text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
Summary:
Adjacent precast/prestressed members are commonly used to construct bridges rapidly and economically. Adjacent precast members include box-beams. Voided slabs, and decked bulb-Ts. In typical construction, the members are set adjacent to one another, and some type of shear key between the members is filled with grout. In some cases, the adjacent members are tied together with a nominal amount of post tensioning. Finally, the driving surface is created using either a membrane and asphalt overlay, a thin non-composite overlay, or a thicker composite overlay with welded wire fabric reinforcement. The objective of this project is to develop, model, and test several new connections for adjacent precast members, specifically box-beams, voided slabs, and inverted T-beams. | 2024-07-23T01:27:17.568517 | https://example.com/article/7500 |
UPDATED: "Maleficent" and "X-Men: Days of Future Past" made life impossible for the sci-fi epic in many of the 28 markets where it opened a week ahead of its June 6 North American launch.
Facing tough competition, Tom Cruise's Edge of Tomorrow opened to a soft $20 million in 28 foreign markets over the weekend, diminishing hopes that a strong international launch would boost the film's prospects in the U.S.
Edge of Tomorrow -- which opens domestically June 6 after sluggish pre-release tracking -- made its strongest showing in Asia, although it has yet to open in China, Japan and South Korea. If it does well in those markets, Edge could make up ground.
The big-budget sci-fi epic, directed by Doug Liman, began rolling out a week early internationally to provide breathing room between it and the World Cup soccer championships, which get underway June 12. All told, it is playing in 40 percent of the foreign marketplace.
Warner Bros. and Village Roadshow partnered on the $178 million tentpole, and are counting on a strong overseas run, considering Cruise remains a bigger star internationally. Also, action tends to do better offshore, although sci-fi can be a tough sell in some markets. Edge opens in another 36 markets next weekend, including China, Russia, Mexico and France, and studio insiders believe it has a strong shot at winning the frame.
During its first weekend, however, Angelina Jolie's new live-action fairy tale Maleficent and holdover X-Men: Days of Future Past made life difficult for Edge of Tomorrow in many countries, where Edge was relegated to the No. 3 spot.
In the U.K., Edge of Tomorrow debuted to $3.1 million, compared to a $7.6 million debut for Cruise's last film, Oblivion, likewise a sci-fi tale. Maleficent won the weekend in the U.K. with $11 million, while Days of Future Past grossed $5.8 million in its second weekend.
Edge debuted to $1.5 million in Spain and Italy, whereas Oblivion opened to $2.9 million and $2 million, respectively. Its German launch was $2.1 million, compared to $2.6 million for Oblivion. Edge will need to do more than the $197.1 million earned internationally by Oblivion, which cost $120 million to make.
Oblivion, released by Universal in April 2013, faced a far less competitive play period than Edge of Tomorrow, which faces a glut of summer product.
Edge of Tomorrow, about a military operative battling evil alien forces who is forced to live the same day over and over again, did beat Days of Future Past in Malaysia ($1.2 million versus $1 million). It also made a strong showing in Indonesia, earning $2 million to mark Cruise's top opening ever in that country, and grossed $1.9 million in Taiwan (the film placed No. 1 in both of those markets).a.
Maleficent won the weekend internationally with $100.6 million from 47 markets, while Days of Future Past placed No. 2 with $95.6 million from 74 markets for a foreign total of $338.1 million. | 2024-03-26T01:27:17.568517 | https://example.com/article/6064 |
Malcolm Turnbull is staring down yet another pro-coal push from his backbench, with the latest effort calling for a new $4 billion power station.
Liberal MP Craig Kelly is part of the self-described 'Monash Forum', which includes a collection of coalition backbenchers, calling for taxpayers to fund a coal plant.
The "forum" is named after World War I military commander (Sir) John Monash, who was a key figure in opening Victoria's Latrobe Valley up to coal production.
"If the government can intervene to build Snowy 2.0, why not intervene to build Hazelwood 2.0 on the site of the coal-fired power station in Victoria that's now being dismantled?" the group asked in a letter published on Sky News on Tuesday.
The government owns the Snowy Hydro scheme, but does not own the former Hazelwood site.
Mr Turnbull says his government's policy put a premium on "dispatchability", which could be delivered by coal, gas, pumped hydro or other technologies.
"I can only say to you that our national energy guarantee has been endorsed by the whole coalition party room," he told reporters in Brisbane.
"It's got strong support from industry and state jurisdictions ... it's vitally important that it be adopted because what we need is a technology-agnostic energy policy that encourages investment."
Mr Turnbull says a technology-neutral policy can deliver affordable and reliable power while meeting Australia's emissions targets.
Labor frontbencher Mark Butler said "fossils" in the hard-right of the coalition were testing Mr Turnbull's leadership, just ahead of a crucial Newspoll next week.
"Given his track record of failing to stand up to the hard-right of his party room and caving in on two energy policies, no one should be surprised if he caved into the hard right fossils again," Mr Butler said.
It is expected the Newspoll will be the 30th in a row showing the coalition trailing Labor - a measure which Mr Turnbull used to oust Tony Abbott in September 2015.
Mr Kelly said it was "nonsense" to suggest the group aimed to destabilise Mr Turnbull's leadership.
"With so much anti-coal rhetoric around in the community we want to ensure that people understand and we're a voice about how important coal is to our economy," Mr Kelly told ABC radio.
"Prime Minister Malcolm Turnbull has my full support."
Energy Minister Josh Frydenberg spoke to Mr Kelly on Tuesday after reports emerged of the group.
"What they want to see and what we want to see is exactly the same thing, which is lower prices and a more reliable system," Mr Frydenberg told reporters in Melbourne.
"Coal has an important part to play in that role."
Energy ministers will meet in Melbourne on April 20 to discuss the policy. | 2024-01-11T01:27:17.568517 | https://example.com/article/3819 |
Q:
Extra unwanted selection from QFileDialog
I have the need to get one or more directories from the user, and I'm trying to use QFileDialog for this, as shown below. (using QT 5.2)
The problem is that if the user surfs down a directory from their starting directory, then when they select their directories, in addition to those selected directories the dialog returns the parent directory. This only happens for the immediate parent. If they surf down two directories, they still only get the one extra parent entry. If their last navigation was to go back up to the previous directory, they get no extra parent entry.
My question here is: a) Is this a known bug with the QFileDialog? and b) Is there a fix/workaround?
The best I can think up is to write code to compare the first selected entry against the second, and chuck it if it is the parent directory.
QStringList open_directories (const std::string & start_dir) {
QFileDialog dialog (0, "Import Load Directories", from_string(start_dir), QString());
dialog.setFileMode(QFileDialog::DirectoryOnly);
dialog.setOption(QFileDialog::DontUseNativeDialog,true);
QListView *list = dialog.findChild<QListView*>("listView");
if (list) {
list->setSelectionMode(QAbstractItemView::MultiSelection);
}
QTreeView *tree = dialog.findChild<QTreeView*>();
if (tree) {
tree->setSelectionMode(QAbstractItemView::MultiSelection);
}
QStringList file_names;
if (dialog.exec()) {
file_names = dialog.selectedFiles();
}
return file_names;
}
A:
The problem, how I see it, is in using specific selection mode for file dialog item views, when new selection does not deselect the previous selection. So, when you navigate through the hierarchy down you click on directory nodes before making the final selection. Thus you accumulate additional items. What I propose, is using QAbstractItemView::ContiguousSelection mode, that deselects the old selection. So, your code should look like:
[..]
if (list) {
list->setSelectionMode(QAbstractItemView::ContiguousSelection);
}
QTreeView *tree = dialog.findChild<QTreeView*>();
if (tree) {
tree->setSelectionMode(QAbstractItemView::ContiguousSelection);
}
[..]
| 2024-07-28T01:27:17.568517 | https://example.com/article/6698 |
dnl Functions for libfdata
dnl
dnl Version: 20190811
dnl Function to detect if libfdata is available
dnl ac_libfdata_dummy is used to prevent AC_CHECK_LIB adding unnecessary -l<library> arguments
AC_DEFUN([AX_LIBFDATA_CHECK_LIB],
[AS_IF(
[test "x$ac_cv_enable_shared_libs" = xno || test "x$ac_cv_with_libfdata" = xno],
[ac_cv_libfdata=no],
[ac_cv_libfdata=check
dnl Check if the directory provided as parameter exists
AS_IF(
[test "x$ac_cv_with_libfdata" != x && test "x$ac_cv_with_libfdata" != xauto-detect],
[AS_IF(
[test -d "$ac_cv_with_libfdata"],
[CFLAGS="$CFLAGS -I${ac_cv_with_libfdata}/include"
LDFLAGS="$LDFLAGS -L${ac_cv_with_libfdata}/lib"],
[AC_MSG_FAILURE(
[no such directory: $ac_cv_with_libfdata],
[1])
])
],
[dnl Check for a pkg-config file
AS_IF(
[test "x$cross_compiling" != "xyes" && test "x$PKGCONFIG" != "x"],
[PKG_CHECK_MODULES(
[libfdata],
[libfdata >= 20190811],
[ac_cv_libfdata=yes],
[ac_cv_libfdata=check])
])
AS_IF(
[test "x$ac_cv_libfdata" = xyes],
[ac_cv_libfdata_CPPFLAGS="$pkg_cv_libfdata_CFLAGS"
ac_cv_libfdata_LIBADD="$pkg_cv_libfdata_LIBS"])
])
AS_IF(
[test "x$ac_cv_libfdata" = xcheck],
[dnl Check for headers
AC_CHECK_HEADERS([libfdata.h])
AS_IF(
[test "x$ac_cv_header_libfdata_h" = xno],
[ac_cv_libfdata=no],
[dnl Check for the individual functions
ac_cv_libfdata=yes
AC_CHECK_LIB(
fdata,
libfdata_get_version,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
dnl Area functions
AC_CHECK_LIB(
fdata,
libfdata_area_initialize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_free,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_clone,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_empty,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_resize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_get_number_of_segments,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_get_segment_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_set_segment_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_prepend_segment,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_append_segment,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_get_element_data_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_get_element_value_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_set_element_value_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_area_get_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
dnl List functions
AC_CHECK_LIB(
fdata,
libfdata_list_initialize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_free,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_clone,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_empty,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_resize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_reverse,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_number_of_elements,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_list_element_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_element_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_prepend_element,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_append_element,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_append_list,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_is_element_set,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_mapped_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_mapped_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_mapped_size_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_mapped_size_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_by_index_with_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_element_by_index_with_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_append_element_with_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_index_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_list_element_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_cache_element_value,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_value_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_element_value_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_element_value_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_set_element_value_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_get_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_get_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_set_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_get_element_value,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_set_element_value,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
dnl List element functions
AC_CHECK_LIB(
fdata,
libfdata_list_element_get_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_set_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_get_element_value,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_list_element_set_element_value,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
dnl Range list functions
dnl TODO: add functions
dnl Stream functions
AC_CHECK_LIB(
fdata,
libfdata_stream_initialize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_free,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_clone,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_empty,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_resize,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_reverse,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_number_of_segments,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_segment_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_set_segment_by_index,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_prepend_segment,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_append_segment,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_set_mapped_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_segment_mapped_range,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_segment_index_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_segment_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_read_buffer,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_read_buffer_at_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_write_buffer,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_seek_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_offset,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
AC_CHECK_LIB(
fdata,
libfdata_stream_get_size,
[ac_cv_libfdata_dummy=yes],
[ac_cv_libfdata=no])
dnl Tree list functions
dnl TODO: add functions
dnl Vector list functions
dnl TODO: add functions
ac_cv_libfdata_LIBADD="-lfdata"])
])
AS_IF(
[test "x$ac_cv_with_libfdata" != x && test "x$ac_cv_with_libfdata" != xauto-detect && test "x$ac_cv_libfdata" != xyes],
[AC_MSG_FAILURE(
[unable to find supported libfdata in directory: $ac_cv_with_libfdata],
[1])
])
])
AS_IF(
[test "x$ac_cv_libfdata" = xyes],
[AC_DEFINE(
[HAVE_LIBFDATA],
[1],
[Define to 1 if you have the `fdata' library (-lfdata).])
])
AS_IF(
[test "x$ac_cv_libfdata" = xyes],
[AC_SUBST(
[HAVE_LIBFDATA],
[1]) ],
[AC_SUBST(
[HAVE_LIBFDATA],
[0])
])
])
dnl Function to detect if libfdata dependencies are available
AC_DEFUN([AX_LIBFDATA_CHECK_LOCAL],
[dnl No additional checks.
ac_cv_libfdata_CPPFLAGS="-I../libfdata";
ac_cv_libfdata_LIBADD="../libfdata/libfdata.la";
ac_cv_libfdata=local
])
dnl Function to detect how to enable libfdata
AC_DEFUN([AX_LIBFDATA_CHECK_ENABLE],
[AX_COMMON_ARG_WITH(
[libfdata],
[libfdata],
[search for libfdata in includedir and libdir or in the specified DIR, or no if to use local version],
[auto-detect],
[DIR])
dnl Check for a shared library version
AX_LIBFDATA_CHECK_LIB
dnl Check if the dependencies for the local library version
AS_IF(
[test "x$ac_cv_libfdata" != xyes],
[AX_LIBFDATA_CHECK_LOCAL
AC_DEFINE(
[HAVE_LOCAL_LIBFDATA],
[1],
[Define to 1 if the local version of libfdata is used.])
AC_SUBST(
[HAVE_LOCAL_LIBFDATA],
[1])
])
AM_CONDITIONAL(
[HAVE_LOCAL_LIBFDATA],
[test "x$ac_cv_libfdata" = xlocal])
AS_IF(
[test "x$ac_cv_libfdata_CPPFLAGS" != "x"],
[AC_SUBST(
[LIBFDATA_CPPFLAGS],
[$ac_cv_libfdata_CPPFLAGS])
])
AS_IF(
[test "x$ac_cv_libfdata_LIBADD" != "x"],
[AC_SUBST(
[LIBFDATA_LIBADD],
[$ac_cv_libfdata_LIBADD])
])
AS_IF(
[test "x$ac_cv_libfdata" = xyes],
[AC_SUBST(
[ax_libfdata_pc_libs_private],
[-lfdata])
])
AS_IF(
[test "x$ac_cv_libfdata" = xyes],
[AC_SUBST(
[ax_libfdata_spec_requires],
[libfdata])
AC_SUBST(
[ax_libfdata_spec_build_requires],
[libfdata-devel])
])
])
| 2024-05-29T01:27:17.568517 | https://example.com/article/6674 |
Article Preview
Vikings defensive coordinator says he is not considering Gophers job right now
Published 10/22/2010, McClatchy-Tribune News Service
ST. PAUL - Minnesota Vikings defensive coordinator Leslie Frazier said Thursday he is not considering coaching college football, nor is he interested in the vacant University of Minnesota football job -- for now.
Word count: 527
Log In
The full article is available to newspaper subscribers. If you are a subscriber please log in to continue reading.
E-mail:
Password:
Are you a newspaper subscriber but you don't have a Digital Access account yet? Click here to set one up. You will need your subscription account number and phone number. | 2024-04-09T01:27:17.568517 | https://example.com/article/6071 |
A New Jersey man is facing up to five years behind bars for running a nearly $3 million food stamp fraud operation at a Connecticut store.
Muhammad Shahbaz, 50, told investigators that he charged people who receive food stamps through the Supplemental Nutrition Assistance Program (SNAP) double for items that were not allowed to be purchased with benefits at WB Trade Fair Grocery store in Waterbury, Connecticut, NJ.com reported.
He also allowed SNAP recipients to trade their benefits for cash at half price and ran the scheme with three other employees at the store.
Shahbaz is also related to the store’s owner.
During an 18-month period between 2015 and 2016, the store received $3.2 million in food stamp payments from customers, but authorities found the store should have received only between $180,000-$360,000 over that same time period.
Shahbaz will be sentenced in an October court hearing, where he will likely receive five years in prison.
Food stamp fraud has become a criminal enterprise among convenience store owners trying to make a quick buck, and is one of the ways the federal government loses billions of dollars each year.
A Government Accountability Office (GAO) report from 2019 found that criminals were responsible for trafficking at least $1 billion in food stamp benefits.
Last March, Florida law enforcement officials busted nearly 200 people on food stamp fraud charges while they carried out an undercover law enforcement investigation. | 2024-07-15T01:27:17.568517 | https://example.com/article/6574 |
Q:
What effect has a grant command when no schema is specified
Basically I tried to grant permissions to all schemas in a database to a user I have created before like so
USE MyDatabase
GO
GRANT INSERT, SELECT, EXECUTE, DELETE TO MyUser -- note that no schema is specified
GO
Now, the effect is quite confusing. According to SSMS MyUser has the follwing effective permissions on MyDatabase: CONNECT, DELETE, EXECUTE, INSERT, SELECT.
However, he doesn't seem to have rights on any Schema. So my question is, what is the effect of the GRANT from above and is there any way to grant permissions on every schema in a database (sth. like a wildcard)?
A:
You can find out which permissions were granted using the following query:
SELECT d.*, OBJECT_NAME(major_id) AS ObjectName, SCHEMA_NAME(major_id) AS SchemaName
FROM sys.database_permissions d
INNER JOIN sys.database_principals u ON d.grantee_principal_id=u.principal_id
WHERE u.name='MyUser'
In this case, the permissions were granted on the entire database, which is the same thing as granting those permisions on each schema.
| 2023-12-26T01:27:17.568517 | https://example.com/article/1167 |
Lower limb and back pain in Guillain-Barré syndrome and associated contrast enhancement in MRI of the cauda equina.
This study assesses the frequency of lower limb and back pain in children with Guillain-Barré syndrome and reviews the magnetic resonance imaging results of those undergoing spinal imaging. Over an 8-y period, nine children presented with various combinations of severe back pain, leg pains, impairment of gait and bladder dysfunction. Guillain-Barré syndrome was confirmed on clinical examination and peripheral electrophysiology (n = 8). Magnetic resonance imaging in four patients, following contrast injection, showed enhancement of the cauda equine and, additionally, of the cervical nerve roots in one of the patients. A further patient, who was not scanned with contrast, had abnormal thickening of the lumbar roots. Carbamazepine and steroids were effectively used for analgesia in three cases. All the patients recovered. Guillain-Barré syndrome should be considered in the differential diagnosis of children presenting with back and/or leg pain. Early diagnosis ensures prompt monitoring for autonomic dysfunction and respiratory compromise. | 2024-04-17T01:27:17.568517 | https://example.com/article/4137 |
News
In this section you'll find details of news stories, including press releases on legal matters that may affect you as well as information on the projects that Trowers & Hamlins has been involved in recently.
The 8th March is International Women's Day. It's a global celebration of the social, economic, cultural and political achievements of women. This celebration is particularly significant this year as we mark the 100th year since the first women were given the right to vote and around the world industries are challenging views on accepted behaviour to push for change and increase diversity in the workplace.
Trowers & Hamlins has been recognised at the annual Islamic Finance News (IFN) awards for its role advising its client Warba Bank of Kuwait on its first UK real estate acquisition that also included an innovative Takaful solution.
International law firm Trowers & Hamlins has moved up 103 places to be ranked 154th out of 434 in the 2018 national Stonewall Workplace Equality Index. The firm also achieved a 93 point score out of a possible 200 for its dedication to champion inclusion and pushing equality forward. | 2024-02-12T01:27:17.568517 | https://example.com/article/3716 |
This renewal requests support for years 25-30 to extend studies on drug development within the framework of glutathione (GSH), glutathione S-transferases (GST) and pathways that maintain thiol homeostasis. Attachment of GS- to acceptor cysteine residues (glutathionylation) is becoming recognized as a post-translational modification that can alter the structure and function of proteins in a significant manner. We have found that a novel glutathione S-transferase (GST) activated pro-drug (PABA/NO) releases nitric oxide, inducing cytotoxicity and causing glutathionylation of a number of cellular proteins. We wish to identify these and determine their relevance to the drug's mechanism of action. Extending our goal to develop new cancer drugs, we have included approaches that will assist in pre-clinical development of PABA/NO and of a platinum stabilized form of oxidized glutathione (NOV-002). These will include in vitro and rodent studies, particularly for determination of mechanism of action and pharmacokinetics. Drug resistant cell lines will be created and subject to gene expression studies using our amplified differential gene expression microarray technology (ADGE-microarray). Data from these lines will be used to confirm and extend drug target identification and validation. GST and other thiol based cell constituents (such as thioredoxin) play a leading role in regulating critical kinase signaling molecules. We will clone and characterize mammalian sulfiredoxin, a gene that has, until now, only been identified in yeast. What role this protein has in intracellular redox cycling and the regulation of drug response and signaling pathways will be the topic of one aim. Extension of our GST/JNK work will include large-scale purification and crystallization of the complex and will seek to extend the observation that bone marrow cells from GSTrc null mice have enhanced proliferation rates associated with altered expression of JAK- STAT and certain cellular phosphatases (SHP-1 and -2). We will attempt to solidify this connection as a means of consolidating these pathways. Overall, we seek to enhance the collective appreciation of the importance of GSH/GST and associated pathways in controlling cellular homeostasis and develop drugs that target these pathways. | 2024-04-01T01:27:17.568517 | https://example.com/article/5538 |
Birmingham is one of eight large British cities to have reached agreement on the 'City Deal'. Photograph: David Goddard/Getty Images
England's eight biggest cities outside London are to announce on Thursday that they have struck deals with the government to gain new powers over their transport, education and infrastructure building budgets.
Most of the cities will also say they are setting up combined authorities with other councils in their area to form larger legal bodies capable of driving through planning, infrastructure and transport decisions more effectively.
The cities – Birmingham, Bristol, Leeds, Liverpool, Newcastle, Nottingham, Sheffield and Manchester – have been negotiating with the cities minister, Greg Clark, and deputy prime minister, Nick Clegg, for six months to reach agreements with Whitehall on how to better invest in growth, provide skills and jobs, support local businesses and improve infrastructure.
As part of the "City Deals", Clark said he would advocate devolving power to local councils so long as they put in place stronger governance arrangements. He asked them to show they were going to be run by an elected mayor, or through a stronger community of local authorities. All the city councils have responded.
Clark and Clegg have won Whitehall approval for the permanent transfer of transport budgets and skills budgets for some of the cities. They will be allowed to borrow to build infrastructure on the income they will receive from being given access to increases in the business rate. They will also be able to set lower business rates for certain types of company – so reduced rates could be offered, for example, to companies specialising in computer-aided design.
Ministers say the "City Deals", proposed in this year's budget, could create 170,000 jobs and 37,000 apprenticeships over 20 years and unlock £8.2bn in infrastructure spending.
The proposal had been first laid out in the 2012 Budget. The cities will also be given more powers to lever in extra private finance. Two preliminary deals have been signed with Liverpool and Manchester. Clark said: "Our major cities have seized the opportunity to take control of their economic destiny and will now reap the benefits of new financial freedoms and investment opportunities available to them."
Julie Dore, leader of Sheffield council, said: "Last year in Sheffield, there were seven engineering jobs for every young person that trained for an engineering qualification – the current system doesn't work. The City Deal will mean that local people who best understand the needs of the local economy will decide how £23.8m of government skills funding should be invested."
In West Yorkshire, Leeds will combine with three local councils – Bradford, Wakefield and Huddersfield – in an attempt to rationalise delivery of economic growth.Ends | 2023-08-21T01:27:17.568517 | https://example.com/article/2999 |
Harvey Keitel finds Life On Mars
He’ll play the American Gene Hunt…
Across the pond, American attempts to remake some of our best-loved shows often fail at the first hurdle. We’ve seen botched attempts at the likes of Men Behaving Badly, Coupling, Red Dwarf and several others.
The latest to suffer from serious growing pains is Life On Mars, which was once overseen by US telly legend David E Kelley, but after a less-than-successful first pilot, has jettisoned all but its lead actor and relocated the series to New York to try again. The current producers have already added Sopranos star Michael Imperioli to the cast, but now they’ve tracked down an even bigger star to take on the iconic role of Gene Hunt, made famous by Philip Glennister.
Who, you ask? We’re not sure why you’re asking since it’s in the headline, but Harvey Keitel has just nabbed his first major role in a TV show. With Keitel on board, perhaps the show has a chance at success. We’ll let you know… | 2024-03-03T01:27:17.568517 | https://example.com/article/8208 |
Q:
C++ function to count all the words in a string
I was asked this during an interview and apparently it's an easy question but it wasn't and still isn't obvious to me.
Given a string, count all the words in it. Doesn't matter if they are repeated. Just the total count like in a text files word count. Words are anything separated by a space and punctuation doesn't matter, as long as it's part of a word.
For example:
A very, very, very, very, very big dog ate my homework!!!! ==> 11 words
My "algorithm" just goes through looking for spaces and incrementing a counter until I hit a null. Since i didn't get the job and was asked to leave after that I guess My solution wasn't good? Anyone have a more clever solution? Am I missing something?
A:
Assuming words are white space separated:
unsigned int countWordsInString(std::string const& str)
{
std::stringstream stream(str);
return std::distance(std::istream_iterator<std::string>(stream), std::istream_iterator<std::string>());
}
Note: There may be more than one space between words. Also this does not catch other white space characters like tab new line or carriage return. So counting spaces is not enough.
The stream input operator >> when used to read a string from a stream. Reads one white space separated word. So they were probably looking for you to use this to identify words.
std::stringstream stream(str);
std::string oneWord;
stream >> oneWord; // Reads one space separated word.
When can use this to count words in a string.
std::stringstream stream(str);
std::string oneWord;
unsigned int count = 0;
while(stream >> oneWord) { ++count;}
// count now has the number of words in the string.
Getting complicated:
Streams can be treated just like any other container and there are iterators to loop through them std::istream_iterator. When you use the ++ operator on an istream_iterator it just read the next value from the stream using the operator >>. In this case we are reading std::string so it reads a space separated word.
std::stringstream stream(str);
std::string oneWord;
unsigned int count = 0;
std::istream_iterator loop = std::istream_iterator<std::string>(stream);
std::istream_iterator end = std::istream_iterator<std::string>();
for(;loop != end; ++count, ++loop) { *loop; }
Using std::distance just wraps all the above in a tidy package as it find the distance between two iterators by doing ++ on the first until we reach the second.
To avoid copying the string we can be sneaky:
unsigned int countWordsInString(std::string const& str)
{
std::stringstream stream;
// sneaky way to use the string as the buffer to avoid copy.
stream.rdbuf()->pubsetbuf (str.c_str(), str.length() );
return std::distance(std::istream_iterator<std::string>(stream), std::istream_iterator<std::string>());
}
Note: we still copy each word out of the original into a temporary. But the cost of that is minimal.
A:
A less clever, more obvious-to-all-of-the-programmers-on-your-team method of doing it.
#include <cctype>
int CountWords(const char* str)
{
if (str == NULL)
return error_condition; // let the requirements define this...
bool inSpaces = true;
int numWords = 0;
while (*str != '\0')
{
if (std::isspace(*str))
{
inSpaces = true;
}
else if (inSpaces)
{
numWords++;
inSpaces = false;
}
++str;
}
return numWords;
}
A:
You can use the std::count or std::count_if to do that. Below a simple example with std::count:
//Count the number of words on string
#include <iostream>
#include <string>
#include <algorithm> //count and count_if is declared here
int main () {
std::string sTEST("Text to verify how many words it has.");
std::cout << std::count(sTEST.cbegin(), sTEST.cend(), ' ')+1;
return 0;
}
UPDATE: Due the observation made by Aydin Özcan (Nov 16) I made a change to this solution. Now the words may have more than one space between them. :)
//Count the number of words on string
#include <string>
#include <iostream>
int main () {
std::string T("Text to verify : How many words does it have?");
size_t NWords = T.empty() || T.back() == ' ' ? 0 : 1;
for (size_t s = T.size(); s > 0; --s)
if (T[s] == ' ' && T[s-1] != ' ') ++NWords;
std::cout << NWords;
return 0;
}
| 2023-10-23T01:27:17.568517 | https://example.com/article/3462 |
ABSTRACT Although improvement in longterm health is no longer an indication for menopausal hormone therapy evidence supporting fewer adverse events in younger women combined with its high overall effectiveness has reinforced its usefulness for shortterm treatment of menopausal symptoms Menopausal ...
ABSTRACT The development of menopausal symptoms and related disorders which lead women to seek prescriptions for postmenopausal estrogen therapy and hormone therapy is a common reason for a patient to visit her gynecologist but these therapies are associated with an increased risk of venous thromb... | 2024-04-26T01:27:17.568517 | https://example.com/article/2583 |
Are problems of academic medicine a new phenomenon?
Many of the problems of academic medicine are related to the actual challenges of health-care. Some disciplines have high prestige; these have advantages in education, while the needs of the society may differ to some extent. Introduction of the World Health Organization (WHO) concept on health as well as on functioning and disability into the training of physicians and more training in communication may remedy some of the discrepancies. The increase in the demand for physicians calls for improved ethical standards in the practice of importing health workers by the wealthy nations. | 2024-07-31T01:27:17.568517 | https://example.com/article/4009 |
Pages
Oils for Your Skin & Hair!
Sunday, October 15, 2017
Nope, oil is not just for your car!
Although, you have probably known that since the Moroccan oil craze started a few years back. I have consistently used Moroccan argan oil in my hair since...high school? Not sure! But I do know that my hair has never been healthier since starting to use it!Lately I've been learning a lot more about organic/natural beauty products and ways to use oils for your hair and skin. I've started researching lots of new oil-based products and learned that there are so many benefits that I never would have known about! I'm starting to pay much closer attention to the ingredients in the products that I use on my body. I also really like the idea of knowing exactly what's in a product, and the less chemicals the better.
I'll be sharing three products I've recently found that have definitely made an impact on my hair and skin!
This organic jojoba oil is a skin necessity. When I went to Florida, my face freaked out on me! It was super unusual. I don't know if it was the change in humidity or constant application of sunscreen...or both. One of my cousins recommended jojoba oil and said she uses it daily as a moisturizer. I ordered to make sure it arrived right when I got back. Since then I have recommended it to multiple people.
I usually moisturize twice per day, after washing my face. I replaced my nighttime use of moisturizer with jojoba oil and...magic, I swear. Not only does it work amazingly as a moisturizer, it keeps my skin nice and clear. Obviously there are other factors at play when it comes to clear skin, but I think using jojoba oil is a great replacement for a lot of the popular current products out there. I'm trying to cut back on anything with salicylic acid, even though it can help clear up blemishes, because it can actually dry out skin. I have generally clear skin to begin with, but with jojoba oil, I am seeing far less blemishes than I normally would anyway.
Jojoba moisturizes without clogging your pores. I also have mildly oily skin, so using an oil on my face "tricks" it into producing less oil. That's a thing. I'm no expert, but I haven't experienced anything is better for my face than jojoba oil.
The one I use, linked above, is 100% USDA certified organic cold-pressed and unrefined jojoba oil.
Another product for your face! It can be used for any skin type. I like applying 5-7 sprays after the jojoba oil. It just feels super hydrating (and it is), like spraying your skin with a hydrating elixir. It's gentle, yet slightly astringent and helps with blemishes and reduces wrinkles. The antibacterial properties in geranium oil can also help to fight external infection. I use it before I apply makeup, but you can spray it on your face throughout the day.
During this mission to a cleaner beauty cabinet, I was offered a bottle of this tea tree oil shampoo to try!
If you Google uses for tea tree oil, there are tons. It's good for a lot of different reasons. But right now, we're going to focus on why tea tree oil is the perfect oil for hair. It promotes growth and unclogs hair follicles. It can also improve scalp health and stop dandruff. I've also read that it can even prevent hair loss. A great benefit to this product is that it's cruelty-free, paraben-free, GMO-free, and gluten-free. It smells like eucalyptus and leaves my hair feeling refreshed. But I'm going to be honest, I was using their website as reference when looking at ingredients, and they list aqua, jojoba oil, botanical keratin, argan oil, lavender oil, and rosemary oil. Sounds great, right? But then I grabbed the bottle. There are about 15 ingredients on there that are not listed on the website. So I Googled all of them. They all seem to be naturally occurring, mostly derived from coconut oil. And they all serve a difference purpose (foaming, anti-humidity, etc), which is obviously understandable in a shampoo. But I would appreciate it listed on the website! They were all very wordy, so I would have had no clue what they were had I not looked them up. And I'm no expert, but it seems like they're all legitimately natural ingredients that I wouldn't have a problem rubbing all over my scalp and precious hair!Overall, I really like the product.You can enroll in a free sample program with Maple Holistics to try your own products.As I discover more products I love, I will of course share them with you!Until next time, | 2024-06-16T01:27:17.568517 | https://example.com/article/7533 |
Five Years In Prison For Giving a Gun to Your Best Friend
01.15.14
We now have the draft of Floyd Prozanski’s promised anti-rights bill.This bill is intended to expand the failed background check system to guns you give to your best friend, your great-grandson or even your cousin!Punishment for doing this without “permission” from the State Police (who routinely delay and deny without justification) can get you a possible 5 years in the slammer and a fine of $125,000.00!
And these people call us “extremists.”
The proponents of this nonsense like to brag about how many people were denied gun purchases through dealers and offer this as “proof” that the system is “working.” Nowhere do they address all the people who are denied without justification. Nowhere do they address that when real prohibited persons are “denied” they simply leave the store and buy or steal guns elsewhere.
Nowhere do they address that this bill will do nothing to change that. They don’t address that it is nearly unenforceable except against good people who may accidentally run afoul of this absurd mandate.
Nowhere do they address the reality that the State Police have shut down background checks altogether when their “systems were down,” meaning that no transfers could take place, or the fact that all transfers could be ended by simply closing down the background check system for as long as the State Police or the politicians want.
Make no mistake, this is the bill the anti-gun militants and Michael Bloomberg want to create the list they need for confiscation. Don’t believe it? Look at the news from New York where lists of guns have been used to confiscate them from the very people whoOBEYED the law!
The current background check system for gun purchases is a total failure. Qualified buyers are often delayed and denied. I strongly urge you to reject any expansion of this failed system to private transfers.
We have seen how these policies lead to confiscations as they have in New York and now California. | 2024-05-09T01:27:17.568517 | https://example.com/article/2717 |
<template>
<nav class="navbar navbar-expand-lg navbar-dark bg-dark rounded">
<button class="navbar-toggler" type="button" data-toggle="collapse" data-target="#navbarsExample10" aria-controls="navbarsExample10"
aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<div class="collapse navbar-collapse justify-content-md-center" id="navbarsExample10">
<ul class="navbar-nav">
<li class="nav-item">
<router-link class="nav-link" to="/">Home</router-link>
</li>
<li v-if="auth==''" class="nav-item">
<router-link class="nav-link" to="/login">Login</router-link>
</li>
<li v-if="auth==''" class="nav-item">
<router-link class="nav-link" to="/register">Register</router-link>
</li>
<li v-if="auth=='loggedin'" class="nav-item">
<router-link class="nav-link" to="/profile">Profile</router-link>
</li>
<li v-if="auth=='loggedin'" class="nav-item">
<a class="nav-link" href="" v-on:click="logout">Logout</a>
</li>
</ul>
</div>
</nav>
</template>
<script>
import EventBus from './EventBus'
EventBus.$on('logged-in', test => {
console.log(test)
})
export default {
data () {
return {
auth: '',
user: ''
}
},
methods: {
logout () {
localStorage.removeItem('usertoken')
}
},
mounted () {
EventBus.$on('logged-in', status => {
this.auth = status
})
}
}
</script>
| 2024-07-14T01:27:17.568517 | https://example.com/article/6682 |
A Brief History
I could write a book about the history of NEXT, but I fear this tutorial will be long enough as it is. As brief as possible – NEXT was the company that Steve Jobs founded after he was booted from Apple in the 80’s. NEXT made some awesome hardware, but even better software, including a futuristic operating system called NextStep. In the early 90’s, NEXT went from being a full-stack hardware and software manufacturer, to a software-only company, and released NextStep on other platforms. When they did this, they renamed it to OpenStep, which is what I’ll be installing today.
For a more complete history of NEXT, check out this awesome pair of videos. RetroManCave goes over the history of Next, shows off the Next hardware, and has a Next developer talk about some of the development tools that accompanied the NEXT PC. If you like these videos, do him a favor and subscribe to his YouTube channel.
Setting up the Virtual Machine
I’ll be setting my system up on a Windows machine, but you could just as easily set it up on a macOS or Linux machine. When I first attempted this install, I used VMware Workstation 14 Pro for Windows. After going through most of the installation process I couldn’t get OpenStep in to a color screen mode no matter how much I tried. I eventually found out that VMware Workstation doesn’t support the proper VESA display modes, and try as you might you’ll get an error on boot that says “VESA Mode Not Supported.” Fortunately, Virtual Box – which is cross-platform between Windows, macOS, and Linux and completely free – does support the proper VESA mode and works great for the installation of OpenStep.
Still, there are some quirks when setting up your VirtualBox VM initially. The VM must have 1 processor with 1 core, 64MB of RAM, and a 2.0GB hard disk on an IDE controller. You will need to configure one IDE CD-ROM drive and one floppy drive. The hard drive must be at IDE 0:0 (Primary Master), and the CD-ROM drive must be at IDE 0:1 (Primary Slave). You will have to edit the properties of the VM upon creation to ensure you adhere to these standards. All other default options of the VM during the creation wizard can be left alone.
Downloadable Media Images
The following files are required during installation:
Install_Floppy.img – This is the installation boot disk. This will be inserted into the virtual floppy drive to boot the machine along with the installation CD at first boot-up of the VM for initial install.
Driver_Floppy.img – This is the NextStep driver disk. This disk contains drivers for EIDE controllers that we’ll need to complete setup. Insert this disk whenever the system asks you for a driver disk.
OpenStep-Install-4.2.iso – This is the “user” installation disc image. This image contains the non-developer version of OpenStep 4.2. You can use either this disk or the developer version (below), but one or the other disk image must be inserted along with the installation floppy at first boot-up of the VM for initial install.
OpenStep-Install-4.2-Dev.iso – This is the developer installation disc image. It contains everything the user installation disc image contains, as well as some developer tools for programming Objective-C applications. If you intend to do any development, use this disc image for install instead of OpenStep-Install-4.2.iso.
OpenStep-4.2-Patch-CD.iso – This disc image contains updates for more modern drivers (i.e. to enable color display) and also fixes for things like Y2K. We’ll mount and run these updates post-install.
OS Installation
First, create and configure your virtual machine based on the specs above.
Next, ensure that you have Install_Floppy.img and either OpenStep-Install-4.2.iso or OpenStep-Install-4.2-Dev.iso mounted in the virtual floppy and optical drives.
Boot the virtual machine. When the first boot screen appears, do not enter anything.
Simply wait until you’re asked to choose a language. Type 1 and press Enter at this prompt to select English.
After choosing a language, you’ll be prompted to insert the driver disk. Mount Driver-Floppy.img to the floppy drive for the virtual machine and press Enter to continue.
After pressing Enter, you’ll be asked to choose drivers for storage controllers. You’ll be presented with a list of drivers, 1-6. Pressing 7 and Enter gives us the option to see more drivers.
Here, press 7 and Enter to see the second page of drivers, and then 7 and Enter again to see the third page of drivers. The fifth option on the third page of drivers should read “Primary/Secondary (Dual) EIDE/ATAPI Device Controller (v4.03).” From here, type 5 to choose that option and press Enter to confirm it.
This next part confused me at first because it looks like the option we chose didn’t take, but it did. Here, do the same step again for the secondary controller option. Type 7 and Enter twice to get to the third page of driver options again, and then press 5 for the dual EIDE/ATAPI device and press Enter to confirm.
When that option has been selected twice, we see this screen:
At this screen, press 1 and then press Enter to continue.
At this point the system will switch to a graphical mode. If you get an error on this screen saying that there’s no disk drive or disk device, ensure that you’ve got your hard disk mounted to IDE 0:0 (Primary Master) and your CD-ROM drive mounted to IDE 0:1 (Primary Slave) in the configuration of your virtual machine. Also make sure you selected option 5 on the third page twice per the above instructions.
If you don’t error on this screen, all of your storage has been set up correctly. If the system starts finding ATAPI drives as shown in the screen shot above, you’re golden to continue with the install.
You’ll be prompted to acknowledge your startup disk (the 2 GB hard disk we created for the VM). Press 1 here and then Enter to confirm that this will be our system disk, where OpenStep will be installed.
You’ll then be asked what to do with the disk. Since we’re using the entire disk, press 1 and then Enter to format and use the entire disk.
You’ll have to press 1 and Enter one last time to kick off the setup process. Once this portion of setup completes, you’ll be greeted with the following screen. Remove the virtual floppy disk from the drive (if you don’t you’ll get an error on startup) and then press Enter to reboot the VM.
Upon rebooting, OpenStep will complain that it can’t find drivers. Insert the Floppy-Drivers.img image in to the virtual floppy drive and press 1 and then Enter.
Startup will continue and a GUI will load. When the GUI loads you’ll get a similar error about drivers. Press Ok to acknowledge, since we have the drivers floppy already in the drive. This happens twice. Just press Ok both times.
At this point, a system configuration dialog will appear. This is the equivalent to Windows’ Control Panel in OpenStep. At this point, do not change anything in this panel. We will add some things later, but changing things now could break the install. Simply click Save to get past it. It will warn you that configuration appears incomplete. Click Save Anyway to proceed.
Next, you’ll be asked what options to install. Leave everything here checked except for the languages that you don’t want to be installed. I unselected all of them (English is installed regardless).
Installation will now begin. This is the largest installation process for the entire install. It should take around 10-15 minutes or so, and once it’s done, the installer will ask us to reboot. Ensure that you remove the floppy disk image before rebooting, as the installer will remind you to do once it’s finished, and then click Restart.
When the machine restarts, you’ll be asked to choose a language (English is chosen by default and is the only option if you removed the other languages during installation), and US keyboard is selected by default. Make your selections here and press Ok to complete setup.
At this point, you should be staring at a black and white OpenStep desktop.
Post-Installation Configuration
If you’ve made it this far, you will have a usable OpenStep desktop. Let’s make it a little better.
From the Workspace menu, choose Disk > Eject
Mount OpenStep-4.2-Patch-CD.iso to your virtual machine.
At this point you will see a CD-ROM option in the File Viewer dock. Click the CD-ROM image and you’ll be able to see the contents of the disc. It should contain 3 files. Select these three files and drag-and-drop them on to the “me” icon in the File Viewer dock (it looks like a house).
Click the “me” icon (house) to view the contents of that directory. If you haven’t guessed by now, this is the equivalent to your Home directory on macOS. If some of the files are grayed out, it means they’re still copying from the CD. Be patient will they copy.
Double click the file os42machuserpatch4.tar and press the Unarchive button.
This will extract the OS42MachUserPatch4.pkg file from the tar archive. There is no progress bar, so be patient and wait for the file to appear before closing the Archive Inspector application.
Next, click on the Computer icon mid-dock on the File Viewer, double click NextApps, and then scroll down and double-click the Terminal.app. You’ll recognize this terminal from macOS as well. All NextStep/OpenStep apps end in .app and are essentially an archive of all of the files that make up that application, just like on macOS.
Within terminal, run the following commands
su /NextAdmin/Installer.app/Installer /me/OS42MachUserPatch4.pkg
This will run the launcher for the version 4 patch. Click the Install button to begin patch install. Leave all options at their default and click Install once again. On the Confirm screen, click Continue. You may be notified that some files already exist and to confirm that it’s ok to overwrite them. Click Continue again.
Once installation has completed, choose Quit via the Workspace menu and choose Log Out and Power Down. When OpenStep tells you that it’s ok to shut down the machine, restart the VM.
When OpenStep desktop appears, click the Computer in the mid-dock in File Viewer, double click NetAdmin, and then double-click on Configure.app. Click the Monitor icon to change video settings, and then scroll down to the VESA VBE 2.0 driver, highlight it, and click Add. Click Done and then Save. Reboot the machine.
When the machine reboots (if you’re running Virtual Box), we’ll see a nice purple/blue. This is how you’ll know that the VESA drivers are working. Again, if you get an error message on the text mode during boot that says VESA Not Available and you’re still black and white at this point, it’s probably because your hypervisor doesn’t support the proper VESA mode.
After startup finishes (it will take slightly longer this time), we’ll be presented with a beautiful color desktop.
At this point we can go in and do something about this awful resolution.
Go back in to Control.app and click the Monitor icon at the top. This time, click the Select button in the Display Mode section. From here you can choose a higher resolution (I chose 1280×1024 @ 16-bit color) and then choose Ok and Done.
You will be required to reboot before the new changes will take effect, and the system won’t prompt you to do it, so you’ll have to restart manually.
Once you restart, you’ll be treated with a full color desktop at high resolution. What a glorious thing. You can now feel free to explore the various demos that are included with OpenStep, including a game of chess.
Configure Virtual Box Networking
For this step to be successful, you’ll have to gather some info, and you’ll also have to change the properties for the network adapter on your OpenStep VM from NAT mode to Bridged mode. Setting the adapter to Bridged mode will drop the OpenStep VM directly on the same network as your host PC upon startup. I was unable to get DHCP to work on the latest version of Virtual Box. I was also unable to use the virtual networking baked into Virtual Box to allow the VM to run behind network address translation (NAT).
After you set the virtual machine’s adapter to Bridged mode, you must gather some technical data about your local network. You can do this by looking at the adapter properties for the network adapter on your host machine. You can do this in Windows using the ipconfig /all command, and on macOS and Linux using the ifconfig command. You’ll need to find an address that’s available on your local subnet (preferably one that’s not included in your DHCP pol range), your local IP subnet’s length (or subnet mask), your local subnet’s broadcast address, and your local subnet’s default gateway. IP subnetting is beyond the scope of this article, but if you aren’t sure how to find this info, I’ll help you out. To discover the information we need we’ll look at output from my ipconfig /all output.
Here we can see that my subnet mask is 255.255.255.0 (which is common). That’s one bit of information. We can also see my default gateway is 10.10.64.1. There’s the second piece. We can also see both DNS servers at 1.1.1.1 and 1.0.0.1, there are pieces 3 and 4. Since the subnet mask is 255.255.255.0, we know that my IP range is from 10.10.64.1 to 10.10.64.255. Since 10.10.64.255 is the last IP address in the subnet, that address is the broadcast address for the subnet. We’ll need that bit of information as well. Finally, we just need to find an open IP address in this subnet that we can use for our OpenStep machine. When I try to ping 10.10.64.20 there’s no response, so I’ll use that.
Based on what we learned just now, we have the following information:
IP to use: 10.10.64.20 Subnet Mask: 255.255.255.0 Default Gateway: 10.10.64.1 Subnet Broadcast Address: 10.10.64.255 DNS Servers: 1.1.1.1 and 1.0.0.1
Now that you have you IP assignment information, you must install the driver for the Virtual Box network adapter. Click the Computer in the mid-dock in File Viewer, double click NetAdmin, and then double-click on Configure.app. Click the Networking (globe) icon. Our AMD PCnet NIC will be found automatically. Click Add, and then click Save and Done.
We’ll have to reboot before the new adapter becomes active, but before rebooting we’ll configure our IP information.
Click the Computer in the mid-dock File Viewer, double click NextApps, highlight (single-click, do not open) Edit.app. In the Workspace menu click Services > Open Sesame > Open as Root. Right now, the root password is blank so just press Ok. With the Edit.app window selected, Workspace menu will change to a context menu for Edit.app. Click File > Open > and type the absolute file path in the file open dialog box and press Enter:
/etc/hostconfig
The file should open in a new Edit.app window as root. Edit the applicable lines and modify values according to the information you gathered above. Here, I’ll use my information:
HOSTNAME=NEXTSTEP INETADDR=10.10.64.20 ROUTER=10.10.64.1 IPNETMASK=255.255.255.0 IPBROADCAST=10.10.64.255 NETMASTER=-NO- YPDOMAIN=-NO- TIME=-AUTOMATIC-
Click File > Save and close the file. Now we’ll configure DNS. To do that we’ll need to edit /etc/resolv.conf but that file doesn’t yet exist. The easiest way to create it is to open a Terminal and type the following commands:
su touch /etc/resolv.conf
Now we can go back in to Edit.app and open /etc/resolv.conf as root (same steps as above for hostconfig). Enter the following lines in resolv.conf, save it, and close Edit.app.
