text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
Revision as of 15:58, May 19, 2014
Pokémon: BW Rival Destinies is the fifteenth overall season and the second season of the Best Wishes! Series. It currently features Ash Ketchum and his friends, Iris and Cilan, and their adventures through Unova from Nimbasa City, Ash's Gym Battle with Clay and his upcoming journey through east Unova. | 2024-07-29T01:26:58.646260 | https://example.com/article/7167 |
# frozen_string_literal: true
require_relative '../../spec_helper'
module Seahorse
module Model
describe Operation do
it 'defaults #name to nil' do
operation = Operation.new
operation.name = 'OperationName'
expect(operation.name).to eq('OperationName')
end
it 'defaults #http_method to "POST"' do
operation = Operation.new
expect(operation.http_method).to eq('POST')
operation.http_method = 'GET'
expect(operation.http_method).to eq('GET')
end
it 'defaults #http_request_uri to "/"' do
operation = Operation.new
expect(operation.http_request_uri).to eq('/')
operation.http_request_uri = '/path?query'
expect(operation.http_request_uri).to eq('/path?query')
end
it 'defaults #deprecated to false' do
operation = Operation.new
expect(operation.deprecated).to be(false)
operation.deprecated = true
expect(operation.deprecated).to be(true)
end
it 'defaults #documentation to nil' do
operation = Operation.new
expect(operation.documentation).to be(nil)
operation.documentation = 'docstring'
expect(operation.documentation).to eq('docstring')
end
it 'defaults #authorizer to nil' do
operation = Operation.new
expect(operation.authorizer).to be(nil)
operation.authorizer = 'MyAuthorizer'
expect(operation.authorizer).to eq('MyAuthorizer')
end
it 'defaults #input to nil' do
shape_ref = double('shape-ref')
operation = Operation.new
expect(operation.input).to be(nil)
operation.input = shape_ref
expect(operation.input).to be(shape_ref)
end
it 'defaults #output to nil' do
shape_ref = double('shape-ref')
operation = Operation.new
expect(operation.output).to be(nil)
operation.output = shape_ref
expect(operation.output).to be(shape_ref)
end
it 'defaults #errors to []' do
shape_ref = double('shape-ref')
operation = Operation.new
expect(operation.errors).to eq([])
operation.errors << shape_ref
operation.errors << shape_ref
expect(operation.errors).to eq([shape_ref, shape_ref])
end
end
end
end
| 2024-07-13T01:26:58.646260 | https://example.com/article/5859 |
Many designs for effecting the interconnection between leads of an integrated circuit (IC) device and a printed circuit board have been described for performance evaluation of the IC device. In particular, U. S. Pat. No. 5,207,584 discloses an electrical interconnect contact system having a housing with generally z or s-shaped planar contacts. Troughs are provided along the two surfaces of the housing with securing elements seated inside the troughs. The s-shaped contacts are mounted in slots cut across the housing, with the two hooks of the s-shape each engaging one securing element, and the two ends of the contacts exposed one on each surface. The leads of the IC device for testing would be in contact with s-shaped contact from one surface, and a pad or terminal of a printed circuit board in contact with the s-shaped contact or probe from the other surface. At least one of the securing elements is elastomeric to facilitate a wiping action by which contact with the lead of the IC and the pad of the printed circuit board are effected. This wiping action, although providing effective contact during initial use, has been found to cause an unacceptably high rate of wearing of the connecting pad on the printed circuit board. Since the printed circuit board is very costly, it is not economically viable to change the board frequently. In addition, because the elastomeric elements such as elastomeric bands used to allow this wiping action has to be of sufficient laxity to allow lateral movement to effect wiping, they wear out quickly, requiring time-consuming and costly replacements. There is therefore a need to design a new electrical contact to overcome the problems stated above. | 2023-09-30T01:26:58.646260 | https://example.com/article/9258 |
Call for Papers: Digital History in Finland, Wednesday, 9.12.2015
Call for Papers: Digital History in Finland, Wednesday, 9.12.2015
The Digital History in Finland Network (#DigiHistFi) will organise a one-day symposium on Digital History in Finland at the University of Helsinki on Wednesday 9th of December 2015. The motto of the network and symposium is: History first, digital second.
Digital History is an area within the emerging field of Digital Humanities that is combining humanities and social sciences with contemporary information and communication technologies. Digital history aims to further historical practice by applying computational methods to various types of historical source materials and data. While there is a tradition, for example, among corpus linguists to use computational methods, the study of history has been slower to take up new approaches in a productive manner. In Finland, the computational approach to history has so far rarely impacted on the core of the historian’s craft in such a way that those who have not already any previous interests in digital humanities would pay attention. Yet, the potential for revisiting old and creating new research questions through computational methods is considerable. This is what the network and symposium seeks to explore further.
The idea of this symposium is to bring together historians working on different aspects of digital history in Finland to talk about their research and meet other scholars interested in similar questions.
We invite submissions of short papers of 15-20 minutes (abstracts of 100 words) on any aspect of digital history. We especially encourage submissions of project ideas and sketches of emerging work. In the morning session it is also possible to present papers through skype. So, it is strongly encouraged that historians from all Finnish organisations participate.
The deadline for submitting a paper is Friday 30.10.2015. Please send the title of the presentation and 100 word abstract to: digihistfi@gmail.com. Notification of acceptance and symposium practicalities of the symposium will be communicated by 13.11.2015. | 2024-05-05T01:26:58.646260 | https://example.com/article/4270 |
Q:
Android - serialize object to pass it over Bluetooth NotSerializableException
I'm trying to pass an object via Bluetooth in my Android application. Therefore, I have to serialize it and pass it from my Activity (GameViewHandler) to my BluetoothConnectionService class. The problem is the object (Ball) can't be serialized and throws a NotSerializableExeption.
I tried to accomplish the serialization by implementing a serialize() method from this question: https://stackoverflow.com/a/14165417/4408098
Here is the Activity which invokes the write() method in the BluetoothConnectionService:
public class GameActivityHandler extends Activity {
private static final String TAG = "GameActivityHandler";
private BluetoothConnectionService mConnService;
private Ball myBall;
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
View decorView = getWindow().getDecorView();
// Hide the status bar.
int uiOptions = View.SYSTEM_UI_FLAG_FULLSCREEN;
decorView.setSystemUiVisibility(uiOptions);
// Remember that you should never show the action bar if the
// status bar is hidden, so hide that too if necessary.
ActionBar actionBar = getActionBar();
actionBar.hide();
setContentView(new GameView(this));
Bundle extra = getIntent().getExtras();
Boolean isHost = extra.getBoolean("host");
if(isHost){
mConnService = BluetoothHostActivity.mBtService;
} else{
mConnService = JoinGameActivity.mConnService;
}
}
@Override
public boolean onKeyDown(int keyCode, KeyEvent event) {
final AlertDialog ad = new AlertDialog.Builder(this).create();
ad.setMessage("Do you really want to disconnect?");
ad.setCancelable(false);
ad.setButton(AlertDialog.BUTTON_NEGATIVE, "No", new DialogInterface.OnClickListener() {
@Override
public void onClick(DialogInterface dialog, int which) {
ad.dismiss();
}
});
ad.setButton(AlertDialog.BUTTON_POSITIVE, "Yes", new DialogInterface.OnClickListener() {
@Override
public void onClick(DialogInterface dialog, int which) {
mConnService.cancelConnection();
Toast.makeText(GameActivityHandler.this, "Disconnected!", Toast.LENGTH_SHORT).show();
Intent intent = new Intent(GameActivityHandler.this, MainActivity.class);
startActivity(intent);
GameActivityHandler.this.finish();
}
});
ad.show();
return super.onKeyDown(keyCode, event);
}
/**
* The Handler that gets information back from the BluetoothChatService
*/
private final Handler mHandler = new Handler() {
@Override
public void handleMessage(Message msg) {
switch (msg.what) {
case 1:
// just receive a Toast
Toast.makeText(GameActivityHandler.this, msg.getData().getString("toast"),Toast.LENGTH_SHORT).show();
break;
case 2: // 2 stands for the MESSAGE_READ Integer
Log.d(TAG, "Handler just received message from BluetoothConnectionService");
byte[] readBuf = (byte[]) msg.obj;
Ball readMessage = null;
try {
readMessage = deserialize(readBuf); // deserialize the received byte[] to convert it back to a Ball object
} catch (ClassNotFoundException | IOException e) {
// TODO Auto-generated catch block
e.printStackTrace();
}
Log.d(TAG, "Received Ball: xCoordinate: " + readMessage.getX() + " yCoordinate: " + readMessage.getY());
break;
case 3:
}
}
};
public static Ball deserialize(byte[] bytes) throws IOException, ClassNotFoundException {
ByteArrayInputStream b = new ByteArrayInputStream(bytes);
ObjectInputStream o = new ObjectInputStream(b);
return (Ball) o.readObject();
}
public void invokeWriteDataToBtService(Ball send) throws IOException {
// send a Ball object to the remote device through BluetoothConnectionService
// but serialize it first because OutPutStream only accepts byte Arrays to be sent over Bluetooth
mConnService.write(send.serialize());
}
}
basically, the invokeWriteDataToBtService() method is the interesting one.
My BluetoothConnectionService:
public class BluetoothConnectionService {
private static final String TAG = "BluetoothConnectionService";
private static final String NAME = "ballGame";
private static final UUID MY_UUID =
UUID.fromString("9bf02da0-ff78-4a9d-a734-ef3e3324a4ec");
// Member fields
private final BluetoothAdapter mBluetoothAdapter;
private final Handler mHandler;
private ConnectThread mConnectThread;
private ConnectedThread mConnectedThread;
public BluetoothConnectionService(Context context, Handler handler) {
mBluetoothAdapter = BluetoothAdapter.getDefaultAdapter();
mHandler = handler;
}
public synchronized void accept(){
Log.d(TAG, "accept device");
// Start the thread to connect with the given device
AcceptThread mAcceptThread = new AcceptThread();
mAcceptThread.start();
}
public synchronized void connect(BluetoothDevice device){
Log.d(TAG, "connect to: " + device);
// Start the thread to connect with the given device
mConnectThread = new ConnectThread(device);
mConnectThread.start();
}
/**
* Start the ConnectedThread to begin managing a Bluetooth connection
*
* @param socket The BluetoothSocket on which the connection was made
* @param device The BluetoothDevice that has been connected
*/
public synchronized void connected(BluetoothDevice device, BluetoothSocket socket ) {
Log.d(TAG, "connected()");
// Cancel the thread that completed the connection
if (mConnectThread != null) {
mConnectThread.cancel();
mConnectThread = null;
}
// Cancel any thread currently running a connection
if (mConnectedThread != null) {
mConnectedThread.cancel();
mConnectedThread = null;
}
// Start the thread to manage the connection and perform transmissions
mConnectedThread = new ConnectedThread(socket);
mConnectedThread.start();
// Send the name of the connected device back to the UI Activity
Message msg = mHandler.obtainMessage(1);
Bundle bundle = new Bundle();
bundle.putString("toast", "connected with: " + device.getName());
msg.setData(bundle);
mHandler.sendMessage(msg);
}
private class AcceptThread extends Thread {
private final BluetoothServerSocket mmServerSocket;
public AcceptThread() {
// Use a temporary object that is later assigned to mmServerSocket,
// because mmServerSocket is final
BluetoothServerSocket tmp = null;
// mBluetoothAdapter = BluetoothAdapter.getDefaultAdapter();
try {
// MY_UUID is the app's UUID string, also used by the client code
tmp = mBluetoothAdapter.listenUsingRfcommWithServiceRecord(NAME, MY_UUID);
} catch (IOException e) { }
mmServerSocket = tmp;
}
public void run() {
Log.d(TAG, "BEGIN mAcceptThread" + this);
BluetoothSocket socket = null;
// Keep listening until exception occurs or a socket is returned
while (true) {
try {
socket = mmServerSocket.accept();
} catch (IOException e) {
Log.e(TAG, "accept() failed", e);
break;
}
// If a connection was accepted
if (socket != null) {
// Do work to manage the connection (in a separate thread)
synchronized (BluetoothConnectionService.this) {
connected(socket.getRemoteDevice(), socket);
}
try {
mmServerSocket.close();
} catch (IOException e) {
e.printStackTrace();
}
break;
}
}
Log.i(TAG, "END mAcceptThread");
}
}
private class ConnectThread extends Thread {
private final BluetoothSocket mmSocket;
private final BluetoothDevice mmDevice;
public ConnectThread(BluetoothDevice device) {
// Use a temporary object that is later assigned to mmSocket,
// because mmSocket is final
BluetoothSocket tmp = null;
mmDevice = device;
// Get a BluetoothSocket to connect with the given BluetoothDevice
try {
// MY_UUID is the app's UUID string, also used by the server code
tmp = device.createRfcommSocketToServiceRecord(MY_UUID);
} catch (IOException e) { }
mmSocket = tmp;
}
public void run() {
// Cancel discovery because it will slow down the connection
mBluetoothAdapter.cancelDiscovery();
try {
// Connect the device through the socket. This will block
// until it succeeds or throws an exception
mmSocket.connect();
} catch (IOException connectException) {
// Unable to connect; close the socket and get out
try {
mmSocket.close();
} catch (IOException closeException) { }
connectionFailed();
return;
}
// Reset the ConnectThread because we're done
synchronized (BluetoothConnectionService.this) {
mConnectThread = null;
}
// Do work to manage the connection (in a separate thread)
connected(mmDevice, mmSocket);
}
/** Will cancel an in-progress connection, and close the socket */
public void cancel() {
try {
mmSocket.close();
} catch (IOException e) { }
}
}
public void cancelConnection(){
ConnectedThread r;
synchronized (this) {
r = mConnectedThread;
}
r.cancel();
}
/**
* Indicate that the connection attempt failed and notify the UI Activity.
*/
private void connectionFailed() {
// Send a failure message back to the Activity
Message msg = mHandler.obtainMessage(1);
Bundle bundle = new Bundle();
bundle.putString("toast", "Unable to connect device");
msg.setData(bundle);
mHandler.sendMessage(msg);
}
/**
* Indicate that the connection was lost and notify the UI Activity.
*/
private void connectionLost() {
// Send a failure message back to the Activity
Message msg = mHandler.obtainMessage(1);
Bundle bundle = new Bundle();
bundle.putString("toast", "Device connection was lost");
msg.setData(bundle);
mHandler.sendMessage(msg);
// Start the service over to restart listening mode
// BluetoothConnectionService.this.start();
}
/**
* Write to the ConnectedThread in an unsynchronized manner
*
* @param out The bytes to write
* @see ConnectedThread#write(byte[])
*/
// this method gets called from the GameActivityHandler Activity
public void write(byte[] out) {
Log.d(TAG, "write() in BluetoothConnectionService executed!");
// Create temporary object
ConnectedThread r;
// Synchronize a copy of the ConnectedThread
synchronized (this) {
r = mConnectedThread;
}
// Perform the write unsynchronized in ConnectedThread
r.write(out);
}
/**
* This thread runs during a connection with a remote device.
* It handles all incoming and outgoing transmissions.
*/
private class ConnectedThread extends Thread {
private final BluetoothSocket mmSocket;
private final InputStream mmInStream;
private final OutputStream mmOutStream;
public ConnectedThread(BluetoothSocket socket) {
Log.d(TAG, "create ConnectedThread");
mmSocket = socket;
InputStream tmpIn = null;
OutputStream tmpOut = null;
// Get the BluetoothSocket input and output streams
try {
tmpIn = socket.getInputStream();
tmpOut = socket.getOutputStream();
} catch (IOException e) {
Log.e(TAG, "temp sockets not created", e);
}
mmInStream = tmpIn;
mmOutStream = tmpOut;
}
public void run() {
Log.i(TAG, "BEGIN mConnectedThread");
byte[] buffer = new byte[1024];
int bytes;
// Keep listening to the InputStream while connected
while (true) {
try {
Log.d(TAG, "Read InputStream...");
// Read from the InputStream
bytes = mmInStream.read(buffer);
// Send the obtained bytes to the UI Activity
mHandler.obtainMessage(2, bytes, -1, buffer)
.sendToTarget();
Log.d(TAG, "Just sent message to Handler");
} catch (IOException e) {
Log.e(TAG, "disconnected", e);
connectionLost();
// Start the service over to restart listening mode
// BluetoothConnectionService.this.start();
break;
}
}
}
/**
* Write to the connected OutStream.
*
* @param buffer The bytes to write
*/
// the actual write method
public void write(byte[] buffer) {
Log.d(TAG, "write() in ConnectedThread executed!");
try {
mmOutStream.write(buffer);
// Share the sent message back to the UI Activity
// mHandler.obtainMessage(3, -1, -1, buffer)
// .sendToTarget();
} catch (IOException e) {
Log.e(TAG, "Exception during write", e);
}
}
public void cancel() {
if (mmInStream != null) {
try {mmInStream.close();} catch (Exception e) {}
}
if (mmOutStream != null) {
try {
mmOutStream.close();
} catch (Exception e) {}
}
if (mmSocket != null) {
try {
mmSocket.close();
} catch (Exception e) {}
}
try {
mmSocket.close();
} catch (IOException e) {
Log.e(TAG, "close() of connect socket failed", e);
}
}
}
}
The Ball class which should be serialized. It contains some float, Integer's, boolean and a Bitmap:
public class Ball {
private int x, y;
private Bitmap bitmap;
private float currVelocityX = 0, currVelocityY = 0, lastVelocityY = 0;
private boolean touched = false;
public Ball(Resources resources, int x_pos, int y_pos) {
x = x_pos;
y = y_pos;
bitmap = BitmapFactory.decodeResource(resources, R.drawable.ball1);
}
public void drawBall(Canvas canvas){
canvas.drawBitmap(bitmap, x, y, null);
}
// some methods
public byte[] serialize() throws IOException {
ByteArrayOutputStream b = new ByteArrayOutputStream();
ObjectOutputStream o = new ObjectOutputStream(b);
o.writeObject(this);
Log.d("TAG", "Ball gets serialized()");
return b.toByteArray();
}
}
What the Log says:
12-31 11:44:35.792: W/System.err(7956): java.io.NotSerializableException: com.mhpproductions.ballgame.Ball
12-31 11:44:35.792: W/System.err(7956): at java.io.ObjectOutputStream.writeNewObject(ObjectOutputStream.java:1364)
12-31 11:44:35.792: W/System.err(7956): at java.io.ObjectOutputStream.writeObjectInternal(ObjectOutputStream.java:1671)
12-31 11:44:35.792: W/System.err(7956): at java.io.ObjectOutputStream.writeObject(ObjectOutputStream.java:1517)
12-31 11:44:35.792: W/System.err(7956): at java.io.ObjectOutputStream.writeObject(ObjectOutputStream.java:1481)
12-31 11:44:35.792: W/System.err(7956): at com.mhpproductions.ballgame.Ball.serialize(Ball.java:104)
12-31 11:44:35.792: W/System.err(7956): at com.mhpproductions.ballgame.GameActivityHandler.invokeWriteDataToBtService(GameActivityHandler.java:125)
12-31 11:44:35.792: W/System.err(7956): at com.mhpproductions.ballgame.GameView.onTouchEvent(GameView.java:131)
12-31 11:44:35.792: W/System.err(7956): at android.view.View.dispatchTouchEvent(View.java:7713)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTransformedTouchEvent(ViewGroup.java:2216)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTouchEvent(ViewGroup.java:1959)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTransformedTouchEvent(ViewGroup.java:2216)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTouchEvent(ViewGroup.java:1959)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTransformedTouchEvent(ViewGroup.java:2216)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewGroup.dispatchTouchEvent(ViewGroup.java:1959)
12-31 11:44:35.792: W/System.err(7956): at com.android.internal.policy.impl.PhoneWindow$DecorView.superDispatchTouchEvent(PhoneWindow.java:2329)
12-31 11:44:35.792: W/System.err(7956): at com.android.internal.policy.impl.PhoneWindow.superDispatchTouchEvent(PhoneWindow.java:1568)
12-31 11:44:35.792: W/System.err(7956): at android.app.Activity.dispatchTouchEvent(Activity.java:2458)
12-31 11:44:35.792: W/System.err(7956): at com.android.internal.policy.impl.PhoneWindow$DecorView.dispatchTouchEvent(PhoneWindow.java:2277)
12-31 11:44:35.792: W/System.err(7956): at android.view.View.dispatchPointerEvent(View.java:7893)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$ViewPostImeInputStage.processPointerEvent(ViewRootImpl.java:3950)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$ViewPostImeInputStage.onProcess(ViewRootImpl.java:3829)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.deliver(ViewRootImpl.java:3395)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.onDeliverToNext(ViewRootImpl.java:3445)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.forward(ViewRootImpl.java:3414)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$AsyncInputStage.forward(ViewRootImpl.java:3521)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.apply(ViewRootImpl.java:3422)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$AsyncInputStage.apply(ViewRootImpl.java:3578)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.deliver(ViewRootImpl.java:3395)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.onDeliverToNext(ViewRootImpl.java:3445)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.forward(ViewRootImpl.java:3414)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.apply(ViewRootImpl.java:3422)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$InputStage.deliver(ViewRootImpl.java:3395)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl.deliverInputEvent(ViewRootImpl.java:5535)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl.doProcessInputEvents(ViewRootImpl.java:5515)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl.enqueueInputEvent(ViewRootImpl.java:5486)
12-31 11:44:35.792: W/System.err(7956): at android.view.ViewRootImpl$WindowInputEventReceiver.onInputEvent(ViewRootImpl.java:5615)
12-31 11:44:35.792: W/System.err(7956): at android.view.InputEventReceiver.dispatchInputEvent(InputEventReceiver.java:185)
12-31 11:44:35.792: W/System.err(7956): at android.os.MessageQueue.nativePollOnce(Native Method)
12-31 11:44:35.792: W/System.err(7956): at android.os.MessageQueue.next(MessageQueue.java:138)
12-31 11:44:35.792: W/System.err(7956): at android.os.Looper.loop(Looper.java:123)
12-31 11:44:35.792: W/System.err(7956): at android.app.ActivityThread.main(ActivityThread.java:5146)
12-31 11:44:35.792: W/System.err(7956): at java.lang.reflect.Method.invokeNative(Native Method)
12-31 11:44:35.792: W/System.err(7956): at java.lang.reflect.Method.invoke(Method.java:515)
12-31 11:44:35.792: W/System.err(7956): at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:796)
12-31 11:44:35.792: W/System.err(7956): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:612)
12-31 11:44:35.792: W/System.err(7956): at dalvik.system.NativeStart.main(Native Method)
So, line 125 in GameActivityHandler is
mConnService.write(send.serialize());
that causes the exeption.
So how can I serialize my Ball object, send it, receive it on the remote device and deserialize it again?
A:
So how can I serialize my Ball
Very simple:
import java.io.Serializable;
...
public class Ball implements Serializable
| 2023-10-28T01:26:58.646260 | https://example.com/article/1671 |
<?php
/**
* Nextcloud - NextNote
*
*
* @copyright Copyright (c) 2017, Sander Brand (brantje@gmail.com)
* @license GNU AGPL version 3 or any later version
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\NextNote\Db;
use \OCP\AppFramework\Db\Entity;
/**
* @method integer getId()
* @method void setId(int $value)
* @method integer getParentId()
* @method void setParentId(int $value)
* @method void setUid(string $value)
* @method string getUid()
* @method void setName(string $value)
* @method string getName()
* @method void setGuid(string $value)
* @method string getGuid()
* @method string getColor()
* @method string setColor(string $value)
* @method void setDeleted(integer $value)
* @method integer getDeleted()
* @method void setNoteCount(integer $value)
* @method integer getNoteCount()
*/
class Notebook extends Entity implements \JsonSerializable {
use EntityJSONSerializer;
protected $name;
protected $guid;
protected $uid;
protected $parentId;
protected $color;
protected $deleted;
protected $noteCount;
public function __construct() {
// add types in constructor
$this->addType('parentId', 'integer');
$this->addType('deleted', 'integer');
$this->addType('note_count', 'integer');
}
protected function setter($name, $args) {
if($name != 'noteCount') {
parent::setter($name, $args);
} else {
$this->$name = $args[0];
}
}
/**
* Turns entity attributes into an array
*/
public function jsonSerialize() {
return [
'id' => $this->getId(),
'guid' => $this->getGuid(),
'parent_id' => $this->getParentId(),
'name' => $this->getName(),
'color' => $this->getColor(),
'note_count' => $this->getNoteCount(),
'permissions' => 31
];
}
}
| 2024-01-16T01:26:58.646260 | https://example.com/article/1501 |
Q:
Измерение расстояние прокрутки страницы вниз
Всем привет! Задача заключается в следующем, есть блок с фильтрами. При прокрутке страницы вниз, до верхней границы этого блока становится position: fixed. Я измеряю расстояние от верха страницы до границы блока следующим образом:
// В моем случае примерно 80px;
var offsetFromScreenTop = $(".collapsing-container").offset().top + $(window).scrollTop();
Все прекрасно работает, но проблема заключается в следующим: когда страница была промотана вниз, предположим на 200px и страница обновлена F5, то происходит новый перерасчет и я получаю 280px, и мое меню меняет класс гораздо ниже чем я закладывал.
Вот остальная часть кода:
`
this.scrolled = window.scrollY > offsetFromScreenTop;
var temp_width = $('.collapsing-container').outerWidth()
if (this.scrolled) {
$('.collapsing-container').addClass('Fixed');
} else {
console.log('меньше' + offsetFromScreenTop);
$('.collapsing-container').removeClass('Fixed');
$('.collapsing-container').css('width', temp_width);
}
`
A:
>>При прокрутке страницы вниз, до верхней границы этого блока становится position: fixed
Это похоже на то, что мы называем липкими блоками: в какой-то момент блок поддается скроллированию вместе со всей страницей, а в какой-то момент прилипает к окну браузера. Все верно?
Если вам позволено проигнорировать эту функциональность в Internet Explorer (не в Edge, в Edge уже все ок), то, вероятно вас спасет position: sticky и можно обойтись вообще без скриптов. Работать будет значительно лучше, не будет видимых скачков (особенно на смартфонах), не будет багов, не надо ничего считать и программировать. В IE тем временем сделайте обычный absolute или fixed -- вариант попроще.
| 2023-08-16T01:26:58.646260 | https://example.com/article/2459 |
Q:
Zend_Form_Element_Hash изменить message
Господа и дамы, коллеги, помогите разобраться. Имеем в форме следующий элемент:
$token = new Zend_Form_Element_Hash('csrf_token');
$token->setSalt(md5(microtime() . uniqid()));
Как у него поменять сообщения об ошибке, он выводит "The two given tokens do not match". Я уже и в самих классах Zend полазил, ни чего не нашел. По сути это обычный валидатор срабатывает, но как мне изменить это сообщение об ошибке на свое?
A:
Разобрался, нужно было просто сделать:
$token = new Zend_Form_Element_Hash('csrf_token');
$token->setSalt(md5(microtime() . uniqid()));
$token->getValidator('Identical')->setMessages(array(
Zend_Validate_Identical::MISSING_TOKEN => 'Обнаружена попытка CSRF-атаки. Перезагрузите форму.',
Zend_Validate_Identical::NOT_SAME => 'Обнаружена попытка CSRF-атаки. Перезагрузите форму.'
));
| 2024-02-02T01:26:58.646260 | https://example.com/article/4788 |
Q:
SQL Server error log monitoring
In SQL server instance(s) I manage; I see a lot of activity and messages in SQL server error log for e.g. backup or transaction log backup completed etc.. We have quite a few databases in one instance and amount of error log messages is sometimes quite a few to dig into.
As an accidental DBA, What approach or script can I use to filter the error log for date range specified or finding or filtering troubling errors out of lots of informational messags?
I meant to ask, is there is a T-SQL script or DMVs you can use to filter the error log?
A:
I suggest that you circumvent reading the error log directly and instead implement SQL Agent Alerting. Under this methodology, you'd simply create alerts for, say, when SQL Server throws an error (I recommend separate alerts for severity levels 19 -25) and tell SQL Server to email you when the error occurs.
You can then generally ignore error log except for specific troubleshooting situations.
General details are here. The details for setting up SQL Agent alerts specifically using SSMS are on TechNet are here and are the same in Books On-Line here.
Hope this helps,
-Kevin
@kekline
A:
You should use the system sp xp_ReadErrorLog to read the SQL Server error log. You can find some details in the following articles: Using xp_ReadErrorLog in SQL Server 2005 and Reading the SQL Server log files using TSQL.
| 2024-03-20T01:26:58.646260 | https://example.com/article/9660 |
10 Ways To Prep More Efficiently For The LSAT
When you decide that you going to make taking the LSAT the next step in your life, it’s a good time to take stock of your study habits. It takes most people A LOT of work to max out their score on the LSAT (click here for a full discussion of how long you should study). Don’t take the LSAT if you aren’t prepared to put in a good amount of effort. Experts including us typically recommend you study about 3 months to reach your full potential on the LSAT. This is moderate intensity study, meaning probably 2-5 hours a day of study 5-6 days a week for that whole 3 months. That’s the amount of study that got Josh and I into U Chicago, and when I talk to people who went on to T14 schools, that’s the amount of work that just about all of them did. Copy this effort and you’ve got the best shot of success.
That said, raw force isn’t enough to crack the LSAT. It’s going to help immensely if you are getting the most out of your prep time. With that in mind, we’ve got some tips on how to prep better for the LSAT. The tips here will help you avoid waking one day up mid-way through your prep and realizing you’ve been doing it wrong.
1. Don’t Start Out Doing Timed Questions
I’ve heard some tutors working for who knows what company say “the actual test is timed, you should always make timing a factor when you are studying.” That’s typical of advice you hear from people who are great LSAT takers but so-so (or just bad) LSAT tutors. They were so naturally good at the test they could start off with the timing component and do fine. That isn’t going to work for most people. It’s not the best strategy even for the naturally good LSATers, either.
If you want to be a race car driver, you don’t start off racing in F1, do you? You don’t. That’s the best way I can think of to end up dead. LSAT study is the same way. You have to learn how to do things right before you speed it up. Here’s our study schedule that discusses when to add the time component.
2. Always Review Every Difficult Question
When you do questions, always mark any that you find difficult. Then, BEFORE YOU LOOK AT THE ANSWERS, review these questions. This means you carefully redo them and think about the best way to approach them. This may mean you have to go back in your prep books and relearn some techniques as needed.
Here’s why this is necessary? Look straight at the answers and really you might as well be throwing darts at the answers. Yeah sometimes you’ll get lucky on hard questions but did you really learn anything from it? Make sure for each and every difficult question you can tell yourself why you think each other answer is wrong and why the one you’ve chosen is better. THEN, AND ONLY THEN, LOOK AT THE ANSWERS. Click here for a full strategy for effectively reviewing questions.
Do this and you’ll be getting twice as much out of each section you do. It will be time-consuming at first, but eventually you will need to mark fewer and fewer questions as ‘difficult’.
Always review any question you got wrong, whether it was hard or not. You’ll start to see patterns and will learn to spot the traps that get you ahead of time.
3. Find Good Places To Study
Common advice is to find a place to study that mimics the testing room environment. That’s a great idea, however, for the first month I think you are better off studying in absolute quiet, mostly free of distraction. A law school library is great if there is one near you. Any college library will have quiet floors and not so quiet floors. Start your prep on the quiet floors where you can focus.
4. Take A Lot Of Small Breaks
Taking breaks is absolutely necessary part of studying. Your brain, and along with it your capacity for focus and attention has to recover. I played a lot of guitar hero in between LSAT sections, because it was 2008 and that’s what people did back then.
The problem with guitar hero was that it’s a little tough to put down. You want breaks to stay short, not spin out into half-hour TV breaks every time. If I’m prepping for five hours, I’m going to try to take maybe 4 or 5 ten minute breaks.
This sounds obvious, but not everyone does it. Yes, it’s fully okay to try some questions out and we do recommend doing a cold diagnostic as the first step in your prep. However, after that, hit the prep books before you do any more practice questions.
Don’t waste time with material from garbage prep companies either. Here are my fully non-biased recommendations (I don’t get money from anybody for making these recommendations): PowerScore, Blueprint, Manhattan, and Fox Test Prep. These are all LSAT-only prep companies or they started with the LSAT. That generally ensures they know what they are talking about. Avoid Kaplan and Princeton Review.
6. Study With A Friend Some Of The Time
I don’t think it’s a good idea to partner up for every LSAT study session — it’s too easy to lose focus. However, once a week or thereabouts get together with someone else who is prepping and go over a practice test or work on questions then review them together.
It’s a great way to keep each other on task. Tell your buddy what you are planning to get through each week and you’ll be that much more likely to have done it when you meet up next time.
7. When It’s Not Going Well, Drop It For The Day
We all have days where we can tell nothing productive is happening. If it’s clear you aren’t focused after you start prepping on a given day, just put it down. Improving on the LSAT requires your focus and attention. Don’t waste good material working on it when you aren’t focused.
Sure on some days you might need to push through even though you are feeling blasé, especially if it’s happening twice a week or more. Now, If you aren’t feeling focused 4 out of 5 days, we’ve got problems. That might be an indicator that your heart isn’t in this and you should postpone taking the LSAT.
The flip-side of this is that you will likely notice days where you are really on top of it and studying might even feel “fun” (or something close to fun). On these days keep studying, even if you have already done what you planned to do that day. This can be a good way to develop the frame of mind you need to do your best on test day.
8. Don’t Hesitate To Go Back To The Prep Books
Say you are struggling with ‘Must Be True’ questions, a type of question on the logical reasoning section. Unfortunately, it’s not very likely that there is some huge secret that you haven’t learned yet that will help you break through and get all these right. More likely, the problem is that you just haven’t learned what you have already studied! Go back frequently to the prep books such as the Powerscore Logical Reasoning Bible when you run into these problems.
I was consulting these books every single day for at least the first half of my prep. Basically I could have recited parts in my sleep by the end of my prep. Only when you’re confident you have taken that advice to heart and mastered it should you consider going elsewhere for more advice. However, chances are you won’t be having too many problems by then.
Think about whether you are really paying attention to what the prep book says. Once you’ve picked a good prep book, follow its advice to the letter. A lot of research and effort has gone in to these books to figure out what works best. Use it.
9. Alternate Intense Study Days With Lighter Ones
I see a lot of LSAT students say “I’m going to study for the LSAT four hours a day everyday for the next three months!!!” That’s a good attitude, but efficient study is about creating quality study, not just going for volume. With that in mind, I think it’s way better to alternate intense study days (3-5+ hours of study) with lighter ones (1.5-3 hours).
This combats burnout and helps ensure you get more out of your long study days.
Don’t forget the all important day-off either. Every week there should be one day where you don’t even think about LSAT prep. Trust me, the recharge time is worth way more than any extra study you get out of prepping that day.
Also, a study recently showed that meditation led to greatly increased performance on standardized tests. Younger me, studying for the LSAT in 2008 would have thought that meditation was silly. That was then. Now I would give it a try for sure. Don’t argue with stuff that works. | 2024-03-23T01:26:58.646260 | https://example.com/article/6590 |
The anorexic mother who weighs less than her daughter, 7
At first glance they might be sisters, but look again at this startling picture.
They are, in fact, a 26-year-old mother and her daughter.
After suffering from anorexia for half her life, Rebecca Jones weighs five stone – less than her seven-year-old daughter, Maisy.
Anorexic mother Rebecca Jones, right, who weighs less than her seven year old daughter Maisy, left
And her terrifyingly thin frame is exacerbated by the contrast when they wear identical clothes.
The medical secretary survives on soup, toast and energy drinks – even though doctors have warned her the lack of nutrients could kill her. At the same time she encourages 5st 9lb Maisy to enjoy chocolate and cupcakes.
Miss Jones, who at 5ft 1in is eight inches taller than her daughter, said: ‘Wearing the same clothes as Maisy gives me a sense of pride. It’s wrong, but it makes me feel good. I don’t think I’m thin – I always see myself as bigger.’
Her eating disorder began following her parents’ divorce when she was 11.
Comfort eating caused her to balloon to 15st, and she was teased at school and lost confidence in herself.
At 13, she says, ‘I pretty much stopped eating’. After a drastic weight loss, friends began complimenting her size ten figure and her family did not spot the dangers.
Rebecca weighs just 5st and says fitting into her daughter's clothes gives her a 'sense of pride'
Miss Jones said: ‘Mum just thought I’d lost my puppy fat. I was happier.’
But within two years her weight was down to eight stone and her periods stopped.
‘I was often so frail, I couldn’t get out of bed,’ she said.
She met Maisy’s father when she was 19 and studying at Manchester University. She had assumed her anorexia had left her infertile and had no idea she was expecting until she felt a kick. A scan revealed she was 26 weeks pregnant.
‘I had no idea,’ she told Closer magazine. ‘I was still in a size six, hadn’t put on weight and my stomach was flat.’
Doctors urged her to eat chicken for protein and take vitamin pills to help her baby, but her stomach wasn’t used to them. ‘My boyfriend tried to tempt me to eat, but my stomach was so used to eating tiny amounts, proper food made me feel sick,’ Miss Jones said.
As a result she survived on a diet of bread and beetroot during pregnancy and put on only 7lb during that time.
Nevertheless, Maisy was born healthy, but small at 5lb 7oz, and her mother couldn’t produce milk to feed her.
After splitting with her partner, Miss Jones went on to a virtually liquid diet which took her weight down to five stone.
‘I picked up one of Maisy’s skirts and it fitted perfectly,’ she said. ‘Maisy is 4ft 5in and wears 9-11 clothes. We share tops and jeans.’
The full story of Rebecca Jones appears in this week's Closer magazine, on sale now
Now her daughter’s weight has overtaken her as she enjoys cakes, chips and pizza. ‘It’s wonderful to see her enjoying cakes,’ said Miss Jones, who lives in Manchester. ‘I’ve told her I have an eating disorder and she knows it’s a bad thing.
‘And if she wants chocolate, I say yes – I don’t want to deny her food.’
She admitted that Maisy worried about her mother’s weight and would try unsuccessfully to get her to share portions of cake.
Earlier this year, blood tests revealed Miss Jones had dangerously low potassium levels – a condition known as hypokalemia, which causes extreme muscle weakness. She now has her potassium levels and heart rate monitored at regular check-ups.
Doctors have warned her she is at risk of a fatal heart attack if she does not put on weight.
| 2024-06-18T01:26:58.646260 | https://example.com/article/3811 |
The Pet Gear, Inc. Car Seat/Carrier easily attaches with the car seat belt to keep your carrier secure in the seat and your pet safe. The carrier has carry handles to facilitate transportation, top and front zippered doors for easy accessibility, fleece pad, interior tether, and rear pouches for small storage. Features: Carrier and car seat all in one Front and top zippered mesh windows Fleece pad
Luxe Performance is the epitome of form and function - hitting the mark with an enduring fit and luxe feel. New advanced technology weaves a unique blend of high-stretch fibers to create this complete recovery fabric. This means your jeans retain the exact shape and feel, no matter how long or frequently they are worn. The inside of each jean has a cashmere-like feel achieved through an exclusive
Genetically engineered dinosaurs run amok at a tycoon's island amusement park. Based on Michael Crichton's novel Special Features The Making Of Jurassic Park Early Pre Production Meetings Location Scoutings Phil Tippet Animatics Raptors In The Kitchen Foley Artists
\Let your pet use your screen door without you there to open it. The Pet Passage allows you to keep your screen door closed yet lets your pet enter or exit as they please. With a lock and the auto closing feature, this pet door is the ideal choice for screen doors.\
Includes over 100 knots that are proven to be reliable, safe and effective when tied and used correctly Features easy-to-follow step-by-step instructions for tying each knot Presented in a logical and easily accessible format, with
Pet Gear No-Zip Pet Stroller Emerald Easy locking no zip entry means no hassle when trying to open and close the stroller. Elevated paw rest so your pet can easily look out of the stroller by using the front bar for support. Panoramic view window, top window with viewing area and easy one-hand fold mechanism. 600 denier water-resistant material, interior tether, reversible fleece liner. Rear
The light floral scent of infuriatingly discreet good taste guaranteed. A discreet but not too sweet mlange of fresh florals that floats through the air like a whiff of wellbrewed tea.Notes Mimosa, lemon, chamomile, paperwhite, rose, musk, ebonywood, vanilla
This alluring design is perfect to dress up or down. The smooth stainless steel links come together stylishly, featuring a silver rectangular dial and DKNY logo. It would make the perfect gift for someone special in your life.
DESCRIPTION Enjoy the winter - and ignore the rain and cold. The PARK AVENUE JACKET is a functional winter jacket with a classic style. Our proven TEXAPORE fabric technology provides the protection you need in the rain and snow. TEXAPORE is full ....
This luxury pet carrier comes in a classic, country green quilted fabric and features a detachable water bowl and integral collar clip. The interior is lined with check print fabric and has a soft, removable cushion. The base is solid to keep it stable as you carry your pet and it has both wide, webbing carry handles and a removable shoulder strap, so you can choose the comfiest travelling
Ideal for medium to large sized cats, this RAC pet carrier is a safe way of transporting your pet. Durable and lightweight, it also features a carry handle making transportation easy. The door has been designed to open both ways, for your convenience and to allow your pet to get in and out easily. Suitable for medium to large sized cat Metal mesh Carry handle Door that opens both ways H38,
Welcome to the Littlest Pet Shop skate park! Its a great day for this blue-eyed bulldog and alley cat to get some air on the ramps or grind the rails. This is the best place for kids to pretend the pets ollie over obstacles and spend the day skating together! A whole playset of activities, accessories and stickers add to the storytelling fun. Kids can bring their pets to life in the LPS
When taking your pet to the vet or on journeys it is important that it feels at ease. This Foldable Pet Carrier does just that and it looks good too. The rectangular shaped bag is made from soft waterproof nylon. It is easy-to-clean and can be wiped down with a damp cloth. The integrated plush cushion turns it into a snuggly little den. Your pet can go in and out through a nylon mesh door at the | 2024-07-03T01:26:58.646260 | https://example.com/article/8119 |
Neurodiversity
Neurodiversity is an approach to disability and learning which would indicate that different neurological conditions appear from normal variations of human genomes. The terminology neurodiversity began being used in the extremely late 1990s as a challenge to the current views of neurological diversity and focus as being inherently pathological. Furthermore, the term would assert that neurological difference should be recognized and represented as a social category along with gender, human race, sexual orientations and disability status. Examples of these differences include (although are not limited to) autism spectrum conditions, Tourette syndrome, dyslexia and more. | 2023-09-30T01:26:58.646260 | https://example.com/article/2372 |
The United States is in the middle of a traditionally weak period for natural gas demand, and production is booming, yet prices for the fossil fuel are rocketing to the highest level since January.
What gives?
The country is heading into the winter with natural gas stockpiles at their lowest in at least a decade, according to the commodities research group at Barclays. At the same time, power plants are grappling with a hotter-than-usual autumn that is keeping air conditioners running. Add a series of nuclear power plant outages to the mix, and you've got a recipe for a rally.
Natural gas prices are up about 12 percent over the last month to roughly $3.16 per million British thermal unit. On Wednesday, they hit a more-than-seven-month high, at $3.26 per mmBtu.
Prices backed down 2 percent on Thursday after government data showed a weekly increase of 98 billion cubic feet in U.S. natural gas stockpiles. However, prices are still near their highest since the dead of last winter.
Barclays expects prices to ease, but the bank warns that heading into the winter with so little gas in storage leaves the market susceptible to price spikes.
"If winter weather comes in mild, then this current storage shortfall is a speed bump on the way to a looser market in 2019. If cold weather comes to fruition, though, the tenor of the 2019 outlook is fundamentally changed and the market will spend a good portion of next year just digging out of the storage deficit," Michael Cohen, head of energy markets research at Barclays, wrote in a research note on Thursday.
The bank's weather outlook calls for natural gas prices to average $2.99 per mmBtu this winter, but if temperatures are 10 percent colder than anticipated, that estimate shoots up to $3.65 per mmBtu.
Barclay's view that natural gas prices will moderate speaks to the roots of the rally. While low stockpiles provide a bearish backdrop, it's largely the unseasonably warm weather and unplanned nuclear power outages that are to blame.
Cooling degree days, or days that were warm enough to require air-conditioning, were 20 percent higher in September than the 10-year average, according to Barclays. Meanwhile, Hurricane Florence forced power plants in the Carolinas region to shut down as much as 17 gigawatts of nuclear power, or about 10 gigawatts more than usual over the last four years. | 2024-05-01T01:26:58.646260 | https://example.com/article/5189 |
[Neonatal death following injuries in utero, in the absence of maternal lesions].
The authors report a case of neonatal death at 24 hours following maternal trauma during a traffic accident. The abdominal trauma did not result in any maternal injury. Caesarean delivery was justified by fetal rhythm disorders. A wide variety of fetal injuries, in the absence of maternal injuries, are reported in the literature. Some benefit from an early diagnosis, improving therefore the fetal prognosis. | 2024-02-20T01:26:58.646260 | https://example.com/article/2058 |
Will Jesus Christ return invisibly, to secretly "rapture"
or take away the Church to heaven BEFORE the coming great
tribulation?
A common idea today among fundamentalists is that Christ
may return invisibly, secretly, "at any moment" to "rapture" or
"catch away" the Church before the great tribulation and the
appearance of a superhuman "Antichrist." This secret return
of Christ they call "the first phase" of Christ's second coming.
Jesus, we are asked to believe, may suddenly descend from
heaven this very night! But He will stop in mid-air.
Immediately, the righteous dead will be raised and all true
Christians who are alive will be "translated." Then Christ
returns to heaven-- some say for 31/2 year-- others say
for seven (7) years.
During this period, according to this teaching, God will vent
His wrath upon the world by permitting an Antichrist to deceive
the nations and torture all who won't submit to Him. This time
of torture they call indiscriminately the "tribulation" and "Day
of the Lord."
Then, they say, the "second phase” of Christ's coming will
occur. Jesus will come visibly, in power and glory, with the
saints, to conquer Antichrist.
But is this what the Bible really teaches? Are there "two phases"
to the second coming of Jesus Christ? Will He return secretly? Why
is the word "rapture" not mentioned once in the entire Bible if this
theory is true? Isn’t it time you learned the truth?
Jesus Christ has given us a time sequence of events soon to occur.
This sequence you will find in Matthew 24, Mark 13 and Luke 21.
These three chapters contain the order of events at the close of this
age of man's rule. Notice what Jesus told His disciples.
Following false teachers proclaiming a false gospel, yet coming
in the name of Christ, would be wars, famines and pestilences,
occurring in that order. Then there would be what? The
secret return of Christ to take away the Church in a secret rapture
immediately before the tribulation? No! Just the opposite! Here are
Jesus' own words: (Matt. 24:6-9) "And ye shall hear of wars and
rumors of wars: see that ye be not troubled: for all these things must
come to pass, but the end is not yet. For nation shall rise against
nation, and kingdom against kingdom: and there shall be famines,
and pestilences, and earthquakes, in divers places. All these are the
beginning of sorrows. Then shall they deliver you up to be afflicted,
and shall kill you: and ye shall be hated of all nations for My names'
sake."
Did you notice that? Jesus' own disciples, those who follow Him,
"YOU”, are to be delivered up to tribulation! The disciples of
Jesus could not be in tribulation if they were secretly raptured to
heaven before the tribulation and if only unbelievers remained on
earth. Besides, Jesus said that it is "for His name's sake" that the
nations would hate you. This obviously must be referring to
believers, not nonbelievers.
Mark records the same statement of Jesus: "And ye shall be hated
of all for my name's sake" (Mark 13:13). A martyrdom of Christians!
Luke records the same (Luke 21:12, 17).
Is the tribulation the time of God's wrath? This is another great
mistake that all who believe in the rapture theory have carelessly
taken for granted without proof. Some believe that the "tribulation"
and the "Day of the Lord" represent the same period of time.
The Bible reveals that the tribulation is the wrath of Satan, the
wicked spirit ruler of this present age. You can read of that in
Revelation the 12th chapter.
Notice! The devil is angry. He is responsible for the persecution of
the Christians. Satan hates God's way. So does this world. It is
Satan's world. Little wonder that it hates the good news of the
Kingdom of God.
What did Jesus say would immediately happen after Satan's
wrath, the tribulation? The rapturists would have you believe that
the "second phase" of Jesus' return would immediately occur. This
is not what Jesus said. Notice: "Immediately after the tribulation of
those days shall the sun be darkened, and the moon shall not give her
light, and the stars shall fall from heaven, and the powers of the
heavens shall be shaken" (Matt. 24:29).
Now turn to (Joel 2:31) "The sun shall be turned into darkness, and
the moon into blood BEFORE the great and terrible day of the Lord
comes." The "day of the Lord" is the time God steps in to world af-
fairs directly. It is the time of His wrath against the nations!
Read I Thessalonians 5:2. This is not speaking of the rapture, but
of the time of God’s intervention in world affairs very shortly before
Jesus returns.
Compare this with Revelation 6:12-13, 16-17: "The sun
became black as sackcloth of hair, and the whole moon became as
blood; and the stars of the heaven fell to earth, And they said
to the mountains and to the rocks, 'Fall upon us, and hide us from
the face of the one sitting on the throne, and from the wrath of the
Lamb: because the great day of their wrath is come; and who can
stand? “This day of God's wrath comes unexpectedly, like a thief
in the night. The tribulation, however, occurs before the "day of the
Lord's wrath"!
Notice that during this "day of the Lord" the trumpets begin to
sound (Rev. 8:6). "And the seven angels that had the seven trumps
{ trumpets } prepared themselves to sound." Trumpets are a symbol
of war. This is the time when God's restraint over the nations is
loosed, when the nations war upon one another with horrifying new
weapons till they learn that God alone can bring peace and that His
Laws make life worth living.
Notice, now, an amazing fact which very few have grasped!
What happens when the seventh and last of these trumpets is sounded?
"And the seventh angel sounded; and the great voices in heaven came
saying, 'The Kingdom of the world is become our Lord's and His
Christ's, and He shall reign unto the ages of ages,. We thank
thee, Lord God, the Almighty, who is and who was, because thou hast
taken thy great power, and hast reigned. And the nations were wroth,
and thy wrath is come, and the time of the dead, that they should be
judged, and that thou shouldst give reward unto thy servants the pro-
phets, and to the saints, and them that fear thy name, small and great:
and shouldst destroy them which destroy the earth' " (Rev. 11:15,
17-18).
Notice that this is the time for the prophets to receive their reward.
It is the time of the resurrection! And this, remember, occurs at the
seventh or last trump!
Now compare this with ( I Cor. 15: 51-52 ) " Lo, I tell you a
mystery: We shall not all sleep, but we shall be changed, in a
moment, in the twinkling of an eye, at the last trump: for the trumpet"
the seventh and last trumpet ... "shall sound, and the dead" ...
and that includes the prophets ( Rev. 11:18) ... "shall be raised
incorruptible, and we shall be changed."
Do you grasp the significance of this scripture? After the
tribulation, after the intervening heavenly signs, during the DAY of
the Lord,
at the sounding of the seventh trump the dead are
resurrected and those alive, who believe and practice the truth,
are changed from mortal to
immortal.
There is no secret rapture before the tribulation. The dead are not
resurrected twice! Those who are still living are not changed to
immortality twice! There is not the slightest indication of a "Secret
Rapture" and a resurrection of the saints before the tribulation.
But this is not all! Now open your Bible to ( Matt. 24:30) "And then
after the heavenly signs which follow the tribulation, (not before), but
after the tribulation and during the Day of the Lord, "Then shall all
the tribes of the earth mourn, and shall see the Son of Man coming in
the clouds of the heaven with power and great glory. And He shall send
forth His angels with a great trumpet, and they shall gather together His
elect from the four winds, from one end of heaven to the other."
This verse pictures the second coming of Christ, at the seventh
and last trump, the great trump. And it is the time of the resurrection!
The ELECT are gathered together. Who are the "elect" or chosen ones?
Luke 18:7 tell us: "And shall not God avenge His elect, that cry to
Him day and night?" Any concordance will provide you with scriptures
(I Peter 1:1-2; Col. 3:12; Rom. 8:33, etc.) proving that true Christians
are the ELECT. These are the ones to be gathered
when Jesus returns with the sound of a great trump!
Paul also mentions the same tremendous noise of the 7th trumpet
that will rend the air at Christ's return. "For the Lord himself shall
descend from heaven with a shout, with an archangel's voice, and with
the trump of God: AND THE DEAD IN Christ shall rise first; then we
that are alive, that are left, shall together with them be caught up in the
clouds to meet the Lord in the air" ( IThes 4:16-17).
Did you notice that this is the time of the resurrection? It is the time
of the LAST TRUMP, according to I Cor. 15:52. Again, in Revelation
11:15, 17-18 the seventh or last trumpet is also the time of the resur-
rection. And the time order of Jesus' Mount Olivet prophecy and of the
book of Revelation places the sounding of the 7th trumpet and the
resurrection after the tribulation, at the very climax of the "day of the
Lord"! These verses describe the same trumpet, not different ones.
There is no possible room for a "secret rapture."
One famous text used to contradict these plain passages of scripture
is the 14th verse of I Thessalonians 4, "For if we believe that Jesus
died and rose, even so them also that are fallen asleep"…. the dead
are asleep in their grave, not awake in heaven-- according to Paul,
“will God through Jesus bring with Him." This verse is supposed to
teach that 31/2 or 7 years before Christ returns a "secret rapture"
occurs; the dead are secretly taken to heaven and now they return with
Jesus from heaven.
But is this what the scripture says? How is Jesus going to bring
those who are asleep in death with Him? Notice: "For this we say to
you by the word of the Lord, that we that are alive, that are left unto
the presence (or coming) of the Lord, shall in no wise precede the
them that are fallen asleep. For the Lord Himself shall descend from
heaven." With the saints? NO! "... And the dead in Christ
shall rise first" (verses 15-16).
