text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
87 B.R. 692 (1988)
In the Matter of WOOLF PRINTING CORPORATION, Debtor(s).
WOOLF PRINTING CORPORATION, Plaintiff(s),
v.
MAC PAPERS, INC. and NCNB National Bank of Florida, Defendant(s).
Bankruptcy No. 87-2019-8b1, Adv. No. 87-188.
United States Bankruptcy Court, M.D. Florida, Tampa Division.
June 14, 1988.
*693 C. Kathryn Preston, Tampa, Fla., for plaintiff/debtor.
Stephen Durant, Jacksonville, Fla., defendant/Mac Papers.
Lynn Welter, Tampa, Fla., for defendant/NCNB.
ORDER ON CROSS MOTIONS FOR SUMMARY JUDGMENT
THOMAS E. BAYNES, Jr., Bankruptcy Judge.
THE MATTER under consideration in this Chapter 11 case concerns the marshalling of the Debtor's assets.
Defendant/Cross-Plaintiff NCNB National Bank of Florida (NCNB) filed a cross-claim against Defendant/Cross-Defendant Mac Papers, Inc. (Mac Papers), to compel Mac Papers to look to certain collateral for satisfaction of its debt prior to seeking satisfaction of its claim from the proceeds of a life insurance policy. The parties filed Motions for Summary Judgment alleging there remain no genuine issues of material fact. The Court reviewed the Motions, the Joint Statement of Facts and the remainder of the record and heard argument of counsel on January 27, 1988. The Court finds the undisputed facts to be as follows:
On April 19, 1983, the Debtor purchased a one million dollar key man insurance policy on the life of Howard Woolf, the Debtor's former president and chief operating officer. Within the same month, the Debtor executed and delivered three separate assignments of this policy to the Pan American Bank, Sun Bank of Tampa Bay, and Mac Papers, Inc., as collateral for outstanding obligations of the Debtor to each of these assignees. Subsequently, on November 19, 1984, the Debtor executed and delivered to NCNB an assignment of the policy as collateral for a loan from NCNB to the Debtor.
As additional collateral for its obligations to Sun Bank, on November 27, 1984 the Debtor granted Sun Bank a security interest in all equipment, furniture, and fixtures then owned or thereafter acquired by the Debtor. Similarly, on September 19, 1986 the Debtor granted Mac Papers a security interest in all personal property of the Debtor, including furniture, fixtures, equipment, inventory, and accounts receivable. The obligations of the Debtor to Sun Bank were assigned by Sun Bank to Mac Papers pre-petition.
The Debtor filed its voluntary petition for relief under Chapter 11 of the Bankruptcy Code on April 16, 1987. On May 2, 1987 Howard Woolf died and the life insurance company issued a check in the amount of $1,020,444.21, made payable jointly to the Debtor, Mac Papers, and NCNB. The Debtor agreed to accept $20,444.21 in exchange for a full release of all claims to the proceeds of the policy.
The Pan American assignment was released pre-petition, when the Pan American loan was repaid. Thus, on the date of the bankruptcy filing, and at the time of death, there were three unreleased assignments of the policy:
1) The April 23, 1983 assignment to Mac;
2) The April 23, 1983 assignment to Sun Bank (which was assigned to Mac); and
3) The November 19, 1984 assignment to NCNB.
The issue to be addressed herein is the propriety of compelling Mac Papers under the doctrine of marshalling to seek recovery from the Debtor's personal property, including furniture, fixtures, equipment, inventory and accounts receivable prior to seeking recovery from the proceeds of the life insurance policy.
*694 "`Marshalling' rests upon the principle that a creditor having two funds to satisfy his debt, may not by his application of them to his demand defeat another creditor, who may resort to only one of the funds." Meyer v. U.S., 375 U.S. 233, 236, 84 S.Ct. 318, 320, 11 L.Ed.2d 293 (1963). In such a case, the first creditor is forced to satisfy its claim from the collateral which the second creditor cannot reach before looking to the common funds. This allows the second creditor to recover more from its only source of security. In re Francis Construction Company, Inc., 54 B.R. 13 (Bankr.S.C.1985).
Three elements must be satisfied before the equitable doctrine of marshalling may be applied. These are:
1. The existence of two creditors with a common debtor;
2. The existence of two funds belonging to the debtor; and
3. The legal right of one creditor to satisfy his demand from either or both of the funds while the other may resort only to one fund.
United States v. Friend (In re A.E.I. Corp.), 11 B.R. 97 (Bankr.E.D.Pa.1981). In addition, the party seeking to invoke marshalling has the burden of demonstrating marshalling would benefit the estate without imposing an undue hardship on the senior lienholder. Whirlpool Corp. v. Plad, Inc., (In re Plad, Inc.), 24 B.R. 676, 680 (Bankr.M.D.Tenn.1982).
In applying the legal principles of marshalling to the case at hand, it is apparent NCNB has met its burden of proving the three elements of marshalling. First, both Mac Papers and NCNB are creditors with a common debtor, Woolf Printing Corporation. Second, there are two funds belonging to the Debtor: 1) the proceeds of the life insurance policy; and 2) the Debtor's personal property consisting of furniture, fixtures, equipment, inventory and accounts receivable. Third, Mac Papers has a legal right to satisfy its demand from both funds, while NCNB may resort only to the insurance proceeds.
While the three elements are met, NCNB must still demonstrate the invocation of marshalling would not injuriously affect the rights of Mac Papers or a third person. State Bank of Florida v. Roche, 35 Fla. 357, 17 So. 652 (Fla.1895). Undue delay or prejudice to the senior lienholder are the sort of injuries which will prohibit marshalling. In re United Retail Corporation, 33 B.R. 150 (Bankr.Hawaii 1983).
NCNB argues Mac Papers should satisfy its debt by first looking to the Debtor's personal property. In order to accomplish this satisfaction, Mac Papers would have to have relief from the automatic stay, then sell the property to satisfy the debt with the sale proceeds. There is no evidence to show the time frame within which the property could be sold. On the other hand, if Mac Papers were not compelled to marshal, it would be able to look to the insurance proceeds first. This is ready cash which would be immediately available. Upon a review of the characteristics of the two funds it is clear that compelling Mac Papers to look to the Debtor's personal property prior to the insurance proceeds would cause undue delay in satisfying the debt. Since marshalling would injuriously affect the secured interests of Mac Papers, this Court declines to compel the requested equitable relief. Topcon Instrument Corporation of America v. West Coast Optical Instruments, Inc. (Matter of West Coast Optical Instruments, Inc., 89 B.R. 198 (Bankr.M. D.Fla.1988); Matter of Dealer Support Services, International, Inc., 73 B.R. 763 (Bankr.E.D.Mich.1987); 6 Pomeroy, Pomeroy's Equity Jurisprudence and Equitable Remedies, § 866 (1905).
Mac Papers offered several arguments in opposition to marshalling. First, it contends marshalling would injure the Bankruptcy estate. Second, Mac Papers contends marshalling does not apply because both creditors each have more than one asset from which to satisfy their debts. NCNB may have a security interest in one of the Debtor's printing presses as well as the insurance proceeds. Third, Mac Papers contends that if NCNB is unsecured as to the printing press, it is because NCNB was *695 negligent in failing to perfect its security interest in the press. Thus, NCNB is not entitled to the aid of equity in this case. While these arguments might bolster Mac Paper's position, the Court need not address them. It is NCNB's burden to demonstrate marshalling would not injure Mac Papers. Since NCNB has failed to meet its burden, as a matter of law marshalling is inappropriate. The additional equitable concerns of Mac Papers need not be discussed at this time.
Accordingly, it is
ORDERED, ADJUDGED AND DECREED Mac Paper's Motion for Summary Judgment be and the same is hereby granted and NCNB's Motion for Summary Judgment is hereby denied. It is further
ORDERED, ADJUDGED AND DECREED that marshalling of the assets is hereby determined to be inappropriate in this case.
| 2024-03-01T01:27:17.760571 | https://example.com/article/5817 |
M. Balamuralikrishna
Mangalampalli Balamuralikrishna (; 6 July 1930 – 22 November 2016) was an Indian Carnatic vocalist, musician, multi-instrumentalist, playback singer, composer, and character actor. He was awarded the Madras Music Academy's Sangeetha Kalanidhi in 1978. He has garnered two National Film Awards (1976, 1987), the Sangeet Natak Akademi Award in 1975, the Padma Vibhushan, India's second-highest civilian honor in 1991, for his contribution towards arts, the Mahatma Gandhi Silver Medal from UNESCO in 1995, the Chevalier of the Ordre des Arts et des Lettres by the French Government in 2005, the Sangeetha Kalanidhi by Madras Music Academy, and the Sangeetha Kalasikhamani in 1991, by the Fine Arts Society, Chennai to name a few.
Balamuralikrishna started his career at the age of six. In his life-time, he gave over 25,000 concerts worldwide. Apart from Pandit Bhimsen Joshi, he presented jugalbandi concerts (duets) with Pandit Hariprasad Chaurasia , Pandit Ajoy Chakrabarty and Kishori Amonkar, among others. He is also known for popularizing the compositions of Sri Bhadrachala Ramadasu, Sri Annamacharya, and others.
Balamuralikrishna's concerts combined sophisticated vocal skills and rhythmic patterns of classical music with the popular demand for entertainment value. Balamuralikrishna presented concerts in many countries, including the US, Canada, UK, Italy, France, Russia, Sri Lanka, Malaysia, Singapore, countries in the Middle East, and elsewhere. Apart from his native tongue, Telugu, he has also composed in other languages including Kannada, Sanskrit, Tamil, Malayalam, Hindi, Bengali, and Punjabi.
He appeared as a featured soloist with an award-winning British choir, performing the "Gitanjali Suite" with words from Rabindranath Tagore's Nobel Prize-winning poetry and music by "Dr. Joel", the noted UK-based Goan composer. His clear diction in several languages prompted an invitation to record Tagore's entire Rabindra Sangeet compositions in Bengali, preserving them for posterity. He has sung in French, and even ventured into jazz fusion, collaborating with the top Carnatic percussion teacher, Sri T.H. Subash Chandran, in a concert for Malaysian royalty. In February 2010, he presented a three-day concert in Visakhapatnam.
Early life
Balamuralikrishna was born in Sankaraguptam, East Godavari District, Madras Presidency (now a part of Andhra Pradesh state). His father was a well known musician and his mother was a veena player. Balamuralikrishna's mother died when he was an infant and he was raised by his father. Observing his interest in music, his father put him under the tutelage of Parupalli Ramakrishnayya Pantulu, a direct descendant of the shishya parampara (lineage of disciples) of Tyagaraja. Under his guidance, the young Balamuralikrishna learned Carnatic music. At the age of eight, he gave his first full-fledged concert at a Thyagaraja Aradhana in Vijayawada. Musunuri Suryanarayana Murty Bhagavatar, a Harikatha performer, saw the musical talent in him and gave the prefix "Bala" (lit. child) to the young Balamuralikrishna. (Prior to this, his name was Muralikrishna; following Bhagavatar's addition of the prefix, he began to be known as Balamuralikrishna.)
Having begun his musical career at a very young age, by age fifteen he had mastered all the 72 melakartha ragas and had composed krithis in each of them. His Janaka Raga Manjari was published in 1952 and recorded as Raagaanga Ravali in a nine-volume series by the Sangeeta Recording Company. Not merely content with his fame as a Carnatic vocalist, he also played the kanjira, mridangam, viola, and violin. He accompanied various musicians on the violin. He also presented solo violin concerts.
Experimentation
Characteristic of Balamuralikrishna's musical journey have been his non-conformism, spirit of experimentation, and boundless creativity. Balamuralikrishna has experimented with the Carnatic music system by keeping its rich tradition untouched. Ragas such as Ganapathi, Sarvashri, Mahati, Lavangi etc. are credited to him. The ragas which he invented represent his quest for new frontiers. Ragas such as Lavangi are set to three or four notes in ascending and descending scale. Ragas such as Mahathi, Lavangi, Sidhdhi, Sumukham that he created have only four notes; while his other ragaa creations such as Sarva Sri, Omkaari, and Ganapathy have only three notes.
He also innovated in the tala (rhythm) system. He has incorporated "gati bhEdam" (గతి భేదం) in the "sashabda kriya" (సశబ్ద క్రియ). Actions that can produce sound/shabda (శబ్ద) in talas are called sashabda kriya - సశబ్ద క్రియ and are a part of the existing Tala chain. New chains are possible, too. Saint Arunagirinaadhar used to inject such systems in his famous Thirupugazh, but only as Sandham, while Balamuralikrishna is known to be the pioneer in bringing such Sandhams into a logical rhythm, with Angam and definition. Trimukhi, Panchamukhi, Saptamukhi, and Navamukhi are the basic classifications in his New Tala System.
He gave his authorisation to S. Ram Bharati to found "Academy of Performing Arts and Research" in Switzerland. He also worked on music therapy. He established the 'MBK Trust' with the objective of developing art and culture and for carrying out extensive research into music therapy. A dance and music school, 'Vipanchee' is a part of this Trust.
Compositions
Balamuralikrishna has over 400 compositions to his credit and is one of the very few people to have composed in all the 72 Melakarta Ragas and has created several ragas, with 4 notes and 3 notes and also has invented a new Tala system. His compositions encompass every genre in Carnatic Music including Varnas, Krithis, Thillanas, Bhavageethas.
Cinema
Balamuralikrishna has sung in several films in Telugu, Sanskrit, Malayalam, Kannada and Tamil. He made his acting debut with the Telugu film Bhakta Prahlada (1967) as Narada, and has acted in a few other films in Telugu and Tamil.
Death
Balamuralikrishna died at his residence in Chennai on 22 November 2016; he was 86. His end came in deep sleep at around five in the evening, due to a cardiac arrest. He was cremated with full state honours at Besant Nagar Crematorium in Chennai the very next day. Thousands attended his funeral. He is survived by three daughters and three sons who are all Doctors. His wife, Smt. Annapurna, outlived him for three months, and died on 16 February 2017.
Legacy
His family has formed the Dr. M. Balamurali Krishna Memorial Trust to represent him after his death.
Awards and honours
Civilian honours
Padma Shri (1971)
Padma Bhushan
Padma Vibhushan (1991)
Chevalier of the Ordre des Arts et des Lettres from the Government of France (2005)
National Film Awards (India)
Best Male Playback Singer for the Kannada musical movie Hamsageethe (1975)
Best Music Direction for the Kannada film Madhvacharya (1986)
Kerala State Film Award
Best singer for Swathi Thirunal (1987)
Best Classical Music Singer for Gramam (2010)
Tamil Nadu State Film Award
Tamil Nadu State Film Award for Best Male Playback singer for Pasanga (2009)
Other honours
Sangeet Natak Akademi Award (1975)
Sangeetha Kalanidhi by Madras Music Academy (1978)
Raja-Lakshmi Award in 1980 by Sri Raja-Lakshmi Foundation in Chennai
Doctor of Letters from Shri Venkateshwara University (1981)
Honorary PhD from Andhra University
Doctor of Science from Andhra University
Doctor of Letters from Andhra University
Sangeetha Kalasikhamani by The Fine Arts Society, Chennai (1991)
Mahatma Gandhi Silver Medal from UNESCO (1995)
Natya Kalasikhamani The Fine Arts Society, Chennai (2001)
Sangeetha Kalasarathy (2002)
"Sangeetha Virinchi" title conferred by Sangeetha Bharathi music School, Auckland, New Zealand (2009)
Lifetime Achievement Award by the Global Indian Music Academy Awards (2011)
First Citizen Award from Vijayawada City
"Wisdom Man of the Year" (1992)
"Naada Maharishi" by the Nrityalaya Aesthetics Society (1996)
A documentary film, The Melody Man'', was made on his life by the Government of India Films Division. The film was directed by National award winner Director Gul Bahar Singh.
Telugu Book of Records honoured him for Telugu Legendary Personality in 2014 at Vijayawada
Ragas Created
Talas Created
Selected compositions
Film compositions
Balamuralikrishna acted in few films and gave his voice to some selected songs in Indian cinema.
References
Further reading
External links
Murali and Me: A tribute by Prince Aswathi Thirunal Rama Varma.
Balamuralikrishna with his musicians in Switzerland in 1992.
Various devotional works of Balamuralikrishna.
Category:1930 births
Category:2016 deaths
Category:Male Carnatic singers
Category:Chevaliers of the Ordre des Arts et des Lettres
Category:Kanjira players
Category:Violists
Category:Kerala State Film Award winners
Category:Recipients of the Padma Shri in arts
Category:Recipients of the Padma Vibhushan in arts
Category:Recipients of the Sangeet Natak Akademi Award
Category:Recipients of the Sangeet Natak Akademi Fellowship
Category:Sangeetha Kalanidhi recipients
Category:Best Music Direction National Film Award winners
Category:Indian male film singers
Category:Tamil playback singers
Category:Telugu playback singers
Category:Kannada playback singers
Category:People from East Godavari district
Category:Indian multi-instrumentalists
Category:Indian male singers
Category:People from Krishna district
Category:Film musicians from Andhra Pradesh
Category:Singers from Andhra Pradesh
Category:20th-century Indian singers
Category:21st-century Indian singers
Category:Best Male Playback Singer National Film Award winners
Category:20th-century male singers
Category:21st-century male singers
Category:Carnatic composers
Category:Sanskrit-language singers | 2024-07-09T01:27:17.760571 | https://example.com/article/6307 |
297 S.E.2d 709 (1982)
Alvin E. GREENWALT
v.
COMMONWEALTH of Virginia.
Record No. 811770.
Supreme Court of Virginia.
December 3, 1982.
*710 Walter Jervis Sheffield, Thomas L. Bricken, Fredericksburg (Sheffield & Bricken, P.C., Fredericksburg, on brief), for appellant.
Francis W. Pedrotty, Asst. Atty. Gen. (Gerald L. Baliles, Atty. Gen., on brief), for appellee.
Before CARRICO, C.J., and COCHRAN, POFF, COMPTON, THOMPSON, STEPHENSON and RUSSELL, JJ.
STEPHENSON, Justice.
Tried by a jury, Alvin E. Greenwalt was convicted of violating Code § 43-13 and was sentenced to 30 days in jail and a fine of $2,000. The determinative question presented in this appeal is whether the trial court erred in denying Greenwalt's motion to dismiss the indictment on the ground that its prosecution was barred by the double jeopardy provisions of the Federal and State Constitutions.
The facts germane to the issue are undisputed. Greenwalt, a building contractor, entered into an agreement to construct a home. When several subcontractors went unpaid, he was charged in a warrant with feloniously embezzling $2,500 in violation of Code § 18.2-111. A preliminary hearing on this felony charge was scheduled for November 12, 1980, but on that date, the warrant was amended to charge Greenwalt with violating Code § 43-13 "on or about August 1979 and thereafter."
Code § 43-13, part of the title of the Code dealing with mechanic's liens, makes it a crime for a contractor, with intent to defraud, to retain or use funds paid to him under a contract, rather than paying his laborers and materialmen. Before July, 1980, violation of this section was a misdemeanor. After this date, a person violating the section is guilty of larceny, and, if the amount involved exceeds $200, the crime is a felony.
Proceeding on the amended warrant, the General District Court of Spotsylvania County heard the Commonwealth's evidence. At its conclusion, the court indicated on the warrant that the charge was "not certified," and the defendant was discharged.
In January, 1981, a grand jury returned an indictment against Greenwalt charging him with violating Code § 43-13 from August, 1979, through February, 1980. The indictment makes it clear that defendant was charged with a misdemeanor, and the Commonwealth now concedes all alleged violations of the statute occurred prior to July 1, 1980.
The double jeopardy provisions of the Federal and State Constitutions protect against a second prosecution for the same offense after an acquittal. Turner v. Commonwealth, 221 Va. 513, 529, 273 S.E.2d 36, 46 (1980). A dismissal qualifies as an acquittal for double jeopardy purposes when it is granted pursuant to a factual, as opposed to a legal, defense. Johnson v. Commonwealth, 221 Va. 736, 743-44, 273 S.E.2d 784, 789 (1981). See also United States v. Scott, 437 U.S. 82, 98 S.Ct. 2187, 57 L.Ed.2d 65 (1978).
In oral argument, the Attorney General acknowledged that the offense with which Greenwalt was charged in the district court could only have been a misdemeanor. He contends, however, that the amended warrant purported to charge the commission of a felony and that by writing "not certified" on the warrant the district court believed it was conducting a preliminary hearing. The Attorney General concludes, therefore, that Greenwalt was never put to trial, that the proceeding was a nullity, and that jeopardy did not attach. We do not agree.
It is settled law that "jeopardy means the danger of conviction." Rosser v. Commonwealth, 159 Va. 1028, 1036, 167 S.E. 257, 259 (1933). "In a trial before a court without a jury the danger of conviction or jeopardy of an accused begins when the trial has reached the stage where the Commonwealth begins to introduce its testimony." Id.
Under Rule 3A:4, an arrest warrant must describe the offense charged. This description must comply with Rule *711 3A:7(a), which deals with the description of the charge that must be contained in an indictment. We have held under this rule that an indictment must give an accused notice of the nature and character of the offense. Wilder v. Commonwealth, 217 Va. 145, 225 S.E.2d 411 (1976). The same, therefore, is true of warrants.
In the present case, the defendant was before the district court on a warrant alleging violation of Code § 43-13 in August, 1979, and thereafter. In 1979, and indeed for the first half of 1980, violation of this section was a misdemeanor. Under these circumstances, the only fair reading of the warrant is that defendant stood before the district court charged with a misdemeanor. The court had jurisdiction over the case, Code § 16.1-123, and proceeded to hear the evidence. At this point, Greenwalt stood in danger of conviction and jeopardy attached.
Nothing in our decision today conflicts with our holding in Moore v. Commonwealth, 218 Va. 388, 237 S.E.2d 187 (1977). In Moore, we held that an accused is not in jeopardy at a preliminary hearing, even though the district court has the power under Code § 19.2-186 to reduce a felony charge to a misdemeanor and try it. "[A] mere dismissal of a felony warrant at a preliminary hearing indicates only a finding of lack of probable cause. Since jeopardy has not attached, discharge cannot operate as an acquittal, or finding of not guilty, of any lesser included misdemeanor offense." Id. at 393, 237 S.E.2d at 191.
In the instant case, the defendant was not before the court on a felony. This being so, the only options open to the court were a finding of guilty or not guilty. Unlike Moore, the district court here had no power to determine probable cause and certify a felony charge to a grand jury. Nor could it reduce the offense to a misdemeanor, since the warrant already charged one.
Accordingly, the judgment of the trial court will be reversed and the indictment dismissed.
Reversed and dismissed.
| 2024-05-24T01:27:17.760571 | https://example.com/article/8521 |
Hidradenitis suppurativa and diabetes mellitus: A systematic review and meta-analysis.
The relationship between hidradenitis suppurativa and diabetes mellitus is not well understood. To compare the prevalence of diabetes mellitus between patients with and without hidradenitis suppurativa. We conducted a systematic review and meta-analysis, which included primary observational studies that reported the prevalence of diabetes mellitus among patients with hidradenitis suppurativa in the PubMed, Embase, Cochrane Library, LILACS, and Scielo databases from 1947 to June 13, 2017. A random effects model for pooled odds ratio was used for data analysis. Publication bias was assessed by funnel plot and the Egger test. The systematic review included 107,050 patients from 14 studies; the meta-analysis included 104,373 patients from 7 studies. On the basis of meta-analysis, the prevalence of diabetes mellitus was 10.6% in patients with hidradenitis suppurativa and 3.8% in patients without hidradenitis suppurativa. Compared with the general population, patients with hidradenitis suppurativa were nearly 3 times more likely to have diabetes mellitus (pooled odds ratio, 2.78; 95% confidence interval, 1.79-4.31). We were restricted by the quantity and quality of available data. Hidradenitis suppurativa is significantly associated with an increased prevalence of diabetes mellitus. | 2024-07-23T01:27:17.760571 | https://example.com/article/8451 |
If Danny Rose were a Chelsea player, we’d hold him as a shining example of the club’s youth development/loan army methods and madness working exactly as intended.
The 27-year-old left back joined Spurs as a 16-year-old from Leeds, excelled in the youth teams, went out on loan a few times — including successful full seasons in the Championship and the Premier League — after which he was re-integrated into the squad where he has served as a constantly improving first-choice player for the last four seasons. In the last couple years, he’s been generally recognized as the best left (wing-)back in the league, even.
His rise wasn’t all that straightforward of course — it rarely is for any player — but that’s just part of his frustrations.
“I am opinionated and I might not have long left in football. “One thing is for sure, for the rest of this career, I will play this game how I want to play it and, while I am not going to disrespect anyone, I am going to voice my opinions.”
In this rather explosive interview with The Sun — and that’s not a joke for once, it really is jaw-dropping, raw, and revealing, especially given its timing — Rose comes across as a clear-eyed, conflicted, concerned, ambitious, frustrated, fed up ... real ... player, who knows that life is as short as it is meaningless, yet as impactful and significant as we want to make it.
EXCLUSIVE: Danny Rose admits he'll consider offers to quit Tottenham https://t.co/Il8SOxXJpO pic.twitter.com/vR4QPCbLW1 — The Sun Football ⚽ (@TheSunFootball) August 10, 2017
In a way, it reminds me of some of Ashley Cole’s best interviews, and I did not choose that comparison by accident. Chelsea need a left back to compete with Marcos Alonso and there’s been perhaps no better English player in that position than D.Rose since A.Cole hit the downward slope of his career.
“At my age, and having missed six months with injury, I have been thinking about this quite a lot. “I am reaching my peak and have probably only got one big contract left in me. Time is running out and I do want to win trophies. I don’t want to play football for 15 years and not have one trophy or one medal. “Sorry, that’s not what I am about. I wouldn’t be happy with that. I want to win something.”
Rose feels under-appreciated, underpaid, and under-challenged stuck in a team that’s not showing the same ambitions as other top teams, not just in England, but all around Europe.
Graphic shows how much the teams who finished in the top 4 in Europe's top 5 leagues have spent during the transfer window.#THFC pic.twitter.com/DIE9w12Qbn — Marc Benamram (@MarcBenamram) August 9, 2017
“I am not saying buy ten players, I’d love to see two or three — and not players you have to Google and say, ‘Who’s that?’ I mean well-known players.” [...] “Anyone who says we don’t need any signings, I’m not buying into that. As a starting 11 we have one of the best in the league, without a shadow of a doubt, but after that . . . “We played Chelsea in the Cup semi — Costa, Hazard and Cahill didn’t play. After 60 minutes, Conte has brought on Fabregas, Hazard and Costa and they’ve changed the match. I thought to myself, ‘Could we ever afford to play against a top team and afford to have Harry Kane, Dele Alli and a top centre-back not playing?’” -Danny Rose; source: The Sun
Tying ambition to just transfer spending is a bit misleading of course, but it’s hard to see Spurs’ lack of spending as anything but, especially after losing a player like Kyle Walker.
“Being injured has harmed me on and off the field in a lot of ways. When you’re injured you get a lot of time to think and I’ve had a lot of ‘what if?’ moments. It’s been hard to deal with. “One thing is for sure — I know my worth and I will make sure I get what I am worth. I am not playing as well as I have done not to get paid what I think I am worth. In any walk of life, if you think you are worth a certain amount, why settle for less? I am not that person. “If I get to levels I reached last season — and this goes out to everybody — I will make sure I get what I am worth. I don’t know how much longer I might have at this level. I’m not going to be stupid enough not to try and get the most out of it — medals, trophies and salary. Anyone who thinks this is primarily for money, that is not the case. But I know what I am worth. “As with everyone else in my team, in my opinion, I am worth more than I am getting. I am not speaking on behalf of other players, but that is my view.”
While Rose is “not demanding a transfer” from Tottenham, his tone is drastically different than in September, when he declared that he is settled in the South and “couldn’t wish for anything more than to play for Spurs” for the rest of his career. Back then, Spurs were “moving in the right direction” for him; now he seems disillusioned and ready to follow in Kyle Walker’s footsteps to triple his current salary (£65k) and triple the chances at trophies.
“I will say this too — I will play up north. I don’t know exactly when, but I will get back up north and play some football somewhere. “I moved away from home (from Leeds to Spurs) at 16. Yes I’ve got team-mates who have moved away from families in South Korea and Argentina, but I have been away for over ten years now and I don’t get to see my mum that often. I am going to make it my priority before I retire to play football up there. “My short-term focus is to get back to playing like last year and if I do that the long-term will take care of itself. “I’m not saying I want out, but if something came to me that was concrete, I’d have no qualms about voicing my opinions to anyone at the club.” -Danny Rose; source: The Sun
Time to be that something concrete, Chelsea Football Club. | 2024-07-21T01:27:17.760571 | https://example.com/article/2163 |
House Speaker Nancy Pelosi is a wondrous politician, a “weaver” of Democrats as she puts it, a soother and an energizer, an inspiration. How splendid to see this elegant person seated directly behind U.S. President Donald John Trump’s long yellow hair as he turned the always slavering State of the Union address into a tacky TV episode performed live before a gormless studio audience. How wonderful to see her rip up that ludicrous speech behind his big orange volleyball head.
Pelosi is the perfect package of sane and sensible. Americans need that. There is something reassuring about her, partly because she was unfazed by Trump’s impeachment acquittal, and partly because she is quite certain that Trump will not be re-elected.
Trump and Pelosi are polar opposites. He wears a black hat, she wears white in honour of the suffragettes.
Trump is a man-child, a thug, a liar and a cheat, yet he can make hundreds of frighteningly rich men do a greasy Uriah Heep as he speaks in the Senate chamber or holds an hour-long venomous freestyle event the day after.
Pelosi, on the other hand, is an emblem of Democratic revulsion. With one raised eyebrow, eyes widened in faux surprise and a brisk unwillingness to put up with flim-flam, she expresses the world’s need to writhe.
Pelosi, 79, has a rich history of defending Democratic values. As economist Paul Krugman wrote in 2018, as House minority leader she helped block president George W. Bush from privatizing Social Security. She then helped president Barack Obama pass the Affordable Care Act, backed financial reform and the desperately needed stimulus after the 2008 crash and, since she entered politics in 1976, has never been once touched by scandal.
“Looking at modern House speakers, Pelosi stands out as a giant among dwarfs,” Krugman wrote. She is resented, as all powerful women are. It has been that way all her life.
But wherever Trump goes, he leaves fumes of bribery, libel, fraud, sexual incontinence, invented numbers, lies, spite, vengeance and dirty money. It has been this way all his life.
Devoid of the social skills demanded of a normal president — Nixon was like this, too — Trump is ritually forgiven because he is rich, powerful and eager to punish. Especially post-impeachment, he is a human gun whose bullets could spray anywhere before the election and finish off Republicans from the principled Sen. Mitt Romney to the unwell Rep. Jim Jordan. Status anxiety clogs the room. Republican senators sink lower in their chairs. “Don’t pick me,” they plead. They close their eyes so he can’t see them.
A new book, “American Oligarchs,” by journalist Andrea Bernstein tells the history of the Trumps and the Kushners, two families born into at least two generations of greed. It is filled with corruption, so thick and heavy with it that my hands feel corrupted by holding it. As with novel coronavirus, I must not touch my face.
It matters because the weight of American corruption will be 10 times heavier if Trump is re-elected and the U.S. continues the transition to failed state status.
According to Bernstein, dodgy real estate deals birthed both families. Trump’s German grandfather fudged land claims, she writes. His father was repeatedly caught self-dealing, and the Trump family’s business history has been under almost permanent criminal investigation. The family has one goal: pay no taxes. They lie like rugs. It’s what they do.
The Kushners are much the same. The eeriest thing about the Trumps and the Kushners is how embedded they are in New York politics, business and law, a pack of cronies who do deals together, attend the same schools, go to the same parties, blackmail together, and make deals together. Political donations are the price of entry to the Trump/Kushner trap. They are un-Pelosi, they are shameless.
Here’s a metaphor. The U.S. is heading toward a “moulin,” a hole formed by underground meltwater in a previously solidly frozen glacier. As described by nature writer Robert Macfarlane, these tubes created by climate change can drill down a full mile to bedrock.
A moulin “is surely the most beautiful and frightening space into which I have ever looked,” he writes. The mouth is oval and the sides are polished blue ice like the shaft of a well. It’s an Edgar Allan Poe kind of horror. Twenty feet down, all is dark. Terrified, Macfarlane enters one, slips and begins swinging back and forth into an icy waterfall. He is hauled up before he dies.
The U.S. has been drawn to its own moulin, tiptoeing closer and closer. It can’t help itself. It is near the edge and the long black ice hole looks strangely attractive.
Loading... Loading... Loading... Loading... Loading... Loading...
Pelosi and the Democratic Party have been holding Americans back on a rope. If Americans do the mad thing and re-elect Trump, the nation will enter a moulin from which there is no rescue, no return.
Americans, hold on tight to the rope. Don’t pull the rope down with you. Pelosi can’t help you then.
Read more about: | 2023-08-21T01:27:17.760571 | https://example.com/article/3641 |
448 F.2d 1396
78 L.R.R.M. (BNA) 2639, 66 Lab.Cas. P 12,152
NATIONAL LABOR RELATIONS BOARD, Petitioner,v.TELEDYNE REPUBLIC MANUFACTURING, Respondent.
No. 71-1193.
United States Court of Appeals,Sixth Circuit.
Oct. 26, 1971.
Bernard Levine, N. L. R. B., Assistant Regional Atty., Region 8, Washington, D. C., Arnold Ordman, General Counsel, Dominick L. Manoli, Associate General Counsel, Marcel Mallet-Prevost, Asst. General Counsel, Washington, D. C., on the brief, for petitioner.
Arthur A. Kola, Cleveland, Ohio, John J. Adams, Squire, Sanders & Dempsey, Cleveland, Ohio, on the brief, for respondent.
Before BROOKS, MILLER and KENT, Circuit Judges.
ORDER
1
This cause came on to be heard upon the record on appeal and the briefs and arguments of counsel. Upon due consideration thereof and the facts as set forth in the record, and the report of the case, 185 N.L.R.B. No. 129, it appears to this Court that while the members of the panel might have reached a different conclusion the findings and order of the Board are supported by substantial evidence on the record as a whole and should be enforced.
2
Now, therefore, it is ordered that the order of the Board be and it is hereby enforced.
| 2024-02-04T01:27:17.760571 | https://example.com/article/3585 |
"Previously on..." "If I can't have the Sabers then no one will!" "Scorpius took my only son from me." "I will not stop until I destroy him." "He would destroy anything to get his revenge!" "My hatred for Scorpius created this evil energy." "I must render this energy harmless." "The Lights of Orion are back." "Mike!" "Mike." "Hey, everybody, I want to make a toast." "To my brother." "Yeah." "Cheers." "All right." "( all laughing )" "You know, Mike" "I knew you'd survive." "I wouldn't have survived if it wasn't for the Magna Defender." "When I fell down that crevasse it was the Magna Defender who saved me." "After 3,000 years of being imprisoned in that hole he took my spirit inside of him so he could escape." "But he was filled with anger vowing to destroy Scorpius for destroying his son." "But his anger couldn't last." "His destiny was to be good." "So he released me and went on to join his son." "I owe him my life." "In honor of the Magna Defender." "May his spirit live on." "Here's to the Magna Defender." "Magna Defender." "To his spirit." "I've been keeping this for you." "It's my dog tags." "What happened to them?" "( soft chuckle )" "It's a long story." "Thanks." "Oh, man... how am I going to explain where I've been?" "( all laughing )" "TRAKEENA:" "No?" "Why not?" "How am I ever supposed to rule along beside you if you never let me battle the Rangers?" "Now, Trakeena..." "Just give me one more chance and I'll..." "Your chance will come, but not today." "Today I have a different plan." "Skelekron!" "Skelekron at your service, my liege." "Hurry up with that box." "Allow me to present my ancient Skelekron Warriors." "They have the ability to take the Rangers' own energy and use it against them." "Excellent." "Do not disappoint me." "Not a chance, Scorpius." "( Skelekron laughing evilly )" "# Power Rangers Lost Galaxy" "# Far, far away, deep in space #" "# To a galaxy you'll go #" "# Power Rangers, go, Power Rangers #" "# Go, Power Rangers, go #" "# There lies a key to the answer #" "# And the powers you will know #" "# Power Rangers, go, Power Rangers #" "# Go, Power Rangers, go #" "# Ah, ah, ah-ah-ah, ah #" "# Rangers #" "# Turn on the power #" "# Power Rangers #" "# Lost Galaxy #" "# Turn on the power #" "# Power Rangers #" "# Lost Galaxy #" "# Turn on the power #" "# Power Rangers Lost Galaxy... #" "Leo?" "Leo!" "What are you doing here all by yourself?" "Just thinking." "Mike's supposed to meet me up here." "I don't get it." "Mike's back." "You should be jumping for joy." "I am." "It's just that..." "The Red Quasar Saber." "You're wondering if you should keep it." "Mike pulled it from the stone." "He was chosen to be the Red Ranger, not me." "Oh, Leo..." "Hey!" "There he is." "You know, I used to take life for granted... but not anymore." "I feel like the Magna Defender gave me a second chance... and I'm not going to waste that chance." "I'm going to make my life important." "Mike..." "There's something I've been wanting to say." "It's... ( beeping )" "What's up?" "ALPHA:" "There's trouble at the plaza." "Let's go!" "( Skelekron laughing )" "This is perfect." "LEO:" "Hold on, guys!" "Two more fools to destroy." "Stingwingers attack!" "KAI:" "Hold on, guys." "Let's go!" "Rangers, Rangers, up on the wall time for you to take a fall." "( evil laughter )" "What's going on?" "Let me out of here!" "Oh, no!" "( grunting )" "( evil laughter )" "Now for you two." "( battle roar )" "Look out!" "Leo!" "( grunting )" "You're mine now." "Come on." "I'll destroy you both." "But, Mike..." "Hurry, let's get out of here." "Out of my way, fools!" "Go ahead and run, you cowards." "Your time will come." "I have your friends and I will use their energy to destroy you." "( evil laughter )" "Give them to me." "( sinister laughter )" "( all yelling )" "Come on, Leo." "Mike, how could you do that?" "Those are our friends." "We just left them." "There was nothing we could do." "We would have been captured in the mirrors, too." "We don't have time for this." "We have to go find them." "I left my dog tag on a Stingwinger." "Kind of like a homing device." "Oh." "It's a metallic alloy." "We can trace it easily." "Just leave it to me, little brother." "( Skelekron laughing evilly )" "Ah, how perfect." "Now, place the warriors into the shrine according to the Rangers' colors." "Yes." "All your powers will soon be mine then you'll be as helpless as you are pathetic." "( sinister laughter )" "( roaring ):" "What's this?" "( roaring )" "( beeping )" "I found them." "Come on." "You bug brain!" "Now they'll be able to find us." "Work faster!" "( yelling )" "The Red Ranger will be here at any moment." "Come to life, my evil Skeleton Warriors!" "( chittering )" "MIKE:" "They're in here." "( cackling )" "( cackling continues )" "( wild cackling )" "They know we're coming." "( roaring )" "( sighs )" "Leo." "Leo." "Here." "Mike... you pulled the Quasar Saber from the stone." "You were chosen to be the Red Ranger... not me." "Maybe..." "but you've earned it." "I've seen you fight." "This Quasar Saber-- it shares your heart and your soul... not mine." "It's your destiny." "You can't change that." "Maybe my destiny was to pull it from the stone so I could give it to you." "I have a feeling that it was meant for you all along." "( grunting )" "Behind you!" "( roaring )" "Leo!" "The Saber!" "You see, destiny doesn't make mistakes." "There is no other Red Ranger." "It is futile to resist, Rangers." "Let your energy flow into my Skelekron Warriors." "( growling )" "Bring me the Red Ranger!" "Attack!" "You fools think you can stop me!" "You don't know who you're dealing with!" "Neither do you." "( growling )" "The mirrors are broken!" "They can get away!" "Kendrix!" "Is everything all right?" "Everything's fine." "I'll still defeat you!" "You are going to regret this, Red Ranger!" "We'll see who has regrets, won't we?" "I won't regret destroying you!" "Ready, guys?" "RANGERS:" "Go Galactic!" "Skelekron, you're going down!" "Get them!" "( growling )" "Come on, Red Ranger!" "All right, guys, let's do it!" "ALL:" "Lights of Orion, activate!" "Big deal!" "Power up mode!" "Zord transform!" "Power up mode now!" "( yelling )" "I need more power!" "I've got to do something!" "Time to finish what we started." "Magna Defender?" "Zika?" "You will carry on the work we began." "My weapon is now yours." "You will be the Magna Defender." "Me?" "It is your destiny." "Wait!" "Magna Power!" "This is unbelievable!" "All right, Torozord, let's do it!" "Mega Defender, transform!" "What's he doing here?" "!" "( roaring )" "Defender Torozord, lightning spin!" "Who is that?" "Mike?" "!" "Mike?" "!" "You've become Magna Defender." "This is my destiny." "DAMON:" "That's great." "But a bull?" "It's nowhere near as cool as a condor." "( roaring )" "Hey, I'm just kidding!" "Come on, let's get out of here." "And the fuel reserves are on schedule." "We've traveled 5.6 light-years from Earth putting us well within our target range." "I suggest we maintain course and speed." "Your recommendation has been approved, Commander." "We'll reevaluate when we enter the next galaxy." "Mike." "Commander." "Where have you been?" "I thought we left you on the practice moon." "Well, I can explain." "I was... um... uh, I-I just, uh..." "You were what?" "Commander... whatever the reason" "I think I can speak for all of us when I say we're glad to have him back safe and sound." "Absolutely." "So, I'll expect you at Command Headquarters at 0800." "Yes, sir." "Thank you, sir." "Yes!" "Next time on..." "You get down there and steal the beauty from every single one of them, or I'll feed you to my father!" "Now who's the most beautiful girl in the universe?" "( yelling )" "Can I get a burger?" "I believe this is yours." "SCORPIUS:" "Soon the cocoon will be ready and Trakeena's metamorphosis will be at hand." "Next time on..." "Captioned by Grant Brown" | 2023-08-28T01:27:17.760571 | https://example.com/article/1664 |
Identification, cloning and sequencing of Escherichia coli strain chi1378 (O78:K80) iss gene isolated from poultry colibacillosis in Iran.
To identify, clone and sequence the iss (increased serum survival) gene from E. coli strain chi1378 isolated from Iranian poultry and to predict its protein product, Iss. The iss gene from E. coli strain chi1378 was amplified and cloned into the pTZ57R/T vector and sequenced. From the DNA sequence, the Iss predictive protein was evaluated using bioinformatics. Iss from strain chi1378 had 100% identity with other E. coli serotypes and isolates from different origins and also 98% identity with E. coli O157:H7 Iss protein. Phylogenetic analysis showed no significant different phylogenic groups among E. coli strains. The strong association of predicted Iss protein among different E. coli strains suggests that it could be a good antigen to control and detect avian pathogenic E. coli (APEC). Because the exact pathogenesis and the role of virulence factors are unknown, the Iss protein could be used as a target for vaccination in the future, but further research is required. | 2023-11-21T01:27:17.760571 | https://example.com/article/5660 |
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/*!
* Copyright (c) 2019 by Contributors
* \file np_insert_op_tensor.cc
* \brief CPU Implementation of numpy insert operations
*/
#include <vector>
#include "./np_insert_op-inl.h"
#include "./np_insert_op_tensor-inl.h"
namespace mxnet {
namespace op {
DMLC_REGISTER_PARAMETER(NumpyInsertParam);
bool NumpyInsertTensorType(const nnvm::NodeAttrs& attrs,
std::vector<int> *in_type,
std::vector<int> *out_type) {
const NumpyInsertParam& param = nnvm::get<NumpyInsertParam>(attrs.parsed);
int input_count = param.val.has_value() ? 1 : 2;
int insize = input_count + 1;
CHECK_EQ(in_type->size(), insize);
CHECK_EQ(out_type->size(), 1U);
int obj_pos = input_count;
CHECK_NE((*in_type)[obj_pos], -1) << "Index type must be set for insert operator\n";
CHECK_EQ((*in_type)[obj_pos], mshadow::DataType<int64_t>::kFlag)
<< "Index type only support int64.\n";
TYPE_ASSIGN_CHECK(*out_type, 0, (*in_type)[0]); // output type equals to input arr's
TYPE_ASSIGN_CHECK(*in_type, 0, (*out_type)[0]);
return (*in_type)[0] != -1;
}
bool NumpyInsertTensorShape(const nnvm::NodeAttrs& attrs,
mxnet::ShapeVector *in_shape,
mxnet::ShapeVector *out_shape) {
using namespace mshadow;
const NumpyInsertParam& param = nnvm::get<NumpyInsertParam>(attrs.parsed);
int input_count = param.val.has_value() ? 1 : 2;
int insize = input_count + 1;
const int arr_pos = 0;
const int val_pos = param.val.has_value() ? 0 : 1;
const int obj_pos = val_pos + 1;
CHECK_EQ(in_shape->size(), insize);
mxnet::TShape scale_shape(0, 1);
mxnet::TShape &arrshape = (*in_shape)[arr_pos];
mxnet::TShape &valshape = param.val.has_value() ? scale_shape : (*in_shape)[val_pos];
mxnet::TShape &objShape = (*in_shape)[obj_pos];
CHECK_LE(objShape.ndim(), 1)
<< "index array argument obj to insert must be one dimensional or scale.\n";
out_shape->clear();
int axis = param.axis.has_value() ? param.axis.value() : 0;
if (!(param.axis.has_value())) {
arrshape = Shape1(arrshape.Size());
} else if (arrshape.ndim() == 0) {
if (param.val.has_value()) {
out_shape->push_back(scale_shape);
} else {
CHECK_EQ(valshape.ndim(), 0)
<< "'arr' is a 0-d array, 'values' can not assign to it. "
<< "alueError: assignment to 0-d array.";
out_shape->push_back(valshape);
}
return shape_is_known(out_shape[0]);
} else {
CHECK(axis >= -1 * arrshape.ndim() && axis < arrshape.ndim())
<< "Axis should be in the range of [-r, r-1] where r is the rank of input tensor";
axis += (axis < 0) ? arrshape.ndim() : 0;
}
int seq_cnt = objShape.Size();
mxnet::TShape newshape(arrshape);
mxnet::TShape val_newshape(arrshape.ndim(), -1);
int numnew = 0; // amount of new column insert to 'arr' in 'axis'
// modify values's ndim to arr's ndim, for broadcast easily later
// e.g. value shape: (2,) arr shape: (3, 2) => value shape: (1, 2)
for (int i = valshape.ndim() - 1, j = arrshape.ndim() - 1; i >= 0 || j >= 0; --i, --j) {
if (i >= 0 && j >= 0) {
val_newshape[j] = valshape[i];
} else if (i >= 0) {
CHECK_EQ(valshape[i], 1) << "index exceed limits.";
} else {
val_newshape[j] = 1;
}
}
valshape.assign(val_newshape.begin(), val_newshape.end());
if (seq_cnt == 1) {
numnew = valshape[axis];
} else {
numnew = seq_cnt;
}
newshape[axis] += numnew;
out_shape->push_back(newshape);
return shape_is_known(newshape);
}
NNVM_REGISTER_OP(_npi_insert_tensor)
.describe(R"code(Insert values along the given axis before the given indices.
Indices is tensor and ndim > 0.)code" ADD_FILELINE)
.set_attr_parser(ParamParser<NumpyInsertParam>)
.set_num_inputs([](const NodeAttrs& attrs) {
const NumpyInsertParam& params = nnvm::get<NumpyInsertParam>(attrs.parsed);
int input_count = params.val.has_value() ? 1 : 2;
return input_count + 1;
})
.set_num_outputs(1)
.set_attr<nnvm::FListInputNames>("FListInputNames",
[](const NodeAttrs& attrs) {
const NumpyInsertParam& params = nnvm::get<NumpyInsertParam>(attrs.parsed);
if (params.val.has_value()) {
return std::vector<std::string>{"arr", "obj"};
} else {
return std::vector<std::string>{"arr", "values", "obj"};
}
})
.set_attr<mxnet::FInferShape>("FInferShape", NumpyInsertTensorShape)
.set_attr<nnvm::FInferType>("FInferType", NumpyInsertTensorType)
.set_attr<mxnet::FCompute>("FCompute<cpu>", NumpyInsertTensorCompute<cpu>)
.set_attr<FResourceRequest>("FResourceRequest",
[](const NodeAttrs& attrs) {
return std::vector<ResourceRequest>{ResourceRequest::kTempSpace};
})
.add_argument("arr", "NDArray-or-Symbol", "Input ndarray")
.add_argument("values", "NDArray-or-Symbol", "Input ndarray")
.add_argument("obj", "NDArray-or-Symbol", "Input ndarray")
.add_arguments(NumpyInsertParam::__FIELDS__());
} // namespace op
} // namespace mxnet
| 2024-02-26T01:27:17.760571 | https://example.com/article/9809 |
Reviewer:
I made these following the exact recipe. I thought they were too salty. Otherwise, the consistency was good. There was a nice mild apple taste but could not get past the salt. Next time I would halve the amount of salt or omit altogether and add some cinnamon and nutmeg.
Reviewer:
My experience with these wasn't as good as I expected. They can out really moist almost like a biscuit. There wasn't much apple flavor even though I used fresh baking apples from the orchard. I probably won't make these again. :-(
Reviewer:
So good! Added just a little more sugar and used a Granny Smith apple. I used less than 1/2c milk, just enough to make it stick together. Dough was sticky but workable. I also added 1 tsp cinnamon and 1/2 tsp nutmeg. These scones were divine. | 2023-11-06T01:27:17.760571 | https://example.com/article/1239 |
We have a development version of a Windows based installer for Ubuntu which is designed to be:very simple to useprovide a no-risk installationno repartitioning the hard diskno changing the windows boot loaderEasy uninstallation.Low riskDoesn't use a virtual machineDoesn't significantly reduce performance of the resulting installationResulting installation supports everything a normal install does.Fast install
The aim of this installer is to provide an easier way for a Windows user to install Ubuntu without having to know how to burn a cd iso, set the bios to boot from cd, repartition the disks, set up a multiboot system, etc. It will not replace any of the current Ubuntu installation options, and will not require that windows is installed prior to the installation of Ubuntu.
The installer works by creating a disk image of a pre-installed ubuntu system on the hard disk (downloaded with a bittorrent downloader integrated into the installer, or a standard http download when we find mirrors), and then installing GRUB for windows, which can be chain loaded by the existing boot loader, and which then loads the linux kerner and initrd from the ntfs partition. The initrd is modified to support mounting the image file mentioned above as a root file system, and then continuing the boot process like a normal installation.
This does not use a virtual machine to run linux on, so the performance of the resulting system will be similar to the performance of any other linux installation. The system will use ext3 in the image file, so users will get all the benefits of a linux filesystem. | 2024-05-31T01:27:17.760571 | https://example.com/article/2483 |
State of The Union
With President Barack H Obama’s State of the Union address coming up on Wednesday of this week there are a number of very important aspects of America to look at and understand before listening to what this President has to say.
First and foremost is the most recent Activist Supreme Court Decision from the Roberts Court and the reality that 5 of these Justices should be arrested and brought to trial on treason for their run against the Constitution of the United States of America.
Just so Americans are clear on this topic, this ruling does not allow Corporate Entities to directly fund to the Politician; they still have to bribe through Lobbyists and Political Action Committees. This ruling allows the Corporate Entity to purchase advertising against or for a particular candidate or issue in the election right up to election day.
The reality of this is that if the Corporate entity spends just 1% of its Corporate Coffers they will have the ability to outspend all the Purchased Politicians from the President, Congress and Senate combined by a factor of 2 to 1 in the Corporate Communist’s favor in any election.
One year ago the Faith-Based Liar George W Bush with his Torturer Dick Cheney delivered to President Barack H Obama an economy that laid in ruins from 8 years of Liar’s loans and Wall Street greed coupled with insane Industrial, Military, Congressional complex spending for fraudulent wars. Make no mistake about this; the Faith-Based ignorant saber-rattling and disastrous foreign policy of the liar George W Bush is directly responsible for 9/11/01 and his Daddy, George H W Bush trained and equipped these Terrorists while supporting a secret war against the Russian occupation of Afghanistan. It’s history and it’s documented.
President Obama had no choice but to continue the obscene Bail-out of these “too big to fail” Banking and Wall Street entities, that the liar Bush left unregulated. President Obama’s loyalties are clearly defined by the Administration he brought being Citibank, Goldman-Sachs and Wall Street interests loaded instead of the highly qualified campaign advisors. Bernanke and his cohort in crime, Timothy Geithner continued the failed policies of Greenspan, Paulson and Bernanke’s own feeding of the Oligarchy.
With the Middle Class in ruins, their economic security shattered by the FED created real estate bubble bursting, President Obama is boxed into a corner of feeding the Industrial, Military, Congressional complex to maintain employment at status quo while providing lip-service to “a new green economy” that cannot happen without funding.
America is at war on 3 fronts. There is the 30+ year-long war on Drugs that is an absolutely failed prohibition. President Obama’s conciliatory move toward ending this is to instruct the Federal Department of Drug Enforcement to not prosecute the medical marijuana dispensaries. However the obscenity of this failed prohibition has created a murderous border war with Mexico and a half-million hunger refugees in Columbia from US Military spraying herbicides to attempt to eliminate coca growing. Human rights travesties that the United States failed policy on Drugs is responsible for from a Faith-Based Republican ignorant Bush that were begun by a Faith-Based actor and Republican. President Obama has yet to fully address this issue and it is an issue because of the push to legalize pot across the USA completely undermining the bloody Mexican Drug War.
Murder and Human Rights Violations that amount to Bush/Cheney War Crimes in GITMO are only the tip of this iceberg of CIA and the competing DOJ shadow group of Bush’s Mr. Rumsfeld’s design that extend throughout the Middle East and Black Ops networks across Europe. President Obama’s statements that American Torture ends with his Presidency helped the Foreign Relations but the issue is not solved.
A war in Afghanistan that is absolutely unwinnable and now escalated because of the electioneering and political activism of a lying General McCrystal who worked to cover-up the friendly fire death of athlete Pat Tillman.
