at 206; Savage, 311 B.R. at 840; Bloch v. Windham Profls (In re Bloch), 257 B.R. 374, 378 (Bankr.D.Mass.2001); Kopf, 245 B.R. at 744.
The Brunner test differs, albeit modestly. See Kopf, 245 B.R. at 731 (comparing tests). Brunner requires a “three-part showing (1) that the debtor cannot, based on current income and expenses, maintain a ‘minimal’ standard of living for herself or her dependants if forced to repay the loans; (2) that this state of affairs is likely to persist for a significant portion of the repayment period of the student loans; and (3) that the debt- or has made good faith efforts to repay the loans.” Brunner, 831 F.2d at 396....
One can see readily that insofar as income and expenses are concerned, the tests take converging tacks. The “totality test” looks to past, present, and future “financial resources” and “necessary living expenses” and whether, taken together with other factors, the debtor has the ability to repay while maintaining a minimal standard of living. Brunner asks the same question looking to “current” income and expenses, then considers whether circumstances inhibiting repayment will endure.
In re Lorenz, 337 B.R. at 430-31.
Although the two tests do not always diverge in function, they do in form. In re Hicks, 331 B.R. at 26. As the In re Hicks court noted: “While under the totality of the circumstances approach, the court may also consider ‘any additional facts and circumstances unique to the case’ that are relevant to the central inquiry (i.e., the debtor’s ability to maintain a minimum standard of living while repaying the loans), the Brunner test imposes two additional requirements on the debtor that must be met if the student loans are to be discharged.” Id. (emphasis in original). Looking to the bankruptcy court’s extensive analysis of the predominant tests in In re Kopf, the In re Hicks court agreed with In re Kopf that the Brunner test “test[s] too much.” Id. at 27.
At first blush, the second Brunner requirement — -a showing that the debtor’s “state of affairs is likely to persist for a significant portion of the repayment period of the student loan” — seems merely to resonate with the forward-looking nature of the undue hardship analysis. That is, under any undue hardship standard the debtor must show that the inability to maintain a minimum standard of living while repaying the student loans is not a temporary reality, but will continue into the foreseeable future.
Many courts interpreting and applying the second Brunner prong, however, place dispositive weight on the debtor’s ability to demonstrate “additional extraordinary circumstances” that establish a “certainty of hopelessness.” This has led some courts to require that the debtor show the existence of “unique” or “extraordinary” circumstances, such as the debtor’s advanced age, illness or disability, psychiatric problems, lack of usable job skills, large number of dependents or severely limited education.... And, in the absence of such a showing, the court may conclude that the debtor has failed the second Brunner prong and the student loans will not be discharged ....
Requiring the debtor to present additional evidence of “unique” or “extraordinary” circumstances amounting to a “certainty of hopelessness” is not supported by the text of § 523(a)(8). The debtor need only demonstrate “undue hardship.” True, the debtor must be able to prove that the claimed hardship is more than present financial difficulty. See Kopf, 245 B.R. at 742, 745. And the existence of any of the factors mentioned above may be highly relevant to a finding that the hardship will persist into the foreseeable future. But whether or not this Court subjectively views the debtor’s circumstances as “unique” or “extraordinary” is, in a word, overkill.
In re Hicks, 331 B.R. at 27-28. We agree with this rationale and conclude that Brun-ner takes the test too far.
Furthermore, we agree that the “good faith” requirement of Brunner is “without textual foundation.” Id. at 28 (citing In re Kopf, 245 B.R. at 741). Ultimately, the debtor must establish by a preponderance of the evidence that her present and future actual circumstances would impose an undue hardship if her debts are excepted from discharge. Irrespective of the test, the decision of a bankruptcy court, whether the failure to discharge a student loan will cause undue hardship to the debtor and the dependents of the debtor under § 523(a)(8), rests on both the economic ability to repay and the existence of any disqualifying action(s). The party opposing the discharge of a student loan has the burden of presenting evidence of any disqualifying factor, such as bad faith. The debtor is not required under the statute to establish prepetition good faith in absence of a challenge. The debtor should not be obligated to prove a negative, that is, that he did not act in bad faith, and, consequently, acted in good faith.
Undue hardship is measured as of trial date, In re Kelly, 312 B.R. at 204, and is a forward-looking concept. In re Kopf, 245 B.R. at 744. Placing emphasis on prepetition failure to pay misconstrues the wording of the undue hardship requirement in the statute. As stated before, distilled to its essence, the finding of undue hardship under § 523(a)(8) following the totality of the circumstances test rests on one basic question: “Can the debtor now, and in the foreseeable near future, maintain a reasonable, minimal standard of living for the debtor and the debtor’s dependents and still afford to make payments on the debtor’s student loans?” In re Hicks, 331 B.R. at 31. Answering said question leads the bankruptcy court to discharge its task of making “a principled determination of the requirement’s meaning and a careful review of the debtor’s circumstances.” In re Kopf, 245 B.R. at 741.
Having considered the various tests used to determine undue hardship, the plain text of § 523(a)(8), and further recognizing that the majority of courts in the First Circuit adopt the totality of the circumstances test, the Panel declines to adopt the Brunner test as requested by ECMC. The Panel is persuaded that the totality of the circumstances test best effectuates the determination of undue hardship while adhering to the plain text of § 523(a)(8). See In re Hicks, 331 B.R. at 32.
II. Consideration of the ICRP Under the Totality of the Circumstances Test
[9] ECMC’s primary argument on appeal is that the bankruptcy court failed to adequately consider the availability of the ICRP in its determination of undue hardship under the totality of the circumstances. As noted above, the totality of the circumstances test requires the bankruptcy court to consider “any other relevant facts and circumstances” unique to the particular case, such as the debtor’s ability to repay her loans. Although courts applying the totality of the circumstances test have treated the ICRP differently, the weight of authority is to treat the ICRP as one of many factors to consider in evaluating the totality of the debtor’s circumstances. Thus, a debtor’s eligibility to participate in the ICRP may be considered by the court when applying the totality of the circumstances test, but it is not determinative. See In re Kelly, 312 B.R. at 206. As set forth below, we conclude that the bankruptcy court properly considered the Debtor’s eligibility for the ICRP as part of its examination of the totality of the circumstances.
The Ford Program allows student loans to be consolidated and payments on the consolidated loan to be adjusted based on a formula that takes into account poverty guidelines and a debtor’s adjusted gross income. See 34 C.F.R. § 685.100, et seq. One of the consolidation options under the Ford Program is the ICRP. See 34 C.F.R. §§ 685.208-685.209. Under the ICRP, an eligible debtor’s annual loan payment is generally equal to 20 percent of the difference between his or her adjusted gross income and the federal poverty guidelines for the debtor’s family size, regardless of the amount of unpaid student loan debt. 34 C.F.R. § 685.209. Repayments are made monthly. 34 C.F.R. § 685.208(k). ICRP payments are recalculated annually based on changes to the debtor’s reported household adjusted gross income. 34 C.F.R. § 685.209. Unpaid interest is capitalized until the outstanding principal is ten percent greater than the original principal amount. 34 C.F.R. § 685.209(c)(5). If the borrower has not repaid the loan at the end of 25 years, the unpaid portion of the loan is cancelled. 34 C.F.R. § 685.209(c)(4)®.
Courts considering the ICRP as a factor under the totality of the circumstances test evaluate both the benefits and drawbacks of the program for the individual debtor within his or her unique circumstances. Brooks v. Educ. Credit Mgmt. Corp. (In re Brooks), 406 B.R. 382, 393 (Bankr.D.Minn.2009). Although these courts acknowledge that the ICRP reduces the immediate debt burden of the student loan debtor, they are often concerned about the longer term debt and tax consequences of the program. They recognize that, although it may be appropriate to consider whether a debtor has pursued her options under the ICRP, participation in that program may not be appropriate for some debtors because of the impact of the negative amortization of the debt over time when payments are not made and the tax implications arising after the debt is can-celled. Because of these considerations, the ICRP may be beneficial for a borrower whose inability to pay is temporary and whose financial situation is expected to improve significantly in the future. See In re Vargas, 2010 WL 148632, at *4-5, 2010 Bankr.LEXIS 63, at *12-13. Where no significant improvement is anticipated, however, such programs may be detrimental to the borrower’s long-term financial health. See id.; see also In re Wilkinson-Bell, 2007 Bankr.LEXIS 1052, at *16.
Central to this analysis is the idea that because forgiveness of any unpaid debt under the ICRP may result in a taxable event, the debtor who participates in the ICRP simply exchanges a nondischargeable student loan debt for a nondis-chargeable tax debt. Such an exchange of debt provides little or no relief to debtors. See Thomsen v. Dep’t of Educ. (In re Thomsen), 234 B.R. 506, 514 (Bankr.D.Mont.1999); see also In re Booth, 410 B.R. at 675-76; Durrani v. Educ. Credit Mgmt. Corp. (In re Durrani), 311 B.R. 496, 509 (Bankr.N.D.Ill.2004), aff'd, 320 B.R. 357 (N.D.Ill.2005); but see In re Brunell, 356 B.R. at 580-81 (holding that “[t]o the extent that the Debtor satisfies the requirements for participation in the Ford program, any tax liability based on the forgiven balance at that time is discharged.”). For example, in In re Booth, the bankruptcy court stated:
Application of the ICRP does not result in a discharge of the debt nor relieve the debtor from personal liability on the debt. Further action may, and will, be taken to collect the obligation, even if that action is simply requiring the debt- or to provide annual financial information to the Department of Education. The ICRP does not grant a discharge, but lapse of a period as long as 25 years may result in cancellation or forgiveness of the debt. There is no provision in the regulation for “partial” cancellation or forgiveness of the obligation. Unlike a discharge, cancellation or forgiveness of a debt results in a tax liability. As interest accrues during the 25 years or lesser repayment period, the amount of debt cancelled will be quite large. The resulting tax liability would not be subject to discharge in a later bankruptcy proceeding.
The focus of the ICRP is on deferral, not discharge, of debt. This is the antithesis of a fresh start. Congress has provided bankruptcy debtors relief which is not provided in the ICRP regulations. Compliance with ICRP regulations will not result in the same relief which can be granted by the courts under 11 U.S.C. § 523(a)(8).
410 B.R. at 675-76. In addition, many of these courts are concerned that the ICRP allows the Department of Education to substitute its administrative determination regarding undue hardship for the bankruptcy judge’s statutorily mandated discretion under § 523(a)(8). See id.; see also In re Durrani, 311 B.R. at 509.
ECMC presented undisputed evidence that its loans to the Debtor were eligible for the ICRP. Based on the Debt- or’s adjusted gross income at the time of trial, the bankruptcy court found that her monthly ICRP payments would be $0.00. In its decision after remand, the bankruptcy court acknowledged that the Debtor was aware of the ICRP and her eligibility to participate, but stated that the fact that the Debtor would not be required to repay her student loan under the ICRP did not mandate a finding that her failure to participate in the program prevented a discharge of the debt. Acknowledging both the potential for significant tax liabilities under the ICRP and its concern that finding failure to participate in a zero payment ICRP is per se lack of good faith would be an abdication of the bankruptcy court’s responsibility to determine dischargeability of student loans, it ultimately concluded that:
... shackling the Debtor to the ICRP would be ... a pointless exercise. Although her current payments under the ICRP would be zero, interest would continue to accrue despite the fact that the Debtor’s chances of ever repaying any portion of the loan are virtually nonexistent. The Debtor is now 65 years old, has failed to pass the Massachusetts bar examination three times. She testified she has no plans to retake the exam, which is reasonable in light of her testimony that she lacks the funds to do so, has not come within “striking distance” of passing, and importantly had an adverse physical reaction during the third examination whereby she almost fainted. Moreover, as set forth in this Court’s Memorandum of Decision, the Debtor has attempted unsuccessfully to find employment as a secretary and has sought to publish a novel. These efforts demonstrate her good faith despite her reluctance to be forced into the Ford Program. Nor are circumstances likely to improve for the Debtor. But for the ability to live in the den of her father’s home, the Debtor, without some sort of financial aid, could easily become homeless. In view of her age and work history, her prospects for a better financial future are dim. To subject her to a meaningless repayment plan when she clearly does not have the ability to repay these student loans now or in the foreseeable future is not required by 11 U.S.C. § 523(a)(8) and is inconsistent with this Court’s role as the adjudicator of undue hardship.
2010 WL 147798, at *1-2, 2010 Bankr.LEXIS 71, at *5-6.
ECMC argues that the bankruptcy court failed to comply with the district court’s directives for remand. We disagree. Significantly, the district court did not adopt a per se rule that the availability of a zero payment ICRP should automatically result in a finding of nondischarge-ability. In its decision, the district court held that “[t]he decision whether to discharge [a student loan] in a case where the debtor is eligible but declines to participate in the ICRP must be the result of an individualized analysis in which the ICRP is given weight but for which no particular outcome is prescribed.” 421 B.R. at 37. Thus, although the district court held that the bankruptcy court is obligated to consider the Debtor’s eligibility for participation in the ICRP, it also acknowledged that eligibility alone did not mandate a particular outcome in the undue hardship analysis. Id. The district court concluded, therefore, that the ICRP must be considered as a factor in the undue hardship analysis and remanded the case to the bankruptcy court for proceedings to do so. Id.
On remand, the bankruptcy court clearly stated that, despite the Debtor’s eligibility for the Ford Program, her ability to repay the debt was unrealistic in light of her age, inability to pass the Massachusetts bar examination, difficulty finding employment, and other burdens. These circumstances are amply supported by the record and are appropriate factors to be considered under the totality of the circumstances test. Thus, we conclude that the bankruptcy court adequately considered the Debtor’s decision to forego enrollment in the ICRP as a factor within the totality of the circumstances.
III. The Debtor’s Work Experience and Age
ECMC argues that the bankruptcy court erred in its legal conclusions regarding the Debtor’s work experience and her age. Although ECMC purports to challenge the bankruptcy court’s legal conclusions regarding these issues, it essentially restates the arguments it made in the district court regarding the bankruptcy court’s factual findings. The district court concluded that the bankruptcy court’s factual findings were not clearly erroneous and, therefore, there were no factual issues before the bankruptcy court on remand nor before the Panel in this appeal. See Ellis v. U.S., 313 F.3d at 646.
CONCLUSION
As set forth above, the Panel concludes that the bankruptcy court did not err in its legal conclusions after remand regarding the weight that the Debtor’s eligibility to participate in the ICRP should have in the undue hardship analysis, as well as its conclusion that the totality of the circumstances warranted a finding of undue hardship. Therefore, we AFFIRM.
HAINES, Chief Judge,
concurring.
I agree with the majority’s conclusion that the judgment of the bankruptcy court should be affirmed; I write separately for several reasons.
The majority concludes that the “totality of the circumstances” test is the proper measure of “undue hardship” for determining the dischargeability of student loan obligations under § 523(a)(8). It goes on to assay the correctness of the bankruptcy court’s determination exclusively under the totality of the circumstances model. The determination of the test to be applied to determine dischargeability is, pure and simple, a question of law, reviewed de novo. Abboud v. The Ground Round, Inc. (In re The Ground Round, Inc.), 482 F.3d 15, 17 (1st Cir.2007). We review the bankruptcy court’s conclusion of undue hardship as the determination of a mixed question of law and fact. Lorenz v. Am. Educ. Services/Pa. Higher Educ. Assistance Agency (In re Lorenz), 337 B.R. 423, 429 (1st Cir. BAP 2006) On the “sliding scale” that applies to review of such questions, a determination of undue hardship falls toward the legal/policy end of the spectrum, calling for de novo review, as well. Id.
I have no quarrel with the majority’s conclusion that the debtor demonstrated undue hardship and, therefore, that her student loans should be discharged. This case, however, does not call for choosing between the totality of the circumstances test and the “Brunner ” test, as employing either test would result in affirmance. The majority’s rejection of the Brunner test is unnecessary to resolution of this appeal and, therefore, unwarranted. I am no fan of Brunner. The majority’s criticisms of it are well-taken. I am disinclined to enshrine the majority’s legal determination as a holding when it is of no consequence to this case.
Having lost below under the trial court’s careful consideration of the totality of the circumstances touching on the debtor’s case, the appellant begs us to “adopt” Brunner. But we need not respond (either “yes” or, as here, “no”) when the answer is of no moment.
Having withstood one appellate assault, the bankruptcy court’s factual findings are fixed. They include:
• “[GJiven the Debtor’s lack of recent work history, narrow work experience, failure to pass the bar exam, age, unsuccessful attempts to find employment in a variety of fields, and unsuccessful attempts to sell a novel and acquire a patent, the Debt- or had no reasonably reliable financial resources other than [ ... ] Social Security payments.”
• “[I]f the Debtor participated in the Ford Program, her current financial status would result in her owing no monthly payments for her student loans.”
• “But for the ability to live in the den of her father’s home, the Debtor, without some sort of financial aid, could easily become homeless. In view of her age and work history, her prospects for a better financial future are dim.”
Taken together, these findings provide no basis to conclude that this debtor will ever have the financial resources to payoff (or even pay down) her student loan, on any terms.
One must ask, then, how could the failure to enroll in a program that would — as far as the judicial eye can see — require the debtor to pay nothing, be either a circumstance cutting against discharging the loan under the “totality” test or a lack of “good faith efforts” to pay under Brunner? Under either test, the court below was being asked to deny discharge of the loans on what basis? It could only be on the possibility that the debtor might win the lottery or that some equally improbable instance of financial good fortune could strike. Need it be said that, if such were a sufficient basis to deny discharge of a student loan, the prospect of ever discharging a student loan pursuant to § 523(a)(8) would become fantasy?
Furthermore, taking this case as the one that requires a choice between the totality of the circumstances test and Brunner credits a perverse application of the Brun-ner model. The Brunner court was concerned about debtors who resorted to bankruptcy and sought to discharge student loans without first making a good faith attempt at repayment. Flipping the test’s historical “good faith effort to repay” prong into the future is a misapplication. And in cases like this one, courts would no longer inquire whether a debtor could repay a student loan without undue hardship (as the statute asks). Instead, they would be required to consider whether: (1) when there exists no reasonable possibility of payment; and (2) there exists a program that would require no payment, discharge of student loans must be denied because the debtor cannot satisfy Brun-ner’s “good faith” prong ... because the debtor has not enrolled in the program?
Given that the choice of test makes no difference in this case, and that to make the unnecessary choice here can only contribute to the confusion surrounding undue hardship analysis, I am left to concur in the majority’s conclusion without joining it on the path it has taken to reach it.
. Unless expressly stated otherwise, all references to "Bankruptcy Code” or to specific statutory sections shall be to the Bankruptcy Reform Act of 1978, as amended by the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005 (“BAPCPA”), Pub. L. No. 109-8, 119 Stat. 23, 11 U.S.C. §§ 101, et seq.
. See Bronsdon v. Educ. Credit Mgmt. Corp. (In re Bronsdon), Adv. Pro. No. 08-1062, 2009 WL 95038, 2009 Bankr.LEXIS 69 (Bankr.D.Mass. Jan. 13, 2009).
. See Educ. Credit Mgmt. Corp. v. Bronsdon, 421 B.R. 27 (D.Mass.2009).
. See Bronsdon v. Educ. Credit Mgmt. Corp. (In re Bronsdon), Adv. Pro. No. 08-1062, 2010 WL 147798, 2010 Bankr.LEXIS 71 (Bankr.D.Mass. Jan. 8, 2010).
. For example, the Debtor wrote a novel but was unable to find a publisher. She also applied for a patent on an invention to protect the privacy of hospital patients. At the time of trial, the Debtor had not received a response regarding the patent, and was considering writing another novel or starting a website that would feature commentary on current events.
.The original complaint was filed against "Sallie Mae, Inc.” However, the bankruptcy court subsequently granted ECMC's motion to intervene and be substituted as the defendant in the proceeding.
.In attempting to prove undue hardship under § 523(a)(8), a debtor:
... has a formidable task, for Congress has made the judgment that the general purpose of the Bankruptcy Code to give honest debtors a fresh start does not automatically apply to student loan debtors. Rather, the interest in ensuring the continued viability of the student loan program takes precedence.
Nash, 446 F.3d at 191 (citation omitted). Proof of undue hardship is generally found only in “truly exceptional circumstances, such as illness or the existence of an unusually large number of dependents.” T.I. Fed. Credit Union v. DelBonis, 72 F.3d 921, 927 (1st Cir.1995).
. ECMC, acknowledging that the First Circuit has not adopted either test for determining undue hardship, stated in its brief: "ECMC respectfully requests that this Court join the Nine Circuits that have formally adopted the Brunner test.” Appellant's Brief at 5.
. In several prior cases involving the dis-chargeability of student loans under § 523(a)(8), the Panel has declined to adopt either the Bmnner or the totality of the circumstances test, finding either that the result would be the same under either test, or that the appealing party had waived the issue of the applicable test. See, e.g., In re Lorenz, 337 B.R. at 430; Joyce v. Mt. Peaks Fin. Servs., Inc. (In re Joyce), 342 B.R. 385 (1st Cir.2005); In re Kelly, 312 B.R. at 206; In re Savage, 311 B.R. at 839.
. See, e.g., Sanborn v. Educ. Credit Mgmt. Corp. (In re Sanborn), 431 B.R. 5, 2010 WL 2572717 (Bankr.D.Mass. Jun.23, 2010); Taratuska v. The Educ. Res. Inst., Inc. (In re Taratuska), 2010 WL 583952 (Bankr.D.Mass. Feb.12, 2010); Fahrenz v. Educ. Credit Mgmt. Corp. (In re Fahrenz), 2008 WL 4330312 (Bankr.D.Mass. Sept. 17, 2008); Brunell v. Citibank (S.D.) N.A. (In re Brunell), 356 B.R. 567 (Bankr.D.Mass.2006); Paul v. Suffolk Univ. (In re Paul), 337 B.R. 730 (Bankr.D.Mass.2006); Gharavi v. U.S. Dep’t of Educ. (In re Gharavi), 335 B.R. 492, 497 (Bankr.D.Mass.2006); Hicks v. Educ. Credit Mgmt. Corp. (In re Hicks), 331 B.R. 18, 31-32 (Bankr.D.Mass. 2005); Bourque v. Educ. Credit Mgmt. Corp. (In re Bourque), 303 B.R. 548, 550 (Bankr.D.Mass.2003); Lamanna v. EFS Servs., Inc. (In re Lamanna), 285 B.R. 347 (Bankr.D.R.I.2002); Dolan v. Am. Student Assist. (In re Dolan), 256 B.R. 230, 238 (Bankr.D.Mass. 2000); Kopf v. Dep’t of Educ. (In re Kopf), 245 B.R. 731, 741 (Bankr.D.Me.2000); Phelps v. Sallie Mae Loan Serv. Ctr. (In re Phelps), 237 B.R. 527 (Bankr.D.R.I.1999).
. See Gallagher v. Educ. Credit Mgmt. Corp. (In re Gallagher), 333 B.R. 169, 173 (Bankr.D.N.H.2005); Grigas v. Sallie Mae Serv. Corp. (In re Grigas), 252 B.R. 866 (Bankr.D.N.H. 2000); Garrett v. N.H. Higher Educ. Assistance Found. (In re Garrett), 180 B.R. 358 (Bankr.D.N.H.1995).
. Indeed, the Panel has stated that the only practical difference between the two tests is that under Bmnner, the debtor must establish that she made a good faith effort to repay the loans. See In re Kelly, 312 B.R. at 206.
. See Feather D. Baron, The Nondischarge-ability of Student Loans in Bankruptcy: How the Prevailing "Undue Hardship" Test Creates Hardship of Its Own, 442 U.S.F. L.Rev. 265 (Summer 2007), for timing and ripeness issues in § 523(a)(8) actions.
. See also In re Nash, 446 F.3d at 192 (stating at the outset that ''[u]nder any test assessing eligibility for discharge of student loan debt, appellant must show that her current inability to maintain a minimal standard of living if forced to repay the debt will continue into the future.”).
.The First Circuit has endorsed the totality of the circumstances approach in related bankruptcy settings. See Marrama v. Citizens Bank of Mass. (In re Marrama), 430 F.3d 474, 482 (1st Cir.2005) (good faith is a fact intensive determination to be made on a case-by-case basis assessing the totality of the circumstances), aff'd, 549 U.S. 365, 127 S.Ct 1105, 166 L.Ed.2d 956 (2007); Merrimac Paper Co., Inc. v. Harrison (In re Merrimac Paper Co., Inc.), 420 F.3d 53, 62-63 (1st Cir.2005) (a court sitting in equity must determine the subordination of a claim based on the totality of the circumstances in the particular case); McMullen v. Sevigny (In re McMullen), 386 F.3d 320, 328-29 (1st Cir.2004) (whether a party has acted in bad faith is a quintessential issue of fact to be determined following an examination of the totality of the circumstances); Smith Barney, Inc. v. Strangie (In re Strangie), 192 F.3d 192, 196-97 n. 9 (1st Cir.1999) (concluding that in light of the entire record, and endorsing that whether to pierce a corporate veil is a factual issue to be examined under the totality of the circumstances, the bankruptcy court's determination that the corporate form should be respected is not clear error); First USA v. Lamanna (In re Lamanna), 153 F.3d 1, 2 (1st Cir.1998) (adopting the totality of the circumstances test as the measure of substantial abuse under § 707(b) of the Bankruptcy Code); Palmacci v. Umpierrez, 121 F.3d 781, 793 (1st Cir.1997) (fraudulent intent in a § 523(a)(2)(A) action is normally determined from the totality of the circumstances); Williamson v. Busconi, 87 F.3d 602, 603 (1st Cir.1996).
. See, e.g., In re Denittis, 362 B.R. at 64; see also Educ. Credit Mgmt. Corp. v. Jesperson, 571 F.3d 775, 782 (8th Cir.2009); Cheney v. Educ. Credit Mgmt. Corp. (In re Cheney), 280 B.R. 648 (N.D.Iowa 2002); Walker v. Sallie Mae Serv. Corp. (In re Walker), 427 B.R. 471, 486-87 (8th Cir. BAP 2010); Lee v. Regions Bank Student Loans (In re Lee), 352 B.R. 91, 95 (8th Cir. BAP 2006); Vargas v. Educ. Credit Mgmt. Corp. (In re Vargas), 2010 WL 148632, *4-5, 2010 Bankr.LEXIS 63, *12-13 (Bankr.C.D.Ill. Jan. 12, 2010); Booth v. U.S. (In re Booth), 410 B.R. 672, 675-76 (Bankr.E.D.Wash.2009); Halverson v. U.S. Dep’t of Educ. (In re Halverson), 401 B.R. 378 (Bankr.D.Minn.2009); Collins v. Educ. Credit Mgmt. Corp. (In re Collins), 376 B.R. 708, 716 (Bankr.D.Minn.2007); Wilkinson-Bell v. Educ. Credit Mgmt. Corp. (In re Wilkinson-Bell), 2007 Bankr.LEXIS 1052, * 16 (Bankr.C.D.Ill. Apr. 7, 2007).
. There are courts that, despite following the Brunner test, have held that forgoing enrollment in the ICRP is a factor to consider in determining whether a debt is excepted from discharge under § 523(a)(8), but that the failure to participate is not per se indicative of bad faith and is not outcome determinative. See, e.g., Barrett v. Educ. Credit Mgmt. Corp., 487 F.3d 353 (6th Cir.2007); Educ. Credit Mgmt. Corp. v. Mosley, 494 F.3d 1320 (11th Cir.2007).
. We agree with the district court's conclusion that "[t]he record shows a pattern of gradually decreasing employability followed by prolonged unemployment, despite a broad and vigorous job search and increasing education and work experience.” 421 B.R. at 33.
. Brunner v. New York State Higher Educ. Servs. Corp. 831 F.2d 395 (2d Cir.1987) (hereafter "Brunner ’’).
. See In re Lorenz, 337 B.R. at 432; Kopf v. Dep’t of Educ. (In re Kopf), 245 B.R. 731, 741 (Bankr.D.Me.2000).
. Supra at 4.
. Supra at 4.
. Bronsdon v. Educ. Credit Mgmt. Corp.(In re Bronsdon), 2010 WL 147798, at *2, 2010 Bankr.LEXIS 71, at *6 (Bankr.D. Mass. Jan 8, 2010); Educ. Credit Mgmt. Corp v. Bronsdon (In re Bronsdon), 421 B.R. 27, 33 (D.Mass. 2009) (affirming the bankruptcy court's finding that Bronsdon would not be able to obtain employment in the future).
. Brunner, 831 F.2d at 397; see Cazenovia College v. Renshaw (In re Renshaw), 222 F.3d 82, 87 (2d Cir.2000) ("Congress enacted § 523(a)(8) because there was evidence of an increasing abuse of the bankruptcy process that threatened the viability of educational loan programs and harm to future students as well as taxpayers”); United Student Aid Funds v. Pena (In re Pena), 155 F.3d 1108, 1111 (9th Cir.1998) ("Section 523(a)(8) was a response to 'a rising incidence of consumer bankruptcies of former students motivated primarily to avoid payment of education loan debts' "); Andrews Univ. v. Merchant (In re Merchant), 958 F.2d 738, 740 (6th Cir.1992) (“The legislative history of the 11 U.S.C. § 523(a)(8) teaches us that the exclusion of education loans from the discharge provisions was designed to remedy an abuse by students, who immediately upon graduation, filed petition for bankruptcy and obtained a discharge of their educational loans.”).
. See, e.g., In re Kopf, 245 B.R. 731; Educ. Credit Mgmt. Corp. v. Polleys, 356 F.3d 1302, 1310 (10th Cir.2004) ("Courts should base their estimation of a debtor's prospects on specific articulable facts, not unfounded optimism.”); Wilson v. Educ. Credit Mgmt. Corp. (In re Wilson), 2002 WL 32155401, *4 (Bankr.E.D.Va. Jun.25, 2002) ("Good faith effort also requires 'the debtor to have made payments when he or she was in a position to make such payments.’ ") (quoting Lohr v. Sallie Mae (In re Lohr), 252 B.R. 84, 89 (Bankr.E.D.Va.2000)); Maulin v. Salliemae (In re Maulin), 190 B.R. 153, 156 (Bankr.W.D.N.Y.1995) ("[T]he demonstration of good faith does not necessarily command a history of payment. It does require a history of effort to achieve repayment ... Relevant proof may ... include a history of some payment, the propitious use of deferments and the energetic exploration of employment options.”).
| CASELAW |
V-E+F=2.
Euler's formula (well, there are several, but this is one of them) is a remarkable characterization of bodies in R3. For such an interesting formula, there are remarkably few different proofs. There's the "usual" proof, and also some proofs using abstract nonsense which, quite frankly, I don't understand.
This is not the usual proof that V-E+F=2. The usual one is to prove it for planar graphs, then claim that one may transform any polytope with no holes in it to a planar graph by puncturing one of the faces and stretching it out into the exterior face of the planar graph).
Instead, this proof uses spanning trees. I've only ever seen it in a book by Coxeter, so I might as well attribute it to him.
One final note: neither proof makes it very clear where the fact that the polytope has no holes is used! (The theorem is false for any polytope with holes). Both really rely on your intuition. Real proofs require a disgusting amount of algebraic topology (and arguably merely redefine "hole" in a convenient manner...).
Sketch of proof that V-E+F=2
With any polytope, we may associate 2 graphs:
• A graph whose nodes are the polytope's vertices, and has the same edges as the polytope (2 nodes are connected by an edge if their vertices are connected by that edge).
• A dual graph, whose nodes are the polytope's faces, and has the same edges as the polytope (2 nodes are connected by an edge if that edge separates the 2 faces).
This in itself is quite remarkable, and should be meditated upon.
Now pick a spanning tree of the (first) graph. This is some subset of the edges. Paint this subset red, and the remaining edges blue. In the dual graph, look at the set of all blue edges not used by this spanning tree. We claim that this set is a spanning tree of the dual graph! (Accordingly, we call it the "dual spanning tree").
To show this, we must show that it contains no cycles, and that the set of faces with these blue edges is indeed connected.
No cycle can exist:
Such a cycle would either be the set of all edges emanating from a vertex, or completely surround some vertex. This would mean the original (red) spanning tree doesn't touch that vertex, which is a contradiction to its being spanning.
Every face must be connected:
The only way a face can be disconnected is if it is completely surrounded by a red cycle (either directly, or along with some other adjacent faces). But this would mean that the red spanning tree contains a cycle, which is a contradiction to its being a tree.
So the blue edges are spanning because the red edges are a tree, and they're a tree because the red edges are spanning.
Now just note that every edge is either red or blue. Since the number of edges in a tree is 1 less than the number of nodes, we have V-1 red edges and F-1 blue edges. So E=V+F-2, which is what we set out to prove.
Log in or registerto write something here or to contact authors. | ESSENTIALAI-STEM |
Our Approach
detox_logos_final-09 Multi-omics
With this innovative project we are undertaking an integrated global analysis of the entire cellular system, encompassing the transcriptome, proteome (cytoplasmic, periplasmic and membrane proteins), metabolome (cytoplasm, periplasm, cell wall and footprint) and lipidome (membranes). Since the majority of desirable chemical products are membrane-disrupting chemicals, we will also study the all-important structural changes in the cell membrane that underpin cellular responses to toxins.
Previous industrial and academic research in this area has been fragmentary, with focus on specific cell types and individual chemicals. In particular, studies on toxin-exposed cells have tended to focus on just one of the “omes” (usually the transcriptome), and have not, to date, provided sufficient information to provide the step change in reverse engineering to deliver highly-productive, product-resistant hosts for industrial synthetic biology. By contrast, our multi-omic integrated whole systems analysis will provide a much deeper understanding of bacterial physiology that can be used to grow further UK IBBE business in the long term.
In addition, through the creation of DETOXbase and integration of metabolic modelling we will be able to design both generic and specific solutions to reverse engineer hosts for improved chemical tolerance, and hence remove this significant barrier to profitability.
web-circle-diagram-smaller
Our project combines multi-omics and whole organism data integration with a rational engineering approach, within an interative cycle of improvement and testing.
detox_logos_final-10DETOXbase
DETOXbase will be our flagship online resource providing deep insight into the cellular responses to chemical stress. The resource will expand on the EchoBase architecture, originally created as a comprehensive resource for Escherichia coli and used to characterize functionally unknown genes by integrating experimental data with genome annotation. DETOXbase will build on this principal by incorporating additional data types including gene expression, protein abundance, metabolite profiles, and lipidomic data together with whole genome metabolic models.
