text stringlengths 0 7.84M | meta dict |
|---|---|
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#ifndef _LIBSPL_LIBDEVINFO_H
#define _LIBSPL_LIBDEVINFO_H
#endif /* _LIBSPL_LIBDEVINFO_H */
| {
"pile_set_name": "Github"
} |
1. Field of the Present Invention
The present invention relates to a semiconductor memory device, and more particularly to an array of flash memory cells, in which a unit cell includes a single transistor and to methods for programming and erasing the same.
2. Discussion of the Related Art
An ideal memory element allows for easy programming (writing), easy erasing, and retains a memory state even if power is removed, i.e., is nonvolatile. Nonvolatile semiconductor memories (NVSM) are classified into two typesxe2x80x94a floating gate type and a metal insulator semiconductor (MIS) type. The MIS type also may have two or more kinds of stacked dielectric films.
The floating gate type memory uses a potential well to implement memory functions. ETOX (EPROM Tunnel Oxide) structure, which has recently been the most applicable technology for the flash EEPROM (Electrically Erasable Read Only Memory), is typical of the floating gate type. The floating gate type structure can be used to implement a memory cell using a single transistor.
On the other hand, the MIS type memory function uses traps formed in a dielectric film bulk, a boundary layer between two dielectric films, or a boundary layer between a dielectric film and a semiconductor. The MONOS/SONOS (Metal/Poly Silicon Oxide Nitride Oxide Semiconductor) structure, which is used as a full-featured EEPROM, is typical.
To execute the program and erase operations in these memory cells, it is essential that selection transistors be included in addition to the transistors of MONOS/SONOS structure. In other words, each memory cell must include at least two transistors.
The array of conventional flash memory cells and the methods for programming and erasing the same are explained in detail by referring to the accompanying drawings FIGS. 1-2B. As seen in FIG. 1, a unit cell of the conventional flash memory cells includes two transistors.
FIG. 2A shows an array of conventional flash memory cells using the cell in FIG. 1 as the unit cell, and bias conditions for programming the cells. FIG. 2B shows the array of conventional flash memory cells using the cell in FIG. 1 as a unit cell and the bias conditions for erasing the cells.
As seen, the array of conventional flash memory cells is constructed by arranging unit cells in a form of matrix. Each cell includes two transistorsxe2x80x94a memory transistor having a MONOS/SONOS structure and a selection transistor for determining whether the cell is selected or not.
A plurality of word lines are constructed in a direction so that the gates memory transistors arranged in a row are commonly connected.
A plurality of word selection lines are constructed in a direction parallel to the word lines so that the gates of selection transistors arranged in a row are commonly connected.
A plurality of bit lines are constructed in a direction perpendicular to the word lines so that the drains of memory transistors arranged in a column are commonly connected.
A plurality of bit selection lines are constructed in a direction parallel to the bit lines so that the drains of selection transistors arranged in a column are commonly connected.
As mentioned above, the conventional unit cell includes a memory transistor having the MONOS/SONOS structure and a selection transistor. A cell is selected by selecting the selection transistor, and program and erase operations are performed on the associated memory transistor.
As shown in FIG. 1, the memory transistor has an ONO (Oxide Nitride Oxide) structure including a first oxide film 11, a nitride film 12, and a second oxide film 13 sequentially stacked on a portion of a semiconductor substrate 10. A first gate electrode 15a is formed on the oxide film 13.
The selection transistor includes a gate oxide film 14 and a second gate electrode 15b formed on the gate oxide film 14. The gate oxide film 14 of the selection transistor is thicker than the first and second oxide films 11 and 13 so that a portion of the selection transistor is isolated from the first gate electrode 15a.
A common source region 16a is formed in a portion of the semiconductor substrate 10 between the memory transistor and the selection transistor. Drain regions 16b are formed in portions of the semiconductor substrate 10 at the outside of the memory and selection transistors.
In the conventional flash memory cell, programming is accomplished by applying a high positive voltage to the first gate electrode 15a. When the high voltage is so applied, electrons from the semiconductor substrate 10 tunnel through the first oxide film 11 and are injected into the nitride film 12. Thus, the first oxide film 11 is called a tunneling oxide.
The second oxide film 13 prevents electrons injected into the nitride film 12 from leaking into the first gate electrode 15a. The second oxide film 13 also prevents electrons from being injected from the first gate electrode 15a into the nitride film 12. Thus, the second oxide film 13 is called a blocking oxide.
Since the program operation uses traps in the boundary layer between the nitride film 12 and the second oxide film 13, electrons should be injected into or emitted from the entire region of a substrate channel to perform the program and erase operations.
When performing a programming operation, the array of cells is biased in a certain manner. The programming bias condition for the array of conventional flash memory cells is explained as follows.
Referring to FIG. 2A, a unit cell, among the plurality of flash memory cells, is selected for programming. Thereafter, a voltage Vp is applied to the word line connected to the gate of the selected memory transistor. Vp is also applied to the word selection line connected to the gate of the selection transistor of the selected cell. Due to the arrangement, the gates of memory transistors and selection transistors of other cells in the same row are also applied with the same Vp voltage.
However, a ground voltage is applied to the word lines of the non-selected rows. Also, the word selection lines of the non-selected rows have their voltages left floating.
For the bit line connected to a drain of the selected memory transistor, the ground voltage is applied. However, for the non-selected bit lines, a voltage Vi is applied. Similarly, for the bit selection line connected to the drain of the selected selection transistor, voltage is left floating, while the non-selected bit selections lines have ground voltages applied.
Finally, ground voltage is also applied to the well (semiconductor substrate) at the lower portion of all the cells regardless of whether that cell is selected or not. The aforementioned bias conditions are simultaneously applied.
Table 1 describes the bias conditions for the programming operation in a table form.
Note that multiple cells maybe selected at a time for programming, such as a byte at a time.
When performing an erasing operation, the array of cells is differently biased from the programming operation. The erasing bias condition for the array of conventional flash memory cells is explained as follows.
Referring to FIG. 2B, a unit cell is selected for erasing. Thereafter, the ground voltage is applied to the word line connected to the gate of the selected memory transistor. Also, Vp is applied to the word selection line connected to the gate of the selection transistor of the selected cell.
However, for the non-selected word lines, voltage Vp is applied, while the word selection lines are left floating.
For the bit line connected to a drain of the selected memory transistor, the ground voltage is applied. However, for the non-selected bit lines, a voltage Vi is applied. Similarly, for the bit selection line connected to the drain of the selected selection transistor, voltage is floating, while the non-selected bit selection lines have ground voltages applied.
Finally, as in the programming operation described above, ground voltage is applied to the well (semiconductor substrate) at the lower portion of all the cells regardless of whether that cell is selected or not. The aforementioned bias conditions are simultaneously applied.
The table 2 describes the bias conditions for the erasing operation in a table form.
Again, multiple cells may be selected for erasing, such as a byte at a time.
The array of conventional flash memory cells and the program and erase methods using the same have the following problems. First, because two transistors are used for a single cell, the area for a chip becomes large and it is difficult to isolate cells from each other. Second, programming the chip is complex.
It is therefore an object of the present invention to improve the integrity of a chip by using a single transistor for a single cell.
It is another object of the present invention to easily implement the program operation by the byte and the erase operation in bulk by providing an array whose single cell comprises a single transistor.
Additional features and advantages of the invention will be set forth in the description that follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
To achieve these and other advantages in accordance with the purpose of the present invention, as embodied and broadly described, an array of flash memory cells according to the present invention comprises a plurality of flash memory cells, each of the cells having a MONOS/SONOS structure and being arranged in the form of a matrix, a plurality of word lines arranged in one line direction so that the gates of the flash memory cells arranged in one and the same row are commonly connected, a plurality of selection lines arranged in a direction perpendicular to the word lines so that the sources of the flash memory cells arranged in one and the same column are commonly connected, and a plurality of bit lines arranged in a direction parallel to the selection lines so that the drains of the flash memory cells arranged in one and the same column are commonly connected.
A data program method using the array of the flash memory cells according to the present invention, in a plurality of word lines, selection lines and bit lines respectively connected to the gates, sources and drains of a plurality of flash memory cells arranged in the form of a matrix and wells formed in the lower portion of each of the flash memory cells, comprises a first step for selecting one cell among a plurality of the flash memory cells; a second step for applying a power supply voltage Vcc to the word line connected to the gate of the selected cell and a voltage xe2x88x92Vpp to the well in the lower portion of the selected cell and to the selection and bit lines connected to the source and drain of the selected cell; a third step for performing the second step and at the same time applying a ground voltage to the selection and bit lines of the cells connected to the same word line as the selected cell and a voltage xe2x88x92Vpp to the wells; and a fourth step for performing the first and second steps and at the same time applying a ground voltage to the word lines of the cells not connected to the same word line as the selected cell and a voltage xe2x88x92Vpp to the wells and to the selection and bit lines of the cells not connected to the same word line as the selected cell.
A data erase method using the array of the flash memory cells according to the present invention, in a plurality of word lines, selection lines and bit lines which are connected, respectively, to the gates, the sources and the drains of a plurality of flash memory cells arranged in the form of a matrix and wells formed in the lower portion of each of the flash memory cell, comprises a first step for applying a voltage xe2x88x92Vpp to the word lines of the cells and a second step for performing the first step and at the same time applying a power supply voltage Vcc to the selection and bit lines of the cells and to the wells in the lower portion of the cells.
Other objects, features, and advantages of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. | {
"pile_set_name": "USPTO Backgrounds"
} |
Pierce the squash several times with a sharp knife to let the steam escape during cooking.
Microwave on high until tender, about 5 minutes. Turn the squash after 3 minutes to ensure even cooking.
Place the squash on a cutting board and cut in half. Scrape the seeds out of the center of each half and discard the seeds.
Fill the hollowed squash with the apple mixture.
Return the squash to the microwave and cook until the apples are softened, about 2 minutes.
Transfer the squash to a serving dish. Top each half with 1 teaspoon margarine and serve immediately.
Notes
Acorn squash is a good source of vitamins A and C, potassium, and fiber. Here it’s paired with apples and brown sugar to make a hearty dish. Serve along with whole-grain crackers and a small wedge of your favorite cheese to round out all food groups. | {
"pile_set_name": "Pile-CC"
} |
Oslo's new city council—59 elected representatives that will manage the city for the next four years—has announced that it will institute a permanent and comprehensive ban of cars in the city centre. This will make Oslo the first European capital where cars are permanently banned, plus it's a strong indicator that similar bans may be enacted in other major cities across the continent.
The newly elected council, which is made up of the Labour Party, the Greens, and the Socialist Left, said that the Oslo car ban would be enacted "by 2019." Ahead of the ban, some 60 kilometres (37 miles) of bicycle lanes will be built, plus there'll be a "massive boost" to public transport spending, Reuters reports. "We want to make it better for pedestrians, cyclists. It will be better for shops and everyone," said Lan Marie Nguyen Berg of the Green party.
While cars will be banned from the city centre, buses and trams will still be allowed, and "arrangements will be found" so that disabled people aren't exiled and vehicles can still make deliveries to stores. Oslo has a population of about 650,000, and about 350,000 cars.
Completely banning cars from a city centre is a bold move to say the least. Some European cities have flirted with car bans over the last few years—just last month Paris banned cars for a single day, to combat air pollution—and some cities, such as London and parts of Madrid, have congestion charges to reduce the amount of car traffic. Oslo is fairly small as far as capital cities go, though, which probably makes the ban a little more palatable. It's hard to imagine the upheaval that would occur from banning cars in London.
Still, as metropolitan population densities continue to increase, and air pollution stubbornly persists, other small cities may follow in Oslo's footsteps. Larger cities, though, will probably stick with more stringent emissions controls: London, for example, should roll out a new "ultra low emissions zone" in 2020 that will hit diesel and other high-emissions vehicles with an extra surcharge. Eventually, it wouldn't be surprising if megacities completely ban vehicle emissions, requiring all cars to be electric. | {
"pile_set_name": "OpenWebText2"
} |
Lung Cancer Causes You're Exposed to Everyday
If you don’t smoke, you probably don’t spend a lot of time worrying about lung cancer risks. While smoking is the leading cause of lung cancer, it’s not the only one. Radiation oncologist Andrew Nish, MD, UnityPoint Health, explains the lung cancer causes you could be exposed to every day, plus the steps you can take to reduce your risk.
Lung Cancer Causes Without Smoking
Dr. Nish says about 15 percent of lung cancers in men occur in those who have never smoked and the same is true for 20 percent of women with lung cancer. Besides smoking, here are other main causes of lung cancer.
Radon exposure (second most common cause of lung cancer)
Secondhand smoke
Workplace exposure, like asbestos, diesel fumes, etc.
Air pollution, both outdoor and indoor
Chest radiation (if you’ve been treated for another cancer in the chest, such as lymphoma)
“These increase the risk of lung cancer due to exposure to an external chemical or radiation that causes damage to normal cells in the lung, which increases the risk of those cells to divide abnormally resulting in cancer,” Dr. Nish says.
Another environmental exposure in the Midwest is arsenic in ground water. Arsenic gets into the ground water and aquifers naturally from dissolving rocks. It’s recommended all private wells be tested for arsenic. Public water systems are tested and safe from arsenic.
“Almost all lung cancer is from environmental exposure with very few being from direct inheritance of a genetic mutation. Direct genetic inheritance of lung cancer risk is actually quite rare. The development of family lung cancer involves shared environmental and genetic factors among family members. Bottom line, the vast majority of lung cancers are due to environmental exposure,” Dr. Nish says.
Radon and Lung Cancer
Radon is a naturally occurring odorless, colorless radioactive gas that forms from the decay of uranium in the soil and rocks in the ground. Dr. Nish says all Midwestern states have relatively high levels of radon. For example, in Iowa, 7 out of ten homes exceed the United States Environmental Protection Agency’s (EPA) radon action level of 4 pCi/L. Iowa leads the nation as far as the percentage of homes that exceed 4pCi/L.
“Even though you may not spend a lot of time in your basement, you should be concerned about radon, as it will spread throughout your house. Radon seeps in from the ground and through cracks in the foundation, around pipes and in sump pits. Once in the house, it will spread, resulting in exposure to you and your family,” Dr. Nish says.
Testing for radon is the only way to detect radon, as there are no symptoms of radon exposure. Organizations, like the EPA and American Lung Association, recommend testing your home for radon levels. If radon levels are more than 4 pCi/L, then a mitigation system should be installed. For levels between 2 and 4 pCi/L, you should consider installing a mitigation system.
Secondhand Smoke Tied to Lung Cancer
There is no safe level of exposure to secondhand smoke. Even brief exposure can be harmful. Secondhand smoke will start taking a toll on your body immediately.
“All secondhand smoke is equally harmful. It doesn’t make any difference whether it came from a cigarette, pipe or cigar. All sources of secondhand smoke carry the same risks,” Dr. Nish says.
Research on secondhand smoke from vaping is less certain than for tobacco, but at this time, it’s thought the chemicals released from vaping may be just as harmful as those from tobacco.
Dr. Nish also says there are greater risks associated with secondhand smoke in pregnant women and children. Exposure to secondhand smoke during pregnancy can increase the risk of miscarriage, low birth weight babies, premature birth, learning and behavioral abnormalities in the child and sudden infant death in the infant. Secondhand smoke harms older children as well.
“Children exposed to secondhand smoke have more episodes of pneumonia, bronchitis, wheezing and cough and more ear infections, plus [secondhand smoke] can worsen existing asthma and can cause new cases of asthma,” Dr. Nish says.
Top Signs of Lung Cancer
Dr. Nish says the signs and symptoms of lung cancer are the same whether you are a smoker or not. The top signs of lung cancer include:
Eat an anti-inflammatory diet. Emphasize six to nine servings of fruits and vegetables. This allows the body to more readily fix damage done to lungs, as well as protects against infections.
Learn to manage stress, and sleep more. As an adult, getting eight hours of good sleep each night is important. This and stress management help our immune systems better fight off infections and eliminate cancers before they become obvious. | {
"pile_set_name": "Pile-CC"
} |
As we’ve been following the media coverage of the Trayvon Martin shooting and its aftermath one fact stands clear: the press has no frickin’ clue what a “stand your ground” (SYG) law actually means. Here’s Michigan’s version: “An individual who has not or is not engaged in the commission of a crime at the time he or she uses deadly force may use deadly force against another individual anywhere he or she has the legal right to be with no duty to retreat if either of the following applies . . .
a) The individual honestly and reasonably believes that the use of deadly force is necessary to prevent the imminent death of or imminent great bodily harm to himself or herself or to another individual. (b) The individual honestly and reasonably believes that the use of deadly force is necessary to prevent the imminent sexual assault of himself or herself or of another individual. (2) An individual who has not or is not engaged in the commission of a crime at the time he or she uses force other than deadly force may use force other than deadly force against another individual anywhere he or she has the legal right to be with no duty to retreat if he or she honestly and reasonably believes that the use of that force is necessary to defend himself or herself or another individual from the imminent unlawful use of force by another individual.
According to the media, all you have to do is think someone’s trying to kill you to kill them. Uh, no. Here are three important quotes from the law to keep in mind.
1. “An individual who has not or is not engaged in the commission of a crime . . .”
Folks, it’s a crime to assault someone. If a citizen like, say, George Martin assaulted someone like, say, Trayvon Martin, then he is committing a crime. Then the stand your ground law does not apply.
2. “The individual honestly and reasonably believes that the use of deadly force is necessary . . .”
The media loves the bit about “honestly”; they believe Stand Your Ground laws allow stupid people to use lethal force if they’re stupid enough to think they or other innocent people are about to be killed, grievously harmed, raped or generally messed with. Not true. Honestly, “honestly” is not the critical word. That word is “reasonably.”
In order for a person to “reasonably” believe that they or another innocent person are facing a life-or-limb or sexually invasive attack, the attack must meet three well-established criteria: ability, opportunity and jeopardy (AOJ). The bad guy must have the ability to harm them (e.g., holding a weapon), the opportunity to do so (e.g. they’re within striking distance) and threat must be imminent (in the process of happening).
If AOJ ain’t in play, using lethal force against another human being is not considered reasonable and is, therefore, illegal. As in murder. Who decides if the AOJ boxes were ticked-off? The legal system. The police, prosecutor, District Attorney, Judge and/or jury.
They must analyze the shooting according to the “reasonable person” test. Would a reasonable person have believed that AOJ was present at the time of the otherwise lethal, limb-destroying or sexually molesting attack? There’s your “honestly believes” bit.
[Remember: this theoretic “reasonable” person is not a moron or someone with no control over their emotions.]
3. ” . . . anywhere he or she has the legal right to be with no duty to retreat . . .”
It may seem like a small point but the “legal right to be” where you are is an important caveat. If you’re walking down the street (even if you’re following someone), you have the legal right to be there. So you may defend yourself with lethal force if necessary—without being legally obliged to run away—if you’re attacked in an AOJ sort of way.
If, however, you’re in someone’s house without their permission like, say, a burglar, you do NOT have the right to use lethal force against an attacker. Conversely, if someone’s trespassing on your home/business, you are allowed to use lethal force if the AOJ’s green light’s lit.
This is an important change in the law. It removes so-called “criminal rights” during the commission of a crime. It skews any fight—and legal aftermath—in the victim’s favor. Where it belongs.
Clear? Sure it is. So why are so many journalists too lazy to read what is, in fact, a pretty simple law? That’s above my pay grade. But when a legislator doesn’t know WTF he’s talking about, well, that’s just sad.
And here’s the sad truth from the man above: Tim Bledsoe, Grosse Pointe’s man in the Michigan House of Representatives [via freep.com].
I had mostly forgotten this encounter when, several blocks later, I happened to look back and see this man, in his car, following me. He continued to follow until I got home, at which time I confronted him. By this time I was angry. The words we exchanged were heated and unprintable here. He remained adamant of my guilt [of discarding a tossing a bag dog sh1t inappropriately], if perhaps disappointed that I had failed to toss my bag in an incriminating way. I was furious that he was stalking me as though I were a criminal. The incident did not escalate beyond words, but it easily could have. If it had, would he have been justified in pulling a gun and shooting me, claiming his right to “stand his ground,” even if the ground he was standing on was directly in front of my home?
C’mon, really? Escalated how? Does Bledsoe not understand the idea of “life-threatening” or is he just being willfully dense? I’m thinking yes to both . . .
In the aftermath of the Trayvon case in Florida, it is more likely that vigilante justice will happen in the states that have so-called Stand Your Ground laws, Michigan among them. The media coverage of this shooting sends a clear message in these states: If you seek a confrontation and then find yourself physically threatened, you can kill with impunity. There is another way that my incident differs from the case in Florida: As a member of the Michigan House of Representatives, I can seek to change the law and reduce the likelihood of future incidents like this in Michigan. I recently requested the Legislative Service Bureau to prepare a bill repealing the Stand Your Ground law in Michigan. My proposal will not diminish people’s right to protect themselves when they face a threat to their lives or risk serious physical harm. They can defend their homes as their castles. But we should remove any legal ambiguity about people placing themselves directly in the path of another, drawing a line in the sand, and then using deadly force when the line is crossed.
Wow. I’d pay to see this guy meet-up with the NRA lobbyist. Luckily, Michigan residents won’t have to pay for Bledsoe’s ignorance. One hopes. [h/t John Fritz] | {
"pile_set_name": "OpenWebText2"
} |
Pages
Thursday, May 6, 2010
ICICI Bank: Back in Reckoning?
ICICI BANK: (BSE: 532174 | NSE: ICICIBANK)Seems to be back in the reckoning. YoY jump is on low base, but the steady sequential growth hints at again being the heavyweight it once was. No wonder even RBI is encouraging with more time for attaining 70% PCR. But with 67% foreign ownership, and the bank existing as ‘Indian’ only on a proposed RBI exemption, it needs to tread carefully during these times when capital markets worldwide are holding their breath on Goldman Sachs. | {
"pile_set_name": "Pile-CC"
} |
Gastelum ran outside, trying to distract Butler, Reynolds said. Butler followed him and fired a shot but missed again, she said. Butler took about $200 from Reynolds and ran away, she said.
Reynolds said she didn't know Butler at the time of shooting, but later found out that she had bought a motor home from the suspect's sister. Reynolds testified that she was surprised the suspect called her by name in the house.
Butler is charged with robbery, burglary, attempted murder, two counts of assault with a firearm, obstructing a peace officer and a being a felon with a firearm. Court records show that Butler has prior convictions on possession of controlled substance and possession of a firearm.
To subscribe to the Daily Press in print or online, call (760) 241-7755 or click here.
Tomoya Shimura may be reached at tshimura@VVDailyPress.com or (760) 955-5368. | {
"pile_set_name": "Pile-CC"
} |
[Posibility of term pregnancy in patients with chronic kidney disease].
Pregnancy is a physiological process that brings many changes to the mother's body, undergoing a process of adaptation to complications avoid, however, in the context of chronic kidney disease, these become manifest most frequently maternal and fetal impact on morbidity and mortality. A review of the subject is presented, emphasizing aspects that must be present at the time of a patient with this condition, accompanied by one of our cases treated with the sole purpose of gaining a better understanding of the issue and how to address it based on problems at the time of evaluation initial. The case of patient pregnant with chronic kidney disease in stage advanced that required start of replacement therapy in renal function due to uremia and retention fluid in malaise their 20 weeks of gestation, referred late for your attention. However, it was possible to improve you overall condition in all respects, allowing take up to 38 weeks with abdominal delivery via scheduled electively, with favorable results for the newborn exceed the statistics described in these patients. | {
"pile_set_name": "PubMed Abstracts"
} |
The purpose of life, including our human life, is the evolution of consciousness. The aim of our human existence is to become as fully human as possible, to realise or make real the full potential inherent in the human condition. This applies to all levels of being human, to the biological, the emotional as well as the mental level.
Instead of seeing yourself as just a personality with a mind and a body, imagine yourself as part of an individualised life-stream that flows eternally towards increasingly higher levels of consciousness. This life-stream builds itself different personalities as vehicles for its flow of consciousness. You are one of these temporary vehicles. Your personality is temporary, the present cutting edge of your life-stream as perceived in our space-time.
The aim of your life-stream at this level is to develop a vehicle that allows the full expression of your soul suitable for travel beyond the human condition. When this is accomplished, no further personalities are needed. As an ascended being the life-stream can now traverse the trans-human conditions of consciousness.
SPIRITUAL AWAKENING
This evolution of consciousness normally is a slow process and most personalities are not aware that they are part of an evolutionary growth. However, as the personality comes closer to perfection, it does become aware of its purpose and it begins to long for spiritual unfoldment. Before this spiritual awakening, the personality may already have believed in God and followed a religious faith in the traditional way. But there is a difference. In the traditional religious life the believer may try to follow the doctrines of his faith the best he can, but he basically remains on the same slow evolutionary path of consciousness.
With the spiritual awakening, spiritual growth becomes the main focus of this personality. The slow evolutionary process now becomes a spiritual revolution, not only in regard to the speed of the growth of consciousness but also in regard to the overthrow of established values. This spiritual revolution may take place within the confines of an established religion or it may happen outside a religious faith. Within a religion, these awakening spirits will sooner or later come in conflict with established doctrines. They may try to revolutionise or restore their church to its highest ideals and eventually become mystics or saints or martyrs or just start their own church or sect. Most established religions had at best an uneasy relationship with their mystics and (later) saints.
In any way, whether the awakening and subsequent spiritual growth takes place within or without an established religion, the awakening personality will begin to follow the spiritual guidance that comes from within rather than the established rules and doctrines of church and society. Spirituality is no longer something that one does on Sunday mornings or other established times and according to established rules, but rather it becomes the central purpose and focus of life. With this, we may say that the personality is now on the spiritual path.
VARIETIES OF SPIRITUAL PATHS
While the real goal of the spiritual path is the same for all, there are many different roads that one can travel and one may even travel without a road. Also the goal may be described in different terms without always recognising that it is the same goal. This is so because we all have different starting points and different preferences and opportunities. Many spiritual travellers will not expect to reach their goal in their present lifetime, while others may realise that they do not really need to travel anywhere.
Some of the better-defined roads are the different forms of Yoga, the Tao, the Gnostic teachings, the Rosicrucians and various ancient and modern MysterySchools. While the Mystics are generally regarded as a distinct group, they really travelled each on his or her own individual path. At present Ascension teachings through books and channelled guidance attract many followers. These teachings are largely individualised outgrowths from the writings of the Theosophical Society since the end of the nineteenth century.
Looked at from a different perspective, we may say that there are two different approaches that often intermingle in each individual spiritual path. One is the path of the Doer or the Magus, while the other is the path of the Knower or the Mystic. The Doer mainly works in the world as a healer, alchemist or white magician, trying to master the non-physical energies and forces. The Mystic, on the other hand, follows mainly the inner path, seeking Union with the Divine Self and in the process becomes a Knower and a teacher. However, ultimately Knower and Doer both become one.
THE PATH OF THE MYSTICS
The recorded experiences of the many mystics in all religions is of particular interest because we can learn from these what the spiritual path looks like when it is not guided by specific verbal or written teachings. Most of these individuals in past centuries did not know that there was such a thing as a spiritual path and that others had travelled the same or a similar route. They just felt a longing to come closer to God and to feel at one with Him, to melt into Divinity like a drop of water becomes one with the ocean.
Each of them had different experiences and many of them walked only part of the way, but by constructing a composite picture from a large number of their writings we can discern a distinct pattern of the typical mystical path. Few mystics seem to have travelled all of this 'typical' path, but this may be because we can see only one life-time of a multiple-life-time journey. This typical mystical path may best be described as a five-stage journey and we may easily see its relationship to contemporary spiritual practises.
1. The Awakening
The spiritual awakening is the beginning of the mystical path and also of the spiritual path in general. It may be sudden or gradual. Often it comes as an emotionally overwhelming 'mystical experience', possibly ending a period of great emotional torment and suffering. Another frequent setting is during a spiritual initiation ceremony, such as presently during water baptism for 'Born-Again Christians'.
Others may have this awakening experience during an especially intense prayer or meditation or drift gradually onto the path by attending workshops or reading spiritual books. The latter as well as others coming to the path because of philosophical considerations turn out to become like the 'mental mystics' as compared to the 'emotional mystics' who had their mystical experiences mainly at the emotional level.
This initial peak experience may last for hours or days with gradually declining intensity. Commonly it is a combination of deep feelings, such as universal love, with profound spiritual intuition or insight, although depending on the personality traits the emotional or the mental component may dominate. Also psychic phenomena are frequently involved in the form of visions and voices.
2. Purification
After the awakening the individual does not only want to repeat the mystical experience but really wants to live in a permanent state of grace close to God. However, the aspiring mystic realises that he is not yet worthy, he becomes acutely aware of his imperfections, of the impurity of his thoughts and feelings. He starts to cleanse himself of all selfish or impure desires. Commonly this is combined with periods of fasting or food denial. Medieval mystics tended to be very severe with themselves in order to 'mortify' the body and with it the unruly senses and the desires of the flesh. Worldly pursuits no longer hold any interest. Periods of prayer and meditation are greatly extended.
While this process of purification requires strong willpower and causes much self-inflicted pain, it is also increasingly interspersed with beautiful and uplifting mystical experiences that spurn the seeker on to greater sacrifices for the sake of more rapturous experiences. This purification process continues for many years. Instead of turning the spiritual energies released by the awakening experience inward to purify, it may also be directed outwards. These individuals then become religious fanatics and may remain at this level for the rest of their lives.
3. Illumination
After the Self has been sufficiently cleansed or purified and the mind remains fully focused on the presence and the qualities of the Divine, a state of illumination may unexpectedly arise. This will be similar to the experience of awakening but even more intense and longer lasting. Again, it may be predominantly emotional with feelings of indescribable Divine love, being at one with 'All That Is' and combined with visions and voices, or it may be predominantly mental with profound insights and states of pure knowing. Commonly the initial peak experience is combined with perceiving an intense or blinding inner white light.
For many months these deep feelings and insights will keep flowing in, but gradually settle into a state of a permanently raised and more intuitive consciousness. The illuminated mystic will now always remain aware of the Divine presence in everyone and everything and radiate a presence of love and goodwill. Intuitive abilities will be greatly increased. Commonly, one will receive a spiritual gift with the illumination. This may be the ability to heal or to see or to know. By developing this ability one will become a great healer, seer or spiritual teacher.
The perception of mysticism as being incomprehensible to normal, unenlightened humans is due to the fact that most mystical writings were composed by the emotional type of mystics. They focused on emotional states of being and perceived and described their visions and experiences with emotional metaphors that remained incomprehensible to the uninitiated. This is similar to the present descriptions of reality given by quantum physicists.
Life in this state of illumination is easy and full of joy, a permanent state of great happiness and contentment. It is like living in a state of grace that can never be lost again. But sometimes it is being lost.
4. The Dark Night of the Soul
There is a saying that he whom God loves most, will be given the severest tests. This certainly seems to be true of the few mystics who continue to travel further along the spiritual path even after illumination. During the long and difficult purification process the aspiring mystic gave up most of his sense attachments, the pleasure of eating, of sexual union, of bodily comfort and of pleasant company. Instead all the energies were focused only on what was perceived to be transcendental and divine.
But there was still one thing left that had not been surrendered, that is the will, the central part of the Self. To give up the will, the innate instinct for personal happiness had to be surrendered. This is called the 'mystical death' or the spiritual crucifixion. During illumination the mystic seemed to walk hand in hand with God and sunned himself in eternal Divine bliss. This makes the contrast even greater to the feeling of having lost all the former grace and glory and being totally abandoned by God to a life in abject misery.
However, gradually the Self begins to accept total surrender. It gives up itself, its personality and individuality, asks for nothing and desires nothing. Now there is total passivity and acceptance of whatever God has ordained or whatever comes. Now the mystic is finally ready for the last stage of his earthly journey.
5. The Unitive Life
Finally, by giving up everything, the mystic has gained everything. By being completely passive, he is able to be filled with the Divine Spirit. No longer does he experience the strong mood swings between divine bliss and utter desolation, he has now settled into a feeling of constant peaceful and love-filled union with the Divine. However, this is not the goal of his long journey, just a by-product. The real achievement is that the mystic is now an ideal tool or instrument of the Divine Will to be used for manifesting the Great Plan on earth.
While now the mystic still lives in the world, he is no longer of the world. He may be a great reformer, healer, inventor, statesman, educator or spiritual teacher but whatever he does is never for any small or selfish interests, instead it is always for the greater good of All That Is. He now lives a life of service. Whatever he does, he is now a spiritual master, even if that is not always apparent to the outside world. After his passing, he will be an ascended being, not needing to return to earth.
Comments on the Mystical Path
In this description it is easy to draw comparisons to the life of Jesus of Nazareth and see in it a symbolic enactment of the mystical path. The baptism symbolises the spiritual awakening, the 40 days in the desert correspond to the period of purification, followed by illumination (the transfiguration on the mountain) and selfless service in the form of a healing and teaching ministry. The experience on the cross and the events leading up to it are his dark night. While the unitive life is cut short, it is signified by the ascension and the following teaching period in ascended form.
It may also be mentioned that the described states of the mystical path do not necessarily follow one after the other but some may occur simultaneously, such as enlightenment and the dark night of the soul or purification, enlightenment and selfless work. These may coexist or alternate, causing emotional extremes over short periods. Coexistence is possible because we do not need to be perfect to reach illumination and, therefore, continue with our purification on deeper levels.
Furthermore, these extremes and the perceived sufferings are mainly the lot of the emotional type of mystics while the mental type follows a much smoother path. Both have the difficult task of giving up their attachments to gratifying the senses and surrendering their will, it is just that the emotional mystics are so much more sensitive and take things very much to heart. It also must be understood that it is not necessary to give up things, only the attachment to things but that was not always understood by those leading a life of extreme asceticism.
ASCENSION TEACHINGS
The ascension teachings are a New Age phenomenon and largely based on channelled teachings. These started with Madame Blavatsky and led to the foundation of the Theosophical Society late in the nineteenth century. The aim of these teachings is to present a greatly accelerated path to ascension.
Ascension is highlighted as the main aim and achievement of the spiritual path. Ascension means that we are no longer in need of experiences at the human level. For our continuing progress towards higher levels of consciousness we develop a spiritual light body through our ascension work. Presently ascension teachings focus mainly on guided imagery to open, balance and extend the chakra system and build a light body.
A key feature is a system of initiations as a measure of progress on the spiritual path. These initiations are to take place in our higher energy bodies and may or may not be remembered with our normal body consciousness. While there are some variations in the way of counting, the basic requirements for passing the five initiations before ascension may be described as follows.
Spiritual Awakening.
Purifying the body, learning to work with the energies and controlling the etheric body.
Purifying and controlling the emotions as well as developing a higher emotional body.
Purifying and controlling the mind as well as developing a higher mental body.
Submitting the will to Divine Guidance.
Selfless work for the greater good of humanity.
Ascension.
While formerly initiations in the physical body took place in the form of tests and rituals within secret societies, presently they appear to be incorporated as special situations in our normal life. As an example the third initiation requires us to have good control of the mental, emotional and etheric forces. In ancient Egypt an appropriate test might have been for the disciple to demonstrate that he can control an untamed lion with his mind and the lion obeying him. At the slightest sign of fear the lion would kill him.
A modern equivalent might be a diagnosis of advanced and incurable cancer. To overcome this without much outside help, one needs to use the mind constructively to guide the emotions in a positive way, release all negativity, especially be free of the fear of death and also learn to direct the life-force energies as in guided imagery. While only a small percentage of sufferers of advanced incurable diseases may have been given their disease as an initiation test, most of those who did recover from near-terminal conditions reportedly had profound spiritual experiences.
The relationship of the ascension initiations as portrayed above to the divisions of the mystical path are quite obvious. Starting with the spiritual awakening in both, the first three initiations are related to the mystical period of purification. In contrast to the yoga system of purification, which concentrates strongly on controlling the etheric energies, the mystical path does not address the etheric or life-force body directly. However, this level is purified indirectly by removing emotional energy blockages and by learning to control the emotional energies, which in turn direct the etheric life-force energies.
Illumination is the first major initiation and is the result of purifying and learning to control the mind and developing a higher mental body as the requirement for the third initiation. The fourth initiation will be passed after waking from the dark night of the soul and the fifth initiation is the result of the unitive life.
The ascension teachings portray largely a magical or doer path in contrast to the knower-based mystical path. A combination of both may in some ways be easier to follow than either one of them on its own. The severity of the mystical path can be greatly eased and progress speeded up by suitable guided imagery, while the present ascension teachings seem to neglect the purification and control of the emotional and mental bodies that feature so prominently in the mystical path. | {
"pile_set_name": "Pile-CC"
} |
Letter to the editor: Safety, not money, counts
The decision to install a traffic camera should be based on accident report statistics that are dramatically higher than the average, not on finding revenue to replace funding cuts. Cameras should be a last resort.
- Curtis Christiansen, Des Moines
ADVERTISEMENT
Most Popular
Most Commented
More Headlines
Most Viewed
ADVERTISEMENT
ADVERTISEMENT
Email this article
Letter to the editor: Safety, not money, counts
The decision to install a traffic camera should be based on accident report statistics that are dramatically higher than the average, not on finding revenue to replace funding cuts. Cameras should be | {
"pile_set_name": "Pile-CC"
} |
Dolph Aluck Smokehouse
The Dolph Aluck Smokehouse is a stone smokehouse located on the north side of Milford Rd., in Pendleton County, Kentucky near Falmouth. It faces the confluence of the North Fork Licking River and the Licking River. It was listed on the National Register of Historic Places in 1987.
It was built in the mid-1800s and was deemed significant as a "Typical early Kentucky smokehouse in good condition." It is believed to have been built by Dolph Aluck, owner of brick Greek Revival house at the site.
References
Category:Smokehouses
Category:National Register of Historic Places in Pendleton County, Kentucky
Category:Greek Revival architecture in Kentucky | {
"pile_set_name": "Wikipedia (en)"
} |
Two workers at the Georgia Bureau of Investigation were allowed to resign after taking photos of themselves with a murdered teacher’s severed head.
Death investigation specialist Jesse Landen Wilson posed holding the head while graphic designer James Brown took the morbid snap during an examination on the remains of Robert Page last November.
Wilson, who spent six years with the GBI, and Brown, a 25 year veteran, had been told that they would have been fired if they refused to quit of their own accord.
This cropped photo shows Georgia Bureau of Investigation death investigation specialist posing with the severed head of murdered teacher Robert Page (Picture: Channel2)
But the leniency shown to them has infuriated relatives of 76 year-old Page, who police say was killed and dismembered by neighbor Christian Ponce-Martinez, 25, in Atlanta last month. He has been charged with malice murder.
Page’s widow Lena told Channel 2 Action news that she was deeply disturbed to hear about the photo.
BAME people not genetically more at-risk of dying from coronavirus, study says
She said: ‘Why would you allow them to resign when they knew better?
‘Awful that somebody would be that evil.’
And Wilson’s daugter Reba Sanchez added: ‘Resignation is too good.
Murder victim Page pictured with wife Lena. She has branded the GBI staff ‘evil’ for their disrepectful behavior, and has demanded to know why they were given the option to resign (Picture: Channel2)
‘Thats almost like an admission of what you did wasn’t even wrong.
‘You taking pictures, making light of a situation like that, you are just as evil to me as that murderer.’
GBI spokesman confirmed that Wilson and Brown had left the Bureau, and described the photo that was taken as ‘highly inappropriate.’
The Bureau says it has now banned staff members from taking personal photos in the medical examiner’s office. | {
"pile_set_name": "OpenWebText2"
} |
; Joomla! Project
; Copyright (C) 2005 - 2017 Open Source Matters. All rights reserved.
; License GNU General Public License version 2 or later; see LICENSE.txt, see LICENSE.php
; Note : All ini files need to be saved as UTF-8
COM_POSTINSTALL="Post-installation Messages"
COM_POSTINSTALL_BTN_HIDE="Hide this message"
COM_POSTINSTALL_BTN_RESET="Reset Messages"
COM_POSTINSTALL_CONFIGURATION="Post-installation Messages: Options"
COM_POSTINSTALL_LBL_MESSAGES="Post-installation and Upgrade Messages"
COM_POSTINSTALL_LBL_NOMESSAGES_DESC="You have read all the messages."
COM_POSTINSTALL_LBL_NOMESSAGES_TITLE="No Messages"
COM_POSTINSTALL_LBL_RELEASENEWS="Release news <a href="_QQ_"https://www.joomla.org/announcements/release-news.html"_QQ_">from the Joomla! Project</a>"
COM_POSTINSTALL_LBL_SINCEVERSION="Since version %s"
COM_POSTINSTALL_MESSAGES_FOR="Showing messages for"
COM_POSTINSTALL_MESSAGES_TITLE="Post-installation Messages for %s"
COM_POSTINSTALL_XML_DESCRIPTION="Displays post-installation and post-upgrade messages for Joomla and its extensions."
| {
"pile_set_name": "Github"
} |
320 F.3d 691
UNITED STATES of America, Plaintiff-Appellee, Cross-Appellant,v.John SERPICO and Gilbert Cataldo, Defendants-Appellants, Cross-Appellees.
No. 02-1702.
No. 02-1726.
No. 02-1925.
United States Court of Appeals, Seventh Circuit.
Argued October 31, 2002.
Decided February 20, 2003.
COPYRIGHT MATERIAL OMITTED David A. Glockner (argued), Office of U.S. Attorney, Crim. Div., Chicago, IL, for U.S.
Matthias A. Lydon (argued), Winston & Strawn, Chicago, IL, for John Serpico.
Jeffrey Schulman (argued), Wolin & Rosen, Chicago, IL, Donald Hubert, Hubert, Fowler & Quinn, Chicago, IL, for Gilbert Cataldo.
Before RIPPLE, MANION, and EVANS, Circuit Judges.
TERENCE T. EVANS, Circuit Judge.
1
For 12 years, John Serpico and Maria Busillo held and abused various influential positions with the Central States Joint Board ("CSJB"), a labor organization that provides support to its member unions. Among other responsibilities, Serpico and Busillo controlled the management of the unions' money. The pair, along with longtime friend and business associate Gilbert Cataldo, collaborated on three schemes involving the misappropriation of the unions' funds. Two of those schemes are the focus of this appeal by Serpico and Cataldo (Busillo has not appealed her conviction).
2
In their "loans-for-deposits" scheme, Serpico and Busillo deposited large sums of union money in various banks. In exchange, the two received overly generous terms and conditions on personal loans totaling more than $5 million. In the more complicated hotel loan kickback scheme, several groups entered into the 51 Associates Limited Partnership, which planned to construct a hotel. The partnership was unable to obtain financing for the construction of the building without first securing a commitment for a mortgage loan that would guarantee repayment of the construction loan after the hotel was built. Serpico used union funds to make a mortgage loan to the developers, after which Mid-City Bank agreed to make the construction loan. In exchange for Serpico's help in securing the loan, 51 Associates paid $333,850 to Cataldo's corporation, Taylor West & Company, for "consulting services" that Cataldo never actually performed. Cataldo then kicked back $25,000 to Serpico by paying Serpico's share of a $50,000 investment into an unrelated business project (the Studio Network project) in which the two were partners.
3
Serpico, Busillo, and Cataldo were tried on charges of racketeering, mail fraud, and bank fraud. At the close of the evidence, the court granted motions by Serpico and Busillo for acquittal on the racketeering and bank fraud counts. The jury convicted Serpico and Busillo on mail fraud charges relating to the loans-for-deposits scheme and Serpico and Cataldo on mail fraud charges for the hotel loan kickback scheme.
4
At sentencing, the district court determined that Serpico and Cataldo were each responsible for a loss of $333,850, the amount paid to Cataldo, for the hotel loan kickback scheme. For the loans-for-deposits scheme, the court found the damage to the unions to be equal to the additional amount of interest the union assets would have earned had Serpico purchased CDs at banks offering the highest interest rates instead of those offering him special deals on his personal loans. The court totaled loans from Capitol Bank as well as six others, estimating the loss to be between $30,000 and $70,000. The court thus increased Serpico's base offense level of 6 by 9 levels, plus 2 levels for more than minimal planning and 2 levels for abuse of trust (19 total). Serpico and Cataldo were sentenced to 30 and 21 months in prison, respectively.
5
Serpico and Cataldo (collectively "Serpico" as we go forward) appeal, challenging the verdicts and the application of the sentencing guidelines on a number of grounds. In its cross-appeal, the government also contests the application of the sentencing guidelines.
6
First, Serpico argues that his convictions should be overturned because his schemes did not "affect" a financial institution. The 5-year statute of limitations for mail and wire fraud offenses under 18 U.S.C. § 3282 is extended to 10 years "if the offense affects a financial institution," 18 U.S.C. § 3293(2), and Serpico could not have been prosecuted without that extension. Serpico claims that an offense only "affects a financial institution" if the offense has a direct negative impact on the institution. The district court instructed the jury that the schemes affected the banks if they "exposed the financial institution[s] to a new or increased risk of loss. A financial institution need not have actually suffered a loss in order to have been affected by the scheme."
7
Although Serpico agreed to the jury instruction, he now points to United States v. Agne, 214 F.3d 47, 53 (1st Cir.2000) and United States v. Ubakanma, 215 F.3d 421, 426 (4th Cir.2000), to support his claim that the financial institution must suffer an actual loss. In Agne, however, the court found that the bank "experienced no realistic prospect of loss," so it did not have to reach the question of whether the bank must suffer an actual loss. Agne, 214 F.3d at 53. Similarly, Ubakanma simply held that "a wire fraud offense under section 1343 `affected' a financial institution only if the institution itself were victimized by the fraud, as opposed to the scheme's mere utilization of the financial institution in the transfer of funds." Ubakanma, 215 F.3d at 426. Neither side here argues that "mere utilization" is sufficient; the question is whether an increased risk of loss is enough, even if the institution never suffers an actual loss.
8
Several courts, including this one and the Fourth Circuit, which produced Ubakanma, have concluded that an increased risk of loss is sufficient in similar contexts. See, e.g., United States v. Longfellow, 43 F.3d 318, 324 (7th Cir.1994) (quoting United States v. Hord, 6 F.3d 276, 282 (5th Cir.1993) ("risk of loss, not just loss itself, supports conviction" for bank fraud)); United States v. Colton, 231 F.3d 890, 907 (4th Cir.2000); see also Pattern Criminal Federal Jury Instructions for the Seventh Circuit (1990), p. 217 (The mail interstate carrier wire fraud statute "can be violated whether or not there is any [loss or damage to the victim of the crime] [or] [gain to the defendant].").
9
More importantly, the whole purpose of § 3293(2) is to protect financial institutions, a goal it tries to accomplish in large part by deterring would-be criminals from including financial institutions in their schemes. Just as society punishes someone who recklessly fires a gun, whether or not he hits anyone, protection for financial institutions is much more effective if there's a cost to putting those institutions at risk, whether or not there is actual harm. Accordingly, we find no error in the district court's jury instruction.
10
Serpico next argues that, even if the district court correctly interpreted § 3292(2), his schemes did not "affect" a financial institution because they did not create increased risks for the banks involved in the schemes. Essentially, Serpico claims that the banks in both schemes were willing participants who would not have chosen to participate unless it was in their best interests (that is, factoring in the risks, they expected to make money on the deals). But the mere fact that participation in a scheme is in a bank's best interest does not necessarily mean that it is not exposed to additional risks and is not "affected," as shown clearly by the various banks' dealings with Serpico.
11
For example, the hotel loan kickback scheme affected Mid-City even though Mid-City believed it would make money on the deal. Mid-City made a $6.5 million construction loan, one it obviously would not have made if it believed the risks associated with the loan outweighed the expected payoff. But the loan, as all loans do, did carry some risk. Since Mid-City did not want to be a long-term real estate lender, it agreed to the loan only after Serpico misappropriated Midwest Pension Plan ("MPP") funds in making the MPP's $6.5 million end-mortgage loan (which meant that, if all went well, Mid-City would quickly be repaid). Therefore, Mid-City never would have been exposed to the risks of its loan absent Serpico's scheme because it never would have made the loan.
12
Serpico responds that MPP's $6.5 million essentially guaranteed the loan, so there was no risk to Mid-City. But, under the terms of the loan, if the hotel was not completed on time and under budget, the money MPP put up would be returned to it. That would leave Mid-City with a risky long-term loan it didn't want. On top of that, the kickback scheme increased the chances that the project would run into trouble. Certainly a construction project is more likely to be delayed when those running it and putting up the money for it are doing so illegally, making them subject to the disruption of investigation and arrest at any time.