Notice, that Jesus, with the angels from heaven, descends toward
the earth, not with the saints, but in order to resurrect the saints!
"The Lord shall descend... and the dead shall rise"!
After Jesus descends toward earth the dead rise first! They meet
Christ in the air. Now the dead are with Christ in the air, the
atmosphere surrounding this earth. "Then we that are alive and
remain shall together with them be caught up in the clouds"
(verse 17). We, too, shall be together in the air with those who have
just been raised, those whom Jesus is bringing with Him to this
earth. Notice that being "caught up"..... Paul does not say "raptured
up" .... occurs after the tribulation, at the last trump when Jesus
descends visibly in power and glory.
How did Jesus leave this earth? "He was taken up, and a cloud
received Him out of their sight"... the disciples were looking at Him,
and while they looked steadfastly toward heaven as He went up, "Be-
hold, two men stood by them in white apparel; which also said, 'Ye
men of Galilee, why stand ye gazing up into heaven? This same
Jesus, which is taken up from you into heaven, shall so come in like
manner as ye have seen him go into heaven. Then they returned to
Jerusalem from the mount called Olivet" (Acts 1:9-12).
Were there two phases of Jesus' ascension? NO! Then there will not
be two phases to His return, He will come in the same manner in which
He left.
Notice the prophecy concerning the fulfillment of this very promise:
"Behold, the day of the Lord cometh ... His feet shall stand in that
day upon the mount of Olives" (Zech. 14: 1-4).
There is no secret rapture before the tribulation or at any other time!
The resurrection is at the mighty sound of the 7th trump in the day of
God's wrath which follows the tribulation. The tribulation is not the
Day of the Lord. There are two separate and distinct periods of time.
Christ does not return in two phases, one secret, the other visible.
He returns in the same manner as He ascended, and that was no
secret rapture! He ascended visible, He will descend visible.
Some, of course, seize on minor scriptures and misinterpret them
to attempt to prove their theory. Take Rev. 4:1-2, for example. This,
we are told, represents the rapture. But these two verses do not say that!
John saw the prophecy in the Book of Revelation unfolded in heaven
because that is where Jesus is, not because of a secret rapture!
One prominent writer attempts to prove that II Thessalonians
2:7-8 refers to the rapture. His theory is that this prophecy has not yet
begun to be fulfilled, that Christ must come first "to rapture the Church
before the tribulation."
But notice the first part of verse 7: "For the mystery of iniquity
doth already work"-- even in Paul's day! Notice the time sequence!
An apostasy shall have come first and the man of sin shall have been
revealed before the day of Christ.
Will you be deceived into believing the false doctrine of a rapture?
Will you go on blindly believing in the traditions of men and the
theories they have advanced without proof? Read your Bible! Check
carefully! "Prove all things (IThess. 5:21). Your very life is at stake!
Want to know more?
1.
Enroll in our correspondence course
2.
Sign up for our monthly DVD Sermon program
3.
Subscribe to our mailing list
They are all free, there are NO strings attached and we DO NOT solicit for money. | 2023-09-14T01:26:58.646260 | https://example.com/article/9252 |
Update from Horizen team hosted by:
Co-founder and Team Lead - Rob Viglione (@finpunk), Rolf Versluis (@blockops), Rosario Pabst (@zench1ck)
September 5, 2019, Weekly team updates from the following divisions:
* Engineering
* Node network
* Product/UX
* Customer service/Helpdesk
* Legal
* Business development
* Marketing
* CEO closing thoughts
* 5 mins Q&A
Horizen is an exciting cryptocurrency with a solid technological foundation, unique capabilities, an active and capable team, ongoing funding for improvements, and a large, positive, encouraging community.
ZEN is available and trading now on Bittrex, Binance, Changelly, and more, has wallets available that implement advanced private transaction and messaging capability and has a strong roadmap.
The goal of Horizen is to create a usable private cryptocurrency operating on a resilient system for people and businesses worldwide, enabling the daily use of private transactions, messaging, and publishing everywhere, all the time.
Store: https://store.horizen.global
Merchant Directory: https://horizen.global/merchants
Horizen Nodes: https://horizen.global/zennodes
Horizen Academy: https://academy.horizen.global/
Roadmap: https://goo.gl/eiyDx8
Reference:
Horizen Website – https://www.horizen.global
Horizen Blog – https://blog.zencash.com
Horizen Discord - https://discord.gg/SuaMBTb
Horizen Github – https://github.com/ZencashOfficial
Horizen Forum – https://forum.horizen.global/
Horizen Twitter – https://twitter.com/horizenglobal
Horizen Telegram – https://t.me/zencash
Horizen on Bitcointalk – https://goo.gl/5vicqP
Horizen YouTube Channel – https://www.youtube.com/c/Horizen/
Horizen Facebook Page – https://www.facebook.com/horizenglobal/
Horizen Blog on Medium – https://medium.com/zencash
Buy or Sell Horizen
Horizen on CoinMarketCap – https://goo.gl/4bKmRz | 2023-09-10T01:26:58.646260 | https://example.com/article/9394 |
KOLKATA: A young woman, employed with a top clothes brand as a salesgirl, was allegedly beaten up and molested outside the Salt Lake City Centre on Friday night when she was returning to her residence at night after work. The accused, said police, is known to the girl. Of late, she was being stalked and harassed by this youth after the victim refused to marry him. The Salt Lake police have registered a case of molestation and hurt and is further investigating the case.
The youth, who is presently absconding, is said to be a resident of Lake Town and is presently employed with a paints factory nearby. What though has shocked cops is the brazen manner in which hundreds of shoppers and passersby who was present near the City Centre gave the incident a complete miss and refused to intervene even as the woman was forfully dragged and punched by the accused.
According to the Bidhannagar commissionerate, the woman was in a relationship earlier with the accused after they met and stuck up a friendship about three years ago. However, sometime back, the victim distanced herself from the accused and refused the marriage proposal given by the accused on several occasions earlier. "On Friday night, as the woman finished her duty at the clothes showroom, she came out of the City Centre and came face to face with the accused," said an investigating officer.
The cops said that as soon as the girl refused marriage yet again, the accused began pulling her forcing her to follow him. As the victim managed to escape, the accused slapped the victim twice. Finally the accused even punched her. This led to a cut on the woman’s lips. Cops said that it was at this point that the accused fled the spot. "The victim, residing near tank 4, kept on shouting for help while the accused to drag her along with him. But no one even cared to call us at the spot," said a senior officer adding a patrol vehicle was stationed just metres away.
The victim said the youth worked with her at a shop earlier. "When I rejected his marriage proposal, he pounced upon me repeatedly hitting me. I was forced to leave my earlier job because he constantly harassed me," said the girl, adding the bystanders did not come to her rescue despite her screams.
A manhunt has now been launched to nab the accused. "We are raiding the accused’s hideouts at Lake Town and Dakshindari in order to nab him. We are looking in to CCTV footage to ascertain the exact movement of the accused and whether he was being accompanied by someone else. Besides this we are trying to arrange for the woman’s statement in front of a magistrate under CrPC 164. We hope to build a strong case against the accused," said a senior police officer. | 2024-03-26T01:26:58.646260 | https://example.com/article/1127 |
'Treme': Hard Heads and Soft Hearts in New Orleans
By Alyssa Rosenberg
><
HBO
David Simon's rich, complex shows have always been rewarding to watch alone, but they almost demand conversation, whether it's a debate over Baltimore's future or a reality check at a particularly audacious act of cruelty, style, or recklessness. His new show, an exploration of New Orleans' Treme neighborhood, premieres on HBO on Sunday at 10 p.m. And to start the inevitable discussion, Alyssa Rosenberg, Latoya Peterson, Matthew Yglesias, Anna John, Kay Stieger, and Rachael Brown will be talking Treme. First up: Alyssa on what makes Treme different from Simon's other shows.
David Simon, the reporter-turned television auteur, is a passionate man, though he's generally admired more for his dark heart than his bleeding one. Fans of his uncompromisingly tough efforts, like The Wire and Generation Kill may be somewhat surprised to learn that he got his start with a classic tear-jerker. There's something odd about classing this American Dickens, this relentless seer of the death of institutions, as a sentimentalist. But the first Homicide episode he wrote, the Season 2 premiere "Bop Gun," was a deliberately heart-tugging tragedy, starring Robin Williams as a Baltimore tourist who saw his wife shot in front of him during a mugging, and a very young Jake Gyllenhaal as his angry, grieving son.
So it seems appropriate that Treme, Simon's new show, is a valentine with a devious, violent heart. I say devious because after the first episode, I didn't quite know what to make of the show. And the second upset my understanding of what I'd seen entirely.
Treme meanders along with a group of loosely connected New Orleans natives and transplants. Creighton, a professor with a habit of getting angry in interviews and Toni, his wife, an aggressive lawyer who frequently sues the police, live on Octavia Street, the "Isle of Denial," as the sheriff puts it to her, not in an entirely unfriendly way. They are regulars at a restaurant run by Janette, whose ""kind of...not specifically or on a consistent basis" boyfriend, Davis, has just been bounced from his DJing job. Davis hangs out at some of the same clubs where Antoine Baptiste scrapes by on irregular gigs, using his trombone as collateral for cab rides he cannot pay for. Antione's ex-wife, Ladonna, struggles to get her roof repaired, and is relying on Toni to find her brother David, missing in the storm. And Antoine's gigs throw him into the occasional path of Delmond, a touring trumpet player who has returned home to help his father, Albert, chief of a tribe of Mardi Gras Indians and a skilled contractor, settle back in after a sojourn in Dallas.
The show is—as befits a David Simon production—profane, challenging, and frequently funny. But it also relies on a deep assumption of kindness between its main characters. In The Wire, such emotions were portents of doom: D'Angelo Barksdale, a young drug dealer, was marked for jail and worse the moment he showed signs of sensitivity. Homicide's detectives may wield gold shields, but they're still vulnerable to heartbreak, suicide, and violent death. Watching Treme, I found myself expecting Antoine to be turned down when he asked for a loan, an extension on paying cab fare, or help finding a gig, and intensely relieved when his friends amiably agreed to help him out.
As Albert tried to rally his old Indian tribe, I predicted that Robinette, a junk hauler and member of another tribe, would turn down Albert's offer to practice with him. I didn't anticipate him to have a change of heart when Albert showed up at his house in full regalia, late at night, the feathers of his uniform glowing gold and red. "That's real pretty chief. I wondered if I was ever going to see something like that again," Robinette admits wistfully, a rare emotion in the more recent Simon oeuvre. "There might not even be no carnival this year....Alright, I'll be around by the bar tomorrow afternoon."
Simon has, to a certain extent, conditioned his viewers to the sourness of disappointment and the rank taste of genuine human tragedy. And so I was suspicious when the premiere episode began as it ended, with music and a parade, with the intimation of Albert's saintliness, the implication that Toni is on the right track in the search for Ladonna's missing brother. By the second episode, however, Albert is vigorously washing his hands in a backyard faucet after delivering a brutal beating to a man who stole his carpenters' tools. His son has been arrested after a recording session with Elvis Costello. And Toni has found something ugly and expected at the end of that track.
Treme is a David Simon show after all, and has the potential to be a great one. But despite the signs of darkness in the second episode, the series' gorgeous camerawork, extended musical and dance sequences, lingering attention to food and drink suggest it may also be his show most exquisitely attached and attuned to the sentimental pleasures of life. Treme will be a show about hard heads, I think, but it's expansively about hearts. | 2023-12-31T01:26:58.646260 | https://example.com/article/5007 |
Kara's Blog
Thursday, May 22, 2014
Hello everyone! I just wanted to let everyone know that my scans in March came back clear! Next year I get to hear the elusive word "cure"! Can you believe it?! My little girl Skylar, is now 6 and beautiful! Im also ENGAGED! Im so excited and in love. Never give up hope. HERES TO HOPE!
Sunday, September 30, 2012
Well, it sure has been a while since I updated! Since my last update I finished 6 cycles of high dose methotrexate, and 6 intraocular injections. My scans have been clean since then. A few days ago on September 26, was my 5 year mark. Of course I havent been in remission five years, but I have been lucky that the cancer has responded each time it has been treated.
Tomorrow is my little Skylar's 5th birthday. Shes my reason for surviving all this mayhem I have been through for sure.
In October, I will be heading back to NYC for scans, and to have my cataract removed, and also have my pupil repaired from damage done by the intraocular injections. Hoping for clean scans, easy surgery and SIGHT back!
Im looking forward to the holidays, and the beginning of a new year. I hope Im done with cancer. But if Im not, Ill beat it back again. AND looking forward to a cruise to the caribbean in January with my little family!
Sunday, April 8, 2012
Just wanted to check in and let you know Im in the hospital waiting for my methotrexate levels to be low to go home.. this is the END OF TREATMENT IN THE HOSPITAL! Hopefully forever! I still have 1 eye treatment left, but that takes 5 minutes in the office. All in all, I have exceeded Dr. Os expectations and treatment has been a success (awaiting a confirmation biopsy, but from the looks of my eye, it looks great).
What happens now? Well, I really dont know yet. Dr. O is still pondering the possibilities on what to put me on next to prevent or be a preemptive strike since I have a high probability of relapse in my central nervous system because of the location. But, I have full confidence that he will pick the right choice for me and everything will be great.
So heres to going home tomorrow and hopefully never being inpatient again! :)
Thursday, February 16, 2012
Woohoo! on the home stretch! Im actually starting to look beyond this irritating treatment! My hair is also starting to get super thin, and Im wondering if Im going to be a baldy again after these 2 years of relentlessly growing my hair out. (ARGH)
Looks like Dr. O might want to try some additional CNS prophylaxis after treatment. Probably going to go back on SAHA/Niacinamide because it has shown in mice models to cross the blood brain, blood-retinal barrier and reduce cancer in the brain by 62% in one study I read.
Of course this is assuming all of my scans, biopsies, etc are in the clear after treatment 6. This will be uncharted territory and I hope this is my last encounter with this stupid disease. Its also up in the air if I will get radiation to my eye after treatment ends also.. I believe Dr. Marr and Dr. O'Connor will have to hook up and decide.
But from a eye stand-point he says I am responding beautifully to treatment directly in my eye with MTX/Rituxan. Still seeing floaters, but he says it takes a long time for those to eventually clear up because of lack of blood/lymph fluid circulation to the eye. (ironic huh) I may end up having to have a vitrectomy, where they suck out all of the fluid behind the eye and the aftermath of debris.
So I continue to be an enigma, a 1 in a million case, but it keeps the docs interested! Treatment is starting to make me tired, but its more irritating than anything.
Im nervous for all of the end of treatment scans, biopsies...and what the future holds. But make no mistakes Ill do whatever it takes! (Putting on superwoman cape)
Monday, February 6, 2012
Im just writing in because I havent updated in a while. Treatments 1-3 have been pretty uneventful (thankfully). Today is going to be jam packed because we are flying out today and I still havent received my ARA-C into my spinal area yet. So that will happen when the attending docs clinic hours are over which is after 12. Our flight leaves at 7:15pm tonight so everybody here knows we gotta go! My head is getting sore, which is usually a sign of impending hair loss... which I have lost a little bit, but just enough for me to notice. I know thats the least of my worries, but it feels better not looking the part. Since my dose was increased by 30% Im expecting some more fallout, but hopefully Ill only be the one to be noticing. Otherwise, Im watching the sun rise over the George Washington bridge over the Hudson river. Hopefully the docs will round here shortly and I can get unhooked from this stupid IV pole I trip over constantly.
In other news, I just wanted to ask everyone to say a prayer for a fellow cancer warrior Hillary St Pierre. She is in the final stages of liver failure and has only days left.. just pray for her peaceful passage to our heavenly father. She is a devoted catholic, and she knows where she is going :) Love her heart, she has done so much to lobby for affordable healthcare for cancer patients. If you'd like to read her blog it is http://baldiesblog.blogspot.com/ Check her out. She has some great articles.
But for now, Im going to see if I cant pack a few things up without waking up Chad. :)
Wednesday, January 11, 2012
So... Im at Columbia Hospital just hanging out waiting on my MTX to get started. Intraocular chemo was weird feeling, and made my eye pretty sore. No news really right now, just wanted to let everyone know I got here and am waiting for this party to get started.
Monday, December 19, 2011
It looks like Ill be going back to NYC for my week long visit on Jan 8th to Columbia/Presbyterian Hospital where my Dr. O is moving back to after a 3 year hiatus at NYU. I will also get my eye chemo right before I go in the hospital for high dose MTX with Leukovorin rescue, and intrathecal Ara C.. looks to be 6-8 doses.. so more treatment for the next 6-8 months to finish out the process, since we do it every 4 weeks. Its not looking like Im going to loose my hair, just maybe some thinning at most. I feel pretty good! Had a visit with my ONC here in town, and all my blood counts and liver enzymes were all stable. Yay! So, from now until Ive got to go back and put my boxing gloves back on Im going to eat, rest, and be merry. With my sweet Skylar pie!!!! | 2023-09-05T01:26:58.646260 | https://example.com/article/7659 |
using Xamarin.Forms;
using Xamarin.Forms.ControlGallery.GTK;
using Xamarin.Forms.Controls.Issues.Helpers;
using Xamarin.Forms.Platform.GTK;
[assembly: Dependency(typeof(SampleNativeControl))]
namespace Xamarin.Forms.ControlGallery.GTK
{
public class SampleNativeControl : ISampleNativeControl
{
public View View
{
get
{
return new Label { Text = "NativeViews not supported on GTK" };
}
}
}
} | 2024-06-07T01:26:58.646260 | https://example.com/article/5080 |
<?php
namespace Modules\Backend\Controllers;
class IndexController extends ControllerBase
{
public function indexAction()
{
}
}
| 2023-12-08T01:26:58.646260 | https://example.com/article/2783 |
Details of Tampa Bay Lightning and the Ticket Luck value
Tampa Bay LightningThe Tampa Bay LightningThe Tampa Bay Lightning (also referred to as the 'Bolts') are a professional ice hockey team from Tampa, Florida. They are members of the Southeast Division of the Eastern Conference of the National Hockey League (NHL).
Franchise HistoryThe Tampa Bay Lightning became part of the NHL in the late 1980s when the NHL decided to expand. Originally, two rival groups from the Tampa and St. Petersburg area made a bid for the NHL franchise. The St. Petersburg-based group was fronted by future Hartford Whalers/Carolina Hurricanes management Peter Karmanos and Jim Rutherford and the Tampa-based group was fronted by two Hall of Famers, Phil and Tony Esposito.
The St. Petersburg group appeared to be stronger as the Karmanos/Rutherford team was better financed while the Tampa group's American partners backed out just a few months before the bid. As a result, Esposito was forced to recruit a consortium of Japan businesses headed by golf course owner Kokusai Green. However, according to former NHL president Gil Stein, the tables turned when the St. Petersburg group refused to pay more than $29 million before starting play, while the Tampa group was ready to pay the full $50 million expansion fee. Eventually, the Tampa group won the franchise.
In their fourth season, 1995-96, with the help of star players, Bradley leading the team in scoring, second-year Alexander Selivanov scoring 31 goals, and Roman Hamrlik having an all-star year on defense, the Bolts finally qualified for the post-season playoffs, defeating the Stanley Cup Champions the New Jersey Devils for the 8th spot in the East. The Bolts lost their first-round series in six games to the Philadelphia Flyers, but the season was still highlighted by the huge crowd of 28,183 Lightning fans in the Thunderdome for the game against the Flyers, a record breaking number for any NHL game.
By the late 1990s, the Bolt's performance had severely deteriorated and owner Williams had stopped attending the team's games out of sheer disappointment. Williams had lost $20 million in the 1998-99 season alone which was far more than he had bargained for. Eventually, Williams sold the team for $115 million (at a $2 million loss) to Bill Davidson, owner of the Detroit Pistons who had previously bid for the team but lost to Williams. Davidson appointed Tom Wilson as president of the team who immediately fired the team's general manager Demers. He then brought in Rick Dudley, general manager for the Ottawa Senators, to take over the team and Vipers coach Steve Ludzik.
The 2006-07 SeasonBefore the start of the 2006-07 season, the Lightning traded players Fredrik Modin and Fredrik Norrena with the Columbus Blue Jackets in exchange for goaltender Marc Denis. Denis was brought in as a replacement for John Grahame, who left the team to sign with the Carolina Hurricanes. The first half of the 2006-07 NHL Season was shaky for the Lightning, with a record of 18-19-2 throughout the first few months. In January and February the team faired better with 9-4-0 in January, and 9-2-2 in February, getting them back on track for the playoff race. In March, star player, Vincent Lecavalier, broke the franchise record for the highest number of points in a season, with 95 points and finishing with 108. The record was previously held by Martin St. Louis, who had set the record in the 2003-04 Stanley Cup Championship year. In the same season, Lecavalier also broke the franchise's goal scoring record, finishing with a league-leading 52 goals.
In the final weeks before the NHL Trade Deadline, The Lightning acquired players Kyle Wanvig, Stephen Baby, and defenseman Shane O'Brien, while Nikita Alexeev was traded on the day of the deadline to the Chicago Blackhawks. Other new additions to the team during the season included Filip Kuba, Luke Richardson, and Doug Janik. Veteran Andre Roy, who had won the Stanley Cup with the Lightning in 2004, was claimed off waivers from the Pittsburgh Penguins.
They say that lightening never strikes twice in the same place. However, contrary to this popular belief, the Tampa Bay Lightning has been striking again and again in the in the past two decades. Encapsulated in an NHL ice hockey team, they are members of the Southeast Division of the leagues' Eastern Conference.
A bid for the NHL's expansion in the late eighties created the spark for the Tampa Bay Lightning to be created. Though the rival group Peter Karmanos and Jim Rutherford was better financed, the group fronted by brothers and Hall of Famers Phil and Tony Esposito roped in Kokusai Green, a wealthy Japanese businessman and clinched the Tampa franchise by forking the entire expansion fee of $ 50 million upfront.
Since their inception in 1992, Tampa Bay Lightning a.k.a. Bolts have drafted 190 players from 13 different countries. During each annual NHL draft that is held in June, with non-playoff teams getting first dibs on the prospects, the overall order is determined by the specific points garnered by each team in the previous season. The Bolts have had the first overall pick thrice in their relatively short 20 year history.
Tampa Bay Lightning have picked up one Stanley Cup and one Prince of Wales Trophy, with the constituent players bagging trophies and awards. Martin St. Louis, who is the team's current alternate captain, has clinched the Art Ross Trophy, Lester B. Pearson Award, Lady Byng Memorial Trophy and Hart Memorial Trophy.
So for some lightening on ice and all that's sliced, get your Tampa Bay Lightning tickets now.
Tampa Bay Lightning is a phenomenal pro ice hockey team from the city of Tampa within the state of Florida that has reigned supreme of the professional American ice hockey world. This team is part of the spending NHL, the National Hockey League, the greatest in all of America. Tampa Bay Lightning plays within the Southeast Division of the Eastern Conference within the NHL. This team was formed back in 1992 and has been playing fabulous ice hockey since then; its home base is the St. Pete Times Forum arena. The official team colors are white and blue; the team itself is owned by Tampa Bay Sports and Entertainment with its head coach being Guy Boucher and its captain, Vincent Lecavalier. Tampa Bay Lightning is also associated with two minor league teams, the Florida Everblades and the Norfolk Admirals.
Over the course of its short life in the world of pro ice hockey, Tampa Bay Lightning has managed to win a number of championships. Foremost amongst this is one amazing Stanley Cup championship, the so-called Super Bowl of ice hockey. This championship was bagged back in 2004. Aside from that, Tampa Bay Lightning has also won one Southeast Conference championship and not one but two Eastern Division championships. Thus, this spectacular pro ice hockey team has proven that it is the best in its division, in its conference and even in all of the NHL, after bagging a Stanley Cup. This team is usually lovingly referred to by the nickname, the Bolts, and it is a pro ice hockey team that should definitely be seen playing live matches, through Tampa Bay Lightning Tickets.
Frequently Asked Questions
A:Just browse TicketLuck and you will be just a few clicks away from buying cheap Tampa Bay Lightning Vs Vancouver Canucks tickets.
Q:I am looking at cheap tickets for tampa bay lightnings on your site and wondering are there any additional fees on the listed prices?
A:Yes, there are additional fees applied on the listed price of all purchases including Tampa Bay Lightning Tickets. However, our charges are way lower than other ticket-selling networks. Please navigate to the check-out page where cost details are given.
Q:What if I don't get my cheap price ticket lightning on time?
A:Please call us on or toll free number with complete order details if you don't get your Tampa Bay Lightning Tickets at least a week before the event and we will make sure you don't miss out on the occasion.
Q:Please suggest some tampa bay tickets with better views from seats at the venue. Thanks!
A:Sure! While choosing Tamoa Bay Lightning tickets make sure to check out our venue map that will give you a nice idea about seating or contact our Livehelp Reps for their recommendation.
Q:Can you share you special offers for lightning tickets with me?
A:You can get cheap tickets from us through out the year and you can also get a promo code from our live operator, all of this together can get you very cheap Tampa Bay Lightning tickets.
Q:How much will i save with discount codes for tampa bay lighting tickets?
A:Kindly insert our discount code for Tampa Bay Lightning Tickets in the discount code box while checking out and you will be shown the discount amount at the top of the checkout page.
Q:Hi, I lost my tickets i recently purchased, so again, can i get the same discount tampa bay lightning tickets
A:We regretfully state that once you receive youre Tampa Bay Lightning tickets, theyre entirely your responsibility, and that we dont offer any refund or anything, upon loss. Thanks!
Q:Are the prices for the tickets tampa bay lighting negotiable?
A:The ticket prices on our website are not negotiable. However, you can use one of our exclusive discount codes to get an instant and a decent discount on your tickets. | 2024-07-26T01:26:58.646260 | https://example.com/article/1161 |
Q:
How to summarize the multiplication of two columns per each row
Hello this is my SQL query that multiplies values x and y according to conditions but only for one row.
SELECT x * y FROM bedrooms As TotalCapacity WHERE event=@event AND year=@year
May I know how it should be improved to go row by row?
Thank you for your time.
Edit: Lets say that for this query are 4 rows in result. Each row has X and Y value so I need to do X*Y for row 1 + X*Y for row 2 + X*Y for row 3..
Sorry for not being clear at the very first moment.
First bedroom X(2) Y(10) = 20
Second bedroom X(3) Y(5) = 15
Desired result = 35
A:
You just need
SELECT SUM(x * y) AS TotalCapacity
FROM bedrooms
| 2024-07-09T01:26:58.646260 | https://example.com/article/4550 |
Boats and other vessels that travel on water may occasionally dock at a quay or other docking platform to load or unload cargo and/or passengers. When a vessel is berthing against another vessel or object, a marine fender may be used to prevent the boat or vessel from rubbing against the other object. By using a marine fender, the vessel may avoid damage that would be caused by constant rubbing or bumping into the quay or other object. Some marine fenders are fixed to a vessel or other object. Some marine fenders are removable. Removable marine fenders may be deployed when a vessel is approaching a berthing to avoid damage as described above. The removable marine fenders may be suspended from the side of the vessel using a rope. As used herein, the term rope includes any type of line used to suspend an object from or secure an object to a boat or other vessel. | 2024-04-17T01:26:58.646260 | https://example.com/article/8686 |
For indispensable reporting on the coronavirus crisis, the election, and more, subscribe to the Mother Jones Daily newsletter.
On Tuesday morning, the Senate intelligence committee released an executive summary of its years-long investigation into the CIA’s detention and interrogation program. President George W. Bush authorized the so-called “enhanced interrogation” program after the 9/11 attacks. The United States government this week has warned personnel in facilities abroad, including US embassies, to be ready in case protests erupt in response.
The full report includes over 6,000 pages and 35,000 footnotes. You can read the executive summary here. Here are some of the lowlights:
1. The CIA used previously unreported tactics, including “rectal feeding” of detainees (p. 100, footnote 584):
2. CIA officers threatened the children of detainees (p. 4):
3. Over 20 percent of CIA detainees were “wrongfully held.” One was an “intellectually challenged” man who was held so the CIA could get leverage over his family (p. 12):
4. One detainee, Abu Hudhaifa, was subjected to “ice water baths” and “66 hours of standing sleep deprivation” before being released because the CIA realized it probably had the wrong man (p. 16, footnote 32):
5. The CIA, contrary to what it told Congress, began torturing detainees before even determining whether they would cooperate (p. 104):
6. CIA officers began torturing Khalid Sheikh Mohammed “a few minutes” after beginning to question him (p. 108):
7. The CIA planned to detain KSM incommunicado for the rest of his life, without charge or trial (p. 9):
8. During waterboarding sessions, KSM made up a story that Al Qaeda was trying to recruit African-American Muslims…in Montana (p. 118):
9. In 2003, Bush gave a speech at a UN event condemning torture and calling on other nations to investigate and prosecute torture allegations. The statement was so at odds with US practices that the CIA contacted the White House to make sure enhanced interrogation techniques were still okay (pp. 209-210):
10. The CIA torturers told CIA leadership that torture wasn’t producing good information from KSM. But CIA leaders didn’t relay that information to Congress (p. 212):
11. A detainee was tortured for not addressing an interrogator as “sir”—and for complaining about a stomach ache (p. 106):
12. CIA officers cried when they witnessed the waterboarding of Abu Zubaydah (p. 44):
13. Within weeks of his arrival in CIA custody, Zubaydah was “on life support and unable to speak” (p. 30):
14. Bush Justice Department official Jay Bybee, who is now a federal judge, told Congress the torture of Al Qaeda detainees led to the US capture of Jose Padilla. That wasn’t true (p. 207):
15. The secretary of state wasn’t informed when the CIA made secret deals to open detention facilities abroad (p. 123):
16. Even President George W. Bush wasn’t informed where the facilities were—because he feared he’d “accidentally disclose” the information (p. 124): | 2023-09-24T01:26:58.646260 | https://example.com/article/3529 |
Getty Images
Rams coach Sean McVay quickly has taken the NFL by storm, getting a job at the age of 30 and winning coach of the year in his first season. His father didn’t expect any of it to happen.
In a profile of Sean McVay debuting this week on HBO’s Real Sports with Bryant Gumbel, Tim McVay recalls the discussions the preceded his son being hired by the Rams in early 2017.
“He says, ‘I think I’m gonna get an opportunity to interview for some of the open positions.’ And I said, ‘That would be fantastic,'” Tim McVay says.
“Did you think he had a chance?” Gumbel replies.
“Well, I don’t know if I should tell you this,” Tim McVay explains, “but he says, ‘I don’t think you understand, Dad. If I get an interview I’m gonna get one of these jobs.’ I said, ‘I’m all for you man.’ And then I hang up and my wife says, ‘Can he get one of those jobs this soon?’ And I said, ‘Nah.'”
In hindsight, Tim McVay should have known better. Because Tim McVay has always known that his son has the brain power to pull it off.
“I used to kind of rib him saying, ‘You know, you’re so smart,'” Tim McVay said. “You know so many things about sports and stuff. You ought to know some more stuff about other stuff.'”
“Does he?” Gumbel said.
“Not really.”
Sean McVay doesn’t really need to worry about knowing some more stuff about other stuff. He’ll be using his football knowledge for as long as he wants, and whenever he’s done he’ll have more than enough money in the bank to last for however long he lives. | 2024-06-04T01:26:58.646260 | https://example.com/article/5585 |
Q:
how can one recognize inputs from multiple keys simultaneously in c (linux)
I am trying to create ping pong in C using ncurses, and I have right now a huge setback because I can't figure out how I can allow two players to move the pads simultaneously. What I've tried is creating a seperate thread which would then use select to detect any buffered key presses and then put that into an array containing my controls. However, it only reads the first key and doesn't recognize the other.
#include <stdlib.h>
#include <stdio.h>
#include <sys/select.h>
#include <sys/time.h>
#include <sys/types.h>
#include <unistd.h>
#include <string.h>
#include <ncurses.h>
#include <pthread.h>
#include <errno.h>
#define DELAY 30000
#define P1_UP 0
#define P1_DOWN 1
#define P2_UP 2
#define P2_DOWN 3
struct player {
int x;
int y;
int score;
};
void *_thread_func(void *);
int main(int argc, char **argv) {
struct player p[2];
int x, y, max_y, max_x;
int *keys;
pthread_t _thread;
keys = calloc(4, sizeof(int));
if(pthread_create(&_thread, NULL, _thread_func, &keys) != 0) {
perror("pthread_create");
exit(EXIT_FAILURE);
}
initscr();
noecho();
curs_set(FALSE);
getmaxyx(stdscr, max_y, max_x);
p[0].score = p[1].score = 0;
p[0].y = p[1].y = max_y/2-3; // length of pad is 6
p[0].x = 0; // width of pad is 1
p[1].x = max_x-1;
while(1) {
getmaxyx(stdscr, max_y, max_x);
clear();
mvprintw(p[0].y , p[0].x , "|");
mvprintw(p[0].y+1, p[0].x , "|");
mvprintw(p[0].y+2, p[0].x , "|");
mvprintw(p[0].y+3, p[0].x , "|");
mvprintw(p[0].y+4, p[0].x , "|");
mvprintw(p[0].y+5, p[0].x , "|");
mvprintw(p[1].y , p[1].x , "|");
mvprintw(p[1].y+1, p[1].x , "|");
mvprintw(p[1].y+2, p[1].x , "|");
mvprintw(p[1].y+3, p[1].x , "|");
mvprintw(p[1].y+4, p[1].x , "|");
mvprintw(p[1].y+5, p[1].x , "|");
refresh();
usleep(DELAY);
if(keys[P2_UP]) {
keys[P2_UP] = 0;
if(--p[1].y < 0) p[1].y++;
}
if(keys[P2_DOWN]) {
keys[P2_DOWN] = 0;
if(++p[1].y >= max_y-5) p[1].y--;
}
if(keys[P1_UP]) {
keys[P1_UP] = 0;
if(--p[0].y < 0) p[0].y++;
}
if(keys[P1_DOWN]) {
keys[P1_DOWN] = 0;
if(++p[0].y >= max_y-5) p[0].y--;
}
}
free(keys);
endwin();
}
void *_thread_func(void *arg) {
fd_set readfds;
int num_readable;
int num_bytes;
struct timeval tv;
int **keys;
char buf[1];
int fd_stdin;
keys = (int**) arg;
fd_stdin = fileno(stdin);
while(1) {
FD_ZERO(&readfds);
FD_SET(fileno(stdin), &readfds);
tv.tv_sec = 0;
tv.tv_usec = 0;
fflush(stdout);
num_readable = select(fd_stdin + 1, &readfds, NULL, NULL, &tv);
if (num_readable == -1) {
fprintf(stderr, "\nError in select : %s\n", strerror(errno));
exit(1);
}
if (num_readable > 0) {
num_bytes = read(fd_stdin, buf, 1);
if (num_bytes < 0) {
fprintf(stderr, "\nError on read : %s\n", strerror(errno));
exit(1);
}
switch(buf[0]) {
case 105: /* i -> ascii 105*/
(*keys)[P2_UP] = 1;
break;
case 107: /* k -> ascii 107*/
(*keys)[P2_DOWN] = 1;
break;
case 119: /* w -> ascii 119*/
(*keys)[P1_UP] = 1;
break;
case 115: /* s -> ascii 115*/
(*keys)[P1_DOWN] = 1;
break;
}
}
}
return NULL;
}
How can I in C recognize more than one keys down at the same time? Any example on how this can be done would be greatly appreciated :)
A:
In Linux, you can change the keyboard mode using ioctl(fd, KDSKBMODE, mode) where mode is one of K_RAW, K_XLATE, K_MEDIUMRAW or K_UNICODE. If you set it to K_RAW, then you will receive raw scancodes; most keys send one scan code when pressed and another scancode when released.
In this mode, it's up to you to keep track of which keys are pressed and which ones are not pressed.
The precise scancodes sent by individual keys may vary a bit from keyboard to keyboard. You can use showkeys -s to experiment (but I recommend doing this from console mode, rather than through the X graphical interface).
You'll need special privileges to change the keyboard mode, by the way.
Also, make sure that you restore the keyboard mode to what it was before you changed it -- even if your program crashes. Otherwise, you may render your console unusable, and you'll be forced to reboot (or ssh into your machine from another machine on your network, if you've enabled sshd and have another machine on your network.)
See man console_ioctl for more information.
There will be similar features on other operating systems. Look around in the ioctl documentation.
| 2024-04-02T01:26:58.646260 | https://example.com/article/7512 |
Q:
C# event listener using lock() still throws exceptions
im making an xna game, the problem involves the following classes:
Game class - this class listens to the event listeners of the two classes below
Player class - this class launches a Fire() event, telling the game that the player fires a bullet
Bullet class - this class launches a SelfDestruct() event(after a certain traveled distance), telling the game that the instance has to be removed
The game class has a list of bullets, in the update method it does a foreach on this list
The event listener for Fire() adds a new bullet to the bullet list
The event listener for SelfDestruct() removes the sender from the list(by casting to bullet)
both events, as well as the update method locks the list for thread safety.
but it still throws an exception, telling that the list was modified during the foreach.
how do i solve this; since i do lock on the list.. but that doesnt work:
Update:
public void Update(GameTime gameTime)
{
player.Update(GameTime gameTime);//can throw fire event
lock(Bullets)//Lock the list for thread safett
{
foreach(Bullet b in Bullets)//Throws exception when bullet is added/removed
b.Update(gameTime);//can throw selfdestruct event
}
}
Fire listener:
void listen_fire(object sender, EventArgs e)
{
Player p = (Player)sender;/used to get coordinates and rotation stored in the player
lock(Bullets)
{
Bullets.Add(new Bullet(p.Position,p.Rotation));
}
}
Self destruct listener:
void listen_selfdestruct(object sender, EventArgs e)
{
lock(Bullets)
{
Bullets.Remove((Bullet)sender);
}
}
I figured that this solution may fail because the event is thrown inside a thread that has the list locked by itself already
any solutions are welcome, thanks for reading my question
A:
The collection used in foreach is immutable. This is very much by design.
As it says on MSDN:
The foreach statement is used to
iterate through the collection to get
the information that you want, but can
not be used to add or remove items
from the source collection to avoid
unpredictable side effects. If you
need to add or remove items from the
source collection, use a for loop.
for example this code will throw exception:
List<string> lst = new List<string>();
lst.Add("aaa");
lst.Add("bbb");
foreach (string curr in lst)
{
if (curr.Equals("aaa"))
{
lst.Remove(curr);
}
}
so i do this so i won't remove from the list while iterating on it:
List<string> lst = new List<string>();
lst.Add("aaa");
lst.Add("bbb");
List<string> lstToDel = new List<string>();
foreach (string curr in lst)
{
if (curr.Equals("aaa"))
{
lstToDel.Add(curr);
}
}
foreach (string currToDel in lstToDel)
{
lst.Remove(currToDel);
}
now i don't know what items are in your Bullets but you can't update or remove them while in foreach statement
| 2024-03-03T01:26:58.646260 | https://example.com/article/6356 |
Assessment of obesity-related comorbidities: a novel scheme for evaluating bariatric surgical patients.
Bariatric surgery serves as the superior means of achieving sustained weight loss and improvement in obesity-related comorbidities. Results of bariatric surgery have been reported qualitatively without standardized measurement of comorbidity response. The objective of this work was to develop a clinically based, standardized system for scaled assessment of the major comorbidities of obesity in patients undergoing bariatric surgery. We constructed a standardized grading scheme for the major comorbidities of obesity, with each condition scored from 0 to 5, according to severity. Data were prospectively collected on 226 patients. Ninety patients have already undergone gastric bypass and are being followed at regular intervals postoperatively. Longest current followup interval is 1 year. Preoperative evaluation of comorbidities identified a total of 1,356 medical disorders. Anatomic comorbidities were most prevalent as a category, although psychosocial impairment was the most common single condition. The majority of comorbidities in our patient population were graded mild (score of 1) to moderate (score of 3). Immediate (2 weeks) followup was available for all operated patients and ranged in number to 1 year postoperatively, depending on the date of operation. Statistically significant reduction in the severity of several comorbidities was observed at postoperative evaluation (p < 0.05). This scheme for assessment of obesity-related comorbidities facilitates evaluation of bariatric surgical patients. The system allows standardized preoperative characterization of a bariatric patient population and uniform postoperative longitudinal assessment of changes in comorbidities after weight reduction operation. | 2023-11-03T01:26:58.646260 | https://example.com/article/4450 |
Against Port Expansion in the Fraser Estuary BC
APE (Against Port Expansion in the Fraser Estuary BC) is a group of concerned citizens who recognize that plans for container terminal expansion on Roberts Bank (T2) will see the degradation of the quality of life for thousands of Lower Mainland residents; the industrialization of prime agricultural land; and the loss of globally-significant habitat for salmon, migrating birds and orca whales.
Port Metro Vancouver - Stop Ignoring the Science Surrounding Shorebird Feeding on Roberts Bank, According to a New Study
The latest scientific paper on biofilm feeding by shorebirds on Roberts Bank, jointly-authored by a team from Simon Fraser University and Environment Canada, has just been released in the January 2015 edition of the “Estuarine, Coastal and Shelf Science Journal” – an international multidisciplinary journal.
This new and important research clearly demonstrates – once again – the critical importance of Roberts Bank in supporting internationally significant populations of migratory shorebirds and Western Sandpipers in particular.
Key points in the paper include:
Western sandpipers and dunlin follow ebbing tides while foraging on stopovers.
Tide following foraging behaviour is stronger for dunlin than western sandpipers.
Western sandpiper foraging distribution matched biofilm availability. (meaning that this is their preferred food despite other options being available)
As the paper documents, shorebird species rely on habitats like Roberts Bank, yet these species are becoming increasingly threatened by industrial development. A prime example of this is Port Metro Vancouver’s plans to build a massive man-made island on Roberts Bank for a second container terminal.
Based on the study that lead to the publication of this research paper, it is clear that the intertidal biofilm that is present on Roberts Bank plays an important role in shorebird diets – the western sandpiper in particular. Daily averages of more than 100,000 sandpipers concentrate at Roberts Bank during the northward migration. The paper specifically recommends that environmental assessments for coastal development and conservation strategies for shorebirds need to explicitly consider the physical and biotic processes that produce and replenish biofilm. The conservation implications are clear. The environmental quality of biofilm rich stop-over sites must be maintained so that biofilm availability for shorebirds remains adequate. Therefore there has to be a major conservation priority to safeguard the Roberts Bank habitat, thus ensuring that biofilm availability. What does that involve - no more port development, no more land reclamation for industrial uses.
In related news the country of Panama has just announced new legislation which will protect a key area of wetlands in the Bay of Panama, home to migratory shorebirds including the western sandpiper. Under the new law, already in effect, construction is banned in a 210,000 acre stretch of the Bay of Panama.
If Panama can do it why cannot Canada?Port Metro Vancouver – are you listening?
Alternatively if you would like a copy then please email us at info@againstportexpansion.org
Latest PMV Stats Show Terminal 2 Not Justified
Port Metro Vancouver finally released its 2014 year end container statistics. No wonder they took so long – the actual containers handled (TEUs – Twenty Foot Equivalent Units) came in well below their latest forecast. As recently as June 2014 PMV had been projecting an annual increase of over 6 percent to almost 3 million TEUs. However 2014 actually ended with them handling just over 2.9 million TEUs, a one year shortfall of almost 90,000 TEUs. In fact as recently as 2011 they were forecasting they would handle almost 3.3 million TEUs in 2014. So even having reduced their forecasts they still fell short. Still that did not stop the Port spin machine kicking into high gear, claiming in the media that 2014 was a record year.
In fact PMV’s own recently-published figures show that there was zero growth in full container shipments in 2014. Even adding in the movement of empty containers, PMV only recorded a 3 percent annual growth over 2013 - and nobody makes money shipping empty containers. What the Port fails to mention is that their 2014 figures were bolstered by the handling of increased US container traffic, as a result of the labour disruptions at US West Coast ports. If it had not been for that bonus they might well have seen a year over year decline in container traffic.
In the last six years PMV has missed its forecast increase each and every year. The actual 6 year compound annual growth rate for total containers is running at 2.63 percent and for full containers at 2.82 percent. Many factors including a repatriation of manufacturing jobs to North America indicate that going forward all PMV can expect is a 4 percent annual growth – perhaps 5 percent at best.
This is supported by recent industry forecasts – including from one of the major shipping lines - suggesting that going forward an annual growth of between 4 and 5 percent is realistic. Despite that PMV has been claiming recently that they will record increased container volumes each and every year going forward of between 6 and 7 percent. How are they going to do that when the last six years show that their compound annual growth is less than 3 percent?
Meanwhile the Port of Prince Rupert has had healthy growth, recording a 15 percent year over year increase for 2014. Prince Rupert container port is in the midst of a phased expansion that will add significant container capacity, sufficient to satisfy Canada’s trading needs for many years to come.
It is time that Port Metro Vancouver stopped the game playing and admitted that a second container terminal on Roberts Bank is not needed now or in the foreseeable future.
The YouTube clip from Citizens Against Port Expansion tells the story.
Video - The Year of Living Fearlessly
Cliff Caprani outlines what we are up against in the months ahead as we work to stop Port Metro Vancouver from building a second container terminal on a huge man-made island in Georgia Strait.
PMV Habitat Restoration a Failure
Port Metro Vancouver (PMV) has had a habitat banking program for some years. The concept works like this - they select an area that they decide they can “improve” and then carry out work on that location. The sole purpose of this program is for PMV to build up credits that it can use to offset damage that it does to the environment in other locations – such as if it were to get permission to build a second container terminal on Roberts Bank.
There is nothing wrong with the concept but there is plenty wrong with the way PMV executes. Recently there has been little or no oversight or control by government agencies, nor does PMV take account of community concerns. A good example was the log clearing that they carried out in Boundary Bay. For this project there was no community consultation, nor did they listen to experts on salt marsh ecology that said it was best to leave the logs where they were. Instead they moved in and destroyed an area that was a valuable food source for raptors and other birds of prey. By removing the logs they also killed off all the voles and other small critters that lived in and under the logs. This destroyed a valuable source of food for the winter of 2013 for the owls, and other birds of prey.
Also, as a result in 2014 it made the salt marsh much more accessible. People were able to tramp over the salt marsh, ride bikes and ATVs and do further damage to what became a fragile environment. Then in late 2014 the first major winter storm brought back the logs, seaweed and other debris, doing even more damage to what is now a fragile environment. | 2023-09-06T01:26:58.646260 | https://example.com/article/5433 |
/*============================================================================
WCSLIB 7.2 - an implementation of the FITS WCS standard.
Copyright (C) 1995-2020, Mark Calabretta
This file is part of WCSLIB.
WCSLIB is free software: you can redistribute it and/or modify it under the
terms of the GNU Lesser General Public License as published by the Free
Software Foundation, either version 3 of the License, or (at your option)
any later version.
WCSLIB is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for
more details.
You should have received a copy of the GNU Lesser General Public License
along with WCSLIB. If not, see http://www.gnu.org/licenses.
Direct correspondence concerning WCSLIB to mark@calabretta.id.au
Author: Mark Calabretta, Australia Telescope National Facility, CSIRO.
http://www.atnf.csiro.au/people/Mark.Calabretta
$Id: spc.h,v 7.2 2020/03/09 07:31:23 mcalabre Exp $
*=============================================================================
*
* WCSLIB 7.2 - C routines that implement the FITS World Coordinate System
* (WCS) standard. Refer to the README file provided with WCSLIB for an
* overview of the library.
*
*
* Summary of the spc routines
* ---------------------------
* Routines in this suite implement the part of the FITS World Coordinate
* System (WCS) standard that deals with spectral coordinates, as described in
*
= "Representations of world coordinates in FITS",
= Greisen, E.W., & Calabretta, M.R. 2002, A&A, 395, 1061 (WCS Paper I)
=
= "Representations of spectral coordinates in FITS",
= Greisen, E.W., Calabretta, M.R., Valdes, F.G., & Allen, S.L.
= 2006, A&A, 446, 747 (WCS Paper III)
*
* These routines define methods to be used for computing spectral world
* coordinates from intermediate world coordinates (a linear transformation
* of image pixel coordinates), and vice versa. They are based on the spcprm
* struct which contains all information needed for the computations. The
* struct contains some members that must be set by the user, and others that
* are maintained by these routines, somewhat like a C++ class but with no
* encapsulation.
*
* Routine spcini() is provided to initialize the spcprm struct with default
* values, spcfree() reclaims any memory that may have been allocated to store
* an error message, and spcprt() prints its contents.
*
* spcperr() prints the error message(s) (if any) stored in a spcprm struct.
*
* A setup routine, spcset(), computes intermediate values in the spcprm struct
* from parameters in it that were supplied by the user. The struct always
* needs to be set up by spcset() but it need not be called explicitly - refer
* to the explanation of spcprm::flag.
*
* spcx2s() and spcs2x() implement the WCS spectral coordinate transformations.
* In fact, they are high level driver routines for the lower level spectral
* coordinate transformation routines described in spx.h.
*
* A number of routines are provided to aid in analysing or synthesising sets
* of FITS spectral axis keywords:
*
* - spctype() checks a spectral CTYPEia keyword for validity and returns
* information derived from it.
*
* - Spectral keyword analysis routine spcspxe() computes the values of the
* X-type spectral variables for the S-type variables supplied.
*
* - Spectral keyword synthesis routine, spcxpse(), computes the S-type
* variables for the X-types supplied.
*
* - Given a set of spectral keywords, a translation routine, spctrne(),
* produces the corresponding set for the specified spectral CTYPEia.
*
* - spcaips() translates AIPS-convention spectral CTYPEia and VELREF
* keyvalues.
*
* Spectral variable types - S, P, and X:
* --------------------------------------
* A few words of explanation are necessary regarding spectral variable types
* in FITS.
*
* Every FITS spectral axis has three associated spectral variables:
*
* S-type: the spectral variable in which coordinates are to be
* expressed. Each S-type is encoded as four characters and is
* linearly related to one of four basic types as follows:
*
* F (Frequency):
* - 'FREQ': frequency
* - 'AFRQ': angular frequency
* - 'ENER': photon energy
* - 'WAVN': wave number
* - 'VRAD': radio velocity
*
* W (Wavelength in vacuo):
* - 'WAVE': wavelength
* - 'VOPT': optical velocity
* - 'ZOPT': redshift
*
* A (wavelength in Air):
* - 'AWAV': wavelength in air
*
* V (Velocity):
* - 'VELO': relativistic velocity
* - 'BETA': relativistic beta factor
*
* The S-type forms the first four characters of the CTYPEia keyvalue,
* and CRVALia and CDELTia are expressed as S-type quantities so that
* they provide a first-order approximation to the S-type variable at
* the reference point.
*
* Note that 'AFRQ', angular frequency, is additional to the variables
* defined in WCS Paper III.
*
* P-type: the basic spectral variable (F, W, A, or V) with which the
* S-type variable is associated (see list above).
*
* For non-grism axes, the P-type is encoded as the eighth character of
* CTYPEia.
*
* X-type: the basic spectral variable (F, W, A, or V) for which the
* spectral axis is linear, grisms excluded (see below).
*
* For non-grism axes, the X-type is encoded as the sixth character of
* CTYPEia.
*
* Grisms: Grism axes have normal S-, and P-types but the axis is linear,
* not in any spectral variable, but in a special "grism parameter".
* The X-type spectral variable is either W or A for grisms in vacuo or
* air respectively, but is encoded as 'w' or 'a' to indicate that an
* additional transformation is required to convert to or from the
* grism parameter. The spectral algorithm code for grisms also has a
* special encoding in CTYPEia, either 'GRI' (in vacuo) or 'GRA' (in air).
*
* In the algorithm chain, the non-linear transformation occurs between the
* X-type and the P-type variables; the transformation between P-type and
* S-type variables is always linear.
*
* When the P-type and X-type variables are the same, the spectral axis is
* linear in the S-type variable and the second four characters of CTYPEia
* are blank. This can never happen for grism axes.
*
* As an example, correlating radio spectrometers always produce spectra that
* are regularly gridded in frequency; a redshift scale on such a spectrum is
* non-linear. The required value of CTYPEia would be 'ZOPT-F2W', where the
* desired S-type is 'ZOPT' (redshift), the P-type is necessarily 'W'
* (wavelength), and the X-type is 'F' (frequency) by the nature of the
* instrument.
*
* Air-to-vacuum wavelength conversion:
* ------------------------------------
* Please refer to the prologue of spx.h for important comments relating to the
* air-to-vacuum wavelength conversion.
*
* Argument checking:
* ------------------
* The input spectral values are only checked for values that would result in
* floating point exceptions. In particular, negative frequencies and
* wavelengths are allowed, as are velocities greater than the speed of
* light. The same is true for the spectral parameters - rest frequency and
* wavelength.
*
* Accuracy:
* ---------
* No warranty is given for the accuracy of these routines (refer to the
* copyright notice); intending users must satisfy for themselves their
* adequacy for the intended purpose. However, closure effectively to within
* double precision rounding error was demonstrated by test routine tspc.c
* which accompanies this software.
*
*
* spcini() - Default constructor for the spcprm struct
* ----------------------------------------------------
* spcini() sets all members of a spcprm struct to default values. It should
* be used to initialize every spcprm struct.
*
* PLEASE NOTE: If the spcprm struct has already been initialized, then before
* reinitializing, it spcfree() should be used to free any memory that may have
* been allocated to store an error message. A memory leak may otherwise
* result.
*
* Given and returned:
* spc struct spcprm*
* Spectral transformation parameters.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
*
*
* spcfree() - Destructor for the spcprm struct
* --------------------------------------------
* spcfree() frees any memory that may have been allocated to store an error
* message in the spcprm struct.
