text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
package toolkits
import (
"errors"
"fmt"
"os"
"path/filepath"
"regexp"
"runtime"
"strings"
"time"
"github.com/bitrise-io/bitrise/configs"
"github.com/bitrise-io/bitrise/models"
"github.com/bitrise-io/bitrise/tools"
"github.com/bitrise-io/bitrise/utils"
"github.com/bitrise-io/go-utils/command"
"github.com/bitrise-io/go-utils/log"
"github.com/bitrise-io/go-utils/pathutil"
"github.com/bitrise-io/go-utils/progress"
"github.com/bitrise-io/go-utils/retry"
"github.com/bitrise-io/go-utils/versions"
"github.com/bitrise-io/gows/gows"
stepmanModels "github.com/bitrise-io/stepman/models"
)
const (
minGoVersionForToolkit = "1.12.7"
)
// === Base Toolkit struct ===
// GoToolkit ...
type GoToolkit struct {
}
// ToolkitName ...
func (toolkit GoToolkit) ToolkitName() string {
return "go"
}
// === Toolkit: Check ===
// GoConfigurationModel ...
type GoConfigurationModel struct {
// full path of the go binary to use
GoBinaryPath string
// GOROOT env var value to set (unless empty)
GOROOT string
}
func checkGoConfiguration(goConfig GoConfigurationModel) (bool, ToolkitCheckResult, error) {
cmdEnvs := os.Environ()
if len(goConfig.GOROOT) > 0 {
cmdEnvs = append(cmdEnvs, "GOROOT="+goConfig.GOROOT)
}
verOut, err := command.New(goConfig.GoBinaryPath, "version").SetEnvs(cmdEnvs...).RunAndReturnTrimmedOutput()
if err != nil {
return false, ToolkitCheckResult{}, fmt.Errorf("Failed to check go version, error: %s", err)
}
verStr, err := parseGoVersionFromGoVersionOutput(verOut)
if err != nil {
return false, ToolkitCheckResult{}, fmt.Errorf("Failed to parse go version, error: %s", err)
}
checkRes := ToolkitCheckResult{
Path: goConfig.GoBinaryPath,
Version: verStr,
}
// version check
isVersionOk, err := versions.IsVersionGreaterOrEqual(verStr, minGoVersionForToolkit)
if err != nil {
return false, checkRes, fmt.Errorf("Failed to validate installed go version, error: %s", err)
}
if !isVersionOk {
return true, checkRes, nil
}
return false, checkRes, nil
}
func selectGoConfiguration() (bool, ToolkitCheckResult, GoConfigurationModel, error) {
potentialGoConfigurations := []GoConfigurationModel{}
// from PATH
{
binPath, err := utils.CheckProgramInstalledPath("go")
if err == nil {
potentialGoConfigurations = append(potentialGoConfigurations, GoConfigurationModel{GoBinaryPath: binPath})
}
}
// from Bitrise Toolkits
{
binPath := goBinaryInToolkitFullPath()
if isExist, err := pathutil.IsPathExists(binPath); err != nil {
log.Warnf("Failed to check the status of the 'go' binary inside the Bitrise Toolkit dir, error: %s", err)
} else if isExist {
potentialGoConfigurations = append(potentialGoConfigurations, GoConfigurationModel{
GoBinaryPath: binPath,
GOROOT: goToolkitInstallRootPath(),
})
}
}
isRequireInstall := true
checkResult := ToolkitCheckResult{}
goConfig := GoConfigurationModel{}
var checkError error
for _, aPotentialGoInfoToUse := range potentialGoConfigurations {
isInstReq, chkRes, err := checkGoConfiguration(aPotentialGoInfoToUse)
checkResult = chkRes
checkError = err
if !isInstReq {
// select this one
goConfig = aPotentialGoInfoToUse
isRequireInstall = false
break
}
}
if len(potentialGoConfigurations) > 0 && isRequireInstall {
log.Warnf("Installed go found (path: %s), but not a supported version: %s", checkResult.Path, checkResult.Version)
}
return isRequireInstall, checkResult, goConfig, checkError
}
// Check ...
func (toolkit GoToolkit) Check() (bool, ToolkitCheckResult, error) {
isInstallRequired, checkResult, _, err := selectGoConfiguration()
return isInstallRequired, checkResult, err
}
func parseGoVersionFromGoVersionOutput(goVersionCallOutput string) (string, error) {
origGoVersionCallOutput := goVersionCallOutput
goVersionCallOutput = strings.TrimSpace(goVersionCallOutput)
if goVersionCallOutput == "" {
return "", errors.New("Failed to parse Go version, error: version call output was empty")
}
// example goVersionCallOutput: go version go1.7 darwin/amd64
goVerExp := regexp.MustCompile(`go version go(?P<goVersionNumber>[0-9.]+) (?P<platform>[a-zA-Z0-9]+/[a-zA-Z0-9]+)`)
expRes := goVerExp.FindStringSubmatch(goVersionCallOutput)
if expRes == nil {
return "", fmt.Errorf("Failed to parse Go version, error: failed to find version in input: %s", origGoVersionCallOutput)
}
verStr := expRes[1]
return verStr, nil
}
// IsToolAvailableInPATH ...
func (toolkit GoToolkit) IsToolAvailableInPATH() bool {
if configs.IsDebugUseSystemTools() {
log.Warnf("[BitriseDebug] Using system tools (system installed Go), instead of the ones in BITRISE_HOME")
return true
}
if _, err := utils.CheckProgramInstalledPath("go"); err != nil {
return false
}
if _, err := command.RunCommandAndReturnStdout("go", "version"); err != nil {
return false
}
return true
}
// === Toolkit: Bootstrap ===
// Bootstrap ...
func (toolkit GoToolkit) Bootstrap() error {
if toolkit.IsToolAvailableInPATH() {
return nil
}
pthWithGoBins := configs.GeneratePATHEnvString(os.Getenv("PATH"), goToolkitBinsPath())
if err := os.Setenv("PATH", pthWithGoBins); err != nil {
return fmt.Errorf("Failed to set PATH to include the Go toolkit bins, error: %s", err)
}
if err := os.Setenv("GOROOT", goToolkitInstallRootPath()); err != nil {
return fmt.Errorf("Failed to set GOROOT to Go toolkit root, error: %s", err)
}
return nil
}
// === Toolkit: Install ===
func installGoTar(goTarGzPath string) error {
installToPath := goToolkitInstallToPath()
if err := os.RemoveAll(installToPath); err != nil {
return fmt.Errorf("Failed to remove previous Go toolkit install (path: %s), error: %s", installToPath, err)
}
if err := pathutil.EnsureDirExist(installToPath); err != nil {
return fmt.Errorf("Failed create Go toolkit directory (path: %s), error: %s", installToPath, err)
}
cmd := command.New("tar", "-C", installToPath, "-xzf", goTarGzPath)
if combinedOut, err := cmd.RunAndReturnTrimmedCombinedOutput(); err != nil {
log.Errorf(" [!] Failed to uncompress Go toolkit, output:")
log.Errorf(combinedOut)
return fmt.Errorf("Failed to uncompress Go toolkit, error: %s", err)
}
return nil
}
// Install ...
func (toolkit GoToolkit) Install() error {
versionStr := minGoVersionForToolkit
osStr := runtime.GOOS
archStr := runtime.GOARCH
extentionStr := "tar.gz"
if osStr == "windows" {
extentionStr = "zip"
}
downloadURL := fmt.Sprintf("https://storage.googleapis.com/golang/go%s.%s-%s.%s", versionStr, osStr, archStr, extentionStr)
goTmpDirPath := goToolkitTmpDirPath()
if err := pathutil.EnsureDirExist(goTmpDirPath); err != nil {
return fmt.Errorf("Failed to create Toolkits TMP directory, error: %s", err)
}
localFileName := "go." + extentionStr
goArchiveDownloadPath := filepath.Join(goTmpDirPath, localFileName)
var downloadErr error
progress.NewDefaultWrapper("Downloading").WrapAction(func() {
downloadErr = retry.Times(2).Wait(5 * time.Second).Try(func(attempt uint) error {
if attempt > 0 {
log.Warnf("==> Download failed, retrying ...")
}
return tools.DownloadFile(downloadURL, goArchiveDownloadPath)
})
})
if downloadErr != nil {
return fmt.Errorf("Failed to download toolkit (%s), error: %s", downloadURL, downloadErr)
}
fmt.Println("=> Installing ...")
if err := installGoTar(goArchiveDownloadPath); err != nil {
return fmt.Errorf("Failed to install Go toolkit, error: %s", err)
}
if err := os.Remove(goArchiveDownloadPath); err != nil {
return fmt.Errorf("Failed to remove the downloaded Go archive (path: %s), error: %s", goArchiveDownloadPath, err)
}
fmt.Println("=> Installing [DONE]")
return nil
}
// === Toolkit: Prepare for Step Run ===
func goBuildInIsolation(packageName, srcPath, outputBinPath string) error {
workspaceRootPath, err := pathutil.NormalizedOSTempDirPath("bitrise-go-toolkit")
if err != nil {
return fmt.Errorf("Failed to create root directory of isolated workspace, error: %s", err)
}
// origGOPATH := os.Getenv("GOPATH")
// if origGOPATH == "" {
// return fmt.Errorf("You don't have a GOPATH environment - please set it; GOPATH/bin will be symlinked")
// }
// if err := gows.CreateGopathBinSymlink(origGOPATH, workspaceRootPath); err != nil {
// return fmt.Errorf("Failed to create GOPATH/bin symlink, error: %s", err)
// }
fullPackageWorkspacePath := filepath.Join(workspaceRootPath, "src", packageName)
if err := gows.CreateOrUpdateSymlink(srcPath, fullPackageWorkspacePath); err != nil {
return fmt.Errorf("Failed to create Project->Workspace symlink, error: %s", err)
}
{
isInstallRequired, _, goConfig, err := selectGoConfiguration()
if err != nil {
return fmt.Errorf("Failed to select an appropriate Go installation for compiling the step, error: %s", err)
}
if isInstallRequired {
return fmt.Errorf("Failed to select an appropriate Go installation for compiling the step, error: %s",
"Found Go version is older than required. Please run 'bitrise setup' to check and install the required version")
}
cmd := gows.CreateCommand(workspaceRootPath, workspaceRootPath,
goConfig.GoBinaryPath, "build", "-o", outputBinPath, packageName)
cmd.Env = append(cmd.Env, "GOROOT="+goConfig.GOROOT)
if err := cmd.Run(); err != nil {
return fmt.Errorf("Failed to install package, error: %s", err)
}
}
{
if err := os.RemoveAll(workspaceRootPath); err != nil {
return fmt.Errorf("Failed to delete temporary isolated workspace, error: %s", err)
}
}
return nil
}
// stepIDorURI : doesn't work for "path::./" yet!!
func stepBinaryFilename(sIDData models.StepIDData) string {
//
replaceRexp, err := regexp.Compile("[^A-Za-z0-9.-]")
if err != nil {
log.Warnf("Invalid regex, error: %s", err)
return ""
}
compositeStepID := fmt.Sprintf("%s-%s-%s",
sIDData.SteplibSource, sIDData.IDorURI, sIDData.Version)
safeStepID := replaceRexp.ReplaceAllString(compositeStepID, "_")
//
return safeStepID
}
func stepBinaryCacheFullPath(sIDData models.StepIDData) string {
return filepath.Join(goToolkitCacheRootPath(), stepBinaryFilename(sIDData))
}
// PrepareForStepRun ...
func (toolkit GoToolkit) PrepareForStepRun(step stepmanModels.StepModel, sIDData models.StepIDData, stepAbsDirPath string) error {
fullStepBinPath := stepBinaryCacheFullPath(sIDData)
// try to use cached binary, if possible
if sIDData.IsUniqueResourceID() {
if exists, err := pathutil.IsPathExists(fullStepBinPath); err != nil {
log.Warnf("Failed to check cached binary for step, error: %s", err)
} else if exists {
return nil
}
}
// it's not cached, so compile it
if step.Toolkit == nil {
return errors.New("No Toolkit information specified in step")
}
if step.Toolkit.Go == nil {
return errors.New("No Toolkit.Go information specified in step")
}
packageName := step.Toolkit.Go.PackageName
return goBuildInIsolation(packageName, stepAbsDirPath, fullStepBinPath)
}
// === Toolkit: Step Run ===
// StepRunCommandArguments ...
func (toolkit GoToolkit) StepRunCommandArguments(step stepmanModels.StepModel, sIDData models.StepIDData, stepAbsDirPath string) ([]string, error) {
fullStepBinPath := stepBinaryCacheFullPath(sIDData)
return []string{fullStepBinPath}, nil
}
// === Toolkit path utility function ===
func goToolkitRootPath() string {
return filepath.Join(configs.GetBitriseToolkitsDirPath(), "go")
}
func goToolkitTmpDirPath() string {
return filepath.Join(goToolkitRootPath(), "tmp")
}
func goToolkitInstallToPath() string {
return filepath.Join(goToolkitRootPath(), "inst")
}
func goToolkitCacheRootPath() string {
return filepath.Join(goToolkitRootPath(), "cache")
}
func goToolkitInstallRootPath() string {
return filepath.Join(goToolkitInstallToPath(), "go")
}
func goToolkitBinsPath() string {
return filepath.Join(goToolkitInstallRootPath(), "bin")
}
func goBinaryInToolkitFullPath() string {
return filepath.Join(goToolkitBinsPath(), "go")
}
| 2024-07-14T01:27:17.568517 | https://example.com/article/3554 |
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
AT NASHVILLE
JULY SESSION, 1998 FILED
September 30, 1998
Cecil W. Crowson
STATE OF TENNESSEE, )
Appellate Court Clerk
) No. 01C01-9707-CC-00444
Appellee )
) DICKSON COUNTY
vs. )
) Hon. Robert Burch, Judge
DEMARIO HILL, )
) (Possession of Cocaine in
Appellant ) excess of .5 grams with intent
to sell and possession of drug
paraphernalia)
For the Appellant: For the Appellee:
Clifford K. McGown, Jr. John Knox Walkup
113 North Court Square Attorney General and Reporter
P. O. Box 26
Waverly, TN 37185 Janis L. Turner
Assistant Attorney General
(ON APPEAL ONLY) Criminal Justice Division
425 Fifth Avenue North
Shipp R. Weems 2d Floor, Cordell Hull Building
District Public Defender Nashville, TN 37243-0493
Carey Thompson
Asst. District Public Defender
P. O. Box 160
Charlotte, TN 37036-0160 Dan Mitchum Alsobrooks
District Attorney General
(AT TRIAL AND OF COUNSEL
ON APPEAL) Robert Wilson
Asst. District Attorney General
P. O. Box 580
Charlotte, TN 37036
OPINION FILED:
AFFIRMED
David G. Hayes
Judge
OPINION
The appellant, D ario Hill1, appeals as of right fromconvictions entered by the Circuit Court
em
of Dickson County for possession of cocaine in excess of .5 grams with intent to sell, a Class B felony,
and possession of drug paraphernalia, a Class A misdemeanor2. At the sentencing hearing as a
Range I standard offender, the trial court imposed a fine of $2,000 and a ten (10) year sentence in the
Departm of Corrections for felony possession with intent to sell. This sentence was ordered to be
ent
served concurrently with an eleven (11) months and twenty-nine (29) days sentence in the county
workhouse for possession of drug paraphernalia. The appellant now raises two issues for our review.
First, the appellant contends the trial court erred by permitting the State to introduce evidence of
marijuana residue seized during a proper search of the residence. Second, the appellant challenges
the sufficiency of the evidence to sustain a conviction for possession of cocaine with intent for resale
and possession of drug paraphernalia. Following a review of the record, we affirm the trial court’s
decision on both issues.
I. Factual Background
In M of 1996, a narcotics detective with the Dickson County Sheriff’s O
ay ffice maintained
surveillance of Rosalind Thompson’s residence located at 1020 Evans Road in Burns, Dickson County.
Surveillance persisted for four to six weeks approximately four days each week. The detective noted
several vehicles in front of
the house that would stay for short periods of time. On Thursday and Friday nights, he witnessed
nearly twenty (20) vehicles at the residence.
1
The indictment also charges the appellant under the alias, David Weathers.
2
A Dickson County Grand Jury returned a three-count indictment against the appellant and a co-defendant,
Rosalind Thompson, charging them with one count of possession of cocaine over .5 grams with intent to sell, one count
of possession of marijuana, and one count possession of drug paraphernalia.
2
After procuring a valid search warrant for the stated address, the appellant and Rosalind
Thompson were found inside the residence and two other males outside. The appellant was found in
the bedroomwhich connects to the bathroom without his shirt and shoes preparing to take a shower.
Upon interviewing the appellant, he told the officers he lived at Rosalind Thompson’s house; and she
testified at his trial that she was “seeing” the appellant, he was “staying there off and on,” and he had
spent the night on other occasions. Inside the bathroomin close proximity to the appellant, officers
found a plastic bag containing crack cocaine, a small tinfoil packet containing a small amount of crack
cocaine, and a homem crack pipe with cocaine residue.
ade
The two males outside the residence in the driveway were Edrick Weathers, the appellant’s
brother, and “Anthony” Dwayne Aulston. O was sitting inside a vehicle and the other w standing
ne as
outside. Thompson testified while she was at w the two young men and the appellant rem
ork, ained at
her house. The officer testified he removed a cellophane packet containing crack cocaine along with
two packets of one-inch plastic bags from the washroom located in the carport. The samples of
cocaine tested from the residence weighed 2.2 gram and 3.8 grams. Three “roaches” were found in
s
the dining room in the ashtray which the officer testified “appeared” to be marijuana. Elsewhere in the
residence, the officer found rolling papers.
At the conclusion of the state’s case-in-chief, the appellant’s counsel moved for judgments of
acquittal on all three counts. The trial court granted the motion with regards to count two of the
indictm possession of marijuana, because the field
ent,
test failed to produce positive results; however, the motion was denied as to the other tw counts.
o
Without presenting any proof, the appellant rested. The jury found the appellant guilty of both
remaining counts.
I. Introduction of Evidence
3
First, the appellant contends the trial court erred by permitting the State to introduce evidence
of marijuana residue or “roaches” found inside the residence. Initially, the State proceeded to present
evidence of the possession of marijuana charge through testimony of the officer. Appellant’s counsel
objected to the officer’s testim on the ground that the officer w not qualified to determ whether
ony as ine
the items identified as “roaches” did in fact contain a Schedule VI controlled substance.
The officer testified he had seventeen years of lawenforcem experience including six years
ent
on Vice Squad, training at IPTMSchool, drug identification school, and narcotics investigation schools.
Moreover, he had arrested m than five hundred people in Dickson County for narcotics violations
ore
ranging from marijuana roaches, crack cocaine, and LSD.
At this point, appellant’s counsel reiterated his objection stating, “He can say what it looks like,
but he can’t say what it is. He didn’t perform any field test on it.” Appellant’s counsel failed to object to
relevancy of the evidence, failed to m a request for a jury-out hearing, failed to ask for a m
ake otion to
strike, or request a curative instruction. Consequently, the trial judge limited the testimony to what the
“roaches” appeared to be. In fact, the officer testified that he did perform a field test on the roaches
which yielded a negative result. He concluded the test failed because of the age of the marijuana or
the THC (tetrahydrocannabinol) level was
low. On cross-examination, the officer stated there was a possibility it was not marijuana. The
marijuana was not sent to the TBI crim lab for further testing.
e
The appellant avers the trial court should have given a curative instruction once the problem
had fully developed. If the trial court does not give such an instruction, the appellant must request a
curative instruction. State v. Mackey, 638 S.W.2d 830, 835-36 (Tenn. Crim. App.), perm. to appeal
denied, (Tenn. 1982). The failure to request the curative instruction constitutes a waiver of the issue.
Mackey, 638 S.W.2d at 835-36; see also State v. Tizard, 897 S.W.2d 732, 747 (Tenn. Crim. App.
1994); State v. Jones, 733 S.W.2d 517, 522 (Tenn. Crim. App.), perm. to appeal denied, (Tenn. 1987).
Here, appellant’s counsel did not request a curative instruction after the introduction of the evidence,
4
therefore, the issue was waived.
Nevertheless, when the trial judge granted a judgment of acquittal for count two, possession of
marijuana, he, in fact, did instruct the jury that they were not to consider the possession of marijuana
since the field test was negative producing reasonable doubt the substance was marijuana. It is well
settled in the state of Tennessee that a jury is presumed to have followed a trial court’s curative
instruction. State v. Lawson, 695 S.W.2d 202, 204 (Tenn. Crim. App. 1985); State v. Blackmon, 701
S.W 228, 233 (Tenn. Crim. App.), perm. to appeal denied, (Tenn. 1985). Here, the appellant
.2d
complains from that which he benefitted following the trial court granting his motion for acquittal in
count two. The appellant has failed to establish that the jury did not follow this instruction. This issue
is without merit.
II. Sufficiency of the Evidence
Second, the appellant challenges the sufficiency of the evidence to sustain a conviction for
possession of cocaine greater than .5 gram with the intent to sell and possession of drug
s
paraphernalia. Following a jury conviction, the initial presumption of innocence is removed fromthe
defendant and exchanged for one of guilt, so that on appeal, the defendant has the burden of
demonstrating the insufficiency of the evidence. State v. Tuggle, 639 S.W.2d 913, 914 (Tenn. 1982).
It is the duty of this court to affirm the conviction unless the evidence adduced at trial was so deficient
that no rational trier of fact could have found the essential elements of the offense beyond a
reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 317, 99 S.Ct. 2781, 2789, 61 L.Ed.2d 560
(1979); State v. Cazes, 875 S.W.2d 253, 259 (Tenn. 1994); Tenn. R. App. P. 13(e). In State v.
Matthews, 805 S.W.2d 776, 779 (Tenn. Crim. App.), perm. to appeal denied, (Tenn. 1990), this court
held this rule is applicable to findings of guilt predicated upon direct evidence, circumstantial evidence,
or a combination of both direct and circumstantial evidence.
This court does not reweigh or reevaluate the evidence, nor m we replace our inferences for
ay
those drawn by the trier of fact. State v. Cabbage, 571 S.W.2d 832, 835 (Tenn. 1978). Furthermore,
the State is entitled to the strongest legitimate view of the evidence and all reasonable inferences
5
which m be drawn therefrom State v. Harris, 839 S.W.2d 54, 75 (Tenn. 1992), cert. denied, 507
ay .
U.S. 954, 113 S.Ct. 1368, 122 L.Ed.2d 746 (1993). A jury verdict accredits the testim of state’s
ony
witnesses and resolves all conflicts in favor of the state’s theory. State v. Williams, 657 S.W.2d 405,
410 (Tenn. 1983).
A. Possession of Cocaine with Intent to Sell
The appellant argues that although he admitted to living at the residence, Thompson only
stated that he stayed there “off and on.” Also, the appellant
contends there was no evidence of drugs on his person or in the bedroom where he was found by the
officers. In order to convict a defendant of possession with intent to sell, the State is required to prove
(1) the defendant knowingly possessed cocaine in excess of .5 gram and (2) the defendant’s
s
possession was for the purpose of sale. Tenn. Code Ann. § 39-17-417 (a) (4) (c) (1) (1995 Supp.).
Possession of a controlled substance can be based on either actual or constructive possession. State
v. Brown, 823 S.W.2d 576, 579 (Tenn. Crim. App. 1991); State v. Cooper, 736 S.W.2d 125, 129 (Tenn.
Crim. App. 1987). To constructively possess a drug, that person must have “the power and intention
at a given time to exercise dominion and control over the drugs either directly or through others.”
Cooper, 736 S.W.2d at 129 (quoting State v. Williams, 623 S.W.2d 121, 125 (Tenn. Crim. App. 1981)).
Moreover, possession may be actual or constructive, either alone or jointly with others. State v.
Copeland, 677 S.W.2d 471, 476 (Tenn. Crim. App.), perm. to appeal denied, (Tenn. 1984); Armstrong
v. State, 548 S.W.2d 334, 337 (Tenn. Crim. App. 1976), cert. denied, (Tenn. 1977). If one person
alone has actual or constructive possession of a thing, possession is sole. If two or more persons
share actual or constructive possession of a thing, possession is joint. A person’s m presence in
ere
the area where drugs are discovered does not show possession, and neither will association with the
one who is in control of drugs. Cooper, 736 S.W.2d at 129. Pursuant to Tenn. Code Ann. § 39-17-419
(1991), inferences m be drawn of possession with intent to sale from the am
ay ount of the controlled
substance along with other relevant facts surrounding the arrest.
Through the officers’ surveillance, they witnessed numerous cars com and going from the
ing
residence. The appellant admitted to the officers he lived at the residence. He was left alone there
6
while Rosalind Thompson was at work. He shared common facilities and free access to all rooms.
The officers found the appellant in the bedroomwithout his shirt and shoes preparing to shower. In the
bathroom the officers found a plastic bag and a tinfoil packet both containing crack cocaine. In
,
addition, the officers found two packets of plastic bags, one-inch bags, and a cellophane packet
containing crack cocaine. Expert testimony fromthe crim laboratory determined that the total amount
e
of cocaine recovered weighed 2.2 gram and 3.8 grams. These combined factors constitute sufficient
s
proof to permit a rational juror to infer beyond a reasonable doubt that the appellant possessed the
cocaine with intent to sell.
B. Possession of Drug Paraphernalia
The appellant’s arguments for this conviction are the sam (a) he did not reside in the hom
e e
and (b) there w no drug paraphernalia on his person nor in the bedroomwhere he was found. In
as
order to convict the appellant of possessing drug paraphernalia, the state was required to prove
beyond a reasonable doubt that he (1) possessed with intent to use, (2) equipment, products or
materials, (3) intended for “... packaging, repackaging, . . ., containing, . . ., ingesting, inhaling, or
otherwise introducing” a controlled substance into the human body. Tenn. Code Ann. §§ 39-17-402
(12) and-425(a)(1) (Supp. 1995).
The State m its burden of proof that the plastic bags and crack pipe were drug
et
paraphernalia. The same constructive possession analysis above applies here. The officers found the
homem crack pipe in the bathroom where the appellant was proceeding to take a shower. The
ade
officers also found two packets of plastic bags and one-inch bags in the laundry room and rolling
papers in the residence while he had free access to all room of the house. Accordingly, we hold that
s
the record contains sufficient proof from which a rational trier of fact could infer the appellant
possessed drug paraphernalia
Although the evidence in this case was circumstantial, a conviction may rest entirely upon
circumstantial evidence. See Duhac v. State, 505 S.W.2d 237, 241 (Tenn. 1974), cert. denied, 419
U.S. 877, 95 S.C 141 (1974); State v. Hailey, 658 S.W.2d 547, 552 (Tenn. Crim. App.), perm. to
t.
7
appeal denied, (Tenn. 1983). In order for a conviction to stand based on circumstantial evidence alone,
the facts must be “so clearly interwoven and connected that the finger of guilt is pointed unerringly at
the defendant and the defendant alone.” State v. Black, 815 S.W.2d 166, 175 (Tenn. 1991) (citing
State v. Duncan, 698 S.W.2d 63 (Tenn. 1985)). The weight to be given circumstantial evidence and
“the inferences to be draw fromsuch evidence, and the extent to w
n hich the circumstances are
consistent with guilt and inconsistent with innocence, are questions primarily for the jury.” Marable v.
State, 203 Tenn. 440, 313 S.W.2d 451, 456-57 (1958).
In the case at bar, the evidence points unerringly at the appellant. The only evidence
presented at trial to indicate the drugs belonged to some else was the equivocal testim of Rosalind
ony
Thompson. In view of the prosecution’s impeachm of this witness based upon prior inconsistent
ent
statements and contradictory testimony offered at trial the jury was clearly entitled to give her
testimony little if any weight. Therefore, the jury could easily infer from all these circumstances and
the close proxim of the discovered cocaine and drug paraphernalia to the appellant that his intention
ity
was to exercise dominion and control over it.
After a review of the record, we find no error requiring reversal. The judgments of conviction
entered by the trial court are affirmed.
____________________________________
DAVID G. HAYES, Judge
CONCUR:
______________________________________
PAUL G. SUMMERS, Judge
8
______________________________________
JERRY L. SMITH, Judge
9
| 2023-08-27T01:27:17.568517 | https://example.com/article/8525 |
Chemometric treatment of vanillin fingerprint chromatograms. Effect of different signal alignments on principal component analysis plots.
This study describes the chemometric treatment of vanillin fingerprint chromatograms to distinguish vanillin from different sources. Prior to principal component analysis, which is used to discriminate vanillin from different origins, the fingerprints are aligned. Three alignment algorithms are tested, correlation optimized warping (COW), target peak alignment (TPA) and semi-parametric time warping (STW). The performance of the three algorithms is evaluated and the effect of the different alignments on the PCA score plots is investigated. The alignment obtained with STW differs somewhat from that with COW and TPA. However, equivalent score plots were obtained regarding the different vanillin groups. | 2023-08-25T01:27:17.568517 | https://example.com/article/3326 |
A laser micromanipulator for surgical applications includes an adaptor attachable to a laser and to a microscope which automatically maintains, preferably using phase detection, the laser beam in focus on tissue during any changes in the working distance by the surgeon manipulating the microscope....http://www.google.es/patents/US5688262?utm_source=gb-gplus-sharePatente US5688262 - Laser microscope adaptor apparatus with auto-focus
A laser micromanipulator for surgical applications includes an adaptor attachable to a laser and to a microscope which automatically maintains, preferably using phase detection, the laser beam in focus on tissue during any changes in the working distance by the surgeon manipulating the microscope.
a planar reflector having first and second silvered sides, with a conical hole drilled in the center of said planar reflector;
said planar reflector positioned to receive the treatment and aiming beams, and reflect said beams from said first silvered side to reach a concave hyperbolic focussing mirror;
said concave hyperbolic focusing mirror receiving, reflecting, and focusing the treatment and aiming beams such that said beams pass through said conical hole in said planar reflector to reach a concave spherical focusing mirror;
said concave spherical focusing mirror reflecting said treatment and aiming beams to reach said second silvered side of said planar reflector;
said planar reflector receiving said treatment and aiming beams, and reflecting said treatment and aiming beams from said second silvered side to reach a manipulable mirror,
said manipulable mirror receiving said treatment and aiming beams, and reflecting said laser beams to reach a working plane.
Descripción
FIELD AND BACKGROUND OF THE INVENTION
The present invention relates to a laser microscope adaptor apparatus with auto-focus. The invention is particularly useful in surgical laser microscope apparatus for delivering a laser beam to an object, such as a tissue to be cut, removed, or coagulated and is therefore described below with respect to such application.
Surgical lasers are widely used in microsurgery, such as ENT, neurosurgery or gynecology, wherein a working laser beam (e.g., from a CO2 laser), and a visible aiming beam (e.g., from a HeNe laser), are directed to the surgical site through a microscope adaptor, commonly termed a laser micromanipulator which includes a joystick by which the surgeon can direct the laser beam over selected locations in the field of view. Until recently, surgical microscopes were used at fixed working distances depending on the particular clinical application. For example, for vocal cord treatments, a working distance of 400 mm is normally used; whereas for neurosurgery, a working distance of 300 mm is normally used. Working distances are set by changing the objective lens on the microscope. To focus the laser beam at the focal plane of the microscope, laser focusing lenses in the micromanipulator are chosen in accordance with the working distance set on the microscope.
Recently, microscopes with variable working distances have been developed and applied clinically in various specialities. These microscopes, which may cover the range from 200 to 400 mm, enable the surgeon to electronically control and change the working distance from the microscope to the tissue during the surgical procedure. To maintain the laser beam in focus on the tissue under these circumstances, the surgeon is required to constantly change or move the lenses on the micromanipulator in accordance with the changes on the microscope.
One manufacturer has recently developed a micromanipulator in which the laser focusing lenses are electronically linked to the lenses on the microscope so that any change in the microscope is automatically also made in the laser micromanipulator. This method, however, requires elaborate electronic linkage between the microscope and the laser micromanipulator. Moreover, it does not allow versatility in using the same micromanipulator with operating microscopes of different manufacturers.
OBJECT AND BRIEF SUMMARY OF THE INVENTION
An object of the present invention is to provide an adaptor attachable to a laser and to a microscope which automatically maintains the laser beam in focus on tissue during any changes in the working distance by the surgeon manipulating the microscope.
According to the present invention, there is provided an adaptor attachable to laser apparatus and to a microscope for directing a laser beam from the laser apparatus onto an object in a working plane as viewed via the microscope, comprising: an optical system to be located in the path of the laser beam for focusing the laser beam onto the object in the working plane; a manipulatable mirror between the optical system and the working plane, which mirror is manipulatable to direct the laser beam to any desired location in the working plane; and an auto-focus system for receiving light from an object in the working plane and for automatically controlling the optical system in accordance therewith for focusing the laser beam onto the object in the working plane.
The auto-focus system may be any known system, such as widely used in cameras, for example. A preferred system is one based on the phase detection method as used in commercial single lens reflex auto-focus cameras.
It will be appreciated that the optical system which focuses the laser beam onto the object in the working plane may focus the laser beam to a very small diameter, e.g., for cutting tissue, or to a larger diameter, e.g., for ablating or coagulating tissue. In the latter case, the laser beam is sometimes referred to as being somewhat "defocused" to enlarge its diameter, and thereby to distribute the energy over a larger surface area. The adaptor of the present invention automatically focuses the laser beam onto the working surface, such that the beam as applied to the object will be precisely in the same form as outputted by the optical system, i.e., either a small-diameter "focused" beam or a larger-diameter somewhat "defocused" beam.
According to further features in the preferred embodiments of the invention described below, the laser apparatus outputs a working laser beam and a visible aiming laser beam. The manipulatable mirror is dichroic to reflect visible light from the object to the auto-focus system, and to transmit visible light including the visible laser aiming beam from the object to the microscope. The auto-focus system includes a visible light detector, a second dichroic mirror for reflecting the laser beams via a first optical path to the object in the working plane, and for transmitting the visible light from the object via a second optical path to the visible light detector; and a control system for controlling the optical system in response to the output of the visible light detector.
According to further features in the described preferred embodiment, the optical system includes a first optical device which focuses the laser beams to a focal plane between it and the second dichroic mirror, and a second optical device between the second dichroic mirror and the working plane and movable with respect to the first optical device to focus the laser beams exiting from the first optical device onto the working plane. The second dichroic mirror is located such that the optical path length from it to the focal plane is equal to the optical path length from it to the visible light detector. In addition, the first optical device is movable relative to the second dichroic mirror to increase or decrease the diameter of the laser beams applied to the object in the working plane.
Two embodiments of the invention are described below for purposes of example, in one embodiment, the first and second optical devices are both lens systems; and in a second described embodiment, they are mirror systems.
Since the adaptor constructed in accordance with the invention effects the focusing of the laser beam on the working plane via an auto-focus system incorporated into the optics of the micromanipulator, rather than in electronic linkage between the microscope and the micromanipulator, such an adaptor may be used for adapting laser apparatus to any type of microscope used in microsurgery and having the capability of varying the working distances. The invention thus eliminates the need for any electrical interface between the microscope and the laser micromanipulator. It is also useful with fixed distance microscope where critical laser focusing on tissue is desired.
Further features and advantages of the invention will be apparent from the description below.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein:
FIG. 1 illustrates one form of lens-based adaptor constructed in accordance with the present invention;
FIG. 2 illustrates how the laser beam in the adaptor of FIG. 1 are automatically focused on the object in the working plane when the working distance of the microscope is changed
FIG. 3 illustrates the apparatus of FIG. 1 wherein the optical system is adjusted to enlarge the diameter or to "defocus", the laser beam;
FIG. 4 illustrates how the "defocusing" effect is still maintained in the apparatus of FIG. 1 when the working distance is changed;
and FIGS. 5, 6, 7 and 8 are diagrams corresponding to FIGS. 1, 2, 3 and 4, respectively, but with respect to a mirror-based adaptor system, rather than a lens-based adaptor as in FIGS. 1-4.
FIGS. 1-4 illustrate a lens-based micromanipulator adaptor comprising a Kepler type beam expander with two lens systems LA, LB, respectively. This adaptor is for use with laser apparatus L which outputs a working laser beam (e.g., from a CO2 laser of 10.6 μ) and a visible aiming laser beam (e.g., from a HeNe of 0.633 μ). Each lens system LA, LB has both zinc selenide (ZnSe) elements and potassium bromide (KBr) elements for chromatic and spherical aberration correction, forming an aplanatic achromatic lens, as well known in the art. Each lens LA, LB is encapsulated with 0-rings and a chemical moisture-absorbing material, evacuated, leak tested, and hermetically sealed.
The inputted laser beams, of a diameter "D", pass through the first lens system LA. This lens system contains four separate elements, namely two outer elements L1, L4 of ZnSe, and two inner elements L2, L3 of KBr. Lens system LA focuses the laser beams to the focal plane FP.
A 45° dichroic mirror DM is located on the other side of the focal plane FP. Dichroic mirror DM totally reflects the CO2 laser beam and also the HeNe aiming beam to the second lens system LB. As will be described more fully below, dichroic mirror DM transmits the visible spectrum except for the HeNe aiming beam.
The laser beams, thus reflected by the dichroic mirror DM to lens system LB, are expanded. Lens system LB, of a similar type as lens system LA including two outer elements L5, L8 of ZnSe and two inner elements L6, L7, of KBr, focuses the laser beams via the joystick mirror JM onto the working plane WP. Joystick mirror JM is manipulatable by joystick JS to direct the beam to any desired location in the working plane WP. This mirror is also dichroic and is located at a 45° angle to the axis of lens system LB such that it reflects the two laser beams to the working plane WP, but passes visible light therethrough to enable the viewer SE to view the working plane via the operating microscope OM.
It will thus be seen that when the adaptor is installed on the operating microscope OM, the viewing optical axis is coincident with the laser beam axis, such that the surgeon's eye SE views the tissue as well as the laser aiming beam (HeNe) both of which pass through the dichroic mirror JM. The surgeon can thus precisely aim the working laser (CO2) beam with respect to the tissue at the working plane as the surgeon views the working plane through the operating microscope.
Part of the visible light from the tissue at the working plane WP is also reflected by the joystick mirror JM back to the lens system LB. Dichroic mirror DM located between lens system LB and lens system LA transmits this visible light. A filter HF reflects only the aiming beam (HeNe) and transmits the remaining visible light to increase the signal-to-noise ratio. The transmitted light is focused by lens system LB onto an auto-focus detector AF of an auto-focus system, including a control system CS and a drive MG.
The auto-focus system operates in a manner similar to the operation of commercial auto-focus cameras. Thus, the auto-focus detector AF is connected via control system CS to the drive MG, such as a motor and gear system, for driving the lens system LB towards or away from the dichroic mirror DM, until the object in the working plane WP (namely the tissue viewed by the surgeon via the operating microscope OM) is focused on the auto-focus detector AF.
The focal length of lens system LB is the same at 10.6 μ (the wavelength of the CO2 laser) as it is over the visible spectrum. For the CO2 laser beam to be focused on the working plane WP as controlled by the auto-focus detector AF and its control system CS, the optical path length from the dichroic mirror DM to the auto-focus detector AF must be identical to the optical path length from the dichroic mirror to the focal plane FP of the lens system LA. This alignment is preferably carried out prior to use by the surgeon by changing the distance DC between the lens system LA and the dichroic mirror DM until the CO2 laser beam is focused to a minimum spot diameter in the working plane WP. After this alignment has been preset, the focused minimum spot diameter will always coincide with the working plane WP irrespective of the working distance WD between the joystick mirror JM and the working plane WP.
The above will be better understood by reference to FIG. 2, illustrating what occurs when the surgeon has decided to shorten the working distance WD by one-half. The auto-focus system is activated, as described above by the auto-focus detector AF and its control system CS, to move the lens system LB away from the dichroic mirror DM. This increases the distance DL between the lens system LB and the dichroic mirror DM, and decreases the distance DJ between the lens system LB and the joystick dichroic mirror JM. The system thus automatically focuses the laser beams in response to changing the working distance WD of the operating microscope OM by the surgeon, thereby freeing the surgeon from making adjustments of the laser beam optical system.
Should the surgeon desire to work with an enlarged-diameter laser beam, e.g., for coagulation or ablation purposes, the surgeon can enlarge the diameter, or "defocus" the laser beam, by changing the distance DC from the lens LA to the dichroic mirror DM. This can be done with the aid of a defocus ring, shown schematically at DR in FIG. 1, as well known in the art. The preset amount of beam enlargement ("defocus") is maintained since the auto-focus detector AF receives information through the lens system LB alone. Thus, the operation of the auto-focus system including detector AF and its control system CS is completely independent of the sharpness of focus of the CO2 laser.
The foregoing will be more apparent by reference to FIG. 3 which illustrates a defocus mode at a given working distance WD. In this situation, the surgeon would be operating with an enlarged ("defocused") spot diameter as shown at DS, where the working plane WP is the focal plane of the operating microscope. Rays of light in the visible part of the spectrum, as represented by the dashed lines VR, are propagated from the object (tissue),at the working plane WP through the system as described above, coming to a focus in the plane of the auto-focus detector AF. Thus, as far as the auto-focus detector is concerned, the object at the working plane WP is completely focused.
FIG. 4 illustrates the condition wherein the surgeon has operated the microscope OM to shorten the working distance by one-half. When the surgeon thus changes the working distance, the auto-focus system including detector AF and its control system CS automatically refocuses the lens system LB of the micromanipulator, thereby freeing the surgeon from this task. If the surgeon now wishes to work in the "focus" mode with a very small-diameter beam, the surgeon simply rotates the defocus ring DR to the position of "focus", as shown in FIG. 2.
The center of the HeNe aiming beam on the tissue at the working plane WP represents the center of the scene viewed by the auto-focus detector AF. The auto-focus mechanism may include a series of warning devices similar to the arrangement of commercial SLR cameras, These devices warn the surgeon that accurate focusing has not taken place for any one of a number of reasons. Thus, the ambient light level could be too low, or more likely there is not enough information in the viewed "scene" (i.e., the tissue in the working plane). The surgeon can change the scene by the auto-focus detector by moving the joystick JS which moves the aiming beam to a different viewed part of the tissue.
It will thus be seen that the surgeon can change the working distance WD by operating the microscope OM, or change the diameter of the operating laser beam by adjusting the defocusing ring DR, as and when required during an operating procedure, whereupon activation of the auto-focus system, including the auto-focus detector AF and its control system CS, will automatically maintain the laser beams focused at the selected beam diameter (i.e., precisely focused or preselectedly defocused) on the tissue in the working plane WP.
Mirror Based System
FIGS. 5-8 illustrate a mirror-based micromanipulator adaptor having an auto-focus operation of the laser beams which is basically the same as in the lens-based system of FIGS. 1-4.
Thus as illustrated in FIG. 5, the input from the laser apparatus, containing both the working laser beam (CO2) and the visible aiming laser beam (HeNe), both of diameter D, is reflected off a 45° planar reflector MH. Reflector MH is silvered on both surfaces and has a small conical hole drilled in its center. The reflected input beams strike focusing mirror M1, which has a concave non-spherical surface (Hyperbolic). The beams reflected from focusing mirror M1 come to a focus at a distance DH which is exactly where the hole in reflector MH is situated. The focussed beams pass through the conical hole in reflector MH and strike a dichroic combiner CH. This combiner totally reflects the CO2 working beam and the HeNe aiming beam, while partially reflecting and partially transmitting the visible part of the spectrum. The reflected CO2 and HeNe beams strike a concave spherical focusing mirror M2 at a distance D2 from the dichroic combiner CH.
