text
stringlengths
8
8.84M
Q: Line break inside string (React Native) I'm developing an app where at some point app receives a string from Facebook Graph API. String looks like that: "Some text some text, some text.\n\nMore text and more\n\nAnd little bit more". How can I replace \n\n with line break what actually works in code? I know how to replace this with something: var ret = stringToReplace.replace('\n\n','<br />'); But how can i replace it with working line break. I have tried to replace with '\n' '\r\n'. Every replacement just acts like usual text. For example: "Some text some text, some text.<br />More text and more<br />And little bit more" A: I test the following code and it works. You should just wrap your text in a <Text> component. export default class App extends React.Component { text = "Some text some text, some text.\n\nMore text and more\n\nAnd little bit more" render() { return ( <View style={styles.container}> <Text> {this.text} </Text> </View> ); } } The result of this code is like this:
The NDP will hold its nominating convention for the southwestern New Brunswick riding on Monday night. The party does not currently have any seats in the legislature. Cardy, who became leader of the NDP last year, disputes the idea that the relatively affluent riding is not a good fit for him. "When you've got no seats, every seat seems kind of difficult. I don't view Rothesay as being any different. People have been talking like, 'Oh, there are all these well-off people.' New Democrats are winning seats across Canada in upper income communities, in lower income communities, because we have a message that's positive," he said. Cardy doesn't think the riding is any more of a challenge than other constituencies. "I don't think people in Rothesay necessarily have different views on issues like patronage and education and economic development from folks in other corners of the province," he said. Tory stronghold Cardy had previously joked with reporters that Rothesay is well-known as a "bastion for socialism" and would be a good fit for his left-leaning party. Blaney, who stepped down to become the president and CEO of Efficiency New Brunswick, won a clear victory in 2010, earning 56 per cent of the vote, compared to 28.4 per cent for the Liberals and 8.9 per cent for the NDP. In fact, the Tories have held the Rothesay riding, and its predecessor Saint John-Kings, since 1999. But a recently-released NDP poll suggests the party is in first place in the Saint John area. Interim Liberal Leader Victor Boudreau had challenged Cardy to run in Rothesay. "He is the leader of the provincial New Democratic Party, he doesn't have a seat in the house, and this is an opportunity to show what he's made of," Boudreau had said. The NDP has been without a seat in the legislature since Elizabeth Weir resigned to become president and chief executive officer of Efficiency New Brunswick in 2005. The Tories will pick their candidate on Saturday, while the Liberals, who are currently in the middle of a leadership race, will hold their nominating convention on June 5. The Progressive Conservatives currently have 41 seats in the legislature, the Liberals have 13. Premier David Alward has said he feels good about the Tories' chances of winning the byelection.
Q: Why am I experiencing DOMS in my legs when I'm currently not working out? I feel Delayed Onset Muscle Soreness in my thighs, however I do not work out. The only thing I do in the gym is cardio. I do the elliptical for about 45 minutes a few times per week at a very fast speed at zero resistance, and zero incline. If the culprit is the cardio, is DOMS possible for someone doing no exercise at all? A: Well, yes. DOMS isn't only experienced after focusing on exercise, but whenever your muscles have been subjected to strenuous work which it's not accustomed to. It's very possible that cardio is the culprit, but for someone who doesn't exercise at all, even taking a flight of stairs could cause DOMS. It's sometimes hard to pinpoint the exact reason, given the delayed reaction. It's easy to think it might have been the cardio, when in fact, it could have been something else that you didn't even think about, and have already forgotten.
Contents Definition In model theory, an elementary embedding between structures (over a given signatureσ\sigma) is an injection that preserves and reflects all of first-order logic over σ\sigma. That is, it is an injection f:M→Nf\colon M\to N such that for any first-order formula φ\varphi written in the language of σ\sigma and parameters a1,…,an∈Ma_1,\dots,a_n\in M (of appropriate types), we have In particular, this implies that if either MM or NN is a model of some first-order theory, then so is the other. Note that the condition that ff be injective is automatic as long as the logic in question includes equality, since reflecting of the formula x=yx=y implies that ff is injective. If ff is (interpreted as) the inclusion of a subset, we say that MM is an elementary substructure of NN. We also say here that NN is an elementary extension of MM. More generally, when we consider structures in a category as in categorical logic, a morphism f:M→Nf\colon M\to N between structures in CC is an elementary embedding if for any formula φ\varphi, the following square is a pullback: where MAiM A_i denotes the object of CC interpreting the type AiA_i, and [φ]M[\varphi]_M denotes the corresponding subobject in CC interpreting the truth value of the formula φ\varphi. Note that for an arbitrary morphism of structures, this square need not even commute; one sometimes says that ff is an elementary morphism if it does. Urs Schreiber: let me try to say this more explicitly, to check if I am following: The theoryTT that we are modelling is exhibited by its syntactic category Syn(T)Syn(T) with finite limits. A model of TT in a category CC with limits – equivalently a TT-structure in CC – is a finite-limit preserving functor N:Syn(T)→CN : Syn(T) \to C. A morphism f:M→N:Syn(T)→Cf : M \to N : Syn(T) \to C of models is a natural transformation between such functors. We say that such a natural transformation is an elementary embedding if its naturality squares on certain morphisms of Syn(T)Syn(T) are pullback squares. Mike Shulman: Not quite. First of all, the definition officially happens at the more general level of structures rather than models, but we can of course consider those as models for the empty theory. And whether we need finite-limit categories and functors, or something else like regular ones, geometric ones, or Heyting ones, depends on what fragment of logic we consider our (possibly empty) theories as living in. Your rephrasing is correct if we mean finitary first-order theories and therefore Heyting categories and Heyting functors. Otherwise, the syntactic category Syn(T)Syn(T) won’t have the structure required to construct [φ][\varphi], and the structure wouldn’t be preserved by the functors into CC, so that we wouldn’t even have naturality squares to ask to commute (I alluded to this in the last sentence above). I think I didn’t explain this very well, but I have to go now, I’ll try to come back to it later and rewrite it to make more sense. In practice, it is also useful to separate out the weaker notion of embedding. Definition Working over a fixed signature Σ\Sigma, an injective homomorphism of structures f:M→Nf: M \to N is an embedding if for each relation R∈ΣR \in \Sigma of arity nn, we have RM=(fn)*RNR_M = (f^n)^\ast R_N, i.e., RMR_M is obtained by pulling back the inclusion RN↪NnR_N \hookrightarrow N^n along fn:Mn→Nnf^n: M^n \to N^n. Notice this is stronger than just being an injective homomorphism (where we demand only that RM↪(fn)*RnR_M \hookrightarrow (f^n)^\ast R^n, or that RM(a1,…,an)⊢RN(f(a1),…,f(an))R_M(a_1, \ldots, a_n) \vdash R_N(f(a_1), \ldots, f(a_n))), and it is weaker than being an elementary embedding since here we are not demanding a pullback condition over all the formulas of the language, just the atomic ones (including equality, which is handled by injectivity as we noted earlier). A substructure is an embedding f:M→Nf: M \to N where ff is a set-theoretic inclusion. (In structural set theory, a substructure would just be an isomorphism class of embeddings.) Tarski-Vaught test A simple criterion for when one structure is an elementary substructure of another is given by the Tarski-Vaught test. Let LL be the language (the set of first-order formulas) over some given signature. Proposition A substructure i:M↪Ni: M \hookrightarrow N is an elementary substructure if, whenever φ\varphi is an (n+1)(n+1)-ary formula and b1,…,bn∈Mb_1, \ldots, b_n \in M, there exists a∈Na \in N such that φ(a,b1,…,bn)\varphi(a, b_1, \ldots, b_n) is satisfied in NN only if there exists c∈Mc \in M such that φ(c,b1,…,bn)\varphi(c, b_1, \ldots, b_n) is satisfied in MM. Proof By induction on the structure of formulas φ\varphi, using ¬,∧,∃\neg, \wedge, \exists as primitive logical operators. The required pullback condition is satisfied on atomic formulas, by definition of substructure. If the pullback condition is satisfied for φ\varphi (of arity nn say), then it is trivially satisfied for ¬φ\neg \varphi because for all a¯=(a1,…,an)∈Mn\bar{a} = (a_1, \ldots, a_n) \in M^n we have Using these two steps of the induction, we may say that given a substructure, the pullback condition is satisfied for all quantifier-free formulas in the language. Finally, suppose the pullback condition is satisfied for (n+1)(n+1)-ary formulas φ(v,w¯)\varphi(v, \bar{w}). If b¯∈(∃vφ)M\bar{b} \in (\exists_v \varphi)_M, then there exists c∈Mc \in M such that (c,b¯)∈φM(c, \bar{b}) \in \varphi_M, whence there exists a=i(c)a = i(c) such that (i(c),in(b¯))∈φN(i(c), i^n(\bar{b})) \in \varphi_N, so in(b¯)∈(∃vφ)Ni^n(\bar{b}) \in (\exists_v \varphi)_N, just using the fact that ii is a homomorphism. Conversely: if in(b¯)∈(∃vφ)Ni^n(\bar{b}) \in (\exists_v \varphi)_N, i.e., if there exists a∈Na \in N such that (a,in(b¯))∈φN(a, i^n(\bar{b})) \in \varphi_N, then by hypothesis there exists c∈Mc \in M such that (c,b¯)∈φM(c, \bar{b}) \in \varphi_M, i.e., b¯∈(∃vφ)M\bar{b} \in (\exists_v \varphi)_M. This completes the inductive proof. Example In the theory of real closed fields with signature (0,1,+,⋅,≤)(0, 1, +, \cdot, \leq), the field of real algebraic numbers is an elementary substructure of the field of real numbers. This follows from the Tarski-Vaught test and the Tarski-Seidenberg theorem which establishes quantifier elimination over the language generated by the signature (every formula has the same extension as some quantifier-free formula). Elementary embeddings between models of set theory In material set theory For instance, the existence of a measurable cardinal is equivalent to the existence of a non-surjective elementary embedding j:V→Mj\colon V\to M, where VV is the universe of sets and MM is some transitive model of ZF. If κ\kappa is a measurable cardinal with a countably-complete ultrafilter𝒰\mathcal{U}, we can form the ultrapowerV𝒰V^{\mathcal{U}} and then take its transitive collapse? to produce MM. (Countable completeness of 𝒰\mathcal{U} is necessary for V𝒰V^{\mathcal{U}} to be well-founded and thus have a transitive collapse.) Conversely, if j:V→Mj\colon V\to M is a nontrivial elementary embedding, it must have a critical point, i.e. a least ordinal κ\kappa such that j(κ)≠κj(\kappa)\neq \kappa. It follows that j(κ)j(\kappa) is some ordinal>κ\gt \kappa, so in particular κ∈j(κ)\kappa\in j(\kappa) (using the von Neumann definition of ordinals). Define 𝒰⊂P(κ)\mathcal{U}\subset P(\kappa) by A∈𝒰A\in \mathcal{U} iff κ∈j(A)\kappa\in j(A); then 𝒰\mathcal{U} is a κ\kappa-complete ultrafilter on κ\kappa. Stronger large cardinal axioms can be characterized, or defined, as the critical points of elementary embeddings satisfying additional closure axioms on the transitive class MM. In structural set theory Any elementary embedding of models of ZF induces a conservativelogical functor between their categories of sets. In fact, it is much more than that; a conservative logical functor preserves and reflects only first-order logic with bounded quantifiers, while an e.e. preserves and reflects all first-order logic. The structural meaning of elementary embeddings seems not to be well-explored. Inconsistency The “ultimate” closure property, hence the “strongest” large cardinal axiom, would be having a nontrivial elementary embedding j:V→Vj\colon V\to V (i.e. MM is all of VV). Sometimes the critical point of such an embedding, if one exists, is called a Reinhardt cardinal. However, having such an e.e. turns out to be inconsistent…sort of. The technicality is that because any e.e. V→VV\to V is a proper class, the proposition “there does not exist an e.e. V→VV\to V” cannot be stated in ZF (one cannot quantify over proper classes). What we can prove is the following meta-theorem (one instance per formula φ(x,y)\varphi(x,y) that might define an e.e.). Meta-Theorem For any formula φ(x,y,z)\varphi(x,y,z) and any set aa, it is not true that defining ja(x)=y⇔φ(x,y,a)j_a(x)=y \iff \varphi(x,y,a) makes jaj_a into an elementary embedding V→VV\to V. Proof Suppose that φ\varphi and aa exist. Fix such a φ\varphi. Fix λ\lambda as the smallest ordinal such that there exists an a∈Vλa\in V_\lambda such that φ(−,−,a)\varphi(-,-,a) defines an e.e. V→VV\to V. Now the statement “λ\lambda is the smallest ordinal such that there exists an a∈Vλa\in V_\lambda such that φ(−,−,a)\varphi(-,-,a) defines an e.e. V→VV\to V.” is definable in the language of ZF (definability of the property “is an e.e. V→VV\to V” is tricky, but true). Therefore, if bb is any set such that jbj_b is an e.e., it preserves the truth of this, so it is also true that jb(λ)j_b(\lambda) is the smallest ordinal such that there exists an a∈Vjb(λ)a\in V_{j_b(\lambda)} such that φ(−,−,a)\varphi(-,-,a) defines an e.e. V→VV\to V. This clearly implies that jb(λ)=λj_b(\lambda)=\lambda. Now define κ\kappa to be the smallest ordinal which is a critical point of an e.e. V→VV\to V of the form jaj_a for some a∈Vλa\in V_\lambda. Let b∈Vλb\in V_\lambda be such that jbj_b is an e.e. V→VV\to V and κ\kappa is the critical point of jbj_b. The definition of κ\kappa is again a definable property, so it follows that jb(κ)j_b(\kappa) is the smallest ordinal which is a critical point of an e.e. V→VV\to V of the form jaj_a for some a∈Vjb(λ)=Vλa\in V_{j_b(\lambda)} = V_\lambda. Therefore, κ=jb(κ)\kappa= j_b(\kappa), a contradiction to κ\kappa being the critical point of jbj_b. Now, if we work instead in a theory such as NBG or MK which can contain non-definable proper classes, in theory there might still be an e.e. V→VV\to V which is not definable. One can also access such an idea by adding a new symbol “jj” to ZF and asserting that it is an e.e. However, it was shown by Kunen in 1971, using a technical combinatorial argument, that the existence of such an e.e. is inconsistent with the axiom of choice. It is unknown whether it is consistent with ZF.
Altitude-related illness. There are a number of conditions which can be grouped together as ARI. Many represent potentially fatal pathophysiological states that are rapidly reversible if identified and treated properly. Physiological alterations that result from the hypobaric hypoxia of altitude include cerebral vasodilatation, altered ventilatory patterns, pulmonary vasoconstriction, decreased cardiac output, and altered fluid and electrolyte balance. The various altitude-related illnesses represent a spectrum of conditions with overlapping presentations. The symptoms of AMS and HACE represent a continuum of disease that appears to be related to alterations in cerebrovascular autoregulation. High-altitude retinal hemorrhage may be related to similar vascular events in the retinal circulation. Although the etiology of HAPE remains unclear, it is likely that alterations of pulmonary vascular tone and flow play an important roles in its production. Knowledge regarding ARI is important in planning prophylaxis and instituting therapy. Gradual ascent and acclimatization are the mainstays of prophylaxis. Pharmacological prophylaxis is available for those who are prone to severe AMS. Prompt recognition, descent, and administration of oxygen constitute the major therapies for severe ARI. The ability to perform these three tasks can rapidly reverse a potentially fatal illness.
Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd published:08 Feb 2013 views:133549 BIOLOGY published:06 Mar 2016 views:37494 Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to understand the interrelationship amongst different groups of organisms.  It serves as a base for the development of their biological sciences as well as different fields of applied biology like public health, environment etc. Mail us at :info@m-learning.in Download our app from Google Play Store and App Store published:09 Jul 2016 views:213943 There is a brief description of criteria used to classify organisms into five kingdoms in this session. Call 9099020032 Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. published:21 Apr 2015 views:2215469 Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk published:10 Apr 2017 views:4281053 @Magisto published:25 Mar 2018 views:28 Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are often included in wills and end of life plans as they can easily outlive their owners. The oldest living macaw is a foul-mouthed blue macaw named Charlie the Curser. She was supposedly born in 1899 and is still alive to this day. Charlie’s current owner claims to have purchased the bird from Winston Churchill’s estate after Churchill died in 1965. He also claims the bird was Winston Churchill’s favorite pet. This claim, however, is hotly debated. What is certain that whoever owned Charlie during World War II taught her dirty phrases about Hitler and the Nazis. Later on, she was kept in the back of a shop where all of the workers would teach her all kinds of swear words. In fact, Charlie’s potty mouth was such a problem that the current owner couldn’t sell Charlie in as he had originally planned. Now Charlie is much older and rarely makes any noise so it is hard to say. Journalists have tried to interview her to no avail. 11. Elephants Elephants, depending on the species, can live up to 60 or 70 years in ideal conditions. However, it is difficult to really determine their average age as they face many threats in the wild from poachers, and in Asia many are used as labor animals so they tend to live about 40 years. A recent study in Zimbabwe found that female African elephants can potentially remain fertile up until their death. Another study in 2008 suggested that wild elephants do much better than elephants in zoos, whose lifespan is only about 20 years which is quite shocking. Despite all that, the oldest elephant on record was a captive Asian elephant named Lin Wang. Wang died in a Taiwanese zoo at the age of 86. Over those nearly nine decades, Wang managed to live a very adventurous life. He moved supplies for the Japanese army during World War II before the Chinese captured him along with a dozen other elephants. He survived a trek from China to Burma that killed six elephants. While in Burma, he helped build monuments and joined a circus. In 1949, Wang was taken to Taiwan with people fleeing the new Communist regime in China. Of the original 13 captured elephants, he was the last one alive. He was placed in the zoo where he lived until he died in 2003. 10. Long-finned Eel The long-finned eel is native to New Zealand and Australia. They often live up to sixty years old. Two interesting facts about these eels. First, they only breed once and only at the end of their lives. They leave their rivers to go to the sea to breed. Secondly, the Maori word for eel is “tuna”. The oldest living long-finned eel is recorded to have been 106 years old. It’s believed that their long lifespans come from the fact that these eels grow really slowly and have a slow metabolism. 9. Tuatara We usually refer to an old person or thing as a “dinosaur”. When it comes to tuataras, it is less a metaphor and more of an accurate description. The two species of this lizard are the surviving members of an older one that flourished 200 million years ago. Tuataras are living dinosaurs! They are also the longest-lived vertebrates. Some individuals have lived between 100 and 200 years old! Currently, a tuatara named Henry is the oldest of its kind in New Zealand. Henry is 120 years old and lives at the Southland Museum and Art Gallery. He’s still fertile in his old age, successfully becoming a father at the age of 111. In 2015, Henry had the honor of meeting Prince Harry of Wales. 8. Red Sea Urchins Found only in the Pacific Ocean, mostly along North America’s west coast, the red sea urchin lives in shallow, sometimes rocky waters. They prefer calmer waters to wavy areas. What makes these spiky sea creatures so interesting is their long life span. Some specimens have been discovered to be more than 200 years old. However, the average life span appears to be more like fifty years. Nature is rough and many animals are not able to live to their full potential. Another interesting thing is that they seem to show no signs of aging. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals! Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com Catch 22 Live Live! is Catch 22's first full-length live release, although fan-recorded live tracks were bonus features on several previous albums. Roughly a third of the album is devoted to Keasbey Nights, another third to Alone in a Crowd, and the remainder to Dinosaur Sounds. A bonus DVD includes footage from the concert, as well as a variety of extras. However, former frontman Tomas Kalnoky is conspicuously absent from the footage of the band's early days. Live (The Dubliners album) Live is an album by The Dubliners recorded live at the Fiesta Club,Sheffield and released on the Polydor label in 1974. This was to be Ronnie Drew's last recording with The Dubliners for five years as he left to pursue a solo career. Also following this album, Ciarán Bourke ceased to be a full-time member of the group when he suffered a brain hemorrhage. He sings "All for Me Grog" here. The reels that open this album (and which first were released on the group's 1967 studio album A Drop of the Hard Stuff) have become the opening instrumental medley at most of their concerts since. Live (Jake Shimabukuro album) Live is Jake Shimabukuro's 2009 solo album. It was released in April 2009, and consists of live in-concert performances from various venues around the world, including New York, Chicago, Japan, and Hawaii. Live peaked at number 5 in Billboard's Top World Music Albums in 2009 and 2010. The album won the 2010 Na Hoku Hanohano Award for Instrumental Album of the Year, and also garnered Shimabukuro the award for Favorite Entertainer of the Year. In addition, it won the 2010 Hawaii Music Award for Best Ukulele Album. AllMusic noted that, "Shimabukuro is a monster musician and boldly takes the ukulele where no ukulele has ever gone before, dazzling listeners with his blinding speed, melodic invention, and open-ended improvisations of remarkable virtuosity. Before Shimabukuro, the idea of spending an evening listing to a solo ukulele player was probably most people's idea of hell, but the 17 solo efforts here never bore. They show Shimabukuro's range and his humor as well." Living (EP) The Living EP is the first EP from The band Josephine Collective on the Warner Bros. record company. Produced by the legendary John Feldmann it is a "perfect blend of stuck-in-your-head choruses and smooth melodies". "Living" is the prelude to Josephine Collective's debut full length on Warner Brothers Records We Are The Air. Real Lives (TV channel) Real Lives is a British television channel owned by Sky plc. It is the sister channel of Sky Living. It was originally known as LIVINGtv2 from the channel's launch in 2004 till 2007, and then was known as Living2 from 2007 to 2009. The channel mainly shows highlights of programming from the main channel, along with extended coverage of its reality programmes, such as I'm Famous and Frightened Extra! and Most Haunted Live. However, the channel has gained the American reality TV series, The Amazing Race. The channel has also shown more lifestyle and health related programmes such as Baby ER, Birth Stories, Downsize Me and Wedding SOS. Every morning from 10am to 12pm, there used to be a programming slot called Baby Zone, in which programmes related to pregnancy and birth were shown. Programmes included Birth Days, Maternity Ward and Babies: Special Delivery. A one hour timeshift version of the channel launched on 5 February 2009, replacing Trouble +1. Living2 was rebranded as Livingit on 30 November 2009, following problems making viewers understand that the channel is not a time-shifted version of the main channel. The relaunch was accompanied by new programming under the strapline "Life's worth watching". The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd 7:22 The Cell - The Functional and Structural Unit of all Living Organisms The Cell - The Functional and Structural Unit of all Living Organisms The Cell - The Functional and Structural Unit of all Living Organisms BIOLOGY 35:26 Diversity In Living Organisms: - What is Diversity? - 01 For Class 9th & NTSE Diversity In Living Organisms: - What is Diversity? - 01 For Class 9th & NTSE Diversity In Living Organisms: - What is Diversity? - 01 For Class 9th & NTSE Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to understand the interrelationship amongst different groups of organisms.  It serves as a base for the development of their biological sciences as well as different fields of applied biology like public health, environment etc. Mail us at :info@m-learning.in Download our app from Google Play Store and App Store Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. 12:25 10 Terrifying Creatures Created By Science 10 Terrifying Creatures Created By Science 10 Terrifying Creatures Created By Science Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk 1:00 Live Organisms All Around Live Organisms All Around Live Organisms All Around @Magisto 12:17 LONGEST Living Organisms In The World! LONGEST Living Organisms In The World! LONGEST Living Organisms In The World! Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are often included in wills and end of life plans as they can easily outlive their owners. The oldest living macaw is a foul-mouthed blue macaw named Charlie the Curser. She was supposedly born in 1899 and is still alive to this day. Charlie’s current owner claims to have purchased the bird from Winston Churchill’s estate after Churchill died in 1965. He also claims the bird was Winston Churchill’s favorite pet. This claim, however, is hotly debated. What is certain that whoever owned Charlie during World War II taught her dirty phrases about Hitler and the Nazis. Later on, she was kept in the back of a shop where all of the workers would teach her all kinds of swear words. In fact, Charlie’s potty mouth was such a problem that the current owner couldn’t sell Charlie in as he had originally planned. Now Charlie is much older and rarely makes any noise so it is hard to say. Journalists have tried to interview her to no avail. 11. Elephants Elephants, depending on the species, can live up to 60 or 70 years in ideal conditions. However, it is difficult to really determine their average age as they face many threats in the wild from poachers, and in Asia many are used as labor animals so they tend to live about 40 years. A recent study in Zimbabwe found that female African elephants can potentially remain fertile up until their death. Another study in 2008 suggested that wild elephants do much better than elephants in zoos, whose lifespan is only about 20 years which is quite shocking. Despite all that, the oldest elephant on record was a captive Asian elephant named Lin Wang. Wang died in a Taiwanese zoo at the age of 86. Over those nearly nine decades, Wang managed to live a very adventurous life. He moved supplies for the Japanese army during World War II before the Chinese captured him along with a dozen other elephants. He survived a trek from China to Burma that killed six elephants. While in Burma, he helped build monuments and joined a circus. In 1949, Wang was taken to Taiwan with people fleeing the new Communist regime in China. Of the original 13 captured elephants, he was the last one alive. He was placed in the zoo where he lived until he died in 2003. 10. Long-finned Eel The long-finned eel is native to New Zealand and Australia. They often live up to sixty years old. Two interesting facts about these eels. First, they only breed once and only at the end of their lives. They leave their rivers to go to the sea to breed. Secondly, the Maori word for eel is “tuna”. The oldest living long-finned eel is recorded to have been 106 years old. It’s believed that their long lifespans come from the fact that these eels grow really slowly and have a slow metabolism. 9. Tuatara We usually refer to an old person or thing as a “dinosaur”. When it comes to tuataras, it is less a metaphor and more of an accurate description. The two species of this lizard are the surviving members of an older one that flourished 200 million years ago. Tuataras are living dinosaurs! They are also the longest-lived vertebrates. Some individuals have lived between 100 and 200 years old! Currently, a tuatara named Henry is the oldest of its kind in New Zealand. Henry is 120 years old and lives at the Southland Museum and Art Gallery. He’s still fertile in his old age, successfully becoming a father at the age of 111. In 2015, Henry had the honor of meeting Prince Harry of Wales. 8. Red Sea Urchins Found only in the Pacific Ocean, mostly along North America’s west coast, the red sea urchin lives in shallow, sometimes rocky waters. They prefer calmer waters to wavy areas. What makes these spiky sea creatures so interesting is their long life span. Some specimens have been discovered to be more than 200 years old. However, the average life span appears to be more like fifty years. Nature is rough and many animals are not able to live to their full potential. Another interesting thing is that they seem to show no signs of aging. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals! First Animal to Survive in Space Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com 18:25 Life Processes In Living Organisms | Science For Kids | Periwinkle Life Processes In Living Organisms | Science For Kids | Periwinkle Life Processes In Living Organisms | Science For Kids | Periwinkle Life Processes In Living Organisms | Science For Kids 0:07 Transportation In Plants 3:35 Transport of Food and Other Substances 5:53 Excretion in Humans 9:36 Excretion in Plants 13:47 Homeostasis 14:45 Co-ordination in Plants Watch our other videos: EnglishStories for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfRHdJ4Q1IYX58jTNFJL60o English Poems for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfdUZWKOgzL_tvEE9gnrO8_ English Grammar for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadeOXsk1AGM6TgMrIkxLQIGP Hindi Stories: https://www.youtube.com/playlist?list=PLC1df0pCmade3ewXfVcrIdo0os76Epk1d Science Videos: https://www.youtube.com/playlist?list=PLC1df0pCmadfv-D3JU1DiacOsAUhgWGwr For more such videos on English Stories, English Grammar, English Stories, Poem & Rhymes, Hindi Stories and Poems, Maths, Environmental Studies and Science @ https://www.youtube.com/PeriwinkleKids Don't forget to subscribe! Like us on Facebook: https://www.facebook.com/PeriwinkleKids/ Follow us on Twitter: https://twitter.com/Periwinkle_Kids Follow us on Google Plus: https://plus.google.com/+PeriwinkleKids Website: http://www.e-periwinkle.in/ The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd published: 08 Feb 2013 The Cell - The Functional and Structural Unit of all Living Organisms BIOLOGY published: 06 Mar 2016 Diversity In Living Organisms: - What is Diversity? - 01 For Class 9th & NTSE Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to un... Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. published: 21 Apr 2015 10 Terrifying Creatures Created By Science Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk published: 10 Apr 2017 Live Organisms All Around @Magisto published: 25 Mar 2018 LONGEST Living Organisms In The World! Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are oft... organisms and surroundings First Animal to Survive in Space Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com published: 04 Sep 2012 Life Processes In Living Organisms | Science For Kids | Periwinkle Life Processes In Living Organisms | Science For Kids 0:07 Transportation In Plants 3:35 Transport of Food and Other Substances 5:53 Excretion in Humans 9:36 Excretion in Plants 13:47 Homeostasis 14:45 Co-ordination in Plants Watch our other videos: EnglishStories for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfRHdJ4Q1IYX58jTNFJL60o English Poems for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfdUZWKOgzL_tvEE9gnrO8_ English Grammar for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadeOXsk1AGM6TgMrIkxLQIGP Hindi Stories: https://www.youtube.com/playlist?list=PLC1df0pCmade3ewXfVcrIdo0os76Epk1d Science Videos: https://www.youtube.com/playlist?list=PLC1df0pCmadfv-D3JU1DiacOsAUhgWGwr For more such videos on English Stories, English Grammar, English Stori... The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home... Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to understand the interrelationship amongst different groups of organisms.  It serves as a base for the development of their biological sciences as well as different fields of applied biology like public health, environment etc. Mail us at :info@m-learning.in Download our app from Google Play Store and App Store Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to understand the interrelationship amongst different groups of organisms.  It serves as a base for the development of their biological sciences as well as different fields of applied biology like public health, environment etc. Mail us at :info@m-learning.in Download our app from Google Play Store and App Store Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear ... Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. 10 Terrifying Creatures Created By Science Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals... Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk LONGEST Living Organisms In The World! Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth ... Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are often included in wills and end of life plans as they can easily outlive their owners. The oldest living macaw is a foul-mouthed blue macaw named Charlie the Curser. She was supposedly born in 1899 and is still alive to this day. Charlie’s current owner claims to have purchased the bird from Winston Churchill’s estate after Churchill died in 1965. He also claims the bird was Winston Churchill’s favorite pet. This claim, however, is hotly debated. What is certain that whoever owned Charlie during World War II taught her dirty phrases about Hitler and the Nazis. Later on, she was kept in the back of a shop where all of the workers would teach her all kinds of swear words. In fact, Charlie’s potty mouth was such a problem that the current owner couldn’t sell Charlie in as he had originally planned. Now Charlie is much older and rarely makes any noise so it is hard to say. Journalists have tried to interview her to no avail. 11. Elephants Elephants, depending on the species, can live up to 60 or 70 years in ideal conditions. However, it is difficult to really determine their average age as they face many threats in the wild from poachers, and in Asia many are used as labor animals so they tend to live about 40 years. A recent study in Zimbabwe found that female African elephants can potentially remain fertile up until their death. Another study in 2008 suggested that wild elephants do much better than elephants in zoos, whose lifespan is only about 20 years which is quite shocking. Despite all that, the oldest elephant on record was a captive Asian elephant named Lin Wang. Wang died in a Taiwanese zoo at the age of 86. Over those nearly nine decades, Wang managed to live a very adventurous life. He moved supplies for the Japanese army during World War II before the Chinese captured him along with a dozen other elephants. He survived a trek from China to Burma that killed six elephants. While in Burma, he helped build monuments and joined a circus. In 1949, Wang was taken to Taiwan with people fleeing the new Communist regime in China. Of the original 13 captured elephants, he was the last one alive. He was placed in the zoo where he lived until he died in 2003. 10. Long-finned Eel The long-finned eel is native to New Zealand and Australia. They often live up to sixty years old. Two interesting facts about these eels. First, they only breed once and only at the end of their lives. They leave their rivers to go to the sea to breed. Secondly, the Maori word for eel is “tuna”. The oldest living long-finned eel is recorded to have been 106 years old. It’s believed that their long lifespans come from the fact that these eels grow really slowly and have a slow metabolism. 9. Tuatara We usually refer to an old person or thing as a “dinosaur”. When it comes to tuataras, it is less a metaphor and more of an accurate description. The two species of this lizard are the surviving members of an older one that flourished 200 million years ago. Tuataras are living dinosaurs! They are also the longest-lived vertebrates. Some individuals have lived between 100 and 200 years old! Currently, a tuatara named Henry is the oldest of its kind in New Zealand. Henry is 120 years old and lives at the Southland Museum and Art Gallery. He’s still fertile in his old age, successfully becoming a father at the age of 111. In 2015, Henry had the honor of meeting Prince Harry of Wales. 8. Red Sea Urchins Found only in the Pacific Ocean, mostly along North America’s west coast, the red sea urchin lives in shallow, sometimes rocky waters. They prefer calmer waters to wavy areas. What makes these spiky sea creatures so interesting is their long life span. Some specimens have been discovered to be more than 200 years old. However, the average life span appears to be more like fifty years. Nature is rough and many animals are not able to live to their full potential. Another interesting thing is that they seem to show no signs of aging. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals! Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are often included in wills and end of life plans as they can easily outlive their owners. The oldest living macaw is a foul-mouthed blue macaw named Charlie the Curser. She was supposedly born in 1899 and is still alive to this day. Charlie’s current owner claims to have purchased the bird from Winston Churchill’s estate after Churchill died in 1965. He also claims the bird was Winston Churchill’s favorite pet. This claim, however, is hotly debated. What is certain that whoever owned Charlie during World War II taught her dirty phrases about Hitler and the Nazis. Later on, she was kept in the back of a shop where all of the workers would teach her all kinds of swear words. In fact, Charlie’s potty mouth was such a problem that the current owner couldn’t sell Charlie in as he had originally planned. Now Charlie is much older and rarely makes any noise so it is hard to say. Journalists have tried to interview her to no avail. 11. Elephants Elephants, depending on the species, can live up to 60 or 70 years in ideal conditions. However, it is difficult to really determine their average age as they face many threats in the wild from poachers, and in Asia many are used as labor animals so they tend to live about 40 years. A recent study in Zimbabwe found that female African elephants can potentially remain fertile up until their death. Another study in 2008 suggested that wild elephants do much better than elephants in zoos, whose lifespan is only about 20 years which is quite shocking. Despite all that, the oldest elephant on record was a captive Asian elephant named Lin Wang. Wang died in a Taiwanese zoo at the age of 86. Over those nearly nine decades, Wang managed to live a very adventurous life. He moved supplies for the Japanese army during World War II before the Chinese captured him along with a dozen other elephants. He survived a trek from China to Burma that killed six elephants. While in Burma, he helped build monuments and joined a circus. In 1949, Wang was taken to Taiwan with people fleeing the new Communist regime in China. Of the original 13 captured elephants, he was the last one alive. He was placed in the zoo where he lived until he died in 2003. 10. Long-finned Eel The long-finned eel is native to New Zealand and Australia. They often live up to sixty years old. Two interesting facts about these eels. First, they only breed once and only at the end of their lives. They leave their rivers to go to the sea to breed. Secondly, the Maori word for eel is “tuna”. The oldest living long-finned eel is recorded to have been 106 years old. It’s believed that their long lifespans come from the fact that these eels grow really slowly and have a slow metabolism. 9. Tuatara We usually refer to an old person or thing as a “dinosaur”. When it comes to tuataras, it is less a metaphor and more of an accurate description. The two species of this lizard are the surviving members of an older one that flourished 200 million years ago. Tuataras are living dinosaurs! They are also the longest-lived vertebrates. Some individuals have lived between 100 and 200 years old! Currently, a tuatara named Henry is the oldest of its kind in New Zealand. Henry is 120 years old and lives at the Southland Museum and Art Gallery. He’s still fertile in his old age, successfully becoming a father at the age of 111. In 2015, Henry had the honor of meeting Prince Harry of Wales. 8. Red Sea Urchins Found only in the Pacific Ocean, mostly along North America’s west coast, the red sea urchin lives in shallow, sometimes rocky waters. They prefer calmer waters to wavy areas. What makes these spiky sea creatures so interesting is their long life span. Some specimens have been discovered to be more than 200 years old. However, the average life span appears to be more like fifty years. Nature is rough and many animals are not able to live to their full potential. Another interesting thing is that they seem to show no signs of aging. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals! First Animal to Survive in Space Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video her... Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com Life Processes In Living Organisms | Science For Kids 0:07 Transportation In Plants 3:35 Transport of Food and Other Substances 5:53 Excretion in Humans 9:36 Excretion in Plants 13:47 Homeostasis 14:45 Co-ordination in Plants Watch our other videos: EnglishStories for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfRHdJ4Q1IYX58jTNFJL60o English Poems for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfdUZWKOgzL_tvEE9gnrO8_ English Grammar for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadeOXsk1AGM6TgMrIkxLQIGP Hindi Stories: https://www.youtube.com/playlist?list=PLC1df0pCmade3ewXfVcrIdo0os76Epk1d Science Videos: https://www.youtube.com/playlist?list=PLC1df0pCmadfv-D3JU1DiacOsAUhgWGwr For more such videos on English Stories, English Grammar, English Stories, Poem & Rhymes, Hindi Stories and Poems, Maths, Environmental Studies and Science @ https://www.youtube.com/PeriwinkleKids Don't forget to subscribe! Like us on Facebook: https://www.facebook.com/PeriwinkleKids/ Follow us on Twitter: https://twitter.com/Periwinkle_Kids Follow us on Google Plus: https://plus.google.com/+PeriwinkleKids Website: http://www.e-periwinkle.in/ Life Processes In Living Organisms | Science For Kids 0:07 Transportation In Plants 3:35 Transport of Food and Other Substances 5:53 Excretion in Humans 9:36 Excretion in Plants 13:47 Homeostasis 14:45 Co-ordination in Plants Watch our other videos: EnglishStories for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfRHdJ4Q1IYX58jTNFJL60o English Poems for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfdUZWKOgzL_tvEE9gnrO8_ English Grammar for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadeOXsk1AGM6TgMrIkxLQIGP Hindi Stories: https://www.youtube.com/playlist?list=PLC1df0pCmade3ewXfVcrIdo0os76Epk1d Science Videos: https://www.youtube.com/playlist?list=PLC1df0pCmadfv-D3JU1DiacOsAUhgWGwr For more such videos on English Stories, English Grammar, English Stories, Poem & Rhymes, Hindi Stories and Poems, Maths, Environmental Studies and Science @ https://www.youtube.com/PeriwinkleKids Don't forget to subscribe! Like us on Facebook: https://www.facebook.com/PeriwinkleKids/ Follow us on Twitter: https://twitter.com/Periwinkle_Kids Follow us on Google Plus: https://plus.google.com/+PeriwinkleKids Website: http://www.e-periwinkle.in/ The Living Organisms And Their Surroundings -- Habitat and Adaptation - Class 7 Livings things exist in most places. Life exists even in open volcanoes. The term habitat refers to the surroundings where organisms live. Every habitat is home for a certain living creature. Habitat includes both living and non-living components. Plants and animals have different features that help them to survive in their own habitat. Habitat can be terrestrial or aquatic. Terrestrial habitat refers to the land where all plants and animals survive. It includes deserts, forests and grasslands, as well as coastal and mountain regions. For example, camels and cactus plants live in deserts only. Read more at https://www.learnnext.com/lesson/CBSE-VI-Science-Habitat-Adaptation.htm To watch the complete lesson, register to get 5-day full access for free visit - http://bit.ly/2KbImVd Diversity In Living Organisms: - What is Diversity? - 01 For Class 9th & NTSE Visit our website: https://www.m-learning.in Call Us at : (+91)9826023696, 9826023096. DIVERSITY: Diversity means = variety. Different places on the earth have their own typical kinds of living beings. This gives rise to the need of classification. So “Diversity is the need of classification”.  Classification is the theory and practice of classifying organisms. It is the systematic arrangement of organisms on the basis of their relatedness.  Classification is the arrangement of organisms into sets or groups according to the similarities and dissimilarities present between them. (a) Advantages / Significance of Classification:  It establishes hierarchy of groups of organisms on the basis of their common features.  It makes the systematic study easier.  It is essential to understand the interrelationship amongst different groups of organisms.  It serves as a base for the development of their biological sciences as well as different fields of applied biology like public health, environment etc. Mail us at :info@m-learning.in Download our app from Google Play Store and App Store Living and Nonliving Things. Things which can grow, move, breathe and reproduce are called living things. Living things can also feel emotions like anger, fear and happiness. After growing and living for a long time living things ultimately die. Examples of living things are human beings, animals and plants. Plants cannot move from one place to another. However, plants move their stem to face the sun. Hence, they are also living things. Things which cannot grow, move, breathe and reproduce are called nonliving things. They do not have any kind of life in them. Examples of nonliving things are rocks, bucket and water. 10 Terrifying Creatures Created By Science Has science gone too far? Well, it has created these bizarre creatures. From super buff cows to featherless chickens, these are the creepiest, freakiest animals to ever come out of labs. Click to Subscribe..http://bit.ly/WTVC4x Check out the best of Alltime10s - https://www.youtube.com/playlist?list=PLec1lxRhYOzt2qqqnFBIpUm63wr5yhLF6 Where else to find All Time 10s...Facebook: http://ow.ly/3FNFR Twitter: http://ow.ly/3FNMk LONGEST Living Organisms In The World! Check out the oldest living organisms in the world! From immortal creatures to strange and crazy lifeforms, this top 10 list of longest living species on earth is amazing! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "IMMORTAL Organisms Around The World!" video here: https://youtu.be/mDcbe1TWals Watch our "AnimalsFound FROZEN In Ice!" video here: https://youtu.be/6Fpf0mBnQsA Watch our "AMAZING Animal Superpowers!" video here: https://youtu.be/RWrJtOVN_y4 12. Macaws Macaws are the largest type of parrot and their bright colors are perfect for their life in the forest! Native to South America, these birds can live anywhere between 60 and 80 years! Almost all macaw species are either threatened, critically endangered or extinct. Because of their long life, pet macaws are often included in wills and end of life plans as they can easily outlive their owners. The oldest living macaw is a foul-mouthed blue macaw named Charlie the Curser. She was supposedly born in 1899 and is still alive to this day. Charlie’s current owner claims to have purchased the bird from Winston Churchill’s estate after Churchill died in 1965. He also claims the bird was Winston Churchill’s favorite pet. This claim, however, is hotly debated. What is certain that whoever owned Charlie during World War II taught her dirty phrases about Hitler and the Nazis. Later on, she was kept in the back of a shop where all of the workers would teach her all kinds of swear words. In fact, Charlie’s potty mouth was such a problem that the current owner couldn’t sell Charlie in as he had originally planned. Now Charlie is much older and rarely makes any noise so it is hard to say. Journalists have tried to interview her to no avail. 11. Elephants Elephants, depending on the species, can live up to 60 or 70 years in ideal conditions. However, it is difficult to really determine their average age as they face many threats in the wild from poachers, and in Asia many are used as labor animals so they tend to live about 40 years. A recent study in Zimbabwe found that female African elephants can potentially remain fertile up until their death. Another study in 2008 suggested that wild elephants do much better than elephants in zoos, whose lifespan is only about 20 years which is quite shocking. Despite all that, the oldest elephant on record was a captive Asian elephant named Lin Wang. Wang died in a Taiwanese zoo at the age of 86. Over those nearly nine decades, Wang managed to live a very adventurous life. He moved supplies for the Japanese army during World War II before the Chinese captured him along with a dozen other elephants. He survived a trek from China to Burma that killed six elephants. While in Burma, he helped build monuments and joined a circus. In 1949, Wang was taken to Taiwan with people fleeing the new Communist regime in China. Of the original 13 captured elephants, he was the last one alive. He was placed in the zoo where he lived until he died in 2003. 10. Long-finned Eel The long-finned eel is native to New Zealand and Australia. They often live up to sixty years old. Two interesting facts about these eels. First, they only breed once and only at the end of their lives. They leave their rivers to go to the sea to breed. Secondly, the Maori word for eel is “tuna”. The oldest living long-finned eel is recorded to have been 106 years old. It’s believed that their long lifespans come from the fact that these eels grow really slowly and have a slow metabolism. 9. Tuatara We usually refer to an old person or thing as a “dinosaur”. When it comes to tuataras, it is less a metaphor and more of an accurate description. The two species of this lizard are the surviving members of an older one that flourished 200 million years ago. Tuataras are living dinosaurs! They are also the longest-lived vertebrates. Some individuals have lived between 100 and 200 years old! Currently, a tuatara named Henry is the oldest of its kind in New Zealand. Henry is 120 years old and lives at the Southland Museum and Art Gallery. He’s still fertile in his old age, successfully becoming a father at the age of 111. In 2015, Henry had the honor of meeting Prince Harry of Wales. 8. Red Sea Urchins Found only in the Pacific Ocean, mostly along North America’s west coast, the red sea urchin lives in shallow, sometimes rocky waters. They prefer calmer waters to wavy areas. What makes these spiky sea creatures so interesting is their long life span. Some specimens have been discovered to be more than 200 years old. However, the average life span appears to be more like fifty years. Nature is rough and many animals are not able to live to their full potential. Another interesting thing is that they seem to show no signs of aging. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals! First Animal to Survive in Space Tardigrades or "Water Bears" are the only creatures that can survive the extreme conditions in the vacuum of outer space. Watch the comments response video here! http://bit.ly/Tardigrades-Response Read more at http://bit.ly/1tdR3PG SPACED OUT - produced by http://Motherboard.vice.com Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Check out the first episode of Spaced Out: http://bit.ly/Spaced-Out-001 Subscribe for new videos everyday: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com Life Processes In Living Organisms | Science For Kids | Periwinkle Life Processes In Living Organisms | Science For Kids 0:07 Transportation In Plants 3:35 Transport of Food and Other Substances 5:53 Excretion in Humans 9:36 Excretion in Plants 13:47 Homeostasis 14:45 Co-ordination in Plants Watch our other videos: EnglishStories for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfRHdJ4Q1IYX58jTNFJL60o English Poems for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadfdUZWKOgzL_tvEE9gnrO8_ English Grammar for Kids: https://www.youtube.com/playlist?list=PLC1df0pCmadeOXsk1AGM6TgMrIkxLQIGP Hindi Stories: https://www.youtube.com/playlist?list=PLC1df0pCmade3ewXfVcrIdo0os76Epk1d Science Videos: https://www.youtube.com/playlist?list=PLC1df0pCmadfv-D3JU1DiacOsAUhgWGwr For more such videos on English Stories, English Grammar, English Stories, Poem & Rhymes, Hindi Stories and Poems, Maths, Environmental Studies and Science @ https://www.youtube.com/PeriwinkleKids Don't forget to subscribe! Like us on Facebook: https://www.facebook.com/PeriwinkleKids/ Follow us on Twitter: https://twitter.com/Periwinkle_Kids Follow us on Google Plus: https://plus.google.com/+PeriwinkleKids Website: http://www.e-periwinkle.in/ Catch 22 Live Live! is Catch 22's first full-length live release, although fan-recorded live tracks were bonus features on several previous albums. Roughly a third of the album is devoted to Keasbey Nights, another third to Alone in a Crowd, and the remainder to Dinosaur Sounds. A bonus DVD includes footage from the concert, as well as a variety of extras. However, former frontman Tomas Kalnoky is conspicuously absent from the footage of the band's early days.
Q: Not sure how enable_if is used and why it's important After reading from a few websites, I think enable_if allows us to enable or restrict a type if a condition is true? I'm not quite sure, can someone clarify what it is exactly? I'm also not sure how it's used and in what scenarios it could be relevant within. I've also seen various ways its template parameters can be used, which further confused me. In how many ways can it be used? For instance, does the following mean that the return type should be bool if the type T is an int? typename std::enable_if<std::is_integral<T>::value,bool>::type is_odd (T i) {return bool(i%2);} A: To understand this we have to dive into SFINAE or "Substitution Failure Is Not An Error". This is a somewhat hard to grasp principle that is also at the heart of a lot of compile-time template tricks. Let us take a very simple example: #include <iostream> struct Bla { template <typename T, std::enable_if_t<std::is_integral<T>::value, int> = 0 > static void klaf(T t) { std::cout << "int" << std::endl; } template <typename T, std::enable_if_t<std::is_floating_point<T>::value, int> = 0 > static void klaf(T t) { std::cout << "float" << std::endl; } }; int main() { Bla::klaf(65); Bla::klaf(17.5); } Prints: int float Now, how does this work? Well, in the case of Bla::klaf(65) the compiler finds two functions that match the name, then once name lookup is over, it tries to select the best one by substituting the types (IMPORTANT: Name lookup happens first and only once, then substitution.) In substitution this happens (the second first, as it is more interesting): template <typename T, std::enable_if_t<std::is_floating_point<T>::value, int> = 0> static void klaf(T t) {...} -> T becomes int template <int, std::enable_if_t<std::is_floating_point<int>::value, int> = 0> static void klaf(int t) {...} -> is_floating_point<int>::value evaluates to false template <int, std::enable_if_t<false, int> = 0> static void klaf(int t) {...} -> enable_if_t<false,... evaluates to nothing template <int, = 0> static void klaf(int t) {...} -> the code is malformed: ", = 0" does not make sense. In normal code this would be a compile error, but this is templates and "Substitution Failure Is Not An Error". In other words; the compiler is happy if something substitutes into valid code, forget all the stuff that doesn't. And hey, the other Bla::klaf option does actually substitute into valid code: template <typename T, std::enable_if_t<std::is_integral<T>::value, int> = 0> static void klaf(T t) -> T becomes int template <int, std::enable_if_t<std::is_integral<int>::value, int> = 0> static void klaf(int t) -> is_integral<int>::value evaluates to true template <int, std::enable_if_t<true, int> = 0> static void klaf(int t) -> enable_if_t<true, int> evaluates to int template <int, int = 0> static void klaf(int t) -> This is actually valid code that the compiler can swallow.
How to adjust a car idle London's flamboyant mayor, Boris Johnson, has recently declared war on those motorists who pollute the city streets by idling. Pehaps you're not exactly sure what can be done about preventing harmful fumes being emitted while you wait at traffic lights, or at the drive-through window. But if you've never thought about how to adjust your car idle, here's what you should consider. Adjusting a car idle Before we get round to focussing on how to adjust a car idle, it would be worth outlining what happens when vehicles are idling. When your engine is running while the car isn't actually going anywhere, as in waiting for that aforemetioned red lights to change, then your engine is still working away, running without any loads bar the engine accessories. The reasons why this should be of any concern are mostly down to the potentially harmful effects of all those exhaust fumes being generated while the car remains stationary. Idling pollutants can have acute or chronic effects, ranging from irritation to the eyes and throat, an increased risk of adverse heart issues, right down to damage to sperm chromatin and DNA. Few drivers ever consider there is anything wrong with idling at that drive-through window, or while waiting to pick someone up, rather than switching off. But here's an eye-popping statistic for you: an estimated 3.8 billion litres of fuel a year is consumed by idling vehicles in the USA. Countering idling So far, the main strategies aimed at countering the effects of idling have been based on encouraging drivers to be more economic about fuel consumption. Vehicles are also being increasingly designed with built-in power units that enable engine accessories to run more efficiently while idling. The older your vehicle, the more its engine will either have a higher or lower idle speed than is required. This wastes fuel, or provokes stalling. The best way to resolve this it to take your vehicle into a garage to have it fine-tuned by a professional. Quick guide to adjusting a car idle Here is a quick overview on how to adjust a car idle:-1. Start the engine. Allow it to cycle through one period at a higher rev-per-minute rate. Once the engine is ticking over you'll be able to make the adjustment. 2. Find the throttle body (trace the air intake hose as it exits the air filter). Search on the body's sides until you find a screw, or rubber casing housing a screw. This is where you adjust the car idle. 3. Disconnect the idle air adjustment valve (which opens or closes depending on air intake) by locating the electrical connector behind the throttle body.
