text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
News Maple Leafs News Leafs Coca-Cola Zero Launch Fans First Game Ticket Giveaway by Staff Writer / Toronto Maple Leafs The Toronto Maple Leafs open the 2010-11 NHL preseason with fanfare and excitement by teaming up with Coca-Cola Zero to open the doors to Leafs fans for free. The Maple Leafs will host their provincial rivals the Ottawa Senators on Tuesday, September 21 at Air Canada Centre in the Coca-Cola Zero Fans First Game to recognize the outstanding support of Toronto’s fans. This additional game has been made possible through Maple Leaf Sports & Entertainment’s partnership with Coca-Cola Zero. "Maple Leafs fans are the greatest hockey fans in the world, so recognizing them with the Coca-Cola Zero Fans First Game, is just one way we can thank them for the passion and commitment to their team,” said David Hopkinson, senior vice-president of business partnerships for Maple Leaf Sports & Entertainment. "The Coca-Cola Zero Fans First Game is one of the more exciting promotions in professional sports. We’ve created a host of initiatives around the game to make it into a memorable experience for Leafs fans who don’t typically have an opportunity to experience a live Leafs game at Air Canada Centre.” The Maple Leafs and Coca-Cola Zero launched the third year of the popular Fans First event at the MasterCard Centre Tuesday, July 27 by making the impossible possible for one lucky hockey fan. David Marshall of Mississauga won the opportunity to be a Leaf for a Day after he and his men’s recreational hockey league teammates participated in a series of hockey drills and competitions that were conducted by Leafs Assistant Coach Keith Acton and Leafs players Mike Komisarek, Kris Versteeg and Colby Armstrong. Marshall will get a chance to attend a Leafs practice, have a pregame meal with the team, watch the Leafs game from the media gondola with Leafs President and General Manager Brian Burke, dinner at Air Canada Centre’s Air Canada Club and an opportunity to attend the Leafs postgame news conference. “The Coca-Cola Zero Fans First Game has become Toronto’s most exciting fan-focused event,” said Hayley Shay, manager of integrated marketing for Coca-Cola Zero. “We’re proud to showcase Coca-Cola Zero’s ability to make the impossible, possible, not only by providing real Coca-Cola taste with zero calories, but by presenting an opportunity to see real Leafs hockey with zero cost.” On Wednesday, July 28, all Leafs fans will have an opportunity to get a pair of tickets by visiting the Leafs Mobile Fan Zone along one of its many stops in Toronto. Besides getting a pair of tickets to the Coca-Cola Zero Fans First game, Leafs enthusiasts may have a chance to meet Leafs players and alumni, and sample Coca-Cola Zero. The Mobile Fan Zone stops include: Starting July 28 and through August, tickets for the Coca-Cola Zero Fans First Game will also be distributed through a variety of channels including contests, events, icoke.ca, promotions, giveaways and participating retailers — Metro Ontario, Pizza Pizza, Mr. Sub, Mac’s Convenience Stores, Cineplex and the Pickle Barrel. The Coca-Cola Zero Fans First game will have the look and feel of Leafs opening night with a tailgate party, live music, pregame festivities and giveaways that will be enjoyed by the 20,000 fans who will receive free tickets to the game.
2024-05-27T01:27:13.970301
https://example.com/article/9177
Silver Price Buy Signal – 2016 The gold to silver ratio has been used for years to indicate buy and sell zones in both gold and silver. Why? At BOTTOMS in both gold and silver, based on 40 years of history, silver prices have fallen farther and faster than gold. Hence the gold/silver ratio reaches a relative high. At tops in both gold and silver the ratio is often low since silver rises more rapidly than gold. As Jim Sinclair says, “silver is gold on steroids.” Examine the following graph of the gold to silver ratio (monthly data) for the past 40 years. I have circled the six most extreme highs in the ratio with green ovals. At 5 of 6 extremes in the ratio silver was at or near a long term bottom. The one minor exception was when silver bottomed in November of 2001 at $4.01 and the ratio peaked later in May 2003. Otherwise the ratio was quite accurate at indicating major silver lows. For more confirmation, assume a silver buy signal occurs when an extreme in the gold to silver ratio has been reached, and the weekly silver price closes above its 5 week moving average. Monthly Ratio Extremes Silver (weekly) closes above (green ovals above) 5 week MA June 1982 July 2, 1982 August 1986 September 5, 1986 February 1991 March 8, 1991 May 2003 April 11, 2003 November 2008 November 28, 2008 February 2016 January 29, 2016 The six major highs in the gold to silver ratio are marked above with green ovals, and also marked below on the log scale chart of COMEX silver. Note that 5 of 6 price lows were accurately indicated by the ratio highs, with the November 2001 price low being a minor exception. SO WHAT? Using the above simple analysis, silver hit a multi-year low in December 2015 and has confirmed that low by closing above its 5 week moving average AND registering a gold to silver ratio slightly above 80, the highest in about 20 years and the most extreme peak since the 2008 crash lows in gold and silver prices. Silver hit a low on December 14, 2015 at $13.61. The price on Feb. 24, as this is written, is $15.43, nearly $2 higher. Of course the paper silver market will flop around as it is managed by High Frequency Trading but the ratio provides more evidence that a silver bottom occurred about two months ago. Note the logarithmic lines on the silver price chart. The lines are somewhat arbitrary but roughly represent a lower bound, a middle trend-line, and an upper blow-off line. The middle trend-line passes through $25 in 2016 and the red line shows that $50 silver is one good rally away. We will see $50 silver, perhaps in 2017. The Market Oracle is a FREE Financial Markets Forecasting & Analysis web-site.(c) 2005-2016 MarketOracle.co.uk (Market Oracle Ltd) - Market Oracle Ltd asserts copyright on all articles authored by our editorial team and all comments posted. Any and all information provided within the web-site, is for general information purposes only and Market Oracle Ltd do not warrant the accuracy, timeliness or suitability of any information provided on this site. nor is or shall be deemed to constitute, financial or any other advice or recommendation by us. and are also not meant to be investment advice or solicitation or recommendation to establish market positions. We do not give investment advice and our comments are an expression of opinion only and should not be construed in any manner whatsoever as recommendations to enter into a market position either stock, option, futures contract, bonds, commodity or any other financial instrument at any time. We recommend that independent professional advice is obtained before you make any investment or trading decisions. By using this site you agree to this sites Terms of Use. From time to time we promote or endorse certain products / services that we believe are worthy of your time and attention. In return for that endorsement and only in the cases where you purchase directly though us may we be compensated by the producers of those products.
2024-01-02T01:27:13.970301
https://example.com/article/8105
President Trump has repeatedly criticized two men this week: George Conway and John McCain. The latter can't respond, but the former has been trading insults with the president. It's made life all very awkward for White House counselor Kellyanne Conway, who is now having to respond to the public feud. She admitted her husband was the one who started it. In recent days, he started accusing Trump of being mentally unfit and Kellyanne said of course he had a right to respond. “He left it alone for months out of respect for me,” Conway told POLITICO on Wednesday. “But you think he shouldn’t respond when somebody, a non-medical professional, accuses him of having a mental disorder? You think he should just take that sitting down?” Conway offered more thoughts on the feud in an interview with Maria Bartiromo on Fox News Business Thursday morning. She was as surprised as anyone. “My husband has been very critical of the president publicly, which is unlike him because he’s traditionally been a very private person,” Conway noted. For a man who sent zero tweets in 2016, it’s surprising to see him suddenly publish things like this. Congratulations! You just guaranteed that millions of more people are going to learn about narcissistic personality disorder and malignant narcissism! Great job! https://t.co/Dk9bI3sBs7 — George Conway (@gtconway3d) March 19, 2019 What also is new, Kellyanne said, is her husband "not supporting the agenda of the president and my work there." For, when George took himself out of contention for a DOJ job, he put out a public statement noting that he nevertheless supported the administration. She recalled how George was initially "excited" to move to D.C. with their four children, and how they mutually decided against both of them having a job in the federal government. Her husband has called for her to leave the Trump White House, but she said that won't send a good message to feminists. She "appreciated" the president protecting her and explained he has never pressured her to choose between her personal and professional life. “I’m not being asked to choose between my marriage and my job,” Conway clarified. “Trump has never made me feel that way.” She also condemned journalists who apparently consider themselves, “self-designated marriage experts.” They are getting into "dangerous territory," she warned.
2024-07-14T01:27:13.970301
https://example.com/article/3256
Q: Verb classes in French motion verbs I'd like to know, are there any equivalent verb classes in French for Levin's English verbs classes, especially for the class of motion verbs. How many motion verbs are there in French language? Where can I find a detail of all these verbs? Thanks a lot! A: Jean Dubois and Françoise Dubois-Charlier have made a global semantic classification of the verbs in French, the reference site for this database is at their homepage (in French). It features a browsable version of the database and many information documents. I am not familiar with Levin's classes, but this may be what you want. Regarding motion verbs, you may want to browse the generic classes “M: mouvement sur place”, “E: entrée, sortie”, “H: états physiques et comportements” and in certain cases “L: locatif”. However, remember that this classification can't be an exact equivalent, since English and French (motion) verbs follow two different paradigms¹, namely English is satellite-framed whereas (modern²) French is verb-framed. Basically, it means that “Running into X” is “Entrer dans X en courant” in French: in English the direction of movement is determined by the satellite (into) and the type of movement is determined by the verb ; it is the opposite in French. So any attempt to blindly apply a Levin-like classification to French verbs will fail. ¹ In Leonard Talmy's typology of framing. See his academic homepage to know every-bloody-thing about it. His original study was of motion events, so it should be of interest to you. ² It is not true of Old French and there are still traces of it in Modern French, see the remarkable article of Anetta Kopecka The semantic structure of motion verbs in French. Typological perspectives.
2023-12-30T01:27:13.970301
https://example.com/article/6192
Over-expression of a novel JAZ family gene from Glycine soja, increases salt and alkali stress tolerance. Salt and alkali stress are two of the main environmental factors limiting crop production. Recent discoveries show that the JAZ family encodes plant-specific genes involved in jasmonate signaling. However, there is only limited information about this gene family in abiotic stress response, and in wild soybean (Glycine soja), which is a species noted for its tolerance to alkali and salinity. Here, we isolated and characterized a novel JAZ family gene, GsJAZ2, from G. soja. Transcript abundance of GsJAZ2 increased following exposure to salt, alkali, cold and drought. Over-expression of GsJAZ2 in Arabidopsis resulted in enhanced plant tolerance to salt and alkali stress. The expression levels of some alkali stress response and stress-inducible marker genes were significantly higher in the GsJAZ2 overexpression lines as compared to wild-type plants. Subcellular localization studies using a GFP fusion protein showed that GsJAZ2 was localized to the nucleus. These results suggest that the newly isolated wild soybean GsJAZ2 is a positive regulator of plant salt and alkali stress tolerance.
2024-04-23T01:27:13.970301
https://example.com/article/9085
Sometimes couples communicate worse than strangers: Study Washington, Jan 21 (ANI): Married couples live with the illusion that they communicate well with their partners. But a new study could be an eye-opener for them. It has revealed that married couples do not always convey messages to their better halves as well as they think and in some cases, the spouses communicate no better than strangers. Psychologists also found the same communication problem with close friends. "People commonly believe that they communicate better with close friends than with strangers. That closeness can lead people to overestimate how well they communicate, a phenomenon we term the 'closeness-communication bias'," said Boaz Keysar, a professor in psychology at the University of Chicago and a leading expert on communications. Keysar's colleague Kenneth Savitsky, professor of psychology at Williams College in Williamstown, devised an experiment resembling a parlour game to study the issue. The researchers had 24 married couples sit with their backs to each other and were asked to decipher the meaning behind ambiguous phrases used in everyday conversation. The goal was to see if the spouses were better at understanding their partners than strangers. They found the spouses consistently overestimated their ability to communicate, and did so more with their partners than with strangers. "Although speakers expected their spouse to understand them better than strangers, accuracy rates for spouses and strangers were statistically identical. This result is striking because speakers were more confident that they were understood by their spouse," said Savitsky. "Some couples may indeed be on the same wavelength, but maybe not as much as they think," he added. Savitsky conducted a similar experiment with 60 Williams College students.n the study, the students overestimated their effectiveness in communicating with friends, replicating the pattern found with married couples. Communication problems arise when a speaker assumes that a well-known acquaintance has all the information the speaker has, removing the need for a long explanation, said Keysar. When people meet a stranger, they automatically provide more information because they don't have a 'closeness bias' in that encounter. In the same way, listeners may wrongly assume that a comment or request from a close acquaintance is based on knowledge that the two have in common - a mistake the listener would not make with a stranger. In order to test that idea, the researchers set up an experiment in which two students would sit across from each other, separated by a box with square compartments that contained objects. Some of the objects were not visible to one of the students. The study found that when partners were asked to move an object with an ambiguous name, they would hesitate longer when the speaker was a friend. But when the speaker was a stranger, the partner would be faster to focus on the object that the speaker could see, and ignore the object that the speaker did not know about. This showed that the participants were more likely to take an egocentric position when working with a friend. The study is published in the January issue of the Journal of Experimental Social Psychology. (ANI)
2023-08-16T01:27:13.970301
https://example.com/article/5065
The relationship between estimated sodium and potassium excretion and subsequent renal outcomes. Patients are often advised to reduce sodium and potassium intake, but supporting evidence is limited. To help provide such evidence we estimated 24 h urinary sodium and potassium excretion in 28,879 participants at high cardiovascular risk who were followed for a mean of 4.5 years in the ONTARGET and TRANSCEND trials. The primary outcome was eGFR decline of 30% or more or chronic dialysis. Secondary outcomes were eGFR decline of 40% or more or chronic dialysis, doubling of serum creatinine or chronic dialysis, an over 5%/year loss of eGFR, progression of albuminuria, and hyperkalemia. Multinomial logit regression with multivariable fractional polynomials, adjusted for confounders, determined the association between urinary sodium and potassium excretion and renal outcomes, with death as a competing risk. The primary outcome occurred in 2,052 (7.6%) patients. There was no significant association between sodium and any renal outcome (primary outcome odds ratio 0.99; 95% CI 0.89-1.09 for highest [median 6.2 g/day] vs. lowest third [median 3.3 g/day]). Higher potassium was associated with lower odds of all renal outcomes (primary outcome odds ratio 0.74; 95% CI 0.67-0.82 for highest [median 2.7 g/day] vs. lowest third [median 1.7 g/day], except hyperkalemia nonsignificant. Thus, urinary potassium, but not sodium, excretion predicted clinically important renal outcomes. Our findings do not support routine low sodium and potassium diets for prevention of renal outcomes in people with vascular disease with or without chronic kidney disease.
2023-09-28T01:27:13.970301
https://example.com/article/9789
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. hillman puppy question so, finally home from work overseas and spending the first night with the new puppy. as usual jet lag has me up in the middle of the night so i took the time to watch the hillman puppy dvd to get familiar with it and the question i have is that going by the timeline it looks like by around day 21 he's starting force fetch. that makes that pup about 17-18 weeks old which seems young. i've always been told not to formal hold or force fetch till after the adult teeth come in. Is hillmans technique early compared to others or did i just miss something along the way? Hillman's FF process is considerably different than most. He isn't forcing(early on) like you would in most other "Carr" based programs. Hillman starts using the "fetch" command early, but its not with an ear pitch like a formal FF like other programs use that recomend the pup be past teething(5+months of age). Like mentioned, its a puppy process... The timeline for the video spans from the pup being 11 weeks old at the start to 22 weeks at the end of the video. I also meant to add its actually preliminary FF and not formalized FF. My impression was to gently expose the puppy to almost everything in a gentle way so the transition to more formalized training would go easier............I think!!!! LOL I think there are several important points about the Hillmann philosophy and methods that are relevant. Teething Bill makes a point in his Traffic Cop DVD that he does not interrupt or suspend his training process because a puppy is teething. You make allowances for teething by substituting an object that the puppy can comfortably hold; for example, a tennis ball, a soft toy, or even a small pillow. The important thing is that you continue to teach and reinforce concepts during this time, developing your relationship and ALWAYS making it fun and successful for you and your pup. Timeline There is no timeline. It is a process. You start when you are ready and your pup is ready to begin learning the three fundamental elements described in Day One. After that, you make tiny advancements in those three fundamental elements -- so subtle that the pup doesn't even realize that he is learning. There are very few moments (if any) in this Hillmann process where the pup is presented with a challenge requiring a BIG STEP forward in order to be successful. In this way, learning is achieved without pressure, without force, without anger, without confusion ... and the puppy always has a great attitude, develops confidence, builds desire and equates learning and training with FUN. In following this process, an experienced trainer might advance a pup to the point of teaching the Fetch Command before teething is completed. If so, you continue to advance so long as you can do so without compromising the pup's attitude, confidence, success and fun. Force Fetch The method of Force Fetch beginning on Day 22 in Hillmann's Puppy DVD is not up to date with Hillmann's current methods and philosophy. It is the ONLY element in the Puppy DVD where Bill deviates from his principle of teaching a command to a fairly reliable level of understanding BEFORE the ecollar is used to reinforce the command. If you believe in the Hillmann philosophy, then you should get Hillmann's Fetch Command DVD. This DVD came out almost four years after the Puppy DVD and is up to date with Hillmann's current methods for teaching Fetch (Force Fetch). The method is entirely compatible with everything else contained in the Puppy DVD. It is much easier and much more fun for both the dog and the trainer -- and the end result is a "Fetch" that is as good as the old method. Actually it is better because there is no downside risk of damaging your pup's attitude or damaging your relationship during the Force Fetch process. This is one of the best explanations that I have heard yet about Hillmans concepts.I recently purchased all of His dvd's and with our new puppy am following as best as I can to teach this method. So far so good but a long way to go! Originally Posted by T-Pines Boomer, I think there are several important points about the Hillmann philosophy and methods that are relevant. Teething Bill makes a point in his Traffic Cop DVD that he does not interrupt or suspend his training process because a puppy is teething. You make allowances for teething by substituting an object that the puppy can comfortably hold; for example, a tennis ball, a soft toy, or even a small pillow. The important thing is that you continue to teach and reinforce concepts during this time, developing your relationship and ALWAYS making it fun and successful for you and your pup. Timeline There is no timeline. It is a process. You start when you are ready and your pup is ready to begin learning the three fundamental elements described in Day One. After that, you make tiny advancements in those three fundamental elements -- so subtle that the pup doesn't even realize that he is learning. There are very few moments (if any) in this Hillmann process where the pup is presented with a challenge requiring a BIG STEP forward in order to be successful. In this way, learning is achieved without pressure, without force, without anger, without confusion ... and the puppy always has a great attitude, develops confidence, builds desire and equates learning and training with FUN. In following this process, an experienced trainer might advance a pup to the point of teaching the Fetch Command before teething is completed. If so, you continue to advance so long as you can do so without compromising the pup's attitude, confidence, success and fun. Force Fetch The method of Force Fetch beginning on Day 22 in Hillmann's Puppy DVD is not up to date with Hillmann's current methods and philosophy. It is the ONLY element in the Puppy DVD where Bill deviates from his principle of teaching a command to a fairly reliable level of understanding BEFORE the ecollar is used to reinforce the command. If you believe in the Hillmann philosophy, then you should get Hillmann's Fetch Command DVD. This DVD came out almost four years after the Puppy DVD and is up to date with Hillmann's current methods for teaching Fetch (Force Fetch). The method is entirely compatible with everything else contained in the Puppy DVD. It is much easier and much more fun for both the dog and the trainer -- and the end result is a "Fetch" that is as good as the old method. Actually it is better because there is no downside risk of damaging your pup's attitude or damaging your relationship during the Force Fetch process. T-Pines thanks for the explanation. I used Puppy DVD with my new pup and it is amazing how well she sits. I have held off FF due to weather more than teething. I did not want to get into an issue with the pup not wanting to hold or fetch a snow crusted bumper. So we are delaying it, until I feel the time is right. She is ready, but I feel no need to rush. I am in no hurry. We are working on other things and keeping everything fun, but I am upping her standards a bit and demanding a better heel, quicker return, ie no playing with the bumper before coming back, etc., introducing 3 handed casting. I have received the next DVD but have not looked at it. I do have the force fetch video. But you answered the biggest question I had about the 2 videos and the difference in FF.
2024-06-14T01:27:13.970301
https://example.com/article/5905
Q: Stop windows service before perform the uninstallation I have an installer that installs few components including windows service, after it installed it'll start the service that installed onto the system using CustomAction. The problem when I uninstall the application, the installer asks to close the application before continue. I created a custom action that will stop the service, and I scheduled it with Uninstall actions. But its not executed until I press OK for the error dialog after manually stop the service. It failed on Win7, but I tested the same MSI on WinXP and worked fine (The custom action executed before checking the file In-use)!!! I'm using VS2010 setup project to create the installer, but I don't have problem to modify it (using Orca for example) after build. Here is the content of the InstallExecuteSequence Table : I found that the InstallValidate action that check for In-Use files, but I can't sequence my custom action that stop the service before it because its before InstallInitialize action that require all custom actions to be after it (ICE77 Evaluator) ICE77 posts an error if an in-script custom action is sequenced before the InstallInitialize action or after the InstallFinalize action. What should I do, shall I use the MSIRESTARTMANAGERCONTROL property that specifies whether the Windows Installer package uses the FilesInUse Dialog functionality, but I need to notify the user about the other in-use files. A: There are built-in features for this in Windows Installer - no custom action necessary. In fact I would strongly advice against using a custom action for this unless your service is very special (for example, slow to stop, or in need of shutting down a lot of resources and you need to verify that it does so). Most normal services stop within half a minute or so. I am not sure how long the Windows Installer Engine is configured to wait for the service to stop. The ServiceControl table of MSI is the "under the hood" feature for this. Most installation tools provide wizard like or GUI elements to control this in a simpler fashion though. Here is the service control view in one Installshield version:
2024-07-24T01:27:13.970301
https://example.com/article/6233
/* * Copyright © 2008 Daniel Stone * * Permission is hereby granted, free of charge, to any person obtaining a * copy of this software and associated documentation files (the "Software"), * to deal in the Software without restriction, including without limitation * the rights to use, copy, modify, merge, publish, distribute, sublicense, * and/or sell copies of the Software, and to permit persons to whom the * Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice (including the next * paragraph) shall be included in all copies or substantial portions of the * Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER * DEALINGS IN THE SOFTWARE. * * Author: Daniel Stone <daniel@fooishbar.org> */ #ifdef HAVE_DIX_CONFIG_H #include "dix-config.h" #endif #include "exevents.h" #include "exglobals.h" #include "misc.h" #include "input.h" #include "inputstr.h" #include "xace.h" #include "xkbsrv.h" #include "xkbstr.h" #include "inpututils.h" #include "eventstr.h" /* Check if a button map change is okay with the device. * Returns -1 for BadValue, as it collides with MappingBusy. */ static int check_butmap_change(DeviceIntPtr dev, CARD8 *map, int len, CARD32 *errval_out, ClientPtr client) { int i, ret; if (!dev || !dev->button) { client->errorValue = (dev) ? dev->id : 0; return BadDevice; } ret = XaceHook(XACE_DEVICE_ACCESS, client, dev, DixManageAccess); if (ret != Success) { client->errorValue = dev->id; return ret; } for (i = 0; i < len; i++) { if (dev->button->map[i + 1] != map[i] && dev->button->down[i + 1]) return MappingBusy; } return Success; } static void do_butmap_change(DeviceIntPtr dev, CARD8 *map, int len, ClientPtr client) { int i; xEvent core_mn; deviceMappingNotify xi_mn; /* The map in ButtonClassRec refers to button numbers, whereas the * protocol is zero-indexed. Sigh. */ memcpy(&(dev->button->map[1]), map, len); core_mn.u.u.type = MappingNotify; core_mn.u.mappingNotify.request = MappingPointer; /* 0 is the server client. */ for (i = 1; i < currentMaxClients; i++) { /* Don't send irrelevant events to naïve clients. */ if (!clients[i] || clients[i]->clientState != ClientStateRunning) continue; if (!XIShouldNotify(clients[i], dev)) continue; WriteEventsToClient(clients[i], 1, &core_mn); } xi_mn.type = DeviceMappingNotify; xi_mn.request = MappingPointer; xi_mn.deviceid = dev->id; xi_mn.time = GetTimeInMillis(); SendEventToAllWindows(dev, DeviceMappingNotifyMask, (xEvent *) &xi_mn, 1); } /* * Does what it says on the box, both for core and Xi. * * Faithfully reports any errors encountered while trying to apply the map * to the requested device, faithfully ignores any errors encountered while * trying to apply the map to its master/slaves. */ int ApplyPointerMapping(DeviceIntPtr dev, CARD8 *map, int len, ClientPtr client) { int ret; /* If we can't perform the change on the requested device, bail out. */ ret = check_butmap_change(dev, map, len, &client->errorValue, client); if (ret != Success) return ret; do_butmap_change(dev, map, len, client); return Success; } /* Check if a modifier map change is okay with the device. * Returns -1 for BadValue, as it collides with MappingBusy; this particular * caveat can be removed with LegalModifier, as we have no other reason to * set MappingFailed. Sigh. */ static int check_modmap_change(ClientPtr client, DeviceIntPtr dev, KeyCode *modmap) { int ret, i; XkbDescPtr xkb; ret = XaceHook(XACE_DEVICE_ACCESS, client, dev, DixManageAccess); if (ret != Success) return ret; if (!dev->key) return BadMatch; xkb = dev->key->xkbInfo->desc; for (i = 0; i < MAP_LENGTH; i++) { if (!modmap[i]) continue; /* Check that all the new modifiers fall within the advertised * keycode range. */ if (i < xkb->min_key_code || i > xkb->max_key_code) { client->errorValue = i; return -1; } /* Make sure the mapping is okay with the DDX. */ if (!LegalModifier(i, dev)) { client->errorValue = i; return MappingFailed; } /* None of the new modifiers may be down while we change the * map. */ if (key_is_down(dev, i, KEY_POSTED | KEY_PROCESSED)) { client->errorValue = i; return MappingBusy; } } /* None of the old modifiers may be down while we change the map, * either. */ for (i = xkb->min_key_code; i < xkb->max_key_code; i++) { if (!xkb->map->modmap[i]) continue; if (key_is_down(dev, i, KEY_POSTED | KEY_PROCESSED)) { client->errorValue = i; return MappingBusy; } } return Success; } static int check_modmap_change_slave(ClientPtr client, DeviceIntPtr master, DeviceIntPtr slave, CARD8 *modmap) { XkbDescPtr master_xkb, slave_xkb; int i, j; if (!slave->key || !master->key) return 0; master_xkb = master->key->xkbInfo->desc; slave_xkb = slave->key->xkbInfo->desc; /* Ignore devices with a clearly different keymap. */ if (slave_xkb->min_key_code != master_xkb->min_key_code || slave_xkb->max_key_code != master_xkb->max_key_code) return 0; for (i = 0; i < MAP_LENGTH; i++) { if (!modmap[i]) continue; /* If we have different symbols for any modifier on an * extended keyboard, ignore the whole remap request. */ for (j = 0; j < XkbKeyNumSyms(slave_xkb, i) && j < XkbKeyNumSyms(master_xkb, i); j++) if (XkbKeySymsPtr(slave_xkb, i)[j] != XkbKeySymsPtr(master_xkb, i)[j]) return 0; } if (check_modmap_change(client, slave, modmap) != Success) return 0; return 1; } /* Actually change the modifier map, and send notifications. Cannot fail. */ static void do_modmap_change(ClientPtr client, DeviceIntPtr dev, CARD8 *modmap) { XkbApplyMappingChange(dev, NULL, 0, 0, modmap, serverClient); } /* Rebuild modmap (key -> mod) from map (mod -> key). */ static int build_modmap_from_modkeymap(CARD8 *modmap, KeyCode *modkeymap, int max_keys_per_mod) { int i, len = max_keys_per_mod * 8; memset(modmap, 0, MAP_LENGTH); for (i = 0; i < len; i++) { if (!modkeymap[i]) continue; if (modkeymap[i] >= MAP_LENGTH) return BadValue; if (modmap[modkeymap[i]]) return BadValue; modmap[modkeymap[i]] = 1 << (i / max_keys_per_mod); } return Success; } int change_modmap(ClientPtr client, DeviceIntPtr dev, KeyCode *modkeymap, int max_keys_per_mod) { int ret; CARD8 modmap[MAP_LENGTH]; DeviceIntPtr tmp; ret = build_modmap_from_modkeymap(modmap, modkeymap, max_keys_per_mod); if (ret != Success) return ret; /* If we can't perform the change on the requested device, bail out. */ ret = check_modmap_change(client, dev, modmap); if (ret != Success) return ret; do_modmap_change(client, dev, modmap); /* Change any attached masters/slaves. */ if (IsMaster(dev)) { for (tmp = inputInfo.devices; tmp; tmp = tmp->next) { if (!IsMaster(tmp) && GetMaster(tmp, MASTER_KEYBOARD) == dev) if (check_modmap_change_slave(client, dev, tmp, modmap)) do_modmap_change(client, tmp, modmap); } } else if (!IsFloating(dev) && GetMaster(dev, MASTER_KEYBOARD)->lastSlave == dev) { /* If this fails, expect the results to be weird. */ if (check_modmap_change(client, dev->master, modmap)) do_modmap_change(client, dev->master, modmap); } return Success; } int generate_modkeymap(ClientPtr client, DeviceIntPtr dev, KeyCode **modkeymap_out, int *max_keys_per_mod_out) { CARD8 keys_per_mod[8]; int max_keys_per_mod; KeyCode *modkeymap = NULL; int i, j, ret; ret = XaceHook(XACE_DEVICE_ACCESS, client, dev, DixGetAttrAccess); if (ret != Success) return ret; if (!dev->key) return BadMatch; /* Count the number of keys per modifier to determine how wide we * should make the map. */ max_keys_per_mod = 0; for (i = 0; i < 8; i++) keys_per_mod[i] = 0; for (i = 8; i < MAP_LENGTH; i++) { for (j = 0; j < 8; j++) { if (dev->key->xkbInfo->desc->map->modmap[i] & (1 << j)) { if (++keys_per_mod[j] > max_keys_per_mod) max_keys_per_mod = keys_per_mod[j]; } } } if (max_keys_per_mod != 0) { modkeymap = calloc(max_keys_per_mod * 8, sizeof(KeyCode)); if (!modkeymap) return BadAlloc; for (i = 0; i < 8; i++) keys_per_mod[i] = 0; for (i = 8; i < MAP_LENGTH; i++) { for (j = 0; j < 8; j++) { if (dev->key->xkbInfo->desc->map->modmap[i] & (1 << j)) { modkeymap[(j * max_keys_per_mod) + keys_per_mod[j]] = i; keys_per_mod[j]++; } } } } *max_keys_per_mod_out = max_keys_per_mod; *modkeymap_out = modkeymap; return Success; } /** * Duplicate the InputAttributes in the most obvious way. * No special memory handling is used to give drivers the maximum * flexibility with the data. Drivers should be able to call realloc on the * product string if needed and perform similar operations. */ InputAttributes* DuplicateInputAttributes(InputAttributes *attrs) { InputAttributes *new_attr; int ntags = 0; char **tags, **new_tags; if (!attrs) return NULL; if (!(new_attr = calloc(1, sizeof(InputAttributes)))) goto unwind; if (attrs->product && !(new_attr->product = strdup(attrs->product))) goto unwind; if (attrs->vendor && !(new_attr->vendor = strdup(attrs->vendor))) goto unwind; if (attrs->device && !(new_attr->device = strdup(attrs->device))) goto unwind; if (attrs->pnp_id && !(new_attr->pnp_id = strdup(attrs->pnp_id))) goto unwind; if (attrs->usb_id && !(new_attr->usb_id = strdup(attrs->usb_id))) goto unwind; new_attr->flags = attrs->flags; if ((tags = attrs->tags)) { while(*tags++) ntags++; new_attr->tags = calloc(ntags + 1, sizeof(char*)); if (!new_attr->tags) goto unwind; tags = attrs->tags; new_tags = new_attr->tags; while(*tags) { *new_tags = strdup(*tags); if (!*new_tags) goto unwind; tags++; new_tags++; } } return new_attr; unwind: FreeInputAttributes(new_attr); return NULL; } void FreeInputAttributes(InputAttributes *attrs) { char **tags; if (!attrs) return; free(attrs->product); free(attrs->vendor); free(attrs->device); free(attrs->pnp_id); free(attrs->usb_id); if ((tags = attrs->tags)) while(*tags) free(*tags++); free(attrs->tags); free(attrs); } /** * Alloc a valuator mask large enough for num_valuators. */ ValuatorMask* valuator_mask_new(int num_valuators) { /* alloc a fixed size mask for now and ignore num_valuators. in the * flying-car future, when we can dynamically alloc the masks and are * not constrained by signals, we can start using num_valuators */ ValuatorMask *mask = calloc(1, sizeof(ValuatorMask)); mask->last_bit = -1; return mask; } void valuator_mask_free(ValuatorMask **mask) { free(*mask); *mask = NULL; } /** * Sets a range of valuators between first_valuator and num_valuators with * the data in the valuators array. All other values are set to 0. */ void valuator_mask_set_range(ValuatorMask *mask, int first_valuator, int num_valuators, const int* valuators) { int i; valuator_mask_zero(mask); for (i = first_valuator; i < min(first_valuator + num_valuators, MAX_VALUATORS); i++) valuator_mask_set(mask, i, valuators[i - first_valuator]); } /** * Reset mask to zero. */ void valuator_mask_zero(ValuatorMask *mask) { memset(mask, 0, sizeof(*mask)); mask->last_bit = -1; } /** * Returns the current size of the mask (i.e. the highest number of * valuators currently set + 1). */ int valuator_mask_size(const ValuatorMask *mask) { return mask->last_bit + 1; } /** * Returns the number of valuators set in the given mask. */ int valuator_mask_num_valuators(const ValuatorMask *mask) { return CountBits(mask->mask, min(mask->last_bit + 1, MAX_VALUATORS)); } /** * Return true if the valuator is set in the mask, or false otherwise. */ int valuator_mask_isset(const ValuatorMask *mask, int valuator) { return mask->last_bit >= valuator && BitIsOn(mask->mask, valuator); } /** * Set the valuator to the given data. */ void valuator_mask_set(ValuatorMask *mask, int valuator, int data) { mask->last_bit = max(valuator, mask->last_bit); SetBit(mask->mask, valuator); mask->valuators[valuator] = data; } /** * Return the requested valuator value. If the mask bit is not set for the * given valuator, the returned value is undefined. */ int valuator_mask_get(const ValuatorMask *mask, int valuator) { return mask->valuators[valuator]; } /** * Remove the valuator from the mask. */ void valuator_mask_unset(ValuatorMask *mask, int valuator) { if (mask->last_bit >= valuator) { int i, lastbit = -1; ClearBit(mask->mask, valuator); mask->valuators[valuator] = 0; for (i = 0; i <= mask->last_bit; i++) if (valuator_mask_isset(mask, i)) lastbit = max(lastbit, i); mask->last_bit = lastbit; } } void valuator_mask_copy(ValuatorMask *dest, const ValuatorMask *src) { if (src) memcpy(dest, src, sizeof(*dest)); else valuator_mask_zero(dest); } int CountBits(const uint8_t *mask, int len) { int i; int ret = 0; for (i = 0; i < len; i++) if (BitIsOn(mask, i)) ret++; return ret; } /** * Verifies sanity of the event. If the event is not an internal event, * memdumps the first 32 bytes of event to the log, a backtrace, then kill * the server. */ void verify_internal_event(const InternalEvent *ev) { if (ev && ev->any.header != ET_Internal) { int i; unsigned char *data = (unsigned char*)ev; ErrorF("dix: invalid event type %d\n", ev->any.header); for (i = 0; i < sizeof(xEvent); i++, data++) { ErrorF("%02hhx ", *data); if ((i % 8) == 7) ErrorF("\n"); } xorg_backtrace(); FatalError("Wrong event type %d. Aborting server\n", ev->any.header); } }
2024-03-04T01:27:13.970301
https://example.com/article/5704
Amazing Scrap Sewing Project Ideas You may want to think twice about throwing out your fabric scraps. Most sewers can get really creative in reusing and recycling their fabric scraps. Always collect your fabric scraps for future use. They may prove beneficial for your other creative projects. Fabric scraps are potentially valuable pieces of material that can aid you in making your sewing projects highly economical. For instance, fabric scraps can be sewn together to make quirky pillow cases and bed sheets. They can also be used to sew a wide array of things – handbags, blouses, skirts, curtains, etc. There is always value to be seen in waste if you know how to look at it. Fabric scraps are especially useful for special occasions or holidays like Christmas. They may be used to make personal gifts to loved ones. Aren’t gifts more valuable when they are personally handmade? They can be put to priceless use in a vast number of ways and can make several fun and personal items. During the holiday season, for instance, you can make your family or significant other some useful gifts like coasters, bottle covers, bath towels, kitchen napkins, and bag straps among other things. They can also be used to wrap some fashionable handbags. Small fabrics may be used to create cosmetic sets like make-up brushes. Fabric scraps can also be used to make body scrubs for your bath needs. For little kids, they can be used to create stuffed toys or covers for their toys. And as a dressmaker in need of pincushions, fabric scraps can be useful for that as well. Fabric scraps are not the only materials which can be used for recycling. Interfacing and lining material can also be equally useful for creative projects, especially those with unwoven assortments wherein the grainlines have no issues at all. These patterns are perfectly useful when used in conjunction with your fabric leftovers. 20 Amazing Scrap Sewing Ideas 1. Coin Purse This is a relatively easy project that requires more or less 4.5 inches of fabric. You can stitch it up in gold patterns or some fun holiday-themed colors. 2. Dolls or Stuffed Toys One example of dolls that can be made from fabric scraps are the so-called Matryoshka dolls which are derived from Russian handicrafts. These cute little dolls are sure to bring delight to girls. Another good use for fabric leftovers are stuffed toys. The possibilities are endless – you can make sock bunnies, elephants, penguins, and many more. 3. Pincushion Pincushions can be created with bold colors, absurd buttons, and quirky ribbons. Or you can experiment with scraps of light- and dark-colored prints. You’ll also need polyester fiberfill for the inside of your pincushion. 4. Camera Strap Camera straps are made from relatively simple materials consisting of beautiful fabrics and fleece. 5. Keychain With personal embellishments, keychains can look beautiful. You can use it to easily see or get a hold of your keys, identification cards, and other essential items. 6. Water Bottle Bag This useful item may have a stretchable opening and a durable tape for its strap. 7. Press Bag This item may be created using two sets of at least 9.5 inches of square-shaped fabric. The first one is used for its lining. Then, the upper cuff is turned down and patterned with any design of your own liking. 8. Clipped Towels These towels are particularly useful in any home. Top them off with eye-catching ribbons to transform it from a plain-looking towel to something that is equipped with a head-turning panache. 9. Petal-Patterned Handbag With your own design template, you will need more or less fifteen strips of fabric scraps utilizing at least eight various ¼ scraps. When done correctly, you should have a wide room for your personal items. Different quirky patterns are needed to make these little gifts for your friends and family during winter break or special occasions. 10.Snack Bags These snack bags are reusable, and they can be created using fabric scraps made of vinyl. 11.Glass Coasters Fabric scraps should be diagonally sewn and then padded like quilts to create a mat-like coaster for your mugs or any drinking glasses. 12. Glass Cases This particular item features a tab that can be creased over with an eye-catching button and a stretchable closure. 13. Kitchen Towel This is similar to your clipped towels but generally used in the kitchen – for wiping out stains or drying your hands. 14. Eye Masks These masks are relaxing when filled with dried grains like beans, rice or lentils. You can also add chamomile for the scent. 15. Covered Magnets Looking for ways to spice up your plain-looking fridge? These cute items may come in handy. All you need are glue, fabric scraps, pliers, quirky buttons, and of course some magnets. 16. E-Reader Case This item has an envelope-like design with a side-flap for you to pull out your e-reader conveniently when needed. A closure with material made of Velcro may also come in handy. 17. Phone Case or Sleeve This small item may be created with any mobile brand. The measurements, of course, depend on the physical specifications of your phone. You can try out weird patterns that you personally like. 18. Pencil Case This is made specifically for school children. Preferably, it should be made with durable material like canvas. The ends should be rounded to accommodate different pens or pencils.
2024-03-12T01:27:13.970301
https://example.com/article/3728
Canister filters, such as those for example used as automobile oil filters, water filter, or air filters, have historically consisted of pleated filter material formed into a cylinder shape around a perforated center core and placed in an enclosed canister. The filter material used in such canister filters is primarily a treated paper-type media that is unwound from large rolls, pleated, and slit to width. The media may also be cured depending on the type of treatment used. The pleated media strips are then count cut into blocks having a specified number of pleats per block. Once in blocks of the correct size and pleat number, the pleated blocks are formed into a hollow cylinder shape with the ends thereof secured in some manner to hold the cylinder shape. A center core may also be inserted into the hollow center of the cylinder, if desired. The pleated filter material has traditionally been held in its cylindrical configuration by one or more metal clips, or by lapping the outermost pleats or by tying a string around the cylinder to hold it in shape during the next assembly procedure. This cylindrical assembly can then be capped on one or both ends by circular ring shaped end caps. This pleated filter sub-assembly may then be inserted in a canister and secured by another circular ring shaped end cap. The center core, clips, end caps and canisters have usually been formed from metallic material that may or may not be recyclable when the filter is disposed of. Formation of the hollow cylinder-shaped filter element from the pleated blocks of filter material has been achieved by many means, including manual, semi-automatic and automatic formation. The manual and semi-automatic methods are slow and costly, and even the automatic systems available to date have inefficiencies and other drawbacks. In addition, the current automatic systems available are designed to produce filters having metal components. However, with the current emphasis on environmental and waste disposal concerns both in the U.S. and internationally, the trend in filter formation is toward metal-free filter assemblies. New car engines, especially foreign models, are being manufactured with permanent core substitutes within the engine at the filter mounting location, thereby eliminating the need for metal center cores in the filter assemblies. New methods for filter joining are also being pursued to eliminate the need for metal clips or metal end caps. Reusable or recyclable metal canisters are also being developed wherein a used filter assembly may be separated into the metallic canister and end caps, and the non-metallic disposable pleated filter element. Until now automated equipment capable of cost effective and efficient production of such metal-free pleated filter elements has not been available.
