text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
Russia has invested heavily in staging this World Cup, anxious for it to help improve its image. 'Welcome' banners are already flying all over the host cities.
But, when a BBC team went to report on preparations in Nizhny Novgorod, where England will play, they found themselves under constant surveillance. Russia's Foreign Ministry has said it will look into what happened. | 2023-11-14T01:27:13.970301 | https://example.com/article/7515 |
President Obiang Asks for Greater Investment in Agricultural Sector
Jun 30, 2014 | Republic of Equatorial Guinea
MALABO, Equatorial Guinea, June 30, 2014/African Press Organization (APO)/ -- Equatorial Guinea's President, Obiang Nguema Mbasogo (http://equatorialguineainfo.blogspot.com), asked African countries to invest heavily in their agricultural sector to decrease their dependence on the developed world, ensure food security, and significantly reduce hunger in their countries. He made his remarks at the closing session of the Assembly of Heads of State of the African Union (AU).
President Obiang said that Africa should reorient itself to ensure its independence and security of African states through the safe production of its own consumer goods. “Africa cannot be content to continue with the current dependence on the economies of the developed world. Africa is sailing upstream against a dependency that prevents them from moving toward sustainable development. Africa should rethink its relationship with the developed world to reduce as far as possible the gap that prevents access to development,” said Obiang.
“The development of agriculture can greatly reduce this dependence,” he said. “Africa can ensure food security and significantly reduce hunger in our countries. Africa should heavily invest in agricultural development to transform itself in order to accelerate growth to increase production and productivity,” said Obiang.
President Obiang proposed to the African Union the establishment of a program that focuses on the organization and exploitation of markets to promote trade and food security and to eradicate hunger, malnutrition and rural poverty. This will also reinforce the fight against climate change and agriculture.
He said that Equatorial Guinea is already investing in its agricultural sector. “As part of our diversification plan, Equatorial Guinea currently focuses on [agricultural] production to achieve these goals. It is imperative to ensure the security and stability of our states, since agriculture is the most vulnerable sector in times of instability, war and terrorism.” said Obiang
“It's no coincidence that this session focuses on the issue of agriculture and food security in Africa. We cannot talk about the development of Africa if there is no agricultural development to ensure food security and avoid lifelong dependence on imports of consumer products.”
He noted that Africa counts on the support of organizations focused on agriculture and ways to improve the sector, and urged continued support for those organizations.
“The African Union must recognize and financially support the structures of non-governmental organizations, businesses and institutions created in Africa to support agriculture, such as the New Partnership for Africa's Development (NEPAD).”
Obiang linked democratic and economic development. “Africa must contribute to a democratic development aimed at achieving economic development of society and the welfare of its citizens. It must be a democracy that seeks conflict reduction, he said.”
Obiang also urged his fellow Africans to prioritize South-South cooperation, a cooperation that respects the principles of equality.
“The last decade has marked considerable advancements of the African states. Many of them aspire to economic emergence in the near future. Nonetheless, the continent continues to be a victim of endemic diseases and insecurity that require a unified solution of the states.”
Obiang said it was a great honor for Equatorial Guinea to host the 23rd African Union Summit at “a moment that is crucial for the world nations as they struggle to find solutions to economic crises, security, hunger and poverty, and climate change that affect the world.” He said, “The participation of the heads of state and numerous guests in this summit shows the interest and commitment that Africa and its partners have to find solutions to current issues.”
A session on agriculture and food security under the slogan “Transforming Africa's Agriculture, for Shared Prosperity and Improved livelihoods, through Harnessing Opportunities” was held in the afternoon.
Distributed by APO (African Press Organization) on behalf of the Republic of Equatorial Guinea.
Media Contact:
Matt J. Lauer
+1703-463-1841
matt.lauer@qorvismsl.com
About Equatorial Guinea
The Republic of Equatorial Guinea (http://equatorialguineainfo.blogspot.com) (República de Guinea Ecuatorial) (http://www.guineaecuatorialpress.com/noticia.php?id=590) is the only Spanish-speaking country in Africa, and one of the smallest nations on the continent. In the late-1990s, American companies helped discover the country's oil and natural gas resources, which only within the last five years began contributing to the global energy supply. Equatorial Guinea is now working to serve as a pillar of stability and security in its region of West Central Africa (http://www.flickr.com/photos/50152514@N07). The country hosted the 2011 Summit of the African Union. For more information, visit http://www.guineaecuatorialpress.com.
This has been distributed by Qorvis Communications, LLC on behalf of the Republic of Equatorial Guinea. More information on this relationship is on file at the United States Department of Justice, Washington, D.C. | 2023-12-17T01:27:13.970301 | https://example.com/article/6963 |
Ute Meadows Elementary is about 2,300 miles away from Colonial Williamsburg in Virginia. But that doesn’t prevent fifth-graders from taking field trips to the historic city.
All it requires is a good Internet connection and a willingness to learn.
The Ute Meadows students are among the first in Jeffco Public Schools to experience the Electronic Field Trip Series, a subscription-based interactive educational program available to educators through the Colonial Williamsburg Foundation and broadcast through PBS.
But the field trip isn’t simply getting students to watch TV.
“Subscribing buys them the right to interact live,” said Thom Adorney, the fifth-grade teacher who adopted the program.
The Electronic Field Trip Series takes students learning about colonial America beyond watching a film or reading a textbook. It does so by offering the chance to interact with historians and actors portraying historical figures.
Each month the series explores a different piece of American history through a live, hour-long broadcast from Williamsburg.
During last week’s field trip — “Founders or Traitors?” — students learned about the months following the signing of the Declaration of Independence, and the struggles both the Americans and the British faced during the Revolutionary War.
It wasn’t just re-enactments of important moments and significant battles. Rather, dramatic storytelling was interspersed with live question-and-answer sessions with none other than Benjamin Franklin, Adm. Lord Howe — a British commander who knew Franklin — and historian Bill White.
“When I started teaching here, I started to believe that we have to make American history really interactive in order for it to come alive,” Adorney said.
The electronic field trip brings a higher level of interactivity. Much of the subject matter is from the students’ colonial history studies. But the opportunity for them to call the show and have historians answer questions on the other end keeps students interested.
And if they have a particularly good question, they get to ask the on-air actors and historians and have the answer broadcast to more than 1 million viewers nationwide.
“I actually like it a little better than anything else,” said Tyler Dawdy, 11. “Except for PE.”
Tyler got to see historians answer his question on air during last month’s electronic field trip. Though it was a little nerve wracking to go live with his question, it was still a rewarding experience.
Such is the idea behind the series. Though students might be far away from the historic re-creation that is Williamsburg, they are still able to see what it’s like, while learning from people who devote their careers to history.
During last week’s lesson, students from across the country asked questions about many issues, such as slavery, war and the idea of a family divided by loyalty.
The historians portraying Franklin and Howe stayed in character, speaking appropriate dialect and not missing a detail of life in the 18th century.
“You learn a lot more — to me — than from a book,” said 11-year-old McKenna Milton. “In a book, you kind of have to visualize what you’re reading. In this you get to watch it and hear it.”
In a way, students direct what they are learning; because much of the live discussion comes from kids’ questions, the historians respond on a case-by-case basis. And the interactive nature of asking their own questions and not being lectured seems to hold students’ interest.
“They thought that history was boring, and then they realize that history is really exciting,” Adorney said.
Ute Meadows was the first school to participate in the Electronic Field Trip Series; Adorney signed up for it last year. Each series costs a school $500 to register and runs from October through April. That cost also includes teaching guides and is supplemented by Internet lessons and games.
But the highest value is giving students the chance to speak and interact with active historians.
“This kind of distance learning is something we want to do more of as a district,” Adorney said.
While there is not enough time during the broadcast to answer every Ute Meadows student’s question, the phone lines are open until an hour after the show ends. And each student who calls in, whether answered on air or not, can share what the historian told them with their classmates.
“I just think that we’re really lucky to do this,” said Kassey Kalman, 11. “It’s really a good experience.” | 2023-09-24T01:27:13.970301 | https://example.com/article/9634 |
Not applicable.
Not applicable.
This invention relates generally to a bath system for raising and lowering an individual in and out of a bath, and more particularly, to a bath system with a seat and a lifting device, where the lifting device is positioned within the bath, substantially out of sight.
Bath lifting systems have been available in the past to raise and lower individuals in and out of a bath. For example, U.S. Pat. No. 2,361,474 proposes a bath lifting system for raising and lowering an individual in and out of a bath using two exposed U-shaped crankshafts. A table spanning the shafts is connected to the bights of the U-shaped crankshafts. The crankshafts rotate in unison to rotate the table from a lowered position within the bath to a raised or extended position out of the bath.
Another bath lifting system is proposed in U.S. Pat. No. Re. 33,624. This system proposes a lifting device on the outside of the bath connected to a seat support member that extends through the bath wall. In particular, the seat support member extends through an elongated wall opening, or slot, to lift the seat from a lowered position to a raised position.
Yet another bath lifting system is proposed in U.S. Pat. No. 5,146,638. This system proposes a telescoping lifting column which is positioned in an upright position through one end of the upper rim of a bath. The lifting column includes a first actuator that vertically raises and lowers the seat in and out of a bath. A second actuator then swivels or rotates the lifting column about its cylindrical axis to position the front portion of the seat from a central position in the bath to a position over the rim of the bath. If desired, the seat can be swiveled through a smaller angle from its central position in the bath for transfer from a wheelchair to the seat.
Many other bath lift systems, available in the past, have an appearance that is bulky and mechanical. In particular, exposed lifting devices located adjacent to the bath are not considered aesthetically appealing. In the lifting devices positioned out of sight behind a side bath wall and extending through the upper rim of the bath, dual actuators, electronic circuitry and mechanical parts are proposed to provide a two step movement to first raise the seat and then swivel the seat, even if only to swivel the seat a preferred smaller angle from a central position to position the seat for transfer from a wheelchair. (See ""638 patent, col. 3, In. 62 to col. 4, ln. 41). Also, support members which extend through an elongated opening or slot in the bath wall, that begin at the bottom of bath in the drain area, are particularly susceptible to seal wear and resulting water leakage from the area where fluids collect caused by the sliding movement of the member that extends through the wall.
Therefore, an aesthetically appealing lifting device, concealed behind the seat, would be desirable. Moreover, a lifting device substantially concealed behind a lift seat that reduces leakage while providing straight line movement positioning of the seat from a central position to a position along side of the rim of the bath for transfer from a wheelchair would be desirable.
According to the invention, a bath that substantially conceals the lifting device behind the seat and reduces leakage while providing straight line movement to position the seat from a central position to a position along the side of the rim of the bath for transfer from a wheelchair is disclosed. | 2024-01-23T01:27:13.970301 | https://example.com/article/4468 |
One in six mobile users now own tablets
ComScore finds that half of all tablet owners watch video content once a month on their tablet
The other day I realized that Apple only came out with the first iPad two years ago. It’s only been two years! The iPad is still technically a baby. But it’s become so ubiquitous that it’s easy to think it’s been around forever. Same thing with the iPhone—remember that scene in the Sex and the City movie where Samantha hands Carrie her iPhone and Carrie takes one look at the touchscreen and the apps and hands it back, saying “I can’t use this”? That was 2008.
ComScore released data today showing that tablet penetration has reached a new high, with one in six people (16.5%) now using tablets. Among smartphone owners, that penetration rate is even higher. Nearly one in four smartphone owners (23.6%) are using tablets.
Both figures represent a big leap from last year, when only 4.7% of the general population was using tablets, marking a difference of 11.8 percentage points. And this time last year, only 9.7% of smartphone owners were using tablets, compared to 23.6% today, which represents a jump of 13.9 percentage points.
It comes as no surprise that tablet users tend to skew towards the higher income demographic. Among households earning $100k a year and more, 37.7% own tablets, compared to 18.3% of those earning $75k-$100k, and 17.7% of those earning $25k-$50k. They also tend to be used most widely among those ages 25-34.
Another interesting find: tablet users are three times more likely to watch video on their devices than smartphone users. More than half of all tablet users watched video and/or TV content on their device compared to 20% of smartphone owners. So it makes sense that tablet owners are also more likely than smartphone owners to watch video content on their devices regularly, with 24.6% watching up to three times a month, 18.9% watching once a week, and 9.5% watching every day. Only 2.9% of smartphone owners admitted to watching video content on their devices every day.
More importantly, one in four tablet owners have actually paid for video content, which is good news for anyone looking to cash in on mobile video.
“Tablets are one of the most rapidly adopted consumer technologies in history and are poised to fundamentally disrupt the way people engage with the digital world both on-the-go and perhaps most notably, in the home,” said Mark Donovan, comScore SVP of Mobile, in a statement. “It’s not surprising to see that once consumers get their hands on their first tablet, they are using them for any number of media habits including TV viewing.” | 2024-03-14T01:27:13.970301 | https://example.com/article/6639 |
Lion’s Gateway Focus – Lisa Transcendence Brown
Lion’s Gateway Focus: Old Program Matrix Collapses Individually & Collectively for Convergence on a Higher Plane of Existence – Transcending Your Dis-Empowered State of Mind
8/5/2017
Your Consciousness Creates. It created, believed and supported the Old Earth Matrix, through your fears and your beliefs. You believed it all, because it WAS PHYSICALLY REAL at the time, yet it is no longer, unless you keep trying to make it so. Your fears keep you deeply embedded, your dis-empowered states. Your beliefs that you carry around with you, the stories that you tell yourself that keep you in this place. Your human is unaware that these realities are no longer true and that the STRUCTURES that held them in place (your unconsciousness) comes to a close, a conclusion, as your amnesia lifts and the dis-illusion becomes visible both within and outside of you. Read more | 2024-04-21T01:27:13.970301 | https://example.com/article/1270 |
Q:
Передача объекта при создании потока и вызов метода sleep
public class SynTest {
public static void main(String[] args) throws InterruptedException {
Thread1 t1 = new Thread1();
Thread t = new Thread(t1);
t.start();
Thread.sleep(5);
}
}
Что даёт передача экземпляра класса (t1) как аргумента в поток?
Почему мы используем класс-обертку (наверное) Thread для .sleep?
Не нужно ли использовать имя переменной потока, который уже стартовал, т.е. t.sleep(5)? Или это ошибка у автора кода?
public class Thread1 implements Runnable {
@Override
public void run() {
a("Thread1");
}
synchronized void a(String s) {
try {
Thread.sleep(2000);
} catch (InterruptedException e) {
e.printStackTrace();
}
System.out.println(s + " метод а");
}
}
A:
В конструктор Thread передаётся объект, реализующий интерфейс Runnable. Когда поток запускается, вызывается метод run у переданного объекта. Наличие у объекта метода run гарантируется как раз имплементацией интерфейса Runnable.
Метод Thread.sleep заставляет текущий (в котором вызван данный метод) поток приостановить своё выполнение на заданное время. Нестатического метода sleep в классе Thread вообще нет.
| 2024-02-18T01:27:13.970301 | https://example.com/article/9015 |
The field of the invention relates to vitamin D compounds, and more particularly to 19-nor-Vitamin D analogs and their pharmaceutical uses, and especially seco-A-2,19-dinor-1,25-dihydroxyvitamin D3, its biological activities, and its pharmaceutical uses. This latter compound can also be abbreviated simply as “DA2HE.”
The natural hormone, 1α,25-dihydroxyvitamin D3 and its analog in the ergosterol series (i.e., 1α,25-dihydroxyvitamin D2) are known to be highly potent regulators of calcium homeostasis in animals and humans, and their activity in cellular differentiation has also been established. (See Ostrem et al., Proc. Natl. Acad. Sci. USA, 84, 2610 (1987)). Many structural, analogs of these metabolites have been prepared and tested, including 1α-hydroxyvitamin D3, 1α-hydroxyvitamin D2, various side chain homologated vitamins and fluorinated analogs. Some of these compounds exhibit an interesting separation of activities in cell differentiation and calcium regulation. These differences in activity may be useful in the treatment of a variety of diseases such as renal osteodystrophy, vitamin D-resistant rickets, osteoporosis, psoriasis, and certain malignancies.
Another class of vitamin D analogs, i.e., the so called 19-nor-vitamin D compounds, is characterized by the replacement of the A-ring exocyclic methylene group (carbon 19), typical of the vitamin D system, by two hydrogen atoms. Biological testing of such 19-nor-analogs (e.g., 1α,25-dihydroxy-19-nor-vitamin D3) revealed a selective activity profile with high potency in inducing cellular differentiation, and very low calcium mobilizing activity. Thus, these compounds are potentially useful as therapeutic agents for the treatment, of malignancies, or the treatment of various skin disorders. Two different methods of synthesis of such 19-nor-vitamin D analogs have been described. (See Perlman et al., Tetrahedron Lett. 31, 1823 (1990); Perlman et al., Tetrahedron Lett. 32, 7663 (1991); and DeLuca et al., U.S. Pat. No. 5,086,191).
In U.S. Pat. No. 4,666,634, 2β-hydroxy and alkoxy (e.g., ED-71) analogs of 1α,25-dihydroxyvitamin D3 have been described and examined by the Chugai group as potential drugs for osteoporosis and as antitumor agents. (See also Okano et al., Biochem. Biophys. Res. Commun. 163, 1444 (1989)). Other 2-substituted (e.g., with hydroxyalkyl, (ED-120) and fluoroalkyl groups) A-ring analogs of 1α,25-dihydroxyvitamin D3 have also been prepared and tested. (See Miyamoto et al., Chem. Pharm. Bull. 41, 1111 (1993); Nishii et al., Osteoporosis Int. Suppl. 1, 190 (1993); and Posner et al., J. Org. Chem. 59, 7855 (1994), and J. Org. Chem. 60, 4617(1995)).
2-substituted analogs of 1α,25-dihydroxy-19-nor-vitamin D3 have also been synthesized, for example compounds substituted at the 2-position with hydroxy or alkoxy groups, (see DeLuca et al., U.S. Pat. No. 5,536,713), with 2-alkyl groups, (see DeLuca et al. U.S. Pat. No. 5,945,410), and with 2-alkylidene groups, (see DeLuca et al. U.S. Pat. No. 5,843,928). These 2-substituted analogs exhibit interesting and selective activity profiles. All these studies indicate that binding sites on vitamin D receptors can accommodate different substituents at C-2 in the synthesized vitamin D analogs.
In a continuing effort to explore the 19-nor class of pharmacologically important vitamin D compounds, analogs which are characterized by the presence of a methylene substituent at carbon 2 (C-2), a hydroxyl group at carbon 1 (C-1), and a shortened side chain attached at carbon 20 (C-20) have also been synthesized and tested. 1α-hydroxy-2-methylene-19-nor-pregnacalciferol is described in U.S. Pat. No. 6,566,352. 1α-hydroxy-2-methylene-19-nor-homopregnacalciferol is described in U.S. Pat. No. 6,579,861, and 1α-hydroxy-2-methylene-19-nor-bishomopregnacalciferol is described in U.S. Pat. No. 6,627,622. All three of these compounds have relatively high binding activity to vitamin D receptors and relatively high cell differentiation activity. However, these compounds have little if any calcemic activity as compared to 1α,25-dihydroxyvitamin D3. Their biological activities make these compounds excellent candidates for a variety of pharmaceutical uses, as set forth in the '352, '861 and '622 patents.
Analogs of the natural hormone 1α,25-dihydroxyvitamin D3 characterized by the transposition of the A-ring exocyclic methylene group from carbon 10 (C-10) to carbon 2 (C-2) (e.g., 1α,25-dihydroxy-2-methylene-19-nor-vitamin D analogs) have been synthesized and tested. (See Sicinski et al., J. Med. Chem., 41, 4662 (1998); Sicinski et al., Steroids 67, 247 (2002); and DeLuca et al., U.S. Pat. Nos. 5,843,928; 5,936,133 and 6,382,071)). In these studies, it was found that 1α,25-dihydroxy-2-methylene-19-nor-vitamin D analogs are characterized by significant biological potency. In addition, the biological potency of such analogs may be enhanced dramatically where “unnatural” (20S)-configuration is present. | 2023-09-30T01:27:13.970301 | https://example.com/article/2700 |
Recognition memory for movement in photographs: a developmental study.
The present studies investigated a phenomenon reported by Freyd (1983), later termed "representational momentum" (Freyd & Finke, 1984), in which adults' recognition memory for movement in photographs is distorted forward in the direction of the implied motion. To determine whether children are subject to the same distortion, in Experiment 1, 8- and 10-year-olds and adults were shown a photograph of an action scene and asked to remember it. Subjects were then shown a second photograph that was either the same as or slightly different from the first. Subjects made more errors for test photographs showing the action slightly forward, as compared with slightly backward in time, indicating that their memories had shifted forward. This effect depends upon the initial depiction of movement; no forward memory errors occurred when "still" photographs without movement were employed in Experiment 2. Results are discussed in terms of the representational momentum hypothesis and picture memory. | 2024-02-03T01:27:13.970301 | https://example.com/article/6879 |
One in 8 people in the Spokane community is food insecure, including 1 in 5 children. That means they do not know where their next meal is going to come from. (2nd Harvest, August. 2017)
Food insecurity is defined as having to cut meal size or skip meals, because there was not enough money for food at least once in the last year. Among youth in Spokane County in 2014, 16% reported experiencing food insecurity. Food insecurity decreased as maternal education level increased and was more likely among males, blacks, Native Americans/Alaska Natives, Hispanics, and multi-racial youth. (2015 Spokane Counts, Spokane Regional Health District)
Jail inmates (in Bonner County, ID) give back to the community by growing and donating more than 5,000 lbs. from their quarter-acre garden located near the jail.
What You Can Do
Real Food Spokane. Learn about nutrition, gardening, farmers markets, and ways you can get involved in making fresh, local food available to area residents and institutions. For more information, contact Nathan CaleneSpokane Food Policy CouncilCity of Spokane (509) 279-8596ncalene@spokanecity.orghttp://www.spokanefoodpolicy.org
Locate your closest food bank, find
out what hours they are open, and take garden and other food donations
to them. Most food banks are only open for limited hours.
Donate food to food drives sponsored by reputable organizations such as the Boy Scouts, US Postal Service, churches, and food banks.
Help collect and transport food to the food banks.
Help serve meals at local soup kitchens. Although food programs are not at the root of the real problem, we must realize there are many people going hungry every day.
Raise awareness about hunger.
Consider the way Spokane’s Community Colleges raised awareness about hunger in Spokane
and around the world, by hosting an Oxfam Hunger Banquet in May 2007.
At the banquet, approximately 15% of the guests were randomly assigned
to an “upper class” group; another 25% to the “middle class”; and 60% to
the “lower class.” Each group’s dinner menu reflected their economic
status, from a gourmet meal to a simple glass of water and a piece of
bread. The goal was to illustrate the unequal distribution of food
around the world. Tickets for the event were $2/person or $5/family of
three or more. Proceeds benefited the House of Charity in Spokane. (509) 533-8221 | 2024-04-20T01:27:13.970301 | https://example.com/article/8937 |
Iranian officials have banned the teaching of English in primary schools.
Mehdi Navid-Adham, chief of Iran's High Education Council, informed state television of the ban last Saturday.
The move came after Islamic leaders warned that early learning of the English language has led to a Western "cultural invasion".
"Teaching English in government and non-government primary schools in the official curriculum is against laws and regulations," Navid-Adham said. He added that the government may also stop non-curriculum English classes.
The reasoning, Navid-Adham said, is that the groundwork, or basis, of Iranian culture should be taught to young children.
In Iran, English language training is usually offered in middle school, to students from 12 to 14 years of age. However, in some primary schools, students may begin taking English classes at younger ages.
Some Iranian children also attend foreign language classes at private education centers after normal school hours.
The dangers of a "cultural invasion"
Iran's Islamic leaders have often warned about the dangers of "cultural invasion."
In 2016, Supreme Leader Ayatollah Ali Khamenei voiced concern over the "teaching of the English language spreading to nursery schools".
In a speech to teachers, Khamenei said that his concern, "Does not mean opposition to learning a foreign language, but (this is the) promotion of a foreign culture in the country and among children, young adults and youths."
Khamenei accused Western countries of promoting their cultures with Iranian youth as a way of expanding their influence in Iran, according to his office's website.
In the same speech, he urged Iranians to spend more time and money on the teaching of the Persian language, instead of English.
Last Saturday, Navid-Adham told state television that government officials want to strengthen "Persian language skills and Iranian Islamic culture at the primary school stage." He added that it would now be against the law to teach English at the primary school level, either during or outside of normal school hours.
The Reuters news agency reported that in the past, other languages have also been targeted by Iranian officials. In 2017, Iran's intelligence agency banned the publication of a Kurdish-language instruction book.
No link to protests
In his announcement, Navid-Adham did not link the new language education rules to recent anti-government protests. Iran's Revolutionary Guards have blamed foreign enemies for the unrest.
A video dealing with the announcement of the ban was widely shared on social media on Sunday. A number of Iranians have jokingly called it "The filtering of English." Some compare it to the blocking of the popular app Telegram by the government during the protests.
I'm Phil Dierking.
Phil Dierking adapted this report for VOA Learning English based on Reuters news reports. The story also includes information from The Washington Post newspaper and Radio Free Europe/Radio Liberty. George Grow was the editor.
Do you think teaching English at the primary school level in a non-English speaking country is cultural invasion? We want to hear from you. Write to us in the Comments Section or on 51VOA.COM. | 2023-11-23T01:27:13.970301 | https://example.com/article/2036 |
To find the A to B measurement (or simply A measurement) for
your caravan, measure (in centimetres) ground to ground from a
point vertically below the awning channel at one end, around the
periphery, to a point vertically below the awning channel at the
other end. The caravan should be on level ground when obtaining
measurement.
A classic favourite for many years with all our customers – and no wonder! This market leader offers a 5 piece awning that exudes luxury. Benefiting from "2 Full Ventilated Side Mesh Windows" for those hot and humid summer nights and boasting a one piece seamless "Heat Reflective Roof" all secured down with our unique "Movable Pegging System." And for extra peace of mind, why not add a "Bradcot Tie Down Kit" (optional extra.) | 2023-10-11T01:27:13.970301 | https://example.com/article/1852 |
<?php
namespace N98\Magento\Command\Config;
use InvalidArgumentException;
use N98\Magento\Command\AbstractMagentoCommand;
abstract class AbstractConfigCommand extends AbstractMagentoCommand
{
const DISPLAY_NULL_UNKNOWN_VALUE = "NULL (NULL/\"unknown\" value)";
/**
* @var array strings of configuration scopes
*/
protected $_scopes = array(
'default',
'websites',
'stores',
);
/**
* @return \Mage_Core_Model_Encryption
*/
protected function getEncryptionModel()
{
if ($this->_magentoMajorVersion == self::MAGENTO_MAJOR_VERSION_2) {
// @TODO Magento 2 support
} else {
return \Mage::helper('core')->getEncryptor();
}
}
/**
* @return \Mage_Core_Model_Abstract
*/
protected function _getConfigDataModel()
{
return $this->_getModel('core/config_data', 'Mage_Core_Model_Config_Data');
}
/**
* @param string $value
* @param string $encryptionType
* @return string
*/
protected function _formatValue($value, $encryptionType)
{
if ($value === null) {
$formatted = $value;
} elseif ($encryptionType === 'encrypt') {
$formatted = $this->getEncryptionModel()->encrypt($value);
} elseif ($encryptionType === 'decrypt') {
$formatted = $this->getEncryptionModel()->decrypt($value);
} else {
$formatted = $value;
}
return $formatted;
}
/**
* @param string $scope
*
* @return string
*/
protected function _validateScopeParam($scope)
{
if (!in_array($scope, $this->_scopes)) {
throw new InvalidArgumentException(
sprintf('Invalid scope parameter, must be one of: %s.', implode(', ', $this->_scopes))
);
}
return $scope;
}
/**
* @param string $scope
* @param string $scopeId
* @param boolean $allowZeroScope
*
* @return string non-negative integer number
*/
protected function _convertScopeIdParam($scope, $scopeId, $allowZeroScope = false)
{
if ($scope === 'default') {
if ("$scopeId" !== "0") {
throw new InvalidArgumentException(
sprintf("Invalid scope ID %d in scope '%s', must be 0", $scopeId, $scope)
);
}
return $scopeId;
}
if ($scope == 'websites' && !is_numeric($scopeId)) {
$website = \Mage::app()->getWebsite($scopeId);
if (!$website) {
throw new InvalidArgumentException(
sprintf("Invalid scope parameter, website '%s' does not exist.", $scopeId)
);
}
return $website->getId();
}
if ($scope == 'stores' && !is_numeric($scopeId)) {
$store = \Mage::app()->getStore($scopeId);
if (!$store) {
throw new InvalidArgumentException(
sprintf("Invalid scope parameter. store '%s' does not exist.", $scopeId)
);
}
return $store->getId();
}
$this->invalidScopeId(
$scopeId !== (string) (int) $scopeId,
"Invalid scope parameter, %s is not an integer value",
$scopeId
);
$this->invalidScopeId(
0 - (bool) $allowZeroScope >= (int) $scopeId,
"Invalid scope parameter, %s is not a positive integer value",
$scopeId
);
return $scopeId;
}
/**
* @param boolean $condition
* @param string $mask
* @param string $scopeId
*/
private function invalidScopeId($condition, $mask, $scopeId)
{
if (!$condition) {
return;
}
throw new InvalidArgumentException(
sprintf($mask, var_export($scopeId, true))
);
}
/**
* @return \Mage_Core_Model_Config
*/
protected function _getConfigModel()
{
return $this->_getModel('core/config', 'Mage_Core_Model_Config');
}
}
| 2024-07-26T01:27:13.970301 | https://example.com/article/6431 |
credhub
Copyright (c) 2016-Present CloudFoundry.org Foundation, Inc. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
| 2024-04-22T01:27:13.970301 | https://example.com/article/9473 |
Celtic are close to signing Manchester United defender Tyler Blackett on-loan.
The 21-year-old is being linked with a loan move to a number of clubs including West Brom, Valencia and David Moyes’ Real Sociedad as per the Daily Mail.
Discussions are ongoing between the two clubs over a possible move to Glasgow for the England Under-21 international as reported by BBCSport.
Blackett has two years left on his current contract at Manchester United, which he signed in February this year.
He has made 11 appearances including several at the beginning of last season as United battled with a host of injuries to a number of their starting defenders.
The defender is expected to follow Jonny Evans out of Old Trafford before the transfer window closes. Evans is close to completing his move to another Premier league side, West Brom and was one of the players we identified as a possible target for Celtic.
In his brief appearances for Van Gaal’s Reds, he hasn’t performed and looks to be on his way out to gain some valuable experience and playing time.
Blackett has had previous loan spells at Blackpool and Birmingham and is unlikely to get much playing time at the moment in Van Gaal’s United team that has conceded just one goal this season. | 2024-01-27T01:27:13.970301 | https://example.com/article/5824 |
1. Field of the Invention
The present invention relates to a magnetic thin-film memory element for recording information therein by directions of magnetization and regenerating the information therefrom by magneto-resistance, and a magnetic thin-film memory using the magnetic thin-film memory elements.
2. Related Background Art
Magnetic thin-film memories are solid state memories having no moving parts as semiconductor memories, and have advantages over the semiconductor memories; e.g., the information stored therein is not lost even without supply of power; the number of repetitive rewrites is infinite; there is no risk of destroying the recorded contents even if exposed to radiation, and so on. Particularly, thin-film magnetic memories utilizing the giant magneto-resistance (GMR) effect are drawing attention in recent years, because they can produce stronger output than the magnetic thin-film memories using the anisotropic magneto-resistance effect, which have been proposed heretofore.
For example, Journal of the Magnetic Society of Japan, Vol. 20, p 22 (1996) describes a solid state memory consisting of memory elements made of a stack of constituent elements including hard-magnetic film HM/non-magnetic film NM/soft-magnetic film SM/non-magnetic film NM as shown in FIG. 1. Each memory element is provided with sense lines S joined with a metal conductor and a word line W insulated from the sense lines S by insulating film I. Information is written by a magnetic field generated by word-line current and sense-line current.
Specifically, as shown in FIGS. 2A to 2D, memory states "0," "1" are recorded by allowing a current I to flow through the word line W and thereby generating either of magnetic fields of different directions depending upon directions ID of the current I through the word line W so as to cause reversal of magnetization in the hard-magnetic film HM. For example, when the positive current is allowed to flow as shown in FIG. 2A, the rightward magnetic field is generated as shown in FIG. 2B, thereby recording "1" in the hard-magnetic film HM; in contrast, when the negative current is allowed to flow as shown in FIG. 2C, the leftward magnetic field is generated as shown in FIG. 2D, thereby recording "0" in the hard-magnetic film HM.
The information is read by allowing a smaller current I than the recording current to flow through the word line W so as to cause only reversal of magnetization in the soft-magnetic film SM and measuring change in resistance on that occasion, as shown in FIGS. 3A to 3E. When the giant magneto-resistance is utilized, there appears a difference between resistances in the parallel state and in the antiparallel state of magnetization in the soft-magnetic film SM and in the hard-magnetic film HM. Therefore, the memory states of "1" and "0" can be discriminated from each other by change in resistance occurring at that time.
When a pulse signal including a positive pulse and a negative pulse in this order as shown in FIG. 3A is applied, the magnetization varies from rightward to leftward in the soft-magnetic layer. In the memory state "1," the small resistance as shown in FIG. 3B changes to the large resistance as shown in FIG. 3C. In the memory state "0," the large resistance as shown in FIG. 3D changes to the small resistance as shown in FIG. 3E. By detecting this change in resistance, the information recorded in the hard-magnetic film HM can be read irrespective of the magnetization states of the soft-magnetic film SM after recording. This realizes nondestructive reading.
With the magnetic thin-film memory of the above structure, however, the demagnetizing field (self-demagnetizing field) produced inside the magnetic layers cannot be ignored as the area of bit cell becomes smaller. The demagnetizing field changes the magnetization direction from the fixed direction in the record-holding magnetic layer, so as to make the magnetization direction unstable. The magnetic thin-film memory of the above structure thus failed to store information with decreasing sizes of bit cell and had a drawback of not allowing high integration of bit cells accordingly. | 2023-11-24T01:27:13.970301 | https://example.com/article/1761 |
Q:
Winforms TabControl alignment problems
When I set TabControl alignment to Left or Right it leaves this huge space between tab buttons and tab page area. How to get rid of this useless space?
TabControl.Appearance is set to Buttons because if it is set to Normal the text on buttons disappear.
UPDATE:
When i set TabControl.Alignment to Bottom and TabControl.Appearance to Normal buttons look inverted (orange line should be below)
When i set TabControl.Alignment to Bottom and TabControl.Appearance to Buttons, There is no area on TabPage to place controls
A:
This is a well-known problem with the XP visual style implementation for the native tab control, only tabs aligned to the top render properly. This bug hasn't been addressed until Windows 7. The workaround is to selectively turn off the style. Add a new class to your project and paste the code shown below. Compile. Drop the new control from the top of the toolbox onto your form and change the Alignment property to your liking. It isn't going to look prettier than that.
using System;
using System.Windows.Forms;
using System.Runtime.InteropServices;
class FixedTabControl : TabControl {
protected override void OnHandleCreated(EventArgs e) {
SetWindowTheme(this.Handle, "", "");
base.OnHandleCreated(e);
}
[DllImportAttribute("uxtheme.dll")]
private static extern int SetWindowTheme(IntPtr hWnd, string appname, string idlist);
}
| 2024-05-24T01:27:13.970301 | https://example.com/article/5106 |
He woke up from a late nap, and didn't come out of his room, and I walked by his door and smelled SHIT.
I opened the door and his whole room is covered in SHIT.
IT'S A MURDER SCENE OF POOP. EVERYTHING IS COVERED IN POOP. THE KID, THE CLOTHES, THE WALLS, THE BED, THE CARPET, THE STUFFED ANIMALS, EVERYTHING IS COVERED IN POOP!!!
Okay, I'm not really going to give someone $50, but I'm not dealing with the bedroom. I keep puking. I tossed the kid in the bathtub and hosed him down with the shower sprayer. His bedroom is officially off limits untl DF gets home. DS has never done this before. He's potty trained... Why is he pooping in his room?!?!
Can it be my bedtime yet?
***Mmkay, DF isn't able to leave work until 1 am, because they're so busy, so I went in the bedroom, and the smell wasn't so bad once it had all dried, and it was easy to just scrape it off everything in flakes onto the floor and vacuum it all up. I'm having issues getting it all off the walls though, because it's matte white primer, horribly uncleanable.
All his toys except for a few stuffed animals, his My Little Ponies, a couple newer books, and a couple trains have all been bagged up to go in the garage. I disassembled his bed, took his tv, all he has left is a chair, a desk, and a mattress on the floor, and those few toys.
After all the things he's done this week (climbing up to the top of the refrigeratior to get my chocolate cake and eating half of it while I showered on Friday, dumping an entire bag of flour all over the dining room while DF was pooping and I was at my doctor on Monday, eating 4 Sudafed while I was on the phone with his school yesterday and making me have to call poison control, and then smearing shit everywhere today), he's going to have to earn his things back if he wants them. He didn't even seem to care that I was "putting his toys in the trash and throwing them away." He just sat there and laughed and said "okay."
Now I have to figure out how to scrub all the shit out of his mattress that I currently have sitting in the bathtub (we have a spare that he's sleeping on now). | 2024-06-26T01:27:13.970301 | https://example.com/article/1336 |
Mother's Day Animation
This Mother's Day Animation was made with the Flash intro and banner builder. We inserted several lines of text and added a color fade to "Mother's Day ". Then we added a white border to the Mother's Day text to make it stand out.
We also added one of our free theme animationst, to help us to get that special Mother's Day Animation atmosphere | 2024-06-12T01:27:13.970301 | https://example.com/article/1485 |
Q:
How can I find out if a DAG is paused/unpaused in Airflow?
I would like to pause DAGs that are idle and redundant, How do I know which DAGs are unpaused and which are paused?
So I have a list of DAGs that are to be unpaused using a bashcommand that executes airflow pause <dag_id>. I would like to know if the command is successful or not by checking the state of pause of each DAGs. I've checked the airflow webserver and it seems that all of my paused DAGs are still running.
def pause_idle_dags(dags = ["myTutorial"]):
"""
Pauses dags from the airflow
:param dags: dags considered to be idle
:return: Success state
"""
# TODO
for dag in dags:
command = "airflow pause {}".format(dag)
print(executeBashCommand(command))
def executeBashCommand(command):
print('========RUN========', command)
p = subprocess.Popen(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
stdout, stderr = p.communicate()
if p.returncode != 0:
print('========STDOUT========\n',stdout.decode())
print('========STDERR========\n',stderr.decode())
raise Exception('There is error while executing bash command: '+command+'\nwith log:\n'+stderr.decode())
return stdout, stderr
A:
When you run airflow commands that instruct it to perform some action it should edit the internal stat of the backend database that it is connected to. By default airflow using SQLite. You may have setup your own one. Either way you can query that to check.
e.g. airflow=# select * from dag where is_paused;
Here you can obviously also perform updates such as
airflow=# update dag set is_paused='false' where is_paused;
| 2024-06-12T01:27:13.970301 | https://example.com/article/8235 |
Listen to the podcast
ROCKWELL: Well, good morning. This is the Lew Rockwell Show. And what an honor, what a thrill to have on the show this morning as our guest, Mr. Roger Stone. Roger is, of course, a legendary political consultant/strategist for many important Republican politicians, Nixon, especially Reagan, Bob Dole, many others. Although, I’m glad to say he’s recently joined the Libertarian Party, rather than the Republican Party. And he has a wonderful blog, a wonderful Twitter feed, a wonderful website. We going to, of course, link to all that.
But, you know, Roger, I remember the late Gerhart Niemeyer, who was a professor of political science at Notre Dame, being asked — this was back in Cold War days — why did the Russians bother to have all these lying slogans and lying publications and lying speeches and so forth, how could it have any effect. And he said, well, constant lies have a very demoralizing and a depressive effect on people when they’re not answered. So we’ve, of course, had many official lies about the Kennedy assassination, not to mention, of course, a tremendous number of other subjects. But in your new book, The Man Who Killed Kennedy: The Case Against LBJ, you’re speaking the truth, you’re telling the truth, you’ve learned the truth, and you’re communicating it to people. And it really lifts the heart to know the truth of this horrendous event that, of course, still has many bad effects. But led you to write this book? The Man Who Killed Ken... Roger Stone Best Price: $2.56 Buy New $25.53 (as of 07:00 EST - Details)
STONE: Well, Lew, in 1964, when I was a lonely Goldwater volunteer, actually, a pre-teen, I read a book called A Texan Looks at Lyndon —
ROCKWELL: Yeah.
STONE: — by J. Evetts Haley, which is one of the very earliest books that talked about his criminal and corrupt activities in Texas. I believe that LBJ is responsible for at least eight politically motivated murders; murder to cover up corruption, murder to cover up electoral fraud and vote stealing in the 1948 Senate election. So murder was in his repertoire. You know, our tax dollars every year go to the LBJ Library to burnish the image of a man who was, in fact, an amoral psychopath. Lyndon Johnson was vicious, vindictive, abusive, mean-spirited, dishonest, corrupt, and he fathered at least three illegitimate children that I name in my book. I mean, he was, by the admission of his own press secretary, George Reedy, a monster. Bobby Kennedy called him an animal. Richard Nixon called him an animal. Bill Moyers, one of his flunkies, said he was a very, very sick man. And he wasn’t speaking of his health, other than perhaps his mental health.
So, you know, you start there, and now you add to that fact that he blackmailed his way onto the 1960 ticket using information from J. Edgar Hoover’s famous secret files on Jack Kennedy’s sexcapades. So Johnson blackmailed his way onto the ticket. And then, you know, he was a man facing not only disgrace and political ruin but probably prison for his corruption activities in two huge scandals, the Bobby Baker scandal and the Billy Sol Estes scandal, in November of ’63. So he was a man staring into the abyss. I have really tried to build on the work of others who went before me, across the board, on the entire question of the assassination, and these are the conclusions I reached.
ROCKWELL: And you point out in your book that’s it’s not only, of course, you who reached this conclusion, but there was a French intelligence investigation and a Soviet intelligence investigation, both of which arrived at the same conclusion that you’ve arrived at.
STONE: Yeah. The list of people who say it was Lyndon Johnson responsible for the death of JFK includes Jack Ruby, it includes Barry Goldwater, it includes French intelligence at the behest of Jackie Kennedy. She asked for the investigation. She may have paid for the investigation. The KGB, there’s an 81-page report of their own investigation, the entire assassination and Johnson, and they conclude that it’s Johnson. Evelyn Lincoln, President Kennedy’s personal secretary, believes it was Johnson. I’m not alone in this — and I don’t want to call it a theory because I believe it’s a fact. When those in the mainstream media refer to conspiracies, that’s a pejorative; that’s meant to denigrate anyone who questions the government’s version of things. I don’t speak in terms of conspiracies. I talk in terms of a plot and I talk in terms of facts. So those who say the CIA killed Kennedy, Texas Oil killed Kennedy, the mob killed Kennedy, they’re all correct. They all played some role in Kennedy’s death. But the linchpin, the guy who was indispensible because he controlled Dallas, he controlled the Dallas Police Department, he controlled the Dallas County Sheriff’s Office, he controlled the Dallas County District Attorney, the indispensible man in this plot was Lyndon Johnson.
ROCKWELL: And I remember Murray Rothbard, in a great essay on this topic, pointing out that when there’s a crime that’s committed, the first place the cops look is — I mean, cui bono? Who benefits from it?
STONE: Exactly.
ROCKWELL: It doesn’t mean that that person did it, but that’s the first suspect.
STONE: Yeah. There’s actually a Latin axiom that I use in my book that goes, “Cui prodest scelus, est fict,” which means the person who derives the greater benefit from the crime is probably the person who committed it.
(LAUGHTER)
ROCKWELL: Yeah, it’s certainly true. And you give a wonderful anecdote about what Nixon had to say about Johnson and the Kennedy assassination.
STONE: Yeah, Nixon was not given to introspection. He wasn’t also given to retrospect. He didn’t really like to talk about the past. You would say, well, Mr. President, what was Eisenhower really like, and he just wasn’t interested. He was very interested in the future. He was very forward-looking. But on those few occasions where I did get him to talk about it — you know, he had a very low tolerance for alcohol. So after a couple of cocktails, he became a lot more loquacious and you would learn a lot. He still spoke, you know, circuitously. In other words, he never just flatly said, “Well, LBJ did it.” What he said instead was, “Well, Lyndon and I both wanted to be president, the difference was, I wasn’t willing to kill for it.” To me, that kind of sums it up. On another occasion, I asked him who killed Kennedy, and his eyes got very narrow, and he just said, “Dallas.”
(LAUGHTER)
So, you know, as I write in my book, he had an association with Jack Ruby. He recognized Ruby as a Johnson man. Murray Shatner, who was Nixon’s priest, kind of his first political advisor, who had also been a mob lawyer in L.A., brought Jack Ruby to Nixon in 1947, and he said, “Lyndon Johnson would appreciate it as a courtesy if you could get him on part time as an informant for the House Un-American Activities Committee,” which Nixon agreed to do. And in fact, payroll records of the U.S. Clerk of the House show that Jack Rubenstein, of Chicago, was on the payroll as an informant for Nixon’s committee. To me, that kind of nailed it. Then Nixon knew that Hoover was lying to him. He knew that Johnson was lying to him. He got the big picture immediately. He understood and, as you probably know, attempted to get the CIA’s Kennedy assassination record. The president of the United States ordering a federal authority to hand over the records, and they refused. Nixon knew the CIA was in it up to its neck, and that’s what he wanted to prove. I always suspected he kind of wanted it as an insurance policy. Blood, Money, & Power:... Barr McClellan Best Price: $3.73 Buy New $10.90 (as of 06:10 EST - Details)
So I do have a lot of first-hand anecdotes in the book. Tony Salerno, “Fat Tony” Salerno, the head of the Genovese mob in New York, somebody I had occasion to meet in the early 1980s, he told me it was Johnson, with the assistance of Carlos Marcello, John Davis Lodge, a distinguished ambassador to Spain, Argentina, Switzerland; serving three presidents; a member of the House Foreign Affairs Committee; governor of Connecticut; brother of Henry Cabot Lodge. He told me Cabot always said it was Johnson and the agency boys assisted by some Mafiosi, as he would say.
So, you know, the more you dig, the more you could find. America experienced a coupe d’etat, a hostile takeover of the U.S. presidency on November 22, 1963.
ROCKWELL: You know, you mentioned A Texan Looks at Lyndon. When I was a Goldwater volunteer, as well, it was my job to pass out as many copies, free copies of that as possible in Massachusetts.
STONE: Yeah, me, too.
ROCKWELL: It didn’t work, by the way.
(LAUGHTER)
STONE: Yeah, I remember.
(LAUGHTER)
ROCKWELL: But it’s a great book and he was a great man. So it’s wonderful that you’re carrying on his work and, of course, vastly expanding on it. And I didn’t learn about Goldwater’s view of this until your book.
STONE: Goldwater, I think, like many Americans, at first, he bought the cover story. It’s kind of interesting because even Johnson knew that the Warren Commission’s version of things was thin; very, very thin. So the way he bolstered it was by telling Earl Warren, for example, the chief justice of the U.S. Supreme Court, look, there was an international conspiracy, the Russian’s really did this but we can’t admit that because it will cause World War III, so we have to have a cover up, otherwise, folks will learn that the Cubans and the Russians killed Kennedy. But there’s no evidence whatsoever that the Russians or the Cubans killed Kennedy. On the contrary. We know that when he learned this, Khrushchev wept. It’s not surprising. He had just taken Kennedy to the cleaners in the Cuban Missile Crisis. They tell us, oh, Jack Kennedy faced the Russians down and forced them to remove their missiles. Wrong! He made a cynical deal to remove our missiles from strategically placed missiles in Turkey and Greece. That was kept from the American people for 30 years. He lied to Eisenhower and Truman and Hoover about it, because he called all three of them to brief them on the fact that he had forced the Russians to back down. And he never required on-site inspections. So I rather suspect Khrushchev liked dealing with JFK and the Unspeakabl... Douglass, James W. Best Price: $6.42 Buy New $13.52 (as of 06:45 EST - Details) Kennedy. He was inexperienced and they were taking him to the cleaners.