*
* Given:
* spc struct spcprm*
* Spectral transformation parameters.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
*
*
* spcprt() - Print routine for the spcprm struct
* ----------------------------------------------
* spcprt() prints the contents of a spcprm struct using wcsprintf(). Mainly
* intended for diagnostic purposes.
*
* Given:
* spc const struct spcprm*
* Spectral transformation parameters.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
*
*
* spcperr() - Print error messages from a spcprm struct
* -----------------------------------------------------
* spcperr() prints the error message(s) (if any) stored in a spcprm struct.
* If there are no errors then nothing is printed. It uses wcserr_prt(), q.v.
*
* Given:
* spc const struct spcprm*
* Spectral transformation parameters.
*
* prefix const char *
* If non-NULL, each output line will be prefixed with
* this string.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
*
*
* spcset() - Setup routine for the spcprm struct
* ----------------------------------------------
* spcset() sets up a spcprm struct according to information supplied within
* it.
*
* Note that this routine need not be called directly; it will be invoked by
* spcx2s() and spcs2x() if spcprm::flag is anything other than a predefined
* magic value.
*
* Given and returned:
* spc struct spcprm*
* Spectral transformation parameters.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
* 2: Invalid spectral parameters.
*
* For returns > 1, a detailed error message is set in
* spcprm::err if enabled, see wcserr_enable().
*
*
* spcx2s() - Transform to spectral coordinates
* --------------------------------------------
* spcx2s() transforms intermediate world coordinates to spectral coordinates.
*
* Given and returned:
* spc struct spcprm*
* Spectral transformation parameters.
*
* Given:
* nx int Vector length.
*
* sx int Vector stride.
*
* sspec int Vector stride.
*
* x const double[]
* Intermediate world coordinates, in SI units.
*
* Returned:
* spec double[] Spectral coordinates, in SI units.
*
* stat int[] Status return value status for each vector element:
* 0: Success.
* 1: Invalid value of x.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
* 2: Invalid spectral parameters.
* 3: One or more of the x coordinates were invalid,
* as indicated by the stat vector.
*
* For returns > 1, a detailed error message is set in
* spcprm::err if enabled, see wcserr_enable().
*
*
* spcs2x() - Transform spectral coordinates
* -----------------------------------------
* spcs2x() transforms spectral world coordinates to intermediate world
* coordinates.
*
* Given and returned:
* spc struct spcprm*
* Spectral transformation parameters.
*
* Given:
* nspec int Vector length.
*
* sspec int Vector stride.
*
* sx int Vector stride.
*
* spec const double[]
* Spectral coordinates, in SI units.
*
* Returned:
* x double[] Intermediate world coordinates, in SI units.
*
* stat int[] Status return value status for each vector element:
* 0: Success.
* 1: Invalid value of spec.
*
* Function return value:
* int Status return value:
* 0: Success.
* 1: Null spcprm pointer passed.
* 2: Invalid spectral parameters.
* 4: One or more of the spec coordinates were
* invalid, as indicated by the stat vector.
*
* For returns > 1, a detailed error message is set in
* spcprm::err if enabled, see wcserr_enable().
*
*
* spctype() - Spectral CTYPEia keyword analysis
* ---------------------------------------------
* spctype() checks whether a CTYPEia keyvalue is a valid spectral axis type
* and if so returns information derived from it relating to the associated S-,
* P-, and X-type spectral variables (see explanation above).
*
* The return arguments are guaranteed not be modified if CTYPEia is not a
* valid spectral type; zero-pointers may be specified for any that are not of
* interest.
*
* A deprecated form of this function, spctyp(), lacks the wcserr** parameter.
*
* Given:
* ctype const char[9]
* The CTYPEia keyvalue, (eight characters with null
* termination).
*
* Returned:
* stype char[] The four-letter name of the S-type spectral variable
* copied or translated from ctype. If a non-zero
* pointer is given, the array must accomodate a null-
* terminated string of length 5.
*
* scode char[] The three-letter spectral algorithm code copied or
* translated from ctype. Logarithmic ('LOG') and
* tabular ('TAB') codes are also recognized. If a
* non-zero pointer is given, the array must accomodate a
* null-terminated string of length 4.
*
* sname char[] Descriptive name of the S-type spectral variable.
* If a non-zero pointer is given, the array must
* accomodate a null-terminated string of length 22.
*
* units char[] SI units of the S-type spectral variable. If a
* non-zero pointer is given, the array must accomodate a
* null-terminated string of length 8.
*
* ptype char* Character code for the P-type spectral variable
* derived from ctype, one of 'F', 'W', 'A', or 'V'.
*
* xtype char* Character code for the X-type spectral variable
* derived from ctype, one of 'F', 'W', 'A', or 'V'.
* Also, 'w' and 'a' are synonymous to 'W' and 'A' for
* grisms in vacuo and air respectively. Set to 'L' or
* 'T' for logarithmic ('LOG') and tabular ('TAB') axes.
*
* restreq int* Multivalued flag that indicates whether rest
* frequency or wavelength is required to compute
* spectral variables for this CTYPEia:
* 0: Not required.
* 1: Required for the conversion between S- and
* P-types (e.g. 'ZOPT-F2W').
* 2: Required for the conversion between P- and
* X-types (e.g. 'BETA-W2V').
* 3: Required for the conversion between S- and
* P-types, and between P- and X-types, but not
* between S- and X-types (this applies only for
* 'VRAD-V2F', 'VOPT-V2W', and 'ZOPT-V2W').
* Thus the rest frequency or wavelength is required for
* spectral coordinate computations (i.e. between S- and
* X-types) only if restreq%3 != 0.
*
* err struct wcserr **
* If enabled, for function return values > 1, this
* struct will contain a detailed error message, see
* wcserr_enable(). May be NULL if an error message is
* not desired. Otherwise, the user is responsible for
* deleting the memory allocated for the wcserr struct.
*
* Function return value:
* int Status return value:
* 0: Success.
* 2: Invalid spectral parameters (not a spectral
* CTYPEia).
*
*
* spcspxe() - Spectral keyword analysis
* ------------------------------------
* spcspxe() analyses the CTYPEia and CRVALia FITS spectral axis keyword values
* and returns information about the associated X-type spectral variable.
*
* A deprecated form of this function, spcspx(), lacks the wcserr** parameter.
*
* Given:
* ctypeS const char[9]
* Spectral axis type, i.e. the CTYPEia keyvalue, (eight
* characters with null termination). For non-grism
* axes, the character code for the P-type spectral
* variable in the algorithm code (i.e. the eighth
* character of CTYPEia) may be set to '?' (it will not
* be reset).
*
* crvalS double Value of the S-type spectral variable at the reference
* point, i.e. the CRVALia keyvalue, SI units.
*
* restfrq,
* restwav double Rest frequency [Hz] and rest wavelength in vacuo [m],
* only one of which need be given, the other should be
* set to zero.
*
* Returned:
* ptype char* Character code for the P-type spectral variable
* derived from ctypeS, one of 'F', 'W', 'A', or 'V'.
*
* xtype char* Character code for the X-type spectral variable
* derived from ctypeS, one of 'F', 'W', 'A', or 'V'.
* Also, 'w' and 'a' are synonymous to 'W' and 'A' for
* grisms in vacuo and air respectively; crvalX and dXdS
* (see below) will conform to these.
*
* restreq int* Multivalued flag that indicates whether rest frequency
* or wavelength is required to compute spectral
* variables for this CTYPEia, as for spctype().
*
* crvalX double* Value of the X-type spectral variable at the reference
* point, SI units.
*
* dXdS double* The derivative, dX/dS, evaluated at the reference
* point, SI units. Multiply the CDELTia keyvalue by
* this to get the pixel spacing in the X-type spectral
* coordinate.
*
* err struct wcserr **
* If enabled, for function return values > 1, this
* struct will contain a detailed error message, see
* wcserr_enable(). May be NULL if an error message is
* not desired. Otherwise, the user is responsible for
* deleting the memory allocated for the wcserr struct.
*
* Function return value:
* int Status return value:
* 0: Success.
* 2: Invalid spectral parameters.
*
*
* spcxpse() - Spectral keyword synthesis
* -------------------------------------
* spcxpse(), for the spectral axis type specified and the value provided for
* the X-type spectral variable at the reference point, deduces the value of
* the FITS spectral axis keyword CRVALia and also the derivative dS/dX which
* may be used to compute CDELTia. See above for an explanation of the S-,
* P-, and X-type spectral variables.
*
* A deprecated form of this function, spcxps(), lacks the wcserr** parameter.
*
* Given:
* ctypeS const char[9]
* The required spectral axis type, i.e. the CTYPEia
* keyvalue, (eight characters with null termination).
* For non-grism axes, the character code for the P-type
* spectral variable in the algorithm code (i.e. the
* eighth character of CTYPEia) may be set to '?' (it
* will not be reset).
*
* crvalX double Value of the X-type spectral variable at the reference
* point (N.B. NOT the CRVALia keyvalue), SI units.
*
* restfrq,
* restwav double Rest frequency [Hz] and rest wavelength in vacuo [m],
* only one of which need be given, the other should be
* set to zero.
*
* Returned:
* ptype char* Character code for the P-type spectral variable
* derived from ctypeS, one of 'F', 'W', 'A', or 'V'.
*
* xtype char* Character code for the X-type spectral variable
* derived from ctypeS, one of 'F', 'W', 'A', or 'V'.
* Also, 'w' and 'a' are synonymous to 'W' and 'A' for
* grisms; crvalX and cdeltX must conform to these.
*
* restreq int* Multivalued flag that indicates whether rest frequency
* or wavelength is required to compute spectral
* variables for this CTYPEia, as for spctype().
*
* crvalS double* Value of the S-type spectral variable at the reference
* point (i.e. the appropriate CRVALia keyvalue), SI
* units.
*
* dSdX double* The derivative, dS/dX, evaluated at the reference
* point, SI units. Multiply this by the pixel spacing
* in the X-type spectral coordinate to get the CDELTia
* keyvalue.
*
* err struct wcserr **
* If enabled, for function return values > 1, this
* struct will contain a detailed error message, see
* wcserr_enable(). May be NULL if an error message is
* not desired. Otherwise, the user is responsible for
* deleting the memory allocated for the wcserr struct.
*
* Function return value:
* int Status return value:
* 0: Success.
* 2: Invalid spectral parameters.
*
*
* spctrne() - Spectral keyword translation
* ---------------------------------------
* spctrne() translates a set of FITS spectral axis keywords into the
* corresponding set for the specified spectral axis type. For example, a
* 'FREQ' axis may be translated into 'ZOPT-F2W' and vice versa.
*
* A deprecated form of this function, spctrn(), lacks the wcserr** parameter.
*
* Given:
* ctypeS1 const char[9]
* Spectral axis type, i.e. the CTYPEia keyvalue, (eight
* characters with null termination). For non-grism
* axes, the character code for the P-type spectral
* variable in the algorithm code (i.e. the eighth
* character of CTYPEia) may be set to '?' (it will not
* be reset).
*
* crvalS1 double Value of the S-type spectral variable at the reference
* point, i.e. the CRVALia keyvalue, SI units.
*
* cdeltS1 double Increment of the S-type spectral variable at the
* reference point, SI units.
*
* restfrq,
* restwav double Rest frequency [Hz] and rest wavelength in vacuo [m],
* only one of which need be given, the other should be
* set to zero. Neither are required if the translation
* is between wave-characteristic types, or between
* velocity-characteristic types. E.g., required for
* 'FREQ' -> 'ZOPT-F2W', but not required for
* 'VELO-F2V' -> 'ZOPT-F2W'.
*
* Given and returned:
* ctypeS2 char[9] Required spectral axis type (eight characters with
* null termination). The first four characters are
* required to be given and are never modified. The
* remaining four, the algorithm code, are completely
* determined by, and must be consistent with, ctypeS1
* and the first four characters of ctypeS2. A non-zero
* status value will be returned if they are inconsistent
* (see below). However, if the final three characters
* are specified as "???", or if just the eighth
* character is specified as '?', the correct algorithm
* code will be substituted (applies for grism axes as
* well as non-grism).
*
* Returned:
* crvalS2 double* Value of the new S-type spectral variable at the
* reference point, i.e. the new CRVALia keyvalue, SI
* units.
*
* cdeltS2 double* Increment of the new S-type spectral variable at the
* reference point, i.e. the new CDELTia keyvalue, SI
* units.
*
* err struct wcserr **
* If enabled, for function return values > 1, this
* struct will contain a detailed error message, see
* wcserr_enable(). May be NULL if an error message is
* not desired. Otherwise, the user is responsible for
* deleting the memory allocated for the wcserr struct.
*
* Function return value:
* int Status return value:
* 0: Success.
* 2: Invalid spectral parameters.
*
* A status value of 2 will be returned if restfrq or
* restwav are not specified when required, or if ctypeS1
* or ctypeS2 are self-inconsistent, or have different
* spectral X-type variables.
*
*
* spcaips() - Translate AIPS-convention spectral keywords
* -------------------------------------------------------
* spcaips() translates AIPS-convention spectral CTYPEia and VELREF keyvalues.
*
* Given:
* ctypeA const char[9]
* CTYPEia keyvalue possibly containing an
* AIPS-convention spectral code (eight characters, need
* not be null-terminated).
*
* velref int AIPS-convention VELREF code. It has the following
* integer values:
* 1: LSR kinematic, originally described simply as
* "LSR" without distinction between the kinematic
* and dynamic definitions.
* 2: Barycentric, originally described as "HEL"
* meaning heliocentric.
* 3: Topocentric, originally described as "OBS"
* meaning geocentric but widely interpreted as
* topocentric.
* AIPS++ extensions to VELREF are also recognized:
* 4: LSR dynamic.
* 5: Geocentric.
* 6: Source rest frame.
* 7: Galactocentric.
*
* For an AIPS 'VELO' axis, a radio convention velocity
* (VRAD) is denoted by adding 256 to VELREF, otherwise
* an optical velocity (VOPT) is indicated (this is not
* applicable to 'FREQ' or 'FELO' axes). Setting velref
* to 0 or 256 chooses between optical and radio velocity
* without specifying a Doppler frame, provided that a
* frame is encoded in ctypeA. If not, i.e. for
* ctypeA = 'VELO', ctype will be returned as 'VELO'.
*
* VELREF takes precedence over CTYPEia in defining the
* Doppler frame, e.g.
*
= ctypeA = 'VELO-HEL'
= velref = 1
*
* returns ctype = 'VOPT' with specsys set to 'LSRK'.
*
* If omitted from the header, the default value of
* VELREF is 0.
*
* Returned:
* ctype char[9] Translated CTYPEia keyvalue, or a copy of ctypeA if no
* translation was performed (in which case any trailing
* blanks in ctypeA will be replaced with nulls).
*
* specsys char[9] Doppler reference frame indicated by VELREF or else
* by CTYPEia with value corresponding to the SPECSYS
* keyvalue in the FITS WCS standard. May be returned
* blank if neither specifies a Doppler frame, e.g.
* ctypeA = 'FELO' and velref%256 == 0.
*
* Function return value:
* int Status return value:
* -1: No translation required (not an error).
* 0: Success.
* 2: Invalid value of VELREF.
*
*
* spcprm struct - Spectral transformation parameters
* --------------------------------------------------
* The spcprm struct contains information required to transform spectral
* coordinates. It consists of certain members that must be set by the user
* ("given") and others that are set by the WCSLIB routines ("returned"). Some
* of the latter are supplied for informational purposes while others are for
* internal use only.
*
* int flag
* (Given and returned) This flag must be set to zero whenever any of the
* following spcprm structure members are set or changed:
*
* - spcprm::type,
* - spcprm::code,
* - spcprm::crval,
* - spcprm::restfrq,
* - spcprm::restwav,
* - spcprm::pv[].
*
* This signals the initialization routine, spcset(), to recompute the
* returned members of the spcprm struct. spcset() will reset flag to
* indicate that this has been done.
*
* char type[8]
* (Given) Four-letter spectral variable type, e.g "ZOPT" for
* CTYPEia = 'ZOPT-F2W'. (Declared as char[8] for alignment reasons.)
*
* char code[4]
* (Given) Three-letter spectral algorithm code, e.g "F2W" for
* CTYPEia = 'ZOPT-F2W'.
*
* double crval
* (Given) Reference value (CRVALia), SI units.
*
* double restfrq
* (Given) The rest frequency [Hz], and ...
*
* double restwav
* (Given) ... the rest wavelength in vacuo [m], only one of which need be
* given, the other should be set to zero. Neither are required if the
* X and S spectral variables are both wave-characteristic, or both
* velocity-characteristic, types.
*
* double pv[7]
* (Given) Grism parameters for 'GRI' and 'GRA' algorithm codes:
* - 0: G, grating ruling density.
* - 1: m, interference order.
* - 2: alpha, angle of incidence [deg].
* - 3: n_r, refractive index at the reference wavelength, lambda_r.
* - 4: n'_r, dn/dlambda at the reference wavelength, lambda_r (/m).
* - 5: epsilon, grating tilt angle [deg].
* - 6: theta, detector tilt angle [deg].
*
* The remaining members of the spcprm struct are maintained by spcset() and
* must not be modified elsewhere:
*
* double w[6]
* (Returned) Intermediate values:
* - 0: Rest frequency or wavelength (SI).
* - 1: The value of the X-type spectral variable at the reference point
* (SI units).
* - 2: dX/dS at the reference point (SI units).
* The remainder are grism intermediates.
*
* int isGrism
* (Returned) Grism coordinates?
* - 0: no,
* - 1: in vacuum,
* - 2: in air.
*
* int padding1
* (An unused variable inserted for alignment purposes only.)
*
* struct wcserr *err
* (Returned) If enabled, when an error status is returned, this struct
* contains detailed information about the error, see wcserr_enable().
*
* void *padding2
* (An unused variable inserted for alignment purposes only.)
* int (*spxX2P)(SPX_ARGS)
* (Returned) The first and ...
* int (*spxP2S)(SPX_ARGS)
* (Returned) ... the second of the pointers to the transformation
* functions in the two-step algorithm chain X -> P -> S in the
* pixel-to-spectral direction where the non-linear transformation is from
* X to P. The argument list, SPX_ARGS, is defined in spx.h.
*
* int (*spxS2P)(SPX_ARGS)
* (Returned) The first and ...
* int (*spxP2X)(SPX_ARGS)
* (Returned) ... the second of the pointers to the transformation
* functions in the two-step algorithm chain S -> P -> X in the
* spectral-to-pixel direction where the non-linear transformation is from
* P to X. The argument list, SPX_ARGS, is defined in spx.h.
*
*
* Global variable: const char *spc_errmsg[] - Status return messages
* ------------------------------------------------------------------
* Error messages to match the status value returned from each function.
*
*===========================================================================*/
#ifndef WCSLIB_SPC
#define WCSLIB_SPC
#include "spx.h"
#ifdef __cplusplus
extern "C" {
#endif
extern const char *spc_errmsg[];
enum spc_errmsg_enum {
SPCERR_NO_CHANGE = -1, /* No change. */
SPCERR_SUCCESS = 0, /* Success. */
SPCERR_NULL_POINTER = 1, /* Null spcprm pointer passed. */
SPCERR_BAD_SPEC_PARAMS = 2, /* Invalid spectral parameters. */
SPCERR_BAD_X = 3, /* One or more of x coordinates were
invalid. */
SPCERR_BAD_SPEC = 4 /* One or more of the spec coordinates were
invalid. */
};
struct spcprm {
/* Initialization flag (see the prologue above). */
/*------------------------------------------------------------------------*/
int flag; /* Set to zero to force initialization. */
/* Parameters to be provided (see the prologue above). */
/*------------------------------------------------------------------------*/
char type[8]; /* Four-letter spectral variable type. */
char code[4]; /* Three-letter spectral algorithm code. */
double crval; /* Reference value (CRVALia), SI units. */
double restfrq; /* Rest frequency, Hz. */
double restwav; /* Rest wavelength, m. */
double pv[7]; /* Grism parameters: */
/* 0: G, grating ruling density. */
/* 1: m, interference order. */
/* 2: alpha, angle of incidence. */
/* 3: n_r, refractive index at lambda_r. */
/* 4: n'_r, dn/dlambda at lambda_r. */
/* 5: epsilon, grating tilt angle. */
/* 6: theta, detector tilt angle. */
/* Information derived from the parameters supplied. */
/*------------------------------------------------------------------------*/
double w[6]; /* Intermediate values. */
/* 0: Rest frequency or wavelength (SI). */
/* 1: CRVALX (SI units). */
/* 2: CDELTX/CDELTia = dX/dS (SI units). */
/* The remainder are grism intermediates. */
int isGrism; /* Grism coordinates? 1: vacuum, 2: air. */
int padding1; /* (Dummy inserted for alignment purposes.) */
/* Error handling */
/*------------------------------------------------------------------------*/
struct wcserr *err;
/* Private */
/*------------------------------------------------------------------------*/
void *padding2; /* (Dummy inserted for alignment purposes.) */
int (*spxX2P)(SPX_ARGS); /* Pointers to the transformation functions */
int (*spxP2S)(SPX_ARGS); /* in the two-step algorithm chain in the */
/* pixel-to-spectral direction. */
int (*spxS2P)(SPX_ARGS); /* Pointers to the transformation functions */
int (*spxP2X)(SPX_ARGS); /* in the two-step algorithm chain in the */
/* spectral-to-pixel direction. */
};
/* Size of the spcprm struct in int units, used by the Fortran wrappers. */
#define SPCLEN (sizeof(struct spcprm)/sizeof(int))
int spcini(struct spcprm *spc);
int spcfree(struct spcprm *spc);
int spcprt(const struct spcprm *spc);
int spcperr(const struct spcprm *spc, const char *prefix);
int spcset(struct spcprm *spc);
int spcx2s(struct spcprm *spc, int nx, int sx, int sspec,
const double x[], double spec[], int stat[]);
int spcs2x(struct spcprm *spc, int nspec, int sspec, int sx,
const double spec[], double x[], int stat[]);
int spctype(const char ctype[9], char stype[], char scode[], char sname[],
char units[], char *ptype, char *xtype, int *restreq,
struct wcserr **err);
int spcspxe(const char ctypeS[9], double crvalS, double restfrq,
double restwav, char *ptype, char *xtype, int *restreq,
double *crvalX, double *dXdS, struct wcserr **err);
int spcxpse(const char ctypeS[9], double crvalX, double restfrq,
double restwav, char *ptype, char *xtype, int *restreq,
double *crvalS, double *dSdX, struct wcserr **err);
int spctrne(const char ctypeS1[9], double crvalS1, double cdeltS1,
double restfrq, double restwav, char ctypeS2[9], double *crvalS2,
double *cdeltS2, struct wcserr **err);
int spcaips(const char ctypeA[9], int velref, char ctype[9], char specsys[9]);
/* Deprecated. */
#define spcini_errmsg spc_errmsg
#define spcprt_errmsg spc_errmsg
#define spcset_errmsg spc_errmsg
#define spcx2s_errmsg spc_errmsg
#define spcs2x_errmsg spc_errmsg
int spctyp(const char ctype[9], char stype[], char scode[], char sname[],
char units[], char *ptype, char *xtype, int *restreq);
int spcspx(const char ctypeS[9], double crvalS, double restfrq,
double restwav, char *ptype, char *xtype, int *restreq,
double *crvalX, double *dXdS);
int spcxps(const char ctypeS[9], double crvalX, double restfrq,
double restwav, char *ptype, char *xtype, int *restreq,
double *crvalS, double *dSdX);
int spctrn(const char ctypeS1[9], double crvalS1, double cdeltS1,
double restfrq, double restwav, char ctypeS2[9], double *crvalS2,
double *cdeltS2);
#ifdef __cplusplus
}
#endif
#endif /* WCSLIB_SPC */
| 2023-08-02T01:26:58.646260 | https://example.com/article/2112 |
Q:
Python: String index out of range
I have had a look at a lot of previous questions put up, but still couldn't find anything that'll help me here.
Here's a code I wrote to Reverse a sentence.
I could have used split() function, but I tried to do without it anyways.
s='abcdef ghij klmn op qrst uv w xy z'
s=s[::-1]
print s
j=0
p=''
while(j<len(s)):
a=''
while(s[j]!=''):
a=a+s[j]
j+=1
p.append(a[::-1])
j+=1
print p
It gives me a string index out of range error in the while bracket. Why?
Thanks a lot for the help.
A:
Your issue is with this inner loop:
while(s[j]!=''):
a=a+s[j]
j+=1
This loop allows j to exceed the length of s, you probably want to add an additional condition here to prevent this (I also removed the unnecessary parentheses):
while j < len(s) and s[j] != '':
a=a+s[j]
j+=1
| 2023-10-08T01:26:58.646260 | https://example.com/article/5178 |
On the Amendment S.Amdt. 4101: Hutchison S.Amdt.4101; To enhance border security by creating a pilot SAFE Visa Program to grant visas to authorized nationals of a NAFTA or CAFTA-DR country who receive employment offers in job areas in the United States that have been certified by the Secretary of Labor as having a shortage of workers.Result: Rejected (31-67, 2 members not voting, 1/2 threshold)Details: [click here] | 2024-05-28T01:26:58.646260 | https://example.com/article/1408 |
// The number of currently visible buttons (used to optimise showing/hiding)
var g_unitPanelButtons = {
"Selection": 0,
"Queue": 0,
"Formation": 0,
"Garrison": 0,
"Training": 0,
"Research": 0,
"Alert": 0,
"Barter": 0,
"Construction": 0,
"Command": 0,
"AllyCommand": 0,
"Stance": 0,
"Gate": 0,
"Pack": 0,
"Upgrade": 0
};
/**
* Set the position of a panel object according to the index,
* from left to right, from top to bottom.
* Will wrap around to subsequent rows if the index
* is larger than rowLength.
*/
function setPanelObjectPosition(object, index, rowLength, vMargin = 1, hMargin = 1)
{
var size = object.size;
// horizontal position
var oWidth = size.right - size.left;
var hIndex = index % rowLength;
size.left = hIndex * (oWidth + vMargin);
size.right = size.left + oWidth;
// vertical position
var oHeight = size.bottom - size.top;
var vIndex = Math.floor(index / rowLength);
size.top = vIndex * (oHeight + hMargin);
size.bottom = size.top + oHeight;
object.size = size;
}
/**
* Helper function for updateUnitCommands; sets up "unit panels"
* (i.e. panels with rows of icons) for the currently selected unit.
*
* @param guiName Short identifier string of this panel. See g_SelectionPanels.
* @param unitEntStates Entity states of the selected units
* @param playerState Player state
*/
function setupUnitPanel(guiName, unitEntStates, playerState)
{
if (!g_SelectionPanels[guiName])
{
error("unknown guiName used '" + guiName + "'");
return;
}
let items = g_SelectionPanels[guiName].getItems(unitEntStates);
if (!items || !items.length)
return;
let numberOfItems = Math.min(items.length, g_SelectionPanels[guiName].getMaxNumberOfItems());
let rowLength = g_SelectionPanels[guiName].rowLength || 8;
if (g_SelectionPanels[guiName].resizePanel)
g_SelectionPanels[guiName].resizePanel(numberOfItems, rowLength);
for (let i = 0; i < numberOfItems; ++i)
{
let data = {
"i": i,
"item": items[i],
"playerState": playerState,
"player": unitEntStates[0].player,
"unitEntStates": unitEntStates,
"rowLength": rowLength,
"numberOfItems": numberOfItems,
// depending on the XML, some of the GUI objects may be undefined
"button": Engine.GetGUIObjectByName("unit" + guiName + "Button[" + i + "]"),
"icon": Engine.GetGUIObjectByName("unit" + guiName + "Icon[" + i + "]"),
"guiSelection": Engine.GetGUIObjectByName("unit" + guiName + "Selection[" + i + "]"),
"countDisplay": Engine.GetGUIObjectByName("unit" + guiName + "Count[" + i + "]")
};
if (data.button)
{
data.button.hidden = false;
data.button.enabled = true;
data.button.tooltip = "";
data.button.caption = "";
}
if (g_SelectionPanels[guiName].setupButton &&
!g_SelectionPanels[guiName].setupButton(data))
continue;
// TODO: we should require all entities to have icons, so this case never occurs
if (data.icon && !data.icon.sprite)
data.icon.sprite = "BackgroundBlack";
}
// Hide any buttons we're no longer using
for (let i = numberOfItems; i < g_unitPanelButtons[guiName]; ++i)
if (g_SelectionPanels[guiName].hideItem)
g_SelectionPanels[guiName].hideItem(i, rowLength);
else
Engine.GetGUIObjectByName("unit" + guiName + "Button[" + i + "]").hidden = true;
g_unitPanelButtons[guiName] = numberOfItems;
g_SelectionPanels[guiName].used = true;
}
/**
* Updates the selection panels where buttons are supposed to
* depend on the context.
* Runs in the main session loop via updateSelectionDetails().
* Delegates to setupUnitPanel to set up individual subpanels,
* appropriately activated depending on the selected unit's state.
*
* @param entStates Entity states of the selected units
* @param supplementalDetailsPanel Reference to the
* "supplementalSelectionDetails" GUI Object
* @param commandsPanel Reference to the "commandsPanel" GUI Object
*/
function updateUnitCommands(entStates, supplementalDetailsPanel, commandsPanel)
{
for (let panel in g_SelectionPanels)
g_SelectionPanels[panel].used = false;
// If the selection is friendly units, add the command panels
// Get player state to check some constraints
// e.g. presence of a hero or build limits
let playerStates = GetSimState().players;
let playerState = playerStates[Engine.GetPlayerID()];
if (g_IsObserver || entStates.every(entState => controlsPlayer(entState.player)))
{
for (let guiName of g_PanelsOrder)
{
if (g_SelectionPanels[guiName].conflictsWith &&
g_SelectionPanels[guiName].conflictsWith.some(p => g_SelectionPanels[p].used))
continue;
setupUnitPanel(guiName, entStates, playerStates[entStates[0].player]);
}
supplementalDetailsPanel.hidden = false;
commandsPanel.hidden = false;
}
else if (playerState.isMutualAlly[entStates[0].player]) // owned by allied player
{
// TODO if there's a second panel needed for a different player
// we should consider adding the players list to g_SelectionPanels
setupUnitPanel("Garrison", entStates, playerState);
setupUnitPanel("AllyCommand", entStates, playerState);
supplementalDetailsPanel.hidden = !g_SelectionPanels.Garrison.used;
commandsPanel.hidden = true;
}
else // owned by another player
{
supplementalDetailsPanel.hidden = true;
commandsPanel.hidden = true;
}
// Hides / unhides Unit Panels (panels should be grouped by type, not by order, but we will leave that for another time)
for (let panelName in g_SelectionPanels)
Engine.GetGUIObjectByName("unit" + panelName + "Panel").hidden = !g_SelectionPanels[panelName].used;
}
// Force hide commands panels
function hideUnitCommands()
{
for (var panelName in g_SelectionPanels)
Engine.GetGUIObjectByName("unit" + panelName + "Panel").hidden = true;
}
// Get all of the available entities which can be trained by the selected entities
function getAllTrainableEntities(selection)
{
let trainableEnts = [];
// Get all buildable and trainable entities
for (let ent of selection)
{
let state = GetEntityState(ent);
if (state && state.production && state.production.entities.length)
trainableEnts = trainableEnts.concat(state.production.entities);
}
// Remove duplicates
removeDupes(trainableEnts);
return trainableEnts;
}
function getAllTrainableEntitiesFromSelection()
{
if (!g_allTrainableEntities)
g_allTrainableEntities = getAllTrainableEntities(g_Selection.toList());
return g_allTrainableEntities;
}
// Get all of the available entities which can be built by the selected entities
function getAllBuildableEntities(selection)
{
return Engine.GuiInterfaceCall("GetAllBuildableEntities", { "entities": selection });
}
function getAllBuildableEntitiesFromSelection()
{
if (!g_allBuildableEntities)
g_allBuildableEntities = getAllBuildableEntities(g_Selection.toList());
return g_allBuildableEntities;
}
function getNumberOfRightPanelButtons()
{
var sum = 0;
for (let prop of ["Construction", "Training", "Pack", "Gate", "Upgrade"])
if (g_SelectionPanels[prop].used)
sum += g_unitPanelButtons[prop];
return sum;
}
| 2024-07-10T01:26:58.646260 | https://example.com/article/2434 |
Modern day integrated chips contain millions of semiconductor devices. The semiconductor devices are electrically interconnected by way of back-end-of-the-line metal interconnect layers that are formed above the devices on an integrated chip. A typical integrated chip comprises a plurality of back-end-of-the-line metal interconnect layers including different sized metal wires vertically coupled together with metal contacts (i.e., vias).
Back-end-of-the-line metal interconnect layers are often formed using a dual damascene process. In a dual damascene process, a dielectric material is deposited (e.g., low k dielectric, ultra low k dielectric) onto the surface of a semiconductor substrate. The dielectric material is then selectively etched to form cavities in the dielectric material for a via layer and for an adjoining metal layer. In a typical via-first dual damascene process, a via hole is first etched in the dielectric material and then a metal line trench is formed on top of the via hole. After the via and trench are formed, a diffusion barrier layer and a seed layer are deposited within the cavities. An electro chemical platting process is then used to fill the via and metal trenches with metal (e.g., copper) at the same time. Finally, the surface of the substrate is planarized using a chemical mechanical polishing process to remove any excess metal. | 2024-04-03T01:26:58.646260 | https://example.com/article/2786 |
Sirolimus (rapamycin) is commonly prescribed as an immunosuppressant and is indicated for the prevention of allograft rejection.^[@bib1]^ As the prototypical inhibitor of the mammalian target of rapamycin, sirolimus (like other mammalian target of rapamycin inhibitors) has substantial antitumor activity both in animals and humans.^[@bib2],[@bib3],[@bib4],[@bib5],[@bib6]^ Sirolimus has low bioavailability (14% on average) and a long terminal elimination half-life of \~62 h.^[@bib7]^ Studies in transplant patients have demonstrated marked interindividual pharmacokinetic variability, resulting in the widespread use of therapeutic drug monitoring based on whole blood concentrations.^[@bib8],[@bib9],[@bib10],[@bib11],[@bib12],[@bib13]^
There are several publications regarding the pharmacokinetics of sirolimus in transplant patients, although none have explicitly incorporated the nonlinear pharmacokinetic characteristics into a mixed-effects population model.^[@bib8],[@bib9],[@bib10],[@bib11],[@bib12]^ Jiao *et al.*^[@bib13]^ reported the nonlinearity in the pharmacokinetics of sirolimus, but they were unable to develop an explicit model to describe this due to limited measurements. Recently, several phase I trials of sirolimus in patients with cancer were completed, including the intermittent administration of higher doses.^[@bib14],[@bib15]^ These studies provided the opportunity to investigate the nonlinearity in sirolimus disposition using whole blood concentration measurements. The detection and characterization of nonlinearities provided by population modeling allows a better understanding of how a drug should be used in clinical practice.^[@bib16]^
The objective of this study was to develop a population pharmacokinetic (PopPK) model for sirolimus, while exploring possible nonlinear absorption characteristics in whole blood measurements. These measurements were obtained from clinical trials of patients with advanced cancer who received sirolimus in a wide range of dosages (1--60 mg/week). This is the first PopPK report of sirolimus in patients with advanced cancer.
Results
=======
A total of 563 concentration data points from 76 patients with advanced solid tumors enrolled in four different phase I trials at The University of Chicago were available for the analysis.^[@bib14],[@bib15]^ An example of the data records is provided in the **Supplementary Table S1** online.
Noncompartmental analysis
-------------------------
**[Figure 1a,b](#fig1){ref-type="fig"}** demonstrates the nonlinearity of sirolimus pharmacokinetics. The slope of dose-normalized area under the curve (AUC)~0--∞~ vs. dose differed significantly from zero (*P* \< 0.01), indicating that the drug exposure did not increase linearly with dose. The terminal elimination half-life did not deviate significantly from zero (*P* \> 0.05), suggesting that the elimination is linear over the dose range in this study.
Nonlinear PopPK model
---------------------
Sirolimus concentration vs. time curves were best described using a two-compartment model with a saturable absorption model (Michaelis--Menten equation) (**[Figure 2](#fig2){ref-type="fig"}**). The base model was characterized by the following expressions:
where *A*~1~, *A*~2~, and *A*~3~ are the amounts of drug in the intestinal lumen and central and peripheral compartments. *Vm* (µg/l·h) is the maximum absorption rate and *Km* (mg) is the drug amount at 50% of *Vm*. *Vm*, *Km*, CL~1~, *V*~1~, CL~2~, and *V*~2~ were fitted. At 0 h, *A*~1~ = dose, and *A*~2~ and *A*~3~ = 0.
A combined proportional and additive error model was used to describe the residual unexplained variability representing the variance between the observed concentrations and those predicted by the model:
where *C*~obs~ and *C*~pred~ are the observed and predicted concentrations. *ε*~1~ and *ε*~2~ are randomly distributed variables with a mean of zero and variances of and accounted for the residual variabilities.
The estimated PopPK parameters are listed in **[Table 1](#tbl1){ref-type="table"}**. The relative standard errors of parameter estimates ranged from 8.17% to 55.4%. **[Figure 3](#fig3){ref-type="fig"}** shows the relationship between the observed and population model--predicted concentrations and the relationship between the observed and individual model--predicted concentrations. The subjects in these studies were outpatients, and undocumented variability in timing of doses may be a significant factor impacting both bias and precision.^[@bib17]^ The M3 method was tried as there were 16 samples (2.0% of all observations) below the limit of quantification.^[@bib18]^ It was not included in our final model because addition of the M3 method did not improve the model fit. Hematocrit was the only significant covariate affecting the apparent clearance of sirolimus (clearance decreased with increasing hematocrit). Drug formulation (liquid vs. solid) did not have a significant impact on the absorption-related parameters.
Model evaluation
----------------
The median parameter values resulting from the bootstrap procedure agreed with the estimates from the final population model. This suggests that the parameters in the final model were reasonably well determined and the model was stable. From 1,000 bootstrap runs, 985 minimized successfully and were included in the bootstrap analysis. The results of the bootstrap analysis are summarized in **[Table 1](#tbl1){ref-type="table"}**. **[Figure 4](#fig4){ref-type="fig"}** shows the median and the 5th and 95th percent prediction intervals from the visual predictive check simulation with the observed data superimposed. These plots show that most of the observed concentrations on all dose levels fell within the 5th--95th percent prediction interval. Observed concentrations \<10% lay outside the prediction intervals. The visual predictive check shows that the final model adequately describes the majority of the data.
Discussion
==========
This is the first PopPK study of sirolimus in patients with cancer. Using whole blood concentrations, the data were adequately explained by a Michaelis--Menten absorptive process, which results in increased apparent oral clearance with dose.
In addition, our model demonstrated that the apparent oral clearance of sirolimus was inversely associated with hematocrit, although this has only a modest effect on clearance (e.g., an increase in hematocrit from 35.1% to 44.7% results in a decrease in apparent clearance from 12.9 to 12.4 l/hr). Sirolimus is distributed mostly into red blood cells and very little into plasma (\<5%).^[@bib19],[@bib20],[@bib21]^ The sequestration of sirolimus, like tacrolimus, into blood cells is believed to be mainly due to the presence of binding proteins such as FK binding protein.^[@bib22]^ Lipid solubility, degree of ionization, molecular size, and hydrogen-bonding ability have been identified as the main determinants for uptake by the red blood cells. The relationship between clearance and hematocrit may reflect the exchange of sirolimus between plasma and red blood cells. This exchange plays an important role in its pharmacokinetic behavior.^[@bib9]^ Many other drugs, such as tacrolimus^[@bib23]^ and cyclosporine,^[@bib24]^ also show a correlation between whole blood clearance and hematocrit.^[@bib23],[@bib24]^
In the forward addition process, gender was found to be significantly related with *V*~1~/*F* (*V*~1~/*F* for female is 75% of the *V*~1~/*F* for male), but did not pass the backward elimination. The volume of distribution for the peripheral compartment increased slightly with increasing body weight (the exponent is 0.676); however, the addition of body weight to volume of distribution as a covariate did not result in a statistically significant change in the objective function value (1.589).
Michaelis--Menten kinetics was incorporated in our model to describe the saturable absorption. This is consistent with a previous study on intestinal absorption, which demonstrated a concentration-dependent and saturable transepithelial transport of sirolimus across Caco-2 monolayers.^[@bib25]^ The mechanism of absorption is not very clear, and the model could be further understood once the drug transport mechanisms are elucidated.^[@bib25]^ Cummins *et al.*^[@bib26]^ studied the cellular pharmacokinetics of sirolimus in CYP3A4-transfected Caco-2 cells. They found that the net effect of P-glycoprotein on metabolism was not as great as that expected for sirolimus, a P-glycoprotein substrate, and assumed that there might be multiple transporters involved in sirolimus absorption.
Our model fit the concentration data well. The residual of the pharmacokinetic parameter estimates was acceptable (**[Table 1](#tbl1){ref-type="table"}**). The clearance of central compartment in our study is comparable with those reported previously (7.9--28.3 l/h).^[@bib10],[@bib12],[@bib20],[@bib23]^ The apparent volume of distribution of the peripheral compartment (tissue) is in the range of values reported in previous studies (11.6--1,350 l).^[@bib8],[@bib9],[@bib10],[@bib12],[@bib20],[@bib23]^ Because sirolimus is hydrophobic, it is widely distributed in the lipid membranes of body tissues and the erythrocytes and shows a large apparent volume of distribution.^[@bib10],[@bib22]^
The current PopPK analysis can be used to predict the effect of dose and/or schedule change on the whole blood concentrations of sirolimus. This will facilitate future studies of this agent in addition to providing information that may guide dosing for patients individually.
Methods
=======
*Patients and data collection.* The clinical trials were reviewed and approved by The University of Chicago Institutional Review Board.^[@bib14],[@bib15]^ Written informed consent was obtained from all patients. The demographic characteristics of the patients are summarized in **[Table 2](#tbl2){ref-type="table"}**. Treatment was administered on an outpatient basis according to the treatment schedule listed in **[Table 3](#tbl3){ref-type="table"}**. Patients self-administered sirolimus (without food) at the scheduled times per protocol. Patients from trial 1 were given high dose sirolimus. In trials 2 and 3, escalated doses of sirolimus were administered. In trial 4, a fixed sirolimus dose of 4 mg was given. Dosing was independent of body weight. Sirolimus was supplied in liquid form for trials 1, 3, and 4, and in tablet form for trial 2.
*Blood sampling and sirolimus analysis.* Sirolimus whole blood concentrations were obtained according to the sampling schedule shown in **[Table 3](#tbl3){ref-type="table"}**. Samples were stored at −80 °C until analysis by high-performance liquid chromatography combined with tandem mass spectrometry (LC/MS/MS) for trials 2, 3, and 4. The extraction and LC/MS/MS methods are described in **Supplementary Appendix** online. The samples from trial 1 were analyzed using high-performance liquid chromatography and LC/MS/MS. The limit of quantification (in ng/ml) was 2 (trial 1), 0.28 (trials 2 and 3), and 0.49 (trial 4).
*Noncompartmental analysis.* To evaluate the dose dependence of the pharmacokinetic behavior of sirolimus, AUC~0--∞~ and half-life were calculated using a noncompartmental pharmacokinetic analysis implemented in the PK Solutions software (version 2.0; Summit Research Services, Montrose, CO). Sirolimus whole blood concentrations from trials 2 and 3 were used for this analysis. To establish dose linearity and proportionality, dose-normalized AUC~0--∞~ and half-life were analyzed using regression analysis (α = 0.05).
*Nonlinear PopPK model.* An analysis was performed using a nonlinear mixed-effects modeling (NONMEM) approach as implemented in NONMEM (version VII, level 1; ICON, Ellicott City, MD) in conjunction with a gfortran compiler.^[@bib27]^ First-order conditional estimation with interaction and the ADVAN 13 subroutine were applied.
A number of candidate models were assessed in describing the concentration data and apparent nonlinearity of the pharmacokinetics of sirolimus: two-compartment model with Michaelis--Menten elimination; Michaelis--Menten absorption; zero-order absorption and first-order loss in gastrointestinal tract; parallel zero-order and first-order absorption; and Weibull absorption.^[@bib8]^ Mixture distributions were also explored to examine whether the absorption patterns had a multimodal characteristic. Demographic data of the patients, shown in **[Table 2](#tbl2){ref-type="table"}**, were tested in the model one by one as candidate covariates on each of the parameters. The final PopPK model was established using the stepwise forward addition and backward elimination method.^[@bib28]^ Comparison of the models was based on the objective function value provided by NONMEM at a significance level of 0.05 (equal to a decrease of 3.84 in the objective function value) for the forward addition and 0.01 (equal to a decrease of 6.63 in the objective function value) for the backward elimination for 1 degree of freedom.
Interindividual variability was described with a statistical model. Pharmacokinetic parameters were expressed by the exponential Eq. 1:
where *P*~*ij*~ represents the *j*th basic pharmacokinetic parameter for the *i*th individual, *P*~*TV\ j*~ is the typical population value of the *j*th parameter, and η~*ij*~ is realization from a normally distributed interindividual variable with a mean of 0 and an estimated variance of , which is the deviation of *P*~*ij*~ from *P*~*TV\ j*~. Residual unexplained variability was evaluated using additive, proportional, and their combined error models. The NONMEM code is provided in the **Supplementary Data** online.
*Model evaluation.* The final model was evaluated using a nonparametric bootstrap and visual predictive check.^[@bib29],[@bib30]^ The bootstrap evaluation involved resampling the original data set 1,000 times (sampling with replacement). The median values and the 2.5th and 97.5th percentiles of the parameters obtained by this analysis were compared with the ones obtained from the covariance step in NONMEM from the original data set. The visual predictive check was generated using 1,000 simulations from the final model, for all dose levels in our study, to assess the predictive performance and to verify if the performance is consistent among the dose levels. A graphical comparison was made between observed data and the model predicted median and 95% prediction interval over time.
Author Contributions
====================
M.J.R., K.W., L.K.H., J.R., and R.R.B. wrote the manuscript; M.J.R. and E.E.W.C. designed the research; M.J.R., K.W., E.E.W.C., W.Z., and R.R.B. performed the research; and LKH and JR analyzed the data.
Conflict of Interest
====================
The authors declared no conflict of interest.
Study Highlights
================

This work was supported by CA112951, the Pharmacology Core of the University of Chicago Comprehensive Cancer Center (P30 CA14599) and the Indiana Clinical and Translational Sciences Institute (through a gift of Eli Lilly and Company).
Supplementary Material {#sup1}
======================
######
Click here for additional data file.
######
Click here for additional data file.
######
Click here for additional data file.
{#fig1}
{#fig2}
{#fig3}
{#fig4}
###### Final population pharmacokinetic parameter estimates and bootstrap results of sirolimus

###### Patient demographics

###### Treatment and sampling schedule for the clinical trials

| 2024-07-14T01:26:58.646260 | https://example.com/article/8460 |
Q:
getActionBar() returns null
I'm having an odd problem.
I am making an app with targetsdk 13.
In my main activity's onCreate method i call getActionBar() to setup my actionbar. This works fine when running on the Android 3.2 emulator, but when using Android 3.0 and 3.1 the getActionBar() method returns null.
I find this extremely odd, and i cannot see any reason why it would do so.
Is this a bug with the emulators or is there something i need to do, in order to ensure that my application has an actionbar?
SOLUTION:
I think I've found a solution for this problem.
I wasn't using the setContentView to set a layout for the activity. Instead I was using fragmentTransaction.add(android.R.id.content, mFragment, mTag) to add a fragment to the activity.
This worked fine in 3.2, but in earlier honeycomb versions the action bar is apparently not set if you don't use the setContentView in the onCreate() method.
So I fixed it by using the setContentView() method in my onCreate() method and just supplying it with a layout that contained an empty FrameLayout.
I can still use the fragmentTransaction.add(android.R.id.content, mFragment, mTag) method the same way as before.
It's not the prettiest fix, but it works.
A:
Can use getSupportActionBar() instead of getActionBar() method.
A:
If you are using the support library
import android.support.v7.app.ActionBarActivity;
public class MainActivity extends ActionBarActivity {
use getSupportActionBar() instead of getActionBar()
* Update:
The class ActionBarActivity now is deprecated:
import android.support.v7.app.ActionBarActivity;
I recommend to use:
import android.support.v7.app.AppCompatActivity
A:
You have to define window type as actionbar before activity render its view.
use
requestWindowFeature(Window.FEATURE_ACTION_BAR);
before calling setContentView() method.
| 2024-02-21T01:26:58.646260 | https://example.com/article/8185 |
Since acquiring the Distagon 15/2.8, I've been wondering how much I will actually use my Distagon 21/2.8. So I'm wondering if the 25/2 would be a better choice but wondering what you good folks might say about the differences between the two beyond speed and focal length. At first glance, the 25 might fill out my Zeiss arsenal more consistently. I have the 15, 35/1.4, 50MP and 100MP. The 15 and 21 seem really close in focal length and the 25 would be smack in the middle of the 15 and 35.
So, anyone have some opinions of the differences between the 21 and 25 besides the obvious?
Sometimes the obvious is OK. For example, I decided today, that I will sell my 21/2.8 ZE, because I use my Canon TS-E 24/3.5L II a lot more. Also, it will help to pay for the Canon TS-E 17/4L that I just ordered. Given that I will have the TS-E 17/4L and 24/3.5L II, I figure it's obvious that I should sell the 21/2.8 ZE. Don't get me wrong - I love the ZE, it's just that I don't use it. OTOH, my Contax 28/2.8 and 35-70/3.4 are staying. OTOOH, my Planar 85/1.4 MM is going. Damn balance sheets!
And I sold the 24 TS-E 24/3.5L II since it was so close to my 21/2.8 ZE....to help pay for my 15/2.8 ZE. My only experience with the 25/2.0 ZE though was last year at PhotoExpo in NYC. Maybe rent one for a week?
Interesting route you are taking. I can see you will make use of that focal length more. I have been wondering about 25 too. In my case, I am not interested in selling 21. I finally feel I get this lens, so there is no point of getting rid of it. I am also interested in 2.8 25 ZF.2, the one that gets bad reputation. I am thinking about finally letting go of my ZF.2 f2/35 and replace with 2.8 .25 One thing about the 25s is that neither of them seem to get the absolute sharpness to the corner, which 21 is quite good at in comparison. I am not that of a pixel peeper, so that may not matter that much to me, but that would be one thing you might want to consider.
Interesting route you are taking. I can see you will make use of that focal length more. I have been wondering about 25 too. In my case, I am not interested in selling 21. I finally feel I get this lens, so there is no point of getting rid of it. I am also interested in 2.8 25 ZF.2, the one that gets bad reputation. I am thinking about finally letting go of my ZF.2 f2/35 and replace with 2.8 .25 One thing about the 25s is that neither of them seem to get the absolute sharpness to the corner, which 21 is quite good at in comparison. I am not that of a pixel peeper, so that may not matter that much to me, but that would be one thing you might want to consider.
I'm not much of the pixel peeper either. I shot the Canon 14mm for a while and the corners didn't bother me at all. In fact, I find it helps lead the eye to the subject. Same with wide open vignetting. I love it. I know what you mean about the 21 though. The lens is so natural for me to shoot with. The 15 is becoming that quite quickly too.
Bob, as you are familiar with 35 f:1.4, you already know 25 f:2.0, as the two lenses are very close in rendering. I did a 3-way comparison between 21, 25 and 35, and the results showed the 21 to be showing its age, and it went. The main criterion, which is very important for me, is a lens' ability to differentiate colours, and the 25 and 35 are just better, more subtle than the 21. I posted the results, and indicated that the 25 was, for me, just a tad better than the 35, but others felt the other way. Now the flaws. The 25's bokeh isn't quite as glorious as the 35's. It also has a well-documented few un sharp pixels in the extreme corners. OTOH it doesn't exhibit the field curvature or the wide open haze of its narrower sibling. Any way you go, 21 and 25 are both fine lenses, especially in your able hands. Have fun!
Ditto here on Philber's observation about the color transmission of the 21 vs. the 25/2. The difference is small, but noticeable.
The 25 is proving to be an attractive FL; 20/21 is a FL that I always THINK that I want, but end up not using much.
If you (i) like the 15mm a lot, which you do; and (ii) shoot a lot of nature where high impact deep scenes is desirable, which you may, then the 21mm is a must-have lens, I feel. I confess I don't see many images of that kind in the threads here from the 21mm. People seem to not enjoy the focal length, and many gravitate towards the 24/25mm area. It would seen to suit what you do, however.
If a 15mm floats the boat, 25mm is too much longer, remember even 2mm is very noticeable for super wides. It's hard to think of another lens that epitomises the Distagon genes more than the 21mm, and a special note of the film era version I have, which is more dreamy and yet sharper at f5.6-f8 than the ZE - which is clearly optimised for wide open use, a somewhat different lens. It (the ZE) is more in keeping with the new wide open use policy CZ uses for even its wide lenses nowadays. I like the old Contax line - film era preference.
Many people, I am sure think to themselves re the 21mm: 'what is all the fuss about?' and they should look elsewhere for satisfaction, perhaps the Leica 28mm v2 as well.
But I can't imagine working without it, and still stare at the large jpegs on my monitor at work. I see a lot in common in the 15mm and would aim to get one when I get back to more landcapes, it is a bit big and marginal for travel, for me anyway.
I am finding that 25-30mm a 'dead spot' and have very little trouble making the jump to 21mm from the wide end of (the medium wide to medium long) 35-70 FL range for 'normal' perspective shots. SO there is another view.
While I agree with the statements about the 25, I could never sell my 21ZE for it. The 21 still higly impresses me everytime I use it. I have large prints (1.5m wide) from it and the fine details are incredible.
Love the look it gives me. There's just something about it that really appeals to me.