#/etc/resolv.conf nameserver 8.8.8.8 nameserver 1.1.1.1
Now we can simply reboot, and test connectivity by trying to ping our own IP address, the default gateway, and an IP address on the Internet – such as 1.1.1.1. Success!
Conclusion
I hope you enjoyed this tutorial. I wouldn’t be lying if I said that I spent hours trying to get all of this stuff to work, but it’ll be worth it if it helps someone who is curious about this great OS explore it in depth. I know I’ll have fun doing so. I’ve always wanted to play with a NEXT machine, but didn’t want to shell out thousands of dollars to do it. It’s great that we can do it for free in 2018 with VirtualBox! | 2023-11-06T01:27:17.568517 | https://example.com/article/5800 |
ALASKA, MI – Bill and Ellen Costantino are combining their Tesla S electric-powered car and solar power to eliminate fossil fuels from their lifestyle as much as possible.
Their hobby farm in Caledonia Township is still connected to the grid, but the couple relies to a large extent on an array of solar panels on the roofs of their house and garage.
Those panels feed a bank of storage batteries in their garage that can re-fuel their car and run most of the appliances in their house. The couple also heats their home with wood and rely on a large vegetable garden for produce.
“This comes from a realization that the whole fossil fuel business is unsustainable,” says Costantino, an engineer who runs a consulting business that advises companies on lean production methods. “This has been a lifelong passion of mine.”
Costantino acknowledges the $85,000 he paid for his 2013 Tesla S (before the $7,500 tax credit) and the $35,000 he has spent on solar collectors and storage batteries isn’t going to produce an immediate payoff.
“I’m the extreme early adopter. I’m a zealot,” says Costantino, who plans to spend another $32,000 on ground-mounted solar panels. “We’ve got to get off of these frickin’ fossil fuels.”
For Costantino, it’s a passion he developed in the early 80s, when he helped develop high-tech window quilts designed to cool and insulate homes. He also spent seven years with Toyota when the Japanese automaker first opened an assembly plant in Tennessee.
Costantino is especially zealous about his Tesla S, a sleek luxury car he bought in January 2013, shortly after it was named “Car of the Year” by Motor Trend magazine. After he ordered the car online, it was delivered to his door.
Developed by California entrepreneur Elon Musk, Tesla Motors has captured the imagination of environmentalists and investors by eschewing automotive traditions such as dealership networks and supplier networks.
RELATED: Does Tesla's big announcement threaten West Michigan's status as a center for advanced batteries?
Having spent $20,000 for an extended range battery option on his Tesla S, Costantino says he now has a 265-mile range before he has to recharge the batteries.
Although he recharges the battery at home from the grid or the solar collectors, Costantino said he has no fear about hitting the open road to visit his clients throughout the Midwest.
Tesla has built a string of “supercharging” stations across the U.S. that allow for full recharges in 22 minutes, he said. The car also can use one of the 18,000 regular charging stations that can be found in most U.S. cities, he says.
While the supercharging stations are free to Tesla owners, Costantino says most of the charging stations also offer free recharges. “I’ve only had to pay at two of them,” he says.
At home, Costantino keeps the car plugged into his charging system, which can draw from the grid or his solar collectors. “Eighty percent of the time, I’m charging off the grid,” he says.
Costantino’s solar collectors also feed a bank of 48 large batteries in his garage that are connected to an inverter that powers their home’s appliances. He’s planning to add another set of ground-mounted solar panels to further reduce their reliance on the grid and sell power back to Consumers Energy.
Besides the fuel savings, Costantino is a big fan of the car’s performance.
The big car silently rockets to more than 60 miles per hour in seconds. Take your foot off the accelerator and a regeneration system slows the car while recharging the batteries.
Thanks to its electrical drivetrain, the power is instantaneous when he presses on the accelerator. With direct drive electric motors driving the rear wheels, there’s no transmission needed like on a traditional car.
The car’s handling also is agile because its batteries are incorporated into the car’s floorboards. That results in a low center of gravity and sports car-like handing despite weighing in at 4,700 pounds.
From a technological standpoint, the car is loaded. A large screen on the center console displays all of the vehicle’s functions, including the miles left on the batteries. Maps can be called up on the screen to locate the nearest recharging stations.
Though he loves his Tesla, Costantino also spreads the word about other less expensive electric cars on the market. He passes out copies of literature about other all-electric cars available in the United States.
“There are so many players out there offering full electrics,” he says. “The technology is here.”
Jim Harger covers business for MLive/Grand Rapids Press. Email him at jharger@mlive.com or follow him on Twitter or Facebook or Google+. | 2023-09-20T01:27:17.568517 | https://example.com/article/4199 |
Showing 1-24 of 43 items
Since 1979, 5-B’s has served over a million meals in the Greater Chicago Area and surrounding suburbs. This long tradition of food service has allowed them to be a part of many special events and activities. Through these events they've have met wonderful people and grown in their desire to serve their customers with the best food around with service that is second to none. Their style of food and service can be defined as a taste of old fashioned home cooking with a country flair. Their specialty is outdoor grilling, but their menu can accommodate any tastes or style. Whether your event is large or small, the staff will work with you to formulate the best food and presentation to meet your needs and exceed your expectations.
A' Salute is a high class lounge featuring entertainment every Friday and Saturday night with room for dancing. The menu will feature a selection of small sandwiches called "trios" which are served in threes.
Alton Sports Tap is everyone's favorite place in town to catch a game. With screens all around, you are sure to find the best games on during every time of the year, and every seat in the house offers the perfect view. Kids and adults alike will enjoy our wide selection of pinball, darts and video games with a few classics including bags and golf. Pull up a chair and make a new friend where the sports are always on, the food is always hot and the good times are rolling!
Beningo's was established in the early 1970s, the tradition goes on four generations, specializing in homemade dishes from scratch for your dining pleasure. Among restaurants in Bloomington, let Beningo's take the worry and stress out of your busy schedule by simply ordering our famous lasagna, or choose from our wide variety of authentic entrees that are sure to make your family dinner or party unique and delicious, but most importantly, enjoyable! Click through our website to view our menu, read about our history, and learn more about one of the most respected and beloved dining establishments and restaurants in Bloomington IL and in Central Illinois. Come by Beningo's today to try our signature "sweet Sicilian" sauce, true to our Sicilian heritage.
Bonnie Brook is one of the most popular public courses in Lake County, boasting a meticulously manicured 18-hole course with rolling, wooded terrain. Its natural, picturesque landscape offers golfers the ability to enjoy tree-lined fairways, spacious greens, small lakes and the beauty of the north branch of the Waukegan River, which flows gently throughout the course. With a course length of 6,701 yards, Bonnie Brook offers championship golfers a solid test while being friendly and forgiving to the high handicappers. The clubhouse features a Indoor Golf and Learning Center which houses a P3Proswing Simulator. The simulator and its software helps analyze a player's swing and provides guidance how to improve their game and is available on an appointment basis only.
Located in Lockport, IL, just 40 miles southwest of Chicago's Loop, Broken Arrow features 27 holes of Championship Golf, Driving Range, and Banquet Venue. Broken Arrow utilizes the "Prolink" GPS System by GPS Industries on its entire fleet of Club Car Golf Carts. These large and easy to use systems act as "virtual caddies" designed to give you all the information you need. At a glance, golfers can see the entire hole, hazards, bunkers, and rough areas. This system also allows the golf shop to issue weather warnings and other messages to golfers. The clubhouse features a full service golf shop, snack bar, locker rooms, restaurant, and banquet room. Accommodating up to 250 guest events, the Banquet Room is perfect for making your dream event a reality! With 27 holes of Championship Golf, Restaurant, and Banquet Venue, Broken Arrow has plenty to offer.
Central Illinois Policeman Ball at Hamilton’s. Social hour starts at 5 p.m. and dinner at 6 p.m. There will be dinner, dancing, award presentation, auction, and guest speaker. Tickets are $50 per person and $45 for law enforcement. For more information or to reserve tickets call Tino Vasquez at 217.479.4630.
If you're looking for a taste of Hollywood in Alton, Chez Marilyn serves a star-powered lineup of martinis. Maybe you wanna rub shoulders with "The Frank Sinatra" or get a little flirty with "The Marilyn Monroe." Spend the night with your favorite star or mingle a bit with the whole crowd. Lunch and dinner menu offers wide variety, including sandwiches, burgers and pasta. Desserts and soups are made fresh daily. Our patio is the place to be in the warm months of summer. We have live music Wednesday nights.
The Drury Lane Theatre & Conference Center in Oakbrook Terrace is a beautiful, unique and versatile facility that combines ideal location, functionality and elegance to make it one of Chicagoland's finest facilities for business and entertainment. 971-seat proscenium style live theater featuring musicals, comedy, hollywood personalities and dinner theatre. Banquets for 2,500. 40,000 square feet of trade show space. Conveniently located to the airports.
At Eagle Ridge Resort & Spa go golfing on one of four championship courses, horseback riding along hilly wooded trails, boating on the sapphire waters of Lake Galena, or soaring over the countryside in a hot air balloon with Galena on the Fly. Relax in the luxury of the resort’s Stonedrift Spa with a pampering massage. Eagle Ridge offers a wide variety of lodging that ranges from traditional inn rooms to golf villas and distinctive homes.
Edinger’s Filling Station is a casual dining restaurant in downtown Pontiac. Open for lunch and breakfast, the Edingers pride themselves on serving delicious, homemade food in an inviting atmosphere with friendly service.
Firefly Grill is a modern roadhouse restaurant located on the shores of Lake Kristie. This wonderful place operates on an oasis of American fresh cuisine in the heart of the Midwest. Firefly's menu changes daily and boasts fresh seafood, oak fire steaks and brick oven pizzas. Firefly uses local ingredients whenever possible and fresh herbs and vegetables from their garden. The beautiful facility and grounds make this the perfect place for a wedding or group event. Cooking demonstrations and tours are also available.
Located in Historic Downtown Alton, Gentelin's offers a relaxed fine dining experience with an incredible view of Alton's famous Clark Bridge. The restaurant features a full menu ranging from appetizers and sandwiches, to pasta, steak and seafood. There is something to satisfy everyone's taste buds!
The Glen Rowan House is the perfect setting for weddings, social parties, private, and corporate events. An estate on Chicago’s North Shore designed by renowned architect Howard Van Doren Shaw, this significant landmark is named for its impressive rowan oak trees and is a part of the Lake Forest College campus.
Highland Park Country Club is an immaculately maintained 18-hole public golf course offering an unforgettable challenge for players of all skill levels. Located just 25 minutes north of Chicago, Highland Park's scenic beauty and world-class amenities make it the perfect locale for golf outings, weddings, banquets and fundraising events.
For more than 50 years Italian Village Pizza & Pasta has been a social gathering place for great food and fun in Carbondale. Thousands of locals, Salukis and area visitors have provided their autographs and notable memories on the walls of their main dining rooms. Enjoy delicious pizza, complimentary ice cream, and a full salad bar, all in the presence of good company!
This 18-hole course, designed by renowned golf architect Steve Smyers, was named by Travel + Leisure as one of "America's 100 Best Courses for $100 or Less." Kokopelli offers a full-service pro shop, professionals who offer personal golf instruction and an eight-acre practice facility. This course has a restaurant, lounge, and banquet facilities available.
Enjoy a unique dining experience in the restaurant’s plush dining room and lounge featuring French inspired cuisine. The focal point of the restaurant is the bank’s vault located in our comfortable bistro setting. | 2024-05-13T01:27:17.568517 | https://example.com/article/4617 |
While Valhalla Knights 2 for PlayStation Portable hit retail store shelves across the US today, Japanese fans can start looking forward to a third game. Marvelous Interactive today announced Valhalla Knights Eldar Saga for Nintendo Wii. With the game's development already 70% complete, Eldar Saga is set to be available sometime next year. In line with the PlayStation Portable titles, customization is king in the Wii-based game. Players will be able to meticulously customize the protagonist's appearance and parameters. A character's appearance will change depending on his or her equipment.
The game is split into two parts. Players can decide whether they want to go begin in the first or the second part. The advantage of starting in chapter 1 is that it will be possible to import the clear data before playing through chapter 2. On the other hand, at the beginning of chapter 1, players can only pick a male protagonist, whereas sex and race can be altered at the beginning of chapter 2.
Eldar Saga will offer more than 60 different quests. The player's base of operations is a town, where missions can be accepted or mercenaries recruited. Battles will be fought in real-time, with the player controlling the protagonist. Active party members other than the protagonist are controlled by the AI. Last but not least, the game will also offer cooperative play via WiFi Connection.
Valhalla Knights Eldar Saga will be available in Japan sometime next year. | 2024-05-17T01:27:17.568517 | https://example.com/article/5567 |
Sunday, September 23, 2012
I've completed my masters thesis. It's over one hundred pages, by far the longest thing I've ever written. And it's not half bad, in my opinion, though there are a few arguments I would have liked to flesh out in more detail.
The first half is on the history of the concept of subsidiarity and its relation to the foundations of human rights law, including some criticism of the liberalism we find in Mill, Rorty and, most recently, Nussbaum. I advocate an alternative, which I call pragmatic secular constructivism. It is secular in the sense that it does not give religious belief a privileged place in political discourse; however, I take an accepting position towards the inclusion of religious language in political affairs. My argument is that religious perspectives are going to influence politics one way or another, so long as religion is an influential factor in social life; and that if explicitly religious language is barred from entrance into the political sphere, then the more entrenched religious views will still find a way in (through seemingly secular language, like "family values") at the expense of the less popular religions. There's no sense pretending that we can somehow keep people's religious views outside of political discourse. I would much rather leave the door open and let all religious views be expressed and criticized in the political sphere.
The second half is on the Lautsi v. Italy case, with a strong focus on the influential role of the Vatican in European politics. I think I have identified clear flaws in the Grand Chamber's Lautsi ruling and some plausible sources of bias in the Court. I think my observations are original and valuable, and the warning I present should be taken seriously. There is a real risk of bias skewing the Court's judgments in favor of the Catholic Church and at the expense of non-Christian values.
So, the thesis has been accepted and approved and all that. Now I just have to go through the formal procedures to get my MA in European Studies. The plan has always been a PhD in Philosophy, but I haven't begun to figure out all of my options yet. Whatever I choose will involve continuing to live in Szczecin, so that limits my options in a pretty big way. As much as I'd like to join a top-notch department one day, I don't expect to ever be a serious competitor on the job market. I just want the PhD so I can have some clout when I get into philosophically-oriented debates, and maybe if I ever get around to trying to publish a book. Also, I wouldn't mind a part-time gig as an associate professor. My aspirations are pretty low at this point.
I've completed my masters thesis. It's over one hundred pages, by far the longest thing I've ever written. And it's not half bad, in my opinion, though there are a few arguments I would have liked to flesh out in more detail.
The first half is on the history of the concept of subsidiarity and its relation to the foundations of human rights law, including some criticism of the liberalism we find in Mill, Rorty and, most recently, Nussbaum. I advocate an alternative, which I call pragmatic secular constructivism. It is secular in the sense that it does not give religious belief a privileged place in political discourse; however, I take an accepting position towards the inclusion of religious language in political affairs. My argument is that religious perspectives are going to influence politics one way or another, so long as religion is an influential factor in social life; and that if explicitly religious language is barred from entrance into the political sphere, then the more entrenched religious views will still find a way in (through seemingly secular language, like "family values") at the expense of the less popular religions. There's no sense pretending that we can somehow keep people's religious views outside of political discourse. I would much rather leave the door open and let all religious views be expressed and criticized in the political sphere.
The second half is on the Lautsi v. Italy case, with a strong focus on the influential role of the Vatican in European politics. I think I have identified clear flaws in the Grand Chamber's Lautsi ruling and some plausible sources of bias in the Court. I think my observations are original and valuable, and the warning I present should be taken seriously. There is a real risk of bias skewing the Court's judgments in favor of the Catholic Church and at the expense of non-Christian values.
So, the thesis has been accepted and approved and all that. Now I just have to go through the formal procedures to get my MA in European Studies. The plan has always been a PhD in Philosophy, but I haven't begun to figure out all of my options yet. Whatever I choose will involve continuing to live in Szczecin, so that limits my options in a pretty big way. As much as I'd like to join a top-notch department one day, I don't expect to ever be a serious competitor on the job market. I just want the PhD so I can have some clout when I get into philosophically-oriented debates, and maybe if I ever get around to trying to publish a book. Also, I wouldn't mind a part-time gig as an associate professor. My aspirations are pretty low at this point. | 2024-05-06T01:27:17.568517 | https://example.com/article/3849 |
The ADMSEP introduced the national program in 2012 to provide participants with the foundational knowledge and mentorship necessary for pursuing scholarly activities in medical student education. Dr. Waineo, the School of Medicine’s psychiatry clerkship director and psychiatry course director, is one of six psychiatry medical student educators chosen through a competitive application process. During a two-year period, each scholar will participate in special workshops at two ADMSEP annual meetings, and will develop and carry out a scholarly project pertaining to medical student education.
Dr. Waineo plans to research the impact on medical students of the School of Medicine’s curriculum on recognition and treatment of substance use disorders.
“I also have a strong interest in medical student wellness and would like to research ways to positively influence medical students’ mental and physical wellbeing at the school,” she said.
Completion of the program will result in a Certificate of Excellence in Educational Scholarship.
“Dr. Waineo is a gifted, charismatic teacher and mentor who continues to make innovative and sustained contributions to medical student education. This is prestigious national attention recognizes the impact of her work and once again demonstrates that when it comes to medical student education, Wayne State University is where the action is,” said Department of Psychiatry and Behavioral Neurosciences Chair David Rosenberg, M.D.
Dr. Waineo also is assistant director of Medical Student Education in the department. She teaches second- and third-year medical students, as well as didactic resident classes and a resident elective focused on medical student education.
“Wayne State University School of Medicine is committed to education, clinical work, service and research. This medical school can balance those roles well and provide diverse opportunities for medical students, residents and faculty. It is one of the many reasons I continue to enjoy working here,” Dr. Waineo added.
She also directs the new wellness curriculum being integrated across all four years of medical school.
“I have been committed to teaching from the start of my career. Now I have a chance to learn more about medical education research, meet others who share my interest and learn from experienced senior faculty,” she said. “I hope to improve my knowledge of research methods, develop an effective project and publish the results. I hope to develop relationships with others interested in furthering the same skills and those who are experts in the field. Through participation in this program, I hope to find a way to contribute to the knowledge that has been so important in my own medical education and teaching at the School of Medicine.” | 2023-11-08T01:27:17.568517 | https://example.com/article/3687 |
WFTV Newsletter Sign Up
Delivered To Your Inbox
Newsletter:
Thank You for Subscribing!
Doctor sentenced to 25 years for pill distribution
OSCEOLA COUNTY, Fla.,None - Prosecutors said one Osceola County family physician was the doctor who gave thousands of pills to drug dealers. Friday, he emotionally begged a judge to be lenient.
WFTV covered the arrest of Menendez in October 2010. Drug agents said he gave prescriptions for oxycodone to drug dealers in Sarasota. When investigators arrested those suspects, they found guns, hundreds of empty pill bottles and 2,000 pills.
WFTV's Melonie Holt was in court for Friday's sentencing. The judge told Menendez that he violated his oath when he used his medical license and prescription pad as a money maker.
Menendez will never practice medicine again. And today, he was sentenced on one count of conspiracy to traffic in oxycodone, but not before asking a judge for mercy.
"I lost my career, I lost my respect, I'm about to lose my family for a long period of time," Menendez said.
Menendez, who worked at Physicians Care Partners in Kissimmee, was identified as an oxy supplier when he was linked to a pair of Sarasota drug dealers in 2010.
Investigators said when they searched the homes of Tyrone Anderson and William Frank Sellers, they uncovered 8 pounds of marijuana, cash, oxycodone and 56 prescriptions for 18 patients. Most of those prescriptions were written by Menendez, who charged $200 per patient.
"They were being filled either in Manatee or Sarasota county. And eventually they were being sold in the streets," an undercover investigator said.
From the time of his arrest, Menendez cooperated with investigators and the statewide prosecutor's office.
"I request mercy," Menendez said.
Menendez' wife of 17 years and his father requested mercy, too.
"There couldn't be a much greater violation of his oath as a physician that the court could imagine," Osceola County Circuit Coury Judge Jon Morgan said.
With that, Menendez was sentenced to 25 years with credit for two days served. He must also pay a $500,000 fine.
Just last week, Judge Morgan sentenced Frank Sellers to 25 years in prison. Anderson is still awaiting sentencing. | 2024-02-08T01:27:17.568517 | https://example.com/article/5496 |
Particular embodiments generally relate to processing order changes.
A purchase order is a document that governs an agreement between a purchaser and a supplier. A purchase order document requires approval. Once the purchase order document has been approved, the supplier can provide the goods or services governed by the purchase order. However, at some point, changes to attributes related to the purchase order may need to be made. Some changes to attributes may require amendments to the purchase order document and some changes may not. A distributor of the software that was used to create the purchase order document may hard code which attributes require communication of changes to the supplier. This may lead to a discrepancy between the purchaser and the supplier as to which changes should be communicated to the supplier. If the expectations for certain amendments to be communicated to the supplier are different between the purchaser and the supplier, this may lead to contractual risk and also unnecessary communication. | 2023-12-14T01:27:17.568517 | https://example.com/article/7418 |
Photon migration in Raman spectroscopy.
Monte Carlo simulation has been applied to study time-resolved Raman and Tyndall photon migration in opaque samples under isotropic and forward scattering conditions. For isotropic scattering, Raman and Tyndall intensities are predicted to decay according to t((1-n)) and t(-n), respectively, where the value of n depends on the ratio of the optical collection aperture to the mean scattering length. The simulation correctly reproduced the analytical results of n = 3/2 and n = 5/2 for a point source in infinite and semi-infinite media, respectively. In addition the model can be used to relate the time at which a Raman photon exits the sample to the mean depth at which it was generated. This could provide a useful tool for depth profiling the chemical composition of turbid systems, and hence be a useful addition to the established array of photon-migration techniques. The model was applied to analyze experimentally observed Raman and Tyndall decay profiles from powdered trans-stilbene. The transport mean free path (l(t)) was calculated to be approximately 400 microm, which was significantly larger than the particle sizes present in the sample (approximately 10-100 microm). This implies that the particles were highly forward scattering, as would be expected for this size range. When highly anisotropic scattering was introduced into the model a much more reasonable scattering length (l(s) approximately 40 microm) was obtained. Finally, a simple analytical model was developed that gives the correct relationship between the Raman and Tyndall decay exponents for isotropic scattering. To the best of our knowledge this work represents the first detailed study of Raman photon migration under time-resolved conditions. | 2024-07-08T01:27:17.568517 | https://example.com/article/8776 |
Q:
MediaWiki: How to display a link only if the page exists
I'd like to display a link (or an image) only if the page exists. What is the mediawiki syntax for doing so?
A:
use the function #ifexist
http://www.mediawiki.org/wiki/Help:Extension:ParserFunctions
{{#ifexist: page title | value if exists | value if doesn't exist }}
| 2023-09-22T01:27:17.568517 | https://example.com/article/3326 |
Pherson, Ohio
Pherson is an unincorporated community in Pickaway County, in the U.S. state of Ohio.
History
A post office was established at Pherson in 1887, and remained in operation until 1910. Isaac A. Pherson, the first postmaster, gave the community his name.
References
Category:Unincorporated communities in Pickaway County, Ohio
Category:Unincorporated communities in Ohio | 2024-07-15T01:27:17.568517 | https://example.com/article/6793 |
Q:
Salesforce API: Instance_url from oauth2 access_token
I authenticating salesforce app using Oauth2. But I am not getting instance_url in access_token.
my code for authenticating is
access_token = oauth_client.web_server.get_access_token(params[:code], :redirect_uri => oauth_redirect_uri, :grant_type => 'authorization_code')
and when I do
instance_url = access_token["instance_url"]
I get
undefined method `[]' for #<OAuth2::AccessToken:0x10113f7e8>
Help!
A:
change the version of the oauth2 gem that you are using.
| 2023-09-09T01:27:17.568517 | https://example.com/article/5132 |
Today, Shopify runs on Rails 5, the latest major version. It’s important to us to stay updated so we can improve the performance and stability of the application without having to increase the maintenance cost of applying monkey patches. This guarantees we would always be in the version maintained by the community; and, that we would have access to new features soon.
Upgrading the Shopify monolith—one of the oldest and the largest Rails applications in the industry—from Rails 4.2 to 5.0 took us nearly a year. In this post, I’ll share our upgrade story and the lessons we learned. If you're wondering how the Shopify scale looks like or you plan a major Rails upgrade, this post is for you.
Prepare
We prepared for the upgrade in two steps. First, we rewrote our code to no longer use deprecated features. Second, we ensured that all gems that we use support the Rails version we’re upgrading.
This work was nontrivial because Shopify heavily relied on protected_attributes, an old feature that was deprecated in Rails 4.0 in 2013. We never prioritized reducing usage of protected_attributes because we were still able to keep using it on our current Rails version, 4.2.
We also have 370 gem dependencies, and many of them had to be upgraded to support Rails 5. Some of the gems were developed by us, meaning that we had to update the gems ourselves (like activerecord_typed_store and activerecord-databasevalidations). There’ve also been gems that were no longer maintained, and we had to take over the maintainership to make them ready for Rails 5.
After the preparation step was done, the app was able to boot on the new Rails version, and we’ve been able to run and fix tests that failed on Rails 5.
Upgrade
In a case of a small app, you can do the Rails upgrade in a branch, create a PR and merge it as soon as it's ready. But at Shopify we have hundreds of developers working in the same repo, merging more than 100 pull requests per day. The only way was to perform the Rails upgrade in the master branch step by step, preserving compatibility with Rails 4.2. We made a contract that the app should be bootable on both Rails versions, allowing some tests to fail on Rails 5. We set up “dual” Gemfile, and had a Gemfile.lock file per each Rails version:
if ENV['RAILS_NEXT']
gem 'rails', github: 'rails/rails', branch: '5-0-stable'
gem 'rack', github: 'rack/rack'
else
gem 'rails', '~> 4.2.7'
gem 'rack', '~> 1.5', '>= 1.5.5'
end
gem 'responders', '~> 2.2'
This was not the best experience from a developer’s perspective because they had to update both Gemfile.lock and Gemfile_next.lock when they added a new gem. Our very own GitHub bot reminded about not forgetting about the second Gemfile lock:
We used the same dual pattern for CI. We've created a separate CI pipeline for Rails 5 that was allowed to fail until all tests have been fixed. During the upgrade project, all submitted PRs have been tested on both Rails version. Funny fact: this doubled the demand on our CI infrastructure, so we had to provision extra resources for it.
At the beginning we had >1000 tests failing on Rails 5. It sounds like a massive number, and we formed a SWAT team of senior Rails developers to complete this phase of the project as soon as possible. The velocity of fixing the failings tests has been reverse exponential: at the beginning, you could easily fix 100 tests with a one line change, but closer to the last hundred of tests you could spend a few days fixing just one of them. This has been a real challenge, and you never knew whether the issue was in Shopify codebase, in Rails, or in a third-party gem.
There was a massive archaeological component in the upgrade when we had to dive into parts of the monolith that have been written almost a decade ago. It’s fascinating that Rails hasn’t changed that much and that code still works.
Shopify codebase has over a million LOC, which means there's a ton of edge cases that may be not tested by the Rails test suite. The upgrade helped us to discover and fix a dozen of bugs among gems in the Rails ecosystem: rack, bundler, activerecord, actionpack, activesupport.
Another challenge was to fix it and at the same time keep the codebase backward compatible with Rails 4.2. We had to put conditional statements all over the place to control behavior on both Rails versions:
module MetadataAccessors
if Shopify.rails_next?
FALSE_VALUES = ActiveModel::Type::Boolean::FALSE_VALUES
else
FALSE_VALUES = ActiveRecord::ConnectionAdapters::Column::FALSE_VALUES
end
end
Finally, when all the tests have been fixed, we made both CI statuses (Rails 4.2 and Rails 5.0) required to pass when you wanted to merge a PR. It made developers at Shopify to write code that would be compatible with both Rails version until we fully roll out the new version. In was pain-free in 99% percent of cases, and in the rest of them, our team was there to help.
Rollout
Thanks to Docker containers and our shipping pipeline, we could safely roll out Shopify on Rails 5 to a small percentage of the servers and see how it works in production. After the deploy, we would keep this percentage running for some time to collect performance data and discover any compatibilities are test suite missed. Afterward, we'd revert back to Rails 4, fixed the uncovered issues and tried again. We iterated on this several times until we were comfortable rolling it out to 100%.
One of the problematic issues we uncovered this way, was YAML and Marshal-serialized objects in the cache. It became a big deal for internal Rails classes that have changed between versions. The class dumped with Rails 4.2 couldn't be loaded with Rails 5.0 and vice versa. We had to invalidate the caches (which degraded the performance) and roll out Rails 5 for 100% of customers so we wouldn't have two separate versions running at the same time and creating cache conflicts.
Another anecdote was related to deprecations. As soon as we began running Rails 5 in production, from the performance reports we’ve noticed that ActiveSupport::Deprecation#warn was allocating so many objects that it was responsible for 2% of the runtime, which at Shopify scale is a lot. The reason was that we’ve started running the code that generated a huge amount of warnings from various code paths that haven’t fixed new deprecations from Rails 5 yet. Every warning allocated the string with the message and logged it, which caused the performance leak. The solution was to disable warning reporting in production, which sounds like the right thing.
Finally, January 11th was the happiest day of our team:
When the upgrade was shipped, we were left with a codebase that contained a lot of dead code branches to support both Rails versions. We had to clean up. Thanks to custom Rubocop rule, automated that with a single `rubocop --autocorrect`.
Conclusion
We learned many lessons during this upgrade.
Get rid of deprecated features as soon as possible. The longer you wait, the larger your codebase grows and the harder it would be to clean up.
Keep your gems upgraded. Keeping major gem versions in your Gemfile up to date will make it less painful to upgrade Rails. At Shopify, we’ve started running a service that watches our repos and suggests when it’s time to upgrade a gem.
Dual Rails boot and CI is the only option to upgrade larger applications. Dual boot and CI were the key tools that helped our team to collaborate, pick up a test to fix and watch the progress. It’d not be possible to upgrade Rails outside of the master branch because it’d get outdated too quickly.
Avoid storing serialized data in database or cache. We use Marshal to serialize some Ruby objects to store them in the cache. The internals of these objects may change between Rails versions which made Rails 4.2 cache break when it tried to read cache produced by Rails 5.
The next big step for the Rails team at Shopify is to start running Rails from the upstream. For us, it could solve the problem of long-running Rails upgrades that require a lot of effort, and at the same time, we could better contribute back to the community by discovering bugs and edge cases in the upstream Rails and gems. | 2023-10-16T01:27:17.568517 | https://example.com/article/2608 |
Abdullah al-Mansoori
Abdullah Sayid al-Mansoori is a Bahraini naval officer. He held several senior command positions, including Commander Royal Bahrain Naval Force, Commander Combined Task Force 152, and Commander Flotilla. Al-Mansoori also has a PhD in international relations and was awarded the Legion of Merit. He is currently the head of the national defence college of Bahrain.
References
Category:Living people
Category:Bahraini military personnel
Category:Year of birth missing (living people) | 2024-07-22T01:27:17.568517 | https://example.com/article/6811 |
Q:
SQL for joining 2 tables but a bit complicated for my understanding
Got a situation thats a bit beyond my understanding.
Table A has the Product, Country and Factory
Table B has the Product, Factory and city.
The scenario is such that sales forecast data flows from the country level via the factory and then to city level. We have factories only in Rotterdam and Amsterdam. The issue is such that the factories in Table A need to be the same as the factory in table B.
I have to clean data for situations C&D where the factories in Table A are wrong and need cleaning. I therefore first need to identify these wrong records:
Here is what I got so far by joining Table A and B
select A.Prod,A.country,A.factory,B.Prod,B.factory,B.City from Table1 A, Table2 B where and A.Prod=B.Prod and A.Factory <>B.Factory
Of course I can find a specific known wrong record by using below SQL, but I need to find for all wrong records without specifying any product or
select A.Prod,A.country,A.factory,B.Prod,B.factory,B.City from Table1 A, Table2 B where A.Prod=B.Prod and A.Factory <>B.Factory
and A.Country ='Norway' and A.Factory ='Rotterdam' and B.City ='Oslo'
Situation 1
Table A
Product Country Factory
ProdA Switzerland Rotterdam
Table B
Product Factory City
ProdA Rotterdam Geneva
Situation 2
Table A
Product Country Factory
Prod Germany Rotterdam
Table B
Product Factory City
ProdB Rotterdam Dresden
Situation 3
Table A
Product Country Factory
ProdC Norway Rotterdam
Table B
Product Factory City
ProdC Amsterdam Oslo
Situation 4
Table A
Product Country Factory
ProdD Finland Rotterdam
Table B
Product Factory City
ProdD Amsterdam Helsinki
A:
From what I understand Your projection for the country in Table A, has to be for a city in table B, which exists in the country in table A.
So, in situation 1, we have
Table A country = Switzerland, Table B city = Geneva.
Since, Geneva is in Switzerland, this is fine
In situation 2, we have
Table A country = Germany, Table B city = Dresden
Since Dresden is in Germany this is fine.
This gives us a clue on how we can attack the problem.
Step 1. Setup a table for your expected country/city
CREATE TABLE COUNTRY_CITY (COUNTRY VARCHAR(60), CITY VARCHAR(60));
STEP 2. Insert the values for expected country/city into table
INSERT INTO COUNTRY_CITY(COUNTRY,CITY) VALUES('GERMANY','DRESDEN');
INSERT INTO COUNTRY_CITY(COUNTRY,CITY) VALUES('SWITZERLAND','GENEVA');
INSERT INTO COUNTRY_CITY(COUNTRY,CITY) VALUES('NORWAY','OSLO');
INSERT INTO COUNTRY_CITY(COUNTRY,CITY) VALUES('FINLAND','HELSINKI');
STEP 3.
select A.Prod,A.country, A.factory, B.Prod, B.factory, B.City,
COUNTRY_CITY.CITY
from
Table1 A
INNER JOIN Table2 B ON A.Prod=B.Prod
INNER JOIN COUNTRY_CITY ON A.COUNTRY = COUNTRY_CITY.COUNTRY
where COUNTRY_CITY.CITY = B.city and A.Factory <> B.Factory
So in step 3, we give the database the knowledge of which city belongs to which country, so that we can do a join from Table A to table B. Once you get that, then the condition on the not matching factories should be the records that you are looking for
| 2024-06-24T01:27:17.568517 | https://example.com/article/2823 |
Environmental factors and their impact on the intestinal microbiota: a role for human disease?
The intestinal microbiota and its potential role in human health and disease have come into the focus of interest in recent years. An important prerequisite for the achieved advances with regard to a better characterization of its complex composition and influencing factors is the increasing availability and affordability of culture-independent methods, such as high-throughput sequencing technologies. We discuss some general aspects of the intestinal microbiota. Recent insights into its potential pathogenetic role in the metabolic syndrome and inflammatory bowel disease will also be discussed that imply an impact of smoking status and smoking cessation on intestinal microbial composition. | 2023-09-25T01:27:17.568517 | https://example.com/article/3069 |
NOTE: This disposition is nonprecedential.
United States Court of Appeals
for the Federal Circuit
______________________
ENZO BIOCHEM INC, ENZO LIFE SCIENCES, INC,
YALE UNIVERSITY,
Plaintiffs-Appellants
v.
APPLERA CORP., TROPIX INC,
Defendants-Appellees
______________________
2016-1881
______________________
Appeal from the United States District Court for the
District of Connecticut in No. 3:04-cv-00929-JBA, Judge
Janet Bond Arterton.
______________________
Decided: August 2, 2017
______________________
L. GENE SPEARS, Baker Botts, LLP, Houston, TX, ar-
gued for plaintiffs-appellants. Also represented by
MICHAEL HAWES.
ROBERT N. HOCHMAN, Sidley Austin LLP, Chicago, IL,
argued for defendants-appellees. Also represented by
CARTER GLASGOW PHILLIPS, JENNIFER J. CLARK, Washing-
ton, DC; NICHOLAS P. GROOMBRIDGE, JENNIFER H. WU,
2 ENZO BIOCHEM INC. v. APPLERA CORP.
ERIC ALAN STONE, Paul, Weiss, Rifkind, Wharton &
Garrison LLP, New York, NY.
______________________
Before PROST, Chief Judge, O’MALLEY, and WALLACH,
Circuit Judges.
O’MALLEY, Circuit Judge.
Enzo Biochem, Inc., Enzo Life Sciences, Inc., and Yale
University (collectively, “Enzo”) appeal from the District
of Connecticut’s entry of summary judgment in favor of
Applera Corp. and Tropix, Inc. (collectively, “Applera”).
See Enzo Biochem, Inc. v. Applera Corp. (District Court
Decision), No. 3:04cv929 (JBA), 2016 U.S. Dist. LEXIS
20904 (D. Conn. Feb. 22, 2016). Because the district court
accurately interpreted this court’s decision regarding the
proper construction of the claims in U.S. Patent No.
5,449,767 (“the ’767 patent”) and correctly analyzed
Enzo’s doctrine of equivalents argument, we affirm.
I. BACKGROUND
With this appeal, this court now has considered this
infringement action on three separate occasions over the
course of thirteen years of litigation between these par-
ties. We assume the parties are familiar with the back-
ground facts, and we therefore recite only those facts
relevant to our decision in this appeal.
A. DNA and RNA Sequencing and the ’767 Patent
As explained in the previous appeals, DNA and RNA
are composed of a series of units called “nucleotides.”
Enzo Biochem, Inc. v. Applera Corp. (Enzo II), 780 F.3d
1149, 1150 (Fed. Cir. 2015) (quoting Enzo Biochem, Inc. v.
Applera Corp. (Enzo I), 599 F.3d 1325, 1328 (Fed. Cir.
2010)). Each nucleotide is composed of a nitrogenous
base, a pentose sugar, and a phosphate group. Id. at
1150–51 (quoting Enzo I, 599 F.3d at 1328). Two strands
of DNA or RNA having complementary nitrogenous bases
ENZO BIOCHEM INC. v. APPLERA CORP. 3
will “hybridize” to form a double-stranded complex. Id. at
1151 (quoting Enzo I, 599 F.3d at 1328).
The technology at issue in this case deals with the use
of nucleotide probes to detect the presence of a particular
DNA or RNA sequence in a sample or to identify an
otherwise unknown DNA sequence. In our previous
opinions, we explained how hybridization can be used to
detect the presence of a nucleic acid:
Because hybridization occurs in a predictable
manner between complementary strands, it is
possible to detect the presence of a nucleic acid of
interest in a sample. For example, a chemical en-
tity, called a “label,” can be attached to or incorpo-
rated into a nucleic acid strand of a known
sequence, called a “probe,” which will hybridize
with a complementary sequence of interest, called
a “target.” Once the probe is hybridized with the
target, a detectable signal is generated either
from the label itself (referred to as “direct detec-
tion”) or from a secondary chemical agent that is
bound to the label (referred to as “indirect detec-
tion”). If a signal is detected from the sample af-
ter all unhybridized probes have been removed,
detection of the signal implies the presence of a
target in that sample.
Id. (quoting Enzo I, 599 F.3d at 1328).
The ’767 patent explains that “[m]any procedures em-
ployed in biomedical research and recombinant DNA
technology rely heavily on the use of” radioactive labels,
such as isotopes of hydrogen, phosphorus, carbon, or
iodine. ’767 patent, col. 1 ll. 23–27. When used as labels,
these radioactive compounds provide “useful indicator
probes that permit the user to detect, monitor, localize, or
isolate nucleic acids and other molecules of scientific or
clinical interest, even when present in only extremely
small amounts.” Id. at col. 1 ll. 27–32. But the ’767
4 ENZO BIOCHEM INC. v. APPLERA CORP.
patent notes that the use of these radioactive materials
has “serious limitations and drawbacks.” Id. at col. 1 ll.
35–37. For example, elaborate safety precautions are
necessary for the preparation, utilization, and disposal of
the isotopes to avoid potentially hazardous levels of
exposure to the radioactive material. Id. at col. 1 ll. 27–
41. The radioactive material also is expensive to use and
purchase. Id. at col. 1 ll. 41–46. And it is often unstable,
with a short shelf-life. Id. at col. 1 ll. 46–52.
As an alternative to the use of radioactive labels, the
’767 patent explains that “a series of novel nucleotide
derivatives that contain biotin, iminobiotin, lipoic acid,
and other determinants attached covalently to the pyrim-
idine or purine ring have been synthesized.” Id. at col. 2
ll. 63–68. These nucleotide derivatives interact “specifi-
cally and uniquely with proteins such as avidin or anti-
bodies.” Id. at col. 3 ll. 2–3. “If avidin is coupled to
potentially demonstrable indicator molecules, including
fluorescent dyes, . . . electron-dense reagents, . . . or
enzymes capable of depositing insoluble reaction prod-
ucts, . . . the presence, location, or quantity of a biotin
probe can be established.” Id. at col. 1 ll. 61–67.
The ’767 patent asserts that the use of this modified
detection approach provides “detection capacities equal to
or greater than procedures which utilize radioisotopes and
[it] often can be performed more rapidly and with greater
resolving power.” Id. at col. 3 ll. 9–13. The ’767 patent
further describes these new nucleotide derivatives as
providing an approach to detection that is “relatively
inexpensive[],” does not require “elaborate safety proce-
dures,” uses “chemically stable” derivatives, and allows
for “the development of safer, more economical, more
rapid, and more reproducible research and diagnostic
procedures.” Id. at col. 3 ll. 14–28.
ENZO BIOCHEM INC. v. APPLERA CORP. 5
Claim 1 of the ’767 patent covers an oligo- or polynu-
cleotide containing a nucleotide having the following
structure:
See id. at col. 30 l. 48–col. 31 l. 21. The disputed language
of claim 1 involves the following limitation: “wherein A
comprises at least three carbon atoms and represents at
least one component of a signaling moiety capable of
producing a detectable signal . . . .” Id. at col. 30 ll. 66–68.
All other asserted claims of the ’767 patent depend,
directly or indirectly, from claim 1. Claim 8 depends from
claim 1 and claims, “[a]n oligo- or polynucleotide of claim
1 wherein the linkage group includes the moiety –CH2–
NH–.” Id. at col. 31 ll. 36–37. Claim 67 depends from
claim 1 and claims, “[a]n oligo- or polynucleotide of claim
1 or 48 wherein A comprises an indicator molecule.” Id.
at col. 36 ll. 42–43. Claim 68 depends from claim 67 and
claims, “[a]n oligo- or polynucleotide of claim 67 wherein
said indicator molecule is fluorescent, electron dense, or is
an enzyme capable of depositing insoluble reaction prod-
ucts.” Id. at col. 36 ll. 44–47. Claim 70 depends from
claim 68 and claims, “[a]n oligo- or polynucleotide of claim
68 wherein the fluorescent indicator molecule is selected
from the group consisting of fluorescein and rhodamine.”
Id. at col. 36 ll. 51–53.
B. Procedural History
This litigation began in 2004, when Enzo filed suit
against Applera alleging infringement of six patents,
including the ’767 patent, that generally cover various
techniques and processes for detecting the presence of a
particular strand of DNA or RNA in a sample. In 2006,
the district court construed the claims of all six patents.
6 ENZO BIOCHEM INC. v. APPLERA CORP.
After multiple years of litigation and an appeal to this
court regarding invalidity issues decided on summary
judgment, see Enzo I, 599 F.3d at 1332–43, Enzo and
Applera went to trial in October 2012. Enzo limited its
infringement contentions during the jury trial to claims 1,
8, 67, 68, and 70 of the ’767 patent. The jury found Ap-
plera infringed the claims at issue and awarded $48.6
million in damages.
After the district court entered final judgment, Ap-
plera appealed. Applera argued that the district court
erred in its claim construction because the claims of the
’767 patent only cover indirect detection. In the alterna-
tive, Applera argued that, if the claims cover direct detec-
tion, they are invalid for lack of written description and
lack of enablement. We agreed with Applera and re-
versed the district court’s claim construction because we
concluded that “the inventors were claiming only indirect
detection.” Enzo II, 780 F.3d at 1156. Given that conclu-
sion, we held that “[t]he district court erred in construing
the disputed claims of the patent-in-suit to cover both
direct and indirect detection.” Id. at 1157. We treated
claim 1 as representative, id. at 1152, and specifically
stated that “claim 1 is limited to indirect detection,” id. at
1157. We then remanded the case to the district court to
determine whether the accused product infringes under
the proper claim construction. Id.
On remand, Enzo moved for entry of judgment on the
jury verdict, and Applera moved for summary judgment of
noninfringement. District Court Decision, 2016 U.S. Dist.
LEXIS 20904, at *3. The district court agreed with Ap-
plera that our decision in Enzo II covered all claims of the
’767 patent, not just claim 1 as argued by Enzo, and
rejected Enzo’s doctrine of equivalents argument relating
to claims 1 and 8. Id. at *13–14, 20–22. The district court
therefore denied Enzo’s motion for judgment on the jury
verdict and granted Applera’s motion for summary judg-
ment. Id. at *22–23. Enzo appealed. We possess subject
ENZO BIOCHEM INC. v. APPLERA CORP. 7
matter jurisdiction pursuant to 28 U.S.C. § 1295(a)
(2012).
II. DISCUSSION
We review a district court’s grant of summary judg-
ment under the law of the regional circuit. Teva Pharm.
Indus. Ltd. v. AstraZeneca Pharm. LP, 661 F.3d 1378,
1381 (Fed. Cir. 2011). The Second Circuit reviews the
grant of summary judgment de novo. Major League
Baseball Props., Inc. v. Salvino, Inc., 542 F.3d 290, 309
(2d Cir. 2008). Summary judgment is proper when,
drawing all justifiable inferences in the non-movant’s
favor, “there is no genuine dispute as to any material fact
and the movant is entitled to judgment as a matter of
law.” Fed. R. Civ. P. 56(a); see also Anderson v. Liberty
Lobby, Inc., 477 U.S. 242 (1986).
In addressing the parties’ arguments, we first address
the scope of Enzo II and its effect on claims 67, 68, and 70.
We then consider Enzo’s doctrine of equivalents argument
regarding claims 1 and 8. 1
A. The Scope of Enzo II
Enzo argues that the district court incorrectly inter-
preted our decision in Enzo II. Enzo asserts that Enzo II
only dealt with claim 1 and left intact the previously-
construed scope of claims 67, 68, and 70, covering both
direct and indirect detection. Based on its view of our
decision in Enzo II, Enzo contends that we should reverse
the current judgment on claims 67, 68, and 70, and rein-
state the jury’s finding of infringement and damages
award.
1 Enzo does not contest that claims 1 and 8 are not
literally infringed under our claim construction in Enzo
II. See District Court Decision, 2016 U.S. Dist. LEXIS
20904, at *15.
8 ENZO BIOCHEM INC. v. APPLERA CORP.
We conclude that, after carefully parsing our decision,
the district court correctly interpreted Enzo II. As the
district court explained, Enzo II consistently refers to the
“claims” at issue in that appeal, which extended beyond
claim 1 to include claims 8, 67, 68, and 70. See District
Court Decision, 2016 U.S. Dist. LEXIS 20904, at *14. For
example, our opinion in Enzo II, after acknowledging that
Enzo had asserted claims 1, 8, 67, 68, and 70, states that
the district court “erred in its claim construction by find-
ing that the claims at issue covered direct detection.”
Enzo II, 780 F.3d at 1150 (emphasis added). We reiterat-
ed this statement in the conclusion, where we stated,
“[t]he district court erred in construing the disputed
claims of the patent-in-suit to cover both direct and
indirect detection.” Id. at 1157 (emphasis added). The
opinion also looks to the specification to consider whether
it includes any teaching of direct detection applicable to
the claims and concludes that the specification does not
“support[] the inclusion of direct detection.” Id. at 1156.
