text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
The number of children and men who fall prey to traffickers is rising, a UN study has found, with the global movement of refugees and migrants a major contributory factor. Although women and girls account for more than 70% of human trafficking victims, the largest increase in the number of refugees and migrants since the aftermath of the second world war has left children and men more vulnerable to exploitation, according to the report. Yury Fedotov, head of the UN Office on Drugs and Crime (UNODC), the UN body charged with tackling the problem, warned that the average number of convictions for the crime remains low. “As this crisis has unfolded, and climbed up the global agenda, there has been a corresponding recognition that, within these massive migratory movements, are vulnerable children, women and men who can be easily exploited by smugglers and traffickers,” wrote Fedotov in a foreword to the study. Children account for almost a third of all human trafficking victims worldwide, according to the UNODC’s global report on trafficking in persons (pdf), with the number rising to about two-thirds in regions such as sub-Saharan Africa, and Central America and the Caribbean. While women and girls tend to be trafficked for marriage or sexual slavery, the report found that men and boys are typically exploited for forced labour in the mining sector and also as porters, soldiers and slaves. The number of men detected among trafficking victims globally rose from 13% in 2004 to 21% in 2014. The number of trafficking victims pressed into forced labour also rose, accounting for 38% of all trafficked people identified in 2014 (as opposed to 32% in 2007). Of that 38%, almost two-thirds were male. The flow of trafficking victims from sub-Saharan Africa and east Asia was more globally dispersed than elsewhere, for instance in eastern Europe and Central Asia, South America and south Asia. However, most trafficking flows are largely a regional and local phenomenon rather than a global one. When it comes to trafficking into key destinations such as richer European countries, flows from the continent’s south-eastern regions were the most prominent for a number of years and continued to increase. Fedotov said there had been a “huge improvement” in the number of countries criminalising human trafficking, which has increased from 18% to 88% since 2003. But conviction rates remain far too low, he said, with victims not always receiving the protection and services countries are obliged to provide. Fedotov added that people escaping from war and persecution are particularly vulnerable to trafficking: “The rapid increase in the number of Syrian victims of trafficking in persons following the start of the conflict there, for instance, seems to be one example of how these vulnerabilities play out.”
2023-08-29T01:26:18.401715
https://example.com/article/5778
Morteza Kermani Moghaddam Morteza Kermani-Moghaddam (), a.k.a. Mojtaba Kermani-Magham (), is an Iranian former footballer. He is currently the assistant coach of Paykan. His nickname is the 'Iranian bebeto'. Honours Club Persepolis Asian Cup Winners' Cup (1): 1990–91 Iranian Football League (1): 1995-96 Hazfi Cup (2): 1987-88, 1991–92 Tehran Provincial League (3): 1987-88, 1988–89, 1990–91 Al-Ittihad (Al-Gharafa) Qatari League (1): 1991-92 Qatar Emir Cup (1): 1994-95 National Iran Asian Games Gold Medal (1): 1990 Individual Best Foreign Player Qatari League References http://www.fifa.com/worldfootball/statisticsandrecords/players/player=54557/index.html https://web.archive.org/web/20081211034239/http://persepolis.blogfa.com/8504.aspx Category:Living people Category:Iranian footballers Category:Iran international footballers Category:Persepolis F.C. players Category:Association football midfielders Category:Al-Gharafa SC players Category:Keshavarz players Category:Asian Games gold medalists for Iran Category:1992 AFC Asian Cup players Category:1965 births Category:Asian Games medalists in football Category:Footballers at the 1990 Asian Games Category:Qatar Stars League players Category:Medalists at the 1990 Asian Games
2024-02-05T01:26:18.401715
https://example.com/article/7370
--- abstract: 'In this note we construct infinitely many distinct simply connected Stein fillings of a certain infinite family of contact 3–manifolds.' author: - Anar Akhmedov - 'John B. Etnyre' - 'Thomas E. Mark' - Ivan Smith title: | A note on Stein fillings\ of contact manifolds --- Introduction ============ Given a contact 3–manifold $(M,\xi)$ it is useful to understand the types of fillings it has. In particular, Stein and strong fillings of $(M,\xi)$ can be used in symplectic cut-and-paste procedures. Recall $X$ is a of $(M,\xi)$ if $X$ is the sub-level set of a plurisubharmonic function on a Stein surface and the contact structure induced on $\partial X$ by complex tangencies is contactomorphic to $(M,\xi).$ Many early results concerning Stein fillings pointed to a finiteness result. For example, Eliashberg [@Eliashberg90b] showed the tight contact structure on $S^3$ has a unique Stein filling. McDuff [@McDuff90] and Lisca [@Lisca04] have shown that all tight contact structures on Lens spaces have a finite number of Stein fillings. Several other uniqueness results are known [@OhtaOno03; @OhtaOno05; @Schoenenberger05]. However, recently Ozbagci and Stipsicz [@OzbagciStipsicz04a] and independently Smith [@Smith01] have shown that certain contact structures have infinitely many Stein fillings. The fillings in these examples had non-trivial fundamental group (they were distinguished by torsion in the first homology group). As various constructions in 4–manifold topology are simpler when the fundamental group is not controlled it was natural to ask if there is a similar non-finiteness result for simply connected Stein fillings. Our main result shows there is. There is a sequence of distinct contact manifolds $(M_i, \xi_i),$ each of which has an infinite number of homeomorphic but non-diffeomorphic, simply connected Stein fillings. These examples are a simple consequence of Fintushel and Stern’s work [@FintushelStern04] but fill a gap in the literature concerning Stein fillings of contact structures. We point out that in combination with Ozbagci and Stipsicz’s work [@OzbagciStipsicz04a] these manifolds $(M_i,\xi_i)$ have infinitely many homeomorphism types of Stein fillings and some homeomorphism types of fillings have infinitely many diffeomorphism types of Stein fillings. One issue that is tantalizingly left open is whether or not there is a contact 3–manifold whose Stein fillings realize infinitely many values for their Euler characteristics $\chi,$ or realize infinitely many pairs of values for $(\chi,\sigma),$ where $\sigma$ is the signature. Given any natural number $n$ one may easily check that the construction below will provide a contact manifold $(M,\xi)$ realizing $n$ distinct $(\chi,\sigma)$ pairs for its Stein fillings. Acknowledgments: The authors thank Selman Akbulut, Ciprian Manolescu, Peter Ozsváth and Ron Stern for useful discussions in the preparation of this note. AA was partially supported by NSF grant DMS-0244663. JE was partially supported by NSF grants DMS-0707509 and 0244663. Knot Sugery and Lefschetz Fibrations on $E(n)_K$ ================================================ Lefschetz fibrations on $E(n)$ ------------------------------ Recall that the elliptic surface $E(n)$ can be discribed as the desingularization of a double branched cover. Specifically, consider the double branched cover of $\PO\times\PO$ whose branch set $B_{2,n}$ is the union of four disjoint copies of $\PO\x \{{\rm{pt}}\}$ and $2n$ disjoint copies of $\{{\rm{pt}}\}\x \PO$. This branch cover has $8n$ singular points corresponding to the intersections of horizontal and vertical lines in the branch set $B_{2,n}$. Each singular point is easily seen to be a cone on ${{\mathcal R}}P^3.$ After desingularizing the above space, that is removing a neighborhood of the singular points and replacing them with unit cotangent bundles over $S^2$ (which is of course a $D^2$ bundle over $S^2$ with normal Euler number $-2$), one obtains $E(n)$. The horizontal and vertical fibrations of $\PO\times\PO$ pull back to give fibrations of $E(n)$ over $\PO$. A generic fiber of the vertical fibration is the double cover of $S^2$, branched over $4$ points. Thus a generic fiber will be a torus and the fibration is an elliptic fibration on $E(n)$. The generic fiber of the horizontal fibration is the double cover of $S^2$, branched over $2n$ points, which is a genus $n-1$ fibration on $E(n)$. This fibration has $4$ singular fibers which correspond to preimages of the four copies of $S^{2}\times {pt}$’s in the branch set together with the spheres of self-intersection $-2$ coming from the desingularization. While this fibration is not a Lefschetz fibration it was shown in [@FintushelStern04] that it can be slightly deformed near the singular fibers to become a Lefschetz fibration. Notice that the generic fiber of the horizontal fibration $\Sig_{n-1}$ intersects a generic fiber $F$ of the elliptic fibration in two points. Lefschetz Fibrations on $E(n)_K$ -------------------------------- Let $K$ be a fibered knot of genus $g$, and $F$ be a generic torus fiber $F$ of $E(n)$. Then the knot surgered elliptic surface is a manifold $$E(n)_K = (E(n)\- (F\x D^2)) \cup (S^1\x (S^3\- N(K)),$$ where each normal $2$-disk to $F$ is replaced by a fiber of the fibration of $S^3\- N(K)$ over $S^1$. Since $F$ intersects each generic horizontal fiber twice, we get an induced Lefschetz fibration $$h: E(n)_K\to\PO$$ with fiber genus $2g+n-1$. [@FintushelStern04] If $K$ is a fibered knot whose fiber has genus $g$, then $E(n)_K$ admits a locally holomorphic fibration (over $\PO$) of genus $2g+n-1$ which has exactly four singular fibers. Furthermore, this fibration can be deformed locally to be Lefschetz. We also note the following fact about these Lefschetz fibrations. \[lem:construction\] Let $K$ be a fibered knot of genus $g$. Then for any $n,$ the Lefschetz fibration $E(n)_{K}$ admits a sphere section $S$ of self-intersection $-2$. Moreover, $E(n)_K\setminus S$ is simply connected and still has a sphere section. Let $S'$ be one of the vertical spheres $\{{\rm{pt}}\}\x \PO$ in $\PO\times\PO$ that is part of the branch locus in the description of $E(n)$ above. In the double branched cover $S'$ lifts to a sphere $S''$ and after desingularizing to obtain $E(n)$ we get a sphere $S$ that intersects each of four of the desingularizing $D^2$ bundles over $S^2$ in a fiber. It is easy to see that $S$ is a section of the genus $n-1$ Lefschetz fibration of $E(n)$ over $\PO$. Moreover, since $S$ intersects one of the desingularizing $S^2$’s in a point, its meridian is null-homotopic in the complement of $S.$ Thus, as $E(n)$ is simply connected, the fundamental group of the complement of $S,$ which is normally generated by its meridian, is trivial. When normal summing $S^1\times S^3$ to $E(n)$ to construct $E(n)_K,$ the sphere $S$ and the desingularizing $S^2$ are not affected. Thus $S$ is still a section with simply connected complement. Lastly, taking another vertical sphere in the branch locus provides a section that is disjoint from $S.$ Extensions of diffeomorphisms over plumbings ============================================ Let $X_{g,n}$ be the 4-manifold obtained by plumbing $\Sigma_g\times D^2$ to a $D^2$-bundle over $S^2$ with Euler number $-n.$ The main result of this section is the following extension result. \[lem:extend\] Any orientation preserving diffeomorphism of $\partial X_{g,n}$ extends over $X_{g,n}.$ The case when $n=0$ is clear since $X_{g,0}$ is the boundary sum of $2g$ copies of $S^1\times D^3,$ if $g>0.$ If $g=0$ then $\partial X_{0,n}=S^3$ and thus the lemma is also clear in this case. If $n\not=0$ and $g>0$ then $\partial X_{g,n}$ is a Seifert fibered space over $\Sigma_g$ with one singular fiber. Let $\phi$ be a diffeomorphism of $\partial X_{g,n}.$ Let $C=\{c_1,\ldots, c_g\}$ and $C'=\{c_1',\ldots, c_g'\}$ be collections of curves on $\Sigma_g$ such that the curves within each collection are disjoint and $c_i\cap c_j'$ is exactly one point if $i=j$ and empty otherwise. We moreover assume that no curve in $C$ or $C'$ goes through the singular point and $C$ and $C'$ are chosen so that $\Sigma_g\setminus (C\cup C')$ is a disk. Let $T$ and $T'$ be the preimages of $C$ and $C'$ in $\partial X_{g,n}.$ These are collections of incompressible tori. Thus $\phi(C)$ is also a collection of incompressible tori. It is well known in this situation that the collection $\phi(C)$ can be isotoped to be vertical (that is a union of fibers in the Seifert fibration), [@Hatcher3mdfNotes; @Jaco80]. Extending this isotopy we can assume $\phi(T)$ is a collection of vertical tori. Each component of $T'$ in $\partial X_{g,n}\setminus T$ are incompressible and boundary incompressible annuli. Their images will also be such annuli and thus can be isotoped to be horizontal or vertical. Since a horizontal annulus in $\partial X_{g,n}\setminus T$ would be part of a horizontal torus in $\partial X_{g,n},$ which does not exist, we can further isotop $\phi$ so that $\phi(T')$ and $\phi(T)$ are vertical tori. At this point it is clear that $\phi$ can be further isotoped to preserve the Seifert fibration on $T\cup T'$ and even on a neighborhood of $T\cup T'.$ As the tori in $T\cup T'$ consist of regular fibers we can assume they are contained in the $\Sigma_g\times D^2$ part of $X_{g,n}$ and each such fiber in this part bounds an obvious disk in $X_{g,n}.$ We can now extend $\phi$ over those disks whose boundaries are fibers in a neighborhood of $T\cup T'.$ It remains to extend $\phi$ over the $D^2$-bundle over $S^2.$ The boundary of this bundle is $L(n,1).$ In [@Bonahon83] it was shown that, up to isotopy, there is precisely one non-identity diffeomorphism of $L(n,1).$ Recall $L(n,1)$ is the double branched cover of $S^3$ with branch set the boundary of the unknotted annulus or Möbius band with $-n$ half twists. The nontrivial diffeomorphism of $L(n,1)$ is simply the covering automorphism of this two fold cover. Since the disk bundle bounded by $L(n,1)$ is the two fold branched cover of $B^4$ branched over the interior of the above mentioned annulus or Möbius band with its interior pushed into the interior of $B^4$ it is clear that this diffeomorphism extends over the disk bundle. Thus we may extend $\phi$ over the rest of $X_{n,g}.$ Stein fillings ============== In this section we construct our examples of contact structures with infinitely many distinct, simply connected Stein fillings all of which are homeomorphic. We begin by recalling a well-known relation between Lefschetz fibrations and Stein manifolds. \[lem:comp\] Let $f:X\to \PO$ be a Lefschetz fibration of a 4-manifold that admits a section $S$ of square $-n.$ If $F$ is a generic fiber of the fibration then $X-(F\cup S)$ admits the structure of a Stein manifold. Moreover, the Stein manifold fills the contact 3-manifold $(Y,\xi)$ where $\xi$ is supported by an open book decomposition with page $F\setminus \nu(S\cap F),$ where $\nu(S\cap F)$ is a neighborhood of $S\cap F$ in $F,$ and monodromy $n$-right handed Dehn twists about a curve parallel to the boundary. This well known lemma follows from the handlebody description of Lefschetz fibrations and the relation between open books and contact structures, see [@AkbulutOzbagci01; @Etnyre06; @OzbagciStipsicz04]. With the above preparation we are now ready to prove our main result. Let $\xi_{g,m}$ be the contact structure on the Seifert fibered space over a surface of genus $g>4$ with one singular fiber of multiplicity $2m$ supported by the open book with page a surface of genus $g$ with one boundary component and monodromy $2m$ positive Dehn twists about a curve parallel to the boundary. The contact structure is Stein fillable by infinitely many homeomorphic but non-diffeomorphic simply connected Stein manifolds. From Lemma \[lem:construction\] we know that for a genus $g$ fibered knot $K$ in $S^3,$ $E(n)_K$ has a genus $n-1+2g$ Lefschetz fibration with a section $S$ of square $-2$ and whose complement is simply connected. It is clear that $X_{n-1+2g,-2}$ embeds in $E(n)_K$ as a neighborhood of a fiber and $S.$ From Lemma \[lem:comp\] we know that $S_{n,K}=E(n)_K\setminus X_{n-1+2g,-2}$ is a Stein manifold filling the contact structure $\xi_{n-1+2g,1}$ described in the theorem. Moreover, $S_{n,K}$ is seen to be simply connected by the existence of a section of $E(n)_K$ disjoint from $S.$ If $K_i$ are a sequence of fibered genus $g$ knots in $S^3$ with distinct Alexander polynomials, which by [@Kanenobu81] always exist if $g>1,$ then the $E(n)_{K_i}$’s are all mutually non-diffeomorphic as they are distinguished by their Seiberg-Witten invariants, see [@FintushelStern98]. Thus by Lemma \[lem:extend\] we conclude that the $S_{n,K_i}$ are all mutually non-diffeomorphic Stein fillings of $\xi_{n-1+2g,1}.$ It follows easily from [@Boyer86] that these manifolds are all homeomorphic. The existence of infinitely many such examples of contact 3-manifolds, as asserted in the theorem, now follows by taking fiber sums of the $E(n)_{K_i}$’s. [10]{} Selman Akbulut and Burak Ozbagci. Lefschetz fibrations on compact [S]{}tein surfaces. , 5:319–334 (electronic), 2001. Francis Bonahon. Difféotopies des espaces lenticulaires. , 22(3):305–314, 1983. Steven Boyer. Simply-connected [$4$]{}-manifolds with a given boundary. , 298(1):331–357, 1986. Yakov Eliashberg. Filling by holomorphic discs and its applications. In [*Geometry of low-dimensional manifolds, 2 (Durham, 1989)*]{}, volume 151 of [*London Math. Soc. Lecture Note Ser.*]{}, pages 45–67. Cambridge Univ. Press, Cambridge, 1990. John B. Etnyre. Lectures on open book decompositions and contact structures. In [*Floer homology, gauge theory, and low-dimensional topology*]{}, volume 5 of [*Clay Math. Proc.*]{}, pages 103–141. Amer. Math. Soc., Providence, RI, 2006. Ronald Fintushel and Ronald J. Stern. Knots, links, and [$4$]{}-manifolds. , 134(2):363–400, 1998. Ronald Fintushel and Ronald J. Stern. Families of simply connected 4-manifolds with the same [S]{}eiberg-[W]{}itten invariants. , 43(6):1449–1467, 2004. Alan Hatcher. Notes on basic 3-manifold topology. http://www.math.cornell.edu/ hatcher/. William Jaco. , volume 43 of [*CBMS Regional Conference Series in Mathematics*]{}. American Mathematical Society, Providence, R.I., 1980. Taizo Kanenobu. Module d’[A]{}lexander des nœuds fibrés et polynôme de [H]{}osokawa des lacements fibrés. , 9(1):75–84, 1981. Paolo Lisca. On lens spaces and their symplectic fillings. , 11(1):13–22, 2004. Dusa McDuff. The structure of rational and ruled symplectic [$4$]{}-manifolds. , 3(3):679–712, 1990. Hiroshi Ohta and Kaoru Ono. Symplectic fillings of the link of simple elliptic singularities. , 565:183–205, 2003. Hiroshi Ohta and Kaoru Ono. Simple singularities and symplectic fillings. , 69(1):1–42, 2005. Burak Ozbagci and Andr[á]{}s I. Stipsicz. Contact 3-manifolds with infinitely many [S]{}tein fillings. , 132(5):1549–1558 (electronic), 2004. Burak Ozbagci and Andr[á]{}s I. Stipsicz. , volume 13 of [*Bolyai Society Mathematical Studies*]{}. Springer-Verlag, Berlin, 2004. Stephan Schönenberger. . PhD thesis, University of Pennsylvania, 2005. Ivan Smith. Torus fibrations on symplectic four-manifolds. , 25(1):69–95, 2001.
2024-07-17T01:26:18.401715
https://example.com/article/2404
Q: "Array Index Out of Bounds Exception 6" This code works, but there's one thing. It compiled without errors, but after I tried to run it, it showed me an exception: Exception in thread "main" java.lang.ArrayIndexOutOfBoundsException: 6 at JavaJoe.main(JavaJoe.java:3) This is the code: import java.text.DecimalFormat; import java.text.NumberFormat; public class JavaJoe { public static void main(String[] args) { double money = 200; double area = 0; double money1 = 0; double money2 = 0; double money3 = 0; String [] day = {"Monday", "Tuesday", "Wednesday", "Thursday", "Saturday", "Sunday"}; NumberFormat decimal = new DecimalFormat("$###.00"); NumberFormat decimal1 = new DecimalFormat("###.0"); for (int x = 0; x <= 6; x = x+1) { if(day[x].equals("Monday")) { double totalCost = 30 * 1.15; //cost including tax money = money - totalCost; System.out.println("It is " + day[x] + " and Joe has to spend " + decimal.format(totalCost) + " on a new pair of shoes. He has " + decimal.format(money) + " left."); } else if(day[x].equals("Tuesday")) { area = 12 * 7; System.out.println("It is " + day[x] + ". The ceiling Joe wants to paint is " + area + " metres squared."); } else if(day[x].equals("Wednesday")) { double price = 1.13 * area; //how much money he spent on paint per square litre money1 = money - price; System.out.println("It is " + day[x] + ". Joe spends " + decimal.format(price) + " on paint. He has " + decimal.format(money1) + " left."); } else if(day[x].equals("Thursday")) { double gasPrice = 36.40; double litresGas = gasPrice / 0.45; //calculation to find how many litres he bought money2 = money1 - gasPrice; System.out.println("It is " + day[x] + ". Joe spends " +decimal.format(gasPrice) + " on gas and buys " + decimal1.format(litresGas) + " litres. He has " + decimal.format(money2) + " left."); } else if(day[x].equals("Saturday")) { double charity = 23; //money he spent on charity money3 = money2 - charity; System.out.println("It is " + day[x] + ". Joe donates " + decimal.format(charity) + " to charity. He has " + decimal.format(money3) + " left." ); }else if(day[x].equals("Sunday")) { System.out.println("Today is " + day[x] + "."); } //if } //for } //main } //class Could you help me out and explain it? A: Your days array contains 6 elements, meaning they will be indexed from 0 to 5 (inclusive). Your for loop should look like: for (int x = 0; x < 6; x = x+1) or even better: for (int x = 0; x < day.length; x++) A: Array indexes always start with 0, so if there is a 7 element in the array, last element index will be 7-1 ie 6. So change your code: for (int x = 0; x <= 6; x = x+1) to for (int x = 0; x<day.length; x++)
2024-07-26T01:26:18.401715
https://example.com/article/7875
Working Father Guilt We’ve heard of working mum’s feeling guilty that they don’t get to spend as much time with their little ones that they’d like, and that’s a hardship that many mothers go through. But sometimes it’s easy to forget that many dad’s feel this way too. A child’s bond with their mother is a special one, and with a lot of fathers also having to divide their time between work and family, they may feel a little left out, guilty or stressed that they don’t have the same connection with their children. In April 2015, the Journal of Marriage and Family conducted a study that showed more than half of working dads say they find it hard to balance responsibilities, and feel as if they’re not spending enough time with their children. In fact, fathers are often harder on themselves as parents, than mothers are. The delicate balancing scale between their career and family may have to tip in favour of work once in a while, but it’s important to remember that your career is also benefitting your family. It’s essential firstly, to stop feeling guilty! Don’t spend your limited time at home feeling bad for yourself and your kids. Instead, think of how your time at work is beneficial for them as you are able to provide them with essentials and education, toys, activities and future endeavours. Just because you’re not spending every minute with your children, does not mean you are not providing or caring for them. On the other hand, it’s also important to recognise that you are a full-time parent, and that family needs are a priority. If possible, try and take some time off work – you shouldn’t be afraid to ask for paternity leave. Communicate with your boss and ask them the important questions regarding your time off, such as, how much time you can take off and whether it will be paid. After all, fathers should be just as much of a parent as mothers, albeit in different ways. Take turns dropping and picking up kids from school, day care and other activities. Split the housework so that you can spend more time with the kids and less time cleaning the inevitable mess that comes with them. Talking to other dads about how they juggle work and family life may also be beneficial to you. But keep in mind that as much as it’s natural to want to be a good parent, just because Steve across the street spends more time with his kids than you doesn’t mean he’s a better parent. Everyone has their own responsibilities and their own way of parenting. It’s the time-old saying, don’t compare yourselves to others. Go at your own pace, and focus on your family. Sharing stories, advice and general discussion is important, but not to the extent that this makes you feel even worse! It’s also okay if you feel like you’re too overwhelmed. Take some time off to refresh and recharge. Don’t feel like you have to overcompensate when you get home from work and spend every second with your child. It’s alright if you’re tired, but make sure to make time later, perhaps on the weekends. Make a calendar of all family commitments so you’re on top of that and aren’t stressed at the last minute. Also, prepare in advance for manic mornings by making lunches and packing bags the night before, make meals ahead of time and make the most of your time by multi-tasking. This way, you’re always prepared and ready, and can spend some actual quality time with your family. Last but certainly not the least, between all of this, don’t forget about your marriage. As exhausted as you are, your partner is probably going through the same thing. It’s important to push through together and help each other out when one of you is feeling stressed or overwhelmed. Take some time out. Ask friends or family to babysit, spend some quality alone time without the kids and most importantly, talk about things! If your partner is a stay-at-home parent, conversations need to be had about who does what. After all, they’re probably tired too looking after your little ones all day. If your partner is also working like you, share the responsibilities and try and spend as much time with your kids together. It’s important to realise that you are not a bad parent for focusing on your career, as long as you are there for your children when they need you and you are spending time with them when you can. Becoming a provider for your family can be worrisome for many dads. The sudden responsibility of relying on a single income... My ChildOctober 1, 2016 This is a place to find not only wholesome and simple parenting reads and information, but encouragement, humour and motivation for your journey as a caregiver. At My Child Mag, it is truly our greatest heart’s desire to help others find encouragement and fulfilment through the best digital magazine experience possible.
2024-03-11T01:26:18.401715
https://example.com/article/9622
of 1/6, to the nearest integer? 5 What is 554 to the power of 1/10, to the nearest integer? 2 What is 211 to the power of 1/3, to the nearest integer? 6 What is the square root of 79436 to the nearest integer? 282 What is 172178 to the power of 1/7, to the nearest integer? 6 What is the square root of 6953 to the nearest integer? 83 What is the third root of 437 to the nearest integer? 8 What is 169 to the power of 1/3, to the nearest integer? 6 What is 187800 to the power of 1/8, to the nearest integer? 5 What is the third root of 840 to the nearest integer? 9 What is 1040 to the power of 1/3, to the nearest integer? 10 What is the square root of 4285 to the nearest integer? 65 What is the sixth root of 7058 to the nearest integer? 4 What is the fifth root of 6143 to the nearest integer? 6 What is the square root of 32410 to the nearest integer? 180 What is the third root of 1912 to the nearest integer? 12 What is the cube root of 10391 to the nearest integer? 22 What is the cube root of 15 to the nearest integer? 2 What is the sixth root of 14020 to the nearest integer? 5 What is 10731 to the power of 1/2, to the nearest integer? 104 What is the seventh root of 1279 to the nearest integer? 3 What is 1116 to the power of 1/5, to the nearest integer? 4 What is the square root of 492 to the nearest integer? 22 What is 3884 to the power of 1/10, to the nearest integer? 2 What is the square root of 352 to the nearest integer? 19 What is 6826 to the power of 1/6, to the nearest integer? 4 What is the third root of 53329 to the nearest integer? 38 What is 3722 to the power of 1/7, to the nearest integer? 3 What is the third root of 96 to the nearest integer? 5 What is 13437 to the power of 1/2, to the nearest integer? 116 What is the square root of 5387 to the nearest integer? 73 What is the square root of 76 to the nearest integer? 9 What is the cube root of 1228 to the nearest integer? 11 What is 1874 to the power of 1/3, to the nearest integer? 12 What is the square root of 1202 to the nearest integer? 35 What is the third root of 4880 to the nearest integer? 17 What is 4943 to the power of 1/9, to the nearest integer? 3 What is the sixth root of 5817 to the nearest integer? 4 What is 28483 to the power of 1/7, to the nearest integer? 4 What is 1470 to the power of 1/2, to the nearest integer? 38 What is 9199 to the power of 1/2, to the nearest integer? 96 What is the cube root of 2713 to the nearest integer? 14 What is 14759 to the power of 1/2, to the nearest integer? 121 What is the third root of 1177 to the nearest integer? 11 What is 1808 to the power of 1/3, to the nearest integer? 12 What is the cube root of 27448 to the nearest integer? 30 What is the square root of 2255 to the nearest integer? 47 What is the cube root of 4354 to the nearest integer? 16 What is the square root of 77 to the nearest integer? 9 What is the third root of 1514 to the nearest integer? 11 What is the third root of 15011 to the nearest integer? 25 What is 3861 to the power of 1/9, to the nearest integer? 3 What is 1203 to the power of 1/6, to the nearest integer? 3 What is 47324 to the power of 1/4, to the nearest integer? 15 What is 207 to the power of 1/7, to the nearest integer? 2 What is 9428 to the power of 1/6, to the nearest integer? 5 What is the third root of 41471 to the nearest integer? 35 What is 1340 to the power of 1/2, to the nearest integer? 37 What is 25308 to the power of 1/4, to the nearest integer? 13 What is 1784 to the power of 1/2, to the nearest integer? 42 What is 172 to the power of 1/2, to the nearest integer? 13 What is the square root of 6042 to the nearest integer? 78 What is the square root of 1822 to the nearest integer? 43 What is 1801 to the power of 1/2, to the nearest integer? 42 What is the sixth root of 361 to the nearest integer? 3 What is 1283 to the power of 1/3, to the nearest integer? 11 What is 800 to the power of 1/4, to the nearest integer? 5 What is 1635 to the power of 1/3, to the nearest integer? 12 What is the tenth root of 256 to the nearest integer? 2 What is 7183 to the power of 1/3, to the nearest integer? 19 What is the square root of 166 to the nearest integer? 13 What is the fifth root of 10496 to the nearest integer? 6 What is 159 to the power of 1/2, to the nearest integer? 13 What is 1634 to the power of 1/2, to the nearest integer? 40 What is the eighth root of 373 to the nearest integer? 2 What is 84129 to the power of 1/2, to the nearest integer? 290 What is 3348 to the power of 1/9, to the nearest integer? 2 What is 3256 to the power of 1/2, to the nearest integer? 57 What is the square root of 3979 to the nearest integer? 63 What is the third root of 625 to the nearest integer? 9 What is 15343 to the power of 1/10, to the nearest integer? 3 What is the sixth root of 114558 to the nearest integer? 7 What is the fourth root of 62 to the nearest integer? 3 What is the sixth root of 34764 to the nearest integer? 6 What is the cube root of 2132 to the nearest integer? 13 What is the cube root of 3123 to the nearest integer? 15 What is the fourth root of 1735 to the nearest integer? 6 What is the third root of 57307 to the nearest integer? 39 What is the tenth root of 839 to the nearest integer? 2 What is the square root of 6479 to the nearest integer? 80 What is 2375 to the power of 1/9, to the nearest integer? 2 What is the third root of 1563 to the nearest integer? 12 What is the cube root of 474 to the nearest integer? 8 What is the square root of 3767 to the nearest integer? 61 What is 3202 to the power of 1/4, to the nearest integer? 8 What is 4386 to the power of 1/3, to the nearest integer? 16 What is the eighth root of 816 to the nearest integer? 2 What is 73483 to the power of 1/3, to the nearest integer? 42 What is the square root of 3845 to the nearest integer? 62 What is 513 to the power of 1/3, to the nearest integer? 8 What is the square root of 3644 to the nearest integer? 60 What is 21427 to the power of 1/9, to the nearest integer? 3 What is the square root of 1159 to the nearest integer? 34 What is the square root of 1857 to the nearest integer? 43 What is 1095 to the power of 1/8, to the nearest integer? 2 What is 6416 to the power of 1/3, to the nearest integer? 19 What is the square root of 1988 to the nearest integer? 45 What is 1361 to the power of 1/4, to the nearest integer? 6 What is the square root of 1487 to the nearest integer? 39 What is the square root of 21497 to the nearest integer? 147 What is the third root of 2133 to the nearest integer? 13 What is the third root of 596 to the nearest integer? 8 What is 1265 to the power of 1/10, to the nearest integer? 2 What is the cube root of 402 to the nearest integer? 7 What is 2470 to the power of 1/2, to the nearest integer? 50 What is 189 to the power of 1/2, to the nearest integer? 14 What is the square root of 1481 to the nearest integer? 38 What is the third root of 1753 to the nearest integer? 12 What is the fourth root of 8831 to the nearest integer? 10 What is 29041 to the power of 1/2, to the nearest integer? 170 What is the third root of 32351 to the nearest integer? 32 What is the square root of 155 to the nearest integer? 12 What is 1388 to the power of 1/3, to the nearest integer? 11 What is 4256 to the power of 1/8, to the nearest integer? 3 What is 819 to the power of 1/7, to the nearest integer? 3 What is 286 to the power of 1/3, to the nearest integer? 7 What is 33096 to the power of 1/7, to the nearest integer? 4 What is the fourth root of 88908 to the nearest integer? 17 What is 26263 to the power of 1/3, to the nearest integer? 30 What is the eighth root of 426 to the nearest integer? 2 What is the cube root of 4747 to the nearest integer? 17 What is 10525 to the power of 1/6, to the nearest integer? 5 What is 82084 to the power of 1/4, to the nearest integer? 17 What is the third root of 9962 to the nearest integer? 22 What is 33256 to the power of 1/5, to the nearest integer? 8 What is the third root of 1952 to the nearest integer? 12 What is 147683 to the power of 1/2, to the nearest integer? 384 What is the cube root of 11099 to the nearest integer? 22 What is the ninth root of 45130 to the nearest
2024-07-04T01:26:18.401715
https://example.com/article/6044
Switched reluctance electric motor systems are known which have certain undesirable characteristics, such a loud noise profiles or large peak supply current requirements. The present disclosure attempts to provide techniques for an improved electric motor system.
2024-05-22T01:26:18.401715
https://example.com/article/1158
Hendrik Claudius Hendrik Claudius aka Heinrich Claudius (c1655 Breslau - after 1697 Holland) was a German painter and apothecary or physician, noted for his 17th-century watercolours of South African plants and animals. Claudius arrived in the Cape Colony from Batavia in 1682 to paint plants of medicinal interest. He joined Ensign Olof Bergh's second expedition in 1683 to Namaqualand in a quest to locate the source of rich copper ore. It is thought that two years later he also joined Governor Simon van der Stel who had the same goal, and that he was responsible for the illustrations in an account of the expedition. He is also regarded as one of the artists contributing to Jacob Breyne's Exoticarum aliarumque minus cognitarum plantarum centuria prima. In all, the Africana Museum in Johannesburg acquired some 433 original watercolours ascribed to him. His work is also held by the South African Library in Cape Town, the British Museum, the library of Trinity College in Dublin and the University library of Marburg in Hesse. Many of the Claudius paintings were copied at the Cape in 1692 for Nicolaes Witsen, Mayor of Amsterdam, who included the copies in his Codex Witsenii. Most of what is known about Claudius stems from his 1685 meeting with the visiting French Jesuit missionary, Father Guy Tachard. After seeing two large volumes of his works, Tachard ventured that Claudius was a competent painter of plants and animals, and that if the books had been for sale he would have purchased them for Louis XIV of France. Some of his further and rather indiscreet revelations in Voyage de Siam led to Claudius' deportation to Mauritius and Batavia by Simon van der Stel - Tachard wrote "It is from him that we obtained all our knowledge of the country. He gave us a little map made by his own hand." This, during a period when the Dutch occupiers of the Cape were extremely suspicious of the French and their designs on the southern tip of Africa. References External links Codex Witsenii Category:Natural history illustrators
2024-03-24T01:26:18.401715
https://example.com/article/5775
Burkholderia glumae and B. gladioli Cause Bacterial Panicle Blight in Rice in the Southern United States. Bacterial panicle blight (BPB) is among the three most limiting rice diseases in Louisiana and the southern United States. The identity and characterization of pathogens associated with this disease was unclear. This research details studies carried out on the pathogens causing BPB on rice in Louisiana and other rice producing southern states. Bacterial strains were isolated from BPB-infected sheath, panicle, or grain samples collected from rice fields in Louisiana, Arkansas, Texas, and Mississippi. In greenhouse inoculation tests, 292 of 364 strains were pathogenic on rice seedlings or panicles. Identification of strains in the pathogen complex by growth on S-PG medium, carbon source utilization profile (Biolog), cellular fatty acid analysis, and polymerase chain reaction (PCR) methods revealed that 76 and 5% of the strains were Burkholderia glumae and B. gladioli, respectively. The other strains have not been conclusively identified. Although strains of both species produced similar symptoms on rice, B. glumae strains were generally more aggressive and caused more severe symptoms on rice than B. gladioli. Virulent strains of both species produced toxoflavin in culture. The two species had similar growth responses to temperature, and optima ranged from 38 to 40°C for B. glumae and 35 to 37°C for B. gladioli. PCR was the most sensitive and accurate method tested for identifying the bacterial pathogens to the species level. The 16S rDNA gene and 16S-23S rDNA internal transcribed spacer (ITS) region sequences of the B. glumae and B. gladioli strains from rice showed more than 99% sequence homology with published sequences. A real-time PCR system was developed to detect and quantify this pathogen from infected seed lots. Our results clearly indicate that B. glumae and B. gladioli were the major pathogens causing BPB in the southern United States.
2024-06-06T01:26:18.401715
https://example.com/article/8422
Leaping wolf snatches photo prize Jose Luis Rodriguez's haunting portrait of an Iberian wolf won over the judges A picture of a hunting wolf has won the prestigious Veolia Environment Wildlife Photographer of the Year 2009 award. Jose Luis Rodriguez captured the imaginations of the judges with a picture that he had planned for years, and even sketched out on a piece of paper. "I wanted to capture a photo in which you would see a wolf in an act of hunting - or predation - but without blood," he told BBC News. "I didn't want a cruel image." With a great deal of patience and careful observation of the wolves' movements, he succeeded in taking the award-winning photograph. Mr Rodriguez used a custom-built infrared trap to snap the wolf as it leapt into the air. The WPY competition, now in its 45th year, is owned by BBC Wildlife Magazine and London's Natural History Museum. The panel of judges looked through more than 43,000 entries to this year's competition. This is the fifth year that wildlife photographer Mark Carwardine has been on the judging panel. He said of the winning photo: "It's captured thousands of years of human-wolf interaction in just one moment." Mr Rodriguez won the Animal Portraits category and went on to win the top prize with this haunting image that the judges said captured the character of the wolf. When he started planning the photograph, he feared that he might not be able to get close enough to the Iberian wolves. This subspecies of the grey wolf lives close to human habitation in northern Spain. They are often persecuted by people who see them as a threat to livestock, and they are consequently very wary. Watching the animals as they returned to the same spot to collect food each night, Mr Rodriguez decided on his dream shot. He eventually captured it using a photographic trap that included a motion sensor and an infrared barrier to operate the camera. He hopes that his picture, "showing the wolf's great agility and strength", will become an image that can be used to show just how beautiful the Iberian wolf is and how the Spanish can be proud to have such an emblematic animal. Fergus Gill, who was 17 years old when he entered the competition, won this year's Young Photographer of the Year award for his picture of a brief but dramatic clash between two of the colourful UK songbirds. He started planning the image in summer, collecting oat sheaves from a local farmer specifically as winter food for the yellowhammers. One evening in February, hearing that snow was forecast for the next morning, Fergus set up his hide in the garden of his home in Scotland and hung out feeders for the birds. "At one point, I counted 32 yellowhammers feeding on the ground," he said. When the snow fell, the birds jumped up on to the feeders and the males would occasionally fight over the oats. "The spats were incredibly fast," he said. It took Fergus two days to capture the dramatic clash that earned him his award. With the help of his feisty cat, Igor Shpilenok won the Urban and Garden Wildlife category with this shot. He spent five months as a ranger in the Kronotsky Nature Reserve in Kamchatka in the east of Russia, and took his cat Ryska with him for company. "It's a very remote place and there were lots of animals - bears, foxes, wolverines - living near my cabin," he told BBC News. "The cat was really jealous about me. If I started to look at the animals, she would attack them. Just like a woman," he smiled. "Maybe she thought I was her pet." But the animals were curious about the area's new residents, and were drawn by cooking smells from the cabin. The foxes in particular would visit every day. "When they came within 20m, that was her boundary and chased them. It was really funny - foxes were climbing trees to get away from the cat." Mr Shpilenok's wife, Laura Williams, selected the category-winning image. "It's ironic," she said. "He photographs the wilderness, but the two times he's won a category [in this competition] it's been the urban wildlife one. Because the wilderness is his back yard." This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.
2024-06-12T01:26:18.401715
https://example.com/article/2864
Renew Drying Dust from 12.50 Clay Powder For your bedtime routine Renew Dry Dust is a talc-free, clay-based powder that draws out toxins and neutralizes odor to keep your skin and hair fresh and lightly scented with frankincense and palmarosa. This multipurpose dust is a handy addition to any night-time routine. Size: Quantity: Add To Cart Additional Info INSIDE THE BOTTLE Bentonite clay is made up of volcanic ash, which absorbs moisture and helps draws out toxins. INGREDIENTS SHELF LIFE 9 Months. This is a natural product and does not contain preservatives. To prevent product spoilage close lid after use. Do not expose to water unless using immediately - water will speed-up product spoilage. We recommend using products while they are fresh. Discard within 9 months of the purchase date. Do not store dust that has been mixed with water. WARNING This product should be used only by healthy adults. Contains microparticles. Do not sniff or inhale. If dust spills, let it settle before cleaning it up with a damp cloth. Consult with a physician before using essential oils if you have any health conditions or are taking medication. Even though our all-natural products smell delicious, they are meant for External Use Only. Always test new products on a patch of skin before general use. DISCLAIMER This is a cosmetic product intended for pampering the body naturally. This information has not been evaluated by the Food and Drug Administration. This information is not intended to diagnose, treat, cure or prevent sickness or disease. Sleepery Supply does not sell sleep aides. Our products are designed to help you create a scent-ual sleep time ritual for winding down before bed. It is strongly recommended that Sleepery Supply products are only used by healthy adults. Sleepery Supply products are not for children or the elderly. We also do not recommend Sleepery Supply products for people who are pregnant, breastfeeding, or have health concerns. Test all products on a small patch of skin before general use.
2023-12-09T01:26:18.401715
https://example.com/article/7176
Nigeria violence: More than 70 killed in Abuja bus blast Published duration 14 April 2014 media caption Will Ross takes a closer look at the bomb site More than 70 people have been killed in a bomb blast at a crowded bus station on the outskirts of Nigeria's capital, Abuja, officials say. The explosion happened as commuters were about to board buses and taxis to go to work in central Abuja, the BBC's Haruna Tangaza reports. Eyewitnesses said there were dead bodies scattered around the area. Suspicion immediately fell on the Boko Haram Islamist militant group, which has staged previous attacks in Abuja. However, most of its attacks have been in the north-east of the country. Officials earlier said two separate blasts had ripped through the terminal, but later said the damage may have been caused by just one bomb. Abbas Idris, head of the Abuja Emergency Relief Agency, told the BBC that so far they have confirmed 71 people dead and 124 injured. 'Red alert' Police spokesman Frank Mba gave the same figures, adding that 16 luxury coaches and 24 minibuses had been destroyed. Eyewitness Badamasi Nyanya said he had seen 40 bodies being evacuated; other eyewitnesses say they saw rescue workers and police gathering body parts. Investigators believe the explosives may have been inside a vehicle, according to Charles Otegbade of the Nigerian Emergency Management Agency (Nema). The blast ripped a hole 4ft deep (1.2m) in the ground of Nyanya Motor Park, some 16km (10 miles) from the city centre, and destroyed more than 30 vehicles, causing secondary explosions as their fuel tanks ignited and burned, the Associated Press news agency reports. Ambulances have been taking the dead and injured to nearby hospitals. In a statement, the police said they were on "red alert" and had increased surveillance at "all vulnerable targets within Abuja". image copyright Reuters image caption A woman reacts as she sees victims of the blasts being brought to hospital after the attack image copyright Reuters image caption Victims have been taken to nearby hospitals, including the Asokoro General Hospital seen here image copyright AP image caption The explosions were powerful, destroying a number of vehicles at Nyanya Motor Park 'Terrible' Eyewitness Mimi Daniels, who works in Abuja, said: "I was waiting to get on a bus when I heard a deafening explosion then smoke," she told Reuters. "People were running around in panic." Another eyewitness told the BBC: "I have never seen [anything] like that in my life. It was just terrible... We were just running helter-skelter. So somehow I think that they planted something inside one of the buses there. "So there are many dead shot down at the scene of the accident. And as you can see now some of these casualties... we are hoping, we are praying they will be ok. We saw some ambulances bringing corpses to other hospitals." No group has taken responsibility for the attack, but Nigerian President Goodluck Jonathan blamed Boko Haram. Visiting the scene, he vowed that the country would overcome the insurgency. This year, Boko Haram's fighters have killed more than 1,500 civilians in three states in north-east Nigeria, says the BBC's Will Ross in Lagos. Boko Haram has hit Abuja several times before, including an attack on the United Nations building in 2011. The Nigerian government had said the violence was now contained in a small area of the north-east. But the latest bomb in Abuja could be worrying evidence that the Islamist militants are determined to expand their area of operation, our correspondent adds. image copyright BBC/Google
2023-08-31T01:26:18.401715
https://example.com/article/5159
Q: Is there a way to set object keys from array value in one line say I have an array like this: const myArray = ['HP', 'QP', 'PS']; And I'd like to have an object whose keys are myArray's values like { HP: 0, QP: 0, PS: 0 } Is there a way to do the following in one line: const myObj = {}; myArray.forEach(item => myObj[item] = 0); A: Try using reduce: const myArray = ['HP', 'QP', 'PS']; const myObj = myArray.reduce((a, key) => Object.assign(a, { [key]: 0 }), {}); console.log(myObj); In newer environments, you can also use Object.fromEntries: const myArray = ['HP', 'QP', 'PS']; const myObj = Object.fromEntries(myArray.map(key => [key, 0])); console.log(myObj); A: You could spread (spread syntax ...) mapped objects into one object with Object.assign. var keys = ['HP', 'QP', 'PS'], object = Object.assign(...keys.map(key => ({ [key]: 0 }))); console.log(object);
2024-01-09T01:26:18.401715
https://example.com/article/8404
The Future of Food Waste In the meantime, one third of food ends gets wasted, creating environmental and economic issues that need to be resolved. We take a closer look at this pervasive issue and how some companies, including eatCultured, are looking to change that. Why Is Food Waste A Problem? Food waste is a challenge for three key reasons: 1. Globally, one third of all food produced is wasted, which would be enough to feed 3 billion people according to a study by the United Nations in 2011.This is especially problematic at a time when so many people in the world are suffering from starvation or malnutrition. Much of why this happens is down to retail agreements or even laws that penalize farmers for imperfect produce. This in turn incentivizes farms and distributors to discard food before it even reaches consumers. Similarly while the average piece of food travels 1,500 miles in the United States before it reaches your plate, the likelihood of it getting damaged en route increases too. This creates a huge source of waste that could be eliminated if consumers and retailers chose to buy local, fresh produce, not to mention benefits to the local economy too. To address these issues, a new breed of startups like Food Cowboy are aiming to divert food waste at this stage of the food chain to the needy and hungry. Similarly startups like Imperfect Produce divert food that's been rejected by producers and retailers and sell it to consumers at a steep discount. Retailers Retailers, from independent grocery stores to supermarket chains, have recently been in the spotlight for sales practices that generate huge volumes of food waste. The good news is some retailers are changing. In the United States, Wal-Mart, Mom's Organic Market, Wegman's and West Coast chain Raley's, among others, launched programs to sell so-called "ugly" produce at a discount. At the same time, campaigns across a number of big chains in France and the UK have led not only to a reduction in food waste but a boost in retail sales. However there's still a long way to go for this kind of behavior to be pervasive across the retail industry. Similarly, the success of these types of project is ultimately down to our attitudes as consumers as much as a willingness by retailers to change. Commercial Food Waste Commercial kitchens are one of the leading sources of food waste. In New York City, for example, these kitchens accounted fora half million tons of food waste in 2013. Much of this waste stems from either cooking too much, or customers only eating half of what they order. With many kitchens legally unable to donate their food, even to those who would otherwise go hungry, change in this area needs to be underpinned by policy changes. Similarly offering better recycling options (like composting) in cities can support the local foodshed by diverting food waste and recycling it back into nutrients for more crops! Combined with the rise of urban farms, much commercial food waste could become a valuable local business in itself. Consumers Consumers, whose carbon footprint is eight times as big as farms when it comes to food waste, have a large role to play in solving the issue. That means stopping food waste starts with you. In the United States and Canada, 25% to 40% of all food is thrown away by consumers. On a monthly basis, this equates to throwing away $28-43 (based on wasting 25% of that month's food expenditure). A leading cause of food waste is consumers' propensity to throw away unused food or based on confusion over freshness dates designed to be more advisory than expiry. Another source of waste is simply ordering too much food that doesn't get eaten. This is an especially big problem in big cities, where agrowing number of food delivery services compounded by increasingly compact home kitchen spaces make it easier to order meals online than cook them. A batch of enterprising startups are also exploring ways to get this food into needy people's hands instead, however legal challenges to these kinds of systems make changing the status quo an economic uphill struggle, leading to high failure rates for businesses in this field. Solving Food Waste The problem of food waste is being addressed in a number of different ways but many of the solutions are designed to attach an economic value to it. Eating and Drinking Food Waste Much of the food that gets thrown away is still edible and contains valuable nutrition. In order to capture this nutrition before it goes to landfill, a collection of startups are growing innovative waste management solutions: At the other end of the scale, UK brewing company Toast has quickly risen to prominence for using moldy bread to brew craft lager. Stale bread and the discarded ends of loaves, which account for a million tons of waste each year in the UK alone, provides the starter and cultures from which a series of tasty ales are brewed. Toast is one of a number of craft brewing outfits, including Brooklyn Brewery, turning bread waste into the perfect partner for a bevy of bountiful brews. Washington D.C. based Misfit Juicery is turning food waste salvaged from farmers, producers and retailers for not being cosmetically perfect back into tasty fresh juices. San Francisco based Ugly Juice are using these same principles to produce a range of cold-pressed juices on the West Coast. Together, the future of food waste (and juices) tastes better than today. These companies are one of a growing number of startups working with food waste. At the same time, many restaurants and leading chefs such as Dan Barber, through his wastED program in New York and London, are spearheading the use of recovered foods. By curating menus using only food scraps and waste, the goal is to raise awareness in the press and with consumers for the potential to reduce waste while cooking delicious food. Similarly the nose-to-tail movement in meat-centric dining circles, where every part of the animal is used rather than only select prime cuts of meat then wasting the rest, plays a role in reducing food waste too. Advocacy Non-profit anti-food waste advocacy group ReFED is a collaboration between private enterprise and local non-profit groups in the United States driving awareness for food waste. The group's Roadmap to Reduce US Food Waste provides solutions applicable at a national and local level. Similarly international science collaborations such as Project Drawdown, which aims to reduce climate change through 80 targeted solutions, are helping to raise awareness for the role food waste plays in shaping a more sustainable future. Buying Local As we've already identified above, consumers have a large role to play in reducing food waste. One easy way to do this is to buy produce that's local, reducing the distance food has to travel to reach your plate and waste that occurs along the way. In countries with a longer tradition of outdoor food markets, supporting small producers is now both an environmental and cultural act. In the United States, organizations such as the National Farmers Market Association represent a network of markets managed by local non-profit groups. At a local level, groups such as the NYC Greenmarket Farmers Markets manage a network of over 50 local markets bringing fresh produce from the local foodshed to the city's 8 million residents. Fueling Local (Transportation) In London, United Kingdom, coffee grounds are now being used to power the city's iconic red buses. By fermenting the grounds and mixing them with diesel to create a new biofuel, the city of 8 million is looking to reduce reliance on cars through public transportation but also tackle food waste and climate change with a new fuel solution. In other cities around the world, city-led compositing programs encourage local residents to recycle their food scraps into organic compost that can help grow more crops. While other solutions dedicated to tackling the issue of food waste may exist, there's still room for plenty more! The future of food waste relies on concerted work at each step in the food chain and beyond to change not only industry practices but consumer behavior too. We look forward to being part of that solution.