2023-09-24T01:27:13.970301
https://example.com/article/3762
<?xml version="1.0" encoding="UTF-8"?> <!-- /** * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ --> <sections xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="urn:magento:mftf:Page/etc/SectionObject.xsd"> <section name="AdminSearchTermsPageFormFieldsSection"> <element name="query_text" type="input" selector="#query_text"/> <element name="store_id" type="select" selector="#store_id"/> <element name="redirect" type="input" selector="#redirect"/> <element name="display_in_terms" type="select" selector="#display_in_terms"/> </section> </sections>
2023-09-25T01:27:13.970301
https://example.com/article/1945
Q: Get deobfuscated typescript callstack from obfuscated javascript code Problem: I have log files from a server, which contain the callstacks from the thrown error, that triggered the creation of this log file. The server application is written in typescript with nodejs but gest transpiled to javascript, and the the javascript code gets obfuscated with the google closure compiler. Now my callstack is rather hard to interprete, which i sought to change by deobfuscating the js code, using a source map created by the closure compiler and then, again using a source map, "untranspile" the js callstack to the typescript callstack. My limitations I have access to the source maps, the source code (ts and js) and the obfuscated code, but i cant change the code itself, so im stuck with the current callstacks. I also have access to all options and the code/tool that obfuscates the code, so maybe i store some needed information in a file (information that is not presented in the source map) like additional mappings. Ideas and Attempts First attempt was to simply interprete the source maps and with that information deobfuscate the callstack (deobfuscating is the hard part), but i after trying to understand the way the cc creates the source maps I had some problems: The cc doesn't just map one name to another, because he reuses certain names multiple times(like a, f or these kind of "names"). So there might be a function with some anonymous functions or nested functions, where the name f is being used several times, but has a different meaning in every context, due to the scopes. Next idea was simply trusting the callstack. To understand what i mean, you have to understand( if i understood that correct) how the cc creates and manages the mappings: return method.call(thisObj, args[0], args[1]); This line is obfuscated to this(i left the whitespaces to understand the indexing better): return f.call(d, a[0], a[1]); Now there are several mappings created for this single line, a single mapping looking like this: export interface MappingItem { source: string; generatedLine: number; generatedColumn: number; originalLine: number; originalColumn: number; name: string | null; } The only important information in this mapping instance are the columns and the name. Some mappings contain a name others not. Those not containing names are used to build somes sort of scope around those having names, in order to find out where a name/replaced name started and ended(index). An example of this logic using the two statements above: Generated │ Original │ Name │ Scope 0 │ 16 │ null │ ━━━┓ 15 │ 23 │ method │ x │ 16 │ 23 │ call │ x │ 21 │ 23 │ null │ ━┓ │ 22 │ 35 │ thisObject │ x│ │ 23 │ 23 │ null │ ━┛ │ 25 │ 44 │ args │ x │ 26 │ 44 │ null │ ━┓ │ 27 │ 49 │ null │ ?│ │ 28 │ 44 │ null │ ━┛ │ 29 │ 23 │ null │ ━━┓│ 31 │ 53 │ args │ x ││ 32 │ 53 │ null │ ━┓││ 33 │ 58 │ null │ ?│││ 34 │ 53 │ null │ ━┛││ 35 │ 23 │ null │ ━━┛│ 36 │ 16 │ null │ ━━━┛ Using this callstack, i want to resolve everything from applications.js. All the transpiled and obfuscated js code is in there. Rest is irrelevant: at do2 (c:\Users\me\test\js\test.js:14:11) at do1 (c:\Users\me\test\js\test.js:11:5) at Server.<anonymous> (c:\Users\me\test\js\test.js:6:5) at f (c:\Users\me\build\transpiled\obfuscated\application.js:235:18) at Object.a.safeInvoke (c:\Users\me\build\transpiled\obfuscated\application.js:285:27) at Server.g.getWrappedListener (c:\Users\me\build\transpiled\obfuscated\application.js:3313:17) at emitTwo (events.js:106:13) at Server.emit (events.js:191:7) at HTTPParser.parserOnIncoming [as onIncoming] (_http_server.js:546:12) at HTTPParser.parserOnHeadersComplete (_http_common.js:99:23) Now using the info from the sourcemap it is easy to get the original line and column, but the names are not. I attempted to first try without info from the code, by ready the previous position(line and column) to infere to the name of the next line. So if i wanted to resolve f, i would have looked where it was called(285:18) and then look it up in the source map, where i would find its name. But for this process I always need to know where it was called. Now thats the problem. Because if the function would've been stored inside a variable, or would've been anonymous or something else like that, i have a problem. f.call(d, a[0], a[1]); Also did i notice, that certain methods like call in this context, don't get listed in the callstack, which is another problem. So now i can atleast resolve names if i can be sure if i know where they were called and if they are in the callstack. But i don't a half solution like this. My second attempt was using a promising javascript module I found: stacktrace-js This module is made for browser js though and has poor typescript documentation/typings, although it is clearly written in typescript. This also results in next to no support for reading in files locally, because they always get called with xmlhttprequests. There are some workarounds to that part, but the module is so complex(probably due to being transpiled code) that there are other parts too that do not support me, using local files. Its just too much to rewrite/change it to work with nodejs properly.... Do you know a more clean way of doing it with the module? I also thought of using a source code parser to got more context to support the source maps (in case of those vicious .call methods). Maybe i could write my own source code parser if there was a documentation to all the exceptions i have to watch out when parsing the code and interpreting it... Maybe there is another way to this that i currently oversaw... A: Composed Source Maps First off, ensure you have a fully composed source map. You mention two tools that generate source maps, the typescript compiler and closure compiler. Was closure-compiler provided input source maps? If so, it would output a source map that mentions the original files. If not, you'll have twice the work cut out for you. It's possible to use the source-map package to compose source maps after the fact. Properly Understand Source Maps It's clear from your original question that you don't fully understand a source map. For instance, entries without a name are often language semantics. For example: document.createElement('div') A source map could contain mappings for document and createElement, but also for the . and ( characters. There is no scope involved here. Visualization Tools There are multiple visualization tools that can assist here. Some of my favorites are: http://sourcemapper.qfox.nl/ https://sokra.github.io/source-map-visualization/ The idea here is that you load the source maps and sources in the tool, then click around to see how things mapped. It takes a bit of poking around but you should be able to find the line and column in the original source that matches the line/col information in the stack trace. Automate The Process Tools like https://sentry.io/ exist for a reason. It will automatically de-obfuscate a call stack for you.
2024-03-30T01:27:13.970301
https://example.com/article/6939
/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.yarn.server.nodemanager.containermanager.application; public enum ApplicationEventType { // Source: ContainerManager INIT_APPLICATION, INIT_CONTAINER, FINISH_APPLICATION, // Source: LogAggregationService if init fails // Source: ResourceLocalizationService APPLICATION_INITED, APPLICATION_RESOURCES_CLEANEDUP, // Source: Container APPLICATION_CONTAINER_FINISHED, // Source: Log Handler APPLICATION_LOG_HANDLING_INITED, APPLICATION_LOG_HANDLING_FINISHED, APPLICATION_LOG_HANDLING_FAILED }
2024-02-03T01:27:13.970301
https://example.com/article/4406
Q: Retrieve subcategory ids as an array I have three columns in my category table: ID, name and parent_id. If the category is parent there is 0 under the parent_id, if it's not parent category id is recorded instead. I would like to get all subcategory ids with one parent category id as an array. How is that possible using php? Can anyone please help? Thanks in advance A: This is the simplest solution I can think of right now, for more you need to give us more code, that you have written so far, and information on where you were stuck. $result = mysql_query("SELECT id FROM categories WHERE parend_id='some_id'"); $categories = array(); while($row = mysql_fetch_array($result)) { $categories[] = $row["id"]; }
2023-08-17T01:27:13.970301
https://example.com/article/7242
The intermittent energization of such load-operating impedance elements may be controlled by diverse command means responsive to one or more variables such as temperature and/or time. U.S. Pat. No. 3,948,441 to Perkins et al., for example, describes a two-wire circuit including a thermostatic switch whose set point is periodically changed by a timing mechanism in order to maintain different mean room temperatures by day and at night. Such a time-dependent variation in the operating point of a switch responsive to an external parameter could also be based on seasonal rather than diurnal changes, if desired. In a system of this nature it is of course necessary that the thermostatic or other command means (possibly including a timer) remain operational even during OFF periods of the controlled load impedance. Thus, the above-identified Perkins et al. patent teaches the provision of a storage battery which is charged from the supply when the thermostatic switch is open and which supplies the timing mechanism with the necessary operating energy.
2024-07-20T01:27:13.970301
https://example.com/article/6555
WARNING!! MINOR SPOILERS TO FOLLOW. RELAX, I’M WITHHOLDING 90 PERCENT OF THE SURPRISES, I PROMISE: About a half-hour into “Batman v Superman: Dawn of Justice,” I was starting to feel this could be one of the best superhero movies of the last 20 years. Alas, we go from spectacular to solid, from great to good. That said, Zack Snyder’s hotly anticipated showdown of two great DC Comics icons is hardly a disappointment — and please see it on the biggest IMAX screen within 50 miles of your home if you can. “Dawn of Justice” is a dark-palette feast for the eyes, with some memorable set pieces, just the right amount of dark humor, strong performances and so many inside references and hints of characters and films to come there could be an entire day of Comic-Con panels just about the spoilers and the teasers and the “WHOA!” moments. In an opening flashback to 1982, young master Wayne and his parents are exiting a movie theater when tragedy strikes. (We must be up to a dozen movies and television shows that have depicted the brutal murders of Bruce’s beloved mother and father.) The scene is filled with some haunting and chilling images, e.g., Bruce’s mother’s pearls getting snagged over the barrel of a gun in her last breathing moments. Cut to present day and a title card reading: “MANKIND IS INTRODUCED TO THE SUPERMAN” I love that. We’re plunged into a breathtaking sequence in which we see the epic final battle between Superman (Henry Cavill) and Gen. Zod in which half of Metropolis was leveled — but it’s from the viewpoint of none other than Bruce Wayne (Ben Affleck), who apparently now has headquarters in Metropolis. Snyder films the scene with gritty realism, including some shots that seem deliberately to pay homage to 9/11. Even though WE know Superman was on the side of good and Zod was evil on that fateful day, Bruce Wayne and nearly all of the citizens of Metropolis had no idea what was transpiring. Now here’s where “Dawn of Justice” gets a little murky. It seems as if Metropolis (home of Clark Kent/Superman, Lois Lane, the Daily Planet, etc.) is practically a twin city with Gotham (home of Bruce Wayne/Batman, Alfred the butler et al). In a scene where Bruce Wayne shows up at a party hosted by young Lex Luthor (Jesse Eisenberg), Lex says, “You should hop over the harbor more often.” Some 18 months later, Superman is well established as a good guy. There’s even a Heroes Park (built by Lexcorp!), with a giant statue of Superman. When the Man of Steel performs amazing rescue missions around the globe, some kneel and bow their heads, or reach out to try to touch him, treating him as a deity from the heavens. Others are expressing concern about Superman’s limitless powers. Look at all the collateral damage that occurs whenever Superman swoops in and saves the day. (Hooray. For years I’ve been wondering why the Avengers and the X-Men and Superman and Batman, not to mention the mortal action heroes of the “Die Hard” and “Fast and Furious” and James Bond movies, almost never even pause to consider how many innocent lives are lost, how many cities are destroyed, as they duke it out with the bad guys.) Holly Hunter delivers strong, sharp-edged work as a Kentucky senator who wants to hold hearings to see if Superman should be held accountable for deaths that have occurred when he’s swooping in to save the day. Meanwhile, Bruce Wayne/Batman is angry, frustrated and exhausted after 20 years of battling criminals in Gotham (and presumably Metropolis). At this point Batman is in full vigilante mode, literally branding criminals with the Batman logo before serving them up to authorities. Even Bruce’s loyal butler Alfred (the magnificent Jeremy Irons) is in unshaven, deeply cynical mode, spouting out Shakespearean lines about the nature of justice and muttering about his boss never settling down and starting a family. Snyder and screenwriters Chris Terrio and David S. Goyer raise some interesting questions about humankind’s love/fear/worship/hate relationship with all-powerful beings, whether they are God or Allah or Buddha or Superman. At times the metaphors get a bit heavy-handed, as when protesters in Washington, D.C., hoist signs that read, “SUPERMAN = ILLEGAL ALIEN.” We get it, we get it. Here’s what rocks. We all know Batman, even with all his fighting skills and his cool toys and his cunning, would be no match one-on-one against Superman. “Dawn of Justice” figures out a way to level the playing field and then some. And though Gal Gadot’s Diana Prince/Wonder Woman sometimes seems crowbarred into the plot, there are a couple of moments guaranteed to get the hardcore geek base, well, geeked. All the Internet resistance to Affleck being cast as Batman seems silly when you see him sharing the screen with Cavill, as Affleck is easily the superior actor. (Cavill is solid, but there’s not all that much difference in his facial expressions registering anger, fear, pain or love. He winces quite a bit.) There’s not a moment when we don’t believe Affleck as Bruce Wayne or as Batman. Amy Adams’ Lois Lane is a modern, self-sufficient, strong woman — but she still needs rescuing by Superman every other week. Jesse Eisenberg’s twitchy, self-conscious mannerisms can be irritating in some performances, but he’s a creepy delight here as Lex Luthor. First-rate actors such as Diane Lane and Laurence Fishburne sparkle in small roles. With a running time of 2 hours, 33 minutes, “Dawn of Justice,” like most superhero movies, just keeps on coming and coming — especially in the climactic battle sequence, which isn’t all that different from the climactic battle sequences in a dozen other superhero movies. And the final surprise will come as a surprise to just about no one. When it sings, “Dawn of Justice” is a wonder. When it drags, it still looks good and offers hints of a better scene just around the corner. ★★★ Warner Bros. presents a film directed by Zack Snyder and written by Chris Terrio and David S. Goyer, based on characters from DC Comics. Running time: 153 minutes. Rated PG-13 (for intense sequences of violence and action throughout, and some sensuality. Opens Thursday at local theaters.
2023-08-16T01:27:13.970301
https://example.com/article/5575
Domenico de' Marini (patriarch) Domenico de' Marini (died 1635) was a Roman Catholic prelate who served as Titular Patriarch of Jerusalem (1627–1635), Archbishop of Genoa (1616–1635), and Bishop of Albenga (1611–1616). Biography On 11 April 1611, Domenico de' Marini was appointed during the papacy of Pope Paul V as Bishop of Albenga. On 1 May 1611, he was consecrated bishop by Marcello Crescenzi (bishop), Bishop of Assisi, with Virgilio Fiorenzi, Bishop of Nocera Umbra, and Luca Semproni, Bishop of Città di Castello, serving as co-consecrators. On 18 July 1616, he was appointed during the papacy of Pope Paul V as Archbishop of Genoa. On 15 November 1627, he was appointed during the papacy of Pope Urban VIII as Titular Patriarch of Jerusalem. He served as Titular Patriarch of Jerusalem until his death in February 1635. While bishop, he was the principal consecrator of Giovanni Domenico Spinola, Archbishop of Acerenza e Matera (1630). References External links and additional sources (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) Category:17th-century Roman Catholic archbishops Category:Bishops appointed by Pope Paul V Category:Bishops appointed by Pope Urban VIII Category:1635 deaths
2024-04-11T01:27:13.970301
https://example.com/article/5455
943 F.2d 58 NOTICE: Although citation of unpublished opinions remains unfavored, unpublished opinions may now be cited if the opinion has persuasive value on a material issue, and a copy is attached to the citing document or, if cited in oral argument, copies are furnished to the Court and all parties. See General Order of November 29, 1993, suspending 10th Cir. Rule 36.3 until December 31, 1995, or further order. UNITED STATES of America, Plaintiff-Appellee,v.Fernando Antonio LARGO-MONTENEGRO, a/k/a/ NicolasBeccera-Lopez, Defendant-Appellant. No. 90-4050. United States Court of Appeals, Tenth Circuit. Sept. 5, 1991. Before McKAY, SEYMOUR and EBEL, Circuit Judges. ORDER AND JUDGMENT* EBEL, Circuit Judge. 1 After examining the briefs and appellate record, this panel has determined unanimously that oral argument would not materially assist the determination of this appeal. See Fed.R.App.P. 34(a); 10th Cir.R. 34.1.9. Therefore, the case is ordered submitted without oral argument. 2 We address three issues: (1) whether the police officer committed a pretextual stop when he pulled the defendant-appellant over for weaving into the emergency and oncoming traffic lanes; (2) whether the district court abused its discretion in failing to give the jury a "mere-presence" instruction; and (3) whether the defendant-appellant's sentence was proper under the United States Sentencing Guidelines. We hold that a reasonable Utah county sheriff would have pulled over the defendant-appellant for weaving into the oncoming traffic and emergency lanes, and, therefore, we agree with the district court that the stop was not pretextual. We hold that the district court did not abuse its discretion in refusing to give the jury a "mere-presence" instruction. Finally, on the record before us, we are unable to hold that the defendant-appellant was improperly sentenced under the United States Sentencing Guidelines. The United States District Court for the District of Utah is AFFIRMED. FACTS 3 On October 2, 1989, Emery County Sheriff Richard Graham was patrolling Interstate 70. Graham, who had just finished issuing a warning ticket to a motorist for speeding, was waiting to pull off from the shoulder into the eastbound flow of traffic proceeding along Interstate 70 when Fernando Antonio Largo-Montenegro, the defendant-appellant, drove by him in a Volkswagon Camper-Van. Graham entered the eastbound flow of traffic and followed the defendant for approximately two and one-half miles. During that time, Graham witnessed the defendant cross the center line to the left three times and wander across the emergency line to the right once. Graham, suspecting that the defendant may have been intoxicated, pulled the defendant over. The defendant's registration papers and license appeared to be in order, and the district court found that the officer returned them to the defendant. Graham thereafter asked the defendant whether he was carrying any controlled substances. The defendant indicated that he was not, and Graham asked him for permission to search the van. The defendant consented, and Graham discovered ninety-nine kilograms of cocaine hidden in the roof of the van. The defendant was indicted by a Federal Grand Jury for violating 21 U.S.C. § 841(a)(1), was found guilty, and was then sentenced to a 235 month term pursuant to the United States Sentencing Guidelines on March 14, 1990. The defendant filed his notice of appeal on March 26, 1990. DISCUSSION 4 The defendant raises three issues on appeal. The first issue he raises is whether the district court erred in holding that Graham's decision to stop the defendant was not pretextual. The objective test is used to determine whether a stop is pretextual: "[A] court should ask 'not whether the officer could validly have made the stop, but whether under the same circumstances a reasonable officer would have made the stop in the absence of the invalid purpose.' " United States v. Guzman, 864 F.2d 1512, 1517 (10th Cir.1988) (citing United States v. Smith, 799 F.2d 704, 709 (11th Cir.1986)) (emphasis in the original). 5 Graham testified that he witnessed the defendant weaving across the both the center line to the left and the emergency lane line to the right. R.Vol. I at 13 & 46. Although the defendant disputed Graham's testimony, Id. at 92, the district court found Graham's testimony to be credible. We cannot on this record reject the district court's decision to find Graham's testimony to be the more credible. 6 Once we accept the district court's finding that the defendant was weaving, we must determine whether a reasonable officer would have stopped the defendant on the basis of the weaving alone. We have once before visited this issue and have held that where a motorist is weaving, the officer is justified in stopping the car. See United States v. Cheatwood, 575 F.2d 821, 826 (10th Cir.1978), cert. denied, 439 U.S. 853 (1978). Therefore, under the facts of this case, Graham's stopping of the defendant was not pretextual. 7 The second issue the defendant raises is whether the district court erred in refusing to give the jury a "mere presence" instruction.1 We review the district court's decision under an abuse of discretion standard. See United States v. Suntar Roofing, 897 F.2d 469, 473 (10th Cir.1990). Where the instructions "as a whole adequately state [ ] the law, the refusal to give a particular instruction is not an abuse of discretion. Id. Instruction seventeen in particular made it clear that in order to find the defendant guilty of possessing the cocaine, the jury had to find "beyond a reasonable doubt that the defendant knew that he possessed the narcotics, and that his possession was not due to carelessness, negligence, or mistake." (emphasis added). Further, instruction eighteen explained that "[the jury] may find that the defendant acted knowingly if [the jury] find[s] beyond a reasonable doubt that the defendant was aware of a high probability that [e.g., drugs were in his automobile] and deliberately avoided learning the truth." While we agree with the defendant that his proposed instruction would have accurately described the law to the jury, we cannot say that on a whole that the instructions as given did not. 8 The last issue the defendant raises is whether the district court applied the guidelines improperly in sentencing him to a term of 235 months. The defendant's appellate counsel admits in his brief that the defendant's trial counsel did not argue to the district court that the defendant's sentence was calculated incorrectly pursuant to the guidelines. Instead, the defendant's trial counsel merely complained that the imposition of the guidelines led to too harsh a sentence. As the defendant's appellate counsel admits in his brief, this court is not in a position to adjust the sentences imposed pursuant to the guidelines simply because they may seem unduly harsh. Therefore, in the absence of a specific complaint regarding the calculation of the defendant's sentence pursuant to the guidelines, we must AFFIRM the district court. In all respects, the district court is AFFIRMED. * This order and judgment has no precedential value and shall not be cited, or used by any court within the Tenth Circuit, except for purposes of establishing the doctrines of the law of the case, res judicata, or collateral estoppel. 10th Cir.R. 36.3 1 Defendant's proposed instruction read as follows: "You are instructed that there must be some evidence which connects the Defendant to the prohibited substance. Proof as to the physical proximity to the controlled substances in and of itself is not sufficient to establish either actual or constructive possession. Presence in the area where the narcotic drug is discovered, in and of itself, is not sufficient to support a finding of possession. Also, association with the person who does control the drug or property in and of itself is not sufficient to support a finding of possession."
2024-05-26T01:27:13.970301
https://example.com/article/8245
Contact Hononton Cottage Directions The nearest main road (5 miles) is the A21 from Sevenoaks to Hastings that links into M25, M26 and M20. M25 Junction 5 is about 30 minutes away from Brenchley. On A21 south of Tunbridge Wells Interchange (A264) at the large roundabout at Kippings Cross and just before the BP Service Station turn left onto B2160 to Matfield. Pass the green and pond on your left and turn right straight opposite The Poet Pub signed Brenchley and Horsmonden. On entering the village pass the garage and school on the left and shortly turn left opposite the Memorial Hall and Sports Bar – up Blind Lane, Brenchley Road. Just over the brow go straight over the cross roads at Pixot Hill signed Castle Hill (Crook Road). See photo below... The viewpoint on the left is worth looking at for the bronze orientation point of the vista to the North. Pass three oasts (white topped cowls) on the left and as the roads straightens slow at the Neighbourhood Watch sign where you turn into Palmers Green Lane (Hononton Cottage is signed). If you miss the turning you will end up at Castle Hill and its pub! Drive very slowly please as the lane is narrow and often has farm traffic and horses about. The cottage is the last house on the left before going into Hononton Farm. From Paddock Wood You can also approach from Paddock Wood (B2160) from M20/M26 along Seven Mile Lane and passing the Beltring Hop Farm before entering Paddock Wood and then following the directions above from the crossroads in Matfield (turn left opposite The Poet Pub signed Brenchley and Horsmonden) B&B Our two rooms have been sympathetically modernised, with two double aspected More...
2024-06-21T01:27:13.970301
https://example.com/article/1046
1. Introduction =============== Therapeutic enteral nutrition describes the provision of defined nutritional support with the goal of treating a disease state. Despite a long history using therapeutic enteral nutrition, the critical mechanisms of action by which dietary changes can exert beneficial effects in specific human disorders are incompletely understood. Multiple hypotheses have been put forward in this regard, which include reduction in antigen exposure, overall nutritional repletion, improvement in intestinal barrier function, provision of micronutrients and reduction in dietary fat or carbohydrate, leading to reduced byproducts producing inflammation \[[@B1-nutrients-06-05298],[@B2-nutrients-06-05298]\]. Exclusive enteral nutrition (EEN) is a subtype of therapeutic nutrition where dietary intake is confined to the persistent delivery of the same complete food preparation. Most commonly, EEN is achieved by liquid enteral formulas. Liquid formulations of EEN are typically divided into either being elemental or polymeric. Elemental formulas deliver a protein source as individual amino acids, and polymeric formulas provide intact protein. EEN has been most commonly employed to treat Crohn's disease (CD) \[[@B3-nutrients-06-05298]\]. CD is an incurable subtype of inflammatory bowel diseases (IBDs) characterized by transmural inflammation of the intestine anywhere from the mouth to the anus. The pathogenesis of CD is believed to involve the interaction between a defective intestinal barrier, environmental risk factors, the intestinal microbiome and host genetics \[[@B4-nutrients-06-05298],[@B5-nutrients-06-05298]\]. Many of these biological systems, apart from genetics, are suspected to be modulated by EEN \[[@B2-nutrients-06-05298]\], which may explain its efficacy in treating CD. More recently, the microbiome related effects of this therapeutic nutrition are coming into focus. EEN has also been explored in the treatment of other autoimmune diseases, such as juvenile idiopathic arthritis \[[@B6-nutrients-06-05298]\] and ulcerative colitis \[[@B7-nutrients-06-05298]\], but these studies are rather limited. Therefore, this review will focus on CD with respect to the microbiome-related influences of EEN. 2. Treatment of CD with EEN =========================== Induction and maintenance of remission (symptom free disease) are the current treatment goals for CD. The available medical therapies to achieve these goals include 5-aminosalicyclic acid (5-ASA) derivatives, immunosuppressive or immunomodulator agents (azathioprine, methotrexate), biologic medications (molecularly-engineered antibodies against key components of the human intestinal inflammatory cascade: infliximab, adalimumab, certolizumab, natalizumab, vedolizumab, *etc.*) or steroids (prednisone, budesonide). For severe CD, induction is typically achievable with either biologics or steroids. Thereafter, the continuation or transition to immunomodulators or biologic agents can substantiate remission. This approach, however, has limitations, including increased risk of adverse events (pancreatitis, hepatitis, neutropenia/bone marrow suppression) and potential long-term complications, such as a higher risk of malignancies \[[@B8-nutrients-06-05298],[@B9-nutrients-06-05298]\]. Secondary to the limitations of conventional medical treatments, EEN has been explored as an adjunct or monotherapy for CD. Since steroids are commonly used to induce remission, studies compared the efficacy of EEN to steroids during early CD treatment. Small, randomized trials found that children treated with elemental nutrition or steroids had similar rates of clinical improvement. Elemental EEN, however, was superior to steroids in terms of improved growth velocity \[[@B10-nutrients-06-05298],[@B11-nutrients-06-05298]\]. Though these results were encouraging, the treatment durations were only 4--6 weeks, leaving questions about the potential for EEN as a maintenance therapy. Another limitation of these studies was non-compliance, since 8%--11% of children were unable to tolerate the elemental diet due to bad taste. To overcome the limitations of elemental EEN, some trials have used polymeric formulas to induce or maintain remission in CD patients. Early investigations comparing polymeric formulations to steroids suggested that steroids were superior for inducing remission \[[@B12-nutrients-06-05298],[@B13-nutrients-06-05298]\]; however, more recent work demonstrated equal efficacy of the two treatments \[[@B14-nutrients-06-05298],[@B15-nutrients-06-05298]\]. Comparison between these trials is difficult, since they used different formulations of polymeric nutrition and for varied durations. Small cohort studies have examined if patients maintained on EEN (elemental or polymeric) remain in remission, but the results suggested that approximately 40%--60% will relapse within a year \[[@B16-nutrients-06-05298],[@B17-nutrients-06-05298],[@B18-nutrients-06-05298]\]. However, a significant proportion of this relapse rate may be attributed to discontinuation of EEN, which occurred in 20%--50% of the patients. These studies indicate that elemental and polymeric nutrition have equal therapeutic efficacy in CD, so either may be considered. Despite encouraging efficacy results for polymeric nutrition, high relapse rates likely arising from patient non-compliance and deliberate discontinuation due to taste limit EEN as a maintenance therapy for CD. The discussed studies predominantly used clinical scores (Crohn's Disease Activity Index, CDAI) to determine treatment efficiency. More recently, the demonstration of intestinal mucosal healing is becoming a favored treatment endpoint \[[@B19-nutrients-06-05298]\]. Mucosal healing has been correlated with reduced risk of disease relapse, for example \[[@B20-nutrients-06-05298]\]. Steroids do not effectively induce mucosal healing, but several studies have shown that EEN can \[[@B21-nutrients-06-05298],[@B22-nutrients-06-05298],[@B23-nutrients-06-05298],[@B24-nutrients-06-05298]\]. Borrelli *et al.* demonstrated in a randomized controlled trial of 37 children with CD that EEN induced mucosal healing in a greater proportion of patients compared to corticosteroids (*p* \< 0.001) at 10 weeks. A single small cohort trial observed that polymeric nutrition induced mucosal healing by magnetic resonance enterography imaging \[[@B25-nutrients-06-05298]\]. Magnetic resonance enterography (MRE) can noninvasively detect small bowel mucosal damage with a high sensitivity \[[@B26-nutrients-06-05298],[@B27-nutrients-06-05298]\]. These studies suggest that EEN may be an efficacious therapy for healing mucosal injury related to CD, but definitive conclusions are limited by patients frequently receiving concomitant IBD medications (6-mercaptopurine, mesalamine, *etc.*). Further well-designed studies will be needed to confirm these findings while controlling for other confounding factors. Based on the above, EEN appears to be as efficacious and perhaps even superior to steroids, for inducing remission in CD. EEN has several other benefits compared to steroids, including improved growth \[[@B10-nutrients-06-05298],[@B11-nutrients-06-05298]\] and quality of life \[[@B28-nutrients-06-05298]\], optimized bone metabolism \[[@B29-nutrients-06-05298]\] and induction of mucosal healing \[[@B21-nutrients-06-05298],[@B22-nutrients-06-05298],[@B23-nutrients-06-05298]\]. Another common complication of CD is intestinal stricturing, which can necessitate intestinal resections. The risk of recurrence and subsequent surgeries remains high after resections \[[@B30-nutrients-06-05298]\]. Interestingly, a recent prospective cohort study from Japan indicated that even partial (50% caloric requirements) delivery of EEN can significantly reduce the endoscopic (mucosal) recurrence of the disease at the surgical site after a year of surgery \[[@B31-nutrients-06-05298]\]. The overall need for re-operation tended to be less as well (*p =* 0.08) in the partially EEN-treated group. Despite the encouraging findings above, EEN has to be further explored to clearly determine its therapeutic potential as an induction and/or maintenance therapy for CD. The questions of its utility as a mono- *versus* combination therapy and as exclusive *versus* partial nutrition remain to be answered, as well. Community-based data from Spain suggested that physicians are frequently (63%) recommending EEN to CD patients \[[@B32-nutrients-06-05298]\], but several barriers (poor long-term compliance, lack of optimized teaching, variable patient acceptance) create practical limitations for exploring the full potential of this promising treatment modality. Additionally, the mechanism of action for EEN would be important to define for the optimization of this practically challenging treatment, which carries a desirable side effect spectrum, compared to other available medical therapies. In the next section, we will review our limited understanding of EEN biology. 3. EEN Mechanisms of Action =========================== Several hypotheses have been proposed to explain the efficacy of EEN for CD. The most likely mechanisms include direct anti-inflammatory effects, improvement of intestinal barrier function and modulation of the intestinal microbiome ([Figure 1](#nutrients-06-05298-f001){ref-type="fig"}). ![Schematic representation of the gut microbiota, the intestinal epithelium and immune system; and how exclusive enteral nutrition (EEN) may affect these systems. Crohn's disease is associated with dysbiosis of the gut microbiota, increased permeability of the intestinal epithelium and dysregulated immunity. Studies suggest that EEN can alter the composition of the gut microbiota (A), reduce intestinal permeability through modulation of tight junctions either directly (B) or through modulating the intestinal microbiome (A) and downregulate the production of inflammatory cytokines either directly (C) or through modulating the intestinal microbiome (A).](nutrients-06-05298-g001){#nutrients-06-05298-f001} CD is characterized by increased production of multiple pro-inflammatory cytokines (TNF-alpha, IL-1, IL-6, *etc.*) \[[@B33-nutrients-06-05298]\]. Studies in children have shown that treatment with polymeric enteral nutrition can downregulate mucosal concentrations of these cytokines, as well as improve mucosal integrity \[[@B34-nutrients-06-05298]\]. Similar results were found using *in vitro* techniques, where pro-inflammatory signaling pathways were downregulated in the presence of polymeric formula \[[@B35-nutrients-06-05298],[@B36-nutrients-06-05298]\]. These studies, however, were limited, since a precise molecular mechanism could not be defined, and the authors acknowledged the need for further work in this area. Mucosal barrier integrity is vital to the proper functioning of the intestines. Mucosal barrier function is maintained in part by structures designated as tight junctions, which join epithelial cells and participate in the regulation of ion, nutrient and water transport. In CD, the mucosal barrier is dysfunctional, which can be beneficially modified with EEN \[[@B37-nutrients-06-05298]\]. *In vitro* models using colonic epithelial cells have demonstrated that EEN can reduce intestinal permeability after the induction of colitis \[[@B38-nutrients-06-05298],[@B39-nutrients-06-05298]\]. Interestingly, clinical studies have also shown that first-degree family members of CD patients have increased intestinal mucosal permeability when compared to non-IBD controls \[[@B40-nutrients-06-05298]\]. These findings suggest that patients with CD have intrinsic mucosal barrier defects, which could be modulated by EEN. However, the exact means by which EEN may improve mucosal permeability are not well understood. Recent advances in sequencing technologies and bioinformatics have also allowed for examining the potential influence of EEN on the intestinal microbiome, which is another critically important biological system in the pathogenesis of CD. We will next review the human gut microbiome and its potential importance in CD and EEN therapy. 4. Microbiome Basics ==================== The human intestinal microbiome comprises a diverse, highly-interactive ecological system of bacteria, Archaea, viruses and fungi \[[@B41-nutrients-06-05298]\]. Classically, the intestinal microbiome was characterized by standard microbiological techniques, but those were inherently limited by the inability to culture over 60% of intestinal bacteria. Recently, investigators have leveraged the conserved 16S rRNA gene present in all bacteria to characterize the intestinal microbiome with sequencing techniques. This gene has taxon-specific variable regions, the sequencing of which can allow for bacterial classification. Additional techniques have been developed to sequence all genes present in a tissue sample (whole genome sequencing, WGS) and characterize the overall gene content attributed to microbes \[[@B42-nutrients-06-05298],[@B43-nutrients-06-05298]\]. These techniques allow for bacterial classification and examination of overall gene content, but lack the ability to provide information about the actual biological activity or function of a specific microbiome. The functional activity of microbiomes is more specifically examined by the maturing fields of metatranscriptomics and metabolomics \[[@B42-nutrients-06-05298],[@B44-nutrients-06-05298]\]. In parallel with the application of these new sequencing techniques, bioinformatic tools have been developed to process and interpret large datasets \[[@B42-nutrients-06-05298],[@B45-nutrients-06-05298],[@B46-nutrients-06-05298]\]. These tools enable the generation of common ecological measures (richness and diversity) to characterize the intestinal microbiome community. Richness describes the number of unique bacterial (or other microbial) species present in a sample, and diversity accounts for both the number and the relative abundance of the different species. As microbial clinical studies incorporate these metrics, investigators are finding significant associations with multiple diseases, such as obesity \[[@B47-nutrients-06-05298]\] and IBD \[[@B48-nutrients-06-05298]\]. Results from the American Human Microbiome Project (HMP) and European metagenomics of the human intestinal tract (MetaHIT) projects have provided composition and functional information for the healthy human microbiome \[[@B49-nutrients-06-05298],[@B50-nutrients-06-05298]\]. These studies showed highly varying intestinal microbiome composition between subjects, but an overall similar functional capacity. From these and subsequent work, we gained an appreciation for the multitude of factors influencing microbiome composition (age, diet, sampling method). Microbiome composition appears to fluctuate rapidly early in life, remain relatively stable during adulthood and change again towards the seventh decade of life \[[@B41-nutrients-06-05298]\]. In addition to age, long-term dietary patterns strongly influence the intestinal microbiome \[[@B51-nutrients-06-05298],[@B52-nutrients-06-05298],[@B53-nutrients-06-05298]\]. Additionally, the intestinal microbiome can rapidly respond to short-term dietary interventions, as well, but reverts to its prior composition once the interventions cease \[[@B54-nutrients-06-05298],[@B55-nutrients-06-05298],[@B56-nutrients-06-05298]\]. Furthermore, the gut microbiome is different at the mucosal surface from that of luminal content. Therefore, the clinical sample type (feces *versus* mucosa) has to be taken into consideration \[[@B57-nutrients-06-05298],[@B58-nutrients-06-05298]\], when planning and comparing microbiome studies of the gut specifically. 5. EEN Effects on the Intestinal Microbiome =========================================== A limited number of studies have described the intestinal microbiome of healthy subjects during EEN. Using a cross-over design, Whelan *et al.* examined the effect of fructooligosaccharide and fiber supplemented EEN on intestinal microbiota. They found that total intestinal bacterial counts were reduced during EEN \[[@B59-nutrients-06-05298]\]. However, this work utilized fluorescent *in situ* hybridization (FISH) techniques, which carry significant limitations compared to the current high-throughput technologies. Subsequently, the same group re-analyzed this data to describe the change in *Faecalibacterium prausnitzii* during EEN. *F. prausnitzii* is a commensal, Gram-positive bacterium with anti-inflammatory properties, which has been implicated in CD pathogenesis \[[@B60-nutrients-06-05298]\]. Their group found significant reductions in *F. prausnitzii* abundance during fiber supplementation, which demonstrated that diet can modulate specific bacterial concentrations \[[@B61-nutrients-06-05298]\]. Associations between *F. prausnitzii*, CD and EEN will be discussed in detail in the subsequent sections. After characterizing the healthy human microbiome by state-of-the-art technology, investigators are now exploring the differences present in diseases. The term dysbiosis refers to the abnormal composition of the intestinal microbiome and has been studied in multiple disease states (obesity, diabetes, *etc.*). Reduced fecal microbiome richness \[[@B47-nutrients-06-05298]\] and diversity \[[@B62-nutrients-06-05298]\] were found in obese individuals. WGS revealed compositional differences between those with type 2 diabetes and non-diabetic controls, which may influence overall insulin resistance \[[@B63-nutrients-06-05298],[@B64-nutrients-06-05298]\]. These and many other association studies indicate that abnormal composition and subsequent pathologic functioning of the microbiome may contribute to human disease. 6. The Gut Microbiome of Crohn's Disease ======================================== The intestinal microbiome of CD patients has been found to have overall dysbiosis compared to the datasets from HMP and MetaHIT \[[@B65-nutrients-06-05298],[@B66-nutrients-06-05298]\]. Hansen *et al.* studied colon biopsy specimens from treatment-naive pediatric CD patients and detected significant reductions in diversity compared to healthy controls and patients with ulcerative colitis (UC, the other form of IBD) \[[@B65-nutrients-06-05298]\]. Gevers and colleagues examined both stool and mucosal samples from a very large cohort of treatment-naive pediatric CD patients and found modest overall differences compared to controls, which was increased in patients with higher disease activity ([Table 1](#nutrients-06-05298-t001){ref-type="table"}) \[[@B66-nutrients-06-05298]\]. Detailed bioinformatic analyses revealed further functional differences between CD and controls. CD microbiomes expressed pathways involved in inflammation and had reduced functionality related to amino acid, carbohydrate and nucleotide metabolism \[[@B66-nutrients-06-05298]\]. Other investigations in treatment-experienced CD patients have identified similar functional changes \[[@B67-nutrients-06-05298],[@B68-nutrients-06-05298]\]. nutrients-06-05298-t001_Table 1 ###### Description of mucosal microbiota changes found in treatment-naive Crohn's disease \[[@B65-nutrients-06-05298],[@B66-nutrients-06-05298]\]. Several bacterial taxa are increased or decreased compared to non-IBD controls. \* Changes in *Faecalibacterium* were inconsistent across studies, with one study reporting an increase and the other a decrease. Crohn's Disease ---------------------- ------------------------- *Enterobacteriaceae* Bacteroidales *Pasteurellaceae* Clostridiales *Fusobacteriaceae* *Erysipelotrichaceae* *Neisseriaceae* *Bifidobacteriaceae* *Veillonellaceae* *Coriobacteriaceae* *Gemellaceae* *Faecalibacterium* ^\*^ *Faecalibacterium* The role of specific bacteria in CD is less understood. The difficulties in making a definite conclusion about single species are well demonstrated by the example of *F. prausnitzii.* Previous observations noted reduced concentrations of *F. prausnitzii* in the terminal ileum of CD patients and higher concentrations correlated with reduced risk of recurrence \[[@B69-nutrients-06-05298],[@B70-nutrients-06-05298]\]. These studies, however, were confounded by examining treatment-experienced patients, where microbiome composition may have been modified by the treatments themselves \[[@B67-nutrients-06-05298],[@B71-nutrients-06-05298]\]. Explorations in treatment-naive patients led to conflicting results on *F. prausnitzii*, with one small cohort reporting higher abundance of the bacterium compared to controls \[[@B65-nutrients-06-05298]\], as opposed to a lower abundance found in a recent large-scale study \[[@B66-nutrients-06-05298]\]. These studies emphasize the complexity of the microbiome in IBD and underscore the need for careful planning (*i.e.*, accounting for confounding factors, recruiting adequate number of patients) to enable the detection of meaningful differences. These limitations have to be taken into account when interpreting the available literature on EEN-microbiome effects in CD patients. 7. EEN Induced Microbiome Changes in CD Patients ================================================ Only a few studies have examined the microbial effects of EEN in CD patients. Lionetti *et al.* reported results from a small case series of nine pediatric CD patients treated with polymeric enteral nutrition. They noted that eight of nine children obtained clinical remission, and all experienced significant shifts in intestinal microbiome composition \[[@B72-nutrients-06-05298]\]. These shifts were determined using the gel electrophoresis banding pattern, resulting in a limited depth of interrogation when compared to high-throughput technologies. Similar results were found in a study of six children with CD treated with EEN, as well as correlations between specific bacterial taxa and the degree of inflammation \[[@B73-nutrients-06-05298]\]. In a recently published work on EEN treatment for pediatric CD (utilizing gel electrophoresis and quantitative real-time PCR), investigators found decreases in overall microbiome diversity and reductions in *F. prausnitzii* abundance during EEN therapy \[[@B74-nutrients-06-05298]\]. These findings challenge the previous notions of increased microbiome diversity associated with health and higher concentrations of *F. prausnitzii* associated with reduced CD activity. In accordance with the difficulties for interpreting the role of *F. prausnitzii* in CD, some observations indicate that regardless of disease activity, the abundance of it remains low in CD \[[@B75-nutrients-06-05298]\] and can even further decrease upon clinical improvement with elemental enteral therapy \[[@B76-nutrients-06-05298]\]. Clearly, further work is required to understand the role of *F. prausnitzii* in CD and IBD in general. Such controversies emphasize the challenges of microbiome research, even in the current era of advanced technology. To gain a better understanding of EEN's effects on the intestinal microbiome, our lab explored this interaction in a mouse model. We set up the hypothesis that it is the monotonous nature of EEN that is critical to its therapeutic effect and not the liquid nature or low antigenicity of it. Healthy mice were assigned to either a single chow or alternating chows. This was meant to mimic either EEN or a more free (liberalized) diet, respectively. After 20 days of the monotonous or the alternating diet feeding, mice were given dextran sulfate sodium (DSS), an intestinal irritant that induces acute large bowel inflammation (colitis) and is an accepted model of human IBD. Mice given the single chow diets, similar to EEN, had higher overall microbiome diversity compared to alternating chow fed mice \[[@B77-nutrients-06-05298]\]. These results were consistent with the prior human findings described by Leach *et al.* \[[@B73-nutrients-06-05298]\]. However, the results of Gerasimidis and colleagues \[[@B74-nutrients-06-05298]\] oppose the observations in the murine experiment. Regardless, the mice provided alternating chow were also more susceptible to intestinal injury from DSS, supporting an association between reduced microbiome diversity and susceptibility to colitis in mammals. This observation is also consistent with the reduction of microbiome diversity in IBD patients \[[@B65-nutrients-06-05298],[@B66-nutrients-06-05298]\]. Altogether, our murine model work supported the hypothesis that the monotonous nature of EEN may be a key component to its efficacy. Epidemiologic observations correlating agricultural import with the incidence of CD in a European country further substantiated the possible validity of the "monotonous diet" hypothesis \[[@B77-nutrients-06-05298]\]. Further high-throughput studies will need to explore the effects of EEN on microbiome composition in both healthy people and CD patients to elucidate the exact effects of this nutritional therapy in health and disease. 8. Future Considerations and Conclusions ======================================== Several randomized clinical trials have shown the efficacy for partial and exclusive elemental or polymeric nutritional therapies to induce clinical improvement and even remission in CD. EEN appears to be superior to steroids with respect to the induction of mucosal healing during induction therapy and may have the potential to provide long-term remission in some cases of CD. The highlighted limitations of the existing clinical studies and the practical challenges for this drastic nutritional therapy warrant further intense work towards the optimization of this treatment modality. Though the mechanism(s) of action of nutritional therapy remains unknown, the detected changes in the intestinal microbiome composition and function induced by EEN provide new routes for research. The findings from such investigations may facilitate the development of novel treatment strategies, not only for CD, but for other autoimmune disorders, as well. The authors would like to thank the Gutsy Kids Fund, including philanthropic donation from the Karen and Brock Wagner family and other generous families. Rajesh Shah: conception, drafting and editing of the manuscript; Richard Kellermayer: conception, drafting, editing and final approval of the manuscript. The authors declare no conflict of interest.