A war in Iraq founded in the Lies of George W Bush, Dick Cheney and Donald Rumsfeld’s claims of Weapons of Mass Destruction and the Faith-Based George W Bush’s clearly stated belief that the demons Gogg and Magogg were at work in the Middle East as an indicator of the End Times of his Evangelical Hate Monger’s handlers and owners. This group’s war crimes extend through the unconstitutional use of a standing mercenary armed force of Military Contractors that feeds the Corporate Greed and demoralize the American Military Personnel by the outrageous wages these mercenaries are paid for working in the War Zone on “No-Bid” Military Contracts while the solders’ kids and wives struggle to buy groceries back home.
The results of the corruption of these military contractors is demonstrated by United States Military Personnel being electrocuted in the showers of newly constructed barracks. This is even more obscene evidence of this deriliction of duty from the liar George W Bush, the Torturer Dick Cheney and the Bush administration in general as well as the Military that accepted the conditions.
President Barack H Obama, at least, made the United States Citizens aware of this expense by the lying Faith-Based Bush and Torturer Cheney’s administration almost immediately upon his entry to the White House.
American Families were and still are under attack by the Corporate Communists Greed and the American Dream of Home Ownership was becoming the American Nightmare of Underwater Mortgages, bankruptcies and foreclosures not seen since the Great Depression. Clinton unlocked the Pandora’s Box of removing Glass-Steagall regulations of separating Commercial Banking and Investment Banking and it took the FEDs and Bush’s failure to oversee and reinsert regulation to bring the system to the brink of collapse in just 10 years.
American Labor’s wages have remained stagnant for 30+ years in spite of their productivity increasing three-fold while executive pay is now 4,000% higher than labor. The Middle Class discovered that the United States of America is really a Third World Country by the design of the Faith-Based lying Bush Administration and the subverted-by-the-Cults-of-Jesus Republican Party’s failed economic policy.
The Cults of Jesus are dependent upon oppressed, impoverished and ignorant populations to gain dominion. The Lying George W Bush and Torturing Dick Cheney certainly delivered these requirements into the hands of the Cults of Jesus just as the Republican Cults of Jesus intended. No child left behind indeed…
Katrina in New Orleans and the absolute devastation of Gulf Coast made this reality perfectly clear to Americans as Bush flew over and ignored this reality just as he ignored the reality of his Administration and the Republican Party taking a $236 Billion surplus from the Clinton’s Presidency and turning it into a deficit to equal the deficits of all the Presidents proceeding him combined!
These are the conditions that President Barack H Obama confronted as he took the helm of this juggernaut ship of State that Faith-Based George W Bush and the Torturer Dick Cheney delivered on to the rocks as an inauguration day gift to President Obama. The Republican Party has been real clear about wanting to “destroy” President Obama but what they’ve effectively done is work to destroy the United States of America.
This is the reality of President Barack H Obama who has created miracles in the restoration of America’s Foreign Policy, the stabilization of the economy, delivered the appearance of some fiscal responsiblity through the voice of Elizabeth Warren in the Congressional Oversight Committee of TARP although the American Citizens still see clearly that the special interests of Banking, Wall Street, Insurance and Corporate Communists own this political process because of spineless purchased politicians and their failures to act led by the Obstructionist Cults of Jesus Republicans. Where is the accounting of the TARP funds?
What the Corporate Communists and President Barack H Obama’s masters have done to support him is absolutely nothing. The Banks refuse to loan to small business to continue to drive unemployment rates over 10% that in reality are closer to 25% and there is no recovery on Main Street as these greedy, amoral oligarchs continue their global Ponzi scheme and drive toward their new world order.
The Cults of Jesus in America have mounted an offensive and bigoted Dominionist movement against this President and the Civil Rights of every American through their infiltration of the American Political Process and Globally as demonstrated by the “Kill the Gays” bill in Uganda driven by 5 United States Congressmen and the lying Cults of Jesus Evangelical, Catholic and LDS/Mormon Hate-Mongers “missions.”
This President has diligently worked to maintain his “Centrist” position and this appears to the independent and free-thinking Americans on Main Street as a complete sell-out and lack of leadership. What the average American sees from this President is the ultimate politician who is as spineless and without conviction as his Democratic party in Congress and the Senate and their inability to represent the people who put them into office because they bow to their Corporate Communist Masters. The media panders to fears and fails to report anything that may rub against the lying Right-Wing Cults of Jesus position, effectively turning all of the information available in media to the Australian/Arabian Faux Nuz bias of lying Cults of Jesus bigotry.
This is the virulent and vile Cult of Jesus Right-Wing Republican Domestic Terrorism that President Barack H Obama has courageously faced and with measured and careful actions begun to disarm. There are many voices out there to drown this atrocious vitriolic trolling for assassins and McCarthyism out of the public consciousness but that would affect Faux Nuz in their bottom line and heaven forbid that anything gets in the way of the God Almighty Buck in America according to the Cult of Jesus lunatics with Rupert Murdock the Aussie Crazy and his Arab partner at the helm.
Real Americans must understand and reject this kind of vile propaganda from continuing to dominate the public discussions if there is a Republic to be left standing. The Cult of Jesus driven Right Wing-Republican machine on the loose now is the greatest threat to United States security domestically and globally.
For me, and many of my peers, this self-described “Fierce Advocate” of LGBT civil rights is recognized as being of little to no value. When the real fight begins this President is hanging in the wings and waiting to see which way the wind blows to maintain his “centrist popularity” when he was elected for “real change you can count on.”
President Obama has delivered spineless drivel rhetoric and trillions of dollars into his Corporate Communist handlers.
We of the LGBT Community, their families and friends understand the incendiary nature of our Civil Rights to these Cult of Jesus, Tea Bagging Domestic Terrorists and provide President Obama the benefit of the doubt but this is a condition that will not continue for long. We have driven and will drive accountability and although the Matthew Shepard Hate Crimes Act was passed there are still EDNA, DOMA andDADTwaiting to be acted upon. The GayTM is closed as a result of this current impasse and the Cults of Jesus held at bay but at what cost?
A landmark trial in Perry v Schwarzenegger with Olson and Boies as the defenders of the Constitutional rights of LGBT Citizens rages in San Francisco but the “Fierce Advocate” of President Barack H Obama remains silent on this topic. There can be no topic more important to the United States than the Constitutional Guarantees of Life, Liberty and the Pursuit of Happiness with Equal Justice for all and this President, for fear of inflammatory position, remains silent.
President Barack H Obama has to decide if he intends continue to be the ultimate “Step-and Fetch-It” for his Banking, Wall Street and Corporate Communist Masters or if he is going to develop a spine and represent the American People who elected him for “Real Change You Can Count On.”
Mr. President, we are counting on you and we are sorely disappointed.
WHAT WE EXPECT:
The restoration of 1 biological person, 1 vote through a verifiable election process and fully recorded through the certification process by a body of Citizens in each district. We do not need, nor do we desire an “electoral college” to get between our vote and the elected candidate and we do not desire the Supreme Court to validate fraudulent elections as experienced with the Liar Bush and his Buba Jeb in Florida.
An end to the Wars, all the Wars, the Drug War, The War in Afghanistan and the War in Iraq. The Cost of Wars are obscene.
Bring our troops home to defend the United States Citizens from the Corporate Communists.
Destroy the FED.
American Citizens understand that the FED is a private banking cartel and we demand the FED be audited and abolished. A real United States, Taxpayer Owned and Operated, Banking Institution established to collect and distribute our tax dollars, loan to our small business and support the system of mortgage home ownership and other credit within the United States in direct competition with “the too big to fail” and the Banking cartel world wide. Americans demand protection for our freedom and this is the surest method available. This is not optional. This is War against the Oligarchy coming from Main Street.
We are demanding and we are getting our State Tax Dollars moved into small hometown Banks and Credit Unions who have an interest in our communities’ success and away from the “too big to fail” frauds that play games with our dollars to enrich themselves at the expense of the economy.
Real regulation of Wall Street and a clear separation of Commercial Consumer Banking from Ponzi Scheme Investment Banking and break up the “too big to fail” NOW.
A STRONG Consumer Protection Agency with regulatory ability as recommended by Elizabeth Warren to drive a roll back on Credit Abuse, Predatory Lending and obscene interest rates through the financial industry.
Provide American Citizens over 50 access to their Social Security Trust Fund accounts in the amount of 75% of contribution to inject economic stimulus into this economy now. The new business, the new investments, the new opportunities this will provide will turn this nation around independent of the FED’s and the Banking Cartel’s manipulation. Wall Street got their bail-out, now bail out the American Citizens. Main Street needs the injection of cash and we can manage our own money.
A Universal Health Care System paid for and supported by the United States Citizens that is independent of and clearly separate from the greed and abuse of Corporate Communist Insurance Industry Monopoly.
A restoration of Civil Liberties by the destruction of the unconstitutional Patriot Act put in place by the Lying George W Bush and the Torturing Dick Cheney. We additionally demand the impeachment of the 404 Senators and Congressmen who voted for the Patriot Act for abrogation of their sworn statement to uphold the Constitution of the United States of America. It’s long past time that the American Purchased Politicians understand that there are consequences for their actions and those are up to and inclusive of Criminal Charges.
A restoration of the Civil Liberties of the United States Citizens in the abolition of the prohibition of drugs in the USA including the importation of low cost drugs from Canada and Europe.
The immediate restoration of Civil Rights in the United States by striking down Defense Of Marriage Act and Don’t Ask Don’t Tell immediately confronting the Bigotry and Hate from the Fear-Mongers of the Cults of Jesus.
Restoration of the wall of separation between Church and State by bringing criminal charges against the Fellowship, the Family members in Congress and the Senate who sponsored the export of Cults of Jesus Hate by total abrogation of the oath to support the Constitution of the United States of America.
Criminal Charges for the War Crimes committed by the lying Faith-Based George W Bush, the Torturer Dick Cheney and the subversive Donald Rumsfeld.
The immediate closure of GITMO as a terrorist prison returning the detainees to their place of origin and securing our borders. These humans are of no threat to the security of the USA and continuing to torture and murder them is a reprehensible Human Rights Violation.
The immediate closure of American Military Bases around the globe.
The Cessation of Foreign Aid to Israel, Saudi Arabia, Syria and Lebanon until a peace accord is signed, sealed and delivered that includes a Palestinian homeland.
The immediate cessation of all military activities in Central and South America and the recall of ambassador Llorenz from Honduras because of his support of the Oligarchy and ineffectiveness in obtaining basic Human Rights for the Honduran People.
An immediate tariff on all imported goods from China and anything manufactured beyond the United States physical borders including a 35% tax on Corporate profits from any and all off-shore activities of United States Corporations.
An immediate tax on all Corporate Profits of 50% to fund the United States repayment of loans from the Chinese.
Universal Education for all United States Citizens through Doctoral Dissertation.
Amnesty for all illegal immigrants and the immediate securing of the United States borders as the primary task of the Military Personnel returned to the United States soil.
The immediate implementation of the improvements to the infrastructure of the United States including a domestic high-speed rail system, green public transportation and green energy production to insure every American household is energy independent within 10 years.
This is a legacy that a real President of the United States of America would pursue with a passion given the conditions that exist on a global basis today.
Develop a Spine Mr. President and deliver the “REAL CHANGE WE CAN COUNT ON” and do it now.
By taking clear and decisive actions, as outlined above, the Presidency of Barack H Obama will find a wellspring of support from the Independents, the Progressives and the true Conservatives of this Nation that will drown the Hate and Fear-Mongering of the Cults of Jesus Religious Right.
These actions, Mr President will move, will inspire Americans into the actions that are required to restore our Nation to prosperity, dignity and free us from the yoke of the Corporate Communists by allowing real Americans to control their lives once again with freedom, opportunity and dignity for all United States Citizens. This will restore America to her position of global leadership well into the future but it takes courge, it takes clear and decisive actions and it takes the backing of the United States Citizens. | 2024-07-27T01:27:17.760571 | https://example.com/article/9583 |
NCR Chapter Networking Meeting – 2016-05-18
Location: Jean Pigott Place, Ottawa City Hall. This second meeting of the 2016 season was held at another new location and was co-hosted by CPSEN and CareerJoy.
Subject: “Career Literacy: Navigating and building success in your Public Sector career”
Presentations: None available at this time.
Registrants: 115
Speakers:
Alan Kearns: Mr. Alan Kearns serves as the Head Coach and founder of CareerJoy. Dubbed by media as “Canada’s Career Coach”, Mr. Kearns has more than 22 years of experience coaching professionals with major career decisions. He has worked with a wide variety of senior Federal Government officials from numerous departments and agencies such as the Office of the Prime Minister, the Department of National Defence, Industry Canada, Public Safety & Emergency Preparedness Canada, the Department of Foreign Affairs & International Trade and Citizenship & Immigration Canada and the Royal Canadian Mounted Police. Voted one of the Top 40 entrepreneurs under the age of 40, Alan is a regular contributor to Canadian media on the latest trends in the Canadian workforce, he has contributed to numerous Television programs including, Till Debt Do U$ Part, Princess, Breakfast Television, The National & The Hour with George Stroumboulopoulos. He is the career expert on the O Network reality show – Million Dollar Neighbourhood. He provides regular commentary on career issues to a number of different news organizations including, CBC radio, CTV Canada AM, The Toronto Star, The National Post and The Globe and Mail. Under Mr. Kearns’ leadership, CareerJoy™ became the official career coaching company for Queen’s University Alumni, Carleton University Alumni, University of Toronto Alumni, Athabasca University Alumni, OCAD, Nippissing University, Bishops University, UNB Law, Dalhousie Law, York University and numerous other respected Canadian organizations. He hosts one of Canada’s leading career Podcasts “CareerJoy Conversations”. Mr. Kearns is certified in the Highlands Career Assessment Methodology and was a founding member of the International Association of Coaches (IAC). Mr. Kearns is grateful to have had the opportunity to demonstrate an extensive and established record of successfully coaching a wide array of diverse professionals toward achieving their life and career goals. This includes CEOs, senior banking, software and communications executives, professional athletes, senior Federal Government officials, Provincial Government employees, legal practitioners and more.
Greg Zador: Mr. Greg Zador, CareerJoy Senior Career and Leadership Coach, brings over 14 years of international affairs experience in addition to more than 15 years of senior public sector service. Building on his roots in political, international and community development, Mr. Zador has led and managed various teams domestically and abroad. His depth of management experience includes a wide variety of municipal, federal and international public sector management positions. Mr. Zador holds a degree from Concordia University’s School of Community and Public Affairs. Known as a naturally gifted career mentor and coach, Mr. Zador is recognized for combining his broad range of experience with aptitudes for astute analysis to provide well-grounded, articulate and discrete strategic advice to executive management teams, senior Boards and Councils.
Report
The meeting opened with a presentation by Alan Kearns who outlined the plan for the morning’s meeting. He drew most successfully on his career experiences and quickly captured the attention of all attendees. He was followed by Greg Zador who also had everyone’s attention. And attendees were quite prepared to participate – raising questions for our speakers.
Alan then introduced the Panel for a most interesting interactive session that engaged both Panel members and attendees alike.
Panel: There were five panelists who each made a major contribution to the meeting.
Tienne Chenier, Senior Policy Advisor, International Policy Coordination, with Immigration, Refugees and Citizenship Canada (IRCC). Over 13 years, Tienne has served in analyst, management and leadership capacities at IRCC and, prior to that, at Employment and Social Development Canada, where she was recognized for her outstanding contribution to the Office of Literacy and Essential Skills.
Joanne Wilkinson, Director of Operations, Social Policy Development, Privy Council Office. Joanne Wilkinson is Director of Operations, Social Development Policy, Privy Council Office. She has served in various senior capacities with Indigenous and Northern Affairs Canada, including as Regional Director General, in BC, Alberta, Ontario and Yukon Territory.
Susan Seally, Principal of Human Resources, Office of the Auditor General of Canada. Susan Seally is Principal, Human Resources, at the Office of the Auditor General of Canada. She has over 25 years of experience working in Human Resources in the public sector and has assisted hundreds of individuals along their own journeys.
Marie-Christine Huard, Chief of Staff to the Senior Executive Director, Canada 150 Federal Secretariat. Previously working for Non-Violence International located in Bangkok, Thailand, and progressing to Special Advisor for two Vice-Presidents at Parks Canada, Marie-Christine’s goal has always been to make a difference in the lives of Canadians; and
Richard Rochefort, former Assistant Deputy Minister, Canada School of Public Service. Richard is an expert in learning, leadership development, culture change and service excellence. During his decades of federal government experience, he was the recipient of several major awards for Valuing and Supporting People.
The meeting was a notable success thanks to the efforts of our Speakers and Panelists – and those of our 80+ attendees. It was clear that the subject was of tremendous interest and that all present took note of the program content. Feedback Reports Summary
The vast majority of respondents (66%) found the knowledge level of speakers and panelists “excellent,” one-third (28%) said they were “very good,” and 4% of respondents found them “good.” As for the materials/topics presented, less than half of the respondents (42%) appreciated them as “excellent,” while 42% found them “very good” and 14% “good.”
A large majority of the respondents (90%) rated the panelists’ ability to answer questions “excellent” and “very good” while 9% rated it “good.” Again, in terms of appreciating the panelists and speakers in general, a vast majority 94% of respondents found them “excellent” and “very good.”
The majority of respondents liked the panel, Alan’s presentation, and the free flow of honest information as well as the practical suggestions. Many wrote that the panel was excellent, helpful, and shared good ideas. The respondents also appreciated the venue, the natural light and seating arrangements. In general, respondents enjoyed the session, its broad appeal, relevancy, as well as the opportunity to connect and network.
In terms of constructive feedback, respondents would have enjoyed receiving handouts, copies of the presentations and more visual aids to compensate for the quality of the LCD projection. They would have also appreciated the opportunity to connect better with an Ice Breaker activity and/or actual workshop activities in small groups; and
92% of respondents said they would recommend CPSEN events to their colleagues as an opportunity to network, learn and broaden professional circles.
We also wish to thank our co-host CareerJoy whose management and staff were most helpful in preparing and running this event.
Unfortunately there are no photos available at this time but it is hoped there soon will be an opportunity to post them to this site. | 2024-04-03T01:27:17.760571 | https://example.com/article/9426 |
Review of aldosterone- and angiotensin II-induced target organ damage and prevention.
Aldosterone is well recognized as a cause of sodium reabsorption, water retention, and potassium and magnesium loss; however, it also produces a variety of other actions that lead to progressive target organ damage in the heart, vasculature, and kidneys. Aldosterone interacts with mineralocorticoid receptors to promote endothelial dysfunction, facilitate thrombosis, reduce vascular compliance, impair baroreceptor function, and cause myocardial and vascular fibrosis. Although angiotensin II has been considered the major mediator of cardiovascular damage, increasing evidence suggests that aldosterone may mediate and exacerbate the damaging effects of angiotensin II. While angiotensin-converting enzyme (ACE) inhibitors and angiotensin II receptor blockers reduce plasma aldosterone levels initially, aldosterone rebound, or 'escape' may occur during long-term therapy. Therefore, aldosterone blockade is required to reduce the risk of progressive target organ damage in patients with hypertension and heart failure. This may be achieved nonselectively with spironolactone or with use of the selective aldosterone blocker eplerenone. While both agents have been demonstrated to be effective antihypertensive agents, eplerenone may produce improved target organ protection as witnessed in a variety of clinical settings, without the antiandrogenic and progestational effects commonly observed with spironolactone. | 2023-12-21T01:27:17.760571 | https://example.com/article/3594 |
30.000 feet above the icy waters of the North-Atlantic, a dangerous stand-off is unfolding.
Since spring 2007, Russia has renewed the maritime patrolling of its Strategic Long-Range Air Force, sometimes buzzing the borders of its northern neighbours with virtual armadas of bombers, several times a week. Officially, Russia claims that the flights are “a normal” activity, with the only goal of training its air crews. In reality, claim experts, they are demonstrating to the NATO neighbours the ability to conduct strategic nuclear strikes. Occasionally the bombers have been used to convey harsh political messages from the Kremlin. Such as during the meeting of NATO’s defence ministers in Noordwijk, the Netherlands in October 2007, when two Russian TU-160 supersonic bombers simulated a nuclear strike on that city.
Routinely NATO fighters are scrambled from the northern air base Bodø whenever the Russian approach the borders of Norway.
In the documentary “Cold Peace” we have portrayed two pilots from two different countries that meet regularly for these chilling mid-air rendevouz; Norwegian fighter pilot Bjorn and Russian bomber pilot Gennady. Includes exclusive footage from the secretive air base Engels-1 inSouthern Russia, and rare shots from real interception missions. | 2024-05-14T01:27:17.760571 | https://example.com/article/2351 |
Solutions for the Dogless
Apartment's too small? Boyfriend's allergic? Perhaps just not down with
de-pooping the backyard? Whatever the reason, if you or someone you
know is simply not ready to become a full-time dog parent, peruse the
following list of alternatives for people looking to cram some dog-time
into an otherwise (sniff) dogless existence.
1. Dog-sit. Got a friend-with-dog? Make his/her day with a homemade
coupon book that offers ten free dog-sits. Later, if you wish to expand
your client roster and turn this into a paying gig, consider
registering with Pet Sitters International, a great resource for
would-be petsitters and those seeking sitting alike. petsit.com
4. Pick up a cuddle buddy from Perfect Petzzz. In lieu of the real
thing, Perfect Petzzz will send you a soft, sleeping, plush pup that
"breathes" like a real dog and comes equipped with a bed, brush,
carrier, tag, and adoption certificate. Basically a four-legged Cabbage
Patch Doll, come to think of it. perfectpetzzz.com
5. Become a foster parent. There are countless dogs out there looking for a warm place to temporarily call home. fosterdogs.com
6. Get woken up by slobbery kisses every time you fall asleep on your
keyboard with the help of My Monitor Pets' "licking" screen savers. For
as little as $4.99, you can choose from Cooper, Punky, or Dudley,
amongst other kissing canines. You can even order them up as animated
screensavers for your cell. mymonitorpets.com
7. Buy a Nintendog. From the genius crew who brought you Mario and
Luigi, comes the ultimate real-pet substitute: a digital dog that you
can teach tricks, feed, bathe, neglect (if you're not careful),
socialize, and LOVE. Great for parents looking to give their kids a
petcare preview. nintendogs.com | 2024-06-24T01:27:17.760571 | https://example.com/article/6720 |
Q:
Анимация градиента SVG под углом
Как правильно реализовать анимацию градиента SVG элемента под углом и с задержкой?
svg {
transform: rotate(250deg);
}
<svg>
<circle r="27" cx="28" cy="28" fill="url(#lightGradient)"/>
<linearGradient id="lightGradient">
<stop offset="0%" stop-color="rgba(0,99,71, 1)">
<animate attributeName="stop-color" values="rgba(0,99,71, 0.62); rgba(0,99,71, 0.12)" dur="4s" repeatCount="indefinite"/>
</stop>
<stop offset="100%" stop-color="rgba(228,210,9, 1)">
<animate attributeName="stop-color" values="rgba(228,210,9, 0.62); rgba(228,210,9, 0.22)" dur="4s" repeatCount="indefinite" />
</stop>
</linearGradient>
</svg>
A:
Угол наклона градиента обеспечивают параметры:
x1="45" x2="0" y1="75" y2="0"
Анимация перехода градиента из одного цвета в другой:
.crc1 ~ defs stop {
transition: 3s;
Подбирая значения цвета начального градиента -stop:first-child
и конечного - stop:last-child можно получить очень интересные эффекты:
Анимация начинается при наведении курсора:
.crc1 {
fill: url('#grad1');
}
.crc1 ~ defs stop {
transition: 3s;
}
.crc1 ~ defs stop:first-child {
stop-color: #24bed2;
}
.crc1:hover ~ defs stop:last-child {
stop-color: #F4FFAF;
}
<svg class="the-svg" width="200px" height="200" viewBox="-10 -10 120 120">
<circle class="crc1" cx="50" cy="50" r="50" stroke="#F4FFAF"/>
<defs>
<linearGradient id="grad1" x1="45" x2="0" y1="75" y2="0" gradientUnits="userSpaceOnUse">
<stop offset="2%" stop-color="#2C2C2C"/>
<stop offset="50%" stop-color="#2C2C2C"/>
</linearGradient>
</defs>
</svg>
| 2024-03-13T01:27:17.760571 | https://example.com/article/4025 |
---
abstract: 'This paper focuses on a mathematical model interpreting the prime number life cycle of periodical cicadas, *Magicicada spp.* . Changed the viewpoint to predators rather than the prey,this model fits reality very well by utilizing some principles and assumption.With the definition of the predator income,natural selection from predators seems to be the main reason for such a long life cycle.Consequent solution of this model is exactly the fact of real nature.'
author:
- 'Shi Chen[^1], Sheng Bao[^2],Jian-Xiu Chen[^3]'
bibliography:
- 'cicada.bib'
title: A Model Analyzing Life Cycle of Periodical Cicadas
---
Introduction
============
Periodical cicadas (*Magicicada spp.*) distribute in North America.Their nymphae feed on juice of young plant root systems, living underground for 17 or 13 years. So they are also called 17 years cicadas or 13 years cicadas. Smith’s research revealed some species of spiders are nature enemies of periodical cicadas.
As to the long prime number life cycle of North America cicadas, there has been dispute among academicians. May[@May] and Murray[@Murray]believed it was only coincidence and without much biological meanings. Japanese scientist Yoshimura[@Yoshimura] argued such long period was to prevent inbreeding. Lloyd and Dybas[@Dybas] suggested some parasites caused this periodical life cycle.
Other scientists, however, hold the belief that prime number life cycle could avoid killing from predators. Gould[@Gould] argued if life cycle of cicadas was 12 years, it would possibly encounter predators whose life cycles are 2,3,4,6 or 12 years; but while the cicadas have prime number life cycle such as 7 or 11 years, only those predators who have exactly the same life cycle could devor them. That is to say prime number life cycle tends to minimize the loss.
This model is terse and clear.But it is lack of material interpretation of long period cycle and cannot explain differences between 11 years and 13 years life cycle: why no 11 year cicadas has been found in North America. Consequently, a more detailed model with biological meanings is required. Hoppensteadt and Keller[@Hoppensteadt]set up a differential equation but their results seemed not very prefect.The calculated life cycle may vary with different parameter values. Goles group [@Goles2001] [@Goles2000] also presented some papers but their research were based on cicadas whose model setting and discussion are comparatively difficult. So a predator-centered model is achieved and solves the fascinating long life cycle problem.
Establishing the Model
======================
Webb[@Webb] in his research assumed that the life cycle of the ancestor of periodical cicadas varied between 2 to 18 years, while that of the predator varied between 2 to 5 years. To get more precise conclusion,we assume the life cycle of predators is between 2 and 9 years.
According to the opinion of Hoppensteadt and Keller[@Hoppensteadt], if the life cycle of predator equals that of the prey(cicada),the predator obtains its maximum satisfactory:its chance of survival and reproduction. We define its income of the predator is “1”.
Denote the life cycle of predator and prey as N and n respectively.
If $n<N$, during the entire life of the predator,only in one year it has the opportunity to catch the prey.In this year,we say the predator synchronize with the prey and we define the income of predator as $\frac{1}{N}$ for this condition.
If $n>N$ and $n$ is a multiple of $N$,($n=kN,k=1,2,\dots$), the ($k-1$)-th generation offspring of the predator has the opportunity to catch the prey and the ($k-1$)-th generation offspring takes $\frac{1}{2^{N-1}}$ genetic material of the predator.In this case,we define the income of predator as $\frac {1}{2^{k-1}}$
If $n>N$ but $n$ is not a multiple of $N$,there is a probability of $\frac{1}{N}$ for the offspring who takes $\frac{1}{2^{[n/N]-1}}$ genetic material of the predator to synchronize with prey.To this condition,we define the income as $$\frac {1} {N} \frac{1} {2^{[n/N]-1}}$$ where the symbol \[ \] means floor.
From the assumptions above, the income of the predator is function of both the predator and the prey life cycles.Denoting the income as $f$,we obtain
$$f(n,N)=
\begin{cases}
1 & n=N \cr
\frac{1}{N} & n<N \\
\frac{1}{2^{k-1}} & n=kN,k=1,2,\dots \\
{1} \over {N 2^{[n/N]-1}} & n>N \ \text{and} \ n \neq kN,k=1,2,\dots\\
\end{cases}
\label{f}$$
Solution of this model
======================
According to Eq.\[f\],we can calculate out the income of predator in different permutation of life cycle of the prey and the predator. The result is listed in Table \[income\]
-------- -------- -------- -------- ------------ -------- -------- -------- -------- -------- ------------
prey’s 1 2 3 4 5 6 7 8 9 Total
1 1.0000 0.5000 0.3333 0.2500 0.2000 0.1667 0.1429 0.1250 0.1111 2.8290
2 0.5000 1.0000 0.3333 0.2500 0.2000 0.1667 0.1429 0.1250 0.1111 2.8290
3 0.2500 0.5000 1.0000 0.2500 0.2000 0.1667 0.1429 0.1250 0.1111 2.7456
4 0.1250 0.5000 0.3333 1.0000 0.2000 0.1667 0.1429 0.1250 0.1111 2.7040
5 0.0625 0.2500 0.3333 0.2500 1.0000 0.1667 0.1429 0.1250 0.1111 2.4415
6 0.0313 0.2500 0.5000 0.2500 0.2000 1.0000 0.1429 0.1250 0.1111 2.6102
7 0.0156 0.1250 0.1667 0.2500 0.2000 0.1667 1.0000 0.1250 0.1111 2.1601
8 0.0078 0.1250 0.1667 0.5000 0.2000 0.1667 0.1429 1.0000 0.1111 2.4201
9 0.0039 0.0625 0.2500 0.1250 0.2000 0.1667 0.1429 0.1250 1.0000 2.0759
10 0.0020 0.0625 0.0833 0.1250 0.5000 0.1667 0.1429 0.1250 0.1111 1.3184
11 0.0010 0.0313 0.0833 0.1250 0.1000 0.1667 0.1429 0.1250 0.1111 0.8862
12 0.0005 0.0313 0.1250 0.2500 0.1000 0.5000 0.1429 0.1250 0.1111 1.3857
13 0.0002 0.0156 0.0417 0.0625 0.1000 0.0833 0.1429 0.1250 0.1111 **0.6823**
14 0.0001 0.0156 0.0417 0.0625 0.1000 0.0833 0.5000 0.1250 0.1111 1.0394
15 0.0001 0.0078 0.0625 0.0625 0.2500 0.0833 0.0714 0.1250 0.1111 0.7737
16 0.0000 0.0078 0.0208 0.1250 0.0500 0.0833 0.0714 0.5000 0.1111 0.9695
17 0.0000 0.0039 0.0208 0.0313 0.0500 0.0833 0.0714 0.0625 0.1111 **0.4344**
18 0.0000 0.0039 0.0313 0.0313 0.0500 0.2500 0.0714 0.0625 0.5000 1.0003
Total 2.0000 3.4922 3.9271 **4.0000** 3.9000 3.8333 3.5000 3.3750 3.2778
-------- -------- -------- -------- ------------ -------- -------- -------- -------- -------- ------------
: Income of Predators[]{data-label="income"}
Assuming the life cycle of ancestor of the prey and the predator is random distributed in 1 to 18 and 1 to 9 respectively, we can calculate out income of the predator in different life cycle choice of the prey and the predator by adding value of $f(n,N)$ in rows and in columns respectively. The result is listed in the column and row labeled “Total”.
Data in “Total” column indicates the income of the predator the different life cycle choice of the prey whereas data in “Total” row reflects the income of the predator vs. its life cycle.They are represented in dash line with round marker and solid line with cross marker in Figure \[vs\] respectively.
![life cycle vs. income[]{data-label="vs"}](17years.eps)
According to Figure \[vs\],the prey choose 13 and 17 years as its life cycle can minimize the income of predator while the predator choose 4 years as its life cycle can maximize its income.
Accordance with Reality
=======================
From Table \[income\] and Figure \[vs\], the 13 and 17 years life cycle could reduce the income of predator significantly, which accords with the fact. Moreover, the troublesome “11” year period problem is solved that 11 years life cycle is not so efficient in reducing income of predators.
Solid line in Figure \[vs\] indicates 4 years should be the best choice for predators.Vail[@Vail] pointed out one nature enemy of periodical cicadas *Mud dauber* has life cycle of 4 years which accords with this model well.
Conclusion
==========
Unlike traditional researches,this paper is a predator-focused model to interpret the phenomena of prime number life cycle of periodical cicadas in north America.The model utilizes some basic principles and assumptions.Defined the income of predator, this simple fits the reality very well.Both the fact from *Magicicada spp.* and its predator supports our conclusion.
Appendix {#appendix .unnumbered}
========
The MATLAB code for calculation and plotting.
% Matlab code for calculating.Cicada V.2 Last Modified at Oct.9,2005
% Programmed by Sheng Bao <shengbao@ieee.org> <http://grandlab.cer.net/~bao>
% --This code is distributed under the terms of GNU GPL (General Public License)
% --You can modify it and redistribute it freely but you must keep is open source.
for n=1:18 % prey
for N=1:9 %predator
if n==N
f(n,N)=1;
elseif n<N
f(n,N)=1/N;
elseif (n>N)&&(rem(n,N)==0)
f(n,N)=2^(1-(n/N));
else
f(n,N)=1/(N*2^(fix(n/(N)-1)));
end
end
end
for i=1:18
m1(i)=sum(f(i,:));
end
for i=1:9
m2(i)=sum(f(:,i));
end
box on plot(m1,'--ko','MarkerEdgeColor','k','MarkerFaceColor',[1 1
1],'MarkerSize',6)
hold on
axis([1 18 0 4.1])
set(gca,'XTick',1:1:18)
set(gca,'XTickLabel',{'1','2','3','4','5','6','7','8',...
'9','10','11','12','13','14','15','16','17','18'})
plot(m2,'-kx','LineWidth',1,'MarkerEdgeColor','k',...
'MarkerFaceColor',[1 1 1],'MarkerSize',8)
legend('income vs. life cycle of the prey',...
'income vs. life cycle of the predator',3)
xlabel('Year of life cycle')
ylabel('income of predator')
title('')
[^1]: School of Life Science, Nanjing University,Nanjing 210093 China,chenshinju@gmail.com
[^2]: Dept. of Information Engrg., Nanjing Univ. of P & T, Nanjing 210003,China,shengbao@ieee.org
[^3]: School of Life Science, Nanjing University, Nanjing210093,China, chenjx@nju.edu.cn
| 2024-03-13T01:27:17.760571 | https://example.com/article/8255 |
2013 Meistriliiga
The 2013 Meistriliiga (also known as A. Le Coq Premium Liiga for sponsorship reasons) was the 23rd season of the Meistriliiga, the first level in the Estonian football system. The season began on 2 March 2013 and ended on 9 November 2013. Nõmme Kalju, the defending champions, finished runners-up behind Levadia, who won their 8th title.
Teams
2012 Esiliiga champions Infonet, who lost out to Kuressaare in the promotion/relegation play-off as Esiliiga Runners-up in 2011, were promoted to this season's Meistriliiga making their first appearance in the top division. Esiliiga runners-up Tarvas lost out on promotion as Meistriliiga's 9th placed club Tallinna Kalev defeated them 3–1 on aggregate in the Promotion/relegation play-off.
Tammeka finished at the bottom of the 2012 season but escaped relegation due to dissolving of seventh place Viljandi.
Stadiums and locations
Personnel and kits
Note: Flags indicate national team as has been defined under FIFA eligibility rules. Players and Managers may hold more than one non-FIFA nationality.
Managerial changes
Player transfers
Transfers made during the 2012–13 winter transfer window:
Transfers made during the 2013 summer transfer window:
League table
Relegation play-offs
Tammeka as 9th-placed team faced 2013 Esiliiga side Rakvere Tarvas in a two-legged play-off for the spot in next year's competition.
Tammeka won 6–2 on aggregate and retained their Meistriliiga spot for the 2014 season.
Results
Each team plays every opponent four times, twice at home and twice away, for a total of 36 games.
First half of season
Second half of season
Season statistics
Top scorers
Top goalkeepers
Hat-tricks
4 Player scored 4 goals.
Awards
See also
2013 Esiliiga
2013 Esiliiga B
2012–13 Estonian Cup
2013–14 Estonian Cup
References
Category:Meistriliiga seasons
1
Estonia
Estonia | 2024-03-17T01:27:17.760571 | https://example.com/article/4070 |
Slow bolus injection of ribose in the identification of thallium-201 redistribution following combined adenosine/dynamic exercise stress.
A simple stress/redistribution thallium-201 myocardial perfusion imaging protocol may underestimate the degree of thallium redistribution in a defect identified on the stress images. We sought to investigate whether a slow-bolus injection of D-ribose improves the identification of thallium redistribution following combined adenosine/dynamic exercise stress. Fifteen patients (10 males, five female, median age 63 years, range 50-75) were enrolled in the study. All underwent two successive adenosine plus exercise myocardial perfusion scintigraphy protocols 7-14 days apart. Adenosine was infused at 140 micrograms.kg-1.min-1 coupled with 25 W ergometer pedalling for 6 min with 74 Mbq of thallium-201 being injected at 4 min. Immediately following the stress image acquisition, patients received the one of either 60 mg.kg-1 of D-ribose or normal saline, injected over 5 min. Redistribution images were acquired after 4 h. The identical stress procedure was conducted in the crossover arm of the study, and patients received the alternative test article. SPECT images were visually analysed and scored in a nine segment model by two blinded observers. In addition, circumferential profile analysis was conducted. By visual interpretation 25 segments displayed redistribution of the ribose, but not in the saline study, 14 reversible segments were seen on the saline study alone and 18 were seen on both studies (P = ns). In six patients ribose identified a greater number of redistributing segments and in a further six patients saline identified more reversible segments. Comparison of mean values of defect extent severity and percentage reversibility scores generated from the circumferential profile analysis showed no significant difference between the two arms of the study. A 5 min bolus injection of D-ribose following combined adenosine/dynamic exercise stress confers little benefit on the identification of redistribution of thallium-201. These results differ from those of previous studies which showed that a 30 min infusion of D-ribose following treadmill exercise significantly enhanced thallium redistribution. The duration of the ribose infusion is likely to be an important factor influencing the effect brought to bear on the redistribution of the tracer, and should be run over 30 min, or longer. | 2023-09-08T01:27:17.760571 | https://example.com/article/5201 |
Shutter assemblies typically include two or more shutter panels configured to be installed within a frame relative to an architectural structure, such as a window. Each shutter panel includes a shutter frame and a plurality of louvers configured to be rotated relative to the shutter frame. For instance, the ends of the louvers are often rotatably coupled to the shutter frame via louver pegs to allow the louvers to be rotated relative to the frame between a substantially vertical orientation and a substantially horizontal orientation. Additionally, in many instances, a tie bar may be secured to all or a portion of the louvers of each shutter panel to couple the louvers to one another, thereby allowing such louvers to be rotated simultaneously relative to the adjacent shutter frame.
To enhance the functionality and usability of shutter assemblies, attempts have been made to integrate automatic louver drive systems within shutter assemblies that allow for the automatic adjustment of the rotational orientation of the louvers. For example, louver drive systems have been developed in the past that include multiple motors as well as complex gearbox arrangements associated with each motor. As a result, these conventional louver drive systems are often costly and quite difficult to design and manufacture. In addition, due to the use of multiple motors and associated gearboxes, such louver drive systems significantly increase the overall weight of the associated shutter assembly and also reduce the available space for the louvers of the shutter assembly given the significant storage requirements for the motors/gearboxes.
Accordingly, a shutter assembly having an improved motorized louver drive system would be welcomed in the technology. | 2024-01-30T01:27:17.760571 | https://example.com/article/2475 |
The present invention relates to infrared (IR) and ultraviolet (UV) absorbing soda-lime-silica glass compositions for use in glazing. More particularly, the present invention relates to windows of a neutral tint made from such glasses primarily, but not exclusively, for vehicles such as automobiles.
Special glasses have been developed for use in vehicles which have low levels of direct solar heat transmission (DSHT) and ultraviolet transmission (UVT). These glasses aim to reduce the problems caused by excessive heating within the vehicle on sunny days, and to protect the interior furnishings of the car from the degradation caused by ultraviolet radiation. Glasses having good infrared absorption properties are usually produced by reducing iron present in the glass to the ferrous state or by adding copper. Such materials give glasses a blue color. The materials added to achieve good ultraviolet radiation absorption are Fe.sup.3+, Ce, Ti or V. The quantities of such materials which are added to provide the desired level of absorption tend to color the glass yellow. Accordingly, if both good UV and good IR absorption are required in the same glass, the color of such glass is, almost inevitably, either green or blue. When the color of the glasses is defined by the CIELAB system, such commercial glasses, in 4 mm thickness and having greater than 60% light transmission, are found to be either very green (-a*>8) or very blue (-b*>7), neither of which are currently desirable from an aesthetic viewpoint.
Attempts have been made to produce grey or bronze-colored vehicle glazing having good protection against both IR and UV radiation, but such glasses still tend to have a greenish yellow tinge.
We have identified a requirement for a range of glasses having a neutral tint and a visible light transmittance (Illuminant A) of at least 70 percent such that, in the CIELAB system, the glasses have color co-ordinates lying in the ranges a* from -7 to +1, b* from -5 to +7.5. The term "neutral tint" is hereinafter used to describe glasses having such color coordinates.
We have further identified a requirement for glasses having a neutral tint which have visible light transmissions of at least 70 percent (at a thickness of 4 mm), but which also have a direct solar heat transmission which is at least twelve percentage points (preferably fifteen percentage points and most preferably twenty percentage points) less than the visible light transmission. Basically, glasses are known which do have a low direct solar heat transmission but nearly all of these have a low visible light transmission which tend to make such glasses of limited use in vehicles. Glasses satisfying the above-identified requirements should, we anticipated, be of more general use in vehicles due to the higher light transmission but the lower direct solar heat transmission should keep the interior of the car cool despite the higher light transmission.
Furthermore, we believed that it would be desirable if the glasses had an ultraviolet transmission less than 55% and ideally less than 50% because we felt that such a low transmission would minimize the adverse effects of ultraviolet radiation on plastics material and fabrics, particularly in automotive vehicles.
The field of tinted glasses is one in which relatively small changes can produce major changes in tint. Wide ranges disclosed in prior patents can encompass many possibilities, and it is only the teaching of the specific examples that can be relied on as identifying how particular tints associates with particular ranges of absorption of infrared and ultraviolet radiation can be obtained.
Our invention is based on the surprising discovery that the incorporation of relatively small amounts of certain coloring agents compensates for the green color arising from the presence of infrared and ultraviolet radiation absorbing components. | 2024-06-02T01:27:17.760571 | https://example.com/article/3348 |
Q:
glCreateSyncFromCLeventARB alternative?
I would like to save a call to clFinish() in OpenCL before using cl_command_queue result in OpenGL (I have a shared image/texture used in OpenCL/GL).
I found in the book "OpenCL Programming by Example" (p. 243) that creating a GLsync from an OpenCL event using glCreateSyncFromCLeventARB is the way to do this.
The problem is that this function seems to be unsupported on Apple platform.
I'm aware that Apple has their own way to implement OpenGL/OpenCL interoperability using GCD. However, I understand that this would require me to completely change my code and use a non standard OpenCL API for everything, and I want my code to be cross-platform (except minor adaptations where necessary).
Any other alternative to glCreateSyncFromCLEventARGB?
A:
According to the OpenCL 1.1 specification, if an OpenCL platform or device supports the cl_khr_gl_event extension then you can skip the clFinish / glFinish calls.
Specifically, in section 9.9.1 on p. 332 it says "In addition, this extension modifies the behavior of clEnqueueAcquireGLObjects and clEnqueueReleaseGLObjects to implicitly guarantee synchronization with an OpenGL context bound in the same thread as the OpenCL context." (emphasis mine)
So you don't actually need to use the clCreateEventFromGLsyncKHR function that this extension enables, nor the rarely-found GL_ARB_cl_event extension unless you need other types of synchronization (other than what clEnqueueAcquireGLObjects and clEnqueueReleaseGLObjects supply).
| 2024-01-05T01:27:17.760571 | https://example.com/article/9175 |
Q:
Why the first view in my project is not taken the name of the project
When i create new project with the name MyNewProject with a single view application template, with the storyboard feature, i got the view controller named ViewController. My Question is why i am not getting a view named MyNewProjectViewController? am i always obliged to rename the view manually? is that normal?
A:
When creating the project, you can tell Xcode to add a Class Prefix to the generated class files. You can set it to MyNewProject if you want and your view controller will be called
MyNewProjectViewController.
However, the class prefix is generally much shorter than that (two or three letters). For example, for a project called Anrgy Birds, I would use the prefix AB.
| 2024-04-14T01:27:17.760571 | https://example.com/article/6460 |
Let’s Go to Roadhouse! No, Not That One
Kids, you tried your best and you failed miserably. The lesson is never try – Homer Simpson
I was tired and hangry. My friends had just come into town and I had been holding off on eating so that we could all eat together. Two of them were here to get tattoos, so I knew that I was in for at least another 2 hour wait once they arrived. I originally wanted to eat at a restaurant close to the tattoo parlor, but as time passed, I knew that we were cutting it close on time. Instead, I had another friend pick a place that was opened past 11PM. That’s how we landed on College Roadhouse.
Located next to “Rodeo” nightclub, close to the HEB on N. Lamar
My friend had scrolled through a list that she found of restaurants open past 11, and she chose College Roadhouse because she saw “Korean fried chicken” and “karaoke“. I was kind of bummed at the time because I was really looking forward to this other restaurant I had originally picked. I had tried, and I had failed due to time constraints. But that’s life. And what’s funny is that my friend didn’t try really hard and was able to find this hidden gem*.
*For those of you who would like to argue that this isn’t that hidden anymore, I took a sample of 10 friends, and only one of them had ever heard of this place*
That arm had only two pokeballs before this picture was taken – proof that my story checks out
One of the things that hits you when you first walk in is the aesthetic. Checkered ceiling, projector screens with KPop music videos, and cork board walls littered with graffiti from past customers. 75% of our conversations revolved around what people wrote and drew on the walls, and the YouTube music playlist that they had queued up from a computer. It was all so engaging.
Before we dive into the food, I’m going to be honest. I did not come into this restaurant thinking I was going to do a blog post on it. I was really hungry, and as a result, I had tunnel vision when I looked at that menu. Fried chicken was all I could think about once my friend mentioned it, and so that’s what my eyes gravitated towards. One quick Yelp or Instagram search will show you that this place has a lot more to offer than just chicken. That being said, though, let’s get right into it:
Kimchi
You can’t go into a Korean restaurant without ordering some kimchi. You just can’t. Nothing spectacular here,though – they’re not trying to reinvent the wheel – but not a bad way to get your taste buds going.
Waffle Fries
My friend absolutely loved these, but I thought they were alright. The fry on it was honestly a little too heavy for my taste, but it was still a solid waffle fry overall.
Wait, wait, pause. Okay, ATXFoodies, you just built up how this place surprised you in the beginning, and you show us two okay things that you and your friends ordered? I’m unimpressed. Underwhelmed. Okay, my loving audience, I hear you. Just wait for it.
Kimchi fries, chicken drums in sweet soy garlic sauce
Ahh, here we go. The kimchi fries – good. Great combination of sauces on top that add a creamy finish to a crispy fry. This shouldn’t be what you come here for, though. Come here to try the chicken.
The mother cluckin’ chicken.
Do you know that feeling when you first bite into a piece of fried chicken with sauce on it? If you’ve had a good one – and I mean a really good one – it’s the perfect combination of crunchy, crispy, juicy, chickeny goodness. The crunch is somewhere in between a Pluckers chicken tender covered in sauce, and a Gus’s or Lucy’s fried chicken. It’s not TOO crunchy, but it’s also not too soft. If you’ve ever had Korean fried chicken, this isn’t new. But I particularly like the texture you get at College Roadhouse.
When you take that first bite and you get a bit of the meat with a little bit of skin, it’s magical. My mouth is literally watering right now as I try to relive the taste and describe it to you. The chicken was perfectly cooked. It was tender and juicy – not much more you can ask of your fried chicken. And then add in the well balanced sauce. I wasn’t too blown away by the sweet soy garlic, but I definitely recommend the spicy and sweet Korean chili sauce:
Wings with the spicy and sweet Korean chili sauce
It’s not that hot. I would say it’s right under the spice level of your typical buffalo sauce. But it still hits you. I remember distinctly eating each wing, the flavor of the sauce amplifying each time I finished one, and being really disappointed when it all came to an end after my last wing. I didn’t want to drink any water or eat anything else after that because I wanted to remember the flavor of that sauce for as long as possible. The sweet countering the spice – it’s so simple, yet it works so well. I crave this sauce now, and I would definitely order it again.
All in all, a wonderful experience.
We didn’t end up doing karaoke, but there is that option if you pay the price, which if I remember correctly, is $20-30 depending on the day.
Don’t forget to make your way to @ATXFoodiesBlog on Instagram for more hunger inducing food pictures. | 2024-05-26T01:27:17.760571 | https://example.com/article/8658 |
INTRODUCTION {#sec1-1}
============
The reported incidence of pediatric renal stones is 50 cases/100,000 children.\[[@ref1]\] Treatment options for renal stones in pediatric population include shock wave lithotripsy (SWL), percutaneous nephrolithotomy (PCNL), retrograde intrarenal surgery, and laparoscopic and/or robotic approach.\[[@ref2]\] Management of such cases usually poses challenges to a pediatric urologist to choose the ideal treatment modality with high stone clearance rate and low morbidity.\[[@ref3]\] The European Association of Urology guidelines recommended the PCNL as the therapy of choice for complex renal stones and when unfavorable factors for SWL exist.\[[@ref4]\] The standard PCNL tract may be too large for pediatric kidneys and meanwhile poses a significant risk of bleeding and increased morbidity.\[[@ref5]\] Miniperc technique was introduced by Jackman *et al.* in an effort to reduce the morbidity related to standard PCNL.\[[@ref6]\] The purpose of this study was to review our experience with the Miniperc technique in pediatric age group to assess its safety as well as appropriate inclusion criteria.
MATERIALS AND METHODS {#sec1-2}
=====================
Between August 2012 and January 2015, 34 patients (25 males and 9 females) with renal stones \<3 cm underwent stone extraction using Miniperc technique. Indications for surgery included failed SWL, large stones that required repeated sessions, and patients whose families desired one-session therapy. The mean age of children was 8.8 ± 3.7 years ranged from 5 to 15 years. Informed consent from parents of all participants was written and specified in the operative consent. Approval for this study was obtained from the ethics committee of our hospital.
Initial evaluation included detailed history, routine hematological investigations including coagulation profiles, urine analysis, and culture. Radiologic examinations including plain X-ray of the kidneys, ureter, and bladder (KUB), renal ultrasound, intravenous urogram, or computed tomography (CT) were performed routinely to assess the stone characters, identify the anatomy of collecting system, and provide an anatomical proof for establishing percutaneous tract. Postoperative radiological screening was done at day 1, then after 1 and 3 months by KUB, and ultrasound and/or CT for the evaluation of residual stones and any reported complications. Postoperative complications were graded by the Clavien--Dindo classification.\[[@ref7]\]
Miniperc surgical technique {#sec2-1}
---------------------------
Under general anesthesia and with administration of intravenous broad-spectrum antibiotic 1 h before induction, the child positioned in the dorsal lithotomy position and an 8.5 Fr pediatric Storz cystoscope was used for retrograde stenting of the affected kidney by 4--5 Fr ureteric catheters. After the patient turned to prone position, the desired calyx punctured, then the tract was dilated by means of coaxial progressive fascial dilators, and a 14 Fr working sheath was placed under fluoroscopy. We used 8/9.8 Fr rigid ureteroscope (R-URS) (Richard Wolf, Knittlingen, Germany) with pneumatic lithotripter (LithoClast™ Richard Wolf GmbH, Knittlingen, Germany) or 20 W holmium:YAG laser (Lumenis, Santa Clara, CA, USA), 200-μm laser fiber with an energy output of 0.8--1.5 J at 8--12 Hz for stone fragmentation. Big fragments \>2 mm were removed with a forceps. Stone clearance was assessed under fluoroscopy, and finally, 5 Fr DJ stent was inserted through the tract (removed after 3--4 weeks) or ureteric catheter left in place according to surgeon\'s preference. Nephrostomy tube of suitable size may be used to drain the kidney in suspected bleeding or residual stones and removed accordingly after 2--3 days postoperatively.
RESULTS {#sec1-3}
=======
Our study recorded 25 (73.6%) boys and 9 (26.4%) girls who underwent one-session single tract Miniperc technique. The mean patient\'s age was 8.8 ± 3.7 years. Fifty-three percent of the patients (18 of 34) had stones in the left kidney and 47% (16 of 34) in the right kidney. Previous ipsilateral open renal stone surgery was recorded in three children. Stones were solitary in 64% (pelvic in 53%, calyceal in 11%) and multiple (pelvic and calyceal) in 36%. Stone density was graded on three levels based on comparison with the adjacent rib (3: more dense detected in 70%, 2: isodense in 18%, and 1: less dense in 12%). Stone size varied from 18 to 30 mm (mean 23 mm). We reported the effect of different stone characters on stone-free rate (SFR), and there were no statistically significant differences regarding these characters \[[Table 1](#T1){ref-type="table"}\]. Mild-to-moderate hydronephrosis was noted in all patients. Pneumatic lithotripter and holmium: YAG laser were used in 16 and 18 patients, respectively. Mean operative time was 50 min. It was calculated from beginning of cystoscopy till fixation of the stent or tube. There were no intraoperative complications in all cases. Only two cases reported postoperative complications of Grade 2a (potentially life-threatening complications required medications only). Sepsis was reported in one case with renal pelvic and lower calyceal stone 2.5 cm and suspected due to prolonged procedure (90 min). Bleeding was recorded in another case who required no blood transfusion while nephrostomy tube was inserted for 3 days and removed after clamping and the child discharged with DJ stent removed after 3 weeks. The mean hospital stay was 48±12 hours. There is no consensus on the definition of SFR. It is usually considered as stone fragments smaller than 2 mm. The overall SFR was 82.4% (28 of 34 patients). The remaining 6 (17.6%) patients were considered unsuccessful due to residual stone fragments need auxiliary procedures. Of these patients, four performed SWL as the residual stone was 5 mm in one patient and three patients refusing second-look PCNL with complete stone clearance after one session. Two patients with 7 mm stone lower calyx refusing secondary procedure while follow-up of them up to 6 months revealed stable stone size without documented urinary tract infection (UTI). After secondary procedures, 94% of the patients achieved the stone-free status. Follow-up was completed for all patients after 1 month, while only 30 and 25 patients completed the follow-up after 3 and 6 months, respectively. Five patients recorded recurrent attacks of ipsilateral renal pain during follow-up. UTI without obstruction reported in one patient and completely eradicated after treatment according to culture and sensitivity, while the remaining four patients underwent noncontrast head CT and urine analysis without any detected cause.