The beams (CO2 and HeNe) reflected off mirror M2 converge to a focus in the working plane WP. On the path to the focal plane they are reflected back by the dichroic combiner CH and reflector MH, and strike another dichroic mirror JM, which is the same joystick mirror described in the lens- based system of FIGS. 1-4. Mirror JM totally reflects the CO2 beam while partially reflecting and partially transmitting the visible light (including the HeNe beam). The optical axis of mirror JM is coincident with the optical axis of the operating microscope OM whereby the working plane WP is at a distance WD from the joystick mirror. Focused working and aiming beams are thus formed in the working plane of the microscope.
The auto-focus optical channel is as follows: Visible rays emanating from the object (tissue) at the working plane WP are partly transmitted via the joystick mirror JM and the microscope OM to the viewer SE, constituting the viewing channel. These rays are partly reflected by the joystick mirror JM and by reflector MH and dichroic combiner CH to the focusing mirror M2. The rays are then reflected by mirror M2 and are transmitted through the dichroic combiner CH to the auto-focus detector AF. Filter HF is provided in the ray path as described in the lens-based system of FIGS. 1-4 to reflect only the visible aiming beam, and thereby to improve the signal to noise ratio. The AF control system activates the motor and gear system, schematically shown by the broken lines MG, coupled to the concave focusing mirror M2 to change the distance D2 until the object is completely focused on the auto-focus detector AF.
The working plane WP has now been focused as far as the AF detector is concerned. Since mirrors have exactly the same focal length irrespective of wavelength, the minimum CO2 focused spot diameter will be formed on the working plane WP when the optical path length from the concave mirror M2 to the AF device, through the dichroic combiner CH and filter HF, is exactly the same as the optical path length from the concave mirror M2 to the focal plane of mirror M1, as described above with respect to the lens-based system of FIGS. 1-4. That is, in the system of FIGS. 5-8, the dichroic combiner CH is located such that the optical path from it to the hole in reflector MH is equal to the optical path from it to the auto-focus detector AF.
To overcome mechanical production tolerances, the minimum distance DH is factory preset so that once the AF system has been activated, the in focus spot diameter of the working CO2 beam will be minimum. Thus, when changing working distance, the surgeon simply activates the AF device and the system will be refocused in the same manner as described in the lens-based system of FIGS. 1-4.
For example, in FIG. 6 the working distance is one-half of that represented by FIG. 5. Here, the AF device has focused the system by increasing the distance D2 activated by the motor and gear mechanism through the auto-focus control system (CS, FIG. 1).
If the surgeon decides to work in an enlarged spot-diameter ("defocus") mode, the surgeon simply increases the distance DH of the first concave mirror M1 from reflector MH, e.g., by rotating a focusing ring FR as described in FIGS. 1-4. In this way as shown in FIGS. 7 and 8, the surgeon can operate in a coarsely focused ("defocus") or sharply focused mode without affecting the ray path of the AF device in the same manner as described in the lens-based system of FIGS. 1-4.
While the invention has been described with respect to two preferred embodiments, it will be appreciated that these are set forth merely for purposes of example, and that many other variations, modifications and applications of the invention may be made. | 2024-03-10T01:27:17.568517 | https://example.com/article/7911 |
Q:
Draw phase portrait of this system
Consider the system:
$$
\begin{cases}
x'=xy\\
y'= -x^2.
\end{cases}
$$
I find that for this system, the line $x=0$ are a line of fixed points. I wonder how to draw the phase portrait for this system.
A:
Change to polar coordinates:
$$
x(t)=R(t)\cos(\varphi(t))\qquad y(t)=R(t)\sin(\varphi(t))
$$
$$
x'(t)=R'(t)\cos(\varphi(t))-R(t) \varphi '(t) \sin (\varphi (t))
$$
$$
y'(t)=R'(t)\sin(\varphi(t))+R(t) \varphi '(t) \cos (\varphi (t))
$$
Then:
$$
R'(t)\cos(\varphi(t))-R(t) \varphi '(t) \sin (\varphi (t))
=R(t)^2\cos(\varphi(t))\sin(\varphi(t))
$$
$$
R'(t)\sin(\varphi(t))+R(t) \varphi '(t) \cos (\varphi (t))
=-R(t)^2\cos(\varphi(t))^2
$$
This is a linear equation for $R'(t)$ and $\varphi'(t)$, solving it yields:
$$
\begin{cases}
R'(t)=0\\
\varphi'(t)=-R(t)\cos(\varphi(t))\\
\end{cases}\Rightarrow
\begin{cases}
R'=0\\
\varphi'=-R\cos(\varphi)\\
\end{cases}
$$
Thus $R(t)=c$, so the curves should be circles.
Using the following Mathematica code helps:
StreamPlot[{x y, -x^2}, {x, -2, 2}, {y, -2, 2}]
(StreamPlot reference)
| 2024-07-10T01:27:17.568517 | https://example.com/article/8227 |
EDIT: Turns out CARGO_PKG_NAME does exactly what I need, and I had just misread the output of my debugging. Unfortunately I seem unable to delete this post.
When specifying a custom build script, the CARGO_PKG_NAME environment variable holds the name of the top-level crate being built. Is there a way to get the name of the current crate being built? Concretely, if crate foo depends on crate bar, and bar has a build script, is there a way for that build script to discover that it’s being run on crate with the name bar?
This may sound like an odd question, but I’m trying to write a generic build.rs script that performs a particular task for any crate. | 2024-02-03T01:27:17.568517 | https://example.com/article/9100 |
Kitchen being the most important space in any house as it is place where woman of spends her time so decoration needs to be taken care with complete thought process and budget friendly we enjoy delicious food cooked by our mother, inc the ikea kitchen remodel before and after completed cretive designs tiny ideas architecture isl southern galley, I used the program on ikea and then went over it a couple of times with kitchen staff at to make sure got everything right but was all an easy fix returns get what needed previous did lot smoother hardly any errors than this one. | 2024-03-12T01:27:17.568517 | https://example.com/article/4427 |
<!--
B50-ZK-298.zul
Purpose:
Description:
History:
Fri Aug 12 15:43:11 TST 2011, Created by simon
Copyright (C) 2011 Potix Corporation. All Rights Reserved.
-->
<zk>
<div>1. Switch to each Tab. The Tabbox height shall change depending on Tabpanel content height.</div>
<div>2. Click "set height" and repeat the same. The Tabbox height shall NOT change.</div>
<div>3. Click "clear height" and repeat the same. The height shall change again.</div>
<button label="set height" onClick='box.height = "300px"' />
<button label="clear height" onClick='box.height = ""' />
<tabbox id="box" orient="vertical">
<tabs width="40px">
<tab label="first" />
<tab label="second" />
<tab label="third" />
</tabs>
<tabpanels>
<tabpanel>
<div height="20px" style="border: 1px red dotted;" forEach="1,2">
input
</div>
</tabpanel>
<tabpanel id="pnl">
<div height="300px" style="border: 1px red dotted;" forEach="1,2,3,4">
input
</div>
</tabpanel>
<tabpanel>
<div height="300px" style="border: 1px red dotted;">
input
</div>
</tabpanel>
</tabpanels>
</tabbox>
</zk>
| 2023-11-01T01:27:17.568517 | https://example.com/article/8784 |
package us.ihmc.avatar.networkProcessor.stereoPointCloudPublisher;
import us.ihmc.euclid.tuple3D.interfaces.Point3DReadOnly;
import us.ihmc.ihmcPerception.depthData.CollisionShapeTester;
import us.ihmc.robotEnvironmentAwareness.communication.converters.ScanPointFilter;
public class CollidingScanPointFilter implements ScanPointFilter
{
private final CollisionShapeTester collisionBoxNode;
public CollidingScanPointFilter(CollisionShapeTester collisionBoxNode)
{
this.collisionBoxNode = collisionBoxNode;
}
public void update()
{
collisionBoxNode.update();
}
@Override
public boolean test(int index, Point3DReadOnly point)
{
return !collisionBoxNode.contains(point);
}
}
| 2024-03-26T01:27:17.568517 | https://example.com/article/8890 |
Among the hundreds of bills that will be debated in the upcoming legislative session are some familiar ones that, while generally popular with the public, have been repeatedly rejected by the Republican-controlled Legislature.
From a ban on driving while talking on cellphones to a workable hate-crimes law, these bills keep coming back and, sometimes, back again.
Sponsors and supporters of these proposals may be frustrated by multiple defeats, but you wouldn’t know it from their persistence and seemingly indefatigable optimism.
“If we don’t run it, then we don’t talk about it,” said Rep. Jennifer Dailey-Provost, D-Salt Lake City. “And then we definitely don’t get anywhere.”
In some cases, repeated debate of divisive issues allows for incremental progress and eventual passage, like the lauded “Utah Compromise” that prohibited LGBTQ discrimination in employment and housing, coupled with protections for religious liberty. In other instances, constant roadblocks on Capitol Hill have prompted supporters to go around the Legislature and take their cause straight to voters, as happened with medical marijuana legalization and Medicaid expansion.
With just days until the 2019 session, here are some of the bills that are almost certain to be talked about, but considerably less certain to succeed.
Critics have argued that the law would be difficult to enforce and prone to subjective judgment by law-enforcement officers. Some national safety groups have opposed similar bans in other states, arguing that they give drivers the false impression that it is safe to operate hands-free phone technology while driving.
Moss said she’s optimistic that turnover in the Legislature, and potentially assignment to a different House committee, could move her bill forward this year.
“I feel good about it,” she said. “The big unknown is that we have a lot of new people. It might be better.”
Life-ending prescriptions
After Rep. Rebecca Chavez-Houck retired, Dailey-Provost took over not only a House seat but also one of her predecessor’s signature proposals.
Dailey-Provost said she now represents the constituents who worked with Chavez-Houck on her bills and that the topic, while sensitive, is worthy of continued debate.
“I don’t think we should shy away from difficult issues because they’re difficult,” Dailey-Provost said. “It is daunting, certainly, and a lot of it will really hinge on how quickly I can build good, strong relationships with a huge class of freshmen legislators.”
(Francisco Kjolseth | Tribune file photo) Democrat Jennifer Dailey-Provost was recently elected to represent state House District 24.
The bill has never made it out of committee, with debate typically focusing on the preservation of life and opposition to what is seen by some as physician-assisted suicide.
But Dailey-Provost said there is a clear distinction between life-ending medication and suicide, as terminally ill patients do not have the option of continued life.
“This is a patient who is going to die in the very near future,” she said. “They just want to do it in a way that is most meaningful to them.”
Enter Sen. Daniel Thatcher, who is renewing a push to add teeth to the law by allowing enhanced penalties if a defendant is convicted of targeting someone based on ancestry, disability, ethnicity, gender identity, national origin, race, religion or sexual orientation.
(Rick Egan | The Salt Lake Tribune) State Sen. Daniel Thatcher speaks during a news conference about the National Suicide Prevention Hotline Improvement Act being signed into law. Tuesday, Aug. 21, 2018.
But Thatcher, R-West Valley City, told The Salt Lake Tribune that his proposal could stand a better chance this year, with the attack at Lopez Tires drawing increased attention to deficiencies in the state’s hate-crimes law. He was also encouraged after The Church of Jesus Christ of Latter-day Saints on Wednesday clarified that it does not object to a tougher hate-crimes statute.
“Between the high-profile Lopez case ... and this new clarification, I think we’re in a stronger position than we’ve ever been before,” Thatcher said. “I think we’re likely to get a hearing this year. I think the bill will pass overwhelmingly in committee. It will be a challenge on the floor, but I believe, at the end of the day, this will be the year we get it passed.”
Tampon tax
At one point or another, Rep. Susan Duckworth says, almost every household has to buy disposable hygiene products — children’s diapers, sanitary napkins, tampons and adult diapers.
So, for what she estimates is the sixth or seventh year running, she’s waging an attempt to save families some money by excluding these hygiene items from the state’s sales tax.
To her chagrin, the recurring proposal is colloquially known as the “tampon tax exemption bill." And she’s bringing the measure back in part so she can convince her mostly male colleagues that it has a wider application.
“They think, ‘I don’t relate to this bill because it doesn’t affect me,’ and I think that’s the issue,” Duckworth, D-Magna, said. “It’s my responsibility to educate my colleagues as to why it’s important. ... It isn’t just a women’s bill.”
Steve Griffin | The Salt Lake Tribune Rep. Susan Duckworth D-Magna, chief sponsor of HB202, talks about the bill during discussion of the bill in the House Revenue and Taxation Committee at the State Capitol in Salt Lake City, Wednesday, February 10, 2016. The bill was seeking to eliminate tax on tampons, diapers and other hygiene products. The motion to recommend failed in an 8-3 vote.
Unlike earlier versions of the proposal, this year’s bill would bump up the sales tax rate slightly to offset the revenue lost by exempting the hygiene products.
Duckworth says she hopes this change will win over some lawmakers who would’ve otherwise been worried about the revenue loss. But she’s keeping her expectations under control and says she doesn’t really expect the bill to leave committee.
“If I can get three more votes," she said, “I’ll feel like a success.”
Year-round daylight saving time
While Rep. Marsha Judkins is new to the Legislature, her inaugural bill on daylight saving time has already done several laps around the Utah Capitol.
Her proposal would put a nonbinding question on the ballot in 2020, allowing Utah’s voters to weigh in on an issue that has bedeviled lawmakers for years.
Judkins says the twice-a-year time changes throw off sleep patterns and mess with children’s schedules, and many families and groups want to see the clock stay consistent year-round.
“It’s disruptive to all of our lives,” Judkins, R-Provo, said of the time changes.
(Francisco Kjolseth | The Salt Lake Tribune) Rep.-elect Marsha Judkins is a Republican who just won election in House District 61. She's one of two new Republicans who will be coming to the Legislature in January. The number of women in the Utah Legislature will reach a historic high in 2019 at 24 percent.
Her plan is to let voters decide if they want to keep the status quo, go to year-round standard time or go to year-round daylight saving time. Lawmakers would consider the results but wouldn’t be legally bound to act, she said, and Congress would also have to sign off on any plan to scrap time changes. | 2024-05-08T01:27:17.568517 | https://example.com/article/7462 |
A few kilometres
along the Florentine Valley from the Tim Shea turn off there is an access road (F8 EAST) to a place known as Growling Swallet. The dramatic entrance to Junee cave. It looks more like the entrance to an Incan temple.
The creek emerges at Maydena some 30 kilometres away on the other side of Mt Field.
At high water levels the cave
growls as the the water enters the cave.
The drive from Maydena is about
1/2 an hour. Turn right just west of Maydena along the Florentine road. A
good mainly wide gravel logging road. Follow the road over the saddle by Tim
Shea and into the Florentine Valley. Take the F8 East road right to the
end. About 3 or 4 kilometres on a narrow track only just suitable for 2
wheel drives. The walk to the cave is 45 minutes on a track that is flat
and very wet in many places.
The F8 EAST road is now gated. The
key to the gate is available at the Mt Field Visitors Centre. | 2024-03-08T01:27:17.568517 | https://example.com/article/8898 |
---
abstract: 'In gravitational instability models, there is a close relationship between most absorption and the matter density along the line of sight. Croft et al. (1997) have shown that it is possible to use this relationship with some additional assumptions (such as Gaussianity of the initial density) to recover the power spectrum of mass fluctuations, $P(k)$, from QSO absorption spectra. The relative uniformity of the ionizing radiation background on the scales of interest is an additional assumption required by the technique. Here we examine the fluctuations in spectra caused if the ionizing background radiation is generated by discrete QSO sources. We present our results alongside the preliminary application of the $P(k)$ recovery technique to the QSO Q1422+231. We find the ionizing background fluctuations to have an effect orders of magnitude smaller than the matter fluctuations at the scales on which we measure $P(k)$ ($\lambda < 10 \hmpc$).'
author:
- 'Rupert A.C. Croft'
---
[*Dept. of Astronomy, Ohio State University, Columbus, OH 43210, USA.*]{}
In the “Fluctuating Gunn-Peterson Approximation” for the high-$z$ forest (see the contribution by Weinberg in these proceedings), variations in the optical depth along the line of sight to a QSO are directly related to fluctuations both in the underlying matter density and in the intensity of the ionizing background radiation. Croft et al. (1997) ([@CWKH]) have developed a technique to recover $P(k)$ for the mass, which assumes that only the matter fluctuations have a non-negligible effect. The results of an illustrative application to a Keck spectrum of QSO Q1422+231 (observation by [@Son]) are shown in Figure 1(a).
In order to test at least qualitatively the effect of ionizing background flucuations, which were not included in [@CWKH] , we have created simulated QSO absorption spectra in a universe where the matter density is uniform and the only fluctuations present in absorption are those due to the sources of ionizing radiation being discrete. We have populated a $0.6 \hgpc$ comoving cube (in a $q_{0}=0.1$, h$_{100}$=0.5 universe) with QSOs distributed randomly and with luminosities randomly sampled from the ($z=3$) luminosity function of [@HM]. We include a lower cut-off at $M_{B}=-23$ and calculate the opacity of the IGM in Euclidean space in the optically thin limit. Five randomly chosen example spectra (each is $\sim0.5$ times the length of the cube side) are shown in Figure 1(b). The mean absorbed flux, $D_{A}$, for all spectra was chosen to be the same as $D_{A}$ for Q1422+231, which is also shown in Figure 1(b). The line marked “$\lambda_{max}$” marks the largest scale at which we have measured $P(k)$ in Figure 1(a). We can see that fluctuations due to the background are indeed small on this scale. We find that the power spectrum of the transmitted flux (F) on this scale in the models is $2\%$ of the value for Q1422+231. For the next largest of the k-modes plotted, the ratio is $0.3 \%$ .
This simulation of the effects of discrete QSO sources is extremely simplified, and does not include the effects of redshift (except for the finite box size, which cuts off QSO flux beyond $\Delta z \sim 0.8$), QSO clustering or optically thick absorption. However, we expect that any additional radiation fluctuations due to these effects will not change our conclusion that the matter fluctuations are dominant enough (being of order unity) on these scales that we can infer $P(k)$ for the mass reliably. If there is a contribution to the ionizing background from other sources with greater number density than QSOs, such as starburst galaxies or Population III stars, we expect the radiation fluctuations to be even smaller. If the source positions are correlated with the absorbing gas in this case, these smaller fluctuations could have more of an effect on the $P(k)$ measurement, although as the relative range of the “proximity effect” due to these objects will be so small, we expect the effect to still be unimportant.
I thank A. Songaila and L. Cowie for providing the spectrum of Q1422+231 and D. Weinberg, L. Hernquist and N. Katz for permission to discuss our joint work.
[99]{}[ Croft, R.A.C., Weinberg, D.H., Katz, N. & Hernquist, L., 1997 , astro-ph/9708018. Haardt, F. & Madau, P., 1996, 461, 20 Songaila, A., 1997, Astron J. [*submitted*]{}. ]{}
| 2024-07-19T01:27:17.568517 | https://example.com/article/3832 |
Truman Scholarship success
Boston College is among the nation's Truman Honor Institutions
Campus & Community /
Honors & Awards
- Published on June 13, 2018
'For example, I encourage candidates to research the people in the real world who are making an impact in the areas they are interested in,' says Associate Professor of Political Science Kenji Hayao, BC's coordinator for the Truman program. (Lee Pellegrini)
Spring is not only graduation time, it's when many national academic fellowships and awards are announced, notably the Harry S. Truman and J. William Fulbright scholarships, both considered among the most prestigious of such honors.
Last month, Natalee Deaette '19 became the 11th BC student in the last 20 years, and 19th overall since 1981, to earn a Truman, which supports the graduate education and personal development of standout undergraduates committed to public service leadership.
Boston College has consistently been among the nation's top 20 Fulbright producers, but administrators say the University's success in the Truman Scholarships program—with a distinctively rigorous and exacting application process—is equally worthy of acknowledgement.
Taken with other highly competitive fellowships won by BC students in the past two decades, including Rhodes, Marshall and Goldwater scholarships, the Truman track record is another measure of the University's academic excellence.
Fewer than 80 colleges and universities have achieved the status of Truman Honor Institutions—and BC is one of them. Truman Honor Institutions are chosen on the basis of a college or university's encouragement of outstanding young people to pursue careers in public services; effective promotion of the Truman program on their campus; and sustained success in helping their students win Truman Scholarships.
Other Truman Honor Institutions include Brandeis, Brown, Columbia, Duke, Georgetown, Harvard, Princeton, and Yale universities, and the universities of North Carolina-Chapel Hill, Pennsylvania, and Virginia.
Associate Professor of Political Science Kenji Hayao was named BC coordinator for the Truman program in 2002, when he succeeded departmental colleague Associate Professor Jennie Purnell (the two swapped the position a few times, Hayao says, although both worked with students interested in the Truman). In addition to the nine students who have earned scholarships since then, Hayao notes that BC has averaged two finalists a year for Trumans.
Approximately 55 to 60 Trumans are awarded nationwide each year, compared to the Rhodes (32) and Marshalls (about 40), says Hayao. Natalee Deaette, this year's BC winner, was one of 59 winners chosen out of a pool of 756 candidates.
Applying for any competitive fellowship or grant takes effort and commitment, but the Truman application requires more work than just about any scholarship, according to Hayao: Students not only have to list their relevant activities and accomplishments, but also describe their desired entry position after graduate school, and how they see their career unfolding five years and more beyond that. In addition, applicants must write a policy proposal related to their particular area of interest.
To recruit potential Truman candidates, Hayao keeps in touch with faculty members, particularly from political ccience, international studies and sociology—and undergraduate deans, as well as the Gabelli Presidential Scholars Program. He usually contacts 50 to as many as 75 students individually about the Truman, and follows up with a few dozen for further discussion; typically, eight to 12 students end up applying.
"When they start work on the application, most students don't have clear ideas about what they hope to do for a career yet," Hayao says. "I give them advice about how to think about this. For example, I encourage them to research the people in the real world who are making an impact in the areas they are interested in. I also give them suggestions about how to shape their policy proposals. Generally, each student will go through multiple drafts for each of the essays."
Hayao also confers with persons writing letters of recommendation for BC applicants, since the letters often play an important complementary role by providing greater depth and detail about students' activities.
However demanding the application process, Trumans have a value that goes beyond the up to $30,000 they provide for graduate school, he says.
"Many students can also leverage the award to get more funding at a number of grad schools. Just as important, the Truman provides access to its network of Truman Scholar alumni, who are involved in all aspects of public service: government, politics, education, NGOs, academia."
Vice Provost for Undergraduate Academic Affairs Akua Sarr and other colleagues hail the achievements of BC's Truman Scholars, and laud Hayao's role in the program.
"Our success with the Truman Scholarship'is very much a result of Kenji's leadership and commitment," she says. "I'm grateful for Kenji's many years of generous support of our Truman applicants."
As for Hayao, after 16 years, he is quick to cite the best thing about being the Truman coordinator: "Meeting and working with some truly amazing students and helping them think more clearly about their potential careers in public service." | 2023-08-16T01:27:17.568517 | https://example.com/article/6247 |
Q:
Accessing network shares in Reflected method calls
We have a method that accesses a network share. This method works fine when called directly, but we get a System.IO.IOException when it is called via reflecton. It appear that the user context is not available to the reflected code (see stack trace below). Is there a way to prevent this?
System.Reflection.TargetInvocationException: Exception has been thrown by
the target of an invocation. ---> System.IO.IOException: Logon failure:
unknown user name or bad password.
at System.IO.__Error.WinIOError(Int32 errorCode, String maybeFullPath)
at System.IO.Directory.InternalGetFileDirectoryNames(String path,
String userPathOriginal, String searchPattern, Boolean includeFiles,
Boolean includeDirs, SearchOption searchOption)
at System.IO.Directory.GetDirectories(String path, String searchPattern,
SearchOption searchOption)
this works
Library.Class obj =new Library.Class();
obj.Execute(serverPath);
this does not work
Assembly assembly = Assembly.LoadFile(@"pathTo\Library.dll");
Type type = assembly.GetType("Library.Class");
MethodInfo executeMethod = type.GetMethod("Execute");
object classInstance = Activator.CreateInstance(type, null);
object[] parameterArray = new object[] { serverPath};
executeMethod.Invoke(classInstance, parameterArray);
Where Library.Class.execute is defined as
public void Execute(string serverPath){
string[] directories = Directory.GetDirectories(serverPath,
"1.*", SearchOption.TopDirectoryOnly);
foreach (var directory in directories) {
Console.WriteLine(directory);
}
}
and serverPath is a network share that required the user enter credentials.
-----Update 1-------
This appears to be somewhat environmental--I have at least one test machine where everything works. I'll be doing some more testing to determine what differences matter.
A:
This appears to have been some sort of fluke environmental issue. We have not been able to reproduce the problem since the test machine was restarted.
| 2024-06-09T01:27:17.568517 | https://example.com/article/8683 |
Topical treatment of onychomycosis.
Onychomycosis continues to be one of the more common foot problems encountered by podiatrists. Although a reliable cure is elusive, this article reviews several new agents that show some promise. | 2024-02-25T01:27:17.568517 | https://example.com/article/6425 |
// Copyright (c) 2014 Baidu.com, Inc. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef _SOFA_PBRPC_RPC_BYTE_STREAM_H_
#define _SOFA_PBRPC_RPC_BYTE_STREAM_H_
#include <cstdio> // for snprintf()
#include <cstring> // for memset()
#include <boost/asio.hpp>
#include <boost/bind.hpp>
#include <boost/date_time/posix_time/posix_time_types.hpp>
#include <sofa/pbrpc/common_internal.h>
#include <sofa/pbrpc/rpc_endpoint.h>
#include <sofa/pbrpc/tran_buf_pool.h>
// If SOFA_PBRPC_TCP_NO_DELAY == true, means disable the Nagle algorithm.
//
// Nagle algorithm may cause an extra delay in some cases, because if
// the data in a single write spans 2n packets, the last packet will be
// withheld, waiting for the ACK for the previous packet. For more, please
// refer to <https://en.wikipedia.org/wiki/Nagle's_algorithm>.
//
// Disabling the Nagle algorithm would cause these affacts:
// * decrease delay time (positive affact)
// * decrease the qps (negative affact)
namespace sofa {
namespace pbrpc {
using boost::asio::ip::tcp;
using namespace boost::asio;
class RpcByteStream : public sofa::pbrpc::enable_shared_from_this<RpcByteStream>
{
public:
RpcByteStream(IOService& io_service, const RpcEndpoint& endpoint)
: _io_service(io_service)
, _remote_endpoint(endpoint)
, _ticks(0)
, _last_rw_ticks(0)
, _no_delay(true)
, _read_buffer_base_block_factor(SOFA_PBRPC_TRAN_BUF_BLOCK_MAX_FACTOR)
, _write_buffer_base_block_factor(4)
, _timer(io_service)
, _socket(io_service)
, _connect_timeout(-1)
, _status(STATUS_INIT)
{
SOFA_PBRPC_INC_RESOURCE_COUNTER(RpcByteStream);
memset(_error_message, 0, sizeof(_error_message));
}
bool no_delay()
{
return _no_delay;
}
void set_no_delay(bool no_delay)
{
_no_delay = no_delay;
}
void set_read_buffer_base_block_factor(size_t factor)
{
_read_buffer_base_block_factor = factor;
}
size_t read_buffer_base_block_factor()
{
return _read_buffer_base_block_factor;
}
void set_write_buffer_base_block_factor(size_t factor)
{
_write_buffer_base_block_factor = factor;
}
size_t write_buffer_base_block_factor()
{
return _write_buffer_base_block_factor;
}
virtual ~RpcByteStream()
{
SOFA_PBRPC_FUNCTION_TRACE;
boost::system::error_code ec;
_socket.close(ec);
SOFA_PBRPC_DEC_RESOURCE_COUNTER(RpcByteStream);
}
// Close the channel.
void close(const std::string& reason)
{
// should run for only once
if (atomic_swap(&_status, (int)STATUS_CLOSED) != STATUS_CLOSED)
{
snprintf(_error_message, sizeof(_error_message), "%s", reason.c_str());
boost::system::error_code ec;
_socket.shutdown(tcp::socket::shutdown_both, ec);
on_closed();
if (_remote_endpoint != RpcEndpoint())
{
#if defined( LOG )
LOG(INFO) << "close(): connection closed: "
<< RpcEndpointToString(_remote_endpoint)
<< ": " << _error_message;
#else
SLOG(INFO, "close(): connection closed: %s: %s",
RpcEndpointToString(_remote_endpoint).c_str(), _error_message);
#endif
}
}
}
void on_connect_timeout(const boost::system::error_code& error)
{
if (_status != STATUS_CONNECTING)
{
return;
}
if (error == boost::asio::error::operation_aborted)
{
return;
}
close("connect timeout");
}
// Connect the channel. Used by client.
void async_connect()
{
SOFA_PBRPC_FUNCTION_TRACE;
_last_rw_ticks = _ticks;
_status = STATUS_CONNECTING;
_socket.async_connect(_remote_endpoint,
boost::bind(&RpcByteStream::on_connect, shared_from_this(), _1));
if (_connect_timeout > 0)
{
_timer.expires_from_now(boost::posix_time::milliseconds(_connect_timeout));
_timer.async_wait(boost::bind(&RpcByteStream::on_connect_timeout, shared_from_this(), _1));
}
}
// Update remote endpoint from socket. Used by server.
//
// Precondition:
// * the "socket" is opened.
void update_remote_endpoint()
{
SOFA_PBRPC_FUNCTION_TRACE;
boost::system::error_code ec;
_remote_endpoint = _socket.remote_endpoint(ec);
if (ec)
{
#if defined( LOG )
LOG(ERROR) << "update_remote_endpoint(): get remote endpoint failed: "
<< ec.message();
#else
SLOG(ERROR, "update_remote_endpoint(): get remote endpoint failed: %s",
ec.message().c_str());
#endif
close("init stream failed: " + ec.message());
}
}
// Set socket connected. Used by server.
//
// Precondition:
// * the "socket" is opened.
void set_socket_connected()
{
SOFA_PBRPC_FUNCTION_TRACE;
_last_rw_ticks = _ticks;
boost::system::error_code ec;
_socket.set_option(tcp::no_delay(_no_delay), ec);
if (ec)
{
#if defined( LOG )
LOG(ERROR) << "set_socket_connected(): set no_delay option failed: "
<< ec.message();
#else
SLOG(ERROR, "set_socket_connected(): set no_delay option failed: %s",
ec.message().c_str());
#endif
close("init stream failed: " + ec.message());
return;
}
_local_endpoint = _socket.local_endpoint(ec);
if (ec)
{
#if defined( LOG )
LOG(ERROR) << "set_socket_connected(): get local endpoint failed: "
<< ec.message();
#else
SLOG(ERROR, "set_socket_connected(): get local endpoint failed: %s",
ec.message().c_str());
#endif
close("init stream failed: " + ec.message());
return;
}
if (!on_connected())
{
#if defined( LOG )
LOG(ERROR) << "set_socket_connected(): call on_connected() failed";
#else
SLOG(ERROR, "set_socket_connected(): call on_connected() failed");
#endif
close("init stream failed: call on_connected() failed");
return;
}
_status = STATUS_CONNECTED;
trigger_receive();
trigger_send();
}
// Get the socket.
tcp::socket& socket()
{
return _socket;
}
// Get the local endpoint.
const RpcEndpoint& local_endpoint() const
{
return _local_endpoint;
}
// Get the remote endpoint.
const RpcEndpoint& remote_endpoint() const
{
return _remote_endpoint;
}
// Check if the channel is connecting.
bool is_connecting() const
{
return _status == STATUS_CONNECTING;
}
// Check if the channel is connected.
bool is_connected() const
{
return _status == STATUS_CONNECTED;
}
// Check if the channel is closed.
bool is_closed() const
{
return _status == STATUS_CLOSED;
}
// Reset current time ticks.
void reset_ticks(int64 ticks, bool update_last_rw_ticks)
{
_ticks = ticks;
if (update_last_rw_ticks)
{
_last_rw_ticks = ticks;
}
}
// Get the last time ticks for read or write.
int64 last_rw_ticks() const
{
return _last_rw_ticks;
}
void set_connect_timeout(int64 timeout)
{
_connect_timeout = timeout;
}
int64 connect_timeout()
{
return _connect_timeout;
}
// Trigger receiving operator.
// @return true if suceessfully triggered
virtual bool trigger_receive() = 0;
// Trigger sending operator.
// @return true if suceessfully triggered
virtual bool trigger_send() = 0;
protected:
// Async read some data from the stream.
void async_read_some(char* data, size_t size)
{
SOFA_PBRPC_FUNCTION_TRACE;
_socket.async_read_some(boost::asio::buffer(data, size),
boost::bind(&RpcByteStream::on_read_some,
shared_from_this(), _1, _2));
}
// Async write some data to the stream.
void async_write_some(const char* data, size_t size)
{
SOFA_PBRPC_FUNCTION_TRACE;
_socket.async_write_some(boost::asio::buffer(data, size),
boost::bind(&RpcByteStream::on_write_some,
shared_from_this(), _1, _2));
}
// Hook function when connected.
// @return false if some error occured.
virtual bool on_connected() = 0;
// Hook function when closed.
virtual void on_closed() = 0;
// Callback of "async_read_some()".
virtual void on_read_some(
const boost::system::error_code& error,
std::size_t bytes_transferred) = 0;
// Callback of "async_write_some()".
virtual void on_write_some(
const boost::system::error_code& error,
std::size_t bytes_transferred) = 0;
private:
// Callback of "async_connect()".
void on_connect(const boost::system::error_code& error)
{
SOFA_PBRPC_FUNCTION_TRACE;
//Maybe already timeout
if (_status != STATUS_CONNECTING)
{
return;
}
if (error)
{
// TODO retry connect?
#if defined( LOG )
LOG(ERROR) << "on_connect(): connect error: "
<< RpcEndpointToString(_remote_endpoint) << ": " << error.message();
#else
SLOG(ERROR, "on_connect(): connect error: %s: %s",
RpcEndpointToString(_remote_endpoint).c_str(),
error.message().c_str());
#endif
close("init stream failed: " + error.message());
return;
}
boost::system::error_code ec;
_socket.set_option(tcp::no_delay(_no_delay), ec);
if (ec)
{
#if defined( LOG )
LOG(ERROR) << "on_connect(): set no_delay option failed: "
<< ec.message();
#else
SLOG(ERROR, "on_connect(): set no_delay option failed: %s",
ec.message().c_str());
#endif
close("init stream failed: " + ec.message());
return;
}
_local_endpoint = _socket.local_endpoint(ec);
if (ec)
{
#if defined( LOG )
LOG(ERROR) << "on_connect(): get local endpoint failed: "
<< ec.message();
#else
SLOG(ERROR, "on_connect(): get local endpoint failed: %s",
ec.message().c_str());
#endif
close("init stream failed: " + ec.message());
return;
}
if (!on_connected())
{
#if defined( LOG )
LOG(ERROR) << "on_connect(): call on_connected() failed";
#else
SLOG(ERROR, "on_connect(): call on_connected() failed");
#endif
close("init stream failed: call on_connected() failed");
return;
}
#if defined( LOG )
LOG(INFO) << "on_connect(): connection established: "
<< RpcEndpointToString(_remote_endpoint);
#else
SLOG(INFO, "on_connect(): connection established: %s",
RpcEndpointToString(_remote_endpoint).c_str());
#endif
_status = STATUS_CONNECTED;
_timer.cancel();
trigger_receive();
trigger_send();
}
protected:
IOService& _io_service;
RpcEndpoint _local_endpoint;
RpcEndpoint _remote_endpoint;
char _error_message[128];
volatile int64 _ticks;
volatile int64 _last_rw_ticks;
bool _no_delay;
size_t _read_buffer_base_block_factor;
size_t _write_buffer_base_block_factor;
private:
deadline_timer _timer;
tcp::socket _socket;
int64 _connect_timeout;
enum {
STATUS_INIT = 0,
STATUS_CONNECTING = 1,
STATUS_CONNECTED = 2,
STATUS_CLOSED = 3,
};
volatile int _status;
}; // class RpcByteStream
} // namespace pbrpc
} // namespace sofa
#endif // _SOFA_PBRPC_RPC_BYTE_STREAM_H_
/* vim: set ts=4 sw=4 sts=4 tw=100 */
| 2024-04-08T01:27:17.568517 | https://example.com/article/7163 |
package com.vladsch.flexmark.ext.xwiki.macros.internal;
import com.vladsch.flexmark.ext.xwiki.macros.MacroExtension;
import com.vladsch.flexmark.util.data.DataHolder;
class MacroOptions {
final public boolean enableInlineMacros;
final public boolean enableBlockMacros;
final public boolean enableRendering;
public MacroOptions(DataHolder options) {
enableInlineMacros = MacroExtension.ENABLE_INLINE_MACROS.get(options);
enableBlockMacros = MacroExtension.ENABLE_BLOCK_MACROS.get(options);
enableRendering = MacroExtension.ENABLE_RENDERING.get(options);
}
}
| 2024-01-01T01:27:17.568517 | https://example.com/article/2945 |
Dr. Emily's Fit Tip of the Week: How to Reduce Muscle Soreness
Whether you just finished a session with your personal trainer or took one of the many high intensity classes at Lucille Roberts, even the most avid gym-goer has experienced muscle soreness. Although there are many factors which contribute to muscle soreness, one of the most important is the formation of lactic acid in the muscles.
The good news is that you can help your body clear more of this lactic acid and thus reduce the soreness in your muscles by adding just a few minutes of core exercises to the end of your workout. When we work out, our body relies on one of two energy systems to provide our muscles with the power to contract. These systems are either the aerobic (oxygen-requiring) or anaerobic (non-oxygen-requiring) energy systems. The anaerobic energy system offers a rapid release of energy lasting approximately 2 minutes in duration. However, this burst of energy is limited by the formation of lactic acid (lactate). While a majority of the lactic acid formed in our tissues is cleared by our body through muscle metabolic pathways, the lactic acid that remains is a primary contributor to muscle soreness.
Forearm Plank
Studies have shown that performing core stabilization exercises after intense bouts of exercise can decrease lactate levels by as much as 22%! A 2007 study (by Navalta et. al) found that performing core stabilization exercises–including side plank, cobra, and prone plank–was more effective at reducing lactate levels when compared to just resting after a hard workout. Based on this finding, incorporating core stability exercises during your cool-down period offers a new technique for clearing lactic acid from the body. In other words, by adding these exercises to the end of your workout, you may feel less muscle soreness later on!
So, at the end of your next intense workout, try to incorporate a series of forearm planks, side planks, and pushup planks. (If you have questions about how to perform these moves properly, ask one of our certified personal trainers.) Let us know whether this helps reduce your post-workout soreness! | 2024-02-04T01:27:17.568517 | https://example.com/article/2938 |
1. Field of the Invention
The present invention relates to the novel use of stilbene compounds to effectively potentiate natural epizootic viral infections of insects as a means of insect control.
2. Description of the Related Art
Although several commercial formulations of entomopathogens (e.g., viruses and bacteria) have been available for many years, their use in agricultural and forestry pest management programs has been rather limited. In general, efficacy of currently available formulations of entomopathogens against pestiferous insects has been considered inadequate due to (1) length of time required to subdue the pest (i.e., unacceptable level of crop-damage may occur before the pest succumbs to factors associated with pathogenic infection) and (2) short residual effectiveness against pest infestation (e.g., stability of entomopathogenic viruses is adversely affected by exposure to ultraviolet solar radiation; Jaques, Can. J. Microbiol., 14: 1161-1163 (1968)).
Doan et al. (J. Insect Pathol., 6: 423-429 (1984)) suggested that greater insect control could occur with the use of viruses if the formulation could be enhanced by the addition of certain adjuvants. Potential virus adjuvants included selected analogs or salts of the stilbene compound, 4,4'-diamino-2,2'-stilbene disulfonic acid. Two such analogs are Calcofluor White and Phorwite (Shapiro et al., published U.S. patent application (USDA), Ser. No. 07/609,848, filed Nov. 7, 1990). Results from several laboratory studies reported by Shapiro et al. demonstrated that Calcofluor White M2R potentiated (as much as 1000-fold) the virulence of the nuclear polyhedrosis virus (NPV) against the gypsy moth larvae, Lymantria dispar (as determined by enhanced LT.sub.50 and LD.sub.50 values). Shapiro et al., however, made no claims or suggestions regarding the use of stilbene compounds as enhancers of temperate or virulent indigenous viruses. In fact, the stilbene compounds employed alone in the bioassays which are reported in the literature caused no gypsy moth mortality. There have been no reports of insect mortality from the application of the stilbene compounds alone.
Although the mode-of-action pertaining to the stilbene's ability to potentiate the virulence of a virus against an insect is still speculative, there are reports in the literature regarding the biological properties of stilbene compounds. Stilbenes, and at least some of their photoproducts, have been shown to irreversibly bind to proteins in wool, silk, bovine serum albumin and apomyoglobin (Holt et al., Aust. J. Biol. Sci., 27: 23-29 and 195 (1974)). It has been demonstrated that certain stilbene compounds can inhibit cellulose and chitin microfibril formation (Roberts et al., J. Cell Biology, 9: 115a (1981); Herth, J. Cell Biology, 87: 442-450 (1980)). The stilbene, Calcofluor White, prevented formation of cellulose microfibrils in Acetobacter xylinum by hydrogen bonding with glucan chains (Haigler et al., Science, 210: 903-906 (1980)) and inhibited chitin synthetase activity in Neurospora crassa (Selitrennikoff, Exp. Mycol., 8: 269-272 (1984)). Shapiro et al. found that another stilbene compound, Phorwite AR, synergized a cytoplasmic polyhedrosis virus (CPV) against gypsy moth larvae. Since CPV multiplies only in the midgut epithelial cells, it has been suggested that the site of action of the brightener was the insect's midgut (Dougherty et al., "Mode of Action of Fluorescent Brighteners as Enhancers for the Lymantria Dispar Nuclear Polyhedrosis Virus (Ld NPV) in the Gypsy Moth," oral presentation, Am. Society for Virology, Colorado State University, Fort Collins, Colo., Jul. 9, 1991). With the exception of some fluid-feeding species, many insects possess a midgut which is lined with peritrophic membrane, which in turn, is comprised of chitin and protein (Chapman, The Insects Structure and Function, p. 46 (Elsevier, N.Y. 1971)).