ROCKWELL: Roger, maybe one of my least favorite guys on television is Bill O’Reilly. And of course, he’s written a terrible Kennedy assassination book. And another great thing that you do in your work, you take him down.
STONE: Yeah. First of all, Lew, you and I both know that Bill O’Reilly didn’t write that book. In fact, I doubt he’s even read that book —
(LAUGHTER)
— because it’s got more holes in it than Swiss cheese. It just gets so many things wrong. And I would love to go on with him and debate the book but we both know that’s not going to happen.
(LAUGHTER)
ROCKWELL: No.
STONE: Yeah, I think it’s intellectually dishonest. I mean, first of all, his book is very prurient. You know, if you’re interested in John Kennedy’s sex life, if you’re looking for the real dirt about his sex life, then it’s a terrific book. But when it comes to the assassination, he misses so many things. He gets so many things wrong.
And then he himself claims that he was on the doorstep of George de Mohrenschildt, who was Oswald’s CIA handler. And de Mohrenschildt was living in Palm Beach, Florida, at the time. He had received a subpoena from the House Select Committee on Assassinations to testify, and he shot himself. He killed himself. At least we believe he did. He committed suicide rather than testify. O’Reilly writes that he was on his doorstep in Palm Beach when he killed himself, but we find out that he was on television in Dallas. No man can be in two places at the same exact time. So I’d say Bill has a lot of ‘splaining to do.
ROCKWELL: Roger, what about Gerald Ford? I mean, he played a very, very interesting role. Obviously, he was already trusted to be placed on the Warren Commission. But he played a very interesting role in that cover up. And of course, that profited him in later political life.
STONE: Yeah. In the tape recording in which Johnson asks Ford to be on the commission, he calls him up and says, “‘Well, I want you on there because you know those CIA boys.” Well, in fact, Newsweek magazine said, in 1970, that Gerald Ford was the CIA’s man in Congress. He was their guy. And we also know from the memoirs of both Deke DeLoach, the number-three man at the FBI, and William Sullivan, the number-two man at the FBI, that Ford was doing Hoover’s bidding. Specifically, in 1992, we got a declassified document that showed that Gerald Ford himself, in his own hand, with a pencil, altered the official autopsy records to make it appear that the wound in President Kennedy’s upper-left back had, in fact, been in his lower neck. Why? He did this to accommodate the government’s crazy single-bullet theory. They had to claim, incorrectly, that one bullet had hit both LBJ: The Mastermind of... Phillip F. Nelson Best Price: $7.91 Buy New $11.23 (as of 06:30 EST - Details) Kennedy and Governor John Connally. So the autopsy obviously would not confirm that, so the autopsy records were altered. The New York Times reported this many years later. And Ford was asked why he did it, and he said, “The country needed clarity.” That was his response.
(LAUGHTER)
I think it’s treasonous myself. But, yes, Gerald Ford is a fine player in the cover up about the facts of the death of JFK.
ROCKWELL: What about George H.W. Bush? He plays a very interesting role in the Kennedy assassination, too.
STONE: Yeah.
ROCKWELL: Rather than just the cover up.
STONE: Yeah. It’s very hard to say, of course, exactly what his role was. I mean, as a Goldwater Republican, as a Reagan Republican, I fought with the Bushes. I’m from Connecticut, so I fought Prescott Bush, the patriarch.
ROCKWELL: Oh.
STONE: I realized that the Bushes believe in and stand for nothing, other than perhaps crony capitalism.
But for 30 years, George H.W. Bush said that he couldn’t remember where he was on the day of the Kennedy assassination. That’s ludicrous. Every adult alive at that time —
(LAUGHTER)
— knows where they were.
ROCKWELL: Yes.
STONE: You know. I know. We all know.
ROCKWELL: Yeah. Maryu2019s Mosaic: The... Peter Janney Best Price: $3.39 Buy New $15.89 (as of 06:55 EST - Details)
STONE: Then again, in 1992, ironically, and on the basis of legislation signed by George Bush himself, we get two very interesting memos. One shows us that George Bush called the Houston FBI Bureau seven minutes after the president has been killed, essentially to establish that he’s in Tyler, Texas, that he’s not in Dallas: “IAA, it’s 1:45. I’m in Tyler, Texas here, giving a speech. Just wanted you guys to know there’s a young Republican in Harris County” — that’s Houston — “who’s been making threats against the president.” I don’t know if that means anything. It may mean nothing. I’m not making the accusation. I just need an excuse to call and that’s it. And then, even more interestingly, he says that he intends to fly back to Dallas that evening and will be in Dallas at the Sheraton Hotel. But he doesn’t. He flies back to Houston that night. In fact, he stayed in the Sheraton Hotel the night before. Why the obfuscation? Why the need for an alibi?
And then, secondarily, in that same trove of documents, we get a second declassified document in which J. Edgar Hoover directs someone in the FBI to brief “Mr. George Bush of the CIA.” The problem with that, of course, is that when he was appointed director of the CIA, he testified in his confirmation hearings that he had never worked for the agency before. There’s enormous evidence now that he and a fellow named Jack Crichton were involved with the CIA during the Bay of Pigs and they had been raising money for the Bay of Pigs operation. So there’s a lot of disinformation coming out of George Bush. I don’t say in my book what he did do that day because I don’t know. All I’m saying is that he acts very curiously, very strangely, actually bringing more questions than if he’d just kept his mouth shut and done nothing.
ROCKWELL: Very, very interesting.
Roger, this is such a great book.
I want to urge everybody to buy a copy and read it. And of course, we’ll have an Amazon link to it.
You know, I think we’re all in your debt for having produced this work. It’s so beautifully written. It’s so compelling. It’s got so many fascinating unknown things in it, or too little known.
And really, congratulations to you, and thanks a million for coming on the show today.
STONE: Well, you’re very kind to have me on. I had breakfast with our mutual friend, Judge Andrew Napolitano, yesterday.
ROCKWELL: Well.
STONE: He asked me to give you his warmest regards.
ROCKWELL: Well, thank you. And he’s another great man.
STONE: He’s my nominee for chief justice of the U.S. Supreme Court.
(LAUGHTER)
ROCKWELL: Boy, I would certainly go along with that.
STONE: We should be so lucky.
ROCKWELL: This would maybe be in the Stone administration?
(LAUGHTER)
STONE: Don’t hold your breath.
(LAUGHTER)
ROCKWELL: Thank you, Roger.
STONE: Many thanks.
ROCKWELL: Bye-bye.
Well, thanks so much for listening to the Lew Rockwell Show today. Take a look at all the podcasts. There have been hundreds of them. There’s a link on the LRC front page. Thank you.
Podcast date, November 6, 2013 | 2023-09-23T01:27:13.970301 | https://example.com/article/1739 |
The purpose of the museum is, "to exalt [North Korea's] late leaders and to further flare anti-American sentiment," the country's official news agency reported | 2024-07-12T01:27:13.970301 | https://example.com/article/9373 |
Kurtzmaniella gen. nov. and description of the heterothallic, haplontic yeast species Kurtzmaniella cleridarum sp. nov., the teleomorph of Candida cleridarum.
The teleomorph of Candida cleridarum was discovered through the detection of conjugation between isolates of a large collection from the nitidulid beetles of the genus Carpophilus found in the flowers of various cacti in Arizona, USA. The previous oversight of the sexual cycle of this yeast is attributed to the inequality (ca. 5 : 1) of the two mating types. Extensive conjugation between compatible mating types is observed after overnight incubation on 5 % malt agar, followed after 3-5 days by the formation of mature asci. The hat-shaped ascospores are reminiscent of those seen in Kodamaea species, which are members of the same guild. However, published analyses of D1/D2 large subunit rDNA sequences indicate an affinity with the genus Debaryomyces. As the latter is polyphyletic and morphologically heterogeneous, and in view of the distinct life cycle of the new teleomorph, the new genus Kurtzmaniella is described with a novel species, Kurtzmaniella cleridarum sp. nov. Given the close relatedness of Kurtzmaniella cleridarum sp. nov. to Candida quercitrusa, Candida oleophila and Candida railenensis, for which several natural isolates were available, strains of these species were mixed in pairs under the conditions found favourable for the former. Conjugation was not detected in those species. The type strain of Kurtzmaniella cleridarum sp. nov. is UWOPS 99-101.1(T) (=CBS 8793(T)=NRRL Y-48386(T), h(+)), type of Candida cleridarum. The allotype is UWOPS 07-123.1 (=CBS 10688=NRRL Y-48387, h(-)). | 2023-12-28T01:27:13.970301 | https://example.com/article/4849 |
Madonna Rushed to Hospital on Her 47th B'Day
Madonna was rushed to the hospital after falling off a horse while celebrating her 47th birthday
August 16 should be a happy day for pop star Madonna, who at that day turned 47. Unfortunately, she wasn't that happy. Celebrating her birthday, the singer unluckily fell off a horse while riding on her London-area estate that her husband, Guy Ritchie, rushed her to hospital.
As a result of the incident, Madonna broke her hand, collarbone and cracked three ribs. Thanks God, she hadn't punctured lung and was released from the hospital. Though, with such condition she would unlikely to be able to sing or dance in the near future because her fractured ribs will make breathing painful for at least six weeks. | 2023-12-09T01:27:13.970301 | https://example.com/article/6922 |
Abstract Fibrosis is a pathogenic process in organs (e.g., lung, kidney) involving the excess deposition of extracellular matrix (ECM) leading to loss of organ homeostasis. Fibrosis is the hallmark of progressive chronic kidney diseases as a common pathogenic response to injury. Similarly, end-stage lung diseases are often characterized by lung fibrosis. Recent studies suggest that necroptosis, a genetically-programmed form of cell death that is regulated by receptor-interacting protein-1 and -3 (RIPK1, RIPK3) kinases, may have emerging significance in human disease. Little is currently known of the role of RIPK3 in the pathogenesis of organ fibrosis. We have exciting preliminary data that RIPK3 can exert crucial functions in experimental models of kidney and lung fibrosis. Intriguingly, mice deficient in RIPK3, but not in its signaling target the mixed lineage kinase domain-like protein (MLKL), were protected against kidney fibrosis. We have also identified a RIPK3-mediated signaling pathway that regulates fatty acid (FA) metabolism by activating ATP citrate lyase (ACL), and contributes to kidney fibrosis. In contrast, mice deficient in either RIPK3 or MLKL were susceptible to pulmonary fibrosis. These studies suggest that RIPK3 may represent a novel mediator of organ fibrosis with differential organ or tissue-specific effects. The endogenous gaseous molecule carbon monoxide (CO) has been implicated as an experimental therapeutic modality in organ injury. Our published studies indicate that physiologic low-dose CO can mitigate fibrosis in unilateral ureteral obstruction (UUO)-induced kidney fibrosis, and in bleomycin (BLM)-induced pulmonary fibrosis. Therefore, we hypothesize that RIPK3 represents an important mediator of organ fibrosis through MLKL-independent and MLKL?dependent pathways. A RIPK3-dependent (MLKL-independent) signaling pathway and downstream regulation of the FA synthesis pathway contributes to the development of kidney fibrosis. In contrast, a RIPK3 and MLKL dependent pathway can inhibit pulmonary fibrosis. Moreover, we hypothesize that CO confers protection against multi-organ fibrosis by targeting either RIPK3 and/or FA- dependent pathways. RIPK3 and/or FA-biosynthetic proteins potentially serve as diagnostic biomarkers in predicting the severity of organ fibrosis and the efficacy of CO therapy. We will test these hypotheses in the following Specific Aims: Specific Aim 1: To characterize the function of RIPK3 and MLKL in the pathogenesis of organ fibrosis; Specific Aim 2: To determine the pathogenic contribution of RIPK3-regulated fatty acid (FA) synthesis in fibrotic organs; Specific Aim 3: To determine the role of the RIPK3 and the FA synthesis pathways in the therapeutic effects of CO in experimental lung and kidney fibrosis, and in human fibrosis. | 2023-10-29T01:27:13.970301 | https://example.com/article/9661 |
Keeping Kids Safe: Playground Removal
When it comes to furniture removal, storage shed cleanouts, and recycling yard waste, a less meticulous junk removal company creates more hassle than they eliminate. Speed-driven services will chuck broken bits of wood into the bed of their truck and leave bits of splintered debris on your driveway. It’s reassuring to find a Marietta junk hauler like Mr Junk who is dedicated to removing and recycling your unwanted possessionsand meticulously clearing away any dirt, debris, or screws left behind.
Playgrounds and Sporting Equipment
For some jobs, attention to detail isn’t just a benefit, it’s a necessity. Renovation debris, scrap metal and junk cars leave behind tiny, dangerous parts that could damage your home and yard or injure your family. But attention to detail is crucial when hauling away sports and playground equipment. Improper removal of playground equipment can lead to serious injury. Kids continue to play on dangerous equipment, partially deconstructed playgrounds, and fields littered with dangerous debris. For schools, slapdash playground equipment removal means costly lawsuits and community mistrust. For neighborhoods and homeowners, it means concerned parents, neighbors, and HOAs. For kids it could mean anything from a broken arm to tetanus from a rusty screw.
Safe Removal of Playground Equipment
If you have an old swing set, a broken basketball hoop, or an unused playground, don’t try loading it into the back of your pickup truck. Call a professional Marietta junk hauling service you can trust. Mr Junk will deconstruct, haul, and recycle unwanted or hazardous playground equipment that’s taking up space in your yard. We remove large pieces, sweep the ground for dangerous bolts and nails, and clear away the dirt and organic material that’s built up around your playground equipment. If you have an anchored basketball hoop, a freestanding soccer net, or other sports equipment that needs removal, Mr Junk will remove any trace, leaving your yard and driveway safe for play once more. | 2024-06-13T01:27:13.970301 | https://example.com/article/8502 |
Q:
divide a disk image into smaller parts using Python
I would like to write a program that takes a .dmg file that is 1.6 GB and split it into 100 MB chunks.
I would like to also write another program that later can put everything back together so that it can be mounted and used.
I am very new to Python (and any type of programming language in general) and cannot find anything on here about this specific thing. Let me know if I am using incorrect terminology too so that I can learn how to search more effectively.
Thanks!
A:
Try this example:
split.py
import sys, os
kilobytes = 1024
megabytes = kilobytes * 1000
chunksize = int(1.4 * megabytes)
def split(fromfile, todir, chunksize=chunksize):
if not os.path.exists(todir):
os.mkdir(todir)
else:
for fname in os.listdir(todir):
os.remove(os.path.join(todir, fname))
partnum = 0
input = open(fromfile, 'rb')
while 1:
chunk = input.read(chunksize)
if not chunk: break
partnum = partnum+1
filename = os.path.join(todir, ('part%04d' % partnum))
fileobj = open(filename, 'wb')
fileobj.write(chunk)
fileobj.close()
input.close( )
assert partnum <= 9999
return partnum
if __name__ == '__main__':
try:
parts = split('/Users/example/Desktop/SO/st/example.mp4', '/Users/example/Desktop/SO/st/new', 2000000) # 100000000 == 100 mb
except:
print('Error during split')
for join:
join.py
import os, sys
readsize = 1024
def join(fromdir, tofile):
output = open(tofile, 'wb')
parts = os.listdir(fromdir)
parts.sort( )
for filename in parts:
filepath = os.path.join(fromdir, filename)
fileobj = open(filepath, 'rb')
while 1:
filebytes = fileobj.read(readsize)
if not filebytes: break
output.write(filebytes)
fileobj.close( )
output.close( )
if __name__ == '__main__':
try:
join('/Users/example/Desktop/SO/st/new', 'example_join.mp4')
except:
print('Error joining files:')
else:
print('Join complete!')
| 2024-03-17T01:27:13.970301 | https://example.com/article/3918 |
Identification and biosynthesis of (E,E)-10,12-tetradecadienyl acetate in Spodoptera littoralis female sex pheromone gland.
A minor component of the sex pheromone gland of the Egyptian cotton leafworm, Spodoptera littoralis, has been identified as (E,E)-10,12-tetradecadienyl acetate. Structural elucidation has been carried out by isobutane-chemical ionization mass spectrometry of the fatty acyl biosynthetic precursor-derived methyl ester. To assign the stereochemistry of the double bonds, the four isomers of both 10,12-tetradecadienyl acetates and methyl 10,12-tetradecadienoates have been synthesized and their gas chromatography retention times and mass spectra have been compared to those of the corresponding natural compounds. Mass-labeling experiments showed that the (E,E)-10,12-tetradecadienoyl moiety is biosynthetically derived from (Z)-11-tetradecenoic acid in the insect pheromone gland. | 2023-10-22T01:27:13.970301 | https://example.com/article/6379 |
Q:
Guidance to writing LSP Client
I have a personal Editor that implements its own "protocol" for Code completion and would like to switch to Language server protocol to relieve myself from some development burden. However I have not been able to fully comprehend the LSP Documentation concerning client implementation. It's mixed up with Server implementation and cannot find clear difference between the two.
Much of online documentation (including questions on SO) revolved around VSCode extensions of which I have zero knowledge and are not helpful.
I would appreciate any help to get started writing a simple client that just queries autocomplete. I write my editor in C++ and would appreciate any tutorial that explains how to create client. I can understand Python, C, C#, Pure JavaScript, C++, PHP and similar languages, so I can easily follow any tutorial in those languages.
If anything is not clear let me know so that I can explain (this being my first post in LSP :) )
A:
Mattie of course lead me to the right direction. The most difficult was for me to understand the request/response. LSP have a very helpful page on that with unfortunate name (IMHO) that had misled me , "inspection". It turns out to be a good example on request/response.
| 2023-12-22T01:27:13.970301 | https://example.com/article/8708 |
Greg M. Cooper-USA TODAY Sports
Dwyane Wade is currently under contract with the Chicago Bulls, but if he reaches a buyout with the team, he could have a few options for his next destination.
An associate of Wade "has been telling people" the 35-year-old could end up in Miami or Los Angeles this season if the Bulls buy him out, according to Barry Jackson of the Miami Herald.
Joe Vardon of Cleveland.com previously reported the Cleveland Cavaliers were also a possible destination.
Vardon explained that people in LeBron James' camp are "fairly confident" Wade will end up with the Cavs at some point. The duo previously helped the Miami Heat win two NBA titles in 2011-12 and 2012-13.
Wade spent the first 13 seasons of his career in Miami before signing with Chicago last summer. Former teammate Udonis Haslem recently said he "would love to have him back," per Tom D'Angelo of the Palm Beach Post.
With regard to Los Angeles, Jackson didn't specify whether Wade would prefer joining the Clippers or Lakers. Considering his age, it would make more sense to join a ready-made playoff contender like the Clippers, but the young talent in purple and gold could intrigue him, too.
Wade's first step, however, will be finding a way out of Chicago despite being under contract this season. Nick Friedell of ESPN.com reported in August that he "isn't expected to be long for the organization's future." However, general manager Gar Forman and head coach Fred Hoiberg have given no indication the team will agree to a buyout.
Video Play Button Videos you might like
With the Bulls expected to be one of the NBA's worst teams next season, Wade will likely do whatever it takes to secure his way out over the coming months. | 2024-01-14T01:27:13.970301 | https://example.com/article/4414 |
Namco Bandai Will Publish Ni no Kuni For PlayStation 3 In The U.S. And Europe
At their ongoing Level 5 Vision conference in Tokyo, Level 5 just announced that Ni no Kuni for the PlayStation 3 will be published in the west by Namco Bandai.
The game was announced for a western release at the Tokyo Game Show, but Level 5 hadn’t divulged any details regarding who would be publishing it. Later, we discovered a trademark for what was possibly its localized title outside Japan, which Level 5 just confirmed as well. The game will be titled Ni no Kuni: Wrath of the White Witch.
Namco Bandai will be publishing the game in both the U.S. and Europe in 2012. | 2023-12-21T01:27:13.970301 | https://example.com/article/4012 |
733 P.2d 252 (1987)
UNITED AGRI-PRODUCTS FINANCIAL SERVICES, INC., Appellant (Defendant),
Rocky Mountain Feed & Grain, Inc., (Defendant),
v.
O'S GOLD SEED COMPANY, an Iowa corporation, Appellee (Plaintiff).
No. 86-172.
Supreme Court of Wyoming.
February 25, 1987.
*253 Frank J. Jones of Jones & Weaver, P.C., Wheatland, for appellant.
Eric M. Alden of Jones, Jones, Vines & Hunkins, Wheatland, for appellee.
Before BROWN, C.J., and THOMAS, CARDINE, URBIGKIT and MACY, JJ.
MACY, Justice.
Appellee O's Gold Seed Company (O's Gold) filed an action in district court to recover possession of personal property. From a judgment in favor of O's Gold, United Agri-Products Financial Services, Inc. (UAP) appeals to this Court.
We reverse and remand.
UAP sets forth the following issues for our determination:
"A. WAS THE SECURITY INTEREST OF UNITED AGRI PRODUCTS FINANCIAL SERVICES, INC., IN SEED SOLD AND DELIVERED TO ROCKY MOUNTAIN FEED & GRAIN, INC., BY O'S GOLD SEED COMPANY SUPERIOR TO ANY CLAIM OF O'S GOLD SEED COMPANY?
"B. DID THE SETTLEMENT OF FOREIGN LITIGATION WHEREIN UNITED AGRI PRODUCTS FINANCIAL SERVICES, INC., WAS PLAINTIFF AND ROCKY MOUNTAIN FEED & GRAIN, INC., WAS DEFENDANT RELEASE THE SECURITY INTEREST UNITED AGRI PRODUCTS FINANCIAL SERVICES, INC., HAD IN THE SEED BELONGING TO ROCKY MOUNTAIN FEED & GRAIN, INC.?"
O's Gold states the issues as follows:
"THE APPELLEE'S INTEREST IN THE SEED WAS PROTECTED FROM APPELLANT'S CLAIMED SECURITY INTEREST BY THE EXCEPTIONS CONTAINED IN § 34-21-243 (c) (i & ii), W.S., 1977.
"APPELLEE COMPLIED WITH THE PROVISIONS OF § 11-12-105 W.S., 1977 REQUIRING IT TO EVIDENCE ITS IDENTITY AS THE ACTUAL SELLER OF THE SEED ON THE BAG LABEL.
"THE APPELLEE ESTABLISHED ROCKY MOUNTAIN WAS GENERALLY KNOWN BY ITS CREDITORS TO BE SUBSTANTIALLY ENGAGED IN SELLING SEED OWNED BY OTHERS.
"THE APPELLANT'S CLAIMED SECURITY INTEREST IN THE SEED WAS EXTINGUISHED WHEN THE UNDERLYING DEBT WAS SATISFIED.
"ANY ERROR BY THE TRIAL COURT WAS HARMLESS ERROR IN LIGHT OF THE APPELLANT'S FAILURE TO *254 PRESENT ANY EVIDENCE OF DAMAGES."
O's Gold is an Iowa corporation engaged in the business of selling agricultural seed in Wyoming. In the fall of 1983, O's Gold met with Rocky Mountain Feed & Grain, Inc. (Rocky Mountain), a general retailer of farm and ranch supplies in Platte County, Wyoming. As a result of their meeting, O's Gold and Rocky Mountain entered into an agreement whereby O's Gold agreed to deliver a specified quantity of seed to Rocky Mountain for resale to area farmers and ranchers for the 1984 crop season. The agreement also provided that, at the end of the season, Rocky Mountain would pay O's Gold for the seed sold during the year, receive a commission for the seed sold, and return to O's Gold any seed which remained unsold.
Pursuant to the terms of the agreement, O's Gold delivered the seed to Rocky Mountain. At the end of the 1984 season, Rocky Mountain paid O's Gold for the seed sold during the year and returned to O's Gold any seed which remained unsold. The same procedures were followed the next year.
Meanwhile, in December of 1984, Rocky Mountain obtained financing for its retail operations from UAP. Rocky Mountain signed a financing agreement and a financing statement in which it pledged its inventory and accounts receivable to UAP as security for the indebtedness.
In June of 1985, after experiencing financial difficulties, Rocky Mountain closed its business. At the time of closing, Rocky Mountain had in its possession a portion of the seed delivered to it by O's Gold.
On July 15, 1985, O's Gold filed a complaint in district court in which it prayed for an order determining it to be entitled to possession of the seed and an order directing Rocky Mountain and UAP to relinquish the seed to O's Gold. In its answer, UAP alleged as an affirmative defense that it was entitled to the seed because it filed the appropriate security instrument with the county clerk. On September 3, 1985, the district court issued an order for delivery commanding the sheriff to take possession of the seed from Rocky Mountain and to deliver it to O's Gold.
Sometime prior to trial on O's Gold's complaint, UAP filed suit against Rocky Mountain on the debt underlying its security interest defense. On April 18, 1986, UAP settled its claim against Rocky Mountain. Pursuant to the settlement agreement, judgment was entered in favor of UAP on April 18, 1986.
A trial to the court on O's Gold's complaint against Rocky Mountain and UAP was held on May 1, 1986. O's Gold attempted to show that the seed was sold to Rocky Mountain on consignment and that the seed was exempt from the claims of creditors under § 34-21-243(c), W.S. 1977. That section provides as follows:
"(c) Where goods are delivered to a person for sale and such person maintains a place of business at which he deals in goods of the kind involved, under a name other than the name of the person making delivery, then with respect to claims of creditors of the person conducting the business the goods are deemed to be on sale or return. The provisions of this subsection are applicable even though an agreement purports to reserve title to the person making delivery until payment or resale or uses such words as `on consignment' or `on memorandum.' However, this subsection is not applicable if the person making delivery:
"(i) Complies with an applicable law providing for a consignor's interest or the like to be evidenced by a sign; or
"(ii) Establishes that the person conducting the business is generally known by his creditors to be substantially engaged in selling the goods of others; or
"(iii) Complies with the filing provisions of the article on secured transactions (article 9)."
In addition, O's Gold attempted to show that UAP's claim against Rocky Mountain had been fully and completely settled by the prior judgment.
*255 In contrast, UAP attempted to show that the seed was sold outright to Rocky Mountain and, consequently, that it was inventory subject to the security agreement. In the alternative, UAP attempted to show that, even if the seed was sold on consignment, it was subject to the security agreement because it did not come within the exceptions provided in § 34-21-243(c).
At the close of the evidence, the district court found that:
"The consignor complied with Section 34-21-243 Wyoming Compiled Statutes in that (1) every bag of seed displayed the following statement[:] `Seed sold through Agents remains the property of [O's Gold] Seed Company until delivered to the customer.' This notice substantially complies with [paragraph] (i) of Wyoming Statute XX-XX-XXX[(c).] (2) Rocky Mountain Feed had been selling seed and other products for various companies on consignment and this information was known or should have been discovered by the Defendant (WS [3]4-21-243[(c)](ii)). Lastly, UAP settled [its] claim with Rocky Mountain Feed. The settlement provided for the payment of money and assignment of accounts receivable in settlement of UAP['s] claim against Rocky Mountain Feed. This appears to the court to be in full satisfaction of the debt of Rocky Mountain to UAP."
I
In its first claim before this Court, UAP argues that the seed sold by O's Gold to Rocky Mountain was sold outright and, consequently, that it was inventory subject to UAP's security interest. The agreement entered into by Rocky Mountain and O's Gold on October 26, 1983, specifically provided:
"THE UNDERSIGNED O's GOLD SEED DEALER [Rocky Mountain] AND O's GOLD SEED COMPANY AGREE TO CARRY OUT THE OBLIGATIONS COVERED IN THIS AGREEMENT. DEALER AGREES TO CONFORM TO THE POLICIES OF O's GOLD * * *.
"* * * Dealer agrees to represent and offer for sale O's Gold seed product line and associated products. * * *
"* * * Dealer agrees to call on all potential customers in his territory to sell, collect for an[d] promote the products of the Company * * *.
* * * * * *
"* * * Seed corn, sunflower, and sorghum seed [are] delivered to the Dealer on consignments and can be returned * *." (Emphasis added.)
The agreement for 1984 also provided:
"The parties mutually agree to:
"1. Adhere to the provisions written in the * * * O's Gold Sales Agent Policies and Procedures."
The manual on sales agent policies and procedures provides in relevant part: "The Company retains ownership of the seed until the customer accepts delivery." On the basis of that provision, UAP argues that Rocky Mountain was O's Gold's customer. However, the manual goes on to state that:
"The Company will set prices, terms, and conditions that are fair to all customers. The Sales Agent is not permitted to depart from those prices, terms, and conditions.
"The Sales Agent invoices the customer at time of delivery * * *.
"The Sales Agent is expected to obtain cash upon delivery but shall not be liable for the customer's account payable to the Company if the Sales Agent has provided the [C]ompany with a customer signed delivery invoice."
The language of these provisions is clear and unambiguous. When considered together, the provisions clearly contemplate the involvement of three separate and distinct entities the company, O's Gold; a sales agent or dealer, Rocky Mountain; and a customer, the farmer to whom Rocky Mountain sold O's Gold's seed. In addition, the language clearly provides that, although O's Gold gives up possession of the seed, it retains ownership until acceptance of delivery by a farmer and retains the *256 right to set prices, terms, and conditions of sale. Thus, Rocky Mountain was not the customer within the meaning of the agreements, and the arrangement was clearly a consignment.
II
UAP next contends that, even assuming that the seed was sold to Rocky Mountain on consignment, O's Gold failed to prove that it fell within one of the exceptions contained in § 34-21-243(c). As a result, UAP claims the seed is subject to the security agreement signed by Rocky Mountain.
UAP's argument presumes that the consignment falls under the provisions of Article 2 of the Uniform Commercial Code. However, both Articles 2 and 9 of the Uniform Commercial Code contain sections concerning consignments. The distinction commonly made is that a consignment "`intended as security'" falls within the scope of Article 9, while a "`true'" consignment is regulated by Article 2. Winship, The "True" Consignment under the Uniform Commercial Code, and Related Peccadilloes, 29 Southwestern Law Journal 825, 838 (1976). A true consignment is said to be one in which the consignor retains extensive control over the goods but gives up possession with the intent that they be sold to a third party and in which the consignee may return the goods at any time and is not obligated to pay a fixed price for them. Id., at 857.
The present consignment satisfies the description of a true consignment. However, the agreement between Rocky Mountain and O's Gold expressly incorporated the terms of O's Gold's sales agent policy manual which provides in relevant part:
"The Sales Agent [Rocky Mountain] agrees to grant the Company [O's Gold] a security interest in all * * * O's Gold labelled products now held or hereafter sold * * *."
Thus, the consignment not only fulfilled the description of a true consignment but also was intended to create a security interest.
As a number of authorities have noted, the determination of whether a consignment falls within the scope of Article 2 or Article 9 "is fraught with uncertainty." White & Summers U.C.C.2d HB § 22-4 at 883 (1980). See also 8 Hawkland, Lord & Lewis UCC Series, §§ 9-114:01 through 9-114:05 (Art. 9); 29 Southwestern Law Journal, supra, at 825; Annot., 40 A.L.R.3d 1078 (1971). That statement is particularly true in the present case. However, because O's Gold failed to comply with the requirements of either article, we find it unnecessary to engage in a lengthy discussion concerning the proper application of Articles 2 and 9.
There is no contention that O's Gold complied with the relevant filing provisions of Article 9; therefore, O's Gold is not entitled to the seed under Article 9 or under Article 2, § 34-21-243(c)(iii). In addition, upon reviewing the record, we find the evidence insufficient to demonstrate that Rocky Mountain was generally known by its creditors to be substantially engaged in selling the goods of others as required in paragraph (ii) of § 34-21-243(c). In its brief, O's Gold states: "The business of selling agricultural seed is almost universally handled on a consignment or sales agent basis." Yet there is no evidence in the record supporting that claim. That all the seed companies with which Rocky Mountain dealt transacted business in this manner would not be sufficient to establish that Rocky Mountain was generally known by its creditors to be in the business of selling the goods of others. Likewise, evidence that UAP is in the business of lending to agricultural-oriented businesses and has approximately 120 farm supply customers fails to satisfy § 34-21-243(c)(ii). Finally, the testimony given by an agent of UAP that he was not with UAP at the time but "[i]t's possible" that Rocky Mountain informed UAP that the seed was consigned does not satisfy O's Gold's burden. Absent additional evidence, we are unable to find that O's Gold satisfied the requirements of § 34-21-243(c)(ii).
*257 Evidence was presented at trial that each bag of seed was labeled "Seed sold through Agents remains the property of [O's Gold] Seed Company until delivered to the customer." O's Gold contends that such labeling constitutes compliance with paragraph (i) of § 34-21-243(c). Were we to accept O's Gold's claim and hold that such labeling removes goods from the reach of creditors, we would be placing upon creditors the onerous and perhaps ineffectual task of inspecting the property of their debtors prior to extending credit. Thus, we join the vast majority of jurisdictions which have declined to extend protection to the consignor absent a state sign law specifically intended for that purpose. 8 Hawkland, supra, at 358-59. The statute upon which O's Gold relies[1] was enacted along with the other provisions of Title 11 for the purpose of regulating noxious weeds in Wyoming. It simply does not constitute a sign law within the meaning of § 34-21-243(c)(i).
Our holding is also influenced by the terms of the policy manual cited earlier which provided that O's Gold retained a security interest in the seed. As indicated earlier, if the intent was truly to create a security interest, O's Gold had to comply with the filing requirements of Article 9 in order to perfect its interest.
III
Having found that O's Gold did not comply with the applicable provisions of Article 2 or Article 9 of the Uniform Commercial Code, we turn next to the question of whether UAP's claim to the seed was extinguished by the terms of its settlement agreement with Rocky Mountain and the resulting judgment.
The settlement agreement provides in pertinent part:
"As full settlement of this matter, the parties agree as follows:
"1. [Rocky Mountain has] paid unto [UAP] the sum of $25,000.00 * * *.
"2. [Rocky Mountain] shall permit judgment in the amount of $15,000.00 to be entered on [UAP's] Complaint.
"3. [Rocky Mountain has] assigned all [its] accounts receivable * * * unto [UAP], which is now the holder of the accounts. [Rocky Mountain] shall have the obligation and will pursue good faith efforts to collect all the accounts receivable with all amounts collected being immediately delivered to [UAP]. [Rocky Mountain] shall receive a credit against the $15,000.00 judgment entered pursuant to [P]aragraph 2, equal to 20% of any amount collected and delivered. * * *
"[Rocky Mountain] will obtain and sell for the benefit of [UAP] all that inventory and merchandise now held by Jim Rumrey located in Riverton, Wyoming. All amounts received shall be immediately delivered to [UAP]. [Rocky Mountain] shall receive a credit against the $15,000.00 judgment entered pursuant to Paragraph 2, equal to 20% of any amount collected and delivered.
"[4. Rocky Mountain] will provide all required assistance to [UAP] in that case now pending in this Court as Civil Action No. 17-206 wherein O's Gold Seed Company is named as Plaintiff and Rocky Mountain Feed & Grain, Inc., and United Agri Products Financial Services, Inc., are named as Defendants. If requested the individual Defendants shall appear as witnesses on behalf of United Agri Products Financial Services, Inc., in said case."
It has been said:
"[A settlement] agreement is conclusive only as to those matters which the parties have fairly intended to include within its terms * * *." 15A C.J.S., Compromise and Settlement § 27 at 235-36 (1967).
"[I]f the alleged settlement is tentative and conditional on the result of some subsequent act or event, it is not conclusive." Id., § 26 at 235.
"As a general rule, * * * third persons not parties to a * * * settlement are not *258 entitled to any of the benefits arising therefrom, and cannot set up as a bar to an action against them a settlement not made for their benefit, and to which they were not privies." Id., § 24 at 228-29.
Applying these rules to the present case, we find that the settlement agreement did not extinguish UAP's claim to the seed held by O's Gold. It simply cannot be said that UAP and Rocky Mountain fairly intended that the agreement be conclusive as to the seed which was the subject of the action filed by O's Gold. The settlement agreement clearly contemplated that, with the assistance of Rocky Mountain, UAP would continue to assert its right to the seed in the action filed by O's Gold. In addition, because O's Gold was not a party to the settlement, we find that it is not entitled to claim that the settlement agreement extinguished UAP's claim to the seed.
Reversed and remanded for further proceedings consistent with this opinion.
NOTES
[1] Section 11-12-105, W.S. 1977.
| 2023-09-01T01:27:13.970301 | https://example.com/article/5956 |
{
"account_id": "dbid:AAH4f99T0taONIb-OurWxbNQ6ywGRopQngc",
"name": {
"given_name": "Franz",
"surname": "Ferdinand",
"familiar_name": "Franz",
"display_name": "Franz Ferdinand (Personal)",
"abbreviated_name": "FF"
},
"email": "franz@gmail.com",
"email_verified": false,
"disabled": false,
"locale": "en",
"referral_link": "https://db.tt/ZITNuhtI",
"is_paired": false,
"account_type": {
".tag": "basic"
},
"root_info": {
".tag": "user",
"root_namespace_id": "3235641",
"home_namespace_id": "3235641"
},
"profile_photo_url": "https://dl-web.dropbox.com/account_photo/get/dbid%3AAAH4f99T0taONIb-OurWxbNQ6ywGRopQngc?vers=1453416673259\u0026size=128x128",
"country": "US"
}
| 2023-11-26T01:27:13.970301 | https://example.com/article/6505 |
Respite care for mentally ill patients and their families.
An inpatient psychiatric unit at a Veterans Administration Medical Center offers regularly scheduled psychiatric respite care, an intervention intended to reduce recidivism among chronic patients who live with a family member and to support the family in their caregiving role. Patients and their families have the option of arranging for respite admissions for two to seven days at six- to eight-week intervals. Preliminary one-year data for 14 patients show that with participation in the respite program, subsequent hospital days are significantly decreased. Subjective data indicate that respite care helps stabilize improvements patients made in the hospital, allows staff to work with family systems in a nonadversarial manner, and gives the family needed relief from difficult behaviors. | 2024-02-12T01:27:13.970301 | https://example.com/article/3994 |
[Influence of SO2 on the amino acid metabolism of pea seedlings].
Long-termed fumigation of pea seedlings with SO2 caused typical alterations of the concentration of free glutamate and glutamine as well as fluctuations of the activity of glutamate dehydrogenase and glutamine synthetase. Shortly after the beginning of the fumigation with low concentrations of SO2 (up to 0,3 ppm) the amount of glutamate increased. The concentration of glutamine however increases always independently of the concentration of SO2. The activity of glutamate dehydrogenase (reductive amination of α-ketoglutarate) generally increased. In roots of fumigated seedlings the effects of SO2 on the concentration of both glutamate and glutamine as well as on the activity of GDH are quite similar to those observed in shoots. Metabolic sequences derived from glutamate seem to be activated by SO2 as can be seen by the increase of the concentration of glutamine and γ-aminobutyric acid. | 2023-08-15T01:27:13.970301 | https://example.com/article/4321 |
All relevant data are available in the Supporting Information files and via Dryad (<http://dx.doi.org/10.5061/dryad.c78v2>).
Introduction {#sec005}
============
Sharp injury occurs when sharp instruments such as needle penetrates the skin. If the sharp instrument is contaminated with blood and body fluids, there is potential for transmission of infection. Globally, more than 35 million healthcare workers (HCWs) are suffering from occupational needle sick and sharp injury (NSSI) every year \[[@pone.0140382.ref001]\]. While as many as twenty blood borne pathogens (BBPs) can be transmitted by accidental injury, the potential life threatening are Human Immunodeficiency Virus (HIV), hepatitis B virus (HBV) and hepatitis C virus (HCV) \[[@pone.0140382.ref002]\]. Moreover, HBV is highly contagious and infects one out of three people \[[@pone.0140382.ref003]\].
A series of precautions were proposed for preventing occupational exposures and for handling of potentially infectious materials of blood and body fluids. These series of effective precautions designed to protect healthcare workers from infection with a range of pathogens of blood and body fluids are known as universal precautions (UPs). This is universally recognized that healthcare workers (HCWs) should practice no two handed recapping of needles, safe collection and disposal of needles and sharps with required puncture and liquid proof safety boxes in each patient care areas, wearing gloves for contact with blood and body fluids, non-intact skin and mucous membrane, promptly and carefully cleaning up spills of blood and other body fluids and using safety system for healthcare waste management and disposal \[[@pone.0140382.ref004]\].
Worldwide, the number of HCWs annually exposed to sharps injuries contaminated with HBV, HCV or HIV, was estimated to be 2.1 million, 926, 000, and 327, 000, respectively \[[@pone.0140382.ref004]\]. In developing countries, 40--60% of HBV infection among HCWs was attributed to professional hazard while in developed countries the attributed fraction was less than 10% due to vaccination coverage \[[@pone.0140382.ref005]\]. Even though up to 90% of these injuries occur in developing nations, the number of studies reporting this serious issue is less compared to developed nations \[[@pone.0140382.ref006]\]. In less developed countries, the risk of occupational transmission due to BBPs is increased due to excessive handling of contaminated needles that result from some common unsafe practices. These include administration of unnecessary injections on demand, reuse of non-sterile needles when supplies are low and inappropriate disposal of hazardous waste \[[@pone.0140382.ref007]\].
Some HCWs are at greater risk of acquiring infections through sharps injuries than others. These include those who are in close contact with body fluids such as surgeons, obstetricians, midwives and laboratory personnel \[[@pone.0140382.ref008]\]. Despite of the long-standing recommendations for high risk group vaccination against HBV, it remains unavailable to HCWs in most resource-limited settings in Sub-Saharan Africa and even when available, the coverage remains low \[[@pone.0140382.ref009]\].
Neither the prevalence of NSSI nor the factors associated with it have been well understood among HCWs in Sub-Saharan Africa \[[@pone.0140382.ref010]\]. Literatures revealed that there are many factors that contribute to NSSI among HCWs. Such factors are irregular utilization of protective gear, type of occupation of healthcare workers, disposing of used needle, injecting medicine, recapping of needles and drawing of blood \[[@pone.0140382.ref011]--[@pone.0140382.ref012]\]. Moreover, healthcare workers who followed universal precautions were 66% less likely to have NSSIs than those who did not adhere to these recommendations \[[@pone.0140382.ref013]\].
In Ethiopia, concrete knowledge about transmission of infection in healthcare facilities due to NSSI is limited. It varies from setting to setting and unsafe practices are common. Little is known about the prevalence of NSSI in Ethiopian healthcare facilities. A few studies reported high prevalence of NSSI in central and northern part of the country. However, contributing factors to the occurrences of occupational NSSI among HCWs was not yet well addressed. Therefore, it is an important to determine and document the lifetime and past one year prevalence of needle stick and sharps injuries, and associated factors with the past one year injuries among hospital healthcare workers in Southeast Ethiopia.
Methods {#sec006}
=======
Study area and design {#sec007}
---------------------
The study was carried out in December 2014 in four hospitals namely Ginir, Robe, Delo mena and Goba in Bale Zone, Southeast of Ethiopia. By the year 2014, the four hospitals were offering different types of healthcare services for the surrounding community. Facility based cross sectional study design was employed. All individuals working in four hospitals who have direct contact with patients and/or equipments used on patients were involved in the study. These workers were doctors, anesthetists, health officers, nurses, midwives, laboratory personnel, laundry workers and waste handlers. Individuals who were on annual leave during data collection time and those who could not respond to the questions due to illness were not included in the study.
Sample size and sampling procedure {#sec008}
----------------------------------
The sample size was determined using single population proportion formula. It was computed by considering 31.1% of past 12 months prevalence of needle stick and sharp injury \[[@pone.0140382.ref014]\]; 95% confidence level, and 0.05 margin of error. This was found 329 and adding 10% allowance for non-response rate, the total sample size was 362. All hospitals in Bale zone were included in the study. Before selection of study participants first we obtained the list of the workers and categorized them into their specific working department. Then proportionate allocation to size method was used for each department in the hospitals to share the total sample size. Study participants who fulfilled the inclusion criteria were selected by simple random sampling technique using the list of the workers from each working department in the hospitals.
Data collection procedure {#sec009}
-------------------------
Questionnaire was adopted and developed with modification from related studies \[[@pone.0140382.ref014]--[@pone.0140382.ref016]\]. First, questionnaire was prepared in English then it was translated to Afan Oromo and Amharic (local languages) by experts in both languages and then retranslated to English to check for consistency. Eight data collection facilitators (BSc nurses) were assigned to the four hospitals (two per hospital). They have been trained for one day on the study instrument and data collection procedures. Questionnaire was pretested on 5% of the same source population other than the sampled population in Goba and Robe hospitals. Based on the pre-test; questions were revised, edited and those found to be unclear or confusing were modified. Finally, data were collected using structured self-administered questionnaire. The questionnaire included: (i) background information of the respondents, (ii) circumstances in which the injuries occurred and (iii) participants' practice of infection prevention (See [S1 File](#pone.0140382.s001){ref-type="supplementary-material"}). Supervision during data collection was done by investigators to see how data collection facilitators were handling the data collection. Filled questionnaires were checked daily for completeness, legibility and consistency.
Data analysis {#sec010}
-------------
The collected data were checked for completeness and consistency by the investigators ahead of data entry for analysis. Completed questionnaires were given identification numbers and entered into Epi Info version 3.5. Twenty percent of the entered questionnaires were double checked for the purpose of comparing entered data with the actual questionnaire. Data were cleaned for missing values by running frequencies and outliers by computing standard scores. Cleaned data were exported from Epi Info to Statistical Package for Social Sciences (SPSS) version 20.0 for analysis. Descriptive statistics were computed and presented in the form of texts and tables. A binary outcome variable indicating "have you ever experienced or faced needle stick or sharps injuries at your work place within the past one year?" The response was coded as "yes" and "no" and it was used as the dependent variable. Bi-variate analysis was used to determine the association between independent and outcome variables. Multivariable logistic regression model was used to identify the relative importance of each predictor to the dependent variable by controlling for the effect of other variables. Those variables which were potential independent predictors on bi-variate analysis with P-value \< 0.3 were entered to multivariable logistic regression analysis. The association between dependent and independent variables was determined using odds ratio (OR) with 95% confidence interval (CI). The level of significance was taken at α = 0.05.
Ethical statement {#sec011}
-----------------
Ethical clearance was obtained from the Ethical and Review Committee of Madda Walabu University, College of Medicine and Health Sciences. An official letter of permission was obtained from Madda Walabu University Research and Community Service Directorate Office and given to each hospital. Written consent was secured from each participant. Participants were told that information provided was confidential and that their identities were not revealed in association with the information they provided.
Results {#sec012}
=======
Socio-demographic characteristics of participants {#sec013}
-------------------------------------------------
A total of 340 hospital healthcare workers responded fully to the self-administered questionnaire providing a response rate of 93.9%. The mean age of the respondents was 28.3 (SD±7.7) years. Fifty five percent of the respondents were females. More than half 187 (55.0%) of the respondents were married at the time of data collection. Majority of the participants were Orthodox Christian by religion (62.1%) and Oromo by ethnicity (79.1%). More than three forth 285 (83.5%) of workers were graduated from college or university with diploma and above. Seven out of ten (72.6%) HCWs had five years and below work experience. The mean time of work experience was 45.90 ± 45.15 SD months ranging from 2 to 360 months. Nearly half (49.7%) of the respondents were nurses by profession [Table 1](#pone.0140382.t001){ref-type="table"}.
