text
stringlengths
8
8.84M
25201 S STATE LINE Road, Cleveland, MO 64734 Custom built estate designed for efficiency and comfort. 5 outbuildings, 4 ponds, creek and a workshop with heated floors and wireless internet. Lwr lvl has non-conforming 5th bedrm, full bth and full 2nd kitchen! Entire home constructed of insulated, reinforced concrete producing a high thermal mass. Hydronic radiant heat in the floors. Wall footings anchored to bedrock with French drains. Fiberglass framed doors and windows. Exterior walls have embedded color which never requires painting. Low maint metal roof! Price History Houses for Sale Nearby This advertisement does not suggest that the broker has a listing or has done a transaction in this property or properties, nor does it suggest, directly or indirectly that the advertising broker was involved in the transaction.
Correlation of subclinical HPV infection with genital warts and cervical erosion. To investigate the correlation of subclinical human papillomavirus (HPV) infection (SPI) with genital warts and cervical erosion. The questionnaire was firstly conducted in experimental groups (genital warts + cervical erosion), and then cervical liquid-based cytology was performed, followed by colposcopy and pathological diagnosis. In the control group, cervical liquid-based cytology and pathological diagnosis were performed. Hybrid Capture 2 assay (HC2) was conducted to detect the cervical high-risk HPV DNA. The positive rate of cervical SPI in experimental groups were significantly higher than control group (p < 0.01), and in the genital warts group it was significantly higher than cervical erosion group (p < 0.05). There was no significant difference of SPI positive rate for cervical erosion with different area and degree (p > 0.05). Compared to control group, the detection rates of cervical high-risk HPV DNA in the experimental groups significantly increased (p < 0.01), and the difference between vulvar condyloma and cervical erosion groups was not statistically significant (p < 0.05). The detection rate of high-risk HPV DNA in positive SPI cases was significantly higher than negative SPI cases. Women with genital warts and cervical erosion are high-risk individuals for cervical cancer, and deserve a focused initial and follow-up management.
Contact us Southeast Texas Personal Injury Attorneys Beaumont – Silsbee Our Southeast Texas law firm is dedicated to helping seriously injured people recover payment for their injuries, medical expenses, and other costs of an accident caused by negligence or misconduct. We also help families grieving over the loss of a loved one in a fatal accident. Since 1957, we have committed ourselves to helping Southeast Texans with personal injury and wrongful death claims. Let us put that experience to work for you. To speak with an attorney at Waldman Smallwood, P.C., call 1-800-833-9151 or complete the form below. Learn how we can guide you through the legal process. Personal Information Name* Email* Phone State Contact Preference How would you prefer to be contacted? Email Phone How can we help you? Briefly describe your legal issue. Please enter the characters you see into the field below. * The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. Free Case Evaluation YOUR NAME* YOUR EMAIL YOUR PHONE NUMBER BRIEF DESCRIPTION OF YOUR CASE PLEASE ENTER THE CHARACTERS YOU SEE INTO THE FIELD BELOW. OUR SOUTHEAST TEXAS LAW FIRM IS DEDICATED TO HELPING SERIOUSLY INJURED PEOPLE RECOVER PAYMENT FOR THEIR INJURIES, MEDICAL EXPENSES, AND OTHER COSTS OF AN ACCIDENT CAUSED BY NEGLIGENCE OR MISCONDUCT. WE ALSO HELP FAMILIES GRIEVING OVER THE LOSS OF A LOVED ONE IN A FATAL ACCIDENT. SINCE 1957, WE HAVE COMMITTED OURSELVES TO HELPING SOUTHEAST TEXANS WITH PERSONAL INJURY AND WRONGFUL DEATH CLAIMS. LET US PUT THAT EXPERIENCE TO WORK FOR YOU. TO SPEAK WITH AN ATTORNEY AT WALDMAN SMALLWOOD, P.C., CALL 1-800-833-9151 OR COMPLETE THE FORM BELOW. LEARN HOW WE CAN GUIDE YOU THROUGH THE LEGAL PROCESS. READ OUR DISCLAIMER.
Daily News: Barbie’s deforestation habits get her dumped - World Oceans Day marked by overfishing warning Top News: Ken breaks up with Barbie over her packaging; Greenpeace protests against nuclear waste transport; Australia bans live cattle exports to Indonesia due to the unethical treatment of animals; UK researchers develop bin shaming people into recycling; World Oceans Day marred by ongoing ocean destruction. In the meantime, Japan’s Nuclear Emergency Response Headquarters officially admitted that the Fukushima nuclear power plant experienced full meltdowns at three reactors in the wake of an earthquake and tsunami in March; giving a stark reminder about the dangers of a nuclear power. #AnimalRights: The Australian government has banned all live cattle exports to Indonesia following public outcry over a documentary by the country’s ABC channel showing graphic footage of the animals being mistreated. As BBC reports “no piece of television journalism aired in Australia in the past 12 months has had such a profound impact on the public and, more importantly, government policy”. #BinCam: Researchers in Newcastle, in the UK, have designed a special bin to shame people into recycling. How? They put a camera on the inside of the lid to photograph what is put inside which then uploads the pictures onto Facebook. Researchers set up the project to see how naming people who fail to separate their rubbish would affect their behaviour. #WorldOceansDay: With today marking World Oceans Day, Greenpeace draws the attention to the problem of overfishing. Thai newspaper The Nation reports about the destructive techniques used by the fishing fleets, quoting Greenpeace’s head of Oceans campaign Sarah Duthie saying: “the global fishing fleet has grown 75 per cent over the last 30 years and its annual catch is now said to be two and a half times what is sustainable.” That's it for today's environmental news.Got any news story you want to highlight? Please, let us know in the comments below!
I have to go to work every day and talk to people... I don't want work, i don't want to hang, i don't want to talk with anyone, I don't want to be myself. In free time I'm sitting home doing nothing because I don't want to exist, I don't wanna go outside, I don't like what I am and who I am. I just wanna die. I wish i was never born, i don't want a grave or anything, like I never existed. i'm afraid to do it because i could fail and it could be very painfull and I also don't have a tool that I would need to make it painless. I find myself struggling with similar thoughts. My life is no picnic, but I am finding things might be gradually picking up with using my free will more and more, and not being dependent on others to live my life the way I want, and on my own terms. It's hard for me to believe that anyone feels as badly as I do right now. I find myself struggling with similar thoughts. My life is no picnic, but I am finding things might be gradually picking up with using my free will more and more, and not being dependent on others to live my life the way I want, and on my own terms. It's hard for me to believe that anyone feels as badly as I do right now. Click to expand... I think the same about myself. in last few days I was in such a bad mental state and I really wanted to do it. I was so paranoid, depressed... i don't know how to correctly describe that feeling, i couldn't even get out of my bed... but i still had to go to work, i was sleeping for like 10-11 hours. suicidal thoughts are in my head for years. And in last few days i really wanted to do it, I was already learning a method.. but then i somehow calm down and picked up a paper and wrote rules for my life in next 1 month.. workout and daily going out for a walk. I would rather do suicide but I'm really scared of doing it... so if this doesn't work... then i'll seriously consider about suicide because i can't take my negative, paranoid and depressive thoughts combied with so much stress anymore.
Update: I was unfortunately not aware of Shamus Young's severe criticism of Fallout 3 available here to link in the original piece and I regret that. It dovetails rather nicely with what I've written and it's much better executed than my piece. I strongly recommend anyone... Tonight I shall be on and I will mine and craft and explore... Strangely enough my boys made a huge stack of dynamite on a mountainside and blew the hell out of it... it revealed a cavern with a huge cluster of diamond blocks We counted about thirty diamond about 20 blocks down from water level... I was shocked... I've never seen a diamond vein larger than 8... you think they tweaked the block gen?_________________ Icepick wrote: Once she let me stick it in her ass I left her, I accomplished what I wanted Haha, it's strangely addictive. It's great because you can go on for a quick half hour if youre not in the gaming mood, and are a little bored. But everytime that half hour turns into 6+ hours. I finished my aquarium now, so I'm at a bit of a loose end. Im just making a high jump into a ring of fire - I need a project! Also, I just noticed "u love farts" on my door sign, thanks for that . It is true though._________________
Q: How to send external request to a website which needs authentication - Kohana 3.3 I am using Kohana 3.3 and trying to make an external request to a url which is internal to our company. The external website needs user credentials. How do i make an external request to that website? I was planning to use a single request to login and then hit the URL i want, but how do i achieve it?. Example code is below. Request::factory('http://example.com/user/login')->method('POST')->post('username', 'abc')->post('password', '123')->execute(); $request = Request::$current; $request->factory('http://example.com/do/this')->method('POST')->post('param1', 'value')->post('param2', 'value2'); $response = $request->execute(); The above code fails at $request->factory() saying its not an object and cannot call factory() method. Could anyone tell me what is the correct way of doing what i am trying to achieve in Kohana 3.3? A: To send external request you should create a request with Request::factory() and then execute() it. Note that $request->execute() returns Response object. To make 2 requests to auth-protected site use: // We create $request object $request = Request::factory('http://example.com/user/login') ->method('POST') ->post(array( 'username' => 'abc', 'password' => '1111' )); // We execute $request - getting 1st response $response1 = $request->execute(); // We setting new URL to our $request object and new POST params $request ->url('http://example.com/do/this') ->post(array( 'param1' => '1', 'param2' => '2' ));; // Now we can execute it again $response2 = $request->execute(); So the idea is - youcan use 1 request object for different actual requests.
The present invention relates to a system for transmitting a digital video signal and recording the received video signal. More particularly, the present invention relates to great extension of the range of use of a digital signal recording/reproducing system by greatly shortening a recording time through transmission of a video signal in a compressed form, and further relates to great extension of the range of use of a digital signal recording/reproducing system by making the number of signals to be recorded and a recording/reproducing time variable. As a digital magnetic recording/reproducing system (hereinafter referred to as VTR) is conventionally known, for example, a D2 format VTR. In such a conventional digital VTR, the elongation or shortening of a reproducing time is possible by using variable-speed reproduction. However, the prior art reference does not at all disclose high-speed recording in which a recording time is shortened to 1/m, multiple recording in which a plurality of signals are recorded, and the compression/expansion of a recording/reproducing time. The above-mentioned conventional digital VTR has a feature that a high quality is attained and there is no deterioration caused by dubbing. However, the shortening of a dubbing time is not taken into consideration. Therefore, for example, in the case where a two-hour program is to be recorded, two hours are required. Thus, there is a drawback that inconveniences are encountered in use. Also, the multiplexing of recording signals is not taken into consideration. Therefore, for example, when two kinds of programs are to be simultaneously recorded or reproduced, two VTR's are required. This also causes inconveniences in use.
Oncogene activation in pituitary tumors. Pituitary tumors constitute 10% of intracranial neoplasms and are mostly benign, monoclonal adenomas derived from single mutant cells. Pituitary oncogenes have been intensively studied and three of them, gsp, ccnd1, and PTTG are abundant in significant numbers of cases. gsp is present in approximately 40% of Caucasian patients with GH-secreting tumors and results from a mutated, constitutively active alpha subunit of Gs protein. Persistent activation of the cAMP-PKA-CREB pathway may lead to uncontrolled cell proliferation and GH secretion. ccnd1 is overexpressed cyclin D1, and cyclin D1 gene is amplified in some pituitary tumors. PTTG is expressed in most pituitary tumors. PTTG is localized to both the nucleus and cytoplasm and interacts with several protein partners. At least three tumorigenesis mechanisms are proposed for human PTTG. 1) PTTG and FGF form a positive feedback loop and stimulate tumor vascularity. 2) PTTG transactivates c-myc or other pro-proliferation genes. 3) PTTG overexpression causes aneuploidy. PTTG expression activates p53 and causes p53-dependent and -independent apoptosis. Due to lack of functional human pituitary cell cultures and appropriate animal models for pituitary tumors, many of the results reviewed here are obtained from heterologous systems.
#pragma once #include <sys/socket.h> /* bits/eventfd.h */ #ifndef EFD_SEMAPHORE #define EFD_SEMAPHORE 1 #endif #ifndef EFD_CLOEXEC #define EFD_CLOEXEC 02000000 #endif #ifndef EFD_NONBLOCK #define EFD_NONBLOCK 04000 #endif /* fcntl.h */ #ifndef AT_EMPTY_PATH #define AT_EMPTY_PATH 0x1000 #endif #ifndef AT_SYMLINK_NOFOLLOW #define AT_SYMLINK_NOFOLLOW 0x100 #endif #ifndef O_PATH #define O_PATH 010000000 /* Resolve pathname but do not open file. */ #endif #ifndef O_CLOEXEC #define O_CLOEXEC 02000000 #endif #ifndef O_LARGEFILE #define O_LARGEFILE 00100000 #endif #ifndef O_TMPFILE #define O_TMPFILE 020000000 #endif #ifndef AT_NO_AUTOMOUNT #define AT_NO_AUTOMOUNT 0x800 #endif #ifndef F_LINUX_SPECIFIC_BASE #define F_LINUX_SPECIFIC_BASE 1024 #endif #ifndef F_SETPIPE_SZ #define F_SETPIPE_SZ (F_LINUX_SPECIFIC_BASE + 7) #endif #ifndef F_GETPIPE_SZ #define F_GETPIPE_SZ (F_LINUX_SPECIFIC_BASE + 8) #endif #ifndef F_DUPFD_CLOEXEC #define F_DUPFD_CLOEXEC (F_LINUX_SPECIFIC_BASE + 6) #endif #ifndef F_SETOWN_EX #define F_SETOWN_EX 15 #endif #ifndef F_GETOWN_EX #define F_GETOWN_EX 16 #endif #ifndef F_GETOWNER_UIDS #define F_GETOWNER_UIDS 17 #endif #ifndef F_OFD_GETLK #define F_OFD_GETLK 36 #define F_OFD_SETLK 37 #define F_OFD_SETLKW 38 #endif /* Flags for SPLICE and VMSPLICE. */ #ifndef SPLICE_F_MOVE # define SPLICE_F_MOVE 1 /* Move pages instead of copying. */ # define SPLICE_F_NONBLOCK 2 /* Don't block on the pipe splicing */ # define SPLICE_F_MORE 4 /* Expect more data. */ #endif #ifndef SPLICE_F_GIFT # define SPLICE_F_GIFT 8 /* Pages passed in are a gift. */ #endif /* linux/hw_breakpoint.h */ enum { HW_BREAKPOINT_LEN_1 = 1, HW_BREAKPOINT_LEN_2 = 2, HW_BREAKPOINT_LEN_4 = 4, HW_BREAKPOINT_LEN_8 = 8, }; enum { HW_BREAKPOINT_EMPTY = 0, HW_BREAKPOINT_R = 1, HW_BREAKPOINT_W = 2, HW_BREAKPOINT_RW = HW_BREAKPOINT_R | HW_BREAKPOINT_W, HW_BREAKPOINT_X = 4, HW_BREAKPOINT_INVALID = HW_BREAKPOINT_RW | HW_BREAKPOINT_X, }; /* asm-generic/mman-common.h */ #ifndef MAP_UNINITIALIZED #define MAP_UNINITIALIZED 0x4000000 #endif #ifndef PROT_SEM #define PROT_SEM 0x8 #endif #ifndef MAP_HUGETLB #define MAP_HUGETLB 0x40000 #endif #ifndef MAP_STACK #define MAP_STACK 0x20000 #endif #ifndef MADV_FREE #define MADV_FREE 8 #endif #ifndef MADV_MERGEABLE #define MADV_MERGEABLE 12 #endif #ifndef MADV_UNMERGEABLE #define MADV_UNMERGEABLE 13 #endif #ifndef MADV_HUGEPAGE #define MADV_HUGEPAGE 14 #endif #ifndef MADV_NOHUGEPAGE #define MADV_NOHUGEPAGE 15 #endif #ifndef MADV_DONTDUMP #define MADV_DONTDUMP 16 #endif #ifndef MADV_DODUMP #define MADV_DODUMP 17 #endif #ifndef MADV_WIPEONFORK #define MADV_WIPEONFORK 18 #endif #ifndef MADV_KEEPONFORK #define MADV_KEEPONFORK 19 #endif /* bits/socket.h */ #ifndef SOCK_CLOEXEC #define SOCK_CLOEXEC 02000000 #endif #ifndef SOCK_NONBLOCK #define SOCK_NONBLOCK 04000 #endif #ifndef PF_RDS #define PF_RDS 21 #endif #ifndef AF_RDS #define AF_RDS PF_RDS #endif #ifndef PF_LLC #define PF_LLC 26 #endif #ifndef AF_LLC #define AF_LLC PF_LLC #endif #ifndef AF_IB #define AF_IB 27 #endif #ifndef PF_IB #define PF_IB AF_IB #endif #ifndef PF_MPLS #define PF_MPLS 28 #endif #ifndef PF_CAN #define PF_CAN 29 #endif #ifndef AF_CAN #define AF_CAN PF_CAN #endif #ifndef PF_TIPC #define PF_TIPC 30 #endif #ifndef AF_TIPC #define AF_TIPC PF_TIPC #endif #ifndef PF_PHONET #define PF_PHONET 35 #endif #ifndef AF_PHONET #define AF_PHONET PF_PHONET #endif #ifndef PF_CAIF #define PF_CAIF 37 #endif #ifndef AF_CAIF #define AF_CAIF PF_CAIF #endif #ifndef PF_ALG #define PF_ALG 38 #endif #ifndef AF_ALG #define AF_ALG PF_ALG #endif #ifndef PF_NFC #define PF_NFC 39 #endif #ifndef AF_NFC #define AF_NFC PF_NFC #endif #ifndef PF_VSOCK #define PF_VSOCK 40 #endif #ifndef AF_VSOCK #define AF_VSOCK PF_VSOCK #endif #ifndef PF_KCM #define PF_KCM 41 #endif #ifndef PF_QIPCRTR #define PF_QIPCRTR 42 #endif #ifndef PF_SMC #define PF_SMC 43 #endif #ifndef PF_XDP #define PF_XDP 44 #endif #ifndef NFC_SOCKPROTO_RAW #define NFC_SOCKPROTO_RAW 0 #endif #ifndef NFC_SOCKPROTO_LLCP #define NFC_SOCKPROTO_LLCP 1 #endif #ifndef MSG_WAITFORONE #define MSG_WAITFORONE 0x10000 #endif #ifndef MSG_BATCH #define MSG_BATCH 0x40000 #endif #ifndef MSG_ZEROCOPY #define MSG_ZEROCOPY 0x4000000 #endif #ifndef MSG_CMSG_CLOEXEC #define MSG_CMSG_CLOEXEC 0x40000000 #endif /* linux/socket.h */ #ifndef MSG_PROBE #define MSG_PROBE 0x10 #endif #ifndef MSG_FASTOPEN #define MSG_FASTOPEN 0x20000000 #endif #ifndef MSG_CMSG_COMPAT #define MSG_CMSG_COMPAT 0x80000000 #endif /* linux/net.h */ #ifndef SYS_RECVMMSG #define SYS_RECVMMSG 19 #endif #ifndef SYS_SENDMMSG #define SYS_SENDMMSG 20 #endif /* linux/netlink.h */ #ifndef NETLINK_CRYPTO #define NETLINK_CRYPTO 21 #endif #ifndef NETLINK_SMC #define NETLINK_SMC 22 #endif #ifndef NETLINK_RX_RING #define NETLINK_RX_RING 6 #define NETLINK_TX_RING 7 #endif #ifndef NETLINK_LISTEN_ALL_NSID #define NETLINK_LISTEN_ALL_NSID 8 #endif #ifndef NETLINK_LIST_MEMBERSHIPS #define NETLINK_LIST_MEMBERSHIPS 9 #endif #ifndef NETLINK_CAP_ACK #define NETLINK_CAP_ACK 10 #endif #ifndef NETLINK_SOCK_DIAG #define NETLINK_SOCK_DIAG 4 #endif #ifndef RTNLGRP_DCB #define RTNLGRP_DCB 23 #endif #ifndef RTNLGRP_IPV4_NETCONF #define RTNLGRP_IPV4_NETCONF 24 #endif #ifndef RTNLGRP_IPV6_NETCONF #define RTNLGRP_IPV6_NETCONF 25 #endif #ifndef RTNLGRP_MDB #define RTNLGRP_MDB 26 #endif #ifndef RTNLGRP_MPLS_ROUTE #define RTNLGRP_MPLS_ROUTE 27 #endif #ifndef RTNLGRP_NSID #define RTNLGRP_NSID 28 #endif #ifndef RTNLGRP_MPLS_NETCONF #define RTNLGRP_MPLS_NETCONF 29 #endif /* linux/prctl.h */ #ifndef PR_MCE_KILL_GET #define PR_MCE_KILL_GET 34 #endif #ifndef PR_SET_MM #define PR_SET_MM 35 #endif #ifndef PR_SET_CHILD_SUBREAPER #define PR_SET_CHILD_SUBREAPER 36 #define PR_GET_CHILD_SUBREAPER 37 #endif #ifndef PR_SET_NO_NEW_PRIVS #define PR_SET_NO_NEW_PRIVS 38 #define PR_GET_NO_NEW_PRIVS 39 #endif #ifndef PR_GET_TID_ADDRESS #define PR_GET_TID_ADDRESS 40 #endif #ifndef PR_SET_THP_DISABLE #define PR_SET_THP_DISABLE 41 #define PR_GET_THP_DISABLE 42 #endif #ifndef PR_MPX_ENABLE_MANAGEMENT #define PR_MPX_ENABLE_MANAGEMENT 43 #define PR_MPX_DISABLE_MANAGEMENT 44 #endif #ifdef __mips__ #ifndef PR_SET_FP_MODE #define PR_SET_FP_MODE 45 #define PR_GET_FP_MODE 46 #endif #endif #ifndef PR_CAP_AMBIENT #define PR_CAP_AMBIENT 47 #endif //TODO wtf were 48,49 ? // arm64 only #ifndef PR_SVE_SET_VL #define PR_SVE_SET_VL 50 #define PR_SVE_GET_VL 51 #endif #ifndef PR_GET_SPECULATION_CTRL #define PR_GET_SPECULATION_CTRL 52 #define PR_SET_SPECULATION_CTRL 53 #endif // arm64 only #ifndef PR_PAC_RESET_KEYS #define PR_PAC_RESET_KEYS 54 #endif /* linux/rds.h */ #ifndef RDS_CANCEL_SENT_TO #define RDS_CANCEL_SENT_TO 1 #define RDS_GET_MR 2 #define RDS_FREE_MR 3 /* deprecated: RDS_BARRIER 4 */ #define RDS_RECVERR 5 #define RDS_CONG_MONITOR 6 #define RDS_GET_MR_FOR_DEST 7 #endif /* asm/ptrace-abi.h */ #ifndef PTRACE_SYSEMU #define PTRACE_SYSEMU 31 #endif #ifndef PTRACE_SYSEMU_SINGLESTEP #define PTRACE_SYSEMU_SINGLESTEP 32 #endif #ifndef PTRACE_GETSIGMASK #define PTRACE_GETSIGMASK 0x420a #define PTRACE_SETSIGMASK 0x420b #endif /* sys/timerfd.h */ #ifndef TFD_CLOEXEC #define TFD_CLOEXEC 02000000 #endif #ifndef TFD_NONBLOCK #define TFD_NONBLOCK 04000 #endif /* linux/keyctl.h */ #ifndef KEYCTL_GET_KEYRING_ID #define KEYCTL_GET_KEYRING_ID 0 /* ask for a keyring's ID */ #define KEYCTL_JOIN_SESSION_KEYRING 1 /* join or start named session keyring */ #define KEYCTL_UPDATE 2 /* update a key */ #define KEYCTL_REVOKE 3 /* revoke a key */ #define KEYCTL_CHOWN 4 /* set ownership of a key */ #define KEYCTL_SETPERM 5 /* set perms on a key */ #define KEYCTL_DESCRIBE 6 /* describe a key */ #define KEYCTL_CLEAR 7 /* clear contents of a keyring */ #define KEYCTL_LINK 8 /* link a key into a keyring */ #define KEYCTL_UNLINK 9 /* unlink a key from a keyring */ #define KEYCTL_SEARCH 10 /* search for a key in a keyring */ #define KEYCTL_READ 11 /* read a key or keyring's contents */ #define KEYCTL_INSTANTIATE 12 /* instantiate a partially constructed key */ #define KEYCTL_NEGATE 13 /* negate a partially constructed key */ #define KEYCTL_SET_REQKEY_KEYRING 14 /* set default request-key keyring */ #define KEYCTL_SET_TIMEOUT 15 /* set key timeout */ #define KEYCTL_ASSUME_AUTHORITY 16 /* assume request_key() authorisation */ #define KEYCTL_GET_SECURITY 17 /* get key security label */ #define KEYCTL_SESSION_TO_PARENT 18 /* apply session keyring to parent process */ #endif #ifndef KEYCTL_REJECT #define KEYCTL_REJECT 19 /* reject a partially constructed key */ #endif #ifndef KEYCTL_INSTANTIATE_IOV #define KEYCTL_INSTANTIATE_IOV 20 /* instantiate a partially constructed key */ #endif #ifndef KCMP_TYPES enum kcmp_type { KCMP_FILE, KCMP_VM, KCMP_FILES, KCMP_FS, KCMP_SIGHAND, KCMP_IO, KCMP_SYSVSEM, KCMP_TYPES, }; #endif /* asm/socket.h */ #ifndef SO_BSDCOMPAT #define SO_BSDCOMPAT 14 #endif #ifndef SO_REUSEPORT #define SO_REUSEPORT 15 #endif #ifndef SO_RXQ_OVFL #define SO_RXQ_OVFL 40 #endif #ifndef SO_WIFI_STATUS #define SO_WIFI_STATUS 41 #endif #ifndef SO_PEEK_OFF #define SO_PEEK_OFF 42 #endif #ifndef SO_NOFCS #define SO_NOFCS 43 #endif #ifndef SO_LOCK_FILTER #define SO_LOCK_FILTER 44 #endif #ifndef SO_SELECT_ERR_QUEUE #define SO_SELECT_ERR_QUEUE 45 #endif #ifndef SO_BUSY_POLL #define SO_BUSY_POLL 46 #endif #ifndef SO_MAX_PACING_RATE #define SO_MAX_PACING_RATE 47 #endif #ifndef SO_BPF_EXTENSIONS #define SO_BPF_EXTENSIONS 48 #endif #ifndef SO_INCOMING_CPU #define SO_INCOMING_CPU 49 #endif #ifndef SO_ATTACH_BPF #define SO_ATTACH_BPF 50 #endif #ifndef SO_ATTACH_REUSEPORT_CBPF #define SO_ATTACH_REUSEPORT_CBPF 51 #define SO_ATTACH_REUSEPORT_EBPF 52 #endif #ifndef SO_CNX_ADVICE #define SO_CNX_ADVICE 53 #endif #ifndef SCM_TIMESTAMPING_OPT_STATS #define SCM_TIMESTAMPING_OPT_STATS 54 #endif #ifndef SO_MEMINFO #define SO_MEMINFO 55 #endif #ifndef SO_INCOMING_NAPI_ID #define SO_INCOMING_NAPI_ID 56 #endif #ifndef SO_COOKIE #define SO_COOKIE 57 #endif #ifndef SCM_TIMESTAMPING_PKTINFO #define SCM_TIMESTAMPING_PKTINFO 58 #endif #ifndef SO_PEERGROUPS #define SO_PEERGROUPS 59 #endif #ifndef SO_ZEROCOPY #define SO_ZEROCOPY 60 #endif #ifndef SO_TXTIME #define SO_TXTIME 61 #endif #ifndef SO_BINDTOIFINDEX #define SO_BINDTOIFINDEX 62 #endif #ifndef SO_TIMESTAMP_NEW #define SO_TIMESTAMP_NEW 63 #endif #ifndef SO_TIMESTAMPNS_NEW #define SO_TIMESTAMPNS_NEW 64 #endif #ifndef SO_TIMESTAMPING_NEW #define SO_TIMESTAMPING_NEW 65 #endif #ifndef SO_RCVTIMEO_NEW #define SO_RCVTIMEO_NEW 66 #endif #ifndef SO_SNDTIMEO_NEW #define SO_SNDTIMEO_NEW 67 #endif #ifndef SO_DETACH_REUSEPORT_BPF #define SO_DETACH_REUSEPORT_BPF 68 #endif /* linux/tcp.h */ #ifndef TCP_COOKIE_TRANSACTIONS #define TCP_COOKIE_TRANSACTIONS 15 #endif #ifndef TCP_THIN_LINEAR_TIMEOUTS #define TCP_THIN_LINEAR_TIMEOUTS 16 #endif #ifndef TCP_THIN_DUPACK #define TCP_THIN_DUPACK 17 #endif #ifndef TCP_USER_TIMEOUT #define TCP_USER_TIMEOUT 18 #endif #ifndef TCP_REPAIR #define TCP_REPAIR 19 #endif #ifndef TCP_REPAIR_QUEUE #define TCP_REPAIR_QUEUE 20 #endif #ifndef TCP_QUEUE_SEQ #define TCP_QUEUE_SEQ 21 #endif #ifndef TCP_REPAIR_OPTIONS #define TCP_REPAIR_OPTIONS 22 #endif #ifndef TCP_FASTOPEN #define TCP_FASTOPEN 23 #endif #ifndef TCP_TIMESTAMP #define TCP_TIMESTAMP 24 #endif #ifndef TCP_NOTSENT_LOWAT #define TCP_NOTSENT_LOWAT 25 #endif #ifndef TCP_CC_INFO #define TCP_CC_INFO 26 #endif #ifndef TCP_SAVE_SYN #define TCP_SAVE_SYN 27 #define TCP_SAVED_SYN 28 #endif #ifndef TCP_REPAIR_WINDOW #define TCP_REPAIR_WINDOW 29 #endif #ifndef TCP_FASTOPEN_CONNECT #define TCP_FASTOPEN_CONNECT 30 #endif #ifndef TCP_ULP #define TCP_ULP 31 #endif #ifndef TCP_MD5SIG_EXT #define TCP_MD5SIG_EXT 32 #endif #ifndef TCP_FASTOPEN_KEY #define TCP_FASTOPEN_KEY 33 /* Set the key for Fast Open (cookie) */ #endif #ifndef TCP_FASTOPEN_NO_COOKIE #define TCP_FASTOPEN_NO_COOKIE 34 /* Enable TFO without a TFO cookie */ #endif #ifndef TCP_ZEROCOPY_RECEIVE #define TCP_ZEROCOPY_RECEIVE 35 #endif #ifndef TCP_INQ #define TCP_INQ 36 /* Notify bytes available to read as a cmsg on read */ #endif #ifndef TCP_TX_DELAY #define TCP_TX_DELAY 37 #endif /* linux/if_packet.h */ #ifndef PACKET_VNET_HDR #define PACKET_VNET_HDR 15 #endif #ifndef PACKET_TX_TIMESTAMP #define PACKET_TX_TIMESTAMP 16 #endif #ifndef PACKET_TIMESTAMP #define PACKET_TIMESTAMP 17 #endif #ifndef PACKET_FANOUT #define PACKET_FANOUT 18 #endif /* linux/dccp.h */ #ifndef DCCP_SOCKOPT_QPOLICY_ID #define DCCP_SOCKOPT_QPOLICY_ID 16 #endif #ifndef DCCP_SOCKOPT_QPOLICY_TXQLEN #define DCCP_SOCKOPT_QPOLICY_TXQLEN 17 #endif /* net/udplite.h */ #ifndef UDPLITE_SEND_CSCOV #define UDPLITE_SEND_CSCOV 10 /* sender partial coverage (as sent) */ #endif #ifndef UDPLITE_RECV_CSCOV #define UDPLITE_RECV_CSCOV 11 /* receiver partial coverage (threshold ) */ #endif /* linux/in.h */ #ifndef IP_MTU #define IP_MTU 14 #endif #ifndef IP_FREEBIND #define IP_FREEBIND 15 #endif #ifndef IP_IPSEC_POLICY #define IP_IPSEC_POLICY 16 #endif #ifndef IP_XFRM_POLICY #define IP_XFRM_POLICY 17 #endif #ifndef IP_PASSSEC #define IP_PASSSEC 18 #endif #ifndef IP_TRANSPARENT #define IP_TRANSPARENT 19 #endif #ifndef IP_MINTTL #define IP_MINTTL 21 #endif #ifndef IP_ORIGDSTADDR #define IP_ORIGDSTADDR 20 #endif #ifndef IP_RECVORIGDSTADDR #define IP_RECVORIGDSTADDR IP_ORIGDSTADDR #endif #ifndef IP_NODEFRAG #define IP_NODEFRAG 22 #endif #ifndef IP_CHECKSUM #define IP_CHECKSUM 23 #endif #ifndef IP_BIND_ADDRESS_NO_PORT #define IP_BIND_ADDRESS_NO_PORT 24 #endif #ifndef IP_RECVFRAGSIZE #define IP_RECVFRAGSIZE 25 #endif #ifndef IP_MULTICAST_ALL #define IP_MULTICAST_ALL 49 #endif #ifndef IP_UNICAST_IF #define IP_UNICAST_IF 50 #endif #ifndef IPPROTO_BEETPH #define IPPROTO_BEETPH 94 #endif #ifndef IPPROTO_MPLS #define IPPROTO_MPLS 137 #endif /* linux/in6.h */ #ifndef IPV6_FLOWINFO #define IPV6_FLOWINFO 11 #endif #ifndef IPV6_FLOWLABEL_MGR #define IPV6_FLOWLABEL_MGR 32 #define IPV6_FLOWINFO_SEND 33 #endif #ifndef IPV6_RECVPATHMTU #define IPV6_RECVPATHMTU 60 #define IPV6_PATHMTU 61 #define IPV6_DONTFRAG 62 #endif #ifndef IP6T_SO_GET_REVISION_MATCH #define IP6T_SO_GET_REVISION_MATCH 68 #define IP6T_SO_GET_REVISION_TARGET 69 #define IP6T_SO_ORIGINAL_DST 80 #endif #ifndef IPV6_AUTOFLOWLABEL #define IPV6_AUTOFLOWLABEL 70 #define IPV6_ADDR_PREFERENCES 72 #endif #ifndef IPV6_MINHOPCOUNT #define IPV6_MINHOPCOUNT 73 #define IPV6_ORIGDSTADDR 74 #define IPV6_RECVORIGDSTADDR IPV6_ORIGDSTADDR #define IPV6_TRANSPARENT 75 #define IPV6_UNICAST_IF 76 #endif #ifndef IPV6_RECVFRAGSIZE #define IPV6_RECVFRAGSIZE 77 #endif #ifndef IPV6_HDRINCL #define IPV6_HDRINCL 36 #endif /* asm/resource.h */ #ifndef RLIMIT_RTTIME #define RLIMIT_RTTIME 15 #endif /* sctp/user.h */ #ifndef SCTP_RTOINFO #define SCTP_RTOINFO 0 #define SCTP_ASSOCINFO 1 #define SCTP_INITMSG 2 #define SCTP_NODELAY 3 /* Get/set nodelay option. */ #define SCTP_AUTOCLOSE 4 #define SCTP_SET_PEER_PRIMARY_ADDR 5 #define SCTP_PRIMARY_ADDR 6 #define SCTP_ADAPTATION_LAYER 7 #define SCTP_DISABLE_FRAGMENTS 8 #define SCTP_PEER_ADDR_PARAMS 9 #define SCTP_DEFAULT_SEND_PARAM 10 #define SCTP_EVENTS 11 #define SCTP_I_WANT_MAPPED_V4_ADDR 12 /* Turn on/off mapped v4 addresses */ #define SCTP_MAXSEG 13 /* Get/set maximum fragment. */ #define SCTP_STATUS 14 #define SCTP_GET_PEER_ADDR_INFO 15 #define SCTP_DELAYED_ACK_TIME 16 #define SCTP_CONTEXT 17 #define SCTP_FRAGMENT_INTERLEAVE 18 #define SCTP_PARTIAL_DELIVERY_POINT 19 /* Set/Get partial delivery point */ #define SCTP_MAX_BURST 20 /* Set/Get max burst */ #define SCTP_AUTH_CHUNK 21 /* Set only: add a chunk type to authenticate */ #define SCTP_HMAC_IDENT 22 #define SCTP_AUTH_KEY 23 #define SCTP_AUTH_ACTIVE_KEY 24 #define SCTP_AUTH_DELETE_KEY 25 #define SCTP_PEER_AUTH_CHUNKS 26 /* Read only */ #define SCTP_LOCAL_AUTH_CHUNKS 27 /* Read only */ #define SCTP_GET_ASSOC_NUMBER 28 /* Read only */ #define SCTP_GET_ASSOC_ID_LIST 29 /* Read only */ #define SCTP_AUTO_ASCONF 30 #define SCTP_PEER_ADDR_THLDS 31 #endif #ifndef SCTP_SOCKOPT_BINDX_ADD #define SCTP_SOCKOPT_BINDX_ADD 100 /* BINDX requests for adding addrs */ #define SCTP_SOCKOPT_BINDX_REM 101 /* BINDX requests for removing addrs. */ #define SCTP_SOCKOPT_PEELOFF 102 /* peel off association. */ #define SCTP_SOCKOPT_CONNECTX_OLD 107 /* CONNECTX old requests. */ #define SCTP_GET_PEER_ADDRS 108 /* Get all peer address. */ #define SCTP_GET_LOCAL_ADDRS 109 /* Get all local address. */ #define SCTP_SOCKOPT_CONNECTX 110 /* CONNECTX requests. */ #define SCTP_SOCKOPT_CONNECTX3 111 /* CONNECTX requests (updated) */ #define SCTP_GET_ASSOC_STATS 112 /* Read only */ #endif /* linux/rxrpc.h */ #ifndef RXRPC_USER_CALL_ID #define RXRPC_USER_CALL_ID 1 /* user call ID specifier */ #define RXRPC_ABORT 2 /* abort request / notification [terminal] */ #define RXRPC_ACK 3 /* [Server] RPC op final ACK received [terminal] */ #define RXRPC_NET_ERROR 5 /* network error received [terminal] */ #define RXRPC_BUSY 6 /* server busy received [terminal] */ #define RXRPC_LOCAL_ERROR 7 /* local error generated [terminal] */ #define RXRPC_NEW_CALL 8 /* [Server] new incoming call notification */ #define RXRPC_ACCEPT 9 /* [Server] accept request */ #endif /* net/bluetooth/bluetooth.h */ #ifndef BT_SECURITY #define BT_SECURITY 4 #define BT_DEFER_SETUP 7 #define BT_FLUSHABLE 8 #define BT_POWER 9 #define BT_CHANNEL_POLICY 10 #define SOL_HCI 0 #define SOL_L2CAP 6 #define SOL_SCO 17 #define SOL_RFCOMM 18 #endif #ifndef SOL_TLS #define SOL_TLS 282 #endif /* net/bluetooth/hci.h */ #ifndef HCI_DATA_DIR #define HCI_DATA_DIR 1 #define HCI_FILTER 2 #define HCI_TIME_STAMP 3 #endif /* net/bluetooth/l2cap.h */ #ifndef L2CAP_OPTIONS #define L2CAP_OPTIONS 0x01 #define L2CAP_LM 0x03 #endif /* net/bluetooth/rfcomm.h */ #ifndef RFCOMM_LM #define RFCOMM_LM 0x03 #endif /* net/iucv/af_iucv.h */ #ifndef SO_IPRMDATA_MSG #define SO_IPRMDATA_MSG 0x0080 /* send/recv IPRM_DATA msgs */ #define SO_MSGLIMIT 0x1000 /* get/set IUCV MSGLIMIT */ #define SO_MSGSIZE 0x0800 /* get maximum msgsize */ #endif /* linux/nfc.h */ #ifndef sockaddr_nfc #include <linux/types.h> struct sockaddr_nfc { sa_family_t sa_family; __u32 dev_idx; __u32 target_idx; __u32 nfc_protocol; }; #endif /* linux/inotify.h */ #ifndef IN_EXCL_UNLINK #define IN_EXCL_UNLINK 0x04000000 /* exclude events on unlinked objects */ #endif #ifndef MSG_COPY #define MSG_COPY 040000 #endif #ifndef MS_SNAP_STABLE #define MS_SNAP_STABLE (1<<27) #endif #ifndef MS_NOSEC #define MS_NOSEC (1<<28) #endif #ifndef MS_BORN #define MS_BORN (1<<29) #endif /* linux/kvm.h */ #ifndef KVM_GET_REG_LIST struct kvm_reg_list { __u64 n; /* number of regs */ __u64 reg[0]; }; #define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list) #endif #ifndef KVM_S390_UCAS_MAP struct kvm_s390_ucas_mapping { __u64 user_addr; __u64 vcpu_addr; __u64 length; }; #define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping) #endif #ifndef KVM_S390_UCAS_UNMAP #define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping) #endif #ifndef KVM_S390_VCPU_FAULT #define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long) #endif #ifndef KVM_XEN_HVM_CONFIG struct kvm_xen_hvm_config { __u32 flags; __u32 msr; __u64 blob_addr_32; __u64 blob_addr_64; __u8 blob_size_32; __u8 blob_size_64; __u8 pad2[30]; }; #define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config) #endif #ifndef KVM_PPC_GET_PVINFO struct kvm_ppc_pvinfo { /* out */ __u32 flags; __u32 hcall[4]; __u8 pad[108]; }; #define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo) #endif #ifndef KVM_SET_TSC_KHZ #define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2) #endif #ifndef KVM_GET_TSC_KHZ #define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3) #endif #ifndef KVM_ASSIGN_SET_INTX_MASK #define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, struct kvm_assigned_pci_dev) #endif #ifndef KVM_GET_DEBUGREGS struct kvm_debugregs { __u64 db[4]; __u64 dr6; __u64 dr7; __u64 flags; __u64 reserved[9]; }; #define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs) #define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs) #endif #ifndef KVM_ENABLE_CAP struct kvm_enable_cap { /* in */ __u32 cap; __u32 flags; __u64 args[4]; __u8 pad[64]; }; #define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap) #endif #ifndef KVM_GET_XSAVE struct kvm_xsave { __u32 region[1024]; }; #define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave) #define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave) #endif #ifndef KVM_GET_XCRS #define KVM_MAX_XCRS 16 struct kvm_xcr { __u32 xcr; __u32 reserved; __u64 value; }; struct kvm_xcrs { __u32 nr_xcrs; __u32 flags; struct kvm_xcr xcrs[KVM_MAX_XCRS]; __u64 padding[16]; }; #define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs) #define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs) #endif #ifndef KVM_SIGNAL_MSI struct kvm_msi { __u32 address_lo; __u32 address_hi; __u32 data; __u32 flags; __u8 pad[16]; }; #define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi) #endif #ifndef KVM_DIRTY_TLB struct kvm_dirty_tlb { __u64 bitmap; __u32 num_dirty; }; #define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb) #endif #ifndef KVM_GET_ONE_REG struct kvm_one_reg { __u64 id; __u64 addr; }; #define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg) #endif #ifndef KVM_SET_ONE_REG #define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg) #endif #ifndef KVM_KVMCLOCK_CTRL #define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad) #endif #ifndef KVM_PPC_GET_SMMU_INFO #define KVM_PPC_PAGE_SIZES_MAX_SZ 8 struct kvm_ppc_one_page_size { __u32 page_shift; /* Page shift (or 0) */ __u32 pte_enc; /* Encoding in the HPTE (>>12) */ }; struct kvm_ppc_one_seg_page_size { __u32 page_shift; /* Base page shift of segment (or 0) */ __u32 slb_enc; /* SLB encoding for BookS */ struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ]; }; struct kvm_ppc_smmu_info { __u64 flags; __u32 slb_size; __u32 pad; struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ]; }; #define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info) #endif #ifndef KVM_PPC_ALLOCATE_HTAB #define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32) #endif #ifndef KVM_PPC_GET_HTAB_FD struct kvm_get_htab_fd { __u64 flags; __u64 start_index; __u64 reserved[2]; }; #define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd) #endif #ifndef EM_ARM #define EM_ARM 40 #endif /* linux/mroute.h */ #ifndef MRT_TABLE #define MRT_TABLE (MRT_BASE+9) #endif #ifndef MRT_ADD_MFC_PROXY #define MRT_ADD_MFC_PROXY (MRT_BASE+10) #endif #ifndef MRT_DEL_MFC_PROXY #define MRT_DEL_MFC_PROXY (MRT_BASE+11) #endif /* sys/mount.h */ #ifndef MNT_DETACH #define MNT_DETACH 2 #endif #ifndef MNT_EXPIRE #define MNT_EXPIRE 4 #endif #ifndef UMOUNT_NOFOLLOW #define UMOUNT_NOFOLLOW 8 #endif /* if_ether.h */ #ifndef ETH_P_CANFD #define ETH_P_CANFD 0x000D #endif #ifndef ETH_P_CAIF #define ETH_P_CAIF 0x00F7 #endif #ifndef ETH_P_802_3_MIN #define ETH_P_802_3_MIN 0x0600 #endif #ifndef ETH_P_BATMAN #define ETH_P_BATMAN 0x4305 #endif #ifndef ETH_P_LINK_CTL #define ETH_P_LINK_CTL 0x886c #endif #ifndef ETH_P_8021AD #define ETH_P_8021AD 0x88A8 #endif #ifndef ETH_P_802_EX1 #define ETH_P_802_EX1 0x88B5 #endif #ifndef ETH_P_8021AH #define ETH_P_8021AH 0x88E7 #endif #ifndef ETH_P_MVRP #define ETH_P_MVRP 0x88F5 #endif #ifndef ETH_P_PRP #define ETH_P_PRP 0x88FB #endif #ifndef ETH_P_TDLS #define ETH_P_TDLS 0x890D #endif #ifndef ETH_P_QINQ1 #define ETH_P_QINQ1 0x9100 #endif #ifndef ETH_P_QINQ2 #define ETH_P_QINQ2 0x9200 #endif #ifndef ETH_P_QINQ3 #define ETH_P_QINQ3 0x9300 #endif #ifndef ETH_P_AF_IUCV #define ETH_P_AF_IUCV 0xFBFB #endif /* sched.h */ #ifndef SCHED_DEADLINE #define SCHED_DEADLINE 6 #endif #ifndef SCHED_IDLE #define SCHED_IDLE 5 #endif /* sys/swap.h */ #ifndef SWAP_FLAG_DISCARD #define SWAP_FLAG_DISCARD 0x10000 #endif /* linux/fs.h */ #ifndef SEEK_DATA #define SEEK_DATA 3 #endif #ifndef SEEK_HOLE #define SEEK_HOLE 4 #endif #ifndef RWF_HIPRI #define RWF_HIPRI 0x00000001 /* high priority request, poll if possible */ #endif #ifndef RWF_DSYNC #define RWF_DSYNC 0x00000002 /* per-IO O_DSYNC */ #define RWF_SYNC 0x00000004 /* per-IO O_SYNC */ #endif /* sys/epoll.h */ #ifndef EPOLLWAKEUP #define EPOLLWAKEUP (1u << 29) #endif /* time.h */ #ifndef CLOCK_MONOTONIC_RAW #define CLOCK_MONOTONIC_RAW 4 #endif #ifndef CLOCK_BOOTTIME #define CLOCK_BOOTTIME 7 #endif /* asm-generic/poll.h */ #ifndef POLLFREE #define POLLFREE 0x4000 #endif #ifndef POLL_BUSY_LOOP #define POLL_BUSY_LOOP 0x8000 #endif /* asm/mman.h */ #ifndef MLOCK_ONFAULT #define MLOCK_ONFAULT 0x01 #endif /* linux/nvme_ioctl.h */ #ifndef NVME_IOCTL_RESET #define NVME_IOCTL_RESET _IO('N', 0x44) #endif /* linux/shm.h */ #ifndef SHM_HUGE_SHIFT #define SHM_HUGE_SHIFT 26 #endif #ifndef SHM_HUGE_2MB #define SHM_HUGE_2MB (21 << SHM_HUGE_SHIFT) #define SHM_HUGE_1GB (30 << SHM_HUGE_SHIFT) #endif /* bits/shm.h */ #ifndef SHM_NORESERVE # define SHM_NORESERVE 010000 #endif /* netfilter/ipset/ipset.h */ #ifndef SO_IP_SET #define SO_IP_SET 83 #endif /* linux/auto_fs4.h */ #ifndef AUTOFS_IOC_EXPIRE_INDIRECT #define AUTOFS_IOC_EXPIRE_INDIRECT AUTOFS_IOC_EXPIRE_MULTI #endif #ifndef AUTOFS_IOC_EXPIRE_DIRECT #define AUTOFS_IOC_EXPIRE_DIRECT AUTOFS_IOC_EXPIRE_MULTI #endif /* linux/mount.h */ #ifndef MOVE_MOUNT_F_SYMLINKS #define MOVE_MOUNT_F_SYMLINKS 0x00000001 /* Follow symlinks on from path */ #define MOVE_MOUNT_F_AUTOMOUNTS 0x00000002 /* Follow automounts on from path */ #define MOVE_MOUNT_F_EMPTY_PATH 0x00000004 /* Empty from path permitted */ #define MOVE_MOUNT_T_SYMLINKS 0x00000010 /* Follow symlinks on to path */ #define MOVE_MOUNT_T_AUTOMOUNTS 0x00000020 /* Follow automounts on to path */ #define MOVE_MOUNT_T_EMPTY_PATH 0x00000040 /* Empty to path permitted */ #endif
Monday, April 02, 2012 All Trayvon, All The Time Over at P-F.com, a 30-year LE firearms instructor made a good post, but I couldn't help but notice that even he had internalized the whole "the dispatcher TOLD Zimmerman not to follow" meme, which is dismaying. The dispatcher never "told him to back off and let the cops handle it"; that is entirely a construct of the media, based on the brief snippet of the 911 tape where the dispatcher asked Zimmerman if he was following Martin. When Zimmerman answered in the affirmative, the dispatcher said "we don't need you to do that." That's a pretty ambiguous line. I've used it in situations ranging from "I'd really rather you didn't do that" to "I wish you would do that, but I don't want to be so forward as to straight-up ask you to." From that thin thread, the media has spun the legend of the dispatcher "ordering" Zimmerman not to follow, and Zimmerman "disobeying", and the legend has obviously stuck. That legend was repeated by the pastor in Indianapolis who marched his congregation into the middle of the street for thirty minutes yesterday, blocking Naptown traffic in an attempt to get justice for Trayvon. I'm not sure who he thought might be driving around Indy on Palm Sunday with some pull in the Florida State Attorney's office, or how blocking their drive might get them to see things his way, but then a lot of things people do leave me baffled. One of those baffling things is how any incident where the shootee is of a darker hue than the shooter is going to be cast in a Trayvon light now, such as the recent incident in Pasadena, which is just like the Trayvon Martin case, except for the fact that the dead guy was the suspect in an armed robbery call from a victim who had just falsely claimed that the guys who boosted his stuff had guns in hopes of a speedier response from the po-po. At this rate, anybody shooting anybody will be painted as another Martin/Zimmerman incident, no matter the level of guilt or innocence of either party, as long as the pigmentation differential slope between the participants runs in the right direction. Our local city government decided to make this past saturday night a "justice for Trayvon" memorial event. It really amazes me how many people don't realize that "justice" means allowing the legal system to do it's job and accepting the results. In this case, the DA decided there is not enough evidence to reasonably assure the guilt of Mr. Zimmerman. Innocent until proven guilty. Media hype and the public opinion of the media-fed masses is not proof. Arresting someone without proof of a crime being committed is not "justice". The other thing? "This throws into question the Florida Stand Your Ground Law." Who questions that? All the narrative after we actually started hearing details of the case is that Zimmerman was getting a handy beatdown. Folks better not have to rely on Stand Your Ground legislation when Sumdood is straddling one's stomach and raining fists down on one. I first HEARD of this case when the Brady's brought it to light. Questioning the Stand Your Ground law. We know THEIR veracity is sound, right? Even if the 911 operator HAD said "DO NOT FOLLOW THAT YOUNG MAN, AND THAT'S AN ORDER", it would add up to piddley-smurf. The 911 op has ZERO authority to tell a law abiding citizen (or anybody for that matter) what to do. Hell, neither does a police officer short of detaining someone for probable cause. The statists, of course, would like to give them that power, but I'm guessing most of those that argue that point aren't thinking about that and wouldn't like it if that really were the law. Certianly, we all WISH that Zimmerman had just politely driven away since that would have put an end to this crap before it even started. "At this rate, anybody shooting anybody will be painted as another Martin/Zimmerman incident, no matter the level of guilt or innocence of either party, as long as the pigmentation differential slope between the participants runs in the right direction." Well, yeah, sure. Haven't you been listening? No one "defends" him/herself from an attack by a darker skinned individual, he/she "guns him down." Darker kills lighter in an attempt at "social justice" and dark kills dark in frustration from racism imposed by lighter-skinned individuals. You have to keep up with the narrative or you'll miss that its all your fault. Reading the "30-year L.E. firearms instructor" post, I detect more than a bit of "only ones" in it. I'd be curious to know where 30-year thinks citizens' - excuse me, "some clown's" - responsibility ends and police responsibility starts. Are citizens allowed to ask questions of unknown passerby? Or, should we remain mute and just stand and point, hoping those whose gun-toting is taxpayer financed take the hint? I'll agree that wisdom will, in many cases, lead one to defer to the cadre of professionally-trained post-crime report takers, but without some degree of citizen involvement how is one to know when their expertise should be requested prior to the need for a report? Under our constitutional form of government (at least, while we still have one) power and authority resides in the hands of "We the People." "We the People" hire, and sometimes fire, agents to perform certain tasks for us because it is more efficient to have those tasks performed collectively rather than individually, and some tasks require a certain level of knowledge and specialization; just because we hire a plumber to replace a pipe does not mean that we are ignorant or incapable of the pipe replacement process, but that exigences of time, expertise and possession of certain tools makes it more productive for us to do so. In decades past a simple question or two - "Hello, can I help you find an address"? was indicative of both neighborliness and awareness rather than an attempt to incite. I suspect 30-year would prefer we engage his services at each intersection of neighbor and visitor, but that stands in contrast to how this country has worked for quite some time. 2) Your post contains another false dichotomy. Yes, you have the right to walk up to passers-by and initiate conversation; even ask them questions. Depending on the circumstances, it may or may not be the wisest thing to do. One would need to try very hard to not take that lesson away from the Zimmerman incident, and yet some folks appear determined to do just that. Let me ask you this question: Assuming arguendo that events went down just as Zimmerman described them and he is never charged with a crime, do you think it was worth it? How much money would it take for you and Zimmerman to trade places right now? For example, Skittles and Iced Tea. Trayvon had them, right? His reason for being out was because he was walking home from the convenience store and according to some accounts, the kid died with them in his hands. Gospel. The Truth, the Way, and the Light. 'Cept, the only people to claim that are T-bird's parents. So far, there has been no police report confirming this, no receipt splashed across the front page of the NY Times proving Martin had recently purchased these wares, no security camera footage of him perusing the aisles of sugary goodness. But Skittles and Iced Tea are now synonymous with this tragedy. I'm not saying he didn't. I don't know if the cops routinely make a detailed list of everything in the recently deceased's pockets down to lint type and ticket stubs, so it's possible they discard such trivialities. But for something so important to the canon of this travesty, you'd think there'd be at least a bit of proof. Lefties are also trying to claim that there's some standard neighborhood watch procedure that Zimmerman allegedly violated. A lot is being dragged in that really has nothing to do with the central question of whether or not Zimmerman was justified in shooting Martin to death. Martin's school record, Zimmerman's credit record, Skittles, neighborhood watch "procedure"... None of that bears on the central question, but indeed clouds the issue as both sides try to portray "their" guy as a white hat and the other guy as a nogoodnik. Tam, I agree that, had he known how things would turn out, Zimmerman would probably have driven rapidly in the other direction. And, it's not at all unreasonable to envision a negative turn of events in situations such as this. Last I heard, you travel heeled because you have no way of predicting what untoward interactions may develop, nor how those interactions will proceed. Wisely, you actively seek to avoid interactions that possess the potential for negative outcomes. That is a very reasonable and prudent mindset, and something all of us should bear in mind. I suspect Mr. Zimmerman may wish he had. There's a very large information gap between the time point of Zimmerman talking to Sanford PD dispatch and a shot being fired, so we're working in the dark. Zimmerman may have approached Martin as a shy choir boy offering to help carry his Skittles, Martin may have responded in a particular manner because he was in fear for his life for whatever reason, or something else entirely occurred. We just don't know, and there's a chance we'll never know exactly what happened. My point is that we do not have to, nor should we, continually defer to the Bastions of Official Authority; we live in communities, and have a vested interest in their peacefulness and security. Police agencies play a substantial role in achieving those conditions, as do we citizens who live in or visit the communities. That said, as Joseph pointed out so succinctly, prudence in our actions is warranted, even more so in some cases. But, even though it is prudent to not step off the curb into traffic despite having the right-of-way, that doesn't mean we forego crossing the street, it just means we respect the powers and risks involved when we do so and act accordingly. In the story about the Pasadena incident, this line stood out :"McDade was said to have moved his hand towards his waistband, which provoked the police officer to shoot".From what I've seen, most young black men have to hold their pants up to walk, so they are constantly moving their hands toward their waistband. So, Tam we should not initiate a citizen/ neighborhood watch and the time and energy, of that limited resource I call my life, that I exchanged for the dollars to buy my property is not worth defending? Every one is ass-u-me-ing that Zimmerman followed to confront, it is possible he was just trying to keep an eye on the kid Travon, Who the noticed Zimmerman and decided to stop and confront the guy following him and a confruntation ensued. I work nights as a security guard non-commissioned (unarmed). Observe and report. I have the benefit of a uniform and I have still been confronted and accused of profiling when a try to keep track of everyone that I don't know that passes through my property. But why are we arguing about this? This is between the state of Florida and the parties involved. This has nothing to do with us no matter what the media wants to believe. As other have pointed out, Hindsight is always 20/20, and it's easy to second guess the man on the ground. If the kid had been up to know good Zimmerman had just let him go, and we found out about it we all be bitchen about why didn't he do something. I am working on a Trevon post from my own personal POV (like anyone cares :) ) and one of the things I found was that the atmosphere of fear in Zimmerman's GATED NEIGHBORHOOD has been growing as related by this article: Zimmerman's decision was not made in a vacuum. The neighborhood has been under a low-level attack by young black youths for over a year. We can all judge his decision to exit his vehicle - but in doing so, we need to try and understand why his neighborhood even felt the need to have an armed neighborhood watch. What I see going on in the "professional agitator" community - Sharpton, Jackson, Black Panthers (to name just a few) is a bizzar desire to relive the race riots of my youth and to make Martin's killing as the trigger. I was downtown Detroit in the summer of '67 when it exploded - as did every major city at that time. These race-baiters seem to want death and destruction, to see miles of cities up in flame and conflict between the races like we haven't seen in over 40 years. If they keep raising the level of aggitation, they may well get just that. We are tetering on the very edge of yet another plunge into that chaos with summer fast approaching, a President who seems to be egging the process on, with the Black Panther's placing wanted posters across the nation and with a young, black segment of the population that seems all too willing to blame the "rich white guy" down the road for his lack of Nikes, ipods, a job and any other ill he/she seems to see . . . Unless these black racebaiters roll back the rhetoric - and fast - we will see race riots this summer the likes of which most have not seen (or have gratefuly tuck into the far recesses of their memory). It's not going to be pretty Tam!! "So, Tam we should not initiate a citizen/ neighborhood watch and the time and energy, of that limited resource I call my life, that I exchanged for the dollars to buy my property is not worth defending?" Only someone who either never read anything I wrote, has shockingly poor reading capabilities, or is being willfully obtuse could draw that conclusion from any of my posts or comments. "Every one is ass-u-me-ing that Zimmerman followed to confront, it is possible he was just trying to keep an eye on the kid Travon, Who the noticed Zimmerman and decided to stop and confront the guy following him and a confruntation ensued." Speaking of "ass-u-me", show me where I said that? I have frequently referenced that Z. followed to keep M. in sight. Anyone who says they "know" who started the confrontation is talking out their ass. "But why are we arguing about this? This is between the state of Florida and the parties involved. This has nothing to do with us no matter what the media wants to believe." Jesus Christ on a turbocharged motorbike! Is there an echo in this place, or what? I've only been saying that for a frickin' week now. For those that consider this incident a failure of "Stand Your Ground" law, one quip. "When seconds count, the cops are minutes away." I thought the 911 dispatcher forgot to mention to Zimmerman -- "We are on the way. We will take care of it." I figure that getting folks out for Neighborhood Watch only occurs in neighborhoods with an ongoing problem. The kind of problems that the police haven't taken care of. The Watch, in theory, should be spotters and inform the police of problems, then let "justice" take it's course. Walking (or driving) through a neighborhood with active Neighborhood Watch folk and signs should raise a yellow flag for anyone, resident or not, that there are problems and people are watchful and suspicious of outsiders and of "suspicious" behavior. That is, keep your nose clean, respect the concerns of the residents, keep it polite and quiet. Did Zimmerman believe the police were not on the way? Was Miller doing something that raised above the Neighborhood Watch threshhold, or that Zimmerman might have been wary of? Why was Trayvon walking through a "gated community" at night? Would Trayvon, at any time, have stopped beating the old guy to death, merely because the guy wasn't African American? I dunno. It happened in Florida, I won't be setting on any jury or Grand Jury. And I don't see myself "gunning" for anyone. But setting one's self above the law, like the hate mongers, doesn't seem to settle any issues. "McDade was said to have moved his hand towards his waistband, which provoked the police officer to shoot".All I get out of this is the Police always have a good excuse... I wonder how it would have worked for Zimmerman... He went for his waitband so I shot him>>> "By calling, giving a description, waiting for the heat to show, and then saying "He went that-a-way!", he would have totally discharged his neighborhood watch duties." So, what do think his duties as a neighborhood watch intell. You can't watch what you loose sight of. (And Yes I acknowledge you have sad that he was probable just following to keep an eye on him. But in this you seem to be implying that he should of known that the best option was to just wait for the cops.) "Joseph said...Much like a pedestrian crossing a busy intersection, just because you have the right of way, doesn't make it worth stepping off the curb." "Tam said...Joseph, Thank you for summing up in a sentence what I've been fumbling around for whole paragraphs trying to say." So, should we or should we not take the time to try to defend our life and property. There are no guaranties in life that the actions we take will lead to the results that we seek. The sentament in these comments seem to me to be it's not always worth practicing Self-defense, but when do we figure this out before or after the fact. Ok, the everyone assuming coment was a little broad, mostly directed at the Media coverage (which I didn't make clear) and a setup for the following two sentences and the next pargraph. "Jesus Christ on a turbocharged motorbike! Is there an echo in this place, or what? I've only been saying that for a frickin' week now." - Tam I didn't write this post. Just because the media acts the jackass doesn't mean we have to respond to it. For those of you out there who always wondered how a card-carrying Communist like Lee Harvey Oswald was magically transformed into a Right-Wing Death Beast and tool of the military-industrial complex, take notes. We're witnessing the process in real time. Tam- yes, that has to be the standard. You have to see the gun. Or anybody could call up the cops and say "He's got a gun!" and then get them shot. The standard for officers should be HIGHER than normal folks. Just because I'm told so and so has a gun, doesn't mean they are telling the truth. I'm holding fire until I see it. I'll have my gun out, but I won't fire until I confirm not only they have a gun, but they are attempting to point it at me or somebody else. There is no defense to what those officers did, except for the public's misperception that officers can do no wrong, and except for blatantly murdering somebody. There is no reasonable man who would shoot just because they were told the guy had a gun without seeing it first. Have you not listened to the call or read the transcripts, then? (Tam) I have to both, and I'd like to point out that Zimmerman's reply was "OK", and within a few seconds it sure sounds like he stopped moving and concentrated on his conversation about the rendezvous with the police on the way. And being worried that Martin, who he'd lost sight of, might be listening. I suspect that's why at the end he didn't agree on a fixed place to rendezvous but rang off and presumably kept on moving. It's a real pity he didn't keep the police on the line because then we might know who initiated the confrontation. The more I hear about the Trayvon Martin thing, the more inclined I am to beleive that I probably owe Zimmerman an apology for my original reaction to this thing. Lesson learned. I keep thinking abotu the hypothetical you put up the other day about wading into a fight between a bunch of twelve year old girls, Tam, and your comment about the Kobayashi Maru. It fits perfectly in this case, too, and in any case going forward where a white person finds themselves forced to choose between saving their own life by using lethal force, or letting themselves getting beaten or killed because the downside to that is far less severe than having your family's addresses posted publicly with the expressed intent of ensuring that someone does them harm. THat being said, I think we can all learn something about this situation, which is to say that unless you have a badge and the qualified immunity that goes with it, you're best to hang back and/or retreat unless someone's life is literally about to end and you can do something about it. One more thing - as much as i am not a "there oughta be a law!" type person, i am truly growing tired of reading stories where people are shot by police officers because their "hand went down to their belt area". I've never kept track of my hands and how many times per day they go down to my belt area, but given as that's sort of their default position just by nature of my being a normally proportioned human being, I would guess it to be a lot. Pastor Creach here in SPokane was killed because he had the audacity to have a gun on his own property. It was in his belt, in full view of the officer, and after the officer hit the 72 year old man in the knee with his baton, he fell to the ground. The officer said that the old man's hands went to his waist (after being hit in the kneee with a baton, I doubt the old man was keeping track to be honest). So the officer ten ringed him. There really ought to be a law against shooting a person because his hands were near his belt. The officers have the advantage. Guns already drawn. Body armor. I doubt very much that we're talking aobut a huge amount of risk to them to wait one more split second to make sure he's not just adjusting his balls before putting a round through him. If you're so damned scared of the average citizen (and their dogs, too) that you have to shoot them over a hand movement, just to be safe, then find another line of work. Chef: Never get out of the boat. Never get out of the boat. I gotta remember. Never get out of the boat. Never get out of the boat. Phillips: What happened? How many is it? Chef: A fuckin' tiger! Clean: What? Chef: A fuckin' tiger. Phillips: Tiger? Now that really is some just step off the curb with out check both ways because you have right of way thinking. There was an armed robery of the IHOP on my property a couple weeks a go. I need to make contact as to gather info for my report. Do I walk up on the blindside of the Cruser, trusting the armed officer that is dealing with an armed robery suspect will if startled by me make the right choice of not shooting me. Or, do I walk slowly wide around the vehicle keeping my hands in site, can't see into the cruser as the light are flashing in my eyes. Officer notice me calls me over I get my info, I go on about my merry way. Ever hear of the OODA Loop? (observe, orient, decide, and act) Waiting to see the gun puts you at the observe portion of the loop where your possible assailant is already possible at act. Hands kill. It is just common courtesy when two unknown possible armed individual meet that the hands stay in sight. It is the whole purpose behind shaking hands, we really have lost the finer details of armed interaction. I have in this case made the argument that in order to be a good witness, you have to actually witness stuff. Sometimes that stuff moves and necessitates you moving your vantage point in order to continue to be a good witness. I also can see the point of not leaving the boat. Not stepping off the curb into the busy street is safe advice. But...... Most neighborhood watch programs I have seen consisted of people 'walking' through their neighborhood. In groups for sure, but still they were not watching the neighborhood while driving around in cars. If that is how Zimmerman performed his duties when doing his neighborhood watch thing - then that would set a baseline in his mind for what or where or how he would actually go about doing that neighborhood watch thing. In other words, looking at suspicious people while on foot, and not inside a vehicle, would not be abnormal. It's possible that because of that 'standard mode of activity' it would never have crossed his mind to remain in the car. I have a VERY close personal connection to the Pasadena Police Department, and heard of the Mcdade shooting in the immediate aftermath before it went national. As you might expect one of the things that came up was that it would be compared to the Martin shooting if it hit the national media. Once again we are seeing judgements passed by people with very limited knowledge of an event (Leatherwing, OtherWhiteMatt & Goober among them). Having done this job for 27 years, I would like to put in a couple of thoughts. For one, there is a considerable difference in responsibility between having a weapon on you in the event that it might be needed to preserve your life and carrying a weapon as someone who is paid to and expected to go where most do not want to go and do what most do not want to do. You cannot compare the two situations because the only similarity is that a young black man was shot (something that happens weekly here at the hands of other young black men, but we don't want to talk about that). Second, unless you've seen the elephant, stop trying to second guess what someone else did in a deadly force encounter, be it Zimmerman or the two Pasadena officers. I'll tell you this, all that stuff you hear about tunnel vision, auditory exclusion, tachypsychia, etc. is true times ten. Life as a cop is not "Gunsmoke" and we don't give them first shot if we can help it. Does the fact that I'm wearing a vest mean that I should take at least one bullet before returning fire? Damn, I hope the bad guy is good enough to make a for sure ten- ring shot or he might hit me someplace not covered by kevlar. Goober, where did you get the information that their guns were already drawn? Maybe they were or maybe they weren't but if they were, it was because they were told that the suspects were armed and only a fool approaches an armed criminal with his gun in his holster. I knew that they were looking at arresting the RP for Involuntary Manslaughter, because his story that Mcdade and his accomplice were armed had a lot to do with the mindset of the officers on their approach. Oh, and as to shooting someone "because his hands were near his belt" was not what happened there. As in the Trayvon Martin case, you should wait for the facts to come out. Those officers are undergoing hell right now (self-inflicted and otherwise) and it's no guarantee of skating just because you have a badge. Montie,Not sure what judgement I passed, other than that it's a bad idea to wear pants that won't stay up. The waistband clutch to hold up your pants looks a lot like grabbing something in the waistband. My point is that young black men might want to start cinching up their pants for their own safety. I rather like the no belt, pants too big style. It often turns what might be a long foot pursuit into a short foot pursuit ending in watching the suspect trip and fall when his pants drop to his knees. Somehow, the suspects have stayed the same age while I have gotten older and I can use the help these days. :)
Body and organ growth in the newborn rat. Body and organ growth were described in rat pups 1 h and 10 days of age. Several organs (e.g., brain and pineal gland) exhibited significant growth in 1-hour-old but not in 10-day-old rats. Further, organs such as the testis and liver showed significant growth in 10-day-old but not 1-hour-old pups. 11 h of exposure to a warming oven, devoid of maternal and nutritional input, significantly influenced the body and organ growth of both newborn and 10-day-old pups. These data show that the first 12 h of life is an active period of growth for the rat.
Stanford rally has UW reeling Stunning turn in last second, OT sends Huskies to 2nd loss in row Published 10:00 pm, Sunday, January 29, 2006 PALO ALTO, Calif. -- There was no actual hard copy of Washington's three-goal checklist. As Brandon Roy said, it was in the Huskies' mental Rolodex. Real or imagined, Stanford ripped it to shreds Sunday night. It was all checked off, too. Chris Hernandez, who was fouled while trying to launch a desperate 3-pointer by the Huskies' Justin Dentmon with a bare two-tenths of a second remaining in regulation play, sank three free throws without flinching, and the Cardinal used this golden reprieve to pull out an improbable 76-67 victory in overtime at Maples Pavilion. For the second consecutive game, opposing fans stormed the floor and celebrated at the expense of the UW (16-4 overall, 5-4 Pac-10), which was swept on a conference road trip for the first time in two full years -- since dropping another pair in the Bay Area. After beating Gonzaga for the first time in seven seasons and toppling UCLA at Pauley Pavilion for the first time in 19 years, the Huskies couldn't secure the third objective on their regular-season wish list. Instead of pocketing their first win at Maples in 13 seasons, they went home with a devastating loss. "It's important at this point that we don't take a nosedive," UW coach Lorenzo Romar said, his team dropping to fifth place in the league standings. "I've seen teams not recover from it." Trailing 63-60 with 2.1 seconds remaining, the Cardinal (10-7, 6-3) kept this one going with a perfectly executed play: Dan Grunfeld inbounded to 6-foot-11 center Matt Haryasz at midcourt, and Haryasz turned and rifled a pass to Hernandez, streaking down the right side to the 3-point line. Dentmon, the UW's freshman point guard, hacked Stanford's senior guard a few ticks before the buzzer sounded. "We call it 'Home run,' " Haryasz said. "We've been working on it for two years and never really done it," Hernandez said. "Chris beat his man," Haryasz added. "Chris made the play." Hernandez, a career 85-percent foul shooter, swished the first two attempts before rattling in the third and tying shot. He admitted to saying a prayer before facing the ultimate pressure situation. He also mentioned that this wasn't new to him, that he had hit several last-second free throws dating back to high school. His teammates never doubted the clutch, competitive senior. Hernandez went 9-for-9 from the foul line for the game and finished with 15 points. "When Chris went to the line, Danny said, 'What's up?' " Haryasz recalled. "I said, 'Chilling. Chris is going to make them and we're going to overtime.' " He did, and they did. Stanford scored the first five points of overtime, and the shocked Huskies had nothing more to give. "I don't think it crossed my mind that we were going to lose that game," said Roy, who led all scorers with 25 points. The Huskies had expected this last-second play. They talked about it. They didn't stop it on multiple fronts. In hindsight, they would have preferred that Hernandez take the 3-pointer unchallenged. Dentmon was in such agony over the game-extending play, he was the last one out of the shower and the last player to leave the locker room. He repeatedly huddled with all of his coaches and support personnel. "It was a dumb foul," the dejected first-year player said quietly. "I thought I fouled him after the buzzer. The camera showed I didn't. It was a mental mistake. I've just got to put it behind me. I became a man tonight. It'll just make me stronger." The Huskies led nearly the entire game, by as many as eight on several occasions, before facing the harried finish. Inside the final 5.9 seconds, the teams combined to call seven timeouts, plotting and plotting. Trailing 61-60 and going for the game-winner, Seattle native Mitch Johnson of the Cardinal tried to force one into Haryasz and threw it to Roy. The game appeared over at that point. Grunfeld wisely fouled Roy with 2.1 seconds remaining. Roy made both foul shots. Then came the "Home run." Out went the checklist. "For the first time in basketball, I felt sorry for myself," Roy said.
