text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
openvpn - separate access keys for each host behind NAT
Although there's a wealth of resources on setting up VPN servers, all seem to cover a scenario where access is granted indiscriminately to a local IP or range of IP addresses. I would like to go one step further and grant remote access to each host in the LAN individually. That is to say, user / key X connects only to ip Y, wheres user / key Z connects to IP K and so forth. | 2023-08-07T01:26:19.665474 | https://example.com/article/9016 |
<?xml version="1.0" encoding="utf-8"?>
<!--
Temperature Humidity Sensor DX1HT-Z Rebranded Heiman
http://products.z-wavealliance.org/products/2321
-->
<Product xmlns='https://github.com/OpenZWave/open-zwave' Revision="2">
<!-- Association Groups -->
<CommandClass id="133">
<Associations num_groups="3">
<Group index="1" max_associations="1" label="LifeLine"/>
<Group index="2" max_associations="5" label="Multilevel sensor temperature"/>
<Group index="3" max_associations="5" label="Multilevel sensor humidity"/>
</Associations>
</CommandClass>
</Product>
| 2024-04-11T01:26:19.665474 | https://example.com/article/2978 |
Experimental and modelling investigation of monolayer development with clustering.
Standard differential equation-based models of collective cell behaviour, such as the logistic growth model, invoke a mean-field assumption which is equivalent to assuming that individuals within the population interact with each other in proportion to the average population density. Implementing such assumptions implies that the dynamics of the system are unaffected by spatial structure, such as the formation of patches or clusters within the population. Recent theoretical developments have introduced a class of models, known as moment dynamics models, which aim to account for the dynamics of individuals, pairs of individuals, triplets of individuals, and so on. Such models enable us to describe the dynamics of populations with clustering, however, little progress has been made with regard to applying moment dynamics models to experimental data. Here, we report new experimental results describing the formation of a monolayer of cells using two different cell types: 3T3 fibroblast cells and MDA MB 231 breast cancer cells. Our analysis indicates that the 3T3 fibroblast cells are relatively motile and we observe that the 3T3 fibroblast monolayer forms without clustering. Alternatively, the MDA MB 231 cells are less motile and we observe that the MDA MB 231 monolayer formation is associated with significant clustering. We calibrate a moment dynamics model and a standard mean-field model to both data sets. Our results indicate that the mean-field and moment dynamics models provide similar descriptions of the 3T3 fibroblast monolayer formation whereas these two models give very different predictions for the MDA MD 231 monolayer formation. These outcomes indicate that standard mean-field models of collective cell behaviour are not always appropriate and that care ought to be exercised when implementing such a model. | 2024-01-28T01:26:19.665474 | https://example.com/article/6240 |
I was looking today for a way to gracefully forward a POST request from one page to another in PHP. By “forwarding the request” I mean redirecting the user to another page on a different domain with all the POST data intact. I want to stress on the definition, because most people understand “use cURL to create a POST request from PHP”. Being on a different domain, it kind of rules out cookies and sessions.
The proper way to do it is by issuing a HTTP 307 – Temporary redirect header – which will instruct the browser to resend the data to the new URI, indicated by the Location field of the response.
PHP
1
2
header('HTTP/1.1 307 Temporary Redirect');
header('Location: new-location.php');
Just for the record, in pre-HTTP 1.1 browsers the POST data gets converted to GET, but if your users don’t use computers from the 90s, this won’t be a problem. And it works like a charm. In Chrome and Internet Explorer.
In Firefox and Opera, the browser will pop-up a dialog, informing the user that the data is being redirected to another page and asking the user’s permission to continue. Which is an extremely stupid standard behavior. Yes, it’s in the standard!
If the 307 status code is received in response to a request other than GET or HEAD, the user agent MUST NOT automatically redirect the request unless it can be confirmed by the user, since this might change the conditions under which the request was issued.
…straight from the HTTP’s status codes bible, RFC 2616. Why do I say it’s a stupid specification? Because it is! It makes no sense to pop-up a dialog that might confuse the user when the data was already sent. For example, if I’m a malevolent webmaster, I already have the user’s data, so at this point displaying the dialog box is useless. I can save the data in my database and have a cronjob connect to the new page or do whatever I please with the POSTed information. However, if the redirect is legitimate, displaying the message box might confuse the user and have him cancel the request, which might break the application’s logic.
Great work guys, I’m moments away from converting the POST data into GET and send it in the URL…
Nice one. I had no idea POST requests could be forwarded with just a simple header. It reminds me of an issue with Apache where you POST data to http://example.org/location, and Apache issues a 301 redirect to http://example.org/location/ (notice the final slash). Because it’s a 301 response, it drops all POST data. I’ve scratched my head a couple of time because of this.
By the way, it seems the RFC specifies the same behaviour for both 301 and 307 responses with POST requests, but Firefox only shows the confirmation dialog with 307 responses. | 2023-12-29T01:26:19.665474 | https://example.com/article/8334 |
[Cholecystectomy and colorectal cancer. Does cholecystectomy increase the risk of developing colon cancer?].
Within the course of the last ten years, a possible association between carcinoma of the colon and prior cholecystectomy has been discussed. In 342 patients with colorectal carcinoma, and in a control group of 182 patients with gastric carcinoma, the rate of prior cholecystectomy was investigated. The cholecystectomy rate in the case of colon carcinoma patients was 7.9, and thus differed non-significantly from that of the control group (5.5%). At least in our case material, no relationship was found between cholecystectomy and carcinoma of the colon. The results reported in other studies are compared and discussed. | 2024-01-28T01:26:19.665474 | https://example.com/article/8740 |
669 F.Supp. 472 (1987)
SUPERIOR WIRE, a Division of SUPERIOR PRODUCTS COMPANY, a Michigan Corporation, Plaintiff,
v.
The UNITED STATES, et al., Defendants.
Court No. 87-06-00750.
United States Court of International Trade.
August 21, 1987.
*473 Richard A. Kulics, Birmingham, Mich., for plaintiff.
Richard K. Willard, Asst. Atty. Gen., Washington, D.C., Joseph I. Liebman, Atty. in Charge, Inter. Trade Field Office, Civil Div., U.S. Dept. of Justice, John J. Mahon, New York City, for defendants.
OPINION
RESTANI, Judge:
Plaintiff, an importer of steel wire from Canada, challenges the denial of its protest against the exclusion of a shipment of wire made from wire rod produced in Spain.[1] The United States Customs Service (Customs) excluded the wire because it was not accompanied by certificates that would allow its entry under a voluntary restraint agreement (VRA) with Spain covering wire and wire rod.[2]
In connection with this action plaintiff sought a temporary restraining order and a preliminary injunction to allow it to continue importing. A temporary restraining order *474 was granted. The order was extended to the date of the preliminary injunction hearing conditioned upon the posting of bond. Following hearing on the preliminary injunction and the merits on July 27, 1987, defendant declined to consent to the continuation of any temporary relief. The court, finding that further posting of bond was not in the interest of either party, and finding no immediate irreparable harm, declined to continue the temporary restraining order. Further trial on the merits and on the motion for preliminary injunctive relief was held on August 11, 1987. The court denied preliminary relief.
FACTS
Plaintiff has been importing wire made from Spanish hot-rolled wire rod since late 1984. It obtains the finished cold-drawn wire from its related company, Big Point Steel Company, in Ontario, Canada. It is the operations of Big Point which are the main focus here.
The evidence discloses that plaintiff orders the wire rod from Spain for delivery to Canada. The rod arrives in coils of about 2,700 pounds each. The rod is uncoiled, and cleaned during passage through a mechanical descaling machine, which removes a hard oxide crust by reverse bending. The scale is formed during the rod-making process and must be removed to prevent damage to the wire-drawing equipment. The rod is then coated with a spray-on lubricant/rust preventative. The coils are joined by butt-welding, to facilitate feeding the dies, and because the end product is a 2,000 pound coil. Generally, the butt-welding process may also involve annealing across the joint so that the composition of the wire will be the same throughout. There was no testimony as to whether annealing took place at Big Point.
The operation crucial to resolution of this matter is the process which turns the wire rod into wire. In order to feed the machine which contains the dies that cold draw the rod into wire, the rod must be pointed and inserted into the machine. The rod is drawn through one, two and possibly, in a few cases, three dies. The testimony was contradictory as to whether one or two die passes were most commonly needed for the sizes of wire drawn by plaintiff, but plaintiff's witnesses seemed to have more familiarity with the process and the court accepts their testimony that two die passes are normally involved. Testimony also indicated that this process increases the tensile strength by thirty to forty percent as the rod is reduced in cross-sectional area by about thirty percent and is elongated. Other evidence indicated this degree of strength increase may be slightly high, but it is not greatly overstated. The final result is a substantially stronger product, which is also cleaner, smoother, "less springy," less ductile, and cross-sectionally more uniform.
Seventy percent of the wire imported by plaintiff is intended for use in making wire mesh for concrete sewer pipe reinforcement, which requires the strength of the finished wire. Twenty percent of the wire imported by plaintiff is sold as wire. The wire has about one dozen applications, such as shelving or decking and baskets used in the automotive industry. Wire rod has few uses except for making wire. Only a very small percentage of rod is used directly in concrete reinforcement.
The wire rod is of low carbon content. It is referred to as industrial quality or mesh quality rod. The rod is purchased by plaintiff for its affiliate from the Spanish producer in six sizes which range from 7/32 of an inch to 7/16 of an inch. The sizes of rod imported produce a range of sizes of wire, but the physical properties of the rod limit the range of sizes of wire which may be effectively or economically produced from a particular size of rod. It is also the chemical content of the rod and the cooling processes used in its manufacture which determine the properties that the wire will have after drawing.
Production of finished cold drawn wire from raw materials, such as scrap metal, involves several processes. The first step is to produce a steel billet. The particular process described at trial was that utilized *475 by a domestic wire rod producer.[3] There was no testimony indicating that the process used to produce the wire rod at issue was significantly different. The billet is a piece of steel about fifty feet long and five and one-eighth inches on each side, if measured cross-sectionally. Depending on the desired composition of the rod to be produced, a selection of different types of scrap are chosen. The scrap is melted in an electric furnace at 2700° Fahrenheit. The molten metal is refined by adding lime, oxygen, and possibly other additives to remove impurities. After the impurities are removed the steel is poured into a ladle and then into a tundish (a brick lined, steel container with holes). The steel then flows into a caster and the billets are formed. The testimony indicated that the scrap costs about one hundred dollars per ton, and at an efficient plant the making of a billet costs about the same.
The next step is the production of wire rod from billets. The billet is reheated to 2100° F. The rod mill described involves twenty-five separate rolling stages (stands) and two lines of billets can be processed at once. The first seven stands are called the roughing stage. The hot billets are passed through horizontal stands which gradually remove the corners of the billets to achieve a more cylindrical shape. The next four stands are also horizontal and are called the intermediate stage. The third stage also involves four stands but they are alternately horizontal and vertical. Finally, ten carbide rolls size down the rod into its final form. The process is computerized and moves at high speed so that water cooling is required to keep friction from raising the temperature above 2100°. The rod coils produced are then laid out with certain spacing depending on the rate of cooling needed. Air blowers can increase the cooling, and the use of hoods can decrease it.
The testimony indicated that the rolling mill cost between sixty and one hundred million dollars and a new mill would cost perhaps four times that amount. The testimony also indicated that much smaller operations are not economically feasible. The domestic producer's rolling operation involves one hundred and twenty-five employees and another sixty employees for quality control. The cost of producing one ton of rod from billet was placed at between forty and eighty dollars, depending on efficiency.
Testimony at trial indicates that a cold-drawing facility can be established for less than two hundred fifty thousand dollars. Plaintiff's operation seems within that range. A used drawing machine may be purchased for as little as thirty-five thousand dollars. Testimony indicated that three employees are needed to run a cold-drawing machine. Plaintiff operates its Canadian plant around the clock five days per week. Plaintiff's accountant stated that recent figures indicated that the cost of cold-drawing the wire from wire rod was about thirty-six dollars per ton. This figure has not been challenged seriously by defendant, and there was some evidence indicating that the figure is slightly understated if viewed in relation to a more general assessment of cost. In early 1987, the price of wire from Big Point to its affiliate was about two hundred eighty dollars per ton. Plaintiff paid two hundred thirty-five dollars per ton for the Spanish rod during the same period.
There seems to be agreement between the parties that the value added in terms of cost of the drawing process is about fifteen percent. During the relevant period domestic wire rod could be purchased for about three hundred dollars per ton. Also during this period, plaintiff sold wire at a substantially higher price to independent customers than it did internally.
Wire rod cannot be hot-rolled to a sufficiently round state to meet specifications of wire. To those in the steel and wire industries, wire rod and wire are different products. They are also classified differently for tariff purposes.
ARGUMENTS
Plaintiff raises two arguments. It asserts that the wire rod was substantially *476 transformed in Canada into wire so that the product it seeks to import is a product of Canada, not Spain, and therefore is not covered by a VRA. Plaintiff also asserts that Customs' action regarding the shipment at issue represented a change in position resulting in a restriction, which change may not take place without notice and opportunity for comment, pursuant to 19 C.F.R. § 177.10(c)(2) (1986).
Defendant argues that the operations performed in Canada were minor and that the court should consider the purpose of the VRA and find that the wire is a product of Spain not Canada. Defendant also argues that Customs did not take a "position" within the meaning of § 177.10(c)(2), and thus no opportunity for comment is required.
EXISTENCE OF A "POSITION"
Two opinions of this court have treated directly the issue of the existence of a position for purposes of § 177.10(c)(2). National Juice Products Ass'n v. United States, 10 CIT ____, 628 F.Supp. 978 (1986); Arbor Foods, Inc. v. United States, 9 CIT 119, 607 F.Supp. 1474 (1985). In National Juice the court found a "position" to exist, based on the existence of several rulings published in the Customs Bulletin that provided a factually explicit description of a Customs position of at least eight years standing. Arbor Foods reached the opposite result, finding that "a series of ruling letters, oral assurances from various Customs officials, and remissions of liquidated damages claims" did not constitute a position, where the exact merchandise was not covered by a ruling letter. 607 F.Supp. at 1478.[4]
The court finds the situation at hand more akin to that described in Arbor Foods than to that described in National Juice. Here there was one ruling letter, vaguely describing a wire-making process in Mexico and finding substantial transformation for purposes of the law relating to the Generalized System of Preferences (GSP). No. 553052 CW (Aug. 20, 1984). This letter ruling was only available to the public via microfiche, an indication that Customs did not consider the ruling letter to be of widespread applicability. Rulings of broad precedential value are generally published in the Customs Bulletin, as were those in National Juice. The letter ruling at issue is a "precedential" decision, which must be made otherwise "available for public inspection." 19 C.F.R. § 177.10(a). It need not be published in the Customs Bulletin.
Publication in the Customs Bulletin has dramatic effects in some areas. For example, rates of duty may not be raised beyond the rates published in the Customs Bulletin, without notice and opportunity for comment. 19 C.F.R. § 177.10(b) & (c)(1). Although 19 C.F.R. § 177.10(c)(2), regarding restrictions of imports, does not refer directly to publication of rulings in the Customs Bulletin, the court in National Juice found such publication important to its analysis of whether Customs had established a "position" that could not be revoked without notice under the terms of § 177.10(c). 628 F.Supp. at 994.
Plaintiff had the option of obtaining its own letter ruling, which would have given it the right to notice before a change. 19 C.F.R. § 177.9(c). Plaintiff did not avail itself of this mechanism but chose to rely on a cryptic letter directed to another. In sum, the letter ruling at issue was neither sufficiently descriptive to be broadly applied, nor was it clearly adopted as the position of Customs regarding merchandise of the type sought to be imported by plaintiff under the circumstances in which plaintiff sought to import it.
Plaintiff also cites the fact that the local Customs officials acquiesced in similar importations for more than two years, relying in part on the letter ruling. Such actions did not establish a "position" in Arbor Foods, and they do not suffice here. As no *477 "position" had been established for purposes of § 177.10(c)(2), defendant is free to exclude plaintiff's merchandise immediately, if the substantive law permits.
SUBSTANTIAL TRANSFORMATION
The basic issue before the court is whether the wire sought to be imported is a product of Spain or of Canada for purposes of enforcing the VRA. The parties agree that the court should make its determination on the basis of whether the wire rod imported from Spain is substantially transformed in Canada. This was the standard recently applied to such questions in Ferrostaal Metals Corp. v. United States, 11 CIT ____, 664 F.Supp. 535, Slip Op. 87-76 (June 26, 1987), in which the court found that Japanese export certificates need not be provided for cold-rolled steel sheet which was subjected to a hot-dip galvanizing process in New Zealand.
There is, however, a preliminary dispute as to whether the court may consider the purpose of the VRA in making its decision as to whether a substantial transformation occurred. In National Juice, 628 F.Supp. at 988-89 n. 14, the court indicated that as the concept of substantial transformation arises in several contexts under the customs laws, differing statutory language or purposes might vary the results in cases involving the issue of substantial transformation. At issue in that case was the country of origin of orange juice products for marking purposes. The court found cases discussing substantial transformation in the context of marking most directly applicable, although the court relied on cases applying similar standards in other areas. Similarly, in Torrington Co. v. United States, 764 F.2d 1563, 1571 (Fed. Cir.1985), the court indicated it was "keeping in mind the GSP's fundamental purpose of fostering industrialization in [beneficiary developing countries]...." in making a substantial transformation decision regarding the production of needles.
In this case there is no statutory language or legislative purpose which will directly guide the court. The Executive branch may negotiate voluntary restraint agreements. 19 U.S.C. §§ 2111-2213 (1982 & Supp. III 1985). The President may also enforce such agreements relating to steel products by requiring export licenses. Steel Import Stabilization Act, § 805, 19 U.S.C. § 2253 note (Supp. III 1985). Although § 803 of the Steel Import Stabilization Act indicates a Congressional desire that a specific market share be obtained by United States industry, a bilateral agreement involves more than the ultimate goals of the United States. The agreement, being the product of negotiation, contains terms balancing various interests. The court has no way of attributing an overriding purpose to the VRA at issue in a manner that can guide the court's decision here. The VRA has no terms which define the standards applicable to a determination of whether the product imported is the product of the signatory country so as to trigger the requirement of a certificate. Thus, to the extent it is possible, the court must seek a neutral standard, unaffected by specialized statutory purpose, to determine the country of origin of the merchandise at issue. Cf. Ferrostaal, 664 F.Supp. at 539 ("multiple standards in these cases would confuse importers and provide grounds for distinguishing useful precedents"); Cardinal Glove Co. v. United States, 4 CIT 41, 44 (1982) [Available on WESTLAW, DCT database] (language of bilateral textile agreement must be given construction consistent with language in tariff laws).
The court now turns to the fundamental question of whether under generally applicable precedent a substantial transformation of the wire rod from Spain occurs when it becomes wire, so as to make the wire a product of Canada, and thus not subject to VRA restrictions. The basic test cited by the parties was set forth in a drawback case, Anheuser-Busch Brewing Ass'n v. United States, 207 U.S. 556, 562, 28 S.Ct. 204, 206, 52 L.Ed. 336 (1908), which held that a product would be considered the manufacture or product of the United States if it was transformed into a new and different article "having a distinctive name, character or use." The test has been applied in various situations. Cases giving *478 rise to the most generally cited precedent are those involving country of origin for marking purposes, application of the GSP, and drawback. In addition, the parties have cited two import restriction cases which apply the same basic test. See Ferrostaal, 664 F.Supp. at 537; Cardinal Glove, 4 CIT at 45.[5]
Although all recent cases cite the Anheuser-Busch test, they apply it differently, and modify it somewhat. A name change, for example, is not always considered determinative. United States v. Int'l Paint Co., 35 CCPA 87, 93-94, C.A.D. 376 (1948). Therefore, although it is clear that a name change from "wire rod" to "wire" occurred here, this fact is not necessarily determinative. It may support, however, a finding of substantial transformation, as it did in Ferrostaal. Likewise the change in tariff classification which occurred here (see United States v. Kanthal Corp., 64 CCPA 89, 91, 554 F.2d 456, 457 (1977)) is not dispositive, although it also may be supportive. Belcrest Linens v. United States, 741 F.2d 1368, 1372-73 (1984).
In recent years the courts have concentrated on change in use or character, finding various subsidiary tests appropriate depending on the situation at hand. An inquiry that is sometimes treated as a type of cross-check or additional factor to be considered in substantial transformation cases is whether significant value is added or costs are incurred by the process at issue. See United States v. Murray, 621 F.2d 1163 (1st Cir.) (blending of glues added no significant value), cert. denied, 449 U.S. 837, 101 S.Ct. 112, 66 L.Ed.2d 44 (1980). In National Juice, values of between one and eight percent were not found to be significant. 628 F.Supp. at 990. In Uniroyal v. United States, 3 CIT 220, 223-24, 542 F.Supp. 1026, 1029 (1982) aff'd, 702 F.2d 1022 (Fed.Cir.1983) (addition of outer sole did not substantially transform shoe upper under marking laws), no percentage was specified, but the cost of the alleged transformation was deemed insignificant. 542 F.Supp. at 1029-30. In Ferrostaal, on the other hand, a value, attributable to the transformation of at least thirty-six to nearly fifty percent of the value of the heat treated steel, reinforced the court's conclusion that galvanizing and annealing steel constituted a substantial transformation. 664 F.Supp. at 540.
A value added test has appeal in many situations because it brings a common sense approach to a fundamental test that may not be easily applied to some products. The fifteen percent added value figure for the wire standing alone does not pull in either direction, but related concepts, including the amount of labor required to accomplish the change and the capital investment required relative to that required to produce the entire article, are also relevant to a determination of whether the change involves minor processing. Minimal processing is part of the factual background of cases such as Murray, National Juice and Uniroyal, all of which involve findings of no substantial transformation. The differences in capital investment and labor needed in the production of wire rod versus wire are enormous. Comparing only the production of wire from wire rod, versus the production of wire rod from billet, it becomes apparent that the processing performed in Canada is a minor finishing step which may be accomplished easily anywhere with a minimal amount of effort and investment.[6] By itself such analysis may not provide the entire answer as to whether a substantial transformation has taken place, but it should comprise part of *479 the analysis in a case involving the type of products and processes at issue here.
Turning to past precedent, the court observes that cases dealing with substantial transformations are very product specific and are often distinguishable on that basis, rather than by their statutory underpinnings. It is difficult to generalize from cases involving combinations of articles to those that involve processing of a single material. In addition, it is frequently difficult to take concepts applicable to products such as textiles and apply them to combinations of liquids or fabrication of steel articles. To determine whether the goods at hand are substantially transformed for purposes of VRA enforcement, the court should examine cases involving processing of metal objects without combination or assembly operations. Torrington Co. v. United States, 764 F.2d 1563 (1985) is one such case. As indicated, it involved the manufacture of needles in a beneficiary developing country. In the first stage of production of needles, a wire is straightened, cut, beveled, and drawn to form a needle blank. The blank is only useful in the needle-making process. In the next stage, an eye is struck into the needle, a groove is made for thread, and the needle is finished by various processes, including hardening, sharpening, and polishing. The Torrington court found that in order for plaintiff to prevail under the GSP statute, two substantial transformations were necessary; the court found both the first and second stages to be substantial transformations.
The second stage of processing discussed in the Torrington case involved a transformation from producers' to consumers' goods. The Torrington court cited with approval the case of Midwood Indus. v. United States, 64 Cust.Ct. 499, 313 F.Supp. 951 (1970), in which rough forgings of the approximate dimensions of the finished products were found to be substantially transformed after being cut, tapered or trimmed, beveled, bored, and subjected to other finishing processes in order to create pipe flanges and fittings. The producer to consumer goods distinction drawn in Midwood, a marking case, however, was found not determinative as to substantial transformation in shoe construction in another marking case, Uniroyal. Although some of the processes involved here are the same as those involved in the second phase of Torrington, there is no clear change from producers' to consumers' goods. Wire rod is primarily intended for wire production, which, in turn, is primarily intended to be used for making wire mesh for concrete pipe reinforcement.
The processes involved in the first stage of Torrington are closer to the ones involved here. In fact, the Torrington court cited in support of its holding a Treasury Decision involving use of dies to draw plate steel into a cup-shaped rear engine housing. See Torrington, 764 F.2d at 1569 (discussing T.D. 78-400, 12 Cust.B. & Dec. 875 (1978)). Two factors distinguish this aspect of Torrington from the case at hand. First, once the needle blanks were drawn they were fit for only one purpose; the raw material was then destined for one end use. This type of transformation does not occur when wire rod is drawn into wire. The composition of the wire rod determines what uses the wire may have. Although the steel and wire industries may have different names for the products, wire rod and wire may be viewed as different stages of the same product. The difference in stages may be important for tariff purposes but it is not determinative here. In contrast, the Torrington court stated, "the initial wire is a raw material and possesses nothing in its character which indicates either the swages [blanks] or the final product." Torrington at 1568. Here, the wire rod dictates the final form of the finished wire. Second, the court cannot escape the statutory basis of the Torrington opinion. Apart from direct references to the purpose of the GSP already mentioned, the court also noted, "... Torrington Portuguesa could do no more than it already does in the production of needles. In these circumstances we think Congress intended the GSP statute to apply." Id. at 1571.
The engine housing decision cited by Torrington also differs from the case at hand. Like the wire to needle blank change, the *480 product was transformed from basic steel into a part with a unique destiny. In addition, the decision noted the involvement of a series of dies. Essentially only two die passes are involved here. The wire emerges stronger and rounder after the passes, but the wire loses a few other advantages, such as greater ductility, in the process. It looks much the same. Its strength characteristic, which is important to its end use, is altered, but the parameters of the strength increase was metallurgically predetermined in the creation of the steel billet and very specifically through the fabrication of the wire rod. Under these circumstances the court does not find a significant change in use or character to have occurred.
The court should also mention here the Ferrostaal case. The hot-dipped galvanizing processes involved there, which involved substantial chemical changes, were different from the cold drawing processes involved here. Although, applying broader analytical concepts, the changes in use and character were not greatly different from those involved here, the value added was significant. It appears that a larger capital investment, as well as possibly significant labor, was required to accomplish the transformation in Ferrostaal. Taken together these differences are sufficient to distinguish Ferrostaal from the case at hand.
Here only the change in name test is clearly met, and such a change has rarely been dispositive. No transformation from producers' to consumers' goods took place; no change from a product suitable for many uses to one with more limited uses took place; no complicated or expensive processing occurred, and only relatively small value was added. Overall, the court views the transformation from wire rod to wire to be minor rather than substantial. Accordingly, the country of origin of the wire must be considered Spain rather than Canada.
Judgment is entered for defendant.
NOTES
[1] Despite the caption of the case, plaintiff is the corporate entity, Superior Products Company.
[2] Jurisdiction to determine the protestable issue is present under 28 U.S.C. § 1581(a) (1982). Plaintiff also alleges jurisdiction under § 1581(i)(3)(4) (1982). In Ferrostaal Metals Corp. v. United States, 11 CIT ___, 664 F.Supp. 535 (1987) the court found that in that case it was not proper to assume jurisdiction under § 1581(i) when jurisdiction under § 1581(a) was present to review a decision as to whether certificates were required by a VRA. Theoretically, it may be possible to assume jurisdiction under § 1581(a) as to protested entries and under § 1581(i) as to future entries. Jurisdiction under § 1581(i), however, is generally assumed in unusual situations, "such as when the relief available in an action brought under section 1581(a) would be manifestly inadequate or when necessary because of special circumstances to avoid extraordinary and unjustified delays caused by the exhaustion of administrative remedies." Ferrostaal, 664 F.Supp. at 537. Citing Lowa, Ltd. v. United States, 5 CIT 81, 561 F.Supp. 441 (1983), aff'd, 724 F.2d 121 (Fed.Cir. 1984). Thus, in cases where a party is able to pursue administrative remedies, such as those involving the denial of a protest challenging a substantial transformation decision, jurisdiction under § 1581(a) generally will be adequate. In addition to depriving Customs of the right and duty to consider the proper disposition of future entries, attempts to fashion declaratory and injunctive relief as to future entries present numerous problems. One cannot be sure that the future imports will be identical. Furthermore, the question arises as to what should be the scope or duration of the relief. Thus, except where equity demands it, relief should be limited to protested entries.
[3] The domestic rod producer filed an amicus brief which the court accepted.
[4] In Arbor Foods, the court went on to state that "Customs' establishment of a `position' would be along the same lines as that of an `established and uniform practice' under 19 U.S.C. § 1315(d) (1982)." 607 F.Supp. at 1478. The court does not read this to mean that a "position" is the same as an "established and uniform practice." Customs certainly could have used this term of art if that is what it meant by its regulation.
[5] Although Cardinal Glove purported to apply the "country of exportation" test to the merchandise at issue, it appears that the court's analysis also encompassed the factors outlined in Anheuser-Busch. The court's use of the term "country of exportation" in Cardinal Glove has been a source of controversy. See T.D. 82-169, 16 Cust.B. & Dec. 471 (1982); T.D. 84-171, 18 Cust.B. & Dec. 480 (1984). In the case at bar, the parties agree that the test set forth in Anheuser-Busch provides the proper legal standards.
[6] The court excludes from this comparison the requirements of producing billet from raw material. Because the wire rod is clearly a different product, which involves a substantial transformation from billet, the better approach would seem to be disregard of the earlier stage.
| 2024-05-28T01:26:19.665474 | https://example.com/article/7673 |
WASHINGTON — On Jan. 23, 1973, when the Supreme Court struck down laws criminalizing abortion in Roe v. Wade, President Richard M. Nixon made no public statement. But privately, newly released tapes reveal, he expressed ambivalence.
Nixon worried that greater access to abortions would foster “permissiveness,†and said that “it breaks the family.†But he also saw a need for abortion in some cases — like interracial pregnancies, he said.
“There are times when an abortion is necessary. I know that. When you have a black and a white,†he told an aide, before adding, “Or a rape.â€
BTW, this is why I’m in an interracial marriage. We’ll always have a choice… | 2023-09-03T01:26:19.665474 | https://example.com/article/8897 |
884 F.2d 575
U.S.v.Wells*
NO. 88-1998
United States Court of Appeals,Fifth Circuit.
AUG 25, 1989
1
Appeal From: W.D.Tex.
2
AFFIRMED.
*
Fed.R.App.P. 34(a); 5th Cir.R. 34.2
| 2024-03-31T01:26:19.665474 | https://example.com/article/8859 |
Herbal Medicine
Herbal medicine draws on a vast traditional knowledge that has come together to form a safe and modern therapeutic tool. Contemporary herbalists are able access a history spanning thousands of years of tried and tested natural medicines from Chinese, Ayurvedic, European, North American Indian and other native traditions. Many of today’s pharmaceutical medications have their origin in our herbal remedies; aspirin from willowbark is one such example. Herbal medicines may be prescribed alone or alongside other natural therapies. With a knowledge of herb / drug interactions they may also be used with orthodox prescriptions to enhance healing or to decrease the side effects of some medications. Jason and Ally use the highest quality herbal medicines (organic where possible) from leading Australian suppliers Mediherb , Herbal Extract Company and Optimal Rx . We stock a large herbal medicine dispensary of liquid herbal tinctures enabling us to individualise the herbal medicine mixtures we prescribe for our patients.
‘Planet Earth, what a beautiful & bounteous world to call home! The more we turn our attention towards the nature of our relationship with the environment, the more profound become the insights into the close embrace we share. Whether on the global scale of our effects upon climate and the climates effects upon us, or at the biochemical level of plants as medicines, the connections revealed are powerful and very real. Of the many ways in which our ecological inter-relatedness shows itself, the art and science of Herbal Medicine is for many people the most unexpected.
Above all else, Herbalism is the medicine of belonging, the direct experience of the whole healing the part. Our world blesses us with herbs, with leaves of life. In the face of blind abuse and rape of nature, we discover remedies that can help us survive the impact of humanity’s mistakes. To heal ourselves we must know ourselves, and all of ecology, spirituality, intuition and common sense tells us that we are all one. If our world is sick and poisoned then so are we. If the forests are being destroyed, then we die a little with each felling. Every whale that is respected and let live, blesses us. Each river cleaned and renewed, flows through our veins and renews us.
Humanity is being faced with the realities of a shared planet. This may take the form of a drought caused by the green house effect, pollution induced birth defects or the purgatory of human overpopulation. On the other hand it may be the dawning recognition that the intimate embrace of our world is a healing force moving humanity towards a transformation of our relationship with the earth, ourselves and each other.’ | 2024-07-11T01:26:19.665474 | https://example.com/article/9879 |
Wednesday, November 25, 2015
Today, I sat at a coffee shop on a cloudy afternoon and listened to people share their Thanksgiving plans. I went to the grocery store and bought cranberries and chicken and rosemary and chives. I fought the crowds for a parking spot with the best of 'em. I sat in the kitchen and watched my sister cut onions and make delicious food.
It's been three years since our last Thanksgiving in the United States. Two years since I ate snail soup on Thanksgiving. A year since I blogged that, "we won't always be so far away." And here we are, not so far away, in the States with people we love spending the holidays how we always have and how we likely always will.
There's comfort in familiarity and there's thrill in the foreign.
I'm lucky to have experienced both. What a gift.
Beyond the gift of travel, is the gift of healing. And Thanksgiving will forever be a reminder to me of the healing and growth and recovery that has taken days, week, months, and years. And so on the eve of a day that still haunts and torments many a person with anorexia and/or bulimia, I'd like to share a few thoughts on ways to support a person with an eating disorder, but also EVERYONE at the table. Because there is likely someone in your life that has an eating disorder you know nothing about AND there's always room for a little more compassion even for the other folk gathered around your table:
1. STOP asking people if they've lost/gained weight
What a boring a judgey question anyway. Certainly, we are far more interesting as human beings than numbers on a scale.
2. Talk about things other than food
And please-oh-please do not comment on how much or how little a person is eating. None of your damn business, that's what they're eating!
3. Stop rationalizing your food choices
No one really cares that you were "bad" and ate a muffin this morning. No one really cares that you were "good" and ran three miles this morning. Again, this only makes us all stupider as human beings.
4. Put your bathroom scale away
Better yet, throw it in the trash. Get rid of it for good. If you're overweight you'll know it because your clothes aren't fitting. Fixating on numbers is what contributes to eating disorders anyway. I can pinpoint precise moments at another person's home when I stepped on the scale and it set me back another few months. Not their fault. Just a nice gesture.
5. Don't use ED-specific language as a joke
You finding "binging" on pumpkin pie laughable only makes a person feel trivialized. And claiming that you couldn't be anorexic because you lack the willpower doesn't make anyone feel accomplished or proud.
6. Offer something to do before or after the meal
Sitting around in preparation of eating and in the after-math of eating is about the hardest time for a recovering person. Suggest a walk. Ask if they wanna play cards. Basically, anything is everything.
7. Don't make observations about what their eating
Likely if a person is trying to hide eating disordered behaviors they won't fulfill your curiosity to witness it anyway. So trust that the person is following a best-laid plan unless they ask specifically for your help.
Basically, leave this person's recovery to the experts. And please avoid body-shaming talk and conversation about fat and calories that often pervades so much of our culture as some kind of weird, national past-time.
We're all getting better, people. Every day. We're all learning how to love each other better. | 2023-08-11T01:26:19.665474 | https://example.com/article/3671 |
using log4net.Layout;
namespace Log4Mongo
{
public class MongoAppenderFileld
{
public string Name { get; set; }
public IRawLayout Layout { get; set; }
}
} | 2024-03-05T01:26:19.665474 | https://example.com/article/6149 |
14 July 2006
Matins in the Dark
I have these silly nights. I just am not tired and can't sleep. Tonight was one of them. What I have taken to doing when they occur is praying some of the Church's prayer offices during these hours. Tonight it was Compline, Matins, and then the Litany. Matins in the dark - there is something about it that fills a heart with peace. Knowing that you are joining the Church in looking for the coming of the Lord, praying for it, and welcoming it. Truly "the night is ending and the day is at hand!" "A light to those who sit in darkness and the shadow of death" indeed!
Pr. Weedon,There are several times that I am afflicted in the night with anxieties and fears. I believe this is when the old evil foe loves to do his work and has the most success at piercing our hearts with his flaming darts. I keep prayer beads by the bed for times such as this. I great comfort to physically and mentally divert the attacks. | 2023-09-23T01:26:19.665474 | https://example.com/article/4700 |
Q:
Is it "fewer than one person" or "less than one person"?
I have been under the impression that the distinction between fewer and less was with countable vs. uncountable nouns. But I've just encountered the claim that it's plural vs. singular. Which is it? Or is this one of those ambiguous cases?
A:
The "rule" is that it's a matter of count vs. mass.
The question is whether it's a really a rule at all. It seems to have started with Robert Baker in 1770, who expressed it clearly as a preference rather than a rule. It didn't become a rule until some time after.
On the one hand, this is a good argument to just use either, as you see fit.
On the other, there are cases where less is ambiguous and fewer is not. "Less people" isn't ambiguous, but "less excellent people" is, if you mean that the number of people was less, but their excellence just as high.
There being a "rule" that many don't follow, is enough in itself to make fewer more formal and less less so, in those circumstances where you could use either.
It's hence probably advisable to favour fewer in formal writing. Whether you always do so or use whichever sounds better to you in other cases, will be a matter of opinion, without hope for consensus.
"Fewer than one person" and "less than one person" both sound strange though, when nobody is probably going to serve better than either.
| 2023-08-02T01:26:19.665474 | https://example.com/article/9965 |
Police and health professionals have warned that a growing number of female circumcisions are being carried out in Britain even though the practice is illegal.
Experts estimate that between 500 and 2,000 UK girls face genital mutilation this summer, when they can be "cut" during the school break without anyone questioning their absence. Female genital mutilation involves the cutting off of girls' external genitalia, including the clitoris. Some 63,000 women in the UK have suffered genital mutilation and 20,000 girls are at risk.
The practice was outlawed in Britain in 1985 and taking children out of the country to have it performed was made illegal in 2003.
But the Observer has been told there is evidence it continues unabated among communities with links to African, Arab and Asian countries, and "cutting parties" are going on behind closed doors in Britain.
Jackie Mathers, a child protection nurse at NHS Bristol, told the Observer: "We have had intelligence that with the credit crunch, cutters are being paid to come over here and do children in a large number as it's cheaper than families taking flights to other countries."
One police source said he had heard of a girl as young as four weeks being subjected to genital mutilation and that there was a desperate desire to get a conviction. Frustration at the lack of action here is compounded by successful prosecutions abroad. The Observer has been told of two older women working as cutters in London. | 2024-02-11T01:26:19.665474 | https://example.com/article/8846 |
Problems associated with the use of pit latrines in Blantyre, Republic of Malawi.
A questionnaire and observational study was conducted to determine the problems associated with construction, design and hygiene methods used to maintain pit latrines in a high-density urban township in Malawi. The survey comprised 100 randomly selected households and the person responsible for the latrine maintenance was interviewed. Eighty-seven percent of householders used traditional latrines, 67% with earthen and 20% with concrete (i.e. sanitation platform, also known as San-plats) floors. A variety of makeshift squat-hole covers (e.g. iron sheets, rocks, cardboard) are used by those who cannot afford San-plats to reduce fly and odour problems. Most squat-hole covers were fouled with faecal matter and some presented risk of invasive injury due to sharp edges. Five households used ventilated improved latrines whilst the remaining eight per cent made use of their neighbour's latrine. Ownership of property, poverty and theft in the area significantly influenced the type and structural condition of the latrine. Walls, ceilings and doors of the superstructure comprised a mixture of miscellaneous materials (i.e. cardboard, paper, cloth, brick) making the hygienic upkeep of the latrine difficult. Cloth doors were often used for hand drying. Geographical location, such as rocky terrain with inadequate soil consolidation, and environmental conditions, such as heavy rains and floods, exacerbate structural defects. Coupled with the lack of attention afforded to the disposal of young children's faeces, wash-water and pit surcharging, the potential exists for widespread contamination of the surrounding environment and transmission of faecal-oral disease. More than half of the respondents stressed that they had not received any information regarding health education and hygienic maintenance of the latrine. As such, there is need for a hygiene education programme to promote awareness of appropriate sanitation and behavioural change. Cultural and religious factors were found not to influence latrine use. | 2024-01-27T01:26:19.665474 | https://example.com/article/2158 |
Tuesday, November 10, 2009
The term Potluck dates back to the 16th century, it roughly translates into "food that is given away." This form of hospitality was a common practice, when poor travelers would wander from place to place. Tavern owner would offer them a "potluck." This meal often consisted of whatever was leftover from the night before, and combined into a stew. Not very appetizing, but satisfying none the less.
This translated well and was adopted by many churches. It's a core belief to share what you have with others, helping one another bring a group closer together. It also make economic sense. No one person has to bear the burden of feeding everyone when the cost is spread out amongst a group.
In our recent past, overindulgence and excess were the norm, with no one really worrying about the consequences. Now we know better. We are facing a reality that includes everyone having to do more with less. Less money, less resources, less time, less everything. It makes sense to explore other alternatives to better our every day lives.
Becoming more efficient and less wasteful is a perfect way to start. When most people plan to have a large party there is normally a lot of wasted food because guest's normally bring something with them. But that food normally goes to waste, or is eaten by the host days later (which isn't such a good thing, but that's another story.) Why not direct that money towards things you know you need for your party. That way the effort your guest's put forth isn't a wasted one.
Your the only one who knows how many guest's your having. Plan out your meal accordingly and use potluckpro.com to post your menu online. Your guest's can choose item's from it and bring them to your party. It's time to start thinking smarter and living "smaller" by using today's technology's to help us preserve the resources we have to live a better life! | 2024-05-30T01:26:19.665474 | https://example.com/article/8327 |
Subtitles The Red Squirrel
Overview
ota is about to commit suicide. As he fighting against himself, trying to jump off a bridge, a girl riding a motorcycle falls off the bridge. He runs to help her, and goes with her to the hospital. She has forgotten even what her name is, and he invents her life. He makes up a name for her and tells her and the doctors that they live together as a couple for four years. The lie goes on for a while.. | 2023-08-01T01:26:19.665474 | https://example.com/article/7606 |
Recently, an increase in theft and overall concerns of personal security have drawn into question the wisdom of relying on non-locking mailboxes for curbside mail delivery. Mail delivered by a postal carrier is often left unguarded for hours or even days at a time. Valuable correspondence, such as bank statements, negotiable instruments, and credit cards, are placed at risk of being stolen, particularly in light of a rising trend in identity theft.
Providing a locking mechanism on mailboxes provides a partial solution. A lock ensures mail is securely stored and access is limited. However, a locking mechanism is only effective provided that the entire mailbox is not stolen, such as where a thief, out of desperation or expediency, removes the entire mailbox assembly by jimmying or breaking the mailbox from the mounting. Moreover, the awkward shape and limited space afforded by the interior of a mailbox makes the use of robust concealed fasteners difficult. Similarly, one-way screws can make removal difficult, should servicing be later required.
For example, U.S. Pat. No. 6,722,561, issued Apr. 20, 2004 to Tomas et al., discloses a locking mailbox with a vertically-oriented housing. The mailbox is preferably constructed from durable plastic and can be directly mounted onto a mounting post. Post fasteners accessible through the interior vertically attach the mailbox to a post, but the mailbox is oddly shaped and incompatible with widely used horizontal mounting surfaces.
U.S. Pat. No. 6,474,543, issued Nov. 5, 2002 to Grell, discloses a mailbox that defines an arcuate chamber. Decorative articles or liquids can be placed within the chamber. The mailbox is removably attached to a support post using a rectangular base plate that is slidably couples to a horizontal mounting bracket. A tab snappably engages the bracket when the mailbox is properly seated and can be further secured with a padlock. However, the base plate is a structure separate from the mailbox and exposes the bracket to compromise and breakage.
U.S. Pat. No. 5,664,748, issued Sep. 9, 1997 to Speece et al., discloses a universal mounting base for securing multiple sizes of mailboxes to a variety of post mounting configurations. Oppositely disposed sidewalls define extended mounting flanges with a recessed bottom facing inwardly. A molded mounting bracket provides multiple support parts and arm engagement areas. In addition, the mounting flanges have apertures to facilitate mounting using exposed fasteners, which are susceptible to breakage and compromise.
U.S. Pat. No. 5,386,938, issued Feb. 7, 1995 to West, discloses a mailbox post mounting with a frame for securing a mailbox on an upright square or rectangular post. A pair of parallel brackets receives the ends of a pair of bars that are mounted at right angles to form a rectangular frame. Each bar includes holes for fastening the mount to a post. The brackets include apertures for mounting the mailbox. The complete mounting is formed of four separate non-integral parts susceptible to breakage and exposure.
U.S. Pat. No. 5,337,954, issued Aug. 16, 1994 to Kobilarcik et al., discloses a mailbox mounting bracket. The bracket includes spaced flanges depending from ribbed members formed on the bottom surface of the bracket to permit mounting onto a stanchion. Lugged members provided on the sidewalls of the bracket are received in apertures in the flanges depending from the bottom wall of the mailbox. The mounting bracket is non-integral and leaves fasteners exposed and susceptible to compromise.
U.S. Pat. No. 2,552,915, issued May 15, 1951 to Zachrich, discloses a rural mailbox supporting bracket, which includes a base plate, a pair of bracket members, and two pairs of post clamps. The base plate is substantially oblong with opposite side portions bent downwardly to form lateral flanges disposed to be fit within the post clamps. The mailbox is secured to the supporting bracket by outwardly disposed fasteners that are susceptible to breakage and theft.
Therefore, there is a need for a secure mounting that provides unencumbered access to mounting hardware, yet can become a unitary part of a mailbox without sacrificing ease of removal or maintenance. | 2023-12-28T01:26:19.665474 | https://example.com/article/6906 |
Q:
Opening an .htaccess file in Eclipse opens a new instance of Eclipse
I'm unable to open any .htaccess file in Eclipse while Eclipse is open without causing Eclipse to open a new instance of Eclipse. If I drag the file from my folder to Eclipse it triggers a new instance to open. For all other files, the existing instance of Eclipse would simply open the file.
Windows 7
Eclipse PDT 2.1 SR-2
Any ideas?
A:
My guess is that you've set up Eclipse to use the OS-defined editor to open it, and then told Windows to use Eclipse?
To be sure: right-click the file in Windows and see what "Open with" gives you.
To fix it: change the file association in Preferences » General » Editors » File Associations, to make Eclipse use some built-in editor. (Or, if that doesn't work: right-click the file in the Eclipse Navigator, and ensure that Open With does not have System Editor selected.)
| 2023-12-31T01:26:19.665474 | https://example.com/article/6517 |
Q:
jquery changes quotation mark to " after string injection in MVC
I'm making some tooltip customization of DevExtreeme chart and I want to inject the string into js code in MVC project:
.Tooltip(t => t
.Enabled(true)
.Location(Model.Tooltip.Location)
.CustomizeTooltip(@<text>
function(arg) {
return {
text: @Model.Tooltip.Text
};
}
</text>)
)
The string looks like this:
Text = "arg.seriesName + \" years: \" + arg.valueText"
but on the output it is:
text: arg.seriesName +" years: " + arg.valueText
How to fix that? (& didn't help)
Thanks for your help
A:
I have all the information which define the chart in the model. Here is the solution how it should be implemented:
Tooltip = new TooltipDataPackage
{
Enabled = true,
Location = ChartTooltipLocation.Edge,
Text = (item) =>
{
var func = "function(arg) {";
func += "return {";
func += "text: arg.seriesName + \" wiek: \" + arg.valueText";
func += "};";
func += "}";
return MvcHtmlString.Create(func);
}
},
The object TooltipDataPackage code is defined as follows:
public class TooltipDataPackage
{
public bool Enabled { get; set; }
public RazorBlock Text { get; set; }
public ChartTooltipLocation Location { get; set; }
}
| 2024-07-07T01:26:19.665474 | https://example.com/article/9238 |
Image credit: Ray Styles
Which character should be added to the Super Smash Bros. Wii U/3DS roster next? That's the question Nintendo posed to fans yesterday when it launched a new voting portal. Microsoft's Xbox boss Phil Spencer has now weighed in, saying he'd like to see Banjo the honey bear from Rare's iconic platformer series.
Not only does Spencer think it "would be cool" if Banjo was added to the lineup, but Microsoft and Nintendo have worked together before, so it's unlikely there would be licensing issues.
@PedroDarkinson I think it would be cool if Banjo was in the next SSB DLC. We've worked with Nintendo on Rare IP before, no issues. — Phil Spencer (@XboxP3) April 3, 2015
Twitter user Ray Styles has already put together a mock-up Smash Bros. poster for Banjo (and Kazooie). Spencer didn't say if he'd also want Kazooie to appear in the new Smash Bros. game. The two characters have vastly different attributes, after all.
Nintendo's Smash Bros. character voting poll closes in October 2015, so--even if Banjo does make it into the game--you won't get to play the character for quite a while.
New DLC characters are coming to Super Smash Bros. for Wii U and 3DS much sooner, however. During this week's Nintendo Direct broadcast, the company announced that Mewtwo will be available starting April 15. Beyond that, Nintendo will release another new character--Lucas--in June, though pricing has not yet been announced. | 2024-05-28T01:26:19.665474 | https://example.com/article/1484 |
**Delivery date is approximate and not guaranteed. Estimates include processing and shipping times, and are only available in US (excluding APO/FPO and PO Box addresses). Final shipping costs are available at checkout.
Warranty
Included: 1 year Manufacturer
Notifications
Receive product notifications for this item, and also receive other email-exclusive savings.
The digital images we display have the most accurate color possible. However, due to differences in computer monitors, we cannot be responsible for variations in color between the actual product and your screen.
Thanks for your question. The down alternative used in this program is a slick polyester fiber. It has a similar feel to down but a much better price point. The term "down alternative" is widely, an inaccurately, used to describe many things. Sometimes its just a plain polyester fill. This fill is exceptional and is truly a down alternative fiber. It is a .9denier (microfiber) which means it is very fine and its a slick fiber which means that it has a silky soft hand to it. These are fantastic pillows - you should definitely give them a try!
Shopping Tips & Inspiration
Best Things to Consider When Buying a Pillow
If you've been waking up with a sore neck and shoulders, it might be time to replace your pillows. Consider your sleeping position, desired pillow firmness, pillow size, and filling type to help you buy the right pillow for maximum comfort.
Best Pillows to Stop Snoring
Having a snoring problem may be no more than a mild irritation at first, but when it begins to affect you or your partner's quality of sleep, it's time to do something about it. Check out these best pillows to reduce snoring.