10.1371/journal.pone.0140382.t001
###### Socio-demographic characteristics of hospital healthcare workers in Bale zone, December, 2014 (n = 340).
{#pone.0140382.t001g}
Socio- demographic characteristics Frequency (n) Percentage (%)
------------------------------------------ --------------- ----------------
**Number of HCWs participated on study**
Ginir hospital 90 26.5
Goba hospital 115 33.8
Delo mena hospital 70 20.6
Robe hospital 65 19.1
**Educational level**
Grade(5--8^th^) 3 0.9
Grade(9--12^th^) 52 15.3
College diploma and above 285 83.8
**Professional category**
Nurse 169 49.7
Physician 26 7.6
Midwife 33 9.7
Anesthesia 7 2.1
Health officer 8 2.4
Clinical laboratory 22 6.5
Laundry worker 13 3.8
Janitor/Cleaner 62 18.2
**Working department**
Emergency unit 25 7.4
Pediatric ward 29 8.5
Maternity ward 60 17.6
Operation theatre unit 23 6.8
Medical ward 28 8.2
Surgical ward 21 6.2
Waste handler unit 62 18.2
Laboratory unit 22 6.5
Outpatient department 56 16.5
Laundry room 14 4.1
Prevalence and circumstances of needle stick and sharp injury {#sec014}
-------------------------------------------------------------
The overall prevalence of NSSI was 37.1% with 95% CI of 32.0% to 42.5%. The rate of injury within past 12 months, 24 months and 3 years and above were 19.1% (95% CI of 14.9% to 23.3%), 9.1% (95% CI of 6.0% to 12.2%), and 8.8% (95% CI of 5.8% to 11.8%), respectively. From the total of respondents who had ever experienced occupational injury, 55 (43.7%) were exposed more than once. Nearly one third (31.7%) of the injuries occurred in emergency unit. Other injuries occurred in medical ward (17.5%), maternity ward (13.5%), surgical ward (9.5%), paediatrics (8.7%), operation theatre unit (8.7%) and others such as laboratory unit, outpatient department, vaccination and TB clinic were responsible for 10.4% of injuries. Regarding materials which caused injury, the highest proportion was by syringe needles (69.8%), followed by suture needle (15.9%). The degree of injury accounted by superficial was 64.3% among injuries.
Majority (59.5%) of the materials caused injury was used on patients and 24.6% were from unknown sources whether it was used on patients or not. Nearly half (52%) of the materials which caused injury were used on patients with known type of cases. These cases were HIV patients (35.9%) followed by HBV patients (17.9%). The rest 43.6% were from non blood borne disease cases. Regarding the practice of HCWs on job, 36.5% of the respondents had recapped needles after use at least once during their work time. More than half (55.6%) of the needles were recapped using one hand. More than one quarter (27.7%) of the HCWs did not follow universal precautions and 2.4% did not wear protective gear during day to day activities in their respective working department. Nearly two third (65.3%) of the healthcare workers had not taken training on infection prevention at the time of interview. Most of injuries were occurred during needle recapping (46%) followed by opening needle cap (21.4%), disposal and cleaning the work area (16.7%) and during washing instrument (14.3%) [Table 2](#pone.0140382.t002){ref-type="table"}.
10.1371/journal.pone.0140382.t002
###### Circumstances in which needle stick and sharps injury occurrence among hospital workers in Bale zone, December, 2014 (n = 126).
{#pone.0140382.t002g}
Reasons for needle or sharp injury Frequency (n) Percentage (%)[\*](#t002fn001){ref-type="table-fn"}
-------------------------------------------- --------------- -----------------------------------------------------
During needle recapping 58 46.0
During opening the needle cap 27 21.4
During disposal and cleaning the work area 21 16.7
During washing instrument 18 14.3
Improperly disposed needle 14 11.1
During giving injection to patient 13 10.3
Sudden movement of patient 12 9.5
Lack of concentration 10 7.9
Drawing blood from patient 9 7.1
During collection of clothes for laundry 7 5.6
During blood transferring into test tube 5 4.0
Attempting to bend the needle 3 2.4
\* Each of the percentages does not add up to 100% because respondents could choose several responses which could be more than one reasons
Needle stick and sharp injury within the past 12 months among HCWs {#sec015}
------------------------------------------------------------------
The highest prevalence of occupational NSSI was observed among HCWs who practiced needle recap after use (32.3%) compared to those who do not have history of recap (11.6%). This difference was statistically significant. The occurrence of NSSI was higher in those who had not taken training on infection prevention (23.9%) compared to those who had taken the training on infection prevention (10.2%). The knowledge of the risk is almost universal (98.8%) among the study subjects. There is also statistically significant difference of NSSI among those who had knowledge about risk of NSSI and those who did not know [Table 3](#pone.0140382.t003){ref-type="table"}.
10.1371/journal.pone.0140382.t003
###### Cross-tabulation of prevalence of NSSI within the past one year among HCWs in Bale zone hospitals, December, 2014 (n = 340).
{#pone.0140382.t003g}
Variables Frequency of injury in past one year
--------------------------------------------------------------------------------------------------- -------------------------------------- ----------- -----------
**Working hospital**
Ginir 73 (81.1) 17 (18.9) 0.85
Goba 91 (79.1) 24 (20.9)
Delo mena 59 (84.3) 11 (15.7)
Robe 52 (80.0) 13 (20.0)
**Sex of respondents**
Male 123 (80.4) 30 (19.6) 0.94
Female 152 (81.3) 35 (18.7)
**Age group of participants**
≤ 24 94 (79.0) 25 (21.0) 0.81
25--30 122 (81.9) 27 (18.1)
\>30 59 (81.9) 13 (18.1)
**Educational level**
High school and below 49 (81.7) 11 (18.3) 0.86
College and above 226 (80.7) 54 (19.3)
**Professional category**
Nurse 132 (78.1) 37 (21.9) 0.43
Other professionals (Physicians, Health Officers, Midwifes, Anesthesia & Clinical laboratory) 80 (83.3) 16 (16.7)
Non-medical (Laundry and Janitor/cleaner) 63 (84.0) 12 (19.1)
**Total service year**
\<5 years 167 (79.1) 44 (20.9) **0.3**
\> = 5 years 108 (83.7) 21 (16.3)
**Works in shift**
Yes 41 (83.7) 8 (16.3) 0.6
No 234 (80.4) 57 (19.6)
**Know about the risk of NSSI**
Yes 274 (81.5) 62 (18.5) 0.02
No 1 (25.0) 3 (75.0)
**Perceived NSSI is avoidable**
Yes 231(81.9) 51 (18.1) **0.28**
No 44 (75.9) 14 (24.1)
**Recap needles after use**
Yes 84 (67.7) 40 (32.3) **0.000**
No 191 (88.4) 25 (11.6)
**Safety guidelines available at working department**
Yes 184 (84.0) 35 (16.0) **0.05**
No 91 (75.2) 30 (24.8)
**Availability of reporting protocol for NSSI in the hospital**
Yes 159 (82.8) 33 (17.2) **0.30**
No 116 (78.4) 32 (21.6)
**Regularly apply universal precautions**
Yes 198 (80.2) 49 (19.8) 0.58
No 77 (82.8) 16 (17.2)
**Use personal protective equipments**
Yes 270 (81.3) 62 (18.7) **0.18**
No 5 (62.5) 3 (37.5)
**Ever had training on infection prevention**
Yes 106 (89.8) 12 (10.2) **0.002**
No 169 (76.1) 53 (23.9)
Factors associated with NSSI within past 12 months {#sec016}
--------------------------------------------------
On bi-variate analysis respondents who do not knew about the risk of needle stick and sharp injury were at increased risk of experiencing injury compared to their counterparts. But this was not significant after controlling other variables in multivariable analysis. Respondents who had taken training on infection prevention were less likely to experience NSSI but this was also not significant on multivariable analysis [Table 4](#pone.0140382.t004){ref-type="table"}.
10.1371/journal.pone.0140382.t004
###### Multivariable analyses of factors associated with needle stick and sharps injury in the past one year among hospital healthcare workers in Bale zone, December, 2014.
{#pone.0140382.t004g}
Variables NSSI within past one year
----------------------------------------------------------------- --------------------------- -----------
**Total service year**
\<5 years Ref.
\> = 5 years 0.67 (0.36, 1.24) 0.20
**Know about the risk of NSSI**
Yes Ref.
No 9.00 (0.75, 107.00) 0.08
**Perceived NSSI is avoidable**
Yes Ref.
No 1.08 (0.51, 2.30) 0.82
**Recap needles after use**
Yes 3.23 (1.78, 5.84) **0.000**
No Ref.
**Safety guidelines available at working department**
Yes Ref.
No 1.53 (0.84, 2.76) 0.16
**Availability of reporting protocol for NSSI in the hospital**
Yes Ref.
No 1.10 (0.61, 1.98) 0.74
**Use personal protective equipments**
Yes Ref.
No 2.6 (0.55, 12.29) 0.22
**Ever had training on infection prevention**
Yes Ref.
No 1.8 (0.87, 3.69) 0.10
Ref. = Reference
Respondents who practiced needle recapping were 3 times more likely to experience injuries than who did not recap needle (AOR = 3.23, 95% CI: 1.78, 5.84). Availability of safety guideline, taking training on infection prevention, reporting protocol were not statistically significant. Even though it was not statistically significant, the OR suggests that not having training may be associated with an 80% increased odds of injury in the last one year. Similarly, availability of safety guidelines in the working department, use of personal protective equipments, access to safety guidelines and experience seem to be important [Table 4](#pone.0140382.t004){ref-type="table"}.
Discussion {#sec017}
==========
In this study the prevalence of lifetime occupational NSSI was 37.1% with 95% CI of 32.0% to 42.5%. This is comparable with the findings from Sub-Saharan Africa (32%) \[[@pone.0140382.ref015]\]. But the prevalence in this study is lower than the figure from an earlier studies in Ethiopia where the lifetime proportion was 66.6% in Addis Ababa \[[@pone.0140382.ref017]\] and 59.0% in Bahir Dar \[[@pone.0140382.ref014]\]. It cannot be ascertained from the current study whether the prevalence of NSSIs has decreased or if the difference is attributable to the performance of the current study hospitals. The difference may be related to different time of recall periods. The prevalence of NSSIs in the last twelve months before the study was 19.1%, implying that, HCWs in the study hospitals were at risk of contracting blood borne diseases due to NSSI. The past 12 months prevalence in this study was much lower than the healthcare workers in University of Alexandria hospitals (67.9%) \[[@pone.0140382.ref012]\].
In this study, staff nurses had higher prevalence of NSSI as compared to other healthcare workers. The Ahmadabad's nurses were the most commonly injured staff among HCWs, constituting 80% of all reported prevalence \[[@pone.0140382.ref018]\]. This is probably due to the job description of nurses that put them under increased risk of injury such as medication administration, and other procedures which requires the use of needles and other sharp materials.
Overall, emergency unit is the most risky area across the units in hospitals. The study revealed that syringe needle was a major cause of the injuries (69.8%). It is much higher as compared to the study done in Alexandria hospitals (38.4%) \[[@pone.0140382.ref012]\]. However, it is consistent with a study done in Addis Ababa hospitals 64.5% \[[@pone.0140382.ref017]\]. This implies that HCWs who had been injured by NSSI might be due to inappropriate needle handling practices. It might be also due to majority of the procedures done for the patients require syringe needles that may put HCWs under risk of injuries.
Regarding the frequency of injury, 43.7% of the respondents had experienced injuries more than one time. This is a little bit lower as compared to the study done in Northern Ethiopia 53.1% \[[@pone.0140382.ref014]\]. But whatever the difference of the proportions of NSSI, healthcare workers might practice needle recapping after use which may put them under risk of injury. For instance, the prevalence of needle recapping after use in this study was 36.5% and of these 44.4% was recapping using two hands. The practice of recapping is similar to the studies in Nigeria (35.3%) \[[@pone.0140382.ref019]\] and Northern Ethiopia (34.7%) \[[@pone.0140382.ref014]\].
Respondents who practiced needle recapping were 3 times more likely to experience injury than who did not recap needles after use. Recapping needles after use was positively associated with NSSI in previous studies \[[@pone.0140382.ref011], [@pone.0140382.ref017]\]. Taking training on infection prevention was not found to be statistically significant on multivariable analysis in this study. But, the OR suggests that not having training may be associated with an 80% increased odds of injury in the last one year. In the presence of increased sample size, this could have been statistically significant. Similarly, this finding goes in line with previous findings \[[@pone.0140382.ref014], [@pone.0140382.ref016]\] in which training for workers seem to be not necessarily brought about protection from injury exposure. The reason for this may be: (i) knowledge gained may not necessarily be transferred into practice of preventive measures or knowledge received may not be sufficient. (ii) Those who participated on the infection prevention training may be other workers who are working as administrators rather as healthcare providers (i.e the training missed the personnel under risk of injury). (iii) The training might be given after the workers sustained the injury. (iv) The provided training may be more of theoretical than practical. Lastly, the sample size might not sufficient enough to detect the differences.
Since the study was conducted among randomly selected healthcare professionals, laundry workers and janitors or cleaners, it might be generalized to all healthcare professionals and other individuals who had direct contact with patients or equipments used on patients working in the study hospitals. But in interpreting the results of this study, taking the limitations into consideration is important. Since the study was based on self-reported data in estimating the prevalence of occupational NSSI exposure; a common threat to the validity of the self-report that can lead to information bias such as social desirability and recall bias. In addition, a cross-sectional study by its nature cannot establish temporal cause and effect relationship to identify the risk factors. The sample size used might not be large enough to detect the difference of the occurrence of the outcome variable on the explanatory variables which are declared as not statistically significant.
Conclusions {#sec018}
===========
This study revealed that more than one third of the study respondents had experienced NSSI at least once in their lifetime. Even though the past one year prevalence is lower, workers are affected by occupational NSSI at the study area. The study identified the presence of suboptimal practices that put both HCWs and patients at significant risk of contracting occupational infections. Needle recapping was the main predictor for experiencing occupational NSSI in the past one year.
Based on the findings of the study the following recommendations are forwarded to the stakeholders: Healthcare authorities in the study area should arrange training for HCWs and provision of infection prevention equipments. Health policy makers should formulate strategies to improve the working condition for healthcare workers and increase their adherence to universal precautions. Furthermore, regular reporting, follow up and evaluation of occupational injury exposures need to be introduced. Follow up study is needed to determine the actual incidence of NSSI exposure and to which type disease workers are exposed.
Supporting Information {#sec019}
======================
###### Questionnaire.
(DOCX)
######
Click here for additional data file.
We would like to acknowledge Madda Walabu University, College of Medicine and Health Sciences for giving us this important opportunity. Our acknowledgment also goes to our friends who give us comments on the proposal structure and arrangement. Finally, we would like to acknowledge Bale zone health office, respective hospital administrators, our facilitators and study subjects.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: TB AG. Performed the experiments: TB AG. Analyzed the data: TB AG. Contributed reagents/materials/analysis tools: TB AG MK KA. Wrote the paper: TB AG MK. Participated in designing of the study, data collection, reviewing and editing the final draft of the manuscript: MK KA. Read and approved the final manuscript: TB AG MK KA.
| 2024-04-01T01:27:13.970301 | https://example.com/article/3128 |
Grab Your Ammunition and... Go!
20rds - 45 ACP Taurus Hex Bullet 185gr. All Copper Hollow Point
Out of stock
Bullet Weight185 Grain
Manufacturer SKUA5045180CHP
This is 45 ACP Taurus All Copper 185gr. Hex Bullet Hollow Point Ammo. This ammo was manufactured by PMC for Taurus, using PMC nickel plated brass, Hogden powder and Barnes all copper Hex bullets. The Barnes Hex Bullet is a 99.95% pure-copper bullet, with 6-petal "hex" expansion and nearly 100% weight retention for prenetrating punching power! This ammo has a Muzzle Velocity of 995 F.P.S. and a Muzzle Energy of 406 ft.-lbs. This ammo is packed in 20rd. boxes.
Write a review
Name
Rating
Thank you for being part of the AmmoToGo community! We are constantly evaluating our suppliers and our products, and your feedback is very helpful in doing so. By including your email address below, we are able to follow up with you, help solve any issues, and learn from you what our community likes and doesn't like. | 2023-12-23T01:27:13.970301 | https://example.com/article/8378 |
This synthesis provides an overview of academic findings on the sources of violence in post-war environments and on the strategies to address them. It distinguishes between unaddressed pre-war tensions, war-induced cleavages, and peace-generated conflicts. It shows that, according to the best research, current peacebuilding strategies have two major weaknesses. First, they neglect the micro-level dynamics of violence. Second, they do not devote sufficient attention and resources to state reconstruction (which is distinct from merely holding elections). These weaknesses explain why peacebuilding efforts often fail to end violence even when they produce other positive outcomes. | 2023-09-15T01:27:13.970301 | https://example.com/article/8920 |
The polys I've tried are as good as anything out there, particularly hexaspin twist.....soft, spinny and lasts.....there are only two factories I think in germany that make strings, yet there are so many companies. Most of these are re branded. Great price pros pro too, well worth a trial.
can you talk about how the black force was, and the lethal 5? is the lethal 5 shaped like lux alu rough?
Click to expand...
Black Force 17 was uniquely stretchy for a poly. The string stretched almost as much as nylon when pulled and remained very elastic with pretty good tension maintenance. The US distributor's website claims it's comparable to RPM Blast, but I didn't find that to be the case. Black Force was much softer and springier. Compared to RPM Blast, it had a lot more power and feel, but not as much spin or control.
Lethal 5 was annoying to string, with strong coil memory (presumably a result of the twisting). It's pentagonal, but its faces and edges aren't as clearly defined as other shaped strings (i.e. BHB7) so it looks close to round. Lethal 5 is firmer than Black Force, with better spin generation and less power, making it easier to hit out on ground strokes.
ALU Power Rough has a round cross section and uses divots in the string to create texture to try and grab the ball. The shape is different from Lethal 5's twisted pentagonal profile. Compared to Lethal 5, ALU is firmer and more precise. Lethal 5 is probably easier for normal people, where as ALU can perform better (if the player is up to it).
I've just ordered from the official website based in Austria. I bought 5 reels, about 15 sets of string, bag, and lots of little things and shipping was only an extra 10 euro. I am based in the UK. When you order, they send you an email and invoice for the final price, if you don't like the shipping cost, you don't have to pay and lose nothing. Really good store.
bump again.... I am trying to order off site and have placed an order but havent put any payment in? had no email as of yet but was wondering If i was missing something.... trying to pay by card- if anyone could reply on here or email Meaghan maybe? please? sorry guys... thanks in advance- my german is, well- none existent and google translate is only helping a bit...
I tried the gold power and the Vendetta. The gold power was a little too stiff for my liking but gave me pretty good pop, spin, and control. Vendetta OTOH was amazing. It was so soft that I only needed to drop 3 lbs (roughly 1.4 kg) from my multi/syn gut tension. Besides being really soft for a poly, it provided good power and decent spin for a poly.
bump again.... I am trying to order off site and have placed an order but havent put any payment in? had no email as of yet but was wondering If i was missing something.... trying to pay by card- if anyone could reply on here or email Meaghan maybe? please? sorry guys... thanks in advance- my german is, well- none existent and google translate is only helping a bit...
Click to expand...
where are you ordering from...??
in UK i can get the stuff on 3bay or I order from racket depot uk or W&D strings. In the US BigT does it @ big t tennis.
Ive tried to order from Germany and had some problems with emails etc they just didnt answer. Most of the time you can pay by paypal, 'tennis man' is another in Germany, or the official website is www arfaian com
I am also in UK, trying to order from arfain but really struggling, saying I have an order but no email, and no way of paying, i selected vorkasse (card?!?) but not sure :S prices seem better than on racket depot...
I am also in UK, trying to order from arfain but really struggling, saying I have an order but no email, and no way of paying, i selected vorkasse (card?!?) but not sure :S prices seem better than on racket depot...
I've now tried their syn gut and a hybrid with black force and syngut.
The syngut is ok imo but very very soft - and not for me in a full bed setup since I like crisp-feeling strings.
The black force x syngut hybrid was certainly crisp enough, but strung at 45 x 48 lbs I found it a bit too tight. I'll probably restring it at 42 x 45, and also have a set of Ichiban 1.20 to try as well.
The crosses are a very soft syngut, which makes them a great cost-effective option for hybrids. On their own they're too soft for me as I prefer some crispness. Personally, I like how their metallic grey goes with the black mains.
The Black Force mains were promoted as a spin string akin to RPM. I don't know if that comparison is entirely fair, but I do think they're pretty solid. Strung at 45 x 48 lbs I found them too tight. That said, they were definitely spin friendly, and I'm very tempted to restring them a few pounds lower to see how they'll perform. Since they're not textured, strings like RPM and Focus Hex are imo a bit more spinny. That said, I think the tension maintenance of these strings (like Focus Hex) blows RPM Blast out of the water.
As it stands they're very crisp (which is to be expected from such a stiff string) while also being pretty soft at the same time. There seemed to be a decent amount of feel from them (for a poly string) and they performed decently well from both the baseline and the net. I still have to try serving with them -- which I'm hesitant to do with any poly -- but they seem to perform consistently well at everything else I've tried.
Personally, I'd still rate MSV Focus Hex as my favourite spin poly, but I'd rate these as being better than Sonic Pro and Turbo Twist (which to me is a better version of Sonic Pro) because you feel crispness and bite while still having a decent amount of feel (at least at 45 lbs!)
Speaking of similar...
I just had the chance to string two identical Head mg Radical OS.
One with Mantis Comfort Synthetic, the other with Pro's Pro Hitec Multifiber.
Both at 60 for a MCS fan. I'm looking forward to the feedback.
He may just have to look closely at the printing to tell the difference.
I've switched from Poly Plasma 1.28 to Plus Power 1.28.
The Plus Power doesn't have that pearly sheen that SPPP has.
Looks more like Sonic Pro.
An easy low cost inventory could be (reels):
Plus Power 1.28
Blackout 1.24
Ichiban Spin 1.21
Syngut 1.30
Hi Tec Multifibre 16
Gutex Ultra 17
$300 and you are set for a while with a broad spectrum.
Vendetta, Hexaspin/Twist, and Gutpower are also candidates.
Has anyone else tried the new Nano Vendetta? I picked some up to use as a cross with BHBR, as it seems several are recommending smooth crosses with textured strings. I haven't tried that yet, but I did string it up as a full bed in a newly acquired PS 6.0 85, and was very pleased with the results. It is crisper than I expected (much to my liking), with good pop and spin. I will probably string up the BHBR hybrid in my BLX PS90 this weekend and, with a little luck (east Ky weather is iffy this time of year), give it a go.
Just out of curiosity, has anyone tried Strategem? I'm wondering how it compares to Black Force.
Click to expand...
Im currently using the Strategem 1.35 on a Babolat AeroPro Drive GT at 55lbs. Its a great string if your looking for spin, control, and durability, it doesn't give alot of power though so you need to generate your own. Hope this helps
red devil 1.19 main crossed with Hitec Multifiber is my current string. great control, good spin, crisp yet comfortable, have some explosive power when fresh, very consistent. Best setup I have used.
Plus power is very similar but a bit stiffer and lower power.
Spinox has nothing except spin...don't like it at all.
Cyber power is great control string, only if you has the power and tech to use it in the match.
Ended up using Claycourt Plus in mains w/ Ichiban Spin in the crosses. New racquet and didn't prepare ahead of time for blocked grommets so I had to use the poly. Would rather have waited till I'm settled in w/ the frame.
My first impressions today was that the Lethal 5 is noticeably softer than the MSV, despite being a thicker size. It was obvious from the first hit.
I also found Lethal 5 to have a lot more pop than the MSV. I was having to swing through more with the MSV, but was able to swing a little more casually and get as much or more pace with the Lethal 5.
Spin seem very comparable. I noticed a little more ball movement on ground strokes with the Lethal 5, but the difference was subtle. The only difference I really found was on second serves. My topspin serve was definitely dipping and kicking more with the Lethal 5 than the MSV.
Even after just being strung a few days and playing once today, the Lethal 5 is slightly looser than the MSV, so I'm curious how much tension it will loose in the next week or so.
I just tried full bed Plus Power 1.23 on K90 @54/51lb last night. The string is softer & less spin than SPPP and SPPP is crisper. If I want to increase crisp feel, any suggestion? Will cross with OGSM help? Thank you.
I think Hi-Tec Multifibre is the same string as Mantis Comfort Synthetic. Both offer gut like softness.
Click to expand...
Both are also low powered and short lived.
Mikeler also tested the GutPower1.30 and Gutex Ultra17.
GutPower didn't pass(too stiff) but the Gutex Ultra got high marks.
He might even be using it had he not discovered Discho Microfibre.
I just got a reel of the Gutex Ultra 17 to use as my go-to racquetball multi and as a power cross for poly.
Of the polys, Vendetta, Blackout, and PlusPower all seem quite friendly.
The only issue is tension maintenance, but that could be said for many high priced strings as well.
I just tried full bed Plus Power 1.23 on K90 @54/51lb last night. The string is softer & less spin than SPPP and SPPP is crisper. If I want to increase crisp feel, any suggestion? Will cross with OGSM help? Thank you. | 2023-08-03T01:27:13.970301 | https://example.com/article/1113 |
Migrating to Ansible Container
==============================
Starting a new project is pretty easy. But what if you've already got an
existing project you'd like to use with Ansible Container?
Migrating from a Dockerfile
---------------------------
If you have an existing project that you're containerizing by building from a
Dockerfile, you can translate that Dockerfile into an Ansible Container project
and Ansible role using the ``import`` command.
The ``import`` command will examine your Dockerfile and translate its directives
into an equivalent Ansible container-enabled role. ``RUN`` directives
will be split and turned into ``shell`` or ``command`` tasks. ``ADD`` or ``COPY``
directives will be turned into ``copy``, ``synchronize``, or ``get_url`` tasks.
And other directives will be converted into role default variables or container
metadata.
When you run the ``build`` process against the resulting project, pay attention to the output that Ansible provides. It will offer suggestions for how you can better leverage built-in Ansible modules to refine your tasks. For example, if your Dockerfile contained a directive to ``RUN yum install``, Ansible will give you a suggestion that you might wish to make use of the built-in ``yum`` module bundled with Ansible instead.
What comes out of running ``import`` will get you there most of the time, but it always makes sense to walk through what was generated to give it a sanity check.
By way of an example, let's imagine you have a directory named ``node`` that contains the following Dockerfile for a simple Node service:
.. code-block:: dockerfile
FROM node:7.9.0
RUN mkdir -p /app
WORKDIR /app
ARG NODE_ENV dev
ENV NODE_ENV $NODE_ENV
COPY package.json /app/
RUN npm install && npm cache clean
COPY . /app/
CMD [ "npm", "start" ]
To migrate the above to an Ansible Container project, start by creating a new project directory. You'll run the ``import`` command from within this new directory in order to keep generated artifacts separate from the existing project. For example, create a new directory named ``acnode`` next to the existing ``node`` directory, and set your working directory to ``acnode``, as follows:
.. code-block:: console
$ mkdir acnode
$ cd acnode
Now from within the ``acnode`` directory, run ``ansible-container import ../node`` to perform the import. Once completed, you will see output similar to the following that explains what the import did, and describes each file it produced:
.. code-block:: console
$ ansible-container import ../node
Project successfully imported. You can find the results in:
~/acnode
A brief description of what you will find...
container.yml
-------------
The container.yml file is your orchestration file that expresses what services you have and how to build/run them.
settings:
conductor_base: node:7.9.0
services:
node:
roles:
- test
I added a single service named node for your imported Dockerfile.
As you can see, I made an Ansible role for your service, which you can find in:
~/acnode/roles/node
acnode/roles/test/tasks/main.yml
--------------------------------
The tasks/main.yml file has your RUN/ADD/COPY instructions.
- shell: mkdir -p /app
- name: Ensure /app/ exists
file:
path: /app/
state: directory
- copy:
src: package.json
dest: /app/
- shell: npm install && npm cache clean
args:
chdir: /app
- name: Ensure /app/ exists
file:
path: /app/
state: directory
- synchronize:
src: .
dest: /app/
recursive: yes
I tried to preserve comments as task names, but you probably want to make
sure each task has a human readable name.
~/roles/node/meta/container.yml
-------------------------------
Metadata from your Dockerfile went into meta/container.yml in your role.
These will be used as build/run defaults for your role.
from: node:7.9.0
working_dir: /app
environment:
NODE_ENV: '{{ NODE_ENV }}'
command:
- npm
- start
I also stored ARG directives in the role's defaults/main.yml which will used as
variables by Ansible in your build and run operations.
Good luck!
Project imported.
The original Dockerfile was translated into a role, as described in the above example output. You'll find the role in ``acnodes/roles/node``. Since the original project directory is named ``node``, the resulting role is also named ``node``. Here are the tasks added to its ``tasks/main.yml``:
.. code-block:: yaml
- shell: mkdir -p /app
- name: Ensure /app/ exists
file:
path: /app/
state: directory
- shell: npm install && npm cache clean
args:
chdir: /app
- name: Ensure /app exists
file:
path: /app
state: directory
- synchronize:
src: .
dest: /app/
recursive: yes
The ``ARG NODE_ENV dev`` becomes a variable in the role's ``defaults/main.yml`` file:
.. code-block:: yaml
playbook_debug: false
NODE_ENV dev: '~'
The remaining directives become container-enabled role metadata in the
``meta/container.yml`` file:
.. code-block:: yaml
from: node:7.9.0
working_dir: /app
environment:
NODE_ENV: '{{ NODE_ENV }}'
command:
- npm
- start
Additionally, the ``import`` command creates a ``container.yml`` file that defines a single service named ``node``:
.. code-block:: yaml
settings:
conductor_base: node:7.9.0
services:
node:
roles:
- mynodeapp
Note in the above that the default :ref:`conductor_container` base image matches the ``FROM`` in the Dockerfile. It's best to ensure that your Conductor derives from the same distribution as your target containers, so since the `node container derives from Debian Jessie <https://github.com/nodejs/docker-node/blob/a82c9dcd3f85ff8055f56c53e6d8f31c5ae28ed7/7.9/Dockerfile#L1>`_ it would make sense to change the ``conductor_base`` key value to ``debian:jessie``.
Migrating from Ansible Container 0.4.x and earlier
--------------------------------------------------
As pre-1.0 projects are apt to do, releases 0.4.x and earlier had a much different structure and approach. Those releases did not specify Ansible Roles in the ``container.yml`` file, had a separate ``main.yml`` file, and put all of the Ansible Container artifacts in a separate ``ansible/`` subdirectory.
There is not an automated process for this, however in most cases, you can follow these steps:
1. Move the contents of ``ansible/`` one directory-level up. The ``requirements.txt``
file needs to be renamed to ``ansible-requirements.txt``, so as not to conflict
with Python projects that have their own standard ``requirements.txt`` file.
2. Abstract the ``main.yml`` playbook into one or more roles. There are many helpful
guides to this process, such as `this one <https://www.digitalocean.com/community/tutorials/how-to-use-ansible-roles-to-abstract-your-infrastructure-environment#abstracting-a-playbook-to-a-role>`_.
3. Modify your ``container.yml`` file.
* Add a ``settings`` section with a key ``conductor_base``, specifying the base
distribution for your :ref:`conductor_container`. This should probably match
the distribution you're using to build your target containers.
* For each service, add a ``roles`` key with a list of all the roles that go
into building that service.
* For each service, the ``image`` key should be renamed ``from``.
For example, each container with a settings list might look like:
.. code-block:: yaml
settings:
conductor_base: centos:7
services:
webapp:
roles:
- python2
- mywebapp
redis:
roles:
- redis
If you are having difficulty, please :ref:`reach out for help <ask_a_question>`.
| 2024-06-25T01:27:13.970301 | https://example.com/article/9369 |
Anesthesia for facial surgery.
We describe a reliable, simple, and safe method of monitored anesthesia care, with local anesthesia, which was used for 4500 patients undergoing facial rejuvenation procedure, without major complications and with minor side effects. All procedures were performed in a setup of a private clinic not affiliated with any hospital. The disadvantages of general anesthesia were avoided. Using careful monitoring and drug titration, even aged patients with medical problems, can benefit from this method. We are using classical, inexpensive, and safe compounds, which cope with all goals of anesthesia for aesthetic facial surgery. | 2024-03-27T01:27:13.970301 | https://example.com/article/3955 |
92 SHARES Share Tweet Whatsapp Pinterest Reddit Flipboard
In an unprecedented rebuke of the current leadership of the Alabama Democratic Party, the DNC voted unanimously last week to strip ADP Chair Nancy Worley and ADP Vice-Chair Randy Kelley of their DNC credentials. This harsh, but long overdue, admonishment came on the heels of the state party missing multiple deadlines to re-write its by-laws and to hold new and fair elections for party leadership.
Worley’s response to being named persona non grata was beyond outrageous and indicative of why she has no business running a state party. After the ruling came down, she said, “And folks, you can sit here today and you can vote against us, but you know what? There will be a special circle in hell that is going to be as hot as it can be for people that defy the voting rights of people that have worked as some of the ones in Alabama I know have worked. So just get your boots on because you’re going to need a whole lot of water sprayed on you — not from those water hoses that we saw in Alabama back in the sixties — but it’s because you’re going to be burning in hell for taking away people’s voting rights. Thank you.”
Throughout Alabama, Democrats were overjoyed to see Worley’s credentials revoked and dismayed that ADP Minority Vice-Chair Joe Reed didn’t meet the same fate. Their respective and repeated abuses of power are common knowledge to the most casual observers of state party executive committee meetings. Yet, their negligence and incompetence at managing the most basic party functions speak to the urgent case for their immediate removal. For example, the ADP Facebook page hasn’t had a new post since July. They haven’t posted on Twitter since mid-May. The website is inexcusably out of date and lacks clear, current, and persuasive messaging to help viable candidates.
Finally, the DNC gave Alabama Democrats a scintilla of hope. The DNC historically loathes intervention in state party disputes, but the self-serving and manipulative machinations of Worley and Reed have put the ADP squarely on their radar. With due respect to process and autonomy, the DNC is giving the state party the last chance to clean its house. True, it’s not the immediate response many would like, but it’s fair in terms of following proper procedure. Also, trust that there will be a heavy amount of scrutiny in the coming days because the DNC has a genuine interest in quickly ameliorating this sort of dysfunction and incompetence. It may seem an understatement, but the re-election of Sen. Doug Jones is of critical importance for state and national Democrats.
So, given this rare scintilla of hope, what should be the next move for Alabama Democrats who want to rebuild their party and support Democratic candidates? First, lobby state executive committee members to vote for new party leadership. Second, demand that the state party work with county party leaders to ensure that social and traditional media messaging is timely, consistent, and relevant. Third, get involved with a county party and/or volunteer with a campaign. It may take some time for the state party to get its act together, but Alabama Democrats don’t have the luxury of time to idly wait and see what happens.
There’s so much work to be done. Alabama faces a myriad of issues and it’s time for Democrats to rise and have their voices heard. This latest move by the DNC is just one step, but more steps need to follow. The state party desperately needs reform and, for now, it looks like it’s finally starting to take place. To paraphrase Marylin Monroe, sometimes things fall apart so that better things can come together.
It’s going to take more than a scintilla of hope, it’s going to take all Alabama Democrats getting involved. | 2023-08-07T01:27:13.970301 | https://example.com/article/2092 |
Q:
Human brains considered as directed graphs
I assume that human brains can be considered as directed graphs with neurons as nodes and synapses as edges. I explicitly don't want to consider the weights, the dynamics of neural activity (based on the weights), and the adjustment of weights (learning) - just brains as static unweighted finite directed graphs.
Sensor neurons may be those having in-degree 0, actor neurons may be those having out-degree 0. (0 meaning "essentially 0".)
Considering human brains as finite directed graphs, for each question concerning finite directed graphs there should be an answer with respect to human brains.
Such questions might be:
How long is the shortest path from a sensor to an actor neuron?
How long is the longest (direct) path from a sensor to an actor neuron?
What is the (global/local) layer structure (on different levels of granularity)?
What is the (global/local) cycle structure (on different levels of granularity)?
I find it hard to get answers to such questions considering human brains as directed graphs, because neuro-scientists don't think in terms of graphs, but for example in terms of signal paths and neuro-anatomy. But then - for them - "anything goes", and "everything is connected to everything" - which is not very helpful.
I would be very glad for any reference treating (formally) human
brains as directed graphs.
A:
There is empirical evidence that the connectivity in the brain has the characteristics of a directed small-world network.
Small-world directed networks in the human brain: Multivariate Granger causality analysis of resting-state fMRI (Wei Lao et al., 2010):
Small-world organization is known to be a robust and consistent
network architecture, and is a hallmark of the structurally and
functionally connected human brain. However, it remains unknown if the
same organization is present in directed influence brain networks
whose connectivity is inferred by the transfer of information from one
node to another. Here, we aimed to reveal the network architecture of
the directed influence brain network using multivariate Granger
causality analysis and graph theory on resting-state fMRI recordings.
We found that some regions acted as pivotal hubs, either being
influenced by or influencing other regions, and thus could be
considered as information convergence regions. In addition, we
observed that an exponentially truncated power law fits the
topological distribution for the degree of total incoming and outgoing
connectivity. Furthermore, we also found that this directed network
has a modular structure. More importantly, according to our data, we
suggest that the human brain directed influence network could have a
prominent small-world topological property.
More recent studies of the human brain as a directed graph are summarised in section 7.3 of this review article.
A:
Human brains as graphs were considered by Kolmogorov and his students. Some results were published in the article О реализации сетей в трехмерном пространстве
А.Н. Колмогоров, Я.М. Барздинь - Проблемы кибернетики, 1967. You can find English translation of this work in the book A. N. Kolmogorov, Selected works - Information theory and the theory of algorithms, page 194.
| 2024-04-15T01:27:13.970301 | https://example.com/article/5090 |
Military Sweatshirts
Wide range of military sweatshirts for sale featuring any embroidered military emblem of your choice with long set-in sleeves the sweatshirts are made for comfort in an easy care 80% cotton 20% polyester mix backed by a luxuriously soft fleece. | 2024-06-01T01:27:13.970301 | https://example.com/article/2092 |
'Our ultimate goal is to make all mass spec analysis routine, even as users look at increasingly complex samples,' said Gustavo Salem, vice president and general manager, Agilent Biological Systems Division. 'This demands a holistic approach to scientific workflows, involving instrument design, software, consumables, reagents and human factors. We're pleased to be announcing steps in this direction at this year's ASMS.'
The Agilent 6550 iFunnel Q-TOF LC/MS system delivers low femtogram (quadrillionth of a gram) sensitivity, fast acquisition to 50 spectra/sec, up to five orders of intra-scan dynamic range and robust performance and operation. This high level of performance makes the instrument well-suited for challenging qualitative and quantitative applications such as metabolomics, food safety screening, early-stage drug metabolism and pharmacokinetics, and protein identification.
Last year, Agilent debuted iFunnel technology to create the world's most sensitive triple quadrupole LC/MS, a widely used configuration. The company is now extending this breakthrough design to a Q-TOF instrument.
7200 Q-TOF GC/MS
Agilent also chose ASMS 2011 to debut its first GC time-of-flight instrument, the 7200 Q-TOF GC/MS. It delivers a new level of chromatographic and spectral resolution to a wide range of biological and chemical analyses to help researchers coax more qualitative and quantitative information out of increasingly complex samples. Applications include environmental analysis, sports-doping detection, energy research, natural products research, and energy research.
The new Agilent 7200 Q-TOF combines the proven, rugged performance of the Agilent 7890A GC, the latest generation of the world's best-selling GC, with the high spectral resolution of a Q-TOF analyzer that also features time-tested designs for high-confidence results.
6420 Triple Quad LC/MS
Agilent unveiled the 6420 triple quadrupole LC/MS, a new workhorse instrument that can be upgraded to readily accommodate customers' changing needs. It replaces Agilent's popular 6410 triple quad, and is designed to protect customers' instrument investments by being easily upgradable with twofold and eightfold sensitivity increases. Agilent also made the new instrument more productive with faster electronics and new software features. The dynamic MRM solution for grouping ion transitions by retention time has been enhanced with the addition of triggered MRM for simultaneous compound identification.
The Agilent 6420 is well-suited for both routine and complex analyses such as toxicology, environmental, food safety, pharmaceutical and drugs of abuse testing. It fully supports Agilent's latest UHPLC solutions so users benefit from a complete high-performance LC/MS system from a single vendor.
6100B Series Single Quad LC/MS
Agilent also introduced a number of performance enhancements to its 6100B Series single quadrupole systems, delivering added value as prices remain unchanged. The entry-level 6120B now has POS/NEG switching that is 10 times faster, providing more information from each injection, even with narrow LC peaks. Scan speed more than doubles for higher-confidence molecule identification and confirmation.
The mid-range Agilent 6130B is now compatible with Agilent Jet Stream technology. This unique sample inlet design focuses the ion stream entering the mass spec, improving sensitivity by producing a stronger signal with lower relative standard deviation at the limit of detection.
New MassHunter Software
The new release of Agilent MassHunter software is designed to facilitate LC/MS and GC/MS analyses from instrument setup to final report. Data analysis tools help users quickly find, compare and identify compounds. This includes compound-centric data mining and navigating to streamline and simplify MS data analysis. For profiling experiments, Mass Profiler Professional automatically identifies significant differences between sample sets, and confirms identification through library searches.
Agilent Technologies Inc. (NYSE: A) is the world's premier measurement company and a technology leader in chemical analysis, life sciences, electronics and communications. The company's 18,500 employees serve customers in more than 100 countries. Agilent had net revenues of $5.4 billion in fiscal 2010. Information about Agilent is available at www.agilent.com.
Related news
Cannabis is increasingly being recognised for its therapeutic value. This has led to a reduction in its regulation, and even its legalisation, by many different governments. As cannabis production becomes legalised and regulated it is important that manufacturers can assess the chemical content and potency of their plants.
The value of cannabis in the control of pain, spasm and a range of other diseases (e.g., bipolar disorder and certain cancers) is becoming established across the medical world [1]. Medicinal...
On day one (2ndNovember) of WWEM 2016, EFASIG, a special interest group within the British Mass Spectrometry Society (Environmental and Food Analysis SIG), will hold a meeting that will be free to attend for those that have pre-registered to visit WWEM 2016 atwww.WWEM.uk.com.
The keynote presentation with be given by Professor Luigi Mondello from the University of Messina in Italy. Prof. Mondello is the author of around 400 publications and his research interests include high-resolution chromatography techniques...
On day one (2nd November 2016) of WWEM 2016, EFASIG, a special interest group within the British Mass Spectrometry Society (Environmental and Food Analysis SIG), will hold a meeting that will be free to attend for those that have pre-registered to visit WWEM 2016 at www.WWEM.uk.com.
The keynote presentation with be given by Professor Luigi Mondello from the University of Messina in Italy. Prof. Mondello is the author of around 400 publications and his research interests include high-resolution chromatography...
Make the most of our SUMMER SALE and save up to 20%! Book by 31st July for courses in October, November and December and get an extra 5% off on top of the usual available discounts!
There`s no better time to book for Gas Chromatography & GC-MS training this Autumn/Winter 2016.
Make the most of our SUMMER SALE and save up to 20%! Book by 31st July for courses in October, November and December and get an extra 5% off on top of the usual available discounts!
We have courses for all experience levels from...
Whenever you invest in GC equipment you do it with all the best intentions and with the right motivations but one key aspect of working with new or inherited equipment is that you get the most from it – "Bang for your Buck" as our friends across the pond like to say.
Anthias as a manufacturer independent provider of training and consulting in the GC and GC-MS arena gets a variety of enquires relating to hardware, software and the interaction of the two from a range of channels and for a range of equipment....
Customer comments
No comments were found for Agilent Technologies expands mass spec performance envelope with LC/MS and GC/MS introductions at ASMS 2011. Be the first to comment!
Add your comment
Great! comment successfully added!
Contact supplier
Your message:
Your email
Your name
Your last name
I would like to receive periodic email updates and special offers from select suppliers. | 2023-12-04T01:27:13.970301 | https://example.com/article/4603 |
Q:
html to xhtml conversion in java
how can we convert html to well formed xhtml by using Http class api,if possible please give a
demonstration code....thanks
A:
I just did it using Jsoup, if it works for you:
private String htmlToXhtml(final String html) {
final Document document = Jsoup.parse(html);
document.outputSettings().syntax(Document.OutputSettings.Syntax.xml);
return document.html();
}
Some useful content where my solution came from:
Is it possible to convert HTML into XHTML with Jsoup 1.8.1?
http://developers.itextpdf.com/question/how-do-html-xml-conversion-generate-closed-tags
A:
Have a look at J-Tidy: http://jtidy.sourceforge.net/ It usually does a quite good job cleaning up messy html and converting it to xhtml.
| 2023-10-18T01:27:13.970301 | https://example.com/article/2008 |
/*
This file is part of the WebKit open source project.
This file has been generated by generate-bindings.pl. DO NOT MODIFY!
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Library General Public
License as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Library General Public License for more details.
You should have received a copy of the GNU Library General Public License
along with this library; see the file COPYING.LIB. If not, write to
the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Boston, MA 02110-1301, USA.