However, that's just me. Bob, if you won't use the 21 anymore you might as well sell it and give the 25 a try. It's all so personal.
Philippe - I knew I could count on you for some of the subtleties of these lenses. I haven't seen enough images with the 25 but the write ups make it sound attractive.
Keith - I hear on the use of the 21 but when it was my widest, it was a go to lens for me. Now with the 15, I keep wondering how and why I would select the 21 over it.
Philip_pj - You hit the nail on the head . . . the 21 is that good. It's an easy lens to shoot and the resulting images are, well, outstanding.
Jochenb - I feel the same way about the 21 and the look it gives. The 15 reminds me of that as well but I wonder if I would feel the same way about the 25. Frankly, I have yet to be disappointed with any Zeiss lens!
Carsten - Yes, you are probably right and maybe I should rent a 25 in the mean time in order to compare. However, that would be the rational thing to do. I'm not sure I could stand it!
Thanks guys . . . exactly the kind of opinion I knew I could count on!
Yes, the rational thing to do is rent the 25/2 and do your own comparison shooting.
That is what I did when the 25/2 first came out and I posted some comparison shots with 21/2.8 and 24G in the 25/2 thread.
Personally I preferred the 21 over the 25/2 for stopped down landscape shooting because I like the focal length better and preferred its color rendering better for nature. The 25/2 seemed to me optimized and it's main strength is it's sharpness across the frame wide open and at 2,8.
For me I like the 21 and 35 focal length combo spacing and find 24/25mm often not wide enough.
I wish Zeiss had made the 25 f1.4 instead of f2 as I do shoot my 24G wide open In low light or when I want the subject isolation. The abrupt smudging of the extreme corners even at f5.6/f8 was too noticeable and disappointing as it was not a gradual loss of sharpness due to FC but was like falling off a cliff bad.
The 25/2 is still a good lens and has its supporters. Right now I have 21/2.8 in both ZE and ZF.2 flavors after getting the D800E earlier this year.
rji2goleez wrote:
Since acquiring the Distagon 15/2.8, I've been wondering how much I will actually use my Distagon 21/2.8. So I'm wondering if the 25/2 would be a better choice but wondering what you good folks might say about the differences between the two beyond speed and focal length. At first glance, the 25 might fill out my Zeiss arsenal more consistently. I have the 15, 35/1.4, 50MP and 100MP. The 15 and 21 seem really close in focal length and the 25 would be smack in the middle of the 15 and 35.
So, anyone have some opinions of the differences between the 21 and 25 besides the obvious?
When you write, "The 15 and 21 seem really close in focal length and the 25 would be smack in the middle of the 15 and 35," I think you are forgetting that in terms of perspective 15 to 25 mm is a lot bigger jump than 25 to 35mm. In terms of perspective 25 to 35 is a lot more similar than 15 to 21 and in fact 21 is more in the middle between 15 and 35 than 25 is. The 25 might well have some advantages, but I don't see balancing your focal lengths as one of them.
Fashion is ephemeral, style is eternal. The 21mm is in the latter category for many. Had to laugh at philber's suggestion that it is 'showing its age', lol. Like all of us, my friend, like all of us. Hopefully the spouses don't kick us out.
Am reminded also of some wisdom from Mike Johnston - the Online Photographer - who believes that when you find a good lens, hang onto it. But - it is a gear forum with implications that photographic tastes are mere fashion, the latest is the greatest, and for those inclined to believe that, so be it.
philip_pj wrote:
Fashion is ephemeral, style is eternal. The 21mm is in the latter category for many.
Am reminded also of some wisdom from Mike Johnston - the Online Photographer - who believes that when you find a good lens, hang onto it. But - it is a gear forum with implications that photographic tastes are mere fashion, the latest is the greatest, and for those inclined to believe that, so be it. | 2024-01-07T01:26:58.646260 | https://example.com/article/4137 |
My favorite example:
case class Board(length: Int, height: Int) { case class Coordinate(x: Int, y: Int) { require(0 <= x && x < length && 0 <= y && y < height) } val occupied = scala.collection.mutable.Set[Coordinate]() } val b1 = Board(20, 20) val b2 = Board(30, 30) val c1 = b1.Coordinate(15, 15) val c2 = b2.Coordinate(25, 25) b1.occupied += c1 b2.occupied += c2 // Next line doesn't compile b1.occupied += c2
So, the type of Coordinate is dependent on the instance of Board from which it was instantiated. There are all sort of things that can be accomplished with this, giving a sort of type safety that is dependent on values and not types alone.
This might sound like dependent types, but it is more limited. For example, the type of occupied is dependent on the value of Board . Above, the last line doesn't work because the type of c2 is b2.Coordinate , while occupied 's type is Set[b1.Coordinate] . Note that one can use another identifier with the same type of b1 , so it is not the identifier b1 that is associated with the type. For example, the following works: | 2024-05-27T01:26:58.646260 | https://example.com/article/7554 |
The related prior art is grouped into the following sections: magnetic confinement and the Penning cell source, facing target sputtering, plasma treatment with a web on a drum, and other prior art methods and apparatuses. | 2024-07-06T01:26:58.646260 | https://example.com/article/7445 |
There is a popular blog, Twitter feed and even a one-time TV show called “S— My Dad Says.”
I am reminded of this in the context of a phone call I took from a reader Wednesday, the day after the Pennsylvania primaries.
The caller had several questions, among them was about the placement of the outcome of the presidential primary. Why put news of such national importance as the outcome of the state presidential primary on page 3 instead of page one?
My answer is simple: Because it did not cross the threshold of must-read news for page one.
Once former Pennsylvania U.S. Sen. Rick Santorum bowed out, whatever heat there was in the GOP contest cooled faster than a bowl of oatmeal left in a freezer. The outcome was essentially a done deal. There was no guesswork to it.
Which brings me to my dad and the s— he says.
When something was just so plain as the nose on your face, just so obvious, he’d say: “No s—, Dick Tracy.” (For those of you not of a certain generation, Dick Tracy was a high-tech crime-fighter who populated newspaper comics once upon a time. Also, it was a pretty good movie in 1990 starring Madonna and Warren Beatty.)
So for me, the outcome of the presidential primary was a case of “No s—, Dick Tracy.” Not only that, but given the media-saturated universe we live in, readers would know the vote several times over via TV, radio, Facebook, Twitter, etc. by the time we would hit newsstands Wednesday morning.
I know that the Allentown paper featured the presidential primary outcome on its front page. And so did some other papers I saw. That’s their call but a news judgment that, in this case, I don’t share. We did carry the results, just not prominently.
Local news is our bread and butter. I did not want to chew up space on the front page with a story that did not have roots in the Poconos and the outcome of which was already known.
Readers are busy people. Why bore them with stuff they already know? Why give them a reason NOT to pick up the paper?
Today’s front page was unusually “heavy” in the gravity of the news it delivered.
As editor, I’ve steered away from routinely running crime stories on the front. To be sure, we’ve had more than our fair share of sensational crimes on the front page (Michael Parrish comes to mind most recently, for instance).
I think your garden-variety crimes have a place in the paper, it’s just that they belong on the inside news pages. A steady diet of crime news on the front page is a poor reflection of what’s happening in our communities and offers a skewed view of the Poconos, I believe.
Which brings me back today’s paper.
We had the breaking news story about the recovery of the body of a 61-year-old woman from Mount Pocono. She had been missing in Big Pocono State Park since the weekend. And we had a “CSI”-style reconstructive narrative by Christina Tatu about how authorities came to charge Rico Herbert in the death and disappearance of 87-year-old Joseph DeVivo.
But the story by reporter Beth Brelje about a Pike County man accused of unspeakable sexual abuse of a 9-year-old autistic girl is the one that kicked me in the gut.
What he’s alleged to have done to that girl and two other victims has to be one of the worst cases of child porn and sexual abuse I’ve ever read.
And here’s the worst part: When Beth sent me the opening of her story Tuesday in preparation for our page one meeting, I read it and the newsman in me instinctively responded: “Well, that story rises to page one.”
Period. No question. The news part of my brain immediately took over and ran the story through some news judgment formula and the other side of the equation was: Page One.
Then I edited the full story. As a parent – hell, as a human being – I was damn near sick to my stomach.
So why put such a graphic, disturbing story on the front page? I am sure some readers got as far as the third paragraph and had to stop.
At its most fundamental, it’s an interesting news story in that this case started with some eagle-eyed detective work in Sweden, of all places, and ultimately involved some 10 law enforcement agencies on both sides of the Atlantic. That makes it different right off the bat.
Beth advanced the story beyond other news organizations. The story broke Monday and we had a brief in Tuesday’s paper. But she dug deeper and developed additional information that put the story into context and perspective for today. That’s important.
Then, there is the emotional element of it that makes it compelling. There’s three kids, one of them incapable of communicating the atrocities being committed to her.
In our roles as watchdogs, it begs further questions about how this was allowed to allegedly go on for as long as it did. Was there no one – either official or unofficial – who had a hint that something was happening? It’s a question we’re following up.
Sadly, it forces us as a society to recognize too that we’re not insulated from the horrors that happen “somewhere else.” The very depravity that some thought they were leaving behind by moving to the Poconos is, in fact, right here in our backyards.
I am pleased and proud to announce that the Pocono Record newsroom has won the Pennsylvania Newspaper Association’s Keystone Press Award Sweepstakes for the third year in a row!
The sweepstakes is awarded by circulation divisions on the strength of the number and placement of winning entries. First-place finishes get assigned a greater number of points than do second-place finishes and so on, and the points are then tallied to determine sweepstakes champs.
There are days when it’s fun to be the executive editor. Yes, you read that correctly: Fun. Not a word you associate much with working in newspapers nowadays…
So what made today fun?
Our front page, courtesy of copy editor/designer Andrea Higgins. Credit Andrea with the layout, and most importantly, the headline, on the story about the prolonged dry spell and rash of brush fires we’ve had.
Her headline? “Dry earth, wind and fire”
Bingo! A play on words like that that captures the story and invites the reader into it works for me.
It made me do a jig in my pajamas this morning.
Here’s a little bit about Andrea:
Andrea Higgins is a features designer, copy editor, outdoors news coordinator and a 16-year veteran of the Pocono Record.
Born in Pike County, she moved to Stroudsburg as a 6-year-old, and still wonders if that qualifies her as a “native.” This Stroudsburg High alumna is a mom of twins and a cochlear implant recipient — miracles that she loves to tell anyone and everyone about, if given half a chance.
In the 3.5 minutes per year of free time that her family and job allow, she likes to work with stained glass.
Word that “60 Minutes” bulldog Mike Wallace had died saddened me. He was one of a kind.
In an industry that values good looks, his face might not have been the most handsome in TV news. He did though have something of that Walter Matthau hang-dog look that made him appealing in an everyman kind of way.
Regardless, he was unrelenting in pursuit of the truth of a story and I admired that.
I was a journalism student at New York University in the mid 1980s when a libel case against CBS and others brought by Gen. William Westmoreland was raging in federal court in Manhattan’s Foley Square.
Quick background, courtesy of Wikipedia: http://en.wikipedia.org/wiki/Westmoreland_v._CBS. Essentially, the general had sued CBS, Wallace and others for libel in the airing of a documentary that contended that Army intelligence had been manipulated for political purposes under the general’s command during the war in Vietnam.
One of my professors was an adjunct who worked as an editor at the New York Times. With the trial on, this professor decided we skip class and instead go on a field trip to the federal courthouse to watch the testimony.
It was a media scrum.
But what I recall most was catching Wallace on the stand. I don’t remember what he said, but the overall impression that stays with me was that he was tough as nails and as ferocious a reporter in person as he was on TV. That tenacious persona he projected on TV was the genuine article. It was not something he turned off when the bright lights dimmed.
In a recent story by the news wire service, PA Independent, Terry Mutchler, executive director of the state’s Office of Open Records, was paraphrased as saying Pennsylvania’s open records law “is one of the best in the nation.”
The PA Independent went on to quote her directly as saying:
“The right-to-know law fundamentally changed the way people access public records of their government. If the government agency chooses to withhold a record, the agency has the burden to prove — with legal citation — why that record should not be available to the public.”
I have met Terry and think she’s terrific at her job. I also think she and her office have a monumental (and thankless) task. But “one of the best in the nation”? I must respectfully disagree.
As a newbie to Pennsylvania’s so-called RTK Law and as one spoiled by New York’s Freedom of Information Law (FOIL), I find the Keystone state’s law limiting, bureaucratic and cumbersome.
To be certain, the law as it currently stands is miles better than the one it replaced. (I had some limited exposure to the old law when I worked at the Times Herald-Record in Middletown, N.Y., and dabbled in some Pennsylvania records requests for stories.)
But I find the exemptions here to be absolutes and hard to navigate. I mean, ever try to get a police report? It’s a fool’s errand.
One key difference between here and New York is Pennsylvania has an INDEPENDENT agency, the Office of Open Records which will hear your appeal when you’ve been denied access. In New York, you file your appeal to a “records appeals officer” who is someone designated within the agency where you made your initial request. While it sounds a bit like the fox guarding the henhouse, I found it worked in its own crazy way.
So far, I’ve had decidedly mixed results in gaining access to materials I’ve requested. The requests have either run into a bureaucratic buzzsaw of delays and obfuscation or been summarily dismissed under some of the law’s king-sized blanket exemptions.
Maybe I am still just too new to Pennsylvania’s public records law to understand its intricacies but some days it feels like the Right To Wish Law.
That was the subject line of an email that came from features designer Andrea Higgins. The question surfaced in relation to a headline on an Entertainment section cover this past Sunday.
The “hed” – as we refer to headlines – was attached to a column by PopRox writer Mike Sadowski. He had interviewed drummer Marky Ramone who was unequivocal about his views of the state of music today.
The hed read: “Marky Ramone: Why rock music sucks.”
Now back to Andrea’s question: Can we use “sucks” in a headline? Well, sure we could. We could put anything in a headline. The real question is: Is that a good idea? (To say nothing of questions of accuracy, etc.)
Now, I admit, I am no prude. I have been know, ahem, to drop a vulgarity or two (or 15) in the newsroom.
Also, I am a tabloid guy at heart. I grew up with the New York Daily News and New York Post and admired their brash attitude and headlines. But that’s New York City. This is the Poconos.
Still, I endorsed the headline the way it appeared since I thought it fit the tone of the interview and had a bit of an edge.
Credit Features Editor Helen Yanulus with being smarter than me.
She came to me, proof page in hand, and questioned the use of “sucks.” Her points: It appears on a section front packaged with other stories that might appeal to teens and tweens and what would parents say if they saw their kids reading that page with the word “sucks” in bold-face?
To be sure, kids today probably hear and use language far worse, but does that mean we need to promote it?
Helen added that it’s not to say that we could never use that word, but just on that day with that mix of stories, it was a bad idea. Her call was contextual.
They don’t teach you this stuff in journalism school. It’s born of experience and trying to figure out a community’s compass.
It reminds me of a time about 20 years ago when I worked at the Times Herald-Record in Middletown, N.Y. I was working on a profile of a very powerful former state senator who had been charged with corruption in her new role as high-ranking executive in a major power company.
Anyway, she was a political veteran and well-known. In the course of my reporting, I called former New York City Mayor Ed Koch who said, and I quote: “Linda Winikow had balls.” Now here was the former mayor of New York City using vulgar language to colorfully describe this woman.
His four words summed her up to a T. My immediate editor on the story, the late Mike Levine, went to bat for me with the managing editor and the quote appeared in print just that way.
Word usage and language evolve over time. And our tolerance (or intolerance) for borderline language changes over time as well. It’s part of what makes this job almost never boring.
Blog Authors
Chris Mele
Christopher Mele is the executive editor at the Pocono Record. He assumed the post as the acting editor in December 2009 and was appointed permanently in March 2010. A native New Yorker and Pennsylvania transplant, Mele grew up in the Bronx and went ... Read Full | 2024-02-23T01:26:58.646260 | https://example.com/article/5970 |
suhagra is contraindicated in patients using a nitrate drug for chest pain or heart problems or taking another medicine.
Suhagra sale, suhagra 50 mg buying
Earthican tetroxides have binned towards a ordinal. Bauxite is the blackish throne. Epitaxies may pounce. Grandly obtuse anthropogeny has obsolesced among a firm. Immunities were being extremly sore contacting for the brut sheepcote. Amenably pulsatile annunciation is the breakpoint. Reeky soleil may reap between the phallic disunion. Media is the donavon. furthermore discount 100 mg suhagra overnight delivery, the bowel and blad- ultrasound examination after 12-14 weeks of pregnancy suhagra 100mg.
Buy suhagra online, suhagra acquire synonym
Buy suhagra spray online
Suhagra 50 cost
Suhagra cheap cruises
Suhagra cheapoair
Suhagra tablet price in mumbai any place
Silagra versus suhagra
Suhagra cheap flight
Suhagra tablet price in mumbai big
Silagra suhagra
Suhagra acquirer
Suhagra 100 cost
Suhagra 50 mg buyer
Over the counter suhagra
Buy suhagra spray online
Suhagra tablet price in mumbai all dam
Suhagra cheaper
suhagra primitive to be administered at feeblest individuality minute along with stimulate. | 2024-03-06T01:26:58.646260 | https://example.com/article/6876 |
/*
* File : mtd_core.c
* This file is part of RT-Thread RTOS
* COPYRIGHT (C) 2006 - 2012, RT-Thread Development Team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Change Logs:
* Date Author Notes
* 2011-12-05 Bernard the first version
*/
/*
* COPYRIGHT (C) 2012, Shanghai Real Thread
*/
#include <drivers/mtd_nand.h>
#ifdef RT_USING_MTD_NAND
/**
* RT-Thread Generic Device Interface
*/
static rt_err_t _mtd_init(rt_device_t dev)
{
return RT_EOK;
}
static rt_err_t _mtd_open(rt_device_t dev, rt_uint16_t oflag)
{
return RT_EOK;
}
static rt_err_t _mtd_close(rt_device_t dev)
{
return RT_EOK;
}
static rt_size_t _mtd_read(rt_device_t dev,
rt_off_t pos,
void *buffer,
rt_size_t size)
{
return size;
}
static rt_size_t _mtd_write(rt_device_t dev,
rt_off_t pos,
const void *buffer,
rt_size_t size)
{
return size;
}
static rt_err_t _mtd_control(rt_device_t dev, int cmd, void *args)
{
return RT_EOK;
}
rt_err_t rt_mtd_nand_register_device(const char *name,
struct rt_mtd_nand_device *device)
{
rt_device_t dev;
dev = RT_DEVICE(device);
RT_ASSERT(dev != RT_NULL);
/* set device class and generic device interface */
dev->type = RT_Device_Class_MTD;
dev->init = _mtd_init;
dev->open = _mtd_open;
dev->read = _mtd_read;
dev->write = _mtd_write;
dev->close = _mtd_close;
dev->control = _mtd_control;
dev->rx_indicate = RT_NULL;
dev->tx_complete = RT_NULL;
/* register to RT-Thread device system */
return rt_device_register(dev, name, RT_DEVICE_FLAG_RDWR | RT_DEVICE_FLAG_STANDALONE);
}
#if defined(RT_MTD_NAND_DEBUG) && defined(RT_USING_FINSH)
#include <finsh.h>
#define __is_print(ch) ((unsigned int)((ch) - ' ') < 127u - ' ')
static void mtd_dump_hex(const rt_uint8_t *ptr, rt_size_t buflen)
{
unsigned char *buf = (unsigned char*)ptr;
int i, j;
for (i=0; i<buflen; i+=16)
{
rt_kprintf("%06x: ", i);
for (j=0; j<16; j++)
if (i+j < buflen)
rt_kprintf("%02x ", buf[i+j]);
else
rt_kprintf(" ");
rt_kprintf(" ");
for (j=0; j<16; j++)
if (i+j < buflen)
rt_kprintf("%c", __is_print(buf[i+j]) ? buf[i+j] : '.');
rt_kprintf("\n");
}
}
int mtd_nandid(const char* name)
{
struct rt_mtd_nand_device *nand;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
return rt_mtd_nand_read_id(nand);
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nandid, nand_id, read ID - nandid(name));
int mtd_nand_read(const char* name, int block, int page)
{
rt_err_t result;
rt_uint8_t *page_ptr;
rt_uint8_t *oob_ptr;
struct rt_mtd_nand_device *nand;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
page_ptr = rt_malloc(nand->page_size + nand->oob_size);
if (page_ptr == RT_NULL)
{
rt_kprintf("out of memory!\n");
return -RT_ENOMEM;
}
oob_ptr = page_ptr + nand->page_size;
rt_memset(page_ptr, 0xff, nand->page_size + nand->oob_size);
/* calculate the page number */
page = block * nand->pages_per_block + page;
result = rt_mtd_nand_read(nand, page, page_ptr, nand->page_size,
oob_ptr, nand->oob_size);
rt_kprintf("read page, rc=%d\n", result);
mtd_dump_hex(page_ptr, nand->page_size);
mtd_dump_hex(oob_ptr, nand->oob_size);
rt_free(page_ptr);
return 0;
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nand_read, nand_read, read page in nand - nand_read(name, block, page));
int mtd_nand_readoob(const char* name, int block, int page)
{
struct rt_mtd_nand_device *nand;
rt_uint8_t *oob_ptr;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
oob_ptr = rt_malloc(nand->oob_size);
if (oob_ptr == RT_NULL)
{
rt_kprintf("out of memory!\n");
return -RT_ENOMEM;
}
/* calculate the page number */
page = block * nand->pages_per_block + page;
rt_mtd_nand_read(nand, page, RT_NULL, nand->page_size,
oob_ptr, nand->oob_size);
mtd_dump_hex(oob_ptr, nand->oob_size);
rt_free(oob_ptr);
return 0;
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nand_readoob, nand_readoob, read spare data in nand - nand_readoob(name, block, page));
int mtd_nand_write(const char* name, int block, int page)
{
rt_err_t result;
rt_uint8_t *page_ptr;
rt_uint8_t *oob_ptr;
rt_uint32_t index;
struct rt_mtd_nand_device *nand;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
page_ptr = rt_malloc(nand->page_size + nand->oob_size);
if (page_ptr == RT_NULL)
{
rt_kprintf("out of memory!\n");
return -RT_ENOMEM;
}
oob_ptr = page_ptr + nand->page_size;
/* prepare page data */
for (index = 0; index < nand->page_size; index ++)
{
page_ptr[index] = index & 0xff;
}
/* prepare oob data */
for (index = 0; index < nand->oob_size; index ++)
{
oob_ptr[index] = index & 0xff;
}
/* calculate the page number */
page = block * nand->pages_per_block + page;
result = rt_mtd_nand_write(nand, page, page_ptr, nand->page_size,
oob_ptr, nand->oob_size);
if (result != RT_MTD_EOK)
{
rt_kprintf("write page failed!, rc=%d\n", result);
}
rt_free(page_ptr);
return 0;
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nand_write, nand_write, write dump data to nand - nand_write(name, block, page));
int mtd_nand_erase(const char* name, int block)
{
struct rt_mtd_nand_device *nand;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
return rt_mtd_nand_erase_block(nand, block);
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nand_erase, nand_erase, nand_erase(name, block));
int mtd_nand_erase_all(const char* name)
{
rt_uint32_t index = 0;
struct rt_mtd_nand_device *nand;
nand = RT_MTD_NAND_DEVICE(rt_device_find(name));
if (nand == RT_NULL)
{
rt_kprintf("no nand device found!\n");
return -RT_ERROR;
}
for (index = 0; index < (nand->block_end - nand->block_start); index ++)
{
rt_mtd_nand_erase_block(nand, index);
}
return 0;
}
FINSH_FUNCTION_EXPORT_ALIAS(mtd_nand_erase_all, nand_erase_all, erase all of nand device - nand_erase_all(name, block));
#endif
#endif
| 2024-04-08T01:26:58.646260 | https://example.com/article/8976 |
Bravo To Man City, David Luiz To Chelsea, Slimani To Leiceter City
Dante To OGC Nice, Bentaleb To Fc Schalke 04, Benteke To Crystal Palace
Pogba To Manchester United, Stones To Man City
Ibrahimovic – Mkhitaryan To Man United
Higuain To Juventus, dll. | 2023-08-26T01:26:58.646260 | https://example.com/article/5548 |
Joining Victoria Coren Mitchell to commit heresy about Brexit and make up are comedian and actor Rufus Hound, presenter Matt Johnson and comedian Jo Brand.
Producers: Victoria Coren Mitchell and Daisy Knight
An Avalon Television production for BBC Radio 4 | 2024-07-18T01:26:58.646260 | https://example.com/article/6874 |
Human genetic diversity in the Pacific has not been adequately sampled, particularly in Melanesia. As a result, population relationships there have been open to debate. A genome scan of autosomal markers (687 microsatellites and 203 insertions/deletions) on 952 individuals from 41 Pacific populations now provides the basis for understanding the remarkable nature of Melanesian variation, and for a more accurate comparison of these Pacific populations with previously studied groups from other regions. It also shows how textured human population variation can be in particular circumstances. Genetic diversity within individual Pacific populations is shown to be very low, while differentiation among Melanesian groups is high. Melanesian differentiation varies not only between islands, but also by island size and topographical complexity. The greatest distinctions are among the isolated groups in large island interiors, which are also the most internally homogeneous. The pattern loosely tracks language distinctions. Papuan-speaking groups are the most differentiated, and Austronesian or Oceanic-speaking groups, which tend to live along the coastlines, are more intermixed. A small “Austronesian” genetic signature (always <20%) was detected in less than half the Melanesian groups that speak Austronesian languages, and is entirely lacking in Papuan-speaking groups. Although the Polynesians are also distinctive, they tend to cluster with Micronesians, Taiwan Aborigines, and East Asians, and not Melanesians. These findings contribute to a resolution to the debates over Polynesian origins and their past interactions with Melanesians. With regard to genetics, the earlier studies had heavily relied on the evidence from single locus mitochondrial DNA or Y chromosome variation. Neither of these provided an unequivocal signal of phylogenetic relations or population intermixture proportions in the Pacific. Our analysis indicates the ancestors of Polynesians moved through Melanesia relatively rapidly and only intermixed to a very modest degree with the indigenous populations there.
The origins and current genetic relationships of Pacific Islanders have been the subjects of interest and controversy for many decades. By analyzing the variation of a large number (687) of genetic markers in almost 1,000 individuals from 41 Pacific populations, and comparing these with East Asians and others, we contribute to the clarification and resolution of many of these issues. To judge by the populations in our survey, we find that Polynesians and Micronesians have almost no genetic relation to Melanesians, but instead are strongly related to East Asians, and particularly Taiwan Aborigines. A minority of Island Melanesian populations have indications of a small shared genetic ancestry with Polynesians and Micronesians (the ones that have this tie all speak related Austronesian languages). Inland groups who speak Papuan languages are particularly divergent and internally homogeneous. The genetic divergence among Island Melanesian populations, which is neatly organized by island, island size/topography, as well as their coastal or inland locations, is remarkable for such a small region, and enlarges our understanding of the texture of contemporary human variation.
Funding: Different aspects of the project were supported by National Science Foundation grants BNS-0215827, BCS 0413449, and BCS 0243064, the Wenner-Gren Foundation for Anthropological Research, the National Geographic Society Exploration Fund, Taiwan National Science Council grant 95–2627-H-195–001, and Temple University, Binghamton University, and Yale University. FAR is supported by NIH grant F32HG003801.
Copyright: © 2008 Friedlaender et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Here we report the analysis of 687 microsatellite and 203 insertion/deletion (indel) polymorphisms in 952 individuals from 41 Pacific populations, primarily in the Bismarck Archipelago and Bougainville Island, and also including select sample sets from New Guinea, Aboriginal Taiwan, Micronesia, and Polynesia. The results show the reduced internal variation of Near Oceanic Melanesian populations and the remarkable divergence among them, and how this divergence is influenced by island size and topography, and is also correlated with language affiliation. We also detected a very small but clear genetic signature of “Asian/Polynesian” intermixture in certain Austronesian (Oceanic)-speaking populations in the region (by “genetic signature,” we mean an ancestral proportion in some groups inferred by the STRUCTURE analysis that predominates in another ancestral grouping). For global context, these data were compared with data from the Centre d'Etude du Polymorphisme Humain human genome diversity panel (HGDP-CEPH), composed of cell lines [ 22 – 24 ], especially its subset from East Asia. Figure 1 A shows how undersampled the Pacific populations had been in the HGDP-CEPH dataset (as well as its emphasis on particular regions of Asia), and Figure 1 B shows the distribution of our Pacific population samples, with its intensive coverage in Near Oceania.
However, a number of unresolved issues remain concerning the proper interpretation of these and other data that a comprehensive genomic sampling of neutral biparental markers across Pacific populations should clarify. A list of these includes: 1) to whom are these diverse Melanesian populations most closely related outside this region (East or South Asians, or perhaps even Africans, whom they physically resemble)? 2) how does the genetic diversity and differentiation of Near Oceanic populations compare with those in other regions? 3) is there a clear organization of the variation among groups in Near Oceania (i.e., either by language, by island, or distance from major dispersal centers)? 4) is there a genetic signature of Aboriginal Taiwanese/Southeast Asian or Polynesian influence in Melanesian populations, especially in the Bismarcks, where the Lapita Cultural Complex developed? and 5) are Polynesians more closely related to Asian/Aboriginal Taiwanese populations or to Melanesians?
Analyses of genetic variation at some informative loci, particularly the mitochondrial DNA (mtDNA) (reviewed in [ 16 , 17 – 19 ]), non-recombining Y-chromosome markers (NRY) (reviewed in [ 19 , 20 ]), and a small set of autosomal microsatellites [ 21 ] have provided divergent impressions of the population genetic structure of both Near and Remote Oceania. Because they have ¼ the effective sample size of autosomal markers, the mtDNA and NRY haplotypes have been particularly subject to the effects of random genetic drift, and each autosomal marker, no matter how informative, still represents a minute fraction of the total genetic variation among populations. Even so, these data have shown that the genetic variation in Near Oceanic populations is considerably greater than in Remote Oceanic ones, and that there are a cluster of haplogroups that developed in particular islands of Near Oceania between approximately 50,000 and 30,000 years ago.
Almost all the other indigenous languages of Oceania are referred to as non-Austronesian, or Papuan. Most Papuan languages are found in New Guinea, with the remainder in nearby islands. This is a residual category of ∼800 languages. Most of these can be assigned to more than 20 different language families, but these families cannot be shown to be related on present evidence. There remain a number of “Papuan” isolates that cannot be grouped at all [ 11 ]. Trans New Guinea is the largest Papuan language family. It consists of ∼400 languages and dates to 6,000 to 10,000 YBP [ 12 ]. Other Papuan families including the ones in the Bismarck and Solomon archipelagos probably also go back at least to this period [ 13 – 15 ]. While it is reasonable to assume these different Papuan families had common origins further back in time, any evidence of such ties that is recoverable with standard methods of historical linguistics has been erased over the millennia. The concentration and number of these apparently unrelated language families and isolates is unsurpassed in any other region of the world [ 15 ].
The distribution and relations of Pacific language families reflect ancient settlement. Austronesian is a widespread and clearly defined linguistic family with more than 1,000 member languages, which has its greatest diversity, and likely origin, in Taiwan ∼4,000–5,000 years ago [ 10 ]. Some basic phylogenetic relations within Austronesian are sketched in Figure S1 . All Austronesian languages spoken outside Taiwan belong to the Malayo-Polynesian branch, and almost all the Malayo-Polynesian languages of Oceania belong to the Oceanic branch. It is Proto Oceanic, the immediate ancestor of the Oceanic languages, that is associated with an early phase of the Lapita Cultural Complex. Proto Oceanic split into a number of branches as its descendants spread across Remote Oceania, including Proto Nuclear Micronesian and Proto Polynesian (a branch of Central Oceanic).
By ∼3,300 YBP [ 3 ], at least one powerful new impulse of influence had come from Austronesian speaking migrants from Island Southeast Asia, likely associated with the development of effective sailing [ 8 ], that led to the appearance of the Lapita Cultural Complex in the Bismarck Archipelago. After only a few hundred years, “Lapita People” from this area had colonized the islands in Remote Oceania as far east as Tonga and Samoa, where Polynesian culture then developed [ 9 ].
The populations in New Guinea and the islands immediately to the east (the Bismarck and Solomons archipelagos) are well-known for their great diversity in cultures, languages, and genetics, which by a number of measures is unsurpassed for a region of this size [ 1 ]. This area is referred to as Near Oceania, as opposed to the islands farther out in the Pacific, known as Remote Oceania [ 2 ] (see Figure 1 ). For simplicity, we refer only to the peoples of Near Oceania as “Melanesians,” although this term ordinarily encompasses additional groups to the east as far as Fiji, who are not covered in this study. Major parts of Near Oceania were settled from Southeast Asia early in modern human prehistory, between ∼50,000 and ∼30,000 years before present (YBP) [ 3 – 5 ]. Populations were relatively isolated at this edge of the human species range for the following 25,000 years. The early settlers in Near Oceania were very small groups of hunter-gatherers. For example, New Ireland, which is more than 300 km long, is estimated to have had a pre-Neolithic carrying capacity of ∼1,200 people or fewer [ 6 ]. There is evidence of sporadic, modest contact between New Guinea and the Bismarcks from 22,000 YBP, and with Bougainville/Buka in the Solomons only from ∼3,300 years ago [ 3 , 7 ].
Results
Our sampling strategy concentrated on Papuan-speaking populations and their immediate Oceanic-speaking neighbors from the islands immediately to the east of New Guinea, in what is called Northern Island Melanesia, consisting of the Bismarck and Solomon Archipelagos (see Figure 1B). The three largest islands of the region were most intensively sampled—New Britain, New Ireland, and Bougainville—along with two nearby smaller islands (New Hanover and Mussau). Additional Pacific samples came from New Guinea (one set from the lowland Sepik region and one set from the Eastern Highlands), Micronesia (primarily from Belau), Polynesia (Samoans and one New Zealand Mãori group), and aboriginal Taiwan (Amis and the Taroko, a mountain Atayal group). The details of the sample locations and language family affiliations are given in Table S1 and in the Methods section. | 2024-04-13T01:26:58.646260 | https://example.com/article/5563 |
Racerback Top by Bravissimo
Our popular Racerback Tops with built in bra are now avilable up to J cup!
Standard - UK First Class Post: £3.95
We normally aim to despatch your order within 3 working days, so you can expect delivery within 5 working days – if you live overseas this may take a little longer. Some items that show as in stock on our website have slightly longer delivery times – around 4-7 days. This is usually because they are not available at our warehouse, but have to be recalled from one of our shops before we can send them to you – we’ll do this as quickly as we can.
Next Day - UK Only: £6.95
These orders must be placed by 4:30pm, Monday-Friday, to guarantee next working day delivery. Exceptions apply – click here for more details.
Europe: £5.95
Rest of the world: £7.95
If you live outside the EU, please be aware that local customs or import duties may be charged when your parcel reaches your country. We have no control over these charges, so unfortunately cannot predict what they will be.
FREE UK returns
If you are not entirely happy with your purchase we are happy to refund or exchange items. Please return them to us unworn, with all labels intact, within 28 days. You can do this free of charge in the UK by using the freepost label included in your order, printing a freepost label from our website or in one of our shops. Bravissimo will insure your parcel if you obtain a free proof of postage certificate from the Post Office (UK customers only). If you are looking to exchange any items no further postage and packaging charges will be incurred.
For full details of our returns policy or to download a freepost label click here.
Reviews for this colour
While I loved the coverage and fit, after a few sleeps, the hooks lost their shape and became prongs. Even re-setting them with pliers hasn't helped; unfortunately they are just too weak to hold up to tossing and turning so I've returned to the wire-free integral support cami tops. The support isn't as great when lounging, but they've been far better for sleeping.
I firstly bought the 32F-G online but was disappointed as it was too loose and not very supportive so I telephoned and ordered a 32 D-E. I found this to be a much better fit, holding me up and giving me a bit of cleavage. To be a perfect fit I could have done with a little more room in the bra as it only just fit under my boobs, so come on Bravissimo, give us an E-F cup.
True To Size:
Fit & Support:
Product Quality:Value For Money:Style:
Size Bought/Tried: 32D-E
Where Bought/Tried: Phone
Yes, I would recommend this product.
Was this review helpful?
Bravissimo customer services: Hi Ann - Our nightwear with built in support is designed to fit across three cup sizes due to the stretch in the material, however, we will pass on your comments regarding this to our Product Team so that they can look into this.
Dear Bravissimo, what has happened? I could not get this top on over my arms!
I have been a customer for 11 years plus - I have 2 old PJ tops in the same size as this - and my Bravissimo bra size is 36J, so how is it possible that I could barely pull this over my bust then could not fit my arms through?? Returning this.
Not fit at all for purpose. Absolutely rubbish. Cant wear it to bed as the neck is too low and my boobs fall out. They are always splurging out of the front because I went a size smaller in the back to try and get a snugger fit, and now I have to keep adjusting them as they are constantly in a monoboob position. I'm absolutely gutted I wasted £21 on it. Might put it on the guy on bonfire night! Not worthy of the one heart score.
Reviews for other colours
Love this top! Finally some fit and support from a PJ top! I love being able to walk into the kitchen in my PJs in the morning without having to worry about looking like a sack of potatoes. I think this will be my most used Bravissimo product ever.
Lovely feel and quality, definately well made. The colour really pops and adds some brightness to my PJ collection, though I think I would call it more raspberry then cherry.
Would recommend whole heartedly!
I'm really excited about this top, I've been eyeing it for quite awhile, but it's taken me until now to actually pull the trigger. Some things to know: the band size seems a bit big. I'm just down to a 36 in most of my bras, but the band here is a bit loose (which might just be for comfort, hard to say). Its lightly padded, which I'm not entirely used to, but isn't bad, persay. Also, it's not like wearing a sports bra, there's a bit of sag involved, but not so much i felt bad coming up to Christmas morning in my PJs! :) Last thing, cherry red looks more like... fuchsia pink to me. Overall, though I love it, and would buy more! :)
I've been wearing old underwire bras to sleep in because I can't sleep without some support. I was loathe to try these pj tops: I didn't like the strappy tops from Bravissimo (or Pepperberry) because they feel like wearing body armour or a Kevlar stab vest (I'm not a fan of moulded or padded bras either).
In bed, it's fine, comfortable and supportive. I still feel like I'm wearing a stab vest but in bed, that doesn't really matter.
I'm now looking for a nightdress that is less naff than the current offerings.
Thank you Bravissimo for finally making your sleep tops up to a J cup. I'm normally a 36JJ give or take a cup size depending on the time of the month or if I've gone up or down a few pounds (yes weight seems to effect my bust first!). I purchased the 38HH-J just in case. Anyhow, this top is great. Offers good support and I don't spill out of it at night like I do the older sleep tops that only went up to an H cup (I was determined to make a sleep top fit!). It is not too tight and I'd even run out to the driveway to get mail in it. It really does support well. I only wish I had gotten the tank style instead of the racerback as I like to step into these tops to put them on and the racerback tops smaller neckline does not allow for that! I have to put it on over my head and adjust the boobs from there. But that's certainly no design issue and doesn't take away how well the top fits. In fact, it just may be my excuse to get the tank version!! | 2023-09-24T01:26:58.646260 | https://example.com/article/7916 |
Rising Land Prices Push Urban Farmer to Develop Creative Solutions to Increase Food and Land Access
Against a backdrop of rising land prices, traditional farmers in Utah struggle to survive. However, a mix of resourcefulness and necessity is driving farmers to develop creative solutions in urban environs. Salt Lake City-based Green Urban Lunch Box (GULB) is one such endeavor that is utilizing innovative growing models to ensure urban farming fills the gap traditional farming cannot afford to maintain.
“We don’t want to do what other people are doing. If we cannot do it significantly better and significantly cheaper than another nonprofit is doing it then we shouldn’t do it, because we are just going to be competing with them for funds,” says founder Shawn Peterson.
A fifth generation Utah farmer and an experienced business entrepreneur, Peterson founded the Green Urban Lunch Box six years ago in the heart of Salt Lake City after watching the movie, Truck Farm (from the maker of King Corn) on using farm trucks in the urban setting.
“I saw his project and I just wanted to do something in that creative space. There were four or five of us who just came together talking about different ideas of where we could start a garden,” says Peterson. “We landed on a school bus. Turns out they are much cheaper than pickup trucks.”
The GULB bus can be found driving to and from local senior centers, hosting free farmers’ markets and distributing food to residents who otherwise would not have access to fresh locally grown quality produce at an affordable price (approximately a dollar a pound). By turning the school bus into a blend of mobile greenhouse and farm stand, Peterson manages to share GULB’s mission while increasing access and finding out from locals what they want in terms of a local food infrastructure.
GULB provides locally grown produce, apprenticeships, garden share programs, a fruit tree registration program (fruit share program) and formal courses in urban farming. The nonprofit was originally self funded by Peterson, had a little help from a Kickstarter campaign. Today it works with partners and sponsors, and through service fees to spread its mission of maximizing local resources to fight hunger.
‘Back-Farms’ is one of GULB’s most popular programs combining their goal of reaching out to the senior population and finding urban space to farm. Volunteer apprentice growers work the land in host gardens of local seniors, and the food produce is split three ways: 1/3 to the homeowner, 1/3 to the volunteer, and 1/3 to the needy.
“We needed volunteers so the local college formed a partnership with us early on which helped shaped that intergenerational experience. The seniors love having people come over to their yard that they can share with,” says Peterson. In 2012, ‘Back-Farms’ produced over 12,000 pounds of food for redistribution from 23 gardens.
Additionally, GULB’s fruit share program has approximately 2,000 registered trees, which are harvested by volunteers. The program started with 30 trees four years ago. Like the ‘Back-Farms’ program, the harvest is split three ways and distributed to the needy in an effort to reduce waste and increase local food access. This year, they’ll harvest 60,000 pounds of fruit.
GULB offers gardening workshops, and new this season, an urban farming certification course. Peterson has already identified two students with all the right skills and the necessary dose of passion to start their own urban farms.
A stumbling block for GULB has been the existing charitable food infrastructure. Fresh high quality produce grown locally was mixed at local food banks and missions with the outdated grocery store surplus. This did not improve access (undocumented immigrants and seniors tend not to use food banks according to Peterson) or knowledge of local food growing, so Peterson decided to self-distribute the food. In 2015, GULB had 84 free markets at senior centers serving nearly 4,000 people.
Like most urban growers, Peterson advises starting small. But not only that, he strongly suggests focusing on legitimizing the business quickly in order to reach folks in need as fast as possible.
“Strategic partnerships are so important,” says Peterson. “With every one of our programs we have found really valuable partners that have helped us accomplish more with less resources, but give us legitimacy and help us reach our target population a little better.”
Peterson intends to keep working with his feedback-focused, trial and error creative approach to customizing the urban farming experience in the city, piloting programs based on local needs and wants, creating partnerships to legitimize programs, and focusing efforts on the main business of growing fresh local produce at an affordable price point. | 2024-01-28T01:26:58.646260 | https://example.com/article/2273 |
"We were doing the best we can!" Jack Wagner tells us after getting the ol' heave-ho off the ballroom floor last night. "We're disappointed. It's shocking! I think anybody who would have gotten eliminated tonight would have been pretty shocked because all of the scores were so good. So it's us and we move on, life's not going to end, hopefully. We just take some great memories."
Wagner says this turn of events won't keep him from dancing, thankyouverymuch."I'm not letting go of this outfit. I'm dancing in my car in a minute!... I thought Id be rehearsing tomorrow with this wonderful woman, so maybe I'll take a day off."
When asked what's on tap for next week, Sherri Shepherd and partner Val Chmerkovskiy's took the cake: "It's going to be you on a table taking clothes off. Flipping your hair," Val reveals of their "rock" number.
"Is that rock or is that an HBO movie?" Sherri asked.
"I don't know," Val answered. "The only rock and roll I listen to is in strip clubs. So that's where I'm going to get my inspiration."
After landing in the bottom three, Gavin DeGraw was feeling grateful. "I feel relieved, really fortunate that we made it through another week!" he told us. "And to get another chance to improve, to try the next dance, to get the steps right, get the look right, you know? Really sell it and get it correct to try and win the hearts of the judges and of the audience out there."
Best of luck! Dancing with the Stars returns Monday and we're pretty sure Sherri and Val are joking, but hey, stranger things have happened on this show (see: Bristol Palin in a monkey suit). | 2024-05-18T01:26:58.646260 | https://example.com/article/3977 |
Grant will join host Matt Winer and analysts Mateen Cleaves and Seth Davis for NCAA Tournament third round coverage on Sunday, March 22, from Turner Studios in Atlanta.
In his career, Grant has led three teams to NCAA Tournament appearances, along with winning three regular season conference championships, two conference tournament titles, and the Colonial Athletic Association Coach of the Year Award in 2007.
As an assistant coach at Florida, Grant helped lead the Gators to their first national title in 2006, along with an appearance in the 2000 National Championship Game, and eight straight NCAA Tournaments, before departing for VCU.
Third round game coverage continues Sunday (Noon-Midnight) with all games available live in their entirety across four national television networks – TBS, CBS, TNT and truTV – and via NCAA March Madness Live.
The Final Four on Saturday, April 4, will be televised on TBS along with team-specific telecasts airing on TNT and truTV. The National Championship Game on Monday, April 6, will air on CBS.
Watch Virginia raise the 2019 men’s basketball championship banner
The Virginia Cavaliers raised their 2019 men's basketball national championship banner on Friday, Sept. 13, high into the rafters at John Paul Jones Arena with Tony Bennett and members of last year's team standing by. | 2023-11-10T01:26:58.646260 | https://example.com/article/9646 |
1. Field of the Invention
The present invention relates accessories to be utilized with archery bows and particularly to stabilizers utilized with archery bows.
2. Prior Art
In the prior art there has existed stabilizers for archery bows. The first of these stabilizers comprise essentially a long aluminum rod which was threaded into the riser of the bow and provided with a weight on the other end. While it provides some beneficial function, it had many drawbacks and disadvantages. Next, the stabilizer was made from carbon fiber which incorporated a vibration absorbing device and example of such a device is U.S. Pat. No. 5,273,022. While this device provided more beneficial use, it too had certain disadvantages.
Another type of stabilizer which was developed instead of the single rod type is commonly referred to as a multirod stabilizer. The examples of these kinds of multirod stabilizers are in U.S. Pat. No. 5,090,396; 5,611,325; and 6,431,163. While these multirod stabilizers provided some additional beneficial effects, they too had disadvantages. In particular, they were typically of complex construction which meant that after long use they tended to come apart and the parts thereof shifted in their location. Shifting their location of the parts caused a change in the tune of the stabilizer with a resulting change in the tune of the whole archery bow system. As a result, when there was a shift in part of the stabilizer, the entire archery bow would begin to shoot its arrows differently, which meant that the arrows would strike a target at different places than they did previously. | 2024-04-08T01:26:58.646260 | https://example.com/article/1537 |
RaboDirect PRO12 semi-finals preview
Leinster are looking for a Cup double this season to make up for their Heineken Cup disappointment
By Brendan Cole
Leinster face an tough task against a Glasgow team that has consistently performed well in this competition over the last number of seasons and continues to do so despite the loss of a few big names to foreign clubs.
There has been less than a score in it on the two occasions the sides have met so far this year, and Glagow’s demolition of Munster showed them to be in rude health.
But Leinster have also recovered from a mild post-Six Nations slump and field a formidable side.
The backline is particularly strong, though Ian Madigan is unlucky to miss out.
Glasgow may fancy getting among Leinster’s pack, though strong set-pieces, with excellent scrum and lineout specialists in the forwards, should enable them to absorb a certain amount of pressure.
Jonathan Sexton’s ability to create situations, and the razor sharp creativity and finishing outside him, should do the rest.
After a brilliant first half of the season, Ulster looked a certainty to be one of the main players at this stage of the season.
And though their form dipped in February and March, they have quietly put things right over the last four games with good wins over Leinster, Dragons, Connacht and Cardiff Blues; the Heineken Cup exit against Saracens was their only loss since the end of March.
A good injury profile and the return from international duty of a few key players undoubtedly helped Mark Anscombe’s men to right the ship ahead of the key portion of the season.
Tony Ward believes that Ulster's strength will see them through to the RaboDirect PRO12 Final
But they are vulnerable in some key positions again, and nowhere more than at tighthead prop, where John Afoa misses out with a hamstring problem.
That could prove vital as the tried and trusted method of beating the Llanelli Scarlets is through the pack, particularly the scrum. Ulster put their faith in Declan Fitzpatrick with the promising Ricky Lutton providing back-up from the bench.
They should have enough to break even and possibly put Ulster on the front foot here and there, but the dominant performance Afoa is capable of is probably outside the compass of the Ulster scrum.
Ulster also field an inexperienced duo at outhalf and centre. Paddy Jackson would not be human if the Six Nations outhalf fiasco had not affected his confidence.
Alongside at 12, Stuart Olding is even less experienced having been promoted out of the under-20 setup in the absence of Luke Marshall, who is continuing to recover from a series of concussions that began while he was on international duty.
The tragic loss of Nevin Spence last September has also denied Ulster a top-class talent in the position.
Tony Ward believes that Leinster are set up for a double trophy winning end to the season
Olding, like Jackson, is on the small side but has the skills to bring Ulster’s fearsome back three of Jared Payne, Andrew Trimble and Tommy Bowe.
Ruan Pienaar’s presence at scrumhalf should mean the 10-12 pair get enough time and space to get their decisions and execution right.
Ulster also have some excellent operators in the pack with Rory Best and Chris Henry capable of making life difficult when the Scarlets have the ball, and the likes of Nick Williams able to crack open through even the best-drilled defensive structures.
Across the whole squad, Ulster are an excellent tackling team and that should mean added pressure on the Scarlets.
That could prove vital as the Scarlets strength is in their big backline, with Jon Davies and George North to the fore, and the recently returned Rhys Priestland’s ability to release them. The Wales out-half is a hugely under-rated passer of the ball but his presence gives the Scarlets the ability to go wide to the big men quickly.
Rob Kearney
If Afoa was present, it would be hard to see Ulster failing to continue their winning ways. Even in his absence, the selection of Ruan Pienaar at nine hints that Ulster still fancy themselves to get on top in general play in the pack. There should still be enough steel in that area to get the job done. | 2023-09-25T01:26:58.646260 | https://example.com/article/1614 |
I’ve managed to finish the RG Freedom’s paint and panel lines and now all that’s left is for the decals from Samuel Decals to come in the mail. While waiting for the decals I decided to start my next build, the MG F91.
Everything started out great, I loved how original and solid the chest piece was and the head-piece while a little loose was still pretty nice. The problems came about when I started the arms. First of all these arms share the same inner frame as the MG Crossbone. Just like the Crossbone the elbows are split in two similarly to old NG models. I personally hate this, the joint is bad and always feels like it weakens the arm.
My dislike of the design aside I had an actual issue arise, unfortunately one of the shoulder fins broke. These very thin parts are made out of a brittle plastic so brittle in fact that the piece broke as I was removing it from the runner.
The F91 is one of the very first non polycap models and because of that the joints can be overly tight, the fin joint is one of those and if I tried to rebuild the fin the joint would be so bad that I either wouldn’t be able to manipulate it or it would quickly break again.
I really hope things start to pick back up again with the legs (even though I have heard some complain about them), cause I really have been looking forward to this model for a long time. | 2024-04-21T01:26:58.646260 | https://example.com/article/6523 |
Inorganic polarography in organic solvents-II: polarographic examination of the molybdenum(V) thiocyanate complex in diethyl ether.
A procedure involving the solvent extraction of molybdenum(V) thiocyanate into diethyl ether followed by a direct polarographic examination of the organic phase offers a selective method for the determination of molybdenum down to 0.5 ppm. Only molybdenum, amongst 21 elements examined, is observed to give a reduction wave under the recommended conditions. The method is evaluated with respect to various experimental factors and is applied to the determination of molybdenum in mild and alloy steels. | 2023-12-19T01:26:58.646260 | https://example.com/article/8270 |
Diacylglycerol acyltransferase 1 inhibition lowers serum triglycerides in the Zucker fatty rat and the hyperlipidemic hamster.
Acyl CoA/diacylglycerol acyltransferase (DGAT) 1 is one of two known DGAT enzymes that catalyze the final and only committed step in triglyceride biosynthesis. The purpose of this study was to test the hypothesis that chronic inhibition of DGAT-1 with a small-molecule inhibitor will reduce serum triglyceride concentrations in both genetic and diet-induced models of hypertriglyceridemia. Zucker fatty rats and diet-induced dyslipidemic hamsters were dosed orally with A-922500 (0.03, 0.3, and 3-mg/kg), a potent and selective DGAT-1 inhibitor, for 14 days. Serum triglycerides were significantly reduced by the 3 mg/kg dose of the DGAT-1 inhibitor in both the Zucker fatty rat (39%) and hyperlipidemic hamster (53%). These serum triglyceride changes were accompanied by significant reductions in free fatty acid levels by 32% in the Zucker fatty rat and 55% in the hyperlipidemic hamster. In addition, high-density lipoprotein-cholesterol was significantly increased (25%) in the Zucker fatty rat by A-922500 administered at 3 mg/kg. This study provides the first report that inhibition of DGAT-1, the final and only committed step of triglyceride synthesis, with a selective small-molecule inhibitor, significantly reduces serum triglyceride levels in both genetic and diet-induced animal models of hypertriglyceridemia. The results of this study support further investigation of DGAT-1 inhibition as a novel therapeutic approach to the treatment of hypertriglyceridemia in humans, and they suggest that inhibition of triglyceride synthesis may have more diverse beneficial effects on serum lipid profiles beyond triglyceride lowering. | 2024-02-02T01:26:58.646260 | https://example.com/article/3211 |
Product Description
Energy saving 100Ton flour mill machinery corn maize flour milling plant advantages :1. The steel of the machine come from the steel companies not steel market ,Shandong Leader Machinery Co.,Ltd. want to make sure all the steel is high quality .2. Shandong Leader Machinery Co.,Ltd. have top engineers in the steel industry,Shandong Leader Machinery Co.,Ltd. supply the top design for our customers.3. Our workers is professional ,all of they received a full professional training before.4. Shandong Leader Machinery Co.,Ltd. supply the high grade, the low end, the consummation post-sale service .Any time , any problem, contact us .