How to Know When to Replace a Pillow
A pillow that is worn out can leave you feeling tired too, so it's helpful to know when it should be replaced. If you're wondering how well your pillow is holding up, try these simple tricks to see if it's time for a replacement.
FAQs about Bed Pillow Firmness
If you often find yourself tossing and turning at night, it may be time to check and see if you and your pillow are compatible. Shop and save money on the best bedding at Overstock.com
Best Pillows for Every Kind of Sleep
Best Pillows for Every Kind of Sleep from Overstock.com. Our guides provide customers with information about the best pillows for every kind of sleep.
How to Freshen Bed Pillows
How to Freshen Bed Pillows from Overstock.com. The slightly gross truth? Your pillows aren't as clean as you think. Here's how to take care of that.
How to Maintain a Body Pillow
How to Maintain a Body Pillow from Overstock.com. Our guides provide customers with information about how to maintain a body pillow.
Everything You Need to Know When Buying a Wedge Pillow
Everything You Need to Know When Buying a Wedge Pillow from Overstock.com. Our guides provide customers with everything you need to know about buying a wedge pillow.
Types of Pillows
Types of Pillows from Overstock.com. Our guides provide customers with information about the different types of pillows.
Best Pillows for Reading in Bed
Best Pillows for Reading in Bed from Overstock.com. Our guides provide customers with information about the best pillows for reading in bed.
Standard Return Policy:
Items must be returned in new or unused condition and contain all original materials included with the shipment. For the return policy on a Marketplace item, please refer to the Seller’s individual policy, located on the product page by clicking on the Seller name. More
Details
FINAL SALE EXCLUSION: Items marked as FINAL SALE are not
returnable unless the problem you experience is the result of our error.
For your protection, all orders are screened for security purposes. If your order is selected for review, our Loss Prevention Team may contact you by phone or email. There may be a two business day delay to process your order.
** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be
delivered.
Shop Overstock.com and find the best online deals on everything for your home. We work every day to bring you discounts on new products across our entire store. Whether you're looking for memorable gifts or everyday essentials, you can buy them here for less.
Eziba ® | Shop Eziba.com ®
O.com®
Over half a million prices checked each week. Overstock.com strives to deliver the lowest prices and the biggest savings on all the products you need for your home. | 2024-02-01T01:26:19.665474 | https://example.com/article/8089 |
#include "DBProxyOp.h"
using namespace WONAPI;
///////////////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
DBProxyOp::DBProxyOp(ServerContext* theContextP)
: ServerRequestOp(theContextP),
mMessageType(0),
mMessageReplyType(0),
mSubMessageType(0),
mSubMessageReplyType(0),
mReplyErrorString("")
{
}
///////////////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
DBProxyOp::DBProxyOp(const IPAddr& theAddr)
: ServerRequestOp(theAddr),
mMessageType(0),
mMessageReplyType(0),
mSubMessageType(0),
mSubMessageReplyType(0),
mReplyErrorString("")
{
}
///////////////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
WONStatus DBProxyOp::GetNextRequest()
{
WriteBuffer aWriteBuf(mLengthFieldSize);
aWriteBuf.AppendByte(5);
aWriteBuf.AppendShort(14);
aWriteBuf.AppendShort(mMessageType);
aWriteBuf.AppendShort(mSubMessageType);
aWriteBuf.AppendBuffer(mRequestData);
mRequest = aWriteBuf.ToByteBuffer();
return WS_ServerReq_Recv;
}
///////////////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
WONStatus DBProxyOp::CheckResponse()
{
ReadBuffer aReadBuffer(mResponse->data(), mResponse->length());
unsigned char aHeaderType = aReadBuffer.ReadByte();
unsigned short aServiceType = aReadBuffer.ReadShort();
mMessageReplyType = aReadBuffer.ReadShort();
mSubMessageReplyType = aReadBuffer.ReadShort();
WONStatus aStatus = (WONStatus)aReadBuffer.ReadShort();
aReadBuffer.ReadString(mReplyErrorString);
unsigned char aSequence = aReadBuffer.ReadByte();
// Is this a valid response?
if (aHeaderType != 5 || aServiceType != 14)
return InvalidReplyHeader();
// Copy over the data buffer
if (aReadBuffer.HasMoreBytes())
mReceivedData.AppendBytes(aReadBuffer.data()+aReadBuffer.pos(), aReadBuffer.length() - aReadBuffer.pos());
// Do we expect any more messages from the server?
if (aSequence & 0x80)
{
mReplyData = mReceivedData.ToByteBuffer();
return aStatus;
}
else
return WS_ServerReq_Recv;
}
///////////////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////////////
void DBProxyOp::Reset()
{
// Clear all received data
//mReplyData->Release();
ServerRequestOp::Reset();
}
| 2023-09-12T01:26:19.665474 | https://example.com/article/2966 |
Free App: A Space Shooter for Free for Android
Another freebie for you and it’s got a catchy title: “A Space Shooter for Free” Go get it now for your Android phones and let me know how you like it!
Combining retro-style, shoot em’ up game play, high-resolution graphics, and intuitive touch screen controls, A Space Shooter for Freeprovides hours of alien-blasting entertainment. For those craving even more intense boss fights and devastating ship upgrades, a 99 cent upgrade to the Big ASS version is available, in-app to unlock more weapons, power-ups, and bosses.
A Space Shooter for Free players can expect:
? Battling hundreds of enemies across two galaxies ? Fast-paced, retro gaming action with incredible detail ? Destroying bosses to collect their sweet secret weapons and upgrades ? Two Ways to Play: A campaign-based Story mode and a skill-testing Survival mode ? More than 40 upgrades and power-ups ? A Big ASS version, unlocking even more weapons and power-ups for 99 cents | 2024-06-27T01:26:19.665474 | https://example.com/article/1290 |
Pakistan may be placed on the “grey-list” of FATF during its crucial six-day meeting which began today (Sunday) in the French capital.
Pakistani delegation, comprising on along with officials of the financial monitoring unit, will apprise the meeting of steps taken by Pakistan to stem money laundering and terror financing, and put up a robust case on not placing its name on the "grey list".
The decision to place Pakistan on the global money-laundering watchdog’s grey list was made during a FATF plenary meeting in February this year.
Amid increasing global pressure to move decisively against proscribed organisations, Pakistan reviewed its new draft action plan for submission to global bodies working on curbing money laundering and terror financing. The action plan was reviewed just two days before the filing of comments to the observations raised by the Asia Pacific Group (APG) on money laundering.
The APG and the Financial Action Task Force’s (FATF) recommendations to curb money laundering and terror-financing were first discussed in a federal cabinet meeting. The proposed action plan was then reviewed in a meeting chaired by Dr Akhtar. | 2023-11-12T01:26:19.665474 | https://example.com/article/8130 |
President Barack Obama sits on the famed Rosa Parks bus at the Henry Ford Museum following an event in Dearborn, Mich., April 18, 2012 (Photo by Pete Souza)
This will be a beautiful day……
Washington Post: President Obama will head to the Capitol next week for the dedication of a new statue honoring civil rights icon Rosa Parks, a White House official confirmed Wednesday.
The statue – which will be the first of an African American woman to be placed in the Capitol — will be unveiled next Wednesday at 11 a.m. in Statuary Hall, the exhibition space that sits just south of the Capitol Rotunda.
Vice President Joe Biden receives a bracelet from Paige Baitinger, wife of fallen St. Petersburg, Fla., police Sgt. Thomas Baitinger, following a Medal of Valor ceremony in the South Court Auditorium of the Eisenhower Executive Office Building, Feb. 20, 2013. The Vice President and Attorney General Eric Holder presented 18 recipients with the Medal of Valor, which is awarded to public safety officers who have exhibited exceptional courage, regardless of personal safety, in the attempt to save or protect others from harm. Baitinger accepted the award on behalf of her husband who was killed in the line of duty in 2011. (Official White House Photo by David Lienemann)
****
Secretary of State John Kerry made his first public remarks regarding U.S. foreign policy and diplomacy Wednesday to students and faculty at the University of Virginia – see the speech here
****
BobCesca.com: Obamacare is Working …. Projections for Medicare spending between 2011 and 2020 have fallen by $500 billion.
…. The Affordable Care Act is bringing down the cost of healthcare by challenging a culture of waste, not by throwing momma from the train.
Hopefully, the full interview will be on Rachael Ray’s site soon – meanwhile, here’s a clip:
****
WH.gov: First Lady Michelle Obama to Embark on National Tour Celebrating Third Anniversary of Let’s Move!
On February 27, 2013, First Lady Michelle Obama will kick off a two day nation-wide tour celebrating the third anniversary of Let’s Move!, her initiative to ensure that all our children grow up healthy and reach their full potential. The tour will showcase progress and announce new ways the country is coming together around the health of our children. Mrs. Obama will also travel to New York City this week to talk about the third anniversary of Let’s Move! on Late Night with Jimmy Fallon, Good Morning America and The Dr. Oz Show.
Steve Benen: …… John Boehner has a 900-word op-ed in the Wall Street Journal … devoted almost entirely to a desperate attempt to avoid blame …. Reading this breathtakingly dishonest op-ed, I can’t help but wonder about the House Speaker’s frame of mind. Either Boehner actually believes the transparent nonsense he wrote, which would mean the Speaker is alarmingly ignorant about the basics of current events, he’s deliberately trying to deceive the public, counting on Americans to be foolish enough to buy demonstrable falsehoods.
Either way, Boehner’s mendacious piece is a profound disappointment, and beneath the dignity of his office. If the Speaker is still capable of shame, he should be embarrassed to peddle such nonsense.
Bloomberg: President Barack Obama enters the latest budget showdown with Congress with his highest job- approval rating in three years and public support for his economic message, while his Republican opponents’ popularity stands at a record low.
Fifty-five percent of Americans approve of Obama’s performance in office, his strongest level of support since September 2009, according to a Bloomberg National poll conducted Feb. 15-18. Only 35 percent of the country has a favorable view of the Republican Party, the lowest rating in a survey that began in September 2009. The party’s brand slipped six percentage points in the last six months, the poll shows.
ThinkProgress: Florida Gov. Rick Scott (R), a former hospital CEO and ardent Obamacare critic, announced at a press conference Wednesday evening that he will accept Obamacare funding in order to expand his state’s Medicaid program for low-income Americans. The move comes after Scott secured a waiver to privatize the public insurance program.
The decision represents a marked departure from Scott’s previously held stance. Scott didn’t just initially oppose taking part in the expansion — which the Supreme Court ruled to be optional last summer — he knowingly cited wildly inaccurate figures to inflate the program’s cost to the state by 2500 percent in an effort to discredit it. He eventually dropped his estimate for the expansion by $23 billion in the face of intense media scrutiny…..
Not being, well, a drones ‘fan’ (is anyone??), I’m half reluctant to post this – one civilian death is too many. But, still, an interesting take on the issue:
William Saletan (Slate): In Defense of Drones – They’re the worst form of war, except for all the others.
“UN: Drones killed more Afghan civilians in 2012,” says the Associated Press headline. The article begins: “The number of U.S. drone strikes in Afghanistan jumped 72 percent in 2012, killing at least 16 civilians in a sharp increase from the previous year.” The message seems clear: More Afghans are dying, because drones kill civilians.
Wrong. Drones kill fewer civilians, as a percentage of total fatalities, than any other military weapon. They’re the worst form of warfare in the history of the world, except for all the others.
Start with that U.N. report. Afghan civilian casualties caused by the United States and its allies didn’t go up last year. They fell 46 percent. Specifically, civilian casualties from “aerial attacks” fell 42 percent….
Columbus Dispatch: President Barack Obama will deliver the commencement address at Ohio State University’s graduation ceremonies this year, the White House announced today.
The trip is his first scheduled trip to Ohio since he stopped in Columbus with singer Bruce Springsteen and rapper Jay-Z.
Commencement ceremonies are scheduled for noon on Sunday, May 5 at Ohio Stadium. This will be the largest class in university history and the first spring graduation on the semester system. About 12,000 students are expected to graduate that day.
AP: The Obama administration is quietly considering urging the Supreme Court to overturn California’s ban on gay marriage, a step that would mark a political victory for advocates of same-sex unions and a deepening commitment by President Barack Obama to rights for gay couples.
Obama raised expectations among opponents of the Proposition 8 ban when he declared in last month’s inaugural address that gays and lesbians must be “treated like anyone else under the law.” The administration has until Feb. 28 to intervene in the case by filing a “friend of the court” brief.
Steve Benen: With just 10 days to go before brutal sequestration cuts kick in, President Obama has decided to use his bully pulpit, not just to frame the debate and show the way out of this latest manufactured crisis, but also to make his opponents look reckless and irresponsible …. The president had a fairly compelling pitch to present, which had the added benefit of being true….
…. For those who care about reality, the sequester really wasn’t Obama’s idea – it was part of the ransom paid to Republicans when GOP lawmakers held the nation hostage in 2011, threatening to crash the economy and trash the full faith and credit of the United States. Republicans took credit for the sequester and they voted for the sequester.
But as a practical matter, it doesn’t matter whose idea it was. There’s a looming threat to the nation and it kicks in next week. One side is focused on resolving the manufactured crisis with a bipartisan compromise; the other side is focused on how to win a public-relations battle, instead of focusing on fixing the problem they helped create…..
Bloomberg: In the spring of 1986, a grassroots organizer named Barack Obama was walking through a trash-strewn playground on Chicago’s South Side when the sound of gunshots pierced the air.
Obama ducked and glanced nervously at John Owens, an activist working for a local nonprofit, who was giving him a tour of the neighborhood’s parks. “He said: ‘You hear that? Whoa’,” Owens, recalled. “I remember thinking, ‘Well, he hasn’t been around here very long’.”
The president’s three-year stretch as a community organizer in an impoverished section of Chicago gave him a first-hand look at how gun violence affects a community. He’s now drawing upon that experience, and the solutions he saw then, as he crafts a second-term agenda in which gun control finally has political momentum after the Dec. 14 shootings at a Connecticut school…..
ThinkProgress: The Supreme Court’s election-buying decision in Citizens United v FEC enabled wealthy corporations to spend unlimited money to change the course of American elections, and a subsequent lower court decision gave the green light to super PACs funded by unlimited donations from millionaires, billionaires and corporations. Yesterday, the Supreme Court announced it would hear another case — brought by none other than the Republican National Committee — that would go even further towards transforming American democracy into the Wild West.
Washington Post: Since November, President Obama has been promising to do something about extremely long voting lines and other shameful Election Day lapses. Last week, he began to make good on his pledge, unveiling “a nonpartisan commission to improve the voting experience in America,” headed by Bob Bauer and Benjamin Ginsburg, the lawyers for Mr. Obama’s and Mitt Romney’s 2012 campaigns, respectively.
….. critics are already attacking the idea. Conservatives question why the federal government needs to get more involved with voting. Voting-rights activists wonder why the president needs a commission when he could champion any of the sensible reform proposals already sitting in Congress.
On November 14, 2012, Mitch McConnell wrote to Elizabeth King, the Pentagon’s congressional liaison, with a an unusually credulous query. “I am writing on behalf of a constituent who has contacted me regarding Guantanamo Bay prisoners receiving Post 9/11 GI Bill benefits,” McConnell wrote in a letter acquired by Danger Room. “I would appreciate your review and response to my constituent’s concerns.”
…… the United States government is not providing GI Bill benefits to detainees at the prison facility at Guantanamo Bay. What McConnell forwarded to the Pentagon was a satirical piece, published by a terrific online humor outlet. Picture The Onion with a sole focus on the military.
Raw Story: A Republican state representative in Alabama says that her bill to force new restrictions on abortion clinics is necessary because the fetus is “the largest organ in a body.”
…. “When a physician removes a child from a woman, that is the largest organ in a body,” Rep. Mary Sue McClurkin declared. “That’s a big thing. That’s a big surgery. You don’t have any other organs in your body that are bigger than that.”
…. “My liver, heart, and skin are all very excited that we are now giving organs personhood rights, although the latter is slightly upset about losing out on its ‘largest organ in the human body’ rep,” Jezebel’s Katie J.M. Baker wrote on Monday.
Charles Pierce: ….. Scott Brown took to the local Fox affiliate to explain the bizarre episode in which he got into a Twittery wrangle that ended up with former senator McDreamy exclaiming, “Bqhatevwr!” .. which caused more than a few people to wonder whether or not he was a bit sockless at the time. His explanation for what happened is quite remarkable in its sub-plausibility….
….. I am not buying the pocket-tweet explanation if, for no other reason, than believing that whole colloquy was an accident would require you to believe that McDreamy was sliding down the back of a stegosaurus for that many accidental keystrokes to have occurred. | 2024-06-18T01:26:19.665474 | https://example.com/article/6316 |
Meta
Women Hold Nearly Two-Thirds Of America’s Student Loan Debt
>Are you a college-educated woman who is being buried under a pile of student loan debt that devours your paychecks and gives you heart palpitations at 2:30 a.m.? Well, take heart — at least you’re not alone! According to a depressing new report released this week by the American Association of University Women, women hold nearly two-thirds of this country’s student debt ― or a whopping $833 billion in outstanding loans. (And that’s probably a low-ball estimate, because the report doesn’t capture women who enroll and take on a whole lot of debt but don’t graduate.)
>Oh, and female graduates also have a significantly harder time paying those loans offf ― making it clear that the student loan crisis is now most definitely a women’s issue. “Time spent in college now sometimes means unmanageable student debt that drags down those seeking greater opportunity, especially low-income women, women of color, and women who drop out before completing a degree or credential,” Patricia Fae Hoe, board chair of the AAUW ― an advocacy and research group ― wrote in a forward to the report.
>So why are women hit hardest by student loan debt? First, it’s because women are simply more likely to go to college. In 2016, 56 percent of people enrolled in colleges and universities were women. But women also tend to take on larger loans to finance that education. “In a given year about 44 percent of women enrolled in undergraduate programs take out loans compared to 39 percent of men,” the report says. “Women enrolled in undergraduate programs take on an average of about $3,100 in student loans per year—about $400 more than the average man. By graduation the typical woman receiving a bachelor’s degree in 2011-12 had an average of about $21,000 in student loans, $1,500 more than the typical man.”
>The reasons behind that are complex. Men are more likely to attend public institutions, which cost less, so that’s definitely one factor. But even when women attend public schools, they still tend to take on larger loans. And that is in part because the gender pay gap is already working its evil magic. Male and female students are just as likely to work while they’re in college, but women generally earn about $1,500 less per year ― a difference that is not totally explained by a difference in the number of hours they work, the report argues.
>Unfortunately, black women are hit particularly hard by all of this. Roughly a third of black women who got a bachelor’s degree in 2011-2012 left with more than $40,000 in student loan debt, versus just 16 percent of Latina women, 10 percent of white women and 8 percent of Asian-American women. And overall, women of all races and ethnicities take longer than men to pay off their loans ― thanks (yes, again) in large part to the persistent gender pay gap, which means they tend to earn less than men throughout their careers, even after spending all that money on an education. “Women with a bachelor’s degree who worked full time in 2016 earned 26 percent less than men with a bachelor’s degree who worked full time, or $354 less per week,” the report says.
>Add all this to the long list of things that suck about being a woman in 2017.
https://archive.fo/1SimN
Still think letting women into colleges and universities en masse was a good idea? All that student loan debt is causing women to vote for parties that want to have more government funding (read: male taxpayer funding) for higher education. And by pure coincidence these parties also want to pozz up your country with more 3rd world immigrants. Isn’t that just great?
Since it takes them longer to pay off their student loans, it’ll also take them about 10-20 years longer than men to actually start financially contributing to state and the economy (if they go into the private sector at all, of course). | 2023-09-09T01:26:19.665474 | https://example.com/article/2160 |
Flanagan says city was eager to avoid same circus surrounding Hernandez's June court date
After former New England Patriots tight end Aaron Hernandez’s first appearance last June during a bail hearing in Fall River Superior Court on charges that he murdered semi-pro football player Odin Lloyd, Mayor Will Flanagan vowed the same chaos that occurred outside the Fall River Justice Center then would not happe...
After former New England Patriots tight end Aaron Hernandez’s first appearance last June during a bail hearing in Fall River Superior Court on charges that he murdered semi-pro football player Odin Lloyd, Mayor Will Flanagan vowed the same chaos that occurred outside the Fall River Justice Center then would not happen again.
Flanagan said he was “displeased with the actions of a few” following those proceedings.
Hernandez supporters flooded the scene near that bail hearing, and according to Flanagan, were heard chanting, “Free Aaron.”
“As the mayor, and as a former prosecutor and attorney, I could not believe what I was seeing. To see these people running around the courthouse and chasing the sheriff’s vans as though a rock star was leaving the city is unacceptable,” Flanagan said.
“I can’t realize why all of the focus is on Aaron Hernandez and not the victim, who was murdered in cold blood,” Flanagan said Friday. “We can’t lose track that someone was killed here.”
Though Hernandez has not yet been proven innocent or guilty, in Flanagan’s view, he “cannot be portrayed as a role model.”
Flanagan said the behavior of Hernandez’s supporters that day showed “total disregard” for the victim.
“That’s why, going forward, we wanted to have more control,” Flanagan said.
To ensure more order, the city staffed extra police — both uniformed and undercover officers — near the Justice Center on North Main Street on Friday in anticipation of a possible circus surrounding Hernandez’s arraignment.
This time it was mostly a heavy media presence, as dozens of media members gathered for the post-arraignment news conference and numerous news vans were parked along North Main Street and on side streets.
Flanagan declined to say exactly how many more police officers were on scene but said he felt the increased measures were effective.
“What we saw play out this morning was a high police presence and a security plan that was implemented,” Flanagan said.
Flanagan said he recognized that the case is “high-profile,” and the city has “to co-exist with this as it takes place here.”
He said he had the opportunity to meet with the victim’s family. “I wanted to ensure them that the city of Fall River is with them, and will accommodate them during the trial.”
Flanagan said his job was to ensure peace for the businesses and residents near the Justice Center.
“This is a unique case. However, the world is watching,” said Flanagan. “Fall River will be synonymous with the Hernandez trial.” | 2024-04-09T01:26:19.665474 | https://example.com/article/8063 |
log.txt from combo fix directory as it popped up in Notepad - trimming the previous stuff and starting at the Drivers/Services section.((((((((((((((((((((((((((((((((((((((( Drivers/Services ))))))))))))))))))))))))))))))))))))))))))))))))).
Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy
:servicesbvtvimtcqpcuwhvuiha
Return to OTMoveIt, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
Click the red Moveit! button.
Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
Close OTMoveIt
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
Wonderfully thank you!!!!It boots up fine now and MalwareBytes reports that it's clean.Should I post another HijackThis log?
I'm experiencing two problems:1) If I open the AVG control panel and tell it to "Scan Now" then it just ignores me. I don't see any scan window popup or anything. I got the "free" version if that matters. Should I uninstall and reinstall to see if that fixes it? Try a repair first?
2) Windows Defender pops up a message when the computer starts up telling me that it cannot run. I may have inadvertently disabled a service that it needs in order to startup or run. I try to keep unnecessary services disabled unless I need them - like WWW Publishing and SQL Server. In an attempt to figure out what was wrong with Defender I uninstalled and and re-ran the install hoping that it would fix whatever it needed. It complained that "The Installer has insufficent privledges to modify this file c:\program files\Windows Defender\MsMpEng.exe"
And lastly - Do I want to stick with AVG and does that cover "spyware / malware / viruses / trojans / rootkits" or do I want to run AVG & Spyware Doctor or some other combination?
I fixed the Windows Defender problem - MsMpEng.exe was still hanging around even after install. I used the file delete tool and told it to delete that file and it rebooted and did the job. After MsMpEng.exe was deleted I was able to sucessfully install defender with no problem.
Do I even *want* Windows Defender installed? Is it's protection "worth it" or not really?
AVG would not uninstall because it was getting hung on avgscanx.exe. I used MalwareBytes' file deletion tool to delete the file and replaced it with a dummy text file in case the AVG installer checked to make sure there was a file there to delete and re-ran the uninstaller. That time it worked. I reinstalled and the scan function works again. Super!!
Okay - absolute last problem - Windows Update won't install the most recent updates. It failed. Is it the same problem as these last two issues - a locked file? If so how do I figure out which file?
At the DOS prompt execute the following commands, one by one.Press the enter key after each entry.regsvr32 urlmon.dllregsvr32 Shdocvw.dllregsvr32 Msjava.dllregsvr32 Actxprxy.dllregsvr32 Oleaut32.dllregsvr32 Mshtml.dllregsvr32 Browseui.dllregsvr32 Shell32.dll | 2024-01-23T01:26:19.665474 | https://example.com/article/3486 |
Q:
Mockito complains about wrong arguments
We try to verify the behaviour of an action with Mockito. The test code looks like this
final Type1 mock = mock(Type1.class);
new SomeAction<Type1>(mock).actionPerformed(null);
verify(mock).someMethod();
The method actionPerformed contains just the call of someMethod on the object provided in the constructor of Type1. Yet Mockito complains that the expected method call did not happen, instead a different method call happened. But the String representation of the two calls printed by Mockito are exactly the same!
Any explanation what is going on?
Update: ErrorMessage from Mockito
Argument(s) are different! Wanted:
type1.someMethod();
-> at xxx
Actual invocation has different arguments:
type1.someMethod();
-> at xxx
A:
This is a bit of a stretch, but check your toString implementations. I've ran into some irritating unit test scenarios where the expected and observed appeared to be the same from the unit test point of view when in reality they were different. In the end it was a variation in toString that caused me to believe there was a similarity when in reality there was not.
| 2023-12-12T01:26:19.665474 | https://example.com/article/6769 |
Boise city officials have their sights set on 11 acres on the corner of Americana and Shoreline Drive for a 5,000-seat stadium, which would be the new home of the Boise Hawks baseball team. The Hawks currently play at Memorial Stadium in Garden City.
Ada County commissioners have dashed one man's hopes of having his own airstrip in the city's foothills.
The Idaho Statesman reports the commissioners voted 2-1 on Wednesday to overturn a Planning and Zoning decision that would have allowed Dean Hilde to build the 1,200-foot landing strip on about 150 acres as well as a 3,600-square-foot hangar and shop.
Update, Thursday, 10:12 a.m.: The Ada County Commissioners have tabled the issue after hearing three hours of public testimony. According to a press release, 16 people testified in favor of the airstrip and 15 testified against it Wednesday night.
Frank Eld has made saving historic buildings his life’s work; he started after college in 1969. The historian and preservationist founded the Long Valley Preservation Society, a non-profit group that has saved much of the tiny town of Roseberry in Valley County.
If all goes according to plan, Eld will get to watch a house in Boise's Central Addition move from downtown to an empty lot on the East End Tuesday at midnight.
The neighborhood known as the Waterfront District is a game changer for Garden City. It was the first high-end housing built in the historically poor, southeast section of town. It’s the development that kicked off, what many people believe is inevitable gentrification.
Hay fields, vegetable gardens, and slot machines: There are several milestones that mark the timeline of tiny Garden City. This four mile burg, surrounded by much larger cities like Boise, has had a stop-and-start history.
The early history of Garden City is hard to come by. We do know the land caught the eye of the U.S. Army in 1863; Idaho historian Susan Stacy says that’s when soldiers came to the Treasure Valley to build Fort Boise. And with the Army came hungry horses.
Wildfires in the West are getting bigger, hotter and more costly. A new report from a national science advocacy group says climate change is one major reason wildfires are getting worse. And short-sighted development policies are a big reason they’re costing more.
In recent years, the number of homes and businesses built in wildfire-prone areas has skyrocketed. According to the Union of Concerned Scientists, across 13 Western states there are more than 1.2 million homes -- with a combined value of about $190 billion -- that are at high or very high risk of wildfires.
Samantha Martin has been working with Preservation Idaho to prevent the Fowler house from being demolished. Her original plan was to raise enough cash buy the land across the street from the house at 5th and Myrtle and relocate it there. | 2024-03-28T01:26:19.665474 | https://example.com/article/5911 |
Embodiments of the inventive concept relate to a semiconductor package, and more particularly, to a semiconductor package including an electromagnetic interference (EMI) shield that protects a semiconductor chip and other components included in the semiconductor package and for shielding electromagnetic waves.
Recently, the demand for mobile devices has rapidly increased in the electronic device markets. Accordingly, there is an ongoing demand for electronic components mounted in mobile devices to be small and lightweight. In order to satisfy this demand, it is necessary to not only develop technology for reducing respective sizes of mounted components, but also develop semiconductor packaging technology for integrating the mounted components into a single package. In particular, semiconductor packages that use high frequency signals need to be small as well as include various EMI shields to provide excellent resistance against electromagnetic interference or electromagnetic waves. | 2024-05-24T01:26:19.665474 | https://example.com/article/8238 |
Prussian T 16.1
The Prussian T 16.1 locomotives were built for the Prussian state railways as goods train tank locomotives about the time of the First World War. Six examples were also procured by the Imperial Railways in Alsace-Lorraine.
History
Including follow-on orders by the Deutsche Reichsbahn, a total of 1,242 locomotives were delivered between 1913 and 1924. They were later redesignated as DRG Class 94.5–17 by the DRG in their renumbering plan and were given the numbers 94 502–1380 and 94 1501–1740. Three of the T 16.1 engines belonging to the Imperial Railways in Alsace-Lorraine remained in Germany and were given numbers 94 1378–1380. In 1935, locomotive numbers 94 1381–1384 from the Saar Railway went into the Deutsche Reichsbahn.
As part of the reparations required of Germany after the First World War, 36 went to Belgium (36/53 SNCB Type 98), quite a few examples were given to the Polish State Railway, where they were designated the TKw 2. Some of these locomotives were given the Reichsbahn numbers 94 1385–1416 in the Second World War. After 1945 several former French and Belgian locomotives were left with the Deutsche Reichsbahn in East Germany as numbers 94 1801–1810. In addition, in 1950, another T 16.1 from the Halberstadt-Blankenburg Railway was acquired and numbered as 94 6776.
On the introduction of the new DB renumbering scheme in 1968 the Deutsche Bundesbahn locomotives were redesignated as Class 094; the DR renumbering scheme of 1970 saw the DR in East Germany reclassifying its engines as Class 94.1.
In addition to heavy shunting and line duties the locomotives were also employed on steep lines such as the Friedbergbahn (Suhl–Schleusingen), Scheldetalbahn (Dillenburg-Gönnern), Rennsteigbahn (Ilmenau–Schleusingen), the Erkrath–Hochdahl ramp and the Murgtalbahn (Rastatt–Freudenstadt). For such duties the steam engines were equipped with Riggenbach counter-pressure brakes. The great success of this class on inclines made it possible to do away with fiddly and time-consuming rack railway operations on many ramps.
In the Bundesbahn the last examples of this class were retired in 1974. In the Reichsbahn they were withdrawn even later. They were replaced in ramp duties by rebuilt diesel locomotives of Class 118.
A total of 43 representatives of Class 94.5–17 remained after the Second World War in Austria. The majority were handed over to the MÀV in Hungary or SŽD. The remaining 14 units were retained as ÖBB Class 694. The locomotives of this class were mainly used in heavy pusher service and retired by 1966 or sold to steel works as industrial locomotives.
Preserved locomotives
Several locomotives of this class have been preserved, some of which are still working, including numbers 94 1292 and 94 1538 shown in the photographs.
In Austria the oldest preserved member of the class, 94 503, later renumbered to 694.503 is preserved at the ÖGEG's locomotive park at Ampflwang, but still awaiting restoration.
Gallery
See also
List of DRG locomotives and railcars
List of Prussian locomotives and railbuses
List of preserved steam locomotives in Germany
References
Category:Railway locomotives introduced in 1913
Category:0-10-0T locomotives
T 16.1
Category:Berliner locomotives
Category:Hanomag locomotives
Category:Linke-Hofmann locomotives
Category:Henschel locomotives
Category:Standard gauge locomotives of Germany
Category:Standard gauge locomotives of Austria
Category:Standard gauge locomotives of Poland
Category:Standard gauge locomotives of France
Category:Standard gauge locomotives of Belgium
Category:Standard gauge locomotives of Italy
Category:E h2t locomotives | 2023-08-23T01:26:19.665474 | https://example.com/article/2453 |
Optimizing Water Exchange Rates and Rotational Mobility for High-Relaxivity of a Novel Gd-DO3A Derivative Complex Conjugated to Inulin as Macromolecular Contrast Agents for MRI.
Thanks to the understanding of the relationships between the residence lifetime τM of the coordinated water molecules to macrocyclic Gd-complexes and the rotational mobility τR of these structures, and according to the theory for paramagnetic relaxation, it is now possible to design macromolecular contrast agents with enhanced relaxivities by optimizing these two parameters through ligand structural modification. We succeeded in accelerating the water exchange rate by inducing steric compression around the water binding site, and by removing the amide function from the DOTA-AA ligand [1,4,7,10-tetraazacyclododecane-1,4,7,10-tetraacetic acid mono(p-aminoanilide)] (L) previously designed. This new ligand 10[2(1-oxo-1-p-propylthioureidophenylpropyl]-1,4,7,10-tetraazacyclodecane-1,4,7-tetraacetic acid (L1 ) was then covalently conjugated to API [O-(aminopropyl)inulin] to get the complex API-(GdL1 )x with intent to slow down the rotational correlation time (τR ) of the macromolecular complex. The evaluation of the longitudinal relaxivity at different magnetic fields and the study of the 17 O-NMR at variable temperature of the low-molecular-weight compound (GdL1 ) showed a slight decrease of the τM value (τM310 = 331 ns vs. τM310 = 450 ns for the GdL complex). Consequently to the increase of the size of the API-(GdL1 )x complex, the rotational correlation time becomes about 360 times longer compared to the monomeric GdL1 complex (τR = 33,700 ps), which results in an enhanced proton relaxivity. | 2024-04-20T01:26:19.665474 | https://example.com/article/3288 |
# Rekall Memory Forensics
#
# Copyright 2015 Google Inc. All Rights Reserved.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or (at
# your option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#
from builtins import object
class PhysicalAddressContext(object):
"""A lazy evaluator for context information around physical addresses."""
def __init__(self, session, address):
self.session = session
self.address = address
def summary(self):
rammap_plugin = self.session.plugins.rammap(
start=self.address, end=self.address+1)
for row in rammap_plugin.collect():
return row
def __str__(self):
rammap_plugin = self.session.plugins.rammap(
start=self.address, end=self.address+1)
if rammap_plugin != None:
return rammap_plugin.summary()[0]
return u"Phys: %#x" % self.address
class VADMapMixin(object):
"""A plugin to display information about virtual address pages."""
name = "vadmap"
__args = [
dict(name="start", default=0, type="IntParser",
help="Start reading from this page."),
dict(name="end", default=2**63, type="IntParser",
help="Stop reading at this offset."),
]
table_header = [
dict(name='_EPROCESS', type="_EPROCESS", hidden=True),
dict(name="Divider", type="Divider"),
dict(name="VAddr", style="address"),
dict(name="PAddr", style="address", hidden=True),
dict(name="length", style="address"),
dict(name="type", width=20),
dict(name="comment"),
]
def FormatMetadata(self, type, metadata, offset=None):
result = ""
if not metadata:
result = "Invalid PTE "
if "filename" in metadata:
result += "%s " % metadata["filename"]
if "number" in metadata:
result = "PF %s " % metadata["number"]
if type == "Valid" or type == "Transition":
result += "PhysAS "
if offset:
result += "@ %#x " % offset
if "ProtoType" in metadata:
result += "(P) "
return result
def GeneratePageMetatadata(self, task):
"""A Generator of vaddr, metadata for each page."""
_ = task
return []
def collect(self):
for task in self.filter_processes():
yield dict(_EPROCESS=task,
Divider="Pid: {0} {1}\n".format(task.pid, task.name))
with self.session.plugins.cc() as cc:
cc.SwitchProcessContext(task)
old_offset = 0
old_vaddr = 0
length = 0x1000
old_metadata = {}
for vaddr, metadata in self.GeneratePageMetatadata(task):
# Remove the offset so we can merge on identical
# metadata (offset will change for each page).
offset = metadata.pop("offset", None)
# Coalesce similar rows.
if ((offset is None or old_offset is None or
self.plugin_args.verbosity < 5 or
offset == old_offset + length) and
metadata == old_metadata and
vaddr == old_vaddr + length):
length += 0x1000
continue
type = old_metadata.get("type", None)
if type:
comment = self.FormatMetadata(type, old_metadata,
vaddr)
yield dict(VAddr=vaddr, PAddr=offset, length=length,
type=type, comment=comment)
old_metadata = metadata
old_vaddr = vaddr
old_offset = offset
length = 0x1000
if old_metadata:
comment = self.FormatMetadata(type, old_metadata, vaddr)
yield dict(VAddr=vaddr, PAddr=offset, length=length,
type=type, comment=comment)
| 2023-11-28T01:26:19.665474 | https://example.com/article/8294 |
package otherfixture
// Spaceship is a fixture for tests
type Spaceship struct{}
| 2024-05-21T01:26:19.665474 | https://example.com/article/6869 |
copper refinery machinery iran - srpc
production, is a big producer of aluminum, manganese, and copper in the world, and is ranked fourth in the Various industries such as chemical industry, machinery and equipment, non metallic mineral products, food, Azerbaijan brick, knitting lico Iranian Bearing company, refinery Tabriz, Tabriz.
copper refinery machinery crusher for sale
XSD Sand Washer. The efficient sand washing machine of XSD series is a kind of cleaning equipment of international advanced level for sand and slag pellets, developed on the basis of introducing foreign outstanding technology of the same kind of products.
copper refining machine - alibaba
Alibaba offers 944 copper refining machine products. About 16% of these are other metal & metallurgy machinery, 11% are mineral separator, and 4% are other mining machines. A wide variety of copper refining machine options are available to you, such as flotation separator, sprial separator, and gravity separator.
copper refinery machinery – SZM - buildingcontrol
Copper Refining Equipment Wholesale, Copper Refining. Alibaba offers 511 copper refining equipment products. About 27% of these are other metal & metallurgy machinery, 5% are multi-functional beauty equipment, and 1% are fermenting equipment. A wide variety of copper refining equipment options are available to you, such as free samples.
abolfazl khavari - Supplier of oil derivatives, power .
abolfazl khavari. Supplier of oil derivatives, power plant equipment and refinery at khavari lt. Location Iran Industry International Trade and Development
copper refinery machinery trader - hotelswagat
copper refinery machinery iran As a leading global manufacturer of crushing grinding and mining equipments we offer advanced reasonable solutions for any size-reduction requirements including quarry aggregate and different kinds of minerals .
Iran Mining
Konkola Copper Mines shuts smelter 18 Oct 2016 - Konkola Copper Mines, a subsidiary of London-listed Vedanta Resources, has shut down its gigantic Nchanga Smelter in the city of Chingola, located in Zambia's Copperbelt Province.
gold refinery in pakistan - BINQ Mining
May 04, 2013 · "We are refining uranium locally then why not copper and gold," he . & Refinery – We are manufacture of gold, silver and stone jewellery, we are import of all kinds of gold and stone machinery and . Iran to build refinery, .
ASARCO » Refining
The Asarco Copper RefineryImagine a building bigger than ten football fields — so long, it's said, that the builders had to account for the curvature of the earth when laying out the foundation!It's the Asarco Copper Refinery in Amarillo, Texas, a state known for big things where big things happen.
2015 World Copper Factbook DRAFT - Copper Alliance
The World Copper Factbook 2014 International Copper Study Group 2 Chapter 1: Cu Basics What choice.is Copper? Copper is a malleable and ductile metallic element that is an excellent conductor of heat and electricity as well as being corrosion resistant and antimicrobial.
Copper Refinery Machinery - autobedrijf-degroot.nl
Copper Refinery Machinery Iran - stellasports. Copper Refinery Machinery Iran. Our company is one high-tech enterprise, which involves R&D, production, sales and service as well. In the past 30 years, we devote to producing mining equipments, sand making machines and industrial grinding mills, offering expressway, rail way and water conservancy .
Innovations: Introduction to Copper: Mining & Extraction
Copper minerals and ores are found in both igneous and sedimentary rocks. Mining of copper ores is carried out using one of two methods. Copper is found in the earth's crust and the oceans although the amount in the latter is thought to be negligible, amounting to no more than about eight months . | 2023-11-14T01:26:19.665474 | https://example.com/article/4346 |
void mx_multiply_bsdf_float_reflection(vec3 L, vec3 V, BSDF in1, float in2, out BSDF result)
{
result = in1 * clamp(in2, 0.0, 1.0);
}
void mx_multiply_bsdf_float_transmission(vec3 V, BSDF in1, float in2, out BSDF result)
{
result = in1 * clamp(in2, 0.0, 1.0);
}
void mx_multiply_bsdf_float_indirect(vec3 V, vec3 in1, float in2, out vec3 result)
{
result = in1 * clamp(in2, 0.0, 1.0);
}
| 2023-09-03T01:26:19.665474 | https://example.com/article/8344 |
The purpose of this blog is to provide analytical commentary on formal and informal labour organisations and their attempts to resist ever more brutal forms of exploitation in today’s neo-liberal, global capitalism.
Wednesday, 21 November 2012
Portugal – When ‘good students’ turn sour
Portugal has been struggling with
austerity, imposed by the Troika of EU Commission, European Central Bank and
IMF. Higher Education (HE) has been badly affected similarly to the other areas
of the Portuguese public sector. In this guest post, Mark Bergfeld reports from his experience in Lisbon last week of
how students and members of staff mobilised against cuts in HE as part of the
November 14 general strike. He concludes that while the current crisis is
challenging, it nonetheless provides opportunities for students and members of
staff to strengthen their joint resistance against austerity.
Until recently Portugal had been
labelled the ‘good student’ of the Eurozone as the Conservative-Social
Democratic government slavishly implemented the austerity measures prescribed
by the Troika. The November 14 General Strike last Wednesday will, however, be
remembered as a game-changer for the movement against austerity. This was
particularly exemplified by the resistance that students co-ordinated for the
day.
After the massive September 15
demonstration which brought half a million people into the streets, students in
Lisbon, Porto and Coimbra launched an initiative called ‘Students for the
General Strike’ to re-ignite the movement for free education and the public
universities in Portugal.
Photo by Mark Bergfeld
The days when students demonstrated
against the Social Democratic government introducing a six Euro levy to attend
universities are long gone. Today students across Portugal pay approximately
1024 Euros. The most recent rise of 24 Euros at the beginning of this academic
year was justified by the government as additional support for students on grants. Nevertheless, students complain that this money
has never reached them.
Successive Socialist and
Social-Democratic governments have increased tuition fees since the 1990s and
introduced the market in higher education. Most lecture halls and classrooms
carry the name of private companies and banks. “With your student card you are
automatically offered a bank account”, Rodrigo explains. All student cards
carry the logo of a bank. “I don’t have a student card because I don’t want to
belong to a bank. But most people just accept it.”
With an ever shrinking budget,
universities have become dependent on the banks to subsidize the construction of
research labs, new buildings, and even classrooms. In turn the classrooms are
named after Santander and various other banks. Despite the influx of private
money universities remain underfunded. “We have been subject to 200 Million
Euros in cuts” says Leonor Figueiredo, a postgraduate literature student from
the University of Porto, and one of the students who initiated Students for a
General Strike. “In my MA seminars there are more than 50 students to one
tutor.”
Despite the deep austerity measures,
privatisation and tuition fee increases, previous national demonstrations have
only seen a couple of hundred students march for free education. Leonor, adds:
“Students are afraid of losing their grants when they miss classes. Since the
Bologna Processes the workload has increased massively.”
Despite recent demonstrations being
relatively insignificant, students refer to the movement in 1992 which had a
significant impact in bringing down the Cavaco Silva government. Clashes with
the police, big assemblies inside of the universities and massive street
mobilisations forced the government to concede back then.
However the more recent movement
against a right-wing government in 2003/2004 was defeated. Many believe that it
was the internal divisions that led to this defeat. Both Rodrigo and Leonor
were not present at the demonstration, yet spoke about a demonstration in 2004
that broke in two as student groups couldn’t decide where the demonstration
would end. The youth-wing of the Communist Party went into one direction and
the rest of the demonstration ended up going into another.
Back in 2004 as much as now student
associations and local unions were controlled by the Socialist Youth. This has
complicated national co-ordination for activists. The demonstration this
Thursday (November 22) has been called by ten student associations including
the Faculty of Letters at Porto, the Geographic Institute, and the Social
Science Institute in Lisbon.
Photo by Mark Bergfeld
Last week’s initiative ‘Students for
the General Strike’ was one of the most successful initiatives in recent years,
and will have helped to mobilise students for the national education
demonstration. Rodrigo says: “In the run-up to the strike we attended meetings
by lecturers, and organised joint meetings with our professors. We had to
strongly fight the idea that students don’t strike, and needed to convince
students not to attend classes on the day.”
On the day itself, students and
lecturers organised picket lines at the entrances of faculty and university
buildings allowing not one single person to enter. They went on to hold
assemblies, discussed alternatives to the current plans in higher education and
debated the next steps for the movement. Later on they joined the demonstration
in the city centre of Lisbon.
With job prospects of students
diminishing, lecturers’ contracts being torn up and further tuition fee
increases on the horizon, last Wednesday’s general strike will have shown
students and lecturers at their universities that the crisis contains
challenges as well as opportunities. The education demonstration this Thursday
will be seen as such an opportunity to strengthen the resistance inside of the
universities and on the streets.
Mark Bergfeld,
socialist activist, leading participant in the UK student movement in 2010, PPE
(BA) & Sociology (MA), currently writing on student struggles in Quebec and
Chile. He can be contacted at mdbergfeld@googlemail.com and @mdbergfeld | 2023-11-09T01:26:19.665474 | https://example.com/article/5418 |
Meta-analysis of CHEK2 1100delC variant and colorectal cancer susceptibility.
Cell cycle checkpoint kinase 2 (CHEK2) gene has been inconsistently associated with colorectal cancer (CRC), particularly the 1100delC variant. To generate large-scale evidence on whether the CHEK2 1100delC variant is associated with CRC susceptibility we have conducted a meta-analysis. Data were collected from the following electronic databases: PubMed, Excerpta Medica Database and Chinese Biomedical Literature Database, with the last report up to November 2010. The odds ratio (OR) and its 95% confidence interval (95% CI) were used to assess the strength of association. We evaluated the contrast of carriers versus non-carriers. Meta-analysis was performed in a fixed/random effect model by using the software Review Manager 4.2. A total of six studies including 4194 cases and 10,010 controls based on the search criteria were involved in this meta-analysis. A significant association of the CHEK2 1100delC variant with unselected CRC was found (OR=2.11, 95% CI=1.41-3.16, P=0.0003). We also found an association of the CHEK2 1100delC variant with familial CRC (OR=2.80, 95% CI=1.74-4.51, P<0.0001). However, the association was not established for sporadic CRC (OR=1.45, 95% CI=0.49-4.30, P=0.50). This meta-analysis demonstrates that the CHEK2 1100delC variant may be an important CRC-predisposing gene, which increases CRC risk. | 2024-07-20T01:26:19.665474 | https://example.com/article/4114 |
Ten years after first being announced, Universal-Legendary’s high-priced fantasy film “Warcraft” is generating only moderate interest among U.S. moviegoers.
Early tracking before the June 10 opening indicates that domestic performance for “Warcraft” may be held back by underwhelming reviews with projections for a moderate $25 million opening weekend — a downbeat result given its $160 million budget. Should that estimate hold, “Warcraft” will likely be heading for a third or fourth-place finish behind openings of New Line’s “The Conjuring 2” and Lionsgate’s “Now You See Me 2” along with the second weekend of Paramount’s “Teenage Mutant Ninja Turtles: Out of the Shadows.”
“The Conjuring 2” is looking to be the big winner of the trio with an opening weekend of $40 million-plus while “Now You See Me 2,” which Lionsgate expects to open strong, should finish in the $25 million to $28 million range.
Prospects on the domestic side may be iffy for “Warcraft,” given a harsh response so far from reviewers with a 38% rating on Rotten Tomatoes. Variety’s Geoff Berkshire called the film “pricey and preposterous.”
Based on Blizzard Entertainment’s multi-player fantasy game, the videogame adaptation began its international launch Wednesday, opening in France, Indonesia and the Philippines. This weekend it bows in Germany, Russia and Scandinavia, followed by most of the rest of Europe next weekend and China on June 8.
With extensive use of CGI to portray mythical creatures and magical realms, the film’s lofty budget will require solid worldwide performance to push “Warcraft” into the black — particularly on the international side, where it’s expected to deliver stronger results than in the U.S. Universal has indicated that North America is viewed as being a spoke in a larger wheel rather than the driving force for the film.
“Warcraft,” directed by Duncan Jones, is the first major release from Legendary Entertainment since it was acquired by China powerhouse Dalian Wanda in January for $3.5 billion.
Legendary produced such blockbusters as “Jurassic World,” “Pacific Rim” and “Godzilla.” It also partnered with distributor Universal Pictures on last year’s hit “Straight Outta Compton” before misfiring on “Steve Jobs” and “Crimson Peak.”
Universal and Legendary will next partner on fantasy-actioner “The Great Wall,” starring Matt Damon and Andy Lau with China opening in December and the U.S. on Feb. 17.
“Warcraft”: A Long Road to Theaters
Development on the feature adaptation of “Warcraft” began 10 years ago in 2006. Filming didn’t start until January, 2014, and lasted for four months, primarily in Vancouver.
Starring Travis Fimmel, Dominic Cooper, Robert Kazinsky, Toby Kebbell, Ben Foster, and Ruth Negga, the movie is set in the peaceful realm of Azeroth, which stands on the brink of war as its civilization faces a fearsome race of Orc warriors fleeing their dying home to colonize another. It was produced by Charles Roven through his Atlas Entertainment banner.
“Warcraft” had originally been set to open on Dec. 18, 2015, but once Disney announced in late 2013 that it had skedded “Star Wars: The Force Awakens” on the same date, Universal and Legendary reacted by pushing the release back three months to March. And about a year ago, “Warcraft” moved back another three months along with delays for “The Mummy” reboot and “Pacific Rim 2.”
Not All June Gloom
Prospects are brighter for “The Conjuring 2,” three years after the supernatural thriller grossed over $318 million worldwide on a $20 million budget. Patrick Wilson and Vera Farmiga played paranormal investigators Ed and Lorraine Warren who investigate a 1971 haunting in Rhode Island. Wilson and Farmiga return for the sequel, with the story this time set in England.