It is well known in the art that baculoviruses are abundant in the environment and most of them are existing at very low levels of infection or in an inactive state. For example, a study examining the prevalence of nuclear polyhedrosis viruses (Trichoplusia ni (Hubner)) on cabbage revealed that a typical coleslaw serving could contain approximately 10.sup.10 polyhedra per serving. Yet, consumers and insects eat this raw cabbage without undue mortality or disease. Similarly, the gypsy moth nuclear polyhedrosis virus does not appear to be highly and reliably virulent when present in the environment. But applied at high concentrations, the gypsy moth NPV becomes deadly to the insect. Prior entomopathogens with or without the concomitant use of stilbene compounds have focused on applying large lethal concentrations of such viruses to target insects. Therefore, it would be very useful for more effective and safe insect control if the virulence of indigenous insect viruses which are found in nature at cryptic and/or low levels of infection could be potentiated. Furthermore, as a consequence of the instability associated with the prior entomopathogenic viruses in practical use, it is highly desirable to find an inexpensive means for enhancing the latent virulence of the ubiquitous, indigenous insect viruses and inducing epizootic viral infections to effectively control insects. | 2024-02-15T01:27:17.568517 | https://example.com/article/2168 |
Tree planting bill from Teas Nursery for Rice Institute
Date
1915-03-31
Description
A tree-planting bill of sales from Teas Nursery for William M. Rice Institute. The paper is initialed by William M. Rice Institute President, Edgar Odell Lovett and dated "Approved" on 5 April 1915. The letter was typed on March 31, 1915. | 2024-04-21T01:27:17.568517 | https://example.com/article/3492 |
"His name is really Mikael, buthe's called 'Mouse'." "He's so cute." "Is that Mouse in the middle?" " Yes, that's Jens and Sebbe." "Can you believe we start high school tomorrow?" "It's like we're adults now!" "We get to go to parties, have boyfriends and stuff." "You think they want to be with someone in 7th grade?" "Don't be so negative!" "We just have to get to know them" "How?" "I don't know, but it'll be all right." "It'll be great!" "Right?" "THE KETCHUP EFFECT" "Come on!" "Are you nervous?" "I was really nervous when I started high school." "I went to a new school just like you, and I didn't know anyone there, so I was really scared that.. no one would like me..." " Drop it!" "I'm not nervous!" "If I see you in school, I'll pretend I don' tknow you..." "Okay, good luck." " Thanks..." "Ow, what are you doing?" " For luck!" "You're fucking mental!" " Just a joke, Sofie." "Very funny, my jeans are dirty!" "Really funny!" "They're not dirty at all." "Bye kid, have a good day." "Hey babe!" " Hi cuties!" "Hi..." " Hi." "Where are we going?" "...party time.." " Where was that?" "In Amsterdam..." "We're going that way." "Hi Mouse!" "Nice to see you." " Ditto." "How's it going?" "Damn!" "Beatrice knows them?" "Do you know her?" " No." "Same kindergarten." "She thinks she's so hot." "Nice clothes, anyway," "Her blouse looks like shit." "Please sit down." "Hi everyone!" "My name's Åsa and I'm your class supervisor." "I'm also your teacher in Swedish, social studies and history." "I graduated as a teacher last spring, so I was a student too" "So, I know what it's like, you know..." "Later, I'll tell you more about high school, but now I want to do roll call." "So when I say your name, just say yes..." "Yeah..." " Let's get started..." "Erik Andersson?" " Yes..." "Beatrice Dahlin?" " Yes." "Hi..." "Muhammed Fahid?" " Yeah." "Sofie Hagström?" " Yes." "Aha, you must be Krister's daughter!" "Your papa and I are colleagues and I've promised to tell him if you are behaving!" "Predrag Ilvanovic?" "...so embarrassing!" ""Aha, you must be Krister's daughter..."" "I twasn't that bad." " Yes it was.." "Fucking bitch." "That looks like a heart." "Ah, maybe a little." "Don't look!" "It's them!" " Hi... a kebab... and a cola." "Don't look!" " Just be normal!" "Can't we leave?" " Leave?" "We can't leave now!" "The ketchup makes a heart, and they walk in!" "It must be fate!" "What are we supposed to do?" "You don't dare talk to them." "What if I walk over?" "You're nuts!" "Just sit down!" "What's wrong with real food?" " It's really good." ""Lasagne alley forno" well... um..." "like..." "Well, we're out of ketchup, can we borrow yours?" "It's right there" "Thanks." " Wait..." "You have something there" "Where?" " There!" "Never mind." "I thought something was sticking out..." "What?" " Nothing..." "Wait...!" "You want to go to a party?" "It's gonna be so much fun!" " Yeah!" "Want me to talk to them?" " No, no need." "You never get do anything!" "It's really unfair!" "I'll call and talk to them!" "Please don't!" "You'll just make it worse!" "I don't feel like going..." "I'm tired." "Shit, he's coming!" " Shit!" "Sofie...?" "We're in here." "We're going to a friend's later!" "Okay... cheers!" "Oh, it's disgusting!" " Let me try!" "Good god!" "Try it.." " God, it's disgusting!" "Alcohol has to be disgusting." "That's why you get drunk..." "Or why you get sick..." "Okay, who's the cutest?" "Mouse, Jens or Sebbe?" "Who knows..." " If you had to pick, who you want to make outwith tonight?" "Who'd you pick?" "No one wants to make outwith me." "I'm so ugly." "Stop saying that!" " You're really pretty!" "it'll be really fun, I promise!" "imagine if Mouse and I start going out, you go out with Jens, and you with Sebbe." "Then we can go out together on dates!" "Won't that be great!" "?" "What's 'clitoris'?" "What?" " "He parted her lily white legs and let his fingers caress her... clitoris..."" "Give me that..." ""Jack's jeans revealed his hard limb." "Oh Jack, she whispered, take me right now!" "His rough hands covered Val's pert breasts as she opened his fly with her lips..."" "She opened it with her lips?" " She's tied up." "Why's that?" " She's been kidnapped!" ""She wrapped her lips around his hard limb."" ""He entered her quivering body, and they melted together"" ""Oh Jack Your limb is so hard"" " Oh Jack" "Oh Mouse!" "Take me right now!" "Who invited you?" "Ah..." "Mouse" "You know Mouse?" "Yeah, so?" "Can't we just leave?" "Okay." "Check out that guy!" "He's shit-faced!" "I'll fix you up with a chick, Sebbe..." "You're such a fag!" "You know what you need?" "Areal blow-job!" "Well, this guy needs a beer in the kitchen!" "Give this guy a beer!" "You're so damn drunk..." "Look, there's the catchup girl!" "Maybe she'll give what you need..." "Hey you!" "Me?" " Yeah you!" "This guy's gay..." " Shut up..!" "You think you can cure him?" "Sorry!" "Hi...!" " Hi..." "Can we go now?" " No!" "Damn it!" "That tickles!" " Sorry..." "You think you might..." "give me a blow-job?" "Um... no..." "I don't think so." " Sebbel Sebbel Sebbel" "What about a hand job then?" "I don't know.." "How do you do it?" "Well... you..." "You hold it..." "And..." "Imagine you're holding a bottle of ketchup.." " and you want to get the ketchup out." "A bottle of ketchup..?" "Okay..." "Ah..." "Damn!" "Look Sebbe!" "You girlfriend!" " She's not my girlfriend..." "She's totally spaced out..." "Hey, you..." " Tickle, tickle!" "She's totally gone..." "Toot, toot!" "Hey, wake up..." " We should call an ambulance." "An ambulance...?" "I'll play doctor instead!" "Hey you..." "Wake up!" " Check out Doctor Mouse..." "Hey, take a picture...!" "Help me!" "Take another one." "Come on...!" "Smile a little...!" "Hey, lift up her skirt!" "Come on, stop it now!" " Shut up!" "I've got an idea..." "What the fuck are you doing?" " Shut up you fucking fag!" "We're having fun!" "This is a laugh!" "Take pictures!" "Take one under her dress..." "Damn ugly!" "Take more..." "You have to leave now!" "The party's over." "Here, let me help you up." "Where the hell have you been!" "?" " At a party..." "I didn't mean to." "I fell asleep..." " This is crazy!" "It's 5:30 in the morning!" " Yeah but..." "I'm really tired.." "You're tired?" "I've been up all night waiting for you!" "I've called every damn friend you have, and their parents." "How do you think I feel?" " I didn't mean to!" "This is crazy!" "Anything might have happened to you, Sofie!" "You're dressed up like a whore!" "I hate you!" "You'll have to pay for that!" "You'll pay every damned cent!" "Hello..." "Sorry." "I didn't mean to." "I just fell asleep." "Sorry I overreacted..." "And said those things." "I was just so worried." "Nothing happened last night, did it?" "Good..." "My girl..." "Check that out..." " Oh, good god..." "She's totally gone..." "What an idiot." "Sebbe, check this out!" " No thanks." "You're such a fag, Sebbe!" " Shut up!" "Hey, easy!" "What a loser." "Wonder how many fucked her..." "She's like the worst whore ever!" "I've had her in every hole" "I fucked her on the school toilet this morning, in the ass." "No, is that right..?" " She'll do anything." "And she gave Sebbe a blow-job at the party!" "Right, Sebbe?" "Where'd you go Saturday?" " I went home." "You might have told me." "Ah..." "Well..." "We've..." "Seen some pictures of you!" "...so we have EU, EEC, and EMU, which I put in parentheses..." "I want you to learn these by next Thursday." "Hello, class is over!" " No, we have five minutes." "But listen, now for something different." "Someone in class has a birthday today.." "Sofie turns thirteen!" "Isn't that right, Sofie!" "I thought we'd all stand and sing for her!" ""Happy Birthday to her, happy birthday to her" "Happy Birthday dear Sofie..." "Happy Birthday to her"" "Let's cheer 4 times for Sofie:" "Hip, hip hurrah!" "Hurrah!" "Whore!" "Whore!" " Happy birthday, Sofie!" "SOFIE IS AWHORE!" "What's that?" " Nothing!" "Tell us!" "What is that?" " Nothing, I said!" "Are you deaf?" "...whore..." ""Happy Birthday to her, happy birthday to her."" "Congratulations!" " Thanks..." "Dad..." "I thought we stopped that" "Thanks." "Are Emma and Amanda coming?" "Ah..." "They might come later." " Did you have a fight?" "No." "Well, I don't know.." "I'll bet that's them." "Mouse is disgusting, everyone knows that." "I don't know if it was him." "I can't remember anything..." "I was with Sebbe, then..." " What?" "You were with Sebbe?" "Yeah, or no." "Everything went totally wrong Forge tit" "What if they show them to dad." "He'll..." "He'll hate me..." "Mouse did it..." "and a couple of others" "What?" "How do you know that?" "Well, I thought you had fun It looked like it, anyway." "Thanks a lot!" "it'll be alright." "How?" "SOFIE IS THE BEST!" "How's Sofie doing?" "She's behaving?" "She's doing great!" " Good..." "Otherwise I thought we could..." "get together and talk about it" "If you want to, I mean." " Thanks, that's really nice" "But there's no need, she's fine." " Oh." "You can't just break his lock." " Why not?" "You don't even know if the pictures are in there." "Hey..." "we're going to be late..." "Please!" "What's that?" "No... no it's nothing." "Hi." "Welcome!" "Do you want to talk?" " No... ah..." "I just wanted to..." "Ah, what's it called..." "There's this girl..." "Ah..." "Who, like..." "Sit down." "Well, it's really nothing.." "Bye." "Our summer house is here..." " Our house near there!" "Really close!" "We have a yellow house with, like, white trim..." "I've seen it from the boat..." " We'll meet this summer then we have page 80 here, in parenthesis too..." "How's it going?" " Fine." "Did you find anything?" "No..." "You go to model school, right?" " You learn different make-ups and how to walk." "You can come if you want..." "You learn how to walk?" " Yes." "On a catwalk." "A catwalk?" "What the hell is that?" "What models walk on, at a fashion show." ""Cat-walk"?" "That sounds so stupid!" "That's what it's called!" " Totally stupid!" "Come on!" "Let's go a different way.." " Oh, come on!" "Can I fuck you between your boobs?" "Idiot!" "Get off me!" "You creep!" "Don't touch me!" "Stop it!" "Stupid idiot!" " Shut up!" "Stop!" "Today, you can be creative and write your own poems..." "Hi Sofie!" "Well, right, sometimes it's good to read the great poets.." ""It hurts when buds burst, why would spring hesitate." "Why is our burning desire bound to the frozen winter.."" "You're close friends, or what?" " Yes..." "No." "Or... why?" " Lots of rumors about her" "Like she's a whore and things" "Everyone's talking about her.." "It's for your own good." "If you get a reputation now, you'll never lose it." "We have to go here for 3 more years, you know." "Hurry up!" "Wait up!" "Are you taking French?" " Yes." "Have you seen Amanda?" " They left" "They?" "Hi." " Hi." "You know..." "that thing at... at the party...?" "What?" " Wait!" "Shit!" " Let's go!" "What?" " Please?" "Okay!" "So..." "Where are you going?" "To town... or... where're you going?" "Me and Amanda are going to model school." "The two of us" "Oh." "Well..." "I just.." "Don't let Mouse bother you." "He's really disturbed." "Why do you hang with him?" "I don't know We... we've hung out ever since kindergarten." "We had fun I don't know who I'd hang outwith, otherwise..." "Everyone hates me." "What?" " That's what it feels like." "It's totally insane" "You want a drink?" "Lemonade..." "ah... or..." "I mean cola?" "No thanks." "I don't know why I said lemonade..." "Maybe 'cause when I have friends over, mom always asks..." ""Do you want some lemonade?" I meant cola..." "But you don't want any...?" "Good... stay on the catwalk, if this were real, you'd fall off." "No marching:" "light and supple." "Happy faces.." "Good, stop there." "Work your hips, remember that." "What's this?" "Oh that...?" "That's nothing." ""Time to wake up, and hit back, raise up your hand"" "Is this a poem?" " No, lyrics to a song." "Timbuktu." "It looks like a poem." "No!" "We had this assignment to bring a poem." "I didn't find one." "So, I took those lyrics instead." " Oh." "It's not a poem!" "I can play the song for you if you want." ""Kids are feeling that after the politicians failed all that remains are tombstones or cobblestones against the constable's duty weapon..."" "The beginning is a little..." "I don't know.." ""Media Sweden backs from the lead to entertainment rabble..." "The whole bunch sits in the same boat with their fat necks." "The people are stuck in the middle..." "Cops shooting kids, and then.."" " It's like... a good message..." ""...me and Jason will do it, we'll sing this song..." "Life must have its way in a state of emergency" "Time to wake up..." "And hit back Raise up your hand" "And take to the streets as high as you can and take it back..."" "Did it hurt?" " Huh?" "No..." "I mean yeah, but it doesn't really matter, I was so drunk." "Yeah, me too..." "I hardly remember anything." "Me neither." "Know what happens Friday?" " No..." "Jens is having a party!" "It's actually him and Mouse." "Do you want to come?" " My parents won't letme..." "Like all the hunks from 9th will be there!" "I can ask..." "It'll probably be better if Sofie's not coming." "Is it true she was lying with her legs open and let everyone... touch her?" " I don't know.." "I wasn't there." "I mean, how can you be friends, she's the worst slut ever and you're totally..." "Normal?" "You know she has like..." "porno books at home!" "No?" " Yeah, she reads them... - ...and fantasizes, about sex." " Oh, grosse!" "God!" "You see who that was?" "!" " No." "Larssa from "Big Brother"!" "Have you done that step..." "when you spin like this...?" "No." "Well, maybe you haven't come that far.." "Where the hell were you yesterday?" "I waited for like forever, but you took so long so I went without you." "My cell phone was dead too.." "My god, I'm so fat!" " Holding in your stomach?" "I am not!" " Yes you are!" "Relax and we'll see!" "I am relaxed!" " Didn't look like it just now!" "Why are you looking at me so much?" "Are you a dyke?" "Are you still in kindergarten, or what?" "Anyone would think so!" "What's that?" "Well, maybe you can tell me what this is all about." "They were in my box today." "It says it's you Sofie..." "But with those panties on the head, it could be anyone." "It's not you, Sofie?" "Huh?" "This is insane!" "You're only 13, Sofie!" "Did you agree to this?" "What the hell are they doing?" "They're up under your skirt!" "What have you done, Sofie?" " Stop!" "Shut up!" "Dad saw the pictures" "Someone put them in his box." "Was he mad?" "Not really He was more like shocked..." "and disappointed" "I know what you mean." "I hate it when Mama says, " ""Sebastian, I'm very disappointed in you..."" "Hey, what's it called..." "What you said before about everyone hates you." "Well, I want you to know..." "I... don't." "What?" " Ah... you go first." "No." "Tell me!" "I'd better go now." "What were you going to say?" " Oh, it's nothing." "Where's you mother?" " She ran off when I Iwas 8." "To Paris." "With..." "Serge somebody." "That's tough!" "Or what ever you say..." "Don't worry about it I can barely remember her." "My father lives in Södertälje..." "Not the most interesting news in the world..." "You have very... cute ears." "Sorry... that's the strangest compliment ever given me." "What do people usually say?" " I don't know.."Nice boobs..."" "They are actually pretty nice, too..." "What are?" " I mean, your boobs..." "Fucking pervert!" "You're just like them." "You make good friends!" "But lwas just... wait..." "I was just joking!" "Hello!" "It was a joke!" "HOWTO COMMUNICATE WITH YOURTEENAGER" "Hi... how are you?" " Don't know.." "Fine." "How about you?" "Well, it's just that.." "Feels like we're drifting apart..." "I want us to be friends." "Me too." "Can I see you tomorrow?" "Go to a movie or something!" "Tomorrow?" "I don't know.." "Maybe lwas going to.." "Listen..." "Do you think it's my fault?" "What?" "You know..." "I have to go now..." "Okay..." "Sofie..." "We have to try and... communicate." "And... work this out." "I told you, I fell asleep." "I don't know what happened." "No..." "Of course not." "But there are a few things that are..." "If you want it to get better, maybe you should change some things..." "You should think more about..." "For instance... how you dress." "What do you mean by that?" "Like that top.." "have you thought about what kind of signals you're putting out?" "You don't have to change it, just put a shirt on over it." "That'd look real cool, I think." "Oh, come on, Sofie!" "Well, don't blame me!" "Aren't you freezing?" " What, are you my dad now?" "Let's talk about the party!" " What party?" "Can I sit here?" "It's a free country, you can sit where the fuck you like!" "What was that?" " Huh?" "Excuse me?" "Ow!" "What the hell!" "Fuck!" "Damn you!" "What the hell are you doing, you idiot!" "I hate you!" " Fucking whore!" "Let me go..." "I hate you!" "You creep!" "Fucking idiot!" "I hate you!" "Totally out of her mind." " She hit me!" "Sit still!" " Yeah, I'm sitting still." "She should go to a special school or something." "Yeah..." "She really is too much." " Talking about Sofie?" "She's totally mental..!" "What was that party you talked about?" "Didn't I tell you?" " No..." "There's a party at Jens." "You know..." "Guys that age, aren't as mature as you girls." "Maybe they don't know how to make contact..." "And you're growing into a very beautiful woman." "So I think that Mikael, or "Mouse"was just trying to flirt with you, because he thinks you're pretty." "What?" "He grabs my pussy." "And I should be grateful, or what?" "No... it was clumsy of him to touch your... private parts." "But he did it because he thinks you're cute!" "Maybe you could take it as a compliment." "Yeah, like if I grabbed your tits, you'd be really happy!" "That's not what I meant..." " What did you mean then?" "Are you happy now!" "?" " But Sofie..." "Stop!" "What are you doing?" " I'm giving you a compliment!" "Fucking bitch!" ""Oh, Jack!"" "Excuse me?" " Nothing." "We're meeting Emma now." " We don't have time." "We have to go straight over." " But..." "I mean, I don't want her to go with She embarrassing." "She's a fatso!" "Her clothes are too small, she thinks she's slim." "If she goes with us, they'll think we're fatsos too." "What the hell have you done?" "How could you?" "You apologize to Åsa!" "That's my job and my colleagues!" "Forge tit!" "She should apologize!" "What's wrong with you?" "!" "They're my colleagues!" "Don't you know how she feels?" "You've hurt her, violated her!" " So!" "She's worked 3 weeks, she wants to quit!" "Thanks to you!" "Great, we'll get rid of that fucking cunt!" "What the hell did you say?" "It's no wonder you don't have any friends, no fucking wonder!" "You're just like your damned mother!" "You ruin everything!" "I hate you!" "Did I ask to be born!" " No..." "Get out of here!" "I hate you!" "Get out!" "Why the hell is she here?" " Fuck do I know..." "We didn't invite her." " Just throw her out then" "She has no right to be here!" " I'm not throwing her out!" "She's mental, I might get rabies!" "There's punch if you want." "Why the hell did they turn off the music?" "Call an ambulance!" "How is she?" "Krister said she's going home tomorrow." "She has a concussion, but otherwise she's okay." "Look, I cut this!" " My god, why'd you do that?" "No one's cares anyway." " I'd care!" "You can't disappear!" "Promise me!" "Sofie... you have visitors." "Come in girls." "We just wanted to say..." "We've haven't been very good friends lately..." "I'm sorry." "We didn't mean to." "Sorry about everything." "If you want to, we can be friends again." "I didn't think you wanted to be friends with a whore like me." "Yes we do!" "No..." "I mean, we do, but we don't think you're a whore." "That's what I meant..." "We miss you." "You think you can bring some flowers and everything's okay?" "You such cowards!" "You can go to hell!" "What do you mean?" "She tried to kill herself?" "Yeah, she jumped out of the window Completely sick." "Those jeans are really cool!" " Thanks." "I got them for free when I did a modelling job." " But like.. why?" "I guess they liked the pictures." " No, I mean Sofie." "Oh." "She didn't really want to kill herself, or she'd jump in front of a train." "She just wanted say like "Oh poor me, blah, blah, like..." Just to get attention!" "Really ridiculous, don't you think?" "Yeah really!" "Almost as ridiculous as going to modelling school!" "Excuse me?" " Pay a fortune to learn to walk!" "Hello!" "On a catwalk!" "Know what?" "You're the most boring person ever!" "All you talk about is your own looks or spread false rumours!" "I'm so tired of you!" "Just sit there and go on with your interesting conversation!" "Exactly!" "Do you know how ugly you are, you fatso!" "?" "Maybe I am, but I wouldn't want to be like you, anyway!" "All you are is pretty!" "Take that away and you're nothing!" "You fucking retard!" "Let me?" " No, I want to..." "What happened?" " Just the answering machine." "Leave a message!" " Okay." "Sofie...?" "May I come in?" "It's a free country." "Do you remember your..." "Your first ever school day, when you decided to be a punker?" "You put Mama's nail polish in your hair, so it got all ratty..." "Then you regretted it and we had to cut of fall your hair." "You don't have to pretend to like me!" "I ruin everything anyway." "So I might as well just die." "How can you say that?" "That's what you said..." "That I ruin everything." "Did I?" "Sorry." "I don't know why I said that.." "I just feel so inadequate sometimes..." "But I'm trying..." "to be both mother and father" "I'm trying to do it all, and I try to talk to you too." "But you have to try and talk to me..." "You're the most important part of mylife..." "You are." "And you... you're funny..." "you're so smart..." "You're... special." "Special?" "Like I'm the worst deformity..." "What do you mean?" " Like I'm dead ugly..." "No!" "Well, maybe a little." "You're really pretty, but I don't know about that." "Of course you look good, just look at your father..." "You're not ugly.." "Have you thought about what to do about school?" "I'm never going back to that shit school." "Well, I can understand that" "I just think, you shouldn't let those idiots win" "They are the ones who should change schools." "Yeah but... everything's gone to hell since I started there.." "If you really want to change schools, we'll take care of it." "It'll work out." "Okay..." "Bye." " Bye." "You'll be all right?" " Sure..." "What was that?" " For luck." "Bye..." " Bye" "You have 19 new messages..." " Hi, it's Emma and Amanda." "We were like, at Burger King." " Let me tell her..." ""...everyone's always looking oh no..." "You can't even make them rock in time now..." "But we can maket hem sing so watch out..." "I just want to live life, nothing else... but your politics makes me so fucking mad, time to wake up" "And hit back raise up your hand" "And take to the streets As high as you can" "Time to wake up Time to fight" "Hit back Raise up your hand" "Take to the streets As high as you can" "Take it all back No pasaran..."" "Hi, how you feeling?" " Fine I guess." "Okay, see you in class..." "Hi" " Hi." "I just wanted to say you can keep those pictures." "What are you talking about?" " I don't care what you do." "You can wallpaper the school with them if you want." "Or use them to wack off." "That's the only sex you'll get!" "I don't think so!" " You violated me when lwas out!" "You must be really desperate..." "You can have the pictures!" "You're fucking ugly, anyway!" "You know I've fucked you in all every hole there is!" "Right!" "Now I remember!" "That was you with a dick this size!" "You don't know shit about my dick!" "Don't I?" "But I thought we fucked?" "Well..." "It's not easy to keep track of everyone you fucked." "Dream on..." " Ow!" "What the hell..." "It really is this size!" "You fucking whore!" "Back at you, dirtball!" "Fucking whore!" ""Fucking whore"?" "Is that all you can say?" "Get a fucking dictionary!" "What are you staring at!" "?" "Why the hell are you staring?" "Go to hell!" "You can all go to hell!" "Not you, damn it!" "Where the hell are you going?" "Shit!" "I can't believe we did that!" "Iwas shit-scared!" " What do you think lwas?" "Sofie!" "Well..." "I just wanted to say..." "I think I like you." "A lot." "Well... what if I don'tlike you?" " I understand if that's true..." "Everything went wrong." "Now you think I'm the kind who.." "But it's not true.." "I'm not what you think." "I don't really want to be with anyone right now.." "We don't have to be together." "We can be friends..." "We can get together and do things..." "We can like..." "We can eat food" "I'll cook dinner." "Maybe!" "Ah... we'll see you!" "What, are you interested in him?" "No." " You sure are!" "You want to.. see his dick!" " You're crazy!" "By the way, I've seen it." " What!" "?" "Tell me!" "Yeah, tell!" " No, it wasn't anything!" "Why didn't you say anything?" " Just forget it..." "Oh come on!" " Naw..." "Now you have to tell us..." " Yeah!" "Just tell us!" "Look!" "Come on!" "Come on!" " Yeah come on!" "It's really fun" "There!" "Enjoy the meal, or whatever..." " Thanks." "Well, I can cook other things too, difficult food.." "I didn't know what you liked..." " No, this is good." "I don't know, I thought everyone liked Italian food." "But was it good?" "Yeah, it was good..." "Yeah... cheers" " Cheers." "Mm." "I'm really hungry" | 2023-10-28T01:27:17.568517 | https://example.com/article/7755 |
Q:
MVVM problem - binding only certain values
I'm new to MVVM in silverlight. It's a bit confusing because although I get the general idea, there are so many different situations where the method is not very straight forward. Here's one of them:
I have a custom text box which when set to blank shows a grayed message 'enter your text here'. The problem is, when binding to my view model I do not want the text value on the backend to be 'enter your text here', but want it to be blank. But if the user inputs ANYthing, the 'enter your text here' goes away and the backend should contain whatever the user has input. So basically it seems like this is CONDITIONAL binding.
What is the best way to go about something like this?
Thanks!
A:
It's not a conditional binding it's a watermarktextbox this things can be implemented with attached behaviors and styles.
| 2023-12-27T01:27:17.568517 | https://example.com/article/5675 |
Objectives: To determine the differences in a proliferation-inducing ligand (APRIL) between seropositive and seronegative rheumatoid arthritis (RA) patients and further investigate the possible pathogenesis of the two subtypes of RA.
Results: The mean serum APRIL level of seropositive RA patients was significantly higher than that of seronegative patients (26.1 +/- 31.2 vs. 8.0 +/- 10.2 ng/mL, p = 0.03). The level of APRIL in the SF of seropositive RA patients was comparable to that of seronegative patients [47.9 +/- 54.4 vs. 32.82 (6.52-59.12) ng/mL, p > 0.05]. The SF APRIL level of RA patients was higher than that of patients with other inflammatory arthritis. Dramatically increased infiltration of APRIL-positive cells in the RA synovium was observed compared with the OA group (seropositive RA vs. OA, p < 0.001; seronegative RA vs. OA, p = 0.001). The infiltration of both plasma cells and macrophages was more in seropositive RA than in OA (p = 0.013 and p = 0.003, respectively).
Conclusions: The serum APRIL levels of seropositive RA patients are significantly higher than those of seronegative RA patients. APRIL may participate in the formation of seropositive RA. | 2024-02-29T01:27:17.568517 | https://example.com/article/5648 |
Ruby on Rails
Personal page open for public for sharing my ventures, obstacles and experience in case it helpz anyone(and ofcourse myself in future...)
I will be obliged if you rectify me wherever anyone think I goes wrong.
-a developing RoR developer...
Thursday, March 27, 2014
Most Ruby on Rails beginners get excited by the framework and
start crafting applications without any knowledge of the language. And
there’s nothing wrong about it. At least, unless those beginners persist
in such approach and become senior developers without any knowledge of the language.
Anyway, sooner or later, beginners or experienced programmers, we all
run into so-called Ruby Gotchas – those small subtleties that
hide from our sight for hours of hardcore debugging (logger.debug "*** #{object} ****") and then we go Ohh..That was that??! Really, this time I WILL read that book with a hammer on the cover! Or, rather, we go shit! and fall asleep.
Here is a list of popular Ruby gotchas and curiosities that
developers should be aware of. For each case, there’s an example of
confusing and/or error-prone code.
Some say: use and / or for flow control and && / || for boolean operations. I will say: don’t use keyword versions (and / or / not) at all (and go with more verbose ifs and unlesses). Less ambiguity, less confusion, less bugs.More: Difference between “or” and || in Ruby?
eql? is NOT the same as == (and NOT the same as equal? or ===)
1 == 1.0# => true1.eql? 1.0# => false
Good practice
Use only == operator.In detail ==, ===, eql? and equal? are all different operators, meant for different usage in different situations. You should always use == operator for comparing things, unless you have some specific needs (like you really need to differ 1.0 from 1) or manually override one of the equality operators for whatever reason.
a ||= b is not a = a || b
A common misconception is that a ||= b is equivalent to a = a || b, but it behaveslike a || a = b
In a = a || b, `a` is set to something by the statement on every run, whereas with a = || a = b, `a` is only set if `a` is logically false (i.e. if it's nil or false) because || is 'short circuiting'. That is, if the left hand side of the || comparison is true, there's no need to check the right hand side.
super is NOT the same as super()
Good practice
This is one of the places where omitting the parentheses is not only a
matter of taste (or conventions), but actually changes the program
logic.In detail
super (without parentheses) will call parent method with exactly the same arguments that were passed to the original method (so super inside Bar#show becomes super('test') here, causing an error, because parent method does not take any arguments).
super() (with parentheses) will call parent method without any arguments, just as expected.
Your exception must not be an Exception
(This code will not catch MyException and the message 'Caught it!' will not be displayed.)Good practice
When defining your own exception class, inherit from StandardError or any of its descendants (the more specific, the better). Never use Exception for the parent.
Never rescue Exception. If you want to do some general rescue, leave rescue statement empty (or use rescue => e to access the error).
In detail
When you leave rescue statement empty, it means it will catch exceptions that inherit from StandardError, not Exception.
When you rescue Exception (which you should not),
you’ll catch errors you won’t be able to recover from (like out of
memory error). Also, you’ll catch system signals like SIGTERM, and in
effect you won’t be able to terminate your script using CTRL-C.
Good practice
Always use longer, more verbose version with classes wrapped by modules:
moduleFooclassBarend end
In detail
module keyword (as well as class and def) will create new lexical scope for all the things you put inside. So, our module Foo creates the scope 'Foo' in which our MY_SCOPE constant with 'Foo Module' value resides.
Inside this module, we declare class Bar, which creates new lexical scope (named 'Foo::Bar'), which has access to its parent scope ('Foo') and all constants declared in it.
However, when you declare Foo::Bar with this :: “shortcut”: class Foo::Bar, it creates another lexical scope, which is also named 'Foo::Bar', but here, it has no parent, and thus, no access to things from 'Foo' scope.
Therefore, inside class Foo::Bar, we have only access to MY_SCOPE constant declared at the beginning of the script (without any module) with value 'Global'.
Most bang! methods return nil when they do nothing
'foo'.upcase! # => "FOO"'FOO'.upcase! # => nil
Good practice
Never depend on built-in bang! methods return value, e.g. in conditional statements or in control flow:
@name.upcase! and render :show
Above code can cause some unpredictable behaviour (or, to be more specific, very predictable failure when @name is already in uppercase). Also, it is another example why you should not use and / or for control-flow shortcuts. No trees will be cut if you add those two enters there:
(Note that the assignment method bar= returns 3 even though we explicitly return 'OK' at the end of its body.)Good practice
Never rely on anything that happens inside assignment method, eg. in conditional statements like this:
private will NOT make your self.method private
(Note that if the method were private, Foo.bar would raise NoMethodError.)Good practice
In order to make your class method private, you have to use private_class_method :method_name or put your private class method inside class << self block:
I ain’t afraid of no Ruby Gotchas
Ruby gotchas listed above may not look like a big deal, and at first
sight they may seem they are simple matter of aesthetics or conventions.
Trust me – if you don’t deal with them, eventually they will lead to some nasty headaches during Ruby on Rails development. And will cause heartbreak. Because you’ll fall out of love with Ruby. And then you’ll stay alone. Forever... ;)
Monday, January 20, 2014
Ruby allows many different ways to execute commands or sub-processes. Here I will list few of them
1) Backtick
2) system
3) exec
4) sh
5) popen3
Backtick ( `cmd` ) :
backtick returns the output of the cmd in a subshell.
output = `ls`
puts "output is #{output}"Result of the above code is $rubytest.rboutputisamit.txttest.rbHere the backtick operation forks the master process and the operation is executed in a new process. However this is a blocking operation. The main application waits until the result of backtick operation completes.
If there is an exception in the sub-process then that exception is given to the main process and the main process might terminate if exception is not handled.
In the following case I am executing xxxxx which is not a valid executable name.
outut=`xxxxxxx`puts"output is #{output}"
Result of above code is :
$rubytest.rbtest.rb:1:in``': No such file or directory - xxxxxxx (Errno::ENOENT) from test.rb:1:in `<main>'
Notice that puts was never executed because the backtick operation raised exception. To check the status of the backtick operation you can execute $?.success?
output=`ls`puts"output is #{output}"puts$?.success?Notice that the last line of the result contains true because the backtick operation was a success.$rubymain.rboutputislab.rbmain.rbtruesystem :
system behaves a bit like backtick operation. However there are some differences.
First let’s look at similarities.
Just like backtick, system is a blocking operation. You can get the result of the operation using $?.success? . systemoperations are also executed in a subshell.
Now the differneces between backtick and system .
system eats up all the exceptions. So the main operation never needs to worry about capturing an exception raised from the child process.
output=system('xxxxxxx')puts"output is #{output}"
Result of the above operation is given below. Notice that even when exception is raised the main program completes and the output is printed. The value of output is nil because the child process raised an exception.
$rubytest.rboutputis
Another difference is that system returns true if the command was successfully performed ( exit status zero ) . It returns false for non zero exit status. Returns nil if command execution fails.
exec :
exec replaces the current process by running the external command. Let’s see an example.
Here I am in irb and I am going to execute exec('ls').
$irbe1.9.3-p194:001>exec('ls')amit.rbtest.rbamitk~/dev/lab1.9.3$
I see the result but since the irb process was replaced by the exec process I am no longer in irb .
Behind the scene both system and backtick operations use fork to fork the current process and then they execute the given operation using exec .
Since exec replaces the current process it does not return anything if the operation is a success. If the operation fails then `SystemCallError is raised.
sh :
sh actually calls system under the hood. However it is worth a mention here. This method is added by FileUtils in rake. It allows an easy way to check the exit status of the command. | 2024-05-26T01:27:17.568517 | https://example.com/article/7607 |
Q:
ActionScript 3 Event doesn't work
I'm new in AS, and trying to make my first application. I have a class, that showld manage some events, like keyboard key pressing:
public class GameObjectController extends Sprite
{
var textField:TextField;
public function GameObjectController()
{
addEventListener(KeyboardEvent.KEY_DOWN, onKeyDown);
}
private function onKeyDown(event: KeyboardEvent):void
{
trace("123");
}
}
but when I'm running it, and pressing any button, nothing happands. What am I doing wrong?
A:
Try stage.addEventListener() for KeyboardEvents.
The reason for this is that whatever you add the event to needs focus, and the stage always has focus.
If GameObjectController isn't the document class, it will need to have stage parsed to its constructor for this to work, or it will need to be added to the stage first. The former will be less messy to implement.
public function GameObjectController(stage:Stage)
{
stage.addEventListener(KeyboardEvent.KEY_DOWN, onKeyDown);
}
| 2024-06-11T01:27:17.568517 | https://example.com/article/7562 |
Los análisis de bacterias, virus y hongos presentes en los sistemas de trasporte urbano y los ferrocarriles metropolitanos de 58 ciudades de todo el mundo han hallado que la zona con mayor prevalencia de estos organismos resistentes a los antimicrobianos (RAM) es Latinoamérica. Un equipo internacional compuesto por 600 investigadores ha tomado 3.741 muestras de las barandillas, las máquinas de venta de billetes y las paredes de las estaciones del metro a fin de crear un "atlas" de comunidades urbanas de microorganismos.
Los científicos utilizaron las muestras para identificar las bacterias, los virus y los hongos ‒conocidos en su conjunto como microbiota‒ de esos espacios urbanos y estudiar las variaciones de las características genéticas y la resistencia a los antibióticos.
En total se identificaron 4.424 especies conocidas, 1.145 de las cuales se detectaron en más del 70% de las muestras. 61 especies presentes en más del 95% de las muestras no forman parte de la microbiota humana normal que puebla la piel y las vías respiratorias, ni tampoco el suelo. El estudio, realizado por un consorcio de científicos de África, América, Asia, Europa y Australasia, se publicó en BioRxiv, un repositorio de acceso abierto para trabajos aún no impresos que permite a los autores poner sus descubrimientos al alcance de la comunidad científica de manera inmediata.
Eduardo Castro-Nallar, coautor del artículo e investigador del Centro de Bioinformática y Bilogía Integrativa de la Universidad Andrés Bello de Santiago de Chile, explica que "esto ha llevado a pensar que las ciudades son un ecosistema en sí mismas, con una comunidad de microorganismos estable". Además, el estudio comprobó que más del 50% de las muestras genéticas recogidas no se podían identificar, lo que significa que hay microorganismos que la ciencia no conoce o no ha definido.
En Latinoamérica, los investigadores tomaron muestras del metro y los sistemas de transporte urbano de São Paulo, Río de Janeiro, Bogotá y Santiago. La prevalencia de los genes RAM que se encontraron en estos entornos era entre 10 y 20 veces superior a la de ciudades de otras zonas del mundo. Río de Janeiro y Bogotá, por ejemplo, tenían 10 veces más genes RAM que París, Baltimore o Singapur.
El estudio también mostró que la naturaleza de las unidades RAM y la distribución de genes varía entre ciudades. "Aunque muchos microorganismos están presentes en gran número de ciudades, existe una especie de sello microbiano que identifica a cada una de ellas. Se podría tomar una muestra, analizarla, y adivinar su procedencia", resume Castro-Nallar, que también es investigador en el Instituto de Biología Computacional de la Universidad George Washington.
El estudio comprobó que más del 50% de las muestras genéticas recogidas no se podían identificar, lo que significa que hay microorganismos que la ciencia no conoce o no ha definido
"Mientras que algunas muestras solamente contienen unos cuantos genes RAM, en otras los hay en gran cantidad, lo cual tiene repercusiones no solo para nuestro conocimiento del desarrollo de las ciudades, sino también para la planificación urbana", afirma.
Los científicos consideran que este hecho es una muestra de la necesidad de utilizar mejor los antibióticos en Latinoamérica, y añaden: "Los resultados de nuestro artículo indican que la prevalencia de los genes RAM es muy alta, superada solo por Offa, en Nigeria".
Cristina Marino Buslje, investigadora de la Unidad de Bioinformática Estructural de la Fundación Instituto Leloir, de Buenos Aires, que no participó en el trabajo, opina que "es un estudio sin precedentes, posible gracias a los avances técnicos que permiten construir la secuencia genética y a los análisis por ordenador de cantidades enormes de datos. "Espero que las autoridades gubernamentales tengan en cuenta los datos generados por él a la hora de tomar decisiones en materia de política sanitaria. El trabajo también puede ayudar a los profesionales de la sanidad en el diagnóstico y el tratamiento de las infecciones", dice.
Virgina Pasquinelli, de la Universidad Nacional del Noroeste de la Provincia de Buenos Aires, añade: "Este trabajo no solo aporta nueva información, sino que también proporciona herramientas de uso libre para el análisis del microbioma urbano. El objetivo final es construir una base de datos accesible a toda la comunidad científica que permita reproducir y validar la información en diferentes entornos y producir beneficios para la salud pública.
"Sabemos que el microbioma modula la respuesta de nuestro sistema inmunitario; incluso la respuesta a los tumores está regulada por la diversidad de nuestra flora normal. Pensar que esta interactúa con el microbioma urbano es un aspecto interesante a tener en cuenta en futuras investigaciones", añade Pasquinelli.
Este artículo ha sido producido por la sección de Latinoamérica y el Caribe de SciDev.Net y editado. | 2023-11-17T01:27:17.568517 | https://example.com/article/8703 |
Q:
PHP know when an email is marked as spam
am not sure if there is away to do this, but I noticed that ZOHO currently offers this feature, where if I mark an email as spam, it shows up at zoho saying a user has marked your email as spam.
I am not sure how this works, with gmail, live, and other email providers.
But I thought if they do it, I should be able to get the same notification...
A:
ZOHO will have a filtering algorithm either run by a ready-made program on their server, or they'll have written their own. Unfortunately, in PHP, there's no is_spam($email) method, although it'd be nice.
| 2024-05-22T01:27:17.568517 | https://example.com/article/8025 |
News: This BB is intended for the sole purpose of sharing conversion and bus related information among visitors to our web site. These rules must be followed in order for us to continue this free exchange of info. No bad mouthing of any business or individual is permitted. Absolutely no items for sale are to be posted, except in the Spare Tire board. Interested in placing a classified or web ad, please contact our advertising dept. at 714-903-1784 or e-mail to: info@busconversions.com.
Ok probably stirring up the pot . I installed a propane injection unit on my 6v92ta,total cost about $1100. Has been in for 1 year. You can turn it on or off at any time from the drivers seat.My son and I did a test on a controlled route with a hill in the test. Each time I gained an extra gear and lost 10 seconds off the route test with the propane on. We did the test 3 times on and 3 times off, the same each time.It has given me the extra power needed for the up hill runs.I turn it off when not in the hills.I have the regulator set low on the amount of propane injected. The only difference I have noticed is I use a little less oil on a long run.As far as long term use time will tell. At present we only put on about 8-10 k a year. dave
Your preaching to the choir Dave,, its well known that propane "mixing" (its not injected) works well for turboed and "A" timed engines. Propane is even more effective on 4 stroke diesel engines than 2 strokes..>>>Dan
This is something I have always had an interest in although I do not have a turbo. Many reports seem to say it helps a natural engine, just not quite as much. There are those that create their own systems using a steady flow of propane. I have also heard about systems that can regulate the propane flow according to the DD blower, which would be similar to the turbo system.
You will probably find more water vapor in despensed diesel fuel than propane vapor. Internal combustion averages between 14/17 to 1 for efficient combustion,, thats a lot of air to work with, particularly under blower pressure.>>>Dan | 2023-09-19T01:27:17.568517 | https://example.com/article/1722 |
Russian Professional Basketball League
The Professional Basketball League (), often abbreviated to the PBL, was the pre-eminent men's professional basketball league in Russia, and the successor to the Russian Super League 1, which is now the second-tier division of the Russian basketball league system.
The PBL was the second version of the Russian Professional Basketball Championship.
History
Established in 2010, the league contained 10 teams in its inaugural 2010–11 season. 9 of those teams participated in the 2009–10 season of Russian Super League 1, and the 10th team was Nizhny Novgorod. The inaugural 2010–11 season started on October 9, 2010, with a match between Dynamo Moscow and CSKA Moscow, on Dynamo's home court, the Krylatskoye Sports Palace. CSKA won by a score of 81 to 63.
The 2011–12 season featured 10 teams, like the inaugural season, however, Dynamo Moscow was replaced with the 2011 Russian Super League 1 champions Spartak Primorye.
Merging with VTB United League
In May 2012, all the PBL clubs gathered to decide which format would be used for the next season, and some club's directors raised the possibility of merging with the VTB United League, to produce greater competition between the Russian basketball clubs. They suggested that the new league would be named the Eastern European Professional Basketball League.
In July 2012, the Council of VTB United League gave a definitive decision. It was decided that the PBL league would continue for one more year, with some of the games of the VTB United League that took place between two Russian clubs being counted as PBL games. The first tier Russian clubs then replaced the PBL with the VTB United League as their new national domestic league, starting with the 2013–14 season.