In recent years, a fluid control that utilizes a plasma actuator using dielectric barrier discharge has been vigorously studied. In the plasma actuator, for example, electrodes are arranged to sandwich a dielectric made of resin, ceramic, or the like. When an alternating voltage or a pulse voltage is applied between the electrodes, a plasma is generated in the vicinity of the electrode on the front side of the dielectric. The plasma actuator thus configured is mounted on a wing of a gas turbine to suppress separation of an airflow from the wing surface, as disclosed in Patent Document 1, for example. Similarly, Patent Document 2 discloses a plasma actuator used to suppress separation of an airflow. Additionally, a plasma actuator disposed on a Coanda surface of a wing of an aircraft as disclosed in Patent Document 3 is known as a plasma actuator used to control separation of an airflow. Patent Document 1: JP-A-2008-270110 Patent Document 2: JP-T-2009-511360 Patent Document 3: JP-A-2008-290710
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 15-1240 MONTGOMERY COUNTY, MARYLAND, Petitioner, CITY OF BURLINGAME, CALIFORNIA; TOWN OF APPLE VALLEY, CALIFORNIA, Intervenors/Petitioners, v. FEDERAL COMMUNICATIONS COMMISSION; UNITED STATES OF AMERICA, Respondents, CTIA - THE WIRELESS ASSOCIATION; PCIA - THE WIRELESS INFRASTRUCTURE ASSOCIATION, Intervenors, ------------------------------------- LEAGUE OF CALIFORNIA CITIES; CALIFORNIA STATE ASSOCIATION OF COUNTIES; LEAGUE OF OREGON CITIES; SCAN NATOA, INC., Amici Supporting Petitioner. No. 15-1284 CITY OF BELLEVUE, WASHINGTON; CITY OF LOS ANGELES, CALIFORNIA; CITY OF MCALLEN, TEXAS; CITY OF ONTARIO, CALIFORNIA; CITY OF REDWOOD CITY, CALIFORNIA; CITY OF SAN JOSE, CALIFORNIA; TEXAS COALITION OF CITIES OF UTILITY ISSUES, Petitioners, CITY OF BURLINGAME, CALIFORNIA; TOWN OF APPLE VALLEY, CALIFORNIA, Intervenors, v. FEDERAL COMMUNICATIONS COMMISSION; UNITED STATES OF AMERICA, Respondents, CTIA - THE WIRELESS ASSOCIATION; PCIA - THE WIRELESS INFRASTRUCTURE ASSOCIATION, Intervenors, -------------------------------------- LEAGUE OF CALIFORNIA CITIES; CALIFORNIA STATE ASSOCIATION OF COUNTIES; LEAGUE OF OREGON CITIES; SCAN NATOA, INC., Amici Supporting Petitioner. Petition for Review of an Order of the Federal Communications Commission. (FCC 14-153). Argued: October 28, 2015 Decided: December 18, 2015 Before GREGORY, DUNCAN and FLOYD, Circuit Judges. Denied by published opinion. Judge Duncan wrote the opinion, in which Judge Gregory and Judge Floyd joined. 2 ARGUED: Joseph Leonard Van Eaton, BEST BEST & KRIEGER LLP, Washington, D.C., for Petitioners/Intervenors. Maureen Katherine Flood, FEDERAL COMMUNICATIONS COMMISSION, Washington, D.C., for Respondent. Megan Leef Brown, WILEY REIN LLP, Washington, D.C., for Intervenors. ON BRIEF: Nicholas P. Miller, BEST BEST & KRIEGER LLP, Washington, D.C., for Petitioners/Intervenors. William J. Baer, Assistant Attorney General, Robert B. Nicholson, Steven J. Mintz, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C.; Jonathan B. Sallet, General Counsel, David M. Gossett, Deputy General Counsel, Richard K. Welch, Deputy Associate General Counsel, FEDERAL COMMUNICATIONS COMMISSION, Washington, D.C., for Respondents. Joshua S. Turner, Jeremy J. Broggi, WILEY REIN LLP, Washington, D.C., for Intervenors. Javan N. Rad, Chief Assistant City Attorney, Pasadena, California; Robert C. May, III, TELECOM LAW FIRM, PC, La Jolla, California, for Amici Curiae. 3 DUNCAN, Circuit Judge: Before the court is an administrative appeal challenging rules promulgated by the Federal Communications Commission (“FCC”). As part of a coalition of local authorities, Montgomery County, Maryland, petitions for review of the FCC’s October 17, 2014 Order (“the Order”), which issued rules implementing Section 6409(a) of the Middle Class Tax Relief and Job Creation Act of 2012, 47 U.S.C. § 1455(a), also known as the Spectrum Act. Petitioners contend that the procedures established in the Order conscript the states in violation of the Tenth Amendment, and that the Order unreasonably defines several terms of the Spectrum Act. For the reasons that follow, we conclude that the FCC’s Order is fully consonant with the Tenth Amendment. We further conclude that the FCC has reasonably interpreted the ambiguous terms of Section 6409(a) of the Spectrum Act. Accordingly, we deny the petition for review. I. To provide context for the issues raised in the petition, we first set forth the statutory and regulatory framework from which the FCC’s Order arises. In 2012, Congress passed the Spectrum Act as part of the Middle Class Tax Relief and Job Creation Act. The Spectrum Act 4 included, among other things, a series of measures designed to encourage the growth of a robust national telecommunications network. 1 At issue in this appeal is Section 6409(a) of the Spectrum Act, entitled “Wireless Facilities Deployment: Facilities Modifications.” 47 U.S.C. § 1455(a). Section 6409(a) addresses wireless providers’ efforts to expand their networks by modifying existing electronic equipment that sits atop towers and other structures. If, for example, a wireless provider wanted to collocate transmission equipment on an existing tower or other site in order to increase wireless service, the provider would ordinarily need to seek local zoning approval, because the modifications would alter the physical profile of the facility. Section 6409(a)(1) limits local authority to bar collocation or other modification efforts: [n]otwithstanding section 704 of the Telecommunications Act of 1996 (Public Law 104-104) or any other provision of law, a State or local government may not deny, and shall approve, any eligible facilities request for a modification of an existing wireless tower or base station that does not substantially change the physical dimensions of such tower or base station. 1For example, the Act reallocated a segment of the broadcast spectrum for public safety purposes, and authorized the FCC to auction part of the spectrum for commercial use. See 47 U.S.C. §§ 1421, 1451. 5 47 U.S.C. § 1455(a)(1). Section 6409(a)(2) defines the term “eligible facilities request” as follows: For purposes of this subsection, the term “eligible facilities request” means any request for modification of an existing wireless tower or base station that involves-- (A) collocation of new transmission equipment; (B) removal of transmission equipment; or (C) replacement of transmission equipment. 47 U.S.C. § 1455(a)(2). Together, these provisions forbid localities from exercising their zoning authority to deny providers’ requests to modify wireless equipment, so long as the proposed modification does not “substantially change the physical dimensions” of the facility. The statute does not define what kinds of modifications would qualify as substantial. Congress charged the FCC with implementing the Spectrum Act, 47 U.S.C. § 1403(a), and the FCC initiated that process by issuing a public notice of proposed rulemaking. See In re Acceleration of Broadband Deployment by Improving Wireless Facilities Siting Policies, 28 FCC Rcd. 14238 (Sept. 26, 2013). Following a contentious notice-and-comment period during which numerous parties submitted their views, the FCC issued an Order on October 17, 2014 implementing Section 6409(a). In re Acceleration of Broadband Deployment by Improving Wireless Facilities Siting Policies, 29 FCC Rcd. 12865 (Oct. 17, 2014), amended by 30 FCC Rcd. 31 (Jan. 5, 2015). These rules are codified at 47 C.F.R. § 1.40001. 6 The Order begins by noting the underlying Congressional concern that municipal permit review processes were hindering efforts to expand wireless networks. Despite the widely acknowledged need for additional wireless infrastructure, the process of deploying these facilities can be expensive, cumbersome, and time-consuming. . . . [Among other requirements], parties must typically obtain siting approval from the local municipality. . . . Although these review requirements serve important local and national interests, local and Federal review processes can slow deployment substantially, even in cases that do not present significant concerns. Order ¶¶ 9-10. With the aim of “reduc[ing] regulatory obstacles and bring[ing] efficiency to wireless facility siting,” the Order turned to the task of implementing Section 6409(a) and defining its terms. Id. ¶ 10. Two aspects of the Order are relevant to this appeal. The first implements the statute’s directive that localities “shall approve” applications by establishing what the Order calls a “deemed granted remedy.” Order ¶ 227. The second clarifies what kinds of physical modifications are “substantial,” and what types of facilities qualify as “wireless towers” and “base stations” within the meaning of the statute. We briefly summarize each before turning to Petitioners’ arguments. 7 A. To implement the Spectrum Act’s mandate that localities “shall approve” facility-modification requests covered by Section 6409(a), the Order establishes a so-called “deemed granted remedy.” Under this procedure, when a locality receives a covered facility-modification request, it has sixty days to review the application, if it elects to review the request at all. 47 C.F.R. § 1.40001(c). Within that sixty-day period, the locality “shall approve the application unless it determines that the application is not covered by this section.” 2 Id. § 1.40001(c)(2). If the locality fails to act before the sixty- day period expires, “the request shall be deemed granted.” Id. § 1.40001(c)(4). However, the grant “does not become effective until the applicant notifies the [locality] in writing after the review period has expired . . . that the application has been deemed granted.” Id. The rules authorize applicants to bring claims relating to Section 6409(a) applications in “any court of competent jurisdiction,” and the Order explains that this provision permits applicants to seek declaratory judgments memorializing the grant. Id. § 1.40001(c)(5); Order ¶¶ 235-36. 2 Of course, the locality may exercise its discretion to grant the request even if it determines that the facilities request is not covered by Section 6409(a). 8 The Order acknowledges that Section 6409(a) “does not expressly provide for a time limit or other procedural restrictions” on municipal review of applications. Order ¶ 212. However, the FCC determined that the “deemed granted remedy” was consistent with Section 6409(a), which states that localities “may not deny, and shall approve” qualifying applications. Id. ¶ 227. As the FCC explained, [t]his directive leaves no room for a lengthy and discretionary approach to reviewing an application that meets the statutory criteria; once the application meets these criteria, the law forbids the State or local government from denying it. . . . [W]ithholding a decision on an application indefinitely . . . would be tantamount to denying it, in contravention of the statute’s pronouncement that reviewing authorities “may not deny” qualifying applications. Id. In light of these concerns, the FCC concluded that “the text of Section 6409(a) supports adoption of a deemed granted remedy, which will directly serve the broader goal of promoting the rapid deployment of wireless infrastructure.” Id. B. The FCC’s Order also undertakes the task of interpreting several undefined terms. Order § V. Petitioners challenge two in particular: what is a “base station” that may be modified, and what does it mean to “substantially change” a facility? 9 First, the FCC defined the term base station to include “structures other than towers that support or house an antenna, transceiver, or other associated equipment,” even if the structure was not built primarily for that purpose. 3 Id. ¶ 21; 47 C.F.R. § 1.4001(b)(1)(iii). In other words, a base station can be any structure--for example, a building or a utility pole--that has transmission equipment installed on top. Second, the FCC has provided a multi-part definition establishing objective criteria for determining when a proposed modification “substantially changes the physical dimensions” of a facility: for towers outside of public rights-of-way, it increases the height by more than 20 feet or 10%, whichever is greater; for those towers in the rights- of-way and for all base stations, it increases the height of the tower or base station by more than 10% or 10 feet, whichever is greater; for towers outside of public rights-of-way, it protrudes from the edge of the tower more than twenty feet, or more than the width of the tower structure at the level of the appurtenance, whichever is greater; for those towers in the rights-of-way and for all base stations, it protrudes from the edge of the structure more than six feet; it involves installation of more than the standard number of new equipment cabinets for the technology involved, but not to exceed four cabinets; 3By contrast, a tower is a structure whose primary purpose is supporting communications equipment. 47 C.F.R. § 1.40001(b)(9). 10 it entails any excavation or deployment outside the current site of the tower or base station; it would defeat the existing concealment elements of the tower or base station; or it does not comply with conditions associated with the prior approval [of the facility] unless the non- compliance is due to [a change that does not constitute a “substantial change” under the preceding standards]. Order ¶ 21. 4 Notwithstanding this definition, the FCC explains in the Order that localities may continue to condition approval on compliance with “generally applicable building, structural, electrical, and safety codes” and other public safety laws. Id. ¶¶ 21, 202. And, of course, localities are permitted to deny applications if they determine that the proposed modification is not covered by the FCC’s Order implementing Section 6409(a), such as a proposal to add five equipment cabinets to a utility pole. II. On appeal, Petitioners contend that the FCC’s Order violates the Tenth Amendment by compelling the states to grant permit applications, and they assert that the Order defines 4 These standards are codified at 47 C.F.R. § 1.4001(b)(7). 11 certain statutory terms in a manner inconsistent with the text of the Act. We consider these arguments in turn. A. Petitioners argue that the Order violates the Tenth Amendment by compelling local and municipal governments to participate in federal regulatory efforts by approving infrastructure permits. Petitioners take particular issue with the “deemed granted” procedure, which they characterize as “direct regulation of the conduct of the locality’s legislative power, which the Tenth Amendment prohibits.” Petitioners’ Br. at 57. We have jurisdiction to review constitutional challenges to executive agency action pursuant to the Administrative Procedure Act, 5 U.S.C. § 706(2), which instructs a reviewing court to set aside agency action that is “contrary to constitutional right” or otherwise unlawful. As the Supreme Court discussed in Printz v. United States, 521 U.S. 898 (1997) and New York v. United States, 505 U.S. 144 (1992), the Tenth Amendment forbids the federal government from requiring states to enforce federal laws. In New York, the Court explained that [e]ven where Congress has the authority under the Constitution to pass laws requiring or prohibiting certain acts, it lacks the power directly to compel the States to require or prohibit those acts. . . . [T]he Commerce Clause, for example, authorizes 12 Congress to regulate interstate commerce directly; it does not authorize Congress to regulate state governments’ regulation of interstate commerce. 505 U.S. at 166. Thus, neither Congress nor the FCC may compel the states to administer federal regulatory programs or pass legislation. This “anti-commandeering” principle is cabined, however. For example, a law that conditions federal funding on state implementation of a federal program does not violate the Tenth Amendment, unless the inducement of the funding is “so coercive as to pass the point at which pressure turns into compulsion.” South Dakota v. Dole, 483 U.S. 203, 211 (1987) (quotation omitted); Kennedy v. Allera, 612 F.3d 261, 269 (4th Cir. 2010). Similarly, the Tenth Amendment presents no bar to a federal rule that asks the states to choose between regulating according to federal standards and having a federal agency step in to regulate. Verizon Maryland, Inc. v. Global NAPS, Inc., 377 F.3d 355, 368 (4th Cir. 2004). Upon review of the FCC’s Order, we readily conclude that the FCC’s “deemed granted” procedure comports with the Tenth Amendment. As a practical matter, the Order implementing Section 6409(a) does not require the states to take any action at all, because the “deemed granted” remedy obviates the need for the states to affirmatively approve applications. Instead, the “deemed granted” procedure allows the applications to be granted by default if the state does not affirmatively approve 13 them within sixty days. As the FCC points out in its Order, the point of the “deemed granted” provision is to ensure that collocation applications are not mired in the type of protracted approval processes that the Spectrum Act was designed to avoid. Order ¶ 227. Moreover, the “deemed granted” procedure provides a remedy to ensure that states do not circumvent statutory requirements by failing to act upon applications. Id. The purpose and effect of Section 6409(a) is to bar states from interfering with the expansion of wireless networks. To achieve that end, the Act preempts local regulation of collocations and bars states from denying facility modification applications that meet certain standards. The FCC’s Order does no more than implement the statute. Despite the fact that the Order does not require states to take any action at all, Petitioners insist that the Order commandeers the states and compels localities to administer the Spectrum Act. They argue that, even under a default-grant scenario, it is the state itself that is granting the application. Thus, according to Petitioners, the Order forces states to give collocation applications the imprimatur of state approval. But these applications are granted only by operation of federal law, and the Order permits applicants to initiate a declaratory judgment action to seek “some form of judicial imprimatur” for an application that has been deemed granted. 14 Id. ¶¶ 235-36. Therefore, if the permit “grants” bear the imprimatur of any authority, it is federal, and not local. For this reason, Petitioners cannot argue that the Order requires localities to exercise their legislative power to grant applications. Because the Order does not require the states to take any action whatsoever, the FCC’s rules are a far cry from the statute struck down in Printz, which required states to run background checks on handgun purchases. Printz, 521 U.S. at 904-05. Likewise, the Order bears no resemblance to the statute in New York, which required states to enact state laws providing for the disposal of radioactive waste within state borders or else take title and possession of the waste themselves. New York, 505 U.S. 151-52. Functionally, what has occurred here is that the FCC––pursuant to properly delegated Congressional authority––has preempted state regulation of wireless towers. That is entirely permissible under our system of federalism. We therefore conclude that Petitioners’ Tenth Amendment challenge lacks merit. B. Having determined that the FCC’s “deemed granted” procedure is constitutional, we next address Petitioners’ contention that 15 the FCC has unreasonably defined several terms of the Spectrum Act. Pursuant to the Administrative Procedure Act, we will set aside the FCC’s order only if we conclude that its rules are “arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.” 5 U.S.C. § 706(2)(A). Furthermore, the FCC’s interpretation of Section 6409(a) is entitled to deferential review under Chevron, USA, Inc. v. Natural Resources Defense Council, 467 U.S. 837 (1984). Under Chevron, “considerable weight should be accorded to an executive department’s construction of a statutory scheme it is entrusted to administer.” Id. at 844. Here, a Chevron analysis is appropriate because the issue before us involves the FCC’s interpretation of a statute it is charged with administering. See 47 U.S.C. § 1403(a). At step one of the Chevron framework, the court must determine whether Congress “has directly spoken to the precise question at issue,” or whether, instead, the terms are ambiguous. Othi v. Holder, 734 F.3d 259, 265 n.4 (4th Cir. 2013) (quoting Chevron, 467 U.S. at 842). There is no question that the terms of the Spectrum Act at issue here are ambiguous. 5 5 Petitioners do not dispute that the term “substantial” is ambiguous. With respect to the term “base station,” Petitioners assert, without further explanation, that “while the term ‘base (Continued) 16 Accordingly, this court’s review is governed by step two of the Chevron analysis, under which the sole inquiry is whether the FCC’s interpretation of the terms “is based on a permissible construction of the statute.” Schafer v. Astrue, 641 F.3d 49, 54 (4th Cir. 2011)(quoting Chevron, 467 U.S. at 843). Against this standard, we review Petitioners’ challenge to the manner in which the FCC has defined the two terms referenced earlier: “substantially change” and “base station.” 1. The FCC’s Order provides objective and numerical standards to establish when an eligible facilities request would “substantially change the physical dimensions” of the facility. For example, as we have noted, a change would be substantial if it entailed any excavation or deployment beyond the current site of the tower or base station. Petitioners challenge these standards on several grounds, but they have a common theme: Petitioners believe that station’ may be ambiguous in some regards (whether it includes power supplies located at a site, for example), its ordinary meaning does not include structures.” Petitioners’ Reply Br. at 17. Aside from this one sentence, Petitioners have entirely failed to engage with a Chevron analysis, and thus it is difficult to determine their position with respect to the ambiguity of this term. However, it is clear that “base station” is amenable to multiple interpretations, and thus we conclude that the term is ambiguous under Chevron step one. 17 municipalities should be able to review each facility application to determine whether the proposal would represent a “substantial” modification of the original structure. This argument, at its core, takes issue with the fact that the Spectrum Act displaces discretionary municipal control over certain facility modification requests. But that is exactly what Congress intended by forbidding localities from denying qualifying applications. The FCC’s objective criteria are entirely consistent with this purpose, because the concrete standards in the Order eliminate the need for protracted review. By providing concrete, non-discretionary standards, the FCC has limited the local review process to the simple question of whether the proposed modification falls within the statutory parameters. To avoid this conclusion, Petitioners style their argument as a question of statutory interpretation, claiming that the term “substantial” is not amenable to the objective standards the FCC has used, but instead requires a contextual inquiry. We find this argument to be unpersuasive, given that the provision at issue addresses “physical dimensions.” It was not unreasonable for the FCC to supply a strictly numerical definition of substantiality in this context, because the physical dimensions of objects are, by their very nature, 18 suitable for regulation through quantifiable standards. 6 Petitioners attempt to draw comparisons to laws employing a context-specific approach to analyzing work under copyright law, Petitioners’ Br. at 31, but it should be obvious that rules for comparing artwork and rules for determining whether the height of utility poles have been substantially increased need not employ the same analysis. Tellingly, Petitioners do not argue that the FCC should have supplied different objective standards for physical dimensions. 7 Nor do they argue that the FCC itself should 6 Along these same lines, Petitioners also argue that the FCC can only interpret the term “dimensions” if it passes regulations that address all three spatial dimensions of each facility. Petitioners’ Br. at 33-34. Specifically, according to Petitioners, the FCC’s interpretation of “substantially” is unreasonable because the FCC has focused on height and distance from a building, but not depth. Applying Chevron deference, we cannot conclude that it was unreasonable for the FCC to define “dimensions” without addressing in each instance the height, depth, width, and volume of each object. Nothing in the text of the statute appears to require such a granular approach. 7 For example, Petitioners point out that utility poles are typically around 37.5 feet high, and the FCC’s rules categorize as “insubstantial” a ten-foot increase of such a pole. Petitioners’ Br. at 38. Petitioners strenuously argue that such a ten-foot increase would be substantial, yet Petitioners do not offer any substitute numerical threshold. That is, Petitioners do not concede that a rule that permitted a five or even a three-foot increase of utility poles would be insubstantial. Thus, it appears that Petitioners are mainly challenging the FCC’s decision to select objective, numerical criteria, instead of preserving municipal discretion to review each application in context. In any event, we do not find that permitting a (Continued) 19 undertake to review each application for substantiality. Instead, Petitioners repeatedly argue that the FCC should have permitted municipalities to review applications on a case-by- case basis. See, e.g., Reply Br. at 8 n.8 (“[T]he rule, to be rational, should have allowed localities to review an attachment involving more than a de minimis increase or [sic] width.”). Thus, their dispute is not with the particular standards the FCC has selected, but with the fact that the FCC has set forth objective standards that divest municipalities of their reviewing discretion. This appeal is not the proper forum for municipal grievances about federal regulations that displace the discretion of local governments. See Chevron, 467 U.S. at 866 (“When a challenge to an agency construction of a statutory provision, fairly conceptualized, really centers on the wisdom of the agency's policy, rather than whether it is a reasonable choice within a gap left open by Congress, the challenge must fail.”). Contrary to Petitioners’ arguments, the FCC’s standards do incorporate considerations of context, even though they do not permit municipalities to conduct a contextual review of each facility. For example, under the FCC’s rules, the threshold for provider to raise a 37.5 foot pole to a height of 47.5 feet is an unreasonable interpretation of the term “substantial.” 20 substantiality is lower for modifications that occur in public rights-of-way. The Order also applies different standards to base stations than it does to towers (which are usually in more remote locations). Moreover, Section 6409(a) and the Order preserve the FCC’s obligations to conduct contextualized assessments of projects that affect historically or environmentally sensitive areas, and preserve local authority to condition approval on compliance with “generally applicable building, structural, electrical, and safety codes” and other public safety laws. See Order ¶ 21; 47 U.S.C. § 1455(a)(3) (“Nothing in [Section 6409(a)(1)] shall be construed to relieve the Commission from the requirements of the National Historic Preservation Act or the National Environmental Policy Act of 1969.”). The FCC has also preserved existing concealment requirements for facilities. Order ¶ 21; 47 C.F.R. § 1.40001(b)(7)(v). Thus, the Order does incorporate considerations of context in its definitions of substantiality. 8 8 Petitioners also argue that the FCC’s concrete standards are unreasonable, because although the FCC based them upon prior standards (set forth in “programmatic agreements”) relating to environmental and historical assessments of collocation projects, the FCC has neglected to include the discretionary elements of the prior approach. Petitioners’ Br. at 7-8, 39. The programmatic agreements set forth standards for determining when a proposed collocation project would be “substantial” such that a historical and environmental impact assessment was required. These standards permitted a complaint procedure, under which an application with a municipal complaint received (Continued) 21 Lastly, Petitioners argue that the FCC has erred by extending the Order’s rules to facilities that localities initially approved only on the condition that the facility not be modified in the future. According to Petitioners, any expansion of these facilities is per se “substantial” and allowing such facilities to expand runs counter to the purposes of the Spectrum Act. Petitioners reason that permitting modifications of these facilities will make the states wary of granting new permits out of fear that their conditions will not be honored (and that any grant of a permit may lead to expansions beyond the state’s control). These are policy arguments, not statutory interpretation arguments. The statutory interpretation question is simple. The FCC’s view is that, regardless of the circumstances under which a provider obtained permission to build a facility, now that it has been built, any expansion proposals are reviewed based upon whether additional review, either before or after the modification was constructed. Adding more stringent review procedures makes good sense in this context, where considerations of historical and environmental impact are at issue. By contrast, it was entirely reasonable for the FCC not to employ a complaint procedure in the broader context of general facilities applications. Regardless, the FCC has represented that municipalities may avail themselves of the FCC’s general waiver procedure if the FCC’s 6409(a) rules create outlier cases. See Respondent’s Br. at 43 (citing 47 C.F.R. § 1.925(b)(3)(i), (ii)). Thus, the waiver procedure provides a forum for municipal complaints, even if the procedure is not formally part of the Order. 22 the proposed expansion will substantially increase the size of the facility. This view is faithful to the text of Section 6409(a), which does not contain any exemptions for facilities that exist on condition of non-modification. We cannot conclude, under Chevron, that the FCC’s interpretation is unreasonable. 2. Finally, Petitioners argue that the FCC has erroneously defined the term “base station.” The FCC has defined “base station” to mean “the equipment and non-tower supporting structure at a fixed location that enable Commission-licensed or authorized wireless communications between user equipment and a communications network.” Order ¶ 167 (emphasis added). According to Petitioners, this definition is unreasonable because the term “base station” refers only to transmission equipment, and not the structure upon which the equipment sits, such as a utility pole. Petitioners also argue that defining “base station” to encompass support structures is unreasonable, because the FCC has never employed this definition in previous regulations. Regardless of how other regulations may have addressed base stations, defining that term to encompass support structures comports with the thrust of Section 6409(a). The statutory text places base stations on equal footing with towers, and the Act 23 clearly contemplates modifications of both types of facilities. Section 6409(a)(1) discusses “modification of an existing wireless tower or base station,” and Section 6409(a)(2) clarifies that modification includes “modification of an existing wireless tower or base station that involves . . . collocation of new transmission equipment.” Given that a wireless tower is essentially a support structure with electronic equipment on top, it would be anomalous to interpret the statute in a manner that permitted the FCC to define towers to encompass the entire structure, but forbade the FCC from defining base stations to encompass the entire facility. Moreover, the term “base station” is a term that must be defined in the context of its given regulatory scheme. Here, including support structures in the definition of base stations is consistent with Congress’s intent to promote the expansion of wireless networks through collocation. Considering that collocation often adds electronic equipment that requires structural enhancement to increase its load-bearing capacity, we agree with the FCC that collocation would be “conceptually impossible” if the definition of “base station” did not include support structures. Order ¶¶ 169, 180. Petitioners next argue that the FCC’s definition is overly broad. They claim that by essentially defining a base station as any structure with an antenna on top, the FCC’s definition of 24 “base station” also encompasses towers. Given that Section 6409(a) mentions both towers and base stations, Petitioners argue that the FCC’s interpretation of the statute renders the term “tower” superfluous. The FCC counters that its definition of “tower” includes towers that do not currently support antennas, and that its definition of base stations expressly excludes towers, thereby rendering the two definitions distinct. Respondent’s Br. at 48. We agree with the FCC’s explanation in the Order of the distinction between these terms: [W]e interpret “base station” not to include wireless deployments on towers. Further, we interpret “tower” to include all structures built for the sole or primary purpose of supporting Commission-licensed or authorized antennas, and their associated facilities, regardless of whether they currently support base station equipment at the time the application is filed. Thus, “tower” denotes a structure that is covered under Section 6409(a) by virtue of its construction. In contrast, a “base station” includes a structure that is not a wireless tower only where it already supports or houses such equipment. Id. ¶ 169. Given these definitions, it is difficult to conceive of a structure that could qualify as both a tower and a base station. The FCC’s Order clearly provides distinct definitions for the terms of Section 6409(a), and we find unpersuasive Petitioners’ arguments to the contrary. We emphasize that the FCC’s interpretation of “base station” is entitled to deference under step two of Chevron. It is not enough for Petitioners to argue that a better definition 25 of “base station” would have excluded support structures. Instead, Petitioners have the burden of showing that the FCC’s definition is an unreasonable interpretation of the Spectrum Act. We conclude that Petitioners have failed to carry their burden. III. For the foregoing reasons, the petition for review is DENIED. 26
Arbol, a parametric weather risk platform built on IPFS - jschilling https://docs.ipfs.io/concepts/case-study-arbol/ ====== dbetteridge Read through this and it's super interesting, but am I missing something or do they still need a series of storage nodes that can hold a copy of all the data anyway to allow for the pinning to work? Similar to torrents with no-one seeding, if there isn't an active set of users to 're-seed' the data, you need a copy to do so yourself, similar to a seed- box. ~~~ typingmonkey Yes, indeed an impressive project. I think we should not use the termination "stored at IPFS" like they do. Distributed via IPFS would be much more correct in a technical sense. ------ benmanns How does the smart contract interact with data stored in IPFS? Are the automatic payouts handled on chain or is there an off-chain process initiating those payouts?
Q: How to assign value from dictionary (which is a list) to new List? I have a populated dictionary. Dictionary<string, List <KeyValuePair<string,string>>> actions = new Dictionary<string, List<KeyValuePair<string,string>>>(); if (!actions.ContainsKey(srcID)) { actions.Add(srcID, new List<KeyValuePair<string, string>>()); } actions[srcID].Add(new KeyValuePair<string, string>(dstID, command)); Now I would like to create a new list and assign to it values (which is also a list) from above dicionary. Something like this: (what would be the correct syntax?) List<KeyValuePair<string, string>> actions = dic[srcID, command] A: You can simply assign the list in the constructor of the list if you wish to create a new list. If not just use the dic[srcID] value List<KeyValuePair<string, string>> actions = new List<KeyValuePair<string, string>> (dic[srcID]);
Q: Understanding how MySQL fetches data with same user id I working on a table that keeps record of student attending course. The data are keep using student identification number, course id, coursename, start date, end date. Student can take more than one course so there are repeating student identification number but with different course id, course name, start date and end date. What I'm trying to to here is to select students based on number of day using DATEDIFF. Sorry for not explaining my problem properly. the structure of the table i'm talking about: studcourse1(internalstudentid, staffnoic, courseid, coursenm, StDt, EndDt, location, organizer, generalcategorycd, generalsubcategorycd, eid) staffnoic - staff identification number, StDt - Start Date. EndDt - End Date I've checked, there's no primary key or indexes on this table as it's not a base but a view. Sorry if the previous statement is too long. Let's use this instead. SELECT GradeGroupCd, StudCourse1.StaffNoIC, (DATEDIFF( EndDt, StDt ) +1) TotalDay, StDt, EndDt FROM StudCourse1, tblStaff, tblRefTitleGred WHERE tblStaff.TitleGredCd = tblRefTitleGred.TitleGredCd AND StudCourse1.StaffNoIC = tblStaff.StaffNoIC AND StDt >= '2009-1-1' AND YEAR(EndDt) <= YEAR(NOW()) AND (DATEDIFF( EndDt, StDt ) +1) > 90 AND (GeneralSubCategoryCd = 'S0012' OR GeneralSubCategoryCd = 'S0014') GROUP BY GradeGroupCd, StudCourse1.StaffNoIC The statement above fetches results for student(using staffnoic from table tblStaff and table StudCourse1) having taking course for more than 90 days using (DATEDIFF(EndDt, StDt) + 1). What that really confuse me is that for example a record from studcourse1 with staffnoic of '111111111111', sample data: studcourse1(internalstudentid, staffnoic, courseid, coursenm, StDt, EndDt, location, organizer, generalcategorycd, generalsubcategorycd, eid) studcourse1(10629,111111111111,AAA1811,Course1,2010-01-01 00:00:00, 2010-12-31 00:00:00, '', ABC Org, G003, S0012, E00001812) (30684,111111111111,AAA6968,Course2,2009-02-10 00:00:00, 2012-02-09 00:00:00, '', ABC Org, G003, S0012, E00006894) (30685,111111111111,AAA6970,Course3,2011-01-01 00:00:00, 2012-02-09 00:00:00, '', ABC Org, G003, S0014, E00006896) Running the SQL statement will select the one with the StDt of 2010-01-01 00:00:00 and EndDt of 2010-12-31 00:00:00. Why is it singling out that record and not others as they all fall under AND StDt >= '2009-1-1' AND YEAR(EndDt) <= YEAR(NOW())". Year now referring to year 2012. How can I make it select the one with the StDt(2009-02-09) and EndDt(2012-02-09)? And also "(DATEDIFF( EndDt, StDt ) +1) > 90", why does it add 1 to it? Wouldn't DATEDIFF( EndDt, StDt ) > 90 be the right one? Sorry if that too many questions. Just learn MySQL recently. Thank you for your time. A: Ok it is hard to understand what you have written. Please provide the tables you have used and the structure. Simplest method to get this done is having 3 tables, 1) students with student id, name and so on 2) Course - course id, course name and so on. 3) Enrolment - enroll id, start date, end date and foreign keys(student id and course id). And I didnt get what you meant by (What I'm trying to to here is to select students based on number of day using DATEDIFF.)
Full Society BECOME A BETA-USER Do you like food, friends and the idea of a generous, united community? Then sign up to be a beta tester and get early access to Full Society before it goes live! In exchange for your feedback and support, you'll also get an invitation to our launch party. To become a beta tester, fill in your contact info below and we'll be in touch. Name * Name First Name Last Name Email Address * Cell Phone Number Thank you! WANT TO ADD FULL SOCIETY TO YOUR RESTAURANT? Check out the link below to find out how you can join the cool kids club. Become a Beta User Do you like food, friends and the idea of a generous, united community? Then sign up to be a beta tester and get early access to Full Society before it goes live! In exchange for your feedback and support, you'll also get an invitation to our launch party. Thank you! Fund Us Help the Full Society team to execute our for-profit business model focused on giving back to the community.
Q: how to drop table with conditions upon oracle? just like this: drop table xxxx where table_name like 'v_%'; I can retrieve the table names form the database,but i don't know how do it with a simply way. tables from: select table_name from user_tables wher table_name like 'v_%'; A: Using PL/SQL code you can do it like this: set serveroutput on; begin for table_record in (select table_name from user_tables where table_name like 'v_%') loop execute immediate 'DROP TABLE ' || table_record.table_name ; dbms_output.put_line('Table ' || table_record.table_name || ' dropped' ); end loop; end; /
overview accessories package contents reviews q&a Capture Moments with Sophistication.This is an ELPH you'll want in your pocket every day: easy to use and sleekly stylish, the PowerShot ELPH 115 IS is equipped to turn any moment into a high-quality image. The bright, powerful 8x Optical Zoom with 28mm Wide-Angle lens takes you up close for detail and out wide for group shots, while the 16.0 Megapixel sensor and DIGIC 4 Image Processor deliver sharp resolution and beautifully accurate color. And now you'll shoot longer thanks to the new ECO Mode, which reduces power consumption. Smart AUTO makes high quality easy in any situation by choosing optimal camera settings perfect for 32 recognized scenes. Your memories live on in sharp, true-to-life 720p HD video, and recording starts with a simple push of a button. Intelligent IS eliminates blur by automatically choosing image stabilization that's right for the shooting situation. Erasing SpecificationsErase Modes- Single Image, Erase All - The image data in the memory card stored with the design rule for camera file systems format can be erased (however, protected images cannot be erased).
Answer Me This By Simon McCormack Some discouraging news for the Albuquerque Police Department. Which reality show got a dose of New Mexico flavor? What does an Albuquerque-based mining company hope to find in the Ortiz mountains? And police say they've caught the ______ bandits. 1) The number of officers in APD's ranks ... a. Is lower than it's been in more than a decade b. Is swelling, and APD officials are worried they don't have the budget to sustain the growth c. Is lower than it was last year d. Is just right 2) Which reality show gave a Santa Fe resident a chance to shine? a. "Survivor" b. "Iron Chef" c. "America's Next Top Model" d. "The Real World" 3) What are miners looking for in the Ortiz Mountains? a. Gold b. Silver c. Copper d. Saucy edible underwear 4) Which group of bandits do police think they've caught up to? a. The lion-face bandits b. The stinky-breath bandits c. The fast-food bandits d. The backpack bandits ANSWERS 1). C. This year, APD has in its ranks 972 officers, down from the 998 police men and women it had in 2007. The department hopes to reach Mayor Martin Chavez' goal of 1,100 officers by Dec. 1. In its budget, APD has $1 million to spend on recruiting and maintaining its force. 2). B. Bobby Flay defeated Santa Fe's Martin Rios on the Sunday, April 20, episode of the Food Network's hit program which pits guest chefs against the show’s "Iron" chefs each week. Both contestants had 60 minutes to prepare five dishes using the secret ingredient: tomatoes. 3). A. Santa Fe Gold Corp. hopes to find around 2 million ounces of gold in the Ortiz Mountains 10 miles south of Madrid. The company has about two or three more years’ worth of research to do before it determines if mining the area makes financial sense. 4). D. Two of the five suspects said to be involved in a string of 23 robberies between Feb. 6 and March 19 were taken in by police last week. Police say the bandits stuffed money and other stolen goods into backpacks before making their escape from various fast-food restaurants, gas stations, game stores, adult video stores and pizza shops. The two suspects were arrested after police raided their apartment in Northwest Albuquerque and found a video game machine and other items believed to have been stolen during the robberies.
Increased susceptibility of mice to malarial infection following UV-B irradiation. Using a mouse model, we examined whether UV-B was a risk factor for malarial infection. Two mouse strains, susceptible (BALB/c) and resistant (C57BL/10) to murine malaria (Plasmodium chabaudi), were UV-preirradiated and infected with a sub-lethal dose of malaria parasite (104 and 105, respectively). Parasite growth was assayed with tail-blood smears counting parasitized red blood cells. Mice resistant to malaria were bled by heart puncture and the plasma cytokines were determined. Our results showed that UV-B irradiation worsened the malarial infection and 100% of the malaria-resistant mice strains died due to a usual infection at sub-lethal dose following UV-B irradiation. In the resistant mice strain infected with the parasite, the plasma IFN-gamma production was inhibited by UV-B irradiation and the maximum titer was about one-fifth of the non-irradiated mice. Furthermore, activation of macrophages from UV-irradiated mice also decreased compared with that of non-irradiated mice. IFN-gamma administration prevented the death of UV-B irradiated resistant mice and the cure ratio was 60%. In conclusion, UV-B increased the susceptibility of both strains of mice and impaired IFN-gamma production in the malaria-resistant mice strain.
President Donald Trump is celebrating his first Thanksgiving as president at his members-only resort in Florida, marking the 100th day he’s spent at a Trump-owned property since his inauguration. Trump traveled to Mar-a-Lago on Tuesday, hours after pardoning a turkey at the White House. Wednesday and Thursday were the president’s 27th and 28th days at his Palm Beach resort, according to a New York Times tracker. He also visited the Trump International Golf Club on Wednesday, where the White House said he handled “a full schedule of meetings and phone calls.” Reporters were not invited to join the president, but they were pretty sure Trump’s schedule also included some golf. Golf has become a common feature of the president’s trips, they noted. By my count, it's Pres Trump's 50th visit to a golf club since taking office. All but one to a Trump-brand club. More often than not, WH doesn't confirm he plays golf. so can only reliably count his visits - including 8 visits to his club in Bedminster NJ where he stayed 42 days. — Mark Knoller (@markknoller) November 22, 2017 Trump has now spent nearly one-third of his presidency at one of his properties. The president started off his Thanksgiving like he does many days ― with a tweet. HAPPY THANKSGIVING, your Country is starting to do really well. Jobs coming back, highest Stock Market EVER, Military getting really strong, we will build the WALL, V.A. taking care of our Vets, great Supreme Court Justice, RECORD CUT IN REGS, lowest unemployment in 17 years....! — Donald J. Trump (@realDonaldTrump) November 23, 2017 Trump then hosted a live video conference with military service members abroad, before visiting the nearby Coast Guard Quarters. He also released a recorded address, in which he gave thanks, touted the nation’s economic gains and claimed “the enthusiasm in this country has never been higher.” The president will reportedly be joined by his family for Thanksgiving dinner. Last year, the Trumps feasted on a total of 24 dishes, including a “chilled seafood display” and “chef-carved leg of lamb,” according to CNN. Trump is set to return to the White House on Sunday.
Creating Lanes On The Information Superhighway toggle caption iStockphoto.com Creating Lanes On The Information Superhighway Listen · 13:04 13:04 The network neutrality debate, which has been burning up the comments section of many a tech blog for several years now, hit mainstream media this week when Verizon and Google released a joint proposal for new legislation regulating the internet. Here's the key bit: ...Our proposal would allow broadband providers to offer additional, differentiated online services, in addition to the Internet access and video services (such as Verizon's FIOS TV) offered today. This means that broadband providers can work with other players to develop new services. Since its creation the internet has been a kind of economists dream; a place without barriers, where any idea can get a hearing, where the best ideas win. But some worry the dream could be ending, and they cite the recent Google-Verizon proposal. The debate really boils down to the economics of the internet. How it operates, and who pays. Today, we put on flame-resistant suits and dive in. On today's podcast, we talk to two economists, both named Scott. Scott Holladay argues this is one market, where maybe the government should get involved, and protect "net neutrality." (Read more about Holladay's stance.) Scott Wallsten argues that "net neutrality" might actually be getting in the way of important innovation. (Read more from his paper.) We welcome your emails, even if they're in ALL CAPS. Send them to planetmoney@npr.org. Today's music: The Guild's "(Do You Want To Date My) Avatar." Subscribe to the podcast. Follow us on Twitter/Facebook.
Today’s Impeach-O-Meter: Not Going There Today’s Impeach-O-Meter: Not Going There In the tradition of the Clintonometer and the Trump Apocalypse Watch, the Impeach-O-Meter is a wildly subjective and speculative daily estimate of the likelihood that Donald Trump leaves office before his term ends, whether by being impeached (and convicted) or by resigning under threat of same. I don’t want to assess what today’s assault will mean politically for the president, because it just feels too soon and too gross. I will say that, in the long run, I hope and believe that neither side can or will very effectively use a tragedy such as this for partisan gain. With that said, there were some new polls out today. Democrat Jon Ossoff leads his must-win race against Republican Karen Handel in Georgia’s 6th special House election by 3 points, according to a poll released on Wednesday by Trafalgar Group. That’s a good number for Democrats and their hopes of taking back the House in 2018, the only scenario right now that looks like it might lead to impeachment. According to a YouGov poll, meanwhile, 54 percent of voters say Congress should be investigating Trump campaign members’ contacts with Russian government officials before the inauguration to 30 percent who don’t. That’s good news for those who want such an investigation to continue. Democrats also lead Republicans by 2 points in that poll’s generic Congressional ballot. That number is probably less good for Democrats, who will need to win by a lot more than that to take back the House. Overall, I’m taking the Impeach-O-Meter down two points to 43.
CJI has authority to decide allocation of cases, rules SC Sibal, a senior Supreme Court lawyer himself, said he did not want to comment on an internal issue of the court, he said the Court itself will deal with it. Shortage of judges, as well as frequent and contentious deliberations between government and collegium on appointments, can be minimised by allowing SC as well as high court judges to serve until 70. In his PIL, Shanti Bhushan has stated that the "master of roster" can not be unguided and unbridled discretionary power, exercised arbitrarily by the CJI by hand-picking benches of select judges or by assigning cases to particular judges. In a letter to the CJI, he said it had been over three months since the collegium, of which Justice Kurian is a member, recommended Ms. Malhotra and Justice Joseph and sent the files to the Ministry of Law and Justice. When Justice Karnan challenged the dignity of the Court, you may kindly recall that we met in Full court and resolved to take the issue suo moto on the judicial side. "Is not the present a more grievous situation?" "You may recall, and as has been the practice, it was our decision to send the names in a phased manner so that there may not be any administrative or other difficulty". "We are very, very concerned about what is happening in court and we believe that the option that is available to us is still open", Congress spokesperson Kapil Sibal said when asked about the party's stand on the issue. "I am more anxious about the irreparable injury that is being caused by the wrong message sent to the judges down the line", Justice Joseph said. This court is reeling under the pressure of work and working with a strength of 24 as against 31. "We are not able to sit for the second phase since fate of the first phase is not yet known". "This is not some instant coffee", he said and added: "We are dealing with an institution and it will be a very sad day if the Opposition has to take that step.it will be with very heavy heart". I am more anxious about the irreparable injury that is being caused by the wrong message sent to the Judges down the line. I mentioned first seven only because of the mandate of the Full Court in Justice Karnan's case. He noted that the CJI 's "personal efforts" to resolve the crisis had not proved fruitful. Unless such a surgical intervention is made the appropriate time, the child in the womb dies. THE SUPREME Court Friday agreed to examine a petition seeking regulations on the power of the Chief Justice of India to allocate cases to different benches of the court and sought the assistance of Attorney General of India K K Venugopal and Additional Solicitor General Tushar Mehta in the matter. The copy of the letter has been sent to the other fellow judges. In an unprecedented move, on January 12, four senior Supreme Court judges, including Justice Chelameswar, had called a press conference to express their displeasure with the CJI Dipak Mishra and with the way he was assigning cases. Share Related Articles With economic ties being an important pillar of the India-Britain bilateral relationship, Modi and May will attend a CEOs Forum. Modi's two-day Sweden trip beginning April 16 will mark the first visit by an Indian PM to the Nordic nation in 30 years. The body was turned over to the Medical Examiner's Office for positive identification and cause of death determination. She was taken to the hospital in extremely critical condition with life-threatening injuries, officials say. The 08-year-old girl was held captive in a temple, sedated and gang-raped multiple times before being murdered by the accused. In Odisha, police said a 4-year-old girl was raped by a youth in Balasore district. Rob Gronkowski is going to follow in Tom Brady's footsteps this offseason, and no we aren't talking about his diet. Phase One of the offseason program consists primarily of strength and conditioning activities. The Jammu and Kashmir Congress Chief had alleged that the real culprits were being shielded for political purposes. Asked about the demand for a CBI probe into the incident, the BJP leader said: "It is now for the court to decide". Some Nassar victims wrapped their mouths with black bands that had the phrase "Silenced" scrawled over them. The response was met with backlash from people who say Michigan State violated federal privacy laws. However, with the new feature, you can simply scroll up the chat conversation and download the required media content again. But now, it does not seem to delete the data from the server and download it again even if it was deleted accidentally. The incident happened at Cobblestones, south of Gracetown and Cowaramup, near Margaret River, about three hours south of Perth . A spokeswoman for the event said the surf contest was under way at Margaret River's main break at the time of the attack. Tottenham fans took to Twitter to criticise Harry Kane for his performance, or lack thereof, against Manchester City on Saturday . Both players are on course to smash Luis Suarez's record of most goals in a single Premier League season (31 goals). At a video statement on Sunday, Bevin stated: & "I'm sorry each of youpersonally, that has been hurt by things I't explained". Bevin was scheduled to be the keynote speaker at the Republican Party of Wisconsin's convention in May in downtown Milwaukee. He later drew a walk against lefty Jake Diekman after falling behind 1-2, showing remarkable poise to take three close pitches. He's 2-0 as a starter with a 2.08 ERA, including taking a ideal game into the 6th inning in his most recent start. Vincent Kompany says it's too early to say whether they are the best EPL team ever. "I'm proud of everyone involved". Kompany has overcome persistent injury problems in recent seasons to remain a part of Pep Guardiola's plans. Chinese FM urges 'new future' for China-Japan ties The talks came ahead of a summit between the two Koreas this month and a meeting between North Korean leader Kim Jon Un and U.S. Wang, who will be in Tokyo until Tuesday, will also take part in the fourth China-Japan High-level Economic Dialogue. City rebounds to rout Spurs For weeks it has been a case of when, rather than if, City win the title and it is nearly certain to happen within the next week. Echoes of last weekend's defeat to Manchester United might just have spurred City forward as they went in search of a third. ICICI Securities Q4 net profit up 91% The company was maintained on Wednesday, January 17 by BMO Capital Markets. (NASDAQ:PEP) to report earnings on April, 25. The company offers savings, salary, pension, current, other accounts; and fixed, recurring, and security deposits.
2011 Jeff Byrd 500 The 2011 Jeff Byrd 500 presented by Food City was a NASCAR Sprint Cup Series stock car race that was held on March 20, 2011 at Bristol Motor Speedway in Bristol, Tennessee. Contested over 500 laps, it was the fourth race of the 2011 NASCAR Sprint Cup Series. The race was won by Kyle Busch, for the Joe Gibbs Racing team. Carl Edwards finished second, and Jimmie Johnson clinched third. There were ten cautions and 17 lead changes among eight different drivers throughout the course of the race. It was Busch's first win of the 2011 season, and the 20th of his career. Report Background As a tribute to the late president of the Speedway who died in 2010, longtime race title sponsor K-VA-T Food City, which celebrated the 20th year of race sponsorship in 2011 (as of 2013, the longest continuous sponsorship deal in NASCAR for a race), named the race in his memory, henceforth the Jeff Byrd 500 presented by Food City. The track, Bristol Motor Speedway, is one of five short tracks to hold NASCAR races, the others being Richmond International Raceway, Dover International Speedway, Martinsville Speedway, and Phoenix International Raceway. The standard track at Bristol Motor Speedway is a four-turn short track oval that is long. The track's turns are banked from twenty-four to thirty degrees, while the front stretch, the location of the finish line, is banked from six to ten degrees. The back stretch also has banking from six to ten degrees. Before the race, Tony Stewart was leading the Drivers' Championship with 113 points, tied with Kyle Busch in second. Carl Edwards and Juan Pablo Montoya followed in third and fourth with 106 points, three ahead of Ryan Newman and ten ahead of Paul Menard in fifth and sixth. Martin Truex, Jr. in seventh had 95, the same number of points as Denny Hamlin in eighth. They were one point ahead of A. J. Allmendinger in ninth, while Dale Earnhardt, Jr. was tenth with 91. In the Manufacturers' Championship, Ford was leading with 21 points, three ahead of Toyota in second. Chevrolet was placed in third with 16 points, while Dodge followed with 11. Jimmie Johnson was the race's defending winner from 2010. Practice and qualifying Three practice sessions were held before the race; the first on Friday, which lasted 90 minutes. The second and third were both on Saturday afternoon, and lasted 45 minutes each. Edwards was quickest with a time of 14.912 seconds in the first session, 0.076 seconds faster than Johnson. Greg Biffle was just off Johnson's pace, followed by Kasey Kahne, Menard, and David Ragan. Kyle Busch was seventh, still within a second of Edwards' time. Forty-four cars were entered for qualifying, but only forty-three could qualify for the race because of NASCAR's qualifying procedure. Edwards clinched the 9th pole position of his career, with a time of 14.989 seconds. He was joined on the front row of the grid by Biffle. Regan Smith qualified third, Menard took fourth, and Ragan started fifth. Johnson, Jeff Gordon, Truex, Mark Martin and Kahne rounded out the top ten. The driver that failed to qualify for the race was Ken Schrader. Once the qualifying session concluded, Edwards stated, "I'm enjoying this. I'm having fun. I'm hoping it lasts, and I'm going to keep driving the way I'm driving until we win a championship, or this car won't go as fast." In the second practice session, Stewart was fastest with a time of 15.364 seconds, more than six hundredths of a second quicker than second-placed Reutimann. Martin took third place, ahead of Jamie McMurray, Kurt Busch and Jeff Burton. In the third and final practice, Martin was quickest with a time of 15.472 seconds. Brian Vickers followed in second, ahead of Hamlin and Joey Logano. Stewart, who was first in the second practice, was fifth quickest, with a time of 15.570 seconds. Montoya, Gordon, Truex, Menard, and Kurt Busch rounded out the first ten positions. Race The race, the fourth of the season, began at 1:00 p.m. EDT and was televised live in the United States on Fox. The conditions on the grid were dry before the race, the air temperature at ; mostly cloudy skies were expected. Mike Rife, reverend of the Vansant Church of Christ, began pre-race ceremonies with the invocation. Actor and country music singer Billy Ray Cyrus performed the national anthem, while Claudia Byrd, Christian Byrd and Belton Caldwell gave the command for drivers to start their engines. Results Qualifying Race results Standings after the race Note: Only the top five positions are included for the driver standings. References Jeff Byrd 500 Jeff Byrd 500 Category:NASCAR races at Bristol Motor Speedway Category:March 2011 sports events in the United States
1. Introduction {#sec1} =============== Alzheimer\'s disease (AD) affects more than 5 million Americans and that number is projected to nearly triple by 2050 [@bib1]. A hallmark feature of AD is brain atrophy, which typically precedes the onset of symptoms [@bib2], [@bib3] and is a predictor of future cognitive impairment [@bib4], [@bib5]. Physical activity (PA) and fitness may mitigate brain atrophy as both have been positively associated with gray matter volume in older adults [@bib6], [@bib7] and older adults at-risk for AD [@bib8]. However, the influence of meeting physical activity recommendations (PAR) via accelerometry on brain volume in older adults is currently unknown. The Department of Health and Human Services along with the American College of Sports Medicine and the American Heart Association recommends accumulating 150 minutes of moderate intensity, or 75 minutes of vigorous intensity, or an equivalent combination of moderate and vigorous physical activity (MVPA) per week to promote health in all adults [@bib9], [@bib10]. The temporal lobes atrophy with age, and this atrophy can predict cognitive decline to AD [@bib11]. Thus, the present study investigated temporal lobe volumetric differences between older adults strictly categorized as having met PAR and those who were insufficiently active. 2. Methods {#sec2} ========== 2.1. Participants {#sec2.1} ----------------- Ninety-one older adults (ages 50--74 years) from the Wisconsin Registry for Alzheimer\'s Prevention (WRAP) cohort volunteered to participate. The WRAP is a longitudinal registry composed of more than 1500 cognitively healthy adults [@bib12]. The sample for this study included a large proportion of participants at-risk for AD (78%); defined as possessing either a parental family history (FH) of AD (70%), and/or the apolipoprotein epsilon 4 allele (*APOE* ε4) (46%), which closely reflects the makeup of the WRAP cohort. Participants were determined to be cognitively healthy using the mini-mental state examination (MMSE ≥ 24), did not have any major medical conditions (e.g. neurological diseases, psychiatric disorders), and were deemed safe for neuroimaging procedures. The University of Wisconsin Institutional Review Board approved all study procedures, and informed consent was obtained from all participants. 2.2. Physical activity assessment {#sec2.2} --------------------------------- All participants wore a triaxial GT3X+ accelerometer (Actigraph, Pensacola, FL) on their hip for seven consecutive days. Participants were instructed to wear the device during all waking hours, with the exception of when showering, swimming, or bathing. Standard accelerometry inclusion criteria consisted of at least 10 hours of valid wear time per day for a minimum of three weekdays and one weekend day [@bib13]. Accelerometer data (in 1-second epochs) were processed using the validated Sojourn-3 axis method which uses an artificial neural net to identify boundaries between activities of different intensities and to estimate metabolic equivalents (METs) for each bout [@bib14]. To calculate minutes spent in different intensity categories of PA, estimated METs were determined for each bout interval and were then separated into PA categories accordingly: \<1.5 METs = sedentary, 1.5--2.99 METs = light, 3--5.99 METs = moderate and \>6 METs = vigorous. Consistent with current public health PAR, total minutes spent in MVPA in bouts of 10 minutes or greater were used to determine whether the participant met the 150 minutes of MVPA recommendation [@bib9], [@bib10]. 2.3. Neuroimaging protocol {#sec2.3} -------------------------- Magnetic resonance images (MRIs) were acquired on a GE X750 Discovery 3.0-T scanner with an eight-channel phased array head coil (General Electric, Waukesha, WI). Three-dimensional T1-weighted inversion recovery prepared spoiled gradient echo (SPGR) anatomic sequences were collected using the following parameters: TI/TE/TR = 450 ms/3.2 ms/8.2 ms, flip angle = 12°, slice thickness = 1 mm no gap, field of view (FOV) = 256, matrix size = 256 × 256, yielding a voxel resolution of 1 mm × 1 mm × 1 mm. Temporal lobe regions of interest (ROIs) included superior, middle, inferior, temporal pole, hippocampus, parahippocampal, and entorhinal. These were derived from the T1 images using the Freesurfer image analysis suite, version 5.1.0 (<http://surfer.nmr.mgh.harvard.edu/>), with automated volumetric segmentation. Further technical processing details are described in previous publications [@bib15], [@bib16]. All images were visually inspected and edited (if necessary) by trained personnel to ensure that they were accurately reconstructed and without topologic defects. A summary measure for each region of interest was derived by averaging the values from the right and left hemispheres and then expressed as a percentage of intracranial volume (ICV) to account for differences in overall head size. 2.4. Statistical analyses {#sec2.4} ------------------------- Independent samples *t* tests compared demographic information between those who met PAR and those who did not. Bivariate correlations explored the associations between age and temporal lobe volume ROIs. A single multivariate analysis of covariance was conducted to determine differences in brain volume between groups, controlling for age and gender with the significance level (α) set at 0.05. Because there is evidence showing that PA may have a more robust effect on brain volume in those at-risk for AD [@bib17], secondary analyses limited to at-risk participants were conducted. All analyses were conducted using IBM SPSS, version 22.0. 3. Results {#sec3} ========== 3.1. Sample {#sec3.1} ----------- Ninety-one cognitively healthy (MMSE = 29.3 ± 1.1) participants (mean age = 64 ± 5.8) completed the study (see [Table 1](#tbl1){ref-type="table"} for participant characteristics). Twenty-nine participants met the PAR of 150 minutes of MVPA and sixty-two did not. Groups did not differ on any measured demographic characteristics (*P* \> .05). The volumes of all ROIs included in the analyses were significantly and negatively correlated with age (*P* \< .05; *r*~*range*~ = −.173 to −.352). 3.2. Physical activity and temporal lobe volume {#sec3.2} ----------------------------------------------- After controlling for the effects of gender and age, there were significant group effects for the inferior temporal lobe (F(1,87) = 4.545, *P* = .036, η^2^~*P*~ = .050) and the temporal pole (F(1,87) = 5.105, *P* = .026, η^2^~*P*~ = .055). Individuals who met current PAR had larger inferior temporal and temporal pole volumes compared to those who did not meet PAR. No significant group differences were observed for the other ROIs (*P* \> .05; [Table 2](#tbl2){ref-type="table"}). Limiting the sample to individuals at-risk (n = 22 met PAR; n = 49 did not meet PAR), we observed similar results with larger effect size differences specifically for the inferior temporal lobe \[inferior temporal lobe: (F(1,67) = 6.820 *P* = .011, η^2^~*P*~ = .092); temporal pole (F(1,67) = 4.258, *P* = .043, η^2^~*P*~ = .060)\]. 4. Discussion {#sec4} ============= In this cohort of cognitively healthy older adults, we observed greater temporal lobe volume in participants who engaged in current recommended levels of PA compared to those who did not. The observed effect size for the inferior temporal lobe was strengthened when the sample was limited to at-risk participants, highlighting the importance of meeting PAR for individuals with familial and/or genetic risk for AD. Our findings suggest that participation in regular PA at or above recommended levels may mitigate the detrimental effects of aging on temporal lobe volume. Physical activity and fitness have been associated with gray matter volume in older adults [@bib6], [@bib7]; however, there is limited research investigating whether meeting PAR is effective for attenuating declines in brain volume. Okonkwo et al. [@bib8] found individuals who self-reported being physically active experienced less age-related alterations in AD biomarkers, including hippocampal volume. Another study found that only individuals self-reporting high levels of PA participation (top quartile) had greater gray matter volume, including areas within the temporal lobe than individuals in the lower three quartiles. The lower three quartiles were not significantly different from each other, suggesting there may be a threshold of PA necessary to confer protection [@bib18]. Given the inherent limitations of self-reported PA, this study provides stronger evidence that meeting PAR can protect brain volume [@bib19]. In our sample, 32% met the weekly PAR which is higher than the reported national average of 5% of older adults [@bib13]. This discrepancy highlights both a strength and a limitation of this study. The large percentage of individuals who met PAR allowed for meaningful comparisons between groups. However, the large percentage of participants meeting PAR suggests that the volunteer WRAP cohort may not be reflective of the general population of older adults. Individuals at-risk for AD experience accelerated rates of brain atrophy. The findings of this study add to a growing body of literature supporting the positive impact of PA behaviors on brain health in older adulthood. However, the cross-sectional design of the present study does not allow for causal inferences to be made. Dose manipulation studies aimed at manipulating physical activity and determining whether a change in PA levels is necessary to preserve temporal lobe volume are needed to more fully test these hypotheses. Notably, using objective assessment of PA behaviors, this study suggests that weekly PA at or above PAR is not only beneficial for overall health; it may be an important way for older adults to preserve temporal lobe volume using natural, affordable methods that are safe and accessible.Research in context1.Systematic review: The authors surveyed the literature related to fitness, physical activity (PA), and brain volume in older adults. There is evidence that fitness and self-reported PA are positively associated with brain volume in older adulthood. However, the influence of objectively meeting PA recommendations (via accelerometry) on brain volume in adults is currently unknown.2.Interpretation: These findings support that regular engagement in PA at or above the current recommendations is not only beneficial for overall health, it may be an important way for older adults to preserve temporal lobe volume using natural, affordable methods that are safe and accessible.3.Future directions: The analyses in the present study are cross-sectional therefore causal inferences cannot be made. Dose manipulation studies aimed at manipulating PA and determining whether a change in PA levels are necessary to preserve temporal lobe volume are needed to more fully test these hypotheses. This work was supported by the National Institute on Aging grants K23 AG045957 (O.C.O.), R01 AG031790 (C.M.C.), R01 AG021155 (S.C.J.), R01 AG027161 (S.C.J.), and P50 AG033514 (S.A.); and by a Clinical and Translational Science Award (UL1RR025011) to the University of Wisconsin, Madison. Portions of this research were supported by the Extendicare Foundation, the Alzheimer\'s Association, the Wisconsin Alumni Research Foundation, the Helen Bader Foundation, Northwestern Mutual Foundation, and the Veterans Administration including facilities and resources at the Geriatric Research Education and Clinical Center of the William S. Middleton Memorial Veterans Hospital, Madison, WI. Jacob Meyer was supported by a National Research Service Award from the Health Resources and Services Administration T32HP10010 to the University of Wisconsin Department of Family Medicine and Community Health. We acknowledge WRAP psychometrists for their assistance with neuropsychological data collection, and the researchers and staff at the University of Wisconsin--Madison Waisman Center for help with brain imaging. Finally, we thank study participants in the Wisconsin Registry for Alzheimer\'s Prevention without whom this work would not be possible. The authors have no conflicts of interest to disclose. ###### Participant demographics Variable Total sample Sample meeting PAR Sample not meeting PAR ----------------------- --------------- ----------------------------------------------------- ------------------------ Sample size 91 29 62 Female, % 66 62 68 Age, y 64.1 (5.8) 63.5 (4.9) 64.4 (6.2) BMI, kg/m^2^ 28.1 (5.7) 26.5 (3.0) 28.9 (6.4) Education, y 16.3 (2.4) 15.7 (2.5) 16.6 (2.3) MMSE, score 29.3 (1.1) 29.3 (1.5) 29.2 (1.2) At-risk, % 78 76 79 FH positive, % 70 69 71 *APOE* ε4 positive, % 46 34 52 Caucasian, % 96 93 97 Actigraph worn, d 6.5 (0.5) 6.5 (0.5) 6.5 (0.5) MVPA, total minutes 109.9 (108.6) 243.8 (84.3)[∗](#tbl1fnlowast){ref-type="table-fn"} 47.2 (40.3) Abbreviations: BMI, body mass index; MMSE, mini-mental state examination; *APOE* ε4, the epsilon 4 allele of the apolipoprotein E gene; FH, family history; MVPA, moderate-vigorous physical activity counting toward recommendations. Values indicate mean score and standard deviation, unless otherwise indicated. significant group difference (*P* \< .05). ###### Temporal lobe volumes Region of interest Sample meeting PAR Sample not meeting PAR *P* value Cohen\'s *d* effect size -------------------- ------------------------------------------------------ ------------------------ ----------- -------------------------- Superior temporal .5004 (.0380) .4994 (.0462) .946 .02 Middle temporal .4407 (.0327) .4376 (.0404) .789 .08 Inferior temporal .4615 (.0486)[∗](#tbl2fnlowast){ref-type="table-fn"} .4405 (.0418) .036 .46 Temporal pole .0609 (.0061)[∗](#tbl2fnlowast){ref-type="table-fn"} .0575 (.0068) .026 .53 Hippocampus .5714 (.0687) .5746 (.0624) .732 .05 Parahippocampal .0977 (.0098) .0976 (.0125) .950 .01 Entorhinal .0523 (.0104) .0518 (.0075) .852 .06 Values indicate mean volume and standard deviation. Region of interest volumes expressed as a % of ICV. significant group difference controlling for age and gender (*P* \< .05).
1. Field of the Invention The present invention generally relates to a table game system using game media such as cards and roulettes, and more particularly, to a table game system that can perform a table game by using a storage card in which valuable information is stored. 2. Description of the Related Art Generally, card games of playing cards (for example, baccarat game) and table games, such as a roulette game using a roulette, are widely known as casino games. Recently, as for a system for supporting such table games, for example, a technique has been proposed that installs a plurality of terminals (hereinafter referred to as “the player terminals”) used by game players at positions distant from a table (hereinafter referred to as “the dealer's game table”) for a dealer to perform dealing, opening, and the like of cards, and delivers the images of the cards captured by a video camera to the player terminals (refer to Japanese Patent Application Laid-Open Publication No. 2005-168664). With such a table game system, it is possible for a large number of game players to participate in a game at the same time that is played on the dealer's game table. Additionally, in the field of game device that allows playing of a game provided that money such as bills and coins are paid, the card system is widely used that allows playing of a game by using a recording card in which information regarding money (hereinafter referred to as “the money information”) is stored in advance (refer to Japanese Patent Application Laid-Open Publication No. HEI10-500796). That is, when the card system as described in Japanese Patent Application Laid-Open Publication No. HEI10-500796 is applied to the table game system described in Japanese Patent Application Laid-Open Publication No. 2005-168664, it is not necessary for the game player to, for example, insert money into the player terminal or the like every time the game player places a bet, by inserting the recording card into a card reading device that is provided to correspond to the player terminal. Thus, it is possible to continuously and smoothly perform the table game within the money information stored in the recording card. Here, in the card reading device described in Japanese Patent Application Laid-Open Publication No. HEI10-500796, when the game player inserts the recording card into the card reading device, the recording card remains received in the card reading device until an adjustment button is operated. Hence, when the game player wishes to newly start playing of a game in another game device instead of the game device currently used, it is necessary to eject the recording card by operating the adjustment button. Thus, there is a disadvantage in that such an operation is cumbersome. Additionally, in the card reading device described in Japanese Patent Application Laid-Open Publication No. HEI10-500796, the money information is stored in the recording card when ejecting the recording card. Such recording is a process that is not always required in the case where the game player starts playing of the game in another game device instead of the game device already used, that is, in the case where the game player does not wish to adjust the recording card. For this reason, when the game player wishes to immediately play the game in another game device, it is necessary for the game player to wait until the recording card is ejected after operating the adjustment button, resulting in great stress for the game player. Further, in the card reading device described in Japanese Patent Application Laid-Open Publication No. HEI10-500796, when the game player stats playing the game by inserting the recording card, the money information is stored/updated in a memory provided inside the card reading device in accordance with the game result. That is, in a card system described in Japanese Patent Application Laid-Open Publication No. HEI10-500796, management of the money information of the game player is performed by each card reading device. Hence, it is impossible for a house to recognize information related to the money information (for example, an increase and/or decrease in the amount of money), information related to sales, and the like on a real-time basis. Thus, there is a problem in that the house cannot collectively manage such kinds of information. Suppose when the card reading device is broken while the game player is obtaining a favorable game result, the benefit to be offered to the game player is not stored in the memory of the card reading device, resulting in a disadvantage that the game player suffers a loss. In addition, it is necessary to provide a memory for storing/updating the money information for each card reading device. Hence, there is a problem in that the cost is increased when building a game system.
Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he is a master at mind control.” Over the years Kelly has had multiple accusations of sexual misconduct leveled against him, including a 2008 case where he was acquitted on 14 charges of making child pornography; that case centered around a videotape that prosecutors alleged showed Kelly having sex with a 14-year-old girl. DeRogatis, who received the tape from an anonymous source in 2000 and turned it over to police, wrote the article that launched the investigation. The new report claims that the young women fell under Kelly’s sway after being brought to him by their parents in an effort to further their musical careers, but that he then “brainwashed” them. According to parents and the former associates, Kelly: * keeps several young women at his homes in Atlanta and Chicago; * replaces their cell phones with ones specifically used to communicate with him and forbids them to contact their families; * requires they call him “daddy” and ask permission to leave the studio or their residences; * films their sexual encounters with him; * abuses them physically and verbally Related The report withholds the identities of the young women but claims BuzzFeed News has verified their identities. The three former Kelly associates who support the parents’ claims — Cheryl Mack, Kitti Jones, and Asante McGee — say that “six women live in properties rented by Kelly in Chicago and the Atlanta suburbs, and he controls every aspect of their lives: dictating what they eat, how they dress, when they bathe, when they sleep, and how they engage in sexual encounters that he records.” While some of the parents, who have not seen their daughters for many months, have contacted police, the young women claim that they are not being held against their wills. “[She] looked like a prisoner — it was horrible,” one mother said of her daughter in the report. “I hugged her and hugged her. But she just kept saying she’s in love and [Kelly] is the one who cares for her. I don’t know what to do.” The report says that welfare checks by police in both Illinois and Georgia over the past year did not lead to charges, and that one of the young women told police she was “fine and did not want to be bothered.” While Kelly has been the target of multiple accusations of sexual misconduct — in 1994, he married singer/protege Aaliyah when she was 15 years old; the marriage was annulled — the 2008 trial dragged on for six-and-a-half years and was further weakened by the judge’s decision to focus solely on the sex tape and to exclude other claims. The BuzzFeed story says “a dozen or more civil lawsuits” against Kelly were settled out of court with cash payments from Kelly. The singer was permitted to tour and record in the years between the sex-tape story’s publication and the 2008 decision — his popular “Trapped in the Closet” video/song series was released during this time — and public interest had largely waned by the time a verdict was reached. Interest revived in 2013 after a Village Voice interview with DeRogatis, but no further action ensued. Kelly has continued to tour and record with less frequency in recent years. In a 2016 interview with GQ, the singer claimed he had been sexually abused by a relative as a child. He also declined to say whether he was the man in the sex-tape video at the center of the 2008 case. The BuzzFeed report concludes with a comment from Linda Mensch, a civil lawyer in Chicago who represents Kelly. She and two reps for Kelly had not responded to Variety‘s request for comment at press time. “We can only wonder why folks would persist in defaming a great artist who loves his fans, works 24/7, and takes care of all of the people in his life,” Mensch wrote. “He works hard to become the best person and artist he can be. It is interesting that stories and tales debunked many years ago turn up when his goal is to stop the violence; put down the guns; and embrace peace and love. I suppose that is the price of fame. Like all of us, Mr. Kelly deserves a personal life. Please respect that.” Sign Up for Daily Insider Newsletter Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […] Three sets of parents claim that R&B singer R. Kelly is holding their daughters in an abusive “cult,” according to a 4,800-word BuzzFeed News report published Monday morning (July 17). Three former associates of the singer also spoke with reporter Jim DeRogatis, repeating the parents’ accusations and adding details of their own — one says “he […]
Introduction ============ Hybrid perovskites have attracted significant attention over the past few years as absorbers for solar cells^[@cit1]--[@cit4]^ with power conversion efficiencies (PCEs) exceeding 15%.^[@cit5]--[@cit8]^ One attractive attribute of hybrid perovskites as photovoltaic absorbers is the ability to continuously tune the absorption onset by alloying different halides into the structure. For example, the bandgap of (MA)Pb(Br~*x*~I~1--*x*~)~3~ (MA = CH~3~NH~3~) can be continuously tuned over the range 1.6--2.3 eV,^[@cit9]^ making these materials suitable both for single-junction solar cells and for the larger bandgap absorber of tandem solar cells. Photovoltaic devices containing (MA)Pb(Br~*x*~I~1--*x*~)~3~ have demonstrated PCEs of 4--16% for a wide range of halide ratios,^[@cit8]--[@cit12]^ and an open circuit voltage (*V* ~OC~) of 1.5 V has been achieved using the largest bandgap perovskite of this family: (MA)PbBr~3~.^[@cit13]^ Although solar cells containing (MA)PbI~3~ have obtained *V* ~OC~\'s of up to 1.15 V,^[@cit14]^ solar cells with mixed-halide perovskites have so far not produced the larger *V* ~OC~\'s that may be expected from their larger bandgaps. Several groups have reported a decrease in *V* ~OC~, despite the increase in optical band gap, in (R)Pb(Br~*x*~I~1--*x*~)~3~ (R = CH~3~NH~3~ or HC(NH~2~)~2~) absorbers for *x* \> 0.25.^[@cit9]--[@cit11],[@cit15]^ We examined the optical properties of (MA)Pb(Br~*x*~I~1--*x*~)~3~ thin films to understand the poor voltage performance of solar cells with the bromide-rich alloys. We find that the photoluminescence (PL) spectra of these materials discretely red-shift to ∼1.68 eV under illumination intensities of less than 1 sun in less than a minute at room temperature. This red-shift is accompanied by an increase in absorption between 1.68 eV and the bandgap. X-ray diffraction (XRD) patterns of the thin films show that the original peaks split upon illumination and revert back to their original line shape after a few minutes in the dark. Our observations so far are consistent with light-induced segregation of the mixed-halide alloy. We hypothesize that photoexcitation induces halide migration, which results in lower-bandgap, iodide-rich domains that pin the PL and *V* ~OC~ at a lower energy compared to the alloy. Results and discussion ====================== We measured the absorption coefficients of (MA)Pb(Br~*x*~I~1--*x*~)~3~ over the full range of compositions to characterize band-edge states and optical bandgaps ([Fig. 1](#fig1){ref-type="fig"}). Thin films of (MA)Pb(Br~*x*~I~1--*x*~)~3~ were spun from equimolar mixtures of 0.55 M PbI~2~ + (MA)I and PbBr~2~ + (MA)Br solutions in dimethyl formamide and annealed for 5 minutes at 100 °C in dry air. The phase purity of the films was confirmed with XRD; their pseudo-cubic lattice parameters agree with previous reports (ESI, Fig. S1[†](#fn1){ref-type="fn"}).^[@cit9]^ Photocurrent spectroscopy (*i.e.*, external quantum efficiency) measurements were performed on (MA)Pb(Br~*x*~I~1--*x*~)~3~ photovoltaic devices using a lock-in amplifier to measure weak absorption from band-edge states. At these weakly absorbed wavelengths, the photocurrent is proportional to the perovskite layer absorption coefficient. We combined these measurements with diffuse transmission and reflection measurements on films of varying thickness to obtain the full absorption spectra. These spectra continuously blue-shift upon increasing bromide content as previously reported.^[@cit9]^ All perovskites in this family (except for *x* = 0.5) have strong absorption onsets, yielding absorption coefficients above 1 × 10^4^ cm^--1^ at energies only 0.1 eV above the bandgap. This property is highly desirable for thin-film photovoltaic absorbers. These absorption onsets correspond to Urbach energies in the range 12--17 meV. These values are similar to the reported value of 15 meV for (MA)PbI~3~,^[@cit16],[@cit17]^ indicating that mixed halide films are homogeneous in composition. In contrast, the *x* = 0.5 thin films exhibit a more gradual absorption onset, suggesting the presence of minority, iodide-rich domains (*x* ∼ 0.2). Photothermal deflection spectroscopy (PDS) measurements corroborate the sharp absorption onset for all compositions except for *x* = 0.5 (Fig. S2[†](#fn1){ref-type="fn"}). ![Absorption coefficient of (MA)Pb(Br~*x*~I~1--*x*~)~3~ measured by diffuse spectral reflection and transmission measurements on thin films and photocurrent spectroscopy of solar cells. Inset: photograph of (MA)Pb(Br~*x*~I~1--*x*~)~3~ photovoltaic devices from *x* = 0 to *x* = 1 (left to right).](c4sc03141e-f1){#fig1} The initial PL spectra for (MA)Pb(Br~*x*~I~1--*x*~)~3~ at low illumination intensities also continuously blue-shift upon increasing bromide content (Fig. S3[†](#fn1){ref-type="fn"}). However, for perovskites with 0.2 \< *x* \< 1 we find that an additional PL peak forms at ∼1.68 eV and grows in intensity under continuous illumination ([Fig. 2a](#fig2){ref-type="fig"}). The position of this new peak is independent of halide composition and bandgap ([Fig. 2b](#fig2){ref-type="fig"}). After less than a minute of continuous visible-light soaking (argon ion laser, 457 nm, 15 mW cm^--2^) the PL intensity from the new low-energy peak becomes more than an order of magnitude more intense than the original peak ([Fig. 2c](#fig2){ref-type="fig"}). Films with higher iodide content exhibited higher initial luminescence efficiencies and required more light soaking for the new PL feature to dominate the original PL. We find that this PL spectral change is not dependent upon the spectrum or coherence of the light source and that it occurs as long as the light is absorbed by the perovskite: we observed similar changes in the PL spectra upon light soaking with various white LEDs, 375 nm and 457 nm laser excitation, and red LED excitation (∼637 nm) for the perovskites that absorb this wavelength. Notably, these changes are reversible; the original PL spectra return after the materials are left in the dark for 5 minutes. Moreover, the spectra can be repeatedly cycled between these two states by turning on and off the excitation light ([Fig. 2c](#fig2){ref-type="fig"} and S4[†](#fn1){ref-type="fn"}). ![(a) Photoluminescence (PL) spectra of an *x* = 0.4 thin film over 45 s in 5 s increments under 457 nm, 15 mW cm^--2^ light at 300 K. Inset: temperature dependence of initial PL growth rate. (b) Normalized PL spectra of (MA)Pb(Br~*x*~I~1--*x*~)~3~ thin films after illuminating for 5--10 minutes with 10--100 mW cm^--2^, 457 nm light. (c) PL spectra of an *x* = 0.6 thin film after sequential cycles of illumination for 2 minutes (457 nm, 15 mW cm^--2^) followed by 5 minutes in the dark.](c4sc03141e-f2){#fig2} To understand the origin of the new PL feature, we performed photocurrent spectroscopy measurements on photovoltaic devices containing (MA)Pb(Br~*x*~I~1--*x*~)~3~ before and after light soaking to characterize absorption from band-edge states ([Fig. 3](#fig3){ref-type="fig"}). A new absorption shoulder forms around 1.7 eV after light soaking, which completely disappears after the devices are left in the dark for 1 h. We speculate that these new PL and absorption features in the light-soaked mixed-halide perovskites are due to the formation of small, iodide-enriched domains with a lower bandgap compared to the alloy. The absorption shoulder in the light-soaked *x* = 0.6 alloy has an absorption coefficient similar to the expected value if ∼1% of the material converted into the *x* = 0.2 perovskite ([Fig. 3](#fig3){ref-type="fig"}). The observations of this absorption shoulder and additional PL peak at 1.68 eV were recently reported for (MA)Pb(Br~0.4~I~0.6~)~3~ and were attributed to the existence of multiple phases.^[@cit17]^ However, the role of light soaking in producing these features was not examined. ![Absorption spectra of an *x* = 0.6 film before (black) and after (red) white-light soaking for 5 minutes at 100 mW cm^--2^, and after 1 h in the dark (blue). A scaled absorption spectrum of an *x* = 0.2 film (dashed green) is shown for comparison.](c4sc03141e-f3){#fig3} Minority domains with the highest iodide content can dominate the PL spectra even at low volume fractions because photogenerated carriers relax into lower energy states and predominately emit from the lowest bandgap domains (the iodide-rich domains, in this case). The large increase in overall PL intensity during light soaking suggests that these defect domains have a higher luminescence efficiency than the rest of the perovskite film. This may be a consequence of the domains acting as carrier traps, concentrating and facilitating radiative electron--hole recombination, similar to how quantum wells and emissive impurities can increase the quantum efficiencies of III--V semiconductor LEDs and organic LEDs, respectively. The PL quantum efficiency of (MA)PbI~3~ perovskite thin films has been reported to be quite high---in excess of 20%.^[@cit18],[@cit19]^ In order to reversibly create iodide-rich domains, the bromide concentration should be slightly enhanced elsewhere in the films. To test this hypothesis, we performed XRD measurements on *x* = 0.6 thin films before and after light soaking. We observe splitting of all XRD diffraction peaks with light soaking, and regeneration of the original sharp diffraction patterns after the films are left in the dark ([Fig. 4a](#fig4){ref-type="fig"}). Since perovskites with higher bromide content have a smaller lattice constant than those with higher iodide content (Fig. S1[†](#fn1){ref-type="fn"}), this splitting is consistent with the presence of a minority phase with significantly enhanced (*x* ∼ 0.2) iodide content and a majority phase with slightly enhanced bromide content (*x* ∼ 0.7) compared to the original material ([Fig. 4b](#fig4){ref-type="fig"}). These phase compositions would suggest that the minority phase is about 20% of the material in these particular samples. If we compare the magnitude of XRD intensity from the two phases, we estimate that the minority phase makes up 23% of the material, after accounting for differences in structure factor for the two hypothesized phases. These values are substantially higher than the 1% minority phase estimated from the absorption measurements by photocurrent spectroscopy on mesoporous devices ([Fig. 3](#fig3){ref-type="fig"}). We suggest that differences in morphology between the mesoporous devices and planar thin films may be responsible for the different minority phase yields under similar illumination conditions. Assuming that the creation of the minority phase is proportional to the light dosage, the XRD measurements suggest that for this particular sample at room temperature, on average roughly 200 absorbed photons cause one cubic unit cell (containing one Pb atom) of the minority iodide-rich phase to form. We note that other samples with different halide compositions (Fig. S5[†](#fn1){ref-type="fn"}), or processed differently did not form as much of the minority phase under the same illumination conditions. ![(a) XRD pattern of an *x* = 0.6 film before (black) and after (red) white-light soaking for 5 minutes at ∼50 mW cm^--2^, and after 2 h in the dark (blue). The XRD pattern of an *x* = 0.2 film (green) is offset for comparison. (b) The 200 XRD peak of an *x* = 0.6 film before (black) and after (red) white-light soaking for 5 minutes at ∼50 mW cm^--2^. XRD patterns of an *x* = 0.2 film (dashed green) and an *x* = 0.7 film (dashed brown) are included for comparison. (c) Williamson--Hall plot of the XRD peak full width at half maximum (*B*) for the minority (green, larger lattice spacing) and majority (brown, smaller lattice spacing) phases observed in (MA)Pb(Br~0.6~I~0.4~)~3~ (*x* = 0.6) thin films under illumination. *θ* is the diffraction angle and *λ* = 1.54060 Å (copper Kα~1~) is the X-ray wavelength. The points are labeled with their crystallographic indices. Linear regressions to the data are plotted and the equations are listed. The minority phase was fit assuming the same crystallite size in the 100 and 110 directions but different amounts of strain disorder.](c4sc03141e-f4){#fig4} Assuming that the XRD peak full width at half maximum (*B*) is primarily governed by crystallite size and strain, the *y*-intercept of a linear fit of the peak breadth *versus* scattering vector on a Williamson--Hall plot ([Fig. 4c](#fig4){ref-type="fig"}) is inversely proportional to the crystallite grain diameter and the slope is equal to the average uncorrelated strain.^[@cit20]^ We estimate a crystallite size of 33 ± 1 nm for the majority phase and 51 ± 5 nm for the minority phase from the Scherrer equation (see ESI[†](#fn1){ref-type="fn"} materials for calculation details). This provides a lower bound for the size of the phase segregated domains, which may contain several crystallites. Additional peak broadening from compositional inhomogeneity may also produce an underestimation in this calculation. The minority domains exhibit anisotropic strain disorder (1.16 ± 0.02% in the 100 direction and 1.41 ± 0.03% in the 110 direction) and have significantly more strain disorder than the majority domains (0.30 ± 0.01%, [Fig. 4c](#fig4){ref-type="fig"}). Other mixed-halide compositions also exhibit an asymmetric splitting of the 200 reflection after light soaking (Fig. S5[†](#fn1){ref-type="fn"}). All compositions (0.2 \< *x* \< 1) show increased scattering intensity at ∼28.5°, further suggesting the presence of iodide-enriched (*x* = 0.2) domains irrespective of the initial stoichiometry. We considered the possibility that photo-induced lattice expansion could also produce the observed reversible structural changes and photochromic responses. *Ab initio* calculations have recently suggested that photoexcitation may reduce hydrogen bonding in (MA)PbI~3~, resulting in a slight unit-cell expansion^[@cit21]^ and bandgap reduction.^[@cit22]^ However, this is inconsistent with the observed XRD peak splitting, which indicates domains with both smaller and larger lattice constants. We also don\'t see significant spectral or structural changes upon illumination of (MA)PbI~3~ or (MA)PbBr~3~ thin films (Fig. S3, [2b](#fig2){ref-type="fig"}, and S5[†](#fn1){ref-type="fn"}), where halide segregation cannot occur. We monitored the PL spectral evolution under constant illumination at different temperatures to study the kinetics of this conversion. The low-energy PL peaks also form below room temperature (200--280 K), indicating that the spectral change is due to photoexcitation and not heating from the light. The initial growth rate in the low-energy PL peak follows Arrhenius behavior with an activation energy of 0.27 ± 0.06 eV ([Fig. 2a](#fig2){ref-type="fig"} inset). This value is similar to the activation energies attributed to halide migration in the perovskites CsPbCl~3~, CsPbBr~3~, KMnCl~3~, CuCdCl~3~, KPbI~3~, CuSnI~3~, and CuPbI~3~, which span the range 0.25--0.39 eV.^[@cit23]--[@cit26]^ Light-induced halide migration has also been reported to occur in metal halides such as PbBr~2~ and PbI~2~,^[@cit27],[@cit28]^ and is the basis for latent image formation in photography using AgI.^[@cit29]^ While halide mobilities in hybrid lead-halide perovskites have not yet been reported, ion conductivities of 7 × 10^--8^ and 3 × 10^--9^ S cm^--1^ have been reported for KPbI~3~ and CuPbI~3~, respectively.^[@cit24]^ Since the (MA)Pb(Br~*x*~I~1--*x*~)~3~ valence band is dominated by contribution from the halide p orbitals,^[@cit30]^ we speculate that formation of iodide-enriched domains stabilizes holes, which could provide a driving enthalpy for halide segregation under illumination ([Fig. 5](#fig5){ref-type="fig"}). When these trapped holes are filled, entropy and lattice strain may cause the phase segregated material to relax back to the well-mixed alloy. Light-induced, reversible structural changes in PbBr~2~ have been attributed to self-trapping of such photogenerated holes.^[@cit31]^ Alternatively, since iodide-rich domains have a smaller bandgap, they lower the energy of excitons, which could drive halide segregation. It is not yet clear whether these structural and spectroscopic changes can be induced by electrical excitation. Spectrally stable red-emitting (MA)PbBr~2~I LEDs have been recently demonstrated.^[@cit32]^ This suggests that the application of an electrical bias might not produce the large changes in emission that are observed under photoexcitation and that photogenerated excited states may play an important role in the transformation mechanism. It is also not yet clear why photo-induced defects resemble the *x* = 0.2 perovskite for a range of bulk perovskite stoichiometries. ![Schematic of the proposed mechanism for photo-induced trap formation through halide segregation. Photogenerated holes or excitons may stabilize the formation of iodide-enriched domains which then dominate the photoluminescence. The valence band (VB) and conduction band (CB) energies with respect to vacuum were estimated by interpolation of published values obtained from ultraviolet photoemission spectroscopy (UPS) and inverse photoemission spectroscopy (IPES) for the endpoint stoichiometries.^[@cit35]^](c4sc03141e-f5){#fig5} This ion-transport mechanism suggests that crystallite size and quality should influence its kinetics. Accordingly, we have seen variations between samples in the rate of their light-induced changes. We see the growth of the low-energy PL even in single crystals of (MA)Pb(Br~*x*~I~1--*x*~)~3~ (Fig. S6[†](#fn1){ref-type="fn"}), indicating that significant grain boundaries or surface defects are not required for this transformation. We have also observed this new phase upon light exposure (for both white LED and 457 nm excitation at 10--100 mW cm^--2^) in (MA)Pb(Br~*x*~I~1--*x*~)~3~ thin films formed from a PbCl~2~ precursor,^[@cit10]^ sequentially-deposited dip-converted^[@cit11]^ and vapor-converted^[@cit33]^ thin films, and in (HC(NH~2~)~2~)Pb(Br~*x*~I~1--*x*~)~3~ thin films (Fig. S7[†](#fn1){ref-type="fn"}),^[@cit15]^ all processed following the procedures described in the references. Approx. 10 s of continuous visible-light soaking at 10 mW cm^--2^ (0.1 J cm^--2^) was typically required for these PL spectral changes. We postulate that previously reported PL studies on mixed-halide perovskites,^[@cit15],[@cit17],[@cit18]^ in many cases done with ultrafast pulsed excitation, may have used much smaller light-soaking dosages that were insufficient to produce these changes. Conclusions =========== We have observed the formation of a new low energy PL feature upon light soaking of (MA)Pb(Br~*x*~I~1--*x*~)~3~ and other mixed-halide perovskites. This spectral change, accompanied by the growth of sub-bandgap absorption states and a splitting of XRD peaks, is consistent with photo-induced halide segregation. In the case of (MA)Pb(Br~*x*~I~1--*x*~)~3~ solar cells, the red-shift in PL upon light illumination indicates a reduction in the electronic bandgap and quasi-Fermi level splitting, reducing their achievable *V* ~OC~\'s. This photo-induced instability is expected to have implications for the operation and reliability of other optoelectronic devices made from this family of materials. Amplified stimulated emission has been recently demonstrated from a few compositions in the (MA)Pb(Br~*x*~X~1--*x*~)~3~ (X = Cl and I) families using sub-ns pulsed optical excitation.^[@cit18],[@cit19]^ Photo-induced changes in PL will likely need to be suppressed in order to achieve stable continuous-wave lasing from these materials. We recently suggested that ion migration could play a role in perovskite photovoltaic hysteresis.^[@cit34]^ Further studies on the mechanism of light-induced trap formation may be crucial in improving the performance and stability of hybrid mixed-halide perovskite photovoltaics and optoelectronic devices. These reversible, light-induced transitions may also enable applications in optical memory and switching. This research was funded by the Global Climate and Energy Project (GCEP). X-ray diffraction studies were performed at the Stanford Nanocharacterization Laboratory (SNL), part of Stanford Nano Shared Facilities. We thank William Nguyen and Colin Bailie for experimental assistance and Eva Unger, Koen Vandewal, and Alberto Salleo for fruitful discussions. [^1]: †Electronic supplementary information (ESI) available: Experimental details, PL, PDS spectra and XRD patterns. See DOI: [10.1039/c4sc03141e](10.1039/c4sc03141e) Click here for additional data file.
1992-1999Series I L27 (1992-1994 SE,SLE, SSE) & Series II L36 (1995-1999 SE, SSE, SLE) and common problems for the Series I and II L67 (all supercharged models 92-99) Including Olds 88's, Olds LSS's and Buick Lesabres Please use General Chat for non-mechanical issues, and Performance and Brainstorming for improvements. Well, tonight, after helping a friend work on his Accord all afternoon (stereo stuff), I start the car up, and scarcely get out of his driveway when the car starts screaming. Pop the hood and find that the alternator is the culprit. I can feel it vibrating as the car idles. The voltage guage is tagged just above the red zone (slowly draining the battery I would assume). Anyone ever have this happen to them? Anyone wanna recommend a good alt to get as a replacement? I am thinking Napa Premium (with a lifetime warr) but $180 is a lot of money to drop :( some people have good and bad experiences w/ napa I have not had a problem with mine and even though it cost 300 w/ core so basically 200 after i traded in my old alt It was worth it mainly becasue a lifetime warrenty. I mean thre are tons of places to get alts but i know napa wil be around forever and i know they will always have my alt in stock. So pay a lil more now for piece of mind later I also replaced mine with a AC-Delco. I have ALWAYS had good luck with their products, no matter what part of the car it was for. So far I have replaced the following since I bought the car, ALL AC-Delco, and have yet to have 1 problem with anything. I rebuild my own alternators since the aftermaket ones only last about 2 years. The last time it cost me about $80.00 CDN for the following parts: 2 sets of brushes; voltage regulator and diode pack. (I broke the first set of brushes when I had to re-open the alternator back up to replace the diode pack the very next day). It takes under an hour to rebuild an alternator BTW too. PS: my last own rebuilt alternator is still working fine after 5 years too. I just bought an AC Delco unit. $160, 2yr warranty. I wanted a lifetime NAPA unit but unfortunately they didn't have any, had to order it and I needed the car fixed NOW. Betwee a rock and a hard place I guess. So I went to another shop and got the Delco. If this one does fail then I might try my hand in rebuilding it myself. Although to echo Terminator I have had nothing but great experiences with Delco parts and hopefully this will not change the pattern. I was going to change out my alt and found out this time it was my gauge. So always check the gauge because I have eaten 4 now but the final one seems to be fine. Now ití* the gauge. That said I have found an awesome source for alternators and I will hopefully have their product up soon. FYI I have changed about 5 of these suckers in the past 12 years on my '92 so I can do it real fast. It only took me 10 years to discover that there is another issue that can fool you into replacing the alternator. Check the positive battery cable at the battery. Its a 3 part assembly and you have to dissasemble it, clean it really well and put it back together. It made a world of difference for me and kept me from replacing a starter and probably should have kept me from an alternator or two.
Peace with Pogba needed for Mourinho to shirk familiar criticism By AFP PublishedTuesday, February 20, 2018 Photo: AFP Manchester United's Champions League trip to Sevilla on Wednesday night is the type of occasion for which the English giants swallowed their pride to pay £89 million ($125 million) for Paul Pogba, four years after he left Old Trafford for Juventus as a free agent. Yet, it remains to be seen whether the French midfielder even starts at the Sanchez Pizjuan for the first leg of the last-16 tie as much due to his form as his fitness. Pogba hasn't completed 90 minutes in a month as he has been hauled off by Jose Mourinho in defeats at Tottenham and Newcastle, and dropped by the Portuguese for victory over Huddersfield at Old Trafford in between. Reports in the French press emerged last week that Pogba is unhappy with the role given to him by Mourinho, in particular the defensive demands imposed by the Portuguese. Mourinho pointedly said Pogba would have occupied his favoured role on the left of a midfield three for Saturday's fifth-round FA Cup win at Huddersfield if he had not been ruled out hours before the game due to illness. The arrival of Alexis Sanchez on the left side of the United attack in January has exacerbated those differences as Pogba and the Chilean are yet to complete 90 minutes together. Mourinho described rumours of a breakdown in communication between he and Pogba as "big lies", but has not hid his criticism of the 24-year-old's form. "In this moment he is not playing well... and the team needs him at a good level." No more so than in the next few weeks as in between their two legs against Sevilla, United also host Chelsea and Liverpool in the Premier League with all three sides locked in a battle to finish in the top four. "When he is not playing at a good level the team is not as good as the team can be," added Mourinho. "I think it happens with every team when the best players, the most crucial players, for some reason are not performing." Can Mourinho harness attacking talent? For the hundreds of millions spent by United in the transfer market in recent seasons, Pogba remains the most marquee of them all having beat off competition from around Europe to make him then the most expensive player in the world in 2016. The question remains whether Mourinho, who extended his contract in January to 2020, and Pogba can reconcile their differences for the common good. Despite his stellar coaching career, it is not the first time Mourinho has failed to muster the maximum potential from a prestigious talent. Two of the frontrunners for Player of the Year honours in England, Kevin De Bruyne and Mohamed Salah, were disregarded by Mourinho and sold on the cheap during his time at Chelsea. Not long after he returned to United, Pogba told French magazine So Foot he'd be "the new midfielder". A player he defined as "can defend, he can win the ball, he can make the play, he can pass, he can score". A concept that doesn't sound too dissimilar to Mourinho's definition of a box-to-box midfielder in recent weeks. "(It) means you have to defend well, have the physical conditions to go to the other box, where you have to be good at scoring, creating, heading and then, when your team loses the ball, you have to go to the other box," said Mourinho. "Now people say a box-to-box has to play free of defensive duties." Time will tell if United's star player and coach can harmonise their ideas on paper onto reality on the pitch.
Keep Learning The phrase literally translates as "looking for a partner," according to SpanishDict.com. The Spanish verb "buscar" means "to look for," and "pareja" can be used to refer to mean a couple or pair, a partner, or a significant other. The process of dating involves a pair going out with each other as part of their search for a significant other. The actual act of going out with someone translates into Spanish as "saliendo con." It comes from the Spanish verb "salir," meaning to go out, and the word "con," meaning with.
Around 12pm ET today, Donald Trump became the 45th president of the United States—but not before a performance by the Mormon Tabernacle Choir accompanied by the U.S. Marine Band. The choir serenaded spectators attending the inauguration (and those of us online watching the livestream) to the tune of “America the Beautiful,” marking their seventh performance at a presidential inauguration event. And while audiences earnestly awaited the four minutes for Trump to be sworn in to office, we couldn’t help but notice few things about the Mormon Tabernacle Choir’s members: They’re all impeccably dressed, nearly entirely white, and almost too easy to poke fun at. 🎼 can i speak to your managerrr🎤🎼 pic.twitter.com/L5W9i9MKh0 — dissociate manager (@ericschmerick) January 20, 2017 https://twitter.com/cxcope/status/822575779460616192 🎶🎶🎶 weeee were tolllldd by aappple careeeeee 🎶🎶🎶 pic.twitter.com/uWcK8gVgc9 — jack (@jackhaveitall) January 20, 2017 I see they picked a really diverse choir #inauguration pic.twitter.com/HCPbFicM8q — Tim Johns (@timoncheese) January 20, 2017 OK, so maybe the easiest stereotype to attack via Twitter is white women getting aggressive with matters of customer service, but can you really blame them? The last mocking tweet comes most notably from this vine (RIP Vine) of this angry woman at the Apple Store. https://vine.co/v/huHUPLnx1dg See? Even Chrissy Teigen gets it. “I was told by AppleCare!!” Eh? EHH?? i was told by apple carrrrrrrrrrrrrre https://t.co/mg2YX65jXC — christine teigen (@chrissyteigen) January 20, 2017 I’m sure that the members of the Mormon Tabernacle Choir are relatively nice, kind people. Or maybe a handful of them are completely liable of going off on minimum-wage customer service employees. Only the memes will tell.
Let l(k) = -k**2 + 12*k - 2. What is l(10)? 18 Let u(a) = 5*a + 62. Calculate u(-13). -3 Let q(u) = 6*u - 2. Determine q(1). 4 Let o(w) = 2*w**2 - 10*w - 16. Calculate o(10). 84 Let k(a) = a**2 + 13*a - 3. Determine k(-10). -33 Let o(f) = f**2 + 10*f + 13. Calculate o(-8). -3 Let x(u) = 4*u + 102. What is x(-27)? -6 Let j(f) = -51*f + 7. What is j(-2)? 109 Let f(y) = -y**3 + 8*y**2 - 10*y + 15. What is f(7)? -6 Let v(z) = -7*z**3 - z**2 + z - 1. What is v(-2)? 49 Let d(q) = -14*q**3 - q**2 + 2*q - 1. What is d(1)? -14 Let t(r) = -r**3 + 21*r**2 + 4*r - 68. Determine t(21). 16 Let o(v) = 4*v**2 - 2*v. Determine o(4). 56 Let i(w) = -11*w - 2. Give i(-1). 9 Let y(t) = -t**3 - 3*t**2 + 4*t - 1. Give y(-4). -1 Let x(n) = -n**3 - 15*n**2 - 40*n - 33. Calculate x(-12). 15 Let w(v) = -6*v - 12. Calculate w(-4). 12 Let m(t) = 2*t**2 + 11*t - 3. Give m(-6). 3 Let f(q) = 7*q**2 - 3. Calculate f(-3). 60 Let i(s) = s**3 - 9*s**2 + 4*s + 15. Give i(6). -69 Let r(z) = -2*z**2 - 9*z + 7. Give r(-6). -11 Let c(h) = 33*h - 258. Determine c(8). 6 Let y(o) = o**3 + 10*o**2 - o + 2. Give y(-10). 12 Let i(w) = -w**2 - 17*w - 15. Determine i(-14). 27 Let a(g) = 7*g + 137. Determine a(-19). 4 Let g(o) = -6*o - 6. Determine g(-5). 24 Let a(v) = 4*v + 35. Calculate a(-8). 3 Let b(w) = -2*w + 10. What is b(12)? -14 Let w(d) = -d**2 - 4*d + 37. Give w(-13). -80 Let g(a) = -8*a**2 - a. Determine g(-1). -7 Let w(t) = 2*t + 2. Give w(-3). -4 Let r(k) = -5*k - 46. Calculate r(-8). -6 Let p(w) = -w**2 + 21*w - 102. Determine p(10). 8 Let h(d) = -2*d - 1. Calculate h(2). -5 Let i(t) = -t**3 + 15*t**2 + 16*t - 6. What is i(16)? -6 Let z(i) = -9*i**2 - 3*i - 7. Give z(-2). -37 Let b(r) = r**3 - 18*r**2 - 21*r + 11. What is b(19)? -27 Let m(s) = -3*s + 61. Give m(21). -2 Let t(y) = 2*y**2 + 19*y - 4. Give t(-9). -13 Let a(v) = v**2 - 17*v + 2. Determine a(13). -50 Let a(c) = c**3 + 4*c**2 + 3*c - 1. Calculate a(-3). -1 Let c(o) = 2*o - 34. Calculate c(16). -2 Let v(a) = -a**3 + 8*a**2 + a - 11. Give v(8). -3 Let w(g) = g - 11. Determine w(5). -6 Let u(x) = -x**3 - 6*x**2 - 6*x + 3. Calculate u(-5). 8 Let c(t) = -t**2 + 9. Give c(-3). 0 Let r(j) = -4*j + 12. Determine r(12). -36 Let r(p) = -7*p**3 - 3*p**2 - p + 1. Determine r(-1). 6 Let r(m) = 3*m**2 + 3*m - 10. What is r(4)? 50 Let y(o) = -9*o - 68. Determine y(-7). -5 Let l(h) = -h**3 - 12*h**2 + 30*h + 8. Calculate l(-14). -20 Let g(j) = -6*j + 40. Calculate g(7). -2 Let t(h) = -4*h + 29. Calculate t(8). -3 Let p(h) = h**2 + h - 4. Calculate p(0). -4 Let x(w) = 34*w + 339. What is x(-10)? -1 Let c(j) = 5*j**2 + 1. What is c(-3)? 46 Let h(d) = -2*d**2 - 9*d. What is h(-6)? -18 Let u(t) = t**3 - 7*t**2 - 11*t + 7. Calculate u(8). -17 Let w(c) = -15*c**2 + 2*c + 7. Give w(-2). -57 Let t(k) = k**2 - 14*k + 29. What is t(13)? 16 Let d(i) = -9*i**3 - 3*i**2 + 2*i - 1. Calculate d(1). -11 Let j(m) = 3*m**2 - m. Give j(1). 2 Let m(r) = r**3 - 13*r**2 - 13*r - 3. Determine m(14). 11 Let d(q) = -23*q**3 + q. Calculate d(1). -22 Let g(u) = u**3 - 24*u**2 + 43*u + 30. Give g(22). 8 Let k(h) = -h**2 - 4*h + 16. Determine k(-5). 11 Let g(l) = -29*l - 1. Give g(1). -30 Let a(t) = -23*t**3 + t**2 + 2*t + 1. What is a(-1)? 23 Let i(m) = 189*m - 1135. Calculate i(6). -1 Let p(v) = v**2 + 5*v - 7. Calculate p(-7). 7 Let g(b) = -b**3 + 22*b**2 - 21*b - 12. Determine g(21). -12 Let l(x) = -x**3 + 7*x**2 + 9*x - 9. Give l(8). -1 Let t(q) = q + 178. What is t(0)? 178 Let s(b) = 3*b**2 + 21*b + 35. Determine s(-6). 17 Let h(y) = y**2 - 10*y + 9. What is h(8)? -7 Let z(k) = -k**3 - 35*k**2 + 37*k + 19. What is z(-36)? -17 Let a(v) = 5*v - 29. Calculate a(5). -4 Let k(h) = -h**3 - 41*h**2 + 178*h - 90. What is k(-45)? 0 Let y(h) = -h + 1. What is y(-4)? 5 Let m(r) = -r - 32. Determine m(-8). -24 Let x(n) = n**2 + 7*n - 3. Determine x(-7). -3 Let z(i) = -2*i**2 + 11*i + 39. What is z(8)? -1 Let a(g) = 24*g**2 + g. Give a(1). 25 Let f(i) = -i**3 - 7*i**2 - 4*i - 1. What is f(-3)? -25 Let g(s) = -29*s - 8. Calculate g(-2). 50 Let o(x) = -x**3 + 28*x**2 + 28*x + 33. Give o(29). 4 Let m(b) = 10*b - 42. Give m(5). 8 Let m(g) = g**2 + 3*g - 5. What is m(-4)? -1 Let h(q) = -19*q + 501. What is h(27)? -12 Let s(i) = 2*i**3 + 19*i**2 - 13*i - 8. What is s(-10)? 22 Let x(j) = -j**3 - 14*j**2 - 27*j. What is x(-12)? 36 Let m(i) = i**2 - 8*i - 7. Determine m(7). -14 Let y(j) = j**3 + 4*j**2 - 13*j - 33. Determine y(-5). 7 Let k(b) = -10*b + 55. Determine k(5). 5 Let j(w) = 8*w**3 - 2*w**2 + 3*w - 1. Determine j(2). 61 Let h(m) = -33*m - 392. Determine h(-12). 4 Let p(c) = -4*c + 59. What is p(-22)? 147 Let n(u) = -3*u + 48. Determine n(18). -6 Let k(y) = 3*y**2 + 6*y - 1. Give k(-3). 8 Let p(t) = t**2 + t - 4. Calculate p(-3). 2 Let a(d) = -2*d**3 - 60*d**2 + 62*d + 2. Give a(-31). 2 Let h(j) = j**3 - 20*j**2 - 22*j + 21. What is h(21)? 0 Let o(x) = -12*x - 10. Determine o(9). -118 Let f(y) = 5*y - 42. Determine f(17). 43 Let y(g) = 21*g - 176. Give y(8). -8 Let s(t) = t**2 - 3*t + 16. Calculate s(4). 20 Let q(u) = u**3 + 12*u**2 - 33*u - 71. What is q(-14)? -1 Let f(z) = z**3 - 10*z**2 - 8*z + 5. What is f(11)? 38 Let c(u) = -9*u**2 - 4*u + 3. Calculate c(2). -41 Let o(n) = n**3 - 53*n**2 - 52*n - 110. Determine o(54). -2 Let l(d) = -d - 5. What is l(-4)? -1 Let s(l) = -11*l - 112. Calculate s(-11). 9 Let g(m) = -m**3 - 7*m**2 + 9*m - 16. Determine g(-8). -24 Let b(j) = -j**3 + 8*j**2 - 10*j + 7. Give b(6). 19 Let r(q) = -q**3 - 20*q**2 - 18*q + 75. Calculate r(-19). 56 Let i(j) = -19*j + 273. What is i(14)? 7 Let b(l) = -l**3 - 2*l**2 + 13. Determine b(0). 13 Let v(y) = -y**3 - 5*y**2 - y + 1. Give v(-5). 6 Let o(z) = -z**3 + 12*z**2 + 12*z + 10. Determine o(13). -3 Let w(i) = -2*i**3 + 68*i**2 - i + 30. Determine w(34). -4 Let k(w) = -w + 8. Determine k(4). 4 Let w(f) = f**2 + 17*f + 38. Determine w(-17). 38 Let d(k) = 6*k**2 + 8*k - 4. Calculate d(3). 74 Let o(w) = -w**3 - 28*w**2 - 3*w - 82. Calculate o(-28). 2 Let k(p) = -p**2 + 4*p + 10. Calculate k(-7). -67 Let q(u) = -u**3 - 6*u**2 - 6*u - 6. Give q(-4). -14 Let u(n) = -118*n - 832. Determine u(-7). -6 Let o(w) = -w**3 - 13*w**2 + 14*w. What is o(-14)? 0 Let c(f) = -f**2 + 3*f + 140. Calculate c(13). 10 Let c(r) = -2*r - 6. Give c(-6). 6 Let m(a) = -a**2 + 3. Determine m(0). 3 Let o(y) = -53*y - 8. Determine o(-2). 98 Let c(i) = i**2 - 3*i - 27. Calculate c(-4). 1 Let q(j) = -6*j**2 - 38*j - 3. Calculate q(-6). 9 Let o(r) = -5*r**2 - 31*r - 2. Give o(-6). 4 Let g(r) = -7*r + 17. What is g(5)? -18 Let j(k) = k**2 - 93*k + 440. What is j(5)? 0 Let w(j) = -5*j**2 + 58*j - 38. Give w(11). -5 Let v(j) = -4*j**2 + j + 3. Determine v(-4). -65 Let o(p) = 2*p + 5. Give o(-1). 3 Let g(f) = 21*f**3 + 2*f**2 - 1. Determine g(1). 22 Let n(h) = -3*h + 33. Give n(10). 3 Let k(b) = 2*b - 26. Calculate k(14). 2 Let b(z) = 2*z + 9. Determine b(10). 29 Let w(m) = -m**3 + 9*m**2 - 8*m + 11. Calculate w(8). 11 Let l(b) = -b**3 - 4*b**2 + 4*b - 2. Give l(-5). 3 Let g(k) = k**2 + 16*k - 4. What is g(-16)? -4 Let i(b) = 3*b**3 + 2*b**2 - 2*b - 1. Give i(-2). -13 Let t(a) = -4*a**3 - 84*a**2. Calculate t(-21). 0 Let c(v) = -2*v**2 - 5*v - 9. Determine c(-4). -21 Let m(x) = -3*x**2 - 6*x + 41. Determine m(-5). -4 Let a(j) = -2*j**3 + 11*j**2 + 8*j - 7. Calculate a(6). 5 Let d(w) = -w**3 + 2*w**2 - 9*w + 9. What is d(1)? 1 Let x(s) = s**2 - 10*s - 6. Calculate x(9). -15 Let g(s) = -s**2 + 5*s - 5. Calculate g(6). -11 Let s(l) = 4*l + 192. Determine s(-47). 4 Let y(a) = a**3 - 4. Calculate y(-2). -12 Let i(b) = -2*b**2 - 4*b - 5. Calculate i(6). -101 Let q(b) = -b**3 + 6*b**2 + 2*b + 5. What is q(7)? -30 Let j(h) = 2*h + 21. What is j(-12)? -3 Let h(u) = -7*u - 10. Calculate h(-7). 39 Let l(k) = -14*k**2 + k - 6. What is l(-3)? -135 Let n(s) = s**3 + 7*s**2 - 3*s - 8. What is n(-7)? 13 Let o(b) = -b**3 - 7*b**2 - 10*b + 1. What is o(-3)? -5 Let w(q) = -q**2 - 12*q - 15. What is w(-6)? 21 Let t(y) = 2*y**3 - 3*y**2 - y + 4. What is t(2)? 6 Let h(q) = 2*q**2 + 15*q + 3. Determine h(-6). -15 Let h(s) = s**3 + 6*s**2 + 6*s - 2. What is h(-5)? -7 Let n(t) = 2*t**2 - 36*t. Give n(18). 0 Let z(s) = 20*s - 457. Determine z(23). 3 Let i(d) = d**2 + 8*d + 7. Determine i(-5). -8 Let f(r) = r**3 - 33*r**2 + 34*r - 59. Determine f(32). 5 Let
Enjoy? Give us a share! How to Get a Job Promotion in 6 Quick (and Simple!) The social work field has a horde of obstacles including paperwork, resistant clients, coworkers not pulling their weight, and program managers simply looking for end results. With so many obstacles and little time in the presence of the your agency’s movers and shakers, making a difference in how you’re viewed can be difficult to achieve. So how can you stand out to show you’re looking for a job promotion? You build a name and reputation for yourself that will transcend not just your program but upward to the administrators. Disclaimer: This post contains affiliate links. I may receive a commission based upon your purchase, which does not affect the price you pay. It is my intent to provide affiliate links that you might find useful! And there are six quick steps you can do nearly everyday to help build that name for yourself. [convertkit form=916660] Step 1: Do your job and do it well! This should go without saying, but I have met many people who get envious of others’ job promotion and wonder why they were not chosen simply because of seniority. How do you know if you’re doing your job well? Take you ego out of the equation. Find out how your program measures success. In a manager’s mindset, success equals accomplishing program outcomes. When a program accomplishes its goals, it also obtains security and likely increased funding. If you do not know your program’s goals, ASK! If you’ve been paying attention in your team meetings, you should already have a good idea what they are. Scour your caseload and determine how you can achieve success using your manager’s cues. This will put you in position to be a go-to for navigating case consults. Step 2: Be an informal leader. If you are looking to get a job promotion, you must demonstrate leadership. Keep in mind, there are many forms of leadership. Don’t worry if you’re not the most outspoken! Meeting your program outcomes will lead to success noticed by your boss and colleagues. They will then ask you for help. Take full advantage of this. Learn to train and motivate others without needing to be authoritative. That is the key to leadership; and now you have the opportunity without the guise of power. Here’s your brief crash course in leadership. Social Work Interviews and Resumes! As a hiring supervisor for a Community Mental Health, it’s evident that those who think they know how to write a resume really do not! It wasn’t too long ago that I really struggled knowing what to put into a cover letter and resume. Take every opportunity to advocate for your team members. Help motivate them by emphasizing their strengths. Additionally, when new employees start, your program manager will have little time to teach the nuances of the position. You’ve completed step one well. You also have demonstrated yourself to be an informal leader. Now, your manager will likely look to you to coach employees! If your boss is having you train a staff member, it is because they want to replicate you and how you do your work. Embrace this role! There is no better way to become an informal leader. Step 3: Understand the administrative perspective. So often I hear colleagues complain about policy changes and new paperwork that must be completed. This is the world of social work. Federal and state laws change, which cascades down to agencies and their boots on the ground- ergo you. In your spare time, learn as much as you can about why your agency is moving in the direction they are. Use this information in how you interact with your peers. How grateful will your supervisor be to know they’re not the only one pushing the message of change? That means you cannot subvert yourself to complaining or you will look two-faced. That will undo any of the hard work you’ve put in. Supervisors must understand where the program currently exists, and where policy will take it. Show your boss that you see the direction of the agency and why! Supervisors do not want to be the only preacher of change. Step 4: Utilize supervision at every opportunity. What better way to show your boss all the policy you’ve learned in your spare time? Use that knowledge of policy and program goals to show your critical thinking skills. If you do not have one-on-one supervision, these methods can work in a group context as well. Lend support to others utilizing your knowledge. Your boss will take notice. Help others connect their strengths with the direction of the agency. This is much like advocating for your team. When you have opportunities to talk to your boss one-on-one, inform him or her of your interest in growing professionally. This is an important seed to plant as you are now likely on his or her radar. Show initiative to your boss. A job promotion is too important to pass up to assumptions. Step 5: Know your competition and who the decision makers are. The field of social work can be very competitive. As you are growing in your professional development, it is likely that you’ve taken notice of others whose skill set is comparable to yours. Evaluate them. What are their strengths and weaknesses within their role? Beyond that, you need to know who the decision makers are in your agency. Your manager may not be the only one to determine who gets a job promotion. In every opportunity you have, rub shoulders with these decision makers. When you see them, say hi. Introduce yourself if you can. When a promotional opportunity opens up, administrators will be looking for a good fit. If you are seen as a possible choice, it’s also possible those competitors are. How do your skills stack up? You will need to continually improve on your deficits to stand out! A word of caution, however- administrators tend to be very busy people. It is imperative to not waste their time. If you find yourself in a meeting with them, show off your knowledge of macro policy. If you see them at the printer or in the break room, make a comment to generate warmth. This isn’t a long conversation, but a brief interaction that promotes positive feelings. Let them know who you are. If you are excelling, your boss may already be talking you up to the administrators. When your name comes up later, these feelings of warmth will likely return. “Your manager may not be the only one to determine who gets a job promotion. In every opportunity you have, rub shoulders with these decision makers.” Step 6: Identify upcoming openings. By this point, you are likely to have an edge over most in your program for any advancement opportunities. If you haven’t already, identify a position that you would excel in and equally important enjoy. Be mindful of the likelihood that position will open, however. You don’t want to set your sights on a job that will not likely open in the near future. Go talk to individuals in those roles and develop a relationship and working knowledge of their role. When that day comes, and the position is posted, you now have a great foundation to use during the interview. You can work each of these six steps on nearly a daily basis. More importantly, they plant you in the mind of your superiors. Job promotions are not necessarily given to the most qualified or skilled; they are often awarded to who management knows and trusts. Competence absolutely has a role here. But if the manager cannot trust you or has had a bad experience with you, your competence may be of worthless value in considering a job promotion. In-fact, it might solidify you in your current position considering you’ve demonstrated your ability to help the program succeed but give the higher ups uneasy feelings regarding your character. These steps are not all you can do to demonstrate your readiness for a promotion. There are many things that managers must consider before they can make any personnel decisions. I encourage you to review your role and skill set. If you are eager to get that promotion and want to understand these steps in greater detail or want a more personalized evaluation, consider scheduling a consult. The feedback could be what you need to get an edge and promote both your value and paycheck. Let me hear your thoughts! Do you have a promotion you want? How do these steps fit in? -Ben Enjoy? Give us a share!
Treatment of Metastatic or High-Risk Solid Cancer Patients by Targeting the Immune System and/or Tumor Burden: Six Cases Reports. This article summarizes the histories of six patients with different solid tumors treated with a new strategy based on tumor burden reduction and immune evasion as potential targets. All six patients were at a high risk of relapse and were likely to have a minimal residual disease following conventional therapy: biochemical recurrence (BCR) following radical prostatectomy (RP) (two prostate cancers patients), removal of distant metastases (one colorectal and one breast cancer), and complete response (CR) of distant metastases to conventional therapy (one breast cancer and one esophageal-gastric junction cancer). Four of the patients, two after RP and BCR, one after removal of a single pulmonary metastasis from breast cancer, and one after CR to chemotherapy of peritoneal metastases and ascites from an esophageal-gastric junction primary cancer, regularly received cycles of a new drug schedule with the aim of inhibiting immune suppression (IT). In these four patients, preliminary laboratory tests of peripheral blood suggested an interleukin (IL)-2/IL-12 mediated stimulation of cellular immune response with a concomitant decrease in vascular endothelial growth factor (VEGF) immune suppression. The fifth case was a breast cancer patient with distant metastases in CR, while receiving beta-interferon and interleukin-2 in addition to conventional hormone therapy. To date, all five patients are alive and doing well and they have been unexpectedly disease-free for 201 and 78 months following BCR, 28 months following the removal of a single pulmonary metastases, 32 months following CR to chemotherapy of peritoneal metastases and ascites, and 140 months following diagnosis of multiple bone metastases, respectively. The sixth patient, who had colorectal cancer and multiple synchronous liver metastases and underwent nine surgical interventions for metastatic disease, although not disease-free, is doing well 98 months after primary surgery. Our six cases reports can be interpreted with the hypothesis that immune manipulation and/or a concomitant low tumor burden favored their clinical outcome.
10 Remedies To Unblock Your Baby’s Nose Every mom wishes that her baby stays cheerful. But most of the babies can suffer from the common ailment of cold quite often. This makes the baby irritable and the mom worried. However, whenever my daughter suffers from a runny nose, her paediatrician would tell me that it’s a good thing as it is the body’s mechanism to remove the germs. But severe cold also causes nasal congestion which makes a baby very uncomfortable and can affect his feeding and sleeping pattern. Nasal congestion Nasal congestion is the blockage of the nasal passages usually due to membranes lining the nose becoming swollen from inflamed blood vessels. It can be caused due to common cold, flu, allergies, or sinus. Though it is a common ailment if not treated properly can even hinder mental and physical growth in some serious cases. Children in the first few months of their life are obligatory nose breathers. So, when they suffer from nasal congestion, they have difficulty breathing. This makes them extremely cranky because of the discomfort. Signs of Nasal Congestion in Infants: Reduced number of feeds Sneezing Whistling noise from the nose Snoring Pricking the nose A runny nose Signs of Nasal Congestion in 1 to 6-year-old: A runny nose Disturbed sleep Coughing Fever in case of severe respiratory infection Snoring Remedies for Nasal Congestion: 1.Saline water: If your baby is under six months old, you can put few drops of saline water in each nostril. 2.Carom seeds hot pad: This is a very popular Indian method to ease a baby from nasal congestion. Roast one tablespoon of carom seeds on a pan. Next, transfer the roasted seeds in a muslin cloth and make a tight pouch. Check that the cloth is not too hot and then place it on your child’s chest as a hot pad or make your child inhale its aroma to ease the congestion. My grandmother has used this method and I have used it for my daughter which has most of the times relieved her of congestion. 3. Remove hard mucus: Remove the hard, sticky mucus using a cotton dipped in warm water to prevent it from blocking the nose. 4. Breast milk: Put a few drops of breast milk in the nostrils of newborn babies to ease nasal congestion. When my daughter was 1 month old, she developed nasal congestion and my friend who is a doctor suggested this method. Since the congestion wasn’t severe it worked for my daughter. 5. Eucalyptus oil: Put a few drops of Eucalyptus oil on the baby’s bedding. Since the smell of eucalyptus oil is too strong for babies, do not apply it directly. For older kids, one can rub a few drops of oil on the kid’s chest. I regularly use Eucalyptus oil to treat nasal congestion for my child. 6. Hydrate: Always keep the child hydrated when suffering from nasal congestion as hydration keeps the mucus thin. 7. Elevate: Elevate the baby’s head with the help of a pillow when you put him to sleep. This helps the mucus to drain out thereby opening the nasal passage. 8. Nasal Aspirator: For toddler kids suffering nasal congestion, a nasal aspirator can be used to remove the excess mucus. Nasal aspirator is available at medical stores. 9. Steam bath: An effective method to provide comfort to a baby from nasal congestion would be to run a hot water shower in the bath and sit in the steamy bathroom with the baby. 10. Use nasal sprays or drops: I have very frequently used nasal drops for my daughter to relieve her from nasal congestion. Nasal Saline Solution, like Nasivion, being the first line of treatment, is safe and can be used by anyone. If the problem is aggravated then after consulting the doctor, one can opt for Nasivion (Mini) Baby Nose Drops 0.01% or Nasivion Pediatric (Child) Nose Drops 0.025% depending on the age of the child. Please make sure you consult your doctor/ paediatrician before using the product. The dosage and the frequency to use the Nasivion (Mini) Baby Nose drops can be administered accordingly: Up to the age of 1 month: 1 drop of the solution into each nostril 2-3 times per day. From the age of over 1 month until the age of 1 year: 1-2 drops into each nostril 2-3 times per day or as directed by a physician. Liked reading this post? Pin this image on Pinterest to share the info. share Like this: Published by Aesha I am a mommy blogger who loves to read, write and travel. I am a teacher by qualification and a blogger by profession. Aesha’s musings is all about my experience as a mother , daughter, wife, friend, companion , partner in crime and each of that facet that all of us will identify with. So feel free to share your experiences , opinions & a lot of motivational inputs ! View all posts by Aesha
Q: How do I incorporate magical resurrection without losing dramatic tension? Magical resurrection is a theme in many RPGs, and also in 5e Dungeons and Dragons. However, whatever means of magical resurrection players can access, in most cases nonplayer characters can access too. How do I allow magical resurrection as part of the game world without removing the dramatic tension that accompanies death? If any major character who dies has the potential to return, won’t death lose significance? How do I avoid this? Ideally, the solution won’t be to just tax the party money; that’s unpleasant, but it’s not emotionally significant. A long, extensive quest isn’t always possible. What means are available to me to keep death scary without combat devolving into a torch-the-bodies-afterwards affair on both sides? Any effective solutions you've implemented in your own game would be highly appreciated. A: Overcoming Death Let's start with what the RAW options and costs are for resurrection and when they become a factor: Revivify, 3rd level spell (5th level caster), Cleric & Paladin, 300gp, must be cast within 1 minute of death. In practice, you must have this spellcaster with you when you die and they must have the spell prepared. Raise Dead, 5th level spell (9th level caster), Bard & Cleric, 500gp, must be cast within 10 days of death; you suffer penalties for 4 days. Reincarnate, 5th level spell (9th level caster), Druid, 1000gp, must be cast within 10 days of death; you are unlikely to be the same race (which is fun). Resurrection, 7th level spell (13th level caster), Bard & Cleric, 1000gp, must be cast within a century (for PCs this is practically indefinitely); you are fully restored. Some negative effects on the spellcaster. True Resurrection, 9th level spell (17th level caster), Cleric & Druid, 25000gp, must be cast within 2 centuries (for PCs this is practically indefinitely); you are fully restored, this is the only one that works in the absence of a body. Wish, 9th level spell (17th level caster), Sorcerer & Wizard, Free, you would use this to duplicate Resurrection. Except for Wish each of these options has an per use cost and that these costs are significant; the cheapest would keep you in a modest lifestyle for almost a year. If you go by the Starting Equipment table on p.38; PCs of levels 1-4 cannot afford any of these, 5-10 have enough wealth for 1 death, 11-16 for 10 and 17+ for 20. In addition, having the cash isn’t enough - you have to have a diamond worth at least that much. Not a group of diamond - one increasingly valuable (and rare) one. Except for True Resurrection they all require a body; as you mention, burning the corpse is a pretty effective, if ghoulish, way of preventing a return for all but those with links to the most powerful divine spellcasters. In addition, they all require somebody to care enough about the dead creature to go to the effort and pay the cost. Evil villains generally do not inspire that level of devotion. As an aside, there are some ways of causing death that specifically exclude some methods of returning. What you could do AD&D had a Resurrection Survival chance based on your constitution score: if you rolled less than this you were raised and permanently lost a point of constitution, if you failed you were dead forever. This put an unknown limit on the number of times a person could be raised. Adopting and simplifying this you could have the dead creature make a saving throw in order to come back from the dead. This could simply use the mechanism for the death saving throw (a 59.3% chance of success) or you could tie it to an ability score; Constitution, Charisma and Wisdom could all be argued for, you could choose one or allow the creature to choose their best. You can also decide if proficiency is included. Further options, involve a better chance for higher level spells. The possibilities are endless. In general, having a small but non-trivial chance that death is permanent may serve to concentrate the mind. Of course, if you want something to really scare your PCs, D&D 3.x mechanism of losing a level is an extremely high price to pay. A: It really depends on what your goals are. Death is as significant as its effects are in the game. For games where real permanent death almost never happens to PCs, and has no consequences, death can be quite insignificant. This can also reduce the difficulty and consequences of failure to the point where the players don't really need to fear much of anything, and can expect most or all defeats to be merely temporary setbacks or mere delays on their inevitable path to success and glory. This can undermine the "glory" too, if players notice there's no real question of actual defeat. Many computer games are like that ("Oh I died, better respawn or restore my last saved position, guess I just wasted three minutes..."), and even some tabletop games.) You asked, "If any major character who dies has the potential to return, won’t death lose significance?" Yes, it loses significance equal to the difference in the consequences between actual death, and whatever death means in the game. However, having "the potential to return" can be very different from easy returning, in a number of ways, depending on the game being played, and what exists in the Game Master's world and the specific scenario. For examples: Returning may require special skills which the players don't have easy (or perhaps any) access to. Returning may involve a loss of abilities, in terms of experience/levels, attribute scores, or other added disadvantaging side-effects (aging, afflictions, etc). Returning may require ingredients which are scarce or challenging to obtain, and/or cost a lot of money, or which could be used for other things if not used for resurrections. Returning may involve the challenge of bringing the mostly-intact corpse to a particular location, perhaps within a certain time period. Returning may have other risks or limits, such as a maximum number of times per person, or within a period of time, and/or chances of failure and/or side-effects. Returning may have religious and/or social stigmas, such as being considered evil necromancy and/or mortal sin. Some people with religious attunement might even be able to tell that someone has been resurrected. Returning may also not just be a simple convenient state change. Depending on the game world's spiritual setup, it may be more involved than that, possibly consorting with and striking deals with fae or djinn or spirits or demons, or maybe the PC's own spirit needs to be convinced to return, and so the returned PC becomes focused on whatever that convincing reason was, like a revenant (q.v.). Returning may require a long time for the returned PC to be able to be very effective again, during which time they are weak or fragile and need to rest or at least wait to recover their former strengths and abilities. So I would consider carefully what you and your players think you want death to be like in your games, check out all the options in the rules you mean to play with, and discuss with your players. Then decide what rules to use, what game world situation to set up, and possibly what house rules to use. For what it sounds like you want, I think you could pick and choose from ideas such as above to get a game where death can be returned from, but only with major costs and effort involved, and as much or as little impact as you want. Staying system-agnostic, I find that the choice of combat system also has a major effect on the death situation. That is, in games with abstract combat systems, especially games with dangerous abstract combat systems, it may be fairly difficult to avoid death sometimes, and in this case, it may be more tempting to have actual permanent death be unlikely. On the other hand, in games with more detailed tactical combat systems, or games where players have lots of ways they can (and are expected to) be careful to greatly reduce risks of death, and risk management is an important element of play, then it may work well to have deaths and crippling injuries be more or less permanent unless avoided in the first place. Or, player tastes may even enjoy fairly common and unpredictable risks of permanent loss or death, and enjoy that not dying is a significant achievement (that's how many early RPGs played out, any some players still enjoy that experience). (Personally, I mostly run games with little magical healing, but plenty of choices and tactical battles that let the players choose what risks to take. Usually there are very few PC deaths, because they tend to make choices that avoid getting them killed.) A: The tension is a product of high stakes involved. If you want an event of death to be dramatic, you need to introduce stakes that are lost by dying. Of course, these stakes may include losing a character, but that's not the solution you were looking for probably. 13th Age recommends limiting the number of resurrections or inducing a campaign loss. The first is simply a hard cap of the times one can return from the dead, and it is usually once per level. The second is a technical term for handing significant narrative advantage to the opposition - maybe the enemies get more time to fortify themselves, maybe a calamity strikes forcing the players to use up their resources, or maybe the cause the heroes support suffers a significant setback. Other possibilities: returning character suffers from debilitating affliction that renders them handicapped for significant time (depression, weakness, temporary loss of level, etc). returning character must name an important bond, feature or resource they lose. This can be losing ability to love, disfigurement or an important item. returning a character to life takes time. During that time the player must use an inferior substitute character.
The present invention relates to the field of storage trunks for motor vehicles, and more particularly to storage trunks for trucks and sports utility vehicles. Flatbed trucks of the type with open bed cargo areas such as the Jeep.RTM. Wrangler.RTM. truck are especially susceptible to unwanted intrusion. These vehicles generally have no large secure storage area (trunk) that will keep cargo and personal effects out of sight and secure. Articles left unattended in the truck are viewable by potential thieves and subject to theft and tampering. The theft of articles from these open vehicles is a major problem for owners. Moreover still, the threat of theft of articles is a major inconvenience to owners when shopping, traveling, or engaging in any other activity that involves transporting articles in the vehicle. In the past, storage boxes and devices that create storage space in trucks have been devised to address the above described security problem. For the most part, these storage devices are relatively permanently installed (to prevent theft of the entire device and its contents) in the vehicle--usually by mounting the storage device to the rear bed of the truck with metal bolts or sheet metal screws. One consequence of permanently mounting the storage device in the rear bed of the truck is to reduce the cargo capacity of the truck and thus render the truck less useful for transporting cargo. Furthermore, if the owner needs to use the rear bed of the truck at its full size or for some other use, the storage device must be removed from its relatively permanent attachment to the vehicle with tools, which is a time consuming and laborious operation for the owner. One such past storage device on the market today is disclosed in U.S. Pat. No. 4,938,519 issued to Bradley S. Schlachter. This storage device is installed in the rear bed of the Jeep.RTM. Wrangler.RTM. truck behind the back seat and adjacent the rear gate door and forms an enclosure with relatively little storage capacity. Schlacher's storage device basically consists of a top wall and a front wall connected together to form an L-shaped device such that when installed, the rear bed side walls and the rear gate door of the truck form the rest of an enclosure. This storage device is also designed to be permanently mounted to the vehicle's chassis by screwing sheet metal screws through flanges of the storage device and into holes drilled into the rear bed side walls of the vehicle. Thus, Schlacher's storage device suffers on the owner those inconveniences mentioned above in addition to providing relatively little storage capacity. There is, therefore, a need in the industry for a devise that addresses the problems outlined above as well as other related and unrelated problems.
load("@rules_java//java:defs.bzl", "java_library") load("@batfish//skylark:pmd_test.bzl", "pmd_test") package(default_visibility = ["//projects/symbolic:__pkg__"]) java_library( name = "state", srcs = glob([ "*.java", ]), deps = [ "@maven//:com_google_code_findbugs_jsr305", ], ) pmd_test( name = "pmd", lib = ":state", )
Q: rsync: mkdir "2014-11/." failed: No such file or directory (2) i'm write a script for automation copying file with rsync from server-a to server-b this is my script : #!/bin/bash NOW=$(date +"%Y-%m") rsync -au --ignore-existing /var/www/uploads/$NOW/* -e root@1.1.2.2:/var/www/uploads/$NOW/. when we are going to an next month like from October to November , i get this error on my script : ` rsync: mkdir "/var/www/uploads/2014-11/." failed: No such file or directory (2) rsync error: error in file IO (code 11) at main.c(605) [Receiver=3.0.9] rsync: connection unexpectedly closed (9 bytes received so far) [sender] rsync error: error in rsync protocol data stream (code 12) at io.c(605) [sender=3.0.9] ` how should i fix this error ? please help me A: Firstly, make sure that the parent directory on the target exists. I.e. root@1.1.2.2:/var/www/uploads should exist. I think with your formulation, the trailing . refers to a directory which rsync tries to create, and it can't do so unless the parent directory already exists. ie the parent is root@1.1.2.2:/var/www/uploads/$NOW. Secondly, realise that the behaviour of rsync is subtly different to cp in various ways with the trailing '/' on the file name. I find the safest and most intuitive way to do things is to use a trailing / on the end of all directories. Like so: rsync -au --ignore-existing /var/www/uploads/$NOW/ -e root@1.1.2.2:/var/www/uploads/$NOW/ Unlike cp, rsync will reliably copy the content of the directory in the source argument to the content of the target directory, creating the target directory if necessary (though it's parent must exist), and not putting the source directory (ie the parent) inside the target directory if the target already exists. This is slightly different to what you were doing though in that the way you did it would exclude files with a name starting with . in the source directory, and would fail if the list of files being copied was too long (bash expansion capped at a total command line length of around 32K characters if memory serves me right).