2024-07-11T01:26:18.401715
https://example.com/article/2106
Q: How to apply sequence order in trigger? In Informix, I need to update 2 (two) tables when the trigger is executed. Let's say Table_A and Table_B. In Table_A, there is a int8 (long data type) column as primary key. When a new record is inserted, this primary key column will retrieve the value from a sequence. This is the code: sequence_A.nextVal In Table_B, there is a foreign key column that references the primary key in Table_A. In order to make the primary key and the foreign key tally, I use sequence_A.currVal to insert the value into this foreign key column. I did try the code below but Informix give me syntax error. create trigger The_Trigger insert on The_Table referencing new as n for each row ( insert into Table_A(...) value(sequence_A.nextVal, ...) insert into Table_B(...) value(sequence_A.currVal, ...) ) If I separate the insert statement into 2 (two) difference triggers, it works. Thus I was thinking to create 2 (two) triggers on The_Table. Let's say Trigger_A and Trigger_B, may I know how can I ensure that Trigger_A will get execute first then only Thrigger_B. Can I specify the order execution on triggers? Can this be done? And how? A: In your first attempt, you omitted the comma between the two INSERT statements, and the keyword is VALUES, not VALUE: CREATE TRIGGER The_Trigger INSERT ON The_Table REFERENCING NEW AS n FOR EACH ROW ( INSERT INTO Table_A(...) VALUES(sequence_A.nextVal, ...), INSERT INTO Table_B(...) VALUES(sequence_A.currVal, ...) ) With those two changes, I believe you would have sequential execution. Given a sufficiently recent version of Informix, you can have multiple triggers for a single event on a single table. The sequence of execution is the sequence in which the triggers are defined.
2024-05-21T01:26:18.401715
https://example.com/article/9906
Washington (AFP) – The Guantanamo trial of the chief suspect in the deadly 2000 bombing of the USS Cole in Yemen was shut down Friday as defense lawyers refused to return to the case, Pentagon officials said. Military commissions judge Air Force Colonel Vance Spath halted the case, which could lead to the death penalty for Abdel Rahim al-Nashiri, in frustration that he could not compel Nashiri’s main lawyers to show up in court. According to a transcript of Friday’s hearing, Spath complained that he was unable to enforce his orders on Nashiri’s civilian defense attorneys to even join the proceedings by video. “It’s demonstrated lawlessness on their side; they don’t follow orders,” he said. But he also complained of lack of support overall for the military commissions, which have made little progress in the cases for Guantanamo’s remaining prisoners. Suggesting that the military commissions setup was not functioning generally, Spath said he could not go on without the direction of a superior court. “We need action. We need somebody to look at this process. We need somebody to give us direction,” Spath said. The problems in the Nashiri trial “tells you how infected the process is and how far it goes within the Department of Defense that owns the process,” he said. The case, the military trial of one of the most high-profile prisoners at Guantanamo, plunged into chaos last year when three of Nashiri’s lawyers quit. They alleged that their supposed privileged conversations with and about their client had been monitored electronically by the government, and that they could not proceed with his defense in that case. When Brigadier General John Baker, who oversees legal defense teams at Guantanamo, refused to order them back to work, he was charged with contempt of court and sentenced to three weeks’ confinement in his Guantanamo trailer. That left Nashiri’s defense to Navy Lieutenant Alaric Piette, who only has six years’ experience as a lawyer and none in a death penalty case. Piette has not actively defended Nashiri, admitting he lacks the qualification to do so. Nashiri is accused of being the mastermind behind the October 12, 2000 bombing of the Cole, a guided missile destroyer that was moored in Aden, Yemen, when it was attacked. The bombing, claimed by Al-Qaeda, left 17 dead and 39 injured. Disclaimer: This story has not been edited by Siliconeer and is published from a syndicated feed. Siliconeer does not assume any liability for the above story. Validity of the above story is for 7 Days from original date of publishing. Content copyright AFP.
2024-03-14T01:26:18.401715
https://example.com/article/7146
CNN’s Legal Analyst Jeffrey Toobin spent hours on air Wednesday fear mongering that another Donald Trump appointed justice to the Supreme Court would spell the end of abortion rights in America. Toobin said on multiple segments that it might be just a matter of months before the landmark Roe v. Wade was overturned if Trump were to appoint a pro-life Justice to replace a retiring Justice Kennedy. On CNN, Jeffrey Toobin says “in 18 months, abortion will be illegal in 20 states in the country.” — Josh Kraushaar (@HotlineJosh) June 27, 2018 (RELATED: CNN’s Toobin Circles The Four Horsemen, Says 20 States Will Ban Abortion In 18 Months) Journalist Mark Hemingway saw some hypocrisy in Toobin’s fretting, given his past. In 2010 a married Toobin was taken to court by the daughter of a colleague with whom he was having an affair. The affair had resulted in a child out of wedlock, in spite of Toobin asking the mother to have an abortion and offering to pay for it. Toobin also refused to sign the child’s birth certificate and is not allowed to see the child. Hemingway made quick work of Toobin in a tweet heard around the internet. The journalist said: “To recap: A journalist who cheated on his wife, knocked-up a colleague’s daughter, wanted her to get an abortion, and had to be dragged into court to pay child support is on CNN right now opining about the consequences of overturning Roe v. Wade. Maybe sit this one out?” To recap: A journalist who cheated on his wife, knocked-up a colleague’s daughter, wanted her to get an abortion, and had to be dragged into court to pay child support is on CNN right now opining about the consequences of overturning Roe v. Wade. Maybe sit this one out? https://t.co/lGUXE0E9fL — Mark Hemingway (@Heminator) June 27, 2018 Ouch. Trump will now get to pick his second Supreme Court Justice and has told the White House press pool that he is going to be choosing from the list he provided to the American people upon assuming office.
2023-08-14T01:26:18.401715
https://example.com/article/7410
Design and validation of an ELISA for equine infectious anemia (EIA) diagnosis using synthetic peptides. Three peptides derived from the equine infectious anemia virus (EIAV) surface proteins were synthesized to design and validate an ELISA for EIA diagnosis. Peptides identified as gp90-I and gp90-II correspond to the N- and C-terminal part of the surface glycoprotein gp90. Peptide gp45-1 overlaps the immunodominant epitope CIERTHVFC of the transmembrane glycoprotein gp45, and includes a hydrophilic chain close to the N-terminal end of this nonapeptide loop. Serum samples from 140 naturally infected horses with EIAV and a panel of 167 non-immune equine sera obtained from non-infected animals were used. Differences in reactivity between positive and negative serum samples were clearly distinguished. Samples considered weak positive to the agar gel immunodiffusion (AGID) test were "true" positive in the ELISA. These results are consistent with the improved sensitivity of the ELISA in comparison with the AGID test. The cyclic peptide that mimics the immunodominant sequence of gp45 showed excellent reactivity, thus suggesting that its functional activity depends significantly on its conformation, since very low reactivity was observed in the linear form of the peptide. The detectability indices of positive and negative sera reached 98% when gp90-II and gp45-I synthetic peptides were used in the same assay, illustrating the high specificity and sensitivity of the assay. Our study represents a first approach for the design of a diagnostic kit, which would allow the rapid analysis of a large numbers of serum samples from horses, and could be applied in endemic areas with different prevalence of infection.
2024-07-16T01:26:18.401715
https://example.com/article/5151
Q: Properly Sizing Custom-Drawn Controls I'm attempting to make a custom control that properly draws itself to fill its current size. I was under the assumption that I should use the ClientRectangle property for sizing, but the right and bottom of the client rectangle seem to be getting clipped. Filling the draw event handler with Rectangle smaller = new Rectangle(5, 5, ClientRectangle.Width - 10, ClientRectangle.Height - 10); e.Graphics.DrawRectangle(System.Drawing.Pens.Black, smaller); e.Graphics.DrawRectangle(System.Drawing.Pens.Red, ClientRectangle); yields this: What should I be using to get the drawable area of the control? A: You can either use: ControlPaint.DrawBorder(g, this.ClientRectangle, _ Color.Red, ButtonBorderStyle.Solid); where Graphics g = e.Graphics;. Or draw it as you did but subtracting 1 from width and height (1 because width and height are inclusive but draw rectangle needs the size exclusive the last pixel - internally it calculates x + w/y + h which then ends up at the position for the next pixel after the last, hence we need to subtract one to get the position for the last pixel). rectangle r = this.ClientRectangle; r.Width -= 1; r.Height -= 1; g.DrawRectangle(System.Drawing.Pens.Red, r); And of course this from within the OnPaint event handler.
2024-07-19T01:26:18.401715
https://example.com/article/5010
One57 One57, formerly known as Carnegie 57, is a 75-story, supertall skyscraper at 157 West 57th Street between Sixth and Seventh Avenues in the Midtown neighborhood of Manhattan, New York City. The building has 92 condominium units on top of a new Park Hyatt Hotel with 210 rooms, the flagship Hyatt property. The tower, developed by Extell Development Company and designed by Christian de Portzamparc, was the first ultra-luxury condominium tower along the stretch of 57th Street that was subsequently named Billionaires' Row. Upon completion in 2014, it was the tallest residential building in the city for a few months until the completion of 432 Park Avenue. Planning and construction Extell Development Company’s founder and President, Gary Barnett, spent 15 years assembling the property and air rights on 57th Street. At first, he said he wanted to build a building, but plans for views of Central Park took shape as the assemblage got larger and markets started rising to new levels. Foundation work started in January 2010. Extell received a $700 million construction loan for the project in October 2011 from a Bank of America-led syndicate that included Banco Santander, Abu Dhabi International Bank and Capital One. Sales at the project officially launched in December. After the sales offices had been open for six months, Extell announced One57 was 50% sold with $1 billion in transactions by May 2012. On June 20, 2012, it was announced that framework for the top floor had been completed. Shortly after, it was revealed the “Winter Garden” duplex penthouse, located on the 75th and 76th floors, had gone into contract for an undisclosed amount. In October 2012, entrepreneur Michael Hirtenstein and One57 developer Gary Barnett had a public clash regarding a unit Hirtenstein agreed to purchase in the building. Hirtenstein claimed he would not spend $16 million for a unit without seeing it, and that the view from the unit he purchased was obstructed. Barnett has been strict about not permitting buyers to view apartments prior to purchase, and as Hirtenstein paid a construction worker to show him his unit, Barnett refunded Hirtenstein's funds and canceled the contract. Crane collapse On October 29, 2012, during Hurricane Sandy, the construction crane on the building partially collapsed, causing thousands of residents and hotel guests in the neighborhood to be evacuated for six days. By November 5, the crane was secured and through traffic in the surrounding area was allowed. In response to the crane collapse, a class action lawsuit was filed by dentists in the surrounding area, complaining that the incident caused them to evacuate their offices, with subsequent loss of income. The New York City Department of Buildings also stated they had received multiple complaints about the work site. However, the crane was inspected a week earlier and considered in good shape. City officials called the failure of the boom a freakish occurrence. In May 2013, Extell announced plans to hoist a new crane on May 10–11. The plans endorsed by the New York City Buildings Department involved a mandatory evacuation of the neighboring Alwyn Court as well as the Briarcliff Apartment Building during the process. The residents of the building would each receive up to $1,500. The coop board at Alwyn Court announced that it would seek a court order against the forced evacuation, saying the Department of Buildings appeared to be "an arm of the developer". The crane was hoisted on May 11 as planned after Extell and Alwyn signed an undisclosed agreement. Its tasks completed, the replacement crane was removed on November 11, 2013. Fire On the evening of March 15, 2014, a fire broke out in the loading dock of One57, spreading into the courtyard behind the building and then onto the adjacent property at 152 West 58th Street, which was consequently evacuated. Neither Extell nor Lend Lease has ever offered any explanation of the fire, and the New York City Department of Buildings did not issue a partial Stop Work order following the fire. The cause of the fire remains a mystery. Architecture and design The tower was designed by Pritzker Prize-winning French architect Christian de Portzamparc. The interiors are by New York-based designer Thomas Juul-Hansen. The use of dark and light glass on the building’s exterior creates vertical stripes, while also manipulating sunlight and maximizing views. The tower is characterized by its rippled canopies and numerous setbacks on 57th Street, its mottled fenestration, curved tops, scoops and accentuated verticality. Notable residents In May 2012, it was announced a buyer had agreed to pay a record price in New York of more than $90 million for the duplex penthouse on the 89th and 90th floors. Just two months later, the Prime Minister of Qatar, Sheikh Hamad bin Jassim bin Jaber Al Thani, broke that record by agreeing to purchase a penthouse unit for $100 million. In February 2018, it was reported that Michael Dell had paid $100.5 million for the penthouse in 2014, setting the record for the most expensive home ever sold in the city. The sale had been reported previously, but the buyer's identity had initially been kept secret. The record was broken in January 2019 when Ken Griffin paid $238 million for a unit at 220 Central Park South. The building also set the record for the second-most expensive sale in New York City with a 75th floor duplex purchased by hedge fund manager Bill Ackman for $91.5 million. Other units have reportedly been purchased by billionaires Lawrence Stroll, Silas Chou, and Liu Yiqian. Reception One57 was named "Worst Building of the Year" in 2014 by Curbed.com, whose review said, "Pretty much everyone (or at least most archicritics) agrees that its wavy blue facade is ugly. Justin Davidson of New York magazine called it "clumsily gaudy". James Russell, formerly of Bloomberg ... lamented the "endless acres of cheap-looking frameless glass in cartoonish stripes and blotches of silver and pewter". Michael Kimmelman of the Times had similarly harsh words: "[The building] unravels as a cascade of clunky curves ... chintzily embellished, clad in acres of eye-shadow-blue glass offset by a pox of tinted panes, like age spots." Gallery See also List of tallest buildings in New York City List of tallest buildings in the United States Billionaires' Row (Manhattan), a nickname given to the surrounding area References External links One57 listing on skyscrapercenter.com Category:Residential condominiums in New York City Category:Residential skyscrapers in Manhattan Category:Midtown Manhattan Category:Hotel buildings completed in 2014 Category:Residential buildings completed in 2014 Category:Construction accidents in the United States Category:2012 disasters in the United States Category:2012 industrial disasters Category:2014 disasters in the United States Category:2014 fires Category:2014 industrial disasters Category:2014 establishments in New York City Category:Skyscrapers on 57th Street (Manhattan) Category:Skyscraper hotels in Manhattan Category:October 2012 events in the United States Category:March 2014 events in the United States
2023-10-07T01:26:18.401715
https://example.com/article/9943
CuriosityStream to Go Public via $330M Merger - prostoalex https://www.bloomberg.com/news/articles/2020-08-11/curiositystream-to-go-public-via-330-million-merger-deal ====== CaliforniaKarl [https://www.businesswire.com/news/home/20200811005489/en/Cur...](https://www.businesswire.com/news/home/20200811005489/en/CuriosityStream- Streaming-Media-Company-Devoted-Factual-Entertainment)
2023-08-26T01:26:18.401715
https://example.com/article/3357
Extracellular fluids and glial cells are a significant proportion of the mammalian brain volume, and together constitute the local environment of the neurons. This environment is not static, but may undergo large alterations of size and chemical content during various stages of neuronal activity and pathology. Such changes may in turn have effects on neural activity. The anatomy and chemistry of the neuronal environment appear to change dramatically during postnatal development of the neocortex, but there is very little quantitative information regarding the extent of these changes, or the consequences for neuronal function during maturation. The proposed investigation will utilize in vitro brain slice techniques, ion-sensitive microelectrodes and intra- and extracellular recording to assess the phsiological state of the neuronal environment during the development of rat neocortex. Specifically, we will measure the volume fraction and tortuosity of the extracellular fluid and the diffusion of ions through these fluids. Since astrocytes proliferate and mature primarly during the postnatal period, we will test several predictions based on their physiological properties in the mature brain: extracellular slow potentials induced by increases in extracellular [K+] should increase with age; the diffusion of K+ relative to large impermeant cations, should increase with age; and activity- and K+ related decreases in the size of the extracellular space should become more prominent with age. Variations in extracellular K+ and Ca2+ activities will be measured under different modes of stimulation. Finally, the sensitivity of neuronal excitability to alterations in extracellular [K+] will be assessed in developing and mature neocortex. These studies will provide unique insight into the relationships between neuronal activity and the brain microenvironment, and should provide functional correlates of the anatomical and biochemical evidence already available for developing neocortex. The results will help to explain the cause and consequences of large ionic fluctuations seen during epileptic seizures, and the developmental study of glial function may have relevance to the mechanisms of cerebral edema.
2024-03-03T01:26:18.401715
https://example.com/article/6484
2009-07-12 Mixed Bag on the Left I saw an article on the left-wing BBC about Obama's hopes for Africa. I wasn't going to read it because I was pretty sure it was more of the same nonsense that ultimately ensures that the Africans remain backward, innocent whites remain hated, and so conflict and poverty is perpetuated by the very same people who pretend to want to end these things. But I decided to read it anyway. Sure enough, Obama and the BBC managed to go back to the 17th friggin century to say something nasty about whites. Not mentioned was the more recent (only one friggin century old) ending of the slave trade by the Royal Navy. Nor the shitload of whites who died ending slavery in North America. Nor the huge amounts of direct and indirect foreign aid to Africa being completely squandered by Africans. On the other hand, he did come out with a very clear statement: "Development depends upon good governance," Mr Obama told legislators. "That is the ingredient which has been missing in far too many places, for far too long. "And that is a responsibility that can only be met by Africans." Not sure I can ask for much more than that. Well, I can ask for an ending of the racism against whites - the same racism that causes hundreds of thousands of Tutsis to be massacred by their neighbours - but let's not try Mission Impossible. And there's much more to be lauded in there as well. And quite frankly if the likes of Geldoff could get behind Obama's message, it would go a long way towards ending singer scams too. "We should stop blaming colonialism for our under-development. We really need to address issues of governance, because I believe it is the mediocrity with which Africa has been governed that is responsible for our backwardness today." To quote someone else - Holy personal responsibility, Batman! But then we have this sick quote: "Ghana's achievements were less dramatic than the liberation struggles of the 20th Century but would ultimately be more significant." I was wondering how Ghana's economic reforms could be more important than the collapse of communism in Eastern Europe. Then I realised what he was calling a "liberation struggle". ie some black dictator replacing good governance and human rights with hell on earth.
2023-08-18T01:26:18.401715
https://example.com/article/3539
The Gut Microbiome and Mental Health: Implications for Anxiety- and Trauma-Related Disorders. Biological psychiatry research has long focused on the brain in elucidating the neurobiological mechanisms of anxiety- and trauma-related disorders. This review challenges this assumption and suggests that the gut microbiome and its interactome also deserve attention to understand brain disorders and develop innovative treatments and diagnostics in the 21st century. The recent, in-depth characterization of the human microbiome spurred a paradigm shift in human health and disease. Animal models strongly suggest a role for the gut microbiome in anxiety- and trauma-related disorders. The microbiota-gut-brain (MGB) axis sits at the epicenter of this new approach to mental health. The microbiome plays an important role in the programming of the hypothalamic-pituitary-adrenal (HPA) axis early in life, and stress reactivity over the life span. In this review, we highlight emerging findings of microbiome research in psychiatric disorders, focusing on anxiety- and trauma-related disorders specifically, and discuss the gut microbiome as a potential therapeutic target. 16S rRNA sequencing has enabled researchers to investigate and compare microbial composition between individuals. The functional microbiome can be studied using methods involving metagenomics, metatranscriptomics, metaproteomics, and metabolomics, as discussed in the present review. Other factors that shape the gut microbiome should be considered to obtain a holistic view of the factors at play in the complex interactome linked to the MGB. In all, we underscore the importance of microbiome science, and gut microbiota in particular, as emerging critical players in mental illness and maintenance of mental health. This new frontier of biological psychiatry and postgenomic medicine should be embraced by the mental health community as it plays an ever-increasing transformative role in integrative and holistic health research in the next decade.
2023-11-14T01:26:18.401715
https://example.com/article/3491
I've actually had a lot of trouble with applets using Slick, lots of bugs, freezing and not working on mac/linux. Any experience with this? Maybe use Java Web Start instead of applets. I use Linux and I have rarely problems with applets, what you report is strange. An example would be this: http://staff.washington.edu/shinyy/martygame.htmlSometimes it works fine, other times it freezes and even more weird sometimes the fps goes way out of wack.Anyway, I was probably going to look into learning how to do that or possibly switching to flash(though I probably shouldn't talk about that here should I? ) I've actually had a lot of trouble with applets using Slick, lots of bugs, freezing and not working on mac/linux. Any experience with this? Maybe use Java Web Start instead of applets. I use Linux and I have rarely problems with applets, what you report is strange. An example would be this: http://staff.washington.edu/shinyy/martygame.htmlSometimes it works fine, other times it freezes and even more weird sometimes the fps goes way out of wack.Anyway, I was probably going to look into learning how to do that or possibly switching to flash(though I probably shouldn't talk about that here should I? ) Game works fine in crappy school Windows XP and my own Windows 7 machines.And nobody takes Flash seriously these days so stay with Java, it's the best! i really don't get it why it has (always?) to get into such a whining about the applet/download thing! i assume downloading is a sacrilege and brings you straight to hell? to give a little bit feedback on the game actually:i like the graphics, the music and the sound too! nicely done! the game mechanics are promising to the point i got, what was sadly not far. what really bugged me is the complete lack of checkpoints. yes, i may be a pussy, but i really have no patience to play every time from start. especially not if the player moves so slowly!
2023-09-29T01:26:18.401715
https://example.com/article/3899
Secret of the Wings [Blu-ray/DVD] [DVD/Blu-ray] The cycle of seasons draws to a close in this winter adventure featuring everyone's favorite fairy, Tinker Bell (voice of Mae Whitman). Compelled by an unseen force to enter the forbidden Winter Woods, Tinker Bell encounters a frost fairy named Periwinkle who possesses the power to solve the enigmatic mystery of the wings. Meanwhile, as the two fairies forge a sisterly bond, Pixie Hollow faces a threat that can only be defeated by the power of teamwork. Together, Tinker Bell and Periwinkle embark on an amazing adventure that will determine the fates of both of their worlds.
2023-10-12T01:26:18.401715
https://example.com/article/1149
Author Archives: Anna There are numerous places that are all available to play tennis and most cities have several options that you can explore based upon your individual needs. Finding a suitable place to play is often based upon where you live, how long you have to devote to playing and what type of surface you are looking for in terms of the court. There are grass courts, clay, asphalt and even an indoor wooden court. You need to decide which type you are most interested in before you obviously […] If you are going to be any good at tennis there are two major things that you really need to know. Once you have mastered these things you are looking at a much easier time trying to play. However, if you are not playing as well as you should be, going back and taking some lessons in improving your skills as well as technique may be necessary. The primary basis of tennis is to obviously bounce the ball back and forth across the center net, but actually […] As you can imagine there are numerous considerations that you should take into account if you are trying to select a suitable tennis instructor for a child. What is suitable for an adult is not always the best match for a child and this can sometimes be a very difficult difference to distinguish. What you determine as the first criteria is obviously someone who is skilled and talented as a player themselves, yet there are other criteria that should be considered as well. Some of this criteria […] As you can imagine tennis is a very high impact sport, this alone creates a huge need for a good pair of highly appropriate shoes that are designed to last a long time and ensure that you have the durability as well as comfort that you need. If the shoes that you choose are not good for your skills then you are going to be looking at very sore feet and legs, potential problems with your back, a less than stellar game and massive discomfort. This is […] If you have ever heard anyone talk about tennis elbow then you surely know that it is not a pleasant situation. It can be rather painful and it is quite possible to do a lot of work to help prevent the injury. However, if you do not treat your body nicely you are putting yourself at a much greater risk for the injury as well as others. This is something that you should work hard to avoid, after all tennis elbow can cause serious pain that is […] Who ever knew that there was a lot of decisions involved in picking out a tennis ball? After all, they are green or yellow and fuzzy. The biggest decision that you would think you should have to make is picking the color that you want to use. Yet there is actually so much more that people generally do not think about. This is an amazing discovery to most people, because honestly a ball is just a ball right? Of course a ball is a ball, but at […] If you are trying to get started in tennis you have no doubt discovered that many of the different pieces of equipment that are necessary are a bit expensive. However, if you are willing to purchase some equipment used you can save a lot of money. The problem becomes determining what you can really purchase used without putting yourself at risk for injury, or even potential frustration. Savings money should never be a greater priority so it is important to follow the advice that is listed here […] Many people do not realize that beyond the initial beginnings of tennis that the sport can actually be very dangerous. Yet at the same time even those who do realize that it is dangerous often do not realize just how important it is to have a good sports medicine doctor that you work with. Most tennis injuries are caused specifically by the sport itself, which makes the need to have a sports medicine doctor quite large. If you are playing tennis at an advanced level or even […] Parents are always looking for a good sport for their child and more and more parents are starting to turn to tennis as the perfect sport for their child. The benefits of tennis go far beyond simply learning good sportsmanship skills, it also goes deep into learning good skills in terms of eye coordination and even hand eye coordination just to mention a few. Deciding if tennis is the right sport for your child is sometimes easy and at other times a bit more complicated, but you […] If you have ever considered yourself a stellar tennis player you may have had the idea of teaching tennis cross your mind. The freedom and flexibility that this provides can be almost unmatched and it also provides a great excuse to play more tennis. If you thoroughly enjoy the sport then this is the perfect thing to seriously consider. However, before you go jumping into a new career there are some things that you should take into consideration to ensure that it is a good match for […]
2023-10-25T01:26:18.401715
https://example.com/article/9526
Q: Python: Append to dictionary from a zip Lets say I have the following list such as [key,value, key,value, key,value] and I want to turn it into a dictionary which looks like: {key:value, key:value, key:value} I have tried dict(zip(mydict[::2], mydict[1::2])) However, the original values for one of the keys keeps being overwritten. How can I change this so it appends to the dictionary if the key already exists? A: I'm not sure if I'm misunderstanding then. You cannot have repeated keys inside a dictionary. One will overwrite the other. [in] >>> d = dict([('x',3),('x',4)]) [in] >>> print(d) [out] >>> {'x': 4} Maybe you're thinking of a defaultdict [in] >>> from collections import defaultdict [in] >>> d = defaultdict(list) [in] >>> for k,v in [('x',3),('x',4)]: >>> d[k].append(v) [in] >>> print(d) [out] >>> defaultdict(<class 'list'>, {'x': [3, 4]})
2024-03-10T01:26:18.401715
https://example.com/article/1824
Q: How to convert Java Map of Lists to Scala Map of Lists I have a Java Map of lists, Map<String, List<String>> stringToListOfStrings = new HashMap<String, List<String>>(); stringToListOfStrings.put("key1", Arrays.asList("k1v1", "k1v2")); stringToListOfStrings.put("key2", Arrays.asList("k2v1", "k2v2")); stringToListOfStrings.put("key3", Arrays.asList("k3v1", "k3v2")); I want to convert this to Scala Map of lists Map[String,List[String]] Would like to know the conversion on both in Java and Scala. I have tried this but didn't get the expected output and on Scala side, def convertJavaToScala(stringString: java.util.HashMap[String, java.util.List[String]]) { val scalaMap = stringString.asScala scalaMap.get("key1") scalaMap.get("key1").foreach(println) } but the result was a comma separated string of values. A: Here is the way to do it: import scala.collection.JavaConverters._ def convertJavaToScala(stringString: java.util.HashMap[String, java.util.List[String]]): Map[String,List[String]] = { val scalaMap: Map[String, java.util.List[String]] = stringString.asScala.toMap scalaMap.mapValues(_.asScala.toList) } And when you run: import java.util.Arrays val stringToListOfStrings = new java.util.HashMap[String, java.util.List[String]]() stringToListOfStrings.put("key1", Arrays.asList("k1v1", "k1v2")) stringToListOfStrings.put("key2", Arrays.asList("k2v1", "k2v2")) stringToListOfStrings.put("key3", Arrays.asList("k3v1", "k3v2")) convertJavaToScala(stringToListOfStrings) // Displays // Map(key1 -> List(k1v1, k1v2), key2 -> List(k2v1, k2v2), key3 -> List(k3v1, k3v2)) Basically, you have to add .toMap / .toList after .asScala because Map and List are immutable in Scala, unlike Java.
2023-11-27T01:26:18.401715
https://example.com/article/9004
Secession Research, Part One Secession Research, Part One By Jason Sorens February 23, 2005 Secession has been a hot topic for political scientists and political philosophers for over 10 years now, since the breakup of the Soviet Union, Yugoslavia, Czechoslovakia, and Ethiopia. In this article I take a look at the political philosophers’ take on the issue of secession. Generally, the positive and normative theorists of secession have not talked to each other much. Positive theorists have not asked questions such as, “What is the appropriate governmental response to secessionism?,” and normative theorists have not entertained the question, “What are the real-world circumstances that encourage claims of secession?” That chasm between “ought” and “is” is starting to close, and two recent books coming out of the political philosophy debate give some space to considering the implications of empirical findings: “Contextualizing Secession,” edited by Coppietiers and Sakwa, and “Secession and Self-Determination,” edited by Stephen Macedo and Allen Buchanan. There are three main camps in the debate on secession. Choice theorists such as Harry Beran argue that any group of people should be allowed to secede, so long as they vote by a majority in a referendum for secession, and respect the rights of minorities in the new state. Nationalists such as Margaret Moore argue that only national groups may secede under such terms. Just-cause theorists such as Allen Buchanan argue that there is no right to secede in “just” states (basically, countries that don’t engage in mass, wholesale killing of their own citizens), but that democidal states should permit a right to secede for groups suffering from their injustice. So far the restrictive just-cause theories are getting the better of the debate. The main problem is that leftish academics fret that secession would allow the wealthy to secede and escape redistributive taxation. Also, the standard refrain against permissive theories is that they would permit the formation of 10,000 tiny states. (Never mind that if this fragmentation were undesirable, people would likely never vote for it.) For the sake of argument, let’s concede those points, both highly debatable. The problem is that normative theorists have not considered the real-world consequences of repressing secessionism. In advanced democracies such as Britain, Belgium, Italy, and Canada, secessionist parties contest elections, win seats, and occasionally even participate in government. Secessionism is not associated with violence in advanced democracies. The main exception to this rule is Basque terrorist group ETA, which actually proves the rule, because ETA formed during the repressive Franco years and has progressively lost support since Spain democratized. (Most people don’t realize that most Basque nationalists reject violence and are currently pursuing autonomy – virtual independence – through the ballot box.) Northern Ireland is a case of irredentism, not secessionism – irredentism is an attempt to separate territory from one state and cede it to another. Irredentist movements tend to be more violent. In many other countries, including some less-developed democracies, the central government proscribes secessionist parties and activism. India even has a clause in its constitution, inserted in 1962, that forbids candidates for office from talking about secession. India is a democracy that is wracked by secessionist violence. From the ongoing conflicts in Kashmir and the northeast to the bloody rebellion of the Sikhs in Punjab that raged from 1984 to 1991, the Indian government has found itself killing hundreds of thousands of its own citizens to defend its intolerant policy on secession. Turkey has taken an even harsher line toward the Kurds, at one point banning the Kurdish language. Sudan, Indonesia, the Philippines, Yugoslavia, Ethiopia, Nigeria, Zaire, Burma, and Pakistan are other countries that have attempted to suppress secessionism and have paid a heavy price in blood. The relevant question therefore is not, “Is secession desirable and something to be promoted?” The question is, “Will allowing peaceful secession discourage violent rebellion?” Whether or not secession is desirable (as a libertarian, I think it is quite often positively desirable to reduce the geographical scope of states), permitting secession to occur through a negotiated, constitutional process is always a better course than attempting to crush secession. The political philosophers who try to limit the right to secede to special cases are implicitly placing their imprimatur on sanguinary, repressive policies. Free-Market News Network does not represent, warrant, or endorse the accuracy, reliability, completeness or timeliness of any of the information, content, views, opinions, recommendations or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the information contained in this contributed commentary.
2024-07-23T01:26:18.401715
https://example.com/article/5463
Biohazard Biohazard Sunglasses is a popular brand immediately recognized for its sporty look and free spirit aesthetic. This line, and the Xloop Sunglasses line, so extremely well in the surfer/beach and extreme sports crowds. In a variety of practical shapes, like round, shield, wrap and rectangle frames, this line has something for every sport aficionado.
2024-03-19T01:26:18.401715
https://example.com/article/7768
Betano Betano is a village and suco in the southwest of Manufahi District, East Timor. In 2004, the suco had 4,577 inhabitants. The Betano Power Station, located in the Betano suco, is the biggest electricity station in Timor by capacity. It supplies the South coast of the country with electricity. History Betano was a traditional Timorese kingdom in former times. The Kingdom of We Hale with their mighty King Nai Loro Tiris became grounded at the bay at Betano after offloading the 2/4th Independent Company on 25 September 1942. The ship was blown up and scuttled after it could not be refloated. On 1 December 1942, was sunk by 13 Japanese aircraft, while attempting to evacuate Australian and Dutch soldiers and deliver a relief contingent. Notes References Category:Populated places in East Timor Category:Sucos of East Timor Category:Manufahi Municipality
2023-10-23T01:26:18.401715
https://example.com/article/7155
Shingles (Herpes Zoster) and Post-herpetic Neuralgia. During childhood chickenpox, varicella-zoster virus becomes latent in neurons of the dorsal root or trigeminal ganglia. Shingles results years to decades later from a breakdown of viral latency within a ganglion and subsequent virus spread to the skin producing a unilateral dermatomal vesicular rash accompanied by segmental pain. Treatment with famciclovir, valacyclovir, and high dose acyclovir is beneficial if started within the first 3 days of the rash. All three drugs can be given orally, are equally effective, shorten the duration of viral shedding and time to healing of the rash by 1 to 2 days, and lessen the intensity and duration of the acute neuritic pain. Famciclovir and valacyclovir have more convenient dosing schedules (three times daily) compared to acyclovir (five times daily). Mild cases of shingles in younger healthy individuals often do not require any antiviral treatment. Pain in shingles may have burning, lancinating, or allodynic qualities, ranges in intensity from mild to unbearable, and lasts 2 to 8 weeks. Pain treatment varies on the type and intensity of pain experienced. In a few patients, post-herpetic neuralgia develops and the dermatomal pain persists for months to years. Effective treatment of post-herpetic pain is often difficult.
2024-03-01T01:26:18.401715
https://example.com/article/4674
Nudism in tropics - a nudist beach in Brazil a photo (set 11) Photo a nudism in Brazil, European nudists on a visit at nudists in Brazil, a beautiful collection of a photo of Purenudism.Size: 405 MBResolution: 4000x3000Format: .jpegAll pictures are in High Quality
2024-02-21T01:26:18.401715
https://example.com/article/1280
Q: Unity - Exposing a function to the inspector I wish to expose a script's function to the inspector, but I have no clue how to. I found something about Invoke() which was a start, but it isn't clear how to finish. My code for the class: [System.Serializable] class MoveAction : UnityEvent<MonoBehaviour>, IUIAnimationEvent { #region Move public MoveAction() { } //to ensure only one mover coroutine can be active. IEnumerator moveRoutine = null; #region Solution 2: using fields and not parameters Transform from; Transform to; float overTime; public delegate void UIchain(MonoBehaviour mono); public event UIchain NEXT_FUNCTION; public MoveAction(Transform from, Transform to, float overTime, IUIAnimationEvent chain) { this.from = from; this.to = to; this.overTime = overTime; } public void Move(MonoBehaviour mono) { if (moveRoutine != null) { mono.StopCoroutine(moveRoutine); } moveRoutine = _Move(from, to, overTime, mono); mono.StartCoroutine(moveRoutine); Invoke(mono); } IEnumerator _Move(Transform from, Transform to, float overTime, MonoBehaviour mono) { Vector2 original = from.position; float timer = 0.0f; while (timer < overTime) { float step = Vector2.Distance(original, to.position) * (Time.deltaTime / overTime); from.position = Vector2.MoveTowards(from.position, to.position, step); timer += Time.deltaTime; yield return null; } if(NEXT_FUNCTION != null) { NEXT_FUNCTION(mono); } } This is a lot of code, but the interesting part is the Move(MonoBehaviour mono) function. I want to expose that to the editor. How? EDIT: Something like this would be preferable: A: what you are looking for is the Unity Event class. See this example below. This will appear in the editor exactly like your screenshot. using UnityEngine; using UnityEngine.Events; using System.Collections; public class InvokeOnAwake : MonoBehaviour { public UnityEvent invokeMethod;//set in editor void Awake(){ invokeMethod.Invoke(); } }
2024-02-05T01:26:18.401715
https://example.com/article/8619
Q: How Yarn manages package.json and bower.json files, when both are present in my project's root folder? In my project's root folder,both bower.json and package.json are present. When using npm previosly,i do both npm and bower install seperately.Now i switched to Yarn.My question is, what happens when i do a yarn install? Will all the dependencies from package.json and bower.json will get installed? please help. A: Yarn decided to drop Bower support for now. Yarn won't look at your bower.json. You will need to do bower install aside from yarn. https://bower.io/blog/2016/using-bower-with-yarn/
2024-04-24T01:26:18.401715
https://example.com/article/3267
Coming... May, 2017The third novel in New York Times bestselling author Heidi McLaughlin's The Boys of Summer baseball series.A beast at the plate, Travis Kidd is a superstar for the Boston Renegades. But when baseball isn't occupying his time, Travis - named Boston's Most Eligible Bachelor - is known as a ladies' man.Saylor Blackwell knows sports. As a public relations specialists, her focus is on the athletes. The hours are long, the job stressful, and she's prohibited from dating any of the overly friendly athletes, but the result is what matters - she's financially able to care for her daughter.When a drunken night spent with Travis threatens that, Saylor knows she's made a mistake. Unfortunately, when he's accused of a horrible crime, it causes a PR nightmare and forces Saylor to come to his rescue. But when Saylor's ex comes back demanding custody, it might up to Travis to save her right back... Chapter 1 – TravisThe one I'm eyeing for the night bends at her waist and lines her pool stick up with the cue ball. She slowly pulls the wooden rod through her fingers, until the felt top finally connects. The hard white plastic ball rolls toward her target, hitting it perfectly and stalling as the blue-striped ball rolls into the pocket. I let out a massive sigh and lean on my stick, waiting my turn. I should've known better when she approached me, asking if I wanted to play a game or two of billiards with her. I know better than to let a good-looking woman hustle me out of money but I wasn't thinking with my right head. I never am, and once again I'm getting my balls get busted, no pun intended, by a pool shark."Sweetheart, are you going to let me play? My balls are getting lonely." If she thinks I'm crude, she doesn't say anything. In fact, she looks at me from over her shoulder and winks before shimmying her ass toward my crotch. My internal groan is epic. I've been watching her bend, lick her lips, show me her ample cleavage, and shake her ass for almost an hour. Not to mention, she brushes against me each time she passes me. And the touching isn't subtle. I can read her loud and clear, all the way from her tight as-sin jeans to her plunging neckline."I can't help it if you suck.""Do you?" I ask, stepping in behind her. My crotch is lined up perfectly with her ass, earning me another hair-tossing look over her shoulder.She stands and turns to face me, resting her ass on the edge of the table. "What do you have in mind?" Her finger trails down the front of my shirt until she reaches the buckle of my belt. The tug is slight, but definitely felt. Message received loud and clear."What's your name?""Are names important?""Of course. When I demand that you come for me, I need to know what to call you.""Demand?" she questions."I'm greedy like that," I tell her, placing my cue stick against the table as I step closer to her. I lean in and try to get a whiff of her perfume, but a mix between the stale air from the bar and the beer on her breath makes it hard to tell what she's wearing. I do love a woman who takes the time to dabble the perfect scent on her skin though."Blue.""My balls aren't blue, darling, and haven't been in years.""No, my name is Blue.""That's a very unique name," I say as my hand rests on her hip."What can I say? I'm a unique woman, Travis."Ah, she knows my name. That's usually how things go for me. Rarely am I given the opportunity to introduce myself. Everyone knows who I am, and while I enjoy the fruits of my labor, sometimes anonymity would be nice. One day, I'd like to talk to a woman who doesn't know that I'm Travis Kidd, right fielder for the Boston Renegades and one of the town’s most eligible bachelors. "You know who I am?""Doesn't everyone? I'm a Boston girl; I know my Renegades."I nod and reach for my beer. It's the off-season, and technically I shouldn't be here. I usually head south for the winter but opted to stay home this time. After a long season, one that saw my former managers die and one of my closest friends on the team become a dad to twins, I thought I'd stay around and see what the winter had to offer. Aside from the cold, I haven't found much, except Bruins hockey and Celtics basketball. Those games have been the highlight of my time off.The pickings for women have been slim. Without trying to bag on the female population, it's evident that they're seasonal as well. Right now, the puck bunnies, gridiron groupies, and court whores are in full effect, and the cleat chasers are resting like the rest of the baseball world. Maybe I should've been a dual-sport athlete. This way I would've had the best of both worlds."Travis?""What?" I ask, mentally shaking the cobwebs out."Where'd you go? It's your turn?" Blue nods toward the table, and I look over her shoulder to see the cue ball sitting there."Why don't you help me?" I know how to play the game of pool, but since she seems to be a pro, why shouldn't she show me? I would've happily slid up behind her and taught her how to handle her stick but she took the fun out of it.Instead, she's off to my side and leaning into me, giving me a perfect sideways glance down her shirt. I smirk, ignoring everything she tells me, and watch as her mounds of flesh move each time her hand does. They're real, that's for sure. None of that fake silicon shit on this chick."And that's how it's done," she says, righting herself. She continues to slightly lean over the table though, jutting her chest out for me to ogle. I cock my head to the side and wink before taking aim at the cue on the table.My first shot goes in, and the second quickly follows. I line up the third, and that is when I see a raven-haired beauty nursing a drink at the bar.Saylor Blackwell is off limits to anyone her agency represents. That includes me. Although I wish it didn't. Saylor is the one I would've switched agents for if she told me to, but I fucked that up much I like I screw everything up. When she needed me, I wasn't there. And I haven't spoken to her since.It's my dumb luck that she's sitting at the bar with her long, slender legs crossed, and she's dressed like she recently got off work. Her eyes are set on the television, ignoring the gaggle of men staring at her. I remember that she was a hard nut to crack back when I wanted to know her better. I can't imagine what she's like now that she's more successful.My last shot is sunk into the corner pocket. "Eight ball, right side," I say, nodding in the same direction I plan to send the black ball in order to finish this game. I'm in a rush now, eager to speak with Saylor. I know I shouldn't but I can't help myself."Where ya going?" Blue calls out."To the bar. Rack 'em," I tell her. It's not a lie. I am going to the bar but with the intention of speaking to another woman. I'm smooth though, and I can easily play it off while I order another round of drinks."Two please." I put up two fingers as I motion toward the bartender. Leaning in, I know I'm blocking Saylor's view of the television, which is all in my game plan."Hey Saylor.""Travis," she says coldly. We have a history. A small one, but it's there. I often remember the night we spent together and the regret that was on her face when we were done. I had never been kicked out of an apartment before that night. Usually, once I'm satisfied, I leave. With Saylor, everything was backwards. It's like she used me to scratch an itch, and once I took care of that, she didn't need me anymore. "What brings you in?"She looks everywhere but at me. "I'm meeting a client.""And nursing your what?" I take her drink from her hand and sniff. "Scotch? When did you start drinking the hard shit?"That gets her to look at me. Her glare is deadly as her blue eyes penetrate into mine. "As if you know anything about me.""I know enough.""You don't know shit, Travis Kidd. Go back to your booty call. She's looking at me like she's ready for a cat fight, and I assure you, you're not worth fighting for."Saylor turns, giving me the cold shoulder. If I weren't so stunned by her outburst, which I did not deserve, I'd tease her. But I have a feeling that there's something bothering her, and I'm the last person she needs making shit worse.With the bottles of beer between my fingers, I go back to the pool table where Blue is indeed throwing daggers at Saylor's back."Down, kitty. She works for my agent." I run my hand down her arm, trying to diffuse the situation. Jealous women usually turn me off, and this should be my sign to hit the road except I'm an idiot and want to stay mostly so I can watch Saylor.Taking Blue by her hand, I lead us over to the stools, and I sit down, pulling her between my legs. My hand is planted firmly on her leg right under her butt check. It«s a risky move, especially with all the cameras around, but I don't care right now. It's the off-season. I'm allowed to have a little bit of fun."You have nothing to be jealous over," I tell her. If anything, I'm trying to appease her."Okay.""We good? Wanna go back to kicking my ass at pool?"She looks over at the table and nods. "You rack, and I'll break." Blue saunters away, giving me space to watch Saylor, who turns and makes eye contact with me. I wish I could tell what she's thinking. Is she second-guessing her harsh words? I am. I want to go back over and offer to pick her tab. Or ask how she's getting home. It's late, and the roads are shit. If she's driving, she shouldn't be drinking. She has a kid that depends on her."I'm ready," Blue says, thrusting the stick in my face. Her words catch me off-guard. Is she ready to play another game or two of pool? I hope so because I have no intention of leaving as long as Saylor is at the bar. Or is she ready for me to fuck her and never ask for her number? Because that is bound to happen as well.I break, sending the balls off in every direction. Four drop. Two of each giving me the choice of what I want to be. Blue is yammering in my ear about the set-up and which would be the best. Her angles only work for her though, and I see that I can run the table on her if I line up correctly."We should've bet," I tell her as I walk around the table."I'd hate to hustle you out of your money, Travis."I laugh off her comment and proceed to clear the table. She huffs when the eight ball falls into the designated pocket."Well would you look at that," I say, taking a bow. Blue pushes me lightly and falls into my arms. Her lips are on mine before I can push her away, and doing so now would be embarrassing for her so I kiss her back and find myself opening my eyes to watch Saylor watch me.As soon as I pull away, Saylor is sliding off the bar stool and heading toward the door."Be right back. I need some fresh air." A true gentleman would've invited his lady friend outside, but that is not who I am."Do you need a ride home?" I ask, as soon as I see Saylor standing near the curb. "And what happened to your client?""He canceled."It didn't strike me as odd earlier when she said she was meeting a client, but it does now. I've never met anyone from the agency at a bar, let alone this late at night."How about that ride home?""Travis," she draws out my name and then drops her head into her hands.Without thinking, I pull her into my side. "Come on, Saylor. It's a ride. Nothing else.""What the hell is going on? I thought you were taking me home?" Blue speaks loud enough for everyone on the block to hear.My arm drops, and Saylor steps away from me. I turn at the sound of Blue's voice behind me."I'll be in. Give me a minute." I smile, hoping to placate Blue but it doesn't work."I see some things never change," Saylor says as she steps off the curb and waves at a cab only to be passed by.Shaking my head, I push my hands into my pockets for a bit of warmth. If I knew Saylor would be out here when I returned, I'd run in and grab my jacket. "It's not like that.""What, do you like her or something?" The sound of Blue’s voice grates on my nerves. Saylor looks over my shoulder and rolls her eyes."Or something," I say, without taking my eyes off Saylor.As soon as a taxi pulls up to the curb, Saylor is sliding in.I make a split second decision to get in with her, but not before Blue yells at me. "Where the fuck are you going?"I answer her by slamming the door shut. I have Blue on the outside screaming and Saylor looking at me like she's going to kill me. She opens the door, and I hear, "Fuck you, Travis Kidd. You'll pay for this." And before I realize what's happening, Saylor is out of the car and the cab is speeding down the road. Originally from the Pacific Northwest, she now lives in picturesque Vermont, with her husband and two daughters. Also renting space in their home is an over-hyper Beagle/Jack Russell, Buttercup and a Highland West/Mini Schnauzer, JiLL and her brother, Racicot.When she isn't writing one of the many stories planned for release, you'll find her sitting court-side during either daughter's basketball games.Heidi's first novel, Forever My Girl, is currently in production to be a major motion picture.NYT & USA Today Bestselling Author.