725 N.W.2d 703 (2007) STATE of Minnesota, Respondent, v. John Jason McLAUGHLIN, Appellant. No. A05-2327. Supreme Court of Minnesota. January 11, 2007. *705 John M. Stuart, State Public Defender, Davi E. Axelson, Assistant State Public Defender, Minneapolis, MN, for Appellant. Lori Swanson, Minnesota Attorney General, John B. Galus, Assistant Attorney General, St. Paul, MN, Janelle Kendall, Stearns County Attorney, St. Cloud, MN, for Respondent. Heard, considered, and decided by the court en banc. OPINION ANDERSON, PAUL H., Justice. Fifteen-year-old John Jason McLaughlin was tried as an adult and convicted for the murders of two fellow students whom McLaughlin shot at Rocori High School in Cold Spring, Minnesota. After a bifurcated trial at which six expert witnesses testified regarding McLaughlin's mental health, the Stearns County District Court declined to excuse McLaughlin from criminal liability. The court found that McLaughlin knew it was morally wrong to shoot the victims and concluded that McLaughlin therefore failed to establish a mental illness defense under the M'Naghten rule codified at Minn.Stat. § 611.026 (2004). Following his conviction, McLaughlin appealed to this court. On appeal, he argues that in light of recent brain development research, the M'Naghten rule violates the Due Process Clause of the Minnesota Constitution as applied to adolescent defendants. McLaughlin also argues that the district court abused its discretion by denying a mid-trial continuance he sought in order to produce a rebuttal witness and by imposing permissive consecutive sentences for his two murder convictions. We affirm. Appellant John Jason McLaughlin was charged in Stearns County with first- and second-degree murder in the deaths of two fellow Rocori High School students — Seth Bartell and Aaron Rollins. He was also charged with possession of a dangerous weapon on school property. The district court tried McLaughlin, who was 15 years old at the time of the murders, as an adult and found him guilty of all three counts following phase one of a bifurcated bench trial, during which the following facts were established. On September 24, 2003, McLaughlin loaded his father's semiautomatic .22 caliber pistol, put it in a gym bag, and brought it to school with the intention to "shoot some people." Specifically, McLaughlin intended to "hurt" fellow ninth-grader Bartell, who, according to McLaughlin, was one of the students who teased him "all the time." Bartell and McLaughlin were in the same physical education *706 class. Shortly before that class was to start, McLaughlin brought the gun to the boys' locker room and cocked it in the bathroom so no one would see it. He then hid the gun in his gym bag, sat on a bench, and waited for Bartell. Other students were getting ready for class in the locker room at this time. McLaughlin asked one of these students, R.S., where C.E., another student in the physical education class, was. R.S. responded that C.E. was gone that day.[1] Shortly thereafter, R.S. left the locker room with Bartell, who had changed clothes in an area of the locker room that McLaughlin could not see. McLaughlin followed R.S. and Bartell out of the locker room and into a hallway, where he fired the gun at and hit Bartell. Bartell grabbed his left side as he and R.S. continued down the hallway toward a staircase leading to a gymnasium. Meanwhile, McLaughlin cleared a jam in the gun and reloaded it. Before Bartell and R.S. reached the stairs, McLaughlin fired a second shot in Bartell's direction; this shot missed Bartell, but hit fellow student Aaron Rollins, who was walking toward McLaughlin. Rollins raised his hands toward the wound in his neck and as he started falling, said, "[h]elp me, I'm hurt. Help me, I've been shot." As R.S. and Bartell climbed the stairs, Bartell lifted his shirt and said to R.S., "Look, I'm shot." R.S. and Bartell continued up the stairs and into the gym, looking for their physical education teacher. Shortly thereafter, McLaughlin entered the gym and approached Bartell. When McLaughlin was approximately two feet from Bartell, who had turned to face him, McLaughlin shot Bartell a second time, this time hitting him in the forehead. Student witnesses estimated that the gun was anywhere from one to eight inches from Bartell's head when McLaughlin pulled the trigger, but a forensic expert determined that the distance was approximately 18 inches to three feet. Bartell collapsed instantly, and McLaughlin started to walk away. Physical education teacher Mark Johnson was completing some paperwork in the gym when McLaughlin shot Bartell the second time. As McLaughlin walked away from Bartell, Johnson stood up from his seat in the bleachers and first began to walk toward Bartell, and then toward McLaughlin. After Johnson took two or three steps toward McLaughlin, McLaughlin raised the gun and pointed it at Johnson. Johnson stopped immediately, raised his hand, and said "no" in a loud voice. McLaughlin then lowered the gun, ejected the remaining shells onto the floor, and dropped the gun. Johnson picked up the gun, grabbed McLaughlin by the wrist, and took him to the school office. Shortly thereafter, law enforcement officers arrived and transported McLaughlin to the police station. While the officers dealt with McLaughlin, emergency response personnel attended to Bartell and Rollins. Attempts to revive Rollins through CPR were unsuccessful, and he was declared dead upon arrival at a St. Cloud hospital. Bartell underwent surgery soon after he arrived at the same hospital, but remained unconscious until his death 16 days later. In an interview with Bureau of Criminal Apprehension (BCA) Agent Ken McDonald immediately after the shooting, McLaughlin initially admitted shooting Bartell in the basement, but moments later, he said that he thought his first shot missed Bartell. McLaughlin told McDonald *707 that once he reached the gym, he "shot [Bartell] again" from a distance of five to six feet. When asked where he shot Bartell, McLaughlin responded, "I don't know, I think right here," and pointed toward his shoulder. McLaughlin told McDonald that he did not think he shot anyone other than Bartell, but he acknowledged that he might have, "if [he] missed, maybe." Midway through the interview, McDonald learned that one of the victims had died. When he relayed this information to McLaughlin, McLaughlin started to cry. McLaughlin denied wanting to kill or "seriously hurt" anybody and told McDonald that he "was just trying to hurt [Bartell] like he hurt me." He said that he did not think a .22 gun would do "very much" harm.[2] McLaughlin also told McDonald that he started thinking about bringing a gun to school approximately one week earlier. He also said that two days before the shootings he checked the school for metal detectors and security cameras. Toward the end of the interview, McDonald asked McLaughlin, "Do you think you did something wrong today?" McLaughlin replied, "[y]eah." McLaughlin told McDonald that his trouble with Bartell began in sixth grade, and that he was teased "basically about [his] zits and stuff." Of the 12 students who testified at McLaughlin's trial, including several of McLaughlin's friends, only two told the district court that they had ever observed any conflict between Bartell and McLaughlin. The conflicts these witnesses described involved pushing, yelling, and "talking," but not Bartell calling McLaughlin names or teasing him about his acne or anything else. Two students testified that C.E. called McLaughlin names such as "fag" and "asshole." But these witnesses qualified their testimony by stating that C.E. teased "everybody else" in the same manner, that C.E. was "just a kidding type of guy," and that the conflict between C.E. and McLaughlin was "nothing major." A third witness remembered one instance in which C.E. pushed McLaughlin out of the way by McLaughlin's locker, and McLaughlin responded by acting as if it did not happen. The student who said he only saw Bartell and McLaughlin "talking" apparently testified to the grand jury that McLaughlin "was teased almost every day or every other day" and that "[Bartell] and his friends would go up to [McLaughlin] and they would just push him around." On cross-examination, this student agreed with defense counsel's statement that "[your grand jury testimony] was based mainly on rumors that you had heard." Another witness admitted on cross-examination that she had heard stories from other students about McLaughlin being teased, even though she never saw it happen. Defense counsel read from a statement this same witness gave to BCA agents on the day of the shooting, in which she said that McLaughlin "was a pretty good person and he got teased for a lot of things, for just a lot of things." B.K., who knew McLaughlin since elementary school and developed a friendship with him in middle school, told the court that she exchanged e-mail messages with McLaughlin during the summer before ninth grade and after the school year started. During this time, McLaughlin told B.K. that he had a girlfriend named Suki Renoko, and he asked B.K. if she would exchange e-mail messages with Renoko. B.K. began to correspond with Renoko, *708 but she soon became suspicious that there was no such person and that Renoko was actually McLaughlin. She testified that the messages contained overly personal questions that typical 14-year-olds would not ask and had the same spelling errors as McLaughlin's messages. In one message from "Renoko," McLaughlin characterized himself as a "sniper." In another, he described an incident in which he cut the face of someone who stabbed his sister. Before classes began on the day of the shooting, McLaughlin e-mailed B.K. under his own name and wrote, "befor[e] [I] go to[o] far [I] have to ask you not to tell any one about this not the news cops or parents ok * * * so [I] guess this is goodbye my love." B.K. did not receive this message until after the shootings when she returned home from school. Approximately six months after the shootings, the Stearns County Juvenile Court certified McLaughlin to stand trial as an adult. McLaughlin appealed the certification to the Minnesota Court of Appeals, which affirmed the certification order. The parties then agreed to a bifurcated bench trial in which McLaughlin would stipulate to guilt in the second-degree murder of Rollins during the trial's first phase and would attempt to prove a mental illness defense during the second phase. There was no stipulation as to Bartell. At the close of the first phase, the district court found McLaughlin guilty of first-degree murder in Bartell's death, second-degree murder in Rollins' death, and possession of a dangerous weapon on school property. In the second phase, the court heard testimony from six mental health experts — three retained by McLaughlin, one by the state, and two by the court. McLaughlin's Experts McLaughlin's first expert witness was Dr. Maureen Hackett, a forensic psychiatrist. Hackett was retained by the defense to evaluate whether McLaughlin was competent to stand trial and whether he qualified for a mental illness defense.[3] Hackett diagnosed McLaughlin with "a severe thought disorder best described as schizophrenia, paranoid and disorganized type" and also with "cognitive impairments." Hackett told the district court that McLaughlin began hearing a voice starting in sixth grade, and that he attributed the voice to Bartell teasing him. She said that while McLaughlin was confined at the Prairie Lakes Youth Programs facility following the shootings and during his certification hearing, he began to associate the voice with a visual hallucination — a person he ultimately called "Jake."[4] Hackett told the court that it is common for children with schizophrenia to experience visual hallucinations. Hackett described McLaughlin as "becoming pretty isolated" in sixth grade, which is consistent with the "socially avoidant" behavior of schizophrenics. She said that one of the causes of this socially avoidant behavior is egocentrism, or being "within [one's] own head" — a quality she *709 observed in McLaughlin. She explained that McLaughlin's excessive egocentrism led him to develop a "grandiose view of himself," as reflected in his "sharpestshot 290@[____].com" e-mail address, the Suki Renoko messages, and stories McLaughlin made up to "make himself look better than what he was." According to Hackett, McLaughlin told her that Bartell teased him a "very great amount of time, * * * somewhere around 60 times just in eighth grade and beginning of ninth," and that the teasing centered on McLaughlin's acne and possibly on his height. But Hackett "found that * * * [McLaughlin's] perception of being teased was way outside of the reality of what other people had said," given that "there [were] very few statements of anyone even seeing him being teased." Hackett characterized the teasing McLaughlin described as "a persecutory delusion," symptomatic of schizophrenia. In her report, which was introduced into evidence, Hackett concluded: At the time of his actions and as a direct result of his mental illness, Jason McLaughlin suffered a defect of reasoning and a serious distortion of reality so that he did not know the nature of his act. * * * * It is my opinion that Jason McLaughlin did not know the nature of the act constituting the offense for which he is charged and thus he did not appreciate and he did not know the wrongfulness of his actions on September 24, 2003. McLaughlin's second expert was Dr. Richard Lentz, a psychiatrist. Lentz told the court that he was retained by McLaughlin's family to treat McLaughlin while he was being held at Prairie Lakes, but not to conduct a forensic evaluation. Lentz said that he diagnosed McLaughlin with schizophrenia, predominantly paranoid, and that McLaughlin's Minnesota Multiphasic Personality Inventory test results were "overwhelmingly compatible" with that diagnosis. He said that McLaughlin suffered from delusions, including a delusion that "Bartell was trying to make himself look good * * * by making [McLaughlin] look bad," as well as an olfactory hallucination of metal, and visual and auditory hallucinations involving Jake.[5] Lentz stated that he prescribed medication to McLaughlin to treat the schizophrenia, and that after McLaughlin started on the medication, his hallucinations decreased. Lentz also told the court "it would be virtually impossible [for McLaughlin] to malinger" his hallucinatory symptoms.[6] Lentz offered no opinion on whether McLaughlin would meet the M'Naghten standard. McLaughlin's third and final expert was Dr. James Gilbertson, a forensic psychologist, whom McLaughlin retained to evaluate whether he should be certified as an adult. Gilbertson told the court that at the time of certification, he diagnosed McLaughlin with a psychotic disorder, not otherwise specified because McLaughlin's symptoms were not sufficiently longstanding to support a more specific diagnosis. Gilbertson said that he subsequently concluded that McLaughlin was a paranoid schizophrenic. He testified that McLaughlin's mental illness "robbed him of good insight, compromised his judgment, prevented him from looking at other *710 options, [and] reduced his impulse control" — and that but for his mental illness, McLaughlin would not have committed the shootings. Gilbertson also stated that McLaughlin's inability "to adequately control his behavior at the time [of the offenses]" may have helped McLaughlin "defen[d] against culpability" in some states. But in relation to the M'Naghten test, Gilbertson said, "the totality [of the evidence] convinces me that [McLaughlin] was aware of the nature of his act, the outcome of his act, and that it was morally wrong." State's Expert Dr. Katheryn Cranbrook, a forensic psychologist, testified for the state. The state retained Cranbrook to evaluate McLaughlin for the certification process and, later, to evaluate whether McLaughlin met the M'Naghten standard. Cranbrook told the court that at the time of certification, she diagnosed McLaughlin with an emerging psychotic illness — specifically — "psychotic disorder not otherwise specified" — because his symptoms did not meet the diagnostic criteria for schizophrenia. But when she met with McLaughlin approximately 19 months later to conduct the M'Naghten evaluation, she said McLaughlin "actually looked much better," and she would not have expected to see such improvement with someone suffering from a psychotic disorder — particularly McLaughlin, who had stopped taking antipsychotic medications approximately four months before she evaluated him the second time. Cranbrook said that in her opinion, at the time of the M'Naghten evaluation, McLaughlin was suffering from a major depressive disorder and, likely, an emerging personality disorder. As to some of the symptoms observed by other experts, Cranbrook told the district court that McLaughlin was malingering. She stated that the onset of schizophrenia at McLaughlin's age was uncommon, that "positive" symptoms such as hallucinations — which are well known as easy to feign — generally appear after a group of "negative" symptoms that McLaughlin did not display, and that a notable discrepancy occurred between the symptoms McLaughlin reported and the behavior others observed. Cranbrook concluded, to a reasonable degree of psychological certainty, that McLaughlin knew the nature of his criminal acts and knew that the acts were legally and morally wrong. She based these conclusions on the facts that, among other things, McLaughlin had completed firearms training and knew that weapons were dangerous, he expected to be charged with assault with a deadly weapon, and he did not want his parents present during the interview with BCA Agent McDonald because he was worried they would be upset with or angry at him. Rule 20 Examiners Dr. Michael Koch and Dr. Kelly Wilson completed a combined Rule 20.01/20.02 evaluation of McLaughlin.[7] Koch, a psychiatrist, testified that his role was to determine whether McLaughlin was competent to stand trial. Koch said he diagnosed McLaughlin with a depressive disorder in remission and an emerging personality disorder. He said that while other mental health professionals diagnosed McLaughlin as schizophrenic, Koch rejected this diagnosis for several reasons: (1) McLaughlin's mental health appeared to improve steadily after *711 McLaughlin stopped taking antipsychotic and antidepressant medications; (2) staff at the St. Peter Security Hospital — where McLaughlin resided for 55 days during the Rule 20 evaluation period — did not see any evidence of psychotic behavior; and (3) McLaughlin's self-reported auditory, visual, and tactile hallucinations were inconsistent with the typical experience of schizophrenic patients. Koch also testified that he thought it was likely that McLaughlin was malingering. Dr. Wilson, a forensic psychologist, evaluated McLaughlin to determine whether he met the M'Naghten standard. She told the court that she agreed with Koch's diagnosis that McLaughlin was suffering from a major depressive disorder in remission and an emerging personality disorder. She said that to a reasonable degree of psychological certainty, she believed that McLaughlin knew the nature of his criminal acts at the time he committed them. The "plethora of evidence" Wilson cited to support her conclusion included McLaughlin's statement after the offenses that he intended to "shoot some people"; his identification of particular targets he "felt deserved to be wounded"; and his awareness of the dangers of a loaded gun, as revealed by his efforts to "make sure the weapon didn't discharge prematurely." Wilson also cited the fact that McLaughlin never denied knowing what he was doing. Dr. Wilson further testified that to a reasonable degree of psychological certainty, she believed that McLaughlin knew the legal and moral wrongfulness of his criminal acts. With regard to legal wrongfulness, Wilson cited McLaughlin's assumption before the shootings occurred that he would be charged with assault with a deadly weapon. Wilson also told the district court that McLaughlin reported thinking about going to jail and concluding, based on television shows he had seen, that it "would[n't] be that bad." Finally, Wilson cited the e-mail McLaughlin wrote to B.K. on the morning of the shootings, in which he asked her not to speak to people. As to evidence that McLaughlin knew the moral wrongfulness of his acts, Wilson cited "a big disconnect between the severity of the actions [McLaughlin] chose to do compared to what his perceived problem was," and her assessment that "from what [she had] seen and * * * gathered from [McLaughlin]," McLaughlin "definitely had instilled in him a strong moral framework." After six days of testimony in the mental illness phase of McLaughlin's trial, the district court concluded that McLaughlin could not be excused from responsibility for the crimes he committed because he "had cognitive awareness that shooting the victims was morally wrong." The court based its conclusion on the following findings, among others: The expert witnesses disagreed about the nature of [McLaughlin's] mental impairment, if any, on September 24, 2003. Only one expert expressed an opinion that [McLaughlin] had a mental illness that was so severe as to meet the M'Naghten standard. However, the Court does not attach weight to that opinion in light of the undisputed evidence of [McLaughlin's] acts in September of 2003, as well as [McLaughlin's] statement to Agent Ken McDonald immediately following the shooting. At the end of a sentencing hearing that included expert testimony on bullying, the district court imposed a life sentence for the death of Bartell, to be served consecutively with a 144-month sentence for the death of Rollins. Citing State v. Warren, the court concluded that the mitigating and aggravating factors "balance each other" and that consecutive sentences were "proportional to other sentences given for *712 similar conduct." 592 N.W.2d 440, 452 (Minn.1999). Following his trial, McLaughlin appealed his convictions and sentences to our court. I. McLaughlin's first claim on appeal is that the M'Naghten rule violates the Due Process Clause of the Minnesota Constitution as applied to adolescent defendants. The M'Naghten rule is codified at Minn.Stat. § 611.026 (2004), which provides, in relevant part: [A] person shall not be excused from criminal liability except upon proof that at the time of committing the alleged criminal act the person was laboring under such a defect of reason, from one of these causes, as not to know the nature of the act, or that it was wrong. See State v. Finn, 257 Minn. 138, 140, 100 N.W.2d 508, 510-11 (1960) (recognizing the codification of the M'Naghten rule). The constitutionality of a statute is a question we review de novo. State v. Barnes, 713 N.W.2d 325, 330 (Minn.2006). A party who challenges a statute's constitutionality bears the burden of proving that the statute is unconstitutional beyond a reasonable doubt. See State v. Tennin, 674 N.W.2d 403, 407 (Minn.2004). McLaughlin argues that on the basis of recent brain development research, the application of section 611.026 to adolescents violates the Due Process Clause of the Minnesota Constitution. Specifically, he contends that because adolescents' brains are less developed than adults' brains in "regions related to impulse control, risk assessment, and moral reasoning," adolescents "may understand their actions or know that they are wrong, but still be unable to control [their] behavior[ ]." In support of this contention, McLaughlin cites a brief filed by amici curiae American Medical Association, et al. in Roper v. Simmons, 543 U.S. 551, 125 S.Ct. 1183, 161 L.Ed.2d 1 (2005) (holding that the execution of defendants for offenses they committed before age 18 is unconstitutional). Brief of the Am. Med. Ass'n et al. as Amici Curiae in Support of Respondent, Roper v. Simmons, 543 U.S. 551, 125 S.Ct. 1183, 161 L.Ed.2d 1 (2005) (No. 03-633). Based on the information in this amicus brief to the United States Supreme Court, McLaughlin urges us to adopt one of three alternative tests to M'Naghten for determining the legal insanity of adolescents — including a test that would apparently recognize the unique vulnerability of young persons to the "irresistible impulse."[8] The state argues as a preliminary matter that McLaughlin's M'Naghten claim is procedurally barred because McLaughlin has raised this claim for the first time on appeal. The state asserts that although McLaughlin raised a due process challenge to section 611.026 in the district court, that challenge was grounded on vagueness, which is substantively different from the basis McLaughlin now asserts — namely, that section 611.026 is unfair to adolescent *713 defendants because it fails to account for the ways in which their brains differ from the brains of adults. McLaughlin acknowledges that he raises the brain development claim for the first time on appeal, but argues that we should review it in the interests of justice and in light of recent medical research. We have held that a party cannot challenge the constitutionality of a statute for the first time on appeal. State v. Schleicher, 672 N.W.2d 550, 555 (Minn.2003). In Schleicher, we concluded that we were procedurally barred from reviewing a defendant's constitutional challenge to section 611.026 based on vagueness because the defendant had not raised the issue in the district court. Id. We declined to make an exception to that procedural bar or to consider the claim in the interests of justice because the record was insufficiently developed as to the "particular concern" the defendant raised on appeal. Id. at 555-56 n. 10. Here, we decline to make an exception to the procedural bar and to consider McLaughlin's M'Naghten claim in the interests of justice for the same reason. The validity of McLaughlin's claim depends entirely on highly technical facts which were never raised before the district court. Moreover, the evidence McLaughlin supplies on appeal — in the form of a single amicus brief from an unrelated Supreme Court case — is not targeted to the "particular concern" McLaughlin raises, that is, the implications of recent brain development research for the constitutionality of the M'Naghten rule.[9] Because McLaughlin did not develop a factual record in the district court on the issue he raises and because the Roper brief cannot substitute for such a record in this case, we hold that it would not serve the interests of justice for us to consider, on this record, striking the longstanding M'Naghten rule as unconstitutional.[10] II. We next turn to McLaughin's claim that the district court abused its discretion by denying him a mid-trial continuance to procure an expert witness — Dr. Roger Carten. The decision to grant or deny a continuance lies within the discretion of the district court. Barnes, 713 N.W.2d at 333. We will not reverse the court's decision unless the defendant shows that the denial of a continuance prejudiced him by materially affecting the outcome of the trial. Id. Dr. Carten was the court-appointed examiner for the adult certification phase of McLaughlin's court proceedings. McLaughlin subsequently attempted to secure Carten's appearance for the mental illness phase of the trial, but Carten told McLaughlin he would be out of the country during that part of the trial. Apparently McLaughlin did not seek a subpoena to compel Carten's appearance. Rather, three days after the state rested its case in the trial's mental illness phase and after informing the court he would only be calling Dr. Hackett on rebuttal, McLaughlin moved for a continuance. *714 During the mental illness phase, two expert witnesses — Drs. Cranbrook and Wilson — suggested that Dr. Carten might have inadvertently cued McLaughlin to malinger an olfactory hallucination symptom when Carten asked a leading question in an interview. As a direct result of this testimony, McLaughlin sought a continuance to procure Carten so he could (1) rebut the malingering suggestions; (2) clarify "how the issue of [McLaughlin's] mental illness was first raised"; (3) provide opinions on when McLaughlin first started hearing voices and whether the voices played a role in the shootings; and (4) testify that the shootings would not have occurred "but for" McLaughlin's illness. The district court declined McLaughlin's continuance request on the grounds that Carten's testimony was perhaps not appropriate rebuttal. But even to the extent it would be, I think it would be cumulative and repetitive * * *. And since it's never been the court's understanding that Doctor Carten would opine that the defendant's condition would support a M'Naghten defense, I don't think that it's particularly helpful. On appeal, McLaughlin asserts that he is entitled to a new trial because "Dr. Carten's testimony was important to [his] burden of establishing his mental illness defense" and the district court "abused its discretion by rejecting the short delay." Based on a review of the record, we conclude that the district court did not abuse its discretion when it denied the continuance. Specifically, we conclude that Carten's testimony would not have materially affected the outcome of McLaughlin's trial with respect to the M'Naghten issue. See Barnes, 713 N.W.2d at 333. First, given the breadth and depth of the expert testimony in this case, the suggestions by Cranbrook and Wilson that Carten's interview technique might have cued McLaughlin to report an unusual hallucinatory symptom were not particularly significant. Moreover, McLaughlin effectively cross-examined Cranbrook and Wilson regarding their perceptions of Carten's technique. Second, the district court could reasonably find, given an already extensive record, that further testimony on the issues of (1) how McLaughlin's mental illness was first raised; (2) when McLaughlin first started hearing voices; and (3) whether the voices played a role in the shootings, would be cumulative. See Jenson v. Touche Ross & Co., 335 N.W.2d 720, 725 (Minn.1983) ("[R]ulings on * * * the cumulative nature of the evidence are committed to the sound discretion of the trial judge and will only be the basis for reversal where that discretion has been clearly abused."). Finally, Dr. Gilbertson had already expressed the opinion that the shootings would not have occurred "but for" McLaughlin's mental illness, and this opinion is not particularly relevant to the M'Naghten standard. McLaughlin provides no specific basis to support a conclusion that Dr. Carten's testimony would have materially affected the district court's M'Naghten finding beyond his general assertion that Carten's testimony was "important" to his defense. Moreover, it is difficult to believe that McLaughlin would not have compelled Carten's appearance in his case in chief if Carten's testimony were as potentially influential as McLaughlin now contends. For all of the foregoing reasons, we hold that the district court did not abuse its discretion in denying McLaughlin's request for a continuance. III. McLaughlin's final claim is that the district court abused its discretion by imposing consecutive sentences, rather *715 than concurrent sentences. At the time McLaughlin committed the murders, consecutive sentences were permissive and did not depart from the Minn. Sent. Guidelines for defendants convicted of multiple current felonies against persons. Minn. Sent. Guidelines II.F.2 (2004).[11] We will not reverse a district court's imposition of consecutive sentences absent a clear abuse of discretion. State v. Blanche, 696 N.W.2d 351, 378 (Minn.2005) (citing Neal v. State, 658 N.W.2d 536, 548 (Minn.2003)). Generally, we "will not interfere with a trial court's discretion in sentencing unless the sentence is disproportionate to the offense" or "unfairly exaggerates the criminality of the defendant's conduct." State v. Sanchez-Diaz, 683 N.W.2d 824, 837 (Minn.2004) (quotations omitted). We are "also guided by past sentences imposed on other offenders." Warren, 592 N.W.2d at 451. Finally, we have "consistently affirmed the imposition of consecutive life sentences where a defendant was convicted of multiple victim homicides." State v. Wilson, 539 N.W.2d 241, 246 (Minn.1995). McLaughlin asserts that the district court abused its discretion by imposing consecutive sentences because the resulting punishment is disproportionate to his culpability. In particular, he contends that the court failed to give sufficient weight to three factors tending to reduce his culpability: his youth, his alleged victimization through "constant bullying," and his mental illness. The state argues in response that consecutive sentencing comports with case law involving similar crimes and defendants, and is commensurate with McLaughlin's culpability in light of relevant mitigating and aggravating factors. In imposing consecutive sentences, the district court stated that it considered concurrent sentences, but construed our decision in Warren to require consecutive sentences given that (1) the aggravating and mitigating factors in McLaughlin's case "in a sense balance each other"; and (2) consecutive sentences would result in a punishment "proportional to other sentences given for similar conduct." The court identified three mitigating factors: McLaughlin's age when he committed the offenses, his "hypersensitivity to perceived slights of others," and his mental health. As to aggravating factors, the court noted that the shootings occurred in a school, where the victims "had a reason to feel safe and secure," "the fact that the gun was fired in such a dangerous manner, and the impact [the shootings] had on the community." In Warren, we concluded that a district court abused its discretion when it imposed concurrent sentences on a defendant who shot and killed three victims. 592 N.W.2d at 452. We determined that concurrent sentences were not commensurate with Warren's culpability given "severe aggravating factors" that the court apparently failed to consider, notwithstanding several mitigating factors — including lack of criminal history, youth, and "a degree of provocation." Id. The aggravating factors in Warren included the three victims' inability to defend themselves, the fact that two victims were shot twice because the first shots did not kill them, and strong evidence that Warren acted in a deliberate and calculating manner. Id. In light of Warren and several other cases upholding consecutive sentences, it does not appear that the district court *716 abused its discretion here. The court considered three mitigating factors relevant to McLaughlin's sentencing, but two of these — youth and mental illness — have also been factors in numerous cases in which we have upheld comparable sentencing. For example, in two cases involving adolescent defendants who committed particularly callous murders, we were unwilling to use the defendants' youth as a basis for reversing the imposition of consecutive sentences. See State v. Ouk, 516 N.W.2d 180, 186 (Minn.1994) (upholding consecutive sentences for 15-year-old who shot four victims at close range when none offered any resistance); State v. Brom, 463 N.W.2d 758, 765 (Minn.1990) (upholding consecutive sentences for 16-year-old who killed four family members with an ax). McLaughlin shot two fellow students, one of them twice and at close range. Both students were defenseless. McLaughlin planned and carried out the shootings in a methodical manner, and minutes after the shootings occurred, he acknowledged to Agent McDonald that he knew what he did was wrong. As to mental illness, we have held that in order to constitute a mitigating factor in sentencing, a defendant's impairment must be "extreme" to the point that it deprives the defendant of control over his actions. See Wilson, 539 N.W.2d at 247. In Wilson, we upheld consecutive sentences for a defendant who failed to prove that he lacked the ability to control his actions, despite one expert's opinion that the defendant was a paranoid schizophrenic and four experts' opinions that the defendant had some sort of personality disorder. Id. at 244-45, 247. In Carpenter v. State, we concluded that consecutive sentencing was not an abuse of discretion despite evidence that the defendant checked himself into a mental health facility, made several suicide attempts in the months before he committed two murders, and was using the prescription drug Paxil. 674 N.W.2d 184, 189-90 (Minn.2004). But, in State v. Martinson — a case McLaughlin cites — the court of appeals upheld a downward durational departure where "expert psychological evidence [was] uncontroverted that, at all relevant times," the defendant suffered paranoid schizophrenia that frequently manifested itself in delusions and "wholly irrational" behavior. 671 N.W.2d 887, 891-92 (Minn.App.2003), rev. denied (Minn. Jan. 20, 2004). McLaughlin's case is more like Wilson and Carpenter than Martinson in the sense that his mental impairment appears insufficiently "extreme" to be a mitigating factor in sentencing. Of the six mental health experts who testified at McLaughlin's trial, three diagnosed him with paranoid schizophrenia and the other three diagnosed him with a major depressive disorder in remission and an emerging personality disorder. There was no consensus that McLaughlin frequently suffered delusions and engaged in wholly irrational behavior, despite the broad agreement that McLaughlin's mental health was compromised to some degree. The district court found that although McLaughlin "was suffering from some sort of mental impairment" at the time of the shootings, that impairment — when viewed in the light most favorable to McLaughlin — was only a "subtle form of schizophrenia" and was not an "extreme mental illness." Our review of the record as a whole confirms that the court's finding is supported by the evidence.[12] *717 Finally, there is the potentially mitigating factor that McLaughlin describes as his victimization through "constant bullying" and "daily abuse," and that the district court described as his "hypersensitivity to perceived slights of others." Unfortunately, the record is far from clear regarding the extent of the teasing or bullying McLaughlin actually experienced. As previously stated, the evidence adduced at McLaughlin's trial does not support McLaughlin's characterization of himself as the victim of constant bullying and daily abuse. But some self-reports by McLaughlin, as well as some statements by fellow students to Agent McDonald and the grand jury, suggest that McLaughlin was a frequent target of hurtful behavior by classmates. Further complicating the picture is one expert's opinion that McLaughlin's over-sensitivity caused him to perceive the teasing as more severe than it was, and another expert's description of McLaughlin as having a "persecutory delusion" with regard to teasing. A fair conclusion is that McLaughlin did experience teasing or bullying, but it is unclear on this record how far that teasing or bullying was outside the range of what many persons experience at some period during adolescence. We conclude that none of the three mitigating factors McLaughlin asserts — youth, mental illness, or teasing and bullying — alone or collectively — support a conclusion that the district court abused its discretion by imposing consecutive sentences. On the basis of the aggravating and mitigating factors and sentences imposed in comparable cases, we hold that the consecutive sentences the court imposed on McLaughlin comport with those we have "consistently affirmed * * * [for defendants] convicted of multiple victim homicides." Wilson, 539 N.W.2d at 246. Affirmed. NOTES [1] Earlier, in a third hour driver's education class, McLaughlin had asked two other students where C.E. was and whether he was in school that day. [2] At trial, a Department of Natural Resources firearms instructor testified that McLaughlin had recently passed a firearm safety course in which the students fired a .22 caliber pistol and observed the damage caused to milk cartons 25 to 50 yards away. [3] In Minnesota, a defendant seeking to establish a mental illness defense must meet the M'Naghten standard codified at Minn.Stat. § 611.026 (2004). See Bruestle v. State, 719 N.W.2d 698, 704 (Minn.2006). The defendant must prove that at the time he committed the charged offense, he "was laboring under such a defect of reason, from a mental illness or deficiency, as not to know the nature of the act, or that it was wrong." Id. (brackets omitted); see also State v. Martin, 591 N.W.2d 481, 486 (Minn.1999). [4] Later in the trial, Prairie Lakes Program Director Bradley Bengtson testified that during the approximately 17 months McLaughlin resided at the facility, there were no reports of "unusual behavior" by McLaughlin. [5] One delusion McLaughlin reported to several mental health examiners involved his interactions in a wooded area with a group of people working to prevent the trafficking of methamphetamine. [6] To malinger is "[t]o feign illness or disability, esp. in an attempt to avoid an obligation." Black' s Law Dictionary 970 (7th ed.1999). [7] If a court determines that there is reason to doubt a defendant's competency to stand trial, it must order an examination under Minn. R.Crim. P. 20.01, subd. 2(3). If a defendant notifies the prosecutor of his intent to assert a mental illness defense, the court may order an examination under Minn. R.Crim. P. 20.02, subd. 1. [8] The "irresistible impulse" test holds "that a person is not criminally responsible for an act if mental disease prevented that person from controlling potentially criminal conduct." Black's Law Dictionary 835 (7th ed.1999). "The few jurisdictions that have adopted this test have combined it with the McNaghten rules." Id. We note that our court has consistently rejected arguments that M'Naghten must give way to a test that recognizes the power of the "irresistible impulse." See, e.g., State v. Schreiber, 558 N.W.2d 474, 479 (Minn.1997); State v. Rawland, 294 Minn. 17, 46, 199 N.W.2d 774, 790 (1972); Finn, 100 N.W.2d at 511. Yet, in Rawland, we held that a defendant is permitted to introduce evidence regarding his vulnerability to "irresistible impulses," and a factfinder may consider this evidence in determining whether a defendant meets the M'Naghten standard. 294 Minn. at 43-46, 199 N.W.2d at 789-90. [9] The question the Roper amici addressed was whether "the execution of an offender who committed the crime at the age of 16 or 17 constitute[s] cruel and unusual punishment in violation of the Eighth Amendment." Brief for Am. Med. Ass'n, supra, at i. [10] Although the M'Naghten rule has been "defended, supported, condemned, and reviled," it has served as the legal test of insanity in Minnesota since 1868. Rawland, 294 Minn. at 31-35, 199 N.W.2d at 782-84. And despite the criticism our court has sometimes directed toward aspects of the M'Naghten rule, we have stated unambiguously that any changes to M'Naghten must come from the legislature. Schleicher v. State, 718 N.W.2d 440, 448 n. 7 (Minn.2006); Finn, 257 Minn. at 141-42, 100 N.W.2d at 511. [11] Minnesota Sentencing Guidelines II.F.2 was modified in 2005 to provide that consecutive sentences were permissive for defendants convicted of certain enumerated felonies. But this modification does not apply to McLaughlin because his offenses predate the modification effective date. See Minn. Sent. Guidelines III.F. [12] McLaughlin also cites State v. Wall, 343 N.W.2d 22 (Minn.1984), to support his argument that he should have received concurrent sentences in light of his mental illness. But Wall is not especially helpful to McLaughlin. In Wall, we concluded that an upward durational departure was not appropriate for a defendant who had suffered from paranoid schizophrenia for many years and who strangled his wife, on whom he focused much of his paranoia. Id. at 23-25. Wall's mental impairment and the direct relationship between that impairment and the crime he committed were apparently "clear from the record," which is not the case here. See id. at 25.
Q: Can't declare keyframe within withStyles HOC (container.addRule(...).addRule is not a function) So I got the latest versions of jss and material ui. Im using withStyles HOC and dynamically changing css in styles object, but I cant seem to be able to declare keyframes in css. Im also using nextjs if that makes any difference. Ive looked at how material-ui declares their animations, and I'm following their example https://github.com/mui-org/material-ui/blob/master/packages/material-ui/src/ButtonBase/TouchRipple.js. import React, { useEffect, useState } from "react"; import classnames from "classnames"; import PropTypes from "prop-types"; import { withStyles, makeStyles } from "@material-ui/core/styles"; import { sectionAnchors, maxContentWidth } from "../../../util/constants"; import LearnMoreLink from "./LearnMoreLink"; import SectionContent from "../../common/SectionContent"; import content from "../../../../content"; import useRealHeight from "../../../util/useRealHeight"; import SplashHeading from "./SplashHeading"; import { singleHeight, doubleHeight } from "../../common/Footer"; import GetStartedForm from "./GetStartedForm"; import { withRouter } from "next/router"; import SwipeableTextMobileStepper from "./SwipeableTextMobileStepper"; import { Link } from 'next/router' import Radio from '@material-ui/core/Radio'; import RadioGroup from '@material-ui/core/RadioGroup'; import FormHelperText from '@material-ui/core/FormHelperText'; import FormControlLabel from '@material-ui/core/FormControlLabel'; import FormControl from '@material-ui/core/FormControl'; import FormLabel from '@material-ui/core/FormLabel'; import { green } from '@material-ui/core/colors'; import RadioButtonUncheckedIcon from '@material-ui/icons/RadioButtonUnchecked'; import RadioButtonCheckedIcon from '@material-ui/icons/RadioButtonChecked'; import Switch from '@material-ui/core/Switch'; import Button from '@material-ui/core/Button'; const styles = theme => ({ heading: { marginBottom: theme.spacing.unit * 6 }, headingColored: { marginBottom: 0, color: theme.palette.primary.dark }, container: { width: "100%", // '@keyframes fade': { // '0%': { // opacity: 1 // }, // '100%': { // opacity: 0 // } // }, '@keyframes enter': { '0%': { transform: 'scale(0)', opacity: 0.1, }, '100%': { transform: 'scale(1)', opacity: 0.3, }, }, // backgroundColor: theme.palette.primary.dark, // background: 'url(https://images.newscientist.com/wp-content/uploads/2019/04/08111018/screenshot-2019-04-08-10.24.34.jpg)', backgroundImage: props => props.background, backgroundSize: "cover", // animation: '$fadeMe linear 1s infinite', // animationName: '@fadeMe', // animdationDuration: '1s', // animation: display: "flex", flexDirection: "column", alignItems: "center", justifyContent: "center" }, containerWizard: { background: "none", marginBottom: -doubleHeight, paddingBottom: doubleHeight + theme.spacing.unit * 3, [theme.breakpoints.up("sm")]: { marginBottom: -singleHeight, paddingBottom: singleHeight + theme.spacing.unit * 3 } }, inner: { maxWidth: maxContentWidth, width: "100%", flex: "1 0 auto", display: "flex", flexDirection: "column", justifyContent: "center", alignItems: "center" }, flex: { flex: "1 0 auto" }, form: { width: "100%", maxWidth: maxContentWidth / 2, display: "flex", flexDirection: "column", justifyContent: "center", alignItems: "center" } }); // http://www.coverbash.com/wp-content/covers/caeli_flowers_facebook_cover.jpg function SplashLogic() { const [selectedValue, setSelectedValue] = React.useState(1); let int useEffect(() => { int = init(1) }, []); let background = selectedValue == 1 ? bG('http://www.coverbash.com/wp-content/covers/caeli_flowers_facebook_cover.jpg') : bG('https://images.newscientist.com/wp-content/uploads/2019/04/08111018/screenshot-2019-04-08-10.24.34.jpg?') const handleChange = event => { setSelectedValue(event.target.value); clearInterval(int) int = init(event.target.value) }; function init(num) { return setInterval(() => { background = bG('http://www.coverbash.com/wp-content/covers/caeli_flowers_facebook_cover.jpg') setSelectedValue(2) }, 4000) } return <SplashFull {...{ setSelectedValue, selectedValue, background, handleChange }}></SplashFull> } const SplashSection = ({ classes, router, setSelectedValue, selectedValue, background, handleChange }) => { // const [height] = useRealHeight({ resize: false }); console.log(classes.container) useEffect(() => { router.prefetch("/signup"); }, []); const onSubmit = values => { router.push(`/signup?destination=${values.destination}`, "/signup"); }; return ( <SectionContent id={sectionAnchors.SPLASH} className={classes.container}> <div className="bg-white opacity-50 rounded-full"> <Radio checked={selectedValue === 1} onChange={handleChange} value={1} name="radio-button-demo" inputProps={{ 'aria-label': 'A' }} /> <Radio checked={selectedValue === 2} onChange={handleChange} value={2} name="radio-button-demo" inputProps={{ 'aria-label': 'B' }} /> <Radio checked={selectedValue === 3} onChange={handleChange} value={3} name="radio-button-demo" inputProps={{ 'aria-label': 'D' }} /> <Radio checked={selectedValue === 4} onChange={handleChange} value={4} name="radio-button-demo" inputProps={{ 'aria-label': 'E' }} /> </div> <div className={classes.inner}> <SplashHeading classes={{ container: classes.heading }} /> <GetStartedForm className={classes.form} onSubmit={onSubmit} /> </div> <Button variant="contained" > Default </Button> <LearnMoreLink /> </SectionContent> // <SwipeableTextMobileStepper></SwipeableTextMobileStepper> ); }; SplashSection.propTypes = { classes: PropTypes.object.isRequired }; function bG(arg) { return `url(${arg})` } const SplashFull = withStyles(styles)(withRouter(SplashSection)); export default SplashLogic I get error: container.addRule(...).addRule is not a function TypeError: container.addRule(...).addRule is not a function at Array.onProcessStyle (/workspace/travelcontacts/node_modules/jss-plugin-nested/dist/jss-plugin-nested.cjs.js:96:10) at PluginsRegistry.onProcessStyle (/workspace/travelcontacts/node_modules/jss/dist/jss.cjs.js:1246:51) at PluginsRegistry.onProcessRule (/workspace/travelcontacts/node_modules/jss/dist/jss.cjs.js:1235:26) at Array.forEach (<anonymous>) at RuleList.process (/workspace/travelcontacts/node_modules/jss/dist/jss.cjs.js:871:25) at new StyleSheet (/workspace/travelcontacts/node_modules/jss/dist/jss.cjs.js:1041:16) at Jss.createStyleSheet (/workspace/travelcontacts/node_modules/jss/dist/jss.cjs.js:2007:17) at attach (/workspace/travelcontacts/node_modules/@material-ui/styles/makeStyles/makeStyles.js:116:39) at /workspace/travelcontacts/node_modules/@material-ui/styles/makeStyles/makeStyles.js:256:7 at useSynchronousEffect (/workspace/travelcontacts/node_modules/@material-ui/styles/makeStyles/makeStyles.js:210:14) at /workspace/travelcontacts/node_modules/@material-ui/styles/makeStyles/makeStyles.js:248:5 at Object.WithStyles [as render] (/workspace/travelcontacts/node_modules/@material-ui/styles/withStyles/withStyles.js:70:21) at ReactDOMServerRenderer.render (/workspace/travelcontacts/node_modules/react-dom/cjs/react-dom-server.node.development.js:3758:44) at ReactDOMServerRenderer.read (/workspace/travelcontacts/node_modules/react-dom/cjs/react-dom-server.node.development.js:3538:29) at renderToString (/workspace/travelcontacts/node_modules/react-dom/cjs/react-dom-server.node.development.js:4247:27) at render (/workspace/travelcontacts/node_modules/next-server/dist/server/render.js:86:16) A: The issue appears to be resolved by not nesting @keyframes definitions. The hint was in the second application of the addRule function in the error: container.addRule(...).addRule is not a function. Solution Try moving your keyframe animations to the root level. So from this const styles = theme => ({ container: { '@keyframes enter': { '0%': { transform: 'scale(0)', opacity: 0.1, }, '100%': { transform: 'scale(1)', opacity: 0.3, }, } } } to this const styles = theme => ({ '@keyframes enter': { '0%': { transform: 'scale(0)', opacity: 0.1, }, '100%': { transform: 'scale(1)', opacity: 0.3, }, } } Hope that helps. Interesting side note: nesting the animation another level removes the error, but does not instantiate the CSS animation. A: from const styles = theme => ({ container: { '@keyframes enter': { '0%': { transform: 'scale(0)', opacity: 0.1, }, '100%': { transform: 'scale(1)', opacity: 0.3, }, } } } to const styles = theme => ({ '@global':{ //need add into global rules '@keyframes enter': { '0%': { transform: 'scale(0)', opacity: 0.1, }, '100%': { transform: 'scale(1)', opacity: 0.3, }, } } }
New West Side Story Pushes Back Broadway Opening The delay comes after star Isaac Cole Powell's onstage injury December 20. The new Broadway revival of West Side Story, directed by Tony winner Ivo van Hove, will now officially open at the Broadway Theatre February 20, 2020. The production, which began previews December 10, was previously scheduled to open February 6. The new date comes after star Isaac Cole Powell, who plays Tony, suffered an onstage injury during the December 20 performance, according to a report in Deadline. Jordan Dobson, Powell’s stand-by, assumes the tole until Powell is recovered and able to return to the show. West Side Story also stars Shereen Pimentel (The Lion King) as Maria and Yesenia Ayala (Carousel) as Anita. READ: Grosses Analysis: With or Without 'Somewhere,' There's a Place for West Side Story on the Box Office Boards The principal cast also features Amar Ramasar (Carousel) as Bernardo, Ben Cook (Mean Girls) as Riff, Jacob Guzman (Newsies) as Chino, Ahmad Simmons (Hadestown) as Diesel, Danny Wolohan (To Kill a Mockingbird) as Officer Krupke, Daniel Oreskes (Oslo) as Doc, Thomas Jay Ryan (The Crucible) as Lt. Schrank, Pippa Pearthree (Tuck Everlasting) as Glad Hand, and Kevin Csolak (Mean Girls) as A-Rab. Making their Broadway debuts are Matthew Johnson as Baby John, Dharon E. Jones as Action, and Zuri Noelle Ford as Anybodys. The Scott Rudin production features choreography by Anne Teresa De Keersmaeker, making it the first Broadway revival to use new choreography in lieu of Jerome Robbins' original. Other changes, as previously reported, include the use of the film’s version of “America,” a tightened run time, and the removal of the song "I Feel Pretty." READ: What Does West Side Story Look Like With New Choreography? West Side Story features scenic and lighting design by Jan Versweyveld, costumes by An D'Huys, sound design by Tom Gibbons, and video design by Luke Halls. Rounding out the company are ensemble members Alexa De Barr, Gabi Campo, Daniel Ching, Lorna Courtney, Marc Crousillat, Stephanie Crousillat, Roman Cruz, Israel Del Rosario, Jordan Dobson, Tyler Eisenreich, Armando Eleazar, Marlon Feliz, Satori Folkes-Stone, Constance François, Yesy Garcia, Carlos Gonzalez, Jennifer Gruener, Jarred Manista, Michaela Marfori, Ilda Mason, Michelle Mercedes, Mina Pinerom, Michael Seltzer, Corey John Snide, Sheldon True, Ricky Ubeda, Madison Vomastek, Tony Ward, Bridget Whitman, and Kevin Zambrano. A total of 32 performers make their Broadway debuts with this production.
Killing Machine Killing Machine is the fifth studio album by English heavy metal band Judas Priest, released on 9 October 1978 by Columbia Records. The album pushed the band towards a more commercial style while still featuring the dark lyrical themes of their previous albums. At about the same time, the band members adopted their now-famous "leather-and-studs" fashion image, inspired by Rob Halford's interest in gay leather culture. It is the band's last studio album to feature drummer Les Binks. In the United States, it was released with a different track listing as Hell Bent for Leather due to controversy over the Cleveland Elementary School shooting. International and American versions The album was retitled Hell Bent for Leather for its US release in early 1979, because the US branch of Columbia/CBS did not like the "murderous implications" of the title. Both titles are drawn from songs on the album with "The Green Manalishi (With the Two Prong Crown)", an early Fleetwood Mac cover, being added to the US release. The album was also pressed in red vinyl in the UK. Overview With Killing Machine, Judas Priest began moving to a more accessible, commercial format that abandoned the complex, fantasy-themed songs of their previous three albums. While this album still had dark undertones, it was more grounded in realism. This was reflected in their change of stage costumes from flowing Gothic robes to leather, but was also a reaction to the rising punk and New Wave movements. K. K. Downing had expressed doubts about the New Wave of British heavy metal stating "everybody was totally dedicated to having their own show, their own images". Priest were part of the influence on the NWOBHM, but not part of it. The band's new, simpler sound was the result of several factors, including a desire to compete with punk rock, produce songs that were easier to perform live, and also appeal more to American audiences. Tracks such as "Burnin' Up" and "Evil Fantasies" are replete with S&M themes while "Running Wild" is about late-night partying and "Before the Dawn" a depressing ballad. "Hell Bent for Leather" reflected their newly adopted leather costumes as well as Rob Halford's soon-to-be-trademark entrances on stage in a Harley-Davidson motorcycle. The single "Take on the World" was an attempt at producing a stadium shoutalong tune in the mould of Queen's "We Will Rock You", and was also covered by New Wave band The Human League on their 1980 tour. If the lyrics were simplified a bit from the band's previous albums and adapted more into mainstream arena rock, the instruments retained their characteristic aggressiveness with heavier guitar riffing and elements of blues influence returned on some songs. The album is certified gold by the RIAA. Finally, the production of Killing Machine was markedly improved from Judas Priest's earlier albums, which were criticized for having excessively flat sound, and would be further refined for their next and breakthrough album, British Steel. "Hell Bent For Leather", and "The Green Manalishi" were the two songs from Killing Machine which became standard parts of the band's live setlist, with the other songs being performed rarely ("Evil Fantasies", "Running Wild", "Rock Forever and "Take On the World") or not at all. "Running Wild" and "Delivering The Goods" became regulars on the Firepower tour setlists in 2018 after not being played since 1980, and the title track returned to the band's setlists at a show in Paris in January 2019 after being absent for 40 years. Reissues The album was remastered in 2001, with two bonus tracks added (three in the UK). The bonus track "Fight for Your Life" was the "original" version of Judas Priest's "Rock Hard Ride Free" from their Defenders of the Faith album. "The Green Manalishi (With the Two-Pronged Crown)" is considered a bonus track on the UK remaster, but a regular track on the U.S. version. In 2010, audiophile label Audio Fidelity released a limited-edition 24-karat gold CD of Hell Bent for Leather. Mastering was done by Steve Hoffman. This does not contain the bonus tracks from the 2001 edition. Recording and production This is the first Judas Priest album where Glenn Tipton incorporated the guitar technique of tapping into his soloing style, which had been popularized by Eddie Van Halen earlier that year with the release of Van Halen's popular debut album. This can be heard in the solos of "Hell Bent for Leather" and "Killing Machine". This is also the final studio album for drummer Les Binks who had joined the band in early 1977 in time for the Sin After Sin tour; he is credited with helping develop the traditional Priest percussive sound. Binks was dropped and replaced by drummer Dave Holland after the 1979 tour because of a financial disagreement where the band's manager Mike Dolan wanted Binks to "waive his fees" for performing on the platinum selling 1979 Unleashed in the East live album. Critical reception In 2005, Killing Machine was ranked number 321 in Rock Hard magazine's book of The 500 Greatest Rock & Metal Albums of All Time. This album, as well as subsequent albums by the band, have somewhat divided fans, with some preferring the complexity and darkness of the early albums, while others prefer the more mainstream and polished later albums. In popular culture The song "Hell Bent for Leather" is featured in Ari Gold's 2008 film Adventures of Power, the 2004 episode of the sitcom That '70s Show entitled "Surprise, Surprise" and also featured in 2009 game Guitar Hero: Metallica. Track listing Personnel Judas Priest Rob Halford – vocals K. K. Downing – guitar Glenn Tipton – guitar, keyboards on "Before the Dawn" Ian Hill – bass Les Binks – drums Production Produced by James Guthrie and Judas Priest Engineered by James Guthrie, assisted by Damian Korner, Andrew Jackson, Kevin Dallimore, and Andrew Clark Cover design by Rosław Szaybo Photography by Bob Elsdale Charts Sales and certifications |- References Category:1978 albums Category:Albums produced by James Guthrie (record producer) Category:Columbia Records albums Category:Judas Priest albums
Biliary atresia in Vietnam: Management and the burden of disease. Biliary atresia is an idiopathic, neonatal liver disease of the bile ducts. The natural evolution of biliary atresia is known in developed countries. This study describes the clinical course of biliary atresia in Vietnam, a developing country. Chart reviews were undertaken of patients treated with or without the Kasai procedure between January 2010 and July 2013 at a children's hospital in Vietnam. Of 287 children with biliary atresia, 149 (52%) were treated without the Kasai procedure and 138 (48%) were treated with the Kasai procedure. Median age at diagnosis was 2.4 months for children treated without the Kasai procedure vs 2.3 months for those treated with the procedure. The percentages of patients in the group treated without the Kasai procedure presenting at <2 months, 2 to <3 months, 3 to <4 months, 4-6 months, and >6 months of age were 31%, 35%, 15%, 10%, and 9%, respectively, compared to those treated with the Kasai procedure at 36% (P = .38), 44% (P = .12), 16% (P = 1.0), 4% (P = .037), and 0% (P < .001), respectively. The group treated without the Kasai procedure had 1- and 2-year survivals of 52% and 28%, respectively (median survival 6.6 months); in contrast, the group treated with the Kasai procedure had 1- and 2-year transplant-free survivals of 84% and 71%. No patients were treated by liver transplantation because of lack of a liver transplantation program in Vietnam. The majority of biliary atresia in Vietnam remains untreated despite early presentation and reasonable outcomes after a Kasai procedure relative to Western countries. These data illustrate the high health care burden for biliary atresia in Vietnam and the need to improve education about biliary atresia and its treatment.
Expression of 67 kDa laminin receptor in human breast cancer cells: regulation by progestins. The level of 67 kDa laminin receptor (67LR) expression on breast and colon tumor cell surfaces was previously shown to be correlated with the capacity of tumor cells to metastasize. In the present work we investigate the effects of progestins and estrogen on the expression of 67LR in two sublines of the T47D human breast cancer cells: weakly tumorigenic, poorly invasive parental T47D cells and a highly tumorigenic, more invasive T47Dco subclone. Immunoblotting with an affinity purified antibody directed against a synthetic peptide recognizes the 67LR in these cells. 67LR expression in the T47Dco subclone is 5.5-fold higher than in their parental T47D cells. Treatment of T47D cells with 1 nM of the synthetic progestin R5020 results in a 4-fold increase in 67LR protein expression. Estrogen also induced 67LR expression, but only by 1.5-fold. The progestin-stimulated expression of the 67LR correlates with a 4.3-fold increase in attachment of T47D cells to laminin. A monoclonal antibody, mAb 13, directed against beta 1 integrin, completely blocks the attachment of T47D cells to fibronectin, only partially inhibits the attachment of T47D cells to laminin, and appears not to affect the progestin-stimulated laminin attachment of T47D cells. A new antiprogestin, ZK 112.993, significantly inhibits both progestin-stimulated 67LR expression and the increased attachment to laminin. These results suggest a possible role for progestin in mediating one of the multiple events thought to be important in metastasis of steroid receptor positive human breast cancer cells.
use super::{Config, Manifest, Region, Result}; use crate::{error_chain::ChainedError, git}; use futures::stream::{self, StreamExt}; async fn verify_manifest(svc: String, conf: &Config, reg: &Region) -> Result<Manifest> { let mf = shipcat_filebacked::load_manifest(&svc, &conf, &reg) .await? .stub(&reg) .await?; mf.verify(&conf, &reg)?; Ok(mf) } /// Validate all manifests in a service directory for a region /// /// This is meant to replace `shipcat validate ..all_services` /// This does not check secrets. pub async fn regional_manifests(conf: &Config, reg: &Region) -> Result<()> { let available = shipcat_filebacked::available(conf, &reg).await?; let mut buffered = stream::iter(available) .map(move |mf| verify_manifest(mf.base.name, &conf, &reg)) .buffer_unordered(16); let mut errs = vec![]; let mut used_stream_names = vec![]; let mut used_topic_names = vec![]; let mut used_user_names = vec![]; while let Some(r) = buffered.next().await { match r { Err(e) => errs.push(e), Ok(mf) => { // uniqueness validation for es in mf.eventStreams { if used_stream_names.contains(&es.name) { bail!("{} cannot reuse eventStream names {}", mf.name, es.name); } used_stream_names.push(es.name.clone()); } if let Some(kr) = mf.kafkaResources { for topic in kr.topics { if used_topic_names.contains(&topic.name) { bail!("{}, Topic name already exists: {}", mf.name, &topic.name); } if topic.name.contains('_') { bail!( "{}, cannot use underscores in kafka topic name: {}", mf.name, &topic.name ); } used_topic_names.push(topic.name.clone()); } for user in kr.users { if used_user_names.contains(&user.name) { bail!("{}, Kafka User name already exists: {}", mf.name, &user.name); } used_user_names.push(user.name.clone()); } } } } } if !errs.is_empty() { for e in &errs { error!("{}", e.display_chain()); debug!("{:?}", e.display_chain()); } bail!("Invalid shipcat data in {} files", errs.len()); } // TODO: cross reference uniqueness values here Ok(()) } async fn verify_region(r: String) -> Result<()> { use crate::ConfigState; let (conf, region) = Config::new(ConfigState::Base, &r).await?; regional_manifests(&conf, &region).await?; Ok(()) } /// Validate all manifests in a service directory for ALL regions /// /// This is meant to replace a for loop over shipcat list-regions /// This does not check secrets pub async fn all_manifests() -> Result<()> { let regions = Config::read().await?.list_regions(); let mut buffered = stream::iter(regions).map(verify_region).buffer_unordered(4); let mut errs = vec![]; while let Some(r) = buffered.next().await { if let Err(e) = r { errs.push(e); } } if !errs.is_empty() { for e in &errs { error!("{}", e.display_chain()); debug!("{:?}", e.display_chain()); } bail!("Invalid shipcat data in {} files", errs.len()); } Ok(()) } /// Validate the manifest of a service in the services directory /// /// This will populate the manifest for all supported environments, /// and `verify` their parameters. /// Optionally, it will also verify that all secrets are found in the corresponding /// vault locations serverside (which require vault credentials). pub async fn manifest(services: Vec<String>, conf: &Config, reg: &Region, secrets: bool) -> Result<()> { conf.verify()?; // this should work even with a limited config! for svc in services { debug!("validating {} for {}", svc, reg.name); let mf = if secrets { shipcat_filebacked::load_manifest(&svc, conf, reg) .await? .complete(reg) .await? } else { shipcat_filebacked::load_manifest(&svc, conf, reg) .await? .stub(reg) .await? }; mf.verify(conf, reg)?; debug!("validated {} for {}", svc, reg.name); } Ok(()) } /// Validate the secrets exists in all regions /// /// This is one of very few functions not validating a single kube context, /// so it does special validation of all the regions. pub async fn secret_presence_full(conf: &Config, regions: Vec<String>) -> Result<()> { for r in regions { info!("validating secrets in {}", r); let reg = conf.get_region(&r)?; // verifies region or region alias exists reg.verify_secrets_exist().await?; // verify secrets for the region for svc in shipcat_filebacked::available(conf, &reg).await? { let mf = shipcat_filebacked::load_manifest(&svc.base.name, conf, &reg).await?; debug!("validating secrets for {} in {}", &svc.base.name, r); mf.verify_secrets_exist(&reg.vault).await?; } } Ok(()) } /// Validate the secrets exists in all regions for a subset of services /// /// This is an optimization of secret_presence_git pub async fn secret_presence_explicit(svcs: Vec<String>, conf: &Config, regions: Vec<String>) -> Result<()> { for r in regions { info!("validating secrets in {}", r); let reg = conf.get_region(&r)?; // verifies region or region alias exists reg.verify_secrets_exist().await?; // verify secrets for the region debug!("Validating {:?}", svcs); for svc in &svcs { debug!("Validating {}", svc); if let Ok(mf) = shipcat_filebacked::load_manifest(&svc, conf, &reg).await { if !mf.regions.contains(&r) { debug!("ignoring {} for {} (not deployed there)", svc, r); continue; } debug!("validating secrets for {} in {}", &svc, r); mf.verify_secrets_exist(&reg.vault).await?; } } } Ok(()) } /// Validate secrets exists in all regions, but only for services touched in git pub async fn secret_presence_git(conf: &Config, regions: Vec<String>) -> Result<()> { for r in regions { info!("validating secrets in {}", r); let reg = conf.get_region(&r)?; // verifies region or region alias exists reg.verify_secrets_exist().await?; // verify secrets for the region // Try to find services changed by git: let svcs = match git_diff_changes() { Ok(svcs) => svcs, // if that for some reason fails, then do all services for that region Err(e) => { warn!("Error from git: {}", e); warn!("Falling back to a full validate"); shipcat_filebacked::available(conf, &reg) .await? .into_iter() .map(|s| s.base.name) .collect() } }; for svc in svcs { if let Ok(mf) = shipcat_filebacked::load_manifest(&svc, conf, &reg).await { if !mf.regions.contains(&r) { debug!("ignoring {} for {} (not deployed there)", svc, r); continue; } debug!("validating secrets for {} in {}", &svc, r); mf.verify_secrets_exist(&reg.vault).await?; } } } Ok(()) } /// A config verifier /// /// This works with Base configs and File configs /// Manifest repositories should verify with the full file configs for all the sanity. pub fn config(conf: Config) -> Result<()> { conf.verify()?; Ok(()) } // Dumb git diff helper that matches normal service files: // // Effectively checks: // git diff --name-only $(git merge-base origin/master HEAD) | grep ./services/{svc}/* fn git_diff_changes() -> Result<Vec<String>> { use regex::Regex; let merge_base = git::merge_base()?; let diff_output = git::diff_filenames(&merge_base)?; let svc_re = Regex::new(r"^services/(?P<svc>[0-9a-z\-]{1,50})/").unwrap(); let mut res = vec![]; for l in diff_output.lines() { if let Some(caps) = svc_re.captures(l) { if let Some(svc) = caps.name("svc") { res.push(svc.as_str().to_string()); } } } Ok(res) }
Insanity in individuals is something rare - but in groups, parties, nations and epochs, it is the rule. Friedrich Nietzsche Sunday, September 02, 2007 Sunny Sunday This view featuring a sunrise dissecting a line of airglow of Earth's atmosphere was photographed by an STS-114 crewmember onboard Space Shuttle Discovery after departure from the International Space Station. OOOOOOO, AAAAAAAA!! I don't know about anyone else but I'm ready for a trip to space, or just anyplace to get away from the insanity here on Earth. Now that brokeback bathroom is done the next thing is the hat toss into the ring of fast freddie t. Seems the repugs just cannot find anyone except tee vee personalities and liberal Hollywood types to fill the void of otherwise cold, pinch faced, money addled candidates with ZERO personality. Must find someone WITHOUT a closet full of skeletons, if they can even do that with the clown round they have. Nobody gets elected without the blessing of NASCAR, throw fast freddie in a stock car and let him do a hundred laps and he would be in like flint. So it is my belief the first candidate to do laps in a Nextel Cup car, gets the job. Never mind debates, let them all do laps and fender bending to sort them out! If ya can't drive a stock car, how do you expect to drive the country? Mahatma Gandhi once said that everyone knows what Jesus taught—except for Christians. Sadly, this is far too true for far too many Christians, and especially for those who constitute the Religious Right. Nowhere do we get better evidence of this than when we examine the attitudes of most Christians toward what has been happening in Iraq. YES, CHRISTIANS HAVE TURNED THEIR BACKS ON JESUS CHRIST. LUNATICS ARE RUNNING OUR POLITICAL ASYLUMS AND OUR RELIGIOUS ASYLUMS. When it comes to war, you don’t have to be a Christian to recognize that any reading of the Sermon on the Mount should require followers of Jesus to be non–violent resisters. In this passage of the Christian Bible, Jesus directs his disciples to love their enemies. So far as I am concerned, that undoubtedly means that we shouldn’t kill them! Before these words are written off as unrealistic for foreign policy, consider what might have happened if Christians had embraced them and did for the Iraqi people what Paul suggested that we should have done. For ten years, following the first Gulf War, America placed an embargo on Iraq, and the Red Cross estimates that this embargo affected the food supply and the availability of medicines in that country. This, in turn, was indirectly responsible for the deaths of hundreds of thousands of children among Iraq’s poorest oft he poor. Suppose Christians of America had done what their Bible told them to do for their enemies. Imagine what might have been if our churches, using their vast resources, had purchased medicines and food for the Iraqi people, shipped them to Jordan, and, from there, transported them to the desperate people in Iraq. Might the invading American soldiers then have been greeted with roses thrown at their feet, as Vice President Cheney had predicted? The Apostle Paul suggested that that kind of response to Saddam Hussein might have brought down that evil dictator. That is what Paul predicted when he said that through such loving acts of kindness we would “bring down coals of fire” on our enemy’s head (Romans 12:20). G. K. Chesterton, the British author, once said, “It is not that Christianity has been tried and failed. It is that it has never been tried.” On another subject, Jesus would have had something to say about capital punishment. When Saddam Hussein was put to death, most of my Evangelical sisters and brothers were horrified at the grisly videos of the hanging that were broadcast on television, but they had little objection to the concept of capital punishment. How do they think that it is possible to reconcile that hanging with Christ’s teachings about being merciful? Jesus said:“Blessed are the merciful: for they shall obtain mercy” (Matthew 6:7). Any survey of the Religious Right will reveal that these Christian brothers and sisters support capital punishment more readily than does the general population. Without hesitation, they stood behind the executions that President Bush ordered when he was governor of Texas. The New Testament teaches that it is never too late to repent and to make a commitment to live out the teachings of Jesus, but it should be done now! Our scriptures say: “Now is the accepted time; behold, now is the day of salvation” (II Corinthians 6:2). Jesus taught, “Blessed are the peacemakers, for they shall be called the children of God” (Matthew 5:9). Now is the time for Christians, especially for those fundamentalist Christian brothers and sisters who insist on taking the Bible literally—to literally live out the words of the one whom they call Lord! Also, it is time for Muslims to give attention to the teachings of the one they acknowledge as “prophet.” And for Jews to consider the teachings of the one they themselves call “Rabbi.” Of course, this can only happen if Christians begin to obey the commandments of the one who taught us to love our neighbors as we love ourselves (Matthew 22:39). ...Draper writes that Bush was "gassed" after an 80-minute bike ride at his Crawford, Tex., ranch on the day before Hurricane Katrina struck the Gulf Coast and was largely silent during a subsequent video briefing from then-FEMA Director Michael D. Brown and other top officials making preparations for the storm. sitemeter About Me DWF is dedicated to intelligence and the support of truth wherever it might be found. Coffee in the corner, donuts on the side. Notice: No neo-nazis, reich wingers, devil worshippers or other types of morons allowed.
Passenger Disrupts Plane Again A man who allegedly tried to force his way into a plane's cockpit in midair was not on aviation watch lists, even though he had tried to commandeer another plane before, ABCNEWS has learned. The man started pounding on the cockpit door of a South African Airlines flight from Cape Town to Atlanta at about 6 a.m. ET this morning, the FBI said. "About two hours before the plane landed, a passenger identified as James Drake, 53, a U.S. citizen, attempted to rush the cockpit door," FBI special agent Joe Parris told ABCNEWS. "He was restrained by two passengers." As soon as the flight landed in Atlanta, the FBI took Drake into custody. Not the First Time But this was not the first time Drake was disruptive on a plane. In 1987, Drake burst on board the cockpit of an Air Canada airliner at the airport in San Francisco, took 11 members of the flight crew hostage and threatened to kill the pilot if he was not flown to London. A court-appointed psychiatrist testified that Drake suffered from hallucinations and self-destructive behavior. He later spent nine years in a North Carolina mental institution. Even though he did not hurt anyone, he still caused a disturbance on a plane and tried to get into the cockpit of the Air Canada plane — but none of that information was available to federal aviation officials or South African Airlines. When asked if the airline had any information that this passenger had a similar incident in his past, Executive Vice President Mark Hellenger said South African Airlines was "not aware of it. No airlines have that sort of info on passengers." Federal officials are at a loss to explain why someone who previously tried to commandeer an aircraft 16 years ago was not on an aviation watch list, ABCNEWS has learned.
Digital video technology and production 101: lights, camera, action. Videos are powerful tools for enhancing the reach and effectiveness of health promotion programs. They can be used for program promotion and recruitment, for training program implementation staff/volunteers, and as elements of an intervention. Although certain brief videos may be produced without technical assistance, others often require collaboration and contracting with professional videographers. To get practitioners started and to facilitate interactions with professional videographers, this Tool includes a guide to the jargon of video production and suggestions for how to integrate videos into health education and promotion work. For each type of video, production principles and issues to consider when working with a professional videographer are provided. The Tool also includes links to examples in each category of video applications to health promotion.
Q: jquery draggable: how to limit the draggable area? I have a draggable object (div), and some droppable ones (table TD's). I want the user to drag my draggable object to one of those droppable TD's. I enable draggable and droppable this way: $(".draggable").draggable(); $(".droppable").droppable(); The problem is that with this the user can drag the div anywhere on the screen, including out of the droppable area. How can I limit the boundary area for the draggable object? A: Use the "containment" option: jQuery UI API - Draggable Widget - containment The documentation says it only accepts the values: 'parent', 'document', 'window', [x1, y1, x2, y2] but I seem to remember it will accept a selector such as '#container' too. A: $(function() { $( "#draggable" ).draggable({ containment: "window" }); }); of this code does not display. Full code and Demo: http://www.limitsizbilgi.com/div-tasima-surukle-birak-div-drag-and-drop-jquery.html In order to limit the element inside its parent: $( "#draggable" ).draggable({ containment: "window" }); A: Here is a code example to follow. #thumbnail is a DIV parent of the #handle DIV buildDraggable = function() { $( "#handle" ).draggable({ containment: '#thumbnail', drag: function(event) { var top = $(this).position().top; var left = $(this).position().left; ICZoom.panImage(top, left); }, });
Preparing Students to Collaboratively Solve Community and Global Issues: Focusing on Low Progress Learners Research Investigators Preparing Students to Collaboratively Solve Community and Global Issues: Focusing on Low Progress Learners Project Number OER 06/15 RJL Project Duration May 2015 - April 2017 Status In-Progress Abstract The research on collaborative learning has largely focused on academic and non-academic outcomes measured after students engage in collaboration, and the cognitive and/or social-emotional processes that occur during collaboration. Few studies have examined how the activities that students engage in before collaboration affect the process of collaborating and, consequently, influence outcomes. The PI has been involved in work that investigates how the benefits of collaborative learning can be maximized when students first cognitively engage in preparation tasks (Lam, 2013; Lam & Muldner, under review). Recent findings suggest that different instructional designs can invoke the learning mechanisms of preparation to varying extents which, in turn, affects the extent to which beneficial learning behaviors such as explaining, elaborating, questioning, or debating are used during collaboration (Lam & Kapur, in preparation). Further empirical study is needed to more thoroughly examine the relationship between the learning mechanisms of preparation and collaboration, and the generalizability of preparation-to-collaborate tasks across grade levels and subject areas. An ongoing synthesis of the literature focusing on how collaborative learning activities impact students who are low-ability or ''at-risk'' shows that collaborative activities can be particularly beneficial, when the instructional and classroom conditions are right (Lam, in preparation). The educational streaming system in Singapore presents a unique opportunity to further assess how preparation activities can be designed to effectively promote successful collaboration in classrooms among struggling learners. By targeting students in Singaporean government schools who are streamed into the Normal Technical stream at the Secondary level, the proposed project aims to address how differentially engaging preparatory activities affect both the process of collaboration and the cognitive and affective outcomes of low progress learners. The intent will be to provide highly effective collaborative learning activities to these students through an intervention study that involves implementing a program centered on collaboratively problem-solving community, national, and global issues. A better understanding of the relationship between the learning mechanisms of preparation and collaboration shall inform a framework for designing collaborative learning activities. This framework is grounded in the Preparation for Future Learning paradigm (PFL, Schwartz & colleagues, 1998-) and the Productive Failure learning design (PF, Kapur & colleagues, 2008-). The proposed project shall build upon the PFL and PF work towards developing a design framework for ''preparation for future collaboration.'' The practical implications would be to inform best practices for designing effective collaborative learning activities in the classroom, especially for students who are struggling.