Champions
Awards winners
Most Valuable Player
Maciej Lampe: (2011)
Davon Jefferson: (2012)
Playoffs MVP
Victor Khryapa: (2011)
Alexey Shved: (2012)
Russian basketball clubs in European and worldwide competitions
See also
Russian Professional Championship
VTB United League
Russian Super League 1
USSR Premier League
Russian Cup
USSR Cup
References
External links
Category:2010 establishments in Russia
1
Category:Defunct basketball leagues in Europe
Category:Sports leagues established in 2010
Category:2013 disestablishments in Russia | 2024-04-25T01:27:17.568517 | https://example.com/article/8007 |
Micronuclei and chromosome aberrations in Xenopus laevis spermatocytes and spermatids exposed to adriamycin and colcemid.
Cultured testes and spermatocytes from the frog Xenopus laevis have been incubated (40-42 h) with adriamycin or colcemid followed by quantitation of chromosome aberrations in secondary spermatocytes and quantitation of micronuclei in secondary spermatocytes, early round spermatids, and round spermatids with acrosomal vacuoles (AV) at 18-162 h of culture. Micronucleus frequencies were consistently higher in secondary spermatocytes relative to round spermatids after exposure to either adriamycin or colcemid due to a higher rate of micronucleus formation during meiosis I compared to meiosis II. Also, some of the micronuclei formed during meiosis I did not survive meiosis II to form micronucleated spermatids. Micronucleus formation occurred in 3-7% of secondary spermatocytes with detectable chromosome aberrations, depending upon drug treatment. Thus, the ratio of micronuclei to total chromosome aberrations in secondary spermatocytes was always higher in colcemid-treated cells compared to adriamycin-treated cells following 18- and 42-h treatment periods. Adriamycin induced significant increases in micronuclei in both secondary spermatocytes and spermatids after 162 h of culture, the time for initial pachytene stages to develop into secondary spermatocytes and spermatids. The data show that cultured testes and spermatocytes from Xenopus may be used to quantify specific meiotic chromosome aberrations induced by both clastogens and spindle poisons using either a rapid secondary spermatocyte micronucleus assay or meiotic chromosome analysis. | 2024-02-27T01:27:17.568517 | https://example.com/article/3507 |
Our Priorities
Video
International Women’s Day Celebration Maradiyur, Mysore.
With joy and enthusiasm 400 women from 33 SHG’s of Maradiyur and surrounding 12 villages, gathered on 10-03-2015, at Samudaya Bhavan, Koppa to celebrate the International Women’s Day. The day began with Rally which was inaugurated by Mrs. Rosy the Taluk women’s coordinator, the women wearing the cap announcing to the public the specialty of the day.
After the Rally, all gathered in the hall and welcomed the distinguished guests: Tahasildar of Periyapatna Mr. Talwar the chair person, Panchayath President Mrs. Savithri Raman, Bank Manager of Bylakuppe Mr. Nayak, Taluk women’s coordinator Mrs. Rosy, Ex – CDEW Directress Sr. Anna. T and Sr. Agnes the local Directress and the Representative from Police authorities and other women’s organization.
After a short prayer dance, the Kuttuvillaku was lit invoking God’s presence.
The chief guest Mr. Talwar congratulated the women and said their progress is in their hands. The Government is giving many helps through various programmes for their development as well as financial helps to Mahila Sanghas. Women must unite and make use of it to improve themselves, but at times, it is women themselves who stand as an obstacles through their non co-operation. Mr. Nayak the Bank Manager highlighted the availability of Bank services for the development of the women. Mrs. Rosy the Taluk women’s coordinator highlighted the various programmes, subsidies available today and how to benefit and to avail it for their development through groups. The Panchayath president congratulated the women for their enthusiasm and interest and exhorted them to be united. Mr. Lokesh the news reporter, advised the women not to be silent when a wrong image of women is given in the media.
Sr. Anna. T brought the example of Malala Youscph Sai, the 17 year old Pakistani girl who shared the Nobel prize for peace along with Mr. Kailash Sathyamurthy of India. Malala for her courage and strength in fighting against Taliban for the rights of girl child and Mr. Sathyamurthy for his dedicated services to thousands of poor children for their education. Sr. Agnes the Directress congratulated the women for their active participation and hard work put in to make this function a success. She exhorted and encouraged them telling the progress they need to make this year is to enter into the political field and stand for Panchayath election. True growth takes place only when women play their role in all the fields along with men.
The various cultural programmes as Dance and Songs on women by various groups and elaborate report on the functioning of the groups by Mrs. Suhasini kept every one alert and enlightened. The prizes were distributed by the chief guests to the winners of various competitions held earlier. The rolling trophy went to "Nirmal Jyothi" SHG of Maradiyur.
After a sumptuous meal they went home happily with sweet memories of the day. It was also praise worthy to note that there were lots of local collaborators as many people came forward to support this day’s programme with their financial assistance too.
May the women climb up their ladders by which they may become valuable women of India as we have many models today. | 2024-04-24T01:27:17.568517 | https://example.com/article/3831 |
The first Potomac Bible Institute course being offered will be Bible Study Methods and Rules of Interpretation (see attachment). The specific time and location for the class is still to be determined upon registrations.
We are asking that you do your best to get the word out between now and then and encourage interested students to register for the first course in January. Promotional information and flyers have been sent to PBA Churches. The first night of class, which will be an introductory/overview/orientation session is free.
The Church Support Team has assisted several PBA Churches with various requests that have arisen over the past year, providing materials for education needs, training materials for church ministries and community outreach needs.
One highlight this past year has been the achievement of the Potomac Bible Institute. In January of 2017, after much preparation, the PBA started up the Potomac Bible Institute. Classes meet regularly on Tuesday evenings in two locations: The Church @ St. Charles and Emmanuel Church. Two courses have been completed: “Bible Study Methods and Rules of Interpretation” and “Old Testament Survey.” We have averaged about 20 students for the first two courses between both locations. Currently we are offering our third course, “New Testament Survey,” and have 24 students enrolled.
We have also conducted two Teacher Training Workshop events for the PBI in our association. We now have eight pastors in our association trained to teach in the school: Fred Caudle, Steve Fehrman, Dan Moore, Mike Spencer, Doug White, Bob Maher, Chris McCombs and Keith Corrick. We also trained Pastor Julio Espinoza from Los Mochis, Sinaloa Mexico, and three pastors from the Prince Georges Association.
Keith Corrick will be leading a Teacher Training Workshop on November 11 at Greater Love Church in Washington D.C. Five pastors will be trained to begin a school in N.E. Washington D.C.
The basic concept of the BTCP and the BTCL program is to provide biblical training for pastors and church leaders (present and future) who have not earned a theological degree through a non-formal local setting and mentoring relationship. The emphasis is on assimilation of biblical principles, concepts, truths, and personal spiritual growth. Classes are taught by trained instructors who have experience serving in local churches, Bible colleges, Seminaries and/or on the mission field.
The curriculum covers ten courses taught in 520 hours of classroom time over a 2-to-3 year period and provides the equivalent of a two-year Bible college education. There are no tests or lengthy paper requirements, but reading both the course text and the assigned Scripture is required of all students. Occasionally, other assignments may be given at the instructor's discretion. The cost is only $75 per course, which includes the course text. Another positive feature of the program is that it can be used on the mission field to train pastors and leaders.
For More Information Contact Church Support Team Leader, Fred Caudle at
240-882-0207 or email at FredCaudle@fbcstcharles.com Register online at http://www.potomacbaptist.net/ | 2023-09-20T01:27:17.568517 | https://example.com/article/9388 |
package cn.enilu.flash.config;
import cn.binarywang.wx.miniapp.api.WxMaService;
import cn.binarywang.wx.miniapp.api.impl.WxMaServiceImpl;
import cn.binarywang.wx.miniapp.config.WxMaConfig;
import cn.binarywang.wx.miniapp.config.WxMaInMemoryConfig;
import com.github.binarywang.wxpay.config.WxPayConfig;
import com.github.binarywang.wxpay.service.WxPayService;
import com.github.binarywang.wxpay.service.impl.WxPayServiceImpl;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
/**
* @author :enilu
* @date :Created in 2020/3/17 22:11
*/
@Configuration
public class WxConfig {
@Autowired
private WxProperties properties;
@Bean
public WxMaConfig wxMaConfig() {
WxMaInMemoryConfig config = new WxMaInMemoryConfig();
config.setAppid(properties.getAppId());
config.setSecret(properties.getAppSecret());
return config;
}
@Bean
public WxMaService wxMaService(WxMaConfig maConfig) {
WxMaService service = new WxMaServiceImpl();
service.setWxMaConfig(maConfig);
return service;
}
@Bean
public WxPayConfig wxPayConfig() {
WxPayConfig payConfig = new WxPayConfig();
payConfig.setAppId(properties.getAppId());
payConfig.setMchId(properties.getMchId());
payConfig.setMchKey(properties.getMchKey());
payConfig.setNotifyUrl(properties.getNotifyUrl());
payConfig.setKeyPath(properties.getKeyPath());
payConfig.setTradeType("JSAPI");
payConfig.setSignType("MD5");
return payConfig;
}
@Bean
public WxPayService wxPayService(WxPayConfig payConfig) {
WxPayService wxPayService = new WxPayServiceImpl();
wxPayService.setConfig(payConfig);
return wxPayService;
}
}
| 2024-01-13T01:27:17.568517 | https://example.com/article/6474 |
Q:
Low-magic medieval fantasy clothes that allow the wearer to grow?
In my novel, one of the characters has a mutation that allows him to shapeshift into a larger and more powerful form (like the hulk but less intense). How could his clothes be modified so that he doesn’t tear them every time he changes? It’s a low magic setting resembling the medieval times.
When he shifts, he grows about half a foot taller and becomes a little more muscular.
A:
My laptop bag has an extra zip, which when unzipped extends the bag's dimensions and gives me about 1.5 inches of extra space to put my things in the main pocket, Magical isn't it !! (I hope you understand what kind of zip I am talking about)
You don't need magic to get your clothes done here, a smart tailor can get this done for you. If you can invent zippers at your time, that's great, otherwise, an arrangement of shoe-lace like structure will help you.
Get some fitting clothes prepared for your miniature hulk, then put some zips (or laces) on extra cloth, all over the arms, belly, chest, legs, etc. In such a way that it remains hidden on the inside and folds up the extra cloth.
Whenever you have the transformation, the zips (or laces) gets automatically undone and gives you extra cloth, when you turn back to normal form, pull a bunch of cords to get them done and fit again.
Note: you may choose to tuck-in the long shirt, and fold your pants on the bottom.
A:
How about you turn the perspective; his powerful form is the state in which his clothes fit like a glove. And all the other times it looks like he wears his dads pyjamas (aka 1990s gangster style). He could roll up his sleeves and pants, wears a too long belt and too big shoes. Include his flabby undergarments, socks and a hat in your descriptions.
Also some thoughts about clothes and medieval times, or "the broad past":
Depending on when and where your story takes place, it was common for men to wear halvlong tunics. Looks pretty comfortable to me, has potential to hide some sizes, and should suffice for a shapeshifter.
Only the super rich bought clothes, everyone else sew their own clothes by hand. Tailors were not a thing for the masses. And everyone had one set of everyday-clothes and one set for the sunday-church-fancy, maybe a spare. To have more than three sets was shocking. Who had the time to sew so much clothes and maintain them. So your character really much does not want to destroy the clothes with every shapeshift.
There were no such thing as "sizes"; all clothes were unique and custom fit. There were many people without shoes and ill-fitting dresses.
Needles were not cheap, one would take good care of the few in the household.
Even men knew how to knit and sew a button back on. Whittling was also a standard occupation, one would whittle their own buttons or trade some for a rabbit. Your character should be able to make his clothes himself and not need a special tailor, except if you want him to have a loose coin.
There were classes and it showed in their clothes. Trimmings and other decorative elements were for the rich. Silk and linen were known but expensive. The regular person had access to wool (relativly easy for the noob or poor) and fur or leather (needs some skill).
A:
Knitted or crocheted wool clothing is able to stretch quite a bit. Wool yarn itself is quite elastic - it can stretch and snap back - and you can knit or crochet patterns that allow further flexibility. (American Scientist has an article about this.) A knitted sweater can effortlessly be elongated by up to two times its length. This is certainly enough to accomodate growing about half a foot taller and becoming a little more muscular.
| 2023-10-29T01:27:17.568517 | https://example.com/article/1208 |
Modular Homes Modulars Manufactured Sale Single Wide Trailers
October 19, 2016
Image #14 of 15, click Image to enlarge
Modular homes modulars manufactured sale single wide trailers is one images from the 15 best single trailer homes for sale of GAIA Mobile Homes photos gallery. This image has dimension 1058x793 Pixel and File Size 318 KB, you can click the image above to see the large or full size photo. Previous photo in the gallery is home trailer house sale owner financemobile homes. For next photo in the gallery is upwardly mobile homes dwell. You are viewing image #14 of 15, you can see the complete gallery at the bottom below.
There are many stories can be described in single trailer homes for sale. We collect really great imageries for your best ideas to choose, select one or more of these gorgeous photographs. We hope you can use them for inspiration. We added information from each image that we get, … | 2023-10-29T01:27:17.568517 | https://example.com/article/1829 |
Archives | IndieWire
Infected through the respiratory system, there is a new kind of disease that kills in 36 hours once infected. The people of the city struggle to survive this. The worst epidemic ever seen is sweeping through Bundang, the suburb of Seoul. After smuggling illegal immigrants into the country, Byung-woo dies from an unknown virus. Soon after that, the same symptoms are plaguing scores of residents in Bundang. | 2023-09-28T01:27:17.568517 | https://example.com/article/4776 |
Joy Ride 3: Roadkill
Joy Ride 3: Roadkill (also known as Joy Ride 3) is a 2014 American horror film written and directed by Declan O'Brien and stars Ken Kirzinger, Jesse Hutch, Kirsten Zien, Ben Hollingsworth and Dean Armstrong. It is a sequel to Joy Ride (2001) and Joy Ride 2: Dead Ahead (2008) and the third installment of the Joy Ride series. The film was released direct-to-video on June 17, 2014.
Plot
Rob and Candy are holed up in a motel room, using methamphetamine and having sex. When they run out of drugs, Rob convinces Candy to use the CB to lure a trucker to their room, so they can rob him. Rusty Nail responds to Candy's summons. When Rob answers the door, Rusty realizes he's been tricked and takes the pair captive. Rob and Candy are chained to each other and the driveshaft of Rusty Nail's truck. He takes them to a deserted stretch of Highway 17 and tells them he will let them go if they can hang onto the hood of the truck for a mile. If one of them falls, the other will be pulled off the truck by the chain, and both will die under the truck. He tapes a bag of meth to the windshield of his truck, telling them they can have the drugs after they make it. After riding awhile, Rob calls out that they have ridden for at least a mile, and Rusty Nail agrees. Thinking they have made it, Candy reaches for the bag of drugs; her chain is pulled into the axle, and she and Rob are both pulled underneath the still-moving truck and killed. Later, the authorities are called to the scene; Officer Williams, a newly appointed deputy, wants to investigate further but is encouraged by Officer Jenkins to make it an open-and-shut case.
Racecar drivers Jordon and Austin, along with their team -- Jewel (manager and Jordon's girlfriend), Mickey (mechanic and pit crew chief), Alisa (PR), and Bobby (groupie) -- are caravanning from Kansas to Canada so that they can compete in the Road Rally 1000; they have an SUV with a flatbed trailer for the racecar, and walkie-talkies to communicate from car to car. When they stop at Headingley Grill for lunch, Austin finds Highway 17 on a map; he discovers that it would shorten their journey by a day and give them more time to get the lay of the land. When they ask a creepy truck driver, Barry, for directions, he warns them against taking 17; he tells them it's called "Slaughter Alley" (which the cops at the scene of Rob and Candy's deaths also claimed) and tells them the story of Rusty Nail, who has become something of an urban legend. Jenkins stops in for a cup of coffee and denies Barry's claims, encouraging them to take 17. Barry tells them that stretch of highway is unpatrolled, which appeals to Austin, who wants to be able to test the limits of their car on the open road, so they agree to go that way.
Austin drives the racecar and Jordon, Jewel, and Alisa ride along. They tease Austin about a wreck he had previously gotten in. This is clearly a sore subject for Austin, who vents his frustration by messing with a truck driver (who just happens to be Rusty Nail) and then speeding off. Jordon makes Austin pull over and takes the driver's seat; just as they catch up to Mickey and Bobby in the SUV, Rusty Nail catches up to the group and starts laying on his horn. When Jordon tries to let him pass, he boxes them in, switching lanes so neither car can get around him. Jordon gets around, but as Mickey tries to pass, Rusty rams the flatbed trailer, causing it to detach from the SUV and run off the road. He then tailgates Jordon, who dodges to get out of the way of an oncoming station wagon; when Rusty tries to do the same, he jackknifes. Jewel and Alisa try to convince Jordon to stop, but he refuses, worried a mark on his record will cost them the race. Rusty checks a camera he has mounted to the front of the truck, identifying Jordon's license number, and then uses the CB to hail them; he has found their website and now knows exactly who they all are, threatening to make them pay for what they did. Jordon disregards his threats, and the team continues on.
Night falls, and the group stops at a gas station. Everyone is at odds over how to proceed. After Jewel fights with Jordon, she and Austin leave in the SUV to go to the police, as the others continue on in the racecar. Rusty Nail catches up to Jewel and Austin and tries to run them off the road; they desperately try to call Jordon for help on the walkie-talkie, which doesn't work on Jordon's end (as Barry warned them might happen). Rusty runs them off the road and puts their unconscious bodies in the back of his truck. Just then, the gang in the racecar gets their signals back and worry when they can't reach Jewel and Austin.
Rusty takes Jewel and Austin to a deserted field and then kills Austin by putting his hands and then face through the engine fan of his truck. He then calls Jordon on the walkie-talkie, telling him he'll trade Jewel and Austin for the racecar. Rusty instructs Jordon to come to an old warehouse in an hour; Jordon and the others devise a plan to ensure that Rusty Nail will not double-cross them, as Rusty torments Jewel. Meanwhile, Officer Williams finds the wrecked and abandoned SUV.
Jordon, Mickey, Alisa, and Bobby arrive at the warehouse and split up; Alisa stays with the car, Bobby and Mickey go around the perimeter, and Jordon heads inside. After a tense search of the warehouse, during which Rusty kidnaps Bobby, Rusty flees in the truck. Jordon, Mickey, and Alisa follow in the racecar. When they come across a police cruiser, they pull over to find Jenkins; after convincing him of their story with a photo Rusty sent of Jules, he agrees to help them catch up to Rusty Nail. However, Rusty comes out of nowhere and obliterates Jenkins and his cruiser; Jordon, Mickey, and Alisa give chase. Meanwhile, Officer Williams encounters a truck weaving recklessly, and flags it down; however, it's a driver for a meatpacking plant on a rush to deliver his cargo. When Williams searches the cargo, he finds parts of Austin's body; the driver claims he picked up a "rogue load" from a fellow trucker who needed help, but Williams subdues him and tries to hail Jenkins on the CB. He then tells dispatch he's bringing the meat truck driver in. Later he finds the burning wreckage of Jenkins' cruiser.
Rusty contacts Jordon and kills Bobby as the group listens helplessly over the walkie-talkie. Rusty then tells Jordon to meet him at a junkyard and give himself up; only then will he set Jewel and Austin free. Mickey wants to go get help instead, and forces Jordon off the road; he tries to convince Alisa to come with him, but she refuses and leaves with Jordon to go save their friends. Mickey goes for help on foot; he finds the truck parked on a side road and is overpowered by Rusty Nail. Rusty crushes Mickey's head in a wench, then lights the semi-trailer of his truck on fire, driving off in just the tractor unit.
Jordon sends Alisa to go get help and enters the junkyard alone. Jewel's screams draw him into the final showdown with Rusty Nail. The two fight, as Rusty indicates Jewel is trapped in a dangling car about to be crushed. Just as it seems Rusty has the upper hand, Alisa runs him over with the racecar, and she and Jordon go to rescue Jewel from the crusher. However, Jordon finds the video camera in the trunk of the crushed car; it is playing previously shot footage of Jewel. It's revealed that Rusty Nail tied her to the roof of the truck and ran her into the girders of a steel bridge, killing her.
Enraged, Jordon and Alisa get in the car to go find Rusty Nail, but he rams into them, trying to crush them. Alisa's leg is stuck, keeping her from getting out. Jordon runs to a nearby wrecking claw and uses it to put Rusty's truck in the crusher, with Rusty inside. Later, however, when Williams and his men investigate, Rusty Nail is nowhere to be found. The film ends with Rusty Nail hitching a ride with another truck driver.
Cast
Ken Kirzinger as Rusty Nail
Jesse Hutch as Jordon Wells
Kirsten Prout as Jewel McCaul
Ben Hollingsworth as Mickey Cole
Leela Savasta as Alisa Rosado
Gianpaolo Venuta as Austin Morris
Jake Manley as Bobby Crow
Dean Armstrong as Officer Charlie Williams
James Durham as Officer Chris Jenkins
J. Adam Brown as Rob
Sara Mitich as Candy
Notes
References
External links
Category:2014 films
Category:English-language films
Category:2014 direct-to-video films
Category:2010s thriller films
Category:20th Century Fox direct-to-video films
Category:American films
Category:Direct-to-video thriller films
Category:Direct-to-video horror films
Category:Direct-to-video sequel films
Category:Films shot in Manitoba
Category:Films set in 2014
Category:Films set in Kansas City, Missouri
Category:Regency Enterprises films
Category:American road movies
Category:2010s road movies
Category:Trucker films
Category:American serial killer films | 2024-06-19T01:27:17.568517 | https://example.com/article/6580 |
Reduction of anterograde degeneration in brain damaged rats by GM1-gangliosides.
After receiving a nigrostriatal hemitransection in the left hemisphere and an electrolytic caudate nucleus (CN) lesion in the right hemisphere, rats were given intraperitoneal injections of saline or GM1-gangliosides. Significantly smaller areas of terminal degeneration were seen in the substantia nigra pars reticulata (SNr) ipsilateral to the caudate lesion of animals treated with GM1. No statistical differences were seen in the number of degenerating terminals in the CN and SNr on the side with the hemitransection. Exogenous GM1 may thus be effective in preventing anterograde degeneration following brain injury. | 2024-03-29T01:27:17.568517 | https://example.com/article/8023 |
# Generated by Django 2.0.6 on 2018-07-06 06:58
from django.db import migrations, models
class Migration(migrations.Migration):
dependencies = [
('demo', '0004_auto_20180705_1017'),
]
operations = [
migrations.AlterModelOptions(
name='teacher',
options={'ordering': ('no',), 'verbose_name': '讲师', 'verbose_name_plural': '讲师'},
),
migrations.AddField(
model_name='user',
name='counter',
field=models.IntegerField(default=3, verbose_name='票数'),
),
]
| 2023-10-05T01:27:17.568517 | https://example.com/article/6620 |
2018 Review: Wests Tigers
Our eighth 2018 NRL club review takes a look at the season endured by Wests Tigers fans - one that started with a heap of promise but crashed and burned quickly. Andrew Ferguson analyses what went right, and what went wrong out west.
The Wests Tigers were the biggest unknown entity coming into the 2018 season. They had yet another new head coach in Ivan Cleary, who had taken the reigns midway through 2017, while the playing and coaching rosters received their biggest overhauls ever.
It wasn't clear how the Tigers would fare, but from the very outset, they showed a dogged defensive style which surprised everyone. Tasked with the hardest draw in the opening rounds of any side, the Tigers managed to win low scoring games against eventual Premiers the Roosters in Round 1, and the Grand Final runners-up Melbourne Storm, twice in Rounds 2 and 5. They suffered a controversial loss in Golden Point to the Broncos in Round 3. They then lost eight of their next ten games before bouncing back in a last-dash run to reach the finals, winning five of their last eight games, but they fell short and were out of contention with a week remaining, finishing in 9th place.
The club ended up ranking third for least number of tries conceded, behind Grand Finalists Melbourne and Premiers Roosters.
Turning point
Round 7 v Newcastle. - The Tigers had been impressive over the first 6 weeks, losing once in a controversial manner, and after having put a struggling Manly side away 38-12 the week prior. They then suffered a heart-breaking loss to an improved Knights side, conceding the match winning try in the dying stages of the match. They then lost by 2 points again the following week against last placed Eels. Two games they should have won which would've changed the complexity of their season immensely.
What worked
Defence. For a long time the Tigers defence was unreliable at best, but in 2018, they just kept turning up, with just 2 blowouts, when they lost 48-12 to Canberra in Round 15 and the 51-10 loss to Souths in the last match, when their season was already over.
What didn't
Long known for being a side who could rack up cricket scores on a good day, the 2018 Tigers managed to scored more than 22 points in a game just 3 times. They had the second worst attack, barely better than wooden spooners Parramatta. The Eels scored 374 points, while the Tigers had 377.
Best player
Luke Brooks had by far his best season in the NRL. With the controlling Moses no longer stifling his game, Brooks took control of the side and played with confidence all year. He was consistent and started to deliver on his huge potential, confirmed by the fact he very nearly became the Dally M Player of the Year.
Disappointing player
Tui Lolohea was brought to the club in 2017, with the intention of having him replace Tedesco as the clubs custodian, but after a disappointing start to the year, he was replaced by winger Corey Thompson, relegated to lower grades and then the club secured the services of Bulldogs fullback Moses Mbye.
Rookie player
Esan Marsters made his debut in 2017, but was so immensely improved in 2018 that he earned himself selection in the New Zealand Test side. A powerful centre with good hands, he proved to be real handful for his opponents all year.
Feeder club round-up
The Western Suburbs Magpies finished the regular season in 5th place on the NSWRL Intrust Super Premiershiptable. The Magpies then lost to Wyong 18-14 in the first week of the finals to bow out of the Premiership race.
The Wests Tigers' Under 20 side competing in the Jersey Flegg Cupunderperformed massively, winning just two games all season and finishing comfortable wooden spooners.
Looking ahead
The Tigers playing roster has had few changes, but the few made have been very good. Rookie centre Paul Momirovski and prodigious utility player Ryan Matterson, both from the Roosters, will join the club in 2019. It will also be a year where the club is expected to farewell club icons Benji Marshall and Robbie Farah, both of whom could well reach the 300 NRL games milestone in 2019.
There is some uncertainty though - the coach. Despite signing a long deal in 2017, Ivan Cleary has been courted and caught by Penrith to take over as coach when his time at the Tigers ends. Speculation suggests that Tigers may look to replace Cleary immediately instead of keep him on board, knowing his thoughts are likely on his future club and not his current one. | 2024-05-01T01:27:17.568517 | https://example.com/article/2136 |
- -12)?
-5
What is 15/3 - (2 - 1)?
4
Evaluate 8 + (3 - (5 + 2)).
4
Evaluate ((-2)/(-4)*-1)/(385/(-220)).
2/7
Evaluate (-2)/(-9) + 387/81.
5
Evaluate (((-15)/10)/(9/12))/7.
-2/7
Calculate 22/(-220) + -2 + 16/10.
-1/2
((-4)/(-39))/(26/(-6) + 5)
2/13
Calculate (0 - 3/6)*(-12)/14.
3/7
Calculate 33/(-7) + 11 + -14 + 8.
2/7
What is 32/20 + (12/5)/6?
2
What is the value of (2 + (-33)/18)*20/(-30)?
-1/9
What is the value of (-189)/(-14)*4/(-6)?
-9
Evaluate (6 - (12 + -5))/(-1).
1
((-4)/3)/((-8)/12)*1
2
What is the value of (2 - 2)*10/20?
0
What is the value of ((-32)/312)/((-4)/(-6))?
-2/13
What is the value of 3/9*(-6)/12?
-1/6
(-10)/(-6)*(-272)/(-2040)
2/9
((5 + 2)/(-84))/((-3)/6)
1/6
Calculate -3*(117/(-27) + 7).
-8
What is the value of 62/8 + 19/(228/(-9))?
7
What is (4 + -3)/((-42)/12)?
-2/7
Calculate (6 + 1 - 6) + 5.
6
(-12)/(-15)*(-35)/(-42)
2/3
(6 - (-170)/(-28))*2
-1/7
Calculate 31/(-62) - 22/(-4).
5
Evaluate 6/42 + (-16)/28.
-3/7
What is the value of (-22)/24 - (-18 - -24)/(-24)?
-2/3
What is (-600)/(-88) - 8 - 2/(-11)?
-1
Evaluate 2*(-2 - 12/(-8))*-1.
1
What is the value of (0 + 5)/(12/(-12))?
-5
Evaluate (4/(-2))/22*(-187)/34.
1/2
What is the value of (-13)/91 + ((-12)/14 - 1)?
-2
-2 - (-16)/7 - (-74)/(-14)
-5
Evaluate (-1 + -3)/((-11)/(77/(-14))).
-2
What is (2 - (-3)/(-12)*12)/(-2)?
1/2
What is the value of ((-160)/70 + 2)*(-2 + 1)?
2/7
What is 3/((-520)/(-91) + -7)?
-7/3
Evaluate (-18)/(-20)*-2 + 174/(-145).
-3
Calculate ((-489)/45 - -11)/(3/5).
2/9
What is 1*(-20)/(-6)*(-3)/(-2)?
5
What is (-4)/(-21) - (-5)/35?
1/3
(25 + -26)/((-15)/(-3 - -6))
1/5
What is 8/10*155/248?
1/2
Calculate ((-35)/(-20))/7*(-4 - -5).
1/4
What is the value of (-114)/18 + 25/75?
-6
Evaluate 1804/4928 - 2/(-32).
3/7
12/(-228)*0 - 7*1
-7
What is 1/1 - (-73 + 77)?
-3
What is (54/(-90))/(4/10)?
-3/2
Evaluate ((-30)/50)/((4/5)/(-4)).
3
What is the value of (0 - 17/(-3)) + -6?
-1/3
Calculate (-3 + (-280)/(-91))*2.
2/13
Calculate (-46)/14 - -1 - -2.
-2/7
Calculate (0/(80/(-8)))/(-3 + 0).
0
What is the value of (-1 - (-3)/2)/((-220)/(-80))?
2/11
What is (-890)/(-267)*-2*3/(-4)?
5
What is the value of ((-8)/15)/((-24)/(-80)) + 2?
2/9
What is the value of (-55)/(-33) - -3*16/(-18)?
-1
What is the value of 8*2/(-192) - 97/(-12)?
8
35*64/2352 + 2/(-3)
2/7
What is -7 + (-531)/(-77) + (-4)/22?
-2/7
What is the value of 30/12*((-165)/50)/11?
-3/4
What is -3 - (-33)/21 - 12/(-28)?
-1
Calculate -2 + (-190)/(-120) - 1/(-6).
-1/4
Evaluate (12 - 13)*(1 + 0) - -2.
1
What is the value of (-50)/(-600)*2/3*3?
1/6
What is the value of 918/(-225) - 8/(-100)?
-4
Evaluate (-5)/1 + (-567)/(-105).
2/5
Calculate -2*(-7 - -5)/(-2).
-2
(0 - (-6)/8) + 276/(-48)
-5
Evaluate (-266)/(-76) + (-1)/(-2).
4
110/33*(-3 - 6/(-4))
-5
What is the value of (-224)/(-24) - (-28)/(-12)?
7
(1*2)/(-1 + 2/4)
-4
1/(-2)*(-9)/(-45)
-1/10
What is the value of 8/32 + 2 + 34/(-8)?
-2
What is (-7)/((-42)/(-9))*-2*1?
3
What is ((-30)/320)/(3/(-4))?
1/8
Calculate (66/(-110))/((-1)/(-5)).
-3
Evaluate ((-52)/(-8))/13 + (-4)/24.
1/3
Evaluate 2/(-5) - (-116)/40.
5/2
Calculate (-18)/16*((-70)/(-21) - 4).
3/4
What is the value of 2/((-66)/(-363) - (-92)/(-22))?
-1/2
What is the value of (-30)/(-25)*(-40)/12*2?
-8
Evaluate -5*((-572)/55 + 12).
-8
Calculate 6/(-4) + 48/36.
-1/6
Calculate (-31)/434 + (-556)/56.
-10
What is the value of ((-20)/(-14))/((-80)/(-7) + -12)?
-5/2
What is (102/(-255))/(14/5)?
-1/7
What is (-48)/(-704) + (-13)/(-11) + -1?
1/4
What is the value of 9 - ((-190)/(-45) - -5)?
-2/9
(15/35*-1)/(4/14)
-3/2
What is ((-9)/(-15) - 1)*(-40 - -42)?
-4/5
What is (-10)/(-2)*(33/15 + -3)?
-4
-5 - (0 + (-20)/5)
-1
Evaluate ((-51)/238)/(9/(-7)).
1/6
Calculate (213 - 214)*(-3 + 0/(-2)).
3
Evaluate (-1 + 3/15)/(3/(-15)).
4
What is the value of ((-286)/396 - 2/(-9))*2?
-1
What is the value of (120/(-32) + 4)*16?
4
What is the value of (3 + (-34)/11)*-2?
2/11
36/(-27)*12/(-8)
2
What is the value of (-2)/(-5)*(-27)/((-324)/120)?
4
Calculate 1/1*(6 + -9).
-3
Evaluate 15/(-36)*(-4)/((-40)/3).
-1/8
What is 1/(-5) - (-6)/10?
2/5
What is the value of 3/2 - 8/6?
1/6
What is the value of (-1 + 2)*(-1 - -2)?
1
32/4 - (29 - 19)
-2
What is 3*(-7)/(7 + 0)?
-3
What is 39/(-9) + 2/(-3)?
-5
Evaluate (-84)/(-24)*(30/21 + 0).
5
What is (-4)/30 + (-100)/(-750)?
0
23 - (26 - 7) - 1*9
-5
(0 + 4/(-40))*8
-4/5
What is (-520)/(-35) + -11 - (-4)/(-1)?
-1/7
What is (-22)/24 + (-1)/(-6)?
-3/4
Evaluate (-5)/(7 - (-1 + 1) - 6).
-5
Evaluate -4 + ((-2)/(-1))/((-1)/(-4)).
4
What is (-1)/2*(-114)/95?
3/5
What is the value of 480/600*(-1)/4?
-1/5
What is the value of ((-3)/(12/20))/(1 - 0)?
-5
What is the value of ((-2)/(-3))/((-8)/3)?
-1/4
Evaluate ((-9)/8)/((-15)/(-20)).
-3/2
What is 4/22 - (-1 + (-91)/(-77))?
0
Calculate 8/60 + (-28)/(-15) + 0.
2
(0 + -2)/2 - -5
4
What is the value of (-26)/39 - 68/(-48)?
3/4
-2 + 1 + 45/135
-2/3
Evaluate (-4)/((-112)/21 + 4).
3
What is the value of (0/1)/((-8 + 6)*-1)?
0
What is (-22)/(-132) - (-1)/(-2)?
-1/3
Calculate (-16)/(-40)*(-50)/(-2) - 2.
8
Calculate 14/10 - 5698/770.
-6
Evaluate (-2 - -3)*((-2)/8)/(-1).
1/4
Evaluate (-7)/35 - (-6)/10.
2/5
What is the value of (11/(-33))/(4/(-18))?
3/2
Calculate 366/(-549)*((-2)/4 - 0).
1/3
What is the value of (-1 - -3)*(-22)/(-132)?
1/3
What is the value of (4*9/24)/(0 - 4)?
-3/8
(9*4/(-16))/((-36)/(-96))
-6
(-1 + 4)*18/(-405)
-2/15
What is -1*((-90)/(-22) - 4)?
-1/11
(-1)/(-6) - 0 - 20/30
-1/2
Calculate 2/9 - (-836)/(-684).
-1
Evaluate 3 + -3 + (-20)/(-5).
4
1*(6/11)/(-3)
-2/11
What is the value of (-3 - -1) + -5 + 2?
-5
Calculate (0 - 2)*(-35)/14.
5
Calculate -1 + (-1)/(-3) + 21/45.
-1/5
What is the value of (-15 + 1224/88)*2/(-6)?
4/11
10/(-40) - (-1)/4
0
Calculate 2/(-10)*25/(-10)*-6.
-3
What is 2134/(-286) + 12/26?
-7
Calculate (-2)/((-1)/(-2) - 5/50).
-5
What is the value of 5/(-10 - 15/(-2))?
-2
What is (-22)/14 + (-51)/119?
-2
What is the value of -7 - (-1 + 6 + -6)?
-6
((-147)/(-30) - 5)*6
-3/5
Evaluate (3 - 33/9)/((-6)/(-27)).
-3
What is -1 + -5 + 12 + 0?
6
What is the value of (-2 + 2 - 2) + 0?
-2
Evaluate -2 - (-8 + (-112)/(-14)).
-2
What is the value of 213/24 + 1/8?
9
Evaluate (7 + -12 - -5)*(-2 - -1).
0
Calculate 160/1485 + (-22)/(-297).
2/11
(4 - 3) + 0/(-5)
1
Evaluate 9/(-12)*6/18.
-1/4
What is the value of (-266)/(-294) - (-4)/(-7)?
1/3
Evaluate (51/7 - -2) + -9.
2/7
What is (6 - 0)*3/(-9)?
-2
Calculate (-11)/(-7) - (159/21 + -8).
2
Evaluate (11 + 204/(-24))/25.
1/10
What is the value of 8 - -1 - 20/(12 - 8)?
4
Calculate 4/(-46) - (2 - 580/322).
-2/7
Evaluate (-3)/(-45)*5*(0 + -15).
-5
Evaluate (30/(-20))/((-165)/20).
2/11
What is 4/11*28/168?
2/33
What is 7/(21/(-18)) + -16 + 23?
1
13 - 5/(65/117)
4
Calculate 94/18 + -5 + (-215)/(-45).
5
Evaluate 11/(33/(-39)) - -6.
-7
What is the value of (10/25)/(8/(-4))?
-1/5
Calculate (-112)/(-20) + -2 - (-4)/10.
4
Evaluate (-2)/4*((-170)/(-25) - 6).
-2/5
Calculate (17 - 17) + (-4)/(-5).
4/5
1/(-10) + (-11)/(-10)
1
(-3 + 0)*(-1)/(-4)
-3/4
Evaluate 10*-1*2/4.
-5
Calculate ((64/(-84))/(-4))/((-12)/(-14)).
2/9
Evaluate -2 - (-1 - 0 - 3).
2
Evaluate ((-54)/(-180))/((-6)/5).
-1/4
Calculate 16/(-32)*(-6 + 0).
3
Evaluate (4/72)/((-6)/24).
-2/9
Evaluate (-14)/((-84)/(-9))*-2.
3
What is the value of 85/(-10) + 5 + 1/2?
-3
((-8 + -2)/5)/(8/32)
-8
Calculate 3 + ((-46)/15 - 12/20).
-2/3
What is the value of 38/(-70) - (-10)/25?
-1/7
Calculate -9*6/(-243) + 47/(-9).
-5
What is the value of -6 + (-80)/(-75)*6?
2/5
(-2)/7 + -3*(-10)/105
0
What is the value of 2/(-6)*(-75 + 54)?
7
Evaluate (-5 - (-1134)/234) + 28/13.
2
What is (((-91)/(-350))/13)/(10/(-25))?
-1/20
(-9)/(-11) + -1 + (-189)/231
-1
What is the value of -14 + 14 - 0/((-3)/(-1))?
0
What is the value of (16/(-30))/((-12)/18)?
4/5
Calculate (-1)/(4 - (-38)/(-10)).
-5
(4 + 4)/1 + -1
7
What is (-16 - (-301)/14)*8/22?
2
What is the value of 24/(-90)*-5*(-3)/7?
-4/7
What is the value of (0 - (17 - 17))*(-2 + 1)?
0
What is ((-4)/12)/(((-2)/(-36))/1)?
-6
Evaluate ((-30)/(-34) - 1) + 3100/(-527).
-6
120/1287 - 10/(-165)
2/13
2/(-4) - (-187)/238
2/7
Evaluate (3 + 24/(-7))/(4/14).
-3/2
What is (-1 - 462/(-484))/(1/2)?
-1/11
(-4)/(-6) - 17/((-561)/110)
4
What is the value of (-6)/(-8) + -1 - 1440/384?
-4
Calculate (-21)/((-294)/28) - 1*2.
0
What is 3*(40/176 - 1/6)?
2/11
What is (19 | 2023-12-25T01:27:17.568517 | https://example.com/article/5910 |
Chimps plan for their morning meals, helping fuel their big brains
Getting to the food first can mean a big meal ahead of the competition.
A big brain is a resource-hungry organ, demanding large amounts of energy-rich foods to keep it functioning. Understanding how species like humans and chimpanzees evolved large, energy-hungry brains is a difficult task: explanations must account for not only how the large brain provided an evolutionary advantage, but also how its energy demands could have been met.
A recent paper in PNAS suggests that a bigger brain can help with the energy needs. A group of female chimpanzees was found to show an unexpectedly advanced ability to plan their movements around what they intended to eat for breakfast. The chimps’ movements were tracked over three-quarters of a year, and their behaviors helped them get through three periods of food scarcity.
Previously, researchers suggested that having a consistent source of food was vital for animals with bigger brains. After all, that extra brain tissue is only worthwhile if the animal can eat enough calories to support it. Large-brained primates like chimps have a surprisingly consistent calorie intake despite seasonal fluctuations in their food supplies, which suggests that their intelligence plays an important role in finding food during periods of scarcity.
Maintaining a cognitive ‘map’ of where different foods can be found goes some way toward planning around shortages, but it’s also important to know when scarce foods can be found. Until now, it wasn’t clear whether chimps were able to incorporate time into their planning.
There are a number of factors that would need to be taken into account in planning food timetables. Certain foods in tropical rainforests are prized over others because they are more nutritious or have a higher caloric value. Small fruits are fair game for a great number of species because smaller animals can eat them. Fruits that are unprotected and easy to eat, like figs, are also the object of intense competition. Because certain fruits are ripe for only a short period of time, their availability is ephemeral.
The anthropologists who tracked the chimps found that the group would wake up and leave their nests earlier if they were planning to breakfast on more ephemeral fruits. They would leave earlier if their breakfast consisted of small fruit and earliest of all for figs, a highly prized food. The further the figs were from their nests, the earlier they would leave. For bigger and less ephemeral fruits, the chimps did the opposite: they would leave the nests later if the food was farther away. The researchers suggest that this is because being the early ape for big fruits doesn’t have enough advantage to cause the chimps to brave a predator-ridden twilight journey.
Waking up earlier wasn’t the only behavior the chimps altered: they also changed where they built their nests. Nest building is a complex behavior because it depends not just on breakfast plans, but also on finding the ideal tree for a nest—some trees are prized because they have softer leaves or insect repellent properties. After supper, the chimps didn’t travel farther before building their nests in order to be closer to fig sites in the morning. But they did tend to head straight in the direction of the breakfast site when breakfast involved figs; bigger fruits saw them wandering off-path more in order to find a better nest site.
The complexity of the chimps’ behavior is difficult to explain without appealing to forward planning abilities, say the researchers. For less scarce fruits, we might assume that the stronger smell of a meal gets the chimps out of bed earlier. But this can’t explain why they would leave earlier for figs that are farther away. Visual cues, caloric intake, and simple preference are also unable to account for all the timing differences.
The best explanation is that the chimps weigh various pieces of information when deciding their actions. They think about risk of predators, the type of fruit they plan to eat, what time they want to arrive, and distance. All those factors are fed into planning their movements. Chimps have previously been found to plan ahead for tool use and social situations. This observation adds a third context to chimp planning abilities, indicating that chimp planning skills are general, rather than specific to certain domains.
The findings are also important, write the researchers, because they provide the “first clear example of a future-oriented cognitive ability used in a food-scarce period... that could enable large-brained foragers to buffer drastic declines in food supply.”