######
Effect of different factors on stone-free rate
Variable Number of patients (%) SFR (%)
----------------- ------------------------ -----------
Stone size (mm)
\<20 14 (41.2) 12 (85.7)
\>20 20 (58.8) 16 (80)
*P* 0.9
Stone density
More dense 24 (70) 20 (83)
Isodense 6 (18) 5 (83.3)
Less dense 4 (12) 3 (75)
*P* 0.5
Stone site
Pelvis 18 (52.9) 17 (94.4)
Calyceal 4 (11.7) 4 (100)
Pelvicalyceal 12 (35.3) 10 (83.3)
*P* 0.46
Stone number
Solitary 21 (64) 19 (91.3)
Multiple 13 (36) 12 (90.9)
*P* 0.9
Stone side
Left 18 (53) 17 (94.4)
Right 16 (47) 14 (87.5)
*P* 0.47
Sex
Male 25 (73.5) 22 (88)
Female 9 (26.5) 9 (100)
*P* 0.43
SFR: Stone-free rate
DISCUSSION {#sec1-4}
==========
The main goal in the management of pediatric stones is to achieve complete clearance, eradication of infection, and correction of any metabolic or congenital disorders. All stone treatment modalities are applicable in pediatric age group. The guidelines recommended SWL as the first-line treatment for pediatric renal stones ≤20 mm.\[[@ref8]\] While due to lower re-treatment rates requiring less auxiliary procedures, PCNL has gradually become the mainstay replacing SWL for treatment of large stone burdens in children.\[[@ref9]\] Although traditional PCNL carries the advantages of clear vision and high stone clearance, while in pediatric patients, it can still be associated with significant complications, such as uncontrolled hemorrhage attributed to using large instruments in smaller kidneys.\[[@ref10]\] Performing the standard PCNL with a miniature endoscope via a small percutaneous tract (11--20 Fr) is termed as minimally invasive PCNL or Miniperc. Few reported series of Miniperc in children exists. Jackman *et al.* developed the novel percutaneous access technique Miniperc using a 13 Fr peel-away sheath and reported 85% SFR for 11 procedures in seven children with a mean age of 3.4 years.\[[@ref11]\] In other small series, the Miniperc was done safely and effectively in children with a mean stone burden of 1.5 cm in most studies and SFR of 70%--95%.\[[@ref12][@ref13][@ref14]\] In our initial experience with Miniperc, we evaluated the SFR in relation to different stone characters. There was no significant difference according to these characters. The mean stone size was 23 mm which was expected to lead to lower clearance, while the overall early SFR was 82.4% which increased to 94% after secondary procedures. This is may be due to stone dusting settings used during laser (increased frequency and lower wattage). The SFR in this study was comparable with other studies on Miniperc in children done through a 14--16 Fr sheath. Bilen *et al.*\[[@ref15]\] reported 90% SFR using 14 Fr Miniperc in children with a mean age of 6.3 years. Wang *et al.*\[[@ref16]\] reported their results of Miniperc on children aged under 3 years. All procedures were performed by single tract, including 245 14 Fr tracts, one 16 Fr tract, and one 12 Fr tract, respectively. Majority of cases had stone burden 1--2 cm. Mean operating time was 32.5 min (range 21--62 min). Complete SFR has been reported as 97.2%.
In our study, the mean operative time was comparable to that reported by Nischith and Saptarshi (58 min) in 20 Miniperc pediatric patients.\[[@ref17]\] In another study of 26 cases of Miniperc through 14 Fr sheath using a 9.5 Fr (R-URS) with holmium:YAG laser lithotripsy, the operative time reported was 71.08 min, which considered by the authors as the drawback of Miniperc related to diminished field visibility and the need for prolonged lithotripsy to obtain small fragments suitable for extraction through the small sheath. However, they reported 19.2% of cases with stones size 3--4.8 cm.\[[@ref18]\]
The aim of the Miniperc is to reduce complications such as blood loss, intraoperative--postoperative pain, and hospital stay.
As bleeding significantly correlated with operative time, stone complex, and sheath size in pediatric patients,\[[@ref19]\] using 8/9.8 Fr (R-URS) via 14 Fr tract obviously reduced the damage of renal parenchyma and vessel. Many studies on Miniperc reported no blood transfusion.\[[@ref13][@ref20][@ref21]\] However, one study required blood transfusion in 4 (15%) patients using a 14 Fr sheath.\[[@ref22]\] In our study, there was only one patient of postoperative bleeding that required no blood transfusion. He had complex pelvic and middle calyceal stone about 2.8 cm. The small tract of the procedure with high intrapelvic pressure may lead to pyelovenous-lymphatic backflow that may be complicated by bacteremia and postoperative fever.\[[@ref23]\] In this study, we lowered the intrapelvic pressure using operating instruments that are smaller than the access sheath to allow the leakage of irrigating fluids and also keep inflow of irrigants at gravity and never pressurized. This may be responsible for reporting only one case of sepsis due to prolonged procedure.
One of the limitations of our study is the small number of patients and it was conducted at single center. However, as it is one of few prospective studies about the use of Miniperc in pediatric age group with different stone characters, we believe that it will be of value to the literature. A comparative study with conventional PCNL with long follow-up period should be done.
CONCLUSION {#sec1-5}
==========
With our initial experience, Miniperc is safe and not related to major blood loss or other serious complications and could be reasonable alternative for renal stones in children.
Financial support and sponsorship {#sec2-2}
---------------------------------
Nil.
Conflicts of interest {#sec2-3}
---------------------
There are no conflicts of interest.
| 2024-01-18T01:27:17.760571 | https://example.com/article/7162 |
As we work to bring even more value to our audience, we’ve made important changes for those who receive Ad Age with our compliments. As of November 15, 2016 we will no longer be offering full digital access to AdAge.com. However, we will continue to send you our industry-leading print issues focused on providing you with what you need to know to succeed.
If you’d like to continue your unlimited access to AdAge.com, we invite you to become a paid subscriber. Get the news, insights and tools that help you stay on top of what’s next.
Most Popular
New York-—Social media must be considered as a single ingredient within a portfolio of campaigns, and not bear the burden alone of driving revenue or other "hard" metrics, according to a panel of marketers who spoke at today's BtoB NetMarketing Breakfast in Manhattan.
"The real ROI of social media is quite different in the b-to-b space," said Kirsten Bjork-Jones, director-global marketing communications at Edmund Optics. "Our social goals have no reference to revenue but rather focus on consistent content that supports our core business."
Christine Jacobs, director-demand programs at IBM Corp., agreed that the metrics surrounding social media marketing need to be considered in the context of an overall marketing approach.
"As marketers, we can dashboard ourselves to death if we allow it to happen," Jacobs said. "Social media succeeds when it picks out and supports a few KPIs that are tied to business outcomes."
With social marketing so dependent on content, Jacobs said it's best to focus on relevancy of content and making sure it's packaged and delivered appropriately to the right audiences.
Bill Strawderman, executive director, b-to-b marketing and social media at AT&T Inc., said social outreach is still evolving at his company, primarily in an effort to put a human face on AT&T and position it as a brand to trust.
"Trust is shifting from institutions to people, allowing employees to be voices of the brand," Strawderman said. He cited the company's efforts to highlight in-house experts, train them in creating informative blogs, and give them platforms to express themselves.
"It wasn't in our DNA to have people write content on a daily basis, so we had to build a 'Trust Academy' to teach them social media skills," Strawderman said. As for harder metrics, AT&T's efforts in social media are having an impact on the company's search engine optimization results, he said.
While Mercury Systems, which provides technology subsystems to the Defense Department, does engage in social media, its prime focus this past year has been on rebranding itself. Going by the name Mercury Computer Systems for 30 years, the company had grown both organically and through acquisitions, and needed a new identity to communicate its evolved product lineup and position in the marketplace, said Phil Juliano, CMO.
"In the b-to-b world, branding matters," Juliano said. "Most all major brands have had to reinvent themselves at different points of time."
Mercury Systems not only changed its name, but also revamped its website and created a new tagline, "Innovation That Matters." Along with the new website came a new URL, which caused a slippage in unique visitor volume. However, with the new site and positioning, "site stickiness"—page views, pages per visit and time on site—all showed improvement, Juliano said. | 2023-12-08T01:27:17.760571 | https://example.com/article/8537 |
Judge Michael L. FabbriAnthony Perritt, 23, of 25 Wawecus Road, Apt. 2, Worcester, charged with breaking and entering in the nighttime for a felony, two counts receiving stolen property under $250, continued to Nov. 7.
Scott T. Phelan, 27, of 13 Ellsmere St., Worcester, charged with driving with a suspended license, negligent driving, failing to stop for police and speeding, continued to Nov. 8.
Jean Clemente-Arroyo, 20, of 328 Chandler St., Apt. 1, charged with larceny under $250, dismissed without prejudice.
Naji Lahhoud,43, of 83 Ledgecrest Drive, Worcester, charged with assault and battery on a disabled person over 60, dismissed, placed on probation until March 11, 2014; assault and battery, dismissed without prejudice.
Theresa Calderon, 30, of 31 Oread St., Apt. 30, Worcester, charged with assault and battery on a police officer, continued to Oct. 11 on $100 cash bail.
Franklin Arevaldo, 23, of 52 Bowdoin St., Apt. 1, Worcester, charged with assault and battery, dismissed.
David Dean, 24, 299 Oxford St., Auburn, charged with breaking and entering into a building in the nighttime, and two counts receiving stolen property under $259, continued to Nov. 7.
Judge Steven E. ThomasGino Pointdujour, 30, of 97 Malden St., Worcester, charged with assault and battery, continued to Oct. 30 on $500 cash bail.
Israel Perez, 48, of 1 Mason St., Apt. 1, Worcester, charged with vandalizing property and assault and battery on a disabled person over 60, continued to Oct. 4 on $250 cash bail.
Jeremy A. Hoschek, 34, of 36 Gibbs St., Apt. 2, charged with breaking and entering in the daytime for a felony, continued to Oct. 10 on $1,200 cash bail.
Lionel Escobar, 40, of Roxbury section of Boston, charged with carrying a dangerous weapon and possession of crack cocaine, continued to Oct. 10 on $2,500 cash bail.
Nour M. Mohieldon, 49, of 19 Mohave Road, Worcester, charged with assault and battery, continued to Oct. 21 on $1,000 cash bail.
Raymond E. Mace Jr., 66, of Seabrook. N.H., charged with two counts larceny by check over $250, continued to Nov. 6.
Wanda Diaz, 37, of 25 Queen St., Worcester, charged with open and gross lewdness, trespassing, disturbing the peace and carrying a dangerous weapon, continued to Oct. 8 on $1,000 cash bail.
James Kelleher, 42, of 32 Houghton St., Worcester, charged with assault and battery, dismissed, sufficient facts found but continued without a finding until March 11, 2014; breaking and entering in the nighttime for a felony, dismissed.
Westboro District Court
Judge Vito VirziFernando J. DeSa, 56, of 82 Newton St., Apt. 1, Marlboro, charged with driving under the influence of alcohol or .08 percent (third offense), driving with license suspended, marked lanes violation and failing to wear seat belt, continued to Oct. 9.
Richibert R. Alexander, 27, of 12 Mount Vernon St., Apt. 1, Worcester, charged with possession to distribute Class B substance, sufficient facts found but continued without a finding for one year, $50 victim-witness assessment; and conspiracy to violate drug laws, dismissed.
Peter Callahan, 45, of 48 Westbrook Road, No. B, Northboro, charged with driving with a suspended license, dismissed.
Pamela A. O'Donnell, 42, of 14104 Avalon Drive, Northboro, charged with driving under the influence of alcohol or .08 percent, failing to stop for police and speeding, continued to Oct. 23.
Taralee M. Magaw, 28, of 11 Hartwell St., West Boylston, charged with driving under the influence of alcohol or .08 percent, marked lanes violation, speeding and driving in violation of license restriction, continued to Oct. 17.
Nathalia O. Teixeira, 22, of 110 Lincoln St., Hudson, charged with malicious destruction of property over $250, continued to Nov. 7, must have no contact with alleged victim.
Rhayanne Freitas, 23, of Framingham, charged with assault and battery, continued to Nov. 7.
Quinn W. Fox, 54, of 20 Jericho Hill Road, Southboro, charged with assault and battery, dismissed; and wanton destruction of property under $250, dismissed.
Israel Gonzalez, 25, of 46 Mendon St., Apt. 1, Worcester, charged with possession to distribute a Class B drug, dismissed; and conspiracy to violate drug laws, dismissed.
Shamere Tejeda, 26, of 506 Plantation St., Worcester, charged with driving with a suspended license, continued to Oct. 28.
Beryl S. Rosenstein, 45, of 966 Grafton St., Apt. C39, Worcester, charged with assault and battery, dismissed.
Andrew J. Pratte, 31, of 25 John Gilbert Road, West Brookfield, charged with driving with a suspended license, sufficient facts found but continued without a finding for one year with supervised probation; and possession of a Class E drug, sufficient facts found but continued without a finding for one year with supervised probation, must complete 30-day inpatient drug treatment program and any recommended aftercare, remain drug-free and submit to random screens, two Narcotics Anonymous or Alcohol Anonymous meetings each week; $65 monthly probation fee and $50 victim witness assessment.
Fabricio G. Aredes, 34, of 8 Shrewsbury Green Drive, Apt. J., Shrewsbury, charged with assault and battery, continued to Oct. 23. | 2024-04-17T01:27:17.760571 | https://example.com/article/3650 |
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Nearly a decade ago, Microsoft co-founder Paul Allen founded Stratolaunch to build an aircraft capable of launching orbital rockets. At the time, the company's leadership included a host of luminous spaceflight officials, including former NASA chief Mike Griffin, who said the Stratolaunch aircraft “would make a very effective launcher."
Initially, the company planned to launch rockets built by SpaceX. But over time, the company's plans changed to fly Pegasus rockets built by Orbital ATK. Eventually, Stratolaunch dropped this idea and announced that it was developing its own line of rockets.
Alas, the aircraft never did prove to be an effective launcher. In fact, what became the world's largest airplane took flight just one time, in April, 2019. The Stratolaunch plane reached speeds above 300km/h and heights of 5km during its 150-minute test flight before landing safely at the Mojave Air and Space Port.
But the plane has been grounded since. And last summer, less than a year after Allen died in October, 2018, Stratolaunch effectively ceased operations. In recent months, however, the company has been rehiring employees, and this week it officially unveiled a new business plan—building and operating hypersonic test beds.
To facilitate this, the company released preliminary designs for "Talon-A," a reusable vehicle capable of reaching Mach 6. (Hypersonic flight is generally defined as speeds above Mach 5 through the atmosphere.) The company says its 8.5-meter-long Talon-A vehicle is a "flexible, high-speed testbed built for hypersonic research, experiments, and enabling operational missions." It is not clear when the Talon-A will be ready for flight.
Stratolaunch aims to provide customers with routine and repeatable access to the hypersonic environment for both "proprietary and classified" payloads. The company says that, because its 117-meter-wide aircraft is so large, it can accommodate three Talon vehicles at a time to support various operational scenarios.
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
Stratolaunch
"Our hypersonic testbeds will serve as a catalyst in sparking a renaissance in hypersonic technologies for our government, the commercial sector, and academia," said W. Jean Floyd, Stratolaunch's chief executive, in a statement.
This is an interesting, if not wholly unexpected, turn for Stratolaunch. During the last decade, the aerospace community has often collectively scratched its head, wondering how such a large aircraft could be cost-competitive in the hotly contested market to launch small- and medium-sized satellites. And without a dedicated rocket in existence, the company seemed little more than a vanity project for the wealthy Allen. If Stratolaunch served any purpose, the speculation went, it must be to meet some unspecified military need.
There can be no question that the military is interested in hypersonic technology. China, Russia, and the United States are all racing to develop hypersonic missiles, as well as new countermeasure technology as high-speed missiles threaten to penetrate most existing defenses. A Rand Corporation report from 2017 provides more basic information, suggesting, "There is probably less than a decade available to substantially hinder the potential proliferation of hypersonic missiles and associated technologies."
If the company succeeds in developing the Talon-A vehicle—and we probably should have some healthy skepticism given that this is about the fifth or sixth vehicle proposed to fly on the Stratolaunch aircraft—it has a chance to help the military both test hypersonic missiles and potentially mitigate against them.
Listing image by Stratolaunch | 2024-04-03T01:27:17.760571 | https://example.com/article/1750 |
Total miniaturized cardiopulmonary bypass: the next step in minimally invasive aortic valve replacement.
Minimally invasive aortic valve replacement has been established in many centres over the last decade. Although numerous modifications have been described to date, these solely involve variations of the utilized operative incision. Total miniaturized cardiopulmonary bypass (tMCPB) offers the theoretical potential of reducing even further the overall procedural "invasiveness". We describe our initial experience of an application of MCPB for aortic valve replacement through a minimal incision. | 2024-01-25T01:27:17.760571 | https://example.com/article/3574 |
There were 13,949,218 child support-eligible families in the United States in 1997. A child support-eligible family is defined as a custodial parent with an own child under age twenty-one living in the household whose other parent is living but absent from the household. A majority of the child support-eligible population receives services through the IV-D program. This analysis found that 8.4 million families, or 60 percent of the 13.9 million child support-eligible parents, participated in the IV-D system. Table 1 provides an overview of all of the family variables analyzed in this report, shown for the entire child support-eligible population. Beginning with Table 2, all subsequent tables identify these characteristics within the IV-D and non IV-D populations.
The March CPS can be used to determine the participation of families in a variety of public assistance programs. Approximately 2.4 million (17 percent) of child support-eligible parents lived in families in which at least one member received cash assistance through the TANF program. Participation in the Medicaid program was reported by 34 percent of these families, and 25 percent were enrolled in the Food Stamp program. Approximately one in one eight of the child support-eligible families reported receiving housing subsidies (in the form of public housing or housing assistance), and about 6 percent collected a portion of their family income from the SSI program.
Participation in the four non-cash public assistance programs (Medicaid, food stamps, housing subsidies, and SSI) was used to identify the three categories of families that are shown in each table: families receiving cash assistance, families receiving assistance from other government programs (but not cash assistance), and families not receiving any public assistance. As reported above, about 2.4 million child support-eligible families were receiving cash assistance, while an additional 3.2 million (23 percent) were receiving other public assistance but not cash assistance. Of the 13.9 child support-eligible families, three in five were not receiving any public assistance.
Significant variations in receipt of public assistance existed between the IV-D and non IV-D populations (Table 2). Among those families in the IV-D program, the percentages of those receiving cash assistance (28 percent), those receiving other public assistance only (34 percent), and those receiving no public assistance (38 percent) were split relatively evenly. However, an overwhelming majority (92 percent) of the 5.6 million child support-eligible families not in the IV-D program received no public assistance at all in 1997.This last statistic is affected by the assumption, stated above, that all families in which either income was received from TANF cash assistance or in which either the parent or child was covered by Medicaid, therefore participated in the IV-D program.
About 4.4 million (52 percent) of all IV-D families had a family income under $20,000 in 1997, while 5.7 million (68 percent) had an income under $30,000 (Tables 3A and 3B). Families receiving TANF or other public assistance had, on average, lower incomes than those not receiving assistance. More than four-fifths of child support-eligible families receiving cash assistance, and three-fifths of those reporting other public assistance, had incomes of $20,000 or below. Conversely, only one in five of IV-D families receiving no public assistance had incomes below $20,000.
Families participating in the IV-D program generally had lower incomes than non IV-D families. While the annual incomes of a majority of IV-D families fell below $20,000, only 22 percent of non IV-D families fell into that same income range. In both categories, families receiving no public assistance had higher incomes than those reporting some reliance on government programs.
Ratio of Income to Poverty Level
In addition to family income, the ratio of the family's income to the poverty level is an important measure of economic well-being. Each year, the Census Bureau estimates poverty thresholds that are adjusted for the size of the family unit. In 1997, the weighted average poverty threshold was $12,802 for a family of three and $16,400 for a family of four (Table 4A).
Over 3.3 million, or 40 percent of the IV-D families were below this threshold, and over two-thirds had incomes that fell below 200 percent of the poverty level. In addition, nearly 14 percent of IV-D families were in "deep poverty", or had incomes below 50 percent of the poverty level (Tables 4B and 4C). A large majority (74 percent) of IV-D families receiving cash assistance were poor, as were 44 percent of those families receiving only other government assistance. IV-D families with no public assistance were less poor, with only one in ten having incomes below poverty and 61 percent having incomes at or above 200 percent of the poverty level.
In contrast to those families receiving IV-D services, only 12 percent of non-IV-D families were poor, while more than two-thirds of these families had incomes above 200 percent of the poverty level. Additional outcomes for families both in poverty and near poverty (incomes below 200 percent of the federal poverty level) can be found later in this analysis.
The vast majority of families in the IV-D system are headed by custodial mothers. There were over 7.5 million IV-D families headed by females in 1997, making up 90 percent of all families receiving IV-D services (Table 5). Only about 840,000 families headed by fathers were in the IV-D caseload. However, while families headed by custodial fathers made up only 10 percent of IV-D families, custodial fathers headed nearly a quarter (22 percent) of child support-eligible families not receiving IV-D services. In addition, custodial fathers were less likely than custodial mothers to depend on public assistance; 58 percent of IV-D families headed by men were receiving no public assistance in 1997, compared to 36 percent of female-headed IV-D families.
Marital Status of Custodial Parent
Among all custodial parents of IV-D families in 1997, 38 percent had never been married, while 41 percent were divorced or separated, 19 percent were currently married, and a small number had been widowed. By contrast, a much lower percentage (18 percent) of non IV-D parents had never been married (Table 6). Of all families headed by a never-married parent, about three-fourths were participating in the IV-D program. Never-married parents also made up a high percentage of the IV-D family heads who also received TANF cash assistance in 1997 (54 percent). Of those families not receiving IV-D services, a large majority 81 percent were headed by parents who were divorced, separated, or currently married.
Residence of Noncustodial Parent
The data indicate that the custodial parent and noncustodial parent did not live in the same state in nearly 2.3 million IV-D families, comprising 27 percent of the IV-D caseload (Table 7). The percentage of interstate cases was not substantially different within the IV-D caseload than out of it (27 percent versus 24 percent). Within the IV-D caseload, custodial mothers receiving TANF or other public assistance were no more likely than those not receiving public assistance to report that the noncustodial parent lived in a different state. However, among those not receiving IV-D services, custodial parents who reported receiving non-cash government assistance were slightly less likely than those not receiving assistance to live in a different state than the noncustodial parent (68 percent as compared to 77 percent).
Nearly two-thirds (63 percent) of all IV-D families had child support agreements in place in 1997, while 45 percent of families reported the receipt of some amount of child support payment (Table 8). Families receiving no child support payments made up a majority of both the IV-D and non IV-D populations, those families participating in the IV-D program were more likely to at least have a child support agreement (63 percent as compared to 50 percent). IV-D families receiving no public assistance were more likely to have an both an agreement and receipt of payment (54 percent) than IV-D families reporting receipt of TANF (29 percent) or other government assistance (40 percent). In both the IV-D and non IV-D populations, families with both no agreement and no receipt were more likely to receive some public assistance than were other families.
Survey Disclaimer
According to the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number. The valid OMB control number for this information collection is 0990-0379. The time required to complete this information collection is estimated to average 5 minutes per response, including the time to review instructions, search existing data resources, gather the data needed, and complete and review the information collection. If you have comments concerning the accuracy of the time estimate(s) or suggestions for improving this form, please write to: U.S. Department of Health & Human Services, OS/OCIO/PRA, 200 Independence Ave., S.W., Suite 336-E, Washington D.C. 20201, Attention: PRA Reports Clearance Officer. | 2024-01-28T01:27:17.760571 | https://example.com/article/1160 |
Q:
Oracle SQL Developer - Trying to return products by quarter
I am trying to return a list of products that only appear in one quarter. I have decided the best way to do this is to I have been fiddling around with my code for a while and tried a COUNT but realised that this wouldn't work as it is counting the number of entries a product has rather than the number of quarters it appears in.
These are my three tables:
SALES FACT TABLE
TIME_KEY PRODUCT_KEY BRANCH_KEY LOCATION_KEY POUNDS_SOLD AVG_SALES UNITS_SOLD
----------------------------- ----------- ---------- ------------ ----------- ---------- ----------
22-DEC-13 08.31.18.442000000 2 B1 L19 21542.39 10821.2 100
21-DEC-10 21.19.37.182000000 3 B8 L5 65487 32793.5 100
13-SEP-13 06.36.03.720000000 7 B2 L15 78541.84 39470.92 400
24-JUN-13 12.21.45.186000000 1 B7 L13 94115 47167.5 220
18-SEP-07 12.58.06.873000000 8 B2 L2 54000 27250 500
11-FEB-11 18.06.08.475000000 8 B9 L6 11123 5636.5 150
28-SEP-13 15.06.20.153000000 6 B3 L16 45896.31 23008.16 120
22-DEC-08 19.34.48.490000000 5 B6 L3 87451.01 43875.51 300
23-JUL-13 20.08.51.173000000 6 B6 L14 69542 34971 400
20-DEC-13 22.47.24.962000000 9 B4 L17 21584.39 10872.2 160
21-DEC-06 19.11.50.472000000 5 B10 L1 10000 27250 500
13-MAR-13 14.13.58.555000000 1 B2 L11 62413 31256 99
06-MAR-13 18.15.40.365000000 4 B6 L10 94785 47542.5 300
20-DEC-13 23.35.12.683000000 2 B5 L18 52359.19 26289.6 220
15-MAR-13 19.11.58.459000000 4 B9 L12 66499.84 33299.92 100
19-DEC-11 13.17.34.443000000 9 B2 L7 51449 26049.5 650
14-FEB-12 10.20.20.787000000 10 B5 L8 66589 33394.5 200
19-DEC-09 10.09.41.844000000 3 B7 L4 99125 49687.5 250
22-MAR-12 19.36.24.790000000 10 B2 L9 62331.66 31765.83 1200
11-JAN-14 19.18.58.595000000 7 B8 L20 35214.85 17667.43 120
TIME DIMENSION TABLE
TIME_KEY DAY DAY_OF_WEEK MONTH QUARTER YEAR
----------------------------- ---------- ----------- --------- ------- ----------
13-MAR-13 14.13.58.555000000 13 WEDNESDAY MARCH Q1 2013
22-DEC-13 08.31.18.442000000 22 SUNDAY DECEMBER Q4 2013
21-DEC-10 21.19.37.182000000 21 TUESDAY DECEMBER Q4 2010
15-MAR-13 19.11.58.459000000 15 FRIDAY MARCH Q1 2013
21-DEC-06 19.11.50.472000000 21 THURSDAY DECEMBER Q4 2006
28-SEP-13 15.06.20.153000000 28 SATURDAY SEPTEMBER Q3 2013
11-JAN-14 19.18.58.595000000 11 SATURDAY JANUARY Q1 2014
11-FEB-11 18.06.08.475000000 11 FRIDAY FEBRUARY Q1 2011
20-DEC-13 22.47.24.962000000 20 FRIDAY DECEMBER Q4 2013
14-FEB-12 10.20.20.787000000 14 TUESDAY FEBRUARY Q1 2012
24-JUN-13 12.21.45.186000000 24 MONDAY JUNE Q2 2013
20-DEC-13 23.35.12.683000000 20 FRIDAY DECEMBER Q4 2013
19-DEC-09 10.09.41.844000000 19 SATURDAY DECEMBER Q4 2009
06-MAR-13 18.15.40.365000000 6 WEDNESDAY MARCH Q1 2013
22-DEC-08 19.34.48.490000000 22 MONDAY DECEMBER Q4 2008
23-JUL-13 20.08.51.173000000 23 TUESDAY JULY Q3 2013
13-SEP-13 06.36.03.720000000 13 FRIDAY SEPTEMBER Q3 2013
18-SEP-07 12.58.06.873000000 18 TUESDAY SEPTEMBER Q3 2007
19-DEC-11 13.17.34.443000000 19 MONDAY DECEMBER Q4 2011
22-MAR-12 19.36.24.790000000 22 THURSDAY MARCH Q1 2012
PRODUCT DIMENSION TABLE
PRODUCT_KEY PRODUCT_NAME BRAND TYPE SUPPLIER_TYPE
----------- ------------------------- -------------------- ---------- ----------------
1 SVF1521P2EB SONY LAPTOP WHOLESALER
2 15-A003SA COMPAQ LAPTOP WHOLESALER
3 15-N271SA HP LAPTOP RETAIL
4 15-N290SA HP LAPTOP RETAIL
5 E6400 DELL LAPTOP RETAIL
6 SVF1521C2EB SONY LAPTOP WHOLESALER
7 SVF1532K4EB SONY LAPTOP WHOLESALER
8 C50-A-1CK TOSHIBA LAPTOP WHOLESALER
9 NX.MF8EK.001 ACER LAPTOP RETAIL
10 NP915S3G-K01UK SAMSUNG LAPTOP RETAIL
This is the code that I am running:
SELECT DISTINCT product.product_name, product.brand, quarter, SUM (sales.units_sold), COUNT (quarter)
FROM sales
INNER JOIN product
ON product.product_key=sales.product_key
INNER JOIN time
ON sales.time_key=time.time_key
GROUP BY quarter, product.product_name, product.brand
ORDER BY brand;
Below is the result once I run the query with the code that I have so far which is obviously not giving me what I want:
PRODUCT_NAME BRAND QUARTER SUM(SALES.UNITS_SOLD) COUNT(QUARTER)
------------------------- -------------------- ------- --------------------- --------------
NX.MF8EK.001 ACER Q4 810 2
15-A003SA COMPAQ Q4 320 2
E6400 DELL Q4 800 2
15-N271SA HP Q4 350 2
15-N290SA HP Q1 400 2
NP915S3G-K01UK SAMSUNG Q1 1400 2
SVF1521C2EB SONY Q3 520 2
SVF1521P2EB SONY Q1 99 1
SVF1521P2EB SONY Q2 220 1
SVF1532K4EB SONY Q1 120 1
SVF1532K4EB SONY Q3 400 1
C50-A-1CK TOSHIBA Q1 150 1
C50-A-1CK TOSHIBA Q3 500 1
I know its probably simple for you guys but I can sense that I am nearly there, I think I just have something the wrong way round and am not translating my intention into code.
The desired output would display products that have only been sold in one quarter. If they were sold in two quarters they would not be considered seasonal.
A:
In your query count(quarter) is going to be the same as count(*). You need to remove quarter from the group by and do the comparison on the number of quarters in a having clause:
SELECT product.product_name, product.brand, MIN(quarter) as quarter, SUM(sales.units_sold)
FROM sales INNER JOIN
product
ON product.product_key = sales.product_key INNER JOIN
time
ON sales.time_key = time.time_key
GROUP BY product.product_name, product.brand
HAVING min(quarter) = max(quarter)
ORDER BY brand;
You could also use:
HAVING count(distinct quarter) = 1
However, count(distinct) is less efficient than most other aggregation functions.
| 2024-04-22T01:27:17.760571 | https://example.com/article/8000 |
Yale Glee Club
The Yale Glee Club is a mixed chorus of men and women, consisting of students of Yale University in New Haven, Connecticut. Founded in 1861, it is the third oldest collegiate chorus in the United States after the Harvard Glee Club, founded in 1858, and the University of Michigan Men's Glee Club, founded in 1859. The Glee Club performs several concerts each year in New Haven and goes on tour each January. According to music critic Zachary Woolfe of the New York Times, it is "one of the best collegiate singing ensembles, and one of the most adventurous." Its members are "world famous for their harmonic precision" per New York Times music critic Robert Sherman.
Organization
Leadership
The Glee Club is conducted by a member of the university faculty, and the work of running the organization has traditionally been divided between the director, the office manager, and a team of undergraduate student officers. The Glee Club's director generally holds a faculty position in the Yale School of Music as the Marshall Bartholomew Professor of Choral Conducting. A large part of the work of planning concert tours is done by student tour managers.
Current Membership
Most members of the Glee Club are undergraduate students, but the group also admits students from the graduate and professional schools. Membership in the group is determined each fall by audition. Members of the group may be majors in any subject. Many members of the group are also involved in other musical pursuits on campus. The Glee Club typically consists of 70 to 90 student singers. When large-scale classical choral works require more voices, the Glee Club may team up with Yale's other choruses, the Yale Camerata and the Yale Schola Cantorum, or add other singers as needed.
Past Membership
The Glee Club was initially composed of men only (since Yale College was only open to men). In 1969, Yale admitted its first female undergraduates, which led to the establishment of the Yale Women's Chorus. The following year, the Yale Women's Chorus was absorbed into the Glee Club to form a mixed chorus. Despite the fact that a glee club is typically an all-male chorus, the organization elected to retain its name. Although the group was once open to students only after their first year of college, in 2003 the Glee Club began to include undergraduates from all four years.
Several alumni of the group have gone on to professional careers in music, including Charles Ives, Cole Porter, John Stewart and Marshall Bartholomew, both of whom returned to Yale to conduct the Glee Club.
Programs
The Glee Club works with New Haven high school students each year as part of an annual choral festival. Outreach and service activities incorporated into tours were a central focus of the Glee Club's 2007 domestic tour to the Gulf Coast states.
The Glee Club's annual Emerging Composers Competition encourages new works for mixed chorus, and the Fenno Heath Award encourages the creation of new Yale songs. Both competitions were inaugurated in the fall of 2005 with the world premieres of Laus Trinitati by Jocelyn Hagen and A Modern Toast to Yale by Zachary Sandler.
The Glee Club has an alumni association, the Yale Glee Club Associates, which offers advice and financial support to the Glee Club. The YGCA has formed a chorus of its own called the Yale Alumni Chorus. This chorus gives alumni an opportunity to resume old friendships and enjoy the songs of their Glee Club years while traveling and giving concerts in foreign countries.
History
Like many of the old American college Glee Clubs, the Yale Glee Club began as a small association of students to sing glees. This tradition was continued for most of the 19th and early 20th century. Many of these original songs are maintained as part of the Glee Club's "Blue Book" (Songs of Yale), which contains the old glees and the principal Yale songs.
Directors
The Yale Glee Club has had seven directors since the appointment of its first faculty adviser:
c. 1868-1873: Gustave J. Stoeckel
1873-1905: Thomas G. Shepard
1905-1921: G. Frank Goodale (Yale Sheffield Scientific School B.S. 1889)
1921-1953: Marshall Bartholomew (Yale Sheffield Scientific School B.S. 1907)
1953-1992: Fenno F. Heath, Jr. (Yale B.A. 1950, M.A. 1952)
1992-2002: David H. Connell (Yale D.M.A. 1991)
2002-2003: Timothy Snyder (Yale M.M. 1998) (interim director)
2003–present: Jeffrey Douma
The group's fourth director, Marshall Bartholomew, encouraged the group to undertake more difficult and classical works, adding considerably to the group's repertoire. He created arrangements of many spirituals and folk songs, many published by the G. Schirmer company as the "Yale Glee Club Series."
Bartholomew's successor, Fenno Heath, composed many original works and after 1970 rearranged many of his own and Bartholomew's pieces for mixed chorus when the Glee Club admitted women. David Connell continued the tradition of arranging pieces for the group, including madrigals and sea chanteys. Director Jeffrey Douma has also contributed his own arrangements to the Glee Club's library. Under his direction, the Glee Club has appeared in performances guest conducted by David Willcocks, Krzysztof Penderecki, Sir Neville Marriner, and Helmuth Rilling.
Tours
The Glee Club has regularly made domestic tours since 1866 and international concert tours since 1928. Domestic tours occur annually and international tours typically occur every two or three years. Touring has helped the Glee Club find a mission as "ambassadors of song."
Today, tours are managed by a pair of current Glee Clubbers. The position of Tour Co-Manager is the only Glee Club office that is not chosen by election; rather, the director and staff manager appoint tour managers based on their submission of a proposed itinerary. Prospective tour co-managers write their proposal and apply together.
The Glee Club was one of the first U.S. college musical groups to tour abroad. International destinations of its many tours have included:
Seventeen tours of Europe, with the original 1928 tour retraced for the Glee Club's 150th Anniversary in 2011
South and/or Central America in 1941, 1961, 1968, 1975, and 2009
A "'Round-the-world" tour in 1965
East Asia in 1996
Bermuda or the Caribbean in 1930, 1951, 2000, 2010, and 2014
Five countries in Africa in 2002
New Zealand and Australia in 2005
Istanbul with the Yale Alumni Chorus in 2011
Mainland China and Hong Kong in 2013
References
External links
Yale Glee Club official web site
Yale Alumni Chorus Foundation official web site
DeWerff, Timothy J. "Louder Yet the Chorus Raise!": An Illustrated History of the Yale Glee Club, 1861-2011. New Haven, Connecticut: Yale Glee Club, 2011.
"The First Hundred Years: 1861-1961," a pamphlet on the history of the glee club.
Category:Musical groups established in 1861
Category:Glee clubs
Glee Club
Glee Club
Category:1861 establishments in Connecticut | 2024-04-05T01:27:17.760571 | https://example.com/article/2147 |
Identification of a novel bean alpha-amylase inhibitor with chitinolytic activity.
Zabrotes subfasciatus is a devastating starch-dependent storage bean pest. In this study, we attempted to identify novel alpha-amylase inhibitors from wild bean seeds, with efficiency toward pest alpha-amylases. An inhibitor named Phaseolus vulgaris chitinolytic alpha-amylase inhibitor (PvCAI) was purified and mass spectrometry analyses showed a protein with 33330 Da with the ability to form dimers. Purified PvCAI showed significant inhibitory activity against larval Z. subfasciatus alpha-amylases with no activity against mammalian enzymes. N-terminal sequence analyses showed an unexpected high identity to plant chitinases from the glycoside hydrolase family 18. Furthermore, their chitinolytic activity was also detected. Our data provides compelling evidence that PvCAI also possessed chitinolytic activity, indicating the emergence of a novel alpha-amylase inhibitor class. | 2024-05-22T01:27:17.760571 | https://example.com/article/3874 |
Listen to Robert Emmerich introduce The Big Apple, a hit song from 1937. Music written by Bob and performed by Tommy Dorsey's Clambake Seven with Bob on piano. Lyrics written by Buddy Bernier and sung by Edythe Wright. Audio provided by Dorothy Emmerich.
The “Silver Boot Series” (formally called the “Lone Star Series”) is when baseball’s Houston Astros play the Texas Rangers. The winner of the series receives the Silver Boot trophy. Interleague play began in 2001, but the first ‘Silver Boot” was awarded in 1992, when the teams played in spring training.
Wikipedia: Lone Star Series
The Lone Star Series is an annual Major League Baseball contest featuring Texas’ two major league franchises, the Texas Rangers of the American League and the Houston Astros of the National League. It is an outgrowth of the “natural rivalry” established by MLB as part of interleague play.
The winner of the 6-game series is awarded the Silver Boot. A 30-inch tall display of a size-15 cowboy boot cast in silver, complete with a custom, hand-made spur. If the series is split (3-to-3), the winner is the club which scored the most runs over the course of the series. Under the current rules, the designated hitter is used at the Rangers’ home games but not at the Astros’ home games.
26 March 1992, Fort Worth (TX) Star-Telegram, “Texas Rangers Notebook”:
A “Silver Boot” trophy has been designed to be awarded to the winner of the Rangers exhibition game with the Houston Astros on April 3 at Arlington Stadium.
4 April 1992, Washington (DC) Post:
Last night, the Rangers beat the Astros, 2-0, before 22236 at Arlington Stadium to win the “Silver Boot,” a leather cowboy boot with the logos of both teams.
5 April 1992, Kerrville (TX) Times, “Rangers nip Astros, 2-0,” pg. 3B, col. 5:
ARLINGTON (AP)—The Texas Rangers and Houston Astros have never met in October when it would really count.
(...)
And to the winners went—the Silver Boot—a leather cowboy boot with the logos of both teams.
5 June 2001, Dallas (TX) Morning News:
The Silver Boot trophy will be presented annually to the winner of the Lone Star State series between the Rangers and Houston Astros.
8 June 2001, Dallas (TX) Morning News:
The Rangers and Houston Astros are doing everything they can to guarantee (...) into ponying up for a silver-and-glass trophy - “The Silver Boot.”
13 June 2002, Fort Worth (TX) Star-Telegram, “Yankees, Mets Enjoy Real Feud” by T. R. Sullivan:
When John Hart joined the Rangers, Astros general manager Gerry Hunsicker sent him a message.
“The gauntlet has been thrown down,” Hunsicker wrote Hart. “Texas isn’t big enough for the two of us. The Silver Boot Series will never be the same.”
19 June 2003, Fort Worth (TX) Star-Telegram, “Postcard from the Road” by T. R. Sullivan, pg. 2:
There is a pennant race going on in Oakland, while in Texas, they might be getting excited about that impending Silver Boot Series.
Baseball Letters
Monday, July 03, 2006
The Silver Boot Series
Eat that Rangers! Give us the boot back right now. It’s ours for a year! It was fun playing the Rangers and I was amazed at how many Astros fans were up in Dallas.
Foul TerritorySilver Boot series resumes June 24
May 18, 2008
The Silver Boot series resumes in Houston June 24 when the Rangers take on the Astros for a three-game series at Minute Maid Park.
The Rangers have won the series the last two seasons (4 games to 2).
Press of Atlantic CityInterleague play isn’t as much fun for Phillies
By DAVID WEINBERG Staff Writer, 609-272-7186
Published: Sunday, May 18, 2008
PHILADELPHIA—Brad Lidge never actually saw the silver boot.
Before joining the Phillies this season, the closer spent five years with Houston. The Astros’ interleague schedule always includes an intrastate showdown with the Texas Rangers that is called the Silver Boot Series for the trophy that goes to the winner.
“I’m pretty sure we got the upper hand against them at least a few times when I was there, but I don’t ever remember anyone giving us a silver boot,” Lidge said. “I’m pretty sure it exists, but I guess the (team) owner keeps it in his office.” | 2024-03-12T01:27:17.760571 | https://example.com/article/3760 |
Change comes to Southbrook: St Mary’s Anglican Church
A landmark in Southbrook Road since the early days (the foundation stone says 1879, but I’m not sure if that was for the current building), St Mary’s was an adjunct to St John the Baptist Church in Rangiora.
The site is now subject to a resource consent application from the business that operates Rangiora Mazda, on the other side of the road. They are being forced to relocate because their current site is part of where Foodstuffs have applied for planning permission for a new Pak n’ Save supermarket.
The application for the St Mary’s site says that the church will be incorporated into the design of the site that will need to be developed.
Quite clearly, and assuming consent is given, the site will look very different.
This is a further example of how Southbrook is growing into an ever-more-important business node for the District.
Hi David,
Would you have a photo of the Hall which was behind this Church. I am in the process of doing a history of Indoor Bowls in North Canterbury and would like a photo of all the halls used for this sport. St Mary’s was a tiny hall and could only hold 2 mats. You may know of someone who may have taken a photo before it was removed.
Many thanks
Pam.
Hi Pam
No, I don’t have a photo and I can’t really thinkof anyone who has – perhaps someone in the present congregation, like Anne Jelfs or Helen Hurst. Do you realise that the hall still exists? It was shifted to Northbrook Studios where it is now doing duty as gthe workshop of the North Canterbury Woodcraft Club.
Hi Laura. My understanding is that Rangiora Mazda are leaving it there and are putting their building alongside it. Driving past yesterday, I saw that the east wall of the new building (i.e. the one facing Southbrook Road) has a distinct “church” shape about it. | 2024-05-19T01:27:17.760571 | https://example.com/article/7556 |
Metabolic disposition of pyrithiones.
The urinary pattern of pyrithione metabolites in urine of the rat, rabbit and rhesus monkey was similar to that of the swine after iv. administration of sodium pyrithione (Sodium Omadine) and the magnesium sulfate adduct of 2,2'-dithio-bis(pyridine-1-oxide), (Omadine MDS). The major metabolite accounting for 80% or more of the metabolites in urine was the S-glucuronide of 2-mercaptopyridine-N-oxide. After Omadine MDS administration, three transient metabolites and one persistent metabolite were observed in the plasma. The transient metabolites were tentatively identified as 2-methylthiopyridine-N-oxide, 2-methylsulfinylpyridine and 2-methylsulfinylpyridine-N-oxide. 2-Methylsulfonylpyridine was the only metabolite observed in the plasma 16 hr after Omadine administration. This metabolite could be detected 14 days after rats were treated repeatedly with a shampoo formulation containing Omadine MDS. | 2023-09-28T01:27:17.760571 | https://example.com/article/3587 |
<!--
~ *************************************************************************
~ ic_group.xml
~ **************************************************************************
~ Copyright © 2020 VLC authors and VideoLAN
~ Author: Nicolas POMEPUY
~ This program is free software; you can redistribute it and/or modify
~ it under the terms of the GNU General Public License as published by
~ the Free Software Foundation; either version 2 of the License, or
~ (at your option) any later version.
~
~ This program is distributed in the hope that it will be useful,
~ but WITHOUT ANY WARRANTY; without even the implied warranty of
~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
~ GNU General Public License for more details.
~
~ You should have received a copy of the GNU General Public License
~ along with this program; if not, write to the Free Software
~ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
~ ***************************************************************************
~
~
-->
<vector xmlns:android="http://schemas.android.com/apk/res/android"
android:width="48dp"
android:height="48dp"
android:viewportWidth="48"
android:viewportHeight="48">
<path
android:pathData="m15,6c-1.662,0 -3,1.338 -3,3v24c0,1.662 1.338,3 3,3h24c1.662,0 3,-1.338 3,-3L42,9C42,7.338 40.662,6 39,6ZM15,9L39,9L39,33L15,33ZM6,13v26c0,1.6568 1.3431,3 3,3L35,42L35,39L9,39L9,13ZM20,14c-1.108,0 -2,0.892 -2,2v10c0,1.108 0.892,2 2,2h14c1.108,0 2,-0.892 2,-2L36,14L32.5,14L34,17L31,17L29.5,14L28,14l1.5,3h-3L25,14h-1.5l1.5,3h-3l-1.5,-3z"
android:strokeAlpha="1"
android:strokeLineJoin="miter"
android:strokeWidth="0.1"
android:fillColor="?attr/colorControlNormal"
android:strokeColor="#00000000"
android:fillAlpha="1"
android:strokeLineCap="round" />
</vector>
| 2023-12-13T01:27:17.760571 | https://example.com/article/5178 |
This invention relates to a pair of fishermen""s pliers and, in particular, to a pair of multi-purpose fishermen""s pliers.
Most serious fishermen have the need for a number of different tools for cutting line, crimping hooks and lures and various other tasks relating to maintaining, adjusting, and repairing fishing gear and tackle. Presently there is a wide range of lines that are presently available that are fabricated from many different and diverse materials. Accordingly, the cutters needed to cut a certain material may be entirely unsuitable for cutting a different material. In addition to different cutting tools, most anglers also require a good set of pliers for grasping, crimping and holding hooks, lures and the like as the fishing tackle, is being assembled or adjusted. Attempting to utilize a number of different tools in the confines of a boat or at the end of a pier can at times, prove to be difficult.
In a U.S. Pat. No. 4,208,749 to Hermann there is disclosed a pair of fishermen""s pliers that combine a pair of gripping jaws with a set of straight edge cutting blades that are arranged to come together along a common cutting line as the gripping jaws are closed. The cutting blades are located between the gripping jaws and the pivot point of the pliers lever arms. In another embodiment of the invention, a second set of straight edge cutting blades are mounted in the lever arms behind the pivot point. Although the straight edge blades employed by Hermann works well when cutting certain materials, the blade edges tend to break down and become nicked when the blades are used to cut hard materials such as metal lines.
Koelewyn, in U.S. Pat. No. 5,862,552 also discloses a pair of pliers suitable for use by a fishermen. Here again, the gripping jaws of the pliers are combined with a set of straight edge cutting blades that are adapted to close along a common cutting line as the gripping jaws are closed. The cutting blades in this case are angularly offset with regard to the gripping jaws.
It is therefore an object of the present invention to improve pliers of the type utilized by fishermen.
It is a further object of the present invention to provide a pair of fishermen""s pliers that can perform a wide range of functions relating to the adjusting and maintaining of fishing gear and tackle.
A still further object of the present invention to provide a pair of fishermen""s pliers having two sets of cutters that are capable of cutting a wide range of materials.
Another object of the present invention is to provide a pair of fishermen""s pliers having one set of cutters for delivering a first cutting action and a second set of cutters for delivering a second cutting action such that a wide range of different materials can be cut by the pliers.
These and other objects of the present invention are attained by a pair of fishermen""s pliers having a pair of lever arms that are rotatably joined by a pivot so that the arms can move between an open position and a closed position. Each arm further includes an extended nose section that protrudes outwardly from the pivot. The nose sections contain a set of gripper jaws at the distal end thereof, a first set of cutting jaws situated behind the gripping jaws and a second set of cutting jaws situated behind the first set of cutting jaws. The first set of cutting jaws include a straight edge blade that is arranged to close against the flat face of an anvil with a slicing action as the lever arms are brought to a closed position. The second set of cutting jaws contain a pair of coacting blades that are arranged to provide a scissor action as the lever arms are brought to a closed position. | 2024-05-01T01:27:17.760571 | https://example.com/article/7224 |
Diego Lopez de Pacheco, 2nd Duke of Escalona
Diego López de Pacheco (Villena, 1456 – Escalona, November 26, 1529) was a Spanish noble, 2nd Duke of Escalona and 2nd Marquis of Villena.
Diego López Pacheco was son of Juan Pacheco, one of the most influential politicians of his time, and María Portocarrero. In 1468, he received from his father the title of 2nd Marquis of Villena. At the age of 12, Diego was married to Juana de Luna, also 12 and granddaughter of Álvaro de Luna, as part of a plan by his family to get a hold of the inheritance of Álvaro de Luna. Juana Pimentel, grandmother of Juana de Luna, had tried to prevent the marriage, but had failed because of the intervention of King Henry IV of Castile.
In the War of the Castilian Succession, Diego and his father supported Juana la Beltraneja, who lost the battle for the throne. Diego, who had become 2nd Duke of Escalona after the death of his father in October 1474, was pardoned by Isabella I of Castile and allowed to keep his properties. But he wasn't chosen as successor for his father as Grand Master of the Order of Santiago.
His wife Juana de Luna died in 1480. Diego remarried in 1484 with Juana Enríquez y Velasco, sister of Fadrique Enríquez, Admiral of Castile. Diego López Pacheco fought as general against the Moors, and was present in the final Siege of Granada in 1492, which ended the Moorish presence in Spain. In 1504, after the death of Isabel, Pacheco supported her eldest surviving daughter, Queen Juana, and her king consort Felipe, over King Ferdinand of Aragon's faction. In 1519, he was made a Knight in the Order of the Golden Fleece.
Humanist
Diego was an admirer of Desiderius Erasmus. In his castle, he entertained alumbrados like Isabel de la Cruz and Pedro Ruíz de Alcaraz, both conversos. Diego was also an important patron of culture and the arts. Francisco de Osuna dedicated in 1527 his book El tercer abecedario to him, as did Juan de Valdés 2 years later with his book Diálogo de la doctrina cristiana.
Juana Enríquez and Diego López Pacheco are buried in the El Parral monastery in Segovia.
Children
With Juana de Luna:
Juan Pacheco de Luna (died 1490)
With Juana Enríquez:
Diego López Pacheco (1506–1556), third Duke of Escalona
Isabel Pacheco
Magdalena Pacheco
External links
Geneall net
Category:Marquesses of Spain
102
Category:1456 births
Category:1529 deaths
Category:Knights of the Golden Fleece | 2024-02-02T01:27:17.760571 | https://example.com/article/5236 |
Ana Marinković
Ana Marinković (, Belgrade, Kingdom of Serbia, 7 April 1881 ― Guéthary, France, 30 May 1973) was a well-known Serbian artist from the turn of the century until the outbreak of World War II. She has paintings housed in the permanent collections of the Belgrade City Museum, the Museum of Contemporary Art in Belgrade, the National Museum of Serbia, and other locations both in Serbia and abroad.
Early life
Ana Lozanić was born on 7 April 1881 in Belgrade, Kingdom of Serbia to Stanka (née Pačić) and Sima Lozanić. Her father was a chemist, professor, and rector of the Grandes écoles (later changed to University of Belgrade). He also was president of the Serbian Royal Academy and served in various posts in the Serbian government. Her mother was related to the Vučić-Perišić family and Ana was the middle child of three siblings, including her older brother (1878-1963) and younger sister Jelena, later Helen Frothingham (1885-1972).
Lozanić completed her primary and secondary schooling in Belgrade, where she studied art with Nadežda Petrović. She went on to take private art lessons with Rista and Beta Vukanović before she went abroad to further her art studies privately in London and Paris. In 1908, she held her first exhibit, with the students of the School of Arts and Crafts, and received praise for her works from Serbian literary magazines. Before the end of the decade, she married Vojislav Marinković, a Serbian economist and politician.
Career
In 1910, Marinković was invited as a guest artist to exhibit with the Lada Art Society, a group founded by the Vukanovićs, and became a member of the society in 1911. When the Balkan Wars broke out in 1912, Marinković joined her art teachers Petrović and Vukanović as a volunteer nurse in the Army Medical Corps. During World War I, she accompanied her patients as they made the Albanian retreat across the Prokletije Mountains, taking them safely to Corfu. Among the other painters who accompanied the Medical Corps was Kosta Miličević, whose impressionistic style influenced Marinković's later works.
In 1919, Marinković became one of the founders of the () and around the same time helped found the Cvijeta Zuzorić Association to promote artistic endeavors in Belgrade. Her works, along with Ljubomir Ivanović, Kosta Miličević, and Borivoje Stefanović, the group of "Belgrade Impressionists," and Mihailo Milovanović among other Yugoslav artists were exhibited in the Fifth South Slav Exhibition in Belgrade in 1922. Years later, she had major exhibits in Turin and Sofia before World War II.