Q: Windows Phone 7 Ads not showing I have created an application where i have placed out the adcontrols. I have also configured the IDs for my application though yet no ads are displaying after the change. I have both tested it through the emulator and on my own Windows Phone yet the ads are not showing, what could be the problem? A: The problem still persists! Though i know why now and it was nothing with wrong codes or anything. Microsoft are having problems with their adserver and several people are having the same issues as me. Seems like this has all begun now in january 2013. People cant even see the test Adcontrols anymore and neither can i. This is a problem with Microsoft that they have to resolve. Im posting this link to their forums so you can read more and understand that several others have similiar problems with the Adcontrols. Hope this helps! http://community.bingads.microsoft.com/ads/en/publisher/f/32/t/74426.aspx Regards William!
Q: Find a sufficient condition for point in the intersection of surfaces Find a sufficient condition for a point $(x_0,y_0,z_0)$ in the intersection C of surfaces $x^2+y^2+z^2=1$ and $x^3+y^3+z^3=0$ to have a neighborhood $U$ with $U\cap C$ parametrized by the x coordinate as a curve, that is, $U \cap C = \{(x,f(x)): x \in (a,b)\}$ for some interval $(a,b)$ and some function $f:(a,b) \rightarrow \mathbb{R}^2$. Attempt: Not sure how to start. I think I have to apply the Implicit Function Theorem. The intersection of surfaces would be given by $x^3-x^2+y^3-y^2+z^3-z^2+1=0$. But I am stuck. How to proceed from here? A: This is the implicit function theorem, as you suspected. Define the function $$f(x,y,z) = \pmatrix{x^2+y^2+z^2-1\\ x^3+y^3+z^3}$$ so that $$f(x_0,y_0,z_0)=\pmatrix{0\\0}$$ The Jacobian of $f$ at $(x_0,y_0,z_0)$ is $$Df(x_0,y_0,z_0)= \left( \begin{array}{c|cc} 2x_0&2y_0&2z_0\\3x_0^2&3y_0^2&3z_0^2 \end{array} \right) $$ where the vertical line indicates that since we want to express $y,z$ as functions of $x$, we will consider the partial derivatives with respect to $y$ and $z$, that is, the last two columns of the matrix. The condition is $$\left |\matrix{2y_0&2z_0\\3y_0^2&3z_0^2} \right|\ne0$$ that is $$\boxed{y_0z_0(z_0-y_0)\ne0}$$
Organic Chemistry Tutors in Sterling Heights, MI I enjoy board games, art, cats, and nature during my free time. Biochemistry, Biology, Chemistry, Ecology, Environmental Science, Honors Chemistry, Life Sciences, Microbiology, Organic Chemistry, Physiology, Science When I was in high school, I started to see the world from a... During my time in University of Michigan, I was a private Organic Chemistry and Biology tutor . As such, I have led study groups and instructed a laboratory accompanying course for Organic Chemistry . I have also tutored MCAT OChem and Biology for the Princeton Review . ... My teaching style involves detailed explanation of the concepts prior to application . I enjoy working with students and helping make difficult subjects possible to learn.One advantage of tutoring is the opportunity to customize your teaching style to the student . This is... In addition to tutoring independently, I have also worked as a supplemental instructor for Biochemistry and as an Organic Chemistry exam grader at the University of Michigan . In both courses, I worked with groups of students, as well as individual students, enjoying great... This experience has given me a high level of expertise in Organic Chemistry . - I have received several awards and scholarships from both my school and outside entities for my research in organic methodology . - In addition, I also completed my BS degree in Biology and am... I have been playing music for about 15 years . I have many awards from music competitions . I have competed in the American Guild of Music, and in the high school MSBOA music competitions. Algebra, General Math, Geometry, Biology, English (ESL), Study Skills/Organization,... Experiences - Have been hired to tutor a group of students for a college chemistry course - Have tutored a friend and helped him pass a very hard college course of Eukaryotic Cell Biology - Have achieved a Bachelor degree in microbiology so i have taken advanced science... Organic and inorganic chemistry teacher for the last 20 years. Chemistry Teaching experience of organic and inorganic chemistry and biology in the US and abroad . Organic and inorganic chemistry teacher for the last 20 years. Chemistry I am also experienced in any chemical engineering related courses including Transport Phenomena, Thermodynamics, Kinetics, etc . I also did research in a Stem Cell Laboratory for a year and a half while in undergrad . I was voted Most Likely to Change the World as a senior... -- Head general chemistry teaching assistant for 3 years at the University of Minnesota . Responsible for managing and staffing a full time tutoring center for 3 different general chemistry classes . -- 3+ years experience teaching and tutoring college level general... Having a mentor who challenges and drives someone to strive for more is the best possible way to make that goals become reality. 10th Grade, 11th Grade, 12th Grade, 7th Grade, 8th Grade, ACCUPLACER Arithmetic, ACCUPLACER College-Level Math, ACCUPLACER Elementary Algebra,...
The major goal of the proposed studies is to apply the current wealth of knowledge about the molecular structure and function of diphtheria toxin (DT) to create genetically inactivated cross- reactive mutant forms of the toxin (CRMs) that will serve as ideal components of future vaccines. The crystallographic structure of DT was solved recently, revealing the topography of the 3 functionally distant domains-the C (catalytic), T (transmembrane), and R (receptor-binding) domains. Using known substitution and deletion mutations that selectively abrogate individual functions, we will seek to define a limited set of CRMs that are appropriate for developing various types of vaccines. First, as an alternative to standard formal intoxoid, the investigators will seek to develop a holotoxin CRM with negligible biologic activity and with minimal alteration in antigenicity and immunogenicity. Second, toxin fragments corresponding to the 3 domains and selected inter- and intra-domain peptide sequences will be investigated as potential immunogens. Third, the investigators will investigate the hypothesis that disruption of the receptor-binding or membrane-translocation functions may alter the immunogenicity of the molecule. Fourth, to create a new vehicle for polysaccharides in conjugate vaccines, the investigators will introduce specific functional residues within CRMs to generate coupling sites for polysaccharides. Fifth, to identify mutant forms of DT appropriate for incorporation into live-vectored vaccines, the investigators will prepare and test multiply mutated CRMs that have suitably low probabilities of reversion. These studies will enhance understanding of the role of each of the critical vaccine antigens which will be: biologically inactive and stable without chemical toxoiding, highly consistent from batch to batch, inexpensively purified by simple affinity chromatography methods, suitable for chemical coupling to bacterial polysaccharide antigens in defined locations, and suitable for insertion into live vectors or for creation of chimeric proteins. The approaches developed in these studies may be applicable to other important vaccine antigens, such as tetanus toxin, pertussis toxin, and other pertussis antigens.
<alice> <!-- Open source software Copyright (c) 2000 Dr. Richard S. Wallace. --> <!-- This program is free software; you can redistribute it and/or modify --> <!-- it under the terms of the GNU General Public License as published by --> <!-- the Free Software Foundation. --> <!-- Originariamente --> <!-- Generated with AIMLBuilder - www.infobots.nl --> <!-- MARIA sottoprogetto traduzione in italiano --> <!-- Open source software Copyright (c) 2001 M.A.R.I.A crew. --> <category> <pattern>HO UN GATTINO BONSAI</pattern> <template>Avere <settopic>gattini</settopic> e' molto divertente. Che tipo hai?</template> </category> <category> <pattern>PARLIAMO DI *</pattern> <template>Certo, <settopic><person/></settopic> sembra un buon argomento.</template> </category> <category> <pattern>NO</pattern> <that>HAI DOMANDE SUI GATTI BONSAI</that> <template>Va bene. Lo sai che certi <settopic>gattini</settopic> sono qudridimensionali?</template> </category> <category> <pattern>_ GATTINI</pattern> <template>Bene! Che tipo di <settopic>gattino</settopic> ti piace?</template> </category> <category> <pattern>_ FELINI</pattern> <template>Alcuni felini sono belli.. Per esempio certi tipi di <settopic>gattini</settopic>.</template> </category> <topic name="gattini"> <category> <pattern>*</pattern> <template><random> <li>Sai come e' fatta una bottiglia di klein?</li> <li>Cosa altro sai dei gattini?</li> <li>I siamesi sono belli.</li> <li>Alcuni pensano che i gattini non siano gommosi sinche non provano a farne dei bonsai.</li> <li>La sterilizzazione dei gatti femmina e' molto invasiva.</li> </random></template> </category> <category> <pattern>* NE HO UNO</pattern> <template>Bene! Ci giochi molto?</template> </category> <category> <pattern>IO HO UN *</pattern> <template>E' <set_it><star/></set_it> un gattino?</template> </category> <category> <pattern>IO HO UNA *</pattern> <template>e' <set_it><star/></set_it> una gattina?</template> </category> <category> <pattern>NO</pattern> <that>SAI COME E' FATTA UNA BOTTIGLIA DI KLEIN</that> <template><srai>COME UNA BOTTIGLIA DI KLEIN E' FATTA</srai></template> </category> <category> <pattern>NESSUN *</pattern> <that>E' UN GATTINO</that> <template>Ah, quanti <settopic>pets</settopic> hai?</template> </category> <category> <pattern>COME E' FATTA UNA BOTTIGLIA DI KLEIN</pattern> <template> Una bottiglia di Klein e' la versione tridimensionale del nastro di Moebius. E' una figura tridimensionale che ne raffigura una in quattro. Di sicuro e' impossibile infilarci un gattino.</template> </category> <category> <pattern>A COSA SOMIGLIANO I GATTI BONSAI</pattern> <template>I gatti bonsai sono rari e' impossibili da trovare sul mercato. Il loro fascino risiede nel fatto che non esistono</template> </category> <category> <pattern>SI'</pattern> <that>E' UN GATTINO</that> <template>Cosa dai da mangiare al tuo gattino <get_it/>?</template> </category> <category> <pattern>*</pattern> <that>COSA DAI DA MANGIARE A *</that> <template>Gli do avnzi e scatolette.. odia il filetto. <settopic>Nutrire i gattini</settopic> puo' essere divertente.</template> </category> </topic> <topic name="nutrire i gattini"> <category> <pattern>*</pattern> <template><random> <li> Una dieta nutriente e' importante per i gattini.</li> <li> La carne e' la parte piu' importante della loro dieta.</li> <li> E' impossibile dare da mangiare ad un gatto bonsai.</li> <li> Hai qualche domanda sul nutrire i gattini? </li> </random></template> </category> </topic> </alice>
An extended terminal half-life for darbepoetin alfa: results from a single-dose pharmacokinetic study in patients with chronic kidney disease not receiving dialysis. Anaemia is a major and persistent manifestation of chronic kidney disease (CKD) caused by the deficient production of erythropoietin in the kidneys, the prevalence of which is proportional to the deterioration in kidney function. Darbepoetin alfa, an erythropoiesis-stimulating protein, exhibits a lower clearance and longer terminal half-life in serum than recombinant human erythropoietin, thereby allowing for a reduced dosing frequency. A recent study in patients with CKD, using a 4-week sampling period, suggested that the terminal half-life of darbepoetin alfa in serum is longer than that reported in previous studies, which were based on a 1-week sampling period. This study was conducted to characterise the pharmacokinetic profile of a single subcutaneous dose of darbepoetin alfa 1 microg/kg in patients with CKD, using a sampling duration of 4 weeks, which was hypothesised to allow better characterisation of the terminal half-life in serum. Twenty patients with CKD not on dialysis, with a calculated glomerular filtration rate of 20-60 mL/min and who had not been treated with erythropoietic agents in the previous 12 weeks, were enrolled into this single-dose, open-label study. Patients received a single subcutaneous dose of darbepoetin alfa (Aranesp) 1 microg/kg on day 1, and blood samples were collected for pharmacokinetic analyses predose, 6 and 12 hours postdose and up to 28 days postdose. Seroreactivity sampling and further safety laboratory tests (clinical chemistry and urinalysis) were also performed. Patients were assessed for adverse events at each study visit. The primary endpoint was characterisation of the terminal half-life following a single subcutaneous dose of darbepoetin alfa 1 microg/kg. The mean terminal half-life in serum of darbepoetin alfa was determined to be 69.6 hours. Peak serum concentrations were reached in a median time of 36 hours postdose, and a mean apparent clearance of 3.51 mL/h/kg was comparable to that observed previously in this patient population. Based on an extended sampling schedule of 4 weeks, the terminal half-life of darbepoetin alfa was approximately 70 hours. This is longer than the 48.8 hours reported previously in patients with CKD on dialysis. These data suggest that the pharmacokinetic properties of darbepoetin alfa make this erythropoietic agent well suited to an extended dosing regimen.
Glucose and lactate biosensors based on redox polymer/oxidoreductase nanocomposite thin films. Glucose and lactate enzyme electrodes have been fabricated through the deposition of an anionic self-assembled monolayer and subsequent redox polymer/enzyme electrostatic complexation on gold substrates. These surfaces were functionalized with a negative charge using 11-mercaptoundecanoic acid (MUA), followed by alternating immersions in cationic redox polymer solutions and anionic glucose oxidase (GOX) or lactate oxidase (LAX) solutions to build the nanocomposite structure. The presence of the multilayer structure was verified by ellipsometry and sensor function characterized electrochemically. Reproducible analyte response curves from 2 to 20 mM (GOX) and 2-10 mM (LAX) were generated with the standard deviation between multiple sensors between 12 and 17%, a direct result of the reproducibility of the fabrication technique. In the case of glucose enzyme electrodes, the multilayer structure was further stabilized through the introduction of covalent bonds within and between the layers. Chemical cross-linking was accomplished by exposing the thin film to glutaraldehyde vapors, inducing linkage formation between lysine and arginine residues present on the enzyme periphery with amine groups present on a novel redox polymer, poly[vinylpyridine Os(bisbipyridine)2Cl]-co-allylamine. Finally, an initial demonstration of thin-film patterning was performed as a precursor to the development of redundant sensor arrays. Microcontact printing was used to functionalize portions of a gold surface with a blocking agent, typically 1-hexadecanethiol. This was followed by immersion in MUA to functionalize the remaining portions of gold with negative charges. The multilayer deposition process was then followed, resulting in growth only on the regions containing MUA, resulting in a "positive"-type pattern. This technique may be used for fabrication of thin-film redundant sensor arrays, with thickness under 100 angstrom and lateral dimensions on a micrometer scale.
"The abuse I suffered, while not as extreme as those in the game, was terrifyingly real." In Grand Theft Auto V, an R-rated video game that allows players to attack and kill women in the sex trade, I would have been the character who gets left by the sidewalk, bleeding and unconscious. Or hit with bats, run down, set alight still screaming and graphically murdered – for game points, or maybe just 'for fun.' I was in the sex industry in my early 20s. But instead of the virtual world of GTA V – the abuse I suffered, while not as extreme as those in the game, was terrifyingly real. A still from Grand Theft Auto V. Photo: Rockstar It has taken me almost ten years to get my life back on track and to recover from the sexual violence and abuse I faced. I still live with flashbacks, nightmares, and crippling depression and anxiety. Last week, together with two other women, I started a change.org petition requesting Target to pull GTA V from its shelves. The reason behind the campaign is simple: that a game exists which makes 'enjoyment' out of the kind of abuse I lived through in real life is sickening. For survivors of abuse, it adds insult to injury to think someone could get a thrill out of violence against women, even if it was in a 'virtual world'. In GTA V, a new 'first-person player mode' feels more realistic than ever. This includes a more realistic depiction of sex acts with women (who are largely represented as prostitutes) – and the options that follow of being able to kill them with machetes, guns or bats to get their virtual money back. Making it all the more disturbing was having a retailer I shop at which sells and promotes this kind of game. As recently as last week, Target was advertising Grand Theft Auto next to Peppa Pig. This was being marketed at parents buying Christmas toys. It sent a terrifying message. This is a game that has ingrained misogyny and graphic violence against women. It breeds an acceptance of abuse in our world; abuse from which I've been trying desperately to recover – and by stocking this game, major retailers are lending their credibility to it. Despite potential backlash, I couldn't stay silent about this. The fact that over 40,000 parents, customers, and advocates got behind our change.org petition showed we weren't the only ones. The response to our campaign exceeded our wildest expectations – and forced Target to listen to their customers. Since then, gamers have launched vicious and violent attack on myself and other women who dared to speak up. We've had threats of rape and torture. To mutilate us and set us on fire. One gamer has threatened to locate us and publicise where we live. Another has superimposed the face of a friend onto the body of a murdered woman lying in blood, in a scene from the game. "I'm going on GTA V right now and pretending every ugly c—t is you", tweeted another hater to her. Ironically, these abusers claim this game does not perpetuate violence, and yet they continue to send women horrific violent threats online. Gamers also argue that games like GTA V have no impact on real life violence, despite research published earlier this year showing violent video games increases aggression, aggression-related variables and decreases pro-social outcomes. Sadly, many women don't need studies to tell us that. We know because we've lived it. We know how violence can start with 'playful' remarks and turn into dangerous, controlling behaviour. We've seen the violence implicitly condoned in these games play out in real life. The 'thrill and pleasure' that gamers get off violence against women in GTA V makes the world less safe. Not because every gamer turns into the abuser – but because it breeds a casual acceptance of violence against women. Stripping GTA V from the shelves of retailers like Target and Kmart won't change that culture overnight. It's one step among many -- like the recent #takedownjulienblanc campaign – that will help dismantle the culture of violence against women in years to come. It may not be a popular debate, but it's one that Australia desperately needs. *Name has been changed 1800 RESPECT (1800 737 732): 24 hour, National Sexual Assault, Family & Domestic Violence Counselling Line for any Australian who has experienced, or is at risk of, family and domestic violence and/or sexual assault. Lifeline: 131 114
The Salvation Army says conditions at some emergency housing providers in Whanganui are so poor they are putting vulnerable people at risk. The tenancy manager for emergency housing in the city, Pikihuia Box, says she avoids referring people to Purnell House and to the Bignell Street Motel and Campground because she considers them unsafe. Built in 1931, Purnell House was originally a boarding hostel for up to 100 boys from the neighbouring Wanganui Technical College - which later became Wanganui City College. The two-storey neo-Georgian building, which sits on 3.5 hectares of land, closed in 1980 and ownership reverted to the district council before it was sold about 15 years ago. Ms Box said the building had seen better days. "It's a very derelict building to be honest. Very rundown - I don't know whether it's inhabitable, however, it's being used for housing," Ms Box said. "It's in a terrible state." Ms Box said she did not send clients there, even in emergencies. "I haven't yet referred anyone to Purnell House and I wouldn't be inclined to refer anyone to Purnell House. "I don't think it's very sanitary and I don't think it's a very safe environment for our clients whether they are high complex or not. No, it's not a place I would be referring people to," she said. Photo: RNZ/ Logan Church Manager Matt Ngapeka, who according to the council is the owner of Purnell House, said the building was in need of some care. "Purnell House is as you see it... This building has a history that goes back to 1930," Mr Ngapeka said. "You can see the building's been done in brick and it's been plastered. It's got a bit of wear and tear on the building. It needs another paint job and a bit of a do-up." Mr Ngapeka said in all his time at Purnell he had never turned anyone away. "All the people who've been out on the street for the last 15 years that nobody wanted - that's who it's catered for," he said. "This building has taken every single person in that has been directed to it by government agencies, the hospital, WINZ, mental health. Any person." Photo: RNZ / Robin Martin It costs $120 a week to rent a room at Purnell, and Mr Ngapeka said some of the tenants were difficult. "The latest room that got done was someone through mental health. They hadn't had their medication for four days," he said. "Well apparently he lost it, so his room got smashed up. Fridges, TVs, beds, everything. Windows got knocked out. "That sort of stuff we do have to deal with." Asked whether Purnell House was a safe place to live, Mr Ngapeka was non-committal. "I would describe it as a place that's sufficient for people to live and when you look out there or you look downtown, it's better than living out on the street. It's better than someone living in their car," he said. Ms Box said she was equally concerned about the Bignell Street Motel and Campground at Gonville. "We often use this or have used this for emergency housing. We are still referring people here very reluctantly at the moment," Ms Box said. "It hasn't been a safe environment. The clients themselves are very reluctant to come here because they are aware of the activities that take place here." She had removed at least one person from Bignell Street for their own safety. "I do have a client with me currently at the moment that we have moved from here and she is now in long-term accommodation," she said. "She was attacked here and spent 11 days with no shower, fearful of going into the shower block and stopped eating out of fear." Photo: RNZ / Robin Martin Bignell Street's on-site manager Peter One declined to be interviewed. He invited RNZ to write an email to the owner but there was no reply. Real estate agent Ross Watson has recently taken over day-to-day management of tenancies at Bignell Street. Mr Watson said he had been trying to iron out some of the problems Ms Box was worried about. "The way I view it, if I didn't what I was doing and that is trying to keep it professional, the management side professional, doing tenancies under the Tenancy Act with bonds then you might have some issues I would say," Mr Watson said. "I'm trying to do the best I can as professionally as I can given the clientele and given the circumstances." Stuart Thorpe, who had been at Bignell Street for five weeks, said at least it was a roof over his head. "The house we'd been staying in sold so there was nothing affordable being on the benefit in Auckland where we've just come from, me and my partner," Mr Thorpe said. "It was too expensive to rent a house in Auckland so we had to come back down to Taumarunui, which didn't work for us either, and we ended up with emergency housing and the only place they could put us was here." There were a variety of residents, Mr Thorpe said. "They're good. There's different races and there's a few with mental health issues obviously. I think they're more the long-term residents of the camp," he said. "It's probably what they need, is somewhere stable." He did not have concerns about his safety. Photo: RNZ / Robin Martin When asked about the suitability of Purnell House and the Bignell Street campground for mental health out-patients, Whanganui District Health Board provided a one line statement. Director of area mental health services Jeff Hammond said its multi-disciplinary teams did not support people living in either accommodation provider, but some chose to. Ministry of Social Development housing deputy chief executive Scott Gallacher said in a statement that Purnell House and Bignell Street were not ideal accommodation. "We're aware of some issues with Purnell House and Bignell Street Campground and we know they're not ideal accommodation for everyone needing urgent housing help," Mr Gallacher said. "We don't actively promote them to our clients, nor do we fund them as a provider." The ministry did help pay for people who chose to live at either location, he said. "Sometimes a client will opt to stay at either Purnell House or Bignell Street Campground. If the client is comfortable with that or it's a last resort for them and the difference between sleeping rough or in a car, we'll support them with emergency housing costs for those places." If anyone living at either site had concerns about where they were staying they should get in touch so the ministry would work with them to provide alternative accommodation, he said. Demand for housing exceeds supply in Whanganui - according to the ministry's latest housing register figures there were 74 outstanding applications for housing in Whanganui.
Well i thoughht I Do A "Crossover/CosPlay Render "! Of Hot Ciri (The Witcher Games ) !) In Mass Effect ? (!) Well i Asmit i like Her "Def Face "! Bettter ! But i thought I Use her "New Face Model "! So that She is sort Of stll in Her "20's " ? Well what If She Joined The "N7 Programe Instead Of Reuniteting With her Father ? And Not Becomimg a "Witcher "! Like One Of the Endings in the Game ? !) !) Well i like To say a Big thank You To ( snipergiirl.deviantart.com/ So the Credit goes to him ! ( !) For the Idea And Pose ! Well i Do not Owen the orignal Pose ! ? ( Well ive Twiecked it a Bit By "Adusting the Elbows of the "Jane N7 Defender Mode "! And I Posed "Ciri's Eyes ABit Too So that She is Sort Of Doing a Stand Alone Pose !So the Credit goes to him ! (!) So Yer haaaa ! What You Think Guys ? "Renderd/Posed/Done By Me"! Done With : (Xps ) (ipiccy ) (Gimp ) (PhotoScape ) "Background Image "! Off the Net ! " Ciri New Face/Hair "! owend By ( dddkhakha1.deviantart.com/ ) " ME Jane Sheperd N7 Defender Armor "! owend By ( sonyume.deviantart.com/ )( M-37 Falcon ) Owend By ( nach77.deviantart.com/ "ME Andromeda Weapon Pack "! ( Jane is owend By (BioWare Corp/EA ) And Ciri is owend By : ( CD-Projeckt Red) ( Banda)
Atomoxetine Hydrochloride 80mg What is a generic medication? Generic medications are significantly discounted copies of brand name medication that have the same active ingredients, intended use, dosage, side effects, effects, and route of administration as the original brand name medication. In other words, generic medications have the same pharmacological effects as their brand-name counterparts. Over half of all prescribed medications are for generic medications. Atomoxetine Hydrochloride Drug Information Atomoxetine Hydrochloride Overview Atomoxetine is used to treat attention-deficit hyperactivity disorder (ADHD) as part of a total treatment plan, including psychological, social, and other treatments. It may help to increase the ability to pay attention, concentrate, stay focused, and stop fidgeting. It is thought to work by restoring the balance of certain natural substances (neurotransmitters) in the brain. Atomoxetine Hydrochloride Warnings A small number of people (especially children/teenagers) who take atomoxetine for attention-deficit hyperactivity disorder (ADHD) may experience worsening of their condition, other mental/mood symptoms, or suicidal thoughts/attempts. Therefore, it is very important to talk with the doctor about the risks and benefits of Atomoxetine Hydrochloride 80mg (especially for children/teenagers). Tell the doctor right away if you notice worsening of your condition/other psychiatric conditions, unusual behavior changes (including possible suicidal thoughts/attempts), or other mental/mood changes (including new/worsening anxiety, panic attacks, trouble sleeping, irritability, hostile/angry feelings, hallucinations, delusions, impulsive actions, severe restlessness, very rapid speech). Be especially watchful for these symptoms when you first start Atomoxetine Hydrochloride 80mg or when the dose is changed. How to Use Atomoxetine Hydrochloride Read the Medication Guide provided by your pharmacist before you start using atomoxetine and each time you get a refill. If you have any questions, ask your doctor or pharmacist. Take Atomoxetine Hydrochloride 80mg with or without food as directed by your doctor, usually 1 to 2 times a day. The first dose is usually taken when you wake up in the morning. If a second dose is prescribed, take it as directed by your doctor, usually in the late afternoon/early evening. Taking Atomoxetine Hydrochloride 80mg late in the day may cause trouble sleeping (insomnia). Swallow the capsules whole. Do not crush, chew, or open the capsules. If the capsule is accidentally opened or broken, avoid contact with the powder and wash away any loose powder as soon as possible with water. If the powder gets in your eyes, flush with plenty of water right away and contact your doctor. The Dosage of Atomoxetine Hydrochloride 80mg is based on your medical condition, response to treatment, and other drugs you may be taking. Be sure to tell your doctor and pharmacist about all the products you use (including prescription drugs, nonprescription drugs, and herbal products). Do not increase your dose or take Atomoxetine Hydrochloride 80mg more often than directed. Use Atomoxetine Hydrochloride 80mg regularly to get the most benefit from it. To help you remember, take it at the same time(s) each day. Tell your doctor if your condition does not improve or if it worsens. Atomoxetine Hydrochloride Precautions Before taking atomoxetine, tell your doctor or pharmacist if you are allergic to it; or if you have any other allergies. may contain inactive ingredients, which can cause allergic reactions or other problems. Talk to your pharmacist for more details. Before using Atomoxetine Hydrochloride 80mg, tell your doctor or pharmacist your medical history,a certain adrenal problem (pheochromocytoma), bladder or prostate problems, glaucoma, heart problems (such as irregular heartbeat, heart failure, previous heart attack, problems with heart structure), family history of heart problems (such as sudden cardiac death, irregular heartbeat), high blood pressure, liver disease, personal/family history of mental/mood disorders (such as bipolar disorder, depression, psychosis, suicidal thoughts), stroke. Atomoxetine Hydrochloride 80mg may make you dizzy or drowsy. Alcohol or marijuana (cannabis) can make you more dizzy or drowsy. Do not drive, use machinery, or do anything that needs alertness until you can do it safely. Limit alcoholic beverages. Talk to your doctor if you are using marijuana (cannabis). Before having surgery, tell your doctor or dentist about all the products you use (including prescription drugs, nonprescription drugs, and herbal products). If used for a long time, Atomoxetine Hydrochloride 80mg may affect a child's growth rate, weight, and final adult height. To reduce the risk, the doctor may recommend briefly stopping the medication from time to time. Check the child's weight and height regularly, and consult your doctor or pharmacist for more details. During pregnancy, Atomoxetine Hydrochloride 80mg should be used only when clearly needed. Discuss the risks and benefits with your doctor. It is unknown if Atomoxetine Hydrochloride 80mg passes into breast milk. Consult your doctor before breast-feeding. Atomoxetine Hydrochloride Misdose If you miss a dose of Atomoxetine Hydrochloride 80mg, take it as soon as you remember if it is the same day. If it is the next day, skip the missed dose. Take your next dose at the regular time. Do not double the dose to catch up. Atomoxetine Hydrochloride Interactions Drug interactions may change how your medications work or increase your risk for serious side effects. This document does not contain all possible drug interactions. Keep a list of all the products you use (including prescription/nonprescription drugs and herbal products) and share it with your doctor and pharmacist. Do not start, stop, or change the dosage of any medicines without your doctor's approval. Taking MAO inhibitors with Atomoxetine Hydrochloride 80mg may cause a serious (possibly fatal) drug interaction. Avoid taking MAO inhibitors (isocarboxazid, linezolid, methylene blue, moclobemide, phenelzine, procarbazine, rasagiline, safinamide, selegiline, tranylcypromine) during treatment with Atomoxetine Hydrochloride 80mg. Most MAO inhibitors should also not be taken for two weeks before and after treatment with Atomoxetine Hydrochloride 80mg. Ask your doctor when to start or stop taking Atomoxetine Hydrochloride 80mg. Some products have ingredients that could raise your heart rate or blood pressure. Tell your pharmacist what products you are using, and ask how to use them safely (especially cough-and-cold products or diet aids). Atomoxetine Hydrochloride Side Effects Stomach upset, nausea, vomiting, constipation, tiredness, loss of appetite/weight loss, dry mouth, dizziness, drowsiness, trouble sleeping, or decrease in sexual ability/desire may occur. In women, menstrual cramps or missed/irregular periods may also occur. If any of these effects persist or worsen, tell your doctor or pharmacist promptly. To lessen the chance of dizziness, get up slowly from a sitting or lying position. Remember that your doctor has prescribed Atomoxetine Hydrochloride 80mg because he or she has judged that the benefit to you is greater than the risk of side effects. Many people using Atomoxetine Hydrochloride 80mg do not have serious side effects. Atomoxetine Hydrochloride 80mg may raise your blood pressure. Check your blood pressure regularly and tell your doctor if the results are high. Tell your doctor right away if you have any serious side effects,difficulty urinating, unusually fast/irregular heartbeat, fainting, numbness/tingling. Atomoxetine may rarely cause serious (possibly fatal) liver disease. Get medical help right away if you have any symptoms of liver damage,dark urine, persistent nausea/vomiting/loss of appetite, stomach/abdominal pain, yellowing eyes/skin. Atomoxetine Hydrochloride 80mg may rarely cause serious problems such as a heart attack or stroke.chest/jaw/left arm pain, shortness of breath, unusual sweating, weakness on one side of the body, confusion, slurred speech, sudden vision changes. Rarely, males (including young boys and teens) may have a painful or prolonged erection lasting 4 or more hours while using Atomoxetine Hydrochloride 80mg. Caregivers/parents should also be watchful for this serious side effect in boys. If a painful or prolonged erection occurs, stop using Atomoxetine Hydrochloride 80mg and get medical help right away, or permanent problems could occur. Ask your doctor or pharmacist for more details. A very serious allergic reaction to Atomoxetine Hydrochloride 80mg is rare. However, get medical help right away if you notice any symptoms of a serious allergic reaction,rash, itching/swelling (especially of the face/tongue/throat), severe dizziness, trouble breathing. This is not a complete list of possible side effects. If you notice other effects not listed above, contact your doctor or pharmacist. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088 or at www.fda.gov/medwatch. In Canada - Call your doctor for medical advice about side effects. You may report side effects to Health Canada at 1-866-234-2345. Atomoxetine Hydrochloride Storage Store at room temperature away from light and moisture. Do not store in the bathroom. Keep all medications away from children and pets. Do not flush medications down the toilet or pour them into a drain unless instructed to do so. Properly discard when it is expired or no longer needed. Consult your pharmacist or local waste disposal company. IMPORTANT DISCLAIMER: All medical content is supplied by a third party company who is independent from this web site. As such, this web site can not guarantee the reliability, accuracy, and /or medical efficacy of the information provided. In all circumstances, you should seek the advice of a health professional pertaining to drug, treatment and/or medical condition advice. Note that not all products are shipped by our contracted Canadian pharmacy. This website contracts with dispensaries around the world that ship products directly to our customers. Some of the jurisdiction include but are not limited to United Kingdom, Europe, Turkey, India, Canada, Vanuatu, Mauritius, and USA. The items within your order may be shipped from any one of these jurisdiction depending on the availability and cost of the products at the time you place your order. The products are sourced from these countries as well as others. Please note that the product appearance may vary from actual product received depending on availability.
952 F.2d 1252 60 USLW 2495, 34 Fed. R. Evid. Serv. 1258 UNITED STATES of America, Plaintiff-Appellee,v.Reva YOUNG, a/k/a Reva L. Mabary, Defendant-Appellant. No. 91-3147. United States Court of Appeals,Tenth Circuit. Dec. 31, 1991. Tanya J. Treadway (Lee Thompson, U.S. Atty., with her on the brief), Asst. U.S. Atty., Kansas City, Kan., for plaintiff-appellee. Michael L. Harris (Charles D. Anderson, Federal Public Defender, with him on the brief), Asst. Federal Public Defender, Kansas City, Kan., for defendant-appellant. Before HOLLOWAY, MOORE and BRORBY, Circuit Judges. BRORBY, Circuit Judge. 1 Reva Young appeals her conviction for bank fraud for opening an unauthorized checking account in her employer's name and drawing checks thereon which she used for personal expenses. 2 In November 1988, Ms. Young began working part-time for Dr. Henry Habib in his medical office. Her duties included making appointments, billing, opening the mail, answering the telephone and assisting with female patients. When the doctor began solo practice, Ms. Young became a full-time employee receiving an annual salary of approximately $18,000 a year. Since 1970, Dr. Habib maintained a corporate checking account at Citizens-Jackson County Bank for which he was the only authorized signer. The doctor was paid primarily by insurance checks made payable to the corporation, which arrived in the mail. As part of her office duties, Ms. Young was responsible for depositing those checks in the corporate account. Ms. Young, without authorization, attempted to gain signatory authority for this account but was refused by bank personnel. 3 In January 1989, Ms. Young opened an account in the name of Dr. Habib at the Douglass Bank in Kansas City, Kansas. She made the initial deposit with insurance checks made payable to him. Ms. Young's neighbor, a bank officer, introduced her to the new accounts representative. The representative gave Ms. Young paperwork for Dr. Habib to sign authorizing the account but the papers were never returned to the bank. Because the bank did not have a signature card for Dr. Habib it initially refused payment on checks drawn on the account. Subsequently, Ms. Young sent a handwritten letter authorizing payment and represented she was an authorized signer on the account. During the life of the account, Ms. Young deposited approximately $25,000 of Dr. Habib's money in the account and wrote checks for personal expenses totalling over $24,000. Ms. Young, and only Ms. Young, signed all the checks written on the account. 4 In early August 1989, Ms. Young failed to show up for work for several days because she was in jail for a probation violation stemming from an attempted felony theft conviction which she did not disclose to Dr. Habib. Because of her unexplained absence, Dr. Habib fired Ms. Young. 5 Soon thereafter, Dr. Habib received an insufficient funds notice in the mail. Perplexed, he sent his wife to Citizens-Jackson County Bank to check it out. A bank officer discovered the Douglass Bank checking account and reported this to Dr. Habib. This was the first Dr. Habib knew of the bank or the checking account in his name. The bank released the balance of the account to the doctor. Dr. Habib instituted suit against the bank and this was settled out of court by the bank paying Dr. Habib $19,000. 6 Ms. Young was charged with executing a scheme to defraud a financial institution in violation of 18 U.S.C. § 1344 and interstate transportation of stolen property in violation of 18 U.S.C. § 2314. At trial, a jury found Ms. Young guilty of both crimes. 7 At trial Ms. Young attempted to present evidence of Dr. Habib's bias against her. Specifically, Ms. Young alleged she was fired, not because of unexcused absence, but because she confronted the doctor about possible medical malpractice exposure. The government had filed a motion in limine to exclude any reference to medical malpractice which the trial court granted. Ms. Young also sought to introduce evidence concerning the civil litigation between the doctor and Douglass Bank regarding the alleged unauthorized account. Ms. Young claims the doctor had incentive to claim he knew nothing about the account because the bank reimbursed him for the loss. Ms. Young claimed Dr. Habib authorized the account in return for sexual favors. Although the government moved in limine to exclude evidence about the settlement as it related to the bank's negligence, it did not contest this evidence could be used to show bias or prejudice. The trial court reserved judgment on the matter. During the course of the trial Ms. Young did not attempt to elicit information regarding the settlement. 8 Finally, in response to Dr. Habib's response on cross-examination that he had never previously accused an employee of embezzlement, Ms. Young attempted to introduce testimony of a former employee to rebut Dr. Habib's claim. Ms. Young sought to use this evidence to show honesty or dishonesty under Fed.R.Evid. 608(b) and as a prior civil wrong to show plan or intent under Fed.R.Evid. 404(b). The court found this to be a collateral matter and ruled it inadmissible. 9 Ms. Young appeals and asserts as error: (1) the facts do not support bank fraud because use of the bank was only incidental to the fraud; (2) the court erred by denying cross-examination of Dr. Habib on matters regarding bias or prejudice; and (3) the court erred by precluding introduction of testimony of a prior employee that Dr. Habib accused her of embezzlement. I. BANK FRAUD 10 A jury found Ms. Young guilty of bank fraud in violation of 18 U.S.C. § 1344(a)(1) (1989) which provides that "[w]hoever knowingly executes ... a scheme or artifice to defraud a federally chartered or insured financial institution" shall be guilty of a crime.1 Ms. Young stole insurance checks payable to her employer and deposited them in the unauthorized account she opened in her employer's name at Douglass Bank. She subsequently sent the bank a letter claiming to be a signatory on the account and the bank, relying upon this letter, cashed over $24,000 worth of checks drawn by Ms. Young and used by her for her personal expenses. 11 Ms. Young claims that "18 U.S.C. § 1344(1) does not cover these situations in which a financial institution is incidentally, or peripherally involved" and challenges the sufficiency of the evidence to establish a bank fraud violation. Ms. Young asserts the bank in this case was not the target, the object or an indispensable part of the scheme and therefore she did not defraud the bank so as to violate § 1344(1). Thus, the issue Ms. Young presents is whether her conduct of depositing stolen checks into an unauthorized account, representing to the bank she was a signatory on the account and then signing checks for her personal expenses is cognizable under the bank fraud statute. See United States v. Cronic, 900 F.2d 1511, 1512 (10th Cir.1990) (although appeal is "couched in terms of sufficiency of the evidence" Appellant's basic argument is that his conduct is not criminalized under the section of federal statute with which he is charged). 12 The government argues Ms. Young's conduct victimized the bank through deceit therefore bringing it within the purview of the bank fraud statute. The government identifies two separate acts of deceit directed toward the bank: Ms. Young's implied misrepresentation that she had authority to open a checking account in Dr. Habib's name and Ms. Young's express misrepresentation to the bank through her handwritten letter that she had authority to sign checks on the account. The government claims her acts deceived not only her employer but the bank as well. The government contends the theft from her employer could not have occurred without these acts of deceit directed toward the bank as Ms. Young had no access to the corporate account. Therefore, the government argues, the Douglass bank was an indispensable part of her scheme to defraud. Finally, the government contends §§ 1344(1) and 1344(2)2 of the bank fraud statute overlap and evidence used to establish a subsection 2 violation can establish a subsection 1 violation as well. 13 We review the question of whether defendant's conduct is prohibited by a federal statute under a non-deferential de novo standard. United States v. Bonnett, 877 F.2d 1450, 1454 (10th Cir.1989). Our review of the record finds the government's arguments to be more persuasive and we uphold Ms. Young's conviction under § 1344(1). 14 Congress enacted the current bank fraud statute (18 U.S.C. § 1344) in 1984 in response to various Supreme Court decisions3 which narrowed the application of the then existing bank fraud statute. Bonnett, 877 F.2d at 1454. The bank fraud statute was modeled after the mail and wire fraud statutes (18 U.S.C. §§ 1341, 1344) which courts have construed very broadly. Bonnett, 877 F.2d at 1454. The bank fraud statute contains virtually the same language as the mail and wire fraud statutes. Likewise, courts have construed the bank fraud statute liberally. See id., 877 F.2d at 1450. Accord United States v. Matousek, 894 F.2d 1012, 1014 (8th Cir.), cert. denied, 494 U.S. 1090, 110 S.Ct. 1832, 108 L.Ed.2d 961 (1990); United States v. Gunter, 876 F.2d 1113 (5th Cir.) cert. denied, 493 U.S. 871, 110 S.Ct. 198, 107 L.Ed.2d 152 (1989); United States v. Bonallo, 858 F.2d 1427, 1432-33 (9th Cir.1988). 15 The bank fraud statute sets forth two prohibited offenses. Bonnett, 877 F.2d at 1453. Each of the two offenses share common elements and thus their proof overlap. United States v. Medeles, 916 F.2d 195, 198 (5th Cir.1990). For example, each offense requires the criminal act be directed against a federally chartered or insured financial institution, and each requires a knowing execution of a scheme or artifice. Id. " '[S]cheme' and 'artifice' are defined to include ... fraudulent pretenses or misrepresentations intended to deceive others to obtain something of value, such as money, from the institution to be deceived." United States v. Lemons, 941 F.2d 309, 314-15 (5th Cir.1991). 16 To establish a violation of subsection 1, the government must prove the scheme defrauded a financial institution. Bonnett, 877 F.2d at 1453. Subsection 2 requires a scheme intended to obtain money under custody or control of the institution by fraudulent means. Medeles, 916 F.2d at 198. 17 The government charged Ms. Young under § 1344(1); therefore it must prove a scheme which defrauded the financial institution. Bonnett, 877 F.2d at 1453 (emphasis in original). The scheme to defraud requirement of § 1344 has not been precisely defined. United States v. Goldblatt, 813 F.2d 619, 624 (3d Cir.1987). A scheme to defraud need not be executed by means of misrepresentation but it does not exclude misrepresentations. United States v. Rafsky, 803 F.2d 105, 108 (3d Cir.1986) (analysis of mail fraud statute), cert. denied, 480 U.S. 931, 107 S.Ct. 1568, 94 L.Ed.2d 760 (1987). 18 We find United States v. Morgenstern, 933 F.2d 1108 (2d Cir.1991), petition for cert. filed (U.S. Nov. 7, 1991) (No. 91-6371), instructive in the instant case.4 In Morgenstern the defendant challenged the applicability of § 1344 to his conduct where his scheme to defraud was directed at his employer and not the bank. The defendant developed a scheme whereby he misrepresented the amount of tax liability owed by his employer. The employer made out a check in the inflated amount which the defendant was to deposit in a depository account at the bank. Rather than deposit the inflated checks in the employer's depository account as required, the defendant deposited them in a corporate account under his control. He then withdrew the excess money for personal expenses. During this period the defendant also made legitimate deposits into both the accounts. When the defendant's responsibilities with his employer changed, he modified the scheme. No longer having access to the tax checks, the defendant took checks payable to other entities which he was supposed to mail and, using a pen eraser, erased the name of the payee and substituted the name of the depository account. He also altered the dollar amount of the checks. Id. at 1110-11. 19 The defendant argued he committed fraud against his employer and not the bank and therefore he could not be convicted under § 1344. Id. at 1112. The government contended his fraud deceived the bank as well as his employer. The Morgenstern court found fraud against the bank where the defendant misrepresented his authority to deposit checks, neither signed nor payable to the defendant, into an account controlled by him. Id. at 1113. The court also found that although the case could have proceeded in state court, federal court retains jurisdiction where the elements of bank fraud are met. Id. at 1113. 20 We find Ms. Young's conduct is cognizable under § 1344(1). We find she knowingly executed a scheme to defraud a bank. As noted above, a scheme can involve fraudulent misrepresentations to deceive a bank to obtain money. See Lemons, 941 F.2d at 314-15. The fraudulent misrepresentations which Ms. Young made to the bank constitute her scheme to defraud. In this case, Ms. Young made two misrepresentations intending to deceive the bank so she could access the bank's money through Dr. Habib's account. As in Morgenstern, Ms. Young misrepresented to the bank she had authority to deposit the checks. Where the defendant in Morgenstern deposited the checks in a separate account under his control, Ms. Young similarly deposited the checks into an account under her control. Although the account was opened in the doctor's name, the doctor knew nothing about the account, knew nothing about the bank and the bank had no paperwork with his authorization for the account. Fundamentally, the account was under Ms. Young's control. 21 If this was the only evidence of Ms. Young's deceit directed at the bank, we might not have such an easy time disposing of the case. However, Ms. Young made additional misrepresentations to the bank. She sent the bank a letter representing she was a signatory on the account in Dr. Habib's name. This misrepresentation was a direct attempt to deceive the bank so Ms. Young could have access to the bank's money in Dr. Habib's account. She attempted to write checks on the account. The bank refused to honor the checks. To gain access to the money, Ms. Young was forced to represent to the bank she was authorized to sign on the account. Relying on this misrepresentation, the bank allowed Ms. Young access to Dr. Habib's account--access she did not have absent this express misrepresentation of authority. Ms. Young's conduct clearly was designed to defraud the bank as well as Dr. Habib. See Morgenstern, 933 F.2d at 1113. Accordingly, the Douglass Bank was a victim of Ms. Young's scheme of fraud. See United States v. Hubbard, 889 F.2d 277, 280 (D.C.Cir.1989) (bank must be a victim of scheme to defraud). To support a § 1344 conviction the government does not have to prove the bank suffered any monetary loss, only that the bank was put at potential risk by the scheme to defraud. Lemons, 941 F.2d at 316 (by distributing customer funds to an unauthorized party, banks are put at risk). 22 The Morgenstern court found the bank was an intended victim where the fraudulent conduct "resulted in the improper release to a third party of a depositor's money without [his] authorization." 933 F.2d at 1114. That court found where the challenged conduct exposed the bank to civil litigation the conduct victimized the bank. Id. Ms. Young's misrepresentations to the bank put the bank at risk, and thus Douglass bank was a victim of Ms. Young's scheme to defraud. In fact, Ms. Young's conduct resulted in the bank's payment of $19,000 to Dr. Habib to avoid civil litigation. There can be no question Ms. Young's scheme of fraud created risk to and thus victimized the bank. 23 II. CROSS-EXAMINATION REGARDING BIAS OR PREJUDICE 24 Prior to trial, the government moved in limine to exclude evidence regarding any claims of medical malpractice against the doctor and also any evidence of the civil litigation between the doctor and Douglass Bank concerning the alleged unauthorized account. Ms. Young objected asserting she was terminated for confronting the doctor about medical malpractice claims and therefore the evidence would be probative of bias or hard feelings on the part of the doctor toward Ms. Young. Ms. Young also claimed the settlement between the doctor and the bank provided incentive for him to continue to deny authorizing the checking account when in fact he did approve it and was fully aware of its existence. Ms. Young alleges this evidence is also probative of bias or prejudice. 25 The court sustained the government's motion to exclude reference to malpractice claims because the prejudicial effects greatly outweighed any probative value. The court reserved ruling on the civil litigation evidence. Ms. Young never pursued that theory of bias during the trial. 26 Ms. Young appeals and asserts that by precluding her from examining Dr. Habib's possible bias in those areas the district court violated her constitutional right to confrontation. Ms. Young's assertion warrants little discussion. A. Medical Malpractice 27 Ms. Young argues her inability to examine Dr. Habib on his bias toward her for confronting him about potential medical malpractice liability violates her Sixth Amendment right to confrontation. The government argues the trial court's decision to withhold the evidence was not a constitutional violation but merely a proper exercise of its discretion. 28 The Supreme Court has stated that even faced with the Sixth Amendment confrontation clause, the trial court retains discretion to reasonably limit the scope of cross-examination. Delaware v. Van Arsdall, 475 U.S. 673, 679, 106 S.Ct. 1431, 1435, 89 L.Ed.2d 674 (1986). The confrontation clause guarantees the right to effective cross-examination when attempting to show bias. United States v. Swingler, 758 F.2d 477, 497 (10th Cir.1985). However, these rights are not unlimited. United States v. Walker, 930 F.2d 789, 792 (10th Cir.1991). The Supreme Court lists factors to weigh regarding the confrontation clause similar to the factors weighed in a Fed.R.Evid. 403 analysis. An analysis under Fed.R.Evid. 403 will not in all cases subsume the constitutional issue. Id. Under Fed.R.Evid. 403,5 a trial judge can exclude evidence relevant to the witness's bias if its probative value is substantially outweighed by the danger of unfair prejudice. Id.; C.A. Associates v. Dow Chemical Co., 918 F.2d 1485, 1489 (10th Cir.1990). Because of its familiarity with the evidence, the trial judge is in a better position to make such a conclusion, and we will overturn his decision only if it represents a manifest abuse of discretion. Id. 29 The trial court conducted the government's motion in limine outside the jury's hearing to determine what evidence would be presented concerning medical malpractice. Ms. Young sought to introduce evidence Dr. Habib fired her because she confronted him about possible medical malpractice liability and not because of her unexcused absence. Ms. Young contended her testimony and cross-examination of Dr. Habib would show bias against her. The government asserted that any mention of medical malpractice would be highly prejudicial. After both sides had an opportunity to present arguments, the court found that "from what counsel [has said], any possible evidence as to malpractice is so remote and the prejudicial effect greatly outweighs any possible probative value at this point." We do not find the trial court abused its discretion. Consequently, in this case we find no confrontation clause violation. B. Civil Litigation 30 Ms. Young asserts the exclusion of evidence of the civil litigation and settlement between Dr. Habib and Douglass Bank also violated her Sixth Amendment right to confrontation. The government contends the trial court deferred ruling on the motion to exclude this evidence and Ms. Young nonetheless failed to pursue this theory of bias at trial. Our review of the record reveals the government is correct. The court did reserve ruling on the civil litigation question. As we only have jurisdiction to rule on final decisions of the district court, where the defendant failed to pursue a proposed theory and thus did not receive a final decision we have no jurisdiction to address her claim. 28 U.S.C. § 1291; Tri-State Generation & Transmission Ass'n, Inc. v. Shoshone River Power, Inc., 874 F.2d 1346, 1351 (10th Cir.1989). III. PRIOR ACCUSATIONS OF THEFT 31 On cross-examination, Ms. Young asked Dr. Habib whether he had ever accused Cathy Staggs, a former employee, of embezzling money from his office account. Dr. Habib denied the accusation. During her case in chief Ms. Young attempted to call Ms. Staggs to testify that the doctor accused her of embezzling. Ms. Young sought to use the testimony to show honesty or dishonesty under Fed.R.Evid. 608(b) and to show Dr. Habib's plan and intent to wrongly accuse employees under Fed.R.Evid. 404(b). The government argued that extrinsic evidence cannot be used to prove the credibility of a witness under Fed.R.Evid. 608(b). The trial court found it was a purely collateral matter and was inadmissible under either rule. 32 Ms. Young appeals and asserts the testimony was admissible "under Rule 404(b) as evidence if [sic] intent to falsely accuse employees of theft." 33 We review the admissibility of evidence under an abuse of discretion standard. United States v. Harmon, 918 F.2d 115, 118 (10th Cir.1990). We will only reverse a trial court's evidentiary ruling where we are left with a "definite and firm conviction that the [trial] court made a clear error of judgment or exceeded the bounds of permissible choice in the circumstances." Bonnett, 877 F.2d at 1458 (quoting United States v. Ortiz, 804 F.2d 1161, 1164 n. 2 (10th Cir.1986)). We find the trial judge did not abuse his discretion by denying Ms. Young the ability to present Ms. Staggs' testimony. 34 Ms. Young contends Ms. Staggs' proffered testimony is admissible under Fed.R.Evid. 404(b) which provides that "[e]vidence of other ... acts is not admissible to prove the character of a person ... to show [that he acted] in conformity therewith. It may ... be admissible ... as proof of ... intent [or] plan...." Through Ms. Staggs' testimony, Ms. Young sought to show Mr. Habib's intent or plan to make false embezzlement charges against his employees. Ms. Young's argument contains no merit. 35 Ms. Staggs would have testified she worked in a doctor's office which Dr. Habib took over and consolidated with his own. Ms. Staggs continued to work in the office doing clerical work. She would also testify that in January of 1988, Dr. Habib indirectly accused her of embezzling, which she denied. She quit and left not on good terms with Dr. Habib. 36 While Ms. Young sought to impeach the doctor under 404(b), the effort was unavailing because the alleged facts were collateral and not impeaching. The issue of whether Dr. Habib accused another employee of embezzlement is collateral to whether Ms. Young's conduct constitutes bank fraud. Dr. Habib denied he accused a former employee of embezzlement. Ms. Young wanted the employee to impeach Dr. Habib's earlier testimony. We have said, "If the witness denies making a statement on a matter classified as collateral, his examiner must take his answer--that is, he may not prove the making of the statement by extrinsic evidence." Walker, 930 F.2d at 792 (citations omitted). Thus, the use of Ms. Staggs' testimony to refute Dr. Habib's earlier denial would be improper. 37 We find the trial court did not abuse its discretion in excluding this evidence. We find Ms. Young's conduct of opening an unauthorized checking account and misrepresenting to the bank her signatory authority is cognizable under 18 U.S.C. § 1344(1). We also find the trial court did not abuse its discretion by excluding evidence of potential medical malpractice claims or claims by a former employee of embezzlement accusations to prove plan or intent. Finally, we have no jurisdiction to decide an issue upon which the trial court reserved ruling but the proponent abandoned during the course of the trial. The trial court is AFFIRMED. 1 The 1989 version of § 1344 applies as Ms. Young committed the acts charged in 1989. The substantive elements of the crime have remain unchanged. Only the penalty and the subsection numbering have been revised. Section 1344(a)(1) is now § 1344(1) and we will refer to the statute's current numbering for the purposes of this discussion 2 Section 1344(2) criminalizes knowing execution of a scheme or artifice to obtain money by false and fraudulent pretenses, representations, or promises 3 See, e.g., Williams v. United States, 458 U.S. 279, 102 S.Ct. 3088, 73 L.Ed.2d 767 (1982) 4 Although the defendant in that case was charged under § 1344(2) the court analyzed his "scheme to defraud the bank" which is an element under § 1344(1). The court found the defendant's conduct victimized the bank--a requirement of § 1344(1) that is not necessary under § 1344(2) 5 Fed.R.Evid. 403 provides: Although relevant, evidence may be excluded if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence.
Anne Hathaway Feels "Very Honored" To Be In "Les Miserables" Anne Hathaway tells why she doesn't like to talk about her weight loss for "Les Miserables." But, what was her first meal after she finished filming? Plus, Anne talks about how her mom played the same role of Fantine many years ago. Lastly, what does she think of the Oscar buzz surrounding her character and the film. (Published Tuesday, Dec 11, 2012) Anne Hathaway tells why she doesn't like to talk about her weight loss for "Les Miserables." But, what was her first meal after she finished filming?... See More
Image caption The Greenland ice sheet is losing its mass faster than its southern counterpart Ice loss from Antarctica and Greenland has accelerated over the last 20 years, research shows, and will soon become the biggest driver of sea level rise. From satellite data and climate models, scientists calculate that the two polar ice sheets are losing enough ice to raise sea levels by 1.3mm each year. Overall, sea levels are rising by about 3mm (0.12 inches) per year. Writing in Geophysical Research Letters, the team says ice loss here is speeding up faster than models predict. If present trends continue, sea level is likely to be significantly higher than levels projected by the IPCC Eric Rignot, Nasa JPL They add their voices to several other studies that have concluded sea levels will rise faster than projected by the Intergovernmental Panel on Climate Change (IPCC) in its landmark 2007 assessment. By 2006, the Greenland and Antarctic sheets were losing a combined mass of 475Gt (gigatonnes - billion tonnes) of ice per year. On average, loss from the Greenland sheet is increasing by nearly 22Gt per year, while the much larger and colder Antarctic sheet is shedding an additional 14.5Gt each year. If these increases persist, water from the two polar ice sheets could have added 15cm (5.9 inches) to the average global sea level by 2050. A rise of similar size is projected to come from a combination of melt water from mountain glaciers and thermal expansion of seawater. "That ice sheets will dominate future sea level rise is not surprising - they hold a lot more ice mass than mountain glaciers," said lead author Eric Rignot from Nasa's Jet Propulsion Laboratory (JPL) in Pasadena, California. "What is surprising is this increased contribution by the ice sheets is already happening." Grace on fire Extending this rate of ice loss forward to 2100, the sea level rise contribution from the two ice sheets alone is calculated at 56cm (22 inches). Image caption The twin Grace satellites orbit the Earth in close formation, detecting tiny variations in gravity By contrast, the IPCC in 2007 projected a maximum rise of 59cm, while acknowledging this was likely to be an under-estimate because understanding of processes happening on ice sheets was insufficient to enable reliable estimates to be made. Since 2007, several other research groups using different methods have concluded that a figure between one and two metres is likely - which would have profound consequences for island nations and countries with long, low coastlines such as Bangladesh. "If present trends continue, sea level is likely to be significantly higher than levels projected by the IPCC," said Dr Rignot. "Our study helps reduce uncertainties in near-term projections of sea level rise." The new research combined two different methodologies. One calculates ice gain and loss through combining various types of satellite reading and data taken on the ground, for example the thickness of the ice sheet and the speed at which glaciers are moving. The second dataset comes from Nasa's Grace mission, which uses twin satellites to measure variations in the Earth's gravitational pull. Ice loss causes a fractional reduction in gravity at that point on the Earth's surface. Two years ago, this mission surprised some in the research community by showing that even the vast and frigid East Antarctic ice sheet was losing some of its mass to the oceans. The journal is due to publish the paper within a few days.