“The Conjuring” opened with $41.9 million on its way to a $137.4 million domestic total.
Heist adventure “Now You See Me” generated similar results in 2013 with a worldwide gross of $350 million on a $75 million budget that was mostly funded through Lionsgate presales. Jesse Eisenberg, Mark Ruffalo, Woody Harrelson, Dave Franco, Michael Caine and Morgan Freeman reprise their roles with appearances from Daniel Radcliffe, Lizzy Caplan, Jay Chou and Sanaa Lathan.
“Now You See Me” opened domestically with $29.4 million on its way to $117.7 million domestically. | 2024-07-31T01:26:19.665474 | https://example.com/article/8576 |
From Scientolipedia
FREE DOWNLOAD
About
"A handsome, hardback edition with audio CD containing an Eastern poem of the Prophecy of a Golden Age by L. Ron Hubbard. L. Ron Hubbard wrote "Hymn of Asia" for a Buddhist convention during the 1955-56 worldwide celebrations of the 2,500th year of the Buddhist era. The poem's 1,046 lines concern the fulfillment of Buddhasimply one who has attained bodhi. There have been many buddhas and there are expected to be many more. (PAB 32) 's prophecy. As well, they bear upon the timeless message that resonates through all ages -- Man's irrestible longing for spiritual freedom. As such, here is meaning not only for those who have ever been inspired by the wisdom of Buddhism but anyone who ever sensed they were being swept along in the stream of time and wondered, if only for an instant, to where and for what. Tracks include: Am I Metteyya?, With Complete Attention, Today a Piece of Asia Swings, Then I Say Then, Upon the Walls, See How Like a Man, Soon There Will Appear, Everywhere You Are, No Blasphemy, You Could Know, We Can Civilize, There is Assistance for You, I am But a Teacher, These Lessons Are, Obey Your Leaders, Bid Political Leaders, But I Forewarn, In the Wilderness, Restore to Asia Now, I Bring Great Lessons, Let Me Come Home, I Give You More, But There Be More, I Go, Today Mighty Weapons Exist, and I go I Am Amongst You."
https://amzn.to/2PuFWEf | 2023-10-17T01:26:19.665474 | https://example.com/article/7061 |
Netflix to Implement Offline Viewing This Year [Report]
Netflix to Implement Offline Viewing This Year [Report]
In the last few years, Netflix has become the indispensable service for most of the developed world. Between television and movies, plus comedy specials and original content, you can waste away many hours with the content available on the service. In fact, as I sit here writing, I have Netflix running in the background.
There is, unfortunately, a dark side to the service. That dark side is internet access: if you don't have it, Netflix is worthless. If you're on an airplane or driving through the desert, you are going to be completely without Netflix. For many people, this means resorting to either Amazon, which allows for offline viewing, or downloading content illegally. Obviously, neither of these options are good for Netflix.
In the past, Netflix has been very vocal about their customers' lack of interest in offline viewing, and the fact that they are currently not working on the feature because of the lack of interest. They have, however, remained open to the idea. A recent report suggests that, not only is the feature under development, but it is likely to be launched before year's end. Dan Taitz, Chief Operating Officer of Panthera, a mobile video downloading platform, says,
We know from our sources within the industry that Netflix is going to launch this product. My expectation is that by the end of the year Netflix will be launching download-to-go as an option for their customers.
Considering this feature is exactly what Panthera does, it is likely that the company is involved in the project. If not, perhaps they were approached to help implement the feature. Either way, a rumor from someone in this position within the industry is one to be taken seriously.
I still view download as something that's emerging into the consciousness of consumers. They know about downloads because before there were streaming services people downloaded movies and videos from iTunes, but they're not necessarily looking for download as a feature of their streaming service they're already paying for.
Of course, implementing offline viewing will be more difficult than just working with a partner like Panthera to build technology. The offering would be limited by contracts with the studios, similar to Hulu's Ad-Free option. Netflix will have to work with their content partners to allow for offline viewing, and not all partners will ever allow it. It stands to reason, though, that if Netflix is working on this feature, they will have already begun renegotiating the contracts, and have worked to include language in all new contracts.
Will we see this feature before the year's end? Let's hope so - it will give our team something to do on the flight to CES 2017. | 2023-08-08T01:26:19.665474 | https://example.com/article/9608 |
As the Windows hashes (in the SAM file) are encrypted, we need this key (called bootkey) to decrypt the SAM hashes:
# bkhive system key
Now we can dump the password hashes out of the SAM file:
# samdump2 SAM key > /tmp/hashes.txt
Lets crack those hashes… the easiest way would be, if the password is in the wordlist, we use john for this case:
# john -w=words.txt -f=NT hashes.txt
No luck? Lets use the brute force method:
# john –incremental:all -f=NT hashes.txt
If this takes too long you could use ophcrack. This tool uses rainbow tables and should crack your hashes in a few seconds, but you need to download those rainbow tables (350mb or 700mb or you can generate them yourself) which are not included on the Backtrack cd (for a obvious reason…). Or you can use the oph online cracker, which should be quite fast. | 2024-04-29T01:26:19.665474 | https://example.com/article/7709 |
---
abstract: 'We develop the formalism discussed previously in hep-ph/0601209 and hep-ph/0605246 to construct a kinetic theory that provides insight into the earliest “Glasma” stage of a high energy heavy ion collision. Particles produced from the decay of classical fields in the Glasma obey a Boltzmann equation whose novel features include an inhomogeneous source term and new contributions to the collision term. We discuss the power counting associated with the different terms in the Boltzmann equation and outline the transition from the field dominated regime to the particle dominated regime in high energy heavy ion collisions.'
author:
- 'François Gelis$^{(1)}$, Sangyong Jeon$^{(2)}$, Raju Venugopalan$^{(3)}$'
title: |
**How particles emerge from decaying classical fields in heavy ion collisions:\
-7mm towards a kinetic description of the Glasma**
---
1. Theory Division\
PH-TH, Case C01600, CERN,\
CH-1211 Geneva 23, Switzerland
2. Physics Department, McGill University,\
Montréal, Québec, H3A 2T8, Canada
3. Brookhaven National Laboratory,\
Physics Department, Nuclear Theory,\
Upton, NY-11973, USA
Preprint CERN-PH-TH/2007-106
Introduction
============
In two previous papers [@GelisV2; @GelisV3], we introduced a formalism to compute multi-particle production in field theories coupled to strong time-dependent external sources. The QCD example of such a field theory is the Color Glass Condensate (CGC) [@McLerV1; @McLerV2; @McLerV3; @JalilKMW1; @JalilKLW1; @JalilKLW2; @JalilKLW3; @JalilKLW4; @IancuLM1; @IancuLM2; @FerreILM1; @McLer1; @IancuLM3; @IancuV1]. For simplicity, we considered a $\phi^3$ theory; we believe however that most of our results are of general validity and can be extended to gauge theories [@GelisLV1].
In this paper, we will address a problem in multi-particle production that was not considered in Refs. [@GelisV2; @GelisV3]. Specifically, the approach developed there did not include scattering processes that are important for the dynamics of the system at late times. These are the so called [*secular terms*]{} which are of higher order in the coupling constant (loop corrections) and are accompanied by growing powers of time [@Golde1; @VegaS1; @BoyanV3]. The secular contributions must be resummed to obtain sensible results. In a quantum field theory, this resummation is performed in principle by solving the Dyson-Schwinger equations. In practice, the Dyson-Schwinger equations are difficult to solve. For a system of fields coupled to an ensemble of particles, it is well known that the Dyson-Schwinger equations can be approximated by a Boltzmann equation for the distribution of particles. The goal of the present paper is to extend the approach of Refs. [@GelisV2; @GelisV3] to derive a kinetic equation that includes the late time contributions to multi-particle production in field theories with strong external sources. We have in mind the dynamics after a heavy ion collision, where the classical field produced by the colliding nuclei expands rapidly into the vacuum along the beam direction. Our approach may also be of relevance to descriptions of the decay of the inflaton field and thermalization in the preheating and reheating phases of the early universe–a nice review with relevant references can be found in Ref. [@MichaT1]. In both cases, as the classical field evolves, the occupation number decreases and it is more appropriate to describe the higher momentum modes of the system in terms of particle degrees of freedom.
The connections between the classical approximation in field theory and kinetic equations in the framework of nuclear collisions were previously discussed by Mueller and Son [@MuellS1], and subsequently by Jeon [@Jeon3]. They considered a system of fields in the presence of an ensemble of particles described by a distribution $f$. Performing a classical approximation in the path integral describing the evolution of this system and a gradient expansion in the obtained Dyson-Schwinger equations, these authors obtained a kinetic equation for $f$. An obvious question arises: with what accuracy does this kinetic equation reproduce the Boltzmann equation one would obtain without performing the classical approximation? The authors of Refs. [@MuellS1; @Jeon3] find that the kinetic equation obtained from the classical path integral reproduces correctly the collision term in the Boltzmann equation to leading power of $f$ and (surprisingly) the first subleading term in $f$ as well.
We shall adopt a more [*ab initio*]{} approach here by considering a system that does not contain any particle degrees of freedom [*initially*]{}, but where the fields are coupled to a strong time-dependent external source $j$. The external source is assumed to be a stochastic variable that belongs to an ensemble of charges specified by a distribution $W[j]$. This is the typical set up in the description of heavy ion collisions in the Color Glass Condensate framework where $W[j]$ represents the distribution of color charges. Because of the expansion of the system, one may anticipate that the system can be described by field theory methods at early times and by kinetic theory and hydrodynamics at later times. The matter in this regime in heavy ion collisions has interesting properties; two noteworthy possibilities are dynamically generated topological charge [@KharzKV1; @Shury1] and plasma instabilities possibly leading to turbulent color fields [@MrowcT1]. This matter has been called an Glasma [@LappiM1; @GelisV4] and understanding its dynamical evolution holds the key to a deeper understanding of the strongly interacting Quark Gluon Plasma (sQGP) that may be formed at later times [@GyulaM2]. The
We will address here general questions about the dynamical evolution of such matter in the simplest possible context of a scalar ($\phi^3$) field theory [^1]:
- [*What is the kinetic equation one obtains in field theories coupled to strong external sources?*]{} Knowing the answer to this question is important for one to handle correctly the transition region between a field theory description and kinetic theory. Indeed, one expects from the work in Refs. [@MuellS1; @Jeon3] that there exists a window in time where both approaches correctly describe the dynamics [^2]. This suggests that the kinetic equation in the overlap regime must know about the coupling of sources to fields at earlier times. How is this manifest, how important is this effect and how does it go away ?
- [*What terms in the kinetic equation are important at different stages of the expansion?* ]{} The previous question hints that we will obtain a kinetic equation that has additional terms absent in the conventional Boltzmann equation. We would like to understand how this generalized Boltzmann equation converges to the usual one at late times.
The paper is organized as follows. In section \[sec:nbar\], we shall remind the reader of relevant formulae in the derivation [@GelisV2] of the average number $\big<n\big>$ of produced particles. In section \[sec:dyson\], we shall write down the Dyson-Schwinger equations for the two-point functions in theories with time dependent strong sources. These provide the starting point for a derivation in section \[sec:boltz\] of the corresponding kinetic equation for the Glasma. We observe that the coupling of the field to an external source leads to an inhomogeneous term in this kinetic equation. In section \[sec:discussion\], we discuss the properties of the different terms appearing in the kinetic equation. Albeit the collision term in the kinetic equation looks identical to the collision term in the usual Boltzmann equation, it contains novel contributions to the self energy that are of 0-loop and 1-loop order. We discuss the power counting for these different contributions and assess their relative contribution at different stages of the temporal evolution of the Glasma. We conclude with a brief summary and outlook emphasizing unresolved issues. An appendix addresses how the averaging over the sources $j$ in our formalism can be re-expressed in terms of the usual ensemble average implicit in the derivation of kinetic equations.
[*Ab initio*]{} computation of $\big<n\big>$ {#sec:nbar}
============================================
We consider the theory of a real scalar field $\phi$ with cubic self-interactions, coupled to an external time dependent source $j(x)$. The Lagrangian of the model is $${\cal L}\equiv\frac{1}{2}\partial_\mu\phi\partial^\mu\phi
-\frac{1}{2}m^2\phi^2-\frac{g}{3!}\phi^3 +j\phi\; .
\label{eq:lagrangian}$$ In [@GelisV2], we systematically calculated particle production from these sources. In the Color Glass Condensate framework that this toy model mimics, the colliding projectiles are represented by a statistical ensemble of currents $j$. Physical quantities are obtained by averaging over all possible realizations of the $j$’s. In this section, we shall discuss the calculation of the average number of produced particles in a given configuration of $j$’s.
A general formula for the average number $\big<n\big>$ of produced particles is $$\big<n\big>=\int\frac{d^3\p}{(2\pi)^3 2E_p}\;
\big<0_{\rm in}\big|a^\dagger_{\rm out}(\p)a_{\rm out}(\p)\big|0_{\rm in}\big>
\; .$$ The number of particles produced with a certain momentum $\p$ is defined as the expectation value of the “out” number operator in the initial state. This formula gives the number of particles at asymptotic times, after the particles have decoupled [^3].
A simple reduction formula gives [@ItzykZ1] $$\begin{aligned}
&&
\big<0_{\rm in}\big|a^\dagger_{\rm out}(\p)a_{\rm out}(\p)\big|0_{\rm in}\big>
=
\frac{1}{Z}\int d^4x\, d^4y\; e^{-ip\cdot x} e^{ip\cdot y}
\nonumber\\
&&\qquad\qquad\qquad\qquad\times
(\square_x+m^2)(\square_y+m^2)\;
\big<0_{\rm in}\big|\phi(x)\phi(y)\big|0_{\rm in}\big>\; ,
\label{eq:reduc-nbar}\end{aligned}$$ where $Z$ is the wave function remormalization factor. The expectation value in the right hand side of this equation has two important features : (i) the vacuum state is the “in” vacuum state on both sides and, (ii) the two fields inside the correlator are not time-ordered. The Schwinger-Keldysh formalism [@Schwi1; @Keldy1] provides techniques for computing these types of correlators.
The operators $\square+m^2$ amputate the external legs of the two-point function $G_{-+}(x,y)\equiv\big<0_{\rm
in}\big|\phi(x)\phi(y)\big|0_{\rm in}\big>$. Defining $$\widetilde{G}_{-+}(x,y)\equiv
\frac{(\square_x+m^2)(\square_y+m^2)}{Z}\;G_{-+}(x,y)\; ,$$ we can write the average multiplicity as $$\big<n\big>=\int\frac{d^3\p}{(2\pi)^3 2E_p}\;
\int d^4x \,d^4y\; e^{-ip\cdot x} e^{ip\cdot y}\;
\widetilde{G}_{-+}(x,y)\; .
\label{eq:nbar-wigner}$$ Introducing the variables $$X\equiv\frac{x+y}{2}\; ,\quad
r\equiv x-y\; ,$$ we can rewrite this formula as $$E_\p\frac{d\big<n\big>}{d^3\p}=\frac{1}{16\pi^3} \int d^4X \;
\widetilde{G}_{-+}(X,p)\; ,
\label{eq:nbar1}$$ where $$\widetilde{G}_{-+}(X,p)\equiv
\int d^4r \;
e^{-ip\cdot r}\;
\widetilde{G}_{-+}\left(X+\frac{r}{2},X-\frac{r}{2}\right)
\label{eq:wigner-def}$$ is the Wigner transform of $\widetilde{G}_{-+}(x,y)$.
In the Schwinger–Keldysh formalism, the propagators ${\bs G}_{\epsilon\epsilon^\prime}(x,y)$, ($\epsilon,\epsilon^\prime= +,-$) can be expressed as $${\bs G}_{\epsilon\epsilon^\prime}(x,y)=
\frac{\delta}{i\delta j_\epsilon(x)}\,
\frac{\delta}{i\delta j_{\epsilon^\prime}(y)}\;
\left.
e^{i{\cal V}_{_{SK}}[j_+,j_-]}
\right|_{j_+=j_-=j}\; ,
\label{eq:G-full}$$ where $i{\cal V}_{_{SK}}[j_+,j_-]$ is the sum of all [**connected**]{} vacuum-vacuum diagrams. When $j_+=j_-=j$, $i{\cal
V}_{_{SK}}[j,j]=0$ and the sum of all vacuum-vacuum diagrams is unity.
Working out the functional derivatives, $${\bs G}_{\epsilon\epsilon^\prime}(x,y)
=\left[
\frac{\delta i{\cal V}_{_{SK}}}{i\delta j_\epsilon(x)}
\frac{\delta i{\cal V}_{_{SK}}}{i\delta j_{\epsilon^\prime}(y)}
+
\frac{\delta^2 i{\cal V}_{_{SK}}}{i\delta j_\epsilon(x)i\delta j_{\epsilon^\prime}(y)}
\right]_{j_+=j_-=j}\; .
\label{eq:G0}$$
As $i{\cal V}_{_{SK}}$ is the sum of connected vacuum-vacuum diagrams, any of its derivatives with respect to $j_\pm$ is a connected Green’s function. Therefore, ${\bs G}_{\epsilon\epsilon^\prime}$ can be decomposed as $${\bs G}_{\epsilon\epsilon^\prime}(x,y)
\equiv
{\bs G}^{\rm c}_{\epsilon\epsilon^\prime}(x,y)
+
{\bs G}^{\rm nc}_{\epsilon\epsilon^\prime}(x,y)\; .
\label{eq:G}$$ These are, respectively, the connected part $${\bs G}_{\epsilon\epsilon^\prime}^{\rm c}(x,y)\equiv
\left.
\frac{\delta^2 i{\cal V}_{_{SK}}}{i\delta j_\epsilon(x)i\delta j_{\epsilon^\prime}(y)}\right|_{j_+=j_-=j}\; ,$$ and a disconnected part corresponding to the product of the expectation values of the field at the points $x$ and $y$ : $${\bs G}^{\rm nc}_{\epsilon\epsilon^\prime}(x,y)=
\big<\phi(x)\big>\big<\phi(y)\big>\quad \mbox{with}\quad
\big<\phi(x)\big>=\left.
\frac{\delta i{\cal V}_{_{SK}}}{i\delta j_\pm(x)}
\right|_{j_+=j_-=j}\; .$$ When $j_+=j_-=j$, the expectation value of the field is the same on the upper and lower branches of the contour: $\big<\phi_+(x)\big>=\big<\phi_-(x)\big>$. This explains why we omitted the $+/-$ index in the expectation value of the field.
A typical tree-level contribution to $\big<\phi(x)\big>$ is shown in figure \[fig:tree\].
Note also that $\big<\phi(x)\big>$ vanishes if the external source $j(x)$ is zero[^4]. At tree level, because $j_+=j_-=j$, the sum over the $+/-$ indices in the Schwinger-Keldysh formalism at all the internal vertices of the tree (including the sources) can be performed by using the identities $$\begin{aligned}
{\bs G}^0_{++}-{\bs G}^0_{+-}={\bs G}^0_{_R}\quad,\quad
{\bs G}^0_{-+}-{\bs G}^0_{--}={\bs G}^0_{_R}\; ,
\label{eq:G-ret}\end{aligned}$$ where ${\bs G}^0_{_R}$ is the free retarded propagator[^5]. When this sum is performed, all propagators in the tree diagram can be simply replaced by retarded propagators. This is equivalent to the statement that $\big<\phi(x)\big>$ is the retarded solution of the classical equation of motion, $$(\square+m^2)\phi(x) +\frac{g}{2}\phi^2(x) = j(x)\; ,
\label{eq:classEOM}$$ with a vanishing boundary condition at $x_0=-\infty$.
Eq. (\[eq:nbar1\]) is the complete answer to the problem of particle production in the effective theory described by the Lagrangian of eq. (\[eq:lagrangian\]). If one were able to compute $\widetilde{G}(x,y)$ to all orders, this formula would contain everything one needs. There would be no need for tools such as kinetic theory.
However, evaluating eq. (\[eq:nbar1\]) to all orders is an unrealistic goal. What has been implemented thus far is the evaluation of eq. (\[eq:nbar1\]) at leading order (tree level) to calculate the gluon yield in high-energy nucleus-nucleus collisions [@KrasnV4; @KrasnV1; @KrasnV2; @KrasnNV1; @KrasnNV2; @Lappi1]. In [@GelisV2], an algorithm was sketched to compute $\big<n\big>$ at next-to-leading order (one loop) in terms of the retarded classical field and of retarded fluctuations propagating in the classical field background.
In practice, one has to truncate the loop expansion. As we will discuss in the next section, the correct way to perform practical calculations is within the framework of the Dyson–Schwinger equations.
Dyson-Schwinger equations {#sec:dyson}
=========================
The main problem with the loop expansion described in the previous section is that, in general, truncations in $\widetilde{G}(x,y)$ will lead to an incorrect large time limit of the number of produced particles. This can be traced to secular terms containing powers of the time that invalidate the perturbative series in the large time limit. This can be cured by appropriate resummation; the well known way to do this is to solve Dyson-Schwinger equations [@Golde1; @VegaS1; @BoyanV3]. In this section, we shall discuss the Dyson-Schwinger equations obeyed by the two-point functions $G_{\epsilon\epsilon^\prime}(x,y)$ of the Schwinger-Keldysh formalism. We will see that the presence of a disconnected contribution to these 2-point functions leads to interesting features in the corresponding Dyson-Schwinger equations.
Dyson-Schwinger equation for the connected part
-----------------------------------------------
It is straightforward to write a Dyson-Schwinger equation for the connected part of the 2-point function, ${\bs G}^{\rm
c}_{\epsilon\epsilon^\prime}$, that resums self-energy corrections : $${\bs G}^{\rm c}(x,y)={\bs G}^0(x,y)+\int_{\cal C}d^4u\, d^4v\;
{\bs G}^0(x,u)\Big[-i{\bs \Sigma}(u,v)\Big]{\bs G}^{\rm c}(v,y)\; ,
\label{eq:DSc0}$$ where $-i{\bs \Sigma}$ is a 1-particle irreducible connected[^6] self-energy, [*evaluated in the presence of external sources*]{}. We shall not write here explicitly the $\pm$ indices carried by the various objects. Instead, we write the time integrations as integrals over the complete Schwinger-Keldysh contour ${\cal C}$.
It is convenient to extract from this self-energy a local piece, by writing $${\bs \Sigma}(u,v)
\equiv
g{\bs \Phi}(u)\delta(u-v)+{\bs \Pi}(u,v)\; .
\label{eq:sigma-split}$$ Except for the background field, which is a genuine local contribution to the self-energy, there is a certain arbitrariness in this separation because it depends on the momentum scale at which we resolve the system. A contribution to the self-energy that does not change significantly over space-time scales on the order of the Compton wavelength $p^{-1}$ can be treated as a mean field at that scale. Therefore, the mean field term ${\bs \Phi}(u)$ will contain the classical field, and possibly changes in the dispersion relation due to medium effects [^7].
The Dyson-Schwinger equation then becomes $$\begin{aligned}
{\bs G}^{\rm c}(x,y)&=&{\bs G}^0(x,y)
-ig
\int_{\cal C}d^4u \;
{\bs G}^0(x,u){\bs \Phi}(u){\bs G}^{\rm c}(u,y)
\nonumber\\
&&\qquad\qquad
+
\int_{\cal C}d^4u d^4v\;
{\bs G}^0(x,u)\Big[-i{\bs \Pi}(u,v)\Big]{\bs G}^{\rm c}(v,y)\; .\end{aligned}$$ Using $$\big[\square_x+m^2\big]{\bs G}^0(x,y)=-i\delta_{_{\cal C}}(x-y)\; ,$$ where $\delta_{_{\cal C}}$ denotes the delta function on the closed time path[^8], we can rewrite this equation as $$\begin{aligned}
\big[
\square_x+m^2+g{\bs \Phi}(x)
\big]{\bs G}^{\rm c}(x,y)=-i\delta_{_{\cal C}}(x-y)
-
\int_{\cal C}d^4u\; {\bs \Pi}(x,u){\bs G}^{\rm c}(u,y)\; .
\label{eq:C1}\end{aligned}$$
Dyson-Schwinger equation for the disconnected part
--------------------------------------------------
We also need a Dyson-Schwinger equation for the disconnected part of the Green’s function, $${\bs G}^{\rm nc}(x,y)
=
\big<\phi(x)\big>\big<\phi(y)\big>\; .$$ Because the expectation value $\big<\phi\big>$ is a connected 1-point function, it is natural to factor the connected propagator out of it, by writing $$\big<\phi(x)\big>\equiv
\int_{\cal C}d^4u\;
{\bs G}^{\rm c}(x,u){\bs S}(u)\; ,
\label{eq:S-def}$$ where ${\bs S}(u)$ is an “effective source" term[^9]. By construction, one obtains $$\big[
\square_x+m^2+g{\bs \Phi}(x)
\big]
\big<\phi(x)\big>
=
-i{\bs S}(x)
-
\int_{\cal C}d^4u\; {\bs \Pi}(x,u)\big<\phi(u)\big>\; .$$
Multiplying both sides by $\big<\phi(y)\big>$, one obtains $$\big[
\square_x+m^2+g{\bs \Phi}(x)
\big]{\bs G}^{\rm nc}(x,y)
=
-i{\bs S}(x)\big<\phi(y)\big>
-
\int_{\cal C}d^4u\; {\bs \Pi}(x,u){\bs G}^{\rm nc}(u,y)\; .$$ Defining $$-i{\bs \Pi}^{_S}(x,y)\equiv {\bs S}(x){\bs S}(y)\; ,
\label{eq:pi-source}$$ we can rewrite this equation as $$\big[
\square_x+m^2+g{\bs \Phi}(x)
\big]{\bs G}^{\rm nc}(x,y)
=
-
\int_{\cal C}d^4u\;
\Big[
{\bs \Pi}^{_S}(x,u){\bs G}^{\rm c}(u,y)
+
{\bs \Pi}(x,u){\bs G}^{\rm nc}(u,y)
\Big]
\; .
\label{eq:NC1}$$ Adding eqs. (\[eq:C1\]) and (\[eq:NC1\]), we obtain the Dyson-Schwinger equation for the complete two-point function: $$\begin{aligned}
&&
\big[
\square_x+m^2+g{\bs \Phi}(x)
\big]{\bs G}(x,y)
=
-i\delta_{_{\cal C}}(x-y)
\nonumber\\
&&\qquad\qquad\qquad\qquad
-
\int_{\cal C}d^4u\;
\Big[
{\bs \Pi}^{_S}(x,u){\bs G}^{\rm c}(u,y)
+
{\bs \Pi}(x,u){\bs G}(u,y)
\Big]
\; .
\label{eq:CNC1}\end{aligned}$$ The only formal difference between this Dyson-Schwinger equation and the equation one obtains in the absence of the source $j$ is the term proportional to ${\bs \Pi}^{_S}$ in the right hand side.
In principle, the resummations performed by solving eqs. (\[eq:C1\]) and (\[eq:NC1\]) (or, equivalently, eqs. (\[eq:C1\]) and (\[eq:CNC1\])) would completely cure the problem of secular terms. Such an approach has been pursued numerically in [@Berge2], but has not been attempted yet in the context of heavy ion collisions in the CGC framework.
Kinetic equation {#sec:boltz}
================
The Dyson-Schwinger equations we wrote down in the previous section contain all the necessary physics but their solution is likely too difficult; they therefore by themselves do not provide any practical insight into the dynamics of high energy heavy ion collisions. One can simplify the problem a step further by transforming the Dyson-Schwinger equations for the 2-point functions into kinetic equations. However, as we shall discuss shortly, doing so requires that certain assumptions be satisfied.
Fields and particles
--------------------
As is well known, the Boltzmann kinetic equation describes the space–time evolution of particle phase space densities. Therefore, to achieve a kinetic description, the formalism considered thus far should be extended to incorporate an ensemble of particles. This is simply done by modifying the free propagators to add a term that depends on the distribution of particles $f(\p)$. In momentum space, the modified propagators are[^10] $$\begin{aligned}
&&
{\bs G}^0_{++}(p)\equiv \frac{i}{p^2-m^2+i\epsilon}
+2\pi f(\p)\delta(p^2-m^2)
\; ,
\nonumber\\
&&
{\bs G}^0_{--}(p)\equiv
\frac{-i}{p^2-m^2-i\epsilon}
+2\pi f(\p)\delta(p^2-m^2)
\; ,
\nonumber\\
&&
{\bs G}^0_{-+}(p)\equiv
2\pi (\theta(p^0)+f(\p))\delta(p^2-m^2)
\; ,
\nonumber\\
&&
{\bs G}^0_{+-}(p)\equiv
2\pi (\theta(-p^0)+f(\p))\delta(p^2-m^2)
\; .
\label{eq:SK-f}\end{aligned}$$
These modified rules for the Schwinger–Keldysh propagators can be derived [@Bella1] when the [*initial*]{} density matrix that describes the ensemble has the form $$\rho\equiv\exp\Big[
-\int\frac{d^3\p}{(2\pi)^3 2E_\p}\;\beta_\p E_\p\;
a_{\rm in}^\dagger(\p)a_{\rm in}(\p)
\Big]\; ,$$ where $\beta_\p$ is a momentum dependent quantity. (Note: $\beta_\p$ should not be confused with the inverse temperature.) Such a form for the density matrix is required if correlators computed with this density matrix are to satisfy Wick’s theorem. From this form of the density matrix, one obtains the Schwinger-Keldysh rules of eqs. (\[eq:SK-f\]), with $$f(\p)=\frac{1}{e^{\beta_\p E_\p}-1}\; .$$ The function $f(\p)$ in the propagators only represents the [*initial*]{} distribution of particles in the system. Thus the field theory defined by the Lagrangian of eq. (\[eq:lagrangian\]) and the propagators of eqs. (\[eq:SK-f\]) describes a system of fields coupled to an external source $j$ and to an ensemble of particles with an initial distribution $f(\p)$. The Feynman rules then enable one to calculate the properties of this system at a later time.
However, eqs. (\[eq:SK-f\]) do not lead to a well behaved perturbative expansion, except when the function $f(\p)$ is the equilibrium Bose-Einstein distribution in our model of bosonic fields. In general, when $f(\p)$ is not a Bose-Einstein distribution, the perturbative expansion based on eqs. (\[eq:SK-f\]) is plagued by the previously mentioned pathological secular terms which need to be resummed. The time-scale at which resummation becomes necessary is related to the transport mean free path in the system, namely, the time between two large angle scatterings undergone by a particle. This resummation makes the distribution $f(\p)$ time–dependent reflecting the changes induced by collisions on the particle phase space distribution. Under certain approximations to be discussed later, this temporal evolution is governed by a Boltzmann equation.
The problem formulated in section \[sec:nbar\] concerned a system that has no ensemble of particles at the initial time ($f(\p)=0$ in eqs. (\[eq:SK-f\])). At first sight, as $f=0$ is a particular case of the Bose–Einstein distribution (with a vanishing temperature), secular divergences may appear to be absent. However, this conclusion is incorrect because of the presence of external sources which drive the system out of equilibrium. Thus it is also necessary to resum secular terms in this case, leading to changes in $f(\p)$. The generalized propagators in eq. (\[eq:SK-f\]) constitute the natural framework to achieve this. Because the external source is both time and space dependent, one has more generally $$f(\p)\quad\to\quad f(X,\p)$$ in eqs. (\[eq:SK-f\]).
An important point must be made here about the tree level expectation values $\big<\phi_\pm(x)\big>$ in this f-dependent extension of our formalism. A crucial property of the propagators in eqs. (\[eq:SK-f\]) is that they still obey eqs. (\[eq:G-ret\]). The retarded propagator is therefore [*$f$-independent.*]{} Therefore, as long as loop corrections are not included, the field expectation value does not depend on $f$ and is identical to the result obtained from the retarded solution of the classical equations of motion. Hence, the contribution from the disconnected part of the 2-point function lead to an inhomogeneous ($f$–independent) term in the Boltzmann equation.
Gradient expansion
------------------
The extension (\[eq:SK-f\]) of the propagators leads to Dyson-Schwinger equations that are formally identical to eqs. (\[eq:C1\]) and (\[eq:NC1\]) – with all the building blocks now constructed with $f$-dependent propagators. The first step in obtaining the Boltzmann equation is to rewrite all the distributions in terms of their Wigner transforms. For a two-point function $F(x,y)$, its Wigner transform ${\tilde F}(X,p)$ is defined to be $${\tilde F}(X,p)\equiv \int d^4s\; e^{-ip\cdot s}\;
F\left(X+\frac{s}{2},X-\frac{s}{2}\right)\; .$$
The next step is to perform a gradient expansion where only long wavelength, low momentum modes are retained. In particular, all terms of order two or higher in $\partial_{_X}$ are neglected. As our goal is to construct a kinetic theory for the Glasma, we will discuss the validity of this gradient expansion in the context of heavy ion collisions in the CGC framework. In this framework [@McLer1; @IancuLM3; @IancuV1], the color sources $\rho^a(\x_\perp)$ generating the color currents [^11] are stochastic variables that vary from event to event with a distribution $W[\rho]$. When calculating a given physical quantity, one first computes it for an arbitrary $\rho$ and then averages over all possible $\rho$’s in the ensemble generated with the weight $W[\rho]$. For example, in the McLerran-Venugopalan model [@McLerV1; @McLerV2; @McLerV3], the distribution $W[\rho]$ is a Gaussian with $$W[\rho]=\exp\Big(-\int d^2\x_\perp d^2\y_\perp\;
\frac{\rho(\x_\perp)\rho(\y_\perp)}{2\,\mu^2(\x_\perp,\y_\perp)}\Big)\; ,
\label{eq:MV}$$ where $$\mu^2(\x_\perp,\y_\perp)\equiv
\big<\rho(\x_\perp)\rho(\y_\perp)\big>
=\mu_{_A}^2(\x_\perp)\delta(\x_\perp-\y_\perp)\; .
\label{eq:2p-corr}$$ Here $\mu_{_A}^2(\x_\perp)$ represents the density of color charges at a spatial position $\x_\perp$ in the nucleus. The typical momentum scale of the sources–the saturation momentum squared $Q_s^2$ at $\x_\perp$ is simply related to $\mu_{_A}^2$.
The difference between one particular element of the ensemble and the average weighted by $W[\rho]$ is illustrated in figure \[fig:fluct\] for the quadratic form $\rho^2$.
Because the $\rho(\x_\perp)$ are uncorrelated at different points in the transverse plane of the nucleus, a particular configuration of $\rho$’s leads to a very rough density profile; in contrast, the average smoothly follows the Woods-Saxon density profile of a nucleus. This example simply illustrates that the gradients are uncontrollably large for a given configuration $\rho$ rendering any gradient expansion meaningless. On the other hand, it is perfectly legitimate for ensemble averaged quantities.
The typical momenta of “hard” particles is set by the saturation scale which is of order $Q_s\sim 1$–$2$ GeV at RHIC energies; this scale may be higher at the LHC. In contrast, the gradient $\partial_{_X}$ for averaged quantities changes appreciably over distance scales of the inverse nuclear radius given by $\sim
R_{_A}^{-1}\sim 40~$MeV for a large nucleus. The small magnitude of this scale in the gradient expansion relative to the typical saturation momentum justifies the gradient expansion for quantities that are averaged over the ensemble of color charges.
The corresponding changes to the Feynman rules are described in appendix \[sec:average\]. Here it is sufficient to note that the ensemble average is obtained by connecting all the external sources $j$ in the manner specified by the distribution $W[\rho]$. For instance, in the MV model $W[\rho]$ is a Gaussian, which implies that all the sources must be connected pairwise. The objects ${\bs\Pi}^{_S}$, ${\bs\Pi}$ and ${\bs\Phi}$ that appear in the Dyson-Schwinger equations (\[eq:C1\]) and (\[eq:NC1\]) must be thought of as being averaged over $j$. In Feynman diagrams, we will represent the average over $j$ by surrounding the diagram by a light gray halo : 1to 0.8cm $$\left<\vphantom{\Big[}\big<\phi(x)\big>\right>_j=\;\;\raise -7mm\box1\;\; .$$ This compact notation encompasses a very large number of contributions. For instance, at leading order, one would first approximate $\big<\phi(x)\big>$ as the sum of all the tree diagrams, an example of which is represented in figure \[fig:tree\]. For each such tree diagram, the sources $j$ (the black dots in figure \[fig:tree\]) are reconnected pairwise in all the possible ways. A typical reconnection of the sources, corresponding to the topology of figure \[fig:tree\], is displayed in figure \[fig:tree\_j\].
Note that the “loop order” of a given diagram is a meaningful concept only for diagrams [*before*]{} they are averaged over $j$. Indeed, as one can see by comparing the figures \[fig:tree\] and \[fig:tree\_j\], the diagram before the $j$-average has 0 loops and is of order $g^{-1}$. After the average is performed, while it has a large number of “loops" which do not contain any information about the order in $g$ of the diagram.
Boltzmann equation
------------------
The final ingredient in the derivation of the Boltzmann equation is the so-called “quasi–particle ansatz” which can be expressed as $$\begin{aligned}
&&
{\bs G}_{-+}(X,p)=(1+f(X,\p)){\bs\rho}(X,p)\; ,
\nonumber\\
&&
{\bs G}_{+-}(X,p)=f(X,\p){\bs \rho}(X,p)\; ,\end{aligned}$$ where the spectral function ${\bs\rho}(X,p)$ is $${\bs\rho}(X,p)\equiv {\bs G}_{_R}(X,p)-{\bs G}_{_A}(X,p)=
{\bs G}_{-+}(X,p)-{\bs G}_{+-}(X,p)\; .$$ The physical assumption here is that the interactions in the system are such that the collisional width of the dressed particles remains small compared to their energy; the system is made up of long-lived quasi–particles.
The Boltzmann equation can now be obtained as follows:
- Write a Dyson-Schwinger equation analogous to eq. (\[eq:CNC1\]), but with the differential operator $\square+m^2+g{\bs\Phi}$ acting on the variable $y$ instead of $x$, and subtract it from eq. (\[eq:CNC1\]).
- Rewrite this equation in terms of the Wigner transformed quantities and perform a gradient expansion keeping only leading terms in $\partial_{_X}$.
- Replace the Green’s functions with the quasi-particle ansatz and drop the spectral function ${\bs\rho}(X,p)$ which appears as a factor in all the terms.
If the terms proportional to ${\bs \Pi}^{_S}$ were absent from eq. (\[eq:CNC1\]), the steps outlined above would result in the well-known Boltzmann–Vlasov equation, $$\begin{aligned}
&&
2p\cdot \partial_{_X}f(X,\p)
+
g\partial_{_X}{\bs \Phi}(X)\cdot\partial_p f(X,\p)
=
\nonumber\\
&&\qquad\qquad=
(1+f(X,\p)){\bs \Pi}_{+-}(X,p)-f(X,\p){\bs \Pi}_{-+}(X,p)\; .
\label{eq:boltz0}\end{aligned}$$ The extra term we have in the Dyson–Schwinger equations, proportional to ${\bs \Pi}^{_S}$, will modify the Boltzmann–Vlasov equation. Two key features of this novel term will prove essential in our derivation. The first is that ${\bs\Pi}^{_S}(x,y)$ does not depend on whether the points $x$ and $y$ are on the upper or lower branch of the time contour. This is because the expectation value of the field, for equal values of the sources $j_+$ and $j_-$, is the same on both branches of the contour. The second feature is that the non-connected part of the propagators drops out of the spectral function, for the same reason. Hence, $${\bs\rho}(X,p)={\bs G}_{-+}(X,p)-{\bs G}_{+-}(X,p)
={\bs G}_{-+}^{\rm c}(X,p)-{\bs G}_{+-}^{\rm c}(X,p)\; .$$ Utilizing these two properties, we can perform the gradient expansion for this additional term in the same way as performed for the usual self-energy correction. It modifies the right hand side of the Boltzmann equation by an additive correction[^12] ${\bs\Pi}^{_S}(X,p)$. Therefore, our final expression for the kinetic equation is $$\begin{aligned}
&&
2p\cdot \partial_{_X}f(X,\p)
+
g\partial_{_X}{\bs \Phi}(X)\cdot\partial_p f(X,\p)
=
\nonumber\\
&&\qquad\qquad={\bs\Pi}^{_S}(X,p)
+
(1+f(X,\p)){\bs \Pi}_{+-}(X,p)-f(X,\p){\bs \Pi}_{-+}(X,p)\; .
\nonumber\\
&&
\label{eq:boltz}\end{aligned}$$ The novel “source term” ${\bs\Pi}^{_S}(X,p)$ in this equation is non-zero even if the particle distribution $f(X,\p)$ is zero. It is therefore responsible for $f=0$ not being a fixed point of the above equation; the solution of this equation is non-zero at later times even if the initial condition had a vanishing particle distribution. In the next section, we will discuss further significant differences between this kinetic equation and the conventional Boltzmann-Vlasov equation in eq. (\[eq:boltz0\]).
Properties of the Glasma kinetic equation {#sec:discussion}
=========================================
In this section, we shall discuss the various terms in eq. (\[eq:boltz\]) with emphasis on the differences between these and those appearing in the conventional Boltzmann kinetic equation.
Vlasov term
-----------
We first consider the Vlasov term ($g\partial_{_X}{\bs\Phi}\cdot
\partial_p f$) in the Boltzmann equation. We note that in performing the average of the [*mean field*]{} ${\bs \Phi}(X)$, over the external sources $j$, the various correlation functions $\big<j(x_1)\cdots
j(x_n)\big>$ permitted by the distribution of sources $W[j]$ are nearly translation invariant. The dependence of these correlators on the barycentric co–ordinate $X\equiv (x_1+\cdots + x_n)/n$ is very slow because it arises from the density profile of the colliding nuclei[^13]. Therefore the 1-point function ${\bs\Phi}(X)$, averaged over $j$, also has a very slow dependence on its argument $X$; its Fourier transform with respect to $X$ has only modes with momenta on the order of the inverse nuclear radius. As discussed previously, this scale is very small relative to the typical momentum of the particles under consideration and it is therefore legitimate to approximate it as a Vlasov term.
As is well known, the effect of this term in the Boltzmann equation is to change the momentum of particles as they move between regions where the external field is different. Indeed, $g\partial_{_X}{\bs \Phi}$ is the force that acts on the particles at point $X$ and accelerates them towards regions of lower potential[^14]. The mean field ${\bs\Phi}$ includes not only the classical field directly produced by the external sources, but also possibly a contribution coming from the particles encoded in $f(X,\p)$. Such a modification may arise from a modification of the particle dispersion relation due to the collective action of the other particles. For instance, if the particles acquire a medium mass with a weak space-time dependence, this mass can be represented by a potential in the Vlasov term of the kinetic equation.
Source term in the kinetic equation {#sec:source_term}
-----------------------------------
Let us now consider the effect of the source term ${\bs\Pi}^{_S}(X,p)$ in eq. (\[eq:boltz\]), which can be obtained as the Wigner transform of the product ${\bs S}(x){\bs S}(y)$. An interesting situation, relevant for heavy ion collisions, is when tree diagrams are dominant because the external source is strong ($gj\sim 1$). In this case, the expectation value $\big<\phi(x)\big>$ is dominated by the retarded classical field $\phi(x)$; the connected part of the 2-point function, ${\bs G}^{\rm c}$, is simply the propagator of a fluctuation on top of the classical field, $$\left({\bs G}^{\rm c}\right)^{-1} =\square+m^2+g\phi\; .$$ One therefore immediately obtains the following expression[^15] for ${\bs S}(x)$ : $$\begin{aligned}
{\bs S}(x)&=&\Big[\square+m^2+g\phi(x)\Big]\,\phi(x)
\nonumber\\
&=&j(x)+\frac{g}{2}\phi^2(x)\; .
\label{eq:S-tree}\end{aligned}$$ We see here that the effective source ${\bs S}(x)$ receives two contributions :
- the external source $j(x)$ itself. This term is only important if we want to use the Boltzmann equation in regions of space-time where the external source is still active. In a heavy ion collision, the color sources are present only on the light-cone at a proper time $\tau=0$. We will not consider this term further.
- A term quadratic in the classical field produced by the external source; this term continues to contribute after the external sources have stopped acting.
One may represent this effective source graphically as 1to 4cm $${\bs S}(x)\equiv\;\;\; \raise -4.3mm\box1\;\;\; .$$ The second term has a fairly straightforward interpretation. When the term quadratic in $\phi$ in the classical equation of motion $$\Big[\square+m^2\Big]\,\phi(x)
=j(x)-\frac{g}{2}\phi^2(x)\; ,$$ is important, we see that the field is not a free field. If expanded in particle modes, the number of particles in the field would change with time. Therefore, if one switches between a description in terms of classical fields to the kinetic equation at a stage where this non-linear term is still significant, the source term in the Boltzmann equation modifies the number of particles in order to take this effect into account.
At tree level, the effective source ${\bs S}(x)$, and hence ${\bs\Pi}^{_S}$, is independent of the distribution of particles $f$. As discussed previously, this is a straightforward consequence of the fact that, at tree level, the 1-point function in the Schwinger-Keldysh formalism can be rewritten entirely in terms of retarded propagators that are $f$–independent. ${\bs\Pi}^{_S}$ is therefore non-zero even if $f=0$. In contrast, the terms ${\bs\Pi}_{\pm\mp}$ in the r.h.s of the Boltzmann equation depend on $f$ and vanish when $f=0$ as expected for [*collision terms*]{}. ${\bs \Pi}^{_S}$ is therefore a [*source term*]{} in the Boltzmann equation, because it drives $f$ to a non-zero value even if one has $f=0$ initially.
When we perform the average over $j$ of the disconnected product ${\bs
S}(x){\bs S}(y)$, we get both disconnected and connected source terms, 1to 5.5cm $$\Big<{\bs S}(x){\bs S}(y)\Big>_j=\;\;\raise -7.5mm\box1\;\;.
\label{eq:Pis}$$ depending on how the sources $j$ are reconnected. In this picture, each light shaded area is simply connected after the average over $j$ has been performed, and all the sources $j$ it contains are linked in all the possible ways that preserve its connectedness.
The first term in the r.h.s. of eq. (\[eq:Pis\]) corresponds to contributions where we connect together only $j$’s that belong to the same factor ${\bs S}$, $\big<{\bs
S}(x)\big>_j\big<{\bs S}(y)\big>_j$. Our previous remark about the average over $j$ of the 1-point function ${\bs \Phi}(X)$ also applies here to $\big<{\bs S}(x)\big>_j$ : its Fourier transform only contains very soft modes of the order of the inverse of the nuclear radius. It is therefore nearly zero for the typical particle momentum $p\sim Q_s$ we are interested in here. Thus only the connected terms in the average of the source term $\big<{\bs S}(x){\bs
S}(y)\big>_j$ matter in the kinetic equation.
Magnitude of field insertions {#app:counting}
-----------------------------
The source term in eq. (\[eq:Pis\]), as well as the other terms in the right hand side of the Boltzmann equation, involve insertions of the classical field $\phi(x)$. In this subsection, we present a simple power counting that enables us to estimate the magnitude of such insertions. To simplify the discussion, we shall assume that the space–time coordinate $X$ corresponds to sufficiently late times when the external source $j$ is zero and its influence is only felt through the classical field $\phi(X)$ generated by the source at earlier times.
Following the discussion after eq. (\[eq:2p-corr\]), we assume that there is hard momentum scale $Q_s$ in the problem–the saturation scale in heavy ion collisions. Typical particle momenta are of order $\p\sim Q_s$. In our toy model, the coupling constant $g$ has the dimension of a mass in 4 dimensions. To mimic the power counting in QCD, we will write it as $$g\equiv\lambda Q_s ,$$ where $\lambda$, like the QCD coupling constant, is dimensionless. We assume that the coupling constant $\lambda \ll 1$.
To estimate the order of magnitude of the source term given in eq. (\[eq:Pis\]), it is not sufficient to know the magnitude of the classical field. Kinematical phase space constraints can alter the naive power counting. As these considerations will apply equally to the collision terms in the Boltzmann equation, it is worth our while to discuss the power counting for the source term at length here.
From eq. (\[eq:pi-source\]) and eq. (\[eq:Pis\]), the naive power counting for the source term would give $${\bs\Pi}^{_S}(X,p)
=
\frac{\lambda^2 Q_s^2}{4}
\int d^4s \;e^{ip\cdot s}\;
\left<
\phi^2(X+\frac{s}{2})\phi^2(X-\frac{s}{2})
\right>_j\; .
\label{eq:source-suppr}$$ We will demonstrate that eq. (\[eq:source-suppr\]) vanishes when the momentum carried by the classical field $\phi$ is nearly on shell. Rewriting this expression entirely in momentum space in terms of the Fourier transform ${\wt\phi}(k)$ of the classical field, $$\begin{aligned}
&&
{\bs\Pi}^{_S}(X,p)
=
\frac{\lambda^2 Q_s^2}{4}
\int d^4s
\int\frac{d^4k_1}{(2\pi)^4}\cdots\frac{d^4 k_4}{(2\pi)^4}\;
e^{ip\cdot s}
\nonumber\\
&&\!\!\!\!
\times
\;
e^{-ik_1\cdot(X+\frac{s}{2})}
e^{-ik_2\cdot(X+\frac{s}{2})}
e^{-ik_3\cdot(X-\frac{s}{2})}
e^{-ik_4\cdot(X-\frac{s}{2})}
\left<
{\wt\phi}(k_1){\wt\phi}(k_2){\wt\phi}(k_3){\wt\phi}(k_4)
\right>_j\; .
\nonumber\\
&&
\label{eq:Pis1}\end{aligned}$$ For the sake of simplicity, let us assume that the average over the external source $j$ of the product of four fields factorizes into products of averages of two fields as suggested by the source distribution in eq. (\[eq:MV\]). $$\left<
{\wt\phi}(k_1){\wt\phi}(k_2){\wt\phi}(k_3){\wt\phi}(k_4)
\right>_j
=
\left<
{\wt\phi}(k_1){\wt\phi}(k_3)\right>_j
\left<{\wt\phi}(k_2){\wt\phi}(k_4)
\right>_j+\mbox{other contractions}\; .$$ For illustrative purposes, we consider only one of the possible contractions corresponding to the connected topology of the second term in the r.h.s. of eq. (\[eq:Pis\])). It is convenient at this point to denote $${\bs G}^{-+}_{\rm cl}(x,y)\equiv\left<\phi(x)\phi(y)\right>_j\; ,$$ so that one has $$\left<
{\wt\phi}(k_1){\wt\phi}(k_3)\right>_j
=
\int d^4Y\; e^{i(k_1+k_3)\cdot Y}\;
{\bs G}^{-+}_{\rm cl}\left(Y,\frac{k_1-k_3}{2}\right)\; .