Because of the wealth and influence of her family, Marinković did not have to take in students to support her art and was able to paint still-life, interiors and landscapes, primarily of surroundings of Belgrade, at her leisure. She also worked in voluntary endeavors with Queen Marija Karađorđević helping poor women and their children. In 1935 her father, Sima Lozanić, died on 7 July; her husband, Vojislav Marinković, died on 18 September; and her brother-in-law, John Frothingham, a former International Red Cross official during World War I and husband of her sister Jelena, also died on 20 November.
During the Nazi-occupation of Belgrade, Marinković lived a quiet and solitary life. When the war ended and the communists came into power, she decided to leave the country. She moved to the seaside town of Guéthary on the southwestern coast of France, where her sister had established an orphanage. She lived modestly painting landscapes until the 1970s and near the end of her life donated several paintings from her private collection by Paja Jovanović and Kosta Miličević to the National Museum of Serbia.
Death and legacy
Marinković died on 30 May 1973 in Guéthary. She has paintings in the permanent collections of the Belgrade City Museum, the Museum of Contemporary Art in Belgrade, the National Museum of Serbia, and other locations both in Serbia and abroad. Some of her works, together with Zora Petrović, Nadežda Petrović, and other women artists who were Serbian Red Cross volunteers, are on display alongside each other in the Pavle Beljanski Memorial Collection. Their art bears stylistic similarities, such as expressionist, dramatic, emotional and colorful paintings.
References
Citations
Bibliography
Category:1881 births
Category:1973 deaths
Category:People from Belgrade
Category:Serbian painters
Category:Serbian women painters
Category:19th-century Serbian women
Category:20th-century Serbian women | 2023-10-30T01:27:17.760571 | https://example.com/article/9306 |
SDYuSShOR-4 Sports School Volzhskiy
SDYuSShOR-4 Sports School Volzhskiy is a Russian football Sports school founded in 1974 in Volzhsky, Volgograd Oblast. It fields a team that plays in the specified Volgograd Oblast Football Championship.
Sports School SDYuSShOR-4 entered the esteemed and prestigious Volga Championship which showcases the utmost best Sport schools at national level.
History
Founded in 1974, it marked its fortieth anniversary in 2014 with an inaugural inter-school sports contest.
References
Category:Sport in Volgograd | 2024-03-19T01:27:17.760571 | https://example.com/article/9177 |
Q:
error overiding save method while extending Django-registration app
I am using django-registration app. and have following code in forms.py
from django.contrib.auth.forms import UserCreationForm
from registration.forms import RegistrationFormUniqueEmail
from django import forms
from django.contrib.auth.models import User
from accounts.models import UserProfile
from pprint import pprint
class UserRegistrationForm(RegistrationFormUniqueEmail):
#email = forms.EmailField(label = "Email")
fullname = forms.CharField(label = "Full name")
class Meta:
model = User
fields = ("fullname", "email", )
def __init__(self, *args, **kwargs):
super(UserRegistrationForm, self).__init__(*args, **kwargs)
del self.fields['username']
def save(self, commit=True):
user = super(UserRegistrationForm, self).save(commit=False)
user.userprofile.full_name = self.cleaned_data["fullname"]
user.email = self.cleaned_data["email"]
if commit:
user.save()
return user
I inherited from Django-registraion app's class RegistrationFormUniqueEmail so I when called save method at user = super(UserRegistrationForm, self).save(commit=False) it says, that save attribute doesnot exist. I actually wrote this code with inheritance from UserCreationForm .
I have just read the comment for SuperClass of RegistrationFormUniqueEmail that is :
"""
Form for registering a new user account.
Validates that the requested username is not already in use, and
requires the password to be entered twice to catch typos.
Subclasses should feel free to add any additional validation they
need, but should avoid defining a ``save()`` method -- the actual
saving of collected user data is delegated to the active
registration backend.
"""
These comments ask to not define another save method but I need to. So is there way that I can do define save method and call parent save method too to define additional fields? Following is the code of django-registration apps's forms.py:
"""
Forms and validation code for user registration.
"""
from django.contrib.auth.models import User
from django import forms
from django.utils.translation import ugettext_lazy as _
# I put this on all required fields, because it's easier to pick up
# on them with CSS or JavaScript if they have a class of "required"
# in the HTML. Your mileage may vary. If/when Django ticket #3515
# lands in trunk, this will no longer be necessary.
attrs_dict = {'class': 'required'}
class RegistrationForm(forms.Form):
"""
Form for registering a new user account.
Validates that the requested username is not already in use, and
requires the password to be entered twice to catch typos.
Subclasses should feel free to add any additional validation they
need, but should avoid defining a ``save()`` method -- the actual
saving of collected user data is delegated to the active
registration backend.
"""
username = forms.RegexField(regex=r'^[\w.@+-]+$',
max_length=30,
widget=forms.TextInput(attrs=attrs_dict),
label=_("Username"),
error_messages={'invalid': _("This value may contain only letters, numbers and @/./+/-/_ characters.")})
email = forms.EmailField(widget=forms.TextInput(attrs=dict(attrs_dict,
maxlength=75)),
label=_("E-mail"))
password1 = forms.CharField(widget=forms.PasswordInput(attrs=attrs_dict, render_value=False),
label=_("Password"))
password2 = forms.CharField(widget=forms.PasswordInput(attrs=attrs_dict, render_value=False),
label=_("Password (again)"))
def clean_username(self):
"""
Validate that the username is alphanumeric and is not already
in use.
"""
existing = User.objects.filter(username__iexact=self.cleaned_data['username'])
if existing.exists():
raise forms.ValidationError(_("A user with that username already exists."))
else:
return self.cleaned_data['username']
def clean(self):
"""
Verifiy that the values entered into the two password fields
match. Note that an error here will end up in
``non_field_errors()`` because it doesn't apply to a single
field.
"""
if 'password1' in self.cleaned_data and 'password2' in self.cleaned_data:
if self.cleaned_data['password1'] != self.cleaned_data['password2']:
raise forms.ValidationError(_("The two password fields didn't match."))
return self.cleaned_data
class RegistrationFormTermsOfService(RegistrationForm):
"""
Subclass of ``RegistrationForm`` which adds a required checkbox
for agreeing to a site's Terms of Service.
"""
tos = forms.BooleanField(widget=forms.CheckboxInput(attrs=attrs_dict),
label=_(u'I have read and agree to the Terms of Service'),
error_messages={'required': _("You must agree to the terms to register")})
class RegistrationFormUniqueEmail(RegistrationForm):
"""
Subclass of ``RegistrationForm`` which enforces uniqueness of
email addresses.
"""
def clean_email(self):
"""
Validate that the supplied email address is unique for the
site.
"""
if User.objects.filter(email__iexact=self.cleaned_data['email']):
raise forms.ValidationError(_("This email address is already in use. Please supply a different email address."))
return self.cleaned_data['email']
class RegistrationFormNoFreeEmail(RegistrationForm):
"""
Subclass of ``RegistrationForm`` which disallows registration with
email addresses from popular free webmail services; moderately
useful for preventing automated spam registrations.
To change the list of banned domains, subclass this form and
override the attribute ``bad_domains``.
"""
bad_domains = ['aim.com', 'aol.com', 'email.com', 'gmail.com',
'googlemail.com', 'hotmail.com', 'hushmail.com',
'msn.com', 'mail.ru', 'mailinator.com', 'live.com',
'yahoo.com']
def clean_email(self):
"""
Check the supplied email address against a list of known free
webmail domains.
"""
email_domain = self.cleaned_data['email'].split('@')[1]
if email_domain in self.bad_domains:
raise forms.ValidationError(_("Registration using free email addresses is prohibited. Please supply a different email address."))
return self.cleaned_data['email']
I just want to know that how can I override save() method or else how can I create new additional fields?
A:
I have found solution of my own posted problem:
I have removed that django-registration app's RegistrationFormUniqueEmail, and instead I am inheriting from UserCreationForm and added the required method into my own UserRegistrationForm so I am able to override save method and able to do the things that I wanted to .
| 2024-04-20T01:27:17.760571 | https://example.com/article/7247 |
{
"name": "@ajusa/lit",
"version": "1.1.0",
"description": "a sub 400 byte css framework",
"main": "lit.css",
"scripts": {
"build": "gulp",
"watch": "gulp watch"
},
"repository": {
"type": "git",
"url": "git+https://github.com/Ajusa/lit.git"
},
"keywords": [
"css"
],
"author": "Arham Jain",
"license": "MIT",
"bugs": {
"url": "https://github.com/Ajusa/lit/issues"
},
"homepage": "https://github.com/Ajusa/lit#readme",
"devDependencies": {
"gulp": "^4.0.0",
"gulp-clean-css": "^4.3.0",
"gulp-gzip": "^1.4.2",
"gulp-postcss": "^7.0.1",
"postcss-css-variables": "^0.8.0"
}
}
| 2023-10-21T01:27:17.760571 | https://example.com/article/7371 |
#!/usr/bin/env python
from setuptools import setup, find_packages
import sys, os
here = os.path.abspath(os.path.dirname(__file__))
README = open(os.path.join(here, 'README.rst')).read()
NEWS = open(os.path.join(here, 'NEWS.txt')).read()
version = '0.1.9'
install_requires = [
# List your project dependencies here.
# For more details, see:
# http://packages.python.org/distribute/setuptools.html#declaring-dependencies
]
setup(name='jarvis',
version=version,
description="Developer companion",
long_description=README + '\n\n' + NEWS,
classifiers=[
# Get strings from http://pypi.python.org/pypi?%3Aaction=list_classifiers
],
keywords='debugging',
author='Francois Lagunas',
author_email='francois.lagunas@gmail.com',
url='',
license='MIT',
packages=find_packages(),
include_package_data=True,
zip_safe=False,
install_requires=install_requires,
entry_points={
'console_scripts':
['jarvis=jarvis:main',
'jarvis_command_run=jarvis.emacs.utils:command_run',
'jarvis_server=jarvis.server:main']
}
)
| 2023-12-10T01:27:17.760571 | https://example.com/article/4133 |
Bacterial cell envelopes with functional flagella.
Our aim was to isolate from bacteria a flagellated, subcellular system whose content could be changed at will. Because the control of bacterial chemotaxis resides in the direction of rotation of the flagella, such a system would be ideal for the study of this control mechanism. By incubating bacteria with penicillin and then lysing them osmotically, we were able to isolate cell envelopes from Escherichia coli and Salmonella typhimurium. These envelopes have the same sidedness and similar shape and dimensions as the original bacteria; they are practically free of cytoplasm; they are osmotically sensitive, having intact the cytoplasmic membrane and at least part of the cell wall; and they have flagella. This preparation was used to find out what is required to restore flagellar rotation, which had been lost during osmotic lysis. By visualizing the image of individual flagella with high intensity light microscopy or by tethering the cell envelopes, we found that adding artificial electron donors as an energy source is enough to restore rotation. This seems to indicate that no cytoplasmic components are required and that the proton electrochemical potential is indeed the driving force for flagellar rotation. However, the rotation was almost entirely counterclockwise, while in intact bacteria the flagella rotate in both directions. This may indicate that a cytoplasmic component is required to allow clockwise rotation. The significance of these results for the study of chemotaxis is discussed. | 2023-09-01T01:27:17.760571 | https://example.com/article/2939 |
TOPEKA, Kan. (AP) - The Latest on the Kansas Legislature resuming its annual session: (all times local):
10:35 a.m.
Groups that have been critical of Republican Gov. Sam Brownback’s income tax cuts are calling on Kansas legislators to repeal all of them.
The nonprofit Kansas Center for Economic Growth said Wednesday that its proposal could raise $1 billion a year in new revenue and permanently fix the state’s budget problems.
Officials from the center were joined during a news conference by organizations representing teachers, state government employees and construction contractors, as well as the CEO of the advocacy group Kansas Action for Children.
The state has struggled to balance its budget since the income tax cuts were enacted in 2012 and 2013 at Brownback’s urging in an attempt to stimulate the economy.
Brownback spokeswoman Eileen Hawley called the groups “desperate to grow the government.”
___
5:30 a.m.
Kansas lawmakers must close shortfalls in the current and next state budgets totaling $290 million after returning from their annual spring break.
The Legislature was reconvening Wednesday morning. It was only a week after state officials and university economists issued new, more pessimistic forecast that slashed revenue projections through June 2017.
Republican Gov. Sam Brownback plans to divert highway funds to general government programs and delay major road projects. He also expects to cut higher education spending.
He’s proposed selling off part of the state’s annual payments from a national legal settlement with tobacco companies to generate a one-time infusion of cash.
Lawmakers have been cold to the idea. As alternatives, he’s suggested delaying contributions to public employee pensions or making $139 million in spending cuts.
Sign up for Daily Newsletters Manage Newsletters
Copyright © 2020 The Washington Times, LLC. | 2023-10-18T01:27:17.760571 | https://example.com/article/6326 |
Q:
Handling SharePoint UpdateListItems XML Response
I'm inserting some items into a SharePoint 2007 list using the Lists web service. I'm trying to write some code to handle any errors reported in the response, but navigating the XML is not working as expected. I'm attempting to get a collection of Result elements, then check each Result's ErrorCode child element for an error code. When I try to get the ErrorCode of the second result, it appears to give me the first result's ErrorCode again even though I'm calling SelectSingleNode on the second Result element. What am I doing wrong? Here is my data and code (with most of the z:row attributes omitted to keep it short):
SharePoint response:
- <Results xmlns="http://schemas.microsoft.com/sharepoint/soap/">
- <Result ID="1,New">
<ErrorCode>0x00000000</ErrorCode>
<ID />
<z:row ows_ContentTypeId="0x0100760B0FF12756D249834F5B18A46B1A31" ows_Title="Seas-a-1-1-Target1" ows_PointID="1" ows_X_x0020_Value="355.000000000000" ... xmlns:z="#RowsetSchema" />
</Result>
- <Result ID="2,New">
<ErrorCode>0x80020005</ErrorCode>
<ErrorText>The operation failed because an unexpected error occurred. (Result Code: 0x80020005)</ErrorText>
</Result>
</Results>
Code:
System.Xml.XmlNode response = listService.UpdateListItems("SCs", batchElement);
XmlNamespaceManager nsm = new XmlNamespaceManager(response.OwnerDocument.NameTable);
nsm.AddNamespace("sp", response.NamespaceURI);
XmlNodeList results = response.SelectNodes("//sp:Result", nsm);
foreach (XmlNode result in results)
{
System.Diagnostics.Debug.WriteLine(result.OuterXml);
XmlNode node = result.SelectSingleNode("//sp:ErrorCode", nsm);
System.Diagnostics.Debug.WriteLine(node.OuterXml);
}
Output:
<Result ID="1,New" xmlns="http://schemas.microsoft.com/sharepoint/soap/"><ErrorCode>0x00000000</ErrorCode><ID /><z:row ows_ContentTypeId="0x0100760B0FFF2756D249834F5B18A46B1A31" ows_Title="Seas-a-1-1-Target1" ows_PointID="1" ows_X_x0020_Value="355.000000000000" ... xmlns:z="#RowsetSchema" /></Result>
<ErrorCode xmlns="http://schemas.microsoft.com/sharepoint/soap/">0x00000000</ErrorCode>
<Result ID="2,New" xmlns="http://schemas.microsoft.com/sharepoint/soap/"><ErrorCode>0x80020005</ErrorCode><ErrorText>The operation failed because an unexpected error occurred. (Result Code: 0x80020005)</ErrorText></Result>
<ErrorCode xmlns="http://schemas.microsoft.com/sharepoint/soap/">0x00000000</ErrorCode>
A:
Try with:
XmlNode node = result.SelectSingleNode(".//sp:ErrorCode", nsm);
I think that the problem is that //sp:ErrorCode means 'all error code nodes starying from the root of the document', whereas what you want is the the error code nodes under the result node.
| 2024-05-19T01:27:17.760571 | https://example.com/article/8637 |
Not Applicable.
1. Field of the Invention
The present invention relates generally to disk drives, and more particularly to a disk drive having electrical traces formed upon a disk drive housing.
2. Description of the Prior Art
The typical hard disk drive includes a disk drive base, and a head disk assembly (HDA) and a printed circuit board assembly (PCBA) attached to the disk drive base. The head disk assembly includes at least one magnetic disk, a spindle motor for rotating the disk, and a head stack assembly (HSA) that includes at least one transducer head, typically several, for reading and writing data to and from the disk. As discussed further below, the printed circuit board includes functional portions of which may be characterized as spindle motor drive circuitry, actuator drive circuitry, and read channel circuitry.
The head stack assembly includes an actuator assembly, at least one head gimbal assembly, and a flex circuit cable assembly. A conventional xe2x80x9crotaryxe2x80x9d or xe2x80x9cswing-typexe2x80x9d actuator assembly typically comprises an actuator body that rotates on a pivot assembly between limited positions, a coil portion that extends from one side of the actuator body to interact with one or more permanent magnets to form a voice coil motor, and one or more actuator arms which extend from an opposite side of the actuator body. The actuator assembly includes the actuator body which has a bore and a pivot bearing cartridge engaged within the bore. A head gimbal assembly includes at least one transducer head, sometimes two, which is distally attached to each of the actuator arms.
The flex circuit cable assembly includes a flex circuit cable which is attached to the actuator assembly and electrically connects the various electrical components onboard the head stack assembly with a relatively minimal impact upon its pivoting movement. The actuator drive circuitry is configured to generate servo control signals. The head stack assembly is controllably positioned in response to the generated servo control signals from the actuator drive circuitry. In so doing, the attached heads are moved relative to tracks disposed upon the disk. As such, the flex circuit cable houses electrical connections between actuator drive circuitry and the coil portion of the actuator assembly. Further, the read channel circuitry is configured to receive data signal from the heads. As such, the flex circuit cable further houses the electrical connections between the read channel circuitry and the heads.
The spindle motor includes a hub that is rotatably attached to the disk drive base. The hub has an outer flange that supports one of the disks. Additional disks may be stacked and separated with spacers. The spindle motor further includes an annular magnet and a spindle motor stator. Where space efficiency is of vital concern, the magnet is typically attached about the lowermost portion of the hub below the flange. The magnet consists of a predetermined number of N and S poles that are disposed alternately circumferentially about the magnet. The spindle motor stator includes an outer rim that is attached to the disk drive base and a plurality of internally facing stator teeth The stator teeth are equally spaced and extend from the stator rim. The spindle motor stator is sized to fit about the hub and in particular the magnet. Each stator tooth includes windings which selectively conduct current to create a magnetic field that interacts with the various poles of the magnet. Such interaction results in forces applied to the hub which tend to rotate the hub. The spindle motor drive circuitry is configured to generate electrical signals to the stator, and in particular the windings thereof, for controlling the movement of the spindle motor.
A topic of concern is the desire to reduce the overall disk drive size. Such disk drives may have a variety of applications in any number of host electronic devices, such as hand held or portable devices such as computer laptops, cellular telephones, personal digital assistants (PDA), digital cameras, etc. In this regard, a disk drive may be of an internal nature or externally connectable such as in a socket, port or other interface of the associated host electronic unit. The exterior size and shape of the disk drive is often referred to as a xe2x80x9cform factorxe2x80x9d. Reduction of such disk drive form factor has proven challenging. This is because the mere reduction of the size of the various disk drive components may result in such components being unable to conform to required specifications and standard form factors for such components, and may result in installation or assembly difficulties. In this regard, one particular area of focus is the electrical connections between the various electrical components of the disk drive. Accordingly, there is a need in the art for an improved arrangement for the electrical connections between various disk drive electrical components in comparison to the prior art.
An aspect of the invention can be regarded as a disk drive for use with a host electronic unit including spindle motor drive circuitry. The disk drive includes a disk drive housing, and a spindle motor rotatably attached to the disk drive housing. The spindle motor includes a stator. The disk drive further includes a host connector attached to the disk drive housing which is operably connectable to the spindle motor drive circuitry for receiving electrical signals from the spindle motor drive circuitry for controlling the spindle motor. The disk drive further includes a stator electrical trace integrally formed upon the disk drive housing from the stator to the host connector for electrically connecting the stator and the host connector.
The stator electrical trace may be integrally formed upon the disk drive housing via an electroless plating process. The disk drive housing may be formed of molded plastic. The disk drive housing may have a groove formed therein, and the stator electrical trace is formed within the groove. The host connector may be integrally formed with the disk drive housing.
According to another aspect of the present invention there is provided a disk drive for use with a host electronic unit. The disk drive includes a disk drive housing, and a spindle motor rotatably attached to the disk drive housing. The spindle motor includes a stator. The disk drive further includes spindle motor drive circuitry coupled to the disk drive housing. The spindle motor drive circuitry is configured to generate electrical signals for controlling the spindle motor. The disk drive further includes a stator/spindle motor drive circuitry electrical trace integrally formed upon the disk drive housing from the spindle motor drive circuitry to the stator for receiving electrical signals from the spindle motor drive circuitry for controlling the spindle motor. The disk drive further includes a host connector attached to the disk drive housing. The host connector is operably connectable to the host electronic unit. The disk drive further includes a spindle motor drive circuitry/host connector electrical trace integrally formed upon the disk drive housing from the spindle motor drive circuitry to the host connector for electrically connecting the spindle motor drive circuitry with the host electronic unit.
According to another aspect of the present invention there is provided a disk drive for use with a host electronic unit including actuator drive circuitry. The disk drive includes a disk drive housing, and a head stack assembly rotatably attached to the disk drive housing. The head stack assembly includes a coil portion. The disk drive further includes a flex circuit cable operably connected to the coil portion. The disk drive further includes a host connector attached to the disk drive housing. The host connector is operably connectable to the actuator drive circuitry for receiving electrical signals from the actuator drive circuitry for controlling movement of the head stack assembly. The disk drive further includes a coil electrical trace integrally formed upon the disk drive housing from the flex circuit cable to the host connector for electrically connecting the coil portion and the host connector.
The coil electrical traces may be integrally formed upon the disk drive housing via an electroless plating process. The disk drive housing may be formed of molded plastic. The disk drive housing may have a groove formed therein, and the coil electrical trace is formed within the groove. The host connector may be integrally formed with the disk drive housing.
According to another aspect of the present invention there is provided a disk drive for use with a host electronic unit. The disk drive includes a disk drive housing, and a head stack assembly rotatably attached to the disk drive housing. The head stack assembly includes a coil portion. The disk drive further includes a flex circuit cable operably connected to the coil portion. The disk drive further includes actuator drive circuitry coupled to the disk drive housing. The actuator drive circuitry is configured to generate electrical signals for controlling the head stack assembly. The disk drive further includes a flex circuit cable/actuator drive circuitry electrical trace integrally formed upon the disk drive housing from the actuator drive circuitry to the flex circuit cable for receiving electrical signals from the actuator drive circuitry for controlling the head stack assembly. The disk drive further includes a host connector attached to the disk drive housing. The host connector is operably connectable to the host electronic unit. The disk drive further includes an actuator drive circuitry/host connector electrical trace integrally formed upon the disk drive housing from the actuator drive circuitry to the host connector for electrically connecting the actuator drive circuitry with the host electronic unit.
According to another aspect of the present invention there is provided a disk drive for use with a host electronic unit including read channel circuitry. The disk drive includes a disk drive housing, and a head stack assembly rotatably attached to the disk drive housing. The disk drive further includes a preamplifier operably connected to the head stack assembly. The disk drive further includes a host connector attached to the disk drive housing. The host connector is operably connectable to the read channel circuitry for receiving electrical signals from the head stack assembly to the read channel circuitry. The disk drive further includes a preamplifier electrical trace integrally formed upon the disk drive housing from the preamplifier to the host connector for electrically connecting the head stack assembly and the host connector.
The disk drive may further have a flex circuit cable operably connected to the head stack assembly and the preamplifier. The disk drive may further have a flex circuit cable/preamplifier electrical trace integrally formed upon the disk drive housing between the flex circuit cable and the preamplifier. The flex circuit cable/preamplifier electrical trace may be integrally formed upon the disk drive housing via an electroless plating process. The preamplifier electrical trace may be integrally formed upon the disk drive housing via an electroless plating process. The disk drive housing may be formed of molded plastic. The disk drive housing may have a groove formed therein, and the preamplifier electrical trace is formed within the grooves. The host connector may be integrally formed with the disk drive housing.
According to another aspect of the present invention there is provided a disk drive for use with a host electronic unit. The disk drive includes a disk drive housing, and a head stack assembly rotatably attached to the disk drive housing. The disk drive further includes a preamplifier operably connected to the head stack assembly. The disk drive further includes read channel circuitry configured to receive electrical signals from the head stack assembly. The disk drive further includes a preamplifier/read channel circuitry electrical trace integrally formed upon the disk drive housing from the read channel circuitry to the preamplifier for receiving electrical signals by the read channel circuitry from the preamplifier from the head stack assembly. The disk drive further includes a host connector attached to the disk drive housing. The host connector is operably connectable to the host electronic unit. The disk drive further includes a read channel circuitry/host connector electrical trace integrally formed upon the disk drive housing from the read channel circuitry to the host connector for electrically connecting the read channel circuitry with the host electronic unit. | 2023-09-19T01:27:17.760571 | https://example.com/article/2306 |
In a recent article, Peralta et al. reported about 4 siblings from consanguineous parents with neonatal cerebellar hypoplasia, seizures, axial hypotonia, hypertrophic cardiomyopathy, hepatomegaly, congenital cataract, and facial dysmorphism due to the novel, homozygous missense variant c.1217T\>G (p.Leu406Arg) in *ATAD3A* \[[@bb0005]\]. The study evokes the following concerns.
We do not agree with the notion that hypertrophic cardiomyopathy and hepatomegaly "expand the phenotypic spectrum commonly associated with pathogenic *ATAD3A* variants" \[[@bb0005]\]. At least hypertrophic cardiomyopathy has been reported previously in 2 of 8 unrelated individuals carrying the variant c.1582C\>T in *ATAD3A* \[[@bb0010]\]. One of the 8 individuals also presented with right ventricular hypertrophy. Hypertrophic cardiomyopathy has been also reported in one of 6 patients carrying deletions of the *ATAD3A* and *ATAD3B* gene respectively \[[@bb0015]\]. The only phenotypic features which have not been reported previously are hepatomegaly and low plasma cholesterol \[[@bb0005]\],
The presence of hepatomegaly in all four siblings is not surprising given the fact that all four had cardiomyopathy. Assuming that all four had heart failure from cardiomyopathy, enlargement of the liver due to congestion is not unusual. We thus should know if the four siblings presented with other clinical features of heart failure (edema, neck vein distension), if systolic function was reduced, and if proBNP values were increased. In case hepatomegaly was not attributable to heart failure, we should know if there was steatosis or accumulation of other material on autopsy, or liver toxicity from drugs.
Features which have been previously reported but not in the present study include fetal distress \[[@bb0010],[@bb0015]\], feeding difficulties \[[@bb0010]\], optic atrophy \[[@bb0010]\], peripheral spasticity \[[@bb0010],[@bb0020]\], and axonal neuropathy \[[@bb0010],[@bb0020]\]. We should know what is meant with "peripheral spasticity" and if these features were truly absent or if the authors not systematically looked for them,
This interesting study may profit from addressing the points mentioned above.
Funding {#s0005}
=======
No funding was received.
Author contribution {#s0010}
===================
JF: design, literature search, discussion, first draft, critical comments.
Declaration of Competing Interest
=================================
There are no conflicts of interest.
| 2024-03-18T01:27:17.760571 | https://example.com/article/1719 |
Catheter dislodgement of percutaneous transhepatic biliary drainage: identification of role of puncture sites and catheter sheath.
To identify the appropriate puncture points in the bile duct to avoid catheter dislodgement. Percutaneous transhepatic biliary drainage catheters (n = 300) were placed in 242 patients. The frequency of dislodgement (complete dislodgement or bending of the catheter) was prospectively investigated. The puncture site of the bile duct was classified on the ultrasonographic findings as follows: Main-B3, main branch of the lateral inferior segment; peripheral-B3, peripheral branch of the lateral inferior segment; B2, lateral superior segment; left hepatic duct, proximal portion of the left hepatic duct; B8, anterior superior segment; B5, anterior inferior segment; B5 + 8, main bile duct of the anterior segment; B6, bile duct of posterior inferior segment; and right hepatic duct, proximal portion of the right hepatic duct. When a catheter without an outer sheath was used, catheter dislodgement in peripheral-B3 (2/11, 18%) was more common than in main-B3 (0/32, 0%; p < 0.05). In B5, catheter dislodgement (6/12, 50%) was more frequent than in B8 (3/20, 15%; p < 0.05) and in B6 (0/14, 0%; p < 0.005). When a catheter with an outer sheath was used, catheter dislodgement (2/207, 1%) was rare. Drainage from B5 and peripheral-B3 is associated with a high risk of dislodgement of the catheter. A catheter with an outer sheath was useful to prevent catheter dislodgement. | 2024-03-09T01:27:17.760571 | https://example.com/article/8150 |
Morphology of the deciduous tusk (tush) of the African elephant (Loxodonta africana).
The tusk of the African elephant is preceded by a deciduous tooth generally known as the tush. Tushes from nine elephant fetuses and six calves younger than 1 year were exposed by dissection and described morphologically. All tushes consisted of a crown, root and pulpal cavity, the formation of which is completed soon after birth. They reached a maximum length of 5 cm, appeared not to erupt through the skin and were pushed aside and resorbed during enlargement of the distally located primordium of the tusk. Dental enamel, which covered the crown, could easily be removed and consisted of rods with an interwoven arrangement; the dentine-enamel junction was flat. Cellular cementum extended for variable distances over the crown and the dentine was tubular in nature. Although the tush apparently has no function, it provides the anlage and orientation for the development of its permanent successor. | 2023-12-17T01:27:17.760571 | https://example.com/article/4194 |
IL-33, acting via its receptor, ST2L, is a highly potent cytokine implicated in septic injury. The IL-33/ST2L axis appears indispensable in inflammatory signaling as blockade of the ST2L receptor significantly attenuates systemic inflammation. Thus, maneuvers designed to selectively modulate availability of ST2L might lessen the severity of sepsis. However, to date, very little is known regarding the molecular regulation of ST2L expression. In the process of studying bacterial sepsis, we discovered that a new orphan protein, FBXL19 (F-box protein 19, SCFFBXL19), specifically targets phosphorylated ST2L for its ubiquitination and degradation. Our published and preliminary works also shows that ST2L is phosphorylated by glycogen synthase kinase (GSK3), and that activation of the IL-33/ST2L axis induces cleavage of PARP and PKC thereby promoting apoptosis. Further, FBXL19 mediated disposal of ST2L attenuates IL-33/ST2L-induced pro-inflammatory signaling, apoptosis, and lessens the severity of inflammatory organ injury in septic murine models. These data led to our novel hypothesis that GSK3-driven phosphorylation of ST2L serves as a molecular signature for F-box protein mediated ubiquitination and degradation of ST2L in sepsis-associated injury. We will test this hypothesis by executing two specific Aims: (1) To investigate the mechanisms by which GSK3 promotes ST2L degradation and regulates IL-33/ST2L signaling, and (2) To investigate the mechanisms by which FBXL19 and its ligand promotes ST2L ubiquitination and degradation thereby attenuating septic lung injury. These studies will lay the groundwork for a significant mechanistic advance with regard to the molecular regulation of a relatively new receptor (ST2L) involved in sepsis. Results from these studies are intended to serve as the basis for strategies directed at the development of novel small molecule inhibitors of the IL-33/ST2L pathway to lessen the severity of sepsis-induced organ injury. | 2024-02-14T01:27:17.760571 | https://example.com/article/8017 |
<!DOCTYPE html>
<html>
<head><title>Test dir=rtl</title></head>
<body style="background: white;">
<div style="position: absolute;
top: 5px; left: 5px; width: 100px; height: 100px;
text-align: center; background: black;">
<div style="position: absolute;
width: 35px; height: 100px; background: red;"></div>
<div style="position: absolute; left: 40px;
width: 20px; height: 100px; background: blue;"></div>
<div style="position: absolute; left: 60px; width: 40px; height: 100px;
background: green;"></div>
</div>
</body>
</html>
| 2024-01-28T01:27:17.760571 | https://example.com/article/1544 |
Q:
Extra dummy components painted during thread execution
In a Java applet, I'm trying to slow down the painting of an image made up of parts, so I wrote a test program to get the basic concept working. I'm using a thread to draw a number of boxes one at a time instead of a timer because I want to be able to click the go button to reset the drawing process at any time.
The problem is, after drawing a box, it moves down a bit and an extra of the label shows up at the top of the screen. When the mouse moves off the button at the bottom, a dummy button also shows up at the top of the screen. The dummy button doesn't respond to clicks (only the real one at the bottom does), it's just there.
I'm still pretty new at this, so any help would be greatly appreciated.
Here's the JApplet class:
import java.awt.*;
import javax.swing.*;
import java.awt.event.*;
public class TestDraw extends JApplet implements ActionListener
{
private DrawPanel panel;
private JLabel lbl1;
JButton go;
Thread t;
public void init()
{
lbl1 = new JLabel("hi");
go = new JButton("GO");
go.addActionListener(this);
panel = new DrawPanel();
getContentPane().setBackground(Color.yellow);
add(lbl1, BorderLayout.NORTH);
add(panel, BorderLayout.CENTER);
add(go, BorderLayout.SOUTH);
}
public void actionPerformed(ActionEvent ae){
// tried adding these. didnt help
//panel.validate();
//panel.repaint();
//validate();
panel.resetBoxes();
repaint();
}
public void start(){
t = new Thread(panel);
t.start();
}
}
Here's the DrawPanel Class:
import java.awt.*;
import java.security.SecureRandom;
import javax.swing.*;
public class DrawPanel extends JPanel implements Runnable
{
private SecureRandom randGen = new SecureRandom();
private Box[] boxes;
private int box2draw = 0;
public DrawPanel()
{
setBackground(Color.WHITE);
boxes = new Box[5];
for (int count = 0; count < boxes.length; count++){
int x = randGen.nextInt(300);
int y = randGen.nextInt(300);
int w = randGen.nextInt(300);
int h = randGen.nextInt(300);
Color color = new Color(randGen.nextInt(256), randGen.nextInt(256), randGen.nextInt(256));
boxes[count] = new Box(x,y,w,h,color);
}
}
public void paintComponent(Graphics g)
{
boxes[box2draw].draw(g);
box2draw++;
}
public void resetBoxes(){
boxes = new Box[5];
for (int count = 0; count < boxes.length; count++){
int x = randGen.nextInt(300);
int y = randGen.nextInt(300);
int w = randGen.nextInt(300);
int h = randGen.nextInt(300);
Color color = new Color(randGen.nextInt(256), randGen.nextInt(256), randGen.nextInt(256));
boxes[count] = new Box(x,y,w,h,color);
box2draw = 0;
}
}
public void run(){
while(true){
try{
Thread.sleep(750);
}
catch(InterruptedException e){
JOptionPane.showMessageDialog(null, "interrupted");
}
repaint();
}
}
}
And finally, the Box class:
import java.awt.Color;
import java.awt.Graphics;
public class Box
{
private int x;
private int y;
private int w;
private int h;
private Color color;
public Box(int x,int y,int w,int h,Color color)
{
// initialise instance variables
this.x = x;
this.y=y;
this.w=w;
this.h = h;
this.color=color;
}
public void draw(Graphics g)
{
g.setColor(color);
g.drawRect( x, y, w, h);
}
}
Thank you for your time!
A:
Problems:
You've got code logic within a painting method -- something that you should never do -- including your incrementing an array index. You don't have full control of when or even if this method is called and so program logic does not belong there, just painting. If you need to increment your array index, do it elsewhere, perhaps within your thread's while (true) loop. Also take care not to have the index go beyond the size of the array.
You never call the super's paintComponent method within your override, and this will prevent the component from doing housekeeping painting, probably your main problem.
If you need to display multiple items, then consider either drawing to a BufferedImage and displaying that within paintComponent, or creating a collection of Shape objects and drawing all of them within paintComponent via a for-loop.
I prefer to use the Swing-safer Swing Timer. While it doesn't matter if only calling repaint() if you want to make any other Swing calls intermittently, it makes life much easier and coding safer.
For example
package foo1;
import java.awt.BasicStroke;
import java.awt.BorderLayout;
import java.awt.Color;
import java.awt.Dimension;
import java.awt.Graphics;
import java.awt.Stroke;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;
import java.util.Random;
import javax.swing.AbstractAction;
import javax.swing.JButton;
import javax.swing.JFrame;
import javax.swing.JPanel;
import javax.swing.SwingUtilities;
import javax.swing.Timer;
public class TestDraw2 {
@SuppressWarnings("serial")
private static void createAndShowGui() {
final DrawPanel2 drawPanel = new DrawPanel2();
JButton drawButton = new JButton(new AbstractAction("Draw!") {
@Override
public void actionPerformed(ActionEvent e) {
drawPanel.resetBoxes();
}
});
JPanel btnPanel = new JPanel();
btnPanel.add(drawButton);
JFrame frame = new JFrame("TestDraw2");
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
frame.getContentPane().add(drawPanel);
frame.getContentPane().add(btnPanel, BorderLayout.PAGE_END);
frame.pack();
frame.setLocationRelativeTo(null);
frame.setVisible(true);
}
public static void main(String[] args) {
SwingUtilities.invokeLater(new Runnable() {
public void run() {
createAndShowGui();
}
});
}
}
@SuppressWarnings("serial")
class DrawPanel2 extends JPanel {
private static final int BOX_COUNT = 5;
private static final int TIMER_DELAY = 750;
private static final int PREF_W = 600;
private static final int PREF_H = PREF_W;
private Random randGen = new Random();
private Box[] boxes;
private int box2draw = 0;
public DrawPanel2() {
setBackground(Color.YELLOW);
boxes = new Box[BOX_COUNT];
for (int count = 0; count < boxes.length; count++) {
int x = randGen.nextInt(300);
int y = randGen.nextInt(300);
int w = randGen.nextInt(300);
int h = randGen.nextInt(300);
Color color = new Color(randGen.nextInt(256), randGen.nextInt(256),
randGen.nextInt(256));
boxes[count] = new Box(x, y, w, h, color);
}
}
@Override
public Dimension getPreferredSize() {
if (isPreferredSizeSet()) {
return super.getPreferredSize();
}
return new Dimension(PREF_W, PREF_H);
}
@Override
protected void paintComponent(Graphics g) {
super.paintComponent(g);
for (int i = 0; i < box2draw; i++) {
boxes[i].draw(g);
}
}
public void resetBoxes() {
boxes = new Box[BOX_COUNT];
for (int count = 0; count < boxes.length; count++) {
int x = randGen.nextInt(300);
int y = randGen.nextInt(300);
int w = randGen.nextInt(300);
int h = randGen.nextInt(300);
Color color = new Color(randGen.nextInt(256), randGen.nextInt(256),
randGen.nextInt(256));
boxes[count] = new Box(x, y, w, h, color);
box2draw = 0;
}
repaint();
new Timer(TIMER_DELAY, new ActionListener() {
@Override
public void actionPerformed(ActionEvent e) {
box2draw++;
if (box2draw > BOX_COUNT) {
box2draw = BOX_COUNT;
((Timer) e.getSource()).stop();
}
repaint();
}
}).start();
}
}
| 2024-03-11T01:27:17.760571 | https://example.com/article/5294 |
The Federal Communications Commission on Friday voted to phase in requirements that local TV stations put information about political advertising online.
Under the rules, TV stations affiliated with the four top TV networks in the nation's 50 largest markets will be required to file political information online first. All other TV stations will be exempt from the new requirements until July 1, 2014, to give the FCC the opportunity to see how the changes work.
The vote came as a rebuff to broadcast station owners, who had been lobbying vigorously against the change.
Though FCC rules already require broadcasters to document their political ad sales in publicly accessible files at their stations, you have to visit a station in person to get the data.
Under the new requirement, you can access in the information at the click of a mouse.
Broadcasters are expected to reap $3 billion from political ad sales this year, FCC Chairman Julius Genachowski said in an April 16 speech at the National Association of Broadcasters convention in Las Vegas.
The new rule adopted by the FCC also will require broadcasters to publish online other information that they currently keep in the public files in their stations, including network-affiliation agreements and contracts affecting station ownership.
"In putting these files online, the FCC is requiring broadcasters to take a step that innumerable other entities have opted for since the World Wide Web became a part of our daily lives, and putting public files on the Internet in 2012 makes sense," Commissioner Mignon L. Clyburn said in a statement. "It is the expected means of data viewing, and this action requires no unreasonable amount of production or disclosure."
He added: I see no reason to limit the reach of the online public file. We do not restrict, in any way, shape or form, who can access the existing paper files, and I see no need to do so for this new regime."
At a news conference after the vote, Genachowski rejected TV station arguments that the online revelations could hurt broadcasters financially.
“The record does not show that there’s any likelihood of … commercial harms coming out of this, because we’re talking about information that is already publicly available,” he said. “While it’s information that is difficult for an ordinary consumer to access, it’s not difficult for commercial businesses to access. So any existing commercial business that believes there’s value in those rates is already getting them.” | 2024-02-04T01:27:17.760571 | https://example.com/article/5683 |
Penetrating and blunt trauma to the neck: clinical presentation, assessment and emergency management.
Penetrating and blunt trauma to the neck: clinical presentation, assessment ana emergency management. In Belgium, and even in Western Europe, penetrating and blunt injury to the neck is relatively uncommon in both the civilian and military populations. Pre-hospital and emergency assessment and management will therefore always prove challenging, as individual exposure to this specific type of injury remains low. Historically, the neck has been divided into three anatomical zones with specific landmarks to guide the diagnostic and therapeutic approach to penetrating neck injuries. Most penetrating injuries need to be explored surgically, although with the advent of multi-detector computed tomographic angiography (MDCTA), which yields high diagnostic sensitivity, this inflexible approach has recently changed to a more targeted management, based on clinical, radiographic and, if deemed necessary, endoscopic findings. However, some authors have addressed their concern about this novel, 'no-zone' approach, since the risk of missing less apparent aerodigestive tract injuries may increase. It is recommended, therefore, that all patients with penetrating neck injuries be closely observed, irrespective of the initial findings. The incidence of blunt neck injury is much lower, and this makes risk assessment and management even more difficult in comparison with penetrating injuries. Again, MDCTA is most often the first diagnostic tool if a blunt neck injury is suspected, due to its good sensitivity for blunt cerebrovascular injuries (BCVI) as well as for aerodigestive tract injuries. Specific patterns of injury and unexpected neurological and neuro-radiological findings in trauma patients should always warrant further investigation. Despite ongoing debate, systemic anticoagulation is recommended for most BCVI, sometimes combined with endovascular treatment. Aerodigestive tract injuries may present dramatically, but are often more subtle, making the diagnosis more difficult than other types of neck injuries. Treatment may be conservative if damage is minimal, but surgery is warranted in all other cases. | 2023-09-15T01:27:17.760571 | https://example.com/article/4922 |
module ChronoModel
class Adapter < ActiveRecord::ConnectionAdapters::PostgreSQLAdapter
module Migrations
# Creates the given table, possibly creating the temporal schema
# objects if the `:temporal` option is given and set to true.
#
def create_table(table_name, options = {})
# No temporal features requested, skip
return super unless options[:temporal]
if options[:id] == false
logger.warn "ChronoModel: Temporal Temporal tables require a primary key."
logger.warn "ChronoModel: Adding a `__chrono_id' primary key to #{table_name} definition."
options[:id] = '__chrono_id'
end
transaction do
on_temporal_schema { super }
on_history_schema { chrono_history_table_ddl(table_name) }
chrono_public_view_ddl(table_name, options)
end
end
# If renaming a temporal table, rename the history and view as well.
#
def rename_table(name, new_name)
return super unless is_chrono?(name)
clear_cache!
transaction do
# Rename tables
#
on_temporal_schema { rename_table_and_pk(name, new_name) }
on_history_schema { rename_table_and_pk(name, new_name) }
# Rename indexes
#
chrono_rename_history_indexes(name, new_name)
chrono_rename_temporal_indexes(name, new_name)
# Drop view
#
execute "DROP VIEW #{name}"
# Drop functions
#
chrono_drop_trigger_functions_for(name)
# Create view and functions
#
chrono_public_view_ddl(new_name)
end
end
# If changing a temporal table, redirect the change to the table in the
# temporal schema and recreate views.
#
# If the `:temporal` option is specified, enables or disables temporal
# features on the given table. Please note that you'll lose your history
# when demoting a temporal table to a plain one.
#
def change_table(table_name, options = {}, &block)
transaction do
# Add an empty proc to support calling change_table without a block.
#
block ||= proc { }
if options[:temporal]
if !is_chrono?(table_name)
chrono_make_temporal_table(table_name, options)
end
drop_and_recreate_public_view(table_name, options) do
super table_name, options, &block
end
else
if is_chrono?(table_name)
chrono_undo_temporal_table(table_name)
end
super table_name, options, &block
end
end
end
# If dropping a temporal table, drops it from the temporal schema
# adding the CASCADE option so to delete the history, view and triggers.
#
def drop_table(table_name, *)
return super unless is_chrono?(table_name)
on_temporal_schema { execute "DROP TABLE #{table_name} CASCADE" }
chrono_drop_trigger_functions_for(table_name)
end
# If adding an index to a temporal table, add it to the one in the
# temporal schema and to the history one. If the `:unique` option is
# present, it is removed from the index created in the history table.
#
def add_index(table_name, column_name, options = {})
return super unless is_chrono?(table_name)
transaction do
on_temporal_schema { super }
# Uniqueness constraints do not make sense in the history table
options = options.dup.tap {|o| o.delete(:unique)} if options[:unique].present?
on_history_schema { super table_name, column_name, options }
end
end
# If removing an index from a temporal table, remove it both from the
# temporal and the history schemas.
#
def remove_index(table_name, *)
return super unless is_chrono?(table_name)
transaction do
on_temporal_schema { super }
on_history_schema { super }
end
end
# If adding a column to a temporal table, creates it in the table in
# the temporal schema and updates the triggers.
#
def add_column(table_name, *)
return super unless is_chrono?(table_name)
transaction do
# Add the column to the temporal table
on_temporal_schema { super }
# Update the triggers
chrono_public_view_ddl(table_name)
end
end
# If renaming a column of a temporal table, rename it in the table in
# the temporal schema and update the triggers.
#
def rename_column(table_name, *)
return super unless is_chrono?(table_name)
# Rename the column in the temporal table and in the view
transaction do
on_temporal_schema { super }
super
# Update the triggers
chrono_public_view_ddl(table_name)
end
end
# If removing a column from a temporal table, we are forced to drop the
# view, then change the column from the table in the temporal schema and
# eventually recreate the triggers.
#
def change_column(table_name, *)
return super unless is_chrono?(table_name)
drop_and_recreate_public_view(table_name) { super }
end
# Change the default on the temporal schema table.
#
def change_column_default(table_name, *)
return super unless is_chrono?(table_name)
on_temporal_schema { super }
end
# Change the null constraint on the temporal schema table.
#
def change_column_null(table_name, *)
return super unless is_chrono?(table_name)
on_temporal_schema { super }
end
# If removing a column from a temporal table, we are forced to drop the
# view, then drop the column from the table in the temporal schema and
# eventually recreate the triggers.
#
def remove_column(table_name, *)
return super unless is_chrono?(table_name)
drop_and_recreate_public_view(table_name) { super }
end
private
# In destructive changes, such as removing columns or changing column
# types, the view must be dropped and recreated, while the change has
# to be applied to the table in the temporal schema.
#
def drop_and_recreate_public_view(table_name, opts = {})
transaction do
options = chrono_metadata_for(table_name).merge(opts)
execute "DROP VIEW #{table_name}"
on_temporal_schema { yield }
# Recreate the triggers
chrono_public_view_ddl(table_name, options)
end
end
def chrono_make_temporal_table(table_name, options)
# Add temporal features to this table
#
if !primary_key(table_name)
execute "ALTER TABLE #{table_name} ADD __chrono_id SERIAL PRIMARY KEY"
end
execute "ALTER TABLE #{table_name} SET SCHEMA #{TEMPORAL_SCHEMA}"
on_history_schema { chrono_history_table_ddl(table_name) }
chrono_public_view_ddl(table_name, options)
chrono_copy_indexes_to_history(table_name)
# Optionally copy the plain table data, setting up history
# retroactively.
#
if options[:copy_data]
chrono_copy_temporal_to_history(table_name, options)
end
end
def chrono_copy_temporal_to_history(table_name, options)
seq = on_history_schema { pk_and_sequence_for(table_name).last.to_s }
from = options[:validity] || '0001-01-01 00:00:00'
execute %[
INSERT INTO #{HISTORY_SCHEMA}.#{table_name}
SELECT *,
nextval('#{seq}') AS hid,
tsrange('#{from}', NULL) AS validity,
timezone('UTC', now()) AS recorded_at
FROM #{TEMPORAL_SCHEMA}.#{table_name}
]
end
# Removes temporal features from this table
#
def chrono_undo_temporal_table(table_name)
execute "DROP VIEW #{table_name}"
chrono_drop_trigger_functions_for(table_name)
on_history_schema { execute "DROP TABLE #{table_name}" }
default_schema = select_value 'SELECT current_schema()'
on_temporal_schema do
if primary_key(table_name) == '__chrono_id'
execute "ALTER TABLE #{table_name} DROP __chrono_id"
end
execute "ALTER TABLE #{table_name} SET SCHEMA #{default_schema}"
end
end
# Renames a table and its primary key sequence name
#
def rename_table_and_pk(name, new_name)
seq = pk_and_sequence_for(name).last.to_s
new_seq = seq.sub(name.to_s, new_name.to_s).split('.').last
execute "ALTER SEQUENCE #{seq} RENAME TO #{new_seq}"
execute "ALTER TABLE #{name} RENAME TO #{new_name}"
end
# private
end
end
end
| 2024-02-23T01:27:17.760571 | https://example.com/article/5178 |
Archives for April 2011
By Alan Zarembo and Ben Welsh | Los Angeles Times | Link to article Turning up the power is a little-publicized way of getting more electricity from existing nuclear plants. But scrutiny is likely to increase in the wake of Japan’s nuclear crisis. The U.S. nuclear industry is turning up the power on old reactors, […]
By VANESSA FUHRMANS | The Wall Street Journal | Link to article German engineering giant Siemens AG is considering whether to abandon its goal of becoming a major player in the atomic-power industry, according to people familiar with the matter, as Japan’s nuclear crisis continues to unfold. While top executives at Siemens haven’t made any […]
By Patrick McGreevy | Los Angeles Times | Link to article The California law increases a previous mandate of 20% renewable energy. U.S. energy secretary calls the law a model for other states, and an industry group says it could create 100,000 jobs. Gov. Jerry Brown on Tuesday signed into law a requirement that California […]
By PHRED DVORAK, JURO OSAWA and YUKA HAYASHI | Wall Street Journal | Link to article TOKYO-The Japanese government raised its assessment of the monthlong crisis at its Fukushima Daiichi nuclear power plant to the highest severity level by international standards-a rating only conferred so far upon the Chernobyl accident. Japan’s nuclear regulators said the […]
By Tiffany Hsu | Los Angeles Times | Greenspace: Environmental news from California and beyond | Link to article Gov. Jerry Brown signed into law Tuesday a mandate that 33% of electricity in California must come from renewable sources by 2020. Executives at solar, wind and other clean energy companies said the new regulations could […]
By BEN CASSELMAN And STEPHEN POWER | Wall Street Journal | Link to article The owner of California’s Diablo Canyon nuclear-power plant said it wouldn’t seek license renewals for its two reactors until new studies of the area’s vulnerability to earthquakes can be conducted. Pacific Gas & Electric Co. had applied for a 20-year license […]
By ALESSANDRO TORELLO | Wall Street Journal | Link to article BRUSSELS—The European Union next week will propose taxing transport and heating fuels according to their greenhouse-gas emissions as well as their energy content, introducing a climate-change component in EU tax rules for the first time, after years of negotiations. The European Commission, which has […]
By ELISABETH ROSENTHAL | The New York Times | Link to article The starchy cassava root has long been an important ingredient in everything from tapioca pudding and ice cream to paper and animal feed. But last year, 98 percent of cassava chips exported from Thailand, the world’s largest cassava exporter, went to just one […]
By CARI TUNA and TAMARA AUDI | Wall Street Journal | Link to article If a 7.8-magnitude quake ripped the earth open along the southern San Andreas Fault this afternoon, it would cut a swath of destruction from the eastern desert to the Los Angeles basin. It would pull down buildings, kill 1,800 people and […] | 2024-02-23T01:27:17.760571 | https://example.com/article/9002 |
Program PassOrFailSystem;
Var
ActualMark : Integer;
PossibleMark : Integer;
PercentageMark : Real;
Begin { PassOrFailSystem }
Writeln ('Please type the student''s actual mark: ');
Readln (ActualMark);
Writeln ('Please type the total possible mark of the exam : ');
Readln (PossibleMark);
PercentageMark := (ActualMark / PossibleMark) * 100;
If (PercentageMark >= 50) Then
Begin
Writeln;
Writeln ('Pass');
End
Else
Begin
Writeln;
Writeln ('Fail');
End;
{ EndIf }
End. { PassOrFailSystem }
| 2024-06-14T01:27:17.760571 | https://example.com/article/9047 |
Highly Chemically Stable MOFs with Trifluoromethyl Groups: Effect of Position of Trifluoromethyl Groups on Chemical Stability.
Metal-organic frameworks (MOFs) are a class of advanced porous crystalline materials. However, numerous MOFs have poor chemical stability, significantly restricting their industrial application. The introduction of trifluoromethyl groups around clusters of MOFs results in a shielding effect caused by their hydrophobicity and bulkiness, thus preventing guest molecules from attacking the coordination bonds. To prove such a shielding effect, the position of the trifluoromethyl groups is rationally adjusted, with trifluoromethyl groups at the ortho positions of carboxyl groups significantly improving the chemical stability of UiO-67. The prepared UiO-67- o-2CF3 remains intact after treatment with boiling water, 8 M HCl, 10 mM NaOH, and 50 ppm of NaF aqueous solutions. As the control experiment, trifluoromethyl groups at the meta positions of carboxyl groups have no shielding effect; hence, UiO-67- m-2CF3 has a stability that is lower than that of UiO-67- o-2CF3. In addition, the shielding effect is also applied to other MOFs, including DUT-5- o-2CF3 and Al-TPDC- o-2CF3, confirming the universality of this strategy. | 2024-01-31T01:27:17.760571 | https://example.com/article/9310 |
A Tennessee man who purchased more than 17,700 bottles of hand sanitizer to resell online ended up with a massive financial loss, having been forced into donating the entire stockpile after the state attorney general's office got involved, according to The Hill.