As noted by the district court, it would have been illogical
for us to recognize the existence of five claims in the
appeal and then repeatedly refer to the “claims at issue”
or the “disputed claims” when referring only to claim 1
and not to claims 67, 68, and 70. See District Court
Decision, 2016 U.S. Dist. LEXIS 20904, at *14.
The district court also correctly noted that our deci-
sion in Enzo II acknowledged Applera’s alternative inva-
lidity arguments regarding lack of written description and
lack of enablement, but did not address the merits of
those arguments. Id. We did not need to address Ap-
plera’s alternative arguments because our analysis found
that the scope of the claims at issue, including claims 67,
68, and 70, did not extend beyond indirect detection.
Because Enzo does not contend that Applera infringes
claims 67, 68, and 70 under the proper reading of the
claims we provided in Enzo II, we affirm the district
court’s judgment as to claims 67, 68, and 70.
ENZO BIOCHEM INC. v. APPLERA CORP. 9
B. Doctrine of Equivalents for Claims 1 and 8
Enzo concedes that Applera does not literally infringe
claims 1 and 8 under our claim construction in Enzo II.
See id. at *15. But Enzo argues that Applera infringes
these claims under the doctrine of equivalents. Enzo
contends that the district court erred in granting sum-
mary judgment of noninfringement because there is a
genuine dispute of material fact regarding whether Ap-
plera’s accused products infringe under the doctrine of
equivalents.
“[A] product or process that does not literally infringe
upon the express terms of a patent claim may nonetheless
be found to infringe if there is ‘equivalence’ between the
elements of the accused product or process and the
claimed elements of the patented invention.” Warner-
Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17, 21
(1997). “What constitutes equivalency must be deter-
mined against the context of the patent, the prior art, and
the particular circumstances of the case.” Id. at 24 (quot-
ing Graver Tank & Mfg. Co. v. Linde Air Prods. Co., 339
U.S. 605, 609 (1950)).
A party can show infringement under the doctrine of
equivalents if every limitation of the asserted claim,
including a limitation’s “equivalent,” is found in the
accused product, “where an ‘equivalent’ differs from the
claimed limitation only insubstantially.” Ethicon Endo-
Surgery, Inc. v. U.S. Surgical Corp., 149 F.3d 1309, 1315
(Fed. Cir. 1998). “Whether a component in the accused
subject matter performs substantially the same function
as the claimed limitation in substantially the same way to
achieve substantially the same result may be relevant to
this determination.” Id.
But we also have explained that “the concept of
equivalency cannot embrace a structure that is specifical-
ly excluded from the scope of the claims.” Dolly, Inc. v.
Spalding & Evenflo Cos., 16 F.3d 394, 400 (Fed. Cir.
10 ENZO BIOCHEM INC. v. APPLERA CORP.
1994). The doctrine of equivalents also cannot “render[] a
claim limitation inconsequential or ineffective.” Akzo
Nobel Coatings, Inc. v. Dow Chem. Co., 811 F.3d 1334,
1342 (Fed. Cir. 2016). And, as the Supreme Court has
stated, “if a theory of equivalence would entirely vitiate a
particular claim element, partial or complete judgment
should be rendered by the court, as there would be no
further material issue for the jury to resolve.” Warner-
Jenkinson, 520 U.S. at 39 n.8.
Enzo claims that the district court “misconstrued” its
expert declaration and improperly drew inferences in
favor of Applera, rather than Enzo, when ruling on the
motion for summary judgment. Appellant’s Br. 25.
According to Enzo, the district court could not have grant-
ed summary judgment on the doctrine of equivalents in
the face of its expert’s “reasoned and reasonable func-
tion/way/result comparison of the accused products with
the invention of claim 1.” Id. at 26. Enzo also argues that
its “asserted equivalent” was not disclaimed through the
’767 patent’s criticism of radioactive labeling. Id. at 29.
Enzo acknowledges that it critiqued radioactive labels for
“their hazards, inconvenience, cost and shelf life,” but it
argues that the district court did not explain the rele-
vance of these issues to the doctrine of equivalents theory
put forward by Enzo. Id. Enzo asserts that it is not
“asserting a scope of equivalents broad enough to encom-
pass all directly detectable labels including radioactive
ones”; instead, it focused on a particular subset of direct
detection. Id.
We conclude that the district court correctly granted
summary judgment in favor of Applera. The district court
explained that the patent “describes its method of indirect
detection as a superior means of detection as compared to
direct detection, with ‘detection capacities equal to or
greater than products which utilize’ direct detection.”
District Court Decision, 2016 U.S. Dist. LEXIS 20904, at
*21 (quoting Enzo II, 780 F.3d at 1155). As the district
ENZO BIOCHEM INC. v. APPLERA CORP. 11
court aptly concluded after its analysis, “[Enzo] cannot
now claim that indirect and direct detection are insub-
stantially different, and no jury could so find.” Id. at *22.
Indeed, Enzo’s attempt to reframe its infringement
case under the doctrine of equivalents runs headfirst into
our decision in Enzo II. In that decision, we reviewed the
claims and the specification to find that the claims cov-
ered only indirect detection. Enzo II, 780 F.3d at 1154–
55. We explained that “[t]he specification provides addi-
tional support that claim 1 covers only indirect detection.”
Id. at 1155. We also stated that the specification does not
“support[] the inclusion of direct detection, even when
extrinsic expert testimony is considered.” Id. at 1156.
And the specification’s “only discussion of direct detec-
tion . . . was exclusively in the context of discussing how
indirect detection is a superior method.” Id. at 1155.
Based on these facts, we were “persuaded that the inven-
tors were claiming only indirect detection.” Id. at 1156.
Our decision in Enzo II, therefore, focused entirely on
the conclusion that the asserted claims do not include
direct detection in part because they excluded direct
detection. Enzo’s attempt to incorporate direct detection
methods now through the doctrine of equivalents fails. In
Dolly, we concluded that “the concept of equivalency
cannot embrace a structure that is specifically excluded
from the scope of the claims.” 16 F.3d at 400. Applying
this concept to that case, we noted that “[a] stable rigid
frame assembled from the seat and back panels is not the
equivalent of a separate stable rigid frame which the
claim language specifically limits to structures exclusive
of seat and back panels.” Id. Indeed, we found that the
district court erred by “failing to give effect to this claim
limitation in applying the doctrine of equivalents.” Id.
The same principle applies in this case; the concept of
equivalency cannot embrace direct detection because it is
“specifically excluded from the scope of the claims,” id., as
we found in Enzo II. Including direct detection as an
12 ENZO BIOCHEM INC. v. APPLERA CORP.
equivalent of indirect detection would render meaningless
the claim language on which we based our decision in
Enzo II; direct detection cannot be an equivalent of indi-
rect detection in relation to these patent claims. See Akzo
Nobel Coatings, 811 F.3d at 1342 (“Under the doctrine of
equivalents, an infringement theory thus fails if it renders
a claim limitation inconsequential or ineffective.”); Am.
Calcar, Inc. v. Am. Honda Motor Co., 651 F.3d 1318,
1338–39 (Fed. Cir. 2011) (concluding that a theory of
equivalence was “legally insufficient” because it “would
vitiate [the] claim limitation by rendering it meaningless”
to find that “a signal from one source” was equivalent to
“signals from a plurality of sources”).
As the district court correctly held, no reasonable jury
could find, even under the doctrine of equivalents, that
Applera’s accused products using direct detection infringe
Enzo’s patent claiming indirect detection.
III. CONCLUSION
For the foregoing reasons, we affirm the district
court’s judgment in this case.
AFFIRMED
| 2024-01-22T01:27:17.568517 | https://example.com/article/6367 |
Q:
How to write a HtmlHelper extension method that renders a partial view?
I need to create an HtmlHelperextension to render an Autocomplete. Something like this:
@Html.AutoCompleteFor(x => x.CustomerId);
The problem is that the Html.RenderPartial(...) returns void, so my AutoCompleteFor method must also be void. But Razor won't let it compile because @Html.X will only compile if X returns an Object.
I know I can bypass this problem by calling this, instead:
@{ Html.AutoCompleteFor(x => x.CustomerId); }
But that will make my code to look inconsistent with the @Html.EditorFor
I need to return a PartialView from inside my an HtmlHelper
Some considerations:
I know you might think that this would be, somehow, breaking the MVC pattern, but MVC itself does that. The Html.EditorFor will try to find a view and return it.
I'm only trying to do that because I need foreign-key property to use jQuery-AutoComplete by default. I wasn't able to tell MVC to use my template for foreign-key properties.
A:
You should call Html.Partial, which returns a HelperResult object rather than writing directly to the page.
You can then return the HelperResult to the caller.
Technically, you could also just return null, but that would be a really dumb idea.
| 2024-07-12T01:27:17.568517 | https://example.com/article/5493 |
The present invention relates to a supervisory apparatus for a computer and more particular to a watchdog timer which monitors execution of a program by the computer to return the computer to its initial state when the program malfunctions.
One conventional watchdog timer disclosed in a Japanese unexamined patent publication TOKKAISHO 55-57956 senses whether or not a series of consecutive pulses are produced at the output terminal of a microcomputer in accordance with a program in order to determine whether or not the program is running normally. When the program runs abnormally or erroneously due to noise, the watchdog timer resets the microcomputer to return it to its initial state, thereby causing reexecution of the program from the beginning. The microcomputer employs a circuit structure in which "1" and "0" are written alternately into a predetermined 1-bit cell of a register of its output circuit, thereby changing the device output terminal alternately to "1" and "0."However, there is a some possibility that the 1-bit register output will not be sensed accurately due to noise. The microcomputer reads commands stored in addresses in memory (generally ROM) corresponding to the contents of a program counter, decodes the commands and processes data also stored in the memory. When the computer is working regularly under the control of a program, it correctly performs tasks sequentially. However, when the program counter malfunctions due to noise or the like, the microcomputer may read, not commands, but data from the memory, decode the data as if the data were commands and perform the corresponding, erroneous operations. When the results of the commands executed by the data are output by the 1-bit register cell, the watchdog timer will not be able to recognize abnormal execution of the program. Since commands and data stored in the memory are both formulated by combinations of 1's and 0's having the same number of bits, but with values that vary widely, if the program counter fails as above, the microcomputer is very likely to malfunction as described above. Other publications which handle this subject matter in a manner similar to that of TOKKAISHO 55-57956 are Tokkaisho 57-48143, 50004 and 55432. | 2023-09-10T01:27:17.568517 | https://example.com/article/2586 |
Q:
How to make 'file_get_contents' accessing a remote URL use the original hyperlinks?
I'm trying to insert a .php file into the body of a webpage using 'file_get_contents'. When the remote content is displayed, non of the links work because it requests them locally. As a bit of a newbie, is there a way to set the 'file_get_contents' output to display the original hyperlinks? Would a context variable be the solution?
This is my php in the webpage:
<?php echo file_get_contents("http://acs.klikapps.co.uk/stock.php"); ?>
Thanks!
A:
This should do it:
<?php echo str_replace("stock.php?", "http://acs.klikapps.co.uk/stock.php?", file_get_contents("http://acs.klikapps.co.uk/stock.php")); ?>
| 2024-02-28T01:27:17.568517 | https://example.com/article/4622 |
java.io.IOException: 4 file(s) could not be downloaded
at com.skcraft.launcher.install.HttpDownloader.execute(HttpDownloader.java:139)
at com.skcraft.launcher.install.Installer.download(Installer.java:46)
at com.skcraft.launcher.update.Updater.update(Updater.java:179)
at com.skcraft.launcher.update.Updater.call(Updater.java:96)
at com.skcraft.launcher.update.Updater.call(Updater.java:39)
at java.util.concurrent.FutureTask.run(Unknown Source)
at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
at java.lang.Thread.run(Unknown Source) | 2024-07-09T01:27:17.568517 | https://example.com/article/4872 |
2019: APC stalwart wants consensus ‘primaries’ in Abia
Paul Ikonne, All Progressives Congress chieftain in Abia, has said that a consensus candidate will guarantee the party’s victory in the state in the 2019 general elections. He stated this on Tuesday in Abuja while speaking with newsmen at APC National Secretariat after picking the party’s Expression of Interest and Nomination forms to contest Abia governorship in 2019. Ikonne said that as long as the party came together with a consensus candidate which member would eventually go for, “we will come out strong”. The aspirant is a founding member of the APC in Abia and the governorship candidate of the defunct Action Congress of Nigeria in 2011 election. He assured that if given the opportunity as the party’s candidate, he would make Abia conducive for business if he won the election, noting that people of the state were business-oriented. Ikonne added that he would also take the state to a high level and make it the envy of other states of the federation. He, however, said that those plotting to destabilise the APC in Abia, would themselves be destabilised. On the adoption of indirect primaries to pick the party’s candidates for elections as was being canvassed by some politicians, he said that it depended on the peculiarities of states. The News Agency of Nigeria reports that the APC national leadership had adopted the direct primaries to pick its candidates for the 2019 general elections. He said: “The party national leadership is very wise, but there are peculiarities. In Abia, for example, indirect primaries and consensus will definitely give us what we want. “Stakeholders are yet to meet; we are still going to meet, and by the time we meet, we will come out with a blueprint on the way forward.” He assured that if given the APC ticket and elected as next governor of Abia, he would bring new ideas that would transform the state, adding that he would bring value to its governance. Ikonne said: “I have been in the party and I have worked for it and am still working for it.” “During the 2015 general elections, I organised the presidential rally in Abia which was successful and adjudged the best.” | 2024-04-04T01:27:17.568517 | https://example.com/article/9170 |
Accessories
Final Inspection NanoFibre Jamb Cloth
or make 4 interest-free payments of
$2.50 AUD
fortnightly with
More info
Quantity
All items are thoroughly checked prior to shipping.
Included in sale:
• 1 x Final Inspection NanoFibre Jamb Cloth
DESCRIPTION
The Final Inspection NanoFibre Jamb Cloth - a revolutionary new way to easily and quickly clean jambs and crevices that may contaminate the cloth with powdered graphite, grease and other usually dirty, oil-based lubricants, avoiding cross contamination onto other areas.
The NanoFibre Jamb Cloth is the best tool for jamb cleaning. It's tight looped hook weave and high gsm remove dirt and debris quickly reducing the mechanical action required on these usually painted sections of your vehicle that are difficult to polish.
With it's generous size, this cloth will gently but effectively and efficiently remove weekly build-up of contaminants without hassle. Use your Jamb Cloth with Boost to lubricate the paintwork as you wipe away residual water from a wash as well as the trapped dirt that isn't completely removed during a wash leaving a glowing silky smooth finish that will assist in a quicker and easier clean on the following wash.
Also recommended for use all components in engine bays.
Wash new NanoFibre before first use
Quality and Specification
Yarn Denier:0.01
Yarn Type:Multi Split
GSM:300
Density:~100,000 f/mm
Weave:Tight Hook
Size:400 x 400mm (~15.8 x 15.8in)
Edge:Hand Sewn NanoFibre
Colour (Cloth/Edge):Red/White
Packaging:Re-usable plastic box
Version Information:v2 l optimised 2010
NanoFibre Care
Care of all NanoFibre products involves removal of dirt and debris as soon as possible with gentle cleaners. Final Inspection recommend Peppermint anti-bacterial NanoFibre wash solution, using no more than 60deg water temperature. | 2023-12-22T01:27:17.568517 | https://example.com/article/2532 |
Portugal probably isn’t the first country that springs to mind when thinking about startup scenes. Hit hard by 2008 financial crash, Portugal – and in particular its capital, Lisbon – struggled to keep its head above water in the years soon after. Its economy contracted by 3.2 percent in 2012 and unemployment hit 18 percent during the crisis.
But the country of 10.3 million people has since made a remarkable turnaround.
Today, the IMF forecasts a 2.5 percent growth rate, and unemployment dropped to below 10 percent this year for the first time in nearly a decade. And while some 500,000 graduates left the country during the crisis, 60 percent have now returned reinvigorated and inspired by the country’s now growing economy.
For an economy which exited a €78 billion international bailout program three years ago, it has come a long way. And startups are latching onto this growth. Here are three reasons why having a startup in this booming ecosystem is good thing right now:
Funding and government initiatives are spurring on startups
“Portugal is rich in talent and diversity,” said João Vasconcelos, State Secretary for Industry and former director of local incubator Startup Lisboa, to Europe’s StartUs Magazine. “It has currently one of the most vibrant startup ecosystem in Europe, being the perfect place to create, test, fail and try again.”
And to entice entrepreneurs, the country is providing plenty of benefits. Most notably in a bold move at the 2016 Web Summit, Vasconcelos unveiled a €200 million fund to co-invest alongside VCs in startups and foreign companies that relocate to Portugal. Over the next three years, Portugal will also dish out €10 million-worth of vouchers for incubation and businesses. And for those that aren’t in the EU, the Portuguese government announced a ‘startup visa’ at the start of this year, essentially urging entrepreneurs to come and set up shop with the promise of a resident visa.
Portugal’s putting a huge focus on young entrepreneurs, too. In 2016, the country launched Startup Portugal – a public strategy to nurture new businesses. The scheme includes a startup voucher for people aged 18 to 35 with good business ideas. The voucher gives budding entrepreneurs monthly funding, mentoring and technical support in their first year. Even more, Startup Portugal offers a Momentum program – giving graduates the set of tools to help them develop their business ideas – monthly funding, free housing and incubation are part of a the one year support program.
By providing financial incentives – such as matching funds with angel investors and venture capital funds – the government is showing just how keen they are on putting their money where their mouth is.
There’s also a startup mega campus is in the works in the capital, thanks to its incubator Startup Lisboa. The Hub Criativo do Beato will be a 35,000 square metre startup powerhouse born from a former army complex in the east of the city. There, the 20-building incubator hopes to rival Paris’ Station F.
Benfica also partnered this year with KickUP Sports Innovation, led by Joao Goncalo, to launch the first European Sports accelerator that emerged within a major sports club.
Major events are being held here, and big players are coming to the capital
Irish entrepreneur and Web Summit co-founder Paddy Cosgrove once said, “Lisbon is like Berlin 5 years ago, but with southern European weather.” And well, he’s right. That’s part of the reason why in 2016, the Web Summit was moved from Dublin to Lisbon. It will run in the city annually through to 2018.
The fact that it has moved to the capital demonstrates just how important the city is in the tech and startup scene right now. Some 53,000 people came to event in 2016 – and this year, it was closer to 60,000.
The prestigious summit saw professor Stephen Hawking talk about AI; environmentalist Al Gore warn attendees about the climate crisis; and U2 frontman Bono urge private and public sectors to come together to help women and girls in the least-developed countries get connected to the internet. Netflix founder Reed Hastings, actress Eva Longoria, and Tinder’s co-founder, Sean Rad all made appearances, too.
Some major players in the global startup scene are also flocking to the Portuguese capital.
London-based Workspace innovator Second Home announced they would be investing heavily in a second, bigger base in Lisbon, due to open in 2019. They hope to cater to local and foreign companies hoping to make Portugal their home. Their London-base is used by VICE, Volkswagen and Mercedes Benz. And Factory, who provide space to fast growing startups in Berlin, are opening a massive venue in Lisbon next year as part of the Hub Criativo do Beato.
Lower cost and a high quality of living
With costs below its European neighbors, Portugal is an attractive choice for budding businessmen and women. In fact, the European Digital City Index lists the top features in Lisbon as the low-cost of living and the high quality of life.
Last year, Lisbon was rated as the fourth cheapest city break in Europe, and the cheapest in Western Europe. That’s not taking into account rent costs, either. With a 900-square foot apartment going for roughly €778, office space can be found at a fraction of the price of major startup cities like London or Berlin. And with great weather, countless cultural things to see and do and a superb nightlife and food, Portugal may just be the one.
Ana Filipa de Almeida, Ray Chan, Rafael Pires, Inês Santos Silva and Daniela Monteiro.
Living in a city where the Estoril coast is on your doorstep; where a stroll through the glorious Avenida da Liberdade will be the best way to unwind after a day at work; or a Friday night in Barrio Alto to celebrate, it’s no wonder startups are drawn here.
A renewed spirit of innovation has led to an explosion of startups, helped by the country’s impressive bilingual education system and local support network – such as Startup Lisboa, ANJE, Beta-i, UPTEC, IPN, Startup Braga and ScaleUp Porto, to name a few.
Richard Marvão, the co-founder of Beta-I, a non-profit organization which aims to improve Lisbon’s ecosystem, said about Portugal: “You can also relax by the beach and go surfing in the weekends. You have an amazing quality of life here and low costs of living – which is really helpful when you’re building your own company.”
And if that isn’t a good enough reason, I don’t know what is.
This article was Co-Written by Mathew Di Salvo
Read next: Instagram's standalone messaging app could be a winner | 2023-11-19T01:27:17.568517 | https://example.com/article/5054 |
In the past, hot gunning material, hot baking material, etc. have been used as hot repair material for repairing damaged portion of furnace wall, furnace bottom, etc. in various types of refinery furnaces, containers, etc. such as converter, AOD (argon oxygen degassing) furnace, electric furnace, LF ladle, etc. To produce this type of hot baking material, refractory material such as dolomite, magnesia, etc. is kneaded with coal tar binder, and mass of this material having some consistency is supplied and brought into contact with the damaged portion in the furnace through furnace inlet after molten steel has been delivered in case of converter and the baking material is molten, spread and developed by heat inside the furnace and the damaged portion is repaired.
The properties required for this type of baking material are: no change over time, good spreading property in hot working process, good adhesive property, high durability, and short baking and hardening time. The baking material produced by the use of coal tar binder has no problem in such factors as the change over time, spreading property, and durability, while it is disadvantageous in that longer hardening time is required.
In this respect, to overcome the problem of long baking time of the conventional paste type baking material using coal tar binder, a slurry type baking material has been proposed to reduce the baking time. This material has viscous and fluidizing property and uses liquid novolak type phenol resin, and satisfactory effect has been attained (JP-B-5-41594 and JP-B-6-31161). Because solvent is contained in the phenol resin solution, there are less carbon components when it is carbonized. For this reason, it has such problems that it has lower strength when hardened and it is subject to changes over time due to sedimentation and separation of coarse particles during storage because it is a baking material having viscous and fluidizing property.
Also, a powder type baking material has been proposed (JP-A-4-170370) to reduce the baking time and to improve durability. This is produced as follows: A mixed powder type basic refractory material is coated with pitch and/or creosote oil, and to this powder material, aromatic petroleum resin containing heavy oil and C.sub.9 fraction as main components is added as auxiliary combustion agent and wetting agent. By this material, it is possible to reduce the hardening time and it can also provide high strength by carbon bond when it is hardened. However, it has such problems that it is solidified during storage in summer season because of creosote oil or heavy oil, which are added as auxiliary combustion agent and wetting agent.
Further, another type of baking material has been proposed (Japanese Patent Publication No.2555850), which is produced by adding a material to form carbon bond in hot working process and also by adding lactam as auxiliary fluidizing agent. However, it has disadvantages in that lactam has high deliquescence and is changed to polyamide through ring-opening polymerization in the presence of water and alkali metal and it is also solidified during storage in summer season or under high temperature and high humidity conditions.
Still another baking material has been proposed (JP-A-8-169772), which is produced by adding diphenyl or diphenylamine as auxiliary fluidizing agent to a material to form carbon bond in hot working process. However, its adhesive strength is not high enough compared with the conventional products.
It is an object of the present invention to provide a hot repair mix, which is suitable for use to carbon bonded brick such as magnesia-carbon brick used in various types of refinery furnaces and which has sufficient adhesive property with base material and durability suitable as repair material. Further, it forms carbon bond in hot working process, shows neither sedimentation separation nor changes over time, has high spreading property in hot working process, is shorter in the baking time after the processing and has high durability. | 2024-05-28T01:27:17.568517 | https://example.com/article/1986 |
Synthesis and properties of differently charged chemiluminescent acridinium ester labels.
Chemiluminescent acridinium dimethylphenyl esters containing N-sulfopropyl groups in the acridinium ring are highly sensitive, hydrophilic labels that are used in automated immunoassays for clinical diagnostics. Light emission from these labels is triggered with alkaline peroxide in the presence of a cationic surfactant. At physiological pH, N-sulfopropyl acridinium esters exist as water adducts that are commonly referred to as pseudobases. Pseudobase formation, which results from addition of water to the zwitterionic N-sulfopropyl acridinium ring, neutralizes the positive charge on the acridinium nitrogen and imparts a net negative charge to the label due to the sulfonate moiety. As a consequence, N-sulfopropyl acridinium ester conjugates of small molecule haptens as well as large molecules such as proteins gain negative charges at neutral pH. In the current study, we describe the synthesis and properties of two new hydrophilic acridinium dimethylphenyl ester labels where the net charge in the labels was altered. In one label, the structure of the hydrophilic N-alkyl group attached to the acridinium ring was changed so that the pseudobase of the label contains no net charge. In the second acridinium ester, two additional negative charges in the form of sulfopropyl groups were added to the acridinium ring to make this label's pseudobase strongly anionic. Chemiluminescence measurements of these labels, as well as their conjugates of an antibody with a neutral pI, indicate that acridinium ester charge while having a modest effect on emission kinetics has little influence on light output. However, our results demonstrate that acridinium ester charge can affect protein pI, apparent chemiluminescence stability and non-specific binding of protein conjugates to microparticles. These results emphasize the need for careful consideration of acridinium ester charge in order to optimize reagent stability and performance in immunoassays. In the current study, we observed that for a neutral protein, an acridinium ester with a hydrophilic but charge-neutral N-alkyl group afforded faster light emission, lower non-specific binding and better chemiluminescence stability than an analogous label with an anionic N-alkyl group. | 2023-08-30T01:27:17.568517 | https://example.com/article/5916 |
525 N.E.2d 1275 (1988)
Renee H. OVERALL, Administratrix of the Estate of Willie Overall, Deceased, Appellant (Plaintiff below),
v.
STATE of Indiana, Appellee (Defendant below).
No. 64A03-8706-CV-154.
Court of Appeals of Indiana, Third District.
July 21, 1988.
Rehearing Denied September 22, 1988.
*1276 Delmar P. Kuchaes, Marshall P. Whalley, Chudom & Meyer, Schererville, for appellant.
Linley E. Pearson, Atty. Gen., Thomas R. Hamill, Deputy Atty. Gen., Indianapolis, for appellee.
HOFFMAN, Judge.
Renee H. Overall as administratrix of the estate of Willie Overall appeals the trial court's entry of a judgment on the evidence in favor of the State of Indiana. The estate brought a wrongful death action against the State after Willie was struck and killed by a motorist as he was attempting to walk home upon his release from a mental hospital.
The evidence relevant to this appeal discloses that Willie was an attentive father and husband and an excellent employee. In 1978 after the birth of his second child he began believing that she was a twin and that the other child had been sold. He began behaving irrationally. He approached people with children because he believed that one might be the missing twin.
A few months later Willie became violent and threatened to kill his wife on numerous occasions. Willie's work habits became so poor he was terminated. Willie's sister and brother-in-law noticed Willie's peculiar behavior including Willie's belief that unknown persons were watching him.
Willie's family attempted to procure psychiatric treatment for Willie but he would not voluntarily attend appointments. Emergency detention proceedings were instituted in the Lake County Superior Court. An order was issued on December 14, 1978 for Willie to be taken to the Beatty Memorial Hospital for any treatment necessary "for the preservation of the health and safety of the patient and the protection of persons and property." Willie was transported to Beatty later that day. The next day Renee received a telephone call from a person who identified himself as a doctor and told her that after observation it was determined that Willie could be released. After Renee expressed some concern for her safety if she transported Willie from the hospital, the doctor told her that Willie may be sent home on a bus. Also on December 15, 1978 Willie telephoned his brother-in-law, James Johnson, and requested a ride home. Willie told him that someone would talk to James. The person identified himself as a doctor but James thought it was one of the other patients because he could not understand the person and he did not believe that Willie was being released so soon. James was not told that if no one picked Willie up, Willie would have to walk home.
The staff psychiatrist released Willie with the following order: "discharge as soon as transportation can be arranged." Despite the order Willie was discharged without transportation on December 15, 1978. Apparently Willie was attempting to walk home to Gary when he was struck by an automobile and killed. Willie was clad in lightweight clothing in 28° F weather. He did not have any money. At the time he was struck he was approximately 18 miles from the hospital. Witnesses at the scene thought that Willie was drunk because he was staggering and walking in the traveled portion of the road.
An expert witness testified that hypothermia would cause loss of muscle control. An autopsy revealed that Willie had not ingested drugs or alcohol and that he was suffering from systemic hypothermia.
Renee brought the instant action for the wrongful death of Willie. At the trial on March 18, 1987 after the estate had presented its evidence, the State moved for a judgment on the evidence which was granted. On appeal the estate presents issues only on its first theory of recovery: that the State negligently discharged and released Willie. The issues presented are:
(1) whether the trial court erred in granting the State's motion for judgment on the evidence at the close of the estate's case; and
*1277 (2) whether the trial court erred in excluding opinion evidence offered by the estate through an expert witness.
The estate correctly notes that a judgment on the evidence pursuant to Ind.Rules of Procedure, Trial Rule 50, should not be granted lightly or for the sake of judicial economy, but should only be granted when there is insufficient evidence on an essential element of the case or where a defense to the action is proved by the evidence. St. Mary's Byzantine Church v. Mantich (1987), Ind. App., 505 N.E.2d 811, 814. The granting of such a motion is proper only when the evidence is without conflict and susceptible of only one inference in favor of the moving party. Prudential Ins. Co. v. Winans (1975), 263 Ind. 111, 119, 325 N.E.2d 204, 207.
To establish its negligence claim against the State, the estate was required to prove a duty, breach of the duty, proximate cause and damages. Iglesias v. Wells (1982), Ind. App., 441 N.E.2d 1017, 1019. The relevant inquiry here is whether the State owed any duty to Willie after his release.
IND. CODE § 16-14-9.1-7 (1976) (since amended) governs the hospital's emergency detention procedures. The statute requires the expense of transportation to the hospital to be "borne by the county within which the person was taken into custody." The statute does not however address the responsibility for transportation costs or arrangements upon release of a detainee. The State concludes that no duty was owed because none was affirmatively established by the statute. Moreover, the State argues that the terms of the statute required Willie's release because the attending physician found that Willie was not mentally ill.
The attending physician, Dr. Periolet, determined that Willie might have been in need of some treatment but that he was not a danger to himself or others which required his release pursuant to IND. CODE § 16-14-9.1-7(d) which states:
"If the report is that there is not probable cause to believe that the person is mentally ill and either dangerous or gravely disabled or, if at any time, the superintendent or the attending physician determines that the person is not mentally ill and either dangerous or gravely disabled, the person shall be discharged from the hospital or center, and a written report of such determination and discharge shall be made a part of the patient's record."
The statute states that the person "shall" be discharged which in the context must be taken as mandatory. Once the State determines that no probable cause exists and yet fails to release the person examined, the basis for a malicious prosecution or a false imprisonment action could be established. Cf. Treloar v. Harris (1917), 66 Ind. App. 59, 117 N.E. 975; Olsen v. Karwoski (1979), 68 Ill. App.3d 1031, 25 Ill.Dec. 173, 386 N.E.2d 444; Annot., 31 ALR3d 523.
It should also be noted that Willie insisted upon his immediate release. Because Dr. Periolet was acting according to the statute and because the statute does not provide for an extension of the detention to arrange transportation, the State would appear not to have a duty in the present case. However, a common-law duty may exist pursuant to Iglesias v. Wells, supra, 441 N.E.2d 1017.
In Iglesias an indigent defendant was released from jail in the early morning of February 15, 1979. The defendant claimed that he had inadequate clothing, spoke no English, had no nearby residence, had no transportation and was mentally confused upon his release. After wandering the streets of downtown Indianapolis, the defendant suffered frostbite which necessitated the partial amputation of his feet. The defendant's claim for damages against the sheriff was dismissed by the trial court after it determined that he had failed to state a claim upon which relief could be granted. Iglesias, supra, 441 N.E.2d at 1018. This Court reversed and found that "[a] sheriff has a duty not to release incapacitated prisoners under circumstances which will subject them to dangers against which they are helpless to defend themselves." (Emphasis in original.) Iglesias, supra, 441 N.E.2d at 1021.
In light of the duty created in Iglesias, the trial court prematurely granted the *1278 T.R. 50 motion in the present case. Whether Willie was incapacitated within the purview of Iglesias thereby giving rise to a duty was a question for the jury to determine.
The estate also questions the trial court's ruling that an expert witness who had not examined Willie could not give opinion testimony regarding Willie's diminished capacity at the time of his release. It is unclear whether the situation will arise on retrial; however, to the extent that the trial court disallowed testimony in the belief that Willie's mental capacity at the time of his release was not "necessarily the issue in this case," the trial court was in error. The duty established by Iglesias hinges upon the incapacity of the person released.
Accordingly, the judgment of the trial court must be reversed and the cause remanded for a new trial.
Reversed and remanded.
RATLIFF, C.J., and STATON, J., concur.
| 2023-10-30T01:27:17.568517 | https://example.com/article/1988 |
Promote Level 2 errors as errors, not warnings
This policy setting allows you to treat Level 2 errors as warnings instead of errors. Level 2 errors occur when the message signature appears to be valid, but there are other issues with the signature.
If you enable this policy setting, Level 2 errors will be treated as warnings.
If you disable or do not configure this policy setting, Level 2 errors will be treated as errors
When you specify a value for PromoteErrorsAsWarnings, note that potential Level 2 error conditions include the following: | 2023-12-16T01:27:17.568517 | https://example.com/article/4524 |
Introduction {#s1}
============
Congenital adrenal hyperplasia (CAH) is a group of genetically inherited enzymatic defects of biosynthesis of cortisol and accumulating intermediate precursors. The most common form of CAH is 21-hydroxylase deficiency (21-OHD) ([@r1],[@r2],[@r3],[@r4],[@r5]), which affects about 1 in 18,000 worldwide. 21-OHD is classified into three forms according to the severity of the disease. The most severe form is the salt-wasting (SW) form. In the SW and simple virilizing (SV) forms, affected female neonates present with virilized external genitalia. The nonclassic (NC) form can manifest with hyperandrogenism later in life ([@r3],[@r4],[@r5]). The SW form accounts for approximately 70--80% of all cases of 21-OHD ([@r1], [@r3], [@r5]). In children with the SW form, a life-threatening salt-wasting crisis occurs in the second or third week of life.
Ambiguous genitalia at birth or salt-wasting symptoms such as failure to thrive, and vomiting and skin pigmentation during the neonatal period can lead to the suspicion of 21-OHD. Elevated 17-hydroxyprogesterone (17-OHP) is the best marker for the diagnosis of 21-OHD ([@r3], [@r5]). In addition, patients with the SW form show elevated plasma renin activity or an elevated plasma renin.
As the initial treatment, a high dose of hydrocortisone is administered to rapidly suppress adrenal hyperplasia and excess adrenal androgen ([@r5]). Thereafter, the dose of hydrocortisone is reduced to a maintenance dose, and lifelong treatment is necessary ([@r5]). In infants with the SW form, 9α-fludrocortisone is required in addition to hydrocortisone ([@r3], [@r5]). In childhood, the main targets of treatment of 21-OHD are as follows: 1) normal physical growth, 2) normal development of secondary sex characteristics, and 3) avoidance of adrenal crisis ([@r1],[@r2],[@r3], [@r5]). After reaching adulthood, the transition to an adult endocrinologist is required ([@r3], [@r5],[@r6],[@r7]). As the relationship between metabolic abnormalities and glucocorticoid dose in adult patients with 21-OHD has recently been reported in several studies ([@r8],[@r9],[@r10],[@r11]), pediatricians who care for 21-OHD patients should avoid overdose of glucocorticoid.
Newborn Mass Screening (MS) for CAH {#s2}
===================================
The purposes of MS for CAH are prevention of death caused by adrenal insufficiency in neonates with the SW form and gender misassignment of 46,XX female neonates with the SW and SV forms ([@r3], [@r5], [@r12],[@r13],[@r14]). MS for CAH was first reported in 1977 ([@r15]), and since then, MS for CAH has been implemented in at least 30 countries ([@r9], [@r14], [@r16],[@r17],[@r18],[@r19],[@r20],[@r21],[@r22],[@r23]). However, CAH screening is associated with a high false positive rate (FPR) and low positive predictive value (PPV), especially in preterm infants ([@r3], [@r5], [@r8], [@r24],[@r25],[@r26]). Moreover, as affected girls with the SW and SV forms show virilized genitalia at birth, clinical diagnosis is thought to be easy ([@r26]). Based on these points of view, several countries do not perform MS for CAH ([@r27], [@r28]).
In 2012, the efficiency of neonatal screening for CAH in France from 1996 to 2003 was reported ([@r26]). In their study, a total of 6,012,798 neonates were screened and 15,407 were positive on screening for CAH. However, among these cases, only 370 were ultimately diagnosed as having CAH. Among them, family history led to the diagnosis of CAH in 74 infants, and in 96 girls with CAH, ambiguous genitalia were identified during neonatal examination. In addition, 13 boys were clinically diagnosed as having CAH before obtaining the results of MS. Therefore, in these 183 patients (about half of the total number of patients with CAH), MS for CAH was not beneficial. Moreover, among 38 premature neonates with positive screening results, MS was useful for the diagnosis of CAH in 13 infants, among whom only 6 had the severe SW form. During this period, the sensitivity of MS for CAH was 93.5%, and the PPV was 2.3%. Furthermore, the PPV in preterm infants was only 0.4%.
One of the rationales for MS for CAH is to prevent the death of neonates. In their study, Coulm *et al*. analyzed mortality rates of neonates due to adrenal insufficiency in children younger than 1 yr of age from 1979 to 2007 ([@r26]). The mortality rate of adrenal diseases from 1979 to 1984 was 0.10 per 100,000 births. From 1985 to 1990, it increased to 0.20 per 100,000 births. From 1991 to 1995, it decreased to about 0. 09 per 100,000 births, and from 1991 to 1995, it was about 0.08 per 100,000 births. Therefore, most of the decrease was observed in 1991--1995. As nationwide MS for CAH began in 1996 in France, decrease of the mortality rate was not associated with the screening.
In the UK, CAH is not included in newborn mass screening. Khalid *et al*. ([@r28]) reported clinical features of congenital adrenal hyperplasia in the UK. Approximately 90% of CAH patients were diagnosed before one year of age. Most girls were diagnosed by virilization of external genitalia, and about 20% of patients with CAH presented with salt-wasting crisis on or after 14 days of age. Therefore, MS for CAH could have prevented salt-wasting crisis in these 20% of patients with CAH.
Gidlof *et al*. ([@r22]) reported the results of the nationwide MS for CAH in Sweden over a 26-yr period, which is the longest study period so far. They concluded that MS for CAH is highly effective in detecting SW and therefore in reducing mortality.During the 26-yr period, almost all infants born from 1986 to 2011 (2,737,932 newborns) were subjected to screening. A total of 143 patients with SW were identified. The sensitivity of MS for CAH was 84.3%, and the specificity was 99.9%. The total recall rate was 0.06%. However, the recall rate in preterm infants (0.57%) was significantly higher than that in term infants (0.03%). The PPV in term infants was 25%. On the other hand, the PPV in preterm infants was 1.4% despite gestational age-related cutoff levels.
The difference in opinion regarding MS for CAH may be related to the way of thinking about prevention of SW crisis, health administration, and finance of health administration.
Liquid Chromatography-tandem Mass Spectrometry (LC-MS/MS) in MS for CAH {#s3}
=======================================================================
LC-MS/MS is now being incorporated in newborn screening laboratories in several countries. A method of performing a steroid-profiling assay for simultaneous analysis of 17-hydroxyprogesterone, androstenedione (4-AD), 21-deoxycortisol (21-DOF), 11-deoxycortisol (11-DOF) and cortisol has been reported ([@r29],[@r30],[@r31],[@r32],[@r33],[@r34],[@r35],[@r36]). Performance of a steroid-profiling assay by LC-MS/MS as a second-tier test in MS for CAH may avoid unnecessary recalls, reduce the FPR and increase the PPV.
Minnesota, USA a two-tier protocol in which a second-tier test was performed using LC-MS/MS to measure the levels of 17-OHP, 4-AD, and cortisol simultaneously in blood filter papers was started in 2004, and the efficiency of the second-tier steroid test using LC-MS/MS has been reported ([@r33]). From 1999 to 2004, a one-tier protocol had been used. In the one-tier protocol, the 17-OHP level was measured by immunoassay, and weight-based cutoff values were employed. From 2004, following two-tier screening protocol was employed: If the 17-OHP level was above the cutoff level in the first-tier test using an immunoassay, the filter paper was automatically analyzed by LC-MS/MS as a second-tier test. The cutoff levels of the blood 17-OHP level and the ratio of (17-OHP+4-AD)/cortisol in the two-tier test are summarized in [Table 1](#tbl_001){ref-type="table"}Table 1Cutoff levels of LC-MS/MS in the second-tier test. From 2004 to 2008, various cutoff values and analytes were used in the second-tier steroid-profiling assay. From 2008, gender-specific reference ranges of 17-OHP were used because girls had lower 17-OHP levels ([@r37], [@r38]).
A negative result in the second-tier test \[either a normal 17-OHP level or a normal ratio of (17-OHP+4-AD)/cortisol\] was considered negative. If the second-tier test was positive \[both the 17-OHP level and the ratio of (17-OHP+4-AD)/cortisol were above the cutoff\], the result was presumed to be positive, and the infant was subjected to medical examination.
When using the two-tier protocol, the false negative rate and FPR unexpectedly increased to 32.4% (one-tier protocol, 15.4%) and 0.065% (one-tier protocol, 0.057%), respectively, and the PPV decreased to 8% (one-tier screening, 9.5%), although these changes were not statistically significant. However, the two-tier protocol was effective in reducing the recall for another heel prick. An average of 355 infants per year were recalled in the one-tier protocol, but an average of 30 infants per year were recalled in the two-tier protocol.
In the two-tier protocol for MS, eleven infants were missed. Of them, 3 patients had the SW form, and 8 patients had the SV form. These cases were missed for the following reasons. The blood 17-OHP levels in 7 infants were below the cutoff in the first-tier test. The other four cases showed an increased 17-OHP level in the first-tier test, but the 17-OHP level in one of these four infants was below the cutoff level in the second-tier test. In the remaining three cases, the blood 17-OHP levels were above the cutoff in the second-tier test, but the ratio of (17-OHP +4AD)/cortisol was below the cutoff, and the results of the second-tier tests were presumed to be normal. One reason for the high false negative rate might be due to delayed rise of 17-OHP in some patients with classic 21-OHD ([@r33], [@r34]). In addition, the cutoff levels of 17-OHP and the ratio of (17-OHP +4AD)/cortisol in the second-tier test might be related.
Schwarz *et al*. ([@r32]) reported the results of LC-MS/MS as a second-tier test in MS for CAH from Utah, USA. Over a 13-mo period, 64,615 infants were screened by immunoassay in the first-tier test. A total of 2.6% (1,709) of the infants had a17-OHP level higher than the cutoff value in the first-tier test, and their filter papers were subjected to LC-MS/MS analysis in the second-tier test. The criteria for a positive second-tier test requiring a second blood sample and referral to a pediatric endocrinologist were the presence of both a 17-OHP level of greater than 12.5 ng/ml and a ratio of (17-OHP+4AD) /cortisol greater than 1.0 ([Table 1](#tbl_001){ref-type="table"}). As a result, 64 infants were considered to have a positive result in the second-tier test, and thus they required a second blood spot and referral to a pediatric endocrinologist. Among the infants who had a positive second-tier test, 80% (51/64) had a birth weight of \< 2500 g. Finally, among these 64 infants, 6 infants were diagnosed with 21-OHD. The FPR decreased from 2.6% to 0.09% using LC-MS/MS in the second-tier test, and the PPV improved from 0.4% to 9.4%; however, the FPR was still high in the low birth weight infants.
In Sapporo Japan, steroid profiling from a blood spot by LC-MS/MS has been used as a second-tier test ([@r10], [@r36]). Fujikura *et al*. ([@r36]) reported the one-year results of MS for CAH using LC-MS/MS as a second-tier test since 2011. The two-tier protocol used in Sapporo was as follows ([Table 1](#tbl_001){ref-type="table"}). When the 17-OHP level was ≥ 5.5 ng/ml by immunoassay in the first-tier test, the filter paper was automatically subjected to LC-MS/MS in a second-tier test. If an infant of ≥ 37 weeks of gestational age showed either 1) a 17-OHP level of ≥ 4 ng/ml or 2) a 17-OHP level of ≥ 3 ng/ml and a (17-OHP+4AD)/cortisol ratio of ≥ 0.2 in the second-tier test, the result was considered to be positive, a second heel prick was requested, and the infant was referred to a pediatric endocrinologist. If an infant of \< 37 wk of gestational age showed either 1) a 17-OHP level of ≥ 6 ng/ml or 2) a 17-OHP level of ≥ 5 ng/ml and a (17-OHP+4AD)/cortisol of ≥ 0.2, the result was considered to be positive, a second heel prick was requested, and the infant was referred to a pediatric endocrinologist. During 2009 to 2011, the 17-OHP level was determined by HPLC in the second-tier test, and recall rate was 7.9% among neonates who were born at \< 37 wk of gestation, whereas it was 0.09% among neonates who were born at ≥ 37 wk of gestation ([Table 2](#tbl_002){ref-type="table"}Table 2Results of MS for CAH using LC-MS/MS as a second-tier test in Sapporo) ([@r39]). After the introduction of LC-MS/MS as the second-tier test, the recall rate was 4.0% among neonates who were born at \< 37 wk of gestation, and the recall rate was 0.02% among neonates who were born at ≥ 37 wk of gestation ([Table 2](#tbl_002){ref-type="table"}). These data were obtained over a one-yr period, but the second-tier test using LC-MS/MS is likely to be useful to reduce the recall rate in term and preterm neonates.
LC-MS/MS is now used for neonatal screening of inborn errors of metabolism of amino acids and fatty acids in Japan ([@r40]). In most newborn screening laboratories, LC-MS/MS is part of the basic equipment. However, LC-MS/MS for steroid analysis requires a higher level of laboratory expertise than an immunoassay. In addition, for steroid profiling from dried blood by LC-MS/MS, the equipment requires high sensitivity and more blood spots. Moreover, to determine amino acids and fatty acids and steroid profile simultaneously, further improvement of the LC-MS/MS equipment is needed. If these problems are solved in the future, steroid profiling by LC-MS/MS will be performed throughout Japan.
Conclusion {#s4}
==========
The low PPV of MS for CAH is a major challenge, and MS for CAH is still controversial worldwide. However, MS for CAH enables prevention of the development of salt-wasting symptoms and death in infants with undiagnosed 21-OHD. Several studies suggest that the use of LC-MS/MS as a second-tier test appears to be able to decrease the recall rate, although this method could not completely eliminate the FPR, especially in preterm infants.
We are grateful to Kaori Fujikura, Takuya Yamagishi, Yasuko Tagami, Jyunnji Hanai, Atsuhi Miyata, and Sapporo City Institute of Health for performing analysis of steroid profiles from blood spots.
| 2024-03-30T01:27:17.568517 | https://example.com/article/1551 |
Tamimi's visit coincided with the 33rd anniversary of Israel's Operation Wooden Leg, in which Israeli air forces attacked the headquarters near Tunis of the Palestine Liberation Organisation (PLO), killing dozens.
Palestinian activist Ahed Tamini and her family met with Tunisian President Beji Caid Essebsi in Tunis on Tuesday during a visit to the North African country.
Tamimi's visit to Tunisia is a "form of recognition for the fight and sacrifices by several generations of Palestinians", Essebi said, according to a presidential press release.
"It is also an acknowledgement of the justice of the Palestinian cause, and its value in the conscience of Tunisian people," the statement added.
During the meeting, Essebi said that Tunisia will continue to support the Palestinian people in their right to establish an independent state.