\label{eq:Gclass}$$ The definition of the object ${\bs G}^{-+}_{\rm cl}(x,y)$ is identical to the usual definition of the $-+$ component of the Schwinger-Keldysh propagators, except, as the notation suggests, it is constructed from the classical solution of the equations of motion rather than from the full field operator. Inserting this definition into eq. (\[eq:Pis1\]) and keeping only the lowest order [^16] in the gradients in $X$, one obtains $$\begin{aligned}
{\bs\Pi}^{_S}(X,p)
&=&
\frac{\lambda^2Q_s^2}{4}
\int\frac{d^4k}{(2\pi)^4}\;
{\bs G}^{-+}_{\rm cl}(X,k)\;{\bs G}^{-+}_{\rm cl}(X,p-k)
\nonumber\\
&&\qquad\qquad\qquad+\;\mbox{other contractions}\; .
\label{eq:Pis2}\end{aligned}$$ Note that in this case there is only one other contraction, that leads to the same contribution, thereby transforming the prefactor $1/4$ into a $1/2$. If the time $X^0$ at which this is evaluated is large compared to $(Q_s)^{-1}$, the classical field that enters in the definition of ${\bs G}^{-+}_{\rm cl}$ is mostly on-shell, and one can write $${\bs G}^{-+}_{\rm cl}(X,k)
\approx
2\pi\delta(k^2-m^2)\,f_{\rm cl}(X,\k)\; .
\label{eq:Gclass1}$$ By analogy with eq. \[eq:SK-f\], the distribution $f_{\rm cl}(X,\k)$ can be interpreted as representing the “particle content” of the classical field. As eq. (\[eq:Pis2\]) has exactly the structure of a $2\to 1$ collision term with on-shell particles of equal mass, it is zero because of energy-momentum conservation.
Therefore, to correctly estimate the magnitude of the source term ${\bs\Pi^{_S}}$ when the classical field is weak, one needs to properly account for the slight off-shellness of the field Fourier modes. From the equation of motion $$\frac{\square+m^2}{Q_s^2}\left(\frac{\phi}{\phi^*}\right)
+\frac{1}{2}\left(\frac{\phi}{\phi^*}\right)^2=0\; ,
\label{eq:EOM1}$$ the off-shellness of the classical field comes from its self-interactions. The simplest way to take this off-shellness into account is to use the equation of motion in order to write $${\wt\phi}(k)=
\frac{\lambda Q_s}{2}\frac{1}{k^2-m^2}
\int\frac{d^4q}{(2\pi)^4}\;{\wt\phi}(q){\wt\phi}(k-q)\; ,$$ and to replace some of the ${\wt\phi}$’s in eq. (\[eq:Pis1\]) by the above relation. It is sufficient to replace two ${\wt\phi}$’s in order to lift the kinematical constraints that came from the classical field having only nearly on-shell Fourier modes. This substitution is straightforward. One obtains, $$\begin{aligned}
&&{\bs\Pi}^{_S}(X,p)
=
\left(\frac{\lambda^2 Q_s^2}{4}\right)^2
\int\frac{d^4k}{(2\pi)^4}\frac{d^4q}{(2\pi)^4}
\frac{1}{(k^2-m^2)^2}
\nonumber\\
&&\quad\times\,
{\bs G}^{-+}_{\rm cl}(X,q)\;{\bs G}^{-+}_{\rm cl}(X,k-q)
\;{\bs G}^{-+}_{\rm cl}(X,p-k)
+\;\mbox{other contractions}\; .
\nonumber\\
&&
\label{eq:Pis3}\end{aligned}$$
This contribution to the source term can be represented diagrammatically as 1to 3.01cm $${\bs\Pi}^{_S}(X,p)
=\;\;\;
\raise -7mm\box1\; ,$$ where the solid lines represent ordinary vacuum propagators ($1/(k^2-m^2)$) and the wavy lines represent the correlation function ${\bs G}^{-+}_{\rm cl}$. It is interesting to note that this contribution is identical in form to what one would have obtained in the collision term of the conventional Boltzmann equation, except that here the $G^{-+}$ propagators are made up of the classical fields.
We are now in a position to estimate the power counting of contributions to the source term. First, the order of magnitude of the denominators $k^2-m^2$ is $Q_s^2$ because the momentum transfer $k$ is of order $Q_s$ (and is not particularly close to the mass shell). Each ${\bs G}^{-+}_{\rm cl}$ contains a delta function. Two of them can be used to perform for free the integrations over the energies $k^0$ and $q^0$, while the third provides the value of one angular integration variable. We finally obtain the estimate $${\bs\Pi}^{_S}(X,p)\sim \frac{Q_s^2}{\lambda^2}
\left(\frac{n_{\rm cl}(X)}{n^*}\right)^2
\frac{f_{\rm cl}(X,\overline{p})}{f^*}
\; ,
\label{eq:Pis-mag}$$ where $$n_{\rm cl}(X)\equiv \int\frac{d^3\k}{(2\pi)^3}\; f_{\rm cl}(X,\k)\; ,
\label{eq:nclass-def}$$ $f^*\equiv \lambda^{-2}$, $n^*\equiv Q_s^3\lambda^{-2}$ and $n_{\rm
cl}(X)$ is the spatial density of particles corresponding to the classical field. The expressions $f^*$ and $n^*$ correspond respectively to the maximal values of $f_{\rm cl}$ and $n_{\rm cl}$ can have at early times $\lesssim Q_s^{-1}$). The argument $\overline{p}$ cannot be specified exactly (in fact, eq. (\[eq:Pis-mag\]) is an oversimplified version of the actual formula for ${\bs\Pi}^{_S}$), but it is a momentum whose components are of the same order of magnitude as those of $p$, the momentum of the produced particle. This is an important point, because as time increases, the support of $f_{\rm cl}$ shrinks in the $p_z$ direction because of the longitudinal expansion of the system, thus making $f_{\rm cl}(X,\overline{p})$ decrease as well (while in the center of its support, it would stay constant).
Even if eq. (\[eq:Pis3\]) is not valid (say, if the average over $j$ were to generate connections among the fields that are not pairwise), the estimate of ${\bs\Pi}^{_S}$ one obtains from it has a much wider range of validity. (Eq. (\[eq:Pis-mag\]) is valid even in the saturated regime.) We also note that as ${\bs\Pi}^{_S}$ is an inhomogeneous term existing even when $f=0$, its magnitude depends only on the time dependence of the classical field $\phi(x)$ through $f_{\rm cl}$ and $n_{\rm cl}$.
Collision terms
---------------
The estimate of the various contributions to the collision term follow very closely that of the source term. Let us start by listing the terms we need to estimate. Because of the presence of the background field and of the average over the external source $j$, ${\bs\Pi}_{-+}(X,p)$ can contain topologies that would not exist in the vacuum. In fact, ${\bs\Pi}_{-+}(X,p)$ can contain terms that have 0, 1 and 2 loops[^17] before the average over the external source is performed. We will denote by ${\cal C}_0[f], {\cal
C}_1[f]$ and ${\cal C}_2[f]$ their respective contributions to the collision term.
Let us start with ${\cal C}_0[f]$. Diagrammatically, it corresponds to 1to 3.01cm 2to 3.01cm $${\cal C}_0[f]
=\;\;\;
\raise -7mm\box1=\;\;\;
\raise -7mm\box2\; .$$ Note that this represents only one of the diagrams that can possibly enter in ${\cal C}_0[f]$. From the experience gained in the estimate of the magnitude of ${\bs\Pi}^{_S}(X,p)$, we can readily see that there must be at least four insertions of the classical field for such a contribution to be kinematically viable when the classical field becomes weak and has only near mass-shell Fourier modes. The second equality shows one example of the topology one obtains after the average over $j$. The corresponding expression reads $$\begin{aligned}
&&{\cal C}_0[f]
=
\left(\frac{\lambda^2Q_s^2}{4}\right)^2
\int\frac{d^4k}{(2\pi)^4}\frac{d^4q}{(2\pi)^4}
\frac{1}{(k^2-m^2)^2}
\nonumber\\
&&\quad\times\,
{\bs G}^{-+}(X,q)\;{\bs G}^{-+}_{\rm cl}(X,k-q)
\;{\bs G}^{-+}_{\rm cl}(X,p-k)
+\;\mbox{other contractions}\; .
\nonumber\\
&&
\label{eq:C0}\end{aligned}$$ The only difference between this expression and that of ${\bs\Pi}^{_S}$ in eq. (\[eq:Pis3\]) is that one of the correlators ${\bs G}^{-+}_{\rm cl}$ is now replaced by[^18] $${\bs G}^{-+}(X,p)=2\pi\delta(p^2-m^2)f(X,\p)\; ,$$ that involves the distribution $f(X,p)$ rather than the classical distribution $f_{\rm cl}(X,p)$. From this analogy, we can estimate the magnitude of ${\cal C}_0[f]$ directly from that of ${\bs\Pi}^{_S}$ in eq. (\[eq:Pis-mag\]), by substituting one factor $f_{\rm cl}$ or $n_{\rm cl}$ by respectively $f$ or $n$. Here $n$ is the spatial density defined from $f$ in the same way as in eq. (\[eq:nclass-def\]). We obtain $${\cal C}_0[f]\sim \frac{Q_s^2}{\lambda^2}
\Big[
\left(\frac{n_{\rm cl}(X)}{n^*}\right)^2 \frac{f(X,\overline{p})}{f^*}
\oplus
\frac{n_{\rm cl}(X)}{n^*}
\frac{n(X)}{n^*}
\frac{f_{\rm cl}(X,\overline{p})}{f^*}
\Big]
\; .
\label{eq:C0-mag}$$
Similarly, ${\cal C}_1[f]$ corresponds to diagrams of the type 1to 3.01cm 2to 3.01cm $${\cal C}_1[f]
=\;\;\;
\raise -7mm\box1=\;\;\;
\raise -7mm\box2\; ,$$ and the corresponding expression reads $$\begin{aligned}
&&{\cal C}_1[f]
=
\left(\frac{\lambda^2Q_s^2}{4}\right)^2
\int\frac{d^4k}{(2\pi)^4}\frac{d^4q}{(2\pi)^4}
\frac{1}{(k^2-m^2)^2}
\nonumber\\
&&\quad\times\,
{\bs G}^{-+}(X,q)\;{\bs G}^{-+}_{\rm cl}(X,k-q)
\;{\bs G}^{-+}(X,p-k)
+\;\mbox{other contractions}\; .
\nonumber\\
&&
\label{eq:C11}\end{aligned}$$ Here we replace two out of three correlators ${\bs G}^{-+}_{\rm cl}$ by ${\bs G}^{-+}$; the power counting for this diagram is then $${\cal C}_1[f]\sim \frac{Q_s^2}{\lambda^2}
\Big[
\frac{n_{\rm cl}(X)}{n^*}\frac{n(X)}{n^*} \frac{f(X,\overline{p})}{f^*}
\oplus
\left(\frac{n(X)}{n^*}\right)^2
\frac{f_{\rm cl}(X,\overline{p})}{f^*}
\Big]
\; .
\label{eq:C1-mag}$$
Finally, for the 2-loop contribution to the collision term, we have 1to 3.01cm 2to 3.01cm $${\cal C}_2[f]
=\;\;\;
\raise -7mm\box1=\;\;\;
\raise -7mm\box2\; ,$$ $$\begin{aligned}
&&{\cal C}_2[f]
=
\left(\frac{\lambda^2Q_s^2}{4}\right)^2
\int\frac{d^4k}{(2\pi)^4}\frac{d^4q}{(2\pi)^4}
\frac{1}{(k^2-m^2)^2}
\nonumber\\
&&\quad\times\,
{\bs G}^{-+}(X,q)\;{\bs G}^{-+}(X,k-q)
\;{\bs G}^{-+}(X,p-k)
+\;\mbox{other contractions}\; ,
\nonumber\\
&&
\label{eq:C2}\end{aligned}$$ and $${\cal C}_2[f]\sim \frac{Q_s^2}{\lambda^2}
\left(\frac{n(X)}{n^*}\right)^2
\frac{f(X,\overline{p})}{f^*}
\; .
\label{eq:C2-mag}$$
Discussion
----------
Following the power counting in equations (\[eq:Pis-mag\]), (\[eq:C0-mag\]), (\[eq:C1-mag\]) and (\[eq:C2-mag\]), we are now in a position to discuss qualitatively the relative magnitude of the various terms at different stages of the evolution of the system. An important facet of the temporal evolution is that the functions $f_{\rm cl}$ and $n_{\rm cl}$ are determined once and for all from the classical field $\phi(x)$ itself. They do not receive any feedback from the particle distributions or densities, denoted by $f$ and $n$ respectively, that are created in the evolution by the source term ${\bs\Pi}^{_S}$. The time dependence of $n_{\rm cl}(X)$ is driven by the expansion of the system; therefore at times larger than $(Q_s)^{-1}$, one has $$\frac{n_{\rm cl}(X)}{n^*}\sim \frac{1}{Q_s\tau}\; .$$ This reduction of the classical particle density $n_{\rm cl}$ with time happens because the support in momentum space of the corresponding phase-space density $f_{\rm cl}$ shrinks. At a given space-time location $X$ (specified by the space-time rapidity $\eta$), only particles with a matching momentum rapidity $y=\eta$ can stay for a long time. Therefore, inside its support, $f_{\rm cl}$ remains constant satisfying $$\frac{f_{\rm cl}(y\approx\eta)}{f^*}\sim 1\; .$$ Note that at times smaller than $(Q_s)^{-1}$, ${f_{\rm cl}}/{f^*}$ and ${n_{\rm cl}(X)}/{n^*}$ are also both of order 1 because the classical field is completely saturated.
However, in all the estimates of the previous subsection, $f_{\rm cl}$ is evaluated at some arbitrary location $X$ and momentum $\overline{p}$. Therefore, $\overline{p}$ will eventually fall outside of the support of $f_{\rm cl}$, and $f_{\rm cl}$ will decrease quickly[^19] after that happens. For $f_{\rm cl}$, which comes entirely from the classical field $\phi$, the only time-scale in the problem is $1/Q_s$ and thus we expect $f_{\rm cl}$ to start decreasing at times larger than $1/Q_s$.
At early times, $\tau\to 0$, the system does not have particles yet and we have $f=n=0$. Obviously, in this regime, only the source term ${\bs\Pi}^{_S}$ is important in the right hand side of the Boltzmann equation. The corresponding physics is that a population of particles, described by the occupation number $f$, is built up from the decay of the classical field. However, these particles are still too few to have collisions at a significant rate. Eq. (\[eq:Pis-mag\]) tells us that ${\bs\Pi}^{_S}\sim \frac{Q_s^2}{\lambda^2}$ in this regime.
As a rough estimate, if we integrate this source term in the range $0\le\tau\le Q_s^{-1}$, we find that the occupation number for particles of momentum $p\sim Q_s$ at a time $\tau\sim Q_s^{-1}$ is $$\frac{f(\tau=Q_s^{-1})}{f^*}\sim 1\; .$$ At this time, all the components of the momenta of these particles are typically of order $Q_s$. Therefore, we also have $$\frac{n(\tau=Q_s^{-1})}{n^*}\sim 1\; .$$ At times around $(Q_s)^{-1}$ all the terms in the right side of the Boltzmann equation are of equal magnitude. Indeed, in this regime, terms with an arbitrarily large number of loops contribute equally to the collision term when $f\sim f^*$. There would therefore be an equally large ${\cal C}_3[f], {\cal C}_4[f], $ etc... In practice, this means that one should start using the Boltzmann equation only at later times.
At later times, $\tau\ge Q_s^{-1}$, collisions among the particles become important and their qualitative effect is to broaden the momentum distribution of the particles represented by $f$, thereby counteracting the effect of the expansion[^20] of the system. Thanks to these collisions, $f(X,\overline{p})$ falls at a lesser rate compared to $f_{\rm
cl}(X,\overline{p})$ (which is not affected by collisions), which eventually leads to the dominance of ${\cal C}_2[f]$ over all the other terms in the right hand side of the Boltzmann equation. When this occurs, our Boltzmann equation is identical to the usual one. The detailed mechanisms of this transition between the classical field dominated regime and the kinetic regime will be discussed in a future work. In particular, it will be interesting to compare, for the QCD case, the temporal evolution of the kinetic equation for the glasma with the “bottom up" scenario of thermalization [@BaierMSS1].
Summary and Outlook
===================
In this work, we developed the formalism of Refs. [@GelisV2; @GelisV3] for particle production in the presence of strong sources to construct a kinetic theory relevant for the early “glasma" stage of a heavy ion collision. In particular, we considered for simplicity, the dynamics of a $\phi^3$ theory in the presence of strong sources. Much of our discussion however is completely general and could in principle be extended to describe the dynamics of gauge fields exploding into the vacuum after a heavy ion collision. We showed that the relevant kinetic equation for the particle distributions $f$ has the structure of a Boltzmann equation with an additional inhomogeneous ($f$-independent) source term denoting particle creation from the decay of the classical field. The collision terms in the Boltzmann equation also have novel features. In addition to the usual contribution from the two loop self energy, there are 0-loop and 1-loop contributions that affect the particle phase space distributions. We outlined the power counting that controls the magnitude of the contributions of the source term and the collision terms. The temporal evolution of these contributions was discussed only briefly and will be discussed in detail elsewhere.
There are several unresolved issues that should be addressed in future work. Primarily, we would like to understand precisely how the derivation here plays out in the QCD case. In Refs. [@ArnolLM1; @ArnolLMY1; @RebhaRS1; @RebhaRS2], it was shown that instabilities of the Weibel type [@Mrowc1; @Mrowc2; @Mrowc3; @Mrowc4; @Mrowc5; @RandrM1] can spoil the bottom up scenario of thermalization. Such an instability is also seen in the CGC framework in the explosive growth of small fluctuations about the classical background field [@RomatV1; @RomatV2; @RomatV3] and has a natural interpretation as quantum fluctuations about the classical background fields on the light cone [@FukusGM1]. A numerical study of instabilities in a field+particle framework has been performed [@DumitNS1] but we would like to better understand how the effects of such instabilities manifest themselves in the kinetic equation for the glasma. It would be especially interesting to uncover whether Kolmogorov turbulent spectra [@ZakhaLF1] arise as a consequence of these instabilities [@ArnolM1; @MuellSW2] and whether this phenomenon of “turbulent thermalization" can be accommodated in our kinetic framework.
Acknowledgements {#acknowledgements .unnumbered}
================
We would like to thank K. Fukushima, T. Lappi, L. McLerran and A. H. Mueller for enlightening discussions. FG and RV would like to thank McGill University and the Galileo Galilei institute in Florence and INFN for their kind hospitality in the course of this work. RV’s research was supported by DOE Contract No. DE-AC02-98CH10886. S.J. is supported in part by the Natural Sciences and Engineering Research Council of Canada.
Average over the sources {#sec:average}
========================
We have seen that it is crucial for the validity of the gradient expansion to consider quantities averaged over the source $j$ coupled to the fields. We shall discuss briefly here how this average can be accounted for in our formalism.
Let us start from the generating functional for Green’s functions of the Schwinger-Keldysh formalism[^21] $Z_j[{\bs\eta}]$, [*for a given configuration $j$ of the external source*]{}. We define it in such a way that the $n$-point Green’s functions is obtained by differentiating $n$ times with respect to ${\bs\eta}$, and then by setting the auxiliary source ${\bs\eta}$ to zero. From what we have said in section \[sec:nbar\], this generating functional is related to the sum of all the vacuum-vacuum diagrams by : $$Z_j[{\bs\eta}]=e^{i{\cal V}_{_{SK}}[j+{\bs\eta}]}\; ,$$ where we have again used a compact notation compared to eq. (\[eq:G-full\]). We do not use a boldface letter for the external source $j$, in order to emphasize the fact that it is identical on both branches of the closed time path.
From this object, it is very easy to construct the generating functional for Green’s functions that are averaged over some ensemble of external sources, with a distribution $W[j]$, as : $$Z[{\bs\eta}]=\int \big[Dj\big]\;W[j]\;e^{i{\cal V}_{_{SK}}[j+{\bs\eta}]}\;.
\label{eq:Z}$$ In order to see how this average over $j$ can be accounted for in the Feynman rules, it is useful to write the generating functional for a fixed $j$ as follows : $$\begin{aligned}
&&
e^{i{\cal V}_{_{SK}}[j+{\bs\eta}]}
=
\exp
\Big(i\int_{\cal C}d^4x\, V\left(\frac{\delta}{\delta{\bs\eta}(x)}\right)\Big)
\nonumber\\
&&\quad\qquad\times
\exp\Big({-\frac{1}{2}\int_{\cal C}d^4x d^4y\,
(j(x)+{\bs\eta}(x)){\bs G}^0(x,y)(j(y)+{\bs\eta}(y))
}\Big)\; ,
\label{eq:Zj}\end{aligned}$$ where $V$ is the sum of all the interaction terms in the theory under consideration (i.e. all the terms of the Lagrangian density that are of degree $\ge 3$ in the field). In this formula, ${\bs G}^0(x,y)$ denotes the free propagator in the Schwinger-Keldysh formalism (as opposed to the full propagator defined in eq. (\[eq:G-full\])). It is now convenient to write the second exponential in the r.h.s. of eq. (\[eq:Zj\]) as the action of a translation operator on a functional that does not depend on $j$, $$\begin{aligned}
&&
\exp\Big({-\frac{1}{2}\int_{\cal C}d^4x d^4y\;
(j(x)+{\bs\eta}(x)){\bs G}^0(x,y)(j(y)+{\bs\eta}(y))
}\Big)
=
\nonumber\\
&&\quad=
\exp\Big({i\int_{\cal C}d^4z\, j(z)\frac{\delta}{\delta{\bs\eta}(z)}}\Big)
\;
\exp\Big({-\frac{1}{2}\int_{\cal C}d^4x d^4y\;
{\bs\eta}(x){\bs G}^0(x,y){\bs\eta}(y)
}\Big)\; .
\nonumber\\
&&\end{aligned}$$ By inserting this formula in eq. (\[eq:Zj\]), and then in eq. (\[eq:Z\]), we obtain the following expression : $$\begin{aligned}
&&
Z[{\bs\eta}]
=
\left\{
\int \big[Dj\big]\;W[j]\;
e^{i\int_{\cal C}d^4z\, j(z)\frac{\delta}{\delta{\bs\eta}(z)}}
\right\}
\nonumber\\
&&\qquad\times
\exp
\Big(i\int_{\cal C}d^4x\, V\left(\frac{\delta}{\delta{\bs\eta}(x)}\right)\Big)
\;
\exp\Big({-\frac{1}{2}\int_{\cal C}d^4x d^4y\;
{\bs\eta}(x){\bs G}^0(x,y){\bs\eta}(y)
}\Big)\; .
\nonumber\\
&&
\label{eq:Z1}\end{aligned}$$ The terms on the second line are nothing but the generating functional for the same theory [*without any external source*]{} (since it does not depend on $j$). As we can see, the effect of the average over the external source $j$ is to bring a prefactor which is a certain functional of the operator $\delta/\delta{\bs\eta}$. Such a term can be interpreted as additional couplings among the fields, since one can always write : $$\left\{
\int \big[Dj\big]\;W[j]\;
e^{i\int_{\cal C}d^4z\, j(z)\frac{\delta}{\delta{\bs\eta}(z)}}
\right\}
\equiv
\exp\Big({i\int_{\cal C}d^4x\;
U\left(\frac{\delta}{\delta{\bs\eta}(x)}\right)}
\Big)\; .
\label{eq:U}$$ What this derivation makes obvious is that, for calculating averaged quantities over the ensemble of external sources $j$, one can forget the external sources altogether, and include additional vertices to the theory[^22], as prescribed by eq. (\[eq:U\]). Note that this is equivalent to calculating a quantity in an arbitrary $j$, and then reconnecting all the $j$’s among themselves in all the possible ways permitted by $\ln(W[j])$.
[10]{}
, Nucl. Phys. [**A**]{} [**776**]{}, 135 (2006).
, Nucl. Phys. [**A**]{} [**779**]{}, 177 (2006).
, Phys. Rev. [**D**]{} [**49**]{}, 2233 (1994).
, Phys. Rev. [**D**]{} [**49**]{}, 3352 (1994).
, Phys. Rev. [**D**]{} [**50**]{}, 2225 (1994).
, Phys. Rev. [**D**]{} [**55**]{}, 5414 (1997).
, Nucl. Phys. [**B**]{} [**504**]{}, 415 (1997).
, Phys. Rev. [**D**]{} [**59**]{}, 014014 (1999).
, Phys. Rev. [**D**]{} [**59**]{}, 034007 (1999).
, Erratum. Phys. Rev. [**D**]{} [**59**]{}, 099903 (1999).
, Nucl. Phys. [**A**]{} [**692**]{}, 583 (2001).
, Phys. Lett. [**B**]{} [**510**]{}, 133 (2001).
, Nucl. Phys. [**A**]{} [ **703**]{}, 489 (2002).
, Lectures given at the 40’th Schladming Winter School: Dense Matter, March 3-10 2001, hep-ph/0104285.
, Lectures given at Cargese Summer School on QCD Perspectives on Hot and Dense Matter, Cargese, France, 6-18 Aug 2001, hep-ph/0202270.
, Quark Gluon Plasma 3, Eds. R.C. Hwa and X.N. Wang, World Scientific, hep-ph/0303204.
, Work in progress.
, [*Lectures on Phase Transitions and the Renormalization Group*]{}, Frontiers in Physics, Addison Wesley (1992).
, Phys. Rev. [**D**]{} [**56**]{}, 6524 (1997).
, Annals Phys. [**307**]{}, 335 (2003).
, Phys. Rev. [**D**]{} [**70**]{}, 043538 (2004).
, Phys. Lett. [**B**]{} [**582**]{}, 279 (2004).
, Phys. Rev. [**C**]{} [**72**]{}, 014907 (2005).
, Phys. Lett. [**B**]{} [**545**]{}, 298 (2002).
, Phys. Lett. [**B**]{} [**515**]{}, 359 (2001).
, Phys. Rev.D [**62**]{}, 036011 (2000).
, Nucl. Phys. [**A**]{} [**772**]{}, 200 (2006).
, hep-ph/0611157.
, Nucl. Phys. [**A**]{} [**750**]{}, 30 (2005).
, [*Quantum field theory*]{}, McGraw-Hill (1980).
, J. Math. Phys. [**2**]{}, 407 (1961).
, Sov. Phys. JETP [**20**]{}, 1018 (1964).
, Nucl. Phys. [**B**]{} [**557**]{}, 237 (1999).
, Phys. Rev. Lett. [**84**]{}, 4309 (2000).
, Phys. Rev. Lett. [**86**]{}, 1717 (2001).
, Nucl. Phys. [**A**]{} [**727**]{}, 427 (2003).
, Phys. Rev. Lett. [**87**]{}, 192302 (2001).
, Phys. Rev. [**C**]{} [**67**]{}, 054903 (2003).
, Nucl. Phys. [**A**]{} [**699**]{}, 847 (2002).
, [*Thermal field theory*]{}, Cambridge University Press (1996).
, hep-ph/0204211.
, JHEP [**0308**]{}, 002 (2003).
, Phys. Rev. Lett. [**94**]{}, 072302 (2005).
, Phys. Rev. Lett. [**94**]{}, 102303 (2005).
, JHEP [**0509**]{}, 041 (2005).
, hep-ph/0511052.
, Phys. Lett. [**[**B**]{} 214**]{}, 587 (1988).
, Phys. Lett. [**[**B**]{} 314**]{}, 118 (1993).
, Phys. Lett. [**[**B**]{} 363**]{}, 26 (1997).
, Acta Phys. Polon. [**[**B**]{} 37**]{}, 427 (2006).
, Phys. Rev. [**[**C**]{} 68**]{}, 034909 (2003).
, Phys. Rev. Lett. [**96**]{}, 062302 (2006).
, Eur. Phys. J. [**A**]{} [**29**]{}, 71 (2006).
, Phys. Rev. [**D**]{} [**[**D**]{} 74**]{}, 045011 (2006).
, Nucl. Phys. [**A**]{} [**786**]{}, 107 (2007).
, Phys. Rev. [**D**]{} [**75**]{}, 025016, (2007).
, [*Kolmogorov Spectra of Turbulence I*]{}, Springer series in non-linear dynamics, Berlin (1992).
, Phys. Rev. [**D**]{} [**73**]{}, 025013 (2006).
, Nucl. Phys. [**B**]{} [**760**]{}, 145 (2007).
[^1]: Even the “simple" scalar theory is non-trivial. It will indeed contain very general features of relevance to the Glasma albeit the latter will have significant (and very interesting) additional features that are absent in the scalar case.
[^2]: This has to be the case if one wants the final result to be independent of the time at which one switches between the two descriptions.
[^3]: The “number of particles” at some intermediate time, while the fields are still interacting, is not a well defined concept.
[^4]: We assume that the self-interactions of the fields are such that there is no spontaneous breakdown of symmetry when $j=0$.
[^5]: In momentum space, this propagator reads ${\bs
G}^0_{_R}(p)=i/(p^2-m^2+ip^0\epsilon)$.
[^6]: It is connected in order to have a connected 2-point function after the resummation and it needs to be 1PI to prevent double counting.
[^7]: To allow for this possibility, we denote the mean field piece by a symbol distinct from the one used for the classical field.
[^8]: $\delta_{_{\cal C}}(x-y)=0$ unless $x^0$ and $y^0$ are equal and lie on the same branch of the time path.
[^9]: In the classical limit, one has ${\bs S}(x)=j(x)+\frac{g}{2}\phi^2(x)$ (see section \[sec:source\_term\]).
[^10]: The propagators of the Schwinger-Keldysh formalism appropriate for calculating eq. (\[eq:reduc-nbar\]) are the same with $f(\p)=0$.
[^11]: These color sources are the QCD analogs of the sources $j$ in our toy scalar theory.
[^12]: Note that prior to dropping the spectral function that appears in all terms, we would have $$\begin{aligned}
{\bs\Pi}^{_S}_{+-}(X,p){\bs G}_{-+}^{\rm c}(X,p)
-
{\bs\Pi}^{_S}_{-+}(X,p){\bs G}_{+-}^{\rm c}(X,p)
&=&
{\bs\Pi}^{_S}(X,p)
\Big[
{\bs G}_{-+}^{\rm c}(X,p)
-
{\bs G}_{+-}^{\rm c}(X,p)
\Big]
\nonumber\\
&=&
{\bs\Pi}^{_S}(X,p){\bs\rho}(X,p)\; .
\nonumber\end{aligned}$$
[^13]: The fact that this density profile is not a constant is the only effect in the problem that breaks translation invariance.
[^14]: For non central collisions, the shape of the overlap region between the two nuclei is elliptic; one has stronger gradients in the direction of the small axis of the ellipsis relative to those in the direction of its large axis. The Vlasov term therefore accelerates particles preferentially in the direction of the small axis of the overlap region. This leads eventually to elliptic flow and to an anisotropy of the spectrum of particles in momentum space. This effect is obtained entirely within kinetic theory without any assumption about the degree of thermalization of the system.
[^15]: This is the result for a potential $g
\phi^3/3!$. For an arbitrary potential $V(\phi)$, the expression of ${\bs S}(x)$ in this approximation would read $${\bs S}(x)=j(x)-V^\prime(\phi(x))+\phi(x)V^{\prime\prime}(\phi(x))\; ,$$ where the prime denotes a derivative of the potential with respect to $\phi$.
[^16]: At this order, this is equivalent to assuming, from the translational invariance in the transverse plane of a large nucleus, that eq. (\[eq:Gclass\]) can be replaced by $$\left<
{\wt\phi}(k_1){\wt\phi}(k_3)\right>_j
\approx
(2\pi)^4\delta(k_1+k_3)
{\bs G}^{-+}_{\rm cl}(X,k_1)\; .$$
[^17]: Naturally, there are also terms with an even larger number of loops, but these are suppressed if the particle occupation number is $f\ll \lambda^{-2}$.
[^18]: This formula for the correlator ${\bs G}^{-+}$ is only valid as long as the occupation number $f(X,\p)$ is large compared to one. Its full expression contains $\theta(p^0)+f(X,\p)$.
[^19]: The precise time dependence of this fall depends on the $p_z$ dependence of $f_{\rm cl}$. To take an extreme case, there would be no fall at all if $f_{\rm cl}$ is independent of $p_z$.
[^20]: In the absence of collisions, $f$ would be affected by the system expansion in a similar way to $f_{\rm cl}$, and its support would shrink like $\tau^{-1}$ in the $p_z$ direction.
[^21]: In order to keep the notations compact, we denote by a boldface letter ${\bs\eta}$ the pair ${\bs\eta}\equiv(\eta_+,\eta_-)$, where the $\pm$ indices refer to the Schwinger-Keldysh closed time path.
[^22]: Note that formally, the “potential” $U$ is the connected part of the Fourier transform of the functional $W[j]$. This means that in the particular case where $W[j]$ is a Gaussian, there is only one coupling in the new potential $U$, which couples two fields. Because “interaction terms” that are quadratic in the fields can in general be handled in closed form, it is possible in this case to absorb the potential $U$ in a modification of the propagator ${\bs
G}^0(x,y)$ in eq. (\[eq:Z1\]).
| 2024-07-01T01:26:19.665474 | https://example.com/article/6071 |
You are here
Anarchism As Spectacle
The “anarchist scene” is currently in an uproar. If people aren’t upset about Michael Schmidt’s racist remarks and possible “infiltration”, they are gossiping about the recent feud between Aragorn and Bob Black. Anarchism has, in the span of a few weeks, been reduced to the petty gossip of tabloids. Those at the head of these events are doing nothing but spectacularizing the events. In the Michael Schmidt case, AK Press decided to prematurely announce things, then wait until they could secure a more mainstream outlet to publish on. In the other case, we have seen a barrage of social media, along with a eulogy for Mr. Black, in a written/semi-physical war which could just continue ad nauseum. Why do we care about these things, of which the majority of us have no direct involvement? Why has reality entertainment reared its ugly head in anarchism?
I believe Squee comes very close to answering this, when he talks about anarchism as an actual “scene” ala a movie or TV set. The “scene” is simply the people that are there, in the “scene”. While I agree with Squee on the analogy, I think he misses a vital point. Most people are not actors in the scene, but mere scenery. Maybe someone like a Michael Schmidt or a Bob Black gets to be in the scene as an actor, but the rest of us are barely present. We are beer glasses, or chairs, next to the living actors in the scene. This may be fine in other so-called “scenes”, but we are supposed to be anarchists who are opposed to something like the hierarchy this creates. Are you content with being a chair, and sitting there, after the set has closed, and everyone has left for the night, discussing the acting of Aragorn vs Black? I’m definitely not.
A real anarchist scene would have us all be actors, but so many of us have chosen to remain props…scenery to that which goes on around us. Enough to the point that news of opposition to the system, or any news relating to the anarchistic, takes a backseat to the newest gossip. Pretty soon, we’ll all be talking sharing updates about each kidney stone that John Zerzan passes. (sorry John!)
The worst thing about all of this is that it’s NOT EVEN NEWS!!! Any person who has read Schmidt’s rants should have called out his crypto-racism a long time ago. Any person who has read Black’s defenses of himself should have also known what a batshit turn he could take in the name of self-preservation. The things everyone has been gossiping about have been blatantly apparent this whole time. We might even have had the power to direct these scenes, yet still we remain props…a tree in the background, barely in focus…absorbing information but not acting upon it.
“There is, indeed, a spectacle of society, but there is no society of the spectacle. Our society is a spectacle for each and every slave that inhabits it, precisely because he or she is a slave, because he or she is isolated and separated from the other slaves and from society as a whole, because slaves do not govern, slaves do not communicate and, therefore, slaves do not act.” - Jean-Pierre Voyer
Comments
That's an interesting direction to take it. Did you listen to the FRR episode, read my @news comments, or both? I elaborated in slightly different ways on the podcast. Either way, I didn't make the point that you have, but it's valid. I think there's something of a size cap on "scenes" that are almost entirely composed of actors. A friend of mine would say it's Dunbar's number ...I tend to agree. The most exemplary form of a scene-as-actors I have been part of has been poetry/performance art centered around a specific venue or two. The practice was to go up on stage and perform the stuff you were working on off stage with others there and everyone eventually went up on stage. It spawned some intimate friendships, travel partners, and the sense of inclusion I would think is counter-spectacular. I'm curious about the ability for anarchist scenes to get beyond what you describe in your piece.
Thanks for opening up a dialogue with your essay. Also, that blogging software looks interesting.
I appreciate the author trying to get yourself away from this sort of thinking and behavior, but I assume most anarchists don't get tangled up in people's personal drama when it's plastered all over the internet to begin with. (Or maybe I'm projecting my own life on to others, as pieces like this do themselves).
Too often anarchists assume the only things happening in real life are the ones they read about on the internet.
You are clearly ignorant and/or misinformed about the history of anarchism and the practice of anarchists. Sorry to have to point out that squabbles (petty or otherwise) have been an integral aspect of anarchism for more than a century, whether you like it or not.
the quote from voyer at the close of the article is typical of the diaolgue that accompanies the scene. always something provocative, dramatic, daring, the scene needs typical props to remind everyone that they are in the scene. but it needs the sounds too: words from intense, intelligent, and intimidating anarchists theorists who have attained a god-like vantage point and critique the entirety of the scene not to mention the whole of capitalism, modernity, and the state. | 2024-06-13T01:26:19.665474 | https://example.com/article/8262 |
Police have charged two teenagers over a fire that destroyed a home and tore through bushland at Peregian Beach in Queensland.
Key points: Police say the blaze was deliberately lit about 4.30pm on Monday
Police say the blaze was deliberately lit about 4.30pm on Monday The fire spread fast, with the blaze gutting one home, severely damaging another and destroying bushland
The fire spread fast, with the blaze gutting one home, severely damaging another and destroying bushland A Queensland police taskforce has been set up to investigate the cause of 10 fires across the state
A 14-year-old Peregian Springs boy and a 15-year-old Coolum Beach girl were charged with endangering particular property by fire on Wednesday afternoon.
Police allege they were among a group of juveniles who gathered in bushland off Koel Circuit in Peregian Springs about 4.30pm on Monday, when a fire was deliberately lit.
The blaze quickly spread towards Peregian Beach, forcing hundreds of residents to evacuate the area.
One home was completely destroyed in the fire, another was severely damaged and large portions of bushland were destroyed.
It took firefighters two days to contain the fire, with the emergency declaration for the area lifted on Wednesday afternoon.
Residents were allowed to return to their homes, however, spot fires continued to burn in the area.
Space to play or pause, M to mute, left and right arrows to seek, up and down arrows for volume. Watch Duration: 32 seconds 32 s Embers were fanned by strong winds, creating a hellish scene on the Sunshine Coast.
Queensland Fire and Emergency Service (QFES) Inspector Chris White praised the work of firefighters, who remained in the area on Wednesday afternoon to dampen hot spots.
"We have some predicted wind speeds that may be a problem [on Friday and Saturday], but technically with the support we're hitting this fire with at the moment, everything should be blackened out in that Peregian area," he said.
Loading
The QFES told people to avoid walking in areas hit by the fire, warning of the possibility of hot spots under the sand that could still "cause significant damage".
The charges came after police set up Taskforce Overcross to investigate the cause of 10 fires across the state.
Earlier on Wednesday, Police Commissioner Katarina Carroll said 11 people, some juveniles, were being dealt with by detectives.
"In some cases it's just kids lighting fire for fun [and] that fire has gotten away and impacted very badly," she said.
"[While] other kids got together and purposely lit fires, and in other cases there have been recidivous offenders around arson and police have dealt with them appropriately."
Southern Region Assistant Commissioner Mike Condon said there was evidence to suggest the fire near Stanthorpe on the Granite Belt, that destroyed at least five homes over the weekend, may have been accidentally lit. | 2024-05-10T01:26:19.665474 | https://example.com/article/3496 |
Q:
Android: Java: Proguard: How to: verify if my jar (different jar project)/apk are successfully processed? (I am thinking to reverse engineer it)
I successfully processed my jar and apk. Then, want to verify if is it truly hard to reverse engineer or truly did the obfuscation.
I am thinking to try to reverse engineer it by myself to see what I did. But don't know how to do it.
A:
For manual reverse engineering, you can try dex2jar and then Java Decompiler.
| 2024-04-10T01:26:19.665474 | https://example.com/article/8550 |
What The Tech? New Year, New HVAC Rule!
Hello, Welcome, What’s Up?
You’re here because you’re looking for information about flat rate pricing and ideas on how to take your service business to the next level. Good news is that’s exactly what the Coolfront blog is designed to do.
No sales pitches. No gimmicks. No jargon. Just HVAC industry news, tips, and insights from a team of people who get the biz, so you can stay at the top of your game. Because we’re your sidekick for success – and that’s what sidekicks do. Take a look around & stay awhile!
Start Exploring
Search the blog
By Jim Knapp
Efficiency rules for the HVAC/R industry since 1975 have come from the DOE (Department of Energy). I think most of us have gotten used to the periodic changes in new equipment. Next year we will have another efficiency mandate to keep in mind. DOE rule 79 FR 38129 prescribes the minimum FER (fan energy rating) that is required for the blowers in new residential air handlers and furnaces. The rule takes effect July 3, 2019. The rules regarding how to test for fan energy ratings are still under discussion, so nothing is final. However, since the most significant improvement that designers could make to a blower is to improve the motor efficiency, the new standard will most likely require most manufacturers to start including ECM motors as standard equipment in all models.
Of course this new rule won't affect existing equipment, or repairs to older equipment. The rule doesn't have any requirements to replace existing PSC (permanent split capacitor) motors with new ECM motors during a repair. However, a good argument can be made for doing just that.
Most manufacturers have been including many more ECM (read X-13) motors in their lineups. That's because of the efficiency standards changes in 2016 for cooling equipment. One of the ways to improve overall SEER rating was to use ECM motors in the blowers of package units and air handlers. The prices of these motors has begun to creep downward because of the increased production.
There are more motor manufacturers making ECM motors than there were before. That makes for competitive improvements in quality and for lower prices, as well.
Many replacement ECM motors have programming software available. As that becomes more common you may only have to carry a few motors on service trucks to cover a wide range of applications. That would mean fewer trips to the store.
Some motors have Bluetooth programming abilities, making it possible to program fan speed while the equipment is operating. Faster set-up and better efficiency. There's no doubt that this type of intelligent control will become the norm.
Many of the new ECM motors have built-in surge protection, eliminating one of the weaknesses of the older models.
And let's not forget that the customer gets quieter, less expensive performance from ECM motors. Savings vary depending on fan usage, but there is always a positive payback for the customer.
There are some things to keep in mind when replacing a PSC motor with an ECM, or when installing new equipment that has an ECM blower on an existing duct system.
Over the years the biggest complaint about ECM motors has been that the thermistor in the commutator fails too often. It's common to hear of installations where the motor module needs replacing two or three times during the warranty period. Failing thermistors are almost always caused by undersized duct work. Because these motors have some intelligence, they will try to match the static pressure or the torque that their programming calls for. Overcoming high-static pressure causes the thermistors to overheat (too much current flow) and eventually fail. Like a good dog they try to satisfy their master at any cost to themselves.
Oversized duct work will also cause problems with ECM motors. It's that intelligence thing, again. By telling the motor how much air to move to satisfy the equipment needs it is easy to ignore the duct sizing. Moving air too slowly through a duct system can cause wasted energy, sweaty ducts, uneven distribution and uncomfortable customers.
The manufacturer can program the 5 connections in an X-13 motor any way they want. High speed could be tap 1, or it could be tap 5. If you've ever tried changing fan speed on an X-13 and felt that there was no difference between one tap and another, it might have been because the motor was only programmed with one or two speeds. The point here is that you should read the set-up instructions carefully for good results.
With better motors, lower prices, and careful duct sizing these motors will be a real boon to your profits and to customers' satisfaction. | 2023-08-02T01:26:19.665474 | https://example.com/article/5624 |
Q:
Parameter upcasting in Forms: buildForm works, submitForm doesn't
Route:
mymodule.applications.payment_form:
path: '/payment/{submission}'
defaults:
_form: '\Drupal\mymodule\Form\PaymentForm'
_title: 'Pay Fee'
requirements:
_role: 'applicant'
options:
parameters:
submission:
type: entity:webform_submission
This works:
public function buildForm( array $form, FormStateInterface $form_state, WebformSubmission $submission = NULL) {
$submission_data = $submission->getData();
This doesn't (null):
public function submitForm(array &$form, FormStateInterface $form_state, WebformSubmission $submission = NULL) {
$submission_data = $submission->getData();
Is it intentional that upcasting is only available to buildForm?
Is there a workaround?
(My logic being: the form, when submitted, still POSTs to /payment/123, so it's still convenient to load the object.)
A:
Yes, this is intentational. submit and validate callbacks aren't tied to the request, they only receive exactly those two arguments.
As mentioned in the comments, you can store the information either on the object, with $form_state->get()/set() or a form elemnt of #type value, doesn't make a big difference which you chose.
You could also store only the ID instead of the whole object but actually, I believe it is stored anyway in form_state somewhere when you pass it as an argument to the form (pretty well hidden though, so better to store & access it in a more explicit place)
| 2024-07-08T01:26:19.665474 | https://example.com/article/2354 |
/*
Copyright IBM Corp. 2017 All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package validator
import (
"github.com/hyperledger/fabric/protos/common"
"github.com/hyperledger/fabric/protos/peer"
)
// MockValidator implements a mock validation useful for testing
type MockValidator struct {
}
// Validate does nothing, returning no error
func (m *MockValidator) Validate(block *common.Block) error {
return nil
}
// MockVsccValidator is a mock implementation of the VSCC validation interface
type MockVsccValidator struct {
}
// VSCCValidateTx does nothing
func (v *MockVsccValidator) VSCCValidateTx(payload *common.Payload, envBytes []byte, env *common.Envelope) (error, peer.TxValidationCode) {
return nil, peer.TxValidationCode_VALID
}
| 2023-12-31T01:26:19.665474 | https://example.com/article/5028 |
This invention relates to an index bar device which includes keystroke function and particularly to an index bar device that couples with a sliding means and an elastic means to perform keystroke function.
Index input devices are widely used in various type of computer input devices such as control panel, keyboard, remote control device and the like. The embodiment of the index input device may be in the form of mouse, joystick, touch pad, track ball, pointing stick and the like. The basic principle of the index input device application is to generate analog signal base on strain resulting from force applying on the index device at a selected direction. The analog signal output is used by computer for performing required function. FIG. 1 shows a typical example. An index bar means 3 is located between keys of a keyboard 2 in a notebook computer for sensing the strain resulting from user""s force applying direction and generating signals for computer cursor movement.
However conventional index bar devices mostly focus their function on cursors movement. They cannot perform other function on cursor movement. They cannot perform other function such as the left key (for selection) of the mouse with satisfactory result. When performing the selection function on the index bar, a user normally has to hit the top end of the index bar twice to simulate the keystrokes on the left key of the mouse. Because of index bar device structure nature, hitting the index bar on the top usually has the feeling of hitting on a hard surface. It does not have the xe2x80x9cclickingxe2x80x9d feeling and sound the keystroke on the left key of the muse produced. It is less user-friendly and begs for improvement.
It is therefore an object of this invention to provide an improved index bar device that includes keystroke function so that user may use more conveniently and comfortably.
The index bar device according to this invention include a sliding means and an elastic means to provide keystroke function like the left key of the mouse. It may be used in a computer. It constitutes a base, a track frame, an index bar sliding means and an elastic switch means.
The base may be a base board of an input device such as the keyboard, mouse and the like or a separate board to be used in a computer.
The track frame is mounted on the base to provide a track space for reciprocal movement.
The index bar sliding means is movable in the track frame and includes a slide block and an index bar. The slide block is movable in the track space and has a hole formed therein. The index bar is fixedly engaged with the hole and has a first end extending outside the track frame and a second end located in the hole or extending outside the bottom of the slide block.
The elastic switch means is fixedly located on the bas and makes contact with a bottom of the index bar sliding means. It can generate a restoring spring force when being compressed by the index bar sliding means.
According to this invention, when the index bar receives force from the first end toward the second end, the index bar sliding means moves along the track frame and compresses the elastic switch means for a selected displacement. This compressing movement may generate a keystroke signal through a properly designed circuit.
In one embodiment of this invention, the track frame may be a hollow casing including a top opening. The index bar sliding means is movable within the boundary of the hollow space and the first end of the index bar runs through the top opening.
In another embodiment of this invention, the track frame may be a turtledove tail-shaped groove and the index bar sliding mean is a mating turtledove tail-shaped block movable in the track frame. Or the track frame may be a turtledove tail-shaped block while the index bar sliding means has mating tail-shaped groove.
In yet another embodiment, the track frame may be a thick board with a top opening. The index bar sliding means may be movable and limited in the top opening.
The elastic switch means may be a compression spring with the top end serving as the compression contact point, or a dish type elastic member having a bulged middle section to serve as the compression contact point, or a cantilever type member with a free end to serve as the compression contact point.
The index bar and the index bar sliding means are tightly engaged through a hole in the index bar sliding means. The engagement may be a forced sliding means. The engagement may be a forced coupling, adhering and the like. However it""s preferably done by theremo setting.
The compression contact between the elastic switch means and the index bar sliding means may be the second end of the index bar or the bottom end of the slide block. | 2024-03-13T01:26:19.665474 | https://example.com/article/2281 |
Q:
What could go wrong if one misconstrue Buddhism with nihilism?
I see that Buddhism is absolutely not nihilism, but I wonder what could go wrong if one misconstrue one with another. This is especially true with people with psychological issues, because they have to experience an amount of suffering more than normal when they are young. For example, for persons with borderline personality disorder, they constantly has these feelings:
Extremely fear of being abandoned
Unstable self-image
In this example case, since Buddhism teaches that acknowledging everything is impermanent you won't be afraid of being abandoned. The unstable self-image also matches with the idea of anatman, therefore the idea of impermanence will have a strong impact to them. But in fact, this is just clinging on the idea of impermanence.
Many people with psychological disorders knows that they are the trouble, so they want to limit relationships at all cost to protect the person involving them. To justify this behavior, they may use nihilism. But when it become a habit, it's really hard for professional therapists to help them, because they now have a reason to continue the behavior.