What's the story?
Matt Colvin and his brother, Noah, began buying up all the hand sanitizer they could find from stores in Tennessee and Kentucky the day after the first recorded U.S. coronavirus death.
They make a habit of buying large quantities of hot items to resell for a profit on Amazon and eBay, and saw an opportunity as consumers sought out hand sanitizer and disinfectant wipes to protect against the spread of infection.
How'd that work out?
The Colvins were right about the demand for the product, and things got off to a good start. They were able to sell 300 bottles on Amazon — until the company removed all their items and banned him from the platform for price gouging.
Matt Colvin spoke to the New York Times on Saturday about the situation, which put a target on his back for outrage. Anger over his scheme spread online, and his address was eventually publicized, leading to at least one angry visitor banging on his door.
Sunday, the Tennessee attorney general's office sent Colvin a cease-and-desist letter, promising to take "aggressive action" against people who attempted to price-gouge "in this time of exceptional need."
So, the Colvin brothers accepted defeat and donated two-thirds of the product to a local church, and the other third to the attorney general's office, which will distribute it to Kentucky where much of it was purchased.
Didn't mean any harm?
Matt Colvin claims he didn't realize that if he purchased all the hand sanitizer in every store that other people wouldn't be able to get any.
"I've been buying and selling things for 10 years now. There's been hot product after hot product. But the thing is, there's always another one on the shelf," Colvin told the Times. "When we did this trip, I had no idea that these stores wouldn't be able to get replenished. It was never my intention to keep necessary medical supplies out of the hands of people who needed them. That's not who I am as a person. And all I've been told for the last 48 hours is how much of that person I am." | 2024-04-26T01:27:17.760571 | https://example.com/article/8177 |
Background {#Sec1}
==========
Gambling opportunities have increased significantly in the past two decades, and at the same time gambling-related harm has grown into a public health concern and social issue worldwide. In many countries including Finland \[[@CR1]\], Australia \[[@CR2]\] and the UK \[[@CR3]\], public attitudes towards gambling tend to be negative, more so among women than men \[[@CR1], [@CR3]--[@CR5]\]. Male gender as well as age between 18 and 54 have been found to correlate with more positive attitudes towards gambling \[[@CR1], [@CR3]\], but some evidence indicates that age has no effect \[[@CR6]\]. It has been reported that men and younger individuals typically gamble more and have a higher risk of developing gambling problems \[[@CR7]--[@CR11]\]. In Finland where this study was conducted, the national gambling monopoly has recorded growing profits since 2009. The monopoly's revenue figures are among the highest in the EU \[[@CR12]\]. Most of these profits are channelled through the state or NGOs to promote the public good.
According to the theory of planned behaviour (TPB) \[[@CR13], [@CR14]\], behaviours such as gambling participation are mediated by an individual's attitudes, subjective norms and perceived behavioural control \[[@CR6]\]. Positive attitudes towards gambling correlate with a high gambling frequency \[[@CR1], [@CR15]\]. On the other hand, experiences of gambling problems create more negative attitudes \[[@CR2], [@CR3], [@CR16]--[@CR19]\]. Epidemiological studies have shown that increased gambling participation, and higher gambling frequency in particular, leads to an increase in gambling problems \[[@CR20], [@CR21]\]. It seems that online gambling contributes more strongly to gambling problems than land-based gambling \[[@CR22]--[@CR24]\].
Gambling can also bring about different types of harms \[[@CR25], [@CR26]\]. The risk of individual harm is highest among problem gamblers, yet most gambling harms are also found among low-risk gamblers \[[@CR25]\]. To better understand these phenomena, it is important to explore the occurrence of gambling harms across all levels of participation \[[@CR25]--[@CR28]\]. However, there are hardly any tools available to measure these harms at the population level. Previous population-based studies of gambling-related harm are limited to a restricted number of items derived from problem gambling instruments such as the Problem Gambling Severity Index (PGSI) (e.g. \[[@CR25], [@CR28]\]).
Public attitudes can provide importance guidance for governments as they seek to develop responsible gambling policies \[[@CR2]\]. Analyses of gambling attitudes and gambling participation are therefore crucial tools that can help minimise gambling-related harm through gender- and age-specific prevention and treatment programmes.
This study compares attitudes towards gambling, gambling participation and gambling-related harm in Finland in 2011--2015, separately for men and women and different age groups. In addition, we use PGSI and the South Oaks Gambling Screen (SOGS) to produce a more comprehensive profile of gambling-related harm.
Methods {#Sec2}
=======
The data for this study came from two cross-sectional Finnish gambling surveys in 2011 \[[@CR29]\] and 2015 \[[@CR30], [@CR31]\], which drew random samples of 16,000 and 7400 people, respectively, from the population information register. The inclusion criteria were: 1) 15--74 years, 2) mother tongue Finnish or Swedish and 3) resident in mainland Finland. The exclusion criteria were: 1) living in an institution, 2) residing outside Finland (including Åland Islands) and 3) mother tongue other than Finnish, Swedish or Sami. In 2011, the study was described to the potential participants as a 'gambling and health survey', and in 2015 as a 'gambling opinions and gambling survey'.
The data were obtained using computer-assisted telephone interviews. In 2011, a landline or mobile phone number was available for 11,129 respondents. An additional 120 phone numbers were determined by sending mail invitations to 4870 participants without a phone number. It turned out that 757 phone numbers were invalid. A further 1724 respondents could not be reached after a maximum of 10 attempts, while 4279 people refused to participate. Five respondents discontinued the interview after it had begun \[[@CR1]\]. In 2011, 4484 interviews were completed, giving a response rate of 40% of eligible subjects \[[@CR29]\].
In 2015 \[[@CR30]\], 103 persons in the gross sample were not eligible (dead, permanent disability or illness, living abroad, permanently institutionalized). The number of eligible subjects was 7297, and 4515 interviews were completed, giving a response rate of 62%. The reasons for the attrition of 1594 persons (22%) were that 1125 had no phone number, 469 could not be reached, 275 avoided contact with the interviewer, 896 refused to participate and 17 other reasons. In both datasets, the most under-represented age group were respondents aged 15--34, while the most over-represented age group were respondents aged 65--74 \[[@CR29], [@CR30]\]. In 2015, the male response rate (62.4%) was slightly higher than the female rate (61.4%) \[[@CR30]\]. Each interview lasted around 18 min. The data were weighted based on age, gender and region of residence (Northern, Eastern, Southern and Western Finland) in accordance with Statistics Finland's national population-based registers in 2011 and 2015 \[[@CR29], [@CR30]\].
Participants {#Sec3}
------------
Two demographic correlates were drawn from the population register: the respondent's sex (male, female) and age, which was recoded into seven groups (15--17, 18--24, 25--34, 35--44, 45--54, 55--64 and 65--74). In 2011 and 2015, there were 2367 (Mean 44.5; SD = 16.6 years) and 2210 (Mean 45.6; SD = 17.0 years) female respondents aged 15--74, respectively. The corresponding figures for men were 2117 (Mean 43.8; SD = 16.6 years) and 2305 (Mean 44.8; SD = 16.8 years).
Attitudes towards gambling {#Sec4}
--------------------------
Attitudes were measured with the 8-item version of the Attitudes Towards Gambling Scale (ATGS-8) \[[@CR4]\]. ATGS-8 items were scored using a Likert scale: 1 = "strongly agree", 2 = "agree", 3 = "neither agree nor disagree", 4 = "disagree" and 5 = "strongly disagree". Four items were reversely scored. The sum of items forms the total ATGS-8 score (range 8--40) where a score of 24 represents an overall neutral attitude towards gambling, while scores above 24 indicate a favourable (positive) and those below 24 an unfavourable (negative) attitude (Table [1](#Tab1){ref-type="table"}). In 2011, the Finnish version of ATGS-8 reached an alpha value of 0.71 and factor analysis supported the use of two factors \[[@CR1]\], which was consistent with findings based on the original 14-item instrument \[[@CR16]\]. In 2015, the ATGS-8 reached an alpha value of 0.73.Table 1Female and male attitudes towards gambling by age in 2011 and 2015FemalesMales2011\
Mean (95% CI)2015\
Mean (95% CI)F~(df)~\
\[p; *η* ^2^\]2011\
Mean (95% CI)2015\
Mean (95% CI)F~(df)~\
\[p; *η* ^2^\]All21.44\
(21.18--21.69)22.93\
(22.71--23.16)73.99~(1,\ 3978)~\
\[.001; .018\]23.97\
(23.72--24.23)25.22\
(24.99--25.45)50.81~(1,\ 4029)~\
\[.001; .012\]Age 15--17 years20.87 (19.66--22.08)21.32 (20.32--22.33)0.33~(1,\ 164)~\
\[.564; .000\]23.53 (22.07--24.98)23.32 (22.14--24.50)0.05~(1,\ 154)~\
\[.824; .000\] 18--24 years21.74 (21.06--22.43)22.55 (21.95--23.16)3.07~(1,\ 458)~\
\[.081; .007\]24.30 (23.64--24.95)25.86 (25.23--26.49)11.47~(1,\ 514)~\
\[.001; .021\] 25--34 years22.67 (22.07--23.27)24.28 (23.74--24.82)15.54 ~(1,\ 664)~\
\[≤.001; .023\]25.38 (24.79--25.97)26.40 (25.86--26.93)6.25~(1,\ 674)~\
\[.013; .009\] 35--44 years21.38 (20.75--22.01)23.53 (22.92--24.15)22.57 ~(1,\ 631)~\
\[≤.001; .035\]24.52 (23.91--25.13)25.82 (25.27--26.36)9.68~(1,\ 652)~\
\[.002; .014\] 45--54 years21.85 (21.24--22.47)23.30 (22.73--23.87)11.42 ~(1,\ 678)~\
\[.001; .017\]24.38 (23.82--24.94)25.21 (24.65--25.77)4.13~(1,\ 718)~\
\[.042; .006\] 55--64 years20.70 (20.13--21.28)22.41 (21.90--22.93)19.02 ~(1,\ 789)~\
\[≤.001; .024\]22.56 (21.98--23.15)24.77 (24.22--25.32)28.83 ~(1,\ 773)~\
\[≤.001; .035\] 65--74 years20.05 (19.32--20.78)22.02 (21.48--22.55)17.94 ~(1,\ 578)~\
\[≤.001; .030\]22.44 (21.67--23.21)23.85 (23.26--24.44)8.06~(1,\ 530)~\
\[.005; .015\]A one-way between-subject ANOVA (F-test) design for weighted data based on gender, age and region of residence; data in 2011 (*n* = 2367 females and *n* = 2117 males, non-weighted) and 2015 (*n* = 2210 females and *n* = 2305 males, non-weighted); 95% CI, 95% confidence intervals. Estimate of effect size (*η* ^2^ = eta-squared); The sum of 8 Attitudes Towards Gambling (ATGS-8) items (a Likert scale: 1 = "strongly agree", 2 = "agree", 3 = "neither agree or disagree", 4 = "disagree" and 5 = "strongly disagree", 4 reversed items) forms a total ATGS-8 score (range 8--40) \< where a score of 24 represents the overall neutral attitude towards gambling, while scores above 24 indicate favourable and those below 24 unfavourable attitudes
Gambling participation {#Sec5}
----------------------
Past-year gambling frequency (no gambling, less than monthly, 1--3 times/month, once a week, several times a week) and online gambling (yes/no) were examined using categorical variables.
Gambling-related harms {#Sec6}
----------------------
In 2011 and 2015 gambling-related harm was measured using PGSI \[[@CR32]\] and SOGS \[[@CR33], [@CR34]\], the strengths and limitations of which have been extensively reviewed in the literature (e.g. \[[@CR7], [@CR32]--[@CR37]\]). Responses to the 9 PGSI items were on a four-point scale (0 = never, 1 = sometimes, 2 = most of the time, 3 = almost always). For the purposes of this study, the PGSI items were recoded to indicate the presence of harm (yes = scores 1--3) or the absence of harm (no = score 0). Responses to the 20 SOGS items were on a two-point scale (0 = no, 1 = yes). Next, duplicate items were combined (answer 'yes' to either the PGSI or the corresponding SOGS item), which yielded a total of 16 different harms that were included in the analysis (Table [2](#Tab2){ref-type="table"}; items \#2, \#3, \#5, \#6). Furthermore, items related to borrowing money were combined into one (\#12). The sum of the score of harms (range 0--16) was recoded to indicate experiencing no harm (score = 0), one harm (score = 1) or two or more harms (score ≥ 2). Non-gamblers were separated into their own group. This type of classification has been used in previous studies \[[@CR25], [@CR28]\]. A 12-month time frame was adopted to reflect current harms.Table 2Percentage of respondents reporting gambling-related harms measured using PGSI and SOGS in 2011 and 2015FemalesMalesSource20112015*pϕ*20112015*pϕ*SOGS \#41. Gamble more than you intended to6.710.1≤.001.06015.217.0.123.024PGSI \#1 / SOGS \#12. Go back another day to win back money (chasing)5.15.1.944.00112.010.1.035−.033PGSI \#9 / SOGS \#63. Felt guilty2.86.4≤.001.0857.07.4.637.007PGSI \#44. Need to gamble with larger amounts of money to maintain excitement1.41.5.898.0034.84.8.943.001PGSI \#7 / SOGS \#55. People criticized your gambling1.41.2.496−.0113.63.3.616−.008PGSI \#2 / SOGS \#36. Feel you have a problem0.81.6.024.0353.44.4.117.025PGSI \#37. Betting more than can afford to lose1.31.7.315.0164.24.21.000.000SOGS \#78. Felt like you would like to stop gambling but didn't think you could1.22.4.004.0442.12.4.535.011SOGS \#29. Claimed to be winning money gambling but weren't really0.90.4.061−.0303.81.5≤.001.074SOGS \#910. Money arguments centred on gambling0.81.2.173.0221.31.5.975.005PGSI \#611. Gambling causing health problems0.50.4.667−.0071.62.0.427.014PGSI \#5 / SOGS \#12-2012. Borrowing money or selling something to finance gambling0.40.5.819.0071.00.7.185−.020PGSI \#813. Gambling causing financial problems0.20.4.588.0101.21.1.772.006SOGS \#1114. Lost time from work or school0.40.41.000.0000.80.91.000.002SOGS \#815. Hidden betting slips0.20.7.046.0330.70.8.604.009SOGS \#1016. Borrowed money and not paid them back0.20.5.221.0200.30.6.249.021Significance (*p*) between time is determined by Fisher's exact tests for weighted data based on gender, age and region of residence; Estimate of effect size (*ϕ* = phi coefficient); data in 2011 (*n* = 2367 females and *n* = 2117 males, non-weighted) and 2015 (*n* = 2210 females and *n* = 2305 males, non-weighted); *SOGS* the South Oaks Gambling Screen, *PGSI* the Problem Gambling Severity Index
Data analysis {#Sec7}
-------------
Two datasets were combined and a new variable reflecting the year was created. The data were analysed with SPSS version 22.0 (SPSS, Chicago, IL, USA). Before proceeding with the data analysis, variables were screened for possible outliers and statistical assumption violations with SPSS Frequencies, Explore and Plot procedures. We did not detect univariate outliers that were considered to require deletion. The estimates of skewness, kurtosis and normal probability plots did not indicate significant deviations from normality either \[[@CR38]\]. Mean differences were analysed by between-subjects ANOVA designs. Pearson's Chi-squared test and Fischer's exact test were used for categorical variables. All comparisons were performed for different age groups between times within genders. 95% confidence intervals (CI) were also estimated. In addition, eta-squared (*η* ^2^) was used for ANOVA's, and phi coefficient (*ϕ*) and Cramer's V (*ϕ* ~*C*~) for categorical variables to measure the strength of the examined associations. Thresholds for *η*2 were as follows: small (0.01), medium (0.06) and large (0.13) \[[@CR39]\].
Results {#Sec8}
=======
Attitudes towards gambling {#Sec9}
--------------------------
Overall, attitudes towards gambling became more positive among both women and men aged 18--74 (*F* = 73.99, *p* = .001, *η* ^2^ = .018; *F* = 50.81, *p* = .001, *η* ^2^ = .012, respectively) from 2011 to 2015 (Table [1](#Tab1){ref-type="table"}). In 2011, mean female ATGS-8 scores remained unfavourable (\<24) in all age groups (Fig. [1](#Fig1){ref-type="fig"}). However, the mean scores of women aged 25--34 showed a change towards favourable attitudes (\>24) in 2015. Female attitudes towards gambling were more positive in 2015 than in 2011 in all age groups (*p* ≤ .001, *η* ^2^ = .017--.035) except 15--17 and 18--24 (Table [1](#Tab1){ref-type="table"}). Among males, the mean scores of those aged 18--54 showed a favourable attitude in 2011, but in 2015 men aged 55--64 also had a positive attitude towards gambling (Fig. [1](#Fig1){ref-type="fig"}). Furthermore, male attitudes towards gambling became more positive (*p* ≤ .05, *η* ^2^ = .006--.035) in 2015 in all age groups except 15--17.Fig. 1Attitudes towards gambling (ATGS-8) by gender and age in 2011 and 2015
Past-year gambling participation {#Sec10}
--------------------------------
Past-year gambling frequency did not change statistically significantly from 2011 to 2015 among women aged 18--74. Among men, it did (*X* ^*2*^ = 17.272, df = 4, *p* = .002, *ϕ* = .064). There was an increase in the proportion of males who gambled 1--3 times a month (*p* ≤ .001). Women who gambled less often than monthly increased (*p* ≤ .005) in the age group 18--24, while non-gambling decreased (*p* = .009) among those aged 65--74 (Table [3](#Tab3){ref-type="table"}). Among males aged 15--17, both gambling once a week (*p* = .021) and several times a week decreased (*p* ≤ .001), while non-gambling decreased among those aged 18--24 (Table [4](#Tab4){ref-type="table"}). In the age groups 35--44 and 45--54, too, gambling several times a week decreased (*p* ≤ .05). Gambling 1--3 times a month increased in the latter age group (*p* ≤ .001).Table 3Past-year gambling participation and harms among females by age in 2011 and 2015 (% ± CI)15--1718--2425--3435--4445--5455--6465--742011\
(*n* = 64)2015\
(*n* = 83)2011\
(*n* = 228)2015\
(*n* = 172)2011\
(*n* = 278)2015\
(*n* = 328)2011\
(*n* = 335)2015\
(*n* = 305)2011\
(*n* = 447)2015\
(*n* = 359)2011\
(*n* = 564)2015\
(*n* = 491)2011\
(*n* = 451)2015\
(*n* = 472)Gambling frequency No gambling66.7 ± 11.671.9 ± 9.732.2 ± 6.127.0 ± 6.621.0 ± 4.821.6 ± 4.524.4 ± 4.624.1 ± 4.819.7 ± 3.722.0 ± 4.323.8 ± 3.518.3 ± 3.436.2 ± 4.426.4 ± 4.0 Less than monthly25.9 ± 10.720.8 ± 8.733.5 ± 6.142.2 ± 7.439.3 ± 5.739.3 ± 5.335.1 ± 5.136.7 ± 5.427.8 ± 4.230.6 ± 4.820.3 ± 3.325.2 ± 3.816.4 ± 3.418.5 ± 3.5 1--3 times/month4.9 ± 5.35.2 ± 4.823.4 ± 5.519.3 ± 5.924.9 ± 5.124.4 ± 4.720.9 ± 4.419.6 ± 4.519.5 ± 3.719.9 ± 4.119.6 ± 3.317.9 ± 3.49.3 ± 2.714.4 ± 3.2 Once a week1.2 ± 2.71.0 ± 2.16.7 ± 3.38.6 ± 4.211.7 ± 3.811.5 ± 3.517.4 ± 4.115.7 ± 4.127.0 ± 4.122.6 ± 4.429.4 ± 3.832.0 ± 4.132.8 ± 4.331.3 ± 4.2 Several times a week1.2 ± 2.71.0 ± 2.14.2 ± 2.62.9 ± 2.53.0 ± 2.03.1 ± 1.92.2 ± 1.63.9 ± 2.25.9 ± 2.24.8 ± 2.26.9 ± 2.16.6 ± 2.25.2 ± 2.19.4 ± 2.6Significance*X* ^*2*^ = .699, df = 4, *p* = .952, *ϕ* = .063*X* ^*2*^ = 5.677, df = 4, *p* = .225, *ϕ* = .108*X* ^*2*^ = .056, df = 4, *p* = 1.000, *ϕ* = .009*X* ^*2*^ = 2.120, df = 4, *p* = .714, *ϕ* = .056*X* ^*2*^ = 2.894, df = 4, *p* = .576, *ϕ* = .062*X* ^*2*^ = 6.065, df = 4, *p* = .194, *ϕ* = .084*X* ^*2*^ = 12.343, df = 4, *p* = .015, *ϕ* = .0.138 No gambling.513.232.853.928.470.053.009 Less than monthly.476.0501.000.688.420.104.531 1-3 times/month1.000.268.930.701.926.541.054 Once a week1.000.4951.000.603.174.416.734 Several times a week1.000.4691.000.267.520.893.052Online gambling Yes02.114.416.319.926.316.923.219.217.012.515.24.09.4Significance*p* = .549, *ϕ* = .084*p* = .603, *ϕ* = .027*p* = .056, *ϕ* = .076*p* = .051, *ϕ* = .079*p* = .499, *ϕ* = − .028*p* = .315, *ϕ* = .038*p* = .016, *ϕ* = .099Gambling harms^a^ No gambling66.7 ± 11.671.9 ± 9.732.2 ± 6.127.0 ± 6.621.0 ± 4.821.6 ± 4.524.4 ± 4.624.1 ± 4.819.7 ± 3.722.0 ± 4.323.8 ± 3.518.3 ± 3.436.2 ± 4.426.4 ± 4.0 No harms18.5 ± 9.517.5 ± 8.246.2 ± 6.542.9 ± 7.464.0 ± 5.658.4 ± 5.365.6 ± 5.165.1 ± 5.469.5 ± 4.362.3 ± 5.061.5 ± 4.064.5 ± 4.254.159.7 One harm9.9 ± 7.33.1 ± 3.713.0 ± 4.414.3 ± 5.210.8 ± 3.713.8 ± 3.78.2 ± 2.96.7 ± 2.87.6 ± 2.58.1 ± 2.89.5 ± 2.49.9 ± 2.67.18.1 ≥2 harms6.1 ± 5.97.2 ± 5.68.8 ± 3.715.1 ± 5.44.5 ± 2.45.9 ± 2.61.9 ± 1.54.2 ± 2.33.0 ± 1.67.3 ± 2.75.1 ± 1.86.8 ± 2.23.06.0Significance*X* ^*2*^ = 3.481, df = 3, *p* = .323, *ϕ* = .140*X* ^*2*^ = 5.586, df = 3, *p* = .134, *ϕ* = .108*X* ^*2*^ = 2.743, df = 3, *p* = .433, *ϕ* = .063*X* ^*2*^ = 3.373, df = 3, *p* = .338, *ϕ* = .071*X* ^*2*^ = 8.712, df = 3, *p* = .033, *ϕ* = .109*X* ^*2*^ = 4.444, df = 3, *p* = .217, *ϕ* = .072*X* ^*2*^ = 9.031, df = 3, *p* = .029, *ϕ* = .118 No gambling.513.232.853.928.470.053.009 No harms1.000.465.138.935.044.396.171 One harm.115.693.248.466.891.909.657 ≥2 harms1.000.036.494.119.012.319.092Data in 2011 (*n* = 2367, non-weighted) and 2015 (*n* = 2210, non-weighted); Significance (p) between time is determined by Chi-squared and Fisher's exact tests for weighted data based on gender, age and region of residence; Estimate of effect size (*ϕ* = phi coefficient/Cramer's V); ^a^Harms measured using 16 items from the South Oaks Gambling Screen and the Problem Gambling Severity Index; CI, 95% confidence intervals Table 4Past-year gambling participation and harms among males by age in 2011 and 2015 (% ± CI)15--1718--2425--3435--4445--5455--6465--742011\
(*n* = 75)2015\
(*n* = 82)2011\
(*n* = 233)2015\
(*n* = 227)2011\
(*n* = 252)2015\
(*n* = 306)2011\
(*n* = 253)2015\
(*n* = 368)2011\
(*n* = 369)2015\
(*n* = 415)2011\
(*n* = 512)2015\
(*n* = 480)2011\
(*n* = 423)2015\
(*n* = 427)Gambling frequency No gambling40.0 ± 11.152.3 ± 10.818.7 ± 5.011.5 ± 4.211.5 ± 3.911.0 ± 3.513.9 ± 4.310.2 ± 3.114.0 ± 3.511.0 ± 3.017.5 ± 3.315.9 ± 3.324.8 ± 4.121.4 ± 3.9 Less than monthly12.5 ± 7.518.6 ± 8.416.0 ± 4.716.7 ± 4.917.8 ± 4.720.4 ± 4.514.8 ± 4.420.2 ± 4.115.1 ± 3.716.4 ± 3.611.6 ± 2.812.0 ± 2.912.4 ± 3.110.6 ± 2.9 1-3 times/month11.3 ± 7.220.9 ± 8.833.5 ± 6.139.8 ± 6.430.5 ± 5.734.7 ± 5.326.5 ± 5.530.9 ± 4.717.8 ± 3.927.9 ± 4.317.5 ± 3.316.6 ± 3.312.0 ± 3.117.0 ± 3.6 Once a week20.0 ± 9.17.0 ± 5.520.2 ± 5.219.3 ± 5.126.7 ± 5.524.2 ± 4.829.7 ± 5.629.6 ± 4.736.1 ± 4.933.5 ± 4.538.4 ± 4.237.1 ± 4.338.0 ± 4.6334.9 ± 4.5 Several times a week16.3 ± 8.41.2 ± 2.411.7 ± 4.112.6 ± 4.313.5 ± 4.29.7 ± 3.315.1 ± 4.49.1±17.0 ± 3.811.3 ± 3.115.0 ± 3.118.4 ± 3.512.8 ± 3.216.1 ± 3.5Significance*X* ^*2*^ = 21. 221, df = 4, *p* ≤ .001, *ϕ* = .358*X* ^*2*^ = 6.109, df = 4, *p* = .191, *ϕ* = .108*X* ^*2*^ = 4.396, df = 4, *p* = .355, *ϕ* = .078*X* ^*2*^ = 10.922, df = 4, *p* = .027, *ϕ* = .127*X* ^*2*^ = 14.845, df = 4, *p* = .005, *ϕ* = .140*X* ^*2*^ = 1.996, df = 4, *p* = .736, *ϕ* = .049*X* ^*2*^ = 4.874, df = 4, *p* = .300, *ϕ* = .092 No gambling.122.028.906.156.579.363.066 Less than monthly.292.906.395.070.691.915.505 1-3 times/month.098.148.234.204≤.001.783.121 Once a week.021.827.4421.000.447.722.427 Several times a weekp ≤ .001.790.129.018.028.197.339Online gambling Yes12.75.929.833.147.148.236.240.726.932.513.621.98.510.8Significance*p* = .239, *ϕ* = − .119*p* = .448, *ϕ* = .035*p* = .821, *ϕ* = .011*p* = .235, *ϕ* = .046*p* = .109, *ϕ* = .061*p* = .003, *ϕ* = .107*p* = .385, *ϕ* = .039Gambling harms^a^ No gambling40.0 ± 11.152.9 ± 10.818.7 ± 5.011.5 ± 4.211.5 ± 3.911.0 ± 3.513.8 ± 4.310.2 ± 3.114.0 ± 3.511.0 ± 3.017.4 ± 3.315.9 ± 3.324.8 ± 4.121.4 ± 3.9 No harms21.0 ± 9.230.6 ± 10.033.5 ± 6.142.2 ± 6.454.2 ± 6.250.7 ± 5.663.0 ± 6.060.8 ± 5.060.9 ± 5.065.4 ± 4.661.2 ± 4.260.4 ± 2.460.3 ± 4.763.6 ± 4.6 One harm12.5 ± 7.54.7 ± 4.624.9 ± 5.623.8 ± 5.515.5 ± 4.519.4 ± 4.411.9 ± 4.015.6 ± 3.713.0 ± 3.415.1 ± 3.414.0 ± 3.014.7 ± 3.210.2 ± 2.97.3 ± 2.5 ≥2 harms26.3 ± 10.010.6 ± 6.723.0 ± 5.422.2 ± 5.418.9 ± 4.818.8 ± 4.411.3 ± 3.913.3 ± 3.511.9 ± 3.38.5 ± 2.77.6 ± 2.38.8 ± 2.55.1 ± 2.17.3 ± 2.5Significance*X* ^*2*^ = 11.359, df = 3, *p* = .010, *ϕ* = .263*X* ^*2*^ = 7.317, df = 3, *p* = .062, *ϕ* = .118*X* ^*2*^ = 2.034, df = 3, *p* = .565, *ϕ* = .053*X* ^*2*^ = 4.077, df = 3, *p* = .253, *ϕ* = .077*X* ^*2*^ = 4.780, df = 3, *p* = .189, *ϕ* = .079*X* ^*2*^ = 0.732, df = 3, *p* = .866, *ϕ* = .030*X* ^*2*^ = 3.378, df = 3, *p* = .337, *ϕ* = .077 No gambling.122.028.906.156.579.364.072 No harms.215.039.371.580.229.832.431 One harm.095.839.171.183.406.844.227 ≥2 harms.014.9171.000.484.120.615.387Data in 2011 (*n* = 2117, non-weighted) and 2015 (*n* = 2305, non-weighted); Significance (p) between time is determined by Chi-squared and Fisher's exact tests for weighted data based on gender, age and region of residence; Estimate of effect size (*ϕ* = phi coefficient/Cramer's V); ^a^Harms measured using 16 items from the South Oaks Gambling Screen and the Problem Gambling Severity Index; CI, 95% confidence intervals
Overall, past-year online gambling increased from 14.7 to 17.1% among females (*p* = .040) and from 27.2 to 30.1% among males (*p* = .036) between 2011 and 2015. However, a statistically significant increase in online gambling was only seen among women aged 65--74 (*p* = .016; Table [3](#Tab3){ref-type="table"}) and men aged 55--64 (*p* = .003; Table [4](#Tab4){ref-type="table"}).
Past-year gambling-related harms {#Sec11}
--------------------------------
Past-year gambling-related harm increased among women aged 18--74 (*X* ^*2*^ = 17.391, df = 3, *p* ≤ .001). In 2011, 9.2% of female respondents experienced a single harm and 4.3% experienced two or more harms. These figures were higher in 2015: 9.7% experienced a single harm and 7.1% experienced two or more harms. In 2011, 14.6% of males experienced one harm and 13.3% two or more harms. The figures in 2015 were 15.3 and 12.6%. The differences were not statistically significant for males.
"Gambling more than one intended to", "chasing losses" and "feeling guilty" were the three most common harms in both genders (Table [2](#Tab2){ref-type="table"}). The proportion of females who endorsed the items "gambling more than one intended to", "feeling guilty, "feeling that one has a gambling problem", "feeling like you would like to stop gambling, but didn't think you could", "hiding betting slips", all increased between 2011 and 2015 (*p* ≤ .005). However, the proportion of males who endorsed the items "chasing losses" and "claiming to be winning money gambling, but weren't really", decreased (*p* ≤ .005).
Age group analyses showed that the proportion of two or more harms increased among women aged 18--24 and 45--54 between 2011 and 2015 (*p* ≤ .005; Table [3](#Tab3){ref-type="table"}). Among males, the proportion of two or more harms decreased among those aged 15--17 (*p* = .014), and the proportion of those aged 18--24 without any harms increased (*p* = .039) (Table [3](#Tab3){ref-type="table"}). Further analysis of the 2015 data showed that "gambling more than one intended to" was the most common harm in all age groups and for both genders. However, "feeling guilty" was the second most common harm among all female age groups and among men aged 65--74, whereas "chasing losses" was the second most common harm for the other male age groups.
Discussion {#Sec12}
==========
Attitudes towards gambling became significantly more positive in Finland from 2011 to 2015. Female attitudes, though, were still unfavourable: only women aged 25--34 took a positive view on gambling in 2015. Men aged 18--54 had a generally positive attitude in 2011, and by 2015 the age group 55--64 also took a positive view. Overall these results show a clear tendency towards more favourable gambling attitudes and towards a narrowing of gender differences -- a major departure from earlier results in Finland, and from results in the UK and Australia \[[@CR1], [@CR3], [@CR4], [@CR16], [@CR40]\].
The exceptionally positive attitudes that we found in comparison with the UK and Australia are probably explained by a complex interplay of several factors, such as gambling environment, gambling exposure, gambling types and gambling resources \[[@CR41]\]. Perhaps most importantly, the gambling environment in Finland is one controlled by a government monopoly, which feeds back most of the profits from gambling operations to promote the arts and sciences, youth work, health care, research projects and other good causes.
Another possible explanation for the change in attitudes is the increased public exposure to gambling during the past decade \[[@CR42], [@CR43]\]. Today, there are some 20,000 EGMs in supermarkets, kiosks and petrol stations, and even pharmacies and hospital cafeterias across Finland. More work is needed to establish whether this kind of gambling exposure, and particularly the high density of EGMs that is a known risk factor for gambling-related harms \[[@CR44], [@CR45]\], have influenced public attitudes.
People in Finland are also exposed to gambling through marketing campaigns in which gambling operators are keen to emphasise that profits from gaming are used for good causes: "Gambling for the public good", as one of the slogans says. This has been going on for decades and may well go a long way towards explaining the overall positive attitudes. The liberalisation and normalisation of gambling in general may also be conducive to more positive attitudes towards gambling. In general, in 2011 people in Finland tended to express their views more strongly than was in 2010 the case in the UK \[[@CR3]\]. This may reflect a greater familiarity with the main ATGS-8 arguments, and could also be a result of the livelier public discussion and debate around gambling \[[@CR2], [@CR3]\].
Gambling frequency remained largely unchanged despite the change in attitudes, yet significant changes were observed within age groups. In a bid to protect young people from potential gambling-related harms, the Finnish government raised the gambling age limit from 15 to 18 years in 2010--2011. This immediately brought a reduction in the prevalence of gambling and problem gambling \[[@CR18], [@CR29], [@CR46]\]. Our results show that under-age male weekly gambling continued to fall in 2011--2015. Furthermore, under-age female and male attitudes towards gambling remained unchanged, which may also be attributable to the law change.
The prevalence of problem gambling is typically highest among young males \[[@CR7], [@CR8], [@CR30]\]. In 2007--2011, regular gambling in the age group 18--24 seemed to be decreasing \[[@CR46]\]. Therefore, the changes we observed in this age group in 2011--2015 were somewhat surprising. That is, occasional gambling increased among women aged 18--24, and they also experienced more harm. This may help to explain why their attitudes did not become more positive: as was discussed earlier, experiences of gambling-related harm predict more negative attitudes \[[@CR1], [@CR16], [@CR30]\]. Furthermore, gambling increased among men in this same age group. The results imply that as people reach legal gambling age, their experimentation with gambling seems to increase. Further efforts are needed to step up protection, prevention and harm reduction interventions among young people.
In older age groups, frequent gambling decreased among women aged 35--44 and 45--54, and occasional gambling increased in the latter age group. This latter trend was already seen in 2007--2011 \[[@CR18], [@CR46]\]. In 2015, women aged 45--54 experienced more harms than before. In addition, both land and online gambling increased among women aged 65--74. Previous studies indicate that older adults (50 or over) gamble less than younger adults \[[@CR47]\]. On the other hand, older age brings several vulnerabilities: poor social adjustment and stressful life events, such as retirement and widowhood \[[@CR48]\], physical, emotional and mental health issues \[[@CR48], [@CR49]\] and lack of support from social networks \[[@CR50]\]. There is also evidence that neurobiological changes may increase gambling \[[@CR51]\].
The growth of female gambling seems to be a fairly universal phenomenon \[[@CR7], [@CR52], [@CR53]\]. There are indications that women are also more likely than men to be influenced by gambling advertisements and to play free games \[[@CR54]\]. In Finland, the monopoly gambling operators have recently launched a range of female-friendly online games and so contributed to the gambling industry's push to get larger numbers of older women to play online \[[@CR55]\].
Women have been reported to regard the online internet platform as a safe place to gamble \[[@CR56]\]. Online gambling is typically considered a domain of the younger male generation \[[@CR57]\], but we found that it has also increased among men aged 55--64. This may reflect the growing interest in all age groups in limitless internet access through computers, mobiles, tablets and other wireless devices \[[@CR58]\]. Statistics Finland data show that from 2011 to 2015, the proportion of internet users in Finland increased from 81 to 90% in the age group 55--64 and from 53 to 69% in the age group 65--74 \[[@CR59]\].
The literature on older individuals' online gambling as well as on gender differences in online gambling is scarce \[[@CR60]\]. In general, we know that females tend to favour non-skill games such as slot machines and bingo \[[@CR61]\]. These games are continuous forms of gambling in which the interval between betting and its outcome is very short and which enabled rapid and repeated gambling within a very short period of time \[[@CR62], [@CR63]\]. It has been argued that some older women begin to gamble more as their gendered caring role decreases \[[@CR64]\]. It is clear that more research is needed into older individuals' increased online gambling and into their motivations to gamble.
TPB provides one possible explanation for the trends we observed in Finnish women's attitudes and participation in gambling \[[@CR13], [@CR14]\]. The theory suggests that the particular intention to gamble is influenced by positive attitudes (i.e. the perceived favourability of the outcome) and social norms (i.e. how a particular behaviour is approved by other people) \[[@CR6]\]. TPB cannot, however, explain the trends seen among Finnish men: even though their attitudes became more positive, there was no change in their gambling participation or experienced gambling-related harms. As favourable attitudes towards gambling are associated with more frequent gambling, they may be considered a risk factor for gambling problems \[[@CR3]\].
The question raised by the findings of our study is this: Have men in Finland now reached the point where the excitement and novelty value of gambling has begun to fade? Has male gambling reached saturation point at the same time as women are just beginning to join the bandwagon? Or is the growth of permissive attitudes an indication of an increased prevalence and intensity of gambling, as proposed by the total consumption model \[[@CR65]\], a trend that will eventually lead to the normalisation of excessive gambling, especially among women? The potential feminisation of gambling should be recognised as a serious concern: women tend to start gambling later on in life, and gambling therefore develops into a problem more rapidly than in the case of men \[[@CR66]\]. We need to continue to explore these potential gender-specific and socio-cultural connections.
In both males and females the three most common gambling-related harms in our study were "gambling more than one intended to", "chasing losses" and "feeling guilty". This is consistent with the findings of a previous Finnish study \[[@CR25]\], which reported no gender differences in harm profiles. The harms that increased among the females in our study highlight the negative consequences to the individual gambler, such as "feeling that one has a gambling problem" and "feeling like you would like to stop gambling, but didn't think you could". In males, by contrast, both harm to the gambler himself and harm caused to others decreased.
It is noteworthy that SOGS and PGSI items measuring guilt and lending money produced quite widely differing results. Based on SOGS, 6.2% of the respondents reported feelings of guilt, while the corresponding PGSI figure was only 2.4% \[[@CR30]\]. Furthermore, SOGS showed a slightly higher proportion lending money than PGSI (0.6% vs. 0.4%). In the questionnaire, the SOGS questions came before the PGSI items. The use of both PGSI and SOGS items allowed us to examine gambling-related harms more extensively than earlier studies in this field.
The conceptual framework of harmful gambling recently proposed by Browne et al. \[[@CR67], [@CR68]\] lists a broader range of gambling-related harms for gamblers, their significant others and the wider community. These dimensions of harm are: 1) financial harms, 2) relationship disruption, conflict or breakdown, 3) emotional or psychological distress, 4) detriment to health, 5) cultural harms, 6) reduced performance at work or study and 7) criminal activity \[[@CR66], [@CR67]\]. Furthermore, the framework identifies three temporal dimensions of experiencing harm: 1) general harm, 2) legacy and 3) crisis. General harm may occur at any point in time after engaging in gambling, while 'legacy harm' continues after the person's gambling has stopped. Harms labelled as 'crisis', especially financial harms, typically trigger the motivation to seek help/treatment. Evidence from four countries indicates that player loss-risk curves for total gambling expenditure (losses) are likely to be linear or r-shaped \[[@CR26]\]. More research is also needed on gambling expenditure and gamblers' income \[[@CR67]\], since it has been reported that gambling expenditure predicts gambling-related harm \[[@CR26]\], and spending excessive amounts of money on gambling represents a risk factor for a variety of health outcomes \[[@CR69]\].
Study limitations {#Sec13}
-----------------
Our 2011 and 2015 datasets were collected by different organisations: the first by market research company Taloustutkimus, and the second by Statistics Finland. This may explain the differences in the response rates, which were below the national average in the first survey and over the average in the second. This adversely affects the comparability of our results \[[@CR7]\]. Typically, high response rates in population studies tend to increase the proportion of infrequent gamblers \[[@CR7], [@CR70]\]. This may well have impacted our results, but it certainly cannot exhaustively explain the substantial shift observed towards more positive attitudes. Furthermore, although our sample sizes overall were quite large, the various subgroups were relatively small and therefore interpretations must be made with caution, especially in the age group 15--17. Many of the estimates we presented were not robust, since they were smaller than the lengths of the corresponding CIs. Overall, the effect sizes of the results were small to medium, implying that even though there were statistically significant group differences, the magnitude of these differences was not notable \[[@CR38]\]. Our comparisons in this study were between two time points only, which is an obvious limitation, but on the other hand both studies were fairly similar in terms of methodology. Finally, we used PGSI and SOGS for purposes for which they were not originally intended. Nonetheless it is possible that the respondents may have experienced harms not measured by these instruments.
Conclusions {#Sec14}
===========
With the exception of females aged 15--24 and males aged 15--18, attitudes towards gambling became more positive among Finnish women and men from 2011 to 2015. During this period, gambling participation increased most noticeably among females. Our findings for 2015 show for the first time an increase in gambling-related harm among females in Finland.
More research is needed on gambling and gamblers, especially women's gambling motivations. Specific focus must be given to gambling-related harm and gambling-related factors, such as the gambling environment, gambling exposure and gambling types. This is crucial to developing more effective policy measures and to improving gambler protection, prevention and harm reduction efforts.
ATGS-8
: the 8-item version of the Attitudes Towards Gambling Scale
EGM
: Electronic gaming machine
PGSI
: Problem Gambling Severity Index
SOGS
: South Oaks Gambling Screen
TPB
: Theory of planned behaviour
The authors wish to thank Research Manager Susanna Raisamo from the National Institute for Health and Welfare, Finland, for her valuable comments on the manuscript. We also wish to express our gratitude to David Kivinen for revising the language.
Funding {#FPar1}
=======
This study was funded by the Ministry of Social Affairs and Health, Helsinki, Finland (appropriation under section 52 of the Lotteries Act). However, it had no role in the study design, data analysis, data interpretation or in preparing the manuscript.
Availability of data and materials {#FPar2}
==================================
The Finnish gambling 2015 dataset is available from the Finnish Social Science Data Archive (<http://www.fsd.uta.fi/en/>).
Authors' contributions {#FPar3}
======================
AHS, HA and SC were responsible for the study conception and design; AHS and SC conducted literature searches and provided summaries of previous research studies. AHS performed the analysis; AHS and SC were responsible for data interpretation and manuscript preparation; HA made critical revisions to the paper for important intellectual content; all authors read and approved the final version.
Competing interests {#FPar4}
===================
The authors do not hold any position, receive ongoing or significant funding, and are not engaged in any business or with any organization that creates a real or perceived conflict of interest in their work on this manuscript.
Consent for publication {#FPar5}
=======================
Not applicable.
Ethics approval and consent to participate {#FPar6}
==========================================
The research protocols were approved by the Ethics Committee of the National Institute for Health and Welfare, Finland (Statements: 6/2011§350 − 361; 10/2011§404 − 418; THL/1122/6.02.01/2014). Potential participants received written and verbal information about the study and the principles of voluntary participation. Verbal informed consent was obtained from all participants.
| 2023-08-25T01:27:17.760571 | https://example.com/article/9175 |
Nicolas Cage will star in the independent action movie “Primal” as a big-game hunter. Production is scheduled to start on Oct. 23 in Puerto Rico.
The project was unveiled Tuesday at the Toronto Film Festival, where the Exchange is launching international sales.
“Primal” is the first project for Wonderfilm Media, launched by Kirk Shaw, Daniel Grodnik, Jeff Bowler, and Bret Saxon as a finance, development, and production entity based in Vancouver and Beverly Hills. Grodnik, who has credits on “Heist” and “Bobby,” is producing and Michael Becker is executive producing.
The film will be directed by Nick Powell, who is a veteran stunt coordinator with credits on “The Bourne Identity,” “X-Men: The Last Stand,” and “Resident Evil.”
The script, written by Richard Leder, centers on a big-game hunter for zoos who has booked passage on a Greek shipping freighter with a fresh haul of exotic and deadly animals from the Amazon, including a rare white Jaguar — along with a political assassin being extradited to the U.S in secret. Two days into the journey, the assassin escapes and releases the captive animals, throwing the ship into chaos.
Cage stars with Selma Blair in “Mom and Dad,” portraying parents who inexplicably attack their children in the independent thriller. “Mom and Dad” premiered on Sept. 10 at the Midnight Madness section of the Toronto Film Festival.
Cage is represented by CAA, Link Entertainment and attorneys Jake Bloom and Patrick Knapp at Bloom Hergott and Diemer. | 2024-03-05T01:27:17.760571 | https://example.com/article/2142 |
N-heterocyclic silylene
[[File:DENK1994margin.svg|alt=|thumb|[tBu-N-CH=CH-tBuN]Si: (N,N-Di-tert-butyl-1,3-diaza-2-silacyclopent-4-en-2-ylidene) The first stable NHSi.]]
An N-Heterocyclic Silylene (NHSi)''' is an uncharged heterocyclic chemical compound consisting of a divalent silicon atom bonded to two nitrogen atoms. The isolation of the first stable NHSi, also the first stable dicoordinate silicon compound, was reported in 1994 by Michael Denk and Robert West three years after Anthony Arduengo first isolated an N-heterocyclic carbene, the lighter congener of NHSis. Since their first isolation, NHSis have been synthesized and studied with both saturated and unsaturated central rings ranging in size from 4 to 6 atoms. The stability of NHSis, especially 6π aromatic unsaturated five-membered examples, make them useful systems to study the structure and reactivity of silylenes and low-valent main group elements in general. Though not used outside of academic settings, complexes containing NHSis are known to be competent catalysts for industrially important reactions. This article focuses on the properties and reactivity of five-membered NHSis.
Synthesis and stability
Five-membered N-heterocyclic silylenes are synthesized from two-carbon diimine or diamine precursors. Reaction with metallic lithium yields a lithiated diimide or diamine that when stirred with tetravalent SiCl4 yields a tetravalent dichlorosilicocycle. The compound then is reduced with an alkali metal, or potassium graphite to reveal a divalent silicon center. Care must be taken to not over reduce the silicon; often triethylamine is added to prevent over reduction. The yield for this reduction can be as high as 80%. N-heterocyclic silylenes containing Silicon(II) with four-membered rings (1 carbon) and six-membered rings (3 carbons) are well known and derived from the reactions of SiX4 with amidinate and NacNac ligands respectively.
The silylenes synthesized prior to West and Denk's first NHSi decomposed at temperatures below 77K. Alternatively, the original West/Denk NHSi [tBuN-CH=CH-tBuN]Si is exceptionally stable even after heating for 4 months at 150 °C dissolved in toluene in a sealed NMR tube. It is also unreactive with Lewis bases and triethylsilane a silylene scavengers, but it does react with air and water (see below) and decomposes at its melting point 220 °C. On the other hand, the saturated NHSi with no backbone substitutions, [tBuN-CH2CH2-tBuN]Si:, is far more reactive as a Lewis acid and far less stable, decomposing at 25 °C.
Structure and aromaticity
Structure
Five-membered NHSis can be classified by the bonding in the two-carbon backbone of their rings. Saturated NHSis have two methylene units, the unsaturated have doubly-bonded methine carbons, and the benzo-fused NHSis share their carbon backbone with a fused aromatic ring. Though other N substituents such as aryl groups are also well known, in general, studies are conducted with tert-butyl groups bonded the nitrogen of the saturated and unsaturated NHSis, while the benzo-fused have neopentyl groups.
X-ray crystallography and electron diffraction show significant differences between the saturated and unsaturated structures. The N-Si-N angle for the saturated tert-butyl substituted NHSi is 92°, slightly puckering C2 symmetric ring. The N-Si-N angle of the unsaturated analog is 90.5° (gas phase XRD) achieving a planar C2v ring. Upon saturation of the carbon backbone, the N-Si bonds shorten from 175.3pm to 171.9pm, shorter distances than would be expected for a single bond between nitrogen and divalent silicon. The longer bond in the unsaturated molecule is due to the nitrogens' lone pair electrons delocalization through the carbon π-bond, resulting in lower Lewis basicity of the nitrogen lone pairs toward the silicon, weakening and lengthening the N-Si bond. The overall silylene character is supported by strong downfield shifting in 29Si NMR at +78.3ppm for the unsaturated at +119ppm for the NHSis compared to their tetravalent dichloride starting materials which resonate at -40.7ppm.
Aromaticity
The structural differences, distinct reactivity, and increased stability of the unsaturated ring is attributed the olefinic C=C bond which creates a 6π aromatic ring with the two nitrogen lone pairs. The Si-N bond length discrepancy mentioned above is a strong indication of π delocalization. In proton NMR the vinylic protons resonate at 6.75ppm for [tBuN-CH=CH-tBuN]Si: versus 5.73ppm for the tetravalent dichloride starting material or 6.00ppm for the tetravalent NHSi-H2 dihydride. In the tetravalent species, the lack of the silicon's empty 3p orbital breaks the π ring, causing an upfield shift as the deshielding due to aromatic ring current is lost. Additionally there are significant discrepancies in the Raman spectroscopy signals between the unsaturated NHSi and tetravalent silicon analogues, such as NHSi-Cl2 and sprio-[tBuN-CH=CH-tBuN]2Si. The four-coordinate silanes exhibit C=C stretches at 1620 cm−1. Conversely [tBuN-CH=CH-tBuN]Si:'s C=C resonance is found bifurcated at 1566 cm−1 and 1573 cm−1 at a much greater intensity. In the divalent species, electron density is shifted out of the C=C bond into the ring and empty Si 3p orbital, weakening the C=C bond and causing the observed energy drop and shape change in the C=C resonance.Several computational studies suggest aromatic delocalization over the unsaturated NHSi rings. DFT calculations of NHSi-phosphonyl radical adducts show far greater radical electron delocalization over the rings of unsaturated NHSis (14% Si, 65% ring) than the saturated NHSi (58% Si, 19% ring). Aromaticity is further supported by calculated heats of hydrogenation. At the MP4/6-31G*//6-31G* level, hydrogenation at the carbon backbone of an unsaturated divalent silicon NHSi is 13 kcal/mole more exothermic than the corresponding hydrogenation of the tetracoordinate-silane analog. The stabilization of the divalent silicon ring, with an empty 3p orbital and in-ring lone pair, versus the tetravalent silane which lacks an empty Si 3p orbital indicates significant electronic communication between the silicon and the olefinic carbons. Additionally, calculations of Nuclear Independent Chemical Shift of the ring-centered NMR resonances of [HN-CH=CH-NH]Si: at -10.2ppm indicate a high degree of delocalization about the unsaturated NHSi ring. In reference to the perfectly aromatic cyclopentadienyl anion's shift at -14.3ppm, NICS data supports the aromaticity of NHSis.
Electronics
Computational studies and photoelectron spectroscopy create a more nuanced picture of electronic structure and π-electron sharing in NHSis. Relevant π bonding orbitals in unsaturated five-membered NHSis can be understood as the molecular orbital mixing of the diimine backbone's butadiene-like pi orbitals and the 3s and 3p orbitals of Si. Photoelectron Spectra of the unsaturated [tBuN-CH=CH-tBuN]Si: show a HOMO with three peaks at -6.96eV, -7.13eV & -7.28eV, assigned the in-phase overlap of the Si 3py orbital and butadiene-like π3 of the diimine. The HOMO in the tetravalent Si-hydrogenated analog lacks a vacant Si 3py orbital and the energy of the π3 is destabilized to -6.56 eV, supporting charge donation from N to Si in the silylene. The HOMO-1 is the in-plane Si lone pair involved in σ donation. No difference is calculated between the HOMO-2 for the unsaturated silylene compared to the corresponding orbital of the silane analog. The original 1994 Denk at al. photoelectron spectroscopy communication relates this orbital to the π2 diimine orbital, however a 1996 paper from Blakeman et al. designates this as the nitrogen lone pairs. Either way, both orbital assignments are symmetrically forbidden from overlapping with any Si orbital. The HOMO-2 does not change in energy upon hydrogenation at Si indicating that much of the overall electronics are unchanged by hydrogenation and underscoring the effects of N to Si electron π-donation in the HOMO and HOMO-3. Calculations in the former study at the MP4 6-31G* level showed increased energy level spacing for N-H model compounds (instead of N-tBu), but with the same order and proportional spacing. The Blakeman study compared the benzo-fused NHSi to the ethylene-like unsaturated NHSi, and found by PES that the HOMO is lower by .36eV and the Si lone pair by .34 eV in the benzo-fused NHSi, suggesting the electron withdrawing power of the phenylene ring makes the benzo-fused NHSi less nucleophilic.
The above table show orbitals, labeled above by occupation and grouped horizontally based on symmetry orbital parentage. They are reproductions of calculations performed in Denk, Green et al.1994 and Blakeman et al.. Experimental energies are from PES of original West/Denk-like tert-butyl NHSis, calculated energies are from N,N' hydride-like NHSi shown in MO graphic. (LUMO energies and symmetries were not provided.)