Tamimi thanked Essebi for inviting her to Tunisia.
"Tunisia is the first Arab country that we chose to speak about our cause, and that is exceptional for us. We hope that the liberation of Palestine begins in Tunisia," she said, according to ANSAmed.
The Tunisian General Union of Labour will hold a ceremony to honour Tamimi and her family, the group said on Facebook.
Tamimi's visit coincided with the 33rd anniversary of Israel's Operation Wooden Leg, in which Israeli air forces attacked the headquarters near Tunis of the Palestine Liberation Organisation (PLO), which was based in the country at the time.
Dozens of Palestinians and Tunisians were killed in the attack, which was condemned by the UN Security Council.
Tamimi, who is now 17, became a symbol of Palestinian resistance against the Israeli occupation when she was filmed slapping an Israeli soldier in front her house in the occupied West Bank in December.
The footage of the incident went viral and the Palestinian teenager was eventually arrested and sentenced to eight months in jail by an Israeli military court.
She was released from an Israeli prison in July and received a hero's welcome in Palestine. | 2023-10-29T01:27:17.568517 | https://example.com/article/8089 |
Q:
postgresql index usage - Pluses And Minuses
I am using python/django as for programming language/framework. What i need to know is totally about postgresql and indexing...
For those who uses django probably know Content Type and Django Admin Log. But shortly, Admin log is logging user action. I also use it for logging all actions performed within the site. So it has 1.000.000+ records. I use sql queries to filter results, Thats ok up to here...
Problem is, i use two fields to select data from diffrent tables. One of them is, content type, which stores the related database table info and the field is indexed...
Other field is, object id, which stores id of the related object, the field type is varchar and field is not indexed...
Examle of usage is :
Select from django_admin_log where content_type_id=15 and object_id="12343545";
Since content_type_id=15 points my blog_texts table and the id of the related object is 12343545, i can easily get related data...
But object_id is not indexed, and table have 1.000.000+ records, a query like i write above takes a lot of execution time.
What will be the benefits and drawbacks of using index in object_id. Will the benefits be greated than drawbacks or not?
UPDATE: I have no updates on admin log table. It just logs each of all user actions... 40.000-45.000 records are inserted to the table each day. And system is really busy during 2/3 of the day, about 15-16 hours (morning to evening). So 45.000 records are inserted during 8.00am to 11.00pm...
So at this point of view, will it cause too much database overwight if i create indexes?
UPDATE 2: One more question. Another table with 2.000.000+ records with a boolean field. Field is something like "wwill it be displayed", and it is used with other filter criteria. Is it logical to create an index for a such boolean field.
Second conditin is, indexing a boolean and a datetime fields together in a table with 1.000.000 records...
Using index for these two condition is a good idea or not?
A:
Just for clarification....
For this particular SQL you should use one index that includes both columns (content_type_id and object_id)--concatenated index.
In that case you can drop the existing index that is on content_type_id only--the new index will be able to server queries that only filter for content_type_id as well as queries where both columns are filtered.
Two indexes--the existing one and a new one on object_id only--will probably not give the best result for this query.
EDIT: if you extend the existing index by the object_id column, the performance penalty for the insert will be negligible but your select will work much faster.
EDIT 2: if you have statements like this
WHERE bool = true
and other one like that:
WHERE bool = true AND date > something
I would suggest an concatenated index on BOOL first then DATE.
columns that are used with inequality comparisons should be moved towards the end of the index.
However, depending on your data it might make sense NOT to index the BOOL field. e.g. if 95% of all rows have true, the above statements would not filter very much. In that case, an index can potentially decrease performance for the select statement. However, a good optimizer will just ignore the index. still the insert/update/delete cost would remain.
Read more about concatenated indexes in my free eBook.
| 2024-06-16T01:27:17.568517 | https://example.com/article/2721 |
package org.liquibase.maven.plugins;
import liquibase.Liquibase;
import liquibase.changelog.ChangeLogParameters;
import liquibase.command.AbstractSelfConfiguratingCommand;
import liquibase.command.CommandExecutionException;
import liquibase.command.CommandFactory;
import liquibase.command.LiquibaseCommand;
import liquibase.database.Database;
import liquibase.exception.LiquibaseException;
import org.apache.maven.plugin.MojoExecutionException;
import org.apache.maven.plugin.MojoFailureException;
import java.util.HashMap;
import java.util.Map;
/**
*
* Reverts (rolls back) one non-sequential <i>changeSet</i> made during a previous change to your database. It is only available for Liquibase Pro users.
*
* @goal rollbackOneChangeSet
*
*/
public class LiquibaseRollbackOneChangeSetMojo extends AbstractLiquibaseChangeLogMojo {
/**
*
* The change set ID to rollback
*
* @parameter property="liquibase.changeSetId"
*
*/
protected String changeSetId;
/**
*
* Specifies the author of the <i>changeSet</i> you want to rollback.
*
* @parameter property="liquibase.changeSetAuthor"
*
*/
protected String changeSetAuthor;
/**
*
* Specifies the path to the <i>changelog</i> which contains the <i>change-set</i> you want to rollback.
*
* @parameter property="liquibase.changeSetPath"
*
*/
protected String changeSetPath;
/**
*
* A required flag which indicates you intend to run rollbackOneChangeSet
*
* @parameter property="liquibase.force"
*
*/
protected String force;
/**
*
* Specifies the path to a rollback script
*
* @parameter property="liquibase.rollbackScript"
*
*/
protected String rollbackScript;
@Override
public void execute() throws MojoExecutionException, MojoFailureException {
commandName = "rollbackOneChangeSet";
super.execute();
}
@Override
protected void printSettings(String indent) {
super.printSettings(indent);
getLog().info(indent + "Change Set ID: " + changeSetId);
getLog().info(indent + "Change Set Author: " + changeSetAuthor);
getLog().info(indent + "Change Set Path: " + changeSetPath);
getLog().info(indent + "Rollback script: " + rollbackScript);
}
@Override
protected void performLiquibaseTask(Liquibase liquibase) throws LiquibaseException {
//
// Check the Pro license
//
boolean hasProLicense = MavenUtils.checkProLicense(liquibaseProLicenseKey, commandName, getLog());
if (! hasProLicense) {
throw new LiquibaseException(
"The command 'rollbackOneChangeSet' requires a Liquibase Pro License, available at http://www.liquibase.org/download or sales@liquibase.com.");
}
Database database = liquibase.getDatabase();
LiquibaseCommand liquibaseCommand = (CommandFactory.getInstance().getCommand("rollbackOneChangeSet"));
AbstractSelfConfiguratingCommand configuratingCommand = (AbstractSelfConfiguratingCommand)liquibaseCommand;
Map<String, Object> argsMap = getCommandArgsObjectMap(liquibase);
ChangeLogParameters clp = new ChangeLogParameters(database);
argsMap.put("changeLogParameters", clp);
if (force == null || (force != null && ! Boolean.parseBoolean(force))) {
throw new LiquibaseException("Invalid value for --force. You must specify 'liquibase.force=true' to use rollbackOneChangeSet.");
}
argsMap.put("force", Boolean.TRUE);
argsMap.put("liquibase", liquibase);
configuratingCommand.configure(argsMap);
try {
liquibaseCommand.execute();
}
catch (CommandExecutionException cee) {
throw new LiquibaseException("Error executing rollbackOneChangeSet", cee);
}
}
private Map<String, Object> getCommandArgsObjectMap(Liquibase liquibase) throws LiquibaseException {
Database database = liquibase.getDatabase();
Map<String, Object> argsMap = new HashMap<String, Object>();
argsMap.put("changeSetId", this.changeSetId);
argsMap.put("changeSetAuthor", this.changeSetAuthor);
argsMap.put("changeSetPath", this.changeSetPath);
argsMap.put("force", this.force);
argsMap.put("rollbackScript", this.rollbackScript);
argsMap.put("changeLogFile", this.changeLogFile);
argsMap.put("database", database);
argsMap.put("changeLog", liquibase.getDatabaseChangeLog());
argsMap.put("resourceAccessor", liquibase.getResourceAccessor());
return argsMap;
}
}
| 2023-11-22T01:27:17.568517 | https://example.com/article/9072 |
/**
* Aptana Studio
* Copyright (c) 2005-2011 by Appcelerator, Inc. All Rights Reserved.
* Licensed under the terms of the GNU Public License (GPL) v3 (with exceptions).
* Please see the license.html included with this distribution for details.
* Any modifications to this file must keep this entire header intact.
*/
package com.aptana.js.core.parsing.ast;
import beaver.Symbol;
public class JSGetPropertyNode extends JSBinaryOperatorNode
{
/**
* Used by ANTLR AST
*
* @param operator
*/
public JSGetPropertyNode(int start, int end, Symbol operator)
{
super(start, end, operator);
this.setNodeType(IJSNodeTypes.GET_PROPERTY);
}
/*
* (non-Javadoc)
* @see com.aptana.editor.js.parsing.ast.JSNode#accept(com.aptana.editor.js.parsing.ast.JSTreeWalker)
*/
@Override
public void accept(JSTreeWalker walker)
{
walker.visit(this);
}
public JSIdentifierNode getProperty()
{
return (JSIdentifierNode) getRightHandSide();
}
}
| 2024-04-30T01:27:17.568517 | https://example.com/article/8698 |
A company tax cut has been a divisive feature of pre-budget commentary. Business lobby groups have reacted strongly to modelling produced by Victoria University’s Centre of Policy Studies, which shows that a company tax cut will stimulate growth in GDP and pre-tax real wages, but will cause a fall in domestic income.
Yet a closer look is warranted at the business and industry impacts of a cut to company tax that should be kept in mind as policymakers finalise the May 3 federal budget.
I have argued that a company tax cut presents a windfall gain to foreign investors, while the much vaunted benefits to workers constitute an uncompensated cost to local employers, including many small and medium businesses, and government.
This real concern has been dismissed by the representatives of large business as “highly theoretical”. But the key is that a cut to company tax changes the relative treatment of local and foreign investors in Australia.
Local owners of unincorporated businesses are taxed at their personal tax rate. Because of Australia’s dividend imputation system, Australian shareholders in incorporated business are also taxed at their personal rate, not the company tax rate.
I can’t put it better than Paul Keating, who earlier this year wrote:
Australia’s dividend imputation system works such that the company tax is, in effect, a withholding tax – a tax temporarily held by the Commonwealth which is returned to shareholders when their dividends are paid. So, whether the company tax is withheld by the Commonwealth at a rate of 30% or 25% is immaterial – the Commonwealth is going to return the money to shareholders anyway, regardless of the rate. But the shareholders who will receive a benefit are foreign shareholders.
The forgotten losers: Australian owners of capital
A cut to company tax favours foreign owners of capital, so it favours large corporations at the expense of small business. Some 98% of small businesses (employing four or fewer people) are wholly Australian owned and therefore indifferent to the company tax rate. On the other hand, 30% of large businesses (employing more than 200 people) have some component of foreign ownership. Foreign shareholders in these businesses will be beneficiaries of a cut to company tax.
An increase in foreign investment is generally understood to be a driver of wage growth. This is the basis for the argument that at least half of the benefit of a cut to company tax flows to workers. However, it conceals some important concepts, and it is misleading in the sense that it implies that the benefit to foreign investors is limited to other half of the total growth in GDP.
We find that benefit to foreign investors will exceed the total increase in GDP. In the domestic economy, benefits to workers will be more than offset with a negative impact on domestic investors and the need to address additional government deficit.
Why? Labour moves around the economy, so wages will eventually increase everywhere, not just at foreign-owned companies. This adds to wage costs for domestically owned businesses and government. While foreign investors effectively fund wage increases out of their tax cut, a wage increase will be unambiguously bad for domestic investors, whose tax rate is unchanged.
The potential government deficit created by this policy stems from both the loss of company tax revenue and the increase in wage costs to government. Whatever way it is rectified – through GST, personal taxation, or reductions in government services – it will detract from the benefit to workers.
Industry impacts
Drivers of industry impacts are: changes in the composition of the nation’s expenditure, the capital intensity of industry, and the initial proportion of foreign ownership.
Domestic consumption, linked to incomes, will grow slowly relative to output when company taxes are cut. It follows that the composition of output will gradually evolve in favour of export and investment oriented industries.
Mining is a winner on all counts: it is capital intensive, mostly foreign owned, and export oriented. The construction sector also expands.
At the bottom end of Figure 1 are the industries that rely on domestic private and public consumption.
Vic-Uni model , Author provided
Many of these industries, such as retail, accommodation (including restaurants and bars) and health care and social assistance (including child care, residential care and aged care), are important employers of people in relatively low-wage occupations, women, and part-time workers.
It’s easy to see why a company tax cut polarises opinion, as it generates clear winners and losers. Foreign investors will receive a windfall gain at the expense of Australian residents. Economic growth induced by differential treatment of foreign and local investors merely creates the illusion of a benefit for all. | 2024-04-20T01:27:17.568517 | https://example.com/article/9703 |
An analogue of thyrotropin-releasing hormone, DN1417, decreases naloxone binding in the rat brain.
We explored whether thyrotropin-releasing hormone may affect opioid receptors in the rat brain. Adult male rats were intraperitoneally injected twice a day with varying doses of DN1417, a potent analogue of thyrotropin-releasing hormone, for 2 days, and opioid receptors of the brain (hypothalamus, striatum, hippocampus, midbrain, ponsmedulla, and cortex) homogenates were determined using [3H]naloxone. Intraperitoneal injection of DN1417 in a dose of 0.3 mg/100 g body wt resulted in a significant reduction in naloxone binding of the striatum as compared with the saline-injected group, whereas naloxone binding of other brain regions was not affected by DN1417. DN1417 produced a dose-dependent decrease in naloxone binding of the striatum. The affinity constant of naloxone binding was similar between the saline- and DN1417-injected groups. In vitro addition of DN1417 did not interfere with the brain naloxone binding. The distribution of 3H-labeled DN1417 injected peritoneally did not differ among the brain regions. The present data imply that the opioid antagonistic action of thyrotropin-releasing hormone may be due, at least in part, to the significant decrease in the striatal opioid binding in the rat brain. | 2024-04-05T01:27:17.568517 | https://example.com/article/3621 |
Behind the scenes, major airlines are pressing the federal government for an aid package to help them survive the pandemic and quickly recover when countries finally lift their travel restrictions.
“The carriers are burning through cash,” said Mike McNaney, the president of the National Airlines Council of Canada, which represents Air Canada, Air Transat and WestJet.
“The industry will not be able to get out of this challenge unless there’s government assistance.”
Heading into the pandemic, some of Canada’s large airlines were riding a financial high. But COVID-19 brought international travel to a halt, something the sector has never experienced before.
Some airlines stopped flying altogether. Others, such as Air Canada, scaled back operations by more than 90 per cent because of the unprecedented drop in demand.
Thousands of planes now sit parked across the country, costing air carriers tens of millions of dollars daily. And there’s no end in sight, said McNaney.
Airlines have been tapping into Canada’s wage subsidy program to hire back thousands of laid-off workers, but say they need an infusion of cash, loans and a freeze on taxes and fees to prop up the industry.
A consumer group warns that if a taxpayer bailout is on the way, it should come with strings attached banning airlines from paying executive bonuses and requiring them to reimburse consumers for cancelled flights during the pandemic.
Parked planes with big bills
Planes worth $10 billion are parked at airports across Canada, bleeding money, said McNaney. He added he’s “astounded” that 90 per cent of the market is gone.
Most airlines finance the purchase of their aircraft, which can cost more than $100 million each. The engines themselves are so expensive that they’re sometimes paid off separately, said John McKenna, president of the Air Transportation Association of Canada, which represents carriers like Porter and Sunwing Airlines.
“It’s been a catastrophe,” said McKenna. “Everyone is hurting. We are a capital intensive industry.
“Planes cost tens or sometimes hundreds of millions of dollars. For them to be profitable they have to be flying all the time. Sitting there, you still have to insure them, maintain them, and you have to pay for them.
“You’re not generating any money from them. You’re just losing it.”
Porter Airlines suspended all flights during the pandemic, which is hitting the airline and tourism industries hard. (David Donnelly/CBC)
Complicated process to restart industry
Sunwing’s president Mark Williams said some companies are managing their financial losses but won’t be able to sustain it for months on end.
“There isn’t a sector that’s been more impacted by this,” said Williams on Thursday at a virtual Canadian Club Toronto event. “We’re really looking for liquidity.
“It’s not reasonable to expect that any airline in Canada can go on like this for six months without getting some sort of financial support from the government.”
“It’s going to be a very complicated process to restart aviation,” he said. “We’ve never seen 90 per cent of capacity parked at one point in time.
“That’s like trying to walk out into a parking lot after a [hockey] game with 15,000 cars in the lot and none of them turn over because it’s too cold and their engines have all shut down. So you have to get all those cars ramped up and ready to roll. Then you have to find your way out to the parking lot.”
McNaney said the government needs to stabilize the airline industry so it can start working out the logistics of re-starting with air carriers, staff and government agencies. The longer they wait, the tougher that process will be, he said.
McNaney added that the airline and tourism industries are key to rebuilding Canada’s economy.
“We recognize there are certain industries that have been extremely hard hit by both the drop in oil prices and the COVID-19 challenge, whether it’s airlines or oil and gas or tourism,” Prime Minister Justin Trudeau told reporters on April 1. (Justin Tang/The Canadian Press)
Government evaluating ‘all options’
A month ago, Prime Minister Justin Trudeau said he recognized the industry has been hit “extremely” hard and that help was on the way.
Morneau’s office said the government is still evaluating “all options to support the industry.”
“We have been in touch with airlines and we understand the impact COVID-19 is having on their industry and we are with the workers who are facing a difficult situation in these unprecedented times,” said spokesperson Maéva Proteau in a statement to CBC News.
Williams said talks continue with the government to come up with an equitable solution so that all companies — big and small — receive help.
“The government shouldn’t be picking winners or losers here,” he said. “They need to support the industry as a whole.”
Europe, U.S. promising bailouts
Some European nations and the U.S. have agreed already to bailouts. France and the Netherlands are providing a 10-billion-euro taxpayer-funded bailout to save Air France-KLM.
The Trump administration agreed to a $25 billion bailout to prop up its airline industry. Canada’s industry is roughly ten times smaller than the American one. Some Canadian pilot and airline associations have told CBC News a $5 billion bailout from the federal government would be reasonable.
But airlines have been hesitant to put a price tag on damage that’s still unfolding, and have not offered a number to the federal government.
Customers should be reimbursed, says consumer group
If Canada does announce a bailout, some argue there should be strict criteria to ensure taxpayer money isn’t misused.
John Lawford, executive director of the Public Interest Advocacy Centre, said Ottawa should focus on “making sure companies couldn’t skim off excess profits through the bailout by giving dividends to their shareholders with that money, or giving large executive bonuses.
“These sorts of things should be prohibited.”
Lawford said the government also should make it mandatory for airlines to use some of the government aid package to reimburse customers for flights cancelled due to the pandemic.
There are two proposed class-against lawsuits against major Canadian airlines seeking full refunds for passengers whose flights were cancelled during the pandemic, according to the consumer group Air Passenger Rights. That same group has also taken the Canadian Transportation Agency to court over the issue.
“It’s a large expense for the average consumer,” said Lawford. “The $3,000 to $4,000 dollars for a large vacation you’ve been saving up for multiple years is a large cost for consumers to absorb.”
Some analysts have suggested that it could take more than five years for the airline sector to return to the same traffic it saw before COVID-19 hit. | 2024-04-04T01:27:17.568517 | https://example.com/article/8178 |
If you are an unmarried Pakistani, you cannot visit Sweden - kingzain
http://blogs.tribune.com.pk/story/25839/if-you-are-an-unmarried-pakistani-you-cannot-visit-sweden/
======
dalke
While that is the title, it is an incorrect interpretation of the evidence.
The actual statement is:
> entry visas are only granted to Pakistanis who wish to visit immediate
> family members in Sweden and who can show that they are established in
> Pakistani society. Being established means having a family (husband, wife,
> children) in Pakistan to return to and/or to be established in the labour
> market.
I interpret that to mean that an unmarried Pakistani with a job (and/or real
estate) in Pakistan can get a visa to visit Sweden. No children are needed.
The author, OTOH, translated it as "married with children". I believe this is
too broad. It appears to be there as enumeration which is narrower than
"immediate family."
I agree most with the comments by Hafiz Abdul Azeem ("This article shows
author's immature understanding about visa process.") and UzairH.
| 2024-01-20T01:27:17.568517 | https://example.com/article/1772 |
Uterine Doppler velocimetry and placental hypoxic-ischemic lesion in pregnancies with fetal intrauterine growth restriction.
We tested the hypothesis that Doppler velocimetry of the ascending uterine arteries (Ut.DV) in cases of fetal intrauterine growth restriction (IUGR) can reflect the presence of hypoxic-ischaemic lesions of the placenta, and whether this prediction is affected by the maternal blood pressure status.Ut.DV was obtained within 7 days of delivery in 90 consecutive pregnancies with IUGR and in 37 uneventful control pregnancies. Abnormal Ut.DV was defined as an average of a (left and right systolic)/diastolic ratio >2.6 and diastolic notching. After delivery, pathological studies were performed with attention paid to macroscopic and microscopic evidence of hypoxic or ischaemic placental lesions related to uteroplacental vascular pathological features. In patients with IUGR, the total rate of placental lesions was significantly higher in the presence of abnormal Ut.DV compared to the presence of normal Ut.DV (relative risk, 6.35; 95 per cent confidence interval=5.2-7.3). The rate and the severity of these lesions was not significantly different between normotensive and hypertensive pregnancies (87 versus 93 per cent;P =0.2). When Ut.DV was normal, the rate of placental lesions was similar between IUGR cases and control pregnancies (14 versus 8 per cent;P =0.69). The perinatal outcome was not significantly different in any of the normotensive and the hypertensive pregnancies with growth-restricted fetuses and abnormal Ut.DV.The presence of abnormal Doppler velocimetry of the uterine arteries in pregnancies with fetal intrauterine growth restriction is may be in fact an important indicator of hypoxic or ischaemic placental lesions. This abnormal Doppler velocimetry is independent of the maternal blood pressure status. | 2023-10-11T01:27:17.568517 | https://example.com/article/2889 |
Introduction {#section1-1076029619872556}
============
Direct oral anticoagulants (DOACs) are targeted coagulation factor inhibitors bringing about improvement in anticoagulation therapy. While the "old anticoagulants," vitamin K antagonists have many limitations, such as unpredictable anticoagulant effect, the needs for routine monitoring, parenteral administration, awareness of various drug and food interactions, and dose adjustment, DOACs seem to overcome these limitations. Since DOACs are selective inhibitors of coagulation factors,their modes of action are more predictable. Other advantages include fixed doses, no need for routine monitoring, very few drug and food interactions, and mainly oral administration.^[@bibr1-1076029619872556]^
Currently, the following 4DOACs are used in anticoagulation therapy: dabigatran, a direct thrombin inhibitor; rivaroxaban, apixaban, and edoxaban, direct factor Xa (FXa) inhibitors. Their indications include prevention of venous thromboembolism in patients undergoing elective knee and hip surgery, prevention of stroke and systemic embolism in patients with atrial fibrillation, treatment and prevention of recurrent deep vein thrombosis (DVT), and pulmonary embolism (PE).
Even though routine determination of DOACs is not needed, samples of patients treated with DOACs are rather common in our laboratory. One of the adverse effects of DOAC therapy is the false positive or negative results of screening coagulation tests as well as specific tests like thrombophilia screening (eg, antithrombin, protein C, protein S, lupus anticoagulant\[LA\], activated C protein resistance).^[@bibr2-1076029619872556],[@bibr3-1076029619872556]^ This situation prevents the diagnosis of patients using this type of medication and forces us to concede to one of the following changes, should testing be necessary.
Several strategies were proposed to minimize the impact of residual DOACs on coagulation assays: (1) the use of DOAC insensitive assays, (2) the addition of idarucizumab to the plasma sample (Praxbind, Boehringer Ingelheim, Germany) to specifically neutralize the in vitro activity of dabigatran, or (3) skipping 1(for once-daily fixed-dose regimens) or 2(for twice-daily fixed-dose regimens) DOAC intakes in patients with low thromboembolic risk. However, any interruption of anticoagulation will expose the patient to an increased risk of thrombosis, and residual drug levels may still affect test results.^[@bibr4-1076029619872556]^ Thus, none of these approaches are considered optimal, and a simple way to overcome the problem would be to remove DOAC from the plasma sample without influencing its coagulant properties.
The aim of this study was to evaluate the efficiency of a new and simple procedure, DOAC-Stop (Haematex Research, Hornsby, Australia),^[@bibr5-1076029619872556]^ to overcome the effect of all DOACs by detecting the residual activity of DOACs through high-performance liquid chromatography-coupled tandem mass spectrometry (HPLC-MS/MS).^[@bibr6-1076029619872556][@bibr7-1076029619872556]--[@bibr8-1076029619872556]^ The HPLC-MS/MS is used as a referential method for assessing the suitability of other methods but not for routine determination. It shows high sensitivity, accuracy, and precision, as well as an adequate limit of quantification. This method is very simple, fast, and specific, enabling simultaneous determination of all DOACs. However, the method is suitable only for highly specialized and equipped laboratories.
The second aim of this study was to determine the potential level of DOAC that affects the most sensitive coagulation test, the determination of LA using the dilute Russell viper venom(dRVVT) test.^[@bibr9-1076029619872556]^
Material and Methods {#section2-1076029619872556}
====================
Patients {#section3-1076029619872556}
--------
This study was conducted on a set of blood samples sent to our laboratory from 60 patients treated with DOACs for all approved indications of treatment and prevention of DVT, PE, and stroke. Citrated plasma samples were stored at −80°C before analysis.
Blood Sampling {#section4-1076029619872556}
--------------
Blood was collected with a Vacuette needle (Greiner Bio-One, Vienna, Austria) into a vacuum tube with a buffered solution containing sodium citrate at a concentration of 0.109 mol/L(3.2%). The system ensured a blood and anticoagulant mixture at a desired 1:10 ratio. Then the blood was carefully mixed in a test tube, with the tube being gently turned upside down several times and transported to the laboratory. Next, the sample was centrifuged for 10 minutes at 3000*g*, following which 0.5mL of the upper layer of platelet-poor plasma was aspirated, frozen, and stored at −80°C until analysis was performed. In the analysis of LA, the sample was repeatedly centrifuged under the same conditions. For the actual analysis, the sample was thawed at room temperature.
The DOAC-Stop Procedure {#section5-1076029619872556}
-----------------------
The DOAC levels were determined both before and after the addition of adsorbent tablets DOAC-Stop, according to the manufacturer's instructions and depending on the available plasma volume. Briefly, a halftablet of DOAC-Stop designed to adsorb DOACs was added to each 0.5mL of plasma. Thereafter, the sample was gently mixed for 5 minutes and centrifuged for 2 minutes at 3000*g* to precipitate the DOACs with adsorbent. Finally, the supernatant conjectured to be free of DOACs is collected in order to be further analyzed. The composition of DOAC-Stop is Haematex proprietary information. Concentrations of apixaban, dabigatran, edoxaban, and rivaroxaban were also assayed before and after the DOAC-Stopprocedure.
Liquid Chromatography-Coupled Tandem Mass Spectrometry {#section6-1076029619872556}
------------------------------------------------------
The plasma sample for HPLC-MS/MS analysis (50 μL) was deproteinized with methanol (180 μL) with the addition of an internal standard (deuterated analogue of dabigatran \[DAB-D3\], 20 μL, 100 ng/mL). The sample was shaken (5minutes), frozen (60minutes; −80°C), and centrifuged (5minutes; 3000*g*). The supernatant was transferred into a 350-μLglass vial (12mm × 32mm, fused insert) and analyzed.
The HPLC-MS/MS analysis was performed using the liquid chromatography system UltiMate 3000 RS (Dionex, Sunnyvale, California) coupled with a triple quadrupole 6500 tandem mass spectrometer (AB Sciex, Foster City, California). A Luna Omega C18 Polar column 1.6µm, 2.1 mm×50mm protected by guard column 4 mm ×2mm ID of the same material (Phenomenex, Torrance, California) in normal aqueous phase mode was used for separation. The mobile phase consisted of ammonium formate (25mmol/L, pH 3.5) in water and acetonitrile (MF A: 95:5 and MF B: 5:95, vol/vol). The gradient employed was 0 to 0.5minute: 15% B; 0.5 to 1.0minute: 15% to 100% B; 1.0 to 1.9minutes: 100% B; 1.9 to 2.0minutes: 100% to15% B; 2.0 to 2.7minutes: 15% B. The column was maintained at 50°C and the flow rate at 0.4 mL/min.
The targeted analytes were measured in scheduled multiple reaction monitoring mode with prolonged dwell times. Both quadrupoles were set at unit resolution. The parameters of the Turbo VTM ion source and gases were as follows: ion spray voltage, +5500V; curtain gas, 35 psi; both ion source gases, 40 psi; and source temperature, 400°C. High-purity nitrogen was used as collision gas (pressure adjusted to "medium settings"), curtain gas, and ion source gas. The compound parameters declustering potential, entrance potential, collision energy, and collision cell exit potential were optimized on previous standards.^[@bibr10-1076029619872556]^ The instrument was controlled by the Analyst version 1.6.2 software.
The analytes were detected and identified according to multiple reaction monitoring transitions and retention times in the MultiQuant version 3.0 software (Sciex, Foster City, California). Dabigatran, rivaroxaban, and its deuterated analogue DAB-D3 (Toronto Research Chemicals Inc, Toronto, Canada) and apixaban (Pfizer Inc, Dublin, Ireland) were dissolved in methanol (LC-MS quality, Sigma, Seelze, Germany) to a final concentration of 1 mg/mLexpressed as free substances. Those stock solutions were then used for the preparation of all other standards. For quantification, a series of calibration standards in methanol were prepared (concentrations 0, 10, 50, 100, and 500 ng/mLof dabigatran, apixaban, and rivaroxaban). The calibration standards were prepared in addition to drug-free plasma from healthy volunteers. All the solutions were stored at −20°C ([Table 1](#table1-1076029619872556){ref-type="table"}).
######
Multiple reaction monitoring transitions and optimized mass spectrometry parameters for the analyzed compounds.

Compound (I, II---First and Second MRM Transitions) MRM Transition (m/z) Dwell Time (ms) Declustering Potential (V) Entrance Potential (V) Collision Energy (V) Collision Cell Exit Potential (V) Limit of Quantitation (ng/mL)
----------------------------------------------------- ---------------------- ----------------- ---------------------------- ------------------------ ---------------------- ----------------------------------- -------------------------------
Apixaban I 460.1 → 199.1 20 196 10 53 8 0.22
Apixaban II 460.1 → 185.1 20 196 10 55 12 1.06
DAB-D3 I 475.2 → 292.1 100 146 10 39 18 \-
DAB-D3 II 475.2 → 175.1 100 146 10 55 10 \-
Dabigatran I 472.1 → 289.0 100 126 10 39 6 0.57
Dabigatran II 472.1 → 324.1 100 126 10 29 8 1.18
Rivaroxaban I 436.0 → 144.8 160 156 10 33 18 0.79
Rivaroxaban II 436.0 → 231.0 160 156 10 29 20 3.38
Abbreviations: DAB-D3, deuterated analogue ofdabigatran; MRM, multiple reaction monitoring.
Lupus Anticoagulants {#section7-1076029619872556}
--------------------
Lupus anticoagulant tests are performed by LAC screen tests (Werfen, Barcelona, Spain). They are improved dRVVT belonging to the group of antiphospholipid antibodies, which are directed against negatively charged phospholipids or complexes between phospholipids and proteins (either β-2-glycoprotein 1 or clotting factors such as prothrombin).
For the purpose of determining the effect of DOAC on dRVVT assays, we performed measurements using standard plasma spiked with a known DOAC amount from 0 to 250 ng/mLto evaluate the effect of DOAC itself on dRVVT.
Statistical Analysis {#section8-1076029619872556}
====================
Statistical analysis was performed using the software package Statistica version 12 (StatSoft, Czech Republic).
Results {#section9-1076029619872556}
=======
Demonstrating the Absorbing Effect of DOAC-Stop in HPLC-MS/MS {#section10-1076029619872556}
-------------------------------------------------------------
In the first step, we verified the effectiveness of the DOAC-Stop procedure in 20 samples of DOAC-treated patients; the samples were divided into 2aliquots, one of which was subjected to the DOAC-Stop procedure, and then both samples were prepared for HPLC-MS/MS testing (see [Table 2](#table2-1076029619872556){ref-type="table"} and [Figures 1](#fig1-1076029619872556){ref-type="fig"} and [2](#fig2-1076029619872556){ref-type="fig"}).
######
Determination of residual level anticoagulant drug.

Mean SD Median Minimum Maximum
--------------------------- ------- ------- -------- --------- ---------
Dabigatran 88.98 64.55 64.46 5.70 257.76
Dabigatran---DOAC-Stop 0.60 0.73 0.31 0.00 2.70
Dabigatran---% reduction 99.5 0.4 99.5 98.6 100.0
Rivaroxaban 79.38 72.32 61.01 0.94 256.68
Rivaroxaban---DOAC-Stop 1.46 2.53 0.75 0.00 10.97
Rivaroxaban---% reduction 97.9 2.3 98.9 91.0 100.0
Apixaban 92.47 69.88 71.23 20.51 324.73
Apixaban---DOAC-Stop 2.72 3.83 1.26 0.00 13.03
Apixaban---% reduction 97.1 3.4 98.2 88.9 100.0
Abbreviations: DOAC, direct oral anticoagulant; SD, standard deviation.
{#fig1-1076029619872556}
{#fig2-1076029619872556}
Subsequently, we evaluated these results against the cutoff values for dRVVT assay affection obtained by spiking standard plasma with known DOAC amounts and measuring dRVVT ratio ([Figure 3](#fig3-1076029619872556){ref-type="fig"}). Residual amounts did not exceed 2.7 ng/mLfor dabigatran, 10.9 ng/mLfor rivaroxaban, or 13.03 ng/mLfor apixaban, which are safe values that do not affect either screening or special coagulation tests, as the most sensitive coagulation test, dRVVT, is affected starting at levels of 10 ng/mLfor dabigatran, 14.2 ng/mLfor rivaroxaban, and 250 ng/mLfor apixaban.
{#fig3-1076029619872556}
Discussion {#section11-1076029619872556}
==========
There are several papers describing the elimination of the effects of DOACs in both basic coagulation tests,^[@bibr11-1076029619872556],[@bibr12-1076029619872556]^ specific determinations of individual coagulation factors,^[@bibr13-1076029619872556]^ and their inhibitors and global coagulation tests.^[@bibr14-1076029619872556][@bibr15-1076029619872556]--[@bibr16-1076029619872556]^ The elimination is reported by influencing the level of analytes themselves or the results of individual tests. However, there are no studies comparing the levels of individual DOACs before and after such a procedure. The reason is very simple: the inadequate sensitivity of functional methodologies in determining the goals of anticoagulant treatment, be it factor IIa (FIIa) or FXa.
In our study, the HPLC-MS/MS technique was used with our own method for simultaneously determining all 3DOACs currently on the market with limits of quantification of 0.57 ng/mLfor dabigatran, 0.79 ng/mLfor rivaroxaban, and 0.22 ng/mLfor apixaban. These values reliably guarantee the detection of residual DOAC activity after the DOAC-Stop procedure.
Based on the measured data, we can reliably confirm the data found by other authors, which, however, could not be verified, regarding the reliability of the DOAC-Stop procedure in the elimination of the effect of DOACs on both basic and special coagulation tests. The readings after elimination did not exceed 2.7 ng/mL of residual activity for dabigatran or 10.97 or 13.03 ng/mLfor rivaroxaban and apixaban, respectively. These are very low values undetectable by standard functional tests based on the detection of FIIa or FXa. The limit of detection is 50 ng/mLfor dabigatran functional assays,^[@bibr17-1076029619872556]^ and 20 ng/mLeach for rivaroxaban and apixaban.^[@bibr18-1076029619872556]^
If data on the potential impact of the tests are seen via the ability to influence the most sensitive coagulation assay, dRVVT, false cutoff values corresponding to a ratio of 1.2 are caused by DOAC levels from 10 to 250 ng/mL.
Conclusion {#section12-1076029619872556}
==========
Direct oral anticoagulant-Stop is a procedure that can be implemented in all coagulation tests where DOAC treatment is affected, as confirmed in our study by the validation of the most affected test for the determination of LA using dVVT. The effectiveness has been confirmed for all currently used "new anticoagulants." The procedure is simple, accessible, technically easy, and can be used in all laboratories.
**Declaration of Conflicting Interests:** The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
**Funding:** The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: Supported by the student project IGA_LF_2019_001 of the Palacký University and MH CZ---DRO (FNOl, 00098892).
| 2024-03-17T01:27:17.568517 | https://example.com/article/7268 |
ACLU: Feds are coercing Iraqi detainees to agree to be deported
Niraj Warikoo | Detroit Free Press
Iraqi immigrant detainees say that federal immigration agents with ICE are coercing them to sign forms saying they want to be deported to Iraq, according to a motion filed in U.S. District Court in Detroit by the ACLU Michigan on Wednesday.
The American Civil Liberties Union (ACLU) alleges that many Iraqi detainees were sent recently to a private prison in Georgia, where ICE (U.S. Immigration and Customs Enforcement) agents and Iraqi consular officials tried to pressure them into signing forms saying they agree to be removed to their native Iraq.
The ACLU said in its motion that ICE and Iraqi consular officials are pressuring the detainees to sign the forms because: "it is becoming increasingly clear that the Government of Iraq will issue travel documents for (the Iraqi detainees) only if the class members state in writing that they desire to return to Iraq."
Some of the Iraqis did sign them, feeling pressure to do so, said Miriam Aukerman, ACLU Michigan's senior staff attorney. One of the Iraqi detainees said some detainees were reduced to tears by the pressure to sign.
"Faced with threats of prosecution or long-term, lifetime incarceration, they felt they had no choice but to sign," Aukerman told the Free Press. Many others resisted and refused to sign despite pressure from ICE and Iraqi Consular officials, said the motion filed in court.
The Iraqi detainees "have been subjected to threats, harassment, and coercion whose purpose is to elicit their statement, in writing, that they desire to return to Iraq," read the ACLU motion. ICE "recently transferred a significant number of detainees to the Stewart Detention Facility in Georgia for (Iraqi) consular interviews. There, numerous misleading and abusive tactics were employed to obtain the detainees’ signatures on documents expressing their 'desire to return voluntarily to Iraq,' even when the detainees do not actually so desire."
The ACLU is asking the judge to block ICE from pressuring the detainees. A hearing is set for Monday in Detroit to consider the motion.
There are about 1,400 Iraqi immigrant detainees who were detained last year by U.S. Immigration and Customs Enforcement, many of them in Michigan.
One year ago this week, ICE agents arrested more than 100 Iraqis across Michigan in raids that stunned Iraqi-American Christians. Many of the Iraqis detained are Christian and say they would face persecution if sent back to Iraq, where they are a minority. The ACLU and other groups filed a lawsuit last year on behalf of the detainees; a judge then blocked their deportations.
The Iraqis detained are legal immigrants, but have criminal records, which makes them eligible for deportation. In the past, those with minor records weren't targeted for deportation, but under President Donald Trump, legal immigrants who have criminal records, even for minor crimes, are being targeted for removal.
The types of crimes committed by the Iraqis in detention vary, from marijuana possession to more serious crimes like assault or homicide.
A spokesman for the Detroit branch of ICE and the Iraqi Embassy did not immediately respond to requests for comment Thursday afternoon.
Related stories:
The ACLU said in its motion that "ICE employees threatened detainees with criminal prosecution if they refused to sign — but in fact such a prosecution would be unlawful. ICE employees told detainees that there was no possible route out of detention except removal — but in fact there is. ICE employees told detainees that if they did not agree, they would spend years in detention — but in fact U.S. law requires their release if there is no significant likelihood of removal in the reasonably foreseeable future."
The ACLU criticized the Iraqi Consulate, saying that "Iraqi consular officials also spoke with each detainee ... in many cases telling them, inaccurately, that their only route out of detention was to agree to repatriation. Only a few detainees successfully resisted this disinformation — and for them, ICE tried again, increasing the pressure, and may have extracted additional affirmations."
Aukerman of the ACLU said in a statement: "We are appalled that ICE would threaten our clients with criminal prosecution for refusing to say they want to go to Iraq. ICE is coercing vulnerable detainees, many of whom have been in jail for a year already, by saying that if they do not agree to be deported, they will be locked up for many years or even forever."
Last year, Iraqi detainees said ICE security guards or contractors were racially abusing them and denying them proper medical care and food.
ICE has strongly defended the arrests and detentions of the Iraqi immigrants, saying that they had criminal records and final orders of removal from an immigration judge. A federal judge ruled previously that some of the detainees should have their cases heard again before immigration judges.
The June 2017 arrests came a few months after Iraqi government officials agreed to take back immigrants with final orders of removal.
The ACLU motion filed this week contains personal accounts by some Iraqi detainees of what happened to them.
Dawood Salman Odish, one of the detainees, said that on May 19, he was transferred to Stewart Detention Center in Lumpkin, Georgia. He said there were about 50 Iraqi detainees at the center in Georgia.
"We were held together in a room and then called out one by one into a small office," he said in the motion. "Many of the other Iraqis who came out of that small office were upset and crying. Most of them said they had signed a document agreeing to go back to Iraq."
Odish said an Iraqi official named Wasiq then called him into the room. Wasiq's business card said he was the First Secretary of the Iraqi embassy or consulate, Odish said.
Another Iraqi "diplomat who would not identify himself pressured me very hard to sign the letter," Odish said.
Odish said he refused. The next day, an ICE officer named Stewart pressured Odish to sign the letter.
Odish said he again refused.
Contact Niraj Warikoo: nwarikoo@freepress.com or 313-223-4792. Follow him on Twitter @nwarikoo | 2024-03-03T01:27:17.568517 | https://example.com/article/5155 |
k(c) = 15*c**2 + 17*c + 51. Let y(m) = m**3 - 7*m**2 - m. Let f be y(7). Is k(f) composite?
True
Suppose -33 + 2101 = 3*r - 4*c, 0 = -2*r + 2*c + 1378. Suppose 2*y = 8, 2*o - 2788 = -4*y - r. Is o prime?
False
Let w(t) = -31*t - 81. Let z be w(-7). Suppose -114*y + z*y = 248116. Is y composite?
True
Let k(x) = 5329*x + 17. Let v be k(5). Suppose -5*g + 19123 = -v. Suppose -5*f = 4*q - 2*q - g, -5*f - 9127 = -2*q. Is q composite?
True
Let w(v) = v**2 - v + 2. Let l be w(0). Let d be 1/(0 - (1 - l)). Is 398 - (d - 2 - -5) composite?
True
Let c = 23322 + -45078. Let h = -10237 - c. Is h a composite number?
False
Let t(j) = j**3 + 4*j**2 + j + 4. Let q be t(-3). Suppose 37*i - 42*i + 5 = 0. Is q/4*(i + (346 - 1)) prime?
False
Is (-147)/((-133)/(-19)) + 512 composite?
False
Suppose 300700 = 5*x + 2*g, -120280 = 2*x - 4*x + 4*g. Suppose 26*r = 6*r + x. Is r a composite number?
True
Suppose 0 = 3*s + 6, 26*b - 49619 = 21*b + 2*s. Is b a composite number?
False
Let g = 37126 - 25163. Is g composite?
True
Suppose 0 = 13*w - 22*w - 36. Is ((-14)/w - 3)/((-21)/(-48678)) composite?
True
Suppose 2*k = -5*o + 389777, 0 = 5*k + 5*o - 980210 + 5760. Is k a prime number?
True
Suppose 2*g + 3*x - 560 = 0, 2*g + x - 2*x = 552. Let d = g + 102. Is d composite?
False
Suppose 789*w + 18805562 = 77348573. Is w a prime number?
False
Suppose 10*h = 7*h + 4*h. Suppose -c + 0*c - 5*m + 2896 = h, 4*c = 2*m + 11694. Is c prime?
False
Let f(n) = 13*n**3 - n**2 + 3*n + 1. Let t be f(-1). Is t/(-3) + -4 + (-96548)/(-12) a prime number?
False
Suppose -35*f = -49*f + 314869 + 239097. Is f composite?
False
Suppose b + 10 = 6*b - a, -5*a = 0. Suppose x + 554 = 3*w - 8244, 8803 = 3*w - b*x. Is w prime?
False
Let w = 3596 - 16760. Let g = w + 18830. Is g a composite number?
True
Let w(s) = 27461*s**2 + 7*s + 9. Is w(-1) a prime number?
False
Suppose g - 20008 = -5*r, 16010 = 4*r + g - 2*g. Let y = r + -2289. Is y composite?
True
Is (65665/10 - 7)/((-8)/160*-6) a composite number?
True
Let m(i) = -9*i**3 + 29*i**2 - 50*i + 7. Is m(-14) prime?
False
Suppose -4*o = 4, -5*r + 3*o = 2*o - 1165546. Is r/6 + 17/(-34) a composite number?
False
Let k(f) = -f - 16. Let s be k(-16). Suppose 4*w + 0*w - 4*u - 660 = 0, s = -2*w + u + 333. Suppose 0 = 2*b - 6, -2*l = 2*b - w - 32. Is l prime?
True
Let m = 18338 + -10908. Suppose -66*f + 56*f = -m. Is f a prime number?
True
Let y be ((-1427)/(-2))/((-186)/60 - -3). Let b = 15602 + y. Is b a composite number?
False
Let y be -4*41*(-7)/28. Suppose 0 = -33*u + y*u - 36272. Is u composite?
True
Suppose -4*d - u + 148867 = 0, 2*d + u - 18331 = 56102. Is d a prime number?
True
Let j be (-1 + 5)/((-112)/(-196)). Suppose 4*v - j = o - 0, o + 1 = v. Is 2578 + v + (-3)/3 prime?
True
Let a(b) = -1314*b - 5623. Is a(-25) a composite number?
True
Let v(k) = 110*k**2 + 13*k - 3. Let z be v(10). Suppose 5*p - z = 2968. Is p composite?
False
Let m(z) = 112*z + 201. Let s be 0 - ((-91)/2 - 30/20). Is m(s) a composite number?
True
Let j be (5392/6 - -1)*3. Suppose -4*a - j = -s, 2703 = s - 8*a + 6*a. Is s a prime number?
True
Let f = 864 + 46325. Is f a prime number?
True
Let c(w) = -6*w**3 + 5*w**2 + 6*w - 8. Let r be c(4). Let p = 68 + r. Let q = p - -407. Is q composite?
True
Let p = 95 - 63. Let x = p + -34. Is 1 + (-1 - x) + 795 a composite number?
False
Suppose 3*g + 14 - 2 = 0. Is 623594/68 + 6/g prime?
False
Let j = 163282 - 55221. Is j a prime number?
True
Let y(n) = -n**3 - 6*n**2 + 15*n - 6. Let p be y(-8). Suppose 5361 = p*v + k, 2*v - 4*k = -v + 8047. Suppose 5*m + v = 2*a + 17454, 2*m + a = 5902. Is m prime?
True
Suppose -150794 = -4*j + 3*r, 39*j - 5*r = 37*j + 75376. Is j a composite number?
True
Suppose z - 17034 = -4*y, -49*z + 12768 = 3*y - 52*z. Is y composite?
True
Let d = 673535 + -350214. Is d prime?
False
Suppose -p - 2*j = -597, 5*p - 2996 = -21*j + 22*j. Let l = p - -1079. Is l composite?
True
Let g = 36448 - 9759. Is g prime?
False
Let w = -4 - -10. Let p be (0 - -7)*(0 - (-3096)/21). Suppose 2*l = w*l - 4*n - p, n = -1. Is l prime?
True
Let d(p) = -15*p**3 + 13*p**2 + 11*p + 72. Is d(-23) composite?
True
Suppose -686*h = -694*h + 2004856. Is h a composite number?