I know you may not have much understanding on such cases, but I'm not asking about it either. I just want to know that if someone is misconstruing Buddhism with nihilism, then what suttas/teachings they contradict with.
Note that my understanding on philosophy is not very concrete. It's possible that I should replace "nihilism" with "impermanencism".
Related:
• Is Buddhism Nihilistic?
• How to not slip into Nihilism from Vipassana?
• Why is Buddhism not Nihilism?
• Is there a kind of consulting service in Buddhism?
• When would a Buddhist want to attach?
• Does Buddhism give methods to ask questions when you are proliferating?
A:
I've no formal experience with borderline personality disorder, this answer isn't intended to be relevant to that.
I've seen posts on this site where people say, "If you don't believe in rebirth then you believe that death ends everything (and ends suffering). But if you really believed that death ends then why wouldn't you just kill yourself? Therefore you must believe in rebirth." I think that (i.e. the belief that death ends suffering) is one of what Buddhism identifies as "a wrong view" and might be translated as nihilism (or "annihilationism"). There's even a sutta in which some monks do kill themselves and the Buddha clarifies that that wasn't right.
Conversely I think that the (non-Buddhist) Bhagavad Gita too seems like a wrong view to me (at least as far as I understand it). I think there's a scene where someone is faced with 'enemies' before a battle, and he doesn't want to kill them because they're his kin, and the God says to him something like, "But they're going to die anyway, everyone does, they're mortal[s]. Now you should go and fight (and kill) them because that's your social duty, the job you were born to do (by being born into the warrior or ruling class, I guess), and therefore your holy duty." The Buddhist doctrines of emptiness and anatta notwithstanding, I think that "There is no father, no mother, no teachers" and so on is explicitly declared to be another wrong view.
There's a hint of that in the Zen story which is titled, Nothing Exists.
That's about it, I'm not sure what else would count as nihilism. Possibly despair, a feeling of helpless -- or a feeling of heedlessness -- a view like, "It's all impermanent, nothing makes any difference, no point in even trying anything."
I read the link you posted, e.g. ...
Frantic efforts to avoid real or imagined abandonment by friends and family
... but, sorry, I'm not sure how to advise about that or even what it has to do with nihilism exactly. I think I see it's related to psychological "attachment theory". The Buddhist doctrine I've learned doesn't seem to me to be very much about such relationships, except things like this and doctrine about the brahmaviharas. And the "refuges", the three jewels, suggest maybe people shouldn't put their faith in friends and family and so on.
On the other hand something like DN 31 says there is such a thing as proper behaviour for a layperson, and there is a difference between a good friend and a bad friend, that there are duties between between family members (and so perhaps to that extent, "good" and "bad" family members), maybe that's worth knowing too.
... so they want to limit relationships at all cost to protect the person involving them.
I suppose it's because a therapist isn't too attached, and because they're motivated to "first, behave ethically (and/or 'professionally')", and is "disinterested" i.e. needs no help from the patient, but not "uninterested" so there is two-way communication, I think those are reasons why a a patient needn't fear that they may hurt and therefore must protect their therapist (though shying away might be a habit that's hard to break, and sharing personal information might be a skill like any other which if it hasn't been learned already might be difficult to practice).
Instead of being entangled (in a relationship), protecting a partner or protecting oneself from a partner, perhaps with a therapist it's clearer (to the patient) that it's the patient who will "inherit their own kamma":
I am the owner of my actions (kamma), heir to my actions, born of my actions, related through my actions, and have my actions as my arbitrator. Whatever I do, for good or for evil, to that will I fall heir...
I think that that doctrine -- that reflection or observation -- is used, to say that it matters what you do and what you intend: because that actually makes a difference (to you, to your future self, and/or to whoever may exist in the future).
I think that Buddhism also uses this doctrine to teach some equanimity towards others (e.g. that "they are heir to their own kamma") -- the brahmaviharas -- i.e. you're supposed to feel kindness and compassion (maybe being harmless and helpful, not hurtful), and admiration (for someone's virtues, instead of being jealous or pitying), but also equanimity (disentangling).
The bit about heedlessness is what I'm talking about. Can you elaborate?
I think that the "there's nothing I can do that makes a difference" view is a wrong view, perhaps canonically associated with a view that "what happens is predetermined or predestined" -- possibly a clockwork universe theory -- i.e. that past kamma determines everything about "now", and will also continue to determine everything about the future, and so there's no sense in trying and no personal responsibility for anything.
I think the Buddhist view is that, in contrast, a) kamma is intentional action; b) past kamma does affect the present but isn't the only thing that affects the present (e.g. a hurricane isn't a result of kamma, though how you react to a hurricane might well be); c) what you do now (and what you intend now, i.e. new kamma) does make a difference -- whether you intend good, intend evil, or even intend to "end" kamma.
Also if the "clockwork universe" theory is about physics, Buddhism is about the mind, for example:
Mind precedes all mental states. Mind is their chief; they are all mind-wrought. If with an impure mind a person speaks or acts suffering follows him like the wheel that follows the foot of the ox.
Mind precedes all mental states. Mind is their chief; they are all mind-wrought. If with a pure mind a person speaks or acts happiness follows him like his never-departing shadow.
"He abused me, he struck me, he overpowered me, he robbed me." Those who harbor such thoughts do not still their hatred.
"He abused me, he struck me, he overpowered me, he robbed me." Those who do not harbor such thoughts still their hatred.
Hatred is never appeased by hatred in this world. By non-hatred alone is hatred appeased. This is a law eternal.
There are those who do not realize that one day we all must die. But those who do realize this settle their quarrels.
Being "heedful" in't easy. Canonically it was the Buddhas final advice, the last words of the Buddha:
vayadhammā saṅkhārā appamādena sampādethā
The opposite of "heedfulness" might be likened to a "drunkenness".
I say "not easy", maybe it's like that famous bit of advice to Christians, "be perfect".
Anyway I think that being "heedful" may be related to being "mindful", some ability to concentrate, or if not "concentrated" then to not get carried away -- to remain in the present.
Incidentally the classifications in the DSM are quite approximate:
It says e.g. "this not that" where really people are a bit of both
Also "this" might be a characteristic of relatively healthy people too, what makes it unhealthy is a matter of degree (doing it "excessively"), where the definition of "excessive" is difficult to assess if you're, like, not professionally trained, and to some extent it's a matter of personal choice.
Anyway, apart from "BPD" there's another diagnosis, "PTSD", which for all I know (i.e. little) might be similar in one way -- i.e. it's where someone has (had) a traumatic experience and keeps "re-living" it. One of the psycho-therapeutic therapies for that is what they call "mindfulness" (that's probably not exactly what the Buddhist canon defines as "mindfulness", but still), especially trying to be mindful of or to remember the present (instead of re-living the past).
It's "maladaptive" behaviour e.g. it's fearing a threat where there isn't (or shouldn't be) one in the present.
Perhaps that's some form of "attachment" but an attachment to a past undesirable event.
An actually that might be another side to "impermanence" i.e. sometimes it's difficult to get that some past threat, a threatening situation, is over and finished, that the present situation is different, is changing.
I imagine there are lot of ways in which Buddhist doctrinal views could be applied to psychotherapy, or vice versa, maybe I see some parallels (but I haven't experienced that, not been trained).
| 2024-04-26T01:26:19.665474 | https://example.com/article/2738 |
Idyllwild, California — As Mayor Pete Buttigieg and the other primary candidates await the final results in Iowa, Mayor Max knows exactly where he stands with voters in Idyllwild, California. Max is a golden retriever who has won three consecutive elections in the small, picturesque town.
Phyllis Mueller is Max's chief of staff and she funds the mayor's office out of her house. Idyllwild doesn't have a local government, so residents there elect a ceremonial mayor.
"Our animal rescue group came up with the idea to have it be a fundraiser where you paid a dollar a vote," said Mueller.
Mayor Max CBS News
Like most successful mayors, Max has a nose for politics. At a time when the country seems more divided than ever, Mayor Max's non-partisan ways are clearly bringing people together.
"They like the break from the divisiveness of politics," Mueller said. "They appreciate the lightheartedness of it."
| 2024-04-14T01:26:19.665474 | https://example.com/article/1867 |
There may or may not be a Web 2.0 crash coming, as Steve Rubel has predicted, but there’s certainly blood in the water, with Yahoo’s earnings miss, Gather.com’s bad reviews, the demise of SearchFox, and the gathering buzz about an impending crash. Steve thinks a key factor is that “online advertising isn’t growing as fast as we would all like to think or hope” — online advertising is still on a steep upward curve, but Steve’s probably right that there’s not enough to go around, and the market will have to get rid of the Web 2.0 chafe.
I think another big problem is that Web 2.0 is driving Media 2.0 (or “New Media,” the other term I’ve been using). I’ve argued that if Media 2.0/New Media is based on Web 2.0 applications, it’s going to overwhelm the average person. Web 2.0 is a great platform for building applications that make everyday tasks easier, e.g. Google (search), eBay (sell/buy), Amazon reviews/recommendations (shop), and Flickr (organize/share photos) — I think Flickr is the poster child for successful Web 2.0 applications.
**Here’s the problem — Web 2.0 is not a great platform for helping the average person consume media. **
Consumer-created media is transforming the content landscape for the better, and consumer-controlled media is undoubtedly the new paradigm. But the average person does not have much time (if any) to spend creating media and has patience for only a finite amount of choice. Bloggers and others who put a lot of time and effort into media consumption and media creation are outliers — people may want something more customized than the morning paper, but they still want the simplicity and leisure feel. Media based on Web 2.0 is just too hard.
Mitch Shapiro, over at IP&Democracy, understands the problem and has an interesting meditation on Memeorandum, in which he acknowledges that next generation of functionality (e.g. highly-customized RSS feeds) still “wouldn’t reach the ‘ease of use’ levels provided by Media 1.0 publishers.” Static media is on its way out, but “ease of use” remains the currency.
That’s why I’m not jumping on the Newsvine bandwagon. I think it’s a great application for bloggers and other cybergeeks, but it’s WAY too much work for the average person. So is Digg, and so is del.icio.us — most people don’t have time to do a lot of voting, tagging, saving, and commenting — there’s already too much filing and sorting to do at work and with the monthly bills. For the average person, media consumption consists of reading or viewing and then moving on to something else.
As happened with Wikipedia, a hardcore group of users may turn Newsvine into a successful site, but most people will just browse — they won’t participate. And a lot of people will be bewildered and turned off.
Contrast these Web.20 media sites, which make the task at hand (media consumption) more difficult, with Flickr, which makes the task at hand (organizing/sharing pictures) easier. Here are some numbers to consider. First, compare the traffic curves for Flikr and Digg:
I would argue the difference here is that Flickr has broken through into the mainstream, while Digg is limited to the “technorati” (to borrow an elitist term). Compare Flickr to de.lici.us and you see the same thing:
No doubt I will get lectured on technology adoption rates, but before you lecture, think about whether your own experience with technology represents that of the average person — I use the term “average person” on purpose, because I think the media habits of those in the blogosphere (which pretty much overlaps with power users of Web 2.0) are not representative of mainstream media consumers.
For bloggers and other people with the drive to create their own media, Web 2.0 media applications give them the infinite control they crave. But for the average person, what pressing problem does Newsvine, Digg, or de.licious solve? (Don’t get me started on RSS — I’ll put on my body armor and do that in another article.)
What the average person needs from New Media is not infinite choice and infinite control, but rather a user-friendly way to get their arms around — and find the value in — the avalanche of new content being created. They need more than aggregation — they need filtering, and even more, they need synthesis.
In another article, I’ll go into the difference between synthesis and aggregation. For now, I’ll end with an observation about MySpace. Here are the traffic curves for MySpace and Flickr:
I’ll ask the same question — what problem does MySpace solve? It’s not about media consumption, and it’s not even about content creation — it’s about what young people in particular want to do most — socialize. MySpace makes it easier to hang out and be seen. It makes it easy to create your own space — something that is difficult for teenagers, indie bands, etc.
The New Media revolution will happen when someone figures out a way to solve the problem that the average person has with media, the same way that Google, MySpace, and eBay solved problems for average people — which means we need to start with understanding the average person’s problem, not with the techno-geek’s solution. | 2024-04-08T01:26:19.665474 | https://example.com/article/6805 |
Subscribe on iTunes, Google Play, or by RSS for more space exploration discussions. (Recent radar images of Tiangong-1 acquired by the Fraunhofer radar in Germany weeks prior to reentry.
ESA / Fraunhofer / FHR
This week on SPEXcast we discuss the recent Iridium launch and the controversy between SpaceX and the NOAA. We also delve into StarLink updates, Blue Origin’s New Glenn, and Tiangong-1.
SpaceX Iridium-5 Launch Drama
SpaceX's fifth launch of Iridium NEXT satellites on 3/30/2018 was anything but ordinary.
NOAA Licensing
During the livestream, SpaceX usually has live camera feeds from the first and second stages. Perhaps the most famous example of this was the multi-hour stream from the FH second stage, which showed Starman drifting away from Earth on the way towards Mars. However, this camera feed was cut, with SpaceX citing new regulations from the National Oceanic and Atmospheric Administration (NOAA). This statement caused a good deal of confusion across the space industry, into exactly what rule had been violated and why it was just showing its effects now.
The story begins with the National and Commercial Space Programs Act which established a procedure in which commercial companies could be licensed to record images of the Earth's surface from orbit. The intent was to provide a regulatory framework so that remote sensing companies could comply with international law, as well as preventing unrestricted imaging of national security assets (military bases, ports, Area 51, etc). However, the NOAA had not applied this rule to the second stage video cameras of rockets until this past launch. Spacenews investigated, asking the NOAA and SpaceX for comment, and the Advisory Committee on Commercial Remote Sensing provided an opportunity to ask CRSRA about launch cameras.
According to the NOAA, they had been unaware of the prior 50 Falcon 9 flights, almost all with functioning second stage cameras. SpaceX approached NOAA four days before the launch and was able to get a provisional license, however one that did not allow for live streaming video from orbit.
At the time, many saw this new application of the National and Commercial Space Programs act, as an overreach. Concerns have been raised at the rate at which the CRSRA can approve licenses for launch.
"Samira Patel, an analyst with the Aerospace Corporation supporting CRSRA, said that in 2015 the average review time for a license application was 210 days, with only 1 of 15 applications completed within the 120-day time limit established in federal law. In 2016, that decreased to an average of 140 days, with 5 of 12 applications reviewed within 120 days."
"Last year, Patel said the office completed reviews of license applications on an average of 91 days. Only 2 of 16 applications took more than 120 days, she said, “and that was only by a few days. - Via Spacenews"
As launch companies like SpaceX aim for launches every two weeks, and small launcher companies like Vector aim even higher, anticipating hundreds of launches per year, does it make sense to require this kind of licensing process? Second stage cameras are usually not equipped with telescopic optics, and therefore have poor resolving power of ground features. The stream is also relatively low resolution, 1080p video or less with compression artifacts. Its hard to make a case that this video footage presents a national security concern, or even commercial value for remote sensing. However, rocket are an increasing popular spectator sport, and continuous video coverage helps drive public interest in commercial spaceflight. The CRS-14 mission from Cape Canaveral drew a crowd so large it filled up almost all the usual viewing locations and caused a large amount of traffic.
A guard told me @ExploreSpaceKSC lot is full, yet thousands are stranded on road, barely moving, no guidance, no traffic support, moms and children getting out of cars and walking on side of road in the heat. Sad! — James Dean (@flatoday_jdean) April 2, 2018
There has been an effort to declassify second stage cameras from requiring licensing. The American Space Commerce Free Enterprise Act proposed last year would add a provision for waiving the requirement for cameras that are not the main purpose of the satellite. This joins the general sentiment of reforming U.S. space policy when it comes to commercial space activities. The second meeting of the National Space Council was primarily focused on regulatory reform.
Fairing Reuse
Iridium-5 also saw another attempt to land a fairing on a recovery ship out at sea. Investigators on NSF discovered that the guided parafoil system used by SpaceX to steer the fairing is most likely provided by a company called MMIST.
A modified version of their Sherpa Precision Aerial Delivery System might be in use to guide the fairing to its target
More information on the fairing recovery system was also released after recording. As found on Reddit, including statistics on the parachute system.
The environmental impact report for dragon landings in the Gulf of Mexico mentions fairing recovery and provides new details. The system includes a drogue chute, which is useful for slowing down the fairing and ensuring a stable orientation at high speeds. Once the fairing is at a lower altitude in denser air, the parafoil can deploy and provide active guidance.
The parafoil is a form of inflatable wing, where airflow fills semi-closed fabric structures, creating a ridgid wing surface during flight.
This rendering show the fairing in flight with a fully deployed parafoil.
The report also estimates the rate at which SpaceX plans to recover fairings.
"15 missions with recovery attempts in 2017-2018 period. 4 of these expected to be attempting recovery of both fairing halves. Additional 2 attempted recoveries of both fairing halves in later 2018 (my interpretation). 2018-2024 expected fairing recoveries (both halves) on 240 missions total. SpaceX anticipates recovery attempts on 3 missions per month from 2019-2024." - via u/Nehkara
Recovering and eventually reusing fairings on 240 missions could provide savings of close to $1.5 billion ($6 million per fairing pair). As flight rates increase across the industry, fairing reuse becomes an interesting opportunity to save significant sums of money.
Lastly, Elon provided some insight on the result of the fairing recovery attempt on Iridium-5.
GPS guided parafoil twisted, so fairing impacted water at high speed. Air wake from fairing messing w parafoil steering. Doing helo drop tests in next few weeks to solve. — Elon Musk (@elonmusk) March 30, 2018
Hopefully, actual video coming soon. Aiming to improve the link quality so it can be real-time. — Elon Musk (@elonmusk) March 31, 2018
Oh yeah, forgot to mention it actually landed fine, just not on Mr Steven pic.twitter.com/HckB2OkJ5L — Elon Musk (@elonmusk) April 2, 2018
SpaceX's fairing recovery development program has been following a somewhat similar path to their booster reuse program. By using paying flights, they are able to generate revenue, even if the test is a failure. With helicopter drop tests and real-time video coming in the near future, it will be exciting to watch the program finally find success over the coming months.
On the show, we talked about Project Blackjack, a government program to leverage commercial satellites to provide more capability and increased survivability to military satellite services. Mega-constellations like StarLink could use a part of their capacity to serve government needs. This would mean satellite communications networks would be much harder to disrupt and destroy in the event of a conflict, since hundreds or thousands of satellite interceptors would be needed to destroy enough satellites to disable the constellation. Commercial operators also have the production capacity to rapidly replace and replenish these constellations, in comparison to the slow procurement process of DoD satellites, which could span years.
New Glenn changes
Blue Origin announced that it would no longer be using a BE-4 engine optimized for vacuum use as the powerplant of New Glenn's second stage. Instead it will be using a BE-3 optimized for vacuum, a derivative of the first stage engine used for New Shephard. The switch brings up several questions, which we discuss in the show, but it will be interesting to see how New Glenn evolve as it it inches closer to first flight. When originally announced, BO proposed a 2-stage and 3-stage variant, with the 3-stage vehicle using a hydrolox third stage powered by BE-3. We also saw two fairing variants, and BO recently standardized on a single, larger fairing.
Tiangong-1 reenters
We discuss the Tiangong-1 re-entry on the show, as well as the difficulties of predicting uncontrolled atmospheric re-entry of large objects. We recorded several days before the impact, but the final re-entry was on April 2nd at 00:16 Universal Time, over the South Pacific. | 2023-09-05T01:26:19.665474 | https://example.com/article/7055 |
Q:
Limit number of results for glob directory/folder listing
How would I go about limiting the number of directory results/pdfs to, say 8, in the following code?
$counter = 0;
foreach (glob("/directory/*.pdf") as $path) { //configure path
$docs[filectime($path)] = $path;
}
krsort($docs); // sort by key (timestamp)
foreach ($docs as $timestamp => $path) {
echo '<li><a href="/directory/'.basename($path).'" class="'.($counter%2?"light-grey":"").'" target="_blank">'.basename($path).'</a></li>';
$counter++;
}
This is probably really easy but I can't seem to be able figure it out - thanks in advance, S.
A:
foreach (array_slice(glob("/directory/*.pdf"),0,8) as $path) {
| 2023-08-02T01:26:19.665474 | https://example.com/article/4410 |
Rixwell Old Riga Palace Hotel
Add Comment or Review about Rixwell Old Riga Palace Hotel
Name:
*
Reviews and Comments for Rixwell Old Riga Palace Hotel
There is no any comments or reviews yet. Do you know something about Rixwell Old Riga Palace Hotel which is located in Minsterejas iela 8/10, Rīga, , LV-1055, Latvija? Please add your comment or review about this place and help others to know more about Rixwell Old Riga Palace Hotel. | 2024-04-04T01:26:19.665474 | https://example.com/article/4505 |
Second-trimester pregnancy termination with 600-microg vs. 400-microg vaginal misoprostol and systematic curettage postexpulsion: a randomized trial.
This study was conducted to compare efficacy and safety of 600 mcg of misoprostol vaginally every 6 h up to four doses vs. 400 mcg of misoprostol vaginally every 4 h up to five doses, followed by systematic curettage of the uterine cavity, for pregnancy termination between 12 and 20 weeks' gestation. We used a randomized clinical trial conducted at Hospital Gineco-Obstétrico "Eusebio Hernández", Havana, Cuba. Subjects were women requesting voluntary termination of pregnancies between 12 and 20 weeks' gestation. Two hundred ten women were randomly assigned to receive 600 mcg of vaginal misoprostol every 6 h up to four doses (Group I) vs. 400 mcg of vaginal misoprostol every 4 h up to five doses (Group II), followed by curettage 1 h after expulsion. The main outcomes measured were successful abortion rate and mean expulsion time. Successful abortion occurred in 103/105 women (98.1%) in Group I and in 99/105 (94.3%) in Group II [p=.279, relative risk (RR)=3.121 and 95% confidence interval for RR=0.615 to 15.833]. Fetus mean expulsion time was 10.7+/-1.3 (SD) h in Group I and 11.5+/-5.0 (SD) h in Group II (p=.209). Six hundred micrograms of misoprostol administered vaginally every 6 h was as effective as 400 mcg of misoprostol every 4 h for second-trimester pregnancy termination. | 2023-12-10T01:26:19.665474 | https://example.com/article/3372 |
Q:
Java - Super.toString() method in base class?
My question is what is the reason to write Super.toString() in base class and what it returns and why ?
this is my code :
class Person {
public String toString() {
return super.toString() /*+ "->" + "Person" + name + "------"*/;
}
}
what is supposed to be return ? and thanks i m beginner in java
A:
Your class Person should extend parent class where you define method toString(), otherwise your parent class is class Object and the native method of this class is going to be used:
public String toString() {
return getClass().getName() + "@" + Integer.toHexString(hashCode());
}
So, you will get a string that consisting of the name of the class of which the object is an instance, the at-sign @, and unsigned hexadecimal representation of the hash code of the object
It's recommended that all classes (subclasses of class Object) override this method.
| 2024-05-06T01:26:19.665474 | https://example.com/article/5139 |
Can I find a doctor? Availability of primary care physicians in the San Francisco Bay Area.
Primary care physicians function as "gatekeepers" in many managed care systems. With the rapid growth of managed care enrollment, it is crucial that patients have adequate access to primary care physicians. We investigated factors associated with new-patient appointment availability of primary care physicians in the San Francisco Bay Area. Observational cohort. Cross-sectional survey of primary care physician offices in 2 San Francisco Bay Area counties (n=438). New-patient appointment availability. Seventy-five percent of primary care physicians participating in managed care had an appointment available for a new patient. Appointments were more likely to be available with primary care physicians who had been in practice for 10 years or less (odds ratio [OR]=4.2; 95% confidence interval [CI], 1.7-10.3), compared with more established physicians; and with primary care physicians who had graduated from a medical school outside of the United States (OR=3.5; 95% CI, 1.7-7.3), compared with US graduates. Appointments within 30 days were less available with female primary care physicians (OR=0.4; 95% CI, 0.2-0.7) than for male primary care physicians. The limited availability of appointments for new patients may create barriers to primary care in the San Francisco Bay Area, a region with high managed-care penetration. | 2024-03-21T01:26:19.665474 | https://example.com/article/9125 |
Hemostasis and fibrinolysis activation after subarachnoid hemorrhage.
The authors assessed hemostasis and fibrinolysis serially: on admission and on the 1st and 7th days after surgery for subarachnoid hemorrhage (SAH), examining the complications of aneurysm rupture and its surgical repair. Of 32 patients, 25 with SAH were compared with seven control patients who underwent surgery for an unruptured intracranial aneurysm. On admission, patients with SAH had higher thrombin-antithrombin III complex (TAT) levels (13.3 +/- 3.8 vs. 3.8 +/- 0.6 ng/ml, p = 0.01), fibrin degradation product, D-dimer levels (1310 +/- 220 vs. 556 +/- 89 ng/ml, p = 0.0001), and leukocyte counts (14.6 +/- 0.7 vs. 10.6 +/- 1.8 x 10(9) cells/L, p < 0.05) than did control patients. Postoperative D-dimer values (p = 0.007) remained higher in the SAH group. Furthermore, admission D-dimer levels were higher in the patients in poor clinical condition than in those in good condition (2017 +/- 377 vs. 934 +/- 208 ng/ml, p = 0.007), and D-dimer levels were associated with the outcome at 3 months after admission. Additionally, thrombin generation and fibrinolytic markers measured on admission were related to clinical grade, amount of subarachnoid blood seen on computerized tomography (CT) scanning, and patient fatality. Patients with hypodense lesions verified on follow-up CT scanning or with persistent neurological deficits at 3 months had higher prothrombin fragments 1 and 2, TAT, D-dimer, and plasminogen activator inhibitor-1 values on the 1st day postoperatively than did patients without such lesions. In short, in patients with SAH, activation of coagulation and fibrinolysis was strongly associated with clinical state, patient fatality, and outcome at 3 months, and postoperatively this activation correlated with the development of brain infarction. | 2023-08-02T01:26:19.665474 | https://example.com/article/7002 |
/* Copyright (c) 2012 Stanford University
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR(S) DISCLAIM ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL AUTHORS BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <cinttypes>
#include <google/protobuf/message.h>
#include <memory>
#include <queue>
#include "Core/ProtoBuf.h"
#include "RPC/Service.h"
#include "RPC/ServerRPC.h"
#ifndef LOGCABIN_RPC_SERVICEMOCK_H
#define LOGCABIN_RPC_SERVICEMOCK_H
namespace LogCabin {
namespace RPC {
/**
* This class is used to mock out a Service for testing a client that sends
* RPCs.
*/
class ServiceMock : public RPC::Service {
public:
typedef google::protobuf::Message Message;
/**
* The base class for RPC handlers. These are called when the matching
* request arrives and act on the request, for example, by replying to it.
*/
class Handler {
virtual ~Handler() {}
virtual void handleRPC(ServerRPC serverRPC) = 0;
};
private:
/// See closeSession().
class CloseSession : public Handler {
void handleRPC(ServerRPC serverRPC) {
serverRPC.closeSession();
}
};
/// See reply().
class Reply : public Handler {
explicit Reply(const Message& response)
: response(Core::ProtoBuf::copy(response)) {
}
void handleRPC(ServerRPC serverRPC) {
serverRPC.reply(*response);
}
std::unique_ptr<Message> response;
};
/// See serviceSpecificError().
class ServiceSpecificError : public Handler {
explicit ServiceSpecificError(const Message& response)
: response(Core::ProtoBuf::copy(response)) {
}
void handleRPC(ServerRPC serverRPC) {
serverRPC.returnError(*response);
}
std::unique_ptr<Message> response;
};
/// See rejectInvalidRequest().
class RejectInvalidRequest : public Handler {
void handleRPC(ServerRPC serverRPC) {
serverRPC.rejectInvalidRequest();
}
};
public:
/**
* Constructor.
*/
ServiceMock()
: responseQueue()
{
}
/**
* Destructor. Makes sure no more requests are expected.
*/
~ServiceMock() {
EXPECT_EQ(0U, responseQueue.size());
}
/**
* Remove previously expected requests.
*/
void clear() {
responseQueue = std::queue<Expected>();
}
/**
* Close the client's session when the specified request arrives (in FIFO
* order).
*/
void closeSession(uint16_t opCode, const Message& request) {
expect(opCode, request, std::make_shared<CloseSession>());
}
/**
* Reply normally to the client when the specified request arrives (in FIFO
* order).
*/
void reply(uint16_t opCode, const Message& request,
const Message& response) {
expect(opCode, request, std::make_shared<Reply>(response));
}
/**
* Reply with a service-specific error to the client when the specified
* request arrives (in FIFO order).
*/
void serviceSpecificError(uint16_t opCode, const Message& request,
const Message& response) {
expect(opCode, request,
std::make_shared<ServiceSpecificError>(response));
}
/**
* Reject the client's RPC as an invalid request when the specified request
* arrives (in FIFO order).
*/
void rejectInvalidRequest(uint16_t opCode, const Message& request) {
expect(opCode, request, std::make_shared<RejectInvalidRequest>());
}
/**
* Call a custom handler when the request arrives.
*/
void runArbitraryCode(uint16_t opCode,
const Message& request,
std::shared_ptr<Handler> response) {
expect(opCode, request, response);
}
/**
* This is called by the Server.
*/
void handleRPC(RPC::ServerRPC serverRPC);
std::string getName() const;
private:
/**
* Call the Handler when the specified request arrives (in FIFO order).
*/
void expect(uint16_t opCode,
const Message& request,
std::shared_ptr<Handler> response);
/// See #responseQueue.
struct Expected {
Expected(uint16_t opCode,
std::unique_ptr<Message> request,
std::shared_ptr<Handler> response);
Expected(Expected&& other);
Expected& operator=(Expected&& other);
/// The op code expected from the client.
uint16_t opCode;
/// The request message expected from the client.
std::unique_ptr<Message> request;
/// Code to respond to the client or close its session, etc.
std::shared_ptr<Handler> response;
};
/**
* A FIFO queue of requests to expect from clients and their associated
* handlers.
*/
std::queue<Expected> responseQueue;
};
} // namespace LogCabin::RPC
} // namespace LogCabin
#endif /* LOGCABIN_RPC_SERVICEMOCK_H */
| 2023-12-24T01:26:19.665474 | https://example.com/article/4718 |
Marking a Milestone: McDuffie on Milestone's Return
Justice League of America #27
When word broke of Milestone’s return at Comic Con International: San
Diego, fans of the imprint were thrilled, to say the least. The
racially diverse group of super heroes and villains had virtually not
been seen in print since Milestone Media ceased comic book production
in 1997 (Static Shock did have a miniseries published in 2001,
coinciding with the animated series).
Beginning in 1994, the Milestone titles told the stories of heroes
located in the fictional Midwestern city of Dakota. The titles and
characters (including Static, Icon and Rocket, Xombi, Kobalt and the
other members of the Shadow Cabinet and the rest of the universe)
gained a solid but small fanbase that had long waited for their return.
In July, DC Universe Executive Editor Dan DiDio announced their return with two caveats:
1) the Milestone characters would be set in the DC Universe and
interact with the likes of Superman, Batman and Wonder Woman, and
2) the characters’ upcoming debuts would be fresh starts – that is,
this is the first time the heroes have encountered the characters and
Dakota.
Static has already made his debut in DC’s Terror Titans miniseries, and from there will transition into Teen Titans, and last week, the bulk of the Milestone hero compliment was introduced in Justice League of America #27, written by Milestone co-founder, and current JLA writer, Dwayne McDuffie.
According to McDuffie, the return of the Milestone characters was
something that DiDio is largely responsible for. “As I remember it, we
almost did a deal with Wildstorm, I want to say three years ago, but it
fell apart over differences in creative vision,” McDuffie told
Newsarama. “Dan came in maybe two years after that. It was a
complicated set of issues, on both the business and creative sides, and
there was also a lot of inertia to overcome - old, hard feelings in
both the Milestone and DC organizations, but Dan kept pushing, even
after the deal fell apart a couple of times.”
The deal which led to the current return of the characters took over a
year to hammer out, McDuffie said, and finally worked out issues that
had been sticking points in the past. “Milestone wanted to retain
ownership, and to insure our ability to protect the integrity of our
characters, DC wanted the ability to use the Milestone characters
freely in their continuity and to reprint stories at will,” McDuffie
said. “It was a delicate balance, but I think we both got what we
wanted.”
Despite the fact that many fans and readers see McDuffie currently
being in DC’s stable of writers as being integral to the return of the
characters, he doesn’t see it that way. “It's a nice little treat for
me, getting to write the characters again, but if I wasn't doing comics
for DC now, in many ways it might be easier to get them out there, for
instance, I'm pretty sure they would have launched an Icon title already if I hadn't called ‘dibs,’ then realized I'm much too busy to do another monthly comic. Someday soon. Promise.”
Static Shock from Terror Titans #3
That said, McDuffie does think his presence and availability does give
the relaunch a certain validity and legitimacy at the very least in how
the characters are portrayed, thanks to his intimate knowledge of them.
That said, he is having fun seeing how other writers, such as Teen Titans writer Sean McKeever are handling them.
“That was the fun of our original run, too,” McDuffie said. “Matt
Wayne, Ivan Velez, Robert Washington, John Rozum and others did things
with my characters that never would have occurred to me, and the
characters were the better for it.”
As for introducing the characters in this manner, or “fresh” into the
DC Universe, McDuffie said that it was done to make the process as
smooth as possible. Oh, that and there’s more to it than readers may
think.
“We wanted to treat this like any new character intro in a monthly
comic, like the first time Wolverine showed up in an issue of The Incredible Hulk,”
McDuffie said. “We didn't want to have to deal with complicated
continuity stuff right off the bat. That said, I'm perverse, so there's
more to it than we're admitting at the moment. Next spring or so, I'll
reveal the in-story reasons of how and why the Milestone characters
were inserted into DC continuity -and long-time Milestone readers will
swear we'd been planning it since Shadow Cabinet #1.”
As readers of last week’s JLA #27 know, the meeting
between the two groups of heroes is happening on the DCU’s “turf,” that
is, the JLA Watchtower, where they come looking for Dr. Light’s corpse.
Need a refresher?
“The Spectre turned Dr. Light into a candle, then snuffed out his
life,” McDuffie explained. “The half-melted candle has been put into
storage on the Watchtower, on the off-chance that those remains might
someday present a danger. Well, they do, but they also present a huge
opportunity, and the Shadow Cabinet tries to steal it to capitalize.
The female Dr. Light is also involved, as is Dharma - the most
dangerous man in the Milestone universe. Oh, and Shadow Thief. And
Starbreaker. And an old teammate who hasn't been in the JLA for a long
time.”
As for a reciprocal visit, McDuffie promised that he will get the JLA
into Dakota (a rough analogue for Detroit) soon, just not quite yet.
Looking at the larger picture of the addition of the Milestone
characters to the DC Universe, McDuffie takes issue with those who may
claim that DC’s only goal in brinigng the characters into their
Universe is to jump start more racial diversity among their characters.
That argument doesn’t hold water, McDuffie points out, due to the fact
that in the same panel where DiDio announced that the Milestone
characters were joining the DCU, he also announced the Red Circle
characters (the Archie Comics superheroes) would be joining the DC
Universe in much the same fashion. The Red Circle characters – mostly
male and all-white.
Justice League vs Milestone
“DC is more than capable of creating characters of color without going
to the effort and expense of borrowing ours,” McDuffie said. “They
brought us into the DCU to give them something that they can't
make in-house, and that's the individual qualities of these specific
characters. Icon isn't ‘black Superman,’ he's a unique character that
differs from Superman as much as Batman does, anybody who's read three
pages of an Icon comic knows that. The rest of you will have the pleasure of finding out shortly.
“The Milestone characters aren't a monolith. Static is a fanboy. Icon
is a conservative utopian, Hardware's an asshole, David Kim's a magical
realist, Donner's a pro wrestling fan who refuses to break kayfabe,
Rocket's a Humanist, and so on, and so on. Not only do they view the
world differently from DC characters, they view the world differently
from each other.”
McDuffie’s assessment of Hardware reflects a little of his working
relationship with the character. The tech-based hero is the one that’s
giving McDuffie the most trouble upon his return to the Milestone
Universe. “Out of the initial launch, he's the character who was the
most like me, but I've mellowed a lot in the past 15 years, and he
hasn't,” McDuffie said. “I have to keep reminding myself.”
Now that the characters are “in” the DC Universe, McDuffie said he’s
going to be largely hands off with them – that is, anyone who wants to
use them, can. “They're just like any other character in the DCU, if
nobody's using them, they're available, subject to DC editorial's
approval, and my unhelpful kibitzing,” McDuffie said. “I'm looking
forward to seeing what DC's writers and artists come up with.”
To date, McDuffie’s “kibitzing” has been very minor – insisting that
Static wear the costume from Season 3 of the animated series in Terror Titans, and making some dialog suggestions.
Given that the characters are being integrated into the DC Universe,
fans have already surmised that the relationship between Milestone and
DC is long-term, as much “forever and ever” as things get in comics.
That’s something McDuffie is taking seriously.
“I hope it continues past my lifetime. As DC gets better and better at
using the characters, I expect I'll have less and less to do, at least
that's my hope. But someone from Milestone will always keep a hand in,
making sure DC does right by our guys. For the foreseeable future,
that's going to be me. That said, if things somehow go horribly wrong,
there's a backdoor built into the story that would allow us to pull
them out cleanly without damaging either property. I don't think we'll
ever need to, but it's there.”
Related: SDCC ’08: A Guide to Your Universe PanelDwayne McDuffie Talks JLAMcKeever on Titans, Both ‘Terror’ and ‘Teen’ | 2024-07-16T01:26:19.665474 | https://example.com/article/7242 |
package Paws::Glacier::AbortMultipartUpload;
use Moose;
has AccountId => (is => 'ro', isa => 'Str', traits => ['ParamInURI'], uri_name => 'accountId', required => 1);
has UploadId => (is => 'ro', isa => 'Str', traits => ['ParamInURI'], uri_name => 'uploadId', required => 1);
has VaultName => (is => 'ro', isa => 'Str', traits => ['ParamInURI'], uri_name => 'vaultName', required => 1);
use MooseX::ClassAttribute;
class_has _api_call => (isa => 'Str', is => 'ro', default => 'AbortMultipartUpload');
class_has _api_uri => (isa => 'Str', is => 'ro', default => '/{accountId}/vaults/{vaultName}/multipart-uploads/{uploadId}');
class_has _api_method => (isa => 'Str', is => 'ro', default => 'DELETE');
class_has _returns => (isa => 'Str', is => 'ro', default => 'Paws::API::Response');
1;
### main pod documentation begin ###
=head1 NAME
Paws::Glacier::AbortMultipartUpload - Arguments for method AbortMultipartUpload on L<Paws::Glacier>
=head1 DESCRIPTION
This class represents the parameters used for calling the method AbortMultipartUpload on the
L<Amazon Glacier|Paws::Glacier> service. Use the attributes of this class
as arguments to method AbortMultipartUpload.
You shouldn't make instances of this class. Each attribute should be used as a named argument in the call to AbortMultipartUpload.
=head1 SYNOPSIS
my $glacier = Paws->service('Glacier');
# To abort a multipart upload identified by the upload ID
# The example deletes an in-progress multipart upload to a vault named
# my-vault:
$glacier->AbortMultipartUpload(
'AccountId' => '-',
'UploadId' =>
'19gaRezEXAMPLES6Ry5YYdqthHOC_kGRCT03L9yetr220UmPtBYKk-OssZtLqyFu7sY1_lR7vgFuJV6NtcV5zpsJ',
'VaultName' => 'my-vault'
);
Values for attributes that are native types (Int, String, Float, etc) can passed as-is (scalar values). Values for complex Types (objects) can be passed as a HashRef. The keys and values of the hashref will be used to instance the underlying object.
For the AWS API documentation, see L<https://docs.aws.amazon.com/goto/WebAPI/glacier/AbortMultipartUpload>
=head1 ATTRIBUTES
=head2 B<REQUIRED> AccountId => Str
The C<AccountId> value is the AWS account ID of the account that owns
the vault. You can either specify an AWS account ID or optionally a
single 'C<->' (hyphen), in which case Amazon S3 Glacier uses the AWS
account ID associated with the credentials used to sign the request. If
you use an account ID, do not include any hyphens ('-') in the ID.
=head2 B<REQUIRED> UploadId => Str
The upload ID of the multipart upload to delete.
=head2 B<REQUIRED> VaultName => Str
The name of the vault.
=head1 SEE ALSO
This class forms part of L<Paws>, documenting arguments for method AbortMultipartUpload in L<Paws::Glacier>
=head1 BUGS and CONTRIBUTIONS
The source code is located here: L<https://github.com/pplu/aws-sdk-perl>
Please report bugs to: L<https://github.com/pplu/aws-sdk-perl/issues>
=cut
| 2024-04-15T01:26:19.665474 | https://example.com/article/3496 |
An organization may use any number of computing systems, communications networks, data storage devices, or other types of systems to provide service to individuals. An organization may also employ service representatives that use the various systems to assist individuals in service sessions that are conducted over the telephone, in a video conference, through text chat sessions, in person, and/or over other communication channels. Organizations may strive to provide an efficient and productive service interaction between service representatives and the individuals being serviced while maintaining an appropriate quality level for the service provided by service representatives. | 2024-06-22T01:26:19.665474 | https://example.com/article/3392 |
Sale To Minors Prohibited
November 8, 2016
Houses with blue bogs — particularly gentle shades like powder blue or periwinkle — fetched $5,four hundred greater than anticipated when bought, in accordance with a paint colour analysis from real estate web site Zillow The evaluation checked out more than 32,000 offered homes, evaluating the sales costs of ones painted certain color versus comparable Finance properties that had white walls. Get the complete-on Halloween face and body paint treatment with spooky masks and physique paints on your late-night time Halloween events. Yesterday I walked into our native Sherwin-Williams for the primary time (after all if I lived near Union, Maine, I would be strolling into my Uncle’s awesome ironmongery shop ). Massive regrets I hadn’t been there earlier than.
The price to make the print is deducted from the sale price then the artist gets the remainder of the profit for an merchandise. We are excited to announce that our Painter4aDay reward playing cards are on sale now by way of June 14th 2014. I stopped by the store immediately and love the recent coat of chalk paint the placed on my hutch (which moved because the final time I was there…now it’s subsequent to the chalk paint part).
This isn’t a good idea, as a result of it has occurred the place people have gone to remove the tape after a number of coats of paint have dried, and it peels the paint right off the wall. After primer is utilized, one other gentle sanding supplies a effective finish for applying paint.
The evaluation controlled for sq. footage, the age of the house, the date of the transaction and placement, and then compared the sale prices of homes with white walls versus these with more colorful paint. After scouring round for professional estimates at physique retailers like Maaco, from a carpenter with a spray store, and mining enter from vintage camper teams on Yahoo, I figured out that a $2,000 paint job was not in my budget or my camper’s future.
It could not be complete for me if I did not paint no less than one Jesus rock…this was finished for an Easter present. Eco-pleasant paint merchandise are on the market and labelled as GREENGUARD or LEED which meet necessities for low odor and toxicity.
If in case you have old oil-primarily based paint cans and left over paint to do away with, take it to your nearest municipal/city waste assortment depot. Lot of Inexperienced physique paint however I do not know if she would have gone fairly this far with the latex (not less than publicly)wink wink.
To calculate the market dimension, the report considers sales generated from paints and coatings used within the authentic gear manufacturer (OEM) and automotive refinish sectors of the automotive business. At least 14 works from the Brooklyn-born artist have been on sale at Christie’s and Sotheby’s this week.
Those persevering with to have fairness stakes in the firm alongside Brazos Private Fairness Companions have been the Anderson household, which founded Ennis Paint; Steve Vetter, president and CEO of Ennis-Flint; and Matt Soule, CFO. I packed up a paint field, a window cleaning bucket, and started pounding the sidewalk.
Elephants in Asia have been trained for hundreds of years to haul logs for the forestry industry, but deforestation and restrictions on logging have meant the loss Arts and Entertainments of jobs for many of them. After the last coat of paint or stain is completely dry, and before the highest coat, apply your glaze or antiquing product.
Because of our premium, environmentally-friendly and low-odor paint choices, we can safely refresh the within of your property without the necessity to open doorways or home windows arts organizations. Normally all paint stores or massive hardware retailers have a brilliant clearance section for misfit” paints, or as the professionals call it — the mis-tints (haha clever, right?!).
That said, there are some things I do assume its price spending the additional bucks for… that is why my $50 paint job price extra round $one hundred. Attempt leyland contract, £15 per 10l @screwfix, a lot better paint.Dulux is normally good but a bit dearer.
I wont CONTACT Crown paints, I’ve had so many points with poor paint quality with their gloss paints. To be able to create a painting, an artist will apply paint with a brush, or other tool comparable to a palette knife, to a surface similar to a canvas, wood panel, paper, wall, glass, copper, or concrete. | 2024-01-04T01:26:19.665474 | https://example.com/article/1126 |
import hammerhead from '../../deps/hammerhead';
import testCafeCore from '../../deps/testcafe-core';
const shadowUI = hammerhead.shadowUI;
const nativeMethods = hammerhead.nativeMethods;
const styleUtils = testCafeCore.styleUtils;
const DETERMINATE_STYLE_CLASS = 'determinate';
const ANIMATION_UPDATE_INTERVAL = 10;
export default class DeterminateIndicator {
constructor (progressBar, firstValue) {
this.progressBar = progressBar;
this.firstValueElement = firstValue;
this.maxTimeout = null;
this.startTime = null;
this.animationInterval = null;
}
_setCurrentProgress () {
const progress = (nativeMethods.dateNow() - this.startTime) / this.maxTimeout;
const percent = Math.min(Math.max(progress, 0), 1);
const progressBarWidth = styleUtils.getWidth(this.progressBar);
const newWidth = Math.round(progressBarWidth * percent);
styleUtils.set(this.firstValueElement, 'width', newWidth + 'px');
}
start (maxTimeout, startTime) {
shadowUI.addClass(this.progressBar, DETERMINATE_STYLE_CLASS);
this.maxTimeout = maxTimeout;
this.startTime = startTime || nativeMethods.dateNow();
this._setCurrentProgress();
this.animationInterval = nativeMethods.setInterval.call(window, () => this._setCurrentProgress(), ANIMATION_UPDATE_INTERVAL);
}
stop () {
if (this.animationInterval) {
nativeMethods.clearInterval.call(window, this.animationInterval);
this.animationInterval = null;
}
}
reset () {
styleUtils.set(this.firstValueElement, 'width', 0);
shadowUI.removeClass(this.progressBar, DETERMINATE_STYLE_CLASS);
}
}
| 2024-07-20T01:26:19.665474 | https://example.com/article/3129 |
1. Introduction {#sec1}
===============
The field of drug delivery system (DDS) utilizing polymeric carrier, which covalently conjugates molecule of interest, plays an important role in modern therapeutics \[[@B1], [@B2]\]. Such polymer-based drug entities are now termed as "polymer therapeutics" and include nanomedicine class that has become immensely critical in recent years \[[@B3]--[@B5]\]. The objectives for designing a polymer therapeutics are primarily to improve the potential of the respective drug by (i) enhancing water solubility, particularly relevant for some drugs with low aqueous solubility, (ii) stability against degrading enzymes or reduced uptake by reticulo-endothelial system (RES), and (iii) targeted delivery of drugs to specific sites of action in the body \[[@B1], [@B6]\].
Poly(ethyleneglycol) (PEG) is the most commonly used nonionic polymer in the field of polymer-based drug delivery \[[@B1]\]. Due to high aqueous solubility, PEG polymer is considered as a versatile candidate for the prodrug conjugation. Ringdorf was the first to propose the rational model for pharmacologically active polymers in 1975 \[[@B7]\]. An ideal prodrug model typically consists of multiple components ([Figure 1](#fig1){ref-type="fig"}):
i. polymer as a carrier;
ii. drug, peptide, or protein as a biological active component;
iii. spacer molecule or targeting moiety.
PEGylation, the covalent attachment of PEG to molecules of interest, has become a well-established prodrug delivery system \[[@B8], [@B9]\]. PEGylation was first reported by Davies and Abuchowski in the 1970s for albumin and catalase modification. Since then the procedure of PEGylation has been broadened and developed thereafter tremendously \[[@B10]--[@B16]\]. The remarkable properties of the biologically inert (biocompatible) PEG polymer derive from its hydrophilicity and flexibility. PEG is also considered to be somewhat hydrophobic due to its solubility in many organic solvents. Most used PEGs for prodrug modification are either monomethoxy PEG or dihydroxyl PEG ([Figure 2](#fig2){ref-type="fig"}) \[[@B7]\].
Typically, most of the PEG-based prodrugs have been developed for the delivery of anticancer agents such as paclitaxel, methotrexate, and cisplatin. High-molecular-weight prodrugs containing cytotoxic components have been developed to decrease peripheral side effects and to obtain a more specific administration of the drugs to the cancerous tissues \[[@B17]\]. Favorably, a macromolecular antitumor prodrug is expected to be stable in circulation and should degrade only after reaching the targeted cells or tissues. PEG-drug conjugates can therefore be tailored for activation by extra- or intracellular enzymes releasing the parent drug in situ ([Figure 3](#fig3){ref-type="fig"}) \[[@B7]\]. In this paper, we represent an overview on the advances of PEG prodrug conjugates which are being currently used as therapeutics. A short discussion with particular emphasis on the derivatives in clinical practice or still under clinical trials is also provided.
2. Properties of PEG {#sec2}
====================
PEG in its most common form is a linear or branched polyether terminated with hydroxyl groups. PEG is synthesized by anionic polymerization of ethylene oxide initiated by nucleophilic attack of a hydroxide ion on the epoxide ring. Most useful for polypeptide modification is monomethoxy PEG (mPEG). On the other hand, mPEG is synthesized by anionic ring opening polymerization initiated with methoxide ions. Successful conjugation of PEG with biomolecule depends upon the chemical structure, molecular weight, steric hindrance, and the reactivity of the biomolecule as well as the polymer. In order to synthesize a bioconjugate, both chemical entities (i.e., the bioactive as well as the polymer) need to possess a reactive or functional group such as --COOH, --OH, --SH, or --NH~2~. Therefore, the synthetic methodology to form a conjugate involves either protection or deprotection of the groups \[[@B18]\].