2023-09-24T01:27:13.970301
https://example.com/article/5087
Pathology and ultrastructure of an intranuclear bacilliform virus (IBV) infecting brown shrimp Crangon crangon (Decapoda: Crangonidae). The brown shrimp Crangon crangon supports an important fishery in Europe (over 25000 t, valued at 80 million euros in 2000). Through the course of histopathological screening of crustaceans from the Clyde estuary, western Scotland, for the biological effect of contaminants, we have discovered a highly prevalent (up to 100%) non-occluded intranuclear bacilliform virus (IBV) infection in the hepatopancreatic tubule epithelia and midgut epithelia of wild C. crangon. This is the first report of an IBV in this family. We have termed this virus Crangon crangon bacilliform virus (CcBV). Histological and ultrastructural observations suggest that this virus is similar to other IBVs previously described from crabs and penaeid shrimps. The nuclei of virus-infected epithelial cells contained an eosinophilic, hypertrophied viroplasm that marginalised the chromatin of the host nucleus. Infected cells were often separated from their neighbouring cells and their nuclei appeared apoptotic. In heavily infected shrimp, apoptotic cells were expelled into the lumen of the hepatopancreatic tubule or the midgut. Following this stage, some hepatopancreatic tubules became degenerate, with remnants of the basement membrane and myoepithelial lining remaining. Transmission electron microscopy of hypertrophic nuclei revealed the presence of rod-shaped and cylindrical, envelope-bound virions. These virions did not form arrays and were not embedded within occlusion bodies, but did appear to be partially occluded in an amorphous matrix that corresponded to a granular viroplasm. The ultrastructure, morphology and size of the nucleocapsid and the complete virion aligns the virus most closely to the IBVs previously reported from other decapod crustaceans. Due to the pathological manifestation of IBV infection in C. crangon, it appears likely that it can act as a population modulator, particularly at sites where infection prevalence is high, such as that observed in the Clyde estuary.
2024-02-15T01:27:13.970301
https://example.com/article/7501
Seasonal Menu At Xross Casa in Shinjuku, they used their very popular roast beef to make their beef mountain nachos, available as a seasonal item until the end of June. Also, for a limited time, from May 15th until the end of June, roast beef and raw ham is all-you-can-eat; and with a reservation, 10 people a day can get 50% off. Xross casa, famous for it's Superb roast beef and aged raw ham all-you-can-eat deal for ¥1000, now has a new item on the menu: crispy nachos topped off with their famous roast beef. Beef mountain nachos The beef mountain nachos are ¥1,960 (tax included). Crisp nachos are covered in 3 types of cheese, bell peppers and other fresh vegetables, and their famous roast beef and it is then inserted 10 minutes in the oven. They then top off everything off with salsa sauce, sour cream. It is incredibly delicious!It goes very well with wine or beer! Xross Casa Xross Casa is an Italian bar located 3 minutes by foot from Shinjuku station. This restaurant that has appeared many times on the news, serves not only all-you-can-eat black Angus beef, but also all-you-can-eat Italian raw ham. This meat festival has started in Octover 2016 and has been wildly popular! Ever since, it became a regular on the menu. To celebrate this, until the end of June, those who make a reservation can 50% off on the seasonal menu (limited to 10 people a day). Beef mountain nachos + All-you-can-eat roast beef & raw ham plan: -Time: 5 PM, before 7 PM, and after 9 PM (reservation only)-Price: Until the end of June the beef mountain nachos are 50% off, ¥980 For the roast beef and raw ham all-you-can-eat plan:-At 5 PM & after 9 PM:¥1,000-Before 7 PM: ¥1,280(Men have to be ¥380 extra) *Conditions: -Limited to 90 minutes-Must order one drink and one food item (nachos count as a food item)-There's a charge-Coupons are not permitted-Beef mountain nachoses are only served 10 times a day (reservation only) All-you-can-drink plan: During the meat festival at Xross Casa, not only can you enjoy all-you-can-eat roast beef, but also 14 months-aged ham as an all-you-can-eat plan. You can also enjoy an all-you-can-drink plan to accompany your meal. All-you-can-drink plan:Price: ¥1,620 (90 minutes)+¥250: you can also order beer, wine and sparkling wine. *Condition: limited to those who ordered the all-you-can-eat plan. About Xross Casa: It is located 4 minutes awy from the Shinjuku JR station, and only a minute away from the Seibu-Shinjuku line. You can order roast beef, raw ham amongst other a la carte dishes, or even an Italian course meal. It is open from 5 PM to 5 am so you can enjoy delicious food at very late hours. There are also many sofa seats available so you can dine and unwind. The interior is chic and relaxing so it is perfect for a large party or a women's gathering.
2024-02-24T01:27:13.970301
https://example.com/article/6346
DEFAULT##|##Wall_inside DEFAULT##|##Wall_outside DEFAULT##|##Wall_cuts DEFAULT##|##Wall_alt1 DEFAULT##|##Wall_alt2 DEFAULT##|##Wall_alt3 DEFAULT##|##Wall_alt4 DEFAULT##|##Wall_alt5
2024-02-22T01:27:13.970301
https://example.com/article/2793
# -*- encoding: utf-8 -*- # frozen_string_literal: true # This file generated automatically from http://w3id.org/identity/v1 require 'json/ld' class JSON::LD::Context add_preloaded("http://w3id.org/identity/v1") do new(term_definitions: { "Credential" => TermDefinition.new("Credential", id: "https://w3id.org/credentials#Credential", simple: true), "CryptographicKey" => TermDefinition.new("CryptographicKey", id: "https://w3id.org/security#Key", simple: true), "CryptographicKeyCredential" => TermDefinition.new("CryptographicKeyCredential", id: "https://w3id.org/credentials#CryptographicKeyCredential", simple: true), "EncryptedMessage" => TermDefinition.new("EncryptedMessage", id: "https://w3id.org/security#EncryptedMessage", simple: true), "GraphSignature2012" => TermDefinition.new("GraphSignature2012", id: "https://w3id.org/security#GraphSignature2012", simple: true), "Group" => TermDefinition.new("Group", id: "https://www.w3.org/ns/activitystreams#Group", simple: true), "Identity" => TermDefinition.new("Identity", id: "https://w3id.org/identity#Identity", simple: true), "LinkedDataSignature2015" => TermDefinition.new("LinkedDataSignature2015", id: "https://w3id.org/security#LinkedDataSignature2015", simple: true), "Organization" => TermDefinition.new("Organization", id: "http://schema.org/Organization", simple: true), "Person" => TermDefinition.new("Person", id: "http://schema.org/Person", simple: true), "PostalAddress" => TermDefinition.new("PostalAddress", id: "http://schema.org/PostalAddress", simple: true), "about" => TermDefinition.new("about", id: "http://schema.org/about", type_mapping: "@id"), "accessControl" => TermDefinition.new("accessControl", id: "https://w3id.org/permissions#accessControl", type_mapping: "@id"), "address" => TermDefinition.new("address", id: "http://schema.org/address", type_mapping: "@id"), "addressCountry" => TermDefinition.new("addressCountry", id: "http://schema.org/addressCountry", simple: true), "addressLocality" => TermDefinition.new("addressLocality", id: "http://schema.org/addressLocality", simple: true), "addressRegion" => TermDefinition.new("addressRegion", id: "http://schema.org/addressRegion", simple: true), "cipherAlgorithm" => TermDefinition.new("cipherAlgorithm", id: "https://w3id.org/security#cipherAlgorithm", simple: true), "cipherData" => TermDefinition.new("cipherData", id: "https://w3id.org/security#cipherData", simple: true), "cipherKey" => TermDefinition.new("cipherKey", id: "https://w3id.org/security#cipherKey", simple: true), "claim" => TermDefinition.new("claim", id: "https://w3id.org/credentials#claim", type_mapping: "@id"), "comment" => TermDefinition.new("comment", id: "http://www.w3.org/2000/01/rdf-schema#comment", simple: true), "created" => TermDefinition.new("created", id: "http://purl.org/dc/terms/created", type_mapping: "http://www.w3.org/2001/XMLSchema#dateTime"), "creator" => TermDefinition.new("creator", id: "http://purl.org/dc/terms/creator", type_mapping: "@id"), "cred" => TermDefinition.new("cred", id: "https://w3id.org/credentials#", simple: true, prefix: true), "credential" => TermDefinition.new("credential", id: "https://w3id.org/credentials#credential", type_mapping: "@id"), "dc" => TermDefinition.new("dc", id: "http://purl.org/dc/terms/", simple: true, prefix: true), "description" => TermDefinition.new("description", id: "http://schema.org/description", simple: true), "digestAlgorithm" => TermDefinition.new("digestAlgorithm", id: "https://w3id.org/security#digestAlgorithm", simple: true), "digestValue" => TermDefinition.new("digestValue", id: "https://w3id.org/security#digestValue", simple: true), "domain" => TermDefinition.new("domain", id: "https://w3id.org/security#domain", simple: true), "email" => TermDefinition.new("email", id: "http://schema.org/email", simple: true), "expires" => TermDefinition.new("expires", id: "https://w3id.org/security#expiration", type_mapping: "http://www.w3.org/2001/XMLSchema#dateTime"), "familyName" => TermDefinition.new("familyName", id: "http://schema.org/familyName", simple: true), "givenName" => TermDefinition.new("givenName", id: "http://schema.org/givenName", simple: true), "id" => TermDefinition.new("id", id: "@id", simple: true), "identity" => TermDefinition.new("identity", id: "https://w3id.org/identity#", simple: true, prefix: true), "identityService" => TermDefinition.new("identityService", id: "https://w3id.org/identity#identityService", type_mapping: "@id"), "idp" => TermDefinition.new("idp", id: "https://w3id.org/identity#idp", type_mapping: "@id"), "image" => TermDefinition.new("image", id: "http://schema.org/image", type_mapping: "@id"), "initializationVector" => TermDefinition.new("initializationVector", id: "https://w3id.org/security#initializationVector", simple: true), "issued" => TermDefinition.new("issued", id: "https://w3id.org/credentials#issued", type_mapping: "http://www.w3.org/2001/XMLSchema#dateTime"), "issuer" => TermDefinition.new("issuer", id: "https://w3id.org/credentials#issuer", type_mapping: "@id"), "label" => TermDefinition.new("label", id: "http://www.w3.org/2000/01/rdf-schema#label", simple: true), "member" => TermDefinition.new("member", id: "http://schema.org/member", type_mapping: "@id"), "memberOf" => TermDefinition.new("memberOf", id: "http://schema.org/memberOf", type_mapping: "@id"), "name" => TermDefinition.new("name", id: "http://schema.org/name", simple: true), "nonce" => TermDefinition.new("nonce", id: "https://w3id.org/security#nonce", simple: true), "normalizationAlgorithm" => TermDefinition.new("normalizationAlgorithm", id: "https://w3id.org/security#normalizationAlgorithm", simple: true), "owner" => TermDefinition.new("owner", id: "https://w3id.org/security#owner", type_mapping: "@id"), "password" => TermDefinition.new("password", id: "https://w3id.org/security#password", simple: true), "paymentProcessor" => TermDefinition.new("paymentProcessor", id: "https://w3id.org/payswarm#processor", simple: true), "perm" => TermDefinition.new("perm", id: "https://w3id.org/permissions#", simple: true, prefix: true), "postalCode" => TermDefinition.new("postalCode", id: "http://schema.org/postalCode", simple: true), "preferences" => TermDefinition.new("preferences", id: "https://w3id.org/payswarm#preferences", type_mapping: "@vocab"), "privateKey" => TermDefinition.new("privateKey", id: "https://w3id.org/security#privateKey", type_mapping: "@id"), "privateKeyPem" => TermDefinition.new("privateKeyPem", id: "https://w3id.org/security#privateKeyPem", simple: true), "ps" => TermDefinition.new("ps", id: "https://w3id.org/payswarm#", simple: true, prefix: true), "publicKey" => TermDefinition.new("publicKey", id: "https://w3id.org/security#publicKey", type_mapping: "@id"), "publicKeyPem" => TermDefinition.new("publicKeyPem", id: "https://w3id.org/security#publicKeyPem", simple: true), "publicKeyService" => TermDefinition.new("publicKeyService", id: "https://w3id.org/security#publicKeyService", type_mapping: "@id"), "rdf" => TermDefinition.new("rdf", id: "http://www.w3.org/1999/02/22-rdf-syntax-ns#", simple: true, prefix: true), "rdfs" => TermDefinition.new("rdfs", id: "http://www.w3.org/2000/01/rdf-schema#", simple: true, prefix: true), "recipient" => TermDefinition.new("recipient", id: "https://w3id.org/credentials#recipient", type_mapping: "@id"), "revoked" => TermDefinition.new("revoked", id: "https://w3id.org/security#revoked", type_mapping: "http://www.w3.org/2001/XMLSchema#dateTime"), "schema" => TermDefinition.new("schema", id: "http://schema.org/", simple: true, prefix: true), "sec" => TermDefinition.new("sec", id: "https://w3id.org/security#", simple: true, prefix: true), "signature" => TermDefinition.new("signature", id: "https://w3id.org/security#signature", simple: true), "signatureAlgorithm" => TermDefinition.new("signatureAlgorithm", id: "https://w3id.org/security#signatureAlgorithm", simple: true), "signatureValue" => TermDefinition.new("signatureValue", id: "https://w3id.org/security#signatureValue", simple: true), "streetAddress" => TermDefinition.new("streetAddress", id: "http://schema.org/streetAddress", simple: true), "title" => TermDefinition.new("title", id: "http://purl.org/dc/terms/title", simple: true), "type" => TermDefinition.new("type", id: "@type", simple: true), "url" => TermDefinition.new("url", id: "http://schema.org/url", type_mapping: "@id"), "writePermission" => TermDefinition.new("writePermission", id: "https://w3id.org/permissions#writePermission", type_mapping: "@id"), "xsd" => TermDefinition.new("xsd", id: "http://www.w3.org/2001/XMLSchema#", simple: true, prefix: true) }) end alias_preloaded("https://w3id.org/identity/v1", "http://w3id.org/identity/v1") end
2023-11-27T01:27:13.970301
https://example.com/article/6575
The deck was still being strafed, but Halbardier grabbed a reel of cable, ran out onto the deck, and attached new cable to the antenna so a radioman could get an SOS out to the Sixth Fleet in the Mediterranean.Voila. “Mayday” went out; almost immediately the Israeli aircraft and torpedo ships broke off the attack and went back to base; the Israeli government sent a quick apology to Washington for its unfortunate “mistake;” and President Johnson issued orders to everyone to make believe the Israelis were telling the truth, or at least to remain silent....Despite Israeli protestations, the accumulated evidence, including intercepted voice communications, is such that no serious observer believes Israel’s “Oops” excuse of a terrible mistake. The following exchanges are excerpts of testimony from U.S. military and diplomatic officials given to Alison Weir, founder of “If Americans Knew” and author of American Media Miss the Boat:Israeli pilot to ground control: “This is an American ship. Do you still want us to attack?”Ground control: “Yes, follow orders.”“But sir, it’s an American ship, I can see the flag!”Ground control: “Never mind; hit it!”...Equally telling is the fact that the National Security Agency (NSA) destroyed voice tapes seen by many intelligence analysts, showing that the Israelis knew exactly what they were doing. I asked a former CIA colleague, who was also an analyst at that time, what he remembered of those circumstances. Here is his e-mail reply:“The chief of the analysts studying the Arab-Israeli region at the time told me about the intercepted messages and said very flatly and firmly that the pilots reported seeing the American flag and repeated their requests of confirmation of the attack order. Whole platoons of Americans saw those intercepts...
2023-08-23T01:27:13.970301
https://example.com/article/7248
I’m a sucker for a good supernatural TV series, and after Netflix dropped the surprisingly great The Haunting of Hill House at the end of 2018, I was very much looking forward to this new 10-part series starring the always fantastic Uma Thurman. But is Chambers any good? Well actually, yes it is. Unlike Hill House, this story is a slow burner—just how I like them. I want to really get to know my characters. And while there is no news of a second series in production yet, the story certainly isn’t over at the end of Season 1, so I am hopeful that it will be renewed for at least another season. Creator Leah Rachel has not given any details as to whether this is happening yet. She would have to write it first, so it could be a while. The lead role of the show is played by newcomer (to acting at least, she is a runway model and exhibited artist) Sivan Alyra Rose. She plays the sassy Sasha Yazzie, a 17-year-old part-Navajo high school student. She lives with her Uncle Frank (Marcus LaVoi) and has done so since the age of 2 when her mother passed. Uncle Frank owns an exotic fish store and Sasha works there part-time. She has a steady boyfriend, TJ Locklear (Griffin Powell-Arcand), also of Navajo descent. The couple decide it is time for them to take things a step further in their relationship and arrange a date for their first time. It just so happens TJ has keys to a bed store, and he sets the tone for a romantic evening by lighting a candle and displaying a bouquet of what I’d guess were herbs for protection or similar. Unfortunately, things take a turn for the worst at this point. Just as they are getting into the throes of passion, Sasha has a devastating heart attack. A few months later, Sasha is released from the hospital. She received an emergency heart transplant from a rich white girl the same age as her, Becky Lefevre (Lilliya Reid), who died on the same night Sasha had her heart attack. Becky’s father, Ben Lefevre (Tony Goldwyn) turns up at Frank’s fish store, hoping to meet the girl who has his daughter’s heart. Which in itself is kinda creepy, but kinda understandable. Then things do start to get genuinely creepy. While Becky is definitely dead, her heart still very much belongs to her, as if she just has a new body to wear. Sasha begins remembering things Becky did and saw. Haunted by Becky’s death, Sasha starts to investigate what really happened to her before she died, becoming more involved with Becky’s life and more estranged from her own. Whilst Chambers initially feels like quite an original idea, the whole “possessed body part” theme has been kicking around for years, like in the ’80s film Body Parts, and also the Chinese horror film The Eye. Yet Chambers does manage to somehow stand apart, despite it taking a little while to get going, by undeniably building characters and atmosphere as the story slowly pulls you in. Sasha and Frank travel to the Lefevre’s lavish yet minimal house in the very wealthy suburb of Crystal Valley so that they can meet Becky’s mother, Nancy (Uma Thurman) and her brother Elliott (Nicholas Galitzine). Nancy clearly isn’t coping as well as Ben is since the death of their daughter, and Elliott is quite aloof about it all, but the track marks on his arms tell a different story. His parents seem to be annoyed at his very existence. Already you can tell there is something really not quite right about this family. Ben’s grief seems somewhat fanatical, and that is only the start. They want to be a part of the life of the girl their daughter saved by offering her a scholarship to Becky’s expensive private school, where every student is assigned a life coach and a laptop. Until recently, people of colour in horror have been associated with a monstrous, vengeful, often magical ‘Other’ that threatens white purity. But lately, creators such as Jordan Peele have flipped those tropes. In Get Out, affluent white people are the sinister power that seeks to possess, corrupt, and control black people by stealing their bodies and maybe even their souls as a metaphor for slavery and exploitation. Chambers isn’t about slavery, it’s about naturalisation. Sasha is worried that her new heart is turning her into a white person. She feels like she is losing her sense of self, becoming something alien to her. The scholarship should give her the freedom to become whatever she puts her mind to. Instead, it entraps her. It feels like a direct reference to the history of American Indian residential schools, tasked with “killing the Indian to save the man”. While we are used to supernatural occurrences happening on Native American burial grounds in horror, that’s not the case in Chambers. All the spirituality centres on a New Age religious movement called the Annex, which begins to look more and more like a cult as the series goes on. It starts off being all about crystals, diets, therapy and burning all your deceased’s precious belongings so that they can have them in the afterlife. After all, death is so materialistic these days. As we delve deeper into the story though, it becomes clear that the true horror is happening in white suburbia, while the indigenous folk are the ones rejecting tradition and superstition in favour of rationality. While Chambers may not keep you on the edge of your seat, I have enjoyed the slow pace, getting to know, and even care, about the characters. Sasha isn’t always likeable but you still champion her honesty and curiosity. The relationship with her best friend Yvonne (Kyanna Simone Simpson) is natural and funny. Sasha’s romance with TJ is very sweet, and his attitude towards her is unpredictably cool and modern. None of the characters are so over the top that they don’t seem believable—even for a show about the paranormal. Lili Taylor is superb as always, as Ruth Pezim, a friend of the Lefevre family. You can never really tell if she’s going to save the day or if she’s the most unhinged of the lot. At times the cinematography is just stunning. Shots of TJ riding his skateboard against the sunset and bright street lamps, and dust and electric storms raging across the desert, really give you a feel of the heat and tension rising in the air. The scares aren’t really jumpy, they are more subtle than that. The kind that make you want to hide behind your fingers at times. The music is raw, and while maybe not really fitting the setting at times, it still feels so right. The Smiths, The Stone Roses, Chromatics, Liv Dawson, Hijokaidan and The Everly Brothers all feature. All 10 episodes of Chambers are available to stream on Netflix right now, and as long as you are patient, you will be rewarded with some pretty great TV.
2024-07-20T01:27:13.970301
https://example.com/article/2093
IN THE COMMONWEALTH COURT OF PENNSYLVANIA Lallie Robinson, : Petitioner : : v. : : Workers' Compensation Appeal : Board (Service Plus Delivery : Systems, Inc. and State Workers' : Insurance Fund), : No. 2013 C.D. 2014 Respondents : Argued: October 5, 2015 BEFORE: HONORABLE BERNARD L. McGINLEY, Judge HONORABLE MARY HANNAH LEAVITT, Judge1 HONORABLE ROCHELLE S. FRIEDMAN, Senior Judge OPINION NOT REPORTED MEMORANDUM OPINION BY JUDGE McGINLEY FILED: January 8, 2016 Lallie Robinson (Petitioner/Claimant) petitions for review from an order of the Workers’ Compensation Appeal Board (Board) that affirmed Workers’ Compensation Judge Lawrence C. Beck’s (WCJ Beck) grant of Service Plus Delivery Systems, Inc.’s (Employer) and the State Workers’ Insurance Fund’s (SWIF) (collectively, Respondents) petition to review compensation benefits offset (review petition). I. WCJ Beck’s Decision The parties agree that “[t]he facts are not genuinely in dispute on the issues pertaining to the present appeal.” Brief for Petitioner at 16. 1 This case was assigned to the opinion writer before January 4, 2016, when Judge Leavitt became President Judge. WCJ Beck made the following pertinent findings of fact: 1. On July 6, 2010, Workers’ Compensation Judge Christina Barbieri circulated a decision granting Claimant’s Claim Petition and Penalty Petition.[2] (Emphasis added.) 2. Judge Barbieri found that, on March 10, 2006, Claimant suffered a large eccentric disc herniation at C7- C8, which impinged the C7-C8 nerve root, causing cervical radiculopathy at C7-C8 and 1, exacerbation of pre-existing but symptomatic bilateral acromioclavicular arthropathy, bilateral post-traumatic shoulder impingement syndrome, exacerbation of a pre-existing mildly symptomatic cervical spondylosis, exacerbation of cervical radiculopathy and clinical evidence of right neurogenic thoracic outlet syndrome. Claimant suffered his injuries as the result of a motor vehicle accident.[3] 3. In support of its Review Petition, Employer submitted the March 29, 2011 deposition of James Jordon, Esquire. (Emphasis added.) This Judge has reviewed Mr. Jordan’s testimony and summarizes it as follows: a. Mr. Jordon is assistant counsel for the State Workers’ Insurance Fund (SWIF). In his capacity as assistant counsel, Mr. Jordon is point of contact with counsel for claimant’s [sic] in third-party actions . . . . In this role, Mr. Jordon has access to SWIF’s payment records with regard to a claimant’s medical and indemnity benefits. 2 Petitioner filed a claim petition and alleged that he was totally disabled since March 10, 2006. Petitioner also filed a penalty petition and alleged numerous violations of the Workers’ Compensation Act (Act), Act of June 2, 1915, P.L. 736, as amended, 77 P.S. §§ 1-1041.4, 2501- 2708, which included failure to investigate. Petitioner requested fifty percent in penalties, unreasonable contest fees and workers’ compensation benefits with statutory interest. Employer and SWIF denied the allegations of the claim and penalty petitions. 3 On March 10, 2006, Petitioner was operating a van for Employer when his vehicle was rear-ended by one vehicle which forced his vehicle into another vehicle. Brief of Respondents (Service Plus Delivery Systems, Inc. and State Workers’ Insurance Fund) at 7. 2 b. Mr. Jordon is familiar with Claimant’s subrogation file. As part of Claimant’s subrogation file, a Notice of Subrogation was sent to Claimant and Claimant’s third party counsel, Lowenthal & Abrams, on February 21, 2008. (Emphasis added.) c. Despite the claim being originally denied, medical benefits in the amount of $17,494.83 were paid as of November 21, 2008. Mr. [James B.] Mogul [Petitioner’s attorney] had discussed third party recovery with John Aris, Esquire, of Lowenthal & Abrams in 2008. (Emphasis added.) d. On February 12, 2009, SWIF received a check for $9,494.70 from Lowenthal & Abrams. (Emphasis added.) e. On June 24, 2009, SWIF received a check for $1,663.22 from Lowenthal & Abrams. (Emphasis added.) f. Mr. Jordon believed these amounts were for reimbursement of SWIF’s medical lien at the time. There were no other liens at that time. Mr. Jordon did not deem SWIF’s receipt of these amounts to be a waiver of SWIF’s future lien. (Emphasis added.) g. Mr. Jordon did not sign any agreement waiving SWIF’s future subrogation rights against Claimant’s third party recovery. To Mr. Jordon’s knowledge, no one else at SWIF agreed to waive SWIF’s subrogation rights. h. Claimant first began receiving indemnity benefits, pursuant to Judge Barbieri’s July 6, 2010 decision, on August 10, 2010. i. As of November 1, 2010, SWIF had paid Claimant $97,151.55 in indemnity benefits. (Emphasis added.) j. As of November 1, 2010, SWIF had paid Claimant $27,468.36; however, $8,044.09 in litigation costs was incorrectly included in that amount. This amount ($19,424.27) is the net amount of benefits paid after the 3 $9,494.70 and $1,663.22 payments from Lowenthal & Abrams were previously deducted. k. As of March 29, 2011, SWIF had paid $134,736.42 in indemnity and medical benefits. (Emphasis added.) 4. In opposition to Employer’s Review Petition, Claimant submitted the September 8, 2011 deposition testimony of John Aris, Esquire. This Judge has reviewed Mr. Aris’ testimony and summarizes as follows: a. Mr. Aris is an associate attorney for Lowenthal & Abrams and represented Claimant in the third party and under-insured motorist (UIM) claims arising out of the March 10, 2006 motor vehicle accident. b. Mr. Aris explained that the third party recovery against Sharon Merriweather, the driver of the vehicle which struck Claimant’s vehicle, settled for $15,000.00. These represented the policy limits of Ms. Merriweather’s automobile insurance. The matter settled in or about December 2008. c. On February 6, 2009, Lowenthal & Abrams forwarded to SWIF a check for $9,494.70. A second check in the amount of $1,663.22 was sent on March 25, 2010; as of June 10, 2010, it had not been cashed. d. Mr. Aris believed that SWIF’s lien, at the time, had been satisfied in full. He did not ask SWIF to compromise its lien. (Emphasis added.) e. Mr. Aris had no conversations with Mr. Jordon regarding any potential future payments or the waiver of any future lien. (Emphasis added.) f. Following the settlement of Claimant’s third party claim, Mr. Aris instituted a civil action against United States Fire Insurance Company for UIM benefits. g. On March 23, 2010, Claimant and United States Fire Insurance Company engaged in binding arbitration . . . [t]he arbitrator determined the value of Claimant’s case 4 to be $110,000.00. As $15,000.00 had already been tendered to Claimant through the third party settlement, United States Fire Insurance Company was liable for $95,500.00. (Emphasis added.) 5. Mr. Aris’ cost incurred in prosecution of Claimant’s UIM claim was $7,056.34. 6. Mr. Aris’ contingent attorney fee for the prosecution of Claimant’s UIM claim was 1/3 ($31,666.66), pursuant to the representation of Claimant’s counsel at the January 11, 2011 hearing on this matter. 7. The schedule of distribution for the recovery of Claimant’s third party claim included a $5,000.00 contingent attorney fee and $505.30 in litigation costs and expenses. WCJ Beck’s Decision, January 7, 2013, Findings of Fact (F.F.) Nos. 1-7 at 3-5; Reproduced Record (R.R.) at 135a-37a. WCJ Beck granted Respondents’ review petition and concluded: 2. Employer’s right to subrogation against Claimant’s third party and UIM benefits is absolute and has not been waived. (Emphasis added.) 3. Employer’s reimbursement rate on future compensation liability is 40.2%. 4. Employer is responsible for 40.2% of any future weekly benefits and medical benefits until it recovers $91,809.78. 5. Following the recovery of $91,809.78, Employer shall be responsible for 100% of any compensation liability. (Emphasis added.) 6. Employer’s contest has been reasonable at all times. 5 WCJ Beck’s Decision, Conclusions of Law (C.L.) Nos. 2-6 at 6; R.R. at 138a. The Board affirmed and concluded that “[a]lthough the UIM (Under Insured Motorist) settlement occurred in March of 2013 and at that time, a decision had not been rendered finding Defendant [Employer] liable for workers’ compensation benefits, Defendant [Employer] was still entitled to recover its lien.” Board’s Opinion, October 9, 2014, at 4. “Therefore, because subrogation is mandatory and the purpose of subrogation would not be served if we were to find that Defendant [Employer] was not entitled to subrogation in these circumstances, we see no error in the Judge granting Defendant’s [Employer’s] Review Offset Petition.” Board’s Opinion, October 9, 2014, at 4-5. II. Issues A. Whether WCJ Beck Failed To Issue A Reasoned Decision? Initially, Petitioner contends4 that WCJ Beck failed to render a reasoned decision because his decision did not provide for meaningful appellate review. Specifically, Petitioner asserts that WCJ Beck devoted only one sentence that could be considered a legal analysis of the case. WCJ Beck did not address the real issue. Petitioner asserts that WCJ Beck failed to provide adequate reasons for what evidence he rejected and what evidence he accepted “in order to ensure that a legally erroneous basis will not lie undiscovered and will allow meaningful appellate review of possible legal error.” Brief for Petitioner at 22. Petitioner contends that WCJ Beck failed to render credibility determinations and never indicated what testimony he accepted and what testimony he rejected. 4 This Court’s review is limited to a determination of whether an error of law was committed, whether necessary findings of fact are supported by substantial evidence, or whether constitutional rights were violated. Vinglinsky v. Workmen’s Compensation Appeal Board (Penn Installation), 589 A.2d 291 (Pa. Cmwlth. 1991). 6 Respondents counter that Petitioner waived the issue of whether WCJ Beck issued a reasoned decision because he failed to raise this issue on appeal to the Board. In Wheeler v. Workers’ Compensation Appeal Board (Reading Hospital and Medical Center), 829 A.2d 730, 734 (Pa. Cmwlth. 2003), this Court addressed the criteria necessary to determine whether an issue was waived: It is well established that an issue is waived unless it is preserved at every stage of the proceeding. Nabisco Brands, Inc. v. Workers’ Compensation Appeal Board (Tropello), 763 A.2d 555 (Pa. Cmwlth. 2000). The strict doctrine of waiver applies to a workers’ compensation proceeding. Hinkle v. Workers’ Compensation Appeal Board (General Electric Co.), 808 A.2d 1036 (Pa. Cmwlth. 2002) . . . . The purpose of the waiver doctrine is to ensure that the WCJ is presented with all cognizable issues so that the ‘integrity, efficiency, and orderly administration of the workmen’s compensation scheme of redressed for work-related injury’ is preserved . . . . (Citations omitted and emphasis added.) Here, the record reveals that after WCJ Beck granted Respondents’ review petition, Petitioner appealed to the Board and alleged the following errors: Conclusion of Law No. 2. Judge Beck committed a reversible error of law when his Honor found that the right of subrogation is absolute and can be abrogated only by choice. Claimant satisfied the third-party lien that was in existence at the time of the settlement of the third-party case. There was no other existing lien at the time that claimant’s third party case was settled . . . . Judge Beck erred in finding that the issue is whether or not State Workers’ Insurance Fund had waived its third- party lien. Claimant never argued or asserted that State Workers’ Insurance Fund had waived its third-party lien . . . . Claimant never had any established entitlement to 7 any workers’ compensation benefits, until the Judge granted the claim petition and awarded benefits. None of that existed at the time that the third-party case was settled. Defendants had no lien in addition to the lien already satisfied in full when the third-party case was settled. Therefore, Judge Beck committed a reversible error of law. Judge Beck did not address the critical issues in this case at all. (Emphasis added.) Appeal from Judge’s Findings of Fact and Conclusions of Law, January 22, 2013, at 1 and 3; R.R. at 130a and 132a.5 Clearly, Petitioner failed to raise the issue that WCJ Beck’s decision was unreasonable before the Board. Pa. R.A.P. 1551(a) provides that “[r]eview of quasijudicial orders shall be conducted by the court on the record made before the government unit . . . [n]o question shall be heard or considered by the court which was not raised before the government unit . . . .” (Emphasis added.) Therefore, this issue is waived on appeal to this Court. B. Whether The Board Erred As A Matter Of Law Because “Only A Lien On A Third-Party Case That Actually Exists In Fact And Not In Theory Can Be Satisfied?”6 5 Petitioner responded: This allegation could not be further from the truth. Petitioner did raise this issue with the . . . Board. Petitioner argued to the . . . Board and to this Honorable Commonwealth Court . . . that [WCJ Beck] issued an unreasoned decision because he failed to address the genuine issue in this case. . . . This argument formed the core of petitioner’s appeal to the . . . Board and the appeal to this . . . Court . . . . Reply Brief for Petitioner at 1-2. This Court must disagree. Petitioner’s allegation of error was that WCJ Beck failed to address the genuine issue in the present matter, not that he failed to issue a reasoned decision. 6 Brief for Petitioner, Statement of Questions Involved at 2. 8 Petitioner next contends that he did not contest the issue of whether Respondents have a right to subrogation. Specifically, Petitioner contends that when he received the third-party award, WCJ Barbieri did not rule on his claim petition. Petitioner states that the existing subrogation lien of $11,157.92 was paid in full at the time of the third party settlement. Petitioner concludes that SWIF failed to establish legal entitlement to a future reimbursement of a lien which did not exist at the time of the third-party settlement. Respondents counter that this Court has previously recognized that employers have an absolute right to immediate payment of a past-due lien from the recovery fund after payment of attorneys’ fees and litigation expenses. Respondents state that at no time did it either explicitly or impliedly waive its future right to subrogation with respect to Petitioner’s still-pending workers’ compensation claim. Respondents pose that Petitioner could have choosen not to pursue the workers’ compensation claim to its conclusion and just accepted the third party settlement and arbitration award. As a result of the compensation award by WCJ Barbieri, Respondents’ subrogation lien increased. Respondents caution that to allow Petitioner to keep the entire third party settlement/award after it paid a total of $134,736.42 in indemnity and medical benefits would result in a double recovery. Section 319 of the Act, 77 P.S. § 671, provides: Where the compensable injury is caused in whole or in part by the act or omission of a third party, the employer shall be subrogated to the right of the employe . . . against such third party to the extent of the compensation payable under this article by the employer; reasonable attorney’s fees and other proper disbursements incurred in obtaining a recovery or in effecting a compromise 9 settlement shall be prorated between the employer and employe . . . . The employer shall pay that portion of the attorney’s fees and other proper disbursements that the amount of compensation paid or payable at the time of recovery or settlement bears to the total recovery or settlement bears to the total recovery or settlement. Any recovery against such third person in excess of the compensation theretofore paid by the employer shall be paid forthwith to the employe . . . and shall be treated as an advance payment by the employer on account of any future installments of compensation. In Murphy v. Workers’ Compensation Appeal Board (City of Philadelphia), 871 A.2d 312 (Pa. Cmwlth. 2005), this Court reiterated the employer’s absolute right to subrogation: The rationale underlying the right to subrogation is threefold. First, it prevents double recovery for the same injury by the claimant. Second, it prevents the employer from having to make compensation payments which resulted from the negligence of a third party. Finally, it prevents a third party from escaping liability for his negligence. (Emphasis added.) Id. at 317. This Court concurs with the Board’s analysis that Respondents were entitled to subrogation: In the instant case, the Judge found that despite the fact that the claim had been originally denied, medical benefits in the amount of $17,494.83 had been paid by defendant [Respondents] as of November 21, 2008 (Finding of Fact No.3(c)). In December 2008, Claimant settled a third-party claim against the driver involved in his vehicular accident for $15,000.00 (Finding of Fact No. 4(b)). On February 12, 2009, Defendant [Respondents] received a check in the amount of 10 $9,494.70 from Claimant’s Counsel and on June 24, 2010, Defendant [Respondents] received a check in the amount of $1,663.22 from Counsel (Finding of Fact No. 3(d) & (e)). It was believed that these checks were for the reimbursement of Defendant’s [Respondents’] medical lien at the time (Finding of Fact No. 4(f)). On July 6, 2010, Judge Barbieri issued the Decision granting the Claim Petition and Claimant began receiving benefits pursuant to that Decision on August 10, 2010 (Findings of Fact Nos. 1 & 3(h)). As of November 1, 2010, Defendant [Respondents] had paid $97,151.55 in benefits (Finding of Fact No. 3(i)). As of March 29, 2011, Defendant [Respondents] had paid $134,736.42 in indemnity and medical benefits (Finding of Fact No. 3(k)). While Claimant’s Claim Petition was pending, on March 23, 2010, Claimant and United States Fire Insurance Company engaged in binding arbitration and pursuant to that determination, Claimant settled his UMI [Under Insured Motorist] claim for $95,000.00 (Finding of Fact No. 4(g)). (Emphasis added.) The Judge determined that defendant [Respondents] did not expressly or impliedly waive its right to subrogation (Discussion). As a result, he found that Defendant [Respondents] was entitled to a recovery of $91,809.78 and it was responsible for 40.2% of any future weekly benefits and medical expenses until it recovers $91,809.78. We observe no error in this conclusion. (Emphasis added.) Although the UMI settlement occurred in March of 2013 and at that time, a decision had not been rendered finding Defendant [Respondents] liable for workers’ compensation benefits, Defendant [Respondents] was still entitled to recover its lien. Defendant did subsequently make payment to claimant for workers’ compensation benefits. Pursuant to Section 319 of the Act, the right to subrogation is ‘absolute’ and just because Claimant settled his UMI claim prior to his workers’ compensation claim, does not render 11 Defendant’s right to subrogation invalid. Subrogation prevents double recovery for the same injury and relieves the employer of liability occasioned by the negligence of a third party. Since Defendant [Respondents] was eventually found liable for workers’ compensation benefits and did make payment for those benefits, disallowing subrogation in these circumstances where a lien had not been asserted because the party had not yet been found liable at the time of the settlement would be in direct contradiction to the mandatory language contained in Section 319. . . . (Emphasis added.) Board’s Opinion at 3-5. Accordingly, this Court affirms the WCJ’s grant of Respondents’ review offset petition. ____________________________ BERNARD L. McGINLEY, Judge 12 IN THE COMMONWEALTH COURT OF PENNSYLVANIA Lallie Robinson, : Petitioner : : v. : : Workers' Compensation Appeal : Board (Service Plus Delivery : Systems, Inc. and State Workers' : Insurance Fund), : No. 2013 C.D. 2014 Respondents : ORDER AND NOW, this 8th day of January, 2016, the order of the Workers’ Compensation Appeal Board in the above-captioned matter is affirmed. ____________________________ BERNARD L. McGINLEY, Judge
2024-05-12T01:27:13.970301
https://example.com/article/7981
Q: Encryption a message which was generated in .NET Core 2.1 under linux adds leading bytes If have the follwoing situation: A Client app runs on Raspian with .NETCore 2.1 (Linux) It encrypts a message with a public cert (RSA) Sends this encrypted message to a windows server This server decrypts the message Now the data has 2 more bytes at the beginning of the text! Example: Encrypting "Hallo welt" under linux leads to "\u0004\nHallo welt" in windows. For me it seems that there is a bug in the linux implementation of the .NETCore encryption, or (maybe padding-problem)? Encryption is done with public static byte[] Encrypt(byte[] plainData, X509Certificate2 certificate) { var message = new EnvelopedCms(new ContentInfo(plainData)); message.Encrypt(new CmsRecipient(SubjectIdentifierType.IssuerAndSerialNumber, certificate)); return message.Encode(); } Decryptiong with: public static byte[] Decrypt(byte[] encryptedData, X509Certificate2 certificate) { var message = new EnvelopedCms(); message.Decode(encryptedData); message.Decrypt(new X509Certificate2Collection {certificate} ); return message.ContentInfo.Content; } I can also provide an very simple example project if needed... A: This is a known bug in .NET Core and will be fixed in 3.0... See: https://github.com/dotnet/corefx/issues/32978
2024-03-13T01:27:13.970301
https://example.com/article/6854
Q: Normalize curves in a plot by the area under the curves In the MWE below, there are two tables, with one (common) column of x values and two columns of y values (A and B) in each table. They are plotted in the same plot, after normalization to the maximum value of column B for each table (there is also an offset added). How can I replace the normalization to the maximum value of column B for each table with the area between column B and column A? In other words: I would like to normalize to the area between B and A for each set of two curves. How can that be achieved? Although numerically not very complicated, I do not know how to implement it in pgfplots (which would eliminate the need to throw the data in and out of Matlab or Octave each time I do this plot). MWE: \documentclass{article} \usepackage[tightpage,active]{preview} \usepackage{pgfplotstable} \newcommand{\offset}{1} \newcommand{\findmax}[3]{ \pgfplotstablesort[sort key={#2},sort cmp={float >}]{\sorted}{#1}% \pgfplotstablegetelem{0}{#2}\of{\sorted}% \pgfmathsetmacro#3{\pgfplotsretval} } \pgfplotstableread{ X A B 0 1 5 1 1 7 2 2 7 3 2 5 4 2 3 }\tableone \findmax{\tableone}{B}{\Bmaxone} \pgfplotstableread{ X A B 0 10 24 1 13 45 2 24 66 3 26 33 4 26 27 }\tabletwo \findmax{\tabletwo}{B}{\Bmaxtwo} \begin{document} \begin{preview} \begin{tikzpicture} \begin{axis} \addplot [black] table[x=X,y expr=\thisrow{A}/\Bmaxone] {\tableone}; \addplot [black] table[x=X,y expr=\thisrow{B}/\Bmaxone] {\tableone}; \addplot [black] table[x=X,y expr=\thisrow{A}/\Bmaxtwo+\offset] {\tabletwo}; \addplot [black] table[x=X,y expr=\thisrow{B}/\Bmaxtwo+\offset] {\tabletwo}; \end{axis} \end{tikzpicture} \end{preview} \end{document} A: Calculating the area under the curves requires a bit of looping, but it's reasonably straightforward. Note that if you have a lot of numbers, or the values are large (summing to more than about 16000), you'll need to use the fpu library, as in the following example. \documentclass{article} \usepackage{pgfplotstable} \newcommand{\calcarea}[3]{ \pgfplotstablegetrowsof{#1} \pgfmathtruncatemacro\numrows{\pgfplotsretval-1} \pgfkeys{/pgf/fpu=true} \def\cumsum{0} \pgfplotstableforeachcolumnelement{#2}\of{#1}\as\elem{ \pgfmathparse{\cumsum+\elem} \def\cumsum{\pgfmathresult} } \pgfplotstablegetelem{0}{#2}\of{#1}% \pgfmathparse{2*\cumsum-\pgfplotsretval} \def\cumsum{\pgfmathresult} \pgfplotstablegetelem{\numrows}{#2}\of{#1} \pgfmathparse{(\cumsum-\pgfplotsretval)/2} \pgfmathfloattofixed{\pgfmathresult} \edef#3{\pgfmathresult} \pgfkeys{/pgf/fpu=false} } \pgfplotstableread{ X A B 0 1 5 1 1 7 2 2 7 3 2 5 4 2 3 }\tableone \pgfplotstableread{ X A B 0 10 2400 1 13 4500 2 24 6600 3 26 3300 4 26 2700 }\tabletwo \begin{document} \calcarea{\tableone}{A}{\areaA} \calcarea{\tableone}{B}{\areaB} \calcarea{\tabletwo}{A}{\areaAtwo} \calcarea{\tabletwo}{B}{\areaBtwo} \begin{tikzpicture} \begin{axis} \addplot [black] table[x expr=\coordindex,y expr=\thisrow{A}/abs(\areaA-\areaB)] {\tableone}; \addplot [black] table[x expr=\coordindex,y expr=\thisrow{B}/abs(\areaA-\areaB)] {\tableone}; \addplot [red] table[x=X,y expr=\thisrow{A}/abs(\areaAtwo-\areaBtwo)+0.5] {\tabletwo}; \addplot [red] table[x=X,y expr=\thisrow{B}/abs(\areaAtwo-\areaBtwo)+0.5] {\tabletwo}; \end{axis} \end{tikzpicture} \end{document}
2023-12-30T01:27:13.970301
https://example.com/article/6050
Barnett predicts close poll Barnett predicts close poll - The West Australian Colin Barnett yesterday insisted the March 9 election would be closer than published polling suggests, predicting that as many as 20 of Parliament's 59 seats could be in play. A Newspoll conducted in November and December projected a two-party preferred result of 58-42 in favour of the Liberal-Nationals Government, a result that would see a landslide if repeated on voting day. But the Premier said he would be "very surprised" if that was the result. "I'm optimistic about the election result but I know it will be far closer than those poll figures suggest," he said. "I'm not going to run around and play that game of pretending to be underdog, but I am also a realist and the Liberal Party holds less seats than Labor." Senior Liberals have said they are concerned at perceptions the Government is a long way in front. Mr Barnett said he expected a "ferocious" campaign for every vote and he urged people to enrol to vote.