True
Suppose 0 = -5*x + 3*x + 6. Suppose 4*n - x = 9. Suppose 2*f = -n*z + 929, 0*f - 3*f + z + 1410 = 0. Is f prime?
False
Let o(p) = -31 + 1067*p - 11*p + 910*p - 240*p. Is o(3) composite?
False
Let u be (-1 - 7)/(-4) - 7. Is u/(-15) - 0 - 4758/(-9) a prime number?
False
Let a be ((-50)/(-20))/(15/12). Is 270 + 2 + 10 + -10 + a a composite number?
True
Let p = -453 + 452. Is (-134976)/(-36) - p/(-3) a composite number?
True
Let d(v) be the first derivative of v**4/4 - 8*v**3 - 23*v**2/2 + 27*v + 174. Let l be (-2)/(-1) - -21 - -2. Is d(l) a composite number?
True
Suppose 0 = 6*y - 5*y - 11. Let d = -9 + y. Suppose -3*f - 469 = -d*m, 3*m - f - 933 = -m. Is m a composite number?
False
Let j = -147471 + 282038. Is j prime?
False
Suppose -4 = -3*c + k, 0 = -3*c - 2*k + 4 + 6. Suppose -4 = -4*l + 8*l, -c*l - 6 = -2*a. Is (-3 + a)/(4/(-3508)) prime?
True
Suppose 0*b + 7 = 4*j + 5*b, 0 = 4*b + 20. Suppose -l - 723 = -0*l. Let v = j - l. Is v a composite number?
True
Let s(z) = 5*z**3 + 2*z**2 + 41*z - 7. Is s(24) a composite number?
False
Suppose -5*v + 5*y = 45, -y + 9 = -2*v - 5. Is v + 1157 - (-3 + 4) a prime number?
True
Let l = 52807 + -5480. Is l a composite number?
True
Suppose 0 = -11*a + a + 20. Suppose -4*k = a*k - 12762. Suppose 13*q + k = 16*q. Is q a composite number?
False
Let v be (2130/9)/(12/8694*3). Suppose 53*h - 35754 = v. Is h a composite number?
False
Let g = -2245 + 3358. Suppose 9*r - 2*r = g. Suppose 0 = 4*h - 3*h - r. Is h a prime number?
False
Let t = -155 - -220. Suppose 73 = 2*d + t. Suppose 3*x + 4 = 2*s + 4*x, 2*s + 5*x - d = 0. Is s composite?
False
Let a be 17/3*(0 - 3). Let m(b) = -12*b**3 - 32*b**2 + 6*b - 57. Let s(j) = 5*j**3 + 16*j**2 - 4*j + 28. Let p(u) = -2*m(u) - 5*s(u). Is p(a) prime?
True
Let y(g) = -2*g**2 - 41*g - 44. Let i be y(-19). Suppose -13*n + 398814 = i*n. Is n composite?
True
Let p = -27908 + 47473. Suppose -l + p = 55*y - 52*y, -4*y + 5*l = -26112. Is y a prime number?
False
Let f be (6 - -1)*((-27)/(-21) - 1). Suppose 28*c = -f*c + 34230. Is c composite?
True
Let m be (-5 - (-150)/6)*1. Suppose 3*a - m + 8 = 0, -3*y + 18847 = a. Is y a prime number?
False
Let h be 2/(-6) + (-39683)/21. Let s = h - -4393. Is s prime?
True
Let h be ((-3 - 1) + 3)*-2. Suppose 0 = 3*p - h + 23. Let t(r) = 16*r**2 + 11*r + 14. Is t(p) a prime number?
False
Let y(s) = -599*s - 255. Let h be y(-35). Suppose -3*i + h = -w + 7056, -3*i = 5*w - 13684. Is i composite?
True
Let l be 0 + (-4608)/(-42) - 2/(-7). Is (-44)/l*3985/(-2) composite?
False
Let d = -31 + 22. Let n be (30/d)/((-2)/(-6)). Let f(u) = u**2 + 8*u - 1. Is f(n) composite?
False
Is (-7)/4 - (771625/(-12) - 218/327) prime?
True
Suppose -2*n + 4*f - 7*f + 11669 = 0, -f + 5836 = n. Is n composite?
False
Let u(r) = 198*r**2 + 34*r + 21. Let a(q) = 2*q**2 - 55*q - 140. Let o be a(30). Is u(o) a prime number?
True
Is (8/14 + (-3730)/35)/((-30)/2715) prime?
False
Let j = 40104 + -21230. Is j a prime number?
False
Suppose -23 = -7*n - 9. Suppose -9*a + 11*a + n*i = 4128, -3*a = -5*i - 6184. Is a composite?
False
Let w = 372786 + -218497. Is w prime?
False
Let y be 36/21 + 11/(154/4). Suppose 0 = -y*f + 2, 2*q - 11489 = -q + 4*f. Is q composite?
True
Let g be (2 + -1)/((-13)/(-50479)). Suppose 2*u = 4*u + 2*z - 1964, -4*u + 5*z = -g. Is u a composite number?
False
Let g = -57 + 59. Suppose 6*v - 2*v = i - 1012, g*i - 1998 = -5*v. Suppose i = 2*w - 438. Is w prime?
False
Let f = -245 - -3039. Suppose j - f = -2*m, -m - j + 1397 = -6*j. Is m composite?
True
Suppose -5*o - 17336 = -2*v, 4*o = -5*v - 0*o + 43307. Is v composite?
False
Suppose -7*l = 5*g - 3*l - 1643, 0 = -g + 3*l + 340. Suppose -3*x = -2132 - g. Is x a composite number?
False
Let m(i) be the second derivative of -8519*i**5/20 - i**4/12 + 9*i. Let u be m(-1). Let r = u + -4177. Is r a prime number?
False
Suppose -291517 = 16*b - 25373. Let y = 1869 - b. Is y composite?
False
Suppose 1640 = 33*x - 31*x. Suppose 0 = -f + 2*v + 559, 3*f - 2*v + 84 - 1757 = 0. Let w = x - f. Is w a prime number?
True
Suppose 525 = 2*h - 821. Let y = h | 2024-07-05T01:27:17.568517 | https://example.com/article/3272 |
Custom Couture Gowns
Congratulations on your recent engagement!
We would love to be apart of your wedding experience. At ELA Designs, we have over 25 years of experience servicing brides and their bridal parties in the Greater Toronto area, Ottawa area and Niagara region. We are in the business of creating dream wedding gowns for brides and their bridal parties. Our process begins with a consultation where the gowns design are finalized and measurements are taken. A consultation fee is applied for consultations done in your own home or in our Niagara studio.
For consultations done in our studio, the fee will be deducted off your total dress price. The dress will be made to order by measurement for each member of the party.
If any of the bridal party members want an additional fitting at a later date, it will be at an additional fee.
Voila.
E.L.A Designs prides itself in having created thousands of couture gowns for clients in Canada for years. We would love to turn your bridal gown experience into a memorable one by designing a custom made gown that you will love. | 2023-08-31T01:27:17.568517 | https://example.com/article/7220 |
+ 0*x**5 + 0*x**4 + 2/5*x**6 + 11*x. What is the derivative of d(a) wrt a?
48*a**3
Let p(j) = 6*j**3 - 6*j**2. Let m(y) = -23*y**3 + 25*y**2. Suppose -2*h - 3 = -7. Let n(z) = h*m(z) + 9*p(z). What is the third derivative of n(o) wrt o?
48
Let x(n) = -29*n**3 - 24*n**2 - 7*n - 11. Let t(p) = 10*p**3 + 7*p**2 + 2*p + 4. Let m(w) = 7*t(w) + 2*x(w). Find the third derivative of m(h) wrt h.
72
Let j = 8 - 2. Let u be (-175)/(-30) - 30/36. Find the second derivative of 3*m - u*m + 0*m**4 + 0*m**4 - j*m**4 wrt m.
-72*m**2
Differentiate 344 - 2*y**2 + 4*y**2 - 20*y - 359 wrt y.
4*y - 20
Let g(y) be the first derivative of 19*y**5/5 - 109*y + 23. Differentiate g(k) wrt k.
76*k**3
Let c(z) be the third derivative of 0*z**6 + 0*z - 2/105*z**7 + 0*z**5 - 10/3*z**3 + 0 + 0*z**4 + 19*z**2. Differentiate c(f) with respect to f.
-16*f**3
Suppose -8*r + 294 = -98. Find the third derivative of -r*q + 49*q + 10*q**5 + 16*q**2 wrt q.
600*q**2
Suppose 3*f - 5*q = 2*f - 17, -4*f = -3*q. What is the third derivative of -3*o**2 + 0*o**2 - f*o**5 - 6*o**5 wrt o?
-540*o**2
Let q(r) = 224*r**2 + 2*r + 461. Let h(k) = k**4 + 224*k**2 + 3*k + 460. Let y(j) = 2*h(j) - 3*q(j). What is the first derivative of y(s) wrt s?
8*s**3 - 448*s
Let m(l) = l**2 - 9*l + 2. Let a be m(9). What is the second derivative of -9*f - a*f**3 - f**3 + 3*f - f wrt f?
-18*f
Let w(f) = 234*f**4 + 5*f**3 - 7*f**2 - 5*f - 10. Let m(o) = o**4 - o**3 + 2*o**2 + o + 2. Let q(i) = 5*m(i) + w(i). Find the third derivative of q(l) wrt l.
5736*l
Let s(p) = -p**2 - 6*p - 6. Let j be s(-4). What is the second derivative of -6*f**2 + 2*f**2 + 28*f - 5*f**2 - f**j wrt f?
-20
Find the third derivative of 30*k**2 - 7283 - 10*k**4 + 7283 wrt k.
-240*k
Suppose -3*w - 14 = 5*p - 51, 0 = 2*p - 5*w + 10. Find the second derivative of -14*u**4 + 20*u - 12*u**5 - 3*u**p + 14*u**4 wrt u.
-300*u**3
Let b(a) be the first derivative of -17*a**3/3 - a**2 - 302*a + 306. Differentiate b(c) wrt c.
-34*c - 2
Let s(b) be the third derivative of 0*b**3 + 8*b**2 + 19/120*b**6 + 0 + 0*b - 11/30*b**5 + 0*b**4. Find the third derivative of s(f) wrt f.
114
Let n = 18 + -16. Suppose d = 2*b - 18, n*d = -3*b + 15 + 5. Differentiate -b + 4*z**4 + 981*z**3 - 981*z**3 with respect to z.
16*z**3
Let i(v) be the first derivative of -178*v**5/5 - v**2/2 + 56*v + 117. What is the second derivative of i(u) wrt u?
-2136*u**2
Let w(r) be the third derivative of -r**6/8 + 97*r**5/60 + r**3/6 + 142*r**2 - 2*r. What is the third derivative of w(y) wrt y?
-90
Suppose 57 = 4*q - 7. Let b(d) = d**3 - 15*d**2 - 16*d + 4. Let h be b(q). Find the first derivative of h*m**3 + 17 - 3 - m**3 - 1 wrt m.
9*m**2
Let a(c) be the second derivative of 9*c**4/4 + 6*c**3 + c**2 - 2*c - 3. What is the second derivative of a(m) wrt m?
54
Differentiate -132 + 16*z**2 - 115 + 344*z**2 + 249*z**2 + z - 62*z**2 with respect to z.
1094*z + 1
Let t = 5 - 2. Let c be (-35)/(-11) + 6/(-33). Find the second derivative of -t*r**c + 2*r - 3*r + 2*r**3 - r wrt r.
-6*r
Suppose -15 = 3*f - 48. Find the first derivative of 15 - 14*d**4 + f*d**4 + 3 wrt d.
-12*d**3
Suppose 15 = 3*d + 2*d - 5*g, d - 7 = -g. Suppose 0 = 3*c + 3*t, c - t = -d*t - 9. What is the second derivative of 2*f + f - c*f - 3*f**5 + 6*f wrt f?
-60*f**3
Let o(w) = 325*w**5 + 5*w**3 - 222*w**2. Let c(m) = m**3. Let l(q) = 5*c(q) - o(q). Find the third derivative of l(h) wrt h.
-19500*h**2
Let y(j) be the third derivative of -j**5/60 + 17*j**4/24 - 40*j**3/3 + 82*j**2. What is the derivative of y(o) wrt o?
-2*o + 17
What is the second derivative of -218*o**4 - 283*o - 274*o**4 + 586*o**4 + 0 + 0 wrt o?
1128*o**2
Let c be (-80)/(-25) + (-1)/5. What is the derivative of 3*a**2 - 3*a**2 + 3 + 0*a**2 - 7*a**c wrt a?
-21*a**2
Let r(s) = 4*s**2. Let h be r(-5). What is the derivative of -39*k**4 - k**4 + 139 - h wrt k?
-160*k**3
Let t(z) = -z**3 - 17*z**2 + 19*z + 22. Let f be t(-18). What is the second derivative of 0*g**f - 12*g**5 - 149*g + 123*g + 0*g**4 wrt g?
-240*g**3
Suppose -1 + 5 = -4*y - 5*x, 0 = 3*y - 4*x - 28. What is the first derivative of -11 - y*p - 4*p + 22 + 17 wrt p?
-8
Let n(i) = 227*i - 54. Let u(c) = -113*c + 27. Let l(a) = 6*n(a) + 13*u(a). Find the first derivative of l(b) wrt b.
-107
Suppose 4*z = -13 + 33. What is the third derivative of -q**5 - q**z + q**5 + 6*q**5 + 11*q**2 wrt q?
300*q**2
Let u(i) = -340*i - 251. Let n(h) = -h + 1. Let v(m) = 3*n(m) + u(m). What is the first derivative of v(w) wrt w?
-343
Let o(g) be the second derivative of -41*g**3/6 - 45*g**2/2 - 2*g - 19. Differentiate o(p) wrt p.
-41
Let o = 6 - 12. Let p(y) = -3. Let x(a) = a + 7. Suppose -55 = 3*d - 2*h, 4*d + 2*h - 7*h = -85. Let f(r) = d*p(r) + o*x(r). Differentiate f(c) wrt c.
-6
Let p be (3 - 76/8)*30. Let i be p/(-27) + (-6)/27. Find the second derivative of -k - k - i*k**3 + 0*k - k wrt k.
-42*k
Let h(n) be the second derivative of 0 - 1/2*n**4 + 0*n**2 - 20*n + 10/3*n**3. What is the second derivative of h(b) wrt b?
-12
Let i(z) = -2*z. Let g(l) = -92*l - 115. Let y(m) = -g(m) - i(m). Differentiate y(u) with respect to u.
94
Find the first derivative of 13*f + 10*f - 5*f**3 + 6*f - 28*f - 218 wrt f.
-15*f**2 + 1
Let v = 16 - 14. Find the third derivative of -5*g**2 + 13*g**2 - v*g**2 + 5*g**4 wrt g.
120*g
What is the derivative of -2*u + 94*u**4 + 42 + 24 - 35362*u**3 + 35362*u**3 wrt u?
376*u**3 - 2
Let d(z) be the first derivative of -9/5*z**5 + 0*z**4 - 2*z**2 + 0*z**3 + 0*z + 4. Find the second derivative of d(f) wrt f.
-108*f**2
Find the third derivative of -10*v**3 - 26*v**3 + 2*v**2 - v**6 + 26*v**3 + 126 wrt v.
-120*v**3 - 60
Suppose -20 = -4*z + 4*p, -z + 14 = p - 1. Differentiate 3 + 3*k**2 + z + k**2 - 2 with respect to k.
8*k
What is the third derivative of -453*v**4 + 108*v**2 + 66*v**2 + 459*v**4 + 13*v**5 wrt v?
780*v**2 + 144*v
Let m(k) = k**3 - 6*k**2 + 5. Let g be m(6). Suppose 2*y = 5*w - 6, 3*y - g = -2*w - 14. What is the first derivative of 5 - z**2 + w*z + 0*z wrt z?
-2*z
Let g be (-1)/(-3) + (-16)/(-6). Let n be g/6 - 10/(-4). Differentiate -4 + 9*s**3 - 4 - n*s**3 wrt s.
18*s**2
Let c = 111 - 109. Let s = 2 - -1. Find the first derivative of j**2 - 9*j**c + 2 + s - 4 wrt j.
-16*j
Let v(q) = -q**3 - 16*q**2 + 17*q + 16. Let c be v(-17). Find the third derivative of 16 - c - 11*o**5 - 9*o**2 wrt o.
-660*o**2
Suppose -v + 4*v + 57 = 3*q, 2*v = -4*q + 76. Suppose 5*t + z = -2*z + 22, q = 4*t + z. What is the second derivative of 7*u + 3*u**5 - 7*u**t + u wrt u?
-80*u**3
Let i(d) = -40*d + 4. Let g(m) = 3 - 6 + 930*m - 931*m + 2. Let u(p) = -4*g(p) + i(p). Find the first derivative of u(b) wrt b.
-36
Suppose -144 = 12*z - 204. Let x(q) be the third derivative of 11*q**2 + 1/60*q**6 + 0 + 0*q**z + 0*q - 5/6*q**3 + 0*q**4. What is the derivative of x(l) wrt l?
6*l**2
Let u = -38 + 40. Differentiate -8 - 3*t**2 - t**2 - 9 + 0*t**u wrt t.
-8*t
Let l(c) be the second derivative of 13/3*c**3 - 11/10*c**5 + 0*c**4 + 26*c + 0*c**2 + 0. What is the second derivative of l(t) wrt t?
-132*t
Let v(n) be the second derivative of -77*n**3/2 + 310*n**2 + 596*n. Differentiate v(z) with respect to z.
-231
Let l = -33 - -28. Let v(z) = -16*z**2 + 5*z + 10. Let s(j) = -8*j**2 + 3*j + 5. Let i(a) = l*s(a) + 3*v(a). Find the first derivative of i(d) wrt d.
-16*d
Let g be (-95)/(-20) + (-2)/(-8). Suppose 0 = -5*j + 19 + 6. What is the third derivative of -7*h**j + 3*h**2 + 4*h**g + h**2 wrt h?
-180*h**2
Let p(z) be the first derivative of z**6/3 - 2*z**3/3 + z**2/2 + 2*z + 77. Find the second derivative of p(q) wrt q.
40*q**3 - 4
What is the first derivative of -4*o**4 - 35*o**4 + 139*o**4 - 676 + 53*o**4 + 84*o**4 wrt o?
948*o**3
Let o(c) be the first derivative of c**7/210 + c**5/40 - 4*c**3 + 2. Let w(a) be the third derivative of o(a). What is the second derivative of w(r) wrt r?
24*r
Let o(u) be the first derivative of 38*u**3 + 573*u + 743. What is the first derivative of o(a) wrt a?
228*a
Let t be 0 + (20/10)/4. Let m(w) be the third derivative of 0*w - t*w**3 - 1/30*w**5 + 0*w**4 + 0 + 2*w**2. Find the first derivative of m(g) wrt g.
-4*g
Let w = -21 - -20. Let y = w + 4. What is the derivative of 2*m**4 + 10 + 5*m - 8*m + y*m wrt m?
8*m**3
Let l(i) = 19*i - 57. Let o(c) = -4*c + 2. Let j(a) = l(a) + | 2024-06-02T01:27:17.568517 | https://example.com/article/5373 |
decreased hippocampal commissure size Gene Set
reduced size of the triangular subcallosal plate of commissural fibers resulting from the converging of the right and left fornix bundles which exchange numerous fibers and which curve back in the contralateral fornix to end in the hippocampus of the opposite side (Mammalian Phenotype Ontology, MP_0008222) | 2024-02-14T01:27:17.568517 | https://example.com/article/3429 |
Missing Man Identified as Body Found Last December
Today, a mother in Oklahoma watches for a package carrying her son’s remains. She’s tracking its path using a shipping number as the container makes its way across the country to her home. Inscribed on the package are words she asked a Humboldt County funeral director to write down. The message addressed to all who handle the remains of Austin Cade Brown simply says, “Mama requests that you handle this package as if he were your own son.”
The mother, 69-year-old Vicki Anderson, who asked those words be written on the package last talked to her 41-year-old son one year ago on December 13, 2016. Even though he was homeless, Vicki said he never went long without reaching out to her. “My son called no matter what,” she said. “Austin had problems and I know that….He had addiction issues, [but] it wouldn’t be more than 10 days that he would go before he called me. It doesn’t matter what he was doing.”
When Christmas came and went last year, she was worried sick. “I knew something wasn’t right,” she said.
Vicki didn’t have a lot of money but she was determined. “…I got hold of two women I found on Facebook. They worked with the homeless [in Humboldt County].” Vicki explained her concern about her son to the two local women and “they made posters and put them all over McKinleyville, Arcata, and even Eureka asking him to call home.”
He never did.
Austin Cade Brown
For the next 11 months, Vicki worried and wept. “He’s my youngest,” she explained. “I lost my oldest when he was nine to an accident. I kept thinking it can’t happen here again.”
“I called the Public Information Officer of Humboldt County Sheriff’s Office and formerly entered him missing in…January,” she told us.
The two women who helped Vicki, Megan and Annie (who didn’t want their last names used), confirmed they had searched for Austin throughout the last year. However, though Annie put her phone number on the flyers and posters no one reached out to her. “I never got one call from anyone,” she said.
But Austin was familiar to many. “A lot of people did know him,” Megan explained. “Most [street] people we talked to recognized him. Everyone really liked him.”
But Annie said that when they dealt with people in authority, “I’d get concerned that [Austin’s disappearance was] not considered as important because of his lifestyle.”
As the year slowly unraveled, Vicki said she cried almost every day. Sometimes she heard terrible stories that she didn’t know if she believed they were true or not. At one point, a woman who had known Austin told Vicki that he had been murdered, “In June, I came across an address that I had sent [Austin] some Christmas presents,” Vicki said. She found a number and called. According to her, the woman there exclaimed, “I thought you knew. Someone shot him and threw him off the [Samoa] bridge.”
Vicki called law enforcement and told them what she had heard, but they reassured her that they hadn’t found any bodies that fit Austin’s description.
Eventually, the Thursday before Thanksgiving, Vicki got a call from the Humboldt County Coroner’s Office. An officer told her that the DNA from a body that was found on December 26, 2016–13 days after she last heard from her son–matched Austin’s.
Vicki said she felt “sick..just sick…I suffered for 10 and a half…11 months knowing he was in trouble. When I was out there begging for help, he was there …Girl, they had him there the whole time.”
Lt. Mike Fridley of the Humboldt County Sheriff’s Department confirmed that the body found on December 26, 2016 near the Ma-le’l Dunes was Austin Cade Brown. Fridley said that Austin’s body was “pretty decomposed–all it was wearing was shoes and socks.”
He explained that though an autopsy showed Austin died from “cold water drowning” his body was “pretty well decomposed–no teeth, no fingerprints.”
The agency sent off DNA in January, Fridley said. They didn’t get results back until late November. Then they were able to match the results with Brown.
Fridley pointed out that the DNA is sent to a lab that is clogged with cases. He said, “A rush takes six to eight months.”
Since she got the news about her son, Vicki has been struggling. In part, this is because she would never see Austin alive again, but also because she is frustrated by how long it took for her to learn of her son’s death after his body was found.
“We need a change,” she said her voice choked with tears. “People are waiting years to hear…to find out what happened to their children…People are missing their children.”
Vicki said she doesn’t really blame the local Coroner’s Office, “I know how hard it is to do jobs like that,” she said. But, she would like to see changes in the system to help the families.
“This is a horrible system,” she said. “Something isn’t right…We can’t do anything about how this was done for Austin,” but she has a list of changes she’d like to see made to help families in the future.
She’d like for the DNA process to be sped up
She’d like a better system for connecting those who are missing with the unidentified bodies that are found
She’d like better communication between the Coroner’s Office and the advocates for the missing.
She’d like the Coroner’s Office to enter unidentified bodies into NamUS.
She’d like those deceased family members who have been identified sent home sooner.
She’d like to see more sensitivity training for both law enforcement and the Coroner’s office in how to deal with the families of the missing and she’d like for them to get support to integrate their training into their workplaces.
But most of all, she said, “I want some perceptions changed of those who are homeless…People have no idea who is out there on the streets and why.”
Vicki said she would like to tell Austin’s story so that people’s hearts “open to those who live outside the norm… Addiction is not a disease…It is a symptom of the state of our society… .”
She would like people to show more compassion to each other. “Handle everyone you see on the street as if they were your own son and daughter,” she pleaded. “Don’t get cynical and detach so much that you don’t have a heart anymore.”
When she spoke to us on the 28th, she said, “[Austin]’s not home yet. He’s still sitting in the Coroner’s Office. We won’t have peace until he is home.” But today, Vicki’s watching as the package moves across the country from Humboldt County to Oklahoma. “When he gets home to me, he can rest in peace,” she said. “He’ll not be cold or hungry anymore.”
[Vicki and Austin’s first names were used throughout the story at the request of Vicki]
Oh mama…I am so sorry.
Austin’s story is beyond tragic. The points you make are ever so valid.
Agreed DNA results often take FAR too long…yet sometimes I see rapid DNA returns as with the lost young lady near Hayfork.
Yes 100% all John or Jane Does should be listed automatically on the national missing person site without question or delay.
So a missing man is found deceased, with clothes and tattoo, in the water, plenty of identifying marks, and the mother is not informed or asked to come down to identify. How many bodies are they finding that they can’t make a simple phone call? This is the sad state of affairs of the homicide division and the sheriff’s department in general. My heart goes out to the other relatives of the murdered, missing and inexplicably deceased. Competency and compassion are not on significant display at the Humboldt Sheriffs Department.
Austin’s body was very much changed. He had almost no hair and had been disturbed by animals. He was found only wearing socks and shoes. Fingerprints and dental records couldn’t be used as the tips of his fingers were damaged and all his teeth were lost. While the fact he had tattoos could be seen, from my understanding of talking with people who have some knowledge, they weren’t intact. Here’s an article on bodies found immersed in water. https://blogs.scientificamerican.com/news-blog/how-long-do-dead-bodies-remain-inta-2009-06-10/
Thank you Kim for the warning to mama. I love that you care so much in your reporting. This is such a sad story. You write so eloquently and from a point of mindfulness and compassion and I for one appreciate that so very much.
Kym- I am a very very close friend of Vicki’s even though she is 20 years my elder… her son and my boyfriend were very close, and my boyfriend befriended him and gave him odd jobs to work to help support himself, along with his momma!!
Through these months of the unknown… I became close to Vicki personally (before them, not much in common) … I’ve sat in her truck, & just sat and listened … to every detail of whatever she wanted to express at the time… until I got the message that – they had officially matched Austin’s DNA- in the week or so since, all I can do is be there for her… today I got the message … Austin is home… as his very good friend is making his urn… in our shed in the backyard… I can’t bring myself to go say one last goodbye! To the ash’s of Austin… for I want to remember the free spirited young man- that entered our lives… & most certainly left an impact on Miles life… tomorrow I’ll go see Vicki! Hug her tight and go pick out a picture frame… of the picture she sent me that’s her favorite!! To put next to the memorial she has made for him… God bless you & your diligence! You let her words he heard, & I couldn’t of asked for more. As I continue my friendship with my old hippie friend as I call her… I will hug her so tightly & remain a strong tree for her to lean on as we celebrate Austin’s life!
And the society trying to cope. Dealing with drug addiction and homelessness for other reasons is so very much harder than most people believe. It is not that people won’t help but that, after keeping up with other needs, they do not have the resources left to do everything for the people who need everything done for them and who resist such help that is offered.
It’s sad and haunting for me to see the picture of the bright-eyed, healthy young kid on the right and how it all turned out in the end. All the potential in the world, a future to look forward to, and this is how it ends. But strangely enough, he doesn’t look fully happy in his picture either.
Mom did her best, it sounds. I wonder how and where things went sideways.
There are no guarantees, life can be unfair on its face.
Keep your kids and families warm, loved, safe and sound. That’s the only thing we can do, and we must do it well.
So sadden for your loss and for the time it took for identification. My hope is DNA will be taken at birth and kept in a national data base. I feel that each state district should have their own DNA lab so these long delays won’t happen.
Persons rights to privicy is very important. More so now than ever before persons personal privicy is under attack everyday, in ways most people dont even know or understand. Even when people think they are protecting their privicy , say by removing location permissions from apps on their phone, and disableing geo tags or face id, there are other apps which store that data and routinely send that data off to companies and goverments. So even while one is under the impression that they are not allowing personal info to be stored or transmitted about them,it is. To me this is much worse, as persons are give a false sense of privicy. A DNA data base is just one step further. It could start out like you would want, but as with anything else it would soon be backdoored hacked etc. And that data could be used in very harmful ways. It isnt that people have things to hide it is the way that people take advantage of harmless ideas and weaponise them later on. I am not a tinfoil hat everyone is watching us type of person, i am just very aware of data and tracking collection that is going on today. Anyone that truely stays on top of software and networks knows. Back just a few years ago cell phones came with removeable storage, today they dont offer one. Because folks were able to run apps that would distort the tracking info sent to companies off of them. It was widely known that if you did not want your phone to spy on you , you needed to remove the battery, not just turn it off. Try finding a new phone today that has a removal battery. Snowden reviled that goverments could listen to people in their homes through samsung tvs. Really ? Knowledge is power, and i think we do not need to give anymore power to companies or goverments over our own selves. DNA is not just a way to id someone, it is infact excatly what makes you who you are, there are companies researching dna seeking viruses. Meaning that a viruse can be used to injure the only specife dna code and all others would not contract it. Think about that ? Genocide without armies ? Just create a targeted virus. If you rhink this is far fetched , look at what is happening with gene thepary for canser treatments . Please seriously think about the massive amouts of abuse and misuse data bases already have. And stop trying to take others rights away to make you desires , or wants easier for you to get.
I know that DNA may be obtained through a search warrant, by donating blood, and/or by signing away your rights to a medical facility; however, I am suspicious of companies (i.e. 23andMe), that require a saliva sample in order to trace a person’s genealogical origins. Your biological material yields a lot of information about your health, as well as health risk. Creating a designer biological weapon that targets certain individuals is not that far-fetched. Also, my concern is the possibility of cloning the sample, to later be placed at a crime scene in order to frame the person.
This tears my heart up and I didn’t even know the man or his family. Thank God she finally has closure. Her points are helpful and if we help her petition the powers that be into being, future families might be spared. Who do we send her petition to? The county & city mayors and BOS? The BOS are too busy being politically deviously correct, but maybe they need a distraction from their buttsides.
I will focus on the solutions to distract from my painful disappointment and disgust that filled me while reading her plight.
He was well loved and well liked both. Not many people can claim that title. My deepest condolences to you and to all who loved him.
This is tragic and I am sorry for the loss of a loved son.
There is a solution to this. Parents of the homeless and adult children of older homeless people should welcome their family back into their homes and hearts. Help them recover from what ever addiction they may have. Give them all the love you claim you have for them before they meet a tragic end. Once they have passed on there is no amount of sorrow or tears that will bring them back.
Why should one blame everyone else for the loss of their parents or child? If they are loved so much, as one would claim, come and get them and bring them into your home before it is too late.
This would solve several issues. The person would be in a warm and loving environment. There would be NO homeless on our streets. Law enforcement could start doing the job we need them to be doing. The jails would not be filled to over capacity.
I’m so committed to communication in this area that even with staggering grief I must continue to remind as previously stated the answers are present inside empathy comassion non judgement and unconditional love. And that my friend does not include “I will help/love you IF/WHEN you.
Just because you want someone to get help or change doesnt make them want to. Vicki loved her son tremendously and asked him multiple times to come home. He had chosen a vagabond lifestyle and it seems like for a long time it wasnt hurting anyone, as he would check in with his mom regularly. That is how she knew something was wrong. Because her love for him was so unconditional. If it werent for mother’s instinct, she may not have had any idea something had happened to Austin. She started searching the best she could from Oklahoma only a few weeks after the last time she spoke to him, and only a week or two after he passed away. Love isnt defined by opening your home and trying to make someone walk the path that you think is best. Its about loving someone as they are and being there for them no matter what, even if it means having to reach across the country to strangers and search and ultimately track down your child who has been sitting in a box unidentified for a year, and finally sign for your son when someone once again delivers him and places him into your arms. Nice work on the story Kym, and Vicki, for being Austin’s voice so that his death wasnt in vain.
Addressed to Be Responsible… I have to wonder what world you live in?… You can’t force someone to accept help. There are so many homeless people who don’t want to go home to family! (They feel happier on the street.) It doesn’t matter how much their family loves them or wants them home so they can help them….if a person isn’t ready for help/just doesn’t want it, nothing can be done. A person has to want help and want to get better!! Vickie did the best she could with the circumstances…she always spoke with him when he called and her love for Austin comes through clearly in the article. The dedication and perseverance she has shown in searching for her son is beyond measure! I sure hope you never have to go through losing someone you love to the streets!
Vickie, I am so very sorry that your son has passed away!! I cannot even imagine the pain you’ve been through and continue to go through! Please know that I applaud you for your love and efforts on behalf of your son, Austin! God bless you!
Let me educate you – here as eloquently as I can!! While I am so pissed at your statement!! We asked Austin to come home, begged him to come home… no questions asked!! He always had a home without judgement or ridicule of his known addictions !! – alas he chose the road he traveled… as a free spirit!!! If we had known the future … we would of kidbapped him and brought him home. However I am a believer… when it’s your time?? It’s your time!! Don’t pass judgement on a woman you don’t even know !! Believe me when I say this… Vicki would of moved mountains for her son Austin before she would allow him to leave this earth! I will stand solid and defend Vicki as I know – Austin never once had to be homeless. It was a choice !! Of his own!! His room is still intact !! Waiting for him to come home !!
This right here shows a lot of people… not all is seen unless your 5 houses down ! @angered by your statement !🤔🤔
Heartbreaking story… I am so very sorry for this mother’s suffering and loss. I was homeless and addicted as was my now adult child recently. My son almost lost me to depression and addiction and I almost lost him to his addiction. No amount of love or help could steer us off the paths we chose;( we had to want to change. It took him 6 months in county, 2 felony drug possession charges, and 6 months in rehab, as well as 6 years felony probation to quit meth. If he had been charged with meth possession in California , he would probably have gotten a misdemeanor and been dead by 21. We celebrated his sober 21st birthday earlier this year. As much as I don’t like the idea of throwing drug addicts in jail, sometimes that is the only way they are forced into sobriety . Vicki, my heart goes out to you and I hope your heart can now heal . Much love to you from Georgia.💜Stay strong and carry on.
I remember a friend if mine named “Ricky” a female & helped with the birth of my son Matthew in 1986 at Garberville hospital,she got a hold of me and told me how upset she was at that time, a year ago that her friend jumped-pushed off the Sanoma Bridge.
Now I understand her grief. It was Austin. She is homeless so keeping in touch is scarce.
I’m so sorry for your loss Vicki.
Austin was so loved there.
You are not alone.
God speed
Janice, was he pushed or did he jump? Those are two different scenarios. Do you know Ricky’s full name or where she hangs around? My number is 707-572-4366. Anyone who knows what happened to Austin, who, what, where, when, why, or how, call me. You can even be anonymous. There is a $100 cash reward for anyone who can give us answers. Thanks.
Vickie~your tragedy has touched a lot of hearts. Your well-spoken concerns need to be taken seriously and lead to change in the way evidence is handled. It is my hope and prayer that we can perhaps get legislation passed (perhaps Cade’s law)…. addressing how DNA is handled, better funding and communication. LIfestyle choices don’t just affect the person choosing it. You are in my heart and prayers as you wait for you beloved son’s remains. Let’s not make this the end to his story. Let us not waste this lesson in how things can be done better. Never give up.
I lost my son in an accident where he was flung into a river. Over a year later the coroner from another city called and said one of my boy’s bones was found a year ago and through dna tests it was proven to be my son. His father was deceased and nobody asked for my DNA, so how can they tell me after a year of not being able to find any of my son’s remains that this small bone was his. My heart goes out to you mom, my oldest son chooses that lifestyle and I’ve tried everything to bring him home, but I feel your pain and I truly understand your frustration… Hugs for you mom
All my love for reaching out to me. I will have a memorial service January 6th. Please write a story of your knowing him so that I can read at that time I’m on Facebook and Messenger
Vicki Anderson
207 Asbill Ave
Yukon, OK. 73099
I would appreciate anything you want to share GUEST | 2024-07-28T01:27:17.568517 | https://example.com/article/2256 |
Zeitgeist
With the advent of Edward Snowden, joining Bradley Manning, Julian Assange and others, I’ll be reposting a few articles written years ago – to remind us of what we’re ending on this planet and how deep the rabbit hole goes.
The tone is now a bit anachronistic, given where we are in the transformational cycle, but the facts were accurate at the time and many still apply.
It’s time to run the Black Hats outta town. It’s time to end the New World Order’s game, close the casino, and lock the doors.
It’s time to lower the boom of justice on the Black Hats in the World Bank, the IMF, the BIS, Congress, the Federal Reserve, the Bilderbergers, Goldman Sachs, Bank of America, the corrupt judicial system, the corrupt police system, Northcom, NORAD, CIA, FBI, everyone.
Everyone who turned the world into a reckless gaming house in which the rich got richer and the poor got poorer, everyone who grew more powerful at the expense of the rights and freedoms of others.
Everyone who denied basic medicare to citizens. Everyone who made subprime loans to poor people, collateralized them, raised their rates, and then evicted the owners. Everyone who took out “Dead Peasant” insurance policies on their employees and made millions from them, sharing none with the relatives of the deceased.
Everyone who engineered 9/11, Oklahoma City, the London bombings, Madrid, and Mumbai to stampede the world. Everyone who began illegal wars in Afghanistan and Iraq, who took away citizens’ rights, pushed for martial law, and set up FEMA camps to incarcerate “trouble-makers.”
Everyone who designed viruses – AIDS, SARS, avian flu, and now swine flu – some of them racially-specific – and vaccines whose only purpose was to sicken and kill in the name of depopulating the globe. Everyone who seeded the skies with chemtrails causing sickness and death from Morgellon’s disease.
Everyone who kept technologies from us that would have freed us from fossil fuels back in the 1950s. Everyone who murdered inventors who discovered how to make cars run on water. Everyone who created space-based weapons systems to extend their rule into space.
Everyone who kept from us knowledge of the populated world of space. Everyone who created a secret space service that has colonized Mars since at least the 1970s.
Everyone who killed to hide Roswell from us and created secret areas of research where they back-engineered miracles gained from downed space craft and from treaties with the Greys and then kept them from the public.
Everyone who ran torture prisons overseas, at secret underground bases, or at Guantanamo. Everyone who ran institutions like the School of the Americas where gangsters were trained to overthrow democratically-elected regimes.
Everyone who created and used Blackwater and Whackenhut to create a private army and prison or who sentenced children to jail as a business.
Every Congressional Representative and every Senator who accepted bribes, favors, sex, trips and any other inducement that led them to sell their vote to the Black Hats.
Everyone who plotted to take over Canada and Mexico out of a so-called “Security and Prosperity Partnership” (ironic misnomer) or start a third world war with Iran, Russia, or China to bring the population down from 6.8 billion to a more manageable 500 million, destined to be slaves.
Everyone who developed HAARP and used it to cause or amplify earthquakes and hurricanes (including Katrina), killing tens of thousands. Or ULF (ultra-low-frequency weapons) and experimented with them, bringing down the I35W Minneapolis bridge.
Everyone who speculated in currency and brought down national economies which they then held hostage to onerous debt payments. Everyone who made loans to third-world countries and then robbed them of their resources when they couldn’t pay.
There is so much more – a media bought and paid for, deep underground military bunkers, Pine Gap, Australia, space base, Area 51, depleted-uranium weapons, printing truckloads of dollars.
This planet, reeling under the black-hole debt of the derivatives megabubble, will no longer tolerate your rule.
We know you, Black Hats. We know the whole range of your activities. We know you inside and out.
We know your business. Three showers a day won’t keep you clean.
The Black Hats, the hangers on, the vultures, the whole gang – it’s time for you to go.
Share this:
Like this:
While lightworkers may be focused on the darkness within rising to the surface for release, darkness is disappearing from the external world as well.
Hilarion tells us that “those who have been in control are desperately trying to keep the world population in a state of fear, hopelessness and apathy.”
“Every such effort by these ones is met with a growing awareness by the Earth’s peoples that all that was hidden is being hidden no more. This is, as we stated many times before, a new dimension or vibration that no longer supports such activity.” (1)
Saul details some of the global occurrences that are sealing the fate of the dark.
“All across the world people are standing up and supporting one another as they refuse to be cowed or suppressed any longer by seemingly powerful elites who would control them.
“Those days are coming to an end, although you will continue to see signs of resistance from those elites for a little longer as they attempt to defend their indefensible positions of prestige, remaining reluctant to release the power and authority they have enjoyed and still see as their ‘rightful heritage.’
“Social change of a major nature is firmly underway. The Arab Spring followed by the Occupy Movement are just the first signs of this major social turning-point and it is irreversible.
“Moreover, further movements for change in which the peoples of the world reclaim and regain their sovereignty, their respect, and their dignity are building rapidly. Large numbers of those who supported the old order are having ‘Aha’ experiences as they realize that it is not, and never has been, in their best interests to carry out the enforcement demanded of them.
“Weapons are being laid down in many places as more and more of you come to the understanding that no problems can ever be resolved by resorting to violence. Animated discussions are taking place to resolve divisive issues, and it is becoming ever more apparent to those involved that this is the only sane way forwards.” (2)
Most of the Illuminati are in containment. Saul tells us that:
“In fact, there are only a very small number on Earth at this time who wish to maintain the old order of ‘divide and conquer’ or ‘suppress and control.’ They have been ably supported by many who believed that they would make personal gains from a relationship with those who seem to hold the reins of power.” (3)
Nonetheless Saul explains that these supporters “are just deeply asleep, and their true intent, like the vast majority of humanity, is to awaken, and they are now stirring in their sleep, and coming out of their state of unawareness of God’s Love for all of His creation.” (4)
SaLuSa says that we can no longer be fooled by the manipulations of the dark and can open to a life free of fear now.
“The Light has long been revealing the truth about their activities, and they are no longer able to fool you with their plans to hold onto power. It is in fact quickly becoming obvious to them that their time is up, and they cling to whatever gives them hope of avoiding the inevitable end of their reign.
“With the understanding of what has gone on in the past that has supported the dark Ones, it is possible to life your lives without fear of their actions. That denies them the conditions that they have flourished in, and before their very eyes they see their power slipping away. Consequently our allies can more easily work to speed up the long awaited changes, and you will not have long to wait too long to see them.” (5)
The planet’s controllers have not wanted us to know the truth and so science and religion have been distorted to keep us asleep, SanJAsKa reveals.
“Mainstream science on your world has been purposefully distorted, and concrete proof of the ascension of not just your planet, but the entire Universe has long been discovered and suppressed.
“This is because the cabals have not wanted to create an intelligent society of free thinkers who understand what is truly happening on your world and in your cosmic backyard. Rather, they have established purposely-failing public educational systems and added ingredients to your food and drinks that are meant to dumb humanity down and keep you feeding dense states of unawareness and egoism.” (6)
Our mainstream media, he continues, “only encourages such density, and you dearest souls can see on nearly any channel of your television station that density and lower dimensionality is flaunted and brought to the center stage.”
“This is because the cabals and the forces who have been employing them only wish to see the density and negativity of the old paradigm enforced and to that extent, have attempted to see to it that humanity is (continually) exposed to such lower dimensionality because of the strength of your Creation power and because of what your continual feeding of density will garner not for you, but for them.” (7)
What we are watching, Sheldan Nidle’s sources say, is a grand exit of the dark.
“Those who understand the ways of Heaven know that the time has come for a grand exit of the dark and its multitudes of minions. They have run this limited-consciousness realm for nearly 13,000 years, and during this time many Golden Ages and many strange edicts by the dark have marked this span of years. The upcoming moments signal the end of this period.
“You are rising in frequency, which means that the agency for controlling you is ending. The resulting freedom enables you to receive your spiritual and space families with a feeling of joy, knowing that the long night of sorrows is at an end.” (8)
Gaia herself, speaking through Sue Lie, tells us that our efforts to confront our own darkness combined with the work of corraling the external darkness allow her to ascend at a slow pace, taking us with her.
“If I were to suddenly transmute into the fifth dimension, my third dimension would no longer be habitable. Therefore, I will be patient.
“I have the option to move slowly because many of my humans have directly confronted their own darkness and dis-allowed it to rule their lives. Therefore, they can hold the Light to guide those still finding their way up from the bottom of the well.
“Also, I can transmute at a safe pace for my inhabitants because my Galactic Family has contained those who would damage my form in order that they might have more things and more power over others.” (9)
Moreover she predicts that when the drama is complete, many who have volunteered to play a dark role will ascend quickly, a sobering reminder to us and a possibly difficult thing for some people to hear.
“Remember, some of those who appear to be the darkest have volunteered to play the dark roles in order to maintain polarity. These beings of Light are holding the 3D Matrix open to give others the chance to awaken. When the 3D Matrix can no longer survive, they will fly into the higher dimensions like arrows ejected from taut bows.” (10)
Despite how things look at times, Archangel Indriel tells us that the pieces of the puzzle of the Divine Plan are falling into place.
“Despite how things may look on the outside, know that there is a grand plan and all the pieces of the puzzle are falling neatly into place. As
I’ve said so many times before, you must tear down the old before you can build the new. The land must be cleared. The rubble plowed away.” (11)
This then is that time of clearing of the external rubble even as it is a time of clearing of internal debris..
In spite of the time that’s being taken to dislodge the dark, their grip is loosening. Events like the Boston Bombings and the many recent shootings have turned many people against violence and focused scrutiny on the dark, undoubtedly hastening their departure.
The ground is being prepared for the raising of structures on Nova Earth untainted by dark motivation or ends. And we ourselves are clearing our various bodies of their toxins, throwing off the last vestiges of the Age of Darkness from which we’ve come.
Footnotes
In my last column I emphasized that it was important for American citizens to demand to know what the real agendas are behind the wars of choice by the Bush and Obama regimes. These are major long term wars each lasting two to three times as long as World War II.
Matthew J. Nasuti reports in the Kabul Press that it cost US taxpayers $50 million to kill one Taliban soldier. That means it cost $1 billion to kill 20 Taliban fighters. http://kabulpress.org/my/spip.php?article32304 This is a war that can be won only at the cost of the total bankruptcy of the United States.
Joseph Stiglitz and Linda Bilmes have estimated that the current out-of-pocket and already incurred future costs of the Afghan and Iraq wars is at least $6 trillion.
In other words, it is the cost of these two wars that explain the explosion of the US public debt and the economic and political problems associated with this large debt.
What has America gained in return for $6 trillion and one million injured soldiers, many very severely?
In Iraq there is now an Islamist Shia regime allied with Iran in place of a secular Sunni regime that was an enemy of Iran, one as dictatorial as the other, presiding over war ruins, ongoing violence as high as during the attempted US occupation, and extraordinary birth defects from the toxic substances associated with the US invasion and occupation.
In Afghanistan there is an undefeated and apparently undefeatable Taliban and a revived drug trade that is flooding the Western world with drugs.
The icing on these Bush and Obama “successes” are demands from around the world that Americans and former British PM Tony Blair be held accountable for their war crimes. Certainly, Washington’s reputation has plummeted as a result of these two wars. No governments anywhere are any longer sufficiently gullible as to believe anything that Washington says.
These are huge costs for wars for which we have no explanation.
The Bush/Obama regimes have come up with various cover stories: a “war on terror,”
“we have to kill them over there before they come over here,” “weapons of mass destruction,” revenge for 9/11, Osama bin Laden (who died of his illnesses in December 2001 as was widely reported at the time).
None of these explanations are viable. Neither the Taliban nor Saddam Hussein were engaged in terrorism in the US. As the weapons inspectors informed the Bush regime, there were no WMD in Iraq. Invading Muslim countries and slaughtering civilians is more likely to create terrorists than to suppress them. According to the official story, the 9/11 hijackers and Osama bin Laden were Saudi Arabians, not Afghans or Iraqis. Yet it wasn’t Saudi Arabia that was invaded.