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <link title="Purple" rel="stylesheet" href="manual-purple.css" type="text/css"> <link title="Minty" rel="alternate stylesheet" href="manual-minty.css" type="text/css"> <link title="Plain" rel="alternate stylesheet" href="manual.css" type="text/css"> <title>openMSX User's Manual</title> </head> <body> <h1>openMSX User's Manual</h1> <h2>Contents</h2> <ol class="toc"> <li><a class="internal" href="#intro">1. Introduction</a> <ol class="toc"> <li><a class="internal" href="#newver">1.1 New Versions of This Document</a></li> <li><a class="internal" href="#purpose">1.2 Purpose</a></li> <li><a class="internal" href="#contrib">1.3 Contributors</a></li> <li><a class="internal" href="#history">1.4 Revision History</a></li> </ol> </li> <li><a class="internal" href="#starting">2. Starting the Emulator</a> <ol class="toc"> <li><a class="internal" href="#machines">2.1 Machines</a></li> <li><a class="internal" href="#extensions">2.2 Extensions</a></li> <li><a class="internal" href="#otheroptions">2.3 Other Command Line Options</a></li> </ol> </li> <li><a class="internal" href="#controlling">3. The Console and Settings</a> <ol class="toc"> <li><a class="internal" href="#console">3.1 Console Introduction</a></li> <li><a class="internal" href="#importantconsole">3.2 Some Simple Console Commands</a></li> <li><a class="internal" href="#settings">3.3 Settings</a></li> <li><a class="internal" href="#plug">3.4 Plug</a></li> </ol> </li> <li><a class="internal" href="#media">4. Running MSX Software and Using Media</a> <ol class="toc"> <li><a class="internal" href="#roms">4.1 Running ROM Software</a></li> <li><a class="internal" href="#disks">4.2 Running Disk Software</a> <ol class="toc"> <li><a class="internal" href="#diskimages">4.2.1 Using Disk Images</a></li> <li><a class="internal" href="#dirasdisk">4.2.2 Using Directories as Disks</a></li> <li><a class="internal" href="#realdisks">4.2.3 Using Real Disks</a></li> <li><a class="internal" href="#diskmanagement">4.2.4 Managing Disk Images</a></li> </ol> </li> <li><a class="internal" href="#tape">4.3 Running Tape Software</a> <ol class="toc"> <li><a class="internal" href="#tapewav">4.3.1 Using WAV files</a></li> <li><a class="internal" href="#cas">4.3.2 Using CAS files</a></li> </ol> </li> <li><a class="internal" href="#harddisks">4.4 Emulating MSX Harddisks, SD interfaces and CD-ROM</a> <ol class="toc"> <li><a class="internal" href="#ide">4.4.1 Sunrise IDE</a></li> <li><a class="internal" href="#beeride">4.4.2 Beer IDE</a></li> <li><a class="internal" href="#scsi">4.4.3 SCSI devices</a></li> <li><a class="internal" href="#sd">4.4.4 MegaFlashROM SCC+ SD</a></li> </ol> </li> <li><a class="internal" href="#laserdisc">4.5 Running Laserdisc Software</a></li> </ol> </li> <li><a class="internal" href="#input">5. Input Devices</a> <ol class="toc"> <li><a class="internal" href="#keyboard">5.1 Keyboard</a> <ol class="toc"> <li><a class="internal" href="#msxkeymapping">5.1.1 MSX Key Mapping</a></li> <li><a class="internal" href="#cvkeymapping">5.1.2 ColecoVision Key Mapping</a></li> <li><a class="internal" href="#emukeymapping">5.1.3 Emulator Functions Key Mapping</a></li> <li><a class="internal" href="#keyboardlayouts">5.1.4 Keyboard Layouts</a></li> </ol> </li> <li><a class="internal" href="#joystick">5.2 Joystick</a></li> <li><a class="internal" href="#mouse">5.3 Mouse</a></li> <li><a class="internal" href="#arkanoidpad">5.4 Arkanoid Pad</a></li> <li><a class="internal" href="#trackball">5.5 Trackball</a></li> <li><a class="internal" href="#touchpad">5.6 Touchpad</a></li> </ol> </li> <li><a class="internal" href="#video">6. Video</a> <ol class="toc"> <li><a class="internal" href="#renderers">6.1 Renderers</a></li> <li><a class="internal" href="#accuracy">6.2 Accuracy</a></li> <li><a class="internal" href="#scalers">6.3 Scalers</a></li> <li><a class="internal" href="#gamma">6.4 Gamma Correction</a></li> <li><a class="internal" href="#videoeffects">6.5 Special Effects</a></li> <li><a class="internal" href="#gfx9000">6.6 GFX9000/Video 9000</a></li> <li><a class="internal" href="#recording">6.7 Video Recording</a></li> </ol> </li> <li><a class="internal" href="#audio">7. Audio</a> <ol class="toc"> <li><a class="internal" href="#audiosettings">7.1 Audio Settings</a></li> <li><a class="internal" href="#midi">7.2 MIDI</a></li> <li><a class="internal" href="#soundlogger">7.3 Recording Audio to File</a></li> </ol> </li> <li><a class="internal" href="#usefulextras">8. Useful Extras</a> <ol class="toc"> <li><a class="internal" href="#savestate">8.1 Saving/Loading the State of the Machine</a></li> <li><a class="internal" href="#reverse">8.2 Reverse</a></li> <li><a class="internal" href="#trainer">8.3 Game Trainer</a></li> <li><a class="internal" href="#debugdevice">8.4 Debug Device</a> <ol class="toc"> <li><a class="internal" href="#debugdeviceenable">8.4.1 Enabling the Debug Device</a></li> <li><a class="internal" href="#debugdeviceports">8.4.2 Output Ports</a></li> <li><a class="internal" href="#debugdevicemode1">8.4.3 Single Byte Mode</a></li> <li><a class="internal" href="#debugdevicemode2">8.4.4 Multi Byte Mode</a></li> </ol> </li> </ol> </li> <li><a class="internal" href="#contact">9. Contact Info</a></li> </ol> <h2><a id="intro">1. Introduction</a></h2> <h3><a id="newver">1.1 New Versions of This Document</a></h3> <p> The latest version of the openMSX manual can be found on the openMSX home page: </p> <p> <a class="external" href="http://openmsx.org/manual/">http://openmsx.org/manual/</a> </p> <p> You can also use this URL to get up-to-date versions of the hyper links if you printed out this manual. </p> <h3><a id="purpose">1.2 Purpose</a></h3> <p> This manual is about openMSX, the open source MSX emulator that tries to achieve near-perfect emulation by using a novel emulation model. You can find more information about openMSX on the <a class="external" href="http://openmsx.org/">openMSX home page</a>. You can also download the emulator itself from there. </p> <p> openMSX is not completed yet, which means that most things work but not all features are implemented yet. Many emulation features are implemented, but in terms of user interface it is rather bare bones, unless you use the optional Graphical User Interface dubbed openMSX Catapult, which has separate <a class="external" href="http://openmsx.org/catapult-manual/">manuals</a> for now. However, because the emulation is already pretty good, it would be nice if non-insiders would be able to play with it, too. For those people, we have written this guide. </p> <p> This manual tells you how you can use openMSX, once it has been installed and properly set up. You should be able to use most of the features of openMSX if you have read it. If you are using openMSX with Catapult, you don't have to pay attention to the exact command and setting names. However it is still useful to read this document to find out how openMSX works and learn its terminology. </p> <p> <em>Disclaimer:</em> We do not claim this guide is complete or even correct. What you do with the information in it is entirely at your own risk. We just hope it helps you enjoy openMSX more. </p> <h3><a id="contrib">1.3 Contributors</a></h3> <p> The following people contributed to this document in one way or another: </p> <ul> <li>Jorrith Schaap</li> <li>Manuel Bilderbeek</li> <li>Maarten ter Huurne</li> <li>other openMSX developers</li> </ul> <p> Thanks to all of them! </p> <h3><a id="history">1.4 Revision History</a></h3> <p> For the revision history, please refer to the <a class="external" href="https://github.com/openMSX/openMSX/commits/master/doc/manual/user.html">commit log</a>. </p> <h2><a id="starting">2. Starting the Emulator</a></h2> <p> In this chapter we will tell you how to select MSX machines and how to use extension cartridges. </p> <h3><a id="machines">2.1 Machines</a></h3> <p> If you start openMSX without any command line parameters, you will get the default machine, which is stored in the <code><a class="external" href="commands.html#default_machine">default_machine</a></code> setting, see the <a class="external" href="setup.html#settings">Setup Guide</a>. If you did not change the default machine, you will get the C-BIOS MSX2+ machine. </p> <p> To select a different MSX machine, you can use the <code>-machine</code> command line argument: </p> <div class="commandline"> openmsx -machine Panasonic_FS-A1GT </div> <p> But, you can also use the <code><a class="external" href="commands.html#machine">machine</a></code> command to switch at run time in the <a class="internal" href="#console">console</a>, which is explained in the next chapter. </p> <p> The C-BIOS machines come with ROMs installed; for other machines you will have to install system ROMs yourself, see the <a class="external" href="setup.html#systemroms">Setup Guide</a> for details. </p> <h3><a id="extensions">2.2 Extensions</a></h3> <p> Extensions are simply MSX cartridges (extensions to the MSX system) that you can plug into the emulated MSX. openMSX ships with a lot of predefined extensions. Note that many of them require firmware ROMs (called system ROMs); see the <a class="external" href="setup.html#systemroms">Setup Guide</a> for details. </p> <p> We will use the FMPAC as an example. openMSX ships with a definition (XML file) for the FMPAC extension, but you will have to <a class="external" href="setup.html#installrom">add</a> the <code>fmpac.rom</code> firmware ROM yourself. When you have done so, you can insert an FMPAC into the emulated MSX machine with the following command line: </p> <div class="commandline"> openmsx -ext fmpac </div> <p> Similar to machines, you can also use the <code><a class="external" href="commands.html#ext">ext</a></code> command in the console to do it at run time. You can also use something like <code>-extb</code> to explicitly specify cartridge slot B. </p> <p> If you look in the <code>share/extensions</code> directory (or when using the console, type the TAB key with the <code>ext</code> command, see next chapter), you will see all the extensions known to openMSX. For example <code>-ext mbstereo</code> gives you the MoonBlaster stereo effect: FMPAC on the left speaker and MSX-AUDIO on the right speaker. </p> <h3><a id="otheroptions">2.3 Other Command Line Options</a></h3> <p> Often used other command line options will be discussed later in this manual. For a complete list of them, type the following command: </p> <div class="commandline">openmsx -h</div> <h2><a id="controlling">3. The Console and Settings</a></h2> <h3><a id="console">3.1 Console Introduction</a></h3> <p> openMSX has a built-in command interface called the <em>console</em>, which allows you to control almost all aspects of openMSX while it is running. You can access the console by pressing F10 (with <a class="internal" href="#keymapping">default key mapping</a>; Cmd+L on Mac) when the focus is on the emulator window. This will give you a command line in the openMSX window. Note that due to a <a class="external" href="https://github.com/openMSX/openMSX/issues/485">known problem</a> in SDL on Windows, the console won't come up if you went to fullscreen by using ALT-ENTER. Use F11 to go to fullscreen to work around this problem. (See also <a class="internal" href="#settings">Settings</a> and <a class="internal" href="#keymapping">Keymapping</a>.) </p> <p> Typing <a class="external" href="commands.html#help"><code>help</code></a> gives a list of commands. Using PageUp you can see all of them. If you type <code>help [command]</code> you will get help for the specified command. This manual describes a few important commands; a full list can be found in the <a class="external" href="commands.html">Console Command Reference</a>. The console can be used to <a class="internal" href="#disks">change disk images</a>, plug in <a class="internal" href="#joystick">joysticks</a> or <a class="internal" href="#mouse">mice</a>, <a class="internal" href="#settings">change settings</a> at run time and to change key bindings, among others. It actually gives you full control of openMSX: if it can't be done via the console, it's probably impossible! </p> <p> One very practical feature of the console command line is that you can use "completion" features. Just try typing half a command and then press the TAB key; openMSX will then try to finish the word you were typing or show the possibilities in case of ambiguities. You can use it also for file names, connectors, pluggables and settings and even for machine and extension names. </p> <p>Here follows the full list of keyboard commands that can be used in the console: </p> <table> <tr> <th>key(s) </th> <th>function </th> </tr> <tr> <td>Left/Right </td> <td>move cursor on command line </td> </tr> <tr> <td>Up </td> <td>show previous command from history (starting with current command line)</td> </tr> <tr> <td>Down </td> <td>show next command from history (starting with current command line) </td> </tr> <tr> <td>Tab </td> <td>attempt completion of current command </td> </tr> <tr> <td>Enter/Return </td> <td>execute command line </td> </tr> <tr> <td>PageUp </td> <td>scroll one line up </td> </tr> <tr> <td>PageDown </td> <td>scroll one line down </td> </tr> <tr> <td>SHIFT+PageUp </td> <td>scroll one page up </td> </tr> <tr> <td>SHIFT+PageDown </td> <td>scroll one page down </td> </tr> <tr> <td>Delete </td> <td>delete character at cursor </td> </tr> <tr> <td>CTRL+H/Backspace </td> <td>delete character left of cursor </td> </tr> <tr> <td>CTRL+A/Home </td> <td>put cursor at the start of the command line </td> </tr> <tr> <td>CTRL+E/End </td> <td>put cursor at the end of the command line </td> </tr> <tr> <td>CTRL+C </td> <td>clear command line </td> </tr> <tr> <td>CTRL+V (Mac: Cmd+V) </td> <td>paste clipboard content in console </td> </tr> <tr> <td>ALT+Left </td> <td>move cursor to start of (previous) word </td> </tr> <tr> <td>ALT+Right </td> <td>move cursor to end of (next) word </td> </tr> <tr> <td>ALT+Backspace </td> <td>delete till start of word (to where Alt+Left would move) </td> </tr> <tr> <td>ALT+D (Mac: ALT+Delete)</td> <td>delete till end of word (to where Alt+Right would move) </td> </tr> </table> <h3><a id="importantconsole">3.2 Some Simple Console Commands</a></h3> <p> You can reset your MSX with the Console command <code><a class="external" href="commands.html#reset">reset</a></code> and exit openMSX with the command <code><a class="external" href="commands.html#exit">exit</a></code>. As is explained in the previous chapter, you can change machines with the <code><a class="external" href="commands.html#machine">machine</a></code> command and you can insert extensions with the <code><a class="external" href="commands.html#ext">ext</a></code> command (use tab-completion to see the list of possible extension names). Remove extensions with the <code><a class="external" href="commands.html#remove_extension">remove_extension</a></code> command or get a list of the currently inserted extensions with the <code><a class="external" href="commands.html#list_extensions">list_extensions</a></code> command. Other commands will be discussed later on in this manual. </p> <h3><a id="settings">3.3 Settings</a></h3> <p> An interesting console command is <code><a class="external" href="commands.html#set">set</a></code>. You can use it to change the various settings. E.g., you can use it to set the current <a class="internal" href="#renderer">renderer</a>. If you issue set with only the setting (like <code>set <a class="external" href="commands.html#renderer">renderer</a></code>), you will get the current value of that setting. Settings that have only two possible values can also be toggled with the <code><a class="external" href="commands.html#toggle">toggle</a></code> command (an example is the default key binding of F11 to <code>toggle fullscreen</code>, see also below). A complete list of settings can also be found in the <a class="external" href="commands.html">Console Command Reference</a>. Note that using the "tab completion" feature can help you a lot in getting an idea of what settings are possible, as it will only complete possible options. Just try that. </p> <p> If the MSX goes too fast or too slow, adjust the emulation speed with the <code><a class="external" href="commands.html#speed">speed</a></code> setting, which has the speed percentage as parameter. So, typing <code>set speed 120</code>, will let the emulated MSX run at 120% of normal MSX speed. This is useful for debugging purposes (slow down) or when you want to skip certain parts of a demo for example (speed up). </p> <p> Some MSX machines like the Panasonic FS-A1GT have built in software (called firmware), that can be switched on and off via a switch on the machine itself. In openMSX the internal software is switched off by default, but you can switch it on with the following setting: <code>set <a class="external" href="commands.html#firmwareswitch">firmwareswitch</a> on</code>. </p> <p> If you're not really interested in how long a real MSX would take for loading from diskette, cassette or laserdisc, you could enable the full speed when loading feature: <code>set <a class="external" href="commands.html#fullspeedwhenloading">fullspeedwhenloading</a> on</code>. It runs openMSX at maximum speed whenever it thinks that the MSX is loading. The drawbacks: it might detect a bit too late that the MSX isn't loading anymore, so sometimes the first notes of music played right after loading might be too fast. Also, when loading openMSX will use all CPU power it can get to get the maximum speed; the feature has no influence on the state of the MSX, of course. </p> <p> You can save all your current settings with the <code><a class="external" href="commands.html#save_settings">save_settings</a></code> command. If you specify a file name after this command, the settings will not be saved to the default settings file (<code>share/settings.xml</code>), but to the specified file. At start up, alternative settings files can be loaded by using the <code>-setting</code> command line option. You can also use the <code><a class="external" href="commands.html#load_settings">load_settings</a></code> command to load settings at run time. Settings that are not mentioned in the saved settings file that you are loading will be untouched. If you want openMSX to automatically save your settings when it exits, issue the following setting: <code>set <a class="external" href="commands.html#save_settings_on_exit">save_settings_on_exit</a> true</code>. </p> <h3><a id="plug">3.4 Plug</a></h3> <p> The console command <code><a class="external" href="commands.html#plugunplug">plug</a></code> can be used to plug the so called pluggables (devices) into connectors on the MSX. Examples of connectors are the joystick ports, the printer port, the MIDI in and out connector, the cassette port, etc. Examples of pluggables are <a class="internal" href="#joystick">joysticks</a> and <a class="internal" href="#mouse">mice</a>, but also printers and MIDI equipment. The command <code><a class="external" href="commands.html#plugunplug">plug</a></code> without any parameters will show a list of connectors and what pluggables are plugged into them. Using <code>plug [connector]</code> will only show what is plugged into [connector]. You will not be surprised that the command <code>plug [connector] [pluggable]</code> will plug the [pluggable] into the [connector]. </p> <p> Note that using the "tab completion" feature can help you a lot in getting an idea of what plug commands are possible, as it will only complete possible connectors and their possible pluggables. Also just try this. </p> <!-- <p class="todo"> Add the complete list of pluggables here. </p> --> <h2><a id="media">4. Running MSX Software and Using Media</a></h2> <p> With this information, you can run most of the existing MSX software. For all supported media, there is a list of extensions that are recognized by openMSX. If you run openMSX from the command line, adding a file name (with path if necessary) as a command line option, openMSX will insert the file as the proper type of media. The list of supported extensions for each media type can be easily retrieved with <code>-h</code> option on the command line. For some media examples of command line usage are given below. </p> <h3><a id="roms">4.1 Running ROM software</a></h3> <p> Suppose you want to run the ROM file <code>galious.rom</code>. Then you simply type: </p> <div class="commandline">openmsx galious.rom</div> <p> and the emulated MSX will run the game. (Of course, in this case, the file <code>galious.rom</code> should be in the current directory. </p> <p> You can also explicitly indicate that the thing is a ROM image like this: </p> <div class="commandline">openmsx -cart galious.gam</div> <p> This lets openMSX know that the file <code>galious.gam</code> is a ROM cartridge and that openMSX should insert it in the first available free cartridge slot. You can also use <code>-carta</code> to explicitly specify cartridge slot A. </p> <p> Or, maybe openMSX didn't have the ROM in the ROM database and failed auto detection of the mapper type. You can specify the mapper to <code>Konami</code> (formerly known as <code>KONAMI4</code>) like this: </p> <div class="commandline">openmsx galious.rom -romtype Konami</div> <p> Note that in practice you won't need this, because most ROM images are in the database or auto detected if they are not. The <code>-romtype</code> option should follow the ROM it applies to immediately on the command line. </p> <p> If wanted, openMSX can apply IPS patches to ROM software before running it. IPS patches are files that describe a modification of the ROM you are applying it to, e.g. a translation or a cheat. This way you do not need to alter any files. To apply an IPS patch you have to provide the IPS filename like this: </p> <div class="commandline">openmsx -cart galious.rom -ips galiouspatch.ips</div> <p> As with the <code>-romtype</code> option, the <code>-ips</code> option on the command line must follow the ROM file it applies to directly. You can also use multiple <code>-ips</code> options if you want to apply multiple patches. </p> <p> If you already have openMSX running and want to insert cartridges at run time (maybe even when the MSX is powered on), you can use the <code><a class="external" href="commands.html#cart">carta</a></code> command in the <a class="internal" href="#console">console</a> as well, which is just as powerful. </p> <h3><a id="disks">4.2 Running Disk Software</a></h3> <h4><a id="diskimages">4.2.1 Using Disk Images</a></h4> <p> To run a disk image, you can type: </p> <div class="commandline">openmsx relax.dsk</div> <p> for example. Or, if you use a disk image with a filename extension that is unknown to openMSX: </p> <div class="commandline">openmsx -diska relax.di</div> <p> You can also change disks at run time of course. Just type </p> <div class="commandline"> <a class="external" href="commands.html#disk">diska</a> &lt;diskimage&gt; </div> <p> in the <a class="internal" href="#console">console</a> to put the specified disk image in drive A. To eject the disk from drive A, use: </p> <div class="commandline"> <a class="external" href="commands.html#disk">diska</a> eject </div> <p> Note that inserting another disk image automatically ejects the previous one. </p> <p> Disk images in XSA format are also supported, use them as regular disk images, but do note that they are read only. The same counts for (g)zipped disk images. Note that in zipped disk images the first file that is packed into the zip file will be used as disk image. </p> <p> If wanted, openMSX can also apply IPS patches to disk software before running it. This way you do not need to alter any files. To apply an IPS patch you have to provide the IPS filename like this: </p> <div class="commandline">openmsx SDSNAT1C.DSK -ips sdsnat1-eng.ips</div> <p> The <code>-ips</code> option must follow directly the disk image on the command line it applies to. You can also use multiple <code>-ips</code> options if you want to apply multiple patches. </p> <p> You can also apply the patches when changing disks at run time. Just type something like </p> <div class="commandline"> <a class="external" href="commands.html#disk">diska</a> SDSNAT1C.DSK.gz sdsnat1-eng.ips sd-cheat.ips </div> <p> in the console to put the specified gzipped disk image SDSNAT1C.DSK.gz in drive A, with both IPS patches applied. </p> <h4><a id="dirasdisk">4.2.2 Using Directories as Disks</a></h4> <p> The DirAsDsk feature permits you to use a directory on your host computer's file system as a disk image for your emulated MSX. Note that this has nothing to do with harddisk emulation. It simply creates a virtual disk structure in memory from the files that are in the directory that you specified as if it were a disk image. So: </p> <div class="commandline"> openmsx -diska . </div> <p> will try to put all files of the current directory on a disk image in memory and start openMSX with it. The actual data is still read from/written to the files in your directory so that if you change the content of the files, these changes are immediately visible to the emulated MSX. This way you can for instance edit source files with your favourite text editor but compile them immediately in the emulated MSX. </p> <p> Using the default value of the setting <a class="external" href="commands.html#DirAsDSKmode">DirAsDSKmode</a> (full), all changes to the directory on the host system <em>and</em> on the MSX system are performed, so that they are immediately visible to the other side. If this is not the desired behaviour, please <a class="external" href="commands.html#DirAsDSKmode">check the documentation</a> of that setting. </p> <p> <em>Be careful when writing to files from your emulated MSX.</em> In the default 'full' mode, you can change/overwrite/delete/corrupt files on your host system, if you made them accessible for the emulated MSX! Still, this is the behaviour what most people want/expect and it's very useful if you know what you are doing. </p> <p> Note that MSX disks only have a limited capacity, typically 720kB. If the host directory contains more data, then some host files will be ignored: they will not appear in the virtual disk image. </p> <h4><a id="realdisks">4.2.3 Using Real Disks</a></h4> <p> To use a real disk, just specify <code>/dev/fd0</code> as a disk image. This is of course a Linux (Unix, actually) specific feature, but for now it is usable. It may be a bit slow though, with the FDC emulation enabled. It should be just as slow as a real disk drive, however! Don't forget that you shouldn't have it mounted to be able to use it this way. We recommend to use only write-protected disks! It is possible that you damage the contents of your disk if you don't. Windows users can try real disks by using the DirAsDsk feature. Because we have not tried this before, we advise you to be careful and always use it with write protected disks. Only regular disks with normal files will work with it; specify A: as disk image to use it. </p> <h4><a id="diskmanagement">4.2.4 Managing Disk Images</a></h4> <p> openMSX has a special command with functionality to perform file imports and exports, with support for Sunrise harddisk images (FAT12 only) with partitions and normal disk images. Please see the separate manual for this, called <a class="external" href="diskmanipulator.html">Using diskmanipulator</a>. </p> <h3><a id="tape">4.3 Running Tape Software</a></h3> <h4><a id="tapewav">4.3.1 Using WAV files</a></h4> <p> openMSX supports WAV files for tape emulation! Just use an MSX with a cassette port (at least any MSX1 or MSX2 machine will do) and it should be available. </p> <p> Then type in the <a class="internal" href="#console">console</a>: </p> <div class="commandline"> <a class="external" href="commands.html#cassetteplayer">cassetteplayer</a> insert &lt;file&gt;.wav </div> <p> And then in MSX Basic, type: </p> <div class="commandline"> run"cas:" </div> <p> (or another command to load the program on 'tape'.) </p> <p> Note that in Linux, one should not use the special file <code>/dev/pcm</code> for tape input. openMSX will try to read the file until the end, which doesn't exist. </p> <p> Other cassetteplayer related commands/settings you need to know of are: </p> <ul> <li><code>cassetteplayer rewind</code>, to rewind the tape</li> <li><code>cassetteplayer eject</code>, to eject the tape</li> <li><code>cassetteplayer new &lt;filename&gt;</code>, to create a new WAV cassette image to record to; also sets the cassette player in record mode</li> <li><code>cassetteplayer play</code>, to set the cassette player in play mode (when you've just recorded to the cassette)</li> <li><code>cassetteplayer record</code>, to set the cassette player in record mode, to append to existing cassette images (NOT IMPLEMENTED YET)</li> <li><code>set cassetteplayer_volume</code>, to set the volume of the cassette player sound (yeah, the screeching tape sounds!)</li> </ul> <p> As you can see in this list, appending to existing cassette images (or (partially) overwriting them) is not supported (yet). If you want to save again, just insert a blank tape by using the <code>cassetteplayer new</code> command again. </p> <h4><a id="cas">4.3.2 Using CAS files</a></h4> <p> You can also use the so-called CAS files. Use them exactly as you would use WAV files, described in the previous section. </p> <p> We don't support using CAS files by patching a BIOS natively, because it is not really something we want: we prefer a more authentic emulation without hacks like this. So, the CAS files are automatically converted to WAV files, internally. Note that the loading time is drastically longer this way (but: doing a <code>set <a class="external" href="commands.html#fullspeedwhenloading">fullspeedwhenloading</a> on</code> will help a lot). On the other hand, you will be able to hear the cassette sounds now also with the CAS files... What is using cassettes with an MSX without those characteristic sounds? </p> <p> To make it even more comfortable to run software from CAS images, try the following setting, that will attempt to type the loading instruction for you after the MSX has started up: </p> <div class="commandline"> set <a class="external" href="commands.html#autoruncassettes">autoruncassettes</a> on </div> <p> Note that saving to CAS files (new or existing ones) is not possible; one can only save to new cassette images in WAV format. </p> <h3><a id="harddisks">4.4 Emulating MSX Harddisks and CD-ROM</a></h3> <p> openMSX supports mostly the emulation of the Sunrise IDE interface, but there is also some experimental support for two types of SCSI interfaces: the Gouda/Novaxis SCSI interface and the MEGA-SCSI. Nowadays, openMSX also emulates the SD interface MegaFlashROM SCC+ SD and the Beer IDE interface. </p> <p> The extensions that enable this have a built in harddisk configuration, in the form of a 100MB sized disk image. This is the default size: if the harddisk image is not present, the file is created with this size. The image will end up in your openMSX user directory<code>/persistent/NAME/untitled1/IMAGENAME.dsk</code>, where NAME is the name of the extension used and IMAGENAME is a name that is configured in the extension's XML file (default <code>hd.dsk</code>). </p> <p>When using these extensions for the first time, one has to treat them as if they are real interfaces with a blank harddisk connected. How to initialise them depends on the type, it is advisable to read the manuals. The sections below give some hints. The <code><a class="external" href="diskmanipulator.html">diskmanipulator</a></code> may be helpful, but only supports hard disk images with a partition table format compatible with the Sunrise IDE at the moment. </p> <p> For clarity: because the emulation is done on a big disk image, there can be no data corruption of your PC's harddisk. This does mean that you need free disk space for this image, which can be quite big (default 100MB). So, in other words, you can't really use your normal PC harddisk as an MSX harddisk for these extensions. (Maybe on UNIX systems it works if you choose a device like <code>/dev/hdb</code> as harddisk image file, but we have not tested it and do note that it can cause loss of data of that partition or disk!) </p> <p> If you still want to use files from your real PC harddisk on the emulated MSX, you have to use the DirAsDsk feature. See the <a class="internal" href="#dirasdisk">DirAsDsk section</a> for more details. </p> <p>Please read the following sections for details about the specific extensions.</p> <h4><a id="ide">4.4.1 Sunrise IDE</a></h4> <p> The extension for this is called 'ide'. By default it has a harddisk connected to the master port and a CD-ROM player connected to the slave port. </p> <p> If you don't want to use the default harddisk image as is described above, you can specify the harddisk image to be used on the command line: </p> <div class="commandline">openmsx -ext ide -hda symbos.dsk</div> <p> This means that you're using the ide extension with symbos.dsk as harddisk image. You can also change the harddisk image at run time in the <a class="internal" href="#console">console</a> (only when the MSX is powered off via the <code><a class="external" href="commands.html#power">power</a></code> setting). This works the same as the <code><a class="external" href="commands.html#disk">diska</a></code> command: </p> <div class="commandline"> <a class="external" href="commands.html#hd">hda</a> &lt;diskimage&gt; </div> <p> The 'ide' extension needs the BIOS that can be flashed into the Sunrise IDE interface. It can be downloaded from the <a class="external" href="http://www.msx.ch/sunformsx/download/dl-ide.html">Sunrise for MSX web site</a>. </p> <p> The initialisation of a Sunrise IDE harddisk is described in the text files that come with the FDISK program for IDE, downloadable from the <a class="external" href="http://www.msx.ch/sunformsx/download/dl-ide.html">Sunrise for MSX web site</a>. There are also <a class="external" href="https://www.msx.org/forum/semi-msx-talk/emulation/how-get-sunrise-ide-working-openmsx">some</a> <a class="external" href="https://www.msx.org/forum/semi-msx-talk/emulation/openmsx-harddisk-emulation">threads</a> on the MSX Resource Center forum that may give you valuable hints. </p> <p> You can side step these procedures by using the <code><a class="external" href="diskmanipulator.html">diskmanipulator</a></code> to create the initial hd image, and you can immediately put some files and subdirectories on it. For instance to create a hard disk with 3 partitions of 32 megabyte on it, and have each partition filled with files and subdirectories you can do the following: </p> <p> Start openMSX with the ide extension, then type in the <a class="internal" href="#console">console</a>: </p> <div class="commandline"> set <a class="external" href="commands.html#power">power</a> off<br/> <a class="external" href="diskmanipulator.html">diskmanipulator</a> <a class="external" href="diskmanipulator.html#create">create</a> /tmp/new-hd.dsk 32M 32M 32M<br/> <a class="external" href="commands.html#hd">hda</a> /tmp/new-hd.dsk<br/> <a class="external" href="diskmanipulator.html">diskmanipulator</a> <a class="external" href="diskmanipulator.html#import">import</a> hda1 /home/david/msxdostools/<br/> <a class="external" href="diskmanipulator.html">diskmanipulator</a> <a class="external" href="diskmanipulator.html#import">import</a> hda2 /home/david/msxdemos/<br/> <a class="external" href="diskmanipulator.html">diskmanipulator</a> <a class="external" href="diskmanipulator.html#import">import</a> hda3 /home/david/msxdrawings/<br/> set <a class="external" href="commands.html#power">power</a> on </div> <p>Note that the diskmanipulator can only handle hard disk images that are compatible with the Sunrise IDE interface!</p> <p> As announced above, there is (limited) support for CD-ROM with the 'ide' extension. You can insert an ISO image in that virtual CD-ROM player with the <code>-cda</code> command line option and change it at run time with the <code><a class="external" href="commands.html#cd">cda</a></code> console command, all similar to the aforementioned <code><a class="external" href="commands.html#hd">hda</a></code> and <code><a class="external" href="commands.html#disk">diska</a></code> commands and options. </p> <h4><a id="beeride">4.4.2 Beer IDE</a></h4> <p>The Beer IDE interface, as brought to us by SOLID, is emulated by openMSX, too. This interfaces only offers a single device (no master and slave) and can only handle up to 5 partitions of 32MB. But the up side is that it doesn't need MSX-DOS2, and thus it can run on any MSX (with 64kB RAM to run MSX-DOS). Emulation of this interface is quite recent, so consider it experimental.</p> <p>Usage is identical to using the Sunrise hard disk interface: you can use the <a class="external" href="commands.html#hd">hda</a> command and the matching command line parameter <code>-hda</code> to control which image will be used.</p> <p>By default, the image is 170MB, so that 5 partitions of 32MB fit easily. Firmware version 1.9RC1 is selected by default, because we could not get the 1.8 firmware to work: the MSXFDISK program didn't create partitions which actually worked with the 1.8 firmware. If you want to experiment with it, you can change the firmware to use by editing the extension file in <code>share/extensions/Beer_IDE.xml</code>.</p> <p>With the 1.9RC1 firmware, we were able to work with an existing harddisk image, partitioned with the Windows tools that come with that firmware. Using this firmware, you can also partly work with Sunrise IDE compatible hard disk images, so you can use diskmanipulator to create a hard disk image and to import and export to them. Be careful though, this has not been extensively tested. Always back-up your hard disk image before doing this, in case something goes wrong. Important note: the Sunrise partition format numbers partitions the other way around as what Beer IDE 1.9RC1 firmware expects. This also means that you can't boot from Sunrise IDE images (and thus also not from images created by diskmanipulator). </p> <p> Unfortunately, the Beer IDE is hardly documented and the software is hard to find. So, it's for experts only! </p> <h4><a id="scsi">4.4.3 SCSI devices</a></h4> <p>First of all: the SCSI emulation is experimental! There is a lot bigger chance that you may lose data on your emulated harddisk images with SCSI than with Sunrise IDE! When we tried it, everything seemed fine, but you are warned.</p> <p>The SCSI extensions (currently Gouda_SCSI, ESE_MEGA-SCSI and ESE_WAVE-SCSI) have the default 100 MB harddisk image connected on target ID 1 and an (even more experimental) LS-120 device (basically a harddisk like media that can be changed/ejected when the power is on) on target ID 2. </p> <p>Specifying or changing hard disk images works the same as with IDE, see above.</p> <p> To change the disk image of the LS-120 device, use the <code>lsa</code> (LS drive A) command, exactly the same as the <a class="external" href="commands.html#hd">hda</a> command. Of course you do not need to have the power turned off to do this, as this is the whole point of the LS-120 device. You can also just eject it, with the <code>eject</code> subcommand. At the time of writing there seems to be a bug when doing this: the device isn't listed in the device list if there is no media inserted. It is not possible to specify an LS-120 device on the command line. </p> <p>Initialisation for the ESE SCSI devices needs tools like <code>MGINST</code>, which can be found on <a class="external" href="http://www.msxnet.org/gtinter/nogame-e.htm">Takamichi's web site</a>. They include small manuals in English. This manual is not the place to explain the procedure, but the idea is as follows. First, install the MSX-DOS 2 kernel in the SRAM of the device, using the <code>MGINST</code> program (you might want to use <code>KSAVER</code> first to save the kernel of your DOS 2 cartridge). After this, the MSX will boot from the SRAM disk. Use the <code>SFORM-1</code> (for MSX-DOS) or the <code>SFORM-2</code> (for MSX-DOS 2) to format the drive (use a physical format, for now). Use <code>ESET</code> to assign drive letters to partitions. </p> <p>For the Gouda (Novaxis) SCSI interface, you need the Novaxis ROM, see also <a class="external" href="http://msx.hansotten.com/index.php?page=msxscsi">Hans Otten's Page</a> or <a class="external" href="http://faq.msxnet.org/scsi.html">The Ultimate MSX FAQ</a>. Those sites also contain manuals for the Novaxis ROM. Initialisation is done with the <code>NFDISK</code> utility, which can be found on <a class="external" href="http://members.chello.nl/m.delorme/">Marcel Delorme's site</a>. </p> <h4><a id="sd">4.4.4 MegaFlashROM SCC+ SD</a></h4> <p>Currently there is only one SD interface emulated: the MegaFlashROM SCC+ SD. All features of this cartridge are emulated in the sense that all currently working software with it runs on openMSX too. It is not emulated accurately enough to rely on it for development.</p> <p>The difference compared to a real MegaFlashROM SCC+ SD, is that it does not come with anything flashed on the flash ROM by default. There are two ways to overcome that. The first one is to download the preflashed ROM content (for URL see below) and install it into your systemroms folder, like any usual system ROM. This only works if you use the extension for the first time, unless you manually delete the persistent file for the flash ROM chip (typically in your openMSX user directory<code>/persistent/MegaFlashROM_SCC+_SD/untitled1/megaflashromsccplussd.sram</code>). Only if no such file is found, openMSX will load the content of that ROM file into the flash ROM of the MegaFlashROM SCC+ SD. The second way is manually flashing things like Nextor, the rescue menu and the ROM disk. This is all described in the manual (see at the end of this section) of the MegaFlashROM SCC+ SD, because on a real device you may also need to do this.</p> <p>Once you achieved this, usage is again identical to using the Sunrise hard disk interface: you can use the <a class="external" href="commands.html#hd">hda/hdb</a> commands and the matching command line parameters <code>-hda</code> and <code>-hdb</code> to control which image will be used for the first and second SD card.</p> <p>Currently, by default, the first SD card is 8MB and the 2nd SD card is 100MB size. You can change these defaults by editing the extension file in <code>share/extensions/MegaFlashROM_SCC+_SD.xml</code>. For formatting and managing the SD cards, please refer to its manual and tools on the Flash part of the <a class="external" href="http://www.msxcartridgeshop.com/">MSX Cartridge Shop</a>. It also provides the ROM file with the initial content of the flash ROM as it is shipped on real MegaFlashROM SCC+ SD cartridges. </p> <p>One problem you may encounter compared to a real MegaFlashROM SCC+ SD is: how to get files on the SD cards... You can't take out the SD cards and put them in a PC or so. Your options are the same as on a real system when you don't have a PC at hand: use the floppy drive of your MSX to transfer files or use another mass storage medium. You can for instance use the Sunrise IDE concurrently with the MegaFlashROM SCC+ SD. And for the Sunrise IDE partitions, you could use <code><a class="external" href="diskmanipulator.html">diskmanipulator</a></code> to import a lot of files, as is explained <a class="internal" href="#ide">above at the Sunrise IDE</a> section. Once you have that you can copy these files from MSX-DOS2/Nextor onto the virtual SD card(s). </p> <h3><a id="laserdisc">4.5 Running Laserdisc software</a></h3> <p> In order to run Laserdisc software, you need to have this optional feature compiled into your openMSX binary. Laserdisc is only supported by the Pioneer PX-7 or the Pioneer PX-V60 machines, which have special hardware to control the laserdisc player. </p> <p> In the <a class="internal" href="#console">console</a>, type: </p> <div class="commandline"> <a class="external" href="commands.html#laserdiscplayer">laserdiscplayer</a> insert &lt;file&gt;.ogv </div> <p> to insert a Laserdisc (image) into the Laserdisc player. By default, the Laserdisc will be loaded automatically. If the <a class="external" href="commands.html#autorunlaserdisc">autorunlaserdisc</a> setting is off, then you will have to enter the following into the MSX by hand: </p> <p> After booting the MSX, choose option 1 when asked if you want to run P-BASIC (Palcom-BASIC). In MSX-BASIC, type: </p> <div class="commandline"> call ld </div> <p> to load and run the Laserdisc program. </p> <p> The program is encoded on the right audio channel which will not be audible. With <code>set <a class="external" href="commands.html#fullspeedwhenloading">fullspeedwhenloading</a> on</code>, openMSX runs at maximum speed whenever the Laserdisc is seeking or loading a program. </p> <h2><a id="input">5. Input Devices</a></h2> <h3><a id="keyboard">5.1 Keyboard</a></h3> <a id="keymapping"><!--backwards compat--></a> <h4><a id="msxkeymapping">5.1.1 MSX Key Mapping</a></h4> <p>The special MSX keys are mapped as follows, the first column for PCs (running Windows, Linux or BSD), the second column for Apple Macintosh computers: </p> <table> <tr> <th>MSX key</th> <th>key (PC)</th> <th>key (Mac)</th> </tr> <tr> <td>CTRL key</td> <td>L-CTRL</td> <td>L-CTRL</td> </tr> <tr> <td><a class="external" href="commands.html#kbd_deadkey1_host_key">dead (accents) key</a></td><td>R-CTRL</td> <td>R-CTRL</td> </tr> <tr> <td>GRAPH key</td> <td>L-ALT</td> <td>L-ALT</td> </tr> <tr> <td><a class="external" href="commands.html#kbd_code_kana_host_key">CODE/KANA key</a></td><td>R-ALT</td> <td>R-ALT</td> </tr> <tr> <td>取消 ('cancel') key</td> <td>L-Windows</td><td></td> </tr> <tr> <td>実行 ('execute') key</td> <td>R-Windows</td><td></td> </tr> <tr> <td>SELECT key</td> <td>F7</td> <td>F7</td> </tr> <tr> <td>STOP key</td> <td>F8</td> <td>F8</td> </tr> <tr> <td>INS key</td> <td>Insert</td> <td>Cmd+I</td> </tr> </table> <h4><a id="cvkeymapping">5.1.2 ColecoVision Key Mapping</a></h4> <p>The ColecoVision controllers are mapped as follows:</p> <table> <tr> <th>direction/key</th> <th>player 1</th> <th>player 2</th> </tr> <tr> <td>up</td> <td>cursor up</td> <td>W</td> </tr> <tr> <td>down</td> <td>cursor down</td> <td>S</td> </tr> <tr> <td>left</td> <td>cursor left</td> <td>A</td> </tr> <tr> <td>right</td> <td>cursor right</td> <td>D</td> </tr> <tr> <td>fire left</td> <td>space, R-CTRL</td> <td>L-CTRL</td> </tr> <tr> <td>fire right</td> <td>L-ALT, R-ALT, R-SHIFT</td> <td>L-SHIFT</td> </tr> <tr> <td>1</td> <td>1, numpad 1</td> <td>R</td> </tr> <tr> <td>2</td> <td>2, numpad 2</td> <td>T</td> </tr> <tr> <td>3</td> <td>3, numpad 3</td> <td>Y</td> </tr> <tr> <td>4</td> <td>4, numpad 4</td> <td>F</td> </tr> <tr> <td>5</td> <td>5, numpad 5</td> <td>G</td> </tr> <tr> <td>6</td> <td>6, numpad 6</td> <td>H</td> </tr> <tr> <td>7</td> <td>7, numpad 7</td> <td>V</td> </tr> <tr> <td>8</td> <td>8, numpad 8</td> <td>B</td> </tr> <tr> <td>9</td> <td>9, numpad 9</td> <td>N</td> </tr> <tr> <td>0</td> <td>0, numpad 0</td> <td>U</td> </tr> <tr> <td>*</td> <td>-, numpad *, numpad -</td> <td>J</td> </tr> <tr> <td>#</td> <td>=, numpad /, numpad +</td> <td>M</td> </tr> </table> <p>Host joysticks can also be used for directions and the fire buttons, but the keys from the telephone-style keypad can only be entered via the host keyboard.</p> <h4><a id="emukeymapping">5.1.3 Emulator Functions Key Mapping</a></h4> <p> The mapping of the keys for emulator functions is fully customisable using the <a class="external" href="commands.html#bind"><code>bind</code></a> command in the <a class="internal" href="#console">console</a>. Your customised key bindings are saved together with the settings. This subsection lists the default key mapping. </p> <table> <tr> <th>keys (PC)</th> <th>keys (Mac)</th> <th>function</th> </tr> <tr> <td>Pause</td> <td>Cmd+P (Pause)</td> <td>Pause emulation</td> </tr> <tr> <td>ALT+F4</td> <td>Cmd+Q (Quit)</td> <td>Quit openMSX</td> </tr> <tr> <td>CTRL+Pause (Break)</td> <td></td> <td>Quit openMSX (not in Windows)</td> </tr> <tr> <td>PrtScr</td> <td>Cmd+D (Dump)</td> <td>Save current screen to a file (<a class="external" href="commands.html#screenshot">screen shot</a>)</td> </tr> <tr> <td>PageUp</td> <td>PageUp</td> <td>Go 1 second back in time, using the <a class="external" href="commands.html#reverse">reverse</a> feature</td> </tr> <tr> <td>PageDown</td> <td>PageDown</td> <td>Go 1 second forward in time, using the <a class="external" href="commands.html#reverse">reverse</a> feature</td> </tr> <tr> <td>F9</td> <td>Cmd+T (Fastforward)</td> <td>Toggle <a class="external" href="commands.html#fastforward">fastforward</a> mode (normal vs fastforward speed)</td> </tr> <tr> <td>F10</td> <td>Cmd+L (consoLe)</td> <td>Toggle <a class="external" href="commands.html#console">console</a> display</td> </tr> <tr> <td>F11 or ALT+Enter</td> <td>Cmd+F (Full)</td> <td>Toggle <a class="external" href="commands.html#fullscreen">full screen</a> mode</td> </tr> <tr> <td>F12</td> <td>Cmd+U (mUte)</td> <td>Toggle <a class="external" href="commands.html#mute">audio mute</a></td> </tr> <tr> <td>ALT+F7</td> <td>Cmd+R (Restore)</td> <td>Quick <a class="external" href="commands.html#savestate">loadstate</a> (from 'quicksave' slot)</td> </tr> <tr> <td>ALT+F8</td> <td>Cmd+S (Save)</td> <td>Quick <a class="external" href="commands.html#savestate">savestate</a> (to 'quicksave' slot)</td> </tr> <tr> <td><a class="external" href="http://en.wikipedia.org/wiki/Menu_key">MENU</a></td> <td>Cmd+O (Open menu)</td> <td>Show the On-Screen-Display menu</td> </tr> <tr> <td>CTRL+Win+C</td> <td>Cmd+C (Copy)</td> <td>Copy screen's text content to clipboard</td> </tr> <tr> <td>CTRL+Win+V</td> <td>Cmd+V (paste)</td> <td>Type the text from the clipboard into the MSX</td> </tr> </table> <!-- <p class="todo"> Make the table look better by using cellpadding stuff in the css. </p>--> <p> Note that Mac user must use <code>META</code> as a modifier for the Command (Apple logo) key. On PC's use <code>META</code> for the Windows key. </p> <p>For handheld devices, most of these functions can only be used via the On-Screen-Display menu and the On-Screen-Keyboard.</p> <h4><a id="keyboardlayouts">5.1.4 Keyboard Layouts</a></h4> <p> This section is about how keyboard layouts from host computers are mapped to keyboard layouts of MSX computers. This is mostly interesting if those differ (a lot). For example, you have a US-English keyboard on your PC and you are emulating a Japanese MSX computer. Or, you have a Japanese Mac and you are emulating a Spanish MSX computer. </p> <p>As of openMSX 0.7.0, there are facilities to make this as smooth as possible, so that you can use your own keyboard on any kind of MSX with as little surprises as possible. The trick is the new character-based <a class="external" href="commands.html#kbd_mapping_mode">mapping mode</a>, which tries to convert any character you enter with your host computer's keyboard to an MSX key press. For this feature, all MSX hardware configuration files now have information about their keyboard layout. Anyway, this mapping mode is enabled by default, so you don't have to do anything to make this work!</p> <p>However, there are always some nasty details. For those details we refer to the documentation of other keyboard settings, where they are explained in full detail: <a class="external" href="commands.html#kbd_mapping_mode">mapping mode</a> (as mentioned before), <a class="external" href="commands.html#kbd_numkeypad_always_enabled">kbd_numkeypad_always_enabled</a> (use numerical keypad even when your MSX doesn't have one), <a class="external" href="commands.html#kbd_code_kana_host_key">kbd_code_kana_host_key</a> (specify an alternative host key for CODE/KANA) and <a class="external" href="commands.html#kbd_numkeypad_enter_key">kbd_numkeypad_enter_key</a> (specifies mapping of the ENTER key of the keypad). </p> <h3><a id="joystick">5.2 Joystick</a></h3> <p>If you have a joystick connected to your PC, use the following command to connect it to the emulated MSX: </p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyporta joystick1 </div> <p> To connect a fake joystick (emulated with the keyboard arrow keys), you can use this <code>plug</code> command: </p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyporta keyjoystick1 </div> <p> will connect a fake joystick to joystick port A. Button A of the joystick is mapped to the space bar and Button B to M, when using the default configuration. There are two keyjoysticks, 1 and 2. If you like, you can change the bindings in the console and save the settings as usual. Examples: <code>set <a class="external" href="commands.html#keyjoystick_n_button">keyjoystick2.triga</a> LCTRL</code> or <code>set <a class="external" href="commands.html#keyjoystick_n_button">keyjoystick1.up</a> KP8</code>. </p> <p> Most modern joysticks have more buttons than the 2 buttons that are allowed by the MSX standard. Therefore a lot of games use extra keys on the keyboard for extra functionality. For instance, all most all Konami games use F1 to pause the game. You can assign this extra functionality to your joystick by using the <code><a class="external" href="commands.html#bind">bind</a></code> command. As an example here is how to map button 4 of the first joystick to the F1-key, button 5 to F2,... </p> <div class="commandline"> bind "joy1 button4 down" "keymatrixdown 6 0x20"<br/> bind "joy1 button4 up" "keymatrixup 6 0x20"<br/> bind "joy1 button5 down" "keymatrixdown 6 0x40"<br/> bind "joy1 button5 up" "keymatrixup 6 0x40"<br/> bind "joy1 button6 down" "keymatrixdown 6 0x80"<br/> bind "joy1 button6 up" "keymatrixup 6 0x80"<br/> bind "joy1 button7 down" "keymatrixdown 7 0x01"<br/> bind "joy1 button7 up" "keymatrixup 7 0x01"<br/> bind "joy1 button8 down" "keymatrixdown 7 0x02"<br/> bind "joy1 button8 up" "keymatrixup 7 0x02"<br/> </div> <p> For a more detailed explanation of this command see the <a class="external" href="commands.html#bind">Console Command Reference</a>. </p> <h3><a id="mouse">5.3 Mouse</a></h3> <p> To connect a mouse, you can also use the <code><a class="external" href="commands.html#plugunplug">plug</a></code> command: </p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyporta mouse </div> <p> will connect a mouse to joystick port A. If you want the joystick emulation feature that some mice (like the Philips SBC-3810 and the Sony MOS-1) have, keep the left mouse key pressed when plugging it in, just as on a real MSX. </p> <p> If you are using openMSX in windowed mode, it might be tricky to use the mouse. For that you may want to use the following setting: <code>set <a class="external" href="commands.html#grabinput">grabinput</a> on</code>. This makes sure all input goes to openMSX. Your cursor cannot leave the openMSX window with this setting. Just turn it back to off, if you want to disable this again. If you only want to escape the window briefly, use this command: <code><a class="external" href="commands.html#escape_grab">escape_grab</a></code>. It permits you to leave the window, but the next time you enter it, the cursor is grabbed again. It might be a good idea to bind this command to a key, using the <code><a class="external" href="commands.html#bind">bind</a></code> command, which is mentioned above. </p> <h3><a id="arkanoidpad">5.4 Arkanoid Pad</a></h3> <p> The Arkanoid games by Taito both have support for a special Arkanoid game pad, with a classical turning knob to control the position of the bat. This device is emulated as well and can be controlled by the mouse. Plug it as follows:</p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyporta arkanoidpad </div> <h3><a id="trackball">5.5 Trackball</a></h3> <p> Some MSX trackballs like the HAL CAT and the Sony HB-G7B seem to be the same and are also emulated by openMSX, again using the mouse to control it. The trackball is mostly supported in port B only:</p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyportb trackball </div> <p> Quite some HAL programs have support for it, e.g. Hole in One, Eddy II, Music Studio G7, Space Trouble and Super Billiards. The test program provided in the Sony HB-G7B service manual also works fine, of course. </p> <h3><a id="touchpad">5.6 Touchpad</a></h3> <p> Some MSX touch pads like the Philips NMS 1150 Graphic Tablet are also emulated by openMSX, again using the mouse to control it (where mouse button 1 corresponds to touch or no touch and mouse button 2 to the button on the pen of the touch pad). Also the touch pad is mostly supported in port B only:</p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> joyportb touchpad </div> <p> This device is mostly supported by the Philips drawing programs Designer, Designer Plus and Video Graphics (all in port B) and by Pioneer MSX Video Art (port A). </p> <p> Note that the whole openMSX window will function as the surface of the touch pad. This will not align with the actual pixels of the screen in that window, see the <a class="external" href="commands.html#touchpad_transform_matrix">touchpad_transform_matrix</a> setting for more details. </p> <h2><a id="video">6. Video</a></h2> <h3><a id="renderers">6.1 Renderers</a></h3> <p> A renderer is a part of the emulator that generates the graphical part of the emulation: the MSX 'screen'. At the moment, there are two working renderers: </p> <dl> <dt>SDL</dt> <dd> This renderer is not using any hardware acceleration and has a steady CPU time consumption. The CPU load can be relatively high though, as all graphics are calculated on the CPU. </dd> <dt>SDLGL-PP</dt> <dd> This renderer uses the OpenGL graphics library for all post processing (hence the PP), which includes scalers and other effects. Because part of the rendering is done by the graphics hardware, the CPU load can vary a lot, but it is usually a lot less than with the SDL renderer. The SDLGL-PP renderer is only useful if you have a hardware accelerated OpenGL library; a software GL implementation will be very slow. See the Setup Guide for <a class="external" href="setup.html#opengl">OpenGL performance tips</a>. If your card supports it, we recommend to use this renderer. Note that this renderer requires both your video card and video driver to support OpenGL 2.0. Sometimes you need to upgrade your driver to make it work. If your videocard or driver don't support OpenGL 2.0, openMSX will switch back to the SDL renderer if you try to select SDLGL-PP. Because almost all modern systems have OpenGL 2.0 capable hardware and drivers, this is now the default renderer. </dd> </dl> <p> You can set the renderer with the <code><a class="external" href="commands.html#renderer">renderer</a></code> setting. You can set full screen mode with the <code><a class="external" href="commands.html#fullscreen">fullscreen</a></code> setting. Again, to make these settings permanent, use the <code><a class="external" href="commands.html#save_settings">save_settings</a></code> command to save them. </p> <p> Note that openMSX can be compiled without the SDLGL-PP renderer; if that is true for the build you're using, you will not be able to switch to the SDLGL-PP renderer and the default renderer will be SDL. </p> <h3><a id="accuracy">6.2 Accuracy</a></h3> <p> The <code><a class="external" href="commands.html#accuracy">accuracy</a></code> setting controls how often the renderer is synchronised with the MSX video processor (VDP). There are three options: </p> <dl> <dt>screen</dt> <dd> Synchronise once per screen (frame). Good enough for most MSX1 software, but will break most raster effects. </dd> <dt>line</dt> <dd> Synchronise at the start of a line. This is good enough for most software. This setting hides imperfections in raster effects, which could be considered a useful feature. </dd> <dt>pixel</dt> <dd> Synchronise at the exact pixel where a change occurs. This is the most realistic setting and therefore set as the default. To see demos like Unknown Reality (scope part) and Verti correctly, you should use this setting. Also, you will see any imperfections in raster effects just like they occur on a real MSX. </dd> </dl> <h3><a id="scalers">6.3 Scalers</a></h3> <p> Most MSX screen modes are only 256&times;212 pixels big. This is quite small for PC screen resolutions of today. That's why you have the possibility to scale up the image. Normally, there are three possible scaling factors: 1, 2 and 3. If you select 1, all MSX pixels are mapped to a 320&times;240 pixels PC window, for 2 to a 640&times;480 pixels window and for 3 to a (surprise!) 960&times;720 window. The setting which determines this is called <code><a class="external" href="commands.html#scale_factor">scale_factor</a></code>. In general, the higher the factor, the better the output image is; the downside: it takes a lot more CPU processing power. </p> <p>Use <code><a class="external" href="commands.html#scale_factor">scale_factor</a></code> 1 only if you have a slow computer to run openMSX on, because it is very limited in possibilities and in the case of MSX screen modes with more pixels than 256&times;212, you even lose pixels! in that case, the pixels are interpolated. However, when using it full screen, the low resolution is not a problem, especially because most MSX software uses a 256&times;212 mode. </p> <p>There is also a number of scaling algorithms (setting <code><a class="external" href="commands.html#scale_algorithm">scale_algorithm</a></code>) that can be set. The scaling algorithm determines how exactly the mapping is done between the MSX input screen and the PC output screen. Especially for scaling factors bigger than 1, this allows for extra possibilities in the algorithms, like deinterlacing and adding scanlines, blur, anti-aliasing (rounding of blocky patters like stair cases) or even a Trinitron-like TV effect. When the factor is set to 1, you always get the <code>simple</code> algorithm, see below. </p> <p> With the SDLGL-PP renderer (when using a suitable video card and driver), scaling is done on the graphics card hardware and will not take extra CPU power. This renderer also gives you the possibility to use a <code><a class="external" href="commands.html#scale_factor">scale_factor</a></code> of 4. The down side is that not all scalers have been implemented for this renderer. See also below. </p> <p> openMSX contains the following scaling algorithms: </p> <dl> <dt>simple</dt> <dd> This algorithm simply expands each MSX pixel to a square of (scale_factor)&times;(scale_factor) PC pixels. This is the default scaler and it is fast. The image looks blocky, especially diagonal edges, but it does support scanlines and blur for scale factors of 2 and higher. In combination with a scale factor of 1, you get what was once known as the SDLLo renderer, which is the fastest scaling method available. </dd> <dt><a class="external" href="http://scale2x.sourceforge.net/">ScaleNx</a></dt> <dd> This scaler algorithm smoothes edges by using only original colors, so it will not give any blur. It is fast and its image is less blocky than that of the simple scaler. However, all corners are rounded, which does not look good on all graphics. This scaler has not been properly implemented for scaling factors of 4. </dd> <dt><a class="external" href="http://en.wikipedia.org/wiki/Pixel_art_scaling_algorithms#2.C3.97SaI">SaI</a></dt> <dd> This scaler algorithm smoothes edges by interpolating neighbouring pixels. It is heaver on the CPU than the simple and ScaleNx algorithms. It does a good job on most graphics, except for high-contrast edges; for example white fonts on a black background get some nasty gray lines around them. Also corners are rounded, similar to ScaleNx. This scaler is not available in the SDLGL-PP renderer. </dd> <dt><a class="external" href="http://en.wikipedia.org/wiki/Hqx">hq</a></dt> <dd> This scaler algorithm looks somewhat similar to SaI, but its output is sharper. This complex algorithm is very heavy on the CPU; use this algorithm only on fast PCs. It does a good job on most graphics; it avoids excessive blurring and it keeps corners sharp. On some graphics, it does not identify edges correctly, making those edges blocky instead of smooth. Especially with high scaling factors, it can give a very smooth looking image. </dd> <dt>hqlite</dt> <dd> This is a variant of hq: the resulting image is close to hq, but it is calculated a lot faster. It has a good quality per CPU usage ratio. </dd> <dt>RGBTriplet</dt> <dd> This algorithm only works when a scaling factor of 3 is used. Also, it only works well for MSX screen modes of 256&times;212, which includes most games. The idea of the algorithm is that each input pixel is mapped on a triplet of pixels which represent the R(ed), G(reen) and B(lue) components of the input pixel. This arrangement of RGB components is also used in the <a class="external" href="http://en.wikipedia.org/wiki/Aperture_grille">Aperture Grille</a> CRT's, also known as Trinitron and the modern TFT screens. You can control the effect with the <code><a class="external" href="commands.html#blur">blur</a></code> setting. This algorithm also includes scan lines. </dd> <dt>TV</dt> <dd> This algorithm is trying to emulate the fact that on a CRT brighter pixels look bigger than darker pixels. This scaler is only available in the SDLGL-PP renderer. </dd> </dl> <p> A small (somewhat outdated) demonstration of some of the algorithms can be found on <a class="external" href="http://openmsx.org/">the openMSX web site</a>. </p> <h3><a id="gamma">6.4 Gamma Correction</a></h3> <p> PC monitors can have different gamma values than MSX monitors. To compensate for this, openMSX has a gamma correction feature. It is controlled by the <code><a class="external" href="commands.html#gamma">gamma</a></code> setting. A value of 1.0 disables gamma correction; a lower value makes the image darker; a higher value makes it brighter. </p> <p> If you want to know what gamma correction really means, read <a class="external" href="http://www.bberger.net/rwb/gamma.html">this page about monitor gamma</a>. The gamma correction value you can set in openMSX should be the gamma of your PC screen divided by the gamma of the MSX screen. I measured the gamma of my PC screen (TFT) at 2.0 and the gamma of my MSX monitor at 2.5. That puts the gamma correction at 2.0 / 2.5 = 0.8. So if I enter that value, the openMSX image will have comparable brightness to the MSX image. However, 0.8 is not the value I'm actually using: I prefer a brighter image than my MSX monitor, so I chose to use a gamma correction of 1.1. </p> <h3><a id="videoeffects">6.5 Special Effects</a></h3> <p> openMSX contains a couple of special effects settings that can be applied to the video output: </p> <dl> <dt><code><a class="external" href="commands.html#deinterlace">deinterlace</a></code></dt> <dd> Interlacing is a technique to double the vertical resolution by splitting the image into two frames: the first frame the even lines are displayed, the second frame the odd lines are displayed. The after glow on a TV and some processes in the human brain combine both frames into a single image. However, this process is not perfect and you can notice flickering, especially on horizontal lines. The deinterlace feature combines the even and the odd frames into a single output frame, thus eliminating the flicker. The <code><a class="external" href="commands.html#deinterlace">deinterlace</a></code> setting controls this feature: it can be on (enabled) or off (disabled); it is enabled by default. This feature needs a scaling factor of at least 2. </dd> <dt><code><a class="external" href="commands.html#deflicker">deflicker</a></code></dt> <dd> This filter detects pixels that alternate each frame between two different colors and replaces those alternations with the average color. Such 'flickering' pixels can occur in software that rapidly changes between colors to create the illusion of a wider color palette. It can also occur because of 'sprite flickering'. This setting is disabled by default because there aren't that many situations where it really improves video quality but it does have a performance cost. </dd> <dt><code><a class="external" href="commands.html#scanline">scanline</a></code></dt> <dd> On TV's and MSX monitors, you can see a small black space in between the display lines, especially when using NTSC. The scanlines feature simulates this by drawing some lines a bit darker. This feature is disabled when a scaling algorithm other than <code>simple</code>, <code>tv</code> or <code>RGBTriplet</code> is used and needs a scaling factor of at least 2. </dd> <dt><code><a class="external" href="commands.html#blur">blur</a></code></dt> <dd> TV's and MSX monitors are less sharp than PC monitors: neighbouring pixels tend to blur into each other. The blur feature simulates this by interpolating neighbouring pixels. The <code><a class="external" href="commands.html#blur">blur</a></code> settings control this: 0 means no blur (completely sharp), 50 means some blur (like a monitor), 100 means maximum blur (like a TV). All other values between 0 and 100 are also possible of course. This feature is disabled when a scaling algorithm other than <code>simple</code> or <code>RGBTriplet</code> is used and needs a scaling factor of at least 2. </dd> <dt>after glow (<code><a class="external" href="commands.html#glow">glow</a></code>)</dt> <dd> The after glow feature blends each frame with the frame before it. This results in moving objects leaving a trail (motion blur). The <code><a class="external" href="commands.html#glow">glow</a></code> setting controls the amount of after glow: 0 means no after glow, 100 means maximum after glow. This feature works only in the <code>SDLGL-PP</code> renderer. </dd> <dt><code><a class="external" href="commands.html#noise">noise</a></code></dt> <dd> This setting controls the amount of pixel noise on the screen. The <code><a class="external" href="commands.html#noise">noise</a></code> setting controls the amount: 0 means no noise, 100 means maximum noise. The value is actually the deviation of the color of the original pixel and non-integer values are also possible. </dd> <dt>display deformation (<code><a class="external" href="commands.html#display_deform">display_deform</a></code>)</dt> <dd> This feature makes it possible to change the shape of the MSX screen. Here are the possibilities: <ul> <li><code>normal</code>: no deformation (default)</li> <li><code>3d</code>: emulates a 3D view on an arcade cabinet's screen</li> </ul> This feature works only in the <code>SDLGL-PP</code> renderer. In openMSX versions prior to 0.7.0, there was also a <code>horizontal_stretch</code> option here, but that has been replaced by a <a class="external" href="commands.html#horizontal_stretch"><code>horizontal_stretch</code></a> setting. </dd> </dl> <h3><a id="gfx9000">6.6 GFX9000/Video 9000</a></h3> <p> openMSX has GFX9000 emulation. As there isn't that much software for it available, it is not as complete, functional and optimized as the video emulation of the classical MSX chips. Despite of all this, most existing GFX9000 software runs pretty well, so we found it worth sharing with you anyway. </p> <p> The real GFX9000 has an external video connector to which you can connect a second monitor. Because of limits of the SDL library we used to create openMSX, we cannot have more than one window for openMSX, so we cannot emulate a second monitor. To see the GFX9000 in action, you need to switch the videosource setting, which equals to a so-called SCART-switch in the real world: <code>set <a class="external" href="commands.html#videosource">videosource</a> GFX9000</code>. This setting is only available when there are actually multiple videosources available. </p> <p> Alternatively, instead of the GFX9000 extension, you could use the Video9000 extension (also built in in several Boosted MSX machine configurations). The Video 9000 hardware has the possibility to superimpose the GFX9000 video on top of the V99xx video (and this is practically the only feature of the Video 9000 that is currently implemented). Software that is Video 9000 aware, will tell the Video 9000 to show the GFX9000 if something interesting is to be seen on the GFX9000 video output. So, for such software, you do not have to switch videosources if you simply use the Video9000 videosource. When a Video 9000 is present in the currently running MSX configuration, the Video9000 videosource will be selected by default, to make use of this superimpose feature. For programs not aware of Video 9000, you will still have to switch videosources manually, just like on a real system. </p> <p> To get your normal MSX screen back, you should type <code>set <a class="external" href="commands.html#videosource">videosource</a> MSX</code>. If you want to toggle with a hot key between them, it might be useful to bind a key for it. E.g.: <code><a class="external" href="commands.html#bind">bind</a> F6 cycle <a class="external" href="commands.html#videosource">videosource</a></code>.<br/> <code><a class="external" href="commands.html#cycle">cycle</a></code> is a Tcl command that cycles through the options of the setting in the parameter. </p> <h3><a id="recording">6.7 Video Recording</a></h3> <p> The video recorder enables you to record the audio and video rendered by openMSX to an AVI file. The output video is in 320&times;240 resolution by default, at 640&times;480 when using the <code>-doublesize</code> flag and at 960&times;720 when using the <code>-triplesize</code> flag. The video is compressed with the ZMBV codec, a fast lossless compression algorithm that works very well on 2D computer generated images. The <a class="external" href="faq.html#codec">FAQ</a> contains more information about this codec. The audio is not compressed. </p> <p> The recorded AVI file will not suffer from any hiccups, even if the emulation ran too slow when you recorded it. The current video source (see previous section) is recorded and the sound is recorded with the current <code><a class="external" href="commands.html#frequency">frequency</a></code> setting. If you change the <code><a class="external" href="commands.html#frequency">frequency</a></code> setting during recording, or, more importantly, if the software changes from PAL (50 Hz) to NTSC (60 Hz) during recording, the video will get out of sync with the audio. Most of the <a class="internal" href="#videoeffects">special effects</a> will not be recorded. </p> <p> Use the command <code><a class="external" href="commands.html#record">record</a> start</code> to record to a default file name, or you can use an additional parameter to specify a file. The command <code><a class="external" href="commands.html#record">record</a> stop</code> stops recording and <code><a class="external" href="commands.html#record">record</a> toggle</code> toggles it. You can use the <code>-audioonly</code> or <code>-videoonly</code> option to record only sound or video. </p> <p> If any stereo sound devices are present or any sound device has an off-center balance, the recording will be made in stereo, otherwise it will be mono. If a recording is made in mono and then a stereo sound device is added, you'll receive a warning that stereo sound has been detected and that the two channels will be mixed down to mono. You can prevent this from happening by using the <code>-stereo</code> option to force a stereo recording even if no stereo devices are present at the time you enter the command. You can also force a mono recording with <code>-mono</code> to save space. </p> <p> If you want to put a recorded video on your web site, it is better to transcode the audio to MP3 or Vorbis format, as this makes the file a lot smaller. YouTube supports the ZMBV codec, so if you want to upload your recording you do not need to transcode the video. If you want to share your video with people who do not have (or want to install) the ZMBV codec, you should still transcode it, of course. This can be done with programs such as <a class="external" href="http://www.virtualdub.org/">Virtual Dub</a> (Windows) or <a class="external" href="http://www.mplayerhq.hu/">MPlayer's MEncoder</a> (Linux/UNIX). For YouTube you may want to use the command <code><a class="external" href="commands.html#record">record_chunks</a></code> instead: it will enable you to chop up your video in several parts and enables <code>-doublesize</code> automatically. </p> <p> Recording as explained above will happen at real time. This can be annoying if you want to make a demonstration video, because you all mistakes will be recorded as well. To work around this, you can also use the <code><a class="external" href="commands.html#reverse">reverse</a></code> feature during the scene you want to record. After the scene, reverse to the beginning, start the recording as explained above and let the scene replay relaxedly. You can even speed it up using the <a class="external" href="commands.html#throttle">throttle</a> setting. This method of recording is also useful when real time recording has a big impact on the performance of openMSX on your hardware. See also <a class="internal" href="#reverse">the chapter about this feature</a>. </p> <h2><a id="audio">7. Audio</a></h2> <h3><a id="audiosettings">7.1 Audio Settings</a></h3> <p> There is a <code><a class="external" href="commands.html#master_volume">master_volume</a></code> setting, which controls the overall output volume of openMSX (it applies to all sound devices). Volume 0 means no sound, volume 100 is maximum. </p> <p> There is also a <code><a class="external" href="commands.html#mute">mute</a></code> setting, to disable all sound from openMSX at once. It can be on (muted) or off (sound is audible). By default, mute is bound to the F12 key. </p> <p> Each sound device in the MSX you are emulating also has its own volume setting. Volume 0 means no sound, volume 100 is maximum. For example: <code>set <a class="external" href="commands.html#soundchip_volume">"MSX Music_volume"</a> 50</code>. </p> <p> For each sound device, you can control the distribution of the sound output of this chip over the left and right channel, with the balance setting. This is very similar to the balance knob on (older?) hifi equipment. Example: <code>set <a class="external" href="commands.html#soundchip_balance">PSG_balance</a> -100</code>, which sets the PSG entirely to the left channel. Any sound device can also be individually (un)muted using the <a class="external" href="commands.html#mute_channels">mute_channels</a> command. </p> <p> If you'd like to apply some special effects to the sound, you should take a look at the <a class="external" href="commands.html#soundchip_vibrato_frequency">vibrato</a> and <a class="external" href="commands.html#soundchip_detune_frequency">detune</a> (both percent and frequency) settings, which can be only applied to the PSG, for now. </p> <p> For Windows users there is the choice to use DirectSound or SDL as an audio driver. By default, DirectSound is used, because it gives a better quality in most cases. Change it with the <code><a class="external" href="commands.html#sound_driver">sound_driver</a></code> setting, if you like. </p> <h3><a id="midi">7.2 MIDI</a></h3> <p> openMSX supports the MSX-MIDI interface of the MSXturboR GT and the mu-Pack, the MIDI interface of the Philips Music Module (NMS 1205), the MIDI interface of the Yamaha SFG-01 and SFG-05 module (also present in the Yamaha CX5M series of machines) and the FAC MIDI Interface. </p> <p>To use MIDI, start openMSX with a machine that has a MIDI interface built in, or add one of the mentioned MIDI interface extensions. Then plug a MIDI out and/or MIDI in device into that MSX MIDI interface using the openMSX <a class="internal" href="#console">console</a>. </p> <h4>MIDI Out</h4> <p> You can connect the MIDI out of the MSX to a host MIDI device, such as a physical MIDI out port, a soft synthesizer or a sequencer program. On Windows, Linux and macOS, host MIDI devices are made available as pluggables in openMSX. On macOS, you can opt to instead select <code>Virtual OUT</code> to create a virtual MIDI port for Mac MIDI software to connect to. </p> <p> For example, use the machine <code>Panasonic_FS-A1GT</code> and plug into the <a class="external" href="https://sourceforge.net/projects/munt/">Munt</a> soft synthesizer (MT-32 emulator) using the console command: </p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> msx-midi-out Munt\ MT-32 </div> <p> The exact naming of the host MIDI devices differs per platform. You can use tab completion to see the options: type <code>plug msx-midi-out</code> and hit TAB twice. </p> <p> The <code>midi-out-logger</code> MIDI device is available on all platforms and logs MIDI events to a file. </p> <div class="commandline"> <a class="external" href="commands.html#plugunplug">plug</a> msx-midi-out midi-out-logger </div> <p> You can specify the file to log to using <code>set <a class="external" href="commands.html#midi-out-logfilename">midi-out-logfilename</a></code>. The log is a raw binary log of the bytes written by the MIDI interface, with no timing information. Therefore its usefulness mostly limited to debugging. </p> <p> On UNIX-like systems, it is possible to log to a MIDI device node, for example <code>/dev/midi</code> and configure the sound system to send those notes to a soft synthesizer. This is harder to configure than using for example the ALSA MIDI out device, so it's only recommended when no platform-specific MIDI devices are available in openMSX. On MSX Resource Center there is <a class="external" href="http://www.msx.org/forum/semi-msx-talk/emulation/openmsx-timidity">a forum thread</a> which describes how to connect openMSX to Timidity via <code>/dev/midi</code>. </p> <h4>MIDI In</h4> <p> Vice versa, the MIDI in port can also receive data from the system by plugging a device into <code>msx-midi-in</code> (for the Panasonic FS-A1GT; use the appropriate connector name for other devices). Analogous to the above mentioned outputs you can connect a <code>midi-in-reader</code> which reads from a file or <code>/dev/midi</code> on Linux. On Windows and macOS available MIDI devices show up as separate pluggables. On macOS a <code>Virtual IN</code> port is available as well. </p> <h3><a id="soundlogger">7.3 Recording Audio to File</a></h3> <p> openMSX records the sound at the exact speed at which it should be produced, no matter the speed at which the emulation was running while recording. Note that recording sound to the uncompressed WAV format will take a lot of disk space: at 44.1 kHz it will take about 176 kB per second. </p> <p> You can start the recording of sound by issuing the command <code><a class="external" href="commands.html#soundlog">soundlog</a> start</code>. It will automatically choose a file name and save it in the <code>soundlogs</code> directory in your personal openMSX folder. You can also add an extra parameter to specify the filename for the new WAV file. To stop recording, use <code><a class="external" href="commands.html#soundlog">soundlog</a> stop</code>. You can toggle the recording status using <code><a class="external" href="commands.html#soundlog">soundlog</a> toggle</code>, which is useful if you <code><a class="external" href="commands.html#bind">bind</a></code> this command to a hot key. </p> <p> There is also an advanced feature for recording audio to file: you can record individual channels of sound chips to individual files on disk. The sound is in the native frequency of the sound chip this time, which means that for chips like PSG or SCC (which run at very high frequencies), the files will be huge. (You are warned!) This feature is easiest to control with the <code><a class="external" href="commands.html#record_channels">record_channels</a></code> command. Note that in contrast to the <code><a class="external" href="commands.html#soundlog">soundlog</a></code> command, the output file of this command ends up in the current directory and not in a special directory. We hope you can use this command to study the fantastic compositions of MSX software and make great remakes of them. </p> <h2><a id="usefulextras">8. Useful Extras</a></h2> <h3><a id="savestate">8.1 Saving/Loading the State of the Machine</a></h3> <p> A feature of emulators which is particularly useful is saving the state of the emulated machine to a file, in order to load it again later and continue exactly where you left off when saving. Not only useful for games, but also for debugging or testing. This feature is now also available in openMSX! And the best thing is, that it is designed in such way that it is able to cope with older save states in future releases. So, you don't have to be afraid to upgrade to a new version of openMSX: your save states will remain usable! </p> <p> The easiest way to use it is by using the keyboard shortcuts for quickly saving and loading a state, see the <a class="internal" href="#keymapping">key mapping section</a>. These shortcuts basically use the <a class="external" href="commands.html#savestate">savestate</a> and loadstate commands, with the parameter <code>quicksave</code>, i.e. they use a savestate file with the name 'quicksave'. You can also use the commands directly yourself, with the argument as the name of the slot you save the state to (use TAB or the <code><a class="external" href="commands.html#savestate">list_savestates</a></code> command to see your previously saved states). Without having to browse the file system of your computer, you can also conveniently delete existing save games with the <code><a class="external" href="commands.html#savestate">delete_savestate</a></code> command. </p> <p>Note that when saving the state of the machine, a screenshot will also be saved with it, so that those could be used for save state browsing. (Currently only used on the On-Screen-Display and in a prototype version of a new Catapult.) </p> <h3><a id="reverse">8.2 Reverse</a></h3> <p> Inspired by the meisei MSX emulator, openMSX now also has a reverse feature. This enables you to go back in MSX time, so you can correct mistakes in your game play or you can watch what you did (and also record a video of it). </p> <p>You can go back in time a second (upto the moment in MSX time you started the reverse feature, but it is auto started by default) using the <a class="internal" href="#keymapping">key binding</a> for this: PageUp. Once you went back, openMSX will replay whatever you did when you were at this time for the first time, until it got at the point where you went back. From then on, everything will continue as normal. If you touched any control of your MSX during replay, you have indicated to take over from the replay. If you do that, the rest of the replay is erased (openMSX forgets that that future ever happened). This is the typical way to correct mistakes using this feature. </p> <p>While replaying, you can also jump forward in time ("Back to the Future") using PageDown. Also, you can go back a specific amount of seconds or to an absolute moment in (MSX) time, all using the <code><a class="external" href="commands.html#reverse">reverse</a></code> command. (This can also be useful when you're developing/debugging MSX software.) </p> <p>If all of this sounds a bit confusing, you can use the reverse bar (hover near the top of the openMSX window to make it appear), which will show you a visualisation of all of this on screen. The bar represents the time while the feature was enabled and shows the current moment in time (the red indicator). You can click on it to jump back and forward in time. The vertical lines indicate times when snapshots where made. The bar will fade out after a while, but hovering your cursor over it makes it reappear. If you want to get rid of the bar, issue the <code><a class="external" href="commands.html#other">toggle_reversebar</a></code> command. (This will not turn off the reverse feature itself.) </p> <p>If you want to disable the reverse feature, you can use the <code><a class="external" href="commands.html#reverse">reverse stop</a></code> command. And if you don't want it to restart again anymore, use the <code><a class="external" href="commands.html#auto_enable_reverse">auto_enable_reverse</a></code> setting. </p> <p>If you want to save a very compact recording of what you did, or want to have the possibility to start off in the middle of a recording, you can save your complete replay to a file with the <code><a class="external" href="commands.html#reverse">reverse savereplay</a></code> command. They can also be loaded of course, with <code><a class="external" href="commands.html#reverse">reverse loadreplay</a></code>. </p> <h3><a id="trainer">8.3 Game Trainer</a></h3> <p> openMSX includes a game trainer system. Although it has to be used from the <a class="internal" href="#console">console</a>, it is very easy to use. As always, you could type: <code>help <a class="external" href="commands.html#trainer">trainer</a></code>, for some basic help. </p> <p> Suppose you want to cheat on Metal Gear. Then it would be useful to type: <code>trainer Metal[TAB]</code>, which will expand to: <code>trainer Metal\ Gear</code>. When you then press enter, you see which cheats are available in the Metal Gear trainer. You can active them by typing e.g.: <code>trainer Metal\ Gear 1 2 3 4</code>. This will activate (toggle) the first 4 cheats (as the list will tell you which is printed after the command: the crosses mean an active cheat). You can also use the descriptions instead of the numbers: <code>trainer Metal\ Gear "enemy 1 gone" "enemy 2 gone"</code>. Or, if you want to activate all cheats you can simply type: <code>trainer Metal\ Gear all</code>. </p> <p> If this sounds a bit difficult for you, just try it out. It's really much easier when you actually work with it. As always in the console, using TAB to complete your commands and their options proves to be very useful! </p> <h3><a id="debugdevice">8.4 Debug Device</a></h3> <p> This chapter describes how an MSX programmer can use the openMSX built-in debug device. This is an artificial MSX device that is connected to an MSX I/O port. It can be used to send debug messages to the host operating system. </p> <p> Note that openMSX also contains built-in debugging functions, which can be accessed with the <code><a class="external" href="commands.html#debug">debug</a></code> console command. With that debugger you can read and write all registers and memory of almost all devices that are supported in openMSX. It also supports break points, watch points and stepping. </p> <h4><a id="debugdeviceenable">8.4.1 Enabling the Debug Device</a></h4> <p> To enable the debug device, insert the <code>debugdevice</code> extension. To do this when starting openMSX, simply add <code>-ext debugdevice</code> to the openMSX command line. If openMSX is already running, you can use the <code><a class="external" href="commands.html#ext">ext</a></code> console command. </p> <p> You can use the <code><a class="external" href="commands.html#debugoutput">debugoutput</a></code> setting to specify the file name to write the debug output to. </p> <h4><a id="debugdeviceports">8.4.2 Output Ports</a></h4> <p> Controlling the device is done from within an MSX program. For this purpose, the output ports 0x2E and 0x2F are used. The first port is the Mode Set Register. Bytes sent to this port have the following meaning. </p> <table> <tr> <th>bit(s)</th><th>meaning</th> </tr> <tr> <td>7 </td> <td>unused</td> </tr> <tr> <td>6 </td> <td>line feed mode (0 = line feed at mode change, 1 no line feed)</td> </tr> <tr> <td>5-4</td> <td>output mode (0 = OFF, 1 = single byte, 2 = multi byte)</td> </tr> <tr> <td>3-0</td> <td>mode-specific parameters (see below)</td> </tr> </table> <p> When using mode 1, single byte mode, the lower 4 bits each enable a particular output format: </p> <table> <tr> <th>bit(s)</th><th>meaning</th> </tr> <tr> <td>3</td> <td>ASCII mode on/off</td> </tr> <tr> <td>2</td> <td>decimal mode on/off</td> </tr> <tr> <td>1</td> <td>binary mode on/off</td> </tr> <tr> <td>0</td> <td>hexadecimal mode on/off</td> </tr> </table> <p> So, every parameter bit turns an output format on or off and more than one output format can be specified at the same time. </p> <p> The parameters for mode 2 (multi byte mode) are as follows: </p> <table> <tr> <th>bit(s)</th><th>meaning</th> </tr> <tr> <td>3-2</td> <td>unused</td> </tr> <tr> <td>1-0</td> <td>mode (0 = hex, 1 = binary, 2 = decimal, 3 = ASCII mode)</td> </tr> </table> <h4><a id="debugdevicemode1">8.4.3 Single Byte Mode</a></h4> <p> In mode 1, any write to port 0x2F will result in output. This way, the programmer can see if a specific address is reached by adding a single <code>OUT</code> to the code. The output depends on the parameters set with the mode register. Each bit represents a specific format, and by turning the bits on and off, the programmer can decide which formats should be used. </p> <p> Here is an example: </p> <pre> LD A,65 OUT ($2f),A </pre> <p> This will give the following output: </p> <pre>41h 01000001b 065 'A' emutime: 36407199578 </pre> <p> (when all bits are on, mode register = 0x1F)<br/> or </p> <pre>41h 065 'A' emutime: 36407199578 </pre> <p> (when the binary bit is off, mode register = 0x1D)<br/> or </p> <pre>41h emutime: 36407199578 </pre> <p> (when only the hexbit is on, mode register = 0x11)<br/> and so on. </p> <p> The EmuTime part is a special number that keeps track of the openMSX emulation. The larger this number is, the later the event took place. This is a great way to get an idea of the timing of things. </p> <p> If the character to print is a special character, like carriage return, linefeed, beep or tab, the character between the ' ' will be a dot (.) and the normal character is 'displayed' at the very end of the line, so it won't mess up the layout of the whole line. </p> <h4><a id="debugdevicemode2">8.4.4 Multi Byte Mode</a></h4> <p> Unlike mode 1, the data in this mode is always shown in one mode only. It's either in hex mode, binary mode, decimal mode or ASCII mode, but never a combination. Also the EmuTime bit is left out. </p> <p> Here is an example: </p> <pre> LD A,xx OUT ($2e),A LD A,$41 OUT ($2f),A OUT ($2f),A OUT ($2f),A </pre> <p> If we substitute <code>$20</code> for <code>xx</code>, we get: </p> <pre>41h 41h 41h</pre> <p> and if we substitute <code>$22</code> for <code>xx</code>, we get: </p> <pre>065 065 065</pre> <p> The extra zero is added to keep alignment. Finally, if we want ASCII output, all we need to do is change <code>xx</code> for <code>$23</code>: </p> <pre>AAA</pre> <p> In this special case, the space in between the data is left out. Any special character like carriage return, linefeed, beep or tab will be printed as you would expect. </p> <h2><a id="contact">9. Contact Info</a></h2> <p> Because openMSX is still in heavy development, feedback and bug reports are very welcome! </p> <p> If you encounter problems, you have several options: </p> <ol> <li> Go to our IRC channel: <code>#openMSX</code> on <code>irc.freenode.net</code> and ask your question there. Also reachable via <a class="external" href="http://webchat.freenode.net/?channels=openMSX">webchat</a>! If you don't get a reply immediately, please stick around for a while, or use one of the other contact options. The majority of the developers lives in time zone GMT+1. You may get no response if you contact them in the middle of the night... </li> <li> Post a message on <a class="external" href="http://www.msx.org/forum/semi-msx-talk/openmsx">the openMSX forum on MRC</a>. </li> <li> Create a new issue in the <a class="external" href="https://github.com/openMSX/openMSX/issues">openMSX issue tracker</a> on GitHub. You need a (free) log-in on GitHub to get access. </li> <li> Contact us and other users via one of the mailing lists. If you're a regular user and want to discuss openMSX and possible problems, join our <code>openmsx-user</code> mailing list. If you want to address the openMSX developers directly, post a message to the <code>openmsx-devel</code> mailing list. More info on the <a class="external" href="https://sourceforge.net/p/openmsx/mailman">openMSX mailing lists</a>, including an archive of old messages, can be found at SourceForge. </li> </ol> <p> In any case, try to give as much information as possible when you describe your bug or request. </p> </body> </html>
315 S.W.3d 244 (2010) The BECKHAM GROUP, P.C., Appellant, v. Gulsam Taylan SNYDER and Robert L. Snyder, Appellees. No. 05-09-00491-CV. Court of Appeals of Texas, Dallas. June 16, 2010. *245 J. Darlene Ewing, Sunnyvale, Blake L. Beckham, Beckham & Thomas, L.L.P., Sarita Smithee, The Beckham Group, Dallas, for Appellant. Diana S. Friedman, Diana S. Friedman, P.C., Michael K. Hurst, Gruber Hurst Johansen & Hail LLP, Dallas, for appellees. Before Chief Justice WRIGHT and Justices O'NEILL and MYERS. OPINION Opinion By Chief Justice WRIGHT. In a single issue, the Beckham Group, P.C. contends the trial court abused its discretion by granting an order severing appellant's claim for attorney's fees from the underlying divorce action between Gulsam Taylan Snyder and Robert L. Snyder. Because we conclude the severance order is not a final, appealable order, we dismiss for want of jurisdiction. Background On November 15, 2005, appellees filed for divorce. On November 18, 2008, appellant intervened seeking payment of attorney's fees. On March 5, 2009, appellees mediated a settlement of the divorce issues, but not the payment of attorney's fees owed to appellant. Then on March 9, 2009, Gulsam Snyder filed a motion to sever appellant's claim for attorney's fees from the divorce. After considering the motion and appellant's response and opposition, the trial court signed an order severing appellant's attorney's fees claim. The agreed final decree of divorce was signed by the trial court on April 15, 2009. Discussion Appellate jurisdiction is never presumed. Brashear v. Victoria Gardens of McKinney, L.L.C., 302 S.W.3d 542, 546 (Tex.App.-Dallas 2009, no pet.). Unless the record affirmatively shows the propriety of appellate jurisdiction, we must dismiss. Id. This Court's jurisdiction is established exclusively by constitutional and statutory enactments. See, e.g., Tex. Const. art. V, § 6; Tex. Gov't Code Ann. § 22.220 (Vernon Supp.2009). Unless one of the sources of our authority specifically authorizes an interlocutory appeal, we only have jurisdiction over an appeal taken from a final judgment. Lehmann v. Har-Con Corp., 39 S.W.3d 191, 195 (Tex.2001); N.E. Indep. Sch. Dist. v. Aldridge, 400 S.W.2d 893, 895 (Tex.1966). A judgment is final if it disposes of all pending parties and claims in the record. Guajardo v. Conwell, 46 S.W.3d 862, 863-64 (Tex.2001) (per curiam); Lehmann, 39 S.W.3d at 195. When a suit is severed, two or more independent lawsuits result with their own final appealable judgments. Van Dyke v. Boswell, O'Toole, Davis & Pickering, 697 S.W.2d 381, 383 (Tex.1985); Law Offices of Robert D. Wilson v. Texas Univest-Frisco, Ltd., 291 S.W.3d 110 (Tex. App.-Dallas 2009, no pet.). Thus, although a severance is not a final judgment, it may result in a final judgment. When, as here, a party seeks to challenge an interlocutory severance order, mandamus is the appropriate avenue by which to seek review. In re Liu, 290 S.W.3d 515, 518 (Tex.App.-Texarkana 2009); see In re Hoover, Bax & Slovacek, L.L.P., 6 S.W.3d 646, 650 & n. 12 (Tex.App.-El Paso 1999, orig. proceeding) (mandamus appropriate vehicle through which to challenge trial court's order severing claims brought within lawsuit). Here, when the trial court signed its April 7th severance order, two separate lawsuits resulted. There has been no separate final judgment regarding the attorney's fees issue that was severed from the *246 divorce. Until there is a final judgment signed by the trial court regarding the separate issue of attorney fees, this Court does not have appellate jurisdiction to hear this matter. See Lehmann, 39 S.W.3d at 195. Accordingly, we dismiss this appeal for want of jurisdiction.
Learn When a Company Can Withdraw a Job Offer Many job applicants wonder if their job offer is set in stone once it has been extended. Unfortunately, the answer is usually no – for the most part, employers can rescind a job offer for any reason or no reason at all, even after you’ve accepted their offer. So, what happens if you have already accepted a new job and the employer decides they don't want to hire you? Reasons Employer Can Withdraw a Job Offer Organizations can withdraw a job offer for virtually any reason, except a discriminatory one. However, there can be legal consequences in some situations. Why are employers so free to revoke a job offer? Because of employment at will. Most states – except Montana – have employment-at-will statutes, which allow employers to fire an employee under most circumstances. These laws are generally applied to rescinded job offers as well. When prospective employees fail criminal background checks, misrepresent their background or fail a drug test, there is often no legal recourse if an offer was rescinded based on those discoveries. If an employer can justify revoking an offer because the company can't reasonably accommodate a disability, the company may also be able to rescind an offer to a disabled candidate. Moreover, organizations who can document changes in economic conditions, such as decreased earnings, are generally able to withdraw job offers without suffering any legal consequences. Reasons a Job Offer Should Not be Withdrawn However, employers can't withdraw an offer for discriminatory reasons such as race, religion, gender, age or national origin, and job applicants may be able to obtain legal protection if they feel they have been discriminated against. As a precaution, candidates should wait until they have met all contingencies listed in a formal job offer prior to submitting a resignation at their current job, selling their home, signing a lease or incurring other moving expenses. What to Do If Your Job Offer Is Withdrawn In some states, candidates may have grounds for a lawsuit claiming damages if they suffer consequences as a result of a withdrawn offer. In these cases, the plaintiff needs to show damages, such as moving costs incurred or lost income from a job they quit after receiving the job offer. If you think you might have a case, you should consult a lawyer in your state and make sure that the attorney has won similar cases and is willing to be compensated on a contingency basis. How to Minimize the Chances That Your Job Offer Will Be Withdrawn It’s possible to do everything right and still wind up losing a job offer after it’s been extended, but there are things you can do to minimize the risk. Be honest and forthright. As Mark Twain once said, “If you tell the truth, you don’t have to remember anything.” Beyond that, if you’re honest, you also don’t have to worry about your employer finding out anything later on. Never lie on your resume, and be prepared to answer any questions about your background that might give an employer pause. (For example, a criminal history or bad credit.) Know your rights. For the most part, employers can conduct background checks, including credit and criminal history. However, the Fair Credit Reporting Act restricts how they can ask for and use the information. In addition, some states and cities have further restrictions about what employers can and can’t ask during employment pre-screening. As of August 2017, 29 states prohibit employers from asking about criminal history. This “ban-the-box” legislation is intended to protect job applicants from discrimination. Consider getting it in writing. In an interview with The Balance, Mimi Moore, Partner in the Chicago office of Bryan Cave LLP, suggests asking if the job offer letter can specify what will happen if the offer is rescinded. If so, it’s important to be specific about any signing bonuses, advances and/or moving allowances. Make sure you’re comfortable with the offer and the company. Moore says that this is most important. If the company has a bad reputation or the offer seems iffy, think twice before signing on the dotted line. Legally, companies can rescind most offers; practically speaking, good employers won’t get in the habit of doing so, lest they scare off talented workers. Have a backup plan. Taking a new job is always a risk, and it’s a good idea to have a plan in case things don’t work out. Would you ask for your old job back, pursue another lead, target another employer with your networking efforts? Busy as you are preparing for your new job, it pays to take a moment to think out what you’d do in the worst-case scenario. You never know when you might need a Plan B.
Q: DDD: What are good reasons for you to loosely-couple Entities? Back in December, there was this post that was answered with "it is ok to use concret types [for simple object]". But I keep seeing more and more simple entities with interfaces in sample projects, and even the very large Enterprise application I just took control over (counting 89 interfaces and going). Is it that people are not picking the best approach, and just shotgunning the project with the "my project is loosely-coupled!" approach? Or, am I missing something. I can unit test with concret types for my IService, IFactory and IRepository implmentations I have (and works quite well). I am also building my first "Anticorruption Layer" for abstracting a lot of these 3rd party tools out away from the main domain. This anticorruption layer has a number of Facades, Translators, and Adapters - all of which are loosely coupled (or planned to be). So, is there something I missing about Entities having Interfaces? public interface IContent { Int32 ContentID {get; set;} } IList<IContent> list = new List(); Edit: I should also mention that that the enterprise app I have that has all of these interfaces, has zero unit tests. lol A: It is more important that entities that have responsibility conform to an interface than it is for simple data objects. If you can define the entity in terms of methods, then, yes, you'll benefit from an interface. I can't see that an object that will simply be used as a DTO within the application gains any great advantage by having an interface. That said, there is certainly benefit from abstracting away "entities" created by a third party tool, or a framework like L2S, in my opinion.