2023-10-08T01:26:18.401715
https://example.com/article/5167
22 Gorgeous Wide Dressers For All Budgets Have you ever looked at an empty dresser and thought wow, that’s a tone of space! but then once you actually start to fill it with clothes you realize there actually isn’t a ton of room in there? Well, this post is for you! If you’re ready to buy another dresser for more storage, (or maybe this is your first dresser purchase?), then this list should give you a nice idea of the best options. Wide dressers make amazing purchases for the bedroom because they provide ample top counter space to decorate, or keep any belongings you don’t want to stuff away. They also help a room appear bigger since they are so far from eye-level for the average adult. Click the dressers on the images below to shop! Wide Dressers We Love These dressers are the most affordable yet chic ones we’ve found online. They’re solid picks that would best be used lightly. Ideal for first-time apartments and guest bedrooms. These dressers are slightly more expensive, but worth the investment because their durability will save you time and money in the future! Finally, if you’re ready to make an investment in a solid wide dresser, then this section is for you. These pieces will stand the test of time and prove to be lovely additions to your forever home! Unknown Homey Oh My Havenly Home Design Labs Which is your favorite? Share this article: Read These Next! Curated Interior publishes a curated selection of ultra fun home decor & stunning interior design inspiration for the smart female professional with an eye for design. Share your space with us using the hashtag #instacurated! Curated Interior is a participant in several affiliate advertising programs and may receive a small commission from linked retailers. Please read our full disclosure. Curated Interior is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com
2024-01-01T01:26:18.401715
https://example.com/article/8523
A black hole is a region of spacetime exhibiting such strong gravitational effects that nothing—not even particles and electromagnetic radiation such as light—can escape from inside it. On this episode we explore and compare the various relations between the idea of black hole and the various challenges and fears we face on our daily life, both on our regular life and at school.Voiced by: Samson Paul 30 Questions That Might Change Your Life!“Judge a man by his questions rather than his answers.” – Voltaire“We make our world significant by the courage of our questions and by the depth of our answers.” – Carl SaganThanks to everyone who support us each day. We love you!! When there are a thousand things on your mind, it can be easy to forget to take care of yourself and the importance of your health. It’s only when you start feeling the symptoms of an illness or you start to feel unwell that you actually get a bit concerned.We did a comprehensive research on how to come up with the best student life at the University. And on this episode we share with you these tips, according to our findings on how best to try and avoid the unwanted illness and try to keep you fit throughout your time as a student at the University.Please share your thoughts on this experience. Tack, Many of us spend our childhoods confidently answering the question: “What do you want to be when you grow up?” When we respond, we do so unconstrained and driven by passion. We typically answer with creative or bold responses.Funny thing is, once we “grow up,” that confidence and boldness typically fades.Now that you have your diploma in hand, it’s time to take action. But how should you approach your transition from student to professional?Context by: Edvin Larsson It’s great to work towards personal improvement – making a commitment to learning a new skill, sleeping better or keeping your lecture notes up to date can make a positive difference to your mental health and self esteem.On this first episode of the year 2019, we try to answer this question. "Are New Year’s resolutions really that important?"Thank you Bridget Hamilton for your contributions.Music: http://www.owlcitymusic.com/ This a our final episode for the year 2018. It marks the most SPECIAL episode we ever recorded as it's dedicated to each and everyone of you out there who helped make this much progress.And we do have those really special persons who touched our hearts and whom we really hold dear to our hearts for being with us, each step of the way. Josefin Otti,Miklol, Haggens, Francis and Patrick,You guys are amazing and so this is a special THANK YOU! How important is it to have a professor from your ethnicity group, especially if you of the minority group?On this episode we continue to explore the effects and importance of diversity in the university.Music: http://www.twentyonepilots.com/
2024-05-17T01:26:18.401715
https://example.com/article/9615
Teen Birth-Rate Disparities Persist Among States WEDNESDAY, Oct. 20 -- Teen birth rates in the United States have declined over the past two decades, but there are still significant variations in state rates, ranging from less than 2.5 percent to more than 6 percent, according to a federal study released Wednesday. Babies born to teens have a higher risk of low birth weight, preterm birth and death in infancy than babies born to women in their 20s and older, the report said. The overall birth rate for U.S. teens aged 15 to 19 was 41.5 per 1,000 in 2008, according to U.S. Centers for Disease Control and Prevention researchers who analyzed data from the National Vital Statistics System. But teen birth rates ranged from less than 25 per 1,000 in Connecticut, Massachusetts, New Hampshire and Vermont to more than 60 per 1,000 in Arkansas, Mississippi, New Mexico, Oklahoma and Texas. In general, the lowest rates were in the Northeast and upper Midwest while the highest rates were in the South. Rates of births among white and Hispanic teens were highest in the Southeast and lowest in the Northeast and California, while rates for black teens were highest in the upper Midwest and in the Southeast. In 2007, the birth rate for Hispanic teenagers (81.8 per 1,000 aged 15 to 19 years) was nearly three times the rate for non-Hispanic white teenagers (27.2), and the rate for non-Hispanic black teenagers (64.2) was more than twice the rate for non-Hispanic white teenagers, the study found. Rates in 2007 for non-Hispanic white teenagers ranged from 4.3 per 1,000 for 15 to 19 year olds in the District of Columbia to 54.8 in Mississippi; for non-Hispanic black teenagers, rates ranged from 17.4 per 1,000 in Hawaii to 95.1 in Wisconsin; and for Hispanic teenagers, rates ranged from 31.1 in Maine to 188.3 in Alabama. "In 2008, as in previous years, teenage birth rates were consistently highest in states across the South and Southwest, and lowest in the Northeast and upper Midwest," the researchers wrote. "The race and Hispanic origin-specific birth rates by state as well as the population composition of states by race and Hispanic origin both contribute to state variations in the teenage birth rate," they continued. "Although teenage birth rates fell nationally and in 14 states from 2007 to 2008, the birth rate for the United States remains substantially higher than for other Western countries," the study authors added. "There has been a broad consensus on the goal of preventing teenage pregnancy, and a wide variety of public and private programs have been developed to meet this challenge. Variations in teenage birth rates reflect differences in many factors, including differences in socioeconomic factors such as education and income, risk behaviors such as sexual activity and contraceptive use, and attitudes among teenagers toward pregnancy and childbearing." More information The National Campaign to Prevent Teen and Unplanned Pregnancy has more about teen pregnancy.
2024-01-09T01:26:18.401715
https://example.com/article/9549
Apollo Management may have their hands full with Realogy Remember the private equity boom that lasted a few months in 2006. Realogy, with brands like Coldwell Banker, Century 21, Sotheby’s, Better Homes and Gardens and ERA were looked quite charming to Apollo Management – now their financing has hit the fan. They are in the process of getting the bond holders who financed the deal to forgive a significant amount of the debt in turn for preferred payouts if the company fails. This can also be referred to as a Cram Down – as in, if you want to get paid, we will be cramming this new valuation down your throat. The bad news for investors means great news for Realogy – a company who stands to come out of this stronger than ever before. It was as badly timed a takeover as there was during the private equity boom. At the end of 2006, Apollo Management, the private equity firm headed by Leon Black, agreed to buy Realogy, a conglomerate with a number of franchised real estate businesses, among them Century 21 and Coldwell Banker, for $7 billion in cash. Now, The New York Times’s Floyd Norris writes, a struggle is emerging over how the unfortunate lenders should be treated. Realogy, under the direction of Apollo, is using a classic divide-and-conquer strategy. Bondholders are screaming that the tactics are illegal. The strategy is simple: Just tell one group of bondholders that they can move up in the capital structure (and thus be more likely to be paid if the company goes broke). But first, they have to agree to forget about collecting most of the money they are owed. They are being asked to trade in old bonds for new loans with much smaller face values. Overindebted consumers can only look on with envy, wishing they could pull off something similar, perhaps by telling one credit card company that they will pay another card company first unless the first company agrees to forgive most of what it is owed. No owner of Realogy bonds has to make the exchange, of course. But if a bondholder turns it down, and others do make the exchange, that bondholder may find that he is much farther back in line, with even less probability of being paid anything. Realogy disclosed this week that a lawyer claiming to represent owners of a majority of one class of bonds had threatened to sue, arguing the offering violated bond indentures. The company did not identify the lawyer, but The Times reports that one person involved in the case said Carl C. Icahn, the financier, owned the bonds. Mr. Icahn declined to comment.
2024-01-31T01:26:18.401715
https://example.com/article/3108
James Bond Portrait Gallery Administrative A live-action movie based on the Jonny Quest adventure cartoon has resurfaced, according to the entertainment news website The Wrap. Chris McKay, director of The Lego Batman movie, will helm the Quest project, The Wrap said. The website said it got the information from “individuals with knowledge of the project.” The Hollywood Reporter said it confirmed the news. Three years ago, there were reports that Robert Rodriguez would co-write and direct a live-action Quest film. Jonny Quest debuted in 1964 on ABC. It was made by Hanna-Barbera and created by cartoonist Doug Wildey. The series featured realistically drawn characters (with the except of Jonny’s dog, Bandit), a departure for H-B. The original version only lasted one season, although there were revivals in the 1980s and 1990s. Jonny Quest was the son of widower scientist Dr. Benton Quest. They were protected by U.S. government agent Race Bannon. The group took in Hadji, a native of India. Quest was Hanna-Barbera’s answer to James Bond. Development began after producer Joseph Barbera saw Dr. No. Hanna-Barbera initially intended to adapt the radio program Jack Armstrong, the All-American Boy, but went with original characters instead. The Hanna-Barbera cartoon brand was later absorbed by Warner Bros.’s animation unit. The movie, if it goes into production, would be released by Warner Bros. A soundtrack to the 1988-90 Mission: Impossible revival television series is coming out from La-La Land Records, the company said July 23 ON FACEBOOK. The price is $29.98 and sales will be limited to 1,988 units, La-La Land said. The new soundtrack includes music by Lalo Schifrin (composer of the famous Mission: Impossible theme) and Ron Jones. The sets will include liner notes by film and TV music expert Jon Burlingame, who has worked on other La-Land projects, including a soundtrack for the original 1966-73 Mission: Impossible series. The 1988 series starred Peter Graves, reprising his role as Jim Phelps of the Impossible Missions Force. In the first episode, he returns to the IMF after a protégé was killed. At the time it began production, there was a Writers Guild strike. As a result, the initial stories were based on scripts written for the original show. The revival series aired on ABC while the original had been telecast by CBS. The revival soundtrack will go on sale July 31. Presumably, it will be sold (like other La-La Land offerings) on the company’s website. Rarely, however, is life so black and white. With that in mind, this post takes a closer look at Samish’s career. For one thing, Samish did extract a bit of revenge. Ellison pitched a story for the Batman television series for a story featuring the villain Two Face. But Samish, on his way out the door at ABC, vetoed the idea. At least that’s the gist of this 2013 Den of Geek post. In 2014, Ellison’s story was adapted by Len Wein for the Batman ’66 comic book. Wein, co-creator of Wolverine and Swamp Thing, dies last year. After his tenure at ABC ended, Samish landed at QM Productions. “The acid-tongued, perfectionist Samish demanded scripts so tight, so in keeping with a series’ format, more than one writer assaulted him physically,” according to the preface of the 2003 book Quinn Martin, Producer. Adrian Samish title card for an episode of The FBI during the 1966-67 season where he got top billing over Arthur Fellows. Samish came aboard QM for shows produced for the 1966-67 season. He was given the title “in charge of production,” which Samish shared with a key Quinn Martin lieutenant, Arthur Fellows. Samish focused on pre-production while Fellows supervised the QM editing and post-production operation. Their shared credit would appear near the conclusion of the end titles. Both names appeared separately, with the two men alternating top billing. Thus, is would appear, “In Charge of Production Arthur Fellows | And Adrian Samish” or, “In Charge of Production Adrian Samish | And Arthur Fellows.” According to Quinn Martin, Producer author Jonathan Etter, the two didn’t have much use for each other. Fellows thought Samish had no talent, Etter quotes Richard Brockway, a QM editor, as saying. On the other hand, John Elizalde, a QM music supervisor and post-production supervisor, told Etter that Samish was a valuable member of the team. “Adrian was one of the good guys,” Elizalde told Etter. Samish, he said, was “brilliant, and very creative, and a victim of his own devices…Adrian was the major-domo for Quinn in the writing department.” One fan was actress Lynda Day George, a member of the “QM Players,” of frequently employed actors at the production company. “Adrian was very concerned that a show maintain its integrity,” George told Etter. “He wanted to be sure that characters were understood, that what was wanted by the production was understood.” Etter wrote that Quinn Martin trusted Samish’s judgment. However, Samish on more than one occasion aroused anger during a run of several years at QM. Philip Saltzman and Mark Weingart, the producer of associate producer of The FBI, had written extra scenes for an episode that was running short. Samish called Saltzman, angry that the extra material hadn’t been approved in advance. An argument ensued. “I threatened to go over to Adrian’s office and beat him up,” Saltzman told Etter. “And I’m not a physical guy.” In this instance, no blows took place. Quinn Martin called Saltzman after seeing Samish in his office. “He’s as white as a sheet,” Saltzman quoted Martin as saying. “What happened?” After an explanation, Martin reportedly responded, “Aw, you know. People get set in their ways.” Saltzman told Etter that after the incident “I never had any trouble with Adrian.” Starting with the 1968-69 season, Samish was given a new title, supervising producer, while Arthur Fellows retained “in charge of production.” Adrian Samish title card for a first-season episode of producer Aaron Spelling’s Starsky and Hutch series. Samish, over time, also took on the task of producer of QM TV movies and pilots. Sometimes by himself (House on Greenapple Road, which resulted in the Dan August series, as well as the pilots for Barnaby Jones and The Manhunter). Sometimes with Fellows (the pilots for Cannon and The Streets of San Francisco). Samish ended up departing QM in the 1970s to work for producer Aaron Spelling. Samish died in 1976 at the age of 66. In the 21st century, the notion of a television series coming to a definitive end seems old hat. But in the 1960s, that wasn’t the case. However, that changed when the 1963-67 series The Fugitive ended its run. The ABC series, produced by QM Productions, featured the exploits of Dr. Richard Kimble (David Janssen (1931-80), who had been convicted of killing his wife. The Fugitive was one of the first examples of a series that was brought to an conclusive ending. Kimble, in the final two-part story, finally caught up with the “one-armed man” who killed his wife. For the early early years of QM Productions, the series was the company’s flagship show. It was the brainchild of veteran TV writer-producer Roy Huggins (1914-2002), who had earlier created the TV shows Maverick and 77 Sunset Strip. Higgins sold The Fugitive to ABC. The television network selected Quinn Martin to produce the show. At this point, Martin’s then-new company had sold one short-lived series, The New Breed. The Fugitive was QM’s first big hit. As the show was winding down, ABC and QM eventually elected to have the show actually end on its own terms. At the time, the practice was for a network to get as many episodes as it could from a show and simply end without a definitive conclusion. The Fugitive had an actually ending and more. When the final two-part story aired on ABC, it was one of the most-watched TV episodes of all time. At the time, it was a milestone. For Quinn Martin, there were more accomplishments to come. Over the years, there have been many takeoffs based on Hugh Hefner and Playboy magazine. Hefner’s death this week reminded the blog of one of the most amusing versions from 1990 when Lt. Columbo (Peter Falk) dealt with a Hefner-like character. Columbo Cries Wolf did more than that. Writer William Read Woodfield (1928-2001) very much played with the normal Columbo formula. Years earlier, Woodfield, with his then-partner Allan Balter (1925-1984), had written key episodes of Mission: Impossible Sean Brantley (Ian Buchanan) is the founder of a Playboy-like magazine, Bachelor’s World. Instead of Playmates, there are “Nymphs.” Instead of the Playboy Mansion, there is the “Chateau.” However, in this story, the Hefner figure has a business partner (Deidre Hall) who owns 51 percent of the enterprise. She appears to want to sell out to a Rupert Murdoch-like media baron. But the partner goes missing and Lt. Columbo is assigned the case as a possible homicide. Woodfield even works in a reference to a British police detective played by Bernard Fox in a 1972 Columbo story, Dagger of the Mind. The first three-quarters of Columbo Cries Wolf unfolds as a typical Columbo outing. But Brantley pulls a switch, basically begging for publicity as Columbo’s investigation proceeds. Los Angeles officials (including a nervous mayor played by David Huddleston) aren’t sure. The Police Chief (Columbo veteran bit part player John Finnegan) assures the mayor that the department’s “best man” (Columbo, finally getting some recognition for a spectacular record) is on the case. Woodfield pulls a big switch when it’s revealed that no murder actually occurred, with Brantley and his partner pulling a con game on Columbo. Despite that, Brantley’s business partner still wants to sell to the media baron (albeit at a higher price). So Brantley kills her for real this time. Columbo, with egg on his face from the first fiasco, takes another turn at bringing Brantley to justice. The climax depends on early 1990s tech (which new viewers wouldn’t recognize. Still, it’s one of the best episodes of the Columbo revival on ABC that ran from 1989 to 2003. (The original Columbo series ran from 1971 to 1977 on NBC.) Stanley Kallis, a veteran television producer whose credits included stints on Mission: Impossible and Hawaii Five-O, has died at 88, according to Variety. Kallis had producing credits going back to the late 1950s, according to his IMDB.com entry. Kallis joined M:I early in its third season. Producers William Read Woodfield and Allan Balter abruptly departed following clashes with creator-executive producer Bruce Geller. Kallis had joined Paramount as a producer following a job at CBS. Geller hired him to get M:I back on track. The series was a grind on the producers responsible for day-to-day production. Kallis was no exception. “It was like riding a tiger by the tail,” Kallis told author Patrick J. White for his 1991 book The Complete Mission: Impossible Dossier. “The damn thing whacked me.” Neverthless, Kallis, helped by his new hire, script consultant Paul Playdon, righted the ship. Kallis remained producer into the fourth season. During the time Kallis was producer, M:I had two two part episodes (The Bunker and The Controllers) and the show’s only three-part story (The Falcon). Kallais handed off the M:I job to Bruce Lansbury, who had previously been producer of The Wild Wild West. Kallis departed to be supervising producer of Hawaii Five-O’s third season, one of the best for that show. Kallis would oversee the production of three Wo Fat episodes and a pair of two-part stories. The producer remained busy on other projects for years, including the series Police Story and the mini-series Washington: Behind Closed Doors. He was also a producer on Columbo when the character was revived on ABC in the late 1980s. Many of the blog’s favorite television series have made it to home video over the past decade — but not exactly as they appeared during their original run. Some of this is a given. “Bumpers,” where we’re told the show will be back after a station break, and previews for coming episodes are usually clipped before going out for home video. Still, sometimes changes are made for other reasons. Here’s a look at the differences between the shows as they appeared first run and what you get on home video. The Man From U.N.C.L.E. (1964-68): When the series made its home video debut in 2007 some musical changes were made. For example, some first-episodes use a different version of Jerry Goldsmith’s U.N.C.L.E. theme. The Project Strigas Affair, the ninth episode aired, uses the version of the theme (arranged by Morton Stevens) utilized for most of the second half of the season. There are similar substitutions in other first-season episodes, though why they were made isn’t apparent. One plus, however, was the third-season set included one “bumper” (for The Abominable Showman Affair) in which veteran cartoon voice June Foray told the audience the show would return after station identification. Another plus is how the first-season set included the original color version of the pilot, when the plan was to call the series Solo. However, it doesn’t include another, black-and-white version of the plot which has a short presentation by star Robert Vaughn explaining the show and its format to network executive and potential advertisers. Bootleg versions of that have circulated among collectors for years. Hawaii Five-O logo in the main title Hawaii Five-O (1968-1980): In the first season, James MacArthur’s title card read, “With James MacArthur as Danny.” Starting with the second season, it said, “With James MacArthur as Dan Williams.” However, in the home video versions of seasons two through four, the first-season title card remains. The second-season set, meanwhile, doesn’t include the episode “Bored, She Hung Herself.” That episode aired only once and has never been repeated on CBS or shown in syndication. That ban has continued into the home video area. The 11th season set has episodes that involve music clearance issues. The two-part story Number One With a Bullet involves the Kumu, the Hawaiian mob, trying to force its way into Hawaii’s disco business. Both parts include disco hits of the late 1970s. In the home video version, the original hit songs are only heard in Part I while “generic” disco music is substituted for Part II. Another episode, The Execution File, included a rendition of “If You Think I’m Sexy” performed by a Rod Stewart soundalike. But in the home video version, it gets cut in favor of generic disco music. The FBI logo from the main titles. The FBI (1965-1974): For a number of seasons, lead sponsor Ford Motor Co. got its logo in the main titles. This was clipped when the show went into syndication. As a result, most of the home video episodes also don’t include the Ford logo. However, there a few episodes in the season two, three and five sets that include the automaker’s familiar oval. Another change occurs in the end titles, starting with the third-season set. During the 1967-68 season, Warner Bros. changed its logo from the familiar WB shield to a shield with a single W. In other seasons, Warners changed the logo a few times. With the DVD release, all of those alternate Warners logos are gone, except for a couple of third-season episodes with the single W logo. Almost all of the alternative company logos were replaced with the old WB shield that the company went back to a number of years ago. The biggest plus for the home video release is in the second half of the first season. It includes an episode never aired on ABC, The Hiding Place. According to Jonathan Etter’s book Quinn Martin, Producer, Ford didn’t want the episode aired for fear it would spur a boycott.
2024-02-26T01:26:18.401715
https://example.com/article/5680
1. Introduction =============== The advent of high-throughput sequencing has accelerated large-scale data production, exemplified by the 1,000 human genomes project,[@dsz022-B1] the 1,001 Arabidopsis genomes project,[@dsz022-B2] the maize HapMap project[@dsz022-B3] and the recently completed 3,000 rice genomes project.[@dsz022-B4]^,^[@dsz022-B5]. Therefore, there is an urgent need to meet the demand for efficient visualization of genome-wide resequencing data and analytical results of such sequences. In particular, the results obtained from genome-wide association studies (GWASs) utilizing large-scale genome-wide polymorphism data and phenotypic traits have increased drastically in number and have contributed to understanding various biological phenomena. GWASs are recognized as a powerful method for identifying genes or genomic regions responsible for a trait of interest and are used widely in medical science to study the causative loci of cancer, diabetes, drug susceptibility, etc.[@dsz022-B6] GWAS is also utilized in other fields, including agronomy, allowing the causal genes of yield, disease tolerance, abiotic stress response and many other traits to be isolated.[@dsz022-B7] Since GWASs generally require a considerable number of genome-wide polymorphic sites obtained from more than one hundred samples, manual validation of the resultant data is quite laborious. Generally, the results from a GWAS are presented by a Manhattan plot, which is a static plot of association *P*-values against physical genomic positions. While this visualization method is simple and easy, it is not convenient for precisely exploring causal regions of phenotypic variation. Interpretation of GWAS results, such as summary statistics of *P*-values in combination with phenotypic data of individuals, variant frequencies, effects of variants, annotations of genes and linkage disequilibrium (LD) blocks, is necessary. To date, several computer programs that aim to prioritize single nucleotide polymorphisms (SNPs) and visualize GWAS results with gene annotation information and that are equipped with functions to investigate SNPs in an interactive, manipulatable manner have been developed.[@dsz022-B13] Since these programs depend heavily on information generated by an external variant caller, it is quite possible that large insertions and deletions (indels) and copy number variations (CNVs) that are frequently undetected by such callers are overlooked, although these variants are rather important candidate causal variants for phenotypes of interest.[@dsz022-B18] Therefore, a genome-scale viewer that displays large gaps beyond the extent of variant callers would be of great use. Another issue is large-scale genomic data sharing with the public. Some valuable projects provide data sets of published GWASs as a catalogue of summary statistics, variant information and annotation information obtained from multiple sources for major model species such as humans,[@dsz022-B19] Arabidopsis[@dsz022-B20] and Asian rice.[@dsz022-B21] However, these platforms are specific to certain genomes, and published GWAS data for other species are not easily accessible and reusable. Thus, a platform for quick visualization and sharing of GWAS data that can be utilized easily for any genomic study is needed. Here, we present TASUKE+, which simultaneously displays GWAS results and polymorphisms in hundreds of genomes in one window such that researchers can easily explore causal variants with phenotypic information, various types of annotation and phenotypic effects of genes. TASUKE+ shows either precise SNP/indel data with read depth information at the nucleotide level or a genomic overview of several megabases in one window. Therefore, users are able to perceive large structural variants missed by variant caller programs with depth information. TASUKE was originally developed as a program for visualizing and sharing data via the web so that users could share their own resequencing data with collaborators, the public or both immediately after publication of the paper through user-friendly interfaces.[@dsz022-B22] TASUKE has been adopted as a platform to display the genome resequencing data of several projects.[@dsz022-B23] Since the first release of TASUKE, a considerable number of improvements have been made ([Supplementary Table S1](#sup1){ref-type="supplementary-material"}). The current version of TASUKE+ is equipped with some new major functions, such as GWAS result visualization, data export, external links to other databases, molecular phylogenetic analysis and PCR primer design. In particular, the latter should be useful for experiments including replication analysis in GWASs. To illustrate a practical application of TASUKE+, a GWAS of 7 agronomical traits in 176 rice varieties[@dsz022-B26] are presented. 2. Materials and methods ======================== 2.1. Platform and data to be imported ------------------------------------- A schematic view of the TASUKE+ system is shown in [Fig. 1](#dsz022-F1){ref-type="fig"}. The input files for TASUKE+ are those in commonly used formats, such as a FASTA file of the reference genome used for resequencing data mapping and variant calling, variant call format (VCF) files for each sample created by SAMtools[@dsz022-B27] or GATK[@dsz022-B28] and BAM files (optional) containing alignments of the reads. Annotation files in general feature format (GFF) and files related to GWASs, including results files in the qqman format[@dsz022-B29] (chromosome name, chromosome position and *P*-value) and phenotypic information for each sample, are also optional. TASUKE's user interface was developed as a web application of HTML5. The web storage feature and the canvas element of HTML5 are used for rapidly displaying massive information from a large genomic region. A MySQL database is used for backend data management on a Linux server on which Apache and PHP can be run. One of the useful functions of data management is that a part of the database can be shared by a specific group. When users have two or more projects involving resequencing or a GWAS, they can put their data into a single MySQL database for TASUKE+, select a small part of the data and release this part independently of the rest of the data. Moreover, if users obtain new data, the data can be added to the existing database with the same procedure as that of brand-new system installation. The data to be displayed can be selected from both old and new data sets in a flexible manner by writing a configuration file. In addition, multiple TASUKE+ browsers depicting different data sets can be easily launched from a single backend database. ![Schematic view of the TASUKE+ system. Data from genome resequencing (fasta, VCF and BAM files) and a GWAS (qqman format and phenotype data files) are added to a MySQL database with annotation information (GFF) on a backend Linux server running Apache and PHP programs. The server environments and default values for parameters of visualization can be specified in a configuration file (Conf). Genomic views and analytical functions are provided through general web browsers. The web storage feature and the canvas element of HTML5 are used for rapidly displaying massive information from a large genomic region.](dsz022f1){#dsz022-F1} To prepare a MySQL database and data files for TASUKE+, several Perl scripts are provided. For details, see <https://tasuke.dna.affrc.go.jp/installation.html>. 2.2. Reanalysis of rice GWAS data --------------------------------- The data obtained from the rice GWAS employing 176 temperate *japonica* varieties included single nucleotide variants and phenotypic data for 7 traits.[@dsz022-B26] The traits heading date, panicle length, awn length, plant height, panicle number per plant, leaf blade width and spikelet number per panicle were obtained from the same paper. We retrieved the resequencing data from the DNA Data Bank of Japan (DDBJ) Sequence Read Archive.[@dsz022-B30] The low-quality bases and adapter sequences in each read were removed by using Trimmomatic 0.36.[@dsz022-B31] The reads were mapped to the IRGSP-1.0 Nipponbare reference genome[@dsz022-B32] by BWA-mem (v0.7.15) with the default setting,[@dsz022-B33] and local realignment was conducted by using GATK 3.7.[@dsz022-B28] After removing PCR duplicates with Picard 2.9.0 (<http://picard.sourceforge.net>), the variants were called for each sample by using the GATK HaplotypeCaller and GenotypeGVCFs with the default setting. As a result, 822,655 SNPs were detected. The effect of each variant site was annotated by SnpEff.[@dsz022-B34] Rice genome annotation information from the RAP database (RAP-DB)[@dsz022-B23] and MSU release 7[@dsz022-B32] was used for the SnpEff analysis, and this information was included in the annotation track of TASUKE+. For the GWAS, VCF files were converted to a PLINK format file by using PLINK v1.9.[@dsz022-B35] After removing sites with a minor allele frequency of \<0.05, 406,224 SNPs were retained, and data imputation was conducted using Beagle version 3.3.2.[@dsz022-B36] Then, a GWAS was performed with the linear mixed model implemented in the Fast-LMM program.[@dsz022-B37] The resultant GWAS data set in the qqman format (chromosome name, chromosome position and *P*-value) and phenotypic data were added to the TASUKE+ database with the corresponding variant and mapping data. LD blocks were inferred for the aforementioned SNPs data set by using PLINK v1.9 with the following options: --blocks no-pheno-req no-small-max-span --no-pheno --no-parents --no-sex --nonfounders --no-fid --ld-window-kb 1,000. This data set is available at <https://tasuke-plus.dna.affrc.go.jp/>. 3. Results and discussion ========================= 3.1. Functions and application overview --------------------------------------- TASUKE was designed to visualize large-scale genome resequencing data for hundreds of genomes.[@dsz022-B22] The new version, TASUKE+, shows both GWAS data and SNPs and indels called on a reference genome. The occurrence frequency of SNPs and indels at each genomic position as well as depth information are drawn on a scalable block with a nucleotide length of 1 bp to 100 kb with various information tracks for GWAS results, gene annotation and so on. For accessibility and easy sharing of extremely large data sets, TASUKE+ was developed as a web application implemented in HTML5. Researchers can share the data within a specific group or with the public via general web browsers so that end users, including non-bioinformaticians, can easily browse extremely large genome resequencing data sets without extensive bioinformatics knowledge. It is also possible to connect with other databases through the function of external link. TASUKE+ provides not only the visual data stored in the database but also data-analysis functions useful for users who would like to export nucleotide sequences, conduct a sequence homology search by BLAST, build a phylogenetic tree, design primers and so on. Detailed information of improvements and new functions that have been added since the first release of TASUKE[@dsz022-B22] is described in [Supplementary Table S1](#sup1){ref-type="supplementary-material"}. All these functions are implemented in a user-friendly web-based interface so that users' operations will be made simpler ([Fig. 2](#dsz022-F2){ref-type="fig"} and [Supplementary Fig. S1](#sup1){ref-type="supplementary-material"}). ![The main window of TASUKE+ showing GWAS and variant information for resequencing data obtained from 176 rice varieties. (A) Positions on the reference genome and annotation information are shown in the uppermost pane. (B) Annotation information tracks show features provided by a GFF format file (e.g. gene structures and LD blocks). By clicking on a gene, a pop-up window containing detailed information appears. (C) GWAS Manhattan plots are displayed below the annotation pane. (D)The variant frequency (blue) and read depth (grey) for each accession are shown with a colour gradient. Unmapped sites are coloured light yellow. Upon clicking on a block, detailed information for the variants pops up. (E) SnpEff mode shows the variant effect levels, namely, MODIFIER (sky blue), LOW (yellow), MODERATE (orange) and HIGH (red), inferred by SnpEff. (F) Variants can also be shown by their precise genomic positions with nucleotides coloured orange for A, pink for T, green for G and blue for C.](dsz022f2){#dsz022-F2} The reference genome and its annotation information are displayed at the top of the main panel ([Fig. 2A](#dsz022-F2){ref-type="fig"}). Users can select chromosomes and jump to a specific genomic position by clicking on a diagram of the chromosome or typing a position in a search window, which can also be used to search for identifiers such as gene name, gene ID, LD block and marker name described in the annotation of GFF files and displayed in annotation tracks ([Fig. 2B](#dsz022-F2){ref-type="fig"}). The summary statistics of GWASs are shown in the upper pane as a Manhattan plot illustrating the significance value (-log~10~(*P*)) of association for each polymorphic site and phenotypic value ([Fig. 2C](#dsz022-F2){ref-type="fig"}). The main panel shows nucleotide variations (SNPs and indels) for each resequenced sample by their name or identifier with user-supplied information such as sample group (population), origin, publication name and phenotypic value, and the information can be represented by different colours. SNPs and indels are displayed by occurrence frequency per block with the read depth shown in the background, and users can choose to show/hide each set of information. Optionally, nucleotide variations can be shown one by one at their precise genomic position by turning off the default 'Block mode'. Furthermore, the phenotypic effect level of a variant inferred by SnpEff[@dsz022-B34] can be displayed ([Fig. 2D--F](#dsz022-F2){ref-type="fig"}). The variants and average read depth are shown with blocks scalable from 1 bp to 100 kb in length. Up to 200 blocks are displayed in a window; hence, a region of at most 20 Mb can be viewed at a glance. This block-style summarization of variants by occurrence frequency is quite efficient when users wish to compare genomes in a megabase-scale view. If the user zooms in on a selected region, the nucleotide sequence of a reference genome and its translated amino acid sequences can be shown at a 1-bp resolution. The mapped-read depth information is shown behind the nucleotide variation data in grayscale, and yellow is used to indicate the unmapped region (depth = 0). This depth information is important for distinguishing between no-variant regions and no-mapped-read regions. The regions with no mapped reads occur because of either low sequencing coverage or large deletions, which are often indistinguishable by ordinary variant callers designed for short-read data and hence generally omitted in VCF files. TASUKE+ can show large-scale structural variants described in input VCF files. A pop-up window describing read depth and detailed variant information (variant type, allele of the reference genome, alternative allele, genotype, quality provided by the variant caller and effect of variants) is shown by clicking on a block ([Fig. 2D](#dsz022-F2){ref-type="fig"}). The effects of variants such as nonsense mutations, frame shifts and nonsynonymous mutations, which can be added to VCF files by using SnpEff software,[@dsz022-B34] are displayed with different colour levels signifying MODIFIER, LOW, MODERATE and HIGH by selecting SnpEff mode from a pull-down menu ([Fig. 2E](#dsz022-F2){ref-type="fig"}). This information is of special importance when searching for candidates of causal mutations affecting phenotypes. Furthermore, TASUKE+ has some functions for easily realizing bidirectional links from/to external databases, so that researchers can easily receive information from external databases ([Supplementary Fig. S2](#sup1){ref-type="supplementary-material"}). For example, a link to other websites can be created in a subwindow of annotation information that pops up upon clicking on a gene structure in an annotation track. This link can be defined for each annotation feature with prefix and suffix information described in a configure file. In addition, a specific genomic position or an identifier in an annotation track of the data in TASUKE+ can be written in the following format: [https://tasuke-plus.dna.affrc.go.jp/? chr=chr07&st=5000001&en=6000000](https://tasuke-plus.dna.affrc.go.jp/?chr=chr07&st=5000001&en=6000000). In this way, any external databases can be linked to a specific region of TASUKE+ only by specifying a genomic position or a gene identifier. We expect TASUKE+ to be useful not only as an independent database but also as a database of other omics databases or as a part of an omics data network. 3.2. Visualization of GWAS results ---------------------------------- TASUKE+ was developed to serve as a platform with which to simultaneously visualize GWAS results, sequence variations and annotations and to publish them in an effective manner via a web browser. Given GWAS data sets for multiple phenotypes in the input file format used in the qqman R package,[@dsz022-B29] TASUKE+ displays a Manhattan plot below the genome annotation area so that users can compare annotated gene information with probable candidate regions detected by a GWAS ([Fig. 3](#dsz022-F3){ref-type="fig"}). The main window of TASUKE+ shows genetic polymorphisms such as SNPs and indels in at most 20-Mb regions, together with possible phenotypic effects inferred by SnpEff so that variant effects such as frame shifts, non-sense mutations and splice site mutations are visible. The phenotypic values used for GWAS are displayed in the accession information pane, and the order of accessions is sortable by this information. This feature is helpful for interpreting GWAS results because one can observe patterns of genome-wide distributions of association signals, zoom in to local regions, and search for candidates of causal genes and variants by examining phenotypic effect levels as well as various types of annotation information. There are some web-based services for calculation of GWAS[@dsz022-B38] and, in particular, easyGWAS[@dsz022-B40] also has a function to display GWAS results. In this study, we aimed to provide a flexible visualization program that can show GWAS results in parallel with various mutation data on raw sequence data and their precise annotations. In addition, TASUKE+ can be installed on users' own server and be modified by changing a configuration file to meet demands of a broad range of users. To assist the installation of TASUKE+, detailed information is available at <https://tasuke.dna.affrc.go.jp/installation.html>. ![Exploration of GWAS data. (A) GWAS results are displayed in an interactive Manhattan plot, and a table of summary statistics and variant effects is displayed in a subwindow. (B) Upon clicking on a position in the plot or table, the main window of TASUKE+ moves to the corresponding position. The GWAS results, variants and annotation information can be viewed interactively. (C) Detailed information of variants and possible functional effects inferred by snpEff. Primers for selected sites or regions of interest can be designed quickly. (D) Gene structure of Os01g0846450/LOC_Os01g62780 and a sub-window for the gene information, external link, phylogenetic analysis and export functions. (E) Download list of genotypes and annotation information for a user-selected region.](dsz022f3){#dsz022-F3} To showcase the functionality of TASUKE+, we applied it to the reanalysis of GWAS data generated by Yano et al.,[@dsz022-B26] who conducted a GWAS for seven agronomic traits, including heading date, plant height, awn length and panicle number, with 176 *temperate japonica* rice varieties. We reanalysed the whole data set of raw reads and conducted a GWAS using a linear mixed model with 406,224 SNPs. The TASUKE+ database for these data was constructed with GWAS summary statistics of the seven traits, the variant and read depth, and the data were displayed on the rice reference genome IRGSP-1.0 with variant effect information and gene annotation from the Rice Annotation Project (RAP) and Rice Genome Annotation project of Michigan State University (MSU). This dataset is available at <https://tasuke-plus.dna.affrc.go.jp/>. [Figure 3](#dsz022-F3){ref-type="fig"} shows an example to explore GWAS data for heading date through TASUKE+ (for details of the GWAS data generation, see [Supplementary Fig. S3](#sup1){ref-type="supplementary-material"}). The Manhattan plots for all chromosomes and a table of polymorphic sites with GWAS summary statistics of *P*-values and variant effects for genes are shown interactively in a subwindow ([Fig. 3A](#dsz022-F3){ref-type="fig"}). Variant sites in the table can be filtered by effect level so that users can see a list of only variants having high impacts on gene functions. If one clicks on a specific SNP showing a strong association in the Manhattan plot or in the list of significant associations in the GWAS subwindow, the position of the SNP is immediately shown in the main window ([Fig. 3B](#dsz022-F3){ref-type="fig"}). After jumping to the candidate region of interest, users can examine nearby variants and check proximate genes and inferred LD blocks in annotation tracks by smoothly scaling and moving over genomics regions. Variants are coloured on the basis of the predicted functional effect levels so that candidates for functional polymorphisms associated with the phenotype of interest can be recognized. Users can also design appropriate primers for a specific region ([Fig. 3C](#dsz022-F3){ref-type="fig"}). Browsing the GWAS result and nucleotide variations with their functional effect levels enables users to quickly pick up candidate genes. Os01g0846450/LOC_Os01g62780, which was reported to be a new causal gene for heading date in Yano et al.,[@dsz022-B26] showed a strong association in our reanalysed result as shown in [Fig. 3D](#dsz022-F3){ref-type="fig"}. By clicking on the gene structure, a subwindow for the position, links to external database, phylogenetic analysis and data exports is displayed. A list of genotype information of a specified region or gene for all samples can be exported as a text file ([Fig. 3E](#dsz022-F3){ref-type="fig"}). In this way, exploring GWAS results in parallel with variant information and any kind of annotation information provided by GFF files will be of great use for researchers conducting a GWAS to identify candidate mutations, as recently noted in a rice GWAS report.[@dsz022-B26] Integration of these functionalities in TASUKE+ will provide researchers with an efficient computational environment to interpret GWAS results without referring to multiple data in separate programs and databases. Once researchers find some polymorphisms of interest, PCR primers can be quickly designed in TASUKE+ by using Primer3.[@dsz022-B42] Users can select any region as a target to be amplified and design appropriate primers with various options. To take variant information into account, users can choose the 'Variant masking' option, which masks variable sites in the query sequence to avoid designing primers based on polymorphic sites. The uniqueness of the primers designed for the genome sequence can be checked by the BLAST function. An *in silico* PCR (also known as ePCR) function using MFEprimer[@dsz022-B43] to evaluate the PCR products amplified by the designed primer pairs is provided. In this way, PCR primers for SNPs and indels that can be used as DNA markers are easily designed in TASUKE+. 3.3. Phylogenetic tree reconstruction ------------------------------------- Molecular phylogenetic tree construction was added as a novel function ([Fig. 4](#dsz022-F4){ref-type="fig"}). If users wish to investigate the relationships among genomes of interest, they can select the desired number of genomes stored in TASUKE+ and generate a phylogenetic tree. Users can restrict the regions to be used for the analysis by specifying a genomic position or gene identifier. The genetic distances are calculated by Kimura's 2-parameter model[@dsz022-B44] implemented in DNADIST,[@dsz022-B45] and the phylogeny is reconstructed by using the neighbour-joining method[@dsz022-B46] implemented in NEIGHBOR of the PHYLIP package.[@dsz022-B45] We used treelib-js (<https://github.com/rdmpage/treelib-js/>) to draw the tree. The reconstructed phylogenetic tree can be previewed on TASUKE+ in three styles: rectangular, circular and linear ([Fig. 4A](#dsz022-F4){ref-type="fig"}), and the Newick tree format file, image file and fasta format alignment file of the corresponding region are downloadable so that users can visualize the tree with other viewer programs and conduct further molecular evolutionary analyses with their alignment data. Once a phylogeny is reconstructed in TASUKE+, the phylogenetic relationships of genomes can be reflected in the main variant pane by sorting accessions by order in the phylogenetic tree ([Fig. 4B](#dsz022-F4){ref-type="fig"}). These functions will help users understand how the samples are related at a glance. ![Phylogenetic tree reconstruction. (A) Trees of three styles are illustrated by treelib-js. (B) The order of accessions in the main window can be sorted by the order of names that appears in the inferred phylogeny.](dsz022f4){#dsz022-F4} 4. Conclusion ============= To meet demands in the era of high-throughput sequencing and phenotyping, TASUKE+ has several useful functions such as visualization of GWAS results, phylogenetic tree reconstruction and PCR primer design. TASUKE+ enables users to efficiently integrate GWAS results with variant information including SNPs and indels as well as various annotations, such as genes, repeats and LD blocks. It is also possible to provide links to/from external databases so that users can smoothly move between databases. To showcase the usefulness of TASUKE+, we presented reanalysed GWAS data of 176 rice cultivars and seven traits. TASUKE+ will enhance processing of large-scale sequencing and phenotyping data and will also contribute to omics database networking. Data availability ================= TASUKE+ is freely available at <https://tasuke.dna.affrc.go.jp/>. Supplementary Material ====================== ###### Click here for additional data file. The authors thank H. Sakai, H. Numa, B.A. Antonio, T. Hirozane-Kishikawa, X. Wang and E. Solovieva for their invaluable comments and suggestions for this study. This work was supported by grants (Development of Genome Information Database System for Innovation of Crop and Livestock Production; Genomics-based Technology for Agricultural Improvement, IVG-2001) from the Ministry of Agriculture, Forestry and Fisheries of Japan. M.K., T.T. and T.I. conceived the study. D.N., H.W., R.I. and N.T. designed and implemented the computer programs. M.K. and Y.K. conducted the analyses of resequencing data and the GWAS. M.K., T.T. and T.I. wrote the manuscript. All authors contributed to the research, reviewed the draft and approved the manuscript for publication. Conflict of interest ==================== None declared.