2024-02-08T01:27:13.970301
https://example.com/article/3928
Q: How do I configure a .net core API to work in IIS? I've got a .net core API created in Visual Studio 2017 that's working fine. When I go to deploy it I get error message HTTP Error 500.19 with error code 0x8007000d. I've found multiple solutions online such as making sure windows features are installed, removing the .net CLR version, changing the application pool identity, changes to web.config and applicationHost.config, but nothing has worked. Is there a way to definitively find what the problem is or am I stuck doing trial and error with the myriad of possible solutions? Any specific solutions you know of? Here are screenshots of the IIS settings and my Windows features: Here's my web.config file: <?xml version="1.0" encoding="utf-8"?> <configuration> <!-- Configure your application settings in appsettings.json. Learn more at http://go.microsoft.com/fwlink/?LinkId=786380 --> <system.webServer> <handlers> <add name="aspNetCore" path="*" verb="*" modules="AspNetCoreModule" resourceType="Unspecified" /> </handlers> <aspNetCore processPath="dotnet" arguments=".\DishbooksAPI.dll" stdoutLogEnabled="false" stdoutLogFile=".\logs\stdout" forwardWindowsAuthToken="false" /> </system.webServer> </configuration> Here's the IIS error: Some stackoverflow pages I've tried (this is not an exhaustive list): HTTP Error 500.19 when publish .net core project into iis HTTP Error 500.19 with Error Code 0x8007000d visual studio 2017 while deploying .net core application ASP.NET: HTTP Error 500.19 – Internal Server Error 0x8007000d HTTP Error 500.19 - Internal Server Error web config .net core web api asp.net core web api published in IIS after moved to different IIS server pc gives error 500.19 A: First of all, you need to install ASP.NET Core Module in web server. Here is the download link. Then install either SDK or Runtime in web server. Trouble Shooting If it still doesn't work, open a command prompt. Navigate to the web application folder and type dotnet YOUR_APP.dll. You should see something like this - C:\APIs> dotnet YOUR_APP.dll Hosting environment: Production Content root path: C:\APIs Now listening on: http://localhost:5000 Application started: Press Ctrl+C to shut down. It means your application can run in the web server without IIS. Then you need to trouble shoot in IIS or some other things.
2024-05-22T01:27:13.970301
https://example.com/article/6047
Major oil and gas exporters have weathered many upheavals in recent decades but a renewed commitment to reform and economic diversification will be vital to cope with the changing dynamics of global energy. These include rising production from new sources such as shale, uncertainties over the pace of oil demand growth and deployment of new energy technologies, according to a new report from the International Energy Agency. The analysis, the Outlook for Producer Economies - a special report in the World Energy Outlook series - examined six resource-dependent economies that are pillars of global energy supply: Iraq, Nigeria, Russia, Saudi Arabia, United Arab Emirates and Venezuela. It assessed how they might fare to 2040 under a variety of price and policy scenarios. The rollercoaster in oil prices over the last decade has brought into sharp relief the structural weaknesses in many of the major exporters. Since 2014, the net income available from oil and gas has fallen by between 40% (in the case of Iraq) and 70% (in the case of Venezuela), with wide-ranging consequences for economic performance. The volatility of hydrocarbon revenues presents dilemmas for countries whose budgets depend on them, especially if their economies and finances are not resilient. The extent to which producer countries steer through essential economic transformation can have major implications for energy markets, global environmental goals, and energy security, according to the report. The new report comes at a time of high oil prices, which are a double-edged sword. Higher revenues provide the means to reform, but they can also appear to reduce its urgency. However, as was seen in the past, higher energy prices encourage production elsewhere while accelerating structural changes in demand, which affect the producers’ long-term markets. “More than at any other point in recent history, fundamental changes to the development model of resource-rich countries look unavoidable,” said Dr Fatih Birol, the IEA’s executive director. “Following through with the announced reform initiatives is essential, as failure to take adequate action would compound future risks for producer economies as well as for global markets.” The countries examined are very diverse, and the report considers a wide range of experiences and prospects. Many of them have pushed forward plans to boost investment and growth in the non-oil sectors of their economics. Venezuela, though, provides an example of how badly things can turn out when economic and energy headwinds gather strength. Some of the world’s largest producers face strong pressures from rising numbers of young people entering the workforce. More than 50 percent of the population living across the Middle East is under the age of 30; the proportion is more than 70% in Nigeria. In many major producers, income from oil and gas will not be large enough to provide for these growing populations, even in scenarios where oil demand continues to grow to 2040 and prices remain relatively robust. The energy sector has an important part to play in the reform agenda. This report focuses on six key responses: capturing more domestic value from hydrocarbons, for example via petrochemicals; using natural gas as a means to support diversified growth; harnessing the large but under-utilised potential for renewable energy, especially solar; phasing out subsidies that encourage wasteful consumption; ensuring sufficient investment in the upstream (the ability to maintain oil and gas revenues at reasonable levels is vital for economic stability); and playing a role in deploying new energy technologies, such as carbon capture, utilisation and storage. “The reform process should be much wider than energy; but it relies on a well-functioning energy sector, said Dr Birol. “Successful reform programs can open a broader range of strategic options for producers, as well as new opportunities for engagement on a range of energy issues. There is a lot at stake.”
2024-07-21T01:27:13.970301
https://example.com/article/8916
FILE Edit FILE in hexadecimal
2024-01-18T01:27:13.970301
https://example.com/article/6800
INTRODUCTION {#s1} ============ Extended-spectrum-β-lactamase-producing *Enterobacteriaceae* (ESBL-E) and carbapenemase-producing *Enterobacteriaceae* (CPE) are making a significant impact on antimicrobial resistance (AMR) due to their capability of horizontal gene transfer to other bacteria ([@B1][@B2][@B4]). The isolation rate of ESBL-E from humans soared in the past few decades, and the emergence of CPE around the globe has been described as foreshowing the end of the antibiotic era, with an urgent threat to public health worldwide ([@B1][@B2][@B6]). ESBL-E and CPE in food animals and their environment have been considered potential sources of resistant bacterial infections in the community ([@B1]). Increased consumption of antimicrobials, such as β-lactams, macrolides, aminoglycosides, polymyxins, and carbapenems, is observed on animal farms ([@B1][@B2][@B3], [@B7], [@B8]). Misuse of antibiotics in food animals, especially those used in the treatment of human infection, may lead to dissemination of highly mobile genetic elements in pathogenic bacteria that confer resistance to antimicrobials beyond the realm of health care settings to the community ([@B1], [@B7], [@B8]). Animal-based food production is growing rapidly in Asia, with China as the world's biggest producer of farmed fish in 2016, claiming over 60% (49.2 million tonnes) of the world's production (80.0 million tonnes). The country has also been providing 54.5 million tonnes of pork around the world, supporting 50% of the global demand ([@B9], [@B10]). A consequence of the extensive use of antibiotics in aquaculture and pig farms could be the isolation of multidrug-resistant bacteria in these farms and their produce, which can eventually interfere with human gut commensals when animal food is consumed raw or undercooked. Apart from therapeutic purposes, antibiotics are also administered to healthy animals for growth promotion or prevention of disease to improve production yields in regions round the globe ([@B11]). As a result, drug-resistant bacteria are frequently found in surveillance programs worldwide in farm animals, which led to hypotheses of potential spread of AMR bacteria to humans via the food chain and contaminated water ([@B11], [@B12]). There is limited understanding of the impact of the transmission of drug-resistant bacteria from animals to humans, yet there is a rising threat of AMR to global public health that requires action from societies and government sectors ([@B10], [@B11]). In addition to increased AMR awareness among professionals and consumers, surveillance systems for animal antibiotic use and antimicrobial resistance improve animal husbandry and are cornerstones to promote rational antibiotic use in animals ([@B11]). In Hong Kong, fresh food products are often purchased from traditional wet markets. Currently, there are 97 public markets which are distributed across all districts in Hong Kong. They are run by the Food and Environmental Hygiene Department of Hong Kong SAR ([@B13]). Generally, the wet markets sell fresh meat, including poultry, beef, pork, etc., supplied from three licensed slaughterhouses ([@B14]) and include animal parts such as offal, head, tail, and feet, which are ingredients of the local cuisine. Live poultry are sold only at certain markets, with interventions in place to minimize zoonotic influenza transmission ([@B15]), while live marine fish and seafood may also be kept in "aquariums" before being sold. Our present study sought to isolate and characterize ESBL-E and CPE from freshwater fish and pig gastrointestinal tract (GIT) organs procured from wet markets across Hong Kong during the period of April 2018 to January 2019 in order to understand the prevalence and significance of antimicrobial resistance in Hong Kong. RESULTS {#s2} ======= Prevalence of ESBL-E and CPE in freshwater fish and pig organs. {#s2.1} --------------------------------------------------------------- A total of 171 ESBL-E and 28 CPE strains were isolated in our study from 411 fish and 339 pig organs that were purchased in wet markets across all 18 districts of Hong Kong. Thirty-nine of the samples contained 2 ESBL-E species and/or CPE species. The percentages of food samples with ESBL-E isolated were 52.4% (44/84) of pig's small intestine, 50% (32/64) of large intestine, 25.1% (43/171) of pig tongue, 0.9% (2/213) of snakehead fish, and 0.5% (1/198) of black carp samples. In addition to the low isolation rates of ESBL-E in fish, no CPE were identified from freshwater fish samples. However, 28 CPE strains were isolated from pig gastrointestinal tract (GIT) organs, with a prevalence rate of 8.15% (26/319). No ESBL-E or CPE were isolated from pigs' livers, kidneys, tails, minced meat, or snout during our preliminary examination; thus, samples from these sites were not further investigated. The percentages of ESBL-E and CPE isolated from pig GIT organs from 3 regions, the New Territories, Kowloon, and Hong Kong Island, were compared ([Fig. 1](#fig1){ref-type="fig"}). ESBL-E and CPE were identified in 17.7% (ranging from 17.7% to 85.7%) and 4% of pig organs (ranging from 4% to 14.3%), respectively, across Hong Kong. Escherichia coli and Klebsiella pneumoniae were the major ESBL-E and CPE species in our study ([Table 1](#tab1){ref-type="table"}). Isolation of ESBL-producing E. coli (ESBL-E. coli) was more frequent than ESBL-producing *Klebsiella* spp. (138 versus 33 isolates, respectively, where the latter included 29 Klebsiella pneumoniae, 3 Klebsiella variicola, and 1 Klebsiella oxytoca isolate). Four ESBL-E. coli strains were isolated from 2 snakehead fish, while 1 ESBL-producing K. pneumoniae (ESBL-K. pneumoniae) strain was isolated from 1 black carp, but no CPE were found. Twenty-eight CPE strains (25 E. coli and 3 K. pneumoniae strains) ([Table 1](#tab1){ref-type="table"}) were isolated from 26 of 319 pig GIT organs (8.15%). Carbapenemase-producing K. pneumoniae (CP-K. pneumoniae) was isolated from 1.17% (2/171) and 1.56% (1/64) of tongues and large intestines, respectively, but none of the small intestine specimens were positive for CP-K. pneumoniae. ![Prevalence of ESBL-E and CPE in pigs in the three geographical regions of Hong Kong.](mSphere.00107-20-f0001){#fig1} ###### Number of ESBL-E and CPE strains recovered from animal sources in wet markets of Hong Kong Source No. (%) of strains recovered --------------------- ------------------------------ ------------ ------------------------------------------------- ----------- ------------ ---------- Snakehead fish 4 (2.35) 4 (2.35) Black carp 1 (0.58) 1 (0.58)[^*a*^](#ngtab1.1){ref-type="table-fn"} Pig tongue 55 (32.16) 46 (26.9) 9 (5.3)[^*b*^](#ngtab1.2){ref-type="table-fn"} 17 (9.94) 15 (53.58) 2 (7.14) Pig small intestine 56 (32.75) 43 (25.15) 13 (7.6)[^*c*^](#ngtab1.3){ref-type="table-fn"} 5 (5.95) 5 (17.85) Pig large intestine 55 (32.16) 45 (26.3) 10 (5.82) 5 (9.38) 6 (17.85) 1 (3.58) ![](mSphere.00107-20-t0001) The strain was K. pneumoniae. Included K. pneumoniae (*n* = 6) and *K. variicola* (*n* = 3). All 13 strains were K. pneumoniae. Antibiotic susceptibility test. {#s2.2} ------------------------------- All 171 ESBL-E strains and 28 CPE strains were tested for 10 and 11 antibiotics, respectively. All ESBL-E strains were 100% and 98.3% susceptible to meropenem and imipenem, respectively (3 strains showed intermediate susceptibility by disk diffusion tests according to Clinical and Laboratory Standard Institute \[CLSI\] guidelines). The ESBL-E strains were resistant to piperacillin-tazobactam (16.3%), amoxicillin-clavulanate (29.8%), cefepime (35.6%), gentamicin (53.2%), ciprofloxacin (54.95%), ampicillin (100%), ceftriaxone (100%), and cefotaxime (100%) ([Fig. 2](#fig2){ref-type="fig"}). ###### A schematic of ESBL-E isolated from pigs and fish in Hong Kong. Details of the ESBL-E isolates were segregated into 3 sourcing regions: (a) the New Territories, (b) Kowloon, and (c) Hong Kong Island. Details included the type of food source, sampling organ, bacterial species isolated, presence of ESBL genes (CTX group 1 \[CTX-G1\], CTX group 2 \[CTX-G2\], and CTX group 9 \[CTX-G9\]) and antibiogram (piperacillin-tazobactam \[PTZ\], ampicillin \[AM\], gentamicin \[GN\], ciprofloxacin \[CIP\], cefepime \[CFP\], ceftriaxone \[CFT\], meropenem \[MEM\], imipenem \[IMP\], amoxicillin-clavulanate \[AMC\], and cefotaxime \[CTX\]). Black squares indicate a feature present in the isolate and white squares denote features that are absent. ![](mSphere.00107-20-f0002) ![](mSphere.00107-20-f0003) ![](mSphere.00107-20-f0004) Similarly to ESBL-E, all our 28 CPE strains were resistant to piperacillin-tazobactam, ampicillin, cefepime, ceftriaxone, meropenem, imipenem, amoxicillin-clavulanate, and cefotaxime, whereas 3.5%, 10.7%, and 46.4% of the CPE strains were resistant to fosfomycin, gentamicin, and ciprofloxacin, respectively ([Fig. 3](#fig3){ref-type="fig"}). ![A graphic representation of CPE isolated from pigs. Details of CPE showing the region of sample collection (New Territories, Kowloon, and Hong Kong Island), sampling organ (pig tongue, pig small intestine, and pig large intestine), isolated bacterial species (Escherichia coli, *Klebsiella* spp.), presence of CPE gene groups (black squares), and antibiogram (piperacillin-tazobactam \[PTZ\], ampicillin \[AM\], gentamicin \[GN\], ciprofloxacin \[CIP\], cefepime \[CFP\], ceftriaxone \[CFT\], meropenem \[MEM\], imipenem \[IMP\], amoxicillin-clavulanate \[AMC\], and cefotaxime \[CTX\], and fosfomycin \[FOS\]). Black squares indicate a feature present in the isolate and white squares denote features that are absent.](mSphere.00107-20-f0005){#fig3} Molecular analysis of ESBL-E and CPE strains. {#s2.3} --------------------------------------------- ESBL gene groups were determined for our 171 ESBL-E strains (*bla*~OXA~, *bla*~SHV~, *bla*~TEM~, and *bla*~CTX-M~ groups 1, 2, and 9). The most prevalent group was CTX-M (91.8% \[157/171\]), followed by TEM (71.9% \[123/171\]), SHV (16.9% \[29/171\]), and OXA (4.6% \[8/171\]). Among *bla*~CTX-M~ groups, PCR results revealed that 7.65% (13/171), 36% (62/171), and 47.9% (82/171) belonged to *bla*~CTX-M~ groups 1, 2, and 9, respectively. Two E. coli strains (1.1%) carried 2 *bla*~CTX~ genes (*bla*~CTX-M-1~ and *bla*~CTX-M-9~ groups) and 5 E. coli strains (2.9%) carried genes from *bla*~CTX-M-2~ and *bla*~CTX-M-9~ groups. *bla*~CTX-M-8~ and *bla*~CTX-M-25~ groups were not detected among the isolates ([Fig. 2](#fig2){ref-type="fig"}). All strains positive for *bla*~CTX-M~ groups 1, 2, and 9 were Sanger sequenced to delineate the possible β-lactamases as listed in [Table 2](#tab2){ref-type="table"}. *bla*~CTX-M-55~ was the major subtype in the *bla*~CTX-M-1~ group, accounting for 64.4% (52/82) of strains, while the remaining subtypes included *bla*~CTX-M-69~, *bla*~CTX-M-3~, and *bla*~CTX-M-226~. On the other hand, *bla*~CTX-M-14/-17~ was the major subtype (32.2% \[20/62\]) in the *bla*~CTX-M-9~ group. Further elucidation of the subtypes of TEM, SHV, and OXA genes were not performed; thus, there is a possibility that non-ESBL TEM/SHV genes were included. However, most strains were already confirmed to be ESBL-E and to possess CTX-M genes. ###### β-Lactamases detected in ESBL-E strains recovered from animal sources in wet markets of Hong Kong Allele group No. of positive strains[^*a*^](#ngtab2.1){ref-type="table-fn"} Enzyme(s) detected ---------------------------------------------------------------------------------------- ---------------------------------------------------------------- -------------------- ------------------------------------------- *bla*~CTX-G1~ 82 CTX-M-139/-183 1 CTX-M-15[^*b*^](#ngtab2.2){ref-type="table-fn"}/-28/-139/-156/-163/-186/-194/-216/-224 2 CTX-M-15[^*b*^](#ngtab2.2){ref-type="table-fn"}/-28/-139/-163/-186/-194/-216/-224 1 CTX-M-15[^*b*^](#ngtab2.2){ref-type="table-fn"}/-28/-163/-186/-194/-216/-224 1 CTX-M-226 1 CTX-M-3/-22/-66/-162/-211 12 CTX-M-55[^*b*^](#ngtab2.2){ref-type="table-fn"}/-69/-79/-164/-226 43 CTX-M-55[^*b*^](#ngtab2.2){ref-type="table-fn"}/-79/-164/-226 9 CTX-M-69 12 *bla*~CTX-G2~ 13 ND[^*c*^](#ngtab2.3){ref-type="table-fn"} *bla*~CTX-G9~ 62 CTX-M-121 1 CTX-M-122 1 CTX-M-130 4 CTX-M-14[^*d*^](#ngtab2.4){ref-type="table-fn"} 2 CTX-M-14[^*d*^](#ngtab2.4){ref-type="table-fn"}/-17 20 CTX-M-17 5 CTX-M-24 8 CTX-M-24/-196 1 CTX-M-27/-174 8 CTX-M-65 11 CTX-M-98 1 ![](mSphere.00107-20-t0002) Numbers of positive samples do not add up to a total of 171, because isolates may possess several *bla* genes. CTX-M-55 and CTX-M-15 were the most predominant in the *bla*~CTX-M-1~ group. ND, not done. CTX-M-14 was the most predominant in the *bla*~CTX-M-9~ group. Molecular analysis for our 28 CPE showed all the strains carried the *bla*~NDM~ gene. Twenty-three of 28 CPE isolates were whole-genome sequenced, including 20 E. coli and 3 K. pneumoniae strains. Sixteen of 20 CP-E. coli carried the *bla*~NDM-5~ gene, with sequence types (ST) 410 (*n* = 4), ST4541 (*n* = 4), ST457, ST877 (2 strains for each STs), and single strains of other ST types ([Fig. 4](#fig4){ref-type="fig"}). The remaining 4 strains showed the *bla*~NDM-1~ gene and were ST101 (*n* = 2), ST10 (*n* = 1), and ST2935 (*n* = 1). All except two CPE strains had their *bla*~NDM~ genes located on the IncX3 plasmid (plasmid size approximately 46,161 bp). Genes inferring aminoglycoside resistance (*ant* gene), chloramphenicol resistance (*floR* gene), sulfonamide resistance (*sul* gene), tetracycline resistance, and trimethoprim resistance (*dfrA* gene) were observed in more than 75% (15/20) of the strains. ![Pangenome tree of carbapenem-producing E. coli. The pangenome tree indicates the place of purchase, MLST of the strains, NDM groups, and antimicrobial resistance genes in the genome. Antimicrobial resistance genes positive among the strains are shown with black dots.](mSphere.00107-20-f0006){#fig4} The genetic characteristics of CP-K. pneumoniae are described in [Table 3](#tab3){ref-type="table"}. One ST127 strain had the *bla*~NDM-5~ gene on an IncX3 plasmid together with *bla*~SHV~ and *bla*~TEM~. The other 2 strains (serotypes K154:O2 and K152:OL102) showed *bla*~NDM-1~ genes on IncX3 plasmids as well as the presence of *bla*~SHV~. Similarly to ESBL*-*E. coli, genes inferring trimethoprim (*dfrA* gene), sulfonamide (*sul* gene), and aminoglycoside (*aac* genes) resistance were found. In addition, fluoroquinolone resistance gene *oqxAB* was found in all 3 K. pneumoniae strains. The presence of *oqxAB* was associated with low to intermediate resistance to quinoxalines, quinolones, tigecycline, nitrofurantoin, and several detergents and disinfectants ([@B16]). One of the CP-K. pneumoniae strains also contained the *aac(6′)-Ib-cr* gene with associated ciprofloxacin resistance in accordance with previous reports ([@B17], [@B18]). The KP23 strain was found to carry the *fosA* gene in the whole-genome analysis, which may explain the phenotypic resistance to fosfomycin. ###### Genetic characteristics of 3 Klebsiella pneumoniae strains Strain ST Serotype NDM NDM plasmid Other AMR genes[^*a*^](#ngtab3.1){ref-type="table-fn"} Virulence factors[^*a*^](#ngtab3.1){ref-type="table-fn"} -------- ----------- ------------ ------- ------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------- KP7 199 K154:O2 NDM-1 IncX3 *bla*~SHV~, *oqxAB*, *qnrS*, *drfA*, *aadA*, *sul*, *tet* KP14 Not found K152:OL102 NDM-1 IncX3 *bla*~SHV~, *bla*~TEM~, *oqxAB*, *qnrB*, *drfA*, *aadA*, *sul*, *aac(3)-IId*, *floR*, *tet* *ybt*, *iuc*, *fyuA* KP23 127 K30:O2 NDM-5 IncX3 *bla*~SHV~, *bla*~TEM~, *oqxAB*, *qnrB*, *drfA*, *aadA*, *sul*, *aac(3)-IId*, *aac(6\')-Ib-cr*, *aph(3\')-Ia*, *floR*, *tet*, *fosA*, *mphA*, *aph(6)-Id*, *aph(3′\')-Ib* *ybt*, *irp*, *iuc*, *fyuA* ![](mSphere.00107-20-t0003) BLAST cutoff of AMR gene and virulence factor coverage, 95%; identity, 95%; depth of *de novo* assembly contigs, 5. DISCUSSION {#s3} ========== There are limited data on the surveillance of ESBL-E and CPE in aquaculture and food animals, albeit similar data have been extensively reported in health care settings ([@B19]). We thus conducted this study to investigate the distribution and characteristics of ESBL-E and CPE in our food chain. This territory-wide surveillance study not only provides an update to the burden of ESBL-E and CPE in food products from wet markets but also highlights the possible exposure of these resistant bacteria in the community. This is the first report on ESBL-E and CPE from freshwater fish sampled in Hong Kong. The ESBL-E rate for freshwater fish was low (3/411 \[0.72%\]) with *bla*~CTX~ gene groups being the predominant ESBL gene groups. The low isolation rate may be due to the recent restriction in the use of third-generation cephalosporins in Hong Kong aquaculture ([@B3]). Our isolation rates were much lower than from studies performed in Saudi Arabia (27.2% \[110/405\], *bla*~CTX-M~ predominance) ([@B6]), Egypt (5.1% \[14/274\]), and China (1.5% \[3/218\]) ([@B20], [@B21]), and ESBL genes were less heterogeneous than in another Chinese study (*bla*~TEM~, *bla*~SHV~, *bla*~CTX-M~, and *bla*~LEN~ in ESBL-E. coli) ([@B18]). The predominant ESBL gene identified from fish sampled in Saudi Arabia was *bla*~CTX-M~, which was detected in all tilapias imported from Thailand ([@B6]). *Bla*~CTX-M~ was also observed in all carfu fish, 60% of milkfish, 52.3% of catfish, and 34.8% of tilapia, which were all imported from India ([@B6]). The original source of our fish is believed to be local as well as from Guangdong Province (southern part of China), while enquiries with the hawkers revealed also importation from Southeast Asia, such as Vietnam. Hence, CTX-M is still the most prevalent ESBL type among freshwater fish in Southeast Asia. ESBL-E and CPE isolation rates were much higher in pigs than in freshwater fish in Hong Kong. Our isolation rates were higher than those reported in Thailand (36.7% of 588 pig farms) ([@B22]), Portugal (24.6% of 65 pig fecal samples; *bla*~CTX-M-1~ predominance) ([@B23]), and Cameroon (11.26% \[8/71\] of pigs) ([@B24]). A study in Denmark identified ESBL-producing E. coli in 79% (15/19) of pig farms with high consumption of cephalosporin compared to 20% (4/20) of the pig farms with no consumption ([@B25]). The former showed a predominance of *bla*~CTX-M~ followed by *bla*~SHV~ genes ([@B25]). On the other hand, our results were noticeably lower than a previous surveillance study during 2008 to 2010 from pig feces (63.6% \[136/214\]) in Hong Kong ([@B26]). This discrepancy might be due to the differences in sample types and processing methods. It may also be due to the recently introduced food-related initiatives under the Hong Kong Strategy and Action Plan on antimicrobial resistance (AMR) and licensing control of livestock keeping, regulating the feeding of drugs and chemicals to food animals in 2017 ([@B2], [@B27]). Under this regulation, seven chemicals, including two antibiotics (avoparcin, clenbuterol, chloramphenicol, dienestrol, diethylstilbestrol, hexestrol, and salbutamol) are prohibited for use in food animals. Moreover, chemicals, including 36 antibiotics, have restricted usage on animals to address the concern of proper antibiotic usage and non-exceedance of drug residue levels for food safety purposes and AMR issues in Hong Kong ([@B2], [@B3], [@B28]). Similarly to a Turkish study on fish of the Eastern Mediterranean ([@B29]), no CPE were detected in our freshwater fish. However, scanty reports of CPE in seafood were published during 2011 to 2016, with a *bla*~VIM-1~-expressing E. coli (ST10) isolated from a Venus clam (Ruditapes philippinarum) in the Mediterranean Sea (Italy) ([@B30]) and carbapenem-resistant *Enterobacteriaceae* in 0.6% (8/1,328) of the seafood samples from a Canadian study, where all the samples were imported from Southeast Asian countries, specifically, Vietnam and Bangladesh ([@B31]). This is the first study in Hong Kong to report NDM-1 and NDM-5 in pig offal from local farms. However, *bla*~NDM-1~ and *bla*~NDM-5~ were also reported in China, where the former subtype was found in E. coli from diseased pigs lung samples (0.89% \[3/334\]) in 2013 in Guangdong Province ([@B32]) and the latter subtype from imported pigs in Hong Kong originating from Guangdong, Henan, and Hunan provinces during 2015 and 2017, where the carbapenem-resistant *Enterobacteriaceae* (CRE) isolation rate was 0.7% from 856 samples ([@B33]). The CRE isolation rate was as high as 60% (18/30) in environmental samples collected from pig farms in the United States ([@B34]). The increased isolation of CRE urges an immediate and sustainable plan of action to overcome the dissemination of AMR in all sectors, including agricultural, veterinary, and public health sectors, worldwide. There is a substantial number of overseas studies on the efficacy and cost efficiency of interventions to reduce AMR ([@B35], [@B36]). However, local surveillance studies are limited, and it is important to investigate the possible effect and feasibility of new measures. From surveillance of AMR, the knowledge of the associated bacteria and molecular elements are important in our aim to control the multidrug-resistant (MDR) Gram-negative pathogenic infection burden in the veterinary and public health sectors ([@B2], [@B3], [@B10], [@B11]). Thus, our results will be valuable as a baseline to guide interventions in reducing AMR in agriculture, farms, and the community. In conclusion, our study is the first to demonstrate the presence of ESBL genes in fish purchased from Hong Kong wet markets. Efforts should be made worldwide to closely monitor and introduce control of antibiotic resistance in aquaculture as well as pig farms. Our results depict a major reservoir of resistance genes that extend beyond our health care environments and threaten our dwindling options of effective antibiotics in future human medicine. Further epidemiological studies and detailed analyses of the mobile genetic elements encoding these genes should also be conducted to assess the full extent of zoonotic transmission and dissemination of these AMR genes between animal and humans. MATERIALS AND METHODS {#s4} ===================== Sample collection. {#s4.1} ------------------ Food animal samples were purchased from 18 wet markets to include one each from a district and to represent three geographical regions (New Territories, Kowloon, and Hong Kong Island) of the city. Food animals, including gut samples of 213 snakehead fish (*Channa* spp.) and 198 black carp (*Mylopharyngodon* spp.) and 339 pig organs (171 tongues, 84 small intestines, 64 large intestines, 9 minced meat samples, 4 tails, 3 livers, 3 kidneys, and 1 snout). They were obtained between April 2018 and January 2019. Samples were transported and stored at 4°C after purchase and were processed within 24 h. Isolation of ESBL-E and CPE. {#s4.2} ---------------------------- Deep tissues, where applicable in the food sample, were dissected using sterile equipment to avoid handling and environmental contamination ([@B37]). A small piece of tissue was transferred to 3 ml of normal saline and homogenized prior to seeding 10 μl of the homogenized sample on Chromid ESBL agar (bioMérieux, France), which was then incubated at 37°C for 18 to 24 h ([@B38]). Presumptive *Enterobacteriaceae* colonies were selected from each plate and identified by matrix-assisted laser desorption ionization--time of flight mass spectrometry (MALDI-TOF-MS) (Bruker Daltonics, Inc., Germany) followed by phenotypic confirmation via double disc synergy test according to CLSI guidelines ([@B39]). All confirmed ESBL-E strains were saved at −80°C in 10% (vol/vol) glycerol-brain heart infusion (BHI) broth (Oxoid, UK) for further analysis. CPE were isolated by transferring 2 ml of homogenized normal saline suspension (mentioned above) to sterile tubes containing 8 ml of Trypticase soy broth (TSB) (Oxoid, UK) enriched with 1 mg/liter meropenem (Oxoid, UK) prior to incubation at 37°C for 18 to 24 h. Ten microliters of incubated broth was seeded on CARBA SMART agar (bioMérieux, France) and incubated at 37°C for 18 to 24 h ([@B38], [@B40]). Presumptive *Enterobacteriaceae* colonies were selected from each plate and identified by MALDI-TOF-MS followed by phenotypic confirmation using a carbapenem inactivation method (CIM) as described previously ([@B41]). All confirmed CPE strains were saved at −80°C in 10% (vol/vol) glycerol-BHI broth (Oxoid, UK) for further analysis. Antibiotic susceptibility testing. {#s4.3} ---------------------------------- Antimicrobial susceptibility testing was performed using the agar disk diffusion method according to CLSI recommendations ([@B42]). The antimicrobial disks tested were piperacillin-tazobactam (PTZ; 100/10 μg), ampicillin (AM; 10 μg), gentamicin (GM; 10 μg), ciprofloxacin (CIP; 5 μg), cefepime (CFP; 30 μg), ceftriaxone (CFT; 30 μg), meropenem (MEM; 10 μg), imipenem (IMP; 10 μg), amoxicillin-clavulanate (AMC; 20/10 μg), and cefotaxime (CTX; 30 μg) for ESBL-E and additionally fosfomycin (FOS; 200 μg) for CPE strains. Escherichia coli ATCC 25922 was used as a control ([@B42]). Screening for ESBL-producing isolates. {#s4.4} -------------------------------------- The combination disk method was used to confirm ESBL-E strains. In brief, pairs of disks containing cefotaxime (30 μg) and ceftazidime (30 μg) were used with and without clavulanic acid (10 μg) on the same inoculated plate containing Muller-Hinton agar (Oxoid, UK). A positive test result was defined as a ≥5-mm increase in the zone diameter compared to that of a disk without clavulanic acid ([@B42]). Molecular characterization of ESBL-E and CPE. {#s4.5} --------------------------------------------- **(i) DNA extraction, PCR amplification, and amplicon sequencing.** Two to four bacterial colonies were emulsified in 200 μl of distilled water, heated at 95°C for 15 min, and centrifuged at 16,000 × *g* for 5 min ([@B43]). The supernatants were directly used as the template DNA and stored at −20°C until use. All confirmed ESBL-E strains were screened using multiplex PCRs as previously described for the detection of *bla*~CTX-M~ genotype groups 1, 2, and 9, *bla*~TEM~, *bla*~SHV~, *bla*~OXA~, and genes encoding carbapenemase groups, *bla*~KPC~, *bla*~NDM~, *bla*~OXA~, and *bla*~IMP~ ([@B44], [@B45]). All ESBL-E positive for *bla*~CTX-M~ genotype groups 1, 2, and 9 were further subjected to another set of PCRs for the detection of gene encoding the CTX-M enzyme by Sanger sequencing as described previously ([@B45]). **(ii) Whole-genome sequencing of CPE.** DNA of CPE strains was extracted using a Wizard Genomic DNA purification kit (Promega, USA) according to the manufacturer's protocol, followed by library preparation via a Riptide high-throughput rapid DNA library preparation kit (iGenomx, USA) according to manufacturer's instruction. Genomes were sequenced by NextSeq mid-output 500 obtaining paired-end reads at 150 bp (Illumina, USA). Sequence reads were demultiplexed according to the manufacturer's instructions for the library preparation kit prior to our genome assembly pipeline, as previously described ([@B46]). Briefly, *de novo* assembly of the sequence reads was generated by SPAdes (3.10.1) ([@B47]), where contigs with a depth of \<5 and length of \<500 bp were filtered. Resistant gene profiles and plasmid replicons were acquired by blasting and read mapping to ResFinder (version 2019-02-20) and PlasmidFinder (version 2018-11-20) ([@B48], [@B49]). Virulence factors were identified using VFDB ([@B50]). PubMLST database was used for multilocus sequence typing (MLST) ([@B51]). A pangenome tree was constructed by Roary and visualized by ETE ([@B52], [@B53]). The genetic environment of the carbapenemase gene was scaffolded two ways: (i) raw reads were mapped to reference plasmid by Bowtie 2 (2.3.4.1); (ii) contigs from the *de novo* assembly were aligned to a reference plasmid ([@B18]). If the coverage of both methods was \>80%, this reference was treated as a draft plasmid. We thank our summer students Victoria Chu, Nicole Lau, Ingrid Chan, and Rachel Lau for their assistance and participation. This project is supported by the Food and Health Bureau, Government of Hong Kong Special Administration Region and Health and Medical Research Fund (HMRF) grant number 17160212 (to M.I.). We declare no conflict of interest. [^1]: **Citation** Sapugahawatte DN, Li C, Zhu C, Dharmaratne P, Wong KT, Lo N, Ip M. 2020. Prevalence and characteristics of extended-spectrum-β-lactamase-producing and carbapenemase-producing *Enterobacteriaceae* from freshwater fish and pork in wet markets of Hong Kong. mSphere 5:e00107-20. <https://doi.org/10.1128/mSphere.00107-20>.
2023-09-14T01:27:13.970301
https://example.com/article/2365
Q: MVP Framework for winforms i'm working in a new project and i want to implement MVP pattern. There is a framework for winforms that use this pattern? I checked CAB but my project isn't complex to implement it, i search for something more simple to implement and use. Thanks! A: If you are looking for something simple... then you really don't need a framework. You can roll your own MVP pattern. Writing the base classes takes only a few minutes. //Base Presenter Class public class Presenter<TView> where TView : class, IView { public TView View { get; private set; } public Presenter(TView view) { if (view == null) throw new ArgumentNullException("view"); View = view; View.Initialize += OnViewInitialize; View.Load += OnViewLoad; } protected virtual void OnViewInitialize(object sender, EventArgs e) { } protected virtual void OnViewLoad(object sender, EventArgs e) { } } //Base View public interface IView { event EventHandler Initialize; event EventHandler Load; } That is all you need to get started. You can then define a new view to suit your needs. public interface IPersonView : IView { String PersonName { get; set; } DateTime? DOB { get; set; } event EventHandler SavePerson; } Create a presenter that uses the view. public class PersonPresenter : Presenter<IPersonView> { private IPersonDb PersonDB { get; set; } public PersonPresenter(IPersonView view, IPersonDb personDB) : base(view) { if (personDB == null) throw new ArgumentNullException("personDB"); PersonDB = personDB; } protected override void OnViewInitialize(object sender, EventArgs e) { base.OnViewInitialize(sender, e); View.PersonName = "Enter Name"; View.DOB = null; View.SavePerson += View_SavePerson; } void View_SavePerson(object sender, EventArgs e) { PersonDB.SavePerson(View.PersonName, View.DOB); } } And finally put it into use in a new form. public partial class Form1 : Form, IPersonView { private PersonPresenter Presenter { get; set; } public Form1() { Presenter = new PersonPresenter(this, new PersonDb()); InitializeComponent(); InvokeInitialize(new EventArgs()); } public string PersonName { get { return tbName.Text; } set { tbName.Text = value; } } public DateTime? DOB { get { return String.IsNullOrWhiteSpace(tbDOB.Text) ? (DateTime?) null : DateTime.Parse(tbDOB.Text); } set { tbDOB.Text = String.Format("{0}", value); } } public event EventHandler Initialize; public void InvokeInitialize(EventArgs e) { EventHandler handler = Initialize; if (handler != null) { handler(this, e); } } public event EventHandler SavePerson; public void InvokeSavePerson(EventArgs e) { EventHandler handler = SavePerson; if (handler != null) { handler(this, e); } } } I like Jeremy Miller's stuff a lot. And I have used the Smart Client Software Factory... but those are about solving very large complicated problems. There are so many other patterns mixed in that it overshadows the simplicity of the MVP pattern to begin with. Start simple and as you start to run into rough spots, then you can begin to add in things like Service Locators and Event Aggregators. The MVP pattern is really very trivial to implement. I hope this can help to get you off to a running start more quickly. Cheers, Josh A: This is not a framework, but I would read Jeremy Miller's Build Your Own Cab series before you settle on your design. He covers the various presentation patterns in WinForms.