13
The loans-for-deposits scheme shows even more dramatically that a bank can take on higher risk while acting in what it believes to be its own best interests. Banks, including Capitol Bank (which no longer exists as a result of punishments it received after pleading guilty to conspiring with Serpico and Busillo to defraud the CSJB entities), decided the benefits from the deposits made it worth the risk of loss resulting from the generous terms and conditions of the loans it gave Serpico. But the fact remained that the bank made risky loans at low interest rates that it never would have made absent the scheme.
14
In fact, at trial, Serpico's counsel told the court that "if the defendants were convicted of a loans-for-deposits scheme, that conduct in and of itself would mean that they affected a financial institution" and "I don't know I could conceivably argue that the particular scheme did not affect a financial institution." He now tries two arguments. In addition to arguing that the bank was acting in its own best interest, Serpico claims that a financial institution is not "affected" if it is an active perpetrator in the offense. We find that argument unpersuasive. It is not supported by Ubakanma, as Serpico claims, and we find it hard to understand how a bank that was put out of business as a direct result of the scheme was not "affected," even if it played an active part in the scheme.
15
Next, Serpico argues that he was prejudiced by the admission of evidence relating to various charges on which the district court acquitted him before the case went to the jury. In United States v. Holzer, 840 F.2d 1343, 1349 (7th Cir.1988), we addressed almost this very issue:
16
When, as is often the case (it was here), the jury acquits a defendant of some counts of a multi-count indictment, the defendant is not entitled to a new trial on the counts of which he was convicted, on the theory that the conviction was tainted by evidence, which the jury heard, relating to the counts on which it acquitted.... No rule of evidence is violated by the admission of evidence concerning a crime of which the defendant is acquitted, provided the crime was properly joined to the crime for which he was convicted and the crimes did not have to be severed for purposes of trial. It makes no difference, moreover, whether the jury acquits on some counts or the trial or reviewing court sets aside the conviction.
17
Serpico notes that his case is different in that the admitted evidence here concerned claims that the court dismissed before they reached the jury. Still, the Holzer reasoning applies. No rule of evidence was violated, and the district court did not abuse its discretion in failing to award a new trial to Serpico.
18
We also reject Serpico's claims that his conviction should be overturned or he is entitled to a new trial because there was not sufficient evidence to convict him and that the record does not permit a confident conclusion that Serpico is guilty beyond a reasonable doubt. Given the evidence, the jury reasonably concluded that the $333,850 payment to Cataldo was made in exchange for the loan from Serpico and that some of that $333,850 trickled down to Serpico.
19
Similarly, we reject Cataldo's claim that the district court abused its discretion in denying his severance motion. To succeed, Cataldo must show that he was "unable to obtain a fair trial, not merely that a separate trial would have offered [him] a better chance of acquittal." United States v. Bruce, 109 F.3d 323, 327 (7th Cir.1997). Cataldo claims he should have been tried separately because there was a gross disparity in the evidence presented against him and his co-defendants. But a "simple `disparity in the evidence' will not suffice to support a motion for severance," United States v. Caliendo, 910 F.2d 429, 438 (7th Cir.1990). Moreover, the trial court instructed the jury to consider the evidence against each defendant individually, and juries are presumed to be capable of following such limiting instructions. United States v. Williams, 858 F.2d 1218, 1225 (7th Cir.1988). Because there is no reason the jury here could not follow that instruction, the district court did not abuse its discretion in denying Cataldo's motion.
20
Finally, both Serpico and the government challenge the district court's application of the sentencing guidelines. Serpico challenges the calculation of the loss from both schemes. With regards to the hotel loan kickback scheme, Serpico claims that the union entities suffered no loss because the loan was repaid (the district court found the loss attributable to both defendants to be $333,850, the amount paid to Cataldo). But Serpico's theory fails to consider the fact that, although none of the $6.5 million was lost, more money could have been earned. Obviously, the 51 Associates partnership was willing to pay (and did pay) an extra $333,850 in order to secure the loan. That money could have gone to the union entities instead of Cataldo if Serpico had been acting in the entities' best interests instead of his own. See generally United States v. Briscoe, 65 F.3d 576, 589 (7th Cir.1995) (kickbacks "represent money that should have gone to the Union" and, as such, were properly included in the loss calculation).
21
We also reject Serpico's alternative argument that he (individually, as opposed to with Cataldo) should only be accountable for the $25,000 that Cataldo kicked back to him. Serpico and Cataldo are each accountable for "all reasonably foreseeable acts and omissions of others in furtherance of the jointly undertaken criminal activity." USSG § 1B1.3(a)(1)(B). Since Serpico knew money was going to be paid back to Cataldo for work he never did, the district court correctly held him responsible for the full $333,850 loss.
22
Serpico also argues that, in computing the losses from the loans-for-deposits scheme, the district court should not have included losses arising from CD purchases from banks other than Capitol because the court did not have sufficient evidence to support a conclusion that the scheme extended to those banks. But the 12-year pattern of union deposits into banks from which Serpico simultaneously sought personal loans, combined with documents from Gladstone-Norwood Bank and Exchange Bank suggesting that loans were approved in order to secure union deposits, presented sufficient evidence.
23
In its cross-appeal, the government first claims the district court applied the wrong offense guideline. The district court calculated the defendants' sentences under § 2F1.1 (the fraud guideline), but the government argues it should have applied § 2E5.1 (the benefit plan bribery guideline) during sentencing. We review the district court's selection of the applicable guideline section de novo. United States v. Dion, 32 F.3d 1147, 1148 (7th Cir.1994).
24
Clearly, the government wants it both ways; having chosen to prosecute Serpico under the mail fraud statute, it wants him sentenced based on bribery. As unjust as this practice might seem in a case like this (Serpico essentially would be sentenced for a crime, bribery, he could not have been charged with because the statute of limitations had run), the guidelines not only allow but even encourage this scheme, which someone could argue is a little like an old bait-and-switch. Under § 1B1.2(a), however, the district court is instructed to "[d]etermine the offense guideline section in Chapter Two (Offense Conduct) applicable to the offense of conviction (i.e., the offense conduct charged in the count of the indictment or information of which the defendant was convicted)." USSG § 1B1.2(a) (1990). The commentary to that section elaborates: "When a particular statute proscribes a variety of conduct that might constitute the subject of different offense guidelines, the court will determine which guideline section applies based upon the nature of the offense conduct charged in the count of which the defendant was convicted." § 1B1.2, comment. (n.1). In other words, as in United States v. Hauptman, 111 F.3d 48 (7th Cir. 1997), the sentencing judge should endeavor to locate the "essence" of the defendant's conduct, not merely the name attached to the statute violated.
25
Therefore, § 1B1.2(a) encourages the district court to find an appropriate guideline section to fit the conduct (not just the charge). Section 2F1.1 of the 1990 guidelines, under which Serpico was convicted and sentenced, notes:
26
[T]he mail or wire fraud statutes, or other relatively broad statutes, are used primarily as jurisdictional bases for the prosecution of other offenses.... Where the indictment or information setting forth the count of conviction (or a stipulation as described in § 1B1.2(a)) establishes an offense more aptly covered by another guideline, apply that guideline rather than § 2F1.1.
27
§ 2F1.1, comment. (n.13).
28
The indictment charged that Serpico "sought and received a substantial personal benefit and kickback in exchange for influencing" the MPP to provide the $6.5 million loan, which is closer to bribery than mail fraud (in § 2E5.1, a "bribe" is "the offer or acceptance of an unlawful payment with the specific understanding that it will corruptly affect an official action of the recipient." § 2E5.1, comment. (n.1)). Similarly, the loans-for-deposits scheme was basic bribery, with Serpico promising union deposits to the banks in exchange for favorable personal loans. Therefore, the district court should have sentenced Serpico and Cataldo under § 2E5.1.
29
Finally, the government argues that the district court erred by failing to consider the approximately $475,000 that Serpico derived from the loans-for-deposits scheme through his investment in Studio Network. The government argues that it showed that Serpico invested $25,000 in the partnership in 1983, then sold his share 5 years later for $500,000. The government claims that the district court should have used Serpico's gain as an alternative measure of loss under § 2F1.1 (which also would be used under § 2E5.1). See § 2F1.1, comment. (n.8) ("The offender's gain from committing the fraud is an alternative estimate that ordinarily will underestimate the loss.").
30
We have interpreted § 2F1.1 of the 1990 guidelines to require that the amount of loss be based on "the net detriment to the victim." See United States v. Mount, 966 F.2d 262, 265. Therefore, the defendant's gain should only be used when the loss to the victim cannot be reasonably estimated (as the 2001 guidelines make clear: "The court shall use the gain that resulted from the offense as an alternative measure of loss only if there is a loss but it reasonably cannot be determined."), § 2B1.1, comment. (n.2(B)). The district court reasonably estimated the loss from the loans-for-deposits to be equal to the additional amount the union entities could have earned at banks offering more favorable rates on CDs. To use the $475,000 that Serpico earned suggests that the unions would have received an astounding 1,900 percent return on their investments, a wholly unsubstantiated claim.
31
To summarize: We affirm the convictions and the loss calculations but remand for sentencing under § 2E5.1.
32
AFFIRMED IN PART, REVERSED IN PART, AND REMANDED.
| {
"pile_set_name": "FreeLaw"
} |
Wow - there are some truly amazing photos in this thread..if you like to shoot birds but are not familiar with their name (proper or otherwise) try using http://www.whatbird.com it has an excellent built in wizard
Here's a few I shot over the past 6 months - all photos shot in the wild - no zoo or otherwise with 7D + 400mm hand held:
Belted Kingfisher (difficult to capture..you get anywhere near these birds they fly about 100 yards away. You go that direction they revert back to original starting point. I had to creep up and hide to nab this one..oh the fun!
munsoned
I took the following at Great Falls National Park, Virginia side. A lot of stalking went into taking these photos. I found this really awesome spot that gave me all 3 of these pictures and more. Shot with canon 5D II and 100-400 L.
I wish I knew why a sparrow will sit on a bird feeder for half an hour, but a cardinal won't stay more than half a minute.
When I saw him, he and his female mate were both right there perfectly positioned. While I grabbed the camera and changed lenses, Mrs. Cardinal took off. This was the only shot I got with the whole bird in the frame and in focus.
Now every time it snows I stalk back and forth past this window, but no more luck since then. | {
"pile_set_name": "Pile-CC"
} |
By Michael Heilman
The Lehigh Valley Phantoms headed to the Adirondack Bank Center at the Utica Memorial Auditorium to take on the Utica Comets Friday night.
A minute and seven seconds into the first period, a goalie interference call against Phantoms defenseman Reece Wilcox sent the Comets on the power play. Forty seconds later, the Comets took a 1-0 lead on a power-play goal by former Phantom Justin Bailey (14) with an assist from Brogan Rafferty (28). Less than two minutes later, Justin Bailey (15) scored his second goal of the game to extend the Comets lead 2-0 with assists from Nikolay Goldobin (18) and Kole Lind (21). After Bailey’s second goal, the Phantoms substituted Alex Lyon for Jean Francois-Berube.
After the goalie change, the Phantoms cut the Comets lead 2-1 on a goal by Connor Bunnaman (4) with assists from Chris Bigras (6) and Isaac Ratcliffe (5). The Phantoms came to life after Bunnaman’s goal. After a hard-fought battle by the Phantoms, the Comets added another goal this time by Reid Boucher (22) to make it a 3-1 Comets lead with assists from Sven Baertschi (24) and Olli Juolevi (14). The Phantoms answered back with a shorthand goal by Mikhail Vorobyev (6), his first game back with the Phantoms. The Utica Comets led 3-2 at the end of the first period.
Twenty-five seconds into the second period, the Comets extended their lead 4-2 on a goal by Jonah Gadjovich (8) with an assist from Ashton Sautner (7). The Phantoms were doing all they could do to get back into the game. Late into the second period, Justin Bailey (16) would complete the hat trick goal with assists from Nikolay Goldobin (19) and Kole Lind (22) to give the Comets a 5-2 lead at the end of the second period. Bailey has been on fire this season and could get called up to the Vancouver Canucks.
The Phantoms were creating opportunities in the third period with fourteen shots on goal but could not find a way to put the puck into the net. The Utica Comets were playing great hockey and defeated the Lehigh Valley Phantoms 5-2. The Comets are now in first place in the North Division.
The Phantoms had a total of twenty-eight shots on goal, and the Comets had twenty-nine. The Phantoms committed five penalties in the game. Phantoms goalie Alex Lyon was one for three allowing two goals and his replacement Jean Francois-Berube was twenty-three of twenty-six, allowing three goals. Utica Comets goalie Michael DiPietro stopped twenty-six of twenty-eight shots allowing two goals.
The three stars of the game were Comets right-winger Kole Lund with two assists, Comets left-winger Reid Boucher with one goal, and Comets right-winger Justin Bailey with three goals.
The Phantoms return home to the PPL Center for two games Saturday night against the Laval Rocket at 7:05 and Sunday against the Cleveland Monsters at 3:05 pm. | {
"pile_set_name": "OpenWebText2"
} |
This 1993 Nissan Skyline R33 GTS25-T Type M has just arrived to our showroom and looks absolutely beautiful. The Super Black (KH3) exterior has been lightly modified and is has been very well maintained. A super rare Trial front bumper replaces the OEM piece and helps create a more aggressive looking front end. The OEM Type M optional Side Skirts are present and flow well with the Trial front bumper and Knight Racer rear spats which are a bit more aggressive than the stock pieces. The body is in beautiful condition with no major dings or dents and the paint is just stunning. The GTR rear wing really improves the rear of the car and continues the slightly more aggressive feel of this beautiful R33. Finally a set of 18" Monoblock wheels have been added and contrast the black exterior perfectly.
The interior has also received several upgrades and is in great condition. You will first notice a set set of gauges have been added to keep an eye on engine stats. These include Boost, Oil Pressure, Coolant Temp, and Oil Temp by Auto Gauge. The dash itself is in great condition and has no major sun damage, cracks, or bubbles. An aftermarket steering wheel has been added along with a Razo shift knob. The door panels are very clean and the fabric inserts are in great shape. There is on small tear on the lower right part of the drivers door panel which in not noticeable when the door is closed. The seats are all in fantastic condition and have no major stains. The trunk panels have been previously removed, but the OEM strut bar and OEM floor mats are included.
Mechanically the RB25DET starts right away and idles smoothly. Exhaust tone has been much improved thanks to a stainless Reinhard Takumi Catback, and a M's air intake lets the engine breathe a bit easier. Shifts through the 5 speed transmission are smooth without any grinds. It's clear the engine is healthy with just 114k original miles. Boost comes on strong and pulls hard throughout the RPM range and sounds great doing it! This R33 has received the following since arriving to our shop: 4 brand new tires, new spark plugs, new fuel filters and fresh oil change. It's ready to drive home today! | {
"pile_set_name": "Pile-CC"
} |
Anybody have any thoughts on how the economy will effect us this year.People can't afford to go far from home over the summer wonder if it will boost sales for local events.I know movie ticket sales are up our little up town concert thingy is packed.A friend of mine does the events for Carolina Harley Davidson she says they have big turnouts for bike nights,bbqs,poker runs and this weekend they are hosting something for speed week and the turnout looks good.Will any of you change ticket prices offer deals or coupons?I was thinking of offering a season ticket so the customers can come as many times as they like and of course they will bring friends each time they come mo $$ for me. What about more advertising to help bump up sales or just do same as always and hope for the best.I myself believe this will be a big year for local events.What are your thoughts on this?
Jim Warfield
05-23-2010, 04:28 PM
Will your business be set up in time to take Euros as payment? Or maybe Eros?
Blame it on the Greeks? Eros was Greek.
SO many things can influence our ticket sales.
?????????
I feel our admission price is a bargain at $12.oo If some people don't feel that way..let them eat cake,
From the three-day old bakery!
bhays
05-23-2010, 08:01 PM
Last year was our biggest ever and with a slight uptick in the economy since last season, I am hoping for some really great things. In a down economy entertainment always prospers... I think it will be an outstanding season.
To be more specific, I expect to see the same trend from last year, those major market haunts who have already peaked in their markets should hold their own and those us in expanding markets or who haven't maxed out our markets should see some nice growth.
JamBam
05-24-2010, 11:07 AM
Last year we broke the paid attendance record from the previous year in the last hour. Despite the fact that I didn't finish a ton of marketing because of our twin girls being born eleven weeks early on Sept 11. They are doing great by the way.
I am already doing some marketing on myspace and facebook. We have gone from 400 to 2000 friends on myspace and have the FB fan page just starting to build.
We are half way through our changes for the year and have a huge increase for the 2010 goal.
Indiana unemployment is at 10% but the economy is picking up in the area. The GM plant I work at just added 900 workers for a third shift of production and the real estate market is jumping. People are starting to spend money again!!!
P.S. Aren't these the two cutest babies you have ever seen. Good thing they look like mom. LOL | {
"pile_set_name": "Pile-CC"
} |
Digikirjojen voi sanoa viime vuonna lyöneen itsensä läpi. Sähköisten julkaisujen osuus kustantajien myynnistä on vuodesta 2012 lähes tuplaantunut. (Suomen kustannusyhdistys) (siirryt toiseen palveluun)
Jyväskyläläisen Atenan kustantajan Ville Rauvolan mielestä kasvu on tapahtunut taskukirjojen eli pokkareiden kustannuksella.
Taskukirjojen myynti on ollut vuotta 2016 lukuun ottamatta usean vuoden ajan selvässä laskussa. Vuosi 2016 oli huippuvuosi, jolloin pokkarimyynnin arvo oli 7,1 miljoonaa. Usean vuoden sitä ennen myynti laski, ja viime vuonna pokkareiden kokonaismyyntiä oli noin 5,6 miljoonaa. (Suomen Kustannusyhdistys) (siirryt toiseen palveluun)
Kaikki Suomessa julkaistut e-kirjat eivät päädy kirjastoon. AOP
– Myös valikoima on kaventunut. Se on harmi, koska pokkarit ovat älyttömän kätevä formaatti esimerkiksi lomaillessa, Rauvola sanoo.
Pokkareita eli taskukirjoja ovat pehmeäkantiset kirjat, mutta sarjakuvakirjoja niihin ei lueta kuuluviksi. Kovakantinen kirja on sidottu (sid.) ja pehmeäkantinen nidottu (nid.).
Samaa laskua pokkareiden myynnissä on näkyvissä tänäkin vuonna, mutta Kirjakauppaliiton toimitusjohtaja Laura Karlsson muistuttaa, että kirja-alalla vuosi on vasta alussa, koska myynti keskittyy vahvasti loppuvuoteen.
– Kesäkin on vasta edessä ja loma-aikoina pokkareita luetaan paljon.
Äänikirjat tuovat uusia lukijoita
Suurista kustantajista esimerkiksi Otavassa pokkareiden myynnin lasku ja valikoiman kaventuminen eivät näy: pikemminkin myynti kasvoi viime vuonna.
– Valikoimallekaan ei ole mitään radikaalia tapahtunut. Pokkari tehdään usein kirjasta, joka on menestynyt kovakantisena hyvin. Myös elokuvat ja sarjat näkyvät pokkareiden myynnissä – ne saavat ikään kuin uuden elämän, myyntijohtaja Nona Ratia sanoo.
Se on harmi, koska pokkarit ovat älyttömän kätevä formaatti esimerkiksi lomaillessa. Kustantaja Ville Rauvola
Pokkareiden uhkana Ratia ei digikirjoja näe: pikemminkin sähköiset muodot, etenkin äänikirjat ovat tuoneet uusia lukijoita. Samaa sanoo Atenan kustantaja Ville Rauvola:
– Meillekin tulee palautetta, että ihmiset, jotka eivät ole koskaan lukeneet yhtään kirjaa, ovat löytäneet äänikirjat.
Nella Nuora / Yle
Rauvolan mukaan digitaalisuus tuo uutta aikaa "lukemiseen" myös jo ennestään paljon lukeville.
– He ovat löytäneet uuden kanavan käyttää kirjoja: esimeriksi kirjojen lukuaikapalvelussa kuunnellaan paljon äänikirjoja, jotka eivät vaadi riippukeinussa istumista ja aktiivista lukemista, vaan silloin voi olla lenkillä tai ajaa autoa.
Rauvola uskoo, että digitaaliset kirjat siivittävät koko kirja-alan kokonaiskasvua.
Otavan sähköiset tuotteet kasvoivat viime vuonna paljon prosentuaalisesti, mutta euromääräisesti osuus myynnistä ei ole vieläkään kovin suuri.
Koko maassakin kustantajien yli 250 miljoonan euron jälleenmyynnistä sdigitaalisten julkaisujen osuus on vain vajaat 35 miljoonaa euroa. (Suomen Kustannusyhdistys) (siirryt toiseen palveluun)
Sähköisten julkaisujen luvussa on mukana esimerkiksi tietokantoja, joilla ei tavalliselle kuluttajalle ole juuri merkitystä. Ammatillisten digikirjastojen osuus on noin 21 miljoonaa euroa, kun kaunokirjallisuuden ja lasten kirjojen osuus myynnistä on vain noin neljä miljoonaa.
Kirjojen kokonaismarkkina, jossa kirjakaupatkin ovat mukana, on noin puoli miljardia. (Tilastokeskus)
Muutama vuosi sitten konmaritettiin, nyt ihmiset haluavat kehittää siivota ja järjestää päätään. Kustantaja Ville Rauvola
Ratian mukaan esimerkiksi neljä vuotta sitten myytiin vielä cd-muotoisia äänikirjoja runsaasti, mutta kovasta kasvusta huolimatta ladattavat äänikirjat eivät viime vuonna yltäneet edes samoihin lukuihin.
– Enää cd-kirjoja ei edes tehdä, vaan sekä ääni- että sähköiset kirjat ovat kaikki ladattavia.
Kirjojen myynti kasvussa
Kokonaisuudessaan kirjojen myynti kääntyi viime vuonna usean vaikean vuoden jälkeen nousuun. Viime vuonna yleisen kirjallisuuden kustantajien jälleenmyynnissä mitattiin noin kolmen prosentin kasvua (siirryt toiseen palveluun). Erityisesti käännetty kaunokirjallisuus oli vahvassa nousussa. (Suomen Kustannusyhdistys)
Vuonna 2016 kustantajien kirjojen kokonaismyyntiä siivittävät oppikirjat: muuttuneet opetussuunnitelmat lisäsivät oppikirjojen myyntiä liki 15 prosenttia. Samaan aikaan yleisen kirjallisuuden myynti oli kolme prosenttia miinuksella.
– Viime vuonna myynnin kasvu oli niin sanotusta aitoa, koska yleisenkin kirjallisuuden myynti nousi kolme prosenttia, kokonaisuudessaan myynti kasvoi yli 13 prosenttia (siirryt toiseen palveluun), Suomen Kustannusyhdistyksen johtaja Sakari Laiho sanoo.
Viime vuonna oppikirjojen osuus kaikista kustantajien jälleenmyydyistä kirjoista oli 41 prosenttia, tietokirjojen 32,3 prosenttia ja kaunokirjallisuuden 13,9 prosenttia. (Suomen Kustannusyhdistys)
Siivouksesta pään järjestelyyn
Tietokirjojen hyvä myynti on yksi syy, miksi jyväskyläläisessä kustantamossa viime vuodet ovat olleet selvästi parempia kuin alalla keskimäärin. Atenalla on ollut menestyneitä tietokirjoja, ja niitä siivittää kustantaja Ville Rauvolan mukaan "elämäntaitokirjojen kestävä trendi."
– Muutama vuosi sitten konmaritettiin, nyt ihmiset haluavat kehittää siivota ja järjestää päätään.
Jyväskyläläiskustantamossa tämän vuoden hitti on itsetuntemus- ja ihmistuntemuskirja Thomas Eriksonin Idiootit ympärilläni, jota on myyty jo tähän mennessä tietokirjalle huima määrä: 20 000 kappaletta.
– Elämäntaitokirjojen rinnalle ja tilalle syntyy kuitenkin koko ajan myös uusia ilmiöitä. Pari vuotta sitten keittokirjat olivat nosteessa, samoin esimerkiksi aikuisten värityskirjat, Rauvola sanoo.
Kirjakauppaliiton Laura Karlssonin mukaan elämäntaitokirjat ovat keikkuneet Suomi lukee -listoilla pitkään.
– Kirjoja on tullut vieläkin julki useita ja ne ovat olleet kysyttyjä.
Vaikka elämän tavaroiden järjestyshuumassa kirjoja on hävitetty kotihyllyistä, lukeminen ei ole hiipunut. Jonkinlainen kahtiajako kirjojen "kulutukseen" on kuitenkin tullut.
– Toisaalta kirjallisuutta kulutetaan eli sitä luetaan, mutta sitä ei välttämättä haluta säilyttää. Sitten on toinen ryhmä ihmisiä, jotka haluavat kirjan myös esineenä omaan hyllyynsä, Rauvola sanoo.
Tästä vuodesta Karlsson odottaa hyvää, sillä kirjamyynti noudattaa enimmäkseen yleistä taloustilannetta.
– Kuluttajien luottamus talouteen on kuluttajabarometrin mukaan ennätyskorkealla. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Device Token - Apple push Notification Service
is device token changes each time when i opens my application?
Apple server uses the same device token every time or the new regenerated device token?
A:
You can check developer documentaion, following is mentioned there -
The form of this phase of token trust ensures that only APNs generates the token which it will later honor, and it can assure itself that a token handed to it by a device is the same token that it previously provisioned for that particular device—and only for that device.
If the user restores backup data to a new device or reinstalls the operating system, the device token changes.
So they are uniques to iPhone until OS is reinstalled.
You can check details here - http://developer.apple.com/library/ios/#documentation/NetworkingInternet/Conceptual/RemoteNotificationsPG/ApplePushService/ApplePushService.html#//apple_ref/doc/uid/TP40008194-CH100-SW12
| {
"pile_set_name": "StackExchange"
} |
// Copyright 2008 The Closure Library Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS-IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
/**
* @fileoverview An alternative custom button renderer that uses even more CSS
* voodoo than the default implementation to render custom buttons with fake
* rounded corners and dimensionality (via a subtle flat shadow on the bottom
* half of the button) without the use of images.
*
* Based on the Custom Buttons 3.1 visual specification, see
* http://go/custombuttons
*
* @author eae@google.com (Emil A Eklund)
* @see ../demos/imagelessbutton.html
*/
goog.provide('goog.ui.ImagelessButtonRenderer');
goog.require('goog.dom.classes');
goog.require('goog.ui.Button');
goog.require('goog.ui.ControlContent');
goog.require('goog.ui.CustomButtonRenderer');
goog.require('goog.ui.INLINE_BLOCK_CLASSNAME');
goog.require('goog.ui.registry');
/**
* Custom renderer for {@link goog.ui.Button}s. Imageless buttons can contain
* almost arbitrary HTML content, will flow like inline elements, but can be
* styled like block-level elements.
*
* @constructor
* @extends {goog.ui.CustomButtonRenderer}
*/
goog.ui.ImagelessButtonRenderer = function() {
goog.ui.CustomButtonRenderer.call(this);
};
goog.inherits(goog.ui.ImagelessButtonRenderer, goog.ui.CustomButtonRenderer);
/**
* The singleton instance of this renderer class.
* @type {goog.ui.ImagelessButtonRenderer?}
* @private
*/
goog.ui.ImagelessButtonRenderer.instance_ = null;
goog.addSingletonGetter(goog.ui.ImagelessButtonRenderer);
/**
* Default CSS class to be applied to the root element of components rendered
* by this renderer.
* @type {string}
*/
goog.ui.ImagelessButtonRenderer.CSS_CLASS =
goog.getCssName('goog-imageless-button');
/**
* Returns the button's contents wrapped in the following DOM structure:
* <div class="goog-inline-block goog-imageless-button">
* <div class="goog-inline-block goog-imageless-button-outer-box">
* <div class="goog-imageless-button-inner-box">
* <div class="goog-imageless-button-pos-box">
* <div class="goog-imageless-button-top-shadow"> </div>
* <div class="goog-imageless-button-content">Contents...</div>
* </div>
* </div>
* </div>
* </div>
* @override
*/
goog.ui.ImagelessButtonRenderer.prototype.createDom;
/** @override */
goog.ui.ImagelessButtonRenderer.prototype.getContentElement = function(
element) {
return /** @type {Element} */ (element && element.firstChild &&
element.firstChild.firstChild &&
element.firstChild.firstChild.firstChild.lastChild);
};
/**
* Takes a text caption or existing DOM structure, and returns the content
* wrapped in a pseudo-rounded-corner box. Creates the following DOM structure:
* <div class="goog-inline-block goog-imageless-button-outer-box">
* <div class="goog-inline-block goog-imageless-button-inner-box">
* <div class="goog-imageless-button-pos">
* <div class="goog-imageless-button-top-shadow"> </div>
* <div class="goog-imageless-button-content">Contents...</div>
* </div>
* </div>
* </div>
* Used by both {@link #createDom} and {@link #decorate}. To be overridden
* by subclasses.
* @param {goog.ui.ControlContent} content Text caption or DOM structure to wrap
* in a box.
* @param {goog.dom.DomHelper} dom DOM helper, used for document interaction.
* @return {Element} Pseudo-rounded-corner box containing the content.
* @override
*/
goog.ui.ImagelessButtonRenderer.prototype.createButton = function(content,
dom) {
var baseClass = this.getCssClass();
var inlineBlock = goog.ui.INLINE_BLOCK_CLASSNAME + ' ';
return dom.createDom('div',
inlineBlock + goog.getCssName(baseClass, 'outer-box'),
dom.createDom('div',
inlineBlock + goog.getCssName(baseClass, 'inner-box'),
dom.createDom('div', goog.getCssName(baseClass, 'pos'),
dom.createDom('div', goog.getCssName(baseClass, 'top-shadow'),
'\u00A0'),
dom.createDom('div', goog.getCssName(baseClass, 'content'),
content))));
};
/**
* Check if the button's element has a box structure.
* @param {goog.ui.Button} button Button instance whose structure is being
* checked.
* @param {Element} element Element of the button.
* @return {boolean} Whether the element has a box structure.
* @protected
* @override
*/
goog.ui.ImagelessButtonRenderer.prototype.hasBoxStructure = function(
button, element) {
var outer = button.getDomHelper().getFirstElementChild(element);
var outerClassName = goog.getCssName(this.getCssClass(), 'outer-box');
if (outer && goog.dom.classes.has(outer, outerClassName)) {
var inner = button.getDomHelper().getFirstElementChild(outer);
var innerClassName = goog.getCssName(this.getCssClass(), 'inner-box');
if (inner && goog.dom.classes.has(inner, innerClassName)) {
var pos = button.getDomHelper().getFirstElementChild(inner);
var posClassName = goog.getCssName(this.getCssClass(), 'pos');
if (pos && goog.dom.classes.has(pos, posClassName)) {
var shadow = button.getDomHelper().getFirstElementChild(pos);
var shadowClassName = goog.getCssName(
this.getCssClass(), 'top-shadow');
if (shadow && goog.dom.classes.has(shadow, shadowClassName)) {
var content = button.getDomHelper().getNextElementSibling(shadow);
var contentClassName = goog.getCssName(
this.getCssClass(), 'content');
if (content && goog.dom.classes.has(content, contentClassName)) {
// We have a proper box structure.
return true;
}
}
}
}
}
return false;
};
/**
* Returns the CSS class to be applied to the root element of components
* rendered using this renderer.
* @return {string} Renderer-specific CSS class.
* @override
*/
goog.ui.ImagelessButtonRenderer.prototype.getCssClass = function() {
return goog.ui.ImagelessButtonRenderer.CSS_CLASS;
};
// Register a decorator factory function for goog.ui.ImagelessButtonRenderer.
goog.ui.registry.setDecoratorByClassName(
goog.ui.ImagelessButtonRenderer.CSS_CLASS,
function() {
return new goog.ui.Button(null,
goog.ui.ImagelessButtonRenderer.getInstance());
});
// Register a decorator factory function for toggle buttons using the
// goog.ui.ImagelessButtonRenderer.
goog.ui.registry.setDecoratorByClassName(
goog.getCssName('goog-imageless-toggle-button'),
function() {
var button = new goog.ui.Button(null,
goog.ui.ImagelessButtonRenderer.getInstance());
button.setSupportedState(goog.ui.Component.State.CHECKED, true);
return button;
});
| {
"pile_set_name": "Github"
} |
Jerky is overwhelmingly tasty and always in demand. All the jerky lovers are always ready to enjoy the taste of their favorite snack. Undoubtedly, Beef Jerky makes a fantastic snack full of protein, but all its flavor and taste depend on beef jerky recipes. To add soul to your recipes, you need to follow these easy steps including the best meat cuts, high-end ingredients and the right cooking approach. Here’s how you can do it. | {
"pile_set_name": "OpenWebText2"
} |
White House Petitions
∑ Δ ♀ GraphName Choropleth of Petition Signers Darker counties indicate more signers per capita
Total Signatures Petitions with more than 25,000 signatures receive a response from the White House
Petition Text
View Petition | {
"pile_set_name": "OpenWebText2"
} |
Q:
Calculation of integers $b,c,d,e,f,g$ such that $\frac{5}{7} = \frac{b}{2!}+\frac{c}{3!}+\frac{d}{4!}+\frac{e}{5!}+\frac{f}{6!}+\frac{g}{7!}$
There are unique integers $b,c,d,e,f,g$ such that $\displaystyle \frac{5}{7} = \frac{b}{2!}+\frac{c}{3!}+\frac{d}{4!}+\frac{e}{5!}+\frac{f}{6!}+\frac{g}{7!}$
Where $0\leq b,c,d,e,f,g <i$ for $i=2,3,4,5,6,7$. Then the value of $b+c+d+e+f+g = $
$\bf{My\; Try}::$ $\displaystyle \frac{5}{7} = \frac{2520\cdot b+840\cdot c+210\cdot d+42\cdot e+7\cdot f+g}{7\times 720}$
$\displaystyle 2520\cdot b+840\cdot c+210\cdot d+42\cdot e+7\cdot f+g = 720\times 5 = 3600$
Now I did not understand how can I solve after that.
Help Required
Thanks
A:
Look at this equality that you've got: $$ 2520 \cdot b + 840 \cdot c + 210 \cdot d + 42 \cdot e + 7 \cdot f + g = 3600.$$
Note that if you consider everything modulo $7$, then most of the summands disappear, because $2520,840,210,42$ and $7$ are all multiples of $7$. So, taking remainders modulo $7$, we get $g \equiv 2 \pmod 7$. Since $0 \leq g < 7$, it follows that $g = 2$. Now substitute $2$ for $g$ in your equality, subtract $2$ from both sides and divide everything by $7$. You get
$$
360 \cdot b + 120 \cdot c + 30 \cdot d + 6 \cdot e + f = 514.
$$
Now consider both sides modulo $6$, and go on in a similar fashion. You will eventually find the values for all variables.
| {
"pile_set_name": "StackExchange"
} |
Annual immunisation coverage report, 2010.
This, the fourth annual immunisation coverage report, documents trends during 2010 for a range of standard measures derived from Australian Childhood Immunisation Register (ACIR) data. These include coverage at standard age milestones and for individual vaccines included on the National Immunisation Program (NIP). For the first time, coverage from other sources for adolescents and the elderly are included. The proportion of children 'fully vaccinated' at 12, 24 and 60 months of age was 91.6%, 92.1% and 89.1% respectively. For vaccines available on the NIP but not currently assessed for 'fully immunised' status or for eligibility for incentive payments (rotavirus and pneumococcal at 12 months and meningococcal C and varicella at 24 months) coverage varied. Although pneumococcal vaccine had similar coverage at 12 months to other vaccines, coverage was lower for rotavirus at 12 months (84.7%) and varicella at 24 months (83.0%). Overall coverage at 24 months of age exceeded that at 12 months of age nationally and for most jurisdictions, but as receipt of varicella vaccine at 18 months is excluded from calculations, this represents delayed immunisation, with some contribution from immunisation incentives. The 'fully immunised' coverage estimates for immunisations due by 60 months increased substantially in 2009, reaching almost 90% in 2010, probably related to completed immunisation by 60 months of age being introduced in 2009 as a requirement for GP incentive payments. As previously documented, vaccines recommended for Indigenous children only (hepatitis A and pneumococcal polysaccharide vaccine) had suboptimal coverage at around 57%. Delayed receipt of vaccines by Indigenous children at the 60-month milestone age improved from 56% to 62% but the disparity in on-time vaccination between Indigenous and non-Indigenous children at earlier age milestones did not improve. Coverage data for human papillomavirus (HPV)from the national HPV register are consistent with high coverage in the school-based program (73%) but were lower for the catch-up program for women outside school (30-38%). Coverage estimates for vaccines on the NIP from 65 years of age were comparable with other developed countries. | {
"pile_set_name": "PubMed Abstracts"
} |
AML & Identity Verification Policy
This Anti-Money Laundering ('AML') Policy and Identity Verification Policy (collectively the ‘AML Policy’) is designed to stipulate the commitment of trade.io Technologies Ltd (the 'Company') and its affiliated companies to detect, prevent and report attempts to use its financial services platform (the ‘Services’) to illegally launder money, to finance illegal activities such as terrorism and drug trafficking, or to commit fraud. Money laundering is defined as the process where the identity of the proceeds of crime are so disguised that it gives the appearance of legitimate income. Criminals are known to specifically target financial services firms through which they attempt to launder criminal proceeds without the firm's knowledge or suspicions. Trade.io Technologies Ltd is a company with limited liability, incorporated under the laws of the Hong Kong.
The Company, and trade.io Technologies Limited, and trade.io Financial Ltd. [CL1] (collectively the "Group Companies") offer the Services through its platform, that allows people to buy and sell math-based currencies such as bitcoins. The Group Companies do not keep or manage Bitcoin wallets and/or fiat money deposits. The Group Companies recognize that decentralized and distributed digital currency and payment systems in which payments are processed and secured by advanced cryptography and distributed computing power instead of a centralised (government) institution pose a risk of illegal use (as do all financial systems). The Group Companies believe, however, that the legitimate use of math-based currency networks can potentially provide immense benefits and efficiencies within the global economy.
For services provided by the Company which is regulated under Hong Kong jurisdiction, Trade.io Financial Ltd which is regulated under Cayman jurisdiction policy to comply with all applicable laws and regulations regarding AML and identity verification (know your customer / KYC procedures), and to detect and prevent the use of its Services for money laundering or to facilitate criminal or terrorist activities. Accordingly, the Group Companies have implemented this AML Policy and accompanying systems and procedures to assess the specific risks posed by the Group Companies’ Services and established controls to address those risks as required by law. While the Group Companies are committed to protecting its users' privacy, they will not allow people to use its Services to launder money, commit fraud or other financial crimes, finance terrorist activities, or facilitate other illegal conduct.
The Group Companies' AML Policy is based on the current Hong Kong and Cayman laws and regulations.
If you have any questions relating to this AML Policy, the use of your Account, the Services, or any other matter, please contact us: [email protected]. | {
"pile_set_name": "Pile-CC"
} |
Alley Cats Lapel Pin 2.2"x1.5"
Item :#400003-A
Satisfaction Guarantee
Order with confidence and satisfaction. All merchandise is selected for quality
and performance and is guaranteed against defects. If not completely satisfied with
your order, please contact customer service within 15 days
of receipt of the order to request a return for replacement or credit. | {
"pile_set_name": "Pile-CC"
} |
1. Technical Field
The present invention generally relates to electronic musical instruments, and more particularly, to electronic musical instruments capable of generating musical sounds with plural timbres in response to a sound generation instruction.
2. Related Art
Electronic musical instruments having a plurality of keys composing a keyboard, in which, upon depressing plural ones of the keys, different timbres are assigned to each of the depressed plural keys, and musical sounds at pitches designated by the depressed keys are generated with the timbres assigned to the depressed keys, are known. An example of such related art is Japanese Laid-open Patent Application SHO 57-128397.
Another electronic musical instrument known to date generates musical sounds with multiple timbres concurrently in response to each key depression. For example, musical sounds that are to be generated by different plural kinds of wind instruments (trumpet, trombone and the like) at each pitch may be stored in a memory, and when one of the keys is depressed, those of the musical sounds stored in the memory and corresponding to the depressed key are read out thereby generating the musical sounds. In this case, when one of the keys is depressed, musical sounds with plural timbres are simultaneously generated, which provides a performance that sounds like a performance by a brass band. However, when plural ones of the keys are depressed, musical sounds with plural timbres are generated in response to each of the depressed keys. Therefore, when the number of keys depressed increases, the resultant musical sounds give an impression that the number of performers has increased, which sounds unnatural.
Another known electronic musical instrument performs a method in which, when the number of the keys depressed is fewer, musical sounds with a plurality of timbres are generated in response to each of the keys depressed; and when the number of the keys depressed is greater, musical sounds with a fewer timbres are generated in response to each of the keys depressed.
However, in the electronic musical instruments of related art, timbres that can be assigned according to states of key depression are limited, and the performance sounds unnatural or artificial when the number of keys depressed changes. For example, when one of the keys is depressed, a set of multiple musical sounds is generated; and when another key is depressed in this state, the musical sounds being generated are stopped, and another set of multiple musical sounds is generated in response to the key that is newly key-depressed. Furthermore, when plural ones of the keys are depressed at the same time, timbres to be assigned to the respective keys are determined; but when other keys are newly depressed in this state, the new key depressions may be ignored, which is problematical because such performance sounds unnatural. | {
"pile_set_name": "USPTO Backgrounds"
} |
Enter your email to restore your password
Ernst Conservation Seeds grows, processes and sells over 400 species of native and naturalized seeds and live plant materials for restoration, beautification, reclamation and conservation. The environmental climate and professionals in the field are recognizing how important natives are in the restoration of our North American ecology, and that natives are the best choice for use in almost every scenario. We know how to harvest native seeds and grow them in a production environment. We know how to help our customers replicate that success in their own applications. This steadfast commitment to understanding our customers’ needs and advising them on the best solutions hasn’t changed in fifty years.
Company details
Ernst Conservation Seeds was founded by Calvin Ernst in 1964 as Ernst Crownvetch Farms. This third generation family-owned and operated business was formed to meet the need for soil conservation along our interstate highways. Since that time, our business has evolved with the needs of the soil and water conservation industry. Driving this evolution are increased public and governmental interest in native species as a preferred first choice, sustainable landscape design, low-impact development, responsible reclamation and restoration, improved biodiversity, habitat development and evolving practices in conservation agriculture. Today, we grow, process and sell over 400 species of native and naturalized seeds and live plant materials propagated on more than 8,000 total acres. While the majority of acreage is located in northwestern Pennsylvania, we own additional farm land in Florida, and have cooperative relationships in Maryland, North Carolina and Oregon. Our products are sold to conservation organizations, landscape architects, reclamation/restoration contractors, government agencies and private landowners throughout the United States and abroad. We pay special attention to providing species that enhance the beauty of the environment by their colorful flowers, fruit and foliage. We go to great lengths to provide native seed mixes that reflect the wide variety of species that we have studied growing together in native environments. We provide a diversified selection of seeds and materials that are sure to be of the highest quality. Every order is harvested, processed and shipped with pride and dedication from our entire family and staff. The individual needs of our customers remain our highest priority. We are dedicated to providing our customers with the best native and naturalized seeds and materials available. Our family and employees are dedicated to providing you with products that reflect our values. We trust that each order will be filled to your satisfaction. “The environmental climate and professionals in the field are recognizing how important natives are in the restoration of our North American ecology, and that natives are the best choice for use in almost every scenario,” says Calvin. “We know how to harvest these seeds and grow them in a production environment. We know how to help our customers repeat that success in their own applications, and we take the time to do that with each customer.”
Many of the most successful enterprises in history owe their staying power to a visionary leader – one who guided them through the best and worst of times – always with a steadfast resolve and unwavering vision for their destiny. The history of Ernst Conservation Seeds is one such story – intertwined uniquely with that of its founder and president, Calvin Ernst.
Born and raised a stone’s throw from where his sprawling agribusiness calls home, Calvin proved himself to be a savvy entrepreneur by the young age of 14, when he received his Pennsylvania nursery license, now known as a plant merchant certification. In his senior year of high school, Calvin grew the record corn crop in Crawford County with guidance from his 4-H leader and the local Penn State University Cooperative Extension office.
As a junior at Penn State in 1962, Calvin, his brother Luther and some friends were performing research on crownvetch — an herbaceous legume that spreads through both rhizomes and seed — for the Pennsylvania Department of Transportation. Some staff members from the University told the young men they couldn’t find anyone interested in growing crownvetch.
Calvin recalls, “I didn’t initially think that seeds would be my thing. It was really the challenge of doing something PennDOT couldn’t get anyone else to do that put me on this path.” And Calvin has always loved a challenge.
In 1963, Calvin was working for Penn State’s College of Agriculture and Luther as a school administrator. The brothers scraped together $1,000 to purchase foundation crownvetch seed and convinced their father, Ted, to plant it on five acres of the family farm. The gamble, they assured him, would pay off.Recalling his mother’s reaction to the initial seed purchase, Calvin says, “She thought every seed must have been worth a penny – she even swept the stray seeds off the barn floor.”
It was also in 1963 that Calvin made his most auspicious proposal — and realized his greatest personal gain — when he requested, and was granted, the hand of Marcia Atwell in marriage. The two have been life and business partners ever since, literally traveling around the globe and making an indelible mark on the seed trade industry in the ensuing 50-plus years together.
Reflecting on the importance of having her by his side all these years, Calvin says, “Marcia has always supported me personally and professionally. And I could count on her, as I could my parents, to question me on why I thought something was the right idea. She would never say, ‘Don’t ever do that again,’ but instead she would ask why things didn’t work out and how we could learn from it.” He continues, “I think more than anything, it was her support back home and keeping the family together and strong that always made it productive for me to go out and try things, then come back and regroup now and again.”
In 1964, the Ernst brothers planted an additional 60 acres of crownvetch on leased land in the spring, and harvested the earlier five-acre stand that fall. With Ted’s assistance, the 1964 crop was sold to Stanford Seed in Plymouth Meeting, Pennsylvania. The Ernst family enterprise — newly dubbed Ernst Crownvetch Farms — had its first customers and was officially in the seed business. The sale to Stanford Seed and other early customers allowed the fledgling agribusiness to hire its first full-time employee, who would help them expand production on owned and leased land.
Calvin had witnessed firsthand the potential of crownvetch for erosion control while living and working in the greenhouses at Penn State. His gut told him this legume held enormous potential for commercial viability. His timing couldn’t have been better. It was during this period of time in the mid-to-late 1960s that the massive Unites States Interstate Highway System was being built. Superhighways like I-79, I-80, I-90 and I-95 were being carved across the American landscape. Suddenly, there was high demand for effective cover crops to revegetate rights-of-way and highway medians. Much of Ernst Crownvetch Farms’ key growth occurred during the ensuing years, thanks largely to the relationships being cultivated with highway departments and government agencies involved with the interstate system.
The 1967 crownvetch crop made it possible to purchase the 180-acre property which Ernst Conservation Seeds still calls home today. It also allowed for the Company’s first personnel expansion, to what was then a handful of people who helped the Ernsts grow both crownvetch seed and crowns.
In fall of 1969, Ernst Crownvetch Farms joined forces with Multi-Systems, Inc., a public corporation based in Detroit, to purchase a 640-acre farm in north central Nebraska, where they plowed under the native prairie and planted the entire farm in irrigated crownvetch. The purchase doubled the acreage Ernst had in production at the time. Over the next three years, Calvin, Marcia and young sons Andy and Michael would spend a couple months each spring and fall living on the Nebraska farm while fields were planted and harvested.
By 1972, the price of crownvetch collapsed. The Ernsts’ partnership with Multi-Systems was mutually severed, with Ernst Crownvetch Farms owing $12,000. With no available assets, Calvin and Marcia took yet another risk by securing local Farmers Home Administration financing on approximately 500 acres back home in Crawford County. The couple expanded their business by growing crownvetch crowns and potted plants. They soon paid their debt from the dissolved partnership and moved on, in control of their own destiny once again.
The couple was blessed with the birth of daughter Robin in 1973. The remainder of the 1970s saw Calvin and Marcia raising the three kids while continuing to sell crownvetch and grain crops. According to Calvin, the children all shared a love for the natural world and the ever-changing business their parents were in.
“I don’t think they ever looked at our farming as drudgery,” he says. “It seems they always figured, ‘Something’s going to happen here that’s going to be more exciting than the last thing.’ And that kept them engaged. Every time we made progress, we shared it with them as well. I think that was important. And it’s something they do with their own kids today.”