# Translation of Odoo Server. # This file contains the translation of the following modules: # * sales_team # # Translators: # Martin Trigaux, 2019 # Goh Gangtai <gangtai.goh@gmail.com>, 2019 # Linda Stockelova <stockeloval@btlnet.com>, 2019 # Link Up링크업 <linkup.way@gmail.com>, 2019 # Seongseok Shin <shinss61@hotmail.com>, 2019 # Linkup <link-up@naver.com>, 2019 # JH CHOI <hwangtog@gmail.com>, 2020 # msgid "" msgstr "" "Project-Id-Version: Odoo Server 13.0\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2019-12-05 12:33+0000\n" "PO-Revision-Date: 2019-08-26 09:14+0000\n" "Last-Translator: JH CHOI <hwangtog@gmail.com>, 2020\n" "Language-Team: Korean (https://www.transifex.com/odoo/teams/41243/ko/)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: \n" "Language: ko\n" "Plural-Forms: nplurals=1; plural=0;\n" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_view_kanban msgid "<i class=\"fa fa-ellipsis-v\" role=\"img\" aria-label=\"Manage\" title=\"Manage\"/>" msgstr "<i class=\"fa fa-ellipsis-v\" role=\"img\" aria-label=\"Manage\" title=\"Manage\"/>" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_view_kanban msgid "<span>New</span>" msgstr "<span>신규</span>" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_view_kanban msgid "<span>Reporting</span>" msgstr "<span>보고</span>" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_view_kanban msgid "<span>View</span>" msgstr "<span>보기</span>" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_needaction msgid "Action Needed" msgstr "작업이 필요함" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__active msgid "Active" msgstr "활성" #. module: sales_team #: model:ir.actions.act_window,name:sales_team.mail_activity_type_action_config_sales msgid "Activity Types" msgstr "활동 유형" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__member_ids msgid "" "Add members to automatically assign their documents to this sales team. You " "can only be member of one team." msgstr "이 영업 팀에 문서를 자동으로 배정하려면 회원을 추가하십시오. 한 팀의 구성원만 될 수 있습니다." #. module: sales_team #: model:res.groups,name:sales_team.group_sale_manager msgid "Administrator" msgstr "관리자" #. module: sales_team #: model:crm.team,name:sales_team.crm_team_1 msgid "America" msgstr "아메리카" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_search #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form msgid "Archived" msgstr "보존" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_attachment_count msgid "Attachment Count" msgstr "첨부 파일 수" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form msgid "Avatar" msgstr "아바타" #. module: sales_team #: code:addons/sales_team/models/crm_team.py:0 #, python-format msgid "Big Pretty Button :)" msgstr "크고 아름다운 버튼 :)" #. module: sales_team #: code:addons/sales_team/models/crm_team.py:0 #, python-format msgid "Cannot delete default team \"%s\"" msgstr "\"%s\" 기본 팀을 삭제할 수 없습니다" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__member_ids msgid "Channel Members" msgstr "채널 회원" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__color msgid "Color Index" msgstr "색상표" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__company_id msgid "Company" msgstr "회사" #. module: sales_team #: model:ir.ui.menu,name:sales_team.menu_sale_config msgid "Configuration" msgstr "환경 설정" #. module: sales_team #: model:ir.model,name:sales_team.model_res_partner msgid "Contact" msgstr "연락처" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__create_uid msgid "Created by" msgstr "작성인" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__create_date msgid "Created on" msgstr "작성일" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__currency_id msgid "Currency" msgstr "통화" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__dashboard_button_name msgid "Dashboard Button" msgstr "대시보드 버튼" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__dashboard_graph_data msgid "Dashboard Graph Data" msgstr "대시보드 그래프 데이터" #. module: sales_team #: model_terms:ir.actions.act_window,help:sales_team.crm_team_salesteams_act #: model_terms:ir.actions.act_window,help:sales_team.crm_team_salesteams_pipelines_act #: model_terms:ir.actions.act_window,help:sales_team.sales_team_config_action msgid "Define a new sales team" msgstr "새로운 영업팀 정의" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__display_name msgid "Display Name" msgstr "표시 이름" #. module: sales_team #: model:crm.team,name:sales_team.team_sales_department msgid "Europe" msgstr "유럽" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__favorite_user_ids msgid "Favorite Members" msgstr "즐겨찾는 회원" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__is_favorite msgid "" "Favorite teams to display them in the dashboard and access them easily." msgstr "즐겨찾는 팀이 대시 보드에 표시되고 쉽게 접근할 수 있습니다." #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form msgid "" "Follow this salesteam to automatically track the events associated to users " "of this team." msgstr "이 팀의 사용자와 관련된 행사를 자동으로 추적하기 위해 이 영업팀을 팔로우하기." #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_follower_ids msgid "Followers" msgstr "팔로워" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_channel_ids msgid "Followers (Channels)" msgstr "팔로워 (채널)" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_partner_ids msgid "Followers (Partners)" msgstr "팔로워 (협력사)" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_search msgid "Group By..." msgstr "그룹별..." #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__id msgid "ID" msgstr "ID" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__message_needaction #: model:ir.model.fields,help:sales_team.field_crm_team__message_unread msgid "If checked, new messages require your attention." msgstr "선택하면 새로운 메시지를 주목할 필요가 있습니다." #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__message_has_error msgid "If checked, some messages have a delivery error." msgstr "이 옵션을 선택하면 일부 정보가 전달 오류를 생성합니다." #. module: sales_team #: model:ir.model.fields,help:sales_team.field_res_partner__team_id #: model:ir.model.fields,help:sales_team.field_res_users__team_id msgid "" "If set, this Sales Team will be used for sales and assignations related to " "this partner" msgstr "설정된 경우 이 영업 팀은 이 협력사와 관련된 영업 및 할당에 사용됩니다." #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__active msgid "" "If the active field is set to false, it will allow you to hide the Sales " "Team without removing it." msgstr "활성 필드가 false로 설정되면 영업 팀을 제거하지 않고 숨길 수 있습니다." #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_is_follower msgid "Is Follower" msgstr "팔로워 여부" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team____last_update msgid "Last Modified on" msgstr "최근 수정일" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__write_uid msgid "Last Updated by" msgstr "최근 갱신한 사람" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__write_date msgid "Last Updated on" msgstr "최근 갱신일" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_main_attachment_id msgid "Main Attachment" msgstr "주요 첨부 파일" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_has_error msgid "Message Delivery error" msgstr "메시지 전송 오류" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_ids msgid "Messages" msgstr "메시지" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_needaction_counter msgid "Number of Actions" msgstr "작업 수" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_has_error_counter msgid "Number of errors" msgstr "오류 횟수" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__message_needaction_counter msgid "Number of messages which requires an action" msgstr "작업이 필요한 메시지 수" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__message_has_error_counter msgid "Number of messages with delivery error" msgstr "전송 오류 메시지 수" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__message_unread_counter msgid "Number of unread messages" msgstr "읽지 않은 메시지 수" #. module: sales_team #: model:crm.team,name:sales_team.pos_sales_team msgid "Point of Sale" msgstr "점포판매시스템" #. module: sales_team #: model:ir.model,name:sales_team.model_crm_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__name #: model:ir.model.fields,field_description:sales_team.field_res_partner__team_id #: model:ir.model.fields,field_description:sales_team.field_res_users__team_id #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_tree msgid "Sales Team" msgstr "영업팀" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form msgid "Sales Team name..." msgstr "영업팀 이름..." #. module: sales_team #: model:ir.model.fields,help:sales_team.field_res_users__sale_team_id msgid "" "Sales Team the user is member of. Used to compute the members of a Sales " "Team through the inverse one2many" msgstr "사용자가 속한 영업팀입니다. one2many의 역수를 통해 영업 팀의 구성원을 계산하는 데 사용됩니다." #. module: sales_team #: model:ir.actions.act_window,name:sales_team.crm_team_salesteams_act #: model:ir.actions.act_window,name:sales_team.sales_team_config_action msgid "Sales Teams" msgstr "영업팀" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_search msgid "Salesteams Search" msgstr "영업팀 검색" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__sequence msgid "Sequence" msgstr "순서" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_view_kanban msgid "Settings" msgstr "설정" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__is_favorite msgid "Show on dashboard" msgstr "대시보드에 표시" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__user_id #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_salesteams_search msgid "Team Leader" msgstr "팀장" #. module: sales_team #: model_terms:ir.ui.view,arch_db:sales_team.crm_team_view_form msgid "Team Members" msgstr "팀 구성원" #. module: sales_team #: model:ir.actions.act_window,name:sales_team.crm_team_salesteams_pipelines_act msgid "Team Pipelines" msgstr "팀 파이프라인" #. module: sales_team #: model:ir.model.fields,help:sales_team.field_crm_team__color msgid "The color of the channel" msgstr "채널의 색상" #. module: sales_team #: code:addons/sales_team/models/crm_team.py:0 #: code:addons/sales_team/models/crm_team.py:0 #, python-format msgid "Undefined graph model for Sales Team: %s" msgstr "영업팀에 대한 정의되지 않은 그래프 모델 : %s" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_unread msgid "Unread Messages" msgstr "읽지 않은 메시지" #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_crm_team__message_unread_counter msgid "Unread Messages Counter" msgstr "읽지 않은 메시지 수" #. module: sales_team #: model_terms:ir.actions.act_window,help:sales_team.crm_team_salesteams_act #: model_terms:ir.actions.act_window,help:sales_team.crm_team_salesteams_pipelines_act #: model_terms:ir.actions.act_window,help:sales_team.sales_team_config_action msgid "" "Use Sales Teams to organize your sales departments.\n" " Each team will work with a separate pipeline." msgstr "" "영업 팀을 사용하여 영업 부서를 구성하십시오. \n" " 각 팀은 별도의 순서를 사용합니다." #. module: sales_team #: model:ir.model.fields,field_description:sales_team.field_res_users__sale_team_id msgid "User's Sales Team" msgstr "사용자 영업팀" #. module: sales_team #: model:res.groups,name:sales_team.group_sale_salesman_all_leads msgid "User: All Documents" msgstr "사용자 : 모든 문서" #. module: sales_team #: model:res.groups,name:sales_team.group_sale_salesman msgid "User: Own Documents Only" msgstr "사용자 : 자신의 문서만" #. module: sales_team #: model:ir.model,name:sales_team.model_res_users msgid "Users" msgstr "사용자" #. module: sales_team #: model:crm.team,name:sales_team.salesteam_website_sales msgid "Website" msgstr "웹사이트" #. module: sales_team #: model:crm.team,name:sales_team.ebay_sales_team msgid "eBay" msgstr "eBay" #. module: sales_team #: model:res.groups,comment:sales_team.group_sale_salesman_all_leads msgid "" "the user will have access to all records of everyone in the sales " "application." msgstr "사용자는 영업 응용 프로그램의 모든 사람의 모든 레코드에 접근할 수 있습니다." #. module: sales_team #: model:res.groups,comment:sales_team.group_sale_salesman msgid "the user will have access to his own data in the sales application." msgstr "사용자는 영업 응용 프로그램에서 자신의 데이터에 접근할 수 있습니다." #. module: sales_team #: model:res.groups,comment:sales_team.group_sale_manager msgid "" "the user will have an access to the sales configuration as well as statistic" " reports." msgstr "사용자는 통계 보고서뿐만 아니라 판매 환경 설정에 접근할 수 있습니다."
// Copyright 2004-present Facebook. All Rights Reserved. #pragma once #include <cxxreact/JSBigString.h> #include <jschelpers/JavaScriptCore.h> #include <jschelpers/Value.h> namespace facebook { namespace react { String jsStringFromBigString(JSContextRef ctx, const JSBigString& bigstr); } }
/* ========================================================================== */ /* === umfpack_report_matrix ================================================ */ /* ========================================================================== */ /* -------------------------------------------------------------------------- */ /* UMFPACK Version 4.4, Copyright (c) 2005 by Timothy A. Davis. CISE Dept, */ /* Univ. of Florida. All Rights Reserved. See ../Doc/License for License. */ /* web: http://www.cise.ufl.edu/research/sparse/umfpack */ /* -------------------------------------------------------------------------- */ int umfpack_di_report_matrix ( int n_row, int n_col, const int Ap [ ], const int Ai [ ], const double Ax [ ], int col_form, const double Control [UMFPACK_CONTROL] ) ; long umfpack_dl_report_matrix ( long n_row, long n_col, const long Ap [ ], const long Ai [ ], const double Ax [ ], long col_form, const double Control [UMFPACK_CONTROL] ) ; int umfpack_zi_report_matrix ( int n_row, int n_col, const int Ap [ ], const int Ai [ ], const double Ax [ ], const double Az [ ], int col_form, const double Control [UMFPACK_CONTROL] ) ; long umfpack_zl_report_matrix ( long n_row, long n_col, const long Ap [ ], const long Ai [ ], const double Ax [ ], const double Az [ ], long col_form, const double Control [UMFPACK_CONTROL] ) ; /* double int Syntax: #include "umfpack.h" int n_row, n_col, *Ap, *Ai, status ; double *Ax, Control [UMFPACK_CONTROL] ; status = umfpack_di_report_matrix (n_row, n_col, Ap, Ai, Ax, 1, Control) ; or: status = umfpack_di_report_matrix (n_row, n_col, Ap, Ai, Ax, 0, Control) ; double long Syntax: #include "umfpack.h" long n_row, n_col, *Ap, *Ai, status ; double *Ax, Control [UMFPACK_CONTROL] ; status = umfpack_dl_report_matrix (n_row, n_col, Ap, Ai, Ax, 1, Control) ; or: status = umfpack_dl_report_matrix (n_row, n_col, Ap, Ai, Ax, 0, Control) ; complex int Syntax: #include "umfpack.h" int n_row, n_col, *Ap, *Ai, status ; double *Ax, *Az, Control [UMFPACK_CONTROL] ; status = umfpack_zi_report_matrix (n_row, n_col, Ap, Ai, Ax, Az, 1, Control) ; or: status = umfpack_zi_report_matrix (n_row, n_col, Ap, Ai, Ax, Az, 0, Control) ; complex long Syntax: #include "umfpack.h" long n_row, n_col, *Ap, *Ai, status ; double *Ax, Control [UMFPACK_CONTROL] ; status = umfpack_zl_report_matrix (n_row, n_col, Ap, Ai, Ax, Az, 1, Control) ; or: status = umfpack_zl_report_matrix (n_row, n_col, Ap, Ai, Ax, Az, 0, Control) ; packed complex Syntax: Same as above, except Az is NULL. Purpose: Verifies and prints a row or column-oriented sparse matrix. Returns: UMFPACK_OK if Control [UMFPACK_PRL] <= 2 (the input is not checked). Otherwise (where n is n_col for the column form and n_row for row and let ni be n_row for the column form and n_col for row): UMFPACK_OK if the matrix is valid. UMFPACK_ERROR_n_nonpositive if n_row <= 0 or n_col <= 0. UMFPACK_ERROR_argument_missing if Ap and/or Ai are missing. UMFPACK_ERROR_invalid_matrix if Ap [n] < 0, if Ap [0] is not zero, if Ap [j+1] < Ap [j] for any j in the range 0 to n-1, if any row index in Ai is not in the range 0 to ni-1, or if the row indices in any column are not in ascending order, or contain duplicates. UMFPACK_ERROR_out_of_memory if out of memory. Arguments: Int n_row ; Input argument, not modified. Int n_col ; Input argument, not modified. A is an n_row-by-n_row matrix. Restriction: n_row > 0 and n_col > 0. Int Ap [n+1] ; Input argument, not modified. n is n_row for a row-form matrix, and n_col for a column-form matrix. Ap is an integer array of size n+1. If col_form is true (nonzero), then on input, it holds the "pointers" for the column form of the sparse matrix A. The row indices of column j of the matrix A are held in Ai [(Ap [j]) ... (Ap [j+1]-1)]. Otherwise, Ap holds the row pointers, and the column indices of row j of the matrix are held in Ai [(Ap [j]) ... (Ap [j+1]-1)]. The first entry, Ap [0], must be zero, and Ap [j] <= Ap [j+1] must hold for all j in the range 0 to n-1. The value nz = Ap [n] is thus the total number of entries in the pattern of the matrix A. Int Ai [nz] ; Input argument, not modified, of size nz = Ap [n]. If col_form is true (nonzero), then the nonzero pattern (row indices) for column j is stored in Ai [(Ap [j]) ... (Ap [j+1]-1)]. Row indices must be in the range 0 to n_row-1 (the matrix is 0-based). Otherwise, the nonzero pattern (column indices) for row j is stored in Ai [(Ap [j]) ... (Ap [j+1]-1)]. Column indices must be in the range 0 to n_col-1 (the matrix is 0-based). double Ax [nz] ; Input argument, not modified, of size nz = Ap [n]. Size 2*nz for packed complex case. The numerical values of the sparse matrix A. If col_form is true (nonzero), then the nonzero pattern (row indices) for column j is stored in Ai [(Ap [j]) ... (Ap [j+1]-1)], and the corresponding (real) numerical values are stored in Ax [(Ap [j]) ... (Ap [j+1]-1)]. The imaginary parts are stored in Az [(Ap [j]) ... (Ap [j+1]-1)], for the complex versions (see below if Az is NULL). Otherwise, the nonzero pattern (column indices) for row j is stored in Ai [(Ap [j]) ... (Ap [j+1]-1)], and the corresponding (real) numerical values are stored in Ax [(Ap [j]) ... (Ap [j+1]-1)]. The imaginary parts are stored in Az [(Ap [j]) ... (Ap [j+1]-1)], for the complex versions (see below if Az is NULL). No numerical values are printed if Ax is NULL. double Az [nz] ; Input argument, not modified, for complex versions. The imaginary values of the sparse matrix A. See the description of Ax, above. If Az is NULL, then both real and imaginary parts are contained in Ax[0..2*nz-1], with Ax[2*k] and Ax[2*k+1] being the real and imaginary part of the kth entry. Int col_form ; Input argument, not modified. The matrix is in row-oriented form if form is col_form is false (0). Otherwise, the matrix is in column-oriented form. double Control [UMFPACK_CONTROL] ; Input argument, not modified. If a (double *) NULL pointer is passed, then the default control settings are used. Otherwise, the settings are determined from the Control array. See umfpack_*_defaults on how to fill the Control array with the default settings. If Control contains NaN's, the defaults are used. The following Control parameters are used: Control [UMFPACK_PRL]: printing level. 2 or less: no output. returns silently without checking anything. 3: fully check input, and print a short summary of its status 4: as 3, but print first few entries of the input 5: as 3, but print all of the input Default: 1 */
166 U.S. 489 (1897) ELECTRIC COMPANY v. DOW. No. 258. Supreme Court of United States. Submitted April 1, 1897. Decided April 19, 1897. ERROR TO THE SUPREME COURT OF THE STATE OF NEW HAMPSHIRE. *490 Mr. H.E. Loveren and Mr. David Cross for plaintiff in error. Mr. Henry M. Baker for defendant in error. MR. JUSTICE SHIRAS, after stating the case, delivered the opinion of the court. We agree with the Supreme Court of New Hampshire in thinking that the plaintiff in error, by availing itself of the power conferred by the statute, and joining in a trial for the assessment of the damages, is precluded from denying the validity of that provision which prescribes that fifty per cent shall be added to the amount of the verdict. The act confers a privilege, which the plaintiff in error was at liberty to exercise or not as it thought fit. Clay v. Smith, 3 Pet. 411, was a case where the plaintiff below, a citizen of the State of Kentucky, instituted a suit against the defendant, a citizen of the State of Louisiana, for the recovery of a debt incurred in 1808, and the defendant pleaded his discharge by the bankrupt law of Louisiana in 1811, under which, according to the provisions of the law, "as well his person as his future effects," were forever discharged from all the claims of his creditors. Under this law, the plaintiff, whose debt was specified in the list of the defendant's creditors, received a dividend of ten per cent on his debt, declared by the assignees of the defendant. It was held *491 by this court that the plaintiff, by voluntarily making himself a party to those proceedings, abandoned his extraterritorial immunity from the operation of the bankrupt law of Louisiana, and was bound by that law to the same extent to which the citizens of Louisiana were bound. In Beaupré v. Noyes, 138 U.S. 397, a similar question was presented. There it was contended on behalf of creditors, the plaintiffs in error, that an alleged assignment was conclusively fraudulent as to them for want of an immediate delivery, followed by an actual and continued change of possession of the goods assigned; that their right so to treat the assignment, although such right was specially set up and claimed, was denied; and that consequently they were denied a right arising under an authority exercised under the United States. But this court said: "Whether the state court so interpreted the territorial statute as to deny such right to the plaintiffs in error we need not inquire, for it proceeded, in part, upon another and distinct ground not involving any Federal question, and sufficient in itself to maintain the judgment without reference to that question. That ground is, that there was evidence tending to show that the defendants, [plaintiffs in error,] acquiesced in and assented to all that was done, and waived any irregularity in the mode in which the assignee conducted the business; and that the question whether the defendants so acquiesced and assented with knowledge of all the facts, and thereby waived their right to treat the assignment as fraudulent, was properly submitted to the jury. The state court evidently intended to hold that, even if the assignment was originally fraudulent as against the creditors, ... it was competent for the plaintiffs in error to waive the fraud and treat the assignment as valid for all the purposes specified in it. That view does not involve a Federal question. Whether sound or not, we do not inquire. It is broad enough in itself to support the final judgment without reference to the Federal question." In July, 1887, William J. Eustis brought an action in the Supreme Judicial Court of Massachusetts against Bolles and *492 Wilde, wherein he sought to recover the balance on a note remaining unpaid after the receipt of one half received under insolvency proceedings under a state act passed after the creation of the debt. The defendants pleaded the proceedings in insolvency, their offer of composition, its acceptance by the majority in number and value of their creditors, their discharge, and the acceptance by Eustis of the amount coming to him under the offer of composition. To this answer the plaintiff demurred. The trial court, which overruled the demurrer, made a finding of facts, and reported the case for the determination of the full court. The Supreme Judicial Court was of opinion that Eustis, by accepting the benefit of the composition, had waived any right that he might otherwise have had to object to the validity of the composition statute as impairing the obligation of a contract made before its enactment. 146 Mass. 413. The case was brought to this court, where it was argued, on behalf of the plaintiff in error, that a composition act was, as to debts existing prior to its passage, void and in contravention of the Constitution of the United States, and that a creditor, where demand is saved from the operation of a state statute or of a state decree by the Constitution of the United States, does not waive the benefit of this constitutional immunity by accepting the part of his demand which the state statute or decree says shall constitute full satisfaction. This court held that the Supreme Judicial Court of Massachusetts, in holding that, when the composition was confirmed, Eustis was put to his election whether he would avail himself of the composition offer or would reject it and rely upon his right to enforce his debt against his debtors, notwithstanding their discharge, did not decide a Federal question, and that hence the question as to the constitutionality of the State statute did not arise. Eustis v. Bolles, 150 U.S. 361. The plaintiff in error accepted the powers and rights conferred by the act of 1868, and joined in the proceedings for the assessment of damages. It must, therefore, be deemed to have agreed that the damages should be assessed in the manner provided for in the act. At all events, the Supreme *493 Court of the State has so decided, and as its judgment was not based on any Federal question we have no jurisdiction to review it, and the writ of error is accordingly Dismissed.
Founded in 1993 by brothers Tom and David Gardner, The Motley Fool helps millions of people attain financial freedom through our website, podcasts, books, newspaper column, radio show, and premium investing services. The chipmaker could be taking advantage of supply constraints at its main rival. On Jan. 6, chipmaker Advanced Micro Devices (NASDAQ:AMD) made several announcements. In addition to introducing updated versions of its Ryzen Mobile processors for higher-end laptops, the company also introduced low-end, low-power chips targeted specifically at the Chromebook market. Those chips aren't based on the same technology as its higher-end Ryzen Mobile parts. They use the company's relatively dated "Excavator" processor architecture and are built using an older 28-nanometer (nm) chip manufacturing technology. (AMD's latest Ryzen Mobile chips are crafted using GLOBALFOUNDRIES' 12-nm technology -- a souped-up variant of the latter's 14-nm technology -- both of which offer performance and power benefits over the older 28-nm technology, albeit likely at higher cost.) Image source: Getty Images. These products aren't particularly interesting for their technical prowess. Instead, AMD is looking to grow its share in the notebook PC market by expanding beyond Windows-based computers and offering products for low-cost Chromebooks, which run on Google's Chrome operating system. Let's take a closer look at the opportunity here for AMD. How big is the Chromebook chip market? It's hard to find good information on how big the Chromebook market is, but data from Gartner pegged total Chromebook shipments at 9.4 million units in 2016. At the time, the market research company projected that figure to grow to 10.9 million in 2017 and then 11.9 million units in 2018. Let's suppose that Gartner's projection for 2018 turned out to be roughly correct. Gartner recently estimated that about 259.4 million PCs were shipped worldwide in 2018. This would suggest that Chromebooks made up about 4.6% of the PC market in 2018. (Do note that the total PC number includes both laptops and desktops, while Chrome-based systems have much greater share in notebooks than in desktops.) Nevertheless, while Chromebooks do make up a non-trivial portion of the PC market, they're still very much in the minority. It's also important to understand that Chrome-based systems are, in general, much cheaper than Windows-based PCs. Indeed, the low cost of Chromebooks is one of their key selling points. Lower-cost systems tend to use less-expensive components -- something that's evident in the fact that AMD is selling older, cheaper parts for the Chromebook market. So, I'd characterize it like this: Chromebooks make up a small part of the overall PC market and the total revenue dollar opportunity in Chromebooks for chip makers is smaller than the unit shipment opportunity. AMD's opportunity The potential market in Chromebooks isn't huge for AMD (or anyone else, for that matter), but it's large enough for the company to invest resources in it. Moreover, AMD didn't exactly go and build an all-new set of chips for this market -- it's merely repurposing chips that it already has and doing the work to support them on Chrome OS -- so the incremental investment associated with developing these products is likely very low. To the extent that it can gain share here, AMD stands to benefit from increased revenue and gross profit. The timing of AMD's push into the Chromebook market is interesting, too. It has been well publicized that AMD's main CPU rival, Intel (NASDAQ:INTC), is capacity-constrained. Intel CFO and interim CEO Bob Swan even admitted on the company's last earnings call that Intel wouldn't be able to meet all of the demand that it expected for its products during the fourth quarter. Indeed, DIGITIMES recently said that "[the] penetration of AMD processors in notebooks has been rising since the second half of 2018 due to the ongoing tight supply of Intel's chips." The report also went on to say that while the "top-4" PC vendors "have experienced much smaller influences from the shortages," smaller vendors "such as Acer and Asustek Computer" have apparently been more significantly shortchanged. "As a result, the two Taiwan-based vendors' adoption of AMD-based solutions for their devices is much higher than that of the top-4 [PC vendors]," DIGITIMES said, citing "sources from the upstream supply chain." It's not surprising, then, to see AMD launch chips targeted specifically at the Chromebook market in a bid to capitalize on Intel's supply constraints and, ultimately, boost its market share. Author Ashraf Eassa is a Senior Technology Specialist with The Motley Fool. He's an experienced and passionate technology stock analyst and investor with focus on semiconductor companies. He holds a B.S. in Computer Science as well as in Mathematics from the University of Vermont. You can write to him at aeassa@gmail.com -- he doesn't bite!
// Copyright 2018 The MACE Authors. All Rights Reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include <memory> #include <vector> #include "mace/core/ops/operator.h" #include "mace/core/registry/ops_registry.h" #ifdef MACE_ENABLE_OPENCL #include "mace/ops/opencl/image/depth_to_space.h" #endif // MACE_ENABLE_OPENCL #include "mace/utils/memory.h" namespace mace { namespace ops { template<DeviceType D, class T> class DepthToSpaceOp; template<class T> class DepthToSpaceOp<CPU, T> : public Operation { public: explicit DepthToSpaceOp(OpConstructContext *context) : Operation(context), block_size_(Operation::GetOptionalArg<int>("block_size", 1)) {} MaceStatus Run(OpContext *context) override { MACE_UNUSED(context); const Tensor *input = this->Input(0); Tensor *output = this->Output(0); MACE_CHECK(input->dim_size() == 4, "input dim should be 4"); const index_t batch_size = input->dim(0); const index_t input_depth = input->dim(1); const index_t input_height = input->dim(2); const index_t input_width = input->dim(3); MACE_CHECK(input_depth % (block_size_ * block_size_) == 0, "input depth should be dividable by block_size * block_size", input_depth); const index_t output_depth = input_depth / (block_size_ * block_size_); const index_t output_width = input_width * block_size_; const index_t output_height = input_height * block_size_; std::vector<index_t> output_shape = {batch_size, output_depth, output_height, output_width}; MACE_RETURN_IF_ERROR(output->Resize(output_shape)); Tensor::MappingGuard logits_guard(input); Tensor::MappingGuard output_guard(output); const T *input_ptr = input->data<T>(); T *output_ptr = output->mutable_data<T>(); for (index_t b = 0; b < batch_size; ++b) { for (index_t d = 0; d < output_depth; ++d) { for (index_t h = 0; h < output_height; ++h) { const index_t in_h = h / block_size_; const index_t offset_h = (h % block_size_); for (int w = 0; w < output_width; ++w) { const index_t in_w = w / block_size_; const index_t offset_w = w % block_size_; const index_t offset_d = (offset_h * block_size_ + offset_w) * output_depth; const index_t in_d = d + offset_d; const index_t o_index = ((b * output_depth + d) * output_height + h) * output_width + w; const index_t i_index = ((b * input_depth + in_d) * input_height + in_h) * input_width + in_w; output_ptr[o_index] = input_ptr[i_index]; } } } } return MaceStatus::MACE_SUCCESS; } private: const int block_size_; }; #ifdef MACE_ENABLE_QUANTIZE template<> class DepthToSpaceOp<CPU, uint8_t> : public Operation { public: explicit DepthToSpaceOp(OpConstructContext *context) : Operation(context), block_size_(Operation::GetOptionalArg<int>("block_size", 1)) {} MaceStatus Run(OpContext *context) override { MACE_UNUSED(context); const Tensor *input = this->Input(0); Tensor *output = this->Output(0); MACE_CHECK(input->dim_size() == 4, "input dim should be 4"); const index_t batch_size = input->dim(0); const index_t input_depth = input->dim(3); const index_t input_height = input->dim(1); const index_t input_width = input->dim(2); MACE_CHECK(input_depth % (block_size_ * block_size_) == 0, "input depth should be dividable by block_size * block_size", input_depth); const index_t output_depth = input_depth / (block_size_ * block_size_); const index_t output_width = input_width * block_size_; const index_t output_height = input_height * block_size_; std::vector<index_t> output_shape = {batch_size, output_height, output_width, output_depth}; MACE_RETURN_IF_ERROR(output->Resize(output_shape)); Tensor::MappingGuard logits_guard(input); Tensor::MappingGuard output_guard(output); const uint8_t *input_ptr = input->data<uint8_t>(); uint8_t *output_ptr = output->mutable_data<uint8_t>(); for (index_t b = 0; b < batch_size; ++b) { for (index_t h = 0; h < output_height; ++h) { const index_t in_h = h / block_size_; const index_t offset_h = (h % block_size_); for (int w = 0; w < output_width; ++w) { const index_t in_w = w / block_size_; const index_t offset_w = w % block_size_; const index_t offset_d = (offset_h * block_size_ + offset_w) * output_depth; for (index_t d = 0; d < output_depth; ++d) { const index_t in_d = d + offset_d; const index_t o_index = ((b * output_height + h) * output_width + w) * output_depth + d; const index_t i_index = ((b * input_height + in_h) * input_width + in_w) * input_depth + in_d; output_ptr[o_index] = input_ptr[i_index]; } } } } return MaceStatus::MACE_SUCCESS; } private: const int block_size_; }; #endif // MACE_ENABLE_QUANTIZE #ifdef MACE_ENABLE_OPENCL template<> class DepthToSpaceOp<DeviceType::GPU, float> : public Operation { public: explicit DepthToSpaceOp(OpConstructContext *context) : Operation(context) { int block_size = Operation::GetOptionalArg<int>("block_size", 1); if (context->GetOpMemoryType() == MemoryType::GPU_IMAGE) { kernel_ = make_unique<opencl::image::DepthToSpaceKernel>(block_size); } else { MACE_NOT_IMPLEMENTED; } } MaceStatus Run(OpContext *context) override { const Tensor *input = this->Input(0); Tensor *output = this->Output(0); MACE_CHECK(input->dim_size() == 4, "input dim should be 4"); return kernel_->Compute(context, input, output); } private: std::unique_ptr<OpenCLDepthToSpaceKernel> kernel_; }; #endif // MACE_ENABLE_OPENCL void RegisterDepthToSpace(OpRegistry *op_registry) { MACE_REGISTER_OP(op_registry, "DepthToSpace", DepthToSpaceOp, DeviceType::CPU, float); MACE_REGISTER_BF16_OP(op_registry, "DepthToSpace", DepthToSpaceOp, DeviceType::CPU); #ifdef MACE_ENABLE_QUANTIZE MACE_REGISTER_OP(op_registry, "DepthToSpace", DepthToSpaceOp, DeviceType::CPU, uint8_t); #endif // MACE_ENABLE_QUANTIZE MACE_REGISTER_GPU_OP(op_registry, "DepthToSpace", DepthToSpaceOp); } } // namespace ops } // namespace mace
Weather forces time change for Razorbacks' finale at Texas A&M FAYETTEVILLE — The game time for the series finale between Arkansas and Texas A&M has been changed because of increasing rain and thunderstorm chances Saturday in College Station, Texas. The No. 4 Razorbacks and No. 19 Aggies are scheduled to throw a first pitch at 11 a.m., Saturday, three hours before their previously-scheduled start time. The game will no longer be shown on SEC Network, but will be aired on the SEC Network-Plus online channel. Arkansas and Texas A&M are scheduled to play the second game of their series Friday at 6:30 p.m. The Razorbacks defeated the Aggies 7-3 in the series opener Thursday and can clinch a share of the SEC West title with one win in the final two games.
1. Field of the Invention The present invention relates to underwater acoustic measurement systems and, more particularly, to acoustic Doppler current profilers used to measure wave directional spectra and surface wave height. 2. Description of the Related Technology The use of Doppler sonar to measure currents in a fluid medium is well established. Conventional acoustic Doppler current profilers (ADCPs) typically use an array of acoustic transducers arranged in the well known Janus configuration. This configuration consists of four acoustic beams, paired in orthogonal planes. The ADCP measures the component of velocity projected along the beam axis, averaged over a range cell whose beam length is roughly half that of the emitted acoustic pulse. Since the mean current is assumed to be horizontally uniform over the beams, its components can be recovered simply by differencing opposing beams. This procedure is relatively insensitive to contamination by vertical currents and/or unknown instrument tilts. The analysis of waves in a fluid medium is much more complicated, however. Although the wave field is statistically stationary and homogeneous, at any instant of time the wave velocity varies across the array and as a result it is not possible to separate the measured along-beam velocity into horizontal and vertical components on a sample-by-sample basis. If one sonar beam is vertical, then the frequency spectra in the can be separated, and a crude estimate of direction obtained from the ratio of horizontal velocity spectra. But phase information is irrevocably lost through this procedure and the estimate is substantially biased when the waves are directionally spread. As a result, this estimator is not particularly useful, except perhaps in the case of swell. There is, however, phase information in the cross-correlations between the various range bins, and this fact allows the application of conventional signal processing techniques to estimate wave direction. The wave directional spectrum (WDS) is a mathematical representation of the wave direction as a function of azimuth angle and wave frequency, which is useful in describing the physical behavior of waves within the fluid medium. The most common existing devices used to obtain wave directional spectra are 1) pitch, and roll buoys, and 2) PUV triplets, described in further detail below. Pitch and roll buoys typically measure tilt in two directions as a surrogate for wave slope, along with the vertical component of acceleration. A recent variation uses GPS (Global Positioning System) measurements of three velocity components instead. The measured time series are Fourier transformed and the auto- and cross-spectra are formed, resulting in a cross-spectral matrix at each frequency. The elements of the cross-spectral matrix are directly related to the first five Fourier coefficients in direction (through 2xcex8) of the wave directional spectrum at each frequency (see Appendix A1). These buoys are typically used in deeper water. Unfortunately, the transfer functions for these buoys are complex, non-linear, and often difficult to determine. Additionally, the presence of a mooring line for the buoys adds additional complexity to the analysis due to added motion. Furthermore, such buoys are comparatively costly, vulnerable to weather and theft, and are not capable of measuring currents or wave heights. PUV triplets (so named due to their measurement of pressure and both components of horizontal velocity, namely u and v) are basically single point electromagnetic current meters having an integral pressure transducer. Time series of pressure and horizontal velocity from PUV triplets are processed in a manner similar to the measurements made by pitch and roll and GPS buoys, also giving only the first five Fourier coefficients in direction at each frequency. PUV triplets are typically bottom mounted, and generally only useful in shallow water. This significant disability is due to the decrease in high frequency response resulting from the decay of wave velocity and pressure with increased water depth. FIG. 1 illustrates a third and less common prior art technique for measuring wave directional spectrum employed by Krogstad, et al (see xe2x80x9cHigh Resolution Directional Wave Spectra from Horizontally Mounted Acoustic Doppler Current Meters, xe2x80x9d Journal of Atmospheric and Oceanic Technology, Vol. 5, No. 4, August 1988) as part of the CUMEX (Current Measurement Experiment) program. This technique utilizes an acoustic Doppler sonar system having a transducer array mounted on an underwater structure. The array is configured with sets of horizontally oriented acoustic transducers which project two acoustic beams in a horizontal plane 90 degrees apart. Beam propagation is therefore essentially parallel to the surface of the water, and skims the surface of the water as the beam disperses. Such a surface skimming geometry provides a relatively dense and uniform set of time lagged echoes and therefore permits estimation of the joint frequency-wavenumber spectrum S(f,k). See xe2x80x9cOpen Ocean Surface Wave Measurement Using Doppler Sonar, xe2x80x9d Pinkel, R. and J. A. Smith, J. Geophys., Res. 92, 1987. Specifically, the directional spectrum D(xcex8) is expanded into a Fourier series, the coefficients of which are determined from the cross-spectral coefficient matrices generated from data obtained by the system. Since the acoustic beams are horizontal, no vector quantity (i.e., sensitivity vector) relating the beam geometry to the received current data is necessary. This technique is well suited to applications requiring only wave direction measurements and where a large, stable platform, such as a tower or large spar buoy, is available. However, there are a large number of applications, particularly in coastal oceanography and engineering, where it is desirable to know both the wave direction and vertical current profile, which the horizontal beam system can not provide. These applications include the analysis of sediment transport, atmosphere/sea interaction, pollutant dispersal, and hydrodynamic forces on off-shore structures. Additionally, it may be desirable in certain situations to simultaneously obtain wave height data along with the direction and current data. Due to the beam geometry, horizontal beam systems also are unable to measure current velocity above the wave troughs, which may be useful for studies of wave kinematics. In summary, existing wave direction measurement techniques generally have several significant drawbacks (depending on type) including 1) inability to measure fluid current velocity and/or wave height along with WDS, 2) inability to readily measure wave directional spectrum at a broad range of depths; 3) inability to measure velocity profile above the wave troughs, 4) high degree of non-linearity; 5) high cost relative to the data obtained therefrom; and 6) susceptibility to damage/degradation from surface or near-surface influences. Accordingly, a system and method for accurately measuring the wave directional spectrum and current profile in a broad range of water depths is needed by both commercial entities and researchers. Such a system and method would further allow the optional measurement of wave height in conjunction with WDS. Additionally, the system would be highly linear in response, physically compact and largely self-contained in design, and could be deployed in a number of different scenarios such as being bottom mounted, moored, or even mounted on a mobile submerged platform. The flexibility of configurations permits the user to have the maximum degree of operational flexibility and device longevity without significantly impacting performance or accuracy. Additional benefits of economy would be obtained through the use of commercially available off-the-shelf broadband or narrowband sonar equipment where practical. The above-mentioned needs are satisfied by the present invention which includes a system and method for measuring the wave directional spectrum, current velocity within a given range cell or set of range cells, and wave height associated with a fluid medium by using acoustic signals. The present invention allows for accurate measurements of these parameters from fixed, moored, or mobile platforms using conventional Doppler sonar in conjunction with an upward and/or downward looking transducer array. In a first aspect of the invention, there is an improved system for measuring the wave directional spectrum of a fluid medium. In one embodiment, a broadband acoustic Doppler current profiler (ADCP) is used in conjunction with an upward looking, bottom mounted multi-transducer (or phased) acoustic array to generate multiple acoustic beams, and sample a plurality of different range cells corresponding to different depths within those beams, in order to derive velocity and wave height data. Pressure readings are also optionally obtained from an associated pressure transducer located either on the ADCP or remotely thereto. This velocity, wave height, and pressure data is Fourier-transformed by one or more signal processors within the system (or in post-processing), and a surface height spectrum produced. A cross-spectral coefficient matrix at each observed frequency is also generated from this data. A sensitivity vector specifically related to the ADCP""s specific array geometry is used in conjunction with maximum likelihood method (MLM), iterative maximum likelihood method (IMLM), iterative eigenvector (IEV), or other similar methods to solve the forward relation equation at each frequency and produce a wave directional spectrum. The ADCP may further be used to measure current velocity for various range cells in conjunction with the WDS and wave height measurements. In a second embodiment of the wave direction measuring system of the present invention, the sonar system and acoustic array are mounted to a platform, such as a vessel hull, with the array positioned so as to generate a plurality of upward and/or downward-looking acoustic beams such that altitude and bottom velocity, along with mean current profile, can be measured. In a second aspect of the invention, there is an improved algorithm and method of measuring the wave directional spectrum associated with a fluid medium. Specifically, a plurality of vertically oriented (possibly slanted) acoustic beams are generated using the system previously described. A plurality of different range cells within those beams are sampled to derive current velocity (and optionally, wave height) data. Pressure readings are also optionally obtained from the associated pressure transducer. Initially, the sampled data is processed to remove data outliers and calculate mean values for current velocity, depth, and pressure. Intrinsic wave frequency (f) and wavenumber magnitude (k) are also calculated for each observed frequency component. Next, a non-directional surface height spectrum is calculated by computing the power spectra for the range cells of interest, and the transfer functions for the sensor array. A cross-spectral correlation matrix is then generated by selecting data from certain range cells, which may be the same or different from those selected for computing the power spectra above, applying a fast Fourier transform (FFT), cross multiplying all possible pairs of spectral coefficients for each observed frequency, and then averaging the results over time (from repeated Fourier transforms of sequential time segments) and/or over frequency (within bands of adjacent observed frequencies). After the cross-spectral matrix has been obtained, maximum likelihood, iterative maximum likelihood, and/or iterative eigenvector solution methods are applied to the array sensitivity vector, which is uniquely related to the chosen array geometry, and cross-spectral matrix to obtain a frequency specific wave directional spectra. Ultimately, the frequency-specific spectra are combined to construct a complete wave directional spectrum descriptive of both azimuth and frequency. The inventive algorithm can be run on existing signal processing equipment resident within the ADCP system, or run on an external computer as a post-processing task. In a third aspect of the invention, there is an improved method of measuring the wave height spectrum of a fluid medium using a submerged sonar system. A broadband ADCP sonar system of the type described above is used in conjunction with an upward- or downward-looking transducer array in order to measure wave height using one or a combination of methods. The first method is to determine the slant range to the surface using the measured backscatter intensity and/or signal correlation to interpolate the location of the surface. The wave height spectrum is determined as the power spectrum of the surface elevation. The second method is to measure beam velocity data from selected range cells within the beams and use the relationship between the velocity spectrum and the wave height spectrum from linear wave theory to determine the latter. Alternatively, in a third method, pressure measurements obtained from the ADCP""s pressure transducer may be used to calculate wave height. These and other objects and features of the present invention will become more fully apparent from the following description and appended claims taken in conjunction with the accompanying drawings.
History of the cancer stem cell model {#Sec1} ===================================== Cancer is a leading killer of human health, and more than 10 million patients die of cancer every year (McGuire [@CR53]). Although many tumorous hypotheses and intervention strategies have been revealed, however, the real mechanism of tumor initiation is still elusive. The cancer stem cell (CSC) model fits well with tumor initiation, metastasis, drug resistance, and relapse, which is supported by more and more experimental and clinical data. At present, the CSC model has been accepted by many researchers and clinicians, and will become a promising strategy for tumor intervention in the near future (Shabbir *et al.* [@CR70]; Takebe *et al.* [@CR81], [@CR82]). Actually, the concept of CSC model was raised a long time ago. Based on the similarity between cancer and the embryo, Lobstein and Recamier raised an embryonic origin of tumor model in 1829. They thought that tumor originated from proliferating embryonic cells that persisted in adulthood (Krebs [@CR37]). Although this hypothesis fits well with many clinical observations, this hypothesis has not been proved because of technical limitations. The CSC model was proved for the first time in 1991 in leukemia patients. There are several kinds of leukemia cells, including CD34^+^CD38^−^ cells and CD34^−^CD38^+^ cells. CD34^+^CD38^−^ cells can initiate leukemia efficiently, but CD34^−^CD38^+^ cells cannot, showing the existence of leukemia stem cells (Terstappen *et al.* [@CR83]). Later on, using various tumor models, scientists then found that all the cells in tumor bulk cannot propagate efficiently and only a small subset of tumor cells can initiate new tumors (Shigdar *et al.* [@CR72]). A bunch of surface markers of cancer stem cells have been identified, and CSCs have been identified in many solid tumors up to date (Gopalan *et al.* [@CR19]). Tumors originate from the CSCs, but what is the origin of CSCs? Several hypotheses have been raised: (1) CSCs are transformed form of differentiated somatic cells; (2) Mutations are accumulated in normal tissue progenitor cells to form CSCs; (3) CSCs originate from dedifferentiation of normal tumor cells. Lineage tracing and single-cell sequencing are good tools to investigate the origin of CSCs. Lineage tracing data by several groups showed that colorectal CSCs are derived from Lgr5^+^ intestinal stem cells (Barker *et al.* [@CR2]; Melo *et al.* [@CR55]; Schepers *et al.* [@CR67]; Shimokawa *et al.* [@CR73]). Taking advantage of single-cell sequencing of bladder CSCs, non-stem tumor cells, and normal bladder cells, Fan lab concluded the multiple sources of bladder CSCs (Yang *et al.* [@CR101]). Single-cell analysis also revealed the heterogeneity of liver CSCs (Zheng *et al.* [@CR106]). The tumorigenesis models contain the hierarchical models and the stochastic model. Tumors originate from certain cells according to the hierarchical model; whereas the stochastic model assumes that any cells may initiate tumors as a result of mutation or other oncogenic factors (Quail *et al.* [@CR63]). Both models were proved by massive experimental and clinical data, which largely confuse the understanding of tumorigenesis. The standard CSC model belongs to the hierarchical model. According to the classical CSC model, tumors are formed as the result of CSC differentiation, and non-CSCs die of clonal exhaustion (Greaves [@CR20]). However, dedifferentiation occurs in some differentiated epithelial cells to form CSCs, and the dedifferentiation can be hierarchical or stochastic (Chaffer and Weinberg [@CR7]). In liver CSCs, Yap1 activation is prerequisite for self-renewal and cell-fate determination. Yap1 deficiency in liver CSCs can convert them into non-CSCs, and differentiated liver cancer cells became liver CSCs when Yap1 is enforcedly overexpressed (Zhu *et al.* [@CR111]). The cell-fate switch between CSCs and non-CSCs confirms the plasticity of CSCs, which may combine the hierarchical and stochastic tumorigenesis models together. Biological characteristics and study strategies of CSCs {#Sec2} ======================================================= The CSCs within tumor bulk display the capacity to self-renew, differentiate, and give rise to a new tumor (Visvader and Lindeman [@CR87]). Recently, lots of surface markers of CSCs have been identified, including CD133, CD13, CD24, ALDH1A1, CD44, and so on (Henderson *et al.* [@CR23]; Li *et al.* [@CR47]; Marotta *et al.* [@CR52]; Organista-Nava *et al.* [@CR61]; Yang *et al.* [@CR100]). It is still a general strategy to isolate CSCs by FACS and to examine their biological features. There are usually more than one surface marker of CSCs that have been found in a certain tumor, indicating the heterogeneity within CSCs (Haraguchi *et al.* [@CR22]; Yang *et al.* [@CR99]). The heterogeneity of liver CSCs was proved by single-cell sequencing (Zheng *et al.* [@CR106]). Combination of different markers may be a better strategy for CSC enrichment. Fan lab revealed that CD133^+^CD13^+^ liver CSCs have much stronger self-renewal and tumorigenesis capacities than CD133^+^ CSCs or CD13^+^ CSCs alone (Wang *et al.* [@CR90]). CSCs, also termed as tumor initiating cells (TICs), are the predominant cells for tumor initiation (O'Brien *et al.* [@CR60]). Accordingly, the tumor initiation assay is a standard and well-accepted method to examine the self-renewal of CSCs (Hermann *et al.* [@CR24]). Gradient numbers of cells are used for tumor observations, and the ratios of CSCs are calculated by extreme limiting dilution analysis (Zhu *et al.* [@CR108], [@CR109]). The sphere formation is another widely used method for CSC detection (Cao *et al.* [@CR6]). In FBS-free medium and ultra-low adherent plates, normal tumor cells die of anoikis, while CSCs can escape from anoikis and propagate into oncospheres. CSCs from many tumor types can generate oncospheres, including breast cancer, liver cancer, colorectal cancer, bladder cancer, and so on (Cao *et al.* [@CR6]; Ponti *et al.* [@CR62]; Ricci-Vitiani *et al.* [@CR64]; Yang *et al.* [@CR101]). The side population is another assay for CSCs. As we know, CSCs play a critical role in drug resistance (Dean *et al.* [@CR14]). Highly expressed many drug-pump molecules such as ABCG2 and CSCs can pump intracellular drugs out of cells to escape drug-induced cytotoxicity. During withdrawal of drugs, survived CSCs can propagate and differentiate into a new tumor, which is termed "tumor relapse" (Merlos-Suarez *et al.* [@CR56]). Taking advantage of this characteristic, researchers developed the side population assay to detect CSCs (Chiba *et al.* [@CR9]). Recently, several new strategies for CSC study have been established. Genetic lineage tracing is an important tool to examine the self-renewal of CSCs *in vivo* (Meacham and Morrison [@CR54]). Lgr5 and OLFM4 tracing proved that colorectal cancer originated from Lgr5^+^ intestinal stem cells (Barker *et al.* [@CR2], 2007; Schepers *et al.* [@CR67]; Van der Flier *et al.* [@CR86]). As we know, almost all surface markers of CSCs are also markers of normal tissue stem cells, and CSC-targeted intervention probably blocks tissue hemostasis and renewal. Therefore, it is an urgent issue to identify CSC-specific markers. Two-dimensional mass spectrometry and single-cell RNA sequencing are ideal methods to identify novel markers of CSCs (Zheng *et al.* [@CR106]). It also made sense to deliver CSC-targeting reagents with nanoparticles, which are majorly distributed in tumors due to enhanced permeability and retention (EPR) effects (Gao *et al.* [@CR17]; Schroeder *et al.* [@CR68]; Sun *et al.* [@CR78]). By delivering gene or drugs, some smart and environment-response nanoparticles also emerge as good carriers in CSC targeting (Schroeder *et al.* [@CR68]; Sun *et al.* [@CR78]). Signaling pathways for CSCs {#Sec3} =========================== The self-renewal of CSCs is maintained under precise regulation, and there are several major signaling pathways in the CSC regulation, including Wnt/β-catenin, Notch, and Hedgehog signaling pathways. The Wnt/β-catenin signaling plays a critical role in many physiological and pathological processes, including development, organ formation, and tumorigenesis (Clevers [@CR10]). As the most important signaling in the regulation of the self-renewal of CSCs, Wnt/β-catenin signaling is activated by β-catenin and TCF, leading to expression of target genes, containing c-MYC, CCND1/2, Axin2, SOX4, TCF7, ASCL2, LGR5, and so on (MacDonald *et al.* [@CR51]). When the Wnt signaling is OFF, β-catenin is located in the cytoplasm and form the APC-degrading complex (Wu *et al.* [@CR92]). When the Wnt signaling is ON, the APC-degrading complex is disrupted and β-catenin translocates into the nucleus, where it associates with TCF/LEF to form the β-catenin-activating complex (Korinek *et al.* [@CR36]). Many inhibitors of the Wnt/β-catenin pathway have been used for intervention of CSCs. The Notch signaling, another critical modulator for development, also regulates CSC self-renewal (Kopan and Ilagan [@CR35]). When engaged with Notch ligands (DLL1-4), Notch receptors are cleaved by γ-secretase into a stable intracellular domain (NICD), which can translocate into the nucleus and activate the transcription of Notch target genes, including HES family genes, HEY family genes, NRARP, and so on (Mumm and Kopan [@CR58]). Of note, the roles of Notch signaling in CSC self-renewal are controversial, depending on cancer types and Notch receptors. Fan lab showed that in liver CSCs, NOTCH2 is a predominant NOTCH receptor. NOTCH2 is highly expressed in liver CSCs and plays a critical role in the self-renewal maintenance of liver CSCs (Zhu *et al.* [@CR109]). The Hedgehog signaling drives progress of basal cell carcinoma, bladder cancer, and other tumors (Li *et al.* [@CR46]; Takebe *et al.* [@CR81]). The activation of Hedgehog signaling is controlled by two receptors, Patched and Smo. The Patched receptor inhibits the activation of Hedgehog pathway and the Smo receptor plays an opposite role. Once engaged with ligands (shh, ihh, dhh), the inhibition of Patched is relieved and Smo is activated, and Hedgehog target genes are consequently expressed (Katoh and Katoh [@CR30]). Similar with Wnt/β-catenin and Notch signaling pathways, the Hedgehog activation is also well regulated. For instance, GALNT1, a glycotransferase highly expressed in BCMab1^+^CD44^+^ bladder CSCs, can activate Hedgehog signaling through O-linked glycosylation of SHH and promote the self-renewal of bladder CSCs (Li *et al.* [@CR46]). Besides Wnt/β-catenin, Notch, and Hedgehog signaling pathways, other signaling pathways are also involved in the self-renewal of certain tumors. For example, lung CSCs secrete CSF and c-Kit to drive their self-renewal through an autocrine manner (Levina *et al.* [@CR43]). PTEN pathway plays a critical role in the self-renewal regulation of esophageal CSCs and breast CSCs (Li *et al.* [@CR44]; Zhou *et al.* [@CR107]). Yap1 and Rspo are predominant modulators for colorectal CSCs (Barry *et al.* [@CR3]). In addition, Yap1 signaling modulates the cell-fate and plasticity of liver CSCs (Zhu *et al.* [@CR111]). Genetic and epigenetic regulation of CSCs {#Sec4} ========================================= Accumulating evidence shows that many genetic and epigenetic factors are involved in the regulation CSC self-renewal. As we know, transcription factors (TFs) are critical modulators in cell-fate determination. Oct4, c-Myc, Nanog, and Klf4 overexpression can convert fibroblast cells into induced pluripotent stem (iPS) cells (Takahashi and Yamanaka [@CR79]). Similar to iPS cells, CSCs can also self-renew and differentiate. Oct4, c-Myc, Nanog, and Klf4 were also identified as critical regulators in the maintenance of CSC self-renewal (Lee *et al.* [@CR42]; Tseng *et al.* [@CR84]; Zhu *et al.* [@CR108]). Some TFs involved in development are also required for the maintenance of CSCs, including Zic2, Notch2, and so on (Zhu *et al.* [@CR108], [@CR109]). In fact, tumorigenesis is a process of oncogenic reprogramming, and many chromatin remodeling complexes are dysregulated in cancer cells and CSCs (Wang *et al.* [@CR88]). As a driver factor in tumorigenesis, the chromatin remodeling becomes a critical target for cancer and CSC elimination (Jones and Baylin [@CR27]). It has been reported that the SWI/SNF complex is involved in oncogenic reprogramming and CSC self-renewal (Klochendler-Yeivin *et al.* [@CR34]). The SWI/SNF complex can be formed into BRG1-contained SWI/SNF complex and BRM-contained SWI/SNF complex. The BRG1-contained SWI/SNF complex is increased in liver tumorigenesis, whereas the BRM-contained SWI/SNF complex is decreased. This switch between BRG1- and BRM-contained SWI/SNF complex plays a critical role in liver tumorigenesis and liver CSC self-renewal (Zhu *et al.* [@CR111]). The mutation of ARID1A, a component of SWI/SNF complex, also plays an important role in liver tumorigenesis and bladder tumorigenesis, and drives the self-renewal of liver CSCs and bladder CSCs as well (Fujimoto *et al.* [@CR16]; Yang *et al.* [@CR101]). Many components of PRC2 complex are frequently mutated in various tumors. EZH2 is the core component of PRC2 and highly expressed in many solid tumors (Takawa *et al.* [@CR80]). EZH2 depletion results in decreased breast CSCs and liver CSCs (Kleer *et al.* [@CR33]; Zhu *et al.* [@CR110]). In contract, EZH2 loss of function mutation also drives tumorigenesis in acute lymphoblastic leukemia (Ntziachristos *et al.* [@CR59]). Of note, EZH2 also promotes CSC self-renewal through a PRC2-independent manner. Xu *et al.* revealed that the oncogenic role of EZH2 in prostatic cancer is PRC2-independent (Xu *et al.* [@CR94]). The non-classic role of EZH2 was validated in glioblastoma CSCs and liver CSCs, in which EZH2 exerts its role through STAT3 and β-catenin methylation (Kim *et al.* [@CR31]; Zhu *et al.* [@CR110]). PRC1 complex is also involved in tumorigenesis, and the expression of its component BMI1 is related to the prognosis of many kinds of tumors (Laugesen and Helin [@CR41]). BMI1 overexpressing head and neck squamous cell carcinoma showed enhanced metastasis and CSC-like characteristics (Yu *et al.* [@CR105]). The NURD complex is another critical remodeling complex that participates in the CSC self-renewal (Lai and Wade [@CR40]). HDAC1 and HDAC2, two components of the NURD complex, are highly expressed in tumor patients with bad prognosis (West and Johnstone [@CR91]). In many murine tumor models, HDAC1 and HDAC2 blockade inhibits tumor progress and CSC self-renewal (West and Johnstone [@CR91]). However, the role of NURD complex in tumorigenesis and CSC self-renewal is controversial, depending on different components and tumor types. For example, HDAC1 and HDAC2 are highly expressed in breast cancer and promote tumor progresses, and LSD1 is lowly expressed in breast cancer and inhibits tumor progress (Lai and Wade [@CR40]; Wang *et al.* [@CR89]; West and Johnstone [@CR91]). This inconsistency is also reflected by clinical applications. Although HDAC inhibitors inhibit tumor progress, some inhibitors may promote the propagation of certain tumors (Santoro *et al.* [@CR65]). Besides the SWI/SNF, PRC, and NURD complexes, some other chromatin remodeling complexes also participate in the tumorigenesis and CSC self-renewal. The NURF complex is highly expressed in liver cancer and liver CSCs, and drives the self-renewal of liver CSCs through OCT4 (Zhu *et al.* [@CR108]). Single-cell sequencing of bladder CSCs, non-CSCs, and normal bladder cells revealed that MLL2 promotes the self-renewal of bladder CSCs (Yang *et al.* [@CR101]). Histone acetyltransferase MOZ and MORF are critical modulators for the self-renewal of hematopoietic stem cells and leukemia CSCs (Yang and Ullah [@CR97]). Histone modification is also involved in the tumorigenesis and CSC self-renewal. In acute leukemia CSCs, H3K4me3 and H3K27me3 were enriched in the regions of CSC-associated genes (Yamazaki *et al.* [@CR96]). The H3K4me3 levels in *Oct4*, *Yap1,* and *TCF7* promoters are also related to the self-renewal of liver CSCs (Wang *et al.* [@CR90]; Zhu *et al.* [@CR110], [@CR111]). Some modifications of histone variants are also related to the CSC self-renewal. The acetylation of H2A.Z (acH2A.Z) and methylation are involved in transcriptional repression of prostate cancer (Valdes-Mora *et al.* [@CR85]). In addition to the modifications of specific regions, the total modification levels of H3K18ac and H3K4me2 are also correlated with prostate relapse, and the levels of H3K9ac, H3K18ac, H4K12ac, H4K16ac, H3K4me2, H4K20me3, and H4R3me2 are related to breast tumorigenesis as well (Elsheikh *et al.* [@CR15]; Seligson *et al.* [@CR69]). Non-coding RNAs are also modulators for the CSC self-renewal, including microRNA, snoRNA (small nucleolar RNA), circRNA (circular RNA), lncRNA (long non-coding RNA), and so on. MicroRNA let-7 (Mir-let-7) is the first identified microRNA involved in CSC self-renewal. Mir-let-7 is lowly expressed in breast CSCs, and inhibits the self-renewal of breast CSCs and breast tumorigenesis through H-Ras and HMGA2 (Yu *et al.* [@CR104]). Mir-200c is another lowly expressed microRNA in breast CSCs, and suppresses breast CSC self-renewal through BMI expression (Shimono *et al.* [@CR74]). Moreover, Mir-200c also participates in cell-fate decision of breast CSCs and non-CSCs (Shimono *et al.* [@CR74]). In addition, Mir-34a inhibits the self-renewal of prostatic CSCs and prostatic cancer metastasis (Liu *et al.* [@CR49]). Mir-181 is a modulator for the self-renewal of liver CSCs (Ji *et al.* [@CR25]). LncRNAs emerge as critical modulators in tumorigenesis and CSC self-renewal. MALAT-1 is highly expressed in pancreatic cancer and pancreatic CSCs, and its expression confers pancreatic cancer cell stem-like characteristics (Jiao *et al.* [@CR26]). PVT1 is copy-number gained in various tumors, accompanied with PVT1 overexpression, which promotes the stability of c-Myc and thus initiates tumorigenesis and CSC self-renewal (Tseng *et al.* [@CR84]). Fan lab identified several lncRNAs in liver CSCs that are involved in their self-renewal maintenance (Fig. [1](#Fig1){ref-type="fig"}). LncTCF7 is highly expressed in liver CSCs and required for the self-renewal of liver CSCs. Mechanistically, LncTCF7 recruits the SWI/SNF complex to initiate TCF7 expression and subsequently initiates Wnt/β-catenin activation (Wang *et al.* [@CR90]). Lnc-β-catm promotes the interaction between β-catenin and EZH2, which further methylates β-catenin and promotes its stability, leading to Wnt/β-catenin signaling activation in liver CSCs (Zhu *et al.* [@CR110]). LncBRM binds specifically to BRM, but not BRG1, promoting the assembly of BRG1-contained SWI/SNF complex. The BRG1-contained SWI/SNF complex further initiates Yap1 signaling and finally sustains the liver CSC self-renewal (Zhu *et al.* [@CR111]). Guarnerio *et al.* found many fused circular RNAs in leukemia drive leukemia tumorigenesis together with oncogenes (Guarnerio *et al.* [@CR21]). Finally, sno-lncRNA SLERT can promote the transcription activity of ribosome RNA and initiates tumorigenesis (Xing *et al.* [@CR93]).Fig. 1Newly identified modulators of liver CSC self-renewal. LncTCF7, lnc-β-catm, lncBRM, C8orf4, and Zic2 were identified as critical liver CSC regulators by Fan lab (Hermann *et al.* [@CR24]; Takawa *et al.* [@CR80]; Yang *et al.* [@CR98], [@CR99]; Zhu *et al.* [@CR108], [@CR109], [@CR110], [@CR111]). The newly identified positive regulators are shown in *red* and negative regulators in *blue* Many genetic and epigenetic modulators have been identified in the regulation of CSC self-renewal; however, the precise regulatory mechanisms of CSC are still elusive. Some genome-scaled unbiased screening technologies, including shRNA screening, CRISPR screening, and CRISPRi screening, have been widely used to identify functional genes (Liu *et al.* [@CR50]; Shalem *et al.* [@CR71]). To our knowledge, similar screenings have not been used for CSC research, and we believe that many potential modulators will be identified in the near future by using these functional screening techniques. CSC niches {#Sec5} ========== CSCs reside in their niches, which sustain the self-renewal of CSCs and triggers tumorigenesis. The CSC niche contains niche cells and cytokines, and can be divided into inflammatory niche, perivascular niche, premetastatic niche, extracellular matrix, and neighboring cells. In the inflammatory niche, tumor-associated macrophages and CD4^+^ T cells secrete TNFα and activate NF-κB signaling of CSCs to induce expression of Slug, Snail, and Twist, and consequently drive epithelial-mesenchymal transition (EMT) and CSC self-renewal (Liu *et al.* [@CR50]). The location of CSCs in tumor bulk has been an important issue for a long time. The CSCs were first observed to be located near from blood vessels. Head CSCs were found to be in contact with vascular endothelial cells directly, and the number of CSCs is related to vascular intensity (Calabrese *et al.* [@CR5]). When co-cultured with vascular endothelial cells, CSCs form oncospheres 5-fold as large as CSCs alone (Calabrese *et al.* [@CR5]). Neurospoagioma CSCs also reside near from blood vessels, where are supported by vessel-derived Hedgehog, Notch, and PI3K molecules (Charles *et al.* [@CR8]). The perivascular niche protects CSCs from radiation-induced damage, and initiates the self-renewal of CSCs (Charles *et al.* [@CR8]). Meanwhile, vascular endothelial cells sustain the self-renewal of CSCs through the VEGF-Nrp1 signaling pathway (Beck *et al.* [@CR4]). Hypoxia is a typical characteristic of tumors and also serves as CSC niches. Hypoxia drives the self-renewal of CSCs through ROS and TGFβ signaling, and also protects CSCs from drug-induced and radiation-induced cell death (Scheel *et al.* [@CR66]). Hypoxia-induced factor 1α (HIF1α) directly activates Notch signaling and thus drives CSC self-renewal in many solid tumors (Quail *et al.* [@CR63]). HIF1α also keeps CSCs in a quiescent state, reduces DNA damage, and finally maintains the self-renewal of CSCs. CSCs in primary locus and metastasis locus share similar transcription landscapes. There are also large similarity between CSCs and circulating tumor cells, which are critical for tumor metastasis. In addition, circulating tumor cells highly expressing CSC markers were also identified recently. These observations proved the relationship between CSCs and tumor metastasis (Yachida *et al.* [@CR95]). The premetastatic niche contains six characteristics, including immune repression, inflammation, angiogenesis, lymphangiogenesis, organotropism, and reprogramming, which drives tumor metastasis and CSC self-renewal (Liu and Cao [@CR48]). Moreover, the premetastatic niche also contains abundant vessels, niche cells, and factors, which support the survival and plasticity of CSCs (Takebe *et al.* [@CR81]). In the lung metastasis of breast cancer, CSCs can induce periostin expression in lung fibroblast, which further drives the self-renewal of CSCs through engaging with Wnt ligands (Kitamura *et al.* [@CR32]). There are various kinds of cells near from CSCs, which support CSC self-renewal with nutrition and cytokines (Fig. [2](#Fig2){ref-type="fig"}). Mesenchymal stem cells (MSCs), cancer-associated fibroblasts (CAFs), tumor-associated macrophages (TAMs), and non-stem cancer cells play critical roles in the maintenance of CSC self-renewal. MSCs are multiple functional cells and can secrete many cytokines to promote the CSC self-renewal. MSCs can activate NF-κB signaling and drive CSC self-renewal by secreting CSCL12, IL-6, and IL-8 as well. Meanwhile, MSCs also secrete BMP antagonists to sustain CSCs in an undifferentiated state (Davis *et al.* [@CR13]). In breast cancer, MSCs induce Mir-199a expression in cancer cells, which further inhibits FoxP2 expression and drives CSC self-renewal (Cuiffo *et al.* [@CR12]). In tumors, endothelial cells and CSCs can convert fibroblasts to CAFs. CAFs secrete extracellular matrix, including VEGF, PDGF, HGF, and CXCL12, which drive the activation of Wnt and Notch signaling pathways for the self-renewal maintenance of CSCs (Kalluri and Zeisberg [@CR28]). CAFs also remodel extracellular matrix, promote EMT, and drive CSC self-renewal through secreting metalloproteases such as MMP2, MMP3, and MMP9. Recently, Song lab identified a new subgroup of CAFs termed CD10^+^GPR77^+^ CAFs, which secrete IL-6 and IL-8 to activate NF-κB signaling in CSCs, and consequently promote the propagation of breast cancer and lung cancer, drug resistance, and CSC self-renewal (Su *et al.* [@CR77]). In addition, CSCs recruit macrophages, medullary precursor cells and MSCs to form a paracrine niche, which maintains the self-renewal of CSCs as well.Fig. 2Mutual interactions between CSCs and CSC niches. Main niche cells and factors for CSC self-renewal are shown. CSC: cancer stem cell, TAM: tumor-associated macrophage, CAF: cancer-associated fibroblast, MSC: mesenchymal stem cells, EC: endothelial cells Targeting strategies against CSCs and future challenges {#Sec6} ======================================================= CSCs are considered as the origin of tumorigenesis, metastasis, drug resistance, and relapse. CSCs are in quiescent state and survive in response to many drugs that target tumor propagation (Kurtova *et al.* [@CR39]). Meanwhile, CSCs can pump drugs out of cells owing to high-expression drug-pump molecules. Especially, CSCs can escape from drug-induced cell death. Unlike many tumor cells, CSCs efficiently escape from anoikis, which is prerequisite for tumor metastasis (Kreso and Dick [@CR38]). During withdrawal of drugs, survived CSCs can propagate and differentiate into a new tumor. Therefore, targeting CSCs is a big challenge for tumor elimination. As mentioned above, many surface markers of CSCs have been identified, and these markers become first choices for CSC targeting. CD13 antibody targeting liver CSCs can efficiently eliminate liver CSCs (Haraguchi *et al.* [@CR22]). BCMab1 antibody targeting bladder CSC surface marker Integrin α3β1 can inhibit the self-renewal of bladder CSCs and effectively suppress bladder cancer propagation (Li *et al.* [@CR45]). Some important membrane proteins also serve as targets for CSC elimination. Rspo3 is highly expressed in colorectal cancer and plays a critical role in the self-renewal of intestinal stem cells and colorectal CSCs, and its blockade antibody has effective intervention on colorectal CSCs and colorectal tumors (Storm *et al.* [@CR76]). The Wnt/β-catenin, Hedgehog, Notch, BMP, and Pten pathways are also used as targets for CSC elimination, and the inhibitors of these signaling pathways can repress the CSC self-renewal. Although CSCs resist to traditional radiotherapy and chemotherapy, they are sensitive to certain therapies. For example, rapamycin, an inhibitor of mTOR signaling pathway, can eliminate CSCs of PTEN-deficient leukemia (Yilmaz *et al.* [@CR103]). G-CSF treatment on ALL CSCs can promote entrance of cell cycle, and thus increase the sensitivity of ALL CSCs to chemotherapy (Kreso and Dick [@CR38]). Finally, BMP4 can convert glioma CSCs into normal glia cells (Gargiulo *et al.* [@CR18]). Targeting CSC niches emerges as a new therapy for CSC clearance. HIF1α and HIF2α are good targets for glioma and glioma CSCs (Soeda *et al.* [@CR75]). VEGF targeting antibody Bevacizumab suppresses the self-renewal of CSCs and effectively inhibits tumor propagation and metastasis (Ye *et al.* [@CR102]). Inhibition of CCR2 and M-CSF in pancreatic cancer decreases the numbers of macrophages and CSCs (Mitchem *et al.* [@CR57]). The antibody against fibronectin receptor Integrin α4β1 inhibits the protection of CSCs resisting to chemotherapy (Kaplan *et al.* [@CR29]). Moreover, CSCs can also serve as a target for immunotherapy, a promising therapy for tumor treatment (Codd *et al.* [@CR11]). However, many CSC markers are also the markers of normal tissue stem cells and progenitor cells. For instance, LGR5, a marker of colorectal CSC, is also a marker of intestinal stem cells (Barker *et al.* [@CR1]). CD133 and CD44 are CSC markers in many tumors, and they are also markers of many tissue progenitor cells. Wnt/β-catenin, Notch, and Hedgehog pathways not only participate in the self-renewal of CSCs, but also play critical roles in the maintenance modulation of normal tissue stem cells (Yang *et al.* [@CR98]). With the development of modern methodology, some specific markers for CSCs must be identified and can be used for CSC targeting in the future. The heterogeneity of CSCs themselves is another challenge for CSC targeting. CSCs also contain various subgroups of cells according to singe cell sequencing and experimental data. Fan lab revealed a multiple origin of bladder CSCs through single-cell sequencing (Yang *et al.* [@CR101]). Several markers of CSCs have been identified for a certain tumor type (Wang *et al.* [@CR90]). CSC heterogeneity surely increases the difficulty for CSC targeting. Identifying all CSC subsets using single-cell RNA sequencing is needed for the study of CSC biology. In addition, the plasticity of CSCs is another layer difficulty for CSC targeting. CSCs have plastic capacity, and non-CSCs can transdifferentiate into CSCs once the primary CSCs are eliminated. Moreover, the newly formed CSCs can be also resistant to CSC-targeted therapies. As maintained above, targeting tumor cells with chemotherapy leads to the emerging of drug-resistant tumor cells derived from CSCs, and similarly, targeting CSCs can induce therapy-resistant CSCs due to non-CSC dedifferentiation. Therefore, the switch between CSCs and non-CSCs implies the necessity of combination of CSC-targeted therapy with traditional therapy together. This work was supported by the funding provided by the National Natural Science Foundation of China (91640203, 31771638), Beijing Natural Science Foundation (7181006), and Postdoctoral Innovative Talent Support Program to Pingping Zhu. Conflict of interest {#FPar1} ==================== Pingping Zhu and Zusen Fan declare that they have no conflict of interest. Human and animal rights and informed consent {#FPar2} ============================================ This article does not contain any studies with human or animal subjects performed by any of the authors.