2024-06-26T01:27:13.970301
https://example.com/article/4764
We spend countless hours scouring the globe for new products and we try to find the best selection possible to give you as many choices possible. The products below are just the beginning as we continue to add products daily. The Mushroom Anchor 8.0 lbs is a compact mushroom shaped anchor that is easy to store when not in use and that is less likely to get hung up on the bottom. The vinyl coated anchor will...Continue Reading The Mushroom Anchor 5.0 lbs is a compact mushroom shaped anchor that is easy to store when not in use and that is less likely to get hung up on the bottom. The vinyl coated anchor will...Continue Reading The BIC Sport Adjustable SUP Paddle combines both performance and versatility. Two fully redesigned blade shapes allow the rider to choose a blade that compliments their size and riding...Continue Reading The BIC Sport Adjustable SUP Paddle combines both performance and versatility. Two fully redesigned blade shapes allow the rider to choose a blade that compliments their size and riding...Continue Reading
2024-02-08T01:27:13.970301
https://example.com/article/2443
One of the main requirements of Produce Traceability Initiative is the use of the GS1-128 barcode symbology. Some of the specifications of the symbology are: Starts with an Application Identifier (AI) of "01" Implementation guide references labels Includes a GTIN (Global Trade Identification Number) which is a total of 14 characters long. The first two characters are the AI of "01", the next character is an indicator for packaging level and the next twelve characters are the manufacturer number and the product number. The last character "5" is the check digit Includes an AI of "10", which signifies lot code and the next nine characters "022208ABC" are the actual lot code GS1 specification for a GS1-128 bar code is a minimum of an ANSI C barcode grade The maximum width of the bar code inclusive of quiet zones is 6.5" The label also needs to include a 4 digit "Voice Pick Code" Produce Traceability Initiative Carton Compliance - Labels Label Printer Applicators use a thermal transfer printer to print variable information onto a label and then applies it to the case, carton or pallet. The ID Technology Model 252 Label Printer Applicator prints crisp, clear barcodes as well as human readable alphanumeric text to meet the PTI requirements. Label Printer Applicators printing on a white background with dark print, provide the highest contrast and consequently the most reliable scan of the GS1-128 barcodes required by the Produce Traceability Initiative. Produce Traceability Initiative Carton Compliance - Inkjet Technology The ProSeries inkjet systems from ID Technology are capable of printing a four-inch high block of information and graphics, including the GS1-128 barcodes required by the Produce Traceability Initiative. The industrial inkjet systems can be specified with multiple print heads for printing on multiple sides of the case. Like the printer applicators or laser coders for case marking, inkjet printers give packagers the ability to eliminate or reduce the number of pre-printed secondary cases, which cuts material, transportation, warehousing, and material handling costs. Produce Traceability Initiative Carton Compliance - Laser Technology The application of laser marking on a carton requires a special coating be placed in specific areas on the shipper. The laser then burns barcodes, like the GS1-128 required by the Produce Traceability Initiative, as well as, graphics and text into the coating to create a visual contrast. Laser coding does not require consumables on the packaging line and therefore the production line does not need to be stopped for replenishment. View a video of FireTag - a complete PTI Laser Coding Solution. Produce Traceability Initiative Pallet Compliance - Labels For pallets, labels are the only alternative. The Produce Traceability Initiative requires the use of SSCC (Serialized Shipping Container Code) when labeling pallets. SSCC is a GS1-128 bar code (contains the manufacturer number and a unique number to identify the pallet for a total of 18 characters SCC always starts with Application Identifier (AI) of "00" There are Pros and Cons for each technology. A site survey should be performed to evaluate product handling, bar code quality objectives, capital costs, operating costs and required production line speeds. After analysis of the above, the best technology for the specific application can be chosen.
2024-06-24T01:27:13.970301
https://example.com/article/7691
Hang on for a minute...we're trying to find some more stories you might like. Email This Story Send email to this addressEnter Your NameAdd a comment hereVerification It has been 40 years and 10 lackluster sequels since the original “Halloween” film was released in 1978, and now, the franchise finally returns in all its glory — for the most part. Despite many attempts, it seems the movie industry will never nail the sequel to the iconic spooky film. This year’s “Halloween” has moments of great intensity and suspense in the backdrop of an alluring atmosphere — but even with all that, the film could have been stronger and more developed in regards to plot. The film begins with both the one and only slasher-dearest, Michael Myers, portrayed by James Jude Courtney, and The Shape at a rehabilitation hospital. Nick Castle, who played Michael Myers in the original film, played The Shape — the shadow of Myers that haunts his victims. The hospital has been his home for the past four decades. Keep in mind that director David Gordon Green chose to approach the film as if the past 10 sequels had never happened. This is a direct sequel to the 1978 version, set in present-day. The four decades since “The Night He Came Home” have not been kind to sole survivor of the Myers attacks, Laurie Strode, played by Jamie Lee Curtis. She has become an alcoholic isolationist who suffers from severe PTSD. She’s obsessed with guns, weapons and protection to the point that it has cost her two marriages and even had her only child Karen, played by Judy Greer, taken from her by the state. Even after all these years, the enigma of what makes Myers so murderous is unknown. This mystery is why Myers’ psychiatrist Dr. Ranbir Sartain, portrayed by Haluk Bilginer, has an utter — and often dangerous — fascination with the killer. Dr. Sartain takes over for Myers’ original psychiatrist Dr. Samuel Loomis, portrayed by Donald Pleasence, from the original film. They may be different characters, but they are as equally unstable. The story takes off once Aaron and Dana, a pair of true-crime podcasters played by Jefferson Hall and Rhian Rees, attempt to interview Strode to try to get her to agree to a face-to-face interview with Myers — however, she declines, due to her severe PTSD. Their request sets a chain of events into motion that leads to Myers escaping prison during a transfer to another facility. This is accomplished with the help of Dr. Sartain, and it becomes evident he is just as insane as Myers himself. Myers strikes almost immediately — leaving behind a trail of bodies, nearly triple the body count of the original, probably in order to keep up with modern expectations of a movie of this kind. With nearly 100 years of horror films under Hollywood’s belt, one could say viewers may be desensitized to death in films, so to make up for the loss of shock more killings are added. Otherwise, audiences may think that a film wasn’t scary enough or bloody enough for them — but the 2018 “Halloween” successfully keeps up with these expectations. The story wisely sets the focus on the characters, which makes the horror aspects more compelling as opposed to an abundance of secondary or anonymous characters. The film does well in keeping with the thrilling tone of the original movie as well — especially when Myers makes his way to Strode, who is more than prepared to take him on. As the movie progresses, it becomes increasingly apparent how utterly supernatural Myers and his mask are. The viewers do not need to see him walking around front and center — rather, he appears in the background or in the corners of eyes until he strikes with a great impact. Though this film is incredibly entertaining with many great moments and performances, one could say it is a bit frustrating in the sense that an even better movie is somewhere in there. All of the ideas are put in place to have a new take on the Halloween franchise and a great film in general but it falls a little flat in that department. It could have been a kickass, good vs evil, manhunt, revenge film that flips the script with Myers being the one hunted by Strode. Rather, the writers stick with keeping it as a “soft reboot.” For how strong Curtis’ Strode was, she could have been even more. Green should have included scenes of her fighting and lifting massive weights like other characters in revenge movies, and fewer scenes directly from the original. Next time, the writers — Jeff Fradley, Danny McBride and Green — should choose this route rather than simply making another remake or reintroduction to the franchise. The writers just need to keep trying and incorporating new ideas considering the plentiful sequels mostly fall flat due to their lack of originality. Nevertheless, Green’s “Halloween” is easily the best one since John Carpenter’s, who was an executive producer on this film. It didn’t stray from the original storyline while adding depth, emotion and confidence to a franchise that has stood on shaky ground. “Halloween” doesn’t reinvent the wheel or create a new subgenre of horror, and no one actually expected it to. What it does do is take the best parts of all the films in the franchise, and deliver the ultimate companion piece to Carpenter’s original masterpiece. It’s a film that not only has something to say about trauma and the severe impacts that can follow not just the victims but the lives of everyone close to them, but also delivers an incredibly entertaining time. Audiences seemed to have more than enjoyed it with its $76 million opening weekend and a sequel currently in production. In this upcoming sequel, the writers should focus on Strode and her daughter and granddaughter — Karen and Allyson, respectively — as they deal with the shared traumatic experiences of that night since so much of this film focuses on Strode’s PTSD. It will do the franchise well if the writers give Myers a purpose. Why is he driven to kill? What’s the motive? He needs to be deconstructed further.
2024-04-08T01:27:13.970301
https://example.com/article/9237
Another Coinbase executive, Dan Romero, has left the exchange after serving for five years. Romero is the vice president tasked with handling the exchange’s international clients. However, the Coinbase executive indicated that he will be leaving his post at the end of this month. As per his LinkedIn account, the executive joined the exchange in 2014. His departure notice did not include a reason why he’s leaving or a clue of where he is going. Romero said: Staying true to the mission often requires doing hard (or even unpopular) things. But I’ve been lucky to learn first-hand that it’s those hard things that often generate the most value. I’m planning to take some time to figure out what’s next. The Coinbase executive noted that he entered the scene when the exchange only had 20 employees and he’s leaving when Coinbase has more than 700 employees. While at the exchange, Romero has been able to provide his input on virtually every part including, but not limited to, working on aspects touching on consumers, institutions, and banking partnerships. In the recent past, Coinbase has been involved in hiring new employees and letting go of others. For example, Christine Sandler, who handled institutional sales in the position of a director, left the exchange a few days ago. Sandler has since joined Fidelity Investments, a leading financial services firm. Additionally, at the beginning of this year Soups Ranjan and Vaishali Mehta left the exchange. Ranjan and Mehta were director of data science & risk and senior compliance manager respectively. Towards the end of 2018, Coinbase attracted 300 million U.S dollars in a funding round making it have a valuation tag of 8 billion U.S dollars. Since early 2018, Coinbase was said to be offering attractive packages to employees to prevent them from leaving. Do you think the Coinbase executive will join another crypto firm at a similar or higher position? You may also be interested in: Share the news on; 7 7 Shares
2023-09-17T01:27:13.970301
https://example.com/article/4216
From Lakeway to Austin, we've got you covered. Leander Lago Vista New Construction Lantz's Lakeside PlumbingMembership A membership with Lantz’s Lakeside Plumbing is not just an emergency measure, it’s a preventative measure. We provide multiple membership options with our company to ensure your needs are met. Our fair pricing means you receive fantastic service for a low rate. Our professional plumbers inspect and maintain your plumbing to keep it functioning the way it should: Without fail. Your Plumbers For Austin, TX Lantz’s Lakeside Plumbing offers all your plumbing solutions. We do it all, from small repairs to full construction and remodeling. We proudly serve Austin, TX and the surrounding area with a wide array of repair and maintenance options. Whether your water is in need of a filtration or softening system or if you need your drains unclogged, we’ve got you covered. Our plumbers are here for your plumbing needs. If you want to just make sure your system remains maintained, we also offer preventative maintenance plans and memberships to make sure your plumbing stays in peak condition. Call us today at (512) 260-7889 and speak with one of our specialists today! A Plumber You Can Trust On every job, our customer’s safety comes first. As part of our excellent customer service, we follow Texas State Law HB 705, effective 9/1/2003, requiring all employees to undergo background checks and all criminal records be reviewed before a plumber can enter a home. We make sure each and every Lantz’s Lakeside Plumbing plumber is 100% legal and licensed by the state of TX. Our plumbers undergo drug testing by Nationwide prior to entering any home. We encourage you to request to see licenses and permits from our plumbers before entering your home. We have two convenient locations in the Austin Area. Bringing you the best customer service experience and a solution to your plumbing problems is our goal. Give us a call today at (512) 260-7889 to schedule your service! Repairs & Maintenance Regardless of the repair needed, our plumbers are able to assist! Our qualified plumbers can complete any number of repairs or maintenance on your home plumbing. Drain Cleaning – Soap or grease build up can lead to terrible clogs within your drains and pipes. This becomes apparent by slow drains and sometimes by your drain stopping up all together. Give us a call today (512) 260-7889 and we will get your drains unclogged and back to draining. Faucet Repair – Faucet leaks are very simple to fix, however, many people put it off. If your faucet has a drip or a slow leak, call your local plumber as soon as you can. Waiting on getting leaks repaired can lead to worse damage and even the need to completely replace your faucet. Garbage Disposals – Garbage disposals may break down easily, but they can be fixed. Before you go to just buy a new disposal, call us at (512) 260-7889 and have one of our expert plumbers resurrect your garbage disposal. Grinder Pumps – If your waste tank is not emptying or if it is emptying onto your lawn, you may have a blocked up grinder pump. Our nine point inspection will get your grinder pump back up before you know it. Plumbing Leaks – Cracked pipes and mystery drips? It may be a simple issue of pipes needing more room to work, or it may be plumbing leak. Our plumber will use state of the art equipment, locate the leak, and repair or replace the pipe. After, we will check to make sure everything is running smoothly in your plumbing. Sewer Camera Service – Our sewer camera inspection uses a state of the art camera on a flexible lead. Using this, we can inspect your pipes for blockages, cracked or corroded pipes, and more. We can advise you on future issues and how to repair or maintain your pipes. Toilet Repair – Whether its a wobbly toilet that needs its bolts tightened, or a reservoir that just won’t stay full, we will inspect and service your toilet. No project is too small for our customer service. Let us take a look at your toilet today and we can repair any issue it may spring. Water Heaters – Water not getting hot? Need a replacement water heater? We are highly experienced in water heater care and replacement. Give us a call today at (512) 260-7889 if you need your water heater serviced. Water Softening & Filtration – Hard water can be corrosive to pipes and make cleaning your clothes and dishes difficult. Our plumbers can advise you on water softening or filtration systems to get your water perfect for any use within your home. Installation Do you have building project coming up that requires plumbing? Call Lantz’s Lakeside Plumbing today at (512) 260-7889! Our trained field plumbers can complete any installation or remodeling job. We adhere to superior time frames to make sure your project will be completed when you expect it to be. We understand that every project is different, but we bring top-notch safety, quality, and customer service to each site, regardless of the size of the project. When it comes to commercial projects, for both installation and remodeling we ensure that your plumbing meets health and safety codes. For residential installation, whether it’s a single family custom home or a multi-family installation, our plumbers will give you excellent service and verify your plumbing’s safety at each phase of the installation process. After any installation, we offer preventative maintenance plans to make sure your plumbing system stays at the top of its game. Give us a call today to discuss your installation! Membership Sometimes, plumbing can break down at the most inconvenient times. With a membership with Lantz’s Lakeside Plumbing, our plumbers will maintain and repair your plumbing system with same day service. We will assess your grinder pump and water heater. We even perform winterization on your property’s plumbing for the upcoming winter season. You deserve the best customer service and stress-free plumbing and that is just what we give you. We have two outstanding membership plans to fit whatever your needs may be and even more options with our preventative maintenance plans. If you would like to hear more about our membership or preventative maintenance plans, give us a call to speak with one of our representatives today at (512) 260-7889
2024-05-31T01:27:13.970301
https://example.com/article/4744
#include "stdafx.h" #include "build.h" #include "utils/xrLC_Light/xrDeflector.h" #include "utils/xrLC_Light/xrLC_GlobalData.h" #include "utils/xrLC_Light/xrface.h" void Detach(vecFace* S) { map_v2v verts; verts.clear(); // Collect vertices for (vecFaceIt F = S->begin(); F != S->end(); ++F) { for (int i = 0; i < 3; ++i) { Vertex* V = (*F)->v[i]; Vertex* VC; map_v2v_it W = verts.find(V); // iterator if (W == verts.end()) { // where is no such-vertex VC = V->CreateCopy_NOADJ(lc_global_data()->g_vertices()); // make copy verts.insert(std::make_pair(V, VC)); } else { // such vertex(key) already exists - update its adjacency VC = W->second; } VC->prep_add(*F); V->prep_remove(*F); (*F)->v[i] = VC; } } // vertices are already registered in container // so we doesn't need "vers" for this time verts.clear(); } void CBuild::xrPhase_UVmap() { // Main loop Logger.Status("Processing..."); lc_global_data()->g_deflectors().reserve(64 * 1024); float p_cost = 1.f / float(g_XSplit.size()); float p_total = 0.f; vecFace faces_affected; for (int SP = 0; SP < int(g_XSplit.size()); SP++) { Logger.Progress(p_total += p_cost); // ManOwaR, unsure: // Call to IsolateVertices() looks useless here // Calculation speed up, so commented // IsolateVertices (FALSE); // Detect vertex-lighting and avoid this subdivision R_ASSERT(!g_XSplit[SP]->empty()); Face* Fvl = g_XSplit[SP]->front(); if (Fvl->Shader().flags.bLIGHT_Vertex) continue; // do-not touch (skip) if (!Fvl->Shader().flags.bRendering) continue; // do-not touch (skip) if (Fvl->hasImplicitLighting()) continue; // do-not touch (skip) // find first poly that doesn't has mapping and start recursion while (TRUE) { // Select maximal sized poly Face* msF = NULL; float msA = 0; for (vecFaceIt it = g_XSplit[SP]->begin(); it != g_XSplit[SP]->end(); ++it) { if ((*it)->pDeflector == NULL) { float a = (*it)->CalcArea(); if (a > msA) { msF = (*it); msA = a; } } } if (msF) { CDeflector* D = xr_new<CDeflector>(); lc_global_data()->g_deflectors().push_back(D); // Start recursion from this face start_unwarp_recursion(); D->OA_SetNormal(msF->N); msF->OA_Unwarp(D); // Deflector = D; // break the cycle to startup again D->OA_Export(); // Detach affected faces faces_affected.clear(); for (int i = 0; i < int(g_XSplit[SP]->size()); i++) { Face* F = (*g_XSplit[SP])[i]; if (F->pDeflector == D) { faces_affected.push_back(F); g_XSplit[SP]->erase(g_XSplit[SP]->begin() + i); i--; } } // detaching itself Detach(&faces_affected); g_XSplit.push_back(xr_new<vecFace>(faces_affected)); } else { if (g_XSplit[SP]->empty()) { xr_delete(g_XSplit[SP]); g_XSplit.erase(g_XSplit.begin() + SP); SP--; } // Cancel infine loop (while) break; } } } Logger.clMsg("%d subdivisions...", g_XSplit.size()); err_save(); } void CBuild::mem_CompactSubdivs() { // Memory compact CTimer dwT; dwT.Start(); vecFace temp; for (int SP = 0; SP < int(g_XSplit.size()); SP++) { temp.clear(); temp.assign(g_XSplit[SP]->begin(), g_XSplit[SP]->end()); xr_delete(g_XSplit[SP]); mem_Compact(); g_XSplit[SP] = xr_new<vecFace>(); g_XSplit[SP]->assign(temp.begin(), temp.end()); } Logger.clMsg("%d ms for memory compacting...", dwT.GetElapsed_ms()); } void CBuild::mem_Compact() { Memory.mem_compact(); /* u32 bytes,blocks_used,blocks_free; bytes = Memory.mem_usage(&blocks_used,&blocks_free); LPCSTR h_status = 0; if (HeapValidate (GetProcessHeap(),0,0)) h_status = "OK"; else h_status = "DAMAGED"; clMsg ("::MEMORY(%s):: %d MB, %d Bused, %d Bfree", h_status,bytes/(1024*1024),blocks_used,blocks_free); */ }
2024-04-05T01:27:13.970301
https://example.com/article/9007
Q: how many connections will accept mysql node system I have running one big web application and manipulate around 2 GP of data with 1500 users in a node system.i didn't go with server. while all users are in live the server goes down. so want to know the below the things How many connections MySQL(opensource) will accept at a time. A: You can go to /etc/my.cnf file and check the maximum connection which is allowed. The default setting for max_connections is 100. However you can update that. You can change the setting to e.g. 200 by issuing the following command without having to restart the MySQL server set global max_connections = 200;
2023-09-02T01:27:13.970301
https://example.com/article/9456
© Provided by Independent Digital News & Media Limited Some suggested certain situations they would give their seat to a child (Getty Images) More than half of women say they have suffered sexual harassment on public transport in London, a survey revealed today. The YouGov research suggests that tens of thousands of incidents on buses and the Tube go unreported. The most common offence was being deliberately pressed up against by a stranger, experienced by 37 per cent of women and 12 per cent of men. Twelve per cent of women saw a flasher expose their genitals. Eight per cent had complete strangers request sexual favours. Only two per cent of respondents had made a complaint, despite a Transport for London campaign encouraging passengers to report any form of unwanted sexual behaviour. TfL said the number of reported sex offences across the network was “low”, with one incident for every two million journeys, but it admitted this type of crime is “underreported”. It recorded 285 sex offences on the Underground and 161 on buses between July and September last year. The survey found 39 per cent of Londoners were subjected to unwanted sexual behaviour on public transport — 55 per cent of women and 21 per cent of men. For women, the second most common incident was someone staring at their breasts, reported by 29 per cent. About one in five said their backside had been touched or pinched. Almost two-thirds of incidents happened on the Tube. Crowded carriages are known to be targeted by offenders. There has been a 43 per cent rise in reports of sexual assault on the Tube since 2016. Last year Mayor Sadiq Khan was criticised by his Tory rival Shaun Bailey for a four-year wait to complete the installation of CCTV cameras on the Central line, which has the most sexual assaults — 292 were reported in 2017-18. Siwan Hayward, director of policing for TfL, said: “TfL and the police work tirelessly to combat sexual offences, with 3,000 police and police community support officers dedicated to deterring crime and catching offenders across the network. “This activity includes running regular covert patrols on the Tube network with plain-clothed officers, which have been successful in catching offenders and encouraging more people to report offences, resulting in more than 1,500 arrests since 2015.” She added: “Anyone who experiences or witnesses a crime should report it immediately by texting 61016, as every single report matters and helps build a picture of the offender so they can be caught and brought to justice.”
2023-12-27T01:27:13.970301
https://example.com/article/3152
Q: How to deselect multiple checkboxes at once when another checkbox is clicked in Firefox? I mention Firefox in the title because my current implementation works perfectly in Chrome and IE but not in Firefox. Currently I have two groups of checkboxes in one dropdown menu that are identified by two different classes, upperFilter and lowerFilter. What I want to happen is when a checkbox in the upperFilter group is clicked, any checkboxes that are already selected in the lowerFilter group are deselected and vice versa. This is how I am currently handling this in javascript: $("INPUT:checkbox").click(function () { if ($(this).hasClass("upperFilter") && $('INPUT:checked').filter('.lowerFilter').length > 0) { $('INPUT:checked').filter('.lowerFilter').click(); } else if ($(this).hasClass("lowerFilter") && $('INPUT:checked').filter('.upperFilter').length > 0) { $('INPUT:checked').filter('.upperFilter').click(); } // other stuff... }); Like I stated above, this works in Chrome and IE but in Firefox what happens is that when more than one checkbox is selected and you select a checkbox in the other group only one of the previously checked boxes get deselected. What's strange is that I can select 3 boxes from upperFilter and then open up the Firebug console and type $('INPUT:checked').filter('.upperFilter').click(); and it deselects all 3 of them at once. Also, all of the JS is loaded at the end of the page, just FYI. I have no idea why it would work in the console and not in-page. A: Using .click is not the right way to go. Here's why: You code says when some one clicks on the top, trigger the click event on the bottom (and vice versa). So what's happening right now is someone clicks the top, and then you trigger a click on the buttom, which in turn is going to trigger a click on the top, which will then... you get the point. Its hard to tell what you are trying to do and we can't see what happens on the page as different checkboxes are clicked, but you need to take advantage of both the click and change event. Keep the logic you currently have where clicking on the top toggles the bottom and vice versa. Instead of triggering the click event with (.click), trigger the change event. So replace this: $('INPUT:checked').filter('.lowerFilter').click(); with this: $('INPUT:checked').filter('.lowerFilter').prop('checked', false).trigger('change'); Then, elsewhere in your app, you need to listen for the "change" event on the checkboxes and update that part of your app accordingly.
2023-08-20T01:27:13.970301
https://example.com/article/4513
Islamic State fighters are holding onto a small part of Sirte, Libya more than six months after local Libyan forces began an offensive to retake the city. The “Solid Structure” (Al Bunyan Al Marsoos) operations room, which is backed by the US and its Western allies, oversees the ground offensive against the so-called caliphate’s men. On Nov. 17, Solid Structure posted an updated map of the fighting on its official Twitter feed. The map can be seen below: Solid Structure’s map indicates that Abu Bakr al Baghdadi’s loyalists are primarily located in Al Giza Al Bahriyia neighborhood, which is one of several areas that was still under the jihadists’ control as of August. The Islamic State’s North African safe haven has shrunk considerably since earlier this year. But the group’s men have managed to stave off total defeat despite being surrounded and pressed up against the Mediterranean coast. A previous map tweeted by Solid Structure on Sept. 22, and reproduced below, indicated that the Islamic State’s men were hunkered down in both the 600 neighborhood and Al Giza Al Bahriyia. Now the group is only in the latter. Baghdadi’s fighters have managed to keep a foothold inside the city for the past two months, even as American airstrikes pounded the jihadists. The US air campaign in Sirte began on Aug. 1. US Africa Command (AFRICOM) reports that there have been 368 airstrikes as of Nov. 8. More than half of these precision bombings (187) were launched in October, the third month of the campaign.But the airstrikes have slowed this month, with only one reported bombing. AFRICOM’s Gen. Thomas Waldhauser told Stars and Stripes earlier this week that approximately 200 Islamic State fighters remain entrenched in a few city blocks. As in Mosul, the jihadists have dug a series of tunnels and are relying on snipers, improvised explosive devices (IEDs) and suicide bombers. However, the Islamic State has not claimed any “martyrdom operations” in recent days. Sirte fell to Baghdadi’s organization last year and was considered one of the caliphate’s three most important cities, behind only Mosul in Iraq and Raqqa in Syria. The Islamic State may have had thousands of fighters stationed in Sirte at the height of its control. The US is currently attempting to track the jihadists who fled the stronghold for elsewhere in Libya and North Africa. Several hundred Solid Structure fighters have been killed, and a few thousand more wounded, during the heavy block-by-block fighting in Sirte. And the Islamic State’s Amaq News Agency, a key part of the group’s propaganda machine, claims that the jihadists continue to exact a heavy toll. Amaq has posted near daily updates from the fighting in and around Sirte throughout November. The jihadists often refer to Solid Structure’s forces as “militants” belonging to Libya’s Government of National Accord (GNA). Solid Structure, which draws fighters from Misrata and elsewhere, is allied with the GNA, which is the UN-backed government in Libya. For example, Amaq reported on Nov. 13 that a “military vehicle belonging to National Accord militants” was “destroyed” and all of “those aboard killed” west of Sirte. On Nov. 14, Amaq claimed 5 GNA “militants” were killed and 22 more wounded during “clashes” in the city. Amaq released another news update that same day, claiming the GNA-backed fighters had suffered ten more casualties. On Nov. 16, Amaq alleged that GNA “militants” had “sustained 6 deaths and 42 injuries as a result of battles with Islamic State fighters in Sirte city” over the past two days. A video released by the propaganda outlet also supposedly showed a checkpoint that was being manned by the jihadists south of Sirte. The video was likely intended to bolster morale and show that the Islamic State’s diehards still maintain some degree of control over territory inside Libya. In an audio message released earlier this month, Abu Bakr al Baghdadi praised his men in Sirte for supposedly foiling the designs of the European “Crusaders.” Baghdadi called on his “soldiers” to fight to the death in Libya and elsewhere. For more on the offensive against the Islamic State in Sirte, Libya, see FDD’s Long War Journal reports: Libyan forces seize key points from the Islamic State around Sirte Opposition to Islamic State claims more ground in Sirte, Libya Islamic State claims to still control 4 neighborhoods in Sirte, Libya The battle for Sirte, Libya continues Islamic State’s safe haven in Sirte, Libya shrinks to a ‘single neighborhood’ US has launched more than 300 airstrikes against the Islamic State in Sirte, Libya Thomas Joscelyn is a Senior Fellow at the Foundation for Defense of Democracies and the Senior Editor for FDD's Long War Journal. Are you a dedicated reader of FDD's Long War Journal? Has our research benefitted you or your team over the years? Support our independent reporting and analysis today by considering a one-time or monthly donation. Thanks for reading! You can make a tax-deductible donation here.
2024-06-03T01:27:13.970301
https://example.com/article/4742
Baldina, South Australia Baldina is a rural locality in the Mid North region of South Australia, situated in the Regional Council of Goyder. It was established in August 2000, when boundaries were formalised for the "long established local name". The name Baldina stems from an Aboriginal word for a set of springs on Baldina Creek. The name was used for two pastoral runs in the area: the Baldina Run, established by Henry Ayers in 1851, and the Baldina Creek Run by Alfred Barker in 1855-1856. The cadastral Hundred of Baldina was proclaimed on 30 December 1875; the hundred boundaries also include roughly half of modern Worlds End and a section of Burra Eastern Districts. Baldina School opened in 1885 and closed in 1930, held in a Lutheran chapel. There were at least four former churches in the Hundred of Baldina: the Upper Bright (Baldina) Lutheran Church (1887-1960), the Baldina Plains (St Paul's) Lutheran Church (1878-1913) east of the Burra-Morgan Road, the Baldina Methodist Church, and the Douglas Primitive Methodist Church. A hotel, Midwinter's Hotel, was licensed in 1880 and served as a local meeting place, but was destroyed by fire in 1887. Baldina also once had its own post office. The locality also includes the Red Banks Conservation Park, claimed to be one of the richest megafauna sites in Australia, and the Baldina pastoral station. Baldina Cemetery is now located in Burra Eastern Districts due to changes to local boundaries. There are also two former towns within the current boundaries: Douglas and Kilto. Douglas, along Eastern Road in the north of Baldina, was surveyed in March 1877 and declared to have ceased to exist on 18 June 1981. Kilto, now in the south of Baldina, was gazetted as an unbounded locality; it had originally been named Klaebes, but was one of the Germanic place names renamed during World War I. Klaebes Post Office opened in August 1879, closed in December 1910, and reopened around 1913; its final closure date is unknown. References Category:Towns in South Australia Category:Mid North (South Australia)
2024-06-07T01:27:13.970301
https://example.com/article/1927
CS-Code The CS-Code offering is an Interactive Secure Development Training program that is effective, has high developer engagement, and assists in lowering the risk of vulnerabilities in the code. The service provides offensive security training as well as defensive instruction to help software developers write safer code. This approach is both more effective than defensive only methods and keeps developers engaged. Developers improve their ability to write secure software, boost their understanding of how software systems are hacked, and decrease the time to solve security related problems.
2024-05-21T01:27:13.970301
https://example.com/article/8364
Q: Kubernetes: Service routing to pods with multiple containers I am currently facing an issue in my Kubernetes cluster. While debugging that I had a question in mind which I didn't know the answer to. I am using AWS EKS, version 1.15 but I don't think my question is related to any specific cloud or kubernetes version I have a deployment. It has multiple containers. There is a service that exposes this deployment. Suppose the deployment has 2 containers, C1 and C2. C1 takes 1 second to start but C2 takes 30 seconds to start(crazy!). So, when I start the pod at time t1, what happens is that once C1 starts immediately and the pod goes into running status but only 1/2 containers are ready. The pod C2 finally starts at time t2(t1+30seconds). At time t2, 2/2 containers are ready. Also assume that C1 takes the incoming request from the service, it does something and then forwards request to C2, C2 does something and then returns it to C1. C1 finally returns to service and the response is served to client. So, my question is, during the time between t2 and t1, when pod is in running state but only 1/2 container is ready, would the service forward requests to the pods? Put another way, when does the service forward request to pods? If they are in running state and not matter how many containers are ready? OR if they are in running state and all containers are ready? My thinking is that service won't forward as it won't make any sense if all the pods are not ready but I don't have any proof/document to justify it. A: ...when pod is in running state but only 1/2 container is ready, would the service forward requests to the pods? No. when does the service forward request to pods? If they are in running state and not matter how many containers are ready? OR if they are in running state and all containers are ready? My thinking is that service won't forward as it won't make any sense if all the pods are not ready but I don't have any proof/document to justify it. Here it is :) Official documentation says that "...the kubelet uses readiness probes to know when a container is ready to start accepting traffic. A Pod is considered ready when all of its containers are ready. One use of this signal is to control which Pods are used as backends for Services. When a Pod is not ready, it is removed from Service load balancers..." Additionally it says: "...applications are temporarily unable to serve traffic... an application might depend on external services ... In such cases, you don't want to kill the application, but you don’t want to send it requests either. Kubernetes provides readiness probes to detect and mitigate these situations. A pod with containers reporting that they are not ready does not receive traffic through Kubernetes Services..." Readiness probe is used to detect the situation when traffic shall not be sent to App. My thinking is that service won't forward as it won't make any sense if all the pods are not ready You are absolutely right here. I hope that helps.
2024-02-11T01:27:13.970301
https://example.com/article/8154
How to Lose Baby Fat on Cheeks How to Lose Baby Fat on Cheeks As kids the chubbier cheeks we had the more khate pete ghar ka we were from. Only kids and babies are spared with the chipmunk look. Not young girls like ya’ll 😛 If you want to lose baby fat on your cheek then you’d better get those buccinators (cheekbone muscles that form into apples when you smile) flexing and moving. If you are a skinny person with a lot of face fat, you would also do well by jogging or brisk walking 30 minutes a day to improve your circulation. Doing a 15 hour a day facial exercise is must. Overweight or not. Facial fat can be embarrassing for some woman. You may be petite in structure but have fat face (like myself) then it becomes extra bothersome. I have this thing from neck up I look like another person. Yes this thing is weird but I do have my fare share of fat cheeks and it does get bothersome at times. The pictures also do not come looking very “me”. It’s like if you have a very lean awesome like body lol yes and a little face fat that just extra fat on your face makes you crib. The very great body is useless if you spend hours like me contouring your face before a party. No wait not that there is no choice. We have exercises and diet. These exercises should be performed along with full body workouts and a proper diet for optimal results. Listing below is some of the tips which I found out to be helpful: • First off smile. Abhi karo, aise karo. 🙂 • Smiling exercises your facial muscles. It will not only keep you happy but also help reduce face fat. • Omega 3 fats, eating a lot of fresh, raw fruits and vegetables helps. As it keeps your diet in check and supplement the exercise you do. • Make a fish face. This time not for contouring but for rubbing that fat off your face. Hush hush. • It might look ridiculous, but when you suck in your cheeks it also helps to work out your cheek muscles and can reduce face fat. • Squint your eyes together by using only your cheek muscle. • Press you chin into your chest and stretch the skin under your cheekbones in an upwards motion. While you are doing this say “Ah” by opening your mouth as widely as you can. Again hold the position for a couple seconds, and then repeat it a few more times. • Pucker your lips. • This exercise is two in one; it works out your lip muscles at the same time as your cheek muscles. Puckering your lips can help with losing that extra cheek fat. • Drinking adequate water during a day causes the fat to loose. Sometimes we think we are hungry while we are actually just thirsty. • You should take help of face massages. It is a good practice to give massage to face parts. Massage keeps the face skin tight. Tight skin avoids the skin to swing, so makes the appearance better. • Use magic by using make up i.e. bronzer and blush the right way. • Cosmetic surgery procedures. Do anything everything with your Mademoiselles. • Today use of ultrasound is increasing to loose face fat. A special machine is employed to send energy particles inside your face skin. These particles melt down the face tissues and your mass gets reduced. • Alcohol intake is also known to contribute to fat accumulation in the body. • Also in my case wearing the right kind of hairstyle is what I have found to work me for as well. Get a fringe get some layer right under your cheek and ask your dresser to give you a slimmer nicer face. He sure will know how to work the magic. • And now time for my favorite method: With some air inside, keep your mouth tightly closed. Move some air to the right cheek and hold it before blowing the air out. Do the same for the left cheek, as well as for the upper and lower lip. • De puffing the cheeks can be done by also reducing the salt intake in your food. I think the picture is gorgeous! I love her face! :pompom: :pompom: :pompom: I personally want a little more fat on my cheeks. I do not have a thin face per se, but my cheeks make me look like I have contoured them, and I hate that! 🙁 wonderful article FG… thanks..!! :puchhi: me gonna follow it.. fat face or not most of those specified are extremely good for facial muscles.. :haanji: (PS: don’t do the fish-face exercise sitting @ ur office cabin. One woman in my office does and trust me it looks very funny) :rotfl: :hihi: wonderful article FG. thanks.!! :puchhi: fat face or not most of those specified are extremely good for facial muscles.. :haanji: (PS: don’t do the fish-face exercise sitting @ ur office cabin. One in my office does and trust me it looks very funny) :rotfl: :hihi: ok so since i want the oppsite i want chubbier cheeks i need to do the opposite of everything. i cant smile, i need to drink alot of alcohol, cant do fishy face , haha great -__- im just kidding though Recent from the blog > Ageing is a natural process and we are all bound to grow old one day! While our grandmother still manages to look pretty even at 85, the things that we put our skin through these days can make us look older than we really are! Bad eating habits, pollution, dust, dirt, harmful sun rays accelerate the […] > When you seem to be doing everything right and even then the extra weight just refuses drop, it’s time to put into perspective what you actually might be doing wrong. We tend to get most demotivated the most when we hit the weight loss plateau, but it’s important to keep going to reach your set […] > Dressing to perfection and applying trendy makeup is not complete without gorgeous hair. You don’t want to step out of the house looking chic but sporting dull, straggly hair with flyaways all over. Beautiful and shiny hair is every woman’s dream and here are some amazing ways to make hair silky to make your asset […] > Since we lead hectic lives, encounter heat and sun, use too many chemical-based products, get exposed to pollutants on a daily basis, and have a lot stress that we have to deal with – they all directly affect our hair. As a result, hair fall, thin hair, dandruff, premature greying, split ends are all quite […] > When we think about weight loss, a lot of people tend to give more importance on “what not to eat” and tend to eliminate an entire food group. But here’s the biggest key to weight loss (and to sustain it) – give significance to what food stuff that you should be including to drop weight […]
2024-05-25T01:27:13.970301
https://example.com/article/8798
Q: bash how to print for loop output into one line? I wish if someone can help me with this, how can I print the output of for loop into single line? for i in `cat file.csv` do echo $i done what I'm trying to achieve here is to get a list of numbers from file.csv to generate a mysql bulk delete statement. delete FROM Recordtable WHERE DataID IN ('93041', '93031' ...etc); and the goal here is to load every 1000 records into one single delete statement Your help is highly appreciated A: If you want the loop, you can use for i in ($<file.csv) do echo -n "$i " done The -n option to echo suppresses the newline. You can print the entire file in a single line with echo $(<file.csv). But this may suit your needs better: awk '{ printf $0 " " } NR%1000 == 0 { print "" }' file This will print each line followed by a space. It will print a newline whenever the line number is divisible by 1000; that is, after every 1000th line. Added: To print each line within parentheses, you can use awk '{ printf $0 " " } NR%1000 == 0 { print "" }' file | sed 's/.*/(&)/' The sed command searches for any characters (.*) and replaces them with an open-paren, the characters it found (that is, the entire line), and a close-paren.