The business continued to expand until the 22% interest rates of the early 1980s hit. When the value of crownvetch wasn’t worth the cost of harvesting it, the couple began growing large volumes of no-till corn planted right into the existing crownvetch fields. The practice created high corn yields due to the legume’s excellent nitrogen-fixing properties. Once again, crownvetch had saved the day, even when it was playing a supporting role as a cover crop.
In 1985, Ernst Crownvetch Farms hired its first full-time information technology employee to manage the company’s inventory and sales & marketing activities. This progressive move was becoming characteristic of the Ernsts and their approach to agriculture as a true business, and its employees as professionals.
“I think I’ve generally been successful at finding or developing a skill set within an employee – a skill set that was useful for the business and that person’s professional growth,” he comments. “I’ve tried to mold some of our employees into what the business needs them to be with a lot of success. And some of them I’m still working on,” he laughs.
In the later 1980s, Ernst began growing native deertongue obtained from the USDA’s Big Flats Plant Materials Center in Corning, New York. Deertongue was the first native used for strip mine reclamation where low soil pH was a challenge. Calvin credits the propagation and marketing of deertongue seed as the turning point in the Company’s eventual transition from the non-native crownvetch that had driven sales for the first 20-plus years to the native plant species that would assume that role moving forward. The Company planted its first foundation switchgrass seed (‘Shelter’ variety) in 1988. Calvin was interested in switchgrass because it added wildlife value to strip mine and reclamation seed mixes. It wouldn’t take long, however, for him to find an even higher calling for this high-yielding warm season grass that grows so well on marginal lands.
In 1990, Ernst was purchasing much of its crownvetch seed from growers in southeastern Minnesota in order to mitigate the effects of low market prices. The Company built a small processing facility and erected a handful of grain bins there. Calvin recalls that these activities in Minnesota first piqued his interest and drove a shift in his business strategy toward the diversity of natives and their potential to revolutionize the seed trade. Southeast Minnesota and Iowa were home to many of the first commercial growers of native ecotypes. This fraternity of like-minded producers was very helpful, sharing their combined insights with the ever-curious and innovative entrepreneur. In short order, Calvin began shifting acreage from grain and crownvetch production to that of native forbs and grasses.
In step with Ernst’s shift toward native ecotypes was a shift in the attitudes of government agencies toward the use of non-native species such as crownvetch. Non-natives, specifically those classified as aggressive species, were beginning to be blacklisted in favor of a move toward native species. Once again, Calvin had begun innovating and adapting his product offering ahead of the curve.
Calvin has always believed in the need to continually educate himself and others on best practices, to study the future of agronomy and foresee opportunities to diversify and meet future demands. His peers recognize this as well, often inviting him to speak or to participate in the greater conversation within the industry. In the summer of 1990, Calvin and Marcia traveled to Eastern Europe as part of the “People to People” exchange program in order to study a diverse agricultural practice. In 1991, Calvin traveled with the USDA to China to promote inter-cropping perennial legumes with annual grain crops in order to reduce crop inputs and erosion.
Further expansion of the farm’s operations occurred at this time with help from Ted and the hiring of additional employees.
Calvin recalls fondly one of those employees in particular.
“Pressley Hilliard came to me in an old wreck of a car one day and said, ‘Calvin, you need to buy my farm and grow corn.’ I said, “Pressley, I’m going to show you how to make money without growing corn or raising dairy cows.” We spent time traveling together in the Midwest buying and selling seed and he became enamored with the large production fields. You see, fifteen years ago or so, there was a big transition from dairy farms to crop farms. And it seemed that on every farm where they had torn down the old dairy barns and went straight to crop farming, there was a Cadillac in the yard, so to speak. And on one of those trips, Pressley finally looked at me and said, ‘when I get back, I’m gonna tear down those old barns.’ He was a great person and really became member of our family. We lost Pressley a couple years ago, and folks are still telling stories about him today.”
In 1993, Ernst Crownvetch Farms secured the rights to grow and market ‘Niagara’ Big Bluestem, which was successfully planted in 1994. At about this time, the Company changed its name to Ernst Conservation Seeds in order to better represent its evolving products and philosophy. By that time, Ernst was wild harvesting and growing native wetland seeds for the wetland mitigation market.Further opportunity arose when Ernst began collaborating with federal agencies, highway departments and land developers for the purpose of establishing wetlands and meadows using native seeds, and teaching these groups how to install bioengineering materials for soil stabilization.
Andy, Michael and Robin all pitched in with Ernst employees to expand native seed production and sales. Andy became involved in both state and national professional seed organizations that promote better quality standards. Michael busied himself building additional processing, storage and office capacity. Robin directed seed sales and promoted efficient native seed installation.Mark Fiely joined Ernst Conservation Seeds in 1995 as its full-time horticulturist, helping Calvin diversify the Company’s offering of native ecotypes. To this day, Mark spends a considerable portion of his time traveling the eastern United States in search of new species and researching their viability as production crops. He also works closely with customers, from large government agencies to landscape architects and hobby gardeners, all with the goal of educating them on the use of native species and assisting in their successful establishment.
In 2001, fire destroyed a major portion of the Company’s seed conditioning facility in Meadville and several of that year’s crops were lost. Employees and neighbors brought their own tools to help the family rebuild.
“Our community was showing up to help us before the end of the first day,” recalls Calvin.
With used equipment and loyal employees, seed was conditioned outside through the winter. In 2002, a new seed processing facility was completed, including equipment repair bays and a secure bay for the handling of field spray applications. Though the incident was tragic, it is widely seen as a unifying moment in the history of the Company, strengthening bonds between the family, its employees and the community, while also necessitating facility expansion and improvements that would pay dividends in short order.
“It was something we’d never want to repeat under the same circumstances,” Calvin reflects. “But it allowed us to rebuild and improve the facilities we had. The changes we were able to make to our capacity and processing efficiency just advanced us tremendously. And the way our neighbors, business partners and employees came together and helped out so quickly is very special. It was quite a pulling together.”
In response to a challenge to develop a native seed source for the extreme southeastern United States, Calvin initially utilized his vacuum harvesting technology to wild harvest wiregrass in central Florida. These successful wild harvests and collections of native forbs and grasses throughout Florida gave him yet another opportunity to expand. In 2003, the Ernst family purchased a farm in Live Oak, named it Ernst Southern Native Seeds, LLC, and began field production, with frequent assistance from the NRCS Plant Materials Center (PMC) in Brooksville, Florida and the Florida Wildflower Seed & Plant Growers Association.
Due to decreased demand, coupled with production difficulties involving wiregrass and some of the forbs, this venture did not prove to be as fruitful as hoped. However, with the aid of the Brooksville PMC, Calvin is successfully producing seed of two plant materials center releases of ‘Stuart’ and ‘Miami’ switchgrass. Additionally, in cooperation with the U.S. Department of Agriculture, Agricultural Research Service (USDA, ARS) in Griffin, Georgia, he is multiplying seed for more than 40 southeast ecotypes of lowland and upland switchgrass, along with his own native wildflowers. Calvin had been considering the potential for developing grass biomass for energy production. He put his plans to the test in 2005 by leasing 5,000 acres of marginal farmland in Crawford County and planting switchgrass for seed and biomass production. With marginal land being what it is, Calvin learned plenty about the effects of low pH and wet soils. Switchgrass performed well, but, “with thousands of tons of lime and patience, it did better,” recalls Calvin with a wry grin.
Research soon began on the densification of grass for use in direct combustion applications. In a characteristically gutsy move, Calvin decided that his Company would need to be the innovator once again — leading the charge instead of sitting on the sidelines of progress. Ernst would build its own state-of-the-art facility to process warm season grasses. Michael and a select group of dedicated employees designed and constructed a pellet plant that uses only grass. The plant was completed in 2012 and is currently producing densified grass pellets for multiple uses as a separate entity called Ernst Biomass, LLC.
As with most of Calvin’s ventures, very little financial assistance was utilized in the interest of maintaining project control and keeping development on schedule. The facility has opened numerous market opportunities for grass biomass, including numerous agricultural applications and uses in the burgeoning Utica and Marcellus shale oil and gas plays of the northeastern United States.
Today, with over 8,000 acres in production, Ernst grows more than 400 diverse crops for conservation, restoration, beautification, energy, pharmaceuticals and consumption. Future growth opportunities can be seen in increased public and governmental interest in sustainable landscapes, low-impact development, responsible reclamation and restoration, improved biodiversity and habitat development, and evolving practices in conservation agriculture.
While Calvin and Marcia show no sign of slowing down, their children all play critical roles in the future growth and diversification of Ernst Conservation Seeds and its affiliates. Andy and Michael Ernst share responsibilities for day-to-day operations at Ernst Conservation Seeds and Ernst Biomass, while Robin operates Meadville Land Service, Inc., a full service mobile restoration company specializing in the construction, restoration and mitigation of streams and wetlands, as well as native planting, seeding and the installation of bioengineering material. Darrell Ernst, Calvin’s younger brother, has been with the Company as an electrical and hydraulic mechanic for over five years.
After a passing glance back on the first 50 years of his Company’s history, Calvin immediately focuses on the promise of its future.
“The environmental climate and professionals in the field are recognizing how important natives are in the whole restoration of our North American ecology, and that natives are the best choice for use in just about every scenario.
“Through our experience, we know how to harvest these seeds and grow them in a production environment. We know how to help our customers repeat that success in their own unique applications, and we take the time to do that with each customer.
“There’s progress to be made in the efficiency of producing native seeds and in discovering, or creating, new markets for them. We continue to find new plants in diverse ecologies that may contain a thousand species in a square mile.
It is the mission of Ernst Conservation Seeds to make available to eastern North America the key native and naturalized species of plants for restoration, reclamation, conservation, wildlife and pollinator habitat enhancement, renewable biomass energy and the beautification of our nation.
We will identify, collect and propagate new species and ecotypes that will meet our clients’ needs, from eastern Canada to the southeastern United States. Our native seeds are produced from species that are considered the most significant foundation of an effective native restoration or reclamation project. To ensure our customers receive a quality product, all of our seeds are harvested, conditioned and tested under the highest quality standards.
In addition to 8,000 acres of native seed production at Ernst, we supply seed from some of North America’s top producers and collectors. Ernst Conservation Seeds and its suppliers collect, grow and process all of our products in an ecologically sustainable and renewable manner. | {
"pile_set_name": "Pile-CC"
} |
Don't get me wrong,
Macross is a great Anime series. But, the
same can't be said for the game. You
begin by gazing at a sassy gong-vixen
(Minymay?) and then hop into your
Valkyrie (Transforming spaceship). Now,
you have a rapidly decreasing power
supply, which is drained even faster when
you hit enemies. Basically, if you get
hit once, you won't have enough power to
make it to the next stage. You can always
change into your robot form, with rapid
fire, but you move too slowly and, once
again, won't be able to make it to the
next level. Graphics are poor, Gradius is
infinitely times better. Sound, once
again, repeats constantly. Controls are
good, but the difficulty is always set on
nigh-impossible. Too damn difficult for
its own good. | {
"pile_set_name": "Pile-CC"
} |
Q:
Why do XS subs use const char *?
A lot of Perl XS code uses const char * as the return value of an XS sub but never just char *. For example:
const char *
version(...)
CODE:
RETVAL = chromaprint_get_version();
OUTPUT: RETVAL
code from xs-fun
Can someone explain why const is preferred? In my testing, the returned scalar is modifiable whether const is used or not.
A:
It's only for clarity. The chromaprint_get_version function returns a const char *, so the XSUB should be defined with a const char * return type as well. If you have a look at the built-in typemap, it doesn't make a difference whether you use const char *, char *, or even unsigned char *. They all use the T_PV typemap. In all cases, the XSUB will return an SV containing a copy of the C string, which is always modifiable.
| {
"pile_set_name": "StackExchange"
} |
Farms have been hit with a shortage of the migrant workers that Britain relies on to bring in the fruit and vegetable harvests, according to a series of new reports.
There was a 17% shortfall in May, leaving some farms critically short of pickers, according to a new National Farmers Union (NFU) survey. The decline is blamed on Brexit, with the vote to depart the EU leaving the UK seen as “xenophobic” and “racist” by overseas workers, according to the director of a major agricultural recruitment company.
The UK requires about 80,000 seasonal workers to pick the vegetable and fruit harvest and virtually all come from eastern Europe. Just 14 of the 13,400 workers recruited between January and May this year were British, the NFU survey found. Three-quarters of the workers came from Bulgaria and Romania, and almost all the rest from other eastern European countries.
The authoritative NFU analysis showed the shortfall in May 2016, before the Brexit referendum, was just 4%. It also showed the proportion of overseas workers choosing to return to the UK has plummeted from two-thirds to one-third since January, meaning valuable experience is being lost.
“The grim reality is that the perception from overseas is we are xenophobic, we’re racist, and the pound has plummeted too,” said John Hardman, director at Hops Labour Solutions, who also estimates a 20% shortage of workers. “We’ve gone with Brexit and that makes us look unfriendly.
“The immediate impact is that there will be crops left in the fields,” he said. “[The warning] couldn’t be more timely with Wimbledon around the corner as 99.9% of Wimbledon strawberries are picked by eastern Europeans.”
Another large survey of salad and fruit farmers, released by the BBC on Thursday, found that 21% reported fewer workers than they needed in late May. Almost 80% of the growers said recruitment had been more difficult than last year, with 20% saying it had been the hardest for years.
Further evidence of the labour crisis comes from a recent survey by the CLA, which represents rural land and business owners. It found that 44% of its members said they had experienced a reduction in the availability of migrant labour over the past year.
“Farmers and growers need to know how the government will deal with the need from industries that rely on seasonal workers,” said Ali Capper, chair of the NFU horticulture board. “The NFU is calling for reassurance that farmers will be able to source a reliable and competent workforce both now and in the future. Without that, this trend is likely to continue and will hit hard.”
A previous seasonal agricultural workers scheme was scrapped by Theresa May when she was home secretary, after Bulgaria and Romania joined the EU. Farmers have been calling for a new scheme since the Brexit vote.
But in March, the immigration minister, Robert Goodwill, told MPs: “We do not believe there is sufficient evidence to justify a seasonal agricultural workers’ scheme in 2017.” The NFU’s concerns about food rotting in the fields due to a lack of workers were “a little bit of a scare story”, he said.
A government spokesperson said: “We are determined to get the best deal for the UK in our negotiations to leave the EU, not least for our world-leading food and farming industry, which is a key part of our nation’s economic success.”
Hardman said people who thought the shortage of farm labour could be filled by UK workers were “delusional”. He said: “There is no appetite in the UK labour pool for seasonal agricultural work.” The hospitality industry was more attractive for temporary work and unemployment is low in key areas, like Kent, he said.
Hardman said he understood why the government has not committed to a new migrant worker scheme: “Firstly, it’s political suicide and secondly they are working on hard historical data. Eighteen months ago we did not have an issue, but the tide of shortages is on its way.”
Another report on Thursday, from the industry group British Summer Fruits, estimates that strawberry and raspberry prices will jump 35%-50% if British growers do not have access to seasonal overseas workers after Brexit.
In August 2016, some of the Britain’s biggest fruit and vegetable growers said that without seasonal migrant workers they would switch their production to other countries, where many already have large operations, or would switch to cereals which are harvested by machines. | {
"pile_set_name": "OpenWebText2"
} |
My 1st Love???
asta
NOT
L ♥
♥
solmates
one
[Edited], I love you,
Dylan
OH My God..... I am almost sure I am in love... w. [edited]. Hehehe... sucha strange name, like mine... Yet everything about her I love. From her good body to her almost perfect face, her charm, her wit, & cunning, herBeing popular, Her friends (who I know) -some - I just hope she likes me as much as ILOE Her. I think of her every second of every day, I want to be with her, I imagine me & her doing things together, the sound of her laugh, I picture her face, I love her. Ifsoulmates exist, then I think I've foundmine. I hope she likes Techno.... :-) | {
"pile_set_name": "OpenWebText2"
} |
This application claims priority to Patent Application No. 2003-281029 filed in Japan on 28 Jul. 2003, the content of which is incorporated herein by reference in its entirety.
The present invention pertains to a magnetically coupled device in which insulator layer(s) intervene between mutually magnetically coupled transmitting coil(s) and receiving coil(s), input of signal(s) at transmitting coil(s) causing output at receiving coil(s) of signal(s) produced at least partially by induction due to magnetic coupling therebetween; and to electronic equipment employing same.
As is known, optically coupled devices, employed in a wide variety of electronic equipment, are provided with light-emitting element(s) at input side(s) thereof and light-receiving element(s) at output side(s) thereof, signal transmission taking place with input side(s) being electrically isolated from output side(s).
It so happens that in recent years magnetically coupled devices, with their faster communication rates, have drawn more attention than optically coupled devices due to increases in transmission speed (on the order of between 50 Mb/s and 100 Mb/s), representative of which is the situation existing with respect to fieldbus networks for factory automation equipment and the like.
Among such magnetically coupled devices is, for example, that disclosed at U.S. Pat. No. 6,376,933. In this magnetically coupled device, which comprises bridge circuitry including magnetoresistive sensor(s) for which resistance varies in correspondence to magnetic field strength, magnetoresistive sensor(s) is/are used to detect input magnetic field(s), output signal(s) from magnetoresistive sensor(s) is/are extracted from bridge circuitry, such output signal(s) is/are fed back thereinto, output magnetic field(s) is/are produced, and output signal(s) from magnetoresistive sensor(s) is/are extracted to the exterior while control is carried out so as to cause input magnetic field(s) and output magnetic field(s) to cancel out one another. Here, because output signal(s) is/are fed back thereinto, input magnetic field(s) and output magnetic field(s) being made to cancel out one another, internal noise generated at output-signal-side circuitry is canceled out.
However, the foregoing conventional magnetoresistive devices have had the problem that, even where it may have been possible to reduce internal noise, as no consideration had been made for reduction of geomagnetism and other such external noise, there has been occurrence of distortion of output signal waveform(s) and/or phenomena such as dropped bits during communication of output signal(s), preventing normal communication.
The present invention was therefore conceived in light of the foregoing conventional issues, it being an object thereof to provide a magnetically coupled device capable of reducing effects of external noise and of stably carrying out high-speed communication. | {
"pile_set_name": "USPTO Backgrounds"
} |
Moiré lattices consist of two superimposed identical periodic structures with a relative rotation angle. Moiré lattices have several applications in everyday life, including artistic design, the textile industry, architecture, image processing, metrology and interferometry. For scientific studies, they have been produced using coupled graphene–hexagonal boron nitride monolayers1,2, graphene–graphene layers3,4 and graphene quasicrystals on a silicon carbide surface5. The recent surge of interest in moiré lattices arises from the possibility of exploring many salient physical phenomena in such systems; examples include commensurable–incommensurable transitions and topological defects2, the emergence of insulating states owing to band flattening3,6, unconventional superconductivity4 controlled by the rotation angle7,8, the quantum Hall effect9, the realization of non-Abelian gauge potentials10 and the appearance of quasicrystals at special rotation angles11. A fundamental question that remains unexplored concerns the evolution of waves in the potentials defined by moiré lattices. Here we experimentally create two-dimensional photonic moiré lattices, which—unlike their material counterparts—have readily controllable parameters and symmetry, allowing us to explore transitions between structures with fundamentally different geometries (periodic, general aperiodic and quasicrystal). We observe localization of light in deterministic linear lattices that is based on flat-band physics6, in contrast to previous schemes based on light diffusion in optical quasicrystals12, where disorder is required13 for the onset of Anderson localization14 (that is, wave localization in random media). Using commensurable and incommensurable moiré patterns, we experimentally demonstrate the two-dimensional localization–delocalization transition of light. Moiré lattices may feature an almost arbitrary geometry that is consistent with the crystallographic symmetry groups of the sublattices, and therefore afford a powerful tool for controlling the properties of light patterns and exploring the physics of periodic–aperiodic phase transitions and two-dimensional wavepacket phenomena relevant to several areas of science, including optics, acoustics, condensed matter and atomic physics. | {
"pile_set_name": "OpenWebText2"
} |
Q:
$f'=e^{f^{-1}}$, again
This question is a spin-off of this one, in which the OP asks whether there is a solution $f:\mathbb R\to\mathbb R$ of the functional equation (not exactly an ODE) $f'=e^{f^{-1}}$, where $f^{-1}$ is the compositional inverse of $f$. The posted answer exploits the growth of $f(x)$ when $x\to-\infty$ and obtains a contradiction, which resolves the question nicely, but also invites the following question: what if we restrict to $f:\mathbb R_{\ge0}\to\mathbb R_{\ge0}$ and impose $f(0)=0$? This idea has been explored in the comments, where a formal power series expansion is obtained for $f$ which does not seem to converge for any $x\ne0$.
Taking another approach, we can use an iteration scheme starting from $f_1(x)=x$ and inductively solve the ODE $f_{n+1}'=e^{f_n^{-1}}$ with the initial condition $f_{n+1}(0)=0$ to obtain $f_{n+1}$, much in the spirit of Picard iteration. Explicitly, for example, we have
$f_2'=e^x$ and $f_2=e^x-1$;
$f_3'=e^{\ln(x+1)}=1+x$ and $f_3=x+x^2/2$;
$f_4'=e^{\sqrt{1+2x}-1}$ and $f_4=e^{\sqrt{1+2x}-1}(\sqrt{1+2x}-1)$
and the next iteration produces non-elementary functions. It is clear that the sequence $(f_{2k-1})_{k\ge1}$ is increasing, $(f_{2k})_{k\ge1}$ is decreasing, and $f_{2k-1}<f_{2k}$, so there are respective limits $f_-=\lim_{k\to\infty} f_{2k-1}$ and $f_+=\lim_{k\to\infty} f_{2k+1}$, with $f_-\le f_+$. It is also clear that from $n\ge2$ on the function $f_n'=e^{f_{n-1}^{-1}}$ is positive and increasing, so $f_n$ is increasing and convex, which can be passed to the limit to show that both $f_-$ and $f_+$ are also increasing and convex. As such they are continuous, and by Dini's theorem $f_{2k-1}$ converges to $f_-$ locally uniformly and similarly for $f_+$. Furthermore, the inequality $|x-y|\le |f_n(x)-f_n(y)|$ (as $f_n'=e^{f_{n-1}^{-1}}\ge1$) can also be passed to the limit. Then the following chain of inequalities:
$|f_-^{-1}(x)-f_{2k-1}^{-1}(x)|\le |x-f_-(f_{2k-1}^{-1}(x))|=|f_{2k-1}(f_{2k-1}^{-1}(x))-f_-(f_{2k-1}^{-1}(x))|$
shows that $f_{2k-1}^{-1}$ converges locally uniformly to $f_-^{-1}$, which then implies $f_{2k}'$ converges locally uniformly to $e^{f_-^{-1}}$. Hence $f_+'=e^{f_-^{-1}}$, and similarly $f_-'=e^{f_-^{-1}}$. From this it can be shown that $f_{2k-1}$ converges to $f_-$ locally in $C^\infty$, so both $f_-$ and $f_+$ are smooth functions, and they form an orbit of order at most 2 of the above iteration scheme. Moreover it can be shown that the first $n$ terms of the Taylor expansion of $f_n$ agrees with what have been calculated formally in the previous comments, so both $f_-$ and $f_+$ have the same Taylor expansion as calculated using formal power series expansion.
In light of the above, a priori the following three scenarios can happen:
$f_-\neq f_+$ and we have a genuine orbit of order 2, consisting of two functions having the same Taylor expansion at 0 but not being identical.
$f_-=f_+$ is an actual solution to the equation $f'=e^{f^{-1}}$, but it is merely $C^\infty$ but not analytic, having a divergent power series expansion at 0.
$f_-=f_+$ is an actual solution to the equation $f'=e^{f^{-1}}$, and it is analytic on a neighborhood of 0; we are just misled by the first 100 or so terms of the Taylor expansion.
Now finally comes the question: which of the above scenario is the reality? In the first two scenarios, one can also ask what is the growth rate of $f_-(x)$ and $f_+(x)$ as $x\to+\infty$.
A:
There is no analytic local solution at $0$ to $f'=e^{f^{-1}}$, $f(0)=0$, that is, the formal power series solution is diverging. Together with the solution given in comments by fedja, this means the actual scenario is 2. For convenience of notation, I shall consider the equivalent equation
$$\begin{cases} g' =e^{g\circ g}, \\ g(0)=0,
\end{cases}$$
satisfied by $g(x):=-f^{-1}(-x)$ (Indeed, by the rule of the derivative of an inverse, $(f^{-1})'(x)={1\over f'(f^{-1}(x))}=e^{-f^{-1}(f^{-1}(x))}$ so that $g'(x) =e^{g(g(x))}$; see also Tom Copeland's previous answer here.)
Indeed, assume by contradiction the formal power series solution $x+{1\over2}x^2+{1\over2}x^3+{2\over3}x^4+\&c.$ to the above equation has a positive radius of convergence. Then, it extends uniquely by analytic continuation to a maximally-defined analytic function, still denoted $g$ (that is, defined on the largest positive interval $[0,a)$, for some $0<a\le+\infty$).
Note that the Taylor series of $g$ at $0$ has non-negative coefficients. This follows immediately by induction, equating the coefficients of $g'$ and $e^{g\circ g}$; incidentally, this series is the EGF of the positive integer sequence OEIS A214645, as also remarked here. As a consequence (check the details below), $g$ is totally monotonic on $[0,a)$; in particular $g'(x)>g'(0)=1$ and $g(x)>x$ for all $0<x<a$, and $g$ is invertible.
Then observe that $\log( g'( g^{-1}(x))$ is a well-defined analytic function on the interval $g[0,a)$, and coincides with $g$ locally at $0$. By the maximality of $[0,a)$ we have thus $g[0,a)\subset[0,a)$, but, due to the inequality $g(x)>x$ on $(0,a)$, this inclusion is only possible if $a=+\infty$, so that $g$ is unbounded. On the other hand, arguing as in Christian Remling's previous answer, since $e^{-g(g(t))}g'(t)=1$ and $g(t)\ge t$, we have for any $x\ge0$
$$x=\int_0^{x}e^{-g(g(t))}g'(t)dt=\int_0^{g(x)}e^{-g(s)}ds\le \int_0^{+\infty}e^{-s}ds=1 ,$$
a contradiction.
$$*$$
Rmk 1. To justify the total monotonicity of $g$, note that, as a general elementary fact, a real analytic function on an interval $I$, whose Taylor series at some point $x_0\in I$ has non-negative coefficients, has Taylor series with non-negative coefficients ay any point $x\in I$, $x\ge x_0$. Indeed, this is clear for $x_1\ge x_0$ within the radius of convergence of $x_0$, and since there is a uniform radius of convergence at any $y\in [x_0,x]$, one reaches $x$ by finitely many steps $x_0<x_1<\dots<x_n=x$.
$$*$$
Rmk 2. The very same argument works for other differential-functional equations like e.g.
$$\begin{cases} g' =1 + {g\circ g}, \\ g(0)=0,
\end{cases}$$
that generates the sequence OEIS A001028.
As before, a maximally-defined analytic solution $g$, if any, must be totally monotonic and defined for all $x\ge0$, for otherwise $ g'\circ g^{-1} -1$ would be a proper extension of it. Then we reach a contradiction as before, with one more step needed: since we have ${ g'(t)\over 1+g(g(t))}=1$ and $g(t)\ge t$ for any $t\ge0$, we also have, for any $x\ge0$
$$x=\int_0^{x}{ g'(t)dt\over 1+g(g(t))}=\int_0^{g(x)}{ dt\over 1+g(t)}\le\int_0^{g(x)}{ dt\over 1+t}=\log(1+g(x)) ,$$
whence $e^x\le 1+ g(x)$; if we plug this into the latter inequalities again, we get
$$x=\int_0^{g(x)}{ dt\over 1+g(t)}\le \int_0^{g(x)}e^{-t}dt\le 1 ,$$
as before. By comparison, the same conclusion also holds for $g'=F( {g\circ g})$ with any $F$ analytic and totally monotonic on $(-\epsilon,+\infty)$, and with $F(0)=1$.
| {
"pile_set_name": "StackExchange"
} |
Q:
Transform smarty Boolean value to human readable value.('Yes'/'No' or 'True'/'False')
I'm using Smarty to generate some tables, and at one point I'm printing out variable values that have been passed from php file. The problem is that some of these variables are Boolean values and they render as "1" or "". This was my attempt to transform these Boolean values to a human readable format. It does not work. How can can I check if a variable is a Boolean value?
{if $val2.$value_index === true}Yes
{else if $val2.$value_index === false}No
{else}{$val2.$value_index->value}{/if}
A:
Use the PHP var_export() function as a smarty modifier for your boolean variables.
Set the second parameter to true, so var_export() returns the variable representation instead of outputting it.
To check if your variable is a boolean, use the PHP is_bool() function.
Your Smarty code should look like this:
{if is_bool($val2.$value_index)}
{$val2.$value_index|var_export:true}
{/if}
A:
I'm not exactly familiar with this, but it looks as though that should be:
{if $val2.$value_index->value === true}Yes
{elseif $val2.$value_index->value === false}No
{else}{$val2.$value_index->value}{/if}
| {
"pile_set_name": "StackExchange"
} |
Q:
Php, static variables for trait itself only, how?
its possible to have static variables for traits:
Trait Example
{
public static $var;
}
class X
{
use Example;
}
class Y
{
use Example;
}
however, the problem is when more class would want to use this trait, I get a fatal error:
Example and X define the same property ($var) in the composition of Y. This might be incompatible, to improve maintainability consider using accessor methods in traits instead. Class was composed
how to define this static variable just for the trait itself?
A:
Traits can define both static members and static methods. however You can not reassign trait properties.
From PHP manual http://php.net/traits
See Example #12 Conflict Resolution
If a trait defines a property then a class can not define a property with the same name, otherwise an error is issued. It is an E_STRICT if the class definition is compatible (same visibility and initial value) or fatal error otherwise.
The solution would be to override properties in the class
Trait Example
{
public static $var;
}
class X
{
use Example;
public static $var;
}
class Y
{
use Example;
public static $var;
}
| {
"pile_set_name": "StackExchange"
} |
Dallas and Texas Make Roster Moves
CEDAR PARK, Texas – Dallas Stars General Manager Jim Nill announced today that the team has reduced the training camp roster by two players. The Texas Stars training camp roster has also been reduced by nine players. The Stars roster now features 25 players.
PLAYER POSITION STATUS Erik Condra Forward Assigned to Texas (AHL) Michael Mersch Forward Assigned to Texas (AHL) Dexter Dancs Forward Released from Professional Tryout Keegan Kanzig Defenseman Released from Professional Tryout Kale Kessy Forward Released from Professional Tryout Clint Lewis Defenseman Released from Professional Tryout Chris Martenet Defenseman Reassigned by Dallas (NHL) to Idaho (ECHL) Steve McParland Forward Released from Professional Tryout Brady Norrish Defenseman Released from Professional Tryout Kyle Schempp Forward Released from Professional Tryout Tomas Sholl Goaltender Released from Professional Tryout
The Texas Stars are the primary development affiliate of the NHL’s Dallas Stars, and will begin their 10th anniversary season at H-E-B Center at Cedar Park this Friday, Oct. 5 at 7 p.m. Full-season, 24-game and 12-game ticket packages for the 2018-19 campaign are on sale now. For more information, call (512) GO-STARS (467-8277) or visit TexasStars.com. | {
"pile_set_name": "OpenWebText2"
} |
A wide variety of consumables (e.g., foods, beverage, cosmetics, etc.) contain contaminants, toxins, allergens, and/or other substances that are of interest to all or specific types of consumers. In particular, in recent years, an increase in the number of consumers with an identified allergy (e.g., gluten allergy, dairy allergy, fish allergy, nut allergy, soy allergy, cosmetic allergy, etc.) has contributed to a number of products that omit ingredients having an associated allergen; however, such consumers are still at risk for consuming items with a harmful substance when the items do not have adequate labeling or documentation. Various systems and methods exist for detection of toxins and harmful substances present in a sample; however, current systems and methods are deficient due to one or more of: a time-intensive manner of receiving test results, a labor-intensive manner of receiving test results, a non-automated manner of processing samples, system bulk, system non-portability, and other factors that contribute to inconveniencing a consumer using such systems.
Due to these and other defects of current systems and methods for detecting harmful substances in consumables, there is thus a need for an improved system and method for detecting target substances. This invention provides such a system and method. | {
"pile_set_name": "USPTO Backgrounds"
} |
How to Control the Ring
In this week’s CROM’s Corner we will be going through part 2 of our Footwork series.
Although there are a few different aspects that go into Ring Generalship, I believe the integral components stem from footwork. Some people understand the term, some people have never heard of it, and some don’t care for it. If you are any of these three, know that if you don’t KO/stop your opposition that this is one of the deciding factors that a judge will be looking at to score for or against you.
While it’s true that everyone loves a knockdown, drag ‘em out brawl, I was a commentator on a beautifully technical bout this past weekend which was a great display of exactly what ring generalship represents. It was a 5 round work of art by two female Nak Muays in a rematch at the 105 lb/ 48 kg mini flyweight division. The blue corner was the taller and more aggressive style fighter, as the red corner was content to be the counter fighter.
From the opening bell the blue corner was attempting to set the pace by using her lead leg to establish range. The red corner was wise enough to stay just out of range and counter with hopping lead leg push kicks of her own. As the fight/round went on the red corner started to evade and counter the blue corners attack using precise timing and low kicks to blue corner’s lead leg. Though the blue corner was using smart aggressiveness the red corner was utilizing sharp footwork to stay out of corners, off the ropes, and to create angles for her low kick attacks. The red corner was able to use position and ring awareness alongside accurate counter attacks throughout the fight to retain her title in championship form.
How do you define “Ring Generalship”?
I believe every coach will have their own interpretation as to what ring generalship is and they will have valid points. In my opinion, ring generalship is the ability to move and use the entire ring in such a way to corral and land significant strikes to mentally and physically dominate your opposition.
The finer points of Ring Generalship:
-Precise and purposeful footwork
-Awareness of where you are in the ring in relation to your opposition
-Being able to use the ropes to your advantage
-Using feints to keep your opponent guessing, confused and off rhythm
-Using stalling or retreating to bait the opposition in to attacking first, leaving them open for counter attacks
-Mimicking a shark with circling and forward movement as you are hunting and stalking for your own offensive maneuvers
As with any technique in Muay Thai do your best to incorporate this in to your shadowboxing, bag work, pad work and sparring and it will become a part of your fighting strategy. Becoming a ring general will make it crystal clear for the judges and the crowd to see who’s in charge. | {
"pile_set_name": "Pile-CC"
} |
Transcript
1.
Professional Presence
The Hard Facts about
Soft Skills
Handouts
2.
In business, professional relationships are enhanced when people understand and
practice business protocol. Every time an associate presents or accepts a business
card, greets a customer with a handshake, or attends a business lunch or dinner, they
will exemplify the polish and professionalism that communicates exceptional customer
service and market leadership. In today’s more casual business dealings, that rare
individual is easily distinguished from the competition. Business protocol and etiquette
is also a foundation for individuals developing their leadership potential. It makes an
immediate and noticeable difference in how an individual is perceived and in their
effectiveness in business and social interaction.
Ellen Reddick
2
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
3.
What is Business Presence?
A powerful business presence exudes high-level professionalism in attire, posture,
conduct, and verbal skills as well as displaying confidence, leadership, and personal
power in a businesslike manner. A powerful business presence conveys on the nonverbal
level: "I am intelligent; I have choices; I am resourceful; I can be authoritative, easily
managing and inspiring other people; and I am capable of handling any business
situation, including conflict and curve balls."
Know the components of business presence, and learn how to use them to your
advantage:
• Attire - all aspects of your clothing selections, including accessories such as
shoes, jewelry, eye-glasses, etc.
• Hair - style, color, condition, length
• Grooming - overall cleanliness, and personal presentation, including fragrances
use and abuse
• Posture - confidence in the way you hold yourself
• Demeanor - mannerisms, and body language
• Business Accessories -such as briefcases, pens, technology tools, etc.
• Communication Skills - articulation, eye contact, and effective listening
• Etiquette Skills - the right handshake, business protocols, and courtesies
Ellen Reddick
3
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
4.
First Impressions
Appearance + Actions + Attitude
When someone meets you for the first time, they will make up to eleven
assumptions about your personal or professional life. These assumptions are
made fast – within three to seven seconds. Right or wrong, correct or incorrect,
your appearance, actions, and attitude prompt immediate speculation –
conclusions accepted as true without any real proof.
Age ~ This assumption is largely based on physical aspects. Make sure you pay
attention to your appearance.
Level of Education ~ Education can refer to textbook knowledge as well as
worldly exposure. Appearance, action & attitude – will strongly affect this
assumption.
Moral Character ~ This assumption is based on whether you project an
understanding of what is morally and socially right or wrong.
Likability ~ Your actions, particularly nonverbal body language, can greatly
affect this assumption. A friendly smile, sincerity, politeness and good listening
habits can push this assumption to the positive side.
Position in Company ~ Of the three’s A’s, attitude is the most helpful here,
Have you noticed the upper management tend to exude confidence and a
positive attitude? Body language is important – walk taller, hold shoulders back,
and make excellent eye contact.
Income ~ This assumption often reverts back to appearance, one that you can
correct quickly.
Level of Success ~ As we mentioned earlier, attitude is contagious.
Name & Model of Car ~ This is an odd one and one I have never figured out.
Marital Status ~ While it is not appropriate to ask people often assume that
married people are more stable.
Level of Confidence ~ This assumption is based on your attitude, experience,
and self- esteem, which in turn is affected by your appearance 7 actions
Company Image ~ Remember…You are the company. The way you present
yourself is precisely how others perceive the company you work for.
Ellen Reddick
4
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
5.
Body Language Basics
Body language is the single most important means we have of getting our point
across. Over 50% of our communication is accomplished through our posture
and gestures. Body language can add to or detract from your professional
image.
Posture
Good posture, whether sitting or standing, presents a confident image.
• Stand and sit up straight
• Head up
• Shoulders back
• Feet flat on the ground approximately shoulder width apart
• Arms should be relax at your side
Walk
When entering a room, walk in with confidence and purpose. Maintain good
posture. Keep you head up and your eyes off the floor. Lift your feet up, avoid
dragging them along the ground. Keep your arms at your side, a nice easy swing
that matches your stride. A relaxed yet purposeful walk communicates high self-
esteem and commendable confidence.
Gestures
Be aware of your gestures at all times. When speaking with others, make certain
your gestures enhance your message and don’t detract from it. Gestures should
be open and friendly. Avoid doing anything that is going to detract from your
professionalism and the message you are trying to convey.
Eye Contact
Eye contact is builds trust and develops rapport with others. Looking people in
the eye lets them know you are interested in what is happening, you are
involved, you are self-confident and a professional. Avoiding eye contact makes
people believe you lack confidence, are nervous and unprepared, and worst of all
you might not be trust worthy.
It is recommended that you maintain eye contact approximately 95% of the time
when you are engaged in a one-on-one conversation, and up to 50% of the time
when in a group setting.
Ellen Reddick
5
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
6.
Facial Expressions
Your face offers a veritable wealth of information, not just your age and heritage.
Your expressions, or sometimes lack of, give away your innermost attitudes.
Some expressions may make you appear unfriendly, angry, or disinterested. A
warm sincere smile on the other hand, allows you to appear friendly, open, and
approachable, and may be one of your best accessories.
Handshake
Americans traditionally shake hands when meeting or leaving someone for the
first time, or when reconnecting with a person. An appropriate handshake is
between right hands only (unless your right hand is disabled), web-to-web
contact with locked thumbs, and care given to not grab the other person’s
knuckles. A firm grasp that lasts long enough for two to five substantial pumps is
essential.
Every handshake should begin from a standing position, ladies as well as men.
There is no gender distinction in business today. The rest goes as follows:
extend your right hand, initiate eye contact, say an enthusiastic hello, slowly and
clearly state your first and last name, and be sure to smile.
The handshakes you should avoid:
• The limp, dead fish handshake
• The double-handed handshake, often called the politician or pastoral
handshake
• The bone-crusher handshake
• The cold, clammy handshake
Business Tip: Name Badge
Always place your name badge on your right shoulder where it can be readily
seen. The nametag’s purpose is to reinforce your name. When you meet
someone and shake hands, their gaze will automatically follow your right arm
up to your shoulder and then to your face. Place your nametag high enough
on your right shoulder to be easily see.
Ellen Reddick
6
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
7.
Introductions
There are two kinds of introductions: self-introductions and three-party introductions.
When do you introduce yourself? When you recognize someone and he or she doesn’t recognize
you, whenever you’re seated next to someone you don’t know, when the introducer doesn’t
remember your name and when you’re the friend of a friend. Extend your hand, offer your first
and last names and share something about yourself or the event you’re attending.
Tip: In a self-introduction, never give yourself an honorific such as Mr., Ms., Dr., etc.
In a three-person introduction, your role is to introduce two people to each other. In a business or
business/social situation, one must take into consideration the rank of the people involved in
order to show appropriate deference. Simply say first the name of the person who should be
shown the greatest respect. And remember, gender doesn’t count in the business world; protocol
is based upon rank. Senior employees outrank junior employees, customers or clients outrank
every employee (even the CEO), and officials (Mayor, Senator, etc.) outrank non-officials.
Begin with the superior’s name, add the introduction phrase, say the other person’s name and
add some information about the second person. Then reverse the introduction by saying the
second’s name, followed by the introduction phrase and the superior’s name and information.
When a three-party intro is done correctly, the two people being introduced should be able to start
some small talk based upon what you shared about each of them. Introductions should match, so
if you know the first and last names of both people, say both. If you know only the first name of
one person, say only the first names of both. If you add an honorific for one person, the other
should also have one.
Examples:
“Mr. Brown, I’d like to introduce Ms. Ann Smith, who started yesterday in the mailroom. Ann, this
is Douglas Brown, our CEO.”
(Ann would be wise to call the CEO “Mr. Brown” right away and not assume she may call him by
his first name. Always use the last names of superiors and clients until you are invited to do
otherwise.)
“Pete, I’d like to introduce to you Doug Brown, our CEO. Doug, I’d like you to meet, Pete
Johnson, who’s considering our firm for his ad campaign.”
Tip: Don’t say “I’d like to introduce you to..”, but rather “I’d like to introduce to you…”
Tip: Always stand for an introduction.
Social skills are important prerequisites to succeeding in business. Knowing how to shake hands
and handle introductions can set you apart from the competition, convey confidence and project a
professional image. Practice these simple skills and you will reap the benefits!
Ellen Reddick
7
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
9.
Seven Body Language Killers
In many ways, listeners hear with their eyes. What is your body language saying
about you? When you give a presentation or run a sales meeting, are you
coming across as authoritative, confident and credible, or insecure, disreputable
and out of your league?
When it comes to body language, simply avoiding the most common mistakes
and replacing them with more confident movements will make a big difference.
Killer #1- Avoiding eye contact
What it says about you: You lack confidence; you are nervous and unprepared.
What to do instead: Spend 90% or more of your presentation time looking into
the eyes of your listeners. The vast majority of people spend far too much time
looking down at notes, PowerPoint slides or at the table in front of them. Not
surprisingly, most speakers can change this behavior instantly simply by
watching video of themselves. Powerful business leaders look at their listeners
directly in the eye when delivering their message.
During the recent confirmation hearings for U.S Chief Justice nominee John
Roberts, newspapers praised him for "looking self-assured." How did Roberts
project this image? Instead of reading his statements from notes, Roberts looked
his audience of Senators straight in the eye as he delivered his remarks.
Killer #2- Slouching
What it says about you: You are non-authoritative; you lack confidence.
What to do instead: When standing stationary, place feet at shoulder width and
lean slightly forward. Pull your shoulders slightly forward as well -- you'll appear
more masculine. Head and spine should be straight. Don't use a tabletop or
podium as an excuse to lean on it.
Killer #3- Fidgeting, rocking or swaying
What it says about you: You are nervous, unsure or unprepared.
What to do instead: Well, stop fidgeting. Fidgeting, rocking and swaying don't
serve any purpose. I recently worked with the top executive of computer
company who had to deliver the news of a product delay to a major investor. He
and his team actually had the event under control, and had learned valuable
lessons from the failure. But his body language suggested otherwise.
Killer #4- Standing in place
What it says about you: You are rigid, nervous, boring -- not engaging or
dynamic.
Ellen Reddick
9
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
10.
What to do instead: Walk. Move. Most men who come to me for presentation
coaching think they need to stand ridged in one place. What they don't realize is
that movement is not only acceptable, it's welcome. Some of the greatest
business speakers walk into the audience, and are constantly moving... but with
purpose!
For example, a dynamic speaker will walk from one side of the room to another
to deliver their message. But if there's no one in a corner of the room, it doesn't
make sense to go there -- it's not moving with purpose. When I tape my clients
on video, I actually want to see that they move out of frame once in a while.
Otherwise, they appear too rigid.
Killer #5- Keeping hands in pocket
What it says about you: You are uninterested, uncommitted or nervous.
What to do instead: The solution here is too simple: Take your hands out of
your pocket. I've seen great business leaders who never once put both hands in
their pockets during a presentation. One hand is acceptable -- as long as the free
hand is gesturing.
Killer #6- Using phony gestures
What it says about you: You are over coached, unnatural or artificial.
What to do instead: Use gestures; just don't overdo it. Researchers have shown
that gestures reflect complex thought. Gestures leave listeners with the
perception of confidence, competence and control. But the minute you try to copy
a hand gesture, you risk looking contrived -- like a bad politician.
Killer #7- Jingling coins, tapping toes & other annoying movements
What it says about you: You are nervous, unpolished or insufficiently
concerned with details.
What to do instead: Use a video camera to tape yourself. Play it back with a
critical eye. Do you find annoying gestures that you weren't aware of? I once
watched an author who had written a book on leadership discuss his project. He
couldn't help but jingle all the coins in his pocket throughout the entire talk. He
didn't sell very many books that day, and he certainly didn't score points on the
leadership scale.
Nervous energy will reflect itself in toe-tapping, touching your face or moving
your leg up and down. It's an easy fix once you catch yourself in the act!
Use your body as a positive communication tool!
Ellen Reddick
10
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
11.
How to Write a Handwritten Note
Only three or four sentences long, a thank you/hand written note is a
golden opportunity to make the sort of personal connection that builds
stronger professional relationships.
Hand write a note whenever possible. It says you took the time to think about
what you were writing. The person receiving your note will appreciate your
thoughtfulness and will not be grading your penmanship.
A simple fold-over note card, a black or blue pen, a stamp and little effort are
all you need. A good thank you/hand written note that gets mailed is better
than the perfect one that never gets written.
The six elements of a basic thank you note:
Ellen Reddick
11
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
12.
1. Salutation Dear Jay,
A surprising number of writers forget
this, but people like to see their own
names.
If you are on a first-name basis, use
it, otherwise use the more formal Mr.
or Ms. greeting.
2. Express your appreciation Thanks so much for the the tickets to
Noises Off.
Thank you is more formal; thanks is
more casual.
3. Describe the gift or experience Al and I have always loved going to the
theater, especially when it's a comedy.
Mention how an object looks or how The performances were great, and we
you will use it. Mention your laughed until our sides ached. It was
enjoyment of an event. People want wonderful of you to think of us.
to know they made you happy.
Even if there was a problem with the
gift, keep negatives to yourself. If the
gift or event wasn’t to your taste,
focus on the giver and the thought.
Everyone wants to be appreciated.
The time and energy are more
important than the gift.
4. Mention a connection We hope to see you when you are in town
again.
Discuss the past, allude to the future
or mention something you have in
common with the giver. If you can’t
think of anything else express your
desire to see or talk to the person
soon.
5. Thanks again for Thanks again for a wonderful evening.
It’s not overkill to say it again
6. Close Sincerely,
Any of the following are suitable for
business:
• Sincerely
• Sincerely yours
• Cordially
Ellen Reddick
12
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
13.
What to Say: Ideas for Business Greetings
Thank You: General
• With special thanks and much appreciation.
• Sincere thanks for your extra efforts.
• Your thoughtfulness is appreciated so much more than words can say.
• With sincere gratitude for all you have done.
• You’re the best!
• You made my day!
• It was a pleasure to work with you.
• Thank you for thinking of us.
• Many thanks for all you do.
Thank You: For Business/Order
• Thank you for your order. Continuing to serve you will be a pleasure.
• Your business is always appreciated.
• Thank you for choosing us.
• Thank you for your friendship, your business and the opportunity to serve you.