Through the use of bioinformatic analysis and an interactive visual interface, DETOXbase will allow users to explore these fully integrated data sets and identify patterns indicating different types of stress responses; from defence against chemical damage, removal or neutralization of toxins, to responses that modify cell architecture and increase robustness. Ultimately DETOXbase will help researchers to predict interventions that will provide a tailored increase in tolerance to a specific product, and provide a framework that can be applied to any organism being studied.
detox_logos_final-10Transport and Efflux
The DETOX project will apply knowledge of transporter biology to improve resistance to chemical toxicity. This could be aiding the more rapid uptake of chemicals which can be detoxified intracellularly, such as growth inhibitors present in lignocellulosic feedstocks, or in the efflux of the products of industrial fermentations. The project was created through the management board of CBMNet, a BBSRC funded Network in Industrial Biotechnology, and so membrane-based processes are a focus of our engineering processes.
detox_logos_final-11Rational Engineering
We will apply our world-leading membrane science (efflux pumps, proteomics, lipidomics & membrane biophysics) to execute novel, rational redesign of cell membranes to enhance resistance. Through creation of DETOXbase and integration of metabolic modelling we will be able to design both generic and specific solutions to reverse engineer hosts for improved chemical tolerance, and hence remove this significant barrier to profitability. As examples, the solutions will build on our expertise in membrane function, & include expression of heterologous toxin efflux pumps & metabolic engineering to alter membrane fluidity.
Natural ‘detoxification’ systems have recently been discovered that couple uptake of toxic chemicals with chemical conversion to non-toxic metabolites, hence effectively removing their toxic intracellular effects. We will take inspiration from this approach to couple uptake of key toxins, e.g. phenolics and acetate, to their conversion to non-toxic production using our ENTRAPed methodology.
Finally, our intention is to fully integrate multiple solutions into a single chassis, through iterative cycles of testing, which will include solutions from this project & others from naturally occurring chemically tolerance bacteria such as Pseudomonas and acetate-resistant Acetobacter. Part of this solution will include producing strains that can alter their membrane lipid composition in response to toxic insult during a fermentation, as introduction of vaccenic acid is known to alter solvent tolerance.
detox_logos_final-12Responsible Innovation
Responsible Research and Innovation (RRI) can be described as an approach that aims to anticipate, and take into account, the potential implications of technoscientific processes as well as the expectations of society. A number of descriptions, policies and frameworks for RRI have been developed in the UK, EU and beyond. ‘Tools’ have been developed to elucidate and track processes. However, RRI cannot be taken as something stable, agreed or pre-determined. Like many aspects of science and innovation, it is a work-in- progress; the meanings of RRI have still to be elaborated, analysed, understood. Those meanings, we can anticipate, will be multiple and thus we aim to explore differing perspectives on the notion of RRI and its effects within the specific project context of DETOX.
| ESSENTIALAI-STEM |
Health-care stocks are down in early Wednesday trade, led by Anthem, Cigna and UnitedHealth
Health-care stocks continued to fall on Wednesday morning, led by Anthem Inc. , Cigna Corp. and UnitedHealth Group Inc. The Health Care Select Sector SPDR Fund was down 1.5% in early intraday trade.Companies in the managed care and health services sectors are facing "temporary downside risk," thanks to the Medicare-for-all debate, analysts at J.P. Morgan wrote in a note to clients Tuesday. UnitedHealth reported earnings on Tuesday that beat expectations, but shares still fell, a possible indication of investors' anxiety over U.S. Sen. Bernie Sanders' latest Medicare-for-all proposal.The Health Care Select Sector SPDR Fund has been lagging the market in recent months, gaining 1.2% in the year to date. The S&P 500 has gained 16% and the Dow Jones Industrial Average has gained 13.4%. | NEWS-MULTISOURCE |
Health Student-made
The health trends that could harm your smile
We are constantly inundated with new health trends that are supposedly good for our bodies. I’ve been in the fitness industry as a personal trainer and fitness instructor for nearly 10 years, and have seen my fair share of diets and detoxes during this time. When I started studying Dentistry in 2017, I soon began to notice how certain ‘healthy eating’ or ‘detox’ fads are not conducive to an individual’s dental health.
So, what exactly are the health trends, ‘harmless habits’, and diets causing poor oral health in our population?
Hot lemon water
Starting the day with a glass of hot water with a slice of lemon is becoming increasingly popular as a detox method amongst the health conscious. Fans of this trend believe that it promotes a flatter stomach and ‘glowy’ completion. But these drinks aren’t doing your teeth any good.
The lemon acidity can cause enamel erosion and expose the underlining yellower dentine which can cause sensitivity and ruin your pearly white smile.
If you don’t want to give up your morning citrus beverage, then try these modifications to protect your teeth:
– Use cold water. Warm water is a better solvent, so the acids in hot lemon water are more available to erode the enamel.
– Reduce the strength of your glass to dilute the citric acid.
– Use a straw so that the juice is sent to the back of your mouth, bypassing your teeth.
– Rinse your mouth out with water to remove any acidic residue.
– Wait an hour before you brush your teeth as acid softens the enamel and brushing softened enamel can damage it.
– Consider switching from lemon juice to a couple of drops of lemon essential oil instead.
Herbal Teas
Green tea is packed full of health-boosting antioxidants, but it can cause tooth surface staining. Tea varieties contain tannins, which naturally stain teeth and gums if consumed overtime.
Rinsing out with water after consuming a cup of tea could help to prevent the build-up of staining and keep your teeth looking pearly white.
Fruit smoothies and juices
Fruit is a vital source of nutrients and fibre but when it is blended into a smoothie, the sugars inside become ‘available’ to harm your dentition. The surge in popularity of juicing has led to a rise in enamel erosion, sensitivity and decay.
Drinking these beverages through a straw or opting for a vegetable smoothie can help protect your smile from damage.
Apple cider vinegar shots
Apple cider vinegar has been known to kill bacteria, reduce blood pressure leading to a reduced risk of heart disease, help to lower blood sugar levels, and aid in weight-loss by satiating your appetite. These claims are not wholly support by science and further research is needed to determine the exact benefits of this beverage.
What is known about apple cider vinegar, is that the acidity of the vinegar will erode your enamel and expose the yellow dentine layer beneath. So, not only can vinegar damage your teeth and cause sensitivity but it will make them look yellow.
Fluoride-free toothpaste
Fluoride is the negative ion of the element fluorine. It is naturally occurring and can be found in trace amounts in the soil, air, water and many foods. It has been scientifically proven to help prevent tooth decay because it has a vital role in the mineralisation of your bones and teeth, keeping them hard and strong. Fluoride is even added to water supplies in some places because of its ability to help prevent dental cavities.
Despite scientific backing, some people believe that fluoride is a harmful toxin, and with the proliferation of these beliefs, new formulas of fluoride-free toothpastes have started to appear. Whilst these toothpastes may freshen your breath and kill bacteria, they are unable to provide the protection against decay that fluoride toothpastes are able to.
Grazing
Eating smaller meals frequently is advocated in the health and fitness industry to help us lose weight and maintain a fast metabolism. The reality is that snacking on things like dried fruit throughout the day increases the frequency of sugar consumption and can lead to dental decay.
When dietary sugars are consumed, acids are produced and so the pH in your mouth falls which results in the subsequent destruction of tooth tissue. If an individual is snacking frequently throughout the day then damage occurs often, and your saliva will not have chance to repair the damage before the next ‘sugar attack’.
By reducing the frequency of food consumption and chewing sugar free gum after meals it can help to lower the acidity in your mouth and prevent a cavity developing.
Sports drinks and supplements
Electrolyte drinks, post-workout protein shakes, and energy bars have their place in sport to help participants stay hydrated, replenish energy supplies, replace minerals, and aid in recovery. However, these products often contain high levels of sugars and acids, which can lead to dental cavities.
The acids will corrode tooth enamel and make your teeth more vulnerable to bacteria, which feed off the excess sugars in these drinks. Bacteria can then sneak into the cracks of your tooth enamel and cause decay which in turn results in cavities.
If these products are an essential part of your training regimen, then try these tips to protect your teeth:
– Rinse your teeth with plain water or mouthwash once you’ve finished consuming them.
– Wait 30 minutes before brushing your teeth to avoid causing more damage to softened enamel and keep you from spreading the acid across your teeth.
– Use a straw if possible, to keep the sports drink from coming into contact with your teeth.
Non-dairy milk
Many individuals are choosing to switch from dairy milk to almond, coconut, cashew or oat milk. There are perks to these milk alternatives, especially if you have a lactose intolerance or avoid dairy for ethical reasons. It’s important to choose your carton wisely, as many of these milk alternatives are sweetened with sugar and do not contain calcium.
When choosing a non-dairy milk ensure that it is free from added sugars to avoid tooth decay. It’s also important to look for milks that are fortified with at least 120mg of calcium per 100ml as it is an essential mineral that gives our teeth their strength and shape.
Kombucha
Kombucha is a drink produced by fermenting sweet tea with a culture of bacteria and yeast. It’s full of probiotics which can aid in digestion and overall health, however it can cause tooth damage.
The bacteria in kombucha creates acidity that’s harmful to your teeth’s enamel and this bacterium can also cause the bad bacteria that’s already present in your mouth to grow and create an unhealthy environment for your gums. Additionally, it can stain your teeth.
It’s important to take precaution if you do consume this drink by reducing your intake and using a straw so that your teeth won’t take a direct hit from the drink’s acidity.
Whatever new health fad you are tempted by, be sure to do your research first. It might even be worth consulting your doctor or dentist about them too!
%d bloggers like this: | ESSENTIALAI-STEM |
2012 Olympics: complexities and costs of legacy | UK news | The Guardian
Dave Hill Wednesday 9 June 2010 03.03 EDTFirst published on Wednesday 9 June 2010 03.03 EDT Yesterday's Economic Development Committee meeting was full of regeneration jargon about creating media ecosystems and embedding anchor tenants within broader strategies (or thereabouts), but if you can find a spare hour to spend with the webcast you will gain a clearer picture of how vast is the task of making the Olympic legacy work - and how unclear the post-Games future of the Olympic Park remains. Four experts in the business of making lumps of brand new sport and media infrastructure work for the benefit of the communities around them offered their thoughts on dos and don'ts. Where the main stadium is concerned, the consensus was that a permanent football tenant - West Ham, of course, is very interested - is the best way to ensure that the surrounding neighbourhood feels permanently alive, though how this would be squared with the Olympic bid commitment to provide a world class athletics venue remains an unanswered question. One guest in particular, Danny Meaney of New Media Partners, was at pains to stress the complexities of planting and nurturing a media hub on a brand new site far from those that already exist in London. Media industries struggle with new buildings, he said and made the point that while a suitable new anchor tenant would draw more people in the very newness of the building would tend to drive up the surrounding land prices, making it harder for others to follow. He pointed out that Hollywood, the biggest media hub of all, had been built with public money - huge subsidies and tax breaks - to draw the US film industry west from New York. The Lib Dems' Dee Doocey had already observed that at present there is no public money budget for post-Games regeneration, other than to remove superfluous bridges. What price legacy in the age of austerity? To get up to speed with other recent developments, check out Paul Norman's Olympic blog. Westfield, whose shopping centre will be another huge feature of the Park, is seeking to host a casino there. Meanwhile, private sector investment has been leveraged into Bromley-by-Bow in the form of a Tesco-led regeneration scheme that will comprise not just a supermarket, but a 100-bed hotel, 450 new homes, a library and a primary school. As the Con-Lib axe hovers, is this the future of legacy? | NEWS-MULTISOURCE |
Multi-class multi-level classification algorithm for skin lesions classification using machine learning techniques
Nazia Hameed, Antesar M. Shabut, Miltu K. Ghosh, M.A. Hossain
Research output: Contribution to journalArticlepeer-review
218 Downloads (Pure)
Abstract
Skin diseases remain a major cause of disability worldwide and contribute approximately 1.79% of the global burden of disease measured in disability-adjusted life years. In the United Kingdom alone, 60% of the population suffer from skin diseases during their lifetime. In this paper, we propose an intelligent digital diagnosis scheme to improve the classification accuracy of multiple diseases. A Multi-Class Multi-Level (MCML) classification algorithm inspired by the “divide and conquer” rule is explored to address the research challenges. The MCML classification algorithm is implemented using traditional machine learning and advanced deep learning approaches. Improved techniques are proposed for noise removal in the traditional machine learning approach. The proposed algorithm is evaluated on 3672 classified images, collected from different sources and the diagnostic accuracy of 96.47% is achieved. To verify the performance of the proposed algorithm, its metrics are compared with the Multi-Class Single-Level classification algorithm which is the main algorithm used in most of the existing literature. The results also indicate that the MCML classification algorithm is capable of enhancing the classification performance of multiple skin lesions.
Original languageEnglish
Article number112961
JournalExpert Systems with Applications
Volume141
Early online date18 Sep 2019
DOIs
Publication statusPublished - 1 Mar 2020
Fingerprint
Dive into the research topics of 'Multi-class multi-level classification algorithm for skin lesions classification using machine learning techniques'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Refined histopathological predictors of BRCA1 and BRCA2 mutation status: a large-scale analysis of breast cancer characteristics from the BCAC, CIMBA, and ENIGMA consortia
Spurdle, A B, Couch, F J, Parsons, M T, McGuffog, L, Barrowdale, D, Bolla, M K, Wang, Q, Healey, S, Schmutzler, R K, Wappenschmidt, B, Rhiem, K, Hahnen, E, Engel, C, Meindl, A, Ditsch, N, Arnold, N, Plendl, H, Niederacher, D, Sutter, C, Wang-Gohrke, S, Steinemann, D, Preisler-Adams, S, Kast, K, Varon-Mateeva, R, Ellis, S, Frost, D, Platte, R, Perkins, J, Evans, D G, Izatt, L, Eeles, R, Adlard, J, Davidson, R, Coleman, T, Scuvera, G, Manoukian, S, Bonanni, B, Mariette, F, Fortuzzi, S, Viel, A, Pasini, B, Papi, L, Varesco, L, Balleine, R, Nathanson, K L, Domchek, S M, Offitt, K, Jakubowska, A, Lindor, N, Thomassen, M, Jensen, U B, Rantala, J, Borg, A, Andrulis, I L, Miron, A, Hansen, T V O, Caldes, T, Neuhausen, S L, Toland, A E, Nevanlinna, H, Montagna, M, Garber, J, Godwin, A K, Osorio, A, Factor, R E, Terry, M B, Rebbeck, T R, Karlan, B Y, Southey, M, Rashid, M U, Tung, N, Pharoah, P D P, Blows, F M, Dunning, A M, Provenzano, E, Hall, P, Czene, K, Schmidt, M K, Broeks, A, Cornelissen, S, Verhoef, S, Fasching, P A, Beckmann, M W, Ekici, A B, Slamon, D J, Bojesen, S E, Nordestgaard, B G, Nielsen, S F, Flyger, H, Chang-Claude, J, Flesch-Janys, D, Rudolph, A, Seibold, P, Aittomaki, K, Muranen, T A, Heikkila, P, Blomqvist, C, Figueroa, J, Chanock, S J, Brinton, L, Lissowska, J, Olson, J E, Pankratz, V S, John, E M, Whittemore, A S, West, D W, Hamann, U, Torres, D, Ulmer, H U, Rudiger, T, Devilee, P, Tollenaar, R A E M, Seynaeve, C, Van Asperen, C J, Eccles, D M, Tapper, W J, Durcan, L, Jones, L, Peto, J, dos-Santos-Silva, I, Fletcher, O, Johnson, N, Dwek, M, Swann, R, Bane, A L, Glendon, G, Mulligan, A M, Giles, G G, Milne, R L, Baglietto, L, McLean, C, Carpenter, J, Clarke, C, Scott, R, Brauch, H, Brüning, T, Ko, Y-D, Cross, S S, Cox, A, Reed, M, Lubinski, J, Jaworska-Bieniek, K, Durda, K, Gronwald, J, Dork, T., Bogdanova, N, Park-Simon, T-W, Hillemanns, P, Haiman, C A, Henderson, B E, Schumacher, F, Le Marchand, L, Burwinkel, B, Marme, F, Surovy, H, Yang, R, Anton-Culver, H, Ziogas, A, Hooning, M J, Collee, J M, Martens, J W M, Tilanus-Linthorst, M M A, Brenner, H, Dieffenbach, A K, Arndt, V, Stegmaier, C, Winqvist, R, Pylkas, K, Jukkola-Vuorinen, A, Grip, M, Lindblom, A, Margolin, S, Joseph, V, Robson, M, Rau-Murthy, R, Gonzalez-Neira, A, Arias, J I, Zamora, P, Benatez, J, Mannermaa, A, Kataja, V, Kosma, V-M, Hartikainen, J M, Peterlongo, P, Zaffaroni, D, Barile, M, Capra, F, Radice, P, Teo, S H, Easton, D F, Antoniou, A C, Chenevix-Trench, G and Goldgar, D E (2014) Refined histopathological predictors of BRCA1 and BRCA2 mutation status: a large-scale analysis of breast cancer characteristics from the BCAC, CIMBA, and ENIGMA consortia. Breast Cancer Research, 16 (6). p. 3419. ISSN 1465-5411
[img] PDF - Published Version
Available under License Creative Commons Attribution.
Download (591kB)
Abstract
Introduction: The distribution of histopathological features of invasive breast tumors in BRCA1 or BRCA2 germline mutation carriers differs from that of individuals with no known mutation. Histopathological features thus have utility for mutation prediction, including statistical modeling to assess pathogenicity of BRCA1 or BRCA2 variants of uncertain clinical significance. We analyzed large pathology datasets accrued by the Consortium of Investigators of Modifiers of BRCA1/2 (CIMBA) and the Breast Cancer Association Consortium (BCAC) to reassess histopathological predictors of BRCA1 and BRCA2 mutation status, and provide robust likelihood ratio (LR) estimates for statistical modeling. Methods: Selection criteria for study/center inclusion were estrogen receptor (ER) status or grade data available for invasive breast cancer diagnosed younger than 70 years. The dataset included 4,477 BRCA1 mutation carriers, 2,565 BRCA2 mutation carriers, and 47,565 BCAC breast cancer cases. Country-stratified estimates of the likelihood of mutation status by histopathological markers were derived using a Mantel-Haenszel approach. Results: ER-positive phenotype negatively predicted BRCA1 mutation status, irrespective of grade (LRs from 0.08 to 0.90). ER-negative grade 3 histopathology was more predictive of positive BRCA1 mutation status in women 50 years or older (LR = 4.13 (3.70 to 4.62)) versus younger than 50 years (LR = 3.16 (2.96 to 3.37)). For BRCA2, ER-positive grade 3 phenotype modestly predicted positive mutation status irrespective of age (LR = 1.7-fold), whereas ER-negative grade 3 features modestly predicted positive mutation status at 50 years or older (LR = 1.54 (1.27 to 1.88)). Triple-negative tumor status was highly predictive of BRCA1 mutation status for women younger than 50 years (LR = 3.73 (3.43 to 4.05)) and 50 years or older (LR = 4.41 (3.86 to 5.04)), and modestly predictive of positive BRCA2 mutation status in women 50 years or older (LR = 1.79 (1.42 to 2.24)). Conclusions: These results refine likelihood-ratio estimates for predicting BRCA1 and BRCA2 mutation status by using commonly measured histopathological features. Age at diagnosis is an important variable for most analyses, and grade is more informative than ER status for BRCA2 mutation carrier prediction. The estimates will improve BRCA1 and BRCA2 variant classification and inform patient mutation testing and clinical management. © 2014 Spurdle et al.; licensee BioMed Central.
Item Type: Article
Schools and Departments: Brighton and Sussex Medical School > Brighton and Sussex Medical School
Subjects: R Medicine
Depositing User: Esme Acton-Stewart
Date Deposited: 19 Jan 2016 09:18
Last Modified: 07 Mar 2017 06:14
URI: http://sro.sussex.ac.uk/id/eprint/57939
View download statistics for this item
📧 Request an update | ESSENTIALAI-STEM |
One-for-one checking
In systems auditing, one-for-one checking is a control process that is frequently used to ensure that specific elements between two or more sources of data are consistent. The control process can also reduce the chances of human error by typos and miskeyed information.
An operations manager might use one-for-one checking of cheques and receivables in order to verify that cash collected is properly reflected by the receivable accounts with regard to the collected cash (i.e., each cheque is associated with an invoice). | WIKI |
The English language terminology used in the classification of swords is imprecise and has varied widely over time. There is no historical dictionary for the universal names, classification or terminology of swords; a sword was simply called "sword" in whatever language the swordsmen spoke.
The word “claymore” refers to the Scottish basket-hilted broadsword, not to the two-handed sword as many people tend to believe. The earliest recorded usage of the term “claymore” was in relation to the broadsword, and this usage was most common until the 19th century.
The ninjatō is typically depicted as being a short sword, often portrayed as having a straight blade (similar to that of a shikomizue) with a square guard. Usually of a length "less than 60 cm", the rest of the sword is comparatively "thick, heavy and straight".
The word "rapier" generally refers to a relatively long-bladed sword characterized by a protective hilt which is constructed to provide protection for the hand wielding the sword. Some historical rapier samples also feature a broad blade mounted on a typical rapier hilt.
The swordstick was a popular fashion accessory for the wealthy during the 18th and 19th centuries. During this period, it was becoming less socially acceptable to openly carry a sword, but there were still upper-class men routinely trained in swordsmanship who wished to go armed for self-defense.
Viking Age Arms and Armor Viking Swords. More than anything else, the sword was the mark of a warrior in the Viking age. They were difficult to make, and therefore rare and expensive. The author of Fóstbræðra saga wrote in chapter 3 that in saga-age Iceland, very few men were armed with swords. | FINEWEB-EDU |
Page:Castes and Tribes of Southern India, Volume 2.djvu/270
GADABA In the Madras Census Report, 1871, Mr. H. G.Turner states that "very much akin to the Gadabas are a class called Kerang Kāpus. They will not admit any connexion with them; but, as their language is almost identical, such gainsaying cannot be permitted them. They are called Kerang Kāpu from the circumstance of their women weaving cloths, which they weave from the fibre of a jungle shrub called Kerang (Calotropis gigantea)" Mr. H. A. Stuart remarks * that "the Kāpu Gadabas are possibly the Kerang Kāpus mentioned by Mr. Turner as akin to the Gadabas, for I find no mention of the caste under the full name of Kerang Kāpu, nor is Kerang found as a sub-division of either Kāpu or Gadaba." Writing concerning the numeral system of the Kerang Kāpus, Mr. Turner observes that it runs thus: Moi, Umbar, Jugi, O, Malloi, Turu, Gū, Tammar, Santing, Goa, and for eleven (I and following numbers), they prefix the word Go, e.g., Gommoi, Gombāro, etc. The Kerang Kāpus can count up to nineteen, but have no conception of twenty. According to Mr. W. Francis, the only tribe on the hills which has this system of notation is the Bonda Poraja. The Gadabas have very similar names for the first five numerals; but, after that, lapse into Oriya, e.g., sāt, āt, nō, das, etc. The Bonda Poraja numerals recorded by Mr. Francis are muyi, baar, gii, 00, moloi, thiri, goo, thamām, and so on up to nineteen, after which they cannot count. This system, as he points out, agrees with the one described by Mr. Turner as belonging to the Kerang Kāpus. The Gutōb Gadaba numerals recorded by Mr. C. A. Henderson include muititti (1 + a hand), and martitti (2 + a hand). | WIKI |
Argentina prepares return to euro market
NEW YORK, Sept 23 (IFR) - Argentina is poised to issue its first euro-denominated bonds in 15 years as the sovereign continues its rehabilitation in the capital markets. The country is expected to come with a relatively small dual-tranche trade that could reach around 1.5bn. It will be Argentina’s third cross-border offering this year as it tackles hefty funding needs, having already raised US$19.25bn from its first year in the international debt market since 2001. Investors like the government’s turnaround story. But with substantial requirements ahead, the administration of President Mauricio Macri needs to find alternative funding sources if it wants to ease supply pressures in its core US dollar market. “It has become clearer that the pace of fiscal adjustment is going to be more gradual than originally expected and they will continue to need funding next year,” said Alejo Czerwonko, an emerging markets economist at UBS Wealth Management. Finance Minister Alfonso Prat-Gay was quoted this week as saying that the country would not issue more than US$10bn-$15bn in international debt next year. “If they are going to come back next year for another US$10bn-$15bn, they’ll want to start funding in different places,” said a New York-based syndicate manager. While accounts have been receptive buyers of Argentine dollar debt amid a global hunt for yield, patience in the dollar market may wear thin should the government abuse its welcome there. Several on the buyside were quick to grumble when the sovereign returned to the dollar markets in July despite promises to cap this year’s supply at the US$16.5bn it issued in April to pay holdout creditors and cure its default. In an effort to widen its funding options, the government has been working to deepen its own local market. Talk of a possible renminbi-denominated Panda bond has also been making the rounds. The euro bond market, however, seems like the most natural choice for a sovereign in search of new investors. Not only is it one of the few markets that provides sufficient scale for the size Argentina needs, but the country should also receive a warm welcome in a market where even EM credits are trading at razor-thin yields. The swap back to dollars would be extremely costly for a country that is still rated just B3/B-/B, but Argentina is expected to keep the proceeds in euros. “The cost to swap Argentina risk would be prohibitive, but they have enough trade flows [with Europe] to justify keeping euros,” said the syndicate manager. DUAL-TRANCHER The sovereign is seeking a dual-tranche issue with one tranche likely to have a short to intermediate tenor and the other longer-dated. But pricing the bonds will not be straightforward in view of Argentina’s long absence from the euro market and the limited comps at hand. “It’s a bit of an unknown with pricing,” admitted a banker close to the deal. “We’ve had lots of conversations with investors who look at it in different ways.” The most obvious place to start is with some of the country’s legacy debt denominated in euros, namely the discounts due 2033 and pars due 2038. Those have been trading at around 6.7% and 7%, respectively. Investors, however, are expected to provide a premium for bonds with no association to previous defaults, much like they did with its re-entry into the dollar market in April. “The market is willing to pay a premium for a cleaner Argentina bond,” said Czerwonko. There is still quite some distance between where the pars and discounts are trading and levels on euro-denominated bonds issued by investment-grade sovereigns from other Latin American countries. Colombia, the most recent Latin American sovereign to have tapped the euro market, has 2026s being quoted at a yield of just 2.26%. That spread differential between the two sovereigns in the dollar market - where Colombia 4.5% 2026s are trading at 3.28% versus 5.62% on Argentina’s 7.5% 2026s - could provide a good measuring stick in euros, say bankers. Other market participants, however, feel that the divergent monetary policies in those markets weakens such arguments. “The European Central Bank is still buying sovereign bonds and this impacts the whole euro space, so it is not a good idea to use the dollar market as a reference point,” Czerwonko said. Syndicate bankers will have to tread carefully, especially as the sovereign plans to make regular returns to the euro market. “They are looking to strategically position themselves for the next 10 to 15 years in terms of having a fresh liquid euro curve,” said the banker close to the deal. Investor meetings start on September 26 with an offering possibly as early as Thursday through leads BBVA, BNP Paribas and Credit Suisse. (Reporting By Paul Kilby and Robert Hogg; Editing by Matthew Davies) | NEWS-MULTISOURCE |
Review: ‘Uncommon Sense’ Looks at Life on the Autism Spectrum
Moose likes to watch the jellyfish at the aquarium; at home he plays with an eggbeater. That’s about it for his interests. What little language he acquired as a toddler has all but evaporated by adolescence. Lali doesn’t speak either; her main source of stimulation and solace is uncooked rice. She spends most of her time scooping it up and letting it cascade through her fingers. Dan, on the other hand, is highly verbal. A college graduate who hopes to work as an actuary, he goes on at length about his likes (cats) and dislikes (Bach). Jess, another savant, is obsessed with anime, but she can only endure so much unstructured interaction with actual humans. That may explain why she is currently attending college No. 10. All four are “on the spectrum”: young people with neurological conditions ranging from mild Asperger’s syndrome to profound autism. Part of the agenda of “Uncommon Sense,” a play by Anushka Paris-Carter and Andy Paris, is to illustrate just how broad and multicolored that spectrum is. If that makes “Uncommon Sense,” which opened on Nov. 2 at the Sheen Center in Manhattan, more of a demonstration than a drama, so be it. As the reach of diversity continues to expand, it’s surely time for the theater to embrace, as performers and subjects, the one percent of our human community that is not neurotypical. Not that people with autism have been utterly absent from the stage. But too often they have been, like the young horse-mutilator in “Equus,” freaks and villains. More recently, “The Curious Incident of the Dog in the Night-Time” featured a hero on the spectrum — a role now being played, in a regional production, by Mickey Rowe, an actor with autism. And in “Uncommon Sense,” Andrew Duff, the actor who plays Moose, has a diagnosis of autism too. Still, it can be difficult to find ways to tell the stories of nonverbal characters like Moose and Lali authentically, when even their parents don’t know what those stories are. Mr. Paris and Ms. Paris-Carter, a couple with a family member on the spectrum, get around that problem by packing as much variety into their narrative as a 100-minute show will allow. As members of Tectonic Theater Project, they are expert mosaicists, comfortable with the process of research and montage that produced earlier Tectonic docu-plays like “The Laramie Project.” Though fiction, “Uncommon Sense” was developed over several years of investigation with “autism families” in Northern Iowa and elsewhere. The result can sometimes feel too programmatic. Putting across so many medical factoids and bits of real stories has the paradoxical effect of diminishing a sense of emotional truth. You can almost count the items on a worthy checklist being addressed, one by one, in the intercut vignettes: safety, sexuality, employability, the push-pull of independence. But with their exceptional and sometimes opaque traits, Moose and Lali and Dan and Jess, who are composites, never cohere as characters. Or perhaps that’s just the perspective of a neurotypical observer — a perspective that the play implicitly asks us to question. When the sound of silverware being sorted makes Lali miserable, “Uncommon Sense” helps us understand her discomfort by having us hear an avalanche of grating metal. (The sound design is by Stephanie Robinson.) When Jess reacts painfully to the fluorescent lighting “vibration” that a classmate doesn’t even notice, she seriously asks him, “What’s wrong with you?” One person’s disability is another’s exceptional awareness. Even so, I suspect that most audience members who don’t live with autism will have an easier time connecting to the stories of the parents, whose highest hopes for their children begin where the depths of other parents’ despair might end. Lali’s mother, afraid that she will never be more than “a thing” to her daughter, dreams of a day when the girl might somehow be able to say, as other children do, whatever is on her mind. Spoiler alert: Be careful what you wish for. And Moose’s parents must in the course of the play contend with the likelihood that their son’s abilities may never improve. What kind of life will he have, and how much of their own lives can they sacrifice to provide it? By serving, in effect, as his brain in the world, are they preventing him from achieving whatever growth is possible? Would he be happier in an institution? What would “happier” mean? In the context of these racking questions, many of the play’s comic devices, no doubt intended to balance the pathos, seem labored. (Dan, on a first date, licks a young woman’s feet as a cat might.) Strangely for a work about difference, the shape of the storytelling tends toward the conventional. Yet when uncomfortable scenes are allowed to develop naturally — such as those in which Jess tries to manage a flirtation with the classmate she’s tutoring — real comedy, mixed with sadness, emerges. If “Uncommon Sense” had less of an overview in mind, it might have focused more profitably on this or any one of its other stories. As it is, under Mr. Paris’s sometimes inventive but sometimes awkward direction, on a cramped multi-platform set by John Coyne, there is too much information pressing in from all sides. Neither the eye nor the mind is comfortable anywhere. Which, on second thought, might be the most powerfully mimetic gesture in a play overfull of them. An earlier version of this article misstated the character in “Uncommon Sense” who is discomforted by the sound of silverware being sorted. She is Lali, not Moose. This information was last updated on Aug. 27, 2018 | NEWS-MULTISOURCE |
Page:Vol 6 History of Mexico by H H Bancroft.djvu/584
564, large sums of money have been expended by enterprising Mexicans in irrigating experiments.
In connection with aqueducts and irrigation, it will not be out of place to give some account of the attempts that have been made to drain the valley of Mexico, which may be regarded as among the greatest hydraulic undertakings in the world, and which has been before spoken of in this history. After the destructive inundation of 1629, the great dikes or dams of San Cristóbal were constructed at a great sacrifice of Indian life; but with all these efforts, the capital was never secure against flood. The tunnel of Huehuetoca was found to be a failure, as it was impossible to keep it free from the débris which continually choked it up. It was therefore decided to convert it into an open cutting, but owing to improvident suspensions of the work during periods when no danger of inundation was feared, it was not finished until 152 years after its commencement.
from 25 to 150 feet. In all the principal cities the supply of water by aqueducts furnishes the means of irrigating, and the gardens and orchards display a corresponding luxuriance and fecundity. A list of the principal aqueducts in each state will be found in ''Hernandez, Estadist. Mej''., 30. In 1870, there were 260 artesian wells in the federal district. Voz de Mex., 6 Ab., 1878. In the same year, the rainfall in the capital was 583.4 millim.; in the previous year 214.1. Id., 23 de Ag. The first application for the exclusive right to sink artesian wells was made in 1836. ''Rivera, Hist. Jalapa'', iii. 308. During the next twenty years a great number was opened in Vera Cruz, Guerrero, Mexico, Tlascala, Querétaro, and Colima. El Universal, 14 Sept., 1850, 4, Oct. 24, 3; El Estandarte, May 2 and 11, 1857; Cincinnatus, Travels, 325; ''Silíceo, Mem. Foment''., 65–6. The exclusive right system, however, was found to be an impediment to progress, and the government abolished it, extending to all persons the privilege of sinking artesian wells. | WIKI |
-- Clear Channel Outdoor at Eight-Month High: Houston Mover
Clear Channel Outdoor Holdings Inc. (CCO)
advanced to an eight-month high after CBS Corp. (CBS) said it will
convert its outdoor advertising division into a real estate
investment trust and seek a buyer for the European and Asian
parts of the division. Clear Channel Outdoor, a San Antonio-based company that
operates more than 750,000 displays worldwide, gained 6.8
percent, trailing CBS’s 7.9 percent gain. Lamar Advertising Co. (LAMR) ,
another competitor in outdoor advertising, rose 2.3 percent. The shares rose 48 cents to $7.54, the highest closing
price since April 30, at 4:15 p.m. in New York. Volume was 1.18
million shares, five times the 100-day average of 228,000. Clear
Channel Outdoor is a subsidiary of CC Media Holdings Inc., which
also owns Clear Channel Communications Inc. Clear Channel Outdoor has one buy, five hold and four sell
ratings from analysts . The 12-month target price for the shares
is $5.25. To contact the reporter on this story:
Richard Stubbe in Houston at
rstubbe1@bloomberg.net To contact the editor responsible for this story:
Dan Stets at
dstets@bloomberg.net | NEWS-MULTISOURCE |
Clinical trials are how we test promising new drugs and therapies to determine if they are safe and effective. Though all trials are different and have their own set of qualifications, time commitments, and treatment regimen, among others, it’s important to be familiar with the general process, terminology, and requirements.