2023-12-17T01:27:13.970301
https://example.com/article/5732
In an Out-Of-Order (“OOO”) microprocessor, instructions are allowed to issue and execute out of their program order. For example, the scheduler in an OOO processor can issue and execute a load before a previous store writes to the same memory location. Memory dependencies can therefore exist between such a load and a prior store that needs to access the same memory address. The OOO machine typically needs to address the errors that result from a load returning wrong data because it attempts to access a memory location before a prior occurring store has written to the same memory location. This type of error is known as a memory read-after-write (RAW) violation. Further, the load and store pair is typically referred to as “aliasing” because it is targeting the same memory address. Memory disambiguation is a set of techniques employed by high-performance out-of-order execution microprocessors that execute memory access instructions (loads and stores) out of program order. The mechanisms for performing memory disambiguation, implemented using digital logic inside the microprocessor core, detect true dependencies between memory operations at execution time and allow the processor to recover when a dependence has been violated. They also eliminate spurious memory dependencies and allow for greater instruction-level parallelism by allowing safe out-of-order execution of loads and stores. FIGS. 1A-1B illustrate a typical RAW violation that can arise as a result of out-of-order execution of loads and stores in an OOO machine. FIG. 1A shows that a later load instruction 152 loads data from the same memory address [0x4000] 153 that a previous store 151 writes to. Accordingly, the load 152 should store the same value in register r3 as that stored in register r5 by store instruction 151. As shown in FIG. 1B, if the load instruction 151 is executed before the store, it will load incorrect data. This is known as a RAW violation as discussed above. In order to recover from the violation, the pipeline will need to be flushed and the load instruction along with other instructions dependent on it will need to re-execute. Because of the high computational penalty of a flush operation, it is important to avoid this kind of re-execution from happening in a high performance CPU. FIG. 2 illustrates a more detailed example of how a conventional OOO microprocessor handles a memory read-after-write (“RAW”) violation. Instruction 1 257, Instruction 2 258, Instruction 3 259, and Instruction 4 260 are in program order. However, in an OOO machine, Instruction 3 259, the load instruction, can execute during cycle 2 before Instruction 2 258, which is a store instruction that executes in cycle 4 and accesses the same memory location [0x4000] as the load instruction 259. If load instruction 259 executes in a prior cycle from the store instruction 258, it will get wrong data from memory location [0x4000]. Accordingly, the wrong data will be stored in register r9 by load instruction 259. Further, Instruction 4 260 may execute in cycle 3 using the wrong data from the load instruction 259. In order to correct the errors resulting from this RAW violation, both instructions 259 and 260 are invalidated and need to re-execute following a pipeline flush. The load instruction 259 will receive the correct data from the store instruction 258 during the re-execution, however, a severe computational penalty is paid in order to perform the pipeline flush and re-execution. FIG. 3 illustrates a pipeline for a conventional OOO microprocessor. Instructions are fetched at the fetch stage 302 and placed in the instruction fetch queue (IFQ) (not shown) within fetch stage 302. The instructions are generally the original assembly instructions found in the executable program. These instructions reference the architectural registers which are stored in register file 310. If the first fetched instruction was to be interrupted or raise an exception, the architectural register file 310 stores the results of all instructions until that point. Stated differently, the architectural register file stores the state that needs to be saved and restored in order to return back to the program during debugging or otherwise. In an OOO microprocessor, the instructions execute out of order while still preserving data dependence constraints. Because instructions may finish in an arbitrary order, the architectural register file 310 cannot be modified by the instructions as they finish because it would make it difficult to restore their values accurately in the event of an exception or an interrupt. Hence, every instruction that enters the pipeline is provided a temporary register where it can save its result. The temporary registers are eventually written into the architectural register file in program order. Thus, even though instructions are being executed out of order, the contents of the architectural register files change as though they were being executed in program order. The ROB 308 facilitates this process. After the instructions are dispatched from the fetch unit 302, they are decoded by decode module 304 and are placed in the ROB 308 and issue queue 306 (IQ). The ROB 308 and IQ 306 may be part of a scheduler module 372. As instructions are issued out of IQ 306 out of order, they are executed by execute module 312. In one embodiment, the write back module 314 will write the resulting values from those instructions back to the temporary registers in ROB 308 and rely on the ROB 308 to facilitate committing the instructions in order. However, in a different embodiment, write back module 314 writes the values resulting from instruction execution directly into register file 310 without sorting them. The unordered elements are added in physical memory to the register file 310 in an unordered fashion and are then retired to the architectural files in order at the retirement stage using a ROB initiated protocol. The instructions issued out of order from the IQ 306 may also comprise loads and stores. As explained above, when loads and stores are issued out of order from the IQ 306, there are memory dependencies between them that need to be resolved before those instructions can be committed. Accordingly, the store instructions are stored in order in a Load Store Queue (LSQ) 316 while the dependencies between the loads and stores are resolved with the help of ROB 308. A load instruction uses registers in the register file 310 to compute an effective address and, subsequently, brings the data from that address in memory 318 into a register in register file 310. The store similarly uses registers in the register file 310 to compute an effective address, then transfers data from a register into that address in memory 318. Hence, loads and stores must first wait for register dependencies to be resolved in order to compute their respective effective address. Accordingly, each store instruction is queued in order in a load/store queue (LSQ) 316 while it is waiting for a register value to be produced—when it receives the broadcast regarding its availability, the effective address computation part of the store is issued. The Load Store Queue (“LSQ”) is a component in a conventional OOO microprocessor pipeline that aids memory disambiguation. One of the key requirements for the LSQ is availability of information that allows age order determination between loads and stores. Stated differently, the LSQ requires information that allows it to order the various loads and stores based on age. For example, for a memory load operation to successfully complete, the LSQ must confirm that all stores, older in age order present no RAW hazard and no younger loads incorrectly create hazards with loads to the same address. In an In-Order machine, this is a relatively easy design because the operations arrive at the LSQ in program order and, consequently, also in age order. In an OOO processor, however, the memory operations arrive at LSQ out of order. One of the problems this causes is that it requires all the stores older to a certain load operation to be monitored by some module within the microprocessor pipeline, e.g., a scheduler 372. This needs to be done to assist the load operation in determining the completion status of all older stores which in turn is needed to make a final decision as to whether the data the load operation has acquired is correct or whether it has the potential to encounter a hazard with a conflicting store. Store instructions are queued in order in a LSQ of a conventional OOO processor because when stores are issued out of order from the IQ 306, there are memory dependencies between loads and the store instructions that need to be resolved before they can access memory 318 as discussed above. For example, a load can access the memory only after it is confirmed there are no prior stores that refer to the same address. It is, once again, the ROB 308 that is used to keep track of the various dependencies between the stores and the loads. Further, in conventional OOO processors, the scheduler 372 can also comprise an index array 340 that the ROB 308 communicates with in order to track the various dependencies. The index array 340 is used to store tags that the ROB 308 assigns to all load and store instructions that are dispatched from IQ 306. These tags are used to designate slots in the LSQ 316 for the store instructions, so that the instructions can be allocated in the LSQ 316 in program order. This, in turn, allows memory 318 to be accessed by the store instructions in program order. As a result, in conventional OOO processors, additional storage can be required within the scheduler 372 for an index array 340 that stores tags for the respective locations of store instructions in the LSQ. Further, additional communication overhead is required to communicate tag related information between the scheduler 372 and LSQ 316. A significant disadvantage to conventional OOO processor methods of addressing memory operation disambiguation then is that using the scheduler 372 with index array 340, for example, to track dependencies in the LSQ introduces unnecessary delay because of the communication latency involved with communicating tags between the LSQ 316 and scheduler 372. Further, the requirements to queue stores in LSQ 316 in program order in conventional OOO processor designs results in additional computational penalty. Finally, in conventional OOO processors, LSQ 316 may need to constantly check a load operation to determine the completion status of all older stores with respect to the load operation, which can also introduce additional computational cost.
2024-01-14T01:27:13.970301
https://example.com/article/7757
John Stoyte John Stoyte was an officer of the British Army, recognized for his service in Peninsula and the Battle of Waterloo. He joined the army on 21 March 1811, as an ensign. He was present at the Battle of Badajoz (1812) on 6 April. Operating in the front of the Battle of Salamanca, he was severely wounded, losing one finger and wounded through the left hand and in the breast while carrying the colours, the standard of which was shot away. He was wounded again through the right hand and taken prisoner at Bergen op Zoom. He was present on 16 and 18 June at the Battle of Waterloo. John Stoyte received the ranks of lieutenant on 4 July 1813 and captain on 27 January 1825. On 28 June 1838, he received a brevet-major. Stoyte was captain of a company of the 24th Regiment of Foot, while serving in Canada between 1829 and 1841. He took part in the Canadian Rebellions of 1837. John Stoyte received the Waterloo Medal. References Hart, H. G. 1841. The New Army List. Paton, G. 1892. Historical Records of the 24th Regiment. London. Category:Lower Canada Rebellion people Category:Recipients of the Waterloo Medal Category:British Army personnel of the Napoleonic Wars Category:South Wales Borderers officers Category:British Army personnel of the Peninsular War Category:Royal Scots officers Category:18th-century births Category:19th-century deaths
2023-11-04T01:27:13.970301
https://example.com/article/8508
Microsurgical approach to the anterior cervical spine and spinal cord. When the cervical spine is affected by disease that is predominantly anterior, we prefer to take an anterior operative approach. Whether or not fusion is indicated depends largely upon the case. In general, we do not fuse the spine unless it is unstable. Widening of the spinal canal and the neural foramina can be done effectively by the anterior route, with or without anterior fusion. When the spine is unstable from disease affecting the vertebral bodies, we routinely fuse with bone graft or provide mechanical stability with a vertebral body prosthesis if life expectancy is short.
2024-07-02T01:27:13.970301
https://example.com/article/6853
Q: Does "serializable" also mean that it's lockable Here's an final exam question for a Database Fundamentals class. I've read the book, stuff online.. I can't figure out if "serializable" also means that the schedule is lockable or not. What I mean is.. I understand that for the schedule to be isolated, you have to have non-conflicting reads & writes, but then it also says "if the transactions are not isolated(i.e., serializable).." By determining if the schedule is isolated, does this include determining if locks(lock-W(x), lock-R(x)) and unlocks can be placed inside the schedule, is "serializable" both isolated and lockable? lockable - can locks and unlocks be placed inside the schedule at appropriate R/W-intervals. Here's the question: a). Two transactions are shown below. The statements of the transaction are executed from top to bottom. Specify whether the current schedule meets the Isolated property of ACID and why or why not. If the transactions are not isolated (i.e., serializable) specify what concurrency problem may occur with this schedule. Be specific about what statement(s) in what transaction(s) causes the issue. $$ \begin{array}{}Time&Transaction \, 1&Transaction \, 2 \\1&Read(B)&Read(B) \\2&\_&Update(C = C + B) \\3&Read(C)&\_ \\4&\_&COMMIT \, or \, ROLLBACK \\5&Update(A=B+C)&\_ \\6&COMMIT\, or \, ROLLBACK&\_\end{array} $$ A: The definition of serializable schedule is pretty clear. Intuitively, it is a schedule which is equivalent to a serial schedule. More formally, according to [1] : A serializable schedule over a set S of transactions is a schedule whose effect on any consistent database instance is guaranteed to be identical to that of some complete serial schedule over the set of committed transactions in S. In your example the schedule is definitely serializable, since it is equivalent to running Transaction 2 and then Transaction 1. I don't know what do you mean by "lockable" and not sure that this term can be applied to a schedule. [1] R.Ramakrishnan and J.Gehrke, Database Management Systems, 3rd edition
2024-06-03T01:27:13.970301
https://example.com/article/8691
Rong ZhangSifeng LiuBin Liu 0011Supervising and appraising of harmonious society development grade of china based on grey system theories.2205-22092007SMChttp://dx.doi.org/10.1109/ICSMC.2007.4413639conf/smc/2007db/conf/smc/smc2007.html#RongSB07
2024-02-12T01:27:13.970301
https://example.com/article/9397
This father’s day, I never been so lonely and wishing my father was here. Maybe he will console me and always he will said “Apple andyan na ko.” I am lucky to have a father like him, I remember his long hour of waiting at school yard. Or the baon that he will prepared in my school. He will be the one, do the dishes or any of my chores when I felt sick or something else. He died when I was 11 years old. But I never felt so much missing him until today. My father was my figure of a great man. I saw how much patience he was in my mothers ranting. I saw how much he love my mother. He never failed to kiss my mother when he leave homes. He never failed to provide for us, financial needs, spiritual and emotional. He never left us neither hurt my mother feelings. He was kind enough and generous to my mother extended family. He was been a father not only for me but to my cousin whom somehow lost their father or their father missing in their lives. I missed my father so much. I was wishing to hear the words “Apple andyan na ko.” Then maybe i will be alright. But life goes on. I was wishing I could have a simple yet happy family that my sister and brother had. But then again my life goes on. Until the Lord come, I don’t know what will happen to my life. Then again my life goes on and on. Preloader are the simplest to design but hardest in script. There are so many different ways to build a preloader in Flash and each variation has it’s advantage and specialist use. This is the most simple of all. 1. Create a movie clip with instance name preloader with the ff: a. Loading (static) b. Percent (Dynamic) – make sure this is embed to character range c. Bar (tween to desire length) A recent commercial of Mc Donald featuring a three stories high Adults Playland, taking up the space in front of the Customs House at Sydney’s Circular Quay. One Monday it suddenly appeared, the biggest McDonald’s Playland ever constructed while it suited to clad adults broke their Monday routine with a little time spent on the giant slides. Plus play around on a three meter tall Officer Big Mac, slide, swing and more. I been using jQuery often now a days. jQuery slideshow advantage in SEO, compatible with more browsers than Flash including iPhone, cell phones, PS3 and PSP, these are some of the few reason on increasing demand using this framework. Below are some of my favorite. a. mb.maskedGallery.doc A slide show if you are have Custom frame for your images. You overlap any png file and it masked the gallery. On the eve Electronic Entertainment Expo (E3) in Los Angeles, Microsoft entertained game enthusiast by unveiling the Project Natal that officially called Microsoft Kinect. It will be available on November and it was been forecast ranging from $130 to $200++. * Almost everything was one person at a time, particularly in the Kinect Sports games. Even a game like beach volleyball or soccer was boiled down to individual “moments” of interaction that get strung together into some sort of competition. Even the running in place games were one at a time, though the river rafting and mining cart games (both with a similar mechanic of jumping and ducking through an obstacle course while picking up tokens) could be played with two people at a time. You can at least play games like volleyball simultaneously with someone else over Xbox Live. * An interesting mechanic we saw was a second player “jumping in” to a game. In the mining cart scenario, when the second player jumped in it immediately went split screen, while in soccer different players took turns by just jumping into position. Sure, some of this stuff was edited for our benefit, but it seems Microsoft is working to make the introduction of a second player or the switching between players something less button-heavy. * The Star Wars game was pretty badass-looking — you play a Jedi, rushing down stormtroopers and deflecting laser bolts left and right, wielding a few Force powers, and confronting a certain deep-voiced Sith Lord for a one-on-one duel. Based on the gestures and action we saw, though, it was a pretty heavily scripted experience. Still, there’s no scripting a two-handed light saber grip, and that particular action looked like everything we’ve ever wanted in a Star Wars game. * The yoga game is actually a pretty smart use of the infrared and joint detection software we espied previously. Positions were “checked” by points on the joint — making it certainly harder to fake the moves on Wii Fit — and it seemed to have a tai chi element to it. Your avatar glowed a more intense red based on your three-dimensional approximation — bright red for hands stretched forward, for example. * Next up: Kinectimals, a baby tiger pet simulator. You can scratch its ears, snuggle, and teach the little guy to jump and play dead. Adorable? Dangerously so. No one can tell us the developer, but based on the lighting effects, art style, and similarities to the previously-shown Milo, we’d wager a guess that it was Lionhead Studios. * The Kinect menu interface is about as simple as could be. You wave your hand to control a glowing cursor of sorts, and you push forward to “click” on the element you want. Of course, there’s also a very simplified version of the Dashboard to go along with this control mechanism, so it’s unclear if you’ll be able to do everything via subtle hand waves, but the Twitter, Facebook, Zune and Netflix icons were clearly present. * The MTV Games-developed Dance Central has some on staff divided — only Ross will actually admit to being interested in playing it. A series of dance moves are presented, including elbow jabs, swinging leg, guitar, “rocking out” (with your hand in the air). The art style is akin to Rock Band / Guitar Hero, and to be fair, this is probably one of those games that can’t be done as well on any other console. Today I decided to change everything, a more dynamic Applebyte, a new friendly me. I’m so hurt, God allowed thing to happened in my life. One thing I realized that God the only one being whom never betrayed me nor forsaken me. He will be the source of this change. He will be my inspiration and companion on this phase of my life. I was been bitter that my life seem a picture of depression, sickness and loneliness, but thing will change. One step a time, a step with God and the Christ whom empty me. Yes, I felt empty and I am scare. But one thing for sure, I will never be alone again. No more agonizing heart ache that will take my breath away. No more tears of being alone. No more walking in edge. No more jumping in deep sorrow. No more second thought of my existence. No more pain of rejection. No more fragile and deep depression. I remember, God called you by names and now He calling me. He need me in His kingdom. He need me to be part of his major plan. I will take charge and lead. One miracle each day, one step of faith every moment, one change at the time. Still I have one hope, a family that take a leap of faith in God, a family that serving God. Things happened this week. I am walking in a thin air. Just one day, I felt it about time to patch up, amend, say all my sorry… I really thank God, cause the person whom has a longest time of adversary towards me, sent a beautiful email of forgiveness. I am on the lowest point of my life. I just want to give up, but tonight I just pray and ask God for a miracle. A very special person finally reveals himself. I hope I can go back in time and do thing differently. Everyday I experienced a miracle, little things that if I pray God answered me. Pastor Rick Warren today tweet was very timely. The more I know MY OWN sinfulness,the less inclined I am to disparage OTHERS” He who’s been forgiven much loves much”. – Rick Warren Came from this passage “I tell you, her sins – and they are many – have been forgiven, so she has shown me much love“. Luke 7:47 A tropical storm called Agatha, the floods killed hundred of people and cause giant sinkhole (crate) in Guatemala City. In the Chimaltenango Province, west of Guatemala City, landslides buried dozens of communities, leaving at least 60 dead. While the storm that hit last Saturday, just two days after the Pacaya volcano, about 20 miles south of Guatemala City, erupted, causing the international airport to shut down. Just come to think of it throughout the history Guatemala has been controlled by plantation owners making a healthy profit and then by military dictators hungry for power. Let’s pray for Guatemala as it deals with Agatha and also the effects of the Pacaya volcano, which erupted Thursday night. “God, we ask for your blessing of peace and protection for the people of Guatemala as they deal with the impact of two natural disasters. Stand with those who have suffered the impact of the storm. Give them strength and health. Comfort those who have lost loved ones and those who have lost homes. Stand too with those who have endured the violence of the volcano. Protect them from further harm. Bless and give wisdom to officials who are helping in these emergencies. You do not cause these catastrophes, but you can always make something beneficial out of the pain. God, bless Guatemala. In Jesus name…” Source: blog.beliefnet.com
2024-07-28T01:27:13.970301
https://example.com/article/7452
Q: C#/MonoTouch starter: How to change the color of a Label periodically? i'm pretty new to programming in C# so please don't be mean with the following question. I want to change the Background color of a label (MonoTouch) periodically, but it simply does't. Anyway, the value of "_hue" is printed in the console periodically. public void _timer_elapsed(object sender, ElapsedEventArgs e) { _hue -= 0.1f; lblScreen.BackgroundColor = UIColor.FromHSB (_hue,_sat,_bri); Console.WriteLine (_hue); } Do you guys have a hint? THANX! :-) A: public void _timer_elapsed(object sender, ElapsedEventArgs e) { _hue -= 0.1f; InvokeOnMainThread(delegate{ lblScreen.BackgroundColor = UIColor.FromHSB (_hue,_sat,_bri); }); Console.WriteLine (_hue); }
2024-05-10T01:27:13.970301
https://example.com/article/2833
The change essentially means the chase policy will revert back to the old one, which said officers could pursue only people suspected of violent felonies. It is effective immediately, said acting police Chief David DeKay. "This change in the pursuit policy will still allow officers to be effective in apprehending violent fleeing felons while minimizing risk to the public," DeKay said in a statement. The pursuit policy has always been controversial — and frequently, political. Former Mayor Bill Foster made it a central part of his campaign for mayor in 2009. He promised to loosen the policy to allow officers to go after brazen criminals who knew that police were limited in how they could respond. Foster made good on that promise after he took office, earning the praise of police unions. Kriseman also made it part of his campaign last year, but he promised residents to reverse Foster's directive. "During the campaign, I made my concerns about this policy clear," Kriseman said in a statement Thursday. "Today, I am glad to stand with Chief DeKay, who is in agreement with me, as the Police Department reverts to the previous policy regarding high-speed pursuit." Kriseman's promise — one of 25 being tracked in PolitiFact Florida's Krise-O-Meter — did not earn him any points with the police union. The Suncoast Police Benevolent Association is against the change, said union president Mark Marland. "This change to the pursuit policy does not come as a surprise as he spoke about it on the campaign trail," Marland said Thursday. "What is concerning and disheartening is that he is making a policy change based on the Tampa Bay Times, anti-police activist groups, and one blowhard uninformed City Council member." Marland was referring to council member Wengay Newton, who has been a critic of the policy and said that chases are endangering residents. There was an initial spike in the number of pursuits after the policy change in 2010. But the numbers have leveled off, according to police data. In 2009, the year before the change, there were 20 police pursuits in the city. There were 16 in 2010; 34 in 2011; 26 in 2012 and 17 last year. The new policy calls for an annual analysis of pursuit reports, as well as a review of the policy itself. Kriseman vowed to change the pursuit policy numerous times on the campaign trail. We rate this Promise Kept. Kameel Stanley can be reached at kstanley@tampabay.com, (727) 893-8643 or @cornandpotatoes on Twitter.
2024-06-15T01:27:13.970301
https://example.com/article/9546
Authored by Sue Chang via MarketWatch.com, A lot has changed since the stock market crash of 2000. Apple Inc. has gone from being just another computer brand to becoming the most valuable company in the world, Amazon.com Inc. went from being an e-book retailer to a byword for online shopping and Tesla’s Elon Musk has risen from obscurity to Twitter stardom. Too scary for words Yet some things never change and Doug Ramsey, chief investment officer at Leuthold Group, has been on a mini-campaign highlighting the parallels between 2000 and 2018. Among the numerous similarities is the elevated valuation of the S&P 500 then and now, which Ramsey illustrates in a chart that he has dubbed as the “scariest chart in our database.” Leuthold Group “Recall that the initial visit to present levels was followed by the S&P 500’s first-ever negative total return decade,” he said in a recent blog post. Price-to-sales ratio is one measure of a stocks value. It isn’t as popular as the price-to-earnings ratio, or P/E, but is viewed as less susceptible to manipulation since it is based on revenue. He also shared a chart which he claims is “unfit for a family-friendly publication” that shows how in terms of median price to sales ratio, the S&P 500 is twice as expensive as it was in 2000. Leuthold Group “Overvaluation in 2000 was highly concentrated; today it is pervasive, with the median S&P 500 Price/Sales ratio of 2.63 times more than double the 1.23 times prevailing in February 2000. In a follow-up post, he then reiterates how 2018 is starting to increasingly look like 2000. “The statistical similarities between the two bulls are on the rise, and the wonderment surrounding the disruptive technology of today’s market leaders seems to have swelled to maybe 1998-ish levels,” he writes. That upward trajectory of the market isn’t sustainable, he warns. Ramsey admits that history isn’t the best guide for the future but the S&P 500’s performance since it touched its peak on Jan. 26 is closely mirroring what happened 18 years ago. “In the earlier case, a volatile five-month upswing that began in mid-April ultimately fell just a half-percent short of the March 24th high by early September. This year, a similarly choppy, six-month rebound has taken the S&P 500 to within 1% of its January 26th high,” Ramsey said. Leuthold Group There are other resemblances such as healthy breadth as denoted by the uptrend in the daily NYSE Advance/Decline Line while corporate profits, measured by Leuthold’s internal earnings indicator, are extremely robust, according to Ramsey. But even without 2018 mimicking 2000, the persistent trade clash between the U.S. and its trading partners that in the worst case scenario could derail global trade looms as a huge threat to stocks. China is expected to levy tariffs on $60 billion of U.S. goods if the Trump administration proceeds with its plan to impose 25% tariffs on $16 billion in Chinese imports later this month. On Aug. 22, the market will officially become the longest bull market in history. Coincidentally, the previous titleholder is the decade-long one that gave up the ghost when the tech bubble burst in 2000.
2024-03-07T01:27:13.970301
https://example.com/article/7966
Report: Employer Job Cuts Steady at 39,000 in June Employers aren't yet hiring workers in large numbers, but the rate of job cuts remains well below last year's pace, according to a new survey released Thursday. U.S. firms planned to cut 39,358 jobs in June, a slight increase from May's 38,810 announced layoffs, marking the third consecutive month in which announced job cuts totaled fewer than 40,000, according to the latest job-cuts report by employment-services firm Challenger, Gray & Christmas. Heading into the second half of 2010, the pace of downsizing has slowed significantly from a year ago, Challenger said. The job-cut total for each month this year, including June, was lower than the same month in 2009. June job cuts were 47% lower than the 74,393 announced a year ago. Overall, employers announced 297,677 job cuts in the first six months of 2010. That's 67% below the 896,675 layoffs during the first half of 2009 and the lowest six-month total since 2000, when the mid-year total was 223,421, the report said. Challenger said job cutting among employers, which had slowed in the first quarter, ebbed even more during the second quarter, which ended Wednesday. Planned job cuts announced from April through June fell to 16,494, or 36% fewer than the 181,183 anticipated layoffs reported during the January through March period. Further, planned cuts fell 63% during the second quarter compared to the same period a year ago, when employers announced 318,165 layoffs. "While some may question the sustainability of this recovery, the dramatic decline in planned layoffs over the past six months certainly suggests that the nation's employers are not anticipating a double-dip recession," said Challenger CEO John Challenger. Industries with the highest number of announced cuts included computer; government/non-profit; retail; and transportation, accounting for half of all layoffs. Employers largely cited business restructuring, cost cutting or closing as cause of the cuts. The report noted that 150 jobs were expected to be cut due to the massive BP (BP) oil spill in the Gulf of Mexico. Layoffs within the top five job-cutting industries have declined this year, Challenger said, which "bodes well for the job market as we enter the second half of 2010." West and Southwest states fared worst in the latest survey, with California accounting for 86% of the more than 16,000 planned cuts in the region. The South, with 6,554 cuts, led by Florida and Tennessee, had the fewest, while Midwest recorded 6,823 announced layoffs, most of which were in Illinois. The Northeast reported nearly 9,700 anticipated cuts, the bulk of which were in New York and to a lesser extent Pennsylvania. So far this this year, New York, California, the District of Columbia, Illinois and New Jersey, lead the nation with a combined 174,365 job cuts, the report said. Among industries with plans to hire the most workers last month were transportation, industrial goods, energy and computers, Challenger said. In total, employers said they expected hire nearly 12,000 workers last month. "Looking ahead, most employers are growing more and more confident and this will inevitably lead to increased hiring," Challenger said. Still, he said, job creation remains in its infancy and volatility in the job market should be expected.
2023-09-12T01:27:13.970301
https://example.com/article/9395
Henry Co. family of 5 homeless after crash ignites house NAPOLEON -- A Henry County couple and their three children are homeless today after a car plowed into their home about 10 miles southeast of here, caught fire, and set the home ablaze. The family escaped safely. The alleged driver of the car, Jeffery Lauharn, 36, of 230 13th St., Toledo, was taken to Henry County Hospital for treatment, according to sheriff's Sgt. Sean Walker. Sergeant Walker said the crash was reported at 12:44 a.m. Deputies said the car was northbound on County Road 7, had just crossed County Road J when it went out of control, striking the home of Travis and Angel Swihart. After hitting the home, the vehicle caught fire, and the blaze spread to the house destroying it. The Swiharts were able to escape with their three children. Sergeant Walker said the house was destroyed. The driver of the car fled immediately after the crash. Deputies traced the owner of the car to James Rohde, 74, of County Road 7, of nearby Grelton, Sergeant Walker said. Deputies questioned Mr. Rohde about 3 a.m., learning that he picked up Mr. Lauharn in Toledo, and the pair returned to the Rohde home. Mr. Rohde claimed the car was taken without his permission, Sergeant Walker said. About 7 a.m. Mr. Rohde called the sheriff's office to report that Mr. Lauharn had returned to his home. Deputies arrested Mr. Lauharn, and he was taken for treatment for his injuries to the Napoleon hospital. The case is under investigation.
2024-04-19T01:27:13.970301
https://example.com/article/9003
The effect of indomethacin pretreatment on aphakic cystoid macular edema. In patients treated with oral indomethacin for four weeks after intracapsular cataract extraction, five of 57 eyes (9%) had cystoid macular edema four to six weeks postoperatively as shown by fluorescein angiography. In a control group not treated with indomethacin, 15 of 34 eyes (44%) had cystoid mascular edema. Oral indomethacin, therefore, caused a statistically significant decrease in the incidence of aphakic cystoid macular edema.
2023-08-18T01:27:13.970301
https://example.com/article/4971
Q: JOptionPane button size (Nimbus LAF) Recently I've been working on a Swing project with Nimbus Look and Feel. I want to set all buttons in a JOptionPane to have the same size, but in vain. import javax.swing.*; public class NimbusTest { public static void main(String[] args) { SwingUtilities.invokeLater(new Runnable() { @Override public void run() { try { for (UIManager.LookAndFeelInfo info : UIManager.getInstalledLookAndFeels()) { if (("Nimbus").equals(info.getName())) { UIManager.setLookAndFeel(info.getClassName()); break; } } } catch (Exception ex) { ex.printStackTrace(); } UIManager.put("OptionPane.sameSizeButtons", true); String[] options = new String[]{"--------------------","short","1"}; int option = JOptionPane.showOptionDialog(null, "Nimbus problem", "JOptionPane", JOptionPane.DEFAULT_OPTION, JOptionPane.QUESTION_MESSAGE, null, options, options[1]); } }); } } What I want is a JOptionPane with three buttons having the same size. However, I got the following result: My code UIManager.put("OptionPane.sameSizeButtons", true); seems to be ignored. What should I do to create a JOptionPane with same size buttons if I don't want to recreate a JOptionPane-like dialog? A: Replace UIManager.put("OptionPane.sameSizeButtons", true); with UIManager.getLookAndFeelDefaults().put("OptionPane.sameSizeButtons", true); And it works like a charm
2024-01-09T01:27:13.970301
https://example.com/article/2586
The barber's at Hair Lounge Barber Beauty practice old fashion fundamentals. We are focused on comtinuing the long tradition of "clippers, and razor, and shears" only. We do not spray cancerous chemicals on our clients. Our barber's do offer hair color options, and grey coverage.. but we do not color skin.
2024-02-21T01:27:13.970301
https://example.com/article/5905
89 Mich. App. 312 (1979) 280 N.W.2d 845 WEMMER v. NATIONAL BROACH & MACHINE COMPANY Docket Nos. 77-301, 77-584. Michigan Court of Appeals. Decided April 2, 1979. Kelman, Loria, Downing, Schneider & Simpson (by Robert W. Howes), for Arthur R. Wemmer. Lacey & Jones (by John L. Salter), for Liberty Mutual Insurance Company. Frank J. Kelley, Attorney General, Robert A. Derengoski, Solicitor General, and Eileen D. Zielesch and Joseph M. Binno, Assistants Attorney General, for the Second Injury Fund. Before: ALLEN, P.J., and D.E. HOLBROOK, JR., and M.J. KELLY, JJ. AFTER REMAND ALLEN, P.J. Do the provisions of MCL 418.351(1); MSA 17.237(351)(1) limiting workmen's compensation benefits to two-thirds of the injured party's average weekly wage at the time of the injury place an absolute ceiling on differential benefit payments by the second injury fund resulting from increases in maximum benefits payable under MCL 418.355; MSA 17.237(355)? What method of calculation should be used to compute *316 the 5% benefit reductions required by MCL 418.357; MSA 17.237(357) for the recipient of a total and permanent disability award who attains age 65? These questions, the second of which is of first impression, are raised on return of this case from the Workmen's Compensation Appeal Board pursuant to remand in this panel's unpublished per curiam opinion released August 9, 1978.[1] In proceedings which are no longer disputed, plaintiff was found totally and permanently disabled from a work-related injury occurring on November 4, 1968. At the time of the injury, plaintiff's average weekly wage was $150.80. Two-thirds of that amount is $100.53. The statutory maximum benefit limit then in effect was $69. Because of that limit, the initial award to plaintiff was $69 per week, payable in full by his employer's insurance carrier. Between 1968 and 1973, the maximum benefit limit was increased on several occasions pursuant to MCL 418.355; MSA 17.237(355). These increases were absorbed by defendant second injury fund pursuant to MCL 418.521; MSA 17.237(521). During calendar year 1973, the total payment to plaintiff was $99 per week — $69 from the insurance carrier and $30 *317 from defendant second injury fund. The statutory maximum benefit was again increased to $106 effective January 1, 1974. With this new increase, plaintiff's total benefits reached (actually exceeded) the ceiling imposed by the two-thirds of average weekly wage limitation in MCL 418.351; MSA 17.237(351). Because of that ceiling, the imposition of which is contested by plaintiff in Issue I of this opinion, payment to plaintiff during calendar year 1974 was in the weekly sum of $100.53, i.e., two-thirds of his average weekly wage when he suffered the compensable injury. In 1975, 1976, and 1977, the maximum was increased to $112, $120 and $132 respectively but, because of the two-thirds limitation, payments to plaintiff remained at $100.53. Then, on January 1, 1978, the maximum was raised to $147 and the minimum to $108. Because the minimum then exceeded the two-thirds limitation, plaintiff's payments were raised. Meanwhile, on January 12, 1974, plaintiff reached age 65. At that point, the age 65 reduction provisions in MCL 418.357; MSA 17.237(357) — as interpreted by the WCAB — called for a 5% reduction in benefits. At that point a dispute arose as to whether differential benefits were subject to the 5% age reductions and, if so, which of several methods of calculation should be employed. The dispute came before the WCAB which, on December 21, 1976, issued the opinion referred to in footnote 1, and which was affirmed in part and remanded in part to the WCAB by the unpublished per curiam opinion of this panel on August 9, 1978. The WCAB entered its opinion on the remand on August 25, 1978, and returned the cause to this panel. Issues posed by the August 25, 1978, opinion are the subject of this opinion. *318 I. Does the Provision in MCL 418.351(1); MSA 17.237(351)(1) Limiting Benefits to Two-Thirds of a Recipient's Average Weekly Wage at the Time of Injury Provide an Absolute Ceiling on Differential Benefit Payments by the Second Injury Fund Resulting from Increases in the Maximum Benefits Pursuant to MCL 418.355; MSA 17.237(355)? Plaintiff contends that § 351(1) only limits the employer's contribution to two-thirds of the recipient's average weekly wage at the time of injury, and that the section does not apply to the differential benefits required to be paid from the second injury fund. On remand, all WCAB members rejected plaintiff's construction, saying: "Unresolved, and returned to this Board for an expression of its opinion, is the question of whether the provision in Section 351 [MCL 418.351(1)] limiting benefits to two-thirds of an injured employee's average weekly wage is an absolute ceiling on both employer and Second Injury Fund payments (an absolute ceiling, that is, until such time as minimum rates for total disability exceed the two-thirds average weekly wage, at which time said minimums become the floor beneath which total payments may not fall, per Jolliff v American Advertising Co, 49 Mich App 1; [211 NW2d 260 (1973)], and Vrahamdedes v McDonald's of Ann Arbor, 1978 WCABO 1624, No. 312, dated June 14, (1978). Believing the Court to have (correctly) answered this question in the affirmative on the only occasion the question was before the Court [Kunde v Teesdale Lumber Co, 55 Mich App 546; 223 NW2d 67 (1974)], we answer `yes'. Interestingly, both here and in Kunde, supra, the parties declined to raise the issue before the Board and introduced it instead at the Court." The obligation of the second injury fund to pay differential benefits first appeared in § 9(a) in 1955 PA 250. Section 9(a) was amended by 1956 PA 195 *319 to read that payments should be made "according to the full rate provided in the schedule of benefits". This language was repeated verbatim when the statute was amended by 1965 PA 44. The question of whether the statute as so worded required the second injury fund to pay in excess of the two-thirds limitation first arose in King v Second Injury Fund, 382 Mich 480; 170 NW2d 1 (1969). In June, 1966, the hearing referee held the limitation applied. That decision was affirmed in a 4-3 decision by the Workmen's Compensation Appeal Board in 1967. 1967 WCABO 941. Bypass of the Court of Appeals was granted by the Supreme Court which, in September, 1969, reversed, holding that the two-thirds limitation did not apply because to hold otherwise would disregard the statutory words "according to the full rate provided in the schedule of benefits". King v Second Injury Fund, supra. Within a few months following the split decision of the WCAB in King, legislation was introduced to amend the statute. In the amendment process, the words "according to the full rate provided in the schedule of benefits" were deleted. That legislation became law in 1968 PA 227, effective July 1, 1968. Elimination of the quoted words caused the fund trustees to request an opinion from the Attorney General as to whether the fund was still required to pay differential benefits without regard to the two-thirds limitation for injuries occurring after July 1968 (the effective date of the act). The Attorney General concluded that, as so amended, the two-thirds limitation would apply: "The King decision is no longer applicable where the injury occurred subsequent to June 30, 1968 because the statutory language that provided for payments from the second injury fund `according to the full rate provided *320 in the schedule of benefits' was deleted by Act 277, PA 1968. Therefore, in respect to employees who are or become disabled because of an injury occurring on or after July 1, 1968, they shall receive differential benefits in accordance with the two-thirds limitation." OAG, 1969-1970, No. 4711, p 187 (November 9, 1970). We agree with the Attorney General. Any other conclusion would disregard the basic rules of statutory construction. The constitutionality of the statute as interpreted by the Attorney General's opinion was challenged on grounds of violation of equal protection of the laws in Kunde v Teesdale Lumber Co, 55 Mich App 546; 223 NW2d 67 (1974). Our Court held that there were legitimate legislative purposes served by application of the two-thirds limitation to differential benefit payments for injuries occurring after June 30, 1968. We do not believe Kunde decided that the 1968 amendment imposed a two-thirds limitation on payments for employees injured subsequent to June 30, 1968. In this respect we disagree with the WCAB and agree with plaintiff. Kunde assumed that the Attorney General's construction of the statute was correct and, based on that assumption, decided only the question of the law's constitutionality. But our agreement with plaintiff on this narrow point is more than offset by the striking fact that although four years had elapsed since the Attorney General's opinion no one, not even the claimants, challenged the construction given the statute. Only the constitutionality of the statute was questioned until the instant suit was commenced. The WCAB, the second injury fund and claimants have all accepted the two-thirds limitation on differential benefits for post-June 30, 1968, injuries. The interpretation given a statute by those charged with the statute's *321 administration is given great weight and is not to be overruled without the most cogent of reasons. Magreta v Ambassador Steel Co, 380 Mich 513, 519; 158 NW2d 473 (1968), Miller v Dunn Paper Co, 47 Mich App 471, 478; 209 NW2d 519 (1973). The main thrust of plaintiff's claim that the Attorney General erred in ruling that the 1968 amendment reversed King is that to so conclude is inconsistent with the then legislative intent to increase benefits. Why should the Legislature create a plan to provide additional benefits for totally and permanently disabled persons — obviously to cope with rising prices — and then proceed to limit the amount to two-thirds of the injured person's wage at the time of the injury. The argument is flawed in three respects. First, it is not true that the injured person's benefits are held at two-thirds of the average weekly wage at the time of injury. Under the statute, the Director of the Bureau of Worker's Disability Compensation establishes minimum weekly rates of compensation. Whenever the minimum rate as so established exceeds the two-thirds limitation, the minimum rate prevails. Stein v Director, Bureau of Workmen's Compensation, 77 Mich App 169; 258 NW2d 179 (1977). In 1977, the minimum rate was $93 for a disabled employee with one dependent. In 1978, it was raised to $108. Immediately, the second injury fund increased its differential payment to plaintiff to $39 per week which is the difference between the employer's basic weekly rate of $69 per week and the 1978 minimum benefit rate of $108. Second, plaintiff errs in construing § 521(2) as automatically allowing him the present-day maximum rate. Section 521(2) provides that a permanently and totally disabled person shall receive *322 differential benefits equal to the difference between what he is now receiving from his employer under the provisions in effect at the time of his injury "and the amount now provided" by the act. No provision of the act allows a present-day applicant to receive the maximum benefit rate if it exceeds two-thirds of his average weekly wage. The present-day applicant is limited to two-thirds of the average weekly wage. Thus, if plaintiff were allowed to receive the present maximum rate without regard to the two-thirds limitation, he would receive more than is provided for a present-day applicant. While it is true that a present-day applicant's average weekly wage generally would be greater than that of an applicant from previous years, the adjustment of the minimum rate, as explained above, remedies this situation. If the Legislature had intended so major a change we believe it would have clearly so stated. Third, sound policy reasons exist for imposing the two-thirds limitation. The limitation avoids the unfairness in giving all recipients the same yearly wage. In the absence of any limitation a party, who at the time of injury was earning less than the then average weekly wage, would receive the same increase as a party who was earning more than the average weekly wage at the time of injury. The two-thirds limitation avoids this unfairness. Further, as the Kunde Court pointed out, budgetary[2] and other reasons may well have led *323 the Legislature to impose the two-thirds limitation. "There are potentially many rational reasons why the Legislature constructed the classification it did. It may have anticipated the King, supra, ruling and its effects, and thus sought to equalize the compensation responsibility owed by employers and the Second Injury Fund. It may have felt that any added burden placed on the Second Injury Fund by requiring it to pay the full rate as set out in the schedule of benefits might damage the fund, and thus destroy its effectiveness." (Emphasis supplied.) Kunde, supra, at 557. This Court's request in its opinion on remand that cost data be supplied was made for the purpose of possibly identifying legislative intent. The data so furnished in response to our request, and summarized in footnote 2, provides a sound basis for the Legislature to conclude that continuation of payments "at the full rate" would impose an excessive drain on the fund. II. Given the Following Sequence of Events, How Should Differential Benefit Payments by the Second Injury Fund be Calculated? (1) Award for Total and Permanent Disability, (2) Increase in Maximum Rates Causing Differential Benefits by the Second Injury Fund, (3) Recipient Reaches Age 65, (4) Maximum Rates are Further Increased and Minimum Rate Exceeds the Two-Thirds Limitation. Five proposed methods of calculating differential *324 payments to a recipient who has attained age 65 were submitted for this Court's consideration in its opinion August 9, 1978. The respective methods are labeled A, B, C, D, E. In our August 9, 1978, opinion we rejected method B as totally inconsistent with the statutory language and remanded the other proposals to the appeal board for further consideration. In its opinion on remand, the WCAB retained its separate positions on method C (board panel majority) and D (board panel minority). Plaintiff's method E was calculated on the assumption that the two-thirds limitation did not apply. In view of our discussion in Issue I, supra, that the limitation does apply, method E is rejected. This leaves only methods A, C and D as the viable alternatives for our consideration at this time. Under method A, the method supported by the second injury fund, the compensation payable by the employer on the claimant's 65th birthday, and the compensation payable by the fund on the same date, are set down in separate columns. In the instant case, the respective totals are $69 and $31.53, or a total of $100.53, which is two-thirds of plaintiff's average weekly wage of $150.80. On January 12, 1974, (the day after plaintiff's 65th birthday) the $69 is reduced by 5% ($3.45) and the $31.53 is reduced by 5% ($1.58). Thereafter, for nine consecutive years, the employer's share is each year reduced by $3.45, and the fund's share is each year reduced by $1.58. Thus, on the 10th year following plaintiff's 65th birthday, payments by both the employer and the fund will have been reduced by 50%. The differential benefit increases made prior to the 65th birthday continue to be paid by the fund but any such increases made *325 after the 65th birthday are not included.[3] However, if the total amount then actually paid by the employer and the fund combined, falls below the statutory minimum, the difference between that total and the minimum rate must be paid by the fund. In January, 1978, the minimum rate was raised from $93 to $108, an amount which for the first time exceeded two-thirds of plaintiff's average weekly wage of $100.53. However, as will be discussed later, the fund claims that under method A the differential rate should be increased by the difference between the employer's basic rate before the first 5% discount was taken ($69) and the minimum rate of $108 rather than the difference between the amount actually being paid by the fund, viz — the employer's rate as then discounted ($55.20) — and $108. Method C, the method espoused by the appeal board majority, is the same as method A except that all incremental increases made during the 10-year period and to which plaintiff would be entitled had he not attained age 65, are added to the fund's payment, with no reduction in those increases. Under method C, the injured party receives the incremental increases between ages 65 and 75, whereas under method A they are not paid. Method D was proposed by the appeal board minority. The total amount of benefits to which the claimant is entitled had his 65th birthday not intervened, is first determined. Of this total, the employer pays no more than the employer would *326 have paid on the 65th birthday and is entitled to a 5% reduction each year. The difference between the employer's amount and the total sum due if claimant's 65th birthday had not occurred is added to the fund in a percentage equal to 100% minus 5% times the number of birthdays after age 64. Under method D, the claimant receives the incremental increases less 5% of the total amount the first year, 10% the second, etc. Thus, on his 75th birthday, the claimant receives 50% of the compensation which he would have received had he not become 65, rather than 50% of the amount to which he was entitled on his 65th birthday. The difference between the three methods may be summarized as follows. Under method A, the claimant receives no part of differential benefits paid while claimant is between age 65 and age 75. Under method C, the claimant receives such differential payments in full but the differential benefits due before age 65 are reduced 5% each year. Under method D, the claimant receives the differential payments, less 5% of the total payment the first year had the 65th birthday not occurred, 10% the second year, etc. The respective weekly payments due plaintiff in 1978 under each method is set forth below.[4] The question posed is which of the three methods complies with the statute. The statutory authority for age 65 reductions is found in MCL 418.357; MSA 17.237(357) which reads: "Sec. 357. When an employee who is receiving weekly *327 payments or is entitled to weekly payments reaches or has reached or passed the age of 65, the weekly payments for each year following his sixty-fifth birthday shall be reduced by 5% of the weekly payment paid or payable at age 65, but not to less than 50% of the weekly benefit paid or payable at age 65, so that on his seventy-fifth birthday the weekly payments shall have been reduced by 50%; after which there shall be no further reduction for the duration of the employee's life. In no case shall weekly payments be reduced below the minimum weekly benefit as provided by this act." (Emphasis supplied.) Method D is conspicuously incompatible with the provisions of § 357 — an incompatibility noted in the appeal board majority's analysis of method D: "Sec. 357 of the Act states in part: `payments for each year following his 65th birthday shall be reduced by 5% of the weekly payment paid or payable at age 65.' (Emphasis added.) It does not state that payments for each year following his 65th birthday shall be reduced by 5% of the total weekly payment payable in a year subsequent to the claimant's 65th birthday. The statutory reduction is clearly a fixed sum and is 5% of the payments paid or payable at age 65." (Emphasis in original.) Method C is only slightly less conspicuously inconsistent with § 357. That section provides for a fixed sum reduction (viz — the same dollar amount reduction per year) calculated on the weekly payments "paid or payable at age 65". If differential benefit increases under § 355 are paid after age 65, weekly payments will not have been reduced by 50% at age 75. Only method A complies with the express provisions of the statute. Accordingly, we find that the WCAB erred in applying a different formula in the instant case. *328 Having approved method A as we have described it we nevertheless find an error in the way it has been calculated by the second injury fund. At page 321, and again in footnote 3, of this opinion we noted that when the minimum rate was raised to $108 in 1978, the fund immediately increased its differential payment to $39 per week, this being the difference between the employer's basic rate before the first 5% discount was taken ($69) and the 1978 minimum benefit rate of $108. The language in the last sentence of § 357(1) "In no case shall weekly payments (emphasis supplied) be reduced below the minimum weekly benefit as provided in this act" is clear and unambiguous. To us, "weekly payments" means payments actually being made rather than weekly payments made at an earlier date years back when the employee first attained age 65. We believe that a proper application of the statute, and consequently method A, requires the fund to increase its payment by $52.80 — this being the difference between what the employer was actually paying on January 1, 1978, ($55.20) and $108. The employer's actual payment of $55.20 plus a fund contribution of $52.80 (rather than $39) would total $108. This brings us to the question of retroactivity which, in our former opinion, we asked the parties and the WCAB to address on remand. At that time we did not know that when the case returned to us we would be approving method A, the method which has always been applied by the fund. Because the fund's method has been approved except for the fund's error in computing the amount due in cases where the injured party has attained 65, and since only 31 cases are being reduced,[5] the fiscal problem of correcting past error is de minimis. *329 Legally, there is no question of retroactivity since this is the first case to construe the method of age-65 reductions required under MCL 418.357; MSA 17.237(357). This is not a case of further development of an old injury or an application for further compensation, thus neither the one-year back rule, MCL 418.833(1); MSA 17.237(833)(1), nor the two-year back rule, MCL 418.381(2); MSA 17.237(381)(2), apply. In Summary As to Issue I, we hold that the two-thirds provision of § 351(1) provides an absolute ceiling on differential benefit payments by the second injury fund resulting from increases in the maximum benefits made pursuant to § 355. We do so for the reasons set forth by the WCAB in the opinion on remand. We reject the argument that our holding is totally incompatible with the purpose for which differential benefits were authorized. When the minimum rates exceed the two-thirds limitation, the minimums become the floor beneath which total payments may not fall. When minimum rates are properly applied, the increase in benefits is substantial. On Issue I the WCAB is affirmed. As to Issue II, we hold that method A is the only correct formula for calculating benefits for persons who attain age 65, with the correction that the fund is liable for the full dollar difference between the actual benefits then being paid by the employer and the established minimum weekly benefit rate. On Issue II, the WCAB is reversed and the cause remanded for payment by the fund in accordance with this opinion. Affirmed in part, reversed in part and remanded in accordance with this opinion. No costs, neither party having prevailed in full. NOTES [1] The unpublished August 9, 1978, opinion affirmed in part and remanded in part a Workmen's Compensation Appeal Board (WCAB) opinion dated December 21, 1976. As to three issues the WCAB was affirmed: (1) that under MCL 418.357(1); MSA 17.237(357)(1) the 5% reduction in benefits commences on the recipient's 65th birthday, and not on the 66th birthday; (2) differential benefit payments made by the second injury fund before the recipient reaches age 65 are subject to later 5% annual reduction under MCL 418.357(1); MSA 17.237(357)(1); (3) Section 357(1) is not unconstitutional as violative of equal protection of the law as to recipients over age 65, or as to totally and permanently disabled recipients over age 65. Plaintiff filed leave to appeal these three issues to the Michigan Supreme Court. The application for leave was denied 405 Mich 835 (1979). On two issues, viz: — the two questions appearing above — the Court remanded to the WCAB which issued its opinion on remand August 28, 1978. This Court retained jurisdiction. [2] In our opinion August 9, 1978, ordering remand, request was made that the fund advise the Court as to the number of cases which would be affected by the Court's eventual decision. In response to this request, the fund stated that as of August 31, 1978, the fund was paying benefits on 1208, of which 721 involved injuries prior to July 1, 1968, and 487 cases involving injury after July 1, 1968. The 721 case claimants are receiving benefits "at the full rate" in accordance with King, supra, and the remaining 487 case claimants are paid subject to the two-thirds limitation until such time as the minimum rate for total disability exceeds the two-thirds limitation. Of the 487 cases, 101 are presently being increased each year to keep the claimant at the § 355 minimum rates. Only 31 cases are being reduced under the § 357 age 65 reduction. Without the § 351(1) two-thirds limitation, the fund estimated that for calendar 1978, the fund's payments to present claimants would be increased by $360,262.24. [3] Prior to plaintiff's 65th birthday, six incremental increases totaling $37 had been made. Plaintiff received all of these, subject to the two-thirds limitation which in plaintiff's case was $31.53. From 1975-1978, incremental increases of $6, $8, $12 and $5 were announced. Under method A none of the 1975-1978 increases are chargeable to the fund. [4] On January 13, 1978, the fifth reduction of 5% was made on the compensation payable by the employer ($69) and the compensation payable by the fund ($31.53) on the claimant's 65th birthday, January 12, 1974. On January 1, 1978, the minimum rate had been raised from $93 to $108. Since the minimum rate of $108 exceeded the total sum which otherwise would be due plaintiff, the minimum rate prevails. [5] See footnote 2, supra.