Natural Bond Orbital analysis of [HN-CH=CH-NH]Si: provides strong theoretical evidence of π electron delocalization. NBO calculations indicate a population of 0.54 electrons in the formally vacant Si 3py orbital (1.2 electrons would be expected in a pure 6 π-electron 5 atom ring). The saturated silylene has lower electron delocalization over the heteroallylic N-Si-N system with only 0.33 electrons on Si (versus 1.33 for perfect 4 electron shared among 3 atoms). No difference in charge sharing is seen in the σ-bond interaction between Si and N of each NHSi, this is also the case with NHCs. In spite of identical Si-N σ bonding, the unsaturated silylene has a lower charge separation in its Si-N bond than the saturated analog: for the unsaturated analog, Si has a charge of +0.87 and each N -1.00, while the saturated has a charge of +1.05 on Si and -1.12 on N. These data show that the stabilization and bond difference between the backbone types is entirely due to π interactions. For comparison, in an analogous way, germylenes have a charge near +1 at the germanium while cabenes have close to no net charge on the carbenic carbon. Calculations show, upon coordination to Group 11 metal chlorides (e.g. NHSi-CuCl) Si 3py density, N-Si bond density, and Si atom charge all increase. The change is the result of Si's sigma donation to the metal, which causes the Si 3p orbital to draw electron density from the ring. In this manuscript they calculate CuCl and AgCl back-donation to Si to be about 4.5 weaker than the σ interaction. Interestingly, for all three Group 11 metals, the NHSi in question is a better σ donor and π acceptor than its germylene and carbene analogs.
Atoms in Molecules bond energy at critical point calculations show that the N to Si bonds in an NHSi are significantly ionic, unlike the highly covalent N-C bond in an NHC. Furthermore, the charge density and the Laplacian (∇2) at the bond critical points between the silylene and carbene are dissimilar. Silylenes have much lower charge density between Si and N, with a positive Laplacian from Si to N indicating a more ionic interaction, while the Laplacian is negative going from carbon to nitrogen in an NHC indicating a more covalent bond. Upon coordination to a Group 11 metal the covalent character in the Si or C to metal bond is small, but not insignificant, again with a higher covalent character in the carbenic system. Similarly, silicon has a higher Laplacian between it and the group 11 metals than does carbon, indicating a less covalent metal interaction in silyenes as compared to carbenes.
Main group reactivity
N-heterocyclic silylenes react with a wide variety of main group compounds, generally adding across unsaturated bonds or inserting into single bonds to yield tetravalent N-heterocyclic silanes.
Tetramerization
In concentrated solutions, the saturated unsubstituted silylene [tBuN-CH2CH2-tBuN]Si: reacts with itself to form a tetramer with a Si-Si double bond. First one NHSi inserts its divalent silicon into another's N-Si bond, creating a bicyclic molecule with a tetravalent silicon bonded to a divalent silylene. The mixed-valent dimer then itself dimerizes, forming a four-silicon silene with 229 pm Si=Si double bond. Though exceptionally long, the bond order is supported by Raman spectroscopy. Reacting the tetramer with methanol results in the mixed valent-dimer-methanol adduct and not the silene-dimer adduct (see below). Additionally a double bond between tert-butyl substituted NHSis is calculated to not be stable, further corroborating the identity of the mixed valent dimer as the intermediate. Unsaturated and backbone-substituted saturated NHSis such as the 4,5 dimethyl [tBuN-CHMeCHMe-tBuN]Si: are not reactive in this way and as remain monomers. Similarly, the unsubstituted NHSis will react with analogous N heterocyclic germylenes, ultimately forming a silicon-flanked germene.
Reactions with chalcogens
Reacting NHSis with oxygen strips the diimine backbone, and produces solid silicon dioxide, likely through a two NHSi dioxo-bridged intermediate. Reactions with 1 equivalent of S8 yields a dithio-bridged two NHSi complex. The formation of the dithio dimer occurs through an intermediate attributed to a thiosilylone, with a Si-S double bond. Excess sulfur yields a repeating NHSi(S2)(SiS2)nNHSi oligomer with complimentary diimine loss. The analogous reaction with selenium is far slower, but yields the dieselnium bridged di-NHSi exclusively.
Reactions with σ bonds
NHSis insert into σ bonds to form terminal silane-like products, NHSi-NHSi disalane bridges, or oxo-bridged NHSi siloxanes. Alcohols react with Si(II) to form exclusively the silyl ether. With water, two NHSis will insert to each of the O-H bonds to form a siloxane. A more varied reactivity is seen with haloalkanes. NHSis insert directly into the C-I bond of iodomethane. Alternatively, when saturated or unsaturated NHSis are reacted with dichloromethane, chloroform, or carbon tetrachloride, the silicon centers of two NHSis form a bond, with one halide adding to one silicon and the remaining organic fragment adding to the other. Other halocarbons will yield a mixture of mono and disilane products. The resulting mixture of products as well as computational studies indicate that a free radical mechanism brings about these products, with the radical pathway being 16 to 23 kcal/mol lower in energy than concerted mechanisms. Upon heating, the disalanes either disproportionate to an NHSilane and NHSilylene, or form a one-carbon bridge between two NHSi-X fragments in a vein similar to water's reactivity. In the presence of silicon tetrachloride, benzo-fused NHSis will insert between two Si-Cl bonds to form a trisilane.
Reactions with π bonds
Generally, when reacting with unsaturated species an NHSi will add across a double or triple bond to form a spirocyclic compound, containing one or two equivalents of NHSi-derived silicon. Alkenes and alkynes react with NHSis only if their C-C bond is highly polarized such as is the case with phenyltrimethylsilylacetylene, which produces a silicocyclopropene with one NHSi equivalent or a disilicocyclobutene with two. With ketones two equivalents of benzo-fused NHSi react to form disilyloxetanes as well as further reaction products depending on the carbon substituents.
Dienes, as well as heterodienes including benzil or the common NHSi backbone N,N'-diterbutyl-1,4diazabutadiene ([tBuN-CH=CH-tBuN]) react in a [4+1] fashion to yield molecules with two five-membered rings sharing a single silicon atom.
Imines do not form simple cyclic silylene additions: benzo-fused NHSis react with the diimine and ortho carbons of N-tert-butyl phenylimine to form a five-membered ring composed of the NHSi silicon, one carbon and nitrogen of the imine and the ipso and para carbons of the phenyl group, through an intermediate that breaks the phenyl aromaticity.
NHSis add across nitrile C-N bonds, first forming a three-membered ring, subsequently a second NHSi inserts to complete a 4-membered ring, similar to the reactivity of a alkyne. Alternatively, tert-butyl isocyanide reacts more like an alkyl halide with a single silicon bonding to the tert-butyl fragment and the carbon of the cyanide groups, or with two NHSis to from an acyclic tBu-Si-Si-CN product. There is evidence that the single-silicon NHSi-nitrile interconverts in small quantities to the silicon isonitrile.
As a Lewis acid
N-heterocyclic silylenes are generally considered to be Lewis bases, though their reactivity can occasionally differ. With the Lewis acid tris(pentafluorophenyl)borane, the expected acid/base adduct forms, however, over long periods of time, the silicon will insert between a B-C bond, oxidizing the silyene to a silane. Additionally, in rare cases, an NHSi can act as a Lewis acid. Reaction of the N,N' dineopentyl beznofused NHSi with the analogous carbene, creates a long, highly polarized C-Si bond. The carbene carbon becomes a carbocation, remaining nearly planar, while the pyramidalized silicon adopts a negative charge.
Transition metal coordination
N-Heterocyclic silylenes as ligands
Though with less variety and fewer applications than their lighter analogues, the N-heterocyclic carbenes, N-heterocyclic silylenes are known to act as ligands in a range of metal complexes. Unlike most non-NHSi silylenes which are Lewis acidic, stable five-membered NHSis act almost exclusively as a Lewis bases or nucleophiles in a manner similar to NHCs and phosphine ligands. Both the saturated and unsaturated five-membered NHSis are calculated to have substantial singlet-triplet energy gaps, at 74 kcal/mol and 69 kcal/mol respectively for the hydride N-substituted models. As a result of the large energy gap, electron density is concentrated exclusively in the in-plane σ-donating Si lone pair while π donation from the ring stabilizes the formally vacant, slightly π-accepting Si pπ orbital. Though weak, as discussed above, NHSis do exhibit metal to Si 3p π-backbonding, as evidenced by the shortness of NHSi-metal bonds compared to standard metal-Si single bonds. In the complex [tBuN-CH=CH-tBuN]Si:-Fe(CO)4, the NHSi readily takes the place of strongly backbonding carbonyls. For the trigonal-bipyramidal iron, the NHSi adopts an equatorial position over axial, with shorter equatorial Fe-Si distance (2.196Å vs 2.237Å) due to better overlap of the empty acidic 3p orbital with the metal d orbitals at this position. Sterically, NHSis resemble NHCs, however, the tighter N-Si-N angle (c. 90°) and longer Si-N (c. 1.73Å) and Si-metal bond length compared to a carbene's N-C-N angle (c. 100°), C-N bond length (c. 1.37Å), and C-metal length means NHSi are less sterically demanding, leading to reactivity not seen in carbenes.
Transition metal complexes and reactivity
N-heterocyclic silylenes readily substitute carbonyl, cyclooctadiene, and phosphine ligands in metal complexes. Additionally, silylenes can react with metals by inserting between metal ligand bonds or by acting as a reducing agent. [tBuN-CH=CH-tBuN]Si: can form two distinct molybdocene adducts depending on molybdenum precursor. With Mo(Cp)2(PEt3) the phosphine is replaced, while with Mo(Cp)2H2 an NHSi inserts between a metal-hydride bond to form a tetravalent silane ligand. The orbitals of the triethylphosphine substitution product are unable to form π interaction as exhibited by a 29Si NMR signal of 139.3ppm which indicates silicenium (Si+) character, while the molybdosilane has a resonance at 43.6ppm.
As mentioned above, unsaturated NHSi reacts with Fe2(CO)9 to form both the axial and equatorial Fe(CO)4NHSi. Similarly, the same NHSi reacts with Ru3(CO)12 to form the axially trans-disubstituted Ru(CO)3(NHSi)2. Reaction of [tBuN-CH=CH-tBuN]Si: with Cp*Ru(MeCN)3OTf creates Cp*RuCl(MeCN)2(NHSi)OTf in high yield. Upon heating, two equivalents of Cp*RuCl(MeCN)2(NHSi)+ lose a total of 2 acetonitrile ligands and one NHSi to form a diruthenium complex where one RuCp* unit is coordinated by the NHSi in a η1 fashion, while the other Cp*Ru center is complexed in a η5 fashion by the 6 electron putatively aromatic surface formed by the unsaturated NHSi ring.
NiCl2(PPh3)2 reacts with 4 equivalents of benzo-fused NHSi to form Ni(NHSi)3(PPh3) while 5 equivalents are needed to produce the tetrakis NHSi complex. The extra NHSi equivalent is needed to reduce the Ni center, forming 1 equivalent of NHSiCl2 in the process. Both the saturated and unsaturated five-membered NHSis react with Pd(P(t-but)3)2, producing a two Pd complex with two terminal and two bridging NHSis. This unstable intermediate converts to a more stable complex with bridging silylenes and two terminal phosphines. Likewise, Pd(cod)2 starting materials are unable to produce Pd(NHSi)4, however, reduction of Pd(cod)Me2 with 6 equivalents of NHSi produces Pd[NHSiunsaturated)]3 or Pd[NHSisaturated]4. Pd[NHSiunsaturated)3 can also be produced by reacting Pd coordinated by just two N,N' tert-''butyl NHCs with 3 equivalents of NHSi. Two factors contribute to this difference: the greater stearic bulk of the NHC makes Pd able to accommodate only 2 ligands and, calculations show, the NHSi has a 3.6 kcal/mol stronger Pd bond than the NHC.
Beyond being interesting models to study the structure and bonding of low valent silicon, NHSis transition metal complexes have been demonstrated as active catalysts in industrially important reactions. The di-silylene bridged palladium phosphine complex, first synthesized in 2001, has palladium in the 0th oxidation state and is effective at Suzuki Coupling. At 5% catalyst loading the easily synthesized NHSi bridged Pd complex is able to form a carbon carbon bond between phenyl boronic acid and o-bromoacetophenone at 88% yield. In another example, Pd(NHSi)(Cl)(C3H5), synthesized from [Pd(Cl)(C3H5)]2 and [tBuN-CH=CH-tBuN]Si: was found to be more effective than its NHC analogue at Heck coupling. With 1% catalyst loading at 140 °C the Pd(II) silylene complex catalyzes the coupling of p-bromoacetophenone and styrene in four hours in quantitative 99%+ yield. Under the same conditions the corresponding NHC complex yields only 91% product, showing that there are instances where the electronics or stearics do make silylenes comparatively superior catalysts.
References
Category:Nitrogen heterocycles
Category:Silicon heterocycles | 2023-12-22T01:27:17.760571 | https://example.com/article/5654 |
#ifndef BOOST_THREAD_THREAD_HPP
#define BOOST_THREAD_THREAD_HPP
// thread.hpp
//
// (C) Copyright 2007-8 Anthony Williams
//
// Distributed under the Boost Software License, Version 1.0. (See
// accompanying file LICENSE_1_0.txt or copy at
// http://www.boost.org/LICENSE_1_0.txt)
#include <boost/thread/detail/platform.hpp>
#if defined(BOOST_THREAD_PLATFORM_WIN32)
#include <boost/thread/win32/thread_data.hpp>
#elif defined(BOOST_THREAD_PLATFORM_PTHREAD)
#include <boost/thread/pthread/thread_data.hpp>
#else
#error "Boost threads unavailable on this platform"
#endif
#include <boost/thread/detail/thread.hpp>
#include <boost/thread/detail/thread_interruption.hpp>
#include <boost/thread/detail/thread_group.hpp>
#include <boost/thread/v2/thread.hpp>
#endif
| 2024-06-16T01:27:17.760571 | https://example.com/article/9308 |
Muriel Pemberton
Muriel Alice Pemberton RWS (8 September 1909 – 30 July 1993) was a British fashion designer, painter and academic.
According to The Independent, she "invented art-school training in fashion in Britain".
Early life
Muriel Alice Pemberton was born in Tunstall, Stoke-on-Trent, on 8 September 1909, or 8 September 1910.
The daughter of Thomas Henry Pemberton, who was a skilled amateur painter as well as a photographic innovator, inventing a one-camera stereoscopic process. Her mother, Alice Pemberton, née Smith, retired from a career as a professional singer upon marriage and she was also a gifted designer and needlewoman.
At the age of fifteen, she was the youngest student at the local Burslem School of Art. In 1928, she obtained a scholarship as well as a major award to attend the School of Painting at London's Royal College of Art. In 1931, she was awarded the RCA's first ever Diploma in Fashion. Pemberton persuaded the head of the school of design, Professor Ernest William Tristram, to introduce such a course, and he asked her to draft the curriculum.
According to the ODNB, She proposed a combination of direct contact, sketching, and analysing with an actual couturier, learning the basic skills of cutting and sewing with a professional, and supplementing this with academic studies in the history of fashion and design at museums such as the Victoria and Albert.
Career
Following graduation in 1931, Pemberton was immediately employed to teach fashion drawing two days a week at St Martin's School of Art. Over time, she was able to expand this role and became head of the UK's first Faculty of Fashion and Design. The curriculum was much as she had originally proposed to Tristram.
Even before the war, Pemberton's innovative approach to teaching fashion and giving it a proper place in the art college curriculum had attracted international attention. Her methods were widely copied, with teachers visiting from all over the globe to study her approach.
Her students included Katharine Hamnett, Bruce Oldfield, Bill Gibb and Bjorn Lanberg. In 1993, John Russell Taylor published a biography of her life.
Personal life
In 1941, she married John Hadley Rowe (died 1975).
Pemberton died at 56 Vale Road, St Leonards-on-Sea, Sussex, on 30 July 1993.
References
Further reading
John Russell Taylor, Muriel Pemberton: Art and Fashion (London: Chris Beetles, 1993)
John Russell Taylor, Muriel Pemberton: Paintings (London: Chris Beetles, 1993)
Category:1909 births
Category:1993 deaths
Category:People from Tunstall, Staffordshire
Category:Fashion educators
Category:English watercolourists
Category:Alumni of Burslem School of Art
Category:Alumni of the Royal College of Art
Category:Academics of Saint Martin's School of Art | 2023-08-18T01:27:17.760571 | https://example.com/article/2626 |
St. Cloud Rail Bridge
The St. Cloud Rail Bridge is a pin-connected truss bridge that spans the Mississippi River in St. Cloud, Minnesota, United States. It was built in 1892 by Great Northern Railway and was probably designed by the railroad. Two of the piers are stone, while a third pier is newer and made of concrete. The bridge has an extra set of bracing that hangs about ten feet below the bottom trusses, appearing to hang like a hammock. This was added to increase the capacity of the bridge.
See also
List of crossings of the Upper Mississippi River
References
Category:1892 establishments in Minnesota
Category:BNSF Railway bridges
Category:Bridges completed in 1892
Category:Bridges over the Mississippi River
Category:Buildings and structures in St. Cloud, Minnesota
Category:Great Northern Railway (U.S.) bridges
Category:Railroad bridges in Minnesota
Category:Transportation in Stearns County, Minnesota
Category:Truss bridges in the United States | 2023-12-22T01:27:17.760571 | https://example.com/article/3723 |
PLAZA
Wednesday, September 24, 2008
Tuesday, September 23, 2008
He's this guy, see? He wears a really snazzy suit with a nice jacket, slacks and a bow-tie, and the suit has a constantly, slowly shifting color and pattern; it is the first clue to his iniquity. His face has sort of an ambiguous quality to it, and when he is not present his face cannot be recalled from memory with any amount of effort.
When you encounter Chester he greets you, and when you respond he can hear the lust in your voice. He presents you with the most distinguished opportunity to own either a disembodied upper torso (chest...) or a disembodied pelvic region (... or drawers) of any variety of your choosing to do with whatever you please; the price of the transaction is your immortal soul. Occasionally if Chester is feeling particularly business-like he will distribute vouchers for 30-day trial periods of the testing of all of the functions of his products.
Monday, September 15, 2008
So, I’ve never been much of a religious person. I was born and raised a member of the mormon church, but I left at a relatively early age before they could get me to pay them for two years of cultural isolation. I questioned rather than accepted, and therefore have become a pretty well-rounded individual. I have balanced morals and a good conscience, but I’m not afraid to question anything and everything and try something new. I don’t believe in God or even really a higher power. I believe in what human beings can do and currently do to better themselves and each other. I’m not a pessimist nor am I an optimist. Rather, I am a realist.
Therefore, I don’t necessarily believe in anything written in the Bible, seeing that it is a story written over hundreds if not thousands of years by countless racist, sexist men that have a lower intelligence than even the dumbest child in first grade. I do see the existence of morals and guidelines within the stories of the Bible, however, much like Jesus’ beatitudes and others. For those of you familiar with the Bible, you’re probably well aware of the seven deadly sins: Sloth, Vanity, Gluttony, Lust, Greed, Wrath, Envy, and Pride. Supposedly it is these seven things that will lead humankind into the depths of Hell. I, however, have discovered the eighth and greatest sin.
Tony Alamo.
For those of you fortunate enough to not know about Mr. Alamo, he is a born again Super Christian, and head honcho of the “Tony Alamo Christian Ministries New Jerusalem Church” front, and it is apparently taking the Boise State campus by storm. Newsletters have been finding themselves all over the poor campus (a large abundance of which are in garbage cans) telling people all about “God” and his… erm… wondrous ways. William had the fortunate opportunity of finding on such newsletter on the window of his car. But, it was not just one but THREE entire newsletters. He took them back home and showed them to me. That was when the hilarity ensued.
The first of the newsletters was titled “BRACE YOURSELVES” in a very urgent bold face font. Next to the title was a picture of Mr. Alamo next to a very young Willie Nelson, and my initial thought was “Yes, I will definitely need to brace myself for this.” It wasn’t, however, a call for wholesome Nelson tunes, but instead something better. I will type the opening statements here for you now:
“Any time now, a worldquake and a series of prophesized catastrophes will shockingly awaken the entire global population o a horrible, God-sent, unparalleled nightmare.”
All right, off to a good start. I continued to read, and a tale of human destruction unfolded. Apparently, the world is at an end much like how the world ended on the year 2000 (…right?), and we are all going to die. God is horrifically angry at us all and is going to kill us. According to Tony Alamo, it’s because of the “anti-Christ media” and “Governments” that God is going to smite our world. Some of his reasons are the aforementioned and also “Young men and women, knowing nothing of truth and reality [planning] vain careers and college educations.” Yes, much like the vain practice of PSYCHOLOGY! More like VOODOO SATAN DOCTOR-ISM! And let us not forget the most vain and evil of all college educations… ___________________ (fill in the blank, because we all know college is a joke. An evil, satanic joke) Another reason for this destruction Tony Alamo describes is apparently the monotony of the day-to-day struggle to make ends meet.
“… planning or pursuing their social or political activities, looking for new means of entertainment, buying, selling, planning, working, etc. Some will be planning or pursuing their routine of daily or nightly duties and promiscuities, or making their usual plans to foolishly spend their paychecks on Friday and Saturday.”
As opposed to foolishly spending their money on Sunday on awesome causes like, I don’t know, Tony Alamo Christian Ministries perhaps. I love how he points out that survival is sin. Gaining an education is sin. But, doesn’t that basically explain religion and faith in itself? Religion is a creation out of the unknown to explain the unknown. So, why know when we have all ready EXPLAINED the unknown? We all ready spent SO MUCH TIME making UP the truth for you to blow it all away by learning the ACTUAL truth! Sweet Jesus, people! Oops, sorry. As pointed out by Mr. Alamo in paragraph six of his gripping epic, “Then, to the woe and dismay of everyone in the world, Jesus, who is commonly and falsely known as ‘Sweet Jesus,’ will abruptly, without notice, turn the world upside down in a moment, literally tearing it to pieces.”
OH SHIT! NORTH WILL BE SOUTH! ORIENTATION WILL BE…. Be…. Be virtually the same. That is, unless you know the truth as stated thousands of years ago that the earth is, in fact, FLAT. Fucking scientists with their irrefutable “facts.”
So, Alamo goes on to talk about how God will then drop two meteorites on the planet, having the effect of dozens of hydrogen bombs. The first of these meteorites will land in the ocean, destroying a third of it and all living creatures within, later turning the entire sea into blood. Not symbolically, but literally, for Alamo states that the Bible should be taken “with the utmost seriousness and as complete and literal fact.” So, the sea is blood, therefore leaking blood into water systems everywhere via rain, drainage, deltas, etc., rendering drinking water useless for future generations. The second meteorite will strike and flatten most of a great continent (North America, obviously, for it is the ONLY great continent) and will poison most rivers and fountains… specifically. Fountains.
Then, he will send numerous plagues and curses on the planet, virtually destroying every sinner, who, in Alamo’s eyes, encompasses everyone outside of his bloated ego. So, after is all said and done and the sinners are gone, the fourteen or so “heaven worthy” folk will basically get a thumbs up from God, a wink, and a “good job, guys. Thanks for keeping the faith.” And then he will leave them to live in this land purified from all sin. This beautiful, poisoned land of blood, dirt, infertility, and pain. Thanks God. We’re so stoked we believed in you.
So, that’s the first newsletter. The problem is, however, it only gets BETTER! After reading this awesome newsletter I quickly opened the second, this one titled “The Looking Glass,” and I once again indulged in a world full of awesome. This newsletter tells of a true story of one time Jesus poked in his head to personally say hello to Tony. According to the story, Tony is just chillin’ with his wife in bed. She’s sleeping, and he’s still awake, for whatever reason. All of a sudden, a three to four foot tall fluorescent light appeared in his room, and it began to take the shape of a beautiful golden framed mirror. Within the mirror, Tony saw Jesus sitting down on a purple velvet throne trimmed with gold, and did not have scars on his hands or feet. So, obviously, as tony points out later, songs about seeing Jesus with scars are bull shit. And, guess what! Jesus totally isn’t blonde! Nor is he black! He looks JUST LIKE TONY ALAMO! Now do you believe, you fucker? Undeniable proof! Need more? All right.
So, Jesus is just chillin with a sweet beard and is apparently also wearing a crown on his head. This vision makes Tony come to the thesis of his paper (or that which I’ve come to understand as such)
“Jesus was wearing white clothing, and a thin gold crown around one-half inch high sat on His curly black hair. The gold crown looked so natural and proper sitting on His head that it made me wonder why people in the world with hair don’t wear them. That crown looked much better than a hat.”
God damnit, Tony Alamo is right! I’m tired of the tyranny the baldies have had over us! CROWNS FOR THE HAIRED ONES! Bald people have had crowns for FAR too long!
Of COURSE Jesus sits on gold, in gold, wearing gold. Of course he’s vain. He’s almost as vain as the gaudy jewel-encrusted gold cross that adorns the top corner of Mr. Alamo’s newsletter. It only makes sense. There are a ton of other awesome inconsistencies found later in the newsletter. My favorite example goes as thus: Apparently, Jesus came to Tony to tell him that he liked him. Tony had been buggin’ earlier because he wasn’t sure if the invisible being he had been devoting his life to liked him or not, so it was comforting to find out that Jesus gave him high-fives. “It had never occurred to me that Jesus also liked certain people, although in His Word it’s plain to see that He loves some people and He hates some people.” Well, it’s a good thing that he likes you! You should probably write a newsletter since he came to you and only you and told you he thinks you’re rad. Tony goes on the explain that he got to check out heaven through the mirror, and that it was beautiful. It was a place free of “anti-Christ government. No anti-christ media, no disappointment… no fornicators, no rapists, no homosexuals (sorry, catholics), no lesbians, no pedophiles (sorry, catholics), no jealous, no hate…”
Wait… Time-out. No hate? Here’s a conundrum… How can there be that which there is none? Here is some simple logic.
None hate in Heaven.
God loves AND hates
Therefore, God is in heaven
That, my friends, is an illogical solution. This is what is referred to as a paradox, the majority of what makes up Christian faith. How can God exist if he hates, especially when he lives in a magical kingdom devoid of all hatred? Shouldn’t God, therefore, be revoked from heaven? Doesn’t wrath lead to Hell? Doesn’t Hatred arrive from Fear, Loathing, and Pride? Aren’t these considered… imperfections?
Well, paradox aside, Tony Alamo still wants in to heaven. So, he sticks out his hands in the middle of the night and proclaims “LORD!” and Jesus quickly puts his hands out and says “Not yet.” Alamo gets all bummed. However, Alamo takes it as a sign that he is supposed to stay on Earth and teach the blessings of the Lord. Jesus, however, just didn’t want to tell him that Tony freaks him out and didn’t want him hanging around.
One of the astounding aspects of the newsletter is the great lengths taken to make sure he references all of his sources. He tells his readers to check his sources to prove he’s not making this up. And, sure enough, his references are there – footnotes referring to Biblical passages and his own book, “The Messiah.” Awesome. I no longer question the world around me. How do I know the Bible is true? Simply put, because it tells me it is. Thank you Tony Alamo. Do yourself and all of humanity a favor and violently kill yourself in front of all of us and especially your family.
Monday, September 8, 2008
So, I have a Macroeconomics class with William this semester. This class is taught by a woman who is from India, so therefore she's pretty hard to understand. I get pretty distracted today, so I decided that rather than work on the assignment at hand I'd try a little bit of comic-ness. I give you: PHIBLUM & GRIFF!
I made two cute adventures for you all today. The first is...BLOOD VOMITAnd the second...You Can DO IT!!!!
Sunday, September 7, 2008
Today I discovered something, without health insurance I, Ryan Tyler De La Rosa, am worthless to the world around me. I am in the midst of having my health insurance canceled due to the fact that I was indescisive when picking classes for the fall semester and am now enrolled in few credits. Because I have come to the conclusion that I can't stand being a self indulgent music-fuck like those I share classes with, I am re-thinking my major.
For me, I realized a large majority of things today. I think life is unenjoyable for the masses. I watch practically every adult figure in my life stress through every unimportant desision they make because every one before that was horrific.
I cannot fucking stand watching all these worthless people do the same thing.
School (the majority of one's life) Partying.Job. Mistakes. Getting married.Gettting paid. Having kids.Going to church. Paying taxes. Having more kids. Going to church. Having grandkids. Going to church. Dying.
I wouldn't mind if I had the chance to change things up a bit for my own life. I have so many aspirations at this point, maybe teaching english in japan, maybe teaching english or communication in america, studying philosophy, learning history, and most of all, I want to play music with my friends.
I need to do that more than anything, all other roads are backups for me. Though I will most likely come away from school with a degree, I really think it will be years before I use it. I want to make people get up and do something positive, "i" want to get up and do something positive. Honestly, I don't feel like it is nessacery for me to work a nine to five to make money and be happy. I know that there is no reason for me to sit by and let my mind stay idle. "I" am going to graduate college with a bitchin' degree and I am going to play music with my friends for as long as I possibly can.
"It's true that supressing [sic] hormonal urges is not very healthy, but that doesn't mean that we should let ourselves free. How would someone feel if his/her spouse tells him/her that he/she is not the first one? It's true that love overcomes all issues, including issues on chastity, but won't it be still in your mind? Let's face it, we are all humans, a complete "forgive and forget" is near imposible [sic]. Why go through all that trouble when you can exercise a bit of self-control now and make that someone feel special."
To para-phrase:
OH, DRAT! I WANT TO DIVORCE!
HOW DARE YOU EVER HAVE LOVED SOMEONE OR DONE ANYTHING TO MAKE YOUR BRIEF, MISERABLE EXISTENCE ENJOYABLE BEFORE YOU MET ME?! WHY COULDN'T YOU HAVE EXERCISED A BIT OF SELF-CONTROL TO PRECLUDE MY THEORETICAL DISAPPOINTMENT AT YOUR DISGUSTING HORMONAL URGES (UNLESS THEY ARE FOR ME) AND TO MAKE ME FEEL SPECIAL LIKE THE UNIQUELY BEAUTIFUL SNOW-FLAKE THAT I AM?! YOU NEEDED TO DO THAT, Y'KNOW, BACK WHEN YOU DIDN'T EVEN FUCKING KNOW THAT I EXIST! HAVEN'T YOU ALWAYS BEEN AWARE THAT YOUR PENIS FITS PERFECTLY INTO MY VAGINA, BECAUSE I AM THE ONLY PERSON IN THE UNIVERSE WHO WILL EVER MAKE YOU HAPPY?!
WHY AREN'T YOU FUCKING PSYCHIC?!
FEEL GUILTY!!!!!
You said it yourStelph, "we are all humans." Guess what a human is; I will tell you that it is an animal! You are an animal with a brain that is verily too big for its own good, because it allows you to entertain the pompous conceit that you are something more significant than a consuming/copulating/defecating beast!
However!, I respect your decision not to jump the uterine shark (so to speak! I say!) and contribute to the lamentable proliferation of the war-machine!
O Steph, I just realized that your blog post is over two years old! Well, aren't I exhuming a dead horse to recommence flogging it forthwith (Good show!)! HAHAHA...!
So, for those of you who know me, you all understand the fact that I'm a bit of a Japanophile. I listen to Japanese music, eat Japanese food, speak Japanese, watch Japanese films, and am dating a Japanese woman. Why, you may ask? Because I hate America.
Here's Reason One. More will follow at a later date.
1. Buena Vista Entertainment. Buena Vista is the distribution company responsible for bringing the works of Hayao Miyazaki, Isao Takahata, and others from Studio Ghibli to America. These works include woderful works such as Mononoke Hime, Mimi wo Sumaseba, Sen to Chihiro no Kamikakushi, and Pon Poko. The latter title mentioned is a bit of an anomoly, seeing that Buena Vista is the not-so-incognito label for Disney, and that Disney consistantly turns down good projects due to bogus censorship issues. For example, Studio Ghibli release a cute little film called Only Yesterday about a decade back, and Disney still refuses to release it in America. Why? Because there is one scene where three teenage girls discuss the menstruation cycle.
Well, as it would turn out, in 1946 Walt Disney Studios created a short film entitled "The Story of Menstruation" covering, what was that, the menstruation cycle. Yes, a magical journey through the wonderous hoozits and fantastical happenings of the happiest time of the month told through the words of a commonly mentioned sexual deviant. Yum.
But, from JAPAN?!?!?! What, with their pokomans and Howdy Kittens, how can we let them poison our minds with the belief that Periods of all things are REAL (ha ha, I know! Impossible, right?)?! We certainly don't want to jeopardize our good name with such vile filth...
We'll instead put out this cute story of happy forest creatures! Aw, look at the little racoons with their little furry faces and their little furry ears and their, um... little furry.. fanny... packs... I guess?
Sorry, guys. Try nuts. Try little, dangly racoons niblets soaked in fur. Oh, and why not let them stretch their joy-sacks into a magical array of nifty objects? Songs! Ooooh! And songs! "Little racoon children see, swing your balls to me, and I will swing to you!" That's cute! And factual, as opposed to the pagan belief of the natural cycle that is menstruation. Let's also neglet to notice the scene where three young boys oggle over an issue of grandpa's Go-Get-'em until they are scared away, revealing the not-so-un-nude woman and her pretty graphically detail tatulars.
Thanks for being so thorough, Walt. You really helped out this time. I narrowly avoided a case of the "ewwww, yuckies" thanks to your genius decision to keep a potentially wonderful film out of our God loving, and obviously testicle loving, and possible God-Testicle loving nation.
God Damnit, though, do I love that movie. Seriously, all of those films are wonderful pieces of art and entertainment, a form of existence the likes of which is rarely seen in this country. These animations have a point AND an attention span. Maybe we should be trying to atually get this films INTO America as opposed to making ill-advised decisions to keep them out. Then, perhaps we can save ourselves the hour long five-second tangents that are helping our children grow oh, so smart and creative. Safe things. Safe sponge. | 2023-11-16T01:27:17.760571 | https://example.com/article/6578 |
Pediatricians have an abundance of opportunities to help their patients have safe childhoods. The most straightforward of these is the chance to keep children safe from diseases from polio to meningitis. And even though there are always parents who don't understand, or agree, regarding the clear lifesaving benefits of immunization, most parents do choose to immunize, especially when their pediatrician strongly recommends it.
Unfortunately, viruses don't conveniently wait until a child has had their first immunizations at age two months - or in the case of the influenza vaccine, six months - before they hit. For some of these diseases, specifically whooping cough and influenza, we rely on vaccines given during pregnancy: the Tdap and flu shots. These shots have been shown to reduce the chance of dangerous illness in our youngest patients, but since they are given during pregnancy, pediatricians don't always get the chance to advise parents on the importance of these vaccines. Nor, for that matter, are we the experts in what pregnant women are and are not supposed to do.
But infants are affected by these decisions, and infant health (like many issues) is distinctly in my lane. So I interviewed Autum Larsen, a certified nurse midwife at UnityPoint Health - Des Moines, about the importance of immunizations in pregnancy, and the influenza vaccine in particular. She was very interested in making sure pregnant mothers knew that immunizing duing flu season was important. During flu season, according to Larsen, “a pregnant mom should obtain a flu vaccine any time throughout their pregnancy.” “If you would compare to a woman who is not pregnant, the pregnant woman actually has an increased risk of not only obtaining influenza, but to have more severe effects from influenza virus,” Larsen said. “so it is really important for that special population to obtain a vaccine to help not only prevent them from becoming ill, but to help pass antibodies towards their baby, so when they're born they have some passive immunity for the first six months of life when they can not get a vaccination.”
I would guess that most expectant mothers, if they refuse the flu shot, do so because they are wary of its safety. Larsen says she commonly addresses the myth that flu vaccines aren’t studied in pregnancy. “The safety factor is there, she said. "There are no concerns about higher risk for autism, miscarriages, or any other harm to themselves or their baby.”
Let’s look at some of those studies. While the package insert for flu vaccines does usually say something like “Safety and effectiveness have not been established in pregnant women or children less than 6 months of age” Larsen explains that the insert is describing what the drug company itself has done for licensure. The CDC, ACOG, and other groups look at all the studies that have been done looking at vaccines and pregnancy by entities other than drug companies, and make their recommendations based on the totality of the research. And there are a lot of studies, she says.
Let’s find out. With Larsen's help, I pulled together all the safety studies we could find on influenza vaccines in pregnancy. Take a look - the body of evidence is pretty convincing. Not only do many large studies show that the vaccine is safe for mother and baby, but a good number find reduced numbers of adverse outcomes when mothers are immunized.
Studies Looking at the Risk of Influenza Disease in Pregnancy
A 2013 study by the Norwegian Department of Public Health (Haberg et al), looking at over 100,000 pregnant women, found that an influenza diagnosis significantly increased the risk of fetal death, and that immunization was associated with a lower, though not statistically significant decrease in fetal death.
A 1998 study by Neuzil et al found that about one in four hundred women in their third trimester during flu season will be hospitalized from influenza.
A 2009 CDC study by Jamieson et al found that H1N1 influenza was more likely to cause hospitalization in pregnant women than in the general population, and noted six related deaths over a two month period.
A CDC review of the risks of influenza disease among pregnant women and infants less than six months old.
A 2013 study by Parboosing et al found that gestational influenza was associated with development of bipolar disorder later in life.
Studies Supporting the Safety of Influenza Vaccines in Pregnancy
Studies Finding Better Outcomes When Mothers Get Flu Shots During Pregnancy
A 2018 CDC co-authored study by Thompson et al looked at pregnant mothers hospitalized with confirmed influenza across four countries, and found that getting a flu shot reduced hospitalizations for influenza by about 40%.
A 2016 study by Regan et al looked at over 5000 pregnant mothers and found “Mothers who received seasonal TIV during pregnancy were significantly less likely to experience stillbirth compared with unvaccinated mothers.”
A 2013 study by Adedinsewo et al looking at over 8000 live births in the state of Georgia found “reduced odds of small for gestational age and preterm births during the widespread influenza activity period.”
A 2014 study by Steinhoff et al of over 12000 women found fewer low birth weight infants as well as fewer preterm births in those immunized against influenza.
A 2011 study by Omer et al looked at over 4000 births in Georgia and found that immunization was associated with a significant reduction in premature delivery during flu season.
A 2013 retrospective cohort study of live births within Kaiser Permanente Georgia and Mid-Atlantic States by Richards et al found “women who received H1N1 influenza vaccine were less likely to give birth preterm, and gave birth to heavier infants.”
A 2012 study by Kallen et al looked at all births in Sweden over a two year period and found H1N1 influenza immunization was a lower rate of preterm birth and low birthweight.
A 2012 study by Sheffield et al studied over 10,000 women in Texas and found a decreased stillbirth rate in those who were immunized against influenza.
A 2012 randomized, controlled study by Steinhoff et al found better birth weights and fewer SGA infants in those whose mothers were immunized with influenza vaccine vs. pneumococcal vaccine.
A 2013 study of over 9800 mother-infant pairs found that maternal influenza immunization, when coupled with infant pneumococcal immunization, provided greater protection against infant ear infections a over the pneumococcal vaccine alone.
A 2010 Yale Pediatrics study by Benowitz et al looking at 247 infants found “Influenza vaccine given to pregnant women is 91.5% effective in preventing hospitalization of their infants for influenza in the first 6 months of life.”
A 2008 study by Zaman et al gave 340 mothers either influenza vaccine or pneumococcal vaccine, and found that those that receive the influenza vaccine had a significant reduction in respiratory illness in mothers as well as a reduction in influenza in the infants.
As I said, this list is not exhaustive, and I will add to it as I find more studies. But it's clear that not only has the research been done, but that the consensus is that influenza vaccines during pregnancy are safe, and likely lead to better outcomes for mothers and babies. | 2024-05-07T01:27:17.760571 | https://example.com/article/5651 |
I tried to think of why Panther was rounding out that trio - with no success as well. If they were so hard up for somebody to round out that trio, it would have been a great time for Wagner to break out his kick-ass camouflage ring attire.
Anything that has Apolo Dantes doing a tope has to be worth something.
Gran Markus seems a bit thinner than he was during the mid 90's. He was truly built like a VW bug then. Bigger than Super Porky.
I loved the ads during these shows, especially the ones for the real-life bumblebee man show. Better than some of them that I saw while watching some 1997-ish Promo Azteca - a guy in minstrel show blackface promoting a furniture store.
Is it just me, or is Loco Max somewhat stiff of a worker by the loose lucha standards?
It was nice to see Safari in a match that wasn't clipped down to only show the final fall.
619 from Black Tiger! With his stocky physique, I was almost fooled.
Mascara Ano 2000 and V3 didn't stink things up too badly in that one.
I'll agree - that was one of the more lethal looking Wagner drivers. Actually, a lot of the exchanges involving Wagner & Niebla in this match were really well done. They had a nice singles match in September 1997 that is worth seeking out.
The GDI triple team submission that showed up during Momentos is very high on my long list of screwy looking lucha submissions.
Tom, part 1: See that part where I said "Tanvir and Albert may be doing something"? Well there you go. Nice timing on that question. I'll get more specfic when they actually start on it, just to be on the safe side.
Tom, part 2: Hosting company e-mailed ME (and everyone else) to explain the server went unrepsonsive and they had no idea why - but they turned off ColdFusion and everything's peachy now. So good for me - it should be fine now.
And now lots of Homer:
2/2
>I tried to think of why Panther was rounding out that trio - with no success as well. If they were so hard up for somebody >to round out that trio, it would have been a great time for Wagner to break out his kick-ass camouflage ring attire.
Maybe Panther being here was just to fit someone in this fued; it has to be a rudo, but you have to find someone who would make sense to be feuding against the normally-rudo Capos. Maybe they just owed Panther a couple Colieso paydays?
What's weird is how the Boricuas have suddenly tightened up the roster - Bulldog's apparently gone (yay), Killer's apparently gone (yay) - they don't have as many people to cart to the ring each time.
>Is it just me, or is Loco Max somewhat stiff of a worker by the loose lucha standards?
While MY2K has been eh every time I see him and I expect that by now, I keep thinking waiting Villano III to be better than par in a match, and he never really shows it off. The first time I saw him in any length was the mask match against Atlantis, so maybe my expectations in him are just extra high.
>I'll agree - that was one of the more lethal looking Wagner drivers. Actually, a lot of the exchanges involving Wagner & >Niebla in this match were really well done. They had a nice singles match in September 1997 that is worth seeking out.
Hmm, there's another one. You know what would be neat is if someone put together a list of some of that good lucha stuff. It's so odd - you can get bios and bits of history from places like La Arena, but compared to all the puro info/discussion on there, there's nothing to figure out what were the good fueds/matches from the past (besides the obvious WWC match). I've heard good things about Niebla/Shocker and much about Casas/Santo but no one speaks in mythical terms about them like certian AJPW matches - makes them much harder to track down.
Did you watch the Wagner/Niebla one that aired this week? I'm putting that show off till I get the next episode on tape done...
>The GDI triple team submission that showed up during Momentos is very high on my long list of screwy looking lucha >submissions.
You know, the scary thing aren't that they're wacky, it's that they look like they actually work.
>No, TCF, I don't think Beckie ever won a match with the >Farmer's Roll. I wonder if I could use this as an excuse >to break out all my WOW tapes?
Do you really need a reason to watch WOW? Someday, I'm gonna look back and see how well tha ages.
>I hope Rivera gets a nice push coming out of all this Guapos angle. >I've always liked his stuff, and he's been stuck in the EMLL low card >for quite the while. He's on some of my 1997-era tapes.
If the point of the Nuevo Guapos was to push the a rudo trio and support Magica and Shocker, I think Tony would have been the best pick. It's unlikely he'd over shadow the other two, he can take the bumps to sell for those two, and he's more convicing as a rudo than Ricky. I guess it turned out it was to try and create a new star and Tony's back to third from the top Coliseo matches, sadly. | 2023-11-25T01:27:17.760571 | https://example.com/article/1058 |
Q:
Error occurred when loading csv file into Spark DataFrame in Rstudio
Following code to read a csv file into Spark DataFrame in Rstudio
Error occurred and could not resolve it.
A:
Error Resolved while reading a csv files into Spark DataFrame in RStudio
Reading a csv files into SparkDataFrame in Rstudio without using hdfs,amazon web services and file path protocols
| 2024-03-14T01:27:17.760571 | https://example.com/article/7580 |
"""
cargo-raze crate build file.
DO NOT EDIT! Replaced on runs of cargo-raze
"""
package(default_visibility = [
# Public for visibility by "@raze__crate__version//" targets.
#
# Prefer access through "//proto/raze", which limits external
# visibility to explicit Cargo.toml dependencies.
"//visibility:public",
])
licenses([
"notice", # "MIT"
])
load(
"@io_bazel_rules_rust//rust:rust.bzl",
"rust_library",
"rust_binary",
"rust_test",
)
# Unsupported target "chain" with type "test" omitted
# Unsupported target "echo" with type "test" omitted
# Unsupported target "limit" with type "test" omitted
# Unsupported target "stream-buffered" with type "test" omitted
# Unsupported target "tcp" with type "test" omitted
rust_library(
name = "tokio_tcp",
crate_root = "src/lib.rs",
crate_type = "lib",
edition = "2015",
srcs = glob(["**/*.rs"]),
deps = [
"@raze__bytes__0_4_12//:bytes",
"@raze__futures__0_1_29//:futures",
"@raze__iovec__0_1_4//:iovec",
"@raze__mio__0_6_21//:mio",
"@raze__tokio_io__0_1_13//:tokio_io",
"@raze__tokio_reactor__0_1_12//:tokio_reactor",
],
rustc_flags = [
"--cap-lints=allow",
],
version = "0.1.4",
crate_features = [
],
)
| 2023-09-02T01:27:17.760571 | https://example.com/article/8224 |
package com.dlsc.preferencesfx.util;
import org.junit.Before;
import org.junit.Ignore;
import org.junit.Test;
/**
* Test class for {@link PreferencesFxUtils}.
*
* @author François Martin
* @author Marco Sanfratello
*/
public class PreferencesFxUtilsTest {
@Ignore
@Test
public void categoriesToSettings() throws Exception {
}
@Ignore
@Test
public void mapSettingsToCategories() throws Exception {
}
@Ignore
@Test
public void mapGroupsToCategories() throws Exception {
}
@Ignore
@Test
public void filterCategoriesByDescription() throws Exception {
}
@Ignore
@Test
public void filterSettingsByDescription() throws Exception {
}
@Ignore
@Test
public void groupsToSettings() throws Exception {
}
@Ignore
@Test
public void filterGroupsByDescription() throws Exception {
}
@Ignore
@Test
public void categoriesToGroups() throws Exception {
}
@Test
public void testCompareMatches() throws Exception {
}
@Before
public void setUp() throws Exception {
}
@Test
public void categoriesToSettings1() {
}
@Test
public void mapSettingsToCategories1() {
}
@Test
public void mapGroupsToCategories1() {
}
@Test
public void filterCategoriesByDescription1() {
}
@Test
public void filterSettingsByDescription1() {
}
@Test
public void groupsToSettings1() {
}
@Test
public void filterGroupsByDescription1() {
}
@Test
public void categoriesToGroups1() {
}
@Test
public void getRowCount() {
}
@Test
public void flattenCategories() {
}
}
| 2023-10-01T01:27:17.760571 | https://example.com/article/5513 |
Save For Later
Brillant Restaurant, Iraklio
Concierge.com's insider take:
The decor of this Iraklio restaurant is as bold as the recent renovation of the hotel that houses it, the urban-boutiquestyle Lato. The restaurant's modernistic design, dominated by black and silver geometric shapes, is carried right through to the place settings and reflects much of the look throughout the hotel. The effect can be a little unsettling, as if you were having an in-flight meal on Spaceship Crete. But the food, from red pepper soup to popcorn goat-cheese truffles, is creative enough to overcome thatand help justify the astronomical prices. | 2023-10-21T01:27:17.760571 | https://example.com/article/9364 |
We now have confirmation for what we wrote in our previous blog post: Samsung is not shipping keyloggers on their laptops.
The whole saga was caused by a false alarm of the VIPRE Antivirus product. Apparently VIPRE detects the StarLogger keylogger by searching for the existence of a directory called "SL" in the root of the Windows directory. This is a bad idea.
As an example, here's a screenshot showing VIPRE alerting on a completely clean Windows computer after an empty "SL" folder was created:
As some Samsung laptops do indeed have a folder called "C:\WINDOWS\SL" on them by default, VIPRE would alert on them with a similar warning.
Unfortunately Mohamed Hassan (CISSP) who did the original analysis did not double-check his findings and blamed Samsung instead. Apparently he did not look at the contents of the "SL" folder at all.
Network World has published an article claiming that Samsung Electronics installs Windows keyloggers on their laptops by default. This caused an uproar, as even Samsung support appeared to confirm this, saying that the commercial StarLogger keylogger is installed by default to "monitor the performance of the machine and to find out how it is being used".
All this is a bit hard to believe. F-Secure Anti-Virus detects StarLogger (as "Trojan.Generic.5223315"). So do many other antivirus vendors. We have not seen any kind of peak of StarLogger reports.
So, what to do? Well, we went to a local IT store and checked some Samsung laptops ourselves.
No, we did not find StarLogger, or any other keyloggers from the laptops we tested. These included Samsung models R540, RF710, QX310, SF510, X125, and NF310. They were all running different versions of Windows 7. Note that the list includes the Samsung R540, which was one of the laptop models mentioned in the original Network World report.
In summary, until proven otherwise, we don't believe Samsung has been installing keyloggers on their laptops by default.
"All customers start with 5 GB of free Cloud Drive storage to get started. For a limited time, get a free upgrade to 20 GB of Cloud Drive storage with an MP3 album purchase."
Wow. 5 gigabytes with a free upgrade to 20 GB? That's awesome.
I only have one huge problem with it…
Amazon's password policy is seriously lacking.
This is the message generated when somebody attempts to set their password to "password" or "123456".
Wait. What?!? Success… for password and 123456?
Well geez, at least Amazon's password policy doesn't accept "1234".
Look, Amazon has decent defenses in place to prevent somebody from hacking an account and then shipping products to a new address. For that, the attacker needs the entire credit card number and other details.
But now you've moved the product into the cloud! Shipping isn't required.
Gigabytes of online storage connected to a credit card will be a really tempting target for hackers. And because Amazon accounts are based on e-mail addresses… hackers won't even have to phish Amazon directly. They can just phish e-mail accounts and then try the same password at amazon.com.
— Another thing —
I just tried accessing my account using the wrong password more than ten times!
Just when do the brute force defenses kick-in?
I used the correct password on my 12th attempt (or so) and was then given direct access.
…
Listen, I really appreciate my new cloud drive.
I just don't think I'll be using it for much until you enact some better safeguards to protect it.
But more surprisingly, @TopTweets also retweeted this tweet from @SkypeCamGirls already on Saturday:
Guess nobody reported the spam over the weekend.
Hopefully Twitter will look into this soon as @TopTweets has over one million followers and we seriously doubt that they want to be exposed to sites such as getiton.com and camsexroulette.net.
Fortunately however, the links are obviously "not safe for work" (#nsfw) and relatively few people have clicked them. So perhaps most folks have just a bit more common sense than many so-called experts give them credit for?
Updated to add: Nice! Twitter has suspended both @CamGirlTrenity and @SkypeCamGirls (among others…).
Today's tweet is no longer in the @TopTweets feed and we expect that Saturday's will soon be purged as well.
According to Comodo, the registrations seemed to be coming from Tehran, Iran and they believe that because of the focus and speed of the attack, it was "state-driven".
What can you do with such a certificate?
Well, if you are a government and able to control Internet routing within your country, you can reroute all, say, Skype users to fake https://login.skype.com and collect their usernames and passwords, regardless of the SSL encryption seemingly in place. Or you can read their e-mail when they go to Yahoo, Gmail or Hotmail. Even most geeks wouldn't notice this was going on.
What about the rogue certificate for addons.mozilla.org? Initially I thought there would be no other reason than to use Firefox extensions as some sort of malware install vector. However, Eric Chien from Symantec came up with an interesting alternate theory: it could be used to block the installation of certain extensions that bypass censorship filters (thanks, Eric!) For examples of such extensions, see here and here.
As certificate revocation systems in place are far from fool proof, Microsoft has just announced that they will be shipping a Windows update that will force these rogue certificates to be moved to the local untrusted certificate store.
Updated to add: Comodo has now said the attacker gained entry to its system by obtaining the password and username of a European affiliate. Once inside, the attacker could have issued certificates to any site he wanted. Wall Street Journal has more on the breach.
Updated to add: What's the importance of a Certificate issued for "Global Trustee"? We don't know. This isn't a documented entity anywhere we could find. Our best guess at this point is that there is some hardware product from some large vendor with hardcoded support for a certificate for "Global Trustee"…
Updated to add: Iran does not have it's own CA. If they did, they wouldn't need to do any of this as they could just issue rogue certificates themselves. On Twitter, @xirfan commented on this, saying: "I work for a webhoster. Our Iranian & Syrian customers aren't allowed SSLs".
Updated to add: A person or persons claiming to be "Comodo Hacker" has posted a public note on the incident. The person/people behind the post do seem to have had access to Comodo's or instantssl.it's internal systems. Whether the rest of their story is true or not, we don't know.
Another sample we've seen (md5:20ee090487ce1a670c192f9ac18c9d18) is an Excel file containing an embedded Flash object that exploits a known vulnerability (CVE-2011-0609). When the XLS file is opened, it shows an empty Excel spreadsheet and starts exploit code via a Flash object.
The Flash object starts by doing a heap-spray containing the following shellcode:
This first shellcode only loads and passes execution to a second shellcode embedded in the Excel file:
The second shellcode is responsible for decrypting and executing an EXE file (also embedded in the Excel file):
In the meantime, the Flash object constructs and loads a second Flash object in runtime:
This second Flash object is the main exploit in this malware and it exploits CVE-2011-0609 to execute the shellcode in the heap. We generically detect the Flash object as Exploit.CVE-2011-0609.A.
As an aside: the main exploit appears to have been delivered in this fashion in an attempt to evade detection. As it is loaded in memory, no physical file is available for scanning by an antivirus engine. Embedding the Flash object that loads the main exploit in an Excel file may be an attempt to further disguise the attack.
Fortunately, the malicious Excel file and its embedded EXE file are detected as Exploit.D-Encrypted.Gen and Trojan.Agent.ARKJ, respectively.
Still, users should update their Flash player as Adobe has already released a patch for this particular vulnerability. For more information, please see their security advisory for CVE-2011-0609.
Chuck Norris kicks ass. We all know that. Malware authors know this too.In fact, we've seen multiple worms and trojans over the years that make references to Chuck Norris. Probably the best example is the Chuck Norris Router Worm from last year.
While browsing through incoming malware, we noticed this little fellow(md5 66b06adc178d17a7b42301e845eed84d). A botnet client, capable of taking over the computer and allowing full remote access to the infected system.