Large-brained foragers could use this kind of forward planning to reduce the effects of competition from other species and ensure a consistently high supply of energy for their big brains. This provides an important clue as to how flexible planning skills could have played a role in the evolution of the big brains of primates, including humans. | 2024-07-19T01:27:17.568517 | https://example.com/article/4295 |
Membrane-targeting of signalling molecules by SH2/SH3 domain-containing adaptor proteins.
SH2/SH3 domain-containing adaptor proteins play a critical role in regulating tyrosine kinase signalling pathways. The major function of these adaptors, such as Grb2, Nck, and Crk, is to recruit proline-rich effector molecules to tyrosine-phosphorylated kinases or their substrates. In recent years dozens of novel proteins have emerged that are capable of associating with the SH2 and the SH3 domains of adaptors. In this review, the author attempts to summarise these novel binding partners of Grb2, Nck, and Crk, and to discuss current controversies regarding function and regulation of protein multicomplexes held together by SH2/SH3 adaptor molecules at the plasma membrane. | 2024-01-03T01:27:17.568517 | https://example.com/article/1086 |
Q:
How to place another TextLabel in UITableViewCell's right side in iOS
I want to place another Cell text in the right side of UITableViewCell in iOS like following pic.
How can i do that?
Thanks for any help.
A:
UITableViewCell has a property, detailTextLabel, which corresponds to the text label you are inquiring about. Just assign text to that label
i.e.
cell.textLabel.text = @"Google";
cell.detailTextLabel.text= @"Yesterday";
The little "arrow", additionally, is the accessory view on the cell
cell.accessoryType = UITableViewCellAccessoryDisclosureIndicator;
| 2023-12-19T01:27:17.568517 | https://example.com/article/3840 |
This invention relates generally to the practice of orthodontics and in particular to a method and apparatus for treating an orthodontic patient.
Orthodontics is the practice of manipulating a patient""s teeth to provide better function and appearance. In general, brackets are bonded to a patient""s teeth and coupled together with an arched wire. The combination of the brackets and wire provide a force on the teeth causing them to move. Once the teeth have moved to a desired location and are held in a place for a certain period of time, the body adapts bone and tissue to maintain the teeth in the desired location. To further assist in retaining the teeth in the desired location, a patient may be fitted with a retainer.
To achieve tooth movement, orthodontists utilize their expertise to first determine a three-dimensional mental image of the patient""s physical orthodontic structure and a three-dimensional mental image of a desired physical orthodontic structure for the patient, which may be assisted through the use of x-rays and/or models. Based on these mental images, the orthodontist further relies on his/her expertise to place the brackets and/or bands on the teeth and to manually bend (i.e., shape) wire, such that a force is asserted on the teeth ,to reposition the teeth into the desired physical orthodontic structure. As the teeth move towards the desired location, the orthodontist makes continual judgments as to the progress of the treatment, the next step in the treatment (e.g., new bend in the wire, reposition or replace brackets, is head gear required, etc.), and the success of the previous step.
In general, the orthodontist makes manual adjustments to the wire and/or replaces or repositions brackets based on his or her expert opinion. Unfortunately, in the oral environment, it is impossible for a human being to accurately develop a visual three-dimensional image of an orthodontic structure due to the limitations of human sight and the physical structure of a human mouth. In addition, it is humanly impossible to accurately estimate three-dimensional wire bends (with an accuracy within a few degrees) and to manually apply such bends to a wire. Further, it is humanly impossible to determine an ideal bracket location to achieve the desired orthodontic structure based on the mental images. It is also extremely difficult to manually place brackets in what is estimated to be the ideal location. Accordingly, orthodontic treatment is an iterative process requiring multiple wire changes, with the process success and speed being very much dependent on the orthodontist""s motor skills and diagnostic expertise. As a result of multiple wire changes, patient discomfort is increased as well as the cost. As one would expect, the quality of care varies greatly from orthodontist to orthodontist as does the time to treat a patient.
As described, the practice of orthodontic is very much an art, relying on the expert opinions and judgments of the orthodontist. In an effort to shift the practice of orthodontic from an art to a science, many innovations have been developed. For example, U.S. Pat. No. 5,518,397 issued to Andreiko, et. al. provides a method of forming an orthodontic brace. Such a method includes obtaining a model of the teeth of a patient""s mouth and a prescription of desired positioning of such teeth. The contour of the teeth of the patient""s mouth is determined, from the model. Calculations of the contour and the desired positioning of the patient""s teeth are then made to determine the geometry (e.g., grooves or slots) to be provided. Custom brackets including a special geometry are then created for receiving an arch wire to form an orthodontic brace system. Such geometry is intended to provide for the disposition of the arched wire on the bracket in a progressive curvature in a horizontal plane and a substantially linear configuration in a vertical plane. The geometry of the brackets is altered, (e.g., by cutting grooves into the brackets at individual positions and angles and with particular depth) in accordance with such calculations of the bracket geometry. In such a system, the brackets are customized to provide three-dimensional movement of the teeth, once the wire, which has a two dimensional shape (i.e., linear shape in the vertical plane and curvature in the horizontal plane), is applied to the brackets.
Other innovations relating to bracket and bracket placements have also been patented. For example, such patent innovations are disclosed in U.S. Pat. No. 5,618,716 entitled xe2x80x9cOrthodontic Bracket and Ligaturexe2x80x9d a method of ligating arch wires to brackets, U.S. Pat. No. 5,011,405 xe2x80x9cEntitled Method for Determining Orthodontic Bracket Placement,xe2x80x9d U.S. Pat. No. 5,395,238 entitled xe2x80x9cMethod of Forming Orthodontic Brace,xe2x80x9d and U.S. Pat. No. 5,533,895 entitled xe2x80x9cOrthodontic Appliance and Group Standardize Brackets therefore and methods of making, assembling and using appliance to straighten teethxe2x80x9d.
Unfortunately, the current innovations to change the practice of orthodontic from an art to a science have only made limited progress. This limit is due to, but not restricted to, the brackets being the focal point for orthodontic manipulation. By having the brackets as the focal point, placement of each bracket on a corresponding tooth is critical. Since each bracket includes a custom sized and positioned wire retaining groove, a misplacement of a bracket by a small amount (e.g., an error vector having a magnitude of millimeter or less and an angle of a few degrees or less) can cause a different force system (i.e., magnitude of movement and direction of movement) than the desired force system to be applied to the tooth. As such, the tooth will not be repositioned to the desired location.
Another issue with the brackets being the focal point is that once the brackets are placed on the teeth, they are generally fixed for the entire treatment. As such, if the treatment is not progressing as originally calculated, the orthodontist uses his or her expertise to make the appropriate changes. The treatment may not progress as originally calculated for several reasons. For example, misplacement of a bracket, misapplication of a bend in the wire, loss or attrition of a bracket, bonding failure, the patient falls outside of the xe2x80x9cnormalxe2x80x9d patient model (e.g., poor growth, anatomical constraints, etc.), patient lack of cooperation in use of auxiliary appliance, etc. are factors in delayed treatment results. When one of these conditions arise, the orthodontist utilizes his or her expertise to apply manual bends to the wire to xe2x80x9ccorrectxe2x80x9d the errors in treatment. Thus, after the original scientific design of the brackets, the practice of the orthodontic converts back to an art for many patients for the remainder of the treatment.
Another issue with the brackets being the focal point is that customized brackets are expensive. A customized bracket is produced by milling a piece of metal (e.g., stainless steel, aluminum, ceramic, titanium, etc.) and tumble polishing the milled bracket. While the milling process is very accurate, some of the accuracy is lost by tumble polishing. Further accuracy is lost in that the placement of the brackets on the teeth and installation of the wire are imprecise operations. As is known, a slight misplacement of one bracket changes the force on multiple teeth and hinders treatment. To assist in the placement of the custom brackets, they are usually shipped to the orthodontist in an installation jig. Such an installation jig is also expensive. Thus, such scientific orthodontic treatment is expensive and has many inherent inaccuracies.
Therefore, a need exists for a method and apparatus that provides a scientific approach to orthodontics throughout the treatment, maintains treatment costs, and provides a three-dimensional digital model of an orthodontic patient. | 2023-08-09T01:27:17.568517 | https://example.com/article/2122 |
Q:
Postgresql concat columns and skip column if column in NULL or is empty string
I am trying to concatenate a number of columns and skip the column if column is NULL OR empty in postgres. For example:
SELECT CONCAT(coalesce('a',''),
'|',coalesce('b',''),
'|',coalesce(NULL,''),
'|',coalesce('',''),
'|',coalesce('',''),
'|',coalesce('c','')) AS finalstring;
Output : a|b||||c
Expected output : a|b|c
A:
Use concat_ws(), which ignores null values:
concat_ws('|', col1, col2, col3, ...)
If you want to ignore empty strings as well, then you can use nullif():
concat_ws('|', nullif(col1, ''), nullif(col2, ''), nullif(col3, ''), ...)
| 2023-11-01T01:27:17.568517 | https://example.com/article/2584 |
Chronic Sinusitis
I have been diagnosed with Chronic Sinusitis for the past 6 years, as well as having allergies for 20 yrs. I suffer(ed) from sharp headaches, drowsiness, and ear infections. After several Cat Scans, it was found that it is primarily the left ear and sinus that continuously gets infected. I sometimes have nosebleeds, and lately the headaches have been more on the lower back across my head. (feeling as if I were "karate hit"). I have taken all of the anti-biotics, Prednisone, decongestants, sprays etc. over periods of time. Is there a time to be very concerned about certain symtoms, especially if the headaches have moved to a different area, and or nosebleeds? Thank-You if anyone who shares the same can help me! Linda
By using the HealthklinkUSA Talk Health Forum you acknowledge that you know that the HealthlinkUSA forum is not engaged in rendering professional medical services or advice and that the HealthlinkUSA Talk Health Forum is not a place that provides professional medical advice or professional medical support. The content on the HealthlinkUSA Talk Health Forium is not intended to be a substitute for professional medical advice, diagnosis, or treatment. With any questions you may have regarding a medical condition always seek the advice of your physician or other qualified health provider. Never delay in seeking or disregard professional medical advice because of something you have read on the HealthlinkUSA Talk Health Forum. In the event of a medical emergency you should call your doctor or 911 immediately. Reliance on any information, which you have read on the HealthlinkUSA Talk Health Forum, is solely at your own risk. | 2024-05-10T01:27:17.568517 | https://example.com/article/9484 |
Q:
History GWT demo - does not work
I have played for a while with History in gwt because i intend to implement it in my current project, so i created a small demo project just to see how it works and do some practice.
So, for some reasons it does not work.
Here is the code - very simple back and forward.
here is the iframe
<iframe id="__gwt_historyFrame" style="width:0;height:0;border:0"></iframe>
then the entry point
public class EntryPoint implements com.google.gwt.core.client.EntryPoint {
private FirstPanel panel;
public void onModuleLoad() {
ContentPanel panel = ContentPanel.getInstance();
panel.setContent(FirstPanel.getInstance());
RootPanel.get().add(panel);
}
}
and 3 singleton forms, content where form are being loaded and 2 form.
public class ContentPanel extends Composite
{
private static ContentPanel instance;
private static VerticalPanel panel = new VerticalPanel();
private ContentPanel()
{
initWidget(panel);
}
public void setContent(Widget widget)
{
panel.clear();
panel.add(widget);
}
public static ContentPanel getInstance()
{
if(instance == null)
return instance = new ContentPanel();
else
return instance;
}
}
and ..
public class FirstPanel extends Composite implements HistoryListener {
private static FirstPanel instance;
private VerticalPanel panel;
public FirstPanel() {
History.addHistoryListener(this);
panel = new VerticalPanel();
panel.setStyleName("panelstyle");
Button button2 = new Button("Next page");
button2.addClickHandler(new ClickHandler()
{
public void onClick(ClickEvent event)
{
History.newItem("second_page");
}
});
panel.add(button2);
initWidget(panel);
}
public static FirstPanel getInstance()
{
if(instance == null)
return instance = new FirstPanel();
else
return instance;
}
public Widget getWidget() {
return panel;
}
public void onHistoryChanged(String historyToken) {
if(historyToken.equalsIgnoreCase("second_page"))
ContentPanel.getInstance().setContent(SecondPanel.getInstance());
}
}
and the last but not least :))
public class SecondPanel extends Composite implements HistoryListener
{
private static SecondPanel instance;
public SecondPanel()
{
History.addHistoryListener(this);
VerticalPanel verticalPanel = new VerticalPanel();
TextBox firstnameBox = new TextBox();
TextBox lastnameBox = new TextBox();
Button submitButton = new Button("Click");
verticalPanel.add(firstnameBox);
verticalPanel.add(lastnameBox);
verticalPanel.add(submitButton);
submitButton.addClickHandler(new ClickHandler()
{
public void onClick(ClickEvent event)
{
History.newItem("first_panel");
alert("You are in second panel");
}
});
initWidget(verticalPanel);
}
public static SecondPanel getInstance()
{
if(instance == null)
return instance = new SecondPanel();
else
return instance;
}
public void onHistoryChanged(String historyToken)
{
if(historyToken.equalsIgnoreCase("first_panel"))
ContentPanel.getInstance().setContent(FirstPanel.getInstance());
}
}
The problem is that i click the button in FirstPanel and SecandPanel is loaded then press "Back" in the browser does not do anything.In onHistoryChanged method the param historyToken is empty string, should't be a value from the stack (first_page)?
I will be grateful if someone find the problem or explain me where i do mistakes.
Thanks
A:
On first page load you are calling onHistoryChanged(INIT_STATE) by hand. This does not change history. Replace with this:
public FirstPanel() {
History.addHistoryListener(this);
String token = History.getToken();
if (token.length() == 0) {
History.newItem(INIT_STATE);
} else {
History.fireCurrentHistoryState();
}
.. rest of code
Better practice would be to register History listeners History.addHistoryListener(..) only in the top-most panel (EntryPoint or ContentPanel) and switch panels based on history from there.
| 2024-05-03T01:27:17.568517 | https://example.com/article/5265 |
Also, Crylog has been deprecated in favor of the standard libraries' Log module.
Logging
Logging is an important tool when creating any application. Logging adds information that could be useful for debugging issues, doing analytics, or just gathering user behavior data; all of which can be used to inform future decisions.
However not all logging is equal. Logging should be setup in such a way so that only useful information is logged, depending on the environment.
For example, a developer working on an application would love to see debug level information so that they have all of the possible information available in order to track down issues and find bottlenecks. The application running in the production environment should NOT see debug level logs so that the log files are not cluttered, which causes actual important issues to be lost in the shuffle.
Crylog
Crylog is a new flexible logging framework for Crystal based on Monolog. It allows applications to have multiple named loggers, each with various handlers, processors, formatters.
A handler would be something that does something with a logged message. For example logging to a file or STDOUT. But it could also be sending the message to Sentry, or a database etc.
A processor adds extra data to each message. A good use case of this would be adding user/customer ids to each logged message that would represent the user which caused that message to be logged.
Lastly, a formatter of course determines how a message gets serialized. Formatters allow different styles to be used depending on the handler, as HTML would be great for email handlers but not so much for log files.
When used together, Crylog allows for various loggers to be customized to handle the various aspects of an application. Such as only logging messages that are warnings or higher in the production environment, but all messages during development.
Athena
Athena is an annotation based web framework which uses Crylog as its logging solution. For this article I'm going to be demonstrating some of the benefits that Crylog enables when combined with some neat Athena features, such as Dependency Injection. This will be a continuation of the Blog Article I wrote a few months ago.
Dependency Injection (DI)
One of the newer features of Athena is a service container layer. This allows a project to share useful objects, aka services, throughout the project. These objects live in a special class called the Service Container (SC). Object instances can be retrieved from the container, or even injected directly into classes as a form of constructor DI. While this article is not focused on DI specifically, it will be using it. For more information related to it, see the Athena Docs.
Agenda
First, lets define some goals we wish to achieve via our logging.
Log some informational messages when articles are created/deleted, or a user logins, or a new user registers, along with some contextual information.
Both scenarios should be logged to a file, but the development environment should also log to STDOUT.
By default Athena will log all messages to STDOUT and a development.log file when in the development environment, while the production environment logs to a production.log file, but only for warnings and higher. Also since we want to add some custom logic into our loggers, we'll need to define our own configuration.
Security HTTP Handler
In the last tutorial, we created a HTTP::Handler class to handle authorization around the token used in each request. I do have plans for some security related features that I use in this article to be built into Athena itself, however for now it is up to the user to define.
However there are some problems with this approach. As I left off in the previous tutorial, how would we know what user is logged in within our controller actions? To solve this we can create a UserStorage class that will store the current user, so that other classes would have access to it via DI. Lets create a new directory under src called services that I'll put the UserStorage service. Next create a new file called user_storage.cr with the following code. Be sure to require it in your blog.cr file as well.
module Blog @[Athena::DI::Register] class UserStorage < Athena :: DI :: ClassService # Use a ! property since they'll always be a user defined in our use case. # It also defines a nilable getter method to make sure there is a user property ! user : Blog :: Models :: User end end
Notice how we are inheriting from Athena::DI::ClassService , this allows Athena to get a list of all services to register, while the @[Athena::DI::Register] allows some configuration on how the service is registered.
Now we can go back to our security handler, get the user storage service, and set the user.
module Blog class SecurityHandler include HTTP :: Handler def call ( ctx : HTTP :: Server :: Context ) : Nil ... # Get the user storage service from the container user_storage = Athena :: DI . get_container . get ( "user_storage" ). as ( UserStorage ) # Set the user in user storage user_storage . user = Blog :: Models :: User . find! body [ 0 ][ "user_id" ] # Call the next handler call_next ctx end end end
Then we can go do a similar thing and update the references in the ArticleController .
module Blog::Controllers @[Athena::Routing::ControllerOptions(prefix: "article")] class ArticleController < Athena :: Routing :: Controller include Athena :: DI :: Injectable def initialize ( @request_stack : Athena :: Routing :: RequestStack , @user_storage : UserStorage ); end @[Athena::Routing::Post(path: "")] @[Athena::Routing::ParamConverter(param: "body", type: Blog::Models::Article, converter: Athena::Routing::Converters::RequestBody)] def new_article ( body : Blog :: Models :: Article ) : Blog :: Models :: Article # Sets the owner of the blog post as the current authed user body . user = @user_storage . user body . save body end @[Athena::Routing::Get(path: "")] def get_articles : Array ( Blog :: Models :: Article ) # We are also using the user in UserStorage as an additional conditional in our query when fetching articles # this allows us to only returns articles that belong to the current user. Blog :: Models :: Article . where ( :deleted_at , :neq , nil ). where ( :user_id , :eq , @user_storage . user . id ). select end @[Athena::Routing::Put(path: "")] @[Athena::Routing::ParamConverter(param: "body", type: Blog::Models::Article, converter: Athena::Routing::Converters::RequestBody)] def update_article ( body : Blog :: Models :: Article ) : Blog :: Models :: Article body . user = @user_storage . user body . save body end @[Athena::Routing::Get(path: "/:article_id")] @[Athena::Routing::ParamConverter(param: "article", pk_type: Int64, type: Blog::Models::Article, converter: Athena::Routing::Converters::Exists)] def get_article ( article : Blog :: Models :: Article ) : Blog :: Models :: Article article end @[Athena::Routing::Delete(path: "/:article_id")] @[Athena::Routing::ParamConverter(param: "article", pk_type: Int64, type: Blog::Models::Article, converter: Athena::Routing::Converters::Exists)] def delete_article ( article : Blog :: Models :: Article ) : Nil article . deleted_at = Time . utc article . save @request_stack . response . status = HTTP :: Status :: ACCEPTED end end end
We are also able to inject the RequestStack in order to have access to the request/response.
NOTE: Services can only be auto injected, like the ArticleController if the class gets instantiated within the request/response cycle. Classes instantiated outside of it, like the SecurityHandler , do not have access to the same container and services must be fetched manually.
Now that we have our authentication problem resolved we can move onto adding some logging.
Adding Logs
We'll do the two public routes first. Simply go to your AuthController and add a Athena.logger.info "User logged in", Crylog::LogContext{"user_id" => user.id} before the {token: user.generate_jwt} . This would log
[2019-11-20T01:40:40Z] main.INFO: User logged in {"user_id":1}
our message with the id of the user that logged in. We can do a similar thing in our UserController . Add a Athena.logger.info "New user registered", Crylog::LogContext{"user_id" => body.id, "email" => body.email, "first_name" => body.first_name, "last_name" => body.last_name} after saving the user model. This would log that someone registered with some information about that user.
We could also do the same thing in our ArticleController , adding like Athena.logger.info "Article ##{body.id} was created", Crylog::LogContext{"user_id" => @user_storage.user.id} . However we could keep things more DRY by using a Crylog Processor since the ArticleController are authenticated endpoints, which would have a user in the UserStorage .
Let's create a new directory under src called logger that I'll put the processor. Next create a new file called user_processor.cr with the following code. Be sure to require it in your blog.cr file as well.
module Blog struct UserProcessor < Crylog :: Processors :: LogProcessor def call ( message : Crylog :: Message ) : Nil user_storage = Athena :: DI . get_container . get ( "user_storage" ). as ( UserStorage ) # Return early if a message was logged in a public endpoint there won't be a user in storage return unless user = user_storage . user? # Add the current user's id to all log messages message . extra [ "user_id" ] = user . id end end end
This would add the current user's id to every logged message as part of the message's extra property. It also handles the case where we were logging users logging in and registering, which would not have a user in storage. Another option would be to define a logger specifically for public stuff, but that is a bit overkill for now.
Next we need to tell Crylog to use our processor. We will also handle the 2nd bullet point in our agenda. Within blog.cr module add the following code:
def Athena . configure_logger # Create the logs dir if it doesn't exist already. Dir . mkdir Athena . logs_dir unless Dir . exists? Athena . logs_dir Crylog . configure do | registry | registry . register "main" do | logger | handlers = [] of Crylog :: Handlers :: LogHandler if Athena . environment == "development" # Log to STDOUT and development log file if in develop env. handlers << Crylog :: Handlers :: IOHandler . new ( STDOUT ) handlers << Crylog :: Handlers :: IOHandler . new ( File . open ( " #{ Athena . logs_dir } /development.log" , "a" )) elsif Athena . environment == "production" # Log only to a file if in production env. handlers << Crylog :: Handlers :: IOHandler . new ( File . open ( " #{ Athena . logs_dir } /production.log" , "a" )) end # Tell crylog to use our processor on the main logger. logger . processors = [ Blog :: UserProcessor . new ] of Crylog :: Processors :: LogProcessors logger . handlers = handlers end end end
This method tells Crylog how to configure the loggers to use. As you can see, we are logging to STDOUT and a development.log file when in the dev environment, but only a production file when in the prod environment. Notice we are opening the log file with the a option; this makes makes it so messages are appended to the log instead of completely overwriting it. We are also telling it to use our UserProcessor . For more information regarding the possible logging configurations, checkout the Crylog documentation.
After that, start the server and start doing things to see messages logged. Messages logged in the ArticleController will have the current user id included in the message; just like when a user logs in, but without having to explicitly specify it.
From here additional handlers/processors etc could be defined to also log these messages to Greylog, Sentry, or even send emails if they are of a high enough severity. Crylog allows for all sorts of flexibility when deciding on how best implement logging for your project.
Update November 19, 2019 for some minor polish & changes based on previous tutorial/new Athena version | 2023-09-17T01:27:17.568517 | https://example.com/article/6743 |
Overview
Children and adults with congenital heart disease need complex, multifaceted care for continued survival and quality of life. Mayo Clinic doctors have extensive experience in treating people with congenital heart disease. Mayo Clinic doctors have been treating all types of congenital heart defects in children and congenital heart disease in adults for more than 60 years. Doctors use the most modern technology and treatment options, including minimally invasive surgical and catheter-based therapies, to provide the best care possible for you or your child.
The staff in the Center for Congenital Heart Disease at Mayo Clinic's campus in Minnesota provides you or your child with advice such as exercise, employability, insurance and pregnancy. Staff also educates you or your child about your heart anatomy, your future health and potential future heart conditions.
Doctors trained in treating children with heart conditions (pediatric cardiologists) evaluate and treat children with congenital heart defects at Mayo Clinic's campus in Minnesota. Doctors trained in congenital heart disease provide care for you or your child from birth to old age.
Research
Appointments
You may be referred by your primary doctor, or you may make an appointment without a referral.
For appointments or more information about the Center for Congenital Heart Disease at Mayo Clinic's campus in Minnesota, call the Division of Cardiovascular Diseases at 507-284-3994 from 8 a.m. to 5 p.m. Central time, Monday through Friday, or complete an online appointment request form.
Reprint Permissions
A single copy of these materials may be reprinted for noncommercial personal use only. "Mayo," "Mayo Clinic," "MayoClinic.org," "Mayo Clinic Healthy Living," and the triple-shield Mayo Clinic logo are trademarks of Mayo Foundation for Medical Education and Research. | 2024-01-24T01:27:17.568517 | https://example.com/article/3464 |
// DO NOT EDIT THIS FILE - it is machine generated -*- c++ -*-
#ifndef __gnu_java_security_key_dss_DSSPrivateKey__
#define __gnu_java_security_key_dss_DSSPrivateKey__
#pragma interface
#include <gnu/java/security/key/dss/DSSKey.h>
#include <gcj/array.h>
extern "Java"
{
namespace gnu
{
namespace java
{
namespace security
{
namespace key
{
namespace dss
{
class DSSPrivateKey;
}
}
}
}
}
namespace java
{
namespace math
{
class BigInteger;
}
}
}
class gnu::java::security::key::dss::DSSPrivateKey : public ::gnu::java::security::key::dss::DSSKey
{
public:
DSSPrivateKey(::java::math::BigInteger *, ::java::math::BigInteger *, ::java::math::BigInteger *, ::java::math::BigInteger *);
DSSPrivateKey(jint, ::java::math::BigInteger *, ::java::math::BigInteger *, ::java::math::BigInteger *, ::java::math::BigInteger *);
static ::gnu::java::security::key::dss::DSSPrivateKey * valueOf(JArray< jbyte > *);
virtual ::java::math::BigInteger * getX();
virtual JArray< jbyte > * getEncoded(jint);
virtual jboolean equals(::java::lang::Object *);
virtual ::java::lang::String * toString();
private:
::java::math::BigInteger * __attribute__((aligned(__alignof__( ::gnu::java::security::key::dss::DSSKey)))) x;
::java::lang::String * str;
public:
static ::java::lang::Class class$;
};
#endif // __gnu_java_security_key_dss_DSSPrivateKey__
| 2024-02-15T01:27:17.568517 | https://example.com/article/7011 |
Q:
How do I use findWithinHorizon to find a letter as many times as it appears in a string?
I'm trying to create a Java program that finds a specified letter from a scanner. Can I use findWithinHorizon to do this, and if so, how?
A:
If by scanner you mean java.util.Scanner
public int fromScanner(Scanner scanner, String letter){
scanner.useDelimiter(letter);
int howMany = 0;
while(scanner.hasNext()){
scanner.next();
++howMany;
}
if(howMany>0)++howMany;
return howMany;
}
There are much better ways to count a letter. Any hint of what you are doing?
EDIT here is actually using findWithinHorizon
public int fromScanner2(Scanner scanner, String letter){
int result = 0;
String resultS = null;
while( (resultS = scanner.findWithinHorizon(letter, 0)) !=null ){
++result;
}
return result;
}
Now this method is a bit non-intuitive (at lest for me). When you use it and some occurrence is actually found, Scanner has internally an integer that keeps track of the position that last time was found. And on the next search it will use this postion to search starting with it
| 2024-02-13T01:27:17.568517 | https://example.com/article/9834 |
Dog Service Training
Service training for dogs depends chiefly on the given instructions and psychology. It is vital to deal with them in a patient manner, reinforce their behavior. If you are one of those masses who necessitate a service dog because of their mental disability or physical disability waiting for a trained one and collecting money every week, try service training a dog on your own!
This will make them possible to enter libraries, shops, theaters and museums where the usual dogs are not allowed. As long as service training is being endowed, the dog can be of any breed however the most popular ones include German shepherd, Labrador retriever and Golden Retriever. Before the initial steps are taken, make sure your dog is eager to work serenely.
Assistance from service trainers for dogs must be sought however, if an individual has enough understanding to tutor a dog any sort of behavioral method, service training will not be a major problem.
Service train your dog:
Starting with the service training, it is noteworthy for the owner to realize if the dog has enough potential and capability of becoming a service dog through his comfort height in thinking situations and if he can cope with all types of animals along with how non-protective he really can be.
Neuter spray is a must so that they become less aggressive towards things and are also less liable to look for females. It is an imperative aspect in service training to prevent them from marking territories.
Next, train them basic obedience that includes commanding them to sit, lie down or stay through verbal communication or just hand signals. The dog must walk just beside the handler in a restricted behavior in every occasion. If you have no clue how to teach your dog, you should not service train on your own without any facilitation.
After that, educate your dog to avoid taking note of food, cats or anything that interests him especially moving vehicles as he should only care and concentrate on the owner in need.
Service train your dog by teaching him tasks that aids in your disability such as helping you out in case of any intruder entering the house, picking up keys. Furthermore, search more responsibilities online to identify more possible tasks that dedicated service training groups have discovered.
Train liveliness with the dog. It advances bravery and solidity, and is a fine method to see how sound your dog listens to commands.
Finally, the dog’s preparation must comprehensive so that he carries on to work consistently, following commands on the initial command with 90% of the time when in disturbing surroundings, such as restaurants.
Proofing is essentially the mass of service dog training and it begins at home and at the dog training facility with disruptions noises and food. Once the proofing is firm the dog is in use to different venues for learning to make it a practice what he has learned in dissimilar places. | 2023-11-27T01:27:17.568517 | https://example.com/article/8067 |
Posts
My console game that I have been completing my game logs on is Fortnite. The aspect of the game that I wanted was the violent component to the game and portraying the “survival of the fittest” narrative. There is a lot of research completed on the connection between violent video games and the moral judgement of the player. The argument is that the more violent video games one plays, the more loosely that players morals would be. Behavioral psychologist Albert Bandura studied this phenomenon and discovered that if a video game incorporates one of his eight factors that lead to disengagement of one’s morals. Albert Bandura’s eight factors are; moral justification, euphemistic labeling, advantageous comparison, attribution of blame, displacement of responsibility, diffusion of responsibility, distortion of consequences, and dehumanization. Fortnite is unique, in my opinion, because, although it does encompass some of these factors, I feel like it does not fall under the same criteria as other violent video games. Fortnite is a more cartoony version of a “survival of the fittest” which, in my mind, makes it more okay to demonstrate violence, especially killing, than a game that is more realistic. The reasoning behind this thought is because the dying sequences between Fortnite and say Call of Duty, a realistic game. The amount of blood and gore is where the disengagement is present, in my opinion, because of the realistic graphics. In the new Call of Duty, you can watch the dying soldier struggle, creating a very disturbing scene. In Fortnite however, when one of the avatars dies, their body gets teleported out like the avatar was being controlled by someone in a simulation. This dying sequence is why I consider the violent component of the game to be less serious and potentially traumatizing than a realistic game like Call of Duty. | 2024-03-19T01:27:17.568517 | https://example.com/article/4537 |
Ohh this could be awkward. ARSENAL AAAAARSENAAAL. My girlfriend has seasons tickets, so do a lot of mates. Supported them pre-Wenger, 6 glourious, historic years, 3 Happy years of progress and the future. 3 years of patience wearing out and now it’s very sad to see but he does appear to have totally lost his marbles.
Not selling Nasri to City wouldn’t even make economic sense, which appears to be the clubs priority these days, buy a quality replacement and whats the trouble? This could be a horrible year, the mood in the club is as dark as I’ve ever really known it. | 2023-11-12T01:27:17.568517 | https://example.com/article/7136 |
11/04/2011
Pumpkin Banana Bread
Banana Bread-- it wears many hats. There is the basic banana bread, then there is the chocolate version, the peanut butter, the tropical, the one with nuts, and so on. But this one is putting on its Fall cap and taking a walk through the autumn leaves. This is banana bread with the flavors and spices of Fall.
Enjoyed for breakfast with a slathering of butter or a toasted slice for an after school snack, this loaf is moist, tender, and bakes up beautifully with a nice dome. From the original recipe, I increased the amount of sugar and used some brown sugar for a deeper, sweet flavor. I added vanilla and a splash of white vinegar, like I do in my regular banana bread, for a bright, clean banana flavor. Not only is this a tasty spin on banana bread, but it just so happens to be low-fat. Just a quarter cup of oil, one egg, and two egg whites is all that is called for. I am not one to seek out low-fat recipes, but a recipe like this might be needed before we loosen up our belts for the upcoming holiday eats and treats!
In a large bowl, combine the banana, pumpkin, oil, egg, egg whites, sugars, vanilla, and vinegar. Using a hand held mixer, beat on low speed until smooth and thoroughly combined.
In a separate medium bowl, whisk together the flour, baking powder, soda, salt and spices. Using a rubber spatula, fold the wet ingredients into the dry just until combined.
Pour the batter into the prepared loaf pan and bake until a toothpick inserted in the center of the loaf comes out clean, about 45-60 minutes. Place the loaf on a wire rack to cool for 10 minutes. Invert the loaf onto the rack and cool completely. Enjoy!
I love that this is low fat. I know that banana can be fattening if taken too much. It is great that it can be incorporated in a bread recipe which can be included in a lightweight diet. We have leftover pumpkin puree, who doesn't? So this bread recipe is really perfect! Great post!
I loved this!! Used the same number of large eggs (this is what I usually have), coconut oil, and eliminated the white sugar. SOOO good! Sliced and wrapped for the freezer makes a quick grab for breakfast. Loved it toasted, too! Making recipe copies for friends now:) Thanks!
Hi! I made this two days ago, and so many things went wrong, so could you please help me? The bread turned out way too dense/hard, the crust was literally leather, and the inside wasn't done even after an hour and a half..I substituted the egg parts with 2 eggs, subbed the oil with 1/3 cup of yogurt, and omitted the vinegar. Was it because my substituting made the batter too wet? (My mom made this since she won't let me bake anything until college apps are over LOL :( then again she doesn't listen to recipes well so..) My mom added some extra flour to compensate I think..3 cups maybe? Please help me, I really want to make this; yours look so amazing!! Thank you!-A | 2023-09-23T01:27:17.568517 | https://example.com/article/8076 |
Q:
Div not recognizing hover
I have set up a hover effect to show an icon overlay and filter over the instagram feed on a website I am working on. When I go on inspect and set the element state to hover it works perfectly. However when actually using the website and hovering over the images she hover effect does not appear.
Why is the hover state not being recognized?
#insta-feed>a>img,
.ig__overlay--container {
width: 25vw !important;
height: 25vw !important;
}
.ig__overlay--container {
left: 0px;
background-color: rgba(0, 0, 0, 0);
background-size: 25px 25px;
background-position: center center;
background-repeat: no-repeat;
pointer-events: none;
z-index: 300;
}
.overlay__container {
position: absolute;
pointer-events: none;
z-index: 300;
}
#insta-feed>.overlay__container>div.ig__overlay--container:hover {
background-color: rgba(0, 0, 0, 0.3);
background-image: url({{ 'icon-socialig-menu.svg' | asset_url }} );
}
<div class="social__container">
<div id="insta-feed" style="text-align: center;">
<div class="flex flex-row overlay__container">
<div class="ig__overlay--container">
</div>
<div class="ig__overlay--container">
</div>
<div class="ig__overlay--container">
</div>
<div class="ig__overlay--container">
</div>
</div>
<a href="https://www.instagram.com/p/BRGeqnQBXPnlIGev3dRjstsSa6EY7JyaI6rGr00/" target="_blank"><img style="margin:0px;width:150px;height:150px;" title=": @nadavharelsaridphotography #wingatewednesday" src="//scontent.cdninstagram.com/t51.2885-15/s320x320/e35/c0.134.1080.1080/17077242_1932710616958862_1305221706347970560_n.jpg"></a>
<a href="https://www.instagram.com/p/BKEbVi6h6SfC1EelzA6MSgs3REqdtopbUPk1io0/" target="_blank"><img style="margin:0px;width:150px;height:150px;" title="#wingatewednesday" src="//scontent.cdninstagram.com/t51.2885-15/s320x320/e35/c236.0.607.607/14240602_658676340962312_969227444_n.jpg"></a>
<a href="https://www.instagram.com/p/BJye_43BoKkO3nc0ACGnlSVaSda8Swzz5lTkhw0/" target="_blank"><img style="margin:0px;width:150px;height:150px;" title="#wingatewednesday " src="//scontent.cdninstagram.com/t51.2885-15/s320x320/e35/14099287_1751144871820717_364534171_n.jpg"></a>
<a href="https://www.instagram.com/p/BGE-cm3DNDwFfEfFQDXODEdhXfNtNn79eD0Bos0/" target="_blank"><img style="margin:0px;width:150px;height:150px;" title="" src="//scontent.cdninstagram.com/t51.2885-15/s320x320/e35/13257177_1748741662037365_42463629_n.jpg"></a>
</div>
</div>
A:
I could be wrong here, but I think that because pointer-events is set to automatically inherent, the child div.ig__overlay is getting the property pointer-events: none from it's parent element. That would also explain why you can set the state manually, even though it can't receive mouse events normally.
source: https://developer.mozilla.org/en-US/docs/Web/CSS/pointer-events?v=example
"The element is never the target of mouse events; however, mouse events may target its descendant elements if those descendants have pointer-events set to some other value. In these circumstances, mouse events will trigger event listeners on this parent element as appropriate on their way to/from the descendant during the event capture/bubble phases."
| 2023-08-16T01:27:17.568517 | https://example.com/article/8713 |
/**
* \file src/core/test/mem_alloc.cpp
* MegEngine is Licensed under the Apache License, Version 2.0 (the "License")
*
* Copyright (c) 2014-2020 Megvii Inc. All rights reserved.