3. PEG-Based Nanocarrier Architectures and Designs {#sec3}
==================================================
There is need to design simple and yet appropriate PEG-conjugation methodology. Most commonly used strategies for conjugation involve use of both coupling agents such as dicyclohexyl carbodiimide (DCC) and 1-ethyl-3-(3-dimethylaminopropyl)carbodiimide (EDC) or use of *N*-hydroxysuccinimide (NHS) esters. Chemical conjugation of drugs or other biomolecules to polymers and its modifications can form stable bonds such as ester, amide, and disulphide. The resulting bond linkage should be relatively stable to prevent drug release during its transport until it reaches the target. Covalent bonds (e.g., ester or amide) are comparatively stable bonds and could deliver the drug at the targeted site. However, in some instances such bonds may not easily release targeting agents and peptides under the influence of acceptable environmental changes \[[@B19]\]. In the past, PEG prodrugs have been designed mostly for the delivery of anticancer agents due to its overall implications in the treatment. However it should be noted that PEG-antitumor prodrug is expected to be stable during circulation and degrade/hydrolyze only on reaching the targeted site. PEG-drug conjugates can therefore be tailored to release the parent drug *in situ* on activation by extra- or intracellular enzymes or pH change.
PEG has limited conjugation capacity since it possesses only one (two in case of modified PEGs) terminal functional group at the end of the polymer chain. To overcome this limitation of PEG, coupling amino acids, such as bicarboxylic amino acid and aspartic acid, to the PEG has been proposed \[[@B20], [@B21]\]. Such derivatization increases the number of active groups of the original PEG molecule. Using the same method with recursive derivatization, dendrimeric structures have also been achieved at each PEGs extremity. However, in the study the authors encountered low reactivity of the bicarboxylic acids groups towards arabinofuranosylcytosine (Ara-C) binding due to steric hindrance between two Ara-C molecules on conjugation with neighboring carboxylic moieties. It was suggested that this effect might be overcome by incorporating the dendrimer arms with an amino alcohol (H~2~N--\[CH~2~--CH~2~--O\]~2~--H).
PEG polymers with hydroxyl terminals can be easily modified by aliphatic chains molecules or small amino acids. For example, antitumor agent 1-*β*-D-Ara-C was covalently linked to varying molecular weight --OH terminal PEGs through an amino acid spacer in order to improve the *in vivo* stability and blood residence time \[[@B22]\]. Conjugation was carried out with one or two available hydroxyl groups at the polymer\'s terminals. Furthermore, to increase the drug loading of the polymer, the hydroxyl groups of PEG were functionalized with a bicarboxylic amino acid to form a tetrafunctional derivative. Finally, the conjugates with four or eight Ara-C molecules for each PEG chain were prepared ([Figure 4](#fig4){ref-type="fig"}). The authors investigated steric hindrance in PEG-Ara-C conjugates using molecular modeling to investigate the most suitable bicarboxylic amino acid with the least steric hindrance. Typically, hydroxyl groups of PEG are activated by *p*-nitrophenyl chloroformate to form a stable carbamate linkage between PEG and amino acid. The degree of PEG hydroxyl group activation with *p*-nitrophenyl chloroformate was determined by UV analysis of the *p*-nitrophenol released from PEG-*p*-nitrophenyl carbonate after alkaline hydrolysis. Activated PEG was further coupled with amino acid and the intermediate PEG-amino acid was linked to Ara-C by EDC/NHS activation.
3.1. PEG N-Hydroxysuccinimide (NHS) Esters and Coupling Methods {#sec3.1}
---------------------------------------------------------------
PEG-NHS esters are readily available which are reactive with nucleophiles to release the NHS leaving group and forms an acylated product \[[@B23]\] ([Figure 5(a)](#fig5){ref-type="fig"}). NHS is a choice for amine coupling because of its higher reactivity at physiological pH reactions in bioconjugation synthesis. In particular, carboxyl groups activated with NHS esters are highly reactive with amine nucleophiles and are very common entity in peptides and proteins. Polymers containing reactive hydroxyl groups (e.g., PEG) can be modified to obtain anhydride compounds. On the other hand, mPEG can be acetylated with anhydrides to form an ester terminating to free carboxylate groups ([Figure 6](#fig6){ref-type="fig"}).
The reactive PEG and its derivatives succinimidyl succinate and succinimidyl glutamate are used for conjugation with drugs or proteins. The coupling reactions involving amine groups are usually of two types: (a) acylation, (b) alkylation. These reactions are comparatively efficient to form a stable amide bond. In addition, carbodiimide coupling reactions or zero lengths crosslinkers are widely used for coupling or condensation reactions. Most of the coupling methodologies involve use of heterobifunctional reagent to couple via modified lysine residues on one protein to sulphydryl groups on the second protein \[[@B24]\], while modification of lysine residues involves the use of a heterobifunctional reagent comprising an NHS functional group, together with a maleimide or protected sulphydryl group. The linkage formed is either a disulphide bridge or as a thioether bond, depending if the introduced group is either a sulphydryl or maleimide, respectively. The thiol group on the second protein may be an endogenous free sulphydryl, or chemically introduced by modification of lysine residues.
4. PEG Prodrug Conjugates as Drug-Delivery Systems {#sec4}
==================================================
In general, low-molecular-weight compounds diffuse into normal and tumor tissue through endothelia cell layer of blood capillaries \[[@B7]\]. Conjugation of low-molecular-weight drugs with high-molecular-weight polymeric carriers results in high-molecular weight prodrugs ([Figure 1](#fig1){ref-type="fig"}). However, such conjugation substantially alters the mechanism of cellular internalization and accumulation. High-molecular-weight drugs are internalized mainly by endocytosis, which is a much slower internalization process over to simple diffusion. Hence in case of endocytosis higher drug concentration outside the cell is required to produce the same cellular effect as corresponding low-molecular-weight drug \[[@B7]\]. Therefore, higher-molecular-weight prodrugs displays lower specific activity compared to its free form of drugs. For example, polymeric anticancer prodrugs are generally less toxic when compared with its free form, yet require substantially higher concentrations inside the tumor to be cytotoxic. Compensation for this decrease in drug efficacy can be achieved by targeting a polymeric drug to the specific organ, tissue, and/or cell \[[@B7]\].
Following two approaches is generally used to target polymeric anticancer drugs to the tumor or cancer cells \[[@B25], [@B26]\]:
1. passive targeting,
2. active targeting.
4.1. Passive Drug Targeting: The EPR Effect {#sec4.1}
-------------------------------------------
Passive targeting is a drug delivery approach in which drugs are delivered to the targeted site by conjugating with polymer which releases the drug outside the targeted site due to altered environmental conditions ([Figure 6(a)](#fig6){ref-type="fig"}). Tumors and many inflamed areas of body have hyperpermeable vasculature and poor lymphatic drainage which passively provides increased retention of macromolecules into tumor and inflamed area of body \[[@B27]--[@B30]\]. This phenomenon is called enhanced permeability and retention (EPR) effect \[[@B27]\]. It constitutes one of the practical carrier-based anticancer drug delivery strategies. EPR effect is primarily utilized for passive targeting due to accumulation of prodrug into tumor or inflamed area. Low molecular drugs covalently coupled with high-molecular-weight carriers are inefficiently eliminated due to hampered lymphatic drainage and therefore accumulate in tumors. While EPR effect enhances the passive targeting ability due to higher accumulation rate of drug in tumor and subsequently due to accumulation, prodrug slowly releases drug molecules which provide high bioavailability and low systemic toxicity \[[@B30]\].
Passive accumulation of macromolecules such as PEG and other nanoparticles in solid tumors is a phenomenon which was probably overlooked for several years as a potential biological target for tumor-selective drug delivery. The existence of the EPR effect was experimentally confirmed by David et al., for macromolecular anticancer drug delivery systems \[[@B31]\]. Furthermore, passive targeting increases the concentration of the conjugate in the tumor environment and therefore "passively" forces the polymeric drug to enter the cells by means of the concentration gradient between the intracellular and extracellular spaces and therefore is not very efficient. The more efficient way to provide targeting is by "active targeting" \[[@B32]\].
4.2. Active Targeting {#sec4.2}
---------------------
Active targeting approach is based on interaction between specific biological pairs (e.g., ligand receptor, antigen antibody, enzyme substrate) ([Figure 6(a)](#fig6){ref-type="fig"}) \[[@B33]\]. Active targeting is achieved by attaching targeting agents that bind to specific receptors on the cell surface---to the prodrug by a variety of conjugation chemistries. Most widely used targeting moieties are peptide ligands, sugar residues, antibodies, and aptamers specific to particular receptors, selectins, antigens, and mRNAs expressed in targeted cells or organs. The targeted anticancer LHRH-PEG-CPT conjugate is an example of such targeted anticancer drug delivery system \[[@B7]\]. In this system, LHRH peptide is used as a targeting moiety to the corresponding receptors overexpressed in several cancer cells, PEG polymer---as a carrier and CPT---as an anticancer drug. Interaction of these targeting moieties to their target molecule results in uptake of the drug by two main approaches: (i) internalization of the whole prodrug or (ii) internalization of the drug into targeted cells by various endocytosis and phagocytosis pathways \[[@B34]\].
\(i\) Internalization of the ProdrugIn this system, the drug is cleaved intracellularly after endocytosis. The internalized prodrug exhibits pharmacological activity on reaching the cytosol or the nucleus, which are the sites of action of intracellularly active drugs. This process can be divided into several distinct steps as schematically presented in [Figure 6(b)](#fig6){ref-type="fig"}. Interaction of a targeted prodrug with a corresponding receptor initiates receptor-mediated endocytosis by formation of an endocytic vesicle and endosomes-membrane-limited transport vesicles with a polymeric delivery system inside \[[@B6]\]. The activity of the drug is preserved during the intracellular transport as the membrane-coated endosome prevents drugs from degradation by cellular detoxification enzymes. Endosomes fuses with lysosomes forming secondary lysosomes. If the drug-polymer conjugate is designed by incorporating an enzymatically cleavable bond then the drug is released from the polymer-drug conjugate by the lysosomal enzymes and might exit a lysosome by diffusion. The advantage of this approach is a high local drug concentration with a potential increase in efficacy \[[@B30]\].
\(ii\) Internalization of the DrugIn this system, the drug conjugate is cleaved extracellularly.
The microenvironment of tumors has been reported to be slightly acidic in animal models and human patients and the pH value in tumor tissue is often 0.5--1.0 units lower than in normal tissue.
5. Approaches and Applications {#sec5}
==============================
5.1. Polymer Conjugates of Therapeutically Relevant Proteins {#sec5.1}
------------------------------------------------------------
The potential value of proteins such as antibodies, cytokines, growth factors, and enzymes as therapeutics has been recognized for years. However, successful development and application of therapeutic proteins are often impeded by several difficulties, for example, short circulating *t* *~1/2~,* low stability, costly production, poor bioavailability, and immunogenic and allergic potential. An elegant method to overcome most of these difficulties is the attachment of PEG chains onto the surface of the protein. PEGylation of the native protein generally masks the protein\'s surface, inhibits antibodies or antigen processing cells, and reduces degradation by proteolytic enzymes \[[@B6]\]. In addition, PEGylation of the native protein increases its molecular size and as a result prolongs the half-life *in vivo*, which in turn allows less frequent administration of the therapeutic protein.
The most common chemical approach for preparing PEG-protein conjugates has been by coupling --NH~2~ groups of proteins and mPEG with an electrophilic functional group \[[@B36]\]. Such conjugate reactions usually result in formation of polymer chains, covalently linked to a globular protein in the core. Figures [7(a)](#fig7){ref-type="fig"} and [7(b)](#fig7){ref-type="fig"} illustrate the commonly used methods of mPEG-based protein modifying reagents. Derivatives 1 and 2 contain a reactive aryl chloride residue, which is displaced by a nucleophilic amino group by a reaction with peptides or proteins, as shown in [Figure 7(b)](#fig7){ref-type="fig"}. Derivatives 1 and 2 are acylating reagents, whereas derivatives 3--11 contain reactive acyl groups referenced as acylating agents. Protein modification with all of these agents results in acylated amine-containing linkages: amides derived from active esters 3--6 and 11 or carbamates derived from 7--10. Alkylating reagents 12 and 13 react with proteins forming secondary amine conjugation with amino-containing residues. As represented in [Figure 7(a)](#fig7){ref-type="fig"}, tresylate 12 alkylates directly, while acetaldehyde 13 is used in reductive alkylation reactions. Numbers 1--13 represent the order in which these activated polymers were introduced \[[@B6], [@B36]\].
Adagen (pegademase bovine), used for the treatment of severe combined immunodeficiency disease (SCID), is developed using PEG polymer. PEG chemistry may results in side reaction or weak linkages upon conjugation with polypeptides and low-molecular-weight linear PEGs (≤12 kDa). It is prepared by first reacting mPEG (Mw 5000 Da) with succinic anhydride spacer. The resulting carboxylic group of PEG succinic acid is activated with *N*-hydroxysuccinimide (NHS) by using carbodiimide coupling agents. The NHS group is displaced by nonspecific reaction with nucleophilic amino acid side chains \[[@B37]\]. Another PEG prodrug of Enzon (Oncaspar^®^) is also synthesized by the use of PEG succinimidyl succinate \[[@B37]\]. The PEG ester and thioesters are highly susceptible to hydrolysis and thus modification occurs primarily at the amines forming amides. The PEGylated CERA protein conjugate, a product of Hoffmann-LaRoche (Mircera) is synthesized by attachment of an NHS-activated monomethoxy PEG butanoic acid to lysine 46 and 52 on erythropoietin (EPO) \[[@B38], [@B39]\]. Also, Hoffman-La Roche, Inc.\'s peginterferon *α*2a (Pegasys) is prepared by conjugating PEG with the side chain and *N*-terminal amine groups of lysine spacer, forming a biscarbamate. Then on activation of the carboxylic acid with NHS, it helps the branched PEG chain linker form stable amide bonds with 11 possible lysine residues. Monosubstituted conjugate can also be synthesized by the same reaction process by limiting the amount of PEG chain linker used in the conjugation step. While, PEG-Intron by Schering-Plough (peginterferon *α*2b) is a covalent conjugate of interferon alfa-2b linked to a single unit of Mw 12000 PEG \[[@B40]\] is a covalent conjugate of interferon alfa-2b linked to a single unit of Mw 12000 PEG. The interferon conjugates are synthesized by condensing activated PEG, wherein a terminal hydroxy or amino group can be replaced by an activated linker, and reacting with one or more of the free amino groups in the interferon ([Figure 8](#fig8){ref-type="fig"}). Condensation with only one amino group to form a monoPEGylated conjugate is a prime feature of this synthesis process.
In other instance, pegvisomant (Somavert) prodrug conjugate is synthesized by covalent attachment of four to six Mw 5000 Da PEG units via NHS displacement to several lysine residues available on hGH antagonist B2036, as well as the *N*-terminal phenylalanine residue is used for acromegaly treatment \[[@B41]--[@B43]\]. Similarly, Amgen\'s pegfilgrastim (Neulasta^®^) is used to decrease febrile neutropenia manifested infection and this prodrug is a covalent conjugation of Mw 20000 Da monomethoxy PEG aldehyde by reductive amination with the *N*-terminal methionine residue of the filgrastim protein \[[@B44]\]. On the other hand, Krystexxa (pegloticase) by Savient, used for the treatment of chronic gout, is synthesized by using PEG *p*-nitrophenyl carbonate ester \[[@B45]\]. The primary amine lysine side chain is replaced by *p*-nitrophenol to form carbamates, which are further subjected to decrease hydrolysis under mild basic conditions. From the total of 28-29 lysines, approximately 12 lysines on each subunit of urate oxidase are surface accessible in the native tetrameric form of the complete enzyme. In fact, due to the close proximity of some of the lysine residues, PEGylation of one lysine may sterically hinder the addition of another PEG chain \[[@B45], [@B46]\].
5.2. PEG-Drug Conjugates {#sec5.2}
------------------------
PEGylation of drugs does influence the pharmacokinetic properties of drugs and drug carriers and therefore is emerging as an important area in pharmaceutics. PEG has been successful for protein modification but in the case of low-molecular-weight drugs it presents a crucial limit, the low drug payload accompanying the available methoxy or diol forms of this polymer. This intrinsic limitation had for many years prevented the development of a small drug-PEG conjugate, and also because the conjugates extravasation into tumors by EPR effect is directly proportional to the conjugate\'s molecular weight. Unfortunately, in case of PEG the use of larger polymer does not correlate well with an increase in the amount of drug selectively delivered into the tumor. In case of PEG, the number of available groups for drug coupling does not change with the length of polymeric chain, as happens instead with other polymers (e.g., polyglutamic acid, and dextran) or copolymers (e.g., HPMA). The latter can have several functional groups along the polymeric backbone: longer polymer chains correspond to an increased number of functional groups \[[@B22], [@B47]--[@B50]\].
A few studies have been conducted recently to overcome the low PEG loading by using multiarm PEGs either branched at the end chain groups or coupling on them small dendron structures ([Figure 9](#fig9){ref-type="fig"}) \[[@B47], [@B50]--[@B53]\]. Such multiarm PEG conjugates have recently entered phase I clinical trials \[[@B55]\]. This compound was obtained by coupling a 4-arm PEG of 40 kDa with the camptothecin derivative SN38, through a spacer glycine ([Figure 10](#fig10){ref-type="fig"}). The coupling strategy was developed to link selectively the 20-OH group of SN38, thus preserving the E ring of SN38 in the active lactone form while leaving the drug 10-OH-free \[[@B56]\].
Design and synthesis of nontargeted or antibody targeted biodegradable PEG multiblock coupled with *N* ~2~,*N* ~5~-diglutamyllysine tripeptide with doxorubicin (Dox) attached through acid-sensitive hydrazone bond has also been reported \[[@B57]--[@B60]\]. PEG activated with phosgene and NHS was reacted with --NH~2~ groups of triethyl ester of tripeptide *N* ~2~,*N* ~6~-diglutamyllysine to obtain a degradable multi-block polymer. The polymer was converted to the corresponding polyhydrazide by hydrazinolysis of the ethyl ester with hydrazine hydrate. On the other hand, the nontargeted conjugate was prepared by direct coupling of Dox with the hydrazide PEG multi-block polymer. Whereas the antibody-targeted conjugates, a part of the polymer-bound hydrazide group, was modified with succinimidyl 3-(2-pyridyldisulfanyl) propanoate to introduce a pyridyldisulfanyl group for subsequent conjugation with a modified antibody. Dox was coupled to the remaining hydrazide groups using acid-labile hydrazone bonds to obtain a polymer precursor. In addition, human immunoglobulin IgG modified with 2-iminothiolane was conjugated to the polymer by substitution of the 2-pyridylsulfanyl groups of the polymer with --SH groups of the antibody. It was demonstrated that Dox was rapidly released from the conjugates when incubated in phosphate buffer at lysosomal pH 5 and 7.4 (blood).
5.3. Incorporation of Spacers in Prodrug Conjugates {#sec5.3}
---------------------------------------------------
To construct a prodrug, various spacers have been incorporated along with the polymers and copolymers to decrease the crowding effect, to increase the reactivity, and reduce steric hindrance \[[@B6], [@B61]\]. The application of a spacer arm can enhance ligand-protein binding and also provide multiple binding sites. Ideal spacer molecules possess the following characteristics:
1. stable during conjugate transport,
2. adequate drug conjugation ability and,
3. being able to release the bioactive agent at an appropriate site of action.
Amino acid spacers such as alanine, glycine, and small peptides are most commonly used due to their chemical versatility for covalent conjugation and biodegradability. Heterobifunctional coupling agents containing succinimidyl have also been used frequently as spacers.
Polymer spacers are used to enhance the conjugation ratio of an antibody with a drug by introducing them between the targeting antibody and the drug. The use of an intermediate polymer with drug molecules carried in its side chains increases the potential number of drug molecules able to attach to that antibody by modification of only a minimum amount of existing amino acid residues (Figures [7(a)](#fig7){ref-type="fig"} and [7(b)](#fig7){ref-type="fig"}) \[[@B62]\].
6. PEG Therapeutics: Clinical Applications and Challenges for Development {#sec6}
=========================================================================
PEG-based therapeutics were initially dismissed as interesting, but impractical to be translated in clinical setups. However, a growing number of products have shown that they can satisfy the stringent requirements of regulatory authority approvals ([Table 1](#tab1){ref-type="table"}). Clinically used PEG conjugates are described below.
6.1. PEG-Proteins Conjugate {#sec6.1}
---------------------------
### 6.1.1. Adagen (mPEG per Adenosine Deaminase) {#sec6.1.1}
Enzon\'s Adagen was among the first few PEG-protein conjugates to enter the clinic with FDA approval in 1990 \[[@B37]\]. It is used as a placement therapy to treat severe combined immunodeficiency (SCID) disease. SCID is an autosomal recessive genetic disorder caused by adenosine deaminase deficiency. It is usually fatal in children unless the patient is kept in protective isolation or undergoes a bone marrow transplant. As an alternative, Adagen is administered intramuscularly every 7 days. It is a replacement therapy and is repeated for the rest of the life by the patients following the dosing schedule: 10 U kg^−1^, 15 U kg^−1^, and 20 U kg^−1^ for the first three doses, and the weekly maintenance dose of 20 U kg^−1^. However, immune related problems have been reported for pegademase and its long-term treatment benefits are yet to be elucidated. Also, the high cost of treatment (\$200,000--\$300,000 per annum per patient) is an obvious disadvantage \[[@B63]--[@B65]\].
### 6.1.2. Oncaspar^®^ (mPEG-*L*-Asparaginase) {#sec6.1.2}
Oncaspar (pegaspargase) is an antineoplastic drug from Enzon Pharmaceuticals Ltd. and was approved by FDA in 1994. Oncaspar is a PEG-modified entity of the enzyme *L*-asparaginase and is used for the treatment of acute lymphoblastic leukaemia \[[@B66]\]. PEGylation was attempted to overcome several factors limiting the utility of asparaginase as therapeutic agent such as high clearance, immunologic factors such as antibodies to asparaginase owing to bacterial protein and also inactivation due to conversion to asparagine via asparagine synthetase. Also, the immunological side effects such as hypersensitivity reactions (up to 73%) were major factors that limited clinical utility of *L*-asparaginase \[[@B67]\].
Pegaspargase was developed in the 1970--1980 while it was translated in the clinical trials in the 1980. Taking clues from the preclinical studies, a series of systematic clinical studies revealed the effectiveness of the pegaspargase as compared to its non-PEG-grafted parent drug \[[@B68], [@B69]\]. Clinical trials demonstrated safety in terms of fewer incidence of hypersensitivity reactions and prolonged duration of action. The trials defined different protocols (weekly or every two weeks) and recipes of multidrug regime to treat different malignancies. The clinical observations from clinical studies for pegaspargase conjugate are summarized in [Table 2](#tab2){ref-type="table"} \[[@B70], [@B89]\].
### 6.1.3. Mircera (Continuous Erythropoiesis Receptor Activator or Methoxy Polyethylene Glycol-Epoetin Beta) {#sec6.1.3}
Mircera is a PEGylated continuous erythropoietin (EPO) receptor activator (CERA) introduced by Hoffmann-La Roche. It got approved by FDA in 2007 and is currently used to treat renal anemia in patients with chronic kidney disease (CKD). PEGylation of erythropoietin helps to prolong the half-life to approximately 130 h \[[@B82]\]. Darbepoetin alfa (Aranesp, Amgen), a second-generation EPO, due to the inclusion of an amino acid mutation has a higher glycosylation rate, and hence requires only weekly or biweekly injections. On the other hand, third-generation EPO (CERA) requires only monthly administration and thus helps in significantly improving the quality of life. However, it has been reported to have negligible effects on morbidity or mortality like other ESAs \[[@B83]\].
### 6.1.4. Pegasys (Peginterferon Alfa-2a) {#sec6.1.4}
Pegasys (peginterferon alfa-2a) (Hoffmann-La Roche) drug is used to treat chronic hepatitis C (HCV) either alone or in combination with antimicrobial ribavirin. Pegasys was approved by FDA in 2002. It consists of a PEGylated interferon alfa-2a intended to mediate antiviral immune response. PEGylated interferon demonstrated higher efficacy by increasing the clearance time of the protein, thus maintaining interferon concentration levels in the blood to control HCV. The clinical study of peginterferon revealed that 180 *μ*g of peginterferon alfa-2a, administered once a week in patients with hepatitis C-related cirrhosis or bridging fibrosis was significantly more effective than 3 million units of standard interferon alfa-2a \[[@B84]--[@B86]\].
### 6.1.5. PEG-Intron (Peginterferon Alfa-2b) {#sec6.1.5}
PEG-Intron \[[@B87]\] marketed by Schering-Plough is used to eradicate hepatic and extrahepatic hepatitis C virus infection. PEG conjugated with *α*-interferon (IFN) was approved by FDA for use in 2001. Monomethoxy-PEG-linked interferon has a sustained serum for 48--72 h compared to the native protein half-life of 7--9 h. The recommended dosage for standalone PEG-Intron therapy is 1 mg kg^−1^ per week for 52 weeks on the same day of the week subcutaneously \[[@B87], [@B88]\].
Interestingly, peginterferon *α*-2a has a higher market share because peginterferon **α**-2b is dosed on a body weight basis, whereas peginterferon *α*-2a is not. As a result, peginterferon **α**-2a is more frequently utilized to treat hepatitis C \[[@B89]\]. Nevertheless, some reports have suggested that peginterferon **α**-ribavirin combination therapy has higher risks of neutropenia and thrombocytopenia than interferon **α**-ribavirin combination therapy \[[@B90], [@B91]\], although both therapies have been reported to have similar side effect profiles.
### 6.1.6. Somavert^®^ (Pegvisomant) {#sec6.1.6}
Pegvisomant (Somavert^®^) conjugate (Pfizer) is used to treat acromegaly by preventing human growth hormone (hGH) binding to its receptor, because this binding activates the signal pathways that lead to IGF-1 generation. It is a genetically engineered analogue of hGH conjugated with PEG which was approved for use in 2003 \[[@B92]\]. Acromegaly is a chronic metabolic disorder caused when the pituitary gland generates excess hGH after epiphyseal plate closure. GH receptor has two binding sites: (i) binds to site 1 and (ii) then to site 2, inducing the functional dimerization of the hGH receptor. Pegvisomant inhibits the dimerization of the hGH receptor due to its increased affinity for site 1 of the hGH receptor \[[@B92]\]. With eight amino acid mutations at the site, and by the substitution of position 120 glycine to arginine, inhibits hGH receptor dimerization. Overall, PEGylation reduces the activity of the GH receptor antagonist. However, the 4--6 PEG-5000 moieties added to pegvisomant prolongs its half-life and allow once-daily administration immunogenicity as the rate of clearance from the body are greatly reduced, making it an effective drug against acromegaly \[[@B93]\]. The recommended dosage for patients begins with subcutaneous administration of 40 mg dose. The patient can self-administer 10 mg of Somavert daily with adjustments to the dosage of Somavert in 5 mg increments depending on the elevation or decline of insulin growth factor-1 (IGF-I) levels \[[@B94], [@B95]\]. However, because pegvisomant can increase glucose tolerance, care is embarked for the diabetes mellitus patients \[[@B96]\].
### 6.1.7. Neulasta (Pegfilgrastim) {#sec6.1.7}
Amgen\'s pegfilgrastim (Neulasta) is developed using filgrastim (Neupogen, Amgen) from Nektar (formerly Shearwater) PEGylation technology. The conjugate is formed by conjugating a 20 kDa linear monomethoxy-PEG aldehyde with Granulocyte-Colony Stimulating Factor G-CSF \[[@B97]\]. Neulasta is used to decrease febrile neutropenia manifested infection and was approved for use in 2002. The PEGylation increases the protein serum half-life to 42 h compared to the serum half-life of 3.5--3.8 h for the unmodified G-CSF. Therefore, the overall dose is reduced to a single cycle dose that is as effective as daily doses of native G-CSF \[[@B97]--[@B99]\]. The recommended dose of Neulasta is a single administration of 6 mg subcutaneously once-per-chemotherapy cycle and advised of not delivering it within 14 days before and 24 days after administration of chemotherapeutics \[[@B100]\].
### 6.1.8. Krystexxa (Pegloticase) {#sec6.1.8}
Krystexxa (pegloticase) by Savient, a PEGylated mammalian urate oxidase (uricase) was FDA approved in 2010 \[[@B101]\]. It is a recombinant tetrameric urate oxidase used for the treatment of chronic gout. Pegloticase acts by preventing inflammation and pain due to urate crystal formation in plasma. The advantage of pegloticase over other standard treatments is the higher effectiveness in reducing gout tophi \[[@B102]\]. However, pegloticase has been reported to be immunogenic. Subcutaneous and intravenous injections of pegloticase in clinical trials showed production of antibodies \[[@B103]--[@B105]\]. However, it was found out that the antibodies produced were due to PEG and not because of uricase. Furthermore, as hydrogen peroxide may be produced during the conversion of uric acid to allantoin by uricase, the long-term safety profile of pegloticase needs to be established. Moreover, the transient local pain, slow absorption, and allergic reactions induced by subcutaneous injections of pegloticase were not observed after intravenous injections. However, intravenous injections are administratively inconvenient because self-administration is difficult and may have caused infusion reactions in multidose trials \[[@B106]--[@B108]\].
6.2. PEG-Drug Conjugates {#sec6.2}
------------------------
PEG low-molecular-weight drug conjugates that entered the clinical trials are mostly from the camptothecin (CPT) family, namely, camptothecin itself, SN38, and irinotecan ([Table 1](#tab1){ref-type="table"}). Although the first PEG based products were anticancer agents, subsequently other PEG therapeutics were developed and introduced for the treatment, for example, infectious diseases (e.g., PEG-interferons), and age-related diseases including macular degeneration and arthritis. Moreover, building of these first generation compounds, the pipeline of polymer therapeutics in clinical development continues to grow.
### 6.2.1. Prothecan (PEG-Camptothecin) {#sec6.2.1}
Pegamotecan is a product of Enzon Pharmaceuticals, Inc. which is PEG prodrug of the DNA damaging agent. The prodrug conjugate was conceived by coupling two molecules of CPT to a glycine-bifunctionalised 40 kDa PEG, yielding a drug loading of only approximately 1.7% (w/w) \[[@B108]\] ([Figure 11](#fig11){ref-type="fig"}). The CPT prodrug was designed with the aim of doubling the loading capacity to increase the drug half-life in blood by PEGylation and to stabilize CPT by acylation of the active lactone configuration of CPT \[[@B108]\]. The conjugation to PEG considerably enhanced CPT solubility and bioavailability at the tumor site. The maximum tolerated dose of the conjugate in phase I trials was determined at 7000 mg m^−2^ when administered for 1 h *i.v.* every 3 weeks, both for heavily and minimally pretreated patients. Phase I clinical studies underlined partial response in some cases and indicated that the conjugation to PEG notably improved the pharmacokinetics of the compound. Similarly, in phase II studies the same amount and administration schedule was recommended \[[@B109]\].
### 6.2.2. NKTR-102 (PEG-Irinotecan) {#sec6.2.2}
The multiarm PEG design was employed for the synthesis of NKTR-102 by Nektar Therapeutics in which the drug was conjugated to a four-arm PEG for the treatment of solid tumors \[[@B110]\]. The plasma half-life evaluated for NKTR-102 in a mouse model taking into consideration the active metabolite SN-38, released from irinotecan demonstrated prolonged pharmacokinetic profile with a half-life of 15 days compared to 4 h with free irinotecan \[[@B56]\]. While in phase I clinical trial the safety, pharmacokinetic and antitumour activity of NKTR-102 were evaluated on patients with advanced solid tumors, (e.g., breast, ovarian, cervical, and non-small-cell lung cancer). Interestingly, 13 patients showed significant antitumor activity and reduction of tumor size ranging from a 40% to 58%, while 6 patients showed minor response only \[[@B22]\]. The cumulative SN38 exposure in patients treated with NKTR-102 was 1.2- to 6.5-fold higher than that predicted for irinotecan. The maximum tolerated dose (MTD) of the conjugate was to be 115 mg m^−2^ and the toxicity was manageable (diarrhea and not neutropenia is dose limiting). Noteworthy, that the patients enrolled in this study had failed the prior anticancer treatments or have tumors with no standard treatments available. Multiple phase II studies are ongoing with NKTR-102 alone or in combination with cetuximab for the treatment of ovarian, breast, colorectal, and cervical cancer \[[@B56]\].
### 6.2.3. EZN-2208 (PEG-SN38) {#sec6.2.3}
The multiarm PEG-SN38 conjugate which recently entered phase I clinical trials (year) showed an increased drug loading of 3.7 wt.% with respect to pegamotecan. SN38 is an active metabolite of irinotecan and has 100- to 1000-fold more cytotoxic activity in tissue cell cultures than irinotecan. However, SN38 is practically insoluble in water and hence cannot be administered intravenously \[[@B56]\]. This PEG conjugation enhanced the solubility of SN38 by about 1000-fold. The conjugate acts as a prodrug system with a half-life of 12.3 min of SN38 release in human plasma. Even though the drug release is quite rapid, the PEG conjugate accumulates in tumor mass by EPR effect. In fact, EZN-2208 showed a 207-fold higher exposure to SN38 compared to irinotecan in treated mice, with a tumor to plasma drug concentration ratio increased over the time during the four-day-long pharmacokinetic and biodistribution studies \[[@B112]\]. Earlier, the derivatives demonstrated promising antitumor activity *in vitro* and *in vivo*. Especially, in mouse xenograft models of MX-1 breast, MiaPaCa-2 pancreatic, or HT-29 colon carcinoma, treatment with the conjugate administered either as a single dose or multiple injections exhibited better results than irinotecan \[[@B59]\]. However, recently Enzon Pharmaceuticals, Inc. announced the discontinuance of its EZN-2208 clinical program, following conclusion of its phase II study. The decision was taken in light of evolving standards of care for the treatment of metastatic colorectal cancer (mCRC). The company planned to continue to enroll studies for the other PEG-SN38 programs, which included a soon-to-be fully enrolled phase II study in metastatic breast cancer, a phase I study in pediatric cancer, and a phase I study in combination with Avastin (bevacizumab injection) in solid tumors \[[@B113]\].
7. Clinical Perspective {#sec7}
=======================
Early polymer therapeutics were developed as treatments for life-threatening diseases (cancer and infectious diseases), the emerging products, and clinical development candidates are designed for a much broader range of diseases. NKTR194, an opioid drug, being developed by Nektar using their advanced polymer conjugate technology platform is presently in the preclinical stage \[[@B114]\]. It has been designed to act peripherally without entering the CNS so that the gastrointestinal bleeding, CNS side effects, and cardiovascular risks associate with NSAIDs and COX-2 inhibitors used for treating moderate pains. NKTR-171 is another drug being designed by Nektar to treat neuropathic pain without CNS side effects is in the early research stage. NKTR-125 also in the research stage combines Nektar\'s PEGylation technology with potent antihistamine to enhance its anti-inflammatory properties and minimize the side effects.
BAX 855, Baxter\'s most advanced longer-acting candidate, is schedule to move into phase I clinical trial in 2011 \[[@B114]\]. It is a PEGylated FVIII molecule, which utilizes Nektar\'s PEGylation and Baxter\'s proprietary plasma and albumin-free platform. Preclinical animal studies have revealed that 1 injection of BAX 855 per week imparted similar FVIII levels as that of 3 injections of Advate given approximately every alternate day. In addition, Nektar and Baxter have collaborated to design long-acting clotting protein for hemophilia using Nektar\'s innovative PEGylation and releasable linker conjugate technology \[[@B114]\].
Convincingly, there are pioneering new approaches in research, for example, PEG-recombinant human HA-degrading enzyme, (rHuPH20) developed to degrade HA (it often accumulates in the tumor interstitium) with the aim of decreasing interstitial tumor pressure and to enhance penetration of both low-molecular-weight and nanosized anticancer agents \[[@B115], [@B116]\]. The latter provides an interesting opportunity for combination therapy.
8. Conclusions {#sec8}
==============
PEG is currently the only water soluble polymer, widely accepted in therapeutics with market approval for different drugs. The reason for the wide utility of PEG is because its decreased interaction with blood components (low plasma protein binding) and high biocompatibility. PEGylated drugs such as peginterferon *α* and pegfilgrastim have proven their cost-effectiveness in the market, and products like pegvisomant and certolizumab pegol demonstrate that PEGylated forms will be marketed regardless of the prior commercialization of their non-PEGylated counterparts. This trend indicates that the long-term prospects for the biopharmaceutical PEGylated protein market are high. Due to significant clinical advantages, PEGylation is an essential proposition in delivering drugs and other bioactives. The therapeutic advantages of G-CSF, IFN, and EPO have been acknowledged, and PEGylation offers an attractive means of replacing the original market, given the assumption that biosimilars will appear soon after patents expire. Moreover, PEGylation allows drugs to be distinguished from simple biosimilars. The critical perspective of PEGylation is now envisioned to achieve cellular targetability and therefore suitable chemistry is being explored. Advanced forms of PEGs and their various architectures are designed and being introduced (e.g., hyper branched polyglycerols) \[[@B117]\]. Therefore, the importance of conducting comprehensive investigations on recently introduced potent peptides, proteins, oligonucleotides, and antibody fragments for PEGylation cannot be overemphasized.
{#fig1}
{#fig2}
{#fig3}
![Synthetic schemes for PEG~10,000~-AD~2~-Ara-C~4~ (7) (a) and PEG~10,000~-AD~2~-AD~4~-Ara-C8 (8) conjugates (b). The antitumour agent 1-b-D-arabinofuranosylcytosine (Ara-C) was covalently linked to varying molecular weight --OH terminal PEGs through an amino acid spacer in order to improve the *in vivo* stability and blood residence time (reproduced from \[[@B22]\]).](JDD2012-103973.004){#fig4}
{#fig5}
![(a) Active and passive targeting by nanocarriers \[[@B35]\]; (b) (1) polymer-conjugated drug is internalized by tumor cells through receptor-mediated endocytosis following ligand-receptor docking, (2) transport of DDS in membrane limited organelles; (3) fusion with lysosomes; (4) the drug will usually be released intracellularly on exposure to lysosomal enzymes or lower pH (pH 6.5--\<4.0) \[[@B31]\]. If the drug is bound to the polymer by an acid-sensitive linker then the extracellular release of drug takes place, especially if the drug is trapped by the tumor for longer period of time.](JDD2012-103973.006){#fig6}
![(a) mPEG-based protein-modifying methods. Protein modification with all of these agents results in acylated amine-containing linkages: amides, derived from active esters 3--6 and 11, or carbamates, derived from 7 to 10. Alkylating reagents 12 and 13 react with proteins forming secondary amine conjugation with amino-containing residues. As represented in (b) tresylate 12 alkylates directly, while acetaldehyde (13) is used in reductive alkylation reactions. The numbering (1--13) represent to the order in which these activated polymers were introduced (reproduced from \[[@B6], [@B36]\]).](JDD2012-103973.007){#fig7}
![Synthesis of PEG-Intron by conjugating activated PEG with free amino groups in the interferon. R is lower alkyl group, R~1~, R~2~, R~3~, R~4~, R~1~′, R~2~′, R~3~′, R~4~′, R~5~ is H or lower alkyl; and *x*, *y*, and *z* are selected from any combination of numbers such that the polymer when conjugated to a protein allows the protein to retain at least a portion of the activity level of its biological activity when not conjugated; with the proviso that at least one of R~1~, R~2~, R~3~, and R~4~ is lower alkyl (reproduced from \[[@B40]\].](JDD2012-103973.008){#fig8}
![Schematic representation of higher steric entanglement in PEG dendrons with respect to multiarm PEGs (reproduced from \[[@B55]\]).](JDD2012-103973.009){#fig9}
![ENZ-2208: ^4°K^4 arm-PEG-(SN38)~4~ (reproduced from \[[@B56]\]).](JDD2012-103973.010){#fig10}
{#fig11}
######
PEG therapeutic systems with in the market or clinical development.
Product name Description Clinical use Route of admin. Stage
------------------------ -------------------------------------- ------------------------------------------------ ----------------- ----------
PEG-protein conjugates
Oncaspar PEG-asparaginase Acute lymphocytic leukaemia iv/im Market
Adagen PEG-adenosine deaminase Severe combined immune deficiency syndrome im Market
Somavert PEG-HGH antagonist Acromegaly sc Market
PEGIntron PEG-Interferon alpha 2b Hepatitis C Hepatitis C sc Market
NeulastaTM PEG-rhGCSF Chemotherapy Chemotherapy-induced neutropenia sc Market
Pegasys PEG-interferon alpha 2a hepatitis C Hepatitis C sc Market
CimziaTM PEG-anti-TNF Fab Rheumatoid arthritis, Crohn\'s disease sc Market
Mircera PEG-EPO Anaemia associated with chronic kidney disease iv/sc Market
Puricase PEG-uricase Gout iv Market
Macugen PEG-aptamer Age-related macular degeneration Intraviteal Market
PEG-drug conjugates
NKTR-102 PEG-irinotecan Cancer-metastatic breast iv Phase II
PEG-SN38 Multiarm PEG-camptothecan derivative Cancer-various iv Phase II
NKTR-118 PEG-naloxone Opioid-induced constipation Oral Phase II
######
Clinical trials and their outcome for pegaspargase conjugate.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Stage Trial details Observations/results Reference
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------
Phase I 31 patients with pegaspargase dose ranging from 500 to 8000 U m^−2^. Mean half-life---357 h; dose unrelated hypersensitivity in small population of patients. \[[@B70]\]
Patients with advanced solid tumors; pegaspargase dose 250--2000 U m^−2^ every 14 days. *L*-aspargine level were found to be very low which was again a function of dose. 2000 U m^−2^ dose showed adverse effects such as fatigue, nausea/vomiting and weight loss. Hence dose escalation beyond 2000 U m^−2^ was not evaluated. \[[@B71]\]
Low-dose (500 units m^−2^) in children with relapsed acute lymphoblastic leukemia. *L-*asparaginase activity \>100 U L^−1^ was demonstrated for atleast 1 week. Indicating in possibility reduction in dose. \[[@B72]\]
Five patients with AIDS related lymphoma treated with 1500 U m^−2^ every 2 weeks. Three patients showed complete response. \[[@B73]\]
PEG-*L*-asparaginase as a single agent in patients (22) with recurrent and/or refractory multiple myeloma. Maximal tolerated dose for single agent PEG-*L*-asparaginase in relapse/refractory multiple myeloma patients was found to be 1000 mg m^−2^ every 4 weeks. \[[@B74]\]
Phase II Patients earlier demonstrated sensitivity to *L-*asparaginase was treated with pegaspargase and other agents. 36% patients demonstrated complete response while 15% partial response. \[[@B75]\]
Newly diagnosed adults (14) with acute lymphoblastic leukemia (ALL) treated with 2000 U m^−2^ pegaspargase and multidrug regimen consisted of vincristine, prednisone, and danorubicin. 93% patients revealed complete response. \[[@B76]\]
Seven patients with refractory acute leukemias; dose 2000 U m^−2^ on days 1, 14, and 28 with other agents. Five patients demonstrated complete response while one showed partial response. \[[@B77]\]
An open-label, multicenter study involving 21 patients with recurrent lymphoblastic leukemia with pegaspargase, 2000 U m^−2^ single dose. After 14 days patients were treated with multidrug therapy regime consisting of vincristine, prednisone, and some patients with doxorubicin and intrathecal therapy. On day 14, 17% of patients (from 18) achieved complete response and 1% partial response.\ \[[@B78]\]
On day 35 (after the multidrug regime therapy), 67% patients demonstrated complete response and 11% showed partial response. The overall response rate was 78%.
Pediatric oncology group study: patients with acute lymphoblastic leukemia treated with 2500 U m^−2^ with multidrug regime either weekly or every two weeks. Highly significant 93% complete response was observed in the patients receiving weekly therapy as compared to 82% in patients receiving every two weeks. \[[@B79]\]
Phase III Reinduction of relapsed acute lymphoblastic leukemia: 2500 U m^−2^ pegaspargase on day 1 and 15 or 10,000 U m^−2^ *L*-asparaginase three times a week for 12 doses, both with multidrug regime. Despite difference in dose and dosing rate the complete response and partial response rates were almost similar (63 and 65% for pegaspargase and *L-*asparaginase, resp.). \[[@B80]\]
Randomized trial involving Children with newly diagnosed acute lymphoblastic leukemia; 2500 U m^−2^ pegaspargase on day 1 or 6000 U m^−2^ *L*-asparaginase three times a week for three weeks. Pegaspargase achieved faster rate of remission. Complete response rate was almost similar (98% versus 100% for pegaspargase and *L-*asparaginase, resp.) despite significant difference in dose and dosing rates. \[[@B81]\]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[^1]: Academic Editor: Abhijit A. Date
| 2024-07-29T01:26:19.665474 | https://example.com/article/7919 |
require 'rails_helper'
RSpec.describe 'SLAs', type: :request do
let(:admin) do
create(:admin)
end
describe 'request handling' do
it 'does index sla with nobody' do
get '/api/v1/slas', as: :json
expect(response).to have_http_status(:unauthorized)
expect(json_response).to be_a_kind_of(Hash)
expect(json_response['error']).to eq('authentication failed')
end
it 'does index sla with admin' do
authenticated_as(admin)
get '/api/v1/slas', as: :json
expect(response).to have_http_status(:ok)
expect(json_response).to be_a_kind_of(Array)
expect(json_response).to be_truthy
expect(json_response.count).to eq(0)
get '/api/v1/slas?expand=true', as: :json
expect(response).to have_http_status(:ok)
expect(json_response).to be_a_kind_of(Array)
expect(json_response).to be_truthy
expect(json_response.count).to eq(0)
get '/api/v1/slas?full=true', as: :json
expect(response).to have_http_status(:ok)
expect(json_response).to be_a_kind_of(Hash)
expect(json_response).to be_truthy
expect(json_response['record_ids']).to be_truthy
expect(json_response['record_ids']).to be_blank
expect(json_response['assets']).to be_truthy
expect(json_response['assets']['Calendar']).to be_present
expect(json_response['assets']).to be_present
end
end
end
| 2024-06-27T01:26:19.665474 | https://example.com/article/6879 |
Missed an episode? Been wanting to catch up? This series is also available on:
DESCRIPTION:(from ABC Family's press release) "Fallen" returns as a special event premiering with four new hours on August 3, 4 and 5th. The journey continues with "Fallen," based on the series of hit books by Tom Sniegoski, which chronicles the phenomenal journey of an 18-year-old Nephilim, who struggles to come to terms with his newly discovered identity as he is drawn into a world where angels -- good and evil -- walk among us. This story delves into the mythology of the fallen angels and their offspring, who are looking for the chosen one to come redeem them and allow them back into Heaven. Paul Wesley, Rick Worthy and Fernanda Andrade will all return to their roles from the original two-hour movie that premiered on July 23, 2006. The cast also includes Bryan Cranston, Ivana Milicevic, Hal Ozsan, Will Yun Lee and Rade Sherbedgia. | 2023-11-09T01:26:19.665474 | https://example.com/article/7477 |
Product Description
The Telewave TPRD-3544 Pass-Reject Base Station Duplexer 300-400 MHz, provides high performance with an innovative design. This duplexer uses two TPRC-3504 Pass / Reject cavities in the transmitter and receiver path, providing maximum TX to RX protection in the most severe RF environments. The design of this duplexer provides a bandpass characteristic with minimal insertion loss, while also providing maximum TX to RX protection.
Adjustable coupling optimizes the required attenuation for ideal RX performance. All cavity inputs are electrically shorted to ground for maximum static and noise protection. RG-214 Mil-Spec cable is used for all interconnections to ensure long life, and lowest insertion loss with maximum power handling capability. Heavy-duty materials are used in construction of this duplexer, including silver-plated tuners and beryllium copper finger stock contactors, assuring high “Q” performance with no issues due to dissimilar metals. Tuning is simple and remains stable from -30°C to +70°C, thanks to the threaded Invar rod.
All duplexers are tuned and tested with customer-specified frequencies prior to shipping. No further adjustments should be required. The positive locking mechanism allows for simple field tuning if frequency changes are required. Telewave UHF duplexers mount on a 19” standard rack, with a panel height of 5.25”. Power handling is 250 watts. Receiver desense protection is at least 90 dB, and TX sideband suppression is at least 75 dB. With TX to RX spacing of 3 MHz or more, this duplexer can also combine two transmitters into one antenna, or feed two receivers. For spacing less than 3 MHz, please contact us for assistance. | 2024-01-10T01:26:19.665474 | https://example.com/article/6908 |
Zantac Azantac Ranitidine 150 mg 60 Tabs
On the off chance that its not without a doubt inconvenience advise your specialist before taking any drug. Insipid Name: ranitidine (ra NI ti deen), Ulgastrin Brand Names: (Spanish name, Azantac), Zantac, Zantac 150, Zantac 300, Zantac 300 Geldose, Zantac 75, Zantac Efferdose, Zantac Geldose What is ranitidine? Ranitidine is in a social occasion of meds called histamine-2 blockers. Ranitidine satisfies desires by decreasing the measure of destructive your stomach produces. Ranitidine is used to treat and dodge ulcers in the stomach and guts. It similarly treats conditions in which the stomach conveys a considerable measure of destructive, for instance, Zollinger-Ellison issue. Ranitidine in like manner treats gastroesophageal reflux disease (GERD) and diverse conditions in which destructive moves down from the stomach into the throat, bringing on heartburn. Ranitidine may moreover be used for conditions other than those recorded in this solution helper. | 2024-03-24T01:26:19.665474 | https://example.com/article/4124 |
Need the latest Foxes transfer news? Get FREE email alerts for Leicester City FC Sign up! Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
The confidence of the Leicester City squad can be questioned, but not their mentality, manager Brendan Rodgers said after his side threw away a lead for the second straight game in defeat at Burnley.
City went ahead at Turf Moor but let the hosts recover, Ashley Westwood striking a winner to condemn City to a fourth defeat in six Premier League outings.
While Rodgers’ side improved on their dismal showing against Southampton from last weekend, they still gave up three points.
However, the boss dismissed any suggestions of weak character.
“I don’t think there’s any question about the mentality of the team,” he said. “I think it’s very strong. It’s going to happen. You’ll take the lead and you can get pegged back, and you can go on and win it or vice-versa.