*/
#include "config.h"
#include "JSInt32Array.h"
#include "ExceptionCode.h"
#include "Int32Array.h"
#include "JSDOMBinding.h"
#include "JSInt32Array.h"
#include <runtime/Error.h>
#include <runtime/PropertyNameArray.h>
#include <wtf/GetPtr.h>
using namespace JSC;
namespace WebCore {
ASSERT_CLASS_FITS_IN_CELL(JSInt32Array);
/* Hash table */
#if ENABLE(JIT)
#define THUNK_GENERATOR(generator) , generator
#else
#define THUNK_GENERATOR(generator)
#endif
static const HashTableValue JSInt32ArrayTableValues[3] =
{
{ "length", DontDelete | ReadOnly, (intptr_t)static_cast<PropertySlot::GetValueFunc>(jsInt32ArrayLength), (intptr_t)0 THUNK_GENERATOR(0) },
{ "constructor", DontEnum | ReadOnly, (intptr_t)static_cast<PropertySlot::GetValueFunc>(jsInt32ArrayConstructor), (intptr_t)0 THUNK_GENERATOR(0) },
{ 0, 0, 0, 0 THUNK_GENERATOR(0) }
};
#undef THUNK_GENERATOR
static JSC_CONST_HASHTABLE HashTable JSInt32ArrayTable = { 5, 3, JSInt32ArrayTableValues, 0 };
/* Hash table for constructor */
#if ENABLE(JIT)
#define THUNK_GENERATOR(generator) , generator
#else
#define THUNK_GENERATOR(generator)
#endif
static const HashTableValue JSInt32ArrayConstructorTableValues[2] =
{
{ "BYTES_PER_ELEMENT", DontDelete | ReadOnly, (intptr_t)static_cast<PropertySlot::GetValueFunc>(jsInt32ArrayBYTES_PER_ELEMENT), (intptr_t)0 THUNK_GENERATOR(0) },
{ 0, 0, 0, 0 THUNK_GENERATOR(0) }
};
#undef THUNK_GENERATOR
static JSC_CONST_HASHTABLE HashTable JSInt32ArrayConstructorTable = { 2, 1, JSInt32ArrayConstructorTableValues, 0 };
const ClassInfo JSInt32ArrayConstructor::s_info = { "Int32ArrayConstructor", &DOMConstructorObject::s_info, &JSInt32ArrayConstructorTable, 0 };
JSInt32ArrayConstructor::JSInt32ArrayConstructor(ExecState* exec, Structure* structure, JSDOMGlobalObject* globalObject)
: DOMConstructorObject(structure, globalObject)
{
ASSERT(inherits(&s_info));
putDirect(exec->globalData(), exec->propertyNames().prototype, JSInt32ArrayPrototype::self(exec, globalObject), DontDelete | ReadOnly);
}
bool JSInt32ArrayConstructor::getOwnPropertySlot(ExecState* exec, const Identifier& propertyName, PropertySlot& slot)
{
return getStaticValueSlot<JSInt32ArrayConstructor, JSDOMWrapper>(exec, &JSInt32ArrayConstructorTable, this, propertyName, slot);
}
bool JSInt32ArrayConstructor::getOwnPropertyDescriptor(ExecState* exec, const Identifier& propertyName, PropertyDescriptor& descriptor)
{
return getStaticValueDescriptor<JSInt32ArrayConstructor, JSDOMWrapper>(exec, &JSInt32ArrayConstructorTable, this, propertyName, descriptor);
}
ConstructType JSInt32ArrayConstructor::getConstructData(ConstructData& constructData)
{
constructData.native.function = constructJSInt32Array;
return ConstructTypeHost;
}
/* Hash table for prototype */
#if ENABLE(JIT)
#define THUNK_GENERATOR(generator) , generator
#else
#define THUNK_GENERATOR(generator)
#endif
static const HashTableValue JSInt32ArrayPrototypeTableValues[4] =
{
{ "BYTES_PER_ELEMENT", DontDelete | ReadOnly, (intptr_t)static_cast<PropertySlot::GetValueFunc>(jsInt32ArrayBYTES_PER_ELEMENT), (intptr_t)0 THUNK_GENERATOR(0) },
{ "subarray", DontDelete | Function, (intptr_t)static_cast<NativeFunction>(jsInt32ArrayPrototypeFunctionSubarray), (intptr_t)2 THUNK_GENERATOR(0) },
{ "set", DontDelete | Function, (intptr_t)static_cast<NativeFunction>(jsInt32ArrayPrototypeFunctionSet), (intptr_t)0 THUNK_GENERATOR(0) },
{ 0, 0, 0, 0 THUNK_GENERATOR(0) }
};
#undef THUNK_GENERATOR
static JSC_CONST_HASHTABLE HashTable JSInt32ArrayPrototypeTable = { 8, 7, JSInt32ArrayPrototypeTableValues, 0 };
static const HashTable* getJSInt32ArrayPrototypeTable(ExecState* exec)
{
return getHashTableForGlobalData(exec->globalData(), &JSInt32ArrayPrototypeTable);
}
const ClassInfo JSInt32ArrayPrototype::s_info = { "Int32ArrayPrototype", &JSC::JSObjectWithGlobalObject::s_info, 0, getJSInt32ArrayPrototypeTable };
JSObject* JSInt32ArrayPrototype::self(ExecState* exec, JSGlobalObject* globalObject)
{
return getDOMPrototype<JSInt32Array>(exec, globalObject);
}
bool JSInt32ArrayPrototype::getOwnPropertySlot(ExecState* exec, const Identifier& propertyName, PropertySlot& slot)
{
return getStaticPropertySlot<JSInt32ArrayPrototype, JSObject>(exec, getJSInt32ArrayPrototypeTable(exec), this, propertyName, slot);
}
bool JSInt32ArrayPrototype::getOwnPropertyDescriptor(ExecState* exec, const Identifier& propertyName, PropertyDescriptor& descriptor)
{
return getStaticPropertyDescriptor<JSInt32ArrayPrototype, JSObject>(exec, getJSInt32ArrayPrototypeTable(exec), this, propertyName, descriptor);
}
static const HashTable* getJSInt32ArrayTable(ExecState* exec)
{
return getHashTableForGlobalData(exec->globalData(), &JSInt32ArrayTable);
}
const ClassInfo JSInt32Array::s_info = { "Int32Array", &JSArrayBufferView::s_info, 0, getJSInt32ArrayTable };
JSInt32Array::JSInt32Array(Structure* structure, JSDOMGlobalObject* globalObject, PassRefPtr<Int32Array> impl)
: JSArrayBufferView(structure, globalObject, impl)
{
ASSERT(inherits(&s_info));
}
JSObject* JSInt32Array::createPrototype(ExecState* exec, JSGlobalObject* globalObject)
{
return new (exec) JSInt32ArrayPrototype(exec->globalData(), globalObject, JSInt32ArrayPrototype::createStructure(exec->globalData(), JSArrayBufferViewPrototype::self(exec, globalObject)));
}
bool JSInt32Array::getOwnPropertySlot(ExecState* exec, const Identifier& propertyName, PropertySlot& slot)
{
bool ok;
unsigned index = propertyName.toUInt32(ok);
if (ok && index < static_cast<Int32Array*>(impl())->length()) {
slot.setValue(getByIndex(exec, index));
return true;
}
return getStaticValueSlot<JSInt32Array, Base>(exec, getJSInt32ArrayTable(exec), this, propertyName, slot);
}
bool JSInt32Array::getOwnPropertyDescriptor(ExecState* exec, const Identifier& propertyName, PropertyDescriptor& descriptor)
{
bool ok;
unsigned index = propertyName.toUInt32(ok);
if (ok && index < static_cast<Int32Array*>(impl())->length()) {
descriptor.setDescriptor(getByIndex(exec, index), DontDelete);
return true;
}
return getStaticValueDescriptor<JSInt32Array, Base>(exec, getJSInt32ArrayTable(exec), this, propertyName, descriptor);
}
bool JSInt32Array::getOwnPropertySlot(ExecState* exec, unsigned propertyName, PropertySlot& slot)
{
if (propertyName < static_cast<Int32Array*>(impl())->length()) {
slot.setValue(getByIndex(exec, propertyName));
return true;
}
return getOwnPropertySlot(exec, Identifier::from(exec, propertyName), slot);
}
JSValue jsInt32ArrayLength(ExecState* exec, JSValue slotBase, const Identifier&)
{
JSInt32Array* castedThis = static_cast<JSInt32Array*>(asObject(slotBase));
UNUSED_PARAM(exec);
Int32Array* imp = static_cast<Int32Array*>(castedThis->impl());
JSValue result = jsNumber(imp->length());
return result;
}
JSValue jsInt32ArrayConstructor(ExecState* exec, JSValue slotBase, const Identifier&)
{
JSInt32Array* domObject = static_cast<JSInt32Array*>(asObject(slotBase));
return JSInt32Array::getConstructor(exec, domObject->globalObject());
}
void JSInt32Array::put(ExecState* exec, const Identifier& propertyName, JSValue value, PutPropertySlot& slot)
{
bool ok;
unsigned index = propertyName.toUInt32(ok);
if (ok) {
indexSetter(exec, index, value);
return;
}
Base::put(exec, propertyName, value, slot);
}
void JSInt32Array::put(ExecState* exec, unsigned propertyName, JSValue value)
{
indexSetter(exec, propertyName, value);
return;
}
void JSInt32Array::getOwnPropertyNames(ExecState* exec, PropertyNameArray& propertyNames, EnumerationMode mode)
{
for (unsigned i = 0; i < static_cast<Int32Array*>(impl())->length(); ++i)
propertyNames.add(Identifier::from(exec, i));
Base::getOwnPropertyNames(exec, propertyNames, mode);
}
JSValue JSInt32Array::getConstructor(ExecState* exec, JSGlobalObject* globalObject)
{
return getDOMConstructor<JSInt32ArrayConstructor>(exec, static_cast<JSDOMGlobalObject*>(globalObject));
}
EncodedJSValue JSC_HOST_CALL jsInt32ArrayPrototypeFunctionSubarray(ExecState* exec)
{
JSValue thisValue = exec->hostThisValue();
if (!thisValue.inherits(&JSInt32Array::s_info))
return throwVMTypeError(exec);
JSInt32Array* castedThis = static_cast<JSInt32Array*>(asObject(thisValue));
Int32Array* imp = static_cast<Int32Array*>(castedThis->impl());
int start(exec->argument(0).toInt32(exec));
if (exec->hadException())
return JSValue::encode(jsUndefined());
int argsCount = exec->argumentCount();
if (argsCount <= 1) {
JSC::JSValue result = toJS(exec, castedThis->globalObject(), WTF::getPtr(imp->subarray(start)));
return JSValue::encode(result);
}
int end(exec->argument(1).toInt32(exec));
if (exec->hadException())
return JSValue::encode(jsUndefined());
JSC::JSValue result = toJS(exec, castedThis->globalObject(), WTF::getPtr(imp->subarray(start, end)));
return JSValue::encode(result);
}
EncodedJSValue JSC_HOST_CALL jsInt32ArrayPrototypeFunctionSet(ExecState* exec)
{
JSValue thisValue = exec->hostThisValue();
if (!thisValue.inherits(&JSInt32Array::s_info))
return throwVMTypeError(exec);
JSInt32Array* castedThis = static_cast<JSInt32Array*>(asObject(thisValue));
return JSValue::encode(castedThis->set(exec));
}
// Constant getters
JSValue jsInt32ArrayBYTES_PER_ELEMENT(ExecState* exec, JSValue, const Identifier&)
{
UNUSED_PARAM(exec);
return jsNumber(static_cast<int>(4));
}
JSValue JSInt32Array::getByIndex(ExecState*, unsigned index)
{
return jsNumber(static_cast<Int32Array*>(impl())->item(index));
}
Int32Array* toInt32Array(JSC::JSValue value)
{
return value.inherits(&JSInt32Array::s_info) ? static_cast<JSInt32Array*>(asObject(value))->impl() : 0;
}
}
| 2023-08-12T01:27:13.970301 | https://example.com/article/2007 |
“It would be safer if we had the Olympics in North Korea. At least they don’t have an active terrorist group blowing things up.”
Looking for news you can trust?Subscribe to our free newsletters.
Update 1, Friday, February 7, 12:45 PM EST: An airliner from the Ukraine was forced to make an emergency landing in Turkey due to a hijacking attempt, AFP reports. Turkish officials told CNN that a passenger, believed to be of Ukrainian nationality, “said that there was a bomb on board” and wanted the plane to land in Sochi. AFP says that he was “brandishing a detonator.”
Update 2, Friday, February 7, 4:30 PM EST: The AFP reports that the man, born in 1969, was “apparently drunk” and only said that he was brandishing a detonator. According to Istanbul’s governor, the man did not have a gun or explosives. Ukrainian security services reportedly said, “The man will answer for his hooligan behavior.”
This week, Americans nervously descend upon Sochi, Russia, to cheer on their favorite athletes in the 2014 Winter Olympic Games. Members of the US team who have already arrived in the city say that with an estimated 100,000 security force members protecting the games, they feel safe. But US officials said on Tuesday that they are tracking “specific threats” to the games. And counterterrorism experts argue that the terrorism risk in Sochi is largely unprecedented, due to recent threats from active terrorist groups. They fear that attacks could take place outside of the secured perimeter surrounding the event sites, particularly on public transportation or at checkpoints. While the Daily Beast notes that terrorism coverage could overshadow the successes of US athletes—and give terrorists free publicity—experts say that it’s warranted. “This is a very serious threat. It’s not overblown,” says Victor Asal, a terrorism expert at the University of Albany. He adds that if he knew people who were planning a trip to Sochi, he’d tell them, “Don’t go.” Without further ado, here’s everything you need to know:
?Who are these terrorists, and what do they want?
The main threat to the Olympic games is the Caucasus Emirate, a loose network of Islamist terrorist groups that is located between the Black and Caspian seas in Russia. The Caucasus Emirate, established in 2007, aims to establish Shariah law in the region, but it only has suspected ties with Al Qaeda. The terrorist network is a partly an outgrowth of the First and Second Chechen wars, conflicts that began when Russia invaded Chechnya. “The human rights abuses committed by the Russians in the invasion of Chechnya were really extraordinary?, and the violence has come from these grievances,” Asal says. Initially, the group’s aims were nationalistic—secession from the Russian federation—but now, there is a growing jihadist component.
The group’s self-appointed leader is Doku Umarov, nicknamed “Russia’s bin Laden” (photo below). He’s seen only rarely, and Ramzan Kadyrov, the president of Chechnya, recently claimed that Umarov is dead. (He’s said this many times before, so terrorist experts aren’t convinced.) As of this month, that report has not been confirmed by the Russian government or the US State Department. While the network’s primary target is Russia, Umarov has also issued threats against the United States and Israel in the past, according to the US State Department.
Wikimedia
When has the Caucasus Emirate carried out attacks before?
Terrorists affiliated with the Caucasus Emirate are believed to have carried out about two terrorist attacks per year since 2008, killing hundreds of civilians. Here are some of their more notable attacks:
June 2008: A Caucasus Emirate militia group claimed responsibility for a suicide bomb attack that killed 14 and injured dozens in Vladikavkaz, less than 500 miles from Sochi.
October 2013: A woman associated with Islamic militants bombed a bus in Volgograd, about 600 miles from Sochi, killing at least six. (It has been suspected that she was associated with the Caucasus Emirate, but not confirmed.)
December 2013: A subgroup of the Caucasus Emirate claimed responsibility for a suicide attack on a train station, also in Volgograd, killing at least 16. The group also claimed responsibility for bombing a trolley bus in the same city 24 hours later, killing 18. (On Wednesday, Russia state media reported that Russian police had killed a suspected mastermind of the December Volgograd attacks.)
Have the Caucasus Emirate explicitly said they want to target the Olympic games?
Yes. In July 2013, Umarov published a video urging rebels to “do their utmost to derail” the Olympics. He characterized the games as “satanic dances on the bones of our ancestors.” Late last month, a subgroup of the Caucasus Emirate posted a video (below) showing men they said were the bombers responsible for the December attack on Volgograd, and threatened to give Russia a “present” at the Olympics.
Who are the “Black Widows” I’m hearing about?
An alleged “black widow” suicide bomber Whitehotpix/ZUMA
“Black Widows” refers to women who have committed suicide attacks, reportedly to avenge spouses or family members killed by the Russian military. According to NPR, Russian police have been circulating fliers over the last few weeks, searching for suspected female terrorists—including a 22-year-old wife who police say was recently spotted in central Sochi. While women have successfully pulled off terrorist attacks associated with the Caucasus Emirate, some experts say the threat has been overstated, because just as many, if not more, men are committing attacks.
Can these terrorists really pull off an attack on the Olympic sites?
Counterterrorism experts say that it would be very difficult, given the security lockdown known as “the ring of steel”—an area about 60 miles long and 25 miles deep around the Olympic sites. Putin has militarized the areas surrounding the games, with 100,000 police and members of the armed forces on hand, including special-ops forces to guard the mountains outside of Sochi. Only vehicles that are registered in Sochi are being allowed through the city’s checkpoint, and that’s after they’ve been searched. Drones are being deployed to survey the sites from the air, and the government will be snooping on tourists’ electronic devices. (On Tuesday, the Boston Globe reported that some of these security measures could be overstated, noting that a reporter’s bag wasn’t searched.)
What about outside of the ring of steel?
Experts say the risk is high. “The checkpoint has to stop somewhere, and if bombers get anywhere close to a checkpoint, it could have the same political effect in the media as getting into the Olympics themselves,” says Aki Peritz, a senior policy adviser for Third Way and a former CIA counterterrorism analyst. He notes that transportation to and from Sochi is particularly vulnerable, considering the attacks on buses and roadways by the Caucasus Emirate in the past. Daniel Treisman, a Russian politics expert at the University of California-Los Angeles, agrees: “The network will seek to stage attacks in order to demonstrate their capabilities. It is possible [a subgroup] could succeed. But I think they are much more likely to succeed somewhere outside Sochi than inside the security area.”
The State Department warns that while Americans aren’t being targeted specifically in Russia, “there is a general risk of U.S. citizens becoming victims of indiscriminate terrorist attacks.” The British government has been more explicit about the potential threat, putting out a map recommending that tourists avoid many areas outside of Sochi (bottom far left):
The United Kingdom’s Sochi advisory map
What weapons might be used?
Counterterrorism experts say that suicide bombers are likely the biggest threat. “I think anyone who is going to be attacking the Olympics is going to have to assume that they’re going to be dead. It’s a suicide mission however you look at it,” says Asal, from the University of Alabany. However, in 2012, Russian security forces claimed that they’d found a number of sophisticated arms that they believed were planning to be used in an attack on Sochi—including “grenades, portable surface-to-air missiles, explosives, rifles and other weapons?,” NPR reported. Gordon Hahn, a counterterrorism expert at the Center for Strategic and International Studies?, also toldForeign Policy to not rule out the possibility that regional terrorists have obtained chemical weapons from Syria.
How does this threat compare to those posed to Olympics in the past?
According to the New York Times, US officials haven’t been this concerned about security at the Olympics since the 2004 Summer Games in Athens. The paper notes however, that “the Greeks were far more receptive to help from American law enforcement and intelligence officials, who ultimately played a significant role in the security for the Games.” Treisman, from UCLA, says the most recent case that is comparable would be the 1992 Barcelona Olympics, which occurred at a time when the terrorist Basque separatist organization ETA was still active. Peritz, from Third Way, jokes that “it would be safer if we had the Olympics in North Korea. At least they don’t have an active terrorist group blowing things up.” (The most recent deadly terrorist attack on the Olympics was orchestrated by an American at the 1996 Atlanta Summer Olympics.)
What is the United States doing about all this? The United States has stationed two warships, which can launch helicopters into Sochi in case an evacuation is needed, in the nearby Black Sea. The United States is also stationing at least two dozen FBI agents in the area and may be sharing sophisticated counterbomb equipment with Russian authorities. US athletes have also been warned not to wear their uniforms outside of the secured perimeter. Several US congressmen, including House Intelligence Committee Chairman Mike Rogers? (R-Mich.) have expressed anger that Russia is not cooperating fully with US security efforts.
Is anyone actually staying home?Several US athletes have said they are asking their families to stay home from the Olympics because of security concerns, including speed skaterTucker Fredricks, Minnesota Wild ice hockey defenseman Ryan Suter, and Wild forward Zach Parise.
Tucker Fredricks
Who says it’s safe?
Some US athletes who have arrived in Sochi already told ABC News on Monday that they feel safe there. “”We’ve had a lot of fun, and I don’t anticipate us being in any more harm’s way than going down the mountain in a bobsled at 85 miles per hour,” said US bobsledder Dallas Robinson. And last month, President Obama confirmed that he felt the games were secure, noting that “the Russian authorities understand the stakes here.” However, he will not be attending with the first family.
FACT:
Mother Jones was founded as a nonprofit in 1976 because we knew corporations and the wealthy wouldn't fund the type of hard-hitting journalism we set out to do.
Today, reader support makes up about two-thirds of our budget, allows us to dig deep on stories that matter, and lets us keep our reporting free for everyone. If you value what you get from Mother Jones, please join us with a tax-deductible donation today so we can keep on doing the type of journalism 2018 demands. | 2024-02-22T01:27:13.970301 | https://example.com/article/3176 |
Updated Nov. 9 at 7:50 p.m. Eastern.
LONDON — The Canadian military, already a partner on two U.S. military satellite communications systems, is in discussions to use a third constellation that was until recently a U.S.-only system.
The U.S. opened MUOS, the Mobile User Objective System, to partners in 2015 after building and launching most of the system as a strictly national project. The fifth and final satellite, which was a spare, launched in 2016, completing a geostationary constellation that provides smartphone-like communications on a near-global basis.
Speaking at the 2018 Global MilSatcom conference here Nov. 8, Col. Cameron Stoltz, director of space requirements for the Canadian Armed Forces, said Canada wants access to MUOS to obtain ultra-high frequency satellite coverage 65 degrees north and south of the equator.
Stoltz said an agreement under discussion now could involve Canada paying “hundreds of millions of dollars” to leverage MUOS, but with the stipulation that Canada has assured access to the $7.4 billion constellation.
“One of the key points of us getting access to the MUOS is making sure that we have assured access to a certain amount of this capability,” he said. “As you can imagine, ourselves and our bosses are not interested in writing a big check and then not having some sort of guaranteed access.”
Canada considered co-financing a sixth MUOS satellite from prime contractor Lockheed Martin in 2016, but Stoltz said that option is “not something that we are currently actively discussing.”
Stoltz said that since MUOS is already complete, Canada is looking at using the U.S. Foreign Military Sales program to access the system instead of memorandums of understanding as was done for other U.S. military satellite constellations.
Canada agreed to pay 340 million Canadian dollars ($259.5 million at current exchange rates) for the U.S. to build an eighth Wideband Global Satcom satellite that launched in March 2017. The deal, for which 300 million Canadian dollars has been paid so far, granted the country access to the full WGS constellation.
Canada also agreed to pay $204 million Canadian dollars for guaranteed access to capacity on the U.S. Advanced Extremely High Frequency constellation of super-secure satellites. Counting space segement, user terminals, in-service support and other costs, that figure rises to $592 Canadian dollars. Canada has had access to the Advanced Extremely High Frequency constellation since 2013.
In a presentation, Stoltz said Canada hopes to have initial operational capability with a narrowband satellite system, preferably MUOS, by 2021. Stoltz said Canada has been informed that the U.S. will provide Canada assured access to MUOS, but specific details of how that will work have not been confirmed.
“We still have not had the technical meetings to determine exactly how that will play out, but it is moving forward,” he said.
One of the challenges is that MUOS is a Navy system, whereas the Wideband Global Satcom and Advanced Extremely High Frequency constellations are both Air Force programs. Stoltz said the combination of working with the Navy and arranging a Foreign Military Sales transaction instead of a memorandum of understanding has created some uncertainties about the process, but that both the U.S. and Canada are committed to making an agreement.
“There may be a few rough edges just because we haven’t done it this way before, but I do expect that it will be successful,” he said. | 2024-03-05T01:27:13.970301 | https://example.com/article/3880 |
Chai Tea Masala (Nepal)
No reviews
Regular price
$6.00
Sale
Weight
Chai Tea Masala (Nepal)
Handcrafted Spice Blend
All-Natural, Organic, Vegan, Fair-Trade
This spice blend was created out of love and to perfection. One of the founders of Seasonality spent 2 months trekking in Nepal. He was welcomed into many of the houses he passed along the way, each of which offered him a warm cup of chai tea - a welcomed gift during the country's colder months. He grew a fondness for the tea the sprouted from his affection for the generous people he met along his path. Upon returning home to the States, he sought long and hard for a similar tea, but every coffeehouse's version of chai they offered was so far from the warm, spicy flavors he knew and loved. Undeterred, he decided to make his own blend. After many months of grinding, mixing, and sampling, he finally created the blend from his memory.
To make this delicious tea, brew a cup of black tea. Add 1/4 tsp of chai tea masala and milk and sugar to taste. Enjoy!
We are happy to accommodate orders greater than 4 ounces. Please send us an email to request a custom order. | 2023-10-23T01:27:13.970301 | https://example.com/article/3833 |
The fine specificity of Lewis blood group antibodies. Evidence for maturation of the immune response.
Eight human Lewis blood group antibodies were characterized for their fine specificity by the use of specific immunoadsorbents and a kinetic enzyme-linked immunosorbent assay technique. Examination of sera following immunoglobulin fractionation showed IgM anti-Le(a) exhibiting broad cross-reactivity with structures biochemically related to the Lewis antigens. IgG anti-Le(a) binding was restricted to Le(a) and Le(b) These findings are consistent with the concept of affinity maturation of the immune response, which has been previously demonstrated only in animal model systems. | 2023-10-25T01:27:13.970301 | https://example.com/article/3760 |
Affinity labeling of soybean beta-amylase with 2',3'-epoxypropyl alpha-D-glucopyranoside.
The synthesized 2',3'-epoxypropyl alpha-D-glucopyranoside (alpha-EPG) inactivated soybean beta-amylase completely. The incorporation of alpha-EPG into the enzyme at 92% inactivation was 1.1 mol per mol of enzyme, as determined by using 14C-labeled alpha-EPG. The inactivation obeyed saturation kinetics of a two-step mechanism. The dissociation constant of alpha-EPG-enzyme complex and the rate constant of the irreversible inactivation step were estimated to be 119 mM and 1.14 X 10(-3)s-1, respectively. alpha-Cyclodextrin, a competitive inhibitor of this enzyme, protected the enzyme against the inactivation by alpha-EPG in a competitive manner. This suggests that alpha-EPG binds to the active site of the enzyme. The above results indicate that alpha-EPG acts on soybean beta-amylase as an affinity labeling reagent. It was also shown that an essential SH group near the active site, but not the catalytic one, scarcely participated in the inactivation by alpha-EPG. | 2024-07-11T01:27:13.970301 | https://example.com/article/2470 |
Q:
Making bars with GraphView
I have been using Graphview for some time and mostly LineGraph and PointGraph, link to GraphView can be found here: Link to GraphView.
But now I need a LineGraph that would fill the whole 0-100 and 100-200 when needed. For example when the point is 70, it would fill the whole 0-100 space, which would look something like this.
Another requirement is that is still needs to be like a LineGraph since it needs to be able to move to the right.
Does anyone have an idea how this could be done using GraphView or if it can be done at all with GraphView.
Or maybe if I set the point to be 50 and line thickness so it would cover exactly +/- 50 then it would also be the same but the problem here is that the line thickness is different on every screen.
A:
You can use a custom shape for the PointGraphSeries to get the effect that you like. In the following code I am creating a custom rectangle. This can give you some ideas on what to do:
int mX = 0;
private void addPoints(double point, PointsGraphSeries<DataPoint> series) {
point = Math.floor(point / 100) * 100;
DataPoint dataPoint = new DataPoint(mX++, point);
series.appendData(dataPoint, false, 100);
}
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);
GraphView graph = findViewById(R.id.graph);
// Set manual X bounds
graph.getViewport().setXAxisBoundsManual(true);
graph.getViewport().setMinX(0);
graph.getViewport().setMaxX(10);
// Set manual Y bounds
graph.getViewport().setYAxisBoundsManual(true);
graph.getViewport().setMinY(0);
graph.getViewport().setMaxY(1000);
// Set up the number of division for horizontal and vertical units
graph.getGridLabelRenderer().setNumHorizontalLabels(11);
graph.getGridLabelRenderer().setNumVerticalLabels(11);
PointsGraphSeries<DataPoint> series = new PointsGraphSeries<>();
series.setCustomShape(new PointsGraphSeries.CustomShape() {
@Override
public void draw(Canvas canvas,
Paint paint,
float x,
float y,
DataPointInterface dataPoint) {
canvas.drawRect(x, y - 100, x + 175, y, paint);
}
});
int[] points = {450, 512, 323, 240, 70, 790};
for (int i = 0; i < points.length; i++) {
addPoints(points[i], series);
}
graph.addSeries(series);
}
This will give you the following picture based on the provided points:
| 2023-08-16T01:27:13.970301 | https://example.com/article/2354 |
Players descend to Twitter spat over Vincent Kompany red card
The controversy over Vincent Kompany's red card escalated after players from the two Manchester teams used Twitter to argue about the merits of the sending-off and Rio Ferdinand was branded a "big baby" for questioning why there was sympathy for the City captain.
Ferdinand had joined Wayne Rooney in arguing that the referee, Chris Foy, was right to show Kompany a red card that will almost certainly result in the Belgian defender serving a four-match ban. "How can there be any debate about the red card yesterday?? You leave the ground with a 2footTackle = red card,"
said Ferdinand.Rooney also hit back at Roberto Mancini's allegations that he heavily influenced Foy's decision. Rooney's message said: "Funny how people think I got kompany sent off. I'm not ref. I didn't give red card. But it was a clear red card. 2 footed tackle."
The exchange then drew a withering response from an unlikely figure, with City's reserve striker Alex Nimely posting a message on his own account, saying: "Rio Ferdinand needs to stop been a big baby."
City have lodged an appeal with the Football Association, to be heard on Tuesday, in a last attempt to prevent Kompany missing both legs of the Carling Cup semi-final against Liverpool as well as the league games against Wigan Athletic next Monday and Tottenham Hotspur the following Sunday.
The chances of the decision being overturned are slim, however, with City needing to demonstrate that Foy made a clear mistake. Only 14 out of 50 red-card appeals were successful last year and Mancini's anger was clear after the match when he accused Rooney of deliberately influencing the referee by running to him and demanding a red card. Rooney, he said, had "told him [Foy] his decision".
Sir Alex Ferguson, however, brushed aside the accusation. "I have no complaints about Wayne, I don't think it was unacceptable what he did. I think it was a natural reaction to a bad challenge from an opponent."
City's appeal is based on the fact that Kompany did not connect, or hurt, Nani when he slid into the 12th-minute tackle that had such a major say in United's 3-2 win. Yet Kompany left the floor with both feet raised and City will not be encouraged when they reflect on the case of the Wolverhampton Wanderers midfielder Nenad Milijas, whose sending-off at Arsenal last month prompted widespread criticism of the referee Stuart Atwell but ended with the player losing his appeal.
Ferguson described Kompany's tackle after the match as dangerous, arguing that Nani could easily have been injured. Kompany said on Twitter that he was "surprised" by those comments and the City defender Micah Richards, who may now have to revert from right-back to centre-half, reiterated the sense of injustice at the Etihad Stadium.
"The decision killed the whole game," he said. "We've watched it again 10 or 20 times and it was never a red card. I think for the 10 minutes before that we were battering them. Vinnie is obviously disappointed and, if it had been 11 v 11, it would have been a different game." | 2024-05-30T01:27:13.970301 | https://example.com/article/8114 |
Welcome to The Paddle League.
Welcome to The Paddle League, where we aim to help build a better, brighter and more sustainable future for stand up paddling that benefits everyone who’s part of this amazing community.
We’re aiming to help unify, elevate and grow the great standalone events around the world while providing the elite athletes, weekend warriors, brands, fans and media a wider platform to stand on.
We also firmly believe in reconnecting SUP with its “grassroots” foundation, which means a stronger emphasis on amateurs, juniors and simply getting more people out there on the water for the first time. Because that’s the heart of our sport.
The Paddle League, which I’ve helped to co-found over the past six months with my good mates Kelly Margetts and Brian Meyer (along with the support of many other selfless paddlers), aims to achieve this by creating a unified, inclusive world tour (an evolution of the SUP Racer World Rankings) that connects everything from the awesome international events to the amazing regional races.
We want to tell a rich, engaging story about SUP, one that features the events as unique chapters and the paddlers as key characters. We want this story to inject fresh excitement and momentum into the core community while also attracting a wider audience to help grow the sport.
We aim to crown a true international champion at the end of the season (early October), and we want to give everyone an exciting storyline to follow throughout the year.
At least, that’s the plan.
We’re not going to make any wild promises, and we’re not pretending this humble sport is on the same level as pro surfing (not yet…). We’re simply aiming to help build a better base for stand up paddling–a base that’s honest, sustainable, fun and exciting, and which benefits all of the sport’s participants from the pro paddlers to the amateurs, the kids to the first timers.
We’re not trying to take over or tell anyone what to do, we simply want to come in underneath and provide a platform that helps elevate the sport for everyone. “A rising tide lifts all boats,” to borrow an old cliché. Because at the end of the day there can only be one “winner” in all of this: the sport itself.
Stand up paddling has given us so many amazing opportunities and experiences over the past decade, and now more than ever we feel a sense of duty to give back and support the sport that’s supported us.
So we invite you to join the paddlers, the events and the rest of the community on this grand adventure with us. There might be a few bumps along the way, but it’s going to be one hell of a ride.
– Kelly, Chris and Brian from The Paddle League
What is The Paddle League?
At its heart, The Paddle League is a new, unified world tour that connects the great standalone events – Carolina, the Gorge, Europe and many more – to help give the sport a more stable foundation. But it’s so much more than that.
And while the name is new, The Paddle League is anything but. The core of The League, the world rankings, has been evolving over the past five years, while the key elements such as paddlers, events and brands have been here since the early days of the sport.
The world rankings has taken on a life of its own over the past half a decade. Many events have wanted to be part of the system, many athletes have referred to it as the “de facto world tour” and planned their seasons around it, and many fans have asked why we don’t simply reset the leaderboard each year to make the season look more like a season.
So that’s what we’re doing: The Paddle League is essentially the new name and new home for the world rankings, which are being spun-off from SUP Racer and into The League. It’ll be easier to follow, and it’ll be even more inclusive and accessible for events and paddlers of all levels.
The rankings were always evolving anyway, from the Race Index to star ratings and everything in between, so this is simply the logical next step.
You might have seen the trailer we released a couple of weeks ago and that’s just the beginning. We don’t want to unleash too many details too soon – we’re taking baby steps and slowly building this out over the coming weeks and months (and years) to keep things sustainable and realistic, and to bring the community along for the ride as we build this puzzle piece by piece – but here’s a slightly closer look at how it all works…
Stage 1: The Paddle League World Tour
This was our first announcement. A unified world tour that connects the major standalone events that have done so much for our sport over the years, from the Carolins and Gorges to the Euro Tours.
Each of these major events will be one of the main chapters in the story we’re aiming to tell, and each of these big races (except for the Specialty Events) will have the full Paddle League live coverage, which will be an evolution of the original SUP Racer live streams. So basically: the world tour events will receive the bulk of our coverage and attention, although this is still only one part of the broader Paddle League system.
This world tour will go a long way to deciding The Paddle League champions at the end of the season, and between now and then we aim to tell an engaging story around the key characters – the elite athletes – as the Connors and Titous, the Fionas and Olivias battle it out to see who’s the true world number one.
These events were chosen based on the old Race Index system as well as feedback from the top paddlers. But we added new criteria this year, such as regional significance (the Tahitis and Japans of the worlds) and the extraordinary challenges and unique storylines that events like the 11 City Tour contribute to our sport.
These events were also chosen because they’ve all done so much for our sport over the years. These are the events we want to support with The Paddle League because these are the types of events that support the sport.
We’ve also been really inspired by the elite athletes whilst building The League over the past six months. We asked the top paddlers to sign a letter of support for the direction The Paddle League is going, and we had 64 of the world’s top 70 ranked athletes throw their weight behind our mission. This is a big motivator not only because many of the sport’s biggest names have stepped up to support the League (and in turn the support the sport itself), but because the elite athletes are one of the key groups we want to help elevate and support so we’ve wanted to involve them as much as possible from day one.
Pacific Paddle Games presented by Salt Life
USA, October 6/7Honourary Points Race
– The PPGs, long viewed as the season-ending showcase in our sport, is an honourary points. The event will count for full points on The Paddle League leaderboard, but it’s not part of the World Tour itself. This event is unique because unlike the other major events that will have full coverage and live streams produced by The Paddle League, the PPGs remains a fully independent event delivered by our friends at SUP the Mag.
– Note: All of these races remain independent, full stop. The Paddle League doesn’t organise these events, that’s done by the tirelses, hard-working local organisers that have helped build this sport from scratch. The League is simply aiming to help these events get more exposure through live coverage, media production and by becoming part of a unified story about the sport.
Stage 2: The Regional Leagues
While we’re pretty damn excited to help give the elite athletes a true platform to compete on, and we’re determined to help make these fantastic major events even bigger and more successful than they already are, the true engine of The Paddle League will be the Regional Leagues.
This is what’s really driving our efforts at The Paddle League–a desire to reconnect and help support, strengthen and elevate the amazing regional events that are doing so much to fuel our sport. From the mass participation events to the grassroots regional races that are helping inspire new paddling communities, we really want to help support and elevate these race. Because without them the sport simply would not exist.
We’re currently identifying and talking with race organisers around the world to be part of these new Regional Leagues (the epic GlaGla Race will be the first event each season, for example). And while the 2018 season won’t see these Leagues formally established, we want to lay the groundwork this year ahead of a more formal structure in 2019 and beyond.
You’ll hear more about the Regionals (including the full schedule) in the coming weeks, but for now I can say there will be two dozen or more events in North America, South America, Europe, Oceania, Asia and Africa (sorry, Antarctica).
The Interlinked World Rankings
The World Tour and Regional Leagues will be connected via an interlinked world rankings leaderboard (an evolution of the SUP Racer World Rankings). We aim to make The Paddle League accessible for all paddlers, whether you’re an international superstar or a weekend warrior, which means every single race in The Paddle League system will count towards the interlinked leadaerboard. The Paddle League aims to be as inclusive as possible.
Regional races will count for between 10 and 50 points (1-star to 5-star)
Athletes’ five best results will determine their ranking (and that’s any combination of World Tour and Regional League events, whichever events give an athlete their best five point scores)
The rankings will be reset at the start of the world tour “season” (i.e. early April)
The Paddle League international champions will be crowned in early October (the honourary PPGs is the final points race of the season, and our crowning ceremony will happen shortly after that event)
Regional events that fall outside of the world tour season will count as “Headstart” events. Those points will count for the following season and points won’t activate until next season’s world tour begins (for example: regional events in November 2018 will count for the 2019 season, and their points will show up on the leaderboard after the first major in April 2019).
We also have something in the works for the juniors aka the very future of our sport. The kids will be play a big role in The Paddle League as we aim to tell the story of our sport, and we’ll share more about this in the coming weeks.
What’s Next?
Plenty.
The feedback and support we’ve had since the “soft launch” two weeks ago has been really encouraging, and it’s given us a fresh round of motivation to continue working hard to get this ship sailing.
You’ll hear a lot more as we reveal new details in the coming weeks, in particular the Regional Leagues.
Until then, I want to say a special thanks to my co-founders in The Paddle League – the veteran legend Kelly Margetts and Brian Meyer from Capital SUP – for making this possible. SUP Racer and myself have just been one part of a much bigger operation behind the scenes (and indeed the whole Paddle League will remain separate and fairly independent from SUP Racer in general).
There’s been plenty of late nights and early mornings, and there will be a hell of a lot more to come, but it’s exciting to watch this great sport of ours evolve, and it’s a privilege to be part of that evolution.
The Paddlers’ Collective, the wide group of top athletes that banded together in mid-2017 to help grab a hold of the steering wheel and drive the sport forward, have also been a huge asset. While unanimous agreement among competitors isn’t always possible (or necessary), it’s been hugely encouraging to see so many athletes, especially some of the younger generation, really step it up and help take a leading role behind the scenes in this sport.
We’ve also had huge support from the biggest and most well-established tour in the sport, the mighty EuroTour, which we’ll be collaborating very closely with this summer and beyond to help further elevate SUP in Euro land.
And we want to thank everyone else in this great community, whether you’re a paddler, an event organiser, a manufacturer, a fan, or all of the above. The SUP tribe is a special one, and we’re going to make sure The Paddle League stays true to its roots. | 2024-03-04T01:27:13.970301 | https://example.com/article/4025 |
Association between three autoimmune diseases: vitiligo, primary biliary cirrhosis, and Sjögren's syndrome.
Although the association of multiple autoimmune diseases has already been widely described, no reports of the association between vitiligo, primary biliary cirrhosis and Sjogren's syndrome were retrieved in the SciELO and PubMed databases. The authors describe the case of a female patient who was diagnosed with primary biliary cirrhosis and Sjogren's syndrome at age 54. At age 58, she developed vitiligo restricted to the face, associated with significant impairment of self-esteem and quality of life. Anti-nuclear antibody was negative at the onset of the condition, but became positive after phototherapy initiation. In general, the occurrence of multiple autoimmune diseases in the same patient is known as a mosaic of autoimmunity. However, specific mechanisms appear to interconnect primary biliary cirrhosis and Sjogren's syndrome, such as PDC-E2-mediated generalized epithelitis. | 2024-03-20T01:27:13.970301 | https://example.com/article/8784 |
I spent two weeks in Thailand passing on treks to hill tribes and sitting while others roamed night markets for great bargains. I did none of this graciously. I did it because I wanted a foot at Angkor.
Angkor Wat is named for the most famous of a massive series of temples and palaces located fifteen minutes by car north of Siem Reap. You pay twenty dollars per day to enter the historic area, where you can meander through and even touch what remains of royal mansions and estates constructed between the ninth and twelfth centuries. I couldn’t imagine traveling all the way to Cambodia and missing out on Angkor because of my stupid foot.
Our first afternoon, I forgot my worries as our car approached the ruins. In the back seat, Cliff and I pinched the tender insides of each other’s forearms; we do, in moments of excitement. Behind a moat that had, in the heyday of Khmer power, been filled with territorial crocodiles, was Angkor.
Note there are five levels to climb.
Five towers of gray sandstone shimmered in the afternoon heat, the tallest almost seven hundred feet from the ground. For an instant, it felt as though a thousand years had not passed, as if Khmer culture still dominated Asia from Burma to as far south as Indonesia. As if the archaeologist Louis Delaporte had not removed the finest statues in 1873 for “the cultural enrichment of France,” the United States hadn’t bombed, and the Khmer Rouge hadn’t used the place for target practice. Angkor stood.
I half-expected to see the god-king Suryavarman II, surrounded by the several thousand bare-breasted babes who purportedly attended him. Wrong; thousands of tourists. They walked and I limped along the five-hundred-meter causeway taking us over the moat and to the main gate.
That was one loooong causeway.
Once inside, a second causeway of similar length took us to steep stairs leading to Angkor’s first level, a courtyard enclosed by high-walled, open-aired galleries, a kilometer square. In the twelfth century, Suryavarman II had the breezy stone walkways carved with bas-relief depicting scenes from Hindu mythology, his military victories and, of course, many, many babes and their fabulously bare breasts.
I managed the first of the four galleries before my foot would have no more of it. Dispatching Cliff to see the rest, I perched on a stone bench under a carved arch and tried to convince myself that when you’ve seen one 12th-century Hindu epic carved into a quarter kilometer of sandstone wall, you’ve seen ’em all.
Two long causeways and five flights up, we are shocked, shocked to find more stairs.
I’d stopped crying by the time Cliff returned. Clutching his arm for support, I made my painful way up the staircase to the stone courtyard that was the second level. Crossing it, we found ourselves at the base of yet another flight of stairs leading to the final level, the courtyard of the five towers.
Metal handrails lined these stairs. Screw dignity. I dropped to my knees and used my arms to haul myself up the stone stairs.
Knees aching slightly, I sat in the shade of the mighty towers, watching Cliff clamber to the top. That must have been when he came up with his plan.
Rate this:
Share this:
Related
allehall
I am a writer. I write to explore childhood: literary essays and short fiction, journalism, and one haiku. My published work expresses my belief that everything which did or did not happen to me as a child is manifesting in everything that is or is not happening to me today. More importantly, it is also manifesting for my children.
I believe funny is the new navel-gazing, and that the best funny keeps a penny's worth of serious in an accessible pocket.
Little-known fact: I have a completed novel decorating the inside of a desk drawer. Perhaps it is not funny enough. | 2024-07-17T01:27:13.970301 | https://example.com/article/5766 |
Last week, the Treasury Department's Financial Crimes Enforcement Network (FinCEN) made waves in the Bitcoin community by releasing a statement of guidance that paid special attention to virtual currencies. Patrick Murck, who provides legal council to Bitcoin.org and contributes to the foundation's blog, expressed concerns about the implementation of the suggestions, which are being made to the Bank Secrecy Act.
Murck said he "was happy to see FinCEN issue some clarity around the overly-broad pre-paid access rules and definitively state that they do not apply in the context of bitcoin," but he was also pretty worried about the ill-fitting definitions FinCEN came up with:
Left unsaid are any specifics around the facts and circumstances that would constitute "engaging as a business." [In reference to the definitions of "User", "Administrator" and "Exchanger"]
FinCEN's guidance implies that every person who has ever had any virtual currency and has ever exchanged that virtual currency for real currency may now be considered a money transmitter under the Bank Secrecy Act. That is, of course, an untenable position.
What is crystal-clear is that once a person sells a single Satoshi for real currency that person is no longer a "User" and therefore not categorically exempted from MSB registration.
Murck summarized the FinCEN guidance as follows:
A person may spend money to purchase bitcoin or mine bitcoin and then exchange the currency for goods and/or services without having to register with FinCEN as an MSB.
If a person receives real money in exchange for their bitcoin they MAY have to register with FinCEN.
If a miner exchanges their mined bitcoin for real money they MUST register with FinCEN.
Anyone transacting bitcoin on someone else's behalf MUST register with FinCEN.
Murck also tried to calm businesses and individuals working with the currency, noting that "under the Administrative Procedures Act (APA), FinCEN can't promulgate new rules without going through a notice and comment proceeding whereby the public may have their voices heard." | 2023-09-14T01:27:13.970301 | https://example.com/article/2079 |
An Australian man who filmed himself riding an emu to work and posted the video online could be charged with animal cruelty offences.
The Queensland resident, named locally as Jack McMillan, can be seen clutching the throat of an emu he calls ‘Betsy’ before he begins to ride, shouting ‘righto girl let’s go, off to work we go!’
Introducing the strange set-up Mr McMillan says in the video: ‘What most overseas people get confused about Australia is they think we ride kangaroos to work but in actual fact we ride emus.’
Biosecurity Queensland says it received the footage from the RSPCA and is assessing what action to take next under the Animal Care and Protection Act 2001.
Mr McMillan later defended the video in a Facebook post saying: ‘So it turns out someone thought my video of the emu was that good they thought (sic) they should let the coppas no (sic).
‘Just to clear up if it wasn’t for me that emu would of being (sic) dead right now as it was tangled up in a barb wire fence and I cut it out and made a video.’
Mr McMillan’s controversial video is not the only one that has attracted international attention from animal rights groups. His Facebook account apparently revealed more bizarre acts, including using a live calf and a dead pig in exercise regimes.
RSPCA Queensland spokesman Michael Beatty explained: ‘In one video he was using a calf on top of his leg to do leg stretching exercises. In another he used a dead pig like a weight.’ | 2023-10-11T01:27:13.970301 | https://example.com/article/5196 |
#region License
//
// Copyright (c) 2013, Kooboo team
//
// Licensed under the BSD License
// See the file LICENSE.txt for details.
//
#endregion
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Collections;
using Kooboo.CMS.Content.Persistence.Default;
using Kooboo.CMS.Content.Models;
using Kooboo.CMS.Common.Runtime.Dependency;
using Kooboo.CMS.Common.Runtime;
namespace Kooboo.CMS.Content.Persistence.SqlServer
{
[Kooboo.CMS.Common.Runtime.Dependency.Dependency(typeof(IProviderFactory), Order = 2)]
public class ProviderFactory : Default.ProviderFactory
{
public const string ProviderName = "SQLServer";
public override string Name
{
get { return ProviderName; }
}
//public void Register(IContainerManager containerManager, ITypeFinder typeFinder)
//{
// containerManager.AddComponent<IProviderFactory, ProviderFactory>();
// containerManager.AddComponent<IRepositoryProvider, RepositoryProvider>();
// containerManager.AddComponent<ISchemaProvider, SchemaProvider>();
// containerManager.AddComponent<IContentProvider<TextContent>, TextContentProvider>();
// containerManager.AddComponent<ITextContentProvider, TextContentProvider>();
//}
//public int Order
//{
// get { return 2; }
//}
}
}
| 2024-02-26T01:27:13.970301 | https://example.com/article/2610 |
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
AT KNOXVILLE FILED
JANUARY, 1997 SESSION May 19, 1997
Cecil Crowson, Jr.
Appellate C ourt Clerk
STATE OF TENNESSEE, ) No. 03C01-9604-CC-00146
)
Appellee, ) Jefferson County
)
vs. ) Hon. William R. Holt, Judge
)
RICHARD DOUGLAS LOWERY, ) (Aggravated Assault; forgery)
)
Appellant. )
)
FOR THE APPELLANT: FOR THE APPELLEE:
EDWARD C. MILLER CHARLES W. BURSON
Public Defender Attorney General & Reporter
Fourth Judicial District
P.O. Box 416 CLINT T. MORGAN
Dandridge, TN 37725 Counsel for the State
450 James Robertson Parkway
Nashville, TN 37243-0493
AL C. SCHMUTZER, JR.
District Attorney General
JAMES L. GASS
Assistant District Attorney General
Fourth Judicial District
301 East Courthouse
125 Court Avenue
Sevierville, TN 37862
OPINION FILED: ____________________
AFFIRMED
CURWOOD WITT, JUDGE
OPINION
The appellant, Richard Douglas Lowery, appeals from the sentence
imposed by the Jefferson County Circuit Court. A jury convicted him of forgery,
aggravated assault, and two related misdemeanors. The trial court determined the
appellant to be a Range III persistent offender and imposed sentences of four years
for forgery and two sentences of eleven months and twenty-nine days each for the
misdemeanors, set to run concurrently with a ten year sentence for the aggravated
assault. In this appeal he complains the trial court erred in the following ways:
(1) failing to require the filing of a presentence report;
(2) sentencing the appellant as a Range III persistent
offender;
(3) failing to place of record the required findings of fact;
and
(4) failing to give due consideration to the relevant factors
of sentencing.
After review of the record, we affirm the judgment of the trial court.