• Your business is sincerely appreciated. We look forward to continuing to serve
you.
• Success is having you for a customer.
• We appreciate your business and your confidence in us.
• Thank you for your continued business. We look forward to working with you in
the future.
Thank You: For Referral
• Thank you for the referral. Your confidence and trust in us is sincerely
appreciated.
• Thank you for referring _______ to our firm. We sincerely appreciate your
confidence in us.
Ellen Reddick
13
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
14.
• Thanks for thinking of me. Your referral is very much appreciated.
• Thank you for the vote of confidence.
• Many thanks for referring _______ to me. I’ll make sure he/she gets VIP service.
Thank You: For Time/Conversation
• Thank you for taking the time to meet with me.
• It was a pleasure talking with you. I hope we can speak again soon.
• Thanks for your time. If you need anything, don’t hesitate to call me.
• Thank you for meeting with me. If you need anything, I’m only a phone call
away.
• Thanks for squeezing me in. I know how busy you are.
• Many thanks for your inquiry. I’m sure we can meet your needs.
It is Your Birthday
• Wishing you a wonderful day.
• Sincere good wishes on your special day.
• Best wishes on your birthday for good health and happiness throughout the
year.
• Warmest greetings on your birthday with every good wish for the coming year.
• With friendly thoughts and best wishes for your birthday.
• Sending you sincere wishes for good health and happiness on your birthday.
• All the best to you for a very special birthday.
• May you have an unforgettable day filled with happiness.
• Wishing you life’s best!
• May this day and every day be filled with joy.
• Wishing you every happiness today and always.
• Have a sensational day!
• May all of your dreams come true.
• Warm wishes on your birthday and always.
Business Anniversary
• Happy Anniversary! Thank you for being a part of our success now and in the
future.
Ellen Reddick
14
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
15.
• Thanks for another great year!
• You’ve made our success possible. Thank you!
• Thanks from all of us for ______ years of your business. We look forward to
many more.
• Many thanks for being our customer for _______ years. We value that
relationship.
• Your business is appreciated. Thank you for choosing us.
Welcome
• A hearty welcome from all of us.
• Welcome aboard! It’s good to have you with us.
• A very warm welcome. We’re glad you joined us.
• We’re glad you’re here.
• A warm welcome. Thank you for choosing us!
• Welcome! We look forward to serving you.
• A warm welcome from all of us. Thank you for the opportunity to serve you.
Congratulations
• Congratulations on a job well done.
• Hoping the best things in life will always be yours.
• This is a day to remember.
• It’s great to see good things happen for someone so deserving.
• Congratulations on a well-deserved promotion.
• Congratulations on an outstanding accomplishment.
• Your achievement is an inspiration.
• Kudos to you! You’ve earned them.
• Just want to add my good wishes to those you’ve already received.
• Bravo! You’ve accomplished great things.
Retirement
• With every good wish for your retirement. May this be the start of your best
years.
• Congratulations on your retirement. Best wishes for a great future.
• Wishing you life's best today and always.
• Congratulations on achieving a milestone. Here's to a great future.
Ellen Reddick
15
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
16.
• Best wishes for today and every day in the future.
• Congratulations on your special day. May the future be filled with much
happiness.
Get Well
• May every day find you feeling better!
• Thinking of you. May you feel better soon.
• Our warmest thoughts are with you. Wishing you a speedy recovery.
• We’re sick without you. Get well soon.
• Hoping this finds you well on the way to recovery.
• Take care of yourself and feel better soon.
• You are in my thoughts. If there is anything I can do, please let me know.
• You are missed! Get well soon and hurry back.
Sympathy
• Please accept my/our deepest sympathy
• My/Our sympathy and thoughts are with you and your family.
• Offering my/our sincerest condolences to you and your family
• With concern and caring sympathy.
• May your sorrow be eased by good memories.
• With heartfelt sympathy. You are in my thoughts and prayers.
• Hoping these words of sympathy will comfort you in your time of sorrow.
• Words are inadequate at a time like this. Please accept my heartfelt sympathy.
Keeping in Touch
• Just a note to keep in touch. Let’s talk soon.
• Thinking of you—hope all is well. Let me know if I can help in any way.
• Sorry I missed you. Hope to talk with you soon.
• Just touching base with you.
• Sending this just to say hi.
Ellen Reddick
16
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
17.
How Does Your Office Welcome Clients?
A new client is coming to visit--and panic sets in. What will they think? Will they
have a favorable experience that encourages them to do business with you? Or
will they leave your facilities wondering how to contact your competition?
When customers visit, they form an impression of your business. That impression
becomes your image. Whether the visit involves a business transaction, a service
call or a corporate event--whether it's for only an hour or a full day--you need to
create positive impressions for everyone.
Here are some tips for receiving visitors graciously:
• Create a welcoming atmosphere
Ellen Reddick
17
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
18.
Have you trained your receptionist (or the first person your clients see) to smile
and greet every visitor who comes to the office? That first contact can affect
perceptions about the company. If this person is on the phone or occupied with
another customer, do they acknowledge the visitor with a glance or a smile? Or
do they ignore the visitor? Do customers have to hunt around for someone to
assist them?
If you know ahead of time that the client is coming, make sure everyone knows
the name of the visitor. The receptionist should be prepared with a name badge
or a visitor's pass. Be sure every visitor is greeted in a friendly and helpful way.
• Set professional standards
A client visited a car dealership on a Saturday afternoon. The sales
representative who greeted her was dressed in a white tank top that exposed her
belly button; she also wore a pair of tight black jeans and black-and-white
sneakers. The client took one look at her and decided to go to another
dealership--her competitor.
Are your employees appropriately dressed? Do they always project a
professional image, even on business-casual days? Or are they dressed a little
too casually? Your employees represent the company; their appearance should
reflect that at all times. Think about how their appearance can enhance or detract
from your corporate image.
• Act as the host
When you receive visitors, you are the host. The way you greet them in your
office can affect the outcome of the meeting. So set the tone for a positive
encounter.
Don't keep your visitors waiting. If the receptionist is escorting them to your
office, be sure to come out from behind your desk to greet them. Stand to shake
hands, and shake "web to web"--that is, grasp the other hand fully with your
hand-don't simply clasp the other person's fingers. Shake in the same manner
with men and women alike.
To create the best impression, personally greet the visitors in the waiting room.
Shake hands with your guests and escort them to your office, letting them follow
Ellen Reddick
18
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
19.
you. Upon arrival at your office, allow them to proceed first into the room, and
indicate where they should sit. Do not seat your guests directly across from your
desk; instead, place their chairs to the side of the desk.
Don't accept calls or interruptions during the meeting. When the meeting is over,
stand, shake hands once again and walk your guests back to the waiting room.
• Make the proper introductions
Introductions may seem like a trivial item in the grand scheme of business
interactions, but they are crucial to setting a professional tone in the office. If
clients are at your location for the entire day, make an effort to introduce them to
your senior executives. This simple gesture will help your guests to feel welcome.
As you escort a client through the office, you may run into company employees.
Be sure to make the proper introductions. When deciding who should be
introduced first, use the following order, regardless of gender: client, senior
executives, and junior executives. Provide information about each person you
introduce, so these people can start a conversation. For example: "Mr. Harris
(client), I would like you to meet Ms. Jones (company president). Mr. Harris is our
new client from Chicago; Ms. Jones is our company president." Show equal
respect and gracious behavior to everyone in your office. Your clients will notice
how you treat everyone.
• Be conscious of office courtesies
When escorting a client for a product demonstration or a company tour, use
proper office courtesies. One should never, for instance, discuss office gossip or
talk negatively about company employees in front of guests. I have sat in
reception areas and overheard employees talk about things and people that gave
me a very unflattering view of the company. The same should be applied to
employees that walk through the office talking on their cell phone. You never
know who may overhear a remark that should not be heard at all.
Know the appropriate way to handle entrances, exits, revolving doors and
elevators. As the host, when you get to a door, open it. This rule applies
regardless of gender. It is polite to hold the door for your guest to enter. At
revolving doors, the host enters the door first, leading the way for guests. As you
enter, you might want to say, "I'll wait for you on the other side." Then do so. If
there is more than one person with you, wait until everyone is through the
revolving door before you proceed.
When navigating stairs and escalators, the host leads the way, whether you are
going up or down. When using elevators, allow your guests to enter before you
do; upon exiting, leave the elevator first and hold the door for those following.
Ellen Reddick
19
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
20.
People at the front of the elevator should step off to make room when those in
the back need to exit. Hold the door, allow them to leave and step back into the
elevator. This is much nicer than cramming your body to the sidewall so that they
have room to leave.
Companies that want to stand out from their competition pay attention to making
visitors welcome. Manners make the difference. Greet your visitors graciously,
know what to do during their visit, be considerate of others and create positive
impressions that last and last.
Make a client visit to your company another selling opportunity and reaffirm that
your company deserves their business.
Sound as Good as You Look
Speaking with Ease
Every time you open your mouth and speak, your professionalism is on display.
What you say and how you say it is extremely important to your professional
image.
What we say is not as important as how we make people feel.
Make certain your speech doesn’t detract from your professionalism by paying
attention to the following:
Ellen Reddick
20
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
21.
• Listen to the sound of your own voice. Keep it warm and inviting.
People with a higher than normal voice are thought to be less intelligent
than those with a lower voice. One way to improve the sound of your
voice is to read out loud to yourself every day for 5 or 10 minutes. Read
quality literature, the Bible, poetry, Shakespeare, the classics.
• Speak slowly, clearly and distinctly. Make it easy for the person you
are speaking with to hear and understand what it is you are saying.
• Eliminate the use of non-words. Non-words are meaningless fillers that
speckle our speech, distract from our message, drain our impact, and
annoy our listener. The most common non-words are “uhh,” “ahh,” and
“um.” They also include words such as “like,” “you know,” “well,” “so,”
“okay?” and “sort of.” The excessive use of non-words can undermine
your credibility and make you appear weak and ill-prepared.
• Always use proper grammar. Nothing detracts from your
professionalism faster than using the incorrect tense of a verb or an
incorrect word.
• Avoid using slang such as “hi guys,” “how ya doin,” or casual phrases
like whatever” while rolling your eyes.
NEVER refer to a group of people as “You guys.”
• Avoid poor diction. Often people don’t realize they are using poor
diction because it becomes a verbal habit.
Resources
Be An Interesting Person
Selected Shorts –
Each week on National Public Radio, great actors from stage, screen and
television bring short stories to life. Selected Shorts is an award-winning, one-
hour program featuring readings of classic and new short fiction, recorded live at
New York’s Symphony Space. One of the most popular series on the airwaves,
this unique show is hosted by Isaiah Sheffer and produced for radio by
Symphony Space and WNYC Radio.
see: http://www.wnyc.org/shows/shorts/ KCPW & KRCL radio stations
What you will learn: The power of a quality voice and the importance of using
your voice as a tool.
Ellen Reddick
21
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
22.
C-SPAN2 Booknotes –
48 hours of non-fiction book programming, all weekend, every weekend on C-
SPAN2. It includes book events related to History, Biography, Business, and also
Encore Booknotes programs. Book TV airs from Saturday at 8am ET through
Monday at 8am ET
Also the show: After Words. This Saturday, November 11 at 9:00 pm and
Sunday, November 12 at 6:00 pm and at 9:00 pm Book TV presents After Words:
Nicholas Lemann, author of "Redemption: The Last Battle of the Civil War"
interviewed by Herman Belz, a professor of history at the University of Maryland
See: http://www.booktv.org/schedule
Resources
Books
The Elements of Style William Strunk Jr. & E. B. White
Global Business Etiquette: A Guide Jeanette S. Martin and Lillian H.
to International Communication Chaney
and Customs
Primal Branding Patrick Hanlon
AllEtiquette.com – A Power Guide Fredrica Cere Kussin
First Impressions Ann Demarais, Ph.D
What You Don’t Know About How Others See You
Ellen Reddick
22
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
27.
II. Samuel Eliot Morison. The Oxford History of the American People;Page
Smith. A People's History of the United States.
III. Alfred North Whitehead. Science and the Modern World.
IV. Alfred North Whitehead. An Introduction to Mathematics.
V. E. H. Gombrich. The Story of Art.
VI. Mortimer J. Adler and Charles Van Doren. How to Read a Book
Social Intelligence
In his new book Social Intelligence, Daniel Goleman wrote “Listening poorly is
the common cold of social intelligence. And it is being made worse by
technology. To have a human moment, you need to be fully present. You
have to be away from your laptop, put down your BlackBerry, you end your
daydream and you pay full attention to the person you are with. It may sound
rudimentary but think about how often we just keep multitasking and half pay
attention. We each need to live in the moment fully engaged in what we are
doing.”
Ellen Reddick
27
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
28.
The use of etiquette or true professionalism is exactly that
– being fully present!
SIX KEYS TO STRONG EMOTIONAL INTELLIGENCE
Self-awareness, self-control and empathy form the foundation of strong
emotional intelligence, followed by social expertness, personal
influence and mastery of vision.
• Self-awareness. Knowing what influences our feelings, positively or negatively,
is critical. It’s very important to realize what kinds of situations can put us over
the edge before we get there.
• Self-control. Once we know our “triggers,” we can implement coping
mechanisms. For instance, just knowing that getting cut off on the highway
Ellen Reddick
28
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
29.
produces intense feelings of rage (self-awareness), we can decide to cope better
while driving by listening to soothing music or a recorded
book (self-control).
• Empathy. We must cultivate the ability to look at a situation from another’s
perspective. In our driving example, consider that the driver who cut you off might
have been someone helping an expectant
mother get to the hospital.
• Social expertness. The ability to build relationships requires empathy,
excellent communication skills, and the ability to listen well.
• Personal influence. All leaders are, by definition, required to influence and
persuade others to follow them. This is impossible to do without the qualities
listed above.
• Mastery of vision. A mission statement of sorts outlines intentions and values.
Cell Phones - The Worst Offenses
On the topic of wireless "faux pas," respondents in the Yahoo! HotJobs survey ranked
these five unacceptable behaviors, from most reprehensible to least.
1. Accepting a personal call while in a meeting or presentation
2. Answering the phone or emails while at a business dinner
3. Talking on the phone while in the bathroom
4. Talking on the phone while in close quarters (such as a train, plane, or bus)
5. Answering a work call or email during personal time after work hours
Ellen Reddick
29
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
30.
The Top Eight Rules of Proper Cell Phone Etiquette at Work
A recent study showed that at least 40% of U.S. companies now have a
published cell phone usage policy at work. That percentage will most certainly
rise in the near future. It might be more difficult for the employees of the majority
of firms that have yet to adopt an acceptable use policy. To avoid suffering a
career detour from unacceptable cell phone use in your office, consider the
following generally accepted rules of good cell phone behavior.
1. Turn your ringer OFF or set to “vibrate”. Unless your cell phone is a
company-issued handset for business use, set your unit to vibrate while at
your desk. Even if you’ve selected a tasteful ring tone, repetitive incoming
calls will be noticed (negatively) by co-workers and management.
2. Let “bread and milk” and other unimportant calls go to voicemail.
While it’s wonderful to have a live connection to the important people in
your life, children, parents, other family and friends, frequent chatty calls
during your workday will often reflect negatively on your perceived
concentration on your duties.
3. When you must use your cell phone, find a private, quiet place to
make your calls. Regardless of where you are, most etiquette advisors
agree you should always observe the “ten-foot rule”. Maintain a buffer
zone of at least ten feet from others while you’re using your cell phone.
While at work, you should make every attempt to expand basic etiquette
and find locations that do not infringe on co-workers trying to perform their
jobs.
4. Don’t bring your cell phone to meetings. Neglecting this one rule can
do career damage even when you adhere to most of the other
recommendations. Some etiquette gurus recommend that, should an
important call be expected, either for business or a family emergency, you
could put your cell phone on “vibrate” and bring it with you. Treat this
exception with extreme caution, however. Regardless of the urgency of
the expected call, your boss will most certainly take a very dim view of a
meeting interruption because of your cell phone. It is a far better idea to
leave your cell phone at your desk to avoid any “interruption temptation”.
5. Never use your cell phone in restrooms. This rule may, at first, appear
frivolous, but the statistics indicate it is an important component of cell
phone etiquette. Why? You often do not know who else may be using the
facilities. Should you communicate private information or sensitive work
issues, you may easily be overheard without your knowledge. There are
some well-documented horror stories of information delivered into the
wrong hands by this simple, innocuous rule violation.
6. Eliminating embarrassing ring tones. Should you have a psychological
need to use a cutesy or outrageous ring tone while away from your job, be
very careful when you are at work. Either keep your cell phone on vibrate
at all times at work or change to a more professional ring tone during your
Ellen Reddick
30
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
31.
work day. Along with annoying both co-workers and supervisors, a silly
ring tone can negatively impact your career by displaying a less than
professional, serious image to management.
7. Maintain a low voice during cell phone conversations. Often called
“holding court”, having loud conversations about nothing, a loud voice can
be extremely annoying to anyone within earshot. Often, the ten-foot rule
becomes useless during one of these situations. Unless you are in the
middle of a loud construction site, you should understand that cell phone
microphones are very sensitive and only inches away from your mouth.
There is normally no need to increase your voice to levels used by
seminar leaders talking without microphones.
8. Use text messages instead of voice calls to maintain
professionalism. If you need to communicate on a personal level and
understand that voice calls would be inappropriate, send a text message
to your caller. It’s quiet, fast, and to the point. Unless you’re trying to set a
world’s record for the largest thumbs on the planet, a few text messages
during the workday keeps your lines of communications open without
wasting your time or annoying co-workers.
Try to remember that, through most of recorded history, the world of business
operated quite effectively without constant cell phone use. The basic substance
of successful business operations contains no requirement that cell phones
contribute mightily to your company’s bottom line. Be ready for a formal company
policy regarding cell phone use at work. More and more firms, many reaching
unacceptable levels of frustration, will be joining those who have already
published regulations and publishing restrictive policies.
By following the current rules of good cell phone etiquette, you’ll not only be
ahead of the curve, you may enhance your professional standing at work by
displaying this considerate behavior. Some of your cell phone etiquette may even
be transferred to your friends who might be in need of some guidelines, too.
Professional e-mail Etiquette Guidelines
"There are four ways, and only four ways, in which we have contact with the world. We are
evaluated and classified by these four contacts: what we do, how we look, what we say, and how
we say it." - Dale Carnegie (1888-1955) American Educator
When it comes to your business e-mail communications, you need to make an
impression that can lend to the determination that you are a credible professional
enterprise and someone that will be easy and a pleasure to do business with. You only
have one chance to make that first impression which will be invaluable to building trust
and confidence.
Ellen Reddick
31
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
32.
Top 10 Business Email Etiquette issues that need to be considered with every
commercial e-mail sent.
SUBJECT The window into your e-mail and can determine if your e-mail will be
opened.
Level of Formality Try to avoid the prevailing assumption that e-mail by its very nature
allows you to be informal in your business e-mail.
Addressing How do you address your new contacts?
TO, From, These fields can make or break you:
BCC, CC
TO Type the contacts name formally-John B. Doe - not john b doe or JOHN
B DOE.
FROM Make sure you have your full name formally typed
BCC Use this field when e-mailing a group of contacts who do not personally
know each other
CC Use this field when there are a handful of associates involved
in a discussion that requires all be on the same page
Formatting Refrain from using any formatting in your day-to-day business e-mail
communications.
Attachments If you need to send a large size file business courtesy dictates you ask
the recipient first if it is O.K.
Using Previous Always start a new e-mail and add your contacts to your address book.
E-mail
New
Correspondence Don’t give the perception that you are lazy
Down Edit Do not just hit reply and start typing. Use common courtesy
Be careful with signatures
There you have it! The above Top 10 items will certainly allow your business
communications to rise above the majority who do not take the time to
understand and master these issues. When forging new business relationships
and solidifying established partnerships, the level of professionalism and
courtesy you relay in your business e-mail communications will always gain
clients over the competition that may be anemic, uninformed or just plain lazy in
this area.
Ellen Reddick
32
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
33.
When it comes to business, regardless of mode of communication used,
professionalism and courtesy never go out of style!
Business email etiquette speaks volumes about the sender and the
company where the message was originated.
Keep your professional image at all times following these simple
rules. They are not hard and all the benefits will be yours.
Top 10 List of SMS Etiquette
Text messaging is one of the simplest and most useful means of mobile
communication. No one can doubt the popularity of text messaging and short
messaging service (SMS) in particular - more than 50 billion SMS messages
were sent across the world's GSM networks in the first quarter of 2005, a fivefold
increase over the previous year - and there's no slowdown in sight.
1. Common courtesy still rules. Contrary to popular belief, composing an
SMS while you're in a face-to-face conversation with someone is just
about as rude as taking a voice call.
2. Remember that SMS is informal. SMS shouldn't be used for formal
invitations or to dump your girlfriend or boyfriend. The casualness of SMS
diminishes the strength and meaning of the message.
Ellen Reddick
33
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
34.
3. Don't get upset if you don't get a reply. Before you text someone and get
frustrated at the lack of a response, be sure that they're familiar with how
to use the service, and that their carrier will accept messages from yours.
4. Be aware of your tone. It is extremely difficult to discern tone in text
messages, just as in e-mail. What seems to you to be a completely
innocuous message may be grossly misinterpreted by the recipient,
causing certain discomfort if not irreparable harm.
5. Don't SMS while you're driving. Talking on the phone is bad enough. You
won't know what hit you - or what you hit - if you are pounding out a
message on your keyboard.
6. Leave the slang to the kids. Don't expect your stodgy superiors at work to
be hip to the lingo of the SMS streets. And don't expect to win points with
your kids by trying to be cool, either.
7. Remember that SMS can be traced. Anonymous messages - if you must
send them -are still best sent from Web sites.
8. Be conscientious of others' schedules. Don't assume that because you are
awake, working, not busy, or sober that the person you're texting is as
well. Many a pleasant slumber have been interrupted by recurring "beep-
beep...beep-beeps" of messages.
9. If it's immediate, make a voice call. If you can't get through and your text
message is ignored, there's probably a good reason. There are still some
times when people don't even have a thumb free to respond.
10. Remember that your phone does have an off button. There are very, very
few things in the world that absolutely cannot wait.
General Dining Etiquette
It is important to know how to conduct oneself properly at the table. The rules of
dining etiquette are fairly straightforward and mostly require common sense.
Table Setting. It can be very confusing to be presented with a variety of eating
utensils. (See below) Remember the guideline “to start at the outside and work
your way in.” If you have been given two forks, which are the same size, begin
with the fork on the outside. Many restaurants use the same size of fork for both
the salad and main course.
Ellen Reddick
34
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
35.
Napkin. When dining with others place your napkin on your lap after everyone at
your table has been seated. Do not open your napkin in mid-air. As you remove
your napkin from the table begin to open below the table level and place on your
lap. If you must leave a meal, do so between courses, and place your napkin on
your chair or to the left of your plate. When a meal is completed, place your
napkin to the right of your plate – never on the plate.
Served. Wait for everyone at your table to be served before beginning to eat.
However, if an individual who has not been served encourages you to begin
eating, you may do so. Eat slowly while waiting for their food to be served.
Soup. When eating soup, think of making a circle: spoon away from you, bring
around to your mouth and back to the bowl. Soup is taken from the side of the
soup spoon –it is not inserted into your mouth. Do not slurp or make noises when
eating soup.
Sorbet. This item is often served between courses to cleanse the palate. It is a
light, sherbet texture and depending on when served may be eaten with a fork or
a spoon.
Utensils. Be careful how you hold your utensils. Many people tend to make a fist
around the handle of the utensil – this is the way a young child would grasp a
utensil (not an adult). There are two acceptable ways to use the knife and fork:
continental fashion and American standard. Continental fashion—the diner cuts
the food usually one bite at a time and uses the fork in the left hand, tines
Ellen Reddick
35
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
36.
pointing down, to spear the food and bring it to the mouth. American standard—a
few bites are cut, the knife is laid across the top of the plate, sharp edge toward
you, and the fork is switched to the right hand, if right-handed, tines up to bring
the food to the mouth. (Do not cut more than two or three bites at a time.)
Dessert Utensils. Dessert utensils may be found placed across the top of the
place setting. Place these utensils down for use after the main course is removed
(fork to the left and spoon to the right).
Passing. Pass “community food” such as the breadbasket, salt and pepper, and
salad dressing to the right. Always pass the salt and pepper together. When
passing items such as a creamer, syrup pitcher or gravy boat, pass it with the
handle pointing toward the recipient.
Seasoning. Always taste your food first before using any seasonings. Do not
assume it needs to be seasoned.
Sweeteners. Do not be excessive with sugar or sweetener packets. The rule of
thumb is no more than two packets per meal. Do not crumble the packets but
partially tear off a corner, empty the contents and place to the side.
Bread. Bread/rolls should never be eaten whole. Break into smaller, more
manageable pieces, buttering only one bite at a time. Toast and garlic bread
however may be eaten as whole pieces since they are usually already buttered.
If you are served a piping hot muffin or biscuit, you may break in half crosswise,
butter and put back together. However when ready to actually eat, break it into
small pieces.
Glasses. A variety of types and sizes of glasses can be used throughout the
meal. Remember your items to drink will be located in the area above your knife
and spoon. Coffee cups may be located to the right of the knife and spoon.
Alcohol. Alcohol, if consumed, should be in moderation. In most cases you may
have a drink during the social hour and wine(s) with the dinner. You do not have
to finish your drink. In fact slowly sipping is recommended. If you do not want an
alcoholic drink politely decline.
Buffets. Buffets provide an opportunity to select items you enjoy. Do not
overload your plate. Select a balanced variety of food items.
Pre-Set Meals. With a pre-set meal the host/hostess has already made the
selections and the individuals are served. If allergic, religious or vegetarian
issues arise, quietly deal with these as the server is at your side. For vegetarian
ask if you may have a vegetable plate; with allergies or religion provide the
Ellen Reddick
36
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
37.
server with some options (ex. Allergic to shellfish—ask if they have cod or
flounder and be ready with your preference). This lets the server know what you
can eat. Always eat a little of all items served to you.
Ordering from Menu. As the guest select an item that is in the mid-price range,
easy to eat and you will enjoy. Consider asking your host/hostess for a
recommendation before making your decision. As the host it is helpful to take the
lead in ordering appetizers and wine, if these are to be served.
Finished. When finished with a course, leave your plates in the same position
that they were presented to you. In other words, do not push your plates away or
stack them.
Guest. If you are someone’s guest at a meal, ask the person what he/she
recommends. By doing this, you will learn price range guidelines and have an
idea of what to order. Usually order an item in the mid price range. Also keep in
mind, the person who typically initiates the meal will pay. Remember to thank
them for the meal.
Restaurant Staff. Wait staff, servers, Maitre d’, etc. are your allies. They can
assist you with whatever problem may arise. Quietly get their attention and speak
to them about the issue.
12 Common Dining Mistakes
Today more business is done while dining than ever before. Sales can be lost and careers short-
circuited when poor table manners are displayed. Remember, your table manners are a gift you
give those with whom you dine. They also indicate whether or not you know how to show respect
for others. The following are the most common mistakes noted while dining.
1. Misusing silverware
Gripping the fork and knife incorrectly is the most obvious and common faux pas. Knives
are meant to cut, not saw. The fork and knife should never teeter half off the plate onto
the table. Don't wave your silverware in the air while talking. Silverware placed at the top
Ellen Reddick
37
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
38.
of the plate is for dessert. Place only the silverware that you have used on the plate when
finished.
2. Using the wrong butter plate
There's a simple rule to remember: liquids to the right, solids to the left. Your butter plate
will be near your fork, not your knife.
3. Buttering an entire roll
Bread and rolls are meant to be torn, not cut. A large roll would be torn in half first, then a
smaller piece can be torn off, buttered and eaten. Toast is the exception. The entire piece
can be buttered at once.
4. Improper use of the napkin
The napkin comes off the table only after everyone is seated. It is used to dab the lips,
not scrub the face. If leaving the table temporarily mid-meal, place the napkin on your
chair. At the end of the meal, place it on the table next to your plate, never on the plate,
however.
5. Eating too fast or too slow
Pacing is important when dining with others. Slow down if you notice you're faster than
everyone else. Speed up or leave some food if you're a slow eater. You should never
leave your guest to dine alone, which happens if you're finished way ahead of your guest.
6. Showing food in mouth
This happens when you've taken too big of a bite and then chew with your mouth open,
or continue to talk. This is very unappetizing for others to observe. Small bites are
necessary when trying to converse while eating.
7. Seasoning food before tasting
Without tasting your food, how would you know it really needs seasoning? This can be
seen as an insult to the chef and host. It also can indicate that you jump to conclusions.
8. Washing food down with liquids
The mouth should be cleared of food before beverages are sipped. It's a good habit to
get into, especially with wine. Wine is meant to cleanse the palate and its taste can't fully
be appreciated with food still in the mouth.
9. Passing food incorrectly
The salt is always passed with the pepper. Anything with a handle, such as the creamer,
is passed so the handle is facing the person receiving the item. This is why the correct
way to pass food the first time around is to the right=counterclockwise.
10. Leaving lipstick marks
Lipstick should be well blotted so not to leave marks on cups and glasses. It's a real
turnoff.
11. Grooming at the table
This is another turnoff. Don't touch your hair or apply makeup while at the table. And
certainly don't pick your teeth at the table. Excuse yourself from the table to remove
something from your teeth...or to apply makeup.
12. Poor posture
Sit up straight, don't lean on your elbows or forearms, don't rock in your chair, and keep
your elbows close to your side.
When You are the Host
Doing business over meals is a ritual that has existed for centuries. Taking
clients to breakfast, lunch or dinner has long been an effective way to build
relationships, make the sale or seal the deal. These business meals are
essentially business meetings. Knowledge of your product or your service is
Ellen Reddick
38
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
39.
crucial to the success of the meeting, but so are your manners. Too many people
jeopardize an opportunity because they fail to use good dining etiquette. Here
are a few basic rules to make the experience pleasurable and profitable:
• Know your duties as the host. You are in charge. It is up to you to see that
things go well and that your guests are comfortable. You need to attend to every
detail, from extending the invitation to paying the bill.
• Plan ahead when you issue the invitation. Allow a week for a business
dinner and three days for lunch. Be certain that the date works for you. That
might sound obvious, but if you have to cancel or postpone, you can look
disorganized and disrespectful of your client's time.
• Select a restaurant that you know, preferably one where you are known. This
is no time to try out the latest hot spot. Being confident of the quality of the food
and service leaves you free to focus on business.
• Consider the atmosphere. Does it lend itself to conversation and discussion?
If you and your clients cannot hear each other over the roar of the diners and
dishes, you will have wasted your time and money.
• Let the staff know that you will be dining with clients. If your guests suggest
a restaurant new to you, call ahead and speak with the maître d'. Make it clear
that you will be having a business meal and picking up the check.
• Arrive early. This is the perfect time to give your credit card to the maître d’,
and avoid the awkwardness that can accompany the arrival of the bill.
• Take charge of seating. Your guests should have the prime seats—the ones
with the view. As the host, take the least desirable spot—the one facing the wall,
the kitchen or the restrooms.
• Allow your guests to order first. However, you might suggest certain dishes
to be helpful. By recommending specific items, you are indicating a price range.
Order as many courses as your guests, no more and no less, to facilitate the flow
of the meal. It is awkward if one of you orders an appetizer or dessert and the
others do not
• As the host, you are the one who decides when to start discussing
business. That will depend on a number of factors such as the time of day and
how well you know your clients. At breakfast, time is short, so get down to
business quickly. At lunch, wait until you have ordered so you will not be
interrupted. Dinner, which tends to be the most social meal, is a time for building
rapport. Limit the business talk, and do it after the main course is completed.
Ellen Reddick
39
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
40.
• When you know your clients well, you have more of a basis for small talk.
However, because you have established a business friendship, you can eliminate
some of the chitchat when time is an issue. When you don't know your clients
well, spend more time getting acquainted before launching your shoptalk.
• Handle ANY disasters with grace. With all your attention to detail, things can
still go wrong. The food may not be up to your standards, the waiter might be
rude or the people at the next table boisterous and out of control. Whatever
happens, be part of the solution not the problem. Excuse yourself to discuss any
problems with the staff.
• Limit the alcohol you drink. The three-martini lunch is mostly a thing of the
past. However, cocktails and wine are still part of the business dinner. Since
alcohol can have the same effect as truth serum, keep your consumption to one
or two glasses. When guests are drinking liberally and you sense trouble, excuse
yourself and discreetly ask the server to hold back on refilling the wine glasses or
offering another cocktail.
Your conduct throughout the meal will determine professional success. If you pay
attention to the details and make every effort to see that your clients have a
pleasant experience, they will assume that you will handle their business the
same way. You are laying a foundation for a solid, powerful business relationship
by paying attention to details.
When You are the Guest
The business meal has become standard operating procedure in business. Over
half of all business is finalized at some type of a meal and job interviews often
include a meal as part of the interview process. Many times we are put on the
spot and our behavior and manners are on display. Knowing what it takes to be
someone’s guest at a business meal is as important as being the host. The
Ellen Reddick
40
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
41.
following guidelines will help you make a positive impression when you are the
guest:
• Confirm the day and time if the invitation was made more than a week in
advance.
• Arrive on time. Call ahead if you will be more than five minutes late. If
you cannot reach your host directly, call the restaurant and leave a
message with the maitre d’.
• Follow your host’s lead in ordering beverages.
• Order an entrée from the menu in the average price range. Ask for
suggestions from the host. Don’t order the most expensive item on the
menu.
• Do everything in moderation. It is not your last meal, so don’t stuff
yourself. If you are on an interview, don’t drink alcohol. Otherwise, if the
occasion calls for a drink, never over do it.
• Do not complain about the service or the meal. Remember that your host
is paying for the meal and you should behave graciously,
• Set a comfortable atmosphere and ask questions to encourage
conversation.
• If you must cancel, call personally, apologize and suggest a rescheduling.
• Thank your host for the meal and their time. Send a thank you note to
your host. It takes a short time but makes a big impression
The Power of Professional Presence
Ellen Reddick
41
Impact Factory
ellen@impactfactoryutah.com
801.581.0369
42.
• In the business environment, you plan every
move with potential clients.
•
• You arrange for the appointment, you prepare
for the meeting, you rehearse for the
presentation, you prepare as a host for dining
with clients, but in spite of your best efforts,
potential clients pop up in the most
unexpected places. Leave nothing to chance.
Every time you walk out of your office, be
ready to make a powerful first impression…it
is the best selling technique.
The 5 Ps of Professional Success
Ellen Reddick
42
Impact Factory
ellen@impactfactoryutah.com
801.581.0369 | {
"pile_set_name": "Pile-CC"
} |
Archive for June, 2009
Another piece of shock news as Michael Jackson dies unexpectedly at what is a relatively young age of 50. And of course we are all both horrified and fascinated by it, whether or not we were ever fans of him or his music. These kind of unexpected twists, especially in relation to someone we all know about, highlight the tragic nature of our existence. Because there is a Michael Jackson in us all. A combination of being very public and very reclusive, wanting people to know and recognize us and yet wanting to have our own space. And, like him, conflicted about our identities and with low points matching the highs. The media are having a field day speculating about his health, his childhood, his mental state, his apparent loneliness, his talent, now tinged with a kind of wistful speculation as to what might have been had he lived longer.
It’s not quite another Princess Diana moment, but as with all celebrity lives and deaths these things hold up a mirror to ourselves, our own hopes and aspirations, and the reality of our struggles. An opportunity to face up to the baggage we all inherit from childhood, and also to reflect on the contribution we can make to the wellbeing of those who come after us. Whatever the truth about Michael Jackson’s lifestyle and health, his music will live on in the lives of his many fans. Thanks for the memories. RIP Michael Jackson – a ‘Rare Iconic Personality’.
It’s not very often that baptisms get into the tabloid press, though bishops quite often do – frequently for the wrong reasons. But this story surely highlights both a growing trend for the baptism of adult converts, and also shows that a bit of spectacle can be a good thing in terms of getting into the news. Maybe if more of church happened outside the four walls of church buildings, there would be more interest by the general public. There’s something safe about being able to stand on a river bank to be part of worship, as compared with being trapped in pews or behind closed doors. But then, John the Baptist knew all about that a long time ago.
This week saw the end of a long process to launch the Mission Shaped Ministry course in Scotland. The course itself emerged out of the Fresh Expressionsinitiative of the Church of England and Methodists to encourage new forms of church – and it’s been successful way beyond anyone’s wildest dreams in England, Wales, and Ireland.
Scotland has had to wait a bit longer, but in September-October this year there will be a six-week taster (Mission Shaped Intro) in Edinburgh and Glasgow, and then starting in January 2010 the entire course will be presented in Glasgow and Inverness. The church mice will be involved in Inverness, along with Duncan Macpheron, minister of Hilton Church, while the Glasgow course will be led by Alan McWilliam and David Currie.
We took a couple of days off this week, thinking that June might actually be summer in Scotland. How wrong can you be! It wasn’t just all four seasons in the proverbial 24 hours, but all four of them in the space of about 40 minutes. The drive to Glasgow on Monday started in dull, though dry weather as we left rural Aberdeenhire, but by the time we were passing Stirling there was actually snow at the side of the road. We had to look at least twice, but sure enough – not hailstones, but real snow. Not to mention a sky as black as night and flooding all over the place. Then just 15 minutes later, bright sunshine, which continued all the way to Glasgow and for the rest of the day. Still, it was just as well that the main attraction was not outdoors.
And it was well worth travelling through fire and brimstone to be there! The main attraction was a concert by The Priests, three Irish priests who’ve just shot to fame from nowhere in less than 12 months following the release of their first album last Christmas.
In an obviously unscripted dialogue, their informal laid-back style of conversation throughout the concert was something else. Fun, faith, spontaneity, and a lot of easy talk about God and the spiritual, not to mention their fantastic singing just made it a great occasion. And where else would you find a concert where the most prominent projected icon is a cross? And it wasn’t all a bunch of old grannies either: we sat next to a couple of twenty-something young women who must have been first in line to get there, and whose excitement at seeing The Priests in person was … well, infectious.
Next day we went to see an exhibition of Edvard Munch’s work, which (as we expected) evoked the exact opposite set of emotions, with his obsessions with failed love affairs, death and, of course, stress – most famously expressed in his painting The Scream.
But as well as that there are various versions of his Madonna on display, along with an intriguing portrait of Nietzsche, and a striking self-portrait. The exhibition runs till September, and is free so well worth a visit if you like that sort of thing.
After that, a walk down the street to the Kelvingrove Gallery to take (yet another) look at Salvador Dali’s Christ of St John of the Cross,
and while we were viewing that we had an unexpected (and free) organ recital.
Of course, all this was interspersed with new conversations, about the meaning of life, faith, spirituality, theology … and how cool it would be to have The Priests as pastors. And on the way home we called by this interesting studio. A two day outing doing these things probably tells you something about us …
We’ll comment on the book and its contents once we’ve finished reading it, and had a chance to talk about it. But the question of whether fresh expressions of church are really as fresh as we all think came to our attention with the recent death of the Revd Bill Shergold. He’s not typically hailed as one of the heroes of either fresh expressions or emerging church, and quite likely most readers of this blog will be wondering who exactly he was and why we should be bothered to mark his passing. After all, he was 89 when he died last month. And he trained as a priest at Mirfield, a high church college if ever there was one. And his most significant ministry was at the Eton Mission in London, with close connections with the posh school that gave it its name. So you might think he would be about the last person to have pioneered anything remotely missional, let alone truly creative. And you’d be wrong. He was the founder of the 59 Club, a bikers community, which he started when he realized that here was a way of connecting faith with what at the time (the 1950s) was a growing recreational trend among young men in particular. To read the story of how and why he did this, in his own words, go here. He clearly thought he was just doing what came naturally, given his calling as a parish priest, and his efforts were not blessed with all the trendy terminology that seems an essential part of the emerging, emergent, fresh expressions scene today. Which we all probably need to be reminded of: that there have always been mavericks and pioneers who saw missional openings in unlikely places and who stepped outside of the box in order to see where God might be at work. Bill Shergold was one of them. And at a time when Christians were far less tolerant of the non-traditional than they are today. But then, he did, as a newspaper headline of the time says, wear ‘leathers under his cassock’ – which, obviously, means that he wore a cassock over his leathers. When so many are preferring to dispose of cassocks and other bits of tradition, we might have something to learn from him.
This week has certainly been a long time for UK politicians, most notably Gordon Brown, who looks like being on his way out as prime minister. He makes a lot of having been raised in a Church of Scotland manse, and his Presbyterian values and ‘moral compass’, though the point of all that is probably a bit lost on many people today, if for no other reason than they’ve heard it so many times now and it’s not altogether clear what it all amounts to. What can in one context be tenacity and commitment can all too easily become stubbornness and aggression. Ask any Presbyterian! The ‘I’m right and you’re all wrong’ attitude has been the cause of many splits and schisms over the years (centuries even) not just in Presbyterian circles, but throughout Scottish churches more generally. One thing we’re thinking about right now is whether this sort of righteousness is an inevitable outcome of a certain kind of theology, or whether that connection is secondary, and other factors such as personality type play a bigger role. It’s certainly the case, in our experience anyway, that folks from other backgrounds seem to be a bit more laid back about things, not taking themselves too seriously, and more ready to know when they need to change. | {
"pile_set_name": "Pile-CC"
} |
On September 22nd, India take on New Zealand at Kanpur in the first of three Test matches between the sides. Both sides meet off the back of contrasting success in their last Test series. India enter the series off the back of a “dominating” 2-0 series win in the West Indies. On the other hand, New Zealand suffered a humiliating loss at the hands of South Africa. Although the scoreline of 1-0 suggests a close series, it was actually a terribly one-sided affair. The first match was washed out, and in the second, South Africa won by a huge margin of 204 runs. The difference between the success of the two sides? The captaincy.
A Good Toss to Lose
Over the course of five days, a Test captain has to make several crucial decisions. Some will argue that none are as crucial than that made at the toss. When Kane Williamson, captain of the black caps, won the toss in the series decider against South Africa – it seemed that they had a huge advantage in the game. Until Kane Williamson chose to field.
South Africa thrived in the batting-friendly conditions, and ended up declaring in both of their innings. By the time Williamson’s men were batting on the final day, the pitch had significantly deteriorated. The dismissal of Ross Taylor in the fourth innings to a Dale Steyn delivery that hardly bounced summed up New Zealand’s poor fortunes, as they were skittled for just 214 and 195.
Meanwhile, in the West Indies, India captain Virat Kohli was more successful in his judgements. One such example can be found in the first Test match in Antigua. There was a light covering of grass on the otherwise straw covered wicket, and local experts predicted that the first session would be the best to bowl on. However, Kohli elected to bat – knowing that a strong first session would reap rewards when the pitch flattened out in the later sessions. Kohli’s judgement was sound. India made it to 72-1 at lunch, with them eventually declaring on 566.
Making a decision at a toss is never easy. You may win the toss on a batting paradise and elect to bat, but find yourself at 2-3 due to poor batting irrelevant of the pitch. That’s what happened to Azhar Ali in the recent ODI at Lord’s.
However, the experience of a captain is what governs their decision. Both Williamson and Kohli are very young captains and are gaining experience all the time. Kohli took over test captaincy from Mahendra Singh Dhoni prior to India’s tour of Australia in the winter of 2014 and has captained India to three series victories already. Moreover, by being able to captain an IPL franchise, Kohli had been previously exposed to captaincy – ensuring that he already had some vital experience.
Kane Williamson, though, only took over captaincy earlier this year, after Brendon McCullum retired. His first Test series was against Zimbabwe, which posed no challenge to the talented New Zealand line up. This was the first real test of his captaincy. It is fair to say that it did not go to plan and left him distraught after one poor misjudgement.
What to Expect from the Captains
An away series in India is always a challenge. For Kane Williamson it will be a challenge, perhaps even tougher than South Africa. A key focus point for both captains will center around their spin attack and how best to utilise it. As we have seen with Virat Kohli, he is not afraid to hand the new ball to the spinners if the pitch is turning a lot. In fact, Ravichandran Ashwin is statistically one of the best new ball bowlers of the decade. Against Sri Lanka and South Africa, Ashwin was handed the responsibility of the new ball frequently, and he thrived in those conditions.
Yet, it will be interesting to see the approach taken by Kane Williamson. It would be a very bold move to take the new ball away from the talented pair of Trent Boult and Tim Southee, which would only be done by a daring captain. Another reason why Williamson will be reluctant to do this, is the fact that the spinners at his disposal are not as prolific as India’s. While the pair of Ish Sodhi and Mitchell Santner contains two highly talented bowlers, who have displayed their skill in limited over matches, they are yet to settle into Test cricket.
Another crucial aspect which both teams must decide, is the composition of both sides. Before they become heavy turners, Indian pitches are usually quite flat and favour batting. Against South Africa, New Zealand opted for 5-specialist batsmen – with BJ Watling, the keeper, at 6. More importantly, Williamson played 4 specialist fast bowlers. It is expected the Doug Bracewell will be replaced by Sodhi, but that leaves New Zealand still playing 3 fast bowlers. A key question for Williamson is whether he ought to remove a fast bowler for an extra specialist batsman or a batting all rounder.
Playing only 2 seamers in India is not ridiculous at all. In the Nagpur Test against South Africa, Kohli played just one fast bowler in the form of Ishant Sharma. They won that Test by over 300 runs.
This shows the extreme nature of the pitches in India, meaning that unorthodoxy is usually a key to success. Therefore, with this in mind, it will be intriguing to see the solution proposed by Williamson, as he strives to find the right balance in his side.
Many experts predict that Williamson will on the whole opt for three fast bowlers and two spinners on the tour. However, he will need to accommodate according to each of individual pitch – as no two pitches are the same. After all, it may be the case that the pitches in India surprise us.
This conundrum is a much easier question to Virat Kohli. His experience means that he has captained a series played in near identical conditions. Moreover, in that series India won crushingly – proving that he succeeded in his captaincy. Therefore, for Virat Kohli, it is just a case of sticking with his tried and tested methods to produce the same results.
Verdict on New Zealand in India
This series is expected to be a close contest and will be sure to entertain the crowds one way or another. However, India hold a significant advantage going into the series. Not only is their current form much better, but also the home advantage is a huge benefit. It is for this reason that India will win the series, but the approach taken by both captains will provide a great insight into their cricketing minds, and will be great indication of the Test futures of the two sides. | {
"pile_set_name": "OpenWebText2"
} |
Out of Stock!
The Body pillow is filled with slow release, soft and silky fiber, with a special ultrasoft fabric case. This 56” long pillow is ideal for side sleepers and pregnant women as it improves posture and increases comfort for the spine, arms and legs in addition to improving blood circulation. Complimentary 300 thread count white self stripe pillow cover with every Body pillow. | {
"pile_set_name": "Pile-CC"
} |
Introduction
============
Gingival reactive lesions like pyogenic granuloma have frequent occurrence around natural dentition, however, their association with dental implants is not common. The causes of pyogenic granuloma (PG) in relation to dental implants are not clear mainly due to few published cases ([@B1]-[@B8]).
Tooth-related PG is a result of tissue response to minor injury or chronic low-grade irritation ([@B9]-[@B16]). Clinically, oral PG is characterized as a soft mass of smooth or lobulated appearance that could be sessile or pedunculated and frequently presents ulceration. The lesion grows rapidly for a few weeks and the colour ranges from pink to red purple and haemorrhage may occur either spontaneously or after minor trauma ([@B8]). Its incidence is relatively common and accounts for 3.81-7% of all biopsies harvested from the oral cavity ([@B13]-[@B16]).
Microscopically, the lesion is characterized by prominent capillary growth in hyperplastic granulation tissue, which suggests a strong activity of angiogenesis. The blood vessels often show a clustered or medullary pattern separated by less vascular fibrotic septa, leading some authorities to consider PG as a polypoid form of capillary hemangioma ([@B17]).
The lesions of PG may be found in the oral cavity or extraorally. The most frequent intraoral localization is the gingiva (about 60-70%), but lesions can occur on the lips (14%), tongue (9%), buccal mucosa (7%) and palate (2%) ([@B18]-[@B24]). Possible treatment methods are excision, curettage, cryotherapy, sclerotherapy, chemical and electrical cauterization, cryotherapy and the use of lasers with the carbon dioxide (CO2) or argon ([@B25]-[@B29]). Conservative local excision is the preferred form of treatment and recurrence rates after excision range from 0% to 16% ([@B29]).