“I don’t think there are any questions over the character of the team. Maybe the confidence is not quite at what it’s been, but the only way you put that right is by working twice as hard. That’s what we’ll look to do for Wednesday [against West Ham].”
(Image: Plumb Images/Getty Images)
In fact, Rodgers said his side deserved to beat the Clarets, who had lost their previous four games.
City had 18 shots to the hosts’ eight, but only Harvey Barnes could convert, with Jamie Vardy seeing a penalty saved by Nick Pope.
“It was an easy game to analyse in terms of performance, I thought we deserved to win the game,” Rodgers said.
“We didn’t take our chances in the game and that was a mixture of their keeper making some brilliant saves and our finishing.
“We were disappointed with the second goal. The first goal, Burnley are very good at set-pieces and we didn’t quite react to the second ball.
“But I always thought we were dangerous in the game and looked a threat and played much better than what we’ve been in our last couple of games. We had that fluency back again.
“The disappointment was the second goal, it goes back to the basics of the game. The midfield player runs off our midfield and gets into the box and scores. His desire to score was greater than ours to stop it. That’s a huge disappointment for us. You have to have those things right in a game if you’re going to get anything.” | 2023-09-17T01:26:19.665474 | https://example.com/article/5392 |
60 Wn.2d 775 (1962)
375 P.2d 743
WILLIAM A. HOKE, Appellant,
v.
STEVENS-NORTON, INC., Respondent.[*]
No. 36104.
The Supreme Court of Washington, Department Two.
November 1, 1962.
John F. Raymond, for appellant.
Burgunder, Flanders & Trolson, for respondent.
*776 HAMILTON, J.
This is an appeal by plaintiff from a judgment dismissing his action for rescission of a contract for sale to him of a second mortgage.
[1] No error having been assigned to the trial court's findings of fact, such, perforce, became the established facts of the case. Fain v. Nelson, 57 Wn. (2d) 217, 356 P. (2d) 302. Our review is, therefore, limited to whether or not the facts as found support the trial court's conclusions of law and judgment. J.D. English Steel Co. v. Tacoma School Dist. No. 10, 57 Wn. (2d) 502, 358 P. (2d) 319.
The essential findings of the trial court are:
Supplemental Finding of Fact No. 1: "That on or about August 15, 1959, Defendant orally and in writing, represented to the Plaintiff that there was available for purchase a note secured by a second mortgage on real property. That said representations were false in that the purported mortgagor did not hold a fee simple interest in said property, but was only a contract purchaser thereof. The property was encumbered by a United States tax lien in the sum of $630.56. That said representations were of existing material facts; were known by the Defendant to be false or were recklessly made; were made to induce the Plaintiff to pay to Defendant the sum of $2250.00, which he did in justifiable reliance on said representations without knowledge that they were false; and that Plaintiff did not recover the money paid to the Defendant."
Supplemental Finding of Fact No. 2: "That the Defendant failed and refused to deliver a mortgage executed by the purported mortgagors, although the Plaintiff repeatedly demanded the papers called for in the sales agreement, including a mortgagee's policy of title insurance. The title insurance policy, Exhibit 12, was ultimately delivered to the Plaintiff and was issued and available by September 12, 1959."
Finding of Fact No. 2: "That thereafter and during the month of January, 1960, the defendant delivered to the plaintiff a note in the principal sum of $2,500.00 together with a deed and purchaser's assignment of real estate contract to secure payment thereof executed by James Holt and Lynette Holt, his wife, to the plaintiff."
Finding of Fact No. 3: "That prior to the delivery of such note and deed and purchaser's assignment of contract, *777 payments thereon had become in arrears. During the period from the latter part of 1959 and until the early part of April, 1960, the plaintiff had dealings with Morris Hardcastle Realty, who represented the holder of the vendor's interest in such real estate contract, made one payment representing four monthly instalments upon such real estate to Hardcastle Realty; accepted a deed from James Holt and Lynette Holt, his wife, in lieu of foreclosure of his security against the real property in question; assumed dominion over the real property by taking possession thereof, having keys made therefor, installing a hot water tank and heater, placing a `For Sale' sign on the property, and orally listed the property with Hardcastle Realty and others for sale."
Supplemental Finding of Fact No. 3: "That on April 20, 1960, Plaintiff formally tendered to Defendant everything that he had received from Defendant and demanded a return of his money, which tender and demand were immediately refused. Thereafter on May 25, 1960, Plaintiff and Defendant, among others, were notified in writing that the true owner of said property, a June Reed, would declare a forfeiture of the Real Estate Contract between herself and James Holt and Lynette Holt, his wife, if payments in default were not made on or before July 1, 1960; and on July 1, 1960, a forfeiture was declared."
From the foregoing findings of fact, the trial court concluded:
"That the plaintiff through an exercise of dominion over the real property hereinbefore referred to, in making payment on the underlying real estate contract, and his failure to make a demand upon the defendant for rescission when he learned the true character of the securities sold to him, has waived any right to rescind or for damages." Conclusion of Law No. 2.
It is to this conclusion that plaintiff assigns error.
[2] Plaintiff contends that the circumstances as found by the trial court do not justify concluding, as a matter of law, that plaintiff waived his right to rescind the purchase agreement. With this contention we agree. However, waiver of the right to rescind is a matter of intent, and, absent compelling circumstances, presents a question of fact. Lawson v. Helmich, 20 Wn. (2d) 167, 146 P. (2d) 537, 151 A.L.R. 930; Fines v. West Side Implement Co., 56 Wn. *778 (2d) 304, 352 P. (2d) 1018; Wickre v. Allen, 58 Wn. (2d) 770, 364 P. (2d) 911.
[3] Although the trial court entered no designated finding of fact bearing upon the issue of intent to waive, conclusion of law No. 2 partakes of the nature of a finding of fact and may be treated as such. Coolidge v. Pierce Cy., 28 Wash. 95, 68 Pac. 391; 53 Am. Jur., Trial § 1138, p. 794; 89 C.J.S., Trial § 647, p. 487.
Treating conclusion of law No. 2 as a finding of fact, upon the issue of plaintiff's intent to waive his right to rescind, examination of the record, and finding of fact No. 3, reveals the following evidentiary and factual basis for the trial court's determination of waiver: Plaintiff had enjoyed some previous experiences in the mortgage investment field; was, or became, aware of the fact that the money he invested was used by the Holts for improving the property in question; knew the Holts defaulted their note to him in November, 1959; knew the property was being offered for sale; and, as set out in finding of fact No. 3:
"... During the period from the latter part of 1959 and until the early part of April, 1960, ... had dealings with Morris Hardcastle Realty, who represented the holder of the vendor's interest in such real estate contract, made one payment representing four monthly instalments upon such real estate to Hardcastle Realty; accepted a deed from James Holt and Lynette Holt, his wife, in lieu of foreclosure of his security ...; assumed dominion over the real property by taking possession thereof, having keys made therefor, installing a hot water tank and heater, placing a `For Sale' sign on the property, and orally listed the property with Hardcastle Realty and others for sale."
[4] Although the foregoing factors, along with other circumstances appearing from the evidence presented, might lend themselves to a different factual finding upon the issue of waiver, it is not our function as an appellate court to "second guess" the trial court, if the facts as found by the trial court are supported by the evidence. Thorndike v. Hesperian Orchards, Inc., 54 Wn. (2d) 570, 343 P. (2d) 183; Hallin v. Bode, 58 Wn. (2d) 280, 362 P. (2d) 242.
*779 [5] We are satisfied too, that a factual finding of waiver, upon the basis of a consideration of all of the factors set out in finding of fact No. 3, supports a legal conclusion of waiver. When found to exist, the exercise of dominion over the intrinsic asset of a contract, as well as an unreasonable delay in manifesting intent to rescind, give rise to a permissible inference of intent to waive the right of rescission. 2 Restatement, Contracts §§ 483, 484, pp. 921, 924. Necessarily such acts are relative matters, and depend, for their application, upon the facts of the particular case. Inherent in their application to a determination of waiver must be factors such as the nature and subject matter of the contract, and the speculative character thereof.
We hold the findings and conclusions support the trial court's judgment that plaintiff waived his right of rescission.
Plaintiff next contends that the trial court erred in finding and concluding that plaintiff also waived his right to claim damages arising out of the fraud and deceit. Assuming, without deciding, that plaintiff is correct upon this score, and further assuming that plaintiff may, under present Rules of Pleading, Practice and Procedure pursue the remedies of rescission and damages alternatively, we are satisfied that restoration of the purchase money, as claimed by plaintiff, is not the applicable measure of damages.
[6] In commercial transactions such as this, where damages are sought as a result of fraud and deceit, the majority of the courts appear to favor applicability of the "benefit of the bargain" measure of damages, that is, the difference between the value of the security had such been as represented (a second mortgage upon a fee simple title) and the actual or real value of the security received. 1 Harper & James, Torts § 7.15, pp. 591, 603; 108 A.L.R. 1060; 37 C.J.S., Fraud § 143b, p. 476, et seq.; 24 Am. Jur., Fraud and Deceit § 227, p. 55. Here, as in Fines v. West Side Implement Co., supra, no attempt was made to come under the benefit of the bargain rule. We cannot speculate that plaintiff's security, as represented by the documents received, *780 was incapable of evaluation within the contemplation of the applicable measure of damages.
The fact that plaintiff subsequently allowed a forfeiture of the underlying real-estate contract does not alone alter the applicable measure of damages, for the pertinent values therein concerned are to be determined either as of the time of acquisition or discovery of the fraud. 1 Harper & James, Torts, supra; 37 C.J.S., Fraud, supra; 24 Am. Jur., Fraud and Deceit, supra.
The judgment is affirmed.
FINLEY, C.J., DONWORTH, OTT, and HUNTER, JJ., concur.
December 13, 1962. Petition for rehearing denied.
NOTES
[*] Reported in 375 P. (2d) 743.
| 2023-10-29T01:26:19.665474 | https://example.com/article/4296 |
Most popular 978 posts about stocks trading in USA & UK:
Blog post: How to buy bitcoin stock etrade
e-Commerce Services Virtual Cash Services. This is all done collectively by the network how to buy bitcoin stock etrade of installed Bitcoin clients. Bitcoin A peer-to-peer virtual currency which works through digitally signed transactions. No central authority issues new money or tracks transactions.11. Apply to become an online tutor at sites like m, instaEdu how to buy bitcoin stock etrade and TutorVista. If you want Indian websites related to online teaching jobs then search for them on google you would definitely find some websites which provide excellent teaching opportunities online.before Bitcoin became famous, but because everything how to buy bitcoin stock etrade is recorded on a publically shared global ledger (the blockchain it is actually not anonymous at all!) people used to believe that Bitcoin was anonymous.
How to buy bitcoin stock etrade
it is not difficult to start a business. It is all about hiring how to buy bitcoin stock etrade the right people or having enough knowledge and connections within a specific industry.if you came to this page how to buy bitcoin stock etrade because there are just too many places to buy bitcoin then you are at the right place.it is absolutely Brilliant!" - John Milton Fogg Author of the million-selling "The Greatest Networker in how to buy bitcoin stock etrade the World" But could this technique work for anyone else? If you're like most people,
please share them in the how to buy bitcoin stock etrade comments below!do surveys Loads of websites give you the opportunity to fill out surveys in exchange for cash. YouGov is among the more well-known sites, but it can is cryptotrader safe take years how to buy bitcoin stock etrade to reach the 50 payout threshold.
Try not to charge so harshley though, for senoir citezins i only took what they gave me, but otherwise, per job is resonable depending on how big the job is. you can make money at a 12 years old by doing nail and hair designing.
How to buy bitcoin stock etrade in USA:
now sure, but I promise you that with some patience, theres some subjectivity to that too, a little bit how to buy bitcoin stock etrade of knowledge, so whats the right way to do it? Affordable means different things to different people, im saying it can be done. But yeah,is Making Money Online Without Investment Possible? Yes it is possible. So here we will understand how to earn how to buy bitcoin stock etrade money online by legitimate and trusted ways. Lets Put Some Light On This As a matter of fact,oIL PRICES - how to buy bitcoin stock etrade 30 RATES. ETC. GOLD, gBP to USD, eXCHANGE RATES ONLINE : EUR to USD,
bitcoin BTC Ethereum ETH Litecoin LTC how to buy bitcoin stock etrade Bitcoin. Cash BCH Dashcoin DSH ZCash ZEC Bank Transfer USD.or both. The problem is virtually every single business will have to deal with spreadsheets how to make bitcoins cash at some point. A majority of people either have no spreadsheet skills, hate working in spreadsheets,
Many people recommend starting a blog to earn money from adsense. A blog is a website which is updated regularly. The owner of the blog posts new articles every few days. Blogging is great but, if you start a blog on a broad subject, it.
This game teaches addition through a graphical display that lets the child see and count the shoes. With the numbers right underneath, children easily make the association between the visual cues and the act of addition. For slightly older kids, there are a number of.
some phytonutrients found in walnutsfor example, the quinone jugloneare found in virtually no other commonly-eaten foods. Other phytonutrientslike the tannin tellimagrandin or the flavonol morinare also how to buy bitcoin stock etrade rare and valuable as antioxidants and anti-inflammatory nutrients.research companies are always recruiting how to buy bitcoin stock etrade new members to answer surveys and test new products. Online surveys Credit: Julio Marquez Flickr. An increasingly popular way for students to make money is to fill out online surveys in their spare time.we are still working hard on developing a clear and understandable categorization of how to buy bitcoin stock etrade earning methods and would really be glad to hear any of your suggestions.
Photos "How to buy bitcoin stock etrade":
hP, beats and many more. Nikon, paytm Mall is the one-stop destination for all your needs. MSI, apple, travel-friendly laptops to how to buy bitcoin stock etrade sturdy business laptops with superior performance, including Lenovo, jBL, from sleek, canon, you can choose electronics items from the most trusted brands, also,sites that will pay you to. If you want sites where you can turn your stuff into cash, go to. Sites that Pay You For Stuff. Sites that Pay You For Stuff.when it matures, at, how to buy bitcoin stock etrade floating Rate Notes (FRNs FRNs are two year notes that can be sold below,) you get face value. Series EE Savings Bonds: Series EE bonds are bonds that earn a fixed rate of interest, or above face value.for example, rollover IRA This is an account thats created by rolling over another account, if you have a 401(k)) with an employer who you leave, such as a company-sponsored 401(k)). You can roll that how to buy bitcoin stock etrade money over into a Rollover IRA.
trim your Unused Subscriptions We waste a lot of money on things like subscription services we no longer use. Their interest rates are best in class so we highly recommend them. An hour of time here can easily how to buy bitcoin stock etrade save you thousands of dollars.sEMI, a company's computers will be told when it's time to replace equipment. All of these systems and devices will need chips to run the information. An best altcoins to invest now industry group, that means companies making chips will be major beneficiaries from the growth of this sector.your site looks like the first honest attempt to help people understand about online income. How to Earn Money Online in India without Investment. Choose how you want to earn how to buy bitcoin stock etrade online l If youre in urgent need of money want to earn immediately,
How to buy bitcoin without verification!
your blog can be your online business, but consistently That is the difference between a freelance job and owning a business. Write for how to buy bitcoin stock etrade someone and make money immediately Write for yourself and make money slowly,the tasks aren't always small. As well. Such as home renovations, taskRabbit lets you tap into an existing marketplace of people looking for help locally with chores. Do tasks with TaskRabbit. This platform (along how to buy bitcoin stock etrade with others)) offers bigger tasks,to give the cigarettes a more "elegant" appearance. Sold how to buy bitcoin stock etrade only in longer 100s and 120's, and are also longer than normal "king-sized" cigarettes, cheap Virginia Slims Cigarettes are much narrower than ordinary cigarettes,not to make money, the itch led me down how to buy bitcoin stock etrade a rabbit hole of research, i felt it was time to try again. But to understand what the hell all the fuss was about. I finally got it'. Fueled by fascination and excitement."Buyers" can post job listings for how to buy bitcoin stock etrade free. Freelancers can find jobs online and get paid for their work. Worldwide Work At Home Work at home jobs mostly for the US. Please see here. For work outside the US,
100 good small business ideas with how to buy bitcoin stock etrade low investment.and Millions of people are already earning through internet by how to buy bitcoin stock etrade doing simple online jobs. Its all yours that how do you plan to earn money from online jobs.do you want to work part-time online pay your how to buy bitcoin stock etrade mobile other utility bills? This will change your from here! Working online has become a style lately like you, if your answer is yes, are you looking to earn passive income online?here are over 200 ideas just for kids and teens. Find tons of ideas just for 13 year olds. Or How can a how to buy bitcoin stock etrade kid make money? Are you looking ways to make money as a kid?
More "How to buy bitcoin stock etrade"
a concern with which I have a relationship recently sent me a card good for discounts on over the counter pharmaceuticals. As an incentive to stay healthy, nice, as a final example how to buy bitcoin stock etrade I offer a conscious act on my part.set the how to buy bitcoin stock etrade date to 3. More like this.,!READ ME! INSTRUCTIONS : 1. Go to System Settings - Other Settings - Date Time - Today's date 2. More like this., as things went. Shake or what is the fastest way to make money in real estate walk with.
beijings tougher stance which effectively how to buy bitcoin stock etrade bans all forms of activity related to digital currencies aims to put the breaks on the ICO and virtual-currency trading mania that has been sweeping China.some BTC ATMs dont require you how to buy bitcoin stock etrade to disclose your identity and they dont require facial or fingerprint identification. But it is still one of the best ways of buying Bitcoin without an ID.sometimes it takes a little longer, he scours the classified listings for deals, how to buy bitcoin stock etrade sometimes he sells them quickly, lands a good deal and then drives the car while trying to sell it for a couple grand more.here are how to buy bitcoin stock etrade guides/tutorials (Open them one by one)) which will help you to get AdSense approval. Usually getting an approved account takes up to 7 days in between if your application got rejected,
however, plus, you can cut your payments by up to how to buy bitcoin stock etrade 80 by refinancing. Most credit cards have interest rates above 25 and Even loans are as low as 5. Same amount of debt fastest way to buy bitcoin with paypal but a fraction of the interest and compounding. | 2023-08-18T01:26:19.665474 | https://example.com/article/4918 |
20th Pennsylvania Infantry Regiment
The 20th Pennsylvania Volunteer Infantry (Scott Legion) was a volunteer infantry regiment in the Union Army during the American Civil War. One of the Keystone State's three-month service regiments, this unit's tour of duty took its members from Philadelphia to South Central Pennsylvania and then southeast to Maryland and Virginia (into Martinsburg and other areas that are now part of West Virginia).
History
Formed during a meeting on Thursday, April 25, 1861 by members of the "Scott Legion," a group of soldiers who had served under General Winfield Scott during the Mexican–American War, the 20th Pennsylvania Volunteer Infantry was led by William H. Gray, a 46-year-old resident of Philadelphia, who had been appointed as commanding officer of the regiment and awarded the rank of colonel at this same meeting, Gray then began his recruitment efforts the next day at multiple recruiting locations in Philadelphia. By Saturday of that same week, his ranks were full and, by the next week, were overflowing as an additional 600 men volunteered.
Mustering in at Philadelphia on April 30, the newly enlisted men then elected the following as Field and Staff Officers on May 7: George Moore, lieutenant colonel; Andrew H. Tippin, major; Edwin R. Biles, adjutant; Charles A. Jones, quartermaster; A. B. Campbell, surgeon; Samuel H. Horner, assistant surgeon; and William Fulton, chaplain. According to Bates, "Of the thirty-seven [company and field] officers chosen, nearly all were elected unanimously, and thirty-one of this number were members of [the Scott Legion."
The most senior officers for each company of the regiment were:
Company A: A. S. Tourison, captain; Enoch Thomas, first lieutenant; William J. Mackey, second lieutenant; William H. Tourison, first sergeant;
Company B: Edward E. Wallace, captain; Lafayette Thomas, first lieutenant; Isaac Williams, second lieutenant; William H. Forbes, first sergeant;
Company C: John Spear, captain; Thomas G. Funston, first lieutenant; Edward L. Poalk, second lieutenant; John B. Buck, first sergeant;
Company D: Anthony H. Reynolds, captain; Alexander Lorilliard, first lieutenant; Charles J. Bates, second lieutenant; Francis H. Casey, first sergeant;
Company E: Thomas Hawksworth, captain; William Stiff, first lieutenant; James A. Sawyer, second lieutenant; Robert Pollard, first sergeant;
Company F: John P. Carie, captain; Milton S. Davis, first lieutenant; Garrett B. Culin, second lieutenant; T. Vincent Bonsald, first sergeant;
Company G: Hiram B. Yeager, captain; Theodore B. Dunham, first lieutenant; Cephas M. Hodgson, second lieutenant; Lewis Passmore, first sergeant;
Company H: James Crosson, captain; Robert Winslow, first lieutenant; John Arrison, first lieutenant; Alfred Moylan, second lieutenant; Charles W. Myers, first sergeant;
Company I: George W. Todd, captain; Edward Y. Buchanan, first lieutenant; Richard M. Jones, second lieutenant; James B. Venai, first sergeant;
Company K: William H. Sickels, captain; Jediah Rumble, first lieutenant; George W. Gampher, second lieutenant; and Anthony W. Thompson, first lieutenant.
Per a notice from the Scott Legion, which was published in the Columbia Democrat in Bloomsburg, Pennsylvania in June, 1861 after having first appeared in the Philadelphia Inquirer:
The Scott Legion of this city [Philadelphia] have formed one regiment, now in service for three years, and have a second regiment ready to be sworn in at any time. The officers of these regiments are members of the old Scott legion, who served so effectively during the Mexican war. The Captains and Lieutenants are all above thirty, or twenty-two years of age....
Initially stationed at the Post Office in Philadelphia, the 20th Pennsylvania Volunteers were "clothed in the old United States blue jacket and pants," according to Bates, equipped with rifled muskets, and given basic training in both Scott's and Hardee's infantry tactics. Honing their marching skills during a series of dress parades, they also engaged in periodic battalion drills at the State House yard before the regiment was moved to Suffolk Park, six miles outside of Philadelphia. Stationed there for two weeks, during which the men received additional arms training, the regiment was then ordered to Chambersburg, Pennsylvania, where it was attached to Major General Robert Patterson's army as part of the 3rd Brigade, First Division.
The Bedford Inquirer then reported on the regiment's presence at Chambersburg on June 2:
Chambersburg, June 2.– General Patterson and his staff reached here this morning, Captain McMullin's Rangers met with enthusiastic greeting at every station along the road from Harrisburg. The Rangers are quartered in the woods near the First City Troop. The latter are in fine health and spirits. The Scott Legion, encamped three miles south of the town, bear their fatigue well....
Ordered to move out with their brigade on June 8, the 20th Pennsylvania Volunteers made camp at Greencastle, Pennsylvania before moving again to sites in Maryland near the St. James School (Hagerstown) and Williamsport. On July 2, they moved out with the entire Army of the Shenandoah, making their way to Martinsburg and Bunker Hill, Virginia, where they were assigned to protect the army's main column as it moved on to Charlestown in an attempt to pin down General Joseph E. Johnston's Confederate forces. Continuing their forward movement, the 20th Pennsylvania then joined with other Union troops from the Army of the Shenandoah to seize and occupy Keyes' Ford.
On July 24, the regiment was ordered back to Philadelphia, where it was mustered out August 6, having honorably completed its three months' service.
Casualties
According to rosters for the 20th Pennsylvania, which are maintained online by the Pennsylvania State Archives, only one member of the regiment was reported as a casualty – Pvt. Thomas H. Ford of Company D, who was honorably discharged on a surgeon's certificate of disability. Based on these same records, no other casualties were incurred by the regiment during its three-month tenure of service.
References
Gallery
External resources
Conservation, in Pennsylvania Civil War Battle Flags. Harrisburg, Pennsylvania: Pennsylvania Historical and Museum Commission.
Hardee, William Joseph. Hardee’s Rifle and Light Infantry Tactics. Memphis, Tennessee: E.C. Kirk & Co., 1861.
20th Regiment, in Registers of Pennsylvania Volunteers, 1861-1865. Harrisburg, Pennsylvania: Pennsylvania Historical and Museum Commission.
20th Regiment Pennsylvania Volunteers (Pennsylvania in the Civil War)
See also
List of Pennsylvania Civil War Units
Category:Pennsylvania Civil War regiments
Category:Military personnel from Philadelphia
Category:Military units and formations established in 1861
Category:1861 establishments in Pennsylvania
Category:Military units and formations disestablished in 1861 | 2024-06-11T01:26:19.665474 | https://example.com/article/7463 |
Q:
Java. Задачка по функциональному интерфейсу
Вот условие:
You need to write your own functional interface (TernaryIntPredicate)
and use it with a lambda expression. The interface must have a single
non-static (and non-default) method test with three int arguments that
returns boolean value.
Besides, you need to write a lambda expression with three int
arguments using your TernaryIntPredicate.
The lambda expression has to return true if all passed values are
different otherwise false. The name of the instance is
allValuesAreDifferentPredicate. It should be a static field.
Important. Use the provided template for your solution. Do not change it!
Sample Input 1: 1 1 1
Sample Output 1: False
Sample Input 2: 2 3 4
Sample Output 2: True
Вот начальный код:
@FunctionalInterface
public interface TernaryIntPredicate {
// Write a method here
}
public static final TernaryIntPredicate allValuesAreDifferentPredicate = //
Write a lambda expression here
A:
@FunctionalInterface
public interface TernaryIntPredicate {
boolean test(int first, int second, int third);
}
class Main {
public static final TernaryIntPredicate allValuesAreDifferentPredicate =
(first, second, third) -> first != second && first != third && second != third;
public static void main(String[] args) {
System.out.println(allValuesAreDifferentPredicate.test(1,1,1));
System.out.println(allValuesAreDifferentPredicate.test(2,3,4));
}
}
| 2024-07-02T01:26:19.665474 | https://example.com/article/3631 |
/***************************************************************************
* TextLabelAscii.cs
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
***************************************************************************/
#region usings
using Microsoft.Xna.Framework;
using UltimaXNA.Core.Graphics;
using UltimaXNA.Core.UI;
#endregion
namespace UltimaXNA.Ultima.UI.Controls
{
class TextLabelAscii : AControl
{
public int Hue;
public int FontID;
private readonly RenderedText m_Rendered;
private string m_Text;
private int m_Width;
public string Text
{
get
{
return m_Text;
}
set
{
if (m_Text != value)
{
m_Text = value;
m_Rendered.Text = string.Format("<span style=\"font-family:ascii{0}\">{1}", FontID, m_Text);
}
}
}
public TextLabelAscii(AControl parent, int width = 400)
: base(parent)
{
m_Width = width;
m_Rendered = new RenderedText(string.Empty, m_Width, true);
}
public TextLabelAscii(AControl parent, int x, int y, int font, int hue, string text, int width = 400)
: this(parent, width)
{
BuildGumpling(x, y, font, hue, text);
}
void BuildGumpling(int x, int y, int font, int hue, string text)
{
Position = new Point(x, y);
Hue = hue;
FontID = font;
Text = text;
}
public override void Draw(SpriteBatchUI spriteBatch, Point position, double frameMS)
{
m_Rendered.Draw(spriteBatch, position, Utility.GetHueVector(Hue, true, false, true));
base.Draw(spriteBatch, position, frameMS);
}
}
}
| 2024-01-11T01:26:19.665474 | https://example.com/article/4638 |
Senolytics are drugs that extend lifespan and delay some age-related diseases by killing senescent cells \[[@r1]--[@r4]\]. In fact, drug screens have identified a diverse group of drugs that are preferentially toxic to at least some senescent cells in some cellular models \[[@r2]--[@r9]\]. So far, however, their selectivity against senescent cells is modest and cell-type-specific \[[@r8]--[@r11]\]. Nevertheless, targeting senescent cells has been shown in animal models to prevent such age-related pathologies as emphysema \[[@r12]\], lung fibrosis \[[@r13]--[@r15]\], atherosclerosis \[[@r16],[@r17]\], osteoporosis \[[@r18]\], osteoarthritis \[[@r19],[@r20]\], renal disease \[[@r21]\], intervertebral disk pathology \[[@r2]\], hepatic steatosis \[[@r22]\] and other age-related conditions \[[@r4],[@r7],[@r18],[@r23],[@r24]\].
In this editorial commentary, I want to draw your attention to the paradoxes associated with senolytics, which argue against the dogma that says aging is a functional decline caused by molecular damage. This dogma predicts that senolytics should accelerate aging. If aging is caused by loss of function, then killing senescent cells would be expected to accelerate aging, given that dead cells have no functionality at all. Instead, however, senolytics slow aging, which highlights a contradiction in the prevailing dogma.
The theory of hyperfunctional aging \[[@r25]--[@r32]\] addresses this paradox. Killing senescent cells is beneficial because senescent cells are hyperfunctional \[[@r33]\]. The hypersecretory phenotype or Senescence-Associated Secretory Phenotype (SASP) is the best-known example of universal hyperfunction \[[@r34]--[@r36]\]. Most such hyperfunctions are tissue-specific. For example, senescent beta cells overproduce insulin \[[@r37]\] and thus activate mTOR in hepatocytes, adipocytes and other cells, causing their hyperfunction, which in turn leads to metabolic syndrome (obesity, hypertension, hyperlipidemia and hyperglycemia) and is also a risk factor for cancer \[[@r38]--[@r40]\]. SASP, hyperinsulinemia and obesity, hypertension, hyperlipidemia and hyperglycemia are all examples of absolute hyperfunction (an increase in functionality). In comparison, relative hyperfunction is an insufficient decrease of unneeded function. For example, protein synthesis decreases with aging, but that decrease is not sufficient \[[@r30]\]. In analogy, a car moving on the highway at 65 mph is not "hyperfunctional." But if the car were to exit the highway and enter a residential driveway at only 60 mph it would be "hyperfunctional," and stopping that car would likely prevent damage to other objects. Similarly, killing hyperfunctional cells can prevent organismal damage. Senolytics eliminate hyperfunctional cells, which otherwise damage organs ([Figure 1](#f1){ref-type="fig"}).
{#f1}
Senolytics should not be confused with gerosuppressants ([Figure 1](#f1){ref-type="fig"}). Gerosuppressants, such as rapamycin, do not kill cells; they instead prevent cellular conversion to senescence (geroconversion) \[[@r33]\]. Rapamycin also slows disease progression by limiting the hyperfunction of senescent cells. Notably, some senolytics are also gerosuppressants. For example, inhibitors of MEK \[[@r41]--[@r43]\] or PI3K \[[@r2],[@r41]\] are both gerosuppressants \[[@r41]\] and senolytics \[[@r2],[@r42],[@r43]\].
It may seem paradoxical that senolytics are anticancer drugs \[[@r44]\] because standard anticancer agents cause molecular damage. According to the hyperfunction theory \[[@r45]\], molecular damage does not cause aging. Although accumulation of molecular damage does happen and would destroy the organism eventually, no organism lives long enough for that to occur because TOR-driven (hyperfunctional) aging kills it first. If TOR-driven aging (i.e., aging as we currently know it) were abolished, then organisms would die from "post-aging syndrome" due to molecular damage (see Figure 8 in ref. \[[@r25]\].). Molecular damage contributes to some age-related diseases. But these diseases would arise even without molecular damage \[[@r45]\]. Molecular damage is essential for most types of cancer, but a senescent microenvironment \[[@r46]\] and overall organism aging (and associated diseases such as diabetes) also play roles \[[@r47]\], as does clonal selection for mTOR activation in cancer cells \[[@r48]\]. Importantly, molecular damage renders cancer cells robust and hyperfunctional. Cancer cells kill an organism not because molecular damage makes them weak; it is because the molecular damage makes them robust and hyperfunctional. If accumulation of molecular damage leads to immortalization and robustness, then aging cannot represent functional decline caused by molecular damage \[[@r48]\].
All senolytics, without exception, were initially investigated or specifically developed as anticancer drugs. But not all anticancer drugs are senolytics. Both senolytics and gerosuppressants belong to a very special subgroup of oncotargeted drugs \[[@r49]\]. Various pathways involving IGF-1, Ras, MEK, AMPK, TSC1/2, FOXO, PI3K, mTOR, S6K, and NFκB comprise a mTOR-related network and are involved in aging \[[@r49]\]. Oncoproteins promote aging, while tumor suppressors are gerosuppressors, which inhibit aging \[[@r48],[@r50]\]. As depicted a decade ago (see Figure 3 in ref. \[[@r51]\]. and Figures 4 and 9 in ref. \[[@r25]\].), oncotargets are gerotargets that are also mTOR activators, while tumor and aging suppressors are mTOR inhibitors. In brief, geroconversion and oncogenic transformation are two sides of the same process \[[@r50]\]. Gerogenic oncogenes activate the mTOR pathway, driving geroconversion of cell cycle-arrested cells. When cell cycle control is disabled, they drive oncogenic transformation \[[@r48],[@r50]\].
Many puzzles remain. For example, killing senescent adipocytes, macrophages or foam cells will slow diseases such as atherosclerosis and metabolic diseases, and killing senescent glial cells can prevent cognitive decline \[[@r23]\]. On the other hand, killing some senescent cell types may be counterproductive. For example, killing senescent beta cells may lead to diabetes \[[@r37]\], and killing of senescent hyperfunctional neurons in Alzheimer's disease may have unpredictable consequences. Fortunately, senolytics are tissue-specific and only kill some types of senescent cells \[[@r8]--[@r11]\], which may make them safer.
To add further complication to the paradoxes associated with senolytics, it was shown that many detected p16/β-gal-positive cells are not senescent cells, but are instead hyperfunctional macrophages, which contribute to aging \[[@r52]--[@r54]\]. Notably, β-gal staining is a marker of hyperfunctional lysosomes \[[@r55]\]. A combination of markers, including mTOR targets, is needed to define senescence \[[@r33]\]. Some senolytics that target Bcl2 family proteins may theoretically kill leukemia/lymphoma cells. I hope to discuss these and other issues in a scheduled review "Senolytics, gerosuppressants and conventional life-extending drugs."
**CONFLICTS OF INTEREST:** The author declares no conflicts of interest.
| 2024-03-12T01:26:19.665474 | https://example.com/article/7146 |
PHOENIX - The United States could see an official about-face in the coming months in how it confronts illegal immigration if the Supreme Court follows through on its suggestion to let local police enforce the most controversial part of Arizona's immigration law.
Over the last several years, states frustrated with America's porous borders have rejected the notion that Washington is responsible for confronting illegal immigration.
The states have passed a flurry of laws to let local police confront illegal immigration. The Supreme Court is poised in the coming months to let the states know whether they haven't crossed the line this time.
The justices suggested Wednesday that they're ready to let Arizona enforce its requirement that police officers check the immigration status of people they suspect are in the country illegally. | 2023-12-26T01:26:19.665474 | https://example.com/article/5870 |
A portion of Kansas City from W. 5th Street south to W. 7th Street and from Wyandotte east to Delaware, showing buildings, streets, and additions. Large numbers at edges of page refer to page with adjoining... | 2023-08-03T01:26:19.665474 | https://example.com/article/4113 |
FEATURED CONTRIBUTOR
This Australian Senator Just Made History For Breastfeeding at Work
Viewing on Levo:
Only you can see this list
Fact: Women have to breastfeed their babies. Another fact: Women who have to breastfeed often have super important jobs. And yet, another fact: Just because they need to feed their babies doesn't automatically grant them the ability to pause time in a dramatic freeze frame, breastfeed in a (sequestered) private room, and then return to whatever they were doing. And if you need any proof that these moments without a dramatic freeze frame (or a sequestering private room) can happen, just take a look at Australian Senator Larissa Waters, who made history this week when she breastfed in Parliament...and just went on with her job.
According to the Sydney Morning Herald, Waters was making her return to work after giving birth to her daughter Alia Joy. As is the reality of life, women have babies and need to continue their jobs — and sometimes, breastfeeding in public on the job is what's got to be done.
"So proud that my daughter Alia is the first baby to be breastfed in the federal Parliament!" She tweeted. We need more #women & parents in Parli #auspol"
Indeed.
After all, "Women are going to continue to have babies and if they want to do their job and be at work and look after their baby ... the reality is we are going to have to accommodate that," as Senator Katy Gallagher said to Sky News (via Sydney Morning Herald).
But unfortunately, Australia hasn't always been so accommodating to mothers in the past. Just last year, Australian Parliament started letting women bring in their babies to vote; they had a proxy vote up until then. And in 2009, Senator Sarah Hanson-Young made headlines when her child was literally taken from her when she brought her to Parliament. So it's pretty noteworthy that Parliament just let Waters go on about her job without punishing her for being a human woman with a child.
The catch, of course, is that it will *really* be historic when we're no longer chronicling moments of women breastfeeding in public as groundbreaking moments in history, and that it should become the norm — as in, "this is what happens to a woman when she's a mother, this is life." But in the meantime, it's pretty cool to see one woman making history in Australia nonetheless, and it's even cooler to see Australia's Parliament be more accommodating and friendly to parents. Maybe then, Waters' call in her tweet for more women and parents in Parliament will become a reality.
Let's navigate this together.
Levo arms you with the tools to develop your talent, build connections with peers, mentors, and jobs. Stay inspired day in and day out as you grow and develop. We believe you can create a life you're passionate about. | 2024-01-03T01:26:19.665474 | https://example.com/article/4808 |
#include <linux/module.h>
#include <linux/types.h>
#include <linux/kernel.h>
#include <linux/sched.h>
#include <asm/uaccess.h>
#include "sfp-util.h"
#include <math-emu/soft-fp.h>
#include <math-emu/single.h>
#include <math-emu/double.h>
#define OPC_PAL 0x00
#define OPC_INTA 0x10
#define OPC_INTL 0x11
#define OPC_INTS 0x12
#define OPC_INTM 0x13
#define OPC_FLTC 0x14
#define OPC_FLTV 0x15
#define OPC_FLTI 0x16
#define OPC_FLTL 0x17
#define OPC_MISC 0x18
#define OPC_JSR 0x1a
#define FOP_SRC_S 0
#define FOP_SRC_T 2
#define FOP_SRC_Q 3
#define FOP_FNC_ADDx 0
#define FOP_FNC_CVTQL 0
#define FOP_FNC_SUBx 1
#define FOP_FNC_MULx 2
#define FOP_FNC_DIVx 3
#define FOP_FNC_CMPxUN 4
#define FOP_FNC_CMPxEQ 5
#define FOP_FNC_CMPxLT 6
#define FOP_FNC_CMPxLE 7
#define FOP_FNC_SQRTx 11
#define FOP_FNC_CVTxS 12
#define FOP_FNC_CVTxT 14
#define FOP_FNC_CVTxQ 15
#define MISC_TRAPB 0x0000
#define MISC_EXCB 0x0400
extern unsigned long alpha_read_fp_reg (unsigned long reg);
extern void alpha_write_fp_reg (unsigned long reg, unsigned long val);
extern unsigned long alpha_read_fp_reg_s (unsigned long reg);
extern void alpha_write_fp_reg_s (unsigned long reg, unsigned long val);
#ifdef MODULE
MODULE_DESCRIPTION("FP Software completion module");
extern long (*alpha_fp_emul_imprecise)(struct pt_regs *, unsigned long);
extern long (*alpha_fp_emul) (unsigned long pc);
static long (*save_emul_imprecise)(struct pt_regs *, unsigned long);
static long (*save_emul) (unsigned long pc);
long do_alpha_fp_emul_imprecise(struct pt_regs *, unsigned long);
long do_alpha_fp_emul(unsigned long);
int init_module(void)
{
save_emul_imprecise = alpha_fp_emul_imprecise;
save_emul = alpha_fp_emul;
alpha_fp_emul_imprecise = do_alpha_fp_emul_imprecise;
alpha_fp_emul = do_alpha_fp_emul;
return 0;
}
void cleanup_module(void)
{
alpha_fp_emul_imprecise = save_emul_imprecise;
alpha_fp_emul = save_emul;
}
#undef alpha_fp_emul_imprecise
#define alpha_fp_emul_imprecise do_alpha_fp_emul_imprecise
#undef alpha_fp_emul
#define alpha_fp_emul do_alpha_fp_emul
#endif /* MODULE */
/*
* Emulate the floating point instruction at address PC. Returns -1 if the
* instruction to be emulated is illegal (such as with the opDEC trap), else
* the SI_CODE for a SIGFPE signal, else 0 if everything's ok.
*
* Notice that the kernel does not and cannot use FP regs. This is good
* because it means that instead of saving/restoring all fp regs, we simply
* stick the result of the operation into the appropriate register.
*/
long
alpha_fp_emul (unsigned long pc)
{
FP_DECL_EX;
FP_DECL_S(SA); FP_DECL_S(SB); FP_DECL_S(SR);
FP_DECL_D(DA); FP_DECL_D(DB); FP_DECL_D(DR);
unsigned long fa, fb, fc, func, mode, src;
unsigned long res, va, vb, vc, swcr, fpcr;
__u32 insn;
long si_code;
get_user(insn, (__u32 __user *)pc);
fc = (insn >> 0) & 0x1f; /* destination register */
fb = (insn >> 16) & 0x1f;
fa = (insn >> 21) & 0x1f;
func = (insn >> 5) & 0xf;
src = (insn >> 9) & 0x3;
mode = (insn >> 11) & 0x3;
fpcr = rdfpcr();
swcr = swcr_update_status(current_thread_info()->ieee_state, fpcr);
if (mode == 3) {
/* Dynamic -- get rounding mode from fpcr. */
mode = (fpcr >> FPCR_DYN_SHIFT) & 3;
}
switch (src) {
case FOP_SRC_S:
va = alpha_read_fp_reg_s(fa);
vb = alpha_read_fp_reg_s(fb);
FP_UNPACK_SP(SA, &va);
FP_UNPACK_SP(SB, &vb);
switch (func) {
case FOP_FNC_SUBx:
FP_SUB_S(SR, SA, SB);
goto pack_s;
case FOP_FNC_ADDx:
FP_ADD_S(SR, SA, SB);
goto pack_s;
case FOP_FNC_MULx:
FP_MUL_S(SR, SA, SB);
goto pack_s;
case FOP_FNC_DIVx:
FP_DIV_S(SR, SA, SB);
goto pack_s;
case FOP_FNC_SQRTx:
FP_SQRT_S(SR, SB);
goto pack_s;
}
goto bad_insn;
case FOP_SRC_T:
va = alpha_read_fp_reg(fa);
vb = alpha_read_fp_reg(fb);
if ((func & ~3) == FOP_FNC_CMPxUN) {
FP_UNPACK_RAW_DP(DA, &va);
FP_UNPACK_RAW_DP(DB, &vb);
if (!DA_e && !_FP_FRAC_ZEROP_1(DA)) {
FP_SET_EXCEPTION(FP_EX_DENORM);
if (FP_DENORM_ZERO)
_FP_FRAC_SET_1(DA, _FP_ZEROFRAC_1);
}
if (!DB_e && !_FP_FRAC_ZEROP_1(DB)) {
FP_SET_EXCEPTION(FP_EX_DENORM);
if (FP_DENORM_ZERO)
_FP_FRAC_SET_1(DB, _FP_ZEROFRAC_1);
}
FP_CMP_D(res, DA, DB, 3);
vc = 0x4000000000000000UL;
/* CMPTEQ, CMPTUN don't trap on QNaN,
while CMPTLT and CMPTLE do */
if (res == 3
&& ((func & 3) >= 2
|| FP_ISSIGNAN_D(DA)
|| FP_ISSIGNAN_D(DB))) {
FP_SET_EXCEPTION(FP_EX_INVALID);
}
switch (func) {
case FOP_FNC_CMPxUN: if (res != 3) vc = 0; break;
case FOP_FNC_CMPxEQ: if (res) vc = 0; break;
case FOP_FNC_CMPxLT: if (res != -1) vc = 0; break;
case FOP_FNC_CMPxLE: if ((long)res > 0) vc = 0; break;
}
goto done_d;
}
FP_UNPACK_DP(DA, &va);
FP_UNPACK_DP(DB, &vb);
switch (func) {
case FOP_FNC_SUBx:
FP_SUB_D(DR, DA, DB);
goto pack_d;
case FOP_FNC_ADDx:
FP_ADD_D(DR, DA, DB);
goto pack_d;
case FOP_FNC_MULx:
FP_MUL_D(DR, DA, DB);
goto pack_d;
case FOP_FNC_DIVx:
FP_DIV_D(DR, DA, DB);
goto pack_d;
case FOP_FNC_SQRTx:
FP_SQRT_D(DR, DB);
goto pack_d;
case FOP_FNC_CVTxS:
/* It is irritating that DEC encoded CVTST with
SRC == T_floating. It is also interesting that
the bit used to tell the two apart is /U... */
if (insn & 0x2000) {
FP_CONV(S,D,1,1,SR,DB);
goto pack_s;
} else {
vb = alpha_read_fp_reg_s(fb);
FP_UNPACK_SP(SB, &vb);
DR_c = DB_c;
DR_s = DB_s;
DR_e = DB_e + (1024 - 128);
DR_f = SB_f << (52 - 23);
goto pack_d;
}
case FOP_FNC_CVTxQ:
if (DB_c == FP_CLS_NAN
&& (_FP_FRAC_HIGH_RAW_D(DB) & _FP_QNANBIT_D)) {
/* AAHB Table B-2 says QNaN should not trigger INV */
vc = 0;
} else
FP_TO_INT_ROUND_D(vc, DB, 64, 2);
goto done_d;
}
goto bad_insn;
case FOP_SRC_Q:
vb = alpha_read_fp_reg(fb);
switch (func) {
case FOP_FNC_CVTQL:
/* Notice: We can get here only due to an integer
overflow. Such overflows are reported as invalid
ops. We return the result the hw would have
computed. */
vc = ((vb & 0xc0000000) << 32 | /* sign and msb */
(vb & 0x3fffffff) << 29); /* rest of the int */
FP_SET_EXCEPTION (FP_EX_INVALID);
goto done_d;
case FOP_FNC_CVTxS:
FP_FROM_INT_S(SR, ((long)vb), 64, long);
goto pack_s;
case FOP_FNC_CVTxT:
FP_FROM_INT_D(DR, ((long)vb), 64, long);
goto pack_d;
}
goto bad_insn;
}
goto bad_insn;
pack_s:
FP_PACK_SP(&vc, SR);
if ((_fex & FP_EX_UNDERFLOW) && (swcr & IEEE_MAP_UMZ))
vc = 0;
alpha_write_fp_reg_s(fc, vc);
goto done;
pack_d:
FP_PACK_DP(&vc, DR);
if ((_fex & FP_EX_UNDERFLOW) && (swcr & IEEE_MAP_UMZ))
vc = 0;
done_d:
alpha_write_fp_reg(fc, vc);
goto done;
/*
* Take the appropriate action for each possible
* floating-point result:
*
* - Set the appropriate bits in the FPCR
* - If the specified exception is enabled in the FPCR,
* return. The caller (entArith) will dispatch
* the appropriate signal to the translated program.
*
* In addition, properly track the exception state in software
* as described in the Alpha Architecture Handbook section 4.7.7.3.
*/
done:
if (_fex) {
/* Record exceptions in software control word. */
swcr |= (_fex << IEEE_STATUS_TO_EXCSUM_SHIFT);
current_thread_info()->ieee_state
|= (_fex << IEEE_STATUS_TO_EXCSUM_SHIFT);
/* Update hardware control register. */
fpcr &= (~FPCR_MASK | FPCR_DYN_MASK);
fpcr |= ieee_swcr_to_fpcr(swcr);
wrfpcr(fpcr);
/* Do we generate a signal? */
_fex = _fex & swcr & IEEE_TRAP_ENABLE_MASK;
si_code = 0;
if (_fex) {
if (_fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND;
if (_fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES;
if (_fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND;
if (_fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF;
if (_fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV;
if (_fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV;
}
return si_code;
}
/* We used to write the destination register here, but DEC FORTRAN
requires that the result *always* be written... so we do the write
immediately after the operations above. */
return 0;
bad_insn:
printk(KERN_ERR "alpha_fp_emul: Invalid FP insn %#x at %#lx\n",
insn, pc);
return -1;
}
long
alpha_fp_emul_imprecise (struct pt_regs *regs, unsigned long write_mask)
{
unsigned long trigger_pc = regs->pc - 4;
unsigned long insn, opcode, rc, si_code = 0;
/*
* Turn off the bits corresponding to registers that are the
* target of instructions that set bits in the exception
* summary register. We have some slack doing this because a
* register that is the target of a trapping instruction can
* be written at most once in the trap shadow.
*
* Branches, jumps, TRAPBs, EXCBs and calls to PALcode all
* bound the trap shadow, so we need not look any further than
* up to the first occurrence of such an instruction.
*/
while (write_mask) {
get_user(insn, (__u32 __user *)(trigger_pc));
opcode = insn >> 26;
rc = insn & 0x1f;
switch (opcode) {
case OPC_PAL:
case OPC_JSR:
case 0x30 ... 0x3f: /* branches */
goto egress;
case OPC_MISC:
switch (insn & 0xffff) {
case MISC_TRAPB:
case MISC_EXCB:
goto egress;
default:
break;
}
break;
case OPC_INTA:
case OPC_INTL:
case OPC_INTS:
case OPC_INTM:
write_mask &= ~(1UL << rc);
break;
case OPC_FLTC:
case OPC_FLTV:
case OPC_FLTI:
case OPC_FLTL:
write_mask &= ~(1UL << (rc + 32));
break;
}
if (!write_mask) {
/* Re-execute insns in the trap-shadow. */
regs->pc = trigger_pc + 4;
si_code = alpha_fp_emul(trigger_pc);
goto egress;
}
trigger_pc -= 4;
}
egress:
return si_code;
}
| 2024-06-04T01:26:19.665474 | https://example.com/article/1997 |
Sildenafil Citrate is certainly one of the best known medications that are nowadays available on the market. Its popularity is the result of its efficiency in treating a male problem, namely erectile dysfunction. This medication has been developed in the late 1990s with the primary aim to treat angina, a condition causing chest pain. The clinical trials have however revealed that this medication can be even more efficient in treating male impotency than in treating angina. As a result, Generic Viagra has ever since then remained the main treatment in…
Let's face it; being in a relationship is hard enough without having to deal with a big problem. Sometimes it doesn't matter if you have been married for decades; a problem like erectile dysfunction could be a deal breaker. This particular disorder not only affects the man in the relationship but also the significant other in many ways. Sexual intimacy is a big part in a healthy functioning relationship. When a man finds himself not being able to perform it can be detrimental for him as well as for his…
Every single man knows that sexual activity can be an important part of the dating process. During this intimate time, partners learn a great deal about each other and can find out if the pairing is potentially the start of a serious relationship. However, when the sexual activity is not up to the satisfactory standards of the man or woman, it could put a quick end to a relationship that could be quite good. If a man is serious about finally meeting the right woman, it is a good idea… | 2023-09-07T01:26:19.665474 | https://example.com/article/3789 |
<?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.springframework.org/schema/beans
http://www.springframework.org/schema/beans/spring-beans-4.2.xsd" default-lazy-init="true">
<bean id="testDaoContext" class="org.springframework.context.support.ClassPathXmlApplicationContext">
<constructor-arg>
<list>
<value>META-INF/opennms/applicationContext-datasource.xml</value>
<value>META-INF/opennms/applicationContext-testDao.xml</value>
<value>META-INF/opennms/applicationContext-accessPointDatabasePopulator.xml</value>
<value>classpath*:/META-INF/opennms/applicationContext-daemon.xml</value>
<value>META-INF/opennms/component-dao.xml</value>
<value>file:src/main/resources/META-INF/opennms/component-service.xml</value>
</list>
</constructor-arg>
<constructor-arg ref="soaContext" />
</bean>
</beans>
| 2023-09-23T01:26:19.665474 | https://example.com/article/4276 |
The present disclosure relates to a technique used in, for example, an electronic apparatus that detects a user operation with respect to a screen and executes processing corresponding to the user operation.