2023-12-15T01:26:18.401715
https://example.com/article/5883
Hospice dog Hospice dog Maggie I finally agreed to getting a dog after a year of my husband and boys asking. I had a lot of requirements for this dog. No drooling, no barking, no jumping, no chewing and pretty much no other annoying dog behavior and had to be potty trained. Definitely no puppies! I’m a cat person can you tell? I also have 4 small rambunctious boys in my house so we needed something not too big and definitely not small. I assumed we’d spend weeks looking for the perfect dog but we went to the pet smart event on our first scouting trip interested in this dog called pita bread and wondering why she had a zero adoption fee. Turns out she had breast cancer which had been removed but since they couldn’t guarantee the cancer wouldn’t come back she was considered a hospice dog. We sat and watched her and fed her treats for quite a while before we decided we’d take her. I just couldn’t leave her there. I didn’t care if she lived a week or lasted 8 more years, she was coming home with us. She had scars all over her face and 2 big ones on her behind. Her face is white while the rest of her is brown. She’s been through some kind of hell. She came from a shelter in San Antonio and had been here for 3 weeks. I couldn’t believe nobody wanted this calm seeet dog! My husband finally got his dog except, day 1, she decided I was her person instead. She likes him just fine but she follows me everywhere! We’ve had her for just about 2.5 weeks now and she is the sweetest most calm dog I have ever met. She ignores our 2 cats, is sweet with the kids, and hasn’t barked once. She’s become more playful since we got her and loves to run! She also got a clean bill of health from the vet and we’re hoping she sticks around for many more years to come. She has also decided she loves the baby and will lay next to him wherever he’s playing. Pita bread is now my Maggie girl and we couldn’t be happier! I still can’t believe we have a dog and I am so glad she waited for us! She brings so much joy to our family! <3 Dog Retriever mix 8 05/19/2018 Casey Submit YOUR Happy Tail Would you like your Happy Tail featured on the website, on Facebook, or in Brief Paws quarterly newsletter? Submit your Happy Tails of adoption with photos here! Tell us about your adoption alumni’s accomplishments, special skills, or certifications! Your Pet's Information Name of your pet* Dog or Cat* Dog Cat Breed Age in Years* Please enter a value between 0 and 30. Date Adopted* Estimates are ok! Your Contact Information Full Name* Not to be displayed on the website. FirstLast Displayed Name* for the website Email* Phone Address* Street AddressCityStateZIP Code Your Happy Tail Photos of Your Pet* Upload photos of your pet with your family! Large portrait photos of you with your pet may be considered for the cover of Brief Paws.
2023-11-10T01:26:18.401715
https://example.com/article/8914
A Few Tips for Great Pasta It wasn’t until I went along with a friend while visiting New York City several years ago that I really learned to appreciate the beauty of pasta. Mario Batali’s Babbo’s is a phenomenal restaurant and by miles the best Italian food I have ever had. There are just a few simple things to making amazing pasta dishes. 1. Fresh Pasta Noodles 2. A Simple Red Sauce 3. Don’t Over Sauce For noodles, I recommend one of the gems of Southeastern Michigan – Ventimiglia Italian Foods in Sterling Heights. I make at least one trip there a month and you can stock up on fresh pasta and freeze it with still better results than any dry pasta purchase. If you can’t get to Ventimiglia, try making your own pasta. It really isn’t as hard as it looks. After about 2 or 3 times you will become a pro. I promise. For the red sauce (photo above), I use Batali’s Basic Red Sauce recipe. The most important thing about this recipe is using the right canned whole peeled tomatoes. I highly recommend using ONLY Carmelina ‘e San Marzano. I make it according the recipe and freeze about 4 containers with enough sauce for making a pound of pasta. You can change up this sauce in a variety of ways. Here are a couple ideas: Add fresh ricotta and spinach. Add crumbled cooked italian sausage and 2 teaspoons of balsamic vinegar (and either blend in a food processor or not, either way is great.) Add mushrooms, fresh basil, and thinly sliced chicken breast. Or try your own modification. For the best sausage, I recommend Alcamo’s Market in Dearborn. They make some amazing sausages including classic Italian and some very interesting varieties like their parsley, wine and cheese sausage and an orange peel sausage. Finally, don’t over sauce. It is all about just having enough to coat the pasta, not drown it. This is my biggest issue with 95% of the Italian restaurants I have been to.
2023-11-13T01:26:18.401715
https://example.com/article/4358
Local Police News- On The Beat Firefighters were called to a house fire in Bridge Street, North Lismore, yesterday (Wednesday) where they found the back rear section completely ablaze. The fire appeared to have started in the kitchen, and a bedroom and lounge room were also completely destroyed. The remainder of the house was also damaged by heat, smoke and water and all contents were destroyed. A woman and child were treated for shock and taken to Lismore Base Hospital. Police were called to Alstonville on Saturday night after a party was inundated with about 150 gatecrashers around 9.50pm. The party, in Maple Street, had around 20 invited guests. Police were kept busy with complaints of anti social behaviour, drunkenness, bottle smashing and noise complaints. Two searches in Alstonville and Larnook last week resulted in police seizing cannabis plants, cannabis leaf and a considerable amount of hydroponic equipment. At 7.40am police raided an industrial premises in Russellton Drive, Alstonville, where they located nine cannabis plants being grown hydroponically. At 10.30am they searched a rural property on Olley Road, Larnook, and seized a total of 39 cannabis plants, 434 grams of cannabis heads and hydroponic equipment. A 53-year-old Larnook man has been charged with supply and possession of a prohibited drug as a result. A 39-year-old Lismore woman has been arrested and charged for maliciously damaging a 2000 Subaru at 5pm on Tuesday afternoon. It is alleged the vehicle was damaged in Dawson Street when the female threw an object at the car from a neighbouring property. Police at Casino have arrested and charged three youths (aged 10, 11 and 12) with break and enter to a premises in Bent Street, Casino, between 6pm and 6.17pm on Tuesday afternoon.
2023-10-11T01:26:18.401715
https://example.com/article/5078
Enterostomal Therapy Training Programs.
2023-08-02T01:26:18.401715
https://example.com/article/1356
package org.reveno.atp.utils; import org.reveno.atp.core.api.channel.Buffer; import java.io.UnsupportedEncodingException; import java.security.MessageDigest; import java.util.zip.CRC32; public abstract class BinaryUtils { public static long bytesToLong(byte[] b) { return ((((long) b[0]) << 56) | (((long) b[1] & 0xff) << 48) | (((long) b[2] & 0xff) << 40) | (((long) b[3] & 0xff) << 32) | (((long) b[4] & 0xff) << 24) | (((long) b[5] & 0xff) << 16) | (((long) b[6] & 0xff) << 8) | (((long) b[7] & 0xff))); } public static void longToBytes(long l, byte[] b) { b[0] = (byte) (l >> 56); b[1] = (byte) (l >> 48); b[2] = (byte) (l >> 40); b[3] = (byte) (l >> 32); b[4] = (byte) (l >> 24); b[5] = (byte) (l >> 16); b[6] = (byte) (l >> 8); b[7] = (byte) l; } public static int bytesToInt(byte[] b) { return ((((int) b[0] & 0xff) << 24) | (((int) b[1] & 0xff) << 16) | (((int) b[2] & 0xff) << 8) | (((int) b[3] & 0xff))); } public static byte[] intToBytes(int l) { return new byte[]{ (byte) (l >>> 24), (byte) (l >>> 16), (byte) (l >>> 8), (byte) l }; } public static final int intlongToBytes(int value, long lval, byte[] data) { int result = 1; data[0] = (byte) (value >>> 24); result = 31 * result + data[0]; data[1] = (byte) (value >>> 16); result = 31 * result + data[1]; data[2] = (byte) (value >>> 8); result = 31 * result + data[2]; data[3] = (byte) value; result = 31 * result + data[3]; data[4] = (byte) (lval >>> 56); result = 31 * result + data[4]; data[5] = (byte) (lval >>> 48); result = 31 * result + data[5]; data[6] = (byte) (lval >>> 40); result = 31 * result + data[6]; data[7] = (byte) (lval >>> 32); result = 31 * result + data[7]; data[8] = (byte) (lval >>> 24); result = 31 * result + data[8]; data[9] = (byte) (lval >>> 16); result = 31 * result + data[9]; data[10] = (byte) (lval >>> 8); result = 31 * result + data[10]; data[11] = (byte) (lval); result = 31 * result + data[11]; return result; } public static void writeNullable(long flag, Buffer buffer) { if (flag == 0L) { buffer.writeByte((byte) 0); } else { buffer.writeByte((byte) 1); buffer.writeLong(flag); } } public static long readNullable(Buffer buffer) { byte sign = buffer.readByte(); if (sign == 1) { return buffer.readLong(); } return 0L; } public static byte[] sha1(String value) { try { return MessageDigest.getInstance("SHA1").digest(value.getBytes("UTF-8")); } catch (Exception e) { throw Exceptions.runtime(e); } } public static long crc32(String value) { CRC32 crc = new CRC32(); try { crc.update(value.getBytes("UTF-8")); } catch (UnsupportedEncodingException e) { throw Exceptions.runtime(e); } return crc.getValue(); } }
2023-12-21T01:26:18.401715
https://example.com/article/4362
Savannah Kim: I just sold what I had this morning at .447 and bought at .32 Isaiah Cain: Anyone get it at 25? Karen Rogers: 195 @ .25; holding. Isaiah Cain: Karen Rogers: niiice!! Karen Rogers: Wish I had bought more but I’m on a learning curve! Isaiah Cain: I know mee too I only bought a few! 😅 Alex McCord: Cassidy Knight: 300 @ .27 going to hold Aubrey Harris: Mine doesn t show its been down to .32 Savannah Kim: I purchased at .32 around 2.5 weeks ago Aubrey Harris: How long b4 we can buy cryptocurrency on here going to put some in dogecoin it’s so cheap Savannah Kim: I bought it a while ago Aubrey Harris: Oh ok good deal was wondering if my ticker was jacked up Aubrey Harris: Good luck everybody going back to sleep Josue Davidson: Was holding it since the 2nd. Gave up on it and cut my losses today. Far too much speculation surrounding this stock to be having my money tied to a maybe this long. Timothy Alexander: I cut my loss as well today. Enough is enough. Lainey Huff: For a month now Josue Davidson: You caught it before it exploded upwards. Most people weren’t that lucky and it’s stagnated since. Too bad you didn’t put more into it! Lainey Huff: Josue Davidson: hindsight is always 20/20 Ivan Patton: Holding wish I would of bought a bunch more at .27 Beau Miles: I got in late but I will be holding for $1. Josue Davidson: Not going to happen any time soon. They have a history of decreasing in value after every ER regardless of positive or negative results, have only until March to break $1 or lose their listing, and no set date on FDA. I help out hope too but there is far too much optimism surrounding this stock instead of facts. Beau Miles: Josue Davidson: do you think we will break the .50 mark? Josue Davidson: Beau Miles: hard to say, anything could happen but the last time we were sitting significantly about .50 was in October, which was quite a while ago. With no set news on the way aside from the ER I am not hopeful. I see a ton of chatter about the potential of this stock, but I’m not seeing it. I could definitely be wrong, but for sake of my own piece of mind I jumped ship with a slight loss. Luis Sandoval: If you can afford it why not just hold. Put money in and forget about it. That’s what the most successful stock traders do. Josue Davidson: Most successful stock traders don’t bag hold penny stocks, because 90% never break $1. AKER already failed to meet the requirements to stay listed, but got an extension to the end of March, which is usually what happens before inevitable failure. Again…See more Kelsey Nichols: I bag it all the time and make a profit. I don’t hold it longer than 24 hours but I make a profit every single time Sophia Weber: What doea it mean if the volume of shares is higher than the market cap Kelsey Nichols: Nothing. Depends on if those shares are bought or sold Lauryn Glover: I got in at .22 Devin Diaz: It’s dying quick Callie Reid: For about a month now Kelsey Nichols: I day trade AKER as much as Charlie sheen buys prostitutes and get blow. (For those that don’t get it, that’s a lot) Aubrey Harris: Just sold all mine took my 20 dollar loss Dean Williamson: 🚀🚀 $1.xx Blaze Dimitrov: Gabriella Ryan: Get good kids. Callie Reid: How long ago was that Lincoln Owens: I’m in at .19!! Everleigh Hawkins: I think it would stay tits avg from .40 to .44 but couple days I believe it will jump .45 -.55 Devin Diaz: What makes you think that? Everleigh Hawkins: Looking at past and trend lines Devin Diaz: i heads the company will be delisted soon , that fda approval never happens, I hope I am wrong…AKER made me some good money Connor Sparks: Devin Diaz: they have till May 29th to close 10 consecutive days over $1, even if they fail to meet that they could qualify for 180 day extension. The stocks not dead yet it’s just one to not forget about for 4 months Devin Diaz: well hopefully it survives, will see Connor Sparks: They have promise and wall Street and had went bullish on them before the Dow crash so I’m hopeful but getting Leary as time passes
2023-12-08T01:26:18.401715
https://example.com/article/9063
Development of a preventive dental care programme for children and adolescents in the county of Jönköping 1973-1979. Dental research the last two decades has created a basis for understanding the etiology, prevention and treatment of dental diseases. As a consequence, particular interest has been focused on the effect of prophylactic measures, efficiently organized and carried out, for various groups of individuals. However, it has proved difficult to organize systematic integrated preventive dental care for large parts of the population. The present paper describes in detail the development of integrated preventive dental care for children and adolescents in the County of Jönköping. Sweden, from 1973 to 1979. Based on the circumstances that existed before 1973 as regards e.g. personnel and the nature and content of the prophylactic measures, a description is made of the aims, methods, target groups, organization, financing and evaluation of a preventive dental care organization gradually developed for the age groups 0-16 years in the whole county (308,000 inhabitants; 4,000 individuals in each age-group). Important practical information as to the performance of the organization is given as well as examples of both basic preventive dental care programmes and supplementary programmes intended for individuals exhibiting a high prevalence of caries and gingivitis. As an effect of the programme instituted of remarkable improvement in dental health among children and adolescents has been achieved.
2023-10-23T01:26:18.401715
https://example.com/article/4286
Tropical Storm Isaac took aim at Louisiana and other U.S. Gulf states Monday, GOP prepares for Republican National Convention in Tampa, a “Robot Restaurant” opens in Kabukicho, one of Tokyo’s best known red light districts, and more in today’s daily brief.More
2024-03-04T01:26:18.401715
https://example.com/article/1092
Chinese researchers are publishing more than three times as many research papers on cancer topics than they were a decade ago, closing the gap with their U.S. counterparts. China now has more than 17% of the global share of cancer research publications, up from around 5% in the mid-2000s, and now matches the output of the U.S. in 2005, according to a just-published report from science publisher Elsevier. China's advancement has been driven by a rise in R&D spend as a share of Gross Domestic Product (GDP) as well as "a shift from socialist economic planning to a more market driven system over the past decade," says the report, which is benchmarking the current state of worldwide cancer research as part of an intelligence-gathering effort for the White House 'Cancer Moonshot'. Whitepaper Download Reducing the Complexity and Costs of Channel Planning and Logistics How can you make the process of bringing your product to market less complex while also reducing costs? This Whitepaper identifies opportunities to simplify channel strategies for biopharma companies, their customers and patients. Discover how you can deliver savings and innovation to your business. Download for Free The Moonshot—launched last year by Vice President Joe Biden last year in an attempt to reduce the deaths from the disease—is striving to make "a decade worth of advances in cancer prevention, diagnosis and treatment in five years." The number of cancer cases is projected to nearly double over the next 20 years as the global population gets older. The data detailing emergence of China as a cancer research powerhouse comes against a backdrop of well-publicised advances by Chinese research teams, including the recent news that a Chinese team has become the first to test gene-editing technology CRISPR in human trials. "The U.S. share of cancer research has been declining over the past decade," says the report, although all the countries covered show a steady increase in output. That slippage has come about largely because of the "significant increase in China's cancer research publication output." Other countries with a heritage in cancer R&D—including Japan, the UK, Germany, Italy, France and Canada—have seen their shares stay relatively stable. "With the number of cancer cases projected to nearly double over the next 20 years, we understand the unprecedented urgency to control cancer by deploying all available advantages that might spur research breakthroughs," said Elsevier's Brad Fenwick, who is heading up the data-gathering initiative. The study is the first in a series of reports planned by Elsevier to help cancer researchers accelerate progress and mitigate some of the challenges associated with the development of "new operational approaches, policies, and funding strategies." An overarching report analysing the findings is due to be published before the end of 2017. In the meantime, Elsevier has set up a free-to-access database of cancer-related resources to support the Moonshot.
2023-12-07T01:26:18.401715
https://example.com/article/4986
<?php /* * Copyright 2014 Google Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not * use this file except in compliance with the License. You may obtain a copy of * the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations under * the License. */ class Google_Service_DisplayVideo_Channel extends Google_Model { public $advertiserId; public $channelId; public $displayName; public $name; public $partnerId; public function setAdvertiserId($advertiserId) { $this->advertiserId = $advertiserId; } public function getAdvertiserId() { return $this->advertiserId; } public function setChannelId($channelId) { $this->channelId = $channelId; } public function getChannelId() { return $this->channelId; } public function setDisplayName($displayName) { $this->displayName = $displayName; } public function getDisplayName() { return $this->displayName; } public function setName($name) { $this->name = $name; } public function getName() { return $this->name; } public function setPartnerId($partnerId) { $this->partnerId = $partnerId; } public function getPartnerId() { return $this->partnerId; } }
2023-11-21T01:26:18.401715
https://example.com/article/4785
Bahamas reiterates its commitment to promoting sustainable development The Bahamas solemnly reaffirms her commitment to the three pillars of sustainable development: economic, social and environmental. So says Minister of Foreign Affairs Frederick Mitchell. He told the 67th session of the General Assembly that advancements continue nationally in important areas pertaining to the protection of its biodiversity and development of policies to promote renewable energy. Frederick Mitchell: Some argue that finding out how to provide reliable and affordable energy may be the single largest factor affecting the future development of The Bahamas. This issue is so important to us that the Prime Minister has taken it as a personal mission to seek to solve this issue. We know that we must do it sustainably. The Bahamas has enacted legislation to foster the sustainable use and management of ecosystems, through better land-use planning. Under the United Nations Convention on Law of the Sea we have initiated actions to preserve our fish stock by introducing penalties for over-fishing. We have also taken action to ban long line fishing, to establish The Bahamas as a shark sanctuary, and, to establish and expand marine protected areas. For The Bahamas it is imperative that these Sustainable Development strategies are complemented with appropriate actions taken by the international community. Foreign Minister Mitchell noted that in this respect, The Bahamas views the historic outcome of the Rio+20 Conference as offering significant opportunities, particularly for Small Island Developing States (SIDS). On the question of Haiti, Foreign Minister Mitchell stressed that The Bahamas has been unremitting and consistent in her support for the People of Haiti and their aspirations for peace, security and development. At the same time, he commended the important role of the United Nations Stabilization Mission in Haiti (MINUSTAH) in providing security in Haiti and in laying the foundation for its long-term recovery and stability. Frederick Mitchell: Pledges made toward Haiti’s recovery and reconstruction must be honoured and fulfilled so that the required work can be undertaken and completed. The Bahamas welcomes increased dialogue on improving international cooperation with respect to international migration and development. Illegal migration from Haiti is a vexing issue for our country. We agree that proper cooperation can certainly help to ensure that migration occurs through safe and regulated channels, as well as leverage the contributions that migrants can make to development. The Bahamas will continue to participate constructively in the process leading to the second High-level Dialogue on International Migration and Development to be held by the General Assembly in 2013, with a view to addressing these and other related issues so crucial to our development. Given the events over the past year in The Bahamas with regard to illegal migration, some tragic, and, poaching in our seas from illegal persons from the south of us, The Bahamas will be taking stronger measures over the next year to put a stop to these illegal activities. We appeal to all nations in the region to prevail upon their citizens to cease and desist from these unlawful activities. Foreign Minister Mitchell concluded that The Bahamas intend to work both bilaterally and with the broader international community to stop these assaults on our national and economic security.
2024-01-11T01:26:18.401715
https://example.com/article/4761
Question of the Day Does President Trump need to fire more Cabinet members? Story TOpics Tampa Bay Buccaneers 2017 first round draft pick O.J. Howard holds up a jersey during an NFL football news conference Friday, April 28, 2017, in Tampa, Fla. Howard was a tight end at Alabama. (AP Photo/Chris O’Meara) more > TAMPA, Fla. (AP) - The Tampa Bay Buccaneers feel good about Jameis Winston’s chances of making them relevant again. Even more after the NFL draft. Tight end O.J. Howard, receiver Chris Godwin and running back Jeremy McNichols are the latest additions to an offense that could be more potent beginning next season. Safety Justin Evans, linebacker Kendall Beckwith and run-stopper Stevie Tu’ikolovatu will compete for playing time on a defense led by five-time Pro Bowl tackle Gerald McCoy that played well while the Bucs were winning six of eight games to climb into playoff contention late last season. “Everybody’s thinking big right now, which is good,” coach Dirk Koetter said Saturday. “But today is not the day or time of the year you need to give these guys a pep talk about what we’re going to be,” he added. “We’re a team that’s building, a team that’s getting better. We’re trying to chip away at it every day.” Winston, the No. 1 overall pick in the 2015 draft, has thrown for more than 8,000 yards since entering the league. But last year’s 9-7 finish wasn’t enough to prevent Tampa Bay from missing the playoffs for the ninth consecutive season. There will be pressure to change that trend after signing veteran receiver DeSean Jackson in free agency and surrounding Winston and Pro Bowl receiver Mike Evans with more playmakers via the draft. If two-time Pro Bowl running back Doug Martin can revert to his form of two years ago after missing most of 2016 because of injuries and suspension, the offense figures to be significantly better than last season. Winston texted general manager Jason Licht to express his appreciation after Howard, who many scouts rated as a top-10 pick, was selected No. 19 overall. “It looks pretty good on paper right now. I think we’ve added some targets that I know he’s going to like,” Licht said. “I’m going to venture to say that he got better,” the GM added of his 23-year-old quarterback. “I don’t know how much better. We’ll see. We’ve got a long ways to go yet, but we’re excited about it.” Things to know about Tampa Bay’s draft: LATE ADDITIONS The Bucs had two picks over the final four rounds of the draft Saturday, selecting McNichols in the fifth round out of Boise State and Tu’ikolovatu out of Southern California in the seventh. NEEDS ADDRESSED If there was one area the Bucs hoped to upgrade more than any other, it was improving the team’s overall speed. The selections of Howard, Godwin, McNichols and even Smith, who also was a good kickoff returner in college, should help with that issue. “I know I’ve mentioned this before, that speed was one thing that we felt like we needed to add, I should say, to this team,” Licht said. “Dirk and I talked about it numerous times. In fact in my office I have it written on my grease board, and it’s been there for several months right now.” SURE TO START? Not so fast now. Although the Bucs envision the 6-foot-6, 242-pound Howard as a potential game-breaker, the team also has Cameron Brate, who tied for the NFL lead in touchdown receptions among tight ends with eight last season. Koetter serves as his own offensive coordinator and will find plenty of ways to get both of them of the field at the same time. Same can be said for Godwin and McNichols, who figure to be backups, too. DOUGIE’S FUTURE Turns out drafting a running back wasn’t as a big a priority as Martin’s situation seemed to suggest. Martin’s suspension for violating the NFL’s policy on performance-enhancing drugs extends three games into next season. He joined the team for offseason conditioning drills last week, and Licht said he’s been encouraged by what he’s seen. “We’ve been happy with the trajectory that he’s on. I’ve said that before, but it’s the truth. He has the right mindset right now and looks good physically,” Licht said. “We still have some time there. Just two years ago he was the second-leading rusher in the NFL.” ___ For more NFL coverage: https://www.pro32.ap.org and https://www.twitter.com/AP_NFL. The Washington Times Comment Policy The Washington Times is switching its third-party commenting system from Disqus to Spot.IM. You will need to either create an account with Spot.im or if you wish to use your Disqus account look under the Conversation for the link "Have a Disqus Account?". Please read our Comment Policy before commenting.
2023-12-05T01:26:18.401715
https://example.com/article/5666
Halliburton has agreed to plead guilty to destruction of evidence in the Deepwater Horizon oil drilling tragedy. The plea deal — which is still subject to court approval — means they'll pay the maximum available statutory fine, be subject to three years probation, and continue to cooperate with the government's investigation. The company made a separate and voluntary contribution of $55 million to the National Fish & Wildlife Foundation. The Deepwater Horizon drilling rig exploded off the Gulf of Mexico on April 20, 2010, killing 11 workers and injuring 16 others. The spill of roughly 4.9 million barrels of oil into the gulf lasted 87 days, and remains the largest spill in U.S. history. Halliburton was used as the cement contractor for the drilling rig. According to details released today from the Department of Justice, employees were directed to and did destroy evidence of alleged wrongdoing in the disaster. Here's the full statement from the DoJ: Halliburton Energy Services Inc. has agreed to plead guilty to destroying evidence in connection with the Deepwater Horizon disaster, the Department of Justice announced today. A criminal information charging Halliburton with one count of destruction of evidence was filed today in U.S. District Court in the Eastern District of Louisiana. Halliburton has signed a cooperation and guilty plea agreement with the government in which Halliburton has agreed to plead guilty and admit its criminal conduct. As part of the plea agreement, Halliburton has further agreed, subject to the court’s approval, to pay the maximum-available statutory fine, to be subject to three years of probation and to continue its cooperation in the government’s ongoing criminal investigation. Separately, Halliburton made a voluntary contribution of $55 million to the National Fish and Wildlife Foundation that was not conditioned on the court’s acceptance of its plea agreement. According to court documents, on April 20, 2010, while stationed at the Macondo well site in the Gulf of Mexico, the Deepwater Horizon rig experienced an uncontrolled blowout and related explosions and fire, which resulted in the deaths of 11 rig workers and the largest oil spill in U.S. history. Following the blowout, Halliburton conducted its own review of various technical aspects of the well’s design and construction. On or about May 3, 2010, Halliburton established an internal working group to examine the Macondo well blowout, including whether the number of centralizers used on the final production casing could have contributed to the blowout. A production casing is a long, heavy metal pipe set across the area of the oil and natural gas reservoir. Centralizers are protruding metal collars affixed at various intervals on the outside of the casing. Use of centralizers can help keep the casing centered in the wellbore away from the surrounding walls as it is lowered and placed in the well. Centralization can be significant to the quality of subsequent cementing around the bottom of the casing. Prior to the blowout, Halliburton had recommended to BP the use of 21 centralizers in the Macondo well. BP opted to use six centralizers instead. As detailed in the information, in connection with its own internal post-incident examination of the well, in or about May 2010, Halliburton, through its Cementing Technology Director, directed a Senior Program Manager for the Cement Product Line (Program Manager) to run two computer simulations of the Macondo well final cementing job using Halliburton’s Displace 3D simulation program to compare the impact of using six versus 21 centralizers. Displace 3D was a next-generation simulation program that was being developed to model fluid interfaces and their movement through the wellbore and annulus of a well. These simulations indicated that there was little difference between using six and 21 centralizers. Program Manager was directed to, and did, destroy these results. In or about June 2010, similar evidence was also destroyed in a later incident. Halliburton’s Cementing Technology Director asked another, more experienced, employee (“Employee 1”) to run simulations again comparing six versus 21 centralizers. Employee 1 reached the same conclusion and, like Program Manager before him, was then directed to “get rid of” the simulations. Efforts to forensically recover the original destroyed Displace 3D computer simulations during ensuing civil litigation and federal criminal investigation by the Deepwater Horizon Task Force were unsuccessful. In agreeing to plead guilty, Halliburton has accepted criminal responsibility for destroying the aforementioned evidence. The guilty plea agreement and criminal charge announced today are part of the ongoing criminal investigation by the Deepwater Horizon Task Force into matters related to the April 2010 Gulf oil spill. The Deepwater Horizon Task Force, based in New Orleans, is supervised by Acting Assistant Attorney General Mythili Raman and led by John D. Buretta, who serves as the director of the task force. The task force includes prosecutors from the Criminal Division and the Environment and Natural Resources Division of the Department of Justice; the U.S. Attorney’s Office for the Eastern District of Louisiana and other U.S. Attorney’s Offices; and investigating agents from: the FBI; Department of the Interior, Office of Inspector General; Environmental Protection Agency, Criminal Investigation Division; Environmental Protection Agency, Office of Inspector General; National Oceanic and Atmospheric Administration, Office of Law Enforcement; U.S. Coast Guard; U.S. Fish and Wildlife Service; and the Louisiana Department of Environmental Quality. The case is being prosecuted by Deepwater Horizon Task Force Director John D. Buretta, Deputy Directors Derek A. Cohen and Avi Gesser, and task force prosecutors Richard R. Pickens II, Scott M. Cullen, Colin Black and Rohan Virginkar. An information is merely a charge and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt.
2024-07-25T01:26:18.401715
https://example.com/article/3150
Q: How can I specify a Windows drive letter when using subversion svn+ssh How can I specify a Windows drive letter when using subversion svn+ssh? Is it even possible? On one system this works: svn list svn+ssh://username@hostname://Preserve/svn_repository But on that machine, all of svn and the repository and where ssh logs into are all on the C: drive. On a new machine, the subversion repository is on the N: drive, but ssh and the svn command live on the C: drive. I haven't been able to come up with a path specification that finds my repository (the repository is in this directory: N:\Preserve\Repositories\jbp) Note that I can access it when I am logged into the machine via this command: svn list file:///N:/Preserve/Repositories/jbp As an example here is a call that FAILS using svn+ssh svn list svn+ssh://username@hostname/N:/Preserve/Repositories/jbp A: If you want a file based reference, you need to use a file based URI. Note that the hostname is "localhost" and if you omit it, then the URI standard will assume you meant localhost. If you decide to attempt to access a file from a different machine; well, then you need a network URI (which may be a URL). It is not possible to directly access a file system that lies on the other side of a network, you must use the network to access the file system on your behalf. For Unix like systems. file://localhost/etc/fstab file:///etc/fstab For Windows like systems, the colon creates issues with the URI format. Some libraries replace the colon in C: with a pipe (or bar) like C|. Other libraries bend the rules on Windows file URIs and allow an extra colon. For systems that use colon replacement with bar file://localhost/c|/WINDOWS/clock.avi file:///c|/WINDOWS/clock.avi For systems that slightly violate the URI format file://localhost/c:/WINDOWS/clock.avi file:///c:/WINDOWS/clock.avi Wikipedia gets most of the credit on this one, but I've used file based URIs before with Subversion, they work fine (especially for creating a small repository in your own home directory to track changes on one-man hobby projects).
2024-01-29T01:26:18.401715
https://example.com/article/3474
Lipoprotein patterns in acrylamide gel electrophoresis. Lipoproteins of serum stained before electrophoresis gave distinct patterns in acrylamide gel of 3-percent concentration. Samples compared in parallel on gel slabs showed qualitative differences in migration rates of beta-lipoprotein bands.
2024-06-30T01:26:18.401715
https://example.com/article/1992
Star Wars Celebration future filmmakers live blog and closing ceremony live stream Star Wars Celebration is coming to a close at the ExCeL London Exhibition Centre, and starting at 4:00 p.m. BST / 11:00 a.m. EDT / 8:00 a.m. PDT, the closing ceremonies and Future Filmmakers discussion panel will begin. Though the Future Filmmakers panel won’t be part of the live stream, our own Silas Lesnick will be live-blogging the event ahead of the Closing Ceremony live stream, both of which you can check out below! Get a glimpse of what the future holds in the Star Wars galaxy when the Lucasfilm Story Group’s Pablo Hidalgo hosts a discussion with filmmakers Kathleen Kennedy, Kiri Hart, Rian Johnson (Star Wars: Episode VIII), and directing duo Chris Miller and Phil Lord (the untitled Han Solo Star Wars Story). The “Future Filmmaker Discussion,” set for Celebration Stage on Sunday, July 17, is sure to include some surprises and end the weekend on a high note. Star Wars Celebration 2016 is Lucasfilm’s love letter to fans. The event will feature three fun filled days of costumes, exhibits, a vibrant, interactive show floor, screenings, exclusive merchandise, celebrity guests, panels, autograph sessions, fan-inspired activities, and other surprises celebrating all things Star Wars. Star Wars Celebration 2016 aims to deliver a landmark experience where memories are made, families brought together, old friends reunited, and new friendships formed — all in the setting of the ever-evolving Star Wars universe.
2024-04-26T01:26:18.401715
https://example.com/article/4875
Voice over IP (VoIP) technology will boom across the region, but telcos must look at providing “sexy” offerings to compete, according to Skype software's co-founder Morten Lund. Voice over IP (VoIP) technology will boom across the region, but telcos will need to provide “sexy” offerings to compete, according to Skype software's co-founder Morten Lund. In Dubai to discuss several forthcoming IT projects with investors, Lund found the time to tell itp.net how he believes VoIP will affect Middle East phone and PC communications. Telecommunications providers in the region have been relatively slow to embrace the concept of VoIP as an end user service, often seeing it as a challenge rather than an opportunity. However as Lund sees it, it can help them increase internet penetration in the region and thus boost net revenues. “They can make the money from the internet connection,” he claimed. “The infrastructure is already in place. I was in Romania using a dial-up line to call a partner in Sydney and the line was clear. Skype software only takes nine kilobytes of bandwidth for the voice connection, so if you are not using the line for anything else you can easily talk at that rate. But telcos can make more money from broadband and additional services.” Lund went on to offer telcos a word of warning. While he claimed that every broadband provider will have their own internet telephony offering in the future, they need to concentrate on offering what he calls a “sexy” service. “Having a mocked up VoIP program cut and pasted overnight by three guys just doesn’t work,” he added. “You want to have something with a big user base and service fees. That is where Skype has the potential. It is the fastest growing software in the world ever. The numbers are off the curve.” Despite some users viewing VoIP as a new technology, Lund detailed how it is already being used the world over: “What you have now in your pocket, the mobile, this is already VoIP. The biggest VoIP carriers in the world are the mobile GSM networks. A landline that uses a GSM structure to call another part of the globe is VoIP. It is simply packets of data.” “Internet telephony software such as Skype changes the whole communications picture,” he added. “Beyond making a local call, people don’t talk because it is too expensive, whereas if you find somebody on Skype you can talk as much as you want because it is an open platform.”
2024-06-06T01:26:18.401715
https://example.com/article/8908
Proverbs and Quotes Pimsleur Czech Pimsleur is our best-selling language course. Why? Because the Pimsleur Method is the most respected way to learn a foreign language. The feedback from our customers is overwhelmingly positive. To meet our sales goals, we sell the entire line of 30-lesson "Comprehensive" Pimsleur courses at significantly below retail price. Many of the most popular courses are now available on CD as well. Pimsleur Courses listed as "Comprehensive" (with the exception of Hebrew) come as 30 units on 16 CDs; courses listed as "Compact" come as 10 units on 5 CDs. Multiple levels are available in many languages. Pimsleur courses come in a sturdy case containing the CDs and instructions for the course. If you have any questions, please e-mail us at sales at multilingualbooks dot com. Pimsleur Czech This is a state-of-the-art language learning course for spoken Czech. The popular Pimsleur course does not use a book but uses a completely aural approach to language learning, perfect for learning "on-the-go". Features a proficiency-based system that helps the student learn through listening and speaking practice.
2023-11-23T01:26:18.401715
https://example.com/article/8525
Tetrahydrouridine, cytidine analogues, and hemoglobin F. 5-Azacytidine (azaC) has previously been shown to raise Hb F levels in the repeatedly phlebotomized baboon (PCV: around 20%). The administration of tetrahydrouridine (THU), an inhibitor of the enzymatic conversion of azaC to 5-azauridine, made it possible to reduce the amount of azaC and also of 2-deoxy-5-azacytidine (d-azaC) by more than 90% and still achieve maximal Hb F elevations. However, the granulocytopenia, usually occurring after 5-azaC, was not altered by the lowering of the dosages in the presence of THU. Thus, the granulocytopenia is not due to 5-azauridine or other catabolic products resulting from deamination. It is also unlikely that it is caused by a direct influence of azaC on RNA since d-azaC also causes granulocytopenia. The persistence of reticulocytosis throughout the treatment with azaC or d-azaC makes it appear likely that the observed increase in Hb F levels to more than 60% of total hemoglobin is not due to a cytotoxic effect on erythropoiesis resulting in a shift of cell populations toward greater immaturity, but to a direct influence of the drug on the regulation of gamma globin chain production.