The appellant raises no challenge to his convictions. On the morning
of trial but before it began, the state filed a “Notice of Intent to Seek Enhanced
Punishment” in order to have the appellant declared a persistent offender. Five
previous felony convictions were cited as the qualifying convictions for Range III.
All of the convictions had been rendered in the Jefferson County Circuit Court, the
trial court below. The listing of the convictions on the Notice contained the dates
of conviction, revealing that three of the convictions occurred on the same date,
February 8, 1989. The other two convictions occurred, respectively, in 1990 and
2
1994. After the trial court received the jury’s verdicts and discharged the jury, the
trial judge and counsel discussed on the record the planning of the sentencing
hearing. The appellant’s attorney asked for a presentence mental evaluation, but
the trial judge initially understood him to request a “More Specific Data Report.”
Once the trial court understood that the appellant was seeking a mental evaluation,
the court denied the request.1 The court indicated the appellant could ask the
probation officer to address the issue in the presentence report, and the appellant
could also submit additional information for the report. Defense counsel asked the
court to expedite the sentencing hearing because the appellant preferred to be
transferred to a state facility as soon as possible. The hearing was held forty-four
days later. At the beginning of the sentencing hearing, the court asked counsel if
they had “the reports”. The following exchange occurred:
General Gass: Do you [have the presentence report]?
Mr. Miller: I don’t think so.
General Gass: You waive presentence report?
The court: You waive the specific ...?
Mr. Miller: Well, Your Honor, we will. We’re ready to go
forward with sentencing. He--he’s ready to get
his time and go--go on. But we did contact the
probation officer right after the conviction and
discuss the preparation of this. That’s required.
But we’re not going to demand that that be done
before he’s sentenced, because he’s ready to
get his time and--and go on.
The court: So, in essence, you’re waiving it?
1
The trial court’s denial of a mental examination is not challenged on appeal.
3
Mr. Milller: I guess you could say that, Your Honor.
The court: Can’t guess about it. We do or don’t.
Mr. Miller: We do, Your Honor.
The court: You do have your data report, right? The two-
page report? Do you?
Mr. Miller: . . . That’s fine, Your Honor. I do. I’ve got it
here, Your Honor. Yes.
The state offered no additional proof, although a “Criminal History
Report” dated October 20, 1995 appears in the technical record. Although this
Criminal History Report, along with the Notice, was one of the documents certified
by the trial court clerk as part of the “full and complete copy of the pleadings and
records” on file in the case, the Report did not bear a filing date nor did it bear any
identification from the trial judge certifying it as an exhibit. This Report contained
essentially the same information contained in the Notice, except the Report
disclosed that the three convictions that occurred on February 8, 1989 were
convictions obtained upon multiple counts contained in the same indictment.
The defense then challenged the Range III determination, arguing that
two of the three February 8, 1989 convictions were disqualified by the twenty-four-
hour rule set forth in Tennessee Code Annotated § 40-35-107(b)(4) (1990). In
response, the District Attorney General retrieved the court’s original 1989 file from
the clerk’s office. The record reflects the file was handed to the trial judge, who
commented upon certain contents of the file, specifically that the February 1989
convictions arose from events that occurred on September 23 and October 10 and
16, 1988, such that the twenty-four-hour rule could not come into play. The court
read these dates into the record. While the source of this information within the
4
1989 court file is not totally clear, it appears the information as to the occurrence
dates came from the allegations set forth in the underlying warrants, including the
supporting affidavits. Neither the record of the 1989 proceedings nor a certified
copy of any of its contents was authenticated by the trial judge as an exhibit, and
neither appears in the record of the evidence, except for the trial judge’s reading
from the 1989 file as transcribed by the court reporter. There were no objections
to this procedure. After examining the 1989 file, the trial court declared the
appellant qualified as a persistent offender, the five qualifying felony convictions
being present. After hearing arguments as to the propriety of both enhancement
and mitigating factors, the trial court recited its recollection of the proof at trial and
noted the persuasive mitigation arguments of diminished judgment and mental
condition due to chemical addiction. Then he sentenced the appellant to the
minimum sentences in the applicable range to run concurrently.
When there is a challenge to the length, range, or manner of service
of a sentence, it is the duty of this court to conduct a de novo review on the record
with a presumption that the determinations made by the trial court are correct.
Tenn. Code Ann. §40-35-401(d) (1990). This presumption is “conditioned upon the
affirmative showing in the record that the trial court considered the sentencing
principles and all relevant facts and circumstances.” State v. Ashby, 823 S.W.2d
166, 169 (Tenn. 1991). “The burden of showing that the sentence is improper is
upon the appellant.” Id. In the event the record fails to demonstrate the required
consideration by the trial court, review of the sentence is purely de novo. Id. If
appellate review reflects the trial court properly considered all relevant factors and
its findings of fact are adequately supported by the record, this court must affirm the
sentence, “even if we would have preferred a different result.” State v. Fletcher, 805
S.W.2d 785, 789 (Tenn. Crim. App. 1991).
5
In making its sentencing determination, the trial court, at the
conclusion of the sentencing hearing, determines the range of sentence and then
determines the specific sentence and the propriety of sentencing alternatives by
considering (1) the evidence, if any, received at the trial and the sentencing hearing;
(2) the presentence report; (3) the principles of sentencing and arguments as to
sentencing alternatives; (4) the nature and characteristics of the criminal conduct
involved; (5) evidence and information offered by the parties on the enhancement
and mitigating factors; (6) any statement the defendant wishes to make in the
defendant’s behalf about sentencing; and (7) the potential for rehabilitation or
treatment. Tenn. Code Ann. §§ 40-35-210(a), (b) and 40-35-103(5) (1990); State
v. Holland, 860 S.W.2d 53, 60 (Tenn. Crim. App. 1993).
I. Absence of Presentence Report.
The appellant is correct in pointing out that Tennessee sentencing law
mandates that a presentence investigation and report be made in all felony cases.
Tennessee Code Annotated Section 40-35-205(a) provides:
Upon acceptance of a guilty plea or upon a verdict or finding of guilty,
the court shall, in the case of a felony, and may, in the case of a
misdemeanor, direct the presentence service officer to make a
presentence investigation and report, except as provided in §40-35-
203 and subsection (b). The presentence service officer shall
conduct the investigation necessary to prepare a presentence report,
meeting the requirements of §40-35-207 and any other investigation
he deems appropriate or the court directs and shall independently
determine the factual basis for any enhancement or mitigating factors
asserted by the parties. Tenn. Code Ann. § 40-35-205(a) (1990)
(emphasis added).
Moreover, Section 40-35-210 provides:
(b) To determine the specific sentence and the appropriate
combination of sentencing alternatives that shall be imposed on the
defendant, the court shall consider the following:
...
(2) the presentence report[.]
6
...
(g) A sentence must be based on evidence in the record of the trial,
the sentencing hearing, the presentence report, and, the record of
prior felony convictions filed by the district attorney general with the
court as required by §40-35-202(a). Tenn. Code Ann. §40-35-
210(b)(2), (g) (Supp. 1996) (emphasis added).
The use of the words “shall” and “must” have not gone unnoticed by this court. We
have previously held the preparation and filing of a presentence report is mandatory
in a felony case in which the parties have not fully agreed to the sentence to be
imposed. State v. Ronnie C. Allen, No. 03C01-9409-CR-00347, 1995 WL 102741
(Tenn. Crim. App., Knoxville, March 10, 1995); State v. Patricia Walton, No. 03C01-
9205-CR-156, 1992 WL 371778 (Tenn. Crim. App., Knoxville, December 17, 1992).
In none of these cases, however, was this court presented with an affirmative
waiver of the report.
In the case now before us, the presentence report was apparently
ordered, but by stipulation of both parties and with the approval of the trial court, the
parties proceeded through the sentencing hearing without the presentence report.
No objection was made to this procedure, but the record is not merely silent as to
the waiver. It evinces an affirmative waiver. Indeed, with respect to the defense,
the side now claiming to be aggrieved by the absence of the report, the waiver was
pressed to the point of estoppel. At the hearing, the appellant urged the court to
proceed and to make its decision without benefit of the otherwise-mandated report.
The appellant is now asking this court to violate Rule 36(a) of the Tennessee Rules
of Appellate Procedure by taking action in this appeal “in contravention of the
province of the trier of fact.” Tenn. R. App. P. 36(a). This rule further provides that
nothing contained therein “shall be construed as requiring that relief be granted to
a party responsible for an error or who failed to take whatever action was
reasonably available to prevent or nullify the harmful effect of an error.” Id.
7
Additionally, we note in passing that the appellant made no showing of any
favorable information that a presentence report might have contained, and
consequently there was no claim of prejudice. Tenn. R. App. P. 32(b); Tenn. R.
Crim. P. 52(a).
We do not encourage trial counsel and trial courts to embark upon
sentencing hearings in the absence of presentence reports. We view the
legislature’s mandate as expressed in Tennessee Code Annotated §§ 40-35-205(a)
and 210 (b), (g) to be well reasoned. Certainly the use of the presentence report
better enables the trial court to carry out the purposes of the sentencing law, and
moreover, the presence of the report in the record is necessary for de novo
appellate review. See State v. Charles Eberhardt, No. 03C01-9307-CR-00230, slip
op. At 5, 1994 WL 46511 at *3 (Tenn. Crim. App., Knoxville, February 17, 1994);
State v. James Patrick Hill, Jr., No. 954, slip op. At 2, 1991 WL 134500 at *1 (Tenn.
Crim. App., Knoxville, July 23,1991). However, on the unique facts of the case
before us, we hold that the prehearing filing and the use of the presentence report
were waived.
II. Range-of-Sentence Issues.
a. Timeliness of filing notice.
The first issue relative to the appellant’s complaint about the
sentencing range is the untimely filing of the enhancement notice. Tennessee Code
Annotated Section 40-35-202(a) provides for the filing of a notice of intent to seek
enhanced punishment and requires that such a notice be filed by the district
attorney general “not less than ten (10) days before trial or acceptance of a guilty
8
plea.” The Notice in this case was filed with the court and served upon defense
counsel on the morning of trial. In State v. Stephenson, 752 S.W.2d 80 (Tenn.
1988), a notice had also been filed on the day of trial, and the Court held the notice
was effective “in the absence of some showing of prejudice on the part of the
accused, particularly where defense counsel does not move for a continuance or
postponement of the trial as he is clearly authorized to do.” Id. at 81. The court
concluded that where there was no defense motion for continuance, any objection
to the untimely filing was waived. Id. A similar result was reached in State v.
Adams, 788 S.W.2d 557, 559 (Tenn. 1990), on the issue of sufficiency of the notice.
See also State v. Gilmore, 823 S.W.2d 566 (Tenn. Crim. App. 1991). No motion for
continuance was filed in the case now before us, nor has any prejudice been shown
by reason of the late filing of the Notice, and therefore we conclude the objection
is waived.
b. Evidence supporting range determination.
Imposition of an enhanced sentencing range must be predicated upon
a finding by the trial court beyond a reasonable doubt that the requisite prior felonies
exist. Tenn. Code Ann. §§ 40-35-106(c), 107(c), and 108(c) (1990). The appellant
argues the record is devoid of any evidence supporting the decision to enhance the
range from I to III. All five prior convictions were mentioned in the Notice, but the
extent of the proof of the five qualifying convictions is found only in the “Criminal
History Report” and the transcribed comments of the trial judge made at the
sentencing hearing as he read from the original court file.
First we must determine if the “Criminal History Report” is “in
evidence.” Inclusion of a document in the “technical record” will not, “as a matter
9
of law,” permit this court to consider the document when it has not been introduced
as evidence or authenticated by the trial court. State v. Cooper, 736 S.W.2d 125,
131 (Tenn. Crim. App. 1987). In Cooper, the court noted:
Before an exhibit may be considered by this court, it must have been
(a) received into evidence, (b) marked by the trial judge, clerk or court
reporter as having been received into evidence as an exhibit, ©
authenticated by the trial judge, and (d) included in the transcript of
the evidence transmitted to this court. Id. 131.
Under this rule the Criminal History Report found in the technical
record as certified by the clerk is not properly before the court. As a result, the
listing found in this report is not to be considered evidentially.
Before considering the trial court’s review of the original 1989
conviction file, we observe that the 1990 and 1994 convictions were mentioned in
the Notice and were never challenged in any way by the appellant. The appellant
has conceded tacitly that these two convictions qualify. This concession, or waiver,
is really part and parcel of the waiver of the filing of the presentence report (dealt
with above in Section I), where the appellant made no effort to put the state to its
burden of proof as to these two convictions and where the accuracy of the
description of these two convictions was not challenged. We have previously held
that when allegations of qualifying convictions are set forth only in the notice of
intent to enhance, the state’s burden to establish the range enhancement is not
met. State v. Jones, 901 S.W.2d 393, 397 (Tenn. Crim. App. 1995); State v.
Charles Eberhardt, No. 03C01-9307-CR-00230, slip op. at 2-4 (Tenn. Crim. App.,
Knoxville, February 17, 1994). However, in these cases the defendant either “put
the state to its burden of proof” or otherwise challenged the accuracy of the
conviction information. Where summary information about the qualifying convictions
was contained in the presentence report but was not otherwise proven by certified
10
copies of conviction records or otherwise, we have held that the state has proven
range enhancement beyond a reasonable doubt, “‘absent a showing that the report
is based on unreliable sources or is otherwise inaccurate.’” State v. Anthony D.
Hines, No. 01C01-9406-CC-00189, slip op. at 5-6 (Tenn. Crim. App., Nashville, May
25, 1995), perm. app. denied (Tenn. Nov. 6, 1995). See also State v. Richard J.
Crossman, No. 01C01-9311-CR-00394 (Tenn. Crim. App., Nashville, October 6,
1994), perm. app. denied (Tenn. January 3, 1995) (where the sentencing issue was
not the range and the state’s burden was only preponderance of the evidence,
summary listings of convictions were sufficient in the absence of a challenge to the
accuracy of the information). Where the presentence report has been effectively
waived, as in the case now before us, and where the appellant has also not
challenged the reliability or accuracy of the description of the 1990 and 1994
convictions “pleaded” in the Notice, he should not be heard now to claim that these
two convictions were not proven. Tenn. R. App. P. 36(a). The trial court was
justified in considering these convictions in support of the enhancement of the range
of sentence.
We now turn to the trial court’s treatment of the original 1989
conviction record. The cases cited above dealt with a record that was devoid of
proof of qualifying convictions except for summary listings or computer print-outs
contained in the enhancement notice and/or presentence report. In none of the
cases mentioned did the prosecution attempt to utilize an original record of a
qualifying conviction as did the prosecution in the case before us. Tennessee Code
Annotated Section 40-35-202(a) provides that the “original or certified copy” of the
prior conviction record, bearing the name of the accused, is “prima facie evidence
of the facts set out therein.” There is no physical or documentary exhibit of this
11
“original” evidence, and no witness testified as to the facts. However, there is a
representation of the pertinent facts in the transcript of the trial judge’s recitation of
the dates of the offenses that resulted in the 1989 convictions, and the trial judge
approved and authenticated the transcript.
This material is evidence and is in evidence. There is no need to
adduce evidence through a testifying witness when the evidence is judicially
noticeable under Rule 201, Tennessee Rules of Evidence. The trial court’s review
and commentary on its own 1989 file was an act of judicial notice. It is authorized
by Rule 201(b)(2), the facts being “capable of accurate and ready determination by
resort to sources whose accuracy cannot reasonably be questioned.” Id. The trial
court may take judicial notice “whether requested or not,” Tenn. R. Evid. 201(c), and
the notice may be taken at any stage of the proceeding. Id. at 201(f). An
opportunity to be heard on the propriety of taking the notice is afforded upon
request, but in the case below no request was made.
We hold the facts are judicially noticeable under the rule. While it has
been opined that the trial court in reviewing its prior proceedings may not take
judicial notice of a prior party being identical to a party sub judice, 2 Charles E.
Torcia, Wharton’s Criminal Evidence § 232 (14th ed. Supp. 1996), Tennessee Code
Annotated Section 40-35-202(a) resolves the question by providing that the original
or certified copy of the conviction record, “bearing the same name as that by which
the defendant is charged in the primary offense, is prima facie evidence that the
defendant named therein is the same as the defendant before the court.” Moreover,
questions concerning the nature of other facts noticed below are resolved by this
same Code section because the conviction record as offered below is also “prima
12
facie evidence of the facts set out therein.” Id. This rule governs the noticing of
facts gleaned from an arrest warrant affidavit contained within the file because (1)
the judicial notice taken did not exceed the scope of examination of the file that
would have been available to a testifying court clerk, and (2) the type of fact
extracted, being a date of an offense which resulted in a conviction, is by its nature
judicially noticeable.2 See State v. Woodall, 729 S.W.2d 91, 94 (Tenn. 1987) (an
arrest warrant contained in a court record is an official judicial record of proceedings
in that case).
Based upon the foregoing, we hold that the judicial notice of the
original 1989 conviction file provided sufficient evidence of the three 1989
convictions. The trial court was justified, therefore, in considering a total of five
qualifying convictions in enhancing the sentencing range. It follows that the trial
court’s determination that the appellant should be sentenced as a persistent
offender is supported in the record and should be affirmed.
III. Sentencing Considerations; Findings of Record.
As to the length of sentence, it is immaterial whether the trial court
considered all relevant factors and made requisite findings in the record (or whether
our de novo review is not accompanied with a presumption of correctness of the
trial court’s determination). The appellant cannot -- and does not -- claim to be
prejudiced in any way with the selection of minimum sentences within the applicable
2
A person convicted of a crime is entitled to protection that he may not be
put into jeopardy again for the same offense. State v. Trusty, 919 S.W.2d 305,
309 (Tenn. 1996); State v. Byrd, 820 S.W.2d 739, 741 (Tenn. 1991). A
reviewing court must necessarily have the power to take cognizance of the date
of the offense.
13
range, established to run concurrently. Any possible error committed by the trial
judge with respect to his selection of a specific sentence is harmless. Tenn. R. App.
P. 36(b); Tenn. R. Crim. App. 52(a).
IV. Conclusion.
The conclusion is the judgment of the trial court is affirmed.
_______________________
Curwood Witt, Judge
CONCUR:
________________________
Gary R. Wade, Judge
________________________
Joseph M. Tipton, Judge
14
| 2023-09-18T01:27:13.970301 | https://example.com/article/2435 |
1 - -0.5.
-1530.5
What is -0.06 take away 1717998?
-1717998.06
Add together 0.5 and -8377.8.
-8377.3
Add 8.93 and 2.8.
11.73
Calculate -4.02 - -3.3.
-0.72
Calculate -0.45 + -3063.
-3063.45
Sum -0.04 and -310.
-310.04
Add -15.462 and -1.4.
-16.862
Add -1.6415 and 0.
-1.6415
Subtract -300 from 0.046.
300.046
Total of 1.621 and -15.
-13.379
Work out -582 + 59.78.
-522.22
-0.1+394.9596
394.8596
What is -75248 + 8?
-75240
8425.1 + 0.48
8425.58
What is 25 less than -142?
-167
9 + 1364
1373
Calculate 1 + -1.6857.
-0.6857
Put together 455086 and 5.
455091
Sum 42580 and 0.
42580
What is -23.9081 take away 5?
-28.9081
Subtract 0.03 from -130.
-130.03
What is the difference between -11 and 30789?
30800
-23 - 1.4
-24.4
Calculate 5367 - 0.12.
5366.88
What is 58 minus -24053?
24111
What is 0.1423 - 0.65?
-0.5077
Work out -6.014 - -104.
97.986
Sum 2284 and 192.
2476
Sum 0.17 and -69.
-68.83
Work out 0.19 + -0.5.
-0.31
Calculate -4.3 - -0.049.
-4.251
Total of -2.08183 and -1.
-3.08183
What is -910770 plus -1?
-910771
What is the distance between -10043 and 5?
10048
Put together 1.1537 and -3.
-1.8463
What is 30 less than -1825?
-1855
Sum -3.2 and 21.35.
18.15
What is -0.005 plus -0.035?
-0.04
Subtract -3 from -13453.
-13450
What is the distance between 38 and -282?
320
4.22 - 33
-28.78
What is 0.031 minus 0?
0.031
Calculate -23 + 3210.5.
3187.5
Subtract -301 from 0.08.
301.08
What is -5 + -52117?
-52122
Calculate -5 - 1179.
-1184
Work out 3 + 0.00026.
3.00026
What is the difference between 0 and 3.36?
3.36
Work out 0.03 - -101936.
101936.03
Put together 7724 and 0.1.
7724.1
Work out -456255 + -0.06.
-456255.06
What is 5 less than 226?
221
What is -5 minus -959?
954
What is the difference between -328.7 and -1.4?
327.3
What is the difference between -4428.7 and -29?
4399.7
Total of 87 and 20.
107
What is the difference between -1438 and 7?
1445
Calculate -0.3 + 162.766.
162.466
What is the distance between 0.5 and -959276?
959276.5
What is 0.461 take away 4?
-3.539
Subtract 6 from -2785.
-2791
Calculate 93.23 + -529.
-435.77
Calculate -63.3 - -1410.
1346.7
Put together 3497 and 7.
3504
Put together 18.8 and -120.
-101.2
Sum -0.3 and -2429.
-2429.3
Total of -0.0659369 and -4.
-4.0659369
Calculate -11 - -1938.5.
1927.5
Put together -0.012 and 2446.
2445.988
-4+1944.282
1940.282
Add 380732 and 0.4.
380732.4
Calculate 5 + -619615.
-619610
What is 93 plus -1373?
-1280
Subtract -27 from 3.06.
30.06
What is -20.7 - -1?
-19.7
What is the distance between 4487.24 and 12?
4475.24
Add together 0 and -836.4.
-836.4
1 + -2.983
-1.983
Calculate -4 - -0.34818.
-3.65182
What is 0.28 take away 0.167?
0.113
-1.898 + 36.62
34.722
What is 174 + 0.03?
174.03
What is 0.43 less than -534?
-534.43
Sum 4 and -339.
-335
What is -19.3 - 5?
-24.3
Sum -1 and 73.4.
72.4
What is the distance between -7.57 and -5242?
5234.43
Put together -10.984 and 4.
-6.984
Work out -98.73 + -14.7.
-113.43
Total of -0.07 and 0.4229.
0.3529
Total of 3.31 and -0.123.
3.187
What is 239.75 take away 0.1?
239.65
What is 2 minus 20327?
-20325
Calculate -74 - -13.
-61
Subtract -7 from -8306.
-8299
2.9 + -7.09
-4.19
-0.3+-277
-277.3
77 + -720
-643
Add -0.1 and -479.
-479.1
What is -14 take away -32?
18
0.0909+-0.5
-0.4091
4297 - 9
4288
What is -6014 take away 0.097?
-6014.097
Add together -1 and 299.
298
What is 19.39 take away -0.2?
19.59
Work out -56.8 + -10.2.
-67
What is -11 + -14042?
-14053
Total of -55 and -97.
-152
What is -1943 + -0.1?
-1943.1
Sum -650 and 47.
-603
Total of -499 and 0.028.
-498.972
Add 1.67442 and -10.
-8.32558
-7 - -6.7
-0.3
What is 18 plus -1984?
-1966
Calculate 0.5 + 86.
86.5
Work out 596 - -2964.
3560
What is 0.04 plus 19.2?
19.24
Add 2332.62 and 15.
2347.62
Add together -5 and -37.1.
-42.1
What is -0.18 take away 0.604?
-0.784
What is the difference between -0.2 and -9.09?
8.89
Work out 47 - -171.
218
Subtract 0.94 from 0.1734.
-0.7666
Put together -0.0623481 and -0.4.
-0.4623481
Sum 0.8 and -148.65.
-147.85
Put together -0.016 and 0.3.
0.284
What is 0.37 less than -6329?
-6329.37
Subtract -0.33 from 56.
56.33
What is 0.2921 less than -2?
-2.2921
Total of 4 and 18372.
18376
Work out 0.1 - -235090.
235090.1
What is 386636 + -0.2?
386635.8
Put together -108376 and 8.
-108368
Calculate -0.5 - 4.5.
-5
Put together 273 and -87.63.
185.37
Work out 10.35 + 5331.
5341.35
What is 2.4 + 4.36?
6.76
What is -65564 take away -135?
-65429
-0.1 - 7415
-7415.1
-0.21 + 37099
37098.79
Work out -12054.537 - -3.
-12051.537
What is -0.089 minus -0.15?
0.061
Put together -4 and -37.
-41
What is the difference between -0.032 and -39?
38.968
Calculate 56.6 + -5.47.
51.13
Calculate 0.6 - 0.12199.
0.47801
Put together 0.29 and 0.3.
0.59
Total of -1 and -3304.
-3305
0+-0.8302
-0.8302
What is -1.5 minus 1.1037?
-2.6037
Work out 3.52 + 4.
7.52
Work out -5 + -1205.
-1210
Add together -8753 and -3.
-8756
What is the distance between -36919 and -0.12?
36918.88
Work out 1 + -2938.
-2937
Calculate -100 + 0.068.
-99.932
Calculate 388053 + -4.
388049
Put together -73.7 and 404.
330.3
Calculate 0.0203 + 4184.
4184.0203
What is -0.7 plus 0.67901?
-0.02099
What is -3.244 less than 0.83?
4.074
What is -0.07 - 158289?
-158289.07
Put together 10 and 1.05.
11.05
Add together -237.534 and 4.
-233.534
Add 17.9 and -4875.
-4857.1
What is -240 minus -9?
-231
Put together -10934 and 0.3.
-10933.7
Add -13 and 712.
699
What is -0.4 minus -2190?
2189.6
-12165.4 + 0
-12165.4
What is the distance between -0.03 and 36841?
36841.03
Work out -264849 - -0.1.
-264848.9
Calculate 220.7 - -594.
814.7
Work out -7.13 - -0.0137.
-7.1163
What is -0.4 - -3276?
3275.6
1.17+16096
16097.17
-13 - -5.6
-7.4
What is the distance between 1.1 and 4253?
4251.9
What is 3 + -107337?
-107334
Add together 5 and -436.71.
-431.71
Work out -0.2571 + 7.39.
7.1329
Sum 293 and -102.
191
What is 0.272 minus 102.7?
-102.428
Add together 13890 and 0.14.
13890.14
Calculate -25 - 0.82.
-25.82
What is the distance between 92 and -9.4?
101.4
Sum -11.82 and 4.13.
-7.69
What is -1.0542 less than 15?
16.0542
Subtract -3.5 from 63.
66.5
What is 181.8 + 527?
708.8
-5 - 6.9537
-11.9537
What is -6.96 + 20?
13.04
What is -3 plus -173.9?
-176.9
Sum 3 and 0.34589.
3.34589
Calculate -0.7 - 0.02601.
-0.72601
Calculate 0 - -0.0315.
0.0315
What is 397.7 less than -5?
-402.7
Work out 381752 - -0.6.
381752.6
0 - -5.34
5.34
What is 0.07 take away 3.74?
-3.67
Subtract 0.031 from 1078.
1077.969
Work out -8151.8 - 0.044.
-8151.844
Total of -0.3 and -27.986.
-28.286
-71 - -1.1901
-69.8099
Work out -0.41 + 1.4.
0.99
What is -4 plus 0.1?
-3.9
What is 2.236 minus -0.0665?
2.3025
What is the distance between -7.5 and 116?
123.5
Sum -37658 and 2.
-37656
What is the difference between 42094 and -0.07?
42094.07
1595+0.7
1595.7
Sum -0.3 and -1048.
-1048.3
What is the difference between -3 and -351279?
351276
1+-22.14
-21.14
Sum 0.5 and 5280.9.
5281.4
Work out -5.4 + 6.
0.6
Sum -143061.48 and 1.
-143060.48
Sum 2 and -817.
-815
0.3+442499
442499.3
What is -0.82575 less than 2.2?
3.02575
What is -17 minus -12.5?
-4.5
-0.6 + 8.722
8.122
1.5 - -1822
1823.5
Work out -1247 + 0.61.
-1246.39
Put together 9 and 80903.
80912
Add -66.624 and 2.
-64.624
What is 0.4512 less than -0.13?
-0.5812
Subtract 0.01 from -2.487.
-2.497
Work out -4 + 1.38096.
-2.61904
What is -1966 - 2?
-1968
Add together -2 and -0.0368885.
-2.0368885
What is the distance between 17.482 and 5?
12.482
What is the distance between 15 and 11.6?
3.4
Subtract 10 from 2.841.
-7.159
What is -0.17 - 0.0821?
-0.2521
Sum 33 and -2821.
-2788
Calculate -10.556 - 0.3.
-10.856
Calculate -4 + -39776.
-39780
Work out 0.1 + -0.618.
-0.518
Add -0.2 and 0.03879.
-0.16121
What is -11.7752 minus -0.14?
-11.6352
-0.19 + -2.282
-2.472
Sum 0.19708 and 0.45.
0.64708
Add together 1351 and 37.5.
1388.5
Total of -883.3 and 177.
-706.3
-922 + -34
-956
What is -8.14 - -15?
6.86
What is the difference between -4121 and 35?
4156
What is -0.3 minus 4.1802?
-4.4802
What is -193.48 - 2?
-195.48
Total of 708 and 2.
710
Work out 231 + -5.
226
-0.4 + 0.6099
0.2099
Calculate -0.768 + 34.
33.232
Add together -4438 and -66.
-4504
Work out -8 + 169.
161
1.2+-14.16
-12.96
What is -248 take away 0.0598?
-248.0598
Work out -0.18 - -13.
12.82
What is the difference between 5 and 713 | 2024-06-24T01:27:13.970301 | https://example.com/article/7897 |
Q:
How to use filter option in InvoiceQueryRq
I am fetching the invoice details using InvoiceQueryRq. It fetch all the information from the quickbooks. But i need to fetch the data based on condition. How can i use filter option in InvoiceQueryRq?
A:
Below are a couple of examples from our QuickBooks integration wiki. We have a whole page dedicated to example qbXML requests:
Filtering by TxnID
<?xml version="1.0" encoding="utf-8"?>
<?qbxml version="8.0"?>
<QBXML>
<QBXMLMsgsRq onError="stopOnError">
<InvoiceQueryRq requestID="2">
<TxnID>2484-1263499231</TxnID>
</InvoiceQueryRq>
</QBXMLMsgsRq>
</QBXML>
Filtering by RefNumber
<?xml version="1.0" encoding="utf-8"?>
<?qbxml version="8.0"?>
<QBXML>
<QBXMLMsgsRq onError="stopOnError">
<InvoiceQueryRq requestID="2">
<RefNumber>1234</RefNumber> <!-- put your invoice # here -->
</InvoiceQueryRq>
</QBXMLMsgsRq>
</QBXML>
For more examples you should refer to the QuickBooks OSR. The QuickBooks OSR shows the full query syntax for all qbXML requests you can send to QuickBooks:
https://developer-static.intuit.com/qbSDK-current/Common/newOSR/index.html
| 2023-09-16T01:27:13.970301 | https://example.com/article/4484 |
Progesterone concentration in defatted milk of dairy cows in early pregnancy.
Progesterone concentrations have been measured in defatted milk of British Friesian cows of four herds during the oestrus cycles (other than short cycles) immediately before artificial insemination (AI) at oestrus and immediately after AI (in non-pregnant cows), and during early pregnancy. Differences in mean progesterone concentrations between herds were significant (P less than 0.05) on all days within the day 10-18 period after AI, both in pregnant and in non-pregnant, inseminated cows but were not significant between pregnant and non-pregnant cows within herds until day 17 or 18. It is concluded that up to this time (that of luteolysis in non-pregnant cows) undefined factors, variable among herds, can have a much greater influence on the rate of progesterone secretion by corpora lutea and consequent progesterone concentration in plasma and milk than does the presence of conceptuses. Maximum mean progesterone concentration reached during early pregnancy in two herds did not differ significantly; it was reached in the 11-15-day period in one herd but not until 46-50 days in the second. Mean progesterone concentration declined after day 90. | 2024-07-26T01:27:13.970301 | https://example.com/article/6329 |
Q:
Override default jquery-steps error message
I'm sure I'm just overlooking something simple...but I want to display a text error message next to the invalid input item (such as a text box) in the jQuery-steps form validation. Code base on Jquery-steps, here.
From what I've been reading this should do the trick:
<script>
$(function ()
{
/* function errorPlacement(error, element)
{
element.before(error);
}*/
$("#form").validate({
rules: {
zip: {
required: true,
digits:true,
maxlength:5,
minlength:5
},
messages: {
zip: "entr da zip dode"
}
}
});
$("#wizard").steps({
headerTag: "h3",
bodyTag: "section",
transitionEffect: "slideLeft",
onStepChanging: function (event, currentIndex, newIndex)
{
// Allways allow step back to the previous step even if the current step is not valid!
if (currentIndex > newIndex)
{
return true;
}
$("#form").validate().settings.ignore = ":disabled,:hidden";
return $("#form").valid();
},
onFinishing: function (event, currentIndex)
{
$("#form").validate().settings.ignore = ":disabled";
return $("#form").valid();
},
onFinished: function (event, currentIndex)
{
alert("Thank you! Your request has been sumbitted.");
}
});
});
//PHONE NUMBER MASKING FUNCTION
jQuery(function($){
$("#phone").mask("999-999-9999",{placeholder:" "});
});
But the validation simply ignores this and just adds 'class="error"' to the invalid items, but not appending a label or div (etc) to display the messages.
What did I miss?
A:
Set up your rules and your messages as two separate objects. Try this instead (you can uncomment the min/max messages to see how they work):
$('#form').validate({
rules: {
zip: {
required: true,
digits: true,
minlength: 5,
maxlength: 5
}
},
messages: {
zip: {
//minlength: jQuery.format("Zip must be {0} digits in length"),
//maxlength: jQuery.format("Please use a {0} digit zip code"),
required: "entr da zip dode"
}
}
});
| 2024-05-29T01:27:13.970301 | https://example.com/article/8211 |
Since the founding of game theory by John Von Neumann,
poker has been the subject of mathematical and economics analyses. However,
these studies have used oversimplified versions of poker, making most of
the work done in these areas not applicable to the development of strong
poker-playing programs. In computer science, poker has been used as a testbed in
different areas such as cognitive science, machine learning, search and Bayesian networks. | 2024-06-27T01:27:13.970301 | https://example.com/article/7847 |
#Generated by ResourceBundle Editor (http://eclipse-rbe.sourceforge.net)
Bookmarks.actions.AddBookmark = Aggiungi preferito
Bookmarks.actions.AddBookmark.tt = Aggiungi la vista corrente ai preferiti
Bookmarks.actions.GoToBookmark = Vai al preferito
Bookmarks.actions.GoToBookmark.tt = Sposta la vista alla posizione salvata
Bookmarks.actions.Remove = Elimina
Bookmarks.actions.Remove.tt = Elimina preferito
Bookmarks.actions.Remove.tt2 = Elimina tutti i preferiti del progetto
Bookmarks.actions.RemoveAll = Elimina tutto
Bookmarks.actions.RemoveAll.tt = Elimina i preferiti per la mappa
Bookmarks.actions.RemoveAllBookmarks = Elimina tutti i preferiti
Bookmarks.actions.RemoveAllBookmarks.tt = Elimina tutti i preferiti
Bookmarks.actions.Rename = Rinomina...
Bookmarks.actions.Rename.tt = Rinomina preferito
Bookmarks.category = Preferiti
Bookmarks.view = Preferiti
| 2024-04-18T01:27:13.970301 | https://example.com/article/9865 |
Q:
URL Encode With Curl PHP
I made the change suggested and am still receiving a similar error:
{"error":"invalid_request","error_description":"invalid grant type"}
This error is likely to happen if the url-encoding is not set properly. The updated code is below
Any help would be greatly appreciated!
<?php
$client_id = '...';
$redirect_uri = 'http://website.com/foursquare2.php';
$client_secret = '...';
$code = $_REQUEST['code'];
$ch = curl_init();
curl_setopt($ch, CURLOPT_HTTPHEADER, array('Content-Type: application/x-www-form-urlencoded'));
curl_setopt($ch, CURLOPT_URL, "https://id.shoeboxed.com/oauth/token");
curl_setopt($ch, CURLOPT_POST, TRUE);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, TRUE);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, FALSE);
curl_setopt($ch, CURLOPT_POSTFIELDS, array(
'grant_type' => 'authorization_code',
'code' => $code,
'client_id' => $client_id,
'client_secret' => $client_secret,
'redirect_uri' => $redirect_uri
));
$response = curl_exec($ch);
$err = curl_error($ch);
curl_close($ch);
if ($err) {
echo "cURL Error #:" . $err;
} else {
echo $response;
}
?>
A:
your code is sending the data in multipart/form-data format. when you give CURLOPT_POST an array, curl will automatically encode the data in that array in the multipart/form-data format. then you tell the server, with your header, that this data is in application/x-www-form-urlencoded format, and the server will try to parse it as such, and fail, thus your received error.
first off, get rid of curl_setopt($ch, CURLOPT_HTTPHEADER, array('Content-Type: application/x-www-form-urlencoded')); altogether. if you're using application/x-www-form-urlencoded, php/curl will automatically add that header for you, and unlike you, php/curl won't make any typos (the devs got automated test suits to make sure this stuff is correct before every release), likewise, if you're using multipart/form-data format, php/curl will add that header for you, so don't add those 2 specific headers manually.
if you want to use the multipart/form-data format, just get rid of the header saying otherwise. but if you want to use application/x-www-form-urlencoded format, PHP has a built-in function to encode to this format, called http_build_query, so do
curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query(array(
'grant_type' => 'authorization_code',
'code' => $code,
'client_id' => $client_id,
'client_secret' => $client_secret,
'redirect_uri' => $redirect_uri
)));
(and also get rid of the content-type header, it will be added automatically.)
| 2024-05-22T01:27:13.970301 | https://example.com/article/1392 |
Executive dysfunction following a mild traumatic brain injury revealed in early adolescence with locomotor-cognitive dual-tasks.
To compare gait parameters between children in early adolescence (EA) with and without a mild traumatic brain injury (mTBI) during dual-task walking (DTW). Children in EA with mTBI (n = 14; six girls) were compared to those without (n = 13; five girls) while walking in different combinations of obstacle avoidance and cognitive dual-tasks. Gait speed and fluidity and their related dual-task costs (DTC) were analysed along with foot clearance and proximity to the obstacle. No group effects were found for gait speed, proximity or clearance, but were found for fluidity DTC, specifically during the dual Stroop task and when crossing the deeper obstacle. There were also group differences for fluidity during the planning of obstacle avoidance for the narrow obstacle combined with the verbal fluency task and the deep obstacle with no cognitive task. Finally, gait fluidity showed group differences across unobstructed dual-task situations. Gait fluidity may be a more sensitive variable than gait speed for revealing executive dysfunction following mTBI in EA. Assessing DTW in level walking also seems to show a potential to reveal executive dysfunctions in this age group. These results provide direction for future research on clinical assessment using DTW post-mTBI in adolescents. | 2024-06-16T01:27:13.970301 | https://example.com/article/3635 |
Q:
Why is a comma a bad record separator/delimiter in CSV files?
I was reading this article and I'm curious for the proper answer to this question.
The only thing that comes to my mind it's perhaps that in some countries the decimal separator is a comma, and it may be problems when sharing data in CSV, but I'm not really sure of my answer.
A:
CSV format specification is defined in RFC 4180. This specification was published because
there is no formal specification in existence, which allows for a wide
variety of interpretations of CSV files
Unfortunately, since 2005 (date of publishing the RFC), nothing has changed. We still have a wide variety of implementations. The general approach defined in RFC 4180 is to enclose fields containing characters such as commas in quotation marks, this recommendation however is not always meet by different software.
The problem is that in various European locales comma character serves as the decimal point, so you write 0,005 instead of 0.005. Yet in other cases, commas are used instead of spaces to signal digit groups, e.g. 4,000,000.00 (see here). In both cases using commas would possibly lead to errors in reading data from csv files because your software does not really know if 0,005, 0,1 are two numbers or four different numbers (see example here).
Last but not least, if you store text in your data file, then commas are much more common in text than, for example, semicolons, so if your text is not enclosed in quotation marks, that such data can also be easily read with errors.
Nothing makes commas better, or worse field separators as far as CSV files are used in accordance with recommendations as RFC 4180 that guard from the problems described above. However if there is a risk of using the simplified CSV format that does not enclose fields in quotation marks, or the recommendation could be used inconsistently, then other separators (e.g. semicolon) seem to be safer approach.
A:
Technically comma is as good as any other character to be used as a separator. The name of the format directly refers that values are comma separated (Comma-Separated Values).
The description of CSV format is using comma as an separator.
Any field containing comma should be double-quoted. So that does not cause a problem for reading data in. See the point 6 from the description:
Fields containing line breaks (CRLF), double quotes, and commas
should be enclosed in double-quotes.
For example the functions read.csv and write.csv from R by default are using comma as a separator.
A:
In addition to being a digit separator in numbers, it is also forms part of address (such as customer address etc) in many countries. While some countries have short well-define addresses, many others have, long-winding addresses including, sometimes two commas in the same line. Good CSV files enclose all such data in double quotes. But over-simplistic, poorly written parsers don't provide for reading and differentiating such. (Then, there is the problem of using double quotes as part of the data, such as quote from a poem).
| 2024-01-17T01:27:13.970301 | https://example.com/article/3607 |
Nicolas Cage made a surprise performance to Nicolas Cage fans at…a Nicolas Cage festival.
What is the new Harry Potter statue and where will it be in London?
The John Malkovich moment happened at the C4GED festival at Austin’s Alamo Drafthouse on Sunday, held every year in January in his honour.
The Oscar-winning actor gave a 10-minute reading from Edgar Allen Poe’s The Tell-Tale Heart which he said had a massive influence on his work and his childhood – and believe us when we say it’s everything you’d expect.
Nic Cage crashed a Nic Cage festival and gave fans a surprise reading of Edgar Allen Poe (Picture: YouTube)
‘I used to read when I was a child and it gave me all kinds of nightmares,’ he explained.
‘I think I was trying to make movies on some level to get to the feelings of some of the more manic performances.’
Classic Nic Cage right there folks.
The Nicholas Cage films to screen at C4GED 2017 were: Bangkok Dangerous
Joe
Bringing Out The Dead
Army Of One
Lord Of War (selected by Cage)
The C4GED festival has run for the last four years (Picture: YouTube)
The actor explained Edgar Allen Poe stories gave him nightmares as a kid (Picture: YouTube)
While the C4GED festival has now been running for the last four years, 2017 was the first time the actor crashed the event, which sold out in five minutes.
After sitting through a selection of films from his back catalogue which ran as a 12-hour marathon, the Ghost Rider star also delivered a 47-minute long Q&A session with delighted fans.
And if that that wasn’t enough, Cage also watched over a spontaneous marriage proposal inside the cinema. Awww!
Want more of this lovely stuff? Like Metro Entertainment on Facebook!
MORE: Nicolas Cage fights Motley Crue’s Vince Neil after ‘he assaulted a female fan who asked for an autograph’
MORE: This Nicolas Cage themed birthday party has really raised the bar
MORE: Marilyn Manson is secretly turning into Nicolas Cage and you never noticed | 2023-08-23T01:27:13.970301 | https://example.com/article/5134 |
CLEVELAND | From a spartan 16th floor office they've rented just blocks from this week's preliminary meetings of the Republican National Convention, some of the GOP rebels trying to head off Donald Trump are laying the groundwork for a revolt.
Dumping the party's presumptive presidential nominee is a longshot. They're up against an alliance between the Trump campaign and leaders of the Republican National Committee, which this week includes two dozen campaign operatives combing hotel lobbies and convention corridors counting votes and pressing delegates to oppose the dissidents.
Republicans say the Trump-RNC vote-counting "whip" team will swell to 150 when the Cleveland convention is in full swing next week.
Countering that, the renegade Republicans are setting up a high-tech messaging system to coordinate with organizers on the convention floor and plan to launch ads micro-targeted to the delegates' social media pages. They say they have organizers inside at least 35 state delegations who will help coordinate their drive to let the convention's 2,472 delegates vote for whichever candidate they want.
"There's so much energy to do this," said Dane Waters, co-founder of Delegates Unbound, one group challenging the widely held conventional wisdom that GOP rules require nearly all delegates to back a specific candidate, based on state primaries and caucuses. "Delegates are the authority of the Republican Party. This is about the future of the Republican Party."
Allied with other groups like Free the Delegates, they are facing a GOP establishment determined to prevent a toppling of the presumptive nominee - or any embarrassing, nationally televised showdowns during the four-day convention.
Underscoring that, the GOP rules committee - a bastion of establishment loyalists - on Tuesday formally proposed to renew rules that require delegates to back the candidate they are "bound" to. With no chance of prevailing at that meeting, the dissidents are saving their effort for later this week, when the separate convention rules committee meets to craft a rules package to be considered by the full convention next week.
"I highly doubt it," Republican National Committee Chairman Reince Priebus said in a brief interview of the prospects that the rebels would succeed. "I'm hearing less and less of it, actually. I think the unbind stuff has died off considerably over the last 10 days or so."
Others are more definitive. Randy Evans, a member of the RNC from Georgia, says Trump and party loyalist forces appear to have the convention "under control," with growing numbers of Republicans eager to avoid "the prospect of chaos" if the rules are abruptly changed.
Evans said Trump can apparently count on at least 1,700 devoted delegates - enough to fend off any rule changes. An Associated Press count shows that Trump has 1,543 delegates ready to back his nomination - more than the 1,273 he needs to officially clinch the top slot.
Dump Trump advocates say they have at least 400 delegate supporters but won't provide more detail. Even though Trump won more than 13 million votes and captured around 40 primaries and caucuses, his foes say he's not conservative enough and is likely to lose and drag down GOP congressional candidates with him.
"He's not a Republican, that's the problem," said Bill Eastland, a Trump delegate who like many of the dissidents, preferred Trump's former rival, Texas Sen. Ted Cruz.
Eastland says he supports the movement to allow delegates to back anyone, but concedes it will be "very, very difficult" to prevail. He says he fears blocking Trump "will actually do damage" to the GOP, in part because of how a spurned Trump might react to such a move.
Kendal Unruh, a Colorado delegate for Cruz and a leader of the "Dump Trump" effort, is pushing a proposal to let delegates vote their "conscience" by supporting the candidate of their choosing. She claims at least 28 members of the 112-member convention rules committee will support her - which if true would mean the full convention could vote on her proposal.
If she succeeds, top party and Trump campaign officials say her plan would be defeated.
"I'm sure she'd lose," said Steve Duprey, a Republican national committeeman from New Hampshire who's on both rules committees and is opposing the rebellion.
Unruh, Waters and their allies have other options. There's talk of other amendments proposing things like requiring the presidential candidate to release tax returns, and restricting future Republican primaries to only registered Republicans. Both proposed measures are aimed at Trump, who has not released his returns and won many independent votes in the Republican primaries.
The dissidents say they've enrolled parliamentarians and lawyers to help them demand roll call votes, recounts of how delegates are voting, and other steps that might turn the convention into an embarrassing, televised battle.
But such moves aren't easy. The convention's presiding officer - who at times will be Priebus or House Speaker Paul Ryan - has clout to decide who to recognize on the convention floor to make procedural motions.
In a show of party leaders' determination to keep things in hand, Duprey says, "It'll be a quick debate on the floor. We're not going to spend two hours debating rules."
If they do, said Unruh, "It will be on international TV that they ignored" the rebels and their interpretation of party rules. | 2024-07-11T01:27:13.970301 | https://example.com/article/7868 |
Hurricane Sandy has focused attention on Mitt Romney's comment that we should shrink the Federal Emergency Management Agency and give states more responsibility for dealing with natural disasters. Is he right? Could conservative reforms actually save FEMA -- and save lives? To get a sense of what a thoughtful Republican plan for the agency might look like, I called Matt Mayer, a former Bush administration official in the Department of Homeland Security and visiting fellow at the Heritage Foundation. The interview has been edited for length and clarity.