As usual, it requires a server to connect to. Name of the server? chucknorris.zapto.org. The bot also registers itself in registry under hkcu\software\chuck norris. We detect it as Backdoor:W32/Spyrat.D. Here's a description.
We looked this a bit deeper and it turns out to be generated with a tool called "CyberGate". Here's what the CyberGate control panel looks like.
While blogging about phishing attacks against EU CO2 Emission Trading Systems, we provided several examples of real phishing e-mails and phishing sites. However, we also mentioned a company called European Climate Registry (europeanclimateregistry.eu).
There were two reasons why we singled this company out. First, the EU had warned about European Climate Registry publicly as it is "not connected to European Commission". However, a company does not need to be connected to the EC if it wants to offer an alternative trading platform for trading carbon-related products.
Second, moreover, the domain europeanclimateregistry.eu looked suspicious to us, as standard WHOIS services listed the registrant information as "NOT DISCLOSED!". We later realized that EURid lists all .EU domain registrants as "NOT DISCLOSED!". You can only query the registrant information via EURids own web form. Thus, our information that the domain was registered with a domain privacy system was incorrect. We have no reason to conclude that European Climate Registry is involved in any wrongdoing.
Our Threat Research team just completed some interesting analysis of a new Man-in-the-mobile (Mitmo) Symbian trojan (designed to steal mTANs), and what's particularly interesting about this variant is that it appears to be a component of SpyEye.
This new version of Mitmo was discovered by a partner a couple of weeks ago (somewhere in Europe…).
The technique used by SpyEye Mitmo to circumvent Symbian's signing requirement — was to use a developer certificate issued by OPDA in China.
The fields injected into a SpyEye Mitmo compromised online banking session include a request for the user's phone IMEI. Once SpyEye had the IMEI, it was added to the list embedded within its certificate, and so, the phone's user installed "self-signed" software and bypassed security prompts. Nokia has taken probationary actions against OPDA to prevent further abuse of their services.
We'll have further analysis available tomorrow.
Researchers can contact us over the usual channels to obtain the sample.
Facebook recently announced a major overall of their comments system. The new changes will allow Facebook users to comment on third-party websites using their profiles. Supporters of the new system hope that it will help in combating Internet trolls and comment spam because Facebook accounts typically use real names. Critics of the system argue that it's a threat to free speech.
A number of critics have cited this quote by Mark Zuckerberg, from The Facebook Effect: "You have one identity. The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly … Having two identities for yourself is an example of a lack of integrity."
Reactions among social activists have not been positive. But really, why? Is having only one identity really such a strange concept?
Other than The Batman, who really needs more than one identity?
I only have one identity. I also have an alias on Twitter, @FSLabsAdvisor, and you can probably tell based on its name, it's a work related account and primarily reflects my work persona as a public spokesperson of F-Secure. It's directly connected to my identity, but only represents a particular side of my personality.
I have multiple aliases on the Internet, a couple of them are anonymous, but I only need one identity.
Maintaining identity, privacy and integrity on the Internet can be a tricky thing — take Sarah Palin for example. About three weeks ago, Jack Stuef at Wonkette wrote that Palin maintained a personal Facebook account using the name "Lou Sarah". (Palin's middle name is Louise.) Stuef's take on the story was that Palin had a "secret" account to praise her "Sarah Palin" account. And he doesn't seem to take her Lou Sarah account as a sign of great integrity.
It was quite a good catch, but Stuef didn't get it entirely right. The Sarah Palin account is not a "profile". It is a special type of hybrid "page" for celebrities that behaves as a profile. But it's really just a page and part of Sarah Palin's personal brand. It's very likely that the page is entirely administered by her public relations team.
A lot of people wanting to manage their privacy create anonymous Facebook accounts. Many people clearly want aliases. I suspect that a great deal of the backlash directed at Zuckerberg is due to the fact that having multiple accounts per individual is a violation of Facebook's Terms of Service, and Zuck says stuff that makes them sound like criminals.
I think some of the backlash is deserved.
Facebook's corporate line is that you should only friend people that you actually know. But Facebook makes a lot of money from partnerships with social game companies such as Zynga. Social gaming is a form of casual gaming, and casual gaming encourages the formation of casual friendships. Facebook profits are in part driven by the formation of casual friendships.
You can't have your cake and eat it too.
I've seen lots of examples where people have created secondary accounts to play Facebook games with "virtual" friends. As long as Facebook profits from casual friendships, they need to find a way to better protect their users' privacy. Facebook needs to step up and offer users some sort of aliases, or else they need adjust their TOS.
I'm not holding my breath.
But how about Facebook's new commenting system?
Is it the death of anonymity and free speech?
Probably not. There's a "backdoor" method which is already being used to comment anonymously.
Pages.
TechCrunch buried this lead in their initial story: "Incidentally, it's also now possible to leave a comment on an external site as a Facebook Page, which means we could see brands use Facebook to leave 'official' comments on blog posts."
So here's an example of what you can do — create a fictional character.
My character is named "Jaajo Jantteri". And I hold the copyright so I'm in full compliance with Facebook's Page Terms.
Next, visit a site testing the new comments, such as TechCrunch. Select the alias of your choice.
And comment.
Now we just need to hope that trolls and spammers won't want to do the same.
But hey, if Facebook wants to move the battleground within their walled garden, I say, let them.
The beta version of our Mac OSX software, F-Secure Mac Protection, had a serious false alarm last night.
Database update 2011-03-14_03 caused several false alarms in clean files with detection names such asExploit:W32/NeosploitPDF.gen!A and Exploit:JS/Brooks.gen!A. The problematic update was removed after two hours. Beta users who received the update have seen some of their clean files moved to Trash.
This problem only affected users of our Mac OSX beta version (Technology Preview). Our Windows and Linux products were not affected in any way.
We're soon going to release a script that will restore the files from Trash back to their original locations. If you were affected by this issue, please do not empty your Trash in the meantime. See our forum for discussion.
Obviously this is not nice. We'd like to apologize to anyone affected by this error of ours.
Updated to add: We have now released a tool that will restore the files back to their original locations. You can download the tool from here.
So, I went to Pakistan, traveled to Lahore, and took a taxi to the address found 25 years ago in the boot sector of the first PC virus. I found the address and knocked on the door. The creators of the first PC virus opened it.
The final result of this trip is now viewable as a 10 minute short film. You can see the film on our Brain mini-site, which also has lots of "behind-the-scenes" material about the trip.
An 8.9-magnitude earthquake has occurred off the north-eastern coast of Japan and a tsunami causing major damage has followed. Naturally, people want to know more, and so they turn to the Web and search for news. And the first place many turn is Google.
As a result, several of Google's home pages now include the following alert:
We've stumbled upon another phishing attempt. This time it was targeted towards Maybank's (one of the main banks in Malaysia) "lucky" customers. The typical method is implemented, i.e., pretending to be someone of authority and then requesting the customers to verify their account, and even reminding them to include the Transaction Authorization Code as well.
Further investigation revealed that this e-mail is originated from a spam server, and that's all we could find. Every other track has been carefully hidden.
While phishing attempts are not something new, phishing activities around developing countries seem to be on the rise recently. Have the groups responsible for the earlier activities shifted their focus to a new market? Perhaps they realized that phishy links have better chance to slip through and escape from being detected if they are localized. Add that with the fact that customers in the area are probably only recently acquainted with online banking, thus, could easily fall prey to sophisticated social engineering method.
Whatever the reason is, those scammers only have one intention — to get hold of valuable information that translates to financial gain. Tools such as our free Browsing Protection portal can help to protect users from going to dangerous sites, but the best practice is to take charge of one's own safety. Users need to be aware of the tricks usually implemented by those with ill intention to avoid falling into the trap.
A trojanized version of the tool has also emerged (we detect it as Trojan:Android/Bgserv.A). Interesting preliminary analysis of the trojan is available in Symantec's blog.
You can see the difference by checking the application info of the authentic versus trojanized versions:
Android Market Security Tool:
Trojan:Android/Bgserv.A:
Here's a screenshot of the content/package itself:
Once installed, Trojan:Android/Bgserv.A obtains the user's phone information such as IMEI and the phone number. The information is uploaded to http://www.youlubg.com:81/Coop/request3.php.
Again, this malware appears to be specific to a mainland Chinese network, as it contacts the number 10086 (related to China Mobile Net) and uses the new APN with the name "cmnet" inserted in the APN list.
This malware may lead to high data usage on the infected device, leaving the user with a high phone bill.
Interesting note: the malicious code doesn't seem to be restricted only to the Android Market Security Tool; the same behavior also appears in other Android applications, according to AegisLab's blog.
Inside the HQ, the protesters gained access to loads of confidential state documents.
Among them was a document that is highly relevant to computer security: an offer for a product called FinFisher sent to the Egypt State Security Investigation Department.
Note: we can't confirm the origin of this document. We got it from Mostafa Hussein. You can download the full document from here. [PDF, 1.3MB]
FinFisher seems to be an Intrusion and Spying software framework, developed and sold by a German company. It seems to include multiple components, including an "infection proxy" and various intrusion tools.
We don't know if Egypt State Security purchased the tool or not. We don't know if they were using it to spy on their own citizens. We don't know who else could be using it.
The obvious question here is: do we detect FinFisher? And the answer is: we don't know, as we don't have a sample at hand we could use to confirm this.
The obvious follow-up question is: if somebody gets us a known copy of FinFisher, would we knowingly add detection for it? And the answer is: yes we would.
We are in the business of selling protection. We're selling products to protect our customers from attack programs — regardless of the source of such programs.
It's easy to imagine a case where our customer would be innocent of any wrongdoing, but would be suspected for a crime he didn't commit. In such a situation he would have full expectation of his antivirus protecting him against trojans, even if those trojans would be coming from the government. This would be even more relevant if the customer lives in a totalitarian state. Like some of our customers do.
It's perfectly possible that we have already received a sample of FinFisher or some similar tools from our customers. However, if that has happened we have been unable to distinguish them from "normal" criminal trojans. We don't have any known government intrusion tools in our possession.
We've never received a request from any police force or intelligence organization anywhere in the world, asking not to detect their trojans. If they use trojans, they do not submit them to us.
And even if an official would contact us, asking not to detect their trojan, we would follow our guideline on this, published years ago in 2001. Please see our public statement on this very topic.
It would be a slippery slope to stop detecting government trojans. If the USA's government would ask us not to detect something and we would do it, then what? Should we avoid detecting hacking software used by governments… of which country? Germany? UK? Israel? Egypt? Iran?
We blogged about this case in April 2010, when this trojan was being widely distributed. It would lock infected computers, showing a list of copyright infringements found from the system. It would not unlock the system unless you used your credit card to pay "fines".
E-mails leaked to Krebs show that ChronoPay was directly involved with the scam. Even the topic of the e-mail shown below is titled "icpp-online.com Fraud Rate".
He has been convicted today in London and received four years in prison. In the same sentencing, two other males and two females were convicted to jail sentences ranging from 18 months to four years and to community service.
Scotland Yard's release follows:
A group of young internet fraudsters who set up an online 'criminalforum' which traded unlawfully obtained credit card details and toolsto commit computer offences have today been jailed for atotal of 15.5 years.
The gang are believed to have been responsible for the largestEnglish-language online cyber crime forum and were all arrested onvarious dates in 2009 and 2010, following a complex investigation byofficers the Metropolitan Police Service’s Police Central e-Crime Unit(PCeU).
During an eleven month investigation detectives uncovered evidence thatthe defendants were directly involved in the global forum (used by over8,000 members) which promoted and facilitated the electronic theft ofpersonal information; credit and debit card fraud; buying and sellingof personal information (including passwords and PIN numbers); thecreation and exchange of malicious computer programs (malware); theestablishment and maintenance of networks of infected personalcomputers (BotNets);and tutorials offering advice on how to commit suchoffences, including how to evade and frustrate law enforcement activityand the exchange of details of vulnerable commercial sites and servers.
Founder of the forum was Webber. Having established a web site named'www.GhostMarket.net', he acted as "administrator" and had overallcontrol of the site (meaning he was able to allow/ban members, removeor edit their posts, and alter their status on the forum.)
An examination of the rebuilt forum and its database revealed manythousands of data entries relating to individuals' personal detailsincluding names, dates of birth, bank details, passwords, paypalaccounts and social security numbers. Site members are believed to havetraded in compromised databases containing thousands of personaldetails including bank account numbers, PIN numbers, passwords andmalware including the Zeus Trojan and other types of criminal software,including credit card verification programs.
The forum included such topics as: 'Phishing kits (post free phishingkits and sell them)'; 'Show off (show us your skills here)'; 'Tutorials(post some useful info here)'; and 'Cardable (post sites you've cardedhere)'. There was also advice and tutorials on various methods ofevading law enforcement, how to encode blank plastic with credit carddata, and how to hack into sites, and even recipes for controlled drugs(crystal meth) and a tutorial on bomb making.
Members of the site communicated anonymously by the use of screennicknames. They were able to post messages in various forum topics onthe website and send/receive private secure messages to/from other sitemembers.
During the investigation detectives recovered from the defendants’computers more than 130,000 compromised credit card numbers, which atan estimated industry loss of £120 per card, is a potential £15.8million financial loss in relation to card numbers alone.
On 3 November 2009 detectives arrested Kelly after executing a searchwarrant at his home address. A full search of the property wasconducted, with a number of computers and mobile phones removed fromthe address for examination.
It was established that Kelly had independently constructed anddistributed across the web a sophisticated Zeus malicious computerprogramme which enabled him to infect and compromise over 15,000computers in over 150 countries, harvesting from them over 4 millionlines of data including huge quantities of credit card numbers andother confidential, personal information.
Having been provided with relevant passwords by Kelly, detectives wereable to rebuild the GhostMarket forum and its database using files fromhis PC.
Prior to this, on 12 October Webber and Thomas were arrested at a fivestar central London hotel for using stolen credit card details to payfor accommodation in the penthouse suite. They claimed to haveresponded to an online advert, saying they had paid money to ananonymous individual.
Bailed to return whilst officers conducted further inquiries, itemsincluding their laptops were seized. In addition they were found to bein possession of business cards brandishing the 'GhostMarket' logo,advertising it as "A new era in virtual marketing" with the byline"I'm a carder, ask about me..."
The duo's involvement in the 'GhostMarket' criminal forum was soonestablished and inquiries were made to trace them after they fail toreturn on bail in relation to the stolen credit card offence.
It was later discovered that on 31 October the pair had flown out toPalma, Majorca, where they had been living in a rented flat in PortD'andrax.
On 29 January 2010 they were arrested at Gatwick Airport as they flewin from Palma.
The following day a search of Webber's home address revealed a computercontaining a series of files outlining a step-by-step guide tocommitting various criminal offences.
Owing to the volume of evidence to be examined and the complexities ofthe case, the pair were released on police bail to return at a laterdate.
Officers subsequently travelled to Spain and, accompanied by SpanishPolice, attended the flat Thomas and Webber had rented out. Theproperty was empty, but local enquiries established that the contentshad been posted back to their UK addresses.
Those items, as well as additional computer equipment, weresubsequently recovered.
Through the forensic examination of seized computers and other digitalstorage devices, as well as evidence secured through the rebuiltGhostmarket site, officers identified Ricardo, a trusted member of theforum, and she was traced to Swansea, South Wales. Initially joiningthe site as a complete novice, over time Ricardo had progressed tobecome directly engaged in card fraud and computer malware activity.
Financial enquiries identified a payment made from Ricardo into herpartner Worley's bank account, incriminating her in the fraud.
"The GhostMarket crime forum was used by thousands of computercriminals and fraudsters operating worldwide.
"Through it the defendants built an extensive criminal network tofacilitate the wholesale trade of compromised credit card details,confidential financial and personal information, malicious computerprogrammes, and other sophisticated tools and criminal services.
"The arrest, prosecution and conviction of these individuals representsa significant step forward in our efforts to tackle cyber crime andreduce the harm it causes."
+ A full financial investigation into all four defendants is underway.
Recent reports on trojanized applications being found on the official Android Market just came to our attention (via Androidpolice.com and Reddit).
The malicious applications were uploaded using various developer names. A full listing of the applications involved appear here: http://pastebin.com/Ue8TfLgE.
According to the androidpolice.com report, on checking out one of the malicious applications, it contains a known exploit "rageagainstthecage" for gaining root access. This exploit is known to work on Android 2.2 and below.
The original androidpolice.com report indicated the malicious applications have already been pulled from Android Market — which is great news for users who haven't yet unwittingly downloaded the malware.
Users who have already done so may still need to wait for Google to remotely remove these apps — or remove them manually.
We'll continue to monitor the situation. We're also looking for samples of these trojanized applications for further analysis. If you have one of the malicious samples, you might consider sending it to our Sample Analysis System.
Regards,Zimry
Edited to add: The pastebin link is no longer valid. Mashable and other news outlets are publishing the list.
A Chinese version of the "Steamy Window" application for Android was recently found repackaged with a malicious routine (Symantec has a good post on it). It appears the malware creator(s) favor this application, as they have already come out with a new variant, which is detected as Trojan:Android/Pjapps.B.
A quick look at this variant shows that the malicious functionalities remain mostly the same, including sending SMS, installing an application, adding bookmarks, and receiving commands from a C&C server.
Here are some screenshots comparing Trojan:Android/Pjapps.A and Trojan:Android/Pjapps.B:
Trojan:Android/Pjapps.A
Trojan:Android/Pjapps.B
And here's a quick view of the code for both variants, showing clearly enough that Pjapps.A (left) is the original version, with Pjapps.B (right) being "version 2":
Perhaps the most visible change seen is that the new version "automatically starts at boot".
This is hardly the first trojanized Android app we've seen (Trojan:Android/Adrd.A). Still, it's one more sign that Android malware is on the rise and maybe not too surprisingly, the focal point for it seems to be China.
Our Android product detects these two variants with the latest database update. | 2024-06-20T01:27:17.760571 | https://example.com/article/8598 |
Reduction of fumonisin B1 in extruded corn breakfast cereals with salt, malt and sugar in their formulation.
The objective was to determine the effect of added sodium chloride, barley malt and sucrose on the stability of fumonisin B1 (FB1) present in corn flour. Two levels of both sodium chloride (0.4% and 2%) and barley malt (0.8% and 5%) were added to the unextruded corn flour, and six levels of sucrose (3-10%) were used. The addition of sucrose at the lowest salt content (0.4%) as well as salt, either at 0.4% or at 2%, led to a significant decrease of FB1 levels in extruded samples, whereas malt, either at 0.8% or at 5%, did not significantly affect FB1 stability. Decontamination rates depended on the concentrations of added ingredients and ranged from 2% to 92%. The greatest reductions in FB1 content were achieved with extrusion cooking with a high salt content, whilst the lowest reductions were the result of processing corn flour with low contents of both salt and sucrose. Salt at 2% was the most effective ingredient in reducing FB1 content of the final extruded food. | 2024-01-22T01:27:17.760571 | https://example.com/article/5746 |
52 N.J. Super. 579 (1958)
146 A.2d 521
ALBERTO RESTO, PLAINTIFF-RESPONDENT,
v.
ROSECLIFF REALTY CO., INC., DEFENDANT-APPELLANT.
Superior Court of New Jersey, Appellate Division.
Argued November 3, 1958.
Decided November 26, 1958.
*580 Before Judges PRICE, SCHETTINO and GAULKIN.
Mr. Richard Brian Young argued the cause for plaintiff-respondent.
Mr. Walter W. Gehringer argued the cause for defendant-appellant (Messrs. Winne & Banta, attorneys).
PER CURIAM.
Appeal is from a Superior Court, Law Division judgment in favor of plaintiff entered on a jury's verdict. It is contended that the trial court erred in denying defendant's motions for judgment at the end of the plaintiff's case and at the end of the entire case, and its motion to set aside the verdict and for a new trial.
Suit was instituted by plaintiff for personal injuries alleged to have been sustained from a fall on July 31, 1955, on which date plaintiff was an invitee at defendant's swimming pool at Palisades Park. Plaintiff testified that he entered the pool at its shallow end near a sand beach. He was carrying his infant grandniece in his arms. He alleged that, when about four feet from the edge of the pool while in about 12 inches of water, he stepped on something slimy and slippery which caused him to fall and sustain injuries. Plaintiff did not see the object on which he slipped.
A nephew of plaintiff and father of the child testified that he heard a splash when plaintiff fell and rushed to his aid. He stated that while helping plaintiff out of the water, he saw "some green," "very hairy" object or "growth" on the base of the pool under the water near where plaintiff fell. After helping plaintiff this witness did not return to the pool to investigate further what caused the fall or what was the exact nature of the alleged substance. On cross-examination *581 he testified that the object or growth was moving around. This testimony contradicted his previous testimony that what he saw was a growth on the bottom of the pool. The witness characterized this object as a "growth" because it seemed to him similar to growths which he had observed on previous occasions at various beaches and in the East River.
Defendant's superintendent testified that the pool was thoroughly drained and scrubbed only the night before the incident and that this procedure was generally followed at least twice a week.
As stated above, defendant contends that the trial court committed reversible error in denying defendant's three motions. However, we feel that a determination on the single issue of the propriety of the trial court's denial of defendant's motion for judgment at the close of the entire case will be dispositive of this appeal. The motion was properly denied if, upon the evidence as it stood at the close of the entire case, the jury could reasonably find that there was a growth and that such growth existed for so long a time that, by the exercise of reasonable care, defendant had the opportunity to discover and to remove it. "In the absence of proof of either, the legal presumption is that defendant had used reasonable care." Thompson v. Giant Tiger Corp., 118 N.J.L. 10, 13 (E. & A. 1937). If it was not a growth, but some mass or object, there was no proof who placed it there or how long it had been there.
It is conceded that plaintiff was a paying patron on defendant's premises. One who invites customers to come upon his business premises is under a duty to exercise ordinary care to render the premises reasonably safe for such purpose. The proprietor is not an insurer, but he is liable for defects of which he knows or which have existed for so long a time that, by the exercise of reasonable care, he had both an opportunity to discover and to remedy. Nelson v. Great Atlantic & Pacific Tea Co., 48 N.J. Super. 300, 305 (App. Div. 1958); Restatement, Torts, N.J. Annot., § 343 (1940).
In Simpson v. Duffy, 19 N.J. Super. 339 (App. Div. 1952), plaintiff slipped on a green vegetable leaf near the *582 vegetable counter in defendant's store. Affirming a judgment for defendant entered on motion at the close of the trial, we said (19 N.J. Super. at page 345):
"* * * it is plain that to submit the question of whether or not the vegetable matter had been dropped by an employee of the store operator would be to authorize and direct the jury to decide the responsibility of the defendant on the basis of speculation and conjecture."
That it was a growth was not supported by the testimony. Plaintiff actually had no knowledge what it was and so testified. His nephew testified at one point that it was a growth on the concrete and at another point that it was moving. His observation was fleeting through at least a foot of water, in the midst of the excitement of lifting his uncle from the water and seeing to his and his daughter's welfare. To accept his testimony that it was a growth, i.e., something which must have been there for some time and which defendant or its agents saw or should have seen, would be to base the conclusion on mere conjecture. Callahan v. National Lead Co., 4 N.J. 150, 155 (1950); Gaffney v. America on Wheels, 16 N.J. Super. 484, 486 (App. Div. 1951).
Additionally, several factors militate against plaintiff here. As stated above, defendant's superintendent testified that the pool was completely drained and scrubbed the night before the accident. We conclude that at the close of the entire case plaintiff had not submitted proof sufficient to justify the trial court's action in allowing the case to go to the jury. See Oelschlaeger v. Hahne & Co., 2 N.J. 490 (1949); Restatement, Torts, § 343; Prosser on Torts (2d ed. 1955), page 459. Defendant's motion for judgment at the close of the entire case should have been granted.
Reverse. Judgment for defendant is directed to be entered.
| 2023-09-19T01:27:17.760571 | https://example.com/article/7564 |
Q:
assistance with html and css
Im trying to make a loading page for my website but there is a white line along the top and one down the left side. Could someone please help me with this,
Thanks.
<DOCTYPE html>
<html>
<head>
<style>
html {
cursor: none;
}
.container {
background-color: black;
position: fixed;
width: 100%;
height: 100%;
z-index: 1000;
}
p {
color: white;
text-align: center;
position: absolute;
top: 0; bottom:0; left: 0; right:0;
font-family: courier;
font-weight: bold;
}
img {
position: absolute;
top: 0; bottom:0; left: 0; right:0;
margin: auto;
}
</style>
</head>
<body>
<div class="container">
<img src="progress.gif">
<p> Loading... Please wait </p>
</div>
A:
It's the default margin, you can add
body {
margin: 0;
}
to your css.
| 2024-04-08T01:27:17.760571 | https://example.com/article/3611 |
Relationship of core self-evaluations traits--self-esteem, generalized self-efficacy, locus of control, and emotional stability--with job satisfaction and job performance: a meta-analysis.
This article presents meta-analytic results of the relationship of 4 traits--self-esteem, generalized self-efficacy, locus of control, and emotional stability (low neuroticism) with job satisfaction and job performance. With respect to job satisfaction, the estimated true score correlations were .26 for self-esteem, .45 for generalized self-efficacy, .32 for internal locus of control, and .24 for emotional stability. With respect to job performance, the correlations were .26 for self-esteem, .23 for generalized self-efficacy, .22 for internal locus of control, and .19 for emotional stability. In total, the results based on 274 correlations suggest that these traits are among the best dispositional predictors of job satisfaction and job performance. T. A. Judge, E. A. Locke. and C. C. Durham's (1997) theory of core self-evaluations is used as a framework for discussing similarities between the 4 traits and their relationships to satisfaction and performance. | 2024-06-24T01:27:17.760571 | https://example.com/article/9064 |
Contact Us OFFSHORE DIMENSIONS LIMITED Plot 14A, Block 53, Adebayo Doherty Street, Off Admiralty Way, Lekki Phase 1, Lagos, Nigeria. Tel: +234 (0) 909 482 1641, +234 (0) 909 482 1645 USA Office Address: 5350 Old Dowlen Road, Beaumont TX 77706 USA. Email: parkerstore@offshoredimensions.com info@offshoredimensions.com sales@offshoredimensions.com
Use left/right arrows to navigate the slideshow or swipe left/right if using a mobile device | 2023-08-10T01:27:17.760571 | https://example.com/article/1595 |
Carson Wentz has had an MVP caliber season on the field, but Faithwire has been most interested in the faith revolution he’s led off the field.
An outspoken Christian and founder of the Ao1 Foundation, Wentz has been one of the few publicity bright spots for the NFL in a year of negative coverage due to the national anthem protests.
Yesterday afternoon during a game against the Rams, Wentz attempted to run for a touchdown and suffered a direct and awkward hit, which kept him on the ground for a few extra moments. Despite the injury being potentially season ending – and maybe worse – Wentz leaned strong into his faith:
NFC East Champs! So proud of the resiliency of this team. Such a special group of men.
And I greatly appreciate all the prayers! I know my God is a powerful one with a perfect plan. Time to just lean in to him and trust whatever the circumstances! #Proverbs3:5-6
Here’s a guy on top of the sports world, yet he still manages to keep a great perspective on life. Continued prayers for Wentz that the injury isn’t as bad as it looks. Here’s the play, during which
He actually played four more plays on the injured knee and ended up throwing his 4th touchdown of the game before being carted out of the stadium. If you have the stomach for it, check out what his knee looked like as he was walking around between plays:
He’s going for an MRI to get a final determination as to the extent of the injury. Please continue to pray that it’s not as severe as it looks, and more importantly that Carson will keep his faith as strong as it’s been in the good times. So far it seems that he is in good spirits despite the disheartening injury that appears to have derailed a season of so much promise.
Wentz has been very clear about what motivates him, and clearly God is using him in a big way. First, the Eagles team is seeing more people come to faith. Earlier this season we reported on the baptism they conducted during a road trip – in the hotel pool. The team also posted a lengthy produced segment talking about just how important faith is to the players, explaining all the Bible studies and intentional meetings they have to study and discuss God’s word. | 2024-03-18T01:27:17.760571 | https://example.com/article/3653 |
Protein kinase C modulation of cardiomyocyte angiotensin II and vasopressin receptor desensitization.
Angiotensin II (Ang II) and arginine vasopressin (AVP) increased intracellular free Ca2+ concentration [Ca2+]i and/or the [Ca2+]i transient rate (CaTR) in cultured neonatal rat cardiomyocytes. These agents increased membrane-bound protein kinase C (PKC) with peak activity at 5 and 10 minutes, respectively. Two-minute exposure to Ang II produced homologous desensitization to a repeated stimulation with Ang II and heterologous desensitization to AVP. Two-minute exposure to AVP also produced homologous desensitization to AVP but not heterologous desensitization to Ang II. When the AVP exposure time was increased from 2 to 10 minutes coincident with maximal AVP-mediated PKC activation, heterologous desensitization to Ang II was also observed. Acute activation (15 minutes) of PKC by phorbol 12-myristate 13-acetate (PMA) blocked responsiveness to both Ang II and AVP. When PKC activation was inhibited by 20 hours of prior exposure to PMA, as confirmed by PKC assay, homologous desensitization of Ang II still occurred, confirming an alternative mechanism(s) for homologous desensitization in the cardiomyocytes. In contrast, 20-hour PMA suppression of PKC markedly diminished the ability of the cardiomyocytes to exhibit AVP-mediated heterologous desensitization for Ang II. These data indicate that PKC activation plays a primary role in mediating vasopressin V1 receptor-induced heterologous desensitization of the Ang II receptor and participates in a hierarchy of two or more kinase systems mediating homologous desensitization of the Ang II receptor in cardiomyocytes. | 2024-03-15T01:27:17.760571 | https://example.com/article/6943 |
Validity of the Addiction Severity Index (adapted version) in a Costa Rican population group.
Until recently, no adapted and validated instrument was available for assessing the alcohol and drug problems of individuals in Costa Rica. This article reports the results of a study performed by Costa Rica's Institute on Alcoholism and Drug Dependence in order to test an adapted version of one such instrument, the Addiction Severity Index (ASI), in a Costa Rican setting. The instrument was used to interview 100 male subjects 18 to 64 years old (51 with diagnosed alcohol or drug problems and 49 controls). In general, the subjects with previously diagnosed alcohol or drug problems were assigned substantially higher scores. More specifically, statistical analysis indicated highly significant correlations (p less than 0.001) between the type of subject (test subject or control) and the likelihood that noteworthy problems would be found in the areas of alcohol use, family/social relations, work/finances, and psychological status. Overall, the study demonstrated that the instrument was capable of distinguishing between the affected and unaffected populations, and also of gauging the severity of the problems involved and the patients' treatment needs. | 2023-10-11T01:27:17.760571 | https://example.com/article/9320 |
Q:
AttributeError in Serializer Django
I am developing an app, and one of its features is that it can recognize the device, but sometimes it doesn't get anything back. It maybe an error from the API that i'm using.
The model Device is the following:
class Device(models.Model):
"""
"""
user = models.ForeignKey(get_user_model(), on_delete=models.CASCADE)
deviceModel = models.CharField(max_length=128, verbose_name=_(u"Device Model"))
deviceId = models.CharField(max_length=128, verbose_name=_(u"Device ID"))
packageId = models.CharField(max_length=128, verbose_name=_(u"Package ID"))
tokenId = models.TextField(verbose_name=_(u"Token ID"))
platformId = models.CharField(max_length=10, verbose_name=_(u"Plataforma ID"))
created_at = models.DateTimeField(auto_now=True, verbose_name=_(u"Created"))
updated_at = models.DateTimeField(auto_now=True, verbose_name=_(u"Updated"))
def __str__(self):
return u'Device: {0}'.format(self.deviceId)
def __unicode__(self):
return self.__str__()
def send_logout(self):
"""
Send logout Notification Message
"""
active_session = ActiveSession.objects.filter(
device=self
).first()
if active_session:
push_service = FCMNotification(api_key=settings.FCM_API_KEY)
data_message = {
"action": "Logout",
"token_id": active_session.token_jwt
}
push_service.single_device_data_message(
registration_id=self.tokenId,
data_message=data_message,
content_available=True
)
And the serializer is:
class DeviceSerializer(ModelSerializer):
def create(self, validated_data):
# Check if exist
device = Device.objects.filter(user=validated_data["user"], deviceId=validated_data['deviceId']).first()
today = timezone.now()
# If exist, update
if device:
device.tokenId = validated_data['tokenId']
device.updated_at = today
device.save()
logger.info("[Device] Updated deviceID {} with token {} for user {}".format(
validated_data['deviceId'],
validated_data['tokenId'],
validated_data["user"].username
))
else:
device = Device(**validated_data)
device.save()
logger.info("[Device] Created deviceID {} with token {} for user {}".format(
validated_data['deviceId'],
validated_data['tokenId'],
validated_data["user"].username
))
# Associate Device to ActiveSession
active_session = ActiveSession.get_active_session(self.context.get('request'))
active_session.device = device
active_session.save()
return device
class Meta:
model = Device
fields = ("id", "deviceModel", "deviceId", "packageId", "tokenId", "platformId")
The error that i get comes from this line active_session.device = device
I want to face this error by creating an exception for this AttributeError. But my mind is open for ideas.
The full traceback is this:
[ERROR] 15:12 Internal Server Error: /api/device/
Traceback (most recent call last):
File "/home/user/.local/lib/python2.7/site-packages/django/core/handlers/exception.py", line 39, in inner
response = get_response(request)
File "/home/user/.local/lib/python2.7/site-packages/django/core/handlers/base.py", line 187, in _get_response
response = self.process_exception_by_middleware(e, request)
File "/home/user/.local/lib/python2.7/site-packages/django/core/handlers/base.py", line 185, in _get_response
response = wrapped_callback(request, *callback_args, **callback_kwargs)
File "/home/user/.local/lib/python2.7/site-packages/django/views/decorators/csrf.py", line 58, in wrapped_view
return view_func(*args, **kwargs)
File "/home/user/.local/lib/python2.7/site-packages/rest_framework/viewsets.py", line 103, in view
return self.dispatch(request, *args, **kwargs)
File "/home/user/.local/lib/python2.7/site-packages/rest_framework/views.py", line 483, in dispatch
response = self.handle_exception(exc)
File "/home/user/.local/lib/python2.7/site-packages/rest_framework/views.py", line 443, in handle_exception
self.raise_uncaught_exception(exc)
File "/home/user/.local/lib/python2.7/site-packages/rest_framework/views.py", line 480, in dispatch
response = handler(request, *args, **kwargs)
File "/home/user/Downloads/ID/id/modules/api/views.py", line 69, in create
self.perform_create(serializer)
File "/home/user/Downloads/ID/id/modules/api/views.py", line 78, in perform_create
serializer.save(user=self.request.user)
File "/home/user/.local/lib/python2.7/site-packages/rest_framework/serializers.py", line 214, in save
self.instance = self.create(validated_data)
File "/home/user/Downloads/ID/id/modules/api/serializers.py", line 65, in create
active_session.device_test = device
AttributeError: 'NoneType' object has no attribute 'device_test'
A:
A AttributeError can happens in many cases, but is frequently happen when is try doing a wrong association with a related model. In this case, if your ActionveSessionModel has a different related_name to 'device', the 'device' does not be found.
https://docs.djangoproject.com/en/2.2/topics/db/models/#be-careful-with-related-name-and-related-query-name
https://github.com/django/django/blob/master/django/db/models/fields/related_descriptors.py#L98
| 2023-08-27T01:27:17.760571 | https://example.com/article/6480 |
/**
* Copyright (C) 2010-2016 eBusiness Information, Excilys Group
* Copyright (C) 2016-2020 the AndroidAnnotations project
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed To in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
package org.androidannotations.test;
import static org.fest.assertions.api.Assertions.assertThat;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.robolectric.Robolectric;
import org.robolectric.RobolectricTestRunner;
@RunWith(RobolectricTestRunner.class)
public class ServiceInjectionTest {
private ActivityWithServices_ activity;
@Before
public void setUp() {
activity = Robolectric.buildActivity(ActivityWithServices_.class).create().get();
}
@Test
public void servicesAreInjected() {
// in alphabetical order
assertThat(activity.accessibilityManager).isNotNull();
assertThat(activity.accountManager).isNotNull();
assertThat(activity.activityManager).isNotNull();
assertThat(activity.alarmManager).isNotNull();
// assertThat(activity.appOpsManager).isNotNull(); // TODO API 19
assertThat(activity.appWidgetManager).isNotNull();
assertThat(activity.audioManager).isNotNull();
// assertThat(activity.backupManager).isNotNull(); // hidden API
// assertThat(activity.batteryManager).isNotNull(); // TODO API 21
// assertThat(activity.bluetoothManager).isNotNull(); // TODO API 18
// assertThat(activity.cameraManager).isNotNull(); // hidden API
// assertThat(activity.captioningManager).isNotNull(); // TODO API 19
// assertThat(activity.carrierConfigManager).isNotNull(); // TODO API 23
assertThat(activity.contentClipboardManager).isNotNull();
assertThat(activity.textClipboardManager).isNotNull();
assertThat(activity.connectivityManager).isNotNull();
// assertThat(activity.consumerIrManager).isNotNull(); // TODO API 19
// assertThat(activity.countryDetector).isNotNull(); // hidden API
assertThat(activity.devicePolicyManager).isNotNull();
// assertThat(activity.displayManager).isNotNull(); // TODO API 17
assertThat(activity.downloadManager).isNotNull();
assertThat(activity.dropBoxManager).isNotNull();
// assertThat(activity.ethernetManager).isNotNull(); // hidden API
// assertThat(activity.fingerprintManager).isNotNull(); // TODO API 23
// assertThat(activity.hardwarePropertiesManager).isNotNull(); // TODO API 24
// assertThat(activity.hdmiControlManager).isNotNull(); // hidden API
// assertThat(activity.inputManager).isNotNull();
assertThat(activity.inputMethodManager).isNotNull();
// assertThat(activity.jobScheduler).isNotNull(); // TODO API 21
assertThat(activity.keyguardManager).isNotNull();
// assertThat(activity.launcherApps).isNotNull(); // TODO API 21
assertThat(activity.layoutInflater).isNotNull();
assertThat(activity.locationManager).isNotNull();
// assertThat(activity.mediaProjectionManager).isNotNull(); // TODO API 21
assertThat(activity.mediaRouter).isNotNull();
// assertThat(activity.mediaSessionManager).isNotNull(); // TODO API 21
// assertThat(activity.midiManager).isNotNull(); // TODO API 23
// assertThat(activity.networkScoreManager).isNotNull(); // hidden API
// assertThat(activity.networkManagementService).isNotNull(); // hidden API
// assertThat(activity.networkPolicyManager).isNotNull(); // hidden API
// assertThat(activity.networkStatsManager).isNotNull(); // TODO API 23
assertThat(activity.nfcManager).isNotNull();
assertThat(activity.notificationManager).isNotNull();
// assertThat(activity.nsdManager).isNotNull(); // TODO no support yet in
// Robolectric
// assertThat(activity.persistentDataBlockManager).isNotNull(); // hidden API
// assertThat(activity.printManager).isNotNull(); // TODO API 19
assertThat(activity.powerManager).isNotNull();
// assertThat(activity.restrictionsManager).isNotNull(); // TODO API 21
assertThat(activity.searchManager).isNotNull();
assertThat(activity.sensorManager).isNotNull();
// assertThat(activity.serialManager).isNotNull(); // hidden API
// assertThat(activity.sipManager).isNotNull(); // hidden API
// assertThat(activity.shortcutManager).isNotNull(); // TODO API 25
// assertThat(activity.statusBarManager).isNotNull(); // hidden API
assertThat(activity.storageManager).isNotNull();
// assertThat(activity.subscriptionManager).isNotNull(); // TODO API 22
// assertThat(activity.systemHealthManager).isNotNull(); // TODO API 24
// assertThat(activity.telecomManager).isNotNull(); // TODO API 21
assertThat(activity.telephonyManager).isNotNull();
assertThat(activity.textServicesManager).isNotNull();
// assertThat(activity.throttleManager).isNotNull(); // hidden API
// assertThat(activity.trustManager).isNotNull(); // hidden API
// assertThat(activity.tvInputManager).isNotNull(); // TODO API 21
assertThat(activity.uiModeManager).isNotNull();
// assertThat(activity.updateLock).isNotNull(); // hidden API
// assertThat(activity.usageStatsManager).isNotNull(); // TODO API 21
assertThat(activity.usbManager).isNotNull();
// assertThat(activity.userManager).isNotNull(); // TODO API 19
assertThat(activity.vibrator).isNotNull();
assertThat(activity.wallpaperManager).isNotNull();
assertThat(activity.wifiManager).isNotNull();
// assertThat(activity.wifiPasspointManager).isNotNull(); // hidden API
assertThat(activity.wifiP2pManager).isNotNull();
// assertThat(activity.rttManager).isNotNull(); // hidden API
assertThat(activity.windowManager).isNotNull();
}
@Test
public void methodInjectedAppWidgetManager() {
assertThat(activity.methodInjectedAppWidgetManager).isNotNull();
}
@Test
public void serviceWithMethodAnnotation() {
assertThat(activity.serviceWithMethodAnnotation).isNotNull();
}
@Test
public void serviceWithParameterAnnotation() {
assertThat(activity.serviceWithParameterAnnotation).isNotNull();
}
@Test
public void multipleService() {
assertThat(activity.firstMultipleService).isNotNull();
assertThat(activity.secondMultipleService).isNotNull();
}
}
| 2023-12-31T01:27:17.760571 | https://example.com/article/1399 |
Q:
Why Newtonsoft Serializer sorting dictionary items and how to avoid that?
When I have dictionary (IDictionary) items (in C#) with random string keys, I get the JSON object as:
{
"Y21qf39sXRU=":"A",
"/N+BQBzpdkA=":"A+",
"HQ5dFtxIsGo=":"B",
"2i4tdo427Sw=":"ACCOUNTANT",
"W6EuZP1+iKY=":"Accountant",
"eaSybclf0ww=":"Client", .... //and so on
But when I change keys to numeric keys, items in the dictionary gets sorted by keys as :
{
"1":"Closed Accounts",
"260":"A",
"283":"Client",
"334":"Accountant",
"437":"new CATEGORY",
"757":"Prospect",
"973":"A+",
"1099":"B", ....
Why is Newtonsoft.JSON serializer doing this and how to avoid sorting on numeric keys?
I want results as ordered in first JSON (as coming sorted from database). I know I can again do sorting of results, but for now I want to avoid doing that.
A:
By definition, a dictionary is unordered. How it ends up being ordered is often the result of some hash function. Indeed, it's not even certain to produce the same order twice in a row with the same data set. Some implementations will maintain order as a courtesy, or if you force it with some flag, but these are hacks. If you need something to be ordered, you need to use a different data structure. Unfortunately for you, JSON's only other structure is the array, so use an array. If you have to have pairs, use an array of dictionaries where each dictionary has only a single key-value pair.
| 2024-01-10T01:27:17.760571 | https://example.com/article/4216 |
ADEN, Aug 10 (Reuters) - Yemen's southern separatists have taken effective control of Aden, seat of the internationally recognised government, fracturing the Saudi-led coalition which is trying to break the grip of the Iran-aligned Houthi movement on the country.
The coalition late on Saturday threatened military action to halt the fighting and ordered the separatists to withdraw from government military camps they seized in the southern port city. Riyadh called for an emergency summit to restore order.
The Saudi-backed government of Abd-Rabbu Mansour Hadi earlier called the move by the Southern Transitional Council (STC), which is backed by coalition member the United Arab Emirates, a coup.
Although the separatists have a rival agenda to Hadi's government, they have been part of the Sunni Muslim coalition that intervened in Yemen in 2015 against the Houthis after they ousted Hadi from power in the capital Sanaa in late 2014.
"We call on all components and military formations of the Transitional (STC) ... to immediately return to their positions and withdraw from the positions that have been seized," coalition spokesman Turki al-Malki said in a statement.
The STC agreed to the ceasefire. "The spokesman of the Southern Transitional Council confirmed its adherence to the ceasfire called for by the leadership of the Saudi-led coalition," the council said in a statement.
The coalition ordered an immediate ceasefire as of 1:00 a.m. local time on Sunday, he said, and would use military force against those who violate it.
The violence complicates the United Nations' efforts to end a four-year war that has killed tens of thousands and pushed the poorest Arabian Peninsula nation to the brink of famine.
Four days of clashes between the separatists and government forces have killed at least nine civilians and more than 20 combatants, medical sources said. The fighting trapped civilians in their homes with dwindling water supplies.
An STC official told Reuters the separatists were in talks to peacefully take over the all-but-empty presidential palace in the predominantly residential Crater district, after a military official earlier said it had been seized.
The separatists have moved into the interior minister's house after he was evacuated by coalition forces, officials said. President Hadi is based in the Saudi capital Riyadh.
Saudi Arabia's Vice Minister of Defense Khalid bin Salman called on parties in Aden to let prudence and dialogue prevail and unify ranks against the Houthis.
"We reject any use of arms in Aden and disturbing the security and stability, and we call for restraint.. Therefore, the Kingdom called for a political dialogue with the legitimate Yemeni government in Jeddah," he said in a tweet.
The UAE, which has armed and trained thousands of southern separatist fighters, earlier called for calm and unity. Its foreign minister urged U.N. envoy Martin Griffiths, who is trying to de-escalate tensions across Yemen, to help as well.
COALITION'S HAND WEAKENED
The clashes began on Wednesday after the separatists accused an Islamist party allied to Hadi of complicity in a missile attack on a southern forces military parade in Aden, which was claimed by the Houthis.
Analysts say the Houthis may have used the attack to test dynamics on the ground after the UAE in June scaled down its presence under pressure from Western allies to end the war and concerns about rising tensions with Iran in the Gulf.
The separatists' move against Hadi could weaken the coalition's hand in any negotiations with the Houthis.
"It's good news for the Houthis and really bad news for the Saudis. ... It ends the exclusivity of the Houthis being the coup against Hadi," Farea al-Muslimi, associate fellow at Chatham House, told Reuters.
The Houthi said the Aden events proved Hadi's government, which holds Aden and a string of western coastal towns, was unfit to rule.
"It is time for the main powers on the ground to hold serious and constructive talks to take Yemen towards a federation that appeases all sides under a united national framework," the group's deputy foreign minister Hussein al-Azzi tweeted.
The United Nations is trying to implement a stalled peace deal in the main port city of Hodeidah, further to the north, to pave the way for wider political negotiations to end the war.
The Houthis, who control Sanaa, Hodeidah and other urban centres, have stepped up missile and drone attacks on Saudi cities, escalating tensions.
The Yemen conflict is widely seen in the region as a proxy war between Saudi Arabia and Iran. The Houthis say their revolution is against corruption. (Reporting by Reuters team in Yemen; Additional reporting by Stephen Kalin in Riyadh, Nayera Abdallah and Samar Hassan in Cairo and Maher Chmaytelli and Tuqa Khalid in Dubai; Writing by Ghaida Ghantous; editing by John Stonestreet, Kirsten Donovan and Richard Chang) | 2024-04-25T01:27:17.760571 | https://example.com/article/2971 |
Q:
Is there an efficient way to concatenate strings in golang templates
For example, there is a function like that:
func TestFunc(str string) string {
return strings.Trim(str," ")
}
It runs in the example below:
{{ $var := printf "%s%s" "x" "y" }}
{{ TestFunc $var }}
Is there anyway to concatenate strings with operators in template ?
{{ $var := "y" }}
{{ TestFunc "x" + $var }}
or
{{ $var := "y" }}
{{ TestFunc "x" + {$var} }}
It gives unexpected "+" in operand error.
I couldnt find it in documentation (https://golang.org/pkg/text/template/)
A:
There is not a way to concatenate strings with an operator because Go templates do not have operators.
Use the printf function as shown in the question or combine the calls in a single template expression:
{{ TestFunc (printf "%s%s" "x" "y") }}
If you always need to concatenate strings for the TestFunc argument, then write TestFunc to handle the concatenation:
func TestFunc(strs ...string) string {
return strings.Trim(strings.Join(strs, ""), " ")
}
{{ TestFunc "x" $var }}
| 2024-05-11T01:27:17.760571 | https://example.com/article/9632 |
Background
==========
Parkinson\'s disease (PD) is a neurodegenerative disorder affecting the motor system including motor coordination and speed as well as producing rigidity and tremor. The symptoms of PD are mainly due to a progressive loss of dopaminergic neurons within the pars compacta of the substantia nigra (SNpc). This degeneration decreases the levels of the neurotransmitter dopamine in the nigrostriatal system. In the past 15 years, an increasing amount of evidence has emerged to suggest that inflammation may contribute to nigrostriatal pathway degeneration and accelerate the progression of pathology in PD patients. Within the microenvironment of the brain, glial cells play a critical role in homeostatic mechanisms that promote neuronal survival. There is a long history demonstrating, at least a casual link, in humans between microglia activation and PD, including early studies, which showed activated microglia in the substantia nigra of PD patients and people exposed to MPTP \[[@B1],[@B2]\]. The contribution of microglia activation to the degenerative process in PD is presently unknown, but is likely to have a damaging rather than a beneficial role \[[@B3]\].
In animal models that mimic many aspects of Parkinson disease, activated microglia have been shown capable of damaging and killing neurons (For reviews on the topic see: \[[@B3],[@B4]\]). However microglia do not typically kill neurons unless they are activated by a \'danger signal\' such as the release of ATP, DNA, or mitochondria from a cell, which can occur when a cell dies and is not efficiently cleared \[[@B5]\]. While \'danger signals\' can activate microglia there are also a number of suppressive signals that neurons use to induce \'immune tolerance\' to protect the neurons from being killed. Recent evidence indicates that neurons are not only passive targets of microglia but rather can control microglial activity. Fractalkine (CX3CL1) is one of the signals that neurons constitutively express that plays a \'calming\' role to reduce microglial activation by ligation of CX3CL1 to a G-protein coupled receptor (CX3CR1) present on microglia. CX3CL1 is a transmembrane chemokine and exists in both membrane-bound and soluble forms. Its membrane-bound form displays adhesion properties and consists of an intracellular domain and a transmembrane domain \[[@B6],[@B7]\]. Soluble CX3CL1 form results from the cleavage of membrane-bound CX3CL1 by the metalloproteinase ADAM 10 and ADAM 17 \[[@B8],[@B9]\].
In contrast to many other chemokines, CX3CL1 binds to only one receptor (CX3CR1). This receptor responds to membrane-bound CX3CL1 and to the soluble form. CX3CL1 acts *in vitro*as an anti-inflammatory molecule by down regulating IL-1β, TNF-α and, IL-6 production \[[@B10],[@B11]\]. CX3CL1 has an essential role in protecting the brain from a dysregulated microglial response that leads to neurotoxicity \[[@B12]\]. Yet, while it is clear that complete loss of CX3CL1 signaling leaves neurons susceptible to microglia mediated neuronal injury and death, however it is not clear if supraphysiological levels of CX3CL1 would be neuroprotective. CX3CL1 and the CX3CL1 receptor are normally expressed at relatively high levels in the brain \[[@B12],[@B13]\]. It has been shown that there are age related changes in CX3CL1 \[[@B14],[@B15]\], but there is not a complete loss. Moreover, it is not known, at normal physiological conditions, if CX3CL1 or the CX3CR1 are in excess. As this signaling pathway is very important for regulating inflammation in the brain, it is likely that the ligand would be in excess to ensure tight regulation of the immune response. When neurons are lost there will be changes to the levels of CX3CL1. Surrounding \'healthy\' neurons could be left vulnerable to the neuroinflammatory response due to the altered local CX3CL1 changes. Therefore, this study sought to determine if the CX3CL1 pathway could be a therapeutic target to prevent excessive microglia activation that contributes to neurodegenerative disease in the 6-OHDA, toxin induced, model of Parkinson\'s disease. The results of this study demonstrate that even small increases in CX3CL1 can be neuroprotective, by suppressing microglia activation.
Methods
=======
Animals
-------
All experiments were conducted in accordance with the National Institute of Health Guide and Use of Laboratory Animals, and were approved by the Institutional Animal Care and Use committee of the University of South Florida, College of Medicine. 3 months old male Fisher 344 (F344) rats (Harlan Sprague Dawley, Indianapolis, IN), were pair-housed in environmentally controlled conditions (12:12 h light:dark cycle at 21 ± 1°C) and provided food and water *ad libitum.*Animals were excluded from the study if they developed post-surgery infection, the osmotic pump or cannula was dislodged, or placement of the cannula was not at specified coordinates on post-mortem evaluation.
Surgical Procedures
-------------------
All surgical procedures, followed previously described methods \[[@B14],[@B16]\]. Rats were anaesthetized with isofluorane. Depth of anesthesia was monitored and adjusted as necessary. All procedures were performed using sterile techniques. Briefly, the head was incised using a sterile scalpel blade; bleeding was minimized using cotton swabs. A hole was drilled for placement of a skull screw to be used as anchors for dental acrylic. A second hole was drilled over the dorsal striatum for placement of a cannula at the following coordinates: AP = +1.0 mm; ML = +3.0 mm and V = -4.5 mm. 6-OHDA (20 μg/4 μL) was infused at a rate of 0.5 μL per minute into the left striatum (PMID: 17346684). Immediately after the 6-OHDA lesion a stereotactically implanted cannula (coordinates: AP = +1.0 mm; ML = +3.0 mm and V = -4.5 mm) was affixed to the skull by dental acrylic and attached to and osmotic minipump inserted subcutaneously, for a sustained delivery of saline for 7 days. After the first 7 days, a mid-scapular incision was made and the saline pump was switched for the treatment pump to deliver 3 ng/day (n = 5), 30 ng/day (n = 4), or 90 ng/day (n = 5) of CX3CL1 or 90 ng/day of heat-inactivated fractalkine (n = 6) (as a control) for 28 days into the site of the lesion (*Alzet model 2004: pumping rate 0.25 μl/hr (± 0.05 μl/hr); total volume 1.0 mL*) as previously described \[[@B14]\]. After day 28 the rats were anesthetized and perfused transcardially with phosphate buffered saline (PBS) followed by 4% paraformaldehyde. Brains were then removed and postfixed in paraformaldehyde overnight; they were then transferred to a 30% sucrose/PBS solution for at least 16 hours. Coronal sections were cut (40 μm) using a cryostat and the sections were collected and stored in a cryoprotectant solution at -20° until processing.