2023-10-16T01:27:13.970301
https://example.com/article/3710
Question: Since making excessive noise at the mention of Haman disturbs many people, is it Halachically permissible to abolish it? Answer: 1. The Rama wrote: "...The custom that we strike [something at the mention of] Haman when we read the Megilah in Shul has spread, and one should not abolish any custom or mock it since it was not established for naught" (Orach Chaim 690:17). It is therefore forbidden to abolish this custom of Israel. 2. The Mishnah Berurah wrote, however, that a custom which has a prohibited aspect to it may be abolished (Biur Halachah ibid.). 3. The basic nature of this custom does not contain any prohibited aspect, and great Rabbis of Israel customarily performed it: "And Ha-Gaon Yavetz (Rav Yaakov Emden) wrote regarding his father, the Chacham Tzvi, that he would hit, stamp his foot and strike his sandal when he arrived at the mention of Haman (Mishnah Berurah #59).According to the Shevet Musar, we also make noise when Haman's wife and sons are mentioned.But in general, one should only make noise for Haman (Piskei Teshuvot 690:9). 4. Throughout the generations, however, many mishaps were caused on account of this custom: a. People did not hear the reading of the Megilah. This means that the actual Mitzvah (and the reason we are in Shul) was not fulfilled on account of a custom that is not even observed in all places (Mishnah Berurah ibid.). b. People have behaved contrary to the Mitzvah of revering the Sanctuary. One should behave with seriousness and reverence in a Shul, and not with joking and levity, since the One who rests His Divine Presence is located within in it. c. Damage has been caused to objects in the Shul. d. Distress has been caused to fellow Jews. e. Children have been taught the opposite of what is required: children must learn that the focus of being in Shul on Purim is listening to the Megilah and not striking something at the mention of Haman. 5. There were therefore some communities that decided to abolish making noise at the mention of Haman, and they publicly informed the entire city not to strike objects at the mention of Haman (Yafeh Lalev #690). And there was a time when the Sefardic Beit Din in Yerushalayim also held in this way, as did the Rabbis of Kushta (Kol Sinai, Halichot Olam pg. 41). 6. There are those who say that if our Rabbi, the Rama, knew where matters would lead, he would not have stated that one should not abolish this custom. The authorities wrote however that if a custom has changed from what it had been at the time of the Rishonim, it is permissible to abolish it (Be’er Heteiv ibid. #15). And the Mishnah Berurah also wrote of those who perform this custom: "their reward is canceled by their loss" (690:59).And Ha-Rav Shlomo Zalman Auerbach did not make any noise at Haman's name, not even by stamping his feet (Ve-Alehu Lo Yibol, Vol. 1 p. 246). 7. Nevertheless, if the proceedings are proper and correct – meaning that people hit objects only in a manner that is appropriate for the holiness of a Shul, and do not disturb the hearing of the Megilah while doing so, etc. - we should not abolish this custom. Mission Statement To Enrich the spiritual life of the English-speaking World through the Torah of Ha-Rav Shlomo Aviner, Rosh Yeshiva of Yeshivat Ateret Yerushalayim in the heart of the Old City of Jerusalem. By offering English translations of Rav Aviner’s written and oral Torah, this division of the yeshiva aims to expose English speakers to a powerful, sensitive and poetic voice unparalleled in our time. His unfailing optimism, his tolerance and love all Jews, his guidance for harmony within the Jewish family and his dedication to Eretz Yisrael, the State of Israel and Tzahal will inspire and enrich the lives of all who may now have access to his words.
2024-05-12T01:27:13.970301
https://example.com/article/9372
DEFINED_PHASES=compile install prepare DEPEND=app-arch/unzip DESCRIPTION=A makefile generation tool EAPI=5 HOMEPAGE=http://industriousone.com/premake KEYWORDS=amd64 ppc x86 LICENSE=BSD SLOT=4 SRC_URI=mirror://sourceforge/premake/premake-4.3-src.zip _eclasses_=desktop 7fd20552ce4cc97e8acb132a499a7dd8 edos2unix 33e347e171066657f91f8b0c72ec8773 epatch ed88001f77c6dd0d5f09e45c1a5b480e estack 686eaab303305a908fd57b2fd7617800 eutils 2d5b3f4b315094768576b6799e4f926e l10n 8cdd85e169b835d518bc2fd59f780d8e ltprune db8b7ce9d0e663594bcb4a4e72131a79 multilib 98584e405e2b0264d37e8f728327fed1 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs 605c126bed8d87e4378d5ff1645330cb vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf versionator 2352c3fc97241f6a02042773c8287748 wrapper 4251d4c84c25f59094fd557e0063a974 _md5_=90fc4455e20fd09c2bcf38b852fe1a5e
2024-05-30T01:27:13.970301
https://example.com/article/3520
[How-to] Improve N900 performance: Collection of tweaks Want more performance and power for your N900 and give it a go at competing against today’s hardware? I’ve decided to put up a small collection of patches and tweaks that could greatly improve the performance of your N900 here. Note: The guide assumes you know what you’re doing, as some of the tweaks might cause damage to your system, so use those at your own risk. Also, some of the packages to be installed require Extras-devel to be enabled, read on how to enable it here if you can’t find the package. Disable it right after you’ve done everything! The tweaks work independently, so they’re all optional, but it’ll be wise to get through them all! 1. Battery and Speed Patch Both speed the N900 up and conserve battery life, so install them, follow our guide here.
2024-04-08T01:27:13.970301
https://example.com/article/2903
include/master-slave.inc [connection master] SET SQL_LOG_BIN= 0; CREATE TABLE t1(`a` INT, `b` DATE DEFAULT NULL, `c` INT DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t2(`a` INT, `b` DATE DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t3(`a` INT, `b` DATE DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t4(`a` INT, `b` DATE DEFAULT NULL, `c` INT DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; SET SQL_LOG_BIN= 1; CREATE TABLE t1(`a` INT, `b` DATE DEFAULT NULL, `c` INT DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t2(`a` INT, `b` DATE DEFAULT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t3(`a` INT, `b` DATE DEFAULT '0000-00-00', `c` INT DEFAULT 500, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t4(`a` INT, `b` DATE DEFAULT '0000-00-00', PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; ************* EXECUTION WITH INSERTS ************* INSERT INTO t1(a,b,c) VALUES (1, null, 1); INSERT INTO t1(a,b,c) VALUES (2,'1111-11-11', 2); INSERT INTO t1(a,b) VALUES (3, null); INSERT INTO t1(a,c) VALUES (4, 4); INSERT INTO t1(a) VALUES (5); INSERT INTO t2(a,b) VALUES (1, null); INSERT INTO t2(a,b) VALUES (2,'1111-11-11'); INSERT INTO t2(a) VALUES (3); INSERT INTO t3(a,b) VALUES (1, null); INSERT INTO t3(a,b) VALUES (2,'1111-11-11'); INSERT INTO t3(a) VALUES (3); INSERT INTO t4(a,b,c) VALUES (1, null, 1); INSERT INTO t4(a,b,c) VALUES (2,'1111-11-11', 2); INSERT INTO t4(a,b) VALUES (3, null); INSERT INTO t4(a,c) VALUES (4, 4); INSERT INTO t4(a) VALUES (5); ************* SHOWING THE RESULT SETS WITH INSERTS ************* TABLES t1 and t2 must be equal otherwise an error will be thrown. include/diff_tables.inc [master:t1, slave:t1] include/diff_tables.inc [master:t2, slave:t2] TABLES t2 and t3 must be different. SELECT * FROM t3 ORDER BY a; a b 1 NULL 2 1111-11-11 3 NULL SELECT * FROM t3 ORDER BY a; a b c 1 NULL 500 2 1111-11-11 500 3 NULL 500 SELECT * FROM t4 ORDER BY a; a b c 1 NULL 1 2 1111-11-11 2 3 NULL NULL 4 NULL 4 5 NULL NULL SELECT * FROM t4 ORDER BY a; a b 1 NULL 2 1111-11-11 3 NULL 4 NULL 5 NULL ************* EXECUTION WITH UPDATES and REPLACES ************* DELETE FROM t1; INSERT INTO t1(a,b,c) VALUES (1,'1111-11-11', 1); REPLACE INTO t1(a,b,c) VALUES (2,'1111-11-11', 2); UPDATE t1 set b= NULL, c= 300 where a= 1; REPLACE INTO t1(a,b,c) VALUES (2, NULL, 300); ************* SHOWING THE RESULT SETS WITH UPDATES and REPLACES ************* TABLES t1 and t2 must be equal otherwise an error will be thrown. include/diff_tables.inc [master:t1, slave:t1] ************* CLEANING ************* DROP TABLE t1; DROP TABLE t2; DROP TABLE t3; DROP TABLE t4; SET SQL_LOG_BIN= 0; CREATE TABLE t1 (`a` INT, `b` BIT DEFAULT NULL, `c` BIT DEFAULT NULL, PRIMARY KEY (`a`)) ENGINE= MyISAM; SET SQL_LOG_BIN= 1; CREATE TABLE t1 (`a` INT, `b` BIT DEFAULT b'01', `c` BIT DEFAULT NULL, PRIMARY KEY (`a`)) ENGINE= MyISAM; ************* EXECUTION WITH INSERTS ************* INSERT INTO t1(a,b,c) VALUES (1, null, b'01'); INSERT INTO t1(a,b,c) VALUES (2,b'00', b'01'); INSERT INTO t1(a,b) VALUES (3, null); INSERT INTO t1(a,c) VALUES (4, b'01'); INSERT INTO t1(a) VALUES (5); ************* SHOWING THE RESULT SETS WITH INSERTS ************* TABLES t1 and t2 must be different. SELECT a,b+0,c+0 FROM t1 ORDER BY a; a b+0 c+0 1 NULL 1 2 0 1 3 NULL NULL 4 NULL 1 5 NULL NULL SELECT a,b+0,c+0 FROM t1 ORDER BY a; a b+0 c+0 1 NULL 1 2 0 1 3 NULL NULL 4 NULL 1 5 NULL NULL ************* EXECUTION WITH UPDATES and REPLACES ************* DELETE FROM t1; INSERT INTO t1(a,b,c) VALUES (1,b'00', b'01'); REPLACE INTO t1(a,b,c) VALUES (2,b'00',b'01'); UPDATE t1 set b= NULL, c= b'00' where a= 1; REPLACE INTO t1(a,b,c) VALUES (2, NULL, b'00'); ************* SHOWING THE RESULT SETS WITH UPDATES and REPLACES ************* TABLES t1 and t2 must be equal otherwise an error will be thrown. include/diff_tables.inc [master:t1, slave:t1] DROP TABLE t1; ################################################################################ # NULL ---> NOT NULL (STRICT MODE) # UNCOMMENT THIS AFTER FIXING BUG#43992 ################################################################################ ################################################################################ # NULL ---> NOT NULL (NON-STRICT MODE) ################################################################################ SET SQL_LOG_BIN= 0; CREATE TABLE t1(`a` INT NOT NULL, `b` INT, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t2(`a` INT NOT NULL, `b` INT, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t3(`a` INT NOT NULL, `b` INT, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; SET SQL_LOG_BIN= 1; CREATE TABLE t1(`a` INT NOT NULL, `b` INT NOT NULL, `c` INT NOT NULL, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t2(`a` INT NOT NULL, `b` INT NOT NULL, `c` INT, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; CREATE TABLE t3(`a` INT NOT NULL, `b` INT NOT NULL, `c` INT DEFAULT 500, PRIMARY KEY(`a`)) ENGINE=MyISAM DEFAULT CHARSET=LATIN1; ************* EXECUTION WITH INSERTS ************* INSERT INTO t1(a) VALUES (1); INSERT INTO t1(a, b) VALUES (2, NULL); INSERT INTO t1(a, b) VALUES (3, 1); INSERT INTO t2(a) VALUES (1); INSERT INTO t2(a, b) VALUES (2, NULL); INSERT INTO t2(a, b) VALUES (3, 1); INSERT INTO t3(a) VALUES (1); INSERT INTO t3(a, b) VALUES (2, NULL); INSERT INTO t3(a, b) VALUES (3, 1); INSERT INTO t3(a, b) VALUES (4, 1); REPLACE INTO t3(a, b) VALUES (5, null); REPLACE INTO t3(a, b) VALUES (3, null); UPDATE t3 SET b = NULL where a = 4; ************* SHOWING THE RESULT SETS ************* SELECT * FROM t1 ORDER BY a; a b 1 NULL 2 NULL 3 1 SELECT * FROM t1 ORDER BY a; a b c 1 0 0 2 0 0 3 1 0 SELECT * FROM t2 ORDER BY a; a b 1 NULL 2 NULL 3 1 SELECT * FROM t2 ORDER BY a; a b c 1 0 NULL 2 0 NULL 3 1 NULL SELECT * FROM t3 ORDER BY a; a b 1 NULL 2 NULL 3 NULL 4 NULL 5 NULL SELECT * FROM t3 ORDER BY a; a b c 1 0 500 2 0 500 3 0 500 4 0 500 5 0 500 DROP TABLE t1; DROP TABLE t2; DROP TABLE t3; include/rpl_end.inc
2023-12-13T01:27:13.970301
https://example.com/article/6019
Ocular findings in partial trisomy 3q. A case report and review of the literature. The authors report the ocular findings in a patient with partial trisomy 3 [46, XY-15, der(15), t(3;15) (q26;128) mat] and review the literature on this chromosomal anomaly. The patient's main ocular finding was infantile glaucoma. The patient's mother was phenotypically normal and carried a balanced chromosome translocation. Awareness of the ocular abnormalities associated with partial trisomy syndromes is essential since more children with these syndromes survive today than in the past.
2024-04-01T01:27:13.970301
https://example.com/article/3100
Classes I Discovered From International Business (Faculty Course) The Bachelor’s degree programme in International Business prepares you for a management place in a world setting. As a result of most firms take part in world markets, students who have abilities in and data about international enterprise practices and cross-cultural management have a distinct advantage within the enterprise world. The main progresses from the importing and exporting unit, introducing college students to the basics of international trade, to units focussed on worldwide finance, communication and negotiation, accounting, logistics and marketing. Job titles embrace Business Analyst, China Salesman, Buyer Relations Consultant, Global Sourcing Analyst, International Affiliate, Marketing Specialist, Product Manager, and so forth. Before going any deeper, it’s essential to take inventory of what is meant by the enterprise firm, and what its targets are, and proceed to analyse the method and results of this rapid globalisation. Assemble a comprehensive business plan for a new worldwide venture or product. The University of Liverpool Management School works with at the moment’s leaders in business and administration to prepare its students to be the leaders of the long run. As such, it’s imperative that these firms hire candidates with huge international business experience. Though the program is designed as a switch program, students may pursue employment in the area upon completion of the diploma. Our worldwide enterprise degree is your passport to a profession in the global economic system, equipping you to work wherever on this planet. For these college students wanting only an publicity to international business, an Worldwide Enterprise Minor can also be obtainable. I might recommend the International Business major to anybody who needs extra from a Enterprise diploma, as a result of it takes the boring out of Business.
2024-05-14T01:27:13.970301
https://example.com/article/7569
var mout = require('mout'); function createError(msg, code, props) { var err = new Error(msg); err.code = code; if (props) { mout.object.mixIn(err, props); } return err; } module.exports = createError;
2024-02-29T01:27:13.970301
https://example.com/article/4490
life is great, except for one small thing…. Menu Tag Archives: stress level So, my plan of putting two stressful things together has kind of worked. My stress level is high, but I’m not feeling that sick sense of anxiety that makes me crazy. Rather, my head is buzzing like I have a beehive in there, and it’s not really letting me think. Oy. But by tomorrow at about 6PM, it’ll all be done. Or really, I guess, 7PM. Once we’re in the air, for real, on our trip. We’ll have done the doctor’s office, gotten to the airport, gotten through security, and made it onto the plane by then. As long as we don’t end up as the next Malaysia air. As for this cycle? Who knows. I’m probably going to end up being delayed in ovulation because of the stress of travelling. Although, it’s mostly about the time change – it’s a direct flight, so although it’s a 5 hour time difference (did I mention the potential job is in Europe?) I think the travel will be reasonable. And they’re paying for a car service for us to get to JFK so that won’t be too bad either. My medical records are super interesting. I have to bring them tomorrow, so I have been pouring over them. I anticipate that I will need a few more blood tests and then I can see him moving into surgery. Granted, he may want to do everything over again, which since it’s been close to a year, I wouldn’t object. As long as we get the show on the road, honestly, I don’t mind what the heck we’ll do. I’ll update when I can – it’ll depend on how much time I have at the airport and what kind of wifi access we have. Otherwise, see you on the flip side!
2024-03-04T01:27:13.970301
https://example.com/article/6295
Photo Booth FlashBox Photo Booth is bringing the classic nostalgia back to your event. This classic black photo booth is a step-in booth that offers vintage flair with a modern touch to bring back the kid in all of your guests! Customizable in many ways, this booth will always flatter any event theme.
2023-08-07T01:27:13.970301
https://example.com/article/6540
Winklevoss Twins: Regulators More Comfortable With Zcash Than Monero The Winklevoss Twins have been going through a media blitz related to their new ad campaign focused around the positive aspects of clear crypto asset exchange regulations in New York, and their interview tour recently took them to Laura Shin’s Unchained podcast. During the interview, the Winklevii explained their thought process when it comes to listing new crypto assets for trade on Gemini, which is the digital asset exchange they launched in 2015 . It was during this portion of the discussion that the Gemini co-founders revealed they chose to list Zcash and not Monero because they believed regulators would have a more favorable view of the former of the two privacy-focused altcoins. How Gemini Decides to Add New Crypto Assets The Winklevoss Twins were originally asked about their coin listing policies in the context of Bitcoin Cash. According to the twins, Gemini received approval to list the spinoff coin before the crypto asset split into two separate coins: Bitcoin Cash ABC and Bitcoin Cash SV (sometimes referred to as simply Bitcoin Cash and Bitcoin SV respectively). However, the company decided to take a conservative approach with listing the altcoin. “We said you know what, we’re going to wait this out and let the dust settle,” said the Winklevii in regard to the Bitcoin Cash hard fork. According to the Winklevoss Twins, Gemini is still in the process of developing internal rules for the listing of new assets on the exchange. “For each coin up to this point, it’s been a sort of a case by case situation,” said the Winklevii. “We look at the team, the use case, the proposition of the coin. Is it doing something unique or is it just another me too and is it truly, you know, solving an authentic problem that those are the general common-sense things that we look at and will it pass muster with regulators?” Choosing Zcash and Not Monero On the point of appeasing regulators, the Winklevoss Twins gave Zcash as a quick example of how the coin listing process has worked in the past. “Obviously, we listed Zcash,” said the longtime bitcoin advocates. “We didn’t attempt to list Monero and we felt that Zcash was the privacy coin that we could get our regulators comfortable with.” For now, Gemini does not want to publish a specific framework for listing new crypto assets because they want to narrow down all the details before going public with their thought process. The Winklevoss Twins added that it’s likely something will be published by Gemini around this topic over the coming year.
2024-01-28T01:27:13.970301
https://example.com/article/7080
**Please note that stickers take 2-3 weeks of when the order is placed to ship unless ordered with a monogrammed item, then they will ship with your monogrammed purchase. These are shipped first class mail with a stamp, we are not responsible if your sticker is lost in the mail or if it is returned to us for incomplete address. Tiny Tulip will not reship stickers at our cost. Thanks for your understanding.
2024-07-11T01:27:13.970301
https://example.com/article/4478
Multi-media journalists face jail time after reporting on ND pipeline protest - altstar https://techcrunch.com/2016/10/15/multi-media-journalists-face-jail-time-for-reporting-on-north-dakota-pipeline-protest/ ====== tsomctl One of them is Amy Goodman, who, if you've ever listened to NPR, you've heard. The public prosecutor is saying that since she was showing the viewpoint of the Native Americans, she wasn't actually doing journalism, she was just promoting their disruptive behavior. Rolling Stone magazine claims that it's not the public prosecutor's job to decide what is and isn't journalism ([http://www.rollingstone.com/politics/taibbi-on-amy- goodman-a...](http://www.rollingstone.com/politics/taibbi-on-amy-goodman- arrest-for-covering-dakota-pipeline-story-w444754)). Goodman has devoted her career to independent journalism, I'm sure she's going to fight this. ------ a3n "For those unfamiliar with the pipeline protests, the Standing Rock Sioux are seeking to halt the construction of a $3.8 billion pipeline saying its development will encroach on their tribal burial sites and taint their water supply at the Standing Rock Sioux Reservation." OT: I hope they're provably documenting water analysis now, so they can show degradation of water quality and safety later.
2023-10-24T01:27:13.970301
https://example.com/article/2361
The idea of a universal basic income (UBI) unites a strange mix of people. “We should explore ideas like universal basic income to give everyone a cushion to try new things,” Facebook boss Mark Zuckerberg said in a speech at Harvard University in May. “And yes, giving everyone the freedom to pursue purpose isn’t free. People like me should pay for it,” he added. Facebook recently announced it paid a not-immense £5.1m (US£6.7m) in UK corporate tax in 2016 on revenues of £842.4m and profits of £58.4m, although this is a huge increase on the £4,327 it paid two years previously. Leaving that aside, UBI has also been supported by Tesla boss Elon Musk, who said in February it “is going to be necessary” as robots take many jobs. He expressed doubts, however: “A lot of people derive their meaning from their employment. So if there’s no need for your labour, what’s your meaning? Do you feel useless? That’s a much harder problem to deal with.” Joining the tech leaders are politicians, often of the left. The UK opposition Labour party’s shadow chancellor John McDonnell is a fan, although UBI was not in the party’s manifesto for this year’s general election. The Scottish Greens, who have supported it since setting up in 1990, last year helped the governing Scottish National Party pass its budget after the SNP lost its majority in the Scottish parliamentary election. And that SNP-led government recently announced funding of local trials of “a citizen’s basic income, a radical form of social assistance,” in its programme for government for the coming year. Alf Young, visiting professor at the University of Strathclyde’s International Public Policy Institute, has run the numbers. “The Greens had indicated that they were looking at anyone up to the age of 16 getting £50 a week, anyone of working age £100 and pensioners £150,” he says. “It’s not exactly a king’s ransom.” By way of comparison, the UK government’s jobseeker’s allowance is currently £73.10 a week for those aged 25 or over while the full state pension (for those who have paid national insurance taxes for 35 years) is £159.55. Show me the money Based on Scotland’s demographics, Young reckons that a £50/£100/£150 UBI would cost £28bn annually. “That’s almost the entire devolved budget,” he says, which the Scottish Government currently uses for NHS healthcare, education, policing, courts, housing, transport and quite a lot else. “I don’t know where they would find the money from, without significant increases in taxation.” Pensions and benefits are largely handled by the UK government rather than Scotland’s, so what about tapping Westminster for a Scottish UBI? It still wouldn’t add up: the UK’s social protection (benefits and pensions) budget is £245bn, which makes Scotland’s per capita share £20.2bn, less than three-quarters of what would be needed. And unless slashing the income of disabled people was part of the plan, some retained targeted benefits would add to the cost. View from a Reg reader: My take on the Basic Income READ MORE It would also require big changes to government. “UBI is a great idea and for that reason the civil service will not allow it to happen,” says Tony Collins, a journalist who runs the public sector IT blog. “Central departments are set up, culturally and historically, to perpetuate the size of their bureaucratic empires.” Although many individual senior civil servants are open to reforms, he believes that Whitehall departments tend to resist changes that would reduce their scope. Collins reckons that HM Revenue and Customs, which handles taxation, is more open to change than the Department for Work and Pensions, responsible for benefits and pensions. “The DWP would, I believe, come up with pages of arguments on why the UK could not, and should not, have UBI. If it were implemented successfully in other countries it could then be considered seriously here. Not until that happens, though,” he says. Very few governments have introduced anything like a UBI. The state of Alaska’s permanent fund dividend of US$1,100 – just over $21 a week – was distributed to Alaskan residents on 5 October, and comes from the returns on its invested mineral rents and royalties rather than general taxation. Bureaucratic nightmare So given the cost and difficulties, why so much enthusiasm? One reason is that a UBI could remove the poverty trap caused when means-tested benefits are withdrawn as someone starts paid employment or gets a promotion, equivalent to a very high marginal tax rate. Reg reader Edward Martinson has described what it is like to be stuck on benefits, effectively unable to take on small pieces of work. A UBI could also save money on administration. Malcolm Torry, director of the Citizen’s Basic Income Trust which promotes debate on the concept, says this depends on its size. “A low UBI would leave in place means-tested benefits, but it could take a lot of households off various means-tested benefits and because the administrative cost of UBI would be very small the net effect would be a reduction in administrative costs,” he argues. “The higher the UBI, the lower the total administrative costs for the system as a whole.” Luke Martinelli, a research associate at University of Bath’s Institute for Policy Research, has his doubts. “We would still need a bureaucracy to construct and maintain a list of beneficiaries and make payments, for example. But perhaps more importantly, in a lot of – indeed, most – proposals, basic income would only replace some benefits, with the rest remaining in payment for low income households or to compensate for the extra costs of disability.” The way forward? What about the impact on taxes? In a recent paper, Torry proposed a relatively simple UBI for the UK, with child benefit increasing by £20 a week, young people aged 16-24 getting £50 unless they remained in education, those aged 25-64 getting £61 and those aged 65 and over receiving £40 on top of current pensions. This would require income tax to rise by 3 per cent, the abolition of tax-free allowances and those earning more than £45,000 see national insurance rates go from 2 per cent to 12 per cent. While it wouldn’t make a big difference to most working people, the well-off would pay significantly more. Despite technologists’ enthusiasm for UBI in helping society cope with the rise of the machines, experts aren’t sure. “There is certainly some logic to the idea that UBI could help to redistribute income more effectively and shore up aggregate demand if an increasingly high proportion of gross domestic product accrues to capital rather than being paid in wages and salaries,” says Martinelli, but adds that such claims might be slightly overstated, and “in any case it is not clear that UBI is the only or indeed best means to address labour market dysfunction and growing inequality”. All in all, Martinelli sees tech leaders’ enthusiasm for UBI as “slightly surprising”. He thinks they might be altruistic or based on more libertarian versions of UBI that do not include so much redistribution. “Another perspective is that they might view UBI as an essential way to ensure public consent for technological change and growing inequality,” he says. Torry thinks technologists just have a clearer view. “Engineers look at systems that aren’t working and ask how they can be made to work,” he says. “Technologists can see more clearly than many that the employment market is going to change.” Whether that would convince the better-off to pay the extra taxes a UBI looks likely to require remains to be seen. ®
2024-01-18T01:27:13.970301
https://example.com/article/3797
Throughout history gold and silver have survived wars, inflation and governments to cling to their crown as the best type of money.From historical information on gold and silver to understanding why buying gold.The gold price has traditionally been set at the London Gold Fix, but changing that could send gold prices surging.Live gold news, gold price quotes and daily gold market report for investors in gold coins and bullion.From the developer of the popular and highly rated Gold Silver Live Prices. Its chief characteristics are that it is inert and malleable.This is based on their assumption that there will be three rate hikes.See how Gold, priced against the USD Index, as well as Silver, Oil, Platinum, Copper and others are doing in relation to the US Dollar and predominant buying or selling. Daily Gold Market Report - Gold Coins and Gold Bullion Go here for charts, live prices, and futures data and check out how high our gold price prediction has climbed.Gold Price Today in Netherlands in Euro (EUR) This page shows the latest gold price details in Europe in Euro, in addition to previous gold price in the last month. These orders often exceed the CME stated limit of 6,000 contracts.The Dow Jones dropped 610 points as gold prices jumped to their highest levels since October 2013 following the.Over the past five months demand for gold has spiked, thanks to jumpy investors growing ever more fearful of the world around them.Andrew Gold, (1951-2011), Amerikaans zanger; Jamie Gold (1969), Amerikaans pokerspeler; Marian Gold (1954... History of the gold price - didyouknow.org Dubai Gold Rate – Price Today For 24, 22, 21, 18 Carat Gold Gold Rate Today, Gold Price in India, LIVE Gold Price Live Gold Prices | Silver Prices | Platinum & Palladium Buy Gold: What Happened to the Gold Price in 1980? 2016 SHANGHAI GOLD FIX: How China Will Make the Gold Price Go Ballistic! Interactive chart of historical data for real (inflation-adjusted) gold prices per ounce back to 1915.Investors generally buy gold as a way of diversifying risk, especially through the use of.Simply place an order on our website and this will lock the price in at the. Gold Prices - RunToGold Breaking market news and analysis for gold, silver, finance and economics.Gold prices started 2016 with a glimmer, rising to two-month highs in the wake of the Chinese stock market rout and the ripple effects it caused in. Gold Prices Per Gram Today - Gold Price OZ Latest gold price forecasts and predictions based on technical analysis and data.Golden Eagle Coins offers a system making it easy to buy gold online. "30 for 30" The Price of Gold (TV Episode 2014) - IMDb Gold prices have been all over the charts in recent years, from record highs to sagging lows, but one thing is sure: gold has maintained its value for six. Gold Price Calculator Free - Android Apps on Google Play The spot gold prices today can vary widely in the spot gold market and the spot gold price today is shown with a 200 day moving average gold chart. Why is gold falling, and where is it headed? | The Indian Check the latest gold and silver prices updated every minute.Below are live gold spot prices per troy ounce, gram, and kilogram. Gold Prices & Gold Investments | Wyatt Research Domestic gold prices have plunged below Rs 25,000 per 10 g for the first time since August 2011, mirroring an.Gold Price X: Where the world buys, sells and securely stores, gold and silver, coins and bars at the best possible prices.This app lets you know instantly how much your gold and silver are worth in.Track trends in the market to make informed bullion investments.Provides charts of the current gold price per ounce, gram and kilogram in 23 major currencies.
2023-09-14T01:27:13.970301
https://example.com/article/1510
Naugatuck Valley Community College Calendar Next to normal Campus events Details Naugatuck Valley Community College Calendar Next to normal Campus events DetailsNext to Normal Campus Events Details from nv.edu. academics naugatuck valley munity college academics designed for you naugatuck valley munity college nvcc offers an enriching educational experience for degree seeking students and those who are. Tag : Next to Normal Campus Events Details. So, if you desire to secure all these great pics about Naugatuck Valley Community College Calendar Ch7f, click save link to save these wallpapers in your laptop. Lastly if you like to have unique and latest image related to Naugatuck Valley Community College Calendar Ch7f, please follow us on google plus or save this blog, we try our best to offer you daily update with all new and fresh photos. We do hope you like staying here.
2024-05-30T01:27:13.970301
https://example.com/article/5550
Release milestone occurring at roughly 6 week intervals and follow the Platform milestone releases by approximately 2 weeks; that is, until the final 3.3 release of the Platform, upon which GMF and other projects will release simultaneously. As GMF is dependent upon the EMF, GEF, and other projects, which are scheduled to release milestones within 1 week of Platform milestones, GMF will deliver its milestones within the following week. It is anticipated that GMF will synchronize its release milestones with the [https://bugs.eclipse.org/bugs/show_bug.cgi?id=147754 Europa] release schedule. The milestones are: + Release milestone occurring at roughly 6 week intervals and follow the Platform milestone releases by approximately 2 weeks; that is, until the final 3.3 release of the Platform, upon which GMF and other projects will release simultaneously. As GMF is dependent upon the EMF, GEF, and other projects, which are scheduled to release milestones within 1 week of Platform milestones, GMF will deliver its milestones within the following week. It is anticipated that GMF will synchronize its release milestones with the [http://wiki.eclipse.org/index.php/Europa_Simultaneous_Release Europa] release schedule. The milestones are: Release milestones Release milestone occurring at roughly 6 week intervals and follow the Platform milestone releases by approximately 2 weeks; that is, until the final 3.3 release of the Platform, upon which GMF and other projects will release simultaneously. As GMF is dependent upon the EMF, GEF, and other projects, which are scheduled to release milestones within 1 week of Platform milestones, GMF will deliver its milestones within the following week. It is anticipated that GMF will synchronize its release milestones with the Europa release schedule. The milestones are: Lock down and testing then begins with M6, and progress through a series of test-fix passes against candidates releases. Release candidate builds are planned as follows (M6 is release candidate 0, final RC is 2.0): Friday May 18, 2007 - Release Candidate 1 - (2.0 RC1) TBD Friday June 29, 2007 - Release Candidate 6 - (2.0) As these milestones are dependent upon the Platform, they may be altered in order to conform to the published plan. All release deliverables will be available for download as soon as the release has been tested and validated in the target operating configurations listed below. Maintenance Stream GMF 1.0.1 and 1.0.3 maintenance releases will align with the Callisto release that includes the Eclipse Platform 3.2.1 and 3.2.2 releases, respectively. Friday, September 29, 2006 - GMF 1.0.1 maintenance release Friday, October 27, 2006 - GMF 1.0.2 maintenance release Friday, February 9, 2007 - GMF 1.0.3 maintenance release A list of issues indicated for the 1.0.x maintenance stream can be found here: 1.0.1,1.0.2 and 1.0.3. Target Operating Environments In order to remain current, each Eclipse release targets reasonably current versions of the underlying operating environments. The Eclipse Graphical Modeling Framework (GMF) project depends upon on the Platform and other projects, which are mostly "pure" Java. The 3.3 release of the Eclipse Platform Project is written and compiled against version 1.4 of the Java Platform APIs, and targeted to run on version 1.4 of the Java Runtime Environment, Standard Edition. The Eclipse Modeling Framework (EMF) project has declared to support Java 5 language features in its next release (3.3.0), and will therefore require a Java 5 runtime environment. GMF will target the same Java version as EMF. Eclipse Platform SDK 3.3 will be tested and validated on a number of reference platforms. GMF will be tested and validated against a subset of those listed for the platform. Those available will be presented on the project download site. Internationalization The Eclipse Platform is designed as the basis for internationalized products. The user interface elements provided by the Eclipse SDK components, including dialogs and error messages, are externalized. The English strings are provided as the default resource bundles. As a result, the Graphical Modeling Framework project will provide English strings in its default bundles and be localized to a subset of those locales offered by the Platform. This plan will be updated to indicate which locales will be provided and the timeframe for availability. Compatibility and Dependencies Compatibility of Release 2.0 The Graphical Modeling Framework Project will be developed in parallel, and released simultaneously, with the following projects. As stated above, each milestone release of the Graphical Modeling Framework Project will be compatible with the corresponding milestones for each of these projects, and delivered the appropriate offset. Eclipse Platform SDK version 3.3 Eclipse Modeling Framework (EMF) version 3.0 Graphical Editing Framework (GEF) version 3.3 Therefore, the Graphical Modeling Framework initial release will be compatible with these versions and will publish binary and source compatibilities with migration guides on subsequent releases. API Contract It is a goal of the Graphical Modeling Framework Project to avoid provisional APIs. APIs published for the 2.0 release will be carefully reviewed prior to release, making use of "internal" packages for unsupported and variable implementation classes. Client plug-ins that directly depend on anything other than what is specified in the published API are inherently unsupportable and receive no guarantees about future compatibility. Refer to How to Use the Eclipse API for information about how to write compliant plug-ins. Note that GMF follows the posted Version Numbering guidelines. Compatibility of Release 2.0.0 with 1.0.0 GMF 2.0.0 will be compatible with GMF 1.0.0, except in those areas noted in the GMF 2.0.0 Migration Guide. API contract, binary compatibility, etc. follow those described in the Modeling Project Plan. GMF 2.0.0 Migration Guide At this time, there are no known issues migrating from 1.0.0 to 2.0.0. Should this change, this document will be revised, or a secondary document will be added documenting any known issues. Features and Capabilities A list of project requirements and agreed upon implementation timeframes is found in this document. For the milestones listed in this document, a set of overall themes is used to indicate what major set of functionalities is to be concentrated on for each. These themes are presented below, while the requirements document and associated Bugzilla entries are left to those wanting more detailed information on each. 2.0 Themes Taking into consideration the themes provided by the Requirements Council, overall Modeling project themes and the GMF 1.0 release state and community feedback, the following themes are planned to be addressed in the 2.0 release: API A number of items related to the GMF API are planned to be addressed, including the addition of new APIs, refactoring of old APIs, and improved API documentation. A list of those plan items related to API (keyword=api) can be found here. Usability A number of usability items related to runtime and tooling components of GMF are found in this section. A list of those plan items related to Usability (keyword=usability) can be found here. Model[ing] Citizen As a project within the Eclipse Modeling Project, a number of build dependency and interoperability items exist with other Modeling projects. A number of releng tasks and support of GMF's use in providing UML2 diagramming are anticipated to be addressed in the 2.0 release timeframe. Furthermore, as GMF 2.0 is scheduled to release with the Europa simultaneous release, along with other Modeling projects, some coordination and requirements for being on the release train is also anticipated. Performance A number of performance issues have been identified and will be worked during the 2.0 timeframe. A list of those plan items related to Performance (keyword=performance) can be found here. Plan Items Plan items reflect new features of the GMF project, or areas where existing features will be significantly reworked. Plan items are indicated using keywords and have a state determined by 'Assigned To' and 'Target Milestone' fields in Bugzilla. Below is a list of possible states and what they mean: Committed items - A committed bug is one that we have decided to address for the release. Proposed items - A bug item is one that we are considering addressing for the release. Although we are actively investigating it, we are not yet in a position to commit to it, or to say that we won't be able to address it. After due consideration, a proposal will either be committed or deferred. Deferred items - A reasonable proposal that will not make it in to this release for some reason is marked as deferred with a brief note as to why it was deferred. Deferred plan items may resurface as committed plan items at a later point.