That’s why we’ve compiled a list of frequently asked questions about clinical trials – to help you prepare better understand and prepare for a clinical trial.
CLINICAL TRIALS FAQs
Where can I find a list of clinical trials for epilepsy?
You can find a comprehensive list of epilepsy clinical trials at CenterWatch I Connect Clinical Trials Listing for Epilepsy. This list is a subset of available epilepsy clinical trials that can be found on ClinicalTrials.gov.
What is the average length of a clinical trial?
The length of a clinical trial can vary depending on the study protocol, the treatment that is being tested, the specific disorder or syndrome being evaluated, the number of people affected by the disorder, and the ability to recruit people interested in participating in the trial. Some trials last a short period of time, such as 12 weeks, while others can last several years.
What are the benefits of participation?
Well-designed and well-executed clinical trials offer a lot of benefits, including:
• The ability to play an active role in managing your healthcare
• The access to new, investigational medical treatments before they are publicly available
• Free treatment
• Access to expert medical care at leading healthcare facilities
• The knowledge that you are helping others by contributing to medical research that may save lives in the future
What are the risks of participation?
Clinical trials also pose potential risks, including:
• The investigational treatment may be no better or worse than the current standard of care
• The study treatment may not be effective
• You might end up in the control group and receive a placebo or the standard treatment
• You risk unpleasant, serious, or even life-threatening side effects from the investigational treatment
• The clinical trial protocol may be inconvenient for you, requiring too much of your time and attention, e.g. trips to the study location, additional medical treatments, hospital stays or complex dosage requirements
What are the eligibility requirements?
Clinical trials require the participation of both healthy volunteers and volunteers with the illness that the drug will treat. Researchers choose clinical trial participants based on eligibility requirements which vary by trial. Researchers design these criteria to help identify the most appropriate volunteers, or “subjects”, for the trial and to keep volunteers safe. Eligibility requirements may include age, gender, type and stage of a disease, previous treatment history, and other medical conditions.
What happens if my condition worsens while I am participating in the clinical trial?
As a study participant, you will have a direct line of contact to healthcare providers who assure your safety and monitor your health. If at any point you wish to withdraw your participation for any reason, let a healthcare provider know that you wish to leave the study. They will work with you to determine the next steps and ensure the transition of your care outside the trial.
What is a control (or control group)?
To determine whether an investigational treatment is effective in treating a condition or disease, clinical trials can be designed so that some people receive the treatment being studied, and other people in the trial do not. The set of people in the trial who do NOT receive the treatment being studied is called the control group.
A control group is a standard against which effects of the investigational therapy are evaluated. The control group is usually given either a currently approved treatment for the disease or a placebo. The researchers can then compare the effect that the investigational treatment had on the study group (also referred to as the experimental group) compared to the effect that the placebo or standard treatment had on the control group.
Usually, the trial’s protocol will dictate that participants are randomly assigned to be part of either the study group or the control group. Participants cannot select the group they are in because that would introduce bias into the study results. This type of study design is referred to as a randomized controlled trial.
What is a protocol?
A study protocol is a document approved by the FDA that outlines the design for how the clinical trial will be carried out. It is carefully designed to safeguard the participant’s health and to answer specific medical questions. The protocol will detail the trial objectives, trial design, who can participate in the trial, the schedule of tests, procedures, medications and dosages, and the trial length.
The clinical trial will follow a study protocol that outlines the strict scientific standards to protect patients and produce results that help us understand if the treatment is safe and effective. The healthcare team administering the clinical trial may include doctors, nurses, social workers, and other healthcare providers who will monitor your health and give you specific instructions about the study. During a clinical trial, you may have periodic tests or treatments in a hospital, clinic, or doctor’s office. The study protocol will describe all the specific details of the trial such as where, when, and how you will be monitored, as well as the type of health information collected to evaluate the efficiency of the treatment and your overall health while participating.
What are side effects?
Side effects are unwanted or undesirable effects that occur as a result of taking the a drug, device, or treatment. Side effects can range from very minor problems such as drowsiness or dry mouth to serious consequences such as pancreatitis or heart issues.
What are adverse reactions?
On the other hand, an adverse reaction is an unforeseen effect that occurs when a medication is administered correctly and can generally be addressed by either lowering the dose or stopping the medication. The terms adverse reactions and side effects are often used interchangeably, but technically they have different meanings.
Before a participant can begin a clinical trial, the people conducting the study must get their informed consent. According to the FDA, informed consent is the process by which a prospective participant learns, “adequate information to allow for an informed decision about” participating in a clinical trial. This process is in place to ensure you understand all the information they provide, including the potential benefits and risks of participating in the study. This is an important time for you to ask any questions that you may have.
The investigator or their staff will explain the details of the study, including its purpose, duration, required procedures, key contacts, and the potential benefits and risks of participating. They will then provide you with an informed consent document to review and sign, documenting that you have been fully informed and agree to participate in the study. They must also give you sufficient time to consider whether you want to participate. During that time, you may find it beneficial to talk to family, friends, or your healthcare provider about whether you should participate.
Informed consent is not a contract, and the participant may withdraw from the clinical trial at any time.
What is an investigational treatment?
Drugs, devices, or treatments that have not yet been approved by the FDA for public use, but are being studied, are often referred to as “investigational” or “experimental.”
What is a placebo?
A placebo is a substance with no active medication in it. It is often referred to as a “sugar pill.” In some clinical trials, a portion of the study participants are given a placebo instead of the investigational treatment to compare and evaluate the treatment’s effectiveness. Patients in the study will not know if they are receiving the investigational treatment or the placebo.
What is a single-masked study?
A single-masked study, also known as a single-blinded study, is a clinical trial design where only the research team, not the participants, know whether they are receiving the placebo or the real treatment.
What is a double-masked study?
A double-masked study, also known as a double-blinded study, is a clinical trial design where neither the participants nor the study researchers know who receives the placebo or the study medication. Only a select group of people who do not interact with participants (usually a pharmacist or other medical provider) know who is getting the drug or placebo.
What is the Data Safety Monitoring Board (DSMB)?
The Data and Safety Monitoring Board (DSMB) is an independent group of experts that oversees the clinical trial’s conduct and ensures that study participants are safe. The primary responsibilities of the DSMB are to 1) periodically review and evaluate the accumulated study data for participant safety, study conduct, progress, and efficacy; and 2) make recommendations concerning the continuation, modification, or termination of the trial.
Does CURE Epilepsy fund clinical trials?
While CURE Epilepsy currently does not fund the type of clinical trials required for FDA approval of a new drug, device, or treatment, we do fund basic (foundational) research and translational research to find cures for epilepsy. These two types of research are critical steps in developing a new therapy and provide initial data that it will be safe and effective in human trials. After these two steps are completed, an investigational treatment can move forward into clinical trials.
Is a clinical trial right for you?
Every patient and every clinical trial is different. Each clinical trial has its own set of qualifications, time commitments, treatment regimen, and more. To determine if a particular trial is right for you, do as much research as you can. Meet with the research coordinator and ask them questions relevant to your health, the study, the requirements, and the time commitment. Questions such as those below can help you with your decision. You may have more or different questions, but these serve as a good starting point.
• What is the purpose of the study?
• What is the control for the study? Is there a placebo involved?
• How will the study affect my current treatment regimen?
• What do we already know about the medications that are being tested as part of the study?
• How long will the trial last?
• How often do I need to come to the clinic for the trial?
• What will happen during trial-related visits?
• Does the study require blood tests, MRI, or EEG?
• Where will the trial take place? Will I need to travel?
• How are the costs for the study covered? Do I need to pay for anything? Will my insurance cover this? Are there reimbursements for travel or childcare?
• What happens if I stop participating in the trial? How is my medical care handled?
• Is the long-term follow-up care part of the trial? What would it involve?
• Is the trial HIPAA compliant? Can anyone find out about my participation?
• If this drug works for my seizures, can I continue taking it even after the trial ends?
Here are some other tips and tools to consider as you decide on whether participating in a clinical trial is right for you.
Kim Nye, a mother of two children with epilepsy, shares her advice on participating in clinical trials.
Dr. Darcy Krueger outlines what patients should ask prior to participating in a clinical trial.
| ESSENTIALAI-STEM |
Talk:Oryza glaberrima
African Enslavement Should Not Be The Default Explanation In The Absence Of Direct Proof
African Rice: "It was first domesticated and grown in West Africa,[2] and was brought to the Americas by enslaved West African rice farmers.[3] "
There is no evidence of who brought African rice to the Americas or when. Or even whether that happened after the arrival of Columbus in the Caribbean. After all he merely used the North Equatorial Current to get from Senegal to the Caribbean, a route open to West Africans for tens of thousands of years, which only became available to Columbus and Spain in 1492, having been previously controlled by the Moors who were defeated in that year. There is no direct evidence that it was brought by Africans who were enslaved - not all Africans were. The source itself merely states there are several accounts, one indeed crediting Africans under slavery, others crediting Europeans. However it is not traced to one specific person, unless I am mistaken. Source given: Judith A. Carney (2004), "'With Grains in Her Hair': Rice in Colonial Brazil" (PDF), Slavery and Abolition, Frank Cass, London, 25 (1), pp. 1–27, doi:10.1080/0144039042000220900
More here: https://www.tandfonline.com/doi/abs/10.1080/0144039042000220900 <IP_ADDRESS> (talk) 10:37, 12 February 2019 (UTC)
Reliable sources
Here are some reliable sources for use in this article. --Una Smith (talk) 17:46, 12 January 2009 (UTC)
* Linares (2002); PNAS, free full text PDF
* Ma and Bennetzen (2004); PNAS, free full text PDF
* Murray PhD dissertation precis
Article name
Actually Naming conventions (flora) states,
This means that "African rice" which is the common name should be the name of this article, and a separate article Oryza glaberrima should be created. Wapondaponda (talk) 04:55, 27 October 2009 (UTC)
* The current article doesn't warrant a split. And the most commonly used name is the scientific name. "Common name", meaning the vernacular name of the species, and "use the most common name" (WP:COMMONNAME) are not the same thing. "African rice" is also ambiguous, since Oryza barthii is also an African rice. --Rkitko (talk) 12:14, 27 October 2009 (UTC)
* African rice is not "vernacular" it is described as such in many peer reviewed publications, eg, African rice (Oryza glaberrima): History and future potential Wapondaponda (talk) 12:53, 28 October 2009 (UTC)
* Indeed it's vernacular. Every plant "common name" is vernacular. To further illustrate my point that "African rice" is not a suitable name for this article, I present another publication: . This article presents data on "African rice" resistance to a virus, but the paper isn't discussing Oryza glaberrima, but rice cultivars that are grown in Africa sensu "African rice production" or "African rice farming." In fact, check out all the google scholar hits: . Most of these are presenting data on African rice fields or African rice farming, where "African" is an adjective describing the location (e.g. The African Rice Initiative), not the species of rice. This leads me to the conclusion that the title at the scientific name is the most precise and least ambiguous. It's also the most commonly used name for the species, as the raw google hits tell us:
* "African rice" -wikipedia - 35,800
* "Oryza glaberrima" -wikipedia - 50,700
* I feel that Oryza glaberrima is a more suitable name for this article, given the ambiguity of "African rice". Rkitko (talk) 14:12, 28 October 2009 (UTC)
* I'd agree with Rkitko. The guidelines say that there should be separate pages for the crop as a food and as a plant, but there isn't enough information to justify two articles. I'm not convinced about that distinction, anyway; several much more major crops only have one page, e.g. Maize, Barley. Given the potential ambiguity (O. sativa is widely grown in Africa), it seems sensible to call the article Oryza glaberrima, and have African rice as a redirect (as it is). I've just added a 'Main article' link from the Africa section of the Rice article. Thomas Kluyver (talk) 13:40, 29 October 2009 (UTC)
* I agree that as yet there may not be enough information to warrant two articles. My argument has been based on making the article accessible to a wider audience. If one were to ask a random person what is "Oryza Glaberrima" chances are they would have no idea, whereas the term "African rice" though ambiguous is descriptive and self explanatory. One possible solution is to create African rice as a disambiguation type page with links to Oryza glaberrima and Oryza barthii and possibly O. Sative that is cultivated in Africa. Wapondaponda (talk) 13:57, 29 October 2009 (UTC)
* ...Which is exactly why we established WP:NC (flora). The principles outlined at WP:NC are weighed against each other. This article title may not be as recognizable, though users often expect to redirected to a scientific name in an encyclopedia when searching for a common name. Oryza glaberrima is, however, more precise, concise, and consistent. Weighing these principles, flora articles are often placed at their scientific names to avoid issues of ambiguity. Some have no such ambiguity issues, so we get Oak instead of Quercus. --Rkitko (talk) 19:13, 30 October 2009 (UTC)
* I think it's better for African rice to redirect here, as there's a good chance that someone typing 'African rice' is looking for this species. We could perhaps have a line at the top saying something like "This article is about the species called African Rice. Asian rice (Oryza sativa) is also grown in Africa, and other species grow wild (see Oryza)". But at present, that's pretty much the entire article anyway. Thomas Kluyver (talk) 19:05, 30 October 2009 (UTC)
* Is there a source for the assertion that African rice shatters more than Asian rice? Maybe a citation is needed. Frenchie2715 (talk) 22:12, 15 February 2017 (UTC)Frenchie2715
O. glaberrima
enter script:
* 1) REDIRECT Oryza glaberrima
Measurements
Re: this sentence: Long-grain gold-seed rice boasted grains 5/12ths of an inch long (up from 3/8ths of an inch), and was brought to market by planter Joshua John Ward in the 1840s. Despite its popularity, the variety was lost in the American Civil War.[13] 12ths of an inch? Where is this the standard? And the next measurement is in 8ths of an inch? Could we just change these to .417" and .375"? I think it makes it much easier to compare the sizes. Even putting the decimal equivalent in parentheses would be an improvement.
I wasn't sure if it would be acceptable to just put that in as an edit, so I came here first. — Preceding unsigned comment added by Themadpatter (talk • contribs) 20:42, 24 February 2021 (UTC)
Is the floating rice mentioned also African rice or only Asian rice?
Look, I'm really ill right now so I cannot verify that this is a problem. Plus this is something I'm dictating so please excuse any very strange words that pop up. In this article it says:
Rice growing in deeper, more permanent water became floating rice.
However, when you click on floating rice, that article is only about Asian rice and though it mentions Africa, it does so in a way that seems to imply (as far as I can currently tell) that Africa is using the Asian variety. So if this is a problem please do something about it. If it is not a problem, please just make a note here. I will try to remember to come back and do something about this but because I tend to pass out when I get fevers, I don't know if I'll even remember to look this up. Thank you very much! Geekdiva (talk) 05:35, 20 March 2023 (UTC) | WIKI |
Threat analysis of software systems: A systematic literature review
Artikel i vetenskaplig tidskrift, 2018
Architectural threat analysis has become an important cornerstone for organizations concerned with developing secure software. Due to the large number of existing techniques it is becoming more challenging for practitioners to select an appropriate threat analysis technique. Therefore, we conducted a systematic literature review (SLR) of the existing techniques for threat analysis. In our study we compare 26 methodologies for what concerns their applicability, characteristics of the required input for analysis, characteristics of analysis procedure, characteristics of analysis outcomes and ease of adoption. We also provide insight into the obstacles for adopting the existing approaches and discuss the current state of their adoption in software engineering trends (e.g. Agile, DevOps, etc.). As a summary of our findings we have observed that: the analysis procedure is not precisely defined, there is a lack of quality assurance of analysis outcomes and tool support and validation are limited.
Risk assessment
Threat analysis (modeling)
Security-by-design
Systematic literature review (SLR)
Software systems
Författare
Katja Tuma
Chalmers, Data- och informationsteknik, Software Engineering, Software Engineering for Cyber Psysical Systems
Gul Calikli
Chalmers, Data- och informationsteknik, Software Engineering, Software Engineering for People, Architecture, Requirements and Traceability
Riccardo Scandariato
Chalmers, Data- och informationsteknik, Software Engineering, Software Engineering for Cyber Psysical Systems
Journal of Systems and Software
0164-1212 (ISSN)
Vol. 144 275-294
Styrkeområden
Informations- och kommunikationsteknik
Ämneskategorier
Övrig annan teknik
Programvaruteknik
Systemvetenskap
DOI
10.1016/j.jss.2018.06.073
Mer information
Senast uppdaterat
2018-12-19 | ESSENTIALAI-STEM |
But which one was more effective during his time? While there are many pros to nonviolence, there are just as many cons. Make no mistake, they were radicals. Martin Luther King started different movements some are African- American civil rights movement and peace movement. Both: They both fought for the rights of African-Americans. He can be compared to many world leaders, including Ghandi, George Washington, perhaps even Lenin. . Kennedy and campaigned for President Lyndon B.
When Nelson Mandela accepted this award, he ended his acceptance speech with this reference to Dr. There are always pros and cons to being a leader to millions, but Martin Luther King Jr. Compare And Contrast: Nelson Mandela and Martin Luther King Jr. The races are also different. Malcolm X said the tripallowed him to see Muslims of different races interacting asequals. King won his Nobel Peace Prize nearly 30 years earlier.
When notified of his selection, he announced that he would turn over the prize money to the civil rights movement. Mandela gave reason arguments for why violence should be used as a means to bring change. The king was trying to stop segregation and discrimination between the black race and the white man in America Gandhi was a … non violence protester and Martin Luther King was not. Helms was joined in his opposition to the bill by Arizona Republican Sen. At times those in power were eager to deal with King for fearof having to contend with Malcolm and the forces he represented. For South Africa, it was racial segregation. Mahatma Gandhi was a key ingredient to the growth of Indian Nationalism, while Martin Luther King, Jr.
King and Mandela somehow found within themselves the ability to love those who hated and brutalized them. Historical significance and legacy In the years after his death, King remained the most widely known leader of his era. Both men were born into relatively wealthy families, and both men were natural leaders. Apartheid policies entrenched race as the basis for access to power and resources. King is trying to defend the demonstrations to these white clergymen, his language choice is quite interesting. Linked to this was his advocacy that homespun cloth be worn by all Indians instead of British-made textiles.
King firmly supported his nonviolence protest movement for the equality of blacks in America. Each of these men was so charismatic he could lead his followers to a non-violent victory. Sorry, but copying text is forbidden on this website! The tone of this document is just boring because Mandela is simply thinking to himself. In all fairness, Mandela never claimed non-violence was the only way to freedom. Thoreau and based on his live relieving experience at Walden 's Pond provides us with a new way to look at our lives.
Let a new age dawn! He had a dream that would change the way whitepeople treated black people. Nelson Mandela nationality was South African although Martin Luther king, Jr was American. The Apartheid regime did all they could to suppress any information about him—including laws against displaying photographs of prisoners. Painful and traumatizing, this incident was only a snapshot of the dreadful film each of them suffered through. He died this last week in his home in South Africa at the age 95. Nelson Mandela was concerned with injustices about the Apartheid in South Africa. He did not want peace between African-Americansand white people.
The Nationalist government were worried that if he were killed, they might regret it later—this they were convinced of to some degree because of British and U. Complete disenfranchisement of the natives prevailed for the duration of his prison stay. One many have heard about, and the other some might not have heard about. Another similarity between King and Mandela is that they had the same beliefs. In 1931, following the death of Williams, Michael king Sr became pastor of Ebenezer Baptist church carrying on the tradition of his father in law. In their speaking they had different styles. Document 2 is an excerpt from Martin Luther King, Jr.
The 1974 Gujarat Nav Nirman or reconstruction movement was the collective outcry of people against corruption in public life. In 1955, Martin Luther King, Jr. This can partly be owed to their backgrounds as King was the son of a preacher and Mandela was the son of a Xhosa Chief. Mohandas Gandhi was a known pacifist and a spiritual and political leader of India during the Indian Independence Movement. It seems that he never really feared for his life the way King did. Because of all this, his and many other African-Americans dreamsdid not come true and we still longer have separate schools,restaurants, and hatred in general.
Although his policies and advocacy for non-violence were only cemented during the Montgomery bus boycott, this was at the very beginning of his career as an activist. Both gave a speech 4. In 1965, King spoke publicly about his opposition to the Vietnam War. We are all the same in this notion: The potential for greatness lives within each of us. So Barack Obama did not have to go through the samestruggles that Martin Luther King did. Martin Luther King on the other hand became somewhat frustrated by the fact that no real progress was being made on equality, and started to oppose some of his moral ideologies by, for example, using children as young as 8 years old during one of his campaigns against Birmingham Alabama. It is imbued with the hope that the concept of non-violence, which is as old as civilisation, can provide a path forward, he said.
This belief was foundation for the bold. Abe: Helped to stop slavery. Non-violent protesting never seemed to be the right course of action until the ideology of Mohandas Gandhi spread and influenced successful protests across… successfully overcome them. In 1962, he was caught and arrested upon returning from Europe; he had been seeking support both politically and militarily. In his search, some of his ideas have been suspect of being stolen. City police turned dogs and fire hoses on demonstrators. | FINEWEB-EDU |
Bleary Darts Club shooting
The Bleary Darts Club shooting was a mass shooting that took place on 27 April 1975 in the village of Bleary, Northern Ireland. Members of the Ulster Volunteer Force (UVF) burst into a darts club frequented by Catholics and opened fire on the crowd, killing three civilians and wounding a fourth. The attack is one of many that has been linked to the Glenanne gang.
Attack
The 'Bleary Darts Club' was frequented mainly by Catholics but was also visited by Protestants. On the night of 27 April 1975, there were about thirty men inside. At about 10:40pm, three masked loyalist gunmen kicked the door open and opened fire on the crowd with a Sterling submachine gun, a Webley Revolver and a shotgun. When the burst of gunfire stopped, a customer switched the lights off so the gunmen could not see. There was then another burst of gunfire, followed by several single shots. Another customer kicked the door shut, and the gunmen left. Three men were killed, all Catholic civilians: father-of eight John Feeney (45), father-of-six Joseph Toman (48), and father-of-four Brendan O'Hara (38). A fourth man, a Protestant, was seriously wounded.
Perpetrators
The attack was claimed by the "Protestant Action Force", a cover name used by the Ulster Volunteer Force (UVF), an Ulster loyalist paramilitary group. It is believed the attackers were part of the UVF Mid-Ulster Brigade. Six days before the attack at Bleary, the group had claimed responsibility for killing three Catholic civilians—two brothers and their pregnant sister—in a booby-trap bomb attack at a house near Granville, County Tyrone.
Loyalists Stuart Ashtown and Derek McFarland admitted to the attack in 1980 along with a string of other offenses, including the shooting of Catholic civilians Marian Rafferty and Thomas Mitchell.
The shooting is one of many in the area that has been linked to the Glenanne gang; a group of loyalists that included police officers from the Royal Ulster Constabulary (RUC) and soldiers from the Ulster Defence Regiment (UDR). The sub-machine gun was used in the Miami Showband massacre, which was carried out by members of the group three months later. Circumstantial evidence links Robin Jackson to the attack. Among other evidence, a witness saw him in a car near the club the Sunday before the attack, and saw the same car near the club again, about half an hour before the attack. | WIKI |
Unexpected tag search behaviour
A client reported to me that full text search was not working with profile tag fields.
I checked the code and sure enough, the where clause contains:
msn.string IN ($tags_in)
rather than a full text search command such as LIKE or MATCH.
This means that, for example, if a user flags a profile tag field (such as interests) with "american football" and someone searches for "football", this tag will not appear in the search results.
This behaviour appears to be deliberate. However, I find it surprising and I wonder if there is an explanation as to why it was done that way.
If I wanted to replace the search_tags_hook function with one that did full text search, would I need to modify the search plugin or is there a way to do this in my own plugin?
• The metastrings table doesn't have a fulltext index and some quick profiling showed adding one seriously affected performance. I haven't had a chance to revisit this.
• Ah, OK.
I am adding configurable full text search to the form plugin.
For all other entities I am just copying all searchable fields to one __searchable_data field and joining to that with a LIKE in the where clause.
Perhaps not super fast, but gets the job done.
I can't do that for user profiles because user metadata has independent access.
Makes me wish (not for the first time) that metadata did not have its own access levels and that user profiles were object containers.
Water under the bridge, however.
• I am fooling around with coding a toy Elgg clone written in Haskell.
This is really an excuse to learn Haskell but gives me the chance to try some blue sky ideas.
For that I have a separate searchableData table with entityGuid and data fields and an API to determine what goes there. This seems to work well if metadata does not have its own access controls.
• Only parts of our initial search rewrite concept made it into core. The whole "separate table of searchable data with an API to manage it" approach was exactly what we'd started to program, and you can still see the vestiges of that in our initial code that made it out to github back last year. The concept was rejected by Curverider though, citing overhead and complexity concerns. At least the search API and UI improvements we worked on were mostly accepted. :) | ESSENTIALAI-STEM |
The building maintenance scheduled for Friday February 27th at 5:00pm MST has been postponed until 5:00pm March 6th. PSD's website will be down during the maintenance.
Chen, P., 1996: The influences of zonal flow on wavebreaking and tropical/extratropical interaction in the lower stratosphere. J. Atmos. Sci., 53, 2379-2392.
ABSTRACT
The influences of the zonal-mean flow on Rossby wave breaking and tropical-extratropical interaction in the lower stratosphere are investigated using a high-resolution barotropic model. It is found that the zonal-mean wind in the subtropics of the winter hemisphere, denoted as u30°, is pivotal to the location and intensity of Rossby wave breaking. When u30° is positive and relatively large, significant wave breaking occurs in two regions: one in the midlatitudes of the winter hemisphere and the other in the Tropics. When u30° is small or negative, on the other hand, wave breaking occurs primarily in the middle-to-high latitudes of the winter hemisphere. It is also found that when u30° is large, wave breaking is sensitive to the phase of the equatorial quasi-biennial oscillation (QBO) in that if the QBO is westerly, significant wave breaking takes place in the midlatitudes of the winter hemisphere and the subtropics of the summer hemisphere and no wave breaking occurs in the equatorial region, and if the QBO is easterly, significant wave breaking occurs only in the winter hemisphere. When u30° is small or negative, wave breaking is insensitive to the phase of the QBO. | ESSENTIALAI-STEM |
C Program to Check Year is a Leap Year or Not
Leap year or not in C programming (1)
Year is a Leap Year or Not
In this program we have to find the year is a leap year or not. Generally we assume that year is exactly divisible by 4 is a leap year. But it is not only in this case 1900 is divisible by 4. But it is not a leap so it that case we follows these conditions
• It is exactly divisible by 100
• If it is divisible by 100, then it should also exactly divisible by 4
• And it is divisible by 400
These all conditions are true year is a leap year.
Working
• Step 1. Initialize variable “year” to find leap year.
• Step 2. Take input from User.
• Step 3. We use this condition ((year%4==0)&&(year%100!=0)) || (year%400==0)) to check the year is Leap or not.
• Step 4. It is true display year is a leap year.
• Step 5. It is false display year is not a leap year.
• Step 6. Stop.
C Code
#include<stdio.h>
int main()
{
//initialization of Year
int year;
//to take user input
printf(“Enter Year for find leap year or not : “);
scanf(“%d”,&year);
//we use this statement for check leap year
if(((year%4==0)&&(year%100!=0)) || (year%400==0))
printf(“%d is a Leap Year”,year);
//not leap year
else
printf(“%d is not a Leap Year”,year);
return 0;
}
Output
Enter Year for find leap year or not : 2012
2012 is a leap Year
Enter Year for find leap year or not : 1900
1900 is not a leap Year | ESSENTIALAI-STEM |
Page:The Spirit of Japanese Poetry (Noguchi).djvu/90
86
Thine arms white as rope of paper-mulberry bark, Shall softly pat my breast soft as melting snow; Patting each other interlaced, Stretching out, pillowing us on each other’s arms, on true jewel-arms, With outstretched legs, oh, will we sleep. So speak not too lovingly, Thine Augustness the Deity-of-Eight-Thousand-Spears!”
The Chief Empress, Her Augustness the Forward-Princess, got very jealous; His Augustness the Deity-of-Eight-Thousand Spears was greatly distressed when he was about to go from Izumo to the Land of Yamato; as he stood attired, with one hand on the saddle of his horse and one foot in his stirrup, he sang, saying: I take and carefully attire myself In my garments black as the jewels of the moor; Like the birds of the offing I look at my breast, I find these are not good, And cast them off on the waves of the beach. I take and carefully attire myself In my garments green as a kingfisher; Like the birds of the offing, I look at my breast, I find these too are not good, And cast them off on the waves of the beach. I take and carefully attire myself In my raiment dyed in the sap of the dye-tree, The pounded madder sought in the mountain fields; Like the birds of the offing, I look at my breast, I find they are good. My dear Younger sister, Thine Augustness! Though thou say thou wilt not weep, If, like the flocking birds, I flock and depart, If, like the led birds, I am led away and depart, Thou wilt hang down thy head | WIKI |
Last Reviewed on June 19, 2019, by eNotes Editorial. Word Count: 273
A Black Theology of Liberation is a nonfiction study of the ways in which the African American community has gained strength and support by developing their own form of Christian understanding. As such, there are no distinct characters in the book. However, Cone draws on many contemporary and biblical references to prove his points. Below are several of these examples.
This writing in many ways centers the role of Jesus in the African American community. Dominant white Christianity has painted and pre-determined Jesus to be white. Many Black theologians have theorized that he was likely dark skinned. This possibility has brought new meaning to African Americans and their position in the greater Christian community. In addition, Cone uses Jesus as an example for the ways in which God identifies with and supports the oppressed. Jesus was born Jewish into Roman-occupied territory. His ability to thrive and find a following is highlighted.
Cone considers the ways in which Martin Luther King's theology was at the core of his leadership. His pacifist and nonviolent approach was considered to be very Christian. However, many Black clergy still considered him to be too radical and in a dangerous spotlight. Cone theorizes that MLK was one of the first public faces to show greater America the ways in which black people have come to make the Bible their own.
Cone also writes of the ways in which contention among Black clergy made room for an Islamic emergence in the Black community. While most Christian leaders were non-confrontational and/or silent on the matters of race, Malcolm X provided a new space for Black theology in the Islamic religion.
Unlock This Study Guide Now
- 30,000+ book summaries
- 20% study tools discount
- Ad-free content
- PDF downloads
- 300,000+ answers
- 5-star customer support | FINEWEB-EDU |
Talk:Komaram Bheem
Cleanup and Bias
So I just wanted to put this up for discussion. This article I think needs a little further cleanup which can easily be done. The bigger issue is that there is a clear bias against the Nizam government in the writing style, making it sound less like an encyclopedic article and more like a novel or screenplay. Just wanted to avoid this and help to keep things unbiased here, even if 100% of the people on Earth would agree.DaltonCastle (talk) 21:33, 23 July 2012 (UTC)
* This article urgently needs editing or deletion. Statements like "a bright flame that lit the fire of liberation amongst the people" should never appear in Wikipedia articles.Royalcourtier (talk) 06:59, 14 April 2016 (UTC)
Poor or no sourcing
From the history of the article, I see a lot of poor or no sourcing from. Cleanup required. -- DaxServer (talk) 11:01, 21 July 2021 (UTC)
* I tried cleaning it up to the best of my abilities. Turns out there's barely any quality sources available on him online so the article may not be up to standards even now. Tayi Arajakate Talk 07:43, 12 August 2021 (UTC) | WIKI |
A library to make react applications using DOM events
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
src
.gitignore
LICENSE
README.md
bower.json
flux-reactions.js
flux-reactions.min.js
gulpfile.js
package.json
test.html
README.md
Flux-Reactions
A library to make easier the communication among React.js components using events.
Using events, a dispatcher is not needed anymore to create an app that follows a Flux architecture. Components emit DOM events and actions are listeners added to the document in order to react to those events, that's is why this library is called Reactions.
Since events are available in every browser, react.js components don't need to be attached to any library method to communicate with the rest of the page, that makes components 100% encapsulated and reusable.
Flux-Reactions is just an utility to reduce the boilerplate of dispatch custom events cross-browser, not a complete Flux implementation.
See A better Flux with DOM events to know the benefits of this approach.
Install
Flux-reactions comes in the shape of a UMD module to be used in Node.js and the browser. It is possible to install it using npm
npm install flux-reactions
Using bower
bower install flux-reactions
Or adding it directly to your page code for development flux-reactions.js(5KB), and minified flux-reactions.min.js(1KB).
Use
Flux-reactions comes with a mixin for React.js modules that allows to emit events easily using the trigger method. Let's create a counter component that emit an increment event whenever its button is clicked.
var Counter = React.createClass({
// Add the reaction mixin
mixins: [Reactions.mixin],
render: function(){
return (
<div className="counter">
<span>{this.props.count}</span>
<button onClick={ this.onIncrease }>Increase</button>
</div>
);
},
onIncrease: function(){
// Emit an increase event with 1 as detail
this.trigger('increase', 1);
}
});
To create a reaction to the event, we can use the Reaction object as a hub.
Reactions.on( 'increase', function( e ){
// Add the number passed as detail to the
// counter store ( 1 in this example)
store.counter += e.detail;
});
The mixin also allow to listen to events emited by children components. Imagine a selectable list:
var List = React.createClass({
mixins:[Reactions.mixin],
// Events to listen are defined in the onEvents attribute
onEvents: {
// Add a listener to the selected event
selected: function(e){
// Select the item that emitted the event
this.setState({selected: e.detail});
}
},
getInitialState: function(){
return {selected: -1};
},
render: function(){
// Create a list of 3 items
var items = [0,1,2].map( function( i ){
return <Item text={ 'Item ' + i} index={ i } selected={ this.state.selected == i} />;
});
return <div>{ items }</div>;
}
});
var Item = React.createClass({
mixins:[Reactions.mixin],
render: function(){
return (
// thenTrigger will emit a selected event on click
<div onClick={ this.thenTrigger( 'selected', this.props.index ) }>
{ this.props.text }
</div>
);
}
})
API
Reactions.on( eventName, callback )
Add a listener to some event, AKA creates a reaction. The reaction will receive the event as the only argument.