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT ARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
#include "megbrain_build_config.h"
#include "megbrain/comp_node/alloc.h"
#include "megbrain/comp_node_env.h"
#include "megbrain/opr/io.h"
#include "megbrain/opr/utility.h"
#include "megbrain/test/helper.h"
#include <thread>
#include <map>
#include <random>
#include <atomic>
using namespace mgb;
using namespace mem_alloc;
namespace {
class DummyRuntimePolicy final : public DeviceRuntimePolicy {
int m_device;
public:
explicit DummyRuntimePolicy(int device) : m_device{device} {}
void set_device(int device) override { m_device = device; }
void device_synchronize(int /* device */) override {}
CompNode::DeviceType device_type() override {
return CompNode::DeviceType::CPU;
}
};
class DummyAllocator final: public RawAllocator {
const size_t m_tot_size;
bool m_ever_failed = false;
size_t m_next_addr = 1, m_cur_usage = 0, m_peak_usage = 0,
m_nr_alloc = 0, m_nr_free = 0;
std::map<void*, size_t> m_addr2size;
std::mutex m_mtx;
public:
explicit DummyAllocator(size_t tot_size):
m_tot_size(tot_size)
{}
~DummyAllocator()
{
auto run = [this]() {
ASSERT_EQ(0u, m_addr2size.size());
};
run();
}
void* alloc(size_t size) override {
MGB_LOCK_GUARD(m_mtx);
if (mgb_unlikely(m_cur_usage + size > m_tot_size)) {
m_ever_failed = true;
return nullptr;
}
++m_nr_alloc;
auto addr = reinterpret_cast<void*>(m_next_addr);
m_next_addr += size;
m_cur_usage += size;
m_peak_usage = std::max(m_peak_usage, m_cur_usage);
m_addr2size[addr] = size;
return addr;
}
void free(void *ptr) override {
MGB_LOCK_GUARD(m_mtx);
auto iter = m_addr2size.find(ptr);
mgb_assert(iter != m_addr2size.end());
++ m_nr_free;
m_cur_usage -= iter->second;
m_addr2size.erase(iter);
}
void get_mem_info(size_t& free, size_t& tot) override {
tot = m_tot_size;
free = free_size();
}
size_t free_size() const {
return m_tot_size - m_cur_usage;
}
bool ever_failed() const {
return m_ever_failed;
}
size_t peak_usage() const {
return m_peak_usage;
}
size_t nr_alloc() const {
return m_nr_alloc;
}
size_t nr_free() const {
return m_nr_free;
}
void* get_chunk_end(void *addr) {
MGB_LOCK_GUARD(m_mtx);
auto iter = m_addr2size.upper_bound(addr);
mgb_assert(iter != m_addr2size.begin() &&
(iter == m_addr2size.end() || iter->first > addr));
-- iter;
void* end = (char*)iter->first + iter->second;
mgb_assert(iter->first <= addr && end > addr);
return end;
}
};
class AllocChecker {
std::shared_ptr<DummyAllocator> m_root_allocator;
size_t m_peak_usage = 0, m_cur_usage = 0;
std::map<size_t, size_t> m_addr2size;
std::mutex m_mtx;
public:
AllocChecker(std::shared_ptr<DummyAllocator> root_alloc):
m_root_allocator(std::move(root_alloc))
{}
void add(void *addr_, size_t size) {
ASSERT_NE(nullptr, addr_);
mgb_assert((char*)addr_ + size <=
m_root_allocator->get_chunk_end(addr_));
auto addr = reinterpret_cast<size_t>(addr_);
MGB_LOCK_GUARD(m_mtx);
auto rst = m_addr2size.insert({addr, size});
mgb_assert(rst.second, "duplicated address: %p", addr_);
auto iter = rst.first;
if (mgb_likely(iter != m_addr2size.begin())) {
auto iprev = iter;
-- iprev;
mgb_assert(iprev->first + iprev->second <= addr);
}
auto inext = iter;
++ inext;
if (mgb_likely(inext != m_addr2size.end())) {
mgb_assert(addr + size <= inext->first);
}
m_cur_usage += size;
m_peak_usage = std::max(m_peak_usage, m_cur_usage);
}
void remove(void *addr) {
MGB_LOCK_GUARD(m_mtx);
auto iter = m_addr2size.find(reinterpret_cast<size_t>(addr));
mgb_assert(iter != m_addr2size.end());
m_cur_usage -= iter->second;
m_addr2size.erase(iter);
}
size_t peak_usage() const {
return m_peak_usage;
}
};
} // anonymous namespace
TEST(TestMemAlloc, Reserve) {
constexpr size_t TOT = 2048;
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, TOT, raw_alloc, runtime_policy);
StreamKey stream_key = nullptr;
auto strm_alloc =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
EXPECT_EQ(0u, strm_alloc->get_free_memory().tot);
EXPECT_EQ(2048u, dev_alloc->get_free_memory().tot);
}
TEST(TestMemAlloc, ReserveOutOfMemory) {
constexpr size_t TOT = 2048;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
EXPECT_THROW(DevMemAlloc::make(0, TOT + 1, raw_alloc, runtime_policy),
MemAllocError);
}
TEST(TestMemAlloc, Alloc) {
constexpr size_t TOT = 2048, REQ = 1000;
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, TOT, raw_alloc, runtime_policy);
StreamKey stream_key = nullptr;
auto strm_alloc =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
auto ptr = strm_alloc->alloc_shared(REQ);
EXPECT_EQ(REQ, strm_alloc->get_used_memory());
EXPECT_EQ(TOT - REQ, strm_alloc->get_free_memory().tot);
EXPECT_EQ(TOT, dev_alloc->get_used_memory());
EXPECT_EQ(0u, dev_alloc->get_free_memory().tot);
auto addr = ptr.get();
ptr.reset();
EXPECT_EQ(0u, strm_alloc->get_used_memory());
EXPECT_EQ(TOT, strm_alloc->get_free_memory().tot);
EXPECT_EQ(TOT, dev_alloc->get_used_memory());
EXPECT_EQ(0u, dev_alloc->get_free_memory().tot);
EXPECT_EQ(addr, strm_alloc->alloc_shared(REQ).get());
}
TEST(TestMemAlloc, MergeFreeBlock) {
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(7000);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, 7000, raw_alloc, runtime_policy);
StreamKey stream_key = nullptr;
auto strm_alloc =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
auto ptr = strm_alloc->alloc_shared(2000);
auto addr = ptr.get();
ptr.reset();
ptr = strm_alloc->alloc_shared(3000);
EXPECT_EQ(addr, ptr.get());
strm_alloc->alloc_shared(4000);
}
TEST(TestMemAlloc, AllocTwoStream) {
constexpr size_t TOT = 2048, REQ0 = 1000, REQ1 = 2000;
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, TOT, raw_alloc, runtime_policy);
StreamKey stream_key0, stream_key1;
auto strm_alloc0 =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key0)),
strm_alloc1 =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key1));
ASSERT_NE(strm_alloc0, strm_alloc1);
auto ptr0 = strm_alloc0->alloc_shared(REQ0);
EXPECT_EQ(REQ0, strm_alloc0->get_used_memory());
EXPECT_EQ(0u, strm_alloc0->get_free_memory().tot);
EXPECT_EQ(REQ0, dev_alloc->get_used_memory());
EXPECT_EQ(TOT - REQ0, dev_alloc->get_free_memory().tot);
ptr0.reset();
EXPECT_EQ(0u, strm_alloc0->get_used_memory());
EXPECT_EQ(REQ0, strm_alloc0->get_free_memory().tot);
EXPECT_EQ(REQ0, dev_alloc->get_used_memory());
EXPECT_EQ(TOT - REQ0, dev_alloc->get_free_memory().tot);
auto ptr1 = strm_alloc1->alloc_shared(REQ1);
EXPECT_EQ(0u, strm_alloc0->get_free_memory().tot);
EXPECT_EQ(REQ1, strm_alloc1->get_used_memory());
EXPECT_EQ(0u, strm_alloc1->get_free_memory().tot);
EXPECT_EQ(REQ1, dev_alloc->get_used_memory());
EXPECT_EQ(0u, dev_alloc->get_free_memory().tot);
ptr1.reset();
EXPECT_EQ(0u, strm_alloc1->get_used_memory());
EXPECT_EQ(REQ1, strm_alloc1->get_free_memory().tot);
EXPECT_EQ(REQ1, dev_alloc->get_used_memory());
EXPECT_EQ(0u, dev_alloc->get_free_memory().tot);
}
TEST(TestMemAlloc, AllocMoreThanReserve) {
constexpr size_t RES = 1000, TOT = 2048, REQ = 2048;
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, RES, raw_alloc, runtime_policy);
StreamKey stream_key = nullptr;
auto strm_alloc =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
auto ptr = strm_alloc->alloc_shared(REQ);
EXPECT_EQ(REQ, strm_alloc->get_used_memory());
EXPECT_EQ(0u, strm_alloc->get_free_memory().tot);
EXPECT_EQ(REQ, dev_alloc->get_used_memory());
EXPECT_EQ(TOT - REQ, dev_alloc->get_free_memory().tot);
auto addr = ptr.get();
ptr.reset();
EXPECT_EQ(0u, strm_alloc->get_used_memory());
EXPECT_EQ(REQ, strm_alloc->get_free_memory().tot);
EXPECT_EQ(REQ, dev_alloc->get_used_memory());
EXPECT_EQ(TOT - REQ, dev_alloc->get_free_memory().tot);
EXPECT_EQ(addr, strm_alloc->alloc_shared(REQ).get());
}
TEST(TestMemAlloc, AllocZeroSize) {
constexpr size_t TOT = 1000;
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(TOT);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, 1, raw_alloc, runtime_policy);
StreamKey stream_key = nullptr;
auto strm_alloc =
dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
EXPECT_ANY_THROW(strm_alloc->alloc(0));
}
TEST(TestMemAlloc, NotCrossBoundary) {
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(4);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, 0, raw_alloc, runtime_policy);
auto conf = dev_alloc->prealloc_config();
conf.max_overhead = 0;
conf.alignment = 1;
dev_alloc->prealloc_config(conf);
StreamKey stream_key = nullptr;
auto salloc = dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
auto p0 = salloc->alloc(1), p1 = salloc->alloc(1);
salloc->free(p0);
salloc->free(p1);
auto p2 = salloc->alloc(2);
salloc->print_memory_state();
ASSERT_LE((void*)((char*)p2 + 2), raw_alloc->get_chunk_end(p2)) <<
p0 << " " << p1 << " " << p2;
}
TEST(TestMemAlloc, GrowByGather) {
using StreamKey = DevMemAlloc::StreamKey;
auto raw_alloc = std::make_shared<DummyAllocator>(12);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
auto dev_alloc = DevMemAlloc::make(0, 0, raw_alloc, runtime_policy);
auto conf = dev_alloc->prealloc_config();
conf.max_overhead = 2;
conf.alignment = 1;
dev_alloc->prealloc_config(conf);
StreamKey stream_key;
auto salloc = dev_alloc->add_stream(static_cast<StreamKey>(&stream_key));
salloc->alloc_shared(4);
salloc->alloc_shared(8);
salloc->alloc_shared(10);
}
TEST(TestMemAlloc, RandomOprs) {
const size_t DEALLOC_PROB = std::mt19937::max() * 0.4;
constexpr size_t NR_THREAD = 4, NR_RUN = 2000, MIN_REQ = 1, MAX_REQ = 513,
MAX_MEMORY = NR_THREAD *
(MIN_REQ + (MAX_REQ - MIN_REQ) * 0.5) *
NR_RUN * 0.3,
RESERVE_MEMORY = MAX_MEMORY / NR_THREAD * 0.7;
auto dummy_alloc = std::make_shared<DummyAllocator>(MAX_MEMORY);
auto runtime_policy = std::make_shared<DummyRuntimePolicy>(0);
AllocChecker checker(dummy_alloc);
auto dev_alloc =
DevMemAlloc::make(0, RESERVE_MEMORY, dummy_alloc, runtime_policy);
{
DevMemAlloc::PreAllocConfig prconf;
prconf.alignment = 512;
prconf.max_overhead = 0;
dev_alloc->prealloc_config(prconf);
}
std::mt19937 rng_seed(next_rand_seed());
std::mutex mutex;
std::atomic_bool start_signal{false}, worker_finished[NR_THREAD];
std::atomic_int nr_ready_start{0};
for (auto&& i : worker_finished) {
i.store(false);
}
std::string failed_msg;
size_t dummy_alloc_peak_usage = 0, checker_peak_usage = 0;
auto worker_impl = [&](size_t thread_num) {
std::mt19937 rng;
{
MGB_LOCK_GUARD(mutex);
rng.seed(rng_seed());
}
std::vector<std::shared_ptr<void>> allocated_ptrs;
allocated_ptrs.reserve(NR_RUN);
++nr_ready_start;
while (!start_signal.load())
;
auto stream_alloc = dev_alloc->add_stream(
reinterpret_cast<DevMemAlloc::StreamKey>(thread_num * 8));
auto stream_free = [&checker, stream_alloc](void* ptr) {
checker.remove(ptr);
stream_alloc->free(ptr);
};
for (size_t i = 0; i < NR_RUN; ++i) {
auto rand_f = rng() / (rng.max() + 1.0);
if (!allocated_ptrs.empty() && rng() < DEALLOC_PROB) {
size_t idx = allocated_ptrs.size() * rand_f;
std::swap(allocated_ptrs.at(idx), allocated_ptrs.back());
allocated_ptrs.pop_back();
} else {
size_t size = (MAX_REQ - MIN_REQ) * rand_f + MIN_REQ;
std::shared_ptr<void> addr(stream_alloc->alloc(size),
stream_free);
checker.add(addr.get(), size);
allocated_ptrs.emplace_back(std::move(addr));
}
}
if (thread_num)
return;
// the following only runs on thread 0
worker_finished[thread_num].store(true);
for (auto&& i : worker_finished) {
while (!i.load())
;
if (!failed_msg.empty())
return;
}
dummy_alloc_peak_usage = dummy_alloc->peak_usage();
checker_peak_usage = checker.peak_usage();
auto pfill = dummy_alloc->alloc(dummy_alloc->free_size());
// device memory allocator does not reclaim memory to root allocator
ASSERT_EQ(0u, dummy_alloc->nr_free());
ASSERT_NE(nullptr, pfill);
dev_alloc->print_memory_state();
// check for memory being moved between streams
auto size = std::max(stream_alloc->get_free_memory().max,
dev_alloc->get_free_memory().max) +
10;
auto addr = stream_alloc->alloc_shared(size);
checker.add(addr.get(), size);
allocated_ptrs.emplace_back(std::move(addr));
dummy_alloc->free(pfill);
};
auto worker = [&](size_t thread_num) {
MGB_TRY { worker_impl(thread_num); }
MGB_CATCH(std::exception & exc, {
MGB_LOCK_GUARD(mutex);
failed_msg =
ssprintf("worker %zu failed: %s", thread_num, exc.what());
mgb_log("%s", failed_msg.c_str());
});
worker_finished[thread_num].store(true);
};
std::vector<std::thread> threads;
for (size_t i = 0; i < NR_THREAD; ++i)
threads.emplace_back(worker, i);
while (nr_ready_start.load() != NR_THREAD)
;
start_signal.store(true);
for (auto&& i : threads)
i.join();
ASSERT_TRUE(failed_msg.empty()) << failed_msg;
mgb_log("peak usage ratio: %zu/%zu=%.5f; "
"backend_nr_alloc: %zu; backend_nr_free: %zu",
checker_peak_usage, dummy_alloc_peak_usage,
double(checker_peak_usage) / dummy_alloc_peak_usage,
dummy_alloc->nr_alloc(), dummy_alloc->nr_free());
EXPECT_TRUE(dummy_alloc->ever_failed()) << "this fails occasionally";
ASSERT_GT(dummy_alloc->nr_alloc(), dummy_alloc->nr_free());
dev_alloc.reset();
ASSERT_EQ(dummy_alloc->nr_alloc(), dummy_alloc->nr_free());
}
TEST(TestSimpleCachingAlloc, Basic) {
constexpr size_t TOT = 2048, REQ = 1000;
static_assert(TOT > REQ * 2, "");
auto raw_alloc = new DummyAllocator(TOT);
auto alloc = SimpleCachingAlloc::make(std::unique_ptr<RawAllocator>(raw_alloc));
auto ptr = alloc->alloc(REQ);
EXPECT_EQ(TOT - REQ, raw_alloc->free_size());
EXPECT_EQ(REQ, alloc->get_used_memory());
EXPECT_EQ(0u, alloc->get_free_memory().tot);
alloc->free(ptr);
EXPECT_EQ(0u, raw_alloc->nr_free());
EXPECT_EQ(REQ, alloc->get_free_memory().tot);
ptr = alloc->alloc(REQ / 2);
EXPECT_EQ(1u, raw_alloc->nr_alloc());
EXPECT_EQ(REQ / 2, alloc->get_used_memory());
EXPECT_EQ(REQ - REQ / 2, alloc->get_free_memory().tot);
auto ptr2 = alloc->alloc(REQ / 2);
EXPECT_EQ(1u, raw_alloc->nr_alloc());
EXPECT_EQ(REQ / 2 * 2, alloc->get_used_memory());
EXPECT_EQ(REQ - REQ / 2 * 2, alloc->get_free_memory().tot);
EXPECT_EQ(REQ / 2, (char*)ptr2 - (char*)ptr);
alloc->free(ptr);
EXPECT_EQ(1u, raw_alloc->nr_alloc());
EXPECT_EQ(REQ / 2, alloc->get_used_memory());
EXPECT_EQ(REQ - REQ / 2, alloc->get_free_memory().tot);
ptr = alloc->alloc(REQ);
EXPECT_EQ(2u, raw_alloc->nr_alloc());
EXPECT_EQ(TOT - REQ * 2, raw_alloc->free_size());
EXPECT_EQ(REQ + REQ / 2, alloc->get_used_memory());
EXPECT_EQ(REQ - REQ / 2, alloc->get_free_memory().tot);
alloc->free(ptr2);
ptr2 = alloc->alloc(REQ);
EXPECT_EQ(2u, raw_alloc->nr_alloc());
EXPECT_EQ(REQ * 2, alloc->get_used_memory());
EXPECT_EQ(0u, alloc->get_free_memory().tot);
alloc->free(ptr);
alloc->free(ptr2);
EXPECT_EQ(0u, raw_alloc->nr_free());
};
namespace {
class DevicePolicy {
public:
virtual void set_device(int device) = 0;
virtual void get_mem_info(size_t& free, size_t& tot) = 0;
virtual void raw_dev_malloc(void** ptr, size_t size) = 0;
virtual void raw_dev_free(void* ptr) = 0;
virtual ~DevicePolicy() = default;
};
#if MGB_CUDA
class CudaDevicePolicy : public DevicePolicy {
public:
void set_device(int device) override {
MGB_CUDA_CHECK(cudaSetDevice(device));
}
void get_mem_info(size_t& free, size_t& tot) override {
MGB_CUDA_CHECK(cudaMemGetInfo(&free, &tot));
}
void raw_dev_malloc(void** ptr, size_t size) override {
MGB_CUDA_CHECK(cudaMalloc(ptr, size));
}
void raw_dev_free(void* ptr) override { MGB_CUDA_CHECK(cudaFree(ptr)); }
};
#endif
using Callback = std::function<void()>;
void test_free_mem(CompNode cn0, CompNode cn1, DevicePolicy* policy,
const Callback& before_run, const Callback& after_run) {
size_t tot, free;
policy->set_device(0);
policy->get_mem_info(free, tot);
// exception
auto do_run = [cn0, cn1, policy, free]() {
void* tmp;
policy->raw_dev_malloc(&tmp, free / 3);
auto dev_free = [&](void* ptr) {
policy->raw_dev_free(ptr);
};
std::unique_ptr<void, decltype(dev_free)> tmp_owner{tmp, dev_free};
auto check_free = [&](const char* msg, size_t expect) {
auto get = cn0.get_mem_status_bytes().second;
ASSERT_LE(std::abs(static_cast<intptr_t>(get) -
static_cast<intptr_t>(expect)),
static_cast<intptr_t>(free) / 4)
<< ssprintf("%s: get=%.2fMiB expect=%.2fMiB", msg,
get / 1024.0 / 1024, expect / 1024.0 / 1024);
};
check_free("direct get", free * 2 / 3);
DeviceTensorStorage tensor{cn0};
tensor.ensure_size(free / 3).ptr();
check_free("after dev alloc", free / 3);
tmp_owner.reset();
check_free("after outer release", free * 2 / 3);
tensor = {cn0};
check_free("after all release", free);
DeviceTensorStorage tensor1{cn1};
tensor.ensure_size(free / 6).ptr();
tensor1.ensure_size(free / 6).ptr();
check_free("multiple streams", free * 2 / 3);
};
before_run();
MGB_TRY { do_run(); }
MGB_FINALLY(after_run(););
}
void test_gather_other(CompNode cn0, CompNode cn1) {
if (cn0.get_mem_status_bytes().second > cn1.get_mem_status_bytes().second) {
std::swap(cn0, cn1);
}
size_t elems = cn0.get_mem_status_bytes().second * 2 / 5 / sizeof(dt_int32);
auto xv = std::make_shared<DeviceTensorND>(cn0, TensorShape{elems},
dtype::Int32());
auto graph = ComputingGraph::make();
auto x = opr::SharedDeviceTensor::make(*graph, xv), x1 = x + 1,
x2 = opr::MarkDynamicVar::make(x), y = opr::Copy::make(x1, {cn1});
// x1 must be released (which requires y to finish) before x2 succeeds
set_priority(x1, -10);
set_priority(y, -10);
graph->options().var_sanity_check_first_run = false;
graph->options().async_exec_level = 0;
auto func = graph->compile({{x2, {}}, {y, {}}});
opr::Sleep::sleep(cn1, 0.7);
func->execute();
}
} // namespace
#if MGB_CUDA
TEST(TestCudaMemAlloc, GatherOther) {
REQUIRE_GPU(2);
auto cn0 = CompNode::load("gpu0"), cn1 = CompNode::load("gpu1");
test_gather_other(cn0, cn1);
}
TEST(TestCudaMemAlloc, FreeMem) {
// check whether cuda device free mem is correctly impelmented
REQUIRE_GPU(1);
CompNode::finalize();
// same device but different stream
auto cn0 = CompNode::load("gpu0"), cn1 = CompNode::load("gpu0:1");
auto policy = std::make_unique<CudaDevicePolicy>();
constexpr const char* KEY = "MGB_CUDA_RESERVE_MEMORY";
auto old_value = getenv(KEY);
auto reserve = [&]() { setenv(KEY, "1", 1); };
auto restore = [&]() {
if (old_value) {
setenv(KEY, old_value, 1);
} else {
unsetenv(KEY);
}
CompNode::finalize();
};
test_free_mem(cn0, cn1, policy.get(), reserve, restore);
}
#endif // MGB_CUDA
// vim: syntax=cpp.doxygen foldmethod=marker foldmarker=f{{{,f}}}
| 2023-11-13T01:27:17.568517 | https://example.com/article/6159 |
01. I Make The Mistake02. Of Keeping The Fire Down03. While Everything Dies04. My Shadow Self05. In The End Decides06. To Choke You Now07. So I Betray The Mission08. Still it Has Only Just Begun09. As We Can Not be One10. Forever Will Be Gone | 2024-06-04T01:27:17.568517 | https://example.com/article/2404 |
Open magnetic resonance imaging using titanium-zirconium needles: improved accuracy for interstitial brachytherapy implants?
To evaluate the benefit of using an open magnetic resonance (MR) machine and new MR-compatible needles to improve the accuracy of brachytherapy implants in pelvic tumors. The open MR machine, foreseen for interventional procedures, allows direct visualization of the pelvic structures that are to be implanted. For that purpose, we have developed MR- and CT-compatible titanium-zirconium (Ti-Zr) brachytherapy needles that allow implantations to be carried out under the magnetic field. In order to test the technical feasibility of this new approach, stainless steel (SS) and Ti-Zr needles were first compared in a tissue-equivalent phantom. In a second step, two patients implanted with Ti-Zr needles in the brachytherapy operating room were scanned in the open MR machine. In a third phase, four patients were implanted directly under open MR control. The artifacts induced by both materials were significantly different, strongly favoring the Ti-Zr needles. The implantation in both first patients confirmed the excellent quality of the pictures obtained with the needles in vivo and showed suboptimal implant geometry in both patients. In the next 4 patients, the tumor could be punctured with excellent accuracy, and the adjacent structures could be easily avoided. We conclude that open MR using MR-compatible needles is a very promising tool in brachytherapy, especially for pelvic tumors. | 2024-07-09T01:27:17.568517 | https://example.com/article/8173 |
<?xml version="1.0" encoding="utf-8"?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8"/>
<link rel="stylesheet" type="text/css" href="../css/mahabharata.css"/>
<title title="Shalya-parva">शल्य पर्व</title>
</head>
<body class="titlepage">
<h1 class="title" title="Shalya-parva">शल्य पर्व</h1>
</body>
</html>
| 2024-01-04T01:27:17.568517 | https://example.com/article/7736 |
Q:
Can I use overflow:hidden without an explicit height somehow?
I have an image with float:left, and I’d like it to overflow its parent, but cut off the overflow. Here’s what it looks like without any overflow rules:
Here’s what I want:
Here’s a fiddle: http://jsfiddle.net/ZA5Lm/
For some reason, it was decided that overflow:hidden without an explicit height results in the element growing.
Can I somehow achieve the effect I’m after without setting an explicit height? An explicit height doesn’t work because I want this div to size automatically based on content length and browser width.
A:
In my opinion using overflow: hidden without setting dimensions doesn't make sense. If you don't want to specify the height of the container and if your images have a fixed width you could use this solution: http://jsfiddle.net/ZA5Lm/11/
The image is positioned with absolute, taking it out of the text-flow. However - and I'm aware that this may be ugly - you need to specify a padding-left to move the text away from the image.
| 2024-07-05T01:27:17.568517 | https://example.com/article/8742 |
Bulova: Education to be major focus in 2014
FAIRFAX, Va. – Fairfax County Chair Sharon Bulova gave her annual State of the County address Tuesday and education will take front and center this year as the county faces tremendous student population growth and a building crunch.
During a press conference Wednesday morning following a preview of her video address, Bulova says the school system will get what it needs, but that it will not get everything its asking for.
Schools Superintendent Dr. Karen Garza is asking for $2.5 billion in her 2015 proposed budget. That’s a 2.4 percent increase over last year. But the proposed budget also calls for deep cuts and the elimination of 731 positions.
The supervisors had agreed to give the schools a 2 percent increase in funding. But Garza says if the Board of Supervisors doesn’t approve a 5.7 percent increase that even deeper cuts will be needed.
“Yes we will meet the needs of the schools. Will it be easy? No, it won’t,” Bulova says.
Bulova says the school board will have to roll up their sleeves and find ways to reduce costs just as the Board of Supervisors will, calling it another tough budget year for the county.
She says the budget will be a major challenge considering the sluggish economic recovery and the impact of sequestration on residents and businesses. The county is facing a $25 million shortfall for the coming year.
The county is responsible for funding the public school system in addition to general county services.
In addition to the focus on school funding, Bulova also highlighted several key events that residents can look forward to this year:
Opening of the first phase of the new Metro Silver Line. Bulova says the line from Falls Church to Reston will open soon.
Construction of the I-95 Express Lanes from Springfield to Stafford County will continue. The project should be completed by late 2015.
Continued revitalization of Tysons Corner.
The World Police and Fire Games. Bulova says the major sporting event will put Fairfax on the map. It’s the second largest athletic competition in the world after the Summer Olympics.
Bulova says the Games are expected to bring in well over $100 million in revenue. She says 7,000 athletes and 30,000 visitors will be coming for the Games. And that hotels are already booking athletes for the event that will coincide with the Fourth of July in 2015.
“Most of the activities will take place over a two-week period,” she says.
The venues for the games will be spread across the county. Reston Town Center will serve as the village for the athletes and George Mason University will serve as a major venue for some of the events. | 2023-12-24T01:27:17.568517 | https://example.com/article/6005 |
Nike ACG Skarn - Black/Habanero Red CD2189-001 Buy Online,Musee-lalique Online Store Buy Nike ACG Skarn - Black/Habanero Red At this stage we will issue a full refund and make arrangements with the customer. the order amount to cover all shipping costs including the original delivery cost.
The Nike ACG Collection is Here — The Fashion Law,17 Dec 2014 Nike ACG, once the standard bearer for clunky-if-functional athletic fans of Acronym who may have balked at the price of the label's technical shells, the technical prowess the world's leading athletic company has to offer. | 2023-12-04T01:27:17.568517 | https://example.com/article/7445 |
This chocolate chip cookie recipe has been my tried-and-true for several years now. Luckily, I don't have to search through all of the pinterest "best ever" recipes to find one. And really, if all of the cookies out there are the best ever, does that make them all average? How does one cookie stand out from the rest? I guess you'll have to try them all to figure it out. I received this recipe from a friend about six years ago, and I haven't turned back since. It's nice to have this recipe in my back pocket when I am craving that chocolatey, chewy, melt-in-your-mouth cookie. It turns out as I expect it to every single time. Since I haven't blogged about this recipe before, I've had to go searching through all of my paper recipes to find it. Since I prefer to search for recipes online now, I felt we could both get the benefit of having it on my blog. I hope this cookie becomes your go to from now on.
Chocolate Chip CookiesRecipe from a friend
INGREDIENTS
2/3 cup butter, softened
2/3 cup shortening
1 cup white sugar
1 cup brown sugar
1 tsp. vanilla extract
2 eggs, room temp.*
--
3 1/2 cups all-purpose flour
1 tsp. salt
1 tsp. baking soda
--
12 oz. bag of semi-sweet chocolate chips
DIRECTIONS
Preheat oven to 350 degrees or 325 degrees for a convection oven. Line two baking sheets with parchment paper.
Cream together butter, shortening, both sugars and vanilla extract in a large bowl, about 3 minutes. Add in eggs one at a time.
Mix dry ingredients together in a separate bowl. Slowly add in to creamy mixture. Add in chocolate chips. Mix well.
Scoop heaping spoonfuls onto a parchment-lined baking sheet. Side Note: I only bake one tray at a time on the center rack to allow for even cooking. I find it more consistent to have one tray in the oven while working on the next tray. That way one tray is always baking.
Bake for 9-11 minutes, depending on how chewy a cookie you like. I barely let mine brown before pulling them out.
Remove from oven, and transfer to a cooling rack.
Makes approximately 55 cookies.
*To bring eggs to room temperature faster, place eggs in slightly-warmer-than lukewarm water for about five minutes.
Another great find off of Pinterest. These won first place in the Food Dish best cookie contest. Of course I had to taste them for myself. A soft and chewy bite. Delicately sweet with the combination of that tangy lemon flavor. This cookie is a keeper.
Preheat oven to 350 degrees.Grease light colored baking sheets with non-stick cooking spray and set aside.In a large bowl, cream butter and sugar together until light and fluffy. Whip in vanilla, egg, lemon zest, and juice. Scrape sides and mix again.Stir in all dry ingredients slowly until just combined, excluding the powdered sugar.Scrape sides of bowl and mix again briefly. Pour powdered sugar onto a large plate.Roll a heaping teaspoon of dough into a ball and roll in powdered sugar.Place on baking sheet and repeat with remaining dough.Bake for 9-11 minutes or until bottoms begin to barely brown and cookies look matte.Remove from oven and cool cookies about three minutes before transferring to cooling rack.
*If using a non-stick darker baking tray, reduce baking time by about 2 minutes.
My grandma and grandpaTheir wedding dayA gorgeous bride and a handsome groom - my grandparents.My grandma had eight children, all unique and so special.My grandma loved her flowers. On any given day there were at least 10 small jars/vases in her kitchen of a flower she had picked or a plant stem that needed stronger roots, growing them all in water. She cared for her plants like the Lord cared for her. Every breath she took she was dedicated to her faith. And to her husband of 62 years.Mom and grandmaGrandma with my niece BreyyaMe and my two grandmasMe, grandma and my mom during her last week.Today on Valentines Day, my grandmother will be laid to rest. What better way to say I love you than today. We will honor such a strong, gentle grandmother, mother, daughter and friend to so many. I will carry you in my heart always, grandma. I love you.
i carry your heart with me (i carry it in my heart)
i am never without it (anywhere i go you go, my dear;
and whatever is done by only me is your doing, my darling)
i fear no fate (for you are my fate, my sweet)
i want no world (for beautiful you are my world, my true)
and it’s you are whatever a moon has always meant
and whatever a sun will always sing is you
here is the deepest secret nobody knows
(here is the root of the root and the bud of the bud
and the sky of the sky of a tree called life; which grows
higher than soul can hope or mind can hide)
and this is the wonder that's keeping the stars apart
Graphic designer, baker and a photo taker. Inspired by Jesus, photography, stellar design, all things creative, cooking, the arts and funny stuff.
I prefer to visually tell stories through photographs; whether a trip I was on, a dessert I made or a recent vintage find. Art is all around me, and I capture it whenever I can. | 2024-04-28T01:27:17.568517 | https://example.com/article/4232 |
Q:
codeigniter thumbnail created but original image problem
I have the code below, if i don't use watermark it's fine but when i use watermark, both the original pics and thumbnail become very small and , watermark happens on thumbnail, I want watermark on the original image, pls help
//UPLOAD IMAGE
//some $config vars for image
$config['upload_path'] = './images/blog';
$config['allowed_types'] = 'gif|jpg|jpeg|png';
$config['max_size'] = '0';
$config['remove_spaces'] = true;
$config['overwrite'] = false;
$config['max_width'] = '0';
$config['max_height'] = '0';
$this->load->library('upload', $config);
//upload main image
if(!$this->upload->do_upload('photo')){
$e = $this->upload->display_errors();
print_r($e);
}
$image = $this->upload->data();
//thumbnail creation start
$config1['image_library'] = 'gd2';
$config1['source_image'] = $image['full_path'];
$config1['create_thumb'] = TRUE;
$config1['maintain_ratio'] = TRUE;
$config1['width'] = 75;
$config1['height'] = 50;
$this->load->library('image_lib', $config1);
$this->image_lib->resize();
//thumbnail creation ends
$this->image_lib->clear();
//$image = $this->upload->data();
//start watermarking
$config2['source_image'] = $image['full_path'];
$config2['wm_text'] = 'Copyright 2011 myself';
$config2['wm_type'] = 'text';
$config2['wm_font_path'] = './system/fonts/FromWhereYouAre.ttf';
$config2['wm_font_size'] = '16';
$config2['wm_font_color'] = 'ffffff';
$config2['wm_vrt_alignment'] = 'middle';
$config2['wm_hor_alignment'] = 'center';
$config2['wm_padding'] = '20';
$this->load->library('image_lib');
$this->image_lib->initialize($config);
$this->image_lib->watermark();
//end watermarking
A:
please try adding
$config2['new_image'] = '';
in the watermarking code
| 2024-04-01T01:27:17.568517 | https://example.com/article/7022 |
Coronavirus: Broadband firms say no issue with extra demand Published duration 16 March Related Topics Coronavirus pandemic
image copyright Getty Images image caption Working from home is far from ideal for many, but ISPs insist your connection will work
UK broadband companies say they can cope with increased demand as many more people stay at home during the coronavirus crisis.
Internet service providers (ISPs) say they have contingency plans in place and that the network can deal with extra daytime demand.
Video calls and other work applications should have little impact.
But some traffic-heavy services are seeing a surge in use around the world as people stay home.
"Nobody should expect broadband to crash or anything like that," said Mark Jackson, editor of ISP Review. "That's not how these things work."
He added: "Some slowdown in speed during periods of truly heavy usage is possible. I'd expect this to be fairly limited, and that's true even in normal times."
The impact would vary between ISPs in different areas, he said - but most are set up to deal with a sudden surge.
'More than enough'
Demand at peak times in the evening can be up to ten times higher than during the working day.
But Openreach, which runs much of the UK's infrastructure, said the existing network is already built to handle peak demand.
"As an example, the Liverpool versus Everton match, which was streamed live by Amazon Prime in December, drove significant peaks in traffic over our network without causing any major issues for our customers," it said.
The sentiment is echoed by ISPs, whether they use Openreach's network or not.
BT's chief technology officer, Howard Watson, said: "We have more than enough capacity in our UK broadband network to handle mass-scale homeworking.
"Even if the same heavy data traffic that we see each evening were to run throughout the daytime, there is still enough capacity for work applications to run simultaneously."
TalkTalk said its services "regularly experience peaks in demand" and the company was confident it could manage an increase in the volume of traffic.
Virgin Media said it has yet to see "any significant network traffic spikes", but it has put plans in place for such an event.
The live-streaming of football matches at Christmas had generated "record levels of internet traffic", Vodafone said - but the network had held up.
When it comes to mobile signal, a spokesperson said it "moves capacity around" when large numbers of people stay at home. "We get to put this to the test every time it snows in the UK," they added.
Online gaming surge
Online gaming is seeing a boost as people stay at home.
Steam, the world's largest PC gaming platform, hit a new all-time high on Sunday with more than 20 million players at once.
Third-party tracking tool SteamDB said the record was "likely due to many people staying at home due to the coronavirus".
Last week an Italian telecoms company said it had seen a big surge in gaming after school closures there.
Telecom Italia's CEO told analysts that internet traffic was up by 70% - "with a big contribution from online gaming such as Fortnite". | 2023-11-05T01:27:17.568517 | https://example.com/article/1053 |
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
using System;
using System.Collections.Generic;
namespace Microsoft.ReverseProxy.Signals
{
/// <summary>
/// Represents the context in which a signal was created.
/// Signal operations can only be performed among signals in the same context
/// to ensure thread safety.
/// </summary>
/// <remarks>
/// This implementation ensures that writes to signals are sequentialized
/// and processed in a single thread.
/// </remarks>
internal sealed class SignalContext
{
private readonly Queue<Action> _workQueue = new Queue<Action>();
private bool _isExecuting;
internal SignalContext()
{
}
/// <summary>
/// Queues the given <paramref name="action"/> for execution.
/// </summary>
internal void QueueAction(Action action)
{
lock (_workQueue)
{
_workQueue.Enqueue(action);
Execute();
}
}
private void Execute()
{
// NOTE: We are already within the lock when this method is called.
if (_isExecuting)
{
// Prevent reentrancy. Reentrancy can lead to stack overflow and difficulty when debugging.
return;
}
_isExecuting = true;
try
{
while (true)
{
if (_workQueue.Count == 0)
{
return;
}
var action = _workQueue.Dequeue();
action();
}
}
finally
{
_isExecuting = false;
}
}
}
}
| 2023-08-15T01:27:17.568517 | https://example.com/article/1604 |
COACH SPEAKS
Interview with Ganguly, Laxman, Tendulkar was nerve-racking: Kumble
by Cricbuzz Staff • Published on
Anil Kumble insisted that India's mindset towards overseas Tests needed a change © Cricbuzz
Anil Kumble, the newly-appointed India coach, labelled the experience of being interviewed by Sourav Ganguly, VVS Laxman and Sachin Tendulkar (via teleconference) as 'nerve-racking'. Speaking to bcci.tv on Thursday (June 23), following his appointment, the former India captain said it was a strange experience when he had to face his former colleagues at the opposite end of the table while submitting his presentation during his job interview for the post of coach of the Indian team.
"It was very different because this was the first interview that I was attending. My colleagues who I have played with throughout my career were on the other side of the table. It was very strange. It was quite nerve-racking."
Kumble said improving the team's overseas record will be his primary goal and conceded that the team has been comfortable playing at home, whichnecessitatesa change in the mindset.
"The first four Tests will be in the West Indies where the conditions are not that different to India," he said. "But the Indian conditions are something we are all comfortable with. The focus will be on (improving) our overseas record and the mindset is something we need to address from home itself. When we sit down that's something we'll need to make a plan and ensure we train towards achieving those goals."
Having led the Test side at the fag end of his career, the 45-year-old stressed on the importance of taking the pressure off the captain a bit by creating more leaders in the camp. "[It is] important as a coach to take the burden off the captain," he said. "Captain has a lot of things on his head, all cricketing decisions and non-cricketing as well. When I was captain I realised that it's not just taking decisions on the field but off it as well. Those are quite stressful.
"Having been with the Indian team for such a long time and having had various experiences of not just conditions, but outside the cricket field, when you're a coach, you're not just coach on the field but also off it. You're trying to build personalities, trying to build leaders. That's how I'd like to look at this team. There is some wonderful talent, you need to make leaders out of them, try and understand what ticks them. It's not a quick fix, you have to understand and then take a call."
Kumble stated that working behind the scenes in a background role would suit him, citing Gary Kirsten's tenure as an example and also went on to hail the former India coach John Wright as an inspiration. "I played a lot under John Wright, he's been a great influence on how I'll go about, in terms of being in the background. When I became a mentor for Mumbai Indians, I brought John in because he understood a lot about Indian culture and then the way coaches work. So I'll pick his brain," he said.
"I was involved with Gary Kirsten only for the Test matches, (for) a very short period. He was, again, someone who worked in the background and didn't make himself visible. (That's) exactly how I'd like to work as well. Not in the front, but behind the scenes. The team comes first, the coaches play the background role, you are just trying to prepare the team for the best of their ability, for all conditions and all eventualities. You can't really plan for adversity, but to try to prepare the team to handle those adversities. That's exactly what we'll try and address."
The former leg-spinner is excited about his first series in charge, against the West Indies next month, and mentioned that he has already spoken to the Test skipper Virat Kohli. "We have the West Indies Test series coming up, so that's something our focus will be on. I've spoken to Virat [Kohli] and MS [Dhoni] must be on the flight back from Zimbabwe. It's nice to have a camp here in Bengaluru before we tour. We'll sit down and iron out and get ready for the West Indies tour.
Kumble stressed that his focus will be on bowling, which he feels is the most important aspect in winning Test matches. "Bowling, getting 20 wickets in Test cricket will win you matches. That's the focus and we'll take it from there. Batting, we have some great talent there. I believe this team has the potential. It's a young team and driven by young leaders. Looking forward to working with Virat and MS."
With former players like Rahul Dravid and Michael Hussey rejecting a chance to become the coach, considering the time they would have to devote away from their family, Kumble admitted that he took the 'major decision' after having a lengthy discussion with his family. "I had a long chat with the family, 18 years on the road, they've taken the stress and the burden. My wife and kids have been really supportive. Not easy travelling again so that was a major decision. Once those two were clear, I put my hat in the ring.
"I felt it was the right time for me to get involved. I'm still fit enough to run around. It's a young team so I believe you have to get your hands dirty, you need to be with the players, train with them, be amongst them. If it was a senior team, you can sit back, strategise and address that. But as a young team, you need to be in the middle and that's something I can do at this stage," Kumble said.
© Cricbuzz
TAGS
RELATED STORIES | 2023-11-30T01:27:17.568517 | https://example.com/article/9835 |
John gives his views on why gaming and video games are grown up already, and those calling for more "maturity" are actually the immature ones
(Disclaimer: The opinions expressed in this article are the author’s own and do not necessarily represent those of the SuperNerdLand.com staff and/or any contributors to this site.)
Ever since its inception as a medium, video games have had a difficult battle for acceptance as a legitimate art form. They are often still subject to far more restrictions in terms of content than more established art forms are. Old media has a hard time understanding the interactivity inherent in video games. Gaming has been alternatively portrayed as a waste of time, children’s toys, and even training tools for mass murder or they hardcode misogyny. Equally, the gaming community has been portrayed as infantilized, socially inept, and unable to differentiate reality from fantasy.
In reaction to this perceived image problem an idea has taken hold — a kind of conventional wisdom in some circles — that in order for gaming to be taken seriously it needs to stop making certain kinds of content all together. In their minds, if we eliminated most of the examples of violence or sexual content the media takes out of context then video games would magically gain the same respectability as motion pictures or the written word. This idea has been taken further; that the gaming community actually deserves its bad reputation for not accepting these attempts at making gaming more “cultured.” The rhetoric previously used by the media against the community is now coming from within.
This attitude is pervasive with the now depressingly familiar “in crowd” made up of some gaming press, their pet indie developers, and the culture warriors who attempt to impose their ideology on video games and the gaming community at the cost of other schools of thought. It’s part of a canon of ideas and talking points that are recycled ad nauseam in editorials, opinion pieces, and on social media.
“We could just be taken seriously and all of our image problems would disappear overnight if we did away with all these undesirable games and gamers,” goes the paraphrased argument. It’s why they tried to call us dead.
The problem is that even if they did somehow erase from existence all the sections of gaming they found “problematic” it wouldn’t make a dammed bit of difference. Old media feels threatened by video games, the internet, and the alarmingly rapid expansion of the two. This causes them to seize every opportunity to take a pot-shot at their latest competitor. If they weren’t attacking GTA then they’d be fabricating some story about animal cruelty in Nintendogs or imagining a sexism crisis in Tetris. You can’t appease the old guard who want to tear down what they don’t understand, or ideologues who rely on creating controversy to make a living. This same “fear of the new and unfamiliar” plagued movies and television when they were less established.
By giving into the demands from outside of gaming, all you do is damage it as an art form and stunt its growth. Games are at their most “mature” when they’re at their most honest and naïve; when the developer is creating something without over thinking the themes involved or consciously trying to craft a message. In this regard I think the earliest days of game design were in many ways the most mature. Creation was unbound by expectation and precociousness as developers were wrapped up in purely testing the limits of technology and of play. Straining to look grown up didn’t enter the equation.
The new push for “maturity” involves the emulation of other media — especially film — trying to get some of that old-world credibility to rub off. Like a teenager desperately drawing on fake chest-hair and trying on their dad’s clothing it simply copies what they think makes you “mature” instead of actually gaining some real wisdom. The spirit of early gaming is sorely lacking in these places. The design process has become too self-conscious, too worried about projecting an image and promoting the right ideas rather than following an internal vision.
People who are afraid of looking immature through their gaming choices, or increasingly other people’s gaming choices, betray their insecurity. The people most worried about “Game X making gaming look bad” are those with the least amount of maturity. The signalling of “superior taste” through loudly showing off your oh so “alternative” gaming choices is as grossly immature.
Once again, it’s purely adolescent behavior. They might as well be shutting themselves in their bedrooms with a Neutral Milk Hotel playlist and complaining that other people don’t listen to “real music.” The spectre of embarrassing gaming hipsterdom is never far removed from the maturity debate. When a games journalist launches into a diatribe about “gross gamer manbabies” you can practically smell the unwashed beards, $30 kale smoothies, and hair-dye.
This mentality has recently crept further and further into game localization now, with teams taking it upon themselves to remove the “Immature” or “problematic” elements of Japanese video games. Their attitude assumes that the audience is unable to handle a bit of harmless fun, and more worryingly brings us back to the days when localizers scrubbed every morsel of Japanese culture from Japanese translations. The comments made are becoming increasingly Japanophobic towards the domestic market that creates these games. They can’t seem to grasp these games are made for a different audience, an audience that isn’t them.
The result of this mindset is the ugly sneering at “anime avatars” and the pleasure derived from chiding “man-babies” who want their “petting game” by members of the press. Members of the press who are paid to cover Japanese games no less. Again I would ask, how does someone else’s gaming choice effect you? Someone enjoying a nice big juicy pair of anime tiddies has no bearing on anyone else’s corner of gaming. Enjoying the removal of content that you personally don’t like to the detriment of others is childish. It speaks to the “we’re touching your stuff” toddler instincts we’ve seen before from this same group of people.
I know I mock “walking simulators” and non-games, but the people who enjoy those things are entitled to exist, and if there is a market for those games then so be it. My problem is that their audience tends to have a huge overlap with people who want to impose their preferences on other people. Gaming is at its best when it’s purely about the games; when it doesn’t focus on a whole load of extraneous bullshit. You have a right to not like something, but you don’t have a right to demand that what you don’t like then becomes unavailable to everyone else. Don’t be an asshole.
As I demonstrated in my series about Geek Culture, you can’t really bundle different communities and fan-bases together; in a sense there isn’t one entity of “gamers” anymore. Aside from their love of video games there might not be one genre two particular gamers have in common. Gaming is a mainstream medium big enough that one section of the market doesn’t necessarily have any effect on another section of the market. Those who hold the worldview that games like Hatred set gaming back as an art form have a mindset decades out of date that worries more about the opinions of non-gamers than gamers themselves.
As was seen in the Brown Vs. ESA supreme court case, games are protected speech in the USA — the place most caught up in this debate. Japan on the other hand continues to not give a single fuck, only removing content to appease us baka Western piggus. Video games are so enriched in Japanese culture at this point that the debate about “how will this make gaming look?” in the west must look absurd to them. And quite rightly, no one says that the whole of film is besmirched when a particularly distasteful movie comes out. No one is worried that the existence of pornography will suddenly cause society to reject moving images any more than they worry hateful books will cause people to wholesale reject the written word. It’s time to stop thinking of video games as this fragile little niche and start viewing them as the mass-media they’ve become. A mass media free to be whatever it wants to in a free market.
For games to flourish as an art form they need to be completely uncensored and open to all premises and ideas; even those seen as puerile and distasteful. In a world where a urinal and an unmade bed are considered high art I don’t think a few panty shots and a bit of vulgar humour is going to bring down gaming as legitimate form of expression — in fact their presence is vital.
My final message to the “maturity police” would be this: video games and gamers don’t need to grow up. YOU do. | 2024-03-07T01:27:17.568517 | https://example.com/article/5579 |
Tag Archives: pray
Post navigation
Here’s a great principle of prayer: You can do a great deal for people after you pray for them but little of lasting value until you pray for them.
I don’t think I need to argue about the value of praying for your spouse, kids, and friends. But sometimes in our busy culture it’s tough to clear your mind and get started. So let’s look to a man who knew the value of prayer. The apostle Paul begins many of his letters with a helpful pattern.