However, to the best of the authors' knowledge, only 5 cases of pyogenic granuloma in association with a dental implant have been reported in the international literature ([@B1]-[@B3],[@B7],[@B8]). Within the context of the scarce information available on these lesions, the aim of the present study was to report 10 novel clinical cases of pyogenic granuloma in association with titanium dental implants and to elucidate potential risk factors. Finally, the presence of marginal bone loss was evaluated.
Material and Methods
====================
Patients charts at the service of oral medicine of Anitua's Dental Clinic (Alava, Spain) were revised from 1991 to 2011. Patients selection was based on the following inclusion criteria:
• Treatment of pyogenic granuloma.
• The presence of histopathological diagnosis.
• Lesion in relation to dental implants.
All patients who did not fulfill all inclusion criteria were excluded from the study.
Data were collected to report on patient age, gender, patient´s disease, lesion site, type of dental implant (surface and morphology), predisposing factors (trauma, prosthesis type, poor oral hygiene), clinical and radiographic features, diagnosis, treatment and recurrence. Orthopantomography (OPG) of all lesions were examined to compare the presence or absence bone resorption around dental implants.
A descriptive statistical analysis of all variables were performed. Then the relationship between PG and marginal bone loss was analyzed by nonparametric Spearman correlation. The effect of surface type on marginal bone loss was also analyzed with one-way ANOVA and Levene post hoc test. The statistical significance was set at *p*-value \< 0.05. All the statistical analyses were performed using the SPSS v15.0 for Windows statistical software package (SPSS Inc., Chicago, IL, USA).
Results
=======
Ten patients with pyogenic granuloma in relation to dental implants had been identified. They were 2 males and 8 females. Patients' age ranged from 21 to 92 years and all were non-smokers. Five of the ten patients (50%) had systemic disorders: cardiac arrhythmia (1 patient), hypertension (2 patients), atrial fibrillation (2 patients), Type II diabetes mellitus (2 patients), hepatitis C (1 patient ), hypothyroidism (1 patient). Within the group of patients with systemic disease, 3 of them were using 1 to 2 drugs daily, whereas the remaining patient took more than 2 drugs.
With regard to oral hygiene habits, 20% of patients reported to brush once a day, 50% did twice daily and 30% brushed three times a day. A 90% of the patients received professional prophylaxis twice a year and the other 10% once a year. In the use of hygiene products the obtained results were as follows: a) use of mouthwash: only was used by 3 patients (37.5%), b) use of dental floss: only one patient (12.5%), and c) interproximal brushes: 3 patients (37.5%).
The distribution of PG lesions was even between maxilla and mandible (50% for each region), and the most common oral site affected by PG was the area of tooth 41 (2 cases).
The development of PG was related to only accumulation of dental plaque (one patient), bad prosthetic design (one patient), and both factors (one patient). In 4 patients, there had been a combination of tissue pressure by the prosthesis and poor oral hygiene. However, no etiological factor could be related to the development of PG in 3 patients. The clinical size of the lesions ranged from 1.1 x 0.6 mm to 36 x 19 mm. The mean diameter was 7.2 mm. All the lesions were excised and sent for histological examination. The defects were covered with a autologous fibrin membrane (Anitua's protocol). During the first week after the operation, all patients were given analgesic and 0.2% chlorhexidine gluconate mouthwash. During the follow-up period (range two months to 10 years), there were no recurrences.
The histopathological reports indicated the diagnosis of PG and the description of highly vascular proliferation that resembles granulation tissue (Fig. [1](#F1){ref-type="fig"}).
Figure 1Histological images of the pyogenic granuloma showing an appearance similar to granulation tissue. The histological type of the pyogenic granuloma is non-lobular capillary hemangioma. Arrow heads label blood vessels surrounded by connective tissue.
The surfaces of the implants associated with the lesion were smooth (2 implants), machined (3 implants) and rough (5 implants). In no case there was a natural tooth adjacent to the implants related to the lesion. The characteristics of diameters and lengths of the implants studied can be seen in figure [2](#F2){ref-type="fig"}. The average load time of the implants studied was 115 months (SD = 67.5), ranging from a range of 9 to 184 months. Oral rehabilitation was performed with complete prosthesis in 9 patients. The mean mesial bone loss was 2.14 mm (range 0 to 6.50 mm, SD = 2.07) and the mean of distal bone was 1.66 mm (range 0 to 3.75 mm, SD = 1.21.
Figure 2Diameter and length of dental implants related to the pyogenic granuloma.
There were no statistically significant association between the PG area and the marginal bone loss. However the smooth implant surface showed a significant influence on bone loss (Anova: *p* = 0.001) (Fig. [3](#F3){ref-type="fig"}).
Figure 3Peri-implant bone loss grouped by type of surface. The bone loss was the highest for implants with smooth surface.
Discussion
==========
The clinical and histopathological findings have confirmed the diagnosis of pyogenic granuloma in 10 patients. The present study is the one with the highest number of implant-related PG lesion that are available until now in the scientific literature. These PG lesions have been diagnosed as non-lobular capillary hemangioma. There are two histological types of PG. The first type is characterized by proliferating blood vessels that are organized in lobular aggregates. This histological type of PG was called lobular capillary hemangioma (LCH type). The second type (non-LCH type) consist of highly vascular proliferation that resembles granulation tissue ([@B1],[@B4],[@B11]).
Literature data indicated that PG is rarely associated with dental implants, as there are only five cases reported ([@B1]-[@B3],[@B7],[@B8]). However, other reactive lesions such as gingival hyperplasia caused by phenytoin, allergy to titanium abutments or peripheral giant cell granulomas have been reported in the international literature. Causes of conventional oral pyogenic granulomas are not clear, although it has been shown that different stimuli irritants that can trigger them, such as repeated trauma, poor oral hygiene and hormonal problems ([@B1]-[@B20]). About 30-50% of patients with PG have a history of local trauma ([@B9]).
Considering PG, in the case reported by Dojcinovic *et al.* ([@B1]), the inappropriate healing cap has resulted in dental plaque accumulation and chronic inflammation of the peri-implant tissues, triggering the development of a PG. However this was not the cause for PG in the case reported by Olmedo *et al.* ([@B2]). The authors have pointed out to the presence of "metal-like" particles and have postulated that these particles could be the result electrochemical phenomena, corrosion, friction, or a synergistic combination of these events ([@B4],[@B5]). Once released, these particles may trigger an inflammatory response mediated by cytokines and macrophages ([@B5]). This inflammatory reaction could perpetuate the pseudo-periodontal pocket that generates the lesion around the implant ([@B5]).
In the case reported by Etöz *et al.* ([@B3]), the presence of a gap between the alveolar bone and implant surface could be associated with the occurrence of pyogenic granuloma. Although bone splitting technique was adequately performed, trauma from the upper dentition and lack of adequate keratinized mucosa could result in soft tissue invasion and may have been responsible for PG development ([@B3]). Kang *et al.* ([@B8]) have stated that the causes of the occurrence of PG was unclear however, the antithrombotic therapy may have some involvement in the development of the lesion.
In this study, PG was related to only accumulation of dental plaque (one patient), bad prosthetic design (one patient), and to both factors (one patient). The mean age of patients was 74.5 years and most of them have decreased manual dexterity. The bad prosthetic design with flanges could difficult the maintenance of good oral hygiene and could predispose the development of PG around dental implants. In 4 cases, there has been a combination of tissue pressure by the prosthesis and poor oral hygiene. However, no etiological factor could be related to the development of PG in 3 patients where implants have a smooth surface. Previously published studies have reported the association of PG to implant with roughened surface ([@B1]-[@B3],[@B7],[@B8]). There are no published data on smooth or machined surfaces.
In the histological analysis, the presence of metal-like particles were searched for. Such particles could not be found in any of the 10 biopsies and thus could not be related to the development or progression of PG.
The marginal bone loss has shown no association with the presence of PG. However, Implant's surface has affected significantly the marginal bone loss around dental implants. This results can indicate that PG showed no predilection to specific surface type.
With the data obtained from this study and others in the literature we can conclude that pyogenic granuloma in association with dental implants seems to respond to the same stimuli that triggers tooth-related PG. This lesion should be included in the differential diagnosis of soft mass growth around dental implants. PG had no significant correlation with the marginal bone loss around dental implants.
| {
"pile_set_name": "PubMed Central"
} |
Introduction {#sec1}
============
In total hip arthroplasty (THA), optimum component position is critical for long-term success of the operation by decreasing rates of wear, aseptic loosening, and dislocation \[[@bib1], [@bib2], [@bib3], [@bib4]\]. Recognizing the importance of acetabular component position, Lewinnek et al published a "safe zone" of 5° to 25° for anteversion and 30° to 50° for acetabular abduction based on their experience with dislocations after posterior THA \[[@bib5]\]. This still serves as the standard for ideal acetabular component position but has been called into question given the importance of the spinopelvic relationship \[[@bib6],[@bib7]\]. In addition to acetabular component position, emphasis has also been placed on femoral component positioning.
Historically, surgeons have identified the importance of keeping the femoral component out of varus because of increased rates of failure with varus cemented femoral stems \[[@bib8],[@bib9]\]. With the use of cementless femoral fixation, varus positioning of the femoral stem has not been shown to lead to the same increased failures \[[@bib10]\]. However, as compared with cemented femoral stems, many cementless femoral stems provide less ability to adjust the version of the component as a stable press-fit requires the stem to adapt to the proximal geometry of the native femur. Consequently, recent attention has been given to the combined version (CV) of the acetabular and femoral components, with the goal of improving impingement-free range of motion and decreasing instability \[[@bib11], [@bib12], [@bib13]\]. The concept of CV was originally introduced by Ranawat, and he described the use of the "Ranawat sign" to determine CV intraoperatively when using the posterior approach \[[@bib14]\]. While no optimum femoral version has been described, Dorr proposed a CV safe zone of 25°-50° based on previous anatomical studies and his experience with decreased instability in this range \[[@bib15]\]. More recent studies have attempted to quantify a combined anteversion that minimizes impingement \[[@bib16],[@bib17]\].
Native femoral anteversion can vary a great deal, and intraoperative judgment of femoral component version can be difficult. Using preoperative computerized tomography (CT) scans of a group of 46 patients scheduled for primary THA, Bargar et al \[[@bib18]\] found a large range of native femoral version from 6° of retroversion to 33° of anteversion. Dorr et al compared the surgeon's estimate of femoral component anteversion in the posterior approach with the postoperative CT measurement of version and found a poor precision of the surgeon\'s estimate with a correlation coefficient of only 0.688 \[[@bib19]\]. In addition, this study found that only 45% of the femoral stems landed within the desired range of 10°-20° of anteversion.
In direct anterior total hip arthroplasty (DA-THA), femoral component broaching and insertion occurs while the patient is positioned supine with the leg fully extended, and the leg below the knee is often draped from the surgeon\'s view. Despite published results of comparable patient outcomes from the DA-THA with other THA approaches, some have questioned the ability to appropriately orient the femoral component with respect to femoral anteversion, via this approach \[[@bib20], [@bib21], [@bib22], [@bib23]\]. Previous studies have reported on improved acetabular component positioning in DA-THA \[[@bib24],[@bib25]\]. However, no prior study, to our knowledge, has examined the combined anteversion of the femoral and acetabular components in DA-THA. This study aims to analyze the combined femoral and acetabular anteversion with cross-sectional imaging and quantify this relative to the CV "safe zone" described by Dorr.
Materials and methods {#sec2}
=====================
After obtaining institutional review board approval, patients were approached for enrollment in the study. An patient who was undergoing a primary DA-THA from the senior author (JBM) was a candidate for enrollment. Patients with femoral or acetabular hardware were excluded from this study. Thirty consecutive patients were enrolled in the study. Four blinded observers independently recorded the measurements (2 fellowship-trained arthroplasty surgeons, one hip and knee fellow, and one orthopaedic resident). All implants were positioned using intraoperative fluoroscopy based on preoperative templating. A CORAIL femoral stem (DePuy, Warsaw, IN) and a PINNACLE acetabular cup (DePuy, Warsaw, IN) were used for all the cases. The senior author standardized intraoperative images by matching the anteroposterior (AP) pelvis fluoroscopic view with the preoperative AP pelvis standing radiograph.
One month after surgery, all patients had a standing AP pelvis and a cross-table lateral radiograph taken, which were used for acetabular component position measurement. Abduction and anteversion measurements of the acetabulum were made from the digital radiograph using the TraumaCad (Voyant Health, Columbia, MD) hip abduction measurement tool. Femoral component position measurements were taken from limited supine CT scan of the hip and knee with 2.5-mm cuts (General Electric BrightSpeed, Fairfield, CT). CT was not selected for acetabular component position to minimize patient radiation exposure. Angular measurements were calculated using the axis of the top of neck of the femoral stem relative to both the posterior condylar axis (PCA) and the transepicondylar axis (TEA).
The CV was then calculated for the TEA and the PCA by adding the femoral anteversion calculated from the CT scan with the anteversion measured from the standing AP pelvis radiograph.
Statistical analysis {#sec2.1}
--------------------
Measurements from the 4 observers were combined, and the mean and standard deviation were calculated. The Pearson correlation coefficient was also measured for each observer, with the kappa values reported, and compared with the group for all measurements. The mean for each measurement was used to determine the number of components placed in the "safe zone." Statistical analysis was performed with the use of SAS software (SAS Institute, Raleigh, NC).
Results {#sec3}
=======
Of the 30 enrolled patients, 29 had an appropriate CT scan obtained. One patient had a CT scan performed without adherence to the protocol precluding reference of femoral version to the axes of the knee and was excluded from the results.
The mean acetabular abduction and anteversion were 39.3° (standard deviation \[SD\] = 4.2°) and 27.2° (SD = 4.7°), respectively. The mean stem anteversion was 17.5° (SD = 10.8°) from the TEA and 21.7° (SD = 11.3°) from the PCA. Ten of the 30 cups were placed inside of the "safe zone" of Lewinnek for acetabular anteversion, but all cups were within the "safe zone" for abduction ([Fig. 1](#fig1){ref-type="fig"}).Figure 1The Lewinnek "safe zone." Ten of the 30 cups were placed inside of the "safe zone" of Lewinnek for acetabular anteversion, but all cups were within the "safe zone" for abduction.
Combined femoral and acetabular component anteversion from the TEA resulted in 79% (23 of 29) of patients within the "safe zone" of 25°-50° with accurately oriented components ([Fig. 2](#fig2){ref-type="fig"}).Figure 2Combined anteversion. Combined femoral and acetabular component anteversion.
Pearson correlation coefficients were high for both stem anteversion from the TEA (R = 0.96) and the PCA (R = 0.98); however, the kappa coefficient for interobserver reliability for combined component anteversion was greater for the TEA (kappa = 0.83 vs 0.65).
Discussion {#sec4}
==========
Component positioning has been recognized as an important factor in the long-term survival of THA \[[@bib5],[@bib12],[@bib26]\]. Muller et al. \[[@bib27]\] suggested a cup anteversion of 10°-15° and femoral anteversion of 10° to be ideal. Lewinnek et al. \[[@bib5]\] followed with their study that found a lower dislocation rate when the acetabular components were positioned in a safe zone of 30°-50° of inclination and 5°-25° of anteversion. A study by Biedermann et al. \[[@bib28]\] found the lowest dislocation rates with acetabular components positioned at 45° of inclination and 15° of anteversion. More recently, Dorr proposed a CV safe zone of 25°-50° based on previous anatomical studies and his experience with decreased instability in this range \[[@bib15]\].
Many authors have begun to appreciate the importance of the combined femoral and acetabular anteversion on dislocation rates and impingement \[[@bib3],[@bib11],[@bib12],[@bib29]\]. Ranawat and Maynard \[[@bib6]\] suggested the importance of the combination of femoral and acetabular anteversion and recommended 45° for women and between 20° and 30° for men. Jolles et al. \[[@bib12]\] found that when the combined anteversion was outside of a range of 40°-60°, the patient's dislocation was 6.9 times higher. Hisatome and Doi \[[@bib29]\] examined combined anteversion in a mathematical model to find the optimum positions to avoid neck impingement with different sized components. They recommended an ideal position, while not accounting for patient's pelvic inclination, of 45° of cup abduction, 25° of cup anteversion, and 25° of stem antitorsion.
Other studies have examined the combined component anteversion after lateral or posterior approach THA. Reikerås and Gunderson \[[@bib30]\] utilized postoperative CT scans in 91 patients after either posterior or lateral approach THA and found that only 60.4% of their patients had a combined anteversion within the acceptable safe zone. Wassilew et al. \[[@bib31]\] evaluated THAs performed using an anterolateral approach with navigation, and they found that 88% of their patients were within the CV safe zone of 25°-50°.
A study by Nogler et al. \[[@bib24]\] examined the ability of the DA approach to position the femoral and acetabular components with and without navigation. However, the present study is the first to analyze CV in the DA-THA. We used the TraumaCad (Voyant Health, Columbia, MD) software tool, which was found to have good intraobserver and interobserver reliability but can underestimate acetabular anteversion by as much as 12° \[[@bib32]\]. Despite the potential for underestimation of anteversion, we believe that a standing radiograph more accurately represents the patient\'s functional anteversion and accounts for the patient\'s lumbar or pelvic tilt because of the difficulties in the estimation of tilts with supine radiographs \[[@bib33], [@bib34], [@bib35]\]. This notion is supported by the work of Hayakawa et al that found a statistically significant difference between intraoperative and postoperative radiographs in 100 consecutive patients for both anteversion and vertical tilt \[[@bib35]\].
Impingement can lead to abnormal wear patterns or dislocation. Our study found that 17% of patients had CV greater than 50°, outside of the safe zone. However, when the femoral and acetabular components were analyzed independently, 20 of 30 patients had "excessive" anteversion of the acetabular component. Intraoperative stability assessments did not identify any impingement. There was less variability in acetabular component version than in femoral version. With uncemented femoral components, femoral anteversion is largely dictated by proximal femoral geometry. Therefore, some surgeons have recommended a femur-first technique to better address this variability and "fine-tune" version on the acetabular implant \[[@bib36]\]. Our results are comparable with those of similar series that included the posterior or lateral approach THA with and without navigation, with 88% and 60.4% of the components within the safe zone for CV, respectively \[[@bib30],[@bib31]\]. We are unable to conclude that our results are superior based on the small sample size in our study, but this should be investigated further with a larger series.
We used both the PCA and the TEA for measurements to determine femoral component anteversion. Interestingly, we found a slightly higher interobserver reliability with the TEA measurements than with the PCA. This may reflect the difficultly of locating the point of maximal posterior bone in the condyle with a fine-cut CT scan. The differential radii of the femoral condyles and the extremity orientation relative to the CT scanner may influence the appearance of the most posterior projection of the condyles. This could cause the most posterior condylar projection to be on separate cuts of the CT scan. Authors may consider using the TEA primarily for femoral version measurements with axial imaging or 3-dimensional imaging techniques.
There are several potential limitations for this study. First, the number of patients in this study was 30. A small sample size may not reflect the variability of patient anatomies. The single-surgeon cohort may limit the generalizability of these results. The use of plain radiographs instead of CT to assess acetabular component position may be a limitation. The CT may be more accurate in determining acetabular anteversion and abduction. However, most surgeons who perform the DA-THA utilize the standing AP pelvis radiograph to position the acetabular component. It has been previously shown that the supine position of the acetabular component varies from supine to standing radiographs, and therefore, we chose to utilize a standing pelvis AP radiograph to determine the implant position. Many accepted modern studies have relied on AP radiographs to determine both anteversion and abduction angles for acetabular components \[[@bib37], [@bib38], [@bib39]\]. Finally, this study did not assess the spinopelvic relationship. Abdel et al. recently demonstrated that most dislocations occurred within the "safe zone" \[[@bib39]\] and it is possible that other factors are as important for stability as implant position.
As this study represents the first to examine CV in DA-THA with postoperative axial imaging, we found that the DA approach allowed for placement of components with CV within the acceptable range for most patients. In this study, excessive anteversion of the acetabular component based on Lewinnek's "safe zone" was the most common component orientation error. However, this may simply represent a single surgeon's component orientation preference and may not necessarily be generalizable. Even with limited visualization of the proximal femur, the DA approach can reproducibly yield a high percentage of THA components in the "ideal" position for CV.
Conflict of interest {#sec5}
====================
J.B. Mason receives royalties from DePuy and A Johnson & Johnson Company, is a paid consultant for DePuy and A Johnson & Johnson Company, receives other financial or material support from DePuy and A Johnson & Johnson Company, receives royalties, financial or material support from the Journal of Arthroplasty, and is a board member for the Publication Committee AAHKS; J.R. Martin is a paid consultant for DePuy and A Johnson & Johnson Company; J.L. Masonis receives royalties from Medacta, Smith & Nephew, and Zimmer, is a paid consultant for Smith & Nephew and Zimmer, holds stock or stock options in Orthogrid, receives research support a principal investigator from DePuy, A Johnson & Johnson Company, Smith & Nephew, and Zimmer, receives royalties, financial or material support from Medacta, and is a board member for the Anterior Hip Foundation; J.B. Jackson is a board member for AAOS and AOFAS committee.
Appendix A. Supplementary data {#appsec1}
==============================
Conflict of Interest Statement for ChristalConflict of Interest Statement for JacksonConflict of Interest Statement for MartinConflict of Interest Statement for MasonConflict of Interest Statement for MasonisConflict of Interest Statement for Springer
| {
"pile_set_name": "PubMed Central"
} |
Stuff Queer People Need To Know (follow them @SQPNTK) has just shared that the multi-talented dancer, photographer, student and current Miss New York Claire Buffie will be the first Miss America competitor to run on “Straight for Equality: Let’s Talk” platform, which will focusing on all aspects of equality for the LGBT community. Buffie told the Advocate that the major reason she stuck with the competition is her passion for her platform: improving the climate for LGBT youths in schools, and breaking stigma, and talking about misconceptions .
It’s to get so great to see a Beauty Queen who is an outspoken advocate for human rights. She is a real role model to young women everywhere! I’m so proud to be from NY.
As much as I despise former Miss California USA Carrie Prejean — who recently exercised her right to “opposite marriage” when she tied the knot with Oakland Raider Kyle Boller — and these so-called scholarship competitions, one beauty queen is supporting LGBT rights in her race for the crown. Miss New York … Read More
One response to “Why I Love Miss NY!”
reading things like this makes me want to scream with joy. I wish my son would never have to see discrimination against anyone. Men, women, lesbians, gays, straights, transgender, nursing mothers, handicap people, children, adults. | {
"pile_set_name": "Pile-CC"
} |
Q:
Formula to combine variable and cell references
I have been looking for hours for a solution but couldn't find any. I am an absolute beginner in VBA and couldn't figure this out for myself. The thing I would like to do is that VBA enters in a cell a formula that will contain a value extracted from a variable and then subtracts all the below cells. The cells below could change which would affect the overall value so I need to leave it as dynamic. (e.g: Cell A1 should look like this: =500-A2-A3-A4.. etc).
The code looks like this at the moment. So far it only enters the value from the variable
crnt = Cells(5, "D").Value
Range("E60").Select
ActiveCell.Offset(0, crnt - 1).Activate
rev = ActiveCell.Value
Range("E9").Select
ActiveCell.Offset(0, crnt - 1).Select
ActiveCell.Value = rev
A:
You might want this one:
InVal = 500 ' input value
Cells("A1").FormulaLocal = "=" & CStr(InVal) & "-A2-A3-A4"
or in a loop
Dim InVal() as Variant
InVal = Range("M60:Z60").Value
For i = LBound(InVal) to UBound(InVal)
Cells(1, i + 1).FormulaLocal = "=" & CStr(Val(InVal(i))) & "-" & Cells(2, i + 1).Address & "-" & Cells(3, i + 1).Address & "-" & Cells(4, i + 1).Address
Next i
All you need to do is to play with .Address and the strings to compile the formula.
| {
"pile_set_name": "StackExchange"
} |
One Beaver Stadium
Happy Thanksgiving! It’s once again that time of year when we give thanks for all the good things in our lives and express our gratitude to the important people in our lives. In this time of Thanksgiving, we should strive to remember our friends. Even the most thoughtful of us can let important relationships slip by the wayside, and we can lose track of people who were once the best of friends.
Football season always seems to come and go much too quickly and it is one of the most exciting times to visit State College. Now is the time to make the trip back to Happy Valley for a great Nittany Lion Football weekend. Click “Read More” to learn about all the great things to do while you’re in State College.
The purpose of the Football Letterman's Club is to perpetuate the Penn State Football tradition and promote brotherhood and unity between the university and former players, coaches and managers for their mutual benefit. | {
"pile_set_name": "Pile-CC"
} |
Disclaimer: This app is intended for entertainment purposes only. This app allows you to customize your lock screens by adding colorful overlays to pics and wallpapers. It does not modify the phone interface.
Design a new background with this app and choose from multiple lock themes that will let you create something incredible! Even combine images with your own photos from your camera. Save your completed design to camera roll and then set as your lock screen wallpaper. Easy to use and make your own lock themes! | {
"pile_set_name": "Pile-CC"
} |
Monthly Archives: March 2014
Pharrell Williams will replace judge Cee Lo Green on The Voice for it’s upcoming seventh season. Williams was behind the two tracks that were each dubbed “the song of the summer” (“Get Lucky” and “Blurred Lines”) last year. Williams also helped Hans Zimmer score the soundtrack of next summer: “The Amazing Spider-Man 2.” He wrote…
Fox not only announced plans for the season’s end with releasing finale dates for their current programming, but they announced plans for the summer premieres of some hits like “So You Think You Can Dance” and new show “I Wanna Marry ‘Harry’.” With premieres comes sacrifices. Next week’s series finale of “Raising Hope” has pre-empted…
NBC is already making summer plans as this TV season winds down. In addition to announcing their finale plans, NBC will be rolling out six new series this summer with some returning favorites. “Crossbones,” a pirate drama, is one of the more anticipated summer rollouts. Check out the full list of premieres below. All times…
True Detective, the hit series brought to you by HBO is currently on the hunt for a new pair of True Detectives. Matthew McConaughey and Woody Harrelson have said they would not be returning, although we knew that already as HBO had confirmed from the beginning this was to be an anthology. Rumor now has…
Joining NBC and ABC, the EYE network is the latest to roll out their season ending plans. Kicking things off next week with the “How I Met Your Mother” series finale and ending with a three-hour Survivor extravaganza, check out the CBS Season Finale dates below! ABC Announces Finale Dates MONDAY, MARCH 31 8/7c How…
Last night’s “Wheel of Fortune” (airing March 19, 2014) featured what host Pat Sajak called the “most amazing solve” in his career as the show’s host … for over 30 years! This solve is akin to a last second hail Mary play. Only two letters popped up on the final puzzle for Emil and his…
After NBC announced their plans for the end of the season, ABC is next in line to share their air-dates for the end of the 2013-2014 TV season. Kicking it off with “Once Upon a Time In Wonderland,” putting “Scandal” in April and ending it with a few sitcom favorites, check out the plans below.…
In the latest cover of Frozen’s Oscar winning song “Let It Go,” one man brilliantly gives us a taste of how the song might end up if Lumiere from Beauty and the Beast or Minne Mouse gave it a whirl! How would Timon and Pumbaa do? Check out the video below and let us know…
“What percentage of water is celery?” That is precisely one of many burning questions users post on “Yahoo! Answers.” Life just isn’t the same without knowing exactly how much a $5 footlong at Subway costs, you know?
A nine-hour adaptation of "11/22/63" - King's thriller about the Kennedy assassination - is headed directly to Hulu. Helmed by Abrams, the series is a limited “event series,” but there will be opportunities for future subsequent seasons based on the story, which follows high school English teacher Jake Epping, who travels back in time to try to prevent the assassination of President John F. Kennedy in Dallas on the fateful date in American history. | {
"pile_set_name": "Pile-CC"
} |
Proctosigmoidoscopy and rectal biopsy in infants and children.
The medical records of all patients ages 0 to 21 years who underwent proctosigmoidoscopy and/or rectal biopsy over a 27 month period of time were reviewed to determine the efficacy and safety of these procedures in pediatric patients. One hundred twenty-one patients underwent proctosigmoidoscopy; 91 of these also had rectal biopsies. Median age was two years; 21% were less than six months and 8% less than one month of age. Depth of examination was 10 to 15 cm in most patients greater than 10 years of age. Induced friability was the most frequently observed mucosal abnormality. Abnormal findings were almost always present in patients with bloody diarrhea and were quite common in those with rectal bleeding, but less common in those with chronic diarrhea and abdominal pain. Colitis of various causes was the most common cause of blood in the stool; anal fissures were found in only four of 23 patients with rectal bleeding. Both proctosigmoidoscopy and rectal biopsy were needed to exclude the presence of colitis. Mobidity was 0% with proctosigmoidoscopy and 0.34% with rectal suction biopsy. | {
"pile_set_name": "PubMed Abstracts"
} |
In copending application Ser. No. 912,268, filed June 5, 1978 by Daniel M. Cap and William H. Lake, titled High Pressure Metal Vapor Discharge Lamps of Improved Efficacy, which is a continuation-in-part of an earlier application Ser. No. 812,479, filed July 5, 1977 similarly assigned, useful and efficient high pressure discharge lamps are disclosed having much smaller sizes than have been considered practical heretofore, namely discharge volumes of one cubic centimeter or less. In preferred form achieving maximum efficacy, these high intensity lamps utilize generally spheroidal thin-walled arc chambers which may vary in shape from slightly oblate to substantially prolate. Remarkably high efficacies are obtained by raising the metal vapor pressure above 5 atmospheres and to progressively higher pressures as the size is reduced. In such miniature lamps, the convective arc instability usually associated with the high pressures utilized is avoided, and there is no appreciable hazard from possibility of explosion. Practical designs provide wattage ratings or lamp sizes starting at about 100 watts and going down to less than 10 watts, the lamps having characteristics including color rendition, efficacy, maintenance and life duration making them suitable for general lighting purposes.
A less desirable characteristic of these miniature high pressure metal vapor lamps is the very rapid deionization to which they are subject. In operation on 60 Hz alternating current, deionization is almost complete between half cycles so that a very high restriking voltage is required to be provided by the ballast. Particularly in metal halide lamps, during lamp warm-up within the first few seconds after arc ignition, the reignition voltage reaches extremely high levels. In view of these deionization limitations associated with low frequency operation of miniature metal halide lamps, the use of conventional 60 Hz ballasts has many disadvantages.
The object of the invention is to provide an improved method or operating system for miniature metal halide lamps which overcomes the limitations imposed by rapid deionization at low operating frequencies and which permits the design of compact, practical and efficient high frequency ballasts. | {
"pile_set_name": "USPTO Backgrounds"
} |
The U.S. Army is laying
the groundwork to let Halliburton Co., keep several billion dollars paid
for work in Iraq that Pentagon auditors say is questionable or unsupported
by proper documentation, the Wall Street Journal reported today.
According to Pentagon documents reviewed by the Journal,
the Army has acknowledged that the Houston-based company might never be
able to account properly for some of its work, which has been probed amid
accusations that Halliburton's Kellogg Brown & Root unit overbilled
the government for some operations in Iraq.
The company has hired a consulting firm to estimate
what Halliburton's services should cost, the report said.
The newspaper, citing the documents and internal memorandums,
said that officials are considering using the estimate to serve as the basis
for "an equitable settlement," under which the Pentagon could
drop many of the claims its auditors have made against the company.
But the Journal added that some disgruntled Pentagon
officials see the effort to broker an outside settlement with the company
as unusual because the contract is so large.
According to the report, Kellogg Brown & Root
so far has billed about $12 billion in Iraq, and about $3 billion of that
remains disputed by government officials.
The Journal also cited Pentagon records showing that
$650 million in Halliburton billings are deemed questionable. An additional
$2 billion is considered to have insufficient paperwork to justify the billing,
the report said.
A representative for Halliburton did not immediately
return a call seeking comment early today. | {
"pile_set_name": "Pile-CC"
} |
Simple example of machine learning in TensorFlow - jostmey
https://github.com/jostmey/NakedTensor?bare
======
dbcurtis
I like these kind of "Hello, world!" examples for TensorFlow. As a TensorFlow
beginner, I need all the references I can get. Here is what I need right now:
"Hello, we meet again!". I can build a neural net model, and train (albeit,
often badly) a model, but saving and restoring the trained weights so that I
can run the model again is giving me fits. I am clearly missing something
fundamental about how to restore a TensorFlow NN model.
For your next tutorial, may I suggest: 1) a list of do's and don'ts for
constructing a savable/restorable model, and 2) a wee bit of example code.
Of course, now that I have discovered Keras I'm moving away from low-level
direct TensorFlow. But I suspect I'm not the only one a bit foggy about the
whole save/restore work flow.
~~~
pmalynin
As a person that uses TensorFlow for his day job:
I find that saving and restoring are of the weirder things with TensorFlow,
you can either go all out an decide to save out all the variables, or only the
ones needed for the model.
You usually don't want to save out gradients (which are also variables) since
they take up a bunch of space and aren't actually that useful to restore. Now
on the other, what are model variables -- do you want to save model variables
+ the moving averages ... or just the averages. But then when you're loading
you'll have to "shadow" the moving averages to the real variables that
actually run in your model.
Good news though, most of the scaffolding code you can write once and re-use
it over and over again.
~~~
minimaxir
In Keras, it's just a simple model.save() [to a hdf5 file] and load_model().
This includes both the weights and the architecture.
Models with a few million parameters result in a file around ~50MB, which is
still reasonable for modern production use cases.
~~~
glial
Keras makes using deep learning for simple-ish use cases sooooo easy.
~~~
matheweis
I second this - I'm really excited about Keras being integrated into the core
of Tensorflow (other than the chance it might lose the Torch compatibility).
------
pred_
That's nifty; I was looking for something like that just a few weeks ago for a
work demonstration! Ended up doing
[https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97b...](https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97bbfbc)
instead.
~~~
rhcom2
Thank you to you and OP for both sharing these resources. Really helpful.
------
nemo1618
I wish there were more TensorFlow examples written in Go. I made the mistake
of checking out TensorFlow as my first intro to ML and it flew about 10 miles
over my head. Slowly learning now, but most of the documentation and tutorials
are written in Python.
This blog series was also helpful on a conceptual level:
[https://medium.com/emergent-future/simple-reinforcement-
lear...](https://medium.com/emergent-future/simple-reinforcement-learning-
with-tensorflow-part-0-q-learning-with-tables-and-neural-
networks-d195264329d0#.4znc3ulur)
~~~
make3
as a deep learning professional, the deep learning community is something like
99% Python. You'd probably better learn Python at least well enough to
recreate the corresponding Go code in your mind instantly.
------
calebm
>>> You are one buzzword away from being a professional. Instead of fitting a
line to just eight datapoints, we will now fit a line to 8-million datapoints.
Welcome to big data.
LOL :) (Side-note: 8 million is still not big data)
~~~
mcrad
Big Data is a reference to complexity of the data & underlying system that
data represents, NOT the number of datapoints.
lol
~~~
pyromine
Big data is really just a buzzword that no one knows what it really means,
because everyone's definition is different
lol
~~~
happycube
I always think in terms of Munchkin: "any data that is not Big is small"
------
JonathonCwik
So I'm still wrapping my head around some of the math (I haven't had a math
class in a handful of years)...
I get the output of the model (y_model = m*xs[i]+b), it's the y = mx + b where
we know x (from the dataset) and have y be a variable.
The error is where I start to lose it, so I get the idea of the first part
(ys[i]-y_model). It's basically the difference between the actual y value
(from the dataset). I get that we want this number to be as small as possible
as the closer to zero it is for the entire dataset that means we get closer to
the line going through (or near) all the points and the closest fit will be
when this total_error is nearest to zero.
What I don't get is the squaring of the difference. Is it just to make the
difference a larger number so that it's a little more normalized? How do you
get to the conclusion that it needs to be normalized? Same thing with the
learning rate? I believe these to be correlated but I can't tell you how...
~~~
cowabungabruce
Squaring gets you guaranteed positive numbers. Remember, we are adding all the
errors together to optimize the model: If we get
sum_errors_A = 4 + -3 + -1
sum_errors_B = 1 + 1 + 1
B is obviously the better model, but it has a higher error than A when
comparing. If we squared all the terms and then added, B would be the stronger
model.
~~~
JonathonCwik
Ah, gotcha! Makes a lot more sense now.
------
Kiro
This is awesome!
I currently have a small pet project where I think some simple ML would be
cool but I don't know where to start so these things are great.
Basically my use case is that I have a bunch of 64x64 images (16 colors) which
I manually label as "good", "neutral" or "bad". I want to input this dataset
and train the network to categorize new 64x64 images of the same type.
The closest I've found is this: [https://gist.github.com/sono-
bfio/89a91da65a12175fb1169240cd...](https://gist.github.com/sono-
bfio/89a91da65a12175fb1169240cde3a87b)
But it's still too hard to understand exactly how I can create my own dataset
and how to set it up efficiently (the example is using 32x32 but I also want
to factor in that it's only 16 colors; will that give it some performance
advantages?).
~~~
nl
[https://blog.keras.io/building-powerful-image-
classification...](https://blog.keras.io/building-powerful-image-
classification-models-using-very-little-data.html) is what you want.
------
cosmicexplorer
What is the meaning of the "?bare" query string in the url? I googled around
for the meaning of query strings on the github site but only found rnandom
repos on github (not sure how to narrow the search). The first time I tried
removing it I saw another folder named "to_do", but this is gone now so it
might give a version which is cached for longer somehow?
~~~
cosmicexplorer
OK, found out what a bare repository means and pretty sure that's what it
refers to. Still can't find any documentation for the query string parameter
and don't know how that makes sense for github's repository view page.
------
blauditore
I'm not sure about the rules, but shouldn't posts linking to own, personal
projects be prefixed with "Show HN:"? I've seen a lot such posts lately where
the poster was clearly the author as well.
~~~
pvg
No, Show HN is a different thing with its own (generally stricter) rules. You
don't have to add it to things just because you happen to be the author.
[https://news.ycombinator.com/showhn.html](https://news.ycombinator.com/showhn.html)
------
kyleschiller
I think you meant bare bones.
------
mediocrejoker
I'm guessing english is not your first language, so I just wanted to point out
that "bare bottom" is generally synonymous with "uncovered buttocks" ie. in
the context of changing an infant's diaper.
Perhaps you were meaning to put "bare bones"? Google's definition of the
latter is "reduced to or comprising only the basic or essential elements of
something."
Don't want to detract from your point but I think your title is throwing some
people off. I know I would be hesitant to click something at work that sounds
like it could contain nudity.
~~~
dekhn
I think the last example was a clASSifier, so it makes sense.
------
bencollier49
"Bare bottom"? I'm not clicking on this.
~~~
bencollier49
Downvoted! The title might have changed now, but the original one was
completely indecipherable. As far as I could tell it was genuinely some sort
of image recognition algorithm for naked buttocks.
------
BonoboBoner
Simple example? Before finishing the first paragraph, it says
"The slope and y-intercept of the line are determined using gradient descent."
What on earth does that mean? Maybe they should teach mathematics in english
at universities outside of english speaking countries. German mathematics does
not help here.
I wish there was a 4GL like SQL for machine learning using dynamic programming
for algorithm selection and model synthesis like a dbms query planner.
PREDICT s as revenue LEARN FROM company.sales as s GROUP BY MONTH ORDER BY
company.region
~~~
sampo
> _" The slope and y-intercept of the line are determined using gradient
> descent."_
Slope and intercept are very standard names for the parameters of a linear
regression model. Gradient descent is the name of the algorithm used.
| {
"pile_set_name": "HackerNews"
} |
Q:
Migrating from PVM to MPI
I'm working on migrating a project from PVM to MPI. I wanted to ask if anyone here has done so before and if there exists any tutorials or manuals on the correspondance between functions in PVM and MPI.
A:
Chapter 9 of the useful book Using MPI talks pretty explicitly about comparing PVM and MPI and what you'd have to do to port.
They're both message-passing libraries, and if you're mostly using point-to-point communications or basic collectives, the port should be quite straightforward. PVM though always had a lot more support for dynamic processes creation and management than even recent MPI standards have had, and if your code relies heavily on those sorts of features, it will be harder.
A:
I have a lot of resources I've been using over the past few days
MPJ Papers
mpj: enabling parallel simulations in java
MPJ MIT
MPJ java docs
Google Scholar MPI
Hope it helps!
No problem with MPI by the way each processor runs synchronously in parallel with all the other processors, and every processor shares a different address space. (You can experiment this for yourself with java.util.Date and run System.out.println statements to the console and you'll see when you send something and receive something using point-to-point or unblocked communication, the process will recieve at the same time it was sent in a synchronous fashion). Send and recieve is better to think about when your at the dinner table and you ask a relative to give you a fork, you would recieve the fork at the same as it is being sent (i.e. being handed directly to you).
| {
"pile_set_name": "StackExchange"
} |
More Views
The J136 is an in house frame, made of the highest quality tier 90 plastic. Its sleek, wraparound style is highly popular and typically fits medium to large heads. These frames are designed with an adjustable nose bridge, for a perfect fit. The glasses come with rubber temple bars for added comfort, and are available in black. ANSI Z87.1-2003 APPROVED
Product Description
Details
The J136 is an in house frame, made of the highest quality tier 90 plastic. Its sleek, wraparound style is highly popular and typically fits medium to large heads. These frames are designed with an adjustable nose bridge, for a perfect fit. The glasses come with rubber temple bars for added comfort, and are available in black. ANSI Z87.1-2003 APPROVED
Liability Disclaimer: Phillips Safety Employees are not optometrists and can only make suggestions concerning eye protection. There are many types of eye protection available and we manufacture as many as possible. Phillips Safety Products does not accept any liability concerning eye damage arising from the use, misuse, or non-use of any eyewear products we sell. | {
"pile_set_name": "Pile-CC"
} |
Investors
We Provide Quick Results for Your Underperforming Assets
Optimizing the financial performance of the brand
Development of management teams and training programs
Operational systems and infrastructure to support growth
Maximizing the growth potential for emerging brands
Repositioning and refreshing brands in decline
Menu innovation strategies designed to drive frequency and sales
The investment community acquires restaurant brands for various reasons, but the common goal within a portfolio is profitability and quick financial wins. The expert team at Synergy Restaurant Consultants has the ability to identify and quantify opportunities to improve the performance of your assets and can act as a support system positioned between investors and operators to facilitate targeted growth. Synergy Restaurant Consultants has practical tools developed through experience with diverse operations which we use to help struggling brands by designing solutions that garner the most benefit with the least investment.
The foodservice industry is a pennies business; when you manage the pennies, the dollars take care of themselves. Firms have invested billions of dollars into the restaurant industry in recent years in many cases leading to accelerated growth without the infrastructure required to support operations and hospitality. As opposed to retail, restaurants require standardized systems and excellent training programs to ensure consistent execution of the core product at the store level and that elusive secret to success…genuine hospitality.
From stabilizing operations to improving top-line revenue and bottom-line profit, the team at Synergy Restaurant Consultants addresses your asset’s pain-points through innovation and efficiencies. By working with your restaurant brand’s management team to implement executable strategies, Synergy Restaurant Consultants will bring performance in line with expectations while supporting operations through periods of change. | {
"pile_set_name": "Pile-CC"
} |
Answers
Q:
I've lived a very sinful life, but a friend of mine says God will forgive me if I'll just believe in Jesus. What difference would that make? And how would I know if I was really forgiven?
A:
Your friend is right: You can be forgiven, and you can know beyond doubt that someday you will go to be with God in heaven forever. And my prayer is that you will take the one step that is necessary for this to become a reality. What is that step? It is the step of faith - trusting Jesus Christ as your Lord and Savior and committing your life to Him.
Let me explain what this means. Only one thing will ever keep us out of heaven, and that is our sin. God is holy and pure, and unless we are cleansed of our sins we can never enter heaven. The Bible says of God, "Your eyes are too pure to look on evil; you cannot tolerate wrong" (Habakkuk 1:13). We not only need to be forgiven; we need to be cleansed.
But how is this possible? We can't cleanse ourselves; only God can do it. And this is what He did by sending His Son, Jesus, into the world. He was without sin - but on the cross all our sins were placed on Him, and He took the judgment we deserved. All this was in accordance with God's plan, for God loves us and wanted to provide a way for us to be cleansed and saved.
What must we do? We must turn to Christ, repenting of our sins and trusting Him alone for our salvation. Why not ask Christ to come into your life right now and save you? The Bible says, "Believe in the Lord Jesus, and you will be saved" (Acts 16:31). | {
"pile_set_name": "Pile-CC"
} |
Electrostatic interactions between hyaluronan and proteins at pH 4: how do they modulate hyaluronidase activity.
Hyaluronan (HA) hydrolysis catalyzed by hyaluronidase (HAase) is inhibited at low HAase over HA ratio and low ionic strength, because HA forms electrostatic complexes with HAase, which is unable to catalyze hydrolysis. Bovine serum albumin (BSA) was used as a model to study the HA-protein electrostatic complexes at pH 4. At low ionic strength, there is formation of (i) neutral insoluble complexes at the phase separation and (ii) small positively-charged or large negatively-charged soluble complexes whether BSA or HA is in excess. According to the ionic strength, different types of complex are formed. Assays for HA and BSA led to the determination of the stoichiometry of these complexes. HAase was also shown to form the various types of complex with HA at low ionic strength. Finally, we showed that at 0 and 150 mmol L(-1) NaCl, BSA competes with HAase in forming complexes with HA and thus induces HAase release resulting in a large increase in the hydrolysis rate. These results, in addition to data in the literature, show that HA-protein complexes, which can exist under numerous and varied conditions of pH, ionic strength and protein over HA ratio, might control the in vivo HAase activity. | {
"pile_set_name": "PubMed Abstracts"
} |
313 F.Supp. 337 (1970)
Margaruite J. BRANCH, Plaintiff,
v.
Robert H. FINCH, Secretary of Health, Education and Welfare, Defendant.
Civ. A. No. T-4561.
United States District Court, D. Kansas.
April 22, 1970.
*338 *339 *340 Reginald LaBunker, Topeka, Kan., for plaintiff.
Robert J. Roth, U. S. Atty., Elmer Hoge, Asst. U. S. Atty., Topeka, Kan., for defendant.
MEMORANDUM OF DECISION
TEMPLAR, District Judge.
This proceeding was instituted by plaintiff against the Secretary of Health, Education and Welfare as is authorized by and pursuant to Section 205(g) of the Social Security Act, 42 U. S.C. § 405(g), for the purpose of obtaining a judicial review of a final decision of the Secretary denying her application for disability insurance benefits under Sections 216(i) and 223 of the Act, 42 U.S.C. § 416(i) and 423. An affidavit being filed, this Court, on April 25. 1969, entered an order granting plaintiff leave to sue forma pauperis without securing costs.
Both parties in this action have submitted motions for summary judgment together with briefs to support their respective positions.
The plaintiff filed her application to establish a period of disability on February 28, 1968, as provided in Section 416(i), and for disability insurance benefits, as provided under Section 423 of the Act. Claimant alleged, in substance, that she became unable to work because of a badly sprained back on September 23, 1967. The application was denied initially and on reconsideration. On December 11, 1968, a hearing was conducted before the hearing examiner of the department, at which the plaintiff was present without an attorney. The hearing examiner filed his decision denying plaintiff's application on December 30, 1968. The appeals Council upheld the decision of the hearing examiner upon the plaintiff's request for review. The hearing examiner's decision became the final decision of the Secretary of Health, Education and Welfare. The claimant will meet the earnings requirement until June 30, 1972.
The hearing examiner determined that, in view of the claimant's limited education and age, training for sedentary work would not be profitable for her. In his determination that the claimant is not entitled to a period of disability or to disability insurance benefits, the hearing examiner made the following findings:
"FINDINGS OF FACT
"1. The claimant is approximately 59 years of age and she has an eighth grade education.
"2. The claimant has worked as a laundry worker, waitress, maid, and nurse's aide.
"3. In September 1967 the claimant began to suffer from back pain and she was treated for the condition at St. Francis Hospital, Topeka, Kansas.
"4. Orthopedic examination of the claimant's back in May 1968 resulted in a diagnosis of mild musculoligamentous strain residuals with underlying mild lumbar degenerative joint disease.
"5. The claimant has not attempted to secure work since leaving her employment with the A. T. & S. F. Hospital, Topeka, Kansas, in 1967.
"6. While the claimant's back condition has possibly prevented her from returning to work as a maid, she has not been prevented from working as a waitress, laundry helper, or nurse's aide for a period of twelve months or more and she is currently able to engage in this type of activity.