// Creates a reaction for the selected event
Reactions.on( 'selected', function( e ){
console.log( 'Hey I am selected!');
});
Reactions.once( eventName, callback )
Add a listener to some events that will be called just once.
Reactions.off( eventName, callback )
Removes an event listener.
Reactions.trigger( eventName, detail )
Flux dispatcher uses the waitfor method to synchronize different actions. Using flux-reaction you can trigger a new event whenever a reaction has finished to coordinate several reactions for an event.
Reactions.mixin
A mixin to be used by react components. The mixin will add the following methods to the component:
trigger( eventName, detail )
Triggers the event in the DOM node of the component. The detail attribute of the event can be customized passing its value as the second argument.
thenTrigger( eventName, detail )
Returns a function than trigger the event with the given detail attribute. This is useful to trigger the event directly from the render method without creating a new function that does so.
var Item = React.createClass({
mixins:[Reactions.mixin],
render: function(){
return (
// thenTrigger will emit a selected event on click
<div onClick={ this.thenTrigger( 'selected', this.props.index ) }>
{ this.props.text }
</div>
);
}
})
listenTo( eventName, callback )
Listen to children events.
onEvents
Event listeners for children can also defined declaratively by using the component onEvents attribute. That attribute must be an object with the name of the events as keys and functions or name of methods of the current component as values:
onEvents: {
selected: 'onSelected',
removed: function(){
console.log( 'removed' );
}
}
A selected event on a children with trigger component's onSelected method. A removed event will trigger the function defined.
Those listeners will be added in this componentDidMount method.
Collaborate
This is a quick implementation of a crossbrowser event library to be used with React.js. There are some directions to work to:
• Add support for using EventEmitter make it work in the server.
• Study the alternatives to make it work with the future React Native.
• Add support for using it as a higher order component.
Any improvement that you may find is welcome. | ESSENTIALAI-STEM |
A bit of fitness: Do what you can do, not what you can&apost - Chicago Tribune
It's not always easy to follow that classic advice, Stand on your own two feet. That's where Mike Alalof comes in. He's a 58-year-old bodybuilder and former prizefighter. And he says you can get a great workout by sitting down. My big shtick is exercising from a seated position, says Alalof, who created YouTube videos based on classes he teaches in Montgomery County, Md. Whether you're injured, ailing, overweight, disabled, stuck all day at a desk job or just plain tired, veteran trainer Alalof is absolutely certain that he can get you moving. And that's not just talk. Some 18 years ago, soon after opening one of the several gyms he has operated over his long fitness career, Alalof was diagnosed with multiple sclerosis. I came from the Mr. America, muscleman, Mr. Macho background. It was devastating. For several years he used a wheelchair, he says. But little by little he got back on his feet and became a fitness advocate for those who struggle with an exercise regimen. On his website, fitnessreinvented.com, he even invites phone calls from those with challenging conditions. Whether you're disabled or not, Alalof's mantra is, Do what you can do, not what you can't. People always do something they can't, and they get frustrated and quit, he says. The frustration is especially high for people with packed schedules that tie them to their desk or those with limited mobility or who wrestle with the effects of chemo and medications. This is why Alalof preaches: Everybody can do something. I say, 'That's OK. Little by little you can do more. (But always check first with your doctor, he advises.) For a quick sample of what Alalof is talking about, search for his name on YouTube and click on MS-Seated Exercise Program, or click here. You'll need a chair. Have a tip on well-being? Write ewarren@tribune.com. | NEWS-MULTISOURCE |
Identication of cyclic ADP-ribose-dependent mechanisms in pancreatic muscarinic Ca2+ signaling using CD38 knockout mice
Yasue Fukushi, Ichiro Kato, Shin Takasawa, Tsukasa Sasaki, Boon Hooi Ong, Mika Sato, Atsushi Ohsaga, Kozo Sato, Kunio Shirato, Hiroshi Okamoto, Yoshio Maruyama
Research output: Contribution to journalArticlepeer-review
79 Citations (Scopus)
Abstract
We showed that muscarinic acetylcholine (ACh)-stimulation increased the cellular content of cADPR in the pancreatic acinar cells from normal mice but not in those from CD38 knockout mice. By monitoring ACh-evoked increases in the cytosolic Ca2+ concentration ([Ca2+]i) using fura-2 microfluorimetry, we distinguished and characterized the Ca2+ release mechanisms responsive to cADPR. The Ca2+ response from the cells of the knockout mice (KO cells) lacked two components of the muscarinic Ca2+ release present in wild mice. The first component inducible by the low concentration of ACh contributed to regenerative Ca2+ spikes. This component was abolished by ryanodine treatment in the normal cells and was severely impaired in KO cells, indicating that the low ACh-induced regenerative spike responses were caused by cADPR-dependent Ca2+ release from a pool regulated by a class of ryanodine receptors. The second component inducible by the high concentration of ACh was involved in the phasic Ca2+ response, and it was not abolished by ryanodine treatment. Overall, we conclude that muscarinic Ca2+ signaling in pancreatic acinar cells involves a CD38-dependent pathway responsible for two cADPR-dependent Ca2+ release mechanisms in which the one sensitive to ryanodine plays a crucial role for the generation of repetitive Ca2+ spikes.
Original languageEnglish
Pages (from-to)649-655
Number of pages7
JournalJournal of Biological Chemistry
Volume276
Issue number1
DOIs
Publication statusPublished - 2001 Jan 5
Fingerprint
Dive into the research topics of 'Identication of cyclic ADP-ribose-dependent mechanisms in pancreatic muscarinic Ca2+ signaling using CD38 knockout mice'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Safety camera partnership
A safety camera partnership (also casualty reduction partnership, safer roads partnership) is a local multi-agency partnership between local government, police authorities, Her Majesty's Courts Service, National Highways/Welsh Government, and the National Health Service within the United Kingdom. Their aim is to enforce speed limits and red traffic lights by the use of cameras.
They were initially established in 1999 as part of the National Safety Camera Scheme to enforce speed limits in the United Kingdom. Until April 2007, the partnerships were funded from penalties generated from the use of traffic enforcement cameras in each area, but subsequently time they have received road safety grants.
Rationale
The stated objective was to reduce deaths and serious injury on the roads by reducing the level and severity of speeding and red light running through deterring, detecting and enforcement of speed and red light offences using but not limited to camera technology and driver education programmes.
The programme was started as part of the UK government's Road Safety Strategy that set targets of:
* 40% reduction in deaths and serious injuries by 2010 (compared to the average of 1994–8)
* 50% reduction in deaths and serious injuries of children.
The reported casualty statistics 2009 showed that the 2009 figures for deaths and serious injuries were 44% lower than the 1994-8 average and deaths and serious injuries of children down by 61% on the 1994-8 average. A similar level of 10-year casualty reduction had been consistently achieved over each of the previous sixteen years, with a previous high of 43% in 1993 and the lowest recent figure being 38% in 2006.
History
The safety camera programme was announced with a press release in December 1999. Eight trial areas were announced which would begin a roll-out of a number of Safety Cameras. These areas were Cleveland, Essex, Lincolnshire, Northamptonshire, Nottingham, South Wales, Strathclyde and Thames Valley.
The announcement was in part the result of a report commissioned by the UK Department for Transport (DfT) to look at the differing effects of various strategies related to the deployment of speed cameras. The main finding of the report was that camera deployment can reduce drivers' speeds markedly and that cameras on the survey roads were perceived to be reasonably effective.
The eight initial implementations began on 1 April 2000. The cameras were mainly to be placed in locations where there had been a significant number of casualties as a result of road accidents. One novelty in the partnerships was that the revenue raised by the cameras would be ring-fenced for investment back into the running and maintenance of the original cameras and investment in more cameras. In part this was a response to allegations that such cameras were being placed for revenue generation and not for safety reasons. From the start the partnerships were controversial with strong opinions both for and against the cameras. In December 2001 new regulations enforced a code of visibility for the cameras in order that they were always clearly seen by motorists. As of April 2006 there were thirty eight safety camera partnerships in England and Wales covering forty-one police force areas out of a total of forty-three (Durham and North Yorkshire are the exceptions). Similar arrangements exist in Scotland and Northern Ireland.
As the cameras became more widespread the issue became more contentious politically. In particular motoring bodies began to question the effectiveness of speed cameras as a means for accident prevention. There were also constitutional concerns about the membership of the Courts Service and the payments made to that body contrary to the fundamental principle of Natural Justice: nemo iudex in causa sua. This created a demand for research showing whether or not the cameras were, in practice, effective at reducing deaths and injuries from road accidents, and to address the unlawful payments. Four independent evaluation reports were commissioned by the DfT to address this.
Since April 2007 however, an annual specific (although not ring fenced) 'road safety grant' which was no longer related to the number of penalties issued locally was given directly to the local authorities with a responsibility for road safety who were free to choose whether or not to re-invest this in their partnership.
During 2007 a total of 1.26 million fixed penalties were issued, which was down 23% from the previous year. | WIKI |
背景
以一个python的request的demo为例,访问双向认证的网站并打印其首页文本信息:
1
2
3
4
5
import requests
url = "https://pro6.aishu.cn"
response = requests.get(url)
print(response.text.encode("GBK", "ignore"))
会报如下错误:
1
2
3
4
5
6
7
8
9
C:\Users\liu.ziyi\AppData\Local\Programs\Python\Python38\python.exe E:/Python/httpRunnerDemo/kom/kom_session.py
<html>
<head><title>400 No required SSL certificate was sent</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<center>No required SSL certificate was sent</center>
<hr><center>nginx</center>
</body>
...
双向认证的网站,即需要预先在本地安装对应的客户端证书,在访问该网站时,选择该证书才可访问该网站。
对于使用python发送request请求而言,这个过程也不例外。
根据.pfx证书文件使用requests-pkcs12
安装requests-pkcs12模块,可参考requests-pkcs12官方介绍
1
pip install requests_pkcs12
使用requests_pkcs12python代码如下:
1
2
3
4
5
6
7
8
9
10
11
12
import requests
from requests_pkcs12 import Pkcs12Adapter
session = requests.session()
url = "https://pro6.aishu.cn"
# 指定双向认证网站的pfx证书文件,并附带证书的密码
session.mount(url, Pkcs12Adapter(pkcs12_filename='client.pfx', pkcs12_password='xxx'))
# 使用session调用get/post方法
response = session.get(url)
print(response.status_code)
再次执行即可。
根据.crt和.key证书文件使用requests
根据pfx证书文件生成.crt、.key文件:
1
2
3
4
5
6
7
8
9
10
[root@centos7 cert]# openssl pkcs12 -in client.pfx -nocerts -nodes -out example.key
Enter Import Password:
MAC verified OK
[root@centos7 cert]# openssl pkcs12 -in client.pfx -clcerts -nokeys -out example.crt
Enter Import Password:
MAC verified OK
[root@centos7 cert]# ls
client.pfx example.crt example.key
使用request发送证书的python代码如下:
1
2
3
4
5
import requests
url = "https://pro6.aishu.cn"
response = requests.get(url, cert=('example.crt', 'example.key'))
print(response.status_code) | ESSENTIALAI-STEM |
China's tech firms to post slower June-quarter growth on sagging demand
(Reuters) - China’s top technology, e-commerce and consumer electronic firms are set to report a sharp slowdown in revenue growth for the June quarter, as a bruising trade war with the United States weighed on the Chinese economy and hurt consumer spending. Revenues at a handful of China’s biggest tech firms are expected to grow 26% on average in the quarter ended June 30 - the slowest in six quarters - compared with the same period a year earlier, according to consensus estimates from Refinitiv. This includes China’s e-commerce giant Alibaba Corp (BABA.K) and its smaller rival JD.com (JD.O), internet firm Baidu Inc (BIDU.O), and Tencent Holdings (0700.HK), the world’s largest gaming company. Net income at these companies is expected to grow 9%, versus a galloping 50% increase a year earlier. The trade war has roiled markets and global supply chains and forced tech companies to rethink production and marketing tactics. A lackluster June quarter is expected to prompt firms to cut costs further to shore up margins. China’s economic growth slowed to 6.2% in the second quarter, its weakest pace in at least 27 years. “Given the slowing economy and tightening of credit within China, we can expect to see this reflected in ... different ways,” said Taipei-based technology analyst Sam Reynolds. “For the more business-to-consumer focused companies, this will be reflected in slower consumer spending; for the more business-to-business companies (like Baidu) this will be reflected in less ad buys.” Below are some expected milestones for these firms that are scheduled to report results in the coming weeks, based on Refinitiv data: * JD.com, which is expected to report earnings on Tuesday, could manage to eke out a small profit by curbing costs. But with fewer consumers buying household appliances and electronics, the online retailer is likely to post its slowest revenue growth in at least five years. * Alibaba’s profit likely grew 27%, its fourth successive quarterly rise. Big promotions are expected to propel its sales 38% higher, but that will be the company’s slowest growth in 14 quarters. * Tencent is expected to post profit growth of 24%, versus a 2% decline a year earlier, helped by adoption of its patriotic-themed video games and cloud services. The music-streaming unit it backs - Tencent Music (TME.N) - on Monday missed revenue estimates as it reported the slowest increase in a widely watched metric for growth since its debut in December. * Alibaba and Tencent, China’s biggest listed companies, have together lost roughly $96 billion in market value since the trade war took a turn for the worse in May. * Baidu’s profit likely fell 71%, its third straight quarterly decline as it invested to keep up with competition from privately held ByteDance. Revenue is expected to fall 0.8%, its first decline in 10 quarters. * Smartphone maker Xiaomi Corp’s (1810.HK) revenue growth is expected to be the slowest since its initial public offering in July last year. (Reporting By Gaurav Dogra; additional reporting by Patturaja Murugaboopathy in Bengaluru; Editing by Sayantani Ghosh and Stephen Coates) | NEWS-MULTISOURCE |
The Chinese empire was one of history's most long-lived empires. Over thousands of years, various ruling dynasties rose and fell.
A dynasty is a family group that passes down the right to rule through its family line. The period during which a particular family ruled is also called a dynasty.
Single dynastic families often remained in power for hundreds of years, until they were replaced by another powerful family group. The throne was passed from father to son.
Myth or Reality?
The Xia dynasty was the first of many ancient Chinese ruling families. It stayed in power from around 2070 until 1600 B.C.E.
Or did it? Many historians are unsure the Xia dynasty ever really existed. They believe the Xia dynasty is only a legend.
Tradition has it that the first Xia king was a man named Yu. He is said to have repaired the damage caused by a major flood, and for this reason, the gods awarded him the Mandate of Heaven, or the right to rule. This right was passed down through his family line.
The Xia dynasty is said to have been overthrown in 1600 B.C.E. by the first Shang leader. Of course, the Xia dynasty might not have existed, so if it did not, the Shang dynasty was really the first of China's dynasties.
China's "Golden Age"
The Shang rulers stayed in power for about 600 years. China's writing system was invented during this period of rule. Many later historians viewed the Shang Dynasty as a "Golden Age."
In 1046 B.C.E., the Shang king was overthrown by the first Zhou king. The Shang dynasty then came to an end.
The Zhou dynasty was the longest of ancient China's dynasties. It lasted from 1046 B.C.E. to 256 B.C.E. Some of ancient China's most important writers and philosophers lived during this period, including Confucius and the first Taoist thinkers.
The years from 476 B.C.E. to 221 B.C.E. are known as the "Warring States Period." During this time, the seven regions controlled by the Zhou began fighting among each other. The Qin armies finally won this struggle in 256 B.C.E. They then overthrew the Zhou leaders.
"China" and the Thousands of Warriors
The Qin dynasty only lasted 15 years (221 to 206 B.C.E.). However, it was an important time in Chinese history. It was a period of unification. Various territories surrounding China were brought under Chinese rule.
The first Qin leader was Qin Shin Huang. (He is also sometimes called Shi Huangdi or Qin Shi Huang). He began work on what would become the Great Wall of China. Qin Shin Huang died in 210 B.C.E. Almost 8,000 statues of warriors were buried along with him.
Qin Shin Huang was followed by his son, Qin Er Shi. Qin Er Shi's reign lasted for only three years before he was overthrown in 206 B.C.E. The leader of the rebels, Liu Bang, became the first emperor of the Han dynasty.
The Han dynasty, which lasted from 206 B.C.E. to 220 C.E., marked another Golden Age of China. During this time, Confucianism became the official state religion, and the Silk Road was established. The Silk Road was a trade route connecting Asia to Europe.
In 220 C.E., the last Han emperor was overthrown. Han rule was followed by a period known as the Three Kingdoms.
Three Kingdoms and an Empress
During the Three Kingdoms period (220 to 280 C.E.), China was divided into three states: Cao Wei, Shu Han, and Dong Wu. Between 386 and 581 C.E., the region further broke apart into the northern and southern territories.
In the year 581 C.E., the Sui dynasty arose. While it was short-lived, the Sui dynasty managed to reunite the northern and southern territories. However, in 618 C.E., the Sui were overthrown by the Tang.
The Tang dynasty, which ran from 618 to 906 C.E., is often called the greatest of the dynasties. Its members included China's only female ruler, Empress Wu Zetian (625–705 C.E.). She ruled the Chinese empire for about 20 years.
The Mongol Takeover
The Tang dynasty was followed by a period of constant warring. In the year 960 C.E., the Song dynasty came to power. During this period, the world's first paper money was issued.
The Song dynasty lasted until 1279 C.E. when it was defeated by the Mongols. The Mongols then ruled China as the Yuan dynasty from 1279 until 1368 C.E.
The Yuan dynasty was overthrown in 1368 C.E. by the Ming Emperor Zhu Yuanzhang. The Ming emperors expanded the Great Wall of China in an effort to keep invaders out. Nonetheless, invading Manchu forces eventually ended the Ming dynasty in 1644 C.E.
The Last Emperors
The Manchu invaders established the Qing dynasty, which ruled from 1644 to 1911 C.E. During this time, China came into increasing conflict with other countries. In 1911 C.E., the last of the Chinese emperors, Puyi, stepped down. China then became a republic. | FINEWEB-EDU |
City of Workers
City of Workers (German: Arbeiterstadt), also translated as Working-Class City, is an 1920 oil painting on canvas completed by the Berlin Secessionist painter Hans Baluschek. The 48.44 × 36.25 in (123 × 92.1 cm) work is held at the Milwaukee Art Museum.
Description
This oil painting on canvas measures 48 7/16 × 36 1/4 in. (123 × 92 cm). It depicts a "dark and dirty" working class sector of the German capital, Berlin, in which industrial smoke dominates the skyline and the few lights of windows are drowned in the gloom. The workers' homes are concentrated in the background, while the foreground is dominated by train tracks and the white (back) light of a railway signal. In the lower left corner, standing on a train car, is a dark and mysterious figure – shown in such little detail to almost be a silhouette – wearing a coat and a hat, its back to the viewer. The figure appears to be looking over the city, with its oppressive tight spaces.
Completion and analysis
Hans Baluschek (1870–1935), the son of a railway engineer who had been active in the arts since, completed City of Workers in 1920, two years after Germany's defeat in World War I. A member of the Berlin Secession, Baluschek used an emotional technique similar to the German Expressionists in his work, but remained influenced by Realist subject matter. The city-scape, with its contradictory beauty and despair, was a common subject of his.
Catherine Sawinski, assistant curator of European art at the Milwaukee Art Museum, describes City of Workers as "a powerful critique of what political and social issues can do to ordinary citizens", one which depicts Berlin as "a menacing and dehumanizing force". Baluschek was a proponent for workers rights and a member of the Social Democratic Party.
Provenance
City of Workers was once owned by Prince Wilhelm Victor of Prussia. Later owners included Schim van der Loeff of Rotterdam and, in 1939, P. Adolf of The Hague. In 2006 the painting – expected to bring 15,000 to 20,000 euros – was sold at Sotheby's Amsterdam for 114,000 euros (US$151,506) to an American private collector. This was a record for a Baluschek work.
The painting was purchased by the Milwaukee Art Museum in October 2010 with funds from Avis Martin Heller. The painting, with the ascension number M2010.49, was displayed in the museum's Gallery 12 in September 2011, together with other works of German Expressionism, but in 2014 it was no longer on display. | WIKI |
Peter de Boer
Peter de Boer (born 26 August 1971) is a New Zealand curler originally from Scotland. He currently coaches the New Zealand national men's curling team.
Career
De Boer began curling in his native Scotland, where he played in the national championships and also played on the World Curling Tour. He finished in second place in the national championships in 2004 and 2005.
After moving to New Zealand in 2007, he began curling in New Zealand in 2010, and was selected to play on the national team after a runner-up finish in the New Zealand championships in 2011. De Boer led New Zealand to its best finish at the 2011 Pacific-Asia Curling Championships in recent years, winning a silver and a medal, and going to the world championships, where they finished in fifth place. However, at the 2012 Pacific-Asia Curling Championships, he led New Zealand to a less successful result, placing 6th.
Personal life
De Boer is married and has three daughters. He works as a business coach and is self employed. He lives in Wellington, New Zealand. He studied at the University of Edinburgh. | WIKI |
Campos Machado
Antônio Carlos Campos Machado (31 October 1939 – 6 January 2024) was a Brazilian lawyer and politician. A member of the Brazilian Labour Party, he was in the Legislative Assembly of São Paulo from 1987 to 2023.
Machado died in São Paulo on 6 January 2023 at the age of 84. | WIKI |
Wikipedia:Today's featured article/January 2, 2024
The Masked Singer is an American reality singing competition television series that premiered on Fox on January 2, 2019. It is part of the Masked Singer franchise and features celebrities singing songs while wearing costumes to conceal themselves. The program employs panelists who guess the celebrities' identities. In most episodes, after the last performance, a vote of the panelists and the audience eliminates a contestant, who is then revealed. The costumes were inspired by haute couture and designed in the first six seasons by Marina Toybina (pictured), who won a Costume Designers Guild Award and two Creative Arts Emmy Awards. The first five seasons received the highest Nielsen ratings for a non-sports program in the key demographic of adults 18–49. Its success has been credited to the growth of the Masked Singer franchise and interest in adapting South Korean reality television series and other television formats centered on costumes. The tenth season premiered in September 2023. | WIKI |
6.6-dm_reltype
DM_RELTYPE
ERROR: [DM_RELTYPE_F_INIT3]
SEVERITY: FATAL
DESCRIPTION: The type manager returned an error storing the dmRelation_Type type.
CAUSE: Unknown.
ACTION: Look at the error logged by the type manager. Report this message and any parameters to your Documentum site representative.
PARAMS:
ERROR: [DM_RELTYPE_F_INIT1]
SEVERITY: FATAL
DESCRIPTION: The dmRelation_Type type was found in the database without a version stamp.
CAUSE: Unknown.
ACTION: Report this message and any parameters to your Documentum site representative.
PARAMS:
ERROR: [DM_RELTYPE_F_INIT2]
SEVERITY: FATAL
DESCRIPTION: II Version stamp %d was expected to be %d.
CAUSE: The version stamp that the dmRelation_Type object software expected was different from the actual version stamp in the database.
ACTION: You must upgrade your DocuServer database to conform to the software that you are running. If your software and data are consistent, then report a bug. Also, Report this message and any parameters to your Documentum site representative.
PARAMS:
ERROR: [DM_RELTYPE_F_INT1]
SEVERITY: FATAL
DESCRIPTION: S The following database query %s could not be executed.
CAUSE: Inconsistency between the server and the sysobject type.
ACTION: Look at the error logged by the database. Report this message and any parameters to your Documentum Site $Id: dmrouter.e,v 5.0 1998/01/10 02:08:11 sol_ora Exp $ dmRouter class errors
PARAMS:
ERROR: [DM_RELTYPE_E_CANT_FETCH]
SEVERITY: ERROR
DESCRIPTION: D Cannot fetch – Invalid object ID %s
CAUSE: Could not fetch an object with the given id.
ACTION: This is probably caused by a bad ID. Or, possibly, a connection to the Documentum server could not be established.
PARAMS:
ERROR: [DM_RELTYPE_E_CANT_VALIDATE_SYSTEM]
SEVERITY: ERROR
DESCRIPTION: Server could not create server defined relation types.
CAUSE: Server was not successful in creating the system defined relation types.
ACTION: Most likely database error.
PARAMS:
ERROR: [DM_RELTYPE_E_NEED_PRIVS]
SEVERITY: ERROR
DESCRIPTION: SS The current user %s has insufficient privileges to save or destroy %s relation_type.
CAUSE: A user with insufficient privileges tried to save or destroy a relation_type object.
ACTION: See your sysadmin.
PARAMS:
ERROR: [DM_RELTYPE_E_NOT_EMPTY]
SEVERITY: ERROR
DESCRIPTION: S There are dm_relation object using %s relation_type object.
CAUSE: User tried to destroy a dm_relation_type object that still has dm_relation object using it.
ACTION: Either drop all dm_relation of this type before tring this operation.
PARAMS:
ERROR: [DM_RELTYPE_E_INVALID_SECURITY]
SEVERITY: ERROR
DESCRIPTION: S Invalid security %s for relation.
CAUSE: A user has defined an invalid relation_type security.
ACTION: Change to a valid relation_type security.
PARAMS:
ERROR: [DM_RELTYPE_E_CANT_CREATE_SYSTEM]
SEVERITY: ERROR
DESCRIPTION: S Can not system defined create relation type %s
CAUSE: Can not create relation type that start with DM_ prefix. Reserved for server use.
ACTION: Try another name.
PARAMS:
ERROR: [DM_RELTYPE_E_ALREADY_EXISTS]
SEVERITY: ERROR
DESCRIPTION: S Relation_Type with %s name already exists.
CAUSE: A user tried to define a relation_type that already exists. All relation_type names must be unique.
ACTION: Try another unique name.
PARAMS:
ERROR: [DM_RELTYPE_E_MUST_HAVE_NAME]
SEVERITY: ERROR
DESCRIPTION: A new relation_type must have a name.
CAUSE: All relation_types must have a name during creation.
ACTION: Set the name and try to save again.
PARAMS:
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google photo
You are commenting using your Google account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Connecting to %s
This site uses Akismet to reduce spam. Learn how your comment data is processed.
%d bloggers like this: | ESSENTIALAI-STEM |
Talk:Lucas Samaras
Untitled
Where is the rule that fare use images cannot be used in a gallery? I cannot find such a rule, but can find many examples to the contrary.
Bill E. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:56, August 30, 2007 (UTC)
* The issue is that each claimed fair use must be grounded on separate, substantive commentary in the article that justifies the use of each image. See Non-free content criteria, particularly #3 ("minimal use") and #8 ("significance"). The fact that we have an article on the artist does not mean that we have the legal right to post a gallery of whatever works of his we can find. Postdlf 00:11, 1 September 2007 (UTC)
* See WP:NFC: "The use of non-free media in lists, galleries, discographies, and navigational and user-interface elements normally fails the test for significance (criterion #8), and is thus nearly always unacceptable." —Angr 09:38, 1 September 2007 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Lucas Samaras. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20110927155310/http://www.magnoliaeditions.com/Content/PressRelease/Magnolia_Close_Lucas.pdf to http://www.magnoliaeditions.com/Content/PressRelease/Magnolia_Close_Lucas.pdf
Cheers.— InternetArchiveBot (Report bug) 15:35, 4 January 2018 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 external links on Lucas Samaras. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20090531064724/http://e-flux.com/shows/view/6828 to http://www.e-flux.com/shows/view/6828
* Added archive https://web.archive.org/web/20060920020344/http://www.getty.edu/art/gettyguide/artMakerDetails?maker=3793&page=1 to http://www.getty.edu/art/gettyguide/artMakerDetails?maker=3793&page=1
Cheers.— InternetArchiveBot (Report bug) 01:23, 8 January 2018 (UTC)
Unsourced collections moved from article
Samaras' work is held in the following permanent public collections:
* Honolulu Museum of Art Spalding House (formerly The Contemporary Museum, Honolulu)
* Courtauld Institute of Art, London
* Metropolitan Museum of Art, New York City
* Getty Museum, Los Angeles
* Honolulu Museum of Art
* Los Angeles County Museum of Art
* Albright-Knox Art Gallery, Buffalo
* Modern Art Museum of Fort Worth, Fort Worth, Texas
* Museum of Contemporary Art, Los Angeles
* Museum of Modern Art, New York City
* San Francisco Museum of Modern Art
* National Gallery of Australia, Canberra
* National Gallery of Art, Washington D.C.
* Smithsonian American Art Museum, Washington D.C.
* Tate Gallery, London
* Walker Art Center, Minnesota
* Whitney Museum of American Art, New York City
* National Gallery (Athens) | WIKI |
Seroquel side effects
What side effects can quetiapine have?
Below you will find the most important information about possible known side effects of quetiapine.
These side effects do not occur, but you can. Because every person reacts differently to medication. Please also note that the type and frequency of side effects may vary depending on the drug formulation (eg tablet, syringe, ointment).
Very common side effects:
drowsiness, drowsiness, headache, weight gain, increase in triglyceride levels in the blood, increase in cholesterol, decrease in HDL cholesterol.
Common side effects:
dizziness, accelerated heart rate (tachycardia), liver dysfunction, proliferation of certain liver enzymes in the blood, constipation, nausea and vomiting, runny nose, dry mouth, weight gain, white blood cells (leukopenia), transient hyperthyroidism, Boost your blood sugar.
Uncommon side effects:
Fainting, seizures, involuntary movements such as twitching and tics (dyskinesias), lipid metabolism disorders, type 2 diabetes mellitus.
Rare side effects:
Hypersensitivity reactions (skin rashes, swelling due to fluid leakage from blood vessels (angioedema), itching).
Very rare side effects:
Water retention in tissues (edema), liver inflammation, jaundice, development or marked worsening of diabetes mellitus, persistent and painful erections (priapism), heart muscle disease.
Special features:
If a malignant neuroleptic syndrome occurs (characterized by muscle rigidity, high fever, clouding of consciousness and circulatory collapse), the treatment must be stopped.
Several cases of acute liver failure have occurred during the treatment with quetiapine since the drug was launched. Therefore, in patients with hepatic dysfunction or previously damaged liver, the doctor should regularly monitor the blood glucose levels during treatment and possibly reduce the dose of the active ingredient.
In individual cases, after taking the active ingredient, there has also been a special change in the blood picture, the so-called thrombotic thrombocytic purpura (TTP). The signs are abdominal pain, reddening of the urine, fever, and evidence of increased bleeding tendency, such as bruises and mucosal bleeding. In such cases, discontinue medication with the active ingredient quetiapine immediately and consult the doctor.
To prevent a metabolic disorder, the doctor will evaluate the appropriate blood levels and body weight at the start of treatment. Deterioration of these values must be dealt with. As a patient you should be aware of signs of increased blood sugar such as increased thirst and increased fluid intake, frequent urination and weakness.
Heart muscle disease can be serious or fatal. If signs of myocardial insufficiency such as shortness of breath, limited exercise capacity or water retention (edema) in the arms or legs appear, the doctor should be contacted and the patient should be examined for myocardial infarction.
What interactions does quetiapine show?
Please note that the interactions may vary depending on the drug formulation of a drug (eg tablet, syringe, ointment).
Antibiotics such as erythromycin, antifungal agents such as ketoconazole, HIV-1 protease inhibitors, other neuroleptics (such as thioridazine) and antiepileptic drugs such as carbamazepine or phenytoin increase quetiapine degradation and decrease its efficacy.
During the treatment no grapefruit juice should be drunk, because the fruit can inhibit the metabolism of the active substance in the liver and increase its effect.
Quetiapine enhances the efficacy of alcohol, benzodiazepines, sedatives, anticholinergics (eg tiotropium), H1-antihistamines, antiarrhythmics, opioid analgesics, tri- and tetracyclic antidepressants, antihypertensive agents and anesthetics.
If MAO inhibitors are taken at the same time, unwanted effects of quetiapine may increase.
At the same time, no substances should be given during therapy which may also lead to a deficiency of white blood cells (for example cytostatics).
Potential Seroquel side effects may include: | ESSENTIALAI-STEM |
User:CTESHOW1
Derrick Osaghae was born in 2000 feb 4, having his show at the age of 15 naming it cte , having the meaning comedy target entertainment, | WIKI |
User:DillenAbbe/Social determinants of health/Bibliography
Steege, A. L., Silver, S., Mobley, A., & Sweeney, M. H. (2023, February 16). Work as a Key Social Determinant of Health: The Case for Including Work in All Health Data Collections. NIOSH Science Blog. October 30, 2023, https://blogs.cdc.gov/niosh-science-blog/2023/02/16/sdoh/
Armenti, K., Sweeney, M., Lingwall, C., & Yang, L. (2023). Work: A social determinant of health worth capturing. International Journal of Environmental Research and Public Health, 20(2), 1199. https://doi.org/10.3390/ijerph20021199
You will be compiling your bibliography and creating an outline of the changes you will make in this sandbox.
Outline of proposed changes
Click on the edit button to draft your outline. | WIKI |
Let’s say you have created an Oracle Enterprise Linux 7.2 Virtual Image in VirtualBox where you didn’t pay enough attention to the details, and you went with the default size of the Virtual Disk.
ExtendHDD_OEL_1
Weighing in at only 12GB, it’s not the largest of drives, even though that seems to be what Oracle recommends. If you want to install, say, Oracle Service Bus on that machine, you are going to run into issues there. It just isn’t enough.
The solution is to resize the Virtual Disk from 12GB to a larger number, and there are a few steps needed to accomplish this goal.
Our starting point is:ExtendHDD_OEL_2
Disclaimer: you should always make a backup of the Virtual Disks before proceeding with modifying them. There always is the chance of thing going awry, and it might very well be because of something you read here. Proceed with caution and at your own risk. 😉
How to resize a virtual disk for a OEL7 machine
Step 1: Resize the Virtual Disk (on host)
Step 2: Resize the partition of the guest
Step 3: Extend the filesystem (on the guest)
Step 1: Resize the Virtual Disk
Virtual Disks are by default limited to a certain size, and this needs to be larger than what it currently is. All commands are run from the installation directory of Oracle VirtualBox, here: “C:Program FilesOracleVirtualBox”, and use the program VBoxManage.exe (on Windows)
The command is modifyhd, and takes –resize <MB> as parameter. 50GB is 51200MB, so that’s what we put in. The full command is below.
VBoxManage.exe modifyhd C:VMsoel7-ofmwoel7-ofmw.vdi --resize 51200
This will give the following output:
C:Program FilesOracleVirtualBox>VBoxManage.exe modifyhd C:VMsoel7-ofmwoel7-ofmw.vdi --resize 51200
0%...10%...20%...30%...40%...50%...60%...70%...80%...90%...100%
The size of the Virtual Disk shows as 50GB in the Virtual Media Manager, so we are all done here!