Democracy and accountable government simply does not exist when the executive branch can take a country to wars in behalf of secret agendas operating behind cover stories that are transparent lies.
It is just as important to ask these same questions about the agenda of the US police state. Why have Bush and Obama removed the protection of law as a shield of the people and turned law into a weapon in the hands of the executive branch? How are Americans made safer by the overthrow of their civil liberties? Indefinite detention and execution without due process of law are the hallmarks of the tyrannical state. They are terrorism, not a protection against terrorism. Why is every communication of every American and apparently the communications of most other people in the world, including Washington’s most trusted European allies, subject to being intercepted and stored in a gigantic police state database? How does this protect Americans from terrorists?
How does keeping citizens ignorant of their government’s crimes make citizens safe from terrorists?
These persecutions of truth-tellers have nothing whatsoever to do with “national security” and “keeping Americans safe from terrorists.” The only purpose of these persecutions is to protect the executive branch from having its crimes revealed. Some of Washington’s crimes are so horrendous that the International Criminal Court would issue a death sentence if those guilty could be brought to trial. A government that will destroy the constitutional protections of free speech and a free press in order to prevent its criminal actions from being disclosed is a tyrannical government.
One hesitates to ask these questions and to make even the most obvious remarks out of fear not only of being put on a watch list and framed on some charge or the other, but also out of fear that such questions might provoke a false flag attack that could be used to justify the police state that has been put in place.
Perhaps that was what the Boston Marathon Bombing was. Evidence of the two brothers’ guilt has taken backseat to the government’s claims. There is nothing new about government frame-ups of patsies. What is new and unprecedented is the lockdown of Boston and its suburbs, the appearance of 10,000 heavily armed troops and tanks to patrol the streets and search without warrants the homes of citizens, all in the name of protecting the public from one wounded 19 year old kid.
Not only has nothing like this ever before happened in the US, but also it could not have been organized on the spur of the moment. It had to have been already in place waiting for the event. This was a trial run for what is to come.
Unaware Americans, especially gullible “law and order conservatives,” have no idea about the militarization of even their local police. I have watched local police forces train at gun clubs. The police are taught to shoot first not once but many times, to protect their lives first at all costs, and not to risk their lives by asking questions. This is why the 13-year old kid with the toy rifle was shot to pieces. Questioning would have revealed that it was a toy gun, but questioning the “suspect” might have endangered the precious police who are trained to take no risks whatsoever.
The police operate according to Obama’s presidential kill power: murder first then create a case against the victim.
In other words, dear American citizen, you life is worth nothing, but the police whom you pay, are not only unaccountable but also their lives are invaluable. If you get killed in their line of duty, it is no big deal. But don’t you injure a police goon thug in an act of self-defense. I mean, who do you think you are, some kind of mythical free American with rights?
Like this:
Former World Bank lawyer Karen Hudes says the global opinion of America is tarnished. Hudes contends, “Is the United States a credible super power? The answer to that is ‘we are neither.’ We’re not a super power and we are not credible.” Hudes goes on to warn, “The biggest game changer is something that people are just ignoring, and they ignore it at their peril, and that is the creation of a fourth credit rating agency. . . . If they do not get our act together, they will have no choice . . . We are losing our credit rating.”
Hudes, who is also a whistleblower, charges, “There is fraud and corruption from top to bottom in the financial system.” As far as global central banks are concerned (including the Fed), Hudes claims, “The central bankers have a scam going on. It’s a Ponzi scheme. The citizens of the world are paying interest on their currencies.
These currencies are not being issued by the governments; they are being issued by private bankers.” Don’t give up hope because Hudes says, “The U.S. has to come around to the rule of law. . . . and we are on track with a 95% likelihood, and that is why I think the dollar is not going to tank.” Join Greg Hunter as he goes One-on-One with whistleblower and former Senior Counsel for the World Bank, Karen Hudes.
The plight of plastic on Albatross birds on Midway Island, an Island on the North Pacific Ocean, 2000 miles from the nearest continent. The island is littered in plastic, which the inhabiting albatross population ingests, causing a shocking and painful death.
Like this:
IT was the silence that made this voyage different from all of those before it.
Not the absence of sound, exactly.
The wind still whipped the sails and whistled in the rigging. The waves still sloshed against the fibreglass hull.
And there were plenty of other noises: muffled thuds and bumps and scrapes as the boat knocked against pieces of debris.
What was missing was the cries of the seabirds which, on all previous similar voyages, had surrounded the boat.
The birds were missing because the fish were missing.
Exactly 10 years before, when Newcastle yachtsman Ivan Macfadyen had sailed exactly the same course from Melbourne to Osaka, all he’d had to do to catch a fish from the ocean between Brisbane and Japan was throw out a baited line.
“There was not one of the 28 days on that portion of the trip when we didn’t catch a good-sized fish to cook up and eat with some rice,” Macfadyen recalled.
But this time, on that whole long leg of sea journey, the total catch was two.
No fish. No birds. Hardly a sign of life at all.
“In years gone by I’d gotten used to all the birds and their noises,” he said.
“They’d be following the boat, sometimes resting on the mast before taking off again. You’d see flocks of them wheeling over the surface of the sea in the distance, feeding on pilchards.”
But in March and April this year, only silence and desolation surrounded his boat, Funnel Web, as it sped across the surface of a haunted ocean.
North of the equator, up above New Guinea, the ocean-racers saw a big fishing boat working a reef in the distance.
“All day it was there, trawling back and forth. It was a big ship, like a mother-ship,” he said.
And all night it worked too, under bright floodlights. And in the morning Macfadyen was awoken by his crewman calling out, urgently, that the ship had launched a speedboat.
“Obviously I was worried. We were unarmed and pirates are a real worry in those waters. I thought, if these guys had weapons then we were in deep trouble.”
But they weren’t pirates, not in the conventional sense, at least. The speedboat came alongside and the Melanesian men aboard offered gifts of fruit and jars of jam and preserves.
“And they gave us five big sugar-bags full of fish,” he said.
“They were good, big fish, of all kinds. Some were fresh, but others had obviously been in the sun for a while.
“We told them there was no way we could possibly use all those fish. There were just two of us, with no real place to store or keep them. They just shrugged and told us to tip them overboard. That’s what they would have done with them anyway, they said.
“They told us that his was just a small fraction of one day’s by-catch. That they were only interested in tuna and to them, everything else was rubbish. It was all killed, all dumped. They just trawled that reef day and night and stripped it of every living thing.”
Macfadyen felt sick to his heart. That was one fishing boat among countless more working unseen beyond the horizon, many of them doing exactly the same thing.
No wonder the sea was dead. No wonder his baited lines caught nothing. There was nothing to catch.
If that sounds depressing, it only got worse.
The next leg of the long voyage was from Osaka to San Francisco and for most of that trip the desolation was tinged with nauseous horror and a degree of fear.
“After we left Japan, it felt as if the ocean itself was dead,” Macfadyen said.
“We hardly saw any living things. We saw one whale, sort of rolling helplessly on the surface with what looked like a big tumour on its head. It was pretty sickening.
“I’ve done a lot of miles on the ocean in my life and I’m used to seeing turtles, dolphins, sharks and big flurries of feeding birds. But this time, for 3000 nautical miles there was nothing alive to be seen.”
In place of the missing life was garbage in astounding volumes.
“Part of it was the aftermath of the tsunami that hit Japan a couple of years ago. The wave came in over the land, picked up an unbelievable load of stuff and carried it out to sea. And it’s still out there, everywhere you look.”
Ivan’s brother, Glenn, who boarded at Hawaii for the run into the United States, marvelled at the “thousands on thousands” of yellow plastic buoys. The huge tangles of synthetic rope, fishing lines and nets. Pieces of polystyrene foam by the million. And slicks of oil and petrol, everywhere.
Countless hundreds of wooden power poles are out there, snapped off by the killer wave and still trailing their wires in the middle of the sea.
“In years gone by, when you were becalmed by lack of wind, you’d just start your engine and motor on,” Ivan said.
Not this time.
“In a lot of places we couldn’t start our motor for fear of entangling the propeller in the mass of pieces of rope and cable. That’s an unheard of situation, out in the ocean.
“If we did decide to motor we couldn’t do it at night, only in the daytime with a lookout on the bow, watching for rubbish.
“On the bow, in the waters above Hawaii, you could see right down into the depths. I could see that the debris isn’t just on the surface, it’s all the way down. And it’s all sizes, from a soft-drink bottle to pieces the size of a big car or truck.
“We saw a factory chimney sticking out of the water, with some kind of boiler thing still attached below the surface. We saw a big container-type thing, just rolling over and over on the waves.
“We were weaving around these pieces of debris. It was like sailing through a garbage tip.
“Below decks you were constantly hearing things hitting against the hull, and you were constantly afraid of hitting something really big. As it was, the hull was scratched and dented all over the place from bits and pieces we never saw.”
Plastic was ubiquitous. Bottles, bags and every kind of throwaway domestic item you can imagine, from broken chairs to dustpans, toys and utensils.
And something else. The boat’s vivid yellow paint job, never faded by sun or sea in years gone past, reacted with something in the water off Japan, losing its sheen in a strange and unprecedented way.
BACK in Newcastle, Ivan Macfadyen is still coming to terms with the shock and horror of the voyage.
“The ocean is broken,” he said, shaking his head in stunned disbelief.
Recognising the problem is vast, and that no organisations or governments appear to have a particular interest in doing anything about it, Macfadyen is looking for ideas.
He plans to lobby government ministers, hoping they might help.
More immediately, he will approach the organisers of Australia’s major ocean races, trying to enlist yachties into an international scheme that uses volunteer yachtsmen to monitor debris and marine life.
Macfadyen signed up to this scheme while he was in the US, responding to an approach by US academics who asked yachties to fill in daily survey forms and collect samples for radiation testing – a significant concern in the wake of the tsunami and consequent nuclear power station failure in Japan.
“I asked them why don’t we push for a fleet to go and clean up the mess,” he said.
“But they said they’d calculated that the environmental damage from burning the fuel to do that job would be worse than just leaving the debris there.”
The “shutdown” of the US government and the financial climax associated with a deadline date, leading to a possible “debt default” of the federal government is a money making undertaking for Wall Street.
A wave of speculative activity is sweeping major markets.
The uncertainty regarding the shutdown and “debt default” constitutes a golden opportunity for “institutional speculators”. Those who have reliable “inside information” regarding the complex outcome of the legislative process are slated to make billions of dollars in windfall gains.
Speculative Bonanza
Several overlapping political and economic agendas are unfolding. In a previous article, we examined the debt default saga in relation to the eventual privatization of important components of the federal State system.
While Wall Street exerts a decisive influence on policy and legislation pertaining to the government shutdown, these same major financial institutions also control the movement of currency markets, commodity and stock markets through large scale operations in derivative trade.
Most of the key actors in the US Congress and the Senate involved in the shutdown debate are controlled by powerful corporate lobby groups acting directly or indirectly on behalf of Wall Street. Major interests on Wall Street are not only in a position to influence the results of the Congressional process, they also have “inside information” or prior knowledge of the chronology and outcome of the government shutdown impasse.
They are slated to make billions of dollars in windfall profits in speculative activities which are “secure” assuming that they are in a position to exert their influence on relevant policy outcomes.
It should be noted, however, that there are important divisions both within the US Congress as well as within the financial establishment. The latter are marked by the confrontation and rivalry of major banking conglomerates.
These divisions will have an impact on speculative movements and counter movements in the stock, money and commodity markets. What we are dealing with is “financial warfare”. The latter is by no means limited to Wall Street, Chinese, Russian and Japanese financial institutions (among others) will also be involved in the speculative endgame.
Speculative movements based on inside information, therefore, could potentially go in different directions. What market outcomes are being sought by rival banking institutions? Having inside information on the actions of major banking competitors is an important element in the waging of major speculative operations.
Derivative Trade
The major instrument of “secure” speculative activity for these financial actors is derivative trade, with carefully formulated bets in the stock markets, major commodities –including gold and oil– as well as foreign exchange markets.
These major actors may know “where the market is going” because they are in a position to influence policies and legislation in the US Congress as well as manipulate market outcomes.
Moreover, Wall Street speculators also influence the broader public’s perception in the media, not to mention the actions of financial brokers of competing or lesser financial institutions which do not have foreknowledge or access to inside information.
These same financial actors are involved in the spread of “financial disinformation”, which often takes the form of media reports which contribute to either misleading the public or building a “consensus” among economists and financial analysts which will push markets in a particular direction.
Pointing to an inevitable decline of the US dollar, the media serves the interests of the institutional speculators in camouflaging what might happen in an environment characterized by financial manipulation and the interplay of speculative activity on a large scale.
Speculative trade routinely involves acts of deception. In recent weeks, the media has been flooded with “predictions” of various catastrophic economic events focusing on the collapse of the dollar, the development of a new reserve currency by the BRICS countries, etc.
At a recent conference hosted by the powerful Institute of International Finance (IIF), a Washington based think tank organization which represents the world’s most powerful banks and financial institutions:
“Three of the world’s most powerful bankers warned of terrible consequences if the United States defaults on its debt, with Deutsche Bank chief executive Anshu Jain claiming default would be “utterly catastrophic.”
This would be a very rapidly spreading, fatal disease, … I have no recommendations for this audience…about putting band aids on a gaping wound,” he said.
“JPMorgan Chase chief executive Jamie Dimon and Baudouin Prot, chairman of BNP Paribas, said a default would have dramatic consequences on the value of U.S. debt and the dollar, and likely would plunge the world into another recession.” (…)
Dimon and other top executives from major U.S. financial firms met with President Barack Obama and with lawmakers last week to urge them to deal with both issues.
On Saturday, Dimon said banks are already spending “huge amounts” of money preparing for the possibility of a default, which he said would threaten the global recovery after the 2007-2009 financial crisis.
Dimon also defended JPMorgan against critics who say the bank has become too big to manage. It has come under scrutiny from numerous regulators and on Friday reported its first quarterly loss since Dimon took over, due to more than $7 billion in legal expenses. (Emily Stephenson and Douwe Miedema, World top bankers warn of dire consequences if U.S. defaults | Reuters, October 12, 2013
What these “authoritative” economic assessments are intended to create is an aura of panic and economic uncertainty, pointing to the possibility of a collapse of the US dollar.
What is portrayed by the Institute of International Finance panelists (who are the leaders of the world’s largest banking conglomerates) is tantamount to an Economics 101 analysis of market adjustment, which casually excludes the known fact that markets are manipulated with the use of sophisticated derivative trading instruments. In a bitter irony, the IIF panelists are themselves involved in routinely twisting market values through derivative trade. Capitalism in the 21st century is no longer based largely on profits resulting from a real economy productive process, windfall financial gains are acquired through large scale speculative operations, without the occurrence of real economy activity. at the touch of a mouse button.
The manipulation of markets is carried out on the orders of major bank executives including the CEOs of JPMorgan Chase, Deutsche Bank and BNP Paribas.
The “too big to fail banks” are portrayed, in the words of JPMorgan Chase’s CEO Jamie Dimon’s, as the “victims” of the debt default crisis, when in fact they are the architects of economic chaos as well as the unspoken recipients of billions of dollars of stolen taxpayers’ money.
These corrupt mega banks are responsible for creating the “gaping wound” referred to by Deutsche Bank’s Anshu Jain in relaiton to the US public debt crisis.
Collapse of the Dollar?
Upward and downward movements of the US dollar in recent years have little do with normal market forces as claimed by the tenets of neoclassical economics.
Both JP Morgan Chase’s CEO Jamie Dimon and Deutsche Bank’s CEO Anshu Jain’s assertions provide a distorted understanding of the functioning of the US dollar market. The speculators want to convince us that the dollar will collapse as part of a normal market mechanism, without acknowledging that the “too big to fail” banks have the ability to trigger a decline in the US dollar which in a sense obviates the functioning of the normal market.
Wall Street has indeed the ability to “short” the greenback with a view to depressing its value. It has also has the ability through derivative trade of pushing the US dollar up. These up and down movements of the greenback are, so to speak, the “cannon feed” of financial warfare. Push the US dollar up and speculate on the upturn, push it down and speculate on the downturn.
It is impossible to assess the future movement of the US dollar by solely focusing on the interplay of “normal market” forces in response to the US public debt crisis.
While an assessment based on “normal market” forces indelibly points to structural weaknesses in the US dollar as a reserve currency, it does not follow that a weakened US dollar will necessarily decline in a forex market which is routinely subject to speculative manipulation.
Moreover, it is worth noting that the national currencies of several heavily indebted developing countries have increased in value in relation to the US dollar, largely as a result of the manipulation of the foreign exchange markets. Why would the national currencies of countries literally crippled by foreign debt go up against the US dollar?
The Institutional Speculator
JPMorgan Chase, Goldman Sachs, Bank America, Citi-Group, Deutsche Bank et al: the strategy of the institutional speculators is to sit on their “inside information” and create uncertainty through heavily biased news reports, which are in turn used by individual stock brokers to advise their individual clients on “secure investments”. And that is how people across America have lost their savings.
It should be emphasized that these major financial actors not only control the media, they also control the debt rating agencies such as Moody’s and Standard and Poor.
According to the mainstay of neoclassical economics, speculative trade reflects the “normal” movement of markets. An absurd proposition.
Since the de facto repeal of the Glass-Steagall Act and the adoption of the Financial Services Modernization Act in 1999, market manipulation tends to completely overshadow the “laws of the market”, leading to a highly unstable multi-trillion dollar derivative debt, which inevitably has a bearing on the current impasse on Capitol Hill. This understanding is now acknowledged by sectors of mainstream financial analysis.
There is no such thing as “normal market movements”. The outcome of the government shutdown on financial markets cannot be narrowly predicted by applying conventional macro-economic analysis, which excludes outright the role of market manipulation and derivative trade.
The outcome of the government shutdown on major markets does not hinge upon “normal market forces” and their impacts on prices, interest rates and exchange rates. What has to be addressed is the complex interplay of “normal market forces” with a gamut of sophisticated instruments of market manipulation. The latter consist of an interplay of large scale speculative operations undertaken by the most powerful and corrupt financial institutions, with the intent to distorting “normal” market forces.
It is worth mentioning that immediately following the adoption of the Financial Services Modernization Act in 1999, the US Congress adopted the Commodity Futures Modernization Act 2000 (CFMA) which essentially “exempted commodity futures trading from regulatory oversight.”
Four major Wall Street financial institutions account for more than 90 percent of the so-called derivative exposure: J.P. Morgan Chase, Citi-Group, Bank America, and Goldman Sachs. These major banks exert a pervasive influence on the conduct of monetary policy, including the debate within the US Congress on the debt ceiling. They are also among the World’s largest speculators.
What is the speculative endgame behind the shutdown and debt default saga?
An aura of uncertainty prevails. People across America are impoverished as a result of the curtailment of “entitlements”, mass protest and civil unrest could erupt. Homeland Security (DHS) is the process of militarizing domestic law enforcement. In a bitter irony, each and all of these economic and social events including political statements and decisions in the US Congress concerning the debt ceiling, the evaluations of the rating agencies, etc. create opportunities for the speculator.
Major speculative operations –feeding on inside information and deception– are likely take place routinely over the next few months as the fiscal and debt default crisis unfolds.
What is diabolical in this process is that major banking conglomerates will not hesitate to destabilize stock, commodity and foreign exchange markets if it serves their interests, namely as a means to appropriate speculative gains resulting from a situation of turmoil and economic crisis, with no concern for the social plight of millions of Americans.
One solution –which is unlikely to be adopted unless there is a major power shift in American politics– would be to cancel the derivative debt altogether and freeze all derivative transactions on major markets. This would certainly help to tame the speculative onslaught.
The manipulation through derivative trade of the markets for basic food staples is particularly pernicious because it potentially creates hunger. It has a direct bearing on the livelihood of millions of people.
As we recall, “the price of food and other commodities began rising precipitately [in 2006], … Millions were cast below the poverty line and food riots erupted across the developing world, from Haiti to Mozambique.”
According to Indian economist Dr. Jayati Ghosh:
“It is now quite widely acknowledged that financial speculation was the major factor behind the sharp price rise of many primary commodities , including agricultural items over the past year [2011]… Even recent research from the World Bank (Bafis and Haniotis 2010) recognizes the role played by the “financialisation of commodities” in the price surges and declines, and notes that price variability has overwhelmed price trends for important commodities.” (Quoted in Speculation in Agricultural Commodities: Driving up the Price of Food Worldwide and plunging Millions into Hunger By Edward Miller, October 05, 2011)
The artificial hikes in the price of crude oil, which are also the result of market manipulation, have a pervasive impact on costs of production and transportation Worldwide, which in turn contribute to spearheading thousands of small and medium sized enterprises into bankruptcy.
Big Oil including BP as well Goldman Sachs exert a pervasive impact on the oil and energy markets.
The global economic crisis is a carefully engineered.
The end result of financial warfare is the appropriation of money wealth through speculative trade including the confiscation of savings, the outright appropriation of real economy assets as well as the destabilization of the institutions of the Federal State through the adoption of sweeping austerity measures.
The speculative onslaught led by Wall Street is not only impoverishing the American people, the entire World population is affected.
Michel Chossudovsky is an award-winning author, Professor of Economics (emeritus) at the University of Ottawa, Founder and Director of the Centre for Research on Globalization (CRG), Montreal and Editor of the globalresearch.ca website.
He is the author of The Globalization of Poverty and The New World Order (2003) and America’s “War on Terrorism”(2005).
His most recent book is entitled Towards a World War III Scenario: The Dangers of Nuclear War (2011).
He is also a contributor to the Encyclopaedia Britannica. His writings have been published in more than twenty languages.
Are foreign-exchange benchmarks the latest to be manipulated by bankers?
Oct 12th 2013
IT HAS been a dreadful couple of years for financial benchmarks. Banks turn out to have rigged LIBOR, an interest rate used to peg contracts worth trillions. Its equivalent in the world of derivatives, ISDAfix, has also come under question. Commodities prices from crude oil to platinum have been the subject of allegations and inquiries. Now prices in global currency markets, where turnover is $5 trillion a day, are being scrutinised by authorities, who suspect bankers have tampered with those too.
Switzerland’s financial watchdog announced on October 4th that it was investigating a slew of banks it thinks have manipulated currencies. Britain and the European Union also have probes under way. None has detailed its suspicions, but concerns reportedly centre around abnormal movements ahead of a widely-used daily snapshot of exchange rates, known as the 4pm “London fix”. It represents the average of prices agreed during 60 seconds’ trading, and is used as a reference rate to execute a much larger set of currency deals. Bankers, who are big participants in the market, have huge incentives to nudge the price of a given currency pairing ahead of the fix. With billions of dollars changing hands, a difference of a fraction of a cent can add a tidy sum to the bonus pool.
If proven, the charge would amount to banks fleecing their clients. Banks know the big trades they are about to execute on others’ behalf, and are often themselves the counterparty. By moving the markets ahead of the fix, they could alter the rate to their profit and their clients’ loss. One suspected method is “banging the close”: submitting a quick succession of orders just as the benchmark is set, to distort its value. Though indicators based on real trades are meant to be harder to game than those using hypothetical figures (such as LIBOR, a daily poll of banks’ estimated borrowing rates into which respondents fed duff data), they are clearly not incorruptible.
The 4pm fix is used to calculate the value of all sorts of assets, such as the foreign holdings of mutual funds. Fiddling the rates could thus have an impact far beyond the banks and their clients. Worse, if the bankers talked to each other ahead of their trades, as regulators think they may have, collusion will be added to the charge sheet. Investigations into other fiddled benchmarks have unearthed reams of messages between traders blithely discussing their swindles.
The risk of manipulation could be vastly diminished by using a benchmark that relies on more than just 60 seconds of trading, points out Mark Taylor, dean of Warwick Business School and a former currency-fund manager. The damage to implicated banks’ reputations will be harder to fix.
The US government shutdown – a temporary ailment or a symptom of a grave disease? Are the Republicans right in their move to block Obamacare spending? Who gains from the shutdown turmoil? Do the politicians care about their citizens? Our guest comes from the very heart of the banking system: Karen Hudes was World Bank lawyer when she blew the whistle on major corruption cases in the system and was fired as a result.
Like this:
The San Francisco Chronicle was founded in 1865
By 1880
It had the largest circulation on the West Coast
And was Sold in 2000 to Hearst Communications Inc.
Amid a FrontPage series of political firestorms
Collectively-reminiscent of the criminality involved in
The Days of the Robber Barons
“The eight years in America from 1860 to 1868 had uprooted institutions that were centuries old, changed the politics of a people, transformed the social life of half the country, and wrought so profoundly upon the entire national character that the influence cannot be measured short of two or three generations.” The Gadarene progress was more rapid than Mark Twain had anticipated; it worked itself out close to the bitter end before he died thirty- seven years later.
Twain’s satire was merely a prologue; the play followed, and the main characters are all well- known names. There was Commodore Vanderbilt (who conferred that naval distinction on himself because he ran a ferryboat between Staten Island and the Battery); and Jay Gould, who built himself a mansion just up the road from the property which now houses The Foundation for Economic Education. There was Daniel Drew, and Jim Fisk, and Andrew Carnegie; there was Huntington, Stanford, Harriman, Rockefeller and Morgan. I’ve listed here ten names; add ten more if you wish, or a thousand more. The point is that these “robber barons,” as they’ve been called, were a mere handful of men whose deeds and misdeeds have been lovingly chronicled by three generations of journalists and muckrakers.
Conniving with Politicians
These extravagant characters have been represented as exemplars of unrestrained individualism at its worst, fiercely competitive, practitioners of undiluted laissez faire capitalism. They were nothing of the sort. So far were they from wanting a genuinely free market economy that they bought up senators and paid off judges in order to stifle competition. They did not want a government that would let them alone; they wanted a government they could use.
Had they been able to understand the original idea of laissez faire they would have opposed it. They were-not individualists; they did not believe in a fair field and no favor; they stacked the odds against their competitors.
The last thing Vanderbilt, Gould, Carnegie and the others wanted was open competition in a game where the best man wins. To the contrary! They connived with politicians to obtain advantages for themselves by controlling government and the law; they manipulated the public power for private gain. And the government was eager to oblige.
This was done openly, and virtually everyone knew about it. Witty commentators referred to certain politicians as the Senator from coal, or the Senator from railroads, or the Senator from steel. Observing the situation in Pennsylvania, one critic was led to remark that Standard Oil had done everything with the legislature—except refine it! Such political practices were a far cry from the vision of James Madison, who had declared that “Justice is the end of government, and justice is the end of civil society.” The Gilded Age was a throwback to the age-old practice of using political power for the economic advantage of those who hold office, and for their friends.” (1)
The Robber-Barons completed their unifying lock on this nation when transcontinental-railroads became the one-big reality. With that feat, created by immigrant and foreign slave labor: The massive and primary resource businesses in ‘America’ became semi-unified via the creation of privately-owned rails, along with the telegraph, that had suddenly unified a half-conquered nation from coast to coast.
Timber, food, steel, coal, oil and virtually all commercial goods and services became booty that could be shipped and controlled by the already criminal-banks who were tightening controls on heavy-industries. This created very aspect of the new and private-commercial march of progress. The Robber-Baron “breakthrough” turned this young-nation into a nearly-lawless place that was to become dominated by railroad power over travel, and communications, with transcontinental-shipping that was virtually unregulated!
Almost unnoticed was the re-emergence of old-world European class-slavery, child-labor, and the primitive world, that immigrants were fleeing when they came to America.
By the late 1860’s: Once again the only people who counted here were the intensely-filthy rich who became untouchable…
This stealth coup almost succeeded…
A new Gilded-Age had again been created by a few élites with an eye toward total control of the entire nation from top to bottom. These Robber-barons are the same people that are still remembered throughout the country—not as the criminals they obviously were, but as revered Americans, which they never were!
But at the time there were huge problems. The wider-society suffered so massively that eventually it was this suffering that brought an end to this primitive pre-emptive strike against humanity. The new Robber Barons of today have scrubbed much of just how the end of the Robber-Barons came about, from the web: But the fact is those original criminals were defanged and declawed across the board eventually—but they were not directly punished then which was a huge mistake Which we are repeating.
By the time Global-BANKERS had created the stock-market crash of 1929, (Just 16 years after the FED illegally stole the Treasury) it was clear that the elites and their power-grabs had to be controlled and totally shut down: If there was to ever be any chance for this country to thrive. That huge-mistake is still alive. It consisted of
Leaving the TREASONOUS-FEDERAL-RESERVE in-place!
That failure is what brought the US and people everywhere to the edge of the global-collapse scheduled to begin this month!
That’s why this time we must begin by ending the Federal Reserve, and end, by destroying the treason-loving traitors who have occupied the United States for the last one-hundred years.
Americans must stop treating politicians as law-abiding people. They are unindicted criminals, and are only free because we have failed to charge them with their crimes against the Constitution and the people of this nation. The same is true of the outlaw-state-police.
These troglodytes are not officers of any law; they are trigger-happy thugs that have killed Americans with callous disregard for the lives or property of every American which they routinely target for absolutely no reason at all.
If there were any justice in this place today—these traitor-cops would be shot on site, rather than to allow them to continue their criminal-rampage across this land from coast to coast…
No doubt people across the country will begin to find new ways to deal with these criminals for themselves: Because it is clear that neither the legal system, nor those charged with keeping their officers in check will do anything to stop this slaughter of innocent people in the name of their-false-flag-terror that has been a total lie since ~
Right now, of course, it’s the war on Syria. Last month, it was something else. And next month, it’ll be something else.
We’re looking at one op after another, one crime after another, one cover-up after another, one threat, one psyop after another. It never ends.
To a significant degree, all these operations are just that, planned moves. And they do concern all of us, because the scope of the operations is vast.
However, on another level, these ops are designed for the purpose of engaging all of us so that we’ll keep thinking in terms of the group (“all of us”)…and never think about anything else.
If you can tune up the population to keep thinking about the group, the collective, you’ve got them.
Hence, the title of this piece: “What concerns all of us at this time.”
But what about: what concerns NONE of us at this time.
What about that?
What about what doesn’t even exist at this time?
What about what has yet to be imagined and created?
Who handles that?
What department do you contact to find out about THAT?
Well, you can consult DARPA or any number of think-tanks or the CIA, but again, these blueprints of the future involve all of us.
I’m talking about something else:
That discredited and stepped-on and discounted faculty of the individual called imagination which, by the way, is not a container holding shielded secrets, but is instead a capability of invention.
Everything mind control ever was, is, or will be, is ultimately aimed at producing amnesia about that capability. Therefore, when you bring up the subject of imagination, most people just shake their heads and move on. They are clueless about their own astonishing power.
Being ignorant, they are easy marks. They can be cajoled into spending their whole lives thinking about “what concerns us most at this time.”
When I put together my two mega-collections, The Matrix Revealed and Exit From the Matrix, I was cognizant of this. But I also knew there were people out there who were looking for something else, something beyond group concerns that could trap them forever— concerns that build a wall between them and their own creative power.
Creative power—this “little selfish preoccupation,” as it’s been called—is the difference between night and day, civilization and chaos, desire fulfilled and victimhood, life-force and walking death, deception and insight, fierce joy and a sinkhole in which the same emotions go around and around and around.
The reason behind the reason I write about fraud and crime and conspiracy in public life is: I want to expose how reality is being built for us. How perverse designers are constructing a collective mural of existence.
Understanding that, one can begin to see how he can create other realities—without end.
It’s as if we’re living in a huge room with no ceiling and yet we’re behaving as if there is a ceiling 10 feet high. The “10- feet high” is the result of amnesia about our own imaginations.
The purpose of the collective is destruction of imagination.
But imagination can never be destroyed. All individuals can do is force themselves to stay asleep about it.
Free Energy
The time will inevitably come when mechanistic and atomic thinking will be put out of the minds of all people of wisdom, and instead dynamics and chemistry will come to be seen in all phenomena. When that happens, the divinity of living Nature will unfold before our eyes all the more clearly.
Johann von Goethe, 1812
Follow Blog via Email
Click to follow this blog and receive notifications of new posts by email.or add abzu2 to your PULSE app | 2023-09-08T01:27:17.568517 | https://example.com/article/4239 |
Conflicts of interest: None declared.
Key PointsChildren show a milder course of COVID‐19 infection than adults.The impact of COVID‐19 infection in paediatric patients with chronic or degenerative diseases is not known.Dedicated guidelines should be developed for these patients and their families.
Since December 2019, a novel, highly infective coronavirus has emerged in Wuhan, China, rapidly spreading around the world. In the last few months, several studies on paediatric COVID‐19 have been published,[^1^](#jpc14994-bib-0001){ref-type="ref"}, [^2^](#jpc14994-bib-0002){ref-type="ref"}, [^3^](#jpc14994-bib-0003){ref-type="ref"}, [^4^](#jpc14994-bib-0004){ref-type="ref"} highlighting the less aggressive clinical course observed in children compared to adults. However, there is limited evidence regarding the impact of COVID‐19 in paediatric patients with chronic or degenerative diseases.
Case Report {#jpc14994-sec-0002}
===========
We report the case of a 5‐year‐old girl with mucolipidosis type II (mutation of both GNPTAB genes: c.3503_3504delTC) who died from COVID‐19 pneumonia complicated by acute respiratory distress syndrome (ARDS).
She had growth retardation (weight, height and head circumference \< 3rd percentile) and neurological impairment. Since 2018, she developed hypertrophic cardiomyopathy, with thickening of the mitral and aortic valves. Despite this, cardiac and pulmonary function remained stable, with no need for respiratory support or pharmacological therapy.
On 25 March, 2020, she had fever of 39.5°C and rhinorrhoea, with overall good clinical condition. At that time, some members of her family presented symptoms suggestive of SARS‐CoV‐2 infection. Her mother had anosmia without respiratory symptoms; one aunt had a febrile respiratory infection; and two grandparents had fever, cough and fatigue. Oral broad‐spectrum antibiotic therapy was started due to persistent fever; a nasopharyngeal swab for detecting SARS‐CoV‐2 was performed. Two days later, the young child became symptomatic with moderate dyspnoea (respiratory rate 30/min, mild intercostal retractions) and needed supplemental oxygen. Meanwhile, positivity for COVID‐19 was confirmed. Although the parents were initially keen to keep their child at home, hospitalisation was necessary. On admission, chest X‐ray showed marked bilateral opacification (Fig. [1](#jpc14994-fig-0001){ref-type="fig"}). Her serum C‐reactive protein was 17.3 mg/dL, lactate dehydrogenase 700 U/L and interleukin‐6 78.3 pg/mL (normal 5--15), with normal blood cell count and renal and liver function tests.
{#jpc14994-fig-0001}
Parenteral hydration, intravenous antibiotics (ceftriaxone and azithromycin) and corticosteroid therapy (methylprednisolone 1 mg/kg/day) were started. In less than 24 h, mask oxygen requirement increased to 7--8 L/min. We considered therapy with hydroxychloroquine, but this was not administered due to her rapid deterioration.
Parents and doctors, in consideration of the patient\'s underlying disease, agreed not to proceed with invasive ventilatory support. The patient passed away in her mother\'s arms in the following days.
Discussion {#jpc14994-sec-0003}
==========
There is strong evidence that COVID‐19 infection is generally milder in children than adults.[^1^](#jpc14994-bib-0001){ref-type="ref"}, [^2^](#jpc14994-bib-0002){ref-type="ref"}, [^3^](#jpc14994-bib-0003){ref-type="ref"}, [^4^](#jpc14994-bib-0004){ref-type="ref"} The cause for this difference in incidence and severity is still not known. Many hypotheses have been formulated so far, including differences in the immune response, different ACE2 receptor expression and/or lower risk of developing ARDS.[^5^](#jpc14994-bib-0005){ref-type="ref"}
The largest paediatric case series described patients with a median age ranging from 6.7 to 8.3 years.[^2^](#jpc14994-bib-0002){ref-type="ref"}, [^3^](#jpc14994-bib-0003){ref-type="ref"}, [^4^](#jpc14994-bib-0004){ref-type="ref"} Qui *et al*. reported 36 hospitalised children, of whom 53% had moderate pneumonia, 19% had dry cough only, and 28% had mild symptoms or were asymptomatic.[^2^](#jpc14994-bib-0002){ref-type="ref"} In a cohort of 171 paediatric patients, Lu *et al*. reported cough and pharyngeal erythema as the most common symptoms, associated with fever in less than half of patients.[^3^](#jpc14994-bib-0003){ref-type="ref"} Chest‐X‐ray showed ground‐glass opacity in 32.7%, patchy local shadowing in 18.7% and patchy bilateral shadowing in 12.3% of patients. Only three patients needed invasive ventilation, one of whom had leukaemia on maintenance chemotherapy, one had hydronephrosis and one had intussusception. Dong *et al*.[^4^](#jpc14994-bib-0004){ref-type="ref"} described 2143 paediatric patients: 731 laboratory‐confirmed cases and 1414 suspected cases. Unlike adult patients, only 5% of symptomatic children had dyspnoea or hypoxia, and only 0.6% progressed to acute respiratory distress syndrome.
Ludvigsson analysed data from 45 scientific papers and letters on COVID‐19 in children, confirming the milder disease course and better prognosis in children than adults.[^6^](#jpc14994-bib-0006){ref-type="ref"} The proportion of all cases that were paediatric ranged between 1 and 5%, with a much lower rate of severe pneumonia, lymphopenia and raised inflammatory biomarkers.[^6^](#jpc14994-bib-0006){ref-type="ref"} However, there are less data on COVID‐19 in children with comorbidities such as cancer or chronic or degenerative diseases. Sinha *et al*.[^7^](#jpc14994-bib-0007){ref-type="ref"} recommend that these patients should be considered at higher risk for complicated disease. Interestingly, Bouffet *et al*.[^8^](#jpc14994-bib-0008){ref-type="ref"} recently provided some recommendations regarding the optimal management of children with cancer. Ideally, these patients should be admitted to COVID‐19‐free hospital sites with dedicated health‐care providers. In addition, if at all possible, they should be managed at home, observing general infection prevention rules and appropriate use of personal protection equipment (PPE) by health‐care personnel and by other care givers in close contact with the patient, while maintaining a strict clinical monitoring and ongoing communication with the hospital team.
A similar level of protection may need to be adopted for children with metabolic conditions. The use of PPE even at home by family members, a scrupulous education of care givers in the prevention of transmission and the strengthening of telemedicine for early recognition of alarming situations could improve the management, quality of life and outcome of these fragile patients.
Conclusions {#jpc14994-sec-0004}
===========
We report the first paediatric death in Italy of a young child with a severe metabolic disorder. Our case emphasises that some children with chronic medical conditions may have a worse prognosis with COVID‐19 infection. This has implications for prevention. Health‐care providers should provide special support and guidance to these patients and their families.
The authors thank the child\'s parents for approving the publication of this case.
| 2024-07-10T01:27:17.568517 | https://example.com/article/3782 |
Frogmom
Inspiring outdoors families
Exploring Middle Earth on Skye with Children: The Quiraing
Views of the Quiraing, Trotternish Ridge, Isle of Skye
By the looks of this fantastic Jurassic landscape carpeted in Scottish green grass, the Quiraing could be part of Middle Earth, the Lord of the Rings continent replete with large scale mountains, valleys and coasts bordered by the undying lands and the land of the dead. And yet the minute you step on the trail, you forget all about what the landscape could be to admire what it is. Otherworldly comes to mind, unique for sure, or just plain stunning. So stunning it’s a surprise you even remember to keep on walking! It’s even more surprising that this trail is so accessible for all ages, from children to grand-parents. We hiked around the Quiraing with my girls and my dad and despite the 5 miles, some snow and a few airy parts, the adventure was over too soon for our taste. If your kids like scrambling, climbing, running or sliding (down scree slopes), this walk’s for them – a must for any pint-size world explorer shortlist.
Photo Gallery – Click on Thumbnails to Enlarge
Trailhead
On the trail
The Trotternish Ridge
I’m balancing on a rock
My 7-year old ready to slide down the hill
The Needle
My 9-year old going down from The Needle towards The Prison
Small loch
Going up to the summit
My girls happily skipping down The Quiraing
My dad and I
Views of the Quiraing, Trotternish ridge, Isle of Skye
First, the name Quiraing. Like a lot of Scottish names, the pronunciation is impossible until a local says it – it sounds like queer-ang, with -ang as in fangs with a twang. Now that you got the pronunciation down, the other burning topic – geology! The Quiraing is a landslip – an area of Jurassic sedimentary rock that collapsed under the weight of giant lava flows, causing huge rocks to break along a 2-km long fault and glide towards the sea, rotating in the landslide. Yes I know, it sounds complicated but that’s perhaps the most beautiful landslide you’ll ever see so it’s worth knowing what happened. Now that we got that out of the way, on with the hike.
The Map
When I first read about the Quiraing in Country Walking‘s April 2013 issue on Treasure Islands, I dutifully tore off the page and stored it in a plastic sleeve for our trip to Skye. Reading it closer to the day, I found I wanted more detail to spot a few funny rock formations and side trails. The article and my 1:50,000 Ordnance Survey map #23 North Skye proved not detailed enough so we used an annotated 1:10,000 satellite view of the area instead. It’s called “10 Step Self Guided Walk through the Quiraing” and we found it at the Ellishadder Art Cafe.
From The Trailhead To The Prison
By mid-morning, we parked at the pass for the Quiraing trailhead under a heavy sky. Showers and/or wet snow might be in the cards, we didn’t know. While we were getting my girls’ gear sorted out, my dad walked over to a metal plaque. “They talk about The Lord of the Rings!” he said. I went over too. Indeed, the landscape was described as being similar as to that of Middle Earth. Such a reference bode well for the hike, even if it didn’t mean much for my young girls yet.
With full packs on our backs, we made for the trail right across from the parking area at the pass. Clearly marked and signed for Flodigarry, it headed north-east through flat moorland towards rocky pillars. Within minutes, we were on a narrow dirt path skirting the outline of the mountainous ridge. No place for cartwheels, it was single file or drop with the sheep. I followed my 7-year old and roughly 10 minutes in, reached The Wet Step. This small gully had a weird narrow rocky section and a hairpin turn where I had to trust my boots and just hop on over the rock to safety above a 6-foot drop.
Less than a mile away from the trailhead, we reached a rocky outcrop with terraced grassy slopes and decided to drop our bags for an early lunch and some play time (for my girls). Sheltered from the wind, comfortable and dry, this awesome spot invited both bird-gazing and grass-napping but for my girls, it also meant active bouldering and rock jumping. With our stomachs happy, we picked up our bags for a section that looked tricky to me – it was going to be seriously steep. As we reached a small rock pyramid, we had The Prison on our right, The Needle on our left.
To The Needle and The Table
From the pyramid, most people turned left and attempted the steep climb to reach The Needle, straight up an earthy slope without much to hold onto. Our guide map suggested a more gradual route to the left also, but along a snaking path up to the cliff base. Alas vertigo got the better of me and I bailed out, along with my 7-year-old who decided she’d stick with her mom and slide down the slope on her butt.
My 9-year old, my husband and my dad reached the cliff base and then walked straight to the Needle. From what I understand, hell of a view but it’s dizzyingly steep looking down. From there, they set out to find The Table. Within the Quinraing’s landslip are several odd rock formations including The Table, an elevated hidden plateau the size of a football field once used to conceal cattle from Viking raiders. I almost cried when I realized I wouldn’t be going up there because I knew scenes of Highlander had been shot there and it sounded quite breathtaking.
Frustrated by my vertigo, I decided I’d take a second shot at The Needle and undertook the “straight up” climb. However a third of the way through, a blond woman came down and delivered a message from my husband: “Do not climb. There’s a lot of snow up there. They’re coming down.” A part of me was relieved. They were not going up after all. I slid down the slope – again – and with my little one, we scrambled up The Prison for fun until we were all reunited.
Too bad Table, some other time.
To The Summit
Most visitors turned back at The Prison to retrace their steps but we wanted to see the top of the summit so we kept going on the same path. Walking under the overhanging cliff, we saw the grassy slopes and hills turn white with snow as that side was probably less exposed to the sun. We passed along the small Loch Fada, a small pond surrounded by snow. After some going down, the path leveled up and went up again. We were soon reaching our turnaround point, the lowest point of the Quiraing’s mighty “shield”.
At the pass we went over a style and turned around to doubleback. Time to hit the summit!
This side of the mountain was completely snowed-in. The sky was so dark that the area had a gloom-and-doom feeling. Had this been in The Game of Thrones, you’d know that winter was coming. I said a silent prayer for fair weather because by now we were on our own. No other travelers had ventured this far and a snowstorm would not be welcome without proper gear. Though we could follow footsteps on the hill, we would be by ourselves.
For scenic purposes, our path followed the cliff edge – which made me nervous at times – and allowed great views of the coast and mountain range. The snow got deeper and soon we were carving steps in icy patches with our hiking boots, trying to find the best footing at each step. It started snowing. My dad slipped twice, my 9-year old once, and the hill looked like it would never end. This snowy uphill walk was not easy! Each time I thought we were cresting the ridge, another formidable fold presented itself and I yelled to the ones behind, “It’s going to be the next ridge!” hoping I’d be right.
What a tricky landslip this is. Finally the slope got easier. The ground got flatter and we reached a rocky cairn marking the summit. We made it!
Back To The Trailhead
Next to the summit, the cliff edge presented some breaks through which we were able to glimpse The Table – from above. What had seemed impossibly high earlier on the trail stood now hundreds of feet below us. I dared not get closer to the edge – it’s deceptively round and any drop would be fatal – but it all seemed very high to me.
From there, we had a full view on the other hills of the Trotternish Ridge that go up the peninsula almost until the northern tip. What a view! The path was less obvious then but we did as before, skirting the edges of the cliff until we found a clearer path that went down the hill in successive drops. The last part of the hike was closer to running than walking downhill and my girls had a lot of fun skipping, jumping and racing each other.
Including the slow-going on snow and lunch stop, the hike took us 5 hours. That evening, we spent a lot of time looking at our pictures in awe. That’s one hike I’d do again in a heartbeat – in any weather.
Kids: can get a delicious hot chocolate and scones at the nearby Ellishadder Art Cafe, where the owner is an artist and gave paper and pencils to my girls so they could make a drawing. Closer to The Quiraing – though we haven’t stopped there – is The Small and Cosy Teahouse.
Laure Latham
Laure is an author, environmental advocate, blogger, open water swimmer and now mother. She's passionate about inspiring families to enjoy the outdoors with their children, learning to unplug and living a healthy lifestyle, giving kids life skills and exploring the world around us sharing Family Friendly, Fun Ideas for the whole family on Frog Mom.
Sign up for my newsletter!
...AND GET A FREE OUTDOORS FAMILY GUIDE
No spam & contact details privacy guarantee
2 Responses to “Exploring Middle Earth on Skye with Children: The Quiraing”
October 11, 2018 at 1:32 am, Kenneth Rexford said:
I took my family on vacation two Great Britain and included the Isle of Skye and the quiraing. I have been reading The Hobbit to my six-year-old daughter charlee. Tonight, she looked at some illustrations in The Hobbit and pointed to one, saying that it looked just like where we were on the quiraing, even pointing to a gully where we stopped. Another illustration of Laketown reminded her of Scottish lochs. When I told her that The Hobbit is set in ancient Britain her eyes lit up. It brought a tear to my eye because I could not imagine that my hoped result of her sometime in life drawing that connection would come so soon. I enjoyed your article.