Immunohistochemistry
--------------------
Tyrosine hydroxylase (TH) immunohistochemical staining was performed on free floating sections on every third sections for the striatum and every sixth section for the entire substantia nigra. With a random start, and including sections before and after both anatomical regions to make sure the entire structure was quantified. Using standard staining procedure the sections were pretreated with tris buffered saline/NaIO4 (sodium periodate) for 20 minutes at RT (60 rpm) to block endogenous peroxidase activity. Then washed with 0.1 M PBS (pH 7.2-7.5). Tissue was then blocked with a PBS/0.3% triton X-100/10% serum (Normal Horse serum; Lampire Biological Labs; cat \# 7333400) mixture for one hour at room temperature. Sections were then incubated with the primary antibody (mouse anti-TH, 1:10,000; Immunostar cat\# 22941) diluted into 3% horse serum with 0.3% Triton X-100 overnight at 4°C. The following day the sections were washed and then incubated for one hour with a biotinylated horse anti-mouse as secondary antibody (Vector cat\# BA-2001) at a concentration of 1:1000 in PBS-TS for an hour at room temperature. The secondary antibody was amplified using avidin-biotin substrate (ABC solution, Vector Cat\# PK-6100) for 1 hour at room temperature. Finally the sections were developed with 3,3\'-Diaminobenzidine tetra-hydrochloride (SIGMA FAST ™ DAB). Sections were then mounted onto glass slides and dried overnight. The next day slides were pass trough a gradient of ethyl alcohol and xylene to dehydrate the tissue. The slides were then coverslipped using permount mounting medium (Thermo Fisher Scientific Inc. Cat. \# SP15-500).
OX-6, a marker for MHCII positive microglia, immunohistochemical staining was performed on free-floating sections following standard staining procedures with the following adjustments: One in every third section was stained including beginning to end of the striatum and one in every six section was used beginning to end of the substantia nigra. Sections were washed three times in PBS, then tissue endogenous peroxidase activity was quenched using 0.3% H~2~O~2~solution combined with 40% methanol for 20 min preceded by washing with PBS three times. Tissue was then blocked with 10% normal horse serum and 0.3% Triton X-100. Monoclonal antibody was used as primary antibody directed against the rat major histocompatibility II (mouse anti-RT1B; BD cat\# 554926) at a concentration of 1:750 into PBS-TS solution overnight at 4°C. On day 2 of this protocol, tissue was washed three times with a solution of PBS enhanced with 3% horse serum. Sections were then incubated with biotinylated secondary antibody (Horse anti-mouse with a concentration of 1:300 from Vector cat \# BA-2001) for an hour at room temperature. The staining proceeded as described for TH above with the exception that the DAB used contained metal enhancer (Vector Cat\# SK-4100).
NeuN immunohistochemistry was performed as previously mentioned following the standard staining procedures to stain one in sixth free floating sections of the substantia nigra. With the following alterations: To quench endogenous peroxidase a solution of 40% methanol/2% H~2~O~2~was used. Additional washes proceded by a one hour incubation with blocking solution of 10% horse serum and 0.3% Triton X-100. Primary antibody incubation was performed using mouse anti-NeuN (Millipore Cat\# 3777) with a concentration of 1:1000 diluted into PBS-TS solution overnight at 4°C. On the following day of this protocol tissue was washed three times with PBS enhanced with 3% horse serum. Sections were then incubated with a biotinylated secondary antibody horse anti-mouse (from Vector cat \# BA-2001) at a concentration of 1:300 for an hour at RT in PBS-TS. The staining continued as indicated above for TH staining.
Stereological Quantification
----------------------------
Stereological methods were used for quantification of cells present in the tissue stained as previously described \[[@B14],[@B16]\]. Briefly, tissue was viewed with an Olympus BX60 microscope and MicroBrightField, CX 9000 camera. The tissue was quantified using optical fractionator from MicroBrightField, software of Stereo Investigator (Ver.8). The estimated volume (μm^3^) of TH negative zones was quantified using cavalieri method of unbiased stereology in the striatum of every third section. Also, the expression of OX-6 positive cells was quantified in the striatum through the use of cavalieri. Both staining were quantified using a grid spacing of 200 μm using a 2x/0.06 objective. TH positive cells are quantified within the area of the substantia nigra pars compacta. The sampling site is customized to count 200 cells per brain sampling was with error coefficients less than 0.07. For counting TH positive cells the counting frame (CF) is 70 × 70 with a virtual counting grid (CG) of 140 × 140. For OX-6 cells CF is 400 × 300 and CG of 400 × 300. For NeuN stain CF is 75 × 75 and CG is 160 × 160.
Statistical Analysis
--------------------
Data are presented as mean cell number ± SEM averaged across subjects per group, or mean volume ± SEM averaged across subjects. Statistical comparison of the data was performed using GraphPad Prism version 5.00 for Windows (GraphPad Software, San Diego California USA, <http://www.graphpad.com>). Group interaction was analyzed with one-way ANOVA, followed by Tukey post-hoc analysis.
Results
=======
CX3CL1 protects against 6-OHDA induces dopamine cell loss and neurodegeneration
-------------------------------------------------------------------------------
Intrastriatal 6-OHDA induces loss of dopamine terminals in the striatum and cell loss in the SNpc and is used as model of PD like neurodegeneration. Figure [1](#F1){ref-type="fig"} shows the loss of the TH immunoreactivity in the striatum of rats 5 weeks after an injection of 6-OHDA. PD is a slowly progressing neurodegenerative disease, which requires substantial cell loss of the substantia nigra to occur before clinical symptoms are evident. To determine if the CX3CL1 signaling pathway could be protective during the progressive degenerative phase of the disease we began a sustained intrastriatal infusion by osmotic minipump of CX3CL1 beginning one week after the initial insult of 6-OHDA and lasting for four weeks. Three doses of CX3CL1 (3, 30, or 90 ng/day) were tested in this model and compared to treatment with heat inactivated (HI)-CX3CL1. As shown in Figure [1](#F1){ref-type="fig"}, all three doses of CX3CL1 resulted in a marked protection of the TH^+^terminals in the striatum. Quantification of the amount TH^+^terminals loss showed that all three concentration of CX3CL1 resulted in a similar 50% reduction in the size of the TH negative zone (Figure [1.E](#F1){ref-type="fig"}). The amelioration of the lesion size by CX3CL1 was significant for all three doses. There was no difference between the different doses in the ability to protect the terminal from degeneration.
![**CX3CL1 reduces 6-OHDA induced lesion volume in striatum**: photomicrographs representing TH immunohistochemistry following a 6-OHDA lesion. In the dorsal striatum a noticeable decrease of TH immunoreactivity is seen in the control group (HI CX3CL1; A) as compared to the groups who received exogenous CX3CL1 for 28 days; 3 ng (B), 30 ng (C) CX3CL1 90 ng (D). Bar denotes 0.5 mm. Quantification of the TH negative zone in the striatum of 3-month-old rats as determined by the Cavalieri method of unbiased stereology, demonstrates significant decrease in the TH negative immunoreactivity when CX3CL1 was administered at the different concentrations (3, 30, and 90 ng) for 28 days (E). The group that received HI-CX3CL1 had a significant larger lesion size. These findings indicate that CX3CL1 plays a neuroprotective role in the 6-OHDA model of Parkinson disease. One way ANOVA testing \[F~(3,19)~= 7.149, p = 0.0029\]. Asterisk denotes significance (\* P \< 0.05) of Tukey *post-hoc*analysis compare to HI-CX3CL1 group.](1742-2094-8-9-1){#F1}
CX3CL1 suppress the activation of microglia in the striatum following a 6-OHDA insult
-------------------------------------------------------------------------------------
Signaling by CX3CL1 to the only known receptor, CX3CR1, has been shown to be critical for restraining microglia activation. Moreover, in the CNS, CX3CR1 is only expressed on microglia \[[@B12],[@B13],[@B17]\]. The CX3CL1effects demonstrated by CX3CL1 in protecting the TH^+^terminals were hypothesized to occur by suppression of microglia activation. The major histocompatibility complex II (MHCII) is normally undetectable on microglia. Activation of the microglia induces MHCII expression, and presumably indicates a detrimental form of microglia activation. To assess the activation of microglia we stained for MHCII expression using the antibody OX-6. As shown in figure [2](#F2){ref-type="fig"}, at 5 weeks after the 6-OHDA insult there was a large volume of OX-6 positive staining in the striatum of the HI-CX3CL1 treated rats. As can be observed in figure [2B-C](#F2){ref-type="fig"}, there was a reduction in MHCII staining in the CX3CL1 treated animals. Using cavalieri method to assess the volume of MHCII expression we compared the effect of CX3CL1 in the STR in all of the groups (Figure [2E](#F2){ref-type="fig"}). A significant decrease in the volume of OX-6 positive cells was found in the rats treated with 30 or 90 ng/day of CX3CL1.
![**CX3CL1 suppresses microglia activation**: Micrographs of OX-6 positive cells (MHCII; a marker for actived microglia) show a large increase in OX-6 staining in the control treated animals 5 weeks after a 6-OHDA in to striatum (A). Twenty-eight days infusion of CX3CL1 3 ng (B), CX3CL1 30 ng (C), or CX3CL1 90 ng (D), beginning 7 days after the insult with 6-OHDA show a clear reduction in OX-6 staining. Bar denotes 0.5 mm. Arrow denotes ameboid microglial cell (Panel A). Quantification of OX-6 immunoreactivity, by the Cavalieri method, found a significant decrease in OX-6 expression when exogenous CX3CL1 was administered (30 ng and 90 ng) as compared to the heat inactivated control (E). One way ANOVA testing \[F~(3,19)~= 4.172, p = 0.0232\]. Asterisk denotes significance (\* P \< 0.05) of Tukey *post-hoc*analysis compare to HI-CX3CL1 group.](1742-2094-8-9-2){#F2}
Neuronal loss and microglia activation in the substantia nigra is reduced by treatment with CX3CL1
--------------------------------------------------------------------------------------------------
To assess if this increased TH fiber density in the striatum reflected a protection from cell death in the substantia nigra TH positive cells were counted in the SNpc. Treatment with CX3CL1 at 3, 30, and 90 ng of CX3CL1 resulted in significant protection from loss of TH^+^cells compared with HI-CX3CL1 (Figure [3E](#F3){ref-type="fig"}). To confirm that the loss of TH^+^cells reflected cell death, NeuN immunoreactive cells were also counted in the SNpc (Figure [3F](#F3){ref-type="fig"}). The number of NeuN cells confirmed the results observed with TH^+^immunohistochemistry that the administration of exogenous soluble CX3CL1 helped protect the cell loss in the substantia nigra. While CX3CL1 was delivered directly into the striatum, protection of the terminals in the striatum could result in decreased microglia activation in the substantia nigra as a secondary interaction of less dying neurons. Quantification of the number of OX-6 positive cells in the SNpc confirmed this hypothesis (Figure [3G](#F3){ref-type="fig"}), and indicates that blocking inflammation in the striatum can decrease the inflammatory cascade in the substantia nigra.
![**Neurodegeneration is prevented in the substantia nigra**. Photomicrographs of TH immunoreactivity in substantia nigra demonstrate a noticeable decrease in TH immunoreactivity in the control groups (A) as compared to the groups that received 3 ng (B), 30 ng (C) and 90 ng of CX3CL1 (D). Bar denotes 0.2 mm. (E) Quantification of the number of TH^+^cells in the substantia nigra shows a significant decrease of TH immunoreactivity in the substantia nigra of animals who receive HI CX3CL1 (control treatment) but this affect was reversed when animals received 3, and 90 ng exogenous soluble CX3CL1 through and osmotic minipump for 28 days one week after a lesion with 6-OHDA. One-way ANOVA, \[F~(3,19)~= 9.498, p = 0.0008\]. Asterisk denotes significance (\* P \< 0.05) compare to HI-CX3CL1 group; † denotes significance († P \< 0.05) compare to 90 ng CX3CL1 group as determined by Tukey *post-hoc*analysis. (F) Quantification of NeuN (neuronal nuclei marker) immunohistochemistry in substantia nigra shows a significant decrease in the HI-CX3CL1 control group as compared to the groups of animals treated with 3ng and 90 ng of CX3CL1. One-way ANOVA, \[F~(3,19)~= 7.359, p = 0.0026\]. Asterisk denotes significance (\* P \< 0.05) of Tukey *post-hoc*analysis compare to HI-CX3CL1 group. (G) An increase in the number of OX-6^+^cells in substantia nigra was found in the HI-CX3CL1 control group. CX3CL1This was significantly decreased by all three doses of CX3CL1. One-way ANOVA, \[F~(3,19)~= 19.04, P \< 0.0001\]. Asterisk denotes significance (\* P \< 0.05) compare to HI-CX3CL1 group by Tukey *post-hoc*analysis.](1742-2094-8-9-3){#F3}
Discussion
==========
This study sought to determine if the CX3CL1/CX3CR1 axis would be amendable to therapeutic intervention in a disease relevant animal model with a known inflammatory component as part of the neurodegeneration. The results of this study lend support to an important role of CX3CL1 in maintaining immune tolerance in the CNS. Following treatment with CX3CL1 neuronal protection was found that correlated with a reduction in microglia activation. Since microglia are the predominant cells in the CNS that express the CX3CL1 receptor, the effects of CX3CL1 are most likely a direct effect on microglia activity \[[@B12],[@B13],[@B17]\]. The state of microglia was assessed by the expression of MHCII, which is an often-used maker of a classical (M1) proinflammatory state of activation. However, it should be noted that in this study we can only infer from the changes in MHCII expression that CX3CL1 exerted the effects by reducing inflammation, as no direct cytokine measurements such as levels of IL-1β or iNOS were made. CX3CL1/CX3CR1 is important for suppressing the production of TNFα, IL-1β, IL-6 and INOS \[[@B11],[@B12],[@B18]\]; therefore, this effect of CX3CL1 to reduce cytokines and alter microglial phenotype away from M1 is the most likely interpretation of the data. There is a possibility that cannot be excluded from the results of this study, that exogenous CX3CL1 is having effects on cells other than microglia. CX3CR1 is expressed on a subset of dendritic cells and natural killer cells, peripheral blood monocytes and tissue macrophages \[[@B19]\]. *In vivo*neurons do not appear to have detectable levels of CX3CR1 \[[@B12],[@B17]\], so while effects on other subsets of immune cells can not be ruled out, it is very unlikely that there is a direct effect of CX3CL1 of neurons.
An unexpected finding of this study was the lack of a dose response. A slight dose response was seen in some of the measurements, but a significant difference between the different treatment doses was not found. It is possible that the range of doses of CX3CL1 chosen in this study were too narrow to demonstrate a dose response. A second possibility for the lack of the dose response is that this signaling pathway, which is tonically activated during normal physiological conditions, has only a limited extra capacity to suppress glia activation. Therefore at doses above 3ng/day of CX3CL1 there is an excess of CX3CL1 to the amount of receptor available. It has been previously shown that by 7 days after a MPP^+^lesion in rats there is an increase in CX3CR1 protein levels in the substantia nigra; however, similar quantification was not made of CX3CL1 \[[@B20]\]. It is therefore unknown if a commensurate change in CX3CL1 is also found. Our results would suggest there is an increase CX3CR1 expression without a parallel increase in CX3CL1, leading to an imbalance in the CX3CR1/CX3CL1 axis. This imbalance is akin to what is seen in the CX3CR1 KO mice where disruption in the CX3CR1/CX3CL1 axis leads to neurotoxic inflammation \[[@B12]\].
A final possibility for the lack of a dose response could be due to a floor affect. Such that, 50% of the lesion occurs by 7 days before CX3CL1 treatment began, and this primary neurodegeneration cannot be reversed by CX3CL1 treatment; however, further neurodegeneration can be blocked by CX3CL1 treatment. We have previously observed in this model that there is a late phase of microglial activation that continues to increase from 1 to 4 weeks following the lesion and that if we block this late phase of inflammation we get neuroprotection; however, if we block the initial inflammation we can worsen neurodegeneration \[[@B16],[@B21]\]. Nevertheless, all of the different concentrations of CX3CL1 showed neuroprotection in this Parkinson disease relevant model. This suggests that the communication between neurons and glial cells may play a role in Parkinson disease neurodegeneration.
Several reports have shown that CX3CL1 expression decreases during aging, and this decrease correlates with increased inflammation \[[@B14],[@B15]\]. Consequently, changes in CX3CL1 could be important for the dysregulation of microglia in the age-related neurodegenerative disease. Interruption of the CX3CL1/CX3CR1 axis by genetic deletion causes neurodegeneration following stimulation with lipopolysaccharide, MPTP, or SOD1 mutation \[[@B12]\]. Finally, a large single-bolus of CX3CL1 injected into the substantia nigra has been shown to induce a Parkinson disease like symptoms or even cause death. However, it should be noted that the control for this injection of CX3CL1 was normal saline. It is therefore, unknown if the effects seen are due to the injection of a large amount of recombinant protein, the bovine serum albumin that was used as a carrier for the CX3CL1, or if the effect is indeed specific to CX3CL1 \[[@B20]\].
Conclusions
===========
In conclusion, this study demonstrates that the CX3CL1/CX3CR1 axis is an important target for drug discovery to modulate microglia activation in PD. Therefore, in the future it will be important to develop selective small-molecule agonists for CX3CR1 that are orally bioavailable and brain-penetrant. However, more work is also necessary to determine the role of CX3CL1 and CX3CR1 in normal physiological conditions, as well as, in models of neurodegenerative diseases.
List of abbreviations
=====================
(CX3CL1): Fractalkine; (HI)-CX3CL1: heat inactivated; (6-OHDA): 6-hydroxydopamine;
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
ADB, PCB, CG designed research. MMP, ADB, CEH, performed research. MMP, ADB wrote paper. All authors read and approved the final manuscript.
Acknowledgements and Funding
============================
This research was supported in part by: The US Veterans Administration; NIH grant R21AG024165 (CG), PO1AG04418 (PCB); ADB is supported by NIH fellowship F32 AG037280.
| 2023-11-07T01:27:17.760571 | https://example.com/article/6551 |
Q:
¿como hacer un multi update en php?
Buenas a todos, vengo a comentarles que es lo que quiero hacer y cual es mi código actual.
Resulta que estoy tratando de hacer un multi update done utilizo el "id" del elemento para filtrar en la tabla y en ese mismo elemento quiero modificar un campo.
El codigo que tengo no me funciona y llevo todo un día buscando como solucionarlo.
Les dejaré mi codigo para que me ayuden a solucionarlo.
Este es el formulario:
<form method="POST" action="fun/u_list_su.php">
<input type="text" id="id_producto[]" name="id_producto[]">
<input type="text" id="cantidad_producto[]" name="cantidad_producto[]">
<button type="submit">Save</button>
</form>
Este es el codigo:
<?php
//Aqui va la conexión
$mysqli = new mysqli('localhost', 'usuario', '123456', 'mybd');
if($mysqli->connect_error){
die('Error en la conexion' . $mysqli->connect_error);
}
//A partir de acá es el codigo que tengo
if (isset($_POST['id_producto'])) {
$id_el=$_POST['id_producto'];
$cant_el=$_POST['cantidad_producto'];
$sql2 = '';
for ($count=0; $count <count($id_el) ; $count++) {
$id_el_clean = $mysqli->query($id_el[$count]);
$cant_el_clean = $mysqli->query($cant_el[$count]);
if ($id_el_clean != '' && $cant_el_clean != '') {
$sql2 .= "UPDATE products SET stock = -'$cant_el_clean' WHERE id_producto = '$id_el_clean'";
}
}
if ($sql2 != '') {
if ($mysqli->query($sql2)) {
echo "data insert";
}
else {
echo "Error";
}
}
else {
echo "Los espacios requeridos";
}
}
?>
Gracias por su ayuda!
A:
te adjunto un código orientativo:
$paises = array();
$pais['id'] = 1;
$pais['nombre'] = "Argentina";
array_push($paises, $pais);
$conn = new mysqli("localhost", "root", "", 'base_de_datos');
if (!$conn) {
die("Conexion con MySQL invalida: " . mysqli_connect_error());
}
else{
echo "Conexion con MySQL correcta";
}
if(is_array($paises)){
$sql = "INSERT INTO paises (id, nombre_pais) values "; // Genero la estructura de la consulta.
$valuesArr = array(); //Vector auxiliar.
foreach($paises as $row){ //Recorro el vector principal.
$id = (int)($row['id']);
$nombre = mysql_real_escape_string($row['nombre']);
$valuesArr[] = "('$id', '$nombre_pais')";
}
$sql .= implode(',', $valuesArr);
mysqli_query($conn, $sql) or exit(mysqli_error($conn)); //Ejecuto la consulta.
}
| 2024-06-09T01:27:17.760571 | https://example.com/article/5636 |
Purchasing a brand-new Harley might be unbelievably costly, with respect to the model selected. Even so, those who want a Harley could desire to look at the used Harley Davidson motorcycles for sale anytime they wish to obtain a Harley. They can acquire a more modern model for much less in comparison with a new one as well as can be able to acquire every thing they will desire with the motorcycle. Much like obtaining a used car, there can be many benefits to buying a used Harley as opposed to a new one.
People who desire to acquire a motorcycle probably have a particular one in mind. If not, they're going to at least have specific functions they want to make certain the one they'll purchase may have. When they plan to purchase a used one, they're able to acquire the one they desire without having to invest a lot of money. They may be in the position to locate an older one they will like that costs a lot less compared to the newer models. Even in case they desire something which is fairly new, they're able to cut costs by acquiring a used model that is only a few years old. This provides them with the ability to receive a Harley with every thing they prefer without having to pay the entire cost of a new one.
People who need to obtain a Harley will at least want to look into the buy used harley davidson currently available. They can go to the web page in order to discover more about what exactly is available today and also in order to locate the one they desire. This might assist them to obtain the Harley they'll desire without needing to spend nearly as much cash, which means they'll have the funds remaining for accessories and also various other items they could prefer. | 2023-11-25T01:27:17.760571 | https://example.com/article/1999 |
NEW DELHI: India and the US on Thursday asked Pakistan to ensure that its territory is not used to launch terror attacks and expeditiously bring to justice the perpetrators of cross-border terror strikes, including those on Mumbai, Pathankot and Uri.The stern warning to Pakistan came after India and the US held their first 2+2 dialogue here during which external affairs minister Sushma Swaraj and defence minister Nirmala Sitharaman held wide-ranging deliberations with US secretary of state Michael R Pompeo and defence secretary James Mattis."The ministers announced their intent to increase information-sharing efforts on known or suspected terrorists and to implement UN Security Council Resolution 2396 on returning foreign terrorist fighters," a joint statement issued after the talks said."The ministers denounced any use of terrorist proxies in the region, and in this context, they called on Pakistan to ensure that the territory under its control is not used to launch terrorist attacks on other countries," it said.Ahead of the 10th anniversary of the 2008 Mumbai attack, they also called on Pakistan to expeditiously bring to justice the perpetrators of the Mumbai, Pathankot (2016), Uri (2016), and other cross-border terrorist attacks, the statement said.Addressing a joint press conference, Sushma Swaraj said the Indo-US counter-terrorism cooperation has acquired a new "qualitative edge and purpose"."We welcomed the recent designations of Lashkar-e-Taiba terrorists by the United States. They underscore the international community's scrutiny over the threat of terrorism emanating from Pakistan, which has affected India and the United States alike."In the 10th anniversary of the 26/11 attacks, we recognised the importance of justice and retribution for the masterminds behind this terrorist attack," she said.Sitharaman, in her remarks, said India and the US were committed to work together to combat the "persistent threat of terrorism" and other shared security challenges.The ministers committed to enhance their ongoing cooperation in multilateral fora such as the UN and Financial Action Task Force (FATF), and reaffirmed their support for a Comprehensive Convention on International Terrorism that will advance and strengthen the framework for global cooperation and reinforce the message that no cause or grievance justifies terrorism, the joint statement said."The ministers welcomed the launch of a bilateral dialogue on designation of terrorists in 2017, which is strengthening cooperation and action against terrorist groups, including al-Qaida, ISIS, Lashkar-e-Taiba, Jaish-e-Mohammad, Hizb-ul Mujahideen, the Haqqani Network, Tehrik-i-Taliban Pakistan, D-Company, and their affiliates," it said.The two sides further reaffirmed their commitment to ongoing and future cooperation to ensure a stable cyberspace environment and to prevent cyber attacks.Swaraj said India recognises the value of the Terrorists Designations Dialogue established last year as well as other mechanisms to promote cooperation in counter-terrorism and homeland security."We also discussed the situation in South Asia in some detail. India supports President Trump's South Asia Policy. His call for Pakistan to stop its policy of supporting cross-border terrorism finds resonance with us," she said.Swaraj said the efforts by India and the US in promoting an Afghan-led, Afghan-owned and Afghan government-controlled reconciliation process were also discussed. | 2024-02-02T01:27:17.760571 | https://example.com/article/6888 |
Blue US$ above 12-pesos
The parallel dollar surges again.
Parallel rate rises to 12.10 against greenback
For the third consecutive day this week, the black market dollar rose yesterday, this time skyrocketing 35 cents above the psychologically important 12-peso mark, ending up at 12.10 after trading as high as 12.5 pesos during the day.
With rumours of a rift between Central Bank (BCRA) Governor Juan Carlos Fábrega and Economy Minister Axel Kicillof floating around, the former felt compelled to refute them in a release.
Due to certain media publications about alleged differences between the leaders of the Economy Ministry and the Central Bank, which only seek media headlines and financial dealings, the BCRA president, Juan Carlos Fábrega, rejected them in an emphatic fashion and highlights that they have nothing to do with reality,” the Central Bank said in a news release.
Keen on kick-starting an economy that has stagnated during the first four months of the year — if not entered recession — Kicillof is seemingly pressing for interest rates on credit schemes such as fixed-term deposits to be lowered, freeing up more pesos.
Rates were lowered earlier this week, and a trader who works at a financial firm that engages in blue-dollar trading told the Herald that the rate charged for the advance cashing of a check written to 30 days — an industry referred to as “factoring” — had “dropped from a peak of 33 or 34 percent a few weeks ago to 29 percent today.”
Similarly, fixed-term deposit interest rates “have dropped down to 24 to 25 percent” from the peaks of 27 or 28 percent for 90-day schemes seen after the devaluation, Fábrega’s post-devaluation policy to cool down inflation, which in turn cooled down the economy.
The return of pocket-burning pesos into circulation in a context of 12-percent quarterly inflation has thus allowed black market traders to take advantage of higher demand for on the informal market.
Speculation of further devaluation after last week’s jump from the 8-peso mark for the official dollar, which closed half a cent lower at 8.075 pesos, has also destabilized the foreign exchange market.
The government thus walks a fine line between giving grain export firms a competitive rate as an incentive to settle and fuelling the black market.
Only those who earn more than 7,500 pesos in formal employment have access to the savings dollar opened to the public in January.
Still coasting on the agri-dollar effect, the BCRA was able to purchase US$30 million yesterday, but exchange rate instability could prove a headache once the harvest ends in July. | 2023-11-07T01:27:17.760571 | https://example.com/article/1771 |
Q:
Show tool-tips for DevExpress grid cells
I am using a "DevExpress" grid and I would like to display a tool-tip for each cell as I hover the cursor over it. I have written a code for that. It works fine and show tool-tips. But the tool-tip is not changing while I'm moving the cursor on the same row. (Moving Horizontally). But if I leave the current row and come back, then the tool-tip changes. Please advise me.
Here is the code for "toolTipController" (I have copied the whole method for a better understanding)
private void toolTipController1_GetActiveObjectInfo(object sender, ToolTipControllerGetActiveObjectInfoEventArgs e)
{
bool validColumn = false;
if (e.SelectedControl != gridControl1)
return;
GridHitInfo hitInfo = gridView1.CalcHitInfo(e.ControlMousePosition);
if (hitInfo.InRow == false)
return;
if (hitInfo.Column == null)
return;
//concern only the following fields
if (hitInfo.Column.FieldName == "Monday" || hitInfo.Column.FieldName == "Tuesday" || hitInfo.Column.FieldName == "Wednesday" || hitInfo.Column.FieldName == "Thursday" || hitInfo.Column.FieldName == "Friday")
validColumn = true;
if (!validColumn)
return;
string toolTip = string.Empty;
SuperToolTipSetupArgs toolTipArgs = new SuperToolTipSetupArgs();
toolTipArgs.Title.Text = string.Empty;
//Get the data from this row
string columnCaption = hitInfo.Column.Caption;
DateTime dateOK = new DateTime(2000,1,1);
if (DateTime.TryParse(columnCaption, out dateOK))
{
DateTime date = DateTime.Parse(columnCaption);
int row = hitInfo.RowHandle;
long teacherID = long.Parse(gridView1.GetRowCellValue(row, "TeacherID").ToString());
GuaranteedDay gDay = db.GuaranteedDays.Where(p => p.Date == date && p.TeacherID == teacherID && p.Type == 5).FirstOrDefault();
if (gDay != null)
{
if (gDay.Note != string.Empty)
{
//Set description for the tool-tip
string description = string.Empty;
int type = gDay.Type;
switch (type)
{
case 1:
description = "guarantee offered";
break;
case 2:
description = "guaranteed";
break;
case 3:
description = "texted";
break;
case 4:
description = "available";
break;
case 5:
description = "unavailable";
break;
}
//Add Notes & description for the tool-tip
toolTip = "Notes : " + gDay.Note + "\nDescription : " + description;
string BodyText = toolTip;
toolTipArgs.Contents.Text = BodyText;
e.Info = new ToolTipControlInfo();
e.Info.Object = hitInfo.HitTest.ToString() + hitInfo.RowHandle.ToString();
e.Info.ToolTipType = ToolTipType.SuperTip;
e.Info.SuperTip = new SuperToolTip();
e.Info.SuperTip.Setup(toolTipArgs);
}
}
}
}
}
Thanks for helping,
Kushan Randima.
A:
But the tool tip is not changing while I'm moving the cursor on the same row. (Moving Horizontally).
But if I leave the current row and come back, then the tool tip changes.
I see that you've passed the same "hit-object" for any cells within the current row:
e.Info.Object = hitInfo.HitTest.ToString() + hitInfo.RowHandle.ToString();
To accomplish your task, you should pass the different "hit-objects" for different cells:
e.Info.Object = hitInfo.HitTest.ToString() + hitInfo.RowHandle.ToString() + hitInfo.Column.FieldName;
| 2024-01-26T01:27:17.760571 | https://example.com/article/6191 |
Comparison between 99mTc-sestamibi gated myocardial perfusion SPECT and echocardiography in assessment of left ventricular volumes and ejection fraction--effect of perfusion defect and small heart.
Agreement between gated myocardial perfusion SPECT (GSPECT) and echocardiography (ECHO) in the calculation of left ventricular end-diastolic volume (EDV), end-systolic volume (ESV) and LVEF was assessed. Effect of perfusion defect and small hearts on this agreement was obtained. Because ECHO is a routine and widely used noninvasive modality for this purpose, we chose this technique for comparison with GSPECT. In a prospective study, 50 consecutive patients (age = 59.7 ± 10.64 years) underwent rest Tc99m-sestamibi GSPECT and 2-D ECHO. The LVEF, EDV and ESV were calculated using QGS (Quantitative Gated SPECT) software. Fourteen (28%) patients had perfusion defect in rest phase tomograms, while 36 (72%) had no perfusion defect. There was a significant correlation between two modalities in calculation of EDV, ESV and LVEF (all: p < 0.001, Pearson's correlation coefficients: r = 0.764, 0.831 and 0.813, respectively). A good correlation was noticed even in small hearts or in patients with or without previous myocardial infarction. There was a significant difference between GSPECT and ECHO in patients with no perfusion defect as well as in patients with small heart (ESV < 25 ml). On the other hand, no remarkable difference was noticed between two techniques in the presence of perfusion defect or in patients with ESV ≥ 25 ml. There was a good agreement between EDV, ESV and LVEF derived from GSPECT and ECHO. There was a significant difference between two modalities in small hearts and in patients without perfusion defect, although in larger ventricles or in the presence of myocardial infarction no remarkable difference between two modalities was noticed. | 2023-08-31T01:27:17.760571 | https://example.com/article/8635 |
Effects of adrenalectomy and hypertonic saline on neuropeptide Y content in the posterior pituitary of the rat.
We have examined the effects of adrenalectomy (ADX) on neuropeptide Y (NPY) content in the posterior pituitary of the rat. In rats given 2% saline to drink for 12 days, plasma osmolality increased to 343 +/- 18 compared to 291 +/- 5 mosm/kg in control animals on water (mean +/- SEM). Hypertonic saline treatment resulted in increased posterior pituitary NPY content measured by radioimmunoassay (2.42 +/- 0.36 ng) compared to the control group (1.18 +/- 0.16 ng). Total NPY immunoreactivity in tissue extracts coeluted with synthetic NPY(1-36) on reversed-phase high-performance liquid chromatography. In ADX rats given 2% saline to drink, plasma osmolality increased to 355 +/- 35 mosm/kg, but posterior pituitary NPY content was not different from the control group (1.41 +/- 0.11 ng). Immunohistochemical staining for NPY in the posterior pituitary also revealed a saline-induced increase in the number of NPY-immunoreactive nerve fibers, an increase which was not evident in the ADX group. No NPY immunoreactivity was observed in the intermediate zone. These results are the first evidence that the saline-induced increase in NPY in the posterior pituitary is under corticosteroid control. | 2024-02-06T01:27:17.760571 | https://example.com/article/9487 |
British priest bans ‘spiritual’ yoga from church hall
USA Today: A British priest has banned yoga from the parish hall because it is “a Hindu spiritual exercise” and therefore “not compatible” with Catholicism, according to news reports from the kingdom.
Cori Withell told The Mirror that with just 10 days remaining in the two-month instruction, St. Edmund’s Church in Southampton canceled her yoga and Pilates classes. She said a parish secretary explained that the hall must be used only for Catholic activities.
The decision to ban yoga or other non-Catholic activities rests with individual priests and is not official Catholic Church policy, the diocese said.
We comb the internet, looking for news stories related to all forms of meditation, whether Buddhist or not. To date we have posted thousands of news stories that cover everything from meditation and health to meditating celebrities. When we publish a story that's favorable to or critical of one form of meditation, this does not imply that we agree with the stance of the original news story. | 2023-09-11T01:27:17.760571 | https://example.com/article/8996 |
Assisted Living Facilities in LAPEER County, MI
Assisted Living in LAPEER County, MI
There are 50 assisted living facilities in LAPEER County, Michigan. These facilities provide assisted living apartments and help with everyday tasks to elderly seniors. LAPEER County assisted living facilities also provide memory care assistance for senior citizens with dementia and Alzheimer's disease. Some facilities are part of larger senior living communities in LAPEER County and provide continuing care options.
Lighthouse
Lighthouse provides assisted living services in Imlay City, Michigan. It can accommodate a maximum of 5 retirees at a time. With a location at 221 Engle Street, in the 48444 area code inside Lapeer county, Lighthouse assists those senior citizens who need assistance with daily living activities. Some of the services offered by Lighthouse include community outings and social gatherings, numerous educational activities and transportation to appointments. Lighthouse is fully licensed by Michigan to provide assisted living, with license number AS440303128.
Forget Me Not Afc Home
Forget Me Not Afc Home specializes in providing assisted senior living in Lapeer county, Michigan. It includes a total of 6 studio and 1-bedrooom apartments for seniors. Forget Me Not Afc Home is pet-friendly and can provide assistance with bathing, dressing and transferring to any seniors living in North Branch, MI and surrounding areas. Forget Me Not Afc Home is located at 4042 Pleasant Street, 48461.
Meadow Breeze
When looking for senior assisted living in Brown City, Michigan, you will find Meadow Breeze as an excellent luxurious senior care option. It has a total of 6 assisted living units and includes services such as recreation and social activities. Its license number is AS440316846. Meadow Breeze provides assisted living not only to Brown City residents, but also to all Lapeer county residents as well.
My Home
If you require help with daily tasks, My Home can help you or your loved one to find the assistance and care you need in Lapeer, Michigan. My Home has a total capacity of 6 older adults. It includes amenities like 24 hour security cameras, wellness center and 3 daily meals. My Home is licensed with Michigan and its license number is AF440290617.
The Pines Of Lapeer
The Pines Of Lapeer has a capacity of 20 senior citizens and includes amenities such as housekeeping and laundry services. It is located at 1442 Suncrest Dr, and it is fully equipped to provide assisted living to Lapeer, MI older adults. The Pines Of Lapeer is licensed with Michigan and its license number is AL440281492.
Oak Hill
Located at 140 Larson Road, inside 48412 zip code area in Lapeer county, Oak Hill provides assisted senior living to Attica, MI senior citizens and includes amenities such as scheduled transportation to appointments and a busy calendar of social activities. Oak Hill can accommodate up to 9 seniors at a time. Oak Hill has official license # of AM440303132.
Park Street Home
Situated at 1125 Park Street, Lapeer, Michigan, 48446, Park Street Home can help any Lapeer county resident with daily living activities and includes amenities like wi-fi, landscaped grounds and more. Park Street Home can provide long term care and assisted living to a maximum of 6 residents at once. Its license number is AS440011693.
North Branch
Seniors looking for assisted senior living in Columbiaville, Michigan will find North Branch, located at 320 Dockham Rd inside 48421 zip code as a wonderful choice for all of their care needs. North Branch is able to care for up to 6 older adults and allows seniors to stay with cats and small dogs. Michigan records show that North Branch has a license number of AS440361906.
Woodlawn
With a location at 2133 South Lapeer Road in Lapeer county, Woodlawn excels at providing assisted living services for seniors in Lapeer, MI as well as those who live in surrounding areas. Woodlawn includes amenities such as medication management and emergency alert system. Woodlawn is capable of caring for a maximum of 6 Lapeer older residents and provides several levels of care. Woodlawn has an official license to provide senior living for Lapeer, MI residents, with license # AS440384737.
Hampshire
Hampshire, located at 3200 Hampshire Road provides senior assisted living services in Lapeer, Michigan and includes services such as scheduled family meetings, up to 3 delicious meals per day and caregiving staff that is available 24/7. Hampshire is equipped to care for up to 5 senior citizens from 48446 zip code in Lapeer county and surrounding areas. Hampshire is licensed to provide assisted living services in Lapeer, Michigan, with license # AS440284123.
Home Away From Home, Afc
Home Away From Home, Afc provides assisted living care in Silverwood, Michigan. It can accommodate a maximum of 3 55 and older adults at a time. With a location at 9281 Graves Road, in the 48760 area code inside Lapeer county, Home Away From Home, Afc assists those senior citizens who need help with activities of daily living. Some of the services offered by Home Away From Home, Afc include community outings and social gatherings, on-site lectures and guest speakers and scheduled transportation. Home Away From Home, Afc has an active license by Michigan to provide senior living, with license number AF440303255.
Devonshire Retirement Village
Devonshire Retirement Village specializes in providing assisted senior living in Lapeer county, Michigan. It includes a total of 20 one bedrooms and studios for retirees. Devonshire Retirement Village is pet-friendly and can provide assistance with bathing, dressing and transferring to any seniors living in Lapeer, MI and surrounding areas. Devonshire Retirement Village is located at 101 Devonshire Drive, 48446.
Whispering Willow Ii
When searching for senior living in Lapeer, Michigan, you will find Whispering Willow Ii as an excellent luxurious senior care option. It has a total of 5 assisted living units and includes services such as recreation and social activities. Its license number is AF440316409. Whispering Willow Ii provides assisted living not only to Lapeer residents, but also to all Lapeer county residents as well.
Serenity Acres
If you require help with daily living, Serenity Acres can help you or your loved one to find the assistance and care you need in Attica, Michigan. Serenity Acres has a total capacity of 6 senior citizens. It includes services like 24-hour security system, wellness center and 3 daily meals. Serenity Acres is licensed with Michigan and its license number is AS440312657.
Country Acre
Country Acre has a capacity of 6 senior citizens and includes amenities such as housekeeping and laundry services. It is located at 5160 Sawmill Lake Rd, and it is fully equipped to provide assisted living to Ortonville, MI older adults. Country Acre is licensed with Michigan and its license number is AS440306348.
Churchill Farms Afc
Located at 1180 Cliff Drive, inside 48446 zip code area in Lapeer county, Churchill Farms Afc provides assisted senior living to Lapeer, MI senior citizens and includes amenities such as scheduled transportation to appointments and a busy calendar of social activities. Churchill Farms Afc can accommodate up to 6 seniors at a time. Churchill Farms Afc has official license # of AS440067966.
Harbor Point-lapeer
Situated at 5699 Genesee Road, Lapeer, Michigan, 48446, Harbor Point-lapeer can help any Lapeer county resident with daily living activities and includes amenities like wi-fi, landscaped grounds and more. Harbor Point-lapeer can provide long term care and assisted living to a maximum of 12 residents at once. Its license number is AM440380703.
M. Hotchkiss Home
Seniors looking for assisted living in Silverwood, Michigan will find M. Hotchkiss Home, located at 9475 Seyforth Road inside 48760 zip code as a wonderful choice for all of their care needs. M. Hotchkiss Home is able to care for up to 5 older adults and allows seniors to stay with cats and small dogs. Michigan records show that M. Hotchkiss Home has a license number of AS440011715.
Lake Nepessing
With a location at 1430 Lake Nepessing in Lapeer county, Lake Nepessing excels at providing assisted living services for seniors in Lapeer, MI as well as those who live in surrounding areas. Lake Nepessing includes amenities such as medication management and emergency alert system. Lake Nepessing is capable of caring for a maximum of 6 Lapeer older residents and provides several levels of care. Lake Nepessing has an official license to provide senior living for Lapeer, MI residents, with license # AS440265050.
Shadowtree Lodge
Shadowtree Lodge, located at 1378 Shadowtree Ln provides senior assisted living services in Lapeer, Michigan and includes services such as scheduled family meetings, up to 3 delicious meals per day and caregiving staff that is available 24/7. Shadowtree Lodge is equipped to care for up to 6 senior citizens from 48446 zip code in Lapeer county and surrounding areas. Shadowtree Lodge is licensed to provide assisted living services in Lapeer, Michigan, with license # AF440311310.
Flatrock Manor
Flatrock Manor provides assisted living services in Lapeer, Michigan. It can accommodate a maximum of 12 seniors at a time. With a location at 300 N Elba Road, in the 48446 area code inside Lapeer county, Flatrock Manor assists those seniors who need assistance with activities of daily living. Some of the services offered by Flatrock Manor include community outings and social gatherings, numerous educational activities and scheduled transportation. Flatrock Manor is licensed by Michigan to provide assisted living services, with license number AM440337538.
The Pines Of Lapeer - Memory Care
The Pines Of Lapeer - Memory Care specializes in providing assisted senior living in Lapeer county, Michigan. It includes a total of 20 studio and 1-bedrooom apartments for 55 and over adults. The Pines Of Lapeer - Memory Care is pet-friendly and can provide assistance with bathing, dressing and transferring to any seniors living in Lapeer, MI and surrounding areas. The Pines Of Lapeer - Memory Care is located at 1446 Suncrest Drive, 48446.
Devonshire Retirement Village Specialized Care
When looking for assisted senior living in Lapeer, Michigan, you will find Devonshire Retirement Village Specialized Care as an excellent luxurious senior care option. It has a total of 20 assisted living units and includes services such as recreation and social activities. Its license number is AL440263405. Devonshire Retirement Village Specialized Care provides assisted living not only to Lapeer residents, but also to all Lapeer county residents as well.
Stepping Stone Cove
If you need help with daily living, Stepping Stone Cove can help you or your loved one to find the assistance and care you need in Dryden, Michigan. Stepping Stone Cove has a total capacity of 6 elderly residents. It includes amenities like fully secured premises, wellness center and dining. Stepping Stone Cove is licensed with Michigan and its license number is AF440274178.
Bolton Brook Manor
Bolton Brook Manor has a capacity of 20 senior citizens and includes amenities such as housekeeping and laundry services. It is located at 4554 Thomas Rd, and it is fully equipped to provide assisted living to Metamora, MI older adults. Bolton Brook Manor is licensed with Michigan and its license number is AL440063943.
Country Grove Afc
Located at 2161 Bearanger Road, inside 48446 zip code area in Lapeer county, Country Grove Afc provides assisted senior living to Lapeer, MI senior citizens and includes amenities such as scheduled transportation to appointments and a busy calendar of social activities. Country Grove Afc can accommodate up to 9 seniors at a time. Country Grove Afc has official license # of AM440015262.
Loving Hands Home Care
Situated at 6757 Fish Lake Rd, North Branch, Michigan, 48461, Loving Hands Home Care can help any Lapeer county resident with daily living activities and includes amenities like wi-fi, landscaped grounds and more. Loving Hands Home Care can provide long term care and assisted living to a maximum of 4 residents at once. Its license number is AF440307390.
Rescare Premier Davis Lake
Seniors looking for assisted living in Lapeer, Michigan will find Rescare Premier Davis Lake, located at 3097 Davis Lake Road inside 48446 zip code as a great choice for all of their care needs. Rescare Premier Davis Lake is able to care for up to 6 older adults and allows seniors to stay with cats and small dogs. Michigan records show that Rescare Premier Davis Lake has a license number of AS440380493.
A Family Affair
With a location at 1661 Madeline Drive in Lapeer county, A Family Affair excels at providing assisted living services for seniors in Lapeer, MI as well as those who live in surrounding areas. A Family Affair includes amenities such as medication management and emergency alert system. A Family Affair is capable of caring for a maximum of 6 Lapeer older residents and provides several levels of care. A Family Affair has an official license to provide senior living for Lapeer, MI residents, with license # AS440382788.
Shirley's House
Shirley's House, located at 5329 Main Street provides senior assisted living services in Dryden, Michigan and includes services such as scheduled family meetings, up to 3 delicious meals per day and caregiving staff that is available 24/7. Shirley's House is equipped to care for up to 6 senior citizens from 48428 zip code in Lapeer county and surrounding areas. Shirley's House is licensed to provide assisted living services in Dryden, Michigan, with license # AS440282365.
Lippincott Home
Lippincott Home provides assisted living services in Lapeer, Michigan. It can accommodate a maximum of 8 seniors at a time. With a location at 3863 Lippincott, in the 48446 area code inside Lapeer county, Lippincott Home assists those older adults who need aid with daily tasks. Some of the services offered by Lippincott Home include community and cultural events, numerous educational activities and arranged transportation. Lippincott Home has an active license by Michigan to provide assisted living, with license number AM440296828.
Whispering Pines Afc
Whispering Pines Afc specializes in providing senior assisted living in Lapeer county, Michigan. It includes a total of 19 studio and one bedroom suites for 55 and older adults. Whispering Pines Afc is pet-friendly and can provide assistance with bathing, dressing and transferring to any seniors living in Lapeer, MI and surrounding areas. Whispering Pines Afc is located at 3941 Lippincott Rd, 48446.
Mondeau A.f.c.
When searching for assisted senior living in Lapeer, Michigan, you will find Mondeau A. f. c. as an excellent luxurious senior care option. It has a total of 6 assisted living units and includes services such as recreation and social activities. Its license number is AF440003627. Mondeau A. f. c. provides assisted living not only to Lapeer residents, but also to all Lapeer county residents as well.
Hilltop
If you need assistance with daily tasks, Hilltop can help you or your loved one to find the assistance and care you need in North Branch, Michigan. Hilltop has a total capacity of 5 senior citizens. It includes services like 24 hour security cameras, wellness center and 3 daily meals. Hilltop is licensed with Michigan and its license number is AF440267572.
Rescare Premier Briggs
Rescare Premier Briggs has a capacity of 6 senior citizens and includes amenities such as housekeeping and laundry services. It is located at 4324 Briggs Rd, and it is fully equipped to provide assisted living to Otter Lake, MI older adults. Rescare Premier Briggs is licensed with Michigan and its license number is AS440366523.
Maplewoods Afc Home
Located at 3488 Bowers Rd, inside 48412 zip code area in Lapeer county, Maplewoods Afc Home provides assisted senior living to Attica, MI senior citizens and includes amenities such as scheduled transportation to appointments and a busy calendar of social activities. Maplewoods Afc Home can accommodate up to 2 seniors at a time. Maplewoods Afc Home has official license # of AF440362583.
Brookhaven A.f.c.
Situated at 4521 Stanley Rd, Columbiaville, Michigan, 48421, Brookhaven A. f. c. can help any Lapeer county resident with daily living activities and includes amenities like wi-fi, landscaped grounds and more. Brookhaven A. f. c. can provide long term care and assisted living to a maximum of 11 residents at once. Its license number is AM440290998.
Woodbine Home
Seniors looking for assisted living in Lapeer, Michigan will find Woodbine Home, located at 1670 Woodbine inside 48446 zip code as a wonderful option for all of their care needs. Woodbine Home is able to care for up to 4 seniors and allows seniors to stay with pets. Michigan records show that Woodbine Home has a license number of AS440265246.
Stonegate Health Campus
With a location at 2525 Demille Boulevard in Lapeer county, Stonegate Health Campus excels at providing assisted living services for seniors in Lapeer, MI as well as those who live in surrounding areas. Stonegate Health Campus includes amenities such as medication management and emergency alert system. Stonegate Health Campus is capable of caring for a maximum of 39 Lapeer older residents and provides several levels of care. Stonegate Health Campus has an official license to provide senior living for Lapeer, MI residents, with license # AH440311638.
Sitting Angels
Sitting Angels, located at 1120 Fairview provides senior assisted living services in Lapeer, Michigan and includes services such as scheduled family meetings, up to 3 delicious meals per day and caregiving staff that is available 24/7. Sitting Angels is equipped to care for up to 6 senior citizens from 48446 zip code in Lapeer county and surrounding areas. Sitting Angels is licensed to provide assisted living services in Lapeer, Michigan, with license # AS440315900.
J And J Schlaud Afc Home
J And J Schlaud Afc Home provides assisted living services in Lapeer, Michigan. It can house a maximum of 12 older adults at a time. With a location at 2554 Haines Road, in the 48446 area code inside Lapeer county, J And J Schlaud Afc Home assists those elderly adults who need assistance with activities of daily living. Some of the amenities offered by J And J Schlaud Afc Home include off-site outings and picnics, educational opportunities and transportation to appointments. J And J Schlaud Afc Home is licensed by Michigan to provide senior living, with license number AM440008821.
Five Lakes Family Home
Five Lakes Family Home specializes in providing senior living in Lapeer county, Michigan. It includes a total of 6 one bedrooms and studios for senior citizens. Five Lakes Family Home is pet-friendly and can provide assistance with bathing, dressing and transferring to any seniors living in Lapeer, MI and surrounding areas. Five Lakes Family Home is located at 2933 Kings Mill Rd, 48446.
Hillside Manor
When looking for assisted senior living in North Branch, Michigan, you will find Hillside Manor as an excellent luxurious senior care option. It has a total of 6 assisted living units and includes services such as recreation and social activities. Its license number is AF440299489. Hillside Manor provides assisted living not only to North Branch residents, but also to all Lapeer county residents as well.
Angelic Gardens
If you need help with daily living, Angelic Gardens can help you or your loved one to locate the assistance and care you need in Attica, Michigan. Angelic Gardens has a total capacity of 6 seniors. It includes services like 24 hour security cameras, wellness center and multiple dining options daily. Angelic Gardens is licensed with Michigan and its license number is AF440248699.
Whitney Family Care
Whitney Family Care has a capacity of 6 senior citizens and includes amenities such as housekeeping and laundry services. It is located at 4634 Shoemaker Road, and it is fully equipped to provide assisted living to Almont, MI older adults. Whitney Family Care is licensed with Michigan and its license number is AF440337509.
Pleasant Lake Assisted Living
Located at 2176 Martha Hulbert Dr, inside 48446 zip code area in Lapeer county, Pleasant Lake Assisted Living provides assisted senior living to Lapeer, MI senior citizens and includes amenities such as scheduled transportation to appointments and a busy calendar of social activities. Pleasant Lake Assisted Living can accommodate up to 5 seniors at a time. Pleasant Lake Assisted Living has official license # of AF440303320.
Rescare Premier Frances
Situated at 5183 Genesee Road, Lapeer, Michigan, 48446, Rescare Premier Frances can help any Lapeer county resident with daily living activities and includes amenities like wi-fi, landscaped grounds and more. Rescare Premier Frances can provide long term care and assisted living to a maximum of 6 residents at once. Its license number is AS440300099.
The Bells Senior Community
Seniors looking for assisted living in Almont, Michigan will find The Bells Senior Community, located at 401 Church Street inside 48003 zip code as a great choice for all of their care needs. The Bells Senior Community is able to care for up to 24 senior citizens and allows seniors to stay with cats and small dogs.
Janie Smith Afc
With a location at 170 Larson Road in Lapeer county, Janie Smith Afc excels at providing assisted living services for seniors in Attica, MI as well as those who live in surrounding areas. Janie Smith Afc includes amenities such as medication management and emergency alert system. Janie Smith Afc is capable of caring for a maximum of 6 Attica older residents and provides several levels of care. Janie Smith Afc has an official license to provide senior living for Lapeer, MI residents, with license # AF440003546.
Country Hill Home
Country Hill Home, located at 760 Barnes Road provides senior assisted living services in Mayville, Michigan and includes services such as scheduled family meetings, up to 3 delicious meals per day and caregiving staff that is available 24/7. Country Hill Home is equipped to care for up to 4 senior citizens from 48744 zip code in Lapeer county and surrounding areas. Country Hill Home is licensed to provide assisted living services in Mayville, Michigan, with license # AF440282130.
Other senior living options in LAPEER County, MI:
There are numerous senior living options available to LAPEER County older adults that will meet their care and living requirements.
For those elderly adults who do not need much assistance, senior housing in LAPEER County, MI provides semi-private and private senior living apartment options.
If your loved one is in need of dementia or memory care for Alzheimer's disease, dementia care homes in LAPEER County, MI will offer high levels of care and security.
For elderly adults who are best suited for nursing home care, nursing homes in LAPEER County, MI provide 24/7 skilled nursing and dedicated caregivers.
We want to be able to answer any questions you may have. Please enter your phone number, starting with area code. If you prefer to get all information by phone, please call (888) 948-7973.
You are almost there. Please provide your real phone number.
We value your privacy. By clicking the red button above, you agree to our Terms of Use, Privacy Policy and agreement to be contacted by us, or our partner providers, using a system that can auto-dial. Your consent is not required to use the service.
50 Assisted Living Facilities in LAPEER County, MI. List of 50 best senior living options in LAPEER County for 2019. | 2024-07-30T01:27:17.760571 | https://example.com/article/6633 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.