ExtendHDD_OEL_3
Step 2: Resize the partition
We increased the size of the (virtual) physical disk in the previous step, so now we have to modify the partitioning on the disk for it to show in the guest OS.
OEL 7 does not provide the appropriate tooling for this step, so we’ll have to revert to the excellent GParted. (In order for the LiveCD to work properly, click here!)
ExtendHDD_OEL_4Select the partition you want to extend (here: /dev/sda2) and click Resize/Move.
ExtendHDD_OEL_5
Punch in 51200 (or whatever size you want it to be, equal or less than the size you resized the Virtual Disk to) and click Resize. You should see the result as in the second picture.
ExtendHDD_OEL_6
ExtendHDD_OEL_7
Click Apply, and then again on Apply. This will make the changes you made permanent, and pretty much irreversible. This is also the moment when things can go wrong, so fingers crossed!
It should eventually show this:
ExtendHDD_OEL_9
You now successfully resized the partition to 49,51GB. Congratulations!
On to the next step.
Step 3: Extend the filesystem
We need the guest OS running for this step, so boot up your Virtual Image. Log on as a user, and switch to root.
Be aware: dragons may be ahead.
[root@localhost oracle]# lvdisplay
--- Logical volume ---
LV Path /dev/ol/swap
LV Name swap
VG Name ol
LV UUID cKJvJh-xbYz-9jne-SU2S-97Yw-lj1j-53yUcO
LV Write Access read/write
LV Creation host, time localhost.localdomain, 2016-06-16 12:48:17 +0200
LV Status available
# open 2
LV Size 1.20 GiB
Current LE 307
Segments 1
Allocation inherit
Read ahead sectors auto
- currently set to 8192
Block device 252:1
--- Logical volume ---
LV Path /dev/ol/root
LV Name root
VG Name ol
LV UUID NPUq9v-aCO0-QQ0N-e5YM-B9hv-ziNn-m4no0Y
LV Write Access read/write
LV Creation host, time localhost.localdomain, 2016-06-16 12:48:17 +0200
LV Status available
# open 1
LV Size 10.27 GiB
Current LE 2628
Segments 1
Allocation inherit
Read ahead sectors auto
- currently set to 8192
Block device 252:0
We are interested in the /dev/ol/root Logical Volume, and we can see it’s still shy of 11GB. Time to make this bigger!
First, we need to extend the Logical Volume, which is done through lvextend.
[root@localhost oracle]# lvextend -L 48G /dev/ol/root
Size of logical volume ol/root changed from 10.27 GiB (2628 extents) to 48.00 GiB (12288 extents).
Logical volume root successfully resized.
By default, an OEL7 installation uses the xfs filesystem, and you can use xfs_info to get some more info on it. This is optional.
[root@localhost oracle]# xfs_info /dev/ol/root
meta-data=/dev/mapper/ol-root isize=256 agcount=4, agsize=672768 blks
= sectsz=512 attr=2, projid32bit=1
= crc=0 finobt=0
data = bsize=4096 blocks=2691072, imaxpct=25
= sunit=0 swidth=0 blks
naming =version 2 bsize=4096 ascii-ci=0 ftype=0
log =internal bsize=4096 blocks=2560, version=2
= sectsz=512 sunit=0 blks, lazy-count=1
realtime =none extsz=4096 blocks=0, rtextents=0
To extend the filesystem over the entire Logical Volume, the command xfs_growfs is used. It takes the filesystem as it’s parameter, here: /dev/ol/root.
[root@localhost oracle]# xfs_growfs /dev/ol/root
meta-data=/dev/mapper/ol-root isize=256 agcount=4, agsize=672768 blks
= sectsz=512 attr=2, projid32bit=1
= crc=0 finobt=0
data = bsize=4096 blocks=2691072, imaxpct=25
= sunit=0 swidth=0 blks
naming =version 2 bsize=4096 ascii-ci=0 ftype=0
log =internal bsize=4096 blocks=2560, version=2
= sectsz=512 sunit=0 blks, lazy-count=1
realtime =none extsz=4096 blocks=0, rtextents=0
data blocks changed from 2691072 to 12582912
Success!
df -h now reads nearly 50G, so now we have more space. Happy days!
ExtendHDD_OEL_10
Houd jij je kennis graag up to date?
Mis niets meer van onze kennisdocumenten, events, blogs en cases: ontvang als eerste het laatste nieuws in je inbox!
Fijn dat we je op de hoogte mogen houden! | ESSENTIALAI-STEM |
Talk:ORRCA
ORRCA is also the Organisation for the Rescue and Research of Cetaceans in Australia. See www.orrca.org.au.
<IP_ADDRESS> (talk) 11:18, 10 June 2017 (UTC) Adrian | WIKI |
Wikipedia:Articles for deletion/The Black Year
The result of the debate was delete. Mailer Diablo 12:24, 15 May 2006 (UTC)
The Black Year
Only use of this term is found in a novel Telsa (talk) 08:25, 10 May 2006 (UTC)
* Delete. My full reasoning is at Talk:The Black Year but in sum, we already have articles on Anglesey, Druid, and the main source Annals (Tacitus); and we have articles on Bernard Cornwell and his The Warlord Chronicles, in which novels the narrator refers to "That Black Year" and the author (in an afterword) refers to "the black year of AD60 when..". I think this is an honest confusion of these descriptions in Enemy of God with a real name used historically. However, once you take the name and Merlin's quest for treasures with which to repel Romans out, there's nothing in this article which we don't already cover. I did not turn it into a redirect because, as far as I can tell, this name is not used in history, so the redirect would be a sort of original research in itself. Telsa (talk) 08:42, 10 May 2006 (UTC)
* Delete per Telsa, including his reason not to redirect to another article. Google search shows lots of "2003 was a black year for " quotes, but none except this WP article indicate that it's used by historians to refer to 60 CE. Barno 17:56, 10 May 2006 (UTC)
* Neutral. I tend to agree with Telsa's reasoning, but the article could possibly also be moved, cleaned up, and NPOVed to something like Suetonius' attack on Anglesey. (PS: If her user page tells no lie, Telsa is female Wikipedian...) QuartierLatin1968 [[Image:Red flag waving transparent.png|20px|El bien mas preciado es la libertad]] 20:37, 12 May 2006 (UTC)
| WIKI |
Talk:Lillian Hobbs
Untitled
Hi. As the entry's author, I'd like to note that this is one of a series of articles about child murder and infanticide in colonial New Zealand, a subject which tends to be overshadowed by the case of Minnie Dean. However, this emphasis does not pay enough attention to nuances around court cases and public perceptions of child deaths during the late colonial era in this country. Therefore, I have added references to the cases of Phoebe Veitch, Winifred Carrick and Caroline Whitting in this context. As you may note, I've added a reference article that brought my attention to the relative neglect of this issue in online New Zealand social history. Calibanu (talk) 23:57, 6 May 2012 (UTC)User Calibanu | WIKI |
File:Oxfam trailwalker.png
History of File:Oxfam trailwalker.gif
Source URL: http://www.oxfamtrailwalker.org.hk/eng/home/ )''
* 2007-04-23T20:41:13Z Cydebot (Talk | contribs) (128 bytes) ( Robot - Renaming non-free template "logo" per Non-free content/templates. )
* 2005-10-10T10:30:01Z TWong (Talk | contribs) ''( Author: Oxfam Hong Kong
* 2005-10-10T10:33:59Z TWong (Talk | contribs) (92x58) (2999 bytes)
* 2005-10-10T10:30:01Z TWong (Talk | contribs) (180x118) (4560 bytes) | WIKI |
399 F.2d 214
SAYLES FINISHING PLANTS, INC. v. THE UNITED STATES
[No. 5-64.
Decided July 17, 1968]
Robert E. Jacobson, attorney of record for plaintiff. John V. Kean, Edwards ds Angelí, and Philip F. Herrich, of counsel.
Edna G. Parker, with, whom was Assistant Attorney General Mitchell Rogovin, for defendant. Philip R. Miller, of counsel.
Before Cowen, Chief Judge, Laramore, Dureee, Davis, Collins, Skelton and Nichols, Judges.
Per Curiam;
This case was referred to Trial Commissioner Roald A. Hogenson with directions to make findings of fact and recommendation for conclusions of law under the order of reference and Rule 57(a). The commissioner has done so in an opinion and report filed on January 25, 1968. On June 21, 1968 the parties filed a stipulation wherein, among other things, it is stipulated that the court may enter judgment in accordance with the Trial Commissioner’s opinion, findings of fact, and recommended conclusion of law which may be adopted by the court. Since the court agrees with the commissioner’s opinion, findings and recommended conclusion of law, as hereinafter set forth, it hereby adopts the same as the basis for its judgment in this case without oral argument. Therefore, plaintiff is not entitled to recover and the petition is dismissed.
OPINION OP COMMISSIONER
Hogenson, Commissioner:
This is a suit to recover federal income taxes and assessed interest paid by plaintiff to defendant for calendar years 1955,1956, and 1957, plus statutory interest. The suit arises as a result of defendant’s disallowance in each year of a claimed deduction for interest paid. Defendant’s contention is that these payments, alleged to be interest on indebtedness, were actually distributions of profits as dividends. Thus this case presents one more variation of the familiar debt-versus-equity controversy. For the reasons hereinafter stated, it is my opinion that plaintiff is not entitled to recover.
Plaintiff is a Rhode Island corporation engaged in the textile finishing business, with its principal location in Sayles-ville, Rhode Island. Plaintiff is the ultimate successor to the business conducted at the same location by Frank A. Sayles some 50 years ago. Upon Mr. Sayles’ death in 1920, his executors caused the business to be incorporated as Sayles Finishing Plants, Inc. (referred to herein as “old Sayles”), a separate entity from the plaintiff herein. Two years later in 1922, the executors created plaintiff corporation, then named Remaw Manufacturing and Investments Company (hereinafter “old Remaw”), which was used to hold certain investments. Plaintiff as old Remaw became inactive in 1925 and remained so until May of 1930, when a plan was formulated to reorganize both plaintiff and old Sayles.
Under this plan, plaintiff as old Remaw acquired virtually all the assets of old Sayles, and changed its name to Sayles Finishing Plants, Inc., hereinafter referred to as plaintiff or new Sayles. Plaintiff then undertook the active operation of the textile finishing business. Old Sayles changed its name to Remaw Corporation and thereupon became inactive. The conduct of the business by plaintiff after this reorganization was virtually identical to that occurring previously; there were no significant changes in the plant or its operation, nor in its personnel or management, nor in the business activities.
The reorganization was essentially in the form of a sale to plaintiff of all the stock of old Sayles, accompanied by a recapitalization of both companies. Neither corporation was in financial difficulty at the time, and the plan did not involve any new investment of money in either company. Prior to the reorganization, the executors of Mr. Sayles’ estate (sole stockholders of both old Sayles and old Eemaw) had transferred all the stock of both corporations to the trustees of four trusts created under eighth clause of Mr. Sayles’ will. Immediately after the reorganization, the eighth clause trustees held all of plaintiff’s stock, as well as $7,000,000 in 6 percent demand notes of plaintiff. Plaintiff in turn held all the stock of new Eemaw, hereinafter called Eemaw.
The trustees devised the above-mentioned plan of reorganization and recapitalization as a means of affording greater protection to the trust beneficiaries. This was deemed advisable in light of the financial and economic outlook as of May 1930.
One year later, in May of 1931, additional changes were made whereby Eemaw authorized and issued an additional 4,998 shares of common stock and an issue of 70,000 shares of preferred stock, both of $100 par value per share. Plaintiff subscribed to the common for $100 per share in cash, and also paid $200 for the two shares of Eemaw common it already held (and which had been all of the authorized and issued common stock of Eemaw). The preferred stock was issued to the trustees, in exchange for the $7,000,000 in plaintiff’s demand notes, which the trustees transferred to Eemaw. Thus Eemaw became active as a holding company for investments.
In June of 1934, another plan of recapitalization and reorganization was conceived and put into effect. Of the 5,000 shares outstanding of common stock of Eemaw, 4,500 were retired, and the eighth clause trustees purchased the remaining 500 shares from plaintiff. Then plaintiff issued 6 percent registered bonds having an aggregate face value of $7,050,000 in exchange for all the assets of Remaw (except Remaw’s corporate charter and any claims it might have for tax refunds). Remaw’s assets at this time consisted of the $7,000,000 in plaintiff’s demand notes of 1930, and other assets having a net value of approximately $50,000. Plaintiff’s bonds were issued directly to the trustees, upon the surrender to Remaw by the trustees of all the outstanding stock of Re-maw (70,000 shares of preferred and 500 shares of common). Remaw promptly canceled this stock and then amended its articles of association to authorize instead capital stock of four shares, par value $100 per share. These four shares were issued to the trustees, whereupon Remaw became completely inactive, remaining so until its dissolution in 1960.
In the 1934 transactions, plaintiff acquired from Remaw plaintiff’s 1930 demand notes of $7,000,000 face value, which were then canceled. The issue of $7,050,000 in plaintiff’s 'bonds were in registered form, transferable only on the books of the corporation; they provided for interest at the rate of 6 percent per annum (payable quarterly) and were due and payable on June 1, 1939. These bonds are the subject matter of the present suit.
The economic depression of the 1930’s affected the New England textile industry quite adversely, and plaintiff was no exception, for it suffered losses throughout most of this period. Because of this, the 1934 bonds were modified twice during the 1930’s. In 1935, the bondholders (the trustees) and Sayles agreed that, until maturity, interest should be payable annually from net income only (before deduction of that interest and any dividends paid), and that such interest would not 'be cumulative. Likewise, when the bonds became due, on June 1, 1939, a similar agreement was reached whereby interest on $6,050,000 of the bonds would thereafter be payable (at the rate of 6 percent per annum) from net income only, on the same terms as the 1935 agreement imposed. The remaining $1,000,000 was not affected by the 1939 agreement, and interest on this portion of the bonds became due and payable (also at a 6 percent annual rate) regardless of net income. Neither the 1935 modification nor that of 1939 conferred any additional rights or privileges upon the bondholders, and no consideration was paid in this connection.
No payments have been made on the principal of the bonds, and none has been demanded by the bondholders. Plaintiff has made purported interest payments on the bonds in accordance with their terms, as modified, in each of the taxable years involved here, 'as well as in prior and subsequent years. Income tax returns filed by plaintiff for 1955, 1956, and 1957 claimed a deduction of $423,000 in each year as interest accrued and paid on these bonds. Upon audit of these returns, the Commissioner of Internal Kevenue disallowed the claimed deductions for interest paid, on the ground that these payments were actually profit or dividend distributions.
On November 12, 1959, deficiencies totaling $656,188.60 (plus interest thereon of $105,405.57) were assessed, and plaintiff paid these amounts that same day. Timely refund claims were filed on October 30, 1961, and these were disallowed on January 8, 1962.
Subsequently, on audit of plaintiff’s 1958 federal income tax return, the Commissioner determined that a net operating loss existed, which would be carried back to reduce plaintiff’s 1955 and 1956 tax liabilities. Accordingly, on April 28,1961, the District Director tendered to plaintiff checks totaling $998,179.32, representing refunds of income taxes paid for 1955 and 1956, plus interest thereon. Plaintiff accepted the checks by letter dated May 5, 1961, reserving its right to further contest its tax liability for, those years.
On January 6, 1964, plaintiff filed its petition with this court, seeking (1) a judgment against the defendant in the amount of $349,907.96 (the amount of the rejected refund claims) with interest, and (2) a specific finding by the court that refund of said amount and the above-mentioned refund of April 28, 1961, result in whole or in part from allowance of the disputed interest deduction, and only in part from carryback of the 1958 net operating loss.
The sole issue for determination is whether plaintiff’s interest payments arose from actual indebtedness to its bondholder-stockholders, as contended by plaintiff, or whether such payments were actually distributions of dividends by way of purported interest payments on instruments which represented capital investment in plaintiff, as defendant insists. As stated by this court in Cuyuna Realty Co. v. United States, 180 Ct. Cl. 879, 884, 382 F. 2d 298, 301 (1967), the inquiry in most of the decided cases involving the debt-versus-equity controversy has been whether at the time of issuance of the disputed instruments, the parties intended to create a real debtor-creditor relationship; but such inquiry is not the ultimate test; and the real issue is whether there is “indebtedness” within the taxable year, on which purported interest deductions are allowable. This court further held that the federal income tax law looks to events in each taxable year, so in applying § 163, it is proper for courts to inquire for each taxable year whether there is indebtedness, and interest ceases to be deductible as a real cost of producing income, if with the passage of time it becomes apparent that the parties have no intention of continuing the debtor-creditor relationship.
However, as the court recognizes in the Cuyuna case, supra, full consideration must be given to all relevant and material facts in this case, as the law is well established that the debt-versus-equity problem is basically a question of fact, to be determined in the light of all the facts and circumstances of the particular case, with no single factor being determinative. Id. 180 Ct. Cl. at 883, 382 F. 2d at 300; Jack Daniel Distillery v. United States, 180 Ct. Cl. 308, 325-334, 379 F. 2d 569, 580-585 (1967). In applying this rule in a case involving the distinction between debt and equity on the issue of deductibility of a bad debt, American Processing & Sales Co. v. United States, 178 Ct. Cl. 353, 362-363, 371 F. 2d 842, 848 (1967), this court stated:
There is no dearth of cases in this province of tax law. So large is their number and disparate their facts, that for every parallel found, a qualification hides in the thicket. At most they offer tentative clues to what is debt and what is equity for tax purposes; but in the final analysis each case must rest and be decided upon its own unique factual flavor, dissimilar from all others, for the intention to create a debt is a compound of many diverse external elements pointing in the end to what is essentially a subjective conclusion. * * *
Upon consideration only of tbe form of the disputed bonds, as originally issued and before their modification by the 1935 and 1939 agreements, it would be concluded that the parties involved intended thereby to create indebtedness. The form of the bonds satisfied the well-stated definition of debt set forth in Gilbert v. Commissioner, 248 F. 2d 399, 402 (2d Cir. 1957), as follows:
The classic debt is an unqualified obligation to pay a sum certain at a reasonably close fixed maturity date along with a fixed percentage in interest payable regardless of the debtor’s income or lack thereof. While some variation from this formula is not fatal to the taxpayer’s effort to have the advance treated as a debt for tax purposes, * * * too great a variation will of course preclude such treatment. * * * [Citations omitted.]
However, the familiar tax principle that substance prevails over form, Higgins v. Smith, 308 U.S. 473, 477 (1940), calls for consideration of the prior, contemporaneous, and subsequent circumstances relating to the execution and issuance of the disputed instruments. Affiliated Research, Inc. v. United States, 173 Ct. Cl. 338, 341, 351 F. 2d 646, 648 (1965) ; Cuyuna Realty Co. v. United States, supra.
The textile finishing business as operated by old Sayles was in sound financial condition at the time of the 1930 transactions. It was not in need of new funds. The beneficial owners of this business, both when operated in corporate form of old Sayles and hi that of plaintiff, were the beneficiaries of the four trusts under the eighth clause of the will of Frank A. Sayles, even though prior to the reorganization, all of the stock of old Sayles was held by the sole surviving executor, and thereafter by the eighth clause trustees. No new capital was added to the 'business by the transactions which transferred such going business unchanged in its personnel, assets and operations from old Sayles to plaintiff. The only accomplishment of apparent substance in the reorganization of the two corporations (old Sayles and plaintiff) was the purported conversion of equity interests of the beneficial owners of the business into purported instruments of indebtedness, by the issuance to the trustees as a result of involved paper transactions of the demand notes of plaintiff in the aggregate sum of $7,000,000. The trustees (one of whom was the sole surviving executor) had in mind only one benefit to the business, i.e., the tax advantage of deducting interest payments on the purported indebtedness. From the standpoint of plaintiff corporation, or the business involved, no other substantial business purpose appears from the evidence. The deliberately planned benefits to the stockholders were to afford greater protection to the trust beneficiaries in that in the event of insolvency or bankruptcy of the business, the trusts would have the right to participate with other creditors to the extent of the $7,000,000 demand note obligations of plaintiff; that if the trustees desired to extract capital from the finishing business, they believed that they could retire up to $7,000,000 of the notes without taxation; and that the trustees would be afforded a convenient means of realizing a part or all of their investment in the business, if they so desired, by selling the demand notes to a third party, in which event they would still have retained control of the business.
Plaintiff’s demand notes were transferred in May of 1931 by the trustees to Eemaw (old Sayles) in involved paper transactions concerning creation and issuance of additional Eemaw common stock to plaintiff and new Eemaw preferred stock to the trustees. As previously, the beneficial owners of both Eemaw and plaintiff were the beneficiaries of the four eighth clause trusts. The trustees had complete control of both plaintiff and Eemaw, and the officers and directors of both corporations were the same. When the paper work had been completed, plaintiff held all of the common stock of Eemaw, just as it had before Eemaw was caused to increase its common stock; Eemaw held the demand notes ($7,000,000) of plaintiff; and the eighth clause trustees (in addition to the previously held common stock of plaintiff) held the preferred stock of Eemaw. While cash was transferred from plaintiff to Eemaw, there was no new money involved in the overall transactions.
As related above, plaintiff’s disputed bonds in the aggregate amount of $7,050,000 were issued to the eighth clause trustees in June of 1934. Here again, mere paper transactions were involved. As before, the ultimate control and ownership of both plaintiff and Remaw were vested in the four eighth clause trusts. In effect, Remaw was caused by the trustees to transfer all of its assets (the $7,000,000 demand notes of plaintiff plus $50,000 in other undefined assets) to plaintiff; all of Remaw’s stock (preferred and common) was transferred by plaintiff and the trustees to Remaw and thereupon canceled; Remaw (without assets) issued four shares of common stock to the trustees, but thereafter remained inactive until dissolved in 1960; and plaintiff acquired and canceled its own demand notes, and issued the disputed bonds to the trustees. Thus, the bonds replaced the demand notes as instruments of the purported indebtedness in dispute in this case. Except to the extent of the $50,000 in other undefined assets transferred from Remaw to plaintiff, no additional money was invested in plaintiff in these transactions.
The parties agree, and it cannot be doubted, that under the facts of a particular case, a stockholder (or stockholders) can also be a creditor (or creditors) holding taxwise a valid indebtedness against their corporation. Plaintiff cites various cases. In Gloucester Ice & Cold Storage Co. v. Commissioner, 298 F. 2d 183 (1st Cir. 1962), a corporation (to acquire the outstanding stock of a competitor) borrowed money from a bank and also issued debenture bonds which were in part exchanged for its outstanding preferred stock and otherwise sold to individuals not stockholders, and the court held that the debentures were evidences of indebtedness in tihe hands of the non-stockholders and equally so in the hands of the stockholders. In Rowan v. United States, 219 F. 2d 51 (5th Cir. 1955), the taxpayers had over a period of years made advances in the form of loans to their wholly owned corporation, and the court held that the unpaid portion of such advances was deductible as a worthless debt in the taxable year involved, after a careful review of the evidence on the premise that whether such advances were loans or capital contributions depended on the intent of the patties, to be ascertained from all relevant facts and circumstances. In Wilshire & Western Sandwiches, Inc. v. Commissioner, 175 F. 2d 718 (9th Cir. 1949), taxpayer corporation was incorporated to engage in the restaurant business, and its four incorporators (who became its sole stockholders) advanced $30,000, half of which was to be capital stock contribution and half a loan, and taxpayer’s promissory notes were issued for the purported loan to each stockholder accordingly. The court 'held that the transaction involving the promissory notes was a loan, interest on which was deductible, recognizing, however, that a lending transaction between stockholders and their corporation subjects such transaction to close scrutiny as to the tax effect, but concluding that while there were features both ways as to whether the pertinent advances were loans or stock purchases, those sustaining the loan conclusion greatly preponderated, chief of which was the intent of the parties at the time of entering into the transaction.
Obviously, the facts and circumstances in this case do not parallel the facts and circumstances of the cases cited by plaintiff and reviewed in the foregoing paragraph, and considerable doubt exists as to whether the parties here had a bona fide intention to create indebtedness at the time of the issuance of plaintiff’s demand notes or its disputed bonds. Moreover, there were no advances made by plaintiff’s stockholders to plaintiff for the issuance of either the demand notes or the disputed bonds.
Conversion of equity interests into evidence of indebtedness does not necessarily defeat tax treatment of the resulting relationship between a stockholder or stockholders and the corporation as a bona fide indebtedness. Here again, all of the facts and circumstances of the particular case must be considered. Even the fact that no new money was invested in the business does not require a holding that issuance of corporate debentures was a capital transaction, but such debentures are to be allowed tax treatment as indebtedness when the other factors in the case establish a true indebtedness. Kraft Foods Co. v. Commissioner, 232 F. 2d 118, 126 (2d Cir. 1956) ; Luden's, Inc. v. United States, 196 F. Supp. 526, 530-531 (E.D. Pa. 1961). However, in an appropriate case, lack of new money can be a significant factor in holding a purported indebtedness to be a capital transaction, particularly when the facts otherwise show that the purported indebtedness was merely a continuation of the equity interests allegedly converted. Golden Belt Lumber Co., 1 T.C. 741, 746 (1943) ; Briggs Co., 5 T.C.M. 366, 372 (1946) ; Wetterau Grocer Co. v. Commissioner, 179 F. 2d 158, 160 (8th Cir. 1950) ; R. C. Owen Co. v. United States, 149 Ct. Cl. 96, 101-102, 180 F. Supp. 369, 372 (1960), cert. denied, 363 U.S. 819. The disputed bonds in this case were clearly a continuation without change of the equity interests of the 'bondholder-stockholders, without new money contributed to plaintiff, and without any change in the operations of the business, with the only benefit or advantage to plaintiff being the tax de-ductibility of interest paid on the'bonds.
Even if the disputed bonds had been valid indebtedness at their inception, subsequent conduct of the parties belie their status as a debt in the taxable years here involved. Though purporting to represent a fixed obligation falling due in 1939, the bonds have remained wholly unpaid up to the present time; at no time have the bondholders even made a demand for payment in whole or in part. While the presence of a maturity date is significant evidence of the presence of debt, this factor loses importance when it is observed in form only. While a reasonable extension of the time for payment is not fatal in itself to plaintiff’s contentions, Wilshire & Western Sandwiches, Inc. v. Commissioner, supra, at 720-721, an extension for an inordinate period gravitates against the presence of a debt. Plaintiff has offered explanations as to why it saw fit to retain cash for other purposes rather than retiring these bonds, but these explanations are not convincing.
As reasons for nonpayment, plaintiff points to the “adverse business and financial circumstances” at the maturity date, and the “hazardous” nature of its business, necessitating a high degree of liquidity to guard against possible adverse trends. Furthermore, plaintiff asserts that it required large cash balances to enable i't to make advances to its subsidiary, American Bleached Goods Company. While the state of the economy in 1939 could conceivably be a valid reason for postponement, plaintiff’s explanation for its continuing failure to pay reveals an attitude implying the presence of an equity interest. By leaving this $7,050,000 to the risks of this “hazardous business,” the bondholders were playing the role of stockholders rather than creditors, for this is a basic distinction between the two types of investors.
In addition, the circumstances surrounding the advances to American Bleached Goods show that plaintiff could act the part of a debtor when such was deemed necessary. On several occasions it borrowed money for this purpose and on each occasion the loan was repaid in full. One such loan in the early 1950’s amounted to $2.4 million.
Proportionality of bondholdings and stockholdings will not void an otherwise valid debt, but it will render the relationship suspect, George E. Warren Corp. v. United States, 135 Ct. Cl. 305, 312, 141 F. Supp. 935, 939 (1956). Here the identity of the bondholders and stockholders appears to be the only substantial factor which would permit such prolonged nonpayment of an alleged debt. Under the circumstances it seems clear that an ordinary creditor would not permit such a prosperous debtor to ignore a $7,000,000 obligation over such a number of years. The evidence shows that from 1939 to 1957 plaintiff had on hand large amounts of cash and liquid assets. While it appears that the needs of the business and principles of sound management required some degree of liquidity, the amounts involved were so large and of such duration as to be inconsistent with an issue of bonds. As with the other factors, nonpayment at maturity is not controlling, but it is effective evidence of an equity interest in situations where no convincing explanation is offered. Thomas Machine Mfg. Co., 23 T.C.M. 1630, 1641-1642 (1964).
During the period in which the alleged bonds were overdue plaintiff paid out substantial amounts as dividend distributions (amounting to over $13 million between 1939 and 1957). Yet no demands were ever made for payment of the bonds; again the inference is that this “debt” could not have been regarded as a serious obligation by the parties. Plaintiff contends that it paid these dividends because it feared imposition of an accumulated earnings tax, since (plaintiff argues) the state of the tax law during the World War II period of prosperity raised doubts as to whether such bond retirement would be a proper purpose for accumulation, sufficient to avoid the accumulated earnings tax. There is arguable authority for the proposition that an accumulation to pay off a debt which could be refinanced is not a reasonable accumulation within the meaning of the accumulated earnings tax provisions, Helvering v. Chicago Stock Yards Co., 318 U.S. 693 (1943). Nevertheless, if it had regarded the bonds as a binding obligation, plaintiff would have felt itself compelled to retire them regardless of the tax consequences. Likewise, a true creditor would not normally consider his debtor’s unfavorable tax aspects of repayment. Having chosen to cast their relationship in the form of a debt, the parties were required to accept the bad with the good. Their unwillingness to do so suggests that a debt was not really present.
Considering the facts as a whole, it is concluded that the “unique factual flavor” of this case is that of equity investment. It is doubtful that plaintiff’s bonds were taxwise a valid indebtedness at the time of their issuance, and certainly by the taxable years involved they should be considered equity capital. Thus, there was no indebtedness upon which interest accrued within the taxable years 1955-1957.
Findings or Fact
1. Plaintiff, Sayles Finishing Plants, Inc., is a corporation organized under the laws of the State of Ehode Island, with its principal place of business located at Saylesville in the town of Lincoln in that state. At all times material herein, plaintiff maintained its books of account and filed its federal income tax returns on the accrual basis and for a fiscal year ending December 31.
2. Plaintiff brings this suit for refund of federal income taxes and assessed interest for calendar years 1955,1956, and 1957 in the amount of $349,907.96, plus statutory interest. Pursuant to agreement of the parties, the trial of this case was limited to the issues of law and fact relating to the right of plaintiff to recover, reserving the determination of the amount of recovery, if any, for further proceedings.
3. On June 16, 1934, plaintiff issued to Nobert B. Dresser, Sinclair Richardson, and Industrial Trust Company, as trustees of each, of the four trusts under the eighth clause of the will of Frank A. Sayles, deceased, certain written instruments in the form of bonds. These instruments are by their terms transferable only at the office of the plaintiff, by the registered owner thereof, in person or by attorney, on the books of the corporation, and are thus referred to as 6 percent “registered” bonds. This refund suit arises from defendant’s disallowance of deductions for interest paid by plaintiff to its stockholders upon said issue of bonds.
4. The aforementioned trusts were trusts for the benefit of Mary A. S. Booker, Martha F. S. Nicholson, Nancy Sayles Day, and Hope Sayles, respectively, and each of such trusts received from plaintiff a portion of the bonds in the principal amount of $1,762,500.
5. Upon the death in 1947 of Martha F. S. Nicholson, beneficiary of one of the aforementioned trusts, the bonds held by the trustees for her benefit were reissued to the trustees in proportionately equal amounts for the benefit of each of her three children, Paul C. Nicholson, Jr., Martha S. N. Livingston 'and W. Sayles Nicholson, in three separate trusts. Up through the years involved in this suit, no other transfers were made.
6. The aforementioned Frank A. Sayles died testate on March 9,1920, leaving as the largest single asset in his estate a textile finishing business conducted in Saylesville, Bhode Island.
7. At the time of Frank A. Sayles’ death, this business was conducted in the form of a “Massachusetts” business trust created in March of 1917. On December 28, 1920, the executors of Mr. Sayles’ will caused the business to be incorporated as Sayles Finishing Plants, Inc., although the will granted this authority not to them, but to the eighth clause trustees. This corporation (hereinafter referred to as “old Sayles”) is not the plaintiff in this suit. As hereinafter related, old Sayles changed its name to Bemaw Corporation. Plaintiff is sometimes hereinafter referred to as new Sayles.
8. Until 1925, the executors of Mr. Sayles’ will and the trustees thereunder were the same individuals. Thereafter different individuáis were involved. After the will was probated, no new executor was appointed. The surviving executors or executor had authority to act and acted for the estate. The surviving executors or executor also continued to act as trustees or trustee, but upon the death of any trustee, appointment was made of a new trustee to fill such vacancy as authorized by the will. By May 15, 1930, there was but one surviving executor, James E. MacColl.
9. On June 10, 1922, the executors caused Eemaw Manufacturing and Investments Company to be incorporated, hereinafter called “old Eemaw.” This corporation was created for the purpose of holding certain investments, but it became inactive in February of 1925 and remained so until May of 1930. Plaintiff (with its present name) is a reorganization of old Eemaw.
10. On May 15, 1930, the sole surviving executor, James E. MacColl, transferred to the trustees of the four trusts under the eighth clause of the will of Frank A. Sayles (Mr. MacColl, Eobert A. Dresser, and Sinclair Eichardson) certain stocks, including all of the issued and outstanding stock of old Sayles (40,000 shares of common stock) and of old Eemaw (100 shares of common stock).
11. Meanwhile, on May 14,1930, the day before the above-mentioned stock transfers, old Sayles gave its consent to old Eemaw to use its name. On the same date, plaintiff as old Eemaw amended its articles of association so as to (a) change its name to Sayles Finishing Plants, Inc., and (b) provide for corporate purposes substantially the same as those of the old Sayles, and (c) authorize capital stock of 35,000 shares of preferred stock of par value of $100 each, and 40,000 shares of common stock of par value of $100 each.
12. The eighth clause trustees made an offer on May 15, 1930, to sell to plaintiff (now Sayles Finishing Plants, Inc., formerly old Eemaw) all of the outstanding stock of old Sayles in exchange for:
(1) $7,000,000 in 6 percent demand notes of plaintiff (new Sayles), and
(2) 30,000 shares of new Sayles’ $100 par preferred stock, and
(3) 20,000 shares of new Sayles’ $100 par common stock (which included the 100 shares of old Eemaw which the trustees had already received from the surviving executor).