On the eve of the impeachment vote in the House of Representatives (it's scheduled for Wednesday, but could get bumped Thursday, depending on how drawn-out debate gets), things are looking mighty bleak for anyone who hoped Republicans might turn over a new leaf. For the last several months, there has been plaintive hope that GOP lawmakers might be moved by the overwhelming evidence that Donald Trump is guilty of running an extortion scheme against Ukraine's leaders to help him win re-election in 2020. Right now, it looks like there's no chance of any Republican defections in the House away from the GOP line that Trump did nothing wrong. The one Republican, Rep. Justin Amash of Michigan, who admitted out loud that Trump deserved to be impeached, was duly ejected from the party. In the Senate, Majority Leader Mitch McConnell has been openly bragging that he intends to rig the Senate trial in Trump's favor. Even supposedly Trump-skeptical Republican senators, such as Utah's Mitt Romney or Maine's Susan Collins, have been avoiding questions about whether the Senate should call witnesses for the trial. Advertisement: In the face of all this, a small group of anti-Trump Republican leaders who have been heavily represented in the media — George T. Conway III, Steve Schmidt, John Weaver and "But this president’s actions are possible only with the craven acquiescence of congressional Republicans," they write. "They have done no less than abdicate their Article I responsibilities." Fair enough on the second claim — there is no doubt that Trump is guilty, and keeping him in power is an abdication of the duty of congressional members to defend and uphold the Constitution. But it's naive to think that this choice to back Trump's criminality is being done out of fear. Instead, the likelier story is that most Republicans support Trump not despite, but because of his all-out assault on our democratic system. Advertisement: Whatever word you want to use for it — fascism, authoritarianism, pick your poison — the grim reality is that Republicans, both politicians and voters, appear to be all in on this project. It's painful to admit this, but Republicans have flat-out rejected democracy. As a group, they are pushing towards replacing democracy with a system where a powerful minority holds disproportionate and borderline tyrannical control over government and blocks the majority of Americans from having meaningful say over the direction of the country. Republicans are not cowering in fear of Trump. On the contrary, they are exalting in his shamelessness. Watching Republicans at impeachment hearings, where they performed outrage for the cameras, lied with obvious glee and gloried in sharing conspiracy theories, it did not appear that they were intimidated by their president or anyone else. No, Republicans clearly feel empowered by Trump. He frees them to reveal their darkest desire — which is to end democracy as we know it, and to cut any corners or break any laws necessary to get the job done. Advertisement: And the Republican voter base is right there along with the politicians. A new Washington Post/ABC poll found that, despite recent hearings that made it almost comically obvious how guilty Trump is, Republican voters are standing by their man. When asked if Trump should be impeached and removed from office, 86% of self-identified Republicans said no. In fact, in the face of mounting evidence of Trump's guilt, Republicans are digging in even more. Fewer Republican voters support impeachment now than a similar poll showed in October. It's easy to write this off as pure tribalism, and there is no doubt that's a big factor. But that can't account for the entire phenomenon, especially since Democrats have shown no interest in pursuing evidence that Vice President Mike Pence was involved in the crime (though it does appear he is implicated), which would mean that dumping Trump wouldn't actually cost Republicans the White House. Advertisement: No, the darker truth is that Republican voters, like Republican politicians, see clearly what Trump did — use the power of his office in an overt attempt to cheat in the 2020 election — and they love it. Like their leaders, Republican voters are feeling done with democracy and eager to follow Trump into a new world, where the majority of Americans who vote for Democrats are kept out of power, by any means necessary. As a Twitter user claiming to be "a white male in a red rural area of a red southern state" explained in a persuasive and widely shared thread on Monday, conservative voters have convinced themselves that they "are fighting for their lives and country," which they believe is under threat from racial diversity. They therefore "feel justified in voter [s]uppression as a result" and "in winning by any means necessary." (I disagree with his proposed fix of pandering to this racism and sexism by giving these voters a centrist white male candidate, but he is 100% right that conservative voters feel that they are entitled to torch democracy rather than share power with people who don't look like them.) Advertisement: As Michelle Goldberg recently wrote in the New York Times, "Trump’s political movement is pro-authoritarian and pro-oligarch" and is "contemptuous of the notion of America as a lofty idea rather than a blood-and-soil nation." We can get into the intellectual nitpicking weeds over whether or not this is "real" fascism, but what should be indisputable is that the urges that drive Trumpism differ in no meaningful way than those that drive fascism. It's a movement of white men and their wives who hold a narrow, racist, reactionary view of what being an "American" is. They believe that those of us who don't fit into that view — because we're not white or because we're not Christian or because we're pointy-headed intellectuals who believe in free thought or because we're queer or because we're feminists — are not legitimate Americans, therefore not legitimate voters. So Trump's law-breaking to undermine the 2020 election is seen only as a necessary corrective to the "problem" of a pluralistic democracy. Advertisement: That is why there's such deep division in the U.S. over impeachment. It's not that conservatives can't see what Trump did when he used the power of his office to cheat in the 2020 election. They just don't care. If anything, they're glad he did it. This is the same party that repeatedly tried to shut down the government during Barack Obama's presidency and was hugely successful in blocking his judicial appointments. This is the party that suppresses votes and gerrymanders districts into meaninglessness. They feel entitled to run the country and do not care if the voters disagree. Voters are just one more obstacle to be overcome in the Republican power grab. There may be matters of style where many Republicans differ with Donald Trump — although they've largely gotten over that. But they see him as their single best weapon for ending American democracy, which Republicans increasingly see as an obstacle to their true goals.
Q: How can I only allow authors to edit their own entires via front-end? I have a front-end form that registered users can log into and edit entries. I am checking for the correct user group, then also checking for the permission: {% if currentUser.isInGroup('myGroup') %} {# Get the entry #} {% set request = craft.app.request.segment(3) %} {% set entry = craft.entries.section('mySection').slug(request).one() %} {% if entry|length > 0 %} {% if currentUser.can('editEntries:7') %} {# user can edit the current entry #} {% endif %} {% endif %} {% endif %} All is fine, but if I change the url to another valid url (where the logged in user is not the author) I am still able to see the entry. Is there a way to prevent that? Is it as easy as just checking/comparing authors? Or is there a more eloquent way? I do have other permissions disabled... Thank you for any suggestions! A: You can check if the current entry's author is the currentUser. {% if entry.author.id == currentUser.id %} {# User can edit entry #} {% endif %}
Effect of different caloric loads in human jejunum on meal-stimulated and nonstimulated biliopancreatic secretion. The effects on biliopancreatic secretion of two caloric loads (1.3 and 3.3 kcal/min of Realmentyl: proteins 18%, lipids 27%, carbohydrates 55%), infused into the jejuna of 10 healthy men, were compared with those of a control solution. In one set of experiments (six subjects) when biliopancreatic secretion was not stimulated before infusion, the rate 1.3 kcal/min resulted in mild stimulation whereas the rate 3.3 kcal/min brought about an inhibition of biliopancreatic secretion. In another set of experiments (six subjects) when biliopancreatic secretion was stimulated by ingestion of an homogenized meal (400 mL, 490 kcal) 1 h before the start of infusion, both loads resulted in strong inhibition of pancreatic secretions, the effect being more pronounced with the high caloric load.
Northwestern Bell Excursion 36258 2.4 GHz 1-Line Cordless Phone alaTest has collected and analyzed 2 reviews of Northwestern Bell Excursion 36258 2.4 GHz 1-Line Cordless Phone. The average rating for this product is 1.5/5, compared to an average rating of 3.9/5 for other Cordless Phones for all reviews. On average, users rate this product 30/100. Review analysis alaTest has collected and analyzed 1 user review of Northwestern Bell Excursion 36258 2.4 GHz 1-Line Cordless Phone from Amazon.com. The average user rating for this product is 1.0/5, compared to an average user rating of 3.8/5 for other Cordless Phones on Amazon.com. Product Specifications This quality 2.4GHz cordless telephone all-digital answering system with call-waiting Caller ID, like all Genuine BELL products, has been designed to give you many years of continuous service and represents the best value for your money. It requires little maintenance and is easy to set up and operate.
<?php /** * Test for Manx (Gaelg) language * * @author Santhosh Thottingal * @copyright Copyright © 2013, Santhosh Thottingal * @file */ /** * @group Language */ class LanguageGvTest extends LanguageClassesTestCase { /** * @dataProvider providePlural * @covers Language::convertPlural */ public function testPlural( $result, $value ) { $forms = [ 'one', 'two', 'few', 'other' ]; $this->assertEquals( $result, $this->getLang()->convertPlural( $value, $forms ) ); } /** * @dataProvider providePlural * @covers Language::getPluralRuleType */ public function testGetPluralRuleType( $result, $value ) { $this->assertEquals( $result, $this->getLang()->getPluralRuleType( $value ) ); } public static function providePlural() { return [ [ 'few', 0 ], [ 'one', 1 ], [ 'two', 2 ], [ 'other', 3 ], [ 'few', 20 ], [ 'one', 21 ], [ 'two', 22 ], [ 'other', 23 ], [ 'other', 50 ], [ 'few', 60 ], [ 'few', 80 ], [ 'few', 100 ] ]; } }
[This is a repost from my HackTheDay blog of 6 years ago. But these are rare-to-find tips that are still highly valuable.] You don’t really need a reason to try out these Mac OSX tips and hacks. But they are fun, probably useful and definitely will get a nice reaction from your friends. They all involve typing some commands in the Terminal.
import os import base64 import gettext import locale import unittest from test import support # TODO: # - Add new tests, for example for "dgettext" # - Remove dummy tests, for example testing for single and double quotes # has no sense, it would have if we were testing a parser (i.e. pygettext) # - Tests should have only one assert. GNU_MO_DATA = b'''\ 3hIElQAAAAAGAAAAHAAAAEwAAAALAAAAfAAAAAAAAACoAAAAFQAAAKkAAAAjAAAAvwAAAKEAAADj AAAABwAAAIUBAAALAAAAjQEAAEUBAACZAQAAFgAAAN8CAAAeAAAA9gIAAKEAAAAVAwAABQAAALcD AAAJAAAAvQMAAAEAAAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAABQAAAAYAAAACAAAAAFJh eW1vbmQgTHV4dXJ5IFlhY2gtdABUaGVyZSBpcyAlcyBmaWxlAFRoZXJlIGFyZSAlcyBmaWxlcwBU aGlzIG1vZHVsZSBwcm92aWRlcyBpbnRlcm5hdGlvbmFsaXphdGlvbiBhbmQgbG9jYWxpemF0aW9u CnN1cHBvcnQgZm9yIHlvdXIgUHl0aG9uIHByb2dyYW1zIGJ5IHByb3ZpZGluZyBhbiBpbnRlcmZh Y2UgdG8gdGhlIEdOVQpnZXR0ZXh0IG1lc3NhZ2UgY2F0YWxvZyBsaWJyYXJ5LgBtdWxsdXNrAG51 ZGdlIG51ZGdlAFByb2plY3QtSWQtVmVyc2lvbjogMi4wClBPLVJldmlzaW9uLURhdGU6IDIwMDAt MDgtMjkgMTI6MTktMDQ6MDAKTGFzdC1UcmFuc2xhdG9yOiBKLiBEYXZpZCBJYsOhw7FleiA8ai1k YXZpZEBub29zLmZyPgpMYW5ndWFnZS1UZWFtOiBYWCA8cHl0aG9uLWRldkBweXRob24ub3JnPgpN SU1FLVZlcnNpb246IDEuMApDb250ZW50LVR5cGU6IHRleHQvcGxhaW47IGNoYXJzZXQ9aXNvLTg4 NTktMQpDb250ZW50LVRyYW5zZmVyLUVuY29kaW5nOiBub25lCkdlbmVyYXRlZC1CeTogcHlnZXR0 ZXh0LnB5IDEuMQpQbHVyYWwtRm9ybXM6IG5wbHVyYWxzPTI7IHBsdXJhbD1uIT0xOwoAVGhyb2F0 d29iYmxlciBNYW5ncm92ZQBIYXkgJXMgZmljaGVybwBIYXkgJXMgZmljaGVyb3MAR3V2ZiB6YnFo eXIgY2ViaXZxcmYgdmFncmVhbmd2YmFueXZtbmd2YmEgbmFxIHlicG55dm1uZ3ZiYQpmaGNjYmVn IHNiZSBsYmhlIENsZ3ViYSBjZWJ0ZW56ZiBvbCBjZWJpdnF2YXQgbmEgdmFncmVzbnByIGdiIGd1 ciBUQUgKdHJnZ3JrZyB6cmZmbnRyIHBuZ255YnQgeXZvZW5lbC4AYmFjb24Ad2luayB3aW5rAA== ''' # This data contains an invalid major version number (5) # An unexpected major version number should be treated as an error when # parsing a .mo file GNU_MO_DATA_BAD_MAJOR_VERSION = b'''\ 3hIElQAABQAGAAAAHAAAAEwAAAALAAAAfAAAAAAAAACoAAAAFQAAAKkAAAAjAAAAvwAAAKEAAADj AAAABwAAAIUBAAALAAAAjQEAAEUBAACZAQAAFgAAAN8CAAAeAAAA9gIAAKEAAAAVAwAABQAAALcD AAAJAAAAvQMAAAEAAAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAABQAAAAYAAAACAAAAAFJh eW1vbmQgTHV4dXJ5IFlhY2gtdABUaGVyZSBpcyAlcyBmaWxlAFRoZXJlIGFyZSAlcyBmaWxlcwBU aGlzIG1vZHVsZSBwcm92aWRlcyBpbnRlcm5hdGlvbmFsaXphdGlvbiBhbmQgbG9jYWxpemF0aW9u CnN1cHBvcnQgZm9yIHlvdXIgUHl0aG9uIHByb2dyYW1zIGJ5IHByb3ZpZGluZyBhbiBpbnRlcmZh Y2UgdG8gdGhlIEdOVQpnZXR0ZXh0IG1lc3NhZ2UgY2F0YWxvZyBsaWJyYXJ5LgBtdWxsdXNrAG51 ZGdlIG51ZGdlAFByb2plY3QtSWQtVmVyc2lvbjogMi4wClBPLVJldmlzaW9uLURhdGU6IDIwMDAt MDgtMjkgMTI6MTktMDQ6MDAKTGFzdC1UcmFuc2xhdG9yOiBKLiBEYXZpZCBJYsOhw7FleiA8ai1k YXZpZEBub29zLmZyPgpMYW5ndWFnZS1UZWFtOiBYWCA8cHl0aG9uLWRldkBweXRob24ub3JnPgpN SU1FLVZlcnNpb246IDEuMApDb250ZW50LVR5cGU6IHRleHQvcGxhaW47IGNoYXJzZXQ9aXNvLTg4 NTktMQpDb250ZW50LVRyYW5zZmVyLUVuY29kaW5nOiBub25lCkdlbmVyYXRlZC1CeTogcHlnZXR0 ZXh0LnB5IDEuMQpQbHVyYWwtRm9ybXM6IG5wbHVyYWxzPTI7IHBsdXJhbD1uIT0xOwoAVGhyb2F0 d29iYmxlciBNYW5ncm92ZQBIYXkgJXMgZmljaGVybwBIYXkgJXMgZmljaGVyb3MAR3V2ZiB6YnFo eXIgY2ViaXZxcmYgdmFncmVhbmd2YmFueXZtbmd2YmEgbmFxIHlicG55dm1uZ3ZiYQpmaGNjYmVn IHNiZSBsYmhlIENsZ3ViYSBjZWJ0ZW56ZiBvbCBjZWJpdnF2YXQgbmEgdmFncmVzbnByIGdiIGd1 ciBUQUgKdHJnZ3JrZyB6cmZmbnRyIHBuZ255YnQgeXZvZW5lbC4AYmFjb24Ad2luayB3aW5rAA== ''' # This data contains an invalid minor version number (7) # An unexpected minor version number only indicates that some of the file's # contents may not be able to be read. It does not indicate an error. GNU_MO_DATA_BAD_MINOR_VERSION = b'''\ 3hIElQcAAAAGAAAAHAAAAEwAAAALAAAAfAAAAAAAAACoAAAAFQAAAKkAAAAjAAAAvwAAAKEAAADj AAAABwAAAIUBAAALAAAAjQEAAEUBAACZAQAAFgAAAN8CAAAeAAAA9gIAAKEAAAAVAwAABQAAALcD AAAJAAAAvQMAAAEAAAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAABQAAAAYAAAACAAAAAFJh eW1vbmQgTHV4dXJ5IFlhY2gtdABUaGVyZSBpcyAlcyBmaWxlAFRoZXJlIGFyZSAlcyBmaWxlcwBU aGlzIG1vZHVsZSBwcm92aWRlcyBpbnRlcm5hdGlvbmFsaXphdGlvbiBhbmQgbG9jYWxpemF0aW9u CnN1cHBvcnQgZm9yIHlvdXIgUHl0aG9uIHByb2dyYW1zIGJ5IHByb3ZpZGluZyBhbiBpbnRlcmZh Y2UgdG8gdGhlIEdOVQpnZXR0ZXh0IG1lc3NhZ2UgY2F0YWxvZyBsaWJyYXJ5LgBtdWxsdXNrAG51 ZGdlIG51ZGdlAFByb2plY3QtSWQtVmVyc2lvbjogMi4wClBPLVJldmlzaW9uLURhdGU6IDIwMDAt MDgtMjkgMTI6MTktMDQ6MDAKTGFzdC1UcmFuc2xhdG9yOiBKLiBEYXZpZCBJYsOhw7FleiA8ai1k YXZpZEBub29zLmZyPgpMYW5ndWFnZS1UZWFtOiBYWCA8cHl0aG9uLWRldkBweXRob24ub3JnPgpN SU1FLVZlcnNpb246IDEuMApDb250ZW50LVR5cGU6IHRleHQvcGxhaW47IGNoYXJzZXQ9aXNvLTg4 NTktMQpDb250ZW50LVRyYW5zZmVyLUVuY29kaW5nOiBub25lCkdlbmVyYXRlZC1CeTogcHlnZXR0 ZXh0LnB5IDEuMQpQbHVyYWwtRm9ybXM6IG5wbHVyYWxzPTI7IHBsdXJhbD1uIT0xOwoAVGhyb2F0 d29iYmxlciBNYW5ncm92ZQBIYXkgJXMgZmljaGVybwBIYXkgJXMgZmljaGVyb3MAR3V2ZiB6YnFo eXIgY2ViaXZxcmYgdmFncmVhbmd2YmFueXZtbmd2YmEgbmFxIHlicG55dm1uZ3ZiYQpmaGNjYmVn IHNiZSBsYmhlIENsZ3ViYSBjZWJ0ZW56ZiBvbCBjZWJpdnF2YXQgbmEgdmFncmVzbnByIGdiIGd1 ciBUQUgKdHJnZ3JrZyB6cmZmbnRyIHBuZ255YnQgeXZvZW5lbC4AYmFjb24Ad2luayB3aW5rAA== ''' UMO_DATA = b'''\ 3hIElQAAAAACAAAAHAAAACwAAAAFAAAAPAAAAAAAAABQAAAABAAAAFEAAAAPAQAAVgAAAAQAAABm AQAAAQAAAAIAAAAAAAAAAAAAAAAAAAAAYWLDngBQcm9qZWN0LUlkLVZlcnNpb246IDIuMApQTy1S ZXZpc2lvbi1EYXRlOiAyMDAzLTA0LTExIDEyOjQyLTA0MDAKTGFzdC1UcmFuc2xhdG9yOiBCYXJy eSBBLiBXQXJzYXcgPGJhcnJ5QHB5dGhvbi5vcmc+Ckxhbmd1YWdlLVRlYW06IFhYIDxweXRob24t ZGV2QHB5dGhvbi5vcmc+Ck1JTUUtVmVyc2lvbjogMS4wCkNvbnRlbnQtVHlwZTogdGV4dC9wbGFp bjsgY2hhcnNldD11dGYtOApDb250ZW50LVRyYW5zZmVyLUVuY29kaW5nOiA3Yml0CkdlbmVyYXRl ZC1CeTogbWFudWFsbHkKAMKkeXoA ''' MMO_DATA = b'''\ 3hIElQAAAAABAAAAHAAAACQAAAADAAAALAAAAAAAAAA4AAAAeAEAADkAAAABAAAAAAAAAAAAAAAA UHJvamVjdC1JZC1WZXJzaW9uOiBObyBQcm9qZWN0IDAuMApQT1QtQ3JlYXRpb24tRGF0ZTogV2Vk IERlYyAxMSAwNzo0NDoxNSAyMDAyClBPLVJldmlzaW9uLURhdGU6IDIwMDItMDgtMTQgMDE6MTg6 NTgrMDA6MDAKTGFzdC1UcmFuc2xhdG9yOiBKb2huIERvZSA8amRvZUBleGFtcGxlLmNvbT4KSmFu ZSBGb29iYXIgPGpmb29iYXJAZXhhbXBsZS5jb20+Ckxhbmd1YWdlLVRlYW06IHh4IDx4eEBleGFt cGxlLmNvbT4KTUlNRS1WZXJzaW9uOiAxLjAKQ29udGVudC1UeXBlOiB0ZXh0L3BsYWluOyBjaGFy c2V0PWlzby04ODU5LTE1CkNvbnRlbnQtVHJhbnNmZXItRW5jb2Rpbmc6IHF1b3RlZC1wcmludGFi bGUKR2VuZXJhdGVkLUJ5OiBweWdldHRleHQucHkgMS4zCgA= ''' LOCALEDIR = os.path.join('xx', 'LC_MESSAGES') MOFILE = os.path.join(LOCALEDIR, 'gettext.mo') MOFILE_BAD_MAJOR_VERSION = os.path.join(LOCALEDIR, 'gettext_bad_major_version.mo') MOFILE_BAD_MINOR_VERSION = os.path.join(LOCALEDIR, 'gettext_bad_minor_version.mo') UMOFILE = os.path.join(LOCALEDIR, 'ugettext.mo') MMOFILE = os.path.join(LOCALEDIR, 'metadata.mo') class GettextBaseTest(unittest.TestCase): def setUp(self): if not os.path.isdir(LOCALEDIR): os.makedirs(LOCALEDIR) with open(MOFILE, 'wb') as fp: fp.write(base64.decodebytes(GNU_MO_DATA)) with open(MOFILE_BAD_MAJOR_VERSION, 'wb') as fp: fp.write(base64.decodebytes(GNU_MO_DATA_BAD_MAJOR_VERSION)) with open(MOFILE_BAD_MINOR_VERSION, 'wb') as fp: fp.write(base64.decodebytes(GNU_MO_DATA_BAD_MINOR_VERSION)) with open(UMOFILE, 'wb') as fp: fp.write(base64.decodebytes(UMO_DATA)) with open(MMOFILE, 'wb') as fp: fp.write(base64.decodebytes(MMO_DATA)) self.env = support.EnvironmentVarGuard() self.env['LANGUAGE'] = 'xx' gettext._translations.clear() def tearDown(self): self.env.__exit__() del self.env support.rmtree(os.path.split(LOCALEDIR)[0]) GNU_MO_DATA_ISSUE_17898 = b'''\ 3hIElQAAAAABAAAAHAAAACQAAAAAAAAAAAAAAAAAAAAsAAAAggAAAC0AAAAAUGx1cmFsLUZvcm1z OiBucGx1cmFscz0yOyBwbHVyYWw9KG4gIT0gMSk7CiMtIy0jLSMtIyAgbWVzc2FnZXMucG8gKEVk WCBTdHVkaW8pICAjLSMtIy0jLSMKQ29udGVudC1UeXBlOiB0ZXh0L3BsYWluOyBjaGFyc2V0PVVU Ri04CgA= ''' class GettextTestCase1(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) self.localedir = os.curdir self.mofile = MOFILE gettext.install('gettext', self.localedir) def test_some_translations(self): eq = self.assertEqual # test some translations eq(_('albatross'), 'albatross') eq(_('mullusk'), 'bacon') eq(_(r'Raymond Luxury Yach-t'), 'Throatwobbler Mangrove') eq(_(r'nudge nudge'), 'wink wink') def test_double_quotes(self): eq = self.assertEqual # double quotes eq(_("albatross"), 'albatross') eq(_("mullusk"), 'bacon') eq(_(r"Raymond Luxury Yach-t"), 'Throatwobbler Mangrove') eq(_(r"nudge nudge"), 'wink wink') def test_triple_single_quotes(self): eq = self.assertEqual # triple single quotes eq(_('''albatross'''), 'albatross') eq(_('''mullusk'''), 'bacon') eq(_(r'''Raymond Luxury Yach-t'''), 'Throatwobbler Mangrove') eq(_(r'''nudge nudge'''), 'wink wink') def test_triple_double_quotes(self): eq = self.assertEqual # triple double quotes eq(_("""albatross"""), 'albatross') eq(_("""mullusk"""), 'bacon') eq(_(r"""Raymond Luxury Yach-t"""), 'Throatwobbler Mangrove') eq(_(r"""nudge nudge"""), 'wink wink') def test_multiline_strings(self): eq = self.assertEqual # multiline strings eq(_('''This module provides internationalization and localization support for your Python programs by providing an interface to the GNU gettext message catalog library.'''), '''Guvf zbqhyr cebivqrf vagreangvbanyvmngvba naq ybpnyvmngvba fhccbeg sbe lbhe Clguba cebtenzf ol cebivqvat na vagresnpr gb gur TAH trggrkg zrffntr pngnybt yvoenel.''') def test_the_alternative_interface(self): eq = self.assertEqual # test the alternative interface with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) # Install the translation object t.install() eq(_('nudge nudge'), 'wink wink') # Try unicode return type t.install() eq(_('mullusk'), 'bacon') # Test installation of other methods import builtins t.install(names=["gettext", "lgettext"]) eq(_, t.gettext) eq(builtins.gettext, t.gettext) eq(lgettext, t.lgettext) del builtins.gettext del builtins.lgettext class GettextTestCase2(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) self.localedir = os.curdir # Set up the bindings gettext.bindtextdomain('gettext', self.localedir) gettext.textdomain('gettext') # For convenience self._ = gettext.gettext def test_bindtextdomain(self): self.assertEqual(gettext.bindtextdomain('gettext'), self.localedir) def test_textdomain(self): self.assertEqual(gettext.textdomain(), 'gettext') def test_bad_major_version(self): with open(MOFILE_BAD_MAJOR_VERSION, 'rb') as fp: with self.assertRaises(OSError) as cm: gettext.GNUTranslations(fp) exception = cm.exception self.assertEqual(exception.errno, 0) self.assertEqual(exception.strerror, "Bad version number 5") self.assertEqual(exception.filename, MOFILE_BAD_MAJOR_VERSION) def test_bad_minor_version(self): with open(MOFILE_BAD_MINOR_VERSION, 'rb') as fp: # Check that no error is thrown with a bad minor version number gettext.GNUTranslations(fp) def test_some_translations(self): eq = self.assertEqual # test some translations eq(self._('albatross'), 'albatross') eq(self._('mullusk'), 'bacon') eq(self._(r'Raymond Luxury Yach-t'), 'Throatwobbler Mangrove') eq(self._(r'nudge nudge'), 'wink wink') def test_double_quotes(self): eq = self.assertEqual # double quotes eq(self._("albatross"), 'albatross') eq(self._("mullusk"), 'bacon') eq(self._(r"Raymond Luxury Yach-t"), 'Throatwobbler Mangrove') eq(self._(r"nudge nudge"), 'wink wink') def test_triple_single_quotes(self): eq = self.assertEqual # triple single quotes eq(self._('''albatross'''), 'albatross') eq(self._('''mullusk'''), 'bacon') eq(self._(r'''Raymond Luxury Yach-t'''), 'Throatwobbler Mangrove') eq(self._(r'''nudge nudge'''), 'wink wink') def test_triple_double_quotes(self): eq = self.assertEqual # triple double quotes eq(self._("""albatross"""), 'albatross') eq(self._("""mullusk"""), 'bacon') eq(self._(r"""Raymond Luxury Yach-t"""), 'Throatwobbler Mangrove') eq(self._(r"""nudge nudge"""), 'wink wink') def test_multiline_strings(self): eq = self.assertEqual # multiline strings eq(self._('''This module provides internationalization and localization support for your Python programs by providing an interface to the GNU gettext message catalog library.'''), '''Guvf zbqhyr cebivqrf vagreangvbanyvmngvba naq ybpnyvmngvba fhccbeg sbe lbhe Clguba cebtenzf ol cebivqvat na vagresnpr gb gur TAH trggrkg zrffntr pngnybt yvoenel.''') class PluralFormsTestCase(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) self.mofile = MOFILE def test_plural_forms1(self): eq = self.assertEqual x = gettext.ngettext('There is %s file', 'There are %s files', 1) eq(x, 'Hay %s fichero') x = gettext.ngettext('There is %s file', 'There are %s files', 2) eq(x, 'Hay %s ficheros') def test_plural_forms2(self): eq = self.assertEqual with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) x = t.ngettext('There is %s file', 'There are %s files', 1) eq(x, 'Hay %s fichero') x = t.ngettext('There is %s file', 'There are %s files', 2) eq(x, 'Hay %s ficheros') # Examples from http://www.gnu.org/software/gettext/manual/gettext.html def test_ja(self): eq = self.assertEqual f = gettext.c2py('0') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") def test_de(self): eq = self.assertEqual f = gettext.c2py('n != 1') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "10111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111") def test_fr(self): eq = self.assertEqual f = gettext.c2py('n>1') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "00111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111") def test_lv(self): eq = self.assertEqual f = gettext.c2py('n%10==1 && n%100!=11 ? 0 : n != 0 ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20111111111111111111101111111110111111111011111111101111111110111111111011111111101111111110111111111011111111111111111110111111111011111111101111111110111111111011111111101111111110111111111011111111") def test_gd(self): eq = self.assertEqual f = gettext.c2py('n==1 ? 0 : n==2 ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20122222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222") def test_gd2(self): eq = self.assertEqual # Tests the combination of parentheses and "?:" f = gettext.c2py('n==1 ? 0 : (n==2 ? 1 : 2)') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20122222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222") def test_ro(self): eq = self.assertEqual f = gettext.c2py('n==1 ? 0 : (n==0 || (n%100 > 0 && n%100 < 20)) ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "10111111111111111111222222222222222222222222222222222222222222222222222222222222222222222222222222222111111111111111111122222222222222222222222222222222222222222222222222222222222222222222222222222222") def test_lt(self): eq = self.assertEqual f = gettext.c2py('n%10==1 && n%100!=11 ? 0 : n%10>=2 && (n%100<10 || n%100>=20) ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20111111112222222222201111111120111111112011111111201111111120111111112011111111201111111120111111112011111111222222222220111111112011111111201111111120111111112011111111201111111120111111112011111111") def test_ru(self): eq = self.assertEqual f = gettext.c2py('n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20111222222222222222201112222220111222222011122222201112222220111222222011122222201112222220111222222011122222222222222220111222222011122222201112222220111222222011122222201112222220111222222011122222") def test_cs(self): eq = self.assertEqual f = gettext.c2py('(n==1) ? 0 : (n>=2 && n<=4) ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20111222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222") def test_pl(self): eq = self.assertEqual f = gettext.c2py('n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "20111222222222222222221112222222111222222211122222221112222222111222222211122222221112222222111222222211122222222222222222111222222211122222221112222222111222222211122222221112222222111222222211122222") def test_sl(self): eq = self.assertEqual f = gettext.c2py('n%100==1 ? 0 : n%100==2 ? 1 : n%100==3 || n%100==4 ? 2 : 3') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "30122333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333012233333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333") def test_ar(self): eq = self.assertEqual f = gettext.c2py('n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 ? 4 : 5') s = ''.join([ str(f(x)) for x in range(200) ]) eq(s, "01233333333444444444444444444444444444444444444444444444444444444444444444444444444444444444444444445553333333344444444444444444444444444444444444444444444444444444444444444444444444444444444444444444") def test_security(self): raises = self.assertRaises # Test for a dangerous expression raises(ValueError, gettext.c2py, "os.chmod('/etc/passwd',0777)") # issue28563 raises(ValueError, gettext.c2py, '"(eval(foo) && ""') raises(ValueError, gettext.c2py, 'f"{os.system(\'sh\')}"') # Maximum recursion depth exceeded during compilation raises(ValueError, gettext.c2py, 'n+'*10000 + 'n') self.assertEqual(gettext.c2py('n+'*100 + 'n')(1), 101) # MemoryError during compilation raises(ValueError, gettext.c2py, '('*100 + 'n' + ')'*100) # Maximum recursion depth exceeded in C to Python translator raises(ValueError, gettext.c2py, '('*10000 + 'n' + ')'*10000) self.assertEqual(gettext.c2py('('*20 + 'n' + ')'*20)(1), 1) def test_chained_comparison(self): # C doesn't chain comparison as Python so 2 == 2 == 2 gets different results f = gettext.c2py('n == n == n') self.assertEqual(''.join(str(f(x)) for x in range(3)), '010') f = gettext.c2py('1 < n == n') self.assertEqual(''.join(str(f(x)) for x in range(3)), '100') f = gettext.c2py('n == n < 2') self.assertEqual(''.join(str(f(x)) for x in range(3)), '010') f = gettext.c2py('0 < n < 2') self.assertEqual(''.join(str(f(x)) for x in range(3)), '111') def test_decimal_number(self): self.assertEqual(gettext.c2py('0123')(1), 123) def test_invalid_syntax(self): invalid_expressions = [ 'x>1', '(n>1', 'n>1)', '42**42**42', '0xa', '1.0', '1e2', 'n>0x1', '+n', '-n', 'n()', 'n(1)', '1+', 'nn', 'n n', ] for expr in invalid_expressions: with self.assertRaises(ValueError): gettext.c2py(expr) def test_nested_condition_operator(self): self.assertEqual(gettext.c2py('n?1?2:3:4')(0), 4) self.assertEqual(gettext.c2py('n?1?2:3:4')(1), 2) self.assertEqual(gettext.c2py('n?1:3?4:5')(0), 4) self.assertEqual(gettext.c2py('n?1:3?4:5')(1), 1) def test_division(self): f = gettext.c2py('2/n*3') self.assertEqual(f(1), 6) self.assertEqual(f(2), 3) self.assertEqual(f(3), 0) self.assertEqual(f(-1), -6) self.assertRaises(ZeroDivisionError, f, 0) def test_plural_number(self): f = gettext.c2py('n != 1') self.assertEqual(f(1), 0) self.assertEqual(f(2), 1) with self.assertWarns(DeprecationWarning): self.assertEqual(f(1.0), 0) with self.assertWarns(DeprecationWarning): self.assertEqual(f(2.0), 1) with self.assertWarns(DeprecationWarning): self.assertEqual(f(1.1), 1) self.assertRaises(TypeError, f, '2') self.assertRaises(TypeError, f, b'2') self.assertRaises(TypeError, f, []) self.assertRaises(TypeError, f, object()) class LGettextTestCase(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) self.mofile = MOFILE def test_lgettext(self): lgettext = gettext.lgettext ldgettext = gettext.ldgettext self.assertEqual(lgettext('mullusk'), b'bacon') self.assertEqual(lgettext('spam'), b'spam') self.assertEqual(ldgettext('gettext', 'mullusk'), b'bacon') self.assertEqual(ldgettext('gettext', 'spam'), b'spam') def test_lgettext_2(self): with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) lgettext = t.lgettext self.assertEqual(lgettext('mullusk'), b'bacon') self.assertEqual(lgettext('spam'), b'spam') def test_lgettext_bind_textdomain_codeset(self): lgettext = gettext.lgettext ldgettext = gettext.ldgettext saved_codeset = gettext.bind_textdomain_codeset('gettext') try: gettext.bind_textdomain_codeset('gettext', 'utf-16') self.assertEqual(lgettext('mullusk'), 'bacon'.encode('utf-16')) self.assertEqual(lgettext('spam'), 'spam'.encode('utf-16')) self.assertEqual(ldgettext('gettext', 'mullusk'), 'bacon'.encode('utf-16')) self.assertEqual(ldgettext('gettext', 'spam'), 'spam'.encode('utf-16')) finally: del gettext._localecodesets['gettext'] gettext.bind_textdomain_codeset('gettext', saved_codeset) def test_lgettext_output_encoding(self): with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) lgettext = t.lgettext t.set_output_charset('utf-16') self.assertEqual(lgettext('mullusk'), 'bacon'.encode('utf-16')) self.assertEqual(lgettext('spam'), 'spam'.encode('utf-16')) def test_lngettext(self): lngettext = gettext.lngettext ldngettext = gettext.ldngettext x = lngettext('There is %s file', 'There are %s files', 1) self.assertEqual(x, b'Hay %s fichero') x = lngettext('There is %s file', 'There are %s files', 2) self.assertEqual(x, b'Hay %s ficheros') x = lngettext('There is %s directory', 'There are %s directories', 1) self.assertEqual(x, b'There is %s directory') x = lngettext('There is %s directory', 'There are %s directories', 2) self.assertEqual(x, b'There are %s directories') x = ldngettext('gettext', 'There is %s file', 'There are %s files', 1) self.assertEqual(x, b'Hay %s fichero') x = ldngettext('gettext', 'There is %s file', 'There are %s files', 2) self.assertEqual(x, b'Hay %s ficheros') x = ldngettext('gettext', 'There is %s directory', 'There are %s directories', 1) self.assertEqual(x, b'There is %s directory') x = ldngettext('gettext', 'There is %s directory', 'There are %s directories', 2) self.assertEqual(x, b'There are %s directories') def test_lngettext_2(self): with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) lngettext = t.lngettext x = lngettext('There is %s file', 'There are %s files', 1) self.assertEqual(x, b'Hay %s fichero') x = lngettext('There is %s file', 'There are %s files', 2) self.assertEqual(x, b'Hay %s ficheros') x = lngettext('There is %s directory', 'There are %s directories', 1) self.assertEqual(x, b'There is %s directory') x = lngettext('There is %s directory', 'There are %s directories', 2) self.assertEqual(x, b'There are %s directories') def test_lngettext_bind_textdomain_codeset(self): lngettext = gettext.lngettext ldngettext = gettext.ldngettext saved_codeset = gettext.bind_textdomain_codeset('gettext') try: gettext.bind_textdomain_codeset('gettext', 'utf-16') x = lngettext('There is %s file', 'There are %s files', 1) self.assertEqual(x, 'Hay %s fichero'.encode('utf-16')) x = lngettext('There is %s file', 'There are %s files', 2) self.assertEqual(x, 'Hay %s ficheros'.encode('utf-16')) x = lngettext('There is %s directory', 'There are %s directories', 1) self.assertEqual(x, 'There is %s directory'.encode('utf-16')) x = lngettext('There is %s directory', 'There are %s directories', 2) self.assertEqual(x, 'There are %s directories'.encode('utf-16')) x = ldngettext('gettext', 'There is %s file', 'There are %s files', 1) self.assertEqual(x, 'Hay %s fichero'.encode('utf-16')) x = ldngettext('gettext', 'There is %s file', 'There are %s files', 2) self.assertEqual(x, 'Hay %s ficheros'.encode('utf-16')) x = ldngettext('gettext', 'There is %s directory', 'There are %s directories', 1) self.assertEqual(x, 'There is %s directory'.encode('utf-16')) x = ldngettext('gettext', 'There is %s directory', 'There are %s directories', 2) self.assertEqual(x, 'There are %s directories'.encode('utf-16')) finally: del gettext._localecodesets['gettext'] gettext.bind_textdomain_codeset('gettext', saved_codeset) def test_lngettext_output_encoding(self): with open(self.mofile, 'rb') as fp: t = gettext.GNUTranslations(fp) lngettext = t.lngettext t.set_output_charset('utf-16') x = lngettext('There is %s file', 'There are %s files', 1) self.assertEqual(x, 'Hay %s fichero'.encode('utf-16')) x = lngettext('There is %s file', 'There are %s files', 2) self.assertEqual(x, 'Hay %s ficheros'.encode('utf-16')) x = lngettext('There is %s directory', 'There are %s directories', 1) self.assertEqual(x, 'There is %s directory'.encode('utf-16')) x = lngettext('There is %s directory', 'There are %s directories', 2) self.assertEqual(x, 'There are %s directories'.encode('utf-16')) class GNUTranslationParsingTest(GettextBaseTest): def test_plural_form_error_issue17898(self): with open(MOFILE, 'wb') as fp: fp.write(base64.decodebytes(GNU_MO_DATA_ISSUE_17898)) with open(MOFILE, 'rb') as fp: # If this runs cleanly, the bug is fixed. t = gettext.GNUTranslations(fp) class UnicodeTranslationsTest(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) with open(UMOFILE, 'rb') as fp: self.t = gettext.GNUTranslations(fp) self._ = self.t.gettext def test_unicode_msgid(self): self.assertIsInstance(self._(''), str) def test_unicode_msgstr(self): self.assertEqual(self._('ab\xde'), '\xa4yz') class WeirdMetadataTest(GettextBaseTest): def setUp(self): GettextBaseTest.setUp(self) with open(MMOFILE, 'rb') as fp: try: self.t = gettext.GNUTranslations(fp) except: self.tearDown() raise def test_weird_metadata(self): info = self.t.info() self.assertEqual(len(info), 9) self.assertEqual(info['last-translator'], 'John Doe <jdoe@example.com>\nJane Foobar <jfoobar@example.com>') class DummyGNUTranslations(gettext.GNUTranslations): def foo(self): return 'foo' class GettextCacheTestCase(GettextBaseTest): def test_cache(self): self.localedir = os.curdir self.mofile = MOFILE self.assertEqual(len(gettext._translations), 0) t = gettext.translation('gettext', self.localedir) self.assertEqual(len(gettext._translations), 1) t = gettext.translation('gettext', self.localedir, class_=DummyGNUTranslations) self.assertEqual(len(gettext._translations), 2) self.assertEqual(t.__class__, DummyGNUTranslations) # Calling it again doesn't add to the cache t = gettext.translation('gettext', self.localedir, class_=DummyGNUTranslations) self.assertEqual(len(gettext._translations), 2) self.assertEqual(t.__class__, DummyGNUTranslations) class MiscTestCase(unittest.TestCase): def test__all__(self): blacklist = {'c2py', 'ENOENT'} support.check__all__(self, gettext, blacklist=blacklist) def test_main(): support.run_unittest(__name__) if __name__ == '__main__': test_main() # For reference, here's the .po file used to created the GNU_MO_DATA above. # # The original version was automatically generated from the sources with # pygettext. Later it was manually modified to add plural forms support. b''' # Dummy translation for the Python test_gettext.py module. # Copyright (C) 2001 Python Software Foundation # Barry Warsaw <barry@python.org>, 2000. # msgid "" msgstr "" "Project-Id-Version: 2.0\n" "PO-Revision-Date: 2003-04-11 14:32-0400\n" "Last-Translator: J. David Ibanez <j-david@noos.fr>\n" "Language-Team: XX <python-dev@python.org>\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=iso-8859-1\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: pygettext.py 1.1\n" "Plural-Forms: nplurals=2; plural=n!=1;\n" #: test_gettext.py:19 test_gettext.py:25 test_gettext.py:31 test_gettext.py:37 #: test_gettext.py:51 test_gettext.py:80 test_gettext.py:86 test_gettext.py:92 #: test_gettext.py:98 msgid "nudge nudge" msgstr "wink wink" #: test_gettext.py:16 test_gettext.py:22 test_gettext.py:28 test_gettext.py:34 #: test_gettext.py:77 test_gettext.py:83 test_gettext.py:89 test_gettext.py:95 msgid "albatross" msgstr "" #: test_gettext.py:18 test_gettext.py:24 test_gettext.py:30 test_gettext.py:36 #: test_gettext.py:79 test_gettext.py:85 test_gettext.py:91 test_gettext.py:97 msgid "Raymond Luxury Yach-t" msgstr "Throatwobbler Mangrove" #: test_gettext.py:17 test_gettext.py:23 test_gettext.py:29 test_gettext.py:35 #: test_gettext.py:56 test_gettext.py:78 test_gettext.py:84 test_gettext.py:90 #: test_gettext.py:96 msgid "mullusk" msgstr "bacon" #: test_gettext.py:40 test_gettext.py:101 msgid "" "This module provides internationalization and localization\n" "support for your Python programs by providing an interface to the GNU\n" "gettext message catalog library." msgstr "" "Guvf zbqhyr cebivqrf vagreangvbanyvmngvba naq ybpnyvmngvba\n" "fhccbeg sbe lbhe Clguba cebtenzf ol cebivqvat na vagresnpr gb gur TAH\n" "trggrkg zrffntr pngnybt yvoenel." # Manually added, as neither pygettext nor xgettext support plural forms # in Python. msgid "There is %s file" msgid_plural "There are %s files" msgstr[0] "Hay %s fichero" msgstr[1] "Hay %s ficheros" ''' # Here's the second example po file example, used to generate the UMO_DATA # containing utf-8 encoded Unicode strings b''' # Dummy translation for the Python test_gettext.py module. # Copyright (C) 2001 Python Software Foundation # Barry Warsaw <barry@python.org>, 2000. # msgid "" msgstr "" "Project-Id-Version: 2.0\n" "PO-Revision-Date: 2003-04-11 12:42-0400\n" "Last-Translator: Barry A. WArsaw <barry@python.org>\n" "Language-Team: XX <python-dev@python.org>\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 7bit\n" "Generated-By: manually\n" #: nofile:0 msgid "ab\xc3\x9e" msgstr "\xc2\xa4yz" ''' # Here's the third example po file, used to generate MMO_DATA b''' msgid "" msgstr "" "Project-Id-Version: No Project 0.0\n" "POT-Creation-Date: Wed Dec 11 07:44:15 2002\n" "PO-Revision-Date: 2002-08-14 01:18:58+00:00\n" "Last-Translator: John Doe <jdoe@example.com>\n" "Jane Foobar <jfoobar@example.com>\n" "Language-Team: xx <xx@example.com>\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=iso-8859-15\n" "Content-Transfer-Encoding: quoted-printable\n" "Generated-By: pygettext.py 1.3\n" ''' # # messages.po, used for bug 17898 # b''' # test file for http://bugs.python.org/issue17898 msgid "" msgstr "" "Plural-Forms: nplurals=2; plural=(n != 1);\n" "#-#-#-#-# messages.po (EdX Studio) #-#-#-#-#\n" "Content-Type: text/plain; charset=UTF-8\n" '''
Favorite (2992) You need to log in to add favorites
Wilderness.org - grazinghttp://wilderness.org/tags/grazing enGrazing in Wildernesshttp://wilderness.org/resource/grazing-wilderness <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-publication-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2010-09-17T00:00:00-04:00">Friday, September 17, 2010</span></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p>The Wilderness Act of 1964 established grazing guidelines in wilderness areas. Wilderness designation allows for grazing in most designated areas, and motorized vehicles can be used for resource protection when deemed necessary. Many wilderness bills allow ranchers to relinquish their grazing rights in exchange for private compensation. Grazing in Wilderness is a useful hand-out that helps explain to a diverse audience grazing guidelines in wilderness areas.</p> </div></div></div><div class="field field-name-field-media field-type-file field-label-hidden"><div class="field-items"><div class="field-item even"><table class="sticky-enabled"> <thead><tr><th>Attachment</th><th>Size</th> </tr></thead> <tbody> <tr class="odd"><td><span class="file"><img class="file-icon" alt="" title="application/pdf" src="/modules/file/icons/application-pdf.png" /> <a href="http://wilderness.org/sites/default/files/Grazing-in-Wilderness.pdf" type="application/pdf; length=145689">Grazing-in-Wilderness.pdf</a></span></td><td>142.27 KB</td> </tr> </tbody> </table> </div></div></div>Fri, 17 Sep 2010 04:00:00 +0000Jacquelyn Kirkland1863 at http://wilderness.orghttp://wilderness.org/resource/grazing-wilderness#commentsIdaho Court Decision on BLM domestic sheep grazinghttp://wilderness.org/resource/idaho-court-decision-blm-domestic-sheep-grazing <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-publication-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2009-10-15T09:35:17-04:00">Thursday, October 15, 2009</span></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p>On&nbsp; October 14, 2009, Judge Lynn Winmill granted our motion to not allow grazing on one of the last remaining BLM domestic sheep grazing allotments in the Salmon River corridor due to domestic/bighorn sheep conflicts. The turnout date was supposed to be October 15, and this represents the first time the allotment has ever been closed since the 1930&rsquo;s. For the time being, this will effectively end all public lands domestic sheep grazing on public land in the main Salmon River corridor where the highest threat to bighorn sheep exists. We have been successful in closing grazing on adjacent Forest Service land, but had not, until now, been able to do so on BLM land. Although we typically do not venture into the grazing realm, this is part of our ongoing restoration efforts in the Hell&rsquo;s Canyon area.</p> </div></div></div><div class="field field-name-field-media field-type-file field-label-hidden"><div class="field-items"><div class="field-item even"><table class="sticky-enabled"> <thead><tr><th>Attachment</th><th>Size</th> </tr></thead> <tbody> <tr class="odd"><td><span class="file"><img class="file-icon" alt="" title="application/pdf" src="/modules/file/icons/application-pdf.png" /> <a href="http://wilderness.org/sites/default/files/legacy/Idaho-decision.pdf" type="application/pdf; length=53515">Idaho-decision.pdf</a></span></td><td>52.26 KB</td> </tr> </tbody> </table> </div></div></div>Thu, 15 Oct 2009 15:35:17 +0000102453 at http://wilderness.orghttp://wilderness.org/resource/idaho-court-decision-blm-domestic-sheep-grazing#commentsDust Storms Escalate, Prompting Environmental Fearshttp://wilderness.org/recent-coverage/dust-storms-escalate-prompting-environmental-fears <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-date-published field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2009-04-23T11:05:26-04:00">Apr 23, 2009</span></div></div></div><div class="field field-name-field-link field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="http://www.washingtonpost.com/wp-dyn/content/article/2009/04/22/AR2009042203685.html" target="_blank">Juliet Eilperin, Washington Post</a></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p>Excerpts:</p> <p>The scene Landry witnessed that day was the most severe example of a phenomenon that has overtaken parts of the West this year, one that could exacerbate a slew of environmental problems there in the years to come. The Colorado Rockies, including the headwaters of the Colorado River and the Rio Grande, have experienced 11 serious dust storms this year, a record for the six years researchers have been tracking them.</p> <p>More important, an increasing amount of airborne dust is blanketing the region, affecting how fast the snowpack melts, when local plants bloom and what quality of air residents are breathing.</p> <p>The dust storms are a harbinger of a broader phenomenon, researchers say, as global warming translates into less precipitation and a population boom intensifies the activities that are disturbing the dust in the first place. Jayne Belnap, a research ecologist at the U.S. Geological Survey who has studied the issue, predicts that by midcentury, the fragility of the region's soil &quot;will be equal to that of the Dust Bowl days.&quot;</p> <p>&hellip;Dust storms are not new in the West, but the fact that so much dust is on the move reflects that across vast areas, soil is being loosened by off-road vehicles, livestock grazing, and road development for oil and gas production, much of it on public land. A Washington Post analysis of federal data from areas managed by the Bureau of Land Management found that between 2004 and 2008, off-road vehicle use rose 19 percent, the number of oil and gas wells increased 24 percent and grazing acreage climbed 7 percent.</p> <p>&nbsp;</p> </div></div></div>Thu, 23 Apr 2009 21:05:26 +0000101861 at http://wilderness.orghttp://wilderness.org/recent-coverage/dust-storms-escalate-prompting-environmental-fears#commentsLand grab masked as a national security measure passes U.S. House of Representativeshttp://wilderness.org/press-release/land-grab-masked-national-security-measure-passes-us-house-representatives <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-release-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2012-06-19T01:00:00-04:00">Jun 19, 2012</span></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <h3> Anti-wilderness package also allows logging in California roadless areas, clear-cutting of old growth forests in Alaska and virtually rent-free grazing on public lands</h3> <p> Today the U.S. House of Representatives passed a package of anti-wilderness bills (H.R. 2578), including H.R. 1505, the &ldquo;<a href="http://wilderness.org/content/hr-1505-updated-april-2012" target="_blank">National Security and Federal Lands Protection Act</a>.&rdquo;&nbsp;</p> <p> H.R. 1505 would hand over &ldquo;operational control&rdquo; of federal public lands within 100 miles of the Canadian and Mexican borders to the U.S. border patrol, and could open national parks, wildlife refuges, wilderness and other public lands to development, such as construction and road building. Rep. Raul Grijalva&rsquo;s (D, AZ-7) amendment to strike H.R. 1505 from the package was unfortunately defeated. This package of bills now awaits movement in the Senate.</p> <p> Prior to the House vote, a coalition of Hispanic and immigration reform advocates, Native American tribal organizations, sportsmen, businesses and conservation groups, <a href="/sites/default/files/legacy/Coalition-Letter-HR1505.pdf" target="_blank">sent a letter</a> to members of Congress voicing their opposition and asking members to vote against the bill.</p> <p> &ldquo;H.R. 1505 is an overreach that would adversely affect everyone who enjoys America&rsquo;s public lands,&rdquo; said <a href="http://wilderness.org/about-us/experts/david-moulton" target="_blank">David Moulton, senior legislative director at The Wilderness Society</a>. &ldquo;The bill would allow road building, construction and development on lands that are loved for hunting, fishing, hiking and other recreational activities. This vote was not in the best interest of the people who enjoy the land for its natural beauty.&rdquo;</p> <p> H.R. 1505 is part of an anti-wilderness package that includes, among other destructive bills:</p> <p> &bull; <a href="http://wilderness.org/content/sealaska-bill-step-backward-southeast-alaska" target="_blank">The Sealaska bill</a> would give away tens of thousands of acres of high-value public land from the Tongass National Forest to the Sealaska Corporation. This would allow the corporation to clear-cut valuable forest land and take ownership of the best recreation sites at the heads of bays or mouths of salmon streams. This land giveaway would effectively prevent a long-planned transition out of old growth logging on the national forest, and privatize prime recreation spots that are currently open to the American public for fishing, hunting, and recreation and are relied upon by many small tourism, outfitter and fisheries businesses.</p> <p> &bull; Title XI, the &ldquo;<a href="http://www.govtrack.us/congress/bills/112/hr4234" target="_blank">Grazing Improvement Act</a>,&rdquo; is a virtual giveaway of over 247 million acres of Bureau of Land Management (BLM) and National Forest rangelands to the approximately 27,000 livestock producers who have grazing privileges on the lands managed by these two agencies. The bill would change the term of federal livestock grazing leases from the current ten years to 20 years.&nbsp; No other government entity in the U.S. issues 20-year livestock grazing permits.&nbsp;&nbsp; In addition, Title XI reduces the level of environmental scrutiny of livestock grazing practices on BLM and National Forest lands by allowing these agencies to exempt the issuance of grazing permits from National Environmental Policy Act review.</p> <p> &bull; <a href="http://www.sierraforestlegacy.org/FC_ProjectsPlans/PR_QLG.php" target="_blank">The Quincy Library Group bill</a> would take an unsuccessful and outmoded forest management pilot program and expand it across much of northern California, while simultaneously authorizing logging in roadless areas, spotted owl habitat, salmon habitat and other areas of critical environmental importance and mandating minimum annual timber cuts.&nbsp;</p> <p> <a href="http://www.micevhill.com/attachments/immigration_documents/hosted_documents/112th_congress/TranscriptOfSenateAppropriationsHearingOnFY13DHSAppropriations.pdf" target="_blank">Opposed by the Department of Homeland Security (DHS)</a>, H.R. 1505 could endanger personal freedoms by closing without notice our lands to hunting, fishing, tourism and recreation, all multi-million dollar industries that support small businesses.&nbsp; DHS Secretary Napolitano testified before Congress in opposition to H.R. 1505, saying it &quot;is unnecessary, and it&rsquo;s bad policy.&quot; DHS benefits from their close collaboration with law enforcement counterparts in the land management agencies. In addition to threatening lands, the bill threatens this collaboration.</p> <p> H.R. 1505 is an extreme and radical measure that would put at risk 49 million acres of public lands in 17 states, sweeping away 16 bedrock environmental and land management laws in Joshua Tree National Park, Boundary Waters Canoe Area Wilderness, Acadia National Park and any other protected land that sits within 100 miles of the border.</p> <p> The Wilderness Society recently updated the report, &ldquo;<a href="http://wilderness.org/content/wilderness-under-siege-act-now-stop-attacks" target="_blank">Wilderness Under Siege</a>,&rdquo; to reflect the movement of these and other bills and what they would mean to America&rsquo;s lands, waters and natural legacy. Also mentioned in the report is <a href="http://wilderness.org/content/motorize-wilderness-act" target="_blank">H.R. 4089</a> -- a Trojan horse bill that includes a sneak attack on wilderness. H.R. 4089 <a href="http://wilderness.org/content/trojan-horse-passes-house" target="_blank">recently passed the House</a>, and awaits passage in the Senate.&nbsp;</p> <p> The bills profiled in &ldquo;Wilderness Under Siege&rdquo; are out of touch with the American people&rsquo;s conservation values.</p> <p> To view Wilderness Under Siege, please visit: <a href="http://wilderness.org/content/wilderness-under-siege-act-now-stop-attacks-updated-april-2012" target="_blank">http://wilderness.org/content/wilderness-under-siege-act-now-stop-attacks-updated-april-2012</a></p> </div></div></div>Tue, 19 Jun 2012 22:02:15 +0000106869 at http://wilderness.orghttp://wilderness.org/press-release/land-grab-masked-national-security-measure-passes-us-house-representatives#commentsSouth Dakota Leaders Highlight Opportunities Presented by America’s Great Outdoors Initiativehttp://wilderness.org/press-release/south-dakota-leaders-highlight-opportunities-presented-america%E2%80%99s-great-outdoors <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-release-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2010-09-01T01:00:00-04:00">Sep 1, 2010</span></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p><strong>(Pierre &ndash; September 1, 2010)</strong> The Obama administration&rsquo;s America&rsquo;s Great Outdoors initiative came to South Dakota today in an effort to develop a conservation agenda for the 21st century. Conservation leaders from across South Dakota attended the listening session to contribute their ideas to help shape the initiative aimed at getting kids outside and safeguarding our natural heritage.</p> <p>Earlier this year, Senator Johnson introduced the Tony Dean Cheyenne River Valley Conservation Act, a bill to protect 48,000 acres of land in the Buffalo Gap National Grassland as wilderness. This historic legislation will establish the very first national grasslands wilderness in the nation, and is supported by business owners, teachers, hunters, veterans, conservationists, and outdoor recreationists. Under wilderness designation, established grazing has the highest level of protection of any public land management status, ensuring ranchers&rsquo; continued way of life.</p> <p><em>&ldquo;We need to cultivate a new generation of public land stewards if we want to ensure that our open spaces stay as they are. Wilderness areas are a vital part of our natural heritage, and if young people don&rsquo;t have the opportunity to experience this gift, they won&rsquo;t value it,&rdquo; said <a href="http://www.sdwildgrassland.org/" target="_blank">Cheryl Warren with the South Dakota Wild Grassland Coalition</a>. &ldquo;The administration&rsquo;s initiative has helped raise the profile of this important legacy, and I hope will mobilize more folks to join the effort to permanently protect this shared land.&rdquo;<br /></em><br /><em>&ldquo;Our as-yet undeveloped prairie grasslands are one of the very best places to enjoy the hunting experience,&rdquo; said <a href="http://www.sdwf.org/" target="_blank">Chris Hesla, executive director of the South Dakota Wildlife Federation</a>. &ldquo;America&rsquo;s Great Outdoors initiative recognizes the importance of conserving some of these special wild places so our children and theirs can get out and take part in this tradition. That&rsquo;s why the South Dakota Wildlife Federation supports legislation to protect a part of our grasslands as wilderness.&rdquo;</em></p> <p>Currently there are over 650 private landowners who&rsquo;ve indicated interest in protecting nearly 300,000 acres of native grasslands and wetlands through the Fish and Wildlife Service&rsquo;s grassland easement program, with the only limitation being additional funding needed to meet this demand.</p> <p><em>&ldquo;Ducks Unlimited is hopeful that the administration will recognize the exceptional opportunity that exists to perpetually protect native prairie in the Dakota&rsquo;s for migratory birds, ranchers and future generations,&rdquo; said <a href="http://www.ducks.org/" target="_blank">Scott Stephens, director of conservation planning for Ducks Unlimited</a>.</em></p> <p>Climate change is the most serious threat our natural heritage has ever faced. Its effects are already being felt on even our most pristine landscapes. Land protection will provide resilient wildlife habitat as an adaptive measure to climate change. </p> <p><em>&ldquo;Protecting South Dakota&rsquo;s prairie grasslands from the effects of climate change will ensure that our cultural and natural heritage gets passed down to future generations,&rdquo; said <a href="http://southdakota.sierraclub.org/" target="_blank">Jim Margadant, regional conservation organizer for the South Dakota Chapter of the Sierra Club</a>. </em><br />&nbsp;</p> </div></div></div>Wed, 01 Sep 2010 04:00:00 +0000103509 at http://wilderness.orghttp://wilderness.org/press-release/south-dakota-leaders-highlight-opportunities-presented-america%E2%80%99s-great-outdoors#commentsJudge Grants Motion to Restrict Grazing That Puts Bighorn Sheep at Riskhttp://wilderness.org/press-release/judge-grants-motion-restrict-grazing-puts-bighorn-sheep-risk <div class="field-group-format group_meta field-group-div group-meta speed-fast effect-none"><div class="field field-name-field-release-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2009-10-15T01:00:00-04:00">Oct 15, 2009</span></div></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p><strong>BOISE</strong> - One of the last remaining Bureau of Land Management (BLM) sheep grazing allotments in the Salmon River corridor was halted yesterday when U.S. District Court Judge Lynn Winmill granted a motion to restrict grazing that puts Bighorn Sheep at risk. The Wilderness Society and our legal partners at The Western Watershed Project and the Hell&rsquo;s Canyon Preservation Council filed the motion in hopes of ending domestic sheep grazing on Partridge Creek Allotment where one of the highest threat to bighorn sheep exists. This ruling will effectively end public lands grazing in one of the areas of most concern for bighorn populations.</p> <p>In recent year, TWS and our partners won successful suits on adjacent Forest Service land to halt domestic sheep grazing because of the conflict between domestic and bighorn sheep. Despite dramatic population declines to Idaho&rsquo;s remaining wild sheep populations, what were once the most prevalent big game species in the state, the BLM has refused to take corrective action to prevent extirpation of bighorns. For the first time since the 1930&rsquo;s, domestic sheep will not graze on the Partridge Creek Allotment.</p> <p>Judge Winmill&rsquo;s order will be in place until at least Nov. 2, when he plans another hearing.</p> <p><a href="idaho-court-decision-blm-domestic-sheep-grazing">View the judge&rsquo;s order.</a></p> <hr /> <h3>Statement of Brad Brooks, Regional Conservation Associate in Boise, Idaho</h3> <p>&ldquo;This ruling represents an affirmation that wild sheep should not be sacrificed for the benefit of a few individuals,&rdquo; said Brooks. &ldquo;The judge&rsquo;s ruling makes it clear that nobody should be allowed to exploit public resources for their own self interest at the expense of the public.</p> <p>The entire population of bighorn sheep was at risk here. The 2009 Idaho Legislature attempted to take action to prevent further harm to the bighorn, but legislation simply wasn&rsquo;t strong enough to prevent agreements that still put the population in danger.</p> <p>All Idahoans, from hunters to hikers to wildlife watchers, value bighorn sheep, and this ruling truly is a victory for the public.&rdquo;</p> </div></div></div>Thu, 15 Oct 2009 17:25:58 +0000102454 at http://wilderness.orghttp://wilderness.org/press-release/judge-grants-motion-restrict-grazing-puts-bighorn-sheep-risk#comments
INTRODUCTION ============ Immunization has reduced human health-related costs by helping to eliminate infectious diseases.[@B1] Currently, as the importance of basic immunization has been recognized broadly, the rate of immunization has increased over time. As shown in a study by Kim and Shin[@B2] and a survey against some elementary school students by Kim,[@B3] it was found that the regular immunization rate of young children was at least 97% and 90%, respectively. However, in spite of this improvement in immunization rates, development of new and recurrent infectious diseases has caused major health problems recently, increasing demand for effective immunization measures. Effective immunization depends on improvement of timely vaccination rates and additional immunization rates of additional immunization-requiring vaccines. Factors influencing timely immunization rates include place of immunization, retention of immunization handbook, and parents\' recognition of the importance of immunization.[@B4] It was suggested of immunization rates in Gyeongsangnam-do in 2003 that while the basic immunization rate was maintained in the range of 60% to 80%, additional immunization rates were remarkably lower than the basic immunization rate.[@B5] Therefore, the low additional immunization rate was considered as one of the important factors in lowering the effect of immunization. In a domestic study that examined correlation between additional immunization and retention of the mother and child health handbook in women whose children were between 4 and 6 years old and located in 6 provinces of Gyeongsangnam-do, it was found that the whole retention rate of the mother and child health handbook was 76.7% and that the mother and child health handbook retention group had statistically significantly higher recognition and rate of additional immunization compared with their counterpart.[@B6] The purpose in this study was to investigate retention of the mother and child health handbook and to determine correlation between retention of the mother and child health handbook and additional Japanese encephalitis and tetanus immunizations to be conducted in 11 to 12 years old. METHODS ======= 1. Study Subject ---------------- This survey was conducted through a questionnaire of 350 parents whose children were in the 1st, 2nd, and 3rd grade of two middle schools located in Gwangmyeong-si, Gyeonggi-do, and 6th grade of two elementary schools located in Seoul. 2. Study Method --------------- The questionnaires were transmitted to the parents and schools via post mail and each school collected the answered questionnaires. The questions was composed of a total of 14 questions, including socio-demographic features of the subjects and their children (grade, sex, age, education, and income), retention of the mother and child health handbook, issuing medical institute, medical institute conducting the immunization, recognition of additional Japanese encephalitis and tetanus vaccination, and execution of additional vaccinations. 3. Data Analysis ---------------- For socio-demographic features of the subjects and their children, retention of the mother and child health handbook of total subjects and by their children\'s grade, and medical institute executing vaccination, frequency was investigated and for correlation between retention of the handbook and additional Japanese encephalitis and tetanus vaccination, cross analysis was performed. Moreover, in order to identify correlation between retention of the mother and child health handbook and recognition of necessity of additional Japanese encephalitis and tetanus vaccination and its execution, multiple logistic regression analysis was conducted. Statistical significance was fixed as P \< 0.05 and all statistical analysis was performed, using SPSS ver. 12.0 (SPSS Inc., Chicago, IL, USA) program in Korean. RESULTS ======= 1. General Features of Subjects and Their Children -------------------------------------------------- Response rate of the questionnaire was 74.6% (350 copies were sent and 261 copies were collected) and among the collected questionnaire, analysis was performed finally on 214 subjects, excluding those who did not answer the questions among the collected questionnaire. Sixty-six in 6th grade of elementary school (30.8%), 79 in 1st grade of middle school (36.9%), 17 in 2nd grade of middle school (7.9%), and 52 subjects in 3rd grade (24.3%) were included in the final analysis, and among them, girl students accounted for 54.7%, or 117 students. It was found that personal obstetrics and gynecology clinic were the most common institute issuing the mother and child health handbook (39.3%). Of the responders, 62.6% received vaccination from one medical institute, and 37.4% from multiple institutes. Among them, personal pediatrics clinics (58.9%) and public health centers (54.7%) accounted for the most part. The mother and child health handbook was reported to be the most common method for obtaining vaccination information (88 cases, 41.1%) ([Table 1](#T1){ref-type="table"}). 2. Retention Rate of the Mother and Child Health Handbook --------------------------------------------------------- The number of parents who retained the handbooks was found to be 173 (80.8%), while 41 (19.2%) did not ([Table 2](#T2){ref-type="table"}). It was shown that the retention rate by grades of the handbook was 56 subjects (84.8%) in 6th grade, 60 in 1st grade (75.9%), 15 in 2nd grade of middle school (88.2%), and 42 in 3rd grade of middle school (80.8%). 3. Retention of the Mother and Child Health Handbook and Recognition of the Need of Additional Japanese Encephalitis and Tetanus Immunization --------------------------------------------------------------------------------------------------------------------------------------------- It was found that the total recognition rate of additional Japanese encephalitis immunization was 77.1%, and while the recognition rate of subjects with the mother and child health handbook was 83.2%, the recognition rate of the counterpart was 51.2%. On the other hand, it was found that the total recognition rate of additional tetanus immunization was 59.8%, and while the recognition rate of subjects with the handbook was 66.5%, the recognition rate of the counterpart was 31.7%. It was shown that the recognition rate of subjects who retained the mother and child health handbook was higher than that of the counterpart. It was significant statistically (P \< 0.001) ([Table 3](#T3){ref-type="table"}), and it was also true even after calibrating household income and level of education (P \< 0.001). 4. Retention of the Mother and Child Health Handbook and Additional Japanese Encephalitis and Tetanus Immunization ------------------------------------------------------------------------------------------------------------------ It was found that the additional tetanus immunization rate of students who were 11 to 16 years old was 42.5% and the group with the mother and child health handbook had higher immunization rate (48.6% vs. 17.1%, P = 0.001). It was also shown that there was a significant difference even after calibrating for economic level and education level (P = 0.001). On the other hand, it was found that the immunization rate of additional Japanese encephalitis vaccine was 55.1% and the immunization rate of subjects who retained their handbook was somewhat higher. However this difference was not statistically significant (57.8% vs. 43.9%, P = 0.231) ([Table 4](#T4){ref-type="table"}). 5. Recognition of the Need of Additional Japanese Encephalitis and Tetanus Immunization --------------------------------------------------------------------------------------- It was found that the subjects who recognized the need of additional immunization of the Japanese encephalitis (67.3% vs. 14.3%) and tetanus vaccines (65.6% vs. 8.1%) had higher additional immunization rates for each vaccine and the data were statistically significant (P \< 0.001) ([Table 5](#T5){ref-type="table"}). DISCUSSION ========== The Korean Pediatrics Society and the Ministry for Health and Welfare provide immunization guide including age, number of inoculation, additional vaccination interval, and dosage as important factors in conducting vaccination.[@B7] National immunization programs, which were essential and be recommended to all babies and young children, include basic and additional immunization. Basic immunization of Japanese encephalitis is to be conducted as a primary and secondary vaccination with 1 to 2 week intervals in 12 to 23 months after birth and tertiary vaccination after 1 year, and the additional immunization is to be conducted as the 4th immunization at the age of 6 and the 5th immunization at the age of 12. For diphtheria-pertussis-tetanus (DPT) vaccination, basic inoculations should be performed in 2, 4, and 6 months after birth and additional immunization should be conducted at the age of 4 to 6 and then the last immunization at the age of 11 to 12. Currently, studies on additional immunization rates are insufficient other than the study on additional DPT immunization by Jeong In-Sook.[@B6] Although we have the vaccination record system in the public health office, it is impossible to get the exact vaccination rates due to a low report rate of clinics and hospitals. According to \'Immunization Rate of Korean Young Child below 6\' published in the autumn symposium of the Korean Pediatrics Society 2007 by a joint study between the department of preventive medicine, Korea University, and the department of pediatrics of Ewha Womans University and Seoul National University, it was found in a study of 1,500 parents living in 15 provinces in Korea whose children were 12 months to 6 years old that the basic immunization rate of bacillus Calmette-Guerin (BCG), type B hepatitis, diphtheria-tetanus-acellular pertussis (DTaP), polio, and measles-mumps-rubella (MMR) was at least 80%, but the additional immunization rate was lower, at 22.5% to 50%. It was shown that the basic immunization rate was 49%, but the additional immunization rate for children ages 6 to 7 was only 23.9%. In this study, a similar immunization rate was obtained as 55.1% for additional Japanese encephalitis immunization and 42.5% for additional tetanus immunization. In this study, it was concluded that the subjects retaining the mother and child health handbook recognized the need of additional Japanese encephalitis and tetanus immunization better and these results were consistent in both elementary and middle school students. It seems this occurred because a schedule for additional immunization was described in the handbook. However, the group retaining the handbook had a significantly higher additional immunization rate of the tetanus vaccine than the group that did not, the immunization rate of the Japanese encephalitis vaccine did not show a significant difference. For Japanese encephalitis, there was a possibility that due to lowering importance of Japanese encephalitis vaccination from gradually decreasing development of Japanese encephalitis, there was no difference in its additional immunization. For tetanus, it was considered that higher immunization was obtained from recent public relation of additional immunization. According to a study reported in 1991,[@B8] it was found that while the retention rate of mother and child health handbook was 42.8%, as the retention rate in this study was 80.8%. Therefore, it was assumed that parent\'s recognition on immunization was changed from the past. However, in the study on additional DPT immunization rate[@B6] there was dramatic reduction in retention rate of mother and child health handbook from 95.9% of subjects whose children were below 4 to 70.4% of subjects whose children were above 4, high retention rate was sustained. It might be inferred that mother and child health handbook retention rate is lower among subjects who did not answer the questionnaire. In this study, it was suggested that the mother and child health handbook played a major role as a route to obtain immunization information. In Korea, the mother and child health handbook have been used partially since the 1960\'s and the government issued it for broad use in Korea since July, 1987. As the mother and child health handbook was used mainly in the public health office and different immunization handbooks were used by hospitals and clinics, using the unified form of immunization handbook and extending compulsory vaccination report system might ease to get more accurate rate of vaccination. In additional, as the immunization handbook provides highly restrictive information, it is required that all physicians should provide more immunization information than now.[@B9] First, it was considered a limitation of this study that its data was based on analysis of a questionnaire prepared on the basis of parents\' memory other than data through medical institutes or public medical offices, so it was impossible to reflect an accurate additional immunization rate. Second, immunization of live vaccine of Japanese encephalitis was excluded without separate mention. The live vaccine of Japanese encephalitis, of which the immunization schedule is simple and will be finished with the 3rd basic immunization at the age of 6, has the advantage that lethal adverse effects on the neuronal system has not been reported. However, the live vaccine immunization was introduced in 2002, so its immunization history is short, and its cost is relatively high. Live vaccine of Japanese encephalitis is not mandatory. Thus, under the assumption that its immunization rate may be lower than the dead vaccine\'s, it is excluded because it may cause confusion to the parents. However, this exclusion may influence the results. Third, as additional immunization of the Japanese encephalitis vaccine is to be conducted at the age of 12, and immunization of the tetanus vaccine is to be conducted at the age of 11 to 12 and the age range of subjects participating in this study is from 11 to 16, some of the unimmunized group may have received additional immunization in the future and it may alter the results. Fourth, direct collection of the mother and child health handbook was not undertaken to confirm the accurate retention rate of the handbook. This was because it might cause a risk of loss, its collection rate might be lower than actual retention, and record of additional immunization was likely to be omitted in spite of actual immunization. As results of the above study, it was identified that retention of the mother and child health handbook was related to additional tetanus immunization with recognition of additional immunization of Japanese encephalitis and tetanus vaccine. Additional studies, which aforementioned limitations be complemented are required to improve the additional vaccination rate and national vaccination program. No potential conflict of interest relevant to this article was reported. ###### Baseline characteristics of study subjects (n = 214). ![](kjfm-33-237-i001) ###### Rate of keeping of the maternal-child health handbook. ![](kjfm-33-237-i002) ###### Awareness about additional immunization against Japanese encephalitis and tetanus through reference to the maternal-child health handbook. ![](kjfm-33-237-i003) Values are presented as number (%). ^\*^Analysis by Pearson chi-square test. ###### Additional immunization against Japanese encephalitis and tetanus through reference to the maternal-child health handbook. ![](kjfm-33-237-i004) Values are presented as number (%). ^\*^Analysis by Pearson chi-square test. ###### Additional immunization against Japanese encephalitis and tetanus as a result of the awareness about additional immunization. ![](kjfm-33-237-i005) Values are presented as number (%). ^\*^Analysis by Pearson chi-square test.
Dr Bumbum: Brazil cosmetic surgeon on run after patient dies Published duration 18 July 2018 image copyright Facebook image caption Dr Denis Furtado has nearly 650,000 followers on Instagram A celebrity Brazilian cosmetic surgeon known as Dr Bumbum has gone on the run after a woman died following injections he gave her to enlarge her buttocks. Investigators say Dr Denis Furtado carried out the procedure on Lilian Calixto at his home in Rio de Janeiro but she fell ill during the procedure. Dr Furtado took her to a hospital where her condition worsened and she died some hours later, police said. He then disappeared and a judge has issued a warrant for his arrest. Dr Furtado, 45, has appeared on Brazilian television and has nearly 650,000 followers on his Instagram account. Ms Calixto, a 46-year-old married mother of two who worked in banking, had travelled from her home in Cuiabá, central Brazil, to undergo buttock enhancement by Dr Furtado on Saturday evening, reports said. The procedure, believed to involve the injection of acrylic glass filler, took place at his apartment in the upmarket district of Barra de Tijuca. image copyright Facebook image caption Lilian Calixto went to Dr Furtado's apartment for the procedure to enhance her buttocks The Hospital Barra D'Or in Rio de Janeiro said that, despite efforts to save her, Ms Calixto was "unresponsive to manoeuvres" and died early on Sunday morning. The exact reason for her death has not been confirmed. Police said Dr Furtado's girlfriend has been arrested on suspicion of taking part in the procedure. The Regional Medical Council of the State of Rio de Janeiro (Cremerj) said it had opened an investigation into Ms Calixto's death. Niveo Steffen, president of the Brazilian Plastic Surgery Society, said there was a "growing invasion of non-specialists" in the industry. "You cannot perform plastic surgery inside an apartment," he told AFP news agency. "Many people are selling a dream, a fantasy to patients in an unethical way and people, weakened, are often attracted to low prices, without considering whether or not the conditions are adequate." Dr Furtado has built up a large online following through various social media accounts. Aside from his popular Instagram page, he is also very active on Facebook - filling his page with before-and-after shots of buttocks procedures - and on YouTube, where he presents advice on everything from endometriosis to low-carb diets. In one social media post, he said he was given the name Dr Bumbum by his clients and had embraced it as a term of affection. He signed off from many of his posts with the nickname, and ran a series of segments on Facebook called "Dr Bumbum teaches…"
Eating Babies By Chana Bloch About this Poet Chana Bloch was the author of four books of poems: The Secrets of the Tribe, The Past Keeps Changing, Mrs. Dumpty, and Blood Honey. She is co-translator of the biblical Song of Songs as well as contemporary Israeli poetry—most recently The Selected Poetryof Yehuda Amichai...
Q: Why am I getting strange tea cups icons in my inbox list view in Thunderbird? I get strange tea cups in my inbox in Thunderbird. Can anybody please explain me what this is? Google is not useful for this question. Thank you. A: Those arent tea cups! Zoom in and you will see they are eyes. I think a zoom or font setting in Thunderbird is cutting them off a little. The eyes symbolize "watch this thread" and are set/unset by hitting the W key.