2024-07-17T01:26:18.401715
https://example.com/article/3563
--- bibliography: - 'biblio.bib' date: 'Received  / Accepted –' title: 'Pressure distribution of the high-redshift cluster of galaxies with NIKA [^1]' --- Introduction {#sec:introduction} ============ Galaxy clusters are the largest gravitationally bound objects in the Universe. They arise from the collapse of primordial matter fluctuations, forming overdensity peaks at the intersection of filamentary structures. They offer a unique tracer of the matter distribution and a powerful probe for cosmology because they form across the expansion of the Universe. (See, for example, [@allen2011] and references therein for a detailed review.) Clusters are mainly made of dark matter (about 85% of their total masses), but also of hot ionized gas (about 12%) and of the stars and interstellar medium within galaxies (a few percent), representing the baryonic component that can be used to detect and study them. Optical observations have been historically used to measure their total mass [@zwicky1933] – typically around $10^{14} M_{\sun}$ – from galaxy velocity dispersion and, more recently, from lensing measurements of background objects [see @bartelmann2010 for a review]. Since galaxy clusters form by accreting of surrounding material (dark matter, galaxies, and gas) and by merging with other clusters, they can be the source of a significant amount of non-thermal emission. Radio measurements around 1 GHz are used to explore such processes [e.g., @feretti2011]. The hot gas contained in the intracluster medium (ICM) – a few keV – emits X-ray photons due to the bremsstrahlung of energetic electrons [see @sarazin1988]. Therefore, X-ray imaging can be used to study the electronic density distribution in galaxy clusters (with a weak dependence on the temperature). In addition, X-ray spectroscopy provides the possibility of measuring the ICM temperature [see, for example, @bohringer2010]. To be used for cosmology, galaxy clusters observables need to be related in some way to their total mass. The precise calibration of such scaling relations requires to use as many available probes (that are complementary to each other) as possible. The thermal Sunyaev-Zel’dovich [tSZ, @sunyaev1972; @sunyaev1980] effect provides such a probe. It is due to the inverse Compton scattering of cosmic microwave background (CMB) photons with high-energy electrons in the ICM. The photons are shifted to higher frequencies providing a characteristic spectral distortion of the CMB, observable at millimeter wavelengths. Since the observable is not the cluster itself but the CMB, tSZ offers a key advantage because it does not suffer from cosmological dimming as do other probes. Its amplitude is directly proportional to the pressure distribution in clusters and is therefore expected to provide a low scatter mass proxy when assuming hydrostatic equilibrium [e.g., @nagai2006]. Together with X-ray observations, the tSZ effect allows for a detailed characterization of the ICM thermodynamics. See [@birkinshaw1999], [@carlstrom2002], and [@kitayama2014] for detailed reviews on the tSZ effect. The Planck satellite [@planck2013catalogue], the South Pole Telescope [SPT, @reichardt2013; @bleem2014], and the Atacama Cosmology Telescope [ACT, @hasselfield2013] have produced, and will continue to improve, large tSZ selected cluster samples. However, as the high-redshift end of these samples is reached, clusters are not resolved owing to insufficient available angular resolution (larger than 1 arcmin). High angular resolution follow-up observations of these objects are needed to precisely calibrate the tSZ cluster observable versus their total mass, through their pressure profiles. The universality of such pressure distributions [@planck2013pressure_profile; @arnaud2010], taken as a standard candle, also has to be tested against redshift. The object is a high-redshift, hot and massive cluster of galaxies at $z = 0.89$. It was discovered in the WARPS survey [Wide Angle ROSAT Pointed Survey, @ebeling2001] and has been the object of multiwavelength studies. Owing to difficulty of spectroscopy at high-redshift, the first temperature estimates were made from SZA (Sunyaev-Zel’dovich Array) observations [@joy2001 $T_e~=~9.8^{+4.7}_{-1.9}$ keV], providing the first confirmation that it is indeed a massive system. A detailed analysis of observations by [@maughan2004] reports a consistent temperature, $T_e~=~11.5^{+1.1}_{-0.9}$ keV. They also measured to show evidence of a relaxed morphology, in agreement with ROSAT first observations, and provided a total mass of $\left(1.4~\pm~0.5\right)~\times~10^{15} \ M_{\sun}$. More recent Chandra observations also agree that is a hot system [@bonamente2006 $T_e~=~14.0^{+2.1}_{-1.8}$ keV]. The pressure profile of the cluster was measured at arcmin angular scales using the interferometric SZA observations at 30 and 90 GHz [@muchovej2007; @mroczkowski2009; @mroczkowski2011], providing a detailed picture of the ICM on these scales. First indications of a disturbed core were made by an XMM/Chandra analysis, showing an asymmetry in the temperature map with a hotter southwest region [@maughan2007]. Lensing observations by the Hubble Space Telescope [HST @jee2009] found a relaxed morphology on large scales and agree on the presence of a disturbed core on smaller scales, with the presence of a subclump 40 arcsec toward the southwest. This is consistent with the hotter region and highly correlated with the cluster galaxy distribution. They propose a scenario in which a less massive system has passed through the main cluster and the gas has been stripped during this passage. The mass inferred within the radius[^2] $r_{\Delta=200}$ is $(1.4 \pm 0.2) \times 10^{15} M_{\sun}$. Finally, MUSTANG tSZ observations at 90 GHz on $\sim$ 8 – 45 arcsec scales [@korngut2011] have revealed a narrow 20 arcsec long ridge 10 arcsec southwest of the peak, in addition to another peak coincident with and the brightest cluster galaxy. In this paper, we report 150 and 260 GHz tSZ observations of , using the New IRAM KIDs Array [NIKA, see @monfardini2010; @bourion2011; @monfardini2011; @calvo2012; @adam2013; @catalano2014 for more details on the NIKA camera] at the IRAM (Institut de Radio Astronomie Millimétrique) 30-meter telescope. The reconstructed tSZ map of the cluster is used to constrain its pressure distribution, as well as the thermodynamics of the ICM gas by combining it with X-ray data. Since NIKA is the prototype of the future NIKA2 camera, these observations are part of a pilot study that aims at showing the potential of NIKA2 for follow-ups of unresolved Planck and ACT clusters. The paper is organized as follows. The observations of are presented in Sect. \[sec:CL1227Obs\], including the reduction of NIKA data. In Sect. \[sec:analysis\], we present the analysis performed to recover the thermodynamical properties of the cluster. The results are provided in Sect. \[sec:results\] and compared to [data of other observatories]{} and previous observations. The conclusions and NIKA2 perspectives are given in Sect. \[sec:conclusion\]. Throughout this paper we assume a flat $\Lambda$CDM cosmology according to the latest [*Planck*]{} results [@planck2013param] with $H_0 = 67.11$ km s$^{-1}$ Mpc$^{-1}$, $\Omega_M = 0.3175$, and $\Omega_{\Lambda} = 0.6825$. High resolution thermal Sunyaev-Zel’dovich observations {#sec:CL1227Obs} ======================================================= Observations of {#sec:observations} ---------------- ![image](Figure/CLJ1226_2mm_map.pdf){width="48.00000%"} ![image](Figure/CLJ1226_1mm_map.pdf){width="48.00000%"} ![Flux density profile of as measured by NIKA at 150 GHz, [*i.e.*]{}, the radial average within concentric annuli. The point source has been fitted and subtracted (see Sect. \[sec:param\_estim\]) before computing the profile. Error bars are only statistical.[]{data-label="fig:CL1226profile2mm"}](Figure/profile2mm.pdf){width="48.00000%"} The NIKA camera was used at the IRAM 30-meter telescope (Pico Veleta, Spain) to image at 150 and 260 GHz during the first NIKA open pool of February 2014. The cluster was mapped using on-the-fly raster scans made of constant azimuth – resp. elevation – subscans. Scans were made of 19 subscans of 6 arcmin length, separated by 10 arcsec elevation – resp. azimuth – steps. The subscan duration was fixed to ten seconds, giving a scanning speed of 36 arcsec per second and a total time of 3.3 minutes per scan. The pointing center was chosen to be (R.A., Dec.) = (12h 26m 58s, 33$^o$ 32’ 40") based on MUSTANG tSZ observations [@korngut2011]. All coordinates in this paper are given in equinox 2000. The data collected were taken with an opacity, at 150 GHz (respectively 260 GHz), in the range 0.06–0.23 (respectively 0.06–0.29) and a mean value of 0.13 (respectively 0.16), corresponding to average winter conditions. The observations were mostly carried out during night time. A small fraction of the scans were flagged due to bad weather conditions and some others were lost because of missing data streams with the telescope position. The overall effective observing time on the cluster is 7.8 hours. The overall final pointing residual errors were obtained with a precision of less than 3 arcsec using the observations of nearby quasars, 1308+326 and 1156+295, every hour. Uranus was taken as our primary calibrator, and we used its frequency-dependent brightness temperature model as given by [@moreno2010], assumed to be accurate at the level of 5%, as shown by [@planck2013calib]. Within the NIKA bandpasses of the February 2014 campaign, we obtain a mean brightness temperature of 112.7 and 92.8 K at 150 and 260 GHz, respectively. Uncertainties on the calibration were measured to be 5% and 11% at 150 and 260 GHz, respectively, using the dispersion of the recovered flux on Uranus maps. This corresponds to 7% and 12% overall calibration uncertainties when including the model error. The focus of the telescope was checked on Uranus or other bright point sources every two to three hours and systematically after sunset and sunrise. The effective FWHM was measured to be 18.2 and 12.0 arcsec at 150 and 260 GHz, respectively, by fitting a Gaussian model on the planet. The opacity was measured and corrected for by using NIKA total power data as a tau-meter as described in [@catalano2014]. The Compton $y$ to surface brightness (measured in Jy/beam) conversions were computed by integrating the tSZ spectrum (see Sect. \[sec:analysis\]) within the NIKA bandpasses transmissions and accounting for the beam angular coverage, as described in more detail in [@adam2013]. For this campaign, the conversions are $-10.9 \pm 0.8$ and $3.5 \pm 0.5$ Jy/beam per unit of $y$ at 150 and 260 GHz, respectively, including the overall calibration error and the 2% error arising from the bandpasses uncertainties. In Table \[tab:instru\], we summarize the instrumental properties of the NIKA camera as it was used during observation. Observing band 150 GHz 260 GHz ----------------------------------- ----------------- --------------- Gaussian beam model FWHM (arcsec) 18.2 12.0 Field-of-view (arcmin) 1.9 1.8 Effective number of detectors 117 136 Sensitivity (mJy/beam s$^{1/2}$) 14 35 Compton parameter to Jy/beam -10.9 $\pm$ 0.8 3.5 $\pm$ 0.5 Pointing errors (arcsec) &lt;3 &lt;3 Calibration uncertainties 7% 12% : Instrumental characteristics of NIKA for the February 2014 campaign. See text for details. \[tab:instru\] Data reduction {#sec:data_reduction} -------------- The details of the NIKA data reduction are available in [@adam2013] and [@catalano2014]. Here, the main procedure is briefly summarized for the reader’s convenience. Invalid detectors were removed based on the statistical properties of their noise and their optical response. Cosmic ray impacts on the arrays were flagged and removed from the data. To remove the low-frequency atmospheric emission from the data, a common-mode template was built by averaging the detector time stream across each array. This was done by flagging the source in signal-to-noise in an iterative manner to avoid ringing and reduce signal filtering effects. This data reduction was preferred for , with respect to the spectral dual-band noise decorrelation described in [@adam2013]. The latter allows more extended emission to be recovered but is noisier. Moreover, the cluster is sufficiently compact for any filtering effect to be weak enough, allowing the recovery of cluster maps at both wavelengths simultaneously. Frequency lines produced by the pulse tube of the cryostat were notch-filtered in the Fourier domain. Data were finally projected onto 2-arcsec pixel grid maps using inverse variance weighting and a nearest grid projection. The raw (direct output of the pipeline) 150 and 260 GHz NIKA maps of are presented in Fig. \[fig:CL1226map\]. They are centered on the X-ray peak coordinates [taken from @cavagnolo2009], (R.A., Dec.) = (12h 26m 58.37s, 33$^o$ 32’ 47.4"), and have been smoothed with a 10 arcsec Gaussian filter for display purposes. The 150 GHz map shows a strong tSZ decrement reaching 18$\sigma$ per beam at the peak. Because the noise is higher at 260 GHz, and the tSZ signal weaker by a factor of about one third, the map does not show a very significant tSZ detection, even if diffuse positive emission is seen at about 3$\sigma$ on the map at the cluster position. However, the 260 GHz channel reveals the presence of a point source (referred to as PS260 in the following) located about 30 arcsec southeast of the center, detected at about 10$\sigma$. The source is not clearly detected at 150 GHz due to the strong tSZ signal, but it is visible as a lack of tSZ at its corresponding location. In Sect. \[sec:point\_source\], we discuss the implications of point source contamination on our tSZ observation. In Fig. \[fig:CL1226profile2mm\], we provide the flux density profile corresponding to the 150 GHz map. It is computed by averaging the signal in concentric annuli with the center taken as the origin. The profile appears to be smooth and peaks at the center. Transfer function {#sec:transfer_function} ----------------- The data reduction described above induces an attenuation of the astrophysical signal in the recovered maps of Figure \[fig:CL1226map\], since detectors are combined to remove the correlated noise. The characterization of this effective transfer function as a function of the angular scales was done by using noise plus input signal simulations. To do so, the map of an input known simulated astrophysical signal (see below) was compared to the output signal after processing. The simulated input signal was the one expected for clusters of galaxies, as described in detail in @adam2013. It was computed using a generalized Navarro, Frenk & White (gNFW) pressure profile [see Sec. \[sec:icm\_param\_p\], @nagai2007] integrated along the line of sight to produce a tSZ flux density map. The typical amplitude and angular size of the simulated clusters were similar to the one in Fig. \[fig:CL1226map\], but the result transfer function was checked to see that it did not depend on the radial size and amplitude of the input signal. To simulate the atmospheric and intrinsic correlated and uncorrelated noise, we used the NIKA data themselves. The real data used for the simulations were those of our other projects taken during the first NIKA open pool of February 2014, for which the scanning strategy was similar to that of . These scans were taken with atmospheric conditions comparable to those during which the data presented in this paper were taken. The astrophysical signal within the data was checked to be faint enough that it did not affect the reduction, [*i.e.*]{} negligible compared to the noise. To deal with the residual noise contribution in the final processed maps, we considered the simulated data with and without including the known input signal. In this way we obtained estimates of both the processed noisy signal and of the noise itself, which we could subtract from the processed signal-plus-noise map to produce an output signal-only map. The transfer function was then computed as the ratio of the power spectra of the output signal, free of noise, and the input one. However, small noise residuals are observed because of the differences in the processing introduced by the signal itself. The estimated transfer function is given in Fig. \[fig:transfer\_function\]. The uncertainties were calculated from the dispersion of the transfer function obtained for all the scans used to compute it, and are mostly due to residual noise. As we can see, it is approximately flat and close to one, with $\sim 5$ % attenuation, on scales smaller than the NIKA field of view. On larger scales, the recovered flux vanishes smoothly with decreasing wave number. In Sec. \[sec:param\_estim\], we use this transfer function when comparing a model to the NIKA map. ![NIKA data reduction transfer function as a function of angular frequency. Uncertainties were computed using the dispersion of the results over the different noise realizations. The 150 GHz beam cutoff and size of the NIKA field of view are also represented by green dashed lines for illustration, [*i.e.*]{} (18.2 arcsec)$^{-1}$ and (1.9 arcmin)$^{-1}$. The black horizontal dashed line corresponds to 5% filtering.[]{data-label="fig:transfer_function"}](Figure/transfer_function.pdf){width="45.00000%"} Point source contamination {#sec:point_source} -------------------------- The SZA data were used to search for radio sources around [@muchovej2007]. From their observations, no such objects are present within the NIKA field. From the residual between the MUSTANG map and the SZA pressure model of [@mroczkowski2009], [@korngut2011] have inferred the presence of a possible submillimeter source 10 arcsec north of the peak. Using the NIKA 260 GHz frequency band, we searched for such a contaminant and do not observe any point source within a 1.5 arcmin radius around the map center, apart from PS260. This is done by fitting PS260 and the tSZ signal simultaneously, as described in detail in Sect. \[sec:param\_estim\]. The root-mean-squared between the best-fit model and the data allows us to set a 2$\sigma$ flux upper limit of 1.5 mJy at this frequency. Therefore, the feature seen by [@korngut2011] is unlikely to be a real submillimeter source. The flux distribution of the detected point source, PS260, is fitted using a Gaussian model with FWHM fixed to the NIKA 260 GHz beam. Its flux is measured to be 6.8 $\pm 0.7$ (stat.) $\pm 1.0$ (cal.) mJy and its position (R.A., Dec.) = (12h 27m 0.01s, 33$^o$ 32’ 42.0"), with statistical and calibration error quoted as stat and cal. We note that the source possibly coincides with two known optically detected galaxies J12265995+3332405 and J12265923+3332405 [@holden2009]. They are located 1.7 and 9.8 arcsec away from the best-fit position obtained, respectively. We conclude that no additional point sources, wether radio or submillimeter, affect the 150 GHz map of NIKA. The detected source is accounted for in the analysis described hereafter. Characterization of the intracluster medium {#sec:analysis} =========================================== SZ and X-ray observables {#sec:observables} ------------------------ ### Thermal SZ {#sec:tsz} The tSZ effect results in a distortion of the CMB black-body spectrum whose frequency dependence is given by [@birkinshaw1999] $$f(x, T_e) = \frac{x^4 e^x}{\left(e^x-1\right)^2} \left(x \ \mathrm{coth}\left(\frac{x}{2}\right) - 4\right) \left( 1 + \delta_{tSZ}(x, T_e) \right), \label{eq:sz_f_x}$$ where $x = \frac{h \nu}{k_{\mathrm{B}} T_{\mathrm{CMB}}}$ is the dimensionless frequency, $h$ the Planck constant, $k_{\mathrm{B}}$ the Boltzmann constant, $\nu$ the observation frequency, and $T_{\mathrm{CMB}}$ the temperature of the CMB. We use the [@itoh1998] relativistic corrections to compute $\delta_{tSZ}(x, T_e)$, where $T_e$ is the electrons temperature. The induced change in intensity relative to the primary CMB intensity $I_0$ reads as $$\frac{\Delta I_{tSZ}}{I_0} = y \ f(x, T_e) \ , \label{eq:deltaI}$$ where $y$ is the Compton parameter, which measures the integrated electronic pressure $P_{\mathrm{e}}$ along the line of sight, $dl$, written as $$y = \frac{\sigma_{\mathrm{T}}}{m_{\mathrm{e}} c^2} \int P_{\mathrm{e}} dl. \label{eq:y_compton}$$ The parameter $\sigma_{\mathrm{T}}$ is the Thomson cross section, $m_{\mathrm{e}}$ is the electron rest mass, and $c$ the speed of light. Neglecting the relativistic corrections, the tSZ spectral distortion is nil around 217 GHz, negative below and positive above. ### Kinetic SZ {#sec:ksz} In addition to the tSZ effect, the kinetic Sunyaev-Zel’dovich (kSZ) is caused by the motion of the intracluster gas and its electrons relative to the CMB. This motion leads to a Doppler shift of the CMB photons that are scattered via the Compton effect. It can be expressed as [@birkinshaw1999] $$\frac{\Delta I_{kSZ}}{I_0} = g(x, v_z, T_e) \ \sigma_T \frac{-v_z}{c} \int n_e dl, \label{eq:ksz}$$ where $v_z$ is the line-of-sight peculiar velocity of the cluster with respect to the Hubble flow, which is positive (negative) for a cluster receding from (coming towards) the observer, and $n_e$ the electronic density. The function $g(x, v_z, T_e)$ provides the spectral dependence of the kSZ effect as $$g(x, v_z, T_e) = \frac{x^4 e^x}{\left(e^x-1\right)^2} \left( 1 + \delta_{kSZ}(x, v_z, T_e) \right). \label{eq:ksz_spec}$$ Again, we use [@itoh1998] to account for the relativistic corrections $\delta_{kSZ}$ and neglect the velocity dependance as it is expected to be less than 1%. By writing $\Delta I (\nu) = A_{tSZ} \Delta I_{tSZ}(\nu) + A_{kSZ} \Delta I_{kSZ}(\nu)$ where $A_{tSZ,kSZ}$ stand for dimensionless amplitudes (see Eqs. \[eq:deltaI\] and \[eq:ksz\]), and assuming the observed region to be isothermal, one can deduce the line-of-sight velocity as $v_z = -\frac{A_{kSZ} \ k_B T_e}{A_{tSZ} \ m_e c}$. ### X-ray emission {#sec:xray} The surface brightness, in units of counts cm$^{-2}$ s$^{-1}$ sr$^{-1}$, is related to the electronic density as $$S_X = \frac{1}{4 \pi (1+z)^4} \int n_e^2 \Lambda(T_e, Z) dl. \label{eq:SX}$$ The parameter $z$ is the redshift, $\Lambda(T_e, Z)$ is the cooling function that is proportional to $T_e^{1/2}$, and $Z$ is the metallicity. Additionally, the gas temperature can be estimated from spectroscopy. Intracluster medium modeling {#sec:icm_parametrization} ---------------------------- ### Pressure profile {#sec:icm_param_p} The cluster electronic pressure distribution is modeled by a spherical gNFW profile [@nagai2007], described by $$P_e(r) = \frac{P_0}{\left(\frac{r}{r_p}\right)^c \left(1+\left(\frac{r}{r_p}\right)^a\right)^{\frac{b-c}{a}}}. \label{eq:gNFW}$$ The parameter $P_0$ is a normalizing constant; $r_p$ is a characteristic radius; and $a$, $b$, and $c$ set the slopes at intermediate, large, and small radii, respectively. We can also write $P_0 = P_{\Delta} \times \mathds{P}_0$ and $r_{\Delta} = c_{\Delta} \ r_p$, where $P_{\Delta}$ is the average pressure within $r_{\Delta}$, $\mathds{P}_0$ is a normalizing constant, and $c_{\Delta}$ the concentration parameter [@arnaud2010]. The mass enclosed within $r_{\Delta}$, $M(r = r_{\Delta})$, is then related to $P_{\Delta}$ by a scaling law. One can finally define $\theta_{p,\Delta} = r_{p,\Delta} / D_A$, where $D_A$ is the angular distance of the cluster. In the following, we use three different choices to fix the slope parameters (see Table \[tab:table\_pressure\_models\]). 1) We fix $c$ to the value obtained by [@comis2011] for this cluster and fix $a$ and $b$ to the one obtained by [@planck2013pressure_profile] when stacking the tSZ signal of 62 nearby clusters. This choice is used as the baseline since the two outer slope parameters have been obtained directly from tSZ data and are expected to provide a good description of most clusters. The parameter $c$ was not fitted by [@planck2013pressure_profile] so we rely on Chandra data that are specific to . This set of parameters is referred to PPC in the following. 2) We fix $a$, $b$, and $c$ to the values obtained by [@nagai2007b] based on Chandra clusters and numerical simulations. This set of parameters allows us to directly compare our results to that of [@mroczkowski2009], who used them in their modeling. It is referred to as NNN. 3) We fix $b$ and $c$ to values similar to those of PPC, but fit for the parameter $a$ since it corresponds to scales at which NIKA is the most sensitive for this cluster. This choice is referred to as FPC. The parameters $P_0$ and $r_p$ are always allowed to vary. Since the pressure profile parameters are highly degenerate, in particular $a$, $P_0$, and $r_p$, the main difference between the three models relies on the choice of the core slope parameter $c$ and the outer slope parameter $b$, which cannot be constrained directly with the NIKA data. As discussed in Sect. \[sec:results\], the core slope parameter is related to the thermodynamics of the cluster core but does not affect the overall mass determination. By contrast, the outer slope is associated to the steepness of the mass profile at outer radii. Therefore it controls the cluster overall mass at large radii and can lead to a bias in the mass estimate for radii above those constrained directly from the data. By using these three models, we test the impact of the choice of the model in the regions of the ICM profiles for which NIKA is not directly sensitive. Model label $a$ $b$ $c$ ------------- ------ ------ ------- PPC 1.33 4.13 0.014 NNN 0.9 5.0 0.4 FPC free 4.13 0.014 : Pressure profile parameters for the three models presented in this paper. \[tab:table\_pressure\_models\] ### Density profile {#sec:icm_param_n} Following [@mroczkowski2009] and since we use the work of [@comis2011], the electron density profile is described by a simplified version (SVM) of the model suggested by [@vikhlinin2006] $$n_e(r) = n_{e0} \left[1+\left(\frac{r}{r_c}\right)^2 \right]^{-3 \beta /2} \left[ 1+\left(\frac{r}{r_s}\right)^{\gamma} \right]^{-\epsilon/2 \gamma}, \label{eq:SVM}$$ which is an extension of the $\beta$ model [@cavaliere1978] with an additional steepening freedom at radii larger than $\sim r_s$, for which the slope parameter is $\epsilon$. The core radius is still given by $r_c$, and $\gamma$ accounts for the width of the transition between the two profiles. In the case of $\epsilon = 0$, this model is equivalent to the standard $\beta$ model. Similar to [@mroczkowski2009] and [@comis2011], we fix the parameter $\gamma = 3$ because it is a good fit to all the clusters considered by [@vikhlinin2006], and leave the other ones as free parameters. ### Temperature and entropy {#sec:icm_param_tk} Assuming the ideal gas law, the temperature of the electron population can simply be computed as $$k_B \ T_e(r) = P_e(r) / n_e(r). \label{eq:temp_profile}$$ It is implicitly modeled as the ratio of the distributions given by the gNFW and SVM models of Eqs. \[eq:gNFW\] and  \[eq:SVM\]. The ICM entropy is defined as [see review from @voit2005] $$K(r) = \frac{P_e(r)}{n_e(r)^{5/3}}. \label{eq:entropy_profile1}$$ ### Mass distribution {#sec:icm_param_mass} When assuming to be in hydrostatic equilibrium, its total mass enclosed within $r$, $M_{tot}(r)$, is related to the electronic density and pressure profiles through $$\frac{dP_e(r)}{dr} = -\frac{\mu_{gas} m_p n_e(r) G M_{tot}(r)}{r^2}, \label{eq:hse}$$ where $m_p$ is the proton mass and $G$ the Newton’s constant. We assume in this paper a mean molecular weight $\mu_e = 1.15$ for the electrons and $\mu_{gas} = 0.61$ for the gas. By directly integrating the electronic density profile up to a radius $R$, we obtain the gas mass enclosed within $R$, $$M_{gas}(R) = 4 \pi \int_0^R \mu_e m_p n_e(r) r^2 dr. \label{eq:gas_mass}$$ It is straightforward to deduce the gas fraction profile, defined as the ratio at a given radius between the gas mass and the total mass enclosed within $r$, as $$M_{gas}(r) = f_{gas}(r) M_{tot}(r). \label{eq:gas_frac}$$ Finally, the total mass is directly related to $R_{\Delta}$ from its definition as $M_{tot}(r_{\Delta}) = \frac{4}{3} \pi \rho_c(z) \Delta r_{\Delta}^3$, where $\rho_c(z)$ is the critical density of the Universe at redshift $z$. Combining the value of $R_{\Delta}$ and $r_p$, directly related to the pressure profile, we can therefore measure the concentration parameter $c_{\Delta}$. Extra datasets {#sec:extra_data} -------------- In addition to the NIKA data we consider the ACCEPT and Planck data sets. ### ACCEPT density profile {#sec:accept} We make use of the ACCEPT catalog [Archive of Chandra Cluster Entropy Profile Tables[^3], @cavagnolo2009]. We only consider the deprojected density profile of , which is computed from the publicly available Chandra data. The angular resolution of Chandra, $\sim 0.5$ arcsec, is negligible compared to that of NIKA. As fully explained in [@cavagnolo2009], the flux measured in the energy range 0.7–2.0 keV is a good diagnosis of the ICM density (Eq. \[eq:SX\]). The high angular resolution surface brightness profile is therefore converted into a deprojected electron density profile using normalization and count rates taken from the spectral analysis. The profile extends up to 835 kpc, which corresponds approximately to $R_{500}$ (see Sect. \[sec:results\]). ### Planck integrated Compton parameter {#sec:planck} The cluster is not in the Planck tSZ cluster catalog [@planck2013catalogue] since its flux is diluted by the Planck beam, and it is therefore not detected with high enough signal-to-noise. Nevertheless, in addition to NIKA tSZ observations, we use the Planck maps to produce a Compton $y$ parameter map as described in [@planck2013ymap] (see [@hurier2013] for the method). Its angular resolution is 7.5 arcmin, limited by the lowest Planck frequency channel used to construct it. This map is used to measure the integrated Compton parameter of within $\theta_{\rm max}$, defined as $$Y_{\theta_{\rm max}} = \int_{\Omega(\theta_{\rm max})} y \ d\Omega. \label{eq:Yint}$$ The uncertainty on this quantity is obtained by applying the same integration on the map at positions around the cluster, where the noise is homogeneous and the map is free of emission. We also check on the jackknife [half-ring half-difference, see @planck2013mission] map that the error is consistent with the expected noise. We obtain $Y_{\Omega(15^{'})}~=~\left(0.94~\pm~0.36\right)~\times~10^{-3}$ arcmin$^2$. Maximum likelihood analysis {#sec:param_estim} --------------------------- We aim at recovering the three-dimensional electronic pressure and electronic density profiles of . To do so, we use an approach in which input models are processed similarly to the measured tSZ signal such that they can be compared to it. Best-fit values of the electronic pressure and density model parameters are jointly obtained from a Markov Chain Monte Carlo (MCMC) approach, using a Metropolis-Hasting algorithm [@chib1995]. A set of chains of tested models samples the multidimensional likelihood parameter space. At each step of the chains, a model map is computed by integrating the tested pressure model along the line of sight. The map is then convolved with the NIKA beam and the pipeline transfer function. The model is converted into surface brightness using the Jy/beam to $y$ conversion factors given in Sect \[sec:data\_reduction\]. A radial temperature model is inferred from the pressure and the density models, and used to account for relativistic corrections [@itoh1998] on the tSZ map model. We also use the Planck integrated flux to add an extra constraint on the overall flux. The flux and the position of PS260 are simultaneously fitted. We only impose a Gaussian prior on its position based on the fit at 260 GHz, assuming a 3 arcsec uncertainty. We include a set of nuisance parameters in the fit, such as calibration uncertainties, map zero level, and the pointing position, which are randomly sampled within their error bars at each step. The $\chi^2$ used in the Metropolis-Hasting acceptance (or rejection) process of the chain samples is defined as $$\begin{gathered} \chi^2 = \chi^2_{NIKA} + \chi^2_{ACCEPT} + \chi^2_{Planck} \\ = \sum_{i=1}^{N_{pix}} \left(\frac{M^{NIKA}_i - M^{model}_i}{\sigma_i^{NIKA}}\right)^2 \\ + \sum_{j=1}^{N_{bin}} \left(\frac{n_e(r_j)^{ACCEPT} - n_e(r_j)^{model}}{\sigma_j^{ACCEPT}}\right)^2 \\ + \left(\frac{Y^{Planck}_{\theta_{\rm max}} - Y^{model}_{\theta_{\rm max}}}{\sigma^{Planck}}\right)^2 \label{eq:chi2}\end{gathered}$$ where the sums are made over the number of pixels in the NIKA map ($N_{pix}$) and the number of radial bins of the ACCEPT density profile ($N_{bin}$). The quantity $M$ represents the 150 GHz only tSZ surface-brightness-plus-point-source map. The parameters $\sigma^{NIKA}$, $\sigma^{ACCEPT}$ and $\sigma^{Planck}$ are the respective errors, assumed to be Gaussian. While counts follow Poisson statistics, the deprojected density profile is computed by combining a set of random variables; therefore, assuming that the central limit theorem applies in this process, we expect the error statistics followed by the ACCEPT deprojected density profile to be Gaussian. It is also naturally the case for Planck and NIKA errors. The convergence of the MCMC is ensured by the [@gelman1992] test. Once reached, the histogram of the chains along the considered parameter is marginalized over all other dimensions (including nuisance parameters) providing the posterior probability distribution for each fitted parameter. The integrated posterior probability distribution up to 68% probability gives the quoted errors. To estimate the uncertainties on the derived cluster physical properties for each radial bin, we fully propagate the information contained in the MCMC parameter chains to the given quantity. For each set of parameters tested against the data ([*i.e.*]{}, a model), we compute all derived physical quantities as a function of the radial distance. Therefore, for each radius, we obtain a probability distribution function for the considered quantity. We then compute the reference value of the given quantity as the median of the distribution and its error by integrating the distributions up to the requested confidence limit, for each radial bin. Results and discussions {#sec:results} ======================= NIKA dual-band detection and mapping of the tSZ signal {#sec:dual_band_detection} ------------------------------------------------------ ![Compton parameter profile $y$ of at 150 GHz (red) and 260 GHz (green). The point source has been subtracted before extracting the profile. Statistical uncertainties are shown as error bars, and systematic uncertainties are given as a dashed-line envelope.[]{data-label="fig:y_profile"}](Figure/y_profile.pdf){width="45.00000%"} From the MCMC analysis we obtain a flux of $1.9\pm 0.2$ (stat.) mJy at 150 GHz for PS260. With these results, PS260 is subtracted from the maps in the following analysis. The Compton parameter profile is computed by averaging the signal within radial bins and accounting for the conversion between flux density and Compton parameter. Figure \[fig:y\_profile\] shows the Compton parameter radial profile, computed from the center for both 150 and 260 GHz. The signal is detected on the profile up to about 1 arcmin at 150 GHz. Error bars are only statistical uncertainties; calibration uncertainties would result in an overall multiplicative factor to apply to the entire profile. The two profiles are compatible over the whole radial range. Nevertheless, we notice the presence of a few distinct peaks in the 260 GHz profile. These peaks might indicate the presence of additional contamination from submillimeter sources, which are most probably below the noise in the 260 GHz map. Assuming a dust-like spectrum, we expect the contribution from these sources to be negligible at 150 GHz. By fitting the 260 GHz profile to the 150 GHz one, taken as the model, we obtain a 7$\sigma$ tSZ detection at 260 GHz. We obtain a reduced $\chi^2$ of 0.95 with 24 degrees of freedom. ![image](Figure/MCMC_raw_map.pdf){width="48.00000%"} ![image](Figure/MCMC_best_fit.pdf){width="48.00000%"} ![image](Figure/MCMC_point_source_removed_Carsten_version.pdf){width="48.00000%"} ![image](Figure/MCMC_residual.pdf){width="48.00000%"} Figure \[fig:best\_fit\_map\] provides the raw, best-fit, point source subtracted and residual maps obtained from the maximum likelihood analysis. After subtracting PS260 the cluster appears circular at the NIKA resolution and is aligned with the peak on which the maps are centered. The signal is extended and clearly detected at the map level up to 1 arcmin scales. The NIKA map is morphologically consistent with previous interferometric observations by SZA [@joy2001; @muchovej2007; @mroczkowski2009] and does not show any evidence of being disturbed on large angular scales. However, the cluster core is slightly elongated toward the southwest at scales close to our our beam (and smaller). Using MUSTANG 90 GHz observations, at an effective resolution of 11 arcsec, [@korngut2011] have indeed detected a narrow ridge $\sim 20$ arcsec long located about 10 arcsec from the center towards the southwest. This is consistent with the hotter region found by [@maughan2007] using Chandra and XMM data. Additional lensing observations from HST [@jee2009] also reveals the presence of a secondary peak in the surface mass distribution in this region. The NIKA observations agree with being relaxed on large scales with a disturbed core, the origin of the latter being probably due to the merger of a smaller subcluster. Since NIKA probes scales between $\sim 20$ arcsec to a few arcmin, these observations complement the ones by MUSTANG on small scales ($\sim$ 10 – 50 arcsec) and by SZA interferometric data that are the most sensitive on scales of a few arcmin. Finally, we notice that the NIKA residual map is well correlated with the temperature map presented in [@maughan2007], [*i.e.*]{} the tSZ signal appears to be slightly stronger on the north (being under estimated by our spherically symmetric model), where the gas is hotter than it is in the south (respectively, overestimated), where the gas is cooler. ![Constraints on the kSZ and tSZ spectra computed within 50 arcsec of the center. The green, yellow, and red swaths give the tSZ, kSZ, and tSZ+kSZ contributions, respectively. The two data points are the NIKA measurements.[]{data-label="fig:ksz_spec"}](Figure/kSZ_constraint.pdf){width="48.00000%"} By measuring the integrated flux toward the cluster within a 50 arcsec radius circle centered on the peak at both NIKA wavelengths, it is possible to set constraints on the kSZ contribution (see Sec. \[sec:ksz\]). As shown in Fig. \[fig:ksz\_spec\], the kSZ spectrum amplitude is compatible with zero within 1$\sigma$. Assuming the cluster average temperature within the region considered to be $T_e = 10 \pm 1$ keV, we infer a limit on the line-of-sight velocity of $v_z = -445 \pm 461$ km/s at 1$\sigma$ including calibration uncertainties. Intracluster medium radial distribution {#sec:icm_3d_result} --------------------------------------- ![Density profile as a function of physical distance from the cluster center. The data correspond to those from the ACCEPT database [@cavagnolo2009] discussed in the text. The solid line represents the best-fit density model. The 1$\sigma$ uncertainties are represented by the gray contours. The difference between the data and the best-fit model normalized by the 1$\sigma$ uncertainties ($\chi$) is also shown.[]{data-label="fig:density_profile"}](Figure/density_profile.pdf){width="48.00000%"} ![image](Figure/pressure_profile.pdf){height="4.3cm"} ![image](Figure/temperature_profile.pdf){height="4.3cm"} ![image](Figure/entropy_profile.pdf){height="4.3cm"} The best-fit density profile is represented in Fig. \[fig:density\_profile\] with the data points of the ACCEPT catalog used to fit it. As shown in the bottom residual profile ($\chi$, the difference between data points and the best-fit model normalized by the data point errors), the model fits the data over the full radial range for the purpose of this paper. Since the best-fit density profile depends on the choice of the pressure profile slope only through the relativistic correction (see Sec. \[sec:param\_estim\]), we show the result only for the first case, our baseline PPC pressure profile, and the differences between models are insignificant. In Fig. \[fig:thermo\_profile\] we present the radial distributions of the pressure, temperature, and entropy of the ICM of derived using NIKA data. Uncertainties are given at 68% confidence level and account for both statistical and NIKA overall calibration errors. The profiles corresponding to the different pressure profile models, PPC, NNN, and FPC (see Sect. \[sec:icm\_param\_p\]) are given. The pressure (left) is characterized well by NIKA, with less than 10% uncertainty below 500 kpc and up to 25% at 1500 kpc for PPC. The profile is best constrained around 250 kpc, corresponding to $\sim$30 arcsec when projected onto the sky, where NIKA is most sensitive. The PPC profile is in qualitative agreement with the one obtained by [@mroczkowski2009], despite a different choice of slope parameter. When using the same modeling, NNN, we find a good agreement, particularly on small scales. As expected, when loosening the constraints on parameter $a$, as in the case of the FPC profile, uncertainties increase by a factor of about 1.5. Thanks to the degeneracy between the pressure profile parameters, the different models agree well in the region where NIKA is sensitive. At both larger and smaller scales, the models tend to deviate from one another up to more than 1 $\sigma$, in particular NNN versus PPC and FPC, which directly propagates onto the other derived profiles, as discussed below. The temperature profile, derived from the pressure and the density, presents a core value of about 15 keV and decreases toward the outskirts of the cluster, reaching about 5 keV around 1500 kpc. For the PPC model we find uncertainties of about 10–15%. The profile is slightly higher, but compatible within errors to those measured by [@mroczkowski2009] with SZA and [@maughan2007] with a detailed (Chandra + XMM) analysis. All three tested pressure profile models give compatible temperature results. Nevertheless, we notice that the core slope, $c$, obtained by [@comis2011] tends to indicate a cooler core below 200 kpc, while it is not the case for NNN. This is because the core temperature, which is the ratio between the pressure and the density, is directly related to the core pressure slope $c$. The flatter core of PPC and FPC, with respect to NNN, leads to a cooler core for the same density profile. Higher angular resolution tSZ observations would be necessary to provide constraints on the core slope pressure parameter $c$. The entropy profile is generally described well by $K(r)~=~K_0~+~K_{100}~\left(\frac{r}{100\ {\rm kpc}}\right)^{\alpha_K}$ [e.g., @pratt2010; @cavagnolo2009], where $K_0$ is called the core entropy, $K_{100}$ is a normalization, and $\alpha_K$ provides the slope of the profile. Large core entropies are expected for clusters with disturbed core such as . The obtained entropy profile (right), shown on a logarithmic scale for both axes, is described well by a simple power law in the range directly probed by NIKA ($\gtrsim$ 100 kpc). As we fixed the pressure profile parameter $c~=~0.014$ [@comis2011] in our baseline pressure model, which is expected to truly extrapolate the pressure parametrization on small scales, we expect the entropy profile to be accurate below100 kpc but limit ourselves to a qualitative discussion. The entropy profile shows signs of flattening below this scale with a core entropy above 100 keV cm$^2$, which would indicate that is disturbed on small scales. At large radii, the slope seems to change but the error bars are too large for this effect to be measured. This discussion is also valid in the case of the NNN model, even if the core entropy tends to deviate by more than 1$\sigma$ between the two. Our baseline model, PPC, is fully compatible with the one obtained by [@maughan2007]. At large radii, however, the NNN profile is in better agreement with this analysis, with the main differences coming from the choice of the slope parameters at the core and the outer radii of the pressure profile. ![image](Figure/totmass_profile.pdf){height="6.3cm"} ![image](Figure/fgaz_profile.pdf){height="6.3cm"} The total mass and the gas fraction profiles are presented in Fig. \[fig:mass\_profile\]. From the total mass profile we extract $R_{500}~=~930^{+50}_{-43}$ kpc, which in turn gives $M_{500}~=~5.96^{+1.02}_{-0.79}~\times~10^{14}$ M$_{\sun}$, compatible with previous measurements [e.g., @mroczkowski2009; @maughan2007]. We obtain a gas fraction within $R_{500}$ of $f_{gas}(R_{500})~=~0.146^{+0.041}_{-0.030}$. The total mass PPC and NNN profiles give compatible results over the full radial range. Small differences between the two are most noticeable in the range where NIKA is not very sensitive, [*i.e.*]{}, on scales below 100 kpc where NNN is higher than PPC, mainly due to the difference in the pressure profile. The FPC model is fully compatible with the two other ones, and it presents larger error contours. The results are similar for the gas fraction, for which PPC presents a flattening below 200 kpc, while NNN keeps decreasing. Assuming the gas fraction of within $R_{500}$ to be a good representation of the matter content in the Universe, we compare it to its expected gas fraction using [@planck2013param] cold dark matter, $\Omega_c$, and baryon density, $\Omega_b$, as $f_{gas} = \frac{\Omega_b}{\Omega_c + \Omega_b} = 0.156$. We find that it is compatible with our result within error bars. The posterior ICM distribution is compatible in all cases with the integrated tSZ flux measured by Planck. The main outcomes of our analysis are summarized in Table \[tab:results\]. PPC pressure profile -------------------------------- ----------------------------------------------------- -- $M_{500}$ $5.96^{+1.02}_{-0.79} \times 10^{14} \ M_{\sun}$ $R_{500}$ $930^{+50}_{-43}$ kpc $\theta_{500}$ $1.93^{+0.10}_{-0.09}$ arcmin $f_{gas}(R_{500})$ $0.146^{+0.041}_{-0.030}$ $Y_{500}$ $0.598^{+0.063}_{-0.060} \times 10^{-3}$ arcmin$^2$ FPC pressure profile $M_{500}$ $6.10^{+1.52}_{-1.06} \times 10^{14} \ M_{\sun}$ $R_{500}$ $937^{+72}_{-58}$ kpc $\theta_{500}$ $1.95^{+0.15}_{-0.12}$ arcmin $f_{gas}(R_{500})$ $0.144^{+0.062}_{-0.038}$ $Y_{500}$ $0.603^{+0.098}_{-0.070} \times 10^{-3}$ arcmin$^2$ NNN pressure profile $M_{500}$ $7.30^{+1.52}_{-1.34} \times 10^{14} \ M_{\sun}$ $R_{500}$ $995^{+65}_{-65}$ kpc $\theta_{500}$ $2.07^{+0.13}_{-0.13}$ arcmin $f_{gas}(R_{500})$ $0.129^{+0.041}_{-0.025}$ $Y_{500}$ $0.717^{+0.117}_{-0.095} \times 10^{-3}$ arcmin$^2$ Point source PS260 150 GHz flux 1.9 $\pm 0.2$ (stat.) $\pm 0.1$ (cal.) mJy 260 GHz flux 6.8 $\pm 0.7$ (stat.) $\pm 1.0$ (cal.) mJy 260 GHz best-fit position R.A. 12h 27m 0.01s 260 GHz best-fit position Dec. 33$^o$ 32’ 42.0"\ : Main results of the MCMC analysis. The quoted errors are given at 68% confidence level. \[tab:results\] and the tSZ–Mass scaling relations {#sec:scaling_relation} ----------------------------------- ![image](Figure/UniversalPressure.pdf){height="6.3cm"} ![image](Figure/Y500M500.pdf){height="6.3cm"} Clusters of galaxies are usually used for cosmological studies assuming a self-similar scenario because they are expected to be a scaled version of one another. In practice, non-gravitational processes can induce dispersion in the general trend and biases. The Planck satellite has recently released the largest tSZ selected cluster sample [1227 objects, @planck2013catalogue]. To use this catalog for cosmology, [@planck2013cluster_count] have calibrated the relation between $Y_{\theta_{500}} \equiv Y_{500}$ and $M_{500}$ $$E(z)^{-2/3} \left[\frac{D_A^2 Y_{500}}{10^{-4} {\rm Mpc}^2}\right] = 10^{-0.19 \pm 0.02} \left[\frac{(1-b) M_{500}}{6 \times 10^{14} M_{\sun}}\right]^{1.79 \pm 0.08}, \label{eq:Y500M500}$$ where $E(z) = \sqrt{(1+z)^3 \Omega_M + \Omega_{\Lambda}}$. The extra bias term, $(1-b)$, corresponds to the expectation that the hydrostatic equilibrium (HSE) mass underestimates the true mass due to non-thermal pressure, so that $M^{HSE}_{500} = (1-b) M_{500}$. In this paper we set $b=0.2$, because it was the baseline for [@planck2013cluster_count]. As a demonstration of the potential of future NIKA2 tSZ dedicated large programs, we present a comparison of the recovered characteristics for in terms of pressure profile and tSZ–mass scaling relation, to the Planck 2013 results [@planck2013pressure_profile; @planck2013cluster_count]. The left panel of Fig. \[fig:scaling\_law\] provides a comparison between the pressure profile of , at high-redshift, and the average profile over 62 nearby clusters obtained by [@planck2013pressure_profile]. Both have been normalized to account for the mass and redshift dependance by $f(M) = \left(\frac{M_{500}}{3 \times 10^{14} \ M_{\sun}} \frac{H_0}{70 \ {\rm km s}^{-1} {\rm Mpc}^{-1}}\right)^{0.12}$ as detailed in [@planck2013pressure_profile]. The NIKA data show that the normalized pressure profile of is among the highest ones, but does not show any significant evidence of non-standard redshift evolution, within error bars. In addition we notice that our error bars are model dependent and do not reflect the full uncertainty of the data. The evolution of the pressure profile with redshift has been statistically tested recently using a Chandra analysis of 80 SPT clusters [@macdonald2014] with a highest bin at a mean redshift $z = 0.82$. They find no significant evolution, apart from the cluster’s cores, and agree with a standard redshift evolution of the pressure distribution among clusters. In the right hand panel of Fig. \[fig:scaling\_law\], we present $Y_{500}$ as a function of $M_{500}$ for . For comparison we also show the best-fit @planck2013cluster_count scaling law and the data corresponding to the 71 clusters used for its calibration. The mean redshift of this cluster sample is 0.195 with a maximum redshift of 0.447. The cluster , at $z=0.89$, is consistent with the @planck2013cluster_count scaling relation. This single data point does not allow us to draw any conclusion on the evolution with redshift. However, our results illustrate the strength of such measurements based on a sample of a few tens of clusters with future NIKA2 observations. This will indeed allow us to precisely constrain the redshift evolution of scaling relations, on the basis of individual measurements . Summary and conclusions {#sec:conclusion} ======================= The NIKA camera at the IRAM 30-meter telescope was used to image the cluster of galaxies via the tSZ effect at 150 and 260 GHz with 18.2 and 12.0 arcsec angular resolution, respectively. It provides the first resolved observation of this cluster at these frequencies. The cluster signal is detected in the two bands, but our tSZ analysis focuses on the 150 GHz map since the signal-to-noise is higher at this frequency. A submillimeter point source is detected at 260 GHz, 30 arcsec away from the cluster center, showing the interest of the dual-band capabilities of NIKA to account for such contaminant. These observations, on scales $\sim$ 20 – 200 arcsec, complement previous single-dish 90 GHz MUSTANG observations on scales in the range $\sim$ 10 – 50 arcsec and interferometric SZA data at 30 and 90 GHz, which are the most sensitive at arcmin scales. The ICM morphology of the cluster agrees with these previous measurements. appears relaxed on large scales and shows evidence of a disturbed core, most likely due to the merger of a subcluster to the southwest. It is also consistent with and lensing observations. We used maximum likelihood analysis to constrain the pressure profile of the cluster via Markov Chain Monte Carlo sampling. The NIKA maps were combined with Chandra data using the ACCEPT data, to jointly derive ICM thermodynamic quantities (pressure, density, temperature, and entropy profiles). Planck tSZ data were also used to cross-check the overall flux of . The inferred temperature profile of the cluster exhibits a core value of about 15 keV and decreases toward the outskirts, reaching about 5 keV around 1 Mpc. The entropy profile is described well by a simple power law in the range probed by NIKA but shows sign of flattening below 100 kpc with a core entropy above 100 keV cm$^2$, agreeing with being disturbed on small scales. Assuming that the hydrostatic equilibrium accurately applies to this cluster, we extracted the total mass and gas mass profile and derived the gas fraction profile. We measured $R_{500}~=~930^{+50}_{-43}$ kpc and $M_{500}~=~5.96^{+1.02}_{-0.79}~\times~10^{14}$ M$_{\sun}$ at a 68% confidence level. We compared these results when assuming Planck tSZ-based pressure-profile slope parameters or /numerical simulation based ones and find that both choices give consistent results in general. These results are compatible within the uncertainties with previous tSZ and measurements. NIKA is the prototype of NIKA2, which will be permanently installed at the IRAM 30-meter telescope at the end of 2015. NIKA2 will contain about 5000 detectors, [*i.e.*]{}, 15 times more than NIKA, within the same frequency bands and similar angular resolution. Its instantaneous field of view will accordingly increase from 1.8 to 6.5 arcmin. With such characteristics, NIKA2 will be well adapted to mapping the tSZ signal in intermediate and distant clusters of galaxies. The observation of is part of a pilot study that aims at characterizing the possible scientific outcomes of large observing campaigns with NIKA2. Future NIKA2 dedicated tSZ observations of a few tens of clusters would allow study of the evolution of scaling and structural properties of clusters of galaxies out to $z \sim 1$. Here, by comparing our results to the expected tSZ–mass Planck scaling relations for a single cluster, we have shown that with more objects, NIKA2 will be able to calibrate the tSZ-mass scaling relation and its eventual redshift dependence. We are thankful to the anonymous referee for useful comments that helped improve the quality of the paper. We gratefully thank Marian Douspis and the Planck collaboration for providing the Planck data points shown in the right hand panel of Fig. \[fig:scaling\_law\]. We thank Marco De Petris for useful comments. We would like to thank the IRAM staff for their support during the campaign. This work has been partially funded by the Foundation Nanoscience Grenoble, the ANR under the contracts “MKIDS” and “NIKA”. This work has been partially supported by the LabEx FOCUS ANR-11-LABX-0013. This work has benefited from the support of the European Research Council Advanced Grant ORISTARS under the European Union’s Seventh Framework Program (Grant Agreement no. 291294). The NIKA dilution cryostat was designed and built at the Institut Néel. In particular, we acknowledge the crucial contribution of the Cryogenics Group and, in particular Gregory Garde, Henri Rodenas, Jean Paul Leggeri, and Philippe Camus. R. A. would like to thank the ENIGMASS French LabEx for funding this work. B. C. acknowledges support from the CNES post-doctoral fellowship program. E. P. acknowledges support from grant ANR-11-BS56-015. A. R. would like to thank the FOCUS French LabEx for funding this work. A. R. acknowledges support from the CNES doctoral fellowship program. [^1]: FITS file of the published maps are only available at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via <http://cdsarc.u-strasbg.fr/viz-bin/qcat?J/A+A/576/12> [^2]: The radius $r_{\Delta}$ corresponds to a radius within which the mean cluster density is $\Delta$ times the one of the critical density of the Universe at that redshift. Hereafter, we commonly use the physical quantities within this radius, noted with a subscript $\Delta$ generally taken as 500. [^3]: <http://www.pa.msu.edu/astro/MC2/accept/>
2024-07-14T01:26:18.401715
https://example.com/article/2950
Is your computer still under manufacturer’s warranty? Not a problem. We are factory trained and authorized to repairApple, Dell, HP, Compaq, Toshiba, Sony, Fujitsu, Acer,Gateway, eMachines, Lenovo, and ASUS. Testimonials My laptop screen was not working properly and I needed a reputable company to fix it. Turns out a connection was loose and Warp charged me a fair and honest price for this quick fix. I highly recommend them. Rob H – Raleigh, NC Warp’s onsite service is a lifesaver! I was under a business deadline and my laptop needed fixing. They came out and fixed it quickly. I was able to meet my deadline thanks to the great guys at Warp. David S. – Raleigh, NC I took my iPad to Warp and within a few hours I received a callback from them about my issue. They were friendly, knowledgeable and very reasonable in their pricing. AND I got my iPad back within a few days. Thanks Warp! Diane P. – Cary, NC Warp Systems Testimonials My laptop screen was not working properly and I needed a reputable company to fix it. Turns out a connection was loose and Warp charged me a fair and honest price for this quick fix. I highly recommend them. Rob H – Raleigh, NC Warp’s onsite service is a lifesaver! I was under a business deadline and my laptop needed fixing. They came out and fixed it quickly. I was able to meet my deadline thanks to the great guys at Warp. David S. – Raleigh, NC I took my iPad to Warp and within a few hours I received a callback from them about my issue. They were friendly, knowledgeable and very reasonable in their pricing. AND I got my iPad back within a few days. Thanks Warp!
2023-09-01T01:26:18.401715
https://example.com/article/7934
{ "name": "googleplus/quickstart", "description": "This quick-start app is built in PHP and lets you get started with the Google+ platform in a few minutes.", "license": "Apache-2.0", "repositories": [ { "type": "package", "package": { "name": "google/apiclient", "version": "1.1.7", "source": { "url": "https://github.com/google/google-api-php-client.git", "type": "git", "reference": "v1-master" }, "autoload": { "classmap": [ "src/" ] } } } ], "require": { "silex/silex": "1.0.*@dev", "twig/twig": ">=1.8,<2.0-dev", "google/apiclient": "1.1.*", "guzzlehttp/guzzle": "5.2.*" } }
2023-08-08T01:26:18.401715
https://example.com/article/4303
Basic principles of cellular organization. The hypothesis is put forward that the division of the animal body into three germ layers represents not only histological, but also functional specialization, the ectoderm taking over functions through which the animal is in contact with, acted upon or reacts to the external world, the entoderm metabolism and the mesoderm architectural and mechanical organization. This is assumed to mean that the tasks of life have been divided into three large function domains at an early stage of multicellular evolution, each germ layer taking over one domain and developing largely independently of the other two in the further course of phylogeny. The germ layers are autonomous in their own spheres, giving the body, in effect, a tripartite government. The potentiality of conceptual thought is inherent in all germ layers, reaching a high state of development in the entoderm and mesoderm at a much earlier stage of development than in the ectoderm. The animal body, as a whole, is in control of all its biologic activities; it is a self-designing, self-developing and self-perpetuating entity. The control of cellular organization is a mesodermal task.
2023-08-04T01:26:18.401715
https://example.com/article/3797
in 1998 i was suspended for unpaid fines but didnt know i was suspended cuz i never got a notice . then i was pulled over and told by the cop i was suspended and couldnt drive my car home .i started paying off my fines and drove anyways i was cought 3 times i also in that time got 2 dui's .i served jail time for drive under suspention x3 and have been paying my fines bit by bit as im on ontario works/welfar so i can only pay so much. but there has to be some way to get my license back i have not drove in 4 years at all and have been keeping my nose clean from the cops can anyone help ..... thanks You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
2024-01-24T01:26:18.401715
https://example.com/article/5126
Middle School After-School Program Fairfax County Board of Supervisors and Fairfax County School Board to Kick Off Middle School After-School Program Expansion Fairfax County Board of Supervisors Chairman Gerald E. Connolly and Fairfax County School Board Chairman Ilryong Moon will kick off the expanded Fairfax County Middle School After-School Program on Wednesday, April 19, at 4 p.m., at Luther Jackson Middle School, 3020 Gallows Road, Falls Church. Currently, eight middle schools are in the process of expanding their after-school programs from three days a week to five days a week through a partnership between the Fairfax County Department of Community and Recreation Services and the Fairfax County Public Schools After-School Program Office. Four additional schools recently hired coordinators to expand their after-school programs, with the remaining 14 scheduled to be hired by the end of June. Expanded after-school programs are scheduled to be operational in all 26 county middle schools for the beginning of the 2006-2007 school year. “The expansion of the after-school program in middle schools is critical to the Board of Supervisors’ ongoing efforts to prevent our children from joining gangs,” said Connolly. “Providing young people, especially middle-school students, with constructive, safe activities reduces the opportunities for gang recruitment. We know that students are most vulnerable during the hours between when students leave school and parents come home from work. The after-school program helps young people develop academic and other skills in a safe and caring environment.” According to Moon, “Research indicates that high-quality after-school programs can markedly increase engagement in learning and that students who are engaged in learning behave better in school and have better work habits, improved attitudes toward school, a greater sense of belonging to the community and better relationships with their parents.” Today, nearly 70 percent of Fairfax County families have dual working parents or a single working parent. A majority of middle school youth are latchkey children who return to empty houses at the end of the regular school day. “When the school bell rings, the anxiety of parents often just begins,” said Luther Jackson Middle School Principal Carol Robinson. “They worry about whether their children are safe and whether they are susceptible to youth violence and gang activity, alcohol, tobacco and drug use, and crime.” In response to this concern, the Board of Supervisors earmarked $3.5 million to expand the after-school program in all 26 county middle schools. This new investment builds on an ongoing effort in Fairfax County to provide high-quality after-school activities for middle school youth through the collaborative efforts of the School Board, the Board of Supervisors, school-community coalitions and the Fairfax Partnership for Youth. The after-school programs will operate five days a week for at least two hours following the close of school in most schools. The following middle schools currently have expanded programs: Jackson, Glasgow, Herndon, Key, Lake Braddock, Liberty, Poe and South County. The following schools should have programs underway by the end of the school year: Whitman, Kilmer, Thoreau and Longfellow. Expanded after-school programs are to be in operation at the remaining schools by the beginning of the next school year. Fairfax County is committed to nondiscrimination on the basis of disability in all county programs, services and activities. To request this information in an alternate format, call the Office of Public Affairs at 703-324-3187, TTY 711.