2023-12-01T01:27:13.970301
https://example.com/article/8182
let a = (x => (x, x * 2), 3); let b = ((x, y) => (x, x * y), 1); let c = (x => x * x)(2); let d = (1, 2, 3);
2024-06-27T01:27:13.970301
https://example.com/article/8643
The subjugation of humanity by a race of super-smart, artificially intelligent beings is something that has been theorized by everyone from generations of moviemakers to New Zealand’s fourth-most-popular folk-parody duo. But the latest prophet of our cyber-fueled downfall must realize why people would be inclined to take his warnings with a grain of silicon. He is, after all, the same guy who’s asking us to turn over control of our cars — and our lives — to a bunch of algorithms. No pressure. When pressed for better guidance, Musk said the government must get a better understanding of the latest achievements in artificial intelligence before it’s too late. “Once there is awareness, people will be extremely afraid, as they should be,” Musk said. “AI is a fundamental risk to the future of human civilization in a way that car accidents, airplane crashes, faulty drugs or bad food were not. They were harmful to a set of individuals in society, but they were not harmful to individuals as a whole.” And then Musk outlined the ways AI could bring down our civilization, which may sound vaguely familiar. He believes AI “could start a war by doing fake news and spoofing email accounts and fake press releases, and just by manipulating information. Or, indeed — as some companies already claim they can do — by getting people to say anything that the machine wants.” Musk said he’s usually against proactive regulation, which can impede innovation. But he’s making an exception in the case of an AI-fueled Armageddon. “By the time we are reactive in regulation, it’s too late,” he said, confessing that “this is really like the scariest problem to me.” He’s been warning people about the problem for years, and he’s even come up with a solution: Join forces with the computers. He announced earlier this year that he’s leading a company called Neuralink, which would devise ways to connect the human brain to computers, CNN reported. In the decades to come, an Internet-connected brain plug-in would allow people to communicate without opening their mouths and learn something as fast as it takes to download a book. Other prominent figures in the world of science and technology have also warned against the dangers of artificial intelligence, including Microsoft founder Bill Gates and theoretical physicist Stephen Hawking. But Musk concedes that people have been hesitant to accept their viewpoint. “I keep sounding the alarm bell, but until people see like robots going down the streets killing people, they don’t know how to react because it seems so ethereal,” he said. “I think we should be really concerned about AI.” Still, even to the biggest skeptic, one sentence offered some food for thought: “I have exposure to the very most cutting edge AI, and I think people should be really concerned about it.” Maybe Musk knows something the rest of us don’t? He is, after all, a multibillionaire, capable of using obscene sums of money to develop AI. Maybe in some Musk-funded lab, or on some secret SpaceX satellite, there’s already a powerful AI on the verge of getting out. Content from Allstate This content is paid for by an advertiser and published by WP BrandStudio. The Washington Post newsroom was not involved in the creation of this content. Learn more about WP BrandStudio.
2024-03-04T01:27:13.970301
https://example.com/article/6925
1. Field of Use This invention relates generally to valve apparatus for use in fluid conveying systems. In particular, it relates to valve apparatus which periodically effects rapid opening of a valve to admit air into a vacuumized fluid line in the fluid conveying system. 2. Description of the Prior Art The dairy industry employs fluid conveying systems wherein milk is conveyed by pipeline from the milking parlor to the milk storage area. Such systems include fluid washing apparatus for the pipelines. Such cleaning-in-place apparatus is shown and described in the U.S. Pat. Nos. 3,119,399 issued Jan. 28, 1964 entitled Apparatus for Washing Milk Conducting Lines by Lloyd F. Bender and 3,191,576 issued June 29, 1965 entitled Milk Line Releaser and Washer Apparatus issued to Lloyd F. Bender. These patents relate to apparatus for automatically moving fluid under a constant and continuous vacuum and even during the periodic fluid dumping operation. They provide apparatus for cleaning a pipeline for milk and the like by subjecting the interior of the link to a succession of relatively short cleansing slugs separated by air-filled spaces and by advancing a series of spaced liguid slugs with a scouring action through the milk line at a rapid rate. Patent 3,119,399 utilized a timer, shown in FIGS. 7, 8 and 9 for periodically connecting the interior of the pipeline with the ambient air of the atmosphere to alternately cut off the air admission and allow the milk line to receive successive liquid slugs from a tank of cleaning solution. This patent used a rotary valve type device but that device had the limitation in that the orifice used to emit air opened and closed slowly as the rotor passed the orifice and for large diameter milk conducting lines that device was not entirely successful. Patent 3,191,576 also used an electrically actuated timer and rotary valve for intermittently admitting successive slugs of cleaning solution separated by atmospheric airfilled spaces and this timer was also of the type shown in the said U.S. Pat. No. 3,119,399. Other prior art devices relating generally to this type of equipment utilized an electrical solenoid to pull a stopper plug out of an orifice in a fluid line to emit the air. Such devices are shown in the U.S. Pat. Nos. 3,802,447 issued Apr. 9, 1974 for Automatic Tank Washer with Spin-Burst Mechanism for Washing, Rinsing, and Sanitizing of Lloyd F. Bender; 3,670,744 issued June 20, 1972 for Solenoid Operated, Two Way Diverter Valve for Fluid Line Washing Apparatus of Lloyd F. Bender; and 3,732,891 issued May, 15, 1973 for Solenoid Operated, Two Way Diverter Valve for Fluid Line Washing Apparatus of Lloyd F. Bender. The pulling force of the vacuum in the fluid line and against which the solenoid must act to operate or move the stopper plug is very great. Accordingly, it is desirable to provide improved valve apparatus for such systems.
2023-12-28T01:27:13.970301
https://example.com/article/3769
Pages Saturday, May 25, 2013 Beheading of an unarmed British soldier in London by Muslim fundamentalists and hacking to death of an unarmed Police Sergeant in Puttalm by Muslim fundamentalists- many similarities between the two incidents with a glaring dissimilarity too! The brutal murder of an unarmed police Sergeant Navarathna Bandra by hacking by Muslim fundamentalists while he was on duty in Puttalam in August in 2011 has a stark resemblance to the beheading of an unarmed British soldier Lee Rigby in London by Muslim fundamentalists a couple of days ago. There are many similarities between the two incidents with a glaring dissimilarity too. First and foremost both murders were perpetrated by fanatical Muslim fundamentalists who have become a cancer to the peaceful societies the world over. The UK and Sri Lanka, as many other countries in the world, are paying the dear prize for their ill-conceived and short-sighted policies of tolerance and accommodativeness towards the ever growing Muslim expansionism and fundamentalism. Unarmed police sergeant Navrathna Bandara was hacked to death in cold blood while he was begging for his life. His wife was a 09 months' old pregnant. He begged his attackers to give him a chance considering his unborn child. And also an injury in his leg made it impossible him to run for his life. But the Muslim fundamentals had no mercy in their hearts as sergeant Navarathna Bandara was a Sinhalese, an infidel. The British soldier was also in similar helpless situation when his attacker was mercilessly chopping him as if a "piece of meat". (Hacking to death or beheading the "infidels or Kaffirs" is the standard way being followed by Muslims from Islam's inception in eliminating the former and it is widely practiced in the world over irrespective of whether the Muslims are in the majority or the minority) What is then the glaring dissimilarity that I'm talking about in the two incidents? This dissimilarity is none other than the huge publicity earned by the brutal murder of Lee Rigby by the British media in particular and the world media in general. However, in a total contrast the news of brutal murder of Sergeant Navarathna Bandra was concealed as much as possible here in Sri Lanka. The identity of the perpetrators was never revealed but a few blog sites. Extra efforts had been taken to prevent it from becoming known that It was the Muslims who killed the police Sergeant. The incident was portrayed as a result of a clash between "two groups". It was after the incident became public knowledge only that a few newspapers reported the incident casually while taking extra efforts to conceal the perpetrators' identity. The protest carried out by the villagers of Sergeant Navarathna Bandra against the brutal murder received almost no publicity among the mass media. Despite the fact that the UK has been paying the dear prize for turning a blind eye towards growing Muslim expansionism and fundamentalism, it tries to undo the damages it caused by producing a well-informed and enlightened public whose vigilance would certainly help them to face the dangers of Muslim expansionism and fundamentalism. However, non-Muslims in Sri Lanka continue to grope in the darkness until they are too late. Even some form of protests shown recently especially by the Buddhists who are pushed to the wall by Muslim fundamentalism are portrayed as "Ethno-religious Fascism on the part of the majority community against a beleaguered Muslim Community" by some vested interested parties and individuals. Labels Rebel of Kandy rebel a person who is opposed to the political system in their country and tries to change it using force, or a person who shows their disagreement with the ideas of people in authority or of society by behaving differently: verb [I] 1 to fight against the government or to refuse to obey rules, etc: 2 to react against a feeling, action, plan, etc:
2024-03-02T01:27:13.970301
https://example.com/article/1577
This directory contains a skeleton example of how to link to the C-API The basic requirements to use the exported xts C code is: (1) Add to your DESCRIPTION file: Depends: xts linkingTo: xts (2) In your .c files: #include "xtsAPI.h" This header file exports the functions that are public in xts. (3) Compile as you would with any other package: R CMD build api_example R CMD INSTALL linkXTS_1.0.tar.gz (4) Try it out! R> require(linkXTS) R> checkOrder(1:10) [1] TRUE R> checkOrder(c(1:10,1)) [1] FALSE
2024-03-04T01:27:13.970301
https://example.com/article/8167
Microsoft to open $1.1 billion ‘Project Alluvion’ data center in Iowa Microsoft is the company behind a $1.13 billion data center known as “Project Alluvion,” taking shape in West Des Moines, Iowa. The Quad City Times and The Des Moines Registerreport that construction will begin this Spring, with the announcement made Friday by Gov. Terry Branstad and Iowa economic development officials. “It’s now official, Microsoft is the new million dollar — billion dollar — economic development project,” said Gov. Branstad in welcoming the “household name” to Iowa. Iowa is already the site of one Microsoft facility, but with the new facility it will be among the biggest capital outlays by an outside company in the state. Facebook also operates a data center in Iowa. The new 1.16 million square foot project, spanning some 154 acres on the Willows Creek Golf Course, will bring 84 jobs to the region. Companies such as Microsoft need added data center capacity, especially as more services move to the cloud. It plans to continue opening new facilities in the near term, noting in a recent SEC filing that capital expenditures will increase “in coming years in support of our cloud and devices strategy.” “We really do think that central Iowa will be the leader in global tech companies when it comes to data-center and related businesses,” West Des Moines Mayor Steve Gaer told the Quad-City Times. “We think we have huge momentum.” The Central Washington area around Quincy also has become home to many data center projects, including those operated by Microsoft.
2024-03-29T01:27:13.970301
https://example.com/article/8480
Now Commenting On: Napoli set for Red Sox debut on Friday BRADENTON, Fla. -- All systems are go for new Red Sox slugger Mike Napoli to make his Grapefruit League debut on Friday night against the Pirates. After weeks of talking about his hip condition (avascular necrosis), Napoli looks forward to getting on the field and proving that the injury won't be an issue. "Just play the game," Napoli said. "That's the best way to go at it. That's the way I've always done it. I'm just going to play the game and let things happen. When you start worrying about things like, 'I can't slide, I shouldn't slide,' that's when you get in between and hurt yourself." Napoli is making the transition to full-time first baseman this season after serving as primarily a catcher during his career. He has had plenty of tutorials this spring with infield instructor Brian Butterfield. "I feel a lot more comfortable over there, especially turning the double play, where my feet should be, where I should be taking the ball and receiving the ball," said Napoli. "It's been going [well]."
2024-07-06T01:27:13.970301
https://example.com/article/5441
import copy from core.leras import nn tf = nn.tf class OptimizerBase(nn.Saveable): def __init__(self, name=None): super().__init__(name=name) def tf_clip_norm(self, g, c, n): """Clip the gradient `g` if the L2 norm `n` exceeds `c`. # Arguments g: Tensor, the gradient tensor c: float >= 0. Gradients will be clipped when their L2 norm exceeds this value. n: Tensor, actual norm of `g`. # Returns Tensor, the gradient clipped if required. """ if c <= 0: # if clipnorm == 0 no need to add ops to the graph return g condition = n >= c then_expression = tf.scalar_mul(c / n, g) else_expression = g # saving the shape to avoid converting sparse tensor to dense if isinstance(then_expression, tf.Tensor): g_shape = copy.copy(then_expression.get_shape()) elif isinstance(then_expression, tf.IndexedSlices): g_shape = copy.copy(then_expression.dense_shape) if condition.dtype != tf.bool: condition = tf.cast(condition, 'bool') g = tf.cond(condition, lambda: then_expression, lambda: else_expression) if isinstance(then_expression, tf.Tensor): g.set_shape(g_shape) elif isinstance(then_expression, tf.IndexedSlices): g._dense_shape = g_shape return g nn.OptimizerBase = OptimizerBase
2023-11-19T01:27:13.970301
https://example.com/article/8976
Getty Images Reasonable minds apparently can differ on whether it’s OK for guys like Dak Prescott and Dez Bryant to go out (despite an order to stay home) and work out at a public gym (despite an order that it should be closed). It’s hard to imagine reasonable minds differing on this. According to TMZ.com, Prescott hosted a birthday party for a friend on Friday night. At one point, thirty people attended. And one of the photos posted at TMZ.com shows in the background a cluster of bodies far closer than six feet apart. The photos also include a table set for a meal that would have entailed everyone sitting elbow to elbow. Also present for the antisocially-distanced birthday party was Cowboys running back Ezekiel Elliott. States and counties throughout the country have implemented stay-at-home orders aimed at limiting the footprint of the coronavirus, which can spread easily and be passed by asymptomatic persons to others they encounter, leaving a Russian-roulette trail of illness and death in its wake. As with the recent workouts, it’s both the act of defiance and the failure to keep the evidence under wraps that combines to send a horrible message to those who are tempted to disregard the orders and YOLO or FOMO or whatever it is they’re ultimately doing when they necessarily extend the amount of time it will take to get the virus under control.
2024-03-08T01:27:13.970301
https://example.com/article/4775
Rho kinase acts at separate steps in ureteric bud and metanephric mesenchyme morphogenesis during kidney development. In this study, five different in vitro assays, which together recapitulate much of kidney development, were used to examine the role of the Rho-associated protein serine/threonine kinase (ROCK) in events central to ureteric bud (UB) and metanephric mesenchyme (MM) morphogenensis, in isolation and together. ROCK activity was found to be critical for (1) cell proliferation, growth, and development of the whole embryonic kidney in organ culture, (2) tip and stalk formation in cultures of isolated UBs, and (3) migration of MM cells (in a novel MM migration assay) during their condensation at UB tips (in a UB/MM recombination assay). Together, the data indicate selective involvement of Rho/ROCK in distinct morphogenetic processes necessary for kidney development and that the coordination of these events by Rho/ROCK provides a potential mechanism to regulate overall branching patterns, nephron formation, and thus, kidney architecture.
2024-02-23T01:27:13.970301
https://example.com/article/6201
Thermodynamics and kinetics of hydroxide ion formation in 12 CaO x 7 Al2O3. We have examined the thermodynamics and kinetics of hydroxide (OH-) ions that formed in cages of 12 CaO x 7 Al2O3 (C12A7) with nanoporous structures. It is confirmed using thermogravimetric-evolved gas analyses (TG-EGA) that hydration in C12A7 is mediated by a reaction between an oxide (O2-) ion in the cage and an H2O molecule in the atmosphere to form two OH- ions in the cages. To simply and exactly quantify the OH- content from infrared absorption measurements of OH-stretching band, we propose a method combined with a thermodynamic analysis, allowing the simultaneous determination of the molar extinction coefficient of the OH-band, enthalpy, and entropy for the hydration. Hydration enthalpy in C12A7 is extremely high compared with other oxides and was enhanced by the marked instability of O2- ion in the cage. Consequently, high solubility of OH- ion is retained up to unusually high temperatures. Furthermore, we determined diffusion coefficients of species relevant to the hydration process and demonstrated that inward diffusion of OH- ions is the rate-determining process.
2024-05-02T01:27:13.970301
https://example.com/article/6075
The intra-channel nonlinearity is inherent damage in an optical transmission system and is originated from the Kerr effect. When the rate of the single channel reaches 40-60 Gbits/s or more, the pulses within the same channel will be greatly widened and overlapped each other due to the effect of dispersion, and with the effect of the nonlinearity, energy exchange will occur between the overlapped pulses. In such a case, even though the residual dispersion in the link was compensated for at the receiving side, the system would still be severely nonlinearly damaged. The effect of nonlinearity within the channel on the system includes: timing jitter, signal amplitude fluctuation, and generation of ghost pulse. In recent years, as the rise of the capacities of optical transmission systems, more complex multidimensional modulation technologies, instead of simple intensity modulation formats, have been a hot spot in studies. For ensuring that a complex modulation has a sufficient signal to noise ratio, it is needed that a link system has higher input power, and this undoubtedly results in the increase of cost of nonlinearity of the system. For a long-haul optical communication system, how to compensate for or mitigate the cost of nonlinearity within a channel is an important question for study. Studies have been done with respect to design of link, DSP processing of receiver and coding of transmitting signal. A method for mitigating nonlinearity by subtracting nonlinear perturbation at a receiver side has been proposed in the prior art. Such a method is based on double oversampling, wherein a perturbation item is equal to a weighted sum of products of a series of three items (symbol information data of three moments), and the weighted value is decided by the dispersion, gain/attenuation and nonlinear coefficient of the link. The advantage of the method exists in the reduction of complexity, and especially in a PSK system, a pre-compensated waveform may completely be realized by means of addition and subtraction. However, in the implementation of the present invention, the inventors found the disadvantages of the prior art exist in: the performance is not good for NRZ (Not Return to Zero) code, and the performance of the system needs to be further improved. Following documentations are listed for better understanding of the present invention and the prior art, which are incorporated herein by reference, as they are fully stated herein. [Reference 1]: IEEE PTL Vol. 12, No. 4, 2000, Antonio Mecozzi et. al. [Reference 2]: L. Dou, Z. Tao, L. Li, W. Yan, T. Tanimura, T. Hoshida, and J. C. Rasmussen, “A low complexity pre-distortion method for intra-channel nonlinearity,” in Proc. OFC/NFOEC2011 Conf., Los Angeles, U.S.A., March. 2011, paper OThF5.
2024-03-19T01:27:13.970301
https://example.com/article/2679
Q: correct usage of scipy.optimize.fmin_bfgs required versus R code I am used to doing all my statistics in R and python for all the peripheral tasks. Just for fun I attempted a BFGS optimization to compare it to the ordinary LS result - both in python using scipy/numpy. But the results do not match. I do not see any errors. I also attach the equivalent code in R (which works). Can anyone correct my usage of scipy.optimize.fmin_bfgs to match the OLS or R results ? import csv import numpy as np import scipy as sp from scipy import optimize class DataLine: def __init__(self,row): self.Y = row[0] self.X = [1.0] + row[2:len(row)] # 'Intercept','Food','Decor', 'Service', 'Price' and remove the name def allDataLine(self): return self.X + list(self.Y) # return operator.add(self.X,list(self.Y)) def xData(self): return np.array(self.X,dtype="float64") def yData(self): return np.array([self.Y],dtype="float64") def fnRSS(vBeta, vY, mX): return np.sum((vY - np.dot(mX,vBeta))**2) if __name__ == "__main__": urlSheatherData = "/Hans/workspace/optimsGLMs/MichelinNY.csv" # downloaded from "http://www.stat.tamu.edu/~sheather/book/docs/datasets/MichelinNY.csv" reader = csv.reader(open(urlSheatherData), delimiter=',', quotechar='"') headerTuple = tuple(reader.next()) dataLines = map(DataLine, reader) Ys = map(DataLine.yData,dataLines) Xs = map(DataLine.xData,dataLines) # a check and an initial guess ... vBeta = np.array([-1.5, 0.06, 0.04,-0.01, 0.002]).reshape(5,1) print np.sum((Ys-np.dot(Xs,vBeta))**2) print fnRSS(vBeta,Ys,Xs) lsBetas = np.linalg.lstsq(Xs, Ys) print lsBetas[1] # prints the right numbers print lsBetas[0] optimizedBetas = sp.optimize.fmin_bfgs(fnRSS, x0=vBeta, args=(Ys,Xs)) # completely off .. print optimizedBetas The result of the optimization is: Optimization terminated successfully. Current function value: 6660.000006 Iterations: 276 Function evaluations: 448 [ 4.51296549e-01 -5.64005114e-06 -3.36618459e-06 4.98821735e-06 9.62197362e-08] But it really should match the OLS results achieved in lsBetas = np.linalg.lstsq(Xs, Ys): [[-1.49209249] [ 0.05773374] [ 0.044193 ] [-0.01117662] [ 0.00179794]] Here is the R code in case it is useful (it also has the advantage of being able to read directly from the URL): urlSheatherData = "http://www.stat.tamu.edu/~sheather/book/docs/datasets/MichelinNY.csv" dfSheather = as.data.frame(read.csv(urlSheatherData, header = TRUE)) vY = as.matrix(dfSheather['InMichelin']) mX = as.matrix(dfSheather[c('Service','Decor', 'Food', 'Price')]) mX = cbind(1, mX) fnRSS = function(vBeta, vY, mX) { return(sum((vY - mX %*% vBeta)^2)) } vBeta0 = rep(0, ncol(mX)) optimLinReg = optim(vBeta0, fnRSS,mX = mX, vY = vY, method = 'BFGS', hessian=TRUE) print(optimLinReg$par) A: First, let's make arrays out of list: >>> Xs = np.vstack(Xs) >>> Ys = np.vStack(Ys) Then, fnRSS is incorrectly translated, it's argument, beta, is passed transposed. Can be fixed with >>> def fnRSS(vBeta, vY, vX): ... return np.sum((vY.T - np.dot(vX, vBeta))**2) Final result: >>> sp.optimize.fmin_bfgs(fnRSS, x0=vBeta, args=(Ys,Xs)) Optimization terminated successfully. Current function value: 26.323906 Iterations: 9 Function evaluations: 98 Gradient evaluations: 14 array([-1.49208546, 0.05773327, 0.04419307, -0.01117645, 0.00179791]) Sidenote, consider using pandas read_csv parser or numpy genfromtxt or recfromcsv to read csv data into array instead of custom written parsers. No problems to read from url either: >>> import pandas as pd >>> urlSheatherData = "http://www.stat.tamu.edu/~sheather/book/docs/datasets/MichelinNY.csv" >>> data = pd.read_csv(urlSheatherData) >>> data[['Service','Decor', 'Food', 'Price']].head() Service Decor Food Price 0 19 20 19 50 1 16 17 17 43 2 21 17 23 35 3 16 23 19 52 4 19 12 23 24 [5 rows x 4 columns] >>> data['InMichelin'].head() 0 0 1 0 2 0 3 1 4 0 Name: InMichelin, dtype: int64
2023-10-07T01:27:13.970301
https://example.com/article/5665
Podcast: The Official HorrorNews.Net Podcast – Eps 20 Kick-Ass 2 is yet another Summer film that has the grue-crew divided on their opinions with not everyone on board enjoying the return of Kick-Ass, Hit-Girl and Chris D’Amico. Co-hosts Doc Rotten, Dave Dreher, Santos (The Black Saint) Ellin Jr., Thomas Mariani and Vixen recap and review the graphic, brutal and funny super-hero film. We also have Jay Lee, the director of Alyce Kills, joining us to discuss his film out on DVD August, 20, 2013. Dave fires up the crypt-keepers with the horror news of the week and Doc has another contest to share. 0:02:46 – Kick-Ass 2 recap and review Kick-Ass 2, based on thefurther adventures of the characters created by Mark Millar and John Romita, Jr.,continues to explore what would happen if a teenager decided to become a superhero in the real world, amplifying the violence, consequences and gore. Aaron Taylor-Johnson returns as Kick-Ass and Chloe Grace Moretz reprises her role as Hit-Girl. While Hit-Girl all but owns the movie, the amazonian-sized Mother Russia threatens to steal the entire picture. Brilliant! In a rare turn of events, Santos is the one who praises the film the most from the crew while Vixen cannot hold back her disdain. It’s a lively discussion about the film. 0:32:22 – Interview with Jay Lee, director of Alyce Kills This week we have an Interview with Jay Lee, the director of Alyce Kills; the unrated DVD is out August 20, 2013. The film explores a dark downward spiral of a young woman who tries to cover up the tragic events that lead to the death of her roommate. The more the fingers of lies and deceit close their grip, the more unhinged Alyce becomes until she fully embraces the evil that blossoms in a gory, bloody night of horror. Jay Lee speaks with Doc and Dave about the origins of the film, casting Jane Dornfeld as Alyce and the significance of Alice in Wonderland to the plot 0:54:48 – Horror news of the week Dave Dreher’s horror news of the week begins with the extensive Blu-ray documentary collection about Friday the 13th series of films called Crystal Lake Memories. This is followed by the grue-crew trying to make out what the heck The Strangerteaser trailer from J.J. Abrams and Bad Robot is actually all about. Thomas is especially interested in Dave’s news about Escape from Tomorrowabout a man on the brink of insanity when he receives bad news while visiting a Disney theme park. The extended Nightbreed re-cut from Clive Barker’s script gets an official name: Nightbreed the extended director’s cut. Look for it soon from Scream Factory. Dave ends the news with the sales trailer and poster from Timur Bekmambetov’s Squirrels. Doc steps in with more news about HorrorNews.Net presents Dead Afterlife, including the launch of their IndieGoGo site. 1:17:25 – HNN Contest to win one of 3 copies of the Absence Blu-ray It is time for another crazy contest on the podcast, for this one 3 lucky winners will each win a copy of the AbsenceBlu-ray. The contest is open until Midnight (EST), Sunday, August 25, 2013 and is open to US addresses only. You have two options to win! The first option is to join the HorrorNews.Net Podcast group, www.facebook.com/groups/HorrorNewsNetPodcast/, and complete the poll on the following question: What is your favorite Found Footage horror film? The second way to win is to answer the same question in an email sent to DocRotten@HorrorNews.Net with Absence in the subject line along with your mailing address. Here is the synopsis of the film, Absense: “Expectant mother Liz wakes to discover that her unborn child has disappeared overnight. She travels to the mountains with her husband and brother to escape the attention of prying neighbors and police – and to try to make sense of what happened, where they realize that their ordeal is not yet over.”
2024-02-11T01:27:13.970301
https://example.com/article/8631
/* * Copyright 2011 Tyler Blair. All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, are * permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, this list of * conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, this list * of conditions and the following disclaimer in the documentation and/or other materials * provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND * FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * The views and conclusions contained in the software and documentation are those of the * authors and contributors and should not be interpreted as representing official policies, * either expressed or implied, of anybody else. */ package com.griefcraft.sql; import com.griefcraft.lwc.LWC; import com.griefcraft.scripting.ModuleException; import com.griefcraft.util.Statistics; import com.griefcraft.util.Updater; import com.griefcraft.util.config.Configuration; import org.bukkit.Bukkit; import java.io.File; import java.net.URL; import java.net.URLClassLoader; import java.sql.Connection; import java.sql.Driver; import java.sql.PreparedStatement; import java.sql.SQLException; import java.sql.Statement; import java.util.HashMap; import java.util.Map; import java.util.Properties; public abstract class Database { public enum Type { MySQL("mysql.jar"), // SQLite("sqlite.jar"), // NONE("nil"); // private String driver; Type(String driver) { this.driver = driver; } public String getDriver() { return driver; } /** * Match the given string to a database type * * @param str * @return */ public static Type matchType(String str) { for (Type type : values()) { if (type.toString().equalsIgnoreCase(str)) { return type; } } return null; } } /** * The database engine being used for this connection */ public Type currentType; /** * Store cached prepared statements. * <p/> * Since SQLite JDBC doesn't cache them.. we do it ourselves :S */ private Map<String, PreparedStatement> statementCache = new HashMap<String, PreparedStatement>(); /** * The connection to the database */ protected Connection connection = null; /** * The default database engine being used. This is set via config * * @default SQLite */ public static Type DefaultType = Type.NONE; /** * If we are connected to sqlite */ private boolean connected = false; /** * If the database has been loaded */ protected boolean loaded = false; /** * The database prefix (only if we're using MySQL.) */ protected String prefix = ""; /** * If the high level statement cache should be used. If this is false, already cached statements are ignored */ private boolean useStatementCache = true; public Database() { currentType = DefaultType; prefix = LWC.getInstance().getConfiguration().getString("database.prefix", ""); if (prefix == null) { prefix = ""; } } public Database(Type currentType) { this(); this.currentType = currentType; } /** * Ping the database to keep the connection alive */ public void pingDatabase() { Statement stmt = null; try { stmt = connection.createStatement(); stmt.executeQuery("SELECT 1;"); stmt.close(); } catch (SQLException e) { log("Keepalive packet (ping) failed!"); e.printStackTrace(); } finally { try { if (stmt != null) { stmt.close(); } } catch (SQLException e) { } } } /** * Set the value of auto commit * * @param autoCommit * @return TRUE if successful, FALSE if exception was thrown */ public boolean setAutoCommit(boolean autoCommit) { try { // Commit the database if we are setting auto commit back to true if (autoCommit) { connection.commit(); } connection.setAutoCommit(autoCommit); return true; } catch (SQLException e) { e.printStackTrace(); return false; } } /** * @return the table prefix */ public String getPrefix() { return prefix; } /** * Print an exception to stdout * * @param exception */ protected void printException(Exception exception) { throw new ModuleException(exception); } /** * Connect to MySQL * * @return if the connection was succesful */ public boolean connect() throws Exception { if (connection != null) { return true; } if (currentType == null || currentType == Type.NONE) { log("Invalid database engine"); return false; } // load the database jar ClassLoader classLoader; if (currentType == Type.SQLite) { classLoader = new URLClassLoader(new URL[]{new URL("jar:file:" + new File(Updater.DEST_LIBRARY_FOLDER + currentType.getDriver()).getPath() + "!/")}); } else { classLoader = Bukkit.getServer().getClass().getClassLoader(); } // What class should we try to load? String className = ""; if (currentType == Type.MySQL) { className = "com.mysql.jdbc.Driver"; } else { className = "org.sqlite.JDBC"; } // Load the driver class Driver driver = (Driver) classLoader.loadClass(className).newInstance(); // Create the properties to pass to the driver Properties properties = new Properties(); // if we're using mysql, append the database info if (currentType == Type.MySQL) { LWC lwc = LWC.getInstance(); properties.put("autoReconnect", "true"); properties.put("user", lwc.getConfiguration().getString("database.username")); properties.put("password", lwc.getConfiguration().getString("database.password")); } // Connect to the database try { connection = driver.connect("jdbc:" + currentType.toString().toLowerCase() + ":" + getDatabasePath(), properties); connected = true; return true; } catch (SQLException e) { log("Failed to connect to " + currentType + ": " + e.getErrorCode() + " - " + e.getMessage()); if (e.getCause() != null) { log("Connection failure cause: " + e.getCause().getMessage()); } return false; } } public void dispose() { statementCache.clear(); try { if (connection != null) { connection.close(); } } catch (SQLException e) { e.printStackTrace(); } connection = null; } /** * @return the connection to the database */ public Connection getConnection() { return connection; } /** * @return the path where the database file should be saved */ public String getDatabasePath() { Configuration lwcConfiguration = LWC.getInstance().getConfiguration(); if (currentType == Type.MySQL) { return "//" + lwcConfiguration.getString("database.host") + "/" + lwcConfiguration.getString("database.database"); } return lwcConfiguration.getString("database.path"); } /** * @return the database engine type */ public Type getType() { return currentType; } /** * Load the database */ public abstract void load(); /** * Log a string to stdout * * @param str The string to log */ public void log(String str) { LWC.getInstance().log(str); } /** * Prepare a statement unless it's already cached (and if so, just return it) * * @param sql * @return */ public PreparedStatement prepare(String sql) { return prepare(sql, false); } /** * Prepare a statement unless it's already cached (and if so, just return it) * * @param sql * @param returnGeneratedKeys * @return */ public PreparedStatement prepare(String sql, boolean returnGeneratedKeys) { if (connection == null) { return null; } if (useStatementCache && statementCache.containsKey(sql)) { Statistics.addQuery(); return statementCache.get(sql); } try { PreparedStatement preparedStatement; if (returnGeneratedKeys) { preparedStatement = connection.prepareStatement(sql, Statement.RETURN_GENERATED_KEYS); } else { preparedStatement = connection.prepareStatement(sql); } statementCache.put(sql, preparedStatement); Statistics.addQuery(); return preparedStatement; } catch (SQLException e) { e.printStackTrace(); } return null; } /** * Add a column to a table * * @param table * @param column */ public boolean addColumn(String table, String column, String type) { return executeUpdateNoException("ALTER TABLE " + table + " ADD " + column + " " + type); } /** * Add a column to a table * * @param table * @param column */ public boolean dropColumn(String table, String column) { return executeUpdateNoException("ALTER TABLE " + table + " DROP COLUMN " + column); } /** * Rename a table * * @param table * @param newName */ public boolean renameTable(String table, String newName) { return executeUpdateNoException("ALTER TABLE " + table + " RENAME TO " + newName); } /** * Drop a table * * @param table */ public boolean dropTable(String table) { return executeUpdateNoException("DROP TABLE " + table); } /** * Execute an update, ignoring any exceptions * * @param query * @return true if an exception was thrown */ public boolean executeUpdateNoException(String query) { Statement statement = null; boolean exception = false; try { statement = connection.createStatement(); statement.executeUpdate(query); } catch (SQLException e) { exception = true; } finally { try { if (statement != null) { statement.close(); } } catch (SQLException e) { } } return exception; } /** * @return true if connected to the database */ public boolean isConnected() { return connected; } /** * Returns true if the high level statement cache should be used. If this is false, already cached statements are ignored * * @return */ public boolean useStatementCache() { return useStatementCache; } /** * Set if the high level statement cache should be used. * * @param useStatementCache * @return */ public void setUseStatementCache(boolean useStatementCache) { this.useStatementCache = useStatementCache; } }
2024-03-16T01:27:13.970301
https://example.com/article/2677
ESTES PARK — Richard Sipe was never supposed to be the last person left to oversee the Cascade Cottages, which sit on the largest remaining privately owned slice of land in Rocky Mountain National Park. He’d visited briefly during the summer of 1987, then returned on vacation each of the following two years. One night during his third stay, he walked into the Cascade office and struck up a conversation with Grace Davis, the woman behind the front desk, whose parents, L.V. and Hazel Davis, had purchased the land in 1941 and managed the cottages there. “I said I was from Wichita. She was, too,” says Sipe, now 86. “She was single, and I was, too, because my wife had passed away.” That conversation took place on a summer Thursday. On Saturday, they had dinner in Estes Park. Back in Wichita, they started dating, and on March 26, 1990, they were married. For two dozen summers thereafter, the couple lived at Cascade — a 40-acre plot one mile east of the park’s Fall River Entrance Station — and maintained its 14 cabins. Grace died last year, and now Sipe is the property’s last remaining link to the family that bought the Cascade property. When L.V. and Hazel Davis made the purchase, they also struck a handshake deal with Rocky Mountain: When the family could no longer care for the land, they’d sell it to the park. That day arrived this week at long last, with the Rocky Mountain Conservancy announcing plans to acquire the Cascade acreage for $3.6 million. Vaughn Baker, park superintendent, said by phone Friday that if the sale goes through, the park won’t touch the 27 acres of wilderness at the north end of the plot but would be open to knocking down some or all of the cabins. It is possible the park would rededicate some of the existing structures on the 15-acre portion, possibly for a youth education center. The money from the sale would be spread among the Davis family. In Sipe’s mind, whatever happens, happens. “The park’s purpose is to preserve the natural state,” Sipe says from the very same couch he sat in the day he met Grace. “Her mother and father knew that. They knew things would go back to the original status someday.” Today, Sipe mans the front desk where his wife once sat, and her father before that. This is the last weekend of the season for the Cascade Cottages, and next summer will be its last hurrah. “It’s emotional,” Sipe says, “but I feel honored that I happened to be here.” He takes a stroll through the cabin area, ignoring trails and taking bee-lines from place to place, even if that means navigating a rock scree or stepping over thrush. Every inch of the property seems to tell a story. Sipe points to Cabin 14, where a plaque reading “Jean-Pierre Huguet” has been nailed in by the front door. Huguet, he says, was a French exchange student who helped build the cabin in 1955. Like a mountain goat, Sipe goes straight uphill, stepping from rock to rock, careful not to kick a chipmunk. He’s used to living among wildlife up here. “The turkeys are profuse,” he says. “And, unbeknownst to our guests, there are mountain lions around here. They see us, and we don’t see them.” One lion, he claims, spent a few weeks sleeping undetected beneath Cabin 2. “You see that big rock?” Sipe says, interrupting himself to point out a boulder in the middle of the cabin area, affectionately and aptly dubbed “The Big Rock” years ago. “At one time, there was a tree growing out of one of the cracks in the rock, but all the kids would climb on it, and the tree isn’t there anymore.” And, for the most part, neither are the kids. Cascade has its regulars, but they’re aging, and Sipe believes it’s because he and Grace never modernized the place with cell service or television. He peeks into Cabin 2 — the former mountain lion shelter, he reiterates — where Glenda Lindteign, 62, is packing up after an 11th summer with her husband at Cascade. She says she’s trying hard not to think past next year, when the sale should be finalized. “It’s an era — generation after generation, parents and children, children coming in with their kids,” she says, tossing clean sheets onto the cabin’s twin bed. “But it does run its course, and it’s hard to carry on to meet up with the standards of some of the younger generations. “The people that have come here will find other places to go. But it’s sad to say goodbye.” Like the cabins, the office where Sipe and Grace met also looks like it hasn’t changed much over the years. The walls are adorned with portraits of owls, moose, wildflowers and bighorn sheep. The bookshelf is stuffed with paperbacks, none published this century. On a small side table there’s a photo of Grace, and an unlit candle. “She’s here,” he says. “She’s here in spirit. Everything I know about Cascade — how to run it, some of the history — I learned from her.” He thinks ahead to what he’ll be doing this time next year, as Cascade wraps up its final season. “After this, they might put a plaque up for us,” he jokes. “Maybe in The Big Rock.” Alex Burness: 303-473-1389, burnessa@dailycamera.com or twitter.com/alex_burness
2024-01-10T01:27:13.970301
https://example.com/article/4725
Dubai Delight (4 Nights & 5 Days) Check Availability From To Overview Dubai Dubai is the second largest emirate in the federation of the United Arab Emirates. It is, also, the economic capital of the state. For a long time, Dubai Khor was one of the most famous landmarks of the emirate which was built on its banks. Al Khor is a waterway used in the past as a small port to unload cargo ships and transport to markets. Dubai Khor centers amid this beautiful city and divides it into two parts; Bur Dubai in the south which is the traditional heart of the city and Deira in the north which includes a lot of shopping centers and famous markets in the emirate. Special offer*: Book on or before 31 March2016 & get U.A.E. visa FREE Inclusions 4 nights accommodation Visit to Dubai Museum Daily buffet breakfast Visit to Saeed Al Maktoum House Return airport transfer Water Bus ride Dhow Dinner Cruise Free museum entry 3 Walking tours in dubai All room taxes and service fees. Exclusions Airfare Tourism Dirham Charge to be paid directly by the client to hotel before check out (AED 10-20 per room per night). Breakfast in Hotel. Will take you to Visit Museums & Saeed Al Maktoum House. This tour will give you a glimpse of some of the best modern architecture in the world Get ride in Water bus. Afternoon come back to hotel. Take rest in hotel until evening. You will be picked up between 7:00-7:30 Pm for Dhow Dinner cruise. Dividing the charming ‘City of Lights’ into two commercial districts, Dubai Creek epitomizes the city’s personality. Here, the magnificent sophistication of the 21st Century walks hand in hand with the simplicity of a bygone era. Hop aboard our traditional dhow which keeps the traditions alive with glass enclosed interiors to offer stunning views of the old and new Dubai. Awaken your senses as you gently cruise along the banks of historic Dubai Creek where the Dhow combines the best of culinary delights with a glimpse of old Dubai. Onboard we welcome you with welcome drinks followed by a sumptuous buffet dinner. Highlights: Stunning views of the creek through our glass enclosed interiors, lavish international buffet, and selection of the best of Arabic Lounge Music to awaken your senses. Transfer back to the hotel at 22:30 pm for overnight.Meals: Breakfast & DinnerDay 3 : Dubai Walking Tours Breakfast in Hotel. After that, we will take you for 3 walking tours in Dubai. This historical and cultural walking tour of Dubai, will include amazing wind towers (earliest form of air conditioning), old souks and markets Spice Market where you can buy spices at great prices. From here we will go to the Gold Souk where occasionally you can see gold bars being taken down the street on wooden hand carts. Afternoon Come back to hotel. Rest of the day will be free for your own activities.Meals: Breakfast Day 4 : Day at Leisure Breakfast in hotel & day is free for shopping or individual activities.Meals: BreakfastDay 5 : Departure Breakfast in Hotel. Check out & transfer to hotel for your journey back to home countryMeals: Breakfast Room Rates Hotel Per Person in AED Nights Single Double Triple Child (Extra Bed) Child (sharing parents Bed) Ramee Hotel apartment/ Orchid Hotel/ Fortune Pearl Hotel Diera 4 1780 1115 1070 990 690 Terms & Conditions All prices are per person in AED twin sharing accommodation valid until 31 Mar 2016. Need Travel Point Africa’s Help? Quick links A Little About Us Travel Point Africa is one of the major travel agent & inbound operators in Southern and Eastern Africa with offices in Cape Town, Durban, Johannesburg (South Africa), Dar es Salaam, Arusha (Tanzania) Windhoek and Swakopmund (Namibia), Victoria Falls (Zimbabwe) and Nairobi (Kenya). We speak International languages which includes Swahili, English, Portugues, Spanish, French and Arabic. Sign Up for Newsletter Email address: We respect your privacy Need Travel Point Africa Help? We would be more than happy to help you. Our team is 24/7 at your service to help you. For Emergency After Hours Help dial + 27 61 463 0880
2023-09-20T01:27:13.970301
https://example.com/article/1283