"CONCLUSION OF LAW
"The claimant has not been prevented from engaging in substantial, gainful activity for a period of twelve months *341 or more at any time prior to the date of this decision and she is presently able to work as a waitress, laundry helper, or nurse's aide." (Record P. 9, 10).
The primary issue before this Court is whether or not there is substantial evidence to support the Secretary's decision that plaintiff was not entitled to a period of disability or to disability insurance benefits and specifically whether plaintiff has been unable to engage in substantial gainful activity by reason of a medically determinable physical or mental impairment which has lasted or can be expected to last for a continuous period of not less than 12 months.
The definition of disability set forth in § 423(d) (1) provides:
"(d) (1) The term `disability' means
(A) inability to engage in any substantial gainful activity by reason of any medically determinable physical or mental impairment which can be expected to result in death or which has lasted or can be expected to last for a continuous period of not less than 12 months * * *."
"(2) For purposes of paragraph (1) (A)
(A) an individual * * * shall be determined to be under a disability only if his physical or mental impairment or impairments are of such severity that he is not only unable to do his previous work but cannot, considering his age, education, and work experience, engage in any other kind of substantial gainful work which exists in the national economy, regardless of whether such work exists in the immediate area in which he lives, or whether a specific job vacancy exists for him, or whether he would be hired if he applied for work. * * *"
* * * * * *
"(3) For purposes of this subsection, a `physical or mental impairment' is an impairment that results from anatomical, physiological, or psychological abnormalities which are demonstrable by medically acceptable clinical and laboratory diagnostic techniques."
* * * * * *
"(5) An individual shall not be considered to be under a disability unless he furnishes such medical and other evidence of the existence thereof as the Secretary may require."
The word "any" as used in the phrase "any substantial gainful activity" must be read in light of what is reasonable and not what is merely conceivable. See Huneycutt v. Gardner, 282 F.Supp. 405 (M.D.N.C.1968).
This Court recognizes that judicial review of final decisions of the Secretary is a defined and limited one. See Folsom v. O'Neal, 250 F.2d 946 (10th Cir. 1957); Gordon v. Celebrezze, 253 F.Supp. 779 (D.Kan.1965); Jones v. Celebrezze, 246 F.Supp. 701 (D.Kan. 1965); and Shonk v. Gardner (Templar, J., No. T-4354, unreported). The Court pointed out in Gardner v. Bishop, 362 F.2d 917, 919 (10th Cir. 1966), that findings of fact by the Secretary and the inferences drawn from such findings should not be disturbed by a reviewing court, "if there is substantial evidence to support them. Substantial evidence has been defined as `such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.'" Stated in a different manner the evidence must be such, if the trial were to a jury, as would justify a refusal to direct a verdict when the conclusion sought to be drawn from it is one of fact for the jury. If there is only a slight preponderance of the evidence on one side or the other, the Secretary's finding should be affirmed. See Underwood v. Ribicoff, 298 F.2d 850, 851 (4th Cir. 1962).
This Court is aware of the principle that the Act should be construed liberally in favor of a party seeking its benefits. See Davidson v. Gardner, *342 370 F.2d 803 (6th Cir. 1966); Dvorak v. Celebrezze, 345 F.2d 894 (10th Cir. 1965); and Ketcherside v. Celebrezze, 209 F.Supp. 226 (D.Kan.1962). It is clear that a court is not to try a case de novo and that it must not abdicate its traditional function to scrutinize the entire record in order to determine whether the conclusions made by the Secretary are rational and if the court should determine that reliance has been placed upon one portion of the record in disregard of overwhelming evidence to the contrary, then the court is bound to modify or reverse the Secretary's findings with or without remanding the case for rehearing. See Thomas v. Celebrezze, 331 F.2d 541 (4th Cir. 1964) and Burrell v. Finch, 308 F.Supp. 264 (D. Kan.1969). The plaintiff's age, education, training, experience, and physical and mental capabilities are of considerable importance in determining her rights to disability benefits under the Act. See Ellerman v. Flemming, 188 F.Supp. 521 (D.Mo.1960) and Aniol v. Flemming, 188 F.Supp. 233 (D.Kan.1960).
The record discloses that claimant resides at 627 W. 17th Topeka, Kansas, has a seventh grade education, and was approximately 59 years of age at the time of the hearing. There is some discrepancy as to the level of education attained by the claimant. Although the hearing examiner found that the claimant had an eighth grade education, the claimant testified that she had finished the seventh grade. In her request for reconsideration (Record P. 67) the claimant stated that she had only an eighth grade education, and Dr. Miller made reference to the eighth grade in one of his reports (Record P. 51). The claimant testified that she is married, but separated, and has eight children living. (Record P. 21). The claimant's past work record may be summarized as follows: waitress for a number of years; nurse's aide; worked for a laundry as an ironer; and worked as a maid at the Santa Fe Hospital, which was her most recent employment. Additional testimony offered by the claimant may be summarized as follows:
The claimant does not have a driver's license or a car, but she is able to use the public buses. She testified that she is 5' 3" and weighs 139 lbs., although she used to weigh 165 lbs. The claimant stated that she weighed 165 when she got hurt, then in response to a question of the hearing examiner she stated that she weighed up in the 40's in September 1967. She worked for Santa Fe Hospital for 3 years as a maid, and the work involved scrubbing, dusting, washing windows and waxing.
The claimant testified that while she was scrubbing the floor, the bed broke and she slipped. She stated that she went to St. Francis Hospital and was there for 12 days. She further stated that she had doctored with Dr. Rook and took treatments at the Santa Fe Hospital before she had to quit at Santa Fe. She said that she felt better for a while after being released. She testified that she received a workmen's compensation settlement.
The claimant said that she did not look for any work after the injury occurred because she is not able to work. In relation to her back she stated that whenever she does a lot of stooping, scrubbing or anything like that, or standing on her feet any length or period of time it bothers her. She has not had any surgery on her back but the doctor said she might have to, although he did not advise it now. She testified that she stays home and watches television, and that she is able to make her meals and take care of her personal needs. She cannot do any mopping, ironing, scrubbing, washing, lifting or anything like that because it bothers her. She does not wear a back brace, and the doctor has not suggested that she should. She takes the medicine the doctor gives her and heat treatments. The heat treatments consist of heating towels *343 in hot water and putting them on a heat pad. In regard to house cleaning the claimant dusts and things like that. She visits her daughters and she has company once in a while.
The claimant's support consists of $83 a month from welfare. In reference to a question about attempting to find work as a waitress she stated that she did not think she could stand up on her feet that long. She testified that steady walking bothers her, and she does not think she could stand up as a waitress carrying heavy trays and plates. She indicated that she likes to work and wishes she could. She stated that her back feels worse when she gets up and around during the day and when she turns over at night it bothers her, but the heat treatments help a lot. The doctor has not suggested that she should exercise for the back condition, but said she could not do any heavy work. She indicated that her back feels worse when she goes to bed than when she gets up.
Two of the claimant's daughters testified that they clean house for her. They do the scrubbing, ironing, washing and waxing. One of the daughters testified that in her opinion her mother's back condition would keep her from working as a maid.
In the claimant's hospital admission report dated October 1, 1967, Dr. Kirk Miller, M.D., claimant's personal physician, stated the admission diagnosis as "Low back syndrome" and "Constipation". (Record P. 45) In this report Dr. Miller noted the claimant's chief complaint was low back pain and he gave the following summary of claimant's illness:
"About two weeks ago, while mopping at Santa Fe Hospital, patient noted gradual onset of low back pain. It became so severe that it was finally necessary for her to quit work. I have been seeing her in my office during the past week at which time she was put on muscle relaxants and diathermy, but all to no avail. She still continued to have her pain. It was decided to put her in the hospital where we could obtain some studies, possibly a myelogram; in any event, to treat her more intensively with heat and bed-rest and traction." (Record P. 45)
The doctor made the following physical examination findings in this same report:
"Well developed, well nourished, 57-year old female appearing younger than stated age, not appearing acutely or chronically ill. HEENT * * * Pupils round, regular, equal, react well to light and on accomodation. Ear canals and drums clear. Pharynx clear. Neck supple; no thyroid enlargement. Chest clear to percussion and auscultation. Heart reveals regular sinus rhythm; no murmurs or enlargement. Abdomen soft; no masses, spasms, tenderness; LKSB not felt. Extremities relatively unremarkable. There is considerable tenderness to deep palpation over the lower lumbar spine and just lateral to the lower lumbar spine around L-4, L-5 bilaterally." (Record P. 45)
In the hospital discharge report dated October 12, 1967, Dr. Miller noted:
"Patient was admitted with a 2-weeks history of low back pain; she has had one previous episode. Admitted for conservative treatment of back condition and possible myelogram if she did not clear. Px revealed considerable tenderness to palpation over the lower lumbar spine and just lateral to the lower lumbar spine around L-4, L-5, bilaterally. WBC revealed slight shift to the left, which was normal with 70 polys, 22 lymphs. IVP negative. Quantitative urine for culture was negative. Chest film normal. Spine films revealed degeneration and/or herniation of the L-4, L-5 disc.
"Patient was placed in bed and given a Kapok pad warm heat treatment to her lower back. She was given Ultrasound daily to lower back by the physiotherapy department, placed on Darvon-65 *344 p. r. n. pain. Over a period of a week back pain gradually disappeared. During this period of time she also noted frequent urination and nocturia 3-4m. Urinary studies were carried out which were negative. She recovered completely from back pain after 12 days in the hospital and she is being sent home today taking no medication except Darvon p. r. n. She will continue her Parafon Forte, if necessary. It is decided that she can return to work if her back pain disappears. Her work seems to aggravate her condition and it may be necessary for her to find some other profession because of this difficulty." (Record P. 47)
Dr. Miller indicated his final diagnosis in the hospital discharge report as:
"Degeneration and/or herniation of L-4, L-5 disc
Frequent urination, cause undetermined" (Record P. 57)
In another report dated March 20, 1968, Dr. Miller stated his diagnosis as "Low back syndrome with probable herniation of L-4 to L-5 disk." (Record P. 51) The following history of the patient was given by Dr. Miller in this report:
"This patient originally injured her back while working for the Santa Fe Hospital in the Winter of 1966-1967. At that time her anterior thigh muscles hurt while mopping, and she was off of work for 10 days. Again on September 11, 1967 while scrubbing a floor, her back began to hurt and has been hurting ever since. She was put on Parafon Forte, given diathermy treatment, a bed-board was suggested for her, and she had to use moist heat at home, and treatment continued from September 25th until October 1st, 1967 without much relief. She was hospitalized at St. Francis Hospital from October 1 to October 12, 1967, and her back was considerably improved. When seen on October 23, 1967, it was felt she could return to work and do light work. At that time she was given Darvon Compound and feeling much better. She was seen again in November and December of 1967, and January and February of 1968, at monthly intervals, at such time she stated that she had some soreness occasionally. Straight legraising was O.K. bilaterally except for slight soreness on the left when elevated to 90 degrees. It was felt that she would be able to continue to work in a sedentary type job but she should never again do heavy lifting or mopping such as she had done previously." (Record P. 48)
Dr. Miller further noted in this same report that "Because of this patient's limited educational background (8th grade) it will probably be difficult for her to obtain sedentary type of occupation which will be required for her with her difficulty." (Record P. 51)
In a report dated May 13, 1968, Dr. W. L. Beller, a radiologist, to whom the claimant had been referred by Dr. Donald D. Hobbs, stated as his conclusion the following:
"Moderate degenerative disc disease at the L4 level. Mild rotoscoliosis of the dorsolumbar spine. No other significant abnormality is apparent." (Record P. 58)
Dr. Donald D. Hobbs, specialist in orthopedic surgery, submitted a report dated May 27, 1968, in which he noted that the claimant complained of persistent low back pain with aching discomfort aggravated by bending and stooping. In this report Dr. Hobbs made the following findings upon examination of the claimant:
"Examination today reveals an alert, co-operative woman in no apparent distress. She moves about the examining room with normal gait. Does heel and toe walking without evidence of muscle weakness. There is no significant evidence of guarding on performance of trunk motions. Range of motion of the lumbar spine in flexion, extension and lateral flexion is essentially normal. The patient complains of increased discomfort on left lateral *345 flexion and on hyperextension. There is mild tenderness over the paravetebral musculature on the left with deep palpation. No significant gluteal sciatic notch tenderness. The patient complains of pain on any attempted mobilization of the left lower extremity, hip-knee flexion, straight leg raising or simple rotary motions of the hip joint. Certainly there is no appreciable limitation of straight leg raising and Laseque's test is negative. Domarque, Trendelenburg, Ober and Ely tests are all negative. The neurologic check including motor, sensory and reflex activity over the segmental distribution of the lumbosacral plexus is entirely physiologic. Babinski's sign is bilaterally absent. The popliteal stretch test is entirely negative." (Record P. 61)
Dr. Hobbs stated his impression as "Mild musculo-ligamentous strain residuals with underlying mild lumbar degenerative joint disease" and he concluded his report by saying "It is my impression that this patient is a suitable candidate for moderate work activity perhaps to exclude excessive bending, stooping and heavy lifting."
Dr. Miller submitted a supplemental report dated August 16, 1968, in which his diagnosis was:
"1. Low back syndrome, probable herniation of L-4 to L-5 disc.
2. Chronic rhinitis." (Record P. 72)
Dr. Miller further stated in this report:
"I saw the patient on March 25, 1968, at which time she had subsequently had a mild urinary tract infection prior to this time which was cleared up. She was having difficulty with leg cramps. A calcium and phosperous determination were obtained and found to be within normal limits. The patient stated that her back was well at that time. I saw the patient again on April 19, 1968 at which time her back was bothering her off and on but not as sore as usual. She had an acute bronchitis for which she was treated with expectorants, decongestants and given a course of inhalation therapy. She continued this until April 27, 1968, at which time was quite recovered from the infection.
I did not see the patient again until August 10, 1968, at which time she stated that she was still having some back trouble. She reported that she had stooped over one time last week and her back hurt her for only one day. She also stated that it hurt her to do any scrubbing or any physical work. She also had a chronic rhinitis. For the rhinitis I gave her some decongestants and sprays. She stated that she was taking Darvon Compound 65 PRN for her back difficulty." (Record P. 69)
The hearing examiner noted that the claimant "seemed somewhat younger than her stated age of 59, and about her stated height and weight of 5 feet 3 inches and 139 pounds, respectively." (Record P. 8) He also stated that the claimant "exhibited no significant signs or symptoms of any mental or physical impairments during the hearing." (Record P. 8)
In the disability interview report the interviewer indicated that claimant displayed no difficulty with walking, speaking, sight, hearing, use of hands and arms, breathing, sitting, reading, writing, responding, language, or comprehending. (Record P. 55)
The finding of disability in a social security disability case involves a two-step finding. First, there must be a finding that the claimant has a medically determinable physical or mental impairment. Second, assuming such impairment is found to be present, there must be a finding of whether the impairment, in fact, causes an inability to engage in any substantial gainful activity. See Knelly v. Celebrezze, 249 F. Supp. 521 (M.D.Pa.1965), and Burrell v. Finch, 308 F.Supp. 264 (D.Kan.1969). The first finding may require the application of objective and subjective evidence and the second is almost an entirely *346 subjective determination. See Mauldin v. Celebrezze, 260 F.Supp. 287 (D.S. C.1966). Certain elements of proof should be considered in making a finding of claimant's ability or inability to engage in any substantial gainful employment, and they are: objective medical facts and clinical findings; diagnoses and expert medical opinions of treating and examining physicians; subjective evidence of pain and disability testified to by claimant and other lay witnesses; and the educational background, work history and present age of claimant. See Morgan v. Gardner, D.C., 254 F. Supp. 977, and Huneycutt v. Gardner, supra.
As the defendant stated in his brief there is no question whether plaintiff has a back impairment and back pain because all the medical evidence indicates that she does. The defendant also correctly stated that the key question is whether that impairment and the attending pain are so severe that plaintiff is unable to engage in substantial gainful activity. (Defendant's Brief P. 5) The first portion of the two-step test has been met in that the plaintiff has a medically determinable impairment. The second part of the test as to whether that impairment and accompanying pain are so severe that the claimant is unable to engage in any substantial gainful activity is mainly a subjective determination. This Court is well aware of the fact that pain can be so severe as to be disabling in itself, with or without objective symptoms. See Bailey v. Cohen, (Templar, J., No. T-4266, unreported). The test is not whether the impairment, subjective or objective, would be disabling to a theoretical person but instead whether the subjective complaint independently or together with other impairments is disabling to this particular claimant. See Shonk v. Gardner, (Templar, J., No. T-4354, unreported); Burrell v. Cohen, supra; and Franklin v. Secretary of Health, Education and Welfare, 393 F.2d 640 (2d Cir. 1968). Subjective symptoms should be evaluated with due consideration for credibility, motivation, and medical evidence of impairment. See Dvorak v. Celebrezze, supra. The burden of proving disability under the Social Security Act is with the claimant, See McMillin v. Gardner, 384 F.2d 596 (10th Cir. 1967), and this burden need not be carried beyond a reasonable doubt. See Rose v. Finch, 303 F.Supp. 35 (W.D.Va.1969).
In the present case the plaintiff testified before the hearing examiner that she could perform certain household chores and that she could take care of her personal needs. A claimant need not be completely helpless, bedfast or at death's door in order to sustain her claim for disability benefits. See Perkins v. Ribicoff, 201 F.Supp. 332 (E.D.Ark.1961). The ability to do light housework does not constitute a true test of ability to engage in substantial gainful activity. See Murphy v. Gardner, 379 F.2d 1 (8th Cir. 1967); Jarvis v. Ribicoff, 312 F.2d 707 (6th Cir. 1963); and Mims v. Celebrezze, 217 F. Supp. 581 (D.Colo.1963).
The plaintiff in this case does have an impairment, a back condition, and there is testimony and evidence that she suffers some pain. The hearing examiner determined that the plaintiff could work as a waitress, laundry helper, or nurse's aide, occupations in which she had formerly engaged in. The Secretary does not have the duty of finding a specific employer for a specific job. See Gardner v. Brian, 369 F.2d 443 (10th Cir. 1966). In Statzer v. Cohen, 297 F.Supp. 874, 877 (W.D.Va.1969) the Court stated:
"The question here is not whether the claimant would be hired by an employer if he applied for work, but rather, whether he is physically and mentally capable of performing work which exists in significant numbers in the national economy."
Two of the examining physicians found, in effect, that the plaintiff could return to some type of work, either sedentary *347 or moderate, although not to her former employment. Dr. Miller noted in one of his reports that "Because of this patient's limited educational background (8th grade) it will probably be difficult for her to obtain sedentary type of occupation which will be required for her with her difficulty." (Record P. 51) This last notation is only an opinion of Dr. Miller, and this determination is for the Secretary to make after a review of all the proceedings in the case. The type of substantial gainful activity that a disability claimant can be found able to engage in must be both substantial and gainful, realistically judged by his education, training and experience. See Jones v. Gardner, 282 F.Supp. 56 (W.D. Ark.1966), and Nichols v. Gardner, 361 F.2d 963 (8th Cir. 1966). The fact that a claimant for disability benefits could not work without pain or discomfort does not satisfy the test for disability under the act. See Coomes v. Ribicoff, 209 F.Supp. 670 (D.Kan.1962). It must be remembered that the Social Security Act is not to be interpreted as unemployment compensation insurance. See Celebrezze v. Sutton, 338 F.2d 417 (8th Cir. 1964), and Richard v. Celebrezze, 247 F.Supp. 183 (D.Minn.1965).
The plaintiff's attorney stated in his brief:
"The problem in plaintiff's case is not whether there is waitress, laundry helper, or nurses aide work available, and whether she would be hired if she applied for those jobs that the hearing examiner determined that plaintiff could do, but rather whether under the medical evidence and plaintiff's own testimony she could perform those occupations on a `sustained basis' to the extent that she could have been `substantially gainfully employed' during the past two years." (Brief P. 8)
The finding of the hearing examiner that the claimant is able to work as a waitress, laundry helper or nurse's aide is not entirely supported by the objective and subjective factors considered in this case. Employment as a waitress could not be considered in any sense of the imagination as "sedentary" or "moderate" work activity. The plaintiff testified that she worked as an ironer for the American Linen Company for about eight months, but she left this employment when the company closed down. It is to be noted in this case that the plaintiff has made no effort to seek substantial gainful employment of any type. There is evidence that the plaintiff has a back impairment with accompanying pain; there is evidence that the plaintiff should not return to her former work as a maid at the Santa Fe Hospital; and there is evidence that the plaintiff is able to perform some type of work. The only evidence contrary to the plaintiff's ability to work is the plaintiff's belief that she cannot work. In the case of Carden v. Gardner, 352 F.2d 51, 52 (6th Cir. 1965) the Court stated:
"* * * it is also the rule that where the Secretary has found from the evidence that the claimant is able to engage in a former trade or occupation, such a determination `precludes the necessity of an administrative showing of gainful work which the appellant was capable of doing and the availability of any such work.'"
After considering the objective and subjective factors in this case the Court concludes that plaintiff is able to work as a nurse's aide and may be able to work as a laundry helper, occupations in which she was once engaged.
There is evidence and testimony in this case that the plaintiff received a small, lump sum workmen's compensation settlement. A determination of disability by a state or some other agency is not binding on the Secretary in a social security disability benefits case. See Neel v. Ribicoff, 204 F. Supp. 914 (D.Or.1962); Dupkunis v. Celebrezze, 323 F.2d 380 (3rd Cir. 1963); Sampson v. Flemming, 189 F.Supp. 725 (D.Kan.1960); and Stancavage v. Celebrezze, 209 F.Supp. 781, reversed on other grounds 323 F.2d 373 (3rd Cir. 1963).
*348 The plaintiff's attorney makes reference in his brief to the fact that the claimant was without representation of counsel during the proceedings. In Hullom v. Burrows, 266 F.2d 547, 548 (6th Cir. 1959), cert. den. 361 U.S. 919, 80 S.Ct. 262, 4 L.Ed.2d 187, it was said:
"The Sixth Amendment to the Constitution of the United States, which provides that in criminal prosecutions the accused shall have the assistance of counsel for his defense, does not apply to civil cases."
In his decision the hearing examiner stated that "* * * claimant did not have a representative, but was fully advised by the Hearing Examiner of her right to be represented, which right was waived by the claimant." (Record P. 5) There is no evidence in the record that the hearing examiner made any inquiry regarding claimant's representation at the hearing. Apparently the claimant did receive a notice of hearing which included information concerning representation, which read in part, "While it is not required, you may be represented at the hearing by an attorney or other qualified person of your choice, if you desire assistance in presenting your case." (Record P. 14) It then discussed the payment of a fee to the attorney or other representative. A claimant's lack of counsel in a social security disability benefits case does not require reversal of a decision denying benefits if the claimant had a fair opportunity to be heard, full opportunity to present evidence, and was not prejudiced by the absence of counsel. See Meola v. Ribicoff, 207 F.Supp. 658 (S.D.N.Y.1962). It is worthy of note in this case that the plaintiff was represented by an attorney in her workmen's compensation claim, which occurred prior to the proceedings in this case, and two letters from the plaintiff's attorney relating to the workmen's compensation claim were submitted at the hearing. The plaintiff's attorney in her workmen's compensation claim is the same attorney now representing the plaintiff on this review. The plaintiff was given a full and fair hearing before the hearing examiner even though she was not represented by counsel.
Plaintiff's attorney stated in his brief at page 3 that plaintiff weighed 165 pounds when hurt and she weighed 139 pounds at the time of the hearing. This statement is not supported by the evidence and testimony in the case. The plaintiff testified that she weighed 165 pounds until she was hurt, but in response to a question of the hearing examiner as to whether she weighed 165 pounds in September 1967 she stated that she weighed in the 40's then. (Record P. 21, 22) In the hospital admission report, Dr. Miller noted in his systemic review that claimant had lost 10 pounds in the last year. (Record P. 45) There is no evidence or testimony in this case that the plaintiff suffered a substantial loss of weight because of her injury or that any weight loss contributed adversely to her condition.
Plaintiff's counsel cited two Kansas workmen's compensation cases, Hanna v. Edward Gray Corp., 197 Kan. 793, 421 P.2d 205, and Miller v. Beech Aircraft Corp., 204 Kan. 184, 460 P.2d 535, in support of the proposition that the testimony of the plaintiff as to the duration of disability is to be considered as well as medical testimony. Although these two state cases involved workmen's compensation, the proposition is one which would be considered by the Secretary in reaching his decision in a social security disability benefits case. It was not overlooked in the present case.
The Secretary's determination is final if supported by substantial evidence. Any conflicts in the evidence or in reasonable inferences to be drawn therefrom is for the Secretary and not for the Court to resolve. Even if there is only a slight preponderance of evidence on one side or the other the Secretary's findings must be affirmed. See Ferrell v. Gardner, 260 F.Supp. 996 (S. D.W.Va.1966). This Court has carefully examined the record and briefs submitted in this case and concludes that the *349 findings of the Secretary are supported by substantial evidence except for the finding that the plaintiff could work as a waitress. This Court is convinced that the record fails to disclose that the plaintiff's impairment is of sufficient severity as to be disabling within the meaning of the Social Security Act.
For the above reasons, the Court must conclude that the decision of the Secretary be affirmed, the motion of the defendant for summary judgment is granted, and the complaint be dismissed.
It is so ordered.
| {
"pile_set_name": "FreeLaw"
} |
1. Historical Origins {#sec1-viruses-12-00132}
=====================
At a meeting of the Fellows of the National Institute of Agricultural Botany in Cambridge, UK, on 14 November 1924, Dr. Redcliffe Salaman gave a lecture entitled "Degeneration of the Potato---An Urgent Problem" \[[@B1-viruses-12-00132]\]. He reported that "potato degeneration", namely the decrease in yield when potatoes were grown year after year from tubers, rather than from true seed, cost the UK between five and ten million pounds sterling each year. He noted that the condition was first reported in 1778 at a meeting in Manchester, and called "potato curl". It was worse in lowland crops and in the Southern UK than in crops grown on higher ground and in the north, and although some thought it was caused by disease, perhaps insect-borne, others believed it was a form of senility resulting from repeated vegetative reproduction! Salaman concluded that that degeneration was caused by a complex of tuber-borne pathogens.
Salaman's talk was successful, as it induced the Ministry of Agriculture to found the Potato Virus Research Station in Cambridge and appoint him as director, and in turn he appointed Kenneth Smith as entomologist, who soon separated some of the components of potato curl and identified the viruses he called potato virus X and potato virus Y (PVY) \[[@B2-viruses-12-00132]\].
Other viruses similar to PVY were soon reported, for example, henbane mosaic virus \[[@B3-viruses-12-00132]\], which was like PVY in causing mosaic symptoms, being transmitted by sap, although relatively unstable in it, and also by being transmitted by aphids in short feeds. These viruses, which became known as potyviruses, short for "potato virus Y group viruses" \[[@B4-viruses-12-00132]\], were among those included in early attempts to devise biological taxonomies of plant viruses \[[@B5-viruses-12-00132]\] based on the length of their filamentous particles \[[@B6-viruses-12-00132]\]. They were also distinguished from other plant viruses by having serologically distinct virions and, biologically, by having distinct host ranges and causing distinct symptoms, and by their properties in infective sap, such as dilution end point, thermal inactivation point, and longevity in vitro. Sixteen different potyviruses had been described in 1959. Subsequently, in this pre-sequencing era, a combination of techniques, including sucrose density gradient centrifugation, analytical ultracentrifugation, ultraviolet spectrophotometry, and polyacrylamide gel electrophoresis were also included to establish the sedimentation coefficients and buoyant densities of virions, and the molecular weights of protein subunits and % nucleic acid contents, as all these properties provided additional distinguishing characteristics when novel viruses were being described \[[@B7-viruses-12-00132]\].
Virus identification and taxonomy were transformed later, when methods for sequencing genes were invented in the 1970s and applied to plant viruses \[[@B8-viruses-12-00132],[@B9-viruses-12-00132]\], and it was established that hierarchical groupings based on viral protein and gene sequences, including those of potyviruses, confirmed and extended those that had been devised previously by using phenotypic characters, serological tests, etc. As a result, 57 potyviruses had been identified by 1991 \[[@B10-viruses-12-00132]\], using sequences of the "part NIb-CP" region of their genomes, as this was bracketed by convenient primer sites \[[@B11-viruses-12-00132],[@B12-viruses-12-00132]\]. By 2000, over 1000 potyvirus sequences were recorded in the GenBank database, and there are now more than 26,000. The potyviruses now form a family, the *Potyviridae* \[[@B13-viruses-12-00132]\], containing at least eight genera of which the aphid-transmitted potyviruses, including the first described, PVY, make up the largest genus, *Potyvirus*. This large plant virus genus is one of the most important economically because of the yield and quality losses it causes in a wide range of crops worldwide. Moreover, some of its members currently endanger food security in developing countries by causing devastating diseases in tropical and subtropical food crops \[[@B14-viruses-12-00132]\].
2. The Origins of the Potyviridae {#sec2-viruses-12-00132}
=================================
The potyvirids are distinguished from other viruses by specific molecular differences, together with a combination of phenotypic properties \[[@B13-viruses-12-00132],[@B15-viruses-12-00132]\]. All potyviruses infect plants; most are transmitted in nature by arthropods---mostly by aphids---though bymoviruses are transmitted by root-infecting plasmodiophorids, which are cercozoan amoebae. Some potyviruses are seed-borne \[[@B16-viruses-12-00132]\]. Potyvirid virions are flexuous filaments, 680--900 nm long and 11--20 nm in diameter. Each is helically constructed from 1400 to 2140 subunits of a coat protein (CP), and a positive-sense, single-stranded RNA genome (usually monopartite, but bipartite in the genus *Bymovirus*) of 8--11 kb in total, which is wound into a groove within the CP subunits.
The ancestry and origins of the potyvirids is being revealed by studies of the structure and sequences of their genes and proteins. These show that their genomes are polyphyletic in origin, as there are significant similarities between three of their genes and those of viruses in three otherwise-unrelated virus genera; two detected by the protein sequence similarity of the helicase region of the CI protein and the RdRp region of the NIb protein, respectively, and the third by the structure of the CP \[[@B17-viruses-12-00132],[@B18-viruses-12-00132]\]. A BLASTp search of the GenBank protein sequence database (Sept 2019), using the eight main motif regions of the polyprotein of PVY (NC_001616), and excluding matches with sequences from the *Potyviridae*, found only significant matches between the "DEAD helicase-helicase C" region of the CI protein and that of classical swine fever and hog cholera pestiviruses (chance probability, 1e-12\_-16; 30% identity, 13% indels), and no others. Likewise, there were significant similarities between the PVY RdRp region and that of astroviruses (see below). Structural studies have only been reported for the CP protein of one potyvirus, watermelon mosaic virus (WMV), and reveal a structure that is closely similar to those of other viruses with flexuous filamentous virions, including two potexviruses, and also the enveloped flexuous nucleoproteins of orthomyxoviruses and bunyavirids, which include tomato spotted wilt tospovirus \[[@B19-viruses-12-00132],[@B20-viruses-12-00132],[@B21-viruses-12-00132]\]; all these CPs have a core domain rich in alpha helices. Each CP subunit interacts with five nucleotides (nts), and has 8.8 subunits per turn in a left-handed helix, with a pitch of 34.5--35 Å. Its N-terminus is external to the virion, and its C-terminus internal. The terminal regions interact with adjacent subunits and provide flexibility to the virion. In serological studies, the N-terminus is dominant and, in potyviruses, is also involved with aphid interactions \[[@B22-viruses-12-00132],[@B23-viruses-12-00132]\].
The sequences of their RNA-dependent RNA polymerases (RdRps) place the potyvirids in the "Picornavirus Supergroup" ([Figure 1](#viruses-12-00132-f001){ref-type="fig"}) \[[@B19-viruses-12-00132],[@B24-viruses-12-00132]\], where the potyvirids are outsiders, as most of the others have icosahedral virions made of eight-stranded antiparallel beta-barrel proteins, the so-called 'jelly roll' proteins. In the Wolf et al. \[[@B24-viruses-12-00132]\] taxonomy of RdRps ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}), the potyvirid RdRps form a cluster that is sister to an RdRp found in a metagenome, bufivirus UC1-gp2, isolated from "wastewater" collected in San Francisco. The sister clade to the potyvirid/bufivirus clade of RdRps are mostly those of the astroviruses, a group of gut-infecting viruses that are found in a wide range of animals, mostly mammals or birds. They have 28--35 nm diameter isometric virions (<https://en.wikipedia.org/wiki/Astrovirus> (accessed July 2019)). Sister to the RdRp clade of potyviruses/bufivirus/astroviruses are the RdRps of hypoviruses, amalgaviruses, partitiviruses, and picobirnaviruses, many of them metagenomes, including one from *Phytophthora infestans* \[[@B25-viruses-12-00132]\] and two from leeches \[[@B26-viruses-12-00132]\]. None of the motifs identified in potyvirus proteins, other than the RdRp, match those encoded by astroviruses; the nonstructural protein of a human astrovirus (NP_059443) was found to have the RdRp motif, but, in addition, only a trypsin-like peptidase, a restriction enzyme, and a motif of unknown function. The bufivirus metagenome includes a 3′ terminal S domain (jelly-roll) capsid protein gene indicating that it, like most of the picornavirus supergroup, including astroviruses, probably has isometric virions.
Most of the genome of all potyvirids encodes a single polyprotein, which is post-translationally hydrolyzed into ten proteins \[[@B15-viruses-12-00132],[@B27-viruses-12-00132]\]. It also encodes another protein (P3N-PIPO) in the −1 reading frame, and a second (P1N-PISPO) in a few potyvirids \[[@B28-viruses-12-00132]\]. From the N-terminus to the C-terminus, the ten potyvirus proteins are named as follows: P1-Pro, HC-Pro, P3, 6K1, CI, 6K2, NIa-Pro, Nib, and CP. The P1-Pro protein is a serine protease (S30) that self-hydrolyses its own C-terminal cleavage site. Next is the HC-Pro protein, which is a cysteine protease (C6) that also hydrolyses its own C-terminal cleavage site. The other eight proteins have seven cleavage sites hydrolyzed by NIa-Pro, the cysteine protease (C4), encoded by the eighth region. The eight largest motifs were found in all potyvirus sequences by using the motif-matching facility Pfam, in all three rymoviruses (agropyrum mosaic, ryegrass mosaic, and hordeum mosaic viruses), and in the two most closely related potyvirids, namely reed chlorotic stripe virus and blackberry virus Y. The genomes of bymoviruses and macluraviruses have smaller sets of the enzyme motifs as some of their N-terminal motifs are missing; Pfam (<https://pfam.xfam.org/> (accessed July 2019)) found only the C-terminal four motifs of the polyprotein in the complete polyproteins of barley yellow mosaic bymovirus, cardamom mosaic macluravirus, sweet potato mild mottle ipomovirus, and wheat streak mosaic poaceaevirus. A Pfam analysis of celery latent celavirus (CLV) found only the helicase C and RdRp genes found in other potyvirids. Thus, the RdRp or the helicase proteins are probably most appropriate for inferring the phylogeny of the potyvirids.
The phylogeny of RdRp genes of all named potyvirids shows that they form at least eleven genera, of which by far the largest is the potyviruses ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}). The RdRp of CLV \[[@B32-viruses-12-00132],[@B33-viruses-12-00132],[@B34-viruses-12-00132]\] is the sister of the RdRps of all other potyvirids, but those of the bymoviruses and macluraviruses are closest to that of bufivirus UC1 and the astroviruses as they are on the shortest branches. The virions and genome of CLV have all the features of a potyvirid, not a bufivirus. Its virions are flexuous filaments around 900 nm in length and contain a single genome of 11,519 nts \[[@B34-viruses-12-00132]\]. This confirms that their structure is likely to be closely similar to those of WMV as, using the known parameters of WMV virions, the 11,519 nts of the CLV genome will assemble with 2.304 CP subunits and form a helix 903--916 nm long \[[@B20-viruses-12-00132]\]. The similarities and differences between CLV and other potyvirids may indicate the properties of their shared ancestor. CLV was first reported from Europe. It is sap-transmitted to several dicotyledonous plants (dicots) from several different families, but there is no record of tests of monocotyledonous plants (monocots) as hosts, and like many potyvirids, it is readily seed-borne in two plant species. CLV was not transmitted by five species of aphids. Its genome has one major open reading frame (ORF), and a minor overlapping ORF, P3N-PIPO, in the -1 frame. It has some, but not all, of the motifs found in potyvirids, but not those associated with aphid-transmission in potyvirus genomes. CLV's one unique feature is a signal peptide at the 5′ terminus of its genome.
In summary, although the potyviruses and astroviruses share an RdRp ancestor \[[@B24-viruses-12-00132]\], none of their other genes are related, and no more potyvirus-like or astrovirus-like intermediate ancestors are known at present. Similar conclusions can be drawn about their shared helicase and CP genes. Nothing is known at present of the origins of the other potyvirus proteins, although their diversity and likely relationships suggest that they, and especially the P1 protein, have helped generate the extraordinary diversity of the potyvirids \[[@B35-viruses-12-00132]\]. Those unique to potyviruses may have arisen de novo, or by overprinting \[[@B36-viruses-12-00132],[@B37-viruses-12-00132],[@B38-viruses-12-00132]\], or may have come from other organisms of which the genes have not been sequenced yet. The only safe conclusion is that the potyvirids are polyphyletic in origin.
3. The Potyvirus: Rymovirus Divergence {#sec3-viruses-12-00132}
======================================
The potyviruses and rymoviruses are sister taxa ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}); they diverged from a common potyvirid ancestor that, judging from their phylogenetic distances, probably had blackberry virus Y and reed chlorotic stripe virus as successive sister viruses, although the genomic sequences of both of these viruses differ significantly from those of rymoviruses and potyviruses. Although most of the differences in the genomic sequences of potyviruses and rymoviruses, or the proteins they encode, are small, they are responsible for their phenotypic differences, including their transmission by different vector types, aphids and mites. Govier and Kassanis \[[@B39-viruses-12-00132],[@B40-viruses-12-00132]\] first reported that, for transmission by aphids, potyviruses required virions and a "helper component" present in infected plants. This was shown to be the protein now called HC-Pro, which was subsequently found to have several additional functions (reviewed by \[[@B15-viruses-12-00132]\]), including the ability to suppress RNA silencing. Potyvirus proteins have at least three motifs associated with aphid transmission \[[@B15-viruses-12-00132],[@B41-viruses-12-00132]\] including the DAG- motif at the N-terminus of the CP, and the -KITC- and -PTK- motifs of the HC-Pro protein; although the first two of these are not found in the homologous sites of rymovirus polyproteins, the last is. When the HC-Pro gene of mite-transmitted wheat streak mosaic tritimovirus (WSMV) was replaced by that of aphid-transmitted turnip mosaic potyvirus (TuMV), it was no longer transmitted by its mite vector \[[@B42-viruses-12-00132]\], but there is no report of similar experiments with rymoviruses or potyviruses.
Gibbs and Ohshima \[[@B43-viruses-12-00132]\] suggested that the divergence giving rise to the proto-potyvirus and proto-rymovirus is likely to have occurred in an infected Eurasian monocot. This conclusion was based on the fact that the primary hosts (i.e., the host from which they were first isolated) of all three rymoviruses are all Eurasian monocots; *Agropyron* (Eurasian; <https://en.wikipedia.org/wiki/Agropyron> (accessed 30 October 2019)), *Hordeum* (Eurasian, African, Americas; <https://en.wikipedia.org/wiki/Hordeum> (accessed 1 December 2019)), and *Lolium* (Europe, Asia, N. Africa; <https://en.wikipedia.org/wiki/Lolium> (accessed 18 December 2019)), and many of the basal potyviruses are too ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b). The list of potyvirus hosts closest to the rymoviruses depends on whether ORF or polyprotein sequences are used for estimating their patristic distances from the rymoviruses, but 16 of the nearest 20 are shared. Of these, 11 are from Eurasian plants (seven monocots and four dicots), and single hosts are from the Americas, Australia, Madagascar, and South Africa, and one is cosmopolitan. The possible dates of that divergence and of some of these invasions of other continents are discussed below.
4. Potyvirus Diversity {#sec4-viruses-12-00132}
======================
4.1. Phylogenetics {#sec4dot1-viruses-12-00132}
------------------
The evolution of potyviruses has been studied by using the two strategies widely used for investigating evolutionary rates and processes. Firstly, phylogenetics \[[@B44-viruses-12-00132]\], which is based on the premise that organisms evolve by mutation and selection, so that the resulting successive divergences can be represented as a tree \[[@B45-viruses-12-00132]\], and revealed computationally and quantified by comparing their properties, especially, nowadays, those of their gene sequences and the proteins they encode. Secondly, methods of population genetics can be used (see below in [Section 4.2](#sec4dot2-viruses-12-00132){ref-type="sec"}).
The ML phylogeny ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b) shows that most, but not all, of the lineages proposed in earlier published phylogenies (e.g., Gibbs and Ohshima \[[@B43-viruses-12-00132]\]), are confirmed. The relationships between the different potyviruses in the phylogeny are also closely similar to those in a published neighbor joining (NJ) tree phylogeny \[[@B13-viruses-12-00132]\], despite differing in relative branch lengths. Several of the virus lineages in the ML phylogeny are evident because they are subtended by long branches (Lineages 4, 5, 7, and 9); ML trees often define clusters more clearly than NJ trees, as their basal branches are relatively longer than their tip branches. Their long branches represent periods of the past that have only one known survivor, namely the lineage progenitors. Some lineages are additionally defined by the relationships of their primary hosts, namely the hosts from which they were first isolated, when the hosts are grouped at the "Order" level of the angiosperms (<https://en.wikipedia.org/wiki/APG_IV_system> (accessed 16 September 2019). Most viruses of Lineages 1 and 9 were first isolated from lilioids, most of Lineage 2 from commelinids, Lineage 4 and 7 from rosids, and Lineage 5 and 8 from asterids, whereas the hosts of some large lineages were from two plant clades, such as Lineage 3 which was from monocots (both alismatid and lilioid) or rosids, but rarely asterids, and Lineage 6, which was from a mixture of lilioids or asterids, but not rosids. These specificities are interesting as early attempts "to find some logic in the confusing issues of experimental host ranges of plant viruses" \[[@B46-viruses-12-00132]\] were not resolved by more data of the experimental hosts \[[@B47-viruses-12-00132],[@B48-viruses-12-00132],[@B49-viruses-12-00132]\]. However, the potyvirus lineages of primary hosts shown in [Figure 2](#viruses-12-00132-f002){ref-type="fig"} and [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b, and the even more exact correlations shown by the tobamoviruses and their primary hosts \[[@B50-viruses-12-00132]\], indicate that there are phylogenetically influenced components of both virus and host that control their biochemical compatibility. It might be that the greater molecular repertoire of monocots, asterids, and rosids, which have resulted from repeated genome duplication \[[@B51-viruses-12-00132]\], allow viruses to form functioning relationships with them. It is noteworthy that few potyviruses have been reported from caryophyllids and very few from basal angiosperms, such as the ranunculids, although hibbertia virus Y is from a Gunnerid, and catharanthus mosaic virus was isolated from *Welwitschia mirabilis* (a gymnosperm; \[[@B52-viruses-12-00132]\]). Two poty-like metagenomes have recently been reported from unexpected hosts (snails and a "dipteran mix") and are discussed below. Overall, the primary 'host preferences' of potyviruses among green plants is strikingly similar to the host preferences of their principal vectors, which are heteroecious aphids, that alternate between woody and herbaceous hosts, which are mostly rosids, asterids, and commelinids (grasses), but not caryophyllids \[[@B53-viruses-12-00132]\].
Genetic recombination is common in potyvirus populations \[[@B54-viruses-12-00132]\] and in potyvirus experiments \[[@B55-viruses-12-00132]\]. The populations of four potyviruses discussed in [Section 4.2](#sec4dot2-viruses-12-00132){ref-type="sec"} below, had 35% to 64% recombinants, and most reports conclude that recombination is an important factor driving the evolution of potyvirus populations \[[@B56-viruses-12-00132]\]. However, there have been few reports that potyvirus species are recombinants involving other described viruses. Therefore, RDP version 4.95 was used to analyze the 152 ORF sequences used for [Figure 3](#viruses-12-00132-f003){ref-type="fig"}, but only five recombinants were found. Hubei poty-like virus (Lineage 2; NC_032912) was the recombinant with greatest statistical support, but is probably an in silico contaminant, which will be discussed below (see Metagenomes, [Section 6.10](#sec6dot10-viruses-12-00132){ref-type="sec"}). The analysis confirmed that WMV (Lineage 3; NC_006262) is a recombinant with soybean mosaic virus (SbMV; NC_002634; Lineage 3) as a major parent with a minor 5′-terminal region closest to bean common mosaic virus (BCMV; NC_003397; nts 1-c.770), as previously reported by Desbiez and Lecoq \[[@B57-viruses-12-00132]\], and that Sudan watermelon mosaic virus (Lineage 4; NC035459) is also a recombinant with parents from Lineage 4, namely zucchini shoestring virus (NC_043172) and a minor 5′-terminal region close to wild melon vein banding virus (NC_035458; nts 1-c.550), as reported by Desbiez et al. \[[@B58-viruses-12-00132]\]. Two other recombinants are novel but less certain. The ORF of calla lily latent virus (CLLV; EF105298) is mostly related to that of SbMV, but has a 5′-terminal region distantly related (74.9% ID) to that of konjac mosaic virus (KMV; NC_007913; nts 1-c.570), and likewise most of the ORF of vanilla mosaic virus (VMV) is related to that of BCMV but it has a 5′-terminal region (nts 1-c.665) that is also distantly related (61.8% ID) to that of KMV; these links were not resolved by direct nBLAST searches. These results indicate that, at most, only four of the 152 distinct potyviruses, we compared, were generated by recombination.
The ORF phylogeny in [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b is closely similar to a ML tree of the polyprotein sequences encoded by the ORFs, although a graph comparing their patristic distances ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) shows that there are differences of up to 15% in individual branch lengths.
The patristic distances graph ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) also shows that the relationship between the ORF and polyprotein patristic distances is broadly linear except at the smallest axial values. This is perhaps evidence of mutational saturation, but not translational saturation; the rate changes may reflect the time-dependent bias in rate estimates of nt sequence change \[[@B59-viruses-12-00132],[@B60-viruses-12-00132]\].
4.2. Population Genetics {#sec4dot2-viruses-12-00132}
------------------------
As mentioned above in [Section 4.1](#sec4dot1-viruses-12-00132){ref-type="sec"}, the evolution of populations of organisms can be studied not only by phylogenetics, but also by using the methods of population genetics (popgen) \[[@B61-viruses-12-00132],[@B62-viruses-12-00132],[@B63-viruses-12-00132]\]. These describe features of gene populations, using mathematical models, and compare observed features with those likely to result from sequential random changes. Popgen analyses have been used to study potyvirus populations within plant populations (e.g., Achon \[[@B64-viruses-12-00132]\]; Li et al. \[[@B65-viruses-12-00132]\]; Wang et al. \[[@B66-viruses-12-00132]\]; Hajizadeh et al. \[[@B67-viruses-12-00132]\]) and, increasingly, virus populations within individual plants (e.g., Cuevas et al. \[[@B68-viruses-12-00132]\]; Domingo and Perales \[[@B69-viruses-12-00132]\]; Dunham et al. \[[@B70-viruses-12-00132]\]; Kutnjak et al. \[[@B71-viruses-12-00132]\]; Rousseau et al. \[[@B72-viruses-12-00132]\]; Seo et al. \[[@B73-viruses-12-00132]\]). Such studies have shown that the effective populations of potyviruses are all around 10,000 \[[@B74-viruses-12-00132]\], and the "The high potential for genetic variation in plant viruses need not necessarily result in high diversity of virus populations. There is evidence that negative selection results in virus-encoded proteins being not more variable than those of their hosts and vectors. Evidence suggests that small population diversity, and genetic stability, is the rule" \[[@B75-viruses-12-00132]\]. We have investigated whether popgen analyses of the genome sequences now available for five potyviruses with contrasting biologies can reveal features that correlate with their contrasting biological differences. Note that we use the terms phylogroups (PVYs), strains (PPVs), and groups (TuMV) somewhat interchangeably, as these are the terms used in quoted publications. The viruses we examined are as follows:
### 4.2.1. Potato Virus Y {#sec4dot2dot1-viruses-12-00132}
PVY, which originated in South America \[[@B29-viruses-12-00132]\] from a lineage of potyviruses ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b; Lineage 5) found mostly in solanaceous weeds and crops, and asteroid species in the Americas \[[@B76-viruses-12-00132],[@B77-viruses-12-00132]\]. Potatoes (*Solanum tuberosum*) were domesticated in South America and first taken to Europe in the 16th century. They became a major international vegetatively propagated crop after the mid-19th century. PVY, which is mostly spread by locally migrating aphids and planting infected seed tubers, is now common in the potato crops of the world, where recombinant PVYs have become particularly damaging.