Both the demand notes and the stock were to be issued to the trustees, proportionately distributed among the four trusts under the eighth clause of Mr. Sayles’ will.
The trustees’ offer was accepted by new Sayles (old Eemaw) on the same day. The $7,000,000* in demand notes and the shares of common and preferred stock of new Sayles were issued to the trustees for the four trusts. There were two demand notes for each trust, one of $1,000,000 and one for $750,000, with interest payable quarterly-yearly at the rate of 6 percent per, annum.
13. On May 26, 1930, old Sayles amended its articles of association to change its name to “Eemaw Corporation” and to change its authorized capital stock to two shares, with a par value of $100 each. Those two shares were held by new Sayles, which in turn was owned by the trustees. Thereafter, on May 31, 1930, Eemaw Corporation transferred to new Sayles all of its assets except its corporate franchise and any claims it might have had for refund of federal taxes.
14. The operation of the finishing business conducted in Saylesville in the town of Lincoln in the State of Ehode Island after May 15, 1930, was substantially the same as that conducted prior to such date; the same plant, the same personnel, and the same managers were employed. Except for an interim period between May 14 or 15,1930, and May 31, 1930, the officers and directors of new Sayles were the same as those of old Sayles, the only variation being that new Sayles had one additional directorship, which was held by Sinclair Eichardson. After May 31, 1930, the officers and directors of Eemaw Corporation were the same as those of new Sayles.
15. Before May 15,1930, the sole stockholder of old Sayles was James E. MacColl, the sole surviving executor of the will of Frank A. Sayles. Immediately after May 15, 1930, all outstanding shares of new Sayles were owned by the eighth clause trustees. Shortly thereafter, on June 24, 1930, 250 additional shares of preferred stock of new Sayles were issued to the trustees of another trust, created under the seventh clause of Mr. Sayles’ will. Subsequently, on January 2, 1954, 2,223 additional shares of new Sayles preferred stock and 4,800 additional shares of new Sayles common stock were issued to the eighth clause trustees.
16. The comparative balance sheets of new Sayles as of December 31, 1930, and of old Sayles as of December 31, 1929, were as follows:
Assets New Sayles Old Sayles
Capital assets:
Land. $541,832.09 $646,961.37
Buildings.. 4,055,188.31 4,048,481.78
Equipment. 6,610,563.09 6,670,674.02
Water purification system — . 311,890.48 310.873.88
Dams and reservoirs. 179,144.89 179.144.89
Tenement properties_ 1,320,002.37 1,392,702.26
Additions in progress. 268,936.98 62,824.29
Total. 13,277,557.21 13,111,662.49
Less — Reserves for depreciation. $4,648,164.27 $4,299,239.69
Net property account. 8,629,392,94 8,812,422.80
Investments in owned companies — Capital stocks. 3,959,001.00 3,959,001.00
Other investments:
XT.S. Government securities..... $413,320.00 $413,320.00
Other bonds.. 144,610.27 868,853.61
Certificates of deposits and savings account— 1,051,684.93
Loans to affiliated companies.. 335,000.00
Other loans. 139,287.42 303,791.06
Deposits with mutual insurance companies... 43,734.20 44,267.04
Miscellaneous investments, less reserves. 202,724.25 239,354.26
Total... 2,330,361.07 1,859,685.96
Current assets:
Inventories of materials and supplies... $772,984.49 $838,088.23
Accounts receivable — less reserves.. 580,268.85 634,787.01
Current trade accounts of owned companies.. 83,983.73 133,825.08
Accrued charges on uncompleted work. 182,298.99 248,689.77
Cash in banks, on hand. 354,160.62 682,369.00
Accrued interest. 11,690.28 8,300.57
Total...... 1,985,386.96 2,646,960.66
Deferred charges_ 109,948.03 62,065.68
Total assets. 17,014,090.00 17,239,036.00
Liabilities
Capital stock:
6 percent nonoumulative preferred stock. $3,025,000.00
Common stock..... 2,000,000.00 $6,907,905.38
Total.. 6,025,000.00 6,907,905.36
Assets New Sayles Old Sayles
Purchase money demand notes payable to stockholders (6%). $7,000,000.00
Current liabilities:
Accounts payable. 146,893.72 $148,156.22
Accrued expenses. 63,627.89 133,572.93
Reserve for Sayman Company commissions.,-107,689.26
Reserve for federal income taxes. 68,127.47 173,237.54
Total. 278,649.08 562,655.94
Surplus Reserves:
New powerplant, Saylesville.. 600,000.00 500,000.00
Plant development, Saylesville. 600,000.00 600,000.00
Water purification development. 300,000.00 300,000.00
Inventory fluctuations. 100,000.00 200,000.00
Total. 1,600,000.00 1,500,000.00
Paid in surplus. 3,362,764.44
Earned Surplus or (operating deficit). (152,323.62) 9,268,474.70
Total liabilities and capital-..-_ 17,014,090.00 17,239,036.00
17. The valuation of assets of old Sayles reflected in its balance sheet as of December 31, 1929, was based on historical costs.
The valuation of plaintiff’s (new Sayles’) assets reflected on its balance sheet as of December 31,1930, was a carry forward of historical costs of such assets acquired from old Sayles and related generally to plaintiff as a going concern.
18. Old Sayles was in sound financial condition at the time of the various transactions in May of 1930. The stockholders’ equity as of December 31,1929, was $16,676,380 (total assets of $17,239,036, less current liabilities of $562,656). In addition to capital assets (land, buildings, equipment, etc.) of over $8,800,000 and investments in owned companies of almost $4,000,000, those assets included some $1,859,000 in other investments (Government securities, bonds, etc.) and some $2,545,000 in current assets. This asset value of $16,676,380 was reflected on the liability side of the balance sheet of December 31,1929, as follows:
Capital stock_$5,907, 905
Surplus reserves_ 1, 500, 000
Earned surplus- 9,268,475
The value of the assets of old Sayles was carried forward into new Sayles, but was reflected on the liability side of the balance sheet of plaintiff as of December 31, 1930, as follows:
Capital stock-$5, 000, 000
Demand notes_ 7,000,000
Surplus reserves- 1,500, 000
Paid-in surplus (less $152,324 operating deficit shown on balance sheet)_ 3,210,441
Total_16,710,441
During 1930 increases and decreases in the valuation of assets resulted from additions to and dispositions in the normal operations of the pertinent finishing business. Both ;of the balance sheets of December 31, 1929 and 1930, reflect application of the same rates of depreciation to capital assets to reduce the book value of such assets.
19. At the time of the May 1930 transactions, no new money was invested in the pertinent finishing business by the estate of Frank A. Sayles, by the eighth clause trustees, or by anyone else. No new money went to Sayles or Bemaw.
20. The economic depression, which started early in 1930 and lasted for almost the nest 10 years, had a very adverse effect upon the textile industry, particularly in New England. In this context, the transactions of May 1930 were devised by the eighth clause trustees in an attempt to afford greater protection to the trust beneficiaries. These transactions were undertaken in the belief first, that the issuance of $7,000,000 of demand notes would give to the trustees, in the event of plaintiff’s insolvency or bankruptcy, the right to participate with creditors to the extent of $7,000,000; second, that the interest paid upon these notes would be deductible in plaintiff’s income tax returns; third, that if the trustees desired to extract some of 'the capital which they had invested in the finishing business they could retire up to $7,000,000 of the notes without taxation; and, fourth, that the trustees had a convenient means of realizing a part or all of their investment, if they so desired, by selling the notes to a third party, in which event they would still have retained control of the business.
21. In May of 1931, the following transactions occurred:
(a) On May 29,1931, plaintiff (new Sayles) made an offer to Remaw Corporation (old Sayles) to subscribe to 4,998 shares of Remaw’s $100 par value common stock at $100 per share, payment therefor to be made in cash and said stock to be issued on June 1, 1931, and also to pay $200 for the two shares of Remaw common stock then already held by plaintiff.
(b) On the same day, Remaw amended its articles of association to increase its common stock to 5,000 shares of $100 par value and to authorize 70,000 shares of $100 par value preferred stock.
(c) Also on the same day, the eighth clause trustees made an offer to Remaw Corporation to exchange the $7,000,000 demand notes of new Sayles for 70,000 shares of Remaw’s preferred stock, such stock to be issued equally to the four eighth clause trusts.
(d) Likewise on May 29, 1931, at a Remaw stockholders’ meeting (plaintiff as t'he sole stockholder) and at a Remaw directors’ meeting it was voted to amend the articles of association as indicated above, to accept plaintiff’s offer referred to above, to accept the trustees’ offer referred to above, and to resume the carrying on of business. At that time the officers and directors of plaintiff were the same as the officers and directors of Remaw.
Each of the foregoing transactions was consummated. Plaintiff then held all of the common stock of Remaw, just as it had before Remaw increased its common stock from 2 to 5,000 shares; Remaw held the demand notes ($7,000,000) of plaintiff; and the eighth clause trustees (in addition to the previously acquired common stock of plaintiff) held the preferred stock of Remaw. While cash was transferred from plaintiff to Remaw for Remaw’s common stock, there was no new money involved in the overall transactions.
22. From 1931 to 1934, Remaw Corporation was utilized for the purpose of holding investments, and plaintiff continued to be engaged in the textile finishing business.
23. On June 16, 1934, the following transactions occurred: (a) Plaintiff (which was the holder of all of the Remaw common stock, and was itself solely owned by the eighth clause trustees) caused Remaw to retire 4,500 shares of the total number of 5,000 shares of common stock by distributing certain securities to plaintiff.
(b) Eemaw Corporation, by a special joint meeting of its preferred stockholders (the eighth clause trustees) and its common stockholders (plaintiff), and by a meeting of the Eemaw directors, voted to retire 4,500 shares of its common stock as indicated above.
(c) The eighth clause trustees made an offer to plaintiff to purchase the remaining 500 shares of common stock of Eemaw Corporation. The trustees’ offer was accepted by plaintiff, and the transaction was consummated.
(d) A plan of recapitalization and reorganization of plaintiff and Eemaw was determined, involving the following transactions, which were consummated: (1) Plaintiff was to issue its 6 percent registered bonds of an aggregate face value of $7,050,000 (the instruments involved in this suit); and (2) said instruments would be exchanged for all the property and assets of Eemaw Corporation, except Eemaw’s corporate franchise and any claims it might have for refund of federal taxes. The assets of Eemaw consisted of the $7,000,000 in demand notes of new Sayles, and other assets having a net value over and above liabilities of slightly over $50,000.
(e) The common stockholders of plaintiff (eighth clause trustees) approved the sale of all of the remaining Eemaw common stock to the trustees, and approved the above-mentioned plan of recapitalization and reorganization. At this time, the officers and directors of plaintiff were the same as those of Eemaw. For example, plaintiff’s offer to Eemaw was signed by Ethelbert Harman, treasurer of Sayles Finishing Plants, Inc., and Eemaw’s acceptance of the offer was signed by Ethelbert Harman, treasurer of Eemaw Corporation.
(f) The aforementioned bonds were to be, and were, issued by plaintiff in the amount of $1,762,500 for each of the four eighth clause trusts. These bonds were to be, and were, delivered to the trustees upon the surrender to Eemaw by the trustees for retirement and cancellation of all the outstanding stock of Eemaw (70,000 shares of preferred and 500 shares of common).
(g) The articles of association of Bemaw Corporation were then amended to cancel the 70,000 shares of preferred stock and the 500 shares of common stock, and to authorize instead capital stock of four shares with a par value of $100 per share. Thereafter, these four shares were held by the eighth clause trustees. After June 16,1931, Bemaw Corporation became completely inactive and remained inactive until its dissolution on December 80,1960.
24. As a result of the June 16,1934, transactions, plaintiff acquired and cancelled its eight demand notes dated May 15, 1930, which had been outstanding in the aggregate principal amount of $7,000,000. Except to the extent of $50,000 representing the net value of other assets transferred by Bemaw, no additional money was invested in plaintiff in connection with the aforesaid plan of recapitalization and reorganization.
25. After 1930 and until World War II, the general business situation confronting the textile industry in New England was very serious, and many textile plants were closed during this period. At the time of the 1930 transactions plaintiff was in sound financial condition, but thereafter business conditions deteriorated and (except for 1936) plaintiff incurred losses up to 1940.
26. On March 1,1935, the eighth clause trustees and plaintiff entered into an agreement whereby it was agreed that interest at the rate of 6 percent per annum was to be paid annually on the principal amount of $7,050,000 of the bonds involved in this suit, but only from net income (before deduction of that interest and any dividends on the company’s stock), determined in accordance with usual accounting practice, and that such interest was not to be cumulative. At that time, a notation was placed on the face of each instrument, reading as follows:
By the terms of an agreement between the Trustees under the Will of Frank A. Sayles and Sayles Finishing-Plants, Inc., dated March 1, 1935, to which reference is hereby made for a more complete statement of its terms, interest on this bond is, after such date, to be paid annually and only if and to the extent earned during each year, and is not to be cumulative.
27. At the time the 1935 agreement was executed, the trustees and the beneficiaries of the eighth clause trusts did not receive any money or any additional rights or privileges in regard to the disputed bonds.
28. These bonds became due and payable in the aggregate principal amount of $7,050,000 on June 1, 1939. At that time, plaintiff did not have the funds with which to pay off the bonds, and did not know if it would have the money to pay the interest thereon.
29. On June 2, 1939, the eighth clause trustees and plaintiff entered into a written agreement which referred to a portion of the disputed bonds as “Income Bonds,” such portion being held by the trustees in the principal amount of $1,512,-500 under each of the four trusts (a total of $6,050,000). This agreement provided that a long as said Income Bonds remained unpaid, (a) interest should be payable thereon at the rate of 6 percent per annum (in lieu of the interest which would otherwise be payable by operation of law), (b) that each such payment of interest should be made only from plaintiff’s net income (before the deduction of said interest and any dividends on plaintiff’s stock) for each calendar year or shorter period, determined in accordance with usual accounting practice, and (c) that such interest should not be cumulative.
This agreement did not apply to the remaining bonds of an aggregate principal amount of $1,000,000; accordingly, interest on such remaining bonds became payable regardless of the amount of net income earned. Plaintiff has accrued and paid the interest on these bonds, regardless of income, for each year (or shorter period to which such accruals were applicable) from and after June 2,1939.
30. At the time the 1939 agreement was executed, the trustees and beneficiaries of the eighth clause trusts did not receive any additional money or any additional rights or privileges in regard to the disputed bonds.
31. During the period from 1935 to 1962, inclusive, plaintiff has accrued on its books and paid to the holders of the disputed bonds certain sums representing its computation of interest on sucb bonds at the rate of 6 percent per annum, as set forth in the following schedule:
Year of Accrual Income Other Total Bonds Bonds
1936 . $70,600 $70,500
1936 $423,000 . 423,000
1937
1938
1939 53,443 35,000 88,443
1940 . 60,000 60,000
1941 363,000 60,000 423,000
1942 363,000 60,000 423,000
1943 363,000 60,000 423,000
1944 363,000 60,000 423,000
1946 363,000 60,000 423,000
1946 363,000 60,000 423,000
1947 363,000 60,000 423,000
1948 363,000 60,000 423,000
1949 363,000 60,000 423,000
1960 363,000 60,000 423,000
1961 363,000 60,000 423,000
1962 363,000 60,000 423,000
1953 363,000 60,000 423,000
1964 363,000 60,000 423,000
1955 363,000 60,000 423,000
1956 363,000 60,000 423,000
1967 363,000 60,000 423,000
1968 . 60,000 60,000
1959 363,000 60,000 423,000
1960 . 60,000 60,000
1961 363,000 60,000 423,000
1962 363,000 60,000 423,000
Until the March 1, 1935, agreement, the disputed bonds provided unconditionally for interest. The $70,500 item in 1935 in the foregoing schedule represente interest on all of the bonds ($7,050,000) at 6 percent per annum for the period from January 1, through February 28, 1935. Since no net income was earned in 1935, and since the March 1, 1935 agreement eliminated interest on all of such bonds under such circumstances, no further interest was paid for 1935.
The $423,000 item in 1936 was interest paid on all of the bonds ($7,050,000) pursuant to the March 1,1935 agreement.
The $53,443 item in 1939 represents interest for the first 5 months of that year on all of the bonds. The $35,000 item in 1939 was interest for the last 7 months of that year on the $1,000,000 principal amount of bonds to which the June 2, 1939, agreement did not apply. During the last 7 months of 1939, no interest was payable or paid on the $6,050,000 principal amount of Income Bonds pursuant to the June 2,1939, agreement.
The items of $363,000 and $60,000 in the foregoing schedule for the years 1940 through 1962 represent respectively interest on the $6,050,000 of Income Bonds and $1,000,000 of other bonds.
32. During the period 1940 to 1962 inclusive, plaintiff has paid dividends on its preferred and common stock as follows:
6% Noncumulative Preferred Stock Common Stock Total Dividends Paid
1940-
1941. $181,500.00 $181 600.00
1942-181,600.00 181, 600.00
1943. 181,500.00 $100, 000.00 281, 600.00
1944-181,500.00 100, 000.00 281, 600.00
1945. 181,600.00 100, 000.00 281, 600.00
1940_. 181,600.00 2,000, 000.00 2,181, 500.00
1947-181,600.00 1,500, 000.00 1,681, 600.00
1948-181,500.00 1,300, 000.00 1,481, 500.00
1949. 181,600.00 1,200, 000.00 1,381, 600.00
1950. 181,500.00 1,200, 000.00 1,381, 600.00
1951-181,600.00 400, 000.00 581, 600.00
1952.. 181,500.00 450, 000.00 631, 600.00
1953. 181,500.00 300, 000.00 481, 600.00
1954-194,838.00 297, 600.00 492, 438.00
1956. 194,838.00 496, 000.00 690, 838.00
1956-, 194,838.00 297, 600.00 492, 438.00
1957-, 194,838.00 297, 600.00 492, 438.00
1958-
1969-48,709.60 148,800.00 197.609.50
1960-48,709.50 148,800.00 197,609.60
1961-194,838.00 347,200.00 642,038.00
1962-178,546.50 178.646.50
33. From June 16, 1934, to the present time, all shares of plaintiff’s common stock have been held by the eighth clause trustees for the beneficiaries in the same proportions as the $7,050,000 disputed bonds of plaintiff have been held 'by the same trustees for the same beneficiaries.
During this same period, all shares of plaintiff’s preferred stock have been held 'by the eighth clause trustees for the beneficiaries in the same proportion as said bonds, except that 250 shares of preferred stock, issued on June 24, 1930, have been held as follows: (1) From June 24, 1930, until December 12, 1950, the 250 shares were held by the seventh clause trustees. (2) On December 12, 1950, 10 of tlie 250 shares were transferred to Tarsco Corporation, a Rhode Island corporation; and these 10 shares are now held by plaintiff as treasury stock. (3) On January 10, 1951, the remaining 240 shares were transferred as follows: (a) 60 shares to the Estate of Hope Sayles; (b) 60 shares to the trustees of an inter vivos trust established March 10, 1941, by Mary A. S. Booker; (c) 60 shares to the trustees of an inter vivos trust established March 10, 1941, by Nancy S. Day; and (d) 20 shares to the trustees for each of the three children of Martha F. S. Nicholson under an inter vivos trust established by her on March 10, 1941. (4) On August 22,1957, the 60 shares then held 'by the Estate of Hope Sayles were transferred as follows: (a) 15 shares to the eighth clause trustees for each of the trusts for Mary A. S. Booker, Nancy S. Day, and Hope Sayles, respectively, and (b) 5 shares to said eighth clause trustees for each of the trusts for Paul C. Nicholson, Jr., Martha S. N. Livingston, and W. Sayles Nicholson, respectively.
34. The eighth clause trustees are not, and were not, textile men. They normally do not take, and have not taken, any part in the conduct of the business of Sayles Finishing Plants, Inc., and its subsidiaries, except to determine certain major policies to be followed. In regard to such major policies, the trustees from time to time have issued to plaintiff and its subsidiaries a “Statement of Policy.” Matters such as the employment and discharge of executives and important employees, as well as the question of their salaries and any increases or decreases thereof, are normally discussed with the trustees. The trustees decide all questions which are within the functions of stockholders and decide any other questions which the company management submits to them from time to time.
35. Plaintiff owned all the stock of American Bleached Goods Company, a Delaware corporation with offices in New York City, which was engaged in the converting business. In the textile industry, it was a converter’s function to buy unfinished goods (known as “grey goods”) from a cotton mill and send them to a finisher, such as Sayles, to be finished, i.e., to be dyed, bleached, or mercerized. The material processed by a finisher was thus supplied by a converter, who retained title to the goods. After finishing, the goods were sold by the converter to its own customers. Plaintiff finished grey goods for many converters, and American Bleached Goods supplied a substantial part of those grey goods.
36. From time to time in 1935 and 1936, plaintiff borrowed money from the trustees to enable the company to advance money to American Bleached Goods Company, Inc. These loans have been repaid to the trustees.
37. In the early 1950’s, plaintiff made substantial advances of money to American Bleached Goods, Inc., and for this purpose borrowed an amount of $2,400,000 from the Industrial Trust Company (one of the eighth clause trustees). This loan has been repaid.
38. The $7,050,000 principal amount of the disputed bonds became due and payable on June 1, 1939. No payment of principal was made at that time, and no such payment has yet been made. The trustees have not, at any time on or after June 1,1939, demanded payment of the principal amount of these bonds.
39. From 1939 until 1957, inclusive, plaintiff had on hand (1) cash and marketable securities and (2) miscellaneous investments primarily in the form of United States government securities, ‘as follows:
Year Ending December 31 Cash and Miscellaneous Marketable Investments Total Securities
1939. $518,184 $518,184
1940. 426,438 426,438
1941. 237,977 237,977
1942. 1,602,164 1,502,164
1943. 3,269,715 $770,503 4,040,218
1944. 2,609,396 1,270,503 3,879,899
1945. 2,855,665 3,035,000 5,890,655
1946. 2,542,546 3,585,000 6,127,646
1947. 1,990,139 4,051,564 6,041,703
1948. 1,654,059 3,485,000 5,139,059
1949. 1,019,554 3,050,000 4,069,564
1950. 1,235,074 1,500,000 2,735,074
1951. 1,834,406 1,500,000 3,334,406
1952. 1,629,454 800,000 2,429,454
1953. 1,550,467 2,604,000 4,154,467
1954. 1,381,089 3,402,032 4,783,121
1955. 2,072,741 3,202,176 5,274,917
1956. 3,250,335 2,904,000 6,154,336
1957. 892,416 6,500,000 7,392,416
40. Pursuant to extension of time granted, plaintiff filed its federal income tax return for the calendar year 1955 on June 15, 1956, and made payment of the tax thereby shown to be due in the amount of $651,282.70 to the District Director of Internal Revenue a't Providence, Rhode Island, in installments as required by law on or before that date. On or about August 20,1957, plaintiff paid an additional tax assessed for the year 1955 in the amount of $8,070.70.
41. Pursuant to extension of time duly granted, plaintiff filed consolidated federal income tax returns for itself and subsidiary companies for the years 1956 and 1957, and made payment of the amounts of tax thereby shown to be due to said District Director, as set forth below:
Year Date of flllng Amount of Tax
1956. September 13,1957. $17,885.40
1957. September 15, 1958. 2,323.00
42.In preparing its federal income tax returns and computing its net taxable income and the taxes thereon for the years 1955, 1956, and 1957, as indicated above, plaintiff claimed as a deduction in each return the amount of $423,000 as interest accrued and paid on the aforementioned issue of disputed bonds. Upon audit of plaintiff’s income tax returns for the years 1955,1956, and 1957, the Commissioner of Internal Revenue disallowed those deductions on the ground that those payments constituted distributions of profits as dividends and not payments of interest on indebtedness. By letters dated September 25,1959, the District Director, acting for the Commissioner, notified plaintiff of proposed tax deficiencies as follows:
For 1955_$219, 960. 00
For 1956_ 227, 536. 60
For 1957- 208, 692.00
Plaintiff has at no time agreed to the correctness of such tax deficiencies and has at no time executed or filed any assent or agreement thereto.
43. Tbe proposed tax deficiencies were assessed on November 12,1959, and that same day plaintiff paid the deficiencies and assessed interest as follows:
Year Tax Assessed Total Deficiency Interest
1955. $219,960.00 $48,303.82 $268,263.82
1956. 227,636.60 36,315.46 263,852.06
1957. 208,692.00 20,786.29 229,478.29
Totals. 656,188.60 105,405.67 761,694.17
No contention is made by defendant that the aforesaid payments by plaintiff were voluntary.
44. As the result of an audit of the federal income tax return of plaintiff and its subsidiary companies for the year 1958, the Commissioner of Internal Revenue determined that there was a net operating loss to be carried back and applied, as prescribed by statute and regulations, in redetermining the net taxable income and tax thereon of plaintiff for the year 1955 and of plaintiff and its subsidiaries for the year 1956. On April 28, 1961, as a result of that redetermination, the Commissioner, acting through the District Director, issued certain Notices of Adjustment on Form 1331-B to plaintiff for itself and its subsidiaries, setting forth in section I thereof (entitled “Computation of Overassessments”) adjustments as follows:
Overassessment OÍ Income Tax OI Interest Year
$705,834.02 $11,431.91 1955.
171,386.88 8,907.42 1966.
877,220.90 20,339.33 Totals..
With these notices, the District Director tendered to plaintiff, for itself and its subsidiaries, certain checks for the amounts set forth in. section II of said Form 1331-B (entitled “Disposition, of Overassessments and Overpayments”), described therein as follows:
Year Tax Interest Total
1955. $717,265.93 $85,454.61 $802,720. 54
1956..... 180,294.30 15,164.48 195,458.78
Totals.... 897,560.23 100,619.09 998,179.32
Plaintiff acknowledged receipt of those cheeks by letter, dated May 5,1961, which letter stated that plaintiff accepted the checks and the refunds of tas and interest thereon without prejudice to its right further to contest the determination of the amount of tax and the basis thereof for the year in question, and the findings of fact and Jaw upon which that determination had been based. In that letter, plaintiff reserved the right to recover, by suit or otherwise, any additional refunds to which it might be entitled.
45. On October 30, 1961, plaintiff filed with the District Director claims for refund of income taxes paid for the years 1955, 1956, and 1957, together with interest thereon. Those claims'recited that refunds for the years 1955 ‘and 1956 based upon net operating loss adjustments had been received by plaintiff, as indicated above, and that further refunds were due and owing plaintiff and its subsidiary companies in the following amounts:
1955_$36, 871. 91
1956_ 83, 557. 76
1957_ 229,478.29
Total_ 349,907.96
In each of these claims plaintiff requested a finding by the Commissioner of Internal Kevenue that such refunds and previous refunds were based upon the allowance of deductions for interest paid by the taxpayer and not upon the carryback of net operating losses from later years, except that the refund claim for 1957 made no reference to a carry-back of net operating losses.
46. Oil January 8,1962, tbe Commissioner, acting through the District Director, disallowed those claims for refund. Plaintiff’s petition in this suit was filed within two years from the disallowance of its claims for refund.
47. Plaintiff is and has been at all times the sole and absolute owner of this claim and has not assigned or transferred the claim or any interest therein. Except as set forth above, no other action has 'been had on the claim which is the subject of this suit, in Congress or by any government department or in any judicial proceeding, including any action in the Tax Court of the United States.
Ultimate FINDING of Fact
48. Plaintiff’s bonds do not actually represent valid debts of the corporation but represent in effect equity interests in plaintiff. The amounts accrued and paid to the trustees as holders of such bonds were not interest payments, but rather distributions of profits or dividends.
CONCLUSION OF Law
Upon the foregoing findings of fact and opinion, which are adopted by the court and made a part of the judgment herein, the court concludes as a matter of law that plaintiff is not entitled to recover, and the petition is dismissed.
Section 163 of the Internal Revenue Code of 1964, 68A Stat. 46, provides for deduction of all interest paid or accrued within the taxable year on indebtedness.
| CASELAW |
Blog Detail
13
Jan
Why Should You Choose Laravel for Your Next Web Project cover image
arrow_back Why Should You Choose Laravel for Your Next Web Project
If you’re in the process of rebuilding your website and are wondering what is the most suitable framework to use, then this is a brief guide on why should you choose Laravel for your next project.
Laravel is one of the top frameworks of PHP, developed by Taylor Otwell. This platform is amazing Because, it is not just being handled by one person, but, It is being managed by the whole laravel community. Laravel is not like those CMS, or ECommerce frameworks, which will satisfy your specific needs. But, It’s an all-rounder. If you can code, With the help of this framework, you can build a perfectly working CMS or ECommerce Web application. Around 752,061 active websites are developed utilizing Laravel worldwide and this number is continuously growing every day.
Laravel presents a massive range of functionalities that integrate the primal features of PHP frameworks like Yii, CodeIgniter, and other languages like Ruby on Rails. If you are addicted to the core and advanced PHP, Laravel will make your mission easier. It saves a lot of time if you are planning to build a website from scratch. Furthermore, a website developed in Laravel is secure and prevents considerable web attacks.
Benefits of Laravel Framework
You may be wondering why laravel is the best choice for your next web project. So here I’ve mentioned a concise list of the advantages of the Laravel framework.
Straightforward & Enhanced Performance
Laravel is one of the best web development frameworks that can make your web development work so much straightforward. Writing code from scratch takes a lot of time. So when using Laravel, developers can save a lot of time as they can reuse code written by great programmers.
Unlike many other frameworks out there, Laravel supports caching for your website out-of-the-box, which is great for boosting your site speed. Laravel also makes other speed optimization techniques to further enhance your website’s performance, such as memory use reduction and database indexing easy to implement. This makes Laravel an excellent choice for your business if site speed and better SEO are some of your requirements.
Open Source Framework
Though many PHP frameworks come with a price tag, Laravel is a free and open-source framework that will allow web developers to build large & complex web applications easily. All you need is a text editor & PHP installation to get started. Also, it has a powerful community that supports the framework to make it more advanced and flexible.
MVC Architecture for Great Support
Laravel comes with the model-view-controller (MVC) architectural pattern. It is easy to utilize and thus offers an extremely convenient way to build large or small business applications. When you have to work on a large project, you have to deal with a lot of unstructured code. Using MVC can simplify your coding structure and make it more comfortable for you to work with.
MVC support also makes it easier to find files in their logical directories when working on large projects. With it, you can control the process of how your application appears in the real world, so you can improve the app for branding purposes.
Blade Template Engine For Awesome Layouts
Laravel comes with the Blade templating engine. It’s a powerful, lightweight, and pre-installed template engine that helps web developers make the process of development smooth and straightforward with its exceptional layouts. The Blade template engine allows data display and extending layouts without affecting the application’s performance and speed. It helps you create innovative and amazing layouts using the feature of content seeding.
Best for Traffic Handling
As your business expands, so will the volume of traffic to your website. A website built in Laravel can manage website requests much faster than most other frameworks. Laravel utilizes a remarkable message queue system, which means you can put off certain website tasks such as sending emails until a later time. Being able to control time-consuming tasks means your website can process tasks quicker. And this not only upholds your website’s server healthy but can also lower your hosting costs in the long term.
High Security
Security is the primary consideration for most businesses. If you choose Laravel, your web application presents no risk of unintentional and hidden SQL injections. Laravel’s advanced security features are easy to configure on most websites to enhance security and protect sites from hackers and cybercriminals. If we see technically, Laravel utilizes a Bcrypt hashing algorithm which means it never stores any passwords in the database. Laravel also has great user authentication and restricted access features as compared to other php frameworks. That keeps you and your customer’s data safe and secure.
Furthermore, Laravel’s csrf protection prevents cross-site request forgery. Its syntax automatically escapes any HTML entities being passed through view parameters, which stops cross-site scripting.
Easy third-party integrations
The term third-party integration generally means adding external data that we require in our projects, by utilizing different APIs that are not part of our project. Almost every site requires to be integrated with a third-party application of some sort. This may include a payment system like Stripe or Paypal or a marketing tool that your company uses. Whatever the integration, Laravel makes third-party apps integration very easy with its clean APIs for integration. So whether your website needs a payment system in place or a computerized tool to control your marketing, Laravel is a strong candidate.
Easy Unit Testing Features
One of the foremost reasons to consider the laravel framework for your web app development is that it offers easy unit testing., Unit testing is a type of testing in which all the classes, models, and controllers of a web application is being checked so that no portion of the website remains unchecked. Such unit testing ensures there are no exceptions or bugs in web applications before it turns out to be live. This means you have a bug-free and high-performing application for the end-users. So, when it comes to testing your application, unit tests are better because they make it easy for developers to perform app testing.
Lower Cost
If we compare Laravel to other web frameworks, Laravel is open-source, which means that you can use it in any project without any cost. and you will have to pay only for hiring a good web developer to build your web application, not for the tool they’re using for development. Moreover, development costs are further decreased as the time to build and maintain is less than some other competing frameworks, permitting a Laravel project to be more cost-effective in the long run.
Closing Notes
Overall, Laravel is the best choice for both developers and companies worldwide. If you are a business and want to use Laravel for your next PHP-based website development or web application development for your bespoke requirements, you must discover an impeccable team with proficiency in the Laravel framework. So Codebrisk is here to help you with your tailored requirements regarding Laravel Development.
Have a great idea? Please feel free to send us an email at rizwan@codebrisk.com or get in touch with us, our business person will get back to you.
Published at : 13-01-2022
Author : Rizwan Aslam
AUTHOR
Rizwan Aslam
I am a highly results-driven professional with 12+ years of collective experience in the grounds of web application development especially in laravel, native android application development in java, and desktop application development in the dot net framework. Now managing a team of expert developers at Codebrisk.
Launch your project
Launch project | ESSENTIALAI-STEM |
Around 22 years before India got her freedom, few young boys in their early twenties challanged the mighty British empire and sacrificed their lives for the independence of India. The Kakori train robbery took place on 9 August 1925 during the Indian Independence movement against the British Raj.
The robbery was conceived by Ram Prasad Bismil and Ashfaqullah Khan and was executed by these two along with Rajendra Lahiri, Chandrashekhar Azad, Sachindra Bakshi, Keshab Chakravarty, Manmathnath Gupta, Mukundi Lal, Murari Lal Gupta and Banwari Lal.
On 9 August 1925, the Number 8 Down train travelling from Shahjahanpur to Lucknow. It is believed that they looted this train because it was supposedly carrying the money bags which allegedly belonged to the Indians and was being transferred to the British government treasury. They looted only those money bags ( ₹ 8000) from the guards’ cabin.