# -*- coding: utf-8 -*- # # CDR-Stats documentation build configuration file, created by # sphinx-quickstart on Fri Jun 24 19:43:02 2011. # # This file is execfile()d with the current directory set to its containing dir. # # Note that not all possible configuration values are present in this # autogenerated file. # # All configuration values have a default; values that are commented out # serve to show the default. import sys import os sys.path.insert(0, os.path.abspath('../../')) sys.path.insert(1, os.path.abspath('../../cdr_stats')) # sys.path.insert(2, os.path.abspath('../../cdr_stats/cdr_stats')) from cdr_stats import cdr_stats os.environ['DJANGO_SETTINGS_MODULE'] = 'cdr_stats.cdr_stats.settings' # If extensions (or modules to document with autodoc) are in another directory, # add these directories to sys.path here. If the directory is relative to the # documentation root, use os.path.abspath to make it absolute, like shown here. # sys.path.insert(0, os.path.abspath('.')) # -- General configuration ----------------------------------------------------- # If your documentation needs a minimal Sphinx version, state it here. # needs_sphinx = '1.0' # Add any Sphinx extension module names here, as strings. They can be extensions # coming with Sphinx (named 'sphinx.ext.*') or your custom ones. extensions = [ 'sphinx.ext.autodoc', 'sphinx.ext.intersphinx', ] # extensions = ['sphinx.ext.autodoc', 'rst2pdf.pdfbuilder', 'sphinx.ext.coverage'] # Add any paths that contain templates here, relative to this directory. templates_path = ['_templates'] # The suffix of source filenames. source_suffix = '.rst' # The encoding of source files. # source_encoding = 'utf-8-sig' # The master toctree document. master_doc = 'index' # General information about the project. project = u'CDR-Stats' copyright = u'2011-2015, Arezqui Belaid <info@star2billing.com>' # The version info for the project you're documenting, acts as replacement for # |version| and |release|, also used in various other places throughout the # built documents. # # The short X.Y version. version = ".".join(cdr_stats.__version__.split('.')[0:2]) # The full version, including alpha/beta/rc tags. release = cdr_stats.__version__ # The language for content autogenerated by Sphinx. Refer to documentation # for a list of supported languages. # language = None # There are two options for replacing |today|: either, you set today to some # non-false value, then it is used: # today = '' # Else, today_fmt is used as the format for a strftime call. # today_fmt = '%B %d, %Y' # List of patterns, relative to source directory, that match files and # directories to ignore when looking for source files. exclude_patterns = ['_build'] # The reST default role (used for this markup: `text`) to use for all documents. # default_role = None # If true, '()' will be appended to :func: etc. cross-reference text. # add_function_parentheses = True # If true, the current module name will be prepended to all description # unit titles (such as .. function::). # add_module_names = True # If true, sectionauthor and moduleauthor directives will be shown in the # output. They are ignored by default. # show_authors = False # The name of the Pygments (syntax highlighting) style to use. pygments_style = 'sphinx' # A list of ignored prefixes for module index sorting. # modindex_common_prefix = [] # -- Options for HTML output --------------------------------------------------- # The theme to use for HTML and HTML Help pages. See the documentation for # a list of builtin themes. html_theme = 'default' # Theme options are theme-specific and customize the look and feel of a theme # further. For a list of options available for each theme, see the # documentation. # html_theme_options = {} # Add any paths that contain custom themes here, relative to this directory. # html_theme_path = [] # The name for this set of Sphinx documents. If None, it defaults to # "<project> v<release> documentation". # html_title = None # A shorter title for the navigation bar. Default is the same as html_title. # html_short_title = None # The name of an image file (relative to this directory) to place at the top # of the sidebar. # html_logo = None # The name of an image file (within the static path) to use as favicon of the # docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 # pixels large. # html_favicon = None # Add any paths that contain custom static files (such as style sheets) here, # relative to this directory. They are copied after the builtin static files, # so a file named "default.css" will overwrite the builtin "default.css". html_static_path = ['_static'] # If not '', a 'Last updated on:' timestamp is inserted at every page bottom, # using the given strftime format. # html_last_updated_fmt = '%b %d, %Y' # If true, SmartyPants will be used to convert quotes and dashes to # typographically correct entities. # html_use_smartypants = True # Custom sidebar templates, maps document names to template names. # html_sidebars = {} # Additional templates that should be rendered to pages, maps page names to # template names. # html_additional_pages = {} # If false, no module index is generated. # html_domain_indices = True # If false, no index is generated. # html_use_index = True # If true, the index is split into individual pages for each letter. # html_split_index = False # If true, links to the reST sources are added to the pages. html_show_sourcelink = False # If true, "Created using Sphinx" is shown in the HTML footer. Default is True. html_show_sphinx = False # If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. # html_show_copyright = True # If true, an OpenSearch description file will be output, and all pages will # contain a <link> tag referring to it. The value of this option must be the # base URL from which the finished HTML is served. # html_use_opensearch = '' # This is the file name suffix for HTML files (e.g. ".xhtml"). # html_file_suffix = None # Output file base name for HTML help builder. htmlhelp_basename = 'cdr-stats-doc' # -- Options for LaTeX output -------------------------------------------------- # The paper size ('letter' or 'a4'). # latex_paper_size = 'letter' # The font size ('10pt', '11pt' or '12pt'). # latex_font_size = '10pt' # Grouping the document tree into LaTeX files. List of tuples # (source start file, target name, title, author, documentclass [howto/manual]). latex_documents = [ ('index', 'cdr-stats.tex', u'CDR-Stats Documentation', u'Arezqui Belaid', 'manual'), ] # The name of an image file (relative to this directory) to place at the top of # the title page. # latex_logo = None # For "manual" documents, if this is true, then toplevel headings are parts, # not chapters. # latex_use_parts = False # If true, show page references after internal links. # latex_show_pagerefs = False # If true, show URL addresses after external links. # latex_show_urls = False # Additional stuff for the LaTeX preamble. # latex_preamble = '' # Documents to append as an appendix to all manuals. # latex_appendices = [] # If false, no module index is generated. # latex_domain_indices = True # -- Options for manual page output -------------------------------------------- # One entry per manual page. List of tuples # (source start file, name, description, authors, manual section). man_pages = [ ('index', 'cdr-stats', u'CDR-Stats Documentation', [u'Arezqui Belaid'], 1) ] html_theme = "cdr-stats" html_theme_path = ["_theme"] html_sidebars = { 'index': ['sidebarintro.html', 'sourcelink.html', 'searchbox.html'], '**': ['sidebarlogo.html', 'relations.html', 'sourcelink.html', 'searchbox.html'], }
Introduction ============ Affecting \>2.1 million females each year, breast cancer is the primary cause of cancer-associated mortality among females and remains an increasing health threat in developed and developing countries. Despite of this serious situation, the overall survival rate has significantly increased due to screening programs and improved treatment. Various screening and follow-up examinations, including annual mammograms, ultrasounds, computed tomography and magnetic resonance imaging (MRI) scans, are recommended by various guidelines ([@b1-ol-0-0-10651]). Among them, MRI has demonstrated a relatively increased sensitivity ([@b2-ol-0-0-10651]) in breast cancer detection compared with mammograms and ultrasounds, which have reported overall sensitivities of 30--60 and 40--80%, respectively ([@b3-ol-0-0-10651]). In addition, considering the factors of radiation safety and image quality, MRI has its own unique advantages compared with mammography. However, conventional MRI technologies also have limitations, including relatively low specificity ([@b2-ol-0-0-10651]), which may lead to difficulties in distinguishing malignant tumors from benign ones, and are therefore unable to determine overall prognosis; as a result, a proportion of patients undergo unnecessary biopsies. In comparison, diffusion-weighted imaging (DWI) and its derived measurements, including the apparent diffusion coefficient (ADC), allow for improved characterization of the biological properties of tissues, and this technique has therefore been recognized for its superior oncology applications. Different from conventional dynamic contrast-enhanced (DCE) MRI, DWI requires no administration of contrast agents and quantifies tissue cellularity by measuring the Brownian motion of water molecules ([@b4-ol-0-0-10651]). Previous studies have repeatedly demonstrated decreased water diffusion, which appears brighter on DWI ([@b5-ol-0-0-10651],[@b6-ol-0-0-10651]) and darker on ADC maps, and higher cellularity in malignant breast lesions compared with normal fibroglandular tissue. ADC has also been widely used to distinguish malignant breast cancer from benign lesions. Min *et al* ([@b7-ol-0-0-10651]) revealed that benign lesions exhibited an increased mean ADC value compared with their malignant counterparts regardless of b-values. They also demonstrated that DWI achieved a sensitivity of 82.8% and specificity of 90%, with a cutoff ADC value of 1.23×10^−3^ mm^2^/sec. With a promising differential diagnostic value in clinical practice, DWI and ADC are now integrated into routine MRI breast examination protocols, primarily to distinguish between benign and malignant lesions ([@b8-ol-0-0-10651],[@b9-ol-0-0-10651]). However, only a limited number of studies have examined the association between ADC and clinical prognostic factors. Traditional prognostic factors for breast cancer include histology, staging (size and axillary node involvement), tumor grading, heredity, obesity, smoking and molecular markers ([@b10-ol-0-0-10651]). Among them, molecular markers including estrogen receptor (ER), progesterone receptor (PR) and human epidermal growth factor 2 receptor (HER-2) status are currently widely used as indicators to guide adjuvant therapy and predict long-term outcomes ([@b11-ol-0-0-10651]). As MRI examinations are less expensive and more available in developing countries compared with Oncotype DX, the development of MRI-derived biomarkers for breast cancer has been a focus of numerous studies. Although the potential of ADC in assessing malignancy of breast lesions was demonstrated by previous studies ([@b6-ol-0-0-10651],[@b12-ol-0-0-10651],[@b13-ol-0-0-10651]) and the ADC exhibited a correlation with certain prognostic factors, these results have not been verified in large Chinese populations. Therefore, considering the fact that pre-operative evaluation of the extent and prognosis of breast cancer is critical to clinical practice, its optimization may consequently improve the overall survival rate and outcomes of patients with breast cancer. The aims of the present study were as follows: i) Investigate the diagnostic performance of DWI-derived ADC values in differentiating malignant tumors from benign ones; and ii) examine the correlation between ADC values and various prognostic factors in females with breast cancer. Materials and methods ===================== ### Study cohort The present cross-sectional study was performed at the Department of Radiology of the Women\'s Hospital, School of Medicine, Zhejiang University (Hangzhou, China) from November 2015 to September 2018. DWI was included in the clinical breast MRI protocol for females with suspicious breast lesions detected by mammogram and/or sonography. The study protocol was approved by the Institutional Review Board and Ethics Committee of Women\'s Hospital, School of Medicine, Zhejiang University. Written informed consent was obtained from all the subjects prior to the study. The present study retrospectively assessed 762 female patients with breast masses who had undergone DWI prior to histopathological diagnosis from specimens obtained via core needle biopsy or excision surgery. Patients with inflammatory cancer or those receiving ongoing chemotherapy, and those without histopathological confirmation of the lesion, were excluded. Patients with tumorous lesions \>10 mm in diameter were excluded to avoid unreliable delineation of the tumor on MRI. Based on these criteria, 223 patients were excluded and 539 patients were eventually included in the present study. ### Histological analysis Histological analysis was performed on tissues obtained by core needle biopsy and excision surgery. Histological grading of breast lesions was performed considering three morphological features: Tubule formation, nuclear pleomorphism and the number of mitotic figures, according to the criteria of Elston and Ellis ([@b14-ol-0-0-10651]). The total possible score ranged from 3--9, with a total score of 3--5 representing grade 1, a total score of 6 or 7 resembling grade 2 and a total score of 8 or 9 resembling grade 3. The nuclear grade (1, differentiated; 2, moderately differentiated; and 3, poorly differentiated) was determined from 10% formalin-fixed paraffin-embedded tumor tissue sections stained with hematoxylin and eosin based on Robinson\'s grading system ([@b15-ol-0-0-10651]). Immunohistochemistry (IHC) was performed on tissues fixed with 10% neutral buffered formalin at room temperature for 18 h. Paraffin-embedded materials were cut to 5-µm sections ([@b16-ol-0-0-10651],[@b17-ol-0-0-10651]), deparaffinized in xylene, treated with 100% ethanol at room temperature and then heated in a microwave in 0.01 M citrate buffer (pH 6.0) for 15 min for antigen retrieval. ER (ER: Era EP1), PR (PR: PgR, 636) and HER-2 (c-erbB-2) status, and proliferation index, determined using proliferation marker protein Ki-67 (DAKO; Agilent Technologies, Inc.; Ki-67, MM-1) (1:100) antibody, were examined on all specimens using a DAKO Autostainer (Dako; Agilent Technologies, Inc.) and commercially available monoclonal antibodies. The proportion of ER-positive and PR-positive tumor cells was expressed as a percentage. ER and PR expression were scored as positive or negative with a nuclear immunostaining cut-off of 10%. For ER/PR status to be considered positive, guidelines from the American Society of Clinical Oncology and College of American Pathologists ([@b18-ol-0-0-10651]) recommended that ≥1% of tumor cells must demonstrate positive nuclear staining on IHC. However, in routine practice, a wide range of arbitrary cutoffs in proportion of stained cells are used. For example, 1 ([@b19-ol-0-0-10651]), 5--10, and 20% ([@b20-ol-0-0-10651]). A number of clinicians ([@b21-ol-0-0-10651]--[@b23-ol-0-0-10651]), including our hospital, consider 10% as the cut-off for eligibility for endocrine therapy. In addition, Iwamoto *et al* ([@b24-ol-0-0-10651]) demonstrated that tumors with \<10% ER-positive staining on IHC have molecular characteristics more similar to the ER-negative, basal-like phenotype. Considering the fact that patients with ER-positive (1--9%) tumors do not appear to benefit from endocrine therapy ([@b25-ol-0-0-10651]), a cut-off at 10% was adopted in the present study. HER-2 expression was evaluated as positive when membrane immunostaining scores were 3+, or when HER-2 gene amplification was demonstrated by fluorescent *in situ* hybridization in case of a sample with 2+ score, based on the scoring guidelines of HercepTest (DAKO; Agilent Technologies, Inc.) ([@b26-ol-0-0-10651]). Ki-67 staining results were expressed as the percentage of Ki-67-positive malignant cells among 1,000 malignant cells assessed under high-power magnification (×40 objective). Samples with ≥14% Ki-67 staining were considered positive, while those with \<14% were considered negative according to the St. Gallen consensus ([@b27-ol-0-0-10651]). Information on the microvascular lymph node status was obtained by sentinel lymph node resection followed by immediate lymph node dissection. A positive result was defined as presence of metastasis. The prognostic markers considered in the present study were histological and nuclear grade, lymph node status and molecular markers, including ER, PR, HER-2 and Ki-67. ### MRI acquisition and analysis Diagnostic MRI was performed on a GE Signa HDX 1.5 T MRI machine (GE Healthcare) using a double breast coil with the patient in a prone position. For all cases, a standardized MRI protocol was applied. Prior to contrast medium administration, axial fat-suppressed T2-weighted short-tau inversion recovery images \[response time (TR), 5,220 msec; echo time (TE), 49.2 msec; inversion time (TI), 145 msec; field of view (FOV), 36×36 cm; slice thickness, 5.5 mm; total acquisition time, 2 min 32 sec\] were obtained. Axial DWI with spin-echo planar imaging was performed with the following parameters: b=1,000 sec/mm^2^; TR, 4,250 msec; TE, 76.5 msec; FOV, 39×27.3 cm; slice thickness, 5.5 mm; acquisition time, 60 sec. In all patients, a bolus of intravenous contrast medium (gadopentetate dimeglumine) was administered at a dose of 0.2 mmol/kg body weight (0.5 mmol/ml Magnevist^®^), followed by 10 ml saline solution (1%). Dynamic MRI (VIBRANT^®^) with fat suppression was performed prior to and 6 times after injection of the contrast medium. The parameters for dynamic MRI were as follows: TR, 5.7 msec; TE, 2.8 msec; TI, 18 msec; FOV, 37×33.3 cm; slice thickness, 1.6 mm; acquisition time, 6 min 14 sec. The ADC map was automatically generated by the console of the manufacturer (AW VolumeShare 5; GE Healthcare). Linear regression was used to calculate ADC maps. Breast lesions were reviewed and manually delineated by 2 independent radiologists with 10 and 5 years\' experience in breast MRI, respectively, and blinded to other imaging or clinicopathological findings other than the presence of breast masses. The lesions were manually delineated with a circular region of interest placed within the primary lesions to include an area as large as possible within the confines of the actual lesions. The mean and maximum ADC values of lesions were denoted as ADC~mean~ and ADC~max~, respectively. ADC measurements were performed at least 3 times by 2 independent observers and the average ADC was recorded as the final result. The volume of the lesions was calculated by counting the number of voxels delineated on lesion maps and then multiplied by the size of the voxel. ### Statistical analysis For continuous variables, the Kolmogorov-Smirnov test was performed. For comparisons between breast cancer and different types of benign lesion, a Student\'s t-test was used. In addition, a receiver operating characteristics (ROC) curve was fitted and the area under the ROC curve (AUC) with 95% confidence interval (CI) was determined to identify the best cut-off ADC value for differentiating between benign and malignant breast masses. Sensitivity, specificity, positive predictive values and negative predictive values were calculated, respectively. The associations between ADC values and prognostic factors were calculated using Student\'s t-test with Bonferroni correction. The ADC values of histological grade (1 vs. 2/3), nuclear grade (1 vs. 2/3), lymph node status (positive vs. negative), as well as status of ER, PR, HER-2 (positive vs. negative) and Ki-67 (\<14 vs. ≥14%) were compared. In the univariate analysis, variables for which P\<0.1, including histological and nuclear grade, lymph node status, ER, PR, HER-2 and Ki-67, were subjected to multiple logistic regression analysis to determine those that were independently associated with ADC~max~ and ADC~mean~ values. P\<0.05 was considered to indicate a statistically significant difference. SPSS 22.0 (IBM Corp.) was used for all statistical analyses. Results ======= A total of 539 females (mean age, 43.9±8.3 years) with breast lesions were included in the present study. Based on the pathological results, malignant tumors were detected in 307 subjects ([Fig. 1](#f1-ol-0-0-10651){ref-type="fig"}) and benign tumors in 232 subjects ([Fig. 2](#f2-ol-0-0-10651){ref-type="fig"}). Detailed demographics of the patients and pathological types of their lesions are summarized in [Table I](#tI-ol-0-0-10651){ref-type="table"}. Patients with malignant breast lesions were significantly older compared with those with benign lesions (P\<0.001) and had a lower body weight (P=0.007). Analysis of the ADC~mean~ and ADC~max~ values of malignant and benign breast lesions indicated that malignant lesions usually had a smaller size (P\<0.001) and lower ADC~max~ (P\<0.001)/ADC~mean~ (P\<0.001) compared with benign lesions ([Table I](#tI-ol-0-0-10651){ref-type="table"}). The ADC~mean~ demonstrated a relatively improved performance in distinguishing malignant from benign lesions compared with ADC~max~, as indicated by the ROC curves in [Fig. 3](#f3-ol-0-0-10651){ref-type="fig"}. The AUC for ADC~mean~ and ADC~max~ was 0.953 and 0.942, respectively. With the optimum cut-off for the ADC~mean~ value at 1.30×10^−3^ mm^2^/sec, DWI achieved a sensitivity of 84.1% and a specificity of 90.2%, a positive predictive value of 86.7% and a negative predictive value of 88.2% for malignant vs. benign lesions. Furthermore, with the optimum cut-off value at 1.98 mm^2^/sec, ADC~max~ yielded a sensitivity of 78.4%, a specificity of 98.0%, positive predictive value of 85.8% and negative predictive value of 96.8% regarding the identification of malignant vs. benign lesions. Next, the association between ADC and independent tumor prognostic factors was examined. Tumor prognostic factors included histological grade, nuclear grade, lymph node status and molecular markers, including ER, PR, HER-2 and Ki-67. The analysis revealed significant associations between ADC and all prognostic factors. For those patients with malignant breast lesions, univariate analysis demonstrated significantly lower ADC~mean~ and ADC~max~ values for high histological grade (grade 2 and 3), high nuclear grade (grade 2 and 3), and lymph node-positive, ER-negative, PR-negative, HER-2-negative status, and Ki-67 ≥14%. Detailed ADC~mean~ and ADC~max~ values for patients with different prognostic factors are presented in [Table II](#tII-ol-0-0-10651){ref-type="table"}. The present study also performed multiple regression analyses regarding the relative association between prognostic factors for patients with malignant breast lesions and MRI biomarkers (ADC~max~ and ADC~mean~). Histological grade (P\<0.001), nuclear grade (P\<0.001), Ki-67 (P\<0.001) and PR (P=0.005) were the variables demonstrated to independently affect the ADC~max~. Furthermore, Ki-67 (P\<0.001), lymph node status (P\<0.001), HER-2 (P=0.01) and PR (P=0.01) were all indicated to independently affect the ADC~mean~. Discussion ========== To the best of our knowledge, the present study is the first large-scale study performed in a Chinese population to validate the use of the ADC for distinguishing malignant from benign breast lesions, and to determine its association with common biomarkers of breast malignancy and prognosis. The results demonstrated that ADC is a promising tool in differentiating malignant tumors from benign masses with high sensitivity and specificity, with optional cutoff values of 1.30×10^−3^ and 1.98 mm^2^/sec for ADC~mean~ and ADC~max~, respectively. Furthermore, ADC biomarkers have potential in predicting the clinical outcomes of malignant breast cancer. The present results suggested that ADC~max~ and ADC mean were significantly decreased in patients with high nuclear grade, and lymph node-positive, ER-negative, PR-negative and HER-2-negative status, and Ki-67 ≥14%. Subsequent analysis of the effects of independent prognostic factors on ADC biomarkers suggested that ADC~max~ was affected by nuclear grade, Ki-67 and PR, whereas ADC~mean~ was affected by lymph node status, HER-2, PR and Ki-67. Breast cancer is one of the most common types of cancer in females worldwide and DCE-MRI is an established technique for detection, diagnosis and staging of breast cancer. Despite an inherently high sensitivity, DCE only has moderate specificity for the characterization of breast lesions ([@b14-ol-0-0-10651]). In clinical practice, a standardized imaging protocol allows for the investigation of morphological and kinetic patterns of benign and malignant breast lesions screened by mammography and ultrasound. However, this standardized protocol is also prone to a high false-positive rate and may therefore result in unnecessary biopsies. Conversely, being able to measure the biophysical characteristics of tissues, DWI and its derived ADC maps were mostly applied in breast imaging to decrease false-positives on conventional DCE-MRI. Numerous studies have demonstrated that malignant breast lesions usually exhibit a high signal on DWI and a low signal on ADC maps compared with normal fibroglandular tissues ([@b15-ol-0-0-10651]), indicating decreased water diffusion in malignant tissues. Significantly increased cell density was the major contributor to this decreased water diffusion, consequently resulting in an increased hindrance of water motion in the tortuous extracellular space and increased volume of restricted intracellular fluid ([@b16-ol-0-0-10651],[@b17-ol-0-0-10651]). For example, simple cysts demonstrate higher water diffusion rates compared with breast fibroglandular tissue due to the relatively unrestricted microenvironment. The potential application of DWI and ADC may avoid unnecessary biopsies and provides a fast approach to assess the malignancy of suspicious breast lesions ([@b18-ol-0-0-10651]). A meta-analysis of 14 studies revealed that ADCs demonstrated an excellent performance in classifying suspicious breast lesions, and their inclusion may therefore increase the accuracy of conventional clinical breast assessments ([@b19-ol-0-0-10651]). ADC~max~ and ADC~mean~ values demonstrated a good performance in the differentiation between malignant and benign breast masses. The ADC~mean~ for malignant and benign tumors in the present study were 1.0±0.2 and 1.5±0.2, respectively. This was, to a certain degree, consistent with the results of previous studies on breast lesions ([@b9-ol-0-0-10651],[@b17-ol-0-0-10651],[@b20-ol-0-0-10651],[@b21-ol-0-0-10651]). Compared with previous studies, the present study included a large population and yielded more comprehensive results. The ADC~mean~ alone had the best performance in differentiating between benign and malignant diseases, and with the best cut-off value at 1.98 mm^2^/sec, it had a sensitivity of 84.1%, specificity of 90.2%, positive predictive value of 86.7% and negative predictive value of 88.2%. While the present study did not compare the accuracy of DCE with DWI for breast cancer detection, a previous meta-analysis obtained a pooled sensitivity and specificity of DCE-MRI of 93.2 and 71.1% ([@b19-ol-0-0-10651]). This suggested that DWI alone had an improved specificity compared with DCE-MRI; therefore, this technique may be implemented to complement conventional parameters and improve the accuracy of breast cancer detection. As the measurement of the extracellular water content provides information on additional features, this may increase the specificity of the classification of pathological breast lesions. More importantly, although a generalizable ADC threshold should always be avoided due to dependence of lesion selection and combination of b-values ([@b22-ol-0-0-10651]), the sensitivity and specificity of DWI were robust and not significantly affected by choice of b-values as long as a suggested maximum b-value of 1,000 sec/mm^2^ was adopted ([@b23-ol-0-0-10651]). Despite the fact that DWI is not to be used as a stand-alone diagnostic criterion, it is useful if integrated into the conventional clinical protocol. Considering that personalized and targeted therapeutic approaches largely depend on the accuracy of tumor characterization in terms of histological type and biological aggressiveness, a non-invasive method capable of measuring all prognostic features is more favorable compared with other techniques. From the results of the present study, which demonstrated that malignant breast lesions had lower ADCs, it may be expected that lower ADCs, likely due to higher levels of proliferation and cellularity, would generally correlate with higher aggressiveness. Cellularity is an important indicator of tumor grade. As increased cellular density of high-grade tumors is associated with smaller extracellular volume fractions, tumor cellularity is inversely correlated with tumor ADC. Indeed, Jiang *et al* ([@b28-ol-0-0-10651]) demonstrated a marked negative correlation between cellularity and ADC. However, the exact association between restricted diffusion and well-known prognostic factors has remained largely unknown. For example, a number of undifferentiated breast tumors have very few neoplastic cells in an abundant fibrous stroma, and this may result in increased ADC values. In certain cases, the complex microarchitecture and strong desmoplasia in tumors makes the reliable detection of disease and early diagnosis difficult. In addition, although fibrous stroma with higher stroma grades ([@b3-ol-0-0-10651]--[@b5-ol-0-0-10651]) demonstrate low ADCs just like neoplastic cells ([@b29-ol-0-0-10651]), the microstructural models for diffusion MRI are always too simplistic to describe the underlying tissue microstructure in clinical settings. This issue was also raised by a previous study ([@b30-ol-0-0-10651]), and efforts to build more complex models to better describe the data are being made. Therefore, at present, histological assessments remain irreplaceable, and clinical decisions should be made based on the results of multiple tests, to compensate for the limitations of any single treatment modality. In the present study, the correlation between the ADC values and various prognostic factors was assessed. The results suggested that patients with detected lymph node metastasis had a significantly decreased ADC value in the primary breast tumor. This is in concordance with several previous studies ([@b6-ol-0-0-10651],[@b25-ol-0-0-10651]), and it is commonly accepted that a lower ADC is an indicator of higher aggressiveness and metastatic potential. Furthermore, although the prognosis of malignant tumors does not exclusively depend on the histological type of cancer cells, the histopathological characteristics of the tumor, particularly tumor grade, are markedly correlated with tumor progression. The results of the present study demonstrated a statistically significant association between higher nuclear grade and lower ADCs. This is in accordance with other studies ([@b6-ol-0-0-10651],[@b26-ol-0-0-10651]), which all observed increased cellular density in high-grade tumors by measuring ADCs. Furthermore, previous studies have investigated the association between histological grade and ADC ([@b31-ol-0-0-10651],[@b32-ol-0-0-10651]). The results of the present study were in concordance with those identified previously ([@b29-ol-0-0-10651],[@b30-ol-0-0-10651]), and demonstrated an association between lower ADC values and higher histological grades. This subsequently supports the hypothesis that the increased cellular density observed in high-grade malignancies is associated with low ADC values ([@b33-ol-0-0-10651]). Overexpression of HER-2 accelerates cell growth, thereby contributing to carcinogenesis. Consequently, HER-2-positive cells exhibit a more malignant phenotype compared HER-2-negative cells, comprising increased cell proliferation, invasion and metastatic potential. However, the present study determined increased ADC values in HER-2-positive samples compared with HER-2-negative breast cancer samples. Notably, HER-2 also induces angiogenesis, which leads to increased perfusion in tumors. Based on this, the increased ADC values observed in HER-2-positive lesions in the present study may be explained by an increased proportion of total extracellular fluid due to high vascularity. Although to the best of our knowledge, there is no study investigating the association between vascularity of breast lesions and HER-2 expression, different imaging studies indirectly supported our hypothesis. Zhang *et al* ([@b34-ol-0-0-10651]) and Rashmi *et al* ([@b35-ol-0-0-10651]) demonstrated that tumors with high Adler degrees of vascularity were associated with positive HER-2 expression in power doppler studies. Due to the lack of pathological evidence available at present, above statement is just speculative, and histological examination is always required to verify this high vascularity hypothesis. Martincich *et al* ([@b36-ol-0-0-10651]) also observed high ADCs in tumors with high HER-2 expression compared with tumors without HER-2 expression. Of note, although ER-positive breast cancer generally has an improved prognosis compared with ER-negative cancer, previous studies have described conflicting results, as several studies indicated that ER-positive breast lesions exhibited lower ADCs ([@b12-ol-0-0-10651],[@b37-ol-0-0-10651],[@b38-ol-0-0-10651]). The results of the present study indicated increased ADCs in ER-positive lesions, which is only consistent with the study by Kitajima *et al* ([@b39-ol-0-0-10651]). Similarly, while most studies did not observe any significant association between PR status and ADC, the data from the present study indicated that PR-positive lesions exhibited increased ADC values. Therefore, the correlation of ADC with other prognostic factors, including ER, PR, HER-2 and Ki-67, is less consistent among studies and may vary between different populations. Future large-population studies may be required to determine the association between DWI biomarkers and these prognostic factors. The present study had several limitations. Firstly, the present study had a retrospective design, was performed at a single institution, and it was not possible to evaluate the long-term follow-up results of the study population. The association between MRI imaging biomarkers and treatment response may be an important topic for future study. Secondly, the present study did not compare the diagnostic performance of the ADC with conventional DCE-MRI. Although the combination of 2 methods provides an improved diagnostic value compared with either alone, it may be worthwhile to assess this specifically in future studies. Finally, all of the patients included in the present study were screened by mammography and/or sonography and had a tumor size of \>10 mm, which may have potentially yielded selection bias. One possible consequence of this selection bias may be the increased prevalence of ER-negative, PR-negative and HER-2-postive breast lesions in the present study compared to others. Therefore, the data should be interpreted the with caution and direct comparisons between different studies should be avoided. In conclusion, the present study revealed that malignant tissues exhibited lower ADCs compared with benign tumors. This suggested that ADCs may be promising imaging parameters that may help identify tumors with higher malignancies. In addition, the present study provided additional confirmatory evidence for the utility of the ADC values in the characterization of breast lesions, and the ADC~mean~ and ADC~max~ were effective parameters to distinguish malignant from benign breast lesions. Therefore, DWI-derived ADCs are useful biomarkers that may contribute to improved concordance between radiological and pathological data. Not applicable. Funding ======= No funding was received. Availability of data and materials ================================== All data are available upon reasonable request. Authors\' contributions ======================= CR conducted experiments, analyzed data and drafted the manuscript. YZ assisted with the collection of pathological results and patient recruitment. XZ and KL facilitated lesion delineation and radiological examination. All authors read and approved the final manuscript. Ethics approval and consent to participate ========================================== The study protocol was approved by the Institutional Review Board and Ethics Committee of Women\'s Hospital, School of Medicine, Zhejiang University. Written informed consent was obtained from all the subjects prior to the study. Patient consent for publication =============================== Written informed consent was obtained from all the subjects prior to the study. Competing interests =================== The authors declare that they have no competing interests. ![Representative imaging results from a 51-year-old patient with infiltrating ductal carcinoma in the right breast. The tumor was histological grade 2, without axillary lymph node metastasis. Immunohistochemical staining exhibited positive estrogen receptor and progesterone receptor expression, negative human epidermal growth factor receptor 2 expression and a proliferation index (proliferation marker protein Ki-67) of 30%. (A) Dynamic early enhancement image showing an irregular, heterogeneously enhancing lesion with a lobulated margin. (B) The maximum diameter of the tumor was 1.5 cm on T2WI imaging results. (C) Diffusion weighted imaging results demonstrated a high signal intensity lesion in the right breast tissue. (D) The ADC map revealed increased diffusion (ADC~mean~=0.74×10^−3^ mm^2^/sec) within the index lesion. ADC, apparent diffusion coefficient.](ol-18-03-3295-g00){#f1-ol-0-0-10651} ![Representative imaging results from a 35-year-old patient with fibroadenoma in the left breast. (A) The maximum diameter of the tumor was 2.6 cm, and demonstrated a well-defined, oval heterogeneously enhancing lesion on dynamic enhancement image. (B) The lesion was hyperintense on diffusion weighted imaging scans. (C) Time signal intensity analysis demonstrated a gradual progressive enhancement pattern (type 1 curve). (D) The lesion was hypointense on the ADC map with ADC~mean~=1.26×10^−3^ mm^2^/sec. ADC, apparent diffusion coefficient.](ol-18-03-3295-g01){#f2-ol-0-0-10651} ![ROC curve for ADC~mean~ and ADC~max~ in differentiation between benign and malignant breast lesions. ROC, Receiver operating characteristic; ADC, apparent diffusion coefficient.](ol-18-03-3295-g02){#f3-ol-0-0-10651} ###### Patient demographics, histopathological diagnosis and imaging biomarkers for patients with benign and malignant breast lesions (n=539). Characteristics Benign (n=232) Malignant (n=307) P value --------------------------------- ---------------- ------------------- --------- Age, years 41.3±7.5 45.7±7.7 \<0.001 Weight, kg 62.2±10.4 59.5±9.8 0.007 Height, cm 158.2±5.3 159.1±5.7 0.352 Final diagnosis, n (%)   Fibrocystic changes 12 (5.2) -- --   Plasma cell mastitis 49 (21.0) -- --   Intraductal papilloma 13 (5.5) --   Fibroadenoma 77 (33.3) --   Mastopathy 58 (25.1) --   Sclerosing mastopathy 23 (10.0) --   Infiltrating ductal carcinoma -- 176 (57.3)   Malignant phyllodes tumor -- 10 (3.2)   Mucinous carcinoma -- 6 (2.0)   Invasive lobular carcinoma -- 115 (37.5) Volume, ml 7.7±4.1 5.8±3.9 \<0.001 ADC~max~, ×10^−3^ mm^2^/s 2.1±0.2 1.7±0.2 \<0.001 ADC~mean~, ×10^−3^ mm^2^/s 1.5±0.2 1.0±0.2 \<0.001 ADC, apparent diffusion coefficient. ###### Associations between prognostic factors and ADC measurements for patients with malignant breast lesions (n=307). ADC~max~, ×10^−3^ mm^2^/s ADC~mean~, ×10^−3^ mm^2^/s -------------------- ----- --------------------------- ---------------------------- ----------- --------- Histological Grade \<0.001 \<0.001   1 153 1.79±0.12 1.20±0.12   2+3 154 1.48±0.11 0.83±0.11 Nuclear grade \<0.001 \<0.001   1 160 1.85±0.09 1.18±0.12   2+3 147 1.56±0.11 0.87±0.08 Lymph node status \<0.001 \<0.001   Positive 148 1.56±0.11 0.88±0.09   Negative 159 1.85±0.09 1.17±0.12 ER \<0.001 \<0.001   Positive 91 1.80±0.15 1.14±0.17   Negative 216 1.67±0.17 0.99±0.17 PR 0.006 \<0.001   Positive 67 1.76±0.18 1.13±0.21   Negative 240 1.69±0.17 1.00±0.17 HER-2 \<0.001 \<0.001   Positive 178 1.82±0.12 1.14±0.15   Negative 129 1.56±0.12 0.88±0.09 Ki-67 \<0.001 \<0.001   \<14% 103 1.89±0.08 1.24±0.10   ≥14% 204 1.62±0.13 0.92±0.11 ADC, apparent diffusion coefficient; SD, standard deviation; ER, estrogen receptor; PR, progesterone receptor; HER-2, human epidermal growth factor 2; Ki-67, proliferation marker protein Ki-67.
CLEVELAND -- The Cubs launched four home runs and rookie Kyle Schwarber collected four hits in his first Major League start, backing a solid outing from lefty Tsuyoshi Wada in a 17-0 rout over the Indians on Wednesday night at Progressive Field. • Cast your Esurance All-Star ballot for #ASGWorthy players Chicago's romp reached the point where the Indians used a pair of position players -- outfielders Ryan Raburn and David Murphy -- as pitchers to finish the game. It was also the most lopsided shutout in the history of Interleague Play, surpassing Oakland's 16-0 win over the Giants on June 26, 2005. "That's an anomaly night," Cubs manager Joe Maddon said. "That doesn't happen. Look what happened to Washington tonight after they had just beaten Tampa Bay by a large number the day before. It happens, it's how this game is played. You've got to come ready to play tomorrow night, because I know the Indians will be." Anthony Rizzo (12 home runs this season), Addison Russell (five homers), Chris Denorfia (one) and Kris Bryant (eight) each belted a long ball for Chicago, which has won eight of its last 12 games. The Cubs' 10-run outburst between the second and third innings was more than ample for supporting a strong seven-inning effort from Wada (no runs allowed on four hits with six strikeouts and two walks). For the Indians, right-hander Shaun Marcum absorbed the loss after being charged with six runs on six hits in only two innings. Marcum gave up a pair of two-run homers -- one each to Russell and Rizzo in a six-run second for the Cubs. Marcum's abbreviated effort forced Indians manager Terry Francona to cycle through eight relievers, including Raburn and Murphy in the ninth inning, the rest of the way. Murphy surrendered a grand slam to Bryant to cap off Chicago's seven-run ninth. Video: Must C Crushed: Bryant's long grand slam in Cleveland "It doesn't feel good," Indians manager Terry Francona said of using Raburn and Murphy as pitchers. "We wanted to try to stay away from [reliever Zach McAllister], because he pitched [on Tuesday]. Hopefully, regardless of what the score was today, we start tomorrow fresh. It's still not a lot of fun to do that." The 22-year-old Schwarber -- promoted from Double-A on Tuesday -- finished 4-for-5 with a triple, two RBIs and three runs as the designated hitter on Wednesday night. Indians shortstop Francisco Lindor went 0-for-4 with an error in his first home game since being called up from Triple-A by the Tribe on Sunday. MOMENTS THAT MATTERED The rook delivers: In his second Major League at-bat, and first start in the big leagues, Schwarber sent a pitch from Marcum down the first-base line and into the right-field corner for an RBI triple in the second inning. The hit helped ignite Chicago's six-run outburst in the frame. The young catcher then added an RBI single in the Cubs' four-run third, a leadoff single in the seventh and another single in the ninth. More > "He had good swings," Maddon said. "I really like the hard base hit to the second baseman's right, towards the middle. This is a kid that's a good hitter that knows he's a good hitter and does it in the right way." Video: [email protected]: Schwarber drills his first four MLB hits Santana slips up: Schwarber's hard-hit triple in the second was within reach for Indians first baseman Carlos Santana, but he did not get a glove on the ball. While it did not go down as an error, Santana's inability to at least knock down the ball opened the door for the Cubs. The Indians could have had one (or potentially two) outs on the play. Instead, Schwarber got his first hit and the Cubs soon had a 6-0 advantage. "It's easy to say he should have had it," Francona said of the play, "because he makes that play a lot of times. But, that's just the way the game is. Sometimes plays don't get made." Video: [email protected]: Schwarber triples for his first MLB hit Changing horses: After giving up three straight singles to begin the third inning, Indians lefty Nick Hagadone slipped into a 2-0 count against Denorfia. Francona had seen enough, pulling the reliever from the game in the middle of the at-bat. Tribe reliever Ryan Webb didn't fare much better, yielding a three-run homer to Denorfia to give Chicago a 10-0 lead. "I just didn't want to rush Webb," Francona said. "It looked like Hags was having a tough time but it wasn't wanting to rush to all of the sudden go to our third pitcher that early. It wasn't adding up then that we'll be able to finish this game." Video: [email protected]: Denorfia rips a three-run homer to center Raburn, Murphy pitch: Marcum's early exit threw Cleveland's bullpen into unusual circumstances, forcing Francona to turn to Raburn and Murphy for the ninth inning. Both Raburn (Aug. 8, 2013, for Cleveland) and Murphy (June 4, 2013, for Texas) had previous pitching appearances, and they combined to allow seven unearned runs on Wednesday. Raburn logged two-thirds of an inning and exited with a "cranky" arm, according to Francona. Murphy hit a batter with the bases loaded prior to Bryant's slam. More > "You make the most of it," Murphy said. "You never want to be in a position where a position player has to come in the game. If it does happen, you try to enjoy it and make the most of it. You play this game long enough, things like this will happen. You get a smile about something like that." Video: [email protected]: Position players Raburn, Murphy pitch in 9th SOUND SMART WITH YOUR FRIENDS According to baseball-reference.com, the Indians became the first Major League team since at least 1914 to use at least nine pitchers in a nine-inning, non-September game. This is the second day in a row that a big league team used a pair of position players as pitchers. On Tuesday, Tampa Bay used utility man Jake Elmore and infielder Nick Franklin as pitchers in a lopsided loss to the Nationals. WHAT'S NEXT Cubs: Right-hander Jason Hammel (5-2, 2.81 ERA) takes the mound for the Cubs, coming off his shortest outing of the season (five innings). He'll look to start strong after throwing 37 pitches in the first inning his last time out. Indians: Cleveland wraps up its home-and-home Interleague series with the Cubs on Thursday with a 7:10 p.m. ET tilt at Progressive Field. Right-hander Danny Salazar (6-2, 3.54 ERA) is scheduled to take the mound for the Indians, looking to build upon the 2.90 ERA he's turned in over his past five outings. Watch every out-of-market regular season game live on MLB.TV.
Moving opioid misuse prevention upstream: A pilot study of community pharmacists screening for opioid misuse risk. Prescription opioids are known to be highly addictive, contributing to the opioid epidemic which continues to besiege victims in the United States. Pharmacists are gatekeepers straddling the prescribers of opioids and their patients; therefore they are in the ideal position to screen for opioid misuse among patients receiving opioid prescriptions and counsel them on safe use. The purpose of this study was to design the Opioid Misuse Risk Prevention Toolkit and then evaluate the utility of the toolkit by implementing it in community pharmacy practice sites. A critical element of the toolkit was the use of the Opioid Risk Tool (ORT) to screen all patients receiving opioid prescriptions for opioid use disorder. Eleven pharmacists were trained in the use of the toolkit, which they implemented within their community pharmacy for all patients receiving opioid prescriptions. A triage tool was used to guide the process of screening patients for opioid use disorder, red flags (patient unknown to the pharmacy, history of early refills, requesting a particular brand, or cash paying), risk of accidental overdose, and misuse of opioids through the prescription drug monitoring program (PDMP). Pharmacist-provided services included naloxone prescribing, counseling on opioid addiction risks, partial fills of opioid prescriptions, education on medication takeback programs, and referral information for community resources for patients concerned about a substance misuse disorder. Twenty-six percent of individuals (n = 107) receiving opioid prescriptions were identified as at some risk of misuse and 30% at risk of an accidental overdose. Participating pharmacists preferred the value of having an objective measurement of potential of opioid misuse, to relying only on professional judgment. They also reported the value of the toolkit elements in enhancing conversations with patients. This case report demonstrated the utility and the feasibility of screening for opioid misuse risk at the community pharmacy level.
{% extends 'base.html.twig' %} {% block body %} <div class="be-wrapper"> {% include 'navbar.html.twig' %} {% include 'sidebar.html.twig' %} {% include "@FOSUser/Profile/edit_content.html.twig" %} </div> {% endblock body %}
Q: Word : Deleting Lines in between a Table and a Heading using Python I have a scenario in which there is a Heading/Constant Text like "Call Tree:" present all over the Word document and after that there are some lines, and once the line are over, there is a Table. So I want the lines between the table and the Heading/Constant Text "Call Tree:" to be deleted using python/win32 component. For Example : Input is : ... Call Tree : Line 1 ... Line 2 ... .... .... .... .... Line N .... Table # 1 ..... Output is (i.e. all the lines in between the table and "Call Tree" are deleted): ... Call Tree : Table # 1 ..... I'm not sure, if there is any way by which I can select multiple lines between a Constant Text i.e "Call Tree" and a Table. I know, that selection of a line and deletion can be done using this : .. app = win32com.client.DispatchEx("Word.Application") app.Visible = 0 app.DisplayAlerts = 0 # select a Text app.Selection.Find.Execute("TEXT TO BE SELECTED") # extend it to end app.Selection.EndKey(Unit=win32com.client.constants.wdLine,Extend=win32com.client.constants.wdExtend) # check what has been selected app.Selection.Range() # and then delete it app.Selection.Delete() .. But I'm not sure, how to select multiple lines like this, with this criteria. Any idea/suggestion on this ? A: You can iterate over the lines after you find the text using MoveRight and EndKey, then you can test if the selection is a table using the property Tables. Someting like import win32com.client as com from win32com.client import constants as wcons app = com.Dispatch('Word.Application') # Find the text app.Selection.Find.Execute('Call Tree', False, False, False, False, False, True, wcons.wdFindContinue, False, False,False,) # Extend the selection to the end app.Selection.EndKey(Unit=wcons.wdLine) while True: # Move the selection to the next character app.Selection.MoveRight(Unit=wcons.wdCharacter, Count=1) # And Select the whole line app.Selection.EndKey(Unit=wcons.wdLine, Extend=wcons.wdExtend) # If I hit the table... if app.Selection.Tables.Count: print "Table found... Stop" # I leave the loop break # Otherwise delete the selection print "Deleting ...",app.Selection.Text app.Selection.Delete() # And delete the return app.Selection.TypeBackspace() I would recommend trying to do what you want first in word using macros (Try recording the macros if you are not familiar with VBA) and then translate the code to Python.
Q: Programmatically determining amount of parameters a function requires - Python I was creating a simple command line utility and using a dictionary as a sort of case statement with key words linking to their appropriate function. The functions all have different amount of arguments required so currently to check if the user entered the correct amount of arguments needed for each function I placed the required amount inside the dictionary case statement in the form {Keyword:(FunctionName, AmountofArguments)}. This current setup works perfectly fine however I was just wondering in the interest of self improval if there was a way to determine the required number of arguments in a function and my google attempts have returned so far nothing of value but I see how args and kwargs could screw such a command up because of the limitless amount of arguments they allow. A: inspect.getargspec(): Get the names and default values of a function’s arguments. A tuple of four things is returned: (args, varargs, varkw, defaults). args is a list of the argument names (it may contain nested lists). varargs and varkw are the names of the * and ** arguments or None. defaults is a tuple of default argument values or None if there are no default arguments; if this tuple has n elements, they correspond to the last n elements listed in args. A: What you want is in general not possible, because of the use of varargs and kwargs, but inspect.getargspec (Python 2.x) and inspect.getfullargspec (Python 3.x) come close. Python 2.x: >>> import inspect >>> def add(a, b=0): ... return a + b ... >>> inspect.getargspec(add) (['a', 'b'], None, None, (0,)) >>> len(inspect.getargspec(add)[0]) 2 Python 3.x: >>> import inspect >>> def add(a, b=0): ... return a + b ... >>> inspect.getfullargspec(add) FullArgSpec(args=['a', 'b'], varargs=None, varkw=None, defaults=(0,), kwonlyargs=[], kwonlydefaults=None, annotations={}) >>> len(inspect.getfullargspec(add).args) 2 A: In Python 3, use someMethod.__code__.co_argcount (since someMethod.func_code.co_argcount doesn't work anymore)
Scope of MBBS in Pakistan A student who has uncertain passion of making their career in hospitals and clinics should definitely go for MBBS which stands for Bachelor of Medicine and Bachelor of surgery. It is a five year program and people who have done this degree are called DOCTORS. There are total 238 credit hours in MBBS and it is considered as one of the toughest degree in the whole world. After the completion of 5 years degree, 1 year of house job and getting registered with PMDC are also mandatory for working in different hospitals or being eligible for opening own clinic. For being a successful and skillful doctor MS, MD and FCPS are most recommended qualifications. If someone wants to serve humanity then it must be a dream qualification for such people. It is a sacred profession and one should not opt this just for earning a handsome amount. Our beloved homeland has shortage of good doctors so it is my advice for all female doctors that they should marry a person who allow them to practice as a doctor and serve humanity. Usually people in Pakistan select the short cut to be successful and fly to Middle East or European countries. They have no right to waste the money government has spent to make them doctors. When a doctor guides his patients and tells them about the counter measures to prevent diseases then his role here is more than a doctor and we can consider him as a social worker or social mobilizer. I have seen many of the doctors who become agents of pharmaceutical companies and diagnostic lab and earn black money and it does not suit to a person with such sacred and noble degree. In Pakistan after doing MBBS you can become either a surgeon or a physician and it is totally up to you. Skills: A person who wants to be in this field should have aptitude to serve the humanity. He should have control over his nerves because he has to deal with emergency situations. He should have a good stamina because doctors have to give duties for more than 24 hours. They should be team player and abilities of a team player. They should have a good moral character and they should be mentally and emotionally stable. Eligibility Criteria: Frankly speaking, now getting admission into a medical college is not easy and only cream of Pakistan gets admission is medical. You should have more than 80% marks in FSC pre-medical and MCAT. There are also many private colleges and they have their own eligibility criteria.
117 Customer Ratings 21 Customer Reviews I previously was in another storage facility in comparison you far exceeded them Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.8 out of 5 stars By Kurt Asbury Park, NJ June 28, 2016 I can enter my storage space anytime wih ease Staff 5.0 Cleanliness 5.0 Expectations 4.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Michaela Long Branch, NJ June 27, 2016 Prices are great as well as service Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.6 out of 5 stars By Elsa Asbury Park, NJ June 2, 2016 Your personnel is very friendly and any situation I have had it's been taken care of immediately. Thank you for your fine service. Wishing you always much success Staff 4.0 Cleanliness 4.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By HM Long Branch, NJ February 23, 2016 Even though I was originally was inquiring different storage facilities on-line, Chris went above and beyond by calling me back about other options for my search. After, I visited the facility, I met Chris. He was very patient, articulate, and knowledgeable with me. I felt that his customer service was helped me make my final decision. Uncle Bob's is fortunate to have such a valuable employee. Thank you for making my transaction very smooth. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Kelly Asbury Park, NJ January 26, 2016 Chris is always helpful and makes the process easy. The facility is impeccably maintained and always well lit and secure. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Lynn Ocean Grove, NJ January 25, 2016 The staff at the Asbury Park facility is just great and has made my first storage experience a good one. Thank you! Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.1 out of 5 stars By Joseph Atlantic Highlands, NJ January 25, 2016 Appreciate the fact that you don't increase rates every chance you get. This is the strongest reason why I remain your customer! Staff 4.5 Cleanliness 4.0 Expectations 4.0 Satisfaction 4.0 Recommend 4.0 5.0 out of 5 stars By Nyambi Asbury Park, NJ September 12, 2015 Both Rick and Chris were accommodating. They assisted me with all questions and addressed my concerns in a timely and efficient manner. They were both fair and good people, and you all are blessed to have them on your team. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Mathilda Atlantic Highlands, NJ August 28, 2015 Met my expectations 100%. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.3 out of 5 stars By Marshall Asbury Park, NJ July 28, 2015 My only beef is the lack of flexibility with late payment charges which i have incurred a couple of times because I use auto withdrawal on my CC and a couple times it has been lost or stolen so the card declines at the time of withdrawal and I am pretty quickly slapped with a late fee. You could be a little more lenient in those cases. Staff 4.0 Cleanliness 4.3 Expectations 4.0 Satisfaction 4.0 Recommend 5.0 5.0 out of 5 stars By James New York, NY July 23, 2015 I believe our manager's name was Rick. He was always so very, very helpful, professional, and absolutely one of the most pleasant individuals one would want to do business with. You've got an excellent manager doing an excellent job. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.9 out of 5 stars By Eileen Ocean Grove, NJ June 26, 2015 I knew I would get excellent results as I have used the storage company before the owners were changed. Staff 4.8 Cleanliness 4.7 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.4 out of 5 stars By Meghan Hamilton Square, NJ June 23, 2015 The guys were extremely helpful with everything from u-haul rental to storage. Even went out of their way to stay open a little late for me so I could load my locker on time! Which is very very cool! Staff 4.2 Cleanliness 4.0 Expectations 4.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Shaleema Cliffwood Ave, NJ April 28, 2015 My expectations were highly met. This was my first time ever using a storage unit and so far my experience has been great. All Thanks to your team members. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.8 out of 5 stars By Kathleen Asbury Park, NJ April 16, 2015 chris was very helpful and friendly even thu it was late in the afternoon and close to closing he not only help me but 2 others that came in after me Staff 5.0 Cleanliness 5.0 Expectations 4.0 Satisfaction 5.0 Recommend 5.0 4.8 out of 5 stars By Candace Asbury Park, NJ March 28, 2015 A bit more expensive since Uncle Bob's took over my location. The staff is great! Thank you! Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 4.0 4.6 out of 5 stars By Mike Ocean Grove, NJ November 26, 2014 Done what they said they would Staff 5.0 Cleanliness 5.0 Expectations 4.0 Satisfaction 4.0 Recommend 5.0 5.0 out of 5 stars By Michael Freehold, NJ October 24, 2014 The staff and services were great... especially during and after the transition to Uncle Bob's. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 5.0 out of 5 stars By Sue Asbury Park, NJ October 18, 2014 Happy, courteous service. Went out of his way to find what I needed. A pleasant experience overall. Staff 5.0 Cleanliness 5.0 Expectations 5.0 Satisfaction 5.0 Recommend 5.0 4.3 out of 5 stars By Elizabeth Wall Township, NJ July 26, 2014 Thankful for the smooth transition... Staff 4.0 Cleanliness 4.7 Expectations 4.0 Satisfaction 4.0 Recommend 5.0 *Ratings and reviews taken from a survey of our current customers. Storage Features at this Location Climate Controlled Storage Units Climate Controlled storage spaces provide a temperature controlled environment for your belongings. These spaces keep your items cool in the summer and heated in the winter, and are ideal for protecting items such as wood, electronics, and plastic that can be damaged from temperature changes and extremes. Learn more about the benefits of climate controlled storage here. 54' Truck Access The entrance, aisles, and most drive-up accessible storage units are wide enough to accommodate large vehicles, up to and including 54' tractor trailers. Surveillance Cameras Smile, you're on camera! Surveillance cameras are positioned throughout the facility to create a safer environment by monitoring traffic in and out of the facility and deterring trespassers. Boxes & Packing Supplies Sold Here This Uncle Bob's carries a full line of moving and storage supplies such as boxes, packing tape, packing materials, and more! Our supplies help move awkward items like wardrobes and big screen TVs and keep delicate items like dishes safe during moving and storage. Stop in our office before the big move for your supplies! For helpful moving and packing tips, visit our guide here. Self Storage in Asbury Park The best beaches in New Jersey are located in Asbury Park. When the days of sun and sand come to an end, you need a place to store all of your beachy belongings. Uncle Bob's Self Storage has plenty of storage units to choose from, including climate controlled spaces to help protect your valuables. We're located on 1st Avenue in between Memorial Drive and Main Street, just blocks from Library Square Park. Serving the Communities of: Ocean Grove, Allenhurst, Loch Arbour 07756, 07711, 07720 Have Questions? We can help! Our storage professionals are trained and ready to help you get the answers you need. Call us now!
One of my favorite approaches to get my pipeline going is attend a bunch of meetups or local events in my area. I teach what I do on this blog – How to network at events. I love this approach as only people who want something MORE in their life will bother attending events and that is a lot easier type of person to talk to than someone who is NOT motivated to network or build their business. Hello Network Marketer, Tired of old, worn out, over-priced network marketing leads that cost you hard-earned money… but leave you without new distributors? Tired of friends and family avoiding your calls? If you’re like most distributors I know, time and money are valuable to you. You can’t waste it on cheap, worn out recycled leads. Nor do you want to chase your friends and family. Otherwise, you’ll become a charter member of the NFL Club… No Friends Left! Are you looking to improve your MLM and Network Marketing sales skills? You're either Making Sales or you're making Excuses, not making any sales. Peter Mingils teaches the Making Sales or Excuses Training Course. To get the right kind of MLM training, you can take the Mini Course or the Full Course and increase your sales and sales management skills! Develop a referral program. Just like in other businesses, people who are referred by others are easier to convert to a sale than people who weren't, because they're usually coming to you with some interest in buying. Many people you talk to won't be interested in buying right away, but they might know people who are. Happy customers may want to share your product or business. You can develop a referral program to give people incentive to refer others to you. For example, you can give them a 10 percent discount on their next purchase for every new customer they refer. I want to start off with saying great video above and the information is very thorough. I will be following your advice and guidance to get my new business going. I am very new to the Network Marketing industry but have been introduced to a new Tech Company (called VIV) that has a phenomenal, once in a lifetime opportunity to get into their Founders Circle. I would really like your input on what you think, the link to the video that explains the founders circle is shareviv.com. Many MLM companies recommend starting with a list of 100 people you know, called your warm market. Although it's not a bad place to start when looking for customers and business builders, the technique could also backfire and get to the point where you're annoying friends and family. You're better off spending your time finding people who are interested in what you've got rather than trying to convince your commuting buddy to sign up when he doesn't want to.
Salman Khan’s Tubelight has 3 Songs, & Music Rights Sold at 20 Cr The upcoming highly awaited collaboration of superstar Salman Khan and director Kabir Khan, Tubelight is setting records before the release. As per reports, Sony Music has acquired the music rights of the movie at astonishing amount of 20 crores. The thing that makes this news more staggered, is the album has only 3 songs. Few days back, there was a buzz related to it’s theatrical rights. If the news is to be believed, then the makers have sold the all India distribution rights of Tubelight to NH Studioz at whopping amount of 130 crores. With which, it has dominated the record of Shahrukh Khan’s Dilwale (125 crores). Peeping into the past records of Kabir Khan & Salman Khan duo, then their previous collaborations 2012’s Ek Tha Tiger (198.78 crores) and 2015’s Bajrangi Bhaijaan (320.34 crores) are the top grossing movies of the superstar. This is why the third one is strongly expected to take box office by storm. Tubelight went on floor from 28 July last year and now it’s shooting has been completed. Salman Khan, Chinese actress Zhu Zhu and Sohail Khan starrer this historical war drama is slated to be released this Eid. This is the first time, when Salman is playing as an Army officer. After completing the shooting of Tubelight, now Salman Khan has commenced the shooting of Ek Tha Tiger’s sequel, Ali Abbas Zafar’s directorial Tiger Zinda Hai with Katrina Kaif in Austria.
/*- * << * UAVStack * == * Copyright (C) 2016 - 2017 UAVStack * == * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * >> */ package com.creditease.uav.feature.runtimenotify.task; import java.util.ArrayList; import java.util.Date; import java.util.HashMap; import java.util.List; import java.util.Map; import java.util.Map.Entry; import com.creditease.agent.helpers.DateTimeHelper; import com.creditease.agent.helpers.JSONHelper; import com.creditease.agent.helpers.NetworkHelper; import com.creditease.agent.helpers.StringHelper; import com.creditease.agent.monitor.api.NotificationEvent; import com.creditease.uav.cache.api.CacheManager; import com.creditease.uav.cache.api.CacheManager.CacheLock; import com.creditease.uav.feature.RuntimeNotifyCatcher; import com.creditease.uav.feature.runtimenotify.NotifyStrategy; import com.creditease.uav.feature.runtimenotify.Slice; import com.creditease.uav.feature.runtimenotify.StrategyJudgement; import com.creditease.uav.feature.runtimenotify.scheduler.RuntimeNotifyStrategyMgr; public class JudgeNotifyTaskForTimer extends JudgeNotifyCommonTask { private NotifyStrategy stra; private long taskStart = System.currentTimeMillis(); private long judge_time; private static final String LOCK_REGION = "lock.region.uav"; private static final long LOCK_TIMEOUT = 60 * 1000; private CacheManager cm; public JudgeNotifyTaskForTimer(String name, String feature, long judge_time, NotifyStrategy stra) { super(name, feature); this.stra = stra; this.judge_time = judge_time; cm = (CacheManager) this.getConfigManager().getComponent(feature, RuntimeNotifyCatcher.CACHE_MANAGER_NAME); } @Override public void run() { CacheLock lock = null; try { lock = cm.newCacheLock(LOCK_REGION, stra.getName(), LOCK_TIMEOUT); if (!lock.getLock()) { return; } //get the type of source instance,like 'hostState'.For convert it to another type's instance String instType = stra.getName().substring(stra.getName().indexOf('@') + 1, stra.getName().lastIndexOf('@')); long judge_time_minute = judge_time - judge_time % 60000; /** * Step 1:find out instance */ for (String instance : stra.getInstances()) { /** * Step 2: judge the strategy */ StrategyJudgement judgement = (StrategyJudgement) getConfigManager().getComponent(feature, "StrategyJudgement"); /** * we add "_" to the end of each instance in hostState strategy for stream judge, we should remove it in timer judge. */ if(instance.endsWith("_")) { instance = instance.substring(0,instance.length()-1); } Slice slice = new Slice(instance, judge_time_minute); Map<String, Object> args = new HashMap<String, Object>(); // 标识该slice由TimerTask创建,为同环比创建,非流式计算创建 args.put("creater", "timer"); args.put("instType", instType); slice.setArgs(args); Map<String, String> result = judgement.judge(slice, stra, null); /** * Step 3: if fire the event, build notification event */ if (result != null && !result.isEmpty()) { NotificationEvent event = this.newNotificationEvent(instance, result, stra.getConvergences()); // get context putContext(slice,event); // get action putNotifyAction(event, stra); // get msg tempalte putNotifyMsg(event, stra); if (this.log.isTraceEnable()) { this.log.info(this, "RuntimeNotify Notification Event Happen: event=" + event.toJSONString()); } this.putNotificationEvent(event); } } } catch (Exception e) { log.err(this, "JudgeNotifyTimerTask RUN FAIL." + " StrategyDesc=" + stra.getDesc() + ", StrategyName=" + stra.getName() + "\n", e); } finally { if (lock != null && lock.isLockInHand()) { lock.releaseLock(); } } if (log.isDebugEnable()) { long cost = System.currentTimeMillis() - taskStart; String detail = cost < 10 ? "" : " detail:strategy=" + JSONHelper.toString(stra); log.debug(this, "whole task lifecycle COST: (" + cost + ")ms" + detail); } } /** * get context * * TODO: we need support context param in strategy */ private void putContext(Slice slice, NotificationEvent event) { Map<String, Object> args = slice.getArgs(); for (String key : args.keySet()) { Object argVal = args.get(key); String jsonstr = JSONHelper.toString(argVal); event.addArg(key, jsonstr); } } /** * newNotificationEvent * * * @return */ private NotificationEvent newNotificationEvent(String instance, Map<String, String> result, List<String> convergences) { String ip = instance; String host = instance; String appgroup = "UNKNOWN"; instance = formatInstance(instance); Map<String, Object> infos = getInfoFromSliceCache(instance); if (infos != null) { ip = String.valueOf(infos.get("ip")); host = String.valueOf(infos.get("host")); appgroup = String.valueOf(infos.get("appgroup")); } StringBuilder desc = new StringBuilder(); List<String> conditionIndex = new ArrayList<String>(); for (Map.Entry<String, String> cause : result.entrySet()) { // description desc.append(instance + "触发条件[" + cause.getKey() + "]:").append(cause.getValue()).append("\r\n"); // condition index conditionIndex.add(cause.getKey()); } String title = ip + "[" + instance + "]触发" + result.size() + "个报警(条件序号: " + conditionIndex.toString().replaceAll("\\[|]|,", "") + ")"; // fix &nbsp(\u00A0) can be shown in email String description = desc.toString().replace('\u00A0', ' '); NotificationEvent ne = new NotificationEvent(NotificationEvent.EVENT_RT_ALERT_THRESHOLD, title, description, judge_time, ip, host); ne.addArg("appgroup", appgroup); ne.addArg("strategydesc", stra.getDesc()); // 兼容不存在convergences属性的旧预警策略 if(convergences == null || convergences.size() == 0 ) { return ne; } // 同一个Event由多个策略触发时,梯度收敛以最长的为准 String conv = obtainConvergenceForEvent(convergences, conditionIndex); if(!StringHelper.isEmpty(conv)) { ne.addArg("convergences", conv); ne.addArg(NotificationEvent.EVENT_Tag_NoBlock, "true"); } return ne; } private String formatInstance(String instance) { if (NetworkHelper.isIPV4(instance)) { instance += "_"; } instance = stra.getName().substring(0, stra.getName().lastIndexOf('@') + 1) + instance; return instance; } private Map<String, Object> getInfoFromSliceCache(String instance) { int min = Integer.parseInt(DateTimeHelper.dateFormat(new Date(), "m")); min = min > 0 ? min - 1 : 0; String cacheKey = "SLICE_" + instance + "_"; for (; min < 60; min++) { String result = cm.lpop(RuntimeNotifyStrategyMgr.UAV_CACHE_REGION, cacheKey + min); if (result != null) { Slice s = new Slice(result); return s.getArgs(); } } return null; } private void putNotifyAction(NotificationEvent event, NotifyStrategy stra) { Map<String, String> actions = stra.getAction(); if (actions == null || actions.isEmpty()) { return; } for (Entry<String, String> act : actions.entrySet()) { event.addArg("action_" + act.getKey(), act.getValue()); } } private void putNotifyMsg(NotificationEvent event, NotifyStrategy stra) { String msgTemplate = stra.getMsgTemplate(); String msg = makeMsgByTemplate(msgTemplate, stra); if (msg != null) { event.addArg("msg", msg); } } /** * * @param template * @param slice * @return */ private String makeMsgByTemplate(String template, NotifyStrategy stra) { return ""; } }
Q: Hashbang priority vs clean url Hi I am a newbie in google analytics.I have implemented a site with angularjs and Rails.Because of the use of angularjs the url generated is with hashbang(#!) for eg:-www.abc.com/#!/xyz Now I have made the website crawlable by google with the help of escaped fragment.So the website is crawlable and the results are shown in google. Now the SEO professionals in our office is telling me that a cleaner url ie without hashbang (www.abc.com/xyz) has more priority in results. All I want to ask is,is this true and will it not create duplicate pages if implemented. A: No, the URL alone does not affect ranking in any visible way. That said, if you're creating a new site, I'd recommend using HTML5 pushState/replaceState instead: serve a fully rendered page on first load, use the history API to navigate within the site. AJAX-crawling is still supported (at least by Google), but there are cleaner alternatives nowadays.
How are these for alarming statistics: With more students than ever applying to college—a full 1.2 million more last year than in 2000—not even flawless SAT scores can open doors at Harvard, which rejects one in four applicants with a perfect 2400. Is your kid ranked first in his class? So are some 36,000 others: Last year, Penn and Duke rejected about 60 percent of the valedictorians who applied. If you know anyone in high school (or preschool) you’re already aware that the annihilative admissions climate has spawned a new hyperspecies: the college super-applicant. But do so many hours spent filling in practice circles or hunching over petri dishes really work? We recruited some of the area’s most credentialed college hopefuls, who gamely volunteered to have their grade-point averages, standardized test scores, after-school pursuits, and academic awards reviewed by Katherine Cohen, CEO and founder of IvyWise, a school-admissions consulting company. Cohen assessed their strengths and weaknesses and made a guess where each student will get in. She stresses, however, that this is only a partial picture; she’d need to see transcripts, essays, AP course load, and written recommendations to make an accurate evaluation. Disclaimer: The following material may not be suitable for anxiety-prone high-school students. Photo: Mackenzie Stroh Courtney Sachs Convent of the Sacred Heart, Manhattan GPA: 97 SAT: 2340 (800 reading, 770 math, 770 writing) AP scores: English lit (5), French language (5), and U.S. history (5) Academic honors: Bausch & Lomb Science Award, given to one junior per participating school. Ranked in the U.S. top 10 in the National French Contest. Wellesley Book Award for academic leadership, given to one junior per participating school. Ranked in the top 30 of the Catholic School Mathematics League. Extracurricular activities: Stem-cell researcher at New York-Presbyterian’s Columbia University Medical Center, approximately twenty hours per week. Wrote a research paper on the in vivo and in vitro growth of osteoblasts derived from fat stem cells. Has begun research on the repair of rat cranial defects using osteocytes differentiated from fat-derived stem cells. Editor-in-chief of the yearbook. As a senior leader of Helping Hearts (the school philanthropic group), organized a fashion show to raise money to build a well in a village in India. Volunteers at Lenox Hill Hospital and Habitat for Humanity. Tutors disadvantaged students. Member, Model U.N. Applying to: Princeton (early), Harvard, Yale, Brown, University of Pennsylvania, Cornell, Columbia, University of Chicago, Stanford, and Duke. Her chances: “The fact that she has been doing independent research since ninth grade shows commitment to a single cause or passion, which the most selective colleges like to see. She is academically qualified to attend any college, but it is also important that she is not simply locked away in a lab all year; she is involved in her high school as editor-in-chief of the yearbook. I believe she has a strong chance of getting into Princeton early.” Photo: Mackenzie Stroh Paul White Urban Assembly School for Careers in Sports, the Bronx GPA: 92 SAT: 1930 (710 reading, 650 math, 570 writing) AP scores: Statistics (4), U.S. government (4), psychology (5) Academic honors: Student of the Year (2004), for achieving highest GPA in his grade. Extracurricular activities: One of 60 students (chosen out of 400) to participate in Leadership Enterprise for a Diverse America (leda), a fourteen-month academic program that includes Wednesday-evening and Saturday classes during the school year and summer sessions at Columbia. Works fifteen hours a week at leda to supplement his family’s income. Research assistant for a Ph.D. candidate in the government department at Harvard. Member, Model U.N. Wrote application essay about his brother’s imprisonment at Rikers Island. Sports: Linebacker on high-school football team (grades 9 to 11). Applying to: University of Pennsylvania (early), Amherst, Boston College, Bowdoin, Brown, Case Western Reserve, Cornell, Davidson, Emory, Georgetown, Morehouse, University of Virginia, and Wesleyan. His chances: “His SAT score looks mediocre for Penn—especially his writing score—but it still puts him in the right range for a minority, socioeconomically disadvantaged student. He has a shot at Penn, which likes kids who put their ideas into action, and he seems to do that. When you consider the huge time commitment leda classes take, the fact that he is still actively involved in his high-school community shows superb time-management skills.” Since 1993, the number of students applying to Columbia each year has nearly doubled. Photo: Mackenzie Stroh Vadim Shteyler Brooklyn Technical High School GPA: 94.4 SAT: 1960 (650 reading, 750 math, 560 writing) AP scores: World history (4), biology (5) Academic honors: National Honor Society. Extracurricular activities: Volunteers at a suny Downstate Medical Center lab, running experiments on pancreatic carcinoma. Wrote research papers on the affects of p53-derived peptide on pancreatic-cancer-cell growth, submitted to the American Cancer Society and American Association for Cancer Research. Involved in student government since freshman year. One of three student-government members to teach a leadership class. Member, the Brain Bee Club, an array of other clubs. Sports: Member, Ping-Pong club (takes outside lessons as well). Applying to: Yale, Cornell, Columbia, cuny Honors College, suny–Binghamton, B.A.-M.D. programs at Brooklyn College and suny–Stony Brook. His chances: “Yale, Cornell and Columbia might be a stretch, but he definitely has a shot at the others. His SAT score is unbalanced, but his work with pancreatic carcinoma is very impressive, his GPA is strong, and he’s a leader at school. However, he seems to be a serial joiner. A red flag is the Ping-Pong club, given the fact that he has little community service.” Photo: Mackenzie Stroh Jeremy Sklaroff Edgemont High School, Scarsdale, New York GPA: Doesn’t have one because some of his classes aren’t graded. SAT: 2200 (760 reading, 700 math, 740 writing) AP scores: Computer science A (4), biology (5) Academic honors: One of twelve students a year selected for Edgemont’s alternative school within a school (no tests or written evaluations). Ranked nationally in the National Forensic League at the mid-level—Special Distinction. Cornell Book Award for academic achievement (2006), given to one junior per participating school. Extracurricular activities: Member, jazz band and wind ensemble for four years. Interned at New York Civil Liberties Union and Autonomedia. Applying to: Columbia (early), Tufts, Brown, Washington University in St. Louis, NYU, Wesleyan, and University of Chicago. His chances: “As part of the alternative school, he is already distinguished from his peers. His SAT scores are high except for math. His main activity is debate, and his rank is distinguished, but he is not at the top level. I think he has a chance of getting into Columbia, but it will probably depend on the other debate applicants he is competing with and the type of debate he wants to pursue.” Photo: Mackenzie Stroh Matthew Pincus Dwight-Englewood School, Englewood, New Jersey GPA: 3.93 SAT: 2270 (750 reading, 720 math, 800 writing) AP scores: Calculus B/C (5), European history (5), Latin lit (5) Academic honors: One of 22 students nationwide to achieve a perfect score on the National Latin Exam three years in a row. One of 385 students nationwide to win four gold medals for the written portion of the exam. Winner of his school’s Gaudeamus Latin Award (2006), given to one student a year for “the most exuberance in the study of Latin.” Extracurricular activities: Serves as student body president. Undertaking an independent study of Attic Greek—not for credit. Co-president of jazz-rock ensemble (plays guitar). Member, varsity debate team. Worked as a tutor after school and during the summers. Sports: Cross-country and track (grades 9 to 12). Co-captain of varsity cross-country team. Named the team’s Most Valuable Male Runner (2006). Applying to: Williams (early), Georgetown, Wesleyan, Swarthmore, Middlebury, and Amherst. His chances: “What looks outstanding is his excellence in Latin, and I like the fact that he is doing an independent study of Greek. This shows he is a self-starter and autodidactic. Plus he is a leader at school. Even more impressive, he manages this workload and the responsibilities of student-government president with employment. I think he has a good chance of getting into Williams.” Princeton rejected four out of every five valedictorians who applied last year. Photo: Mackenzie Stroh Allie Ossa The Mary Louis Academy, Jamaica Estates GPA: 4.57 SAT: 2140 (700 reading, 690 math, 750 writing) AP score: U.S. history (5) Academic honors: Won a trip to Italy from New York’s Italian Heritage and Culture Month Committee for her essay on Amerigo Vespucci. Honorable mention from American Association of Teachers of Italian for score on nationwide Italian exam. One of about 50 tri-state students selected for the American Chemical Society’s Award for Excellence in High School Chemistry. School Leadership Award for her work with the dance team. National Hispanic Recognition Program Scholar for scoring in top 3 percent of Hispanic students nationwide on the PSAT. Contender for valedictorian. Expects to be the first in her family to attend college. Sports: Third-degree black belt in karate. One of 40 members of the USA Junior National Team for karate. Captain of the school dance team. Applying to: Yale (early), MIT, Columbia, Harvard, Caltech, and Northeastern. Her chances: “Academically, she is outstanding as a contender for valedictorian. Given her background, her scholastic achievements and commitment to karate look all the more impressive. I think her college list is problematic because it is not balanced; there is only one safety school: Northeastern. But I think she may have a shot at getting into Yale early depending on what she wants to pursue academically.” Photo: Mackenzie Stroh Harmain Khan Staten Island Technical High School GPA: 98.41 SAT: 1920 (660 reading, 600 math, 660 writing) AP scores: World history (4), English language (4) Academic honors: His paper “Tracing Early Hominid Migration in India: ESR Dating at Hathnora and Devni-Khadri” won the First Place Grand Award at the Intel Student Research Contest, first place for the Geological Society of America, second place for the American Geological Institute, and third place for Sigma Xi (2006). New York City Science and Engineering Fair Grand Prize Winner (2006). NAACP Afro-Academic, Cultural, Technological and Scientific Olympics Gold Medalist for Drama and Chemistry; Bronze Medalist for Oratory (2006). Extracurricular activities: Established a date range for India’s only known Homo erectus cranium and developed a method for dating crocodile teeth. Presented his paper “Developing ESR Dating for Crocodylian Teeth: Stability, Interference Signal Resolution and Applications to Geoarchaeology” at the conference of the Geological Society of America. Captain of the city’s top team in the Envirothon, a national environmental-science competition. Sports: Has run for the past four years on his school’s cross-country team, currently in first place in the Public Schools Athletic League. Applying to: Harvard (early), Princeton, Yale, Dartmouth, and Williams. His chances: “He developed a method for dating crocodile teeth. How many people can say that on an application? He also has participated in his school community by running all four years. If Harvard is looking for a scientist with his particular skills, it will probably admit him despite his scores.” Photo: Mackenzie Stroh Liming Luo Hunter College High School, Manhattan GPA: 97.2 SAT: 2400 (800 reading, 800 math, 800 writing) AP scores: Chemistry (5), U.S. history (5) Academic honors: Vice-president and co-founder of her school’s chapter of Mu Alpha Theta (a national math honors society). Scored 122.5 (fewer than 5 percent of all students score over 100) on the American Mathematics Contest 12, a national math competition. Extracurricular activities: Member, Hunter’s math A-Team, ranked second in New York City. Published “The Mathematics of Tic Tac Toe” in Hunter’s math magazine, Radicals. Co-champion at the 2005 Vassar Invitational Forensics Tournament (approximately 70 schools entered). Volunteered at a Chinese prep school teaching math to eighth-graders for one summer. Writes sci-fi and fantasy in her spare time. Applying to: MIT (early), Harvard, Harvey Mudd, Columbia, Stanford, suny–Stony Brook, Cornell, and Rensselaer Polytechnic Institute. Her chances: “Her perfect SAT score is truly outstanding but not a free ticket. She is applying to many technical colleges, so she will be competing against a lot of other high-achieving math/science kids (and a lot of other Asian students in particular). While she may be admitted to MIT early, I am not convinced she’s a shoo-in—I’d want to see more evidence that she’s giving back to the community.” By 2013, there will be 3.3 million more kids applying to college than in 2000. Photo: Mackenzie Stroh Diana Marin The Hewitt School, Manhattan GPA: 3.9 SAT: 2060 (690 reading, 620 math, 750 writing) AP scores: U.S. history (4), biology (5) Academic honors: National Hispanic Recognition Program Scholar for scoring in top 3 percent of Hispanic students nationwide on the PSAT. Wellesley Book Award for academic leadership, given to one junior per participating school. Performing Arts Award, given to one junior at Hewitt. Extracurricular activities: Founder and president of the Gay-Straight Alliance and co-founder of zap, the Zine Advocacy Project. Editor-in-chief of the newspaper and yearbook. On the Prep for Prep admissions committee. Interned at Lehman Brothers. Member of Students of Color Club, Earth Committee, and Chamber Choir. Sports: Varsity gymnastics team (grades 8 to 11). Teaches gymnastics at the lower school. Applying to: Harvard (early), Beloit College, Brown, Bryn Mawr, University of Chicago, Georgetown, Grinnell, Haverford, MIT, Pitzer, Scripps, and Swarthmore. Her chances: “She is a real pioneer and self-starter. I tell my students that if you can’t find it, found it! I also like the fact that she is a proponent for diversity and combines her own interest in gymnastics with a volunteer opportunity. She’s not doing random community service to collect hours. There is one red flag, which is that she stopped gymnastics this year. Apparently, her school dropped the program; this should be footnoted on her résumé so she does not appear to be a quitter. She has a shot at Harvard depending upon what she wants to pursue; she’s in the range of their typical applicants.” Photo: Mackenzie Stroh Megan Popkin Marymount School, Manhattan GPA: 4.3 SAT: 2230 (730 reading, 700 math, 800 writing) AP scores: European history (5), U.S. history (5) Academic honors: Best Feature Article Award at Columbia University’s Journalism Workshop (2004 and 2005). Represented school at writing competition sponsored by the National Council of Teachers of English. Ranked in the 95th percentile for the eleventh grade in the National French Contest. National Honor Society. Extracurricular activities: Arts and Leisure co-editor of the newspaper and contributor to the literary magazine. Plays drums in the FMs, a band that includes her sister and brother. Percussionist for Marymount Singers. Works for the admissions office and at her parents’ law office. Gave speeches about the black-footed penguin as a docent at the New York Aquarium. Volunteers at a soup kitchen. Spokesperson for Make-A-Wish Foundation after her cancer diagnosis the summer before freshman year. Designed her own physical-therapy plan after treatment left her with acute neuropathy in both legs. Sports: Starter on the varsity field-hockey team. Played varsity softball and junior-varsity basketball. Applying to: Brown (early), Harvard, Yale, University of Pennsylvania, Williams, Amherst, Haverford, Stanford, Pomona, Wesleyan, University of Chicago, Trinity College, Georgetown, and University of Virginia. Her chances: “I love the fact that she plays in a band with her siblings. Maintaining a 4.3 GPA in high school must have been tough given what she went through. This is a girl who has overcome serious obstacles and setbacks and still excelled in high school. She also gave back to Make-A-Wish by becoming a spokesperson; her generosity of spirit is evident. Her story is compelling, and I think she has a shot at getting into Brown early decision.”
#!/usr/bin/env bash # This script parses arguments that were passed to ffmpeg-android-maker.sh # and exports a bunch of varables that are used elsewhere. # Local variables with default values. Can be overridden with specific arguments # See the end of this file for more description EXTERNAL_LIBRARIES=() SOURCE_TYPE=TAR SOURCE_VALUE=4.2.2 API_LEVEL=16 for artument in "$@" do case $artument in # Use this value as Android platform version during compilation. --android-api-level=*) API_LEVEL="${artument#*=}" shift ;; # Checkout the particular tag in the FFmpeg's git repository --source-git-tag=*) SOURCE_TYPE=GIT_TAG SOURCE_VALUE="${artument#*=}" shift ;; # Checkout the particular branch in the FFmpeg's git repository --source-git-branch=*) SOURCE_TYPE=GIT_BRANCH SOURCE_VALUE="${artument#*=}" shift ;; # Download the particular tar archive by its version --source-tar=*) SOURCE_TYPE=TAR SOURCE_VALUE="${artument#*=}" shift ;; # Arguments below enable certain external libraries to build into FFmpeg --enable-libaom) EXTERNAL_LIBRARIES+=( "libaom" ) shift ;; --enable-libdav1d) EXTERNAL_LIBRARIES+=( "libdav1d" ) shift ;; --enable-libmp3lame) EXTERNAL_LIBRARIES+=( "libmp3lame" ) shift ;; *) echo "Unknown argument $artument" ;; esac done # Saving the information FFmpeg's source code downloading export FFMPEG_SOURCE_TYPE=$SOURCE_TYPE export FFMPEG_SOURCE_VALUE=$SOURCE_VALUE # A list of external libraries to build into the FFMpeg # Elements from this list are used for strings substitution export FFMPEG_EXTERNAL_LIBRARIES=${EXTERNAL_LIBRARIES[@]} # Desired Android API level to use during compilation # Will be replaced with 21 for 64bit ABIs if the value is less than 21 export DESIRED_ANDROID_API_LEVEL=${API_LEVEL}
Tuesday, 7 January 2014 Yuzawa Skiing A Dream For Many Years A few years back I was crazy about skiing. I spent all my time and money on that activity, and usually had 50 - 70 days in my telemark boots each season. Then, I got fed up (actually, I got married #FAIL ^). Which for me is somewhat typical (getting fed up that is, not getting married). But last year I once more started skiing. It was like being a little kid once again. Anyway, back in the days my biggest dream was to visit Japan to enjoy the world famous powder on telemark skis. Now I have finally done this. One word: EPIC! Yuzawa From before I had skied at Kusatsu and Sayama. The former with rental alpine skis, and the latter without powder. So I decided to take my telemark skis and leave my Tokyo office ^ for two days for some easily accessible fresh Japanese powder. I decided to stay over for one night, so that I would get two days of skiing. I chose the Hotel Yuzawa Yuzawa ^ (alt. info ^ , on Google Maps ^), and paid 9500 Yen for a room with my own bathroom (7500 Yen without). A wonderful hotel, authentic Japanese style and great service. Read my review on the hotel's Google Plus page ^. Note: to reach this hotel you should get off the stop before Gala, at the Echigoyuzawa station. They will pick you up at the station. Other places to stay, in and around, can be found here ^.