2023-11-05T01:26:18.401715
https://example.com/article/6589
to buy led garden lights This section is empty. Purchase The Led Garden Lights For Your Lawn Area Do you accept that your lawn needs one thing to lighten it up? Diverse assortments of lighting can frequently make things look incredible. Is this something you are recognizing? Provided that this is true, led garden lights could most likely be an extraordinary thing to have outside your home. LED solar garden lights make any zone look a tad bit all the more energizing and interesting, and subsequently, you may discover them to be fairly profitable. In case you're energetic about getting more info about LED solar garden lights, go through this article as we will positively offer you a little more data about LED solar garden lights. The reason behind the craze of led lights LED solar garden lights are superior to what they have ever been before since they keep going for a long period, they are now brighter, and they're more effective than different sorts of lights. You can discover them in any store to meet your necessities for your outside experience. In case that you frequently host party outside or outside get-togethers, these would without a doubt be an eminent thing for you to have. They will definitely liven up an outside zone. When you plan to buy led garden lights, you will see that there are contrasting sorts. If you need lights in your garden or front yard, there are solar way lights accessible. You may discover solar deck lights which really go on your deck. You may discover stainless steel lights that can undoubtedly be of a premium quality. Find the led light through web You may likewise discover solar lights, which will give you an extraordinary arrangement of light for your outside region. The style of light that you get ought to for the most part rely on what sort of zone you are lighting and what you are looking for that range. When you end up looking forled garden lights, one of the best places to look is on the web. There is wide range of things on the web, and LED solar garden lights positively fit into this group. When you're web shopping, you will have the capacity to assess diverse LED solar garden lights in that spot in your home. Compare the price before buying You'll have the capacity to think about costs on the diverse sites with the goal that you can discover the best cost for your plan. There are without a doubt a huge range of lights to select from, and there are various distinctive costs to browse to. You only need to make certain you buy led garden lights that fit your pocket. In the blink of an eye, you will have the capacity to acquire the solar powered garden lights that you're scanning for if you essentially do some seeking. At that point, you can convert your garden or your front yard into an outside range that is fascinating and outwardly engaging. After the installation of this light, you will be able to arrange some delightful part amidst the light and fresh air.
2024-06-26T01:26:18.401715
https://example.com/article/6108
Melanie C — I Want You Back lyrics Every day, in my thoughts, you're my one obsession. Can't go on, need a fix, this is my confession. When you're not around the nights go along. You may be with her but with me you belong. I am the only one, I am the only one. I want you back. Whatever you do. I want you back. I've got nothing to prove. I don't care what you said. Want you back in my bed. I want you back. I want you back. Can't let go, guess you know now I've blown my cover. What I want, what I need is no other lover. Try to deny it but you know it's true. No-one can make you feel like you do. I am the only one. I am the only one. I want you back. Whatever you do. I want you back. I've got nothing to prove. I don't care what you said. Want you back in my bed. I want you back. I want you back. You can't keep running away from me. When something feels so right then it's meant to be. Like a dog with a bone I wont let go. Wont let go. Try to deny it but you know it's true. No-one can make you feel like I do. I am the only one. I am the only one. I want you back. Whatever you do. I want you back. I've got nothing to prove. I don't care what you said. Want you back in my bed. I want you back. I want you back.
2024-05-28T01:26:18.401715
https://example.com/article/1616
Q: Prove that if $a\nmid b$, $ax^3+bx+(b+a)=0$ has no natural number solutions Let $a,b\in\mathbb Z$ with $a\neq0$. I need to prove that if $a\nmid b$, then the equation $ax^3+bx+(b+a)=0$ does not have a solution that is a natural number. I noticed that regardless of the values of $a$ and $b$, the equation will always have a root at $-1$ (i.e. $ax^3+bx+(b+a)=a(x^2-x+(1+\frac{b}{a}))(x+1)$. So now the problem reduces to proving that if $a\nmid b$, $x^2-x+(1+\frac{b}{a})=0$ has no natural number solutions. I've used the quadratic formula and tried to analyse this a number of ways but I'm quite stuck. A: Your quadratic equation is, with the factor of $a$ included, $$ax^2 - ax + a + b = 0 \implies b = -a(x^2 - x + 1) \tag{1}\label{eq1A}$$ As Bill Dubuque's question comment states, for $x \in \mathbb{N}$, you have $a$ dividing the right hand side, so it must also divide the left hand side, i.e., $b$. Thus, you require $a \mid b$. However, since you're given $a \not\mid b$, this can't be true, meaning there is no natural number solution for $x$.
2023-08-08T01:26:18.401715
https://example.com/article/4474
Posted by coltsindianapolis on July 26, 2015 – 12:14 pm The Indianapolis Colts today released offensive tackle Gosder Cherilus. Cherilus is a seven-year NFL veteran who started 100-of-104 career games between the Detroit Lions (2008-2012) and Colts (2013-14). He was signed by Indianapolis as an unrestricted free agent on March 13, 2013. In two seasons with the Colts, he started all 29 games he appeared in, which included two postseason contests in 2013. Share this: Twitter Facebook Print Like this: Like Loading... Comments Off on INDIANAPOLIS COLTS RELEASE OT-GOSDER CHERILUS Posted in Colts Blog
2024-02-29T01:26:18.401715
https://example.com/article/9388
Characterization of weak alleles at the DIA1 locus (Mustapha 1, Mustapha 2, and Mustapha 3) in the Algerian population. One percent of the Algerian population carries a weak allele at the DIA1 locus, responsible for a 50% decrease of red cell soluble cytochrome b5 reductase activity. Quantitative abnormalities of the soluble and the membrane-bound enzyme have been investigated in the red cells and in the leukocytes of seven subjects considered to be heterozygous at the DIA1 locus. Conventional electrophoretic or isoelectrophoretic studies did not show any qualitative abnormality. However, continuous titration obtained by combined IEF-electrophoresis displayed in five out of seven subjects a discrete abnormal line on the titration curve compatible with an Arg leads to His substitution. In fact, at least three types of weak alleles could be defined by combining the qualitative and quantitative results obtained with the erythrocyte (soluble and membrane-bound) and leukocyte enzyme. We call these subgroups DIA Mustapha1, DIA Mustapha2, and DIA Mustapha3.
2024-02-17T01:26:18.401715
https://example.com/article/6089
<?xml version="1.0" encoding="UTF-8"?> <TestSettings name="Local" id="a9060e19-3268-49af-a473-02e586823176" xmlns="http://microsoft.com/schemas/VisualStudio/TeamTest/2010"> <Description>These are default test settings for a local test run.</Description> <Deployment enabled="false" /> <Execution> <TestTypeSpecific /> <AgentRule name="Execution Agents"> </AgentRule> </Execution> <Properties /> </TestSettings>
2023-08-19T01:26:18.401715
https://example.com/article/4869
Field of the Invention The invention relates to a heat-shield component which is part of a hot-gas wall to be cooled. The invention furthermore relates to a heat-shield configuration which lines a hot-gas space, in particular a combustion chamber of a gas-turbine plant, and has a plurality of heat-shield components. The invention additionally relates to a heat-shield assembly. Due to high temperatures which prevail in hot-gas passages or other hot-gas spaces, it is necessary for an inner wall of a hot-gas passage to be constructed in the best possible manner in terms of temperature-resistance. On one hand, high-temperature-resistant materials, such as, for example, ceramics, are suitable for that purpose. The disadvantage of ceramic materials lies both in their great brittleness and in their unfavorable heat and temperature conductivity. A suitable alternative to ceramic materials for heat shields is high-temperature-resistant metal alloys on an iron, chromium, nickel or cobalt basis. However, since the service temperature of high-temperature-resistant metal alloys is markedly below the maximum service temperature of ceramic materials, it is necessary to cool metallic heat shields in hot-gas passages. One possibility is proposed, for example, in U.S. Pat. No. 4,838,031 to Cramer, dated Jun. 13, 1989. Cramer proposes a panel which is formed of four components and is to be mounted on the inside of a combustion-chamber casing. In that case, a first or top layer facing the hot-gas space is made of a refractory metal, but may also be formed by a ceramic material. That is followed underneath by a second layer of steel-wool-like metallic filaments. Those filaments rest on a relatively large number of column-like supports. Those column-like supports and cavities in between form a third layer. The column-like supports are attached to a fourth metallic layer. The steel-wool-like metallic filaments of the second layer absorb heat energy from the overlying layer forming the inner burner wall and transfer that heat energy to an air flow directed between the column-like supports. In that case, the cavities of the third layer are connected, through passages which lead through the fourth layer and the burner casing, to a space outside the burner, and that space is fed with air through a compressor. The compressed air can pass as a coolant through those passages into the cavity formed by the layers. In addition, a second type of passage is distributed over a front and center region of the combustion chamber. The air originating from the exterior of the combustion chamber passes through such passages through the combustion-chamber casing and the layered panels into the combustion chamber. The proposal by Cramer has the disadvantage of causing cool air to flow into the combustion chamber over the entire region of the latter without having participated in the combustion. As a consequence thereof, the temperature at an outlet of the combustion chamber drops. A heat-shield configuration, in particular for structural parts of gas-turbine plants, is described in European Patent 0 224 817 B1. The heat-shield configuration has an inner lining which is made of heat-resistant material and is composed of heat-shield elements in such a way as to cover the surface. The heat-shield elements are anchored to the supporting structure. Those heat-shield elements are disposed next to one another while leaving gaps for the throughflow of cooling fluid and they are thermally movable. Each of those heat-shield elements has a cap part and a shank part shaped like a mushroom. The cap part is a flat or spatial, polygonal plate body having straight or curved boundary lines. The shank part connects a central region of the plate body to the supporting structure. The cap part preferably has a triangular shape, as a result of which an inner lining of virtually any geometry can be produced by identical cap parts. The cap parts as well as other parts of the heat-shield elements, if need be, are made of a high-temperature-resistant material, in particular a steel. The supporting structure has bores through which a cooling fluid, in particular air, can flow into an intermediate space between the cap part and the supporting structure and can flow from there through the gaps, which are intended for the throughflow of the cooling fluid, into a spatial region, for example a combustion chamber of a gas-turbine plant, surrounded by the heat-shield elements. That cooling fluid flow reduces the ingress of hot gas into the intermediate space. A wall, in particular for gas-turbine plants, which has cooling-fluid passages, is described in German Published, Non-Prosecuted Patent Application DE 35 42 532 A1. In gas-turbine plants, the wall is preferably disposed between a hot space and a cooling-fluid space. The wall is assembled from individual wall elements and each of the wall elements is a plate body made of a high-temperature-resistant material. Each plate body has parallel cooling passages which are distributed over its surface area and communicate at one end with the cooling-fluid space and at the other end with the hot space. The cooling fluid, flowing into the hot space and directed through the cooling-fluid passages, forms a cooling-fluid film on that surface of the wall element and/or adjacent wall elements which faces the hot space. In summary, all of those heat-shield configurations, in particular for gas-turbine combustion chambers, are based on the principle that compressor air is utilized as a cooling medium for the combustion chamber and its lining as well as for sealing air. The cooling and sealing air enters the combustion chamber without having participated in the combustion. That cold air mixes with the hot gas. As a result, the temperature at the outlet of the combustion chamber drops. Therefore, the output of the gas turbine and the efficiency of the thermodynamic process decrease. Partial compensation may be carried out by a higher flame temperature being set. However, that then results in material problems, and higher emission values have to be tolerated. It is likewise a disadvantage with the configurations specified that, in the case of the air fed to the burner, pressure losses result due to the entry of the cooling fluid into the combustion chamber. International Publication No. WO 98/13645 A1, which was published subsequently to the priority date of the instant application, describes a heat-shield component with cooling-fluid return, having a hot-gas wall to be cooled, an inlet passage for cooling fluid, and an outlet passage for the cooling fluid. The inlet passage is directed towards the hot-gas wall and widens in the direction of the hot-gas wall. The inlet passage is largely surrounded by the outlet passage. The supporting structure is constructed as a twin-wall structure, having an outer wall and an inner wall disposed parallel to and adjacent the outer wall while leaving an intermediate space. In order to permit fastening to the supporting structure, the heat-shield component, at the outlet passage, has a fastening part with which the outlet passage is put onto the outer wall and fastened to the latter. Inside the outlet passage, the outer wall has an opening through which the inlet passage is directed while leaving a gap. The inner wall has a further opening into which the inlet passage is pushed over a short length. Cooling fluid can be fed to the heat-shield component through the inlet passage and discharged through the outlet passage. The inlet passage is covered with a cover wall which has impingement-cooling openings. Cooling fluid fed from the inlet passage can pass through the impingement-cooling opening and strike the hot-gas wall, in the course of which the latter is cooled.
2024-03-10T01:26:18.401715
https://example.com/article/4673
The 50 best brunch places in NYC: Staten Island By Time Out contributors, edited by Tazi PhillipsPosted: Tuesday February 17 2015 Whether you already live there or have to hop on the Staten Island Ferry, these brunch spots are worth visiting. Try the three-course meal at Spanish tapas bar Beso, or savor an avocado breakfast burrito at Alor Cafe. After you’ve visited one of the borough’s best brunch restaurants, check out one of the many oft-overlooked top attractions in Staten Island. The best spots for brunch in Staten Island Deep in the sleepy Staten Island enclave of Grant City, this usually pulsating lounge forgoes the DJ during brunch time for flatscreens playing cartoons. Grab a booth at an arched window and dig into the avocado breakfast burrito, sweet-corn omelette or sunny-side-egg-topped chicken schnitzel. Tear the kids away from the restaurant’s stash of Wikki Stix by offering them a PB&J-and-banana sandwich. Though Beso is billed as a Spanish tapas bar, the menu at this sexy little spot goes far beyond Iberia (through Cuba, Mexico and Puerto Rico, for starters), making up for a lack of focus with big flavors and conviviality. The three-course brunch is just $25 per person. With options like sautéed mussels, clams and calamari over penne in a spicy tomato sauce, and baked scrambled eggs with spinach, bacon and cheese, the price is a steal. Choose the soup of the day or a salad and go straight for a fruity-sweet glass of tequila-spiked sangria. And even if you’re stuffed, make room for dessert, like fluffy sopapillas or tres leches cake.
2023-08-09T01:26:18.401715
https://example.com/article/3616
AngularInDepth is moving away from Medium. More recent articles are hosted on the new platform inDepth.dev. Thanks for being part of indepth movement! Accessibility is an essential topic for every modern web application. Accessibility means that everyone can use your web application. As devs, it’s easy to assume that all users can see or interact with a page as we do. But there is a range of people that do not belong to the “typical” user. People may have visual, physical, auditory, or cognitive problems. Accessibility is not about including groups, it’s about not excluding groups. Even though accessibility is crucial, it’s often overlooked. I was once in a project where we built a vast webshop and completely forgot about accessibility. With that, we excluded a range of persons from our business. Also, our shop was nominated for an award which we didn’t get because our shop wasn’t accessible at all. 😔 You can imagine what happened after that. Taskforce! Trust me, adding aria attributes and listen to JAWS screenreader for days is not fun! Take accessibility seriously! You should treat accessibility seriously since it is an essential aspect. Again, it’s about preventing to exclude people from accessing your business. In my opinion, the best way to handle accessibility is to integrate it as early as possible. Accessibility tests should be part of your workflow. I see them somewhat similar to unit or integration tests. They should be automated and integrated into a pipeline. In case of failure, you should not be able to merge. What’s needed to make a web app accessible? Making a page accessible fully accessible requires a lot of knowledge. There are tons of useful articles that answer this question. In my opinion, the following points are the most important ones: Your page can be used with the keyboard — form controls can be navigated and activated HTML code is written a semantic as possible Labels are correctly wired with input fields using the for attribute attribute ARIA (Accessible Rich Internet Applications) attributes are set and can be read by screen readers Colors combinations follow the contrast accessibility guidelines. Of course, it’s hard to remember all of those things. Therefore we need to automate it. How to automate accessibility tests? The beauty of the web and especially Angular is its broad ecosystem. There’s almost always a tool. Also for accessibility. And it’s called Pa11yCI . It’s README tells us that it’s precisely what we are looking for: Runs accessibility tests against multiple URLs and reports on any issues. This is best used during automated testing of your application and can act as a gatekeeper to stop accessability issues from making it to live. To start using this tool, we first install it as a dev dependency. npm i -D pa11y-ci Once installed, we can go ahead and configure it. By default pa11y-ci looks for a .pa11y-ci file written in JSON or JavaScript. Let’s go ahead and create such a file on the root level of our project. There are various ways to configure pay11-ci . You can find more information on the configuration on the official README or under this link. For the scope of this blog post, we go with the most straightforward setup. { "defaults": { "timeout": 5000 }, "urls": [ "http://localhost:4200/foo", "http://localhost:4200/bar", "http://localhost:4200/baz" ] } The defaults key allows us to set some defaults which will be used for each URL. The urls key contains all the URLs that will be checked for accessibility. As you can see, we are working with URLs; this already indicates that we test against a running instance of our application. Next, let’s add one more script to our package.json which executes the accessibility tests. "test:accessability": "pa11y-ci", At this point, we are ready for our first accessibility test. Let’s spin up two terminal windows and run ng server in the first one. After the dev server is up and running, we run npm run test:accessability in the second terminal window. This now runs accessibility tests against our application and spits out a report that may look like this.
2024-05-27T01:26:18.401715
https://example.com/article/9359
Q: Register clojure.specs from a map I have a map of clojure.specs that I want to use to validate my requests in runtime like this: {::num-id int? :project-spec/id ::num-id :project-spec/name (s/and string? #((< (count %) 24))) :project-spec/project (s/keys :req-un [:project-spec/id :project-spec/name])} I can use any of those specs in runtime to validate using s/valid?, except the project-spec/project one. That one requires all others to be registered in global spec registry to work properly. When I try to register spec using simple doseq function if fails since I pass local variables to s/def macros and it doesn't resolve variables to the value before expanding the macros. (doseq [[name spec] spec-map] (s/def name spec)) I tried to create macros to eval variables before passing them to s/def macros, but that one fails with CompilerException java.lang.UnsupportedOperationException: Can't eval locals. (defmacro reg-spec [name spec] `(s/def ~(eval name) ~(eval spec))) (doseq [[name spec] spec-map] (reg-spec name spec)) The last thing I tried is to eval variables when passing to s/def but that fails spec validation. (s/def (eval spec-name) (eval spec-spec)) CompilerException java.lang.AssertionError: Assert failed: k must be namespaced keyword or resolvable symbol (c/and (ident? k) (namespace k)) Is there any way to achieve what I want to do? Or am I misunderstanding something obvious? Any help is appreciated! A: Is there a reason you don't want to give the specs a name via s/def? An important aspect of spec is strong/namespaced names. Your example gives them names in a sense, but only as keys in that map. I'd s/def them all. I fixed a few errors in the example above. Your map keys are namespaced, so s/keys should use :req instead of :req-un. (s/def ::num-id integer?) (s/def :project-spec/id ::num-id) (s/def :project-spec/name (s/and string? #(< (count %) 24))) (s/def :project-spec/project (s/keys :req [:project-spec/id :project-spec/name])) You could still build your map of specs if you wanted, but the keys/values would be identical. (s/conform :project-spec/project {:project-spec/id 1, :project-spec/name "123"}) ;;=> {:project-spec/id 1, :project-spec/name "123"}
2023-12-02T01:26:18.401715
https://example.com/article/5621
Humerus fracture A humerus fracture is a break of the humerus bone in the upper arm. Symptoms may include pain, swelling, and bruising. There may be a decreased ability to move the arm and the person may present holding their elbow. Complications may include injury to an artery or nerve, and compartment syndrome. The cause of a humerus fracture is usually physical trauma such as a fall. Other causes include conditions such as cancer in the bone. Types include proximal humeral fractures, humeral shaft fractures, and distal humeral fractures. Diagnosis is generally confirmed by X-rays. A CT scan may be done in proximal fractures to gather further details. Treatment options may include a sling, splint, brace, or surgery. In proximal fractures that remain well aligned, a sling is often sufficient. Many humerus shaft fractures may be treated with a brace rather than surgery. Surgical options may include open reduction and internal fixation, closed reduction and percutaneous pinning, and intramedullary nailing. Joint replacement may be another option. Proximal and shaft fractures generally have a good outcome while outcomes with distal fractures can be less good. They represent about 4% of fractures. Signs and symptoms After a humerus fracture, pain is immediate, enduring, and exacerbated with the slightest movements. The affected region swells, with bruising appearing a day or two after the fracture. The fracture is typically accompanied by a discoloration of the skin at the site of the fracture. A crackling or rattling sound may also be present, caused by the fractured humerus pressing against itself. In cases in which the nerves are affected, then there will be a loss of control or sensation in the arm below the fracture. If the fracture affects the blood supply, then the patient will have a diminished pulse at the wrist. Displaced fractures of the humerus shaft will often cause deformity and a shortening of the length of the upper arm. Distal fractures may also cause deformity, and they typically limit the ability to flex the elbow. Causes Humerus fractures usually occur after physical trauma, falls, excess physical stress, or pathological conditions. Falls that produce humerus fractures among the elderly are usually accompanied by a preexisting risk factor for bone fracture, such as osteoporosis, a low bone density, or vitamin B deficiency. Proximal Proximal humerus fractures most often occur among elderly people with osteoporosis who fall on an outstretched arm. Less frequently, proximal fractures occur from motor vehicle accidents, gunshots, and violent muscle contractions from an electric shock or seizure. Other risk factors for proximal fractures include having a low bone mineral density, having impaired vision and balance, and tobacco smoking. A stress fracture of the proximal and shaft regions can occur after an excessive amount of throwing, such as pitching in baseball. Middle Middle fractures are usually caused by either physical trauma or falls. Physical trauma to the humerus shaft tends to produce transverse fractures whereas falls tend to produce spiral fractures. Metastatic breast cancer may also cause fractures in the humerus shaft. Long spiral fractures of the shaft that are present in children may indicate physical abuse. Distal Distal humerus fractures usually occur as a result of physical trauma to the elbow region. If the elbow is bent during the trauma, then the olecranon is driven upward, producing a T- or Y-shaped fracture or displacing one of the condyles. Diagnosis Definitive diagnosis of humerus fractures is typically made through radiographic imaging. For proximal fractures, X-rays can be taken from a scapular anteroposterior (AP) view, which takes an image of the front of the shoulder region from an angle, a scapular Y view, which takes an image of the back of the shoulder region from an angle, and an axillar lateral view, which has the patient lie on his or her back, lift the bottom half of the arm up to the side, and have an image taken of the axilla region underneath the shoulder. Fractures of the humerus shaft are usually correctly identified with radiographic images taken from the AP and lateral viewpoints. Damage to the radial nerve from a shaft fracture can be identified by an inability to bend the hand backwards or by decreased sensation in the back of the hand. Images of the distal region are often of poor quality due to the patient being unable to extend the elbow because of pain. If a severe distal fracture is suspected, then a computed tomography (CT) scan can provide greater detail of the fracture. Nondisplaced distal fractures may not be directly visible; they may only be visible due to fat being displaced because of internal bleeding in the elbow. Classification Fractures of the humerus are classified based on the location of the fracture and then by the type of fracture. There are three locations that humerus fractures occur: at the proximal location, which is the top of the humerus near the shoulder, in the middle, which is at the shaft of the humerus, and the distal location, which is the bottom of the humerus near the elbow. Proximal fractures are classified into one of four types of fractures based on the displacement of the greater tubercle, the lesser tubercle, the surgical neck, and the anatomical neck, which are the four parts of the proximal humerus, with fracture displacement being defined as at least one centimeter of separation or an angulation greater than 45 degrees. One-part fractures involve no displacement of any parts of the humerus, two-part fractures have one part displaced relative to the other three; three-part fractures have two displaced fragments, and four-part fractures have all fragments displaced from each other. Fractures of the humerus shaft are subdivided into transverse fractures, spiral fractures, "butterfly" fractures, which are a combination of transverse and spiral fractures, and pathological fractures, which are fractures caused by medical conditions. Distal fractures are split between supracondylar fractures, which are transverse fractures above the two condyles at the bottom of the humerus, and intercondylar fractures, which involve a T- or Y-shaped fracture that splits the condyles. Treatment The aim of treatment is to minimize pain and to restore as much normal function as possible. Most humerus fractures do not require surgical intervention. Proximal One-part and two-part proximal fractures can be treated with a collar and cuff sling, adequate pain medicine, and follow up therapy. Two-part proximal fractures may require open or closed reduction depending on neurovascular injury, rotator cuff injury, dislocation, likelihood of union, and function. For three- and four-part proximal fractures, standard practice is to have open reduction and internal fixation to realign the separate parts of the proximal humerus. A humeral hemiarthroplasty may be required in proximal cases in which the blood supply to the region is compromised. Compared with non-surgical treatment, surgery does not result in a better outcome for the majority of people with displaced proximal humeral fractures and is likely to result in a greater need for subsequent surgery. Middle Fractures of the humerus shaft are most often uncomplicated, closed fractures that require nothing more than pain medicine and wearing a cast or sling. For midshaft fractures up to 12 weeks may be required for healing. In shaft and distal cases in which complications such as damage to the neurovascular bundle exist, then surgical repair is required. Prognosis In most cases, people are discharged from an emergency department with pain medicine and a cast or sling. These fractures are typically minor and heal over the course of a few weeks. Fractures of the proximal region, especially among elderly people, may limit future shoulder activity. Severe fractures are usually resolved with surgical intervention, followed by a period of healing using a cast or sling. Severe fractures often cause long-term loss of physical ability. Complications in the recovery process of severe fractures include osteonecrosis, malunion or nonunion of the fracture, stiffness, and rotator cuff dysfunction, which require additional intervention in order for the people to fully recover. Epidemiology Humerus fractures are among the most common of fractures. Proximal fractures make up 5% of all fractures and 25% of humerus fractures, middle fractures about 60% of humerus fractures (12% of all fractures), and distal fractures the remainder. Among proximal fractures, 80% are one-part, 10% are two-part, and the remaining 10% are three- and four-part. The most common location of proximal fractures is at the surgical neck of the humerus. Incidence of proximal fractures increases with age, with about 75% of cases occurring among people over the age of 60. In this age group, about three times as many women than men experience a proximal fracture. Middle fractures are also common among the elderly, but they frequently occur among physically active young adult men who experience physical trauma to the humerus. Distal fractures are rare among adults, occurring primarily in children who experience physical trauma to the elbow region. References Bibliography External links Category:Bone fractures Category:Injuries of shoulder and upper arm Category:RTT
2024-01-08T01:26:18.401715
https://example.com/article/6489
Q: Expand and shrink div based on updated ajax content I'd like to create a div element that grows and shrinks (slides up and down) based on content returned from a user's search query. I'm using JQuery's animate property and for the most part, it's functional. When a user performs the first query, I'd really like the animation to perform a slideDown affect while fading in the content at the same time. If an additional search query is performed, the div will grow (or shrink) based on the content returned from the server. Right now, the first search results in an unwanted left to right slide-like effect. Subsequent queries expand the div correctly. To illustrate this question, please see the JSFiddle: http://jsfiddle.net/krpXk/ HTML: <input type="text" id="search-term" /> <input type="button" id="submit-button" value="submit" /> <div id="limit"> <div id="results"></div> </div> Javascript: $('#submit-button').click(function(e) { // ajax request $.ajax({ async: true, cache: false, type: 'post', url: '/echo/html/', data: { html: '<p class="p-content">Search term: ' + $('#search-term').val() + '</p>' }, dataType: 'html', success: function(data) { $('#results').append(data).show(function(){ $('#limit').animate({ height:$("#results").height() },500); }); } }); }); CSS: #results { background:#dfdfdf; display:none; width:300px; } #limit { position: relative; overflow: hidden; width:100%; } .p-content { margin:0 auto; width:100px; } Update: I found that the answer was very simple. Just by setting the #limit height to 0 forced a slide down animation. From the answer: "Please note, that I gave the #limit container an explicit height of 0px in the CSS in order to force the initial animation." A: If you want the content to be faded in at the same time as the container slides down, you can put some selective logic to handle the initial case that handles the opacity of the content. Please note, that I gave the #limit container an explicit height of 0px in the CSS in order to force the initial animation. var wasOriginallyEmpty = $('#results').is(':empty'); $('#results').append(data); if (wasOriginallyEmpty) { $('#results').contents().css('opacity', 0); } $('#limit').animate({ height: $('#results').height() }, 500); if (wasOriginallyEmpty) { $('#results').contents().animate({ 'opacity': 1 }, 1000); } jsfiddle
2024-02-05T01:26:18.401715
https://example.com/article/6829
\[The copyright line for this article was changed on 28 October 2016 after original online publication\] Introduction {#ams2224-sec-0004} ============ Aortoduodenal fistula (ADF) is defined as a communication between the native aorta and duodenum and is an extremely rare cause of gastrointestinal bleeding. Aortoduodenal fistula should be studied because the mortality rate of untreated ADF with upper gastrointestinal bleeding is almost 100%.[1](#ams2224-bib-0001){ref-type="ref"} Recently, endovascular aneurysm repair (EVAR) has been attempted as a first‐line treatment of choice for ADF.[2](#ams2224-bib-0002){ref-type="ref"}, [3](#ams2224-bib-0003){ref-type="ref"} With the aging of the population, the number of elderly patients and patients with a greater number of comorbidities and surgical histories has also increased.[4](#ams2224-bib-0004){ref-type="ref"} Here, we present a very rare case of primary ADF that was complicated by a history of distal gastrectomy and Billroth I reconstruction in a patient with poor preoperative status. Case {#ams2224-sec-0005} ==== A 69‐year‐old Japanese man with hematemesis and severe anemia was transferred to the emergency unit of our hospital. He had no previous history of hematemesis, and he arrived at our hospital 6 h after this first episode. He had presented at a hospital 6 months previously because of alcoholism and malnutrition, causing large sores. He was bedridden and emaciated (body mass index, 14.08 kg/m^2^), and he received nutritional therapy with oral nutrition and i.v. hyperalimentation. The patient also had a history of distal gastrectomy for gastric cancer 8 years previously, with no history of abdominal aortic aneurysm (AAA) treatment. Physical examination revealed the following findings: pulse, 110 b.p.m.; blood pressure, 110/76 mmHg; body temperature, 35.9°C; and respiratory rate, 16 breaths/min. His abdomen was flat, hard, and painful. A palpable pulsatile mass was detected in the umbilical region. He also had peripheral coldness. Laboratory investigation revealed severe anemia (hemoglobin, 6.5 g/dL), inflammation (white blood cell count, 13,300/μL; C‐reactive protein \[CRP\], 7.25 mg/dL), malnutrition (albumin, 2.0 g/dL), and a coagulation disorder (prothrombin time -- international normalized ratio, 1.66; activated partial thromboplastin time, 52.6 s; and fibrin degradation products, 27.0 μg/dL). There were no data that were suggestive of renal or liver dysfunction. Enhanced computed tomography (CT) showed a 50 × 52 × 53‐mm infrarenal AAA that was saccular and connected to the duodenum by a hematoma (Fig. [1](#ams2224-fig-0001){ref-type="fig"}A, B). The hematoma was also present in the stomach and duodenum (Fig. [1](#ams2224-fig-0001){ref-type="fig"}A, white arrows). Based on the clinical course and results of the investigations, the patient was diagnosed with ADF because of AAA rupture. ![Computed tomography images of a 69‐year‐old man with aortoduodenal fistula, taken on arrival at our hospital. A, A large hematoma was found in the stomach and duodenum (white arrows). A saccular aneurysm was connected to the duodenum by the hematoma (white circle). B, Anatomical computed tomography findings. Blue, green, and red lines represent the outlines of the stomach, duodenum, and aneurysm, respectively. Dotted line indicates the unclear boundary between the duodenum and aneurysm.](AMS2-4-105-g001){#ams2224-fig-0001} We initially decided to treat the patient with EVAR to control the bleeding. A laparotomy was also planned to repair the duodenal perforation. The operation was started 90 min after the patient\'s arrival at the hospital. At this point, hemodynamic status was maintained by fluid infusion (pulse, 119 b.p.m.; blood pressure, 105/77 mmHg). First, a stent graft (Excluder; W.L. Gore, Flagstaff, AZ, USA) was successfully deployed in the infrarenal aorta. Angiography showed no extravasation or endoleak, and the bleeding was controlled (Fig. [2](#ams2224-fig-0002){ref-type="fig"}A, B). The operation time for EVAR was 56 min. Consequently, laparotomy was carried out through a median incision. Bloody ascites was found in the abdominal cavity. The stomach and duodenum were anastomosed using the Billroth I method. The transverse mesocolon and duodenum were densely and broadly adhered to the AAA with fibrous tissue (Fig. [2](#ams2224-fig-0002){ref-type="fig"}C). Therefore, we could not separate the aneurysm and duodenum. This prevented direct identification and repair of the ADF. Intraoperative gastrointestinal endoscopy was carried out; however, we could not locate the duodenal perforation. There was no active bleeding. Accordingly, we decided to undertake intestinal tubing for decompression and indirect duodenal lesion isolation. Two tubes, 12‐ and 10‐Fr, were inserted into the oral and anal sides of the jejunum, respectively (Fig. [3](#ams2224-fig-0003){ref-type="fig"}A). Additional procedures were deemed to be too invasive for this patient, and the operation was ended. The total surgery time was 4 h 50 min. The total blood loss was 850 mL, and 1120 mL of suspended red cells were transfused. We planned a second elective operation for retrial of duodenal perforation closure or surgical isolation of the duodenum with a gastrojejunal anastomosis. Intravenous antibiotics (piperacillin/tazobactam, 13.5 g/day) were given preoperatively. The preoperative blood bacterial culture was negative. Enteral nutrition was started on postoperative day 3. Antibiotics were continued until postoperative day 6. Physical examination on postoperative day 6 did not indicate infection, and the laboratory findings had improved (white blood cell count, 5,190/μL; CRP, 4.18 mg/dL). In addition, CT on postoperative day 7 showed no endoleak, extravasation, or abdominal abscesses (Fig. [3](#ams2224-fig-0003){ref-type="fig"}B). The patient was transferred to the previous hospital to continue internal therapy on postoperative day 8; however, the patient died suddenly 2 months after the first operation with recurrent inflammation (white blood cell count, 13,000/μL; CRP, 6.11 mg/dL) and severe anemia (hemoglobin level, 3.3 g/dL). ![Intraoperative findings in a 69‐year‐old man with aortoduodenal fistula and a history of alcoholism, malnutrition, and distal gastrectomy and Billroth I reconstruction. A, Angiography showed a saccular aneurysm. B, After endovascular aneurysm repair, the aneurysm disappeared and no extravasation or endoleaks remained. C, The transverse mesocolon and duodenum densely adhered to the abdominal aortic aneurysm by fibrous tissue. The aneurysm was covered by the mesocolon.](AMS2-4-105-g002){#ams2224-fig-0002} ![Schematic representation of the operative findings and our procedures in a 69‐year‐old man with aortoduodenal fistula who underwent endovascular aneurysm repair. A, Abdominal aortic aneurysm and the duodenum were densely and broadly adhered to each other. The fistula was suspected to exist on the third portion of the duodenum (\*). Following endovascular aneurysm repair, two tubes were inserted in the oral and anal sides of the jejunum for intestinal tract decompression. B, Postoperative computed tomography image at 7 days showed no endoleak or free air around the stent graft.](AMS2-4-105-g003){#ams2224-fig-0003} Discussion {#ams2224-sec-0006} ========== The clinical course of ADF is typically characterized by "herald bleeding," which is spontaneous brief hematemesis followed by massive bleeding from hours to weeks later.[5](#ams2224-bib-0005){ref-type="ref"} In our patient, the first symptom was hematemesis, and enhanced CT showed an AAA rupture and large hematoma in the stomach and duodenum. In addition, intraoperative endoscopy showed no other cause of the upper gastrointestinal bleeding. Therefore, we were able to diagnose ADF clinically. Primary ADF is caused mainly by AAA rupture.[1](#ams2224-bib-0001){ref-type="ref"} Proposed theories for the formation of primary ADF are direct wear and inflammatory destruction of the aortic wall.[1](#ams2224-bib-0001){ref-type="ref"} Secondary ADF is known as a long‐term complication of abdominal surgical procedures, especially for AAA.[6](#ams2224-bib-0006){ref-type="ref"}, [7](#ams2224-bib-0007){ref-type="ref"} Other causes of secondary ADF are variable and include trauma, infection, or malignancy.[7](#ams2224-bib-0007){ref-type="ref"} However, studies on the relationship between ADF and a history of gastrectomy do not generally recognize gastrectomy as being a risk factor for secondary ADF.[8](#ams2224-bib-0008){ref-type="ref"}, [9](#ams2224-bib-0009){ref-type="ref"} In our case, we only found non‐specific inflammation and did not recognize any evidence of recurrent or new malignancy. In addition, the base of the aneurysm existed on the infrarenal aorta, which was far from the surgical field of the previous gastrectomy. Therefore, our case could be a rare case of primary ADF, despite the previous history of laparotomy. With respect to the surgical treatment of ADF, conventional open surgery for aneurysm repair and duodenal perforation closure is radical and highly invasive, with a high 30‐day mortality rate of approximately 40%.[2](#ams2224-bib-0002){ref-type="ref"}, [6](#ams2224-bib-0006){ref-type="ref"} Therefore, EVAR has been attempted for rapid control of bleeding and less invasiveness.[2](#ams2224-bib-0002){ref-type="ref"}, [3](#ams2224-bib-0003){ref-type="ref"} In particular, initial EVAR is expected to be a "bridge therapy," followed by elective open surgical repair.[2](#ams2224-bib-0002){ref-type="ref"}, [10](#ams2224-bib-0010){ref-type="ref"} Also, surgical isolation of the duodenum with duodenojejunal anastomosis is expected to become an adjunctive radical treatment after EVAR.[11](#ams2224-bib-0011){ref-type="ref"}, [12](#ams2224-bib-0012){ref-type="ref"} In our case, however, previous gastrectomy and Billroth I reconstruction, which caused broad dense adhesions around the aneurysm and duodenum, precluded any additional open repairs. Poor preoperative general status because of alcoholism and malnutrition also made our situation difficult. Alternatively, therefore, we undertook intestinal tract tube decompression, which is an effective treatment for duodenal injury.[13](#ams2224-bib-0013){ref-type="ref"} In the present case, the combination of EVAR and intestinal tract decompression prevented perioperative death within 30 days, and the patient survived for 2 months. The patient acutely died with the recurrence of inflammation and severe anemia and could not be transferred to our hospital in time. The synchronous recurrent inflammation and severe anemia indicated the occurrence of rebleeding of ADF possibly due to stent graft infection. In general, however, a 2‐month survival period is adequate for preparation of a subsequent elective surgery. If the patient\'s infirm status had improved, we would have been able to undertake an additional surgery for duodenal repair or isolation of the duodenal perforated lesion with gastrojejunal anastomosis. Therefore, the combination of EVAR and intestinal tract decompression may contribute to extension of the rebleeding interval and might be an optimal temporary treatment for high‐risk patients with ADF. At the same time, for radical treatment of ADF, surgical isolation or repair of duodenal perforated lesions seemed essential. Hence, more investigations are required to clarify the effective and safe treatment for complicated high‐risk ADF patients, especially with a history of laparotomy. Conclusion {#ams2224-sec-0007} ========== We reported a rare case of primary ADF complicated by a history of distal gastrectomy and Billroth I reconstruction. Primary EVAR was successful; however, further studies are needed to improve the long‐term outcomes in high‐risk ADF patients. Conflict of Interest {#ams2224-sec-0008} ==================== None.
2023-11-26T01:26:18.401715
https://example.com/article/2051
488 So.2d 903 (1986) Edward Thomas RIDDLE, Appellant, v. STATE of Florida, Appellee. No. 85-1467. District Court of Appeal of Florida, Fifth District. May 22, 1986. *904 James B. Gibson, Public Defender, and Brynn Newton, Asst. Public Defender, Daytona Beach, for appellant. Jim Smith, Atty. Gen., Tallahassee, and Belle B. Turner, Asst. Atty. Gen., Daytona Beach, for appellee. DAUKSCH, Judge. This is an appeal from a sentence. Defendant was convicted of grand theft of a motor vehicle. His sentencing guidelines scoresheet totalled twenty-nine points. Of these twenty-nine points, six points were scored for legal constraint or defendant's legal status at the time of the offense because he was on probation at the time of the offense. His recommended sentence under the guidelines was "any non-state prison sanction." The trial court departed from the guidelines and sentenced defendant to three years in prison. The departure from the guidelines resulted in a two-cell upwards departure. For its reasons for departure, the trial court gave: Defendant's past juvenile record which was not scored; was on probation in another case at the time of offense, defd. already been given a break in adult court by being placed on probation. Defendant contends that his probationary status at the time of the offense is an invalid reason for departure. We agree. Although there is no showing that the probation was revoked, even if the departure had been based on a revocation the sentence imposed because of revocation must be within the original cell or the next higher cell. Fla.R.Crim.P. 3.701(d)11. See Boldes v. State, 475 So.2d 1356 (Fla. 5th DCA 1985). Also, a defendant's probationary status at the time of the offense constitutes an invalid reason for departure because that factor is already scored under "legal constraint." Davis v. State, 487 So.2d 1104 (Fla. 5th DCA 1986); Burch v. State, 462 So.2d 548 (Fla. 1st DCA 1985). As to the trial court's first reason for departure, a defendant's juvenile record may be considered a valid reason for departing from the guidelines. Weems v. State, 451 So.2d 1027 (Fla. 2d DCA 1984). Because it may not be said beyond a reasonable doubt that the trial judge would have sentenced the defendant to a three-year term based only upon his juvenile record, the sentence is vacated and this cause remanded for resentencing. Albritton v. State, 476 So.2d 158 (Fla. 1985). SENTENCE VACATED; CAUSE REMANDED. COBB, C.J., and ORFINGER, J., concur.
2024-03-13T01:26:18.401715
https://example.com/article/5530
Apple's long-awaited smartwatch looks "too feminine" and its design will not stand the test of time, luxury giant LVMH's watch guru has told German media. Jean-Claude Biver, who heads the French group's luxury-watch division, said the U.S. tech titan had made "some fundamental mistakes" designing the Apple Watch. "This watch has no sex appeal. It's too feminine and looks too much like the smartwatches already on the market," Biver said in an interview with daily Die Welt. "To be totally honest, it looks like it was designed by a student in their first trimester," added Biver, who heads up the brands Tag Heuer, Zenith, and Hublot. Biver predicted the much-anticipated device, with its square face and curved edges, would soon be outdated. "Luxury always has something timeless; it's rare and conveys prestige," he was quoted as saying, adding that the same could not be said for Apple Watch, which is expected to be bought by millions of customers and will most likely be beyond repair in a few years' time. Biver is not the first watch chief to be dismissive of Apple's efforts. Swatch CEO Nick Hayek earlier told Swiss media that the world's biggest watch group was "not nervous" about Apple's foray into the market. Apple Watch, which comes in several colors and which links to the iPhone, will start at $349 (270 euros) when it is released early next year. The wrist device is the first new product category to be launched by Apple since the death of cofounder Steve Jobs in 2011.
2023-09-16T01:26:18.401715
https://example.com/article/7135
// It could be possible to run React Components in a separate worker that then // communicates with a React component in another worker. import SameThreadComponent from "Foo"; // React class const CrossThreadComponent = "Bar"; // Just a string module ID const AnotherCrossThreadComponent = "Baz"; // Another string module ID // The props of a cross-thread element must be serializable across the worker // boundary. Functions are treated as asynchronous callbacks with serializable // arguments. class App { render() { return ( <SameThreadComponent prop="foo"> <CrossThreadComponent prop="bar" callback={data => log(data)}> <AnotherCrossThreadComponent some={{ prop: 'baz' }} /> </CrossThreadComponent> </SameThreadComponent> ); } } // The ReactComponent is instantiated on the other side of the worker and // rendered top-down using the normal React reconciliation. State may live on // the other side of the worker boundary. // Normally, it is illegal to nest same-thread components inside a cross-thread // component: class CounterExample { render() { return ( <CrossThreadComponent prop="bar" callback={data => log(data)}> {/* Illegal */}<SameThreadComponent prop="foo" />{/* Don't do this */} </CrossThreadComponent> ); } } // This doesn't work because a React parent component is responsible for // resolving its children. The CrossThreadComponent would have to block // rendering to come back to this thread to ask the SameThreadComponent to // resolve itself. This defeats the purpose of asynchronously resolving these. // However, luckily we have a solution around that using prerendering which // we'll cover in the next chapter.