Ms. Smita Dhruv has weaved an engrossing fiction around this brave act of young sons of India who were totally committed to the freedom of their motherland. Though we know of only few leaders who fought for our beloved country’s freedom, there are many more Indians who had fought for India’s freedom but their names are no where to be seen. “Who are these hundered and thousands of people?” This thought used to disturb Smita a lot and became the basis of this amazing book. Freedom neither happened in a day nor was the result of efforts of few handful of leaders.
Smita created a fiction which is based on not so known incidence of “Kakori Conspiracy”. But it really shook the mighty British empire. This book shows the trying times which was faced by families when their young children revolted against their own parents to join independence struggle and how their families suffer emotionally and financially.
The story started in the backdrop of cancellation of Non-Cooperative movement by Gandhiji which has disillusioned the youth of country who had participated enthusiastically and made it a successfull movement. The main characters of the story are – Banvari and his brother Satish, close friend Mukund Pandey and Leena (sister of Banvari and Satish), who was married to Mukund in the later part of the story. Some representation is given to Britishers too, which shares the view point of Britishers. The story is in the form of narrations by each of the characters and strongly shares the emotions, anger and struggles of each one of them.
In our history books, we were taught about the sequence and the major event but what this book has brought is the humane side of common man who had contributed to India’s freedom struggle. This book has brought the common Indian to the centre stage. As one goes through the book, one feels to be part of the history. I felt as if I am walking along with the characters as they walk through their life. Many a times, I had goosebumps and tears while going through the struggles of their families who were suffereings but still supporting their children in their fight against British Empire. Leena, the only major woman character in the story represents the role of women in freedom struggle while maintaining their family responsibilities. Author is able to paint a very realistic picture by sharing the social ethics, frustrations, struggle and strong will of the committed Indians of those times. It is a successful attempt to revive the shining moments of the valours of brave Indian freedom fighters who were not given enough credit. The book has successfully portrayed the mental agony, dillemma, financial and survival issues of the freedom fighters and their families.
Smita has done lot of research and met with the families of many freedom fighters to listen to their memories and experiences. This is the reason, she has been able to bring authenticity to the story and transported readers back into those times.
This book is a must read book for our young generation to know the sacrifices of our people in getting freedom which they are enjoying now , the price being paid for it and value their struggle.
Highly recomended to read. You can buy this book from below links. | FINEWEB-EDU |
Robot couriers scoop up early-stage cash – TechCrunch
Much of the last couple of decades of innovation has centered around finding ways to get what we want without leaving the sofa. So far, online ordering and on-demand delivery have allowed us to largely accomplish this goal. Just point, click and wait. But there’s one catch: Delivery people. We can never all lie around ordering pizzas if someone still has to deliver them. Enter robots. In tech-futurist circles, it’s pretty commonplace to hear predictions about how some medley of autonomous vehicles and AI-enabled bots will take over doorstep deliveries in the coming years. They’ll bring us takeout, drop off our packages and displace lots of humans who currently make a living doing these things. If this vision does become reality, there’s a strong chance it’ll largely be due to a handful of early-stage startups currently working to roboticize last-mile delivery. Below, we take a look at who they are, what they’re doing, who’s backing them and where they’re setting up shop. Crunchbase data unearthed at least eight companies in the robot delivery space with headquarters or operations in North America that have secured seed or early-stage funding in the past couple of years. They range from heavily funded startups to lean seed-stage operations. Silicon Valley-based Nuro, an autonomous delivery startup founded by former engineers at Alphabet’s Waymo, is the most heavily funded, having raised $92 million to date. Others have raised a few million. In the chart below, we look at key players, ranked by funding to date, along with their locations and key investors. While startups may be paving the way for robot delivery, they’re not doing so alone. One of the ways larger enterprises are keeping a toehold in the space is through backing and partnering with early-stage startups. They’re joining a long list of prominent seed and venture investors also eagerly eyeing the sector. The list of larger corporate investors includes Germany’s Daimler, the lead investor in Starship Technologies. China’s Tencent, meanwhile, is backing San Francisco-based Marble, while Toyota AI Ventures has invested in Boxbot. As for partnering, takeout food delivery services seem to be the most active users of robot couriers. Starship, whose bot has been described as a slow-moving, medium-sized cooler on six wheels, is making particularly strong inroads in takeout. The San Francisco- and Estonia-based company, launched by Skype founders Janus Friis and Ahti Heinla, is teaming up with DoorDash and Postmates in parts of California and Washington, DC. It’s also working with the Domino’s pizza chain in Germany and the Netherlands. Robby Technologies, another maker of cute, six-wheeled bots, has also been partnering with Postmates in parts of Los Angeles. And Marble, which is branding its boxy bots as “your friendly neighborhood robot,” teamed up last year for a trial with Yelp in San Francisco. While their visions of world domination are necessarily global, the robot delivery talent pool remains rather local. Six of the eight seed- and early-stage startups tracked by Crunchbase are based in the San Francisco Bay Area, and the remaining two have some operations in the region. Why is this? Partly, there’s a concentration of talent in the area, with key engineering staff coming from larger local companies like Uber, Tesla and Waymo . Plus, of course, there’s a ready supply of investor capital, which bot startups presumably will need as they scale. Silicon Valley and San Francisco, known for scarce and astronomically expensive housing, are also geographies in which employers struggle to find people to deliver stuff at prevailing wages to the hordes of tech workers toiling at projects like designing robots to replace them. That said, the region isn’t entirely friendly territory for slow-moving sidewalk robots. In San Francisco, already home to absurdly steep streets and sidewalks crowded with humans and discarded scooters, city legislators voted to ban delivery robots from most places and severely restrict them in areas where permitted. But while San Francisco may be wary of a delivery robot invasion, other geographies, including nearby Berkeley, Calif., where startup Kiwi Campus operates, have been more welcoming. In the process, they’re creating an interesting new set of robot overseer jobs that could shed some light on the future of last-mile delivery employment. For some startups in early trial mode, robot wrangling jobs involve shadowing bots and making sure they carry out their assigned duties without travails. Remote robot management is also a thing and will likely see the sharpest growth. Starship, for instance, relies on operators in Estonia to track and manage bots as they make their deliveries in faraway countries. For now, it’s too early to tell whether monitoring and controlling hordes of delivery bots will provide better pay and working conditions than old-fashioned human delivery jobs. At least, however, much of it could theoretically be done while lying on the sofa. | NEWS-MULTISOURCE |
Sfincia di San Giuseppe
The sfincia di San Giuseppe (also called sfincia or spincia ri San Giuseppi in Sicilian) is a typical Sicilian pastry dessert, traditionally prepared for the day of Saint Joseph (19 March). It is recognised as prodotto agroalimentare tradizionale (PAT) by the Italian Ministry of Agricultural, Food and Forestry Policies.
It is a fried soft pastry covered and filled with sweet ricotta and candied fruit (usually a cherry and orange).
Etymology
The Sicilian term spincia can derive from the Latin spongia and the Arabic ﺍﺴﻔﻨﺞ, isfanǧ, both literally meaning 'sponge' for the peculiar consistency and form of this fried pastry, and both are possible considering the Arabic influences on Sicilian, even though it is a Romance language (so coming mainly from Latin). In Italian the singular is sfincia and the plural sfincie, and in Sicilian the singular is sfincia (or spincia) and the plural sfinci.
History
Sfinci were created in the current version by the Nuns of Saint Francis' Stigmata in the Sicilian city of Palermo, adapting a traditional dish of Persian and Arabic cuisine. They dedicated sfinci to Saint Joseph for the simplicity of their ingredients, and it was enriched with ricotta and candied fruit from the bakers of the city.
In 1784, sfinci were object of a political fight between tavern and pâtisserie owners of Palermo, with the second ones failing to keep a monopoly on the production of these desserts.
Sfinci are currently common to be found in bakeries and patisseries, especially in western Sicily. | WIKI |
Amyloid-β Related Memory Decline is not Associated with Subjective or Informant Rated Cognitive Impairment in Healthy Adults.
Journal of Alzheimer's disease: JAD (Impact Factor: 4.15). 08/2014; 43(2). DOI: 10.3233/JAD-140678
Source: PubMed
ABSTRACT
Background: The detection of early Alzheimer's disease (AD) can rely on subjective and informant reports of cognitive impairment. However, relationships between subjective cognitive impairment, objectively measured cognitive function, and amyloid-β (Aβ) biomarkers remain unclear. Objective: To determine the extent to which impairment or decline in subjective and informant rated cognitive impairment was associated with memory in healthy older adults with high Aβ. Methods: Healthy older adults (n = 289) enrolled in the Australian Imaging, Biomarkers and Lifestyle (AIBL) study were studied at baseline. Pittsburgh Compound B was used to determine Aβ status at baseline. At baseline and 18 months assessments, subjective memory impairment was assessed using the Memory Complaint Questionnaire and the Short Form of the Informant Questionnaire on Cognitive Decline in the Elderly. Cognition was measured using the Cogstate Brief Battery. Results: At baseline, there were no differences between low and high Aβ groups in subjective or informant-rated cognitive impairment, depressive and anxiety symptoms, or cognitive function. Longitudinal analyses showed moderate decline in learning and working memory over the 18 months in the high Aβ group. However there was no change over time in subjective or informant-rated cognitive impairment, depressive and anxiety symptoms, or cognition in either Aβ group. Conclusions: Although healthy older adults with high Aβ levels show decline in learning and working memory over 18 months, subjective or informant ratings of cognitive impairment do not change over the same period suggesting subjective cognitive impairment may have limited utility for the very early identification of AD.
Download full-text
Full-text
Available from: Yen Ying Lim, Sep 25, 2014
• Source
• "A multiple regression analysis showed that depressive symptoms were more related to SMI than anxiety ( = 0.41 and = 0.16, respectively). This finding is consistent with previous cross-sectional studies postulating that SMI are more strongly associated with severity of depressive and anxiety symptomatology than performance on neuropsychological tests [3] [4] [5] [6] [7], even when using a test sensitive to preclinical AD such as the FNAME [23]. The lack of relationship between subjective and objective memory impairment does not rule out that patients with SMI have an increased risk of developing cognitive impairment and dementia than subjects without SMI [2, 16–18]. "
[Show abstract] [Hide abstract]
ABSTRACT: Background: Subjective memory impairment (SMI) refers to subjective awareness of initial memory decline undetectable with existing standardized cognitive tests. The Face Name Associative Memory Exam (FNAME) was created to detect memory deficits in individuals with preclinical Alzheimer's disease (AD). We reported normative data of a Spanish version of FNAME (S-FNAME) in cognitively normal (CN) Spanish-speaking subjects >49. Objective: To determine whether higher SMI [a modification of Memory Failures Everyday (MFE-30)] was related to worse memory performance (S-FNAME) or associated with greater affective symptoms in subjects >49; and whether MFE-30 and FNAME were able to discriminate between CN and mild cognitive impairment (MCI) subjects. Methods: 317 subjects (CN = 196, MCI = 121) were included in the analysis because they attended the annual "Open House Initiative" at Memory Clinic Fundació ACE, were >49 years, literate, received S-FNAME, MFE-30, and Hospital Anxiety and Depression Scale, had Mini-Mental State Exam scores ≥27, and returned to complete a comprehensive diagnostic assessment. Results: MFE-30 scores were associated with affective symptoms but not with S-FNAME performance. S-FNAME scores were related to performance on memory variables of NBACE (neuropsychological battery used in Fundació ACE). Although the MCI group showed significantly higher MFE-30 and worse S-FNAME scores than the CN group, their discriminability values were similar (Sensitivity: 49.6 versus 52.9; Specificity: 85.1 versus 83.6, respectively). Conclusions: SMI was more related to depressive symptoms than to S-FNAME memory performance; and S-FNAME scores were related to other episodic memory test performances, but neither to affective symptoms nor to SMI. MFE-30 and S-FNAME are not optimal for discriminating between CN and MCI groups. Longitudinal follow-up will determine if lower S-FNAME and higher SMI are related to increased risk of AD.
Journal of Alzheimer's disease: JAD 10/2015; 48(4). DOI:10.3233/JAD-150594 · 4.15 Impact Factor
• Source
[Show abstract] [Hide abstract]
ABSTRACT: Objective: We examined the diagnostic value of subjective memory complaints (SMCs) assessed with a single item in a large cross-sectional cohort consisting of families with autosomal dominant Alzheimer's disease (ADAD) participating in the Dominantly Inherited Alzheimer Network (DIAN). Methods: The baseline sample of 183 mutation carriers (MCs) and 117 noncarriers (NCs) was divided according to Clinical Dementia Rating (CDR) scale into preclinical (CDR 0; MCs: n = 107; NCs: n = 109), early symptomatic (CDR 0.5; MCs: n = 48; NCs: n = 8), and dementia stage (CDR ≥ 1; MCs: n = 28; NCs: n = 0). These groups were subdivided by the presence or absence of SMCs. Results: At CDR 0, SMCs were present in 12.1% of MCs and 9.2% of NCs (P = 0.6). At CDR 0.5, SMCs were present in 66.7% of MCs and 62.5% of NCs (P = 1.0). At CDR ≥ 1, SMCs were present in 96.4% of MCs. SMCs in MCs were significantly associated with CDR, logical memory scores, Geriatric Depression Scale, education, and estimated years to onset. Conclusions: The present study shows that SMCs assessed by a single-item scale have no diagnostic value to identify preclinical ADAD in asymptomatic individuals. These results demonstrate the need of further improvement of SMC measures that should be examined in large clinical trials.
BioMed Research International 04/2015; 2015. DOI:10.1155/2015/828120 · 2.71 Impact Factor
• [Show abstract] [Hide abstract]
ABSTRACT: Subjective cognitive impairment (SCI) refers to concerns regarding one's cognitive functioning in the absence of objective evidence of impairment, and may represent an early stage of Alzheimer's disease. However, as not all individuals with SCI cognitively decline, there is growing interest in the early identification of those individuals with SCI who are most at risk of developing Alzheimer's disease. One promising method of early identification involves the use of biomarkers that are known to be associated with the pathophysiology of the disease; in particular, markers of amyloid and tau accumulation. While there has been substantial research on amyloid and tau biomarkers in the context of mild cognitive impairment (MCI), only recently has attention shifted to SCI, which may represent an even earlier stage in the disease course. The purpose of this paper is to qualitatively review the literature on amyloid and tau biomarkers in SCI. A brief discussion of non-amyloid/tau biomarkers is also included. Not surprisingly, we found that amyloid and tau biomarker profiles become increasingly abnormal from SCI, to MCI, to Alzheimer's disease. Additionally, although amyloid and tau biomarkers appear to be unable to differentiate between SCI and healthy controls, there is some evidence to suggest that they may be able to differentiate between those individuals with SCI who cognitively decline over time and those who do not. While this finding has potential clinical implications, achieving optimal predictive value will likely require further research into the use of numerous biomarkers in combination.
Journal of Alzheimer's disease: JAD 07/2015; 47(1):1-8. DOI:10.3233/JAD-150180 · 4.15 Impact Factor
Show more | ESSENTIALAI-STEM |
How to install a .hex firmware?
• Creality does offer its firmware on creality3d.cn as .hex files. These are pretty good as backups as one can't alter and destroy them by accident.
But... How do you install them?!
This is about installing firmware directly and without another microcontroller. To use another mictrocontroller is How to install new firmware via a Microcontroller?
• Trish
Trish Correct answer
4 years ago
Creality also does provide an installation PDF. The process they propose is twofold and might need different settings on other machines1. Spots where I assume you might need to adjust are noted withA. Note that this solution depends on CURA.
1. Install the printer as a periphery machine.
This part is specific for Windows. If you use Linux or a MAC, you will need to use a different setup, but you might get the same results.
1. Turn on the power on the printer and connect it from the MircoUSB to a USB of the computer. This should automatically install the driver. If not, the Driver is on the SD card provided with the Printer2.
• To manually install windows Key + "MANAGER" and choose Device manager. Find the serial port that shows yellow, Right-click, choose Update driver software > Browse my computer for driver software. Now Browse, find the location of USB driver on the SD card and click Next.
• Generally,the serial port(COM) you need update has the biggest number, but can change.
• A good idea is to confirm the correct port with a software like Repetier Host, with which you can control the printer directly - if it works, you got the drivers and the port correct. Also, you know the correct Baudrate.
2. After the driver installation, launch CURA to do some settings. In File > Preferences:
• Print Window is "Pronterface UI"A
3. Switch to Machine > Machine Settings:
• Serial Port: choose the one that just was updated
• Baudrate: 115200A
2. Upload the .hex file via cura
1. Machine > Install custom Firmware
2. Make sure the printer is connected, then OK
3. find the .hex file on your PC, then confirm.
4. Wait for the process to finish.
1 - most likely, you will have to change the baudrate
2 - This might not be true for all manufacturers, but is for creality. Other manufacturers might have different sources for these.
A - Adjust as needed!
License under CC-BY-SA with attribution
Content dated before 7/24/2021 11:53 AM
Tags used | ESSENTIALAI-STEM |
Nicene and Post-Nicene Fathers: Series I/Volume V/On Nature and Grace/Chapter 61
Chapter 61 [LIII.]—Paul Asserts that the Flesh is Contrary Even in the Baptized.
Now let us see whether we anywhere read about the flesh being contrary in the baptized also. And here, I ask, to whom did the apostle say, “The flesh lusteth against the Spirit, and the Spirit against the flesh: and these are contrary the one to the other; so that ye do not the things that ye would?” He wrote this, I apprehend, to the Galatians, to whom he also says, “He therefore that ministereth to you the Spirit, and worketh miracles among you, doeth he it by the works of the law or by the hearing of faith?” It appears, therefore, that it is to Christians that he speaks, to whom, too, God had given His Spirit: therefore, too, to the baptized. Observe, therefore, that even in baptized persons the flesh is found to be contrary; so that they have not that capacity which, our author says, is inseparably implanted in nature. Where then is the ground for his assertion, “How can it be that in the case of a baptized person the flesh is contrary to him?” in whatever sense he understands the flesh? Because in very deed it is not its nature that is good, but it is the carnal defects of the flesh which are expressly named in the passage before us. Yet observe, even in the baptized, how contrary is the flesh. And in what way contrary? So that, “They do not the things which they would.” Take notice that the will is present in a man; but where is that “capacity of nature?” Let us confess that grace is necessary to us; let us cry out, “O wretched man that I am! who shall deliver me from the body of this death?” And let our answer be, “The grace of God, through Jesus Christ our Lord!” | WIKI |
Short: Displays picture during startup Author: Mario Speranda Uploader: Mario Speranda Type: util/boot Requires: AGA chipset, 15kHz monitor Architecture: m68k-amigaos This is one of those programes that you put at the begining of your startup-sequence and it displays a picture, so you wouldn't have to stare at a blank screen all the way trough the procedure. The picture itself is hardcoded into the programe so it would be faster than other bootpic programe which uses seperate ILBM files. Naturaly, the side effect is that you can not change the picture (well, not easily) when/if you become bored with it. Segel Georges, the author of the pic has graciously agreed to let me use it here (Segel@club-internet.fr). This is the best Intel Outside logo I ever saw. Thanks. To use simply copy the exe file somewhere, for example the C: directory. Now, edit your S:startup-sequence and insert the following line somewhere towards the top of the sequence, preferably the first line: run >NIL: C:BootPicProg Easy, isn't it ? This programe is absolutely free and is not crippled in any way. However, if you do feel a strong urge to send me a small reward or something, this is where it should go: ----------------------- Mario Speranda Tijardoviceva 8 58000 Split Croatia ----------------------- Enjoy the view. | ESSENTIALAI-STEM |
User:Russianspy3
Hello,
In regard to your comments on data fusion vs data integration, I believe that your assertion - while probably the case in many situations - is not universally correct.
In the area of geospatial sciences there is often a desire to combine many different types of data (vector, raster) from different sources (for example: bathymetry/topology, meteorological, habitat, etc) into a single data set which includes all of the points of all of the sets with attributes of various data sets assigned or calculated for locations where data might not exist.
As a concrete example, consider the following: A marine researcher attaches tracking devices to whales so that he can view their migration, dive, mating and feeding behavior. After collecting the data, he desires to combine his collected data with bathymetric data (which might have a totally different mesh), habitat information (which again might have a different mesh), and sonar data revealing krill density in the area of divers (again with a different mesh). Since none of these data is likely to have the same sampling rates or sampling locations, the only logical path is to include all of the points from all of the different data sets as part of the result of the fusion operation. Then appropriate interpolation, attribute assignment, etc can take place at each of the defined points in the fused data set.
In this scenario, the fused data set is not a reduced data set at all and it is not a replacement data set either. The new set is a superset of the points in the input data sets with attributes shared among the entire superset of points.
I would like to explain this in the Wiki entry for data fusion if you do not have any objections.
Please let me know think.
Bradjuhasz (talk) 21:52, 17 December 2008 (UTC)Brad | WIKI |
Optical control of photogenerated ion pair lifetimes: An approach to a molecular switch
Martin P. Debreczeny, Walter A. Svec, Michael R. Wasielewski*
*Corresponding author for this work
Research output: Contribution to journalArticlepeer-review
166 Scopus citations
Abstract
A prototype molecular switch is demonstrated that works on the principle that the local electric field produced by one photogenerated ion pair (D1- A1) can influence the rate constants for photoinduced electron transfer and recombination in a second donor-acceptor pair (A2-D2). Two ultrafast laser pulses were used to control the rate of a photoinduced electron transfer reaction within a molecule that consists of two covalently linked electron donor-acceptor pairs fixed in a linear structure, D1-A1-A2-D2. This type of molecular architecture may lead to the development of electronic devices that function on the molecular length scale.
Original languageEnglish (US)
Pages (from-to)584-587
Number of pages4
JournalScience
Volume274
Issue number5287
DOIs
StatePublished - 1996
ASJC Scopus subject areas
• General
Fingerprint
Dive into the research topics of 'Optical control of photogenerated ion pair lifetimes: An approach to a molecular switch'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Marcin Ciesielski
The result was delete. RL0919 (talk) 04:14, 17 December 2019 (UTC)
Marcin Ciesielski
* – ( View AfD View log Stats )
Stub for sportsperson with only one reference to a stats page. No updates since creation in 2006. WP:BEFORE search discloses no significant coverage in reliable sources. The teams listed on the stat pare are not in the list of fully professional leagues for Poland so fails WP:NFOOTBALL as well as WP:GNG. Eggishorn (talk) (contrib) 04:03, 10 December 2019 (UTC)
* Note: This discussion has been included in the list of Sportspeople-related deletion discussions. Eggishorn (talk) (contrib) 04:03, 10 December 2019 (UTC)
* Note: This discussion has been included in the list of Football-related deletion discussions. Eggishorn (talk) (contrib) 04:03, 10 December 2019 (UTC)
* Note: This discussion has been included in the list of Poland-related deletion discussions. Eggishorn (talk) (contrib) 04:03, 10 December 2019 (UTC)
* Note: This discussion has been included in WikiProject Football's list of association football-related deletions. GiantSnowman 09:25, 10 December 2019 (UTC)
* Delete - no evidence he has ever played in a WP:FPL (meaning he fails NFOOTBALL), but more importantly there is no significant coverage, so fails GNG. GiantSnowman 09:26, 10 December 2019 (UTC)
* Delete -- Per Nomination DaviesBridge Chat 21:40, 10 December 2019 (UTC)
* Delete. Sourced from statistical data only so nowhere near GNG standard and fails SNG too. No Great Shaker (talk) 16:11, 11 December 2019 (UTC)
* Delete. Fails WP:NBIO. --Piotr Konieczny aka Prokonsul Piotrus| reply here 03:36, 12 December 2019 (UTC)
* Delete - Article about non-notable, semi-pro footballer which fails WP:GNG. Jogurney (talk) 17:38, 12 December 2019 (UTC)
* Delete, I can't find sources on him. Did find accountant. MozeTak (talk) 05:54, 13 December 2019 (UTC)
| WIKI |
SPS Commerce Acquires InterTrade For Approx. $49 Mln - Quick Facts
(RTTNews) - SPS Commerce, Inc. (SPSC) announced the acquisition of InterTrade Systems Inc., a subsidiary of mdf commerce inc., and a provider of technical solutions for product, information and transaction data exchange between retailers and suppliers.
"With the acquisition of InterTrade, SPS Commerce expands its network to thousands of businesses across North America, including marquee retailers and brands in apparel and general merchandise," said Archie Black, CEO of SPS Commerce.
For the fourth quarter of 2022, SPS Commerce expects the acquisition will add approximately $1.7 million of revenue and expects adjusted EBITDA to be negatively impacted by approximately $200 thousand.
For fiscal 2023, the company expects the acquisition will add approximately $8.5 million in revenue and approximately $500 thousand to adjusted EBITDA.
The company estimates the acquisition to contribute approximately $2.5 million in adjusted EBITDA in fiscal 2024.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
GSM Controlled Robot using Microcontroller
GSM controlled robot or SMS controlled robot is a wireless robot which performs the necessary actions by receiving a set of instructions in the form a Short Message Service (SMS). In this project we can control the robot directions like forward, backward, left and right by sending SMS from the mobile. Earlier, we have already seen the working of a DTMF Controlled Robot without using Microcontroller.
This project mainly consists of 2 sections, one is mobile unit and the other one is robot unit. The GSM modem which is fixed at the robot receives the messages sent by the mobile and gives the instructions to the microcontroller to control the robot directions. In this project, we interface 8051 microcontroller with GSM SIM 300. The protocol used for the communication between controller and GSM modem is UART (Universal Asynchronous Receiver-Transmitter). This system continuously checks for message to take the decision for controlling the robot.
Circuit Principle:
When we send the message from the mobile to the modem, GSM modem sends the below command serially to indicate that new message is received.
+CMTI: “SM”,3
In the above command number 3 indicates the location of the new message. Now we need to read this unread message to display it on LCD. The command to read the message from GSM modem is
at+cmgr=3
Here the number 3 indicates the location of the message to be read. After sending this command to GSM module, modem sends the below command serially.
+CMGR: “REC UNREAD”,”MD-WAYSMS”,,”13/05/20,15:31:48+34″
forward
In the above command “REC UNREAD” indicates that message is unread message, “MD-WAYSMS” indicates sender mobile number or name, 13/05/20 indicates the date, 15:31 indicates time and forward is the content of the message.
From the above command, we need to extract message (forward) sent by the user. Now compare this message with predefined strings (forward, backward, left, right), based on result control the robot.
Block Diagram:
GSM Controlled Robot Block Diagram
GSM Controlled Robot – Block Diagram
Circuit Diagram:
GSM Controlled Robot Circuit Diagram using 8051 Microcontroller
GSM Controlled Robot Circuit Diagram
Hardware Requirements:
• 8051 Microcontroller
• AT89C51 Programming board
• Programming cable
• 16*2 LCD
• MAX 232 level converter
• GSM sim 300 module
• L293D motor driver
• Robot
• 9V DC batteries – 2
• 5V power supply circuit
• 0.1uF ceramic capacitors – 4
• 33pF capacitors – 2
• 10uF electrolytic capacitor
• 12MHz crystal
• 10k (1/4 watt) resistor
• Single pin connecting wires
Software Requirements:
• Kiel U vision
• Flash magic
• Proteus
Circuit Simulation Video:
Circuit Design:
The major components used in the above circuit are microcontroller, motor driver, level converter, GSM module and robot. Here at89c51 microcontroller is used and it requires a power supply of positive 5V DC. In order to provide regulated 5V DC voltage to the controller, use 7805 power supply circuit. Here two 9V batteries are used, one is for giving the supply to the circuit and other is to run the DC motors.
In the above circuit, 16 x 2 LCD is connected to the PORT1 of the microcontroller in 4 bit mode. LCD data lines D4, D5, D6 and D7 are connected to P1.4, P1.5, P1.6 and P1.7 respectively and control pins are connected to P1.0, P1.1 and P1.2. Here it used to indicate the received message.
GSM modem Tx and Rx pins are connected to the 13 and 14 pins of max232. Microcontroller TXD and RXD pins are connected to the 11 and 12 pins of level converter. Here max232 is a mediator between controller and GSM module and it is used to convert the voltage levels. To know more details about max232 refer Max232 Datasheet.
GSM module requires 5V power supply. In order to communicate with this GSM we need to send AT commands using serial communication (UART protocol). Use a baud rate of 9600 to communicate with GSM.
P2.0, P2.1, P2.2 and P2.3 pins of controller are connected to the l293d input pins and these pins are used to control the two DC motors. The operating voltage of this IC is 5V. Using this IC we can operate the 2 DC motors with a voltage ranging from 4.5 to 36V. We need to apply the motors supply at 8th pin of l293d. To know more about motor driver IC refer L293D Datasheet.
Circuit Working Algorithm:
1. Initialize the LCD and UART protocol
2. Continuously check for the command +CMTI: “SM”,3 (Location number) to know weather new message is received or not
3. If you receive the command then store message location number.
4. Now read that particular message and extract the body of the message
5. Display the extracted content on LCD and compare this content with predefined strings.
6. If matched then perform the necessary action on robot.
Use below code to read a new message from the GSM modem.
while (rx_data() ! = 0x0d);
while (rx_data() ! = 0x0a);
if (rx_data() == ‘+’)
{
if (rx_data() == ‘C’)
{
if (rx_data() == ‘M’)
{
if (rx_data() == ‘T’)
{
if (rx_data()==’I’)
{
while (rx_data() != ‘,’);
a = rx_data ();
delay_ms (10);
tx_string (“at”);
tx_data (0x0d);
tx_data (0x0a);
tx_string (“at + cmgf =1”);
tx_data (0x0d);
tx_data (0x0a);
tx_string (“at + cmgr =”);
tx_data (a);
tx_data (0x0d);
tx_data (0x0a);
while (rx_data() ! = 0x0a);
while (rx_data() != 0x0a);
while (rx_data() ! = 0x0a);
for (i=0; i<15; i++)
{
read [i]= rx_data();
}
lcd_stringxy(1,0,read);
delay_ms (5000);
}
}
}
}
}
How to Operate?
1. Write the program to the GSM controlled robot project using keil software
2. Now burn the program to the microcontroller with the help of flash magic.
3. Give the connections as per the circuit diagram.
4. Use power supply circuit to provide 5V DC to the microcontroller
5. Insert the SIM (Subscriber Identity Module) to the GSM module.
6. Now switch on the supply
7. Send SMS to the GSM module using other mobile
8. Now you can see the same message on LCD.
9. If the received message match with any predefined string then robot moves accordingly.
Try this: [Remote Operated Spy Robot]
Circuit Applications:
• This project is used in robotic applications
• Used in military applications.
Limitations of the Circuit:
• Robot section must have the network to receive the commands wirelessly.
• As there is no password any one can operate the robot by sending message.
Download Project Code
Note:
If you are interested to get code, kindly take some time and answer following questions in the comment section, so that we will send you the code.
• Why you need this project code?
• Are you trying to make the same project or different one?
• Give us more details about your project.
40 Responses
1. You can follow this post, we provided complete information along with video and circuit diagram.
Thank you.
1. Sir, I am trying to modify this robot by replacing motors by relays with same circuit so that we can remotely control water pumps which is very useful to the farmers as well and even any appliances can be controlled easily so I kindly request you to post your code to my above email id I will be thankfull if u do so thank u
2. Hey, can I have the code for the program. I am trying to build a similar robot with a few more changes. What I am building is a robot, which will receive SMS from the customer that he wants garbage to be picked up from the house, and the robot being LFR, will reach the house to collect the garbage, and the procedure will continue.
Please provide me the code for the above project so that I can complete my work. It is kind of urgent, and if you want I can post the complete details of the project, once it is completed.
3. I wants to implement the same ckt on 8085 microprocessor is it possible for me to do it in the above stated way . please reply asap
4. Hi, i am executing this project along with the code provided but there is no responce from microcontroller(AT89S52) after sending message to the gsm modem (sim 900a)
1. Yes sir i am executing this project in used microcontroller At89s51 And Gsm sim900a but there is no responce
5. hi.. I am working on the project which uses a gsm module to controol a dc motor by sending an sms to a microcontroller. when microcontroller receives an sms it moves the dc motor to open the door. therefore i am interested in your project. here is my email address for source code.. lelokojmothebe@gmail.com.. thank you
6. we are trying to implement this project as it seems very interesting. It would also help us to understand 8051 interfacing in a better way. thank u!
7. Dear Electronicshub team,
I want to replace L293D with ULN2003 and relays with same circuit so that I can remotely control AC appliances through SMS. Please send me the source code for this.
8. hi administrator can i have the code because i’m doing the same project as u did for my semester embedded subject and i already did all the hardware connections but the code doesn’t work properly….so can u send it
9. Very good explanation. Would like to see the code for GSM receive as I’m experiencing issues detecting live sms in my project. Thank you.
10. sir,
i want to do this as my final year project please help me for software and coding used for this project.
11. hi….. i need this as my final year project. I want the same project. My project is gsm based project using microcontroller .
12. I want to make this project as my mini project and wanted to learn many things about project making.please help me for this………
13. Hey. I am working on a similar project wherein I will be using a DTMF decoder to send messages to microcontroller. Could you please help me by providing me the code for the circuit? Will be glad to receive support from you.
Thanks.
14. hi, i want to make this project as a part of my studies .please send me code, as early as possible because we have to submit the project before the time limit
15. Hello,
I am making a GSM controlled robot for my post graduation project.
It has a gsm module. Please send me the project code if possible.
Thankyou.
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
General Mariano Vallejo was 79 years old when he was asked to talk to at the first celebration of Arbor Day in California, held Nov. 27, 1886. The site chosen was high on a hill on Goat Island (Yerba Buena Island) and Vallejo couldn’t climb up on foot. He had to wait for a horse to carry him.
Vallejo felt greatly honored to have been asked to make a speech that day, but since he was delayed he turned over his written words to Fred Campbell, superintendent of Oakland public schools, who read to them to the 2,000 men, women and children gathered there.
The San Francisco Call published the speech in its Nov. 28, 1886 issue.
“Ladies and Gentlemen and Scholars: This occasion brings us back to the year 1806, when a cadet from Texas was sent from Monterey with a force of soldiers to receive some horses which had been stolen from the Mission Dolores by a tribe of Indians, a very numerous band of the name of Tuchayunes, whose headquarters were on the mainland of Tucheyune,” the talk began.
Vallejo recalled that the tribe had a fishing station on Goat Island and a “large Turkish bath, named by them Temescal, considered both a luxury and a sovereign remedy for all ailments. At this period the island bore the name of Yerba Buena, and on the founding of San Francisco in 1835, it gave its name to the municipality.”