### 4.2.2. Turnip Mosaic Virus {#sec4dot2dot2-viruses-12-00132}
TuMV, which is the only dicotyledon-infecting member of a lineage of potyviruses of lilioid monocotyledons ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b). It diverged about a millennium ago from a virus of European orchids, currently referred to as the OM TuMV outgroup \[[@B78-viruses-12-00132]\]. TuMV probably emerged to infect its crop and weed hosts during the development of agriculture in Eurasia in recent centuries. It is common in crops of several annual brassicas (canola, turnips, radish, etc.), that are grown from seed. It is also common in various perennial domesticated and weed *Brassicaceae* \[[@B79-viruses-12-00132]\]. TuMV has been reported as being seed-borne in some hosts \[[@B80-viruses-12-00132],[@B81-viruses-12-00132]\], but this has not been confirmed, and it is probably mostly spread by aphids migrating within and between populations of its perennial and annual hosts.
### 4.2.3. Plum Pox Virus {#sec4dot2dot3-viruses-12-00132}
Plum pox virus (PPV), which is a potyvirus of long-lived woody domesticated and wild *Prunus* fruit trees and shrubs. Its host populations are therefore much smaller and longer lived than the host populations of PVY and TuMV. PPV is usually considered to be a single species ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b), even though it has seven distinct strains. Its center of emergence was probably Eurasia \[[@B31-viruses-12-00132]\]. It is spread by aphids within a wide range of wild and domesticated *Prunus* species and non-*Prunus* weeds. PPV is also graft transmitted, and most of its crop hosts have been propagated by grafting for the last three millennia.
### 4.2.4. Sweet Potato Potyviruses {#sec4dot2dot4-viruses-12-00132}
The SwPVs, or sweet potato potyviruses ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b; Lineage 8), which have been isolated from sweet potato (*Ipomoea batatas*) crops in all continents, except Antarctica. The SwPVs are usually considered to be five species \[[@B28-viruses-12-00132]\], but as all have only been isolated from sweet potato, we included them as it is possible that they are a single diverse mega-species, and it is of interest to check whether or not population genetics methods agree.
### 4.2.5. Hardenbergia Mosaic Virus {#sec4dot2dot5-viruses-12-00132}
Hardenbergia mosaic virus (HarMV) is a potyvirus found in the wild only in southwestern Australia where it is widespread in the perennial native legume *Hardenbergia comptoniana* \[[@B82-viruses-12-00132]\]. It is a member of the BCMV lineage ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a; Lineage 3), which mostly radiated in South-East Asia \[[@B83-viruses-12-00132]\], and may have been carried to Australia by Austronesian boat people. This lineage probably arrived in Australia long before Europeans arrived in 1788, colonized the continent, and subsequently developed large-scale agriculture. Thus, HarMV is a virus with smaller known host and vector populations than the other four potyviruses considered here. Its biology is discussed in more detail below.
A summary of the results of the popgen analyses of the non-recombinant (n-rec) ORF sequences of these five viruses is shown in [Figure 5](#viruses-12-00132-f005){ref-type="fig"}, which includes an outline ML phylogeny of the ORF sequences of the five viruses, and parameters from a graph comparing their ORF and polyprotein patristic distances, comparable to [Figure 4](#viruses-12-00132-f004){ref-type="fig"}. The pairwise nt diversity for each virus (π) is, as expected, related to the maximum pairwise ORF patristic distance (max ORF-dist), and the horizontal width of the corresponding collapsed cluster in the tree. The ω values (dN/dS) for four of the viruses are in the range of 0.065 (PVY) to 0.086 (PPV) confirming that all are under strong negative selection; however, the value of 0.260 for the SwPVs indicate that these viruses are under less stringent negative selection and/or are not evolving as a single population, i.e., providing evidence that they are separate species \[[@B84-viruses-12-00132]\]. The slope (b) of the linear regression in a patristic graph comparing ORF and polyprotein trees ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) correlates with ω. The slope varied from 0.243 to 0.450 for the five individual viruses ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}). The slope was even greater for between-virus comparisons, and, for the 152 potyviruses represented in [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b, it increased from c. 0.6 at the smallest axis values to c. 1.3 ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}).
The popgen comparisons of the different phylogroups/groups/strains of PVY, TuMV, SwPVs, and HarMV isolates are given in [Tables S1 to S4](#app1-viruses-12-00132){ref-type="app"} and summarized in [Figure 6](#viruses-12-00132-f006){ref-type="fig"}. The data for PPV are from Hajizadeh et al. \[[@B31-viruses-12-00132]\]. All the groupings are monophyletic; the BRs group of TuMV is normally subdivided into a basal paraphyletic "basal-BR" group with a subgroup called "Asian-BR". It can be seen that around three-quarters of the groups are represented by 10 or more sequences. The diversity of each group (π) correlates with their collapsed cluster sizes with PPV groups having the smallest diversities and HarMV group/species having the largest. The ω ratio estimates for individual genes ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}) are considered to assess the strength of selection against translational change in the encoded protein. These fall into three groups; the proteins encoded by the n-rec genomes that are most strongly selected (smallest ω) are the HC-Pro, CI, Nia, and NIb proteins (ω = 0.047--0.055), an intermediate group is of the P1, P3, VPg, and CP proteins (ω = 0.101--0.229), and PIPO is least conserved (ω = 0.526), whereas the rec genomes give ω values that are around 10% greater, and in the same groupings except that VPg is one of the most strongly conserved proteins.
Comparisons of the popgen results for the five viruses are instructive. There are five major phylogroups in the world PVY population ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}), three of them (O, C, and N) are mostly n-rec, and two populations, R1 and R2, are based on single and double OxN recombinants. Commonest isolates from most potato-growing areas, and the most frequently sequenced, are O, R1, and R2 isolates. ORF sequences of the C phylogroup, which mostly have been isolated from a range of non-potato solanaceous hosts, are much more diverse ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}; π = 0.113) than those of the O and N phylogroups (π = 0.027 and 0.043), which were mostly isolated from potatoes, and this diversity is also shown in the number of segregating sites (S), mutations within segregating sites (η), and the average number of differences between sequences from the same populations (k). The ω ratios for the individual ORFs ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}), and for each of their genes separately ([Table S1.4](#app1-viruses-12-00132){ref-type="app"}), are less than one, indicating that their genomes are under dominant negative (purifying) selection; those of the n-rec isolates under stronger selection than those of the rec isolates (average ω 0.147 compared with 0.208), and with the PIPO gene ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}; yellow bars) under least selection. The phylogroups are genetically distinct and there is no evidence of gene flow between them ([Table S1.3](#app1-viruses-12-00132){ref-type="app"}; Ks, Z, Snn, and Fst tests), confirming that after the primary recombination events which established the R1 and R2 lineages there was no significant gene flow between them. The Tajima's D test ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}) gave a significant negative value for the O, R1, and R2 populations, confirming that they had recently expanded after a population bottleneck, and this reflects the adoption of potatoes as a major international crop after the mid-19th century with the O phylogroup and R1 and R2 necrogenic recombinants, but not the N and C phylogroups, as major pathogens of it. The major expansion evident in the Tajima's D scores was confirmed in popgen analyses of most of the individual PVY proteins ([Table S1.4](#app1-viruses-12-00132){ref-type="app"}), especially the HC-Pro, P3, CI, and VPg proteins. The evidence of less-stringent negative selection of the recombinant isolates (R1 and R2 phylogroups) is shown mostly in their P1 and PIPO genes.
TuMV, which is common in cultivated and weed brassicas worldwide, has four major groups: world-B, Iranian, BRs (basal-BR and Asian-BR), and basal-B. It also has the orchid outgroup found only in Europe, as mentioned above in [Section 4.2.2](#sec4dot2dot2-viruses-12-00132){ref-type="sec"}, TuMV-OM \[[@B78-viruses-12-00132]\], and although currently included with TuMV, this is clearly distinct according to its genetic differentiation coefficient ([Table S2.3](#app1-viruses-12-00132){ref-type="app"}; mean Fst 0.81; \[[@B83-viruses-12-00132],[@B84-viruses-12-00132]\]. It was therefore excluded from [Figure 6](#viruses-12-00132-f006){ref-type="fig"}. Most diverse, and basal to the brassicas infecting isolates of TuMV proper, are the basal-B and Iranian populations, and although Tajima's D test gave negative values with both the world-B and BRs (basal-BR and Asian-BR) groups, neither was statistically significant. The TuMV population is more genetically diverse than the PVY population ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}), but all TuMV genes, especially PIPO, are under stronger negative selection than those of PVY ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}). These clear popgen differences between the PVY and TuMV populations probably reflect biological differences that have affected translational selection; the PVY population has recently expanded its range rapidly, mostly by trade, and into monoculture crops, whereas the TuMV population has diverged as vector aphids have moved it between and within annual crops and perennial weeds, and this greater diversity of hosts may produce greater negative selection.
The PPV population has a smaller mean nt diversity than the PVY and TuMV populations; π for PPV is 0.121 ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}) and a mean of 0.020 for its strains ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}), but it has similar ω values. These differences probably result from its smaller population living in a long-lived woody host and transmission by grafting. Four of its major strain populations (D, M, CR, and C) have negative Tajima's Ds, but only that of the D strain is statistically significant, and this is the strain that spread during the 20th century across Europe and from there to the Americas and East Asia, whereas the others are mostly confined to Eurasia, which is probably the "center of divergence" of PPV. The ω values for the genes of different PPV strains ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}), especially those with larger sample sizes, are dominated by large values for PIPO, but it can be seen that the conserved genes of PPV (HC-Pro, CI, NIa, Nib, and CP) are, like those of PVY, less conserved than those of TuMV.
The popgen results for the SwPVs indicate that they are a lineage of separate viruses found in a single host species, not a single megaspecies. The mean nt diversity ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}) of the SwPVs (π = 0.258) is greater than that of the other four viruses (π = 0.064--0.139), and the diversities of its component species range from 0.020 to 0.057 ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}). They are also distinguished as species by the genetic differentiation coefficient (Fst \> 0.872) \[[@B85-viruses-12-00132],[@B86-viruses-12-00132]\]. The n-rec sequences of four of the SwPV populations are found worldwide, but that of sweet potato latent virus (SPLV) is not (see below), and all gave negative results in the Tajima's D test, but only that of SPVG was statistically significant; SPLV was excluded from these analyses as only three ORF sequences of it were available. Of interest too, is that all the SwPVs have a PIPO gene, like other potyviruses, but, in addition, all, except SPLV, have a second overlapping gene, PISPO, and the ω values ([Table S3.4](#app1-viruses-12-00132){ref-type="app"}) indicate that the PISPO genes of sweet potato feathery mottle virus (SPFMV) and sweet potato virus G (SPVG) are under positive selection (ω = 1.162 and 1.336) as is also the PIPO gene of sweet potato virus C (SPVC) (ω = 1.253).
The HarMV population was represented by a single population of 10 ORF sequences. It is the only 'wild plant' potyvirus which we examined. The results are remarkably similar to those of the other four viruses we checked. The HarMV sequences have a nt diversity (π) similar to that of TuMV and a ω value (0.078) similar to those of PVY and PPV but less than that of the SwPVs ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}, [Figure 7](#viruses-12-00132-f007){ref-type="fig"} and [Table S4.1](#app1-viruses-12-00132){ref-type="app"}). The ω values for individual HarMV genes ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}) have a pattern within those of the other viruses, and with no evidence from Tajima's D tests of a major recent population expansion. The HarMV population was more variable than that of Mediterranean ruda potyvirus (MeRV), which has a similar ecology \[[@B87-viruses-12-00132]\].
In summary, the results of the popgen analyses complement and confirm inferences obtained from phylogenetic analyses of the same ORF sequences (see above in [Section 4.1](#sec4dot1-viruses-12-00132){ref-type="sec"}). They also suggest that various popgen estimates, such as ω, Fst, and b, might be used as indicators of whether a population of similar viruses is one or more species. This could provide a more theory-based way of defining which viruses form natural potyvirus species, and hence could replace the present unsatisfactory method based on arbitrary maximum %ID values (\<76% nt identity and \<82% amino acid identity; \[[@B88-viruses-12-00132]\]). Estimates of various popgen parameters indicate that the SwPVs are probably separate species, as too are the brassica-infecting and orchid-infecting TuMVs. The possibility of using popgen parameters to define species was tested further by checking whether the fast-evolving isolates of the C phylogroup of PVY \[[@B29-viruses-12-00132]\] were a separate species. These 28 extra sequences were added and the popgen factors recalculated, but only marginally changed the popgen parameters, indicating that PVY is still a single species. Further tests were also made using the ORF sequences of 16 isolates of narcissus yellow stripe-like (NYSLV) viruses, which fall into five distinct clusters, although biologically indistinguishable. Ohshima et al. \[[@B89-viruses-12-00132]\] reported that it was uncertain whether the NYSLVs should be considered one species or more, as their ORF sequence diversity is at the %ID limit set by the ICTV for delineating potyvirus species. The ω values for the four largest clusters, each of three sequences, had a mean of 0.055 (range 0.054 - 0.058), but as the clusters were progressively clustered, as in their ML tree \[[@B89-viruses-12-00132]\] ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}) the value of ω increased to 0.117 \> 0.129 \> 0.146 \> 0.154 and finally 0.157 with the addition of the ORF of wild onion symptomless virus. These comparisons suggest that the NYSLVs are five independently evolving viruses, and that a calculated ω value greater than 0.1 is a useful indication that a population of potyviruses consists of more than one species.
5. Potyviruses in Space and Time {#sec5-viruses-12-00132}
================================
Attempts to add the dimensions of time and space to phylogenies of organisms, especially viruses, are currently a very active area of research \[[@B9-viruses-12-00132]\]. Although virus genomes can be recovered from preserved plant specimens, the maximum age of such recoveries is only around 1000 years \[[@B90-viruses-12-00132]\]. However, it is also possible to determine the age of virus populations that are evolving at a measurable rate by comparing the gene sequences of isolates collected "heterochronously" over the longest possible time period and analyze them by using Bayesian Monte Carlo coalescent methods in the BEAST packages \[[@B91-viruses-12-00132]\], or by regression methods such as "Least Squares Dating" \[[@B92-viruses-12-00132]\]. Bayesian methods also now extend to assessing virus migration pathways, using SPREAD \[[@B93-viruses-12-00132]\], etc. These methods have been used for elegant analyses of the spread of maize streak mastrevirus \[[@B94-viruses-12-00132]\], tomato yellow leaf curl begomovirus \[[@B95-viruses-12-00132],[@B96-viruses-12-00132]\], and of rice yellow mottle sobemovirus \[[@B97-viruses-12-00132],[@B98-viruses-12-00132]\], all of which, importantly, corroborate their conclusions using historical records of the spread of the diseases they cause. Studies on migration pathways for potyviruses are limited to TuMV \[[@B99-viruses-12-00132],[@B100-viruses-12-00132]\].
Studies of timescales have been made with several potyviruses. CP genes were used in early estimates of the "time to most recent common ancestor" (TMRCA) of the zucchini yellow mosaic virus (ZYMV) population \[[@B101-viruses-12-00132]\], the papaya ringspot virus (PRSV) population \[[@B102-viruses-12-00132]\], and of the initial radiation of all potyviruses \[[@B103-viruses-12-00132]\]. These studies gave compatible dates of 408 years before present (YBP), 2250 YBP, and 6600 YBP, respectively. CP genes were also used to obtain a recent estimate \[[@B104-viruses-12-00132]\] of 129--169 YBP as the age of the present narcissus late season yellows virus population. However, most dating studies of potyviruses have been of PVY and TuMV populations ([Table 1](#viruses-12-00132-t001){ref-type="table"}) and are based on gene sequences varying from full length ORFs of more than 9000 nts to the VPg gene of only 564 nts \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B100-viruses-12-00132],[@B105-viruses-12-00132],[@B106-viruses-12-00132]\]. The results show an interesting and unexpected positive correlation between the length of the sequence and its estimated TMRCA ([Table 1](#viruses-12-00132-t001){ref-type="table"}); the longer the sequence analyzed, the older the apparent age of the common ancestor.
External corroborative evidence for the PVY and TuMV dating studies is imprecise. TuMV studies \[[@B99-viruses-12-00132]\] estimated that the virus arrived in Australia and New Zealand from Europe, at dates that were consistent with records of its first appearance in those countries, and the timescale obtained from the complete ORFs of PVY \[[@B29-viruses-12-00132]\] dates major divergences of its two main lineages to the mid-19th century, and hence they coincide with a major European effort to breed potato late blight (*Phytophthora infestans*)-resistant potatoes and a significant increase in European potato cropping.
The estimated TMRCA of the population of one potyvirus can be extrapolated to those of other potyviruses, if their gene sequences align, and the alignment is used to calculate and compare them in a single ML tree; Fuentes et al. \[[@B29-viruses-12-00132]\] in their [Figure 4](#viruses-12-00132-f004){ref-type="fig"} showed that dates obtained from a ML tree and a Bayesian maximum clade credibility tree are linearly related. This is the basis of the "sub-tree comparison" method first used by Mohammadi et al. \[[@B107-viruses-12-00132]\], who showed that the TMRCA of the known world beet mosaic virus (BtMV) population is compatible with a 19th-century emergence of BtMV from wild beet rather than an ancient infection of chard or leaf beet. It was also used to show that the TMRCA of PPV was probably around 820 (range 865--775) BCE \[[@B31-viruses-12-00132]\], which is compatible with the invention of fruit tree grafting at the beginning of the first millennium BCE \[[@B108-viruses-12-00132]\]. When aligned representative sequences of TuMV, PVY, PPV, and the basal groups of the potyvirus tree were used to calculate an ML tree ([Figure S1](#app1-viruses-12-00132){ref-type="app"}), the divergence of the potyviruses and rymoviruses was dated, using the TuMV TMRCA ([Table 1](#viruses-12-00132-t001){ref-type="table"}), as 14,206 YBP, and using the PVY TMRCA, as 30,192 YBP. The later date is interesting as it suggests a possible route by which the PVY lineage invaded the Americas (see below, [Section 6.5](#sec6dot5-viruses-12-00132){ref-type="sec"}).
6. Evolutionary Vignettes from Potyvirus Studies {#sec6-viruses-12-00132}
================================================
6.1. Super-Adapters {#sec6dot1-viruses-12-00132}
-------------------
The conclusion that the potyviruses originated in Eurasia only a few tens of thousands of years ago is important, as it helps define the conditions that have allowed potyviruses to migrate and become the important and speciose genus it is nowadays. The hallmark property of potyviruses seems to be their ability to infect and maintain populations in a wide range of plants and to switch hosts often, but be constrained to particular clades of eudicotyledons. The divergence of potyviruses has occurred during the period when humans and their activities have come, increasingly, to dominate the world, and the ability of potyviruses to exploit those conditions have allowed them to become numerous and often damaging. Although humans originated in Africa around 300,000 YBP, they did not migrate beyond Africa's immediate environs until c. 80,000 YBP, then migrating to Asia and Australia, and eventually the Americas. Trade is an ancient human activity (<https://en.wikipedia.org/wiki/Trade#Prehistory> (accessed Dec 6 2019)), and seed-borne pathogens, such as potyviruses, are likely to have been carried along the 'Spice Trade' routes of the Indian Ocean, the Silk Road of Central Asia for many centuries. However, arguably the most important factor contributing to the success of the potyviruses and geminiviruses has been worldwide marine trade, which started with the exploration of the Americas by Columbus in the 15th century and resulted in the major exchange of plants and animals between the Americas and other regions of the world known as the Columbian Exchange (<https://en.wikipedia.org/wiki/Columbian_exchange> (accessed 6 December 2019)). Most recently, travel and trade by air has become important in the worldwide movement of viruses and their hosts despite an increased awareness of the importance of quarantine.
6.2. Australian Potyviruses {#sec6dot2-viruses-12-00132}
---------------------------
A large number of potyviruses have been found on the isolated continent of Australia, with many of them being found only there. They provide insights into the timing of potyvirus migration, as Australia was biologically isolated for many millions of years (<https://en.wikipedia.org/wiki/Wallace_Line> (accessed 16 December 2019)). Australia was first colonized by the Aborigines at least 40,000--65,000 years ago \[[@B109-viruses-12-00132]\] (<https://en.wikipedia.org/wiki/History_of_Indigenous_Australians> (accessed 10 December 2019)). It was linked to Papua New Guinea by a land bridge during the last Ice Age, forming the continent of Sahul, until this bridge was flooded 6500--8000 years ago \[[@B110-viruses-12-00132]\]. The Austronesian voyagers from Asia visited the north coast of Sahul during 3000--4000 YBP, but not until the 17th century did the Macassans collect trepang or bêche-de-mer and camp on the beaches of Northern Australia. Europeans explored the entire coastline of the continent around the same time and established permanent colonies in the 18th century. Regular trade between Australia and other parts of the world started about two centuries ago and has increased ever since. The spreading of potyviruses depends on the 'nonpersistent' transmission by migrating aphids, especially those of the dioecious *Aphidini*, which, although much more ancient \[[@B111-viruses-12-00132]\], have also been favored by the development of agriculture. Australia had, until recently, a very small population of potential aphid vectors of potyviruses (i.e., *Aphidoideae*), with no more than 20 endemic species; however, there are now around 200 other species of the 4700 mostly recorded in the temperate Holarctic regions of the world \[[@B112-viruses-12-00132],[@B113-viruses-12-00132],[@B114-viruses-12-00132],[@B115-viruses-12-00132]\].
Potyviruses constitute the largest virus group with representatives known from only Australia, with most being represented only by single partial nt sequences in GenBank. They fall cleanly into one or other of two groups. There are those commonly found in crops, and also found in crops in other regions of the world, and to which they are closely related. These potyviruses most probably entered Australia recently in trade. There is also a large number of potyviruses found in native or introduced weed species, but these are more distantly related to potyviruses from other regions of the world. Most of the latter are members of the BCMV group (Group 3, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a), whereas the recent migrants are from various groups. The Australian BCMV group potyviruses form two clusters. One consists of ceratobium virus Y (CerVY), dianella chlorotic mottle virus (DiCMV), euphorbia ringspot virus (ERV), glycine virus Y (GVY), kennedya virus Y (KVY), passiflora foetida virus Y (PfoVY), passiflora virus Y (PaVY), pleione virus Y (PleVY), pterostylis virus Y (PtVY), rhopalanthe virus Y (RhoVY) and sarcohilus virus Y (SarVY), and the other of clitoria chlorosis virus (ClCV), clitoria virus Y (CliVY), diuris virus Y (DiVY), eustrephus virus Y (EustVY), HarMV, hibbertia virus Y (HibVY), passiflora mosaic virus (PaMV), passionfruit woodiness virus (PWV), and siratro viruses 1 and 2 (Sir1VY and Sir2VY) \[[@B11-viruses-12-00132],[@B82-viruses-12-00132],[@B116-viruses-12-00132],[@B117-viruses-12-00132],[@B118-viruses-12-00132],[@B119-viruses-12-00132],[@B120-viruses-12-00132],[@B121-viruses-12-00132],[@B122-viruses-12-00132]\]. This suggests that there were two near-simultaneous incursions into Australia of viruses of the BCMV group, and the fact that PaVY is also found in New Guinea \[[@B120-viruses-12-00132]\] supports the suggestion \[[@B83-viruses-12-00132]\] that the early BCMV group viruses were brought from Asia to the north coast of Sahul by Austronesian speakers who were not only explorers but also colonizers; they traveled in outrigger canoes with various live domesticated plants and animals so that they could establish viable communities when they found habitable islands.
Recent studies using high throughput sequencing of plants belonging to the Southwest Australian native flora detected three additional potyviruses of orchids: blue squill virus A (BSVA), donkey orchid virus A (DOVA), and caladenia virus A (CalVA) \[[@B123-viruses-12-00132],[@B124-viruses-12-00132],[@B125-viruses-12-00132]\]. BSVA group with HarMV and PWV within the BCMV potyvirus group \[[@B125-viruses-12-00132]\], whereas CalVA and DOVA do not \[[@B103-viruses-12-00132],[@B125-viruses-12-00132]\], and their date and mode of entry to Australia is unknown.
6.3. Papaya Ringspot Virus {#sec6dot3-viruses-12-00132}
--------------------------
The spread of PRSV around the world is also an informative story. It was first recorded in Hawaii, by Jensen \[[@B126-viruses-12-00132]\], and has been reported since then from most of the world's tropical and subtropical regions. PRSV is a typical potyvirus, as it is transmitted non-persistently by several aphid species \[[@B127-viruses-12-00132]\], and also occasionally in seeds of papaya (*Carica papaya*) \[[@B128-viruses-12-00132]\] and *Robinia pseudoacacia* \[[@B129-viruses-12-00132]\]. In 1984, it was shown to be closely related to one of the potyviruses common in wild and cultivated cucurbit crops worldwide, and it was called watermelon mosaic virus 1 at that time \[[@B127-viruses-12-00132]\]. These viruses are now called the PRSV-P (papaya) and PRSV-W (watermelon) biotypes of a single species; PRSV-W infects cucurbits, but not papaya, whereas PRSV-P infects both papaya and cucurbits. Cucurbitaceous weeds are natural reservoirs of infection for crops of both PRSV biotypes \[[@B130-viruses-12-00132],[@B131-viruses-12-00132]\]. PRSV is closely related to several other viruses of cucurbits in the Middle East and Africa (Group 4, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a; \[[@B58-viruses-12-00132],[@B102-viruses-12-00132],[@B103-viruses-12-00132],[@B118-viruses-12-00132]\]), one of which is recorded to infect papaya in the Congo, causing serious disease including ringspots \[[@B132-viruses-12-00132]\]. PRSV probably arose in South Asia and spread from there to the remainder of the world, including the Americas \[[@B58-viruses-12-00132]\]. An isolated outbreak of papaya ringspot disease in Australia was particularly informative as phylogenetic studies of the CP gene sequences of PRSV from the outbreak \[[@B133-viruses-12-00132],[@B134-viruses-12-00132]\] grouped with sequences from the long established local PRSV-W population, rather than others from overseas. Thus, the local PRSV-W population was the likely source of the PRSV-P outbreak. Olarte-Casillo et al. \[[@B102-viruses-12-00132]\] questioned this conclusion when they used Mesquite 4.7 \[[@B135-viruses-12-00132]\] to make an "ancestral reconstruction" of the PRSV population, using all known CP sequences, and concluded that "ancestral state could be either of the two biotypes". Ancestral reconstruction assumes, however, that the data used are a representative sample of the world PRSV population, and c. 70% of the sequences they analyzed were of PRSV-P biotype, whereas surveys of 22 Pacific Islands \[[@B136-viruses-12-00132]\], where papaya and various cucurbits are commonly grown for food, found PRSV-W on 17 different islands, but PRSV-P on only four. More recently, Maina et al. \[[@B137-viruses-12-00132]\] found evidence that only one PRSV-W introduction, or multiple introductions of very similar isolates, has occurred to Australia since agriculture commenced following the arrival of European colonists. Thus, PRSV-W genomic sequences from the entire northern coastline of Australia most resembled those from Papua New Guinea (PNG), but differed from those from East Timor (ET) and elsewhere.
It seems that the PRSV-W to PRSV-P conversion occurs very infrequently. It was suggested \[[@B138-viruses-12-00132]\] that this host shift is controlled by the VPg-NIa-NIb region of the genomes of experimentally constructed PRSV-W x PRSV-P recombinants. Comparisons showed that simultaneous changes in three amino acids in the NIa were most likely involved: an Ala (W) to Val (P), an Asp (W) to Lys (P), and a Val (W) to Ile (P), all involving one or more first or second codon position mutations, which is an unlikely event.
6.4. The Columbian Exchange {#sec6dot4-viruses-12-00132}
---------------------------
It is clear that the host ranges and distribution of potyviruses have been greatly affected by the Columbian Exchange, mentioned above, in [Section 6.1](#sec6dot1-viruses-12-00132){ref-type="sec"}. For example, PRSV, as described above, in [Section 6.3](#sec6dot3-viruses-12-00132){ref-type="sec"}, is part of a lineage of Old World cucurbit viruses. It was reported by Olarte-Castillo et al. \[[@B102-viruses-12-00132]\] to have a TMRCA of 2250 (95%CI 9800-250) YBP, which is congruent with the report of Desbiez et al. \[[@B58-viruses-12-00132]\] that the TMRCA of the PRSV cluster is 3600 YBP. However, papaya is a native of tropical Southern Mexico and Central America and was confined to that area until about 1550 CE (470 YBP), when Spaniards carried seeds to the Philippines, and from there to Malacca, India, and to Naples in 1626 CE, so that now papaya is commonly grown in all tropical regions of the world \[[@B139-viruses-12-00132]\]. These facts indicate that PRSV-W is the pre-Columbian version of this virus of cucurbits, and, only recently, has papaya been spread around the world by mankind and, occasionally, where they have met "papaya ringspot disease" has been generated.
There are several other examples of "new encounter" potyvirus diseases involving a crop species from one region of the world that has been taken for the first time by mankind into the territory of a potyvirus, resulting in disease, often severe \[[@B140-viruses-12-00132]\]. Sweet potato, for example, was domesticated in Central America \[[@B141-viruses-12-00132]\]. It probably spread by natural means to Oceania, where it was found and exploited by the Austronesian explorers \[[@B141-viruses-12-00132]\]. Iberian galleons took sweet potatoes and other New World crops first to the Philippines and then to China and Okinawa by the early 17th century, and later to Korea. Sweet potato arrived in Europe across the Atlantic and was recorded in England in 1604 (<https://en.wikipedia.org/wiki/Sweet_potato> (accessed on 10 December 2019)). There is evidence that the five related potyviruses (Lineage 8, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}b) found in sweet potato throughout the world may have originated outside the Americas, long before sweet potato encountered them. SPFMV, SPVC, SPVG, and sweet potato virus 2 (SPV2) now have a worldwide distribution, judging from GenBank records, which reveal that the sequenced isolates came from Africa, the Americas, Asia, Europe, and Oceania (SPFMV, 34 countries/ 443 records; SPVC, 16/69; SPVG 19/150 and SPV2 9/22). By contrast, SPLV, which is the basal sister to the others, has 92 records, but only from China, South Korea, Taiwan, and Tibet, and all the most closely related viruses (PPV, hyacinth mosaic virus, and asparagus virus 1) are Asian or European, suggesting that the center of divergence of Group 8 is Asia, not the Americas.
6.5. The Major Lineages: BCMV and PVY {#sec6dot5-viruses-12-00132}
-------------------------------------
The BCMV and PVY lineages are the largest in the potyvirus phylogeny ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b; Groups 3 and 5). Both are clearly delineated by long branches, indicating a period in their history that produced no other known survivors. The BCMV lineage mostly radiated in SE Asia and Australia \[[@B83-viruses-12-00132]\], and its primary hosts are mostly rosids and monocots, and viruses of the group have caused most damage in crop species that originated in other areas of the world: common beans (*Phaseolus vulgaris*) from central America, passion fruit (*Passiflora edulis*) from South America, cowpea (*Vigna unguiculata*) from central Africa, only soybean (*Soja max*) being from SE Asia. By contrast, most of the primary hosts of the PVY lineage are asterids, and Fribourg et al. \[[@B76-viruses-12-00132]\] noted that all but two of the 27 viruses of the PVY lineage were isolated in the Americas, 17 of them having never been found anywhere else. Thus, it is likely that the PVY lineage diversified in the Americas, although how and when it originally migrated there from the Old World are interesting questions. If the TMRCA of PVY in [Table 1](#viruses-12-00132-t001){ref-type="table"} is correct, then [Figure S1](#app1-viruses-12-00132){ref-type="app"}, a ML tree of 38 representative ORF sequences, indicates that the long basal branch of the lineage covered the period 15.4--18.8 thousand YBP. This is the period human progenitors of the Amerindians are most likely to have migrated to the Americas (<https://en.wikipedia.org/wiki/Settlement_of_the_Americas> (accessed 17 December 2019); <https://en.wikipedia.org/wiki/Indigenous_peoples_of_the_Americas> (accessed 23 Dec 2019)) from Beringia, which was, at that time, at the eastern end of the mammoth steppe biome. This biome stretched from Iberia, across the north of Eurasia to Beringia (<https://en.wikipedia.org/wiki/Mammoth_steppe> (accessed 11 December 2019)). Around 16 thousand YBP, ice retreated enough to open one, possibly two, routes from Beringia into the Americas \[[@B142-viruses-12-00132]\]. The mammoth steppe was sub-Arctic and dominated by willow shrubs, grasses, and herbs, including many *Artemisia* spp. \[[@B143-viruses-12-00132],[@B144-viruses-12-00132]\], which are asterids, like many primary hosts of the PVY lineage viruses. It seems that no one has surveyed the viruses of *Artemisia* yet, and to do so might be very instructive.
6.6. Genetic Connectivity {#sec6dot6-viruses-12-00132}
-------------------------
This is a biosecurity term that refers to situations where genetically similar nt sequences occur among populations of the same virus obtained from infected plants growing in different countries \[[@B14-viruses-12-00132]\]. In studies with potyvirus isolates from infected crops in Northern Australia and nearby countries ET and PNG, genetic connectivity was demonstrated in three instances. These were between one location in Northern Australia and ET for ZYMV \[[@B145-viruses-12-00132]\], two locations in Northern Australia and ET for SPFMV \[[@B146-viruses-12-00132]\], and, as mentioned above in [Section 6.3](#sec6dot3-viruses-12-00132){ref-type="sec"}, locations spanning the entire region of Northern Australia and PNG for PRSV \[[@B137-viruses-12-00132]\]. Such findings indicate that important potyviruses of economically important crops are crossing the sea separating Northern Australia from nearby countries to the north. A possible explanation is that this connectivity has arisen through trade in either direction. Alternatively, it may have resulted from spread by viruliferous insect vectors blown across the sea by annual monsoonal wind currents. These findings emphasize the need for improved biosecurity measures to protect against potentially damaging international virus movements occurring by natural means in addition to those resulting from international trade in plant materials \[[@B137-viruses-12-00132],[@B145-viruses-12-00132],[@B146-viruses-12-00132]\].
6.7. Seed Transmission {#sec6dot7-viruses-12-00132}
----------------------
Several of the most important crop potyviruses have been shown to be seed-borne \[[@B16-viruses-12-00132],[@B147-viruses-12-00132]\]; however, many other potyviruses have not. Regardless, there are many records of crop potyviruses being found that could only be logically explained by seed transmission; indeed, it is likely that potyviruses are more frequently seed-borne than published records suggest perhaps because inadequate numbers of seeds were tested \[[@B148-viruses-12-00132]\]. There are many examples of potyviruses being spread from one part of the world to another by the international seed trade \[[@B14-viruses-12-00132],[@B16-viruses-12-00132]\]. Moreover, sowing potyvirus-infected seeds results in multiple infection foci consisting of infected seedlings scattered at random throughout crops. This constitutes a critical source from which aphid vectors can acquire a potyvirus and spread it throughout a crop resulting in serious virus disease epidemics \[[@B149-viruses-12-00132],[@B150-viruses-12-00132],[@B151-viruses-12-00132]\].
6.8. Potyvirus Emergence from Natural Ecosystems {#sec6dot8-viruses-12-00132}
------------------------------------------------
There is evidence of agriculture being practiced by Australia's aboriginal population well before the island continent was first colonized by Europeans in 1788. The crops they grew consisted of Australian native plants, such as wild yams and grasses grown for their storage roots and seeds, respectively \[[@B152-viruses-12-00132]\]. Interfaces between natural vegetation and introduced crop species only arose after 1788, and, in many parts of the continent, are much more recent than that. Such interfaces are therefore well suited to studies on potyvirus emergence from native vegetation to infect introduced crop plants and weeds, and vice versa \[[@B140-viruses-12-00132]\]. Two such studies documented the spread of HarMV from infected *H. comptoniana* plants to nearby plants of introduced lupin species \[[@B153-viruses-12-00132],[@B154-viruses-12-00132]\]. PWV may have spread from its indigenous Australian host *Passiflora aurantia* (golden passion flower) to cause widespread infection in recently introduced crop, forage and naturalized weed legumes and *Passiflora* spp., which originated in South and Central America, or East Asia \[[@B103-viruses-12-00132],[@B121-viruses-12-00132],[@B122-viruses-12-00132],[@B140-viruses-12-00132],[@B155-viruses-12-00132]\]. PaMV and PaVY have been found infecting the passionfruit crop and naturalized introduced weeds so presumably also spread to them from an as yet unknown native plant host. Similarly, the indigenous Australian potyviruses of *Clitoria* and siratro (*Macroptilium atropurpureum*) have so far only been isolated from naturalized introduced weeds but presumably spread from unknown native plant hosts to introduced species after European colonisation \[[@B82-viruses-12-00132],[@B118-viruses-12-00132],[@B155-viruses-12-00132]\]. CerMV, DiVY, EustVY, GVY, HibVY, KVY, PleVY, and PtVY, have so far only been found infecting native plant species \[[@B118-viruses-12-00132],[@B155-viruses-12-00132]\], whereas RhVY and SarVY have only been isolated from imported orchids \[[@B118-viruses-12-00132]\].
In situations where a stable mixed plant population infected with viruses has co-evolved with native wild plants over a significant period in a given world region, populations of its isolates collected over a limited geographic range are likely to be diverse (e.g., Spetz et al. \[[@B156-viruses-12-00132]\]). Isolates of the most studied Australian indigenous potyviruses, HarMV, PaVY and PWV, provide excellent examples of this phenomenon \[[@B82-viruses-12-00132],[@B122-viruses-12-00132]\]. The localized natural distribution of HarMV reflects that of its Australian principal native host plant *H. comptoniana*. PWV and PaVY occur most commonly in the warmer tropical and subtropical regions of the Australian continent, where, as described above in [Section 6.2](#sec6dot2-viruses-12-00132){ref-type="sec"}, they infect a range of hosts. When ClVY, HarMV, PaVY, and PWV were inoculated to Australian native plant species, some that became infected produced surprisingly severe systemic symptoms. This observation did not support the suggestion that indigenous viruses are likely to be harmless when they infect wild plants. Instead, it indicates that, when they encounter native plant species they are not adapted to, they will likely behave in the wild just like crop viruses behave when they infect new crops \[[@B157-viruses-12-00132]\].
6.9. Historical Potyvirus Specimens {#sec6dot9-viruses-12-00132}
-----------------------------------
Historical collections of plant viruses are proving extremely valuable in linking the pre- and post-sequencing eras of potyvirus research. This applies not only to providing sequence data for dating studies described above in [Section 5](#sec5-viruses-12-00132){ref-type="sec"}, as these require comparisons between the sequences of old and recent potyvirus isolates covering the largest possible timespan, but also in revealing whether potyviruses studied in the post-sequencing era are named correctly, and if new sequences from unpublished potyvirus isolates from historical collections can be linked with those of established viruses.
Studies on historical isolates preserved since the 1970s and 1980s from the Andean region of South America and Europe provide examples. With PVY, a dating study without these historical isolates suggested the "time to most common ancestor" (TMRCA) of PVY was the 16th century \[[@B105-viruses-12-00132]\], whereas a similar study which included sequences from European isolates from the 1980s \[[@B158-viruses-12-00132]\] placed its TMRCA around 1000 CE \[[@B106-viruses-12-00132]\]. When new PVY isolates from the Andean potato domestication center were included in dating analyses, along with the 1980s European sequences, the TMRCA was estimated to be around 156 CE \[[@B29-viruses-12-00132]\]. This study concluded that, although PVY was first taken to Europe in the 16th century in potato tubers after the Spanish conquest of Peru, as mentioned above in [Section 5](#sec5-viruses-12-00132){ref-type="sec"}, most of the current PVY diversity developed in the mid-19th century, when additional potato breeding lines were imported to help develop potatoes resistant to the potato late blight pandemic then occurring.
Historical samples were also valuable when the sequence of a historical arracacha virus Y (ArVY) isolate collected in Peru in 1976 was compared with other potyvirus sequences, as it had 79% nucleotide identity with a 2013 Brazilian isolate of the subsequently described arracacha mottle virus, showing the latter was actually ArVY \[[@B159-viruses-12-00132]\]. Similarly, when a potyvirus sequence obtained from a 33-year-old mashua (*Tropaeolum tuberosum*) sample was sequenced and compared with other potyvirus sequences, it was found to be a distinct potyvirus to which the name mashua virus Y (MasVY) was given; MasVY's relationships to three other potyviruses (Tropaeolum mosaic virus, Tropaeolum virus 1 and Tropaeolum virus 2), described previously from the same host, are unknown, as the genomes of these viruses are still not sequenced \[[@B160-viruses-12-00132]\]. Finally it is noteworthy that two isolates of a potyvirus collected from pepino (*Solanum muricatum*) in Peru in 1976, and kept in a historical collection thereafter, have been recently shown, along with five new Peruvian pepino potyvirus isolates, to be isolates of wild potato mosaic virus, a virus previously known only from the wild potato *Solanum chancayense* \[[@B76-viruses-12-00132],[@B161-viruses-12-00132]\].
6.10. Metagenomes, A New Frontier? {#sec6dot10-viruses-12-00132}
----------------------------------
Recently, new methods of gene sequencing have permitted surveys of virus-like genes and genomes in environmental samples (soil, water, air, etc.) and in bulk cellular material (blended invertebrates, etc.). The resulting metagenomic sequences have greatly expanded the size of the known virosphere \[[@B24-viruses-12-00132],[@B162-viruses-12-00132]\].
Two metagenomes appeared in the genomic sequences downloaded from GenBank, using the search term "Potyviridae", and both were reported from China. One is of Wuhan poty-like virus 1 (KX884573), which groups with the macluraviruses ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}). It was isolated from the blended remains of 12 Chinese land snails (*Mastigeulota kiangsinensis*), collected in Wuhan, and has 73% ID with 95% cover of the genome of broad-leaved dock virus A (NC_038560) from *Rumex obtusifolius* from New Zealand. It is more distantly related to yam chlorotic necrosis virus (MH341583) from *Dioscorea alata* from India. Thus, Wuhan poty-like virus is more likely to be a constituent of the snails' last supper than a virus infecting the snails. The other metagenomic potyvirid is Hubei poty-like virus 1 (NC_032912), which was obtained from a "dipteran mix" of insects collected around Hubei. It is a recombinant with a major parent (nts 1-7630, 98% ID; 84% of the sequence) closest to an unusual isolate of sugarcane mosaic virus from *Canna* sp., in China (KY548507), and a minor parent (nts 7631-9094) closest to an unusual isolate of bean yellow mosaic virus (DQ060521; 95% ID) also isolated from "naturally planted" Canna sp., in China. This again suggests a contaminant virus, not an infection of the dipterans in the source material. Thus, both potyvirus-like metagenomes are more likely to be from contaminating plant materials than from the tissue of the animals being tested. Furthermore, Hubei poty-like virus 1 is probably an in silico recombinant, as its likely recombination site is adjacent to the region encoding the -GNNSGQP- motif, which is a conserved potyvirid motif \[[@B11-viruses-12-00132],[@B12-viruses-12-00132]\], and both 'parents' detected by BLASTn had been isolated from Canna plants.
7. Conclusions {#sec7-viruses-12-00132}
==============
The major value of the esoteric studies of potyviruses described in this review is to provide a coherent evolutionary framework in time and space within which it is possible to plan how best to minimize the damage done by potyviruses to plants valued by humankind. Such a framework also contributes to the understanding of how potyvirus infections interact with plant populations within managed and natural ecosystems. Moreover, knowledge of the relationships of each virus, especially a newly emerged one, can provide valuable predictions of its likely behavior by extrapolating the known properties of near relatives and adding a timescale to those inferences greatly enhances their value and likely accuracy.
The story in our review started in 1931, with PVY, one of the first two described viruses of potato, but now, nine decades later, at least 49 more viruses of potato have been recorded \[[@B163-viruses-12-00132]\]. The group of viruses, of which PVY is the type, is now represented in GenBank by genomic sequences of more than 150 different potyviruses and a third as many other potyvirids. Their discovery represents a considerable international effort as an analysis of the 2610 'country' records ([Table S5](#app1-viruses-12-00132){ref-type="app"}) shows that they came from 82 different countries from all regions of the world. The pioneers of potyvirology, Redcliffe Salaman, Kenneth Smith, Fred Bawden, Basil Kassanis, et al. discovered the first of a fascinating lineage of viruses that has provided us and others with an enormous amount of interesting and valuable work with no sign that the lode will 'run out' anytime soon.
Apart from the four authors, nobody else helped with this study.
######
Click here for additional data file.
The following are available online at <https://www.mdpi.com/1999-4915/12/2/132/s1>. Tables S1--S4. Popgen results; Table S5 (XLS file); The 'country' records of 2610 potyvirid genome sequences; Figure S1. A ML phylogeny of 38 representative potyviruses making subtree comparisons of node dates.
R.A.C.J. initiated the project; A.J.G., M.H., and K.O. analyzed the data; all authors contributed to writing the paper. All authors have read and agreed to the published version of the manuscript.
In Japan, this work was supported by the Japan Society for the Promotion of Science Grant numbers 16K14862 and 18K05653. It received no external funding from Australia or Iran.
The authors declare that they have no conflicts of interest.
![The phylogeny of the RdRps of selected potyvirids, and of the other most closely related viral RdRps (redrawn from \[[@B24-viruses-12-00132]\]).](viruses-12-00132-g001){#viruses-12-00132-f001}
![A maximum likelihood (ML) phylogeny of 166 potyvirids, calculated using the same methods as \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B31-viruses-12-00132]\], from the protein sequences encoded by the RdRp regions of all genomes with GenBank Reference Sequence Accession Codes (July 2019), together with any others that had unique names. The most closely related non-potyvirid, bufivirus UC1, is included as an outlier. Branch colors indicate the major angiosperm "Order" from which each virus was isolated (i.e., its "primary host"); eudicotyledon rosid (red), asterid (blue), or caryophyllid (yellow) and monocotyledon (green) alismatid "A", lilioid "L", or commelinid "C". The RdRps of potyviruses branching most closely to the rymoviruses are shown, and the phylogeny of the other 103 is collapsed. The nodes with a red disk have \>0.9 SH support.](viruses-12-00132-g002){#viruses-12-00132-f002}
######
An ML phylogeny of 149 potyvirus ORF sequences with three rymovirus ORFs as outgroup using the same methods as \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B31-viruses-12-00132]\]. The ORFs are from all 126 potyviruses represented in GenBank in mid-2019 by Reference Sequences, together with single representative sequences of all 23 other potyviruses in GenBank with unique names. Note that (**a**) shows the three rymoviruses and Lineages 1--4, whereas (**b**) shows Lineages 5--9. The "Order" of the primary host, namely the plant from which each was first isolated, and often given in the name of the virus, is shown by the branch color (and letter), eudicotyledonous rosid (red), asterid (blue), or caryophyllid (yellow) and monocotyledonous alismatid "A", lilioid "L", or commelinid "C".