2024-04-09T01:26:18.401715
https://example.com/article/7530
Search form Primary navigation Secondary navigation Issue 8.2 Making Poetry, Making a Nation Jen Webb, with Edwin Thumboo Jen Webb met Edwin Thumboo at LASALLE College of the Arts, Singapore, in October 2013, to discuss his work as a poet as part of an ARC-funded project into poetry and creativity (DP130100402). Their conversation explored the responsibility of the poet and of poetry in the construction of a sense of community, and the impact of language, metaphor, imagery and myth. Section 1: Setting the stage Jen Webb: I first came across your poetry over a decade ago, when I was part of the team convening the triennial conference of the Association of Commonwealth Literature and Language Studies. That meant you seemed, to me, first a Commonwealth writer, and by extension a global writer; but you are also entirely Singaporean. Can you talk about your sense of identity as a writer? Edwin Thumboo: Well, from one point of view Singapore is being generalised into a kind of global citizenry, but at the same time there is an insistence on individuality and identity, for nation as well as individual. These are very complex matters for ex-colonies, for new nations. I suggest that the first thing we have to look at is the space, by which I mean the physical space — the country itself; and then we need to look at the history of that space. And that changes: for Singapore there is history before colonialism, history during colonialism, and history after colonialism. Those who know the island before and after would have felt the sustained intensity, comprehensiveness and pace of our growth. We moved remarkably from Third to First World in less than 50 years. A Great Leap Forward.1 Jen: Do you identify Singapore as a postcolonial state, or Singaporean poetry as postcolonial literature? Edwin: I dislike the phrase postcolonial because the limiting point in philosophy is that your conclusions cannot exceed your premises; in fact your conclusions are dictated by your premises. This is why I once suggested that perhaps we should call Britain a post-Roman society. Once you are named ‘postcolonial’, then everything about you — your parameters, your discussions, your assumptions — is dictated by ‘colonial’. In fact it’s the old colonial powers who are actually postcolonial, if anybody is. They are postcolonial, but we are national. Jen: Of course Paul Virilio says there’s no such thing as postcoloniality, we all only ever have neocolonialism, and we keep re-inventing those negative relationships. Edwin: Absolutely. The classic institutions here would be the British Council, and the various institutions set up by the Commonwealth Office, et cetera, et cetera. But to go back to Singapore. You have the space, the history of that space, and the content of that history. The space is the physical island, which is small; and its history includes a colonial history. But it is also a history of tribes, of people who came here, from other parts of Southeast Asia, China, India and in smaller numbers, from Europe and the Middle East. Some of the new nations are relatively homogeneous; others have at least two ethnicities. In that context, a person considered literary must be bilingual in perception at least. If you have a monolingual, that is to say, a homogeneous society, change will be more like evolution than revolution. But if not, if you live in a society that has been created artificially, as was Singapore by British colonialism, the emergence of a shared national identity is paradoxically more complex: arduous yet all the more urgent. Only ten to fifteen per cent of Singapore’s population are Malay, (people) who are indigenous to the area.2 Then there are the Chinese, who make up 77% of the population, whose ancestral centre is outside Singapore; and it’s the same with the Indians, who are about 8% of the population: their ancestral centres are outside Singapore. (I’m part-Indian, part-Chinese, so I have an inside view, as it were.) As long as a space is a colony, it’s not a problem, because the coloniser holds political power, and not the people. But after independence, power comes to the people, and then all the tensions begin to rise. One of those tensions comes from racial prejudice, which I see as being inevitable and even natural, because of the comfort factor. Racial prejudice is not just about ethnicity, or skin colour, or whether the hair is straight or curled; these things count, yes, but ultimately it’s a comfort factor, and you’re most comfortable with your own kind because being with people like you cuts down on explanation, on difference, and that cuts down on friction. This poem is a recent experience I had. Its brevity is in inverse proportion to the pain, the disappointment, all the more acute as our Government has always pushed for a multiracial Singapore. For years I taught their children, equally; Never gazed into space unless hunting for a Word. Today, Again, that ancient pain, and One People, One Nation bugged till sunset worked a cleansing. The majority always call the shots. And the majority, you know, always constitutes a certain kind of tyranny. In Singapore the majority of people, some 77%, are Chinese, and psychologically this is interesting because of the history of the Chinese in Southeast Asia after independence. They have had a hard time. In Indonesia at one point, after 1965, you couldn’t even have any Chinese script, or import medicines with labels that had Chinese characters. And look at what happened in Thailand: they’re being absorbed; they’ve changed their names. Indonesia the same thing, and you see what’s happened in Malaysia. So Singapore is the only place where the Chinese were in the majority. But there’s another factor: almost all areas which use the English language and which are not Anglo Saxon — namely, the ex-colonies in Africa, the Caribbean, Asia, Southeast Asia — are in the process of modernising themselves. In a satu society, a homogeneous society, generational change is less harassing, less rapid, because you are evolving rather than rapidly changing. But once you get independence you are developing and re-developing, you’re recovering and making: constantly changing, all the time. So, coming back to my first formulation of space, history and content, there’s another modelling factor: pace, or the speed at which things happen. Things happen so rapidly in Singapore since independence, and that means the space has a much faster pace, and even greater density than before: greater density of ideas, of emotions, of change, of difference. So you have generational themes, especially in a new country, and especially in Singapore. For the first generation, what do you do? Look at the situation we were in. The Malays have a lovely phrase: satu bangsar (one race), satu agama (one religion), satu bahasa (one language). But for us, it was many languages, many religions; but one vision, a vision of multiracial equality, and making sure that we try to promote our values, basic values. In our case, that was also about making a multiracial society. At the same time, because we are also a dislocated diaspora, we want roots. There’s an important point here: every country has a hinterland of two kinds — the physical one and the intellectual one. Singapore has no physical hinterland, so we have to manufacture one, and we have to manufacture one that’s not physical, but is emotional, intellectual, historical. And we can do that, because we have an Ur-history: an early history, which is Hindu, and then a Muslim one, and now we have a multiracial one. But we didn’t have time to consolidate the identity. If you look at the history of Germany: it was a lot of small states, but they had one language, then they consolidated. With smart people this might work. I mean look at Dante, and what he did to the Italian language through the Divine Comedy. Now, in Italy they had time to do all that. They had time to develop the philosophy, the verbal structures, the grammar, the metaphors, the sense of ‘us’. Because the us basically had always been Roman. (Okay, you had the Etruscans, but that problematic was long ago.) But for us, we started with division, difference. We had to convert that difference into an increasing singularity. We are a hyphenated people. We had to move from Chinese-Singaporeans and Indian-Singaporeans into Singaporean-Chinese, Singaporean-Indians. The hyphen had to be inverted, slowly. What we need in a multiracial place like Singapore is a common set of symbols, of metaphors, of descriptions. This is why I wrote a poem, ‘Ulysses by the Merlion’,3 where I talk about the naga,4 I talk about the land, I talk about dragons: these are different symbols from all our cultures. I did that because I needed to create an intellectual hinterland, one that had a past, that has a present, to make it ours, make it Singaporean. It had to have our tone, our rhythm. In other words, we had to colonise our emerging culture in Singaporean terms. Make it Singaporean. You have to put in as much as you can of your life, your past, your present, your hopes, and your future. And if you’re writing in English you want to write as a Singaporean poet, so you’ve got to de-colonise, or re-colonise the language. Touch it up here and there. Jen: Are you making Singaporean culture more Anglophone? Edwin: No. That’s a good point, but no. You see, ‘Anglophone’ is loaded. Jen: Do you mean the term Anglophone is a colonising term? Because it removes the speaker from their actual physical and generational location? Edwin: Yes. That’s why I talk about literatures in world Englishes, not literature in English. And that is an important point to make. We put in our own images, our own metaphors, and the language is made into your own. Jen: I’ve lived in five countries, all of them English-speaking countries, and in every one, when I first go there I’m a foreigner and I don’t know what they’re saying and they don’t know what I’m saying. It’s not just the accent, it’s also the phrases, it’s how you use words, and it’s the syntax, how you construct a sentence. In 1976 [Australian poet] Les Murray published a collection of poems called The Vernacular Republic where I think he practiced what he later described, in his review of the first (1981) edition of The Macquarie Dictionary, ‘Centering the Language’, that it shows ‘how much larger and richer our dialect is than many had thought, in part by gently but firmly shifting our linguistic perception, so that our entire language is henceforth centred for us, not thousands of miles away, but here where we live’. Edwin: Yes. Look at what Donald Horne said in his ‘Foreword: Making English Australian’ to The Macquarie Dictionary. He makes the point that we need our own lexicon. Which is an obvious point. Webster did the same thing, and Whitman made the same point, more than once. You have to have your own. So for me then there are all these things to do. First generation, it’s in your roots. Second generation, it’s less, because you always start with enormous problems, but the proportion between problems and solutions decreases when the government is successful in building the nation. When you find solutions, and bit by bit we have more pluses, the minus part of the balance gets lighter, and the pluses get heavier. That is about building the nation, but a lot depends on the individual. A person like me, half-Indian, half-Chinese, and English-speaking — or English-using, rather. Because I also write English, I had to write myself into the centre, into relevance. The classic case of this journey is [South African] Bessie Head’s. She is the ultimate example of marginalisation because she was illegitimate, and half-black, half-white — and in this instance the father was black, the mother was white: the ultimate shame, degradation; deadlier than had her father been white. You can’t be more marginalised than that. And because of politics, she had to leave South Africa, and she went to Botswana, where she was a complete outsider.5 Then she writes herself into her first book; she starts thinking of equality, and in all her other works you can see she’s writing herself into relevance. And now if you go to Botswana, she’s their national writer. She adopted the country; and when she became important as a writer, they adopted her. In all the ex-colonies, we have to recover, make and re-make ourselves, and then re-adjust and so on and so on. Section 2: Learning to write Jen: Were you conscious of all this, as a young man writing poetry? Edwin: Ah! Consciousness comes very gradually. Knowing about difference came early because I used to be called names, being part-Indian, part-Chinese. Don’t forget I was born in 1933, and before the war inter-marriages were not common. I was very unusual; in fact at that time among the Chinese you didn’t even marry out of your dialect group. So I was aware of difference, but gradually, gradually the politics, the need to have one country, Malaya: that triggered me. At university I was called half-caste by one student — you know, a hazing. But the other students said no, he’s the first of the Malayans.6 There were quite a few of us at university, enough of us to form a little group, and we called each other countrymen. And we were pretty bright as a group. I’m not saying we’re more intelligent, but being underdogs, we worked harder, we produced better results. I went in when I was about 18, 19, and at school I was already beginning to get it. I had an uncle from China who was communist, and he taught me a great deal about the nature of colonialism. You see, British colonialism is very cunning, very clever. You know how they made the Indians sacrifice their lives for them during the First and Second World War? They converted things into abstractions — ‘loyalty’ for instance. And also they established special schools for the princes in the princely states; and so on and so on. If you’re going to be a colonial power, you’d better be the most cunning, the most clever. Why should you be a second-class colonial power? But when all is said and done, they left us a precious legacy, English. The sun has set on the British Empire, but it hasn’t set on the language. In fact, the day is lit by Englishes, almost anywhere. So your first question, we start from the assumption any poet is connected to the world: you can see how complicated the connections would be for a Singaporean. But for me, my connections really would be the history, and then my family, education and job. Publishers, hardly at all, because our literature’s too small for publishers to take us seriously. Jen: It is hard for people in small countries; I mean even Australia, which has a tiny population: you don’t find Australian poets being read in England or America, but we all read English and Americans. Australian literature doesn’t travel any more than Singaporean literature travels, very much. But can you expand that a bit: what has sustained you in your writing life? Edwin: These are the things that have sustained me: the national vision, and themes like — what makes our society; what constructs everyone; what vision do we want? My little place in it; like any Singaporean of my generation: we knew we had to build, we knew we had to contribute. And also the understanding of self. You see, I’ve never been divided. I’ve never been hampered by the fact that I’m half-Indian, half-Chinese. I’ve always been operational. They say, don’t you get confused? and I said no, don’t foist confusion upon me. I’m not confused at all. I can function easily: converse in one, then in the other language, so there is no separation. It’s the same mind, though it’s different words, different language, different grammar. It’s the fascination with words: that is very important. What else: roots, tradition, and then also the emerging identity of Singapore and what it is going to be. It’s fascinating to watch the changes that are going on: the social engineering, the change in the physical environment, and the movement from uncertainty — from economic uncertainty, whole seas of uncertainties into the constructed miracle that is Singapore today. Jen: Yes. And so you watched Singapore emerge? I suppose, born when you were, you saw the war in Singapore, the communist threat afterward, and the war in the Malaya peninsula? Edwin: Yes. War after war after war. They’re quite bloody, you know; wars are never polite, war is cruel. And the racial riots: I saw the Maria Hertogh riots,7 and after that I saw the racial riots that led to Singapore’s separation from Malaysia, and then in May 1969 there were riots that started in Malaysia. I saw these things. And don’t forget, my Chinese side remembered the brutalisation of the Chinese by the Japanese army. You know, these things remain in your mind. So the themes then are what sustained my writing. But above all it was the gradual realisation we needed our own literature. I wanted to write it in English. It’s not my mother tongue, but it’s my main language. I realised, between Victoria School and University, in early 1953, that we needed our own literature. This is from a 1953 issue of Youth, the magazine of the combined secondary schools of colonial Singapore: Malaya provides a wealth of subjects of interest for budding writers. The modes of living of its many races, their varied reactions to the impact of Western culture, and their living harmoniously together: these are no mean subjects for essays. “YOUTH” therefore appeals to you, the young men and women of this country, to help to STIMULATE INTEREST IN CREATION OF A GENUINELY ORIGINAL MALAYAN LITERATURE. This is specially urgent in view of the efforts being made towards the creation of a MALAYAN NATION. Or, are we to be a nation without our own literature?8 I was the editor. In the next issue my Editorial was ‘All Art Is A Collaboration’. And I always knew that literature is fundamental to the life of nations, and that every great nation has a thriving, vibrant literature. Look at Elizabethan and Jacobean drama, look at the poetry of the period: they were nationalistic. Shakespeare’s an absurdly nationalist guy. Think of his history plays, and his views on race in Othello, or Merchant of Venice … Shakespeare is a complete educator. You know, you just need to do Shakespeare, and you’ve got everything you need, from politics to the ways of love. Jen: So these are the things that sustain you. How do you like to be described; for example, do you describe yourself as a poet, or as a Singaporean poet? Edwin: I would say I’m a Singaporean poet, formed by and responding to life and contacts. Shaped by these things; energised by the life around me, by all these changes, and also by the vision which we all had — and which the government has consistently pushed — of a multiracial society, where everybody’s equal, with equal opportunities. Where there’s religious freedom, and intellectual freedom. But freedom with responsibility. Untrammelled freedom is the most dangerous thing, and freedom mustn’t grant itself a licence. Jen: That’s very Greek; that is, very related to a period in ancient Greek thought. Edwin: True. Jen: You’ve talked a great deal about the work of building the nation of Singapore. Clearly it is threaded through your poetry. But when you move house, or travel out of the country, does that change of location affect your writing? Edwin: No. Because Singapore’s so small. You know, you can move anywhere, and you’re still within the same space, you’re still within the same history, you’re still within the same sets of interests. I carry Singapore with me. Jen: How about when you travel overseas – for instance, when you go to Grahamstown or Durban; do you find your sense of writing shifts? Edwin: No and yes. The instinct behind your question is right. I went to Durban and I have a poem from then, because the bloke there said write a poem and I worked at it, and I produced a poem and found we had faced the same issues and challenges. Yours and mine, as we draw and validate all We think, write and speak, cajole our Earth And Air, re-marking every phoneme into ours. Gathering in Durban, race, tribe and discourse, Commanding tongue asserts history; burnish Such provinces of life, renewing promises. Peter Rovnick’s may-winter conclave started Slowly. Heard mood and tense decolonise, Make new conjunctions. Mandated by ancestral Ways, they propel the secrets of our utterance. So stretch each word to drink the same feeding Pigment; re-move their imperial themes. Subdue Their echoes. Ignore post-colonial patronage, In-judicious, hurtful judgements of the past. Then leap beyond any questioning. Name wind, Trees, wounds fractures by blood that gallops Through the heart of words. And the Word I came with is now multiplied, Because I heard you and you sing, move, make Far more total; shake pain or joy, despair or hope. You whispered, shouted, changed gears, clearing Throats for new vowels, the drift of Drakensberg Among cloud as the buffalo horns gradually close. And that mist in the valley of the kings. uSuthu. The grumbling gravel of the road, smooth rainbows, Varying utterance from one culture to the next As the measured phrase opens into orality, gesture, Breaking into Slam and Joop’s language, masterly Neighbours. Words will never be the same again. There are more doors to open, to disclose, adjust, Through which to take our dreams. To float and fly; Hear truly. The poets private sunshine gets revealed, Home of his words, the laughter of his tribe, Cho Cho Ke Ke murmuring walking through sunshine, shadow, Sharing bone and marrow, while cleaving to our flanks. I have new sounds to wake up dreams The response is different because it is a different space, in a different history. The solutions were different. Jen: So you’re like a tortoise: you take your culture and your issues with you where you go? Edwin: Absolutely. It’s both a burden and a liberation. It’s something that holds you back and at the same time pushes you forward. It sounds paradoxical, but that’s it. But the place of composition of a poem emerges in the writing because in the same space there’s so much changing, so many new combinations going on all the time. That’s always reflected in both the poems I write and the criticism I write. Because when writing poems and writing criticism, it is the same mind at work but with different aims. Different aims in terms of what you’re producing. But ultimately the aims are the same: both are about literature. They have different audiences, different purposes, different intentions, but it’s still all about literature. Whether you write a poem or write criticism, you’re writing literature. Jen: Where did you first come across poetry — or, more generally, literature? Edwin: Oh, well it starts probably with nursery rhymes at home. I had the advantage of nursery rhymes in Teochew and English. And with nursery rhymes one has a sense of not only of rhythm, but of movement, of words being larger than themselves, of words occupying you, making you move. That literary realisation came later. At that time I just enjoyed it, but later, when you started thinking, what did I get from it? then these other, broader insights come. Jen: So first it was just about naïve pleasure, but later it moved you into a thinking space, a generative space. Edwin: Absolutely. But gradually. You learn a little bit when you go to secondary school — chiefly narrative poems. We read Henry Newbolt’s anthology of longer poems.10 They didn’t teach you much about poetry: they taught you about what goes into poetry. They didn’t teach you poetry as such. But gradually I absorbed a little. In my home we had Palgrave’s Golden Treasury,11 and that was a real repository. So I read: right from ‘Take, oh take those lips away, that so sweetly were forsworn,’12 or even ‘Full fathom five thy father lies, Of his bones are coral made, Those are pearls’ et cetera,13 the whole lot. Right up to ‘Solitary Reaper’,14 and the Lucy poems;15and that (supplemented the thing) was crucial instruction. Jen: And you read Chinese poems as well? Edwin: Ah, Chinese poems came a bit later. I read Chinese poems when I was in secondary school, doing the School Certificate, because at that time we had classmates who studied English in the morning and Chinese in the afternoon. Their Chinese was very strong, so they introduced me to the poems. And then I discovered Arthur Waley.16 First, his 170 Chinese Poems.17 And then the next one I discovered was his translation of Japanese poems, The Uta.18 It taught me two things. Firstly, it gave me a vocabulary; it gave me a discourse if you will. Secondly, it taught me how to say more with less. That is very important in poetry. Jen: And Japanese poetry is an exemplar of that. Edwin: Oh, absolutely. When you think of the haiku and so on. And then I gradually discovered Korean poetry — sijos.19 Now, these interests stay with you. But remember, we are all part-time poets; which is sad in a way. My generation had three jobs. First, your job — as a teacher, it’s what you’re doing. Then within the university you’ve got administration. That’s the second one. The third one is, you serve on government committees. Jen: So all academics in Singapore served on government committees? Edwin: Oh, not all. But many did. I recently worked out that I served on the Street Safe Committee for 30-odd years without realising it … Jen: Time goes by. Edwin: I know. When I resigned they gave me a little doo-dah, and that’s when I discovered it was from 1968 to 1992. So you see, you had three things to do. Sadly, I neglected my family. Jen: I think we all neglect our families. Edwin: There you are. And so I learnt; and even before I went to university I had some contact with those who were there. I had a book of modern poetry. I discovered Auden, Spender, C Day Lewis. And then I discovered Pound (the shorter Pound, not the long Pound). Eliot, not so much. My education was absolutely relevant to my poetry. My first really good friend was my old teacher, Seamus Fraser. He was an Oxford wallah from New College, and he taught us literature instead of preparing us for exams, so our exam results were disastrous. Jen: But you all knew literature. (laughs) Edwin: And we all loved literature. His favourite poets were Edgar Allan Poe, Beddoes (a very minor poet; Death’s Jest Book and so on),20 and Emily Brontë. These are all dark poets in some ways, especially Beddoes. He also liked Coleridge, but the Coleridge of Christabel. ‘The lovely lady, Christabel, Whom her father loved so well’ … 21 He taught me a great deal, and he is the one who introduced me to poetry. And he wrote poems himself. So he was terrific really. When I went to university of course we had to do ‘Introduction to English Poetry’, and then I discovered Eliot, Pound, Yeats; Yeats, of course, for me is the great influence. Jen: And he was struggling with some of the same things wasn’t he, with the issue of Irish nationalism? Edwin: Yes. But that part of Yeats was kept away from us. We got the sanitised Yeats. The closest we went to was the death of the Irish airman.22 And this is why if you look at the Yeats published by Macmillan, it is the safe Yeats. The real Yeats is ‘I am of Ireland’,23 and his uncollected essays, two volumes that came out much later. That is the real Yeats, that is the Yeats who ceased to be Anglo-Irish, who became Irish. But he was kept away from us. And look at the history we were taught. Nothing but European expansion. But it stood me in good stead when I had to argue with them, because I knew the history better than they did. Britain, 55BC, Julius Caesar’s first invasion, the building of Hadrian’s Wall, the work of Julius Agricola, the whole lot. My own history, the Asian history, I read after I graduated, when I was in the civil service. For ten years I read that. I read into mythology, Asian history, Egyptian history, Greek history. Edwin: We never quite did Belgium. We didn’t even do Germany in East Africa, West Africa and Micronesia: we never did that. Jen: The Belgian history was too embarrassing, I guess, after what they did to the Congo. The Germans didn’t go far enough beyond Africa, did they? Edwin: No, they didn’t touch our area. And they never competed seriously against the British. The others, the Dutch and the British would fight, the French and the British would fight, but the Germans were only in East and West Africa; and in Micronesia (though hardly anything). So coming back to this, on the education: yes, importantly, it introduces us to the need for any poetry to have a tradition. And for me the most important lesson, apart from techniques, was that it reconfirmed my feeling that we needed a tradition — in this case a tradition in literature. Eliot’s essay, ‘Tradition and the Individual Talent’ was an eye-opener, a kind of reconfirmation. He made tradition literary, he defined it in literary terms; so the influence was there. But the influence … at one point Eliot sat on one shoulder, Yeats on the other shoulder and Pound was somewhere in between. I had to come to terms with them gradually. I had to absorb. Eliot is the less potent influence. Yeats was the one, because Yeats has that rhythm: And I declare my faith: I mock Plotinus’ thought And cry in Plato’s teeth, Death and life were not Till man made up the whole, Made lock, stock and barrel Out of his bitter soul.24 Jen: And it makes a strong point that. I heard a recording of him being interviewed and he said ‘it takes me a great deal of trouble to get my words into this order and I will have them said in this order’.25 Edwin: There you are. It’s important, very important. Jen: Before we leave Yeats, you know how Auden says in his elegy for Yeats, ‘Ireland hurt you’.26 Do you think Ireland did actually ruin Yeats, or did it make him? Edwin: I think Ireland made Yeats. Jen: Auden was being very English then, perhaps? Edwin: No. There’s a nasty side to Auden, you know; he dismissed culture east of the Mediterranean completely. I mean he did great things like rescuing Thomas Mann’s daughter; we’re not judging him; but he’s pretty nasty in that other sense. Yet there is the Auden of: Lay your sleeping head, my love, Human on my faithless arm; Time and fevers burn away Individual beauty from Thoughtful children, and the grave Proves the child ephemeral: But in my arms till break of day Let the living creature lie, Mortal, guilty, but to me The entirely beautiful.27 Jen: Very much a person of his age. Edwin: That’s it. And Leavis did the same thing. I used to tell detractors, look we had a classical literature before you even existed as a nation. Think of the great Chinese and Indian epics, and the philosophical systems, the complexity of ideas. But we made one mistake, a costly mistake. We went into metaphysics rather than physics. Instead of astronomy we went into astrology. Instead of chemistry, we went into alchemy. So we made many discoveries, but we didn’t pursue them. Jen: And you didn’t have the empirical evidence that counts, post-Enlightenment, for knowledge. It stays in a dream world. Edwin: Yes. And in a monolithic situation there’s less competition, and less inventiveness. Think of the city-states. They have to fight each other, outdo each other, to survive. But if you’re China, Middle Kingdom, and you’re big and strong, there’s order running through the whole society. So maybe that’s one reason we progressed the way we did in in Singapore, by resolving our many problems. Edwin: I’m an old man. You tend to learn from older people. And I’m going to say this: the range of interests the older poets have is wider than the range of the younger poets. And you need a wide range to teach. Jen: Why do you think that is? Because young poets haven’t lived long enough? Edwin: No. It’s not that. They’re international now; they’re global now. That is part of present-day Singapore. The contentious issues have changed: they’re not survival issues, they are issues that come from comfort, from enormous progress and wealth. Look at Facebook, how some criticise this, criticise that. Jen: So it’s first world problems. Edwin: First world problems and not only that, first world/small space problems. Always trying to get out of the small space. And these are the things you do to get out of the space. We have defined the space, preserved the space, and made the space thrive, so now we can think of other things. A little red dot enlarging space, the sense of space, a feel of the global through travel. We have become travellers. Section 3: The compositional process Jen: Let’s talk about the writing sector. You said earlier that publishers haven’t been relevant to you. But how about the community of poets? Do you have an ideal reader in your mind? Edwin: I had a reader in my mind, Shamus Fraser, till about 15 years ago. Every time I read a poem it was his voice. My poem, but his voice. He was reading my poem for me: he was the voice. All my poems in my head were his voice. And when he really died was when he ceased to be there, to be part of me. But a community of poets? No, I don’t really belong. We’re too individualistic, too small and there’s not enough of us to form a community. And there are the differences in generational interests and pre-occupations. We do have common interests, shared interests: like for instance, the Merlion theme.28 I mentored a number of poets such as Heng Siok Tian, most now in their sixties, started the Creative Arts Programme with the Gifted Programme, Ministry of Education, in 1990, and offered a creative writing in poetry module some years ago. But when I was at university, the poets all learnt from each other. I learned chiefly from Ee Tiang Hong, and from Wong Phui Nam to some extent. One good critic was Lloyd Fernando. So we learnt from each other and we helped each other. I always take suggestions without hesitation, if they are good. And you know whether it’s good or not. Immediately. Jen: You can hear the shift in the line. Edwin: Absolutely. There’s no hesitation. Then after university, I’d send work to a few friends. But I noticed the comments were getting fewer and fewer. That worried me in two ways. Firstly, it’s because you’re comfortable, thinking I’m doing okay! But then you wonder, am I doing okay? In the end, I depend on myself. This is why when I write I sometimes have 15, 20, 25 drafts, and I never finish. I tamper with the thing years later. Because when it comes to composition there are two stages: the main doing, and after that the tinkering. The tinkering never stops, never stops. Except for those poems which are abandoned. Some don’t survive. We don’t know exactly why we write, why we do what we do; but we know generally, and that’s enough. And the sources are quite simple: it’s your vocabulary, your grammar, your syntax, and the symbols in your inherited culture. Jen: How consistent is that, do you think? For example, what differences are there between you in the act of writing a poem, and during the times between poems? Edwin: None. You’re always the same person, because a poet never is off duty. A poet is on duty all the time: even when he’s sleeping he dreams. We are part-time in the actual writing, but always fulltime in thinking. And when I say part-time it means: you’ve got your job, you’ve got things to do, all those tremendous distractions. I never was able to say, When I get up in the morning I smoke cheap cigarettes and write poems. That’s what Eliot did. For me what happens is a conjunction of various things. If you’re thinking about a poem, and you happen to have a bit of time, then something triggers you; sometimes it’s guilt, or just thinking time to get going on that poem. So inspiration is really a conjunction of factors that gets you going, at that time. Jen: You know the fantasy of the muse who comes and touches us: so many cultures do have that. I think there might be something in it, and suspect it is that if you’re always thinking of poetry and its possibilities, and paying attention, that’s when you get the gift of the poem. Edwin: Sure. ‘The muse’ is the poet’s name for that conjunction, which is the title of this poem: Conjunction29 Sometimes, when the sun is twice itself With light that quietly breaches certainty, You feel the distaff side grow warm glow. Pores of colour erupt: something is to happen, Un-alerted, beyond intimation, context free. Perhaps a visit that starts a high-road journey. Not into the desert, but that familiar thing: a sudden Squall within, though now its eye moves hidden. Perhaps it inspects secrecies; even a preached word, Somewhat unreleased, unleavened, leaving language Lame these many years, with neither fret nor fever. Perhaps now a downward curve whose end will rise, May take us up. Words begin to feel a somehow finger touch their Shoulders. Then congenial, down the spine, making Conjunctions; laying energy behind eye and ear; then Tongue-tip, tasting darkness. Then a burst of light on Grandpa’s final face, as he lay wrapped in love, reveals. This time memory finds the door and turns a key. At another, Surely that eternal Thought which made the universe, Takes you into a world of dew, or a shooting star’s Brief statement; or the moon gathering golden evenings Before appearing. For some, grammar in a sacred word That meditates on them, then leaps, unlocking as she goes, Disclosing small infinities. One who knew meaning In light and darkness, and the shades between, said Words alone are certain good … The wandering earth herself may be Only a sudden flaming word. So, at times The uncertainty principle settles clear, and certain. Stabilised into moments just long enough to do its work. Thereafter, we return to what we know, the ordinary; Breathe familiar fantasies. For the day has no alarms; All is usual. Once more the world has four safe corners; Morning its middle earth; night its usual count of rings ... At least till when the sun descends in double-self. Jen: You mentioned that some poems are just abandoned; for those that aren’t abandoned, how do you know that it’s time to stop working on it? Edwin: A poem is never finished. You return to it again and again. You stop revising when it exhausts you, and you feel you can’t do more to it. That is why for me: The perfect poem is future tense. Meanwhile, Neat incompletion must suffice. Life goes on. Meditate on words for modern times, alive to This surge, this minute, and the next, curving Towards us, to reveal poet on poem’s calling.30 There are very few occasions where I can sit down and say okay, I’m going to do this poem. I did it for the long poem I wrote in that little book: I sat down, and in one and a half days I finished it.31 But then it had incubating inside. What I did was, I wanted to write the history of the place, Bukit Panjang, or my sense of its history. Bukit is ‘hill’, panjang is ‘long’. I suddenly realised that the place starts there, with bukit, and it ends up far south. From Bukit Panjang, from the hills through to Jurong, it’s continuous: it’s been broken by roads, that’s all. If you go right through, it goes up to Government House. And it struck me, that’s why it’s Bukit Panjang: or actually it’s Bukit Panjang Panjang Panjang! Long! Long! It’s almost from the north of the island to the south. I talk about its other history, its geology. And then I link it with the history of the place, from before the war, right up to the present. I included even the time when (this present government) the Urban Renewal Authority sort of methodised the place, which I don’t like. Too much order. You want things not to be so controlled, so organised. There must be a sweet disorder occasionally — as Herrick puts it.32 You need a little bit of that. Composition has two bits: the big bit when you finish writing, and the fiddly bit. When you finish, it exhausts you; you might come back to it and say, look I’m writing at the limit of what I can do; and then you leave it. Years later you might come back and fiddle with one word or move a punctuation mark or something. You might do that. Or abandon it entirely, usually because it was a false start: I thought it was important but it wasn’t important. A poem that is important will have its own energy; it’ll move you; it’ll insist, in fact. If it doesn’t, then you abandon it. The same subject might intrigue somebody else, but it doesn’t intrigue you. A loss of interest. You could rescue it, but then it would be just verse, structure: it’s speaking but controlled, schooled, more craft than art. And the writing process should be that you master craft, and then you lift craft into art. I craft as much as I can. I try to load every line with ore, as Keats said.33 That’s what we should do. Otherwise why write it? For me, poetry must have a long shelf life. There’s no such thing as disposable poetry. You cannot have, you know, like in art, installation art. There’s no such thing as installation poetry. I would sum it up thus: your poem should be able to speak without you. You put everything in there. When you write a poem you don’t have to be present when you’re finished it. You have to be a good critic, you apply your criticism most rigorously when you write, because your criticism is in aid of making, not of explaining. That’s the difference. I want to get my readers to feel, to think, to dream: to start with my poem, but go, get beyond it. And I want them to get into themselves. They have to get into themselves and that should be the whole function of poetry. For me a good poem is part of a journey: a journey outside yourself as well as into yourself. A good poem must make you connect, not with the poem merely, but with life itself. It must do that. Jen: So it’s a generative spark, for the reader, a machine for thinking? Edwin: Yes, absolutely. And nicely put, nicely put. And you know what else? Poetry should liberate a person, and give the person new eyes, new ears, new speech: not your speech, but theirs. You don’t do things to them, you start helping them to do things to and for themselves. A good poem is a beginning, it’s not an end. But the reader has to be serious. And you’ll be sweating like mad, but hopefully the access is worth the effort. That’s the distinction between a poem that speaks and a poem that mutters. Notes 1. The Great Leap Forward (1978–1985) was the name given to Singapore’s decision to compete more effectively in the regional economy through a combination of factors, not least through new educational initiatives and population management. See Christopher Tremewan, The political economy (1994). The term is also used more generally in Singapore to name new social and cultural initiatives. 2. The Malays comprise a cultural hinterland. Then there is a fiscal hinterland, because of the money belt in the centre of Singapore. 3. ‘Ulysses by the Merlion’ is considered one of the most important poems written in Singapore; the National Library Board of Singapore observes that it ‘has sparked many literary and academic responses to this day, attesting to its vast applications and ranging influence’ (2011). Originally published in a collection of the same name (Ulysses by the Merlion, 1979), the poem is also installed near the Merlion, on a plaque, and can be both read and heard at http://www.nus.edu.sg:80/NUSinfo/CFA/Prof's/poems/ulysses.html. 4. The naga is a mythical creature, in serpentine or dragon form, found in stories right across the Asian region. 5. Bessie Head was a South African born in 1937 to a white mother, and a black father. At the time this was unacceptable – a contravention of the Immorality Act 1927 – and, writes Huma Ibrahim, Head’s mother ‘was exiled out of an established social position and coaxed into insanity within an asylum; it has never been clear whether she did exhibit “mad” traits or just socially unacceptable ones’. See Huma Ibrahim, Bessie Head (1996), p. 159. Head was briefly involved with the Pan-African Congress, and was arrested because of her political activity; after her release from custody, she left South Africa to live permanently in Botswana. See Ide Marie Corley-Carmody, In the place of the father (2007), p. 164. She died in 1986 in Botswana; following the end of apartheid she was finally recognised in her native land: among other honours, in 2003 she was awarded the ‘Order of Ikhamanga in Gold’ for her ‘exceptional contribution to literature and the struggle for social change, freedom and peace’ (see ‘National Orders: Recipients’, The Presidency, Republic of South Africa website (2007),http://web.archive.org/web/20070927050140/http://www.thepresidency.gov.za/orders_list.asp?show=172, (accessed 12 February 2014). 6. The notion of a ‘Malayan culture’ as opposed to Malay or Malaysia culture, is associated with the stance taken by Sinnathamby Rajaratnam, the first Singaporean Minister of Culture, whose insisted that nation-building depended on establishing a shared culture, where Malay, Chinese and Indian — and not only Malay — community values, beliefs and practices were incorporated and mutually appreciated. See See CJ Wan-ling Wee, Culture, empire (2003), pp. 204–5. 7. The Maria Hertogh Riots occurred in Singapore in December 1950. Maria was a Dutch Eurasian child who was baptised Catholic, but raised Muslim in Singapore by a foster mother as a result of the second world war and its dislocations of people. After the war, there was strong pressure brought to have Maria restored to her (Catholic) parents in the Netherlands and this, combined with other contemporary issues, was seen as an attempt by the old colonial powers to reassert control over the region, and to undermine Muslim values. Although the death toll from the riots was comparatively small, it was of huge political significance because it made apparent the vulnerability of the colonial powers. See Syed Muhd Khairudin Aljunied, Colonialism, violence and Muslims in Southeast Asia (2009). 8. Youth, 1953 vol 4, I. 9. ‘Durban: Poetry festival 2003’ is published in the Singapore Pioneer Poets series, The best of Edwin Thumboo (2012), p. 179. 10. Henry Newbolt (ed), An English anthology (1922). 11. Francis Turner Palgrave (ed), The Golden Treasury (1875). 12. From William Shakespeare, ‘Song’, in Measure for measure, Act IV, Scene i. 13. From William Shakespeare, ‘Ariel’s Song’, in The tempest, Act I, Scene ii. 15. William Wordsworth: the Lucy poems is a series of five poems published 1798–1801, with titles ‘Strange fits of passion have I known’, ‘She dwelt among the untrodden ways’, ‘I travelled among unknown men’, ‘Three years she grew in sun and shower’, and ‘A slumber did my spirit seal’. 16. Arthur Waley was a translator of Chinese and Japanese poetry into English in the first half of the 20th century. Though self-taught, he produced a remarkable body of work, and was instrumental in introducing this literature to the English-speaking worlds. See John de Gruchy, Orienting Arthur Waley (2003). 17. Arthur Waley, 170 Chinese Poems (1919). 18. Arthur Waley, The Uta (1919). 19. A sijo is a Korean form of poetry, similar to haiku, and traditionally presented in three lines of between 14 and 16 syllables each. A good introduction to the form, and a collection of sijo in English translation, if provided by Richard Rutt, The bamboo grove (1998). 20. Thomas Lovell Beddoes (1803–49); a minor English poet. His playscript Death’s Jest Book; or The Fool’s Tragedy (1850) was published posthumously. Issue 8.2 About the interviewer Edwin Thumboo is Emeritus Professor at the National University of Singapore, and one of the pioneers of English literature in Singapore. Often identified as the ‘unofficial poet laureate’, his work has centred on national questions and the construction of a national imaginary. His poem ‘Ulysses by the Merlion’ (1979) is a major work, often referenced by other Singaporean poets, in which he weaves together classical European and Asian myths in the construction of a new myth for what was then a new nation. Edwin has been a key figure in the construction of Singapore’s creative and national identity. He was the first Singaporean to be conferred the South-East-Asian Write Award (1979), and the first writer to be awarded Singapore’s Cultural Medallion for Literature (1980); and has won many other awards in a long and distinguished career, including the National Book Development Council prizes for poetry (1978, 1980, 1994), the ASEAN Cultural and Communication Award in Literature (1987), the Public Service Star (Bar) in 1991, and the Meritorious Service Medal in 2006. He has published eight collections of his own poetry, and edited another eight anthologies of poetry (mainly from Singapore and its local region). In addition, he has edited nine major works on literary creativity, particularly focused on the Asian region. Jen Webb is Distinguished Professor of Creative Practice, and Director of the Centre for Creative and Cultural Research at the University of Canberra. Recent publications include Researching Creative Writing (Frontinus, 2015), Art and Human Rights: Contemporary Asian Contexts (Manchester UP, 2016), and the OUP bibliography entry for Bourdieu (2017). Her poetry includes Stolen Stories, Borrowed Lines (Mark Time, 2015), Sentences from the Archive (Recent Work Press, 2016), and Moving Targets (Recent Work Press, 2018). She is Chief Investigator on the ARC Discovery project ‘So what do you do? Graduates in the Creative and Cultural Industries’ (DP160101440).
2024-03-17T01:26:18.401715
https://example.com/article/4266
Q: How to convert a gem to plugin in ruby on rails and vice versa? Is there any tool to convert plugin to gem and vice versa. A: Check out Jeweler -- it helps you get all the files together that you need to build a gem, then have a look at rubygems.org to publish it when you're ready. I would encourage you to build gems as opposed to plugins, they're typically easier to maintain during a project lifecycle.
2023-10-22T01:26:18.401715
https://example.com/article/2608
257 Wis.2d 789 (2002) 2002 WI App 230 652 N.W.2d 819 WESTHAVEN ASSOCIATES, LTD., Plaintiff-Respondent-Cross-Appellant, v. C.C. OF MADISON, INC. d/b/a Cost Cutters, Defendant-Appellant-Cross-Respondent. No. 01-1953. Court of Appeals of Wisconsin. Submitted on briefs March 14, 2002. Decided August 29, 2002. *793 On behalf of the defendant-appellant-cross-respondent, the cause was submitted on the briefs of Stephen J. Nording and Laura E. Callan of Solheim Billing & Grimmer, S.C., Madison. On behalf of the plaintiff-respondent-cross-appellant, the cause was submitted on the briefs of Todd G. Smith of La Follette Godfrey & Kahn, Madison. Before Dykman, Deininger and Lundsten, JJ. ¶ 1. LUNDSTEN, J. C.C. of Madison, Inc. (Cost Cutters) rented space in a mall owned by Westhaven Associates, Ltd. (Westhaven). Cost Cutters breached its lease by vacating, and Westhaven sought to enforce various lease provisions. The parties dispute whether stipulated damages provisions in the lease are reasonable, and thus enforceable liquidated damages provisions, or unreasonable, and thus unenforceable penalty provisions. Following the terminology used in the seminal case on this topic, Wassenaar v. Panos, 111 Wis. 2d 518, 521, 331 N.W.2d 357 (1983), we use the term "stipulated damages" to mean the damages specified in the lease and "liquidated damages" to mean reasonable and enforceable stipulated damages. The parties also dispute whether the lease permits Westhaven to recover attorneys' fees it incurred in its attempt to enforce various lease provisions against Cost Cutters. ¶ 2. The circuit court concluded that the stipulated damages provisions were unreasonable and therefore *794 unenforceable penalty provisions. The circuit court also awarded attorneys' fees to Westhaven relating solely to Westhaven's attempt to enforce lease provisions against Cost Cutters. We reverse both decisions and remand. Background ¶ 3. The parties stipulated to the facts necessary for the resolution of this case. Westhaven owns the Westhaven Village Shopping Center (Shopping Center). On July 28, 1997, Cost Cutters entered into a lease with Westhaven. Cost Cutters leased about 17% of the available rentable space in the Shopping Center. The lease term was ten years. ¶ 4. On October 9, 1999, Cost Cutters closed its store without Westhaven's approval. At this time, the lease rate was $49.58 per day. Before the parties entered into the lease on July 28, 1997, the Shopping Center's occupancy rate was 71%. The Shopping Center's occupancy rate fluctuated after the parties signed the lease, dropping to 53% in October 1999 prior to Cost Cutters' departure. By March 2000, the occupancy rate increased to 72%. From February 1, 2000, forward, Cost Cutters did not pay rent. In accordance with the lease, Westhaven attempted to find a new tenant for the Cost Cutters space. The space remained vacant until it was leased to a third party beginning December 1, 2000.[1] Westhaven then sued Cost Cutters seeking attorneys' fees, rent, and contract damages relating to the approximately thirteen-month period the space remained unoccupied. *795 ¶ 5. Westhaven sought relief under paragraph 14.00 of the lease entitled "Default by Tenant." Paragraph 14.00 sets forth Westhaven's remedies in the event Cost Cutters "defaults in the payment of Minimum Rent or other charges or in the performance of any other of Tenant's obligations hereunder, and fails to remedy such default within ten (10) days after written notice from Landlord...." Paragraph 14.00 presents Westhaven with two options if Cost Cutters fails to remedy its default: first, Westhaven can terminate the lease, reenter the premises, and recover from Cost Cutters "any sums due Landlord for rent or otherwise to the date of such entry," and liquidated damages; second, Westhaven can choose to not terminate the lease and attempt to relet in its own name for the remainder of the term and then recover from Cost Cutters "any deficiency ... between the amount for which the premises were relet, less expense of reletting, including all necessary repairs and alterations and reasonable attorney's fees and the rent provided hereunder." ¶ 6. Westhaven exercised the second option under paragraph 14.00. There was no dispute that under this paragraph Westhaven was entitled to the lease rate of $49.58 for each day between October 9, 1999, when Cost Cutters vacated, and December 1, 2000, when the space was sublet. However, the parties dispute whether Westhaven was entitled to certain attorneys' fees pursuant to paragraph 14.00. Westhaven sought $15,670 in attorneys' fees consisting solely of fees relating to its litigation with Cost Cutters. ¶ 7. In addition, Westhaven's exercise of the second option under paragraph 14.00 permits Westhaven to seek stipulated damages under paragraphs 3.02 and 8.00(n) of the lease. Paragraph 3.02 requires Cost *796 Cutters to pay Westhaven $20 per day if Cost Cutters fails to keep its premises open for business during "normal business hours." Westhaven argued that it was entitled to $20 per day for each violation of paragraph 3.02 from October 14, 1999, to November 30, 2000. Paragraph 8.00(n) of the lease requires Cost Cutters to pay a sum equal to Cost Cutters' normal daily rent for each day Cost Cutters fails to keep its premises open for business during specified "minimum hours."[2] Westhaven argued that it was entitled to an amount equal to the daily rent for each violation of paragraph 8.00(n) from October 14, 1999, to November 30, 2000. ¶ 8. Both parties sought summary judgment. Cost Cutters argued that the attorneys' fees sought by Westhaven are not covered under paragraph 14.00 because those fees were not incurred for the purpose of finding a new tenant for the space vacated by Cost Cutters. Cost Cutters also argued that paragraphs 3.02 and 8.00(n) (collectively the "failure to do business" provisions) are unenforceable penalty provisions. ¶ 9. The circuit court determined that Westhaven was entitled to recover attorneys' fees as a result of Cost Cutters' breach of the lease. But the circuit court ruled that the "failure to do business" provisions contained in paragraphs 3.02 and 8.00(n) were unreasonable and, therefore, unenforceable. *797 ¶ 10. Cost Cutters appeals the circuit court's award of attorneys' fees and Westhaven cross-appeals the circuit court's determination that the "failure to do business" provisions were unenforceable. Discussion [1] ¶ 11. Cost Cutters appeals and Westhaven cross-appeals the circuit court's grant of summary judgment. We review summary judgment decisions de novo, applying the same methodology as the circuit court. Green Spring Farms v. Kersten, 136 Wis. 2d 304, 315-17, 401 N.W.2d 816 (1987). That methodology is well established and need not be repeated here. See, e.g., Lambrecht v. Estate of Kaczmarczyk, 2001 WI 25, ¶¶ 20-24, 241 Wis. 2d 804, 623 N.W.2d 751. A. Cost Cutters' Appeal of the Award of Attorneys' Fees [2] ¶ 12. The parties agree that under the lease, attorneys' fees are recoverable only as an expense of reletting. However, they disagree as to whether the attorneys' fees claimed in this action constitute an expense of reletting. "[T]he application of a set of facts to the terms of a commercial lease and the determination of the parties' rights under that lease present questions of law that we review independently of the trial court's determination." Bence v. Spinato, 196 Wis. 2d 398, 408, 538 N.W.2d 614 (Ct. App. 1995). [3, 4] ¶ 13. We are required to determine whether the attorneys' fees incurred by Westhaven as a result of this action are properly characterized as an expense of *798 reletting. Wisconsin follows the American Rule, under which "parties to litigation are generally responsible for their own attorney's fees unless recovery is expressly allowed by either contract or statute, or when recovery results from third-party litigation." DeChant v. Monarch Life Ins. Co., 200 Wis. 2d 559, 571, 547 N.W.2d 592 (1996). We "will not construe an obligation to pay attorneys' fees contrary to the American Rule unless the contract provision clearly and unambiguously so provides." Hunzinger Constr. Co. v. Granite Res. Corp., 196 Wis. 2d 327, 340, 538 N.W.2d 804 (Ct. App. 1995). ¶ 14. As best we understand Westhaven's argument, it begins with the premise that Westhaven has the right to recover the deficiency between the rent and liquidated damages owed by Cost Cutters and the rent received by Westhaven from any new tenant. From this premise, Westhaven reasons it is entitled to recover attorneys' fees incurred in the process of recovering such a deficiency, regardless whether the attorneys' fees are incurred for the purpose of re-renting the space to a third party or for the purpose of pursuing an action against Cost Cutters. Westhaven says it "simply seeks the attorney fees that it incurred when it was forced to sue Cost Cutters to recover the deficiency in rent it experienced after Cost Cutters moved out of the mall and stopped paying rent." [5] ¶ 15. However, the lease's plain language does not permit Westhaven to recover attorneys' fees incurred in pursuing rent deficiencies and stipulated damages from Cost Cutters. Rather, the lease language limits recovery of attorneys' fees to those related to efforts to "relet." We conclude that litigation expenses in a suit against Cost Cutters are not expenses related to an attempt to relet to a third party. The record reveals that Westhaven's *799 attorneys' fees were incurred as a result of litigation against Cost Cutters. Therefore, Westhaven is unable to collect any of the attorneys' fees, and we reverse the circuit court's decision. B. Westhaven's Cross-Appeal on the Enforceability of the "Failure to Do Business" Provisions [6-8] ¶ 16. Westhaven argues that the uncontested facts show that the "failure to do business" provisions are not unenforceable penalty provisions. The review of a stipulated damages provision is a mixed question of law and fact. Wassenaar, 111 Wis. 2d at 525. Normally, "because the trial court's legal conclusion, that is, whether the clause is reasonable, is so intertwined with the factual findings supporting that conclusion, the appellate court should give weight to the trial court's decision, although the trial court's decision is not controlling." Id. However, where the parties have stipulated to the facts, and thus the circuit court makes no factual findings, only legal issues remain and, therefore, our review is de novo. Lewis v. Physicians Ins. Co. of Wis., 2001 WI 60, ¶ 9, 243 Wis. 2d 648, 627 N.W.2d 484; see Bence, 196 Wis. 2d at 408 (we review application of a set of facts to the terms of a commercial lease and the determination of the parties' rights under that lease de novo). [9-11] ¶ 17. A stipulated damages provision will be enforced if it is reasonable under the totality of the circumstances. Wassenaar, 111 Wis. 2d at 526. The court looks at several factors to determine reasonableness: "(1) Did the parties intend to provide for damages or for a penalty? (2) Is the injury caused by the *800 breach one that is difficult or incapable of accurate estimation at the time of contract? and (3) Are the stipulated damages a reasonable forecast of the harm caused by the breach?" Id. at 529-30 (footnotes omitted). Essentially, we must look at both the "harm anticipated at the time of contract formation and the actual harm at the time of breach." Id. at 532. The factors are not meant to be mechanically applied, and courts may give some factors greater weight than others. Id. at 533. [12, 13] ¶ 18. Courts generally assume that "bargains are enforceable and that the party asking the court to intervene to invalidate a bargain should demonstrate the justice of his or her position." Id. at 526. At least in situations like the one before us, where neither party complains of inequity in bargaining power, see id. at 536, the party seeking to avoid a stipulated damages provision bears both the "burden of proving facts which would justify the trial court's concluding that the clause should not be enforced" and the burden of persuading the court that the provision should not be enforced. Id. at 526, 539-40; see also Northwestern Motor Car, Inc. v. Pope, 51 Wis. 2d 292, 295, 187 N.W.2d 200 (1971). Thus, here, where the facts are uncontested, Cost Cutters bears the burden of persuading this court that the stipulated damages provisions are unreasonable. 1. Whether the Parties Intended the Provision to be a Liquidated Damages Provision or a Penalty [14] ¶ 19. The first factor we examine when determining the reasonableness of a stipulated damages provision is whether the parties intended the provision to *801 provide liquidated damages or to provide a penalty. As explained in Koenings v. Joseph Schlitz Brewing Co., 126 Wis. 2d 349, 377 N.W.2d 593 (1985), this factor is "rarely helpful" because the parties' intent has "little relevance to what is reasonable in law." Id. at 362. Nevertheless, we examine this topic because "the parties' intent may have some evidentiary value." Id. ¶ 20. Cost Cutters argues that the "failure to do business" provisions impose two different fees on the same conduct, evincing a punitive intent. In addition, Cost Cutters contends that the provisions are penalties because the provisions were part of a form lease and not geared to the particular circumstances of Cost Cutters. However, Cost Cutters fails to explain why the presence of two form provisions prohibiting the same conduct turns the provisions into an impermissible penalty. Even assuming the provisions prohibit the same conduct, it does not follow that the provisions thus become penalties. Neither case law nor logic requires a stipulated damages provision to appear but once in a contract in order to be enforceable. Moreover, the stipulated damages provisions, taken together, set the damages at an amount tied to Cost Cutters' base rent, which is presumably based on the amount and location of the space leased by Cost Cutters. Therefore, the provisions, taken together, are at least somewhat tailored to the space leased by Cost Cutters. ¶ 21. Cost Cutters also argues that because neither provision requires mitigation by the landlord, the provisions are penalties, citing Frank Nero Auto Lease, Inc. v. Townsend, 411 N.E.2d 507 (Ohio Ct. App. 1979). Townsend involved a motor vehicle lease agreement that allowed the lessor to repossess an automobile and accelerate future rents upon the lessee's default. Id. at 511. In addition, the lease permitted the lessor to regain *802 possession of the vehicle and relet or resell the vehicle while collecting the full rent from the lessee for the life of the contract without any obligation to mitigate. Id. However, the fact that the "failure to do business" provisions do not contain mitigation clauses is not controlling in this case because a mitigation clause is contained elsewhere in the lease, unlike the lease in Townsend. Westhaven was required to attempt mitigation under the second option in paragraph 14.00.[3] Thus, Townsend is easily distinguished. ¶ 22. We do not regard the parties' arguments relating to the first factor as particularly helpful, and we move on to the other two factors. 2. Whether the Damages Were Ascertainable at the Time of Contracting, and Whether the Stipulated Damages Reasonably Forecasted the Actual Damages ¶ 23. The second factor used to determine the reasonableness of a stipulated damages provision examines whether the damages can be estimated at the time of contracting. The third factor examines whether the stipulated damages provisions are a reasonable forecast of the harm caused by the breach. See Wassenaar, 111 Wis. 2d at 530-31. The Wassenaar court stated that these two "factors are intertwined, and both use a combined prospective-retrospective approach." Id. at 531. ¶ 24. Although the second and third factors both use a prospective-retrospective approach, the fact remains that they require two distinct inquiries: the *803 reasonableness of the stipulated damages provision at the time of contracting and the reasonableness of the provision when compared with actual damages after a breach. See Pollack v. Calimag, 157 Wis. 2d 222, 240-41, 458 N.W.2d 591 (Ct. App. 1990); see also Koenings, 126 Wis. 2d at 371 ("The touchstone of the reasonableness under the totality of the circumstances test must still be the relationship of anticipated and actual harm to the stipulated amount of damages, as expressed in the Wassenaar factors."). We first address whether the "failure to do business" provisions were reasonable at the time of contracting. a. Time of Contracting ¶ 25. Cost Cutters first argues that the stipulated damages provisions were unreasonable at the time of contracting because the parties should have been able to predict there would be no harm beyond lost rent if Cost Cutters breached. Cost Cutters reasons that because Westhaven collects a fixed rent from Cost Cutters, rather than a variable rent based on Cost Cutters' sales, Westhaven is entitled to the same rental income whether or not Cost Cutters vacates. We disagree with Cost Cutters' reasoning. ¶ 26. Westhaven's managing general partner testified by affidavit about the harm caused by vacating businesses: When a business fails to keep its business open, other tenants are harmed because each tenant brings potential customer foot traffic into the mall who then may shop the other businesses. Failing to remain open has a slow but certain negative effect on the value of the property because as tenants lose business and customers patronize competitor malls the rent the landlord *804 may charge to future tenants decreases and renewal rate of existing tenants decreases.... Over time, the very economic viability of the shopping center is threatened because the costs of operating the mall outweigh the rents received. In addition, at his deposition Cost Cutters' president acknowledged the harm caused by vacancies in malls: "Why don't I build freestanding buildings? I like the traffic. They, Hollywood Video, ... they have a lot of people every single day. That hurt my business when they went out." ¶ 27. As tenants vacate, a shopping center receives less customer traffic, potentially causing other tenants to vacate or go out of business. These consequential damages are often difficult to prove, but that does not prevent sophisticated parties from including consequential damages when estimating the damages at the time of contracting. See Wassenaar, 111 Wis. 2d at 535-36 (stating that parties may reasonably include in their estimates damages that reflect actual harm, rather than just the harm that may be proved in court). ¶ 28. Next, Cost Cutters argues that the provisions are unreasonable because Cost Cutters has no opportunity to cure a minor or justifiable breach. Cost Cutters alleges that such default clauses are unenforceable when any violation could trigger them, citing Mayfield v. Hicks, 575 S.W.2d 571 (Tex. Civ. App. 1978). Cost Cutters' reliance on Mayfield is misplaced. In Mayfield, an equipment lease permitted the lessor to declare a breach of the lease "upon the occurrence of even a minor default." Id. at 575. That court found that "[t]he coupling of repossession with acceleration of rent, irrespective of the type of breach, is the defect in this provision." Id. In contrast, under the lease here, Westhaven must give Cost Cutters written notice as well as *805 ten days to remedy the violation before declaring a breach of the lease. Thus, a minor violation of the "failure to do business" provisions will not automatically breach the lease. Although a minor violation may lead to money damages, a minor violation cannot lead to the "repossession with acceleration of rent" to which the Mayfield court objected. ¶ 29. Furthermore, Cost Cutters argues that the provisions are unreasonable because the "failure to do business" fees accrue regardless of the tenant mix, and would be assessed even if Cost Cutters were the only store left in the mall. This hypothetical scenario is too speculative to render the provisions unreasonable at the time of contracting. Furthermore, if this scenario had come to pass, it would have been more properly analyzed by comparing the stipulated damages provisions to the actual harm caused. [15] ¶ 30. Cost Cutters has failed to persuade us that the "failure to do business" fees were an unreasonable estimation of Westhaven's damages. Cost Cutters did not, for example, present expert testimony that the stipulated damages provisions were unusually harsh as compared with stipulated damages provisions found in other multi-tenant retail commercial leases. To the contrary, in this case Cost Cutters' president, in his deposition testimony, admitted that similar "failure to do business" provisions are common in leases with other shopping malls. b. After Breach ¶ 31. Next, we turn to the question whether the stipulated damages are reasonable in light of the actual damages caused by the breach. See Wassenaar, 111 Wis. *806 2d at 530. As stated above, it is incumbent on Cost Cutters to persuade us that the damages it must pay under the contract do not reasonably relate to the actual harm suffered by Westhaven. Cost Cutters fails to meet this burden. ¶ 32. Cost Cutters argues that Westhaven suffered no harm and thus the provisions unreasonably penalize Cost Cutters. Cost Cutters contends that the lack of evidence of the Shopping Center's property value before or after Cost Cutters closed means that Westhaven did not establish any harm. However, Cost Cutters fails to appreciate that it had the burden of producing evidence of unreasonableness. Westhaven was not required to present evidence on value. See id. at 526 ("Placing the burden of proof on the challenger is consistent with giving the non-breaching party the advantage inherent in stipulated damages clauses of eliminating the need to prove damages...."). ¶ 33. Cost Cutters also argues that because the occupancy rate at the Shopping Center was low before Cost Cutters departed and actually rose after Cost Cutters left, it is obvious that Westhaven suffered no harm as a result of Cost Cutters' departure. The occupancy rate just prior to Cost Cutters' departure was 53%. About five months later, occupancy had risen to 72%. However, we are not persuaded by the occupancy rate information. Simply because the occupancy rate rose after Cost Cutters' breach does not mean that the breach caused Westhaven no harm. Based on the record before us, the most reasonable inference is that occupancy would have been even higher had Cost Cutters remained in the Shopping Center. When a mall has a low occupancy rate, it does not follow that the mall suffers no harm when a significant tenant vacates. The *807 record contains a letter from another tenant commenting on the harm caused by Cost Cutters' vacating: I have just recently learned that Cost Cutters, a solid anchor in this mall, will be moving down the street. ... I do not believe that myself or PD Meats will be able to survive without both a full, thriving mall with tenants that compliment each other and also an anchor.... I am afraid soon I'll be the only one here and [the Shopping Center] will become not a shopping destination, but a place to avoid because businesses fail and close. In a subsequent letter, the same tenant stated: "My market study was based on the fact that there was a video store and a hair care business as [an] anchor and a draw to this Center. These business[es] have closed and moved, which has a significant impact on my bottom line." [16] ¶ 34. We conclude that Cost Cutters has failed to meet its burden of persuasion. Cost Cutters has not shown that the stipulated damages provisions in the lease were unreasonable under the totality of the circumstances. Conclusion ¶ 35. We conclude that the plain language of the lease does not permit Westhaven to recover its attorneys' fees incurred in this suit because they are not expenses of reletting. Additionally, we conclude that Cost Cutters has failed to show that the stipulated damages provisions in the lease were unreasonable. Westhaven is entitled to stipulated damages under both *808 paragraphs 3.02 and 8.00(n). Therefore, we reverse both decisions of the circuit court and remand for further proceedings consistent with this opinion. By the Court. — Judgment reversed and cause remanded with directions. NOTES [1] By agreement of the parties, Cost Cutters sublet its space on December 1, 2000. Whether the space was sublet or relet is not pertinent to our inquiry. [2] Westhaven contends "normal business hours" and "minimum hours" are two different concepts under the contract. In Westhaven's view, normal business hours are the typical business hours of a business such as Cost Cutters, while "minimum hours" are the specified hours the Shopping Center is open for business. Westhaven argues that the two provisions target two different activities and are thus not penalty clauses. Cost Cutters disagrees with this analysis. For reasons we discuss below, we need not address this issue. [3] If Westhaven had chosen the first option under paragraph 14.00, there would have been no mitigation requirement, but at the same time had Westhaven chosen that first option, it could not have collected damages under paragraph 3.02 or paragraph 8.00(n).