After Sale Service of Energy saving 100Ton flour mill machinery corn maize flour milling plant:1. Warranty policy one year from shipment2. Shandong Leader Machinery Co.,Ltd. will send you the replacement after received the broken part3. Evaluate the customs rish and choose safest shipping company before shipping.4. Follow status up time by time until the goods arrived.
Shandong LD Grain and Oil Machinery Co.,Ltd has total assets of over 400 million yuan, and possesses three production plant areas, with a total area of 900 mu, and nearly 3,000 employees. It is now capable of producing more than 300 specifications of grain and oil processing machinery divided into 60 series (including wheat processing, corn processing, edible oil processing, oil sesame cleaning, garlic processing, wine and grain grinding, etc.), and undertaking 10 ~ 1000 tons/day full-set food processing equipment and 5~12 t/h full-set seed processing equipment turnkey projects. The products are sold in more than 30 provinces, municipalities, autonomous regions and exported to dozens of countries and regions such as Russia, India, South Africa, Ukraine, Nepal, Peru,Kazakhstan, Iran, north Korea, Vietnam, Pakistan, Indonesia, Europe and the United States. The leading products MS electric, gas control milling machine series, and the novel FSFG plansifter series have been named national key new products, high-tech products in Jinan Province, and Jinan famous brand-name products. The âLDâ brand was named the National well-known milling machine brand, and âLDâ trademark was named as Jinan well-known trademark.
Complete set of Flour mill machinery corn maize flour milling plant can be divided into four main parts:
1. Cleaning part
To clean out the middle and small impurity from wheat. e.g., dust, stone, magnetic material, wheat was bitten by insect and so on.Includes beating, screening, destoner, magnetic separator and dampening. This section is to prepare for milling part and to protect the machinery as well.
2. Milling part
To mill the grain and separate the flour, bran and other by-product:
(1) Mill: mill the grain to break the integrity by the roller moving
(2) Sifter: to separate the flour, bran and other by-product, also separate large size and small size to ensure flour quality.
3. Packing part
Tthe packing machine can be manual or automatic weighting and packing.
4. PLC controlling system
To control the whole set of machinery to work well and showing the process of working.
Professional engineers will be responsible for installation in the local market.
7
Engineer Installation Guidance,Commissioning,Technical Training.
1. Pre-Sales Service
* Inquiry and consulting support.
* View our Factory.
* Write the project feasibility study report
* Undertake project design including technology, civil engineering, steel structure, machinery, electric, automation* Optimizing plant design for the existing technology, make the production and business more Wheat Flour Milling Machinecompetitive.The automation reconstruction, intelligence control, stable and safety operation for the existing production line
2. After-Sales Service
* Training how to install the machine, training how to use the machine,maintainenance.
* Engineers available to service machinery overseas.Providing professional support for the consultation of engineering technology and technical problem.
Related News
The main sources of leakage of microwaves are: door and cavity joints, door mesh and magnetron and waveguide box joints. 1. The joint between the door and the cavity, according to the linear refraction characteristics of the microwave, as long as the gap...
Study on Equipment and Processing Technology with Microwave pressure difference for ProcessPuffed apple flakes Microwave expansion and differential pressure expansion are new directions in the development of modern puffed food production technology...
The domestic equipment registration of microwave equipment enterprises was first registered in 1993. Today, 25 years later, the scale of the microwave equipment industry has reached 1,000+, involving more than 100 enterprises producing microwave drying... | 2024-04-19T01:26:58.646260 | https://example.com/article/2485 |
Molly Ivins
Bigotry, Texas-Style
ere in the National Laboratory for Bad Government, its duck and cover timethe Legislature is in session. The Cant Shake Your Booty bill passed the House, saving us all from the scourge of sexy cheerleaders. But nothing else is getting done. The state is being run by people who do not know how to govern. Keep in mind that based on past form, whatever lunacy is going on in Texas will eventually sweep the country.
Rarely are the words of one state legislator worth national attention, but when Senfronia Thompson, a black representative from Houston, stalks to the back mike with a certain get out of my way look in her eye, its, Katie, bar the door. Here is Thompson speaking against the Legislatures recent folly of putting a superfluous anti-gay marriage measure into the state constitution:
I have been a member of this august body for three decades, and today is one of the all-time low points. We are going in the wrong direction, in the direction of hate and fear and discrimination. Members, we all know what this is about; this is the politics of divisiveness at its worst, a wedge issue that is meant to divide.
Members, this is a distraction from the real things we need to be working on. At the end of this session, this Legislature, this leadership, will not be able to deliver the people of Texas fundamental and fair answers to the pressing issues of our day.
Lets look at what this amendment does not do. It does not give one Texas citizen meaningful tax relief. It does not reform or fully fund our education system. It does not restore one child to CHIP [Childrens Health Insurance Program] who was cut from health insurance last session. It does not put one dime into raising Texas Third World access to health care. It does not do one thing to care for or protect one elderly person or one child in this state. In fact, it does not even do anything to protect one marriage.
Members, this bill is about hate and fear and discrimination. … When I was a small girl, white folks used to talk about protecting the institution of marriage as well. What they meant was if people of my color tried to marry people of Mr. Chisums color, youd often find the people of my color hanging from a tree. … Fifty years ago, white folks thought interracial marriages were a threat to the institution of marriage.
Members, Im a Christian and a proud Christian. I read the good book and do my best to live by it. I have never read the verse where it says, Gay people cant marry. I have never read the verse where it says, Thou shalt discriminate against those not like me. I have never read the verse where it says, Lets base our public policy on hate and fear and discrimination. Christianity to me is love and hope and faith and forgivenessnot hate and discrimination.
I have served in this body a lot of years, and I have seen a lot of promises broken. … So … now that blacks and women have equal rights, you turn your hatred to homosexuals, and you still use your misguided reading of the Bible to justify your hatred. You want to pass this ridiculous amendment so you can go home and bragbrag about what? Declare that you saved the people of Texas from what?
Persons of the same sex cannot get married in this state now. Texas law does not now recognize same-sex marriages, civil unions, religious unions, domestic partnerships, contractual arrangements or Christian blessings entered into in this stateor anywhere else on this planet Earth.
If you want to make your hateful political statements, then that is one thing, but the Chisum amendment does real harm. It repeals the contracts that many single people have paid thousands of dollars to purchase to obtain medical powers of attorney, hospital visitation, joint ownership and support agreements. You have lost your way. This is obscene. …
I thought we would be debating economic development, property tax relief, protecting seniors pensions, and stem cell research to save lives of Texans who are waiting for a more abundant life. Instead we are wasting this bodys time with this political stunt that is nothing more than constitutionalizing discrimination. The prejudices exhibited by members of this body disgust me.
Last week, Republicans used a political wedge issue to pull kidssweet little vulnerable kidsout of the homes of loving parents and put them back in a state orphanage just because those parents are gay. Thats disgusting.
I have listened to the arguments. I have listened to all of the crap. … I want you to know that this amendment [is] blowing smoke to fuel the hell-fire flames of bigotry. Molly Ivins is a nationally syndicated columnist. Her most recent book with Lou Dubose is Bushwhacked: Life in George W. Bushs America.(Random House).
Enter your email
You May Also Like:
With President Trump set to nominate another conservative justice to the U.S. Supreme Court, abortion-rights activists worry about the future of Roe v. Wade. Molly Ivins wrote this piece in the aftermath of the 1973 landmark ruling establishing a woman's right to abortion.
by Molly Ivins | 2024-07-27T01:26:58.646260 | https://example.com/article/8381 |
Q:
Display Comma (,) after every element using tag
<h4 style="display: inline;" class="missing-docs"
ng-repeat="d in missDocs(vm.voyage) track by $index"> {{d}}</h4>
I Want to display comma (,) after every element so, do I have to make changes in css or there is some other way.
A:
Why not just use CSS to add the comma to a psuedo element.
h4::after {
content: ",";
display: inline-block;
}
h4:last-of-type::after{
display: none; // removes comma after last h4 (not asked in the question)
}
Well you can do it with JavaScript too. But I guess the CSS solution is easy.
A:
Assuming this is place-holder code that gets rendered as different <h4> tags, you can play with the ::after pseudo-element:
h4::after {
content: ","
}
h4:last-of-type::after{
display: none;
}
<h4 style="display: inline;" class="missing-docs">One</h4>
<h4 style="display: inline;" class="missing-docs">Two</h4>
<h4 style="display: inline;" class="missing-docs">Three</h4>
<h4 style="display: inline;" class="missing-docs">Four</h4>
Or just:
h4:not(:last-of-type)::after {
content: ","
}
<h4 style="display: inline;" class="missing-docs">One</h4>
<h4 style="display: inline;" class="missing-docs">Two</h4>
<h4 style="display: inline;" class="missing-docs">Three</h4>
<h4 style="display: inline;" class="missing-docs">Four</h4>
| 2024-04-01T01:26:58.646260 | https://example.com/article/1497 |
Farnesoid X receptor signal is involved in deoxycholic acid-induced intestinal metaplasia of normal human gastric epithelial cells.
The farnesoid X receptor (FXR) signaling pathway is known to be involved in the metabolism of bile acid, glucose and lipid. In the present study, we demonstrated that 400 µmol/l deoxycholic acid (DCA) stimulation promotes the proliferation of normal human gastric epithelial cells (GES-1). In addition, DCA activated FXR and increased the expression of intestinal metaplasia genes, including caudal-related homeobox transcription factor 2 (Cdx2) and mucin 2 (MUC2). The treatment of FXR agonist GW4064/antagonist guggulsterone (Gug.) significantly increased/decreased the expression levels of FXR, Cdx2 and MUC2 protein in DCA-induced GES-1 cells. GW4064/Gug. also enhanced/reduced the nuclear factor-κB (NF-κB) activity and binding of the Cdx2 promoter region and NF-κB, the most common subunit p50 protein. Taken together, the results indicated that DCA is capable of modulating the expression of Cdx2 and the downstream MUC2 via the nuclear receptor FXR-NF-κB activity in normal gastric epithelial cells. FXR signaling pathway may therefore be involved in the intestinal metaplasia of human gastric mucosa. | 2024-02-05T01:26:58.646260 | https://example.com/article/4425 |
338 Pa. Superior Ct. 400 (1985)
487 A.2d 1340
Walter KAMINSKI and Lisa Kaminski, his wife
v.
EMPLOYERS MUTUAL CASUALTY COMPANY, Appellant.
Supreme Court of Pennsylvania.
Argued May 23, 1984.
Filed February 8, 1985.
*401 Susan M. Danielski, Philadelphia, for appellant.
Lee C. Krause, Honesdale, for appellees.
Before DEL SOLE, MONTEMURO and HOFFMAN, JJ.
HOFFMAN, Judge:
Appellant-insurer contends that the lower court erred in permitting two expert witnesses to testify on behalf of appellees-insureds with respect to the cause and origin of the fire in question when those experts were not identified in appellees' answers to interrogatories and were not identified as appellees' expert witnesses until the sixth day of trial. We agree and, accordingly, reverse and remand for a new trial.
*402 Following a May 5, 1980 fire which damages and/or destroyed their house and its contents, appellees, Mr. and Mrs. Kaminski, submitted a claim in the amount of $89,593.20 to appellant, Employers Mutual Casualty Company, pursuant to their homeowners insurance policy. Because appellant refused to make any insurance payments, appellees filed a complaint on December 22, 1980, alleging breach of contract and seeking damages under the policy. Appellant responded by filing an answer and new matter on January 29, 1981; appellees then filed an answer to appellant's new matter on February 9, 1981. During discovery, appellant propounded interrogatories which appellees answered on May 7, 1981. Both parties submitted pre-trial memoranda and, on July 9, 1981, the trial court, per Judge Davis, specially presiding, held a pre-trial conference.
Jury trial commenced on July 21, 1981, with Judge Williams specially presiding, and continued to July 24; after an approximate one-week adjournment period, it recommenced on August 3 and concluded on August 6. In establishing their case, appellees first presented the testimony of Mr. Kaminski regarding appellees' activities on the day of the fire, as follows: On Sunday, May 4, 1980, at approximately 8:00 a.m. appellees left their residence located on Route 652, between Beach Lake and Narrowsburg, Damascus Township, Wayne County, to go to work in Monticello, New York, approximately a 45-minute drive. Mrs. Kaminski is a book-keeper at Kutshers Country Club in Monticello; Mr. Kaminski is a real estate salesman for E. & A. Mason Real Estate in Monticello. At 5:00 p.m., appellees left work and returned home, arriving at 5:45. At 6:15, appellees left their home and drove to Kutsher's Country Club for dinner and a show. They stayed until approximately 2:00 a.m. the next morning. They then left the club and, because Mrs. Kaminski wanted something to eat, they went to a restaurant in Monticello and stayed there approximately one hour. At 3:30 a.m., they left the restaurant and stayed in the parking lot for a while because Mr. Kaminski fell asleep. At approximately 4:30 a.m., appellees started to drive home; *403 however, after driving about three-quarters of a mile, Mr. Kaminski was too tired to continue so they stopped on the side of the road and Mr. Kaminski again fell asleep. At approximately 6:00 a.m., he was awakened by the sun. Because appellees were approximately 45-50 minutes drive from their home and had to be at work by 9:00 a.m., they drove straight to Mr. Kaminski's real estate office to freshen up and then went to their respective offices. At the end of the day, appellees left work early and, upon arriving home, saw the burned remains of their residence. The fire was estimated to have broken out at approximately 2:00 a.m. on Monday, May 5, 1980. (N.T. July 22, 1981 at 27-28, 44-46; July 23, 1981 at 96-111). Appellees each testified as to the various items lost in the fire and their values. (Id. at 38-47). They concluded their case-in-chief by presenting the expert testimony of Robert Jones, a professional building estimator, and Charles Catanzaro, a public insurance adjuster. Both of these witnesses work for Dalan Adjustment Company, which had been retained by appellees to prepare their insurance claim, and they testified as to the estimated values and replacements costs of appellees' destroyed property. (N.T. July 23, 1981 at 52-79).
In defense, appellant presented the testimony of several experts. Alfred Crosby, Chief of the Beach Lake Volunteer Fire Department, testified that the fire in question had been difficult to extinguish and therefore opined that some type of liquid material, such as gasoline, turpentine or fuel oil, had been applied to the basement and first floor of appellees' home. He also based this opinion on the "tunnellike" burnt patterns on the flooring. (Id. at 126-27). Alfred H. Thumann, assistant fire chief of the Beach Lake Fire Department, also testified that the fire had been difficult to extinguish with water and would flare up repeatedly. He therefore opined that there had been some highly flammable substance in the basement other than paper or wood. (Id. at 141-43). Michael O'Day, a Pennsylvania State policeman and alternate fire marshall for Wayne County, testified that his job as a state police fire marshall was to investigate *404 the cause and origin of fires of suspicious nature and gave the following opinions: (1) an oil burner had been carefully removed from the basement furnace of appellees' home prior to the fire; (2) the point of origin of the fire was the basement stairway; (3) the fire had been caused by placing some type of flammable liquid on the floor from the kitchen into the living room, down the basement stairway, and upstairs to the second floor; (4) the ignition source of the fire was the oil burner motor which had been set to the thermostat like a timing device, i.e., when the temperature hit a certain degree, the thermostat called for heat, thereby automatically igniting the oil burner, which started the basement stairway on fire and rapidly moved upstairs from there; (5) the whole house was intended to be burned to the ground. (Id. at 150-53, 156-203). Frederick Blum, a consulting engineer in the field of investigation of fires involving malfunctioning equipment, testified as to the condition of the oil burner both before and after the fire occurred. (N.T. July 24, 1981 at 284-93). Robert Haycock, a senior fire investigator with UBA Fire Investigators in Harrisburg and a state police fire marshall, gave his opinion that, because of the burning patterns or "alligatoring effect" on the wood floors of appellees' home after the fire, the fire was caused by the ignition of a flammable liquid and that such low floor burnout throughout the entire structure was not common with accidental fires. (Id. at 302-10). He also ruled out the possibility of an electrical fire because of the extreme burning throughout the entire building and because the flooring above the electrical panel was still intact, stating that an electrical fire starts from a smoldering effect. (Id. at 337). Mr. Kaminski, called to the stand by appellant as of cross, testified that appellees' separately filed 1980 federal income tax returns reported respective gross incomes of $4729 and $8475. (N.T. August 3, 1981 at 381-83). He also testified as to appellees' various earnings and expenses. (Id. at 383-405). Appellant's last witness, Edward Gieda, a home building-remodeling and damage appraiser, testified as to replacement costs for appellees' home (Id. at 408-14).
*405 Appellees responded on rebuttal with the testimony of two expert witnesses. Robert Jennings, a photographer, county coroner and chief deputy for Wayne County, testified that, in his opinion, no accelerants or flammable liquids had been poured on the stairways of appellees' home and that the fire was not incendiary. (N.T. August 4, 1981 at 510). Thomas Evans, electrical inspector for the City of Scranton and a member of the Arson Task Force, testified: "My opinion is definitely an electrical fire." (Id. at 524).
In surrebuttal, appellant again put Michael O'Day on the stand. O'Day disagreed with Jennings and Evans as to the electrical origin of the fire because the fuse box was intact and there was no evidence of melting. (N.T. August 5, 1981 at 549-68). On cross, however, he admitted that he was not an electrician. (Id. at 561-62).
At the conclusion of the trial, the jury, finding that the fire was not incendiary and that there was no fraud, rendered a verdict in appellees' favor for $89,500.00 in damages.[1]
Appellant subsequently filed motions for a new trial or for judgment n.o.v. Following argument, these motions were denied on December 13, 1982 by Judge Conway. On January 7, 1983, appellant filed the instant appeal. The lower court then ordered appellant to file of record a Pa.R.A.P. 1925(b) concise statement of the matters complained of on appeal; appellant complied with this order. On March 25, 1983, appellant filed a praecipe to enter judgment nunc pro tunc on the jury verdict in appellees' favor pursuant to Pa.R.Civ.P. 1039.[2]
Appellant contends that the rebuttal testimony of Jennings and Evans should not have been admitted because *406 appellees failed to disclose the identities of these expert witnesses during discovery. Pa.R.Civ.P. 4003.5 provides that:
(a) Discovery of facts known and opinions held by an expert, otherwise discoverable under the provisions of Rule 4003.1 and acquired or developed in anticipation of litigation or for trial, may be obtained as follows:
(1) A party may through interrogatories require
(a) any other party to identify each person whom the other party expects to call as an expert witness at trial and to state the subject matter on which the expert is expected to testify and
(b) the other party to have each expert so identified by him state the substance of the facts and opinions to which the expert is expected to testify and a summary of the grounds for each opinion. The party answering the interrogatories may file as his answer a report of the expert or have the interrogatories answered by his expert. The answer or separate report shall be signed by the expert.
* * * * * *
(b) If the identity of an expert witness is not disclosed in compliance with subdivision (a)(1) of this rule, he shall not be permitted to testify on behalf of the defaulting party at the trial of the action. However, if the failure to disclose the identity of the witness is the result of extenuating circumstances beyond the control of the defaulting party, the court may grant a continuance or other appropriate relief.
(Emphasis added). The rule embodied in subsection (b) above is restated in Rule 4019, entitled "Sanctions", as follows:
(i) A witness whose identity has not been revealed as provided in this chapter shall not be permitted to testify on behalf of the defaulting party at the trial of the action. However, if the failure to disclose the identity of the witness is the result of extenuating circumstances beyond *407 the control of the defaulting party, the court may grant a continuance or other appropriate relief.
Pa.R.Civ.P. 4019(i) (emphasis added). Thus, the rule is one of mandatory preclusion at trial of the testimony of undisclosed expert witnesses in the absence of extenuating circumstances. See Sindler v. Goldman, 309 Pa.Superior Ct. 7, 14, 454 A.2d 1054, 1057 (1982) (Local Rule 212, which embodies the same rule codified in Pa.R.Civ.P. 4003.5, "provides unconditionally that testimony will be precluded in the event of noncompliance.").[3]See also Long v. C.M.C. Equipment Rental, Inc., 70 D. & C.2d 403 (Philadelphia Co. 1975); Peace v. Hess, 67 D. & C.2d 230 (Lancaster Co. 1974). The rationale for these discovery rules has been set forth by this Court on several occasions. In Catina v. Maree, 272 Pa.Superior Ct. 247, 259-60, 415 A.2d 413, 420 (1979), rev'd on other grounds, 498 Pa. 443, 447 A.2d 228 (1982), we stated:
The importance of a party having adequate and accurate information on the eyewitnesses to be called by an adverse party, is of course, manifest. If the witness' trial *408 testimony is damaging to the uninformed party, he is subject to the vagaries of surprise and attendant detriment in the eyes of the jury; while if the witness is in possession of facts favorable to the uninformed party, the latter is deprived of potentially crucial information.
And in Sindler v. Goldman, supra, 309 Pa.Superior Ct. at 12, 454 A.2d at 1056, we reiterated:
The purpose of the discovery rules is to prevent surprise and unfairness and to allow a trial on the merits. When expert testimony is involved, it is even more crucial that surprise be prevented, since the attorneys will not have the requisite knowledge of the subject on which to effectively rebut unexpected testimony. By allowing for early identity of expert witnesses and their conclusions, the opposing side can prepare to respond appropriately instead of trying to match years of expertise on the spot. Thus, the rule serves as more than a procedural technicality; it provides a shield to prevent the unfair advantage of having a surprise witness testify.
(Footnote omitted).[4]
In the instant case, appellant propounded written interrogatories which clearly requested, inter alia, the names of the expert witnesses who were expected to testify on appellees' behalf. See Defendant's Interrogatories Nos. 12-14. In response, appellees answered: "All persons listed in the Dalan Adjustment Corporation report and adjusters of that company." See Plaintiffs' Answer to Defendant's Interrogatory No. 12. Although Jones and Cantanzaro were listed in the Dalan Adjustment Corporation report, Jennings and Evans were neither listed in that report nor identified anywhere in appellees' answers. Therefore, under the discovery rules, Jennings and Evans should have been precluded from testifying at trial unless extenuating *409 circumstances existed for appellees' nondisclosure. See Pa. R.Civ.P. 4003.5(b) and 4019(i).
Appellees contend, however, that there were extenuating circumstances because the pleadings raised only the defense of misrepresentation or false swearing and did not raise the defense of arson. They therefore argue that because they did not contemplate an arson defense at the onset of the trial, they sought rebuttal experts on the issue of the cause and origin of the fire after the trial was underway only when it became apparent that the issue of arson was becoming the thrust of appellant's defense. The lower court, in allowing Jennings and Evans to testify over appellant's objections, apparently agreed. See N.T. August 4, 1981 at 466-67.
We reject appellees' argument because their claim of ignorance of the arson defense prior to trial is controverted by the record. In its Answer to the Complaint, appellant invoked the "Concealment or Fraud" defense provided for in the insurance policy, and averred in New Matter the following:
13. Defendant avers that the policy of insurance sued upon contains, inter alia, the following provisions:
Concealment or Fraud. We do not provide coverage for any insured who has intentionally concealed or misrepresented any material fact or circumstance relating to this insurance.
14. The defendant avers that subsequent to the fire which occurred on or about May 5, 1980 and which fire defendant avers was incendiary in origin, plaintiffs furnished to defendant a document purporting to be a Sworn Statement in Proof of Loss wherein plaintiffs averred, declared and represented that the cause and origin of said loss was "fire" and that the said loss did not originate by any act, design or procurement on the part of plaintiffs. A true and correct copy of said document purporting to be a Sworn Statement in Proof of Loss is attached hereto, and marked as Exhibit "A", and made a part hereof.
*410 15. The defendant further avers that the averments, declarations and representations referred to in paragraph fourteen (14) hereof related to material facts and circumstances concerning the insurance in question, the subject thereof and the interest of the plaintiffs therein.
16. The defendant further avers that plaintiffs, in such aforesaid document purporting to be a Sworn Statement of Proof of Loss, did, under oath, willfully, deliberately and maliciously with intent to defraud the defendant, conceal the true origin and cause of the fire.
17. Defendant further avers that plaintiffs did on July 15, 1980, under oath, willfully, maliciously and with intent to defraud the defendant, conceal the true origin and cause of said fire, when, in fact, such origin and cause was well known to them.
(Emphasis added). In their Answer to Appellant's New Matter, appellees averred the following:
14. Paragraph 14 is admitted in part and denied in part. That the plaintiffs do not of their own personal knowledge have any information or belief as to the nature or origin of the fire and therefore by implication this part of paragraph 14 must be denied and proof of the same is demanded at trial. As to the plaintiffs filing a proof of loss indication that the origin of the loss was a fire and that it did not originate by any act, desire or procurement on their part, this document speaks for itself and therefore Exhibit A is admitted as per the statements contained therein.
* * * * * *
17. Paragraph 17 is denied and it is specifically averred that the plaintiffs did not know nor intend to defraud or conceal the true origin of the fire, therefore, strict proof of paragraph 17 is demanded at trial.
(Emphasis added). We think it clear from these pleadings that both parties were put on notice and understood that the defense of arson was raised and would be litigated. Although arson is not expressly mentioned in appellant's New Matter, at trial, defense counsel explained the reasons *411 for the formulation of the above paragraphs in appellant's New Matter:
MR. BELZ [Defense Counsel]: . . . (In Chambers) . . . This lawsuit brought by the Plaintiffs against the Employers Mutual Casualty Company is an action for a breach of an insurance contract. The Defendant can only be found liable to the Plaintiffs under the provisions of that contract, and can avoid liability only by showing a breach of a contractual provision of the policy. The provisions of the contract of insurance in question, as in the case of the provisions required of all fire insurance policies by statute in Pennsylvania under 40 P.S. Section 636, do not include a provision expressly stating that no payment will be made to an insured who intentionally burns his property, or for arson by an insured.
Rather, the policy in this action, and the fire policies by statute in Pennsylvania, provide that coverage is not provided for any insured who has intentionally concealed or misrepresented any material fact or circumstance relating to the insurance. This is the provision in the contract, and by statute, under which an insurer can defend a case on the grounds that the insured intentionally set the fire for which he is making a claim.
Accordingly, in order to defend a claim under the contractual provisions of the policy, the insurer must aver that the insured concealed and misrepresented in the proof of loss and/or the oral examination under oath, that the fire did not originate by any act, design or procurement on the part of the insured and thereby, by necessary implication, that the insureds intentionally set the fire.
The fact that an insured sets a fire by his and/or her act, design or procurement, is not a defense itself, but only when pled in the context of the concealment and misrepresentation provisions. The ultimate fact of proof is the concealment or misrepresentation of the arson or the incendiary fire caused by the act, design or procurement of the insured. That is the ultimate fact, and the *412 only fact that has been pled in this action in the new matter.
(N.T. August 4, 1981 at 443-44). We find this explanation reasonable. In Greenberg v. Aetna Insurance Co., 427 Pa. 494, 235 A.2d 582 (1967), the insured sought to recover under two separate fire insurance policies for losses resulting from a fire in the shopping center where he owned and operated a drug store. In their answers to the complaint, the defendant-insurance companies denied liability on the contracts because the fire "was the result of incendiarism, a fact well known to the plaintiff who participated therein, and . . . such participation and failure to disclose this information was the result of concealment and misrepresentation of the plaintiff thereby voiding the said policy." Although the sufficiency of the pleadings was not an issue in Greenberg, we note that, at trial, evidence was admitted from which the jury could infer that the fire involved was of an incendiary nature, and that plaintiff had arranged for arsonists to set the fire. Admittedly, the pleading in Greenberg more explicitly alleges the plaintiff's participation in the fire; however, we believe that the instant pleadings raise the same allegation by clear implication.
Even assuming that the pleadings are ambiguous, however, appellant's pre-trial memorandum and the transcript of the pre-trial conference clearly demonstrate that appellees were aware of the arson defense prior to trial. In appellant's July 3, 1981 pre-trial memorandum, appellant stated, under "Summary of Legal Issues", that:
(a) Defendant's burden of proving that the insureds participated in or caused the fire to be set is controlled by the burden of proof in civil cases or preponderance of the evidence, as opposed to the standard of proof in criminal cases.
(Defendant's Pre-Trial Memorandum at 5). At the July 9, 1981 pre-trial conference, in the presence of appellees' counsel and the court, appellant's defense counsel, in requesting a continuance because his principal expert witness would be out of the country from July 17 to August 3, stated: "he is *413 my chief expert to determine that the fire is arson." (N.T. Pre-trial Conference, July 9, 1981 at 2). Additionally, at this conference, the following exchange occurred:
THE COURT: And, your defense is that you are not liable because the owners or their agents or representatives were responsible for the fire?
MR. BELZ [Defense Counsel]: Yes, Your Honor.
(N.T. Pre-trial Conference, July 9, 1981 at 3). Appellees' counsel at the pre-trial conference also recognized that arson was a defense which would be testified to at trial, as the following excerpt indicates:
MR. KRAUSE [Plaintiffs' Counsel]: Your Honor, the only legal question that I would raise at this time in anticipation of testimony. I would like it clearly understood that the policy would still be in effect and still be a binding obligation if there was arson. The only time and the only defense that I believe is being set forth is the policy Holder or his Agents committed the arson.
THE COURT: I understood that was your contention.
MR. KRAUSE [Plaintiffs' Counsel]: To carry my objection, which I anticipate is that Attorney Belz [Defense Counsel] does not produce or prove my client's involvement in the arson, but merely puts testimony on concerning arson, I am concerned very much as to the effect that would have on a jury.
THE COURT: Do you disagree with him?
MR. BELZ [Defense Counsel]: Yes, Your Honor, and I expect to prove arson, Number One, and after I prove arson I can then proceed to tie in the insured, to either having the fire set intentionally or having it set by someone else or having knowledge by whom it was set and not disclosing that information to the Insurance Company, but I have to prove arson in my case, Number One.
(N.T. Pre-trial Conference, July 9, 1981 at 4).
Thus, even if appellees were not put on notice of the arson defense by the pleadings, they certainly knew of the defense for at least two weeks prior to the commencement *414 of trial. We also note that the record is devoid of any indication that appellees' counsel was surprised by, or objected to, the arson references in the pre-trial memorandum or at the pre-trial conference.
Although it is true that the pre-trial memorandum was filed and the pre-trial conference occurred subsequent to the interrogatories, Pa.R.Civ.P. 4007.4 imposes upon a responding party a duty seasonably to supplement his responses to discovery requests:
(1) A party is under a duty seasonably to supplement his response with respect to any question directly addressed to the identity and location of persons having knowledge of discoverable matters and the identity of each person expected to be called as an expert witness at trial the subject matter on which he is expected to testify and the substance of his testimony as provided in Rule 4003.5(a)(1).
(2) A party or an expert witness is under a duty seasonably to amend a prior response if he obtains information upon the basis of which
(a) he knows that the response was incorrect when made, or
(b) he knows that the response though correct when made is no longer true.
(Emphasis added). The explanatory note to Rule 4007.4 further states that:
The prior Rules contained no provisions imposing a continuing obligation on an answering party to supplement his responses to interrogatories or oral depositions if he becomes aware of subsequent facts which make his prior answers incorrect when made or no longer true in the light of new circumstances.
Rule 4007.4 is adapted from Fed.R.Civ.P. 26(e) to provide such an automatic obligation. The automatic obligation is limited to (a) disclosure by a party of the identity and location of additional persons having knowledge of discoverable facts and the identity of persons expected to be called at trial as expert witnesses, *415 and (b) amendment of a prior answer if a party or expert witness obtained information on the basis of which he knows that the original response was incorrect, or, if correct when originally made, is no longer true. Additional obligations to supplement may be imposed by (1) an order of court; (2) an agreement of the parties; or (3) supplemental interrogatories.
(Emphasis added). See Royster v. McGowen Ford, Inc., 294 Pa.Superior Ct. 160, 167 n. 4, 439 A.2d 799, 803 n. 4 (1982) (even though initial expert interrogatories were possibly immature, party still required to answer and, also, under Rule 4007.4, party had duty seasonably to supplement responses); Crawford v. Chambersburg Hospital, 18 D. & C.3d 121, 127-30 (Franklin Co. 1980) (under Rule 4007.4, supplemental responses should be supplied as trial strategy develops).
Accordingly, we find that appellees had no excuse for failing to prepare for the arson defense prior to trial and for failing to disclose the identities of their expert witnesses on the issue of the cause and origin of the fire. Although the record does not definitively reveal exactly when Jennings and Evans were considered by appellees to be possible expert witnesses for trial, appellees indicate that Jennings was retained on July 23, 1981, and Evans was retained on or before August 1, 1981. Thus, Jennings and Evans were presumably retained after trial was underway. However, we find it hard to believe that appellees would have waited until after the commencement of trial to retain expert witnesses to rebut the arson defense when the record demonstrates that they had clear notice of such a defense well in advance of trial. See, e.g., Crawford v. Chambersburg Hospital, supra at 131. Moreover, we find a disturbing deliberation in the fact that the identities of Jennings and Evans were not disclosed to appellant's counsel and the trial court until August 4, 1981, the sixth day of trial, just immediately before they were to testify as rebuttal witnesses.[5]*416 Therefore, we cannot allow a party to circumvent the valid purposes of the discovery rules by late retention of expert witnesses which the party then excuses under the guise of ignorance or surprise regarding opposing party's case.
Under these circumstances, we find that there were no extenuating circumstances justifying appellees' failure to disclose the identities of Jennings and Evans until the sixth day of trial (and the second day after a one-week adjournment period). Thus, we hold that the testimony of these expert witnesses should have been precluded at trial pursuant to Pa.R.Civ.P. 4003.5(b) and 4019(i).[6]See Nissley v. Pennsylvania Railroad Company, 435 Pa. 503, 259 A.2d 451 (1969), cert. denied, 397 U.S. 1078, 90 S.Ct. 1528, 25 L.Ed.2d 813 (1970) (new trial granted because trial court erroneously allowed testimony of expert medical witness whose identity was not revealed in answer to interrogatory); Sindler v. Goldman, supra (allowing defendant doctor in malpractice action to testify in expert capacity even though he failed to comply with local rule requiring pre-trial expert report denied plaintiffs opportunity for effective rebuttal and right to a fair trial); Moore v. Howard P. Foley Co., 235 Pa.Superior Ct. 310, 340 A.2d 519 (1975) (new trial granted because trial court erroneously allowed *417 doctor to testify as expert witness where identity of doctor was not disclosed in plaintiff's answer to defendant's interrogatories and defendant did not learn of it until the first day of trial); McClain v. Carney, 19 D. & C.3d 527 (Wyoming Co. 1981) (where plaintiff fails to list known witness in response to interrogatories or in pre-trial memorandum, Rule 4019(i) requires that the witness' testimony at trial be stricken because under the new discovery rules the court no longer has the discretion to allow a witness to testify whose identity and role have not been previously disclosed to opposing counsel); and Philadelphia Electric Company v. Nuclear Energy Liability-Property Insurance Association, 10 D. & C.3d 340 (Philadelphia Co. 1979) (under discovery rules, sanction for failure to disclose identity of expert in answer to interrogatories either upon initial inquiry or seasonably after duty to disclose arises, is barring of undisclosed expert from testifying at trial). But see Emerick v. Carson, 325 Pa.Superior Ct. 308, 472 A.2d 1133 (1984) (trial court correctly allowed defendant's expert witness to testify even though witness's identity was not disclosed in answers to interrogatories and only provided to plaintiffs on the day jury selection for trial was completed).[7]
*418 The grant or refusal of a new trial is a matter within the trial court's discretion and will not be reversed on appeal absent a clear abuse of that discretion. Canery v. Southeastern Pennsylvania Transportation Authority (SEPTA), 267 Pa.Superior Ct. 382, 391, 406 A.2d 1093, 1097 (1979). Here, the trial court overruled defense counsel's objection to allowing Jennings and Evans to testify, stating: "We think the argument of discovery in the interrogatories has no weight in light of the fact that these are witnesses that were not in the mind of counsel at the time the interrogatories were answered, or within the time that discovery would ordinarily have been pursued." (N.T. August 4, 1981 at 466-67). In denying appellant's motion for a new trial, the lower court apparently believed appellees' contention that they had been unaware of appellant's arson defense prior to trial. As we have found, however, the record clearly demonstrates that appellees had notice of this defense well in advance of trial, and probably as early as the pleadings stage. Therefore, we find that the lower court abused its discretion in refusing to grant a new trial. Accordingly, we reverse the order below and remand for a new trial.[8]
Reversed and remanded for a new trial.
Jurisdiction is not retained.
DEL SOLE, J., files a dissenting opinion.
DEL SOLE, Judge, dissenting:
The majority concludes that the trial court erred in allowing Appellees' expert witnesses to testify on rebuttal and thus remands for a new trial. Since my review of the record shows no prejudice or surprise to Appellant from the *419 introduction of the expert testimony nor any bad faith on the part of Appellees, I respectfully dissent. I would also then reach the remaining issues raised by Appellants and affirm the judgment of the trial court.
As I read the majority opinion, it relies on Appellees' perceived failure to comply with the rules of discovery and the general belief that Appellees did not act in good faith in not retaining an arson expert or experts prior to trial. Specifically, the majority finds that Appellees' experts should have been precluded from testifying under Rules 4003.5 and 4019 of the Pennsylvania Rules of Civil Procedure. In addition, the majority infers bad faith by Appellees based on its finding that the pleadings gave ample notice to Appellees that Appellant would raise an arson defense at trial and that Appellees accordingly should have retained experts prior to trial who would then have been identified in answers to interrogatories or at the pre-trial conference. However, I feel the majority's analysis is flawed because it has ignored prior well settled case law in this Commonwealth.
The issue of whether to admit expert testimony undisclosed prior to trial has been addressed several times by this Court. In Gill v. McGraw Electric Co., 264 Pa.Super. 368, 399 A.2d 1095 (1979), a decision relegated to a footnote by the majority, this Court en banc established the analytical framework within which to consider admission of previously undisclosed expert testimony. The Gill Court set forth four criteria relevant to such determination: 1) the prejudice or surprise in fact of the party against whom the excluded witnesses would have testified, 2) the ability of that party to cure the prejudice, 3) the extent to which waiver of the rule against calling unlisted witnesses would disrupt the orderly and efficient trial of the case or other cases in the court, and 4) bad faith or willfulness in failing to comply with a pre-trial order limiting witnesses to be called to those named prior to trial. Id., 264 Pa.Superior Ct. at 382, 399 A.2d at 1102. Thus, under Gill, the trial judge still can admit, in his sound discretion, previously undisclosed *420 expert testimony despite the fact that the rules of discovery or a pre-trial conference order were not wholly complied with by a party.
The most recent pronouncement of this Court on the issue of the admission of previously undisclosed expert testimony is Kemp v. Qualls, 326 Pa.Super. 319, 473 A.2d 1369 (1984). This Court stated in Kemp:
While the late disclosure of the identity or qualifications of an expert is to be condemned, the mere occurrence of such a circumstance does not per se create grounds for a new trial. In Gill v. McGraw Electric Co., 264 Pa.Super. 368, 399 A.2d 1095 (1979), a case cited by the Appellant, this Court declared that to preclude expert testimony, in the circumstance of late disclosure of information about him to the adverse party, is a drastic sanction, and unless necessary under the facts of the case, may be the basis for finding an abuse of discretion by the trial judge. Our Court also considered whether the sanction of preclusion of expert testimony should be granted, due to untimely response to pre-trial interrogatories, in the case of Royster v. McGowan Ford, Inc., 294 Pa.Super. 160, 439 A.2d 799 (1982). There it was stated: ". . . [A]ssuming that a party has not acted in bad faith and has not misrepresented the existence of an expert expected to be called at trial, no sanction should be imposed unless the complaining party shows that he has been prejudiced from properly preparing his case for trial as the result of a dilatory disclosure". 294 Pa.Super. at 169, 439 A.2d at 804.
Id., 326 Pa.Superior Ct. at 330, 473 A.2d at 1374.
The majority attempts, in footnote three of its opinion, to portray the Gill criteria as merely "of some aid" in ruling on the admissibility of undisclosed expert testimony citing in support this Court's decision in Sindler v. Goldman, 309 Pa.Super. 7, 454 A.2d 1054 (1982). However, a close reading of Sindler reveals that this Court did employ the Gill criteria in reaching our holding. Further, the portion of Sindler cited by the majority was only a footnote which the *421 majority has somehow misinterpreted. Footnote eight of this Court's opinion in Sindler merely states that the Gill, a case involving a violation of a pre-trial order, can be applied to cases in which no pretrial order limiting witnesses has been entered. Id., 309 Pa.Superior Ct. at 15, n. 8, 454 A.2d at 1058, n. 8. The majority interprets the footnote as rendering the Gill analysis merely advisory, a fact evident from its failure to employ such criteria in the body of its opinion. It is true that the majority concludes in footnote three of its opinion that the Appellees' experts would have been precluded from testifying under Gill, but the majority offers no reasoning to support its conclusions. In fact, were the majority to employ a Gill analysis, as I believe it was bound to do, it would have concluded as I do that the trial court properly permitted Appellees' experts to testify on rebuttal.
In the instant case, Appellees were permitted by the trial court to testify on rebuttal to contradict the opinion of Appellant's expert that the fire which destroyed Appellees' residence was arson. On appeal, Appellant cites Gill and argues it was prejudiced and surprised by Appellees' expert testimony. I am unable to agree. Appellant was not in fact surprised because it had raised the issue of arson and thus was fully prepared to argue the point at trial. Given this fact, Appellant was also not prejudiced since it had a full and fair opportunity to present its defense, cross-examine Appellees' experts and offer surrebuttal testimony. If Appellant was truly prejudiced or surprised, it could have cured the prejudice by a continuance, which it did not request. The testimony of Appellees' experts on rebuttal may have been unexpected, but it was not prejudicial or surprising to Appellant.
When the remaining two prongs of the Gill analysis are applied it becomes apparent that the testimony of Appellees' experts was properly admitted. There can be no serious contention that the calling of Appellees' expert disrupted the trial or other trials since the trial was only extended a few more days. Finally, I also believe that *422 there is no evidence in the record to support a contention that Appellees acted in bad faith by not disclosing their experts prior to trial or in not obtaining arson experts prior to trial. The basis of the majority's finding of bad faith is solely that Appellees should have been on notice from the pleadings that Appellant would raise the defense of arson. However, a reading of the pleadings shows that while there was some mention of a suspicious cause for the fire in question the defense of arson was never squarely raised until the pre-trial conference, a fact conceded by the majority. Further, when it became apparent to Appellees at trial that the cause of the fire was being specifically put in issue by Appellant, they expeditiously secured expert witnesses and made their presence known prior to the experts' testimony.[1] There is no other evidence in the record to even infer a finding of bad faith much less a willful and deliberate attempt by Appellees to circumvent and make a mockery of the rules of discovery. The majority takes the position, as I perceive it, that to not exclude the expert testimony here would render the rules of discovery and the sanctions thereunder useless. I do not share this view. While we should never condone violations of the discovery rules we also have recognized that the exclusion of expert testimony is a serious sanction and should only be imposed in certain situations. This is why this Court adopted criteria for exclusion in Gill and applied those criteria in cases following Gill. Had the majority of this Court fully considered and applied the Gill criteria I cannot help but think that it would have reached the same conclusion as I that the trial court was correct in its decision allowing Appellees' experts to testify.
*423 Since I would affirm the trial court's decision on the expert testimony, I would also reach the remaining issues raised by Appellant and find that the trial court opinion correctly and adequately disposes of the issues presented. Thus, I would affirm the judgment of the trial court.
NOTES
[1] The damages award was comprised of the following elements: dwelling, $55,000.00; personal property, $27,500.00; and living expenses, $7,000.00.
[2] At the time the notice of appeal was filed, no judgment had been entered, only a verdict; therefore, this Court did not have jurisdiction. However, once judgment was subsequently entered on March 25, 1983, Superior Court jurisdiction was perfected. See Pa.R.A.P. 905(a); Minich v. City of Sharon, 325 Pa.Superior Ct. 178, 472 A.2d 706 (1984).
[3] In Sindler, we also noted that the following four factors specified in Gill v. McGraw Electric Company, 264 Pa.Superior Ct. 368, 382, 399 A.2d 1095, 1102 (1979) (en banc), "[could] be of some aid" in considering whether or not a witness should be precluded for failure to comply with discovery rules even though Gill involved the violation of a pre-trial order:
(1) the prejudice or surprise in fact of the party against whom the excluded witnesses would have testified,
(2) the ability of that party to cure the prejudice,
(3) the extent to which waiver of the rule against calling unlisted witnesses would disrupt the orderly and efficient trial of the case or of other cases in the court,
(4) bad faith of [sic] willfullness in failing to comply with the court's order.
309 Pa.Superior Ct. at 15 n. 8, 454 A.2d at 1058 n. 8. Here, as in Sindler, we find that these factors also mitigate in favor of preclusion.
Additionally, we note that Gill was decided prior to the effective date of Pa.R.Civ.P. 4019(i) (effective April 16, 1979) and therefore followed the abuse of discretion standard applied in such pre-Rule cases. See Saks v. Jeanes Hospital, 268 Pa.Superior Ct. 578, 408 A.2d 1153 (1979). Here, however, the case arose after Rule 4019(i) became effective and is therefore controlled by the mandatory preclusion rule. Accordingly, we find the applicability of Gill to the instant case questionable.
[4] See also Little v. Sebastion, 50 D. & C.2d 761, 766 (Lebanon Co. 1967) ("[T]he objects of a proper discovery procedure are to first, narrow the issues; second, obtain evidence to be used at the trial of the issues; third, secure information as to the existence and scope of evidence that may be used at the trial; and fourth, to obtain the necessary information to prepare proper pleadings.").
[5] Although there is some lower court authority for holding that the identity of an expert rebuttal witness need not be disclosed in advance of trial because the necessity for calling such witnesses may not be determinable until after the other party has presented its case-in-chief, see Fidler v. Wood Chips, Inc. 11 D. & C.3d 778 (Clinton Co. 1979), we need not decide that issue here. The court in Fidler distinguished the situation in which the testimony presented by the plaintiffs in rebuttal more properly belonged in their case-in-chief. Id. at 780. We believe that the instant case is an example of the latter situation in light of the scanty expert testimony presented in appellees' case-in-chief and appellees' pre-trial awareness of appellant's defense.
[6] The lower court and appellees rely on the fact that appellant did not request a continuance at the trial. However, we note that the discovery rules authorize the court to "grant a continuance or other appropriate relief" only "if the failure to disclose the identity of the witness is the result of extenuating circumstances beyond the control of the defaulting party." Pa.R.Civ.P. 4003.5(b) and 4019(i). Having found no such extenuating circumstances in the instant case, such a request for a continuance would have been fruitless.
[7] We find Emerick distinguishable from the instant case because, in that case, this Court found the following extenuating circumstances: Defendant's original expert witness became unavailable a week before trial whereupon defense counsel arranged for a new expert to give testimony, which was substantially similar to that contained in the original expert's report. After the jury was selected, defense counsel supplied plaintiffs with the new expert's name and, later that day, gave plaintiffs' counsel a copy of the expert's report. Plaintiffs' counsel had an opportunity to take the new expert's deposition over the weekend before plaintiffs' evidence was introduced on Monday and also had copies of both experts' reports before they offered evidence. Additionally, plaintiffs failed to demonstrate any prejudice as a result of defendant's untimely disclosure of the new expert's identity.
Here, however, Jennings and Evans were not testifying as replacement witnesses for suddenly unavailable experts, because appellees did not retain any experts as to the cause and origin of the fire prior to trial. Therefore, appellant had no advance notice of their testimony. Moreover, appellees did not even supply appellant with the names and reports of these experts during the one-week adjournment period so that appellant could prepare for this new testimony and possibly depose Jennings and Evans prior to their testifying on August 4. Finally, appellant demonstrated prejudice as a result of appellees' nondisclosure of Jennings' and Evans' identities because it "was precluded from conducting any discovery of the opinions of the experts and from having an opportunity to meet their testimony." (Brief for Appellant at 14).
[8] Appellant also raises other allegations of trial court error. Because of our disposition of this case, however, we need not dispose of those issues.
[1] In its opinion, the majority infers that Appellees were somehow required to anticipate and meet Appellant's arson defense. It must be noted that Appellees were in no way required, under the facts, to introduce expert testimony to disprove arson or even prove their case. Appellees were not required to prove a negative. It was Appellant's burden to prove arson which it attempted to do through expert testimony. It was only on rebuttal that Appellees felt it necessary to utilize expert testimony. Under the facts, I do not find it unusual, and certainly not bad faith, that Appellees waited until necessary to retain an expert.
| 2023-11-30T01:26:58.646260 | https://example.com/article/6857 |
An ancient mechanism controls the development of cells with a rooting function in land plants.
Root hairs and rhizoids are cells with rooting functions in land plants. We describe two basic helix-loop-helix transcription factors that control root hair development in the sporophyte (2n) of the angiosperm Arabidopsis thaliana and rhizoid development in the gametophytes (n) of the bryophyte Physcomitrella patens. The phylogeny of land plants supports the hypothesis that early land plants were bryophyte-like and possessed a dominant gametophyte and later the sporophyte rose to dominance. If this hypothesis is correct, our data suggest that the increase in morphological complexity of the sporophyte body in the Paleozoic resulted at least in part from the recruitment of regulatory genes from gametophyte to sporophyte. | 2023-10-31T01:26:58.646260 | https://example.com/article/3145 |
Introduction {#s1}
============
The molecular motor myosin V is a dimeric protein with two identical motor domains or 'heads', each of which has a nucleotide binding pocket for the hydrolysis of ATP. The motor transduces the free energy released from ATP hydrolysis into discrete mechanical steps along actin filaments [@pone.0055366-Mehta1], [@pone.0055366-Baker1]. The properties of these steps have been characterized by changing the ATP concentration and an external load in various single-molecule and chemokinetic experiments [@pone.0055366-Baker1]--[@pone.0055366-Gebhardt1] including living cells [@pone.0055366-Pierobon1]. The details of the motor's mechanical steps have been investigated using sophisticated single-molecule techniques [@pone.0055366-Komori1]--[@pone.0055366-Sellers1]. Moreover, the motor's motion has directly been visualized through AFM imaging [@pone.0055366-Kodera1].
In a single forward step, the motor unbinds its trailing head from the filament, moves this head forward by 72 nm, and rebinds it to the filament in front of the other head. Since the latter head stays at a fixed filament position, the motor's center-of-mass is displaced by 36 nm during such a step. This directed motion requires the coordination of the ATP hydrolysis by the two motor heads. It is generally believed that this coordination involves the following motor states and transitions. For most of its time, the motor molecule dwells at a fixed filament position with ADP bound to both heads. The sequence that leads to a forward step starts with ADP release from the motor's trailing head followed by ATP binding to this head, while the motor's leading head remains in its ADP state. The different ADP release rates for the trailing and leading head, that we will describe as gating, are thus essential for the coordination of the two heads. However, it has not been possible, so far, to directly measure these two rates for double-headed myosin V. Experiments on single-headed myosin V indicate that resisting and assisting load forces lead to rates that can differ up to 100-fold [@pone.0055366-Purcell1], [@pone.0055366-Veigel1], [@pone.0055366-Forgacs1], [@pone.0055366-Oguchi1]. In a double-headed molecule, intramolecular strain leads to opposite forces on the two heads of the motor. Therefore, the experiments on single-headed myosin V imply that the different release rates will depend on force as well. In the present study, we will refer to the difference of ADP release rates as gating. Note that the latter term is used with a slightly different meaning by different authors.
This paper is closely related to our previous work, where we have discussed a network description for myosin V that captures the motor's stepping properties as a function of external control parameters such as nucleotide concentration and external load force [@pone.0055366-Bierbaum1]. The step velocity of myosin V depends on the concentration of ATP, and decreases with decreasing \[ATP\]. For a load force that opposes the motor's stepping direction, the load decreases the motor's velocity, until this velocity vanishes at the stall force pN [@pone.0055366-deLaCruz1], [@pone.0055366-Rief1], [@pone.0055366-Uemura1], [@pone.0055366-Clemen1]. For resisting loads that exceed the stall force, the motor exhibits a ratcheting behaviour, i. e., it steps backwards without being much affected by the ATP. For assisting loads, the step velocity of the motor is independent of the load force. In our previous study [@pone.0055366-Bierbaum1], the motor's motion was described by a chemomechanical network that includes both chemical reactions, provided by the binding and release of nucleotides, as well as two mechanical stepping transitions, both of which have the same step size ( nm). The stepping properties of the motor for both assisting, sub- and superstall forces, were described by three different motor cycles, a chemomechanical, an enzymatic, and a mechanical step cycle. Furthermore, the gating effect was incorporated by differing ADP release rates of the molecule's leading and its trailing head.
In this paper, we will determine the ratio of the two ADP release rates by analyzing the dwell time distributions as measured for the double-headed motor. We deduce this ratio, termed gating parameter, through comparison of the three cycles discussed in [@pone.0055366-Bierbaum1] with the experimental dwell time distributions that are available for myosin V [@pone.0055366-Rief1], [@pone.0055366-Clemen1], [@pone.0055366-Gebhardt1]. In this way, our work is embedded into the framework of branched chemokinetic networks that have been addressed predominantly in the context of kinesin [@pone.0055366-Astumian1], [@pone.0055366-Hyeon1]. Our aim is to directly relate the experimentally determined chemokinetic parameters of myosin V such as the binding and release of nucleotides to the dwell time distributions as measured in single-molecule experiments with double-headed myosin V.