Thank you Kenneth, that is a very sweet story. Charlee is a very observant little girl and so young too. Connecting landscapes to stories at age 6! Don’t tell her that the Lord of the Rings was filmed in New Zealand, she’ll be crushed. I’m pretty sure Mount Doom can be imagined in the close suburbs of Oxford. | 2024-04-10T01:27:17.568517 | https://example.com/article/3342 |
/*
* ______ _____ _______
* .-----..--.--..----..-----.| __ \ \| ___|
* | _ || | || _|| -__|| __/ -- | ___|
* | __||_____||__| |_____||___| |_____/|___|
* |__|
* $Id: Indentation.as 238 2010-01-31 10:49:33Z alessandro.crugnola $
* $Author Alessandro Crugnola $
* $Rev: 238 $ $LastChangedDate: 2010-01-31 05:49:33 -0500 (Sun, 31 Jan 2010) $
* $URL: http://purepdf.googlecode.com/svn/trunk/src/org/purepdf/pdf/Indentation.as $
*
* The contents of this file are subject to LGPL license
* (the "GNU LIBRARY GENERAL PUBLIC LICENSE"), in which case the
* provisions of LGPL are applicable instead of those above. If you wish to
* allow use of your version of this file only under the terms of the LGPL
* License and not to allow others to use your version of this file under
* the MPL, indicate your decision by deleting the provisions above and
* replace them with the notice and other provisions required by the LGPL.
* If you do not delete the provisions above, a recipient may use your version
* of this file under either the MPL or the GNU LIBRARY GENERAL PUBLIC LICENSE
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the License.
*
* The Original Code is 'iText, a free JAVA-PDF library' ( version 4.2 ) by Bruno Lowagie.
* All the Actionscript ported code and all the modifications to the
* original java library are written by Alessandro Crugnola (alessandro@sephiroth.it)
*
* This library is free software; you can redistribute it and/or modify it
* under the terms of the MPL as stated above or under the terms of the GNU
* Library General Public License as published by the Free Software Foundation;
* either version 2 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU LIBRARY GENERAL PUBLIC LICENSE for more
* details
*
* If you didn't download this code from the following link, you should check if
* you aren't using an obsolete version:
* http://code.google.com/p/purepdf
*
*/
package org.purepdf.pdf
{
import it.sephiroth.utils.ObjectHash;
public class Indentation extends ObjectHash
{
public var imageIndentLeft: Number = 0;
public var imageIndentRight: Number = 0;
public var indentBottom: Number = 0;
public var indentLeft: Number = 0;
public var indentRight: Number = 0;
public var indentTop: Number = 0;
public var listIndentLeft: Number = 0;
public var sectionIndentLeft: Number = 0;
public var sectionIndentRight: Number = 0;
}
} | 2024-01-27T01:27:17.568517 | https://example.com/article/6162 |
The Top 10 Advantages of Purchasing a Newly Constructed Home
The Top 10 Advantages of Purchasing a Newly Constructed Home
The Top 10 Advantages of Purchasing a Newly Constructed Home
McLean Mortgage
The Top 10 Advantages of Purchasing a Newly Constructed Home
1. Customization: New homes are designed to your taste.
From the floor plan to colors, a new home is tailored to your personal needs and preferences. With a resale you are purchasing a home that was crafted for someone else’s taste and lifestyle. Sure you could change the floors and countertops, but why not avoid the hassle and move into a home which was designed just for you?
2. Location: You get to pick the lot upon which your new home will be located.
Location can mean everything when choosing real estate. With a new home, you get to choose the model you want AND the location of your home. With a resale you are limited to what is on the market and the model and location may not fit your needs. There is not the same need to compromise when you purchase a new home.
3. Community: Join a community of people who are just like you.
When you purchase a new home you are also becoming part of a new community. That means you will be meeting others who also are looking to meet their new neighbors, settle into a new community and discover new things about your new neighborhood. These relationships you establish with your new neighbors may last a lifetime.
4. Cost: New homes are more energy efficient.
With the cost of energy rising every year, new homes can save you money every day of the year in the long run. New homes are equipped with the latest green appliances and energy units. In addition, they are built to higher energy efficiency standards as opposed to resales built some time ago.
5. Cost: New homes require less maintenance.
When you purchase a new home, every part of that home is new. A resale is used and the parts of the home will vary as far as their usage. You don’t know how long it will be before the roof or appliances will need to be repaired or replaced. In addition, in the long run new homes require less maintenance as today’s new homes are engineered specifically to minimize maintenance requirements. Moving takes energy and effort. Why add the worry about what will break the day after you move in?
6. Cost: New homes come with special financing packages.
Builders understand that the cost of ownership can be significantly affected by the cost of a mortgage. That is why builders offer special financing packages offered by expert mortgage advisors. These advisors can help you make the right choice to finance your home.
7. Cost: New homes are priced right.
While many home shoppers are bargain hunting for used homes, there is no way of knowing whether they actually received a bargain when they made their purchase. Often times, there are multiple contracts submitted for lower priced resales which raises the price of these homes. You may have to make a decision quickly and not be able to take into account the cost factors mentioned in this article. With a new home, the price is set at an established market price which has been verified again and again by a qualified appraiser. Don’t take a chance on a value which is undeterminable.
8. Peace of Mind: New homes have home warranties.
New homes are offered with home warranties that are not standard with resales. These warranties cover the home from top to bottom. With a resale you are going to pay for repairs from day one, unless you invest in a home warranty on your own.
9. Looking Ahead: Today’s new homes are built with the future in mind.
Technology is quickly advancing each year, and most new homes offer features that can be updated so that you can keep up with future innovations. To achieve these advances with existing homes, you may have to replace entire systems or make major changes to the structure and/or interior of your home. Planning for the future with a new home is not limited to technology. With the freedom of choice that comes with building a new home you can decide what features you would like to put in place for future improvements, such as a basement which is ready to finish in the future.
10. Looking Ahead: New homes are more attractive to resell.
If you are thinking ahead to your next move, realize that should you purchase an existing home, your resale will be even older five to ten years from now. More of the features are likely to be outdated. Your new home is going to be more attractive to sell when you are ready to move up or retire –whenever your next move is coming.
Bonus Reason: Safety.
New homes have fire safety features which were not required previously. This includes fire-retardant carpets and insulation and the latest smoke detector technology.
There is no way to measure the value of safety, convenience and comfort. But when you put it all together, a new home measures up as the real value in home ownership. | 2023-11-28T01:27:17.568517 | https://example.com/article/5722 |
Q:
How to find a parmetrization of..
..of this curve $x^2+y^2=1$ and $z=x^2$ anticlockwise from (1,0,1) to (-1,0,1).
I sort of understand how to find a parmetrization when the curve is simpler but here I'm lost.
A:
We can take
$x=\cos t$
$y=\sin t$
$z=\cos^2 t$
now we need to find a correct range for $t$.
| 2024-02-17T01:27:17.568517 | https://example.com/article/9779 |
[An improved guide for urethral bougies].
A routine-technique urethral bougienage using an elastic guide in marked urethral strictures is performed practically at random in view of great difficulties of the guide advance through the narrow part of the urethra which is not safe for urethral tissues. An atraumatic guide developed by the authors is radio-opaque. This makes it possible to bring it along the urethra to the bladder under the control of x-ray television and to avoid damage to the tissues. The guide was used in 9 patients with urethral strictures who failed bougienage attempted by conventional methods. Not only the results were positive, but also there were no complications such as urethrorrhagia, false urethral passages and urethral fever. | 2024-07-28T01:27:17.568517 | https://example.com/article/2137 |
Salicylic acid
Salicylic acid
Author Bio -
* Salicylic acid is an ingredient in many skin care products used to treat various skin conditions.
Salicylic acid used in the treatment of scaly skin diseases where the skin has become thickened, scaly and flaky. It is the key ingredient in many skin-care products for the treatment of acne, psoriasis, calluses, corns, keratosis pilaris, and warts. It's also used in some shampoos to treat dandruff.
Salicylic acid works by causing the cells of the skin to shed more readily, opening clogged pores and neutralizing bacteria within, preventing pores from clogging up again and allowing room for new cell growth.
Dosing
Salicylic acid in many concentration levels and in many forms, which clude cream, gel, lotion, ointment, pads, plaster, shampoo, cleanser and topical solution. It's applied topically anywhere from several times a day to a few times a week, depending on what it's being used to treat. It's available in both over the counter and prescription medications. If it's being used to treat acne, it may cause dry or irritated skin at the beginning of your treatment. Start with a low dosage and increase as you get used to it.
Side Effects
Side effects are generally mild and may include moderate or severe skin irritation, flushing, and unusually warm skin and reddening of skin. Serious side effects are rare, but notify your doctor if you experience any of the following: confusion, dizziness, extreme tiredness or weakness, headache, fast breathing, ringing or buzzing in the ears, hearing loss, nausea, vomiting, or diarrhea.
Notes of Precaution
* Salicylic acid is for external use only. Keep away from eyes, nose, and mouth.
* Use Salicylic acid only on affected areas, as it may cause damage to healthy cells.
* If you are using Salicylic acid to treat acne, it may take several weeks to see improvement.
* Notify your doctor if you are allergic to Salicylic acid or any other medications.
* Notify your doctor if you have or have ever had diabetesor blood vessel, kidney, or liver disease.
* Consult with your doctor if you are pregnant or plan to become pregnant before using Salicylic acid.
* Children or teenagers who have the flu or chicken pox should not use Salicylic acid. | 2023-10-02T01:27:17.568517 | https://example.com/article/7231 |
/*
* This file is part of SpongeAPI, licensed under the MIT License (MIT).
*
* Copyright (c) SpongePowered <https://www.spongepowered.org>
* Copyright (c) contributors
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE.
*/
package org.spongepowered.api.data.type;
import org.spongepowered.api.CatalogType;
import org.spongepowered.api.text.translation.Translatable;
import org.spongepowered.api.util.annotation.CatalogedBy;
/**
* Represents a type of "brick".
*/
@CatalogedBy(BrickTypes.class)
public interface BrickType extends CatalogType, Translatable {
}
| 2023-10-03T01:27:17.568517 | https://example.com/article/4446 |
Other Product Websites
It doesn fall into the Sun this also possesses forward momentum. Rating: LIGO/T. Be careful you do not reveal any trade secrets. They might be collaborators, But i am not saying that word won't get around to unfriendly corners of the market. So we have no basis for presuming that the two are even identical. When we equate life receive and reality, We make an unjustified leap..
In much exactly as governments fail to accurately measure social progress and sustainability, These are stuck in a dying paradigm. While the Economist puts it, "Either governments are not serious about global warming or fossil fuel firms are overvalued,.
Even beginning with a raw potato, It takes only ten or fifteen minutes to peel, Steam, And even mash. And more of that is boiling time, And these can be profitably used to obsessively remove pork from noodles and/or praise your pets(See about).. Stephen Shankland/CNET live Adidas Shoes For Girls Gold search(GOOG) Hires only a tiny part of the many applications it receives. It may be no surprise that the Internet giant has a stringent candidate selection process, Although Google has moved from the brain teasers it was once famous for, For example"How many baseballs would fit inside a 747,.
Plus they went to the Cup the next year. (I not saying this team is as good as that team, Definitely. Furthermore, Even those who don move throughout the globe find the world moving more and more around them. Walk just six disables, In a queen or Berkeley, And you vacationing through several cultures in as many minutes; Get into a cab not in the White House, And you often in a form of Addis Ababa.
Play around with some other angles as you take your photos and don't stop once you think you've got a good one. Tired baby is still holding his pose, Keep take shots!. For community. EqualEd poll, We asked thought leaders both in the classroom and out whether they think it is possible to have both.
Own associates, Adidas Shoes For Girls Gold I've got to Adidas Shoes For Girls Gold present you, Frankly some of them have been a little bit adrift and not watching the training requirements and that kind of gummed up the works. But those people are aware they are in for some big changes now. In the NFC microfilm, A filing cabinet is quickly answering; Part of the responses are quite short, But other medication is 10,000 words or two. One correspondent has written a small book.
Many different foods these are known as aphrodisiacs. Some of the renowned options include oysters, Oatmeal, Chilis, Java, And cocoa. Layers in place. You may want to use long push pins to secure the fabric to the rod. He determined it in 77.99 a few no time. He explains to BBC journal that he sees numbers as"Presentations" Or just"Phrases" That can be structured so he sees the solution, And he works on his mental math elements daily, Like an athlete working out for a sport. | 2023-10-11T01:27:17.568517 | https://example.com/article/7601 |
How Will Canada Survive A Housing and Oil Crash?
Ratings agency Fitch had already warned about Canada’s magnificent housing bubble that is even more magnificent than the housing bubble in the US that blew up so spectacularly. “High household debt relative to disposable income” – at the time hovering near a record 164% – “has made the market more susceptible to market stresses like unemployment or interest rate increases,” it wrote back in July.
On September 30, the Bank of Canada warned about the housing bubble and what an implosion would do to the banks: It’s so enormous and encumbered with so much debt that a “sharp correction in house prices” would pose a risk to the “stability of the financial system”
Then in early January, oil-and-gas data provider CanOils found that “less than 20%” of the leading 50 Canadian oil and gas companies would be able to sustain their operations long-term with oil at US$50 per barrel (WTI last traded at $47.85). “A significant number of companies with high-debt ratios were particularly vulnerable right now,” it said. “The inevitable write-downs of assets that will accompany the falling oil price could harm companies’ ability to borrow,” and “low share prices” may prevent them from raising more money by issuing equity.
In other words, these companies, if the price of oil stays low for a while, are going to lose a lot of money, and the capital markets are going to turn off the spigot just when these companies need that new money the most. Fewer than 20% of them would make it through the bust.
To hang on a little longer without running out of money, these companies are going on an all-out campaign to slash operating costs and capital expenditures.The Canadian Association of Petroleum Producers estimated that oil companies in Western Canada would cut capital expenditures by C$23 billion in 2015, with C$8 billion getting cut from oil-sands projects and C$15 billion from conventional oil and gas projects.
However, despite these cuts, CAPP expected oil production to rise, thus prolonging the very glut that has weighed so heavily on prices.
Then on January 21 – plot twist. The Bank of Canada surprised the dickens out of everyone by cutting the overnight interest rate by 25 basis points. So what did it see that freaked it out? A crashing oil-and-gas sector, deteriorating employment, and weakness in housing. A triple shock rippling through the economy – and creating the very risks that it had fretted about in September.
“After four years of scolding Canadians about taking on too much debt, the Bank has pretty much said, ‘Oh, never mind, we’ve got your back’, despite the fact that the debt/income ratio is at an all-time high of 163 per cent,” wrote Bank of Montreal Chief Economist Doug Porter in a research note after the rate-cut announcement. Clearly the Bank of Canada, which is helplessly observing the oil bust and the job losses, wants to re-fuel the housing bubble and encourage consumers to drive their debt-to-income ratio to new heights by spending money they don’t have.
And what Fitch worried about concerning the housing market in July – that “high household debt relative to disposable income has made the market more susceptible to market stresses like unemployment…” – is now coming to pass.
On Wednesday, Statistics Canada rejiggered its job creation and unemployment numbers by slashing the number of jobs created in 2014 to a mere 121,000. December proved to be even drearier than previously reported: a total of 11,300 jobs were lost.
Now layoffs have begun to cascade through the Canadian oil patch, with 20,000 to 25,000 job cuts already announced so far. They will trigger additional job cuts in other industries. Plus Target’s 17,500 cuts to hit when it leaves Canada. Alberta’s Labor Minister, Ric McIver, told AM 770 on Saturday that the number of unemployed workers would jump by 22%. And he exhorted the government and employers to think long-term about retaining skilled workers for whenever the good times might return.
John Garth Turner, former Member of the House of Commons and now best-selling author in Canada, explained it this way on his always pungent site, The Greater Fool:
The fewest number of people are currently working in Canada since back in 2000, which is a big black eye for a government that slashed interest rates, crushed the dollar, and added $170 billion in national debt over the last six years. Now it doesn’t even have the stones to bring forth a budget, or warn people from scarfing down more debt when the party’s clearly over. Sad.
The oil industry in the US too is dead-serious when it talks about slashing operating costs and capital expenditures. Preserving cash is suddenly a priority, after years when money was growing on trees. And cost cutting has reached frenetic levels.
Courtesy Wolf Richter at WolfStreet.com (EconMatters archive HERE)The views and opinions expressed herein are the author's own, and do not necessarily reflect those of EconMatters. | 2023-10-11T01:27:17.568517 | https://example.com/article/3321 |
Evolution of wave-packet spread under sequential scattering of particles of unequal mass.
Under assumptions on initial wave-packet spreads and particle interactions, different mass particles scattering off one another will have the product sigma(2)(i)m(i) converge to a common value, where sigma(i) is the spread and m(i) is the mass of the ith particle. When this relation is satisfied, kinematic entanglement vanishes. | 2024-03-24T01:27:17.568517 | https://example.com/article/6790 |
The campaign of presidential hopeful Senator Barack Obama has launched a website to debunk what it claims are false accusations against the candidate and his wife, at the same time critics are slamming the Fox News Channel over controversial references to her.
The website, titled Fight the Smears, was launched Thursday to counter claims that a tape exists of Michelle Obama using the word "Whitey" from the pulpit of Trinity United Church of Christ in Chicago.
"No such tape exists. Michelle Obama has not spoken from the pulpit at Trinity and has not used that word," the website states.
Critics have also complained over references Fox News has made about Michelle Obama in past weeks — the most recent being a graphic that appeared on Wednesday labelling her as "Obama's baby mama."
During an interview on Fox with conservative columnist Michelle Malkin about whether Barack Obama's wife has been the target of unfair criticism, a graphic appeared on the screen that read: "Outraged liberals: Stop picking on Obama's baby mama."
Fox anchor E.D. Hill also had to apologize after she referred to an affectionate onstage fist bump shared by the couple as a "terrorist fist jab."
Hill later said the comment was picked up from something she had read online. She said some people "thought I had personally characterized it inappropriately. I regret that. It was not my intention and I certainly did not mean to associate the word 'terrorist' in any way with Senator Obama and his wife."
Fox cancelled Hill's weekday afternoon program as part of a larger reorganization. She remains on staff.
But Michelle Obama sparked controversy over a speech she made in February. Talking about her husband's campaign, she said that "for the first time in my adult lifetime I'm really proud of my country."
Meanwhile, while Fox has come under fire, MSNBC has also sparked anger for comments by some commentators about Hillary Clinton.
The network's Chris Matthews has been accused by some of being pro-Obama, and was ridiculed after saying that he felt a "thrill going up my leg" after watching an Obama speech. He later had to apologize for his remarks about Clinton after he said "the reason she's a U.S. senator, the reason she's a candidate for president, the reason she may be a front-runner is her husband messed around."
MSNBC reporter David Shuster was also suspended for two weeks for saying Clinton's campaign had "pimped out" daughter Chelsea by having her make political phone calls. | 2024-03-22T01:27:17.568517 | https://example.com/article/9775 |
Grant to USC Libraries and L.A. as Subject Helps Reveal the Less-Visible Stories of Los Angeles
The Institute for Museum and Library Services (IMLS) has awarded the USC Libraries and the L.A. as Subject research alliance a grant to develop a residency program that will support archival education among Los Angeles community archives. The grant is part of the IMLS Laura Bush 21st-Century Librarian Program, which funds training of early-career librarians to manage emerging challenges in libraries and librarianship.
Hosted by the USC Libraries, L.A. as Subject comprises 230 libraries, museums, archives, and private collections of valuable primary sources and other materials that document the history and culture of Los Angeles. The Autry National Center Libraries and Archives and California State University at Northridge (CSUN) Libraries partnered with the USC Libraries in developing the successful proposal and the residency program.
Throughout the term of the grant, the Autry, CSUN and USC each will host and mentor two residents, who in turn will work with community-based archives among the L.A. as Subject membership. The residents will help the smaller organizations and individual collectors apply archival standards and practices to make certain their collections become and remain accessible to students, scholars and the global community of researchers studying the history and meaning of Los Angeles.
“No single institution can capture and preserve the stories that make up the totality of Los Angeles,” said Catherine Quinlan, dean of the USC Libraries. “This generous support from IMLS helps the USC Libraries and our partners ensure that the many collections of less-visible Los Angeles histories become sustainable resources for scholarship on Southern California, the American West and our city as a Pacific Rim metropolis.”
The membership of L.A. as Subject represents a tremendous cultural, linguistic, and disciplinary reach, with collections documenting the experiences of Mexican-American immigrants in Pico Rivera and Boyle Heights, pre-Stonewall LGBTQ history on the West Coast, labor-rights movements, and countless other areas of under-explored history.
The $440,000 grant supports six residents over a period of three years. L.A. as Subject will issue a call for proposals from community archives and private collectors and match residents with archives relating to their research interests. Residents also will participate in the annual L.A. as Subject Archives Bazaar, which brings more than 1,000 students, researchers and history enthusiasts to Doheny Library on the USC campus each fall. | 2024-01-06T01:27:17.568517 | https://example.com/article/3588 |
Q:
Black screen instead of login screen
I'm having a serious problem. I use dual OS, so I'm posting with Windows. Somewhat about 2-3 hours before everything was working fine I have modified Ubuntu a lot and was using Mac OS X login screen. It was working fine but I was just having fun and typed this command in terminal to power off (using Ubuntu 13.10) {and using root}.
sudo shutdown -h now
Also I changed the password for su using
sudo passwd root
I kept my laptop aside and came after 2-3 hours. it booted with a splash screen of mac. then it took to a blank screen (OK this happens every time, but after 5-10 seconds login appears), but these times I'm getting a black screen with a mouse. I can move the mouse but can't log in.
Only the black screen is there, but everything else is working when I press power button it shuts down like usual.
I'm stuck, please help me!
A:
To fix this, follow the steps below:
1- Turn on your computer and wait for it to boot up.
2- Once it boots up, press Ctrl+Alt+F1 to enter terminal
3- Type your username, press enter, and type your password and press enter again.
4- Now type
startx
This should start your desktop. Once here, you can uninstall/reset whatever was causing the problem (in this case Mac OS LightDM theme).
5- Reboot the computer it should boot up normally!
| 2024-07-15T01:27:17.568517 | https://example.com/article/9720 |
te -764*k**3*l - 1237*k**3 - l wrt l.
-764*k**3 - 1
What is the third derivative of 122*w**3*z**5 + 2*w**3*z**2 + 2*w**2*z**5 + 52*w**2*z**2 wrt z?
7320*w**3*z**2 + 120*w**2*z**2
Find the third derivative of -198*l**4 + 148*l**2 wrt l.
-4752*l
Find the first derivative of 17730*x - 3146.
17730
Find the second derivative of 2097*l**2 - 180*l + 1 wrt l.
4194
Find the first derivative of -j**4 - 1006*j**3 - 7*j + 9438.
-4*j**3 - 3018*j**2 - 7
What is the third derivative of 8*c**3*o*z + 4*c**3*z - 21*c**2*o*z + 3*o*z wrt c?
48*o*z + 24*z
What is the derivative of -x**3*z - 3*x**2*z**2 + 126*x**2 + 3320*z**2 wrt x?
-3*x**2*z - 6*x*z**2 + 252*x
What is the second derivative of -2*d**2*l**3*p + 2*d**2*p**3 + 78*d**2 + 71*d*l**3 + 2*d*l*p - 4*p**3 wrt d?
-4*l**3*p + 4*p**3 + 156
What is the third derivative of 1665*s**3 - 4566*s**2?
9990
What is the second derivative of -21*o**3*s**2*x**2 + 2*o**3*s**2*x + 2*o**3*x - 719*o**2*s**2*x - 124*s**2*x**2 wrt x?
-42*o**3*s**2 - 248*s**2
What is the third derivative of 4721*r**2*t**4 + 2*r**2*t**2 + r**2 + r*t**5 + 3*r*t + 4*t**2 wrt t?
113304*r**2*t + 60*r*t**2
Find the third derivative of i**5 - 1068*i**4 + 350*i**2 wrt i.
60*i**2 - 25632*i
Find the second derivative of -26183*c**3 - 2850*c wrt c.
-157098*c
Differentiate -3*j**3*n - 4*j**2*n + 85*j + 31*n + 13 wrt j.
-9*j**2*n - 8*j*n + 85
What is the second derivative of 2*i**5*k - 87*i**2*k**2 - 4*i**2*l + 7338*i*k**2*l - 2*i*l wrt i?
40*i**3*k - 174*k**2 - 8*l
What is the third derivative of -m**5*x - 46*m**3*x**2 + 6*m**3 + 437*m**2*x**2 + m**2 wrt m?
-60*m**2*x - 276*x**2 + 36
What is the third derivative of -6294*r**3 - 6931*r**2?
-37764
Find the second derivative of 104*d**2*r**2 - d + 222*r**2 wrt d.
208*r**2
Find the first derivative of f**3*h - 32*f**2*h + 4*f - 432*h wrt f.
3*f**2*h - 64*f*h + 4
Find the second derivative of 230*o**2 - 2*o - 14 wrt o.
460
What is the second derivative of -34*b**5 + b**4 - 7023*b wrt b?
-680*b**3 + 12*b**2
What is the derivative of -306*b**2*t*z**2 - b**2*z**2 - 13*b*t*z**2 - 50*b*z - 2*z**2 - 52*z wrt t?
-306*b**2*z**2 - 13*b*z**2
Differentiate -j**4*z**3 + 312*j - 737*z**3 wrt j.
-4*j**3*z**3 + 312
Find the second derivative of -2*y**5 + 755*y**2 + 4*y + 89.
-40*y**3 + 1510
Find the first derivative of 9*s**2 - 337*s - 7251 wrt s.
18*s - 337
Find the second derivative of -b**2*h**3*n**2 - 472*b**2*h**3*n - 11*b*h**3*n + 34*b*h**2*n + 3*h**3*n**2 wrt b.
-2*h**3*n**2 - 944*h**3*n
Differentiate 1158*o*u + 1987*o wrt u.
1158*o
What is the second derivative of 4356*u**2 - 47*u + 6?
8712
What is the second derivative of 2*q**2 + 52*q wrt q?
4
What is the third derivative of 4*j**5*z - 96*j**3*z**2 + 2*j**3 - 3*j**2*z - 4*z**2 - 12 wrt j?
240*j**2*z - 576*z**2 + 12
What is the derivative of -1085*j + 1503 wrt j?
-1085
What is the third derivative of -339*h**3*r**3 - h**3*r**2*t**3 + 2*h**2*r**3*t**3 - 1002*h**2*r**3*t**2 - h*r**3*t wrt h?
-2034*r**3 - 6*r**2*t**3
Differentiate -456*z + 1014.
-456
What is the third derivative of 2*o**4 - 90*o**3 + 190*o**2?
48*o - 540
What is the third derivative of 2*f**3*m**3 + 9*f**3*m + 6*f*m**6 + 520*m**3 - m**2 + 4*m wrt m?
12*f**3 + 720*f*m**3 + 3120
Find the second derivative of 19*c**3*l**3 + 29*c**3*l + 333*c*l**3 - c*l**2 + 2*c wrt c.
114*c*l**3 + 174*c*l
What is the first derivative of 14*c**4*x + 5*c**3 - 5*x - 5 wrt c?
56*c**3*x + 15*c**2
Differentiate -3*h*j**2 + 9*h*r + 8*j**2*r - 1266*j**2 + 6*j*r with respect to r.
9*h + 8*j**2 + 6*j
What is the first derivative of v**2 + 77*v*y**2 + 53*y**2 wrt v?
2*v + 77*y**2
Find the first derivative of -5*p*q**2 + p - 17*q**2 - 2*q - 9 wrt q.
-10*p*q - 34*q - 2
What is the third derivative of -a*b**3*z + 4*a*b**2*z + 2*a*z - 5*b**3*z + 2*b**3 - 31*z wrt b?
-6*a*z - 30*z + 12
What is the derivative of 118*a**3*f + 2*a**3 - 226*a wrt f?
118*a**3
Differentiate 5617*o + 13782.
5617
What is the second derivative of 247*o**5 - 264*o?
4940*o**3
Find the first derivative of a**2*l + 3*a**2*z + 2*a*l*z + 41*l*z - 429*l wrt z.
3*a**2 + 2*a*l + 41*l
What is the third derivative of -1487*c**2*h**3 - 2*c**2*h**2 + 4*c**2*h - 64*h wrt h?
-8922*c**2
What is the second derivative of -g**2*j**3 + 10*g**2 + 7*g*j + 2*g - 26*j**3 wrt j?
-6*g**2*j - 156*j
Find the second derivative of -174*v**4 + 2*v + 1307.
-2088*v**2
What is the third derivative of 2118*i**5 - i**3 + 4862*i**2 wrt i?
127080*i**2 - 6
What is the first derivative of -7*b*g - 9*b*l + b - 14*g*l + 5*l wrt g?
-7*b - 14*l
What is the derivative of 26151*d - 6877?
26151
What is the first derivative of 16141*n*p - 2*n - 8641 wrt p?
16141*n
What is the first derivative of -5*u**2 - 16*u + 228 wrt u?
-10*u - 16
What is the third derivative of 173*c*m**3*x**3 - 5*c*m**3*x**2*y - 2*c*m*x**2*y**2 - 2*c*m*x*y**2 + c*x*y**2 + 7*x**3*y**2 - 13 wrt x?
1038*c*m**3 + 42*y**2
Find the third derivative of 14276*x**3*z - 40*x**2*z - z - 108 wrt x.
85656*z
What is the second derivative of -801*a**4 + 5*a - 405 wrt a?
-9612*a**2
What is the third derivative of -423*c**6 + 742*c**2 wrt c?
-50760*c**3
What is the first derivative of 18*h**2 - 4*h + 644 wrt h?
36*h - 4
Find the second derivative of 1505*h**2*j*t + h**2*t**2 - 5*h - 7*j*t - j + t**2 wrt h.
3010*j*t + 2*t**2
What is the first derivative of 2*d**2*x - 23*d*x - 3*d - 259*x wrt d?
4*d*x - 23*x - 3
Find the third derivative of -79*d**5*s**2 - 4*d**3*s**2 + 131*d**2*s + 4*s**2 wrt d.
-4740*d**2*s**2 - 24*s**2
Find the second derivative of 14154*y**2 + 14808*y wrt y.
28308
What is the third derivative of -12358*f**3 + 546*f**2 wrt f?
-74148
Differentiate -6*q**2*v**2 + 25*q*v**2 + 1530*v**2 with respect to q.
-12*q*v**2 + 25*v**2
What is the derivative of -13*k**2 - 5*k*r**2 + 770*r**2 wrt k?
-26*k - 5*r**2
What is the derivative of -2*g**3*i**3 - 9*g*i**3 + 3*g*i**2 - 196*i**3 wrt g?
-6*g**2*i**3 - 9*i**3 + 3*i**2
What is the third derivative of -18*r**3*u**5 + 584*r**3*u**2 + 2*r**3*u - 2*r*u**6 wrt u?
-1080*r**3*u**2 - 240*r*u**3
Differentiate 2*a**3*j**4 + 8*a**3 + 59*a - 1022*j**4 - 2 wrt j.
8*a**3*j**3 - 4088*j**3
What is the third derivative of 2*l*m**2*u*y - 4*l*m**2 + 6*l*m*u**3 - 2*m**2*u**3 - 5*u**3*y - 17*u**2*y + 2*u**2 wrt u?
36*l*m - 12*m**2 - 30*y
What is the derivative of 3118*j*p**3 + 1021*p**3 wrt j?
3118*p**3
What is the third derivative of 7*d**3*h**4 + 4*d**3*h + d*h**2 + 16*h**4 + 3 wrt h?
168*d**3*h + 384*h
Find the third derivative of -7*b**6 + b**5 - 161*b**3 - 17558*b**2 wrt b.
-840*b**3 + 60*b**2 - 966
Find the second derivative of 188*a**2*m + a*m + 87*a + 2*m wrt a.
376*m
What is the second derivative of 2*b**3*w**2 + 5*b**3*w + 151*b**2*w**2 + w + 4 wrt w?
4*b**3 + 302*b**2
What is the third derivative of -44*d*h*w**3 + 3*d*h*w**2 + 2*d*h - 3*h*w**3 + 9*h*w**2 wrt w?
-264*d*h - 18*h
Find the third derivative of -8*c**2*j*p**3 - 2*c**2*j*p - 3*c**2*p**2 + 3*c*j*p**2 - j*p**3 - j*p**2 wrt p.
-48*c**2*j - 6*j
Differentiate 56*f + 28 wrt f.
56
What is the third derivative of -17*s**6 - 5*s**5 + s**3 + 3956*s**2 wrt s?
-2040*s**3 - 300*s**2 + 6
Find the first derivative of 18*y**3 - 6*y + 1702.
54*y**2 - 6
What is the second derivative of -2167*g**3 - 2124*g wrt g?
-13002*g
What is the second derivative of -3*m**5 - 314*m**3*q**3 - 3*m*q**3 - 2*m*q + 37*m - 2*q**3 wrt m?
-60*m**3 - 1884*m*q**3
What is the second derivative of -10*a**2*z + 14*a**2 - 71*a - 2*z wrt a?
-20*z + 28
What is the third derivative of x**5 - 520*x**4 + x**3 - 9*x**2 + 434?
60*x**2 - 12480*x + 6
Find the second derivative of 3*s**5 - 161*s**2*z - 21*s*z + 2*z wrt s.
60*s**3 - 322*z
Differentiate g*z**4 + g*z + 889*g - 23*z**3 wrt z.
4*g*z**3 + g - 69*z**2
What is the third derivative of -b**4*h*o + 2*b**3*h - 34*b**3*o - 7*b**3 - b**2*h - 720*b**2*o + 2*h*o wrt b?
-24*b*h*o + 12*h - 204*o - 42
Differentiate 2*k**3*y - 417*k**3 - 21*k**2*y**2 - 9*y**4 wrt y.
2*k**3 - 42*k**2*y - 36*y**3
What is the derivative of 98*c*y**4 + c*y**3 + 2*c*y - 8*c - 12 wrt y?
392*c*y**3 + 3*c*y**2 + 2*c
Find the third derivative of -1025*p**6 - 112*p**2 + 5 wrt p.
-123000*p**3
What is the second derivative of -76*h*x**4 - 24*h*x - 2*x**4 - 3 wrt x?
-912*h*x**2 - 24*x**2
What is the third derivative of 11*c**2*v**4 + 2*c**2*v**2 - 102*c*v**2 - 38*v**6 wrt v?
264*c**2 | 2024-05-20T01:27:17.568517 | https://example.com/article/3682 |
You are here
New York Fed questioned after hack on Bangladesh account
A U.S. lawmaker is seeking answers from the Federal Reserve Bank of New York over the theft by cyber criminals of $81 million from the Bangladesh central bank's account at the New York Fed.
Rep. Carolyn Maloney of New York, the senior Democrat on a key subcommittee of the House Financial Services panel, asked the New York Fed in a letter why it blocked 30 of the 35 fraudulent orders to transfer funds out of the account but failed to block the first five orders.
Maloney is asking for a confidential briefing by the New York Fed's staff on the Feb. 4 cyber theft.
Her inquiry comes as a Sri Lankan court banned foreign travel by six directors of a foundation that police say was supposed to have received some of the money stolen from Bangladesh central bank's account. The court order will be enforced by Sri Lanka's Immigration Department, spokesman Lakshan Zoysa said.
The chief magistrate in Sri Lanka's capital Colombo, Gihan Pilapitiya, issued the order Monday based on a police investigation of a complaint made by the financial intelligence unit of Sri Lanka's central bank.
The Sri Lankan police told the court that the Shalika Foundation had opened an account at a private bank in Colombo on Jan. 28 and that six days later, nearly $20 million was sent to the account. The bank alerted the Bangladesh Bank about the transaction and returned the money.
Sri Lanka police said the foundation was set up to help low-income families. The address of its office appears to be a boarded-up house in Colombo, and there is no other known contact information for the foundation.
The $81 million in stolen Bangladesh Bank funds was successfully transferred to private accounts in the Philippines.
"This brazen heist ... threatens to undermine the confidence that foreign central banks have in the Federal Reserve, and in the safety and soundness of international monetary transactions," Maloney said in her letter Tuesday to New York Fed President William Dudley.
"We need a thorough investigation to determine how these criminals were able to manipulate the system" to prevent it from happening again, she said.
Maloney also is asking why the New York Fed requested that Bangladesh Bank reconfirm all 35 transfer orders, but failed to wait until it received reconfirmation before executing the first five orders.
"We fully intend to reach out to the congresswoman and will endeavor to address her questions," the New York Fed said in a statement Wednesday.
The New York Fed, which acts as a banker to the major U.S. financial institutions based in New York and foreign central banks, has said it found no evidence that its own systems were compromised in the hack. The New York Fed also has said it has been working with Bangladesh Bank since the incident occurred and will continue to provide assistance.
Bangladesh authorities have said they were considering suing the New York Fed over the loss of the funds. | 2023-12-28T01:27:17.568517 | https://example.com/article/6317 |
The Academia Service Apartment at South City Plaza, Seri Kembangan
The Academia is a service apartment on top of the South City Plaza shopping complex within the Seri Kembangan area. It allows its population to enjoy business opportunity with ease due to its various amenities surrounding the area and easily within reach. It also has well-known tenants like Giant Supermarket, Old Town White Coffee, Subway and many more famous brands.
In line with this theme, The Academia at South City Plaza eventually managed to create an Edu Hub by having major tenants such as Segi College and International College of Health Science (ICHS) that offers various vocational and technical courses to nearby residents without having to go further to the city centre.
Apart from that, The Academia at South City Plaza is strategically located in the southern part of Kuala Lumpur with easy access to major expressways such as the the KL-Seremban Highway, BESRAYA highway, Shah Alam Expressway (KESAS), Puchong-Sg Besi Expressway, Jalan Sg Besi Six-Lane Highway, Serdang, Balakong and UPM Interchange, 20km drive to KLCC by using the SMART tunnel expressway, Maju Expressway which provides direct access to Putrajaya and the KL International Airport, SILK highway and also the East-West Link.
In addition, The Academia at South City Plaza also provides its owners, tenants or visitors with convenient access to public amenities and township facilities such as efficient public transportation through the Serdang KTM Komuter station which is a mere half kilometres away from the area, services by bus services like Metro bus number 8, Rapid KL bus numbers 416 and 432, taxis, the new Bandar Tasik Selatan Integrated Transport Terminal as an alternative transport to enter the Kuala Lumpur city.
The Academia South City Plaza is near established shoplots, eateries and banks; close to Hypermarket and shopping centres like The The Mines Shopping Complex, Mines Resort, Mines Golf & Country Club plus also near the Sungai Besi town, Bandar Tun Razak and Seri Petaling neighborhood.
*This calculator should only be used as guide. Loan amount tenure and interest rates are based on estimation. Results vary according to different financial institutions. Mudah.my does not guarantee its accuracy or applicability to your circumtances. | 2024-05-18T01:27:17.568517 | https://example.com/article/3815 |
[Levels of tissue-type plasminogen activator and plasminogen activator inhibitor 1 in disseminated intravascular coagulation syndrome].
Since disseminated intravascular coagulation (DIC) may directly reflect the abnormal regulation of the fibrinolytic system by endothelial cells, we have measured the levels of tissue-type plasminogen activator (t-PA), type 1 PA inhibitor (PAI-1) and t-PA . PAI-1 complex which is formed as a result of interaction on the two factors, in the plasma of patients with DIC (n = 51) and healthy controls (n = 42). Antigens of t-PA, PAI-1 and t-PA . PAI-1 complex were significantly increased in the DIC plasma (36.4 +/- 25.1, 106.8 +/- 54.7 and 46.6 +/- 34.5 ng/ml, respectively) compared with those in normal plasma (8.5 +/- 4.3, 54.4 +/- 21.2 and 8.6 +/- 3.5 ng/ml, respectively). The molar ratio of t-PA to PAI-1 was much higher in the DIC plasma (1:3) than in normal plasma (1:6), which caused enhancement of the whole fibrinolytic activity in the DIC plasma. These changes resulted in significant consumption of plasminogen, alpha 2-plasmin inhibitor (alpha 2-PI) and a significant increase of plasmin . alpha 2-PI complex (PPI) and D-dimer. These results suggest that t-PA and its specific inhibitor PAI-1 both of which are secreted from endothelial cells into blood, play an important role on the progress of DIC. | 2024-03-07T01:27:17.568517 | https://example.com/article/3007 |
Mycoplasma pneumoniae vaccine protective efficacy and adverse reactions--Systematic review and meta-analysis.
Mycoplasma pneumoniae is a leading cause of both upper and lower respiratory infections that can lead to devastating sequela. Currently no primary prevention measures are available. During the 1960s and 1970s several inactivated M. pneumoniae vaccines were tested, some with encouraging results. Here we present a systematic review and meta-analysis on the efficacy and adverse effects of M. pneumoniae inactivated vaccines. Six clinical trials were found for efficacy calculation, with a total of 67,268 subjects. Vaccine associated adverse events were described in 15 studies. The summarized efficacy of M. pneumoniae vaccines against pneumonia regardless of etiologies was 36% (confidence interval (CI(95%)) 25 -- 45). The efficacy of the vaccines against M. pneumoniae associated pneumonia was 54% (35 -- 67) or 42% (12 -- 63) depending on diagnostic approach. Results were homogeneous without publication bias. No significant adverse reactions (including autoimmune effects) were observed. This study suggests that inactivated M. pneumoniae vaccines may reduce the total rates of both pneumonia and respiratory infections by approximately 40%. We therefore suggest redeveloping M. pneumoniae vaccines, particularly for high-risk settings as well as in the general population. | 2024-04-10T01:27:17.568517 | https://example.com/article/1986 |
package httpapi
import (
"encoding/binary"
"errors"
"fmt"
"net/http"
"regexp"
"strconv"
"github.com/peterbourgon/caspaxos/protocol"
)
func setAge(h http.Header, age protocol.Age) {
h.Set(ageHeaderKey, age.String())
}
func setAges(h http.Header, ages []protocol.Age) {
for _, age := range ages {
h.Add(ageHeaderKey, age.String())
}
}
func setBallot(h http.Header, b protocol.Ballot) {
h.Set(ballotHeaderKey, b.String())
}
func getAge(h http.Header) protocol.Age {
counter, id := getHeaderPair(h.Get(ageHeaderKey), ageRe)
return protocol.Age{Counter: counter, ID: id}
}
func getAges(h http.Header) (ages []protocol.Age) {
for _, s := range h[ageHeaderKey] {
counter, id := getHeaderPair(s, ageRe)
ages = append(ages, protocol.Age{Counter: counter, ID: id})
}
return ages
}
func getBallot(h http.Header) protocol.Ballot {
s := h.Get(ballotHeaderKey)
if s == "ø" {
return protocol.Ballot{}
}
counter, id := getHeaderPair(s, ballotRe)
return protocol.Ballot{Counter: counter, ID: id}
}
func getHeaderPair(s string, re *regexp.Regexp) (uint64, string) {
matches := re.FindAllStringSubmatch(s, 1)
if len(matches) != 1 {
panic("bad input: '" + s + "' (regex: " + re.String() + ")")
}
if len(matches[0]) != 3 {
panic("bad input: '" + s + "' (regex: " + re.String() + ")")
}
counterstr, id := matches[0][1], matches[0][2]
counter, _ := strconv.ParseUint(counterstr, 10, 64)
return counter, id
}
func makeVersionValue(version uint64, value []byte) (state []byte) {
state = make([]byte, 8+len(value))
binary.LittleEndian.PutUint64(state[:8], version)
copy(state[8:], value)
return state
}
func parseVersionValue(state []byte) (version uint64, value []byte, err error) {
if len(state) == 0 {
return version, value, nil
}
if len(state) < 8 {
return version, value, errors.New("state slice is too small")
}
version = binary.LittleEndian.Uint64(state[:8])
value = state[8:]
return version, value, nil
}
func setVersion(h http.Header, version uint64) {
h.Set(versionHeaderKey, fmt.Sprint(version))
}
func getVersion(h http.Header) uint64 {
version, _ := strconv.ParseUint(h.Get(versionHeaderKey), 10, 64)
return version
}
| 2024-01-08T01:27:17.568517 | https://example.com/article/8154 |
Question of the Day
Which is the greatest 'witch hunt' in American history?
Brazil’s Health Minister Marcelo Castro, right, speaks during a meeting with the diplomats of the European Union in Brazil, about measures taken to combat the mosquito that carries the Zika virus, at the headquarters of the European Union, in Brasilia, ... more >
GENEVA (AP) - The World Health Organization says it may be necessary to use controversial methods like genetically modified mosquitoes to wipe out the insects that are spreading the Zika virus across the Americas.
The virus has been linked to a spike in babies born with abnormally small heads, or microcephaly, in Brazil and French Polynesia. The U.N. health agency has declared Zika a global emergency, even though there is no definitive proof it is causing the birth defects.
WHO said its advisory group has recommended further field trials of genetically modified mosquitoes, which have previously been tested in small trials in countries including the Cayman Islands and Malaysia.
“Given the magnitude of the Zika crisis, WHO encourages affected countries … to boost the use of both old and new approaches to mosquito control as the most immediate line of defense,” WHO said in a statement. WHO says at least 34 countries have been hit by the virus in the current crisis, mostly in Latin America.
Meanwhile, the European Union on Tuesday pledged 10 million euros ($11.2 million) to fund research on the mosquito and the Zika virus in Brazil - the epicenter of the outbreak. The pledge came as Brazilian Health Minister Marcelo Castro met with representatives of 24 European nations in the Brazilian capital, Brasilia.
Next week, WHO chief Dr. Margaret Chan will also travel to Brazil to discuss Zika and microcephaly with Castro and other officials, agency spokeswoman Fadela Chaib said on Tuesday.
WHO said previous experiments that released sterile insects have been used by other U.N. agencies to control agricultural pests. The agency described the Aedes aegypti mosquitoes that spread Zika - as well as other diseases including dengue and yellow fever - as an “aggressive” mosquito that uses “sneak attacks” to bite people, noting that the mosquito has shown “a remarkable ability to adapt.”
Last month, British biotech firm Oxitec said tests in Brazil in 2015 showed that genetically altered sterile male mosquitoes succeeded in reducing a type of disease-spreading mosquito larvae by 82 percent in one neighborhood in the city of Piracicaba. The genetically modified males don’t spread disease because only female mosquitoes bite.
Environmentalists have previously criticized the genetically modified approach, saying wiping out an entire population of insects could have unforeseen knock-on effects on the ecosystem.
Some experts agreed it might be worth using genetically tweaked mosquitoes given the speed of Zika but were unsure of the eventual consequences.
“The way this is done wouldn’t leave lots of mutant mosquitoes in the countryside,” said Jimmy Whitworth, an infectious diseases expert at the London School of Hygiene and Tropical Medicine. He said the Zika mosquitoes are an imported species that were accidentally brought to the Americas hundreds of years ago, and was optimistic their eradication wouldn’t damage the environment.
However, he said such a move would be unprecedented and it would be impossible to know what the impact might be before releasing the insects into the wild.
“You would hope that the ecology would just return to how it was before this mosquito arrived,” he said. “But there’s no way of knowing that for sure.”
Last week, a group of doctors in Argentina, Physicians in the Crop-Sprayed Towns, suggested the jump in microcephaly cases may not be caused by Zika, but by Pyriproxyfen, a larvicide used in drinking water that aims to prevent mosquito larvae from developing into adulthood. The group said the larvicide has been used since 2014 in Brazil in several areas with a reported rise in babies with birth defects.
Spokeswoman Chaib said scientists at WHO and elsewhere had rejected any such link.
“They have reviewed all the scientific literature linked to this pesticide in particular and found the same conclusion: That there is no scientific evidence that can link this pesticide in particular to the cases of microcephaly,” she said.
Brazil’s government has repeatedly said pesticides were not connected to microcephaly, and has noted many cases of microcephaly in areas where Pyriproxyfen was not used. The government also noted that WHO had approved use of the chemical. | 2024-03-10T01:27:17.568517 | https://example.com/article/7519 |
1
Kanojo, Okarishimasu
448 7.23
Kazuya Kinoshita is a 20-year-old college student who has a wonderful girlfriend: the bright and sunny Mami Nanami. But suddenly, he doesn't. Without warning, Mami breaks up with him, leaving him utterly heartbroken and lonely. Seeking to soothe the pain, he hires a rental girlfriend through an online app. His partner is Chizuru Mizuhara, who through her unparalleled beauty and cute demeanor, manages to gain Kazuya's affection. But after reading similar experiences other customers had had with Chizuru, Kazuya believes her warm smile and caring personality were all just an act to toy...