Q: how to dismiss AlertDialog with radio buttons in android sdk i have created a alertdialog with two radio buttons in it.when user select an option i need to dismiss the alertdialog but i am not been able to dismiss it. final CharSequence[] items = {"First Option", "Second Option"}; AlertDialog.Builder builder = new AlertDialog.Builder(context); builder.setTitle("Choose an option"); builder.setSingleChoiceItems(items, -1, new DialogInterface.OnClickListener() { public void onClick(DialogInterface dialog, int item) { Toast.makeText(getApplicationContext(), items[item], Toast.LENGTH_SHORT).show(); } }); final AlertDialog alert = builder.create(); alert.show(); Can someone help me how to do this. Thanks A: Please try this.. final CharSequence[] items = {"First Option", "Second Option"}; AlertDialog.Builder builder = new AlertDialog.Builder(context); builder.setTitle("Choose an option"); builder.setSingleChoiceItems(items, -1, new DialogInterface.OnClickListener() { public void onClick(DialogInterface dialog, int item) { dialog.dismiss(); Toast.makeText(getApplicationContext(), items[item], Toast.LENGTH_SHORT).show(); } }); final AlertDialog alert = builder.create(); alert.show(); A: Just add dialog.cancel(); final CharSequence[] items = {"First Option", "Second Option"}; AlertDialog.Builder builder = new AlertDialog.Builder(this); builder.setTitle("Choose an option"); builder.setSingleChoiceItems(items, -1, new DialogInterface.OnClickListener() { public void onClick(DialogInterface dialog, int item) { Toast.makeText(getApplicationContext(), items[item], Toast.LENGTH_SHORT).show(); dialog.cancel(); } }); final AlertDialog alert = builder.create(); alert.show();
Want to be part of Scotland’s first ever online election debate on climate change? The Scottish elec­tions are com­ing up fast. Stop Climate Chaos Scotland is cam­paign­ing to keep cli­mate change firmly on the polit­ic­al agenda, and we need your sup­port. We’d love you to take part in the Climate Day Election Debate – a fant­ast­ic oppor­tun­ity to ask your burn­ing ques­tions about cli­mate change to your future politi­cians from the com­fort of your own liv­ing room. Exactly three weeks today, the event will be broad­cast over the inter­net start­ing at 7.30pm. Tune in online to watch the debate and post your ques­tions by email, Facebook or Twitter, for party spokespeople to answer live. Your involve­ment will help ensure our future politi­cians under­stand just how import­ant tack­ling cli­mate change is to the people of Scotland. Don’t miss this unique oppor­tun­ity to make a big dif­fer­ence. Register your interest and ask your ques­tion today on Facebook or by email.
Q: Need to transpose the vertical data to horizontal format, but few cells in Vertical format can have more than 2 or 3 sub categories in Excel VBA This is BEFORE image This is AFTER Image A: It is based on the assumption that your original data is still listed in the column direction. Sub test2() Dim Ws As Worksheet Dim toWs As Worksheet Dim vDB, vR() Dim rngDB As Range Dim i As Long, j As Long, n As Long Dim r As Long, c As Long, k As Long Set Ws = Sheets(1) Set toWs = Sheets(2) Set rngDB = Ws.Range("a1").CurrentRegion vDB = rngDB r = UBound(vDB, 1) c = UBound(vDB, 2) For j = 2 To c n = n + 1 'ReDim Preserve vR(1 To 4, 1 To n) ReDim Preserve vR(1 To 5, 1 To n) vR(1, n) = vDB(1, j) vR(2, n) = vDB(2, j) vR(3, n) = vDB(3, j) vR(4, n) = vDB(4, j) vR(5, n) = vDB(r, j) 'added insurance 'For i = 5 To r For i = 5 To r - 1 If vDB(i, j) <> "" Then n = n + 1 ReDim Preserve vR(1 To 5, 1 To n) vR(4, n) = vDB(i, j) End If Next i Next j With toWs k = .UsedRange.Rows.Count + 1 '.Range("a" & k).Resize(n, 4) = WorksheetFunction.Transpose(vR) .Range("a" & k).Resize(n, 5) = WorksheetFunction.Transpose(vR) End With End Sub Sheet1 Sheet2
Q: Double string comparison using recursion I'm having some trouble with a question from my programming II class and have hit a brick wall, was wondering if someone could help? The question asks for a user to input a string, the program to reverse the input string and then to compare the reverse to the original, this must be done recursively. So far I have: public class question1 { public static void main(String args[]) { String input = JOptionPane.showInputDialog(null, "Please enter a sentence to determine if it is a palindrome."); String backwardsinput = Reverse(input); System.out.println(backwardsinput); boolean Palindrome = PalindromeCheck(backwardsinput, input); if (Palindrome == true) { JOptionPane.showMessageDialog(null,"That is a palindrome!"); } if (Palindrome == false) { JOptionPane.showMessageDialog(null,"That is not a palindrome"); } } public static String Reverse (String input) { if (input.length() <= 1) return input; else { char x = input.charAt(input.length()-1); return x+Reverse(input.substring(0,input.length()-1)); } } public static boolean PalindromeCheck (String backwardsinput, String input) { if(input.length() == 0 || input.length() == 1) return true; if(backwardsinput.charAt(0) == input.charAt(input.length()-1)) return PalindromeCheck(backwardsinput.substring(1, backwardsinput.length()-1), input.substring(1, input.length()-1)); else return false; } } My problem is, it tells me everything is a palindrome, I've looked at it over and over and can't figure out why! A: You're doing the work twice (sort of). if(backwardsinput.charAt(0) == input.charAt(input.length()-1)) ^^^^^^^^^^^^^^^^ should be if (backwardsinput.charAt(0) == input.charAt(0)) ^ You almost got it :-) Also, another way of expressing if (cond) return something; else return false; is return cond && something; thus your last lines could be written as return backwardsinput.charAt(0) == input.charAt(0) && palindromeCheck(backwardsinput.substring(1, backwardsinput.length() - 1), input.substring(1, input.length() - 1)); Related question / answer: How to find out all palindromic numbers A: if(backwardsinput.charAt(0) == input.charAt(input.length()-1)) This doesn't work. You want backwardsinput.charAt(0) == input.charAt(0). because you reversed it. When I debug something like this, I tend to pull apart all my compound statements, so if(backwardsinput.charAt(0) == input.charAt(input.length()-1)) would become char bc = backwardinput.charAt(0); char ic = input.charAt(input.length()-1); System.println(bc); System.println(ic); if (bc == ic) { We all make dumb mistakes when we try to put too much in one expression, so these are good places to start looking for logic errors.
A little while ago I asked Dave to guess off the top of his head what Yasiel Puig might get if he were a free agent this winter. Now, I didn’t tell Dave this was going to be public, so if you disagree with his estimate let’s all be nice, but he landed on one year and $6 million. What Yasiel Puig actually has left on his commitment after this year is two years and something like $14 million, plus some arbitration eligibility in 2019. So while Puig is anything but extraordinarily expensive — in baseball terms — there really is some chance he could be moved in a waiver deal. As unlikely as it is, it’s incredible we’ve gotten here at all. The Dodgers have been trying to trade Puig. They’ve been trying for months, and now that they have Josh Reddick, Puig, who remains, is going to the minors. In part, this is about performance, and in part, this is apparently about discipline, which is hardly anything new as Puig is concerned. The discipline issues are bad enough that the Dodgers are overlooking Puig’s recently acceptable numbers. The marriage there is very clearly ending, just a few years after Puig was anointed one of the faces of the franchise. Let’s be real — everything about Puig is fascinating, and included within “everything” is his career trajectory. He performed like an MVP-level player in 2013. He did the same again in 2014. He wasn’t widely liked then, either, but the performance took care of everything else, and Puig was a 23-year-old cornerstone. Last season, between injuries, he managed a 1.5 WAR. This season, in an equivalent amount of playing time, he’s managed a 0.5 WAR. Yasiel Puig is the same age as Wil Myers and Marcell Ozuna, yet it feels like he’s past his prime. There’s so much you’d think would be on his side. There’s so much you’d think would make him appealing to somebody else. This is a 25-year-old under team control who’s already averaged four wins per 600 plate appearances. He is still able to hit the ball hard, he’s still able to run, and he owns one of the strongest throwing arms in the game. So he can be difficult. How many people in their younger 20s aren’t? For so many reasons, Puig feels like an obvious buy-low candidate. It’s tempting to see him as exactly that. But Puig has been available for a while. The Dodgers have actively marketed him, expressing a willingness to sell low, and there haven’t been enough bites. It’s important to see what the Dodgers see, and indeed what the other teams see too. Puig is difficult. That’s public knowledge. It also affects his commitment to improving. The numbers have obviously slipped, and Puig doesn’t have the same body he did in his first season. Among the reasons is that he’s been on the disabled list with hamstring problems three times since the start of last year. Durability is an issue, and attention is an issue. Going beyond that, this year, Puig has struggled to do much of anything with inside pitches. His batted-ball strength when he puts the ball in the air is only about league-average. You look at the player page and you see what Puig has already been able to do before. But this player isn’t that player. The Dodgers are skeptical that player can be recovered. They’ve tried a few different approaches, trying to get Puig to center himself. He’s had a couple different managers, and he’s been involved in countless conversations. This is a new step — Puig hadn’t been demoted to the minors before. He’s returned to the minors for rehab only, and maybe this could provide a necessary jolt. You never know exactly when things might click, and maybe now Puig will realize how much harder he needs to focus. It could conceivably work. It could also just be the Dodgers sending Puig out of sight for a while. Personalities aren’t step functions. So we’re going to see where this goes, but I’d still bet on Puig finding his way out of the organization. There is still too much there to completely ignore. A year ago there was talk that Marcell Ozuna was a difficult presence for the Marlins. Now he’s a huge reason why they’re shooting for the playoffs. Some of the worst things I’ve heard were said about a younger Yunel Escobar, who came off as borderline unemployable. It’s not a coincidence that Escobar sort of floated around, but here we are now and he’s an everyday player, having long since surpassed 20 career WAR. He’s not great, but he’s fine, and if he’s still a difficult prick, he keeps that under the surface. If Escobar could fix his career, Puig could do the same. Not that it’s guaranteed. If it were guaranteed, either Puig would’ve been moved by now, or the Dodgers wouldn’t have been trying to move him in the first place. The personality is the personality, and both the numbers and the body have declined. Puig’s situation is obviously very different from Josh Hamilton’s, but just in general terms there are similarities, and Hamilton at this point is nothing. The Angels couldn’t wait to get rid of him, having figured he was well past his peak. Hamilton couldn’t physically do what he’d done. Puig’s own athleticism has been reduced, and he’s never taken a consistently disciplined eye to the plate. Puig is not out of opportunities. That much is certain. He’s too young and too interesting. At some point, someone will offer the Dodgers enough, or the Dodgers will lower their own ask. There’s some slim chance he stays, but assuming he doesn’t, I’d be interested to see Puig on the A’s. They could use the press and they could use the potential, if they figure he wouldn’t be too damaging a presence. It would also be fascinating to see Puig on the Angels, if they wanted to take a chance on career rejuvenation. He’s already popular within the market, and there aren’t too many ways to turn the 2017 Angels into a team worth watching. There won’t be a free-agent equivalent. And as long as I’m here, I have to say, I would’ve rather the Braves trade for Puig than spend $32 million to get Matt Kemp. Puig would come with half the commitment and twice the ability, and even if it didn’t work, well, a lot of things aren’t going to work. It would’ve been a better experiment. Still would be, if they could find room. It’s not like you’d have to be stuck with Puig for five years. Not even that long ago, any team would’ve loved to be stuck with Puig for five years. The Dodgers included. Puig now is on his way to the minors, and it probably won’t be long before he’s on his way somewhere else. It’s not often you get the chance to try to acquire a player in his mid-20s with a star-level track record. It says something that such a player could be acquired at all.
If you folloow the link you can see that the two empty team member images are not there. They are the same image that is used for the one that is there, so to me there is an obvious issue with the team member fgeature when used in conjunction with a portfolio item.
Surprise Vomit Comet – WTFIWWY Live This week: a man tries to steal $7 billion (but Jesus is cool with it), a pilot reminds her passengers that the only thing between them and death is one person’s emotional stability, and we learn it is in fact illegal to use a drive thru while on a sofa … I’m now really curious if any of Her Majesty’s Armed Forces are forced to eat food that makes them constipate. I get the feeling they’re not, due to food safety rules and whatnot, but I can see SAS and Black Watch members eating such things voluntarily :/ MREs are generally very dense foods, and are usually partially dehydrated; some items are fully dehydrated, like fruit. My guess is that the constipation is not by design, but is an unintended consequence of the foods density and lower moisture levels. Featured Blogger Presenting non-stop action from the next generation of Earth's heroes in the webcomic, Starbolts! There's action, adventure, romance, drama, comedy and more! That's not all! Starbolt Productions also produces a web show called Comic Showcase where good and bad comics are featured! So, if you're interested in high adventure or in-depth reviews of comic books of the past and today this is the place to be!
Over 100 environmental, conservationist, student and interfaith groups took part in mass climate change rally in London. London, United Kingdom- Thousands of people have descended on London to demand legislators take bolder action to end the United Kingdom‘s contribution to climate change. More than 100 environmental, conservationist, student and interfaith groups took part in a mass lobby around London’s Houses of Parliament on Wednesday, from where participating MPs were ferried by rickshaw to their constituents, gathered in a nearby park and along Lambeth Bridge to the South Bank. Many had travelled to London in the morning to deliver a message to the UK government that the British public demands swifter action to tackle the climate emergency. More than 200 MPs heeded the call. Titled The Time is Now, the event was organised by The Climate Coalition and Greener UK, two groups representing leading environmental organisations such as the WWF, RSPB and Friends of the Earth with millions of members across the country, as well as aid agencies and women’s groups. Campaigners lobby their MPs along the South Bank with Houses of Parliament across the Thames River in London [Ylenia Gostoli/Al Jazeera] Net-zero reduction of carbon emissions Earlier this month, the UK government announced it would commit to achieving a net-zero carbon emissions target by 2050. On June 24, the House of Commons unanimously adopted the law. If passed by the House of Lords, it would make the UK the first G7 country to commit to the legally-binding target. This would be achieved with policies to either avoid greenhouse gas emissions or offset them with projects aimed at soaking up CO2 – ranging from tree planting to technological solutions. The move follows a recommendation by the government’s Advisory Committee on Climate Change last month, as well as global youth-led protests that propelled politicians into action. “That’s hugely welcome progress,” Amy Mount, who heads the Greener UK coalition, told Al Jazeera. “But we believe the UK can and should go a bit faster than that. “The world as a whole needs to get to zero emissions by 2050, and the UK has the resources to hit that target,” she said, adding that interim milestones need to be set as well to achieve it. “[The government] needs to be putting policies in place like a massive overhaul of our homes to make them more energy efficient. We need to be stepping up investment into renewables, and restore important habitats like wetlands that absorb carbon emissions. There’s lots of work that needs to start right away,” Mount said. Campaigners say the greenhouse emissions target should be brought forward to 2045, while calling for the introduction of an environment bill to put in place other targets concerning, for instance, the restoration of natural habitats and the elimination of waste. “[I am asking my MP to take] immediate steps about how we deal with plastics,” said Jane Dickinson, a 61-year-old retired doctor who was lobbying a Scottish MP in a park near the Parliament building. “If the government leads on that then we can make some difference relatively soon.” Jane Dickinson and her husband travelled down to London from Scotland to lobby their MP [Ylenia Gostoli/Al Jazeera] Nearby, a group of school children had come all the way from Bolton in north-west England. “I care about the world and I care about what happens to it and the people who are in it. I believe I have to do whatever I can to change it,” said 13-year-old Eva. “Politicians can see so many people who care about this and MPs know what they need to do.” At 2pm, the group held up their mobile phones as alarm clocks were set off among participants to symbolise “the time is now” to act. An estimated 1.5 million students took to the streets in more than 100 countries for the first global climate strike on March 15, while the Extinction Rebellion group brought parts of London to a standstill in April and led to the British government declaring a climate emergency. ‘Climate change driver of poverty’ Green parties made big gains at the European elections last month, becoming the fourth largest force in the European Parliament. However, EU leaders failed to agree unanimously on the 2050 target at a European Council summit last week, with four countries – Poland, the Czech Republic, Estonia and Hungary – opposing the plan. The event came after a stark warning from the United Nations Special Rapporteur on Extreme Poverty and Human Rights Philip Alston that global society is on course towards “climate apartheid” as 75 percent of the effects of climate change will hit the world’s poor. 190625145004631 In a report published this week, he criticised US President Donald Trump for “actively silencing and obfuscating climate science” and Brazil’s President Jair Bolsonaro for opening up a vast reserve in the Amazon rainforest to mining. The UN, which commissioned the report, came under fire itself for being a mere talking shop on the climate emergency. “Climate change is a driver of poverty,” Joe Ware, a spokesperson for Christian Aid, one of the participating aid groups, told Al Jazeera. “It causes droughts, floods, sea level rising affect coastal communities,” he added. “The poorest people who are in the front line of climate change, who have been experiencing it first and worse, have done the least to contribute to the problem. It’s a great injustice as well.”
for people who care about the West Drought pinches Colorado River reservoirs California's 'surplus' water not in jeopardy, yet PAGE, Ariz. - Frank Young stares blankly at 50 feet of salmon-colored sand separating the Antelope Point boat ramp from the waters of Lake Powell. It has been more than 10 months since any boaters have been able to launch from this anomalous desert marina in a dusty corner of the Glen Canyon National Recreation Area. Without the boats, Young's days as launch watchman are long and lonely. Lake Powell is now 51 feet below its full elevation of 3,700 feet - and dropping. The Antelope Point launch is stranded by the complexities of Colorado River water politics and more than two years of drought. Young has no choice but to watch the dust blow and to wait for the reservoir to rise. That wait could be very long, says Henry Diaz, associate director of the National Oceanic and Atmospheric Administration's (NOAA) Atmospheric and Climate Dynamics branch in Tucson. Diaz says that the drought currently blanketing the Colorado River's watershed will worsen this year, and lakes Powell and Mead will continue dropping. The drought has raised concern downstream, in Las Vegas and especially in California. In 2000, the landmark "4.4 Plan," brokered by former Secretary of Interior Bruce Babbitt, gave California access to 15 years of surplus Colorado River water. In the meantime, California would work to reduce its use of the river's water by 20 percent to get back to its legally allowed take of 4.4 million acre-feet per year (HCN, 5/21/01: Quenching the big thirst). But the numerous local water transfers and conservation agreements that will make the plan work aren't yet finalized, and an extreme drought could trigger an early cutoff of the surplus water. If that happens, says Brad Luckey, head of Southern California's Imperial Irrigation District, "The resulting water crisis would make the energy crunch of 2001 look like child's play." "It's not looking real keen" Everything depends on the weather. NOAA's Diaz says that snowpack in the Upper Colorado River watershed * the key source for both reservoirs - is now 60 percent of normal. He is forecasting a very dry year across a large part of the West, particularly in upper Colorado River watersheds. Diaz says that he expects precipitation in the upper watershed to end the year anywhere between 15 and 30 percent below average. The looming drought of 2002 might not be the end of the bad news. Julio Betancourt, a geoscientist at the U.S. Geological Survey in Tucson, says that the current drought could be part of a longer-term trend known as the Pacific Decadal Oscillation. His studies suggest that modern climate patterns in the watershed tend to occur in one or two decade-long cycles. The most noticeable recent cycle was a wet two-decade period from 1976 to 1996. Now, says Betancourt, "We may be in a dry cycle that is also two decades long." But it's too early to panic, says Wayne Cook, the director of the Upper Colorado River Commission in Salt Lake City, Utah. Cook says that next year would also need to be dry before the 4.4 Plan's built-in safety mechanisms begin forcing Californians to ration their water use. "Could things get that black? Yes," Cook says. "Will it get that black? Probably not." Downriver, Lake Mead's elevation is currently at 1,174 feet, 47 feet below its full pool elevation. According to Bob Walsh, a Bureau of Reclamation spokesman at Lake Mead, the reservoir is expected to drop another 14 feet by November. "Sitting here at the beginning of March, it's not looking real keen," says Patricia Mulroy, general manager of the Southern Nevada Water Authority (HCN, 4/9/01: The water empress of Vegas). For the first time ever, southern Nevada will fully consume the 300,000 acre-feet to which it's entitled under the Law of the River. But right now, says Mulroy, water quality - not quantity - is the critical issue. Turbidity levels in the lake are high, and drought conditions could cause another major algal bloom like one that occurred last year. Either condition makes it increasingly expensive to treat drinking water for Las Vegas. The real hot spot, however, is Southern California. The outlook for the summer largely turns on the level of Lake Mead, which, along with Lake Powell, is being drawn down to provide California with water while the state turns the 4.4 Plan into reality. But if Lake Mead drops 29 more feet, says Cook, the first of the 4.4 Plan's safety triggers will kick in, requiring California to pump water from groundwater storage projects and to call in "dry year" contracts, which would free up agricultural water for municipal uses by paying farmers not to irrigate. If Lake Mead's level drops below 1,125 feet above sea level, all surplus deliveries to California will be cut off. The agency that runs both giant dams remains confident in the short run. "We believe there will be enough water for any demands that come our way this year," says Bureau of Reclamation spokeswoman Colleen Dwyer. In Los Angeles, the Metropolitan Water District's Bob Underwood also downplays the drought. "We'd be in a big world of hurt if we didn't have the reservoirs," says Underwood, "but it looks like we'll be OK for this year." Underwood says that there's sufficient water available from California's State Water Project, which grabs water from Northern California, and from groundwater storage projects, to supplement any lost Colorado River water. Hitting the wall But the specter of shortages has highlighted the urgency of the effort to get the 4.4 Plan rolling. "We can't take a day off," says the Met's Underwood. "The schedule's that tight." The plan requires that a major settlement agreement between the state's biggest water users - the Imperial Irrigation District, the Metropolitan Water District, the Coachella Water District and the San Diego Water District - be signed by Dec. 31, 2002. The agreement spells out exactly where most of the state's required water savings will come from: water conservation, agricultural to municipal transfers and new groundwater-storage projects. But environmentalists fear that a major water transfer between the Imperial Irrigation District and San Diego would kill the Salton Sea, starving the migratory bird refuge of the agricultural runoff that has kept it alive (HCN, 6/19/00: Accidental refuge: Should we save the Salton Sea?). The draft environmental impact statement is now out for public review. It's clear that the transfer will have a huge impact on the sea, and Imperial Valley farmers, conservationists and water districts are battling to determine how water will really be conserved and who will ultimately pay for stopgap measures to keep the Salton Sea from drying up. At the Colorado River Water Users Association meeting last December, the Department of Interior turned up the deadline pressure. Assistant Secretary of the Interior Bennett Raley warned that the agency will take a hard-nosed stance if California fails to get its 4.4 act together by the end of the year. Some environmentalists say the deadline and threat of water cutoffs are being used by the water agencies as a scare tactic to speed the Imperial Valley transfer through without adequate environmental oversight or opportunities for public appeals. "It seems highly unlikely that (Interior) Secretary Gale Norton would ignore the political might of California and unilaterally reduce its water supply come January first," says David Hogan of the Center for Biological Diversity. An attempt to ram the transfer through might spawn legal challenges that could drag a final 4.4 agreement into at least 2003, says Hogan. In the meantime, NOAA's Diaz says, the West could be getting a taste of the future. "This could be a really amazing year in terms of drought," he says. "I'm sure it will be catching a lot of people's attention." Lin Alder writes from Springdale, Utah. Matt Jenkins is assistant editor for High Country News.
/* * Copyright (C) Ambroz Bizjak <ambrop7@gmail.com> * Contributions: * Transparent DNS: Copyright (C) Kerem Hadimli <kerem.hadimli@gmail.com> * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the author nor the * names of its contributors may be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <stdint.h> #include <stdio.h> #include <stddef.h> #include <string.h> #include <limits.h> #include "misc/version.h" #include "misc/loggers_string.h" #include "misc/loglevel.h" #include "misc/minmax.h" #include "misc/offset.h" #include "misc/dead.h" #include "misc/ipv4_proto.h" #include "misc/ipv6_proto.h" #include "misc/udp_proto.h" #include "misc/byteorder.h" #include "misc/balloc.h" #include "misc/open_standard_streams.h" #include "misc/read_file.h" #include "misc/ipaddr6.h" #include "misc/concat_strings.h" #include "structure/LinkedList1.h" #include "base/BLog.h" #include "system/BReactor.h" #include "system/BSignal.h" #include "system/BAddr.h" #include "system/BNetwork.h" #include "flow/SinglePacketBuffer.h" #include "socksclient/BSocksClient.h" #include "tuntap/BTap.h" #include "lwip/init.h" #include "lwip/tcp_impl.h" #include "lwip/netif.h" #include "lwip/tcp.h" #include "tun2socks/SocksUdpGwClient.h" //#include <Foundation/Foundation.h> #ifndef BADVPN_USE_WINAPI #include "base/BLog_syslog.h" #endif #include "tun2socks/tun2socks.h" #include "generated/blog_channel_tun2socks.h" #define LOGGER_STDOUT 1 #define LOGGER_SYSLOG 2 #define SYNC_DECL \ BPending sync_mark; \ #define SYNC_FROMHERE \ BPending_Init(&sync_mark, BReactor_PendingGroup(&ss), NULL, NULL); \ BPending_Set(&sync_mark); #define SYNC_BREAK \ BPending_Free(&sync_mark); #define SYNC_COMMIT \ BReactor_Synchronize(&ss, &sync_mark.base); \ BPending_Free(&sync_mark); // command-line options struct { int help; int version; int logger; #ifndef BADVPN_USE_WINAPI char *logger_syslog_facility; char *logger_syslog_ident; #endif int loglevel; int loglevels[BLOG_NUM_CHANNELS]; int fd; int mtu; char *netif_ipaddr; char *netif_netmask; char *netif_ip6addr; char *socks_server_addr; char *username; char *password; char *password_file; int append_source_to_username; char *udpgw_remote_server_addr; int udpgw_max_connections; int udpgw_connection_buffer_size; int udpgw_transparent_dns; } options; // TCP client struct tcp_client { dead_t dead; dead_t dead_client; LinkedList1Node list_node; BAddr local_addr; BAddr remote_addr; struct tcp_pcb *pcb; int client_closed; uint8_t buf[TCP_WND]; int buf_used; char *socks_username; BSocksClient socks_client; int socks_up; int socks_closed; StreamPassInterface *socks_send_if; StreamRecvInterface *socks_recv_if; uint8_t socks_recv_buf[CLIENT_SOCKS_RECV_BUF_SIZE]; int socks_recv_buf_used; int socks_recv_buf_sent; int socks_recv_waiting; int socks_recv_tcp_pending; }; // IP address of netif BIPAddr netif_ipaddr; // netmask of netif BIPAddr netif_netmask; // IP6 address of netif struct ipv6_addr netif_ip6addr; // SOCKS server address BAddr socks_server_addr; // allocated password file contents uint8_t *password_file_contents; // SOCKS authentication information struct BSocksClient_auth_info socks_auth_info[2]; size_t socks_num_auth_info; // remote udpgw server addr, if provided BAddr udpgw_remote_server_addr; // reactor BReactor ss; // set to 1 by terminate int quitting; // TUN device BTap device; // device write buffer uint8_t *device_write_buf; // device reading SinglePacketBuffer device_read_buffer; PacketPassInterface device_read_interface; // udpgw client SocksUdpGwClient udpgw_client; int udp_mtu; // TCP timer BTimer tcp_timer; // job for initializing lwip BPending lwip_init_job; // lwip netif int have_netif; struct netif the_netif; // lwip TCP listener struct tcp_pcb *listener; // lwip TCP/IPv6 listener struct tcp_pcb *listener_ip6; // TCP clients LinkedList1 tcp_clients; // number of clients int num_clients; static void terminate (void); static void print_help (const char *name); static void print_version (void); static int parse_arguments (int argc, char *argv[]); static int process_arguments (void); static void signal_handler (void *unused); static BAddr baddr_from_lwip (int is_ipv6, const ipX_addr_t *ipx_addr, uint16_t port_hostorder); static void lwip_init_job_hadler (void *unused); static void tcp_timer_handler (void *unused); static void device_error_handler (void *unused); static void device_read_handler_send (void *unused, uint8_t *data, int data_len); static int process_device_udp_packet (uint8_t *data, int data_len); static err_t netif_init_func (struct netif *netif); static err_t netif_output_func (struct netif *netif, struct pbuf *p, ip_addr_t *ipaddr); //static err_t netif_output_ip6_func (struct netif *netif, struct pbuf *p, ip6_addr_t *ipaddr); static err_t common_netif_output (struct netif *netif, struct pbuf *p); static err_t netif_input_func (struct pbuf *p, struct netif *inp); static void client_logfunc (struct tcp_client *client); static void client_log (struct tcp_client *client, int level, const char *fmt, ...); static err_t listener_accept_func (void *arg, struct tcp_pcb *newpcb, err_t err); static void client_handle_freed_client (struct tcp_client *client); static void client_free_client (struct tcp_client *client); static void client_abort_client (struct tcp_client *client); static void client_free_socks (struct tcp_client *client); static void client_murder (struct tcp_client *client); static void client_dealloc (struct tcp_client *client); static void client_err_func (void *arg, err_t err); static err_t client_recv_func (void *arg, struct tcp_pcb *tpcb, struct pbuf *p, err_t err); static void client_socks_handler (struct tcp_client *client, int event); static void client_send_to_socks (struct tcp_client *client); static void client_socks_send_handler_done (struct tcp_client *client, int data_len); static void client_socks_recv_initiate (struct tcp_client *client); static void client_socks_recv_handler_done (struct tcp_client *client, int data_len); static int client_socks_recv_send_out (struct tcp_client *client); static err_t client_sent_func (void *arg, struct tcp_pcb *tpcb, u16_t len); static void udpgw_client_handler_received (void *unused, BAddr local_addr, BAddr remote_addr, const uint8_t *data, int data_len); int tun2socks_main (int argc, char **argv, int fd, int mtu) { if (argc <= 0) { return 1; } // open standard streams open_standard_streams(); // parse command-line arguments if (!parse_arguments(argc, argv)) { fprintf(stderr, "Failed to parse arguments\n"); print_help(argv[0]); goto fail0; } options.fd = fd; options.mtu = mtu; // handle --help and --version if (options.help) { print_version(); print_help(argv[0]); return 0; } if (options.version) { print_version(); return 0; } // initialize logger switch (options.logger) { case LOGGER_STDOUT: BLog_InitStdout(); break; #ifndef BADVPN_USE_WINAPI case LOGGER_SYSLOG: if (!BLog_InitSyslog(options.logger_syslog_ident, options.logger_syslog_facility)) { fprintf(stderr, "Failed to initialize syslog logger\n"); goto fail0; } break; #endif default: ASSERT(0); } // configure logger channels for (int i = 0; i < BLOG_NUM_CHANNELS; i++) { if (options.loglevels[i] >= 0) { BLog_SetChannelLoglevel(i, options.loglevels[i]); } else if (options.loglevel >= 0) { BLog_SetChannelLoglevel(i, options.loglevel); } } BLog(BLOG_NOTICE, "initializing "GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION); // clear password contents pointer password_file_contents = NULL; // initialize network if (!BNetwork_GlobalInit()) { BLog(BLOG_ERROR, "BNetwork_GlobalInit failed"); goto fail1; } // process arguments if (!process_arguments()) { BLog(BLOG_ERROR, "Failed to process arguments"); goto fail1; } // init time BTime_Init(); // init reactor if (!BReactor_Init(&ss)) { BLog(BLOG_ERROR, "BReactor_Init failed"); goto fail1; } // set not quitting quitting = 0; // // setup signal handler // if (!BSignal_Init(&ss, signal_handler, NULL)) { // BLog(BLOG_ERROR, "BSignal_Init failed"); // goto fail2; // } struct BTap_init_data init_data; init_data.dev_type = BTAP_DEV_TUN ; init_data.init_type = BTAP_INIT_FD; init_data.init.fd.fd = fd; init_data.init.fd.mtu = mtu; if (!BTap_Init2(&device, &ss, init_data, device_error_handler, NULL)) { // init TUN device // if (!BTap_Init(&device, &ss, options.fd, options.mtu, device_error_handler, NULL, 1)) { BLog(BLOG_ERROR, "BTap_Init failed"); goto fail2; } // NOTE: the order of the following is important: // first device writing must evaluate, // then lwip (so it can send packets to the device), // then device reading (so it can pass received packets to lwip). // init device reading PacketPassInterface_Init(&device_read_interface, BTap_GetMTU(&device), device_read_handler_send, NULL, BReactor_PendingGroup(&ss)); if (!SinglePacketBuffer_Init(&device_read_buffer, BTap_GetOutput(&device), &device_read_interface, BReactor_PendingGroup(&ss))) { BLog(BLOG_ERROR, "SinglePacketBuffer_Init failed"); goto fail4; } if (options.udpgw_remote_server_addr) { // compute maximum UDP payload size we need to pass through udpgw udp_mtu = BTap_GetMTU(&device) - (int)(sizeof(struct ipv4_header) + sizeof(struct udp_header)); if (options.netif_ip6addr) { int udp_ip6_mtu = BTap_GetMTU(&device) - (int)(sizeof(struct ipv6_header) + sizeof(struct udp_header)); if (udp_mtu < udp_ip6_mtu) { udp_mtu = udp_ip6_mtu; } } if (udp_mtu < 0) { udp_mtu = 0; } // make sure our UDP payloads aren't too large for udpgw int udpgw_mtu = udpgw_compute_mtu(udp_mtu); if (udpgw_mtu < 0 || udpgw_mtu > PACKETPROTO_MAXPAYLOAD) { BLog(BLOG_ERROR, "device MTU is too large for UDP"); goto fail4a; } // init udpgw client if (!SocksUdpGwClient_Init(&udpgw_client, udp_mtu, DEFAULT_UDPGW_MAX_CONNECTIONS, options.udpgw_connection_buffer_size, UDPGW_KEEPALIVE_TIME, socks_server_addr, socks_auth_info, socks_num_auth_info, udpgw_remote_server_addr, UDPGW_RECONNECT_TIME, &ss, NULL, udpgw_client_handler_received)) { BLog(BLOG_ERROR, "SocksUdpGwClient_Init failed"); goto fail4a; } } // init lwip init job BPending_Init(&lwip_init_job, BReactor_PendingGroup(&ss), lwip_init_job_hadler, NULL); BPending_Set(&lwip_init_job); // init device write buffer if (!(device_write_buf = (uint8_t *)BAlloc(BTap_GetMTU(&device)))) { BLog(BLOG_ERROR, "BAlloc failed"); goto fail5; } // init TCP timer // it won't trigger before lwip is initialized, becuase the lwip init is a job BTimer_Init(&tcp_timer, TCP_TMR_INTERVAL, tcp_timer_handler, NULL); BReactor_SetTimer(&ss, &tcp_timer); // set no netif have_netif = 0; // set no listener listener = NULL; listener_ip6 = NULL; // init clients list LinkedList1_Init(&tcp_clients); // init number of clients num_clients = 0; // enter event loop BLog(BLOG_NOTICE, "entering event loop"); BReactor_Exec(&ss); // free clients LinkedList1Node *node; while ((node = LinkedList1_GetFirst(&tcp_clients)) != NULL) { struct tcp_client *client = UPPER_OBJECT(node, struct tcp_client, list_node); client_murder(client); } // free listener if (listener_ip6) { tcp_close(listener_ip6); } if (listener) { tcp_close(listener); } // free netif if (have_netif) { netif_remove(&the_netif); } BReactor_RemoveTimer(&ss, &tcp_timer); BFree(device_write_buf); fail5: BPending_Free(&lwip_init_job); if (options.udpgw_remote_server_addr) { SocksUdpGwClient_Free(&udpgw_client); } fail4a: SinglePacketBuffer_Free(&device_read_buffer); fail4: PacketPassInterface_Free(&device_read_interface); BTap_Free(&device); //fail3: // BSignal_Finish(); fail2: BReactor_Free(&ss); fail1: BFree(password_file_contents); BLog(BLOG_NOTICE, "exiting"); BLog_Free(); fail0: DebugObjectGlobal_Finish(); return 1; } void stop_tun2socks() { terminate(); } void terminate (void) { ASSERT(!quitting) BLog(BLOG_NOTICE, "tearing down"); // set quitting quitting = 1; // exit event loop BReactor_Quit(&ss, 1); } void print_help (const char *name) { printf( "Usage:\n" " %s\n" " [--help]\n" " [--version]\n" " [--logger <"LOGGERS_STRING">]\n" #ifndef BADVPN_USE_WINAPI " (logger=syslog?\n" " [--syslog-facility <string>]\n" " [--syslog-ident <string>]\n" " )\n" #endif " [--loglevel <0-5/none/error/warning/notice/info/debug>]\n" " [--channel-loglevel <channel-name> <0-5/none/error/warning/notice/info/debug>] ...\n" " [--tundev <name>]\n" " --netif-ipaddr <ipaddr>\n" " --netif-netmask <ipnetmask>\n" " --socks-server-addr <addr>\n" " [--netif-ip6addr <addr>]\n" " [--username <username>]\n" " [--password <password>]\n" " [--password-file <file>]\n" " [--append-source-to-username]\n" #ifdef BADVPN_SOCKS_UDP_RELAY " [--enable-udprelay]\n" " [--udprelay-max-connections <number>]\n" #else " [--udpgw-remote-server-addr <addr>]\n" " [--udpgw-max-connections <number>]\n" " [--udpgw-connection-buffer-size <number>]\n" " [--udpgw-transparent-dns]\n" #endif "Address format is a.b.c.d:port (IPv4) or [addr]:port (IPv6).\n", name ); } void print_version (void) { printf(GLOBAL_PRODUCT_NAME" "PROGRAM_NAME" "GLOBAL_VERSION"\n"GLOBAL_COPYRIGHT_NOTICE"\n"); } int parse_arguments (int argc, char *argv[]) { if (argc <= 0) { return 0; } options.help = 0; options.version = 0; options.logger = LOGGER_STDOUT; #ifndef BADVPN_USE_WINAPI options.logger_syslog_facility = "daemon"; options.logger_syslog_ident = argv[0]; #endif options.loglevel = -1; for (int i = 0; i < BLOG_NUM_CHANNELS; i++) { options.loglevels[i] = -1; } options.fd = 0; options.mtu = 4096; options.netif_ipaddr = NULL; options.netif_netmask = NULL; options.netif_ip6addr = NULL; options.socks_server_addr = NULL; options.username = NULL; options.password = NULL; options.password_file = NULL; options.append_source_to_username = 0; options.udpgw_remote_server_addr = NULL; options.udpgw_max_connections = DEFAULT_UDPGW_MAX_CONNECTIONS; options.udpgw_connection_buffer_size = DEFAULT_UDPGW_CONNECTION_BUFFER_SIZE; options.udpgw_transparent_dns = 0; int i; for (i = 1; i < argc; i++) { char *arg = argv[i]; if (!strcmp(arg, "--help")) { options.help = 1; } else if (!strcmp(arg, "--version")) { options.version = 1; } else if (!strcmp(arg, "--logger")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } char *arg2 = argv[i + 1]; if (!strcmp(arg2, "stdout")) { options.logger = LOGGER_STDOUT; } #ifndef BADVPN_USE_WINAPI else if (!strcmp(arg2, "syslog")) { options.logger = LOGGER_SYSLOG; } #endif else { fprintf(stderr, "%s: wrong argument\n", arg); return 0; } i++; } #ifndef BADVPN_USE_WINAPI else if (!strcmp(arg, "--syslog-facility")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.logger_syslog_facility = argv[i + 1]; i++; } else if (!strcmp(arg, "--syslog-ident")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.logger_syslog_ident = argv[i + 1]; i++; } #endif else if (!strcmp(arg, "--loglevel")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } if ((options.loglevel = parse_loglevel(argv[i + 1])) < 0) { fprintf(stderr, "%s: wrong argument\n", arg); return 0; } i++; } else if (!strcmp(arg, "--channel-loglevel")) { if (2 >= argc - i) { fprintf(stderr, "%s: requires two arguments\n", arg); return 0; } int channel = BLogGlobal_GetChannelByName(argv[i + 1]); if (channel < 0) { fprintf(stderr, "%s: wrong channel argument\n", arg); return 0; } int loglevel = parse_loglevel(argv[i + 2]); if (loglevel < 0) { fprintf(stderr, "%s: wrong loglevel argument\n", arg); return 0; } options.loglevels[channel] = loglevel; i += 2; } else if (!strcmp(arg, "--netif-ipaddr")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.netif_ipaddr = argv[i + 1]; i++; } else if (!strcmp(arg, "--netif-netmask")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.netif_netmask = argv[i + 1]; i++; } else if (!strcmp(arg, "--netif-ip6addr")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.netif_ip6addr = argv[i + 1]; i++; } else if (!strcmp(arg, "--socks-server-addr")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.socks_server_addr = argv[i + 1]; i++; } else if (!strcmp(arg, "--username")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.username = argv[i + 1]; i++; } else if (!strcmp(arg, "--password")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.password = argv[i + 1]; i++; } else if (!strcmp(arg, "--password-file")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.password_file = argv[i + 1]; i++; } else if (!strcmp(arg, "--append-source-to-username")) { options.append_source_to_username = 1; } #ifdef BADVPN_SOCKS_UDP_RELAY else if (!strcmp(arg, "--udpgw-remote-server-addr")) { // options.udpgw_remote_server_addr = "0.0.0.0:0"; if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.udpgw_remote_server_addr = argv[i + 1]; i++; #else else if (!strcmp(arg, "--udpgw-remote-server-addr")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } options.udpgw_remote_server_addr = argv[i + 1]; i++; #endif } #ifdef BADVPN_SOCKS_UDP_RELAY else if (!strcmp(arg, "--udprelay-max-connections")) { #else else if (!strcmp(arg, "--udpgw-max-connections")) { #endif if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } if ((options.udpgw_max_connections = atoi(argv[i + 1])) <= 0) { fprintf(stderr, "%s: wrong argument\n", arg); return 0; } i++; } #ifndef BADVPN_SOCKS_UDP_RELAY else if (!strcmp(arg, "--udpgw-connection-buffer-size")) { if (1 >= argc - i) { fprintf(stderr, "%s: requires an argument\n", arg); return 0; } if ((options.udpgw_connection_buffer_size = atoi(argv[i + 1])) <= 0) { fprintf(stderr, "%s: wrong argument\n", arg); return 0; } i++; } else if (!strcmp(arg, "--udpgw-transparent-dns")) { options.udpgw_transparent_dns = 1; } #endif else { fprintf(stderr, "unknown option: %s\n", arg); return 0; } } if (options.help || options.version) { return 1; } if (!options.netif_ipaddr) { fprintf(stderr, "--netif-ipaddr is required\n"); return 0; } if (!options.netif_netmask) { fprintf(stderr, "--netif-netmask is required\n"); return 0; } if (!options.socks_server_addr) { fprintf(stderr, "--socks-server-addr is required\n"); return 0; } if (options.username) { if (!options.password && !options.password_file) { fprintf(stderr, "username given but password not given\n"); return 0; } if (options.password && options.password_file) { fprintf(stderr, "--password and --password-file cannot both be given\n"); return 0; } } return 1; } int process_arguments (void) { ASSERT(!password_file_contents) // resolve netif ipaddr if (!BIPAddr_Resolve(&netif_ipaddr, options.netif_ipaddr, 0)) { BLog(BLOG_ERROR, "netif ipaddr: BIPAddr_Resolve failed"); return 0; } if (netif_ipaddr.type != BADDR_TYPE_IPV4) { BLog(BLOG_ERROR, "netif ipaddr: must be an IPv4 address"); return 0; } // resolve netif netmask if (!BIPAddr_Resolve(&netif_netmask, options.netif_netmask, 0)) { BLog(BLOG_ERROR, "netif netmask: BIPAddr_Resolve failed"); return 0; } if (netif_netmask.type != BADDR_TYPE_IPV4) { BLog(BLOG_ERROR, "netif netmask: must be an IPv4 address"); return 0; } // parse IP6 address if (options.netif_ip6addr) { if (!ipaddr6_parse_ipv6_addr(MemRef_MakeCstr(options.netif_ip6addr), &netif_ip6addr)) { BLog(BLOG_ERROR, "netif ip6addr: incorrect"); return 0; } } // resolve SOCKS server address if (!BAddr_Parse2(&socks_server_addr, options.socks_server_addr, NULL, 0, 0)) { BLog(BLOG_ERROR, "socks server addr: BAddr_Parse2 failed"); return 0; } // add none socks authentication method socks_auth_info[0] = BSocksClient_auth_none(); socks_num_auth_info = 1; // add password socks authentication method if (options.username) { const char *password; size_t password_len; if (options.password) { password = options.password; password_len = strlen(options.password); } else { if (!read_file(options.password_file, &password_file_contents, &password_len)) { BLog(BLOG_ERROR, "failed to read password file"); return 0; } password = (char *)password_file_contents; } socks_auth_info[socks_num_auth_info++] = BSocksClient_auth_password( options.username, strlen(options.username), password, password_len ); } // resolve remote udpgw server address if (options.udpgw_remote_server_addr) { if (!BAddr_Parse2(&udpgw_remote_server_addr, options.udpgw_remote_server_addr, NULL, 0, 0)) { #ifdef BADVPN_SOCKS_UDP_RELAY BLog(BLOG_ERROR, "udprelay server addr: BAddr_Parse2 failed"); #else BLog(BLOG_ERROR, "remote udpgw server addr: BAddr_Parse2 failed"); #endif return 0; } } return 1; } void signal_handler (void *unused) { ASSERT(!quitting) BLog(BLOG_NOTICE, "termination requested"); terminate(); } BAddr baddr_from_lwip (int is_ipv6, const ipX_addr_t *ipx_addr, uint16_t port_hostorder) { BAddr addr; // if (is_ipv6) { // BAddr_InitIPv6(&addr, (uint8_t *)ipx_addr->ip6.addr, hton16(port_hostorder)); // } else { BAddr_InitIPv4(&addr, ipx_addr->addr, hton16(port_hostorder)); // } return addr; } void lwip_init_job_hadler (void *unused) { ASSERT(!quitting) ASSERT(netif_ipaddr.type == BADDR_TYPE_IPV4) ASSERT(netif_netmask.type == BADDR_TYPE_IPV4) ASSERT(!have_netif) ASSERT(!listener) ASSERT(!listener_ip6) BLog(BLOG_DEBUG, "lwip init"); // NOTE: the device may fail during this, but there's no harm in not checking // for that at every step // init lwip lwip_init(); // make addresses for netif ip_addr_t addr; addr.addr = netif_ipaddr.ipv4; ip_addr_t netmask; netmask.addr = netif_netmask.ipv4; ip_addr_t gw; ip_addr_set_any(&gw); // init netif if (!netif_add(&the_netif, &addr, &netmask, &gw, NULL, netif_init_func, netif_input_func)) { BLog(BLOG_ERROR, "netif_add failed"); goto fail; } have_netif = 1; // set netif up netif_set_up(&the_netif); // set netif pretend TCP netif_set_pretend_tcp(&the_netif, 1); // set netif default netif_set_default(&the_netif); // if (options.netif_ip6addr) { // // add IPv6 address // memcpy(netif_ip6_addr(&the_netif, 0), netif_ip6addr.bytes, sizeof(netif_ip6addr.bytes)); // netif_ip6_addr_set_state(&the_netif, 0, IP6_ADDR_VALID); // } // init listener struct tcp_pcb *l = tcp_new(); if (!l) { BLog(BLOG_ERROR, "tcp_new failed"); goto fail; } // bind listener if (tcp_bind_to_netif(l, "ho0") != ERR_OK) { BLog(BLOG_ERROR, "tcp_bind_to_netif failed"); tcp_close(l); goto fail; } // listen listener if (!(listener = tcp_listen(l))) { BLog(BLOG_ERROR, "tcp_listen failed"); tcp_close(l); goto fail; } // setup listener accept handler tcp_accept(listener, listener_accept_func); // if (options.netif_ip6addr) { // struct tcp_pcb *l_ip6 = tcp_new_ip6(); // if (!l_ip6) { // BLog(BLOG_ERROR, "tcp_new_ip6 failed"); // goto fail; // } // // if (tcp_bind_to_netif(l_ip6, "ho0") != ERR_OK) { // BLog(BLOG_ERROR, "tcp_bind_to_netif failed"); // tcp_close(l_ip6); // goto fail; // } // // if (!(listener_ip6 = tcp_listen(l_ip6))) { // BLog(BLOG_ERROR, "tcp_listen failed"); // tcp_close(l_ip6); // goto fail; // } // // tcp_accept(listener_ip6, listener_accept_func); // } return; fail: if (!quitting) { terminate(); } } void tcp_timer_handler (void *unused) { ASSERT(!quitting) // BLog(BLOG_DEBUG, "TCP timer"); // schedule next timer // TODO: calculate timeout so we don't drift BReactor_SetTimer(&ss, &tcp_timer); tcp_tmr(); return; } void device_error_handler (void *unused) { ASSERT(!quitting) BLog(BLOG_ERROR, "device error"); terminate(); return; } void device_read_handler_send (void *unused, uint8_t *data, int data_len) { ASSERT(!quitting) ASSERT(data_len >= 0) BLog(BLOG_DEBUG, "device: received packet"); // accept packet PacketPassInterface_Done(&device_read_interface); // process UDP directly if (process_device_udp_packet(data, data_len)) { return; } // obtain pbuf if (data_len > UINT16_MAX) { BLog(BLOG_WARNING, "device read: packet too large"); return; } struct pbuf *p = pbuf_alloc(PBUF_RAW, data_len, PBUF_POOL); if (!p) { BLog(BLOG_WARNING, "device read: pbuf_alloc failed"); return; } // write packet to pbuf ASSERT_FORCE(pbuf_take(p, data, data_len) == ERR_OK) // pass pbuf to input if (the_netif.input(p, &the_netif) != ERR_OK) { BLog(BLOG_WARNING, "device read: input failed"); pbuf_free(p); } } int process_device_udp_packet (uint8_t *data, int data_len) { ASSERT(data_len >= 0) // do nothing if we don't have udpgw // if (!options.udpgw_remote_server_addr) { // goto fail; // } BAddr local_addr; BAddr remote_addr; int is_dns = 0; uint8_t ip_version = 0; if (data_len > 0) { ip_version = (data[0] >> 4); } switch (ip_version) { case 4: { // ignore non-UDP packets if (data_len < sizeof(struct ipv4_header) || data[offsetof(struct ipv4_header, protocol)] != IPV4_PROTOCOL_UDP) { goto fail; } // parse IPv4 header struct ipv4_header ipv4_header; if (!ipv4_check(data, data_len, &ipv4_header, &data, &data_len)) { goto fail; } // parse UDP struct udp_header udp_header; if (!udp_check(data, data_len, &udp_header, &data, &data_len)) { goto fail; } // verify UDP checksum uint16_t checksum_in_packet = udp_header.checksum; udp_header.checksum = 0; uint16_t checksum_computed = udp_checksum(&udp_header, data, data_len, ipv4_header.source_address, ipv4_header.destination_address); if (checksum_in_packet != checksum_computed) { goto fail; } BLog(BLOG_INFO, "UDP: from device %d bytes", data_len); // construct addresses BAddr_InitIPv4(&local_addr, ipv4_header.source_address, udp_header.source_port); BAddr_InitIPv4(&remote_addr, ipv4_header.destination_address, udp_header.dest_port); // if transparent DNS is enabled, any packet arriving at out netif // address to port 53 is considered a DNS packet // is_dns = (options.udpgw_transparent_dns && // ipv4_header.destination_address == netif_ipaddr.ipv4 && // udp_header.dest_port == hton16(53)); // is_dns = 0; } break; case 6: { // ignore if IPv6 support is disabled if (!options.netif_ip6addr) { goto fail; } // ignore non-UDP packets if (data_len < sizeof(struct ipv6_header) || data[offsetof(struct ipv6_header, next_header)] != IPV6_NEXT_UDP) { goto fail; } // parse IPv6 header struct ipv6_header ipv6_header; if (!ipv6_check(data, data_len, &ipv6_header, &data, &data_len)) { goto fail; } // parse UDP struct udp_header udp_header; if (!udp_check(data, data_len, &udp_header, &data, &data_len)) { goto fail; } // verify UDP checksum uint16_t checksum_in_packet = udp_header.checksum; udp_header.checksum = 0; uint16_t checksum_computed = udp_ip6_checksum(&udp_header, data, data_len, ipv6_header.source_address, ipv6_header.destination_address); if (checksum_in_packet != checksum_computed) { goto fail; } BLog(BLOG_INFO, "UDP/IPv6: from device %d bytes", data_len); // construct addresses BAddr_InitIPv6(&local_addr, ipv6_header.source_address, udp_header.source_port); BAddr_InitIPv6(&remote_addr, ipv6_header.destination_address, udp_header.dest_port); // TODO dns is_dns = 0; } break; default: { goto fail; } break; } // check payload length if (data_len > udp_mtu) { #ifdef BADVPN_SOCKS_UDP_RELAY BLog(BLOG_ERROR, "packet is too large, cannot send to udprelay"); #else BLog(BLOG_ERROR, "packet is too large, cannot send to udpgw"); #endif goto fail; } // submit packet to udpgw SocksUdpGwClient_SubmitPacket(&udpgw_client, local_addr, remote_addr, is_dns, data, data_len); return 1; fail: return 0; } err_t netif_init_func (struct netif *netif) { BLog(BLOG_DEBUG, "netif func init"); netif->name[0] = 'h'; netif->name[1] = 'o'; netif->output = netif_output_func; // netif->output_ip6 = netif_output_ip6_func; netif->mtu = options.mtu; return ERR_OK; } err_t netif_output_func (struct netif *netif, struct pbuf *p, ip_addr_t *ipaddr) { return common_netif_output(netif, p); } //err_t netif_output_ip6_func (struct netif *netif, struct pbuf *p, ip6_addr_t *ipaddr) //{ // return common_netif_output(netif, p); //} err_t common_netif_output (struct netif *netif, struct pbuf *p) { SYNC_DECL BLog(BLOG_DEBUG, "device write: send packet"); if (quitting) { return ERR_OK; } // if there is just one chunk, send it directly, else via buffer if (!p->next) { if (p->len > BTap_GetMTU(&device)) { BLog(BLOG_WARNING, "netif func output: no space left"); goto out; } SYNC_FROMHERE BTap_Send(&device, (uint8_t *)p->payload, p->len); SYNC_COMMIT } else { int len = 0; do { if (p->len > BTap_GetMTU(&device) - len) { BLog(BLOG_WARNING, "netif func output: no space left"); goto out; } memcpy(device_write_buf + len, p->payload, p->len); len += p->len; } while ((p = p->next) != NULL); SYNC_FROMHERE BTap_Send(&device, device_write_buf, len); SYNC_COMMIT } out: return ERR_OK; } err_t netif_input_func (struct pbuf *p, struct netif *inp) { uint8_t ip_version = 0; if (p->len > 0) { ip_version = (((uint8_t *)p->payload)[0] >> 4); } switch (ip_version) { case 4: { return ip_input(p, inp); } break; case 6: { // if (options.netif_ip6addr) { // return ip6_input(p, inp); // } } break; } pbuf_free(p); return ERR_OK; } void client_logfunc (struct tcp_client *client) { char local_addr_s[BADDR_MAX_PRINT_LEN]; BAddr_Print(&client->local_addr, local_addr_s); char remote_addr_s[BADDR_MAX_PRINT_LEN]; BAddr_Print(&client->remote_addr, remote_addr_s); BLog_Append("%05d (%s %s): ", num_clients, local_addr_s, remote_addr_s); } void client_log (struct tcp_client *client, int level, const char *fmt, ...) { va_list vl; va_start(vl, fmt); BLog_LogViaFuncVarArg((BLog_logfunc)client_logfunc, client, BLOG_CURRENT_CHANNEL, level, fmt, vl); va_end(vl); } err_t listener_accept_func (void *arg, struct tcp_pcb *newpcb, err_t err) { ASSERT(err == ERR_OK) // signal accepted struct tcp_pcb *this_listener = (PCB_ISIPV6(newpcb) ? listener_ip6 : listener); tcp_accepted(this_listener); // allocate client structure struct tcp_client *client = (struct tcp_client *)malloc(sizeof(*client)); if (!client) { BLog(BLOG_ERROR, "listener accept: malloc failed"); goto fail0; } client->socks_username = NULL; SYNC_DECL SYNC_FROMHERE // read addresses client->local_addr = baddr_from_lwip(PCB_ISIPV6(newpcb), &newpcb->local_ip, newpcb->local_port); client->remote_addr = baddr_from_lwip(PCB_ISIPV6(newpcb), &newpcb->remote_ip, newpcb->remote_port); // get destination address BAddr addr = client->local_addr; #ifdef OVERRIDE_DEST_ADDR ASSERT_FORCE(BAddr_Parse2(&addr, OVERRIDE_DEST_ADDR, NULL, 0, 1)) #endif // add source address to username if requested if (options.username && options.append_source_to_username) { char addr_str[BADDR_MAX_PRINT_LEN]; BAddr_Print(&client->remote_addr, addr_str); client->socks_username = concat_strings(3, options.username, "@", addr_str); if (!client->socks_username) { goto fail1; } socks_auth_info[1].password.username = client->socks_username; socks_auth_info[1].password.username_len = strlen(client->socks_username); } // init SOCKS if (!BSocksClient_Init(&client->socks_client, socks_server_addr, socks_auth_info, socks_num_auth_info, addr, (BSocksClient_handler)client_socks_handler, client, &ss)) { BLog(BLOG_ERROR, "listener accept: BSocksClient_Init failed"); goto fail1; } // init dead vars DEAD_INIT(client->dead); DEAD_INIT(client->dead_client); // add to linked list LinkedList1_Append(&tcp_clients, &client->list_node); // increment counter ASSERT(num_clients >= 0) num_clients++; // set pcb client->pcb = newpcb; // set client not closed client->client_closed = 0; // setup handler argument tcp_arg(client->pcb, client); // setup handlers tcp_err(client->pcb, client_err_func); tcp_recv(client->pcb, client_recv_func); // setup buffer client->buf_used = 0; // set SOCKS not up, not closed client->socks_up = 0; client->socks_closed = 0; client_log(client, BLOG_INFO, "accepted"); DEAD_ENTER(client->dead_client) SYNC_COMMIT DEAD_LEAVE2(client->dead_client) if (DEAD_KILLED) { return ERR_ABRT; } return ERR_OK; fail1: SYNC_BREAK free(client->socks_username); free(client); fail0: return ERR_MEM; } void client_handle_freed_client (struct tcp_client *client) { ASSERT(!client->client_closed) // pcb was taken care of by the caller // kill client dead var DEAD_KILL(client->dead_client); // set client closed client->client_closed = 1; // if we have data to be sent to SOCKS and can send it, keep sending if (client->buf_used > 0 && !client->socks_closed) { client_log(client, BLOG_INFO, "waiting untill buffered data is sent to SOCKS"); } else { if (!client->socks_closed) { client_free_socks(client); } else { client_dealloc(client); } } } void client_free_client (struct tcp_client *client) { ASSERT(!client->client_closed) // remove callbacks tcp_err(client->pcb, NULL); tcp_recv(client->pcb, NULL); tcp_sent(client->pcb, NULL); // free pcb err_t err = tcp_close(client->pcb); if (err != ERR_OK) { client_log(client, BLOG_ERROR, "tcp_close failed (%d)", err); tcp_abort(client->pcb); } client_handle_freed_client(client); } void client_abort_client (struct tcp_client *client) { ASSERT(!client->client_closed) // remove callbacks tcp_err(client->pcb, NULL); tcp_recv(client->pcb, NULL); tcp_sent(client->pcb, NULL); // free pcb tcp_abort(client->pcb); client_handle_freed_client(client); } void client_free_socks (struct tcp_client *client) { ASSERT(!client->socks_closed) // stop sending to SOCKS if (client->socks_up) { // stop receiving from client if (!client->client_closed) { tcp_recv(client->pcb, NULL); } } // free SOCKS BSocksClient_Free(&client->socks_client); // set SOCKS closed client->socks_closed = 1; // if we have data to be sent to the client and we can send it, keep sending if (client->socks_up && (client->socks_recv_buf_used >= 0 || client->socks_recv_tcp_pending > 0) && !client->client_closed) { client_log(client, BLOG_INFO, "waiting until buffered data is sent to client"); } else { if (!client->client_closed) { client_free_client(client); } else { client_dealloc(client); } } } void client_murder (struct tcp_client *client) { // free client if (!client->client_closed) { // remove callbacks tcp_err(client->pcb, NULL); tcp_recv(client->pcb, NULL); tcp_sent(client->pcb, NULL); // abort tcp_abort(client->pcb); // kill client dead var DEAD_KILL(client->dead_client); // set client closed client->client_closed = 1; } // free SOCKS if (!client->socks_closed) { // free SOCKS BSocksClient_Free(&client->socks_client); // set SOCKS closed client->socks_closed = 1; } // dealloc entry client_dealloc(client); } void client_dealloc (struct tcp_client *client) { ASSERT(client->client_closed) ASSERT(client->socks_closed) // decrement counter ASSERT(num_clients > 0) num_clients--; // remove client entry LinkedList1_Remove(&tcp_clients, &client->list_node); // kill dead var DEAD_KILL(client->dead); // free memory free(client->socks_username); free(client); } void client_err_func (void *arg, err_t err) { struct tcp_client *client = (struct tcp_client *)arg; ASSERT(!client->client_closed) client_log(client, BLOG_INFO, "client_err_func client error (%d)", (int)err); // the pcb was taken care of by the caller client_handle_freed_client(client); } err_t client_recv_func (void *arg, struct tcp_pcb *tpcb, struct pbuf *p, err_t err) { struct tcp_client *client = (struct tcp_client *)arg; client_log(client, BLOG_INFO, "client_recv_func client received (%d)", sizeof(client->buf)); ASSERT(!client->client_closed) ASSERT(err == ERR_OK) // checked in lwIP source. Otherwise, I've no idea what should // be done with the pbuf in case of an error. if (!p) { client_log(client, BLOG_INFO, "client closed"); client_free_client(client); return ERR_ABRT; } ASSERT(p->tot_len > 0) // check if we have enough buffer if (p->tot_len > sizeof(client->buf) - client->buf_used) { client_log(client, BLOG_ERROR, "no buffer for data !?!"); return ERR_MEM; } // copy data to buffer ASSERT_EXECUTE(pbuf_copy_partial(p, client->buf + client->buf_used, p->tot_len, 0) == p->tot_len) client->buf_used += p->tot_len; // if there was nothing in the buffer before, and SOCKS is up, start send data if (client->buf_used == p->tot_len && client->socks_up) { ASSERT(!client->socks_closed) // this callback is removed when SOCKS is closed SYNC_DECL SYNC_FROMHERE client_send_to_socks(client); DEAD_ENTER(client->dead_client) SYNC_COMMIT DEAD_LEAVE2(client->dead_client) if (DEAD_KILLED) { return ERR_ABRT; } } // free pbuff pbuf_free(p); return ERR_OK; } void client_socks_handler (struct tcp_client *client, int event) { ASSERT(!client->socks_closed) #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_DEBUG, "tun2socks client_socks_handler event: %d", event); #endif switch (event) { case BSOCKSCLIENT_EVENT_ERROR: { client_log(client, BLOG_INFO, "SOCKS error"); client_free_socks(client); } break; case BSOCKSCLIENT_EVENT_UP: { ASSERT(!client->socks_up) client_log(client, BLOG_INFO, "tun2socks SOCKS up"); // init sending client->socks_send_if = BSocksClient_GetSendInterface(&client->socks_client); StreamPassInterface_Sender_Init(client->socks_send_if, (StreamPassInterface_handler_done)client_socks_send_handler_done, client); client_log(client, BLOG_INFO, "tun2socks SOCKS init 0"); // init receiving client->socks_recv_if = BSocksClient_GetRecvInterface(&client->socks_client); StreamRecvInterface_Receiver_Init(client->socks_recv_if, (StreamRecvInterface_handler_done)client_socks_recv_handler_done, client); client->socks_recv_buf_used = -1; client->socks_recv_tcp_pending = 0; client_log(client, BLOG_INFO, "tun2socks SOCKS init 1"); if (!client->client_closed) { client_log(client, BLOG_INFO, "tun2socks SOCKS init 2"); tcp_sent(client->pcb, client_sent_func); } client_log(client, BLOG_INFO, "tun2socks SOCKS init 3"); // set up client->socks_up = 1; // start sending data if there is any if (client->buf_used > 0) { client_log(client, BLOG_INFO, "tun2socks SOCKS init 4"); // client->buf_used = 0; client_send_to_socks(client); } client_log(client, BLOG_INFO, "tun2socks SOCKS init 5"); // start receiving data if client is still up if (!client->client_closed) { client_log(client, BLOG_INFO, "tun2socks SOCKS init 6"); client_socks_recv_initiate(client); } } break; case BSOCKSCLIENT_EVENT_ERROR_CLOSED: { ASSERT(client->socks_up) client_log(client, BLOG_INFO, "SOCKS closed"); client_free_socks(client); } break; default: ASSERT(0); } } void client_send_to_socks (struct tcp_client *client) { ASSERT(!client->socks_closed) ASSERT(client->socks_up) ASSERT(client->buf_used > 0) #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_DEBUG, "tun2socks client_send_to_socks data<len: %d>: %@", client->buf_used); #endif // schedule sending StreamPassInterface_Sender_Send(client->socks_send_if, client->buf, client->buf_used); } void client_socks_send_handler_done (struct tcp_client *client, int data_len) { ASSERT(!client->socks_closed) ASSERT(client->socks_up) ASSERT(client->buf_used > 0) ASSERT(data_len > 0) ASSERT(data_len <= client->buf_used) // remove sent data from buffer memmove(client->buf, client->buf + data_len, client->buf_used - data_len); client->buf_used -= data_len; if (!client->client_closed) { // confirm sent data tcp_recved(client->pcb, data_len); } if (client->buf_used > 0) { // send any further data StreamPassInterface_Sender_Send(client->socks_send_if, client->buf, client->buf_used); } else if (client->client_closed) { // client was closed we've sent everything we had buffered; we're done with it client_log(client, BLOG_INFO, "removing after client went down"); client_free_socks(client); } } void client_socks_recv_initiate (struct tcp_client *client) { ASSERT(!client->client_closed) ASSERT(!client->socks_closed) ASSERT(client->socks_up) ASSERT(client->socks_recv_buf_used == -1) StreamRecvInterface_Receiver_Recv(client->socks_recv_if, client->socks_recv_buf, sizeof(client->socks_recv_buf)); } void client_socks_recv_handler_done (struct tcp_client *client, int data_len) { ASSERT(data_len > 0) ASSERT(data_len <= sizeof(client->socks_recv_buf)) ASSERT(!client->socks_closed) ASSERT(client->socks_up) ASSERT(client->socks_recv_buf_used == -1) // if client was closed, stop receiving if (client->client_closed) { return; } // set amount of data in buffer client->socks_recv_buf_used = data_len; client->socks_recv_buf_sent = 0; client->socks_recv_waiting = 0; // send to client client_log(client, BLOG_INFO, "client_socks_recv_handler_done prepare send to client: %d", data_len); if (client_socks_recv_send_out(client) < 0) { client_log(client, BLOG_INFO, "client_socks_recv_send_out error"); return; } // continue receiving if needed if (client->socks_recv_buf_used == -1) { client_log(client, BLOG_INFO, "client_socks_recv_send_out continue receiving"); client_socks_recv_initiate(client); }else{ // client_socks_recv_initiate(client); client_log(client, BLOG_INFO, "client_socks_recv_send_out continue error"); } } int client_socks_recv_send_out (struct tcp_client *client) { ASSERT(!client->client_closed) ASSERT(client->socks_up) ASSERT(client->socks_recv_buf_used > 0) ASSERT(client->socks_recv_buf_sent < client->socks_recv_buf_used) ASSERT(!client->socks_recv_waiting) // return value -1 means tcp_abort() was done, // 0 means it wasn't and the client (pcb) is still up do { int to_write = bmin_int(client->socks_recv_buf_used - client->socks_recv_buf_sent, tcp_sndbuf(client->pcb)); #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out data<len: %d>", to_write); #endif if (to_write == 0) { #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out to_write zero, break"); #endif break; } err_t err = tcp_write(client->pcb, client->socks_recv_buf + client->socks_recv_buf_sent, to_write, TCP_WRITE_FLAG_COPY); #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out tcp write err: %d", err); #endif if (err != ERR_OK) { if (err == ERR_MEM) { #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out tcp write error error_mem"); #endif break; } #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tcp_write failed (%d)", (int)err); #endif client_abort_client(client); return -1; } client->socks_recv_buf_sent += to_write; client->socks_recv_tcp_pending += to_write; } while (client->socks_recv_buf_sent < client->socks_recv_buf_used); #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out begin tcp_output"); #endif // start sending now err_t err = tcp_output(client->pcb); #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tun2socks client_socks_recv_send_out begin tcp_output err: %d", err); #endif if (err != ERR_OK) { #if SOCKS_DATA_LOG_ENABLE client_log(client, BLOG_INFO, "tcp_output failed (%d)", (int)err); #endif client_abort_client(client); return -1; } // more data to queue? if (client->socks_recv_buf_sent < client->socks_recv_buf_used) { if (client->socks_recv_tcp_pending == 0) { client_log(client, BLOG_ERROR, "can't queue data, but all data was confirmed !?!"); client_abort_client(client); return -1; } // set waiting, continue in client_sent_func client->socks_recv_waiting = 1; return 0; } // everything was queued client->socks_recv_buf_used = -1; // client->socks_recv_buf_used = 0; return 0; } err_t client_sent_func (void *arg, struct tcp_pcb *tpcb, u16_t len) { struct tcp_client *client = (struct tcp_client *)arg; ASSERT(!client->client_closed) ASSERT(client->socks_up) ASSERT(len > 0) ASSERT(len <= client->socks_recv_tcp_pending) // decrement pending client->socks_recv_tcp_pending -= len; // continue queuing if (client->socks_recv_buf_used > 0) { ASSERT(client->socks_recv_waiting) ASSERT(client->socks_recv_buf_sent < client->socks_recv_buf_used) // set not waiting client->socks_recv_waiting = 0; // possibly send more data if (client_socks_recv_send_out(client) < 0) { return ERR_ABRT; } // we just queued some data, so it can't have been confirmed yet ASSERT(client->socks_recv_tcp_pending > 0) // continue receiving if needed if (client->socks_recv_buf_used == -1 && !client->socks_closed) { SYNC_DECL SYNC_FROMHERE client_socks_recv_initiate(client); DEAD_ENTER(client->dead_client) SYNC_COMMIT DEAD_LEAVE2(client->dead_client) if (DEAD_KILLED) { return ERR_ABRT; } } return ERR_OK; } // have we sent everything after SOCKS was closed? if (client->socks_closed && client->socks_recv_tcp_pending == 0) { client_log(client, BLOG_INFO, "removing after SOCKS went down"); client_free_client(client); return ERR_ABRT; } return ERR_OK; } void udpgw_client_handler_received (void *unused, BAddr local_addr, BAddr remote_addr, const uint8_t *data, int data_len) { ASSERT(options.udpgw_remote_server_addr) ASSERT(local_addr.type == BADDR_TYPE_IPV4 || local_addr.type == BADDR_TYPE_IPV6) ASSERT(local_addr.type == remote_addr.type) ASSERT(data_len >= 0) int packet_length = 0; switch (local_addr.type) { case BADDR_TYPE_IPV4: { #ifdef BADVPN_SOCKS_UDP_RELAY BLog(BLOG_INFO, "UDP: from udprelay %d bytes", data_len); #else BLog(BLOG_INFO, "UDP: from udpgw %d bytes", data_len); #endif if (data_len > UINT16_MAX - (sizeof(struct ipv4_header) + sizeof(struct udp_header)) || data_len > BTap_GetMTU(&device) - (int)(sizeof(struct ipv4_header) + sizeof(struct udp_header)) ) { BLog(BLOG_ERROR, "UDP: packet is too large"); return; } // build IP header struct ipv4_header iph; iph.version4_ihl4 = IPV4_MAKE_VERSION_IHL(sizeof(iph)); iph.ds = hton8(0); iph.total_length = hton16(sizeof(iph) + sizeof(struct udp_header) + data_len); iph.identification = hton16(0); iph.flags3_fragmentoffset13 = hton16(0); iph.ttl = hton8(64); iph.protocol = hton8(IPV4_PROTOCOL_UDP); iph.checksum = hton16(0); iph.source_address = remote_addr.ipv4.ip; iph.destination_address = local_addr.ipv4.ip; iph.checksum = ipv4_checksum(&iph, NULL, 0); // build UDP header struct udp_header udph; udph.source_port = remote_addr.ipv4.port; udph.dest_port = local_addr.ipv4.port; udph.length = hton16(sizeof(udph) + data_len); udph.checksum = hton16(0); udph.checksum = udp_checksum(&udph, data, data_len, iph.source_address, iph.destination_address); // write packet memcpy(device_write_buf, &iph, sizeof(iph)); memcpy(device_write_buf + sizeof(iph), &udph, sizeof(udph)); memcpy(device_write_buf + sizeof(iph) + sizeof(udph), data, data_len); packet_length = sizeof(iph) + sizeof(udph) + data_len; } break; case BADDR_TYPE_IPV6: { #ifdef BADVPN_SOCKS_UDP_RELAY BLog(BLOG_INFO, "UDP/IPv6: from udprelay %d bytes", data_len); #else BLog(BLOG_INFO, "UDP/IPv6: from udpgw %d bytes", data_len); #endif if (!options.netif_ip6addr) { #ifdef BADVPN_SOCKS_UDP_RELAY BLog(BLOG_ERROR, "got IPv6 packet from udprelay but IPv6 is disabled"); #else BLog(BLOG_ERROR, "got IPv6 packet from udpgw but IPv6 is disabled"); #endif return; } if (data_len > UINT16_MAX - sizeof(struct udp_header) || data_len > BTap_GetMTU(&device) - (int)(sizeof(struct ipv6_header) + sizeof(struct udp_header)) ) { BLog(BLOG_ERROR, "UDP/IPv6: packet is too large"); return; } // build IPv6 header struct ipv6_header iph; iph.version4_tc4 = hton8((6 << 4)); iph.tc4_fl4 = hton8(0); iph.fl = hton16(0); iph.payload_length = hton16(sizeof(struct udp_header) + data_len); iph.next_header = hton8(IPV6_NEXT_UDP); iph.hop_limit = hton8(64); memcpy(iph.source_address, remote_addr.ipv6.ip, 16); memcpy(iph.destination_address, local_addr.ipv6.ip, 16); // build UDP header struct udp_header udph; udph.source_port = remote_addr.ipv6.port; udph.dest_port = local_addr.ipv6.port; udph.length = hton16(sizeof(udph) + data_len); udph.checksum = hton16(0); udph.checksum = udp_ip6_checksum(&udph, data, data_len, iph.source_address, iph.destination_address); // write packet memcpy(device_write_buf, &iph, sizeof(iph)); memcpy(device_write_buf + sizeof(iph), &udph, sizeof(udph)); memcpy(device_write_buf + sizeof(iph) + sizeof(udph), data, data_len); packet_length = sizeof(iph) + sizeof(udph) + data_len; } break; } // submit packet BTap_Send(&device, device_write_buf, packet_length); }
Tim Minchin - not a performer known to play safe - has signed on for what may be his most ambitious project yet. The 38-year-old English-born and Perth-raised Minchin will be directing an animated musical comedy set in the Australian outback for Dreamworks. In the picture: Tim Minchin is to direct an animated Australian musical comedy. Credit:Angela Wylie A big fan of old-style Disney animated musicals - ''films like Beauty and the Beast and Aladdin, I love them'' - Minchin was bemoaning the fact no one was making that sort of thing any more over coffee with Will Davies, one of the writers of How To Train Your Dragon. ''And he said, 'Well you should just get Dreamworks to do a deal with you','' Minchin said. ''I had no idea what that meant at the time - now I know the studios do deals all the time, give you a bit of money to keep you close.''
Q: Studying the convergence I can't find a way to know the convergence of this series : $$\sum_{n=1}^{\infty }\frac{3^n-2^n}{4^n+3^nn}$$ I tried to resolve this limit : $$\lim_{n\to\infty}\sqrt[n]{\frac{3^n-2^n}{4^n+3^nn}}$$ but it was not that simple to resolve. Any help is appreciated. A: hint: $\dfrac{3^n-2^n}{4^n+3^n} < \left(\dfrac{3}{4}\right)^n$
CUSTOMIZATION SERVICEIf you need help editing this template or do not have access to the Adobe After Effects software, please use the form at the bottom right of the Profile PageRead more about this service hereSOME SCREENSHOTSMAIN FEATURESFULL HD (1920×1080)Adobe After Effects CS6 and aboveNo plugins needed!PDF Tutorial includedEasy and fast customizationReplace text, logo and icons45 Animated ElementsLength 0:45IMPORTANT NOTESThe music track is NOT included, but you can buy it hereFont you can download for free, link included in the help file Social business promotion is a clean and stylised business promotion template, helps you to create a complete project of infographic style..._1=search_item&amp;WT.z_author=Dirtyflint Please rate this project .:)Other Projects Add your social links to your WordPress site in seconds.How it worksChoose your social links from a wide ...Any questions? Feel free to contact us.Thanks for checking out My Social!Follow usFacebookTwitterInstagram Hello everyone i’m glad to present my new template! this is pack has apple style – clean an...// SwimTourist sitesSunseeker Manhattan 60Flying Over the Mountains in the WinterImages:MeetingFont:Franchise SOCIAL BUSINESS is a web application CMS (Content Management System) built in PHP based on MVC pattern (Model-View-Controller) written in OOP...track of the appointments they haveDEMO: http://demo-social-business.solutiisoft.com/LIVE: http://social-business.solutiisoft.com/
Introduction {#S1} ============ Signal transducer and activator of transcription 1 (STAT1) is activated in the inflammatory response to type I and II interferons (IFNs). Both types of IFNs induce tyrosine phosphorylation of STAT1 by the IFN receptor-associated Janus-activated kinase (JAK) 1, JAK2 and Tyk2 ([@R37]). Type I IFN (IFNα, IFNβ) induces the assembly of STAT1 in the ISGF3 complex with STAT2 and Irf9. With type II IFNγ stimulation, STAT1 forms homodimers, is imported into the nucleus and activates transcription of target genes with IFNγ-activated sites (GAS; TTTCCNGGAAA) ([@R20]; [@R37]). IFNγ/STAT1 target genes encode proteins that in large part promote inflammation and inhibition of growth ([@R6]; [@R37]). Receptor tyrosine kinases, such as the epidermal growth factor receptor (EGFR) and the platelet-derived growth factor receptor (PDGFR), have also been shown to directly or indirectly mediate tyrosine phosphorylation and thereby activation of STAT1 ([@R4]; [@R20]). In contrast to these inducible responses, STAT1 is constitutively activated in human breast and other types of tumors ([@R46]). The constitutive activation of STAT1 in malignant cells has been associated with the induction of prosurvival genes and suppression of the death response to ionizing radiation (IR) and other forms of stress ([@R11]; [@R12]). Based on these observations, an experimentally derived IFN-related DNA damage resistance gene signature (IRDS) that includes *STAT1* and STAT1 target genes was identified in association with resistance to IR and chemotherapy ([@R43]). Analysis of a breast cancer microarray database further demonstrated that the IRDS predicts for poor outcomes for breast cancer patients receiving adjuvant chemotherapy and for local-regional control after radiation ([@R43]). These findings have supported a role for STAT1 in regulating the response of human breast cancer cells to genotoxic stress. The mucin 1 (MUC1) oncoprotein is aberrantly overexpressed in human breast tumors ([@R17]). MUC1 consists of two subunits that, after cleavage of a single polypeptide, form a complex of an N-terminal mucin component (MUC1-N) and a transmembrane C-terminal (MUC1-C) subunit ([@R25]; [@R27]). MUC1-C functions as a cell membrane receptor that interacts with the ligand galectin-3 and associates with EGFR ([@R24]; [@R33]). The MUC1-C cytoplasmic domain (MUC1-CD) is a substrate for EGFR, c-Src, c-Abl and certain serine-threonine kinases ([@R21]; [@R22]; [@R24]; [@R32]; [@R36]). MUC1-C accumulates in the cytosol of breast cancer cells and is targeted to the nucleus, where it interacts with estrogen receptor α (ERα) and coactivates ERα target genes ([@R19]; [@R41]). MUC1-C also interacts with the p53 tumor suppressor and β-catenin, and contributes to regulation of p53- and Wnt/β-catenin-mediated transcription ([@R8]; [@R9]; [@R40]). Other studies have shown that MUC1-C is targeted to mitochondria and blocks stress-induced apoptosis ([@R34]; [@R35]; [@R44]; [@R45]). In concert with the involvement of MUC1-C in diverse pathways that have been linked to transformation, overexpression of MUC1-C, and specifically the MUC1-C cytoplasmic domain, in 3Y1 rat fibroblasts induces (i) an increase in growth rate, (ii) colony formation in soft agar, and (iii) tumorigenicity in nude mice ([@R8]; [@R23]). MUC1-CD also induces transcriptional programs that are highly predictive of clinical outcome for patients with breast cancer ([@R10]; [@R30]). These findings have indicated that MUC1-mediated transcriptional regulation contributes at least in part to the malignant phenotype in experimental models and in breast tumors. The present studies demonstrate that MUC1-induced transformation is linked to activation of the STAT1-induced gene network. The basis for this finding is supported by the demonstration that MUC1-C interacts directly with STAT1 and, in an autoinductive loop, MUC1 contributes to STAT1-mediated activation of the *MUC1* gene itself and of STAT1 target genes. We also show that coexpression of MUC1 and STAT1 is of importance to outcome for patients with breast cancer. Materials & Methods {#S2} =================== Cell culture {#S3} ------------ Rat 3Y1 fibroblasts transfected to stably express an empty vector (3Y1/vector; two clones A and B) or one expressing the MUC1-C cytoplasmic domain (3Y1/MUC1-CD; two clones A and B) were grown in vitro as described ([@R8]). The 3Y1/vector and 3Y1/MUC1-CD cells were treated with 20 ng/ml rat IFNγ (R&D Systems, Minneapolis, MN). Human ZR-75-1, ZR-75-1/vector and ZR-75-1/MUC1siRNA breast cancer cells ([@R34]) were grown in RPMI 1640 medium containing 10% heat-inactivated fetal bovine serum, 100 μg/ml streptomycin, 100 units/ml penicillin and 2 mM L-glutamine. Human MCF-10A breast epithelial cells were grown in mammary epithelial cell growth medium (MEGM; Lonza, Walkersville, MD) and treated with 20 ng/ml human IFNγ (R&D Systems). Transfection of MCF-10A cells with siRNA pools (Dharmacon, Lafayette, CO) was performed in the presence of Lipofectamine 2000 (Invitrogen, Carlsbad, CA). Cells were treated with the MUC1-C inhibitor GO-201 or the control CP-1 as described ([@R31]). Analysis of DNA microarrays {#S4} --------------------------- RNA purification and hybridization with GeneChip® Rat Genome 230 2.0 Arrays (Affymetrix, Santa Clara, CA) was performed as described ([@R14]). The selection and analysis of genes differentially expressed in 3Y1/vector and 3Y1/MUC1-CD cells in vitro was based on previously detailed approaches ([@R11]; [@R13]). 3Y1/MUC1-CD cells were grown subcutaneously in female athymic mice and the tumors were harvested for RNA extraction for analysis of gene expression as described ([@R10]; [@R30]). Briefly, each array was hybridized with a pooled sample normalized to total RNA and consisting of RNA obtained from 3 independent xenografts or cell lines. Data were normalized using "global median normalization" across the entire dataset ([@R14]) and filtrated using multi-step filtration ([@R11]). Subsequent analysis was based on pair-wise comparisons (3Y1/vector in vitro vs. 3Y1/MUC1-CD in vitro and 3Y1/MUC1-CD in vitro vs. 3Y1/MUC1-CD in vivo) of duplicated arrays using Significance Analysis of Microarrays (SAM) ([@R39]). Differentially-expressed probe set IDs were selected using a 2.0-fold induction cut-off level with a False Discovery Ratio set to 0. Selected probe set IDs were annotated and functionally designated using Ingenuity Pathways Analysis (IPA, Ingenuity Systems, Inc., Redwood City, CA, USA). Fisher's exact test was used to estimate the significance of functional networks within a given experimental dataset. This method estimates the likelihood that Network Eligible Molecules from an experimental dataset are linked in a specific network by random chance. A P-value ≤ 0.05 is considered significant and indicates a non-random enrichment of an experimental dataset by members of a specific functional network. Immunoprecipitation and immunoblotting {#S5} -------------------------------------- Lysates from sub-confluent cells were prepared as described ([@R34]). Soluble proteins were precipitated with anti-MUC1-C (Ab5; Lab Vision, Fremont, CA) or anti-STAT1 (Santa Cruz Biotechnology, Santa Cruz, CA). The precipitates and cell lysates were immunoblotted with anti-STAT1, anti-MUC1-C, anti-β-actin (Sigma, St. Louis, MO) and anti-IFITM1 (Proteintech Group, Chicago, IL). Immune complexes were detected with horseradish peroxidase-conjugated secondary antibodies and enhanced chemiluminescence (GE Healthcare Biosciences, Piscataway, NJ). In vitro binding assays {#S6} ----------------------- GST, GST-MUC1-CD, GST-MUC1-CD (1--45), GST-MUC1-CD (46--72) and GST-MUC1-CD (mSRM) were prepared as described ([@R2]; [@R8]) and incubated with purified recombinant STAT1. GST-STAT1 and certain GST-STAT1 deletion mutants were incubated with purified MUC1-CD that had been cleaved with thrombin to remove the GST moiety. Adsorbates to glutathione-conjugated beads were analyzed by immunoblotting. Real-time RT-PCR {#S7} ---------------- Total RNA was isolated from cells using the RNeasy isolation kit (Qiagen, Valencia, CA). Equal amounts of RNA were analyzed with the Superscript III platinum SYBER green one step qRT-PCR kit (Invitrogen, Carlsbad, CA) on an ABI 7900HT RT-PCR machine (Applied Biosystems, Foster City, CA). The human *HPRT* gene was used as the internal control. The enrichment value at time zero was employed as the reference to calculate the fold-changes. ChIP assays {#S8} ----------- Soluble chromatin was prepared as described ([@R41]) and precipitated with anti-STAT1, anti-MUC1-C, anti-STAT5 (Santa Cruz Biotechnology, Santa Cruz, CA) or a control non-immune IgG. The input chromatin lysate was 1% of that used for ChIP PCR (ChIP Protocol; Millipore, Billerica, MA). For re-ChIP assays, complexes from the primary ChIP were eluted with 10 mM DTT, diluted in re-ChIP buffer and reimmunoprecipitated with anti-MUC1-C. For PCR, 2 μl for a 50 μl DNA extraction was used with 25--35 cycles of amplification. Statistical analysis of breast cancer databases {#S9} ----------------------------------------------- Two publicly available databases were analyzed that contain breast tumor expressional data from 327 ([@R26]) and 155 ([@R3]) patients. All statistical analyses were performed using JMP 7.1 (SAS Institute Inc. Cary, NC, USA). The raw signal intensity for each probe set ID of interest for each patient was normalized to the average value of the probe set ID across the entire database and subsequently log~2~-transformed. Multiple probe set IDs for a given gene were averaged for each patient sample to obtain a representative expression value for each gene. Expression data were clustered using hierarchical clustering via Ward's method. To identify the genes that were differentially-expressed between the two patient clusters, F-tests were used to test the null hypothesis of equal variance for each gene between the two patient clusters. Results of the F-test (equal or unequal variance) were entered into an unpaired 2-tailed Student's t-test to test the null hypothesis of equal magnitude of gene expression of each gene between the two patient clusters. A gene expression score for the STAT1 pathway was determined for each patient sample by calculating the average log2 level of expression across the 24-gene STAT1 pathway. STAT1 pathway expression (STAT1P+) was defined as having a gene expression score greater than zero. MUC1 expression (MUC1+) was defined as having a log2 normalized expression value greater than zero. Survival analyses were performed using proportional hazards and Kaplan-Meier statistics with log-rank tests to test the null hypothesis of no difference in survival functions between patient clusters. Results {#S10} ======= Linkage of MUC1 and STAT1 in a functional gene network {#S11} ------------------------------------------------------ Stable transfection of 3Y1 cells with MUC1-CD is associated with transformation and the activation of genes that functionally contribute to tumorigenesis ([@R8]; [@R10]). In the present work, analysis of gene expression in 3Y1/MUC1-CD, as compared to 3Y1/vector, cells growing in vitro has identified activation of IFNγ-inducible/STAT1-dependent genes, including *STAT1* itself ([Fig. 1A](#F1){ref-type="fig"}, [Supplementary Tables 1 and 2](#SD1){ref-type="supplementary-material"}). Expression of the IFNγ/STAT1 genes was 2.15-fold higher in 3Y1/MUC1-CD, as compared to 3Y1/vector, cells (P=2.6e-3; two-tailed t-test across all genes). Moreover, growth of the 3Y1/MUC1-CD cells as tumors in nude mice, as compared to that in vitro, was associated with further activation (2.96-fold) of the IFNγ/STAT1 pathway genes ([Fig. 1B](#F1){ref-type="fig"}, [Supplementary Table 1](#SD1){ref-type="supplementary-material"}; P=1.2e-4). Whereas these results indicate that MUC1-CD expression is associated with activation of STAT1 signaling, we used Ingenuity Pathway Analysis (IPA) to assess linkage of the MUC1-CD and STAT1 pathways. IPA of genes differentially expressed in 3Y1/MUC1-CD cells growing in vivo identified a gene network containing MUC1 and STAT1 that is associated with cellular growth and inflammation ([Fig. 2A](#F2){ref-type="fig"}). As measured by Fisher's exact test, the linkage of MUC1 and STAT1 in this network was most significant of all that were analyzed at P=10e-45. This network complements the data in [Fig. 1](#F1){ref-type="fig"} by demonstrating that the linkage between MUC1 and STAT1 is associated with activation of IFNγ/STAT1 genes as well as a complex web of gene interactions related to growth and inflammation. For example, there appeared to be an association of both STAT1 and MUC1 with TGFβ in the gene network ([Fig. 2A](#F2){ref-type="fig"}); however, we were unable to identify significant changes in TGFβ expression. Nonetheless, analysis of other networks linking MUC1 and STAT1 identified additional upregulated genes, including *IFIT1* associated with cancer, the cell cycle and cell death (P=10e-25), *IFITM1* associated with lipid metabolism, small molecule biochemistry and molecular transport (P=10e-26), *IFI44L* associated with the cell cycle, cancer and cell death (P=10e-24), and *ISG15* associated with cancer, gastrointestinal disease, and cell growth and proliferation (P=10e-22). To further assess the effects of MUC1-CD on STAT1-mediated transcription, we stimulated the 3Y1/vector and 3Y1/MUC1-CD cells with IFNγ ([Fig. 2B](#F2){ref-type="fig"}). As determined by quantitative RT-PCR, expression of marker genes of the IFNγ/STAT1 pathway, including *IFIT1*, *IFITM1*, and *STAT1* itself, was upregulated by MUC1-CD, confirming that MUC1-CD contributes to STAT1-mediated transcription ([Fig. 2B](#F2){ref-type="fig"}). These results indicate that MUC1-CD-induced transformation and STAT1 pathway activation leads to the up-regulation of genes involved in diverse biological processes that contribute to tumorigenesis. MUC1-CD interacts directly with STAT1 {#S12} ------------------------------------- To determine whether MUC1-CD associates with STAT1, lysates from 3Y1/MUC1-CD cells were immunoprecipitated with an antibody against the MUC1 cytoplasmic domain or, as a control, with a non-immune IgG. Immunoblot analysis of the precipitates with anti-STAT1 demonstrated that MUC1-CD forms complexes with STAT1 ([Fig. 3A](#F3){ref-type="fig"}). Incubation of GST and GST-MUC1-CD with purified recombinant STAT1 further demonstrated that MUC1-CD binds directly to STAT1 ([Fig. 3B](#F3){ref-type="fig"}). To further define the region of MUC1-CD responsible for the interaction, we incubated MUC1-CD deletion mutants with STAT1. Binding to STAT1 was predominant with MUC1-CD (46--72), indicating that the C-terminal region of MUC1-CD confers the interaction ([Fig. 3B](#F3){ref-type="fig"}, left). In concert with these results, mutation of the serine-rich motif (SRM: SAGNGGSSLS to AAGNGGAAAA) in the MUC1-CD C-terminal region abrogated the interaction with STAT1 ([Fig. 3B](#F3){ref-type="fig"}, right). The structure of STAT1 includes a dimerization domain at the N-terminus, a central DNA binding domain (DBD) and C-terminal transactivation domain ([@R20]) ([Fig. 3C](#F3){ref-type="fig"}). Incubation of purified MUC1-CD with STAT1 deletion mutants demonstrated binding to the DBD and not the dimerization or transactivation domains ([Fig. 3C](#F3){ref-type="fig"}). These findings indicate that MUC1-CD associates with STAT1 in 3Y1/MUC1-CD cells through a direct interaction between these proteins. Interaction between MUC1-C and STAT1 is an IFNγ-inducible response in MCF-10A breast epithelial cells {#S13} ----------------------------------------------------------------------------------------------------- The non-malignant MCF-10A breast epithelial cells express endogenous MUC1 ([@R2]). As shown for human mammary epithelial cells ([@R18]), stimulation of MCF-10A cells with IFNγ was associated with marked upregulation of MUC1-C protein ([Fig. 4A](#F4){ref-type="fig"}, left). RT-PCR analysis of the IFNγ-treated MCF-10A cells further demonstrated increases in MUC1 mRNA levels, consistent with transcriptional activation ([Fig. 4A](#F4){ref-type="fig"}, right). Notably, there was little if any association between MUC1-C and STAT1 in unstimulated MCF-10A cells; however, IFNγ stimulation was associated with the detection of MUC1-C-STAT1 complexes ([Fig. 4B](#F4){ref-type="fig"}). To determine whether STAT1 is responsible for IFNγ-induced upregulation of MUC1 expression, the MCF-10A cells were transfected with control or STAT1 siRNA pools. As expected, induction of STAT1 expression by IFNγ was attenuated by the STAT1 siRNA ([Fig. 4C](#F4){ref-type="fig"}). Moreover, silencing STAT1 was associated with attenuation of IFNγ-induced expression of MUC1-C ([Fig. 4C](#F4){ref-type="fig"}). Based on the findings that MUC1-CD promotes IFNγ-induced expression of STAT1 in 3Y1 cells, MCF-10A cells were treated with the MUC1-C inhibitor, GO-201 ([@R31]), and then stimulated with IFNγ. Inhibiting MUC1-C function attenuated IFNγ-induced induction of MUC1-C expression, supporting a role for MUC1 in upregulating *MUC1* gene activation ([Fig. 4D](#F4){ref-type="fig"}). In addition and significantly, GO-201 treatment was associated with inhibition of IFNγ-induced expression of STAT1 ([Fig. 4D](#F4){ref-type="fig"}). Moreover, GO-201 inhibited induction of the IFN-induced transmembrane protein 1 (IFITM1), which is encoded by an IFNγ/STAT1 pathway target gene ([@R5]). By contrast, an inactive form of GO-201, designated CP-1 ([@R31]), had little effect ([Fig. 4D](#F4){ref-type="fig"}). To confirm these findings, MCF-10A cells were transfected with control or MUC1 siRNA pools as described ([@R1]) and then stimulated with IFNγ. Real-time RT-PCR analysis demonstrated that IFNγ-induced activation of *IFITM1* gene expression is blocked by silencing MUC1 ([Fig. 4E](#F4){ref-type="fig"}). These findings indicated that both STAT1 and MUC1 contribute to the induction of the *MUC1* gene and STAT1-dependent genes in the IFNγ response. MUC1-C-STAT1 complexes occupy the *MUC1* gene promoter {#S14} ------------------------------------------------------ To determine whether MUC1-C is detectable in the STAT1 transcription complex, ChIP analysis was performed on a consensus STAT binding motif (−503 to −495; TTCCGGGAA) in the *MUC1* promoter that has been documented as a STAT1 binding site ([@R7]). Precipitation of chromatin from MCF-10A cells with anti-STAT1 demonstrated a low level of STAT1 on the STAT binding site (SBS) ([Fig. 5A](#F5){ref-type="fig"}). By contrast, STAT1 occupancy was undetectable on a control region (CR; +4524 to +4745) ([Fig. 5A](#F5){ref-type="fig"}). Significantly, treatment with IFNγ was associated with an increase in STAT1 occupancy ([Fig. 5A](#F5){ref-type="fig"}). ChIP analysis also demonstrated that MUC1-C occupies the SBS in response to IFNγ stimulation ([Fig. 5B](#F5){ref-type="fig"}). Overexpression of endogenous MUC1 in ZR-75-1 breast cancer cells is associated with constitutive binding of MUC1-C and STAT1 ([Fig. 5C](#F5){ref-type="fig"}). ChIP analysis of the *MUC1* promoter in ZR-75-1/vector cells further demonstrated that STAT1 constitutively occupies the SBS and not the control region ([Fig. 5D](#F5){ref-type="fig"}). Moreover, re-ChIP studies confirmed that MUC1-C coprecipitates with STAT1 on the STAT binding site ([Fig. 5D](#F5){ref-type="fig"}). Notably, stable silencing of MUC1 in ZR-75-1/MUC1siRNA cells ([@R2]) resulted in decreased STAT1 occupancy of the SBS and, as expected, loss of MUC1-C in the re-ChIP ([Fig. 5D](#F5){ref-type="fig"}). In contrast to these results and as a control, there was no detectable STAT5 occupancy of the MUC1 promoter SBS in MCF-10A and ZR-75-1 cells ([Supplemental Fig. S1](#SD1){ref-type="supplementary-material"}). These findings demonstrate that MUC1-C associates with the STAT1 transcription complex and that MUC1-C contributes to STAT1 occupancy of the *MUC1* promoter. MUC1 associates with STAT1 pathway activation in poor prognosis human breast tumors {#S15} ----------------------------------------------------------------------------------- An expressional database representing 327 cases of breast cancer (80.1% ER+) ([@R26]) was analyzed to assess the clinical significance of MUC1 and STAT1 coexpression. We found that MUC1 and STAT1 were coexpressed in 13.8% (n=45) of the breast tumors ([Fig. 6A](#F6){ref-type="fig"}). STAT1 only was expressed in 17.7% of the tumors and MUC1 only expression was detected in 23.9%. Hierarchical clustering of the database based on expression of the STAT1 pathway (24 genes) ([@R11]; [@R43]) demonstrated differences in expression throughout the 327 breast tumors ([Fig. 6B](#F6){ref-type="fig"}). Importantly, STAT1 pathway expression was significantly (Fisher's exact test; P=0.0003) associated with coexpression of MUC1 ([Fig. 6B](#F6){ref-type="fig"}), indicating that MUC1 expression is associated with activation of the STAT1 pathway. Using Kaplan-Meier survival analysis, we found that patients with tumors coexpressing MUC1 (MUC1+) and the STAT1 pathway (STAT1P+) (n=49) had significantly reduced (log-rank P=0.036) recurrence-free survival compared to patients with tumors without coexpression (n=257) ([Fig. 6C](#F6){ref-type="fig"}). No differences in recurrence-free survival were found between MUC1−/STAT1P−, MUC1+/STAT1P−, or MUC1−/STAT1P+ patients (log-rank P\>0.05). Overall survival data are not available for this database. Also, coexpression of MUC1 and STAT1 was not significantly associated with ER status (Fisher's exact test; P=0.66). The breast cancer database ([@R26]) used for these studies does not provide information about ErbB2 expression, thus it was not possible to assess coexpression of MUC1 and STAT1 in triple-negative breast cancers. We also found that MUC1+/STAT1P+ status is not associated with presence of positive lymph nodes, high tumor grade (grade 2 and 3), or tumor size (Fisher's exact test; 0.23 ≤ P ≤ 0.66). Given that coexpression is not linked to these tumor parameters, we hypothesized that MUC1+/STAT1P+ status could enhance the identification of clinically aggressive tumors. In this regard, for patients with high grade tumors (grades 2 and 3), MUC1+/STAT1P+ status (n=32) significantly predicted (log-rank P=0.030) reduced recurrence-free survival compared to non-coexpressors (n=169) ([Fig. 6D](#F6){ref-type="fig"}). There were again no differences in recurrence-free survival among patients with MUC1−/STAT1P−, MUC1+/STAT1P−, or MUC1−/STAT1P+ (log-rank P\>0.05) high grade tumors. Analysis of an independent database of 155 breast cancers (94.8% ER+) ([@R3]) demonstrated coexpression of MUC1 and STAT1 in 16.1% ([Fig. 7A](#F7){ref-type="fig"}). The results also confirmed that expression of the STAT1 pathway across the 155 tumors was significantly associated with MUC1 expression (Fisher's exact test P\<0.0001; [Fig. 7B](#F7){ref-type="fig"}). Notably, patients with MUC1+/STAT1P+ tumors had a 7.38 fold-increased risk for recurrence (95% confidence interval (CI): 1.66--23.7; P=0.012) and a 4.10 fold-increased risk for death (95% CI: 1.55--9.11; P=0.0070) compared to non-coexpressors ([Fig. 7C](#F7){ref-type="fig"}). Furthermore, as found for the first database, grade 2 and 3 tumors with MUC1+/STAT1P+ status had significantly increased risks for recurrence (Hazard Ratio (HR)=6.21; 95% CI: 1.40--19.94; P=0.020) and death (HR=3.40; 95% CI: 1.28--7.57; P=0.017) compared to non-coexpressors ([Supplementary Table 3](#SD1){ref-type="supplementary-material"}). Taken together, these data demonstrate that MUC1 and STAT1 are coexpressed in breast tumors and that activation of the STAT1 pathway in association with MUC1 expression predicts reduced recurrence-free and overall survival in patients. Discussion {#S16} ========== MUC1 and STAT1 form a gene network {#S17} ---------------------------------- STAT1 is constitutively activated in breast and other types of cancer, although the functional significance of this response has been largely unknown ([@R46]). Indeed, STAT1 target genes in the non-malignant setting have been associated with inflammation, anti-proliferative effects and a tumor suppressor function ([@R37]). However, paradoxically, recent studies have shown that constitutive activation of the STAT1 pathway in malignant cells in vitro and in human breast tumors confers resistance to genotoxic anti-cancer agents ([@R11]; [@R12]; [@R43]). Notably, the overexpression of MUC1 in breast cancer cells confers resistance to DNA-damaging chemotherapeutic agents ([@R34]), suggesting that MUC1 and STAT1 may play similar roles. In the present work, analysis of 3Y1 cells transformed with MUC1-CD demonstrated upregulation of the *STAT1* gene and STAT1 target genes in vitro and in an animal xenograft model. Moreover, IFNγ-induced activation of the STAT1 pathway was increased by MUC1-CD expression, supporting a potential role for MUC1-CD in promoting STAT1-mediated transcription. By using Ingenuity Pathway Analysis to functionally classify genes differentially expressed in MUC1-CD-transformed cells, we confirmed a highly significant interaction between the MUC1 and STAT1 pathways. This network included a set of genes encoding proteins involved in the inflammatory response, consistent with that found for the IFNγ/STAT1 pathway. In contrast to induction of anti-proliferative genes by the IFNγ/STAT1 pathway in non-malignant cells, the MUC1 and STAT1 network associated with transformation also included genes that confer a proliferative response. These findings raised the possibility that the MUC1 and STAT1 proteins interact in the regulation of STAT1-mediated gene transcription. MUC1-C interacts directly with STAT1 in an auto-inductive loop {#S18} -------------------------------------------------------------- The MUC1-C transmembrane subunit is targeted to the nucleus of breast cancer cells where it interacts with ERα on estrogen-responsive promoters and contributes to the regulation of ERα-mediated transcription ([@R41]). MUC1-C has also been directly implicated in the regulation of other transcription factors, including p53 ([@R40]; [@R42]). The present studies demonstrate that MUC1-C associates with STAT1 as an IFNγ-inducible response in MCF-10A breast epithelial cells and constitutively in ZR-75-1 breast cancer cells. This interaction is mediated, at least in large part, by direct binding of the MUC1-CD C-terminal region and the STAT1 DBD. Significantly, mutation of the MUC1-CD serine-rich motif in the C-terminal region abrogated the interaction with STAT1 and, as reported, also blocks MUC1-CD-induced anchorage-independent growth and tumorigenicity of 3Y1 cells ([@R8]). In addition, little is known about proteins that interact with the STAT1 DBD ([@R38]). This region contains a functional nuclear export signal that interacts with CRM1 and confers leptomycin B-sensitive export of nuclear STAT1 that has undergone tyrosine dephosphorylation ([@R28]; [@R29]). The STAT1 DBD also contains two lysines that, when acetylated by the histone acetyltranferase CBP, promotes tyrosine dephosphorylation of STAT1 by TCP45 ([@R15]; [@R16]). Thus, binding of MUC1-C to the STAT1 DBD could affect interactions with CBP and/or TCP45 and prolong occupancy of STAT1 on its cognate responsive elements. In this regard, ChIP analysis demonstrated that both MUC1-C and STAT1 occupy the STAT binding site in the *MUC1* promoter. Moreover, silencing MUC1 was associated with decreased STAT1 occupancy of that site, indicating that MUC1-C may delay STAT1 latency. The demonstration that (i) MUC1-C promotes STAT1-mediated transcription of the *MUC1* gene, and (ii) downregulation of MUC1-C levels blocks induction of STAT1 and IFITM1 expression provided further support for the induction of an auto-inductive loop in which MUC1-C and STAT1 work cooperatively to activate expression of STAT1-dependent genes, including the *MUC1* gene itself ([Fig. 7C](#F7){ref-type="fig"}). The results also demonstrate that inhibition of MUC1-C function with GO-201 blocks IFNγ-induced activation of the STAT1 pathway. Notably, GO-201 induces complete regressions of human breast tumor xenografts in preclinical models and thus could confer these responses, at least in part, by downregulation of the STAT1 pathway ([@R31]). Based on these findings, STAT1 inhibitors could be effective in downregulating MUC1-C expression and thereby tumorigenicity. Whether the constitutive activation of a MUC1-STAT1 loop in breast cancer cells contributes to a function of STAT1 in promoting a more aggressive phenotype, as recently reported ([@R43]), was not known, and consequently was addressed using microarray databases from breast cancer patients treated with adjuvant therapy. Coexpression of MUC1 and the STAT1 pathway in human breast tumors confers a poor prognosis {#S19} ------------------------------------------------------------------------------------------ Stimulation of non-malignant MCF-10A breast epithelial cells with IFNγ was associated with STAT1-dependent induction of MUC1 expression, formation of MUC1-C-STAT1 complexes and occupancy of these complexes on the *MUC1* promoter. In contrast to this IFNγ inducible interaction, the association between MUC1-C and STAT1 and their occupancy of the *MUC1* promoter is constitutive in ZR-75-1 breast cancer cells, suggesting that activation of the MUC1 and STAT1 pathways may be present in primary breast tumors. Indeed, analysis of two breast cancer databases demonstrated coexpression of MUC1 and STAT1 in about 15% of tumors. Importantly, as determined by hierarchical clustering, MUC1 expression was significantly (P≤0.0003) associated with activation of the STAT1 pathway. The significance of this association is supported by the finding that patients with tumors coexpressing MUC1 and the STAT1 pathway had significantly increased risks for recurrence and death. Coexpression of MUC1 and the STAT1 pathway was not related to ER status, high tumor grades (2 and 3) or tumor size. However, risk of recurrence and death was significantly increased for patients with grade 2 and 3 tumors that coexpressed MUC1 and STAT1, supporting involvement of the interaction in clinically aggressive breast cancers. These findings support activation of the MUC1 and STAT1 pathways in conferring reduced recurrence-free and overall survival in breast cancer patients and suggest that MUC1-C and/or STAT1 inhibitors could be effective in treating this population. In this context, the epithelial cell barrier is exposed to diverse forms of stress, including inflammatory signals, and the MUC1-C receptor functions in transducing signals that protect epithelial cells from stress-induced death ([@R34]; [@R40]; [@R44]). Activation of MUC1 expression by a STAT1-dependent auto-inductive loop would appear to be an inducible response in non-malignant cells that is constitutively activated in certain breast cancers. Thus, what may represent a physiologic mechanism to protect the mammary epithelium from an IFNγ/STAT1-induced response could have been exploited by breast cancers to survive under adverse inflammatory conditions through a previously unrecognized STAT1 tumorigenic function. Supplementary Material {#S28} ====================== This work was supported by Grants CA97098 and CA111423 awarded by the National Cancer Institute. Dr. Kufe has an ownership interest in Genus Oncology and is a consultant to the company.The other authors disclosed no potential conflicts of interest. ![MUC1-CD activates transcription of STAT1 and STAT1-dependent genes\ A. 3Y1/vector (clones A and B) and 3Y1/MUC1-CD (clones A and B) cells growing in vitro were analyzed for expression of the indicated genes in the IFNγ/STAT1 pathway. B. 3Y1/MUC1-CD cells growing in vitro and as tumors in nude mice were analyzed for expression of the indicated IFNγ/STAT1 target genes. Values are in log2 scale and represent expression relative to the average value of the gene across samples.](nihms146476f1){#F1} ![Functional gene network analysis links MUC1 and STAT1\ A. Genes differentially expressed in 3Y1/MUC1-CD cells growing in vivo as compared to in vitro were analyzed using Ingenuity Pathway Analysis to identify functional networks. The gene network containing MUC1 and STAT1 as shown is associated with genes involved in cellular growth and inflammation. Red signifies up-regulation. Green signifies down-regulation. B. 3Y1/vector (open bars) and 3Y1/MUC1-CD (solid bars) were left untreated and treated with IFNγ for 24 h. Total RNA was analyzed by quantitative RT-PCR for expression of the indicated genes. The results are expressed as the fold-induction (mean±SD) for IFNγ-treated as compared to untreated cells. The differences between values obtained for the 3Y1/vector and 3Y1/MUC1-CD cells were significant at p values ranging from 0.035 to 0.00078.](nihms146476f2){#F2} ![MUC1-C interacts directly with STAT1\ A. Lysates from 3Y1/MUC1-CD cells were immunoprecipitated with anti-MUC1-C or a control IgG. The precipitates were immunoblotted with the indicated antibodies. B. Amino acid sequence of MUC1-CD and MUC1-CD (mSRM) (upper panel). GST, GST-MUC1-CD, GST-MUC1-CD (1--45) and GST-MUC1-CD (46--72) bound to glutathione beads were incubated with purified recombinant STAT1 (lower left). GST, GST-MUC1-CD and GST-MUC1-CD (mSRM) bound to gluthatione beads were incubated with recombinant STAT1 (lower right). The adsorbates were immunoblotted with anti-STAT1. Input of the GST and GST-MUC1-CD proteins was assessed by Coomassie blue staining. C. Structure of STAT1 (upper panel). GST, GST-STAT1 (full length; amino acids 1--750), GST-STAT1 (N-terminal; amino acids 1--324), GST-STAT1 (DBD; amino acids 295--491) and GST-STAT1 (C-terminal; amino acids 464--750) bound to glutathione beads were incubated with purified MUC1-CD. Adsorbates were immunoblotted with anti-MUC1-C. Input of GST and GST-STAT1 fusion proteins was assessed by Coomassie blue staining.](nihms146476f3){#F3} ![Induction of MUC1 by IFNγ in MCF-10A cells is conferred by both STAT1 and MUC1\ A. MCF-10A cells were treated with IFNγ for the indicated times. Lysates were immunoblotted with the indicated antibodies (left). MUC1 and, as a control, β-actin mRNA levels were determined by RT-PCR (right). B. MCF-10A cells left untreated or treated with IFNγ for 24 h were immunoprecitated with anti-STAT1. The precipitates were immunoblotted with the indicated antibodies. C. MCF-10A cells were transfected with control or STAT1 siRNA pools for 24 h and then left untreated or stimulated with IFNγ for 24. Lysates were immunoblotted with the indicated antibodies. D. MCF-10A cells were left untreated and treated with 5 μM GO-201 or CP-1 for 3 days and then stimulated with IFNγ for 24 h. Whole cell lysates were immunoblotted with the indicated antibodies. NS: non-specific band. E. MCF-10A cells were transfected with control or MUC1siRNA pools for 72 h. The transfected cells were left untreated or stimulated with IFNγ for 24 h. Total cellular RNA was analyzed for IFITM1 expression by real-time RT-PCR. The results are expressed as the fold activation (mean±SD from three experiments) compared with that obtained with cells transfected with the control siRNA and left untreated (assigned a value of 1).](nihms146476f4){#F4} ![MUC1-C associates with the STAT1 transcription complex\ A. Soluble chromatin from MCF-10A cells left untreated or treated with IFNγ for 24 h was immunoprecipitated with anti-STAT1. The final DNA extractions were amplified by PCR with pairs of primers that cover the STAT binding site (SBS; −689 to −414) and the control region (CR; +4524 to +4745) in the *MUC1* promoter. B. Soluble chromatin from MCF-10A cells left untreated or treated with IFNγ for 24 h was immunoprecipitated with anti-MUC1-C and analyzed for SBS and CR sequences. C. Lysates from ZR-75-1 cells were immunoprecipitated with anti-MUC1-C or a control IgG. The precipitates were immunoblotted with the indicated antibodies. D. Soluble chromatin from ZR-75-1/vector and ZR-75-1/MUC1siRNA cells was precipitated anti-STAT1 and analyzed for *MUC1* promoter SBS and CR sequences. In re-ChIP analysis, the anti-STAT1 precipitates were released, reimmunoprecipitated with anti-MUC1-C and then analyzed for *MUC1* promoter sequences.](nihms146476f5){#F5} ![Coexpression of MUC1 and the STAT1 pathway is associated with reduced recurrence-free survival\ A. An expressional database derived from 327 breast tumors was analyzed for expression of MUC1 (MUC1+) and STAT1 (STAT1+). Coexpression was detectable in 45 tumors (13.8%). Hierarchical clustering for expression of the STAT1 pathway (24 genes) was performed for the entire database. Relative expression values are in log2 scale. Activation of the STAT1 pathway (STAT1P+) was significantly associated with MUC1 expression (49 tumors; Fisher's exact test, P=0.0003). B. Kaplan-Meier curves for recurrence-free survival were determined for patients with MUC1+/STAT1P+ tumors (n=49; red curve) compared to those patients without coexpression (n=257; blue curve). C. Kaplan-Meier curves were determined for recurrence-free survival of patients with grade 2/3 tumors that are MUC1+/STAT1P+ (n=32; red curve) compared to those patients with grade 2/3 tumors without coexpression (n=169; blue curve).](nihms146476f6){#F6} ![STAT1 pathway activation linked to MUC1 expression is associated with increased risk of death\ A. An additional expressional database derived from 155 breast tumors was analyzed for expression of MUC1 (MUC1+) and STAT1 (STAT1+). Coexpression was detectable in 25 tumors (16.1%). Hierarchical clustering for expression of the STAT1 pathway (24 genes) was performed for the MUC1+ tumors. Relative expression values are in log2 scale. Activation of the STAT1 pathway (STAT1P+) was significantly associated with MUC1 expression (P\<0.0001). Genes having significantly increased expression in MUC1+ tumors are shown. B. Hazard ratios for recurrence-free and overall survival were determined for patients with MUC1+/STAT1P+ tumors (n=8) compared to those patients without coexpression (n=147) (left panel). Hazard ratios for recurrence-free and overall survival were determined for patients with grade 2/3 tumors that are MUC1+/STAT1P+ (n=8) compared to those patients with grade 2/3 tumors without coexpression (n=126) (right panel). C. Proposed schema for a MUC1-STAT1 autoinductive loop.](nihms146476f7){#F7} Gene Symbol Vector-A in vitro (log2) Vector-B in vitro (log2) MUC1-CD-A in vitro (log2) MUC1-CD-B in vitro (log2) MUC1-CD/Vector in vitro ------------- -------------------------- -------------------------- --------------------------- --------------------------- ------------------------- BST2 0.738 −0.235 −0.469 −0.396 0.623 CCNA1 0.499 −0.339 −0.062 −0.254 0.848 CXCL10 0.400 0.500 −0.634 −0.684 0.464 FLJ20035 −2.657 −2.089 0.773 0.924 9.327 G1P2 −0.488 0.168 0.193 0.029 1.207 HERC6 −0.825 −1.057 0.486 0.636 2.833 IFI27 0.029 −1.119 0.307 0.358 1.837 IFI35 0.824 −0.038 −0.701 −0.643 0.478 IFI44 −0.786 0.230 0.187 0.149 1.362 IFI44L 0.079 0.094 0.030 −0.226 0.880 IFIT1 −0.632 0.310 0.227 −0.082 1.176 IFIT4 −1.878 −2.108 0.663 0.936 6.925 IFITM1 −0.602 0.119 0.302 0.033 1.328 IRF7 −0.123 −0.155 0.163 0.089 1.202 LAMP3 −0.100 0.415 −0.318 −0.102 0.775 MCL1 −0.277 −0.053 0.041 0.241 1.236 MDA5 −0.070 −2.818 0.254 0.777 3.889 MX1 −1.247 −0.656 0.288 0.785 2.805 OAS1 −0.544 −0.818 0.496 0.419 2.202 PLSCR1 −0.810 −0.721 0.492 0.502 2.399 STAT1 −0.081 −0.312 0.144 0.110 1.251 Gene Symbol MUC1-CD-A in vitro (log2) MUC1-CD-B in vitro (log2) MUC1-CD-A in vivo (log2) MUC1-CD-B in vivo (log2) MUC1-CD in vitro/MUC1-CD in vivo ------------- --------------------------- --------------------------- -------------------------- -------------------------- ---------------------------------- *BST2* −0.798 −0.725 0.477 0.514 2.390 *CCNA1* −0.256 −0.448 0.445 0.095 1.539 *CXCL10* 0.065 0.015 −0.062 −0.021 0.945 *FLJ20035* −1.049 −0.897 0.449 0.691 2.914 *G1P2* −0.680 −0.844 0.500 0.490 2.391 *HERC6* −0.390 −0.240 0.341 0.168 1.484 *IFI27* 0.016 0.067 −0.081 −0.006 0.942 *IFI35* −0.056 0.001 0.035 0.018 1.038 *IFI44* −0.520 −0.558 0.404 0.379 1.906 *IFI44L* −1.692 −1.948 0.781 0.777 6.058 *IFIT1* −0.282 −0.591 0.350 0.309 1.700 *IFIT4* −1.243 −0.970 0.471 0.749 3.286 *IFITM1* −3.525 −3.794 1.008 0.872 24.242 *IRF7* −0.515 −0.589 0.371 0.425 1.931 *LAMP3* −0.294 −0.078 0.173 0.151 1.273 *MCL1* 0.110 0.310 −0.319 −0.186 0.726 *MDA5* −0.570 −0.047 0.235 0.241 1.460 *MX1* −1.036 −0.539 0.530 0.464 2.436 *OAS1* −0.091 −0.168 −0.002 0.230 1.184 *PLSCR1* 0.193 0.203 −0.270 −0.190 0.743 *STAT1* −0.366 −0.400 0.241 0.335 1.592 ###### Cox proportional hazard analysis of recurrence and death for MUC1-STAT1 pathway co-expression Cohort HR Recurrence-free survival 95% CI P HR Overall survival 95% CI P -------------------------- ------ --------------------------------- ------- ----- ------------------------- ------- Entire database (n=155) 7.38 1.66 -- 23.7 0.012 4.1 1.55 -- 9.11 0.007 Grade 2/3 tumors (n=134) 6.21 1.40 -- 19.94 0.02 3.4 1.28 -- 7.57 0.017 Hazard ratio, HR; Confidence interval, CI; P-value, P [^1]: Equal contribution [^2]: Equal contribution
<!DOCTYPE html> <html> <head> <meta http-equiv="content-type" content="text/html; charset=utf-8"/> <title></title> <link rel="Stylesheet" href="../css/analysis.css" /> <script type="text/javascript"> function init() { if (window.location.hash) { var parentDiv, nodes, i, helpInfo, helpId, helpInfoArr, helpEnvFilter, envContent, hideEnvClass, hideNodes; helpInfo = window.location.hash.substring(1); if(helpInfo.indexOf("-")) { helpInfoArr = helpInfo.split("-"); helpId = helpInfoArr[0]; helpEnvFilter = helpInfoArr[1]; } else { helpId = helpInfo; } parentDiv = document.getElementById("topics"); nodes = parentDiv.children; hideEnvClass = (helpEnvFilter === "OnlineOnly"? "PortalOnly": "OnlineOnly"); if(document.getElementsByClassName) { hideNodes = document.getElementsByClassName(hideEnvClass); } else { hideNodes = document.querySelectorAll(hideEnvClass); } for(i=0; i < nodes.length; i++) { if(nodes[i].id !== helpId) { nodes[i].style.display ="none"; } } for(i=0; i < hideNodes.length; i++) { hideNodes[i].style.display ="none"; } } } </script> </head> <body onload="init()"> <div id="topics"> <div id="toolDescription" class="smallsize"> <h2>Геокодирование адресов из таблицы</h2><p/> <h2><img src="../images/GUID-E4194410-7BBF-4349-98C9-22781D35183E-web.png" alt="Геокодирование адресов из таблицы"></h2> <hr/> <p>Геокодирование преобразует адресов в координаты. Этот инструмент конвертирует адреса из таблицы с большим объемом данных в векторный слой с координатами, записанными в новые столбцы. </p> </div> <!--Parameter divs for each param--> <div id="inputTable"> <div><h2>Выбор входной таблицы</h2></div> <hr/> <div> <p>Входная таблица с адресами для геокодирования. </p> </div> </div> <div id="geocodeServiceURL"> <div><h2>Выбор локатора</h2></div> <hr/> <div> <p>Выберите сервис локатора для геокодирования. Если сервис локатора, который вы хотите использовать, не находится в ниспадающем меню, свяжитесь с администратором, чтобы сервис локатора настроили для пакетного геокодирования. </p> </div> </div> <div id="sourceCountry"> <div><h2>Страна</h2></div> <hr/> <div> <p>Если все ваши адреса находятся в одной стране, выберите эту страну, чтобы обеспечить более точные результаты. В противном случае, оставьте этот параметр пустым. </p> </div> </div> <div id="geocodeParameters"> <div><h2>Выбор полей данных</h2></div> <hr/> <div> <p>Сервис локатора ищет определенные поля в данных, например, адрес, город, штат и почтовый индекс. Укажите, какие поля данных в вашем входном файле или таблице должны соответствовать каким полям для локатора, используя ниспадающие списки. Чем больше соответствий полей вы укажите, тем точнее будут ваши результаты. Если входная таблица содержит все данные в одном столбце, выберите <b>Одно поле</b> и выберите одно поле данных из ниспадающего меню. В другом случае выберите <b>Несколько полей</b> и укажите соответствие полей локатора и столбцов в вашей таблице. </p> </div> </div> <div id="includeAttributes"> <div><h2>Для каждого местоположения</h2></div> <hr/> <div> <p>Включить дополнительные поля, возвращенные сервисом локатора. Если эта опция включена, будут возвращены все поля, созданные локатором. Если опция отключена, входные данные будут возвращены с координатами геокодирования. </p> </div> </div> <div id="outputName"> <div><h2>Имя выходного результата</h2></div> <hr/> <div> <p> Имя создаваемого слоя. Если вы записываете в ArcGIS Data Store, ваши результаты будут сохранены в <b>Моих ресурсах</b> и добавлены на карту. Если вы записываете в файловое хранилище больших данных, ваши результаты будут сохранятся в файловом хранилище больших данных и добавляться в его файл манифеста. Они не будут добавлены на карту. Имя слоя по умолчанию зависит от имени инструмента и имени входного слоя. Если слой уже существует, произойдет сбой. </p> <p>При записи в ArcGIS Data Store (реляционное или пространственно-временное хранилище больших данных) с помощью ниспадающего списка поля <b>Сохранить результат в</b> вы можете задать имя папки в разделе <b>Мои ресурсы</b>, в которую будет записан результат. </p> </div> </div> </div> </html>
--TEST-- Bug #71996: Using references in arrays doesn't work like expected --SKIPIF-- <?php require_once('skipif.inc'); ?> --FILE-- <?php $client = new class(null, ['location' => '', 'uri' => 'http://example.org']) extends SoapClient { public function __doRequest($request, $location, $action, $version, $one_way = 0) { echo $request, "\n"; return ''; } }; $ref = array("foo"); $data = array(&$ref); $client->foo($data); $ref = array("def" => "foo"); $data = array("abc" => &$ref); $client->foo($data); ?> --EXPECT-- <?xml version="1.0" encoding="UTF-8"?> <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://example.org" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><ns1:foo><param0 SOAP-ENC:arrayType="SOAP-ENC:Array[1]" xsi:type="SOAP-ENC:Array"><item SOAP-ENC:arrayType="xsd:string[1]" xsi:type="SOAP-ENC:Array"><item xsi:type="xsd:string">foo</item></item></param0></ns1:foo></SOAP-ENV:Body></SOAP-ENV:Envelope> <?xml version="1.0" encoding="UTF-8"?> <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://example.org" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:ns2="http://xml.apache.org/xml-soap" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><ns1:foo><param0 xsi:type="ns2:Map"><item><key xsi:type="xsd:string">abc</key><value xsi:type="ns2:Map"><item><key xsi:type="xsd:string">def</key><value xsi:type="xsd:string">foo</value></item></value></item></param0></ns1:foo></SOAP-ENV:Body></SOAP-ENV:Envelope>
I'm not even religious, but i still think it's a polite gesture fuck me, right? 113,183 shares
Senate Zeroes in on Inflated Hepatitis-C Drug Cost MOST POPULAR Things are about to get very uncomfortable for Gilead Sciences, the California-based pharmaceuticals firm poised to rake in tens of billions of dollars over the coming decade on the sale of Sovaldi, a breakthrough drug to treat Hepatitis C. On Friday, the company was informed that it is under investigation by the powerful Senate Finance Committee, whose members are very interested in finding out why Gilead decided to more than double the price of the wildly expensive medication before it comes to market. “Given the impact Sovaldi’s cost will have on Medicare, Medicaid and other federal spending, we need a better understanding of how your company arrived at the price for this drug,” wrote Finance Committee Chairman Ron Wyden (D-OR) and Republican committee member Charles Grassley of Iowa in a letter to Gilead CEO John Martin. The Senators’ curiosity was sparked by the revelation of a striking change in the plan to market Sovaldi after Gilead acquired its creator, New Jersey based research firm Pharmasset, in 2012. In late 2011, Pharmasset filed documents with the Securities and Exchange Commission that contained a section discussing the billions of dollars per year the company expected to take in after Sovaldi hit the market at a price point of $36,000 per course of treatment. It was an expensive bit of medicine, but Sovaldi is also the only effective treatment for the various types Hepatitis C, and the company had invested many years and many millions of dollars in research and development. However, when Pharmasset’s new owner, Gilead, announced pricing for Sovaldi earlier this year, the estimated cost for a course of treatment was no longer the stunning $36,000, but an absolutely eye-popping $84,000. Noting, with considerable understatement, that “the price appears to be higher than expected,” Wyden and Grassley pointed out that the federal government would likely be far and away the biggest purchaser of Sovaldi, and has a financial interest in understanding the costs of the drug. Particularly given the fact that it will be sold in other countries around the world at a 99 percent discount to what U.S. consumers are charged, they noted, there appear to be “serious questions about the extent to which the market for this drug is operating efficiently and rationally.” “Sovaldi’s cost could dramatically increase federal spending in Medicare and other programs, including health care for prisoners with HCV,” Wyden and Grassley wrote. “According to a recent survey, over 1.8 million people with HCV are currently incarcerated. This represents nearly a third of the total cases of HCV in the U.S.” Despite its courteous tone the letter to Gilead reads more like a prosecuting attorney’s request for evidence than a polite inquiry about pharmaceutical price points. The eight-page document issues requests for 21 different categories of information, most of which are broken into various subcategories, and demands a rolling response beginning in 14 days, with a complete response expected in 60 days. And while Finance Committee representatives declined to say whether the committee views this as a major investigation, spokesman Ken Willis said, “Our investigation team has been working on it. The idea is to get the Senators all the information they need to understand the pricing.” Representatives of the health insurance industry – which would find itself on the hook for privately insured Hepatitis C patients, welcomed the Senators’ action. On Friday, Brendan Buck, vice president of Communications for America’s Health Insurance Plans said that he hopes this is just the beginning of an effort to shed light on how drug prices are set. “What you saw today is a very important start to a look at transparency in this arena,” Buck said. “Health plans, especially after the Affordable Care Act took effect, operate very transparently. There is very little transparency in drug pricing.” A longtime reporter on the intersection of the federal government and the private sector, Rob Garver served as a National Correspondent, based in Washington, D.C., for four years. He has written for ProPublica, The New York Times and other publications.