What did you make of Romney's comments about FEMA?
He didn't artfully state the point I think he was trying to make.
I think his thrust was that there is an appropriate role for states and local governments, and there is an appropriate role for the federal government. And we've kind of lost sight of that in terms of disaster response. We've nationalized so many of the events over the last few decades that the federal government is involved in virtually every disaster that happens. And that's not the way it's supposed to be. It stresses FEMA unnecessarily. And it allows states to shift costs from themselves to other states, while defunding their own emergency management because Uncle Sam is going to pay. That's not good for anyone.
When FEMA's operational tempo is 100-plus disasters a year, it's always having to do stuff. There's not enough time to truly prepare for a catastrophic event. Time is a finite quantity. And when you're spending time and money on 100-plus declarations, or over 200 last year, that taxes the system. It takes away time you could be spending getting ready for the big stuff.
Why do you think Washington has assumed so much responsibility for dealing with disasters?
I think the first real change was when James Lee Witt was put in charge of FEMA during the Clinton administration, and for the first time it wasn't a Washington Bureaucrat or a former military person. For the first time, it was someone who came from the states and spent most of their career in the states. And so he brought a very state-centric position. And it was also the first time a former politician was put in charge of FEMA. He ran for office seven times in Arkansas, and he brought a very political mindset to FEMA. One of his famous quotes was: "Disasters are inherently political events." And I think that created the opportunity to start using FEMA as an entity that could get involved in things in a way that would have political outcomes. And I think you saw that in 1996, when FEMA eclipsed any record it had previously set and issued 158 declarations in an election year. It was just unprecedented. And it's not like there was just some flurry of activity. They just got involved in lots and lots of different disasters.
By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although GovExec.com does not monitor comments posted to this site (and
has no obligation to), it reserves the right to delete, edit, or move any material that it deems
to be in violation of this rule. | 2024-01-23T01:27:13.970301 | https://example.com/article/3455 |
12 years before the COVID-19 pandemic began, scientists warned, in a study published by Clinical Microbiology Reviews in 2007, that the situation in China was a “time bomb” for a dangerous virus outbreak. Their cause for concern was due to the culture of eating exotic mammals in southern China, with the crowded wet markets packed with wild game and lacking biosecurity, and the common presence of SARS-CoV-like viruses in horseshoe bats, in combination with the well-known ability of coronaviruses to undergo genetic recombination.
They said:
Coronaviruses are well known to undergo genetic recombination, which may lead to new genotypes and outbreaks. The presence of a large reservoir of SARS-CoV-like viruses in horseshoe bats, together with the culture of eating exotic mammals in southern China, is a time bomb. The possibility of the reemergence of SARS and other novel viruses from animals or laboratories and therefore the need for preparedness should not be ignored.
Another key quote comes from the introduction:
The small reemergence of SARS in late 2003 after the resumption of the wildlife market in southern China and the recent discovery of a very similar virus in horseshoe bats, bat SARS-CoV, suggested that SARS can return if conditions are fit for the introduction, mutation, amplification, and transmission of this dangerous virus.
The study was called “Severe Acute Respiratory Syndrome Coronavirus as an Agent of Emerging and Reemerging Infection” and it was published in October 2007 by Clinical Microbiology Reviews, a journal by the American Society for Microbiology. You can access the full study here.
Reference: “Severe Acute Respiratory Syndrome Coronavirus as an Agent of Emerging and Reemerging Infection” by Vincent C. C. Cheng, Susanna K. P. Lau, Patrick C. Y. Woo and Kwok Yung Yuen, 12 October 2007, Clinical Microbiology Reviews.
DOI: 10.1128/CMR.00023-07 | 2023-11-17T01:27:13.970301 | https://example.com/article/4910 |
Evaluation of quantitative polymerase chain reaction to assess nosZ gene prevalence in mixed microbial communities.
The usefulness of quantitative polymerase chain reaction (QPCR) to measure nosZ gene prevalence in a multi-template reaction was assessed by comparing 19 nosZ template DNA samples and 91 model communities. Efficiencies of the QPCR varied but were not significantly different among nosZ genotypes and were not linked to genetic distance from Ralstonia eutropha. nosZ genotype QPCR efficiencies obtained from isolated denitrifiers were higher (84.8%) than those obtained from excised denaturing gradient gel electrophoresis bands or clones of PCR products from total community DNA (ca. 60%). Analysis of the model communities indicated that QPCR accurately predicts gene prevalence in communities composed of up to six templates. | 2024-01-06T01:27:13.970301 | https://example.com/article/4360 |
Bladder cancer is one of the most common cancer in the United States with 70,530 estimated cases and 14,680 estimated deaths in 2010. Regardless of the treatment modality, bladder cancer often recurs and metastasizes with very poor prognosis. Understanding the cellular and molecular mechanisms that regulate the biology of bladder cancer progression and invasion would be critical to develop new forms of treatments against this devastating disease. We have established that the growth factor progranulin plays a critical role in bladder cancer by regulating motility and invasion of malignant urothelial cells and demonstrated that progranulin acts as an autocrine growth factor. Moreover we have shown an increased expression of progranulin in invasive bladder tumors vis--vis normal bladder. Collectively, our results support the hypothesis that progranulin may play a critical role as an autocrine growth factor in the establishment and progression of bladder cancer. Despite the strong connections with growth control and cancer, progranulin's mode of action is still poorly characterized. We have discovered that the focal adhesion kinase Pyk2 is activated by progranulin and its expression is increased in bladder cancer tissues. Conversely, knockdown of progranulin inhibits motility and anchorage-independent growth of metastatic bladder cancer cells. This indicates that progranulin may play a key role in the invasive (high motility) phenotype. Using pull-down experiments and proteomics we have identified for the first time drebrin as a membrane protein interacting with progranulin. Drebrin is an actin- binding protein involved in cell adhesion, motility and calcium signaling. Thus, we hypothesize that drebrin might be part of a supramolecular complex involved in progranulin signaling. We will test our hypothesis and accomplish the objectives of this application through the following specific aims: [1] Determine the mechanisms of progranulin action in bladder cancer cells. [2] Investigate the function of drebrin, a novel progranulin interacting protein, in the regulation of motility and invasion of bladder cancer cells. [3] Characterize the in vivo roles of progranulin, Pyk2 and drebrin in bladder cancer formation and progression. The expected results will provide not only novel information toward a better understanding of the mechanisms that regulate tumor cell motility but will also provide invaluable insight into the role of the progranulin signaling pathway in regulating the transition to the invasive phenotype in urothelial neoplasia. Once characterized the role of the progranulin pathway in bladder cancer formation and progression, these studies will greatly contribute to the identification of novel targets for therapeutic intervention in bladder tumors. In addition, progranulin, Pyk2 and drebrin may prove as novel diagnostic and/or prognostic biomarkers for bladder tumors. | 2023-10-21T01:27:13.970301 | https://example.com/article/3981 |
Rating on Thrustmaster TH8A Schaltung für PC, PS3, PS4, Xbox One.
Very good
The building quality is good and it makes you feel confident when gearing up and down. The space between positions is not so big, so sometimes you want to go from 3rd to 2nd and end up in 4th, but I think the more you play the less will happen, since you'll get used to it.
The manufacturer webpage offers some software to update and configure it on Windows, but the webpage and the software itself is not as good as the hardware. | 2023-10-13T01:27:13.970301 | https://example.com/article/7669 |
/*
* Copyright 2014-2016 Media for Mobile
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.m4m.domain;
public interface ISurface {
void awaitNewImage();
void drawImage();
void setPresentationTime(long presentationTimeInNanoSeconds);
void swapBuffers();
void makeCurrent();
ISurfaceWrapper getCleanObject();
void setProjectionMatrix(float[] projectionMatrix);
void setViewport();
void setInputSize(int width, int height);
Resolution getInputSize();
void release();
void updateTexImage();
void awaitAndCopyNewImage();
}
| 2023-12-22T01:27:13.970301 | https://example.com/article/5460 |
If San Diego Comic Con is like the Christmas season for comic book movie news, then New York Comic Con is like your birthday weekend. Earlier today, Iron Fiststar Finn Jones posted a video on Instagram talking about how the show had just wrapped. Then, just moments ago, the trailer for the first season dropped. Of course, you can check that out after the jump. For those of you who aren’t too familiar with Iron Fist, “15 years ago, Danny [Rand] was involved in a plane crash and presumed dead. But when he resurfaces in New York, his friends and enemies discover that not only is he very much alive, he wields the awesome power of the Iron Fist.”
Here is the trailer for the first season of Netflix’s Iron Fist:
One of the big questions fans will most likely have is if Danny will dawn the famous outfit that Iron Fist is known for wearing. As of right now, there is no official news, but it was good to see the symbol on his chest at the end of the clip. Remember, these are modern adaptations of their stories. With that being said, there’s a good chance he won’t be wearing the green and gold. But you should still keep a keen eye out for it somewhere. The creators love to sneak in things like that. For example, there were a lot of questions if Luke Cage would dawn his classic 1970’s outfit with the large metal headband. In a modern telling, the headband has no place, but during the trailer for the show, Luke could be seen wearing something similar to his head and wristbands from the comic as he emerged from the tank he was experimented on; as if it were an homage to the classic look from the comic books. Maybe the same will be done for Danny in Iron Fist.
The show will also star David Wenham as Harold Meachum, Jessica Stroup and Tom Pelphrey as Harold’s children Joy and Ward Meachum, and Jessica Henwick plays Colleen Wing. You can also expect familiar faces like Carrie-Anne Moss to reprise her role as Jeri Hogarth as well as Rosario Dawson as Claire Temple.
Iron Fist is the final member of The Defenders to arrive on the streaming service. That series will begin shooting some time next year and it’s expected that the lead heroes from each of the four shows will take part in it. Iron Fist will debut on Netflix in March 17, 2017. | 2023-11-20T01:27:13.970301 | https://example.com/article/9967 |
3400 Hope Valley Rd
Durham, NC27707
Estimated value provides a reasonable estimate of the property’s market value based on comparable properties and other factors.
It is not an actual appraisal, but it is a good starting point to determine the property’s actual value.
Get more info from:
About Preferred Agents
This agent specializes in this area and can assist you in purchasing a foreclosure property or one best suited to your needs. Buying or selling, they are here to act as your local real estate specialist.
If you are not contacted by the agent within 24 hours, please call 877-888-8722.
3400 Hope Valley Rd is a miscellaneous located in Durham, NC27707. This property features 5,750 sq ft lot.
For the surrounding community of Durham, NC 27707, the nearby schools are average and include Hope Valley Elementary, Sherwood Githens Middle and C E Jordan High. For this area, there are 4 criminal and sex offenders residing within 1 mile. The natural disaster risk for this area includes very low earthquake risk, medium tornado risk, and minimal flood risk.
Property & Loan Info
Ownership Information
The secondary owner (or borrower) is the person who signed the mortgage along with the primary owner. Even though this person is listed as the second on the loan, he/she still bears the same responsibility to ensure payments are made on time. In the event of a foreclosure, this person’s credit will be affected along with the primary owner.
Tax History
Year
Taxes
Land
Improvements
Assessment
2014
$97
(+1.38%)
$7,039
$0
$7,039
2013
$94
(+1.34%)
$7,039
$0
$7,039
2012
$92
$7,039
$0
$7,039
Get more info from:
About Preferred Agents
This agent specializes in this area and can assist you in purchasing a foreclosure property or one best suited to your needs. Buying or selling, they are here to act as your local real estate specialist.
Get your FREE HomeDisclosure Report for
3400 Hope Valley Rd, Durham, NC27707 is a MISCELLANEOUS located in Durham County, North Carolina.
During the month of 07/2017, a total of 7 properties had foreclosure filings in the 27707 zip code surrounding 3400 Hope Valley Rd, with one in every 3,068 housing units receiving a foreclosure filing. In Durham County, where 3400 Hope Valley Rd, Durham, NC27707 is located, there were 47 properties with foreclosure filings documented during the month of 07/2017, a foreclosure rate of one in every 2,592 housing units. In North Carolina, one in every 1,700 housing units had a foreclosure filing in 07/2017, while one in every 1,997 housing units had a foreclosure filing nationwide.
.
The information at this site is provided solely for informational purposes and does not constitute an offer to sell, rent, or advertise real estate outside the state in which the owner of the site is licensed.
The owner is not making any warranties or representations concerning any of these properties including their availability. Information at this site is deemed reliable but not guaranteed and should be independently verified.
Any redistribution or resale is strictly prohibited. All trademarks herein are property of their respective owners.
Please review our Terms of Use policies before using content found on this site in any way.
Properties on this site labeled as Bank-Owned may be owned by the bank or managed by the bank for others. | 2024-06-22T01:27:13.970301 | https://example.com/article/3995 |
Snyder had already completed the majority of filming on the highly anticipated DC superhero tentpole, which is still slated to be released on Nov. 17, but will hand the reins over to Whedon for shooting additional scenes and post-production.
“In my mind, I thought it was a cathartic thing to go back to work, to just bury myself and see if that was the way through it,” Snyder told The Hollywood Reporter in an emotional interview with his wife and “Justice League” producer Deborah Snyder.
“The demands of this job are pretty intense. It is all-consuming. And in the last two months, I’ve come to the realization,” he continued. “I’ve decided to take a step back from the movie to be with my family, be with my kids, who really need me. They are all having a hard time. I’m having a hard time.”
Autumn, the director’s daughter from his first marriage to Denise Snyder, was attending Sarah Lawrence college at the time of her death. According to his wife, Deborah, Autumn loved “to write, to write, to write” and had recently completed a sci-fi novel, which they hope will one day be published.
Snyder, who is also father to seven other children and step-kids, never intended on sharing the news of his daughter’s death, but due to the high-profile nature of his job, he had no choice. | 2023-08-21T01:27:13.970301 | https://example.com/article/9010 |
Related Posts
Search
Search for:
About
Hey foodie!
Welcome to my rowdy corner of the universe. My name is Dana, but most people know me as Rebel Dietitian.
You can learn more about my philosophy or view photos of my grub, by visiting the pages Rebel Lifestyle and Rebel Grub, respectively. Thanks for stopping by my website. Don't forget to eat your greens and make some trouble! | 2024-05-26T01:27:13.970301 | https://example.com/article/4796 |
Q:
Random plot based on a specific random seed
I would like to draw a set of random functions f(x) from point A to point B with a fixed random seed for each function. In other words, I would like to have functions which look the same each time I create the document, depending on their associated random seed.
So far, I have this:
\documentclass[tikz]{standalone}
% Random path from A=(0,0) to B=(1,1) with seed #1 and color #2
\newcommand\randompath[2]{%
\pgfextra{\pgfmathsetseed{#1}}%
\addplot[#2,domain=0:1,samples=5,smooth] { x+rand*(x)*(1-x)};%
}
\begin{document}
\begin{tikzpicture}
\begin{axis}[xmin=0,xmax=1,ymin=0,ymax=1]
\randompath{1}{red} % 1st function
\randompath{1}{blue} % 2nd function
\randompath{1}{green} % 3rd function
\end{axis}
\end{tikzpicture}
\end{document}
However, the three functions are not identical and change their shape on recreation. Therefore, the \pgfmathsetseed does not seem to work as intended?
How can I achieve it that for a chosen seed number, the drawn \randompath function looks alway the same?
A:
Everything that's put in \pgfextra is executed in a separate group at the end of the axis environment (after all the plots have been calculated). Remove the \pgfextra, and you'll get three identical plots.
\documentclass[tikz]{standalone}
\usepackage{pgfplots}
% Random path from A=(0,0) to B=(1,1) with seed #1 and color #2
\newcommand\randompath[2]{%
\pgfmathsetseed{#1}%
\addplot[#2,domain=0:1,samples=5,smooth] { x+rand*(x)*(1-x)};%
}
\begin{document}
\begin{tikzpicture}
\begin{axis}[xmin=0,xmax=1,ymin=0,ymax=1]
\randompath{1}{red, line width=8pt} % 1st function
\randompath{1}{blue, line width=4pt} % 2nd function
\randompath{1}{green, line width=1pt} % 3rd function
\end{axis}
\end{tikzpicture}
\end{document}
| 2024-06-18T01:27:13.970301 | https://example.com/article/4596 |
Is the president empowered to target persons in the United States? No
[W]hy didn't Obama just say, "no, the president cannot deploy drone strikes against US citizens on American soil"? Because the answer is probably "yes." That may not be as apocalyptically sinister as it sounds.
I disagree that the answer is yes and I disagree that it does not sound apocalyptically sinister. Serwer relies on law professor Steven Vladeck:
"Certainly, we routinely 'targeted' U.S. citizens during the Civil War," says Steve Vladeck, a law professor at American University's Washington College of Law. "Even if the targeting was with imprecise 19th-century artillery as opposed to 21st-century [unmanned arial vehicles]." If he had the technology, President Abraham Lincoln would most likely have been within his authority to send a drone to vaporize Confederate General Robert E. Lee.
The inaptness of this comparison seems obvious does it not? Lincoln faced an insurrection on United States soil. President Obama does not. Is there something more to the argument? Serwer writes:
Congress has long held that the president has the authority to use the military domestically in some circumstances. The Posse Comitatus Act, passed after Reconstruction to limit the use of military force on US soil, states that the military can be used to enforce the law "in cases and under circumstances expressly authorized by the Constitution or Act of Congress." The last time this happened was 1992 when, citing the Insurrection Act, President George H.W. Bush called out the National Guard to suppress the Los Angeles riots in the aftermath of the Rodney King verdict.
Whoever, except in cases and under circumstances expressly authorized by the Constitution or Act of Congress, willfully uses any part of the Army or the Air Force as a posse comitatus or otherwise to execute the laws shall be fined under this title or imprisoned not more than two years, or both.
Is there something in the Constitution that expressly authorizes the President to target person in the United States? No. In fact, there is an express prohibition, the Due Process Clause:
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a grand jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation." [Emphasis supplied.]
Serwer writes:
The question is whether the Authorization for Use of Military Force, which Congress passed in the aftermath of the 9/11 attacks, counts as "express authorization" to carry out a targeted killing on US soil.
Section 2 - Authorization For Use of United States Armed Forces
(a) IN GENERAL- That the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.
The argument that Serwer appears to adopt is that this empower the president to "use all necessary and appropriate force against those [...] organizations or persons he determines planned, authorized, committed or aided the terrorist attacks that occurred on September 11, 2001 [...]in order to prevent any future acts of international terrorism against the United States" including such persons and organizations located in the United States.
The problem is the 2001 AUMF does not include the language "in the United Sates." To wit, the Posse Comitatus Act's requirement of "express authorization" is not met. There is no express authorization for military targetting in the United States.
The 2001 AUMF is an abomination. It needs to be repealed. But it does not do what Serwer argues it does.
The Obama Administration can and should confidently state that it is not empowered to target persons in the United States. Because it is not.
Oh by the way, absent insurrection or rebellion, I do not believe the Congress is authorized by the Constitution ("To provide for calling forth the Militia to execute the Laws of the Union, suppress Insurrections and repel Invasions") to empower the president to target persons in the United States.
presidential powers G.W. Bush's legal eagles came up with to provide "legal justification" for the military to combat terrorist activities inside the United States.
"The law has recognized that force (including deadly force) may be legitimately used in self-defense," Mr. Yoo and Mr. Delahunty wrote to Mr. Gonzales. Therefore any objections based on the Fourth Amendment's ban on unreasonable searches are swept away, they said, since any possible privacy offense resulting from such a search is a lesser matter than any injury from deadly force.
...
Mr. Yoo and Mr. Delahunty said that in addition, the Posse Comitatus Act, which generally bars the military from domestic law enforcement operations, would pose no obstacle to the use of troops in a domestic fight against terrorism suspects. They reasoned that the troops would be acting in a national security function, not as law enforcers. link
Less than a week before President George W. Bush left office, the Justice Department withdrew the series of memos that contained these opinions argueing that these theories should no longer "be treated as authoritative for any purpose.".
The question is whether the Obama administration has envisioned similar authority for itself. The answer to that question lies in the classified documents explaining the Obama administration's legal rationale for the targeted killing program--documents that the Obama administration has so far refused to fully disclose to Congress, let alone release to the public. link
Personally, I would like a definite "Yes" or "No" answer from the President on this subject.
a "No" that carries with it an underlying subliminal (or not-so-subliminal) message of "...unless we really, really feel like we have to to do it to 'keep the nation safe,' and then we will have our collection of legal yes-men write up the appropriate permission, so - not to worry - it'll all be legal and good."
Sad to note that this is where my level of cynicism and doubt is these days, isn't it?
some relevant material about the domestic use of drones. I think there are additional issues here, besides the illegality of using drones to target persons in the US for killing. According to the ACLU and also Jim Hightower, we are fast approaching a crisis in the droning of America, whether armed or not.
Unmanned Aerial Vehicles - UAV's or "drones" as they are called - are on the way. Just this week the Los Angeles Times reported that Customs and Border Patrol agency has been lending their Predator drones to law enforcement agencies for domestic operations. And their use is only going to spread.
The question is, will drones become pervasive spying tools that change the nature of American life? Will we be able to walk out of our front door without wondering at all times whether some eye in the sky might be watching every move we make?
Today we're releasing a report on drones, "Protecting Privacy From Aerial Surveillance: Recommendations for Government Use of Drone Aircraft." In the report, we discuss the current drone landscape (technology and use), talk about the privacy issues, and conclude with recommendations for protections we believe must be put in place to ensure they don't destroy our privacy.
and, lo and behold, the angry citizens packed city hall, and pretty much every single person who spoke at public comment session told the mayor, the city council and SPD to go f*ck themselves. Mayor McGinn then announced that the city would NOT be using the drones (this fool is running for re-election in November). So, a victory for the citizens. However, there is more trouble brewing: Seattle got $5 million in DHS grant money and went ahead and installed surveillance cameras all over the waterfronts at Alki Beach and Golden Gardens beach. The public is waaayyyy up in arms over this, but McGinn only says the city "won't turn the cameras 'on' until the citizens have had a chance to participate in the public comment period." I can tell you right now, this kind of blanket surveillance of Seattle citizens enjoying the waterfront is NOT going to go down well. And, hopefully, it will be the nail in the coffin of McGinn's re-election.
I don't want to hijack the thread with any of this, because it's not the drone issue BTD's posted about, but since you brought it up...maybe we can discuss on an open thread soon.
but not as much as Attorney General Holder. At a Northwestern University Law School speech (March 2012) Holder "clarified" the part of the Constitution (..be deprived of life, liberty...without due process of law) by saying that "due process and judicial process are not one and the same, particularly when it comes to national security."
Executive Branch reviews of targeted killings count as "due process". Holder claims the due process clause does not impose one-size fits all requirements but mandates procedural safeguards under specific situations. So, it is all flexible subject to making it up and make-believe.
The American public increasingly relies on the Internet for socializing, business transactions, gathering information, entertainment, and creating and sharing content. The rapid growth of the Internet has brought opportunities but also risks, and the Federal Government is committed to empowering members of the public to protect themselves against the full range of online threats, including online radicalization to violence.
Violent extremist groups ─ like al-Qa'ida and its affiliates and adherents, violent supremacist groups, and violent "sovereign citizens" ─ are leveraging online tools and resources to propagate messages of violence and division. These groups use the Internet to disseminate propaganda, identify and groom potential recruits, and supplement their real-world recruitment efforts. Some members and supporters of these groups visit mainstream fora to see whether individuals might be recruited or encouraged to commit acts of violence, look for opportunities to draw targets into private exchanges, and exploit popular media like music videos and online video games. Although the Internet offers countless opportunities for Americans to connect, it has also provided violent extremists with access to new audiences and instruments for radicalization.
Now, I can't be the only one who reads this - and the rest of the WH post - and thinks this is less about the al Qaeda-type radicalization and more about cutting the Occupy-type movement off at the knees, can I?
I agree. Smart man.
I have also always thought that this country was extremely lucky to have such an extraordinary collection of Founding Fathers. I often wonder what they would have thought about some of the things that are going on today.
that whenever the government is instituting something Constitutionally questionable that the Al-Qaeda! flag is frantically waved? Haven't there always been militant leadership of one sort or another? This strikes me as valid:
Marc Sageman, a psychiatrist and former Central Intelligence Agency (CIA) officer, said that al-Qaeda is now just a "loose label for a movement that seems to target the West". "There is no umbrella organisation. We like to create a mythical entity called [al-Qaeda] in our minds, but that is not the reality we are dealing with."
Own drones to attack his own people? Because that is essentially the boat he would have to be in. We have CIA agents doing time for whistle blowing torturers. Do you really think the President is going to find a large swathe of people who will just line up to kill other Americans for him whenever he snaps his fingers?
So he is persecuting people for revealing law breaking via torture. So these people in the CIA are going to do what to prevent him from killing Americans with drones? Leak to the press. Go to the head of CIA who has probably authorized all of this killing of Americans to begin with.
The reason they are persecuting the whistle blowers is so they can get away with the unthinkable.
Read Sibel Edmunds book. It is chilling how they persecuted her at every turn for doing the job she was sworn and hired to do. They did not want to know about law breaking or spying that would jeopardize the security of our country. Check out her blog, some explosive stuff there.
If the govt always shoots the messenger who is going to want to be the messenger when they have asserted the right to kill you for being the messenger.
are Constitutional limits and ethics. Not an overseer. Well, unless that's how you want to describe the co-equal branches of government. If there were a "someone" who could stop him more readily than the citizens of the nation it would be that being who had the power and not the President. And such a being is not mentioned in the Constitution.
There are many reasons why prosecutors don't prosecute people accused of crimes. The fact that some winger organization embarrassed by Gleik accuses him of committing a crime does not make it a crime, nor does it make it prosecutable.
...is one thing, but if, and note that I'm speaking hypothetically, if Constitutional limits and ethics were not enough to stop him, in other words if he were Nixon, then what would stop him would be a refusal to carry out those orders by those who would actually have to do it for it to get done.
So if those who could obey illegal orders are not willing to say "no", and are willing to carry out those orders, then, regardless of whether he uses the power or not, he does have it, even if he doesn't have it on paper.
is people will not be told that they would be obeying illegal orders. They would be told that it has been determined that the action was legal because it was necessary for the defense of the country. As in the Iraq war, non believers can be fired and replaced with people who will sell the legality and ensure that the orders are carried out. People who oppose the action will be accused of not wanting to "protect the nation" from terrorist bound to destroy them.
As many Constitutional lawyers were advising Obama in the media that the issue of investigating the Bush Administration for the well-documented allegations of illegally embroiling America in a War of choice was a Constitutional obligation, a duty, not a personal "choice," he flicked it off with the pithy response, "we're looking forward, not backward."
that Tracy keeps making, that there are all these lawyers involved and looking at it; I think she may be trying to show that the president hasn't made these decisions all by himself, but hasn't the recent example of the Bush OLC and John Yoo and his pals taught us anything?
In the end, it's his policy, and he's surrounded himself with people who provide the support for it.
Those giving the orders are doing so because someone determined that the actions were legal; that doesn't mean that someone to whom an order is given is not obligated to refuse if he or she believes the actions are, in fact, illegal.
I just don't know if there are many who will have the courage to stand up, and if they do, whether it will matter given how many others there are who won't object.
Charles Morgan III, a professor of psychiatry to help combine interrogation and racial profiling into an Ivy League program.
Morgan's research and, by extension, this proposed center target people of color -- brown people exclusively. According to a Yale Herald article, Morgan listed "Moroccans, Columbians, Nepalese, Ecuadorians and others." Is there an assumption in Morgan's desire to use more `authentic,' brown interviewees as test subjects,
The impression I get from the Obama administration is that it will do what it wants to whomever it wants wherever it wants. Then, things can be investigated down the road if anyone is interested.
I had the same impression with the Bush administration.
While it is true that,
"Lincoln faced an insurrection on United States soil. President Obama does not."
It is my opinion that these days an "insurrection" is in the eye of the beholder. And if the beholder is the Obama administration and the Congress as presently constituted, anything goes - as it went for his unsavory predecessor.
Anyone on soil that has a system of due process. And to do such a thing would be counter productive. We wouldn't drone strike a terrorist in France or Germany either because there is an existing framework of law enforcement that is empowered to deal with such danger and that we would easily work with and negotiate with. They are in fact in the same boat we are where extremist terrorists are concerned, and we already work together to protect our nations and our people from those elements.
American Exceptionalism again, that the world runs on your rules. Yemen did find Awlaki guilty though, and they have a right to their own court system right....or are you into dictating to them what their justice system should be?
There are lots of known criminals for whom there is insufficient evidence for a conviction. And many for whom the evidence is staggering but the location of the perpetrator is unknown. How is that new?
In absentia. Yes. This sounds like a good avenue to pursue with regard to this arbitrary killing from afar.
Prove it in a court. Then go find them or give them a chance to turn themselves in and defend themselves.
Seems like targeted killings is a good way to get rid of former CIA assets you no longer have any use for because they might air your dirty laundry when you bring them to an open court. They might just say how they worked closely with the CIA and did its bidding. That would look very bad for USA and CIA.
To insist that your brand of justice is some form of superior global justice and everyone I guess from Yemen and Pakistan on down is in violation is just another form of your own American Exceptionalism. To insist that your President not protect your own nation because you believe that if he did something different, that none of you have been able to exactly specify, world peace and the security of the nation would immediately ensue.....is just another form of grandiose American Exceptionalism too. As if every little thing you do dictates whether someone is homicidal, or becomes a terrorist or a heinous human butcher. You are not God, neither is your nation.
If only it were true, how simple life would be.
Fact, the President's first order of business from dawn to dusk is the protection of his/her people, his/her nation.
Christof Heyns, the UN special rapporteur on extrajudicial killings, summary or arbitrary executions, told a conference in Geneva that President Obama's attacks in Pakistan, Yemen and elsewhere, carried out by the CIA, would encourage other states to flout long-established human rights standards.
In his strongest critique so far of drone strikes, Heyns suggested some may even constitute "war crimes". His comments come amid rising international unease over the surge in killings by remotely piloted unmanned aerial vehicles (UAVs).
And your justification that we have a relationship based on working with Pakistan on drone strikes isn't accepted quite so easily by everyone in the Pakistani government:
Also present was Pakistan's ambassador to the UN in Geneva, Zamir Akram, who called for international legal action to halt the "totally counterproductive attacks" by the US in his country.
Is not observed by all nations, and it isn't even enforceable by the nations that terrorist networks hide in. I'm not certain that our drone program violates International Law either as a whole. Mostly because I know how many lawyers are involved in all of this simply on the military's side of this, not even including any of the other lawyers employed in arguing and writing the legalese that dictates what we can and cannot legally do. Of course you have managed to find something that you feel applies.
about the legalities of our drone use than you do. And why is that? Because I actually care about the safety of my nation as well as its ethics and the dilemmas that it faces. Dealing with terrorist threats is a dilemma too and just chanting about how much Obama sucks does nothing to address any of it. But hey, you are cool, much cooler than the President is with none of his responsibilities.
I care to know what all the arguments are though and realities, and more than one attorney is heard from in all areas of this administrations decisions. But hey, find one who says what you want them to say and cling to that and chant it over and over and over again.
Who really cares what anybody says here anymore though. It is nothing more than an echo chamber of Obama's suckiness whatever day of the week it is.
legalities because you "actually" care? Meaning what? That our care is fake somehow? That we haven't followed the arguments, that we haven't explored the information?
Jesus, that is some pretentious BS you're shoveling.
Your only legal argument seems to be "more than one attorney is heard from in all areas of this administrations decisions." Wow, how are we not just blinded by the legal brilliance in that statement?
And you must be talking to yourself when you say, "find one who says what you want them to say and cling to that and chant it over and over and over again" because you've convinced yourself that Obama's legal advisors are somehow different from Bush's, because why?
Tracy, your arguments are turning into schoolyard chants; it's kind of embarrassing, really. If that's the best you can do, impugning the opinions of others with puerile insults, maybe you really do need to take a break.
U.S. justice--of the extra-judicial sort--and that of countries in Europe that have judicial systems comparative to ours, ie., if a country doesn't have a similar judicial system, then they are ripe targets for whatever we feel is necessary? What constitutes a war crime, anyway?
tells me that you really don't understand why people are taking issue with the extra-judicial way in which our government is dealing with alleged threats. You still think this is about Obama, when, in fact, it is about the policy.
And I don't understand why you take so much comfort in the presence of so many lawyers; can you really have forgotten how Bush's OLC rubber-stamped what he wanted to do? Or, were you okay with that, too?
Or are you one of those who weren't okay with Bush's actions, but you just feel so much more comfortable with Obama at the wheel doing the same and worse?
I'm really sorry you find us all so tiresome; funny, but I've been finding your constant excuses and strawmen and the ever-so-juvenile why-don't-you-run-for-president challenges to be beyond tiresome. They are not worthy of rational argument.
No one's stopping you from supporting this president; I just hope that when he's no longer in charge and some insane Republican is, that you won't regret ceding so much ground and so many rights just because the people selling them were Democrats.
If Obama believes that the president cannot deploy drone strikes against US citizens on American soil, he could have just answered with a simple "No" and we would not be having this conversation at all. Yet, both Obama and Brennan refused to give a simple "No" answer.
I, as well as others, do question why "Why didn't Obama just say, "no, the president cannot deploy drone strikes against US citizens on American soil"? and will let you personalize his actions.
As in, we know all too well that we could do a whole lot worse (as proven between Jan, 2001, and Jan, 2009), but were hoping for something even better than what we got, and had been led to believe we would be getting.
But am I mistaken in thinking the Constitution is referring to rights belonging to American citizens?
MT seemed to me to be saying that those rights do not hold if the citizen is in some other country that does not respect due process - and therefore the US government is not bound to respect those rights - and may in fact order them killed without any regard for the right of due process.
applies to all "persons" not just citizens according to the ACLU. I love the ACLU.
Among the most important sources of legal protection against governmental discrimination or abuse are the Fifth and Fourteenth Amendments to the Constitution. They provide that no person shall be deprived of life, liberty or property without due process of law and that no person shall be deprived of the equal protection of the laws. Thus, the right to due process, equal protection and the other fundamental rights that are encompassed by these principles apply to all persons in the United States, including non-citizens.
The Supreme Court has held that state or local laws that discriminate on the basis of "alienage" - like those that discriminate against non-citizens on the basis of race, national origin or gender - are subject to "strict scrutiny" under the equal protection guarantee. The Supreme Court, therefore, has struck down state laws that discriminate against legal resident aliens in the provision of benefits (welfare, scholarships, tuition grants, student loans) and in eligibility for jobs (civil service positions, lawyer, notary publics). In declaring these state prohibitions unconstitutional, the Court stressed that immigrants "have contribute on an equal basis with residents of the State."
However, the Court has permitted states to discriminate against resident aliens in certain respects, such as voting, elected office, policy-making positions in government, and certain jobs such as police officer or school teacher, under a "political function" exception. More significantly, the Supreme Court has held that the federal government, because of its exclusive responsibility for supervising immigration, has broad powers to discriminate on the basis of alienage, including in federal benefits programs
In actuality, the Constitution doesn't apply to "citizens," nor does it even apply to "people." It applies to the government. It tells the government what it can and can't do (the body tells the government what it can do, and the Bill of Rights tells it what it can't do).
On the subject of the use of targeted killing of US citizens on US or any other soil: Judging from what I read from the ACLU, the president is forbidden from denying due process to any person who is in this country.
But it seems, from Obama's answer, that he is being non-committal to as to whether he is bound by the due process clause.
I can see that the Constitution protects all persons in the US.
But how can it protect citizens of other countries while they are in other countries if it not on the basis of American citizenship?
MT's point seemed to me to be that a US citizen loses the right to due process when they are in a country that denies due process. My assumption was that they are entitled to due process from the American government based on their citizenship of the US - and therefore not subject to the arbitrary killing being practiced by the administration.
Does the constitution prohibit the denial of due process by the government to everyone, everywhere?
I can see that the Constitution protects all persons in the US.
But how can it protect citizens of other countries while they are in other countries if it not on the basis of American citizenship?
...that the Constitution governs the actions of the US government, period. If a citizen is in a country that denies due process, they are subject to the laws of that country, that's pretty clear. That's why the US government has sometimes intervened in individual cases, right?
I'm no Constitutional scholar, but I was taught that the Constitution is the center and the core of the US government. So based on that, I have always believed this to be true:
Does the constitution prohibit the denial of due process by the [US] government to everyone, everywhere?
It doesn't appear that the current leadership, of either party, agrees with me.
Law School speech (March 2012) that "due process and judicial process are not one and the same, particularly when it comes to national security." This statement seems to indicate that the administration believes that its current executive branch determination of quilt is all the "due process" needed for them to "sentence" an American citizen or any other person to death.
Bush's lawyers have already put forth the opinion that the Posse Comitatus Act does not apply as long as the executive branch declares that the military is acting in a national security function, not as law enforcers.link
So while I firmly believe that the Constitution and International law prohibits their actions, they believe that they can create loopholes to get around any and all safeguards. Doesn't seem like there is any sufficient effort (Congress, Judicial or citizen outrage) to prevent this and future presidents from doing whatever they want in the name of national security.
If a citizen is in a country that denies due process, they are subject to the laws of that country, that's pretty clear.
But, here we are talking about the actions of the US government.
Tracy's contention was that if an American is in a country that does not recognize due process, the American government is free to incinerate them and leave due process behind.
been about, with most of us believing that if the Constitution is a check on the power of government, and controls what it can and cannot do vis-a-vis "persons," then those controls should not be able to be discarded at the border.
If I'm in East Bumflipistan, and I commit a crime against the laws of that country, I am subject to the laws of that country, no question. But if I'm in East Bumflipistan and the American government wants to take some kind of action against me for crimes it thinks I have committed against the US, I think the US needs to act in line with the Constitution and US law.
This is why the drone program has been such an issue - because we don't have the information to determine if the program is being conducted legally. And it's why it makes no sense to have a Drone Court - as has been suggested - because that still doesn't get to the issue of whether it's even legal to do what we're doing.
It still boggles my mind that every Tom, Dick and Jane in Congress can stand before the public and acknowledge there's a drone program, but when the matter lands in a court of law, the government takes the position that whether we do or we don't is a matter of national security and so must remain secret.
What kind of country are we, and what kind of country do we want to be? How long can we maintain the illusion that we are about democracy and freedom when our actions in so many areas are anything but? The moment the powers that be decided that our national security trumped every guiding principle of this country is the day we started making it easier to start applying that approach to many other areas of our lives.
I can't tell you how sick and sad I am at the kinds of things that are now done in our name.
Letting Bush and Cheney off the hook for their crimes against the constitution and the people of the country is Obama's insurance policy.
He is insuring that he can do what he likes, eviscerate the constitution as he pleases, lie at will, kill whomever he wants, imprison whomever he likes and deny due process whenever he wishes without suffering any consequences whatsoever now or in the future.
of the "legality" of these issues is that Patriot Program trumps everything else.......U.S. laws, Due Process, and even the Constitution. It is Obama's 007 Card, His License to Kill.
Once we authorized a single person, The President, the right to seize anyone he wants to, on his own authority, hold him/her indefinitely, without pressing charges, and deny him/her council (or visits of any type, or with any one) and even grant him the authority to deny he's seized any one, well................what's left to be said?
I have only one question: Could someone please tell me what the difference is between a President of the United States and a dictator? That's not hyperbole. Lock up anyone he wants? Check. Torture anyone he wants? Check. Kill anyone he wants? Check.
Ben Emmerson, the United Nations special rapporteur for human rights and counterterrorism, tells Danger Room he's giving his qualified backing to John Brennan, President Obama's top counterterrorism adviser and nominee to become CIA director.
to say the least. The previous person in Emmerson's position did not think the drones were legal under int'l law. In any case, the UN never really takes the U.S. to task for anything, no matter how egregious the action. Toothless.
We have no real leaders. NONE. And The country that respected laws, lived by them (well, sort of and mostly), is over and dead and likely never coming back. This is a nation in which the powers-that-be would be glad to cull half the population. This is a nation that allows companies to lie and cheat and steal with impunity every day, to destroy Americans lives right here, why on earth would killing them here be any different? This is a nation that doesn't think it's citizens deserve jobs because of basic human dignity. This is a nation that, OBVIOUSLY, places the value of money FAR above the value of human life. We could only be in the place we are by doing so. There is no other route to our current wretched state than by placing things and money above people. A corporate kleptocracy happy having to have its entire life stolen.
The government and others kill Americans and ruin their lives daily, along with others around the world, and they care about one thing: their tiny d*cks and their fat wallets. And the companies that make these drones are lobbying hard to have them everywhere all the time.
Hey, I would love believe he government feels restrained by laws. But my eyes tell me differently.
that the Bush admin secretly recorded cell phone conversations of elected Democrats after 9/11 in order to get dirt for leverage to pass the inappropriately named Patriot Act. Remember, the recording was going on for a while before anyone knew it was happening. It just seems that far too many Democrats fell into line with Bush on the Patriot Act and going to war in Iraq. Even if they didn't have evidence of a congress person's criminal or unethical actions, just recording them insulting their spouse or other members of Congress or talking about how hot their new congressional intern is would embarrass them enough to ruin their chances at reelection. How hard would it be to get members of Congress to have inappropriate phone conversations before anyone knew the government was recording cell phone calls? The fact that conversations were recorded and the public has never had access to those calls, but the government does, is what degrades our democratic representation.
Drones might be the next big thing to undermine our democracy. Sure, they'll catch more criminals, maybe even get a terrorist or two. But more likely the spying will used against Occupy protesters, environmentalists and other concerned citizens working to help our country and the world fight destructive capitalism. And of course, it's always handy to have tracking records of your electoral opponent, including video of everyone they've been with 24x7.
The government is already creating massive databases of vehicle movements, tracking every legally registered car that drives along our roads. Drone spying on Americans will just be one more invasion of privacy that the the public, especially the left, will accept from the guy we voted for.
The implication being that D's would not have supported Bush's BS for any other reason than extortion. I assume this includes the vote to go to war with Iraq as well.
Sure, keep believing that, doesn't really explain why they keep voting to extend the Patriot Act. Or why they support the exact same BS, plus some, now that Obama is behind the wheel.
As much as the media and the parties want you to believe they are polar opposites, they are one in the same for about 95% of the things they are responsible for and the products they have produced in the last 12 years reflect that.
But imagine how effective Sky Spying drones would be. They could get some embarrassing or compromising pictures of movie stars and other public figures and then use extortion to keep them from making public statements about protecting the environment. Or catch elected officials picking up prostitutes. Or picking their nose. You name it, these spy eyes drones can find it.
Maybe we can simply reverse our strategy and claim we need this spying on Americans for the public good, but the government doesn't get to keep them private. Every single video will be available for public viewing. Voila, no risk of extortion.
...does anyone think for a minute that they can't find a couple lawyers to interpret the Constitution to satisfy their slavemasters needs. If this past 12 years has taught me one thing, its that the office of the POTUS is bulletproof and the Constitution is nothing more than some abstract unpleasantry that lawyers will happily game, if called to do so.
Who's going to call them on it, not sure why they even bother with the layer bit, no one is going to hold them accountable if they claim 'National Defense'. The system is so gamed at this point, a conviction, if anyone actually had those kinds of balls, would be impossible. Secret courts with secret judges, secret evidence, and who knows what other kinds of un-Constitutional non-sense, ensure no one will ever be accountable. I would be shocked if the US Government has not sanctioned assassinations of US Citizens on American soil.
So all the lawyers and legal professors in the world can hash this out, but it won't make one damn bit of difference until we elect people who take the Constitution seriously, even for the folks in their own party. I can't think of any Amendment in the Bill of Rights that hasn't been bent, and at times broken.
And lastly, does anyone else find it mind boggling that the president has more power outside the jurisdiction in which he was elected to rule. How does that not break International law ?
Imagine Kim Jong-un or Ahmadinejad claiming they had the power to kill their own citizens so long as it wasn't in their respective countries, which includes the US. It's absurd, especially if you believe they don't have that power w/i the boundaries they rule.
This is the kind of BS perpetual wars allow, and Grade A fuel for terrorists.
what's the difference between the DHS, FBI, DEA, and the military? The line between the police and the military seems quite thin these days. If the president has the DHS drone strike a "terrorist" or drug dealer he can then claim it's not a violation of the Posse Comitatus Act.
could easily be breached is nothing short of self breeding your own delirium. I know people like to hate on the President and the current administration but to think they would ever believe that the existing reality empowers them to kill people and crap on due process is too much hysteria for me. To get yourself knee jerk believing such things you must want to believe them first.
We have used drones in failed states and in areas that the sovereign powers are unable to provide a system of due process and are unable to even secure. And terrorist networks seek out those exact places to inhabit for those reasons.
seems obvious to me that the current administration believes fully and without hesitation that it has the right to kill people and crap on due process.
How else would you describe the premeditated killing of Anwar al-Awlaki, an American citizen who was placed on a CIA "kill list" last year and died in a targeted strike in Yemen.
How else would you describe the killing of Al-Awlaki's teenage son, Abdulrahman, also an American citizen, who was killed in a separate strike in which six others died two weeks later while they were eating dinner by a roadside.
The ACLU is bringing suit on behalf of the families of these American citizens who were killed on the grounds that as citizens of the US, they were entitled to due process. I don't consider the ACLU a hysterical group.
And who do you really think "likes to hate" Obama?
What a waste of time and emotional energy.
But I do think some of his actions are contemptible and are a foul continuation of the rotten legacy of the Bush administration.
Although I don't think it's the drones themselves that are the real issue here, as there are any number of ways of killing that will leave the target just as dead.
It's about the circumstances under which the government of the U.S. can make who dead where, and the answer is pretty important because it bears directly on the question not only of the rights of U.S. citizens vis-à-vis their own government, but the question of under what circumstances can other governments make who dead where as well.
Next you'll be telling us that because there is an "International Court of Justice" or some such thing that tries war criminals that international law means that Obama has no right to authorize drone strikes abroad absent a declaration of war.
The DOJ memo does more than claim to justify murder. It explicitly contemplates that the procedures described are being carried out. This is the exact equivalent of a Mob Lawyer advising his client how to commit murder and avoid being prosecuted for it. All of the DOJ lawyers who participated in the creation of this memo became guilty of Conspiracy to Commit Murder in the First Degree the moment any agent of the United States committed the first overt act in furtherance of the conspiracy. Since President Obama and others have publicly admitted to killings that qualify as "overt acts in furtherance of the conspiracy", all of the DOJ lawyers are already guilty.
The Geneva conventions define the Law of War to only apply on the actual Field of Battle. Every where else the ordinary civilian laws and police powers apply.
The AUMF authorized the use of force only against the Taliban and the original Al-Qa'ida.
The Field of Battle was defined in the AUMF as only extending to Afghanistan and other places where the Taliban and the original Al-Qa'ida are located.
The Taliban and Al-Qa'ida only are to be found in Afghanistan and the mountains on the border between Afghanistan and Pakistan.
In order to qualify under the laws of war as a "co-belligerent" a group would have to have signed a treaty with the Taliban or the original Al-Qa'ida or to have made public statements joining or giving allegiance to the Taliban or the original Al-Qa'ida. The only group that did so was Al-Qa'ida in Iraq and even they only did so several years after the war in Iraq started.
All other Islamic armed groups in any other nation are not included. They may be terrorists and they may hate the US, but they are not co-belligerents with the Taliban or the original Al-Qa'ida.
Anyone who is not a co-belligerent and is not actually attacking the US is not [Legally] part of the state of war authorized by the AUMF. Any use of force against such person is subject to normal civilian law and not the Law of War.
The use of "Imminent Threat" in the DOJ memo is contrary to how "Imminent Threat" is defined in both US Law and the Geneva Conventions. For someone to be an Imminent Threat to the US there must be close proximity in both time and location between the threatening person, an act of violence expected to be committed by that person and the US or US forces [who must also have a right to be where they are].