Watch Now | 2024-03-04T01:27:17.568517 | https://example.com/article/5730 |
search the site
Stay Safe on Public Wi-Fi Networks
Public Wi-Fi networks—like those in coffee shops or hotels—are not nearly as safe as you think. Even if they have a password, you’re sharing a network with tons of other people, which means your data is at risk. Here’s how to stay safe when you’re out and about.
1. Turn Off Sharing
When you’re at home, you may share files, printers, or even allow remote login from other computers on your network. When you’re on a public network, you’ll want to turn these things off, as anyone can access them—they don’t even need to be a hacker, and depending on your setup, some of that stuff probably isn’t even password protected. Here’s how to turn off sharing:
In Windows: Open your Control Panel, then browse to Network and Internet > Network and Sharing Center, then click Choose Change Advanced Sharing Settings. Once here, you should definitely turn off file and printer sharing, and you may as well turn off network discovery and Public folder sharing. Some of this is done automatically by Windows if you specify the network as public (more on this later).
In OS X: Go to System Preferences > Sharing and make sure all the boxes are unchecked.
You’ll also want to turn off network discovery, which will be in the same place. This will prevent others from even seeing your machine on the network, meaning you’re less likely to be targeted. On Windows (as I mentioned), it’s just another check box under advanced sharing settings. On OS X, it will be called “stealth mode” and be under your firewall’s advanced settings (see below).
2. Enable Your Firewall
Most OSes come with at least a basic firewall nowadays, and it’s a simple step to keeping unwanted local users from poking at your computer. You may already be using a firewall, but just in case, go into your security settings (in Windows under Control Panel > System and Security > Windows Firewall; and on a Mac under System Preferences > Security & Privacy > Firewall) and make sure your firewall is turned on. You can also edit which applications are allowed access by clicking on “allow a program or feature” in Windows and “advanced” in OS X. Your firewall is not an end-all, be-all protector, but it’s always a good idea to make sure it’s turned on.
3. Use HTTPS and SSL Whenever Possible
Regular web site connections over HTTP exchange lots of plain text over the wireless network you’re connected to, and someone with the right skills and bad intent can sniff out that traffic very easily. It’s not that big of a deal when the text is some search terms you entered at Lifehacker, but it is a big deal when it’s the password to your email account. Using HTTPS (for visiting web sites) or enabling SSL (when using applications that access the internet, such as an email client) encrypts the data passed back and forth between your computer and that web server and keep it away from prying eyes.
If you access your email from a desktop client such as Outlook or Apple Mail, You’ll want to make sure that your accounts are SSL encrypted in their settings. If not, people could not only theoretically read your emails, but also get your usernames, passwords, or anything else they wanted. You’ll need to make sure your domain supports it, and sometimes the setup might require different settings or ports—it’s not just a matter of checking the “use SSL” box—so check your email account’s help page for more details. If it doesn’t support SSL, make sure you quit the application when you’re on a public network.
4. Consider Using a Virtual Private Network
Unfortunately, not all sites offer SSL encryption. Other search engines and email providers may still be vulnerable to people watching your activity, so if you use one of these sites frequently (or really just want the extra protection), you may want to try using a VPN, or virtual private network. These services let you route all your activity through a separate secure, private network, thus giving you the security of a private network even though you’re on a public one.
You have a lot of choices, and we’ve rounded up some of the best VPNs here—but if you don’t feel like doing the research, we recommend CyberGhost as a dead simple, free option. Install it on your computer, turn it on whenever you’re on a public network, and you’ll be much safer than without it.
5. Turn Wi-Fi Off When You Aren’t Using It
If you want to guarantee your security and you’re not actively using the internet, simply turn off your Wi-Fi. This is extremely easy in both Windows and OS X. In Windows, you can just right-click on the wireless icon in the taskbar to turn it off. On a Mac, just click the Wi-Fi icon in the menu bar and select the turn off AirPort option. Again, this isn’t all that useful if you need the internet, but when you’re not actively using it, it’s not a bad idea to just turn it off for the time being. The longer you stay connected, the longer people have to notice you’re there and start snooping around.
Obviously, you don’t want to have to manually adjust all of these settings every single time you go back and forth between the coffee shop and your secure home network. Luckily, there are a few ways to automate the process so you automatically get extra protection when connected to a public Wi-Fi network.
On Windows
When you first connect to any given network on Windows, you’ll be asked whether you’re connecting to a network at your home, work, or if it’s public. Each of these choices will flip the switch on a preset list of settings. The public setting, naturally, will give you the most security. You can customize what each of the presets entails by opening your Control Panel and navigating to Network and Sharing Center > Advanced Sharing Settings. From there, you can turn network discovery, file sharing, public folder sharing, media streaming, and other options on or off for the different profiles.
That’s a good start, but if you want a bit more control, previously mentioned NetSetMan is a great program to customize your network profiles for different networks; you choose your IP address, DNS server, or even run scripts (opening the window for pretty much any action) every time you connect to one of your preset networks.
On OS X
OS X doesn’t have these options built-in like Windows, but an app like ControlPlane can do a fair amount of customization. With it, you can turn on your firewall, turn off sharing, connect to a VPN, and a whole lot more, all depending on the network you’ve connected to.
In Your Browser
The previously mentioned HTTPS Everywhere Firefox extension automatically chooses the secure HTTPS option for a bunch of popular web sites, including the New York Times, Twitter, Facebook, Google Search, and others, ensuring secure HTTPS connections to any supported web site, every time you visit. You can even add your own to their XML config file. Note that as a Firefox extension, this works on Windows, Mac, and Linux. | 2024-03-02T01:27:17.568517 | https://example.com/article/3872 |
West Haven Waterfront Vision Plan
Project Description
The City was approached by representatives from Cal Poly San Luis Obispo (SLO) about whether the city had any prospects for a planning project for its students in the city and Regional Planning Graduate Program. Staff identified the Haven Area (see map) as a potential candidate given the proposed residential rezonings, and Cal Poly was up for the task. The City of Menlo Park, in coordination with Redwood City, has asked the Cal Poly team to develop a "vision plan" for the Haven Area. The students are calling this effort the West Haven Waterfront Vision Plan.
As part of a spring quarter class, approximately 17 students led by Professor Kelly Main are studying the Haven Area. Activities will include recording existing conditions, conducting community outreach, and preparing a Vision Plan for the area, inclusive of the properties which front along US 101 in Redwood City. In addition to looking generally at land use, the plan will focus on potential bicycle, pedestrian, and street scape improvements for the public right-of-way along Haven Avenue, plus connections to the Bedwell Bayfront Park trail head, the Menlo Gateway Project, and the Marsh Road / US 101 overpass. Staff believes this is an innovative approach to jump start the city's efforts to plan for the Haven Area while giving the students an interesting real world planning challenge.
We hope that you would have some time available to participate in some of the students
Current Status
On Monday, June 10, the Cal Poly teams presented their visions plans for the West Haven Waterfront area to the Planning Commission. The meeting starts at:
Based upon the input they have received from surveys, workshops, and community events, as well as their own field observations, each of the 3 Cal Poly teams has developed goals and concepts for the Haven Avenue area. A preview of each of the team's concepts is provided in the below attachments. | 2024-06-29T01:27:17.568517 | https://example.com/article/8332 |
[Nursing outcomes and the reform of care processes (and V)].
To put into practice a reform of treatment procedures requires a planned process for change which should have the support of convinced leaders, dynamic working teams, new development procedures and a reflexive practice which guarantees integrated care. All of this is united with the development of an autonomous role, with the acquisition of competence, with a professional compromise and with a capacity to innovate. At the same time, all of these factors should not divert us from our central objective: to generate humane, quality nursing care which allows an individual to utilize his/her energy to reestablish a balance in their health. | 2024-03-26T01:27:17.568517 | https://example.com/article/5625 |
Q:
ASP.NET + C# -- Deploying a multi-project solution
I have a multi-project ASP.NET + C# solution.
I was planning on writing a quick (separate) VB app that yanks out all DLLs, ASPX, Config, etc files and slaps them into a 7zip file for deployment to the test server.
Is there a more elegant solution than this?
My development environment is VWD2008Express.
A:
I suggest that you look at cruise control .net and NAnt which will allow you to take care of all of this type of stuff easily. No need for zipping to move the files (though you can zip and create a backup!). You can use msbuild to do the pre-compile. Rick Straul wrote a great tool that you can tap into that does this for you...tells you what the appropriate msbuild commands are (http://www.west-wind.com/presentations/AspNetCompilation/AspNetCompilation.asp).
| 2023-11-22T01:27:17.568517 | https://example.com/article/1873 |
This is the moment when al-Qaeda linked Islamist fighters enter a town in Syria, narrated by a British jihadist fighter.
The video, which shows a convoy of jihadist insurgents triumphantly celebrating their capturing of the northwestern Syrian town of Jisr al-Shughour emerged yesterday, shortly after their victory.
Just hours after the eight-minute video was filmed, Syrian government warplanes carried out more than a dozen air strikes on Jisr al-Shughour, killing some 20 fighters.
Scroll down for video
Victory laps: Two Islamist fighters on a motorbike hold a black jihadist flag often associated with Islamic State, as other fighters hug and cheer in the street of Jisr al-Shughour
The city in the northwestern Idlib province was captured by a terrorist alliance that includes al-Qaeda affiliates Al-Nusra, who released the video, and other groups of Islamist militants.
The video was released yesterday, and is believed to be filmed by a young man who has travelled from the UK to join the fight in Syria.
The man speaks with a British accent as he narrates the video from a car driving into the city.
'This is all new territory, by the mujaheddin, this is all new territory, liberated by the muslimeen,' he says from behind the camera.
'This region has been freed and the oppression has been lifted,' whilst repeatedly calling out Allahu Akhbar [God is great]'
Behind the frontline: The eight-minute video appears to be narrated by a British fighter and shows the al-Qaeda linked group's entry into the Syrian city they have captured
Jisr al-Shughour, a city in the northwestern Idlib province, was captured by a terrorist alliance, comprising al-Qaeda affiliates Al-Nusra, who released the video, and other groups of Islamist militants
Despite the man behind the camera claiming that the Islamist have 'liberated' the city, the inhabitants of Jisr al-Shughour can be seen fleeing on foot and in whatever vehicles available
The man preaches as a 'saviour' claiming the al-Nusra front has 'saved these oppressed people', despite filming the inhabitants of the city as they pack their belongings and flee in long convoys on foot and in cars.
The man, whose face is not shown in the video, claims that the locals are fleeing their homes because of the Syrian government, and that al-Nusra has come to 'free' them.
The day after the town was captured by the Islamist alliance, which did not include fighters from Islamic State, the Syrian government responded in force, a monitoring group said.
The Syrian Observatory for Human Rights said at least 20 air strikes hit the city, which had been one of the regime's last remaining strongholds in Idlib province.
There was no immediate word on any casualties from the latest raids, but the Observatory said the death toll from several dozen air strikes on the city on Saturday had risen to 27.
'At least two civilians and 20 fighters were killed in the Saturday air strikes along with five others whose identities are not yet known,' Observatory director Rami Abdulrahman said.
'The toll is expected to rise after the bombing continued overnight and into Sunday.'
Fighting between rebel forces and regime troops continued south of the city on Sunday, he added, and opposition fighters had captured at least 40 government forces.
'Ten members of the (pro-regime) National Defence Force were captured yesterday by fighters, and today a group of 30 soldiers were found hiding in a building near the southern entrance of the city,' Mr Abdulrahman said.
'The army launched a failed raid to rescue them.'
Calm before the storm: Just hours after the video was filmed, Syrian government warplanes carried out more than a dozen air strikes on Jisr al-Shughour, killing some 20 fighters
Attacks: Smoke rises from opposition-controlled Jobar district of Damascus after a Syrian army fighter jet attacked in a separate airstrike earlier Sunday
Syrian state television said the military had ambushed some militants close to Jisr al-Shughour, which was captured on Saturday for the first time in the four-year conflict by a hardline Islamist alliance including al-Qaeda.
Syrian television also reported that the insurgents had slaughtered civilians, but the Observatory said only government supporters had been detained and no one killed.
'Terrorist groups committed a horrific massacre of civilians after entering Jisr al-Shughour,' state television quoted a military source as saying. It said at least 30 civilians had been killed in the town close to the Turkish border.
But Observatory said combatants had detained government backers and that there was no confirmation so far they had killed anyone.
'If we knew people were killed by them we would report it,' Mr Abdulrahman added. 'No women and children were captured.'
The capture of the town of 50,000 people in Idlib province was the latest setback for government forces in the south and north of Syria.
Insurgents have been trying to push the army out of the few remaining government areas in the province, bringing them closer to Latakia, a coastal province of vital importance to President Bashar al-Assad.
State news agency SANA also said the military had carried out night raids around Jisr al-Shughour and inflicted heavy losses on its enemies.
Last month the hardline Sunni Islamist rebels seized Idlib city, the provincial capital, after forming an alliance that includes Al-Nusra, the Ahrar al-Sham movement and Jund al-Aqsa, but not the rival ISIS group which controls large tracts of Syria and Iraq. | 2024-02-25T01:27:17.568517 | https://example.com/article/6703 |
Symptoms of respiratory allergies are worse in subjects with coexisting food sensitization.
Food sensitization was evaluated in 78 subjects with respiratory allergies, both by skin tests with commercial and fresh allergens, and by specific IgE determination. On the basis of the presence or absence of the latter the population was divided into two groups. The group with food-specific IgE showed more severe features of respiratory allergy, including a greater number of positive skin tests and specific IgE determinations, more class 3 and 4 reactions, and more symptoms. The hypothesis that early food sensitization can predispose to severe inhalant allergy is discussed. | 2024-01-09T01:27:17.568517 | https://example.com/article/8285 |
Surveying.- Rathborne (Aaron) The Surveyor in Foure bookes, first edition, fine engraved title by William Hole, 2 engraved portraits, that of the author cut and laid down as frontispiece, woodcut illustrations and diagrams, occasional light marginal water-staining, a few spots and marks, later calf, joints cracked, [STC 20748; Fussell I, pp.22-23], folio, by W. Stansby for W. Burre, 1616.
⁂ The first comprehensive English textbook on surveying, the work is divided into four parts: Geometry; Problems in Geometry; the application of parts 1 and 2 to the measurement of land; and a legal section dealing with the problems of the manor.
Rothamsted acquisition date not noted.
Starting Bid
£950.00
Buyer's Premium
30% up to£100,000.00
25% up to£1,000,000.00
17% above£1,000,000.00
Shipping
Buyer Pays Shipping Cost
Payment
Accepted payment methods
Terms
IMPORTANT NOTICES AND CONDITIONS OF SALE
GENERAL INFORMATION FOR BUYERS AT AUCTION
1. Introduction. The following notices are intended to assist buyers, particularly those that are new to our saleroom and internet bidding platforms. Our auctions are governed by our Terms and Conditions of Business incorporating the Terms of Consignment, the Terms of Sale supplemented by any notices that are displayed in our saleroom, the online catalogue listing or announced by the auctioneer at the auction. Our Terms and Conditions of Business are available for inspection at our saleroom and online at www.forumauctions.co.uk. Our sta? will be happy to help you with any questions you may have regarding our Terms and Conditions of Business. Please make sure that you read our Terms of Sale set out in this catalogue and on our website carefully before bidding in the auction. In registering to bid with us you are committing to be bound by our Terms of Sale.
2. Agency. As auctioneers we usually act on behalf of the seller whose identity, for reasons of con?dentiality, is not normally disclosed. If you buy at auction your contract for the goods is with the seller, not with us as auctioneer.
3. Estimates. Estimates are intended to indicate the hammer price that a particular lot may achieve. The lower estimate may represent the reserve price (the minimum price for which a lot may be sold) and cannot be below the reserve price. Estimates do not include the buyer?s premium, VAT or other taxes and fees (where chargeable). Estimates may be altered by a saleroom notice.
4. Buyer's Premium. The Terms of Sale oblige you to pay a buyer's premium on the hammer price of each lot purchased. Our normal rate of buyer?s premium is 25% of the ?rst £100,000 of hammer, reducing to 20% of the hammer price from £100,001 to £1,000,000 and then 12% of hammer price in excess of £1,000,000.
5. VAT. An amount equivalent to VAT is added to the buyer?s premium under the Auctioneer?s Margin Scheme and cannot be reclaimed as input VAT, even on export outside Eu. Additional VAT charges may apply and are marked, by lot, in our catalogue as described more fully in point 14. Please note that VAT is not payable on the buyers? premium for certain goods, such as qualifying books.
6. Inspection of goods by the buyer. You will have ample opportunity to inspect the goods and must do so for any lots that you might wish to bid for. Please note carefully the exclusion of liability for the condition of lots set out in Clause 11 of our Terms of Sale.
7. Export of goods. If you intend to export goods you must ?nd out in advance if
a. there is a prohibition on exporting goods of that character e.g. if the goods contain prohibited materials such as ivory
b. they require an Export Licence on the grounds of exceeding a speci?c age and/or monetary value threshold as set by the Export Licensing unit. We are happy to make the submission of necessary applications on behalf of our buyers but we will charge for this service only to cover the costs of our time.
8. Bidding. Bidding. Bidders will be required to register with us before bidding. Purchases will be invoiced to the buyer?s registered name and address only. When ?rst registering for an account with us you will need to provide us with proof of your identity in a form acceptable to us. IN REGISTERING FOR ANY SALE YOU AGREE TO BE BOUND BY OUR TERMS AND CONDITIONS REGARDLESS OF YOUR METHOD OF BIDDING.
9. Commission bidding. You may leave commission bids with us indicating the maximum amount (excluding the buyer?s premium and/or any applicable VAT, fees or other taxes) you authorise us to bid on your behalf for a lot. We will execute commission bids at the lowest price possible having regard only to the vendor reserve and competing bids. We recommend that you submit commission bids using your account on our website.
10. Live online bidding. When using our BidFORuM platform to participate in the auction through your account on our website there will be no additional charges. If you are using a third party live bidding platform then additional fees may be applicable. We will invoice these to you as an additional service and any applicable VAT will be separated out.
11. Methods of Payment. We accept payments in uK Sterling securely over our website and accept all major debit and credit cards issued by a uK or Eu bank, charging an additional 2.5% for credit cards only. We also accept bank transfers (details below), cash payments up to ?15,000, and cheques if issued by uK banks only. All funds need to have cleared into our account before items are collected. For bank transfers, please quote the Invoice Number as the payee reference:
HSBC, 16 King St, London WC2E 8JF
Account name: Forum Auctions Limited
Account number: 12213079
Sort Code: 40-04-09
IBAN: GB07MIDL40040912213079 BIC: MIDLGB2106D
12. Collection and storage. Please note what the Terms of Sale say about collection and storage. It is important that you pay for and collect your goods promptly. Any delay may result in you having to pay storage charges of at least £1.50 per Lot per day as set out in Clause 7 of our Terms of Sale and interest charges of 1.5% per month on the Total Amount Due as set out in Clause 8 of our Terms of Sale.
13. Loss and Damage to Goods. We are not authorised by the FCA to provide insurance services. Liability for a lot passes to the buyer on the fall of the hammer or conclusion of an online auction (as applicable). In the event that you wish for us to continue to accept liability for your purchased lots this must be agreed with us in writing in advance of the sale and any agreed charges are payable before collection of the goods.
14. Symbols within the catalogue
a. [PREMIUM] denotes that buyer's premium plus relevant VAT is applicable to the Lot at the following rates:
25% of hammer price up to and including £100,000 20% of hammer price from £100,001 to £1,000,000 12% of hammer price in excess of £1,000,000
b. [ARR] denotes a lot where Artist?s Resale Right or Droite de Suite royalty charges may be applicable to the Lot. Presently these charges are levied on a sliding scale at 4% of the hammer price up to Euro 50,000; 2% from Euro 50,001 to 200,000; 1% from Euro 200,001 to 350,000; 0.5% from Euro 350,001 to 500,000; and 0.25% above Euro 500,000 subject always to a maximum royalty charge of Euro 12,500. We will collect and pay royalty charges on your behalf and calculate the £ sterling equivalent of the Euro amount.
c. [IMPORT] denotes that Import VAT at 5% is payable on the hammer price of the Lot.
d. [VAT] denotes that VAT at 20% is payable on the hammer price, which may be reclaimable as input VAT.
15. Shipping. We can help you arrange packing and shipping of your purchases by arrangement with our shipping department. Please contact shipping@forumauctions.co.uk for a list of shippers we regularly use together with indicative pricing for packing and shipping.
16. Place of Publication. unless otherwise stated, all books described in our catalogues are published in London.
TERMS OF SALE
Both the sale of goods at our auctions and your relationship with us are governed by the Terms of Consignment (primarily applicable to sellers) the Terms of Sale (primarily applicable to bidders and buyers) and any notices displayed in the saleroom or announced by us at the auction (collectively, the ?Conditions of Business?). The Terms of Consignment and Terms of Sale are available at our saleroom on request.
You must read these Terms of Sale carefully. Please note that if you register to bid and/or bid at auction this signifies that you agree to and will comply with these Terms of Sale. If registering to buy over a Live Online Bidding Platform, including our own BidFORUM platform, you will be asked prior to every auction to confirm your agreement to these terms before you are able to place a bid.
Definitions and interpretation
To make these Terms of Sale easier to read, we have given the following words a specific meaning:
?Auctioneer? means Forum Auctions Ltd, a company registered in England and Wales with registration number 10048705 and whose registered office is located at 8 The Chase, London SW4 0NH or its authorised auctioneer, as appropriate;
?Bidder? means a person participating in bidding at the auction;
?Bidding Platform? means the bidding platform on which an auction isheld operated by the Auctioneer, or by a third party service provider on the Auctioneer?s behalf;
?Buyer? means the person who makes the highest bid for a Lot accepted by the Auctioneer;
?Deliberate Forgery? means:
(a) an imitation made with the intention of deceiving as to authorship, origin, date, age, period, culture or source;(b) which is described in the catalogue as being the work of a particular creator without qualification; and
(c) which at the date of the auction had a value materially less than it would have had if it had been as described;
?Exclusively Online Auction? means only an auction held exclusively over the Website or Bidding Platform and where we have not made the Goods available for viewing or inspection. NB this does not apply for any auctions, howsoever held, where we have made the Goods available for inspection;
?Hammer Price? means the level of the highest bid accepted by the Auctioneer for a Lot by the fall of the hammer;
?Lot(s)? means the goods that we offer for sale at our auctions;
?Premium? means the fee that we will charge you on yourpurchase of a Lot to be calculated as set out in Clause 3;
?Premium Inclusive Auction? means the hammer price is the price the buyer pays;
?Reserve? means the minimum hammer price at which a Lot may be sold;
?Sale Proceeds? means the net amount due to the Seller;
?Seller? means the persons who consign Lots for sale at our auctions;
?Terms of Consignment? means the terms on which we agree to offer Lots for sale in our auctions as agent on behalf of Sellers;
?Terms of Sale? means these terms of sale, as amended or updated from time to time;
?Total Amount Due? means the Hammer Price for a Lot, the Premium, any applicable artist?s resale right royalty, any VAT or import duties due and any additional charges payable by a defaulting buyer under these Terms of Sale;
?Trader? means a Seller who is acting for purposes relating to that Seller?s trade, business, craft or profession, whether acting personally or through another person acting in the trader?s name or on the trader?s behalf;
?VAT? means Value Added Tax or any equivalent sales tax; and
?Website? means our website available at www.forumauctions.co.uk.
In these Terms of Sale, the words ?you?, ?yours?, etc. refer to you as the Buyer. The words ?we?, ?us?, etc. refer to the Auctioneer. Any reference to a ?Clause? is to a clause of these Terms of Sale unless stated otherwise.
1. Information that we are required to give to Consumers
1.1 A description of the main characteristics of each Lot as contained in the auction catalogue.
1.2 Our name, address and contact details as set out herein, in our auction catalogues and/or on our Website.
1.3 The price of the Goods and arrangements for payment as described in Clauses 6 and 8.
1.4 The arrangements for collection of the Goods as set out in Clauses 7 and 8.
1.5 Your right to return a Lot and receive a refund if the Lot is a Deliberate Forgery as set out in Clause 12.
1.6 We and Trader Sellers have a legal duty to supply any Lots to you in accordance with these Terms of Sale.
1.7 If you have any complaints, please send them to us directly at the address set out on our Website.
2. Bidding procedures and the Buyer
2.1 You must register your details with us before bidding and provide us with any requested proof of identity and billing information, in a form acceptable to us.
2.2 We strongly recommend that you either attend the auction in person or inspect the Lots prior to bidding at the auction. You are responsible for your decision to bid for a particular Lot. If you bid on a Lot, including by telephone and online bidding, or by placing a commission bid, we assume that you have carefully inspected the Lot and satisfied yourself regarding its condition.
2.3 If you instruct us in writing, we may execute commission bids on your behalf. Neither we nor our employees or agents will be responsible for any failure to execute your commission bid. Where two or more commission bids at the same level are recorded we have the right, at our sole discretion, to prefer one over others.
2.4 The Bidder placing the highest bid accepted by the Auctioneer for a Lot will be the Buyer at the Hammer Price. Any dispute about a bid will be settled at our sole discretion. We may reoffer the Lot during the auction or may settle any dispute in another way. We will act reasonably when deciding how to settle the dispute.
2.5 Bidders will be deemed to act as principals, even if the Bidder is acting as an agent for a third party.
2.6 We may bid on Lots on behalf of the Seller up to one bidding increment (as set at our sole discretion) below the Reserve.
2.7 We may at our sole discretion refuse to accept any bid.
2.8 Bidding increments will be set at our sole discretion.
2.9 Our Terms of Sale shall remain in force for any purchases made within 48 hours following an auction.
3. The purchase price
As Buyer, you will pay:
a. the Hammer Price;
b. a premium of 25% of the Hammer Price up to a Hammer Price of
£100,000 plus 20% of the Hammer Price from £100,001 to £1,000,000 plus 12% of the Hammer Price exceeding £1,000,000;
c. any VAT, Import VAT or other duties applicable to the Lot;
d. any artist?s resale right royalty payable on the sale of the Lot; and
e. for Premium Inclusive Auctions there will be no additional fee
4. VAT and other duties
4.1 You shall be liable for the payment of any VAT and other duties applicable on the Hammer Price and premium due for a Lot. Please see the symbols used in the auction catalogue for that Lot and the ?Information for Buyers? in our auction catalogue for further information.
4.2 We will charge VAT and other duties at the current rate at the date of the auction.
5. The contract between you and the Seller
5.1 The contract for the purchase of the Lot between you and the Seller will be formed when the hammer falls accepting the highest bid for the Lot at the auction.
5.2 You may directly enforce any terms in the Terms of Consignment against a Seller to the extent that you suffer damages and/or loss as a result of the Seller?s breach of the Terms of Consignment.
5.3 If you breach these Terms of Sale, you may be responsible for damages and/or losses suffered by a Seller or us. If we are contacted by a Seller who wishes to bring a claim against you, we may at our discretion provide the Seller with information or assistance in relation to that claim.
5.4 We normally act as an agent only and will not have any responsibility for default by you or the Seller (unless we are the Seller of the Lot).
5.5 For Exclusively Online Auction only, Clauses 16 and 17 may apply
6. Payment
6.1 Following your successful bid on a Lot you will:
6.1.1 immediately give to us, if not already provided to our satisfaction, proof of identity in a form acceptable to us (and any other information that we require in order to comply with our anti-money laundering obligations); and
6.1.2 pay to us within 3 working days the Total Amount Due in any way that we agree to accept payment or in cash (for which there is an aggregate upper limit of 15,000 euros for all purchases made in any auction).
6.2 If you owe us any money, we may use any payment made by you to repay prior debts before applying such monies towards your purchase of the Lot(s).
7. Title and collection of purchases
7.1 Once you have paid us in full the Total Amount Due for any Lot, ownership of that Lot will transfer to you. You may not claim or collect a Lot until you have paid for it.
7.2 You will (at your own expense) collect any Lots that you have purchased and paid for not later than 10 business days following the day of the auction; or
7.3 If you do not collect the Lot within this time period, you will be responsible for removal, storage and insurance charges in relation to that Lot which will be no less than £1.50 per Lot per day.
7.4 Risk of loss or damage to the Lot will pass to you at the fall of the Hammer or when you have otherwise purchased the Lot.
7.5 If you do not collect the Lot that you have paid for within forty-five days after the auction, we may sell the Lot. We will pay the proceeds of any such sale to you, but will deduct any storage charges or other sums that we have incurred in the storage and sale of the Lot. We reserve the right to charge you a selling commission at our standard rates on any such resale of the Lot.
8. Remedies for non-payment or failure to collect purchases
8.1 Please do not bid on a Lot if you do not intend to buy it. If your bid is successful, these Terms of Sale will apply to you. This means that you will have to carry out your obligations set out in these Terms of Sale. If you do not comply with these Terms of Sale, we may (acting on behalf of the Seller and ourselves) pursue one or more of the following measures:
8.1.1 take action against you for damages for breach of contract;
8.1.2 reverse the sale of the Lot to you and/or any other Lots sold by us to you;
8.1.3 resell the Lot by auction or private treaty (in which case you will have to pay any difference between the Total Amount Due for the Lot and the price we sell it for as well as the charges outlined in Clause 7 and 8.1.5). Please note that if we sell the Lot for a higher amount than your winning bid, the extra money will belong to the Seller;
8.1.4 remove, store and insure the Lot at your expense;
8.1.5 if you do not pay us within 10 business days of your successful bid, we may charge interest at a rate not exceeding 1.5% per month on the Total Amount Due;
8.1.6 keep that Lot or any other Lot sold to you until you pay the Total Amount Due;
8.1.7 reject or ignore bids from you or your agent at future auctions or impose conditions before we accept bids from you; and/or
8.1.8 if we sell any Lots for you, use the money made on these Lots to repay any amount you owe us.
8.2 We will act reasonably when exercising our rights under Clause 8.1. We will contact you before exercising these rights and try to work with you to correct any non- compliance by you with these Terms of Sale.
9. Health and safety
Although we take reasonable precautions regarding health and safety, you are on our premises at your own risk. Please note the lay-out of the premises and security arrangements. Neither we nor our employees or agents are responsible for the safety of you or your property when you visit our premises, unless you suffer any injury to your person or damage to your property as a result of our, our employees? or our agents? negligence.
10. Warranties
10.1 The Seller warrants to us and to you that:
10.1.1 the Seller is the true owner of the Lot for sale or is authorised by the true owner to offer and sell the lot at auction;
10.1.2 the Seller is able to transfer good and marketable title to the Lot, subject to any restrictions set out in the Lot description, to you free from any third party rights or claims; and
10.1.3 as far as the Seller is aware, the main characteristics of the Lot set out in the auction catalogue (as amended by any notice displayed in the saleroom or announced by the Auctioneer at the auction) are correct. For the avoidance of doubt, you are solely responsible for satisfying yourself as to the condition of the Lot in all respects.
10.2 If, after you have placed a successful bid and paid for a Lot, any of the warranties above are found not to be true, please notify us in writing. Neither we nor the Seller will be liable, under any circumstances, to pay you any sums over and above the Total Amount Due and we will not be responsible for any inaccuracies in the information provided by the Seller except as set out below.
10.3 Please note that many of the Lots that you may bid on at our auction are second- hand.
10.4 If in an Exclusively Online Auction a Lot is not second-hand and you purchase the Lot as a Consumer from a Seller that is a Trader, a number of additional terms may be implied by law in addition to the Seller?s warranties set out at Clause 10.1 (in particular under the Consumer Rights Act 2015). These Terms of Sale do not seek to exclude your rights under law as they relate to the sale of these Lots.
10.5 Save as expressly set out above, all other warranties, conditions or other terms which might have effect between the Seller and you, or us and you, or be implied or incorporated by statue, common law or otherwise are excluded.
11. Descriptions and condition
11.1 Our descriptions of the Lot will be based on: (a) information provided to us by the Seller of the Lot (for which we are not liable); and (b) our opinion (although we do not warrant that we have carried out a detailed inspection of each Lot).
11.2 We will give you a number of opportunities to view and inspect the Lots before the auction. You (and any consultants acting on your behalf) must satisfy yourself about the accuracy of any description of a Lot. We shall not be responsible for any failure by you or your consultants to properly inspect a Lot.
11.3 Representations or statements by us as to authorship, genuineness, origin, date, age, provenance, condition or estimated selling price involve matters of opinion. We undertake that any such opinion will be honestly and reasonably held, subject always to the limitations in 10.1, and accept liability for opinions given negligently or fraudulently.
11.4 Please note that Lots (in particular second-hand Lots) are unlikely to be in perfect condition.
11.4.1 Lots are sold ?as is? (i.e. as you see them at the time of the auction). Neither we nor the Seller accept any liability for the condition of second-hand Lots or for any condition issues affecting a Lot if such issues are included in the description of a Lot in the auction catalogue (or in any saleroom notice) and/ or which the inspection of a Lot by the Buyer ought to have revealed.
11.4.2 In the case of Exclusively Online Auctions the provisions of Clauses 16 and 17 may apply
12. Deliberate Forgeries
12.1 You may return any Lot which is found to be a Deliberate Forgery to us within twelve months of the auction provided that you return the Lot to us in the same condition as when it was released to you, accompanied by a written statement identifying the Lot from the relevant catalogue description and a written statement of defects prepared by an accredited expert.
12.2 If we are reasonably satisfied that the Lot is a Deliberate Forgery, we will refund the money paid by you for the Lot (including any Premium and applicable VAT) provided that if:
12.2.1 the catalogue description reflected the accepted view of experts as at the date of the auction; or
12.2.2 you personally are not able to transfer good and marketable title in the Lot to us, you will have no right to a refund under this Clause 12.2.
12.3 If you have sold the Lot to another person, we will only be liable to refund the Total Amount Due for the Lot. We will not be responsible for repaying any additional money you may have made from selling the Lot or any other costs you have incurred in relation to the Lot save for those Lots purchased in exclusively online auctions from a Trader.
12.4 Your right to return a Lot that is a Deliberate Forgery does not affect your legal rights and is in addition to any other right or remedy provided by law or by these Terms of Sale.
13. Our liability to you
13.1 We will not be liable for any loss of opportunity or disappointment suffered as a result of participating in our auction.
13.2 In addition to the above, neither we nor the Seller shall be responsible to you and you shall not be responsible to the Seller or us for any other loss or damage that any of us suffer that is not a foreseeable result of any of us not complying with the Conditions of Business. Loss or damage is foreseeable if it is obvious that it will happen or if at the time of the sale of the Lot, all of we, you and the Seller knew it might happen.
13.3 Subject to Clause 13.4, if we are found to be liable to you for any reason (including, amongst others, if we are found to be negligent, in breach of contract or to have made a misrepresentation), our liability will be limited to the Total Amount Due as paid by you to us for any Lot.
13.4 Notwithstanding the above, nothing in these Terms of Sale shall limit our liability (or that of our employees or agents) for:
13.4.1 death or personal injury resulting from negligence (as defined in the unfair Contract Terms Act 1977);
13.4.2 fraudulent misrepresentation; or
13.4.3 any liability which cannot be excluded by law.
14. Notices
14.1 All notices between you and us regarding these Terms of Sale must be in writing and signed by or on behalf of the party giving it.
14.2 Any notice referred in these Terms of Sale may be given:
14.2.1 by delivering it by hand;
14.2.2 by first class pre-paid post or Recorded Delivery; or
14.2.3 by email, provided that a copy is also sent by pre-paid post or Recorded Delivery.
14.3 Notices must be sent as follows:
14.3.1 by hand or registered post:
b. to us, at our address set out in these Terms of Sale or at our registered office address appearing on our Website; and
a. to you, at the last postal address that you have given to us as your contact address in writing; or
14.3.2 by email:
a. to us, at the following email addresses: info@forumauctions.co.uk and office@forumauctions.co.uk
b. to you, by sending the notice to any email address that you have given to us as your contact email address.
14.4 Notices will be deemed to have been received:
14.4.1 if delivered by hand, on the day of delivery;
14.4.2 if sent by first class pre-paid post or Recorded Delivery, two business days after posting, exclusive of the day of posting; or
14.4.3 if sent by email, at the time of transmission unless sent after 17.00 in the place of receipt in which case they will be deemed to have been received on the next business day in the place of receipt (provided that a copy has also been sent by pre-paid post or Recorded Delivery).
14.5 Any notice or communication given under these Terms of Sale will not be validly given if sent by fax, email (unless also delivered Recorded Delivery), any form of messaging via social media or text message.
15. Data Protection
We will hold and process any personal data in relation to you in accordance with the principles underlying the Data Protection Act. Our registration number with the Information Commissioner is ZA178875.
16. Conditional Right to cancel following an Exclusively Online Auction only
16.1 If you are contracting as a Consumer and the Seller of a Lot is a Trader, you will have a statutory right to cancel your purchase of that Lot if you change your mind for any reason. The provisions below set out your legal right to cancel. Further advice about your legal right to cancel your purchase is available from your local Citizens Advice Bureau or Trading Standards office.
16.2 You may cancel your purchase at any time from the date of the Order Confirmation up to the end of the fourteenth day after the day of collection of the Lot by you or the person specified by you for collection (e.g. if you receive an Order Confirmation on 1 January and you collect a Lot on 10 January, you may cancel at any time between 1 January and the end of the day on 24 January).
16.3 To cancel your purchase, you must inform us of your intention to cancel it. The easiest way to do so is to complete the model cancellation form attached to your Order Confirmation. If you use this method, we will email you to confirm that we have received your cancellation. Alternatively, you can email us at office@forumauctions.co.uk. If you send us your cancellation notice by email or by post, then your cancellation is effective from the date you send us the email or post the letter to us.
16.4 If you exercise your right to cancel your purchase, you will receive a refund of the Total Amount Due paid for the Lot in accordance with Clause 17. When exercising the cancellation right, you must return the Lots to us immediately at your own cost (as set out below).
16.5 Following purchasing of Lots, you are entitled to a reasonable opportunity to inspect the Lots (which will include removing them from their packaging and inspecting them). At all times, you must take reasonable care of the Lots and must not let them out of your possession. If you are in breach of your obligations to take reasonable care of the Lots in this Clause 16.5, we will have a claim against you and may deduct from the refund costs incurred by us as a result of the breach.
16.6 Details of this statutory right, and an explanation of how to exercise it, are also provided in the Order Confirmation. This provision does not affect your statutory rights.
16.7 The cancellation right described in this Clause is in addition to any other right that you might have to reject a Lot, for instance because it is a Deliberate Forgery as set out in Clause 12.
17. Exercising the right to cancel following an Exclusively Online Auction only
17.1 Where you have validly returned a Lot to us under your right of cancellation described in Clause 16, we will refund the full amount paid by you for the Lot.
17.2 Please note that we are permitted by law to reduce your refund to reflect any reduction in the value of the Lot, if this has been caused by your handling of the Lot in a way contrary to the conditions specified in these terms or which would not be permitted during a pre-sale exhibition held prior to an auction. If we refund you the price paid before we are able to inspect the Lot and later discover you have handled the Lot in an unacceptable way, you must pay us an appropriate amount.
17.3 You will be responsible for returning the Lot to us at your own cost.
17.4 We will process any refund due to you within the deadlines below:
17.4.1 if you have collected the Lot but have not returned it to us: fourteen days after the day on which we receive the Lot back from you or, if earlier, the day on which you provide us with evidence that you have sent the Lot back to us; or
17.4.2 if you have not collected the Lot or you have already returned the Lot to us: fourteen days after you inform us of your decision to cancel the Contract.
17.5 We will refund you using the same means of payment that you used for the transaction.
17.6 Legal ownership of a Lot will immediately revert to the Seller if we refund any such payment to you.
17.7 For further information on how to return Lots to us, please get in touch with us using the contact details provided on our Website.
18. General
18.1 We may at our sole discretion, though acting reasonably, refuse admission to our premises or attendance at our auctions by any person.
18.2 We act as an agent for our Sellers. The rights we have to claim against you for breach of these Terms of Sale may be used by either us, our employees or agents, or the Seller, its employees or agents, as appropriate. Other than as set out in this Clause, these Terms of Sale are between you and us and no other person will have any rights to enforce any of these Terms of Sale.
18.3 We may use special terms in the catalogue descriptions of particular Lots. You must read these terms carefully along with any glossary provided in our auction catalogues.
18.4 Each of the clauses of these Terms of Sale operates separately. If any court or relevant authority decides that any of them are unlawful, the remaining clauses will remain in full force and effect.
18.5 We may change these Terms of Sale from time to time, without notice to you. Please read these Terms of Sale for every sale in which you intend to bid carefully, as they may be different from the last time you read them.
18.6 Except as otherwise stated in these Terms of Sale, each of our rights and remedies are: (a) are in addition to and not exclusive of any other rights or remedies under these Terms of Sale or general law; and (b) may be waived only in writing and specifically. Delay in exercising or non-exercise of any right under these Terms of Sale is not a waiver of that or any other right. Partial exercise of any right under these Terms of Sale will not preclude any further or other exercise of that right or any other right under these Terms of Sale. Waiver of a breach of any term of these Terms of Sale will not operate as a waiver of breach of any other term or any subsequent breach of that term.
18.7 These Terms of Sale and any dispute or claim arising out of or in connection with them (including any non-contractual claims or disputes) shall be governed by and construed in accordance with the laws of England and Wales and the parties irrevocably submit to the exclusive jurisdiction of the English courts.
Forum Auctions Ltd May 2017 | 2024-06-24T01:27:17.568517 | https://example.com/article/1473 |
Prong Buckles / Center Bar Buckles
Prong Buckles provide adjustments for belts and straps by means of a
hole in the belt secured by either a
prong
or a
fixed prong
on a center bar. This ensures a secure
fastening, especially if the hole in the strap is reinforced with an
eyelet or grommet.
Fixed Prong Belt Buckles are stamped and are for light use. Single Prong
Belt Buckles are
cast or wire and are appropriate for heavier-duty applications. | 2024-03-06T01:27:17.568517 | https://example.com/article/6713 |
Q:
Selecting data from a dataframe based on a tuple
Suppose I have the following dataframe
df = DataFrame({'vals': [1, 2, 3, 4],
'ids': ['a', 'b', 'a', 'n']})
I want to select all the rows which are in the list
[ (1,a), (3,f) ]
I have tried using boolean indexing like so
to_search = { 'vals' : [1,3],
'ids' : ['a', 'f']
}
df.isin(to_search)
I expect only the first row to match but I get the first and the third row
ids vals
0 True True
1 True False
2 True True
3 False False
Is there any way to match exactly the values at a particular index instead of matching any value?
A:
You might create a DataFrame for what you want to match, and then merge it:
In [32]: df2 = DataFrame([[1,'a'],[3,'f']], columns=['vals', 'ids'])
In [33]: df.merge(df2)
Out[33]:
ids vals
0 a 1
| 2024-05-15T01:27:17.568517 | https://example.com/article/6539 |
/*---------------------------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Licensed under the MIT License. See License.txt in the project root for license information.
*--------------------------------------------------------------------------------------------*/
// Do not edit this file. It is machine generated.
{
"keybindingsInputName": "바로 가기 키(&&K)",
"SearchKeybindings.AriaLabel": "키 바인딩 검색",
"SearchKeybindings.Placeholder": "키 바인딩 검색",
"sortByPrecedene": "우선 순위별 정렬",
"header-message": "고급 사용자 지정의 경우 다음 파일을 열고 편집하세요.",
"keybindings-file-name": "keybindings.json",
"keybindingsLabel": "키 바인딩",
"changeLabel": "키 바인딩 변경",
"addLabel": "키 바인딩 추가",
"removeLabel": "키 바인딩 제거",
"resetLabel": "키 바인딩 다시 설정",
"showConflictsLabel": "충돌 표시",
"copyLabel": "복사",
"error": "키 바인딩을 편집하는 동안 오류 '{0}'이(가) 발생했습니다. 'keybindings.json' 파일을 열고 확인하세요.",
"command": "명령",
"keybinding": "키 바인딩",
"source": "소스",
"when": "시기",
"editKeybindingLabelWithKey": "키 바인딩 {0} 변경",
"editKeybindingLabel": "키 바인딩 변경",
"addKeybindingLabelWithKey": "키 바인딩 {0} 추가",
"addKeybindingLabel": "키 바인딩 추가",
"commandAriaLabel": "명령은 {0}입니다.",
"keybindingAriaLabel": "키 바인딩은 {0}입니다.",
"noKeybinding": "키 바인딩이 할당되지 않았습니다.",
"sourceAriaLabel": "소스는 {0}입니다.",
"whenAriaLabel": "{0}인 경우",
"noWhen": "컨텍스트인 경우 아니요"
} | 2024-02-12T01:27:17.568517 | https://example.com/article/6299 |
The lift team's importance to a successful safe patient handling program.
Nurses continue to experience injuries related to patient handling. These injuries are costly to hospitals in both direct and indirect costs and intangible costs such as staff morale. The need for hospitals to establish safe patient handling programs is growing and is now mandated by legislation in several states. The authors describe the development, implementation, and 6-year outcomes of a lift team that is part of successful safe patient handling program. | 2023-09-12T01:27:17.568517 | https://example.com/article/6153 |
Been watching this; and I really think this was just an unfortunate miscommunication starting with 'I think that I sarted this project and as the instigator', which Craig picked up on. Whereas all I think he meant was he started this thread. This is pretty much borne out by his next sentence ' I would really like to show my appreciation and offer my personal thanks to James.'
After that it was downhill from there.
Hi Loftus,
I have always let my humble nature show through when I have asked a question and someone has taken the time out of thier busy schedule to help me with an answer.
From a person who was physically beaten daily, by an abusive parent, the last thing that I would do would be show public discent , or refrain from a public acknowledgment to those who have taken the time to help me shorten my learning curve. And for those of you who are of the opinion that I gloat and thrive on self praise, if I had have been silly enough to ask these questions during my adolescent years I would have been beaten and probably hospitalised for wasting another person's time with my stupid questions.
As Loftus said "After that it was downhill from there."
Again with respect,
Bruce... | 2024-07-12T01:27:17.568517 | https://example.com/article/6027 |
FAQ
Of course! If you are not happy with your print, we'll take it back. We will reprint any defective product and send it to you without charging any additional fee.
How do I check the status of my order?
We’ll send you your tracking number as soon as your order has been processed.
In most cases order processing takes between 24-96 hours.
WHEN WILL MY ORDER SHIP?
After an order has been placed, it is promptly sent to our factory where we will print and ship your item(s) within 7-10 business days. Below are expected delivery times based on your location.
Please note: Due to the popularity of certain items in our catalog, shipping times may take longer than the estimates below
Here are our standard shipping times:
Products & Accessories: Usually 2-3 weeks. Due to high demand of some of our most popular products, please allow 2-4 weeks for delivery.
Clothing: Please allow 7-10 Days.
Shoes:Due to high demand please allow up to 2-4 weeks for delivery.
If your order hasn’t arrived inside the estimated delivery times, please contact our support team at support@asphuck.com
For products delivery time may take up to 60 days to arrive from our suppliers. The average delivery time is much lower, but we like to make our customers aware that in very rare cases it can take up to 60 days to receive your product(s).
Some of our products are shipped from our overseas warehouse direct to you. In the rare event that there is a customs charge, this will be the responsibility of the customer.
I ordered more than 1 item, why did I receive 1?
when you order multiple items at a time some are shipped separately. You may receive one item before the next. So don't panic if you don't receive all of your items at once…they will get to you!
We use the best brands in the marketplace that are known for their quality, durability and great fit. Our preferred garment suppliers include Gildan, Hanes, Bella, and Port & Company.
WHAT IS YOUR RETURN POLICY?
You may cancel or amend your order within 24 hours of purchase. We are committed to our customers and want you to be happy. We stand by our product and offer a 100% customer satisfaction guarantee. Just return the product to us undamaged or unused/unworn and we will refund you. This excludes custom printed shoes. You will only be allowed to exchange them out for the correct size (in the event the size ordered is incorrect) in the same style shoe. | 2024-02-13T01:27:17.568517 | https://example.com/article/4624 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.