If you look at his letter to the Philippians, for instance, you’ll see it begins with a blessing of grace and peace. Grace is the reason for our salvation and peace is the result. Paul then gives thanks for the Philippian believers. Cherish the work that God’s doing in and through others. Next Paul makes requests to aid the spiritual growth of his friends. He wants them to grow in their love, knowledge, and understanding of Christ. Last, Paul prays that they’d behave in a manner that honors God in light of coming judgment. This isn’t a fear tactic but a reminder to live for the ultimate goal of heaven, not the short-term rewards of comfort and pleasure.
God loves it when we come to him in prayer. Will you select one person that God has placed on your heart, and write a prayer for them? For help, look to Paul’s letter to the Philippians.
It’s easy to say you love God but how do you show it?God’s hoping you’ll show it by loving other people. In fact, God has so intertwined your love for Him with love for others that when you seek and surrender to Him, He requires that you give up your hatred and prejudice.
In first John chapter four, the apostle John wrote: ‘God is love, and all who live in love live in God, and God lives in them’If someone says, ‘I love God,’ but hates a Christian brother or sister, that person is a liar; for if we don’t love people we can see, how can we love God, whom we have not seen?God himself has commanded that we must love not only him but our Christian brothers and sisters, too.’
Men, God simply doesn’t give us the option of hating our brothers and sisters while loving Him.In fact, He doesn’t even give you the option of hating your enemies.Jesus said, ‘But if you are willing to listen, I say, love your enemies. Do good to those who hate you. Pray for the happiness of those who curse you.Pray for those who hurt you’ (Luke 6:27-28). Boy, that’s a revolutionary kind of love.
The bottom line is this: surrendering to God means surrendering your hatred as well.And that, my friend, is something you can’t do on your own ‘ you need to depend upon God’s love, residing in you, to do that.
Anyone who investigates the extent and effects of pornography in our country is tempted to conclude: ‘The problem’s too big to be beaten.’ Or perhaps: ‘What could I possibly do to make a difference in something so overblown?’ Folks, don’t succumb to these temptations. You can make a difference! In fact, if you love Jesus Christ; if you love your children; if you love your neighbor; then being passive and accepting defeat just isn’t an option.
God is holy. All forms of evil’pornography included’contradict God’s character. Therefore, God doesn’t’and can’t’compromise with it, or be reconciled to it. Make no mistake: God hates all forms of wickedness. So if you belong to Him, you must ask yourself: ‘Can I dare be indifferent to what my Lord hates and opposes?’ Clearly, you cannot.
In a Christianity Today editorial, I read four ways you can stem the rising tide of pornograpy:
1)Teach sex education at home and in church-sponsored programs.
2)Speak out against pornography, whether to PTA groups or to family stores selling pornographic materials.
3)Support those who are waging a battle against porn through petitions, letters, and boycotts.
4)Support and encourage any forums that will help people distinguish between opposition to pornography and the limitations to free speech.
And in all these things, pray. Pray that God will strengthen your hands and your heart for His service, and that, through His power, your efforts will bear fruit. | 2024-06-21T01:27:17.568517 | https://example.com/article/8276 |
Grafton Township strips supervisor of credit cards
The Grafton Township Board voted Thursday to strip the supervisor’s use of credit and debit cards for township expenses and cancel the cards.
During debate, Supervisor Linda Moore questioned the legality of the move.
The vote was 4-1.
The four trustees who voted to take the cards from Moore argued that she had abused her financial privileges as supervisor.
Moore was the lone vote to retain her use of the cards.
“We’ve operated many, many years without credit cards or debit cards, and our supervisor is misusing these cards, and I’m saying it is time to eliminate them,” Trustee Betty Zirk said.
The action highlights mounting acrimony between the board and Moore, who spent more than $3,800 last month on legal expenses in an ongoing battle with the board over uses of township money.
“Tell me what statute you are applying?” Moore said.
That comment drew a sharp reply from Trustee Rob LaPorta. “After seeing month and month of abuse and excessive charges that you have been doing that we continue to tell you to stop on ... we have the right to do what we are doing now,” LaPorta said, although he never cited a specific law that allows the board to cancel the supervisor’s use of credit and checking accounts.
“We are accountable to do this,” he said.
In April, an appellate judge ordered Grafton Township to pay $20,000 to a computer forensics company hired by the board after the trustees alleged Moore had deleted financial records.
The board’s discontent over Moore’s financial handling of the township continued Thursday. The board voted not to pay certain vendors.
Local governments traditionally review and approve bills without discussion. After a 30-minute discussion over April’s bills, the board voted, 4-1, to not pay 10 vendors, including a $600 payment to police for staffing the annual township meeting.
The four trustees argued the police were an unnecessary expense. Moore was the only one to vote against the measure.
In other business, the board decided to hold a special meeting to discuss its 2013 budget, after the board could not agree on certain adjustments. The meeting will be before the township’s regular meeting in June.
Get our city government newsletter
We've got the latest scoops and exclusive content on what your city government is up to and how it affects you in our free newsletter | 2024-07-25T01:27:17.568517 | https://example.com/article/6420 |
Is There a Gender Pay Gap? Not on 'Game of Thrones'
As our last consensus show, Game of Thrones feels like a relic of a bygone era, before the rise of streaming all but killed event television as we know it. But when it comes to the show’s finances, GoT is far more progressive than any of its counterparts. While the disparity in pay between male and female actors continues to be a contentious issue in Hollywood, a new report from Variety reveals that HBO pays GoT’s five leads the same per-episode salary, regardless of their gender.
Emilia Clarke, Nikolaj Coster-Waldau, Peter Dinklage, Kit Harrington and Lena Headey were each paid a hefty $500,000 per episode this season, which implies that the network values its five most popular stars equally. And why wouldn’t it? GoT features female characters in positions of real power more than any other show on television. That was never more apparent than in season 7, whose central conflict revolved around Cersei and Daenerys’ battle for the Iron Throne, while Jamie, Jon and Tyrion served them accordingly.
Up north, Sansa Stark was in charge despite Littlefinger’s best efforts to seize control. Though Sophie Turner and Maisie Williams don’t make us much as the show’s five principal leads (their salaries weren’t revealed), we’re going to go ahead and assume that they won’t be going hungry anytime soon.
The news comes just one week after Forbes published its list of highest paid actors, which revealed a huge disparity between what male and female stars earn. If HBO is seen as a place that promotes equal pay, it could help tip the scales even further in television’s favor as the new de facto home for Hollywood’s A-list talent. | 2024-06-06T01:27:17.568517 | https://example.com/article/1423 |
Perspective always a good thing this time of year
Let's pause from the news that is almost certain to break out later on Friday (Joe Philbin in town, the Jeff Fisher watch) to take account of what is going on right now.
I know the narrative in covering the Dolphins is often that the entire organization is comprised of bumbling, driveling dumb-dumbs. Anytiome I write anything even remotely positive, many of you call me a homer. You say anyone that works for the Dolphins is not as good as the guy working for the Patriots, Packers, Giants, Saints or Ravens because, well, those teams are better than the Dolphins.
So their people are obviously better than Miami's people.
Well, that is sometimes the case. It's undeniable.
But not always.
I knew long ago when the Dolphins got rid of Wes Welker and he turned out to be quite special in New England that mediocre results here don't mean a player or coach or front office man is mediocre. I learned the lesson when the Dolphins fired Mike Westhoff and he is still one of the better special teams coaches in the NFL. I learned it when year after year Miami would blow out assistants like Mike Mularkey, Joel Collier, Dom Capers, Clarence Brooks, Paul Boudreau, or Keith Armstrong, and they'd land somewhere else and do great work.
Same with the upper management.
People we don't appreciate much here leave or are fired and they end up being great for other teams. Browns President Bryan Weidermeier and former Dolphins marketing man Jim Ross come to mind.
I'm reminded of this because the Dolphins were a disasterous 6-10 this season. And someone has to be responsible. So we think everyone in the organization thus sucks.
Not true.
Too simplistic to think that way.
There are quality people working for the Miami Dolphins today. There are fewer, than years ago, I grant you, but still there are quality professionals around.
In coaching, you can tell quality beyond player production in how quickly folks get hired. I assure you men such as Mike Nolan, Bryan Cox, Todd Bowles and Brian Daboll will not be unemployed long if they are not retained in Miami.
And it says something when Brian Gaine out of the personnel department is mentioned as a candidate for the Rams general manager job. (I don't know Gaine that well, have heard some things about him I didn't love, but still am open enough to believe he brings certain gifts to his job.)
It says something when Bowles is considered a candidate to interview for head coach jobs elsewhere. Bowles, by the way, reportedly is on the Rams radar to interview for their open job. The NFL Network reported the Dolphins denied the interview request but that is inaccurate. The Dolphins had not even received the consent request form as of late Thursday.
But I digress ...
The point here is we have to take a step back and breathe sometimes during these hectic times following a terrible season. No, the club is definitely not producing. One playoff appearance in a decade is completely unacceptable and I understand the frustration that has caused. | 2023-12-14T01:27:17.568517 | https://example.com/article/7856 |
[The effect of L-DOPA on the accumulation of lipid peroxidation products in separate brain structures during irradiation].
A study was made of the effect of L-DOPA on the dynamics of changes in lipid peroxidation products (LPP) and the content of various types of SH groups in certain brain structures (oblongata, cerebellum, visual and sensorimotor cortex) and their synaptosomal fractions upon irradiation. The preadministration of L-DOPA to irradiated rats inhibited LPP accumulation, prevented the decrease in the content of various types of thiols and thus exerted an antioxidant effect. | 2024-03-22T01:27:17.568517 | https://example.com/article/7500 |
Sunday, June 21, 2015
June 19th (Day 170) Bible Reading
1 Kings 20:1-21:29
Acts 12:24-13:15
Psalm 137:1-9
Proverbs 17:16
1Ki 20:1
And Benhadad the king of Syria gathered all his host together: and there
were thirty and two kings with him, and horses, and chariots: and he went
up and besieged Samaria, and warred against it.
1Ki 20:2 And he
sent messengers to Ahab king of Israel into the city, and said unto him, Thus
saith Benhadad,
1Ki 20:3 Thy
silver and thy gold is mine; thy wives also and thy children, even
the goodliest, are mine.
1Ki 20:4 And the
king of Israel answered and said, My lord, O king, according to thy saying, I am
thine, and all that I have.
1Ki 20:5 And the
messengers came again, and said, Thus speaketh Benhadad, saying, Although I
have sent unto thee, saying, Thou shalt deliver me thy silver, and thy gold,
and thy wives, and thy children;
1Ki 20:6 Yet I
will send my servants unto thee to morrow about this time, and they shall
search thine house, and the houses of thy servants; and it shall be, that
whatsoever is pleasant in thine eyes, they shall put it in their hand,
and take it away.
1Ki 20:7 Then the
king of Israel called all the elders of the land, and said, Mark, I pray you,
and see how this man seeketh mischief: for he sent unto me for my wives,
and for my children, and for my silver, and for my gold; and I denied him not.
1Ki 20:8 And all
the elders and all the people said unto him, Hearken not unto him, nor
consent.
1Ki 20:9 Wherefore
he said unto the messengers of Benhadad, Tell my lord the king, All that thou
didst send for to thy servant at the first I will do: but this thing I may not
do. And the messengers departed, and brought him word again.
1Ki 20:10 And
Benhadad sent unto him, and said, The gods do so unto me, and more also, if the
dust of Samaria shall suffice for handfuls for all the people that follow me.
1Ki 20:11 And the
king of Israel answered and said, Tell him, Let not him that girdeth on his
harness boast himself as he that putteth it off.
1Ki 20:12 And it
came to pass, when Benhadad heard this message, as he was
drinking, he and the kings in the pavilions, that he said unto his servants,
Set yourselves in array. And they set themselves in array against
the city.
1Ki 20:13 And,
behold, there came a prophet unto Ahab king of Israel, saying, Thus saith the
LORD, Hast thou seen all this great multitude? behold, I will deliver it into
thine hand this day; and thou shalt know that I am the LORD.
1Ki 20:14 And Ahab
said, By whom? And he said, Thus saith the LORD, Even by the young men
of the princes of the provinces. Then he said, Who shall order the battle? And
he answered, Thou.
1Ki 20:15 Then he
numbered the young men of the princes of the provinces, and they were two
hundred and thirty two: and after them he numbered all the people, even
all the children of Israel, being seven thousand.
1Ki 20:16 And they
went out at noon. But Benhadad was drinking himself drunk in the
pavilions, he and the kings, the thirty and two kings that helped him.
1Ki 20:17 And the
young men of the princes of the provinces went out first; and Benhadad sent
out, and they told him, saying, There are men come out of Samaria.
1Ki 20:18 And he
said, Whether they be come out for peace, take them alive; or whether they be
come out for war, take them alive.
1Ki 20:19 So these
young men of the princes of the provinces came out of the city, and the army
which followed them.
1Ki 20:20 And they
slew every one his man: and the Syrians fled; and Israel pursued them: and
Benhadad the king of Syria escaped on an horse with the horsemen.
1Ki 20:21 And the
king of Israel went out, and smote the horses and chariots, and slew the
Syrians with a great slaughter.
1Ki 20:22 And the
prophet came to the king of Israel, and said unto him, Go, strengthen thyself,
and mark, and see what thou doest: for at the return of the year the king of
Syria will come up against thee.
1Ki 20:23 And the
servants of the king of Syria said unto him, Their gods are gods of the
hills; therefore they were stronger than we; but let us fight against them in
the plain, and surely we shall be stronger than they.
1Ki 20:24 And do
this thing, Take the kings away, every man out of his place, and put captains
in their rooms:
1Ki 20:25 And
number thee an army, like the army that thou hast lost, horse for horse, and
chariot for chariot: and we will fight against them in the plain, and
surely we shall be stronger than they. And he hearkened unto their voice, and
did so.
1Ki 20:26 And it
came to pass at the return of the year, that Benhadad numbered the Syrians, and
went up to Aphek, to fight against Israel.
1Ki 20:27 And the
children of Israel were numbered, and were all present, and went against them:
and the children of Israel pitched before them like two little flocks of kids;
but the Syrians filled the country.
1Ki 20:28 And
there came a man of God, and spake unto the king of Israel, and said, Thus
saith the LORD, Because the Syrians have said, The LORD is God of the
hills, but he is not God of the valleys, therefore will I deliver all
this great multitude into thine hand, and ye shall know that I am the
LORD.
1Ki 20:29 And they
pitched one over against the other seven days. And so it was, that in
the seventh day the battle was joined: and the children of Israel slew of the
Syrians an hundred thousand footmen in one day.
1Ki 20:30 But the
rest fled to Aphek, into the city; and there a wall fell upon twenty and
seven thousand of the men that were left. And Benhadad fled, and came
into the city, into an inner chamber.
1Ki 20:31 And his
servants said unto him, Behold now, we have heard that the kings of the house
of Israel are merciful kings: let us, I pray thee, put sackcloth on our
loins, and ropes upon our heads, and go out to the king of Israel: peradventure
he will save thy life.
1Ki 20:32 So they
girded sackcloth on their loins, and put ropes on their heads, and came
to the king of Israel, and said, Thy servant Benhadad saith, I pray thee, let
me live. And he said, Is he yet alive? he is my brother.
1Ki 20:33 Now the
men did diligently observe whether any thing would come from him, and
did hastily catch it: and they said, Thy brother Benhadad. Then he said,
Go ye, bring him. Then Benhadad came forth to him; and he caused him to come up
into the chariot.
1Ki 20:34 And Benhadad
said unto him, The cities, which my father took from thy father, I will
restore; and thou shalt make streets for thee in Damascus, as my father made in
Samaria. Then said Ahab, I will send thee away with this covenant. So he
made a covenant with him, and sent him away.
1Ki 20:35 And a
certain man of the sons of the prophets said unto his neighbour in the word of
the LORD, Smite me, I pray thee. And the man refused to smite him.
1Ki 20:36 Then
said he unto him, Because thou hast not obeyed the voice of the LORD, behold,
as soon as thou art departed from me, a lion shall slay thee. And as soon as he
was departed from him, a lion found him, and slew him.
1Ki 20:37 Then he
found another man, and said, Smite me, I pray thee. And the man smote him, so
that in smiting he wounded him.
1Ki 20:38 So the
prophet departed, and waited for the king by the way, and disguised himself
with ashes upon his face.
1Ki 20:39 And as
the king passed by, he cried unto the king: and he said, Thy servant went out
into the midst of the battle; and, behold, a man turned aside, and brought a
man unto me, and said, Keep this man: if by any means he be missing, then shall
thy life be for his life, or else thou shalt pay a talent of silver.
1Ki 20:40 And as
thy servant was busy here and there, he was gone. And the king of Israel said
unto him, So shall thy judgment be; thyself hast decided it.
1Ki 20:41 And he
hasted, and took the ashes away from his face; and the king of Israel discerned
him that he was of the prophets.
1Ki 20:42 And he
said unto him, Thus saith the LORD, Because thou hast let go out of thy
hand a man whom I appointed to utter destruction, therefore thy life shall go
for his life, and thy people for his people.
1Ki 20:43 And the
king of Israel went to his house heavy and displeased, and came to Samaria.
1Ki 21:1
And it came to pass after these things, that Naboth the
Jezreelite had a vineyard, which was in Jezreel, hard by the palace of
Ahab king of Samaria.
1Ki 21:2 And Ahab
spake unto Naboth, saying, Give me thy vineyard, that I may have it for a
garden of herbs, because it is near unto my house: and I will give thee
for it a better vineyard than it; or, if it seem good to thee, I will
give thee the worth of it in money.
1Ki 21:3 And
Naboth said to Ahab, The LORD forbid it me, that I should give the inheritance
of my fathers unto thee.
1Ki 21:4 And Ahab
came into his house heavy and displeased because of the word which Naboth the
Jezreelite had spoken to him: for he had said, I will not give thee the
inheritance of my fathers. And he laid him down upon his bed, and turned away
his face, and would eat no bread.
1Ki 21:5 But
Jezebel his wife came to him, and said unto him, Why is thy spirit so sad, that
thou eatest no bread?
1Ki 21:6 And he
said unto her, Because I spake unto Naboth the Jezreelite, and said unto him,
Give me thy vineyard for money; or else, if it please thee, I will give thee another
vineyard for it: and he answered, I will not give thee my vineyard.
1Ki 21:7 And
Jezebel his wife said unto him, Dost thou now govern the kingdom of Israel?
arise, and eat bread, and let thine heart be merry: I will give thee the
vineyard of Naboth the Jezreelite.
1Ki 21:8 So she
wrote letters in Ahab's name, and sealed them with his seal, and sent
the letters unto the elders and to the nobles that were in his city,
dwelling with Naboth.
1Ki 21:9 And she
wrote in the letters, saying, Proclaim a fast, and set Naboth on high among the
people:
1Ki 21:10 And set
two men, sons of Belial, before him, to bear witness against him, saying, Thou
didst blaspheme God and the king. And then carry him out, and stone him,
that he may die.
1Ki 21:11 And the
men of his city, even the elders and the nobles who were the inhabitants
in his city, did as Jezebel had sent unto them, and as it was
written in the letters which she had sent unto them.
1Ki 21:12 They
proclaimed a fast, and set Naboth on high among the people.
1Ki 21:13 And
there came in two men, children of Belial, and sat before him: and the men of
Belial witnessed against him, even against Naboth, in the presence of
the people, saying, Naboth did blaspheme God and the king. Then they carried
him forth out of the city, and stoned him with stones, that he died.
1Ki 21:14 Then
they sent to Jezebel, saying, Naboth is stoned, and is dead.
1Ki 21:15 And it
came to pass, when Jezebel heard that Naboth was stoned, and was dead, that
Jezebel said to Ahab, Arise, take possession of the vineyard of Naboth the Jezreelite,
which he refused to give thee for money: for Naboth is not alive, but dead.
1Ki 21:16 And it
came to pass, when Ahab heard that Naboth was dead, that Ahab rose up to go
down to the vineyard of Naboth the Jezreelite, to take possession of it.
1Ki 21:17 And the
word of the LORD came to Elijah the Tishbite, saying,
1Ki 21:18 Arise,
go down to meet Ahab king of Israel, which is in Samaria: behold, he
is in the vineyard of Naboth, whither he is gone down to possess it.
1Ki 21:20 And Ahab
said to Elijah, Hast thou found me, O mine enemy? And he answered, I have found
thee: because thou hast sold thyself to work evil in the sight of the
LORD.
1Ki 21:21 Behold,
I will bring evil upon thee, and will take away thy posterity, and will cut off
from Ahab him that pisseth against the wall, and him that is shut up and left
in Israel,
1Ki 21:22 And will
make thine house like the house of Jeroboam the son of Nebat, and like the
house of Baasha the son of Ahijah, for the provocation wherewith thou hast
provoked me to anger, and made Israel to sin.
1Ki 21:23 And of
Jezebel also spake the LORD, saying, The dogs shall eat Jezebel by the wall of
Jezreel.
1Ki 21:24 Him that
dieth of Ahab in the city the dogs shall eat; and him that dieth in the field
shall the fowls of the air eat.
1Ki 21:25 But
there was none like unto Ahab, which did sell himself to work wickedness in the
sight of the LORD, whom Jezebel his wife stirred up.
1Ki 21:26 And he
did very abominably in following idols, according to all things as did
the Amorites, whom the LORD cast out before the children of Israel.
1Ki 21:27 And it
came to pass, when Ahab heard those words, that he rent his clothes, and put
sackcloth upon his flesh, and fasted, and lay in sackcloth, and went softly.
1Ki 21:28 And the
word of the LORD came to Elijah the Tishbite, saying,
1Ki 21:29 Seest
thou how Ahab humbleth himself before me? because he humbleth himself before
me, I will not bring the evil in his days: but in his son's days will I
bring the evil upon his house.
Act 12:24 But the
word of God grew and multiplied.
Act 12:25 And
Barnabas and Saul returned from Jerusalem, when they had fulfilled their
ministry, and took with them John, whose surname was Mark.
Act 13:1
Now there were in the church that was at Antioch certain prophets and
teachers; as Barnabas, and Simeon that was called Niger, and Lucius of Cyrene,
and Manaen, which had been brought up with Herod the tetrarch, and Saul.
Act 13:2 As they
ministered to the Lord, and fasted, the Holy Ghost said, Separate me Barnabas
and Saul for the work whereunto I have called them.
Act 13:3 And when
they had fasted and prayed, and laid their hands on them, they sent them
away.
Act 13:4 So they,
being sent forth by the Holy Ghost, departed unto Seleucia; and from thence
they sailed to Cyprus.
Act 13:5 And when
they were at Salamis, they preached the word of God in the synagogues of the
Jews: and they had also John to their minister.
Act 13:6 And when
they had gone through the isle unto Paphos, they found a certain sorcerer, a
false prophet, a Jew, whose name was Barjesus:
Act 13:7 Which was
with the deputy of the country, Sergius Paulus, a prudent man; who called for
Barnabas and Saul, and desired to hear the word of God.
Act 13:8 But
Elymas the sorcerer (for so is his name by interpretation) withstood them,
seeking to turn away the deputy from the faith.
Act 13:9 Then
Saul, (who also is called Paul,) filled with the Holy Ghost, set his
eyes on him,
Act 13:10 And
said, O full of all subtilty and all mischief, thou child of the devil, thou
enemy of all righteousness, wilt thou not cease to pervert the right ways of
the Lord?
Act 13:11 And now,
behold, the hand of the Lord is upon thee, and thou shalt be blind, not
seeing the sun for a season. And immediately there fell on him a mist and a
darkness; and he went about seeking some to lead him by the hand.
Act 13:12 Then the
deputy, when he saw what was done, believed, being astonished at the doctrine
of the Lord.
Act 13:13 Now when
Paul and his company loosed from Paphos, they came to Perga in Pamphylia: and
John departing from them returned to Jerusalem.
Act 13:14 But when
they departed from Perga, they came to Antioch in Pisidia, and went into the
synagogue on the sabbath day, and sat down.
Act 13:15 And
after the reading of the law and the prophets the rulers of the synagogue sent
unto them, saying, Ye men and brethren, if ye have any word of
exhortation for the people, say on.
Psa 137:1
By the rivers of Babylon, there we sat down, yea, we wept, when we
remembered Zion.
Psa 137:2 We hanged
our harps upon the willows in the midst thereof.
Psa 137:3 For
there they that carried us away captive required of us a song; and they that
wasted us required of us mirth, saying, Sing us one of the
songs of Zion. | 2024-05-30T01:27:17.568517 | https://example.com/article/4092 |
U.S. Pat. No. 3,177,725 | 2024-02-02T01:27:17.568517 | https://example.com/article/5327 |
Dendrometers are metrology or scientific instruments used for measuring various dimensions of trees, such as their diameter, size, shape, age, overall volume and thickness of the bark. One of the most frequently measurements acquired in the field includes DBH (Diameter at Breast Height) of trees. DBH is adopted in estimating the amount of timber volume in a single tree or stand of trees utilizing the allometric correlation between stem diameter, tree height and timber volume. DBH is also employed in estimating the age of veteran trees, given that girth or diameter increment of a tree is the only, constant non-reversible feature of growth. Currently, the two most common dendrometers are a girthing (or diameter) tape and calipers. However, these known instruments often require site visit of personnel to the trees-of-interest, which is costly and tedious for surveying forest tree plots of wide or remote areas. | 2024-04-04T01:27:17.568517 | https://example.com/article/9582 |
After four years of criticism from anti-coal groups at Duke Energy Corp.'s annual meetings, Chief Executive Jim Rogers ran into flak Thursday in Charlotte from pro-coal forces that object to the company's support for carbon regulation.
Tom Borelli of the National Center for Public Policy Research presented a shareholder proposal at this year's meeting that would force Duke to account for all its lobbying efforts in support of federal cap-and-trade programs to control carbon dioxide emissions.
The proposal was defeated. But even after the vote, Borelli and his wife, Deneen, peppered Rogers with questions and criticism about Duke's position.
And the FreedomWorks organization had picketers outside the meeting at the Duke Energy Center on Church Street, protesting carbon regulation. That group also protested outside the Charlotte Chamber's Business Person of the Year event last year, when Rogers received that award.
Joyce Kraewic of Kernersville, spokeswoman for FreedomWorks, said her group believes carbon regulation would end up costing 2 million jobs at a time when the country is struggling economically.
At the shareholder meeting, Tom Borelli said Rogers had set Charlotte-based Duke on "a risky course" that would raise electricity prices and ultimately hurt its stockholders. He argued that Duke had made a deal to support legislation in return for free carbon allowances that would let the company and other utilities emit carbon for a few years.
Creating a market in carbon would open the power industry to the kind of problems that plagued financial companies in the derivative markets, Borelli said. "You are inflating a green bubble ... betting on carbon dioxide," he said. He called the position a "lose-lose for shareholders." | 2023-08-13T01:27:17.568517 | https://example.com/article/7654 |
Mark Cuban again said he doubts Donald Trump has as much money as he says he does. | Getty Cuban: Trump 'doesn't have the cash' to self-fund
Mark Cuban isn’t buying Donald Trump’s claim that he could self-fund his presidential campaign if he needed to.
“If @realDonaldTrump were fractionally as rich as he says he is, he would write a$200mm check to propel his campaign,” the billionaire entrepreneur and Dallas Mavericks owner wrote Tuesday on Twitter. “He doesn't have the cash.”
Cuban’s comments followed Trump’s media offensive Tuesday, punching back against a Federal Election Commission report showing his campaign had just $1.3 million in cash on hand at the beginning of June. Hillary Clinton’s campaign, by comparison, boasted a war chest filled with $42 million at the beginning of the month.
It’s not the first time that Cuban has been critical of Trump’s financial claims. The “Shark Tank” judge publicly doubted Trump’s stated net worth of $10 billion, and later predicted that the real estate mogul would “have to grovel” for cash from political donors. He has also attacked Trump’s myriad business interests and has indicated he’d be open to running as Hillary Clinton’s vice presidential pick, a ticket Democratic insiders have deemed unlikely.
Trump boasted in separate interviews on Fox News’ “Fox & Friends" and NBC’s “Today” that his paltry campaign fundraising operation wasn’t paltry at all. He said he raised $12 million for the Republican Party over the weekend on the campaign trail in Texas, Nevada and Arizona but complained that while much of the GOP has backed him, the refusal by some Republicans to get in line has hurt his wallet.
Even without a unified party behind him, Trump said he could easily infuse his own money into the general election campaign, the claim that Cuban found dubious.
"I have a lot of cash and I can do like I did with the other,” Trump said, referring to his primary bid. “Just spend money on myself and go happily along, and I think I win that way.” | 2024-02-29T01:27:17.568517 | https://example.com/article/5636 |
All of this may appall some in the West. Why, they wonder, is Islam so obsessed with law? This has led some critics to assert that “Islam is not even a religion” but rather “a political system.”
The reason for this misunderstanding is that many Westerners’ ideas about religion are based mainly on Christianity, whose very Savior reportedly gave up the will to legislate “the kingdom of this world.”
However, there is another Abrahamic religion that is much more similar to Islam on this matter, and it may offer some perspective: Judaism. The Jewish tradition of divine law, Halakha, which also means “the way,” is what Shariah is modeled on. Like Shariah, Halakha has many rules on matters of personal observance — what to eat, what to wear — that Orthodox Jews still follow. But it also has harsh punishments, including stoning and even burning to death, for crimes such as adultery, blasphemy and idolatry.
The big difference between Judaism and Islam here is that the former lost political power nearly 2,000 years ago, at which time the Halakha’s penal code became ineffective. Rabbis, as leaders of often persecuted minorities, accepted the laws of their host countries, declaring, “the law of the kingdom is the law.” Today, most Muslim scholars give the same advice to Muslims living in the West, whereas Islamists don’t want to give up the ideal of theocracy. (The modern state of Israel was born as mainly a secular entity, and those who would like to see a state run according to Halakha constitute a small minority.)
Yet a lack of power wasn’t the only thing that led Jews to abandon the constraints of Halakha, there was also the Enlightenment — more specifically the “Jewish Enlightenment.” Its proponents, like the 18th-century philosopher Moses Mendelssohn, reinterpreted Judaism in the light of modern values like secular knowledge, rationality and freedom of conscience. The arguments Mendelssohn articulated in his 1783 masterpiece, “Jerusalem, or on Religious Power and Judaism,” are remarkably similar to the arguments by Muslim reformists today. (In other words, the Jewish Enlightenment, not Martin Luther’s Protestant Reformation, is the right analogy for the reform needed in contemporary Islam.)
It is also worth noting that at the time, some Western liberals viewed the Jewish Enlightenment as a futile attempt to transmute a hopelessly legalist religion. One of them was the German philosopher Immanuel Kant, who depicted Judaism as “not a religion at all, but a political constitution.” Jews would never become true Europeans, Kant added, unless they accepted “the religion of Jesus” and a “euthanasia of Judaism” took place. This anti-Semitic view from the 18th century sounds remarkably similar to some fashionable anti-Islamic views of today. | 2023-11-08T01:27:17.568517 | https://example.com/article/3110 |
Huffington Post: What I Learned About America from Visiting 100 Mosques
By Frankie Martin
Over the last two years I have been on an extraordinary journey. As a member of a research team accompanying American University’s Chair of Islamic Studies, Akbar Ahmed, I have visited over 75 US cities and 100 mosques for the book Journey into America: The Challenge of Islam, which is published this month by the Brookings Institution Press. During our fieldwork, I learned a great deal about America’s Muslim community, the religion they practice, and their various cultures. But what surprised me the most was what I learned about America.
Growing up in this country, I rarely thought about what it meant to be American. It was only in my time abroad that I began to ponder this question, first living in Kenya during high school and then as a college student traveling with Professor Ahmed on a project that visited eight Muslim countries and culminated in the 2007 book Journey into Islam: The Crisis of Globalization. Those I met on the trip in places like Jordan and Pakistan were often coming across an American for the first time. I was hit with a torrent of anti-American sentiment that left me reeling.
At first, I was tempted to think that there was little I or anyone could do about the fury I encountered. The America described to me seemed a dark fortress at home and a warmongering nation abroad, bent on exploitation and terror. Yet upon listening and showing the people I met respect, I was able to add some nuance to my earlier assessment as they welcomed me into their homes and places of worship. Yes, it turned out, they were furious, but they were furious in part because they felt betrayed. They used to have something, they said, which had been ripped away after 9/11: a belief in the ideals of America. People of every background and religious interpretation told me how much they appreciated these ideals and commonly said they were the same as those found in Islam.
Walking with Professor Ahmed near his childhood home in Karachi, I was fascinated to hear how he idolized America and people like John F. Kennedy and Martin Luther King Jr. growing up. When Jackie Kennedy visited Lahore in 1962, he told me, thousands of cheering Pakistanis lined the streets, throwing flowers at her open car. Her visit to the tribal areas elicited the same response. Now, a few feet from where we were standing, a suicide bomber had blown himself up the previous week, killing an American diplomat. Broken glass littered the ground around us. The good will had all but evaporated.
The first thing that struck me about American Muslims was their patriotism. Muslims throughout the land spoke of their love for America and frequently cited it as the best place to be a Muslim.
Yet the community is on edge, often paranoid and living in fear of Americans around them, sentiments commonly reciprocated by the Americans themselves. Although we met many compassionate Americans of all religious and cultural backgrounds who welcomed Muslims and were working towards a true pluralistic society, many also saw Islam as an insidious monolithic threat attempting a takeover of the United States. The nineteen terrorists on 9/11 had triggered a deep-seeded fear in Americans, who lashed out at any real or imagined danger.
Like those overseas, Muslims in America were acutely aware of the results of this fear and suspicion. They spoke of a gap between what they understood to be American ideals and what they had experienced.
Traveling across America we saw mosques that had been firebombed and visited Muslim American citizens who had disappeared into prisons and were held without charge in hellish conditions. We met young Muslim children who are beaten up at school and called terrorists, constantly asking their parents, “Why us?” when the police burst into their homes in the middle of the night or airline security officers give their family more scrutiny than others. While parents commonly urged patience, the explanations given by the children for their predicament were filled with anti-Semitism and talk of an American crusade against Islam. These sentiments are jarring enough when spoken in a rural madrassa in India, but positively chilling when uttered matter-of-factly by 10-year-old boys in sweatpants speaking perfect American English.
Meeting Americans who said that Muslims should not be a part of this country — and witnessing what the community is going through — got me thinking about what America means to me.
Studying the writings of the Founding Fathers, my gloom turned to pride. I was inspired to see what these extraordinary men wrote about Islam and the inclusive vision they had for the nation. John Adams cited the Prophet Muhammad as one of the world’s great truth-seekers alongside Confucius and Socrates; Thomas Jefferson learned Arabic using his Quran and hosted the first presidential iftaar during Ramadan; and Benjamin Franklin expressed his hope that the head cleric of Istanbul would preach Islam to Americans from a pulpit Franklin himself had funded, so passionate was his belief in religious freedom. In fashioning a nation of law and civil liberties, the Founding Fathers wanted to make America a haven for the oppressed and “begin the world over again,” in the words of Thomas Paine.
It is this America, the true America, that inspires American Muslims to speak of their patriotism or millions upon millions of Muslims overseas to look to the US for justice, wisdom, and hope. They do not think much of the America that sees Muslims as a dangerous foreign “other” at home and finds it necessary to torture terror suspects. And many feel hatred for the America that hascontributed to the deaths of 80,000 Somalis in the pursuit of three Al Qaeda suspects, for example, or the deaths of one million Iraqis in pursuit of no Al Qaeda suspects and weapons that never existed. Muslims at home and abroad are aware that Guantanamo Bay remains open, the Patriot Act has been extended, and the practice of indefinite detention and rendition continues.
Nearly every time I turn on the television, someone is asking what can be done to win over Muslims and defeat terrorism. The answer is simple. We should start acting like Americans. | 2024-06-01T01:27:17.568517 | https://example.com/article/2107 |
Q:
Do calling a ColdFusion web service using and have a difference in performance?
Assuming calling the same ColdFusion web service and all other factors are identical, is there a difference in performance/speed between using the following two tags?
<s:RemoteObject id="MyService" destination="ColdFusion" source="MyWSFolder.MyService"/>
and
<s:WebService id="MyService" wsdl="http://www.myDomain.com/MyWSFolder/MyService.cfc?wsdl"/>
Thanks in advance,
Monte
A:
How do you quantify performance?
The WebService tag is used for calling a SOAP WebService. SOAP requests are very wordy, causing a larger amount of data to be passed back and forth than if you were using AMF. IF using WebService, you'll also have to write parsing code in the Flex client to make the data useful.
The RemoteObject tag is used for making AMF calls over a Flash Remoting gateway. AMF is a binary fomat and has shown to give much smaller file sizes for data transport between the server and Flash. AMF also provides some built in conversion of server side data types (CFCs) to client side data types (AS3 objects).
You should check out James Ward's census application for some performance comparisons.
If you're using ColdFusion as your backend, it would be foolish to use WebService instead of RemoteObject for a flex front end. I you need to support SOAP clients with your services, the very same CF code can be used to expose a SOAP Web Service as a RemoteObject interface w/o any code changes on your end.
| 2024-02-15T01:27:17.568517 | https://example.com/article/4459 |
FIG. 19 shows an arrangement of an antenna apparatus for shared use of left/right-handed circularly polarized waves and two frequency bands set forth, for example, in Takashi Kitsuregawa, “Advanced Technology in Satellite Communication Antennas: Electrical & Mechanical Design”, ARTECH HOUSE INC., pp. 193–195, 1990.
In the figure, reference numeral 61 denotes a primary radiator for transmitting both left- and right-handed circularly polarized waves in a first frequency band to a main- or sub-reflector and for receiving both left- and right-handed circularly polarized waves in a second frequency band from the main- or sub-reflector; 62, a polarizer; 63, an orthomode transducer; 64a and 64b, diplexers; P1, an input terminal for radio waves in the first frequency band transmitted from the primary radiator 61 in a left-handed circular polarized wave; P2, an output terminal for radio waves in the second frequency band received by the primary radiator 61 in a left-handed circular polarized wave; P3, an input terminal for radio waves in the first frequency band transmitted from the primary radiator 61 in a right-handed circular polarized wave; and P4, an output terminal for radio waves in the second frequency band received by the primary radiator 61 in a right-handed circular polarized wave.
Next, an operation will be described.
Now, a linearly polarized radio wave in the first frequency band inputted from the input terminal P1 passes through the diplexer 64a, is inputted to the orthomode transducer 63 and is outputted as a vertically polarized wave. The vertically polarized wave is then converted by the polarizer 62 to a left-handed circularly polarized wave, passes through the primary radiator 61 and is radiated from the reflector into the air. Furthermore, a left-handed circularly polarized radio wave in the second frequency band received by the reflector passes through the primary radiator 61, is converted by the polarizer 62 to a vertically polarized wave, and is inputted to the orthomode transducer 63. The radio wave is then carried to the diplexer 64a and is extracted from the output terminal P2 as a linearly polarized wave.
In the meantime, a linearly polarized radio wave in the first frequency band inputted from the input terminal P3 passes through the diplexer 64b, is inputted to the orthomode transducer 63 and is outputted as a horizontally polarized wave. The horizontally polarized wave is then converted by the polarizer 62 to a right-handed circularly polarized wave, passes through the primary radiator 61 and is radiated from the reflector into the air. Furthermore, a right-handed circularly polarized radio wave in the second frequency band received by the reflector passes through the primary radiator 61, is converted by the polarizer 62 to a horizontally polarized wave, and is inputted to the orthomode transducer 63. The radio wave is then carried to the diplexer 64b and is extracted from the output terminal P4 as a linearly polarized wave.
Here, the radio waves in the first frequency band inputted from the input terminals P1 and P3 hardly leak into the output terminals P2 and P4 owing to isolation characteristics of the diplexers 64a and 64b. Furthermore, since the radio waves are converted by the orthomode transducer 63 into polarized waves which are mutually orthogonal, little interference occurs between the two radio waves. Accordingly, two transmission waves using the same frequency band and having both left- and right-handed circular polarized waves will be efficiently radiated from the primary radiator 61.
Moreover, two radio waves using the same frequency band and having both left- and right-handed circular polarized waves, received at the primary radiator 61, are converted into two linearly polarized waves which are mutually orthogonal without any interference therebetween and isolated by the polarizer 62 and the orthomode transducer 63. Furthermore, each isolated radio wave hardly leaks into the input terminals P1 and P3 owing to the isolation characteristics of the diplexers 64a and 64b. Accordingly, two transmission waves using the same frequency band and having differently rotating circular polarized waves will be efficiently outputted from the terminal 2 and the terminal 4.
In a conventional antenna apparatus, in order to efficiently extract the radio wave received at the reflector and to carry the extracted wave to a receiver connected to the output terminals P2 and P4, it has been necessary to suppress transmission loss along a path from the primary radiator 61 to the receiver as small as possible. This has resulted in a problem in that the primary radiator 61, the polarizer 62, the orthomode transducer 63, the diplexers 64a and 64b and the receiver must be located in proximity, which restricts flexibility of a configuration of those circuits.
Furthermore, in general, for machine-driven scanning of antenna beams, the primary radiator 61, the polarizer 62 and the orthomode transducer 63 rotate with the reflector. In this situation, because of the above-mentioned need for reduction of transmission loss, the diplexers 64a and 64b and the receiver must also be located at places where they rotate with the reflector. This has resulted in a problem in that a machine-driven part of the antenna apparatus grows large and heavy, and its rotating mechanism and rotation supporting mechanism grow large and heavy. | 2023-11-19T01:27:17.568517 | https://example.com/article/5999 |
In Russia, thousands of tonnes of ammunition have exploded at a military base close to the industrial city of Orenburg, near the border with Kazakhstan.
The blast led to the evacuation of nearby towns.
James Kelly reports. | 2024-04-11T01:27:17.568517 | https://example.com/article/8531 |
Category: Euro T20 Slam Teams
Euro T20 Slam teams are revealed. yes, they are finally here. The first edition is going to have six teams in total to play in this year’s league. After the official launch date of the tournament, it is now confirmed that matches will be playing across all three hosted countries, Ireland, Scotland and Netherlands. […] | 2024-01-08T01:27:17.568517 | https://example.com/article/8894 |
Physostigmine stimulates phosphoinositide breakdown in the rat neostriatum.
The reversible acetylcholinesterase inhibitor, physostigmine, stimulated in a dose-dependent manner the accumulation of [3H]inositol monophosphate ([3H]IP1) in lithium-treated neostriatal slices. The muscarinic agonists, carbachol and oxotremorine, also stimulated [3H]IP1 accumulation. Atropine completely blocked the physostigmine-induced accumulation but had no effect on the basal accumulation. Tetrodotoxin partially inhibited the physostigmine-induced [3H]IP1 accumulation but had no effect on the carbachol-induced accumulation. 4-Aminopyridine stimulated the basal [3H]IP1 accumulation and potentiated the physostigmine-induced accumulation. This potentiation was blocked by tetrodotoxin. The physostigmine dose-response curve for the stimulation of [3H]IP1 accumulation was similar to its dose-response curve to inhibit acetylcholinesterase activity in the neostriatum. The results suggest that, under our experimental conditions, the acetylcholine released spontaneously from intrinsic cholinergic neurons does not activate the striatal muscarinic receptors coupled to phosphoinositide breakdown unless the intrinsic acetylcholinesterases are inhibited. | 2024-04-06T01:27:17.568517 | https://example.com/article/9818 |
Q:
Trying to unload unmanaged and managed third party dlls
Can you tell me please what is the best way to make garage collector to unload unmanaged/managed third party dlls.
A:
There is no way to unload managed assembly in .NET. The only option is to unload the entire AppDomain. See also:
Unloading an Assembly - Suzanne Cook's .NET CLR Notes
| 2024-07-13T01:27:17.568517 | https://example.com/article/4298 |
NEW YORK - It's no joke. Times Square's Naked Cowboy will run for U.S. president in 2012.