I’ve been thinking for a while that our lifetime notation has too many defaults which can be more confusing than helpful. A recent spate of e-mails on rust-dev brought this back to my mind. I’ve been wanting to take a look at these defaults for a while, so I thought I’d write up a quick exploration of the “syntactic space”. A warning: this is not really an exciting post to read. I hope to have a few of those coming up very soon. This one is mostly just a list of syntactic options I wanted to document for future reference and to serve as a starting point for discussion. Problematic cases The area that most people find confusing is when you have a borrowed pointer inside of a struct. A recent example was this StringReader struct: struct StringReader { value: &str, count: uint } Here, the StringReader contains a borrowed pointer. This means that an instance of StringReader is only valid for as long as its value field is valid. So, every instance of the StringReader must have a lifetime, and that lifetime is the same as the value field within. The compiler in fact infers which structs contain (directly or indirectly) borrowed pointers and thus must have an associated lifetime. It’s all very automatic. If we were to require a more explicit notation, the declaration of StructReader might look something like this: struct StringReader/&self { value: &self/str, count: uint } Here, the trailing /&self that appears after StringReader indicates that instances of the StringReader type are associated with a lifetime “self”. Moreover, the value: &self/str states that the value field is a string with this same lifetime. What is in fact happening here in terms of the formalism is that the StringReader type has a lifetime parameter named self . In other words, StringReader/&self is a generic type, just like Option<T> , except that it is not generic over a type T but rather over the lifetime self . It is of course possible to have a type like Foo/&self<T> , which is generic over both a lifetime self and a type T . One thing which would sometimes be useful (but which is currently unsupported) is the ability to have more than one lifetime parameter on a struct. There are no theoretical reasons for this limitation, it’s simply that the syntax and defaults we’ve adopted didn’t seem to scale up to multiple parameters. Options There are a fair number of possibilities. I thought rather than write a lot of words, I’ll just enumerate the various options I see. To begin with, here is a program written with the current syntax that demonstrates the various bits of shorthand. struct StringReader { // Lifetime parameter &self is not declared value: &str, // & in a type decl defaults to self count: uint } impl StringReader { fn new(value: &self/str) -> StringReader/&self { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader) -> uint { // ^~~~~~~~~~~~~ & in a fn is a fresh lifetime, so this // is shorthand for &x/StringReader. Moreover, // &x/StringReader is short for &x/(StringReader/&x). return s.value.len() - s.count; } fn value(s: &v/StringReader) -> &v/str { // ^~~~~~~~~~~~~~~ &v/StringReader is short // for &v/(StringReader/&v). return s.value; } Option 2: Fully explicit type declarations but not uses. struct StringReader/&self { // Note explicit decl here value: &self/str, // And explicit reference here count: uint } impl StringReader { fn new(value: &self/str) -> StringReader/&self { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader) -> uint { // As in Option 1 return s.value.len() - s.count; } fn value(s: &v/StringReader) -> &v/str { // As in Option 1 return s.value; } Option 3: Like Option 2, but infer the presence self lifetime parameter on a type decl. struct StringReader { // No explicit decl value: &self/str, // But explicit reference count: uint } impl StringReader { fn new(value: &self/str) -> StringReader/&self { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader) -> uint { // As in Option 1 return s.value.len() - s.count; } fn value(s: &v/StringReader) -> &v/str { // As in Option 1 return s.value; } Option 4: Fully explicit type declarations and uses. struct StringReader/&self { // As in Option 3 value: &self/str, // As in Option 3 count: uint } impl StringReader { fn new(value: &self/str) -> StringReader/&self { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader/&) -> uint { // ^~~~~~~~~~~~~~~ Here we require that the // lifetime parameter on StringReader be // "acknowledged" by the trailing `/&`. Interestingly, // this "&" could either refer to a fresh lifetime // (making this equivalent to &x/(StringReader/&y)) or, // more usefully, refer to the enclosing lifetime // &x/(StringReader/&x). The latter is closer to how // things work today. return s.value.len() - s.count; } fn value(s: &v/StringReader/&v) -> &v/str { // ^~~~~~~~~~~~~~~~~~ Fully explicit. return s.value; } Option 5. Like Option 4, but with alternate syntax that tries to unify lifetime parameters and type parameters. Here the lifetime name goes before the & , as we originally had it. This is required to make parsing unambiguous. struct StringReader<self&> { value: self& str, // ^~~~~~~~~ self& in place of &self/ count: uint } impl StringReader { fn new(value: self& str) -> StringReader<self&> { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader<&> -> uint { // ^~~~~~~~~~~~~~~~ as in Option 4, we must select // which of the two possible meanings. return s.value.len() - s.count; } fn value(s: v& StringReader<v&>) -> &:v str { return s.value; } Option 6. Another alternate syntax for Option 4, where the lifetime names are preceded by a : . struct StringReader<:self> { value: &:self str, count: uint } impl StringReader { fn new(value: &:self str) -> StringReader<:self> { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader<:>) -> uint { return s.value.len() - s.count; } fn value(s: &:v StringReader<:v>) -> &:v str { return s.value; } Option 7. Another alternate syntax for Option 4, where region parameters appear in {} . struct StringReader{self} { value: &{self} str, count: uint } impl StringReader { fn new(value: &{self} str) -> StringReader{self} { // ^~~~~~~~~~~~~~~~~~ I opted // not to include an extra `&`. StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader{}) -> uint { // ^~~~~~~~~~~~~~~ The trailing `{}` indicate we should // use a default lifetime. Again we must decide precisely // what this means. I think the best semantics would be // to take the lifetime of any enclosing `&`. If there // is no enclosing `&`, it could be an error, or else a // fresh lifetime. return s.value.len() - s.count; } fn value(s: &{v} StringReader{v}) -> &{v} str { return s.value; } Option 8. Like Option 7, but allow the list of region parameters to be omitted on reference to a type if you just want the defaults. struct StringReader{self} { value: &{self} str, count: uint } impl StringReader { fn new(value: &{self} str) -> StringReader{self} { StringReader { value: value, count: 0 } } } fn remaining(s: &StringReader) -> uint { // ^~~~~~~~~~~~~ Trailing `{}` not required as we will // use defaults. return s.value.len() - s.count; } fn value(s: &{v} StringReader) -> &{v} str { // ^~~~~~~~~~~~~ As above. return s.value; } Conclusion
Want thee one of 1000 keys to get access to the Crasher beta? It’s a motorised arena combat multiplayer from Punchers Impact, pitching teams of five against each other in vehicular mayhem. Then what you need to do is be quick, and nothing more. Below, after more details about the game, you’ll find a form you can fill in. The first 1000 people to do so by 9PM GMT will secure themselves a Steam key, that will be magically emailed to you by a combination of wizardry and science, hopefully by tomorrow morning. You’ll know if you were too late, because you won’t get an email. And the crying. So, you’re asking, what is Crasher. Well, in their own words… • Crasher is a new, fast-paced Multiplayer Online Battle Arena (MOBA) that renews the genre! Motorized team battles opposing two 5-player teams provide an unforgettable game experience! • In Crasher, select a vehicle among 6 different classes and load it with a host of unlockable items. Find the balance that matches your skills and turn your favorite vehicle into a full-fledged war machine! • Crasher is a truly dynamic game with an arcade-style driving approach. Teamplay is at the very heart of the game, so be strategic and work with your team if you want to succeed! • Crasher offers two different game modes: Crasher Territory Control and Crasher Battle Arena, for twice the fun! • Crasher is THE new e-sports and recently joined the Electronic Sports League (ESL), so if you want to show off your MOBA skills, you’d better join the Crasher community. And don’t forget that team play is the key to success in Crasher! So if you wants you some of that, fill in your details in this form. Then stare at the white space at the end and imagine where you’ll be in ten years: Aaaaaaaand time’s up.
"(BREATHES DEEPLY)" "You deserve this..." "You do." "You've earned it." "(GROANS)" "I can do all things." "All things." "Come on..." "Come on, come on..." "(FOOTSTEPS)" "I am the Invigilator." "Listen carefully to every word I say." "There will be no repetition." "I won't apologise for the hardships you've endured reaching this room 'cause the pressures and pains were necessary." "Resilience is a key attribute in these dark times, and if you can't survive our selection process, you won't survive in the job." "Many highly-qualified candidates tried to get this far and failed." "You have succeeded." "And now the final stage lies before you." "One last hurdle separates you from your goal - which is to join our esteemed ranks." "The test is simple in comparison, yet it will determine who leaves this room with a contract of employment and who leaves with the bus fare home." "Through these trials, you've gained some idea of the power of this organisation, so believe me when I tell you that there's no law in this room but our law." "And the only rules in here are our rules." "There's one question before you, and one answer is required." "If you try to communicate with myself or the guard, you will be disqualified." "If you spoil your paper, intentionally or accidentally, you will be disqualified." "If you choose to leave the room for any reason, you will be disqualified." "Any questions?" "Best of luck, ladies and gentlemen." "We're giving the eight of you 80 minutes." "80 minutes to convince us you have what it takes to join us." "80 minutes to determine the next 80 years of your lives." "Begin." "I'm not finished." "No, please." "You can't!" "This isn't a proper test!" "Please, I'll start over!" "Just give me a chance!" "(SHE CRIES)" "(SPEAKS in CANTONESE)" "Hey..." "Listen, listen, listen, listen." "It's not about what he said, you know." "It's what he didn't say." ""lf you attempt to communicate..."" "..with myself or the guard... ..you will be disqualified." " He didn't say..." " ..we can't speak to each other." " Now you're talking." " Is this the ultimate mind-fuck or what?" " Has anyone figured out the answer?" " No." "It's not about the answer." "It's about the question." " What's the question?" " We've got 74 minutes left to figure out." "(WOMAN) If the answer takes one minute to write down." "If it takes 73 minutes to write, we have one minute to guess the question." "We're short on writing space." "I'm betting it's the former." "We've gotta help each other." "We're in competition." "Why should I help you to beat me?" "We may be in competition to answer the question, but to establish the question we have to cooperate." "They expect us to cooperate, don't they?" "What'd you expect, you're gonna win this job, with all the rewards that come with it, by giving them a little simple written answer?" "Facts and opinions?" "Compare and contrast (!" ")" "They're not looking for that." "A job like this needs initiative, observation..." "..interplay." " Teamwork." "He's right." " (WOMAN) We're in a stress scenario." "A confusing, time-critical situation designed to test our intelligence, and resilience." " To bring out the worst in us." " (MAN) Or the best." "We help each other until the playing field is open then it's every man for themselves - no offence, girls." " Are we all agreed?" " Yes." "Agreed." " Let's go, Gandhi." " My name isn't Gandhi, friend." "It's..." "No names." "Not real ones, anyway." "They're not written on this for a reason." "We'll use nicknames, then." " All right, let's make this easy." " We already have numbers." "Yeah, and visual." "You're Black." "I'm White." "You're Brown." "We've got Blonde here," "Brunette there... ..Dark, I suppose." "And last as well as least we've got Deaf." " Tough last round." " Yeah, whatever." "Any objections?" "Apart from your grossly insensitive sexual and racial stereotyping?" "If you're the sensitive type, you shouldn't be here, love." "I'll take Brown over Gandhi, we're talking about something that matters." "I'll take that as a yes." "(sighs DEEPLY)" "So, what else hasn't he forbidden?" "He hasn't forbidden us to stand, has he?" " Well, I guess moving about is OK too." " What's that gonna achieve?" "I don't know, Brown." "But sitting wasn't getting us anywhere exciting." "What if the question is written down but we just can't see it?" "That's what I'm talking about!" " You mean like invisible ink?" " Or a watermark." " It's possible." " It's probable." "Where else would it be?" "(BRUNETTE) We'd need something to reveal it." "Like light." " Right." " Those are halogen." "Those aren't." "They won't bite, you know." "They're not gonna make it that easy, are they?" "We're on the clock." "How hard can they afford to make it?" "What if the pencil isn't just for writing the answer?" "What if it reveals the question too?" "By shading the page, like tracing paper?" " Try it, Blonde." " No." "Remember what he said." "If you spoil your paper, intentionally or accidentally... ..you'll be disqualified." "Is anyone certain they know what his definition of spoiling is?" "Look, let's crack this." "Throw out some ideas." "What if the questions are hidden in the paper, but each of us has to write a different answer?" "He said..." "There's one question before you, and one answer is required." "That doesn't mean it's the same question for each of us." "There could be eight different questions and answers." "If we find one question, we can find them all." "Not necessarily." "Not if our eight individual questions can only be revealed using eight different methods." "Perhaps we're not meant to cooperate at all." "I like that idea." "Or there's only one question, printed on only one of our sheets." " Then we'd need to cooperate..." " Time-out for some testing." " Everyone up to the light." " I said it won't be that easy." "Unless you want to make a list of our brainwaves, White," "I say we cross a few off as we go." "Fine." "(WHITE) Allow me." "Thank you." "Yeah, join in any time, Deaf (!" ")" "Not one for small talk, are you?" "Come." "Relax, you'll get it back (!" ")" "Like I said, I think we can strike light off the list." "Light is a spectrum." "There's light we can see, but there's light we can't see." "Like ultraviolet, infra-red, X-rays." "If we can't see it, how are we supposed to find it?" "The source must be visible, even if the light isn't." "Right?" "(sighs DEEPLY)" "Find the light switches." "There aren't any, not in here anyway." "And..." "If you choose to leave the room for any reason... ..we'll be disqualified." "There must be some way to trigger these." "This is emergency lighting." "So let's create an emergency." "That would be very risky." " It's less risky than doing nothing." " He's right." "If we try this and fail, we can't go back." "Blackout." "We vote." "Those too." "Nice!" "Very nice!" "Touch of blue, what you wanted?" "This is black light." "The kind credit card firms use to reveal their security symbols." "(WHITE) Shame we didn't apply to work for Visa (!" ")" " Our gamble might have paid off." " (BROWN) lt did pay off." "Just not in the way you wanted." "You acted, and the room reacted." "We've entered a dialogue now, we should keep going." "Yeah, maybe..." "Maybe not." "Sorry, it was invisible light you said you wanted." "This looks pretty fucking visible to me." "Scientific term for it is "near-ultraviolet"." "It didn't work, but it was worth trying." "If nothing else we'll come out of this with great tans." "We've got to knock these out too." "The top halves of these strips aren't lit." "Look." "Infrared." "The other option." " That exposes something too?" " It's less common than UV, but yes." "Art historians use it to make reflectograms of the sketch outlines beneath paintings." "If there's a hidden layer in our papers..." "Carefully." "Let me guess, "near-infrared"?" "All right, everyone, try again." " Anyone?" "Anything?" " (DARK) No." " (BRUNETTE) Shit!" " (GRUNTS)" " Now can we get off the lighting?" " If you can provide a better alternative." "Any alternative." "We've burned a quarter of our time already." "Perhaps they company's Japanese-owned and this is an origami exam." "Be our guest." "That sheet is yours to spoil." "Yes, it is, but only your sheet." " It's a piece of paper." " No, it's more than that now." "This is experimental material." " If you spoil..." " ..your paper." " Your paper!" " ..you will be disqualified." "This isn't mine." "This is hers." "(lN HIGH-PlTCHED voice) "It's not fair" (!" ")" "And she's gone." "So..." "Tracing..." "Well, congratulations, Blonde." "Your idea sucks too." "This could all be a distraction, you know." "We could be missing something obvious." "Yeah, yeah, yeah!" "All right!" "Light does not work, lead does not work..." "Liquid!" "Oh, yeah..." "Right." "Lick it, spit on it, get it wet." "If the question's watermarked we need some liquid to bring it out." " (BLACK) What are you doing with yours?" " You don't wanna know." " Actually, we do." " Well, you can come and watch." "You can hold it for me too if you like." " Though I'd prefer it if Blonde did." " (BLACK) That's disgusting." ""By any means necessary", right, brother?" " If we can do it, we should." " (URlNATES)" "That's not gonna burn the question out." "Urine's sterile." "You can drink it..." " (TO HIMSELF) Wish you would." " Great." "A pissing contest." "(BLACK) Anything?" " I can't tell yet. lt's all yellow." " (BLACK) Hold it up and let us see." "If you'll lend me a glove, I'll oblige." "Well, I'm running out of ideas." "Giving up so easily, Black, with 57 minutes on the clock?" "You know what..." "Will you two shut up?" "Some of us are trying to think!" "(GASPlNG)" "At last, he speaks." "(DARK) He's French." " (DEAF) Vous voyez la?" " Does anyone here speak French?" "Vous voyez la?" "Can you see?" "Vous voyez...?" "Regardez bien." " Can you see it in there?" " See what in there?" "See what?" "Pretty colours?" " Vous-meme." " Yourself." "Vous vous voyez." "It shows you yourself." " And then there was six." " Leave him alone." "He's done nothing." "He's done nothing for me either or any of us." "Nutter!" "Toujours y voir clairement est primordial." "To see clearly is all." "All right, that's enough out of you, Sartre!" "Fucking philosophers." "Thank God this world belongs to the doers, not the thinkers." "Since we're proposing grand theories, let me advance one of my own." "This is not an exam." "Not in the conventional sense anyway." "Look around." "You couldn't ask for a more representative group to qualify for the final stage." "Four men and four women entered this room, all from differing cultures and ethnic backgrounds, possessing a healthy mixture of skill-sets." "How convenient that is." "How staged." "What are you saying?" "They rigged the tests to bring us together?" "Some kind of experiment in group dynamics." " What are you on about?" " I'm saying this is a game." " And they're betting on us." " Right and who is "they"?" "The board." "I guess they're watching us right now." "They'll be ex-VCs mostly." "Probably left the incubator when they realised their little start-up had struck the motherlode." "It wouldn't get any sweeter than this, I'm sure." "So they joined the board, secured some big fat stock options and bought themselves the right to have a little fun..." "With us." "Don't they have better things to do with their time?" "Like what?" "At their level, money ceases to be the prime motivator." "It's risk they live for." "They're type A's, like us, and just as they were trained by their investment companies, they're still betting on ideas today." "Ours." "Who'll decipher the question, who'll come up empty and fold and who'll crack under pressure?" "You could be wrong." "It could just be the Invigilator behind there." "Wanna bet?" "(DARK) I wouldn't, if I were you." "Brown talks like a gambler because he is one." "A professional." "Aren't you?" "And you, Dark, are a shrink." "Psychologist or psychiatrist?" "I forget the difference." "Psychiatrists dispense drugs to control mood." "I'm a qualified student of human behaviour." "Then you should know what I'm talking about." "The point of having power is to exercise it in all its forms." " We're pawns of the Gods in here." " So?" "This changes nothing!" "(BLACK) Yeah..." "Games are played to be won..." "as a team." "Yeah, or as individuals." "Not if the only way for them to win is for us to lose." "All of us." "Have you thought about that?" "You're wrong." "There is no 'them' watching us." "The CEO is hands-on." "He micro-manages anything of importance to his company." "And this is no ordinary selection process." "We're special." "If anyone's back there besides the lnvigilator, it's him." "Everyone else is a secretary in his structure - even board members." "That's how he likes it." "How do you know all this?" "We're wasting time." "There's 50 minutes left, we're no closer to finding the question." "Somehow I suspect my question relates to the question." "So answer me." " How did you learn that information?" " Same way you learned about the board." "I don't know anything about the board." "I made an educated guess." "But you...you know who the CEO is and what he's like." "How come?" " How come you don't?" " How could we?" "We were headhunted." " Why?" "Weren't you?" " Of course not!" "I heard there was a vacancy and applied." "I thought we all did!" "Are you saying you wanna work for this company, jumped through every hoop to get here but you don't know who they are?" "They listed salary and benefits." "The job description detailed," ""A high level of responsibility in a Fortune 500 company manufacturing state-of-the-art technology in a core service industry"." "All right?" " You didn't wanna know anymore?" " The deal was no questions asked." "Anyone would've done the same in our position..." "Anyone with...balls." " You all applied?" " Yeah." "If this job is so prestigious, why they need to advertise?" " They didn't." " We have our sources." " Looks like we're outnumbered." " I wouldn't cry about it." " You've the edge over us now." " How's that?" "You're wanted, aren't you?" "They invited you to apply." "I'd say we're disadvantaged because you showed the initiative to apply." "We're behind the curve now." "So tell us what you know, starting with a complete job description." " We don't have that information." " Should we believe that?" "(BLACK) We don't know any more about the job." "We just know about the company and, believe me, the worst job with them beats the best anyone else can offer." "He's right." "Who they are, who the CEO is and what he's achieved, that's all you need to know." "All right, so tell us about it." "I'll give you a clue." "1 0 years ago a lot of healthy young people around the world got sick and started dying." "You may have read about that." "Then a medical researcher patented a virus suppressant." "The mortality rate halved in six months, and now his company is the biggest player in the global health industry with a turnover of $20 billion and a market capitalisation of $60 billion." "If it was a nation state, it would rank as the world's eighth largest economy." "Next year that rises to sixth." "You may have read about that too." "Biorg!" "(DARK) 80 minutes... ..to determine the next 80 years of your lives." "Remember?" "Longevity is what they do." "Antisense drugs, gene therapy, microsurgical applications." "They announced a hiring freeze last year!" "Everyone knows that." "Publicly that's true." "Privately...they're expanding again." "Gearing up for a big push of some kind." "They've found a cure." "They must have!" "Manufacturing and marketing would triple in size for the roll-out." "There'd be jobs for all of us!" " We don't know that." " But it's possible, isn't it?" "How long would FDA approval take, if it's true?" " That's not my field." " Hold on." "Why are you so interested?" "Something you want to tell us?" "If you're asking "Am I infected?", White, the answer is "No"." " I'm clean." " But someone you know isn't." "We all know someone with the virus, that's why they call it a pandemic." "Nice evasive manoeuvre, but we're talking about the real reason you're here." "Yeah..." "So, what relative is it?" "Is it your mum?" "Your dad?" "Little sister..." "It's my partner, OK?" "He can't afford suppressants, but they're discounted to employees - are you happy now?" "So who else is a charity case here?" "Yeah, you wouldn't speak up, if you were." "Don't want to commit career suicide on camera like she just has." "(BLACK) With a little help from you." "I didn't create her situation, I just exposed it." "(BLACK) Doesn't matter. lf she gets the answer right, she's still hired." "Really?" "Says who?" "What...them?" " If memory serves me correct..." " The only rules in here are our rules." "They can disqualify everyone!" "They can do whatever they like and we can't do a thing about it." "So...congratulations!" "You've just disqualified yourself without breaking any rules." "He won't kick you out, but you're dead in the water, honey." "Dead in the water." "Don't listen to him." "We'll get through this together." "Thanks, but I don't need your help, because my situation isn't a weakness, it's a strength." "I'm sure they're smart enough to realise that." "And if I could talk to the CEO" "I'd assure him the treatment my partner needs will only deepen my commitment to his organisation for years to come." "You really think he's behind there?" "He's lived behind walls for years." "No one outside his inner circle has even seen him since the lPO." "If he wanted to hire an assistant, this is the way he'd do it." "What are you doing?" "Proving my worth." "You may have run out of ideas, but I haven't." " Don't even try talking to him." " I'm not gonna talk to him." "Is there anything in there, or is he happy to see you?" "What have we here?" "Is that all?" "Heat may have an effect if the papers have been chemically treated." " If we warmed them from beneath..." " It's not heat and chemicals, Black." "It's just chemicals." "What are you talking about?" "H2O?" "We already tried H2O!" "It's in all our bodily fluids!" "What are these pipes connected to?" "You could pump any liquid through them!" "Come on, Einstein" "Good Lord, you're right." "These aren't infrared at all." "They're safelights!" "Common standard-issue safelights!" "We're in a darkroom!" "This room is a great big darkroom!" " And this must be photographic paper." " Meaning we can develop it?" "(BROWN) You hope..." "Developing photos isn't a one-stage process." " It takes chemical baths, fixing agents..." " For colour photography." "To pull black letters from a white background all you need is developing fluid." "Let's do this." "I'm in." "(BROWN) Even if she's right, isn't a chemical shower a bad idea?" "It'll be diluted." "They wouldn't hire damaged goods." "But covering your eyes, nose and mouth may be wise." "(BROWN) They're not the only things worth covering." "That's it: join in at last." "You're deaf but not dumb, eh?" "No worries, love." "Let me." "Let's go." " Well?" " It'll take a few moments." "Where's my paper?" "(SHOUTS) Has anyone seen my paper?" "No!" "(SHOUTS) You bastard!" "Bastard!" "How could you?" "How could you?" "Bastard!" "What did you just do?" "What I had to." "I should punch your lights out!" " (BLONDE) Black, what did you do?" " (BROWN) lt's not what he did." " (BROWN) lt's what he said." " (DARK) What?" "(BROWN) "Lights out"." "So..." "lights up!" " That's better." " Lights out." "(BROWN) Lights up." "Voice-activated." " They're playing with us." " Great, isn't it?" " Everybody watch what you say." " And do." "(SOBBlNG)" "Up one minute, down the next." "Can't write on this anymore, can you?" "Go on, try." "Don't then." "Are you hungry, mate?" "Oi, are you hungry?" "I am. I'm really hungry." "There's no snack machines in here, though, are there?" "Go on, rip it up..." "Oi!" "Rip it up!" " Hey!" "What did I tell you before?" " She said leave him alone, White." " (white) Tear it up!" " White, will you stop!" "Tear it up!" "Tear it!" "(BLACK) I won't tell you again, White!" "That's it, good boy." "Go on." "Go on." "More, more." "Put it in your mouth." "(approaching FOOTSTEPS)" "S'il vous plait!" "And then there were five." " "Bastard" doesn't do you justice." " (white GlGGLES)" "You said we should cooperate until we discovered the question!" "So I lied!" "I lied." "So what?" "Lying is not against the rules, is it?" "Anyway, you don't have to listen to me, let alone agree or obey." "You should thank me." "All of you should thank me." "I've just narrowed down the field, so your odds improve." "Odds mean nothing without the question in front of us!" "You can forget about any more help from us in finding it." "I don't need your help." "You'll find it's you who needs my help." "You know why?" "'Cause I figured it out." "Oh, really?" "The question?" "What is it, then?" "Why should I?" "Because if you don't, I'll beat it out of you." "You're full of shit, White." "You have been from the start." "You don't know anything." "He wouldn't tell us if he did, 'cause he's a narcissist." "He despises us." "Sticks and stones, love." "I bet you say that to all the boys." "Only the ones with Narcissistic Personality Disorder." "There are nine character traits to look for:" "arrogance, grandiosity, a belief in one's uniqueness, a preoccupation with power and success, an excessive need to be admired, a sense of entitlement, lack of empathy and the twin tendencies to envy and exploit others." "For clinical diagnosis, a patient must exhibit five of these." " You tick enough boxes." " You can add a tenth to that list." ""A tendency to see through all the bullshit surrounding you, and rise above it."" " I'll tick that box myself." " Let me tick it for you." " That was smart." " That was necessary." "We may need him." "He's a resource." "You don't like someone?" "Outwit them." "He's an enemy of the group, and a distraction!" "(GRUNTING)" "Are you gonna give me a hand?" " One, two..." " (GRUNTlNG)" "What are you doing?" "Ensuring that he can't cause any more trouble when he wakes up." " And taking him out of the game." " That hardly seems fair." "He's sacrificed his right to fair treatment." "Forward a bit." "See?" "I put him down and suddenly we're cooperating again." "He's a talker." "We could go further than this." "She's right." "We could carry him to the door and slide him out." "He ejected two of us:" "why shouldn't we eject him?" " Call it justice, or karma if you prefer." " You don't believe in forgiveness?" " I'll forgive him afterwards." " And your gospel of cooperation?" "I'll tolerate anyone, except the intolerant." "Those in favour..." "Fifty-fifty." "To each his own." "If you won't think selflessly about this, think selfishly." "The Invigilator said..." "If you choose to leave this room for any reason, you'll be disqualified." "He's not choosing to leave, is he?" "You're choosing for him." "Which puts you at risk too." "Go on, White, spoil yourself." "It's your turn." "(BLACK) Make your mark." "Look, we have less than half an hour left and we still don't know the question." "He claims to know the question." "(MUMBLES)" " Shut up!" " (white MOANS)" "(MUMBLING)" "(PANTS)" "I need medication, it's in my pocket." " What kind of medication?" " What does it matter?" "A pill, all right?" "I need to take it every hour, on the hour." " That's right now." " (BLACK) Every hour, on the hour?" "Only one condition is treated that way." "You're infected too, aren't you?" "That's more than justice." "That's poetic justice." "If you don't believe me, untie my arms, so I can take the pill!" " Go on!" " (DARK) Nice try." "(BLACK) It's pathetic, actually." "Take it yourself." "Get it for me yourself." "It's in my left pocket!" " I'll do what you want." "Just do it." " Really?" "Tell us what the question is then." "All right, get the pill and I'll tell you." "Come on!" "Fucking do it!" "Go on, it's my left pocket." "Go on, try again, it's in there." "Go on." "Where the fuck is it?" "One of you has taken it!" "One of you has fucking taken it!" "This isn't funny!" "You know what happens when you don't take suppressants!" "Unconsciousness." "Convulsions." "Shock." "Coma." "Then death." "We know exactly what happens and the process takes hours, not minutes." "(WHITE GASPING)" "Listen, mate, I'll be out of this for good!" "A taste of your own medicine." " Don't do it, don't do it." " Look on the bright side, brother (!" ")" "If you start to convulse, we'll know you're telling the truth." "Then we'll gladly help you." "Looks like you've got your wish." "For now." "He had to be dealt with one way or another." "I wouldn't be surprised if he was a plant all along." "It's the kind of thing they'd do to stir up our internal dynamics." "To set us against one another." "If so, we've seized back the initiative." "Or you have." "He isn't smart enough to be a plant." "But you on the other hand." "You think she's one of them?" "Don't be absurd!" "I told you I'm a psychologist!" "You claimed to be a qualified student of psychology, not a practitioner." "I've studied psychology too, and reverse psychology." "What better way to hide your true role in this farce than to accuse another candidate of playing your part?" "I don't know what you're talking about." "Amateur psychology is a useful tool for gamblers, but a degree in the subject sounds like the perfect foundation for a career in, say human resources." "You're on the wrong side of the glass." " He's the one who manipulated..." " Maybe you work as a team." "He's got the mouth, but you... ..know an awful lot about Biorg Pharmaceuticals." " I told you I applied!" " So did we." " And I do my research!" " So did we!" "Any of us could be plants, but not all of us." "At least one candidate has to be genuine for the test to be viable." " That would be me." " And me." "My point is we can't prove anyone's guilt or innocence, so it's a waste of time to try." "If we can't maintain trust and cooperation, we're through." "Trust has to be earned, sister." "We never had cause to trust each other in the first place." "Trust is a choice." "We can choose to keep cooperating, if necessary." " I think it's necessary." " We have no other option." "Trust makes me nervous." " I prefer proof." " What are you doing?" " (SHOUTS) Get off me!" " Are you insane?" " Brown, why are you doing this?" " Because I like winning!" "Now tell us the truth, Dark." "Please..." "You said we've to trust each other!" "Now you're gonna stand there while he interrogates me?" "Looks like it." "They wanna know too." "Further denials will only waste time." "Confess and I'll release you." "I promise." "OK, I work for them, but they didn't put me in here!" "I heard about the job internally and applied like everyone else!" "Not everyone." "Tell us what we want to know." "I can't tell you anything because I don't know anything!" "HR doesn't cover the CEO's office, he hires his staff personally!" "I'm not lying!" "I wanna step up as badly as you do!" "Like I said, trust is a devalued currency in here." "What proof can I possibly give you?" "You know, it's funny... how something so simple and inoffensive as a piece of paper, when placed in the wrong hands can become a deadly weapon." "All from one slice of a tree." " What are you doing?" " What has to be done." "You're gonna torture me?" " Do something!" "Please!" " Brown, what are you doing?" " I know what I'm doing." " You've done this before?" " In the services." " I thought you were a gambler." "All soldiers are gamblers." "See, I find the flesh of the inner thigh especially sensitive." " Fuck you!" "Get off me!" " Stop this!" "This can't be our only option!" "No, it isn't, it's mine." "(sighs)" "What have we here?" "Seems you got there before me." "What, undervalued at work and at home?" "Daddy didn't love you, hm?" "You studied psychology to find out why?" "Tell me I'm wrong." "On second thoughts, don't answer that." "Answer this..." " What is the question?" " I don't know!" " You're lying!" " I don't know, I swear!" "What is the question?" "What is the purpose of this exam?" "Would I volunteer if the only way for you to solve this was to beat it out of me?" "How fucked up are you?" "With 20 minutes left, this fucked up." " (DARK SCREAMS)" " OK, enough!" "(BLACK GROANS)" "Don't interfere." "(GROANlNG)" "(BLACK) For God's sake." "This is a woman." "Equal opportunities, Black." "HR wouldn't expect anything less, would they?" "Oh, by all means, ask him for help." "Look, it's nothing personal." "We just need to know what you know." "Brown, don't do this!" "There must be another way!" "We need certainty." "The kind only unbearable pain can give..." "I've told you everything I know!" "Please stop!" "..or the threat of it." "(DARK SOBS)" "She's telling the truth." "Sorry." "Here." "Thank you." "(RATTLlNG)" "You wanted convulsions - now you've got them." "You think he's faking it." "It's genuine." " How do you know?" " My wife, she died from it." "I'm a carrier." "He's not faking." "Even liars tell the truth occasionally." " He really needs that pill, doesn't he?" " Fast." "If anyone took it, own up now." "All right, if we can't trust each other, we'll have to search each other." "Nothing." " Got any gum?" " Sorry. I'm all out." "Really?" "All soldiers are gamblers and all gamblers are cheats, I've found." "Given the opportunity." " I took a calculated risk." " You're as bad as he is." "No, he's worse." "There was never any pretence about White." " Let's think about it selfishly again." " While he's dying?" "That's not selfishness, that's murder!" "Coma comes before death, right?" "People recover from comas." "Not this kind." "Sink too deep and it's irreversible." "But that pill mimics an adrenaline shot to the heart." " If you're gonna do it, do it now." " Forgotten what you said about him?" "We're not releasing him We're saving his life!" "I'm afraid I can't do that!" "(GRUNTING)" "I can see it, but I can't reach!" "Let me try!" "Obviously the Gods agree with my risk assessment." "Is he unconscious?" "(BLACK) He's lapsing!" "We have to carry him out for treatment." "Biorg will understand." "Trust me." "Are you gonna help me?" "Fine, you can live with his death on your consciences." "I can't." "He's bleeding!" "What does that mean?" "I don't know:" "I haven't seen this before." "But it can't be good." " Do something, Black!" " Like what?" "I'm not a doctor!" "Help him, please!" "Can't you see he's dying?" "No!" "I work for you!" "I work here!" "(GASPS)" "You weren't wrong about that pill." "Hey..." " If you can hear me, nod your..." " Fuckers." "I have it too, brother." "Yeah, well, don't expect me to thank you." "You have her to thank... ..not me." "Well, I would've preferred the kiss of life." "I bet you're good at that." "Wow." "Four down and four to go." "And only 1 0 minutes on the clock." "Exciting (!" ")" "I felt you take it, you know." "Room not big enough for both of us?" "That's the spirit, Brown." "If you remember me taking it, you'll remember the promise you made us." "Blonde gave you the pill as requested." "Now give us what we asked for in return." " The question?" " What is it?" "Where is it?" "You still don't get it, do you?" "Let me spell this out for you." "(sighs)" "There is no question!" "All right?" "There never was one!" "Not the kind you're looking for anyway." "That's what you've been holding back?" " That's your big secret?" " Uh-huh." "You heard the lnvigilator." "There's one question before you, and one answer is required." "There is one question!" "You're calling him a liar?" "When you've eliminated the impossible, whatever's left has to be the truth." "No matter how crazy it seems." "This test is the question!" "And the answer is us." " We're the answers." " Answers, plural?" " If I recall..." " One answer is required." " Singular." " That's right." "Just one of us." "You wouldn't dare." "Whoa!" "Whoa!" " Whoa!" "Everybody calm down." " Seconded." "(GIGGLES) All right, all right, all right." " You're not gonna shoot me." " I didn't take it to shoot you!" "I took it to stop you from using it on us!" "Let me tell you what I think." "I think we're the answers too." "All of us together, as a team!" "I think we'd all passed when we walked in." "All each of us can do is lose what we've already won through selfishness, stupidity and impatience!" "(BLACK) Deaf was right." "We see what we want to see in here." "You're a fighter so you all can think about is being the last man standing, but they never said there was only one position available." "Yeah, I see what I want to see, Black." "(GASPS)" "And you hear what you want to hear." "But answer me this, brother (!" ")" "What corporation doesn't know how many positions it's got available?" "What CEO can't decide whether he wants one assistant or eight?" "There's only one job going in his office, you know that?" "And the rest is fantasy." "White, stay back!" "This ain't worth killing for." "You seem to think it is." "Is it..." " ..worth dying for?" " Put the gun down, Black." "You started this, now it's in play!" " We can't put it back." " (BLONDE) Throw it out the door." "That won't break any rules." "Go on, then, shoot me." "Go on, shoot me in the head, go on." " See?" "You can't fight who you are." " Don't!" "(BLACK SCREAMS)" "Fingerprint ID." "No!" "(WHITE) OK." "(BROWN) OK, OK." "Just tell us what you want." "I want to be alone!" "You want us to spoil our papers?" "Disqualify ourselves?" "OK." "We'll take those odds over the alternative." "You win." "I can't let my partner escort you out, we just became friends." "How about you walk out instead?" "Each of you." "One by one." "Starting with you." "Come on, we ain't got all day!" "Let's go." "They deserve you." "Now you." "Come on." " Don't be stupid, Black." " You won't shoot." "I'll be missed." "You're sick like me." "Your death will be explained away, OK?" "No one outside this room even cares." "They've got problems of their own, like avoiding the infection themselves." "Your conscience will haunt you." "You're assuming I've got one." "I'll go." "I'm through with this." "(Ready?" ")" "Don't cry, darlin'." "You were a passenger in here, anyway." " You fucked your way to the top." " Then I saved your life." "Well, anyone can make a mistake." "Lights out!" "Lights on!" "(GROANS)" "(BEEPING)" "(sighs)" "Toujours y voir clairement est primordial." "(DARK) To see clearly is all." "Well?" "You said there's one answer and you're looking at him!" "I've done everything!" "I made everything happen in here, and she's done nothing!" "It's me!" "I'm the one you want!" "I'M THE ONE YOU WANT!" "(FOOTSTEPS)" "If you try to communicate with myself or the guard... ..you will be disqualified." "(white) That's it, join in at last." "You're deaf but not dumb, eh?" "(BEEPING)" "There is one question before you, and one answer is required." "(Ready?" ")" " Answers?" " That's what you've been holding back?" " That's your big secret?" " You still don't get it, do you?" "What is it?" "Where is it?" " The question?" " What's the purpose of this exam?" " The question?" "What is it?" "Tell us!" " What does it matter?" "(BLONDE) You really think he's behind there?" "(DARK) He's lived behind walls for years." "(BROWN) How do you know all this?" "Are you saying that they rigged the test to bring us all together?" "Is there something you want to tell us?" " (BRUNETTE) lt's a piece of paper." " (WHITE) It's more than that." "If we can't see it, how are we supposed to find it?" "(BRUNETTE) What if the question is written down?" "We just can't see it?" "(BLONDE) What if it reveals the question too?" "(white) They're not gonna make it that easy." "(BRUNETTE) How hard can they afford to make it?" "(white) So has anyone figured out the answer yet?" "(BROWN) lt's not about the answer, it's about the question." "What is the question?" "(TICKlNG)" "What is the question?" "(TICKlNG)" "Any questions?" "No." "That's the answer you wanted to the first question asked of us." "The only question asked of you." " I almost missed it too." " Almost." "As it is, we're happy to be hiring someone today." "I haven't accepted yet." "You wouldn't have participated if you didn't want the job." "That was before." "Before all this." "Now it's over, I have questions." " Questions?" " More than one." "Ask." "You don't look like him." "Any suit can play the CEO for shareholders and the media." "Our founder isn't a businessman." " He has no interest in fame." " Too bad." " That was some performance." " Who said it was a performance?" "Our founder is a scientist, an innovator." "He's very particular about those he invites to work with him, especially when it comes to the most important hiring decision he's ever made." "Important enough to kill for?" "What makes you think he's dead?" "(SOFT BREATHING)" "(lNVlGlLATOR) While searching for the cure, we stumbled upon something far more powerful." "Rapid cell regeneration..." "..in a pill." "It eradicates the virus and other stubborn mutations." " The magic bullet." " The gift of life for millions." "Such a breakthrough creates unanticipated dilemmas." "Too great for any one man to bear." "People are gonna need this product, and we can only make so much at a time." "Tough decisions are gonna have to be made by a wise administrator, someone who combines a listening disposition with attention to detail and compassion for her fellow man." "If you are still interested..." "Il est revenu." "He is... ..risen."
News - Details New York Red Bulls and NSCAA announce multiyear partnership renewal HARRISON, N.J. (April 18, 2016) - The New York Red Bulls and National Soccer Coaches Association of America (NSCAA) have agreed to a multiyear partnership renewal, the club announced today. Through this partnership, the Red Bulls are designated as the exclusive and sole provider of regional NSCAA Coaching Academy courses throughout New York and New Jersey. “Coaching education is a key component of the extensive Red Bulls youth development systems,” said Dave Jervis, Senior Director of Training Programs. “By offering a range of easily accessible course locations, we are able to help educate and impact local grassroots coaches in youth soccer communities throughout New York and New Jersey.” “Over the past five years, the NSCAA has been a key partner in helping us realize our mission of developing, engaging and inspiring the soccer community.” The initial agreement between these two organizations was announced in June 2012, when the Red Bulls academy became an official partner to operate NSCAA courses. The partnership expanded in December 2013, adding a marketing and services aspect to the partnership, allowing both the NSCAA and the Red Bulls to strengthen their promotional reach. Both organizations collectively support coaches at the grassroots level through a variety of NSCAA Level 1-6 courses, as well as Special Topics Diploma courses. These courses are scheduled at Red Bull Arena and utilize the New York Red Bulls professional team as an educational platform for local youth coaches. This agreement renewal also provides Red Bulls youth partner clubs and course participants with additional educational, club support services and benefits that are available through the NSCAA. “The NSCAA’s collaboration with the New York Red Bulls is a great representation of the Association’s goal of educating coaches and serving the greater soccer community,” NSCAA CEO Lynn Berling-Manuel noted. “We look forward to continuing this partnership and interacting with coaches in the New York/New Jersey area and beyond.” Both organizations have worked together to operate hundreds of courses in the local area, educating and certifying thousands of youth soccer coaches. In the coming year, the Red Bulls plan to host a variety of coaching courses at more than 50 locations. About NSCAA: Founded in 1941 and based in Kansas City, Mo., the National Soccer Coaches Association of America (NSCAA) is a non-profit organization with a mission to educate coaches, encourage excellence and serve the soccer community. 2016 marks the 75th anniversary year of the NSCAA enhancing the game through coaching education. The NSCAA is the world’s largest soccer coaches’ organization with members at every level of the game, from professional to grassroots. The membership also includes administrators, referees and others in the soccer industry. The NSCAA provides its members opportunities to enhance the game of soccer by providing a national education program, interaction and networking opportunities, and membership benefits. For more information about the National Soccer Coaches Association of America, visit NSCAA.com. About Red Bulls Youth Programs: The New York Red Bulls maintain one of the premier youth development programs in the United States, committed to identifying and developing talent in the tri-state area. The Red Bulls player development system is a multi-layered program that provides professional support at all levels of the game. Each level of the player development pyramid has been structured to provide the best development opportunities to players, coaches and youth soccer organizations. Within the local community, programs are offered for players of all ages and abilities. For players with outstanding ability, there is an opportunity to progress from the grassroots training programs to the Regional Development School, then on to the academy teams and, ultimately, to the Red Bulls professional team. Red Bulls academy teams are consistently ranked among the top programs in the nation. Red Bulls players make regular appearances in U.S. Soccer Youth National Teams and NCAA Division I programs. For more information about Red Bulls academy and training programs, visit RedBullsAcademy.com.
Back to the Fuchsia! UK Gardens are Stuck in the Past Our 2016 survey of UK homeowners revealed nearly 70% of gardens are stuck in the past with almost two thirds (65%) of respondents admitting their outdoor space features influences from previous decades. But while as a nation we might be behind with the gardening times, weeds (46%), garden gnomes (37%) and pet graves (26%) topped the poll of what us Brits deem unacceptable features of a modern garden.
Q: Changing value of a variable on OnClick Android I have 2 buttons in my layout when user presses button 1 the value of 'number' should change to '2' and when the user presses button 2 the value of 'number' should change to '1'.But the value does not change. Here is my code : public class test extends AppCompatActivity{ public int number ; private Button btn1; private Button btn2; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.testing); btn1=(Button)findViewById(R.id.btn1); btn2=(Button)findViewById(R.id.btn2); test(); } void test() { if(number<1) { number = 1; } Log.e("number value : ",String.valueOf(number)); if(number==1) { btn1.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View arg0) { number=2; Log.e("number value : ",String.valueOf(number)); } }); } if(number==2) { btn2.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View arg0) { number=1; Log.e("number value : ",String.valueOf(number)); } }); } } Log.e outputs E/number value :: 2 when I press btn1 but when i press btn2 nothing happens and only btn1 works A: Try This void test() { if(number<1) { number = 1; } Log.e("number value : ",String.valueOf(number)); btn1.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View arg0) { if(number == 1) { number=2; Log.e("Button 1 number value : ",String.valueOf(number)); } } }); btn2.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View arg0) { if(number == 2) { number=1; Log.e("Button 2 number value : ",String.valueOf(number)); } } }); }
Real estate agents and the Internet – How to Buy and sell Real Estate Today Ten years ago, research for real estate enjoy started in the office of a local broker or by just driving around town. At the agent’s office, you would spend an afternoon flipping through pages of active property listings from location Multiple Listing Service (MLS). After choosing properties of interest, you would spend many weeks touring each property until you found the right one. Finding market data to enable you to assess the asking price would take more along with a lot more driving, and you still isn’t able to find all the information you needed to obtain really comfortable with a reasonable market value. Today, most property searches start on the The internet. A quick keyword search on Google by location will likely allow you to thousands of results. If spot a property of interest on a real estate web site, you can typically view photos and also maybe even take an online tour. You can then check other Web sites, such as the local county assessor, to add an idea of the property’s value, see what online marketing owner paid for the property, check the marketplace taxes, get census data, school information, and even check out what shops are within walking distance-all without leaving your family home! While the resources on the internet are convenient and helpful, using them properly could be a challenge because of the of information and the difficulty in verifying its clarity. At the time of writing, a search of “Denver real estate” returned 2,670,000 Web net websites. Even a neighborhood specific search for industry can easily return a huge Web sites. With a lot of resources online how does an investor effectively all of them without getting bogged down or winding up with incomplete or bad information? Believe it or not, understanding how corporation of real estate works offline makes it for you to understand online real estate information and strategies. The Business of Property Real estate is typically bought and sold through either a licensed real estate agent or directly by the owner. The vast majority is traded through real estate agents. (We use “agent” and “broker” to for you to the same professional.) Is definitely due to the real estate knowledge and experience and, at least historically, their exclusive use of a database of active properties for sale. Access to this database of property listings provided the most effective way to look for for premises. The MLS (and CIE) The database of residential, land, and smaller income producing properties (including some commercial properties) is known as a mls (MLS). Practically in most cases, only properties listed by member real estate agents can be added to an MLS. Internet site purpose of MLS for you to enable the member marketplace agents to create offers of compensation some other member agents if they find a buyer property. This purposes did not include enabling the direct publishing for this MLS information to the public; times change. Today, most MLS information is directly available to the public over the web in many different forms. Commercial property listings are displayed online but aggregated commercial property information is more elusive. Larger MLSs often operate a commercial information exchange (CIE). A CIE is analogous to an MLS however the agents adding the listings to the database are not required to offer any specific type of compensation to the other members. Compensation is negotiated not in the CIE. In most cases, for-sale-by-owner properties cannot be directly contributed to an MLS and CIE, which are maintained by REALTOR contractors. The lack of a managed centralized database is likely to make these properties more tricky to locate. Traditionally, these properties are discovered by driving around or on the lookout for ads regarding local newspaper’s real estate listings. A more efficient method to locate for-sale-by-owner properties through using search on your for-sale-by-owner Site in the geographic neighbourhood. What is a REALTOR? Sometimes the terms real estate agent and REALTOR are widely-used interchangeably; however, they are not the same. A REALTOR is a licensed real estate agent will be also a participant of the nation’s ASSOCIATION OF REALTORS. REALTORS are required to comply with a strict code of ethics and have. MLS and CIE property listing information was historically only that make up hard copy, and as we mentioned, only directly there for real auctions members of an MLS or CIE. About ten years ago, this informative property information started to trickle out to the . This trickle is now a surge! One reason is that a majority of of the 1 million or so REALTORS have Web sites, and most of those Web sites have varying amounts in the local MLS or CIE property information displayed on it. Another reason is actually there are a variety of non-real estate agent Web sites that in addition provide real estate information, including, for-sale-by-owner sites, foreclosure sites, regional and international listing sites, County assessor sites, and valuation and market information world-wide-web. The flood of industry information on the Internet definitely makes understanding more accessible but also more confusing and subject to misunderstanding and misuse.
Rite in the Rain All-Weather Black Trekker Pen, Black Ink While a pencil works great on all-weather products, sometimes you just need a pen. This all-weather Trekker pen writes on wet paper and upside down in temperatures from -30F to 250F. Features a flat black metal barrel with comfort grip. The pen's cap has a convenient ring to attach to a lanyard. Writes on wet paper, upside down, in all temperatures Flat black metal barrel with comfort grip Convenient ring to attach a lanyard (not included) 4" long / weight: 0.05 lb. Special discounts may apply for high volume sales. Contact our Bids & Quotes department for more information.
10 Guiding Principles for Agriculture Policy: A Free-Market Vision About the Author Agriculture has changed dramatically over the past 80 years, yet farm and commodity programs are Depression-era relics that are grounded in central-planning philosophies. Even some policymakers who claim to be strong proponents of free markets and limited government tend to forget these core beliefs when it comes to these programs. Agriculture policy is not just limited to these traditional farm and commodity programs that limit choice, stifle innovation, drive up consumer prices, and cost taxpayers billions of dollars a year. It also includes food safety, international trade, environmental policy and property rights, research and innovation, and general issues applicable to all sectors of the economy, such as labor policy. There are alternatives to agriculture beyond the status quo of central planning and subsidies. The same free-market solutions that have allowed this nation to flourish are just as applicable to agriculture as they are to other sectors of the economy. The following are 10 guiding principles for agriculture policy. 1. Markets, Not Government Incentives and Controls, Should Inform Farming Decisions. Farmers make decisions based on the restrictions imposed upon them through central-planning policies and the subsidies that distort their choices through misguided incentives. These policies include loans, disaster assistance, price and revenue guarantees, supply restrictions, import barriers, payments to idle land, marketing orders (which are effectively government-sanctioned cartels), and subsidized crop insurance. There is an assumption in agriculture that the federal government can use central planning to best allocate resources. Nobody has the knowledge to plan economies. By responding to markets, farmers would be free to produce what they deem fit to meet consumer demand. 2. Free Markets Promote Food Affordability. Food must be affordable. Consumers are often ignored by existing policies that drive up food prices, such as the sugar program[1] and the Renewable Fuel Standard.[2] Higher food prices hurt low-income individuals the most because a greater share of their incomes go to food costs compared to individuals with higher incomes. 3. Subsidies Are Not Necessary for Farmers to Succeed. Government should not intervene in the market to help ensure that farmers are profitable, such as through the “shallow loss” program that protects farmers from even minor losses. Like any businesspeople, farmers should succeed or fail on their own merits and assume the risks and reap the rewards of doing business. In addition, though, government should not intervene in the market by making it difficult, if not impossible, for farmers to succeed financially. Burdensome regulations can harm farmers as can restrictions limiting access to capital and labor necessary to meet the unique needs of farms. 4. Property Rights Are the Cornerstone of American Agriculture. Farmers and ranchers are the best stewards of their property. Property ownership creates powerful incentives to maintain property. Many farmers and ranchers depend on their land for their very livelihood: According to the U.S. Department of Agriculture, “farm real estate (land and structures) accounted for 82 percent of the total value of U.S. farm assets in 2012.”[3] Too often, farmers and ranchers have to bear an excessive cost for government regulations that place restrictions on how they use their property. This problem is particularly egregious with laws such as the Endangered Species Act. Farmers and ranchers bear costs that should be borne by society generally, not a narrow group of property owners alone. In many instances, the restrictions are so great as to amount to regulatory takings, which should trigger just compensation to the harmed property owners. Clearly defined and strongly enforced property rights might also help develop solutions to addressing many agriculture challenges. For example, water rights can be used by the property owner to participate in water markets, likely serving as the best means to allocate scarce water resources. 5. Problematic Regulations Affecting Agriculture Should Be Fixed or Eliminated. New regulations are often adopted to address problems caused by existing regulations. The solution should be to fix or eliminate the existing regulation, not to use failed policies as justification for more government intervention. This problem was on display in the recent farm bill. Subsidized crop insurance can distort decisions by farmers because of their reduced risk and potentially encourage them to use land in ways that might be environmentally unfriendly. This was part of the rationale for requiring farmers to comply with land use restrictions[4] in order to receive crop insurance subsidies. The solution though is not to impose new restrictions on property usage, but to remove the distorting subsidies. 6. The Regulatory Burden on the Agriculture Sector Should Be Minimized and Sound Regulatory Approaches Used. Regulations can hinder farmers and other businesses throughout the food supply system. Farm-specific regulations should generally be limited to covering health and safety. When agencies promulgate regulations, they should have clear statutory authority and use sound regulatory and scientific analysis, including adopting the least costly alternative to achieve its objective. Unnecessary, duplicative, or outdated regulations should be repealed. One-size-fits-all regulation does not work, especially given the diverse work of farmers and the unique agricultural challenges that exist on the state and local levels. Regulation should become more decentralized with states and local governments having more influence and responsibility as the federal government plays a smaller role. 7. Obstacles to Agriculture Research and Innovation Should Be Removed. There are groundbreaking innovations in fields such as agricultural biotechnology[5] that will help the agriculture sector feed Americans and the world. These innovations can yield many benefits including greater productivity, reduced food costs, and improved nutrition. However, misinformation campaigns instead of sound science are creating obstacles that are undermining innovations. Any approval process for these innovations should be streamlined, consistent, and based on sound science. When approval is arbitrary and unpredictable, innovators are discouraged from moving forward with their research.[6] Other unnecessary government obstacles that hinder research and innovation should be removed, including any taxpayer-funded research that discourages private research. 8. Free Trade in Agriculture Benefits Farmers and Consumers. Trade opportunities are lost when Congress subsidizes domestic agriculture industries, thereby inviting other countries to respond in kind or even to retaliate if the U.S. is in violation of World Trade Organization rules.[7] While other countries will inevitably create protectionist schemes, taking comparable action only hurts American consumers by restricting competition and making it far more difficult to have free trade. Trade policy should not focus on the narrow interests of one industry. This approach usually comes at the expense of consumers, other industries, and the economy as a whole. Free trade in agriculture should be aggressively pursued. This means eliminating domestic trade barriers, which would promote competition by giving consumers access to foreign agricultural products while aggressively seeking the removal of barriers that block American products from entering foreign markets. 9. Individual Dietary Decisions Should Be Respected. From mandatory menu labeling requirements to the Food and Drug Administration’s proposed de facto ban on trans fat in processed food, the federal government presumes that the public is incapable of making informed dietary choices. These policies also assume that the government knows what the “right” dietary decisions are for individuals, including what is best for them nutritionally. Dietary decisions are complex and based on numerous factors that may include nutritional value but are just as likely based on individual preferences such as taste. These are personal choices that should be made by individuals themselves, not by government officials who believe they should try to manipulate or limit what Americans can eat. 10. Agriculture Policy Should Not Promote Special Interests. Everyone is affected by agriculture policy because after all, everyone eats. When agriculture policy debates occur, farming interests and other “stakeholder” interests are usually at the table, but consumer and taxpayer interests are not. Lawmakers should develop agriculture policy remembering that agriculture exists to meet the needs of consumers and that the government is not spending its own money on agriculture programs but taxpayer money. Agriculture policy debates should be conducted in an open and transparent manner. Political maneuvers should not be used as a way to push legislation through at the expense of thoughtful discourse on agriculture policy, as is currently employed in the farm bill, which combines farm programs with food stamps. Moving Forward A free-market vision for agriculture starts with having principles that recognize the flaws of government intervention while embracing freedom and individual rights. These broad-based principles, if applied, can help change agriculture policy from an area of excessive government control to an area of individual freedom. —Daren Bakst is a Research Fellow in Agricultural Policy in the Thomas A. Roe Institute for Economic Policy Studies at The Heritage Foundation.
Does the evidence from clinical trials justify the treatment of hypertension? Hypertension is the most common reason for physician office visits. An estimated 43 to 50 million people in the United States have elevated blood pressure (BP). The prevalence of hypertension varies from a small percentage among individuals in their teens and 20s to more than 70% of the elderly (those > 75 years of age). The US Public Health Services (USPHS) has set a goal of having 50% of individuals with hypertension "under control"--that is, reducing their BP to < 140 mm Hg systolic and < 90 mm Hg diastolic--by the year 2000. Current information suggests that we will fall far short of reaching that goal. In the early 1990s, such levels had been achieved by only 27% of hypertensive Americans 18 to 74 years old and by only 20% of those > 75 years old. Is this a cause for concern? Is the goal defined by the USPHS justified? Should we push even harder to reach that goal, should we strive to do even better, or should we be satisfied? Since we are now in the era of evidence-based medicine, the only way to answer these questions is to review what we have learned from the many large, prospective, well-controlled, long-term clinical trials that have addressed these questions over the past 3 decades.
“He can still appeal, but this outcome was decided by the senior leaders, and there’s no hope of changing the verdict,” Mr. Zhang said. He said the court could have imposed a maximum sentence of five years. The State Department criticized the ruling and called on Chinese authorities to release Mr. Xu. “We are concerned that Mr. Xu’s prosecution is retribution for his public campaign to expose corruption and for the peaceful expression of his views,” Jen Psaki, a State Department spokeswoman, said in a statement. The judgment, coming unusually swiftly after a trial Wednesday, will silence Mr. Xu for now. But the sentence could also enhance Mr. Xu’s prominence as an advocate for political liberalization. Mr. Xu and his two lawyers remained silent in protest for most of the proceedings, but Mr. Xu used his concluding statement to deliver part of an impassioned manifesto for democratic change, free speech and rule of law. The full text has circulated on the Internet. For the verdict hearing, the police stood guard for blocks around the courthouse, keeping away journalists, diplomats and ordinary citizens concerned about the case. Journalists who tried to approach the court were told to leave. As the first prosecution of a high-profile activist under Xi Jinping, the Communist Party secretary who took power in November 2012, the case was seen as a barometer of how China’s new leadership — the first in a decade — would respond to organized calls for reform. Some liberal intellectuals and rights advocates initially hoped that Mr. Xi would be more tolerant than his predecessor, Hu Jintao, of mild campaigns for change.
+ 2*d + 5. Let s(m) = 2*m**2 + 2*m + 6. Give p*s(o) - 6*u(o). -2*o**2 - 2*o Let i(x) be the third derivative of -x**6/40 - x**5/15 + x**4/6 - 115*x**2 + 3*x. Let g(j) = -14*j**3 - 21*j**2 + 21*j. Give -4*g(k) + 21*i(k). -7*k**3 Let h(x) be the second derivative of -x**3/2 - x**2/2 + 4*x + 15. Let s(a) = 9*a + 3. Let m be 60/14 + (-4)/14. Calculate m*s(d) + 11*h(d). 3*d + 1 Let q(w) = 10*w - 4. Let d(b) = 1. Suppose -13*g - 7*g = -20. Calculate g*q(z) + 5*d(z). 10*z + 1 Let x(i) be the third derivative of i**4/24 + 117*i**2 + 2. Let u(p) = -1. Determine -2*u(q) - x(q). -q + 2 Let q(m) = -2*m**2 - 2*m + 1. Let u = 363 - 365. Let g(a) = 5*a**2 + 7*a - 2. Give u*g(n) - 7*q(n). 4*n**2 - 3 Let z(f) = -9*f**3 - 11*f**2 - 19*f + 42. Let x(g) = 4*g**3 + 5*g**2 + 9*g - 21. What is 13*x(y) + 6*z(y)? -2*y**3 - y**2 + 3*y - 21 Let n(x) = x**2. Let g(f) = -3*f**2 + 190. Determine g(o) + 2*n(o). -o**2 + 190 Let f(o) = -3*o + 3. Suppose 0 = 4*i - 9*i - 3*g + 4, 0 = 4*i + 4*g. Let h(b) = 12*b - 13. What is i*h(y) + 9*f(y)? -3*y + 1 Let w(o) = -4 + 2*o**3 - 3*o**3 + 3. Let m(c) = -14*c**3 - 10. Let f be (-10)/65 - 256/26. Calculate f*w(v) + m(v). -4*v**3 Let w(b) = 77*b - 3. Let y(c) = -1085*c + 40. Determine -55*w(h) - 4*y(h). 105*h + 5 Let x(f) = -3*f. Let a(y) = 4*y + 11. Let v(k) = 10*k + 30. Let l(n) = 11*a(n) - 4*v(n). Let s = -7 + 4. Calculate s*x(p) - 2*l(p). p - 2 Let u(n) = n + 6 - 6 + 1. Suppose -26*b - 10 = 68. Let j = 1 + 2. Let o(r) = r**3 + r + 1. What is b*o(s) + j*u(s)? -3*s**3 Let r(m) = 317*m - 8. Let q(u) = 24095*u - 610. Give 4*q(c) - 305*r(c). -305*c Let j(i) = -7. Let z(f) = f + 2. Let c be z(4). Let h(t) = -t**2 - 6. Calculate c*j(o) - 7*h(o). 7*o**2 Let i(l) = -7*l**3 + 6*l**2 + 2*l - 6. Let b(u) = 2*u**3 - 7*u**2 + 6*u**3 - 5*u + 2*u + 26 - 19. Give -6*b(k) - 7*i(k). k**3 + 4*k Let l(t) = 5*t - 1. Let v(f) = -6*f + 3. Let b(g) = g. Let a(i) = 5*b(i) - v(i). What is 4*a(x) - 10*l(x)? -6*x - 2 Let b(f) = -13*f - 11. Let c(h) = -2*h. Give b(y) - 2*c(y). -9*y - 11 Let o(b) = -2*b**3 - b**2 + b - 1. Let w(c) = 14*c**3 + 6*c**2 - 6*c + 28. Give 6*o(m) + w(m). 2*m**3 + 22 Let b(f) = -3*f**3 + 5*f**2 - 5*f + 6. Let m(y) = -6*y - 65*y**2 - 7*y**3 + 7 + 3*y**3 + 71*y**2. Give 6*b(t) - 5*m(t). 2*t**3 + 1 Let w(y) = 10*y**2 + y**2 - 2*y**2 - 9 - 2*y**2 - 11*y**3 - 2*y. Let g(b) = -6*b**3 + 4*b**2 - b - 5. Determine 7*g(k) - 4*w(k). 2*k**3 + k + 1 Let a(s) = 2*s**3 - 6. Let z(i) = -10*i - 75. Let l be z(-8). Let f(y) = y**3 - 5. What is l*f(d) - 4*a(d)? -3*d**3 - 1 Let k be 4/6*(-6)/4. Let d(a) = a - 1. Let y(o) = -1. Suppose v - 6 + 4 = 0. Let q(l) = v*d(l) - 3*y(l). Let s(u) = 1. Calculate k*q(i) + 3*s(i). -2*i + 2 Let x(o) = 5*o**2 + 6. Let a = 167 - 166. Let m(d) = 1. Calculate a*x(h) - 6*m(h). 5*h**2 Let z(j) = j**2 + j - 1. Let c(y) = y**2 - 2. Let h be ((-1)/2)/(5/70). Let k be 2 + 14/(-4) - h/2. What is k*z(i) - c(i)? i**2 + 2*i Let j(q) = -q - 1. Let n(w) = -w - 6. Let a be (-2)/1*5/10. What is a*n(s) + 2*j(s)? -s + 4 Let p(z) = -2*z**3 + 4*z**2 - 8. Let v(c) = -c**2 + 1. Calculate p(i) + 4*v(i). -2*i**3 - 4 Let h(z) = -z. Let o(r) = 11*r - 13*r + 5 + 3*r. Let b be o(0). Let w(y) = -4*y + 3*y + 0 + 1 + b*y. Give -6*h(u) - w(u). 2*u - 1 Let t(k) = k + 38. Let m be t(18). Let l = 55 - m. Let x(v) = -1. Let o(q) = -3*q - 3. Let a(c) = 1. Let r(z) = -6*a(z) - o(z). Calculate l*r(g) + 3*x(g). -3*g Let h(k) = -3*k**2 - 5*k + 4. Let z be 36/(-60) - (16/(-10) - 1). Let a(p) = p**2 + 2*p - 2. Determine z*h(b) + 5*a(b). -b**2 - 2 Let t(c) = -58*c + 1. Let f(s) = 117*s - 3. Give 2*f(j) + 5*t(j). -56*j - 1 Let q(s) = -3*s. Let f(o) = 1. Let i(r) = -6*r - 6. Let l(t) = 6*f(t) + i(t). Let b(z) = -z**3 + 9*z**2 - 9. Let g be b(9). Calculate g*q(j) + 5*l(j). -3*j Let g(t) = 341*t - 5. Let a(s) = 2*s + 3. What is -2*a(q) - g(q)? -345*q - 1 Let i(r) = -5*r**3 - 6 - 23*r + 4*r + 6*r**2 + 13*r. Let x = -33 - -21. Let b = 6 + x. Let u(y) = 6*y**3 - 7*y**2 + 7*y + 7. Determine b*u(k) - 7*i(k). -k**3 Let x(s) = s**2 - 13*s - 22. Let g be x(15). Let n(h) = -2*h + g - 5 + 6*h. Let t(w) = -5*w - 4. What is -4*n(m) - 3*t(m)? -m Let c(d) = d. Let q be (12 + 722/(-57))/(1/(-6)). Let k(t) = 6*t**2 + 0 + 4*t - 3*t**2 - 2 - 2*t**2. Give q*c(w) - k(w). -w**2 + 2 Let s(r) = r**3 + r**2 + r. Let m(l) = -l**2 - 2*l + 1. Suppose z + 4*g = -4 + 9, 0 = -3*z + 3*g. Give z*m(t) + 2*s(t). 2*t**3 + t**2 + 1 Let d(z) = -2. Let t(s) = -372*s - 7. Give -4*d(r) + t(r). -372*r + 1 Let q(v) = 80*v + 6. Let d be q(-1). Let a = -75 - d. Let r(c) = -c. Let x(g) = -2*g - 1. What is a*x(m) + 3*r(m)? -m + 1 Let o = -5 - -9. Suppose 0 = -o*p - 32 - 0. Let g(w) = 5*w**2 + w + 2. Let k(t) = -14*t**2 - 3*t - 5. Calculate p*g(s) - 3*k(s). 2*s**2 + s - 1 Let i(h) = 2*h - 17*h**2 + 77133 + 7*h - 77142. Let z(k) = -4*k**2 + 2*k - 2. Give 4*i(l) - 18*z(l). 4*l**2 Let g = -2 - 3. Let y(a) = -7*a - 2. Let l(f) = -3370 + 6*f + 10*f + 3376 + 6*f. Give g*l(x) - 16*y(x). 2*x + 2 Let w(f) = 5*f**3 + 3*f + 6. Let u(i) = 4*i**3 + 2*i + 5. Let q(c) = 3*c - 32. Let n be (-5 - -4) + 1 - -10. Let y be q(n). Determine y*w(j) + 3*u(j). 2*j**3 + 3 Let l(y) = 4*y**3 - y**2 - 3*y + 32. Let a(q) = -6*q**3 + q**2 + 4*q - 31. Determine 3*a(b) + 4*l(b). -2*b**3 - b**2 + 35 Let i(g) = -g + 1. Let a(n) be the third derivative of 3*n**4/8 - 4*n**3/3 - 16*n**2 - 1. Determine -a(y) - 6*i(y). -3*y + 2 Let q(r) be the third derivative of 11*r**5/30 - r**4/8 + 53*r**2 + 2. Let w(v) = 15*v**2 - 2*v. Determine 5*q(y) - 7*w(y). 5*y**2 - y Let q(v) = -44*v**2 + 5*v + 5. Let w(m) = -43*m**2 + 6*m + 6. Determine -6*q(h) + 5*w(h). 49*h**2 Let h(n) = n**3 + 3*n**2 + 3*n. Let t(g) = -g**3 - g**2 - g. Let l be (-4)/42 + 1080/(-567). What is l*h(o) - 6*t(o)? 4*o**3 Let a(p) = -p**3 + 11*p**2 - 22*p + 9. Let q be a(9). Let o(u) = 51*u. Let r(g) = -4*g. Give q*r(n) - 2*o(n). 6*n Let a(t) = 4*t**3 - 61*t**2 + 7*t + 7. Let g(m) = 2*m**3 - 30*m**2 + 3*m + 3. Give -4*a(s) + 9*g(s). 2*s**3 - 26*s**2 - s - 1 Let f = 463 - 465. Let m(a) = -7*a**3 - 3*a**2 - 5*a - 7. Let v(c) = 4*c**3 + c**2 + 2*c + 3. Calculate f*m(b) - 5*v(b). -6*b**3 + b**2 - 1 Let u be (-837)/(-135) - (-18)/(-15). Let a(i) = -2*i - 12. Let h(w) = 4*w + 24. What is u*a(s) + 2*h(s)? -2*s - 12 Let n(a) = -a**2 - 1. Let f(x) be the third derivative of x**5/10 - 2*x**3/3 + 83*x**2. Determine -f(c) + 4*n(c). -10*c**2 Let z(k) = k**2 - k - 1. Let o(s) = 8*s**2 - 6*s - 6. Suppose 0 = -11*m - 72 - 82. What is m*z(h) + 2*o(h)? 2*h**2 + 2*h + 2 Let w(j) = j**2 + 2*j + 9. Let s(k) = -6*k**2 - 11*k - 54. Calculate -6*s(m) - 34*w(m). 2*m**2 - 2*m + 18 Let l(f) = 16*f**3 - 7*f**2 - 3*f - 7. Let m(z) = -11*z**3 + 5*z**2 + 2*z + 5. Let b(j) = -j**2 - 14*j - 8. Let u be b(-13). Determine u*l(d) + 7*m(d). 3*d**3 - d Let l(n) = -n**2 - 7*n + 1. Let c(k) = -k**2 - 8*k + 1. Suppose 3*g = -g - 24. Suppose 4*i + 3*u = 29, -i - 5*u + 25 = 5. Give g*l(j) + i*c(j). j**2 + 2*j - 1 Let s(u) = -5*u + 4. Let z(g) = g + 1. Determine 4*s(q) + 22*z(q). 2*q + 38 Let u(i) = 2 + 9 + 61*i**2 + 6 + 9*i - 55*i**2. Let t(r) = -3*r**2 - 5*r - 9. Calculate -11*t(o) - 6*u(o). -3*o**2 + o - 3 Let d(m) = -2*m. Let b(g) be the second derivative of -g**3 + 2*g. Let f be 2/3*351/(-18). Let p = f + 10. Give p*b(u) + 10*d(u). -2*u Let p(q) = 5 - 3 + 13816*q + 7*q**3 - 13814*q. Let n(j) = j + 1. Determine -2*n(c) + p(c). 7*c**3 Let p(q) = 2*q**3 - 3*q**2 + 11*q. Let y(w) = w + 13. Let u be y(-9). Let t(a) be the first derivative of -a**4/4 + 2*a**3/3 - 3*a**2 + 8. Give u*p(l) + 7*t(l). l**3 + 2*l**2 + 2*l Let h(l) = -70*l**2 + l - 3. Let m(o) = 2*o**2 - 1. Give -h(q) + 2*m(q). 74*q**2 - q + 1 Let n(q) = 31*q**3 - q**2 - 7*q - 10. Let d(k) = -15*k**3 + 3*k + 4. Determine -5*d(h) - 2*n(h). 13*h**3 + 2*h**2 - h Let r(u) = -3. Let y(v) = 3 - 5 - v + 3. Let b(t) = -t**3 - 2 - t**3 - 12*t**2 - 13*t + 3*t**3. Let p be b(13). Give p*y(q) - r(q). 2*q + 1 Let v(z) = -24*z**2 + 2*z - 14. Let l(g) = 8*g**2 - g + 5. Give 8*l(t) + 3*v(t). -8*t**2 - 2*t - 2 Let d = 4 - 5. Let b(r) = 30*r**2 + 250*r**2 - 281*r**2. Let x(c) = 3*c**2 + 4. Calculate d*x(t) - 2*b(t). -t**2 - 4 Let o(i) = -2*i - 4. Let m be o(3). Let f(x) = x. Let t(q) = 4*q**2 - 10*q. Suppose 22 = -2*h - 4*c, 2*h + 27*c - 22*c = -27. What is h*t(w) + m*f(w)? -4*w**2 Let j(i) = 5*i
Вооруженные лица, проникшие сегодня, 17 апреля, на территорию радиопередающего центра Концерна радиовещания, радиосвязи и телевидения (КРРТ) в г. Краматорске (Донецкая обл.), устанавливают на захваченном объекте свое спутниковое оборудование. Об этом агентству УНИАН сообщил руководитель пресс-службы концерна Павел Билоножко. «Вооруженные лица работают по такой же схеме, как и в Крыму, только, наверное, по более усовершенствованной, потому что они зашли со своим спутниковым оборудованием. Кроме того, что выключают наше оборудование, они устанавливают какое-то свое», — сказал Билоножко. По его словам, на территории захваченного центра КРРТ работают технические специалисты, которые отключают украинские телеканалы и должны обеспечить трансляцию российских каналов на территории региона. «Кроме «зеленых человечков» работают именно технические специалисты, которые целенаправленно устанавливают оборудование. Мы так понимаем, что они должны обеспечить трансляцию российских каналов на территории региона», — отметил Билоножко. Он также добавил, что по состоянию на 18.00 вооруженные лица отпустили часть сотрудников концерна. При этом украинские правоохранительные органы не пыталась освободить захваченный объект. «Часть сотрудников выпустили, но подтверждение того, что выпустили всех, у нас нет. От милиционеров никаких действий пока не предпринимается», — отметил он. Как сообщал УНИАН, сегодня, 17 апреля, в 14.45 вооруженные лица проникли на территорию радиопередающего центр Концерна радиовещания, радиосвязи и телевидения (КРРТ) в Краматорске и получили доступ к оборудованию предприятия.
Pages Thursday, May 07, 2009 We all learned a thing or two from our parents or grandparents or whomever it was that we watched cook when we were young; I am no exception to this. I am however proud to say that I dont do things the way that I saw them done or learned the first time and rice pudding is one of those examples. My grandmother had the most influence on me in the rice pudding department as she would make it in the oven. Her rice pudding was the standard for me for all rice puddings until I came up with my own twist. I do a custard style rice pudding, I like the creaminess and I like the softness of the rice - plus it gives the flavors a chance to mature and yes it takes a little time and a little effort but dont all good things? I have seen a lot of people simply pouring sweetened and flavored warm milk over cooked rice and calling that rice pudding - that to me is nothing more than rice with sweet liquid poured over it. I am going to start posting recipes if any of you are interested. I dont use recipes myself so it is going to require that I take the extra time to spell out the times and measurements but I think it is worth it for those of you that would like to try some of my offerings. Be patient with me while I transition into it past the narrative style and into more the instructional style. I've never had rice pudding either..Reeni has a blogger BFF, I want a blogger BFF , will you be my BFF doggy? I mean afterall I've gained 10 #'s since stumbling upon your blog and being exposed to all these foodies..so technically these are your 10 #'s, it all started with that homemade ravioli ya know...and the creme brulee filled pumpkins didn't help, now I am going to have to try the rice pudding. This is exactly how proper ricepudding looks in Norway. Round rice, slowcooked on low heat. with milk and a pinch of salt. even if I use semi skimmed milk, it still gets creamy because it cooks slowly (about an hour) Before serving we use cinnamon, sugar and a nob of butter in the middle. (we call it a "smørøye": butter eye. Your grandma knew the trick! that was one of the hardest things to do when I first started blogging was sitting down and writing out what the heck I just put in my latest crazy concoction. It was so hard for me that I literally had to have a mini recorder to just speak into and record as I went along.Good luck! LOL Personally, I hope you'll kick off the recipe-style you with the instructions for this awesome looking rice pudding. I could sure go for somma dat right now! I'll tell you one thing, having to create an actual, usable recipes for some of the dishes I make by route is one of the hardest things I've ever done. It took me longer to work out a recipe for my favorite carrot soup than it did for me to create it. Good luck! Rice pudding is a staple dessert we are served after lunch most saturdays and during festivities... I just love them... creamy and yummy, I guess I can dive in and pick that bowl for dessert which my tummy is not gonna deny after a hefty dinner ;) Recipes would be great but honestly, without them your posts are a way of challenging us to test our own skills - can we ID all of your ingredients? Your techniques? Hope you'll still throw down the gauntlet occasionally with a recipe-less dish that has us craving for more! 2012 and 2014 WINNER OF THE CHAR-BROIL ALL-STARS COOK OFF Cool things I think you need in your pantry Followers follow me in the kitchen Subscribe to ChezWhat I am the FIrst and more will follow Help the Cause... Another Hero Christo Gonzales Learning recipes is great, learn technique and its grand. ChezWhat is a virtual bistro with an ever changing menu based on the freshest most unique ingredients of the season. I have a passion for words and food and I love how well they go together, my kitchen explorations are my life and my life is food. Come with me while we experiment with flavors.
Elephone P25 Will Be Available for Mocha Gold Color Soon Chinese smartphone manufacturer, Elephone has completely finished last year product line, look back to their smartphones, we must remember the most stunning ones, such as Elephone S7, Elephone R9, Elephone P9000, etc.When those smartphone are not in full stock, Elephone has started to deploy its this year lineup. Right now Elephone has leaked its next beautiful smartphone coming, Elephone P25. According to recent researches, when we choose a smartphone, what will be the first decisive factor to enable us to make decision to buy? Various researchers have shown that 45% of users attach importance to its performance, and 28% will take priority to design. However, current Chinese smartphones attach importance to design more to bring users’ for better quality. Elephone P25 will be no exception, it will have 5.5 inch screen with Mocha Gold color, because Mocha Gold metal design will be pleased for your eyes and improve holding experience. Besides, Elephone P25 will have RAM 6GB ROM 64GB internal storage, which is the main tendency for most smartphones this year. So what other else information do you expect from this beautiful Elephone P25 smartphone?
Q: breaking in (running in) a very small engine I just bought a new 110 cc Honda motorcycle. It's waay underpowered, so I spend a lot of time at wide open throttle. Being brand new, this seems likely to cause damage. The manual recommends not to push it for the first 500 km. What's the best way around this? Can I let it idle for a long time, do I have to bite the bullet and ride slooow, or is there no real cause for concern? Will pushing it now make it even slower later? A: You really need to follow what the manual says if you want to have any hopes of using a warranty... OTOH, air cooled engines are usually broken in by running at WOT... Racing motorcycles are usually broken in with WOT runs on a dyno. Small aircraft engine break-in procedures recommend sustained MINIMUM of 75% power (and 85% often recommended). So, YMMV... I personally follow the manual even if I don't think it's the best way, simply because I wouldn't want to be accused of voiding the warranty by improper usage. A: If you are worried about the rings seating properly the best thing you can do is let it warm up completely under 50% throttle with little or no load, run the engine through variable load and up and down through the throttle range, then let it cool completely. Repeat this cycle several times.