2024-01-07T01:26:18.401715
https://example.com/article/6289
var grow = grow || {}; window.grow = grow; (function(grow){ var toolConfig = {}; grow.ui = grow.ui || {}; grow.ui.showNotice = function(text) { var notice = document.createElement('div'); notice.classList.add('grow_tool__notice'); if (text) { notice.appendChild(document.createTextNode(text)); } document.body.appendChild(notice); return notice; }; grow.ui.toolConfig = function(tool, options) { toolConfig[tool] = options; }; grow.ui.tools = grow.ui.tools || []; grow.ui.main = function(settings) { var el = document.createElement('div'); var buttonsEl = document.createElement('div'); buttonsEl.setAttribute('class', 'grow__buttons'); buttonsEl.appendChild(createButton_('primary', null, null, { 'click': function() { buttonsEl.classList.toggle('grow__expand'); } })); buttonsEl.appendChild(createButton_('close', null, null, { 'click': function() { el.parentNode.removeChild(el); } })); if (settings.injectEditUrl) { buttonsEl.appendChild( createButton_('edit', 'Edit', settings.injectEditUrl)); } if (settings.injectTranslateUrl) { buttonsEl.appendChild(createButton_( 'translate', 'Translate', settings.injectTranslateUrl)); } for(i in grow.ui.tools) { tool = grow.ui.tools[i]; if (tool['init']) { tool['init'](toolConfig[tool['kind']] || {}); } if (tool['button']) { buttonsEl.appendChild(createButton_( tool['kind'], tool['name'], tool['button']['link'] || null, tool['button']['events'] || {})); } } // If there is nothing to do, do not show the menu at all. if (buttonsEl.children.length <= 2) { return; } el.setAttribute('id', 'grow-utils'); el.appendChild(buttonsEl); document.body.appendChild(el); }; var createButton_ = function(kind, label, url, events) { var containerEl = document.createElement('div'); containerEl.classList.add('grow__button'); var buttonEl = document.createElement('a'); buttonEl.classList.add('grow__icon'); buttonEl.classList.add('grow__icon_' + kind); if (url) { buttonEl.setAttribute('href', url); buttonEl.setAttribute('target', '_blank'); } else { buttonEl.setAttribute('href', 'javascript:void(0)'); } if (events) { for (var prop in events) { buttonEl.addEventListener(prop, events[prop]); } } containerEl.appendChild(buttonEl); if (label) { var labelEl = document.createElement('p'); labelEl.appendChild(document.createTextNode(label)); labelEl.classList.add('grow__label'); containerEl.appendChild(labelEl); } return containerEl; }; })(grow);
2024-07-28T01:26:18.401715
https://example.com/article/5992
Snowmobile: Pass By Slow Wav Sound Effect #1 5.99 USD Snowmobile: pass by slow sound effect .wav #1 Description: The sound of a snowmobile passing by (slow speed) File Format: Wav Properties: 48.000 kHz 24-bit Stereo Duration: 0:25 By purchasing this sound effect, you are allowed to use it royalty free in your projects such as films, videos, games, presentations, animations, stage plays, radio plays, web videos, new media and multimedia projects, be it for commercial or private use. This sound effect is created by Sound Jay and protected under the copyright laws. You are not allowed to post the sound effect alone on any web site for others to download or sell, license or sub-license the sound effect to anyone else.
2024-06-23T01:26:18.401715
https://example.com/article/2120
.223 55gr Terminal Shock™ 500 Rnd Bulk Description 500 rounds of our 55 grain .223 ammo packed in a bulk box. Reformulated in 2018, the 55gr Terminal Shock round now packs a bigger punch with greater velocities and energy. The .223 55 grain round is the ultimate ammunition for hunting deer or wild boar sized animals, and the ultimate .223 round for self defense. Safe to use in both 5.56 and .223 Remington chambers, this bullet is what put DRT on the map. A non lead projectile, this bullet features a hollowpoint flatbased (HPFB) design. Accurate out to 350 yards and works well in a 1:7, 1:8, and 1:9 twist rate barrels. You can expect wound cavities of 3-5” in diameter with 14-16” of penetration. It is reliable, accurate, has reduced ricochet, and is lethal ammunition. Please read our FAQ section before ordering.
2024-03-29T01:26:18.401715
https://example.com/article/7012
[Laser vaporization for tracheobronchial lesions using a double intubation technique under general anesthesia]. A method for simple and safe management of laser vaporization is described. Following intubation with a thin endobronchial tube which is removed from a twin-lumen tube, a thick endotracheal tube for a bronchial fiberscope is intubated. This double intubation technique provides for a safe and long operation without danger of vapor inhalation.
2024-07-27T01:26:18.401715
https://example.com/article/3238
Directions From N Central Expressway and Walnut Hill Lane, Dallas, Texas, drive east on Walnut Hill Lane toward Golf Lakes Trail. Make a right turn onto Greenville Avenue. Make a left turn onto Park Lane. Sunchase Park Apartments will be on the right. About Sunchase Park The Sunchase Park is surrounded by a pristine landscape that includes White Rock Creek Greenbelt, Flag Pole Hill Park and Hairy Moss Park. Besides offering convenient access to public green spaces, this apartment complex is a short walk from Emmett J. Conrad High School and Sam Tasby Middle School. There are also dozens of stores in the same neighborhood as this residence including The Shops at Park Lane and NorthPark Center. Those who need to navigate other parts of Dallas, TX can use the nearby Highway 75. Additionally, there's the option of catching a bus along Park Lane or Ridgecrest Road.Summer fun at the Sunchase Park is focused in the on-site swimming pool. Residents may also relax on the loungers overlooking the pool. Playgrounds allow young ones to play around year-round while adults can sit on benches under the shade of trees. Three laundry rooms are open for washing and drying clothes at a convenient schedule. Most of the apartments at the Sunchase Park have fireplaces that boast plenty of traditional charm as well as function for climate control during the winter. Speaking of climate control, ceiling fans could be turned on to beat the heat in the summer. Why UMoveFree? Over 2 Million Users Use the most popular apartment finding service in Texas... Absolutely Free Access is free and we never ask for payment info... More Apartment Listings View photos, pricing and details on nearly twice as many listings as other websites...
2023-12-21T01:26:18.401715
https://example.com/article/7874
Well, I'm guessing that you guys noticed that I left that area of the one compartment I did earlier open... and that was because the windows didn't match anything seen on screen. I had hoped that the windows designed into Kirk's cabin (and partially seen in a few early episodes) would have matched those on the model. Sadly they didn't. But I was playing around with the idea of what might be in that part of the ship, and this was what I came up with... ​ Something like an open commons area... specially for crew members who don't have their own office area in their cabins. As for the portholes... I'm not sure what they are, but I'm most likely not including them as standard windows of any type. I'm curious as to what standard dimensions you are using, for example: What deck height, corridor width, and room width/lengths? Generally I've always found the dimensions quoted by the model builders to be about 50% too small. A deck height of 10' is all fine for a studio model, but when you start running the structural beams, plumbing, electrical, air supply, plasma conduits, and tribble feeders then things get a little... crowded. As stated before, I'm working from the original set blueprints (for most areas of the ship). I've already partitioned the whole starship into compartments, and each compartment is responsible for it's own rigidity. There are limited umbilical connections between compartments, but those are at very specific points. Most compartments are two decks thick (specially if a compartment deck is bisected by a turbo shaft), and there is a few inches of space under the floors on all decks... but that is not where the bulk of the "plumbing" is found. Actually, almost all of the wiring (etc.) is found in the walls (mostly along the corridors). After all, the surface of the walls of the corridors are generally more than two feet from the surface of the walls of most of the rooms. There is enough room in the walls above the height of the doors for people to crawl inside (which is why there are alcoves with ladders every so often along the corridors). We have some idea what the interior of the walls look like (thanks to Charlie Evans), but here is one of those aspects that I see people doing over and over again these days... you can't make assumptions as to how much room is needed for all the things Leopardmadcat listed unless you know how much room those things need in the 23rd century. Just because you don't think there is enough room given how you might do it today has no baring on what people will be doing hundreds of years from now. So I've adopted a black box view on such things. There is room for something, though how it works we just don't know. As for the general structure of the ship itself... I am constantly surprised at the thicker is better mind set of some people. Geometry can make a structure stronger than using more material... but I'm guessing people aren't being taught this stuff in schools anymore. But as a estimate of what I'll be using for the thickness of the walls, floors and outer hull of these plans, these images of the U.S.S. George H.W. Bush under construction are where I'll be getting some data... ​ Although I'll still be referring to the hull thickness examples as seen in the show more often than not. ​ But remember... everyone can put this together any way they want. I mean think about it, if you told people back in the 1960s that almost every home in America would have a computer (if not several) that was many times the speed of the most advanced systems in existence at that time, what would they have been thinking our homes would be like? They would most likely guess that more than half of the internal volume of our homes would be used to house this equipment. And that is a difference of 40 years... we're talking hundreds with this stuff. It has occurred to me that people aren't going to read this massive thread to find out where I've been coming from and where I am going. Still I urge people to read the thread... at least the first few pages if nothing else. But for those who don't want to review all those posts or don't want to hunt down one of my sketches in this thread, here is a list of the main image files that I've posted to date. So, I take from your G.H.W. Bush meditations that you're assuming there is no such thing as a "typical" ceiling height aboard the Enterprise? Given those drydock photos of the Bush, I can see where this would be the case. Personally I am a big fan of standardization. Creating decks of a standard height allows the construction materials to be all standard pre-fab and interchangeable. Looking at all the movies I would say they used contemporary construction, 8' walls on 10" joists. So for a minimum I would use 10' deck-deck height. That would allow 8' headway, 1' structural support, and 1' for plumbing. I would prefer 12', that would allow more room for primary structural beams (2' or more) and 2' plumbing. That would also alow for 'jefferies tubes' to be run above corridors to reach the aforementioned tribble feeders! Corridors are HUGE by modern standards! You can see crew walking 2 or 3 abreast easily, that means a minimum of 6' to 8' wide! I would make side corridors 6' and primary corridors 10' tio 12'. That way you can move machinery about without using the transporter. Rooms are a tough one... all the deck plans I've seen point to rooms being about 3x the width of a corridor. That makes them about 18' by my reconing. Huge and plus! compaired to what was shown on TOS series and TNG. However if you re-arrange the rooms that isn't too bad, allows for a 6' wide walk-in storage closset at the rear of the room and 12' standard room. That may sound like too much stowage, but if you consider the average modern day cruise is 9 months compared to TOS 5 year mission, you can see where you will want plenty of closet space. So for a recap I'm figuring on 12' decks, 6' radial corridors and 12' primarys, and 18' rooms. this would make the series Enterprise about 444' wide at the saucer. Hello. I've been following this thread for some time, and I just wanted to say how much I've been enjoying it. It's largely responsible for getting me to sign up for this BBS. I'm really looking forward to any "build-your-own" kit which emerges from it. Where can I find stuff like the original set blueprints? I'd enjoy tinkering around with them myself. Hello. I've been following this thread for some time, and I just wanted to say how much I've been enjoying it. It's largely responsible for getting me to sign up for this BBS. I'm really looking forward to any "build-your-own" kit which emerges from it. Click to expand... Once I nail down the main stuff for my plans I'll be going back and getting input from people on some of the variations on the theme that people might want. Of course people are welcome to rearrange my plans in any way they'll please right from the start, but I know that some people would rather not be restricted to the scale I am using or the number of decks or the compartment partitioning. Mainly the broad outlines of the ship's decks would be the easiest thing to provide with elements you could arrange yourself. Where can I find stuff like the original set blueprints? I'd enjoy tinkering around with them myself. Click to expand... I'm not sure where the detailed set plans are (which show a number of additional rooms depending on the episode), but the standard overview shouldn't be too hard to find. It makes for a good reference once you can apply scale to it (which you can get from a number of my sketches that include the 10 foot by 10 foot grid). ___________​ Here are some of the timeline aspects (and information) I've been looking at recently in my studies of the evolution of the Enterprise... Nov. 4, 1964 (Wednesday): Richard Datin agrees to build an approximate three foot long model based on an early set of plans which give a real world scale of 1:48 (if this had been the final drawings, this would have been the 540' version, but the proportions of this early drawing are actually different from the final plans). Nov. 7, 1964 (Saturday): The final construction plans are finished. These plans include the scale reference of FULL SIZE & 3" = 1'-0" TO LARGE MINIATURE. Nov. 8, 1964 (Sunday): Richard Datin receives the plans and starts building the full size 33 inch model out of kiln-dried sugar pine. Nov. 15, 1964 (Sunday): A little more than a week later the 33 inch model is presented to Roddenberry for approval. I'd guess this is where the addition of exterior windows takes place (which were not part of the original design). Dec. 8, 1964 (Tuesday): Construction is started on the 11 foot model. Dec. 14, 1964 (Monday): The 33 inch model is delivered to Roddenberry for final approval while The Cage was being filmed in Culver City. This model is used for all effects shot in The Cage except the most important one (the zoom in on the bridge). Dec. 24, 1964 (Thursday): Shooting of The Cage wraps, only one effects shot still outstanding. Dec. 29, 1964 (Tuesday): The 11 foot model (built by Datin, Mel Keys and Vern Sion) was delivered to the Howard A. Anderson studio. This version is unpowered and the windows are painted on the surface of the model... and even then the model was designed to be shot from the right side only. Jan. 23, 1965 (Saturday): After The Cage is already in the can and waiting for network approval of the new series, additional test shots of the 11 foot model are taken in it's original condition. Jan. 30, 1965 (Saturday): Aspects of the ship's size (like it being 190,000 tons) were being distributed to the media in the descriptions of the new show. I'm still working on nailing down more info, but I thought I would share what I have so far. See, I classify things like Iron Man, Superman and Star Wars as fantasy. As such their value pretty much ends when whatever story is being told is over. I'll watch or read Superman and I'll watch Star Wars, but that is the absolute limit of the amount of effort I'll extend towards anything that falls into the realm of fantasy. Star Trek is science fiction. And while I am happy to pass time enjoying any given dramatic presentation of Star Trek, I'm also happy to spend years in school and putting myself thousands of dollars into debt studying science based on the inspiration of Star Trek. And I've been happy to spend hundreds of hours researching aspects of Star Trek and sharing my findings with others. I'm interested in Star Trek as inspirational science fiction and I'm very happy to find others who are willing to expend the energy in actually thinking about what could be when projecting forward from our understanding of science today. TOS (more than any other Star Trek) worked not to trip itself up by introducing fantasy elements into itself and it lends itself nicely to different interpretations of what was happening even as our understanding of science has evolved in the intervening years since the show first aired. If you equate Star Trek with Iron Man and Superman then I'm not sure why you would expend any effort towards technical endeavors. I do because the show holds up exceptionally well to technical scrutiny and that for many people this aspect of Star Trek inspires them to take other elements a step further in trying to actually make what they see a reality. In my eyes the only fantasy aspect of Star Trek is the alien races. Otherwise, it is the benchmark by which all other science fiction is measured against. And as I don't watch any other science fiction (or fantasy) series with any regularity, I'd have to say nothing since Star Trek has quite measured up to it. The fact that I'm motivated to work on this project given the vast amounts of real world mathematics and physics knowledge that I have should speak volumes about how well made Star Trek is (specially TOS). And the biggest mistake made by later Star Trek series (and why my interest in them has fallen off over the years) is their attempt to do exactly the type of fantasy science that you seem to see in all of Star Trek. By not trying to over explain everything (or explain many things at all), TOS left the science of the show open to future interpretation rather than linking it to pseudoscience or dateable technobabble. The more real world mathematics and physics I learn, the more I'm pushed back towards TOS and away from the other parts of Star Trek for anything other than a mindless pass time of watching TV. Now, while I may be using the black box analogy in place of attempts at applying real science in my plans, I can guarantee that I do think about what might be involved in how those aspects work. And as long as no one expects me to include either my ideas or the ideas of others put forward here, I don't see what there is a problem discussing this stuff. After all, it is understood that other well most likely use what I'm putting forward here on their own projects and I highly doubt that other people will restrict themselves in the same way I am on my project. So in this sandbox the rules should be considered that what toys you bring are brought to share, and if you don't want to play with someone else's toys you don't have to. But not wanting to play with certain toys is not a good reason to drive them out of the sandbox. ... where the sandbox in that last paragraph is this thread and the toys are ideas and concepts of others expressed here (just in case that started to get a little too abstract ). Click to expand... Perusing this thread I came across the above post and felt the need to remark. Shaw obviously has a much better grasp of math, physics and real as well as speculative sciences overall than I do, but I think we approach this kind of material in similar fashion. Yes, it's fiction, but let's have fun trying to make it work as if it were real. Because that plays well into the overall sensibility that TOS evoked in trying to make the fantastic seem credible. This is certainly the way I like to approach my science fiction. I think the science fiction category needs to be subdivided a bit more, from the diamond-hard science grounding of an Asimov or Clarke novel to just this side of space opera which is where Star Trek usually wound up. There are sub genres of SF yet they have very blurred lines defining them. Star Trek is space adventure and/or space opera in usually the best or better sense. Very few other space adventure works have come off as well overall. Star Wars isn't only space adventure or opera, but as was once said it's very much science fantasy. That isn't to say it cannot be enjoyed on its own terms, but it's evident that its science isn't meant to be taken seriously or to appear at least passably credible. And, sadly, most space adventure/opera leans more towards the SW approach. I think it's often thought that hard SF doesn't often translate well into engaging and interesting storytelling because it's thought that the science aspect is restrained strictly to pretty much what is known, and if you go by something like 2001 then you might have a point. But even 2001 delved into things only speculated about. 2001's (the film) flaw isn't ideas but rather slow pacing and bland characters, which were intentional, but then the result is the film is challenged to hold most people's attention. I really think it's possible to do space adventure that deals with real and speculative science and still pull it off in an engaging and credible way without being plodding and also not being tempted with fantasy science. Star Trek and a few others have periodically done this and it's exciting when they have. I think the somewhat softer sci-fi grounding of Star Trek also allows for invoking some technical specs that'd be more at home in an Iron Man comic book than a NASA manual (the "black box" approach that Shaw likes so much). I think the somewhat softer sci-fi grounding of Star Trek also allows for invoking some technical specs that'd be more at home in an Iron Man comic book than a NASA manual (the "black box" approach that Shaw likes so much). Click to expand... I'd point out that the main reason for a black box approach is so that we don't end up dating things. For example, the idea of a big central computer core seems quite dated... I would imagine that a handful of data banks distributed around the ship would be the largest single aspect of the Enterprise's computer resources. Otherwise, every computer throughout the ship would be available (as needed) for processing time. Most of the supercomputers today are clusters of smaller computers, often time standard desktops or workstations. The Enterprise's Library computer would most likely have the ability to grab resources from as many other computers around the ship as it needs for any given task. As Spock rightly noted, computing the value of pi to the last digit would quickly over take all available computing power even in a clustered computing environment. ________________​ In another thread I was asked about my cabin estimates, and I answered with my estimates from last April. Taking a closer look at the last layouts I did before taking a break on the internals, I've revised my estimates a little. I assume that Officers and Specialist are given single person accommodations because their cabins double as office space. Given that, we have 80 single cabins (all in ring 1) and 167 double person cabins (in rings 2-4)... so on those three decks we have accommodations for 414 members of the crew. Considering that there will be 4 VIP cabins on deck 2 and I was planning on accommodations for about 50 in the secondary hull (engineering crew), we would have room for 468 people with all the normal beds occupied. The standard cabins could handle more than two people if needed, but normally there might be quite a few empty cabins when the standard compliment of 430 people are on board.
2023-11-29T01:26:18.401715
https://example.com/article/6334
And then, a year after Eichmann’s capture, came the trial (or quasi-trial, since it was a foregone conclusion – he would hardly have skipped out of that courtroom a free man). Eichmann never denied, like some, that he was there close to the heart of the Nazi regime; but his defence of his actions, under the unblinking scrutiny of Fruchtman’s cameras, was couched in such a way to suggest that he was powerless before the workings of a mighty regime.
2024-03-04T01:26:18.401715
https://example.com/article/9355
Q: Change css font-weight upon click I am pretty new to css + html and am coding my first website. I have a navigation menu setup inside a div, but I want to change the font-weight of the clicked text from lighter to bold when the user clicks on an item in it (text). Please can you tell me how to do this? Here is my code so far: HTML <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <title>...</title> <link rel="stylesheet" type="text/css" href="css/style.css" /> <link rel="stylesheet" type="text/css" href="http://fonts.googleapis.com/css?family=Yanone+Kaffeesatz" /> </head> <body> <div id="background" /> <div id="navigation" class="navigationPlaceholder"> <div id="navigationText"> <ul> iOS Blog About Contact </ul> </div> </div> </body> </html> A: You need to add a click event listener each navigation item and change its font-weight style. First, start by using an unordered list for your nav <div id="navigationText"> <ul> <li>iOS</li> <li>Blog</li> <li>About</li> <li>Contact</li> </ul> </div> Then, place this script block just before the closing </body> tag <script type="text/javascript"> var nav = document.getElementById('navigationText'); var navItems = nav.getElementsByTagName('li'); for (var i = 0; i < navItems.length; i++) { navItems[i].addEventListener('click', function() { this.style.fontWeight = 'bold'; }, false); } </script> </body>
2023-11-29T01:26:18.401715
https://example.com/article/2677
Adventure games On FunnyGames.org you'll find the best collection of Adventure games! You'll find no less than 833 different Adventure games, such as The Farm & Click Adventure. Complete the quests and explore dungeons and exciting worlds in these adventure games! Can you solve the riddles and mysteries and discover the hidden treasures?
2024-01-02T01:26:18.401715
https://example.com/article/5574
Q: JSF Handle Exception in Ajax events I followed this solution and works perfectlly when a ViewExpiredException happen, but when i inspect (firefox utility) the view error redered, i see that its replacing it, but just inside the body tag of the normal view, i mean, the view which was the cause of the Exception. The view error had a css class declared in his own body tag, but i don't know, why doesn't replace the whole view error, instead just take all the content (after his body tag) of the view error and inserted inside the body tag of the normal view? To get this behavior, i have a login view (normal view that i refer above) and just have to wait until session expire, then i try to login (submit the form of the view) and this trigger a ExceptionHandler to render de view error. Here are some snippet: login.xhtml <!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:h="http://java.sun.com/jsf/html" xmlns:f="http://java.sun.com/jsf/core" xmlns:ui="http://java.sun.com/jsf/facelets" xmlns:p="http://primefaces.org/ui"> <h:head> <f:facet name="first"> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"/> <meta name="apple-mobile-web-app-capable" content="yes" /> </f:facet> <title>PrimeFaces</title> </h:head> <h:body styleClass="login-body"> <div class="login-panel ui-fluid"> <div class="ui-g"> <div class="ui-g-12 logo-container"> <p:graphicImage name="images/logo-colored.png" library="theme-layout" /> <h1>Login to Your Account</h1> <h2>WELCOME</h2> </div> <div class="ui-g-12"> <p:inputText placeholder="User" /> </div> <div class="ui-g-12"> <p:password placeholder="Password" feedback="false"/> </div> <div class="ui-g-12 chkbox-container"> <p:selectBooleanCheckbox id="remember-me" /> <p:outputLabel for="remember-me" value="Remember Me"/> </div> <div class="ui-g-12 button-container"> <p:commandButton type="submit" value="Log in" icon="fa fa-user" styleClass="orange-btn" action="#{menu.login}" update="frmLoginPromo"> </div> </div> </div> <h:outputStylesheet name="css/layout-#{guestPreferences.layout}.css" library="theme-layout" /> </h:body> </html> error.xhtml <!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:h="http://java.sun.com/jsf/html" xmlns:f="http://java.sun.com/jsf/core" xmlns:ui="http://java.sun.com/jsf/facelets" xmlns:p="http://primefaces.org/ui"> <h:head> <f:facet name="first"> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"/> <meta name="apple-mobile-web-app-capable" content="yes" /> </f:facet> <title>PrimeFaces - Error </title> </h:head> <h:body styleClass="exception-body"> <div class="exception-panel"> <p:graphicImage name="images/icon-error.png" library="theme-layout" /> <h1>Error Occured</h1> <p>An error occured, please try again later.</p> </div> <h:outputStylesheet name="css/layout-blue.css" library="theme-layout" /> </h:body> </html> CustomExceptionHandler.java @Override public void handle() throws FacesException{ final Iterator<ExceptionQueuedEvent> lclExceptionQueue = getUnhandledExceptionQueuedEvents().iterator(); final FacesContext lclFacesContext = FacesContext.getCurrentInstance(); final Map<String, Object> requestMap = lclFacesContext.getExternalContext().getSessionMap(); while (lclExceptionQueue.hasNext()){ ExceptionQueuedEvent event = lclExceptionQueue.next(); ExceptionQueuedEventContext context = (ExceptionQueuedEventContext) event.getSource(); Throwable lclThrowable = context.getException(); try{ if (lclThrowable instanceof ViewExpiredException){ lclFacesContext.setViewRoot(lclFacesContext.getApplication().getViewHandler().createView(lclFacesContext, "/error.xhtml")); lclFacesContext.getPartialViewContext().setRenderAll(true); lclFacesContext.renderResponse(); } }finally{ lclExceptionQueue.remove(); } } getWrapped().handle(); } Here is how looks like, after error view is rendered Inspecte view error Please, tell me what am doing wrong? A: Since you are already using PrimeFaces, I'd opt for not developing your own exceptionhandlers. PrimeFaces already has one that can handle both ajax and non-ajax requests. For the people not using PrimeFaces, I'd suggest to use the OmniFaces exceptionhandling For PrimeFaces 6.2 the documentation contains the information to configure this in chapter 11.3 (it is the same chapter btw for PF 6.1) In summary (ALL quotes are from the PF documentation) Configure an el resolver and the exceptionhandler <application> <el-resolver> org.primefaces.application.exceptionhandler.PrimeExceptionHandlerELResolver </el-resolver> </application> <factory> <exception-handler-factory> org.primefaces.application.exceptionhandler.PrimeExceptionHandlerFactory </exception-handler-factory> </factory> Configure errorpages if you want to in web.xml <error-page> <exception-type>java.lang.Throwable</exception-type> <location>/ui/error/error.jsf</location> </error-page> <error-page> <exception-type>javax.faces.application.ViewExpiredException</exception-type> <location>/ui/error/viewExpired.jsf</location> </error-page> You can then use information about the exceptions in EL in the error pages <h:outputText value="Message:#{pfExceptionHandler.message}" /> <h:outputText value="#{pfExceptionHandler.formattedStackTrace}" escape="false" /> There is more info, for which I'd suggest to consult the documentation. And for ajax exceptions you can do <p:ajaxExceptionHandler type="javax.faces.application.ViewExpiredException" update="exceptionDialog" onexception="PF('exceptionDialog').show();" /> <p:dialog id="exceptionDialog" header="Exception: #{pfExceptionHandler.type} occured!" widgetVar="exceptionDialog" height="500px"> Message: #{pfExceptionHandler.message} <br/> StackTrace: <h:outputText value="#{pfExceptionHandler.formattedStackTrace}" escape="false" /> <p:button onclick="document.location.href = document.location.href;" value="Reload!"/> </p:dialog> The configuration for OmniFaces is fairly similar. See also: Session timeout and ViewExpiredException handling on JSF/PrimeFaces ajax request
2024-01-29T01:26:18.401715
https://example.com/article/6304
Q: Custom unit test result Is there a way to create a custom unit test result in TestNG/JUnit (or any other Java testing framework)? I understand that unit tests can either pass, or fail (or ignored), but currently I really would like to have the third option. The company I'm working with right now has adapted the testing style of cleverly comparing screenshots of their application and so the test can either pass, fail, or diff, when the screenshots does not match with predetermined tolerance. In addition, they have their in house test "framework" and runners. This was done long before I joined. What I would like to do is to migrate test framework to the one of the standard ones, but this process should be very gradual. The approach I was thinking about was to create a special exception (e.g. DiffTolleranceExcededException), fail the test and then customize test result in the report. A: Maybe you already mean the following with The approach I was thinking about was to create a special exception (e.g. DiffTolleranceExcededException), fail the test and then customize test result in the report. but just in case: You certainly can use the possibility to give a pre-defined message string to the assertions. In your case, if the screenshots are identical, the tests pass. If they are too different, the tests just fail. If they are within tolerance, you make them fail with a message like "DIFFERENT BUT WITHIN-TOLERANCE" or whatever - these failures are then easily distinguishable. Certainly, you could also invert the logic: Add a message to the failures that are not within the tolerance, to make these visually prominent.
2024-05-22T01:26:18.401715
https://example.com/article/3884
FILE - In this file photo dated Friday, Nov. 15, 2019, former U.S. Ambassador to Ukraine Marie Yovanovitch leaves after testifying to the House Intelligence Committee on Capitol Hill in Washington. Ukrainian police said Thursday Jan. 16, 2020, they have opened an investigation into the possibility that former ambassador Yovanovitch came under illegal surveillance before she was recalled from her post in US. (AP Photo/Andrew Harnik, FILE) FILE - In this file photo dated Friday, Nov. 15, 2019, former U.S. Ambassador to Ukraine Marie Yovanovitch leaves after testifying to the House Intelligence Committee on Capitol Hill in Washington. Ukrainian police said Thursday Jan. 16, 2020, they have opened an investigation into the possibility that former ambassador Yovanovitch came under illegal surveillance before she was recalled from her post in US. (AP Photo/Andrew Harnik, FILE) WASHINGTON (AP) — Ukraine’s announcement on Thursday of an investigation into alleged surveillance of the U.S. ambassador has come as welcome relief to many in America’s diplomatic corps, but the State Department’s silence on the matter has alarmed a number of current and former diplomats. They are demanding action from the Trump administration. The department has declined repeated requests to offer any public defense of its envoy, the former U.S. Ambassador to Ukraine Marie Yovanovitch, two days after allegations arose that allies of President Donald Trump had her under illegal surveillance while she was stationed in Kyiv. ADVERTISEMENT The allegations, if true, are central to the impeachment inquiry into Trump, who faces a charge that he abused his presidential power by pressuring Ukraine to investigate Democratic rival Joe Biden, using military aid to the country as leverage. Trump says the inquiry is a “hoax.” At the time, Trump’s allies were trying to have Yovanovitch, who was seen as a roadblock, removed from her post. She was recalled in May ahead of the end of her tour. House Democrats this week published text messages to and from Lev Parnas, an associate of Rudy Giuliani, the president’s personal lawyer, suggesting Yovanovitch was under surveillance. Secretary of State Mike Pompeo, who was traveling in California when the Parnas texts were released, has for months resisted calls for specific statements backing Yovanovitch. One of Pompeo’s top aides, veteran career diplomat Michael McKinley, resigned in October after unsuccessfully pressing for an expression of support for Yovanovitch. U.S. diplomats have reacted to the new revelations with dismay and to the lack of public support for their colleague with disappointment. Nearly a dozen told The Associated Press that while surveillance by foreign intelligence and security services is expected and routine in many countries, such activity by Americans is of great concern, particularly if it’s done by purported agents of the president. Although those officials all spoke on condition of anonymity out of fear of reprisal, former diplomats and senior lawmakers were outspoken in their criticism, especially after Ukraine announced it would open its own probe into what happened. “U.S. diplomats serving in the post-Soviet space often expect to be under surveillance — just not under surveillance organized by an American with links to the president’s personal attorney,” said Steven Pifer, a former American ambassador to Ukraine. ADVERTISEMENT “It would be ironic for Ukraine to be more interested in pursuing the security and what happened to a U.S. ambassador than the United States and the State Department is,” said Sen. Robert Menendez, D-N.J., the top Democrat on the Foreign Relations Committee. “I’m looking for a vigorous investigation of what went on here, because Ambassador Yovanovitch testified that she felt intimidated.” Rep. Eliot Engel, a New York Democrat who chairs the House Foreign Affairs Committee, said the Parnas messages “suggest a possible risk” to Yovanovitch’s security in Kyiv before she was recalled. “These threats occurred at the same time that the two men were also discussing President Trump’s efforts, through Rudy Giuliani, to smear the ambassador’s reputation,” Engel said. Engel referred to messages to Parnas from Robert F. Hyde, a Connecticut man, who claimed to be watching Yovanovitch. “She’s talked to three people. Her phone is off. Her computer is off,” Hyde allegedly texted to Parnas, adding that Yovanovitch was under heavy security. “We have a person inside,” another text message read. Another said: “guess you can do anything in Ukraine with money ... is what I was told.” Yovanovitch returned to Washington after being told in a late-night phone call to get on the next plane home for her own safety by the director general of the Foreign Service, according to witness testimony in the impeachment inquiry. The nature of any possible threat was not specified and remains unclear, although the Parnas documents suggest the surveillance was a prelude to some kind of action. Because the State Department has refused to respond substantively to questions about the Yovanovitch surveillance, it’s unclear whether the Bureau of Diplomatic Security or another law enforcement agency is looking into the matter. One official, who was not authorized to discuss the situation publicly and spoke on condition of anonymity, argued that the department had protected Yovanovitch by recalling her early from Kyiv. But the lack of clarity and the department’s stonewalling of congressional demands for documents related to her recall have prompted an outcry. “This has to be a first in American history,” said Nicolas Burns, a former career diplomat who rose to become the third-ranking official at the State Department before his retirement and is now a foreign policy adviser to Biden’s presidential campaign. “A foreign government rushing to the defense of a senior U.S. career ambassador to defend her from people deputized by the President of the United States,” Burns wrote on Twitter. “And the Secretary of State refuses to say one word in her defense.” Dana Smith, a former career diplomat who has been critical of the Trump administration, accused Pompeo of hypocrisy for staying mute about the possible threats to Yovanovitch after accusing the Obama administration and former Secretary of State Hillary Clinton of malfeasance in the deadly 2011 attack on U.S. diplomatic facilities in Benghazi, Libya. “A threat on a U.S. Ambassador that would be treated with the utmost urgency if it came from a foreign person,” she wrote in a tweet. “Where is Mr. Benghazi now?” The response is also in stark contrast to the quick and vocal protests that U.S. officials from Pompeo on down have registered about similar revelations elsewhere. As recently as this month, Pompeo and State Department spokeswoman Morgan Ortagus have publicly condemned Iranian-backed militia for besieging the U.S. Embassy in Baghdad and demanded that Iraqi authorities fulfill their obligations to protect U.S. facilities there. “Our first priority is the safety and security of U.S. personnel,” Pompeo said on Dec. 31. “The United States has acted quickly, prudently, and decisively, taking additional security measures to address threats to American diplomats and facilities in Baghdad.” Just last week, Ortagus used Twitter to denounce Iranian authorities for briefly detaining the British ambassador to Iran during anti-government protests in Tehran. “The Iranian regime arrested the British ambassador to Iran,” she said on Jan. 11. “This violates the Vienna Convention, which the regime has a notorious history of violating. We call on the regime to formally apologize to the U.K. for violating his rights and to respect the rights of all diplomats.” Potential violations of the Vienna Convention, the international treaty that governs diplomatic relations between states, was a reason cited by Ukrainian officials for opening their investigation. “The published messages contain facts of possible violations of Ukrainian law and of the Vienna Convention on diplomatic relations, which protect the rights of diplomats on the territory of another state,” Ukraine’s Interior Ministry said in a statement.
2024-03-30T01:26:18.401715
https://example.com/article/5468
Insights Preparing your business for Network Convergence Network convergence allows companies to use multiple forms of communication across a single network. The result is a truly streamlined experience that meets the needs of a Modern Workplace – and experience and agility that is not possible if companies are utilising multiple separate infrastructures. The benefits of network convergence include flexibility, reliability, and savings – but widespread deployment could be a few years off for most businesses. This, however, does not mean they cannot be ready for the change. The Transformation One of the primary drivers of change in the Modern Workplace is the internet. All networks, both now and in the future, are moving toward higher speeds of digital data delivery through high bandwidth networks to wireless distribution points. In simpler words – we’re using more data, and we’re using it faster than ever before in a far more mobile environment. And network convergence infrastructure needs to keep up. To do this, companies require three things: Power: This refers to the power behind access points and other edge devices. Power is essential, but many companies forget about it until after their network planning is complete. All businesses who plan to ensure the strength of their IT infrastructure now and in the future need to transform not just the Infrastructure itself – but the points that power it too. There is no point in creating a new system if it cannot be run effectively or efficiently. Backhaul: Backhaul is usually done through high-speed pair, microwave, or fibre links from radio locations. This allows for centralised equipment. However, new technologies are evolving and setting a new standard of decreased sensitivity and reduced data rates, while still improving centralised coordination and agility across networks. Site Acquisition: The third and one of the most important aspects of Network Convergence Infrastructure is site acquisition. A major part of any wireless network, site acquisition can be time and cost heavy. The effort should be about capacity, not coverage in a digital era so that company infrastructure can handle the amount of data moving across networks without fluxing or failing. The Convergence The convergence of networks is part of the natural evolution of digital technology. Companies expect it. They know it. We see it happening every single day. However, we also see many businesses who are taking on the trends of Digital Transformation without preparing their IT networks for the change. This is an error that could cost companies time and money that is better spent elsewhere. The fact of the current era is this – change is happening, and evolution in technology occurs fast. While many businesses may not yet be ready to adopt the full expanse of these changes, they are always able to get ready. The more prepared a company is, the more successful their adoption strategy will be. Business leaders need to strategise how they will evolve as a Future Workplace, and what they will do to ensure they stay ahead of the game. If you aren’t sure what Network Convergence looks like in your business, or whether your Infrastructure can handle the needs of a digitally driven era, contact MOQdigital today. Our team of experienced consultants can help you find a solution that meets the needs of your business – and its path to success.
2023-11-16T01:26:18.401715
https://example.com/article/7108