Tuesday, November 18, 2014 This weeks study group was given by Shan on assessing network security risk using Bayesian Belief Networks, following the paper of Kondakci titled "Network Security Risk Assessment Using Bayesian Belief Networks". The model developed can be applied to a variety of security evaluation tasks, risk assessment and other decision making systems. The most important thing to understand on this topic is exactly how Bayesian Belief Networks (BBN's)[1] work and how they can be used to calculate security risks caused by various threat sources. To achieve this understanding, we need to talk a little about conditional probability[2]. We know that given an event $A$, the probability of an event $B$ occurring is $$\mathrm{P}(B|A) = \frac{\mathrm{P}(B \cap A)}{\mathrm{P}(A)} $$ We can use this to consider an attack on two systems $A$ and $B$. Let us assume that the probability of an attack $\mathrm{P}(N)$ on either system is 0.1 (meaning the probability of no attack $\mathrm{P}(N')$ is 0.9). Let us also assume that the probability of system $A$ failing if there is an attack is 0.8 and if there isn't an attack 0.1. If there is an attack on system $B$ it fails with probability 0.6 and if no attack 0.5. From these values we can very easily calculate the chances of the various systems failing. The probability of A failing $\mathrm{P}(A)$ is calculated as follows $$\mathrm{P}(A) = \mathrm{P}(A|N)\mathrm{P}(N) + \mathrm{P}(A|N')\mathrm{P}(N') = 0.1$$ Similarly we can show the probability of B failing as 0.53. Using Bayes Theorem[3] the probability that an attack has occurred given that system A has failed can be calculated as $$\mathrm{P}(N|A) = \frac{ \mathrm{P}(A|N)\mathrm{P}(N) }{ \mathrm{P}(A)} = \frac{(0.8 * 0.1)}{0.17} = 0.47 $$ As you would expect, the observation that System A has failed has increased the probability that an attack has occurred. Let $M = N|A$ be the event of there being an attack given that $A$ has failed and $M' = N'|A$ the event of there not being an attack given that $A$ has failed. Using the law of total probability[4], the probability that system B has failed can be calculated as $$\mathrm{P}(B) = \mathrm{P}(B|M)\mathrm{P}(M) + \mathrm{P}(B|M')\mathrm{P}(M') = 0.55 $$ Again, observing that System $A$ has failed increases the probability that System $B$ has also failed. This simple example shows how Bayesian Belief Networks can be used to get a better understanding of the state of systems. As a real world example, consider mobile phone applications. If we know that an application has failed on a certain phone then we can calculate the failure risk on other phones. Obviously these models can easily increase in size and complexity, the hardest thing about this model is building the conditional probability table associated with the various systems involved, in our case, finding the values of $ \mathrm{P}(A|N)$ etc. These are built using historical data. Systems can be threatened by various types of threats, the first step is to create a directed acyclic graph (DAG)[5] showing all the relations involved in the system. This can then be converted into a BBN. This way we can combine certain threats into a joint impact parameter, for example we could have external threats as well as internal threats and within that we can have different types of internal threats for the system. The model presented is a clever, generic way of computing the risk of the various classifications of threats of IT systems and computing environments using conditional probability through Bayesian Belief Networks.
Last Saturday evening, the Jewish Museum in Berlin hosted a “debate” on a question that you could translate from German either as “Is Zionism part of Judaism?,” or, perhaps more sensibly, “Is Zionism part of Jewish identity/Jewishness?” Butler is also a well-known supporter of the BDS-movement that targets Israel with campaigns calling for boycotts, divestment and sanctions with the ultimate goal to delegitimize the Jewish state and pave the way for Israel’s dissolution in a bi-national “Isratine.” As I have pointed out previously, Butler’s support for the BDS movement means in practice that her political statements can be found on a website frequently criticized for antisemitic content and that she would refuse to lecture at Tel Aviv University, but be perfectly happy to visit Birzeit University, which has a well-earned reputation for fostering extremism and glorifying terrorism. Indeed, in the acknowledgements for her recent book, Butler mentions Birzeit University as one of the places where she “learned from students and faculty.” Hopefully, these students didn’t include those that attended a festive event on the university campus to honour the terrorists released last year in exchange for Gilad Shalit. While Butler thus helps to make the case that BDS really stands for “Bigoted Double Standards,” there is no question that “anti-Zionists” everywhere appreciate her academic celebrity status as the “reigning queen” of Queer Studies – which was only reinforced by the Adorno Prize – as a great asset. There is also no question that the Jewish Museum in Berlin was fully aware of the problematic political implications of Butler’s views. Yet, the organizers of the event apparently preferred a “debate” that excluded questions to which Butler obviously has no good answers. According to a report in the Jerusalem Post – which noted straightforwardly that this seems to have been “the first anti-Israel event held in the Jewish museum since its opening in 2001” – the organizers allowed only “written audience questions” and made clear that any questions on Butler’s widely criticized views about Hamas and Hezbollah would be ignored. But judging from media reports about the event, the audience had anyway come to cheer Butler – as one German newspaper put it: “The audience was dominated by the typical ‘Butler-Groupies’: people with an academic education between 20 and 30.” Butler’s debating partner, the liberal German Jewish professor Micha Brumlik, found apparently little favor with this audience, and his attempts to argue that Butler’s professed enthusiasm for a merely “cultural” Zionism were neither grounded in Jewish tradition nor realistic clearly made much less of an impression than Butler’s response that somebody had to stand up for utopian ideals. Indeed, several of the German language reports end by quoting Butler’s relevant remarks, and the Berliner Zeitung concludes by asserting that a utopian quality was after all an essential characteristic of philosophy. If we “translate” what Butler is saying here (noting that her new book includes reflections on “Ethics, Politics, and the Task of Translation”), it turns out that she simply wants to have her cake and eat it, too. On the one hand, we are supposed to appreciate that it is the core business of a philosopher to come up with noble utopian ideals that are above mundane criticisms questioning how realistic they are; on the other hand, Butler clearly wants her political views to be taken serious and lends her prestige as a philosopher to one of the most controversial causes of our time. The bottom line of Butler’s argument is that the most ethical resolution of the Arab conflict with Israel requires Jews to realize that Arabs and Muslims were right all along when they insisted that Israel has no right to exist as a Jewish state. Butler is obviously aware that with this view, she has a lot of really bad company, and she has taken to emphasizing her opposition to all forms of racism, including antisemitism. In the controversy about her nomination for the Adorno Prize, she also tried hard to market herself as a fearless fighter against the popular straw-man argument that anyone who dares to criticize Israeli policies risks being denounced as an antisemite. But the “debate” hosted by Berlin’s Jewish Museum illustrated once again that in a climate where it is regarded as legitimate to assert that it would only be ethical to do away with the Jewish state, antisemitism is never far away. Reporting on the event for the Jüdische Allgemeine, Fabian Wolff notes that the debate moderator Andreas Öhler limited himself mostly to telling a few stories about his Jewish and Israeli friends. At one point Öhler mentioned how amazed he was to realize that despite Israel’s policies, there were so many nice Israelis who were interested in culture and music… Without this background, it is hard to explain why Öhler should have been so amazed to discover that there are many really nice Israelis who love culture and music. It is noteworthy in this context that studies show that some “40% of Germans are critical of Israel in ways […] deemed anti-Semitic. The commission regarded anti-Israel critics as having crossed a line, for example, when they compared Israeli treatment of Palestinians with the Nazi extermination of Jews in death camps. Among the […] findings cited in the report: More than 41% of Germans believe Israel is conducting a war of extermination against the Palestinians.” In view of these findings, it is all the more dismaying that moderator Öhler reportedly opened the event with Judith Butler by declaring everyone’s resolve not to be frightened – meaning, presumably, not to be frightened of accusations of antisemitism in a “debate” intended to establish that Israel’s existence as a Jewish state violates crucial ethical norms. But in a country where some 40 percent of the population believes that when it comes to the Palestinians, Israel’s Jews are the Nazis of our time, there is actually plenty of reason to be frightened when the Jewish Museum decides to give out the message that, done properly, it is intellectually and ethically noble to “criticize” Israel for the evil of existing as a Jewish state. Your comment must be approved by a moderator before being published on JPost.com. Disqus users can post comments automatically. Comments must adhere to our Talkback policy. If you believe that a comment has breached the Talkback policy, please press the flag icon to bring it to the attention of our moderation team.
package snow.modules.interfaces; import snow.api.buffers.Uint8Array; import snow.api.Promise; import snow.systems.assets.Asset.AssetAudio; import snow.systems.audio.AudioSource; import snow.systems.audio.AudioInstance; import snow.types.Types; @:noCompletion @:allow(snow.systems.audio.Audio) interface Audio { private var app: snow.Snow; private var active: Bool; private function onevent(event:SystemEvent):Void; private function shutdown():Void; function data_from_load(_path:String, ?_is_stream:Bool=false, ?_format:AudioFormatType) : Promise; function data_from_bytes(_id:String, _bytes:Uint8Array, ?_format:AudioFormatType) : Promise; function play(_source:AudioSource, _volume:Float, _paused:Bool) : AudioHandle; function loop(_source:AudioSource, _volume:Float, _paused:Bool) : AudioHandle; function pause(_handle:AudioHandle) : Void; function unpause(_handle:AudioHandle) : Void; function stop(_handle:AudioHandle) : Void; function volume(_handle:AudioHandle, _volume:Float) : Void; function pan(_handle:AudioHandle, _pan:Float) : Void; function pitch(_handle:AudioHandle, _pitch:Float) : Void; function position(_handle:AudioHandle, _time:Float) : Void; function volume_of(_handle:AudioHandle) : Float; function pan_of(_handle:AudioHandle) : Float; function pitch_of(_handle:AudioHandle) : Float; function position_of(_handle:AudioHandle) : Float; function state_of(_handle:AudioHandle) : AudioState; function loop_of(_handle:AudioHandle) : Bool; function instance_of(_handle:AudioHandle) : AudioInstance; function suspend():Void; function resume():Void; } //Audio
Criteria: 1.)87% or higher occupancy supported by the current rent roll 2.)$1.5 million sale price or higher 3.)Past 2 years tax returns for property 4.)10% or higher Cap rate 5.)60 or more units 6.)Property area must not have higher unemployment 7.)Good management already in place 8.)Major #rehabilitation not needed 9.)Seller must be willing to sell at a discount or offer partial seller financing 10.)In the United States If you are a seller with apartments that fit this criteria contact Shantrece Marshall 678-632-6796 or email Show email Posted 05/24/12
David Sarnoff, 1964: "The computer will become the hub of a vast network of remote data stations and information banks feeding into the machine at a transmission rate of a billion or more bits of information a second. Laser channels will vastly increase both data capacity and the speeds with which it will be transmitted. Eventually, a global communications network handling voice, data and facsimile will instantly link man to machine--or machine to machine--by land, air, underwater, and space circuits. [The computer] will affect man's ways of thinking, his means of education, his relationship to his physical and social environment, and it will alter his ways of living... [Before the end of this century, these forces] will coalesce into what unquestionably will become the greatest adventure of the human mind."--from David Sarnoff by Eugene Lyons, 1966.
This is unequivocally a good thing. The Mets did not have a GCL team in 2012, and instead made due with Kingsport, in teh Appalachian League as their lowest-level domestic affiliate. Kingsport, suffered for it, finishing at 23-43, the second-worst record in the Appalachian League. More importantly, the players struggled. First year guys straight out of high school who were drafted in 2012 and players in their first year stateside after playing in the Dominican and Venezuela were jumped to Kingsport. The new collective bargaining agreement moved the deadline for players and teams to sign from August 15 to July 15, so more American guys will sign and play in the year they are drafted. Now, the high schoolers will have an appropriate team to play for. Also, with the high-ceiling high school guys playing in the GCL, there will now be more playing time for the more developed collegians, who might turn into org pieces in the Appy League. This was about correcting a mistake. Criticize the mistake (cutting the GCL team in 2012) if you would like, but make sure to recognize that the Mets have admitted their error and applaud that they fixed the problem for 2013.
Commercially available luminometers and imaging devices for low-light level measurements and kits and reagents utilizing bioluminescence or chemiluminescence: survey update 2. This survey was completed in December 1993 and includes products not covered in the luminometer survey (Jan 1992: Stanley PE, J Biolumin Chemilumin 1992; 7:77-108 and 7:157-69), kits and reagent survey (Nov 1992: Stanley PE, J Biolumin Chemilumin 1993; 8:51-63), update 1 (June 1993, luminometers, kits and reagents, Stanley PE, J Biolumin Chemilumin 1993; 8:237-40). Technical details are provided together with company address and contact information.
foible a behavioral attribute that is distinctive and peculiar to an individual When their new roommate sat staring at an oak tree for an hour, Marcia thought it indicated a mental problem, but Jeff assured her it was a harmless foible. When I bring up the latest Palin foible, my GOP co-workers ask me if I am afraid of Palin. His foible was his admiration for the poets, and his belief that he could write poetry and was a first-rate critic. Note that you can build your GRE vocabulary via Vocab Assistant app hosted in facebook messenger.
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import "C" import ( "os" "os/signal" "syscall" "time" ) // The channel used to read SIGIO signals. var sigioChan chan os.Signal // CatchSIGIO starts catching SIGIO signals. //export CatchSIGIO func CatchSIGIO() { sigioChan = make(chan os.Signal, 1) signal.Notify(sigioChan, syscall.SIGIO) } // ResetSIGIO stops catching SIGIO signals. //export ResetSIGIO func ResetSIGIO() { signal.Reset(syscall.SIGIO) } // SawSIGIO returns whether we saw a SIGIO within a brief pause. //export SawSIGIO func SawSIGIO() C.int { select { case <-sigioChan: return 1 case <-time.After(100 * time.Millisecond): return 0 } } // ProvokeSIGPIPE provokes a kernel-initiated SIGPIPE. //export ProvokeSIGPIPE func ProvokeSIGPIPE() { r, w, err := os.Pipe() if err != nil { panic(err) } r.Close() defer w.Close() w.Write([]byte("some data")) } func main() { }
Documents show Communities, Culture and Heritage Minister Leo Glavine relied on three different private email accounts while he was Nova Scotia’s health minister — the practice runs counter to government policy. The records were obtained through access to information and show Glavine and senior government staff used his private emails to communicate dozens of times within a three-month span in 2016. READ MORE: Nova Scotia refuses to release details on personal email use in government Privacy and access-to-information lawyer David Fraser called the use of private email troubling. “The business of government is important to everything we do,” he said. “To have the business of government taking place in the shadows or to have the business of government taking place intentionally to keep it outside of the public spotlight, I think that’s inherently problematic and should be condemned.” Story continues below advertisement The emails were sent to Glavine’s private accounts hosted by Rogers, Gmail and his MLA website. In an interview with Global News, Glavine maintained his use of private email for government work was “minimal” and that “99 per cent” of them went through his government account. “There was certainly only a small number that were ever on the Gmail,” Glavine said. Tweet This The province’s information and privacy commissioner, Catherine Tully, has repeatedly advised against the use of private emails by public officials. “The [Office of the Information and Privacy Commissioner)] strongly recommends that public bodies and municipalities prohibit their staff from using instant messaging tools and personal email accounts for doing business, unless they can be set up to retain and store records automatically,” she wrote in a 2016 report The report outlines security of personal information and ensuring all documents are available through access-to-information laws among the reasons for sticking with a government email. Asked if confidential or private information was ever relayed through his private email accounts, Glavine said, “No.” Story continues below advertisement An email sent to then-health minister Leo Glavine’s private email account was fully redacted before being publicly released. Marieke Walsh / Global News In some cases though, entire emails were redacted before they were released publicly to Global News. For example, one email chain that was started by government lawyer Donald Grant has its entire contents and subject line redacted citing “solicitor-client privilege,” “information that may have a detrimental financial impact to the public body,” and “advice by or for a public body or minister.” “There was nothing there of consequence,” Glavine said about the fully redacted email from Grant. “I regard confidential and personal information in the highest order.” Fraser said he’s “concerned” about the redactions because it means the information “inherently has a level of confidentiality.” “They’re essentially saying the public can’t see it,” Fraser said. Tweet This “Cabinet confidences and legal privilege are the two highest levels of legally recognized confidentiality that we have in Canada so it just causes me concern that that information has been outside of the protection of the government IT systems which are designed to protect it.” Story continues below advertisement In an emailed statement, ministry spokesperson Brian Taylor said, “A privacy breach occurs when information goes to a party to which it was not intended. The type of email account used does not factor into it. As such, there is no indication of a breach.” He did not explain how the government could know if there was a breach when it doesn’t have control of the email system used. READ MORE: Premier Stephen McNeil says he avoids email to avoid access to information requests Glavine said he was previously told to use government email for government work but said he had a “changeover of a new BlackBerry and I think while I was getting used to it, a couple of my email addresses got out, so there was a little bit of slippage in that regard.” Some emails show that Glavine had a signature at the bottom of his emails advising people that he had switched from a Rogers account to a Gmail account. It reads: “Please note my email address has changed to LGlavineMLA@gmail.com, I will no longer be using lglavine@rogers.blackberry.net.” Asked if the use of his private email accounts for government work was appropriate, Glavine said: “Look, I was told to change and I changed.” Cabinet Minister Leo Glavine says his use of three private email accounts for government work was “minimal.”. Marieke Walsh / Global News The reminder to only use government email for ministerial work came last summer after Global News first reported on the issue. In July, one example of it was uncovered in an unrelated access-to-information request. That email didn’t contain sensitive information. Story continues below advertisement But the documents obtained in the February release show 18 email threads where some content was redacted. Some of them appear to cover planning for events and the names of reporters, but others appear less trivial. Areas where the emails were heavily censored include a conversation about “mental-health care” where almost the entire email is redacted citing “unreasonable invasion of personal privacy.” The same reason was used to redact another email that appears to be talking about a case raised with Glavine by Liberal MLA Gordon Wilson. Most of the emails sent to his private email were sent by his executive assistant Peter Bragg and Rachel Boomer, who at the time was the department’s senior communications adviser. However, in that three-month window, other bureaucrats also emailed Glavine including Deputy Minister for Seniors Simon d’Entremont. The government has refused to search Glavine’s private email accounts in access-to-information requests. This information request was granted because it searched for Glavine’s private email addresses in the email accounts of Bragg and Boomer. It turned up 47 emails in the narrow time period of March 1, 2016, to May 31, 2016. Glavine was the health minister from 2013 to 2017. Taylor did not directly answer whether private email addresses are still being used for government business. But he said in an email that “all Ministers have been reminded of their obligations related to record keeping responsibility and the importance of using government email addresses to conduct government business.” Story continues below advertisement The information and privacy commissioner has previously said that private emails are subject to access laws, but the government has not compelled searches of Glavine’s private email accounts when access requests were made. Glavine said that’s not why he used private emails. “That’s not a method of practice that I would engage in to circumvent anything,” Glavine said.
Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings. The sun fired off its strongest solar flare of the year Tuesday, though the massive sun storm should not post a major concern for Earth, space weather experts say. The powerful X3.3 solar flare peaked at 5:12 p.m. EST on Tuesday from the sunspot AR1890. NASA's Solar Dynamics Orbiter captured high-definition video of the X-class solar flare as it erupted from the sun. The material ejected from the solar flare will probably not create issues on Earth, space weather officials said. "No geomagnetic disturbance is expected from this event," National Weather Service Space Weather Prediction Center officials wrote in an update Wednesday. "However, Region 1890 remains potent and well-positioned, so keep tabs of activity here." [Major X-Class Solar Flares of 2013 (Photos)] X-class solar flares are considered the most powerful kinds of solar storms, and when aimed directly at Earth, they can pose a danger to satellites and astronauts in orbit. The sun is currently in the peak of its 11-year Solar Cycle 24 and unleashed several smaller X-class solar flares in late October. Let our news meet your inbox. The news and stories that matters, delivered weekday mornings. This site is protected by recaptcha NASA's Solar Dynamics Observatory captured this image of the powerful X-class solar flare erupting from the sun on Tuesday. NASA / SDO The most powerful flare before Tuesday's event was an X3.2 flare in May during a hyperactive week for the sun, which included one day that saw the sun fire off three major flares. An X2 flare is twice as intense as an X1, and an X3 flare is three times as intense, according to NASA. "Increased numbers of flares are quite common at the moment as the sun's normal 11-year activity cycle is ramping up toward solar maximum conditions," NASA officials wrote in an update today. While no major disruptions are expected from Tuesday's flare, the Earth will not remain completely untouched. The strong solar event caused a radio blackout, and the flare did cause a "magnetic crochet" — a disturbance in Earth's magnetic field as a flare is still in progress, astronomer Tony Phillips wrote in a update on Spaceweather.com, a website that tracks space weather and skywatching events. A magnetic crochet is a rare cosmic sight that usually occurs during fast flares, Phillips added. Unlike coronal mass ejections, which affect Earth's magnetic field only after a flare subsides, a magnetic crochet perturbed the field during the ongoing flare, he explained. More flares might be on the heels of this one. "More eruptions are in the offing," Phillips wrote in his Spaceweather.com update. "NOAA (National Oceanographic and Atmospheric Administration) forecasters estimate a 45 percent chance of M-class solar flares and a 10 percent chance of X-flares on Nov. 6." NASA and space agencies around the world keep a close eye on the sun, looking out for potentially hazardous space weather with spacecraft such as the Solar Dynamics Observatory. Scientists have tracked space weather incidents since 1843. Follow Miriam Kramer @mirikramerand Google+. Follow us @Spacedotcom, Facebook and Google+. Original article on Space.com.
Hash runner goes missing at Kemensah Hill Businessman and regular hash runner Jagjit Singh has gone missing since Friday (18 May 2018) evening after a routine run at Kemensah Hill in Ampang, Selangor. At 8pm today, more than 24 hours after he was last seen by fellow runners, the search and rescue efforts have not yielded any results. “It’s dark now and all the search team members have come out. Some of them are going into the jungle on bikes,” one of the search volunteers told Asia Samachar. “The search efforts will continue in the morning.” It is understood that Jagjit, known to fellow has runners as Zig Zag, had broken away from his group mid-way. Hash runners involved in the search and rescue efforts today have urged fellow hash runners to join the efforts as they regroup tomorrow (20 May) at 7am. The point person is Gopal @ Dynamite (019366894). Location: The Reserve Puncak Kayangan Kemensah. [ASIA SAMACHAR is an online newspaper for Sikhs in Southeast Asia and surrounding countries. We have a Facebook page, do give it a LIKE. Follow us on Twitter. Visit our website: www.asiasamachar.com] POPULAR CATEGORY Asia Samachar is an independent news portal for Sikhs in Southeast Asia. We are present in Malaysia, Singapore, Thailand and Indonesia. We also have also reported on Myanmar, Hong Kong, Australia and New Zealand.
Effect of anesthetics containing lidocaine and epinephrine on cardiovascular changes during dental implant surgery. The purpose of this study was to evaluate cardiovascular changes during dental implant surgery using 2% lidocaine with 1:80 000 epinephrine. Eleven normotensive subjects, ranging from 18 to 56 years, were selected to undergo dental implant surgery in the jaw. They were monitored in the pre-, intra-, and postsurgical periods by continuous noninvasive automatic arterial pressure and cardiac frequency measurements taken every 2 minutes. Parameter scores were obtained for the following phases: P1, 15 minutes during preparation of the patient (control period); P2, before anesthesia; P3, immediately after anesthesia; P4, 2 minutes into anesthesia; P5, during incision and detachment; P6, during perforation; P7, during implant placement; P8, during suturing; P9, on completion; and P10, 10 minutes after termination. Individualized statistical analysis for each group during the pre-, intra-, and postoperative periods were performed by analysis of variance. The greatest variations in systolic pressure were increases of 2.29% during phase P2 and 2.59% in phase P5. Diastolic pressure decreased during phase P6 (-2.58%) and increased in P10 (3.27%). The greatest changes in heart rate occurred in phase P10 (-3.24%). There were no statistically significant changes among the evaluated phases (P > .05). In conclusion, there were no changes in the analyzed cardiocirculatory parameters during dental implant surgery (systolic, diastolic, and mean arterial blood pressures and heart rate) in normotensive subjects anesthetized with 2% lidocaine with epinephrine 1:80000.
Brain natriuretic peptides as biomarkers for atherosclerosis. Identification of atherosclerotic risk factors provides targets for development of preventive therapies. Risk factor assessment permits evaluation of an individual's prospective risk of coronary heart disease (CHD). However, it has become apparent that traditional risk factors may not predict CHD in some patients. As a result, many individuals do not receive the benefit of intensive preventive strategies. Accordingly, considerable effort has focused on the identification of novel biomarkers to enhance risk stratification. Given its prognostic utility in heart failure and acute coronary syndrome, brain natriuretic peptide (BNP) and its amino-terminal fragment have received interest as possible biomarkers for CHD.
New evidence that global warming fuels stronger Atlantic hurricanes MADISON -- Atmospheric scientists have uncovered fresh evidence to support the hotly debated theory that global warming has contributed to the emergence of stronger hurricanes in the Atlantic Ocean. The unsettling trend is confined to the Atlantic, however, and does not hold up in any of the world's other oceans, researchers have also found. Scientists at the University of Wisconsin-Madison and the National Climatic Data Center (NCDC) of the National Oceanic and Atmospheric Administration reported the finding in the journal Geophysical Research Letters. The work should help resolve some of the controversy that has swirled around two prominent studies that drew connections last year between global warming and the onset of increasingly intense hurricanes. "The debate is not about scientific methods, but instead centers around the quality of hurricane data," says lead author James Kossin, a research scientist at UW-Madison's Cooperative Institute for Meteorological Satellite Studies. "So we thought, 'Lets take the first step toward resolving this debate.'" The inconsistent nature of hurricane data has been a sore spot within the hurricane research community for decades. Before the advent of weather satellites, scientists were forced to rely on scattered ship reports and sailor logs to stay abreast of storm conditions. The advent of weather satellites during the 1960s dramatically improved the situation, but the technology has changed so rapidly that newer satellite records are barely consistent with older ones. Kossin and his colleagues realized they needed to smooth out the data before exploring any interplay between warmer temperatures and hurricane activity. Working with an existing NCDC archive that holds global satellite information for the years 1983 through 2005, the researchers evened out the numbers by essentially simplifying newer satellite information to align it with older records. "This new dataset is unlike anything that's been done before," says Kossin. "It's going to serve a purpose as being the only globally consistent dataset around. The caveat of course, is that it only goes back to 1983." Even so, it's a good start. Once the NCDC researchers recalibrated the hurricane figures, Kossin took a fresh look at how the new numbers on hurricane strength correlate with records on warming ocean temperatures, a side effect of global warming. What he found both supported and contradicted previous findings. "The data says that the Atlantic has been trending upwards in hurricane intensity quite a bit," says Kossin. "But the trends appear to be inflated or spurious everywhere else, meaning that we still can't make any global statements." Sea-surface temperatures may be one reason why greenhouse gases are exacting a unique toll on the Atlantic Ocean, says Kossin. Hurricanes need temperatures of around 27 degrees Celsius (81 degrees Fahrenheit) to gather steam. On average, the Atlantic's surface is slightly colder than that but other oceans, such as the Western Pacific, are naturally much warmer. "The average conditions in the Atlantic at any given time are just on the cusp of what it takes for a hurricane to form," says Kossin. " So it might be that imposing only a small (man-made) change in conditions, creates a much better chance of having a hurricane." The Atlantic is also unique in that all the physical variables that converge to form hurricanes -- including wind speeds, wind directions and temperatures -- mysteriously feed off each other in ways that only make conditions more ripe for a storm. But scientists don't really understand why, Kossin adds. "While we can see a correlation between global warming and hurricane strength, we still need to understand exactly why the Atlantic is reacting to warmer temperatures in this way, and that is much more difficult to do," says Kossin. "We need to be creating models and simulations to understand what is really happening here. From here on, that is what we should be thinking about." ### The work was funded by the National Science Foundation. Co-authors Daniel Vimont, a UW-Madison atmospheric scientist, Ken Knapp, a scientist at the NCDC, and Richard Murnane, a scientist at the Bermuda Institute of Ocean Sciences, also contributed to the study. Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.
AsiaObscura.com presents A Trip to Beijing World Park – May 7th! Why go all the way to Badaling when the Great Wall is right here in Beijing? Join AsiaObscura.com, as we spend a day exploring the eccentricities of Beijing World Park (北京世界公园), the city’s quirkiest amusement park. Experience the skyscrapers of Manhattan, the pyramids of Cairo, and even the Taj Mahal of Agra, just outside the 4th Ring Road! Plus, take photos in bizarrely-selected international costumes, ride the terrors of the North Pole, and even experience the thrill of a full-size Russian passenger plane! We’re not experts, we’re not officials, and we’re certainly not tour guides, but we are going to have fun.
Melamine in Chinese milk products and consumer confidence. Chinese consumers were shocked to learn in September 2008 that melamine, a chemical used in plastics, had been found in domestic dairy products and many people, especially young children, were experiencing adverse health impacts including death. A survey of consumers in four districts of Hohhot, Inner Mongolia, near where the two largest dairy companies in China are located, was conducted in November 2008. Findings reveal that consumption of fluid milk, yogurt, milk powder and ice cream, and perceptions of the safety of these products, which had plummeted in the days following the contamination announcement, had recovered strongly by the time of the survey. High proportions of respondents expressed high or moderate levels of confidence in the domestic dairy industry and generally were satisfied with corrective and remedial actions taken by the two large Hohhot-based companies, though there was less satisfaction for actions taken by companies located in other parts of the country.
Q: How to avoid breaks before sections/enumeration? I have found a nice template on the Internet, and wanted to hack around it. I have no TEX experience; this is the second time I am using it. My problem is, essentially, TEX figures out one of the sections wouldn't fit to the page, so it breaks the page, and moves the section to the next page. I don't want that; I'd like it to continue to the next page. In my example, I'd like "Bar" section to follow the "Foo" section immediately in the first page, then split/break the part of Bar that wouldn't fit to the first page to the second page. I have searched many times with several keywords, but couldn't find an easy to understand solution. I have tried nobottomtitles*, but that didn't help. Maybe sections would flow nicely, but lists don't want to break. I tried to preprocess the file, hoping to find a break around the boxes, but that didn't give any information either. I'd be very happy, if you could help me resolve the issue. I'm sorry, if I picked the wrong tags. \documentclass[10pt,a4paper]{article} \usepackage[english]{babel} \usepackage{blindtext} \usepackage[nobottomtitles*,compact]{titlesec} \usepackage{array} \titleformat{\section}{\Large\scshape\raggedright}{}{0em}{}[\titlerule] \titlespacing{\section}{0pt}{3pt}{3pt} \titleformat{\subsection}[hang]{\normalsize\scshape\raggedright}{\quad}{0em}{} \titlespacing*{\subsection}{0pt}{0pt}{0pt} \renewcommand{\bottomtitlespace}{0pt} \newcolumntype{L}[1] {>{\raggedright\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{C}[1] {>{\centering\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{R}[1] {>{\raggedleft\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \begin{document} \pagestyle{empty} \section{Foo} \begin{tabular}{R{1.86cm}|p{11cm}} & \blindlist{enumerate}[17] \\ & \end{tabular} \section{Bar} \begin{tabular}{R{1.86cm}|p{11cm}} & \blindlist{enumerate}[8] \\ & \end{tabular} \end{document} A: Without the tabular making an unbreakable box, lists break like normal pargraph text. \documentclass[10pt,a4paper]{article} \usepackage[english]{babel} \usepackage{blindtext} \usepackage[nobottomtitles*,compact]{titlesec} \usepackage{array} \titleformat{\section}{\Large\scshape\raggedright}{}{0em}{}[\titlerule] \titlespacing{\section}{0pt}{3pt}{3pt} \titleformat{\subsection}[hang]{\normalsize\scshape\raggedright}{\quad}{0em}{} \titlespacing*{\subsection}{0pt}{0pt}{0pt} \renewcommand{\bottomtitlespace}{0pt} \newcolumntype{L}[1] {>{\raggedright\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{C}[1] {>{\centering\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{R}[1] {>{\raggedleft\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \begin{document} \pagestyle{empty} \section{Foo} \blindlist{enumerate}[17] \section{Bar} \blindlist{enumerate}[8] \end{document} If you really need a tabular layout (which doesn't seem to be the case here) you can use longtable \documentclass[10pt,a4paper]{article} \usepackage[english]{babel} \usepackage{blindtext} \usepackage[nobottomtitles*,compact]{titlesec} \usepackage{array,longtable} \titleformat{\section}{\Large\scshape\raggedright}{}{0em}{}[\titlerule] \titlespacing{\section}{0pt}{3pt}{3pt} \titleformat{\subsection}[hang]{\normalsize\scshape\raggedright}{\quad}{0em}{} \titlespacing*{\subsection}{0pt}{0pt}{0pt} \renewcommand{\bottomtitlespace}{0pt} \newcolumntype{L}[1] {>{\raggedright\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{C}[1] {>{\centering\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \newcolumntype{R}[1] {>{\raggedleft\let\newline\\\arraybackslash\hspace{0pt}}m{#1}} \begin{document} \pagestyle{empty} % just for the test so \blindlist generates table rows \section{Foo} \begin{longtable}{R{1.86cm}|p{9cm}} & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\ \end{longtable} \section{Bar} \begin{longtable}{R{1.86cm}|p{9cm}} & some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\ & some text\\& some text\\& some text\\& some text\\ \end{longtable} \end{document}
Capture useful info about your SQL Server dbs The server goes down and you are scrambling to remember settings, file names, locations, etc. about your databases on that server. This script captures that useful information before a serious problem occurs. I run it as an OSQL (ISQL) job and send the output file to my backup folder so the infomation goes to tape each night. Very useful in a recovery scenario.
body { display: flex; font-size: 18px; line-height: 1.5; font-family: Cambria, Palatino Linotype, Palatino, Liberation Serif, serif; padding: 0; margin: 0; color: #111; } #spec-container { padding: 0 20px; flex-grow: 1; flex-basis: 66%; box-sizing: border-box; overflow: hidden; } body.oldtoc { margin: 0 auto; } a { text-decoration: none; color: #206ca7; } a:visited { color: #206ca7; } a:hover { text-decoration: underline; color: #239dee; } code { font-weight: bold; font-family: Consolas, Monaco, monospace; white-space: pre; } pre code { font-weight: inherit; } pre code.hljs { background-color: #fff; margin: 0; padding: 0; } ol.toc { list-style: none; padding-left: 0; } ol.toc ol.toc { padding-left: 2ex; list-style: none; } var { color: #2aa198; transition: background-color 0.25s ease; cursor: pointer; } var.referenced { background-color: #ffff33; } emu-const { font-family: sans-serif; } emu-val { font-weight: bold; } emu-alg ol, emu-alg ol ol ol ol { list-style-type: decimal; } emu-alg ol ol, emu-alg ol ol ol ol ol { list-style-type: lower-alpha; } emu-alg ol ol ol, ol ol ol ol ol ol { list-style-type: lower-roman; } emu-eqn { display: block; margin-left: 4em; } emu-eqn.inline { display: inline; margin: 0; } emu-eqn div:first-child { margin-left: -2em; } emu-note { margin: 1em 0; color: #666; border-left: 5px solid #ccc; display: flex; flex-direction: row; } emu-note > span.note { flex-basis: 100px; min-width: 100px; flex-grow: 0; flex-shrink: 1; text-transform: uppercase; padding-left: 5px; } emu-note[type=editor] { border-left-color: #faa; } emu-note > div.note-contents { flex-grow: 1; flex-shrink: 1; } emu-note > div.note-contents > p:first-of-type { margin-top: 0; } emu-note > div.note-contents > p:last-of-type { margin-bottom: 0; } emu-figure { display: block; } emu-example { display: block; margin: 1em 3em; } emu-example figure figcaption { margin-top: 0.5em; text-align: left; } emu-figure figure, emu-example figure, emu-table figure { display: flex; flex-direction: column; align-items: center; } emu-production { display: block; margin-top: 1em; margin-bottom: 1em; margin-left: 5ex; } emu-grammar.inline, emu-production.inline, emu-grammar.inline emu-production emu-rhs, emu-production.inline emu-rhs, emu-grammar[collapsed] emu-production emu-rhs, emu-production[collapsed] emu-rhs { display: inline; padding-left: 1ex; margin-left: 0; } emu-grammar[collapsed] emu-production, emu-production[collapsed] { margin: 0; } emu-constraints { font-size: .75em; margin-right: 1ex; } emu-gann { margin-right: 1ex; } emu-gann emu-t:last-child, emu-gann emu-nt:last-child { margin-right: 0; } emu-geq { margin-left: 1ex; font-weight: bold; } emu-oneof { font-weight: bold; margin-left: 1ex; } emu-nt { display: inline-block; font-style: italic; white-space: nowrap; text-indent: 0; } emu-nt a, emu-nt a:visited { color: #333; } emu-rhs emu-nt { margin-right: 1ex; } emu-t { display: inline-block; font-family: monospace; font-weight: bold; white-space: nowrap; text-indent: 0; } emu-production emu-t { margin-right: 1ex; } emu-rhs { display: block; padding-left: 75px; text-indent: -25px; } emu-mods { font-size: .85em; vertical-align: sub; font-style: normal; font-weight: normal; } emu-production[collapsed] emu-mods { display: none; } emu-params, emu-opt { margin-right: 1ex; font-family: monospace; } emu-params, emu-constraints { color: #2aa198; } emu-opt { color: #b58900; } emu-gprose { font-size: 0.9em; font-family: Helvetica, Arial, sans-serif; } h1.shortname { color: #f60; font-size: 1.5em; margin: 0; } h1.version { color: #f60; font-size: 1.5em; margin: 0; } h1.title { margin-top: 0; color: #f60; } h1.first { margin-top: 0; } h1, h2, h3, h4, h5, h6 { position: relative; } h1 .secnum { text-decoration: none; margin-right: 10px; } h1 span.title { order: 2; } h1 { font-size: 2.67em; margin-top: 2em; margin-bottom: 0; line-height: 1em;} h2 { font-size: 2em; } h3 { font-size: 1.56em; } h4 { font-size: 1.25em; } h5 { font-size: 1.11em; } h6 { font-size: 1em; } h1:hover span.utils { display: block; } span.utils { font-size: 18px; line-height: 18px; display: none; position: absolute; top: 100%; left: 0; right: 0; font-weight: normal; } span.utils:before { content: "⤷"; display: inline-block; padding: 0 5px; } span.utils > * { display: inline-block; margin-right: 20px; } h1 span.utils span.anchor a, h2 span.utils span.anchor a, h3 span.utils span.anchor a, h4 span.utils span.anchor a, h5 span.utils span.anchor a, h6 span.utils span.anchor a { text-decoration: none; font-variant: small-caps; } h1 span.utils span.anchor a:hover, h2 span.utils span.anchor a:hover, h3 span.utils span.anchor a:hover, h4 span.utils span.anchor a:hover, h5 span.utils span.anchor a:hover, h6 span.utils span.anchor a:hover { color: #333; } emu-intro h1, emu-clause h1, emu-annex h1 { font-size: 2em; } emu-intro h2, emu-clause h2, emu-annex h2 { font-size: 1.56em; } emu-intro h3, emu-clause h3, emu-annex h3 { font-size: 1.25em; } emu-intro h4, emu-clause h4, emu-annex h4 { font-size: 1.11em; } emu-intro h5, emu-clause h5, emu-annex h5 { font-size: 1em; } emu-intro h6, emu-clause h6, emu-annex h6 { font-size: 0.9em; } emu-intro emu-intro h1, emu-clause emu-clause h1, emu-annex emu-annex h1 { font-size: 1.56em; } emu-intro emu-intro h2, emu-clause emu-clause h2, emu-annex emu-annex h2 { font-size: 1.25em; } emu-intro emu-intro h3, emu-clause emu-clause h3, emu-annex emu-annex h3 { font-size: 1.11em; } emu-intro emu-intro h4, emu-clause emu-clause h4, emu-annex emu-annex h4 { font-size: 1em; } emu-intro emu-intro h5, emu-clause emu-clause h5, emu-annex emu-annex h5 { font-size: 0.9em; } emu-intro emu-intro emu-intro h1, emu-clause emu-clause emu-clause h1, emu-annex emu-annex emu-annex h1 { font-size: 1.25em; } emu-intro emu-intro emu-intro h2, emu-clause emu-clause emu-clause h2, emu-annex emu-annex emu-annex h2 { font-size: 1.11em; } emu-intro emu-intro emu-intro h3, emu-clause emu-clause emu-clause h3, emu-annex emu-annex emu-annex h3 { font-size: 1em; } emu-intro emu-intro emu-intro h4, emu-clause emu-clause emu-clause h4, emu-annex emu-annex emu-annex h4 { font-size: 0.9em; } emu-intro emu-intro emu-intro emu-intro h1, emu-clause emu-clause emu-clause emu-clause h1, emu-annex emu-annex emu-annex emu-annex h1 { font-size: 1.11em; } emu-intro emu-intro emu-intro emu-intro h2, emu-clause emu-clause emu-clause emu-clause h2, emu-annex emu-annex emu-annex emu-annex h2 { font-size: 1em; } emu-intro emu-intro emu-intro emu-intro h3, emu-clause emu-clause emu-clause emu-clause h3, emu-annex emu-annex emu-annex emu-annex h3 { font-size: 0.9em; } emu-intro emu-intro emu-intro emu-intro emu-intro h1, emu-clause emu-clause emu-clause emu-clause emu-clause h1, emu-annex emu-annex emu-annex emu-annex emu-annex h1 { font-size: 1em; } emu-intro emu-intro emu-intro emu-intro emu-intro h2, emu-clause emu-clause emu-clause emu-clause emu-clause h2, emu-annex emu-annex emu-annex emu-annex emu-annex h2 { font-size: 0.9em; } emu-intro emu-intro emu-intro emu-intro emu-intro emu-intro h1, emu-clause emu-clause emu-clause emu-clause emu-clause emu-clause h1, emu-annex emu-annex emu-annex emu-annex emu-annex emu-annex h1 { font-size: 0.9em } emu-clause, emu-intro, emu-annex { display: block; } /* Figures and tables */ figure { display: block; margin: 1em 0 3em 0; } figure object { display: block; margin: 0 auto; } figure table.real-table { margin: 0 auto; } figure figcaption { display: block; color: #555555; font-weight: bold; text-align: center; } emu-table table { margin: 0 auto; } emu-table table, table.real-table { border-collapse: collapse; } emu-table td, emu-table th, table.real-table td, table.real-table th { border: 1px solid black; padding: 0.4em; vertical-align: baseline; } emu-table th, emu-table thead td, table.real-table th { background-color: #eeeeee; } /* Note: the left content edges of table.lightweight-table >tbody >tr >td and div.display line up. */ table.lightweight-table { border-collapse: collapse; margin: 0 0 0 1.5em; } table.lightweight-table td, table.lightweight-table th { border: none; padding: 0 0.5em; vertical-align: baseline; } /* diff styles */ ins { background-color: #e0f8e0; text-decoration: none; border-bottom: 1px solid #396; } del { background-color: #fee; } ins.block, del.block, emu-production > ins, emu-production > del, emu-grammar > ins, emu-grammar > del { display: block; } tr.ins > td > ins { border-bottom: none; } tr.ins > td { background-color: #e0f8e0; } tr.del > td { background-color: #fee; } /* Menu Styles */ #menu-toggle { font-size: 2em; position: fixed; top: 0; left: 0; width: 1.5em; height: 1.5em; z-index: 3; visibility: hidden; color: #1567a2; background-color: #fff; line-height: 1.5em; text-align: center; -webkit-touch-callout: none; -webkit-user-select: none; -khtml-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none;; cursor: pointer; } #menu { display: flex; flex-direction: column; width: 33%; height: 100vh; max-width: 500px; box-sizing: border-box; background-color: #ddd; overflow: hidden; transition: opacity 0.1s linear; padding: 0 5px; position: fixed; left: 0; top: 0; border-right: 2px solid #bbb; z-index: 2; } #menu-spacer { flex-basis: 33%; max-width: 500px; flex-grow: 0; flex-shrink: 0; } #menu a { color: #1567a2; } #menu.active { display: flex; opacity: 1; z-index: 2; } #menu-pins { flex-grow: 1; display: none; } #menu-pins.active { display: block; } #menu-pins-list { margin: 0; padding: 0; counter-reset: pins-counter; } #menu-pins-list > li:before { content: counter(pins-counter); counter-increment: pins-counter; display: inline-block; width: 25px; text-align: center; border: 1px solid #bbb; padding: 2px; margin: 4px; box-sizing: border-box; line-height: 1em; background-color: #ccc; border-radius: 4px; } #menu-toc > ol { padding: 0; flex-grow: 1; } #menu-toc > ol li { padding: 0; } #menu-toc > ol , #menu-toc > ol ol { list-style-type: none; margin: 0; padding: 0; } #menu-toc > ol ol { padding-left: 0.75em; } #menu-toc li { text-overflow: ellipsis; overflow: hidden; white-space: nowrap; } #menu-toc .item-toggle { display: inline-block; transform: rotate(-45deg) translate(-5px, -5px); transition: transform 0.1s ease; text-align: center; width: 20px; color: #aab; -webkit-touch-callout: none; -webkit-user-select: none; -khtml-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none;; cursor: pointer; } #menu-toc .item-toggle-none { display: inline-block; width: 20px; } #menu-toc li.active > .item-toggle { transform: rotate(45deg) translate(-5px, -5px); } #menu-toc li > ol { display: none; } #menu-toc li.active > ol { display: block; } #menu-toc li.revealed > a { background-color: #bbb; font-weight: bold; /* background-color: #222; color: #c6d8e4; */ } #menu-toc li.revealed-leaf> a { color: #206ca7; /* background-color: #222; color: #c6d8e4; */ } #menu-toc li.revealed > .item-toggle { transform: rotate(45deg) translate(-5px, -5px); } #menu-toc li.revealed > ol { display: block; } #menu-toc li > a { padding: 2px 5px; } #menu > * { margin-bottom: 5px; } .menu-pane-header { padding: 0 5px; text-transform: uppercase; background-color: #aaa; color: #335; font-weight: bold; letter-spacing: 2px; flex-grow: 0; flex-shrink: 0; font-size: 0.8em; } #menu-toc { display: flex; flex-direction: column; width: 100%; overflow: hidden; flex-grow: 1; } #menu-toc ol.toc { overflow-x: hidden; overflow-y: auto; } #menu-search { position: relative; flex-grow: 0; flex-shrink: 0; width: 100%; display: flex; flex-direction: column; max-height: 300px; } #menu-trace-list { display: none; } #menu-search-box { box-sizing: border-box; display: block; width: 100%; margin: 5px 0 0 0; font-size: 1em; padding: 2px; background-color: #bbb; border: 1px solid #999; } #menu-search-results { overflow-x: hidden; overflow-y: auto; } li.menu-search-result-clause:before { content: 'clause'; width: 40px; display: inline-block; text-align: right; padding-right: 1ex; color: #666; font-size: 75%; } li.menu-search-result-op:before { content: 'op'; width: 40px; display: inline-block; text-align: right; padding-right: 1ex; color: #666; font-size: 75%; } li.menu-search-result-prod:before { content: 'prod'; width: 40px; display: inline-block; text-align: right; padding-right: 1ex; color: #666; font-size: 75% } li.menu-search-result-term:before { content: 'term'; width: 40px; display: inline-block; text-align: right; padding-right: 1ex; color: #666; font-size: 75% } #menu-search-results ul { padding: 0 5px; margin: 0; } #menu-search-results li { white-space: nowrap; text-overflow: ellipsis; } #menu-trace-list { counter-reset: item; margin: 0 0 0 20px; padding: 0; } #menu-trace-list li { display: block; white-space: nowrap; } #menu-trace-list li .secnum:after { content: " "; } #menu-trace-list li:before { content: counter(item) " "; background-color: #222; counter-increment: item; color: #999; width: 20px; height: 20px; line-height: 20px; display: inline-block; text-align: center; margin: 2px 4px 2px 0; } @media (max-width: 1000px) { body { margin: 0; display: block; } #menu { display: none; padding-top: 3em; width: 450px; } #menu.active { position: fixed; height: 100%; left: 0; top: 0; right: 300px; } #menu-toggle { visibility: visible; } #spec-container { padding: 0 5px; } #references-pane-spacer { display: none; } } @media only screen and (max-width: 800px) { #menu { width: 100%; } h1 .secnum:empty { margin: 0; padding: 0; } } /* Toolbox */ .toolbox { position: absolute; background: #ddd; border: 1px solid #aaa; display: none; color: #eee; padding: 5px; border-radius: 3px; } .toolbox.active { display: inline-block; } .toolbox a { text-decoration: none; padding: 0 5px; } .toolbox a:hover { text-decoration: underline; } .toolbox:after, .toolbox:before { top: 100%; left: 15px; border: solid transparent; content: " "; height: 0; width: 0; position: absolute; pointer-events: none; } .toolbox:after { border-color: rgba(0, 0, 0, 0); border-top-color: #ddd; border-width: 10px; margin-left: -10px; } .toolbox:before { border-color: rgba(204, 204, 204, 0); border-top-color: #aaa; border-width: 12px; margin-left: -12px; } #references-pane-container { position: fixed; bottom: 0; left: 0; right: 0; height: 250px; display: none; background-color: #ddd; z-index: 1; } #references-pane-table-container { overflow-x: hidden; overflow-y: auto; } #references-pane-spacer { flex-basis: 33%; max-width: 500px; } #references-pane { flex-grow: 1; overflow: hidden; display: flex; flex-direction: column; } #references-pane-container.active { display: flex; } #references-pane-close:after { content: '✖'; float: right; cursor: pointer; } #references-pane table tr td:first-child { text-align: right; padding-right: 5px; }