This invention relates to the technology of measuring the water content of the soil, as well as a method of cultivation and an apparatus for cultivation that use the technology. The invention relates particularly to a method that measures the water content of the soil and performs pF conversion to determine its pF value in order to facilitate soil management and enable the saving of water, resources and labor, as well as a method and an apparatus for irrigation control which control the supply of water or nutrient (nutrient solution) to the soil on the basis of the measured pF value. The term xe2x80x9csoilxe2x80x9d as used herein refers to all materials that support the underground parts of plants such as root and subterranean stem; the term includes not only what is commonly called xe2x80x9csoilxe2x80x9d but also solid mediums such as sand particles, gravel stones, smoked coal and pumice. In their cultivation on the soil, the growth of field crops is largely dependent on the soil-moisture content which can be controlled in various ways; in lands of high moisture content, enhanced drainage is performed whereas in lands of low moisture content, irrigation is performed, which is enhanced in dry seasons. In order to ensure a favorable growth of field crops, the accurate moisture content in the soil must be known. High-grade vegetables such as corn salad and tomato are usually grown in crop fields but sometimes they need to be cultivated in open-area facilities and greenhouses with the environment being precisely controlled as in industrial plants. This cultivation method is called xe2x80x9cprotected cultivationxe2x80x9d. Cultivation in crop fields involves supplying fertilizers and other nutrient sources to the soil while applying water to the crop. In protected cultivation, solution culture is preferably adopted, according to which sand particles, gravel stones, smoked coal, etc. are laid down to make mediums which are supplied with aqueous nutrient solutions by irrigation. However, optimum irrigation has not always been achieved in the actual cultivation, particularly in solution culture. Solution culture can be classified into three types, hydroponics, aeroponic and solid-medium culture. In solid-medium culture, continuous drip irrigation is commonly adopted. In continuous drip irrigation, timer or otherwise controlled automatic irrigation is the dominant approach but optimum irrigation is not always assured. This is because the amount in which the nutrient solution is absorbed by crops being cultured is dependent on various factors including the amount of solar radiation, as well as the temperature and humidity in the greenhouse. For example, the transpiration from crops being cultivated is very high if the amount of solar radiation is large and the greenhouse has high temperature and low humidity. On the other hand, the transpiration from crops being cultivated decreases on a rainy day. The absorption of nutrients by crops being cultivated is also largely dependent on the process of their growth and if they have grown up, the absorption of nutrients becomes very high. It is known that high-quality fruits with high sugar content can be obtained by reducing the water supply after they have grown to a certain extent. However, timer and otherwise controlled automatic irrigation is incapable of meeting those environmental conditions for cultivated crops at various stages of their growth unless the number of irrigations, the start time of irrigation and the duration of irrigation are daily set for new values. This is not xe2x80x9ctimer or otherwise controlled automatic irrigationxe2x80x9d in the true sense of the term and it is highly doubtful whether optimum irrigation can really be achieved. For these reasons, timer or otherwise controlled automatic irrigation often involves over-irrigation in order to prevent wilting or other troubles of crops but then it has been impossible to avoid root rot due to over-irrigation and increased drainage (i.e., increased quantities of nutrient solution and water are discarded). Speaking of the relationship between the moisture content of the soil and field crops, not all of the water in the soil is available to field crops and bound water in the soil is not available to the growth of field crops. The moisture content of the soil also varies with weather changes; the soil is filled with water if there is a heavy rain but thereafter the water is gradually absorbed by the lower soil layers and the moisture content of the soil decreases. The soil filled with water is equivalent to what occurs in hydroponics and its air permeability is too low to be suitable for open-field cultivation. If, at the subsequent stage, the moisture content of the soil decreases considerably to a level below a certain threshold, the root is no longer capable of sucking up water and the capillary network in the root is interrupted, causing the root to wither. Once this stage has been reached, the root will no longer recover from withering even if it is supplied with water; therefore it is necessary that the moisture content of the soil be kept higher than the lower limit defined by that stage. Since the wetness of the soil is determined by the potential of water in the soil, it is held inappropriate that the wetness of the soil which is related to the cultivation of field crops should be simply expressed by the moisture content of the soil. A more preferred method is by expressing the wetness of the soil on the basis of its water potential. One of the factors that describe the wetness of the soil is the xe2x80x9cpF valuexe2x80x9d. Being first proposed by R. K. Schofield in 1935, the pF value is an index for the matrix potential as a soil-water potential. The matrix potential is a drop in chemical potential resulting from the interactions between water and soil particles, as exemplified by capillary, intermolecular and Coulomb forces. Stated briefly, the matrix potential is the force by which water molecules are attracted to soil particles. The common logarithm of the absolute value of a matrix potential expressed by a graduation on a water column (cm) is called the pF value. The soil-water potential xcfx86 expressed by a graduation on a water column (cm) and the pF value are related by pF=log(xe2x88x9210.2 xcfx86). The pF value is a quantity that describes the quality of water in the soil (which is a nutrient in solution culture). A near-zero pF value represents the state of the soil that is filled with water. The moisture that remains in the soil 24 hours after rainfall or irrigation is called field capacity and has a pF value of about 1.7; the water which is present in the range from the field capacity to the primary wiltig point (pF of 3.8) at which a crop starts to wither is called xe2x80x9cavailable waterxe2x80x9d. In practice, however, the growth of crops begins to experience troubles at a point where more water exists than at the primary wiltig point. The point is where the capillary network in a crop""s root is interrupted to stop the movement of water from the root. Called the rupture of capillary network, this point has a pF of about 2.7. Hence, for cultivation of crops, it is generally held that the pF value is suitably within the range from 1.7 to 2.7. For these reasons, the moisture present in the pF range of 1.7-2.7 is called xe2x80x9ceasily available waterxe2x80x9d and for cultivation of field crops in the soil, it is required to maintain this easily available water in the pF range of 1.7-2.7. The descriptions of the pF value and the soil-water potential may be found in xe2x80x9cDojo Kankyo Bunsekiho (Analyses of Soil Environment)xe2x80x9d, ed. by the Editors"" Committee on Analyses of Soil Environment under the supervision of the Society of Soil and Fertilizers of Japan, published by Hakuyusha, first printing in 1997, pp. 48-51; xe2x80x9cTsuchi no Kankyoken (Environment of Soil)xe2x80x9d, ed. under the supervision of Shingo Iwata, published by Fuji-Techno System, 1997, pp. 72-76; xe2x80x9cDojo Shindan no Hoho to Katsuyo (Soil Analysisxe2x80x94Methods and Applications)xe2x80x9d, Shunrokuro Fujiwara et al., published by Nosangyoson Bunka Kyokai, Corporation, 1996, pp. 72-77; and xe2x80x9cSaishin Dojogaku (Modern Soil Sicence)xe2x80x9d, ed. by Kazutake Kyuma, published by Asakura Shoten, 1997, pp. 101-107. In the cultivation of field crops in the soil, irrigation and other operations are desirably performed on the basis of the pF value. Among various methods for pF value measurement, tensiometry is known to be capable of direct field measurement on the soil. A method of measurement that can be effectively used for controlling irrigation in actual cultivation must be capable of direct measurement of how much water can be held by the soil in a particular field. In ordinary fields, therefore, tensiometry is used as a simple method for measuring the pF value of the soil in the interest of management for optimum irrigation and the like. Tensiometry involves the use of an instrument called the tensiometer which consists of a porous ceramic cup (probe) and a rigid transparent poly(vinyl chloride) tube; the tensiometer is buried in the soil and filled with water so that the soil moisture has hydraulic continuity to the water inside the tube through the pores in the probe walls, whereupon the matrix potential of the soil equilibrates with the pressure inside the tube, making it possible to read the pressure inside the tube as the matrix potential of the soil. For details of tensiometry, see, for example, xe2x80x9cDojo Kankyo Bunsekihoxe2x80x9d, supra, pp. 59-62. However, the conventional method of tensiometry requires in situ system of replenishment with water and management of the sensor (tensiometer) is quite cumbersome; it is therefore desired to ensure that the pF value of the soil can be measured by a simpler means or with a simpler system. Another difficulty is that depending on the quality of the soil to be measured, the use of tensiometry is sometimes unsuitable. To be specific, tensiometry cannot be used with soil composed of coarse particles, for example, solid mediums made of coarse particles having porous surfaces such as pumice particles typically used in solution culture. This is because the particles in the coarse medium do not make intimate contact with the entire surface of the probe and, hence, the water on such particles fail to have intimate contact with the probe surface, making it impossible to achieve correct measurement. Although it has been recognized that irrigation control on the basis of pF value as an index is also desirable in cultivation on solid mediums made of coarse particles, this need has never been met. Currently, there is no alternative to tensiometry as a method capable of direct pF value measurement in the soil. One of the methods that are drawing increasing attention today as means for investigating the water retentivity of the soil is by determining the volumetric soil water content from the measurement of its dielectric constant. Two practical approaches toward this goal are TDR (time-domain reflectometry) which determines the dielectric constant of the soil from the propagation time of electric pulses and FDR (frequency-domain reflectometry) which determines the dielectric constant of the soil from the frequency domain characteristics of electric pulses. In addition, ADR (amplitude-domain reflectometry) based on impedance measurement has been proposed as a more convenient and less costly method for measuring the volumetric soil water content. Details of these methods may be found in xe2x80x9cDojo Kankyo Bunsekihoxe2x80x9d, supra, pp. 62-64; Topp, G. C. et al. (1980), Electromagnetic determination of soil water content: Measurements in coaxial transmission lines, Water Resources Research, 16, 574-582; Haruhiko Horino and Toshisuke Maruyama (1993), TDR Measurement of Soil Moisture with Three-line Probe, Collected Papers of Japanese Society of Irrigation, Drainage and Reclamation Engineering, 168, 119-120; Kitahei Tatsumi et al. (1966), Field Measurement of Soil Moisture by FDR, Collected Papers of Japanese Society of Irrigation, Drainage and Reclamation Engineering, 182, 31-38; Makoto Nakajima et al. (1997), Soil Moisture Measurement by ADR, Proceedings of 1997 Spring Meeting of Japanese Association of Groundwater Hydrology, pp. 18-23. In particular, ADR permits very convenient measurements, assures high degree of correlation, can be performed with a simple and easy-to-maintain instrument for measurement, involves easy handling, and enables continuous measurement in a so-called xe2x80x9cmaintenance-freexe2x80x9d manner. However, the methods mentioned above are intended to determine the volumetric soil water content and are incapable of direct measurement of its pF value. An object, therefore, of the present invention is to provide means for measuring the pF value of the soil by investigating its water retentivity without using tensiometry. Another object of the invention is to provide a method in which the pF value of the soil is measured instantaneously and continuously through investigation of its water retentivity and the measured pF value is used to control irrigation. Still another object of the invention is to provide an apparatus for implementing the method. Yet another object of the invention is to provide a method which provides means capable of measuring, particularly in a continuous manner, the pF value of the soil even if it cannot be measured directly by tensiometry or other methods and which controls irrigation on the basis of the measured pF value. A further object of the invention is to provide an apparatus for implementing this method. A still further object of the invention is to provide a method for measurement of soil-water content which enables pF value based control of irrigation by using a simple and easy method for measuring the water retentivity of the soil which precludes the use of a tensiometer in solution culture on solid mediums, particularly in the case of porous, large-diameter particles such as pumice particles. Yet another object of the invention is to provide an apparatus for implementing this method. A further object of the invention is to provide a method which enables pF value based control of irrigation in cultivation on solid mediums. A still further object of the invention is to provide an apparatus for implementing the method. The present inventors conducted intensive studies in order to attain the stated objects and noted that a correlation depending upon the type of the soil, namely, the soil texture, existed between the pF value and the volumetric soil water content that can be measured fairly easily by ADR and other conventional methods described above. It was found that by measuring the volumetric soil water content of interest after determining the correlation between volumetric water content and pF value for that soil, the pF value of the soil could be determined and used to control irrigation. The present invention has been accomplished on the basis of this finding. Thus, the present invention provides a method for measuring the pF value (soil moisture tension) of the soil, comprising the steps of: (a) preliminarily determining the correlation between pF value and volumetric water content of the soil to be measured; (b) measuring the volumetric soil water content; and (c) converting the value of the volumetric soil water content measured in the above step (b) to the corresponding pF value on the basis of the correlation between pF value and volumetric soil water content predetermined in the above step (a).
My Nonprofit Reviews Lucy009 The members of this organization are truly amazing. The founder puts in countless hours of hard work into every part of Healing 4 Heroes to make sure everything is executed flawlessly. The head trainer never gives up on any dog and really puts in the time and effort to training each service dog no matter the dog's past experience or situation. The rest of the volunteers and foster parents have a heart of gold for taking care of each dog. This organization makes a change in countless lives. Our family couldn't thank everyone enough. Thank you guys for everything!
New data showing aspirin’s potential role in reducing the risk of cancer death bring us considerably closer to the time when cancer prevention can be included in clinical guidelines for the use of aspirin in preventative care,according to a new report by American Cancer Society scientists. The report said even a 10 per cent reduction in overall cancer incidence beginning during the first 10 years of treatment could tip the balance of benefits and risks favourably in average-risk populations. Current guidelines for the use of aspirin in disease prevention consider only its cardiovascular benefits,weighed against the potential harm from aspirin-induced bleeding. Advertising While daily aspirin use has also been convincingly shown to reduce the risk of colorectal cancer and recurrence of adenomatous polyps,these benefits alone do not outweigh harms from aspirin-induced bleeding in average-risk populations. But recently published secondary analyses of cardiovascular trials have provided the first randomised evidence that daily aspirin use may also reduce the incidence of all cancers combined,even at low doses (75-100 mg daily). The current review,led by Michael J. Thun,M.D.,vice president emeritus of epidemiology and surveillance research for the American Cancer Society was not designed as a comprehensive review of the literature,but instead is a focused discussion of the key outstanding issues in using aspirin as a cancer prevention tool. The report said recently published meta-analyses of results from randomised trials of daily aspirin treatment to prevent vascular events have provided provocative evidence that daily aspirin at doses of 75 mg and above might lower both overall cancer incidence and overall cancer mortality. Popular Photos In six primary prevention trials of daily low-dose aspirin,randomisation to aspirin treatment was associated with an approximately 20 per cent reduction in overall cancer incidence between 3 and 5 years after initiation of the intervention and a 30 per cent reduction during follow up more than 5 years after randomisation. Cancer mortality was also reduced during study follow up that happened more than 5 years after the start of aspirin use in analyses that included 34 trials of daily aspirin at various doses. Surprisingly,the size of the observed benefit did not increase with daily doses of aspirin above 75-100 mg. Notably,these meta-analyses excluded results from the Women’s Health Study (WHS),a large 10-year-long trial of 100 mg of aspirin taken every other day,which reported no reduction in cancer incidence or mortality. “The accumulating data from randomised clinical trials provide an exciting opportunity to reconsider the potential role of aspirin in cancer prevention,” wrote the authors. More Explained They say several important questions remain unanswered,such as the exact magnitude of the overall cancer benefit and which individual cancer sites contribute to this benefit. “However,these new data bring us considerably closer to the time when cancer prevention can be integrated into the clinical guidelines for prophylactic treatment following regulatory review by the FDA and the European Medicines Agency,” they said.
Q: How can I get the value of a cell in a DATAGRID? Trying to get a Cell value from my DATAGRID using ASP.NET C# and I get error message saying "Object reference not set to an instance of an object". Here is what I have: foreach (DataGridItem dgItem in dgPrintTicket.Items) { string itm = dgItem.Cells[1].FindControl("Item_Number").ToString(); } Thank you A: To overcome the "Object reference not set to an instance of an object" error make your code null safe: foreach (DataGridItem dgItem in dgPrintTicket.Items) { var control = dgItem.Cells[1].FindControl("Item_Number"); string itm = control != null ? control.ToString() : null; } But I suppose you should try to get the value of the cell by following code: foreach (DataGridItem dgItem in dgPrintTicket.Items) { string itm = dgItem.Cells[1].Text; } If there really is a control found by FindControl use this code fragment: foreach (DataGridItem dgItem in dgPrintTicket.Items) { var control = dgItem.Cells[1].FindControl("Item_Number") as Label; string itm = control != null ? control.Text : null; }
Mechanism of hydrolysis and aminolysis of homocysteine thiolactone. Homocysteine thiolactone (tHcy) is deemed a risk factor for cardiovascular diseases and strokes, presumably because it acylates the side chain of protein lysine residues ("N-homocysteinylation"), thereby causing protein damage and autoimmune responses. We analysed the kinetics of hydrolysis and aminolysis of tHcy and two related thiolactones (gamma-thiobutyrolactone and N-trimethyl-tHcy), and we have thereby described the first detailed mechanism of thiolactone aminolysis. As opposed to the previously studied (thio and oxo)esters and (oxo)lactones, aminolysis of thiolactones was found to be first order with respect to amine concentration. Anchimeric assistance by the alpha-amino group of tHcy (through general acid/base catalysis) could not be detected, and the Brønsted plot (nucleophilicity versus pK(a)) for aminolysis yielded a slope (beta(nuc)) value of 0.66. These data support a mechanism of aminolysis where the rate-determining step is the formation of a zwitterionic tetrahedral intermediate. The beta(nuc) value and steric factors dictate a regime whereby, at physiological pH values (pH 7.4), maximal reactivity of tHcy is exhibited with primary amine groups with a pK(a) value of 7.7; this allows the reactivity of various protein amino groups towards N-homocysteinylation to be predicted.
What We Believe God God is the creator and ruler of the universe. He has eternally existed in three persons: the Father, the Son and the Holy Spirit. These three are co-equal and one God. Humankind We are all made in the image of God, to be like Him in character. We are the supreme object of God’s creation. Although humankind has tremendous potential for good, we are marred by an attitude of disobedience toward God called “sin.” This attitude separates us from God. Eternity We all were created to exist forever. We will either exist eternally separated from God by sin, or in union with God through forgiveness and salvation. The place of eternal separation from God is called Hell. Heaven is the place of eternal union and eternal life with God. Jesus Christ Jesus Christ is the Son of God. He is co-equal with the Father. Jesus lived a sinless human life and offered Himself as the perfect sacrifice for the sins of all by dying on a cross. He arose from the dead after three days to demonstrate His power over sin and death. He ascended to Heaven’s glory and will return again to earth to reign as King of kings and Lord of lords. Holy Spirit The Holy Spirit is equal with the Father and the Son as God. He is present in the world to make humankind aware of our need for Jesus Christ. He also lives in every Christian from the moment of salvation. He provides the Christian with power for living, understanding of spiritual truth and guidance in doing what is right. The Christian seeks to live under His control daily. Salvation Salvation is a gift from God to humankind. We can never make up for our sin by self-improvement or good works. Only by trusting in Jesus Christ as God’s offer of forgiveness can we be saved from sin’s penalty. Eternal life begins the moment we receive Jesus Christ into our life by faith. Eternal Security Because God gives us eternal life through Jesus Christ, the believer is secure in this salvation for eternity. Salvation is maintained by the grace and power of God, not by the self-effort of the Christian. It is the grace and keeping power of God that gives this security. The Bible The Bible is God’s word to all humankind. It was written by human authors, under the supernatural guidance of the Holy Spirit. It is the supreme source of truth for Christian beliefs and living. Because it is inspired by God, it is truth without any mixture of error.
--- author: - 'Nicolás Bernal,' - 'A. E. Cárcamo Hernández,' - Ivo de Medeiros Varzielas - and Sergey Kovalenko bibliography: - 'biblio.bib' title: Fermion Masses and Mixings and Dark Matter Constraints in a Model with Radiative Seesaw Mechanism --- PI/UAN-2017-617FT\ LPT-Orsay-17-75 Introduction \[intro\] ====================== A well motivated extension of the Standard Model (SM) is adding a family symmetry in order to account for the observed pattern of SM fermion masses and mixings, i.e. addressing the numerous Yukawa couplings and the large hierarchy between them. These symmetries operate on the generations of fermions and tackle the flavour problem, one of the most relevant of the problems of the SM. The details of the spontaneous breaking of the family symmetry lead to specific Yukawa structures and postdictions for the mixing angles in the quark or lepton sector. Recent reviews on discrete flavour groups can be found in Refs. [@Ishimori:2010au; @Altarelli:2010gt; @King:2013eh; @King:2014nza; @King:2017guk]. In particular the $\Delta(27)$ discrete group  [@deMedeirosVarzielas:2006fc; @Ma:2006ip; @Ma:2007wu; @Varzielas:2012nn; @Bhattacharyya:2012pi; @Ma:2013xqa; @Nishi:2013jqa; @Varzielas:2013sla; @Aranda:2013gga; @Varzielas:2013eta; @Ma:2014eka; @Abbas:2014ewa; @Varzielas:2015aua; @Abbas:2015zna; @Chen:2015jta; @Bjorkeroth:2015uou; @Vien:2016tmh; @Hernandez:2016eod; @CarcamoHernandez:2017owh; @deMedeirosVarzielas:2017sdv; @CarcamoHernandez:2018iel] has attracted a lot of attention as a promising family symmetry for explaining the observed pattern of SM fermion masses and mixing angles. Another prominent issue in particle physics that motivates theories beyond the SM is its lack of a viable Dark Matter (DM) candidate. In fact, there is compelling evidence for the existence of DM, an unknown, non-baryonic matter component whose abundance in the Universe exceeds the amount of ordinary matter roughly by a factor of five [@Ade:2015xua]. Still, the non-gravitational nature of DM remains a mystery [@Bergstrom:2000pn; @Bertone:2016nfn; @deSwart:2017heh]. Most prominent extensions of the SM feature Weakly Interacting Massive Particles (WIMPs) as DM. WIMPs typically have order one couplings to the SM and masses at the electroweak scale. The observation that this theoretical setup gives the observed relic abundance is the celebrated WIMP [*miracle*]{} [@Arcadi:2017kky]. In the standard WIMP paradigm, DM is a thermal relic produced by the freeze-out mechanism. However, the observed DM abundance may have been generated also out of equilibrium by the so-called freeze-in mechanism [@McDonald:2001vt; @Choi:2005vq; @Kusenko:2006rh; @Hall:2009bx; @Petraki:2007gq; @Bernal:2017kxu]. In this scenario, the DM particle couples to the visible SM sector very weakly, so that it never enters chemical equilibrium. Due to the small coupling strength, the DM particles produced via the freeze-in mechanism have been called Feebly Interacting Massive Particles (FIMPs) [@Hall:2009bx]; see Ref. [@Bernal:2017kxu] for a recent review. The solutions to the DM and the flavour problems have indeed often been approached separately in the literature. Nevertheless one could entertain the idea that they have a common origin, whether because some residual flavour symmetry stabilizes it [@Ma:2006km; @Hernandez:2013dta; @Campos:2014lla; @Hernandez:2015hrt; @Varzielas:2015joa; @Arbelaez:2016mhg; @Kownacki:2016hpm; @Nomura:2016emz; @Nomura:2016pgg; @Nomura:2016dnf; @Chulia:2016ngi; @CarcamoHernandez:2016pdu; @CarcamoHernandez:2017kra; @CarcamoHernandez:2017cwi; @Alvarado:2017bax], or where there is a dark sector which communicates to the visible sector only through family symmetry mediators [@Calibbi:2015sfa; @Varzielas:2015sno]. With respect to the flavour problem, a viable form of the Yukawa structure for quarks is the mixing inspired texture where the Cabibbo angle originates from the down-quark sector and the remaining (smaller) mixing angles come from the more hierarchical up quark mixing [@Hernandez:2014zsa]. We build a model based on the non-Abelian group $\Delta(27)$ which achieves a generalisation of this mixing inspired texture for the quarks, and is therefore phenomenologically viable. The model leads to a structure for the charged leptons which is diagonal apart from an entry mixing the first and third generations. The effective neutrino mass matrix arises through radiative seesaw and is in this case a very simple structure, a sum of a democratic structure (all entries equal) plus a contribution only on the first diagonal entry. This predictive scenario for the leptons leads to a good fit to all masses and mixing angles with a correlation between $\theta_{13}$ and $\theta_{23}$, which depend only on the parameters of the charged lepton sector. In addition to the $\Delta(27)$, we need to employ $\mathbb{Z}_N$ symmetries that constrain the allowed terms, and within these, a single $\mathbb{Z}_2$ symmetry remains unbroken and stabilizes a DM, which can be either the lightest of the right-handed neutrinos (which are the only $\mathbb{Z}_2$-odd fermions) or a $\mathbb{Z}_2$-odd scalar. The model can lead to the correct relic abundance either under the WIMP or the FIMP scenarios. The Model \[model\] =================== The model we propose is an extension of the SM that incorporates the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ discrete symmetry and a particle content extended with the SM singlets: scalars $\sigma$, $\eta_{1}$, $\eta_{2}$, $\rho$, $\Phi$, $\Xi$, $\varphi$ and two right handed Majorana neutrinos $N_{1,\,2R}$. All the non-SM fields are charged under the above mentioned discrete symmetry. All the discrete groups are spontaneously broken, except for the $\mathbb{Z}_{2}$ under which only $\varphi$ and $N_{1,\,2R}$ are odd. In this setup the light active neutrino masses arise at one-loop level through a radiative seesaw mechanism, involving two right handed Majorana neutrinos and the $\mathbb{Z}_2$ odd scalars that do not acquire VEVs. Our model reproduces a predictive mixing inspired textures where the Cabibbo mixing arises from the down-type quark sector whereas the remaining mixing angles receive contributions from both up and down type quark sectors. These textures describe the charged fermion masses and quark mixing pattern in terms of different powers of the Wolfenstein parameter $\lambda =0.225$ and order one parameters. The full symmetry $% \mathcal{G}$ of the model exhibits the following spontaneous breaking: $$\begin{aligned} &&\mathcal{G}=SU(3)_{C}\times SU\left( 2\right) _{L}\times U\left( 1\right) _{Y}\times \Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16} \notag \\ &&\hspace{35mm}\Downarrow \Lambda \notag \\[0.12in] &&\hspace{15mm}SU(3)_{C}\times SU\left( 2\right) _{L}\times U\left( 1\right) _{Y}\times \mathbb{Z}_{2} \notag \\[0.12in] &&\hspace{35mm}\Downarrow v \notag \\[0.12in] &&\hspace{15mm}SU(3)_{C}\times U\left( 1\right) _{Q}\times \mathbb{Z}_{2}\,,\end{aligned}$$ where $\Lambda $ is the scale of breaking of the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ discrete group, which we assume to be much larger than the electroweak symmetry breaking scale $v=246$ GeV. The assignments of the scalars and the fermions under the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ discrete group are listed in Tables \[ta:scalars\] and \[ta:fermions\], where the dimensions of the $\Delta \left( 27\right) $ irreducible representations are specified by numbers in boldface and different charges are written in the additive notation. It is worth mentioning that all the scalar fields of the model acquire non-vanishing VEVs, except for the SM singlet scalar field $\varphi$, which is the only scalar charged under the preserved $\mathbb{Z}_{2}$ symmetry. $\phi$ $\sigma$ $\eta_1$ $\eta_2$ $\rho$ $\Phi$ $\Xi$ $\varphi$ ------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------------- ------------------------- ------------------------- ----------------------------- $\Delta\left(27\right)$ $\mathbf{1}_{\mathbf{0,0}}$ $\mathbf{1}_{\mathbf{0,0}}$ $\mathbf{1}_{\mathbf{0,0}}$ $\mathbf{1}_{\mathbf{0,0}}$ $\mathbf{1}_{\mathbf{0,1}}$ $\overline{\mathbf{3}}$ $\overline{\mathbf{3}}$ $\mathbf{1}_{\mathbf{0,0}}$ $\mathbb{Z}_2$ 0 0 0 0 0 0 0 1 $\mathbb{Z}_5$ 0 0 0 0 1 0 0 0 $\mathbb{Z}_6$ 0 0 0 0 0 1 -2 0 $\mathbb{Z}_{10}$ 0 0 -5 -1 0 0 0 0 $\mathbb{Z}_{16}$ 0 -1 0 -1 0 0 0 0 : Scalar assignments under $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$. The scalar $\phi$ corresponds to the SM $SU(2)$ Higgs doublet. The $\mathbb{Z}_{N}$ charges, $q$, shown in the additive notation so that the group element is $\omega = e^{2 \pi i\, q/N }$. For the $\Delta(27)$ representations and the notations see Appendix \[A\].[]{data-label="ta:scalars"} With the above particle content, the following quark, charged lepton and neutrino Yukawa terms arise: $$\begin{aligned} \tciLaplace _{Y}^{\left( U\right) } &=&y_{11}^{\left( U\right) }\overline{q}% _{1L}\widetilde{\phi }u_{1R}\frac{\sigma ^{8}}{\Lambda ^{8}}+y_{12}^{\left( U\right) }\overline{q}_{1L}\widetilde{\phi }u_{2R}\frac{\sigma ^{6}}{\Lambda ^{6}}+y_{13}^{\left( U\right) }\overline{q}_{1L}\widetilde{\phi }u_{3R}\frac{% \sigma ^{4}}{\Lambda ^{4}} \notag \\ &&+y_{21}^{\left( U\right) }\overline{q}_{2L}\widetilde{\phi }u_{1R}\frac{% \sigma ^{6}}{\Lambda ^{6}}+y_{22}^{\left( U\right) }\overline{q}_{2L}% \widetilde{\phi }u_{2R}\frac{\sigma ^{4}}{\Lambda ^{4}}+y_{23}^{\left( U\right) }\overline{q}_{2L}\widetilde{\phi }u_{3R}\frac{\sigma ^{2}}{\Lambda ^{2}} \notag \\ &&+y_{31}^{\left( U\right) }\overline{q}_{3L}\widetilde{\phi }u_{1R}\frac{% \sigma ^{4}}{\Lambda ^{4}}+y_{32}^{\left( U\right) }\overline{q}_{3L}% \widetilde{\phi }u_{2R}\frac{\sigma ^{2}}{\Lambda ^{2}}+y_{33}^{\left( U\right) }\overline{q}_{3L}\widetilde{\phi }u_{3R}+h.c, \label{lyu}\end{aligned}$$ $$\begin{aligned} \tciLaplace _{Y}^{\left( D\right) } &=&y_{11}^{\left( D\right) }\overline{q}% _{1L}\phi d_{1R}\frac{\sigma ^{7}}{\Lambda ^{7}}+y_{12}^{\left( D\right) }% \overline{q}_{1L}\phi d_{2R}\frac{\eta _{2}^{5}\sigma }{\Lambda ^{6}}% +y_{13}^{\left( D\right) }\overline{q}_{1L}\phi d_{3R}\frac{\sigma ^{7}}{% \Lambda ^{7}} \notag \\ &&+y_{21}^{\left( D\right) }\overline{q}_{2L}\phi d_{1R}\frac{\sigma ^{5}}{% \Lambda ^{5}}+y_{22}^{\left( D\right) }\overline{q}_{2L}\phi d_{2R}\frac{% \sigma ^{4}\eta _{1}}{\Lambda ^{5}}+y_{23}^{\left( D\right) }\overline{q}% _{2L}\phi d_{3R}\frac{\sigma ^{5}}{\Lambda ^{5}} \notag \\ &&+y_{31}^{\left( D\right) }\overline{q}_{3L}\phi d_{1R}\frac{\sigma ^{3}}{% \Lambda ^{3}}++y_{32}^{\left( D\right) }\overline{q}_{3L}\phi d_{2R}\frac{% \eta _{1}\sigma ^{2}}{\Lambda ^{3}}+y_{33}^{\left( D\right) }\overline{q}% _{3L}\phi d_{3R}\frac{\sigma ^{3}}{\Lambda ^{3}}+h.c, \label{lyd}\end{aligned}$$ $$\begin{aligned} \tciLaplace _{Y}^{\left( l\right) }&=&y_{33}^{\left( l\right) }\left( \overline{l}_{L}\phi \Phi \right) _{\mathbf{1}_{\mathbf{0,1}}}l_{3R}\frac{% \rho ^{2}}{\Lambda ^{3}}+y_{13}^{\left( l\right) }\left( \overline{l}% _{L}\phi \Phi \right) _{\mathbf{1}_{\mathbf{0,0}}}l_{3R}\frac{\left( \rho ^{\ast }\right) ^{3}}{\Lambda ^{4}}\notag\\ &&+y_{22}^{\left( l\right) }\left(\overline{l}_{L}\phi \Phi \right) _{\mathbf{1}_{\mathbf{0,2}}}l_{2R}\frac{% \rho \sigma ^{3}}{\Lambda ^{5}}+y_{11}^{\left( l\right) }\left( \overline{l}% _{L}\phi \Phi \right) _{\mathbf{1}_{\mathbf{0,0}}}l_{1R}\frac{\sigma ^{8}}{% \Lambda ^{9}}+h.c, \label{lyl}\end{aligned}$$ $$\begin{aligned} \tciLaplace _{Y}^{\left( \nu \right) }&=&y_{1}^{\left( \nu \right) }\left( \overline{l}_{L}\widetilde{\phi }\Phi \right) _{\mathbf{1}_{\mathbf{0,0}% }}N_{1R}\frac{\varphi }{\Lambda ^{2}}+y_{2}^{\left( \nu \right) }\left( \overline{l}_{L}\widetilde{\phi }\Xi \right) _{\mathbf{1}_{\mathbf{0,0}% }}N_{2R}\frac{\varphi }{\Lambda ^{2}}\nonumber\\ &&\quad\quad+m_{N_{1R}}\overline{N}% _{1R}N_{1R}^{C}+m_{N_{2R}}\overline{N}_{2R}N_{2R}^{C}+h.c, \label{Lyn}\end{aligned}$$ where the dimensionless couplings in Eqs. (\[lyu\])-(\[Lyn\]) are $% \mathcal{O}(1)$ parameters, which we will constrain through a fit to the observed fermion masses and mixings parameters. In addition to these terms, the symmetries unavoidably allow terms in $\tciLaplace _{Y}^{\left( l\right) }$ where the contraction $\left( \overline{l}_{L}\phi \Phi \right)$ is replaced with $\left( \overline{l}_{L}\phi \Xi \right) \left( \Xi^\dagger \Phi \right)$. For example, in addition to $\left( \overline{l}_{L}\phi \Phi \right) l_{3R}\frac{% \rho ^{2}}{\Lambda ^{3}}$, the following term is allowed: $\left( \overline{l}_{L}\phi \Xi \right) \left( \Xi^\dagger \Phi \right) l_{3R}\frac{% \rho ^{2}}{\Lambda ^{5}}$. These terms have two additional suppressions of $\langle \Xi \rangle/\Lambda$ and can be safely neglected if there is a mild hierarchy between $\langle \Xi \rangle$ and $\langle \Phi \rangle$. This hierarchy in the VEVs is consistent is also consistent with the mild hierarchy obtained for the masses of the light effective neutrinos after seesaw. As indicated by the current low energy quark flavour data encoded in the Standard parametrization of the quark mixing matrix, the complex phase responsible for CP violation in the quark sector is associated with the quark mixing angle in the $1$-$3$ plane. Consequently, in order to reproduce the experimental values of quark mixing angles and CP violating phase, the Yukawa coupling in Eq. (\[lyu\]) $y_{13}^{\left( U\right) }$ is required to be complex. An explanation of the role of each discrete group factor of our model is provided in the following. The $\Delta \left( 27\right)$, $\mathbb{Z}_{5}$, $\mathbb{Z}_{6}$ and $\mathbb{Z}_{10}$ discrete groups are crucial for reducing the number of model parameters, thus increasing the predictivity of our model and giving rise to predictive and viable textures for the fermion sector, consistent with the observed pattern of fermion masses and mixings, as will be shown later in Sects. \[quarksector\] and \[leptonsector\]. The $\Delta \left( 27\right) $, $\mathbb{Z}_{5}$, $\mathbb{Z}_{6}$ and $\mathbb{Z}_{10}$ discrete groups, which are spontaneously broken, determine the allowed entries of the quark mass matrices as well as their hierarchical structure in terms of different powers of the Wolfenstein parameter, thus giving rise to the observed SM fermion mass and mixing pattern. In particular the $\mathbb{Z}_{5}$ discrete symmetry is crucial for explaining the tau and muon charged lepton masses as well as the Cabbibo sized value for the reactor mixing angle, which only arises from the charged lepton sector. The $\mathbb{Z}_{6}$ discrete group allows us to get a predictive texture for the light active neutrino sector. This symmetry forbids mixings between the two right handed Majorana neutrinos $N_{1R}$ and $N_{2R}$. The $\mathbb{Z}_{10}$ discrete symmetry allows to get the right hierarchical in the second column of the down type quark mass matrix crucial to successfully reproduce the right values of the strange quark mass and the Cabbibo angle with $\mathcal{O}(1)$ parameters. As a result of the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ charge assignment for scalars and quarks given in Tables \[ta:scalars\] and \[ta:fermions\], the Cabibbo mixing will arise from the down type quark sector, whereas the remaining mixing angles will receive contributions for both up and down type sectors. The preserved $\mathbb{Z}_{2}$ symmetry allows the implementation of the one loop level radiative seesaw mechanism for the generation of the light active neutrino masses as well as provides a viable DM particle candidate. We assume the following VEV pattern for the $\Delta \left( 27\right) $ triplet SM singlet scalars $$\label{eq:Phi-Sigma-VEVs} \left\langle \Phi \right\rangle =v_{\Phi }\,\left( 1,0,0\right)\, ,\hspace{1.5cm}% \left\langle \Xi \right\rangle =v_{\Xi }\,\left( 1,1,1\right)\, ,$$ which is consistent with the scalar potential minimization equations for a large region of parameter space as shown in detail in Ref. [@deMedeirosVarzielas:2017glw]. Besides that, as the hierarchy among charged fermion masses and quark mixing angles emerges from the breaking of the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ discrete group, we set the VEVs of the SM singlet scalar fields with respect to the Wolfenstein parameter $\lambda =0.225$ and the model cutoff $\Lambda $, as follows: $$v_{\sigma}\sim v_{\eta_{1}}\sim v_{\eta _{2}}\sim v_{\rho}\sim v_{\Phi }\sim \lambda\,\Lambda\,, v_{\Xi } \sim \lambda^{3/2}\,\Lambda\,. \label{VEVs}$$ We require a mild hierarchy between the VEVs of the two $\Delta(27)$ triplet scalars $\Phi$ and $\Xi$ (merely a factor of two), which is sufficient to suppress the effect of unavoidable terms in the charged lepton sector, which could otherwise spoil the phenomenology of the model discussed in Section \[leptonsector\]. The model cutoff scale $\Lambda $ can be thought of as the scale of the UV completion of the model, e.g. the masses of Froggatt-Nielsen messenger fields. It is straightforward to show that the assumption regarding the VEV size of the SM singlet scalars given by Eq.  is consistent with the scalar potential minimization. That assumption given by that equation can be justified by considering $\mu^2_{\Xi}<\mu^2_{\sigma}\sim\mu^2_{\eta_{1}}\sim\mu^2_{\eta_{2}}\sim\mu^2_{\rho}\sim\mu^2_{\Phi}$ and the quartic scalar couplings of the same order of magnitude. Quark Masses and Mixings \[quarksector\] ======================================== From the quark Yukawa terms of Eqs. (\[lyu\]) and (\[lyd\]), inserting the VEV magnitudes of the scalars with respect to $\Lambda$ we rewrite it in term of effective parameters $$\begin{aligned} \tciLaplace _{Y}^{\left( Q\right) } &=&\frac{(v+H)}{\sqrt 2} \left( a_{11}^{\left( U\right) }\overline{q}_{1L}u_{1R}\lambda^{8}+a_{12}^{\left( U\right) }% \overline{q}_{1L}u_{2R}\lambda^6+a_{13}^{\left( U\right) }\overline{q}_{1L} u_{3R}\lambda^{4}\nonumber\right.\\ &&+\left.a_{21}^{\left( U\right) }\overline{q}_{2L}u_{1R}\lambda^{6}+a_{22}^{\left( U\right) }\overline{q}_{2L}u_{2R}\lambda^{4}+a_{23}^{\left( U\right) }\overline{q}_{2L}u_{3R}\lambda^{2}\nonumber\right.\\ &&+\left. a_{31}^{\left( U\right) }\overline{q}_{3L}u_{1R}\lambda^{4}+a_{32}^{\left( U\right) }% \overline{q}_{2L}u_{3R} \lambda^2+a_{33}^{\left( U\right) }\overline{q}_{3L}u_{3R}\right)\nonumber\\ &&+\frac{(v+H)}{\sqrt 2} \left( a_{11}^{\left( D\right) }\overline{q}_{1L}d_{1R}\lambda^{7}+a_{12}^{\left( D\right) }% \overline{q}_{1L}d_{2R}\lambda^6+a_{13}^{\left( U\right) }\overline{q}_{1L} d_{3R}\lambda^{7}\nonumber\right.\\ &&+\left.a_{21}^{\left(D\right) }\overline{q}_{2L}d_{1R}\lambda^{5}+a_{22}^{\left(D\right) }\overline{q}_{2L}d_{2R}\lambda^{5}+a_{23}^{\left( D\right) }\overline{q}_{2L}d_{3R}\lambda^{5}\nonumber\right.\\ &&+\left. a_{31}^{\left( D\right) }\overline{q}_{3L}d_{1R}\lambda^3+a_{32}^{\left( D\right) }% \overline{q}_{3L}d_{2R}\lambda^3+a_{33}^{\left(D\right) }\overline{q}_{3L}d_{3R}\lambda^3\right)+h.c.%\nonumber\end{aligned}$$ Then it follows that the quark mass matrices take the form: $$M_{U}=\left( \begin{array}{ccc} a_{11}^{\left( U\right) }\lambda ^{8} & a_{12}^{\left( U\right) }\lambda ^{6} & a_{13}^{\left( U\right) }\lambda ^{4} \\ a_{21}^{\left( U\right) }\lambda ^{6} & a_{2}^{\left( U\right) }\lambda ^{4} & a_{23}^{\left( U\right) }\lambda ^{2} \\ a_{31}^{\left( U\right) }\lambda^{4} & a_{32}^{\left( U\right) }\lambda^{2} & a_{33}^{\left( U\right) }% \end{array}% \right) \frac{v}{\sqrt{2}},\hspace{1.0cm}M_{D}=\left( \begin{array}{ccc} a_{11}^{\left( D\right) }\lambda ^{7} & a_{12}^{\left( D\right) }\lambda ^{6} & a_{13}^{\left( D\right) }\lambda ^{7} \\ a_{21}^{\left( D\right) }\lambda ^{5} & a_{22}^{\left( D\right) }\lambda ^{5} & a_{23}^{\left( D\right) }\lambda ^{5} \\ a_{31}^{\left( D\right) }\lambda ^{3} & a_{32}^{\left( D\right) }\lambda ^{3} & a_{33}^{\left( D\right) }\lambda ^{3} \end{array}% \right) \frac{v}{\sqrt{2}}, \label{Quarktextures}$$ where $a_{ij}^{\left( U\right) }$ and $a_{ij}^{\left( D\right) }$ ($i,\,j=1,\,2,\,3$) are $\mathcal{O}(1)$ parameters. Here $% \lambda =0.225$ is the Wolfenstein parameter and $v=246$ GeV the scale of electroweak symmetry breaking. The SM quark mass textures given above indicate that the Cabibbo mixing emerges from the down type quark sector, whereas the remaining mixing angles receive contributions from both up and down type quark sectors. Indeed, this texture is a generalisation of the particular case referred to as the mixing inspired texture [@Hernandez:2014zsa], in which the two small quark mixing angles would arise solely from the up type quark sector. Besides that, the low energy quark flavour data indicates that the CP violating phase in the quark sector is associated with the quark mixing angle in the 1-3 plane, as follows from the Standard parametrization of the quark mixing matrix. Consequently, in order to get quark mixing angles and a CP violating phase consistent with the experimental data, we adopt a minimalistic scenario where all the dimensionless parameters given in Eq. (\[Quarktextures\]) are real, except for $a_{13}^{\left( U\right)}$, taken to be complex. The obtained values for the physical quark mass spectrum [Bora:2012tx,Xing:2007fb]{}, mixing angles and Jarlskog invariant [Olive:2016xmw]{} are consistent with their experimental data, as shown in Table \[Tab\], starting from the following benchmark point that would correspond to the limit of the mixing inspired texture [@Hernandez:2014zsa] [^1]: $$\begin{aligned} a_{11}^{\left( U\right) } &\simeq &1.266,\hspace{0.4cm}a_{22}^{\left( U\right)}\simeq 1.430,\hspace{0.4cm}a_{33}^{\left(U\right) }\simeq 0.989,\hspace{0.4cm}a_{13}^{\left( U\right) }\simeq -0.510-1.262i,\hspace{0.4cm}a_{23}^{\left( U\right) }\simeq 0.806, \notag \\ a_{11}^{\left( D\right) } &\simeq &0.550,\hspace{0.4cm}a_{22}^{\left( D\right) }\simeq 0.554,\hspace{0.4cm}a_{33}^{\left( D\right) }\simeq 1.411,\hspace{0.4cm}% a_{12}^{\left( D\right) }\simeq 0.565. \label{fit-q}\end{aligned}$$ Observable Model value Experimental value ------------------------- --------------- ------------------------ $m_{u}$ \[MeV\] $1.47$ $1.45_{-0.45}^{+0.56}$ $m_{c}$ \[MeV\] $641$ $635\pm 86$ $m_{t}$ \[GeV\] $172$ $172.1\pm 0.6\pm 0.9$ $m_{d}$ \[MeV\] $2.8$ $2.9_{-0.4}^{+0.5}$ $m_{s}$ \[MeV\] $57.5$ $57.7_{-15.7}^{+16.8}$ $m_{b}$ \[GeV\] $2.81$ $2.82_{-0.04}^{+0.09}$ $\sin\theta^{(q)}_{12}$ $0.225$ $0.225$ $\sin\theta^{(q)}_{23}$ $0.0414$ $0.0414$ $\sin\theta^{(q)}_{13}$ $0.00355$ $0.00355$ $\delta $ $68^{\circ }$ $68^{\circ }$ : Model and experimental values of the quark masses and CKM parameters.[]{data-label="Tab"} In Table \[Tab\] we show the model and experimental values for the physical observables of the quark sector. We use the $M_{Z}$-scale experimental values of the quark masses given by Ref. [@Bora:2012tx] (which are similar to those in Ref. [@Xing:2007fb]). The experimental values of the CKM parameters are taken from Ref. [@Agashe:2014kda]. As indicated by Table \[Tab\], the obtained quark masses, quark mixing angles, and CP violating phase can be fitted to the experimental low energy quark flavour data. We note that the values (\[fit-q\]) of the parameters $a^{(U,\,D)}_{i}$ are compatible with $\mathcal{O}(1)$. This fact supports the desired feature of the model that the hierarchy of masses and mixing angles are encoded in the powers of $\lambda$ and texture zero of the mass matrices Eq. (\[Quarktextures\]), which in its turn is the consequence of the particular flavour symmetry of the model. Lepton Masses and Mixings \[leptonsector\] ========================================== We can expand the contractions of the $\Delta (27)$ (anti-)triplets $l_{L}$, $\Phi $ and $\Xi $ according to the scalar VEV directions in Eq. (\[eq:Phi-Sigma-VEVs\]). Then we have $\left( \overline{l}_{L}\Phi \right) _{\mathbf{1}_{\mathbf{0,0}}}\propto \overline{l}_{1L}$, $\left( \overline{l}_{L}\Phi \right) _{\mathbf{1}_{\mathbf{0,2}}}\propto \overline{l}% _{2L}$, $\left( \overline{l}_{L}\Phi \right) _{\mathbf{1}_{\mathbf{0,1}% }}\propto \overline{l}_{3L}$, and $\left( \overline{l}_{L}\Xi \right) _{% \mathbf{1}_{\mathbf{0,0}}}\propto \left( \overline{l}_{1L}+\overline{l}_{2L}+% \overline{l}_{3L}\right) $. Taking into account $v_{\Phi}\sim v_{\Sigma} \sim \lambda\,\Lambda$, specified in Eq. (\[VEVs\]), we rewrite Eqs. (\[lyl\]) and (\[Lyn\]) in the form $$\label{eq:chlept-1} \tciLaplace _{Y}^{\left( l\right) }=\frac{(v+H)}{\sqrt{2}}\left( a_{3}^{\left( l\right) }\overline{l}_{3L}l_{3R}\lambda ^{3}+a_{4}^{\left( l\right) }\overline{l}_{1L}l_{3R}\lambda ^{4}+a_{2}^{\left( l\right) }% \overline{l}_{2L}l_{2R}\lambda ^{5}+a_{1}^{\left( l\right) }\overline{l}% _{1L}l_{1R}\lambda ^{9} \right) +h.c ,$$$$\begin{aligned} \tciLaplace _{Y}^{\left( \nu \right) }&=&\frac{(v+H)}{\sqrt{2}} \left( y_{2}^{\left( \nu \right) }v_{\Xi }\left( \overline{l}_{1L}+\overline{l}_{2L}+\overline{l}_{3L}\right) N_{2R}\frac{\varphi }{\Lambda ^{2}}+y_{1}^{\left( \nu \right) }v_{\Phi }\overline{l}_{1L} N_{1R}\frac{\varphi }{% \Lambda ^{2}} \right) \nonumber \\ &&\qquad+m_{N_{1R}}\overline{N}_{1R}N_{1R}^{C}+m_{N_{2R}}\overline{N}% _{2R}N_{2R}^{C} +h.c. \label{eq:expanded_neutrinoL}\end{aligned}$$ From Eq. (\[eq:chlept-1\]) we find the charged lepton mass matrix $$M_{l}=\left( \begin{array}{ccc} a_{1}^{\left( l\right) }\lambda ^{9} & 0 & a_{4}^{\left( l\right) }\lambda ^{4} \\ 0 & a_{2}^{\left( l\right) }\lambda ^{5} & 0 \\ 0 & 0 & a_{3}^{\left( l\right) }\lambda ^{3}% \end{array}% \right) \frac{v}{\sqrt{2}},$$where $a_{k}^{\left( l\right) }$ ($k=1,\cdots ,4$) are $\mathcal{O}(1)$ dimensionless parameters. The contribution from the charged lepton sector to the PMNS matrix, $U^{\left( l\right) }$ consists in a rotation by a single non-vanishing angle $\theta_{13}^{\left( l\right) }$ which depends crucially on $a_{4}^{\left( l\right)}$. The effective neutrino mass matrix $M_\nu$ arises after radiative seesaw, from the Yukawa terms (which we expanded in Eq. (\[eq:expanded\_neutrinoL\])) with scalar $\varphi $ (which does not acquire a VEV) and the masses of the right-handed neutrinos. The mechanism is associated with the loop diagrams in Fig. \[Loopdiagram\]. Considering these diagrams and the Dirac couplings in Eq.(\[eq:expanded\_neutrinoL\]) with $\varphi$, which we represent in the matrix form $Y^\nu_\varphi$: $$Y^{\nu }_{\varphi} = \frac{v}{\sqrt{2} \Lambda^2} \left( \begin{array}{cc} v_\Phi y^{(\nu)}_1 & v_\Xi y^{(\nu)}_2 \\ 0 & v_\Xi y^{(\nu)}_2 \\ 0 & v_\Xi y^{(\nu)}_2 % \end{array}% \right) ,$$ one reads off there will be a democratic contribution associated with the $y^{(\nu)}_2$ coupling filling each entry in $M_\nu$ equally (due to the coupling to the combination $\left( \overline{l}_{1L}+\overline{l}_{2L}+\overline{l}_{3L}\right) $) whereas the $y^{(\nu)}_1$ coupling is responsible for a contribution solely to the $11$ entry of $M_\nu$. Thus we write the effective neutrino mass matrix in the form $$\label{eq:Mnu-1} M_{\nu }=\left( \begin{array}{ccc} A_{1}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) } \\ A_{2}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) } \\ A_{2}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) } & A_{2}^{\left( \nu \right) }% \end{array}% \right) ,$$ where the dimensionful parameters $A_{1}^{\left( \nu \right) }$ and $% A_{2}^{\left( \nu \right) }$ follow from the loop functions of the diagrams in Fig. \[Loopdiagram\]. $$\begin{aligned} A_{1}^{\left( \nu \right) }&\simeq& \frac{\left( y_{2}^{\left( \nu \right) }\right) ^{2}v_{\Xi }^{2}v^{2}m_{N_{2R}}}{32\pi ^{2}\Lambda ^{4}}f\left( m_{% \func{Re}\varphi },m_{\func{Im}\varphi },m_{N_{2R}}\right)\nonumber\\ &&\qquad+\frac{\left( y_{1}^{\left( \nu \right) }\right) ^{2}v_{\Phi }^{2}v^{2}m_{N_{1R}}}{32\pi ^{2}\Lambda ^{4}}f\left( m_{\func{Re}\varphi },m_{\func{Im}\varphi },m_{N_{1R}}\right) , \label{A1nu}\end{aligned}$$ $$A_{2}^{\left( \nu \right) }\simeq \frac{\left( y_{2}^{\left( \nu \right) }\right) ^{2}v_{\Xi }^{2}v^{2}m_{N_{2R}}}{32\pi ^{2}\Lambda ^{4}}f\left( m_{% \func{Re}\varphi },m_{\func{Im}\varphi },m_{N_{2R}}\right) , \label{A2nu}$$ $$f\left( m_{\func{Re}\varphi },m_{\func{Im}\varphi },m_{N_{kR}}\right) =\frac{% m_{\func{Re}\varphi }^{2}}{m_{\func{Re}\varphi }^{2}-m_{N_{kR}}^{2}}\ln \left( \frac{m_{\func{Re}\varphi }^{2}}{m_{N_{kR}}^{2}}\right) -\frac{m_{% \func{Im}\varphi }^{2}}{m_{\func{Im}\varphi }^{2}-m_{N_{kR}}^{2}}\ln \left( \frac{m_{\func{Im}\varphi }^{2}}{m_{N_{kR}}^{2}}\right)\,, \label{f}$$ with $k=1$, $2$. We note that $\varphi $ needs to be a complex scalar otherwise the loop functions vanish, and further the real and imaginary parts of $\varphi $ must not have degenerate masses. The structure of $M_{\nu}$ is such that it has an eigenvector $(0,1,-1)/\sqrt{2}$ with a vanishing eigenvalue, corresponding therefore to a massless neutrino. This means the neutrino sector’s contribution to the PMNS matrix, $U^{\left( \nu \right) }$, has one direction which is $(0,1,-1)/\sqrt{2}$, meaning $\theta_{13}^{\left( \nu \right) } =0 $ and $\theta_{23}^{\left( \nu \right) }= \pi/4$. This gets modified by the contribution from the charged lepton sector such that the reactor angle is non-zero, but given that the associated state is the massless state this structure is viable for the inverted hierarchy of neutrino masses (but not for the normal hierarchy). Indeed, we find that for our model the normal hierarchy scenario leads to a too large reactor mixing angle, thus being ruled out by the current data on neutrino oscillation experiments. The $\mathcal{O}(1)$ dimensionless couplings $a_{i}^{\left( l\right) }$ ($% i=1,\cdots ,4$) determine the charged lepton masses, the reactor mixing parameter $\sin ^{2}\theta _{13} \neq 0$ and the deviation $\sin ^{2}\theta _{23} - 1/2 \neq 0$, which are correlated: $$\sin ^{2}\theta _{23} = \frac{1}{2\,(1-\sin ^{2}\theta _{13})}\,.$$ In turn, $A_{1}^{\left( \nu \right) }$ and $A_{2}^{\left( \nu \right) }$ are dimensionful parameters crucial to determine the neutrino mass squared splittings as well as the solar angle $\sin ^{2}\theta _{12}$. For the sake of simplicity and proving these leptonic structures are viable, we assume that the parameters $a_{l}^{\left( l\right) }$ ($l=1,\cdots ,4$), $A_{2}^{\left( \nu \right) }$ are real whereas $A_{1}^{\left( \nu \right) }$ is taken to be complex. We have checked numerically that the simplest scenario of all lepton parameters ($% a_{l}^{\left( l\right) }$ ($l=1,\cdots ,4$), $A_{1}^{\left( \nu \right) }$and $A_{2}^{\left( \nu \right) }$) being real leads to a solar mixing parameter $% \sin ^{2}\theta _{12}$ close to about $0.2$, which is below its $3\sigma$ experimental lower bound. In order to reproduce the experimental values of the physical observables of the lepton sector, i.e. the three charged lepton masses, two neutrino mass squared splittings and the three leptonic mixing parameters, we proceed to fit the parameters $a_{k}^{\left( l\right) }$ ($k=1,\cdots ,4$), $% \left\vert A_{1}^{\left( \nu \right) }\right\vert $,$\ A_{2}^{\left( \nu \right) }$ and $\arg \left[ A_{1}^{\left( \nu \right) }\right] $. For the case of inverted neutrino mass hierarchy we find the following best fit result $$\begin{aligned} a_{1}^{\left( l\right) } &\simeq &1.936,\hspace{1cm}a_{2}^{\left( l\right) }\simeq 1.025,\hspace{1cm}a_{3}^{\left( l\right) }\simeq 0.864,\hspace{1cm}% a_{4}^{\left( l\right) }\simeq 0.813, \notag \\ \left\vert A_{1}^{\left( \nu \right) }\right\vert &\simeq &69.7\hspace{0.5mm}% \mbox{meV},\hspace{1cm}A_{2}^{\left( \nu \right) }\simeq 20.6\hspace{0.5mm}% \mbox{meV},\hspace{1cm}\arg \left[ A_{1}^{\left( \nu \right) }\right] \simeq -58.26^{\circ }. \label{Fitpointneutrino}\end{aligned}$$ The small hierarchy between effective parameters $\left\vert A_{1}^{\left( \nu \right) }\right\vert $,$\ A_{2}^{\left( \nu \right) }$ is consistent with the mild hierarchy between $\langle \Phi \rangle$ and $\langle \Xi \rangle$. As follows from Eqs. (\[A1nu\])-(\[f\]), the obtained numerical values given above for the neutrino parameters $\left\vert A_{1}^{\left( \nu \right) }\right\vert $, $A_{2}^{\left( \nu \right) }$ and $\arg \left[ A_{1}^{\left( \nu \right) }\right] $ can be obtained from the following benchmark point: $$\begin{aligned} m_{N_{1}} &=&500\hspace{0.5mm}\mbox{GeV},\hspace{0.5cm}m_{N_{2}}=2\hspace{% 0.5mm}\hspace{0.5mm}\mbox{TeV},\hspace{0.5cm}m_{\func{Re}\varphi }=900% \hspace{0.5mm}\hspace{0.5mm}\mbox{GeV},\hspace{0.5cm}m_{\func{Im}\varphi }=600\hspace{0.5mm}\mbox{GeV}, \notag \\ \Lambda &=&2.41\times 10^{5}~\mbox{TeV},\hspace{0.5cm}\left\vert y_{1\nu }\right\vert =1.12,\hspace{0.5cm}y_{2\nu }=0.61,\hspace{0.5cm}\arg \left[ y_{1\nu }\right] \simeq -37.4^{\circ }\,. \label{benchmarkpointneutrino}\end{aligned}$$ \[tab:leptons\] ------------------------------------------------ ---------- -------------------------------- ------------------ ------------------- $1\sigma$ range $2\sigma$ range $3\sigma$ range $m_{e}$ \[MeV\] $0.487$ $0.487$ $0.487$ $0.487$ $m_{\mu }$ \[MeV\] $102.8$ $102.8\pm 0.0003$ $102.8\pm0.0006$ $102.8\pm 0.0009$ $m_{\tau }$ \[GeV\] $1.75$ $1.75\pm 0.0003$ $1.75\pm0.0006$ $1.75\pm 0.0009$ $\Delta m_{21}^{2}$ \[$10^{-5}$eV$^{2}$\] (IH) $7.56$ $7.56\pm0.19$ $7.20-7.95$ $7.05-8.14$ $\Delta m_{13}^{2}$ \[$10^{-3}$eV$^{2}$\] (IH) $2.49$ $2.49\pm0.04$ $2.41-2.57$ $2.37-2.61$ $0-31$ $142-360$ $\sin ^{2}\theta _{12}$ (IH) $0.321$ $0.321_{-0.016}^{+0.018} $ $0.289-0.359$ $0.273-0.379$ $0.404-0.456$ $0.556-0.625$ $\sin ^{2}\theta _{13}$ (IH) $0.0214$ $0.0214_{-0.00085}^{+0.00082}$ $0.0197-0.0230$ $0.0189-0.0239$ ------------------------------------------------ ---------- -------------------------------- ------------------ ------------------- : Model and experimental values of the charged lepton masses, neutrino mass squared splittings and leptonic mixing parameters for the inverted (IH) mass hierarchy. The model values for CP violating phase are also shown. The experimental values of the charged lepton masses are taken from Ref. [@Bora:2012tx], whereas the range for experimental values of neutrino mass squared splittings and leptonic mixing parameters, are taken from Ref. [@deSalas:2017kay].[]{data-label="Observables0"} The benchmark point given above is one out of the many similar solutions that yields physical observables for the neutrino sector consistent with the experimental data. We have numerically checked that for a fixed mass splittings between the masses of the real and imaginary components of $\varphi$, the cutoff scale has a low sensitivity with the masses of the scalar and fermionic seesaw mediators. In addition, we have checked that lowering the mass splitting between $Re\varphi$ and $Im\varphi$ leads to a decrease of the cutoff scale. In particular lowering this mass splitting from $50\%$ up to $0.1\%$ of the mass of $Im\varphi$ leads to a decrease of the cutoff scale from $\sim 10^8$ GeV up to $\sim 10^7$ GeV. From Table \[Observables0\], it follows that the reactor $\sin ^{2}\theta _{13}$ and solar $\sin^{2}\theta _{12}$ leptonic mixing parameters are in excellent agreement with the experimental data, whereas the atmospheric $\sin ^{2}\theta _{23}$ mixing parameter is deviated $3\sigma $ away from its best fit value. Fig. \[Correlation\] shows the correlation between the solar mixing parameter $\sin^{2}\theta _{12}$ and the Jarlskog invariant for the case of inverted neutrino mass hierarchy. We found a leptonic Dirac CP violating phase of $281.6^{\circ }$ and a Jarlskog invariant close to about $-3.3\times 10^{-2}$ for the inverted neutrino mass hierarchy. ![Correlation between the solar mixing parameter $\sin ^{2}\theta _{12}$ and the Jarlskog invariant for the case of inverted neutrino mass hierarchy. The horizontal lines are the minimum and maximum values of the solar mixing parameter $\sin^{2}\theta _{12}$ inside the $1\protect\sigma$ experimentally allowed range.[]{data-label="Correlation"}](Correlationplotv3){width="47.00000%"} Let us consider the effective Majorana neutrino mass parameter $$m_{ee}=\left\vert \sum_{j}U_{ek}^{2}m_{\nu _{k}}\right\vert , \label{mee}$$ where $U_{ej}$ and $m_{\nu _{k}}$ are the PMNS leptonic mixing matrix elements and the neutrino Majorana masses, respectively. The neutrinoless double beta ($0\nu \beta \beta $) decay amplitude is proportional to $m_{ee}$. From Eq. (\[eq:Mnu-1\]) it follows that in our model there is a massless neutrino. It is well known that in this case, independently of the other parameters, one expects for the inverted neutrino mass hierarchy 15 meV $< m_{ee}<$ 50 meV. With the model best fit values in Table \[tab:leptons\] we find $$m_{ee}\simeq 41.3~\mbox{meV}\,. \label{eff-mass-pred}$$ This is within the declared reach of the next-generation bolometric CUORE experiment [@Alessandria:2011rc] or, more realistically, of the next-to-next-generation ton-scale $0\nu \beta \beta $-decay experiments. The current most stringent experimental upper limit $m_{ee}\leq 160$ meV is set by $T_{1/2}^{0\nu \beta \beta }(^{136}\mathrm{Xe})\geq 1.1\times 10^{26}$ yr at 90% C.L. from the KamLAND-Zen experiment [@KamLAND-Zen:2016pfg]. In theory, Lepton Flavour Violation processes are expected from this kind of model. However, in realisations such as these the new scale $\Lambda$ associated with family symmetry breaking scale is very high. Thus, the rate of muon conversion processes such as $\mu N \to e N$ ($N$ is nucleon), $\mu \to eee$, $\mu \to e \gamma$ is several orders of magnitude beyond experimental reach [@Varzielas:2010mp]. Scalar Potential \[scalar\] =========================== In this section we consider the scalar potential. As can be seen in Table \[ta:scalars\], the scalar content of the model has many degrees of freedom. We assume that all scalars except for $\phi$ and $\varphi$ get their VEVs at the family symmetry breaking scale, which should be near the cutoff scale $\Lambda$, much greater than the electroweak breaking scale defined by the VEV of $\langle \phi \rangle \sim v$ (we can check the self-consistency of this assumption in the benchmark point in Eq. (\[benchmarkpointneutrino\])). Due to this, the family symmetry breaking scalars decouple, such that we have at the TeV scale the effective potential $V(\phi,\varphi)$. We divide it into separate parts for convenience, and use without loss of generality the mass eigenstates $\func{Re}\varphi$, $\func{Im% }\varphi$ instead of $\varphi$, $\varphi^*$: $$V(\phi ,\varphi )=V(\phi )+V(\phi ,\varphi )+V(\varphi )$$where $$V(\phi )=-\mu ^{2}\left( \phi ^{\dagger }\cdot \phi \right) +\lambda \left( \phi ^{\dagger }\cdot \phi \right) ^{2} + h.c,$$is simply the SM potential (one Higgs doublet) and $$V(\phi ,\varphi )=\gamma _{1}\left( \phi ^{\dagger }\cdot \phi \right) \func{% Re}\varphi ^{2}+\gamma _{2}\left( \phi ^{\dagger }\cdot \phi \right) \func{Im% }\varphi ^{2} + h.c,$$has only quartic interactions between the doublet $\phi $ and the $% \mathbb{Z}_{2}$-odd scalar $\varphi $. The term $$V(\varphi )=-m_{1}^{2} \func{Re}\varphi ^2 - m_{2}^2 \func{Im}\varphi ^2 + \lambda _{1} \left( \func{Re}\varphi \right) ^{4} + \lambda _{2} \left( \func{Im}\varphi \right) ^{4} + \lambda _{3} \left( \func{Re}\varphi^2 \func{% Im}\varphi^2 \right) + h.c,$$ has the masses and quartic interactions that involve only the $\mathbb{Z}_{2} $ odd scalar. Given this, the masses of the real and imaginary parts of $% \varphi$ will not be degenerate. As the symmetry is enhanced in the limit of degeneracy (a $U(1)$ symmetry instead of the preserved $\mathbb{Z}_2$), if the splitting between their masses is small it remains small, and a small splitting is technically natural in that sense as it is protected by an approximate symmetry. Dark Matter Constraints \[DM\] ============================== In this section we consider the possibilities offered by the model to provide a viable DM candidate. The $\mathbb{Z}_{2}$ symmetry, under which only the scalar field $\varphi $ and the fermions $N_{1R}$ and $N_{2R}$ are charged, remains unbroken and stabilizes the lightest $\mathbb{Z}_{2}$-odd mass eigenstate. Scalar Dark Matter Scenario --------------------------- The first scenario considered is the one where one component of the scalar field $\varphi$ is the lightest $\mathbb{Z}_2$-odd particle. In this case, DM is produced in the early Universe via the vanilla WIMP paradigm. If Im $\varphi$ is the lightest $\mathbb{Z}_2$ odd state, it can annihilate into a pair of SM particles via the $s$-channel exchange of a Higgs boson. Additionally, the annihilation into Higgs bosons also occurs via the contact interaction and the mediation by an Im $\varphi$ in the $t$- and $u$-channels. Finally, DM could also annihilate into a pair SM neutrino/antineutrino via the $t$- and $u$-channel exchange of a $N_1$. However the latter channel is typically very suppressed by the tiny effective neutrino Yukawa coupling $y_{1\chi}\ll 1$. Hence, the DM relic abundance is mainly governed by the DM mass $m_{\text{Im}~\varphi}$ and the quartic coupling $\gamma_2$, between two DM particles and two Higgs bosons. The freeze-out of heavy DM particles ($m_{\text{Im}~\varphi}> m_h$) is largely dominated by the annihilations into Higgs bosons,[^2] with a thermally-averaged cross-section given by: $$\label{DMhh} \langle\sigma v\rangle\simeq\frac{\gamma_2^2}{32\pi}\,\left[\frac{% \gamma_2\,v^2\,\left(m_h^2-4\,m_{\text{Im}~\varphi}^2\right)+m_h^4-4\,m_{% \text{Im}~\varphi}^4}{m_{\text{Im}~\varphi}\,\left(m_h^4-6\,m_h^2\,m_{\text{% Im}~\varphi}^2+8\,m_{\text{Im}~\varphi}^4\right)}\right]^2\,.$$ In Fig. \[fig:DM-Imphi\] it is shown the parameter space ($\gamma_2,\,m_{% \text{Im}~\varphi}$) giving rise to the observed DM relic abundance. The black thick line corresponds to the full computation using micrOMEGAs [Belanger:2006is, Belanger:2008sj, Belanger:2010pz, Belanger:2013oya]{}, whereas the red line to the analytical case given by Eq. . The vertical dashed blue line corresponds to $m_{\text{Im}~\varphi}= m_h$. The direct detection constraints are obtained by comparing the spin-independent cross section for the scattering of the DM off of a nucleon, $$\sigma_\text{SI}=\frac{\gamma_2^2\,m_N^4\,f^2}{8\pi\,m_h^4\,m_{\text{Im}~\varphi}^2}\,,$$ to the latest limits on $\sigma_\text{SI}$ provided by PandaX-II [@Cui:2017nnn]. Here $m_N$ is the nucleon mass and $f\simeq 1/3$ corresponds to the form factor [@Farina:2009ez; @Giedt:2009mr]. Again, the analytical result is in good agreement with the numerical computation by micrOMEGAs. Fig. \[fig:DM-Imphi\] also presents the DM spin-independent direct detection exclusion region, that sets strong tension for the model if the DM is lighter than $\sim 400$ GeV.[^3] ![Scalar Dark Matter Scenario. Parameter space generating the observed DM relic abundance via the WIMP mechanism, using the full annihilation cross-section (thick black line) and the only the annihilation into Higgs bosons (thin red line). The light blue region is in tension with the latest PandaX-II results.[]{data-label="fig:DM-Imphi"}](DM-Imphi.pdf){width="47.00000%"} Fermionic Dark Matter Scenario ------------------------------ The second case corresponds to the scenario where $N_{1R}$ is the lightest $% \mathbb{Z}_{2}$-odd particle. DM can annihilate into a pair of SM neutrinos via the $t$-channel exchange of the real and the imaginary parts of $\varphi$. This comes from an effective neutrino Yukawa coupling $y_{1\chi}\equiv% \left\vert y_{1\nu }\right\vert\,\lambda\,\frac{v}{\Lambda}$ produced by Eq. (\[Lyn\]) or its expanded version, Eq. (\[eq:expanded\_neutrinoL\]): $$\mathcal{L}\supset y_{1}^{\left( \nu \right) }\,\lambda\, \overline{l}% _{1L}\,N_{1R}\,\varphi \frac{\langle \widetilde{\phi \rangle }}{\Lambda }\,.$$ The DM relic abundance is then governed by the DM mass $m_{N_1}$, the mediator masses $m_{\text{Re}\,\varphi}$ and $m_{\text{Im}\,\varphi}$, and the effective Yukawa coupling $y_{1\chi}$. The thermally-averaged annihilation cross-section is given by: $$\langle\sigma v\rangle\simeq\frac{9\,y_{1\chi}^4}{32\pi}\,\frac{% m_{N_1}^2\,\left(2 m_{N_1}^2+m_{\text{Re}\,\varphi}^2+m_{\text{Im}% \,\varphi}^2\right)^2}{\left(m_{N_1}^2+m_{\text{Re}\,\varphi}^2\right)^2\,% \left(m_{N_1}^2+m_{\text{Im}\,\varphi}^2\right)^2}\,.$$ Fig. \[fig:DM-masses\] shows the required effective coupling $y_{1\chi}$ in order to reproduce the observed DM relic abundance via the standard thermal WIMP paradigm, and assuming $m_{\text{Re}\,\varphi} = m_{\text{Im}% \,\varphi}$. ![Fermionic Dark Matter Scenario. Effective coupling $y_{1\chi% }$ needed in order to generate the observed relic abundance via the WIMP mechanism, assuming $m_\varphi\equiv m_{\text{Re}\,\varphi} \sim m_{\text{Im}\,\varphi}$.[]{data-label="fig:DM-masses"}](DM-masses.pdf){width="47.00000%"} As expected for WIMP DM, the effective coupling has to be of the order of $\mathcal{O}(1)$, if DM is heavier than $\sim 100$ GeV. For the DM production this is perfectly viable, however we also want to generate the neutrino masses. In what follows we proceed to scan for the CP odd scalar mass $m_{Im \varphi} $ and effective neutrino Yukawa coupling $y_{1\chi}=\left\vert y_{1\nu }\right\vert\,\lambda\,\frac{v}{\Lambda}$ needed required to reproduce the values of the neutrino parameters $\left\vert A_{1}^{\left( \nu \right) }\right\vert $, $A_{2}^{\left( \nu \right) }$ and $\arg \left[A_{1}^{\left( \nu \right) }\right] $ shown in Eq. . Fixing the right handed Majorana neutrino masses to typical values $m_{N_1}\sim 500$ GeV, $m_{N_2}\sim 2$ TeV, $m_{\text{Im} \varphi}\sim 1$ TeV and $\Lambda\sim 10^{8}$ GeV, required to reproduce the values of the neutrino parameters $\left\vert A_{1}^{\left( \nu \right) }\right\vert $, $% A_{2}^{\left( \nu \right) }$ and $\arg \left[A_{1}^{\left( % \nu \right) }\right]$, the effective neutrino Yukawa coupling $y_{1\chi}$ has to be of the order of $10^{-7}$ to $10^{-4}$. Values in this ballpark are too small to reproduce the observed DM relic abundance via the WIMP mechanism, which requires $\mathcal{O}(1)$ effective Yukawa coupling $y_{1\chi}$ as indicated by Fig. \[fig:DM-masses\]. Consequently the fermionic DM scenario of our model can not be produced via the usual WIMP paradigm. Alternatively, very suppressed couplings between the visible and the dark sectors are characteristic in non-thermal scenarios where the DM relic abundance is created in the early Universe via freeze-in [@McDonald:2001vt; @Choi:2005vq; @Kusenko:2006rh; @Petraki:2007gq; @Hall:2009bx; @Bernal:2017kxu]. Fig. \[fig:DM-masses2\] shows the effective couplings required in order to produce FIMP DM. As expected for this kind of scenarios, $y_{1\chi}$ is in the range $\sim 10^{-8}$ to $\sim 10^{-11}$. The light blue region is disregarded because $N_1$ is not the lightest particle of the dark sector. ![Fermionic Dark Matter Scenario. Effective coupling $y_{1\chi% }^2$ needed in order to generate the observed relic abundance via the FIMP mechanism, assuming $m_\varphi\equiv m_{\text{Re}\,\varphi} \sim m_{\text{Im}\,\varphi}$.[]{data-label="fig:DM-masses2"}](fimp.pdf){width="47.00000%"} Finally, to close this section, we discuss the splitting between the masses of the real and imaginary parts of $\varphi$. To start, we note that a small scalar mass splitting of $10^{-3}$ times the mass of the imaginary part of $\varphi$ (which is required in order to have fermionic DM through the FIMP mechanism) may look unnatural, but it is actually technically natural in the sense that it is protected by a symmetry: in the limit where the RH neutrino masses and the splitting of the $\varphi$ masses vanish, the symmetry of the Lagrangian is enlarged from the $\mathbb{Z}_2$ to a $U(1)$ symmetry. The non-trivial $U(1)$ charges of the RH neutrinos and of $\varphi$ under this $U(1)$ would forbid Majorana terms for the RH neutrinos and force the masses of the real and imaginary parts of $\varphi$ to be the same. Considering this, if the $U(1)$ is broken only by the Majorana terms (but not in the scalar potential), the splitting of the masses is no longer protected by the symmetry and is generated, but only radiatively. In such a scenario, the splitting would be naturally small. Although we do not consider this scenario in great detail, we propose also some more explicit mechanisms that can explain the splitting between the masses of the real and imaginary parts of $% \varphi $ when starting from the symmetry limit where the splitting vanishes. The first possibility consists in extending our model by adding an extra spontaneously broken $\mathbb{Z}_{3}$ discrete symmetry under which $\varphi $ is assumed to have a charge $+1$ (in additive notation). In addition, an extra SM scalar singlet, i.e. $\zeta $ , with $\mathbb{Z}_{3}$ charge +1 has to be added. The remaining scalar and fermions are neutral under $\mathbb{Z}_{3}$. Consequently no new contributions to the quarks, charged leptons and neutrino Yukawa terms originate from the extra field $\zeta$ and the $\mathbb{Z}_{3}$ discrete symmetry. The splitting between the masses of $\func{Re}\varphi $ and $\func{Im}\varphi $ will arise from the trilinear scalar interaction $% A\varphi ^{2}\zeta $ which preserves both this added $\mathbb{Z}_{3}$ and the existing $\mathbb{Z}_{2}$. The invariance of the neutrino Yukawa interactions under the $\mathbb{Z}_{3}$ discrete symmetry requires that the right handed Majorana neutrinos $N_{1R}$ and $N_{2R}$ should have a $\mathbb{Z}_{3}$ charge equal to $+1$, such that their masses will need to arise from the Yukawa interactions $% \overline{N}_{1R}N_{1R}^{C}\zeta $ and $\overline{N}_{2R}N_{2R}^{C}\zeta $ after the spontaneous breaking of the $\mathbb{Z}_{3}$ discrete group. This is an explicit realization of the mechanism described above, showing there is a relation between the $\varphi$ mass splitting and the $N_{iR}$ masses. If this $\mathbb{Z}_{3}$ is broken at the TeV scale the right handed Majorana neutrinos are within the LHC reach and there is a viable fermionic DM candidate through the FIMP mechanism. A different mechanism to generate the splitting by replacing the SM scalar singlet $\varphi $ with an inert $% SU(2)$ scalar doublet charged under the preserved $\mathbb{Z}_{2}$ symmetry. That scenario was proposed for the first time in Ref. [Ma:2006km]{}. In that scenario, the splitting between the masses of $\func{Re}% \varphi $ and $\func{Im}\varphi $ (in that scenario $\varphi $ is a $% SU(2)$ scalar doublet) will arise form the quartic scalar interaction $\left( \phi ^{\dagger }\cdot \varphi \right) ^{2}$, as explained in detail in Ref. [@Ma:2006km]. In this case, the coupling between right-handed neutrinos and $\varphi$ does not include the Higgs $\phi$. Conclusions =========== We have built a viable family symmetry model based on the $\Delta \left( 27\right) \times \mathbb{Z}_{2}\times \mathbb{Z}_{5}\times \mathbb{Z}_{6}\times \mathbb{Z}_{10}\times \mathbb{Z}_{16}$ discrete group, which leads to a mixing inspired texture for the quarks and to similarly predictive structures for the leptons. For the quarks, the down sector parameters control the Cabibbo angle, and the up and down sector parameters control the remaining angles. For the leptons, the effective neutrino parameters that arise after radiative seesaw control the solar angle, and the charged lepton parameters control the reactor angle, which is also correlated to the deviation of the atmospheric angle from its maximal value. The model is only viable for inverted hierarchy and after fitting to the best-fit values of the solar and reactor angle, predicts $\sin^2 \theta_{23} \simeq 0.51$, $\delta \simeq 281.6^\circ$ and $m_{ee}=41.3$ meV. Additionally, the model has viable DM candidates, stabilized by an unbroken $\mathbb{Z}_2$ symmetry, which we analyze quantitatively. A simple possibility is that there is scalar WIMP DM, which is produced through the Higgs portal. An alternative scenario is when we consider fermionic DM, which in our model would be the lightest right-handed neutrino. In order for it to be a WIMP and to obtain the right abundance, its effective coupling to the visible sector is too large to be consistent with what is required by the effective neutrino masses. Instead, if our fermionic DM candidate is a FIMP, the effective coupling needs to be quite small. This is consistent with obtaining the required neutrino masses but requires a very small splitting of the real and imaginary components of the $\mathbb{Z}_2$-odd scalar (the splitting divided by the mass scale would be at the per mille level). The smallness of the splitting is technically natural as when the splitting goes to zero, the symmetry of the theory is enhanced. This model addresses the flavour problem while providing a viable DM candidate (scalar or fermionic), and is a novel example of the interplay of constraints coming from the observed DM abundance to a family symmetry model, namely by relating the DM abundance to the light neutrino masses. Acknowledgments {#acknowledgments .unnumbered} =============== IdMV acknowledges funding from the Fundação para a Ciência e a Tecnologia (FCT) through the contract IF/00816/2015, partial support by Fundação para a Ciência e a Tecnologia (FCT, Portugal) through the project CFTP-FCT Unit 777 (UID/FIS/00777/2013) which is partially funded through POCTI (FEDER), COMPETE, QREN and EU, and partial support by the National Science Center, Poland, through the HARMONIA project under contract UMO-2015/18/M/ST2/00518. IdMV thanks Universidad Técnica Federico Santa María for hospitality, where this work was finished. The visit of IdMV to Universidad Técnica Federico Santa María was supported by Chilean grant Fondecyt No. 1170803. NB is partially supported by the Spanish MINECO under Grants FPA2014-54459-P and FPA2017-84543-P. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreements 674896 and 690575; and from Universidad Antonio Nariño grant 2017239. AECH and SK were supported by Chilean grants Fondecyt No. 1170803, No. 1150792 and CONICYT PIA/Basal FB0821, ACT1406 and the UTFSM internal grant PI\_M\_17\_5. A.E.C.H is very grateful to the Instituto Superior Técnico for hospitality. The Product Rules of the $\boldsymbol{\Delta (27)}$ Discrete Group {#A} ================================================================== The $\Delta (27)$ discrete group is a subgroup of $SU(3)$, has 27 elements divided into 11 conjugacy classes. Then the $\Delta (27)$ discrete group contains the following 11 irreducible representations: two triplets, i.e. $% \mathbf{3}_{[0][1]}$ (which we denote by $\mathbf{3}$) and its conjugate $% \mathbf{3}_{[0][2]}$ (which we denote by $\overline{\mathbf{3}}$) and 9 singlets, i.e. $\mathbf{1}_{k,l}$ ($k,l=0,1,2$), where $k$ and $l$ correspond to the $\mathbb{Z}_{3}$ and $\mathbb{Z}_{3}^{\prime }$ charges, respectively [@Ishimori:2010au]. The $\Delta (27)$ discrete group, which is a simple group of the type $\Delta (3n^{2})$ with $n=3$, is isomorphic to the semi-direct product group $(\mathbb{Z}_{3}^{\prime }\times \mathbb{Z}% _{3}^{\prime \prime })\rtimes \mathbb{Z}_{3}$ [@Ishimori:2010au]. It is worth mentioning that the simplest group of the type $\Delta (3n^{2})$ is $% \Delta (3)\equiv \mathbb{Z}_{3}$. The next group is $\Delta (12)$, which is isomorphic to $A_{4}$. Consequently the $\Delta (27)$ discrete group is the simplest nontrivial group of the type $\Delta(3n^{2})$. Any element of the $% \Delta (27)$ discrete group can be expressed as $b^{k}a^{m}{a^{\prime }}^{n}$, being $b$, $a$ and $a^{\prime }$ the generators of the $\mathbb{Z}_{3}$, $% \mathbb{Z}_{3}^{\prime }$ and $\mathbb{Z}_{3}^{\prime \prime }$ cyclic groups, respectively. These generators fulfill the relations: $$\begin{aligned} && a^3 =a^{\prime 3}=b^3=1,\hspace*{0.5cm} a a^{\prime }=a^{\prime }a, \notag \\ && bab^{-1}=a^{-1}a^{\prime -1},\,\, b a^{\prime}b^{-1}=a. \label{aapbrela}\end{aligned}$$The characters of the $\Delta (27)$ discrete group are shown in Table [tab:delta-27]{}. Here $n$ is the number of elements, $h$ is the order of each element, and $\omega =e^{\frac{2\pi i}{3}}=-\frac{1}{2}+i\frac{\sqrt{3}}{2}$ is the cube root of unity, which satisfies the relations $1+\omega +\omega ^{2}=0$ and $\omega ^{3}=1$. The conjugacy classes of $\Delta (27)$ are given by: $$\begin{array}{ccc} C_{1}: & \{e\}, & h=1, \\ C_{1}^{(1)}: & \{a,a^{\prime 2}\}, & h=3, \\ C_{1}^{(2)}: & \{a^{2},a^{\prime }\}, & h=3, \\ C_{3}^{(0,1)}: & \{a^{\prime 2}a^{\prime 2}\}, & h=3, \\ C_{3}^{(0,2)}: & \{a^{\prime 2},a^{2},aa^{\prime }\}, & h=3, \\ C_{3}^{(1,p)}: & \{ba^{p},ba^{p-1}a^{\prime p-2}a^{\prime 2}\}, & h=3, \\ C_{3}^{(2,p)}: & \{ba^{p},ba^{p-1}a^{\prime p-2}a^{\prime 2}\}, & h=3. \\ & & \end{array}%$$ h $\chi_{1_{(r,s)}}$ $\chi_{3_{[0,1]}}$ $\chi_{3_{[0,2]}}$ ---------------- ----- -------------------- -------------------- -------------------- $1C_1$ 1 1 3 3 $1C_1^{(1)}$ 1 1 $3\omega^2$ $3\omega$ $1C_1^{(2)}$ 1 1 $3\omega$ $3\omega^2$ $3C_1^{(0,1)}$ $3$ $\omega^{s}$ $0$ $0$ $3C_1^{(0,2)}$ $3$ $\omega^{2s}$ $0$ $0$ $C_3^{(1,p)}$ $3$ $\omega^{r+s p}$ 0 0 $C_3^{(2,p)}$ $3$ $\omega^{2r+s p}$ 0 0 : Characters of $\Delta (27)$.[]{data-label="tab:delta-27"} The tensor products between $\Delta (27)$ triplets are described by the following relations [@Ishimori:2010au]: $$\begin{aligned} \vspace{-1cm}% \begin{pmatrix} x_{1,-1} \\ x_{0,1} \\ x_{-1,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}}\otimes \begin{pmatrix} y_{1,-1} \\ y_{0,1} \\ y_{-1,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}} &=&% \begin{pmatrix} x_{1,-1}y_{1,-1} \\ x_{0,1}y_{0,1} \\ x_{-1,0}y_{-1,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}^{\left( S_{1}\right) }}\oplus \frac{1}{2}% \begin{pmatrix} x_{0,1}y_{-1,0}+x_{-1,0}y_{0,1} \\ x_{-1,0}y_{1,-1}+x_{1,-1}y_{-1,0} \\ x_{1,-1}y_{0,1}+x_{0,1}y_{1,-1} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}^{\left( S_{2}\right) }} \notag \\ &&\oplus \frac{1}{2}% \begin{pmatrix} x_{0,1}y_{-1,0}-x_{-1,0}y_{0,1} \\ x_{-1,0}y_{1,-1}-x_{1,-1}y_{-1,0} \\ x_{1,-1}y_{0,1}-x_{0,1}y_{1,-1} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}^{\left( A\right) }}, \\ \begin{pmatrix} x_{2,-2} \\ x_{0,2} \\ x_{-2,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}}\otimes \begin{pmatrix} y_{2,-2} \\ y_{0,2} \\ y_{-2,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}} &=&% \begin{pmatrix} x_{2,-2}y_{2,-2} \\ x_{0,2}y_{0,2} \\ x_{-2,0}y_{-2,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}^{\left( S_{1}\right) }}\oplus \frac{1}{2}% \begin{pmatrix} x_{0,2}y_{-2,0}+x_{-2,0}y_{0,2} \\ x_{-2,0}y_{2,-2}+x_{2,-2}y_{-2,0} \\ x_{2,-2}y_{0,2}+x_{0,2}y_{2,-2} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}^{\left( S_{2}\right) }} \notag \\ &&\oplus \frac{1}{2}% \begin{pmatrix} x_{0,2}y_{-2,0}-x_{-2,0}y_{0,2} \\ x_{-2,0}y_{2,-2}-x_{2,-2}y_{-2,0} \\ x_{2,-2}y_{0,2}-x_{0,2}y_{2,-2} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}^{\left( A\right) }}, \\ \begin{pmatrix} x_{1,-1} \\ x_{0,1} \\ x_{-1,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][1]}}\otimes \begin{pmatrix} y_{-1,1} \\ y_{0,-1} \\ y_{1,0} \\ \end{pmatrix}% _{\mathbf{3}_{[0][2]}} &=&\sum_{r}(x_{1,-1}y_{-1,1}+\omega ^{2r}x_{0,1}y_{0,-1}+\omega ^{r}x_{-1,0}y_{1,0})_{\mathbf{1}_{(r,0)}} \notag \\ &\oplus &\sum_{r}(x_{1,-1}y_{0,-1}+\omega ^{2r}x_{0,1}y_{1,0}+\omega ^{r}x_{-1,0}y_{-1,1})_{\mathbf{1}_{(r,1)}} \notag \\ &\oplus &\sum_{r}(x_{1,-1}y_{1,0}+\omega ^{2r}x_{0,1}y_{-1,1}+\omega ^{r}x_{-1,0}y_{0,-1})_{\mathbf{1}_{(r,2)}}. \notag \\ &&\end{aligned}$$The multiplication rules between $\Delta (27)$ singlets and $\Delta (27)$ triplets are given by [@Ishimori:2010au]: $$\begin{aligned} &&% \begin{pmatrix} x_{(1,-1)} \\ x_{(0,1)} \\ x_{(-1,0)}% \end{pmatrix}% _{\mathbf{3}_{[0][1]}}\otimes (z)_{1_{k,l}}=% \begin{pmatrix} x_{(1,-1)}z \\ \omega ^{r}x_{(0,1)}z \\ \omega ^{2r}x_{(-1,0)}z% \end{pmatrix}% _{\mathbf{3}_{[l][1+l]}}, \\ &&% \begin{pmatrix} x_{(2,-2)} \\ x_{(0,2)} \\ x_{(-2,0)}% \end{pmatrix}% _{\mathbf{3}_{[0][2]}}\otimes (z)_{1_{k,l}}=% \begin{pmatrix} x_{(2,-2)}z \\ \omega ^{r}x_{(0,2)}z \\ \omega ^{2r}x_{(-2,0)}% \end{pmatrix}% _{\mathbf{3}_{[l][2+l]}}.\end{aligned}$$The tensor products of $\Delta (27)$ singlets $\mathbf{1}_{k,\ell }$ and $% \mathbf{1}_{k^{\prime },\ell ^{\prime }}$ take the form [Ishimori:2010au]{}: $$\mathbf{1}_{k,\ell }\otimes \mathbf{1}_{k^{\prime },\ell ^{\prime }}=\mathbf{% 1}_{k+k^{\prime }\func{mod}3,\ell +\ell ^{\prime }\func{mod}3}.$$From the equation given above, we obtain explicitly the singlet multiplication rules of the $\Delta (27)$ group, which are given in Table \[D27multiplets\]. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Singlets   $\mathbf{1}_{01}$     $\mathbf{1}_{02}$     $\mathbf{1}%   $\mathbf{1}_{11}$    $\mathbf{1}_{12}$     $\mathbf{1}%   $\mathbf{1}_{21}$  $\mathbf{1}_{22}$ _{10} $   _{20} $   ------------------- ----------------------- ----------------------- ------------------- ---------------------- ----------------------- ------------------- ---------------------- ------------------- $\mathbf{1}_{01}$ $\mathbf{1}_{02}$ $\mathbf{1}_{00}$ $\mathbf{1}_{11}$ $\mathbf{1}_{12}$ $\mathbf{1}_{10}$ $\mathbf{1}_{21}$ $\mathbf{1}% $\mathbf{1}_{20}$ _{22}$ $\mathbf{1}_{02}$ $\mathbf{1}_{00}$ $\mathbf{1}_{01}$ $\mathbf{1}_{12}$ $\mathbf{1}_{10}$ $\mathbf{1}_{11}$ $\mathbf{1}_{22}$ $\mathbf{1}% $\mathbf{1}_{21}$ _{20}$ $\mathbf{1}_{10}$ $\mathbf{1}_{11}$ $\mathbf{1}_{12}$ $\mathbf{1}_{20}$ $\mathbf{1}_{21}$ $\mathbf{1}_{22}$ $\mathbf{1}_{00}$ $\mathbf{1}% $\mathbf{1}_{02}$ _{01}$ $\mathbf{1}_{11}$ $\mathbf{1}_{12}$ $\mathbf{1}_{10}$ $\mathbf{1}_{21}$ $\mathbf{1}_{22}$ $\mathbf{1}_{20}$ $\mathbf{1}_{01}$ $\mathbf{1}% $\mathbf{1}_{00}$ _{02}$ $\mathbf{1}_{12}$ $\mathbf{1}_{10}$ $\mathbf{1}_{11}$ $\mathbf{1}_{22}$ $\mathbf{1}_{20}$ $\mathbf{1}_{21}$ $\mathbf{1}_{02}$ $\mathbf{1}% $\mathbf{1}_{01}$ _{00}$ $\mathbf{1}_{20}$ $\mathbf{1}_{21}$ $\mathbf{1}_{22}$ $\mathbf{1}_{00}$ $\mathbf{1}_{01}$ $\mathbf{1}_{02}$ $\mathbf{1}_{10}$ $\mathbf{1}% $\mathbf{1}_{12}$ _{11}$ $\mathbf{1}_{21}$ $\mathbf{1}_{22}$ $\mathbf{1}_{20}$ $\mathbf{1}_{01}$ $\mathbf{1}_{02}$ $\mathbf{1}_{00}$ $\mathbf{1}_{11}$ $\mathbf{1}% $\mathbf{1}_{10}$ _{12}$ $\mathbf{1}_{22}$ $\mathbf{1}_{20}$ $\mathbf{1}_{21}$ $\mathbf{1}_{02}$ $\mathbf{1}_{00}$ $\mathbf{1}_{01}$ $\mathbf{1}_{12}$ $\mathbf{1}% $\mathbf{1}_{11}$ _{10}$ ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- : The singlet multiplications of the group $\Delta (27)$.[]{data-label="D27multiplets"} [^1]: This limit corresponds to $a_{12}^{\left( U\right) } = a_{21}^{\left( U\right) } =a_{31}^{\left( U\right) } =a_{32}^{\left( U\right) } =0$, $a_{13}^{\left( D\right) }=a_{21}^{\left( D\right) } =a_{23}^{\left( D\right) }=a_{31}^{\left( D\right) }=a_{32}^{\left( D\right) }=0$. [^2]: For $m_{\text{Im}~\varphi}=200$ GeV, annihilations into Higgses correspond to $\sim 80\%$ and into $t\bar t$ to $\sim 20\%$. When $m_{\text{Im}~\varphi}=10$ TeV, the annihilation into a pair of Higgses constitutes almost $100\%$. [^3]: Furthermore, one has to take into account astrophysical uncertainties [Green:2002ht, Zemp:2008gw, McCabe:2010zh, Pato:2010yq, Fairbairn:2012zs, Bernal:2014mmt, Bernal:2015oyn, Bernal:2016guq, Benito:2016kyp, Green:2017odb]{} when interpreting the results of the DM searches.