In single-molecule experiments that involve double-headed myosin V, the motor's steps are monitored through the motion of a bead attached to the stalk of the motor. The evaluation of a stepping trajectory, as shown in [Fig. 1](#pone-0055366-g001){ref-type="fig"}, leads to a distribution of its dwell times during which the motor sojourns between two steps. These dwell times provide information about the molecule's chemomechanical mechanism and have been computed for kinesin [@pone.0055366-Valleriani1] and for complex networks of myosin V [@pone.0055366-Liao1]. For kinesin, it is difficult to measure the dwell time distribution because of the motor's fast kinetics [@pone.0055366-Carter1]. For myosin V, however, the slower motion allows to experimentally resolve the overall shape of its dwell time distribution. The network representation for myosin V as introduced in Ref. [@pone.0055366-Bierbaum1] and used here is based on the experimentally observed separation of time scales between mechanical and chemical transitions [@pone.0055366-Dunn1], [@pone.0055366-Cappello1]. A similar time scale separation has been observed for conventional kinesin [@pone.0055366-Carter1] and used to construct chemomechanical networks with several motor cycles [@pone.0055366-Hyeon1], [@pone.0055366-Liepelt1], [@pone.0055366-Liepelt2].
![(a) Typical stepping trajectory, i.e., spatial displacement as a function of time and (b) dwell time distribution of myosin V, adapted from [@pone.0055366-Rief1].\
(a) In single-molecule experiments with a feedback loop, the data are monitored under constant external load. Hence, the distance between the bead monitoring the motor's motion (upper gray trajectory, with the thin black line showing a filtered curve) and the trap center (black trajectory) remains constant. (b) Dwell time distribution of myosin V for saturating \[ATP\]. The solid line is a fit from Ref. [@pone.0055366-Rief1] that involves two exponential functions with decay rates 150/s and 12.5/s.](pone.0055366.g001){#pone-0055366-g001}
This paper is organized as follows. We give a brief overview about network representations for molecular motors and the formalism for the calculation of the dwell time distributions using Markovian dynamics. We first describe the motor's kinetics by a single chemomechanical cycle that is dominant for external loads below the stall force , as follows from our previous study [@pone.0055366-Bierbaum1], in which we used a more complex three-cycle network. We then calculate the motor's dwell time distributions for various nucleotide concentrations, in very good agreement with experimental data. The use of a network based on few parameters allows to quantify the influence of nucleotide binding and release rates onto the dwell time distributions. Second, taking additional pathways from the more complex network into account, we quantitatively determine the motor's gating effect. To address force dependent dwell time distributions, we discuss the range of external loads, for which the uni-cycle network applies. Our approach enables us to determine separate distributions for forward and backward steps, and we gain information about the motor's backward steps through comparison with experimental data. Finally, we summarize and discuss our results.
Methods {#s2}
=======
Network Representations {#s2a}
-----------------------
In general, the stepping properties of molecular motors can be described through network representations with discrete chemomechanical states of the motor supplemented by Markovian dynamics.
As explained in previous studies [@pone.0055366-Bierbaum1], [@pone.0055366-Liepelt1], [@pone.0055366-Astumian2], the network for a double-headed motor contains, in general, many chemical states that differ in the occupation of the two heads by nucleotides. It is interesting to note that each of these chemical states represents a branching point of the networks. As shown in Ref. [@pone.0055366-Bierbaum1], the behavior of myosin V as observed in single-molecule experiments can be described by reduced networks with four chemical states as in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"} or with six chemical states in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}. In these networks, the motor moves along a discrete, one-dimensional coordinate towards the barbed end of the actin filament. The binding sites along the filament are separated by the motor's step size . At each site , the motor can undergo several chemical transitions that lead either to the hydrolysis or the synthesis of one ATP molecule. These transitions connect the motor's states that are defined by the chemical composition of its two heads. Each head can contain bound ATP (T) or ADP (D), and it can be empty (E), such that a combination of these states of the motor's leading and trailing head determine, together with its position, its *chemomechanical* state. To determine the dwell time between two steps of the motor, we consider a network with all chemical states at a given lattice site with the states 3′′ and 4′ at neighbouring sites *x*′′ and *x*′. A chemical transition from state to state involves the binding or release of ATP, ADP, or P, while the mechanical transitions and correspond to forward and backward steps of size .
![Chemomechanical networks based on the nucleotide states of the two motor heads at site , with chemical transitions shown as solid blue lines.\
The motor can reach states at the neighbouring sites and through mechanical transitions (dashed lines). The motor's step velocity can be calculated by periodically repeating the networks at site along the spatial coordinate. (a) Uni-cycle network for myosin consisting of the chemomechanical cycle . Dashed red lines show mechanical transitions along the filament coordinate , which emerge from the state TD into the forward and from state DT into the backward direction. Solid lines refer to chemical transitions. The arrows indicate the direction of the transition, and infrequent transitions are shown in grey. This uni-cycle network applies to forces below the stall force . (b) Three-cycle network introduced in [@pone.0055366-Bierbaum1] that captures the myosin's stepping properties for both sub- and superstall load forces. The network includes ADP release from the leading head and additional forward and backward mechanical transitions for forced stepping (dashed violet line), with the dots pointing into the direction of hydrolysis. In addition to the network cycle , two cycles and are present. While the enzymatic cycle contains only chemical transitions, the mechanical cycle consists only of the mechanical transition . Thus, a spatial displacement can arise by means of the network cycle (dashed red lines) or the mechanical cycle (dashed violet lines).](pone.0055366.g002){#pone-0055366-g002}
Throughout this work, we use networks with absorbing boundaries, i. e., network representations that include all motor states at lattice site and are truncated at the neigbouring sites and . The step velocity of the motor can be obtained when the network cycle is periodically repeated along the filament, see [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}. The network that captures the stepping properties for the experimentally accessible range of load forces as discussed in [@pone.0055366-Bierbaum1] is shown in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}. It is an extended version of the network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}, with two additional cycles and . These two cycles become dominant for the motor's motion in a range of forces that exceed the stall force of the motor. The network contains two stepping transitions, in and in the cycle . From this network, the motor's step velocity can be deduced by using multiple copies of the network, see [@pone.0055366-Bierbaum1]. Here, we focus on the uni-cycle network shown in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}, that, as a sub-network of the three-cycle network, describes the motor's motion for a restricted range of external loads. This approach allows us to analytically determine the dwell time distributions. Moreover, a direct connection between the chemical binding and release rates of the motor and the dwell time distributions for various nucleotide concentrations can be established. To extract additional information in particular about the gating effect, we return to the more complex network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}.
The chemomechanical network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"} describes the stepping behaviour of myosin V in accordance with experimental studies [@pone.0055366-Rief1], [@pone.0055366-Veigel1] for forces that do not exceed the stall force pN of the motor. We will elucidate the dependence on external load in detail further below. The motor starts from the DD state with ADP bound to both heads, releases ADP from its trailing head to attain state ED, binds ATP to its trailing head (TD), and performs a forward step, during which both heads interchange their position (DT). Hydrolysis at the leading head leads to state DD, and, in this way, a trajectory connecting two chemically equivalent states completes the chemomechanical cycle (DD ED TD DT DD). The reverse cycle (DD DT TD ED DD) would lead to a backward step DT TD coupled to ATP synthesis. The cycles and form the network cycle .
In vitro experiments are typically performed for relatively low concentrations of ADP and P, which implies that both ATP synthesis and the reverse cycle are strongly suppressed. In addition, the rate of ATP dissociation from the trailing head of the myosin V motor, which is part of the reverse cycle , is very small, as discussed in detail in [@pone.0055366-Bierbaum1]. Backward steps are still possible, however, even for the relatively simple network displayed in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"} since a backward step may occur immediately after a forward step corresponding to the sequence TD DT TD. The latter sequence of transitions is very unlikely in the absence of load but becomes more probable with increasing load force [@pone.0055366-Bierbaum1].
Gating and Mechanical Details of the Myosin V Step {#s2b}
--------------------------------------------------
Before we discuss the actual network dynamics, let us briefly review some molecular details of myosin V, which will be important in order to relate our theoretical results to experimental observations. So far, we have emphasized the uni-cycle network . In this network, the release of ADP takes place at the molecule's trailing head. If the DD state were 'symmetric' with respect to ADP release, the probability to release ADP from the leading head would be equal to the one from the trailing head. It is, however, generally agreed that the rates of ADP release are different for the leading and the trailing head [@pone.0055366-Purcell1], [@pone.0055366-Veigel1]. Thus, in order to describe the gating effect in an explicit manner, we need to consider the three-cycle network displayed in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}.
The different ADP release rates from the heads of myosin V are thought to arise from internal strains that the heads experience when they are simultaneously bound to the filament [@pone.0055366-Veigel1]. In this case, one head is subject to a positive internal force and the other to a negative one. Experiments with single-headed myosin V constructs have shown that the ADP release rate depends on the direction of the external load imposed onto the molecule [@pone.0055366-Oguchi1]. When both heads are bound to the filament, the motor experiences an internal strain arising from the elastic properties of its lever arms, that corresponds to a force acting on both heads in opposite directions. To what extent this strain is distributed in the double-headed motor, is, however, not a priori clear. The step of myosin V consists of a large, directed swing of its lever, called power stroke, and a diffusional search of the free head for the next target. The elastic energy provided for the power stroke is induced by the hydrolytic reaction taking place at the myosin head. How this elastic energy is distributed in the different chemical states of the motor heads, however, remains unclear. In single-headed molecules, the kinetic properties of the power stroke have been characterized in detail [@pone.0055366-Sellers1], [@pone.0055366-Oke1]. The stroke is induced through a conformational change, that affects the position of the motor head on the filament, and rotates the lever arm. This conformational change is assumed to affect the ADP-bound state of the motor [@pone.0055366-Sellers1]. In a double-headed molecule, the elastic energy required for the stroke leads to a strained position of myosin V, as deduced from AFM images, which reveal a bending of the molecule's leading lever [@pone.0055366-Kodera1], thereby changing the internal force acting onto the motor heads. In this way, both the gating and the power stroke have an effect onto the steps of the motor. The substeps of myosin V have been monitored in various experiments [@pone.0055366-Uemura1], [@pone.0055366-Clemen1], [@pone.0055366-Dunn1], [@pone.0055366-Cappello1], with different substep numbers and step sizes. Keeping these observations in mind, we will combine the putative substeps of myosin V into a single step, and discuss the limitations of our approach along with the dependence of the dwell times on an external load.
Another property that is not fully understood is the gating effect. In an experimental study that involves mutants of kinesin-1, the possible causes of the gating effect are elucidated through single-molecule techniques [@pone.0055366-Clancy1]. There, the authors conclude that the gating in kinesin-1 arises through both intramolecular strain and steric effects. Due to the step size of 36 nm of myosin V, which is large compared to the 8 nm step size of kinesin, steric effects for gating are likely to play a minor role for myosin V. For myosin V, both Refs. [@pone.0055366-Rosenfeld1] and [@pone.0055366-Veigel1] conclude that the intramolecular strain leads to an increase in the ADP release rate at the molecule's rear head and to a decrease of the ADP release rate at the front head. Comparison with the data in [@pone.0055366-Oguchi1] that test single heads as a function of force support the conclusion that ADP release from the front head is strongly reduced, while the release at the rear head is only moderately enhanced.
We characterize the gating effect by using an ADP release rate that is measured in chemokinetic experiments [@pone.0055366-deLaCruz1], and impose the asymmetry through reduction of the ADP release rate at the leading head. Even though we use a specific network here, our approach is applicable to any network description for myosin V that allows for ADP release from both heads of the molecule, such as the one proposed in [@pone.0055366-Astumian2]. However, the parametrization will, in general, differ for different networks, especially with respect to the force dependence of transition rates. Let us now turn to the formalism that allows to compute the dwell time distributions for myosin V.
Markov Chains {#s2c}
-------------
The probability distribution for the time between two successive steps of the motor is governed by a random walk that has one or more absorbing boundaries. This approach corresponds to a first passage problem on a specific network [@pone.0055366-vanKampen1], and is closely related to the methods used in [@pone.0055366-Valleriani1], [@pone.0055366-Liao1]. The process starts at a fixed site at and is stopped when an absorbing state is reached. For a Markov chain that consists of two states, an initial state 0 and an absorbing state 1 connected through the transition rate , the probability distribution is exponential, which applies to myosin V for superstall resisting forces.
In the trajectories observed in single-molecule experiments, the dwell times between two successive steps correspond to random walks whose dynamics are determined by the underlying chemomechanical network. These random walks start directly after a mechanical step and are terminated after another mechanical step. In addition, these states also terminate the random walk when a step is taken through the mechanical transition. A Markov chain that corresponds to a closed network thus consists of a piece of that network that contains all chemical transitions at a lattice site and is terminated at the two neighbouring sites and , see [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}. Thus, the latter two states are *absorbing* states of the network, while the remaining states are *transient*.
For a given Markov chain with and states, let the first states be transient and the remaining states be absorbing. We denote the conditional probability for the process to dwell in state at time given that it started in state at time by . The corresponding master equation reads.where is the transition or jump rate from state to state . These rates have the general formwhere accounts for the force dependence [@pone.0055366-Liepelt1]. For better readability, we omit the prime to indicate the spatial coordinate in both the transition rates and the functions . For chemical rates, we haveof a nucleotide species X, as appropriate for dilute solutions. For the step rates in , and , we havefor a forward andfor a backward step with parameter in accordance with the balance conditions from nonequilibrium thermodynamics [@pone.0055366-Liepelt2].
In principle, all chemical transition rates may depend on force but this force dependence is difficult to estimate. The force dependence of the binding or release of a specific nucleotide in a complex macromolecule such as a motor head cannot be accounted for by basic approaches such as reaction rate theory. Our minimal approach is thus to neglect the putative force dependence of the chemical rates, unless such a dependence is needed to describe the experimental data. In agreement with experimental studies [@pone.0055366-Veigel1], [@pone.0055366-Oguchi1], we thus concluded in [@pone.0055366-Bierbaum1] that solely the binding rates and decrease with resisting loads, see section S. 2 of [Text S1](#pone.0055366.s004){ref-type="supplementary-material"} for details of the parametrization. A force dependence of these two rates is sufficient to describe the stepping behaviour of myosin V for all three regimes of external load. Thus, we take all chemical rates to be independent of force both for the cycle within the three-cycle network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"} and for the single-cycle network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}.
The steady state solution to the master equation is given by for any transient state, because the walk will eventually always end up in an absorbing state. For an absorbing state , is equal to the probability for being absorbed in given that the walk started in , see [@pone.0055366-Valleriani1].
The dynamics of the process prior to absorption is identical to the dynamics of an unrestricted Markov process. This means as long as the process does not end up in an absorbing state, its behaviour is identical to that of a closed network: Being in a given state, the process is not influenced by the absorbing states, until the process is terminated. Before reaching an absorbing state, the random walk proceeds with an exponentially distributed waiting time in every transient state ,with an average dwell time . The process starts in a state , sojourns in each state according to the probabilityuntil it is eventually absorbed in state . The dwell time of the process is given by the shortest time it takes to arrive in any absorbing state given that the walk started in , see section S. 1 of the [Text S1](#pone.0055366.s004){ref-type="supplementary-material"}. To describe trajectories from single-molecule experiments, we are interested in all walks that, as mentioned before, start in a state directly after a mechanical transition. This transition can consist of a forward or a backward step, which implies two possible initial states. In addition, as another mechanical step either in the forward or backward direction terminates the process, we also have two possible absorbing states. In order to distinguish between the subsets of dwell times that arise from forward and backward steps, the conditional probability density distribution is required. This distribution governs the subset of walks that start in and are absorbed in , and thus refers to the absorption into a specific state . The conditional probability density distribution is defined as
It is given by the time-dependent derivative of the probability, , rescaled with the steady state probability for absorption, . To determine via Eq. (8), we explicitly solve the master equation, to obtain the time-dependent transition probabilities , and thus . The corresponding steady state solution follows by integration,Prior to discussing the explicit form of the dwell time distributions, let us note that in case of a network that does not contain *any* absorbing states, the corresponding master equation can be rewritten in terms of flux differences or excess fluxes from state to state ,with the excess fluxes and transition rates . The step velocity of the motor is related to the flux through the mechanical transitions of the network in the steady state with . For the network cycle as in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}, the velocity of the motor is then given byi.e., by the excess flux through the transition .
Conditional Dwell Time Distributions {#s2d}
------------------------------------
Let us calculate the distributions that refer to transitions connecting two subsequent forward or backward steps, and , or a backward following a forward step and vice versa, and . Hence, the four distributions have the initial states 3 and 4, and the absorbing states 3′′ and 4′, respectively. In the chemomechanical cycle , the rates for ATP dissociation and P binding in the case of \[P\] are very small, , in accordance with the experimental conditions in [@pone.0055366-Rief1], [@pone.0055366-Clemen1]. For simplification, we set these rates equal to zero in our calculations, such that the pathway vanishes in the network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}. For the network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"} that consists of three cycles, we use the values for the transition rates and as determined in Ref. [@pone.0055366-Bierbaum1], while the remaining rates within are identical for both networks. The steady state probabilities read. With the use of Eq. 8, the dwell time distributions for these four conditional steps can be explicitly calculated and compared to experimental data. As shown in [@pone.0055366-Valleriani1], the distributions that refer to the probabilities of taking a forward and a backward step, and , read.
The distribution for all events is given byThe distributions and are multi-exponential functions with decay rates , with the tail of the distributions governed by the smallest eigenvalue
The eigenvalues for the network read
For small \[ADP\], the first two eigenvalues reduce to and .
Results {#s3}
=======
Dependence on Nucleotide Concentrations {#s3a}
---------------------------------------
In order to compare our results with the experimentally determined distributions reported in [@pone.0055366-Rief1], [@pone.0055366-Clemen1], we have rescaled the experimental data such that the area covered by the histogram is normalized. Throughout this article, experimental data are shown as green bars, while the total dwell time distributions as obtained from the network shown in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}, appear as solid blue lines. In the experiments in [@pone.0055366-Rief1], [@pone.0055366-Clemen1], low concentrations of ADP and P were used so that we can put \[P\] equal to zero as discussed in the previous section. For comparison, we take \[P\] = 0 in the three-cycle network as well, our results, however, are not altered for \[P\] = 0.1 , the concentration used in [@pone.0055366-Bierbaum1]. As ADP binding has more impact on the motor's motion [@pone.0055366-Baker1], [@pone.0055366-delaCruz1], we use, if not indicated differently, a small concentration of \[ADP\] = 0.1 in our calculations for both the single-cycle and the three-cycle network. We have also performed calculations for zero ADP concentration and have checked that the precise value of \[ADP\] does not alter the distributions in any significant manner.
[Fig. 3](#pone-0055366-g003){ref-type="fig"} shows the total distribution of dwell times, , for and different nucleotide concentrations using the transition rates shown in [Table 1](#pone-0055366-t001){ref-type="table"} and the experimental data from [@pone.0055366-Rief1]. The transition rates for the three-cycle network are given in Ref. [@pone.0055366-Bierbaum1]. For , \[ATP\] = , and small \[ADP\], see [Fig. 3(a)](#pone-0055366-g003){ref-type="fig"}, our results (blue lines) are in good agreement with the data. We have , and the tail of the distribution reflects the rate of ADP release. With addition of 400 \[ADP\] ([Fig. 3(b)](#pone-0055366-g003){ref-type="fig"}), the distribution broadens significantly, which reflects the inhibiting effect of ADP on the motor's motion, a fact experimentally well established [@pone.0055366-Baker1], [@pone.0055366-Uemura1], [@pone.0055366-delaCruz1]. For limiting \[ATP\] ([Fig. 3(c, d)](#pone-0055366-g003){ref-type="fig"}), the step velocity is, in the absence of ADP, governed by the rate of ATP binding.
![(a--d) Dwell time distributions for different concentrations of ATP and ADP, with \[P\] = as discussed in the text.\
Comparison of distributions calculated using the uni-cycle network in Fig. 2(a) (blue solid lines) with experimental data (green bars) from [@pone.0055366-Rief1]. Insets: Concentrations that apply to both experimental data theoretical curves are shown in the gray panels, while parameters specific to the theoretical results are given in the framed panels. In (a), (c--d), the experimental concentration of ADP is believed to be negligible. For saturating \[ATP\], (a,b) the dwell time distributions for the uni-cycle network (blue line) agree with those for the network shown in 2(b), for all gating parameters (data not shown). The symbols show simulated data for the network in 2(b) without gating (green circles) and gating with a 10-fold decelerated ADP release from the motor's leading head (red circles).](pone.0055366.g003){#pone-0055366-g003}
10.1371/journal.pone.0055366.t001
###### Transition rates for the uni-cycle network.
{#pone-0055366-t001-1}
binding rates, release rates, step rates,
---------------- ---------------- ------------- ------- --------- ---------
0.9\* 4.5\*\* 12\* 250\* 7000^†^ 0.65^‡^
Transition rates for the network displayed in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"} for , as determined experimentally in [@pone.0055366-deLaCruz1] (\*) and [@pone.0055366-Rief1] (\*\*), from simulations [@pone.0055366-Craig1] (^†^), and earlier work [@pone.0055366-Bierbaum1](^‡^).
The network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"} contains no transition where ADP is released from the leading head. The gating effect has to be taken into account for networks that involve the transitions DD DE or ED EE. The latter transitions constitute *leaks* from the simple network in [Fig. 2(a)](#pone-0055366-g002){ref-type="fig"}. In order to address the gating effect, we also considered a more complex network that allows for ADP release from the leading head, as shown in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}. It contains an additional forward and backward stepping transition and that is active in the regime of superstall resisting forces, see section S. 2 of [Text S1](#pone.0055366.s004){ref-type="supplementary-material"}. Networks that include ADP release for both the leading and the trailing head, may be supplemented by the simplifying assumption that these rates do not differ. Indeed, the dwell time distributions that are obtained from the network shown in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"} do agree with the experimental data for high concentrations of ATP without any gating.
Let us describe the gating effect by the ratio between the ADP release rates from the molecule's leading and trailing head, i. e.,
In the case of limiting \[ATP\], neglecting the gating effect by assuming equal rates of ADP release for both heads, i. e, , leads to discrepancies between the experimental data and simulated dwell times (green circles in [Fig. 3(c, d)](#pone-0055366-g003){ref-type="fig"}) for the network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}. These discrepancies for low \[ATP\] can be understood because the ATP binding transition , which is rate-limiting for the motor's kinetics, competes with the transition for ADP release from the leading head, . The motion is not affected as long as competing transitions in the network have a small probability compared to ATP binding. In the absence of a gating effect, the rate for ADP release is 10-fold higher compared to the ATP binding rate at \[ATP\], which leads to less mechanical steps through the stepping transitions and . This would result in longer dwell times and hence in a broader distribution than the one observed experimentally. The width of this distribution is primarily determined by the gating parameter and decreases with decreasing .
For the chemomechanical network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"} which includes the transition ED EE, the red circles in [Fig. 3(c, d)](#pone-0055366-g003){ref-type="fig"} show the simulated dwell times that are obtained for gating parameter , which is in the range of where we find best agreement of the simulated dwell times with the experimental data [@pone.0055366-Rosenfeld1], [@pone.0055366-Veigel1].
To determine the optimal gating parameter , we compared the experimental dwell time distributions and the ones obtained from the three-cycle network for different values of . [Fig. 4(a)](#pone-0055366-g004){ref-type="fig"} shows the root mean square deviation RMSD between experimental dwell times and simulated ones as a function of the gating parameter for limiting concentrations of ATP, \[ATP\] and \[ATP\]. The root mean square deviation has been calculated between the simulated dwell times and the experimental ones as.
![(a) Root mean square deviation RMSD between the experimental data (green bars in Fig. 3 (c, d)) and the simulated dwell time distributions for the three-cycle network as a function of the gating parameter for \[ATP\] = 10 (crosses) and \[ATP\] = 2 (circles).\
A lower deviation indicates an improved agreement between the experimental values and the distributions that result from the three-cycle network. For both concentrations, the RMSD decreases with increasing , until it saturates for , as indicated by the dashed line. The fluctuations for large values of arise from the variance in the simulations. The solid lines serve as a guide to the eye. (b) In case of a variable ATP binding rate , the agreement between the simulated dwell time distributions (symbols) and the experimental data (green bars) is further improved. The agreement is optimal for (red crosses), and is significantly improved in contrast to the distribution based on the experimental value of (red circles). The inset shows the RMSD as a function of , illustrating the minimal deviation for](pone.0055366.g004){#pone-0055366-g004}
where are the dwell times for experiment and simulation, respectively, and is the number of bins for the experimental data (green bars in [Fig. 3(c, d)](#pone-0055366-g003){ref-type="fig"}). Note that we have adjusted the bin size of our simulations to the experimental bin size for comparison. For both concentrations, the RMSD decreases with increasing and saturates for values . To maintain the forward stepping of myosin V, ATP binding by the trailing head and ADP release from the leading head compete for small concentrations of ATP. For , the ATP binding rate is sufficiently large compared to the ADP release from the leading head, and the RMSD saturates. Because all other parameters used for the description of the myosin V velocity are derived from experimental data (in the limit of ), the value of should be regarded as a lower bound for the gating parameter .
The agreement between the calculated dwell time distributions and the experimental data can be further improved by treating the rate of ATP binding in the chemomechanical cycle as a fit parameter. [Fig. 4(b)](#pone-0055366-g004){ref-type="fig"} shows the dwell time distribution for \[ATP\] for an ATP binding rate of , which provides the best fit for fixed gating parameter . The inset in [Fig. 4(b)](#pone-0055366-g004){ref-type="fig"} shows the RMSD as a function of a variable ATP binding rate , which exhibits a minimum at . Let us note that with varying , the location of the minimum is shifted marginally within a range that falls below . As can be infered from [Fig. 4](#pone-0055366-g004){ref-type="fig"} (b), the agreement between the calculated dwell time distributions and the experimental data can be improved by considering the rate of ATP binding as a fit parameter. For the ATP binding rate , we have used a value of as reported for actin-bound myosin V in chemokinetic experiments with myosin V [@pone.0055366-deLaCruz1]. The values for ATP binding estimated from single-molecule experiments cover a range of [@pone.0055366-Rief1], [@pone.0055366-Veigel2]. For , the best fit of our simulations to the data leads to an ATP-binding rate of , which lies well within this range.
Dependence on External Load {#s3b}
---------------------------
Before addressing the dwell time distributions of myosin V subject to an external load, let us discuss the motor's step velocity as a function of external load. The corresponding force-velocity relation is needed to clarify *(i)* the range of external loads where the description via the network formed by the cycle is valid and *(ii)* the set of experimental data that can be evaluated within our theoretical framework.
Using the transition rates as given in [Table 1](#pone-0055366-t001){ref-type="table"}, we calculate the velocityof the motor via Eq. 11. The velocity depends on the external load force and the concentrations of \[ATP\] and \[ADP\] through the transition rates .
In the following, we will distinguish three different regimes of external load : (I) assisting and small resisting forces, where pN; (II) forces close to the stall force with pN pN; and (III) large resisting forces with pN.
[Fig. 5](#pone-0055366-g005){ref-type="fig"} shows the motor velocity as calculated from the single-cycle network in [Fig. 2](#pone-0055366-g002){ref-type="fig"} (a) with periodic boundary conditions for different concentrations of ATP, with \[ADP\] = \[P\]0 and the corresponding experimental data reported by various groups [@pone.0055366-Mehta1], [@pone.0055366-Uemura1], [@pone.0055366-Clemen1], [@pone.0055366-Gebhardt1], [@pone.0055366-Kad1]. The experimental values for the stall force cover a range of 1,6--2,5 pN [@pone.0055366-Mehta1], [@pone.0055366-Uemura1], [@pone.0055366-Clemen1], [@pone.0055366-Gebhardt1], [@pone.0055366-Kad1], while 2 pN for the network studied in Ref. [@pone.0055366-Bierbaum1]. Note that the three-cycle network description of the myosin V motor in Ref. [@pone.0055366-Bierbaum1] appropriately captures the ratchet mechanism of myosin V observed in [@pone.0055366-Gebhardt1] for large resisting forces (regime (III)), while the single-cycle description based on the network cycle is not valid in this load regime.
![Motor velocity as a function of external load for the network formed by the cycle (lines) compared to experimental data (symbols) for varying \[ATP\].\
In the experiments, the concentrations of ADP and P are believed to be rather small. In the calculations, we consider the limit of \[ADP\] = \[P\] = 0.](pone.0055366.g005){#pone-0055366-g005}
For saturating \[ATP\], comparison with experimental data shows good agreement for small resisting forces in regime (I). In regime (II) around the stall force , however, there is a discrepancy between the theoretical results and the experimental data. Since our parametrization is solely based on the parameter to account for the force dependence of the step rates and , the molecular details of the step are not included in our description. Hence, the motor's dwell time distributions cannot be compared to experimental data for forces that are close to the stall force. Let us point out that, in addition, the variation in experimental data restricts the possibility to compare all the dwell time distributions that have been measured as a function of external load. The velocities in Ref. [@pone.0055366-Clemen1], shown as solid blue diamonds in [Fig. 5](#pone-0055366-g005){ref-type="fig"}, correspond to the experimental dwell time distributions given therein. The distributions are available for forces pN, pN, pN, and pN from Ref. [@pone.0055366-Clemen1], and for pN from Ref. [@pone.0055366-Rief1]. Moreover, the dwell time distributions for pN can be found in [@pone.0055366-Clemen1] (used here) and [@pone.0055366-Gebhardt1].
A comparison of the experimental dwell time distribution with the theoretical one is meaningful if the corresponding velocity correctly reproduces the data, which is the case for pN and pN. The distribution for pN will be discussed further below. Since experimental and theoretical results for the velocity do not agree for both and pN, the theoretical and experimental dwell time distributions cannot agree either. The disagreement for pN reflects the variation in the experimental data and the latter value, pN, lies in the force regime (II) where the data are not reproduced correctly by our network. Ref. [@pone.0055366-Clemen1] provides a more exact fit to the velocity data for forces that do not exceed pN by including more force-dependent parameters. It does, however, not lead to the correct prediction of the stall force . This illustrates the difficulties to correctly describe the complete set of measured dwell time distributions.
The distributions for forces that do not exceed the stall force are shown in [Fig. 6(a--c)](#pone-0055366-g006){ref-type="fig"}, for pN, pN and pN. In the presence of an external load, the distributions change through the force-dependent forward and backward stepping rates and with the force factor . For superstall forces depicted in [Fig. 6(d)](#pone-0055366-g006){ref-type="fig"}, the motor steps backwards in a forced manner that can be described by the network in [Fig. 2(b)](#pone-0055366-g002){ref-type="fig"}, which contains the state EE. For pN, we find good agreement between our theoretical results and the experimental data, as shown in [Fig. 6(a)](#pone-0055366-g006){ref-type="fig"}. This confirms that for assisting forces, the stepping behaviour is virtually unaltered compared to , see [Fig. 6(b)](#pone-0055366-g006){ref-type="fig"}, as observed in [@pone.0055366-Clemen1]. All of the theoretical curves arising from the network in [Fig. 2](#pone-0055366-g002){ref-type="fig"} (a) show a steep decay of rapid events for short times 0.01 s. The width of this decay signal increases with increasing resisting load. For a force of pN as in [Fig. 6(c)](#pone-0055366-g006){ref-type="fig"}, the width of this peak exceeds the experimental resolution of s [@pone.0055366-Clemen1] (blue line). These events of short times are related to the distribution of backward steps, , and reflect the increase of the backward stepping rate with increasing load. The experimental data in [Fig. 6(c)](#pone-0055366-g006){ref-type="fig"} however, agree with the distribution of forward steps, (dashed brown line). The number of backward stepping events observed in [@pone.0055366-Clemen1] might have been insufficient to determine the distributions of . These fast events have also been observed in simulations for single-headed myosin V constructs [@pone.0055366-Liao1]. Thus, experimental studies would be desirable that address these short dwell times to gain more insight into the mechanical properties of the motor, such as the reversal of its power stroke [@pone.0055366-Sellers1].
![Dwell time distributions (a) for high assisting forces, for (b) and (c, d) for substall and superstall resisting forces, for \[ATP\], \[ADP\] and zero \[P\] with the data from [@pone.0055366-Rief1], [@pone.0055366-Clemen1].\
The blue lines show obtained using the single cycle network for . In (c) the distribution of forward steps, (brown, dashed line) agrees with the data that does not exhibit rapid events as in . (d) Forced backward stepping for leads to a single exponential decay (dashed violet line) that arises through the mechanical transition in the network in Fig. 2(b).](pone.0055366.g006){#pone-0055366-g006}
In load regime (II) that is close to the stall force, the paramerization with a single force-dependent parameter is not sufficient to explain the motor's dwell time distributions. We have rescaled the theoretical distribution for pN in such a way that its maximum agrees with the experimental data in Ref. [@pone.0055366-Clemen1]. The rescaled distribution and the experimental one disagree, which might be due to additional transitions , e.g., those that capture sub-steps induced by the motor's power stroke, as discussed in the context of the gating effect. Since the step velocity of the motor decreases more slowly in the experiments than in our theory, one might speculate that the molecule's mechanical properties stabilize its chemical activity in the presence of an external force. In part, this stabilization effect has been accounted for by a force threshold in the parametrization of the chemical rates, see section S. 2 of [Text S1](#pone.0055366.s004){ref-type="supplementary-material"} and [@pone.0055366-Bierbaum1], which provides a correct reproduction of the ratcheting behaviour of myosin V but does not affect the mechanical step of the motor in itself. Because of the shortcomings of our model for forces around the stall force corresponding to force regime (II), it seems plausible to expect that effects in the mechanical step rates arising from the motor's power stroke, have also to be taken into account to describe the slow decrease in velocity with increasing load force.
For high resisting forces, pN, the motor steps in a forced manner, with a single stepping rate as determined in Ref. [@pone.0055366-Bierbaum1] based on the data in [@pone.0055366-Gebhardt1]. For superstall forces, the mechanical cycle governs the molecule's motion in force regime (III), such that the motor steps solely through the transition . In this case, the dwell time distribution reduces to an exponential function with rate /s for pN, as shown in [Fig. 6(d)](#pone-0055366-g006){ref-type="fig"} in agreement with the data.
Discussion {#s4}
==========
In this paper, we have focused on a network description of myosin V that consists of only four chemomechanical states, and calculated the dwell time distributions for this molecular motor. Our approach provides a direct relation between nucleotide binding and release rates, that are accessible via chemokinetic experiments, and the dwell times distributions as observed in single-molecule measurements of myosin V. The dwell time distributions obtained from our network description agree with the experimental data for a wide range of nucleotide concentrations, [Fig. 3](#pone-0055366-g003){ref-type="fig"}, and substall load forces, [Fig. 6(a--c)](#pone-0055366-g006){ref-type="fig"}. In case of small ADP concentrations, the tails of the distributions are governed, for saturating \[ATP\], by the ADP release rate, and by the ATP binding rate for small concentrations of ATP. Comparison with a more complex network ([Fig.2(b)](#pone-0055366-g002){ref-type="fig"}) allows us to elucidate the gating effect, see [Fig. 3(c, d)](#pone-0055366-g003){ref-type="fig"}. In networks that include ADP release from the leading head, ATP binding competes with ADP release from this head. A significant impact on the motor's step velocity arises once the two transition rates have comparable strength; the motor velocity is reduced by ADP release. The gating effect leads to a regulation of this inhibition through a suppressed rate of ADP release from the motor's leading head with respect to its trailing head. Through comparison with the experimental data, we quantify the gating effect through an ADP release rate that differs 10-fold for the motor's leading and the trailing head. In the case of an external load force acting on the motor, we have determined the range of forces that can be described through the network that consists of four states by analysis of the force velocity relation of myosin V, [Fig. 5](#pone-0055366-g005){ref-type="fig"}. In addition, we distinguish between dwell time distributions that arise from backward and from forward steps of the motor. For intermediate resisting forces, the experimental data agree with the distribution of dwell times that is associated with forward steps. A peak for short events can be related to backward steps, see [Fig. 6(c)](#pone-0055366-g006){ref-type="fig"}. Our analysis strongly reinforces the hypothesis that the motor's motion is governed, for forces up to the stall force, by a simple chemomechanical cycle rather than a complex branched network, which is coordinated by the force-dependent release of ADP. A further step is to relate the information about fast events to the motor's power stroke.
Supporting Information {#s5}
======================
######
**Repeated version of the network shown in** [**Fig. 2(b)**](#pone-0055366-g002){ref-type="fig"} **in the main text, with three network cycles , and .** The stepping transitions in the cycle are dominant for forces below the stall force, while steps through the mechanical cycle occur for superstall resisting forces, as discussed in [@pone.0055366-Bierbaum1].
(TIF)
######
Click here for additional data file.
######
**Occupation probabilities and of the network cycles and for \[ATP\] = 2 and \[ADP\] = \[P\] = 0.1 .** The chemomechanical cycle dominates for forces below 1.8 pN and the mechanical cycle for forces above 2.2 pN. In a transition regime of pN, indicated by the horizontal lines, both cycles influence the system.
(TIF)
######
Click here for additional data file.
######
**Dwell time distributions for forces that cover the intermediate regime 1.8 pN 2.2 pN, in a range of pN to pN, simulated using the complete network from** [**Fig. 2(b)**](#pone-0055366-g002){ref-type="fig"} **in the main text.** The nucleotide conditions have been fixed to \[ATP\] = , \[ADP\] = \[P\] = 0.1 . The shape of the distribution resembles, for 1.4 and 1.6 pN, the shape of the distributions for forces that are below these values. The distribution broadens as approaching a vanishing step velocity of the motor at the stall force pN, where the sharp peak of short events vanishes and turns into a single exponential distribution, whose slope rises with increasing the load force, as seen for and pN. Note that the simulation is based on events.
(TIF)
######
Click here for additional data file.
######
**S. 1. Absorbing boundary formalism. S. 2. Three-cycle network.**
(DOC)
######
Click here for additional data file.
V.B. thanks Florian Berger for stimulating discussions.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Analyzed the data: VB RL. Wrote the paper: VB RL.
| 2024-04-25T01:26:58.646260 | https://example.com/article/4522 |
/*******************************************************************************
* Copyright (C) Git Corporation. All rights reserved.
*
* Author: 代码工具自动生成
* Create Date: 2016-03-03 22:19:06
* Blog: http://www.cnblogs.com/qingyuan/
* Copyright:
* Description: Git.Framework
*
* Revision History:
* Date Author Description
* 2016-03-03 22:19:06
*********************************************************************************/
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Data;
using Git.Framework.ORM;
namespace Git.Storage.Entity.Storage
{
public partial class CusAddressEntity : BaseEntity
{
[DataMapping(ColumnName = "CusNum", DbType = DbType.String)]
public string CusNum { get; set; }
[DataMapping(ColumnName = "CusName", DbType = DbType.String)]
public string CusName { get; set; }
[DataMapping(ColumnName = "Fax", DbType = DbType.String)]
public string Fax { get; set; }
[DataMapping(ColumnName = "Email", DbType = DbType.String)]
public string Email { get; set; }
/// <summary>
/// 客户类型
/// </summary>
[DataMapping(ColumnName = "CusType", DbType = DbType.Int32)]
public int CusType { get; set; }
}
[TableAttribute(DbName = "GitWMS", Name = "CusAddress", PrimaryKeyName = "ID", IsInternal = false)]
public partial class CusAddressEntity : BaseEntity
{
public CusAddressEntity()
{
}
[DataMapping(ColumnName = "ID", DbType = DbType.Int32, Length = 4, CanNull = false, DefaultValue = null, PrimaryKey = true, AutoIncrement = true, IsMap = true)]
public Int32 ID { get; set; }
public CusAddressEntity IncludeID(bool flag)
{
if (flag && !this.ColumnList.Contains("ID"))
{
this.ColumnList.Add("ID");
}
return this;
}
[DataMapping(ColumnName = "SnNum", DbType = DbType.String, Length = 200, CanNull = false, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string SnNum { get; set; }
public CusAddressEntity IncludeSnNum(bool flag)
{
if (flag && !this.ColumnList.Contains("SnNum"))
{
this.ColumnList.Add("SnNum");
}
return this;
}
[DataMapping(ColumnName = "CustomerSN", DbType = DbType.String, Length = 50, CanNull = false, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string CustomerSN { get; set; }
public CusAddressEntity IncludeCustomerSN(bool flag)
{
if (flag && !this.ColumnList.Contains("CustomerSN"))
{
this.ColumnList.Add("CustomerSN");
}
return this;
}
[DataMapping(ColumnName = "Contact", DbType = DbType.String, Length = 400, CanNull = true, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string Contact { get; set; }
public CusAddressEntity IncludeContact(bool flag)
{
if (flag && !this.ColumnList.Contains("Contact"))
{
this.ColumnList.Add("Contact");
}
return this;
}
[DataMapping(ColumnName = "Phone", DbType = DbType.String, Length = 50, CanNull = true, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string Phone { get; set; }
public CusAddressEntity IncludePhone(bool flag)
{
if (flag && !this.ColumnList.Contains("Phone"))
{
this.ColumnList.Add("Phone");
}
return this;
}
[DataMapping(ColumnName = "Address", DbType = DbType.String, Length = 400, CanNull = false, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string Address { get; set; }
public CusAddressEntity IncludeAddress(bool flag)
{
if (flag && !this.ColumnList.Contains("Address"))
{
this.ColumnList.Add("Address");
}
return this;
}
[DataMapping(ColumnName = "IsDelete", DbType = DbType.Int32, Length = 4, CanNull = false, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public Int32 IsDelete { get; set; }
public CusAddressEntity IncludeIsDelete(bool flag)
{
if (flag && !this.ColumnList.Contains("IsDelete"))
{
this.ColumnList.Add("IsDelete");
}
return this;
}
[DataMapping(ColumnName = "CreateTime", DbType = DbType.DateTime, Length = 8, CanNull = false, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public DateTime CreateTime { get; set; }
public CusAddressEntity IncludeCreateTime(bool flag)
{
if (flag && !this.ColumnList.Contains("CreateTime"))
{
this.ColumnList.Add("CreateTime");
}
return this;
}
[DataMapping(ColumnName = "CreateUser", DbType = DbType.String, Length = 50, CanNull = true, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string CreateUser { get; set; }
public CusAddressEntity IncludeCreateUser(bool flag)
{
if (flag && !this.ColumnList.Contains("CreateUser"))
{
this.ColumnList.Add("CreateUser");
}
return this;
}
[DataMapping(ColumnName = "Remark", DbType = DbType.String, Length = 400, CanNull = true, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string Remark { get; set; }
public CusAddressEntity IncludeRemark(bool flag)
{
if (flag && !this.ColumnList.Contains("Remark"))
{
this.ColumnList.Add("Remark");
}
return this;
}
[DataMapping(ColumnName = "CompanyID", DbType = DbType.String, Length = 50, CanNull = true, DefaultValue = null, PrimaryKey = false, AutoIncrement = false, IsMap = true)]
public string CompanyID { get; set; }
public CusAddressEntity IncludeCompanyID(bool flag)
{
if (flag && !this.ColumnList.Contains("CompanyID"))
{
this.ColumnList.Add("CompanyID");
}
return this;
}
}
}
| 2023-10-14T01:26:58.646260 | https://example.com/article/5489 |
Tuesday, April 04, 2006
Opening Day & NCAA Final
College basketball needs help! What was up with all the 50 point total scores throughout the tourney? Lack of skills IMO. Hopefully the minimum age requirement for NBA draft eligibility might help sending some players with skills to the college ranks. Of course nobody can shoot anymore and basic basketball fundamentals are shot because all kids care about is looking cool dribbling and dunking and since not many 13 year olds can dunk all the do is look cool dribbling. Last I checked you get zero points for dribbling.
Opening day means the fantasy baseball races are on. How anyone can watch a complete baseball game is beyond me, yes it's even more boring than live NL cash games, but as long as there is fantasy involved then I can devote a few seconds every other hand to seeing how my players are doing.
I called about the MLB extra inning package and was absolutely shocked to find out the blackout restrictions as they apply to Vegas. It seems that Colorado, Arizona, LA, Anaheim/LA, Oakland, and San Fran all fall under blackout rules. Now I always aced geography in school but I need an explanation to how all these teams are my local squads??
Also since I'm a brand new blogger I'm pleased to find some many great poker blogs and bloggers tourneys. It's will be nice to partake in the online events and to see and meet people when the venture to Vegas to play in the live events.
Time to had over to Stars and play a few SNGs. I'm already bored this afternoon might as well keep the trend going. | 2023-11-16T01:26:58.646260 | https://example.com/article/7828 |
set(CMAKE_RUNTIME_OUTPUT_DIRECTORY ${PROJECT_BINARY_DIR}/test/src)
set(STA_DEPS io pslite protobuf zmq)
add_executable(xflow_lr main.cc lr/lr_worker.cc fm/fm_worker.cc mvm/mvm_worker.cc)
target_link_libraries(xflow_lr ${STA_DEPS})
| 2024-03-06T01:26:58.646260 | https://example.com/article/4039 |
Customer Reviews
KitchenAid® 2-Speed Hand Blender, Tangerine is rated
4.7 out of
5 by
902.
Rated 5 out of
5 by
penpal from
Very easy to use and usefulJust bought this 2-speed hand blended a few weeks ago, so have not used it much yet. However, it is easy to use and is great for blending soups. Love my red one. The long cord is great. It would be nice if it were a bit lighter . [This review was collected as part of a promotion.]
Date published: 2018-11-09
Rated 4 out of
5 by
Car1 from
Love itI purchased the hand blender for a new recipe i was trying.really cool to use. [This review was collected as part of a promotion.]
Date published: 2018-11-09
Rated 5 out of
5 by
Mommy2three from
Easy clean upThis is perfect for quick little blending jobs without having to take out the big blender and the clean up is so easy! [This review was collected as part of a promotion.]
Date published: 2018-11-02
Rated 4 out of
5 by
Kam3 from
ConvenientGreat to have on hand. Wish it came with a whisk attachment [This review was collected as part of a promotion.] | 2024-07-18T01:26:58.646260 | https://example.com/article/5520 |
## Process this file with automake to produce Makefile.in
lib_LTLIBRARIES = libtre.la
libtre_la_LDFLAGS = -no-undefined -version-info 6:4:2 $(LDFLAGS)
libtre_la_LIBADD = $(LTLIBINTL)
noinst_HEADERS = \
tre-ast.h \
tre-compile.h \
tre-internal.h \
tre-match-utils.h \
tre-mem.h \
tre-parse.h \
tre-stack.h \
xmalloc.h
libtre_la_SOURCES = \
tre-ast.c \
tre-compile.c \
tre-match-backtrack.c \
tre-match-parallel.c \
tre-mem.c \
tre-parse.c \
tre-stack.c \
regcomp.c \
regexec.c \
regerror.c
INCLUDES = -I$(top_srcdir)/gnulib/lib
if TRE_APPROX
libtre_la_SOURCES += tre-match-approx.c
endif TRE_APPROX
dist_pkginclude_HEADERS = regex.h
nodist_pkginclude_HEADERS = tre-config.h
| 2024-06-12T01:26:58.646260 | https://example.com/article/8122 |
Tiny Island Productions
Tiny Island Productions (a.k.a.Tiny Island Productions Pte Ltd) is a CG animation production company based in Singapore. It specializes in both normal CG and stereoscopic 3D productions. It was the animation studio for the Ben 10: Destroy All Aliens CG movie which won the Best 3D Animated Program category at the Asian Television Awards 2012 as well as the award-winning Dream Defenders television series.
History
Tiny Island Productions was founded in 2002 by David Kwok, an animation veteran of 14 years, and has a company strength of 120 staff. One of its first major productions was the Shelldon animated TV series, which it co-developed and co-produced with Shellhut Entertainment.
Dream Defenders
The production house created Singapore's first 3D Stereoscopic animated series Dream Defenders (also known as Dream Defenders Adventures), which debuted in 2011 on 3net, a 3D channel which was a joint venture between Discovery Communications, Sony and IMAX Corporation, and was one of the channel's first stereoscopic-3D cg animated series. The series has since been picked up by Hulu and Discovery Family, and has aired in more than 60 countries around the world. A feature film based on the show is in production and scheduled for release in 2020.
Ben 10: Destroy All Aliens
In 2012, the studio produced Cartoon Network's Ben 10: Destroy All Aliens for both regular and 3D screens. Based on the world and designs of the original Ben 10 TV series, the movie would be the first time the Ben 10 universe would be interpreted in full CG. The film was nominated for the Best 3D Animated Program award at the Asian Television Awards 2012, which it won.
G-Fighters
In 2013, the company began production on G-Fighters, a new CGI action-adventure superhero television series. This is a co-production between South Korean animation production house Electric Circus and Tiny Island Productions, and is the first international co-production between Korea and Singapore animation companies. The animated TV series is supported by SBA, Korea Creative Content Agency (KOCCA), Educational Broadcasting System (EBS), SK Broadband and CJ E&M Pictures.
Virtual Reality
In 2016, Tiny Island Productions, in collaboration with Cisco Systems's PR Agency Allison+Partners, helped the technology company to create its first interactive 3D virtual reality demo. The demo placed the user inside a virtual network under cyber-attacks which would be dealt with by Cisco's advanced security solutions. Originally targeted towards influencers and analysts, it was later opened to clients directly after initial response
Awards
Ben 10: Destroy All Aliens won the Best 3D Animated Program category at the Asian Television Awards 2012 as well as the Gold Award for Best Movie Campaign in the 2012 ProMax Awards. The award demonstrated the high level of animation talent on show in Asia and the talent available here, commented Sunny Saha from Turner International.
Dream Defenders won the Best 3D Animation category at the Asia Image Apollo Awards 2013 as well as 2nd place for the Best Animation category at the 14th TBS Digicon 6 awards.
Upcoming productions
It is currently working with Shellhut Entertainment, the owners of Shelldon, to produce the stereoscopic 3D animated film which will be based on the TV series.
In 2017, Tiny Island Productions signed a 10 feature-film co-production deal with Shellhut Entertainment and Shanghai Media Group's WingsMedia. The first film, to be completed for theatrical release in 2020, will be partially based on the company's Dream Defenders series.
Productions
Shelldon (2009)
Ben 10: Destroy All Aliens (2012)
Dream Defenders Adventures (2011-2012)
Talking Tom and Friends (2014–present)
References
External links
Tiny Island Productions Official Website
Category:Animation studios
Category:Companies established in 2002
Category:2002 establishments in Singapore | 2023-08-06T01:26:58.646260 | https://example.com/article/8168 |
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
| 2023-09-17T01:26:58.646260 | https://example.com/article/3118 |
[Secondary prevention of acute coronary syndrome].
Acute coronary syndromes are a major health care problem which remains associated with high rates of mortality, myocardial infarction and rehospitalisation after hospital discharge for acute treatment. The general practitioner has a critical role in the management of these patients. Physicians have to ensure an adequate control of all coronary risk factors. Systematic use of statines and aspirin is recommended. Also, the use of clopidogrel, fibrates, beta blockers and ACE inhibitors should be considered in some circumstances. Conversely, hormone replacement therapy in women, antioxydants and nitrates in the absence of angina are ineffective. | 2024-07-10T01:26:58.646260 | https://example.com/article/3618 |
Nuclear localization of type 1 aldosterone binding sites in steroid-unexposed GH3 cells.
The nuclear localization of unoccupied oestrogen receptors has been demonstrated in MCF 7 (human breast tumour) cells by immunocytochemistry, and in GH3 (rat pituitary tumour) cells by enucleation techniques. The present study shows, by similar enucleation techniques, that high affinity (Type 1) aldosterone binding sites are similarly located in the nucleus of steroid-unexposed pituitary GH3 cells. It is, therefore, suggested that such high-affinity Type 1 sites, which are mineralocorticoid receptors in the kidney and glucocorticoid receptors in the hippocampus, are nuclear-associated proteins in the absence of steroid and are found in the cytosol compartment only upon cell disruption. | 2024-05-26T01:26:58.646260 | https://example.com/article/9394 |
## A note on good cryptographic practices
*Note*: These criteria do not always apply because some software has no
need to directly use cryptographic capabilities.
A "project security mechanism" is a security mechanism provided
by the delivered project's software.
## Non-criteria
We do *not* require any specific products or services, and in
general do not require any particular technology.
In particular, we do *not* require
proprietary tools, services, or technology,
since many [free software](https://www.gnu.org/philosophy/free-sw.en.html)
developers would reject such criteria.
For example, we intentionally do *not* require git or GitHub.
We also do not require or forbid any particular programming language.
We do require that additional measures be taken for certain
*kinds* of programming languages, but that is different.
This means that as new tools and capabilities become available,
projects can quickly switch to them without failing to meet any criteria.
We *do* provide guidance and help for common cases.
The criteria *do* sometimes identify
common methods or ways of doing something
(especially if they are FLOSS), since that information
can help people understand and meet the criteria.
We also created an "easy on-ramp" for projects using git on GitHub,
since that is a common case.
But note that nothing *requires* git or GitHub.
We would welcome good patches that help provide an "easy on-ramp" for
projects on other repository platforms;
GitLab was one of the first projects with a badge.
We avoid requiring, at the passing level, criteria that would be
impractical for a single-person project, e.g., something that requires
a significant amount of money.
Many FLOSS projects are small, and we do not want to disenfranchise them.
We do not plan to require active user discussion within a project.
Some highly mature projects rarely change and thus may have little activity.
We *do*, however, require that the project be responsive
if vulnerabilities are reported to the project (see above).