The cowboy -- whose real name is Robert Burck -- eschewed his trademark hat, boots and Fruit of the Loom underwear for the press conference announcing the bid Wednesday, sporting instead a sombre blue suit and a red power tie.
His partner, Cindy Fox (a.k.a. the Naked Cowgirl) stood by his side.
"I am not a Republican, I am not a Democrat, I am an American," he told the media gathered in - where else - Times Square.
"And it is my goal and intention to lead the (ultra-conservative) Tea Party to the office of the presidency."
Burck has become a sort of human tourist attraction in the Big Apple. He's spent the last 10 years playing guitar in his underwear under the bright lights and billboards of Times Square.
But all this time, behind the well-muscled physique hid a man with a passion for politics and the writings of German philosopher Friedrich Nietzsche.
Burck's campaign promises include forcing welfare recipients to take random drug tests, reversing President Barack Obama's health-care legislation, ramping up the war on terror and building up the U.S. military.
"My entire platform and all of my policies and decisions will be organized so as to achieve a much smaller, fiscally responsible, decentralized federal government, a robust economy run strictly on free market principles, and the strongest national defence on Earth," he said in a statement on his website.
It's not Burck's first run at politics. In 2009, he attempted to run against Michael Bloomberg for mayor of New York, but later dropped out. | 2024-02-15T01:27:17.568517 | https://example.com/article/7971 |
// Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file
// for details. All rights reserved. Use of this source code is governed by a
// BSD-style license that can be found in the LICENSE file.
import 'dart:async';
import 'package:shelf/shelf.dart' as shelf;
import '../shared/handlers.dart';
/// Handlers for the analyzer service.
Future<shelf.Response> analyzerServiceHandler(shelf.Request request) async {
final path = request.requestedUri.path;
final shelf.Handler handler = {
'/debug': _debugHandler,
'/liveness_check': (_) => htmlResponse('OK'),
'/readiness_check': (_) => htmlResponse('OK'),
'/robots.txt': rejectRobotsHandler,
}[path];
if (handler != null) {
return await handler(request);
} else {
return notFoundHandler(request);
}
}
/// Handler /debug requests
shelf.Response _debugHandler(shelf.Request request) => debugResponse();
| 2024-04-10T01:27:17.568517 | https://example.com/article/5530 |
Q:
TCP handshake phases corresponding to select() and accept() return points
I have a TCP server that creates a (blocking) socket, waits until it is available for reading using select(), then calls accept() and starts reading the data.
Here is an example (not mine) illustrating the concept.
The question is, at what points of TCP handshake does select() and accept() calls return?
Ubuntu Hardy, if it matters.
2.6.31-14-server #48ya1 SMP Fri Apr 2 15:43:25 MSD 2010 x86_64 GNU/Linux
A:
The select() returns, indicating that the listening socket is "readable", immediately after the last packet in that diagram is recieved.
If you had blocked on accept() instead, it would have returned at that same point (when the server socket transitions to ESTABLISHED).
| 2024-06-04T01:27:17.568517 | https://example.com/article/1864 |
To make the armature get a changeless direction electromagnetic torque, the key is: how to change the current's direction which flowing in the coil in time when the coil side is in differential magnetic polarity, which means the process of so-called direction commutation . So it must add a device called commutator. The commutator can coordinate with electric brush to guarantee that the coil side current in every polarity has always the same direction, which could make the electric motor to rotate continuously. Thisis the working principle of DC electric motor.
(View) | 2024-02-25T01:27:17.568517 | https://example.com/article/2761 |
[](https://codeclimate.com/github/18F/analytics.usa.gov) [](https://circleci.com/gh/18F/analytics.usa.gov) [](https://gemnasium.com/github.com/18F/analytics.usa.gov)
## analytics.usa.gov
A project to publish website analytics for the US federal government.
For a detailed description of how the site works, read [18F's blog post on analytics.usa.gov](https://18f.gsa.gov/2015/03/19/how-we-built-analytics-usa-gov/).
Other organizations who have reused this project for their analytics dashboard:
| | |
|:-------------------------------------------------------------------------:|:--------------------------------------------------------------------------------------:|
| [The City of Anchorage, AK](http://analytics.muni.org/) | [The City of Boulder, CO](https://bouldercolorado.gov/stats)
| [The City of Los Angeles, CA](http://webanalytics.lacity.org/) | [The City of Santa Monica, CA](http://analytics.smgov.net/)
| [The City of Omaha, NE](https://analytics.cityofomaha.org/) | [The City of San Francisco, CA](http://analytics.sfgov.org/)
| [The City of Sacramento, CA](http://analytics.cityofsacramento.org/) | [Carbarrus County, NC](http://analytics.cabarruscounty.us/)
| [Cook County, IL](http://opendocs.cookcountyil.gov/analytics/) | [data.jerseycitynj.gov](http://datajerseycitynj.seamlessreports.com/) |
| [City of Seattle](https://www.seattle.gov/about-our-digital-properties/web-analytics) | [Douglas County, NE](http://analytics.douglascounty-ne.gov/)
| [Washington State University](https://analytics.wsu.edu/) | [State of Indiana](https://analytics.in.gov/)
| [The States of Jersey](http://webanalytics.gov.je/) | [The City of Pittsburgh](http://webstats.pittsburghpa.gov/) |
| [U.S. Department of Education](http://www2.ed.gov/analytics) | [U.S. Department of Veterans Affairs](http://www.oit.va.gov/analytics/) |
| [USA.gov - General Services Administration](https://www.usa.gov/website-analytics/) | [Government of Canada](https://gcanalyticsapp.com/gca-dashboard/dashboard-index) |
| [State of Georgia](https://analytics.georgia.gov/) | [State of Kansas](https://analytics.kansas.gov/) |
[This blog post details their implementations and lessons learned](https://18f.gsa.gov/2016/01/05/tips-for-adapting-analytics-usa-gov/).
## About the components
Ths app uses [Jekyll](https://jekyllrb.com) to build the site, and [Sass](https://sass-lang.com/), [Bourbon](http://bourbon.io), and [Neat](https://neat.bourbon.io) for CSS.
The javascript provided is a [webpacked](https://webpack.js.org/) aggregation of [several different modules](#javascript-modules), leveraging [d3](https://d3js.org/) for the visualizations. [Learn more on the webpack configuration](#webpack-configuration)
## Developing locally
There are a couple of different ways to develop locally. Either using docker or running without docker.
### Setup using Docker
You need [Docker](https://github.com/docker/docker) and [docker-compose](https://github.com/docker/compose).
To build and run the app with docker-compose, run `docker-compose up -d` then you can access the app from `http://localhost:4000`, as the local filesystem is mounted on top of the docker container you can edit the files as you are developing locally.
* this does not yet run the webpack script.
To see the jekyll logs, run:
```bash
docker-compose logs -f
```
## Running locally without docker.
Run Jekyll with development settings:
```bash
make dev
npm install
npm run build-dev
```
(This runs `bundle exec jekyll serve --watch --config=_config.yml,_development.yml`.)
### Adding Additional Agencies
0. Ensure that data is being collected for a specific agency's Google Analytics ID. Visit [18F's analytics-reporter](https://github.com/18F/analytics-reporter) for more information. Save the url path for the data collection path.
0. Create a new html file in the `_agencies` directory. The name of the file will be the url path.
```bash
touch _agencies/agencyx.html
```
0. Create a new html file in the `_data_pages` directory. Use the same name you used in step 2. This will be the data download page for this agency
```bash
touch _data_pages/agencyx.html
```
0. Set the required data for for the new files. (Both files need this data.) example:
```yaml
---
name: Agency X # Name of the page
slug: agencyx # Same as the name of the html files. Used to generate data page links.
layout: default # type of layout used. available layouts are in `_layouts`
---
```
0. Agency page: Below the data you just entered, include the page content you want. The `_agencies` page will use the `charts.html` partial and the `_data_pages` pages will use the `data_download.html` partial. example:
```yaml
{% include charts.html %}
```
### Developing with local data
The development settings assume data is available at `/fakedata`. You can change this in `_development.yml`.
### Developing with real live data from `analytics-reporter`
If also working off of local data, e.g. using `analytics-reporter`, you will need to make the data available over HTTP _and_ through CORS.
Various tools can do this. This project recommends using the Node module `serve`:
```bash
npm install -g serve
```
Generate data to a directory:
```
analytics --output [dir]
```
Then run `serve` from the output directory:
```bash
serve --cors
```
The data will be available at `http://localhost:3000` over CORS, with no path prefix. For example, device data will be at `http://localhost:3000/devices.json`.
### Javascript Modules
* **Index** - includes the main dom selection and rendering queue of components, and the entry point for the webpack bundler.
* **lib/barchart** the d3 configuration of the bar charts
* **lib/blocks** an object of the specific components
* **lib/consoleprint** the console messages displayed to users
* **lib/exceptions** agency data to be changed by discrete exception rules
* **lib/formatters** methods to help format the display of visualization scales and values
* **lib/renderblock** d3 manipulator to load and render data for a component block
* **lib/timeseries** the d3 configuration of the timeseries charts
* **lib/transformers** helper methods to manipulate and consolidate raw data into proportional data.
### Deploying the app
To deploy to **analytics.usa.gov** after building the site with the details in `_config.yml`:
```bash
make deploy_production
```
To deploy to **analytics-staging.app.cloud.gov** after building the site with the details in `_config.yml` and `_staging.yml`:
```bash
make deploy_staging
```
### Deploying the app using Docker
_NOTE_: 18F does not use Docker in production!
If you are using Docker in production and you want to deploy just the static pages, you can build an nginx container with the static files built in, running the following command:
```bash
make docker-build-production PROD_IMAGE=yourvendor/your-image-name PROD_TAG=production
```
The resulting image will be an nginx server image that you can safely push and deploy to your server.
The image accepts an environment variable to specify the S3 URL that data at `/data/*` is served from:
```
docker run -p 8080:80 -e S3_BUCKET_URL=https://s3-us-gov-west-1.amazonaws.com/your-s3-bucket/data yourvendor/your-image-name:production
```
### Building & Pushing Docker Images
This repo has git tags. The tag for Docker images built for this repo relate to these git tags. In the examples below, `<version` refers to the tag value of the current commit. When building a new version, be sure to increment the git tag appropriately.
When building images there are 2 images to build: `<version>` and `<version>-production`.
To build the images:
```shell
docker build -f ./Dockerfile -t 18fgsa/analytics.usa.gov:<version> .
docker build -f ./Dockerfile.production -t 18fgsa/analytics.usa.gov:<version>-production .
```
To push the images:
```shell
docker push 18fgsa/analytics.usa.gov:<version>
docker push 18fgsa/analytics.usa.gov:<version>-production
```
### Environments
| Environment | Branch | URL |
|-------------| ------ | --- |
| Production | master | https://analytics.usa.gov |
| Staging | master | https://analytics-staging.app.cloud.gov |
### Webpack Configuration
The application compiles es6 modules into web friendly js via Wepback and the [babel loader](https://webpack.js.org/loaders/babel-loader/).
The webpack configuration is set in the [wepback.config.js](./webpack.config.js).
The current configuration uses babel `present-env`.
The webpack also includes linting using [eslint](https://eslint.org/) leveraging the [AirBnb linting preset](https://www.npmjs.com/package/eslint-config-airbnb).
The webconfig uses the [UglifyJSPlugin](https://webpack.js.org/plugins/uglifyjs-webpack-plugin/) to minimize the bundle.
The resulting uglified bundle is build into `assest/bundle.js`.
#### NPM webpack commands
| Command | purpose |
|-------------| ------ |
| npm run build-dev | a watch command rebuilding the webpack with a development configuration (i.e. no minifiecation) |
| npm run build-prod | a webpack command to build a minified and transpiled bundle.js |
### Public domain
This project is in the worldwide [public domain](LICENSE.md). As stated in [CONTRIBUTING](CONTRIBUTING.md):
> This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the [CC0 1.0 Universal public domain dedication](https://creativecommons.org/publicdomain/zero/1.0/).
>
> All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.
| 2023-08-17T01:27:17.568517 | https://example.com/article/7272 |
Enemy Territory: Quake Wars is the latest Quake incarnation to make it out of the iD labs and carries with it a fast paced experience that manages to place a good amount of strain on your graphics card.
We use a custom made time demo which shows a bit of everything and manages to give us a good solid benchmark for the graphics cards that we test.
The OpenGL based ET:QW puts the ECS 9600GT ahead of the Galaxy offering slightly, and about 10% ahead of the HD 3870 from ASUS.
We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here. | 2024-05-07T01:27:17.568517 | https://example.com/article/6880 |
Expression of cyclooxygenase-2 in osteosarcoma of bone.
Several studies indicate that cyclooxygenase-2 (COX-2) is overexpressed in human malignancies, where it produces high levels of prostaglandins and contributes to tumor growth. In this study we have analyzed the expression of COX-2 in a series of 48 skeletal osteosarcomas of different subtypes by immunohistochemistry. In addition, we examined the effects of the specific COX-2 inhibitor Celecoxib on the growth of the human osteosarcoma cell line SaOS-2. Immunoreactivity for COX-2 was observed in 39 out of 48 tumors (81.2%), 30 (76.9%) of which showed a moderate or diffuse immunostaining. Considering the group of 42 primary osteosarcomas, COX-2 immunoreactivity was significantly higher in high grade osteosarcomas, where moderate or diffuse expression was detected in 23 out of 32 cases (71.8%), than in low grade osteosarcomas, where moderate or diffuse expression was detected in 2 out of 10 cases (20%) (P = 0.008, Fisher exact test). In addition, low COX-2 expression was always associated with a good response to chemotherapy (5 out of 5 cases), whereas moderate or diffuse COX-2 expression was associated with a good response in 11 out of 20 cases (55%) (P = 0.12, Fisher exact test). In SaOS-2 osteosarcoma cells, which express COX-2, treatment with Celecoxib determined inhibition of cell proliferation and induction of apoptosis. These results indicate that COX-2 is expressed at high levels in high grade osteosarcomas and support the use of COX-2 inhibitors to improve both the tumor response to chemotherapy and the outcome of osteosarcoma patients. | 2024-04-26T01:27:17.568517 | https://example.com/article/9119 |
Berlin to Honor Preuss, Author of Constitution of German Republic
The memory of Hugo Preuss, late Germany Jewish jurist who drafted the constitution of the German Republic, will be honored by the city of Berlin, notwithstanding the protest of German anti-Semites.
After prolonged and bitter opposition by the German Right parties, the municipality of Berlin confirmed its previous decision to name a street in Berlin after the late statesman. The decision was taken by a vote of 113 against 90. | 2024-07-28T01:27:17.568517 | https://example.com/article/7210 |
746 F.2d 1555
241 U.S.App.D.C. 238
BOSTON CARRIER, INC., Petitioner,v.INTERSTATE COMMERCE COMMISSION and United States of America,Respondents.
No. 82-2140.
United States Court of Appeals,District of Columbia Circuit.
Argued Oct. 19, 1983.Decided Oct. 30, 1984.
Petition for Review of an Order of the Interstate Commerce commission.
Robert K. Goren, Philadelphia, Pa., for petitioner.
Robert J. Grady, Atty., I.C.C., Washington, D.C., with whom Robert S. Burk, Acting Gen. Counsel, Ellen D. Hanson, Associate Gen. Counsel, I.C.C., Robert B. Nicholson and George Edelstein, Attys., Dept. of Justice, Washington, D.C., were on the brief, for respondents. Henri F. Rush, Associate Gen. Counsel, I.C.C., Washington, D.C., also entered an appearance for respondents.
Before WILKEY, BORK and SCALIA, Circuit Judges.
Opinion for the Court filed by Circuit Judge BORK.
BORK, Circuit Judge:
1
Petitioner Boston Carrier, Inc. ("BC") asks us to review and set aside a decision of the Interstate Commerce Commission denying BC's application for motor common carrier authority. For the reasons set out below, we affirm the Commission.
I.
2
By application dated October 12, 1980, BC sought from the Interstate Commerce Commission a grant of authority to transport general commodities from points in Rhode Island to other points in the United States. The application met with protests from two motor carriers, Del Transport, Inc. ("Del"),1 and Coastal Tank Lines, Inc., and from two former employees of BC, Kathleen M. Larrabee and Colette A. Bedel.
3
The matter came before the Commission's Review Board Number 1, and on February 1, 1982, that Board decided "that there is a question whether applicant is fit, willing, or able properly to perform the service proposed and to conform to the provisions of the Act and the Commission's requirements, rules and regulations thereunder ...." J.A. at 11. The Review Board ordered an oral hearing on the application and provided the Commission's Office of Compliance and Consumer Assistance with a copy of the decision "so that it can evaluate whether to participate in this matter." Id. at 12. The hearing was scheduled to begin on March 16, 1982, at Providence, Rhode Island.
4
On March 3, 1982, a three-member panel of the Commission, Division 1, issued a decision outlining the issues to be addressed at the March 16 hearing. That decision stated in part:
5
In their verified statements protestants Larrabee and Bedel contend, among other things, that applicant has been conducting interstate property transportation without the requisite authority from this Commission; that it has been engaging in fraudulent practices relative to the Commission's fuel surcharge program; and that it may knowingly have submitted false information to the Commission and otherwise unlawfully interfered with Commission investigation of its operations. Although applicant denies the allegations, it appears that questions exist concerning applicant's fitness....
6
J.A. at 25. The panel also directed the Office of Compliance and Consumer Assistance ("OCCA") to participate in the proceeding. Id.
7
Petitioner resisted this procedure. On March 1, BC requested a pre-hearing conference. On March 5, BC sought review of the Review Board's order that an oral hearing be held. On March 9, BC moved to postpone the hearing stating that the Board's order to OCCA to participate in the hearing had left the carrier without adequate notice of the issues which OCCA would pursue at the hearing. On March 12, the motion for postponement was denied, and no pre-hearing conference took place.
8
The Providence hearing commenced on March 16 and concluded on March 19. Briefs were submitted on May 10, 1982. Del, Bedel, and Larrabee testified at the hearing, as did BC's vice-president. BC's president, Alan Bernson, did not attend the hearing despite the fact that the presiding Administrative Law Judge suggested to BC's counsel that Bernson should be present and testify. J.A. at 40. The ALJ later stated, Bernson "should have testified. It is apparent that only he, not his vice-president, could have responded to some of the allegations." Id. at 43. Several shippers submitted certifications in support of BC, but only one, E. Rosen, appeared in support of the application, and he testified that BC had knowingly transported goods illegally.
9
The ALJ concluded that "the applicant has failed to establish that it is fit ... properly to conduct the proposed operation and to conform to the requirements of the Interstate Commerce Act and the Commission's rules and regulations thereunder." J.A. at 43. The ALJ wrote in part:
10
The unrebutted testimony reveals that applicant knowingly and willfully transported numerous unauthorized shipments in violation of the Act. Moreover, the evidence is not clear that these shipments were done in the good belief that the applicant carrier had proper operating authority. Also Commission investigators were consistently frustrated in many ways, [further,] mishandling the fuel surcharge, and failure to inspect vehicle equipment regularly took place.
11
Id. at 42-43. The ALJ concluded that given the lack of applicant's fitness, "no purpose would be served as to any finding or conclusion regarding public need." Id. at 43.
12
BC appealed the decision of the ALJ on June 5, 1982. The ICC, Division 1, denied BC's appeal by decision of August 23, 1982. The Commission wrote that:
13
The record as summarized by the Administrative Law Judge discloses a repeated history of applicant's noncompliance with rules and regulations of this Commission, manifesting a general pattern of conduct of purposely and willfully engaging in illegal activities. The subject violations, as discussed in the initial decision by the Administrative Law Judge are varied, numerous, and extremely serious. In our opinion, such conduct represents a flagrant and persistent disregard of the provisions of the Interstate Commerce Act and Commission rules and regulations. The Administrative Law Judge, who had opportunity to observe the demeanor of the witnesses at the hearing, reasonably concluded that based upon the evidence presented, applicant's past conduct and attitude toward the law and rules and regulations of the Commission, precluded a finding of fitness. We perceive no basis for disagreeing with this conclusion.
14
J.A. at 45-46 (footnote omitted).
15
BC then filed a Petition for Stay and a discretionary Petition for Administrative Review on September 7. The ICC denied both petitions on September 14. J.A. at 48-49. BC has now sought review in this court.
II.
16
The standard of review governing ICC actions on motor carrier applications for operating authority is well established. Before the Commission, the applicant has the burden of establishing that he is fit, willing, and able to provide the service and to comply with the statute and regulations. See Curtis, Inc. v. ICC, 662 F.2d 680, 687 (10th Cir.1981). If that is done, the applicant must show that the service he proposes will serve a useful public purpose. See 49 U.S.C. Sec. 10922(b)(1) (1982). Evidence of past disregard for the law is not conclusive as to the applicant's future compliance but it raises a reasonable inference, which an applicant must overcome, that the applicant is likely to continue such misbehavior.2 Our review of the Commission's decision about an applicant's fitness is limited to insuring that it meets the requirements of section 706(2) of the Administrative Procedure Act, 5 U.S.C. Sec. 706(2) (1982), including that it is supported by substantial evidence and is not otherwise arbitrary, capricious, or an abuse of discretion. We must also be attentive to procedural guarantees; we must be sure that the Commission has complied with the rules designed to guarantee the carrier-applicant the full and fair opportunity to present and defend its application.
17
BC advances four arguments on appeal: that the notice given it was inadequate; that its former employees should not have been permitted to testify; that the Commission improperly found that BC mishandled the fuel surcharge and frustrated Commission investigation; and that the Commission improperly used the fitness finding regarding unauthorized transportation as a punitive measure. We address these contentions seriatim.
A.
18
BC's first argument is a claim of inadequate notice. BC asserts that an application proceeding is an adjudicatory proceeding subject to section 554(b)(3) of the APA, which requires that "[p]ersons entitled to notice of an agency hearing ... be timely informed of ... (3) the matters of fact and law asserted." 5 U.S.C. Sec. 554(b)(3) (1982). The carrier alleges that it was denied any such notice and that as a result it was continually buffeted at the hearing on its application by surprise allegations and previously unanticipated assertions of damaging facts. Brief of Petitioner BC at 8-9. This lack of notice, BC concludes, destroys the credibility of the findings of the Administrative Law Judge, including the ultimate finding that BC lacked the fitness necessary to gain its requested authority.
19
The ICC does not deny its obligation to give some notice of the issues to be addressed at a fitness hearing, but contends that the notice was adequate here. An applicant understands from the burden of proof he undertakes that all his operations are subject to review. This is an implicit notice from the nature of the proceedings. Here, moreover, BC fails "even [to] attempt to demonstrate that the lack of notice it alleges prejudiced it in any material way." Joint Brief for ICC & USA at 31. "It points to no evidence," the Commission states, "it might have had marshalled and introduced at the hearing had it been notified earlier and more formally of the facts which called its fitness into question." Id. Finally, as the agency notes: "The prehearing decisions of both the Board and the Division identified four issues--the same four issues--that the Commission believed warranted special attention. Furthermore, the ALJ's decision recited those same four reasons--unlawful transportation, misuse of the fuel surcharge, filing false statements, and interfering with a Commission investigation--as the focus of the oral hearing. And it was principally on those four bases that the application was denied." Id. (citation omitted).
20
We are satisfied that the notices of hearing that the Commission sent to BC were sufficient to alert BC to the subjects that would be examined at the fitness hearing. Both the February 1, 1982 letter from the Review Board and the March 3, 1982 letter from Division 1 of the Commission referred to the verified statements of protestants Larrabee and Bedel. The letters noted that these protestants had raised numerous questions concerning BC's fitness including questions of unauthorized shipments, fraudulent administration of the fuel surcharge program, the submission of false information to the Commission, and other interference with Commission investigations. These specific references, as well as the more general notice that "there is a question whether applicant is fit, willing, or able properly to perform the service proposed," J.A. at 11, would have alerted even a naive and inexperienced carrier to the fact that the impending inquiry would be a thorough one. The Commission is not burdened with the obligation to give every applicant a complete bill of particulars as to every allegation that carrier will confront. The agency need not anticipate every charge that will be made. Nor did the letters convey an impression that they contained the complete roster of objections which BC would encounter.
21
The carrier cites the Commission's decision in Braswell Motor Freight Lines, Inc., Investigation of Practices, 118 M.C.C. 392 (1973), as supporting what amounts to a demand for complete detail in Commission notices of hearing. But Braswell held not that a notice must always be complete in all the particulars which a future hearing will cover, but rather that notice must not be of a kind to mislead an applicant. Evidence was excluded from that record because the notices provided the applicant in Braswell had "contained no additional caveats or warnings to respondents that other evidence might be presented, and on their face purported to afford notice to respondent of all the specific facts of the Bureau's case." Braswell, 118 M.C.C. at 397. Here, there was adequate notice, and our conclusion is reinforced by the fact that BC points to no specific charges that surprised it due to lack of notice. Insofar as BC's case was weak, that appears to be due to the inexplicable refusal of applicant's president to attend the hearing to make his case. It may also be due to the circumstance that BC's case was, in fact, weak.
B.
22
BC's second procedural objection focuses on the testimony of BC's former employees, Bedel and Larrabee. BC "submits that the granting of protestant status to former employees of applicant is in error and that protestant status may only be granted to motor common carriers or associations which represent carrier interest and which have broad policy concerns." Brief of Petitioner BC at 13. BC cites 49 U.S.C. Sec. 10922(b)(7)(C) (1982), which provides:
23
(7) No motor carrier of property may protest an application to provide transportation filed under this subsection unless--
24
(C) the Commission grants leave to intervene upon a showing of other interests that are not contrary to the transportation policy set forth in section 10101(a) of this title.
25
Brief of Petitioner BC at 13. BC asserts that this section of the statute controls access to protestant status, and clearly limits that status to common carriers or associations of common carriers. The former employees, BC concludes, had no legitimate role to play in the application proceeding.
26
But section 10922(b)(7)(C), far from limiting the class of protestants, merely places limitations on motor carriers that would protest, and, as the ICC points out, "nowhere does the statute prevent noncarriers from participating in these proceedings." Joint Brief for ICC & USA at 28 (footnote omitted). The Commission notes that "intelligent regulation of the nation's interstate motor carrier industry requires that all interested persons with reliable and probative evidence (not simply carriers or carrier associations) be allowed to participate in ICC licensing proceedings." Joint Brief for ICC & USA at 29. The Commission's own regulations in force at the time of the hearing expressly provided for the participation of any "person" in such a proceeding so long as that person's participation furthered the goals of the national transportation policy. 49 C.F.R. Sec. 1100.252(d)(7) (1981), cited in Joint Brief for ICC & USA at 29.3 Finally, the ICC contends that the issue of protestant status for Larrabee and Bedel is irrelevant as these two could have participated as witnesses even if they had not become involved as protestants.
27
We reject BC's objections to the participation of its former employees. Elsewhere in the same section BC relies on, the Commission is commanded to examine "evidence presented by persons objecting to the issuance of a certificate ...." 49 U.S.C. Sec. 10922(b)(1)(B) (1982). "Person" is surely broad enough to allow the testimony of former employees. The court is aware that former employees may very well "have an axe to grind against an applicant." Brief of Petitioner BC at 16. That is a legitimate concern to be considered by the Commission and its hearing officers. They are in a position to judge credibility. It is certainly not beyond an applicant's ability to counter the testimony of a former employee if that testimony is exaggerated or even false. "The important point," as Judge Bazelon has said, "is that administrative standing should be tailored to the functions of the agency ...." Koniag, Inc., Village of Uyak v. Andrus, 580 F.2d 601, 616 (D.C.Cir.1978) (Bazelon, J., concurring). The ICC's function in this application proceeding was to determine the applicant's fitness. Larrabee and Bedel were well positioned to assist that function, and there exists no automatic bar to their participation as protestants.
C.
28
As we have already noted, "[t]he applicant for a certificate has the burden of proving his fitness." Department of Transportation, Federal Highway Administration v. ICC, 733 F.2d 105, 109 (D.C.Cir.1984). When the Commission finds that an applicant is not fit, we are bound to affirm its determination if that finding is supported by substantial evidence and is not otherwise arbitrary, capricious, or an abuse of discretion. Id. at 110. Here the Commission concluded that the "record as summarized by the Administrative Law Judge discloses a repeated history of applicant's noncompliance with rules and regulations of this Commission, manifesting a general pattern of conduct of purposely and willfully engaging in illegal activities." J.A. at 45. "The subject violations," the Commission concluded, "are varied, numerous, and extremely serious." Id. The Commission refers us to evidence of the applicant's numerous unauthorized shipments, J.A. at 39, Joint Brief for ICC & USA at 15-18, the applicant's attempted cover-up of these shipments by manipulation of its computer records, J.A. at 225-28, the failure to ensure compliance with applicable safety laws, J.A. at 152, the filing of fraudulent supporting shipper statements, J.A. at 90, payment of a kick-back, J.A. at 238, and manipulation of an ICC program known as the fuel surcharge despite BC's knowledge that it had been incorrectly billing the surcharge, J.A. at 252.
29
BC attempts to treat the damaging evidence by arguing first that it did in fact apply the fuel surcharge correctly. Brief of Petitioner BC at 17-19.4 It also argues that the ICC is penalizing BC for "asserting its rights." BC suggests that "[t]here is absolutely no obligation that a carrier's president submit to interview or direct its employees to submit to interview by an ICC investigator." Id. at 21. As to the testimony that BC doctored the computer printouts in order to mislead the ICC, BC asserts that "the record is unclear whether or not this computer printout was prepared." Id. BC points to the statement of an ICC investigator at the hearing that "I asked for accounts receivable records and I never got 'em. It was always an excuse." J.A. at 331. BC finds in this testimony a conclusion that since the document was never submitted, its alleged preparation should not have prejudiced the Commission against BC's application. Brief of Petitioner BC at 27. Finally, BC characterizes the unauthorized shipments as "occasional instances of unauthorized transportation," and defends even these instances as the result of "honest misinterpretation of Commission rules relaxing entry." Id. at 22-23. BC also notes that it has subsequently applied for the necessary authority to conduct similar shipments and has in fact been granted some of that authority. Id. It is typical of Commission policy, BC concludes, to forgive and forget unauthorized shipments when a carrier comes forward to apply for the necessary authority to cover future similar shipments. Id.
30
Because we find that the opinions of the ALJ and the Commission lack specificity at certain points, are often confused, and occasionally appear even to be in error as to the contents of the record, we have conducted a thorough review of the record. We are unable to conclude that the Commission lacked substantial evidence for a decision to deny BC's application though it did not display the ability to explain its position coherently and completely--a defect which, while irritating, is by no means fatal to the Commission's positions on appeal. Indeed, the record overflows with evidence of BC's lack of fitness, and it was BC's burden to demonstrate precisely the opposite in order to earn the authority requested. "The 'substantial evidence' examination looks to whether the record, taken as a whole, contains 'such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.' " Trailways, Inc. v. ICC, 673 F.2d 514, 517 (D.C.Cir.1982) (quoting National Council of American-Soviet Friendship, Inc. v. Subversive Activities Control Board, 322 F.2d 375 (D.C.Cir.1963)), cert. denied, 459 U.S. 862, 103 S.Ct. 137, 74 L.Ed.2d 117 (1982). Here the evidence necessary to the conclusion of a lack of fitness is present in abundance.
31
The fact that unauthorized transportation occurred is undisputed. J.A. at 106. The applicant also admitted to shoddy safety inspection practices, id. at 122, 152, an admission which, even standing alone, might be sufficient to support a finding of a lack of fitness. The record also reveals that BC repeatedly interfered with Commission investigations. Id. at 219-21, 225, 274. We need not pass on BC's novel argument that such efforts on its part were not illegal to conclude that the Commission could find in those actions reason to suspect that the carrier's future operations might be difficult to monitor. There is testimony, too, that BC altered records in the hope that the doctored documents would conceal unauthorized shipments, id. at 226-27, and that BC paid a kick-back on at least one occasion, id. at 238, 294-95. Evidence was also received that BC purposefully overcharged when calculating the fuel surcharge, having decided that even if discovered, it would profit by the system even after refunds were paid. Id. at 253-54. The testimony of the ICC investigator, Mr. Paul H. Blanchette, id. at 277-335, is itself sufficient to support the conclusion that BC was intent on frustrating the Commission's oversight responsibilities. The Commission thus possessed substantial evidence for its conclusion that this carrier had not shown that it was fit to receive the authority requested.5
32
We wish to note, however, that we have not been favorably impressed with the Commission's work on this case. Perhaps the ICC and its ALJ allowed themselves to be lulled into careless opinion-writing by the sheer weight of the evidence against BC's application and by the fact that BC had the burden of proof. Moreover, the notice provided BC, while adequate, could have been more complete, and we doubt that any harm would have been done by granting BC's request for a pre-hearing conference or a postponement. It is petitioner's near-total failure to present any evidence of fitness that protects the ICC on review, not the efforts of the Commission.
33
Affirmed.
1
Del's protest was withdrawn by letter of December 30, 1981. Del's counsel subsequently protested that the withdrawal letter was improperly obtained by BC and informed the Commission that Del remained a protestant. Del asserted at the hearing on the application that it remained a protestant. Joint Appendix at 38 (hereinafter "J.A.")
2
[T]he Commission has designed a five-part inquiry to determine whether past violations and disregard of motor carrier regulations is likely to continue.... Under this test the Commission considers
(1) [T]he nature and extent of ... [the carrier's] past violations, (2) the mitigating circumstances surrounding the violations, (3) whether the carrier's conduct represents a flagrant and persistent disregard of [the] Commission's rules and regulations, (4) whether it has made sincere efforts to correct its past mistakes, and (5) whether the applicant is willing and able to comport in the future with the statute and the applicable rules and regulations thereunder.
Curtis, 662 F.2d at 687-88 (quoting Associated Transport, Inc., 125 M.C.C. at 73) .... By weighing these factors, the Commission decides whether future compliance with motor carrier regulations is assured.
Department of Transportation, Federal Highway Administration v. ICC, 733 F.2d 105, 109-10 (D.C.Cir.1984).
3
Sec. 1100.252 read in part:
How to oppose requests for authority.
(a) Definitions. A person wishing to oppose a request for permanent authority files a protest. A person filing a valid protest becomes a protestant.
....
(d) Qualifications format. This information shall be submitted in separately numbered paragraphs:
(5) Description of the extent to which the person seeking to protest possesses authority to handle the traffic for which authority is applied ... or
(6) Description of any application which the prospective protestant has pending before the Commission which was filed before applicant's application and which is substantially for the same traffic, or
(7) Description of any other legitimate interest not contrary to the transportation policy set forth in 49 U.S.C. 10101(a), or of any right to intervene under a statute. A person seeking to qualify under this paragraph shall describe in detail the circumstances which warrant its participation and how they are consistent with 49 U.S.C. 10101(a). The Commission shall normally permit such person to intervene when it shows that a proceeding is novel or of first impression, is of industry wide importance, or has significant economic impact.
4
We note that while the decision of the ALJ made reference to the carrier's misapplication of the fuel surcharge, J.A. at 38, 43, that decision made no effort to explain why the ALJ was convinced of this conclusion. Nor did the Commission when it adopted the ALJ's findings by reference. Id. at 45. It is hardly agency decision-making at its finest to leave in governing opinions announced but unexplained conclusions regarding intricate regulatory programs. We are surprised that the agency attached so little importance to making this portion of its decision easily understood. Because this section of the opinion is conclusory, we have paid particular attention to that portion of the record dealing with BC's handling of the fuel surcharge
5
Throughout this proceeding, BC has attempted to file supplemental papers, such as documents gained through the Freedom of Information Act process and an affidavit from a self-styled investigative reporter who asserted familiarity with the facts of this case. This is an abuse of Rule 28(j) of the Federal Rules of Appellate Procedure. Most of what BC has forwarded to the court is would-be evidence that is untested. Its submission might be appropriate in renewed proceedings before the ICC, but it is clearly separate from and irrelevant to the record under review here. We have taken note of the ICC's decision in Boston Carrier, Inc., No. MC-146440 (Sub-No. 13) (Apr. 27, 1984), in which the Commission granted a one-year certificate of authority to BC to transport general commodities between points in Connecticut, New Hampshire, New Jersey, New York and Vermont on the one hand and, on the other, other points in the contiguous United States. That decision, while it reflects upon the earlier ICC decision under review here, does not purport to upset the earlier denial of authority. We will not imply a reversal of the Commission's earlier holding from its action on an application filed at a different time and concerning different routes
| 2024-01-02T01:27:17.568517 | https://example.com/article/9095 |
STEP 3
STEP 4
Randomly apply all three paint dabber colors to acetate sheet, blending as desired but leaving some areas unmixed. Place tag facedown on paint and press gently to coat with paint; let dry or dry with heat tool. | 2024-03-16T01:27:17.568517 | https://example.com/article/1897 |
Mission Style Platform Bed in Cherry Finish
Tropical influences show forth in this cherry finished, hardwood
Solstice bed from Spices collection. Tapering front legs, block
style rear legs and a slatted, trapezium-shaped headboard with
narrow vertical and horizontal slats, combined with angular
elements are featured in this beautiful bed.
100% Malaysian Rubberwood construction
Bed includes headboard, footboard, rails and slats
Bed dimensions:
Twin Headboard: 47 in. W x 50 in. D x 5 in. H
Twin Footboard: 16 in. W x 46 in. D x 3 in. H
Twin Rails: 10 in. W x 42 in. D x 2 in. H
Twin Slats: 8 in. W x 83 in. D x 7 in. H
Full Headboard: 47 in. W x 65 in. D x 5 in. H
Full Footboard: 16 in. W x 61 in. D x 3 in. H
Full Rails: 10 in. W x 42 in. D x 2 in. H
Full Slats: 8 in. W x 83 in. D x 7 in. H
Queen Headboard: 47 in. W x 70 in. D x 5 in. H
Queen Footboard: 16 in. W x 66 in. D x 3 in. H
Queen Slats: 8 in. W x 83 in. D x 7 in. H
Eastern King Headboard: 47 in. W x 89 in. D x 5 in. H
Eastern King Footboard: 16 in. W x 85 in. D x 3 in. H
Eastern King Slats: 8 in. W x 83 in. D x 7 in. H
Queen or Eastern King Rails: 10 in. W x 42 in. D x 2 in. H
The Spices Bedroom Collection is our rich group
of Beds, Case Goods and Accessories that brings with it a few
delightful tangy twists. From a choice of knobs (wood and metal)
packed with every dresser you can shape and style any bedroom to
suit your needs and taste.
The Solstice Bed totally defines the room it is in. Its Craftsman
pattern of lattice work set within handsome tapered legs is as
satisfying as it is beautiful. All our Spices Bedroom Collection
beds are designed for use as platform beds, or in the lower
position, for box spring use. Easy assembly with our patented
ThumNutT. Spices Bedroom Collection items come with a limited 10
year warranty.
Product Specifications
AC Voltage
Not Powered
Bed Size
Full/Double • King • Queen • Twin/Single
Bed Type
Platform
Color/Finish
Cherry
Material
Wood
Style
Mission/Shaker
Manufacturer SKU
PH-SOL-TWN-CH PQ-TWN-CH PS-TWN PF-BAS-TWN-CH
Need more information?
Our staff are available to answer any questions you may have about this item.
Share this and earn when friends, and their friends, buy.
Events Featured Now
Huge Selection. Superb Quality. Great Prices.
We're committed to providing the best online shopping experience possible: the best products, from the best brands,
at the best prices. And with the best customer service in the business. Shop us today and experience the ShopLadder difference. | 2024-02-11T01:27:17.568517 | https://example.com/article/6675 |
Image copyright Rex Features
Many schools across the UK will not be able to remain open past the end of the week, says a head teachers' leader.
ASCL general secretary Geoff Barton said experienced head teachers in large schools were saying they would struggle to stay up and running past Friday.
It comes after teaching unions spoke of the "intolerable pressure" of staying open as more and more staff get sick.
The government's chief scientific adviser has reiterated that schools will remain open for now.
But Sir Patrick Vallance, speaking to MPs at a hearing on Tuesday afternoon, said school closures were still "on the table", as one of the measures that could be used to fight the virus.
At his press conference on Tuesday afternoon, Prime Minister Boris Johnson said school closures were under "continuous review".
'Rising panic'
Mr Barton told the BBC: "Some very seasoned head teachers have been calling me to say they will not be able to manage much longer.
"One said he had 17 members of staff call in sick. And I think this will be replicated around the country.
"Some areas may be worst hit than others, but there's an inevitability about this. The trajectory cannot go anything other than downwards.
"People are saying they will do well to get to the end of the week."
He thought it was time to work out how schools could best support the community if they did have to close, and said he had discussed this with Education Secretary Gavin Williamson at a meeting on Monday.
"If the assumption is we can't run schools as normal, what that may mean is getting ourselves some time to plan for the next phase of this," Mr Barton said.
Decisions would have to be made, he said, as to who should be prioritised: "Would it be those with exams coming up or children on free school meals?"
Earlier, NASUWT union head Chris Keates said government advice to keep schools open is causing chaos and confusion, amid fears pupils are carrying the virus.
She told of a "rising sense of panic" in schools as staff fear for their safety as more and more people get ill.
Another teaching union, the National Education Union, has urged ministers to close schools, and said it would be advising members with underlying conditions to stay off work from next Monday.
The schools watchdog in England, Ofsted, has been given permission by the government to temporarily suspend all routine inspections of schools, further education, early years and social care providers.
Chancellor Rishi Sunak has said funding for early years grants will continue during any periods of nursery, preschool or childminder closures, or where children cannot attend due to coronavirus.
Parents' concern
The uncertain situation is causing concern among many parents.
Hayley Beards from Sutton Coldfield, who has an eight-year-old, says she doesn't feel confident people will "follow the rules".
"There are other parents with vulnerable children, or vulnerable people all still sending their children in.
"People aren't used to making decisions and it's like they want to be told what to do - they want less guidance and more telling."
Jen from the East Riding told the BBC she is frustrated by the lack of information from her son's school.
"My son has had a cold since the end of last week, as children do, but last night he told me he feels like someone's punching him in his chest and his throat feels weird.
"This morning I was still in two minds but I called the school and the head teacher answered in two rings and said we should definitely self isolate as he's got two pregnant members of staff and children with grandparents to think about."
Despite pressure from teaching unions, the government insists sending hundreds of thousands of pupils home would leave NHS and frontline care staff facing childcare crises.
It has said closures may be necessary in the future, but only "at the right stage" of the outbreak.
'Bugs breeding ground'
This notion was reflected by head teacher of The Chantry School, in rural Worcestershire, Andy Dickenson.
He wrote on Twitter: "If I close my school tomorrow to avoid a mass gathering are you coming for me @BorisJohnson?#schoolclosure."
He told the BBC he had been moved to question the policy due to the inconsistency between advice about mass gatherings and schools remaining open.
"Schools are an absolute breeding ground for bugs - we know that. Equally we have a social responsibility so ensure we are not putting into the care of their grandparents or NHS workers."
He suggested setting online learning for pupils at home and schools running on a skeleton staff to support the children of parents who need to go to work.
Nicola from Aberdeenshire has children in primary school, where regular hand washing has been implemented, and teaches in a secondary where there are no gels or hand washing.
"It seems like they are relying on students to follow guidance themselves, but they are teenagers so they just don't - it feels like we've been forgotten," she said.
Tara Telford from Cumbria, who has an eight-year-old and a five-year-old, is vulnerable because because she takes immunosuppressive medication due to a chronic disease.
"I have reason to be terrified but my kids are in. People should talk to schools, have the conversation, if more did what my kids' school did we could keep schools open for longer." | 2023-10-05T01:27:17.568517 | https://example.com/article/1802 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.