In recent years, an electronic apparatus that detects a user operation with respect to a screen and executes processing corresponding to the user operation is widely known (see, for example, Japanese Patent Application Laid-open No. 2011-70525).
In such an electronic apparatus, a user touches (taps), drag-and-drops, or flicks a position on the screen at which a GUI (Graphical User Interface) such as an icon is displayed so as to make an input to the electronic apparatus. The method of making an input to a screen is widely adopted in various electronic apparatuses since the method enables intuitive operations to be made.
For example, a case where the user drag-and-drops an icon will be discussed. In this case, the user touches a position on the screen at which the icon is displayed with a finger (or stylus pen etc.) and slides the finger while touching the screen (drag). Then, after positioning the finger on, for example, an arbitrary folder or an arbitrary position on a desktop, the user releases the finger from the screen (drop). As a result, data indicated by the icon is copied or moved to the arbitrary folder or desktop. | 2024-07-03T01:26:19.665474 | https://example.com/article/9391 |
Congressional Democrats said President Trump’s suggestion that he would declare a national emergency as the need to build a wall on the Mexican border a “non-starter” that would wind up in the courts.
Trump “doesn’t have the power,” Rep. Adam Schiff (D-Calif.) said on CNN’s “State of the Union.” So that’s a non-starter.”
Sen. Dick Durbin said any such move by Trump would be quickly contested.
“He’ll face a challenge, I’m sure, if he oversteps what the law requires when it comes to his responsibility as commander in chief,” Durbin of Illinois said on CBS’ “Face the Nation.”
“I can just tell you, I don’t know what he’s basing this on, but he’s faced so many lawsuits when he ignores the law and ignores tradition and precedent and just goes forward without any concern,” Durbin, the Senate majority whip, added.
Rep. Adam Smith, the chairman of the House Armed Services Committee, said the “short answer” is that Trump has the authority to declare an emergency but that the president would have to prove one exists on the border.
“There is a provision in law that says the president can declare an emergency. It’s been done a number of times. But primarily it’s been done to build facilities in Afghanistan and Iraq. And in this case I think the president would be wide open to a court challenge saying, ‘Where’s the emergency?’ You have to establish that in order to do this,” Smith of Washington said on ABC’s “This Week.”
He said it would be a “terrible use” of funds from the Department of Defense.
“The president spends most of his time talking about how we’re not spending enough on national security. Now he wants to take $20 billion dollars out of the defense budget to build a wall, which by the way is not going to improve our border security.”
Trump, speaking during a news conference after meeting with congressional leaders at the White House over the partial government shutdown, signaled that he might use the maneuver to bypass Congress.
“Absolutely, we could call a national emergency because of the security of our county,” Trump said last Friday. “I haven’t done it. I may do it.”
He and Congress are deadlocked over funding for his border wall, which he now says could be made of either concrete or steel slats.
Trump is demanding $5.6 billion but Democrats have offered only $1.3 billion for border security – and nothing for a wall.
The stalemate has left the government partially closed, with about 800,000 federal employees either on furlough or working without pay. | 2024-05-25T01:26:19.665474 | https://example.com/article/9224 |
124 F.3d 203
NOTICE: Seventh Circuit Rule 53(b)(2) states unpublished orders shall not be cited or used as precedent except to support a claim of res judicata, collateral estoppel or law of the case in any federal court within the circuit.James CARROLL, Plaintiff-Appellant,v.Jesse BROWN, Secretary of Veterans Affairs, Defendant-Appellee.
No. 96-2711.
United States Court of Appeals, Seventh Circuit.
Submitted Aug. 7, 1997.*Filed Aug. 18, 1997.
Appeal from the United States District Court for the Southern District of Illinois, No. 95-CV-227; Paul E. Riley, Judge.
Before POSNER, Chief Judge and EASTERBROOK and MANION, Circuit Judges.
Order
1
James Carroll was fired by the Department of Veterans Affairs before his probationary period ended. His suit alleges that the Department discriminated against him on account of race, but this claim was brought up short by the fact that he had not filed a charge of race discrimination with the EEOC or used the administrative remedies provided for such charges. These are preconditions to suit against the federal government. See 42 U.S.C. § 2000e-5(f)(1); Brown v. General Services Administration, 425 U.S. 820 (1976); Irwin v. Department of Veterans Affairs, 498 U.S. 89 (1990).
2
Carroll concedes that he did not take the steps required by law. He believes that it was enough to file a claim with the Merit Systems Protection Board, but that is not so: the MSPB dismissed for want of jurisdiction, because Carroll had not completed his probationary period, and anyway the MSPB is not the EEOC. When rejecting Carroll's internal protest of his discharge, the Department advised him: "The administrative procedure for allegations of disparate treatment/discrimination under Title VII is the EEO complaint process." The letter identified four EEO counselors who Carroll could consult to learn more about the procedures to use. Carroll did not visit an EEO counselor or follow the statutory procedures. Someone who is told exactly what to do, yet chooses to do something different, lacks any equitable claim to a departure from legal requirements. White v. Bentsen, 31 F.3d 474 (7th Cir.1994).
AFFIRMED
*
After an examination of the briefs and the record, we have concluded that oral argument is unnecessary, and the appeal is submitted on the briefs and the record. See Fed. R.App. P. 34(a); Cir. R. 34(f)
| 2024-04-04T01:26:19.665474 | https://example.com/article/5631 |
Overview
The DMO 200 is a high current micro-ohmmeter suitable
for measuring very low resistances in a wide range of
applications. This unit is equally suited to
commissioning, maintenance, and production line
environments. Contact resistance in circuit breakers,
switch panels, isolators, and busbar joints are all
easily and safely measured.
Features
Ultra lightweight only 6.9kg.
1 to 200 Amps DC test current with < 2.5%
ripple.
0.1µΩ resolution.
mV, A, and µΩ displayed simultaneously.
USB memory key for data storage.
USB keyboard.
Pre-settable test current with three buttons to
store user test
current settings.
Large back-lit liquid crystal display (LCD).
Universal supply voltage 90V to 264V AC 50/60Hz
Supplied with 3-meter output lead set.
Optional current clamp allows testing of objects
with both sides earthed.
The DMO 200 is simple to
operate, only requiring the user to select the test
current and switch the output 'ON'. The unit has
presentable test current with three buttons to store
commonly used test values. Selection of all ranges is
fully automatic, and current, voltage and resistance are
displayed simultaneously. The resistance is calculated
from the test current sense voltage. To assist the user,
all readings are held on the display when the output is
switched 'OFF'.
The unit features results
storage using a USB key (memory stick), and is supplied
with a USB keyboard to enter comments to be stored with
readings. All results are time and date-stamped and
saved in a CSV file.
The back-lit display on the
DMO 200 is bright and clear with a wide
viewing angle. The results of a test can be
seen here as they appear on the display of
the unit, showing current, sense voltage and
resistance.
The unit features results storage using a USB key
(memory stick), and is supplied with a USB keyboard to
enter comments to be stored with readings. All results
are time and date-stamped and saved in a CSV file. The
CSV file can be opened with any spreadsheet program such
as Microsoft Excel™ or OpenOffice Calc.
The DMO 200 also has an RS-232 port allowing the unit to
be connected to an optional printer. This can also be
used to control the unit to PLCs for production line use
- the full control of the DMO 200 may be achieved
through the RS-232 port using a simple set of commands. | 2023-09-10T01:26:19.665474 | https://example.com/article/2620 |
Involvement of type I and type II mechanisms on the photoinactivation of non-enveloped DNA and RNA bacteriophages.
Microbial photodynamic inactivation (PDI), involving the use of a photosensitizer (PS), light and molecular oxygen, with the subsequent production of reactive oxygen species (ROS), has been considered a promising and effective technology for viral inactivation. Although singlet oxygen is generally accepted as the main damaging species in PDI, ROS like free radicals may also be involved in the process, inducing damages to proteins, lipids, nucleic acids and other molecular structures. In this study, the relative importance of each mechanism (type I and type II) on the photoinactivation of non-enveloped DNA (T4-like phage) and RNA (Qβ phage) viruses was evaluated. For this purpose, two cationic porphyrins (Tri-Py(+)-Me-PF and Tetra-Py(+)-Me) and four different ROS scavengers were used. The scavenging effect of sodium azide and L-histidine (singlet oxygen quenchers) and of D-mannitol and L-cysteine (free radical scavengers) was assessed by exposure of both phages (T4-like and Qβ) to each cationic porphyrin (5.0μM for T4-like phage and 0.5μM for Qβ phage) and white light (40Wm(-2)) in the presence of different concentrations of the scavengers (5, 10, 50 and 100mM). Sodium azide and L-histidine gave the best protection, reducing the phototoxic effect of Tri-Py(+)-Me-PF on T4-like phage respectively by 80% and 72% and in the presence of Tetra-Py(+)-Me by 90% and 78%. Free radical scavengers D-mannitol and L-cysteine did not significantly reduce the rate of T4-like phage photoinactivation (around 20% protection, for both PS). The sodium azide protection on Qβ phage photoinactivation, in the presence of Tri-Py(+)-Me-PF, was lower (39%) when compared with T4-like phage. D-mannitol did not exert on Qβ phage any protective effect after 90min of irradiation. The effect of the simultaneous presence of singlet oxygen and free radicals scavengers at 100mM confirmed that singlet oxygen (type II mechanism) is clearly the main ROS involved in T4-like and Qβ phages photoinactivation by these two cationic PS. As RNA-type phages are more easily photoinactivated when compared with DNA-type ones, the protection conferred by the scavengers during the PDI process is lower and this should be taken into account when the main mechanism involved in PDI of different viruses is to be studied. | 2023-12-01T01:26:19.665474 | https://example.com/article/1917 |
The Hobbit: The Desolation of Smaug
The Hobbit: The Desolation of Smaug is a 2013 epic high fantasy adventure film directed by Peter Jackson and produced by WingNut Films in collaboration with New Line Cinema and Metro-Goldwyn-Mayer. It was distributed by Warner Bros. Pictures and is the second installment in the three-part film series based on the novel The Hobbit by J. R. R. Tolkien. The film was preceded by An Unexpected Journey (2012) and followed by The Battle of the Five Armies (2014); together, they act as a prequel to Jackson's The Lord of the Rings film trilogy.
The film follows the titular character Bilbo Baggins as he accompanies Thorin Oakenshield and his fellow dwarves on a quest to reclaim the Lonely Mountain from the dragon Smaug. The film also features the vengeful pursuit of Azog the Defiler and Bolg, while Gandalf the Grey investigates a growing evil in the ruins of Dol Guldur. The ensemble cast includes Ian McKellen, Martin Freeman, Richard Armitage, Benedict Cumberbatch, Evangeline Lilly, Lee Pace, Luke Evans, Ken Stott, James Nesbitt, and Orlando Bloom.
Fran Walsh, Philippa Boyens, Peter Jackson and Guillermo del Toro wrote the screenplay. The films were shot simultaneously in 3D at a projection rate of 48 frames per second, with principal photography taking place around New Zealand and at Pinewood Studios. Additional filming took place throughout May 2013.
The Hobbit: The Desolation of Smaug premiered on 2 December 2013 in Los Angeles and was released internationally on 11 December 2013 in both conventional and IMAX theatres. The film received generally positive reviews and grossed over $958 million at the worldwide box office, surpassing both The Fellowship of the Ring and The Two Towers, and making it the fourth highest-grossing film of 2013. At the 86th Academy Awards, the film received nominations for Best Visual Effects, Best Sound Editing, and Best Sound Mixing.
Plot
Thorin and his company are being pursued by Azog and his Orc party following the events of the previous film. They are ushered along by Gandalf to the nearby home of Beorn, a skin-changer who can take the form of the bear. That night, Azog is summoned to Dol Guldur by the Necromancer, who commands him to marshal his forces for war, so Azog delegates the hunt for Thorin to his spawn Bolg. The following day, Beorn escorts the company to the borders of Mirkwood, where Gandalf discovers Black Speech imprinted on an old ruin. Heeding a promise he made to Galadriel, he warns the company to remain on the path and leaves to investigate the tombs of the Nazgûl. Upon entering the forest, the dwarves lose their way and are ensnared by giant spiders. Bilbo sets about freeing them with the help of his recently acquired invisibility ring. He subsequently drops the ring and first begins to understand its dark influence after he brutally kills a creature to retrieve it.
The remaining spiders are fended off by the Wood-elves led by Tauriel and Legolas. They also capture the Dwarves and bring Thorin before their king Thranduil. Thranduil offers helps towards Thorin in exchange for starlight crystals in Erebor but Thorin confronts Thranduil about his neglect of the Dwarves of Erebor following Smaug's attack 60 years earlier, and is consequently imprisoned with the other Dwarves. Bilbo, having avoided capture, arranges an escape using empty wine barrels that are sent downstream. While being pursued by the Wood-elves, they are ambushed by Bolg and his Orc party, and Kíli is wounded with a Morgul shaft. They engage in a running three-way battle down the river, but ultimately the Dwarves are able to escape both groups of pursuers. Thranduil then seals off his kingdom when an Orc captive reveals an evil entity has returned and is amassing an army in the south, but Tauriel decides to leave and assist the Dwarves, and Legolas goes after her. Meanwhile, Gandalf and Radagast go to investigate the tombs of the Nazgûl, which they find to be empty.
The company are smuggled into Esgaroth by a bargeman called Bard, but are discovered raiding the town armory for new weapons. Thorin promises the Master, his councilor Alfrid, and the people of Laketown a share of the mountain's treasure, and it is revealed that Bard is a descendant of the last ruler of Dale, and possesses the last black arrow capable of killing Smaug. Kíli is forced to remain behind, tended to by Fíli, Óin, and Bofur, as the remaining company receive a grand farewell. Meanwhile, Gandalf travels south to the ruins of Dol Guldur, while Radagast leaves to warn Galadriel of their discovery at the tombs of the Nazgûl. Gandalf met Thrain, Thrain remembers he was captured and tortured by Azog. Gandalf finds the ruins infested with Orcs and is ambushed by Azog. Gandalf and Thrain make an escape attempt, but the Necromancer kills Thrain and overpowers Gandalf before revealing himself as Sauron.
Thorin and his remaining company reach the Lonely Mountain, where Bilbo discovers the hidden entrance. He is sent in to retrieve the Arkenstone, and while doing so, he accidentally awakens Smaug. While trying to find Bilbo, Smaug reveals his knowledge of Sauron's return. Back in Laketown, Bard attempts to bring the black arrow to the town's launcher, as he fears what may happen when the Dwarves enter the mountain. However, he is arrested by the Master and Alfrid in the process and leaves his son to hide the arrow. Bolg and his Orc party infiltrate the town and attack the four Dwarves, but are quickly dispatched by Tauriel and Legolas. Tauriel then tends to Kíli, while Legolas beats Bolg and leaves to pursue him. Meanwhile, Gandalf watches helplessly as Azog and an Orc army march from Dol Guldur towards the Lonely Mountain.
Back inside the mountain, during a long chase, Bilbo and the Dwarves rekindle the mountain's forge using Smaug's flames to create and melt a large golden statue of Thrór, hoping to bury Smaug alive in the molten gold. They do so, but Smaug emerges from the gold, storms out of the mountain and flies off to destroy Laketown, while Bilbo watches in horror.
Cast
Some characters in the film are not in the novel, but created for the film. Legolas appears in Tolkien's Lord of the Rings trilogy, but not in the novel The Hobbit.
Martin Freeman as Bilbo Baggins: a hobbit hired by the 13 dwarves, on the advice of wizard Gandalf, to accompany them on a quest to reclaim the Lonely Mountain from Smaug.
Ian McKellen as Gandalf: an Istari wizard who recruits Bilbo and helps to arrange the quest to reclaim the dwarves' lost treasure in Erebor.
Richard Armitage as Thorin Oakenshield: the leader of the Company of dwarves and the true heir to Erebor's throne who has returned to reclaim Erebor from Smaug.
Benedict Cumberbatch as Smaug (vocal performance and motion capture): an enormous, powerful and psychopathic great dragon of Middle-earth who claimed the Lonely Mountain, its vast treasures and the surrounding human areas. Cumberbatch also plays the Necromancer, a mysterious sorcerer residing in Dol Guldur with the ability to summon the spirits of the dead, who is later revealed to be the Dark Lord Sauron.
Evangeline Lilly as Tauriel: the elven Chief of the Mirkwood Guards serving under Thranduil, who develops romantic feelings towards Kíli and falls in love with him.
Luke Evans as Bard the Bowman: a skilled archer living in Esgaroth and the heir of Girion, the last king of old Dale. Evans also plays Bard's ancestor, Girion, in a flashback.
Lee Pace as Thranduil: the aloof and cold-hearted Elven king of the northern part of Mirkwood (the Woodland Realm).
Stephen Fry as The Master of Lake-town: the pompous and greedy mayor of the settlement of Men at Lake-town near the Lonely Mountain.
Orlando Bloom as Legolas Greenleaf: an elf from Mirkwood and the prince of the Woodland Realm - he is Thranduil's son.
Graham McTavish as Dwalin: Balin's brother.
Ken Stott as Balin: Dwalin's brother.
Aidan Turner as Kíli: one of Thorin's nephews and Fíli's younger brother. He develops romantic feelings towards the Elf Tauriel and falls in love with her.
Dean O'Gorman as Fíli: another of Thorin's nephews and Kíli's older brother.
Mark Hadlow as Dori: Nori and Ori's brother.
Jed Brophy as Nori: Dori and Ori's brother.
Adam Brown as Ori: Dori and Nori's brother.
John Callen as Óin: Glóin's brother.
Peter Hambleton as Glóin: Óin's brother and father of Gimli, the noble Dwarf who accompanies Frodo on his quest to destroy the One Ring.
William Kircher as Bifur: Bofur and Bombur's cousin.
James Nesbitt as Bofur: Bombur's brother and Bifur's cousin.
Stephen Hunter as Bombur: Bofur's brother and Bifur's cousin.
Cate Blanchett as Galadriel: an Elven co-ruler of Lothlórien along with her husband, Lord Celeborn.
Mikael Persbrandt as Beorn: A skin-changer who can assume the appearance of a great black bear.
Sylvester McCoy as Radagast: an Istari wizard whose wisdom is based on nature and wildlife.
Manu Bennett as Azog: An Orc and the nemesis of Thorin Oakenshield, on whom he seeks revenge for losing his forearm and hand in battle.
Lawrence Makoare as Bolg: Son of Azog the Defiler.
Craig Hall as Galion: Thranduil's butler, whose fondness for drink allows for Bilbo and the dwarves' escape attempt.
Ryan Gage as Alfrid: The Master of Laketown's conniving and arrogant servant.
John Bell as Bain: Bard's son, who is described as "confident and brave and ready to do battle if required even though he is still a boy."
Mark Mitchinson as Braga: captain of the Lake-town Guard.
Ben Mitchell as Narzug: An Orc who gets interrogated by Thranduil after the ambush at the River Gate.
Stephen Ure as Fimbul, Azog's second-in-command
Robin Kerr as Elros: an Elf of the Woodland Realm who is a captain of the Woodland Guard and Keeper of the Keys - initially charged with watching the dwarves, he is later charged with watching the Front Gate of Thranduil's Halls.
Simon London as Feren: an Elf of the Woodland Realm.
Dallas Barnett as Bill Ferny Snr: An assassin sent by Azog to kill Thorin Oakenshield in Bree and retrieve the Key to Erebor.
The following appear only in the Extended Edition
Antony Sher as Thrain: Thorin's father who is held captive in Sauron's stronghold of Dol Guldur.
Additionally, Peter Jackson makes a cameo appearance in the film, reprising his role as the man eating a carrot in Bree, his daughter Katie portrays Barliman Butterbur's wife Betsy, Philippa Boyens's daughter Phoebe and scale double Kiran Shah appear as a waitress and a Hobbit in the Prancing Pony, James Nesbitt's daughters Peggy and Mary portray Tilda and Sigrid, the daughters of Bard, Stephen Colbert and his family along with WingNut Films' assistant Norman Kali and producer Zane Weiner appear as Lake-town spies, and editor Jabez Olssen appears as a fishmonger. Brian Sergent (who portrayed the Hobbit Ted Sandyman in the extended edition of Fellowship of the Ring) and Peter Vere-Jones provide the voices of the spiders in Mirkwood. In a skit for The Late Show in 2019, Colbert reprised his character, dubbing him "Darrylgorn" alongside Peter Jackson.
Production
Most of the filming was finished during 2012, ending in July 2012. During May 2013, additional shooting for the film and The Hobbit: The Battle of the Five Armies began in New Zealand, lasting 10 weeks. Unmanned aerial vehicles or drones were used for some shots in the film.
Score
The musical score for The Desolation of Smaug was composed by Howard Shore. Shore provided orchestral sketches and synth mock-ups to orchestrators James Sizemore and Conrad Pope (who also conducted the orchestra). It was performed by the New Zealand Symphony Orchestra, London Voices and Tiffin' Boys Choir, as well as two New Zealand Gamelan orchestras. The score featured themes from the previous film and the Lord of the Rings trilogy, but relied heavily on the themes of Smaug, Laketown, the Woodland Realm (including themes for Tauriel and for Legolas), etc. In the process, the themes for the company of the Dwarves were discontinued and were replaced by a new thematic identity. The original motion picture soundtrack album was released on 10 December 2013. It received positive reviews, especially for its new themes.
English singer-songwriter Ed Sheeran wrote and recorded "I See Fire", which plays during the end credits.
The song was released on iTunes on 5 November 2013.
Release
Marketing
Peter Jackson provided the first details about the second film in the series at a live event held on 24 March 2013. The access code was attached to the DVD editions of The Hobbit: An Unexpected Journey. The live-broadcast event revealed some plot details; Jackson said that the role of Tauriel, acted by Evangeline Lilly, is a part of the elven guard and a bodyguard of the Elvenking, Thranduil. In addition, he revealed a scene from the film in which Gandalf and Radagast the Brown search for the Necromancer fortress and discover that the Ringwraiths have been released from their graves. The first trailer for the film was released on 11 June 2013. On 4 November 2013, an extra long 3 minute trailer/sneak peek was released and revealed new footage and major plot points.
On 4 November 2013, a special Desolation of Smaug live online fan event, hosted by Anderson Cooper in New York, was held across eleven different cities with participants including Peter Jackson, Jed Brophy, Evangeline Lilly, Lee Pace, Orlando Bloom, Luke Evans, Andy Serkis and Richard Armitage.
Martin Freeman, Richard Armitage, Benedict Cumberbatch, Luke Evans, Evangeline Lilly, Peter Jackson and, to a lesser extent, Orlando Bloom and Ian McKellen, took part in the press tour, appearing on talk shows and giving interviews before the film's release.
Video game
A video game titled Lego The Hobbit (video game) and based on the first two films came out coincidentally with the second film's home media release on April 14th 2014.
Theatrical release
The film premiered in Los Angeles at the Dolby Theatre on 2 December 2013, and was released internationally on 11 December 2013 and in the United Kingdom and United States on 13 December 2013.
An extended edition of the film had a limited re-release on 7 October 2015, accompanied by a special greeting from Peter Jackson.
Home media
The Hobbit: The Desolation of Smaug was released on DVD, Blu-ray, and Blu-ray 3D on 7 April 2014 in the United Kingdom and on 8 April 2014 in the United States. Three different versions were released: a Limited Collector's Edition Blu-ray, Blu-ray 3D, DVD, and digital download combo pack; a Blu-ray 3D combo pack; a Blu-ray combo pack, and a two-disc DVD special edition. Extras include three making-of featurettes, 4 production web videos, and a music video for "I See Fire" by Ed Sheeran.
An extended edition of The Desolation of Smaug was released digitally on 21 October 2014, and was released on DVD, Blu-ray and 3D Blu-ray 3 November 2014 in the United Kingdom, and 4 November 2014 in the United States, with 25 minutes of new material and original music.
Reception
Box office
The Hobbit: The Desolation of Smaug grossed $258 million in North America and $700 million in other countries for a worldwide total of $958 million. Calculating in all expenses, Deadline Hollywood estimated that the film made a profit of $134.1 million when factoring together all expenses and revenues, making it the fourth most profitable release of 2013. It was the fourth highest-grossing 2013 film. It grossed $209 million worldwide on its opening weekend.
In North America, The Desolation of Smaug earned $8.8 million during its midnight opening, making it the second-highest December showing ever, behind only the first installment. The film topped the box office on its opening day with $31.2 million. It remained in first place throughout its opening weekend, grossing $73,645,197, a 13% drop from its predecessor. The Desolation of Smaug was in first place at the box office for three consecutive weekends.
Outside North America, The Desolation of Smaug was released internationally on 16,405 screens. The film earned $135.4 million in its opening weekend. Its largest openings occurred in China ($33.0 million), Germany ($19.0 million) and the United Kingdom, Ireland and Malta ($15.2 million). It topped the box office outside North America on four consecutive weekends and five in total. It is the highest-grossing film of 2013 in many European countries, as well as in New Zealand and Fiji. The film's largest markets outside North America are Germany ($88 million), China ($74.7 million), United kingdom ($70 million), Russia-CIS ($45 million), France ($44.7 million) and Australia ($34.5 million).
Critical reaction
After the Los Angeles premiere, Metro noted that early critical reaction was "glowing", with critics describing it as a "spectacle", while The Guardian reported that it was receiving "much stronger early reviews". However, before the film's theatrical release, E! reported that reviews had been "mixed", but stated they were still "much better" than the previous film. After the film's international release, MTV reported that the film has garnered a "positive" critical reaction, while the Los Angeles Times stated the consensus is that the film "reinvigorates" the series, putting it "back on course". The review aggregator website Rotten Tomatoes reported a 74% approval rating with an average rating of 6.81/10 based on 239 reviews. The website's consensus reads, "While still slightly hamstrung by 'middle chapter' narrative problems and its formidable length, The Desolation of Smaug represents a more confident, exciting second chapter for the Hobbit series." On aggregate review site Metacritic, the film has a score of 66 out of 100 based on 44 reviews, indicating "generally favorable" reviews. According to CinemaScore polls the film received an "A-" from audiences.
Nick de Semlyen of Empire awarded the film five stars out of five and wrote that "Middle-earth's got its mojo back. A huge improvement on the previous installment, this takes our adventurers into uncharted territory and delivers spectacle by the ton", while Richard Corliss of TIME declared it one of the top ten films of 2013, and wrote "In all, this is a splendid achievement, close to the grandeur of Jackson’s Lord of the Rings films." Justin Chang of Variety wrote that "After a bumpy beginning with An Unexpected Journey, Peter Jackson's 'Hobbit' trilogy finds its footing in this much more exciting and purposeful second chapter." Todd McCarthy of The Hollywood Reporter wrote that "Nearly everything... represents an improvement over the first installment of Peter Jackson's three-part adaptation of J.R.R. Tolkien's beloved creation." He also praised the high frame rate of The Desolation of Smaug as being better than that of An Unexpected Journey. Mark Hughes, who reviewed the film for Forbes, was highly enthusiastic, and felt "The Desolation of Smaug is another grand entry in the Tolkien saga, raising the emotional and physical stakes while revealing more of the sinister forces," before concluding "It’s pleasing to see a filmmaker this in love with storytelling, this committed to creating entire worlds... that’s a rare thing indeed, and for it to turn out so well is even more rare. It’s a sight to behold, and you won’t be sorry you did."
Peter Bradshaw of The Guardian scored the film four stars out of five, writing, "It's mysterious and strange, and yet Jackson also effortlessly conjures up that genial quality that distinguishes 'The Hobbit' from the more solemn 'Rings' stories." Total Film also scored the film four stars out of five, but reviewer Matt Maytum noted that, in his opinion, the film suffered "from middle-act wobbles." Despite this, he praised the "rousing action... incredible visuals... and one stupendous dragon", and concluded his review saying "There’s a lot to admire in The Desolation of Smaug." Jim Vejvoda, who reviewed the film for IGN, awarded it 8.5 out of 10, and felt "It's a breathlessly told, action-packed crowd-pleaser that restores the luster of the saga for those underwhelmed by its predecessor and leaves you excited for the final chapter in the trilogy."
Conversely, Peter Travers, who reviewed the film for Rolling Stone, gave it two and a half stars out of four. He felt it was "a little less long and a little less boring" than the first installment, and offered praise for the depiction of Smaug, saying "as a digital creation, Smaug is a bloody wonder of slithering fright." He was, however, very critical of the film's padding of a "slender novel", but concluded: "I'd endure another slog through Middle-Earth just to spend more time with Smaug". Robbie Collin of The Daily Telegraph was even less admiring, and awarded it two stars out of five. He too criticised the decision to turn Tolkien's book into three films and felt Jackson "is mostly stalling for time: two or three truly great sequences tangled up in long beards and longer pit-stops." He continued, writing "There is an awful lot of Desolation to wade through before we arrive, weary and panting, on Smaug's rocky porch," and disapproved of the introduction of a love triangle to Tolkien's narrative, adding: "Maybe this really is what a lot of people want to see from a film version of The Hobbit, but let's at least accept that Tolkien would probably not have been among them." The New York Post'''s Lou Lumenick was extremely negative in his 1.5/4 star review and he compared it to Star Wars: Episode II – Attack of the Clones, remarking "There are probably enough moments to satisfy hard-core fans, but for the rest of us, this amounts to the Middle Earth equivalent of “Star Wars: Episode II — Attack of the Clones,’’ a space-holding, empty-headed epic filled with characters and places (digital and otherwise) that are hard to keep straight, much less care about."
Accolades
See also
De-aging in film
References
External links
The Hobbit Blog Official blog of The Hobbit movies
The Tolkien Nerd’s Guide to "The Hobbit: The Desolation of Smaug" Smithsonian''
Category:2013 films
Category:2013 3D films
Category:2010s fantasy adventure films
Category:2010s prequel films
Category:2010s sequel films
*2
Category:American fantasy adventure films
Category:American films
Category:American sequel films
Category:Best Sci-Fi/Fantasy Empire Award winners
Category:Films about dragons
Category:IMAX films
Category:Interquel films
Category:Rotoscoped films
Category:Metro-Goldwyn-Mayer films
Category:New Line Cinema films
Category:Motion capture in film
Category:WingNut Films films
Category:Warner Bros. films
Category:New Zealand films
Category:New Zealand 3D films
Category:New Zealand fantasy films
Category:New Zealand sequel films
Category:High fantasy films
Category:Films scored by Howard Shore
Category:Films with screenplays by Peter Jackson
Category:Films with screenplays by Fran Walsh
Category:Films with screenplays by Philippa Boyens
Category:Films with screenplays by Guillermo del Toro
Category:Treasure hunt films
Category:Films directed by Peter Jackson | 2023-08-28T01:26:19.665474 | https://example.com/article/3145 |
/*
Copyright 2016 The Kubernetes Authors All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
// Package install installs the experimental API group, making it available as
// an option to all of the API encoding/decoding machinery.
package install
import (
"fmt"
"github.com/golang/glog"
"k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/api/meta"
"k8s.io/kubernetes/pkg/api/unversioned"
"k8s.io/kubernetes/pkg/apimachinery"
"k8s.io/kubernetes/pkg/apimachinery/registered"
"k8s.io/kubernetes/pkg/apis/authentication"
"k8s.io/kubernetes/pkg/apis/authentication/v1beta1"
"k8s.io/kubernetes/pkg/runtime"
"k8s.io/kubernetes/pkg/util/sets"
)
const importPrefix = "k8s.io/kubernetes/pkg/apis/authentication"
var accessor = meta.NewAccessor()
// availableVersions lists all known external versions for this group from most preferred to least preferred
var availableVersions = []unversioned.GroupVersion{v1beta1.SchemeGroupVersion}
func init() {
registered.RegisterVersions(availableVersions)
externalVersions := []unversioned.GroupVersion{}
for _, v := range availableVersions {
if registered.IsAllowedVersion(v) {
externalVersions = append(externalVersions, v)
}
}
if len(externalVersions) == 0 {
glog.V(4).Infof("No version is registered for group %v", authentication.GroupName)
return
}
if err := registered.EnableVersions(externalVersions...); err != nil {
glog.V(4).Infof("%v", err)
return
}
if err := enableVersions(externalVersions); err != nil {
glog.V(4).Infof("%v", err)
return
}
}
// TODO: enableVersions should be centralized rather than spread in each API
// group.
// We can combine registered.RegisterVersions, registered.EnableVersions and
// registered.RegisterGroup once we have moved enableVersions there.
func enableVersions(externalVersions []unversioned.GroupVersion) error {
addVersionsToScheme(externalVersions...)
preferredExternalVersion := externalVersions[0]
groupMeta := apimachinery.GroupMeta{
GroupVersion: preferredExternalVersion,
GroupVersions: externalVersions,
RESTMapper: newRESTMapper(externalVersions),
SelfLinker: runtime.SelfLinker(accessor),
InterfacesFor: interfacesFor,
}
if err := registered.RegisterGroup(groupMeta); err != nil {
return err
}
api.RegisterRESTMapper(groupMeta.RESTMapper)
return nil
}
func addVersionsToScheme(externalVersions ...unversioned.GroupVersion) {
// add the internal version to Scheme
authentication.AddToScheme(api.Scheme)
// add the enabled external versions to Scheme
for _, v := range externalVersions {
if !registered.IsEnabledVersion(v) {
glog.Errorf("Version %s is not enabled, so it will not be added to the Scheme.", v)
continue
}
switch v {
case v1beta1.SchemeGroupVersion:
v1beta1.AddToScheme(api.Scheme)
}
}
}
func newRESTMapper(externalVersions []unversioned.GroupVersion) meta.RESTMapper {
rootScoped := sets.NewString("TokenReview")
ignoredKinds := sets.NewString()
return api.NewDefaultRESTMapper(externalVersions, interfacesFor, importPrefix, ignoredKinds, rootScoped)
}
func interfacesFor(version unversioned.GroupVersion) (*meta.VersionInterfaces, error) {
switch version {
case v1beta1.SchemeGroupVersion:
return &meta.VersionInterfaces{
ObjectConvertor: api.Scheme,
MetadataAccessor: accessor,
}, nil
default:
g, _ := registered.Group(authentication.GroupName)
return nil, fmt.Errorf("unsupported storage version: %s (valid: %v)", version, g.GroupVersions)
}
}
| 2024-02-15T01:26:19.665474 | https://example.com/article/6425 |
Blog
Easy Do-It-At-Home Protein Hair Treatments
Tired of suffering from dull, dry hair and lifeless locks galore? An ideal solution might lie closer than you think — maybe even in the humble form of a protein shake.
We kid you not — protein therapy might just be what your hair needs to recover and renew itself. After all, the indisputable key to healthy hair is enough nutrients to keep it fresh, glossy, and positively thriving. With that being said, protein treatment becomes even more necessary if you’re planning on dyeing your hair or exposing it to some chemicals — it will keep it strengthened and nourished and minimize damage to it whilst you freely explore your options.
Unfortunately, protein treatment can be costly outside of your own home. Which is why we at Swarni have put together some simple home remedies below as manageable alternatives.
#1 Banana, Honey And Coconut Oil:
This remedy might sound sinfully delicious — but be aware it isn’t meant for eating! We’ll take you through all the steps, from making to applying.
Steps:
Mash up 3 overripe bananas. Alternatively, you can chop up and drop them in a powerful blender.
Add 2 tablespoons of raw honey and 1 tablespoon of coconut oil into the blender.
Blend it for 15-20 seconds or until it becomes a thick, creamy paste.
Assess the thickness; if it appears just a tad too thick, add water according to your discretion.
Separate your hair in segments and start applying the mask from root to the tips of your hair.
Massage a few dollops of the mix into your scalp.
Cover your head with a shower cap and elevate your feet for about 30 minutes.
Rinse the mask out with warm water.
Wash as usual with your preferred shampoo and conditioner.
Condition your hair amply.
Finally, air dry your hair. Please refrain from using a hair dryer!
#2 Avocado And Mayonnaise Protein Hair:
Even if you aren’t a fan of the hipster avocado food wave, you can always use it to treat your hair the best you can.
Steps:
Put a peeled and pitted ripe avocado in a bowl. Then, mash it until it turns up a smooth and creamy texture.
Add 2 tablespoons of mayonnaise and continue mixing until it forms a smooth paste.
Coat your hair with this mask from the roots to the tips. Proceed to massage it mildly.
Additionally, you can use a wide-toothed comb to spread the mask out a little more evenly.
Cover your hair with a shower cap for 30 minutes.
Thoroughly rinse out the mask with warm water.
As usual, wash your hair with your preferred shampoo.
Again, pay mind to condition your hair!
Finally, air dry your hair (again, no hair dryers are to be used in this recipe)!
#3 Egg And Yogurt Protein Mask
This recipe utilizes the most commonplace of ingredients — you could even safely find them in your own home kitchen!
Steps:
Beat an egg in a small bowl.
Add 6 tablespoons of plain curds and mix everything up evenly.
Apply the mask to your hair. Ensure that the tips of your hair are covered while you’re doing it.
Put on a shower cap and wait for 20 minutes.
Rinse it out with cool water.
Wash your hair with your preferred shampoo.
Again, remember to condition your hair after!
Finally, let your hair out to air dry.
Home treatment is better than no treatment. Try these simple-yet-stellar remedies at home to bid your dry hair goodbye. | 2024-01-14T01:26:19.665474 | https://example.com/article/4433 |
A great hot tub for all the family.
What a great 6 months we have had with our hot tub. Everyone has loved
Spa Shelters and Buildings
If you're over looked, require privacy, or are in an area with particularly bad weather, then you might wish to purchase a spa shelter. We offer a fantastic range of purpose built spa shelters especially designed for hot tubs. They allow year round, all-weather spa use, with varying degrees of privacy to suit all tastes.
Features
Quality Construction and Materials
The spa buildings we sell have been hand selected for build quality, and should last the lifetime of your spa if cared for properly. EA, EX and MT shelters are made from low maintenance simulated wood called EternaWood, and high impact plastic roofing. Vista Prelude and Vista Suite are made of kiln dried redwood, again with high impact plastic roofing.
Window Options
Many of our shelters have large sky lights so you can still see the night sky without getting rained on or overlooked, and also have large opening windows to allow cooling air in so you don't over heat in your spa shelter. We also offer a choice of semi tinted windows and total blackouts.
Custom Designs
If you want to do your own thing then we also keep a four legged structure with a ply roof which allows you to fit a custom roof of tile, wood or thatch to compliment the hot tub cabinet, you can also stain the structure to match. If none of the above appeal, please feel free to check with us with reference to your own unique design. We may be able to improve your idea or help with dimensions.
Newsletter
Information
Latest Tweet
After many years providing HotSpring hot tubs to consumers at our UK showrooms, Hot Tub Barn and our staff are going transatlantic thanks to a landmark deal to create a pioneering first in wet leisure. This exciting venture is the icing on the cake for us following our recent Dealer Of The Year award.Continue reading → | 2023-11-20T01:26:19.665474 | https://example.com/article/9980 |
A coding scheme for veterinary clinical signs.
An emphasis on diagnostic coding in present methods for classification of veterinary clinical data limits retrieval of information on clinical signs for teaching a research. A classification scheme has been developed which allows coding of information based on clinical signs. | 2024-06-30T01:26:19.665474 | https://example.com/article/6936 |
Portland Mayor Ted Wheeler speak at a news conference after a man fatally stabbed two men Friday on a light-rail train when they tried to stop him from yelling anti-Muslim slurs at two young women, one of whom was wearing a hijab, in Portland, Ore., Saturday, May 27, 2017. Jeremy Joseph Christian, 35, was booked on suspicion of aggravated murder and attempted murder in the attack and will make a first court appearance Tuesday. (AP Photo/Gillian Flaccus) Portland Mayor Ted Wheeler speak at a news conference after a man fatally stabbed two men Friday on a light-rail train when they tried to stop him from yelling anti-Muslim slurs at two young women, one of whom was wearing a hijab, in Portland, Ore., Saturday, May 27, 2017. Jeremy Joseph Christian, 35, was booked on suspicion of aggravated murder and attempted murder in the attack and will make a first court appearance Tuesday. (AP Photo/Gillian Flaccus)
The mayor of Portland, Oregon, on Monday urged U.S. officials and organizers to cancel a “Trump Free Speech Rally” and other similar events, saying they are inappropriate and could be dangerous after two men were stabbed to death on a train as they tried to help a pair of young women targeted by an anti-Muslim tirade.
Mayor Ted Wheeler said he hopes the victims will inspire “changes in the political dialogue in this country.”
It comes amid a wider debate in the U.S. about the First Amendment, often in liberal cities like Portland and Berkeley, California, and on college campuses, where violent protests between far-right and far-left protesters have derailed appearances by contentious figures.
Taliesin Myrddin Namkai Meche, 23, and Ricky John Best, 53, were killed Friday as they tried to stop Jeremy Joseph Christian from harassing the women, one of whom was wearing a hijab, authorities say. Another who stepped in was seriously injured.
Christian’s social media postings indicate an affinity for Nazis and political violence. He is accused of aggravated murder, intimidation — the state equivalent of a hate crime — and being a felon in possession of a weapon and is scheduled to be in court Tuesday.
ADVERTISEMENT
The federal government has issued a permit for the free-speech rally Saturday and has yet to give a permit for an event June 10. The mayor says his main concern was participants “coming to peddle a message of hatred,” saying hate speech is not protected by the Constitution.
A Facebook page for the event says there would be speakers and live music in “one of the most liberal areas on the West Coast.” It says it will feature Kyle Chapman, who describes himself as an American nationalist and ardent supporter of President Donald Trump.
Chapman was arrested at a March 4 protest in Berkeley, the birthplace of the U.S. free speech movement in the 1960s that has become a flashpoint for the extreme left and right since Trump’s election.
The University of California, Berkeley, has been criticized for canceling an appearance by conservative commentator Ann Coulter in April and another by right-wing provocateur Milo Yiannopoulos in February. It canceled Coulter’s speech amid threats of violence, fearing a repeat of rioting ahead of the Yiannopoulos event.
Trump has condemned the stabbing, writing Monday on Twitter: “The violent attacks in Portland on Friday are unacceptable. The victims were standing up to hate and intolerance. Our prayers are w/ them.”
ADVERTISEMENT
Wheeler said he appreciated Trump’s words but stressed the need for action.
“I hope we rise to the memory of these two gentlemen who lost their lives,” the mayor told reporters. “Let’s do them honor by standing with them and carrying on their legacy of standing up to hate and bigotry and violence.”
The mother of one of the targets of the rant said she was overwhelmed with gratitude and sadness for the strangers who died defending her daughter, 16-year-old Destinee Mangum.
Mangum told news station KPTV that she and her 17-year-old friend were riding the train when Christian started yelling at them. She said her friend is Muslim, but she’s not.
“He told us to go back to Saudi Arabia, and he told us we shouldn’t be here, to get out of his country,” Mangum said. “He was just telling us that we basically weren’t anything and that we should kill ourselves.”
The teens moved toward the back of the train, preparing to get off at the next stop.
“And then we turned around while they were fighting, and he just started stabbing people, and it was just blood everywhere, and we just started running for our lives,” Mangum said.
Micah David-Cole Fletcher, 21, was stabbed in the neck. His girlfriend, Miranda Helm, told The Oregonian/OregonLive that he was recovering his strength in the hospital.
Telephone messages left at the home of Christian’s mother Sunday and Monday were not returned. It was not clear if he had a lawyer yet.
A day before the attack, cellphone video confirmed by police Sgt. Pete Simpson shows Christian using expletives as he rants about Muslims, Christians and Jews on a train. At one point, he threatens to stab the driver of the train Thursday, according to video from a passenger posted by TV station KOIN.
Simpson says police also are investigating an incident that day involving Christian and a black woman on the train, but he didn’t immediately respond to emails seeking additional details.
Christian served prison time after holding up employees at a convenience store with a gun in 2002, court records show. He went back after pleading guilty in 2011 to being a felon in possession of a firearm. He was behind bars again in 2013 for violating a condition of his release, according to court records.
Tomica Clark told The Oregonian/OregonLive that she has known Christian since elementary school. She said she was surprised to hear people call Christian racist. Clark is black and said Christian had many black friends.
“He never disrespected me,” Clark said, but added that he changed after he got out of prison.
“Prison took the real him away,” she said.
___
Bellisle reported from Seattle. Associated Press writer Joselyn Gecker in San Francisco contributed. | 2023-08-26T01:26:19.665474 | https://example.com/article/7792 |
/*
* Copyright (c) 2005-2020 Rainbow Kirill Grouchnikov
* and Alexander Potochkin. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* o Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* o Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* o Neither the name of the copyright holder nor the names of
* its contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
package org.pushingpixels.demo.rainbow
import kotlinx.coroutines.Dispatchers
import kotlinx.coroutines.GlobalScope
import kotlinx.coroutines.launch
import kotlinx.coroutines.swing.Swing
import org.pushingpixels.flamingo.api.bcb.core.BreadcrumbFileSelector
import org.pushingpixels.substance.api.SubstanceCortex
import org.pushingpixels.substance.api.SubstanceSlices.AnimationFacet
import org.pushingpixels.substance.api.skin.BusinessSkin
import java.io.File
import javax.swing.JFrame
/**
* SVG viewer application.
*
* @author Kirill Grouchnikov
* @author Alexander Potochkin
*/
fun main() {
GlobalScope.launch(Dispatchers.Swing) {
JFrame.setDefaultLookAndFeelDecorated(true)
SubstanceCortex.GlobalScope.setTimelineDuration(1000)
SubstanceCortex.GlobalScope.allowAnimations(AnimationFacet.GHOSTING_ICON_ROLLOVER)
SubstanceCortex.GlobalScope.setSkin(BusinessSkin())
val frame = RainbowViewer<File>("Local SVG File Viewer", BreadcrumbFileSelector())
frame.setSize(700, 400)
frame.setLocationRelativeTo(null)
frame.defaultCloseOperation = JFrame.EXIT_ON_CLOSE
frame.isVisible = true
}
}
| 2024-01-01T01:26:19.665474 | https://example.com/article/7189 |
Q:
Function keeps doing the same thing
This program suppose to find 1000 prime numbers and pack them into a list
Here's the code:
num = raw_input('enter a starting point')
primes = [2]
num = int(num)
def prime_count(num):
if num % 2 == 0: #supposed to check if the number is divided by 2 evenly
num = num +1 #if it is, then add 1 to that number and check again
return num
elif num % num == 0:
primes.append(num) #supposed to add that prime to a list
num = num + 1 #add 1 and check again
return num
while len(primes) <= 999:
prime_count(num)
So what actually happens when I run it:
it asks me raw_input and then goes to various things depending on what I choose as input:
If I choose a prime, let's say 3, it runs and adds 999 of 3s to the list instead of adding it just one time and going on to try 4
If I choose a non-prime, let's say 4, it just breaks, after that I can't even print out a list
What am i doing wrong?
UPDATE:
I fixed it, but when i run it with this i'm getting an error (TypeError: unsupported operand type(s) for %: 'NoneType' and 'int')
number = raw_input('enter a starting point')
primes = [2]
number = int(number)
def prime_count(x):
if x % 2 == 0: #supposed to check if the number is divided by 2 evenly
number = x +1 #if it is, then add 1 to that number and check again
return number
else:
for i in range(3, x-1):
if x % i == 0:
primes.append(x) #supposed to add that prime to a list
number = x + 1 #add 1 and check again
return number
while len(primes) <= 999:
number = prime_count(number)
A:
You're never using the return value from prime_count. Try this:
while len(primes) <= 999:
num = prime_count(num)
You've set your self up for confusion by using the name num as both a parameter (also a local variable) inside of prime_count, and also as a global variable. Even though they have the same name, they are different variables, due to Python's rules for the scope of variables.
Also, prime_count is (probably unintentionally) leveraging the fact that primes is a global variable. Since you're not assigning to it, but rather just calling a method (append), the code will work without using the global keyword.
However, your algorithm isn't even correct. if num % num == 0 says "if a number divided by itself has a remainder of zero" which will always be true. This program will find a lot of "primes" that aren't primes.
Real Python programs do very little in the global scope; your current code is just asking for confusion. I suggest you start with this template, and also do some reading of existing Python code.
def add_three(a_param):
a_local_var = 3 # This is *different* than the one in main!
# Changes to this variable will *not* affect
# identically-named variables in other functions
return a_local_var + a_param
def main():
a_local_var = 2
result = add_three(a_local_var)
print result # prints 5
if __name__ == '__main__':
main()
| 2023-09-10T01:26:19.665474 | https://example.com/article/9922 |
Storage and Handling
Store at room temperature 20-25C (68-77F). Do not freeze. Chip Quik Thermally Stable solder paste should be stored at its operating temperature (room temperature) of 20-25C (68-77F), therefore no warming time is required before use.
Transportation
This product has no shipping restrictions. Shipping below 0C (32F) or above 25C (77F) for normal transit times by ground or air will not impact this product's stated shelf life.
WARNING! This product can expose you to Lead, which is known to the State of California to cause Cancer, Birth Defects, or other Reproductive Harm. For more information, go to: www.P65Warnings.ca.gov | 2023-11-30T01:26:19.665474 | https://example.com/article/3876 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.