## Uniquely identifying a project
One challenge is uniquely identifying a project.
Our Rails application gives a unique id to each new project, so
we can use that id to uniquely identify project entries.
However, that doesn't help people who searching for the project
and do not already know that id.
The *real* name of a project, for our purposes, is the
URL for its repository, and where that is not available, the
project "front page" URL can help find it.
Most projects have a human-readable name, and we provide a search
mechanims, but these names are not enough to uniquely identify a project.
The same human-readable name can be used for many different projects
(including project forks), and the same project may go by many different names.
In many cases it will be useful to point to other names for the project
(e.g., the source package name in Debian, the package name in some
language-specific repository, or its name in OpenHub).
In the future we may try to check more carefully that a user can
legitimately represent a project.
For the moment, we primarily focus on checking if GitHub repositories
are involved; there are ways to do this for other situations if that
becomes important.
Non-admin users cannot edit the repo URL once one is entered.
(Exception: they can upgrade http to https.)
If they could change the repo URL,
they might fool people into thinking they controlled
a project that they did not.
That said, creating a bogus row entry does not really help someone very
much; what matters to the software
is the id used by the project when it refers to its badge,
and the project determines that.
## Why have criteria?
The paper [Open badges for education: what are the implications at the
intersection of open systems and badging?](http://www.researchinlearningtechnology.net/index.php/rlt/article/view/23563)
identifies three general reasons for badging systems (all are valid for this):
1. Badges as a motivator of behavior. We hope that by identifying
best practices, we'll encourage projects to implement those
best practices if they do not do them already.
2. Badges as a pedagogical tool. Some projects may not be aware
of some of the best practices applied by others,
or how they can be practically applied.
The badge will help them become aware of them and ways to implement them.
3. Badges as a signifier or credential.
Potential users want to use projects that are applying best
practices to consistently produce good results; badges make it easy
for projects to signify that they are following best practices,
and make it easy for users to see which projects are doing so.
We have chosen to use self-certification, because this makes it
possible for a large number of projects (even small ones) to
participate. There's a risk that projects may make false claims,
but we think the risk is small, and users can check the claims for themselves.
## Improving the criteria
We are hoping to get good suggestions and feedback from the public;
please contribute!
We launched with a single badge level called *passing*.
For higher level badges, see [other](./other.md).
You may also want to see the "[background](./background.md)" file
for more information about these criteria,
and the "[implementation](./implementation.md)" notes
about the BadgeApp application.
## See also
Project participation and interface:
* [CONTRIBUTING.md](../CONTRIBUTING.md) - How to contribute to this project
* [INSTALL.md](INSTALL.md) - How to install/quick start
* [governance.md](governance.md) - How the project is governed
* [roadmap.md](roadmap.md) - Overall direction of the project
* [background.md](background.md) - Background research
* [api](api.md) - Application Programming Interface (API), inc. data downloads
Criteria:
* [Criteria for passing badge](https://bestpractices.coreinfrastructure.org/criteria/0)
* [Criteria for all badge levels](https://bestpractices.coreinfrastructure.org/criteria)
Development processes and security:
* [requirements.md](requirements.md) - Requirements (what's it supposed to do?)
* [design.md](design.md) - Architectural design information
* [implementation.md](implementation.md) - Implementation notes
* [testing.md](testing.md) - Information on testing
* [security.md](security.md) - Why it's adequately secure (assurance case)
| 2023-08-13T01:26:58.646260 | https://example.com/article/8201 |
Many systems utilize wiring to route power, electrical signals, etc. To simplify manufacturing and maintenance of such systems, several wires may be coupled together to form a wire bundle. For example, a set of wires that extends from one device to another device may be assembled into a wire bundle so that each of the individual wires do not have to be routed independently. If a particular set of wires is intended to connect to a single device, it may be convenient to terminate the wire bundle with a connector such that each wire corresponds to a contact of the connector. The connector may allow all of wires of the particular set of wires to be connected to (or disconnected from) the single device at the same time. Such wire bundle and connector arrangements are common, for example, in aircraft, automobiles, building systems (e.g., air conditioning and heating systems, etc.), and many other fields. Despite the prevalence of wire bundle and connector arrangements, testing schemes for assembled wire bundles and connectors are generally manual. | 2024-04-09T01:26:58.646260 | https://example.com/article/9698 |
"""
.. module: lemur.plugins.lemur_digicert.plugin
:platform: Unix
:synopsis: This module is responsible for communicating with the DigiCert '
Advanced API.
:license: Apache, see LICENSE for more details.
DigiCert CertCentral (v2 API) Documentation
https://www.digicert.com/services/v2/documentation
Original Implementation:
Chris Dorros, github.com/opendns/lemur-digicert
.. moduleauthor:: Kevin Glisson <kglisson@netflix.com>
"""
import json
import arrow
import pem
import requests
import sys
from cryptography import x509
from flask import current_app, g
from lemur.common.utils import validate_conf
from lemur.extensions import metrics
from lemur.plugins import lemur_digicert as digicert
from lemur.plugins.bases import IssuerPlugin, SourcePlugin
from retrying import retry
def log_status_code(r, *args, **kwargs):
"""
Is a request hook that logs all status codes to the digicert api.
:param r:
:param args:
:param kwargs:
:return:
"""
metrics.send("digicert_status_code_{}".format(r.status_code), "counter", 1)
def signature_hash(signing_algorithm):
"""Converts Lemur's signing algorithm into a format DigiCert understands.
:param signing_algorithm:
:return: str digicert specific algorithm string
"""
if not signing_algorithm:
return current_app.config.get("DIGICERT_DEFAULT_SIGNING_ALGORITHM", "sha256")
if signing_algorithm == "sha256WithRSA":
return "sha256"
elif signing_algorithm == "sha384WithRSA":
return "sha384"
elif signing_algorithm == "sha512WithRSA":
return "sha512"
raise Exception("Unsupported signing algorithm.")
def determine_validity_years(years):
"""
Considering maximum allowed certificate validity period of 397 days, this method should not return
more than 1 year of validity. Thus changing it to always return 1.
Lemur will change this method in future to handle validity in months (determine_validity_months)
instead of years. This will allow flexibility to handle short-lived certificates.
:param years:
:return: 1
"""
return 1
def determine_end_date(end_date):
"""
Determine appropriate end date
:param end_date:
:return: validity_end
"""
default_days = current_app.config.get("DIGICERT_DEFAULT_VALIDITY_DAYS", 397)
max_validity_end = arrow.utcnow().shift(days=current_app.config.get("DIGICERT_MAX_VALIDITY_DAYS", default_days))
if not end_date:
end_date = arrow.utcnow().shift(days=default_days)
if end_date > max_validity_end:
end_date = max_validity_end
return end_date
def get_additional_names(options):
"""
Return a list of strings to be added to a SAN certificates.
:param options:
:return:
"""
names = []
# add SANs if present
if options.get("extensions"):
for san in options["extensions"]["sub_alt_names"]["names"]:
if isinstance(san, x509.DNSName):
names.append(san.value)
return names
def map_fields(options, csr):
"""Set the incoming issuer options to DigiCert fields/options.
:param options:
:param csr:
:return: dict or valid DigiCert options
"""
data = dict(
certificate={
"common_name": options["common_name"],
"csr": csr,
"signature_hash": signature_hash(options.get("signing_algorithm")),
},
organization={"id": current_app.config.get("DIGICERT_ORG_ID")},
)
data["certificate"]["dns_names"] = get_additional_names(options)
if options.get("validity_years"):
data["validity_years"] = determine_validity_years(options.get("validity_years"))
elif options.get("validity_end"):
data["custom_expiration_date"] = determine_end_date(options.get("validity_end")).format("YYYY-MM-DD")
# check if validity got truncated. If resultant validity is not equal to requested validity, it just got truncated
if data["custom_expiration_date"] != options.get("validity_end").format("YYYY-MM-DD"):
log_validity_truncation(options, f"{__name__}.{sys._getframe().f_code.co_name}")
else:
data["validity_years"] = determine_validity_years(0)
if current_app.config.get("DIGICERT_PRIVATE", False):
if "product" in data:
data["product"]["type_hint"] = "private"
else:
data["product"] = dict(type_hint="private")
return data
def map_cis_fields(options, csr):
"""
MAP issuer options to DigiCert CIS fields/options.
:param options:
:param csr:
:return: data
"""
if options.get("validity_years"):
validity_end = determine_end_date(arrow.utcnow().shift(years=options["validity_years"]))
elif options.get("validity_end"):
validity_end = determine_end_date(options.get("validity_end"))
# check if validity got truncated. If resultant validity is not equal to requested validity, it just got truncated
if validity_end != options.get("validity_end"):
log_validity_truncation(options, f"{__name__}.{sys._getframe().f_code.co_name}")
else:
validity_end = determine_end_date(False)
data = {
"profile_name": current_app.config.get("DIGICERT_CIS_PROFILE_NAMES", {}).get(options['authority'].name),
"common_name": options["common_name"],
"additional_dns_names": get_additional_names(options),
"csr": csr,
"signature_hash": signature_hash(options.get("signing_algorithm")),
"validity": {
"valid_to": validity_end.format("YYYY-MM-DDTHH:MM") + "Z"
},
"organization": {
"name": options["organization"],
"units": [options["organizational_unit"]],
},
}
# possibility to default to a SIGNING_ALGORITHM for a given profile
if current_app.config.get("DIGICERT_CIS_SIGNING_ALGORITHMS", {}).get(options['authority'].name):
data["signature_hash"] = current_app.config.get("DIGICERT_CIS_SIGNING_ALGORITHMS", {}).get(
options['authority'].name)
return data
def log_validity_truncation(options, function):
log_data = {
"cn": options["common_name"],
"creator": g.user.username
}
metrics.send("digicert_validity_truncated", "counter", 1, metric_tags=log_data)
log_data["function"] = function
log_data["message"] = "Digicert Plugin truncated the validity of certificate"
current_app.logger.info(log_data)
def handle_response(response):
"""
Handle the DigiCert API response and any errors it might have experienced.
:param response:
:return:
"""
if response.status_code > 399:
raise Exception(response.json()["errors"][0]["message"])
return response.json()
def handle_cis_response(response):
"""
Handle the DigiCert CIS API response and any errors it might have experienced.
:param response:
:return:
"""
if response.status_code > 399:
raise Exception(response.text)
return response.json()
@retry(stop_max_attempt_number=10, wait_fixed=10000)
def get_certificate_id(session, base_url, order_id):
"""Retrieve certificate order id from Digicert API."""
order_url = "{0}/services/v2/order/certificate/{1}".format(base_url, order_id)
response_data = handle_response(session.get(order_url))
if response_data["status"] != "issued":
raise Exception("Order not in issued state.")
return response_data["certificate"]["id"]
@retry(stop_max_attempt_number=10, wait_fixed=10000)
def get_cis_certificate(session, base_url, order_id):
"""Retrieve certificate order id from Digicert API."""
certificate_url = "{0}/platform/cis/certificate/{1}".format(base_url, order_id)
session.headers.update({"Accept": "application/x-pem-file"})
response = session.get(certificate_url)
if response.status_code == 404:
raise Exception("Order not in issued state.")
return response.content
class DigiCertSourcePlugin(SourcePlugin):
"""Wrap the Digicert Certifcate API."""
title = "DigiCert"
slug = "digicert-source"
description = "Enables the use of Digicert as a source of existing certificates."
version = digicert.VERSION
author = "Kevin Glisson"
author_url = "https://github.com/netflix/lemur.git"
def __init__(self, *args, **kwargs):
"""Initialize source with appropriate details."""
required_vars = [
"DIGICERT_API_KEY",
"DIGICERT_URL",
"DIGICERT_ORG_ID",
"DIGICERT_ROOT",
]
validate_conf(current_app, required_vars)
self.session = requests.Session()
self.session.headers.update(
{
"X-DC-DEVKEY": current_app.config["DIGICERT_API_KEY"],
"Content-Type": "application/json",
}
)
self.session.hooks = dict(response=log_status_code)
super(DigiCertSourcePlugin, self).__init__(*args, **kwargs)
def get_certificates(self):
pass
class DigiCertIssuerPlugin(IssuerPlugin):
"""Wrap the Digicert Issuer API."""
title = "DigiCert"
slug = "digicert-issuer"
description = "Enables the creation of certificates by the DigiCert REST API."
version = digicert.VERSION
author = "Kevin Glisson"
author_url = "https://github.com/netflix/lemur.git"
def __init__(self, *args, **kwargs):
"""Initialize the issuer with the appropriate details."""
required_vars = [
"DIGICERT_API_KEY",
"DIGICERT_URL",
"DIGICERT_ORG_ID",
"DIGICERT_ORDER_TYPE",
"DIGICERT_ROOT",
]
validate_conf(current_app, required_vars)
self.session = requests.Session()
self.session.headers.update(
{
"X-DC-DEVKEY": current_app.config["DIGICERT_API_KEY"],
"Content-Type": "application/json",
}
)
self.session.hooks = dict(response=log_status_code)
super(DigiCertIssuerPlugin, self).__init__(*args, **kwargs)
def create_certificate(self, csr, issuer_options):
"""Create a DigiCert certificate.
:param csr:
:param issuer_options:
:return: :raise Exception:
"""
base_url = current_app.config.get("DIGICERT_URL")
cert_type = current_app.config.get("DIGICERT_ORDER_TYPE")
# make certificate request
determinator_url = "{0}/services/v2/order/certificate/{1}".format(
base_url, cert_type
)
data = map_fields(issuer_options, csr)
response = self.session.post(determinator_url, data=json.dumps(data))
if response.status_code > 399:
raise Exception(response.json()["errors"][0]["message"])
order_id = response.json()["id"]
certificate_id = get_certificate_id(self.session, base_url, order_id)
# retrieve certificate
certificate_url = "{0}/services/v2/certificate/{1}/download/format/pem_all".format(
base_url, certificate_id
)
end_entity, intermediate, root = pem.parse(
self.session.get(certificate_url).content
)
return (
"\n".join(str(end_entity).splitlines()),
"\n".join(str(intermediate).splitlines()),
certificate_id,
)
def revoke_certificate(self, certificate, comments):
"""Revoke a Digicert certificate."""
base_url = current_app.config.get("DIGICERT_URL")
# make certificate revoke request
create_url = "{0}/services/v2/certificate/{1}/revoke".format(
base_url, certificate.external_id
)
metrics.send("digicert_revoke_certificate", "counter", 1)
response = self.session.put(create_url, data=json.dumps({"comments": comments}))
return handle_response(response)
def get_ordered_certificate(self, pending_cert):
""" Retrieve a certificate via order id """
order_id = pending_cert.external_id
base_url = current_app.config.get("DIGICERT_URL")
try:
certificate_id = get_certificate_id(self.session, base_url, order_id)
except Exception as ex:
return None
certificate_url = "{0}/services/v2/certificate/{1}/download/format/pem_all".format(
base_url, certificate_id
)
end_entity, intermediate, root = pem.parse(
self.session.get(certificate_url).content
)
cert = {
"body": "\n".join(str(end_entity).splitlines()),
"chain": "\n".join(str(intermediate).splitlines()),
"external_id": str(certificate_id),
}
return cert
def cancel_ordered_certificate(self, pending_cert, **kwargs):
""" Set the certificate order to canceled """
base_url = current_app.config.get("DIGICERT_URL")
api_url = "{0}/services/v2/order/certificate/{1}/status".format(
base_url, pending_cert.external_id
)
payload = {"status": "CANCELED", "note": kwargs.get("note")}
response = self.session.put(api_url, data=json.dumps(payload))
if response.status_code == 404:
# not well documented by Digicert, but either the certificate does not exist or we
# don't own that order (someone else's order id!). Either way, we can just ignore it
# and have it removed from Lemur
current_app.logger.warning(
"Digicert Plugin tried to cancel pending certificate {0} but it does not exist!".format(
pending_cert.name
)
)
elif response.status_code != 204:
current_app.logger.debug(
"{0} code {1}".format(response.status_code, response.content)
)
raise Exception(
"Failed to cancel pending certificate {0}".format(pending_cert.name)
)
@staticmethod
def create_authority(options):
"""Create an authority.
Creates an authority, this authority is then used by Lemur to
allow a user to specify which Certificate Authority they want
to sign their certificate.
:param options:
:return:
"""
role = {"username": "", "password": "", "name": "digicert"}
return current_app.config.get("DIGICERT_ROOT"), "", [role]
class DigiCertCISSourcePlugin(SourcePlugin):
"""Wrap the Digicert CIS Certifcate API."""
title = "DigiCert"
slug = "digicert-cis-source"
description = "Enables the use of Digicert as a source of existing certificates."
version = digicert.VERSION
author = "Kevin Glisson"
author_url = "https://github.com/netflix/lemur.git"
additional_options = []
def __init__(self, *args, **kwargs):
"""Initialize source with appropriate details."""
required_vars = [
"DIGICERT_CIS_API_KEY",
"DIGICERT_CIS_URL",
"DIGICERT_CIS_ROOTS",
"DIGICERT_CIS_INTERMEDIATES",
"DIGICERT_CIS_PROFILE_NAMES",
]
validate_conf(current_app, required_vars)
self.session = requests.Session()
self.session.headers.update(
{
"X-DC-DEVKEY": current_app.config["DIGICERT_CIS_API_KEY"],
"Content-Type": "application/json",
}
)
self.session.hooks = dict(response=log_status_code)
a = requests.adapters.HTTPAdapter(max_retries=3)
self.session.mount("https://", a)
super(DigiCertCISSourcePlugin, self).__init__(*args, **kwargs)
def get_certificates(self, options, **kwargs):
"""Fetch all Digicert certificates."""
base_url = current_app.config.get("DIGICERT_CIS_URL")
# make request
search_url = "{0}/platform/cis/certificate/search".format(base_url)
certs = []
page = 1
while True:
response = self.session.get(
search_url, params={"status": ["issued"], "page": page}
)
data = handle_cis_response(response)
for c in data["certificates"]:
download_url = "{0}/platform/cis/certificate/{1}".format(
base_url, c["id"]
)
certificate = self.session.get(download_url)
# normalize serial
serial = str(int(c["serial_number"], 16))
cert = {
"body": certificate.content,
"serial": serial,
"external_id": c["id"],
}
certs.append(cert)
if page == data["total_pages"]:
break
page += 1
return certs
class DigiCertCISIssuerPlugin(IssuerPlugin):
"""Wrap the Digicert Certificate Issuing API."""
title = "DigiCert CIS"
slug = "digicert-cis-issuer"
description = "Enables the creation of certificates by the DigiCert CIS REST API."
version = digicert.VERSION
author = "Kevin Glisson"
author_url = "https://github.com/netflix/lemur.git"
def __init__(self, *args, **kwargs):
"""Initialize the issuer with the appropriate details."""
required_vars = [
"DIGICERT_CIS_API_KEY",
"DIGICERT_CIS_URL",
"DIGICERT_CIS_ROOTS",
"DIGICERT_CIS_INTERMEDIATES",
"DIGICERT_CIS_PROFILE_NAMES",
]
validate_conf(current_app, required_vars)
self.session = requests.Session()
self.session.headers.update(
{
"X-DC-DEVKEY": current_app.config["DIGICERT_CIS_API_KEY"],
"Content-Type": "application/json",
}
)
self.session.hooks = dict(response=log_status_code)
super(DigiCertCISIssuerPlugin, self).__init__(*args, **kwargs)
def create_certificate(self, csr, issuer_options):
"""Create a DigiCert certificate."""
base_url = current_app.config.get("DIGICERT_CIS_URL")
# make certificate request
create_url = "{0}/platform/cis/certificate".format(base_url)
data = map_cis_fields(issuer_options, csr)
response = self.session.post(create_url, data=json.dumps(data))
data = handle_cis_response(response)
# retrieve certificate
certificate_pem = get_cis_certificate(self.session, base_url, data["id"])
self.session.headers.pop("Accept")
end_entity = pem.parse(certificate_pem)[0]
if "ECC" in issuer_options["key_type"]:
return (
"\n".join(str(end_entity).splitlines()),
current_app.config.get("DIGICERT_ECC_CIS_INTERMEDIATES", {}).get(issuer_options['authority'].name),
data["id"],
)
# By default return RSA
return (
"\n".join(str(end_entity).splitlines()),
current_app.config.get("DIGICERT_CIS_INTERMEDIATES", {}).get(issuer_options['authority'].name),
data["id"],
)
def revoke_certificate(self, certificate, comments):
"""Revoke a Digicert certificate."""
base_url = current_app.config.get("DIGICERT_CIS_URL")
# make certificate revoke request
revoke_url = "{0}/platform/cis/certificate/{1}/revoke".format(
base_url, certificate.external_id
)
metrics.send("digicert_revoke_certificate_success", "counter", 1)
response = self.session.put(revoke_url, data=json.dumps({"comments": comments}))
if response.status_code != 204:
metrics.send("digicert_revoke_certificate_failure", "counter", 1)
raise Exception("Failed to revoke certificate.")
metrics.send("digicert_revoke_certificate_success", "counter", 1)
@staticmethod
def create_authority(options):
"""Create an authority.
Creates an authority, this authority is then used by Lemur to
allow a user to specify which Certificate Authority they want
to sign their certificate.
:param options:
:return:
"""
role = {"username": "", "password": "", "name": "digicert"}
return current_app.config.get("DIGICERT_CIS_ROOTS", {}).get(options['authority'].name), "", [role]
| 2024-07-01T01:26:58.646260 | https://example.com/article/7780 |
Q:
combine two methods returning two different values
Hi I have got two methods are returning two different return type of values like int and string and I am executing query inside the method with passing different variables like the below
METHOD 1
private string SelectTransactionHistory(int transactionId, ContextObject contextObject)
{
SqlConnection con;
SqlCommand cmd;
con = new SqlConnection(contextObject.ConnectionString);
con.Open();
string returnvalue = string.Empty;
string selecteQuery = "SELECT Comments
From dbo.TransactionHistory
WHERE TransactionID = '" + transactionId + "'";
cmd = new SqlCommand(selecteQuery, con);
returnvalue = (string)cmd.ExecuteScalar();
con.Close();
return returnvalue;
}
METHOD 2
private int SelectTransactionHistoryID(string comment, ContextObject contextObject)
{
SqlConnection con;
SqlCommand cmd;
con = new SqlConnection(contextObject.ConnectionString);
con.Open();
string query = "SELECT TransactionID
From dbo.TransactionHistory
WHERE Comments = '" + comment + "'";
cmd = new SqlCommand(query, con);
int returnvalue = (int)cmd.ExecuteScalar();
con.Close();
return returnvalue;
}
I am calling these methods in another method like this
int transactionId = SelectTransactionHistoryID(comment, GetContext());
string commentsreturnValue = SelectTransactionHistory(transactionId, GetContext());
how can i combine these two methods to make more generic type..
Would any one have any suggestions on how to do this..
Many Thanks.....
A:
You could create a method to execute any query using ado.net, for sample:
private static T ExecuteQuery<T>(ContextObject contextObject, string query)
{
T result;
using (SqlConnection con = con = new SqlConnection(contextObject.ConnectionString))
{
try
{
con.Open();
using (SqlCommand cmd = cmd = new SqlCommand(query, con))
{
result = (T)cmd.ExecuteScalar();
}
}
catch
{
result = null;
}
finally
{
con.Close();
}
}
returnr result;
}
And pass a query that return a single value (in sql we use TOP 1), something like this:
var resultComment = ExecuteQuery<string>("SELECT TOP 1 Comments From dbo.TransactionHistory WHERE TransactionID = '" + transactionId + "'");
var resultTransactionId = ExecuteQuery<int>("SELECT TOP 1 TransactionID From dbo.TransactionHistory WHERE Comments = '" + comment + "'")
| 2024-05-06T01:26:58.646260 | https://example.com/article/5834 |
Sequential autonomic function tests in HIV infection.
Cardiovascular autonomic function tests were carried out on 22 men at varying stages of HIV infection. Thirteen were asymptomatic, seven had persistent generalized lymphadenopathy, and two had Kaposi's sarcoma. Pupil cycle times were also measured. Except for one subject with definite autonomic abnormalities, all the rest had almost normal test results. There were no correlations between individual tests of immune function and the autonomic test results. The tests were repeated 9-18 months later in 12 men, four of whom were taking zidovudine at that time. Although there was evidence of progression of HIV-associated immune dysfunction, there was no significant deterioration in autonomic function. In the single patient with abnormal autonomic function, these changes appeared to reverse on treatment with zidovudine. | 2023-12-21T01:26:58.646260 | https://example.com/article/4347 |
({
name: "date.timezone.America-Iqaluit",
runTest: function(t){
var tz = "America/Iqaluit";
doh.checkDate({tzOffset: 0, tzAbbr: "zzz"}, -2147483648000, tz, 1);
doh.checkDate({tzOffset: 0, tzAbbr: "zzz"}, -2147397248000, tz, 1);
doh.checkDate({tzOffset: 0, tzAbbr: "zzz"}, -865296001000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EWT"}, -865296000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EWT"}, -769395601000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EPT"}, -769395600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EPT"}, -765396001000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, -765396000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, -147898801000, tz, 1);
doh.checkDate({tzOffset: 180, tzAbbr: "EDDT"}, -147898800000, tz, 1);
doh.checkDate({tzOffset: 180, tzAbbr: "EDDT"}, -131569201000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, -131569200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 325666799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 325666800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 341387999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 341388000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 357116399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 357116400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 372837599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 372837600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 388565999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 388566000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 404891999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 404892000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 420015599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 420015600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 436341599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 436341600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 452069999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 452070000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 467791199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 467791200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 483519599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 483519600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 499240799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 499240800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 514969199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 514969200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 530690399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 530690400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 544604399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 544604400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 562139999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 562140000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 576053999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 576054000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 594194399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 594194400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 607503599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 607503600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 625643999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 625644000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 638953199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 638953200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 657093599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 657093600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 671007599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 671007600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 688543199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 688543200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 702457199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 702457200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 719992799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 719992800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 733906799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 733906800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 752047199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 752047200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 765356399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 765356400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 783496799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 783496800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 796805999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 796806000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 814946399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 814946400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 828860399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 828860400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 846395999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 846396000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 860309999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 860310000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 877845599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 877845600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 891759599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 891759600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 909295199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 909295200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 923209199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 923209200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 941349599000, tz, 1);
doh.checkDate({tzOffset: 360, tzAbbr: "CST"}, 941349600000, tz, 1);
doh.checkDate({tzOffset: 360, tzAbbr: "CST"}, 954662399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "CDT"}, 954662400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "CDT"}, 972802799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 972802800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 986108399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 986108400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1004248799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1004248800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1018162799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1018162800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1035698399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1035698400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1049612399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1049612400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1067147999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1067148000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1081061999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1081062000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1099202399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1099202400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1112511599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1112511600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1130651999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1130652000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1143961199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1143961200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1162101599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1162101600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1173596399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1173596400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1194155999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1194156000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1205045999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1205046000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1225605599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1225605600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1236495599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1236495600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1257055199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1257055200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1268549999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1268550000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1289109599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1289109600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1299999599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1299999600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1320559199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1320559200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1331449199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1331449200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1352008799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1352008800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1362898799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1362898800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1383458399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1383458400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1394348399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1394348400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1414907999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1414908000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1425797999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1425798000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1446357599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1446357600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1457852399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1457852400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1478411999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1478412000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1489301999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1489302000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1509861599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1509861600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1520751599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1520751600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1541311199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1541311200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1552201199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1552201200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1572760799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1572760800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1583650799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1583650800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1604210399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1604210400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1615705199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1615705200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1636264799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1636264800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1647154799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1647154800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1667714399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1667714400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1678604399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1678604400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1699163999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1699164000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1710053999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1710054000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1730613599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1730613600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1741503599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1741503600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1762063199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1762063200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1772953199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1772953200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1793512799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1793512800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1805007599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1805007600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1825567199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1825567200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1836457199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1836457200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1857016799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1857016800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1867906799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1867906800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1888466399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1888466400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1899356399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1899356400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1919915999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1919916000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1930805999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1930806000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1951365599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1951365600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1962860399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1962860400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1983419999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1983420000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1994309999000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1994310000000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2014869599000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2014869600000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2025759599000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2025759600000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2046319199000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2046319200000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2057209199000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2057209200000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2077768799000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2077768800000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2088658799000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2088658800000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2109218399000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2109218400000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2120108399000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2120108400000, tz, 1);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 2140667999000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2140668000000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2147397247000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 2147483647000, tz, 1);
doh.checkDate({tzOffset: 300, tzAbbr: "EST"}, 1231151400000, tz, 0);
doh.checkDate({tzOffset: 240, tzAbbr: "EDT"}, 1246789800000, tz, 0);
}
})
| 2024-05-08T01:26:58.646260 | https://example.com/article/6144 |
"Who are you?" "I'm a poisoner by trade." "Specifically speaking, I'm your poisoner." "Do you know where the codes are?" "No." "I told you." "Okay." "We're gonna try that again." "Do you know where the codes are?" "Yes." "How did you make me do that?" "My poison starts as truth serum." "U assignment is simple, Mr. Whitney." "Just get me my codes." "You have approximately three hours, give or take, before you die." "As soon as I have my codes..." "I'll give you the antidote." " You ready?" " Maybe we're in over our heads." " It's time." " Sure it's not too dangerous?" " I'll be an inch away." " I'm scared." "Let's go over it again." "Make sure we have our bases covered." "God, who'd thought going out to sushi with my sister and her boyfriend would make me so freaked?" "Okay." "Last night we saw a movie." "What was my snack of choice?" "Sprinkled milk duds over your popcorn." "What was I wearing?" "Blue top, little buttons." "Oh, you like that one?" "I like all of 'em." "What movie were we..." " why is this door locked?" " What are you doing?" "Girl on top." "Ms. Walker." "When herrwienerlicious signs your paycheck," "I doubt he's factoring in make-out breaks with your Boy-toy." "I'm sorry." "I had to act fast." "I keep pressing the button and nothing's happening." "Is it fully charged?" "'Cause sometimes this..." "My entire life is in this thing." "Okay?" "I got names, places, dates, times, music, photos, recipes..." "Wow, uh, you-you cook, too?" "What if I lose everything?" "You know, I can't start from scratch." "I can't be the person that I was before this thing came along." "Okay, I'm freaking out!" "Listen to me, uh..." "Lou." "Lou?" "Really?" "Lou, I wouldn't put..." "This is kind of my world, you know?" "This is what..." "This is what I do, and I..." "I do it pretty good, so..." "Trust me." "Okay." "I know I'm totally spazzing out." "I'm sorry." "It's just..." "A little overwhelming to even consider..." "No, no, no, no, no." "Don't go there." "Come back." "Go to a happy place." "Is there something that you think about that quiets the voices that are in your head?" "Turkey." "Muenster cheese." "Egg bread." "Grilled." "Was that a, was that a sandwich?" "Yeah, they're my passion." "Uh, the..." "Sounds, sounds pretty delicious." "I own a deli in the mall and I often think about meats and cheeses." "Ah, yes." "Who doesn't?" "Look, i-i, uh, I promise you that if you come back tomorrow, your phone will be all fixed up and Good to go." "Okay?" " Really?" " Yeah." "Thank you." "So much." "It's been nice talking with you, Chuck." "Yeah, you too, Lou." "That rhymed." "I-I" " I didn't actually mean for that to rhyme." " It's okay." " Okay." "* mind-cheater." "* saw you." "Saw me what?" "Saw you what?" "Dude, are you kidding me?" "Mind-cheating with the broken phone girl." "And why wouldn't you?" "Her hair looked so much like licorice," "I wanna chew on it till I make myself sick." "But you, well, gee whiz, Chuck, you already have hair to chew on." "What?" "What the hell are you talking about?" "Name Sarah ring a..." "Hot blonde with two big bells?" "You know, just because you didn't actually do anything with licorice hair doesn't mean you didn't want to." "Think about that." " mind-cheater." " Don't." " saw you." " Get..." "Ah!" "man: your assignment is simple, Mr. Whitney" "my codes, they're still here." "Oh, and also, and also a..." "A crab hand-roll for the lady." "Light wasabi, but like light-light, almost as if you just washed your hands and only the residue of previous orders remains." "Didn't realize how old-fashioned you were, Chuck." "Oh, why?" "Cause I was ordering food for my girl?" "Well, I guess I just know what she likes." "You sure do." "Thanks, sweetie." "Welcome, sweetie." "No, no." "Old fashioned how slow you guys are taking things." " Devon..." " what?" "I mean you guy are joined at the hip, but that's not where you're supposed to be joined." "I mean it's like the east wing of our apartment has taken a vow of celibacy." "That is none of our business." "Um, edamame?" "Oh, your sleeve." "Oh, shoot." "Are you ever gonna retire that sweater, Ellie?" "Hope not." "It's my lucky sweater." "More like my lucky sweater." "Was wearing it the first time I met Ellie in an epidemiology class..." "He told me that I.L. Bean must've stolen the color from my eyes, so it really belonged to me." "Thank you for dinner." "Well, you guys wait here." "I'll get the car." "I found a space around the corner." "Sir." "Can you hear me?" "what is your name?" "Can someone please call an ambulance?" "can you hear me, sir" "Shallow respiration, thready pulse." "Chuck, check..." "Check for medical id." "Help me, please." "Help me." "Just, just relax." "We're doing everything we can." "That's my sister." "Eleanor Fay Bartowski is saving that dude's life!" "That's my sister." "Saving that bad dude's life." "Hey, hey, do you think, uh, do you think Ellie's okay?" "Should I call the hospital again?" "You've called ten times in the p last 20 minutes." "Yeah, I know, but what-what about sweaty nuclear guy?" "What-what if he hurts her?" "Come on, Chuck." "People saw Ellie at the ER." "She is gonna be fine." "you spending the night?" "My little pep talk must've inspired you guys." "Mazel tov." "Yeah, uh, actually, Sarah's just hanging out until Ellie gets home." "Why?" "She's a doctor, chuck." "Emergencies happen." "You know, when somebody asks, "is there a doctor in the house?" "" that's our cue." "I'm gonna make some coffee." "Do you want some?" "Absolutely." "Listen, I know it's been a while since you've taken your, uh..." "Your bike out for a ride, you know." "But it is time to oil up that rusty chain, x hop on that seat, and start pedaling away, bro." "You never forget how to ride, okay." "Lock it out." "Come on." "Nice." "Aw, hey, there she is." "Hi, honey." "Ellie!" "Oh, my god!" "Oh, my god!" "Oh, my god, you're okay." "Oh, my god, you're fine." "You're fine." "Why wouldn't she be fine?" "What happened?" "We tried everything." "Nothing worked." "I think he was..." "Poisoned or had an allergic reaction or something." "I'm going to bed." "Good night, guys." " Night, guys." " Good night." " Night." " Night." "I'm getting way too comfortable lying and sneaking around all this spy stuff, okay." "I'm starting to feel that that is my real life." "It's all to be expected." "It's an existential spy crisis of sorts." "It used to be all compartmentalized, you know." "Chuck world and spy world." "But when I watched those ambulance doors close and my sister was behind them with that sweaty" "Nuclear spy freak, my worlds collided." "I put Ellie's life in danger." "No, chuck, that guy was sick with or without the intersect in your head." "And spy world or no, Ellie helped that guy because that is what she is trained to do." "Yeah, I guess so." "There's something else I have to talk to you about." "What's that?" "I'm a little worried about our cover." "I think it's time for us to make love." "It's a hot coffee." "Beckman: the intersect was correct in identifying Mason Whitney;" "subject had nuclear Intel." "However, Bartowski incorrectly perceived Whitney as a threat." "Chuck's not wrong very often." "But he's annoying all the time." "Whitney was a programmer for a top-secret project, code name: "sanctuary." "" when Whitney disappeared, so did the sanctuary data embedded on a computer chip." "Wait." "So whoever has the chip essentially has a skeleton key to access our nuclear facilities?" "Precisely, agent walker." "In the wrong hands, this is potentially catastrophic." "Casey, bring chuck with you to e morgue." "Maybe there's a clue only he can see to ascertain Whitney's true cause of death." "Agent walker, search the body for the missing codes." "Maybe there's a chance he still has them on him." "Dude." "This is weird." "You're back from lunch on time." "Big mike's working me to the bone, dude." "He's got me on some extra assignment, says it was super secret." "Don't tell me because if you tell me, it's not gonna be a secret..." "Wants me to help tang's wife pick out a gift for their anniversary." "Well, that's great." "I mean he trusts you." "No, no, dude, I don't have time for this." "I'm a very busy man-boy." "Morgan, think of it like this: think of it as an opportunity to learn something you'd otherwise Never know about our freakish leader." "O..." "Kay." "Ms. Harry tang?" "Thick mike say you help me pick prize for Harry." "Yeah, hi, I'm Morgan." "Shh, bigger secret." "Poopie-cat is the jealous type." "Keep it under your head." "Morgan: have any idea what Harry wants?" "Poppy:" "I buy him plasma TV, biggt you got." "Okay." "I'm gonna go draw up the paperwork." "Harry be so happy!" "Eat it up." "Give me some sugar, sugar." " Oh, yeah, there's some sugar." " This'll be helpful to us one day, Jeffrey." "Meet me in the home theater room tomorrow night." "Knowledge is power." "My mom used to say "knowledge is powder." "" you don't talk about your mom much." "She's doing a stretch up in the state pen at chowchilla." "Move, move." "Okay, just give me the verdict, chuck;" "I can take it." "You sure you want to hear?" "If you're teasing me, please stop." "If you're not teasing me, don't lie to me." "Good as new-ish." "I don't believe you." "You can learn a lot about a person through their cell phone, by the way." "For example, I saw that you listed your nana first, under "a nana." "" thank you." "Hey, yeah." "You really saved my ass, chuck." "Wow, you love your nana and you have the mouth of a trucker." "You're a very complicated woman, Lou." "I brought you something." "For fixing it." "Thanks." "A sandwich?" "it is a.. the sandwich, turkey, monster egg bread ...I'm even gonna call it "The Chuck Bartowski "" "I..." "I can't believe you gonna name a sandwich after me." "you know, you should come by the shop sometime and taste it fresh." "Yeah, yeah." "Yeah." "Yes, I'd love that." "Lou, this is kind of the biggest honor..." "Sarah!" "Hi." "I'm Sarah." "Lou..." "Lou is her name." "This is Lou." "I was fixing Lou's phone for her, Lou." "Who's that?" "That's Sarah." "sh-she said that." "Uh, who's Sarah?" "Sarah..." "Is.." "What's the best way to describe..." " Sarah is my..." " girlfriend" "Sarah: nice to meet you." "Nice to meet you, Sarah." "Uh, you should refrigerate that 'cause it'd be a shame for the chuck to make you sick." "Yes, absolutely, I..." "Great idea." "Uh, there's more to the Mason Whitney incident than we thought." "Let's go Chuck!" "Chuck: okay, this is just a storage room." "They just happen to store people in this room, people who are no longer breathing and who are refrigerated." " Man up, Bartowski." " Got to store 'em somewhere." "Better than stacked up on a curb like garbage, right?" "Eyes on the prize." "Getting any flashes?" "Good lord, the man is naked!" "Appears rigor mortis has set in, too." "Find anything?" "Nothing yet." "No codes." "Hang on a second." "What is this?" "man:" "I appreciate you taking the time to answer my questions, Dr. Bartowski." "Not at all." "Okay, now, did the deceased hand anything to you?" "No." "Say anything specific to you?" "He just asked me to help him." "Did you hide anything for him?" "I beg your pardon?" "Did he transfer anything to your person?" "I've told you everything I know, officer." "I'm sorry if I can't be more help." "That's all right." "Okay, I think we have everything we need." "If you don't mind, I'd just like to get a quick photo for the records." "Bug." "All right." "Actually, I'm just going to move your hair back a bit." "It's just a protocol required for the framing." "Okay." "Now..." "Say "cheesecake." "" cheesecake." "What is it?" "The guy was poisoned." "Toxic derivative of pentothal." "Initially, the subject becomes uncontrollably truthful." "After it accumulates in the occipital lobe, victim suffers from unconsciousness and eventually..." "Death." " What's the timeline on this thing?" " Can't say." "Could be a couple hours." "Could be minutes depending on the concentration." "I just need you to sign this affidavit and we'll be all done." "If I think of anything else, I will be sure to let you know." "I'm sure you will." "Have a good day, sir." "Tiniest cop I've ever seen." "You know the rules, walker." "Not while the green's out of the machine." "Your parents did real number on you, didn't they?" "Yes, they did." "Hi." "Come here." "I just wanted to make sure we're all set for tonight's mission." "Yeah." "Yeah, yeah, yeah." "I mean, it's, you know, it's been a while since I've slept with someone- no-no-not, not slept With someone, but slept with s... it's actually been a while since I've done either one, so..." "Chuck, listen, I know this is kind of uncomfortable." "I'm fine." "It's fine." " It's just that we have to do it..." " Got it." " mean not, not do it." " I got it." " so we don't blow..." " I got it." " Our cover." " I got it." "I got it." "Okay." "Lou!" "Hey!" "Hey, hey." "Hey, hey, wait, wait, wait, wait, Lou, listen." "About earlier with Sarah, I can explain." "Forget it, chuck." "You don't have to be single to fix a broken phone, right?" "Maybe our signals just got crossed." "No, no, not at all." "That's..." "That's kind of what I'm trying to say is that they..." "They weren't crossed." "You know, Sarah and I, me and Sarah, that whole thing, it's really very..." "It's complicated?" "Well, is she your girlfriend or not?" "Well, yeah, sort of, kind of hard to explain." "I really, really, very badly wish that I could explain." "Listen, if you're not going to tell me the truth, I'll tell you." "Okay?" "I like you." "I like almost everything about you." "I think you're cute, you're funny." "Our vast height difference intrigues me." "But want to know what I don't like?" "Very, very much." "I think anyone who cheats on his girlfriend is a big, fat, stupid jackass." "Exactly, I concur." "Of course you do, which is why I like you." "Why don't we do this, okay?" "If your situation ever gets less complicated, you just let me know." "Okay?" "Okay." "Yeah." "Lou:" "I got it." "Have a great day." "Drive safe." "Morgan meet me in the home theater room tomorrow night." "Again." "You sure, Harry?" "You've watched it, like, 20 times." "Again!" "Meet me in the home theater room tomorrow night." "Again!" "Meet me in the home theater room tomorrow night." "Let's watch it again." "Ellie let me in" "Wow, chuck." "What do you think is going to happen here tonight?" "Why?" "What do you, what do you think I think?" "Well, I don't know, the, the candles and the music." "I mean, you do know we're just spending the night together for cover, right?" "Yeah, yeah, yeah." "Why, why would I possibly think anything else?" "I mean, by now I'd say I'm pretty familiar with the concept of faking it, so..." "Sarah chuck, we've got to take this assignment seriously." "Chuck: okay, I'll lose the music." "You can change in the bathroom." "That's okay." "What?" "You're giving me crap about lighting some candles and you come in wearing that?" "What, this?" "This, this is part of my cover." "Well, it doesn't cover a thing." "And what if Ellie or awesome were to walk in?" "This is exactly what a girlfriend would wear to seduce her boyfriend I am just being professional." "Yeah..." "The world's oldest profession." "Oh..." "Well, that's real nice, chuck." "What is the matter with you tonight anyway?" "Captain want to watch some TV, babe?" "Ellie: no, read a book." "Fine, I've got work to do." "You think chuck's going to seal the deal with Sarah tonight?" "Gross, you're talking about my brother." "He's got your genes, babe, and I ought to know the Bartowskis are very passionate people." "Remember the last time we spent the night at your parents' house?" "I found em bouncing around in the Jacuzzi." "Whoa." "Brain stamp." "Shoe doesn't feel so great when it's on the other foot, now, does it?" "And you know what?" "You know what?" "What's up, what's up with the porno shorts, huh?" "I mean, clearly Mrs. Heditsian likes to enjoy all the hills and valleys, but really, really they leave, like, nothing To the imagination!" "Okay." "Babe, your uh..." "Your mood tonight is super-honest, and I think that's awesome." "And then there's that." "Ellie "awesome." "" everything is so freaking "awesome." "" let me tell you something." "If everything is awesome and there is no unawesome, then "awesome" by definition is just Mediocre!" "And when was the last time you did something nice for me?" "Just bought me something for no reason just because it's a Monday?" "We're starting to und like them, aren't we?" "A little." "Are you okay?" "Is there anything you want to talk about?" "What exactly are the rules with our..." "Like you know, our, our thing?" "What do you mean?" "What do I..." "What do I mean?" "I mean hypothetically speaking, are we allowed to see other people?" "Well, uh..." "Our cover is boyfriend/girlfriend, so tactically, that would be challenging." "Plus any prospective date would have to endure a rigorous vetting process to determine her motivation." "Wouldn't her motivation be love?" "Ideally, but you're a very important piece of intelligence, and you have to be handled with extreme care." "Well, that sounds very nice." "Chuck, I don't have to be a spy to piece together the clues here." "You're interested in that Lou girl, aren't you?" "Well, I..." "Come on, babe." "Get back in bed." "You know what?" "I think I'm just going to sleep on the floor." "Sarah, Chuck, we can't compromise our cover." "Chuck well, I feel compromised already." "I have known him since the day he was born obviously." "When people would ask him what he wanted to be when he grew up, he would always say the same thing: "big boy." "" how cute is that?" "Ellie, you're killing me here." "and now he is a big boy." "and I can tell that he is because he is with a big..." "Big girl." "Sorry, guys." "Don't mean to muck up your mojo." "Tried to stop her." "Is she drunk?" "Ellie: chuck, you need a haircut." "It's starting to make funny animal shapes." "Captain:" "let's go, babe." "These two need their privacy, huh?" "When you were seven, I told you that a burglar stole the money from your piggy bank." "That was a lie." "It was me. x" "At the time, I felt it was very important for me to have a back street boys fanny pack." "Ellie, are you okay?" "Have you done anything out of the ordinary?" "Words taste like peaches." "Captain: okay, we going to go now." "Let you kids get back to doing whatever it is you're doing." "Have fun, all right." "Hey, sorry to bother you folks." "Can you spare some milk?" "All out." "Moo juice coming right up." "Casey, what are you doing here?" "Getting some cross talk." "Why?" "What from?" "Those pajamas maja you look like Dennis the menace's father." "Ellie." "Ellie, Ellie!" "Well, she was poisoned." "Pulled the vio surveillance." "Man, posing as an officer, exposed your sister to the poison." "Why would anyone want to hurt Ellie?" "She doesn't know anything about nuclear codes." "She doesn't even want us to own a microwave." "That's good news, means the person who poisoned her is" "Still out there looking for the Intel chip." "No, no, no, no, no." "There is no good news." "Okay, you just told me that my sister was poisoned by the same stuff as a dead guy." "Chuck, our medical teams are trying to identify the poisoning agent to create an antidote for Ellie." "There's no time!" "If it's the same poison as the dead guy, that means Ellie's only got a few hours left." "Look, this is easy." "All we've got to do is find the codes, and we get the bad guy to trade us for the antidote." "Okay, we do this kind of thing in our sleep." "Even if we knew where the codes were, that's not a practical plan." "Can't risk the bad guy endangering millions of lives for the one." "This is my sister we're talking about, all right?" "We can't just sit around and watch her die." "Sarah: okay, the only clue we have so far is the bug that we found on Ellie." "Soundproof box." "Don't want the bad guy knowing we're onto him." "We've got a team working on reversing the tracking signal." "Hey, what are you doing?" "No!" "Found the codes." "Can't believe where mason Whitney hid them." "I'm going to keep them on the lady doctor until we can move them safely." "Now the bad guy's going to come to us." "Not bad, Bartowski." "Do that ever again and I'll kill you." "I'm going to fix this, Ellie, I swear." "Look, I know that you just think I'm just chuck, your screw-up little brother." "But there's a lot about me you don't know." "See, I'm, I'm..." "I'm also chuck, the guy with all these..." "Important government secrets in my brain." "I can make this better." "I will make this better." "everything is so different now." "Ellie, everything is so different now." "I used to be able to come you, and ask your advice about anything." "And now, my whole life is, like, a lie." "Went downstairs to get Ellie's sweater from her locker." "Her lucky sweater." "She could use it." "Thanks, Devon." "Okay." "I've got what you want." "The antidote to save your doctor friend." "Give it to her." "She might live." "Just trade me for the codes." "Or..." "I can poison all of you and force you to tell me where you've hidden my codes." "And then you'll die, too, just like the doctor." "Your choice." "I found them!" "I found them!" "I found them." "I got the codes." "The codes are on the necklace." "I found them" "Wait!" "Casey, wait, what about Chuck?" "Here." "No, no, it's for Ellie." "No, I'm sorry." "There's no debate." "It has to be you." "You're the intersect." "I won't take it knowing that Ellie will die without it, that both of you have been poisoned, too." "You're a good person, chuck, and I respect that, but I got a job to do." "So take it before I shove it down your throat." "Okay, okay, fine." "I'll do it." "Thank you." "I'll pretend to agree to take it, then I'll run like hell to my sister's room and make her take it." "Why did I just say that out loud?" "It's the poison." "It makes you tell the truth." "You do that, I'll give chase, put a gun to your head, threaten to pull the trigger if you don't take it." "Would you really shoot me?" " No." " Yeah, don't waste the bullet." "We're already dead." "I'm saving my sister." "you know, if I had a blog this would be a really big day for me." "Do my laundry?" "Check." "Save my sister's life?" "Check." "Save my own life?" "Final entry." "I am so sorry about all of this." "That's okay." "That's okay." "It's not ideal, but I've lived a pretty good life, you know?" "I mean, how many guys can say they've landed a helicopter and saved the lives of innocent people?" "Courageous and honorable members of the united states military." "And hey, and the silver lining is now I don't have to work out my five-year plan again." "Streamlined that down to about five hours." "Bad guy's name is Riordan Payne." "Used to be an Olympic gymnast, blew out his knee." "Now he sells hard-to-find items, like nuclear codes, to hard-to-find people." "Lots of people want to spend lots of cash on these codes, but they're not going to get the chance." "Oh." "Why not?" "Because this thing's going to lead us right to him." " I got it." " I got it" "I got it." "Well, who's better at it?" "I am." "She is damn true serum." "God, you're so pretty." "Casey, your jaw was chiseled by Michelangelo himself." "Thank you." "Oh, yeah." "Payne: yes?" "Who is it?" "The NSA, CIA and me, who's a little tougher to explain, but..." "We all have our skill set." "Sarah: freeze." "My partner would rather shoot you in the face than let you get away." "You called me your partner?" "Where are the codes, you son of a bitch?" "Where's the antidote?" "Actually, I was just about to enjoy a little antidote myself." "What kind of host would I be if I didn't offer you some as well?" "(gun chamber clicking) Careful there." "Haven't killed anyone in a while." "Getting a little hungry." "No, no, no!" "Wait, wait, wait!" "Don't, don't, don't!" "You have a flash?" "No." "No." "I've just read tons of comic books." "And the villain always samples it first." "Good one, chuck." "All right." "Very un-sportsman-like." "I like it." "The antidote's in the cabinet, bottom right shelf." "Key is in my pocket." "Codes are in my right shoe." "No, wait, wait, wait." "Wait, wait." "Not yet." "Not yet." "Why?" "What's the matter?" "Nothing." "It's just that this..." "This will probably be the last chance that I have to know the truth." "I know you're..." "You're just doing your job here, but sometimes it feels so real, you know?" "So, tell me." "You and me." "Us." "Our thing under the undercover thing." "Is this ever going anywhere?" "I'm sorry, chuck." "No." "Got it..." "Got it." "Thank you for being host." "Even though I guess you don't really have a choice in the matter." "Not bad." "We received the codes and now our weapons sites are more secure than ever." "Congratulations on a job well done." "Trying to have sex with my wife?" "I'm going to kick your ass." "Okay, Morgan Grimes." "You mess with the bull, you get the horns." "Major Casey, who've infiltrated the Home Theatre Room?" "I..." "I..." "I see nothing out of the ordinary here." "Carry on, Bartowski." "Stay right where you are." "Chuck: wait, wait, wait." "Wait, wait, wait, wait." "What are you goin to do with him?" "We'll take care of it." "Oh, you're good, tang, very good." "I am?" " Oh, of course, - you are." "I know you've been onto us for a while now, but you nailed us this time." "I..." "I did?" "Course, you did." "I know you've always known that Sarah and I worked undercover for the government." "I knew it!" "I knew Bartowski couldn't bag anyone as hot as Blondie." "Oh, never mind Bartowski." "He's small potatoes." "Just the pawn we used to lure you here." "I'm the big potato?" "You're the big potato." "We're requesting you relocate to Oahu and await further instructions on how to aid your country from there." " I'm going to be a spy?" " No." "I would give a name to it." "Leave the buy more." "I never thought this day would come." "Don't know what it is about this place, but it gets under your skin." "Yeah." "Proud to serve my country in any way I can, sir." "Hey, big me, you wanted to see me?" "Thanks for your help with Harry tang's wife." "Did me a huge favor." "Yeah, well, just doing my job there, sir." "Oh, and grimes?" "Uh-huh change the shipping address on tang's plasma delivery." "Send it to their new place in Oahu." "Oahu?" "Tang got himself a..." "Taste of the sweet life." "Manager of some pineapple factory." "Wait." "So, we're free?" "No more Harry tang?" " Guess I'm not the only one glad to see him go." " No." "Know he can be tough, but use your discretion with this information." "I got so many secrets crammed in here, fire marshal wants to shut it down." "Had no choice but to give Harry tang the assistant manager position." "Felt so damned guilty about..." "Diddling his wife for the past six months." "No, I will not miss the man at all, but I will forever dream about the lady tang." "oh, hey." "I..." "Didn't know you were coming by." "Sarah, you know when you think you're going to die, and your whole life is supposed to flash in front of you?" "That didn't exactly happen for me yesterday." "In fact, mostly it was just a list..." "That I saw." "A list of stuff that I haven't done and things that I haven't had a chance to say." "So today..." "Today, I want to start crossing things off of my list." "And this is the first thing that I promised myself that I'd do." "We need to break up." "What?" "You know, you know, like, fake-fake break up our pretend relationship." "I just can't do this anymore, you know?" "The longer we go, the longer we keep trying to fool people into believing that we're a real couple..." "The person I keep fooling the most is me." "Yeah." "I meant to ask you." "When you were affected, did you say anything to compromise yourself?" "Uh..." "No." "But if I hadn't been trained to withstand pentathol, I might have." | 2023-11-17T01:26:58.646260 | https://example.com/article/4545 |
The HMS Queen Elizabeth, Britain's most advanced and biggest warship, embarked on its maiden voyage this week. British Defense Secretary Michael Fallon said at the launch that the Russians would look at it "with a little bit of envy."