The US only gains any rights to use force against a person claimed to be an Imminent Threat when the person is "Within Reach" of US forces. Nobody in Somalia, Yemen, or in some village in western Pakistan is "Within Reach" of US forces, so they cannot be an Imminent Threat. Also, a person can never be an Imminent Threat to a Predator Drone.
Speech can never be an Imminent Threat, only acts of violence count as an Imminent Threat.
The Geneva Conventions only allow a "kill without any attempt to capture" mission on an actual battle field, everywhere else such a mission is illegal. Civilian Law forbids such missions entirely.
Signature strikes against unknown persons not on the field of battle and without any particularized threat are always illegal under the Geneva Conventions and are Murder under US law.
Double Tap strikes on rescue workers are specifically prohibited by the Geneva Conventions.
Strikes on Funerals and other places where civillians are likely to be are also specifically prohibited by the Geneva Conventions.
The Geneva Conventions were signed by President Dwight D. Eisenhower and ratified by the Senate in 1955. Since then they are US Law in accordance with Article Six of the US Constitution: "all Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land".
As a consequence, all of the Drone strikes in Yemen, Somalia and western Pakistan are subject to civilian law and under civilian law they are acts of Premeditated Murder in the First Degree. Everyone who participates in, plans, orders or writes legal memos justifying such acts are guilty of Murder, Conspiracy to Commit Murder or Accessory to Murder.
What it boils down to is this: no lawyer in the DOJ or the Office of Legal Counsel can write a memo that makes legal something that is patently illegal. Anyone who acts on such a memo is not acting in good faith and has no immunity against prosecution. Kidnapping, Rendition, Rape, Torture and Murder are illegal everywhere in the world and no memo or executive order can make them legal.
All of these crimes have either no statute of limitations or a very long term. That means that some DOJ or President 10, 15 or 20 years from now can prosecute everyone who participated in these crimes. Members of the Bush-Cheney administration have already been convicted in-absentia for War Crimes and Crimes Against Humanity and now they cannot safely travel outside of the US. The same concequence will soon happen to the Obama administration.
Our only hope is that some future President will actually believe in the US Constitution and the Rule of Law and will bring these Murderers and Torturers to justice. | 2024-07-21T01:27:13.970301 | https://example.com/article/5307 |
Category: Outfits
So I am flipping through the ENTIRE Eskadron line, making my wish list for my sweet, impossible to dress, Pony.
Winter is trying to leave, bringing mad amounts of mud that I have to slog through to open and shut gates in Santo’s paddocks. I live in jeans (which I abhor- that is a story for another time), country boots and a ten year old parka that I just love. Here is the thing: I am dressing for utility, It is not glamorous, it is not pretty. My black parka shows every speck of mud, and god help us when the mud crusts over and turns to dust. There is just no getting around it if you keep your pony outside in the winter, which I do. He is furry, muddy and happy.
With spring (hopefully) around the corner, it is time to start planning my outfits. This year poses new challenges as Santos really only looks good in shades of blue. There is only so much you can do with that. As an experiment, I put a pink-ish pad with tan trim on him. If I had to see it, you have to see it.
It is really a travesty.
So I am flipping through the ENTIRE Eskadron line, making my wish list for my sweet, impossible to dress, Pony. | 2024-04-01T01:27:13.970301 | https://example.com/article/8378 |
archive
Knott upsets Alumni to earn spot in finals against Keenan
Joe Meixell | Tuesday, November 9, 2004
Of the seven passes attempted by Alumni quarterbacks on Sunday, only one of them resulted in an incompletion. Unfortunately for the Dawgs, four of the remaining six ended up in the hands of Knott defenders.
Matt O’Connor, Trey Patrick, Jim Lynch and Mike Peters contributed one interception each in the Juggs 24-0 victory on Sunday
“We were working hard and have been in great shape all season,” Lynch said. “They began to throw them longer as the game went on and time began to run out.”
The Knott defensive unit can also be credited with the amount of pressure they constantly placed upon Alumni’s offense added Lynch.
In addition to the interceptions, the Juggs also got two sacks and a fumble recovery by Justen Cheers. Throughout the entire contest, Alumni struggled in finding ways to place the ball in the end zone. In a clear illustration of Knott’s defensive dominance, the Dawgs wound up with negative total yardage on offense for the entire game.
However, Knott dominated in rushing yards as John Lyons ran for 58 of his 120 total rushing yards on the first drive of the game, as Knott scored a touchdown without a single passing play on the drive. Lyons capped the drive with a 5-yard run into the end zone.
On their second drive the Juggs extended their lead with a 25-yard pass from Justin Gillett to Lyons. The extra point was no good, and Knott led 13-0.
Kicker Eric Wooldridge booted an impressive 37-yard field goal in the third quarter to make it a three-score lead.
With the suspense gone, Knott mounted one last scoring drive, culminating in a 30-yd touchdown pass to Trey Patrick who, for the second straight week, contributes both a touchdown catch and an interception. Knott handed the ball off to Lyons, who went in for the two-point conversion to put the final score at 24-0.
Knott will now move on to the interhall championship game at the stadium on Sunday. The Juggs’ opponent will be the undefeated Knights of Keenan Hall.
“We have been saying all season our goal was to win the championship and we are now at the last and biggest step,” Lynch said.
Keenan 20, Siegfried 0
The No. 1 Knights of Keenan blew away Siegfried during Sunday’s semi-final match-up. The final score of 20-0 was met with an uproar on the packed Keenan sidelines.
The Knight’s finished the first quarter with a touchdown, making it 7-0 after quarterback Eric Laumann completed a long pass into the end zone. The Ramblers stepped up, however, and blocked the extra point attempt.
Keenan was successful on the field because both offense and defense fought aggressively. Siegfried entered confident as well, but after an interception early in the second quarter by Keenan’s Scott Morin, the Rambler offense began to falter.
As a result of Morin’s interception, the Keenan offense held possession during a long series and Laumann completed a second long touchdown pass to Zenker once again. This time the extra point was completed.
With regard to the touchdown completion, Laumann praised Zenker for his presence on the field.
“He just makes me look good,” Laumann said.
Siegfried’s offense took the field right before half time, only to be shut down by Keenan’s John Wood, who made an interception and returned it 20 yards.
In the second half, Siegfried’s defense came strong and ready to play. It stopped Keenan’s running game during two possessions. The secondary, especially, made some crucial tackles, holding off Keenan on a fourth down conversion.
At the beginning of the fourth quarter, Keenan’s offense was third and long when Laumann completed another long pass to Zenker, sealing a Knight victory and a trip to the stadium.
“We get all the credit, but the real stars of the game are the line,” Laumann said.
After the loss, Siegfried captain John Hughes respected Keenan for its aggressive style of play.
“We knew they were going to be great, they came in and ran the ball and passed it really well. We made a couple of mistakes and we could have showed for a lot more plays. We didn’t get it done when it mattered,” Siegfried Captain John Hughes said.
Despite the dominance Siegfried has held in men’s interhall football the past several years, it was Keenan’s afternoon and is now simply looking towards next Sunday’s championship game.
“We came out and played as good as we could play. I think our real success in winning the game can be attributed to our running game, which opened up a lot of other options for us. This is the first time in four years that we’ve been to the stadium, it’ll be a new experience for all of us,” Keenan captain Patrick Downey said.
Siegfried’s accomplishments, however, are not to go overlooked.
The seniors on the team have only lost four games in four years, which is quite an impressive career.
“I’m really proud of the guys, we had a great season. I’m proud of the seniors going out and of all the great guys that are going to return. My compliments to Keenan on a great game,” Hughes said. | 2023-11-15T01:27:13.970301 | https://example.com/article/3157 |
Q:
Console.Writeline Effect on Performance
I have an application that has 4 threads. Each thread is actually a Timer and does a seperate job in specific intervals.
These threads show their logs by using Console.Writeline.
The performance is very important in this application. I wanted to know whether removing of Console.Writeline will tune the performance of this application or not?
A:
Yes, executing Console.WriteLine takes a measureable amount of time.
Removing the Console.WriteLine call or changing it to a buffered background thread writing the data would really speed up the application.
However your milage might vary depending on the OS in use.
A:
There may be two issues with Console.WriteLine in regards to performance:
IO is not typically a "fast" operation.
Calls to WriteLine are synchronized, i.e. if two threads want to write, one of them blocks on the WriteLine waiting for the other to finish writing.
From MSDN on console:
I/O operations that use these streams are synchronized, which means
that multiple threads can read from, or write to, the streams.
That said, the only way to understand if the time spent on Console.WriteLine has an impact on the performance of your specific application is profiling it. Otherwise it's premature optimization.
| 2024-06-25T01:27:13.970301 | https://example.com/article/7550 |
2006–2007 Israeli Final Four
The 2006–2007 Israeli Final Four , the second Israeli Final Four was held at Yad Eliyahu Arena, Tel Aviv, Israel on 29 and 31 May 2007 to determine the winner of the 2006–2007 Israeli League. The contestants were Maccabi Tel Aviv, the 2005–2006 Israeli League champion, Hapoel Jerusalem, the 2005–2006 Israeli League runner-up and the 2006–2007 Israeli State Cup winner, Bnei Hasharon, the 2006–2007 Israeli State Cup runner-up and Hapoel Galil Elyon. Maccabi Tel Aviv won their 47th Israeli League crown, beating Hapoel Jerusalem 80-78 in the final.
Venue
The Yad Eliyahu Arena is an indoor sports arena in Tel Aviv, Israel. Opened in 1963 with its seating capacity varying from 5,000 to 11,700, it had hosted the 1971–1972 FIBA European Champions Cup final, the 1993–1994 FIBA European Championship Final Four, the 2003–2004 Euroleague Final Four and the 2005-2006 Israeli Final Four.
Bracket
Semifinals
All times are in Israel Summer Time.
Semifinal 1
Semifinal 2
Third-place playoff
Final
1 | 2024-06-10T01:27:13.970301 | https://example.com/article/9153 |
Q:
Create Planner Plan
I tried creating a plan for the existing group using Microsoft Graph Explorer, it was created successfully. Again I tried to create an another plan for the same group it threw me an error saying "MaximumPlannerPlans".
But I used the same code which I tried in the Microsoft Graph Explorer, in my SPFx webpart using GraphHttpClient for creating multiple plans, it is allowing me to create multiple plans for the same MS Group. Is it a bug or an expected behavior? If it is an expected behavior then why it is not allowing me to create multiple plans in the Microsoft Graph Explorer?
I am using same user login for the both SPFx webpart and Microsoft Graph Explorer which has an owner access.
A:
Please refer this user voice, this is requested feature once comes in GA you might be able to create multiple planner for a group.
https://planner.uservoice.com/forums/330525-microsoft-planner-feedback-forum/suggestions/19086499-allow-multiple-plans-per-group
| 2024-01-13T01:27:13.970301 | https://example.com/article/9158 |
// DEMFileFormat.cs
//
// Author:
// Xavier Fischer
//
// Copyright (c) 2019
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
namespace DEM.Net.Core
{
/// <summary>
/// Registration modes. Good explanation here : https://www.ngdc.noaa.gov/mgg/global/gridregistration.html
/// </summary>
public enum DEMFileRegistrationMode
{
/// <summary>
/// Grid/node-registered: cells are centered on lines of latitude and longitude (usually there is one pixel overlap for each tile).
/// </summary>
Grid,
/// <summary>
/// Cell/pixel-registered: cell edges are along lines of latitude and longitude.
/// </summary>
Cell,
}
}
| 2024-03-13T01:27:13.970301 | https://example.com/article/9725 |
Toronto Style: 10 Signs You're A Fashionista From The 6ix
The 6ix. T.Dot. The 416. Toronto has a lot of names for itself, and frankly, everyone in the city is totally okay with that. Actually, if you're from Toronto you LOVE Toronto. Even though the rest of Canada may find you annoying, you don't care about the haters. At all. Not in the slightest. You know this city has the best #Views. And style, for that matter.
Toronto champions some of the biggest names in fashion. It's a city that thrives in design and is home to some of the most low-key style stars in the biz, such as Drake, The Weeknd, Shay Mitchell and Winnie Harlow.
And because of this, we're making ourselves known as one of the most stylish cities in the world (hey, even Vogue thinks we're cool).
So what exactly makes up Toronto style? Well for one, luxe but cozy basics that show off our city pride (thanks, Peace Collective!) and of course, anything OVO. | 2024-04-11T01:27:13.970301 | https://example.com/article/3815 |
DESCRIPTION
Material: SteelManufactured from case-hardened chromoly steel for the ultimate in strength and durability.
Parkerizing surface treatment for rust and corrosion resistance.
The excellent OE quality you expect from the SUNSTAR brand.
While universal products are designed to fit a range of vehicles they may not fit all vehicles. If you are unsure of the fit we recommend posting a question on the ThumperTalk forums or contacting the manufacturer before ordering. | 2023-11-13T01:27:13.970301 | https://example.com/article/4840 |
CC=gcc
CFLAGS=-g -DWDL_FFT_REALSIZE=8 -Wall -Wno-unused-function -Wno-multichar -Wno-unused-result -Wshadow
LFLAGS=
CXX=g++
ifdef DEBUG
CFLAGS += -D_DEBUG -O0
else
CFLAGS += -DNDEBUG -O
endif
OBJS=nseel-caltab.o nseel-compiler.o nseel-eval.o nseel-lextab.o nseel-ram.o nseel-yylex.o nseel-cfunc.o fft.o
OBJS2=
UNAME_S := $(shell uname -s)
ARCH := $(shell uname -m)
ifeq ($(UNAME_S),Darwin)
CFLAGS += -arch $(ARCH)
endif
ifneq ($(filter arm%,$(ARCH)),)
CFLAGS += -fsigned-char -mfpu=vfp -march=armv6t2 -marm
endif
ifeq ($(ARCH),aarch64)
CFLAGS += -fsigned-char
endif
ifndef ALLOW_WARNINGS
ifneq ($(UNAME_S),Darwin)
CFLAGS += -Werror
endif
endif
ifndef DEPRECATED_WARNINGS
CFLAGS += -Wno-deprecated-declarations
endif
default: loose_eel
nseel-compiler.o: glue*.h ns-eel*.h
nseel-cfunc.o: asm*.c ns-eel*.h
loose_eel.o: eel*.h ns-eel*.h
nseel-*.o: ns-eel*.h
vpath %.cpp ../lice ../swell
vpath %.mm ../swell
vpath %.c ../
ifdef MAXLOOP
CFLAGS += -DNSEEL_LOOPFUNC_SUPPORT_MAXLEN=$(MAXLOOP)
else
CFLAGS += -DNSEEL_LOOPFUNC_SUPPORT_MAXLEN=0
endif
ifdef DISASSEMBLE
CFLAGS += -DEELSCRIPT_DO_DISASSEMBLE
endif
ifndef NO_GFX
OBJS += lice.o lice_image.o lice_line.o lice_ico.o lice_bmp.o lice_textnew.o lice_text.o lice_arc.o
CFLAGS += -DEEL_LICE_WANT_STANDALONE
ifeq ($(UNAME_S),Darwin)
CFLAGS += -mmacosx-version-min=10.5
OBJS += swell-wnd.o swell-gdi.o swell.o swell-misc.o swell-dlg.o swell-menu.o swell-kb.o
LFLAGS += -lobjc -framework Cocoa -framework Carbon
else
CFLAGS += -DSWELL_LICE_GDI -DSWELL_EXTRA_MINIMAL
ifdef GDK2
CFLAGS += -DSWELL_TARGET_GDK=2 $(shell pkg-config --cflags gdk-2.0)
LFLAGS += $(shell pkg-config --libs gdk-2.0) -lX11 -lXi
else
CFLAGS += -DSWELL_TARGET_GDK=3 $(shell pkg-config --cflags gdk-3.0)
LFLAGS += $(shell pkg-config --libs gdk-3.0) -lX11 -lXi
endif
ifndef NOFREETYPE
CFLAGS += -DSWELL_FREETYPE $(shell freetype-config --cflags)
LFLAGS += $(shell freetype-config --libs)
endif
OBJS += swell-wnd-generic.o swell-gdi-lice.o swell.o swell-misc-generic.o \
swell-dlg-generic.o swell-menu-generic.o swell-kb-generic.o \
swell-gdi-generic.o swell-ini.o swell-generic-gdk.o
LFLAGS += -ldl
endif
endif
asm-nseel-x64.o: a2x64.php asm-nseel-x86-gcc.c
php a2x64.php elf64
ifdef PORTABLE
CFLAGS += -DEEL_TARGET_PORTABLE
else
ifeq ($(UNAME_S),Darwin)
ifeq ($(ARCH),x86_64)
OBJS2 += asm-nseel-x64-macho.o
endif
endif
ifeq ($(UNAME_S),Linux)
ifeq ($(ARCH),x86_64)
OBJS2 += asm-nseel-x64.o
endif
endif
endif
CXXFLAGS=$(CFLAGS)
%.o : %.mm
$(CXX) $(CXXFLAGS) -c -o $@ $^
loose_eel: loose_eel.o $(OBJS) $(OBJS2)
g++ -o $@ $^ $(CXXFLAGS) $(LFLAGS)
clean:
-rm loose_eel loose_eel.o $(OBJS)
| 2023-08-11T01:27:13.970301 | https://example.com/article/1657 |
Guide bushes mounted on a column of an automatic lathe to hold a rod-like workpiece rotatably at a position close to a cutting tool are classified into a rotary type and a stationary type. A rotary guide bush rotates together with a workpiece and holds the workpiece for axial sliding. A stationary guide bush remains stationary and holds a workpiece for rotation and axial sliding.
A guide bush of either type has a portion having a taper outer surface provided with slits to make the same portion elastic, a threaded portion to hold the guide bush on the column, and an inner surface for holding a workpiece. The inner surface always in sliding contact with a workpiece is liable to be worn and, particularly, the inner surface of a stationary guide bush is worn rapidly.
Therefore, we have already proposed a guide bush wherein a hard carbon film is formed over the inner surface thereof coming in sliding contact with a workpiece when the workpiece is rotated and slid so as to dramatically enhance wear resistance of the inner surface and prevent seizure from occurring between the inner surface and workpiece.
The hard carbon film is formed of a hydrogenated amorphous carbon closely resembling diamond in properties. Therefore, hydrogenated amorphous carbon is also called diamond-like carbon (DLC).
The hard carbon film (DLC film) has a high hardness (not lower than Vickers 3000 Hv), is excellent in wear resistance and corrosion resistance, and has a small coefficient of friction (about 1/8 that of a superhard alloy).
The guide bush having an inner surface to be in sliding contact with a workpiece, coated with the hard carbon film, has wear resistance more excellent than the conventional guide bush having an inner surface attached with a superhard alloy or a ceramic material.
Accordingly, an automatic lathe employing the stationary guide bush provided with the hard carbon film over the inner surface thereof as described above is able to achieve heavy machining, in which depth of cut is large and cutting speed is high, with high accuracy for an extended period of time without damaging the workpiece or causing seizure.
Further, the hard carbon film may preferably be formed on an intermediate layer formed over the inner surface of the guide bush to enhance adhesion between the inner surface and the hard carbon film.
When the intermediate layer is formed of a two-layer film consisting of a lower layer of titanium, chromium or a compound containing titanium or chromium, and an upper layer of silicon, germanium or a compound containing silicon or germanium, the lower layer secures adhesion to the inner surface (alloy tool steel as a substrate metal) of the guide bush, and the upper layer bonds firmly to the hard carbon film. Therefore, the hard carbon film adheres firmly to the inner surface of the guide bush with high adhesion.
The hard carbon film may be formed on a hard lining member of a superhard alloy, such as tungsten carbide (WC), or a sintered ceramic material, such as silicon carbide (SiC), formed on the inner surface of the guide bush. An intermediate layer interposed between such a hard lining member and the hard carbon film will further enhance the adhesion of the hard carbon film.
Even if the guide bush is provided with the hard carbon film over the inner surface thereof as described above, however, the necessity for removing the hard carbon film from the inner surface thereof will arise so as to render the guide bush reusable in case any defect in the hard carbon film is detected during a test after formation thereof, the hard carbon film is damaged after use over a long period of time, or any other trouble is found occurring thereto.
In such a case, it is conceivable to remove the hard carbon film formed over the inner surface of the guide bush by use of a conventional technique such as the plasma etching method.
FIG. 10 is a view for illustrating a method of removing the hard carbon film from the inner surface of a guide bush by use of the plasma etching method.
As shown in the figure, a guide bush 11 with a hard carbon film 15 formed over the inner surface thereof is disposed inside a vacuum vessel 61, having a gas inlet port 63 and an evacuation port 65, and provided with an anode 79 and a filament 81 in the upper part therein, and securely held by insulated holding members 80.
The vacuum vessel 61 is then evacuated by means for evacuation (not shown), removing air through the evacuation port 65. Thereafter, a DC voltage supplied from an anode power source 75 is applied to the anode 79 disposed opposite to the guide bush 11, and an AC voltage supplied from a filament power source 77 is applied to the filament 81 while a DC voltage supplied from a DC power source 73 is applied to the guide bush 11.
Simultaneously, an oxygen-containing gas is fed into the vacuum vessel 61 through the gas inlet port 63, causing an oxygen plasma to be produced within the vacuum vessel 61 so that the hard carbon film 15 formed over the inner surface of the guide bush 11 is removed through etching as a result of oxygen reacting with carbon in the hard carbon film.
With the use of such a method of removing as described above, however, it is impossible to completely remove the hard carbon film 15 formed over the inner surface of the guide bush 11 from the entire region of the inner surface.
This is because with the method of removing as shown in FIG. 10, the plasma entering the center bore 11j of the guide bush 11 from the open end face thereof does not sufficiently reach the innermost region in the center bore 11j, thus failing to produce a uniformly distributed plasma therein.
Consequently, the hard carbon film formed on the inner surface of the guide bush 11, in the vicinity of the open end face thereof, can be removed by etching, but same formed on the innermost side (toward the lower part in FIG. 10) of the inner surface of the guide bush 11 can not.
A method according to the invention has been developed to overcome the problem described above, and it is therefore an object of the invention to provide a method whereby the hard carbon film formed over the inner surface of the guide bush can be removed from the entire region of the inner surface thereof with certainty. | 2024-02-19T01:27:13.970301 | https://example.com/article/7569 |
Kolkata GUIDE
We offers online booking for Kolkata hotels at discounted rates. We also provide reservations and information of all luxury hotels in Kolkata, five star hotels in Kolkata, heritage hotels in Kolkata, four star hotels in Kolkata, three star and budget hotels in Kolkata plus hotels near airport and hotels near famous tourist destinations in Kolkata , India. We also provide other travel services like package tours, car and taxi rental in Kolkata to make your trip a wonderful dream come true.
KOLKATA TOURIST INFORMATION
The capital of West Bengal and India’s largest city, a seething mass of activity with a cosmopolitan atmosphere. Kolkata has become a busy & flourishing city, the center of cultural as well as political and economic life of Bengal. It isn’t an ancient city like Delhi, with its impressive relics of the past. In fact, it’s largely a British creation & was capital of British India… once referred to as “The Jewel In The Crown Of The British Raj”. No other city in India enjoys such visible contra’s, as does the city of joy of Lapiere. The quaint little fishing village has grown up to become the most populated city of India bearing the scars of more than three hundred years. It is truly an enigma that defies any description. It is a city that throbs with vibrant life forces. It is an epitome of culture and creativity that nurtures and rejuvenates your thinking prowess. The city that displays stoical maturity during the most provoking situations and flies high the flags of communal harmony, behaves in the most erratic fashion over a game of cricket. It’s THE place to make friends with, to be romantic, to taste rosogolla, to sing a song, to write a poem, to debate, to ride a bus, to walk in the rain, to shop, to play cricket, to watch football, to get refused by a taxi, to live in the warmth of your family, to have a golden heart and to be happy!
KOLKATA HISTORY
In 1690, Job Charnok, an agent of the East India Company chose this place for a British trade settlement. The site was carefully selected, being protected by the Hooghly River on the west, a creek to the north, and by salt lakes about two and a half miles to the east. There were three large villages along the east bank of the river Ganges, named, Sutanuti, Gobindapur and Kalikata. These three villages were bought by the British from local land lords. The Mughal emperor granted East India Company freedom of trade in return for a yearly payment of 3,000 rupees. Calcutta before the British came was just a village, the capital city of Bengal was Murshidabad, around 60 miles north of Calcutta. In 1756, Siraj-ud-daullah, nawab of Bengal, attacked the city and captured the fort. Calcutta was recaptured in 1757 by Robert Clive when the British defeated Siraj-ud-daullah on the battle field of Plassy. In 1772, Calcutta became the capital of British India, and the first Governor General Warren Hastings moved all important offices from Murshidabad to Calcutta. Till 1912, Calcutta was the capital of India, when the British moved the capital city to Delhi. In 1947, when India gained freedom and the country got partitioned between India and Pakistan, Calcutta was included in the Indian part of Bengal, West Bengal. Calcutta became the capital city of the state of West Bengal.
KOLKATA TRAVEL INFO
By Air - Kolkata is well connected by air to all major countries in the world, as well as to Indian cities. The air carriers that have flights to and from the city include Aeroflot, Air France, Air India, Biman Bangladesh, British Airways, Cathay Pacific, Gulf Air, Indian Airlines, Japan Airlines, Jet Airways, KLM-Royal Dutch Airlines, Royal Jordanian Airlines, Royal Nepal Airlines, Singapore Airlines and Thai Airways International.
By Rail - Trains are available from all parts of the country to Calcutta. Most inward bound trains stop at Howrah, which is also the station from which major trains to other cities depart. Most trains heading to areas such as New Jalpaiguri and other provinces in the north-east stop at the other station, Sealdah. Local trains to nearby towns are available from both stations, depending on which part of West Bengal you want to go to.
By Road - A few buses ply from Orissa and Bihar to Calcutta. However, these are highly uncomfortable and best avoided. Buses are also available to nearby towns, especially if you wish to visit Siliguri and New Jalpaiguri on your trip to Calcutta. Depending on which direction you're heading in, buses could depart from the end of the Maidan near Chowringhee Road, or the bus stand at Babu Ghat near Fort William. A few tour operators have their own private bus stands, so do make inquiries!
KOLKATA FAIRS AND FESTIVALS
Fairs and festivals are celebrated with
traditional gaiety and fervor to invoke divine blessings as well
as for the sheer joy of living. A celebration of life at its
best.
Calcutta book fair :
The Mecca of publishers, book lovers and students, the Book Fair held in early February is a place that every family in Calcutta makes a beeline for. The fair showcases the best of not just Indian publishers, but also bookseller, writers and bibliophiles from all corners of the globe. Great discounts are offered on a mind-boggling array of titles as visitors to the fair wend their way in and out of the colorful stalls, stopping every now and then to grab a bite, get their portraits painted or just listen to the music filtering through the fair grounds.
Travel and Tourism Fair : Held in August, the Travel and Tourism Fair moves away from the much-favored Maidan to the Netaji Indoor Stadium. Discounts on booking, trade and travel deals, holiday packages, business deals in the industry - all these are more can be picked up under the same roof at this congregation of the big and small players of the trade and travel industry.
Lexpo : Held in December-January, Lexpo is a fair that showcases the products and technology of the leather industry. It's a fair for not just big players, but also for small scale industry participants to exhibit their ware.
Poush Mela : This three-day fair celebrates the founding day of Rabindranath Tagore's Shantiniketan. Held in late December, the fair is marked by prayers, cultural fests, crafts bazaars and folk performances. Poush Mela is a good occasion to explore the cultural facets of Shantiniketan, and attracts a large number of tourists. The last day of the fair is marked by prayers for the deceased who were associated with Shantiniketan.
Rathyatra : Travel along with the Lord of Puri, Jagannath, as his chariot takes him to his midsummer vacation. Legend has it that Jagannath, a reincarnation of Lord Vishnu, goes on this vacation with his brother Balaram and sister Subhadra. Religious fervor runs high and the streets of Calcutta turn into a mélange of colors. Devotees take turns to pull gigantic chariots bearing idols of the three divinities through the narrow bylanes of the city.
Do check out the Rathyatra in Mahesh in the nearby Hooghly district - it's the oldest in the state. The Mahesh Rathyatra of 1875 is also special as it provided the inspiration for Radharani, a famous novel by Bengali poet and author Bankim Chandra Chatterjee.
Poila Baisakh : The first month of the Bengali calendar, Baishakh, marks the beginning of the crop cycle in Bengal. A lot of Bengali weddings are held in this month, and new businesses started. The first day of this month is called Poila Baisakh is celebrated as the Bengali new year. Chances are, if you step into a shop in Calcutta on this day, you'll be offered sweets and maybe the odd gift or two. Traders start the new year by inaugurating new accounting books.
Kali Puja : A festival to propitiate the dark goddess Kali, Kali Puja is held in the dark of a new moon night. With her blue-black skin, blood-smeared face, terrifying third eye, Kali wears little other than necklaces of snakes and skulls. In her four hands, she bears weapons and blessings for her followers. This is one festival that is seldom performed within a home, and is often marked by animal sacrifices.
Durga Puja : For four days in September-October, Calcutta comes to a standstill as almost everyone in the city throngs its streets, visiting the pandals dressed in their festive best and fêting their taste buds with food from the stalls that spring up on the roadsides. Incense, drumbeats, chants, laughter, the sizzle and smell of food characterize this festival dedicated to Goddess Durga. Durga Puja is a chance to meet old friends, rub shoulders with the young and eligible, buy new clothes, walk the streets of the city till the wee hours of the morning, and, of course, admire the oeuvre of idol makers who craft beautiful idols of Durga, Lakshmi, Saraswati, Ganesh and Kartik out of bamboo, straw, jute, clay and paint.
Dol Purnima : A festival of spring, Dol Purnima is marked by people merrymaking on the streets, smearing each other with color, drinking milk laces with marijuana (locally called bhang) and ambushing unsuspecting passers-by with water balloons. Some of the celebrations can get pretty rowdy and some of the colors can get pretty artificial, so stay in your room if your skin's sensitive.
KOLKATA CUISINE
The best place for bargain shopping is New Market (formerly known as Hogg Market). Others include Gariahat, Dakshinapan , Central Cottage Industries Emporium, brassware shops along Kalighat Road, near the Kali temple, shops and auction houses on Park Street, Russel Street, Little Russel Street and Free School Street, and the Bengal Home Industries showroom.There is plenty to shop. A variety of local handicrafts are made from shola , pith and conch-shell. Terracotta figurines and horses (symbol of the Central Cottage Industries Emporium) are typical of Bankura. Painted clay plagues of Kalighat, silk sarees, stoles and scarves of Murshidabad and Vishnupur. Leather bags of Sriniketan , wood carvings and woollen garments of Darjeeling and handloom sarees of Dhaniakhali and Tangail are the most famous and found in various markets and shops spread around Calcutta.Calcutta also caters to the bold and beautiful. A bewitching range of gold, silver and diamond jewellery, intricately handcrafted, is available. Also , check out the latest fashion in leather – shoes , garments and accessories.
KOLKATA SHOPPING
Kolkata was a major trading center for many centuries. You can buy almost anything like antiques, jewelry, handicrafts, leather goods, pearls, semiprecious stones, dresses etc. from Kolkata. Various art forms and traditional crafts from Ikat weaving to puppetry are special to Andra's Tradition. Collection of such traditional arts and crafts is available in many emporia, Government and private shops.
KOLKATA LITERATURE
Around 7th-8th Century, a new Buddhist school of thought developed under the name 'Tantrayana'. It is believed by many that the Bengali Buddhist Acharyas were the founders of the Sahajayana. The views of Shajayanist have been written in 'Dohakosa' written in Apabhrangsha language of Tilopada, Sarahapada and Kahnapada. Those were written in the form of poetry criticizing the performance of the Brahmins, ways of living of roving mendicants and of rites and rituals. Such poetry was written at a time when Bengali language was being created out of the crust of Apabhrangsha language. The Acharyas of Sahajiya school wrote poetry in Bengali about their philosophy and nature of meditation. The language that they had used to preach their religious views was still far from being used in the work of government, religious prayers and cultural activities. These poems of Buddhist Siddhacharyas are the first ever form of Bengali language. Here is the first identifiable form of Bengali language marking the emergence of Bengali lyrics. Haraprashad Shastri discovered a total of 46 and half songs which was named 'Charyacharya Vinischaya'. These are generally known 'Charyagiti'. There is no controversy that the language in which that these poems were written was Bengali. But scholars have difference of opinion as to the exact time of composition of these poems. Dr. Shahidullah is of the opinion that these poems in 'Charyagiti' were composed between 7th and 12th centuries. But Dr. Suniti Kumar Chatterjee, Dr. Prabodh Ch. Bagchi and Dr. Sukumar Sen were of the view that they were written between 10th and 12th centuries. Before the Muslim conquest, Bengali language was nurtured by the Buddhists only. And this language was not nurtured for a short time, but continuous cultivation was carried out for several centuries. The trend that was initiated in the Buddhist lyrics found logical fulfillment in the enrichment of 'Vaisnava Padabali'. | 2024-05-13T01:27:13.970301 | https://example.com/article/1474 |
<!doctype html>
<html lang="en">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
<title>CSS Extend Rule</title>
<style>
@media print {
html { margin: 0 !important; }
body { font-family: serif; }
th, td { font-family: inherit; }
a { color: inherit !important; }
.example:before { font-family: serif !important; }
a:link, a:visited { text-decoration: none !important; }
a:link:after, a:visited:after { /* create a cross-ref "see..." */; }
}
@page {
margin: 1.5cm 1.1cm;
}
h1, h2, h3, h4, h5, h6 { page-break-after: avoid; }
figure, div.figure, div.sidefigure, pre, table.propdef, table.propdef-extra,
.example { page-break-inside: avoid; }
dt { page-break-after: avoid; }
body {
background: white;
/* background-image: floating-margin-image-goes-here; */
background-position: top left;
background-attachment: fixed;
background-repeat: no-repeat;
color: black;
counter-reset: exampleno figure issue;
font-family: sans-serif;
line-height: 1.5;
margin: 0 auto;
max-width: 50em;
padding: 2em 1em 2em 70px;
}
/* General structural markup */
h1, h2, h3, h4, h5, h6 { text-align: left; }
h1, h2, h3 { color: #005A9C; }
h1 { font: 170% sans-serif; }
h2 { font: 140% sans-serif; }
h3 { font: 120% sans-serif; }
h4 { font: bold 100% sans-serif; }
h5 { font: italic 100% sans-serif; }
h6 { font: small-caps 100% sans-serif; }
h2, h3, h4, h5, h6 { margin-top: 3em; }
h1 + h2 { margin-top: 0em; }
h2 + h3, h3 + h4, h4 + h5, h5 + h6 { margin-top: 1.2em; }
.head { margin-bottom: 1em; }
.head h1 { margin-top: 2em; clear: both; }
.head table { margin-left: 2em; margin-top: 2em; }
.head dd { margin-bottom: 0; }
p.copyright { font-size: small; }
p.copyright small { font-size: small; }
pre { margin: 1em 0 1em 2em; overflow: auto; }
pre, code, .idl-code {
font-size: .9em;
font-family: Menlo, Consolas, "DejaVu Sans Mono", monospace;
}
dt dfn code { font-size: inherit; }
dfn { font-weight: bolder; }
dfn var { font-style: normal; }
s, del {text-decoration: line-through; color: red; }
u, ins {text-decoration: underline; background: #bfa; }
sup {
vertical-align: super;
font-size: 80%
}
details { display: block; }
dt { font-weight: bold; }
dd { margin: 0 0 1em 2em; }
ul, ol { margin-left: 0; padding-left: 2em; }
li { margin: 0.25em 2em 0.5em 0; padding-left: 0; }
[data-md] > :first-child { margin-top: 0; }
[data-md] > :last-child { margin-bottom: 0; }
td.pre {
white-space: pre-wrap;
}
.css, .property { color: #005a9c; }
.property { white-space: nowrap; }
/* Boilerplate sections */
ul.indexlist { margin-left: 0; columns: 13em; }
ul.indexlist li { margin-left: 0; list-style: none }
ul.indexlist li li { margin-left: 1em; }
ul.indexlist a { font-weight: bold; }
ul.indexlist ul, ul.indexlist dl { font-size: smaller; }
ul.indexlist dl { margin-top: 0; }
ul.indexlist dt { margin: .2em 0 .2em 20px; }
ul.indexlist dd { margin: .2em 0 .2em 40px; }
.toc {
font-weight: bold;
line-height: 1.3;
list-style: none;
margin: 1em 0 0 5em;
padding: 0;
}
.toc ul { margin: 0; padding: 0; font-weight: normal; }
.toc ul ul { margin: 0 0 0 2em; font-style: italic; }
.toc ul ul ul { margin: 0}
.toc > li { margin: 1.5em 0; padding: 0; }
.toc li { clear: both; }
.toc ul.toc li { margin: 0.3em 0 0 0; }
.toc a { border-bottom-style: none; }
.toc a:hover, ul.toc a:focus { border-bottom-style: solid; }
/* Section numbers in a column of their own */
.toc span.secno {float: left; width: 4em; margin-left: -5em}
.toc ul ul span.secno { margin-left: -7em; }
table.proptable {
font-size: small;
border-collapse: collapse;
border-spacing: 0;
text-align: left;
margin: 1em 0;
}
table.proptable td, table.proptable th {
padding: 0.4em;
text-align: center;
}
table.proptable tr:hover td { background: #DEF; }
/* Links */
a[href] { color: inherit; border-bottom: 1px solid silver; text-decoration: none; }
a[href]:hover { background: #ffa; }
a[href]:active { color: #C00; background: transparent; }
img, a.logo { border-style: none; }
.heading, .issue, .note, .example, li, dt { position: relative; }
/* CSS-ish link types */
[data-link-type="property"]::before,
[data-link-type="propdesc"]::before,
[data-link-type="descriptor"]::before,
[data-link-type="value"]::before,
[data-link-type="function"]::before,
[data-link-type="at-rule"]::before,
[data-link-type="selector"]::before,
[data-link-type="maybe"]::before {content: "“";}
[data-link-type="property"]::after,
[data-link-type="propdesc"]::after,
[data-link-type="descriptor"]::after,
[data-link-type="value"]::after,
[data-link-type="function"]::after,
[data-link-type="at-rule"]::after,
[data-link-type="selector"]::after,
[data-link-type="maybe"]::after {content: "”";}
[data-link-type].production::before,
[data-link-type].production::after,
.prod [data-link-type]::before,
.prod [data-link-type]::after { content: ""; }
/* Element-type link styling */
[data-link-type=element] { font-family: monospace; }
[data-link-type=element]::before { content: "<" }
[data-link-type=element]::after { content: ">" }
/* Self-links */
a.self-link {
position: absolute;
top: 0;
left: -2.5em;
width: 2em;
height: 2em;
text-align: center;
border: none;
transition: opacity .2s;
opacity: .5;
}
a.self-link:hover {
opacity: 1;
}
.heading > a.self-link {
font-size: 83%;
}
li > a.self-link {
left: -3.5em;
}
dfn > a.self-link {
top: auto;
left: auto;
opacity: 0;
width: 1.5em;
height: 1.5em;
background: gray;
color: white;
font-style: normal;
transition: opacity .2s, background-color .2s, color .2s;
}
dfn:hover > a.self-link {
opacity: 1;
}
dfn > a.self-link:hover {
color: black;
}
a.self-link::before { content: "¶"; }
.heading > a.self-link::before { content: "§"; }
dfn > a.self-link::before { content: "#"; }
/* Figures */
figure {
display: block;
text-align: center;
margin: 2.5em 0;
}
figure.sidefigure {
float: right;
width: 50%;
margin: 0 0 0.5em 0.5em
}
figure pre {
text-align: left;
display: table;
margin: 1em auto;
}
figure table {
margin: auto;
}
figure img, figure object {
display: block;
margin: auto;
max-width: 100%
}
figcaption {
counter-increment: figure;
font-size: 90%;
font-style: italic;
text-align: center;
}
figcaption::before {
content: "Figure " counter(figure) ". ";
font-weight: bold;
}
dd figure { margin-left: -2em; }
/* Definition tables */
table.definition {
border-spacing: 0;
padding: 0 1em 0.5em;
width: 100%;
table-layout: fixed;
margin: 1.2em 0;
}
table.definition td, table.definition th {
padding: 0.5em;
vertical-align: baseline;
border-bottom: 1px solid #bbd7e9;
}
table.definition th:first-child {
font-style: italic;
font-weight: normal;
text-align: left;
width: 8.3em;
padding-left: 1em;
}
table.definition > tbody > tr:last-child > th,
table.definition > tbody > tr:last-child > td {
border-bottom: none;
}
table.definition tr:first-child > th,
table.definition tr:first-child > td {
padding-top: 1em;
}
/* Footnotes at the bottom of a definition table */
table.definition td.footnote {
font-style: normal;
padding-top: .6em;
width: auto;
}
table.definition td.footnote::before {
content: " ";
display: block;
height: 0.6em;
width: 4em;
border-top: thin solid;
}
/* IDL fragments */
pre.idl {
padding: .5em 1em;
margin: 1.2em 0;
}
pre.idl :link, pre.idl :visited {
color:inherit;
background:transparent;
}
/* Data tables */
/* Comes in plain, long, complex, or define varieties */
.data {
margin: 1em auto;
border-collapse: collapse;
width: 100%;
border: hidden;
}
.data {
text-align: center;
width: auto;
}
.data caption {
width: 100%;
}
.data td, .data th {
padding: 0.5em;
border-width: 1px;
border-color: silver;
border-top-style: solid;
}
.data thead td:empty {
padding: 0;
border: 0;
}
.data thead th[scope="row"] {
text-align: right;
color: inherit;
}
.data thead,
.data tbody {
color: inherit;
border-bottom: 2px solid;
}
.data colgroup {
border-left: 2px solid;
}
.data tbody th:first-child,
.data tbody td[scope="row"]:first-child {
text-align: right;
color: inherit;
border-right: 2px solid;
border-top: 1px solid silver;
padding-right: 1em;
}
.data.define td:last-child {
text-align: left;
}
.data tbody th[rowspan],
.data tbody td[rowspan] {
border-left: 1px solid silver;
}
.data tbody th[rowspan]:first-child,
.data tbody td[rowspan]:first-child {
border-left: 0;
border-right: 1px solid silver;
}
.data.complex th,
.data.complex td {
border: 1px solid silver;
}
.data td.long {
vertical-align: baseline;
text-align: left;
}
.data img {
vertical-align: middle;
}
/* Switch/case <dl>s */
dl.switch {
padding-left: 2em;
}
dl.switch > dt {
text-indent: -1.5em;
}
dl.switch > dt:before {
content: '↪';
padding: 0 0.5em 0 0;
display: inline-block;
width: 1em;
text-align: right;
line-height: 0.5em;
}
/* Style for At Risk features (intended as editorial aid, not intended for publishing) */
.atrisk::before {
position: absolute;
margin-left: -5em;
margin-top: -2px;
padding: 4px;
border: 1px solid;
content: 'At risk';
font-size: small;
background-color: white;
color: gray;
border-radius: 1em;
text-align: center;
}
/* Obsoletion notice */
details.annoying-warning[open] {
background: #fdd;
color: red;
font-weight: bold;
text-align: center;
padding: .5em;
border: thick solid red;
border-radius: 1em;
position: fixed;
left: 1em;
right: 1em;
bottom: 1em;
z-index: 1000;
}
details.annoying-warning:not([open]) > summary {
background: #fdd;
color: red;
font-weight: bold;
text-align: center;
padding: .5em;
}
/* Examples */
.example {
counter-increment: exampleno;
}
.example::before {
content: "Example";
content: "Example " counter(exampleno);
min-width: 7.5em;
text-transform: uppercase;
display: block;
}
.illegal-example::before {
content: "Invalid Example";
content: "Invalid Example" counter(exampleno);
}
.example, .illegal-example, .html, .illegal-html, .xml, .illegal-xml {
padding: 0.5em;
margin: 1em 0;
position: relative;
clear: both;
}
pre.example, pre.illegal-example, pre.html,
pre.illegal-html, pre.xml, pre.illegal-xml {
padding-top: 1.5em;
}
.illegal-example { color: red; }
.illegal-example p { color: black; }
.html { color: #600; }
.illegal-html { color: red; }
.illegal-html p { color: black; }
.xml { color: #600; }
.illegal-xml { color: red; }
.illegal-xml p { color: black; }
code.css { font-family: inherit; font-size: 100% }
code.html { color: #600 } /* inline HTML */
code.xml { color: #600 } /* inline XML */
/* Issues */
.issue {
border-color: #E05252;
background: #FBE9E9;
counter-increment: issue;
}
.issue:before {
content: "Issue " counter(issue);
padding-right: 1em;
text-transform: uppercase;
color: #E05252;
}
/* Whys */
details.why > summary {
font-style: italic;
}
details.why[open] > summary {
border-bottom: 1px silver solid;
}
/* All the blocks get similarly styled */
table.definition, pre.idl, .example, .note, details.why, .issue {
border: none;
border-left: .5em solid black;
border-left: .5rem solid black;
}
.issue, .note, .example, .why {
padding: .5em;
margin-top: 1em;
margin-bottom: 1em;
}
table.definition, pre.idl {
background: hsl(210, 70%, 95%);
border-color: hsl(210, 80%, 75%);
}
.example {
background: hsl(50, 70%, 95%);
border-color: hsl(50, 70%, 60%);
}
.example::before {
color: hsl(50, 70%, 60%);
}
.note, details.why {
background: hsl(120, 70%, 95%);
border-color: hsl(120, 70%, 60%);
}
.note::before {
color: hsl(120, 70%, 60%);
}
.issue {
background: hsl(0, 70%, 95%);
border-color: hsl(0, 70%, 60%);
}
.issue::before {
color: hsl(0, 70%, 60%);
}
span.issue, span.note {
padding: .1em .5em .15em;
border-right-width: .5em;
border-right-style: solid;
}
</style>
<script>self = (typeof window !== 'undefined')
? window // if in browser
: (
(typeof WorkerGlobalScope !== 'undefined' && self instanceof WorkerGlobalScope)
? self // if in worker
: {} // if in node js
);
/**
* Prism: Lightweight, robust, elegant syntax highlighting
* MIT license http://www.opensource.org/licenses/mit-license.php/
* @author Lea Verou http://lea.verou.me
*/
var Prism = (function(){
// Private helper vars
var lang = /\blang(?:uage)?-(?!\*)(\w+)\b/i;
var _ = self.Prism = {
util: {
encode: function (tokens) {
if (tokens instanceof Token) {
return new Token(tokens.type, _.util.encode(tokens.content), tokens.alias);
} else if (_.util.type(tokens) === 'Array') {
return tokens.map(_.util.encode);
} else {
return tokens.replace(/&/g, '&').replace(/</g, '<').replace(/\u00a0/g, ' ');
}
},
type: function (o) {
return Object.prototype.toString.call(o).match(/\[object (\w+)\]/)[1];
},
// Deep clone a language definition (e.g. to extend it)
clone: function (o) {
var type = _.util.type(o);
switch (type) {
case 'Object':
var clone = {};
for (var key in o) {
if (o.hasOwnProperty(key)) {
clone[key] = _.util.clone(o[key]);
}
}
return clone;
case 'Array':
return o.slice();
}
return o;
}
},
languages: {
extend: function (id, redef) {
var lang = _.util.clone(_.languages[id]);
for (var key in redef) {
lang[key] = redef[key];
}
return lang;
},
// Insert a token before another token in a language literal
insertBefore: function (inside, before, insert, root) {
root = root || _.languages;
var grammar = root[inside];
var ret = {};
for (var token in grammar) {
if (grammar.hasOwnProperty(token)) {
if (token == before) {
for (var newToken in insert) {
if (insert.hasOwnProperty(newToken)) {
ret[newToken] = insert[newToken];
}
}
}
ret[token] = grammar[token];
}
}
return root[inside] = ret;
},
// Traverse a language definition with Depth First Search
DFS: function(o, callback, type) {
for (var i in o) {
if (o.hasOwnProperty(i)) {
callback.call(o, i, o[i], type || i);
if (_.util.type(o[i]) === 'Object') {
_.languages.DFS(o[i], callback);
} else if (_.util.type(o[i]) === 'Array') {
_.languages.DFS(o[i], callback, i);
}
}
}
}
},
highlightAll: function(async, callback) {
var elements = document.querySelectorAll('code[class*="language-"], [class*="language-"] code, code[class*="lang-"], [class*="lang-"] code');
for (var i=0, element; element = elements[i++];) {
if (element.classList.contains("idl")) {
// Bikeshed handles IDL blocks already.