Vallejo said that the reason Yerba Buena became Goat Island was because Nathaniel Spear, an early San Francisco pioneer, had brought some goats from Hawaii to California. He had given a pair to his neighbor John Fuller, who had a beautiful garden of flowers and vegetables. To Fuller’s dismay, the two goats apparently enjoyed that garden very much. So he exercised his claim to Yerba Buena Island and brought the pair there.
“They increased rapidly; hence the name of Goat Island, which it now bears. In 1849 there were nearly 1,000 goats here, but they were soon destroyed by the hosts of immigrants,” Vallejo continued referring to the influx of population during the Gold Rush.
Vallejo then supported the need for an Arbor Day and gave his hopes for the island’s future.
“My hope is that the plantation we inaugurate today may result in a garden of the herb of which we heard in my theology in boyhood’s days. It is pleasant to be here today surrounded by so many happy children, and I am glad to have the honor of being here on this occasion with Donna Chonita Fuller de Ramirez, the daughter of the original owner of this island. My words fail to express my delight with the contrast between this island today and what it was in the older days in the possession of the Tuchayunes. Surely, the wand of the higher civilization has passed over us, for all of which I have thanks.”
The name Goat Island did not actually become official until 1895 when it was recognized by the United States Board of Geographic Names. It was changed back to Yerba Buena in 1931.
Days Gone By appears on Sundays. Contact Nilda Rego at firstname.lastname@example.org. | FINEWEB-EDU |
caça
Etymology 1
.
Noun
* 1) hunting
* 2) hunt
* 3) game
Noun
* 1) fighter the aircraft
Noun
* 1) hunting
Etymology 1
, from, from , from , from.
Noun
* 1) hunting chasing animals for game or food
* 2) hunt a hunting expedition
* 3) game animals hunted for food
Noun
* 1) fighter military aircraft designed to attack other aircraft | WIKI |
Talk:Carqueiranne
Untitled
No Sir ! The body washed up following Operation Dragoon was not wearing "French colours". The death certificate of the day just said "uniform pieces" and "possibly" ( see article in French L´Express mag refering to the case ). Nothing indicates, this casualty was an aviator or in particular St. Exupéry ! H.L. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:24, 30 November 2011 (UTC) | WIKI |
User:JMRyan/New Page
{{delete|useless redirect--this is in my own user space.
* 1) REDIRECT User:JMRyan/New Page1 | WIKI |
Sugar Withdrawal Symptoms + How to Reduce Sugar Cravings
Sugar withdrawal - Dr. Axe
By Rachael Link, MS, RD
Is sugar bad for you? While natural sugars are necessary, it’s no secret that excess sugar is detrimental to health. In fact, a high-sugar diet has been associated with a slew of health conditions, from diabetes to heart disease and beyond. But if you’ve ever tried to cut out sugar cold turkey, you’ve probably been faced with sugar withdrawal and the multitude of side effects that come with it.
Although cutting out sugar can mean temporarily dealing with unpleasant symptoms like sugar withdrawal bloating, migraines and fatigue, you shouldn’t let that stop you from continuing to work toward better health. By making a few modifications to your diet and arming yourself with the knowledge you need, overcoming sugar withdrawal and maintaining a nutritious, low-sugar diet can be easier than ever.
Sugar withdrawal - Dr. Axe
What Is Sugar Withdrawal?
A splitting sugar headache, fatigue, cramps and nausea are just a few of the debilitating symptoms that can occur when you decide to finally nix sugar from your diet. But why does this happen, and what causes it?
Years ago, sugar was just a small part of the diet, found mostly in natural sources like fruits and starches. In recent years, however, sugar intake has skyrocketed, with added sugars accounting for an estimated 14.1 percent of total energy intake according to a study in the American Journal of Clinical Nutrition. (1) It’s found just about everywhere, from ultra-processed foods to granola bars, cereals, yogurts and even tomato sauces.
Here are some more alarming statistics on sugar intake in the U.S., according to the Centers for Disease Control and Prevention: (2)
• Americans should keep added sugar intake to less than 10 percent of calories.
• From 2005–10, men and women 20 and over consumed 13 percent of calories from added sugar.
• In 2005–08, average percent of daily calories from added sugar was 16 percent for boys and girls ages 2–19.
• Socioeconomic status is found to not affect added sugar intake by youths, however among adults, lower-income people consume more added sugar.
• Younger, less educated, less physically active adults who smoke and drink infrequently or lightly seem to consume the most added sugar among adults.
When you eat foods high in sugar and hidden sugar foods, it triggers the release of a chemical called dopamine in the nucleus accumbens part of the brain. (3) Dopamine is a neurotransmitter that controls the reward and pleasure centers in the brain and is the same chemical released in response to sex and drug use.
Eating lots of sugary foods often causes the receptors that trigger the release of dopamine start to down-regulate, meaning you have to eat even more sugar the next time to feel the same sensation of pleasure. This turns into a vicious cycle and may even result in sugar addiction.
Thanks to its effect on dopamine and the reward centers in your brain, many studies have found that sugar works like certain types of drugs, such as cocaine, and giving it up can produce symptoms similar to opioid withdrawal. (4, 5)
Sugar Withdrawal Symptoms
Glucose —also known as sugar — is the primary source of fuel for your body. When you eat carbs, they’re broken down into sugar to supply your body with energy. When you significantly slash your sugar intake, it can cause your blood sugar to drop, which can result in a host of symptoms as your body starts to adapt to finding new sources of energy. Sugar withdrawal nausea, headaches and fatigue are just a few of the typical side effects many report as a result of sugar withdrawal.
Of course, the severity of your symptoms largely depends on the amount of sugar in your diet beforehand. If you were loading up on the candy and sweet treats before, you’re more likely to experience some of these symptoms than if sugar made up only a small part of your diet previously.
Some of the most common symptoms caused by sugar withdrawal include:
• Headaches
• Bloating
• Nausea
• Muscle aches
• Diarrhea
• Fatigue
• Hunger
• Anxiety
• Depression
• Cravings
• Chills
Sugar Withdrawal Stages
Although the list of common side effects can be a bit daunting, keep in mind that these symptoms are temporary and generally only last a few days for most people. Here are the stages you can expect to encounter when you decide to drop sugar from your diet:
1. Feeling Motivated
When you make the decision to kick sugar to the curb, you likely feel highly motivated and ready to reap the rewards of a healthier diet and lifestyle. Keep it up, as you’ll need this motivation to propel you through the cravings, headaches and fatigue yet to come.
2. Cravings Start to Kick In
Cravings are one of the earliest signs of sugar withdrawal. Many people, for instance, establish a routine with their diets, and may find themselves glancing over at the vending machine when that mid-morning hunger starts to set in.
During this phase, it’s best to prepare by keeping healthy snacks at hand so it’s even easier to resist the urge to indulge in your favorite sweets.
Sugar withdrawal stages - Dr. Axe
3. Symptoms Peak
Soon after the cravings hit, you may begin to experience some of the previously mentioned sugar withdrawal symptoms. Headaches, hunger, chills and even sugar withdrawal diarrhea can set in and make it harder than ever to stay motivated.
Remember why you decided to start eating healthier, and use that to keep you driven and determined to stay on the path to better health.
4. You Start to Feel Better
Once your symptoms start to clear up, you’ll likely find yourself feeling better than ever. Many people have reported improvements in skin health, reduced brain fog and a boost in energy levels as a result of giving up added sugar. Plus, by following a healthy diet and including more nutrient-dense foods in your day, you’ll enjoy a lower risk of chronic disease and better overall health as well.
How to Reduce Sugar Cravings
• Increase fiber intake
• Eat more protein
• Stay hydrated
• Pack in probiotics
• Up intake of healthy fats
• Satisfy sweet tooth without sugar
1. Increase Your Fiber Intake
Fiber moves through the body undigested, helping keep you feeling full and satisfied to kick sugar cravings to the curb. Not only that, but dietary fiber also helps keep blood sugar levels steady, preventing a drop in sugar levels and side-stepping some potential negative effects of sugar withdrawal.
A few healthy high-fiber foods include vegetables, nuts and seeds and legumes. Remember to drink more water if you’re upping your fiber intake to prevent unpleasant digestive side effects, such as constipation.
2. Eat More Protein
Protein is great for reducing hunger and sugar cravings. Not only does a high-protein diet cut levels of ghrelin, the hunger hormone, but it also helps maintain normal blood sugar levels to prevent several sugar withdrawal symptoms. (6, 7)
Good sources of protein include grass-fed beef, lentils, wild fish, black beans, organic chicken and eggs. You can also keep a few high-protein snacks on hand for when sugar cravings strike.
3. Stay Hydrated
How many times have you felt your stomach grumbling, only to drink a glass of water and have it disappear? Thirst is often confused with hunger, and sometimes all it takes is drinking a bit of water and staying hydrated to squash cravings.
Next time you catch yourself eyeing a sugary candy bar or dessert, try drinking a glass of water, waiting half an hour and seeing if you’re actually hungry or just feeling thirsty.
4. Pack in Some Probiotics
Eating plenty of probiotic-rich foods helps increase the beneficial bacteria in your gut. Not only does this have far-reaching effects in terms of digestive health and immunity, but some research has even found that it could regulate blood sugar levels and reduce appetite. (8)
A few examples of nutritious probiotic foods include kombucha, kefir, tempeh, miso, kimchi and natto. Aim for a few servings per week to give your gut health a boost and minimize sugar cravings.
5. Up Your Intake of Heart-Healthy Fats
Fat, much like protein and fiber, can promote satiety while warding off sugar cravings. This is because fat is digested very slowly, so it keeps you feeling fuller for longer.
Of course, this doesn’t mean you should load up on the greasy burgers and fries in order to reduce your sugar cravings. Instead, opt for healthy fats from foods like avocados, nuts and seeds or coconut oil.
6. Satisfy Your Sweet Tooth Without Sugar
Just because you’re giving up extra sugar doesn’t mean you have to give up all things sweet forever. In fact, there are plenty of easy ways to satisfy your sweet tooth without piling on added sugar by the teaspoon. Fruit, for example, contains natural sugars, but it also contains loads of vitamins, minerals and fiber that make it a much healthier choice.
Additionally, stevia is a natural, no-calorie sweetener that can sweeten up foods without the negative health effects of sugar. Look for green leaf stevia, the least processed form of stevia, to make sure you’re getting the real deal.
How to Deal With and Overcome Sugar Withdrawal
When symptoms strike, it can be challenging to persevere and continue on your journey toward better health by cutting out added sugar. Here are a few fast tips to help you take on sugar withdrawal:
1. Stay motivated: Make a list of the reasons why you decided to cut out sugar and keep it close by to keep you going strong when cravings hit or symptoms worsen.
2. Plan out your meals and snacks: By starting your week knowing what you’re going to eat, it makes it much easier to stay on track, plus even harder to stray toward the candy drawer.
3. Clean out your pantry: By getting rid of the junk food you may be holding on to and filling your fridge with healthy foods like fruits and vegetables, it will be much easier to ignore those sugar cravings and enjoy a healthy snack instead.
4-Week Plan to Wean Off of Sugar
Ready to learn how to stop eating sugar once and for all? While some people prefer to cut it out cold turkey, making changes step by step and slowly reducing your intake of sugar can also be effective. Here’s a plan that can help you significantly cut down on your added sugar intake in just one month:
• Week 1: Start using stevia or other natural sweeteners in your morning cup of coffee along with wherever else you normally use refined sugar.
• Week 2: Eliminate sugar-sweetened beverages from your diet, including soda, juice, fruit punch and lemonade.
• Week 3: Start swapping out sweets, such as candies and desserts, for fruits or other high-protein, high-fiber snacks.
• Week 4: Begin trading in processed foods like frozen dinners and convenience items for whole foods like fruits, vegetables and whole grains.
Sugar detox - Dr. Axe
Sugar Substitutes
In your quest for information about learning how to detox from sugar, you’ve probably come across quite a few recommendations for sugar substitutes and may be wondering about the best way to add a hint of sweetness to your foods and drinks naturally.
While I don’t recommend the use of artificial sweeteners, there are plenty of natural sweeteners out there that can bring a touch of flavor and are less processed than refined sugars like high fructose corn syrup. While some of these do contain sugar, using them in moderation occasionally as part of a healthy diet is OK.
Here are a few healthier alternatives that you can use in place of refined sugar:
• Raw honey
• Stevia
• Dates
• Coconut sugar
• Maple syrup
Precautions
Not all sugar is created equal. While added sugars from foods like candies, desserts and processed foods have next to no nutritional value and provide nothing but empty calories, sugar is naturally present in many healthy foods as well. Fruit, for example, contains natural sugars as well as fiber, vitamins and minerals, and can be included as part of a healthy diet.
Although low blood sugar may be a temporary side effect of reducing your sugar intake, hypoglycemia symptoms can be dangerous. Remember to eat regularly, don’t skip meals and keep a piece of fruit on hand in case your blood sugar levels drop too low.
Additionally, if you have diabetes, consult with your doctor before making any major dietary changes as your medications may need to be adjusted.
As always, remember to listen to your body. If cutting sugar out all at once is causing persistent or severe symptoms for you, consider making small dietary changes step by step to achieve long-lasting results.
Final Thoughts on Sugar Withdrawal
• Is sugar bad for you? Sugar has been associated with a multitude of health issues, ranging from heart disease to diabetes.
• Sugar withdrawal can cause symptoms like a sugar headache, fatigue, muscle aches, cravings and nausea, although severity of symptoms can vary based on your sugar intake.
• There are several ways to reduce withdrawal symptoms and cravings, including eating more protein, fiber and healthy fats; drinking plenty of water; satisfying your sweet tooth with stevia or fruit; and incorporating more probiotic-rich foods into your diet.
• Although many people prefer to cut sugar out all at once, eliminating certain high-sugar food groups from the diet one at a time can also help you effectively achieve better health.
Read Next: Are You Suffering from a Caffeine Overdose?
Josh Axe
Get FREE Access!
Dr. Josh Axe is on a mission to provide you and your family with the highest quality nutrition tips and healthy recipes in the world...Sign up to get VIP access to his eBooks and valuable weekly health tips for FREE!
Free eBook to boost
metabolism & healing
30 Gluten-Free Recipes
& detox juicing guide
Shopping Guide &
premium newsletter
More Posts
Sponsored | ESSENTIALAI-STEM |
Vicente Guarner
Vicenç Guarner i Vivancos (1893–1981) held senior positions in the Republican Army during the Spanish Civil War. | WIKI |
19 Wheels
19 Wheels was an American alternative rock band from East Lansing, Michigan. It was founded by Chris Johnston (vocals, guitar), Scott Owens (guitar), Tim Marzorati (bass); drummer Rob Dickey joined in 2000.
History
The group was initially known as Hannibals before changing their name to Nineteen Wheels.
The group first attracted attention with their 1996 EP, The Tempermill Recordings, which led to a spot touring on the ESPN Extreme Games Tour in 1996. They later signed to Aware Records for their 1997 release, Six Ways from Sunday. After Aware entered into a joint venture with Columbia, Six Ways from Sunday was reissued in an "amended version" in October 1997. This amended version featured an additional album track and was identified by the predominantly red cover, as opposed to the blue cover on the original release. In a review of the album, Allmusic noted, "The band maintains a muscular, tight sound throughout, thanks in large part to superb bass and drum work."
19 Wheels' album, Sugareen, was self-released, and was produced by another Michigan local, Donny Brown of the band Verve Pipe. It sold over 14,000 copies. They followed this up with the EP Jawbreaker in 2004, produced by Bob Ezrin.
While working with Ezrin, the group members questioned whether they would continue working together. By this time, several had wives and families, had taken steady jobs, and had moved to different parts of the state of Michigan; Owens and Marzorati were still living near Lansing, while Johnston had moved to Ferndale and Dickey to Grand Rapids. Late in 2005, they decided to break up, releasing one final EP and playing their final show on November 25, 2005 at The Intersection in Grand Rapids.
19 Wheels' track "Reactor" was featured on Ford's website for the new 2010 Ford Fusion.
Members
* Chris Johnston - vocals, guitar
* Scott Owens - guitar
* Tim Marzorati - bass
* Rob Dickey - drums
Discography
* The Tempermill Recordings (1996, EP, CD)
* Six Ways from Sunday - Aware Records (1997 LP, CD)
* Sugareen - Self released / Standard (2000 LP, CD)
* Jawbreaker - Self released / Standard (2004 LP, CD)
* This is the Life - Self released / Standard (2005 EP, CD) | WIKI |
't Loo
Etymology
* (Gelderland) First attested as Loo (Het) in 1846. Derived from.
* (Overijssel) First attested as an het lo around 1630. Derived from. | WIKI |
How to Get Into the Magic Castle in Los Angeles | USA Today
Magic Castle (Photo: ) Located in Hollywood, California, the Magic Castle is a private club and restaurant dedicated to the performance and study of magic. The club was founded in 1963 as the new home of the Academy of Magical Arts, and is housed in an early-20th-century mansion known for its castle-like turrets and eclectic interior. Admittance to the Magic Castle is typically restricted to magicians and students of magic, but the public may attend shows or enjoy dinner at the Magic Castle in one of three ways. Visit the official website of the Magic Castle (magiccastle.com). Click the link titled About the Castle in the upper right-hand portion of the screen. Scroll to the bottom of the screen. Look for an in-text hyperlink titled membership application form. Click the link. Fill out and submit the membership application along with any necessary dues. Wait four to six weeks to receive your membership information and visitor's card, which is necessary to gain admittance to the club. Read the dress code of the club before visiting. Wear evening dress with jackets and ties for gentlemen and dresses or pantsuits for ladies. Do not wear tennis shoes or other casual attire as you will be denied entrance. Bring your membership card and a photo identification when visiting the Magic Castle. You will be denied entry without it. Book a stay at the adjacent hotel by calling the front desk or using the online reservation form. Arrange your stay well in advance since the Magic Castle Hotel is often booked. Request reservations at the Magic Castle through the front desk of the hotel. Dinner reservations and a cover charge are required for visiting the Magic Castle as a guest of the hotel. Read the dress code of the club before visiting. Wear evening dress with jackets and ties for gentlemen and dresses or pantsuits for ladies. Do not wear tennis shoes or other casual attire as you will be denied entrance. Bring your photo identification and the confirmation pass provided to you by the hotel when entering the Magic Castle. Befriend an existing member of the Academy of Magical Arts. Ask for a guest card to visit the Magic Castle on a night when the member will also be attending. Read the dress code of the club before visiting. Wear evening dress with jackets and ties for gentlemen and dresses or pantsuits for ladies. Do not wear tennis shoes or other casual attire as you will be denied entrance. Arrive at the Magic Castle with the person who invited you. Bring your guest pass and a photo identification to gain admittance. Anastasia Leon began writing professionally in 2001. Her experience as a horticulturalist and nurseryman informs her work, which has appeared in publications such as Mother Earth News and Modern Farmer. Leon is a certified master gardener and holds a Bachelor of Arts from the University of California, Santa Cruz. Slider images: Attribution: Minnaert; License: public domain Attribution: Minnaert; License: public domain | NEWS-MULTISOURCE |
skip to main content
SciTech ConnectSciTech Connect
Title: Toward an understanding of foreground emission in the BICEP2 region
BICEP2 has reported the detection of a degree-scale B-mode polarization pattern in the Cosmic Microwave Background (CMB) and has interpreted the measurement as evidence for primordial gravitational waves. Motivated by the profound importance of the discovery of gravitational waves from the early Universe, we examine to what extent a combination of Galactic foregrounds and lensed E-modes could be responsible for the signal. We reanalyze the BICEP2 results and show that the 100 ×150 GHz and 150 ×150 GHz data are consistent with a cosmology with r=0.2 and negligible foregrounds, but also with a cosmology with r=0 and a significant dust polarization signal. We give independent estimates of the dust polarization signal in the BICEP2 region using a number of different approaches: (1) data-driven models based on Planck 353 GHz intensity, polarization fractions inferred from the same Planck data used by the BICEP2 team but corrected for CMB and CIB contributions, and polarization angles from starlight polarization data or the Planck sky model; (2) the same set of pre-Planck models used by the BICEP2 team but taking into account the higher polarization fractions observed in the CMB- and CIB-corrected map; (3) a measurement of neutral hydrogen gas column density N{sub HI}more » in the BICEP2 region combined with an extrapolation of a relation between HI column density and dust polarization derived by Planck; and (4) a dust polarization map based on digitized Planck data, which we only use as a final cross-check. While these approaches are consistent with each other, the expected amplitude of the dust polarization power spectrum remains uncertain by about a factor of three. The lower end of the prediction leaves room for a primordial contribution, but at the higher end the dust in combination with the standard CMB lensing signal could account for the BICEP2 observations, without requiring the existence of primordial gravitational waves. By measuring the cross-correlations between the pre-Planck templates used in the BICEP2 analysis and between different versions of a data-based template, we emphasize that cross-correlations between models are very sensitive to noise in the polarization angles and that measured cross-correlations are likely underestimates of the contribution of foregrounds to the map. These results suggest that BICEP1 and BICEP2 data alone cannot distinguish between foregrounds and a primordial gravitational wave signal, and that future Keck Array observations at 100 GHz and Planck observations at higher frequencies will be crucial to determine whether the signal is of primordial origin.« less
Authors:
[1] ; ; [2]
1. Institute for Advanced Study, Einstein Drive, Princeton, NJ 08540 (United States)
2. Dept. of Astrophysical Sciences, Peyton Hall, Princeton University, Princeton, NJ 08544 (United States)
Publication Date:
OSTI Identifier:
22373392
Resource Type:
Journal Article
Resource Relation:
Journal Name: Journal of Cosmology and Astroparticle Physics; Journal Volume: 2014; Journal Issue: 08; Other Information: Country of input: International Atomic Energy Agency (IAEA)
Country of Publication:
United States
Language:
English
Subject:
79 ASTROPHYSICS, COSMOLOGY AND ASTRONOMY; CORRELATIONS; COSMOLOGY; DENSITY; DUSTS; EXTRAPOLATION; GHZ RANGE 100-1000; GRAVITATIONAL WAVES; HYDROGEN; MAPS; POLARIZATION; RELICT RADIATION; SIGNALS | ESSENTIALAI-STEM |
Security with Amazon Aurora PostgreSQL - Amazon Aurora
Security with Amazon Aurora PostgreSQL
Security for Amazon Aurora PostgreSQL is managed at three levels:
• To control who can perform Amazon RDS management actions on Aurora MySQL DB clusters and DB instances, you use AWS Identity and Access Management (IAM). When you connect to AWS using IAM credentials, your AWS account must have IAM policies that grant the permissions required to perform Amazon RDS management operations. For more information, see Identity and Access Management in Amazon Aurora.
If you are using IAM to access the Amazon RDS console, you must first sign on to the AWS Management Console with your IAM user credentials. Then go to the Amazon RDS console at https://console.aws.amazon.com/rds/.
• Aurora DB clusters must be created in an Amazon Virtual Private Cloud (VPC). To control which devices and Amazon EC2 instances can open connections to the endpoint and port of the DB instance for Aurora DB clusters in a VPC, you use a VPC security group. These endpoint and port connections can be made using Secure Sockets Layer (SSL). In addition, firewall rules at your company can control whether devices running at your company can open connections to a DB instance. For more information on VPCs, see Amazon Virtual Private Cloud VPCs and Amazon Aurora.
Aurora PostgreSQL supports db.r4 and db.t3 instance classes with default VPC only. With default VPC tenancy, the VPC runs on shared hardware. With dedicated VPC tenancy, the VPC runs on a dedicated hardware instance. For more information about instance classes, see DB Instance Classes. For more information about default and dedicated VPC tenancy, see Dedicated Instances in the Amazon EC2 User Guide for Linux Instances.
• To authenticate login and permissions for an Amazon Aurora DB cluster, you can take the same approach as with a stand-alone instance of PostgreSQL.
Commands such as CREATE ROLE, ALTER ROLE, GRANT, and REVOKE work just as they do in on-premises databases, as does directly modifying database schema tables. For more information, see Client Authentication in the PostgreSQL documentation.
Note
The Salted Challenge Response Authentication Mechanism (SCRAM) is not supported with Aurora PostgreSQL.
When you create an Amazon Aurora PostgreSQL DB instance, the master user has the following default privileges:
• LOGIN
• NOSUPERUSER
• INHERIT
• CREATEDB
• CREATEROLE
• NOREPLICATION
• VALID UNTIL 'infinity'
To provide management services for each DB cluster, the rdsadmin user is created when the DB cluster is created. Attempting to drop, rename, change the password, or change privileges for the rdsadmin account will result in an error.
Restricting Password Management
You can restrict who can manage database user passwords to a special role. By doing this, you can have more control over password management on the client side.
You enable restricted password management with the static parameter rds.restrict_password_commands and use a role called rds_password. When the parameter rds.restrict_password_commands is set to 1, only users that are members of the rds_password role can run certain SQL commands. The restricted SQL commands are commands that modify database user passwords and password expiration time.
To use restricted password management, your DB cluster must be running Amazon Aurora for PostgreSQL 10.6 or higher. Because the rds.restrict_password_commands parameter is static, changing this parameter requires a database restart.
When a database has restricted password management enabled, if you try to run restricted SQL commands you get the following error: ERROR: must be a member of rds_password to alter passwords.
Following are some examples of SQL commands that are restricted when restricted password management is enabled.
postgres=> CREATE ROLE myrole WITH PASSWORD 'mypassword'; postgres=> CREATE ROLE myrole WITH PASSWORD 'mypassword' VALID UNTIL '2020-01-01'; postgres=> ALTER ROLE myrole WITH PASSWORD 'mypassword' VALID UNTIL '2020-01-01'; postgres=> ALTER ROLE myrole WITH PASSWORD 'mypassword'; postgres=> ALTER ROLE myrole VALID UNTIL '2020-01-01'; postgres=> ALTER ROLE myrole RENAME TO myrole2;
Some ALTER ROLE commands that include RENAME TO might also be restricted. They might be restricted because renaming a PostgreSQL role that has an MD5 password clears the password.
The rds_superuser role has membership for the rds_password role by default, and you can't change this. You can give other roles membership for the rds_password role by using the GRANT SQL command. We recommend that you give membership to rds_password to only a few roles that you use solely for password management. These roles require the CREATEROLE attribute to modify other roles.
Make sure that you verify password requirements such as expiration and needed complexity on the client side. We recommend that you restrict password-related changes by using your own client-side utility. This utility should have a role that is a member of rds_password and has the CREATEROLE role attribute.
Securing Aurora PostgreSQL Data with SSL
Amazon RDS supports Secure Socket Layer (SSL) encryption for Aurora PostgreSQL DB clusters. Using SSL, you can encrypt a connection between your applications and your Aurora PostgreSQL DB clusters. You can also force all connections to your Aurora PostgreSQL DB cluster to use SSL.
For general information about SSL support and PostgreSQL databases, see SSL Support in the PostgreSQL documentation. For information about using an SSL connection over JDBC, see Configuring the Client in the PostgreSQL documentation.
SSL support is available in all AWS Regions for Aurora PostgreSQL. Amazon RDS creates an SSL certificate for your Aurora PostgreSQL DB cluster when the DB cluster is created. If you enable SSL certificate verification, then the SSL certificate includes the DB cluster endpoint as the Common Name (CN) for the SSL certificate to guard against spoofing attacks.
To connect to an Aurora PostgreSQL DB cluster over SSL
1. Download the certificate.
For information about downloading certificates, see Using SSL/TLS to Encrypt a Connection to a DB Cluster.
2. Import the certificate into your operating system.
3. Connect to your Aurora PostgreSQL DB cluster over SSL.
When you connect using SSL, your client can choose to verify the certificate chain or not. If your connection parameters specify sslmode=verify-ca or sslmode=verify-full, then your client requires the RDS CA certificates to be in their trust store or referenced in the connection URL. This requirement is to verify the certificate chain that signs your database certificate.
When a client, such as psql or JDBC, is configured with SSL support, the client first tries to connect to the database with SSL by default. If the client can't connect with SSL, it reverts to connecting without SSL. The default sslmode mode used is different between libpq-based clients (such as psql) and JDBC. The libpq-based clients default to prefer, where JDBC clients default to verify-full.
Use the sslrootcert parameter to reference the certificate, for example sslrootcert=rds-ssl-ca-cert.pem.
The following is an example of using psql to connect to an Aurora PostgreSQL DB cluster.
$ psql -h testpg.cdhmuqifdpib.us-east-1.rds.amazonaws.com -p 5432 \ "dbname=testpg user=testuser sslrootcert=rds-ca-2015-root.pem sslmode=verify-full"
Requiring an SSL Connection to an Aurora PostgreSQL DB cluster
You can require that connections to your Aurora PostgreSQL DB cluster use SSL by using the rds.force_ssl parameter. By default, the rds.force_ssl parameter is set to 0 (off). You can set the rds.force_ssl parameter to 1 (on) to require SSL for connections to your DB cluster. Updating the rds.force_ssl parameter also sets the PostgreSQL ssl parameter to 1 (on) and modifies your DB cluster’s pg_hba.conf file to support the new SSL configuration.
You can set the rds.force_ssl parameter value by updating the DB cluster parameter group for your DB cluster. If the DB cluster parameter group isn't the default one, and the ssl parameter is already set to 1 when you set rds.force_ssl to 1, you don't need to reboot your DB cluster. Otherwise, you must reboot your DB cluster for the change to take effect. For more information on parameter groups, see Working with DB Parameter Groups and DB Cluster Parameter Groups.
When the rds.force_ssl parameter is set to 1 for a DB cluster, you see output similar to the following when you connect, indicating that SSL is now required:
$ psql postgres -h SOMEHOST.amazonaws.com -p 8192 -U someuser psql (9.3.12, server 9.4.4) WARNING: psql major version 9.3, server major version 9.4. Some psql features might not work. SSL connection (cipher: DHE-RSA-AES256-SHA, bits: 256) Type "help" for help. postgres=>
Determining the SSL Connection Status
The encrypted status of your connection is shown in the logon banner when you connect to the DB cluster.
Password for user master: psql (9.3.12) SSL connection (cipher: DHE-RSA-AES256-SHA, bits: 256) Type "help" for help. postgres=>
You can also load the sslinfo extension and then call the ssl_is_used() function to determine if SSL is being used. The function returns t if the connection is using SSL, otherwise it returns f.
postgres=> create extension sslinfo; CREATE EXTENSION postgres=> select ssl_is_used(); ssl_is_used --------- t (1 row)
You can use the select ssl_cipher() command to determine the SSL cipher:
postgres=> select ssl_cipher(); ssl_cipher -------------------- DHE-RSA-AES256-SHA (1 row)
If you enable set rds.force_ssl and restart your DB cluster, non-SSL connections are refused with the following message:
$ export PGSSLMODE=disable $ psql postgres -h SOMEHOST.amazonaws.com -p 8192 -U someuser psql: FATAL: no pg_hba.conf entry for host "host.ip", user "someuser", database "postgres", SSL off $
For information about the sslmode option, see Database Connection Control Functions in the PostgreSQL documentation. | ESSENTIALAI-STEM |
What are blood clotting period problems?
There are a few different types of blood clotting period problems. Most blood clotting period problems can be easily corrected with medication or surgery, but some require long-term care. If you have any questions about blood clotting period problems, feel free to ask your doctor and also consult a spiritual healer
Causes of Blood Clotting Period problems
Blood clotting period problems can be caused by a variety of factors. Some of the more common causes are:
Hormonal changes: Women may experience a change in their menstrual cycle which can affect their blood clotting ability.
Medical conditions: Certain medical conditions, such as Factor V Leiden, can increase your risk of developing blood clots.
Surgery: If you have surgery, your body may react by creating too many blood clots.
Medications: Certain medications, such as NSAIDs (nonsteroidal anti-inflammatory drugs), can also increase your risk of blood clots.
Lifestyle factors: Smoking, drinking alcohol, and being overweight can all contribute to blood clotting problems. | ESSENTIALAI-STEM |
How to translate text using browser tools
22 February 2019 Northern quoll persistence is most sensitive to survivorship of juveniles
Dorian Moro, Judy Dunlop, Matthew R. Williams
Author Affiliations +
Abstract
Context. Projecting the population trajectory of endangered species using models requires conservation practitioners to evaluate how variations in life history parameters may change a population’s viability. This is particularly important for species that occur as fragmented populations and whose densities are naturally low. Simulations may be used to identify conservation actions that have a higher likelihood of reducing a species’ extinction risk.
Aims. The aim was to apply population viability models to the northern quoll (Dasyurus hallucatus) under alternative scenarios.
Methods. The current (baseline) northern quoll demographic trajectories were evaluated using field-collected data derived from monitoring programs. The impact of alternative scenarios of mortality (for example, due to increased predation by introduced predators) and population supplementation (either from populations elsewhere or from captive breeding) on the viability of a northern quoll population was then determined.
Key results. Under current conditions, individual Pilbara populations of northern quoll are projected to persist for over 20 years. However, these populations are sensitive to extinction events. Population growth rate and local extinction risk were most sensitive to changes in juvenile mortality as low as 5% per annum. Increased mortality of the juvenile age cohort above current levels resulted in a projected decline in population size of 22–54%, with a moderate-to-high chance (20–96%) of local extinction within 20 years. Supplementing the population produced a moderate increase in quoll persistence over this time period.
Conclusions. Populations of northern quolls in the Pilbara, and potentially elsewhere in their range, are highly sensitive to even small perturbations in juvenile mortality rates. The continued persistence of quoll populations in fragmented refuges is characteristic of a species that functions as a dynamic metapopulation in the face of high environmental perturbations.
Implications. Increased juvenile mortality above current levels – for example through the spread of cane toads or invasion of feral cats – may have serious implications for the persistence of the current network of northern quoll populations and other mammals that exhibit population fragmentation in arid environments. Estimates of survival rates for the juvenile cohort of quolls would improve diagnosis of a species’ population dynamics as well as inform practitioners of key life-history sensitivities.
CSIRO
Dorian Moro, Judy Dunlop, and Matthew R. Williams "Northern quoll persistence is most sensitive to survivorship of juveniles," Wildlife Research 46(2), 165-175, (22 February 2019). https://doi.org/10.1071/WR18010
Received: 22 January 2018; Accepted: 17 December 2018; Published: 22 February 2019
KEYWORDS
cane toad
feral cat
juvenile mortality
population monitoring
population viability
RIGHTS & PERMISSIONS
Get copyright permission
Back to Top | ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.