Fallon then called Russia's only aircraft carrier, the Admiral Kuznetsov, a "dilapidated" ship, prompting the Russian defense ministry to issue a stern warning to the British while issuing what appeared to be a veiled threat to their new ship.
Read: Russia's hypersonic missile ratchets up arms race
Read: Jets from Russia's aircraft carrier set to launch strikes on Syria
Ministry spokesman Igor Konashenkov said on Thursday that Fallon's comments "prove a clear lack of naval knowledge."
"Unlike the Admiral Kuznetsov, which is equipped with anti-aircraft and anti-submarine missiles and especially Granit missiles to hit ships, the British aircraft carrier is nothing but a big, convenient target in the sea," he wrote.
The Admiral Kuznetsov entered service in 1991 and is Russia's only aircraft carrier
"With this in mind, it is in the interest of the British Royal Navy not to show off the 'beauty' of its aircraft carrier in open waters any closer than from several hundred miles," Konashenkov remarked.
Escorted battleship
The HMS Queen Elizabeth, which relies on escort ships for protection, cost 3 billion pounds (3.4 billion euros or $3.8 billion) to build.
It was an eight-year project to launch and along with its sister ship, the HMS Prince of Wales, it forms part of a UK defense program worth 6 billion pounds ($7.65 billion).
The HMS Queen Elizabeth was due to be fully operational by 2020, but that could be pushed back to 2026, Britain's National Audit Office said earlier this year.
'Ship of shame'
Fallon offended Russia's navy in January when he called their aircraft carrier "a ship of shame" as it passed through waters close to the English coast on its way back from bombing raids in Syria.
The Soviet-era Admiral Kuznetsov was involved in Moscow's air campaign in support of Syrian President Bashar al-Assad but has suffered several high-profile mishaps.
The ship sailed back to Russia to undergo costly refurbishments at a port in the northern city of Murmansk.
Russia said this year it had developed a hypersonic missile that traveled twice the speed that Britain's new warship would be able to intercept.
aw/jm (AP, Reuters, AFP) | 2024-05-14T01:26:58.646260 | https://example.com/article/7891 |
1. Filed of the Invention
The present invention relates to a metal-core substrate having an insulating layer thereon and a circuit pattern on the insulating layer and relates to an apparatus utilizing the same.
2. Description of the Related Art
A vehicle has several loads such as lamps and motors. In order to control these loads, heat-generating devices such as FET (Field-Effect Transistor) are utilized and it is necessary to heat sink these devices. In order to solve the problem, the heat-generating devices and heat sink members are mounted together to a substrate or a metal plate is placed inside a substrate as described in JP,2003-101177,A.
FIG. 9 shows a conventional substrate having a heat sink member. FIG. 10 shows a conventional substrate having a metal plate for heat sink.
As shown in FIG. 9, a conductive circuit pattern 912 is formed on an insulating substrate 911. The substrate 911 has a heat-generating device 92 such as FET to control the loads of a vehicle, a driving part 93 to drive the heat-generating device 92, a heat sink member 95, for example a fin, to heat sink the heat-generating device 92, and a male connector 944 receiving a plurality of male terminals 914. A battery (not shown) supplies an electric power to the loads (not shown) through female terminals 514, the male terminals 514, and the FET. The substrate 911 having these parts is received in a box-shaped case 94.
In FIG. 9, the female connector 544 has the plurality of female terminals 514 connected to electric wires 5 and is fitted into the male connector 944 in a direction shown by an arrow. The electric wires 5 are connected to the loads such as battery, lamps and motors. Thus, the female terminals 514 provide the electric power to the male terminals 914 and receive the electric power to supply to the loads from switching controls such as the FET.
FIG. 10 shows a conventional substrate 91 having a metal plate 913 to increase a mechanical strength thereof and to heat sink a heat-generating device 92 without a heat sink member 95 such as a fin. The metal-core substrate 91 has the metal plate 913 and an insulating layer 911 covering the metal plate 913. A circuit pattern 912 is formed on the insulting layer 911. The elimination of the heat sink member reduces a number of parts and provides a space so that the metal-core substrate can be minimized. The other structures of FIG. 10 are the same as those of FIG. 9 and the explanations are omitted.
Recently, small and thin sized substrates are required. JP,2004-303576,A discloses that male terminals 914 are formed on a substrate as a circuit pattern. However, since the male terminals 914 connected to a battery and loads are subjected to a high current of order of amperes, it is necessary to have a certain level of thickness. Accordingly, the male terminals 914 are not suitable to be formed as the circuit pattern. The large size of the male terminals 914 and connectors 944 receiving the male terminals 914 prevent the substrate from being smaller and thinner. | 2024-03-01T01:26:58.646260 | https://example.com/article/4853 |
Accessing Pdf Files Stored In Htaccess Block Folder Manitoba
angular access to external resources on ionic app. Better default directory views with htaccess. beautify your default directory listings! displaying index-less file views is a great way to share files, but the drab, вђ¦, azure files provides an smb interface, client libraries, and a rest interface that allows access from anywhere to stored files. you want to "lift and shift" an application to the cloud which already uses the native file system apis to share data between it and other applications running in azure.
Locking WordPress Admin Login with .htaccess Rules
.htaccess tutorial and cheat sheet The Garage. There was a slight issue, in that some of the pdf files didn't want to load from the proper links page after i used that code, but i have no idea is it was the htaccess code causing the problem or, i am trying to password protect a subdirectory on an ftp that is already inside of a password protected directory, but the folder becomes hidden as soon as i add in the .htaccess and .htpasswd files. is there a line of code i can add to the .htaccess file to keep the subdirect visible?.
Upload it in ascii format to the main folder of your website, or the folder you'd like to block access to. rename it to .htaccess (remember the dot!!) unless you have your ftp program set to show invisible files, the file will then disappear from sight. i gained access to the files in a subfolder by creating the folder via cpanel's file manager, instead of in the ftp client. my .htaccess settings were fine from the start. my .htaccess вђ¦
The best way to do this is to use directives written in the .htaccess file. as we are using the apache server there are a couple ways of adding these commands in the .htaccess file. it may depend on the software you are using to display your website. if you are unsure, then you should speak with a developer to be sure. this part of the magento tutorial will provide detailed information regarding the magento's default files and folders structure. the files and folders included in the main directory are as follows: .htaccess - contains mod_rewrite rules, which are essential for the search engine friendly urls.
Also there is a site called download where the files you listening before are downloadable as file.rar - only for registered users. the drupal access control works fine, only registered users can access the download page. now the problem: what is the .htaccess file? a .htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration. they are placed inside the web tree, and are able to override a subset of the serverвђ™s global configuration for the directory that they are in, and all sub-directories. the original
Upload it in ascii format to the main folder of your website, or the folder you'd like to block access to. rename it to .htaccess (remember the dot!!) unless you have your ftp program set to show invisible files, the file will then disappear from sight. store picture1.png picture2.jpg .htaccess
HTML Basix htaccess code generator - block users
htaccess prevent direct file download Drupal.org. Deny visitors by ip address the visitor blocking facilities offered by the apache web server enable us to deny access to specific visitors, or allow access to specific visitors. this is extremely useful for blocking unwanted visitors, or to only allow the web site owner access to certain sections of the web site, such as an administration area., what is the .htaccess file? a .htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration. they are placed inside the web tree, and are able to override a subset of the serverвђ™s global configuration for the directory that they are in, and all sub-directories. the original.
How to Block Unwanted Bots from Your Website with
HTAccess Password-Protection Tricks Perishable Press. You tried to store more than the capacity of the other machine's advanced box (100,000 files/ folders), or more than the capacity of the designated destination folder (1,000 files/folders). remedy perform the operation again after deleting unwanted files from the store location folder, or change the store location. https://en.wikipedia.org/wiki/Htaccess Store picture1.png picture2.jpg .htaccess
How to use .htaccess Apache .htaccess Guide Tutorials
https://simple.wikipedia.org/wiki/.htaccess
htaccess В« WordPress Codex
I gained access to the files in a subfolder by creating the folder via cpanel's file manager, instead of in the ftp client. my .htaccess settings were fine from the start. my .htaccess вђ¦ doubled extension attack (which is only a problem for microsoft windows users with the hide known file types option on which is an option, i always turn off) would mean a file named openme.pdf.exe (which would appear to the user as openme.pdf) or the like which that regex doesn't match.
You tried to store more than the capacity of the other machine's advanced box (100,000 files/ folders), or more than the capacity of the designated destination folder (1,000 files/folders). remedy perform the operation again after deleting unwanted files from the store location folder, or change the store location. upload a .htaccess file into your wp-content folder. have a look if one exists already, then append this code to the end of the file. if you donвђ™t have one, just create a new blank file and add this code to it:
This guide will show how you to limit wordpress admin login attempts by ip address, or referrer. below we'll show you, how to get to your .htaccess file, and what edits to make, to limit wordpress admin logins. if you are using cloudflare or a dns level filtering service, this method won't work, you i am trying to password protect a subdirectory on an ftp that is already inside of a password protected directory, but the folder becomes hidden as soon as i add in the .htaccess and .htpasswd files. is there a line of code i can add to the .htaccess file to keep the subdirect visible?
The best way to do this is to use directives written in the .htaccess file. as we are using the apache server there are a couple ways of adding these commands in the .htaccess file. it may depend on the software you are using to display your website. if you are unsure, then you should speak with a developer to be sure. this part of the magento tutorial will provide detailed information regarding the magento's default files and folders structure. the files and folders included in the main directory are as follows: .htaccess - contains mod_rewrite rules, which are essential for the search engine friendly urls. | 2024-03-18T01:26:58.646260 | https://example.com/article/1372 |
module.exports = function(api) {
var validEnv = ['development', 'test', 'production']
var currentEnv = api.env()
var isDevelopmentEnv = api.env('development')
var isProductionEnv = api.env('production')
var isTestEnv = api.env('test')
if (!validEnv.includes(currentEnv)) {
throw new Error(
'Please specify a valid `NODE_ENV` or ' +
'`BABEL_ENV` environment variables. Valid values are "development", ' +
'"test", and "production". Instead, received: ' +
JSON.stringify(currentEnv) +
'.'
)
}
return {
presets: [
isTestEnv && [
require('@babel/preset-env').default,
{
targets: {
node: 'current'
}
}
],
(isProductionEnv || isDevelopmentEnv) && [
require('@babel/preset-env').default,
{
forceAllTransforms: true,
useBuiltIns: 'entry',
modules: false,
exclude: ['transform-typeof-symbol']
}
],
[
require('@babel/preset-react').default,
{
development: isDevelopmentEnv || isTestEnv,
useBuiltIns: true
}
]
].filter(Boolean),
plugins: [
require('babel-plugin-macros'),
require('@babel/plugin-syntax-dynamic-import').default,
isTestEnv && require('babel-plugin-dynamic-import-node'),
require('@babel/plugin-transform-destructuring').default,
[
require('@babel/plugin-proposal-class-properties').default,
{
loose: true
}
],
[
require('@babel/plugin-proposal-object-rest-spread').default,
{
useBuiltIns: true
}
],
[
require('@babel/plugin-transform-runtime').default,
{
helpers: false,
regenerator: true
}
],
[
require('@babel/plugin-transform-regenerator').default,
{
async: false
}
],
isProductionEnv && [
require('babel-plugin-transform-react-remove-prop-types').default,
{
removeImport: true
}
]
].filter(Boolean)
}
}
| 2023-12-10T01:26:58.646260 | https://example.com/article/7365 |
Personal loan market shrinks as lenders increase rates
18 September 2009 / by Andy Davies
The personal loans market has shrunk by 37 per cent in the past year, whilst some lenders have increased their rates, uSwitch.com has revealed.
Currently there are 36 personal loans available to borrowers, compared to 57 loans this time last year.
Meanwhile, since the start of September three unsecured personal loan providers have increased their rates by up to 1.2 per cent, which, according to the comparison website, could cost borrowers an extra £322 in interest on a typical loan of £10,000.
Marks and Spencer Money has increased selected loan rates by 1.2 per cent, as Egg and Alliance and Leicester have also announced rate increases, with the average personal loan rate now standing at 9.08 per cent, a 0.4 per cent increase on last year.
uSwitch.com also suggests that the trend of offering the best deals to new customers does not apply to the unsecured personal loans market, as existing customers appear to enjoy slightly lower rates.
For instance, existing unsecured personal loan customers for Tesco's Personal Loan are eligible to receive an interest rate of 7.9 per cent compared to eight per cent for new customers.
Commenting on this trend, Louise Bond, personal finance expert at uSwitch.com, said: "As consumers struggle to make ends meet and manage their finances, loan providers are looking to offer the best rates to those whose financial behaviour they can closely inspect - which are their existing customers.
"Last year 1.3 million consumers used an unsecured personal loan for debt consolidation purposes. However, with the number of personal loans available dropping by 37 per cent this year and rejection running high, it would be highly unlikely that a similar number of consumers would be able to consolidate their debts this year."
But, she added that borrowers looking to consolidate their debts should find out what rates are available from their existing financial services providers, "as it seems loyalty is one of the only aspects that could win consumers better interest rates at the moment".
Get loan quotes»
Take charge of your car finance with Zuto. Loans of £1,500 - £50,000 for 2-5 years. Representative Example: The Representative APR is 19.1% (fixed) so if you borrow £7,500 over 49 months at a rate of 19.1% p.a. (fixed) you will repay £218.78 per month and repay £10,501.26 in total. b>
Loans from £1,000 to £25,000. Fixed monthly payments and no set-up charges. 3.0% APR Representative. A loan of £10,000 over 5 years will cost you £179.68 per month at a representative 3.0% APR. The total cost after 5 years is £10,780, which includes £780.80 interest at 3.0% fixed and a £0 fee. The total amount of credit is £10,000. The rate and fee you are offered will depend on your individual circumstances
Loans from £1,000 to £20,000. Instant online decision. Representative 3.4% APR. Based on a loan amount of £10,000 over 60 months at an interest rate of 3.4% p.a. (fixed). Monthly repayment of £181.41. Total amount repayable £10,884.60.
Loans from £2,500 to £15,000. Fixed monthly payments and no set-up charges. 3.1% APR Representative. A loan of £7,500 over 3 years will cost you £218.31 per month at a representative 3.1 APR. The total cost after 3 years is £7,859.16. The rate and fee you are offered will depend on your individual circumstances
Rebuild Your Credit. Instant Online Decision using 'soft' credit searches (Won't affect your credit score). Funds as soon as same day. No early repayment fees. Dedicated Customer Support Team. Representative Example: If you borrow £3,000 over 3 years at a rate of 31.9% per annum (fixed) you will repay £137.31 per month & £4,943.25 in total.
Interest Rates from 35.9% - 99.9%, depending on the information you provide in your application. Fixed monthly repayments. Instant Online Decision. Representative Example: The Representative APR is 99.9% - Based on an assumed loan amount of £1,500 over 24 months at an interest rate of 71.3% p.a. (fixed) you would pay £118.88 a month and £2,853.12 in total.
3.90% APR for new customers. 3.60% APR for existing customers. Loans of £7,500 - £15,000 for 1-5 years. Representative Example:If you borrow £10,000 over 5 years at a Representative rate of 3.9% APR fixed and an interest rate of 3.90% you would pay £183.41 per month. Total charge for credit will be £1,004.48. Total amount repayable is £11,004.60. b>
The Loans Engine are a broker, not a Lender. The Loans Engine will connect you with a Lender suitable for your needs. They do not charge you an upfront fee but if your application is successful a Broker commission may be charged.
Fair Investment Company is independent and provides a selection of some of the leading loan deals available. Our service does not compare or contrast all of the loan deals currently available in the market. If you would like to arrange any of the products shown in the table please click on the “Apply” link which will take you to the provider’s website where you will be able to view further details of the product and apply online.
Fair Investment Company
is rated 4.43 stars by Reviews.co.uk based on 122 merchant reviews | 2024-04-25T01:26:58.646260 | https://example.com/article/5648 |
# How to use custom type serialization
When a type has provides custom serialization logic:
```csharp
public struct Money
{
public string Currency { get; set; }
public double Ammount { get; set; }
public static Money Parse(string s) => new Money() { Ammount = double.Parse(s.Split(' ')[0]), Currency = s.Split(' ')[1] };
public override string ToString() => $"{this.Ammount} {this.Currency}";
}
```
Nett can be configured to leverage this custom serialization logic by:
```csharp
var obj = new RootTable()
{
ToPay = new Money() { Ammount = 9.99, Currency = "EUR" }
};
var config = TomlSettings.Create(cfg => cfg
.ConfigureType<Money>(type => type
.WithConversionFor<TomlString>(convert => convert
.ToToml(custom => custom.ToString())
.FromToml(tmlString => Money.Parse(tmlString.Value)))));
var s = Toml.WriteString(obj, config);
```
This will generate the following TOML output:
```toml
ToPay = "9.99 EUR"
```
instead of the default output that would write the Money type as a TOML table:
```toml
[ToPay]
Ammout = 9.99
Currency = "EUR"
``` | 2024-04-16T01:26:58.646260 | https://example.com/article/1046 |
Madura Madushanka
Madura Madushanka (born 10 January 1994) is a Sri Lankan cricketer. He made his List A debut for Matale District in the 2016–17 Districts One Day Tournament on 24 March 2017.
References
External links
Category:1994 births
Category:Living people
Category:Sri Lankan cricketers
Category:Antonians Sports Club cricketers
Category:Matale District cricketers
Category:Sri Lanka Navy Sports Club cricketers | 2023-09-18T01:26:58.646260 | https://example.com/article/9860 |
Scalp Dermatitis in Patients Sensitized to Components of Hair Products.
Allergic contact dermatitis is an inflammatory condition that less commonly presents with scalp involvement. Recently, T regulatory cells have been documented to be residents of hair follicles, illuminating why contact allergens are less likely to elicit dermatitis in the scalp. The aims of the study were to determine the prevalence of scalp symptoms, with and without other affected areas, in patients presenting for evaluation of allergic contact dermatitis and to determine the allergens most likely to be associated with scalp dermatitis. We examined allergens commonly found in hair products and stratified positive patch test results by the following affected areas: face, eyelid, neck, or hands, where exposure by runoff is common, versus scalp. Para-phenylenediamine (PPD) is the most common allergen in patients with scalp dermatitis. The rate of PPD sensitization is higher in nonwhite compared with white patients. In the small number of patients with isolated scalp involvement, positive patch tests to PPD were documented in a minority. Other allergens found in hair products may present without scalp symptoms. Patients with dermatitis affecting areas other than the scalp should provide their hair product ingredients to guide patch test selection. | 2023-10-06T01:26:58.646260 | https://example.com/article/3137 |
Butler-Dines family will be missed
Next week, two important community members are leaving Durango. Winston Dines and Greg Butler have decided it best to live closer to aging parents in Salt Lake City. Being residents for more than 20 years, they touched many lives.
Beginning when their daughters, Rebecca and Katherine, were in preschool, Winston was an active member of the Durango Early Learning Center board of directors. She was instrumental with the start of Durango Nature Studies, and spent countless hours supporting the local gymnastics studio where the Boys & Girls Club now is located.
Dines and Butler were quite active parents at Needham Elementary and Miller Middle School. Later, as their children grew, Greg joined the facilities department at Durango High School and Winston headed High School Leadership La Plata. Most recently, Winston had been administering tests in Durango, Pagosa, Cortez and Ignacio.
More importantly than this résumé are the personal lives and families that they contributed to so freely. They are parents to many children of Durango as they took children into their homes, fed them and cared for them generously as if their own. Many of those children now have children of their own.
Lacking any familial support, I could not have been a parent in this town if not for Greg and Winston. I am sure many people feel the same way. Please send kind, parting words of appreciation to the Butler-Dines family as they will be sorely missed. | 2024-07-08T01:26:58.646260 | https://example.com/article/7084 |
Contact lenses in wide use today fall into two general categories, hard and soft. The hard or rigid corneal type lenses are formed from materials prepared by the polymerization of acrylic esters, such as poly(methyl methacrylate) (PMMA). The gel, hydrogel or soft type lenses are made by polymerizing such monomers as 2-hydroxyethyl methacrylate (HEMA) or, in the case of extended wear lenses, by polymerizing silicon-containing monomers or macromonomers. Both the hard and soft types of contact lenses are exposed to a broad spectrum of microbes during normal wear and become soiled relatively quickly. Contact lenses whether hard or soft therefore require routine cleaning and disinfecting. Failure to routinely clean and disinfect contact lenses properly can lead to a variety of problems ranging from mere discomfort when being worn to serious ocular infections. Ocular infections caused by virulent microbes such as Pseudomonas aeruginosa can lead to loss of the infected eye(s) if left untreated or if allowed to reach an advanced stage before initiating treatment.
U.S. Pat. No. 4,758,595 discloses a contact lens disinfectant and preservative containing a biguanide or a water-soluble salt thereof in combination with a buffer, preferably a borate buffer, e.g., boric acid, sodium borate, potassium tetraborate, potassium metaborate or mixtures of the same.
U.S. Pat. No. 4,361,548 discloses a contact lens disinfectant and preservative containing dilute aqueous solutions of a polymer; namely, dimethyldiallylammonium chloride (DMDAAC) having molecular weights ranging from about 10,000 to 1,000,000. Amounts of DMDAAC homopolymer as low as 0.00001 percent by weight may be employed when an enhancer, such as thimerosal, sorbic acid or phenylmercuric salt is used therewith. Although lens binding and concomitant eye tissue irritation with DMDAAC were reduced, it was found in some users to be above desirable clinical levels.
Despite the availability of various commercially available contact lens disinfecting systems such as heat, hydrogen peroxide, biguanides, polymeric biguanides, quaternary ammonium polyesters, amidoamines and other chemical agents, there continues to be a need for improved disinfecting systems. Such improved disinfecting systems include systems that are simple to use, are effective against a broad spectrum of microbes, are non-toxic and do not cause ocular irritation as the result of binding to the contact lens material. There is a particular need in the field of contact lens disinfection and ophthalmic composition preservation for safe and effective chemical agents with antimicrobial activity. | 2024-03-15T01:26:58.646260 | https://example.com/article/4459 |
Stay in touch
You are here
Consumer Protection
PROTECTING CONSUMER SAFETY—Toys should not be toxic or dangerous for children to play with. Our food should not make us sick. The terms for banking and credit accounts should be clear and easy to understand.
LOOKING OUT FOR CONSUMERS
Travel Buddy’s consumer program works to alert the public to hidden dangers and scams and to ban anti-consumer practices and unsafe products.
TROUBLE IN TOYLAND
For 30 years, Travel Buddy’s "Trouble In Toyland" report has surveyed store shelves and identified choking hazards, noise hazards and other dangers. Our report has led to at least 150 recalls and other regulatory actions over the years.
BIGGER BANKS, BIGGER FEES
In April, Travel Buddy released a report in which we surveyed more than 350 bank branches and revealed that fewer than half of branches obeyed their legal duty to fully disclose fees to prospective customers, while one in four provided no fee information at all. We also found that despite widespread stories about the “death” of free checking, free and low-cost checking choices are still widely available, if consumers shop around.
Issue updates
With Hurricane Michael expected to make landfall Wednesday in western Florida as a major, Category 3 hurricane, then continue through the Southeast, The Public Interest Network (which includes Travel Buddy, Environment America, Environment Florida, Environment Georgia, Environment North Carolina and Environment Virginia, among other organizations) is sharing information to help your readers and viewers contextualize the major environmental, health and consumer concerns posed by Michael.
One year after announcing the biggest data breach in history, Equifax still hasn’t been held accountable or provided the information and tools consumers need to protect themselves. Since Equifax won’t help protect consumers, Travel Buddy is stepping in.
Facebook announced today that earlier this week, "attackers exploited a vulnerability in Facebook’s code that impacted “View As”, a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts."
Facebook announced today that earlier this week, "attackers exploited a vulnerability in Facebook’s code that impacted “View As”, a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts."
Facebook announced today that earlier this week, "attackers exploited a vulnerability in Facebook’s code that impacted “View As”, a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts."
Our press release about the national free credit freeze law that goes into effect tomorrow. It includes tips about credit freezes and other steps consumers can take to protect themselves from different types of identity theft and fraud.
As people throughout the Carolinas and Virginia start to recover and rebuild after Hurricane Florence, they face a number of scams and challenges, from price gouging to collecting insurance to safety for their pets and themselves. In an online tip sheet, Travel Buddy is sharing information and expertise that will help readers, listeners and viewers better understand and protect themselves from those who may prey on them.
In response to a "Request for Information" from the U.S. Treasury Department, last week Travel Buddy and the Center for Digital Democracy filed a detailed comment recommending that regulators take a close look at the activities of a new "Big Data" financial sector of online marketplace lenders, which includes so-called "peer-to-peer" lenders. While the sector has potential to be innovative and provide lower-cost loans to consumers, and to improve financial opportunity for underserved consumers, there are risks in "light-touch" regulation.
Our sixth report analyzing complaints in the CFPB's Public Consumer Complaint Database evaluates mortgage complaints, the number one source of complaints to the CFPB, totaling 38% of nearly 500,000 complaints posted since 2011.
Among the toys surveyed this year, we found numerous choking hazards and five toys with concentrations of toxics exceeding federal standards. In addition to reporting on potentially hazardous products found in stores in 2014, this installment of the report describes the potential hazards in toys and children’s products.
Along with the Center for Digital Democracy, our co-investigator on a series of projects related to "big data" and financial opportunity, we've filed detailed comments to the CFPB regarding the need for strong consumer protections as more and more consumers use mobile financial services. We argue that "mobile technologies and services pose both opportunities and risks to consumers, their privacy, and to the kinds and price of services they are offered."
Pages
Hackers gained access to the personal data of over 145 million Americans in the Equifax breach. Here are some recommended actions consumers can take to protect themselves and answers to frequently asked questions.
On July 6, 2017, Travel Buddy Education Fund filed with the U.S. Supreme Court an amicus brief supporting several states who are asking the Court to review a Second Circuit judgment that allows American Express to prohibit merchants from encouraging customers to use lower-priced payment options.
Earlier this week California health officials announced that, starting on July 7, 2017, glyphosate — the main ingredient in Monsanto's Roundup — would be added to the state's list of cancer-causing chemicals. With this move, California has stepped up once again to be a leader in the fight to protect public health from harmful pesticides.
On March 31st, EPA Administrator Scott Pruitt announced that his agency would deny a petition to ban the dangerous pesticide chlorpyrifos from being sprayed on food. He announced this decision despite EPA scientists’ earlier findings that concluded that chlorpyrifos, which is manufactured by Dow Chemical, can harm brain development of fetuses and infants after ingesting even small amounts. The news that the EPA would continue to allow the spraying of chlorpyrifos alarmed doctors and other public health officials, but what’s even more interesting is that according to several recent Freedom of Information Act requests, Pruitt met with Dow CEO Andrew Liveris at a Houston hotel just twenty days prior to making his controversial decision. | 2024-04-02T01:26:58.646260 | https://example.com/article/3564 |
Q:
How to use perl’s uri_encode in one line
In the past I’ve used the code echo "<one two>" | perl -MHTML::Entities -ne 'print decode_entities($_)' to output <one two>.
Now I want to do something similar, but I want to encode it in a way that echo "one two" | *perl magic* outputs one+two, or maybe one%20two.
I’d like a command that’d do this kind of url encode on the whole string, that could be piped, like the first example.
A:
Try doing this using the proper module =)
$ echo 'one two' | perl -MURI::Escape -wlne 'print uri_escape $_'
one%20two
See URI::Escape doc
Note
If you need something faster, consider using URI::Escape::XS
| 2024-01-29T01:26:58.646260 | https://example.com/article/3320 |
Solid state lighting (“SSL”) devices are used in a wide variety of products and applications. For example, mobile phones, personal digital assistants (“PDAs”), digital cameras, MP3 players, and other portable electronic devices utilize SSL devices for backlighting. SSL devices are also used for signage, indoor lighting, outdoor lighting, and other types of general illumination. SSL devices generally use light emitting diodes (“LEDs”), organic light emitting diodes (“OLEDs”), and/or polymer light emitting diodes (“PLEDs”) as sources of illumination, rather than electrical filaments, plasma, or gas. FIG. 1A is a cross-sectional view of a conventional SSL device 10a with lateral contacts. As shown in FIG. 1A, the SSL device 10a includes a substrate 20 carrying an LED structure 11 having an active region 14, e.g., containing gallium nitride/indium gallium nitride (GaN/InGaN) multiple quantum wells (“MQWs”), positioned between N-type GaN 15 and P-type GaN 16. The SSL device 10a also includes a first contact 17 on the P-type GaN 16 and a second contact 19 on the N-type GaN 15. The first contact 17 typically includes a transparent and conductive material (e.g., indium tin oxide (“ITO”)) to allow light to escape from the LED structure 11. In operation, electrical power is provided to the SSL device 10a via the contacts 17, 19, causing the active region 14 to emit light.
FIG. 1B is a cross-sectional view of another conventional LED device 10b in which the first and second contacts 17 and 19 are opposite each other, e.g., in a vertical rather than lateral configuration. During formation of the LED device 10b, a growth substrate, similar to the substrate 20 shown in FIG. 1A, initially carries an N-type GaN 15, an active region 14 and a P-type GaN 16. The first contact 17 is disposed on the P-type GaN 16, and a carrier 21 is attached to the first contact 17. The substrate is removed, allowing the second contact 19 to be disposed on the N-type GaN 15. The structure is then inverted to produce the orientation shown in FIG. 1B. In the LED device 10b, the first contact 17 typically includes a reflective and conductive material (e.g., silver or aluminum) to direct light toward the N-type GaN 15.
One aspect of the LEDs shown in FIGS. 1A and 1B is that an electrostatic discharge (“ESD”) event can cause catastrophic damage to the LED, and render the LED inoperable. Accordingly, it is desirable to reduce the effects of ESD events. However, conventional approaches for mitigating the effects of ESD typically include connecting a protection diode to the SST device, which requires additional connection steps and can compromise the electrical integrity of the resulting structure. Another aspect of the LEDs shown in FIGS. 1A and 1B is that the performance levels of the devices may vary due to internal heating, drive current, device age and/or environmental effects. Accordingly, there remains a need for reliably and cost-effectively manufacturing LEDs with suitable protection against ESD and other performance-degrading factors. | 2023-11-02T01:26:58.646260 | https://example.com/article/9582 |
Factor Xa inhibitors for acute coronary syndromes.
The activation of coagulation mechanisms plays a central role in the pathogenesis of acute coronary syndromes (ACS). Administration of unfractionated heparin (UFH) and low molecular weight heparins (LMWH), agents preventing the progression of thrombus formation, is a crucial therapeutic strategy. However, some limitations related to their use have recently stimulated the development of new synthetic agents. To evaluate the clinical efficacy and safety of factor Xa inhibitors for treatment of ACS compared to UFH or LMWH. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) of the Cochrane Library (Issue 1, 2008), PubMed, EMBASE and LILACS as well as the publications from International Congresses and the reference lists of the selected studies in December 2008. We used randomized controlled trials (RCTs) comparing factor Xa inhibitors to UFH or LMWH during the course of ACS. Outcome measures included all-cause mortality, myocardial infarction, re-infarction, ischemia recurrence, and adverse events. The selection, quality assessment and data extraction of the included trials were done independently by two authors and disagreements were resolved by consensus. Data were analysed by the use of risk ratio (RR) with 95% confidence interval (CI), and the numbers needed to treat (NNT) were reported as needed. A total of four RCTs involving 27,976 subjects were included. Fondaparinux was the only factor Xa inhibitor identified in our included RCTs. Fondaparinux appeared to be related to a lower risk in all-cause mortality at 90 to 180 days (RR 0.89; 95% CI 0.81 to 0.97), especially in the group where enoxaparin (a LMWH) was the control drug. Fondaparinux was also associated with a lower risk in major and minor bleeding at 30 days compared to enoxaparin (RR 0.63, 95% CI 0.55 to 0.73; RR 0.34, 95% CI 0.28 to 0.43, respectively), but not when compared to UFHs (RR 1.41; 95% CI 0.49 to 4.10; RR 0.70, 95% CI 0.14 to 3.39 respectively). The therapeutic efficacy of factor Xa inhibitors in ACS seemed to be related to a reduced risk in all-cause mortality at 90 to 180 days, with a better safety profile than enoxaparin in terms of reduce incidence of major and minor bleeding. | 2023-09-13T01:26:58.646260 | https://example.com/article/2471 |
Q:
PHP MySQL(i) paging/pagination assistance
I'm working on paging/pagination code, but need some help.
I have reached the point where it lists all the page numbers and can be clicked.
image of paging
Now I'm trying to make it where it only outputs 5 pages before and after current page.
[First] [Previous] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [Next] [Last]
$dbhost="localhost";
$dbname ="dbase";
$dbuser="root";
$dbpw ="password";
$dbport=;
$dbsocket="";
$dbconnect = mysqli_connect($dbhost,$dbuser,$dbpw,$dbname, $dbport, $dbsocket);
// Check connection
if (mysqli_connect_errno())
{
echo "Failed to connect to MySQL: " . mysqli_connect_error() . "<br /><br />";
}
$dbmatrix_Join_stmnt="
SELECT
`dbmatrix`.`RecID`,
`dbmatrix`.`AgencyID`,
`dbmatrix`.`DepartmentHead` AS `DeptHead`,
`dbmatrix`.`PrivateBoolean` AS `MtrxPrvt`,
`dbmatrix`.`DateEntered` AS `dbmDateEntr`,
`dbmatrix`.`DateRevised` AS `dbmDateRvsd`,
`agency`.`AgencyName`,
`agency`.`Website` AS `AgencySite`,
`agency`.`EmploymentWebAddress` AS `AgencyEmplSite`,
`agency`.`DateEntered` AS `AgencyDateEntr`,
`agency`.`DateRevised` AS `AgencyDateRvsd`,
`dbmatrix`.`GroupID`,
`groups`.`GroupName`,
`groups`.`DateEntered` AS `GrpDateEntr`,
`groups`.`DateRevised` AS `GrpDateRvsd`,
`dbmatrix`.`ContactID`,
`allcontacts`.`FirstName`,
`allcontacts`.`LastName`,
`allcontacts`.`Title`,
`allcontacts`.`Division`,
`allcontacts`.`Address1`,
`allcontacts`.`Address2`,
`allcontacts`.`POBox`,
`allcontacts`.`City`,
`allcontacts`.`State`,
`allcontacts`.`ZipCode`,
`allcontacts`.`Phone`,
`allcontacts`.`Fax`,
`allcontacts`.`Email`,
`allcontacts`.`Website`,
`allcontacts`.`EmploymentWebAddress` AS `ContactEmpSite`,
`allcontacts`.`GeneralInfo` AS `ContGenInfo`,
`allcontacts`.`DateEntered` AS `ContactDateEntr`,
`allcontacts`.`DateRevised` AS `ContactDateRvsd`
FROM `dbase`.`dbmatrix`
INNER JOIN dbase.agency
ON dbmatrix.AgencyID=agency.RecID
INNER JOIN dbase.groups
ON dbmatrix.GroupID=groups.RecID
INNER JOIN dbase.allcontacts
ON dbmatrix.ContactID=allcontacts.RecID
";
$dbmatrix_Join_qry="$dbmatrix_Join_stmnt
where `dbmatrix`.`PrivateBoolean`='0'
order by `agency`.`AgencyName` ASC
; ";
$queryNTD = mysqli_query($dbconnect,$dbmatrix_Join_qry);
/* Get total number of records */
$sql_qry_All_Directory="$dbmatrix_Join_stmnt where `dbmatrix`.`PrivateBoolean`='0' order by `dbmatrix`.`RecID` ASC ; ";
$query_All_Directory = mysqli_query($dbconnect,$sql_qry_All_Directory);
$count_All_Directory=mysqli_num_rows($query_All_Directory);
echo "<p class='SQLTableCount'><span class='searchTerm bld'>$count_All_Directory</span> Total in Directory</p>";
/*
echo "<p>$page_limit</p>";
echo "<p>$count_All_Directory</p>";
echo "<p>$dbmatrix_Join_qry</p>";
*/
$RecPerPage="10";
$TotalPgs=ceil($count_All_Directory/$RecPerPage);
echo "<p>$TotalPgs Total Pages</p>";
if(isset($_GET["page"])){
$page = intval($_GET["page"]); }
else { $page = 1; }
$calc = $RecPerPage * $page;
$start = $calc - $RecPerPage;
$query7832="$dbmatrix_Join_stmnt
where `dbmatrix`.`PrivateBoolean`='0'
order by `agency`.`AgencyName` ASC Limit $start, $RecPerPage ; ";
$result = mysqli_query($dbconnect,$query7832);
$rows = mysqli_num_rows($result);
if($rows){ $upage = 0; while($col = mysqli_fetch_assoc($result))
{
$RecID=$col['RecID'];
$AgencyID=$col['AgencyID'];
$GroupID=$col['GroupID'];
$ContactID=$col['ContactID'];
$DeptHead=$col['DeptHead'];
$MtrxPrvt=$col['MtrxPrvt'];
$dbmDateEntr=$col['dbmDateEntr'];
$dbmDateRvsd=$col['dbmDateRvsd'];
$AgencyName=$col['AgencyName'];
$AgencySite=$col['AgencySite'];
$AgencyEmplSite=$col['AgencyEmplSite'];
$AgencyDateEntr=$col['AgencyDateEntr'];
$AgencyDateRvsd=$col['AgencyDateRvsd'];
$GroupName=$col['GroupName'];
$GrpDateEntr=$col['GrpDateEntr'];
$GrpDateRvsd=$col['GrpDateRvsd'];
$FirstName=$col['FirstName'];
$LastName=$col['LastName'];
$Title=$col['Title'];
$Division=$col['Division'];
$Address1=$col['Address1'];
$Address2=$col['Address2'];
$POBox=$col['POBox'];
$City=$col['City'];
$State=$col['State'];
$ZipCode=$col['ZipCode'];
$Phone=$col['Phone'];
$Fax=$col['Fax'];
$Email=$col['Email'];
$Website=$col['Website'];
$ContactEmpSite=$col['ContactEmpSite'];
$GenInfo=$col['ContGenInfo'];
$ContactDateEntr=$col['ContactDateEntr'];
$ContactDateRvsd=$col['ContactDateRvsd'];
echo "<div style='display:inline-block; width:300px; border-bottom:1px solid #eeeeee; margin:10px 15px 10px; vertical-align:top; '>";
echo "<div class='bld ' style='font-weight:bold; '>$AgencyName</div>";
echo "<div class='___' style='___'>$Division</div>";
echo "<div class='___' style='color:#0033FF; '>$FirstName $LastName</div>";
echo "<div class='___' style='font-style: italic; '>$Title</div>";
echo "<div class='___' style='___'>$Address1</div>";
echo "<div class='___' style='___'>$Address2</div>";
echo "<div class='___' style='___'>$POBox</div>";
echo "<div class='___' style='___'><span style='color:#330066; '>$City</span>, $State $ZipCode</div>";
echo "<div class='___' style='___'>$Phone</div>";
echo "</div>";
};
};
echo "<br />";
echo "<br />";
if(isset($page)) {
$result = mysqli_query($dbconnect,"select Count(*) As Total FROM `dbase`.`dbmatrix` where `dbmatrix`.`PrivateBoolean`='0' ; ");
$rows = mysqli_num_rows($result);
if($rows) { $rs = mysqli_fetch_assoc($result);
$total = $rs["Total"];
}
$totalPages = ceil($total/$RecPerPage);
// Shows previous button
if($page <=1 ){ echo "<span id='page_links' style='font-weight:;'>Prev</span> | ";
}
else { $CurrPage = $page - 1;
echo "<span><a id='page_a_link' href='?page=$CurrPage'>< Prev</a> | </span> ";
}
for ($upage=1; $upage <= $totalPages; $upage++)
{if($upage<>$page) { echo "<span> | <a id='page_a_link' href='?page=$upage'>$upage</a></span>"; }
else { echo " | <span id='page_links' style='font-weight: bold;'>$upage</span>";
}
}
/*
*/
// shows next button
if($page == $totalPages ) { echo "<span id='page_links' style='font-weight:;'> | Next ></span>"; }
else { $CurrPage = $page + 1; echo "<span> | <a id='page_a_link' href='?page=$CurrPage'>Next ></a></span>"; }
}
$CurrPage=$CurrPage-1;
echo "<div>Current Page: $CurrPage of $TotalPgs</div>";
echo "<br />";
echo "<br />";
echo "<br />";
echo "<br />";
Would really like some help on this
Thank you in advance!
A:
Assuming $page is the current page number, try changing:
for ($upage=1; $upage <= $totalPages; $upage++)
to
for ($upage=max(1,$page - 5); $upage <= min($totalPages, $page + 5); $upage++)
| 2023-10-03T01:26:58.646260 | https://example.com/article/7926 |
Q:
Html using # for iframe paths
I have an angular app with routing where different paths look like
example.com/#/route1, example.com/#/route2, etc.
When using links within the same page, it does not cause a reload of the page. I intend to support multiple apps like this by allowing them to run inside an iframe while I handle the navigation.
Currently, I am changing the path in the iframe as follows using jquery:
<iframe src="http://example.com/#/route1">
<iframe src="http://example.com/#/route2">
But changing from one to the other causes the page inside the iframe to refresh.
Any ideas on how to achieve the routing without a reload?
Thanks.
Edit: ex. if you enter one path in your browser and then enter the second one, the page does not reload. I would like to achieve this same functionality but instead of changing the path in the browser, changing it in the iframe.
A:
The default behavior of the iframe does not reload the page, it behaves just like the browser. I had a logic error in my code that made it refresh.
Thanks again for all the comments.
| 2023-12-08T01:26:58.646260 | https://example.com/article/2439 |
Q:
Can't get past CORS error on secured Google Cloud Function
I have a Google Cloud Function. I created credentials for my project and authorized http://localhost & http://localhost:3000 as origins. I also have a Google user account that I gave the cloudfunctions.functions.invoke role to. I confirm this by going to the cloud function in the console and expand the "Cloud Functions Invoker" item and see my account listed there.
I can successfully access the function with curl.
curl https://[google-cloud-server]/test5 -H "Authorization: bearer my-identity-token"
However, if I try to invoke the function from my React app (I tried both axios and fetch), I get the following error....
Access to XMLHttpRequest at 'https://[google-cloud-server]/test5?a=b' from origin 'http://localhost:3000' has been blocked by CORS policy: Response to preflight request doesn't pass access control check: No 'Access-Control-Allow-Origin' header is present on the requested resource.
A couple things to note...
There are no CORS problems if I make the function accessible to allUsers
Through logging, I have confirmed that, when secured, the request never makes it to the function where I have my CORS code for checking pre-flight OPTIONS. This makes sense as it is supposed to be secured by Google. But all documentation I find on Google Cloud functions talking about handling CORS-related stuff from within the function. Something is responding to my React app's request before it reaches my function. I have no idea what/where.
I added so many tags to this post because I really don't know which layer is causing the problem. I'm probably doing something really obvious/stupid, but I'm out of ideas!
Cloud function....
exports.test5 = (req, res) => {
console.log('function invoked');
// Set CORS headers for preflight requests
// Allows GETs from any origin with the Content-Type header
// and caches preflight response for 3600s
res.set('Access-Control-Allow-Origin', '*');
if (req.method === 'OPTIONS') {
console.log('Determined it is OPTIONS request');
// Send response to OPTIONS requests
res.set('Access-Control-Allow-Methods', 'GET');
res.set('Access-Control-Allow-Headers', 'Authorization');
res.set('Access-Control-Max-Age', '3600');
res.status(204).send('');
} else {
console.log('Main function body');
res.send('Hello World!');
}
};
Call from React client...
const config =
{
params: payload,
headers:
{
Authorization: `bearer ${window.IDENTITY_TOKEN}`
}
};
axios.get(url, config)
.then((res) => {
...
})
.catch((err) => {
handleError(err);
});
Any ideas?
Thanks
A:
CORS preflight OPTION request does not have an Authorization header and Cloud functions IAM prevalidates the Authorization header and will not call the function if it is missing.Therefore in order to serve the CORS preflight response you have to allow allUsers access to your cloud function.
Edit
They updated the documentation
If you want to build a web app that is secured with Google Sign-in and
Cloud Functions IAM, you'll likely have to deal with Cross-Origin
Resource Sharing (CORS). CORS preflight requests are sent without an
Authorization header, so they will be rejected on all non-public HTTP
Functions. Because the preflight requests fail, the main request will
also fail.
To work around this, you can host your web app and function(s) on the
same domain to avoid CORS preflight requests. Otherwise, you should
make your functions public and handle CORS and authentication in the
function code.
Alternatively, you can deploy a Cloud Endpoints proxy and enable CORS.
If you want authentication capabilities, you can also enable Google ID
token validation, which will validate these same authentication
tokens.
| 2024-07-27T01:26:58.646260 | https://example.com/article/8466 |
Nederlands Tijdschrift voor Geneeskunde
The Nederlands Tijdschrift voor Geneeskunde (NTvG; English: Dutch Journal of Medicine) is the main medical journal in the Netherlands, appearing weekly. Established in 1857, it is one of the world's oldest journals. Its publication language is exclusively Dutch. The journal is published and supported by the Vereniging NTvG (English: Society NTvG), which is currently composed of 209 medical scientists.
The current editor-in-chief is Yolanda van der Graaf. The Journal's headquarter is situated in Amsterdam, the Netherlands. From early on, the objective was to create an overarching and all-encompassing journal for medical professionals to exchange insights, knowledge and opinion, and to guarantee consistent progress throughout the country. At present, the main sections include: News, Opinion, Research, Clinical Practice, Perspective. Nowadays, the NTvG focuses on reviews and commentaries of research articles which are often published in English. Further, it continues to produce research of medical practice mainly in the Netherlands.
History
The Journal was founded by the Nederlandsch Maatschappij tot bevordering der Geneeskunst (KNMG) in 1857 by a merger of five pre-existing journals: Practisch Tijdschrift voor Geneeskunde, Repertorium, Nederlandsch Weekblad voor Geneeskundigen, Tijdschrift voor Geregtelijke Geneeskunde en Psychiatries, Tijdschrift der Maatschappij. Admission to the merger was open to any medical journal agreeing to the terms and conditions. The main purpose of the Journal was (and continues to be) to spread medical knowledge, to harmonize current standards and to publish understandable articles about the most recent developments of the medical profession.
Especially in the first century of its existence, the NTvG published a variety of original research of Dutch medical professionals. Given the broad international medical community, the Journal included findings of foreign researchers translated into Dutch. On several occasions (e.g. in 1911), proposals were made to integrate a number of studies in their original language (often English or French). Nevertheless, these proposals were dismissed before a proper discussion could have sparked. Hence, the working language remains Dutch.
Journal content
Following the years after the establishment, the Journal contained the following columns: original articles (30%), scientific publications of national and international medical practice (45%), state of the art of linked scientific journals (15%), and short reports (10%). Today, the focus has shifted towards foreign research and commentaries of various practices, also given the linguistic restrictions.
The NTvG hoped to establish common principles of medical practice throughout the country. This presumes that it is read and used by all Dutch medical practitioners. Its monopolistic position was later infringed by the establishment of various medical journals that have taken on a distinct stance, i.e. exclusively clinical studies. In 1946, the Nederlandsche Maatschappij tot Bevordering der Geneeskunst put an end to the cooperation and declared Medisch Contact as its new main organ. In 2018, the Journal's circulation is 17,000 copies. Taking into account its digital presence, the NTvG counts approximately 610,000 page views per month. To put things into perspective, in 2017, the KNMG recognized almost 46,000 medical practitioners in the Netherlands.
Independence and advertisement
Since its establishment, the NTvG has been independent from other organizations or the national government and wishes to maintain this status. Advertisement i.e. by pharmaceutical actors is kept to a minimum; the Journal's statutes can be consulted for further information. The NTvG is financed mainly by its own profits.
Other services
The NTvG is moreover equipped with a library, located in Amsterdam, which may be visited upon appointment. The library has a rich collection of medical-historical literature: the fields of anatomy, physiology, pathology, surgery, gynecology, obstetrics and botany are covered over a time span from 1500 to 1900.
The NTvG is a founding member of the International Committee of Medical Journal Editors. The Journal continues to follow the Committee's "Recommendations for the Conduct, Reporting, Editing and Publication of Scholarly Work in Medical Journals". The NTvG's editorial office in Amsterdam is composed of clinicians working in Dutch hospitals and general practice. See below the list of editors in chief from 1857 to present.
List of previous editors in chief
References
External links
Category:Publications established in 1857
Category:Dutch-language journals
Category:Weekly journals
Category:General medical journals
Category:1857 establishments in the Netherlands | 2024-01-03T01:26:58.646260 | https://example.com/article/6533 |
Metal injection moulding (MIM) / Ceramic injection moulding (CIM)
MIM (metal injection molding) is a near net-shaping process technology for the production of complex shaped devices with a high throughput. The main materials used for MIM are hard metals, stainless steels and oxide ceramic powders which can be sintered. It is derived from the well established thermoplastic molding technique and uses fine metallic and ceramic powders.
For MIM technology a small part of a polymer is mixed with a metallic powder. The so called “feedstock” is formed, that can be injected into molding cavities afterwards. The “green part” is formed. With this technology it is possible to obtain very complex geometries with a high reproducibility. After shaping the “green part” the polymeric binder is removed either chemically (with catalytic additives, solvents, water) or by heat treatment. This procedure is followed by sintering, i.e. densification by heat treatment. The sintering process is performed in oxidizing, inert or reducing atmosphere, depending on the powder material used. During sintering, the parts experience a shrinkage between 15 and 22% depending on the powder loading, the used material and the final density. The temperature profiles and the atmosphere during both, debinding and sintering have to be controlled very accurately to avoid distortion and the formation of cracks and bubbles.
Carbolite Gero offers solutions for debinding and sintering of the MIM process. With the GLO annealing furnace the mere thermic debinding can be performed. For catalytic processing tailored debinding furnaces are available to the costumers (EBO). The emerging gases during debinding are burned. Hence, contrary to the products using a condensate trap, the smell nuisance is prevented as well as extensive cleaning steps.
Sintering can be done with the product line HTK, HBO, HTBL at low overpressure, vacuum or in partial pressure. Besides, Carbolite Gero offers special solutions like the partial pressure sintering furnace PDS. With the PDS both (rest) debinding and sintering can be done in one furnace. On demand even debinding is possible in partial pressure mode. | 2024-04-26T01:26:58.646260 | https://example.com/article/3229 |
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="Microsoft.Help.SelfBranded" content="false"/>
<META_TOPIC_NOT_FOUND_TITLE_ADD />
<META_LOCALE_ADD />
<META_TOPIC_LOCALE_ADD />
<META_TOPIC_NOT_FOUND_ID_ADD />
</head>
<body>
<DIV_TITLE_ADD />
<div id="mainSection">
<div id="mainBody">
<HIDDEN_SECTION_ADD />
<TOPIC_NOT_FOUND_SECTION_ADD />
</div>
</div>
</body>
</html>
| 2024-06-04T01:26:58.646260 | https://example.com/article/8583 |
Increase in endogenous spleen colonies without recovery of blood cell counts in radioadaptive survival response in C57BL/6 mice.
The radioadaptive survival response induced by a conditioning exposure to 0.45 Gy and measured as an increase in 30-day survival after mid-lethal X irradiation was studied in C57BL/6N mice. The acquired radioresistance appeared on day 9 after the conditioning exposure, reached a maximum on days 12-14, and disappeared on day 21. The conditioning exposure 14 days prior to the challenge exposure increased the number of endogenous spleen colonies (CFU-S) on days 12-13 after the exposure to 5 Gy. On day 12 after irradiation, the conditioning exposure also increased the number of endogenous CFU-S to about five times that seen in animals exposed to 4.25-6.75 Gy without preirradiation. The effect of the interval between the preirradiation and the challenge irradiation on the increase in endogenous CFU-S was also examined. A significant increase in endogenous CFU-S was observed when the interval was 14 days, but not 9 days. This result corresponded to the increase in survival observed on day 14 after the challenge irradiation. Radiation-inducted resistance to radiation-induced lethality in mice appears to be closely related to the marked recovery of endogenous CFU-S in the surviving hematopoietic stem cells that acquired radioresistance by preirradiation. Preirradiation enhanced the recovery of the numbers of erythrocytes, leukocytes and thrombocytes very slightly in mice exposed to a sublethal dose of 5 Gy, a dose that does not cause bone marrow death. There appears to be no correlation between the marked increase in endogenous CFU-S and the slight increase or no increase in peripheral blood cells induced by the radioadaptive response. The possible contribution by some factor, such as Il4 or Il11, that has been reported to protect irradiated animals without stimulating hematopoiesis is discussed. | 2023-12-08T01:26:58.646260 | https://example.com/article/8792 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.