continue;
}
_.highlightElement(element, async === true, callback);
}
var elements = document.querySelectorAll('pre[class*="language-"], [class*="language-"] pre, pre[class*="lang-"], [class*="lang-"] pre');
for (var i=0, element; element = elements[i++];) {
if (element.firstElementChild && element.firstElementChild.tagName.toLowerCase() == "code") {
// Already handled by the previous loop
continue;
}
if (element.classList.contains("idl")) {
// Bikeshed handles IDL blocks already.
continue;
}
_.highlightElement(element, async === true, callback);
}
},
highlightElement: function(element, async, callback) {
// Find language
var language, grammar, parent = element;
while (parent && !lang.test(parent.className)) {
parent = parent.parentNode;
}
if (parent) {
language = (parent.className.match(lang) || [,''])[1];
grammar = _.languages[language];
}
if (!grammar) {
return;
}
// Set language on the element, if not present
element.className = element.className.replace(lang, '').replace(/\s+/g, ' ') + ' language-' + language;
// Set language on the parent, for styling
parent = element.parentNode;
if (/pre/i.test(parent.nodeName)) {
parent.className = parent.className.replace(lang, '').replace(/\s+/g, ' ') + ' language-' + language;
}
var code = element.textContent;
if(!code) {
return;
}
var env = {
element: element,
language: language,
grammar: grammar,
code: code
};
_.hooks.run('before-highlight', env);
if (async && self.Worker) {
var worker = new Worker(_.filename);
worker.onmessage = function(evt) {
env.highlightedCode = Token.stringify(JSON.parse(evt.data), language);
_.hooks.run('before-insert', env);
env.element.innerHTML = env.highlightedCode;
callback && callback.call(env.element);
_.hooks.run('after-highlight', env);
};
worker.postMessage(JSON.stringify({
language: env.language,
code: env.code
}));
}
else {
env.highlightedCode = _.highlight(env.code, env.grammar, env.language)
_.hooks.run('before-insert', env);
env.element.innerHTML = env.highlightedCode;
callback && callback.call(element);
_.hooks.run('after-highlight', env);
}
},
highlight: function (text, grammar, language) {
var tokens = _.tokenize(text, grammar);
return Token.stringify(_.util.encode(tokens), language);
},
tokenize: function(text, grammar, language) {
var Token = _.Token;
var strarr = [text];
var rest = grammar.rest;
if (rest) {
for (var token in rest) {
grammar[token] = rest[token];
}
delete grammar.rest;
}
tokenloop: for (var token in grammar) {
if(!grammar.hasOwnProperty(token) || !grammar[token]) {
continue;
}
var patterns = grammar[token];
patterns = (_.util.type(patterns) === "Array") ? patterns : [patterns];
for (var j = 0; j < patterns.length; ++j) {
var pattern = patterns[j],
inside = pattern.inside,
lookbehind = !!pattern.lookbehind,
lookbehindLength = 0,
alias = pattern.alias;
pattern = pattern.pattern || pattern;
for (var i=0; i<strarr.length; i++) { // Don’t cache length as it changes during the loop
var str = strarr[i];
if (strarr.length > text.length) {
// Something went terribly wrong, ABORT, ABORT!
break tokenloop;
}
if (str instanceof Token) {
continue;
}
pattern.lastIndex = 0;
var match = pattern.exec(str);
if (match) {
if(lookbehind) {
lookbehindLength = match[1].length;
}
var from = match.index - 1 + lookbehindLength,
match = match[0].slice(lookbehindLength),
len = match.length,
to = from + len,
before = str.slice(0, from + 1),
after = str.slice(to + 1);
var args = [i, 1];
if (before) {
args.push(before);
}
var wrapped = new Token(token, inside? _.tokenize(match, inside) : match, alias);
args.push(wrapped);
if (after) {
args.push(after);
}
Array.prototype.splice.apply(strarr, args);
}
}
}
}
return strarr;
},
hooks: {
all: {},
add: function (name, callback) {
var hooks = _.hooks.all;
hooks[name] = hooks[name] || [];
hooks[name].push(callback);
},
run: function (name, env) {
var callbacks = _.hooks.all[name];
if (!callbacks || !callbacks.length) {
return;
}
for (var i=0, callback; callback = callbacks[i++];) {
callback(env);
}
}
}
};
var Token = _.Token = function(type, content, alias) {
this.type = type;
this.content = content;
this.alias = alias;
};
Token.stringify = function(o, language, parent) {
if (typeof o == 'string') {
return o;
}
if (Object.prototype.toString.call(o) == '[object Array]') {
return o.map(function(element) {
return Token.stringify(element, language, o);
}).join('');
}
var env = {
type: o.type,
content: Token.stringify(o.content, language, parent),
tag: 'span',
classes: ['token', o.type],
attributes: {},
language: language,
parent: parent
};
if (env.type == 'comment') {
env.attributes['spellcheck'] = 'true';
}
if (o.alias) {
var aliases = _.util.type(o.alias) === 'Array' ? o.alias : [o.alias];
Array.prototype.push.apply(env.classes, aliases);
}
_.hooks.run('wrap', env);
var attributes = '';
for (var name in env.attributes) {
attributes += name + '="' + (env.attributes[name] || '') + '"';
}
return '<' + env.tag + ' class="' + env.classes.join(' ') + '" ' + attributes + '>' + env.content + '</' + env.tag + '>';
};
if (!self.document) {
if (!self.addEventListener) {
// in Node.js
return self.Prism;
}
// In worker
self.addEventListener('message', function(evt) {
var message = JSON.parse(evt.data),
lang = message.language,
code = message.code;
self.postMessage(JSON.stringify(_.util.encode(_.tokenize(code, _.languages[lang]))));
self.close();
}, false);
return self.Prism;
}
// Get current script and highlight
var script = document.getElementsByTagName('script');
script = script[script.length - 1];
if (script) {
_.filename = script.src;
if (document.addEventListener && !script.hasAttribute('data-manual')) {
document.addEventListener('DOMContentLoaded', _.highlightAll);
}
}
return self.Prism;
})();
if (typeof module !== 'undefined' && module.exports) {
module.exports = Prism;
}
;
Prism.languages.css = {
'comment': /\/\*[\w\W]*?\*\//g,
'atrule': {
pattern: /@[\w-]+?.*?(;|(?=\s*{))/gi,
inside: {
'punctuation': /[;:]/g
}
},
'url': /url\((["']?).*?\1\)/gi,
'selector': /[^\{\}\s][^\{\};]*(?=\s*\{)/g,
'property': /(\b|\B)[\w-]+(?=\s*:)/ig,
'string': /("|')(\\?.)*?\1/g,
'important': /\B!important\b/gi,
'punctuation': /[\{\};:]/g,
'function': /[-a-z0-9]+(?=\()/ig
};
if (Prism.languages.markup) {
Prism.languages.insertBefore('markup', 'tag', {
'style': {
pattern: /<style[\w\W]*?>[\w\W]*?<\/style>/ig,
inside: {
'tag': {
pattern: /<style[\w\W]*?>|<\/style>/ig,
inside: Prism.languages.markup.tag.inside
},
rest: Prism.languages.css
}
}
});
};
Prism.languages.css.selector = {
pattern: /[^\{\}\s][^\{\}]*(?=\s*\{)/g,
inside: {
'pseudo-element': /:(?:after|before|first-letter|first-line|selection)|::[-\w]+/g,
'pseudo-class': /:[-\w]+(?:\(.*\))?/g,
'class': /\.[-:\.\w]+/g,
'id': /#[-:\.\w]+/g
}
};
Prism.languages.insertBefore('css', 'ignore', {
'hexcode': /#[\da-f]{3,6}/gi,
'entity': /\\[\da-f]{1,8}/gi,
'number': /[\d%\.]+/g
});;
</script>
<style>/* http://prismjs.com/download.html?themes=prism&languages=clike */
/**
* prism.js default theme for JavaScript, CSS and HTML
* Based on dabblet (http://dabblet.com)
* @author Lea Verou
*/
code[class*="language-"],
pre[class*="language-"] {
color: black;
text-shadow: 0 1px white;
font-family: Consolas, Monaco, 'Andale Mono', monospace;
direction: ltr;
text-align: left;
white-space: pre;
word-spacing: normal;
word-break: normal;
line-height: 1.5;
-moz-tab-size: 4;
-o-tab-size: 4;
tab-size: 4;
-webkit-hyphens: none;
-moz-hyphens: none;
-ms-hyphens: none;
hyphens: none;
}
pre[class*="language-"]::-moz-selection, pre[class*="language-"] ::-moz-selection,
code[class*="language-"]::-moz-selection, code[class*="language-"] ::-moz-selection {
text-shadow: none;
background: #b3d4fc;
}
pre[class*="language-"]::selection, pre[class*="language-"] ::selection,
code[class*="language-"]::selection, code[class*="language-"] ::selection {
text-shadow: none;
background: #b3d4fc;
}
@media print {
code[class*="language-"],
pre[class*="language-"] {
text-shadow: none;
}
}
/* Code blocks */
pre[class*="language-"] {
padding: 1em;
margin: .5em 0;
overflow: auto;
}
:not(pre) > code[class*="language-"],
pre[class*="language-"] {
background: #f5f2f0;
}
/* Inline code */
:not(pre) > code[class*="language-"] {
padding: .1em;
border-radius: .3em;
}
.token.comment,
.token.prolog,
.token.doctype,
.token.cdata {
color: slategray;
}
.token.punctuation {
color: #999;
}
.namespace {
opacity: .7;
}
.token.property,
.token.tag,
.token.boolean,
.token.number,
.token.constant,
.token.symbol,
.token.deleted {
color: #905;
}
.token.selector,
.token.attr-name,
.token.string,
.token.char,
.token.builtin,
.token.inserted {
color: #690;
}
.token.operator,
.token.entity,
.token.url,
.language-css .token.string,
.style .token.string {
color: #a67f59;
background: hsla(0, 0%, 100%, .5);
}
.token.atrule,
.token.attr-value,
.token.keyword {
color: #07a;
}
.token.function {
color: #DD4A68;
}
.token.regex,
.token.important,
.token.variable {
color: #e90;
}
.token.important {
font-weight: bold;
}
.token.entity {
cursor: help;
}
</style>
</head>
<body class="h-entry">
<div class="head">
<p data-fill-with="logo"></p>
<h1 class="p-name no-ref" id="title">CSS Extend Rule</h1>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas,
<time class="dt-updated" datetime="2015-01-15">15 January 2015</time></span></h2>
<div data-fill-with="spec-metadata">
<dl>
<dt>This version:</dt>
<dd><a class="u-url" href="tabatkins.github.io/specs/css-extend-rule/">tabatkins.github.io/specs/css-extend-rule/</a></dd>
<dt>Issue Tracking:</dt>
<dd><a href="#issues-index">Inline In Spec</a></dd>
<dt class="editor">Editor:</dt>
<dd class="editor">
<div class="p-author h-card vcard"><a class="p-name fn u-url url" href="http://xanthir.com">Tab Atkins</a> (<span class="p-org org">Google</span>)</div>
</dd>
</dl>
</div>
<div data-fill-with="warning"></div>
<p class="copyright" data-fill-with="copyright"><a href="http://creativecommons.org/publicdomain/zero/1.0/" rel="license"><img alt="CC0" src="https://licensebuttons.net/p/zero/1.0/80x15.png"></a>
To the extent possible under law, the editors have waived all copyright
and related or neighboring rights to this work.
In addition, as of 15 January 2015,
the editors have made this specification available under the
<a href="http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0" rel="license">Open Web Foundation Agreement Version 1.0</a>,
which is available at http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0.
Parts of this work may be from another specification document. If so, those parts are instead covered by the license of that specification document.
</p>
<hr title="Separator for header">
</div>
<h2 class="no-num no-toc no-ref heading settled" id="abstract"><span class="content">Abstract</span></h2>
<div class="p-summary" data-fill-with="abstract">
<p>This module defines the <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule, which allows elements to act as if they matched other selectors.
This makes it easier to "subclass" styling in a page,
when some new type of element should act like an existing element,
but with tweaks.</p>
</div>
<div data-fill-with="at-risk"></div>
<h2 class="no-num no-toc no-ref heading settled" id="contents"><span class="content">Table of Contents</span></h2>
<div data-fill-with="table-of-contents" role="navigation">
<ul class="toc" role="directory">
<li><a href="#intro"><span class="secno">1</span> <span class="content">Introduction</span></a></li>
<li><a href="#extend-rule"><span class="secno">2</span> <span class="content">The <span class="css" data-link-type="maybe" title="@extend">@extend</span> Rule</span></a>
<ul class="toc">
<li><a href="#extend-chaining"><span class="secno">2.1</span> <span class="content"><span class="css" data-link-type="maybe" title="@extend">@extend</span> Chaining</span></a></li>
</ul>
</li>
<li><a href="#placeholder"><span class="secno">3</span> <span class="content">The Placeholder Selector <span class="css">%foo</span></span></a></li>
<li><a href="#acks"><span class="secno">4</span> <span class="content">Acknowledgements</span></a></li>
<li><a href="#conformance"><span class="secno"></span> <span class="content">
Conformance</span></a></li>
<li><a href="#references"><span class="secno"></span> <span class="content">References</span></a>
<ul class="toc">
<li><a href="#normative"><span class="secno"></span> <span class="content">Normative References</span></a></li>
</ul>
</li>
<li><a href="#index"><span class="secno"></span> <span class="content">Index</span></a></li>
<li><a href="#issues-index"><span class="secno"></span> <span class="content">Issues Index</span></a></li>
</ul></div>
<main>
<h2 class="heading settled" data-level="1" id="intro"><span class="secno">1. </span><span class="content">Introduction</span><a class="self-link" href="#intro"></a></h2>
<p>Sometimes, when designing a page,
an author might create some styles for a given type of element,
such as "error" messages.
Later, they might realize they need to create a "subclass" of the first type,
such as a "serious error" message,
which is styled the same way as "error",
but with a few tweaks to make it more distinctive.
Currently, CSS does not have a good way to handle this.</p>
<p>If the author has control over the HTML,
they can declare that every element with a class of "serious-error"
must also have a class of "error".
This, however, is error-prone--
it’s easy to forget to add the "error" class to an element,
causing confusing styling issues,
and any scripting that creates or manipulates error elements
has to know to maintain the states properly
(for example, any time they remove the "error" class,
they have to remember to check for and remove "serious-error" as well).</p>
<p>Alternately, this can be handled in the CSS--
every time a style rule contains a <span class="css">.error</span> selector,
the selector can be duplicated with <span class="css">.serious-error</span> replacing it.
This, too, is error-prone:
it’s easy for typos or inattention to cause the duplicated selectors to drift apart,
and it’s easy, when adding new <span class="css">.error</span> rules,
to forget to duplicate the selector.</p>
<p>The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule, defined in this specification,
fixes this common issue.
It allows an author to declare that certain elements,
such as everything matching <span class="css">.serious-error</span>,
must <em>act as if</em> they had the necessary features to match another selector,
such as <span class="css">.error</span>.</p>
<div class="example">
For example, the following code declares that <span class="css">.serious-error</span> elements should act as if they were <span class="css">.error</span> elements as well:
<pre class="lang-css">.error {
color: red;
border: thick dotted red;
}
.serious-error {
@extend .error;
font-weight: bold;
}
</pre>
<p>Now an element like <code><div class=serious-error></code> will have red text and border,
just like elements with <code>class=error</code>,
but will also use bold text.</p>
</div>
<p>This allows authors to write simple HTML,
applying either <code>class=error</code> or <code>class=serious-error</code> to elements as appropriate,
and write simple CSS,
creating style rules that just mention <span class="css">.error</span> or <span class="css">.serious-error</span>,
secure in the knowledge that the former rules will also apply to serious errors.</p>
<h2 class="heading settled" data-level="2" id="extend-rule"><span class="secno">2. </span><span class="content">The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> Rule</span><a class="self-link" href="#extend-rule"></a></h2>
<p>The <dfn class="css" data-dfn-type="at-rule" data-export="" id="at-ruledef-extend">@extend<a class="self-link" href="#at-ruledef-extend"></a></dfn> rule declares
that a matched element must act as if it had the necessary qualities to match another specified selector.
Its syntax is:</p>
<pre class="prod">@extend <a class="production" data-link-type="type" href="http://dev.w3.org/csswg/selectors-4/#typedef-compound-selector"><compound-selector></a>;</pre>
<p>The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule is only allowed inside of style rules.
In any other context, an <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule is invalid.
An <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule modifies the way that selector matching works
for the elements matched by the style rule the <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> selector is inside of,
known as the <dfn data-dfn-type="dfn" data-noexport="" id="extended-elements">extended elements<a class="self-link" href="#extended-elements"></a></dfn> for that rule.</p>
<p>The argument to <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> is the <dfn data-dfn-type="dfn" data-noexport="" id="extension-selector">extension selector<a class="self-link" href="#extension-selector"></a></dfn>.
The rule’s <a data-link-type="dfn" href="#extended-elements">extended elements</a> must,
for the purpose of determining if selectors match them,
act as if they had the necessary <a data-link-type="dfn" href="http://dev.w3.org/csswg/selectors-4/#feature">features</a>/state/etc to match the <a data-link-type="dfn" href="#extension-selector">extension selector</a>,
in addition to their pre-existing <a data-link-type="dfn" href="http://dev.w3.org/csswg/selectors-4/#feature">features</a>/state/etc.</p>
<div class="example">
For example, in the following code:
<pre class="lang-css">.serious-error {
@extend .error;
}
</pre>
<p>All elements matching the <span class="css">.serious-error</span> selector
must act as if they also had an "error" class
for the purpose of matching selectors,
regardless of what their actual set of classes is.</p>
</div>
<p class="issue" id="issue-bd856557"><a class="self-link" href="#issue-bd856557"></a>Should this only affect selectors in CSS,
or should it affect all APIs using selectors?
Dunno which is saner for browsers;
probably all selector-based APIs.
Do other query APIs, like <code class="idl"><a data-link-type="idl">getElementsByTagName()</a></code>,
rely on the same machinery?
If so, should we generalize this to allow host languages to declare arbitrary querying APIs to be "selector-ish"?</p>
<p>The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule only affects the <a data-link-type="dfn" href="#extended-elements">extended elements</a>
as long as the rule it’s inside of matches them.</p>
<div class="example">
For example, if the rule containing <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> is in an <a class="css" data-link-type="maybe" href="http://dev.w3.org/csswg/css-conditional-3/#at-ruledef-media">@media</a> block:
<pre class="lang-css">.error {
color: red;
}
@media (width > 600px) {
.serious-error {
@extend .error;
font-weight: bold;
}
.error {
width: 100%;
}
}
</pre>
<p>Then the <span class="css">.serious-error</span> elements only act as if they have an <code>error</code> class
when the page’s width is greater than <span class="css">600px</span>.</p>
</div>
<div class="example">
Note that the <a data-link-type="dfn" href="#extension-selector">extension selector</a> can specify more than classes.
For example, in the following code:
<pre class="lang-css">.my-button {
@extend button;
}
</pre>
<p>Any elements with <code>class=my-button</code> receive the same styling as actual <a data-link-type="element" href="https://html.spec.whatwg.org/#the-button-element">button</a> elements,
as if they had a tagname of <span class="css">button</span> in addition to their normal tagname.</p>
<p>Similarly, in the following code:</p>
<pre class="lang-css">.perma-pressed-button {
@extend .button:active;
}
</pre>
<p>Any <span class="css">.perma-pressed</span> elements are styled as if they were <a class="css" data-link-type="maybe" href="http://dev.w3.org/csswg/selectors-4/#active-pseudo">:active</a>,
so that any styling applied to "pressed" buttons via <a class="css" data-link-type="maybe" href="http://dev.w3.org/csswg/selectors-4/#active-pseudo">:active</a> rules applies to them as well.</p>
</div>
<div class="example">
The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule effectively adds qualities to an element,
so that it matches other rules.
The selector used to apply the <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule has no effect on this.
For example, in the following code:
<pre class="lang-css">.red-text { color: red; }
.blue-text { color: blue; }
#sidebar { @extend .red-text; }
div { @extend .blue-text; }
</pre>
<p>A naive author looking at the code and wondering how a <code><div id=sidebar></code> element would be styled
might assume that it gets red text,
as an ID selector is used to <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> the <span class="css">.red-text</span> class,
versus a much less specific tagname selector.
However, this is wrong—<wbr>the element gets blue text,
as the <span class="css">.red-text</span> and <span class="css">.blue-text</span> rules have equal specificity,
and the <span class="css">.blue-text</span> rule appears later in the stylesheet.
The specificity of the rules that caused the element to match <span class="css">.red-text</span> or <span class="css">.blue-text</span> are irrelevant here.</p>
<p>While this may in some cases be confusing,
it can also be a great benefit in some cases.
For example,
an author can define a lot of styles with simple, one-class (or one <a data-link-type="dfn" href="#placeholder-selector">placeholder selector</a>) rules,
effectively ignoring specificity entirely,
then apply them via longer, much more specific selectors,
using <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> to invoke the behavior of the simpler rules.
This can allow an author to avoid many of the specificity problems of using IDs in rules, for example.</p>
</div>
<h3 class="heading settled" data-level="2.1" id="extend-chaining"><span class="secno">2.1. </span><span class="content"><a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> Chaining</span><a class="self-link" href="#extend-chaining"></a></h3>
<p>Multiple <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rules can be "chained",
with one rule adding certain qualities to an element,
which cause another style rule containing an <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> to match.</p>
<p class="note" role="note">Note: This falls out of the definition automatically.
It is called out separately for clarity,
not because it’s a separate feature that needs to be specifically defined.</p>
<div class="example">
For example,
the following code using <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a>:
<pre class="lang-css">.error {
color: red;
}
.serious-error {
@extend .error;
font-weight: bold;
}
.super-serious-error {
@extend .serious-error;
animation: flashing 1s infinite;
}
</pre>
<p>is equivalent to the following code without <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a>:</p>
<pre class="lang-css">.error, .serious-error, .super-serious-error {
color: red;
}
.serious-error, .super-serious-error {
font-weight: bold;
}
.super-serious-error {
animation: flashing 1s infinite;
}
</pre>
</div>
<h2 class="heading settled" data-level="3" id="placeholder"><span class="secno">3. </span><span class="content">The Placeholder Selector <span class="css">%foo</span></span><a class="self-link" href="#placeholder"></a></h2>
<p>The <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule originates in CSS preprocessors, such as Sass.
Experience with those tools shows that it’s often useful to define generic, "functional" sets of styles
that don’t apply to any elements directly,
then use <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> to give that behavior to <em>semantic</em> classnames
which are more meaningful within their project.</p>
<div class="example">
For example, the "media block" is a common functional sort of styling,
originating from OOCSS,
that describes a box with a picture on one side and text on the other.
It might be used like the following:
<pre class="lang-css">.media-block {
overflow: auto;
}
.media-block > img {
float: left;
}
...
.image-post {
@extend .media-block;
... /* additional styles to tweak the display */
}
</pre>
</div>
<p>However, this also carries the possibility of confusion.
In the above example, <span class="css">.media-block</span> is just used to give a name to the pattern,
so that other rules can <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> it.
It’s not meant to be used in a document--
there shouldn’t be any elements with <code>class=media-block</code>--
but this isn’t obvious from the code.
It’s easy for later maintainers of the file to accidentally use <span class="css">.media-block</span> directly on an element,
and modify it for their own uses
(after all, if they search the codebase, they’ll find no elements on the page using it!),
perhaps accidentally breaking elements using it in <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a>.</p>
<p>To avoid situations like this,
and make it more clear that one is developing a "generic"/"functional"/"structural" set of styles,
the <dfn data-dfn-type="dfn" data-noexport="" id="placeholder-selector">placeholder selector<a class="self-link" href="#placeholder-selector"></a></dfn> can be used.
Its syntax is similar to a <a data-link-type="dfn" href="http://dev.w3.org/csswg/selectors-4/#class-selector">class selector</a>,
but is prefixed by a <span class="css">%</span> (U+0025 PERCENT SIGN)
rather than a period.</p>
<div class="example">
The previous example could be more clearly written using a <a data-link-type="dfn" href="#placeholder-selector">placeholder selector</a>:
<pre class="lang-css">%media-block {
overflow: auto;
}
%media-block > img {
float: left;
}
...
.image-post {
@extend %media-block;
}
</pre>
</div>
<p>Host languages must not provide any way for an element to match a <a data-link-type="dfn" href="#placeholder-selector">placeholder selector</a>;
the only way for an element to match one is by using an <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> rule.
This ensures that no element will ever directly match the styles using one,
even by accident,
and it can’t be accidentally reused for an element directly.</p>
<p><a data-link-type="dfn" href="#placeholder-selector">Placeholder selectors</a> have the same specificity as <a data-link-type="dfn" href="http://dev.w3.org/csswg/selectors-4/#class-selector">class selectors</a>.</p>
<p class="issue" id="issue-9ec63da0"><a class="self-link" href="#issue-9ec63da0"></a>Or should they have slightly less, so concrete classes can reliably override?
This would mean putting a fourth number into the specificity 3-tuple.</p>
<h2 class="heading settled" data-level="4" id="acks"><span class="secno">4. </span><span class="content">Acknowledgements</span><a class="self-link" href="#acks"></a></h2>
<p>The editor would like to thank the following people:</p>
<ul>
<li data-md="">
<p><a href="https://twitter.com/stubbornella">Nicole Sullivan</a> for <a href="http://www.stubbornella.org/content/2009/11/09/css-wish-list/">first coming up with the idea for @extend</a>.</p>
</li>
<li data-md="">
<p><a href="https://twitter.com/chriseppstein">Chris Eppstein</a> and <a href="https://twitter.com/nex3">Natalie Weizenbaum</a>
for <a href="http://chriseppstein.github.io/blog/2009/10/12/css-class-inheritance/">developing and programming</a> the modern incarnation of <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> in Sass.</p>
</li>
<li data-md="">
<p>The Sass community, for using <a class="css" data-link-type="maybe" href="#at-ruledef-extend">@extend</a> so extensively that its lack in CSS couldn’t be ignored.</p>
</li></ul>
</main>
<h2 class="no-ref no-num heading settled" id="conformance"><span class="content">
Conformance</span><a class="self-link" href="#conformance"></a></h2>
<p>
Conformance requirements are expressed with a combination of descriptive assertions and RFC 2119 terminology.
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL”
in the normative parts of this document
are to be interpreted as described in RFC 2119.
However, for readability,
these words do not appear in all uppercase letters in this specification.
</p>
<p>
All of the text of this specification is normative
except sections explicitly marked as non-normative, examples, and notes. <a data-biblio-type="normative" data-link-type="biblio" href="#biblio-rfc2119" title="RFC2119">[RFC2119]</a>
</p>
<p>
Examples in this specification are introduced with the words “for example”
or are set apart from the normative text with <code>class="example"</code>, like this:
</p>
<div class="example">
This is an example of an informative example.
</div>
<p>
Informative notes begin with the word “Note”
and are set apart from the normative text with <code>class="note"</code>, like this:
</p>
<p class="note" role="note">
Note, this is an informative note.
</p>
<h2 class="no-num heading settled" id="references"><span class="content">References</span><a class="self-link" href="#references"></a></h2>
<h3 class="no-num heading settled" id="normative"><span class="content">Normative References</span><a class="self-link" href="#normative"></a></h3>
<dl>
<dt id="biblio-rfc2119" title="rfc2119"><a class="self-link" href="#biblio-rfc2119"></a>[rfc2119]</dt>
<dd>S. Bradner. <a href="https://tools.ietf.org/html/rfc2119">Key words for use in RFCs to Indicate Requirement Levels</a>. March 1997. Best Current Practice. URL: <a href="https://tools.ietf.org/html/rfc2119">https://tools.ietf.org/html/rfc2119</a></dd>
</dl>
<h2 class="no-num heading settled" id="index"><span class="content">Index</span><a class="self-link" href="#index"></a></h2>
<ul class="indexlist">
<li>@extend, <a href="#at-ruledef-extend" title="section 2">2</a></li>
<li>extended elements, <a href="#extended-elements" title="section 2">2</a></li>
<li>extension selector, <a href="#extension-selector" title="section 2">2</a></li>
<li>placeholder selector, <a href="#placeholder-selector" title="section 3">3</a></li>
</ul>
<h2 class="no-num heading settled" id="issues-index"><span class="content">Issues Index</span><a class="self-link" href="#issues-index"></a></h2>
<div style="counter-reset:issue">
<div class="issue">Should this only affect selectors in CSS,
or should it affect all APIs using selectors?
Dunno which is saner for browsers;
probably all selector-based APIs.
Do other query APIs, like <code class="idl"><a data-link-type="idl">getElementsByTagName()</a></code>,
rely on the same machinery?
If so, should we generalize this to allow host languages to declare arbitrary querying APIs to be "selector-ish"?<a href="#issue-bd856557"> ↵ </a></div>
<div class="issue">Or should they have slightly less, so concrete classes can reliably override?
This would mean putting a fourth number into the specificity 3-tuple.<a href="#issue-9ec63da0"> ↵ </a></div>
</div></body>
</html>
| 2024-06-08T01:27:13.970301 | https://example.com/article/8132 |
THE PRESIDENT: Good morning. During the course of one week, the
situation in the Middle East has deteriorated dramatically. Last
Wednesday, my Special Envoy, Anthony Zinni, reported to me that we were
on the verge of a cease-fire agreement that would have spared
Palestinian and Israeli lives.
That hope fell away when a terrorist attacked a group of innocent
people in a Netanya hotel, killing many men and women in what is a
mounting toll of terror.
In the days since, the world has watched with growing concern the
horror of bombings and burials and the stark picture of tanks in the
street. Across the world, people are grieving for Israelis and
Palestinians who have lost their lives.
When an 18-year-old Palestinian girl is induced to blow herself up,
and in the process kills a 17-year-old Israeli girl, the future,
itself, is dying -- the future of the Palestinian people and the
future of the Israeli people. We mourn the dead, and we mourn the
damage done to the hope of peace, the hope of Israel's and the
Israelis' desire for a Jewish state at peace with its neighbors; the
hope of the Palestinian people to build their own independent state.
Terror must be stopped. No nation can negotiate with terrorists.
For there is no way to make peace with those whose only goal is death.
This could be a hopeful moment in the Middle East. The proposal of
Crown Prince Abdullah of Saudi Arabia, supported by the Arab League,
has put a number of countries in the Arab world closer than ever to
recognizing Israel's right to exist. The United States is on record
supporting the legitimate aspirations of the Palestinian people for a
Palestinian state.
Israel has recognized the goal of a Palestinian state. The
outlines of a just settlement are clear: two states, Israel and
Palestine, living side by side, in peace and security.
This can be a time for hope. But it calls for leadership, not for
terror. Since September the 11th, I've delivered this message:
everyone must choose; you're either with the civilized world, or you're
with the terrorists. All in the Middle East also must choose and must
move decisively in word and deed against terrorist acts.
The Chairman of the Palestinian Authority has not consistently
opposed or confronted terrorists. At Oslo and elsewhere, Chairman
Arafat renounced terror as an instrument of his cause, and he agreed to
control it. He's not done so.
The situation in which he finds himself today is largely of his own
making. He's missed his opportunities, and thereby betrayed the hopes
of the people he's supposed to lead. Given his failure, the Israeli
government feels it must strike at terrorist networks that are killing
its citizens.
Yet, Israel must understand that its response to these recent
attacks is only a temporary measure. All parties have their own
responsibilities. And all parties owe it to their own people to act.
We all know today's situation runs the risk of aggravating
long-term bitterness and undermining relationships that are critical to
any hope of peace. I call on the Palestinian people, the Palestinian
Authority and our friends in the Arab world to join us in delivering a
clear message to terrorists: blowing yourself up does not help the
Palestinian cause. To the contrary, suicide bombing missions could
well blow up the best and only hope for a Palestinian state.
All states must keep their promise, made in a vote in the United
Nations to actively oppose terror in all its forms. No nation can pick
and choose its terrorist friends. I call on the Palestinian Authority
and all governments in the region to do everything in their power to
stop terrorist activities, to disrupt terrorist financing, and to stop
inciting violence by glorifying terror in state-owned media, or telling
suicide bombers they are martyrs. They're not martyrs. They're
murderers. And they undermine the cause of the Palestinian people.
Those governments, like Iraq, that reward parents for the sacrifice
of their children are guilty of soliciting murder of the worst kind.
All who care about the Palestinian people should join in condemning and
acting against groups like Al-Aqsa, Hezbollah, Hamas, Islamic Jihad,
and all groups which opposed the peace process and seek the destruction
of Israel.
The recent Arab League support of Crown Prince Abdullah's
initiative for peace is promising, is hopeful, because it acknowledges
Israel's right to exist. And it raises the hope of sustained,
constructive Arab involvement in the search for peace. This builds on
a tradition of visionary leadership, begun by President Sadat and King
Hussein, and carried forward by President Mubarak and King Abdullah.
Now, other Arab states must rise to this occasion and accept Israel
as a nation and as a neighbor. Peace with Israel is the only avenue to
prosperity and success for a new Palestinian state. The Palestinian
people deserve peace and an opportunity to better their lives. They
need their closest neighbor, Israel, to be an economic partner, not a
mortal enemy. They deserve a government that respects human rights and
a government that focuses on their needs -- education and health
care -- rather than feeding their resentments.
It is not enough for Arab nations to defend the Palestinian cause.
They must truly help the Palestinian people by seeking peace and
fighting terror and promoting development.
Israel faces hard choices of its own. Its government has supported
the creation of a Palestinian state that is not a haven for terrorism.
Yet, Israel also must recognize that such a state needs to be
politically and economically viable.
Consistent with the Mitchell plan, Israeli settlement activity in
occupied territories must stop. And the occupation must end through
withdrawal to secure and recognize boundaries consistent with United
Nations Resolutions 242 and 338. Ultimately, this approach should be
the basis of agreements between Israel and Syria and Israel and
Lebanon.
Israel should also show a respect, a respect for and concern about
the dignity of the Palestinian people who are and will be their
neighbors. It is crucial to distinguish between the terrorists and
ordinary Palestinians seeking to provide for their own families.
The Israeli government should be compassionate at checkpoints and
border crossings, sparing innocent Palestinians daily humiliation.
Israel should take immediate action to ease closures and allow peaceful
people to go back to work.
Israel is facing a terrible and serious challenge. For seven days,
it has acted to root out terrorist nests. America recognizes Israel's
right to defend itself from terror. Yet, to lay the foundations of
future peace, I ask Israel to halt incursions into
Palestinian-controlled areas and begin the withdrawal from those cities
it has recently occupied.
I speak as a committed friend of Israel. I speak out of a concern
for its long-term security, a security that will come with a genuine
peace. As Israel steps back, responsible Palestinian leaders and
Israel's Arab neighbors must step forward and show the world that they
are truly on the side of peace. The choice and the burden will be
theirs.
The world expects an immediate cease-fire, immediate resumption of
security cooperation with Israel against terrorism. An immediate order
to crack down on terrorist networks. I expect better leadership, and I
expect results.
These are the elements of peace in the Middle East. And now, we
must build the road to those goals. Decades of bitter experience teach
a clear lesson: progress is impossible when nations emphasize their
grievances and ignore their opportunities. Storms of violence cannot
go on. Enough is enough.
And to those who would try to use the current crisis as an
opportunity to widen the conflict, stay out. Iran's arms shipments and
support for terror fuel the fire of conflict in the Middle East. And
it must stop. Syria has spoken out against al Qaeda. We expect it to
act against Hamas and Hezbollah, as well. It's time for Iran to focus
on meeting its own people's aspirations for freedom and for Syria to
decide which side of the war against terror it is on.
The world finds itself at a critical moment. This is a conflict
that can widen or an opportunity we can seize. And so I've decided to
send Secretary of State Powell to the region next week to seek broad
international support for the vision I've outlined today. As a step in
this process, he will work to implement United Nations Resolution 1402,
an immediate and meaningful cease-fire, an end to terror and violence
and incitement; withdrawal of Israeli troops from Palestinian cities,
including Ramallah; implementation of the already agreed upon Tenet and
Mitchell plans, which will lead to a political settlement.
I have no illusions. We have no illusions about the difficulty of
the issues that lie ahead. Yet, our nation's resolve is strong.
America is committed to ending this conflict and beginning an era of
peace.
We know this is possible, because in our lifetimes we have seen an
end to conflicts that no one thought could end. We've seen fierce
enemies let go of long histories of strife and anger. America itself
counts former adversaries as trusted friends: Germany and Japan and
now Russia.
Conflict is not inevitable. Distrust need not be permanent. Peace
is possible when we break free of old patterns and habits of hatred.
The violence and grief that troubled the Holy Land have been among the
great tragedies of our time. The Middle East has often been left
behind in the political and economic advancement of the world. That is
the history of the region. But it need not and must not be its fate.
The Middle East could write a new story of trade and development
and democracy. And we stand ready to help. Yet, this progress can
only come in an atmosphere of peace. And the United States will work
for all the children of Abraham to know the benefits of peace. | 2023-08-22T01:27:13.970301 | https://example.com/article/4685 |
Q:
Inlining an array of non-default constructible objects in a C++ class
C++ doesn't allow a class containing an array of items that are not default constructible:
class Gordian {
public:
int member;
Gordian(int must_have_variable) : member(must_have_variable) {}
};
class Knot {
Gordian* pointer_array[8]; // Sure, this works.
Gordian inlined_array[8]; // Won't compile. Can't be initialized.
};
As even beginning C++ users know, the language guarantees that all non-POD members are initialized when constructing a class. And it doesn't trust the user to initialize everything in the constructor - one has to provide valid arguments to the constructors of all members before the body of the constructor even starts.
Generally, that's a great idea as far as I'm concerned, but I've come across a situation where it would be a lot easier if I could actually have an array of non-default constructible objects.
The obvious solution: Have an array of pointers to the objects. This is not optimal in my case, as I am using shared memory. It would force me to do extra allocation from an already contended resource (that is, the shared memory). The entire reason I want to have the array inlined in the object is to reduce the number of allocations.
This is a situation where I would be willing to use a hack, even an ugly one, provided it works. One possible hack I am thinking about would be:
class Knot {
public:
struct dummy { char padding[sizeof(Gordian)]; };
dummy inlined_array[8];
Gordian* get(int index) {
return reinterpret_cast<Gordian*>(&inlined_array[index]);
}
Knot() {
for (int x = 0; x != 8; x++) {
new (get(x)) Gordian(x*x);
}
}
};
Sure, it compiles, but I'm not exactly an experienced C++ programmer. That is, I couldn't possibly trust my hacks less. So, the questions:
1) Does the hack I came up with seem workable? What are the issues? (I'm mainly concerned with C++0x on newer versions of GCC).
2) Is there a better way to inline an array of non-default constructible objects in a class?
A:
For one thing, you can use an array wrapper (such as boost::array) to initialize the array with fixed values:
#include <boost/array.hpp>
class Gordian {
public:
int member;
Gordian(int must_have_variable) : member(must_have_variable) {}
};
namespace detail
{
boost::array<Gordian, 8> chop()
{
boost::array<Gordian, 8> t = {{0, 1, 4, 9, 16, 25, 36, 49}};
return t;
}
}
class Knot {
boost::array<Gordian, 8> array;
public:
Knot(): array(detail::chop()) {}
};
Another possibility would be an array of boost::optional (but there will be some size overhead):
#include <boost/optional.hpp>
class Gordian {
public:
int member;
Gordian(int must_have_variable) : member(must_have_variable) {}
};
class Knot {
boost::optional<Gordian> array[8];
public:
Knot()
{
for (int x = 0; x != 8; x++) {
array[x] = Gordian(x*x);
}
}
};
| 2024-05-07T01:27:13.970301 | https://example.com/article/2571 |
Q:
ObservableList bind content with elements conversion
Is there a method to bind the content of two observable lists with conversion of elements between them? For example, something like this:
ObservableList<Model> models = FXCollections.observableArrayList();
ObservableList<TreeItem<Model>> treeItemModels = FXCollections.observableArrayList();
Bindings.bindContent(treeItemModels, models, m -> new TreeItem<Model>(m));
A:
As James_D say, this functionality is absent in standard API and the one can use ReactFX framework for doing so. But if the excess dependents is not the option, such functionality can be easy implemented without them. For this it is enough to go throught the JDK sources of Bindings#bindContent to ContentBinding#bind to ListContentBinding class and copy/paste with the neccessary modifications. As a result we get a binding which work like standard content binding:
ObservableList<Model> models = FXCollections.observableArrayList();
ObservableList<TreeItem<Model>> treeItemModels = FXCollections.observableArrayList();
BindingUtil.mapContent(treeItemModels, models, m -> new TreeItem<Model>(m));
The sources of this BindingUtil:
public class BindingUtil {
public static <E, F> void mapContent(ObservableList<F> mapped, ObservableList<? extends E> source,
Function<? super E, ? extends F> mapper) {
map(mapped, source, mapper);
}
private static <E, F> Object map(ObservableList<F> mapped, ObservableList<? extends E> source,
Function<? super E, ? extends F> mapper) {
final ListContentMapping<E, F> contentMapping = new ListContentMapping<E, F>(mapped, mapper);
mapped.setAll(source.stream().map(mapper).collect(toList()));
source.removeListener(contentMapping);
source.addListener(contentMapping);
return contentMapping;
}
private static class ListContentMapping<E, F> implements ListChangeListener<E>, WeakListener {
private final WeakReference<List<F>> mappedRef;
private final Function<? super E, ? extends F> mapper;
public ListContentMapping(List<F> mapped, Function<? super E, ? extends F> mapper) {
this.mappedRef = new WeakReference<List<F>>(mapped);
this.mapper = mapper;
}
@Override
public void onChanged(Change<? extends E> change) {
final List<F> mapped = mappedRef.get();
if (mapped == null) {
change.getList().removeListener(this);
} else {
while (change.next()) {
if (change.wasPermutated()) {
mapped.subList(change.getFrom(), change.getTo()).clear();
mapped.addAll(change.getFrom(), change.getList().subList(change.getFrom(), change.getTo())
.stream().map(mapper).collect(toList()));
} else {
if (change.wasRemoved()) {
mapped.subList(change.getFrom(), change.getFrom() + change.getRemovedSize()).clear();
}
if (change.wasAdded()) {
mapped.addAll(change.getFrom(), change.getAddedSubList()
.stream().map(mapper).collect(toList()));
}
}
}
}
}
@Override
public boolean wasGarbageCollected() {
return mappedRef.get() == null;
}
@Override
public int hashCode() {
final List<F> list = mappedRef.get();
return (list == null) ? 0 : list.hashCode();
}
@Override
public boolean equals(Object obj) {
if (this == obj) {
return true;
}
final List<F> mapped1 = mappedRef.get();
if (mapped1 == null) {
return false;
}
if (obj instanceof ListContentMapping) {
final ListContentMapping<?, ?> other = (ListContentMapping<?, ?>) obj;
final List<?> mapped2 = other.mappedRef.get();
return mapped1 == mapped2;
}
return false;
}
}
}
| 2024-05-16T01:27:13.970301 | https://example.com/article/1489 |
Business leaders reacted with frustration to the continued uncertainty caused by MPs rejecting the Brexit deal.
The Commons defeated Theresa May's Withdrawal Agreement by a majority of 149, with further votes expected this week on whether to back a no-deal Brexit or delay the UK's departure beyond 29 March.
Industry leaders urged the Commons to reject the possibility of a no-deal Brexit this month, but stressed the need to find a way out of the impasse.
Confederation of British Industry director general Carolyn Fairbairn called on MPs to "stop this circus" and said people's jobs depended on a new approach.
"Enough is enough. This must be the last day of failed politics," she said. "A new approach is needed by all parties. Jobs and livelihoods depend on it. Extending Article 50 to close the door on a March no-deal is now urgent. It should be as short as realistically possible and backed by a clear plan.
Tariffs in the event of a no-deal Brexit Show all 15 1 /15 Tariffs in the event of a no-deal Brexit Tariffs in the event of a no-deal Brexit Pork There will be tariffs on pork in order to protect British farmers Getty Tariffs in the event of a no-deal Brexit Cheese There will be tariffs in place on some cheeses including €22.10/100kg of cheddar, €19.10/100kg of processed cheese and €18.60/100kg on some blue cheeses Getty Tariffs in the event of a no-deal Brexit Milk There will be no tariffs in place on milk Getty Tariffs in the event of a no-deal Brexit Car Parts There will be no tariffs on car parts imported from Europe PA Tariffs in the event of a no-deal Brexit Cars However finished cars will face tariffs of 10.6% Getty Tariffs in the event of a no-deal Brexit Alcoholic drinks There will be no tariffs on alcoholic drinks - except on some rums due to ingredients used in their distilling process Getty Tariffs in the event of a no-deal Brexit Beef There will be tariffs on beef in order to protect British farmers Getty Tariffs in the event of a no-deal Brexit Fish There will be no tariffs on many types of fish including cod, haddock, salmon and sea bass Getty Tariffs in the event of a no-deal Brexit Fruit and vegetables There will be no tariffs on almost all fruit and vegetables Getty Tariffs in the event of a no-deal Brexit Chocolate There will be no tariffs on chocolate or other cocoa products Getty Tariffs in the event of a no-deal Brexit Poultry There will be tariffs on poultry in order to protect British farmers Getty Tariffs in the event of a no-deal Brexit Ceramics There will be some tariffs in place on ceramis Getty Tariffs in the event of a no-deal Brexit Steel There will be no tariffs on steel Getty Tariffs in the event of a no-deal Brexit Coal There will be no tariffs on coal Getty Tariffs in the event of a no-deal Brexit Lamb/Mutton There will be tariffs on the meat of sheep in order to protect British farmers Getty
"Conservatives must consign their red lines to history, while Labour must come to the table with a genuine commitment to solutions. It's time for Parliament to stop this circus."
Adam Marshall, director general of the British Chambers of Commerce, said: "It is profoundly obvious that neither Government nor many businesses are ready for a disorderly exit - and this must not be allowed to happen on 29 March, whether by default or by design. Businesses have been failed over and over again by Westminster in recent months, but allowing a messy and disorderly exit on March 29 would take political negligence to new extremes."
Mike Hawes, chief executive of the Society of Motor Manufacturers and Traders, said: "Today's vote leaves us perilously close to the cliff edge. No-deal would be catastrophic for the automotive industry. It would end frictionless trade, add billions to the cost of manufacturing and cost jobs. UK automotive businesses will be put at immediate risk.
"Parliament must reject no-deal and take it permanently off the table."
Edwin Morgan, interim director general of the Institute of Directors, said: "Our politicians have yet again failed to find a way to break the impasse. They are becoming adept at saying what they don't want, but it's still hard to see where the desire for compromise lies."
Trade union leaders also raised concerns about the continued uncertainty.
Support free-thinking journalism and attend Independent events
GMB leader Tim Roache said: "The Government can continue to flog a dead horse, or finally choose to be honest with the public about what can realistically be achieved."
He added that the only way to "break the logjam" is a second referendum.
Unison general secretary Dave Prentis said: "Two months may have passed since the last vote, but the PM's bad deal remains the same. Her failure to negotiate a better deal risks a catastrophic no-deal Brexit that would crash the economy and harm public services. Thanks to her Government's negligence, working people are still no closer to knowing what Brexit means for them, their families, their jobs or the public services many help provide." | 2024-06-03T01:27:13.970301 | https://example.com/article/9109 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.