When Wisconsin Gov. Scott Walker decided to use a battle over his state’s budget deficit to go after public-sector workers, a lot of folks in the mainstream media thought this was a smart move. People are tired of “overpaid” government workers and their cushy benefits, according to conventional wisdom. And, after all, Walker had to do something. The state was “broke,” the TV broadcasters told us. Then came a news flash: workers weren’t buying it–and were sticking together. The Wisconsin Republican’s gamble was that the public would swallow Walker’s argument that teachers and public workers were the ones who needed to sacrifice in order to dig the state out of the hole caused by the massive recession. If you were reading the average newspaper, this made sense. USA Today told us that workers employed by governments make more in wages and benefits than workers at private companies. Most research says this simply isn’t true, but it’s a handy Republican talking point. One New York Times writer explained that “taking the fight to the unions is a good way to bolster your credentials as a gutsy reformer with voters who have been losing faith for years in public schools and government bureaucracies.” Time magazine told us that hating government workers is an entrenched American tradition. They even compared New Jersey’s union-bashing Republican Gov. Chris Christie to–get this–Winston Churchill, someone who’s just trying to tell us truths we don’t want to hear. So the storyline was set: Wisconsin’s workers were braving the cold and filling the streets of Madison, but the rest of us simply couldn’t relate to their fight. Then reality intervened. Some of the very same media outlets that had told us that Walker picked a smart fight started conducting polls asking Americans where they came down on the battle in Wisconsin. And wouldn’t you know it, Americans are siding with Wisconsin’s workers. Take away collective bargaining rights? Sixty-one percent of Americans don’t want Walker’s union-busting in their own states. Cutting the pay of state workers? Most say that’s a bad idea. Now, not everyone liked this news. Fox News host Bill O’Reilly couldn’t believe the polls–and went so far as to suggest that shouldn’t have included union households. Would O’Reilly “fix” polls about Social Security or Medicare by excluding senior citizens? The truth is that the public often sees these things differently than the big media. Many journalists are disconnected from the concerns of working-class Americans. So a politician’s attack on working people didn’t feel like an attack on people like them–it sounded like a clever strategy. That’s no surprise. The corporate media’s coverage and analysis of core economic issues, including spending priorities and global trade, rarely include working-class perspectives. Even as Walker’s union-busting politics have spread to Ohio, Michigan, and other states, labor unions had to mount some serious efforts just to get their side heard in the TV debates. Think about that–the biggest labor story in decades, and TV news outlets weren’t interviewing labor unions? This fight is far from over. Let’s hope the nation’s editors and TV news producers have learned a key civics lesson: Americans don’t think workers should suffer for budget problems they didn’t make. Just ask them. Peter Hart is FAIR‘s activism director. This article was distributed by Other Words, a project of the Institute for Policy Studies. Photo: Madison, Wisc., Feb. 18, 2011 (Teresa Albano/PW)
China’s Fake Carbon Tax Beijing was widely blamed for derailing the 2009 Copenhagen summit and its chances of producing an agreement on climate change. But suddenly last week, state media announced that the Ministry of Finance could soon approve a carbon tax on China’s biggest energy consumers before the end of the current Five-Year Plan (2011-2015). Environmentalists will argue that plans for a carbon tax by the largest emitter of greenhouse gases are a sign of Beijing’s genuine commitment to do its part—and they will now urge other governments to follow suit. But don’t be fooled. Beijing’s proposal is little more than clever political theater mixed with passing the economic buck. For some, the timing will appear odd. Why announce the intention for a carbon tax now when cracks are widening in the Chinese economy? The truth is the Chinese government hasn’t been pleased with all the negative international attention it has garnered ever since Copenhagen. The new proposed environmental taxation system should really then be seen as a preemptive strike against international pressure, not a commitment against climate change. The carbon tax is of a piece with the fact that the current Five-Year Plan is the first to explicitly commit to market mechanisms to reduce the country’s carbon emissions as part of the plan’s “green, low carbon development concept.” While China insists it takes climate change seriously, it’s equally adamant that solutions must not jeopardize economic growth. As its standoff with the European Union over the latter’s tax on airline emissions shows, China doesn’t like placing onerous costs on its firms in the name of fighting climate change. But since it’s being forced to consider some solution, it wants to do it on its own terms. Beijing will do all it can to soften its own proposal. That explains why the Ministry of Finance has already noted that economic growth will take priority over the date of implementation of the carbon tax. More importantly, the choice of carbon tax over a cap-and-trade scheme exposes the government’s intent. The latter would have meant a strict limit on the total amount of carbon emitted. The former just increases the price of carbon, but sets no administrative cap. Still, any proposed carbon tax will impose some economic costs. So why publicly commit to one? One reason is that Beijing leaves itself some wiggle room in international negotiations. A carbon tax will give Beijing the political cover to emit even more. For every coal-fired power station closed down over the past five years, two have sprung up in its place. Coal consumption has been increasing by around 17% each year. The International Energy Agency estimates almost 80% of China’s energy needs will be met by coal and oil in 2030. Every time someone points to these statistics to pressure Beijing to sign a more stringent international agreement, Chinese officials can take the higher moral ground. The announcement is also a subtle attempt at environmental buck passing. Although details have not yet emerged, it is clear that the tax will only apply to the largest emitters in the country. That surely means export manufacturing, which is responsible for anywhere between 20% and 50% all Chinese carbon emissions. This, in turn, places the burden on as many people outside China as possible. First, many of those firms slugged by the carbon tax will be foreign-owned giants. Foreign investors dominate China’s export industry. Second, Beijing knows that any additional costs from a carbon tax placed on exporters would be passed on to the end consumer in those markets. Beijing has consistently argued that the end-consumer country, and not the producer country, should bear the burden of paying for carbon emissions. The unwillingness—understandable, no doubt—to accept responsibility for the emissions released in producing goods for foreign markets has been a constant bugbear in discussions between China and the West. If China gets its way, it will edge closer to winning the day without having to win the argument. Third, in the meantime, Beijing has many tools at its disposal to ease the pain on its own wards. It’s true a carbon tax would impose some financial difficulty for China’s large state-owned enterprises in industries such as power generation and construction. But fat on state protection, other tax and subsidy assistance and cheap credit, the government will ensure that these companies can easily bear the burden. The proposed rate of 10 yuan per ton of carbon is too small to be significant, and promises that this will rise over time aren’t reliable. Whatever one may think about global climate-change agreements, it’s important to understand the two-faced game China is playing. The Middle Kingdom’s rise has caused anxiety in many quarters abroad, and Beijing is keen to assuage these worries. It wants to project the image of a responsible global citizen. But it has little intention of acting responsibly.
Top Ten Oscar Moments Of All Time Receive the latest movies updates in your inbox Sunday, March 7, 2010 marks the 82nd Annual Academy Awards and with that comes the opportunity for new Oscar moments. Updated at 12:15 AM CDT on Saturday, Mar 6, 2010 Sunday, March 7, 2010 marks the 82nd Annual Academy Awards and with that comes the opportunity for new Oscar moments. And we know you probably won't have the time to re-watch the previous 81 years, Access Hollywood has gathered our own list of the most memorable Oscar moments of all time. From legendary milestones, to people just plain going crazy, read on to find out which moment topped our list! 10. Cuba Gooding, Jr. Goes Crazy On Stage (1997) Cuba Gooding, Jr. channeled his inner Rod Tidwell at the 69th Annual Academy Awards when the Academy 'showed him the Oscar.' Audiences will never forget the outrageous and unexpected moment when the ecstatic "Jerry Maguire" star repeatedly screamed, "I love you!" to everyone in Hollywood when the orchestra started playing halfway into his Best Supporting Actor speech. Gooding proceeded to then jump around the stage and wave his Oscar in the air before one last, "everyone involved, I love you!" And his love for the world kicks off our list. 9. Martin Scorsese Finally Wins (2007) The world let out a huge sigh of relief the night of the 79th Annual Academy Awards when director Martin Scorsese finally won a Best Director Oscar for "The Departed." He had previously been nominated and shut out five times; Martin himself could hardly believe it. "Could you check the envelope please?!" he said as he accepted the Oscar. When his fellow directors and friends Steven Spielberg, George Lucas, and Francis Ford Coppola took the stage to present the award, Oscar watchers knew that Scorsese had just won. 8. Roberto Benigni Climbs Over The Audience (1999) There are the criers, the speechless, the in-denials, and the just-in-case-I-win I-will-write-an-acceptance-speech-ers. At the 71st Annual Academy awards, Roberto Benigni created a category of his own when he snagged the Best Foreign Film award for his emotional drama "Life is Beautiful" — the crazies. Upon hearing his name, Benigni kicked up his feet and climbed up on to the chair of the person sitting in front of him, raising his arms in excitement. After jumping down, he proceeded to hop to the stage to receive his award in front of a standing ovation. 7. Jack Palance Does Push Ups (1992) Jack Palance proved that his rough n' tough cowboy performance as Curly in "City Slickers" was not just a heavy dose of movie magic at the 65th Annual Academy Awards. During his acceptance speech for his Oscar in the Best Supporting Actor category, he showed the world that he was just as fit as the younger actors. After poking a little bit of fun at co-star Billy Crystal, Jack walked to the side of the podium, dropped to the floor and proceeded to do one-handed pushups. As the crowd laughed and cheered, he returned to the podium to quip, "That was nothing really, as far as the two handed ones are concerned, you can do that all night!" 6. A Streaker Crashes The Oscars (1974) On a night when Hollywood's best talent shows off their stunning designer gowns and tuxedos, one man opted for a more 'natural' look. Robert Opal, infamously known as 'The Oscar Streaker,' bared it all for the cameras at the 46th Annual Academy Awards when he ran across the stage during co-host David Niven's introduction of Elizabeth Taylor. In the midst of the shrieks and the laughter spreading through the room, Niven barely stayed composed as he chuckled the only response he could think of: "Probably the only laugh that man will ever get in his life is by stripping off and showing his shortcomings." 5. Halle Berry Makes History (2002) Halle Berry joined the list of legendary African-American actresses to be nominated for an Oscar the night of the 74th Annual Academy Awards when she later that night became the first African American woman to win an Oscar in the Best Actress category for her role in "Monster's Ball." In a tribute to all who had come before her, she could hardly mask her uncontrollable tears. Halle ended up delivering one of the most moving speeches in Oscar history. "This moment is for Dorothy Dandridge, Lena Horne, Diahann Carroll. It's for the women that stand beside me - Jada Pinkett, Angela Bassett and it's for every nameless, faceless woman of color that now has a chance because this door tonight has been opened." 4. Marlon Brando Says 'No Thanks' To Oscar (1973) Marlon Brando has given us classics like "A Streetcar Named Desire," "On the Waterfront," and "The Godfather." His biggest moment, however, came at the 45th Annual Academy Awards when Brando became the second actor to ever say, 'No thank you' to Oscar. Marlon, who was absent from the awards ceremony, declined his Best Actor Oscar for his role in "The Godfather" as part of a political protest. Instead, Native American activist Sacheen Littlefeather spoke on his behalf, opting to shed light on the ill treatment of Native Americans by the film industry. This large-scale stunt did not prove to be successful, as Littlefeather endured more boos than applause. Though his peers criticized him after the incident, one thing remains true: Brando's protest remains a timeless Oscar moment. 3. Sidney Poitier Breaks Stereotypes (1964) No Oscar list is complete without the monumental win of legendary actor Sidney Poitier. In 1964, Poitier won an Academy Award for Best Actor for his role in "Lillies of the Field," marking the first Best Actor Oscar awarded to an African-American. His win proved to be even more significant as he became the first African-American Hollywood superstar, breaking down racial stereotypes in the process. 2. Sally Field's Emotional 'You Like Me' Speech (1985) Sally Field's Best Actress acceptance speech will go down in history as the most quoted – and possibly misquoted – of all time. After snagging her second Oscar in five years for her role in "Places in the Heart," Sally Field gushed those famous words of utter fulfillment and satisfaction: "I've wanted more than anything to have your respect. The first time I didn't feel it, but this time I feel it and I can't deny the fact that you like me, right now, you like me!" The phrase has since often been quoted and parodied with the word 'really' inserted at the end, but hey… if that's how most folks remember it! 1. Charlie Chaplin's Return (1972) Who can forget the emotional return of Hollywood legend Charlie Chaplin at the 44th Annual Academy Awards? In 1972, after a 20-year self-imposed exile from the U.S. because of suspected "un-American activities," the legendary actor, comedian, and director returned to the spotlight to accept an honorary Academy Award. When Chaplin stepped onto the stage to accept his award, Hollywood emotionally rose to its feet for a full five minutes, marking the longest standing ovation received at the Oscars and this list's all time best Oscar moment. And Our Access Honorable Mentions: Quentin Tarantino Spits At A Reporter (1997) Though most of the Oscar moments happen during the show, director Quentin Tarantino proved that the red carpet can be just as unpredictable. At the 69th Annual Academy Awards, Quentin spit at reporter Chris Connelly because of something that had been said about Quentin's biological father. Completely enraged, Quentin mistakenly thought Chris had edited a piece in Premiere magazine about his estranged dad and held nothing back while walking down the red carpet with Mira Sorvino. South Park Writers/"Blame Canada" (2000) "South Park" sparked controversy all-around at the 72nd Annual Academy Awards with both Marc Shaiman's questionable song lyrics of Best Original Song nominee "Blame Canada," and writers Trey Parker and Matt Stone's wardrobe choices. The song contained provocative language that the Academy feared would offend audiences while not adhering to FCC regulations. Ultimately, Robin Williams, who performed the song, gasped when the main word in question was supposed to have been sung. As for Trey and Matt, they contentedly made a bold fashion statement arriving in their own versions of Jennifer Lopez's infamous 2000 green Grammys dress (Trey) and Gwyneth Paltrow's 1999 baby pink gown (Matt). Marc accompanied them in a blue pimp suit. Adrien Brody Kisses Halle Berry (2003) They say lightning doesn't strike twice in the same place. But don't tell Adrien Brody that because he shocked the world twice the night of the 75th Annual Academy Awards. Not only had he become the youngest man ever to win an Oscar in the Best Actor category (for his role in "The Pianist"), but he also celebrated his award by planting a big one on his presenter, Halle Berry. His passionate make-out session left the auditorium speechless. Women around the world were all hot and bothered, and Adrien was catapulted into sex symbol status. David Letterman's Famous Flub (1995) Who can forget David Letterman's hosting disaster with his memorable, "Uma… Oprah" joke that completely bombed at the 67th Annual Academy Awards? During a joke about Hollywood's unusual names, he introduced Uma Thurman to Oprah Winfrey, and then introduced both of them to Keanu Reeves exclaiming, "Uma… Oprah! Oprah… Uma! Oprah, Uma… Keanu!" Though the Academy Awards have yet to ask him back to host, Dave certainly gave us a moment to remember forever! Heath Ledger's Posthumous Win (2009) It was nothing short of an intensely emotional moment for Oscar watchers when Heath Ledger won Best Supporting Actor for his psychotic role as The Joker in "The Dark Knight." Heath's posthumous win was only the second in Oscar history, following Peter Finch in 1977. Heath's parents and sister accepted the award on behalf of his daughter Matilda and urged audiences to be happy and celebrate his achievements. Cher's Crazy Black 'Dress' (1986) Cher is known for her crazy behavior and interesting wardrobe choices, but at the 58th Annual Academy Awards, she truly outdid herself. Cher, not nominated for her role in "Mask," decided to make a statement another way. She showed up to the awards scantily clad in a black two-piece Bob Mackie dress with a feathered headpiece to match. While presenting onstage, she snapped, "I did receive my Academy booklet on how to dress like a serious actress."
President Donald Trump promised voters that, as president, he’d make repealing and replacing Obamacare his top priority in office. But perhaps no one in Washington has as much riding on the outcome of this week’s negotiations to keep the American Health Care Act as Trump’s chief of staff, Reince Priebus, whose standing with the president depends on getting a bill passed. House GOP leaders said late Wednesday they would call a vote Thursday on the bill, signaling they believe they have the support to pass it — though the vote remains extremely close. The bill was previously pulled without a vote in March, the first major policy setback of Trump’s presidency. Priebus, who was hired in part because of his Washington connections and perceived authority within the fractious Republican Party, bore the brunt of the blame internally. Since then, Priebus has been engaged in a frantic push to revive the stalled bill. He’s been pressuring GOP leadership for weeks, making dozens of calls saying “we need the vote, we need the vote,” according to a Hill source with direct knowledge of the calls. Priebus even tried to bring Congress back soon after the initial bill was pulled, according to one top White House official. The insistence puzzled some in the West Wing, given that some key members of the leadership were out of the country on foreign trips. With Trump already past his first 100 days in office, his chief of staff’s impatience only grew. On Monday, Priebus declared on CBS, “I think it will happen this week. So much has been made of this legislation and the timing … this will be one of the fastest signature pieces of legislation since Roosevelt, I believe.” The comments, with the implied deadline for a vote, frustrated many in leadership, according to the GOP aide. To some longtime Hill observers, the rush to schedule a vote is an effective use of White House authority. “You’re never going to have the votes until you call the vote,” said Trent Lott, a former Senate Majority Leader who is now a lobbyist. “Until you make them take the vote, they’re going to hide, they’re going to obfuscate, they’re going to lie.” Should the bill pass, Priebus allies are already prepared to sell it as his first big win in the job. “Reince has been running this,” said one top White House ally. “He’s been turning this around.” A White House spokesperson echoed that view. “Of course Reince is pushing to get health care done,” said the spokesperson. “What are we supposed to sit around and wait for the vote to happen? It appears that we’re a lot closer than we have been and that’s because he’s taken a leadership role here.” Other White House officials are quick to note that Priebus is only one part of the wheel, with others sharing responsibility for the bill’s success or failure. Yet Priebus has seemed to be the most invested in the outcome. A senior GOP aide described Priebus as “overeager” and acting in a way that suggested that his job is on the line. Priebus has sometimes struggled in his new West Wing role, acknowledging to associates that the White House needs to improve its internal organization, that Trump is difficult to manage and that the president sets unrealistic expectations. Known for being well-organized and a taskmaster at the Republican National Committee, he’s been perplexed by his famously mercurial boss, who can make decisions based on a conversation with a business associate in a hallway, several administration officials say. He has sometimes proved paranoid, when other West Wing staffers know things that he does not. He has tried to control some of the president’s media consumption, with little luck. POLITICO Pulse newsletter Get the latest on the health care fight, every weekday morning — in your inbox. Email Sign Up By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Priebus has come under severe pressure from Trump to get the health care bill through. At one point in April, Priebus delivered a veiled threat to Ryan — telling him his job could be in jeopardy if the votes weren’t there. “There will be calls for you to resign,” said one person familiar with the conversation. “He’s working this nonstop,” said one of Priebus’ allies in the White House. If the health bill passes, “You’re going to see a Reince victory tour,” one senior administration official said. “Wait and see.” But if the bill goes down, another West Wing official predicted Priebus would back away. “It would be a very public failure on a very big stage twice,” said this official. “You said you had the votes once and then you lost, and then you’re involved in the effort to redeem yourself the second time, that would be a heavy blow.”
INTRODUCTION {#s1} ============ Epidermal Growth Factor Receptor (*EGFR*) gene mutation testing is a critical first step in the personalised treatment of patients with non-squamous non-small cell lung cancer (NSCLC). The testing is required for identifying patients with *EGFR* gene mutation-positive non-squamous NSCLC, who are candidates for first-line treatment with EGFR tyrosine kinase inhibitors (EGFR-TKIs). Significant numbers of non-squamous NSCLC patients can be expected to test positive for *EGFR* gene mutations, although the exact proportion varies widely between different ethnic groups and geographical regions. For example, in a population-based registry cohort of non-squamous NSCLC patients presenting in northern New Zealand, we had previously shown that *EGFR* gene mutations were detected in 109 of 500 tested patients (22%) \[[@R1]\]. Randomised trials had previously shown increased tumour response rates and progression-free survival with EGFR-TKI treatment in *EGFR* gene mutation-positive patients \[[@R2]--[@R8]\], and with platinum-doublet combination chemotherapy in *EGFR* gene mutation-negative patients \[[@R9], [@R10]\], who had previously untreated metastatic non-squamous NSCLC. In the same New Zealand population-based study mentioned above \[[@R1]\], we showed that the introduction of *EGFR* gene mutation testing was associated with improved quality of prescribing of EGFR-TKIs, and with improved health outcomes, including prolongation of overall survival and increased duration of benefit from EGFR-TKI treatment. Currently, no gold standard *EGFR* gene mutation testing methodology exists, and international clinical practice guidelines recommend use of any validated testing method with sufficient performance characteristics, but without recommending one or more individual methods to the exclusion of any others \[[@R11]\]. Surveys of real-world testing practices have revealed wide variation with the use of many different testing methodologies for *EGFR* gene mutation detection in the routine setting \[[@R12], [@R13]\]. The cobas EGFR Mutation Test (Roche Molecular Systems Inc., Branchburg, NJ, USA) (RT-PCR test) is an oncogene mutation detection protocol based on multiplexed allele-specific PCR and a pre-validated set of primers to amplify and detect 41 variant sequences in the tyrosine kinase domain (exons 18-21) of the *EGFR* gene \[[@R14]\]. This RT-PCR test achieved CE-IVD regulatory status in Europe in October 2011 and FDA-USIVA approval of a modified version of the test in April 2013 \[[@R15]\]. Clinical validation studies were undertaken by retrospective analyses of tumour specimens (often surgical) sourced from vendors or clinical trial collections, and the data compared to other testing methods \[[@R16]--[@R19]\]. The Sequenom/Agena Biosciences OncoFocus mass spectrometry test (Agena Bioscience, San Diego, CA, USA) (MS test) comprises of a set of prevalidated genotyping assays designed for the simultaneous detection of 128 *EGFR* gene mutations and 63 *KRAS*, *NRAS* and *BRAF* gene mutations using a PCR-based mass spectrometry method. This method uses a two-step reaction protocol in which DNA sequences of interest are first amplified by PCR, followed by a single base primer extension and termination reaction across variant nucleotide positions, before specific detection of the amplified allele-specific oligonucleotide reaction products by MALDI-TOF mass spectrometry. This method is now widely used for lung cancer mutation testing due to the need for rapid detection of an increasing number of therapeutically targetable genetic abnormalities across multiple lung cancer genes \[[@R20]\]. However, the MS-test is not yet approved by regulatory authorities for diagnostic use and limited data have been published on its clinical validity and utility \[[@R21]\]. With this background, this study sought to evaluate the clinical performance of the RT-PCR and MS tests in the setting of everyday testing of tumour specimens from lung cancer patients for *EGFR* gene mutations. To do so, tumour DNA extracts from a large and unselected group of lung cancer patients (n=532) previously tested by the RT-PCR test were retested by the MS test. Recently, we reported on the impact and uptake of *EGFR* gene mutation testing during the implementation of clinical practice guidelines for testing in this population of patients from northern New Zealand \[[@R1]\]. The clinical validity and utility of the tests were evaluated by agreement analysis and by correlating the test results with the treatment and survival outcomes of tested patients. These outcomes comprised of the patient overall survival and duration of benefit from EGFR-TKI treatment. RESULTS {#s2} ======= Study populations {#s2_1} ----------------- Tumour DNA extracts from 532 NSCLC patients previously tested by the RT-PCR test were retested by the MS test (retested population). Valid results from both tests were available from 470 (88%) patients for an agreement analysis (agreement analysis population). Of 62 patients (12%) excluded from the agreement analysis, 2 (0.4%) had invalid MS test results, 9 (1.7%) had invalid RT-PCT test results and RT-PCR results were missing for 51 patients (10%). Survival data was available for analysis from 513 (96%) patients (survival population). The retested, agreement analysis and survival populations had similar demographic and clinical profiles (Table [1](#T1){ref-type="table"}). Seventy-seven (14%) patients were treated with EGFR-TKIs (EGFR-TKI-treated population). The EGFR-TKI-treated population were younger, and had a higher proportion of females, Asians and Pacific people than the retested, agreement analysis or survival study populations (Table [1](#T1){ref-type="table"}). ###### Clinical characteristics and demographic factors of the retested, survival, agreement analysis and EGFR-TKI-treated study populations Study population Retested Survival Agreement analysis EGFR-TKI-treated -------------------------------------- ------------------------------- ----------------- -------------------- ------------------ ------ ----------------- ------ ----------------- ------ Total 532 513 470 77 Median (range) 68.2(20.6-91.4) 67.4(20.6-91.4) 67.4(20.6-91.4) 63.3(40.9-86.8) Age \<60 117 22.0 117 22.8 105 22.3 27 35.1 60-69 176 33.1 176 34.3 157 33.4 24 31.2 70-79 157 29.5 157 30.6 143 30.4 18 23.4 80+ 63 11.8 63 12.3 56 11.9 7 9.1 Unknown 19 3.6 0 0 9 1.9 1 1.3 Gender Female 286 53.8 280 54.6 256 54.5 48 62.3 Male 239 44.9 233 45.4 214 45.5 29 37.7 Unknown 7 1.3 0 0 0 0 0 0 Ethnicity NZ European 264 49.6 259 50.5 232 49.4 27 35.1 NZ Maori 72 13.5 72 14.0 65 13.8 7 9.1 Pacific 44 8.3 43 8.4 42 8.9 10 13.0 Asian 63 11.8 63 12.3 60 12.8 21 27.3 Other - mostly other European 74 13.9 74 14.4 65 13.8 11 14.3 Unknown 15 2.8 2 0.4 6 1.3 1 1.3 Basis of diagnosis Cytology or haematology 166 31.2 166 32.4 157 33.4 24 31.2 Histology of primary 255 47.9 255 49.7 223 47.4 40 51.9 Histology of metastasis 61 11.5 61 11.9 50 10.6 9 11.7 Clinical investigation 5 0.9 5 1.0 5 1.1 1 1.3 Death certificate 1 0.2 1 0.2 1 0.2 0 0.0 Unknown 44 8.3 25 4.9 34 7.2 3 3.9 Extent Localised to organ of origin 33 6.2 33 6.4 32 6.8 2 2.6 Invasion of adjacent tissue or organ 24 4.5 24 4.7 24 5.1 4 5.2 Regional lymph nodes 58 10.9 58 11.3 57 12.1 9 11.7 Distant 262 49.2 262 51.1 226 48.1 47 61.0 Unknown 155 29.1 136 26.5 131 27.9 15 19.5 Histology Adenocarcinoma 432 81.2 432 84.2 388 82.6 66 85.7 Others specified 22 4.1 22 4.3 19 4.0 2 2.6 Not otherwise specified 29 5.5 29 5.7 24 5.1 5 6.5 No pathological diagnosis 5 0.9 5 1.0 5 1.1 1 1.3 Unknown 44 8.3 25 4.9 34 7.2 3 3.9 Time period \<2013 50 9.4 50 9.7 48 10.2 14 18.2 2013 251 47.2 251 48.9 222 47.2 34 44.2 2014 212 39.8 212 41.3 191 40.6 28 36.4 Unknown 19 3.6 0 0 9 1.9 1 1.3 RT-PCR test result *EGFR* gene mutation-positive 89 16.7 88 17.1 89 18.9 68 88.3 *EGFR* gene mutation-negative 383 72.0 375 73.1 381 81.1 2 2.6 Invalid or missing 60 11.3 50 9.7 0 0 7 9.1 Agreement analysis {#s2_2} ------------------ There was moderately high agreement between the RT-PCR test and the MS test for the detection of *EGFR* gene mutations. Among 470 patients with valid results available from both tests, 367 (78%) had no *EGFR* gene mutations detected in both tests and 71 (15%) had an *EGFR* gene mutation detected in both tests. The remaining 32 (7%) patients had an *EGFR* gene mutation detected by one test but not by the other test. From these data, the estimated levels of positive percentage agreement, negative percentage agreement and overall percentage agreement between the RT-PCR and MS tests for the detection of *EGFR* gene mutations were 79.8%, 96.9% or 93.2%, respectively (Table [2](#T2){ref-type="table"}). ###### Agreement analysis between the RT-PCR and MS test results for the detection of *EGFR* gene mutations in lung cancer patients RT-PCR test MS test ------------------------------- ---------------------------------------- ----- ----- Mutation Detected 71 18 89 No Mutation detected 14 367 381 Total 85 385 470 Positive percentage agreement 71/89 = 79.8% (95%CI; 70.3 to 86.8%) Negative percentage agreement 367/381 = 96.9% (95%CI; 93.9 to 97.8%) Overall percentage agreement 438/470 = 93.2% (95%CI; 90.5 to 95.1%) There was high agreement between the RT-PCR and MS test results for the identification of specific *EGFR* gene mutations among patients who had an *EGFR* gene mutation detected in both tests. Identical *EGFR* gene mutations were detected by both tests in 65 of 71 (92%) patient samples that had *EGFR* gene mutations detection by both tests (Table [3](#T3){ref-type="table"}). ###### Spectrum of *EGFR* gene mutations detected in 65 patients who were *EGFR* gene mutation-positive with identical mutations detected by both tests *EGFR* gene mutation Number of patients (%) ---------------------- ------------------------ Exon 19 deletion 32 (49%) L858R 28 (44%) Exon 20 insertion 3 (5%) G719X 2 (3%) Total 65 (100%) Disagreement {#s2_3} ------------ As mentioned above, there was disagreement between the RT-PCR and MS test results for the detection of *EGFR* gene mutations in a total of 32 (7%) patients (Table [4](#T4){ref-type="table"}). The RT-PCR test detected an *EGFR* gene mutation in 18 (4%) patients who had no *EGFR* gene mutations detected in the MS test. The RT-PCR test detected *EGFR* exon 20 insertions in 8 patients, exon 19 deletion mutations in 6 patients, exon 21 L858R mutations in 5 patients, and exon 20 point mutations in 2 patients, all of whom had no *EGFR* gene mutations detected by the MS test (Table [4](#T4){ref-type="table"}). The MS test detected an *EGFR* gene mutation in 14 patients who had no *EGFR* gene mutations detected by the RT-PCR test. The MS test detected exon 21 L858R mutations in 4 patients, exon 20 insertion mutations in 3 patients, exon 19 deletion mutations in 3 patients, exon 20 point mutations in two patients, and an exon 19 insertion and an exon 21 point mutation in one patient each, all of whom had no *EGFR* gene mutations detected by the RT-PCR test (Table [4](#T4){ref-type="table"}). ###### Profiles of 32 discordant patient samples that had an *EGFR* gene mutation detected by one test but no *EGFR* gene mutations detected by the other test n ---------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------- ---- Sample type Histology 23 Cytology 9 RT-PCR Test DNA Quality Control check result Valid 32 Invalid 0 Specific EGFR and other oncogene mutations detected in discordant samples (RT-PCR result/MS result; NMD = no mutation detected) Exon 20 Insertion/NMD 6 Exon 19 Deletion/NMD 4 Exon 21 L858R/NMD 3 Exon 19 Deletion & Exon 20 S768I/NMD 1 Exon 21 L858R & Exon 20 Insertion/NMD 1 Exon 19 Deletion & Exon 20 T790M/KRAS G12C 1 Exon 20 Insertion/BRAF V600E 1 Exon 21 L858R/KRAS G12V 1 NMD/EGFR L858R 4 NMD/EGFR E746_A750del 2 NMD/EGFR H773_V774insNPH 1 NMD/EGFR D770_N771insSVD (5\' Detection Only) 1 NMD/EGFR D770_N771insG/D770_N771insGD (5\' Detetion Only) 1 NMD/EGFR T751I & KRAS G12V 1 NMD/KRAS G12C & EGFR E746_A750del 1 NMD/EGFR T751_I759\>N 1 NMD/EGFR L861Q 1 NMD/EGFR L474_A750P (Rev Detection only), 1 Expected detectability of specific EGFR gene mutations identified in discordant samples Detectable by both the RT-PCR and MS tests 27 Detectable only by the MS test 5 Detectable only by the RT-PCR test 0 Idylla Test DNA Quality Control check Result Valid 26 Invalid 3 Not tested 3 Categorisation as true or false positive or negative test results according to Idylla retesting result (RT-PCR result/MS result) True positive/false negative 9 True negative/False positive 6 False positive/True negative 7 False negative/True positive 4 Unknown 6 As in Table [4](#T4){ref-type="table"}, all of the discordant samples passed the RT-PCR test DNA Quality Control check. Most (23 or 72%) were histological samples. Most of the specific *EGFR* gene mutations identified in the discordant samples were exon 19 deletions, exon 20 insertions or exon 21 L858R point mutations. Most of these specific *EGFR* gene mutations (27 or 84%) were expected to be detected by both the RT-PCR and MS tests. The discordant patient samples were retested by a third assay (Biocartis Idylla *EGFR* Mutation Test) (Table [4](#T4){ref-type="table"}). The Idylla test DNA Quality Control check was passed by all except three of the retested samples. The RT-PCR and MS test results were then re-categorised as true or false positive or negative tests according to the results of the third test (Table [4](#T4){ref-type="table"}). Accordingly, nine patients had true-positive RT-PCR results and false-negative MS results; six patients had true-negative RT-PCR results and false-positive MS results; four patients had true-positive MS results and false-negative RT-PCR results, and; seven patients had true-negative MS results and false-positive RT-PCR results. Six discordant patients were not retested in the third assay because no specimen was available or failure of the DNA Quality Control check. There was disagreement between the RT-PCR and MS tests for the identification of specific *EGFR* gene mutations in 6 of 71 (8%) patients who had *EGFR* gene mutations detected in both tests (Table [5](#T5){ref-type="table"}). Four patients had double *EGFR* gene mutations detected by one test but only one mutation was detected by the other test. One patient had double mutations detected by both tests but one of those two mutations differed between the two tests. One patient had a single *EGFR* gene mutation detected by both tests but the specific mutation detected differed between the tests. ###### Specific *EGFR* gene mutations detected in six *EGFR* gene mutation-positive patients in which different *EGFR* gene mutations were detected by the RT-PCR and MS tests Patient RT-PCR test MS test --------- ------------------------------------------- --------------------------- 1 EGFR Exon 18 G719X and EGFR Exon 20 S768I EGFR G719C 2 EGFR Exon 21 L858R EGFR L858R and EGFR E709A 3 EGFR Exon 21 L858R EGFR L858R and EGFR R108K 4 EGFR Exon 20 S768I and Exon 18 G719X EGFR G719S and EGFR L861Q 5 EGFR Exon 18 G719X EGFR G719S and EGFR L861Q 6 EGFR Exon 21 L858R EGFR E709G *KRAS, NRAS* and *BRAF* gene mutation detection {#s2_4} ----------------------------------------------- The MS test identified a large number of patients with *KRAS, NRAS* and *BRAF* gene mutations that could not be expected to be detected by the RT-PCR test. Among 367 patients who had no *EGFR* gene mutations detected in both tests, a total of 127 patients (35%) had *KRAS, NRAS* and *BRAF* gene mutations identified by the MS test. The spectrum and frequency of specific *KRAS, NRAS* and *BRAF* mutations is shown in Table [6](#T6){ref-type="table"}. ###### Spectrum and frequency of specific *KRAS*, *NRAS* and *BRAF* gene mutations identified in *EGFR* gene mutation-negative patient samples by the MS test RT-PCR test MS assay n ------------- ------------------------ ---- NMD KRAS G12C 40 NMD KRAS G12V 28 NMD KRAS G12D 21 NMD KRAS G12A 9 NMD KRAS G13C 5 NMD KRAS Q61H 4 NMD BRAF V600E 3 NMD KRAS G12R 2 NMD KRAS Q61L 2 NMD NRAS Q61R 2 NMD BRAF G469R 1 NMD KRAS A146T 1 NMD KRAS G12C, KRAS G12V 1 NMD KRAS G12S 1 NMD KRAS G13D/N 1 NMD KRAS Q61R 1 NMD NRAS G12D/E, KRAS G12D 1 NMD NRAS G13R 1 NMD NRAS Q61H 1 NMD NRAS Q61L 1 NMD NRAS Q61Q/K 1 Overall survival {#s2_5} ---------------- Overall survival was correlated with the results of the RT-PCR test (Figure [1A](#F1){ref-type="fig"}), the MS test (Figure [1B](#F1){ref-type="fig"}) and agreement analysis (Figure [1C](#F1){ref-type="fig"}). The detection of an *EGFR* gene mutation was associated with significantly prolonged overall survival compared to when no *EGFR* gene mutations were detected, either by the RT-PCR test (adjusted HR=0.55 (95% CI 0.39 to 0.75))(Figure [1A](#F1){ref-type="fig"}), the MS test (adjusted HR=0.58 (95% CI 0.41 to 0.79))( Figure [1B](#F1){ref-type="fig"}) or by both tests (HR=0.47 (95% CI 0.32 to 0.66))(Figure [1C](#F1){ref-type="fig"}). The detection of a *KRAS, NRAS* or *BRAF* gene mutation was associated with a trend towards shorter overall survival compared to when no mutations were detected by the MS test (Figure [1B](#F1){ref-type="fig"}). The discordant detection of an *EGFR* gene mutation by one test but not the other test was associated with a trend for immediate overall survival compared to that of patients with concordantly positive or negative *EGFR* gene mutation tests (Figure [1C](#F1){ref-type="fig"}). ###### Overall survival by test results **(A)** RT-PCR test (Log-rank P-value = 0.002; *EGFR* gene mutation detected (EGFRm+, red); no *EGFR* gene mutations detected (EGFRm-, blue)). **(B)** MS test (Log-rank P-value = 0.01; *EGFR* gene mutation detected (EGFRm+, red); no mutations detected (mutation-, blue); *KRAS, NRAS* or *BRAF* gene mutation detected (nonEGFRm+, green)). **(C)** Agreement analysis (Log-rank P-value = 0.002; concordant detection of an *EGFR* gene mutation (Concordantly EGFRm+, red); concordant detection of no *EGFR* gene mutations (Concordantly EGFRm-, blue); discordant detection of an *EGFR* gene mutation by one test but not by the other test (Discordant EGFR mutation status, green)). Numbers at risk are shown above the x-axis. ![](oncotarget-08-101437-g001a) ![](oncotarget-08-101437-g001b) ![](oncotarget-08-101437-g001c) Duration of EGFR-TKI treatment {#s2_6} ------------------------------ The duration of benefit from EGFR-TKI treatment was correlated with the results of the RT-PCR test (Figure [2A](#F2){ref-type="fig"}), the MS test (Figure [2B](#F2){ref-type="fig"}) and agreement analysis (Figure [2C](#F2){ref-type="fig"}). The detection of an *EGFR* gene mutation was associated with trends toward longer duration of benefit from EGFR-TKI treatment compared to when no mutations were detected, either by the RT-PCR test (Figure [2A](#F2){ref-type="fig"}), the MS test (Figure [2B](#F2){ref-type="fig"}) or by both tests (Figure [2C](#F2){ref-type="fig"}). The detection of a *KRAS, NRAS* or *BRAF* gene mutation was associated with a trend toward shorter duration of benefit from EGFR-TKI treatment compared to when no mutations were detected by the MS test (Figure [2B](#F2){ref-type="fig"}). The discordant detection of an *EGFR* gene mutation by one test but not the other test was associated with a trend of intermediate duration of benefit from EGFR-TKI treatment compared to that of patients with concordantly positive or negative *EGFR* gene mutation tests (Figure [2C](#F2){ref-type="fig"}). ###### Duration of benefit from EGFR-TKI treatment by test results **(A)** RT-PCR test (Log-rank P-value = 0.1; *EGFR* gene mutation detected (EGFRm+, red); other results (Others, green)). **(B)**, MS test (Log-rank P-value = 0.01; *EGFR* gene mutation detected (EGFRm+, red); no mutations detected (mutation-, blue); *KRAS, NRAS* or *BRAF* gene mutation detected (nonEGFRm+, green)). **(C)** Agreement analysis (Log-rank P-value = 0.01; concordant detection of an *EGFR* gene mutation (Concordantly EGFRm+, red); concordant detection of no *EGFR* gene mutations (Concordantly EGFRm-, blue); discordant detection of an *EGFR* gene mutation by one test but not by the other test (Discordant EGFR mutation status, green)). Numbers at risk are shown above the x-axis. ![](oncotarget-08-101437-g002a) ![](oncotarget-08-101437-g002b) ![](oncotarget-08-101437-g002c) DISCUSSION {#s3} ========== The retesting study described here demonstrates moderately high agreement between a RT-PCR and a MS test for detecting *EGFR* gene mutations in lung cancer patients. The study was the first to directly compare these RT-PCR and MS tests despite both being commercially available and widely used in clinical practice for the detection of *EGFR* gene mutations in lung cancer patients. Both tests agreed in the detection of *EGFR* gene mutations in most patients with levels of positive, negative and overall agreement ranging from 79.8% to 96.9%. Identical *EGFR* gene mutations were detected by both tests in 92% of patients who were *EGFR* gene mutation-positive in both tests. In this way, this agreement study has provided evidence of the clinical validity of the RT-PCR and MS tests for detecting *EGFR* gene mutations in lung cancer patients. However, this retesting study also demonstrates less than full concordance between the RT-PCR and MS tests for detecting *EGFR* gene mutations in lung cancer patients. The tests disagreed in the detection of *EGFR* gene mutations in some patients, with levels of positive, negative and overall disagreement ranging from 3.1% to 20.2%. The causes of this discordance were unclear but interesting to speculate upon. Most of the discordant results arose during the testing of small histological or cytological biopsy specimens, which are known to be less reliable for testing than surgical specimens \[[@R22]\]. The DNA quality control checks that were performed during the RT-PCR testing and Idylla retesting were passed by almost all of the discordant samples. The specific *EGFR* gene mutations identified in the discordant samples were most frequently exon 19 deletions, exon 20 insertions and exon 21 L858R point mutations, which are the most prevalent *EGFR* gene mutations associated with lung cancer \[[@R23]\] and most were expected to be detected by both the RT-PCR and MS tests. Oncogene mutation detection is known for being error-prone, due to, for example, contamination, PCR inhibitors and genetic polymorphisms. Contamination may occur during handling, DNA extraction or analysis \[[@R24], [@R25]\]. Reagents or reaction products used or produced during the testing may inadvertently inhibit PCR amplification \[[@R26]\]. Polymorphisms in genetic sequences targeted by primer and probe oligonucleotides used in a test protocol may also produce variation in PCR amplification \[[@R27], [@R28]\]. Retesting of the discordant samples by a third test showed that false-positive and false-negative test results were generated by both the RT-PCR and the MS test. Similar numbers of false-positive and false-negative results were produced by the RT-PCR and MS tests. Patients with discordant *EGFR* gene mutation test results had survival and treatment outcomes that were intermediate of patients with concordantly positive or negative *EGFR* gene mutation tests. While several factors may have influenced these intermediate outcomes, these findings suggest that some patients with discordant *EGFR* gene mutation test results survived and responded to EGFR-TKI treatment as would be expected of patients with true-positive *EGFR* gene mutation test results, whereas others did so as would be expected of patients with true-negative *EGFR* gene mutation test results. In these regards, false-positive and false-negative *EGFR* gene mutation test results may have important clinical consequences. If treatment decisions are based on false-positive results then such patients may receive less benefit from EGFR-TKI treatment but bear the same risks of adverse events compared to patients with true-positive *EGFR* gene mutation test results. Furthermore, if treatment decisions are based on false-negative test results then such patients may be denied substantial benefits of EGFR-TKI treatment, and bear increased risk of disease progression and death compared to patients with true-positive *EGFR* gene mutation test results. Other studies have also shown false-positive and false-negative results being generated by tests used for detecting EGFR gene mutations \[[@R29]\]. Despite less than full concordance, and false-positive and false-negative test results in some patients, treatment and survival outcomes of tested patients correlated with the results of the RT-PCR and MS tests in this study. The detection of an *EGFR* gene mutation by the RT-PCR or MS test was associated with significantly prolonged overall survival and trends toward more durable benefit from EGFR-TKI treatment, compared to when no *EGFR* gene mutations were detected. The demonstration of these associations with treatment and survival outcomes provides evidence of the clinical utility of the RT-PCR and MS tests for predicting the prognosis and clinical benefits of EGFR-TKI treatment in patients with lung cancer. In conclusion, this study has provided evidence of the clinical validity and utility of a RT-PCR and a MS test for the detection of *EGFR* gene mutations that predict the prognosis and clinical benefits of EGFR-TKI treatment in lung cancer patients. However, caution and awareness are required regarding the possibility of false-positive and false-negative results being generated by these tests, which run the risk of important clinical consequences. MATERIALS AND METHODS {#s4} ===================== Study design, context and population {#s4_1} ------------------------------------ The research described here was a clinical laboratory test-retesting study and clinical outcomes correlative study. Eligible patients were those referred to a New Zealand provider of *EGFR* gene mutation testing services between August 2012 and July 2014 (n=826), who had remnant tissue DNA extracts available for retesting after the completion of clinical diagnostic testing (n=532). The main study endpoint was the result of mutation testing and retesting. The main study outcomes were overall survival and the duration of treatment with an EGFR-TKI, either erlotinib or gefitinib. The Northern B Health and Disability Ethics Committee approved the study and required no individual patient consent. The study was registered with the Australian New Zealand Clinical Trials Registry (ACTRN12615000998549). Mutation testing {#s4_2} ---------------- ### MS Test {#s4_2_1} The MS test was undertaken using the Sequenom/Agena MassARRAY System and Typer 4 software (Agena Bioscience, San Diego, CA, USA). The OncoFOCUS panel V1.0 was used following the manufacturer\'s instructions (OncoFOCUS^TM^ Panel Users Guide 1/8/2014). Testing was undertaken at the Auckland UniServices Sequenom facility, which was accredited (IANZ ISO 15189.2012) for clinical diagnostic *EGFR* molecular testing. Procedures undertaken to validate the test included establishing a low abundance control sample that demonstrated sensitivity for the detection of the *EGFR* L858R mutation to at least 10% mutation abundance. In addition, the facility participated in the Royal College of Pathologists Australasian Quality Assurance Programme involving blinded analysis of 69 clinical FFPE tumour samples, and an additional set of cell lines, both with known mutation profiles. These validation studies demonstrated 100% concordance with the expected results (Phillip Shepherd, Master of Medical Laboratory Science thesis submitted to Auckland University of Technology March 2017). ### RT-PCR test {#s4_2_2} The RT-PCR test involved PCR amplification and detection of target DNA using complementary primer pairs and oligonucleotide probes. DNA was extracted using a Roche FFPE extraction kit and following manufacturer\'s instructions \[[@R15]\]; essentially this involved de-paraffinization and macro-dissection of tissue from slides previously marked by a histopathologist, thus ensuring the correct area was sampled. Following incubation in tissue lysis buffer, the lysate was bound to a filter column, washed and eluted. DNA was quantified using a Nanodrop® 1000 and diluted to 2 ng/μL prior to performing the RT-PCR test on the cobas® z 480 analyzer. The RT-PCR test consisted of three simultaneous PCRs encompassing 41 mutations within exons 18-21 of the *EGFR* gene. A mutant control and negative control were included in each run to confirm the validity of the run. ### Third test {#s4_2_3} Patient samples with discordant results for the detection of *EGFR* gene mutations were retested by a third assay, the Biocartis Idylla EGFR Mutation Test \[[@R30]\]. The Idylla® System is an *in vitro* diagnostic (IVD) device, consisting of a console and instrument. The system uses disposable, single sample cartridges, in which paraffin embedded tissue is macro-dissected onto small filter paper circles which are inserted directly into a gene-specific cartridge. This is then placed in to the instrument, and all the processing steps take place within the hermetically-closed cartridge. The steps comprise liquefaction, cell lysis, DNA/RNA extraction, real-time amplification/detection, data analysis and reporting. Mutant and negative controls were incorporated into the cartridge. The *EGFR*-specific cartridge detects 52 mutations in exons 18-21 of the *EGFR* gene. The testing was conducted according to the manufacturer\'s instructions. Data sources {#s4_3} ------------ Mutation testing results were linked with other prospectively archived electronic data from healthcare administrative databases using individual patient-unique healthcare identifier numbers. Data extractions from the New Zealand Cancer Registry on tested patients provided information on the date of diagnosis and death, and codes for gender, ethnicity, place of domicile, morphology, basis of diagnosis, notifying laboratory, extent of disease, TNM, tumour grade and additional notes. Records of erlotinib and gefitinib dispensing were extracted from the Pharmaceutical Information database (PHARMS), which contains claims and payment information from pharmacists for subsidised dispensing in New Zealand, and was found in our pilot study to be a near-complete source of EGFR-TKI dispensing data. Where possible, electronic medical records were viewed to verify extracted data and provide additional information. Data analysis {#s4_4} ------------- Mutation testing results were tabulated by patient numbers and proportions were calculated according to whether or not a mutation was detected by each gene and by each specific mutation. The concordance between the mutation test results was analysed by agreement analysis \[[@R31]\]. A sample size of more than 400 patients was estimated to be sufficient for estimating proportions of agreement and population subgroups with 95% confidence intervals of less than 5%. Cox proportional hazards regression modelling was used to assess hazards of overall mortality by the gene mutation status (*EGFR* gene mutation, *KRAS*, *NRAS* or *BRAF* gene mutation and no mutation) determined by the MS test and by agreement analysis results (concordant detection of an *EGFR* gene mutation by both RT-PCR and MS tests, discordant detection of an *EGFR* gene mutation by one test and not the other test, and no *EGFR* gene mutation). Overall survival was measured from the date of diagnosis to the date of death. Surviving patients were right-censored on 5 August 2016. Hazard ratios were adjusted by multivariate analysis for age, gender, ethnicity, histology, site and extent of disease, and diagnosis period. Similar analyses were performed in a subgroup of patients who were treated with EGFR-TKIs and the duration of treatment was assessed against the gene mutation status determined by the MS test and by agreement analysis results. The duration of EGFR-TKI treatment was measured from the date that the drug was first dispensed to the date of the last dose (calculated as the date of last dispense plus the number of days of treatment dispensed on the last occasion) or death. Surviving patients who were continuing treatment with EGFR-TKIs were right-censored on 1 June 2016. No multivariate analysis was done because of the small sample sizes. **Author contributions** PS, GRL, NJK, CAL, DRL JME and MJM, were responsible for the study concept and design, and obtained funding. PS and KLS undertook the retesting of the samples. PS, KLS, PK, PSA and AL collected and assembled the data. STT, PSA, JME and MJM did the statistical analyses. PS, STT, PSA, GRL, JME, DRL and MJM contributed to the data interpretation. PS, STT and MJM wrote the first draft of the report that was critically reviewed, and the final version approved, by all co-authors. We thank the many patients who contributed to this study. Maria Luisa Bituin contributed to the data collection. **CONFLICTS OF INTEREST** The authors report no conflicts of interest. **FUNDING** The research was supported by grants from the Health Research Council of New Zealand (grant numbers 13/981 and 15/087) and the Auckland Medical Research Foundation/Perpetual David and Cassie Anderson Postdoctoral Fellowship and Kelliher Charitable Trust Emerging Researcher Start-up Award to Dr Sandar Tin Tin. *EGFR* : Epidermal Growth Factor Receptor gene EGFR-TKI : Epidermal Growth Factor Receptor-Tyrosine Kinase Inhibitor FFPE : Formalin Fixed Paraffin Embedded MALDI-TOF : Matrix Assisted Laser Desorption/Ionization-Time of Flight MS test : Sequenom/Agena Biosciences MassArray OncoFocus mass spectrometry test NSCLC : Non-Small Cell Lung Cancer PCR : Polymerase Chain Reaction RT-PCR test : cobas EGFR Mutation Test
Q: How does zlib works with Z_FIXED strategy? A quick look at the documentation states that : Z_FIXED prevents the use of dynamic Huffman codes, allowing for a simpler decoder for special applications. So, if it does not use dynamic Huffman, what does it uses instead ? A static table ? If so, where is it defined ? Can it be defined and loaded by the user ? (or hacked into the code ?) A: The fixed tables are defined in the deflate format specification.
About the Bankruptcy Database Project The Bankruptcy Database Project reports information on U.S. bankruptcy filings from open court records. We present two basic types of data: petitions filed and persons filed. We provide three analyses of our data: (1) filings under each chapter of the U.S. Bankruptcy Code, (2) commercial and noncommercial filings, and (3) filings by legal entities and by individuals. The chapter is counted as of the date of filing and is not adjusted if the case is later converted to a different chapter. For more information about the data, see the Bankruptcy Filings Database page. The Administrative Office of U.S. Courts ("AOUSC") also releases statistics on the number of bankruptcy filings. The Bankruptcy Database Project data will differ from the AOUSC statistics. To the best of our knowledge, these differences result from several factors, including rules for counting reopened cases and joint petitions and for determining whether a case is a business case. More information about the differences between the AOUSC data and the data used on this site is available in Professor Robert Lawless's blog post, Why I Use AACER's Filing Statistics, at Credit Slips. Automated Access to Court Electronic Records ("AACER") has provided the proprietary data that makes this web site possible. Everyone at the BDP at Harvard thanks AACER for its continued support and commitment to improving public policy through access to information.
This invention relates to arrays manufactured on polymeric surfaces and more particularly to high-density, miniaturized arrays and methods of manufacturing the same. Miniaturized arrays may be used in a variety of applications, such as gene sequencing, monitoring gene expression, gene mapping, bacterial identification, drug discovery, and combinatorial chemistry. Many of these applications involve expensive and oftentimes difficult to obtain samples and reagents. Accordingly, high density, miniaturized arrays are desirable because the use of such arrays may dramatically increase efficiency with respect to limited or expensive samples when compared to standard arrays, such as a 96 well plate. For example, a 96 well plate may require several hundred microliters of sample per well to run a diagnostic experiment whereas a miniaturized array would require only a fraction of that sample for the entire array. In addition to the reduction of volume, miniaturization allows hundreds or thousands of tests to be performed simultaneously. Furthermore, a high-density array may be more versatile than a standard array because of the wide variation of chemistries that may be present on a single array. Current methods of manufacturing miniaturized arrays are not conducive to mass production. These methods are limited by multiple step procedures and by the difficulty in achieving miniaturized arrays with densely packed reactants. The manufacture of arrays is further complicated in applications requiring different chemistries at different binding sites on the arrays, such as required for manufacturing oligonucleotide arrays. One example of a multiple step procedure for manufacturing arrays is disclosed in U.S. Pat. No. 5,445,934. This patent discloses a method of on-chip synthesis. In this process, the substrate is derivatized with a chemical species containing a photocleavable protecting group. Selected sites are deprotected by irradiation through a mask. These sites are then reacted with a DNA monomer containing a photoprotective group. The process of masking, deprotecting and reacting is repeated for each monomer attached until an array of site-specific sequences is achieved. This process may be both time-consuming and resource intensive. Because of the planar nature of the surface, a limited concentration of oligonucleotides (measured by the distance between adjacent oligonucleotides within a binding site) can be synthesized at each binding site before steric crowding interferes with the hybridization reaction. As a result, the amount of detectable signal from each binding site may also be limited. Another type of method used to manufacture arrays is off-chip synthesis. An example of off-chip synthesis is disclosed in U.S. Pat. No. 5,552,270. This process uses gel pads. The gel pads are created on a substrate using robotic devices. Thereafter, minute quantities of presynthesized oligonucleotides are robotically placed on individual gel pads on the substrate. Production of chips using off-chip synthesis is generally time-consuming because each solution is deposited individually or in small groups. High densities are difficult to achieve because of the limited resolution of robotic devices and the physical size limitations of the fluid delivery devices. This type of process typically requires the use of specialized, sophisticated, and miniaturized tools. The use of gel pads facilitates the affixation of a higher concentration of oligonucleotides within each binding site, which may overcome the difficulties encountered with planar surfaces outlined above. However, the use of thick gel layers hinders hybridization kinetics due to slow target analyte diffusion into and out of the gel. There is a need for high density, miniaturized arrays including reactive surfaces with high surface areas and high detection signal strength. Preferably, the arrays would facilitate rapid binding kinetics between affixed reactants and target analytes. There is a further need for methods of manufacturing high density, miniaturized arrays. The methods preferably would be cost-effective and amenable to mass production. In one embodiment of the present invention, an array includes a polymeric substrate and a coating comprising linking agents at least partially adhered thereto. The coating comprising linking agents has a projected surface area and a topographical surface area, and the topographical surface area is greater than the projected surface area. The topographical surface area is at least two times greater than the projected surface area. In a preferred embodiment, the topographical surface area is at least five times greater than the projected surface area. In a most preferred embodiment, the topographical surface area is at least fifteen times greater than the projected surface area. Preferably, the coating includes an undulated surface. In a preferred embodiment of the present invention, the array includes a binding site density of over 1,000 binding sites per square centimeter. A density of at least 25,000 binding sites per square centimeter is preferred with a density of over 60,000 per square centimeter being most preferred. In another embodiment of the present invention, a material for use in manufacturing an array includes an oriented, polymeric substrate including a coating comprising linking agents. This material is suitable for the subsequent affixation of reactants thereto. The arrays of the present invention facilitate the affixation of a high concentration of reactants at each binding site, with all of the attendant advantages of high density, including the ability to increase detection signal strength. The high topographical surface area arrays are particularly useful in this regard. In addition, these high surface area arrays allow sample containing the analyte(s) of interest to rapidly come into contact with the reactants, without the necessity of diffusing into a thick coating, such as a hydrogel. In one embodiment of the methods of the present invention, a polymeric substrate includes a major surface having a surface area. A reactant, such as DNA, is affixed to the major surface of the substrate to create binding sites. The surface area of the major surface is reduced, thereby increasing the density of binding sites on the substrate. In a preferred embodiment, the substrate is a biaxially oriented, heat shrink film. In a particularly preferred embodiment of the present invention, the reactants are oligonucleotides wherein the oligonucleotides vary in composition at differing binding sites on the substrate. In another method of the present invention, a heat shrink film is functionalized to create linking agents on the surface of the film for subsequent attachment of reactants. The surface area of the substrate surface may be reduced, thereby increasing the density of linking agents on the substrate. Preferably, the heat shrink surface is functionalized with azlactone linking agents. In yet another embodiment of the present invention, an elastomeric substrate is stretched and functionalized to create linking agents on the surface of the substrate. Reactants, such as DNA, may be affixed to the substrate via linking agents. The substrate is subsequently allowed to relax, thereby reducing the surface area of the substrate to increase the density of linking agents on the substrate. A backing or other structure may be added to retain the substrate in the reduced orientation. In yet another embodiment of the present invention, a method of manufacturing arrays of the present invention includes providing an oriented polymeric substrate. A coating comprising linking agents is applied to a surface of the substrate. Subsequently, the substrate is relaxed such that it becomes less oriented or isotropic. During this relaxation step, the topographical surface area of the coating becomes greater than the projected surface area of the coating. Reactants may be affixed to the linking agents prior, during or subsequent to the relaxation step to create an array with binding sites. Preferably, the reactants are affixed prior to the relaxation step. The methods of manufacture of the present invention are amenable to mass production. The methods of manufacture of the present invention may be employed to increase the efficiency of current methods of manufacture of arrays to achieve high densities of reactants. The methods of the present invention are particularly useful in achieving high-density nucleic acid arrays wherein different nucleic acids are located at different sites on the substrate. Various other features and advantages of the present invention should become readily apparent with reference to the following detailed description, examples, claims and appended drawings.
Enhancing patient safety: the effect of process improvement on bedside fluoroscopy time related to nasoduodenal feeding tube placement in pediatric burn patients. Nutrition support is essential in the care of burn patients. Early in the course of treatment, postpyloric feeding tube placement permits initiation of enteral nutrition, minimizes risk of aspiration, and may also attenuate hypermetabolism. Fluoroscopy aids in postpyloric feeding tube placement, yet concerns remain about safety. The purpose of this study was to measure fluoroscopy-associated radiation exposure during bedside feeding tube placement in pediatric burn patients and to take appropriate action to improve hospital protocols that minimize radiation exposure. During a 19-year period, radiation doses were measured before and after performance improvement of radiation safety initiatives. This plan included mandatory training for surgical house officers, measurement of maximum midline dosage for each procedure, limitation of radiation exposure to 5 minutes, and development of standardized policies and protocols for feeding tube placement. Phase 1 of the study retrospectively determined fluoroscopy time required for enteral tube placement. Phase 2 used thermoluminescent chips to measure the amount of radiation during fluoroscopy to establish an acceptable midline radiation dose. Phase 3 evaluated fluoroscopy times following implementation of improved safety processes. There were 357 procedures in phase 1 and mean fluoroscopy time was 4.1 minutes. Of the 10 procedures in phase 2, mean fluoroscopy time decreased to 2.7 minutes. There were 1804 procedures in phase 3, and mean fluoroscopy time was 2.3 minutes. Mean radiation exposure was significantly reduced following implementation of standardized policies and the development of a clinical protocol for bedside fluoroscopy (P<.0001). With proper processes, fluoroscopy procedures result in minimal radiation exposure for patients and staff.
Haryana elections 2019: Singer Sapna Chaudhary joined the BJP in July Highlights The singer allegedly campaigned for rival candidate Gopal Kanda Sapna Chaudhary joined the BJP in Haryana recently Gopal Kanda is the Haryana Lokhit Party candidate from Sirsa Singer Sapna Chaudhary, who joined the BJP in Haryana recently, campaigned for a rival candidate Gopal Kanda for the assembly election, leaving her party red-faced. In a quick firefighting exercise, Delhi BJP chief Manoj Tiwari dissuaded her from campaigning for Mr Kanda, the Haryana Lokhit Party candidate from Sirsa, BJP sources said. The sources said Ms Chaudhary informed party leaders that she was advised by her staff that she can campaign for Mr Kanda as he "was an independent candidate". A video message of Ms Chaudhary seeking support for Mr Kanda in the Haryana election was shared widely on social media, catching the attention of BJP leaders on Friday. There were also posters of Ms Chaudhary in favour of Mr Kanda, said a senior Delhi BJP leader. A section of Delhi BJP leaders expressed shock and demanded that Ms Chaudhary be punished for "anti-party activity". "How can she campaign for a candidate against the official BJP candidate when she herself is a party member?" said a leader. The BJP has fielded Pradip Ratusaria from Sirsa, where Prime Minister Narendra Modi addressed a rally on Saturday, the last day of campaigning for the election to be held on Monday. Ms Chaudhary joined the BJP with much fanfare at Jawahar Lal Nehru stadium during the party's nationwide membership campaign in July, in the presence of former Madhya Pradesh chief minister and BJP vice-president Shivraj Singh Chouhan, BJP general secretary Ram Lal and Delhi BJP chief Manoj Tiwari. The sources said Ms Chaudhary, who is an artiste and performer, claimed she was advised by her staff that she can campaign for Kanda. "When party leaders asked her about why she decided to campaign for Kanda, she claimed she was advised that she can do so as Kanda was an independent candidate," said a Delhi BJP leader. However, she was asked by party leaders not to do so and immediately dissociate herself from any type of campaigning for Mr Kanda. She was also scheduled to participate in a roadshow in support of Mr Kanda, he said.
What size truck does this size require? Could one be made for 1/2ton trucks? get me your truck model , cab to axel length and deired width and height and i can build to order. i'm having one made right now that would fit a 1/2 ton dimension but you would have to up your spring capacity to at least a heavy 3/4 ton spec.
Join us in celebrating World' s Indigenous People Day on 9th August at the Silverfish Festival of Cabbages with a talk by Fiona Wright, a project manager with the British Council on their Storybook project to collect folktales from Sabah and Sarawak.
June 12th, 2018, Trump economic adviser Larry Kudlow recovering after heart attack..look close at this dream from June 8t of the same year...fake news, more on the 'vet' drug made by Russia for the murder of people, and its got nothing to with a :: of 3
By Appocomaster. Round 88 Round 88 - Vengeance has just finished, with the End of Round Ceremony (EoRC) starting shortly 21:00 GMT for an hour in #planetarion on irc.netgamers.org (accessible via the com unit). It will consist of: - interviews with the top players (who get 1 credit each) - interviews with th... View Article
The Accessory Organizer w/BIONIC® is created from the equivalent to seven plastic bottles recovered from marine & coastal environments. Designed intentionally with style and function in mind, the collection features practical details and organizational tools designed as a cohesive system to work together.
Q: Ajax Or OnClick() Load I am completely new to Ajax and JQuery. I am trying to figure out the best way to load some results based on user click without loading a new page. First of all, I was able to implement an ajax search function by myself on the left side of the page. What I want to do now is load some details based on what the user clicks onto the right side of the page. This will show details about the food they select from their search. Should I use Ajax again for this or jQuery? Can someone please show me how to do this? I would like to be able to pass the id which you can see in the html search results on my site and load it when clicked on. Here is an example returned result from a search that a user can click on. The class is the items id <div class="foodRow"><span class="102">APPLE JUC,CND OR BTLD,UNSWTND,W/ ADDED VIT C</span></div> Here is my site that you can check out to see what I mean. http://challengeyourdiet.com/dev/usda/ Here is the relevant code that I have working now. Ajax <script type="text/javascript" src="js/jquery-1.3.2.js"></script> <script type="text/javascript" src="js/jquery.watermark.js"></script> <script type="text/javascript"> $(document).ready(function() { function ajax_delay(str){ setTimeout("str",2000); } $("#faq_search_input").watermark("Begin Typing to Search"); $("#faq_search_input").keyup(function() { var faq_search_input = $(this).val(); var dataString = 'keyword='+ faq_search_input; if(faq_search_input.length>2) { $.ajax({ type: "GET", url: "ajax-search.php", data: dataString, beforeSend: function() { $('input#faq_search_input').addClass('loading'); }, success: function(server_response) { window.setTimeout(function() { $('#searchresultdata').html(server_response).show(); $('span#faq_category_title').html(faq_search_input); if ($('input#faq_search_input').hasClass("loading")) { $("input#faq_search_input").removeClass("loading"); } }, 1200); } }); }return false; }); }); </script> HTML <div class="innerLeft"> <div class="prod-subcontent"> <div class="prod-lcol fl-left"> <div class="prod-content"> <div class="faqsearch"> <div class="faqsearchinputbox"> <input name="query" type="text" id="faq_search_input" /> </div> </div> <div id="searchresultdata" class="faq-articles"> </div> </div> </div> <div class="breaker"> </div> </div> </div> <!-- end innerLeft --> <div class="innerRight"> <div class="prod-subsubhead"> <h4 class="faq_title"> <strong>Food Details For : </strong> <span id="faq_category_title">Keyword </span> </h4> </div> <div id="searchresults" class="faq-articles"> </div> </div> <!-- end innerRight --> <div class="breaker"> </div> Thanks for any help!! A: Firstly, you should 'upgrade' to a much newer version of jQuery, 1.3.2 is very old, the latest version (with old IE support) is 1.11.0. $('#searchresultdata').on('click', '.foodRow', function(e){ e.preventDefault(); var articleId = $(this).find('span').attr('class'); $('#searchresults').empty() .load('/url-to-article-page.aspx?id=' +articleId+ ' #selector-to-refine-data-to-load'); }) I'll explain the answer to help you. We keep a watch for events that bubble up to the #searchresultdata that originated from a .foodRow click. If so we get the class you defined on the inner span of that element as the id to pass as a parameter, clear the current contents and attempt to call the page specified and get the HTML, and then only retrieve the part of the page that is specified by the selector. I am assuming you have a page for the articles that you would be able to browse to. Relevant links: jQuery Delegated events jQuery load page fragments Don't bother doing your if check here, and just removeClass(), if the class is not there then it will not remove it or throw an error. if ($('input#faq_search_input').hasClass("loading")) { $("input#faq_search_input").removeClass("loading"); } Some recommendations: Upgrade your jQuery library to the latest version, the above will not work without it Don't use class to pass the id for your article, instead use data attributes. The result should look like <span data-id="107">...</span> and then you can use $(this).find('span').data('id');. Apaprt from which, numbers only are invalid class names. Forget about the watermark plugin, instead set the placeholder attribute and use a placeholder plugin I don't understand why you have the setTimeouts, the first one isn't used and the one in the AJAX succeed is simply delaying displaying your results for 1.2seconds AFTER you have received them. Hope that helps.
You are here Rep. DesJarlais on the Return of American Soldier's Remains from the 1846 Battle of Monterey Sep 26, 2016 Press Release Washington, D.C. – Last year, Representative Scott DesJarlais (R-TN-04), introduced a resolution urging the Government of Mexico and the Mexican Secretariat of Foreign Affairs to expedite the release of identified remains of 11 American Soldiers who fought in the battle of Monterey in 1846. 170 years ago, Brigadier General Zachary Taylor led a 6,000 man military force composed largely of Tennessee Volunteers and Texas Rangers to capture the town of Monterrey. During this battle the United States suffered 120 casualties, 368 were wounded and 43 were reported missing. According to Mexico’s National Institute of Anthropology, the uncovered remains of the 11 U.S. soldiers were found at a construction site near the Texan border. The remains were identified as American soldiers who died in combat after an examination of the buttons sewn into their uniforms as well as two U.S. half-dollar coins excavated in the area. “After working for several years with the State Department and our U.S. consulate in Monterrey, Mexico, I was pleased to learn that the remains of these U.S. soldiers will finally be returned to American soil. I applaud the diligent work and dedication of our State Department and military personnel who have worked tirelessly over the years to secure the return of these remains. This joint effort embodies the longstanding commitment to our men and women in uniform that the United States does not leave our fallen soldiers behind.” The United States Army’s Armed Forces Medical Examiner announced that the remains of these soldiers will leave Mexico on September 28th, 2016 for Dover Air Force Base in Dover, Delaware.
HIV Criminalization May Hinder Testing A new study out of Canada indicates that a recent spate of prosecutions for HIV status nondisclosure may lead some men to never get tested at all. Todd Heywood reports at the Advocate: [A] significant minority of men who have sex with men said that a series high-profile criminal prosecutions related to HIV nondisclosure had impacted their willingness to get tested for the virus or to discuss risk factors with medical professionals. The researchers further reported that these individuals were more likely to engage in higher-risk sexual practices. “Our results indicate that, although it is a minority of individuals (17.0% and 13.8%, respectively) who reported that nondisclosure criminal prosecutions either (a) affected their willingness to get tested for HIV, or (b) made them afraid to speak with nurses and physicians about their sexual practices, this small group reported higher rates of unprotected penetrative anal intercourse and internal ejaculation with, on average, a higher number of different sexual partners within the previous 2 months,” wrote the study’s authors. Heywood adds: Unlike Canada, where prosecutors rely on traditional criminal laws such as sexual assault, attempted murder, and murder, the U.S has a patchwork of laws specifically involving HIV. According to the Center for HIV Law and Policy, 34 U.S. states and two U.S. territories have HIV-specific criminal laws. Some of those laws criminalize failure to disclose an HIV-positive status to sexual partners — regardless of whether the virus is actually transmitted. Even in states without specific HIV statutes, prosecutors can bring charges under traditional criminal laws, such as assault with a deadly weapon charges. RELATED: Last month Lambda Legal filed an appeal on behalf of a man who was originally sentenced to 25 years in prison for failing to disclose his HIV status to a partner with whom he’d used a condom and who did not become infected.
/* mpf_init_set_d -- Initialize a float and assign it from a double. Copyright 1993-1995, 2000, 2001, 2004 Free Software Foundation, Inc. This file is part of the GNU MP Library. The GNU MP Library is free software; you can redistribute it and/or modify it under the terms of either: * the GNU Lesser General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. or * the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. or both in parallel, as here. The GNU MP Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received copies of the GNU General Public License and the GNU Lesser General Public License along with the GNU MP Library. If not, see https://www.gnu.org/licenses/. */ #include "gmp.h" #include "gmp-impl.h" void mpf_init_set_d (mpf_ptr r, double val) { mp_size_t prec = __gmp_default_fp_limb_precision; r->_mp_prec = prec; r->_mp_d = __GMP_ALLOCATE_FUNC_LIMBS (prec + 1); mpf_set_d (r, val); }