{ref-type="fig"}a,b and the ML tree of the protein sequences encoded by these ORFs; 149 potyviruses and three rymoviruses are included.](viruses-12-00132-g004){#viruses-12-00132-f004}
{#viruses-12-00132-f005}
{#viruses-12-00132-f006}
{#viruses-12-00132-f007}
viruses-12-00132-t001_Table 1
######
Timescale analyses of potato virus Y and turnip mosaic virus.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Parameter PVY TuMV
------------------------------------------------------------ ------------------------------------------------- ----------------------------------------------------- --------------------------------------------- ---------------------------------------------- ---------------------------------------------- ---------------------------------------------- ----------------------------------------------
\[[@B105-viruses-12-00132]\] \[[@B29-viruses-12-00132]\] and this study \[[@B106-viruses-12-00132]\] \[[@B100-viruses-12-00132]\]
Method BEAST 1.7.2 BEAST 1.8.2 BEAST 1.8.4 BEAST 1.8.2
Number of sequences; 28 162 177 106 329 369 369
Sequence length (nucleotides) 9723 8913 564 9432 927 873 855
Region Polyprotein Polyprotein VPg Polyprotein Partial HC-Pro Partial P3 Partial NIb
Sampling date range 1982--2010 1943--2016 1983--2015 1968--2012 1968--2012 1968--2012 1968--2012
Best-fit substitution model GTR+I+G GTR+I+Γ~4~ HKY+G~4~ GTR+I+G GTR+I+G GTR+I+G GTR+I+G
Best-fit clock model UCLD, UCED, SC UCLD UCLD UCED UCED UCED UCED
Best-fit demographic model ND EG, BSP BSP CZ CZ CZ CZ
TMRCA (95% CI)\ 161--619 (UCLD), 123--436 (UCED), 525--970 (SC) 1841 (1157--2622) (EG),\ 158 (71--269) 1201 (468--2150) 951 (326--1291) 758 (274--1548) 758 (274--1548)
Year before present (YBP) 1879 (1192--2659) (BSP)
TMRCA effective sample size ND 238 (EG), 261 (BSP) ND ND ND ND ND
Substitution rate (nt/site/year) Unknown 9.30 × 10^−5^ (6.79 × 10^−5^--1.18 × 10^-4^) (EG),\ 5.6 × 10^−4^ (3.35 × 10^−4^--8.17 × 10^-4^) 8.89 × 10^−4^ (6.87 × 10^−4^--1.30 × 10^−3^) 1.41 × 10^−3^ (1.09 × 10^−3^--1.78 × 10^−3^) 1.46 × 10^−3^ (1.25 × 10^−3^--1.87 × 10^−3^) 1.37 × 10^−3^ (1.04 × 10^−3^--1.73 × 10^−3^)
9.16 × 10^−5^ (6.90 × 10^−5^--1.15 × 10^−4^) (BSP)
Substitution rates effective sample size ND \>200 \>200 ND ND ND ND
Date (DRT) or cluster-based date (CDRT) randomization test Not passed DRT passed CDRT passed DRT passed DRT passed DRT passed DRT passed
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Best-fit clock model: uncorrelated relaxed lognormal distribution, UCLD; uncorrelated relaxed exponential distribution, UCED; strict clock, SC; expansion growth, EG; Bayesian skyline plot, BSP; constant size, CZ; exponential population growth, EPG. YBP, see sampling date range; ND, not done.
| {
"pile_set_name": "PubMed Central"
} |
A nuclear overhauser study of heme orientational isomerism in monomeric Chironomus hemoglobins.
The nuclear Overhauser effect (NOE) was used to investigate heme orientation and to obtain assignments for all resolved resonances in the 1H-NMR spectrum of met-cyano Chironomus thummi thummi monomeric hemoglobins III and IV (Hb III and Hb IV). The only non-heme resolved resonance was found to be from Phe-38 (CD1), and NOE dipolar connectivity between this resonance and the heme 5- and 8-methyls was used to establish the absolute orientation of the heme for each heme-insertion isomer present. The assignments of resonances and heme disorder permitted structural comparisons between the various components, including those due to a point mutation in Hb III. Finally, the characteristic differences of NOE patterns to amino-acid protons from substituents on heme pyrroles I and II formed the basis for assigning resonances and heme orientation relative to native Hb IV for deuterohemin-reconstituted Hb IV, for which there are no X-ray data available. | {
"pile_set_name": "PubMed Abstracts"
} |
Piggy-backing on the ongoing Apple Maps drama, The New York Times gives us a couple interesting tidbits that help explain the origins of Google Maps on the iPhone. For starters, Apple never intended to put maps on the iPhone. It was a decision late CEO Steve Jobs made last minute, one that would cost Apple its reputation five years later as Apple rushed its own solution out of the door too early.
In a way, the report notes, Apple Maps continue on a string of Internet services missteps, with notable examples of the recently axed Ping social network for music, Siri, a controversial digital assistant, the MobileMe suite of web tools and recent iCloud outages.
These blunders expose Apple as a hardware and design-focused culture, which is more often than not a difficult match for online services on a world scale, where Google rules the landscape by a wide margin…
Nick Wingfield and Brian Chen filed this report with The New York Times, based on interviews with former Apple engineers:
Including a maps app on the first iPhone was not even part of the company’s original plan as the phone’s unveiling approached in January 2007. Just weeks before the event, Mr. Jobs ordered a mapping app to show off the capabilities of the touch-screen device.
Remarkably, just two engineers managed to scrap together an app for Steve Jobs keynote in three weeks and Apple “hastily cut a deal with Google to use its map data”.
It began to bother executives how much data about the behavior of iPhone users was flowing back to Google, which could see the coordinates of every iPhone user who downloaded a map, the former executive said.
This was all happening at a time when Apple and Google were buddies, with then Google CEO Eric Schmidt having a seat on Apple’s board of directors – even though at that point Google was working on its own mobile operating system, which it had acquired two years earlier, in 2005, in the form of Android, Inc. a Palo Alto startup headed by Andy Rubin, the founder of Danger and now Senior Vice President of Mobile and Digital Content at Google.
The contention erupted in 2008 as Android began introducing iPhone-like features:
That year, Mr. Jobs drove to Google’s headquarters and got into a screaming match with Google’s founders, Larry Page and Sergey Brin, and the head of its Android development team, Andy Rubin, as he tried to discourage them from copying the iPhone, according to an account of the meeting in Walter Isaacson’s biography of Mr. Jobs.
Rubin to this date continues to oversee development of Android.
It would take Apple some time to realize what was happening and force Schmidt to resign from the Board “due to potential conflicts of interest”.
This corner Apple has painted itself into with Maps today may never have happened if Jobs hadn’t misplaced his trust in Schmidt.
Here’s Steve Jobs placing a prank call to Starbucks via Google Maps at the iPhone keynote in January 2007.
The report goes on to assert that “Google was blindsided” by the Apple Maps introduction at WWDC 2012, despite numerous reports and Apple’s acquisitions of mapping startups Placebase, Poly9 and C3 Technologies.
A former Apple executive told the paper that Apple was caught off guard by Mapgate:
“They’re embarrassed by it,” he said. Many of the problems are a result of merging map data, some of it flawed, from many sources.
Another source sums it up nicely:
“I always felt if you had to name an Achilles’ heel at Apple, it’s Internet services,” said Andrew Borovsky, a former Apple product designer who worked on MobileMe and now runs his own design firm in New York. “It’s clearly an issue.”
Maps is an important part of iOS 6, but it’s not the most important part. Would the iPhone stop working without Maps? No, it would be just fine. Apple is not going to fail because of a mapping application — they will take their lumps and deliver a better app in the future.
Related Topics
You do realize that at some point people want to read different articles than Apple Maps right? Talk about overkill. Mercy.
CollegiateLad
Yeah, it’s serious overkill…
Why not produce an iPhone 5 availability tracker list for consumers who want an iPhone 5, but can’t locate one? That’s something readers will find very useful. I’ve been searching all over the place for my wife one and everyone seems to be out of stock.
MagicDrumSticks
Lamborghini mercy
Dan
they have nothing else better to talk about, iphonemapsblog?
CollegiateLad
They may not have been an Internet services company in the past, but they’ve got it together now. iCloud is awesome and iTunes Match is brilliant. And I think Maps will be the best mapping service in the “near” future.
I think this bad press is a blessing in disguise. Apple may not like it now, but in five years they will be better because of it.
http://www.facebook.com/mattthegoodwin Matt Goodwin
icloud is not awesome. the web interface is awful. main reason i had to switch to gmail. i was an apple employee for 2 years and i tried to like the web interface of mobile me/icloud but its just style over function.
CollegiateLad
Works great… All my devices are in sync: Mac, iPad, and iPhone. Bought a new phone everything synced fast over LTE before I arrived home. Love it!!! Find my phone is awesome too. iWork is brilliant. Couldn’t be happier.
http://twitter.com/Branhower Branhower
I really don’t think the web interface is a huge breaker. iCloud is primarily designed to keep your digital life in sync, the web interface is just an afterthought.
EpicFacepalm
iCloud uses Amazon And Microsoft’s servers and none of them are running Mac OS… I unfortunately disagree
CollegiateLad
Apple uses its own data centers now. There’s a new mammoth one in NC. And there are several others being built around the world.
Kurt
Not going to happen
http://www.facebook.com/j.terrymma Jeff Terry
“Cost Apple its reputation”… Are you serious? Do you honestly believe that this whole over blown situation has caused Apple to ruin its reputation? Absolutely not, But it sure is making these Media sites, And journalist look really stupid.
I Agree with the below post, Enough with the maps, We get it, You don’t like it, Now MOVE ON!!!
Apple Maps is no where near as bad as you people are making it out to be.
CollegiateLad
I’m with Jeff on this one, maps work great for me too and in many respects I think it’s better.
Kok Hean
It works nicely here although Google Maps is more detailed.
John Herthep
I want ios 5 maps
Chaos
Slow news day huh?
Kurt
Why not write about Steve woz not agreeing with apple billion dollar win against Samsung. Much more interesting
Chaos
They did.
http://www.itallnews.com iTAllNews.com
Apple Map Fail
Bakersfield
This whole maps thing is bringing out all the idiots isn’t it.
I’ve been using it a lot, I have had no issues at all, You nerds will always find something to fixate on.
http://www.facebook.com/kelly.hewitt.731 Kelly Hewitt
Why is everyone complaining about it. I’ve only found one noticeable downsight that is my town is in black and white. That’s probably because I’m rural. 3D is 10000000 times better than googles, googles doesn’t even render properly.
http://twitter.com/digitalfeind Dani Hayes
You know, the maps on ios was going to be a problem no matter what. If it stayed with google maps people would complain that it has no turn by turn navigation.
http://twitter.com/purpledodi Jens Tinnerholm
Apple will be fine
http://www.facebook.com/razick.rilshad Razick Rilshad
Apple maps is not working in our country (srilanka) enybody knows why? | {
"pile_set_name": "Pile-CC"
} |
O'Leary, Pasborg & Friis-Nielsen - Støj
Mark Corroto, AllAboutJazz
In the aptly named Guerilla Series, for Ayler Records, this
trio does, indeed, fight a "little war," recording this limited
release (400 copies) as a hit-and-run ambush of destruction and noise.
Støj is quite surprising for O'Leary, whose previous outings found
him detailing more muted sounds with the likes of Supersilent on St. Fin Barre's (Leo, 2009), Tomasz Stanko on Levitation (Leo, 2005), and Cuong Vu on Waiting
(Leo, 2007). Here, the Irish guitarist teams with the Scandinavian
duo of Stefan Pasborg and Peter Friis-Nielsen, a tipoff that this
album will comprise sabotage and surprise. Drummer Pasborg (the leader
of the Odessa 5 and Ibrahim Electric) and bassist Friis-Nielsen, have
been heard on several hardcore Peter Brötzmann sessions, including Medicina (Atavistic, 2004) and Live At Neferiti (Ayler, 1999).
The route chosen here is fast and loud. The album opens with the
befitting brief track, "First Tune." O'Leary fires off swift, crisp
notes over Pasborg's feverish drumming and Friis-Nielsen's thunderous
bass. The trio plays with a cathartic passion, displaying speed and a
sort of controlled tumult. The aptly named "Kinetic" follows up with
even more speed. This trio could rival any metal band, except they
also interject bits of free music into this tornado of a recording.
The title track darts and dodges, with Pasborg mixing the pulse and
O'Leary ramping up the intensity.
The trio establishes a pattern of either short intensity, or longer
tracks that build ferocity as the music progresses. What maintains
attention here is the band's ability to inject passion into both a
sliced-up bebop pulse from Pasborg's bass on "Exit," and the slogging
thunder of "Interference," that switches with a boom into rock-n-roll.
From note one, this is a take no prisoners outing. | {
"pile_set_name": "Pile-CC"
} |
Q:
Heroku Puma Sidekiq Running 167% crititcal r14 memory quota exceeded on 3 web dynos with one visitor
I am running Puma 3.4, Rails 4.2.6, Sidekiq 4.2.2, Redis Mini, on 3 dynos (standard 1x) on Heroku. I am doing simple Beta testing and I cannot seem to optimize my puma-dyno situation. I get High Response Time Alerts and Critical Memory Quota alerts when one user is on the site (I am using New Relic to monitor).
I have added Puma Worker Killer to try to diagnose this, but no help.
I have everything set using Environment variables (max_threads, concurrency, etc) and I've scoured the internet for how to config.
I am setting options in database.yml, sidekiq.rb, puma.rb, puma_worker_killer.rb and sidekiq.yml, so I might be setting things in too many places.
Since I'm running 3 Standard 1x web dynos for one user I know that something is wrong.
config/puma.rb
before_fork do
require 'puma_worker_killer'
ActiveRecord::Base.connection_pool.disconnect!
PumaWorkerKiller.config do |config|
config.ram = ENV['PUMA_WORKER_KILLER_RAM'] || 1024 # mb
config.frequency = 5 # seconds
config.percent_usage = 0.98
config.rolling_restart_frequency = 12 * 3600 # 12 hours in seconds
end
PumaWorkerKiller.start
end
workers Integer(ENV['WEB_CONCURRENCY'] || 5)
min_threads_count = Integer(ENV['MIN_THREADS'] || 1)
threads_count = Integer(ENV['RAILS_MAX_THREADS'] || 5)
threads min_threads_count, threads_count
preload_app!
rackup DefaultRackup
port ENV['PORT'] || 5000
environment ENV['RACK_ENV'] || 'development'
on_worker_boot do
ActiveSupport.on_load(:active_record) do
ActiveRecord::Base.establish_connection
end
end
config/initializers/sidekiq.rb
require 'sidekiq'
redis_url = ENV['REDISTOGO_URL']
redis_config = {
url: redis_url,
namespace: 'oct',
}
Sidekiq.configure_server do |config|
config.redis = { url: ENV["REDISTOGO_URL"], namespace: 'oct', size: ENV["SIDEKIQ_SERVER_CONNECTIONS"].to_i || 6}
config.error_handlers << Proc.new do |exception, context_hash|
SidekiqErrorService.new(exception, context_hash).notify
end
end
Sidekiq.configure_client do |config|
config.redis = { url: ENV["REDISTOGO_URL"], namespace: 'oct', size: ENV["REDIS_CLIENT_CONNECTION_SIZE"].to_i || 2}
end
config/sidekiq.yml
:verbose: false
:concurrency: <%= ENV["WEB_CONCURRENCY"] %>
production:
:timeout: <%= ENV["SIDEKIQ_TIMEOUT"] %>
development:
:timeout: 30
:queues:
- [highest, 2]
- medium
- lowest
- mailers
config/initializers/puma_worker_killer.rb
PumaWorkerKiller.enable_rolling_restart
config/database.yml
default: &default
adapter: postgresql
encoding: unicode
pool: <%= ENV["DB_POOL"] || ENV['RAILS_MAX_THREADS'] || 5 %>
development:
<<: *default
database: myapp_development
username: myapp
password: myapp
host: localhost
port: 5432
test:
<<: *default
database: myapp_test
username: myapp
password: myapp
host: localhost
port: 5432
my current environment settings
Memory 125-167% (on web dynos, not worker dynos)
WEB_CONCURRENCY: 4
DB_POOL: 15
SIDEKIQ_SERVER_CONNECTIONS: 25
MIN_THREADS: 1
RAILS_MAX_THREADS: 5
REDIS_CLIENT_CONNECTION_SIZE: 1
SIDEKIQ_TIMEOUT: 30
DATABASE_REAP_FREQ: 5
PUMA_WORKER_KILLER_RAM: 1535
I also tried to use this helper
http://manuelvanrijn.nl/sidekiq-heroku-redis-calc/
but it made it worse, 300% + memory usage
WEB_CONCURRENCY: 45
DB_POOL: 15
SIDEKIQ_SERVER_CONNECTIONS: 47
MIN_THREADS: 1
RAILS_MAX_THREADS: 5
REDIS_CLIENT_CONNECTION_SIZE: 1
SIDEKIQ_TIMEOUT: 30
DATABASE_REAP_FREQ: 5
PUMA_WORKER_KILLER_RAM: 1535
A:
For a Rails 4, you have too many puma workers even at 4 (45 is impossibly high for that tier). Standard-1x dynos have 512MB. Trying dropping WEB_CONCURRENCY down to 2 and I suspect that you'll see a large enough reduction in memory consumption to prevent R14s.
If you're still having trouble after switching WEB_CONCURRENCY to 2 you will need to do some memory optimizations or drop it down to 1.
| {
"pile_set_name": "StackExchange"
} |
//
// LMJCalendarViewController.m
// PLMMPRJK
//
// Created by HuXuPeng on 2017/5/7.
// Copyright © 2017年 GoMePrjk. All rights reserved.
//
#import "LMJCalendarViewController.h"
#import "LMJEventTool.h"
@interface LMJCalendarViewController ()
@end
@implementation LMJCalendarViewController
- (void)viewDidLoad {
[super viewDidLoad];
LMJWeak(self);
LMJEventModel *eventModel = [[LMJEventModel alloc] init];
// @property (nonatomic, strong) NSString *title; //标题
// @property (nonatomic, strong) NSString *location; //地点
//@"yyyy-MM-dd HH:mm"
// @property (nonatomic, strong) NSString *startDateStr; //开始时间
// @property (nonatomic, strong) NSString *endDateStr; //结束时间
// @property (nonatomic, assign) BOOL allDay; //是否全天
// @property (nonatomic, strong) NSString *notes; //备注
// if (alarmStr.length == 0) {
// alarmTime = 0;
// } else if ([alarmStr isEqualToString:@"不提醒"]) {
// alarmTime = 0;
// } else if ([alarmStr isEqualToString:@"1分钟前"]) {
// alarmTime = 60.0 * -1.0f;
// } else if ([alarmStr isEqualToString:@"10分钟前"]) {
// alarmTime = 60.0 * -10.f;
// } else if ([alarmStr isEqualToString:@"30分钟前"]) {
// alarmTime = 60.0 * -30.f;
// } else if ([alarmStr isEqualToString:@"1小时前"]) {
// alarmTime = 60.0 * -60.f;
// } else if ([alarmStr isEqualToString:@"1天前"]) {
// alarmTime = 60.0 * - 60.f * 24;
// @property (nonatomic, strong) NSString *alarmStr; //提醒
eventModel.title = @"eventModel标题";
eventModel.location = @"BeiJing";
eventModel.startDateStr = @"2018-04-05 19:10";
eventModel.endDateStr = @"2018-04-05 20:10";
eventModel.allDay = YES;
eventModel.notes = @"eventModel备注";
eventModel.alarmStr = @"1小时前";
self.addItem([LMJWordItem itemWithTitle:@"事件标题: " subTitle:@"" itemOperation:nil])
.addItem([LMJWordItem itemWithTitle:@"增加日历事件" subTitle: nil itemOperation:^(NSIndexPath *indexPath) {
[[LMJEventTool sharedEventTool] createEventWithEventModel:eventModel];
[weakself.view makeToast:@"增加了"];
}])
.addItem([LMJWordItem itemWithTitle:@"查找" subTitle: nil itemOperation:^(NSIndexPath *indexPath) {
EKEvent *event = [[LMJEventTool sharedEventTool] getEventWithEKEventModel:eventModel];
weakself.sections.firstObject.items.firstObject.subTitle = event.title;
[weakself.tableView reloadRow:0 inSection:0 withRowAnimation:0];
}])
.addItem([LMJWordItem itemWithTitle:@"删除" subTitle:nil itemOperation:^(NSIndexPath *indexPath) {
BOOL isDeleted = [[LMJEventTool sharedEventTool] deleteEvent:eventModel];
if (isDeleted) {
[weakself.view makeToast:@"删除成功"];
weakself.sections.firstObject.items.firstObject.subTitle = nil;
[weakself.tableView reloadRow:0 inSection:0 withRowAnimation:0];
}else {
[weakself.view makeToast:@"删除失败"];
}
}]);
}
#pragma mark - LMJNavUIBaseViewControllerDataSource
/** 导航条左边的按钮 */
- (UIImage *)lmjNavigationBarLeftButtonImage:(UIButton *)leftButton navigationBar:(LMJNavigationBar *)navigationBar
{
[leftButton setImage:[UIImage imageNamed:@"NavgationBar_white_back"] forState:UIControlStateHighlighted];
return [UIImage imageNamed:@"NavgationBar_blue_back"];
}
#pragma mark - LMJNavUIBaseViewControllerDelegate
/** 左边的按钮的点击 */
-(void)leftButtonEvent:(UIButton *)sender navigationBar:(LMJNavigationBar *)navigationBar
{
[self.navigationController popViewControllerAnimated:YES];
}
@end
| {
"pile_set_name": "Github"
} |
Human immunodeficiency virus replication induces monocyte chemotactic protein-1 in human macrophages and U937 promonocytic cells.
We have recently described a significant correlation between human immunodeficiency virus-1 (HIV-1) RNA replication and monocyte chemotactic protein-1 (MCP-1) levels in the cerebrospinal fluid (CSF) of individuals with the acquired immunodeficiency syndrome (AIDS) with HIV encephalitis (E). Because local macrophages (microglia) are the cells predominantly infected in the brain, we investigated whether in vitro HIV infection affects MCP-1 production in mononuclear phagocytes (MP). MCP-1 secretion and expression were consinstently upregulated over constitutive levels in human monocyte-derived macrophages (MDM) infected with the M-tropic R5 BaL strain of HIV-1. HIV replication was required for this effect, as demonstrated by the absence of chemokine upregulation after infection in the presence of 3'-azido-3'-deoxythimidine (AZT) or cell-exposure to heat-inactivated (triangle up degrees ) virus. MCP-1 induction was not restricted to HIV-1 BaL, but was also observed during productive infection of MDM with two primary isolates differing for entry coreceptor usage and of U937 cells with the X4 HIV-1 MN strain. Based on the observation that exogenous HIV-1 Tat induced MCP-1 expression in astrocytes, we also investigated its role in MDM and U937 cells. Exogenous Tat induced MCP-1 production from MDM in a concentration-dependent manner, however, it was not effective on uninfected U937 cells or on the chronically infected U937-derived cell line U1. Transfection of Tat-expressing plasmids moderately activated HIV expression in U1 cells, but failed to induce MCP-1 expression in this cell line or in uninfected U937 cells. HIV replication-dependent expression of MCP-1 in MP may be of particular relevance for the pathogenesis of HIV infection in nonlymphoid organs such as the brain. | {
"pile_set_name": "PubMed Abstracts"
} |
Known risk factors do not explain disparities in gallstone prevalence between Denmark and northeast Germany.
Gallstones are a common disease worldwide, with disparities in the prevalence of the disease in different settings. The aim of the present study was to assess if different distributions of risk factors could explain the disparities in the prevalence of gallstone disease between Denmark and northeast Germany. Data of 5,559 subjects from the Danish MONICA survey and of 3,647 subjects of the German Study of Health in Pomerania were investigated. Gallstone disease was defined as a prior history of cholecystectomy or the presence of sonographically diagnosed gallstones. Logistic regression models were performed to assess the confounding effect of selected risk factors on regional disparities in gallstone disease. After adjustment for age and vocational training, German subjects (women: Odds ratio, OR, 2.46 (95% confidence interval, CI: 2.07-2.91); men: OR, 1.89 (95% CI: 1.52-2.36)) had approximatively twice the odds of gallstones than Danes. Inclusion of lifestyle factors (smoking, alcohol intake, coffee use) did not affect this result, whereas adjustment for body mass index (BMI), lipids, diabetes, and use of oral contraceptives, menopausal hormone therapy (MHT) and parity (women only) changed the estimates considerable, but still Germans (women: OR, 1.65 (95% CI: 1.36-2.00); men: OR, 1.61 (95% CI: 1.27-2.04)) had higher odds than Danes. German individuals had a higher prevalence of gallstones than Danes. This difference was partly explained by a higher BMI, unfavorable lipid levels, higher prevalence of diabetes, and a more frequent use of OR and MHT in German subjects. Further research is needed to evaluate the impact of unmeasured predictors, including genetic components, on the population-related risk of gallstones. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
What is the difference between a line segment inside and outside of a concave polygon?
My question is about the creation of visibility graphs in surfaces with multiple convex and concave polygons. My problem is that i am not able to classify whether the line segments connecting the nodes of the same polygon go through or don't go through this polygon. As seen in the picture below:
I'd need to separate the orange, invalid lines from the blue, valid lines. I hope somebody can provide me a solution to this problem with a suitable algorithm that can be implemented in python.
Or for even complexer polygons?:
difficult polygon
A:
This code accepts A and B as two vertices and checks if the line joining them lies completely inside , partially inside or completely outside the polygon. This is based on mathematical fact that for a line with eqn. F(X,y):Ax+By+C the point x1,y1 will lie on the line if F(x1,y1)=0
On one side of line if F(x1,y1)>0
On other side of line if F(x1,y1)<0
L=[] #list of all the vertices of the polygon as (x,y) tuples in order
A=()
B=()
# A and B are tuples of coordinates of points joking diagonal to check
def eqn(A,B):
X1=A[0];Y1=A[1]
X2=B[0];Y2=B[1]
return(X2-X1,Y1-Y2,X1*Y2-X2*Y1)
def check(Y,X,C,y,x):
if(Y*y+X*X+C>0):
return 1
elif(Y*y+X*X+C<0):
return -1
else:
return 0
Y,X,C=eqn(A,B)
#get parameters of diagonal joining A and B
a=L.index(A)
b=L.index(B)
L1=[]
L2=[]
if(a>b):
L1=L[b+1:a]
L2=L[a+1:]+L[:b]
elif(b>a):
L1=L[a+1:b]
L2=L[b+1:]+L[:a]
#so I have split the list into two lists L1 and L2 containing vertices in cyclic order on either side of the diagonal
k=1
m=0
val1=check(Y,X,C,L1[0][1],L1[0][0])
val2=check(Y,X,C,L2[0][1],L2[0][0])
if(val1==val2):
k=0
m=1
else:
# I have to check F(x,y) for each point in list L1 and L2 it should be of one sign for all elements in L1 and of other sign for all elements in L2 for line to lie completely inside polygon
for t in L1:
if(check(Y,X,C,t[1],t[0])!=val1):
k=0
m=0
for s in L2:
if(check(Y,X,C,s[1],s[0])!=val2):
k=0
m=0
if(k==0):
print('the diagonal passes outside')
else:
print('the diagonal lies completely inside the polygon')
if(m==1):
print('the diagonal lies completely outside the polygon')
I have written the code hope it works as required,but there maybe errors:o,the logic is correct,there may be syntax or other errors you have to take care of(I can help in that case) I have excluded one case if the two points chosen are consecutive,then it is obviously the side of the polygon(trivial to check).
| {
"pile_set_name": "StackExchange"
} |
The retinal vasculature is prone to damages, leading to serious ocular diseases including loss of vision. While angiogenic therapies are being explored as potential treatments, a significant hurdle is our inability to control the three dimensional organization of the vascular network induced by angiogenic factors to ensure proper functioning of pharmacologically induced retinal vasculature. Thus, our long term objective is to unravel mechanisms that control the spatial organization of retinal vascular beds, and in particular to investigate how components of the hypoxia signaling pathway act as spatial cues to determine the direction and position of vascular growth in the retina. These studies will be carried out in three specific aims. Aim 1. Investigate roles of prolyl hydroxylase domain proteins in controlling retinal vascular pattern formation. PHDs negatively regulate the abundance of hypoxia inducible factors (HIFs), the latter of which are essential for angiogenesis. We hypothesize that the level of PHD activity in a tissue microenvironment determines the activity and directionality of vascular growth in its vicinity, and will test this hypothesis by generating chimeric retinas that contain micro tissue domains with PHD deficiency or overexpression. Aim 2. Determine if HIF-la accumulation in a micro tissue domain controls the position and direction of vascular growth in nearby tissues. Aim 3. Explore the role of VEGFR-l in defining vessel to vessel distances. VEGFR-l is produced by endothelial cells and forms tight complex with VEGF-A, a key angiogenic molecule induced by hypoxia. We propose that VEGF-A/VEGFR-1 interaction diminishes bioavailable VEGF-A near the source of VEGFR-l expression and therefore disallows the growth of more microvessels within a certain distance from an existing microvessel. This hypothesis will be tested by creating chimeric retinas that contain micro tissue domains overexpressing VEGFR-1, and assessing vascular density near such tissues. The objective of these studies is to facilitate the development of effective therapies aimed at repairing damaged retinal vascular beds and is highly consistent with the mission of the National Eye Institute (NEI). | {
"pile_set_name": "NIH ExPorter"
} |
638 So.2d 176 (1994)
Vickie BROADWAY and Husband Michael E. Broadway, Appellants,
v.
BAY HOSPITAL, INC., d/b/a HCA Gulf Coast Hospital, Appellee.
No. 92-2337.
District Court of Appeal of Florida, First District.
June 14, 1994.
Edmund D. Quintana of Burke & Blue, P.A., Panama City, for appellants.
Ann J. Tipton of Baker, Duke & Tipton, P.A., Pensacola, for appellee.
*177 PER CURIAM.
This cause is before us on appeal from a final order dismissing appellants' second amended complaint with prejudice. Appellants contend (1) that the trial court erred in finding that they were required to comply with the presuit screening requirements of chapter 766, Florida Statutes, for medical malpractice claims; (2) that their compliance with the presuit screening requirements was sufficient such that the trial court erred in dismissing their complaint; and (3) that section 766.203(2), Florida Statutes, which imposes as a condition precedent to the filing of a medical malpractice claim that the plaintiff provide notice of the claim and a corroborating expert opinion, is unconstitutional. We reverse as to the first issue and, consequently, do not reach the second and third issues.
The second amended complaint alleged that plaintiff/appellant Vickie Broadway was a patient at appellee's hospital in July 1989 and was injured when her hospital bed collapsed. Appellants sought damages based on appellee's breach of its duty to use reasonable care in maintaining its premises and breach of its duty to warn Ms. Broadway of latent hazards. Appellee sought dismissal of the complaint on the ground that the complaint stated a claim for medical negligence and that appellants had failed to comply with the presuit screening requirements of chapter 766, Florida Statutes. The trial court entered an order dismissing the complaint with prejudice under section 766.206(2), Florida Statutes, which requires that a medical malpractice complaint be dismissed if the court finds that the plaintiff is not in compliance with the presuit investigation requirements of chapter 766.
Under section 766.106(1)(a), Florida Statutes, "claim for medical malpractice" is defined as "a claim arising out of the rendering of, or the failure to render, medical care or services." A person seeking recovery for injury resulting from medical malpractice must prove that the injury resulted from a breach of the prevailing professional standard of care as set forth in section 766.102(1), Florida Statutes. The test for determining whether a defendant is entitled to the benefit of the presuit screening requirements of section 766.106, Florida Statutes, is whether the defendant is directly or vicariously liable under the medical negligence standard of care set forth in section 766.102(1), Florida Statutes. Weinstock v. Groth, 629 So.2d 835 (Fla. 1993), citing NME Properties, Inc. McCullough, 590 So.2d 439 (Fla. 2d DCA 1991). Not every wrongful act by a health care provider amounts to medical malpractice. Stackhouse v. Emerson, 611 So.2d 1365 (Fla. 5th DCA 1993).
From the face of the complaint, it is apparent that appellants have sued appellee for the failure to warn of a dangerous condition or properly maintain a piece of equipment, rather than for breach of some professional standard of care. We hold that the trial court erred in dismissing the complaint. We reject appellee's contention that Neilinger v. Baptist Hospital of Miami, Inc., 460 So.2d 564 (Fla. 3d DCA 1984), requires affirmance of the order below. In Neilinger, the complaint alleged that the plaintiff, a maternity patient, slipped and fell on a pool of amniotic fluid while descending from an examination table under the direction and care of employees of the hospital. The complaint on its face alleged breach of a professional standard of care.
The order appealed from is therefore reversed, and this cause is remanded for proceedings consistent herewith.
BOOTH, JOANOS and MINER, JJ., concur.
| {
"pile_set_name": "FreeLaw"
} |
Q:
Rank by 2 different levels of partitioning/grouping
I have this set of data using Microsoft SQL Server Management Studio
Category|pet name| date |food price|vet expenses|vat
A | jack |2017-08-28| 12.98 | 2424 |23
A | jack |2017-08-29| 2339 | 2424 |23
A | smithy |2017-08-28| 22.35 | 2324 |12
A | smithy |2017-08-29| 123.35 | 2432 |23
B | casio |2017-08-28| 11.38 | 44324 |32
B | casio |2017-08-29| 2.24 | 3232 |43
B | lala |2017-08-28| 343.36 | 42342 |54
B | lala |2017-08-29| 34.69 | 22432 |54
C | blue |2017-08-28| 223.02 | 534654 |78
C | blue |2017-08-29| 321.01 | 6654 |67
C | collie |2017-08-28| 232.05 | 4765 |43
C | collie |2017-08-29| 233.03 | 4654 |65
What I want to do is rank by food price, but group by category, order by category, pet name, date and then rank by vet expenses, but group by category, order by category, pet name, date and then rank by vat, but group by category, order by category, pet name, date.
I'm thinking this will be a join statement for the table above?
Something exactly like below:
Category|pet name| date |food price|vet expenses|vat|Rankfp|Rankve|Rankvat
A | jack |2017-08-28| 12.98 | 2424 |23 | 2 | 1 |1
A | jack |2017-08-29| 2339 | 2424 |23 | 1 | 2 |1
A | smithy |2017-08-28| 22.35 | 2324 |12 | 1 | 2 |2
A | smithy |2017-08-29| 123.35 | 2432 |22 | 2 | 1 |2
B | casio |2017-08-28| 11.38 | 44324 |32 | 2 | 1 |2
B | casio |2017-08-29| 2.24 | 3232 |43 | 2 | 2 |2
B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1
B | lala |2017-08-29| 34.69 | 22432 |54 | 1 | 1 |1
C | blue |2017-08-28| 223.02 | 534654 |78 | 2 | 1 |1
C | blue |2017-08-29| 321.01 | 6654 |67 | 1 | 1 |1
C | collie |2017-08-28| 232.05 | 4765 |43 | 1 | 2 |2
C | collie |2017-08-29| 233.03 | 4654 |65 | 2 | 2 |2
NB: this is not needed in the final output but to make it more readable I have ordered the outcome by category, pet name, date:
Category|pet name| date |food price|vet expenses|vat|Rankfp|Rankve|Rankvat
A | jack |2017-08-28| 12.98 | 2424 |23 | 2 | 1 |1
A | smithy |2017-08-28| 22.35 | 2324 |12 | 1 | 2 |2
A | jack |2017-08-29| 2339 | 2424 |23 | 1 | 2 |1
A | smithy |2017-08-29| 123.35 | 2432 |22 | 2 | 1 |2
B | casio |2017-08-28| 11.38 | 44324 |32 | 2 | 1 |2
B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1
B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1
B | lala |2017-08-29| 34.69 | 22432 |54 | 1 | 1 |1
C | blue |2017-08-28| 223.02 | 534654 |78 | 2 | 1 |1
C | collie |2017-08-28| 232.05 | 4765 |43 | 1 | 2 |2
C | blue |2017-08-29| 321.01 | 6654 |67 | 1 | 1 |1
C | collie |2017-08-29| 233.03 | 4654 |65 | 2 | 2 |2
The code I have below only ranks by category, but does not group by food price, vet expenses and vat.
RANK ()OVER(PARTITION BY [Category], [Date] order by [Category] ,[Pet Name],[Date]) as 'Rank'
Would it be a case of grouping the costs separately then left joining the rankings on to the original data?
(I will be using pivots and slicers in excel so want to have all the data on one table/query)
A:
After walking away with some time to refresh my brain i had a eureka moment and solved this. It was actually easy when I thought about it.
so
the code to get the desired table goes something like this:
select *
, rank ()OVER(PARTITION BY [Category], [date] order by [food price], [Category] ,[pet name],[date]) as 'Rankfp'
, rank ()OVER(PARTITION BY [Category], [date] order by [vet expenses], [Category] ,[pet name], [date]) as 'Rankve'
, rank ()OVER(PARTITION BY [Category], [date] order by [vat], [Category] ,[pet name], [date]) as 'Rankvat'
from petcost
order by [category, [pet name]
| {
"pile_set_name": "StackExchange"
} |
The prevalence of frontotemporal dementia.
To estimate the prevalence of frontotemporal dementia (FTD) and other degenerative early-onset dementias in a geographically defined population. Early-onset dementia (at age <65 years) results in high psychiatric morbidity and caregiver burden. Prevalence figures are available for early-onset AD but not for FTD, a dementia that is almost invariably of early onset. Case ascertainment was by review of case records of three specialist clinic databases and inpatient admissions at a university hospital in Cambridge, United Kingdom, for patients with dementia who were <65 years of age, living in Cambridge City or East or South Cambridgeshire (population 326,019) on May 30, 2000. All the relevant health services in the area were also contacted for potential cases. Diagnosis of various dementias was based on published criteria. All patients with potential FTD were examined by the study investigators and underwent structural neuroimaging. The 1998 population estimates for the area were used to calculate age and sex prevalence with confidence intervals for AD, FTD, and other causes of dementia. A total of 108 patients (66 men and 42 women) with dementia with onset before they were 65 years of age were identified, of whom 60 were <65 years on the census date, giving an overall prevalence of 81 (95% CI, 62.8 to 104.5) per 100,000 in the 45- to 64-year age group. The prevalences of early-onset FTD and AD were the same: 15 per 100,000 (8.4 to 27.0) in the 45- to 64-year-old population. The mean age at onset of FTD was 52.8 years and there was a striking male preponderance (14:3). It is possible case ascertainment methods resulted in a relative underrepresentation of some forms of dementia. Frontotemporal dementia is a more common cause of early-onset dementia than previously recognized and appears to be more common in men. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
How can I hide or diminish VS2017's vertical lines in the editor
Visual Studio 2017 uses quite bright, dashed, vertical lines within code's indentation to highlight the extent of various scopes.
How can I turn these off, or make them less vivid?
A:
You can reduce the intensity of these lines:
In VS2017, go to menu Tools, Options....
Navigate to Environment/Fonts and Colors and scroll to select the Structure Guide Lines display item.
Click custom, then drag down the black arrow to the right of the dialog until you see a colour you like.
A:
You can also turn them off completely from Tools\Options, Text Editor, General, Show structure guide lines.
| {
"pile_set_name": "StackExchange"
} |
The Daily Mail says United have inserted a clause into Lingard’s one month loan deal to Birmingham City that will prevent the forward from playing in the Capital One Cup.
Lingard, who sparkled on his debut for the Midlands’ club as he hit four goals in the 4-1 victory over Sheffield Wednesday, is therefore ruled out for the visit of Swansea on Wednesday evening.
The short-term move to Birmingham may be extended if all parties are happy with the way the signing works out but United have also safeguarded against the possibility of Lingard being cup-tied ahead of a possible speedy return to Old Trafford. | {
"pile_set_name": "Pile-CC"
} |
An advocacy group for FBI agents said Tuesday the federal government shutdown is hindering its operations. File Photo by Archie Carpenter/UPI | License Photo
WASHINGTON, Jan. 22 (UPI) -- The FBI Agents Association advocacy group released a report Tuesday saying that the ongoing government shutdown has strained bureau resources and is undermining criminal, counter-terrorism and counter-intelligence operations.
According to the report, FBI agents are subject to rigorous financial background checks. If an agent misses a debt payment due to not receiving a paycheck, it could lead to a delay in renewing security clearances or could even disqualify an agent from service.
The report also details an array of delayed services that have resulted from the government's closure.
FBI field offices have been forced to delay grand jury indictments on homicides and child sexual assault prosecutions, delay investigations into violent gangs and delay international counter-intelligence investigations, according to the association's report.
RELATED McConnell expected to introduce bill to reopen government
"Because of lack of funding, I am unable to travel to the countries in my area of responsibility. This means information sharing is diminished and relationships with foreign partners are weakening," an unnamed agent told the association, which cited the example in the report.
The 72-page report also details accounts of FBI agents not being able to buy phone cards to talk to domestic and international terrorism sources, the canceling of counter-terrorism training for agents and the crippling of the relationship between local police departments and the FBI due to strained resources.
In one case, the FBI could not help a local police force with recovering DNA from a crime scene to positively identify traces of a victim.
One potentially lasting impact of the shutdown is the ability of the FBI to recruit and retain "high-caliber professionals," the report states. The shutdown and subsequent financial instability felt by agents, could lead some current and prospective employees to reconsider their career options.
Association President Thomas O'Connor said in a statement:
"We are releasing Voices from the Field to ensure that our elected leaders and members of the public are aware that the resources available to support the work of FBI agents are currently stretched to the breaking point and are dwindling day by day."
RELATED 300 DHS employees to return to work Tuesday | {
"pile_set_name": "OpenWebText2"
} |
Q:
Bad reputation of reputation
For the record: the post below is not to defend the point where I am standing. That's why I feel I am entitled to bring this up.
Every now and then, reputation is brought up in discussions as an argument. Used wrongly in my opinion, for reasons pointed out below.
Not the only reason, but an important one was the question here http://meta.askubuntu.com/a/15662/72216, where the question at a certain point moved to a reputation/motivation discussion. The question wasn't reputation- motivated, but even if it were, it shouldn't (have) be(en) an argument at all.
As a general rule, when working in teams, to make sure the team is productive, we need to make sure each and every member of the team has his or her own personal interest in a good result of the team. This interest may and will vary.
The formula of the SE sites understands this extremely well. That's one of the reasons the reputation system exists, and why we have a personal reputation record on SE sites.
The site obviously stresses on the importance of the personal reputation; not only are privileges directly related to reputation, but together with the general information of moderator candidates for example, detailed information is displayed on the candidates' reputation, the average reputation per post and so on.
Of course, we may hope that the motivation to answer (or ask) questions is not purely reputation based, and to prevent misunderstandings, mine isn't. However, as long as we post quality Q's and A's, keep the site's rules, maintain general rules of decensy and good behaviour, our personal motivation is totally irrelevant to the site.
Nevertheless, on a regular base, in discussions, "chasing reputation" is implicitely or explicitely mentioned as a bad thing, a sign of bad behaviour, doing it for the wrong reasons. As mentioned, in itself, chasing reputation, even if it is the only motivation to create good content, is perfectly fine and needs no defense at all.
So, in a nutshell, please don't use chasing reputation as an argument to prove you're right or someone else is wrong. What counts is good content and constructive behaviour. The motivation under the hood is no one's business but the poster's.
A:
Sometimes, when I close my eyes in a daydream, I see a little green rectangle top left. The sign of joy!
I'm not a mind reader, but I think it's probably hypocritical for people to mutter disapprovingly about others "chasing reputation". Like my mother told me at school where I got bullied for always putting my hand up to give the answer "They're just jealous."
Problems might arise, I guess, when the overall glory of AU is damaged somehow by the way people behave, or needed effort (like reviewing and editing) is not made because it doesn't contribute to reputation.
In that case, I think people should be complaining about the problem, and not the motivation, since, as you say, what others are thinking is private and unknowable...
Moreover, we are not all the same, and it takes many different folks to make a glorious SE site, and many people do those non-rep-earning tasks, and as long as there are enough people doing them, then there isn't a problem...
In short I agree with you and am just rambling...
Better get back to writing quick answers to easy questions ploughing through the Close Votes Review Queue...
A:
Reputation isn't just imaginary numbers on the screen. It's a number which says something important. It says that you helped people. So of course people like to "chase" it (or at least appreciate it when they get it). Why do people spend hours on AU helping people? It's not because they make money from it (mostly). It's not because there's (usually) some tangible, real life benefit to them immediately. It's mostly because they like the feeling of having helped someone. Of course! If you spend hours writing good answers and helping strangers with problems, and there's no feedback, then that's not a good feeling. So reputation is very important! It tells you that you helped people and that your work was useful. The feeling of having contributed to something useful can often be more valuable to us than even money.
Someone may say "your motive shouldn't just be reputation". But I think reputation really is a type of feedback showing you that you helped people. If someone said "Your motive shouldn't just be to know that you've helped people", then I would say, "Yes, it's an entirely decent motive to be on AU with the intention of trying to help people and wanting to have a solid affirmation that you actually did help people."
I think almost everyone here agrees with this, including the people you were having a discussion with in the post you linked to in OP (I was actually one of those people.)
I would suggest that it's hardly possible to be after only reputation. Reputation isn't "only" reputation. It's a symbol of something. Is anyone after just the number? I doubt it. The number itself would be totally meaningless if it didn't represent something. I believe what people are truly after is what the number represents. And I think that's a perfectly fine thing to be "after."
Otherwise it just seems meaningless. For example, let's say you spend lots of time and energy figuring out an excellent answer to a tough problem. OP abandons the post, and doesn't give any feedback to the answer. Very few other people notice the answer, and it just gets lost without any upvotes. Thankfully this doesn't happen very often. Because when we have worked hard at something, we need affirmation that it was actually helpful. And that is exactly what that little +100 or +200 symbol on the top tells you. That you helped people.
Finally, you can even spend your reputation to help others. Let's say a user has posted a really tough problem that you don't know the answer to. If you post a large bounty on it, it might just motivate people to put up the effort to find a solution to the tough problem. That's actually getting people to put in effort into something. That's something we pay lots of money for in the real world.
So, reputation is really important! I dare assert that without it, AU would be much, much weaker than it is today. And I don't blame anyone in the slightest, for chasing it. That would be like blaming a social worker for "chasing" the smiles on the faces of the people he/she was helping.
I often help my real life friends with their computers. I'll willingly admit that one of my motives is the feeling of having helped someone, and knowing that they are thankful. Reputation is the AU equivalent of that, and I think it's an entirely appropriate motive.
It's true that many of us might use reputation as food for our egos, etc, obsessing over it. Human nature can be like that. But unless a user is putting on a truly bizarre show, I think we should hesitate before suggesting that other users are in such a state. It's mostly quite hard to know what's actually going on in the mind of another person. So in this regard I believe we should mostly give everyone the benefit of the doubt.
| {
"pile_set_name": "StackExchange"
} |
Outcomes of Patients Implanted Using a Left Thoracotomy Technique for a Miniaturized Centrifugal Continuous-Flow Pump.
As ventricular-assist devices (VADs) are increasingly employed in heart failure management, a leading cause of mortality, new literature is consistently published on less-invasive implantation techniques. Although early perioperative outcomes have been shown to be favorable with minimally invasive left thoracotomy (LT) approaches compared with conventional sternotomy (CS), studies comparing long-term outcomes are lacking. We set out to evaluate long-term follow up between LT and CS approach. In a single center, retrospective review, data on patients with similar demographic profiles were collected. HeartWare (HVAD) implantation was performed by either CS or LT. Analysis was performed on perioperative adverse outcomes, and 6 month postoperative adverse events. Primary objectives of the study included comparative outcomes of morbidity and mortality between both groups at 180 days postimplantation. Eighty-one (n = 81) bridge to transplant (BTT) patients underwent CS or LT HVAD implantation. Perioperative transfusion (p = 0.04) favored the LT cohort compared with CS, with a median of 6 units and 8 units transfused for each group, respectively. No survival difference was observed between both groups at 6 months postimplantation (p = 0.52). Clinical outcomes at an average of 6 month follow up showed no difference in adverse events, including common postoperative VAD complications such as infection and right heart failure. Miniaturization of LVAD size and improvement in technology has allowed expansion of interest in alternative surgical approaches for HVAD implantation. For BTT patients, no difference in early outcome was observed 6 months after implantation using a left LT versus CS technique. | {
"pile_set_name": "PubMed Abstracts"
} |
Visual stimuli that are spatially removed from a neuron's classic reception field and which they elicit no response can strongly affect the magnitude of a response to stimuli within the classic field. It is thought that lateral connections among neurons mediate the interaction. Behaviorally, the presence of surround stimuli can profoundly affect the ability to perform fine spatial discriminations between similar center patches. In the proposed research, we test recent findings from the neuroscience literature in the psychophysical domain. An understanding of the normal mechanisms governing these lateral interactions is critical for our understanding of normal visual processing. For example, excitatory contextual modulation is thought to reflect the operation of contour mechanisms that mediate reading, whereas inhibitory interactions over space may be involved in segregating parts of a scene. It is also of import to provide normal behavioral data as a baseline in clinical applications. Deficits shown in amblyopia and strabismus include both hyperacuity tasks and lateral interactions. Here, we use psychophysical discrimination tasks to ask how these mechanisms integrate or segregate information from different regions of space, and how the spatial arrangement of stimuli in one part of the visual field affects performance in another. Specifically, we test several hypotheses: (1) that the spatial extent of regions of psychophysically-determined summation and inhibition in discrimination depends upon the contrast; (2) that there are spatial asymmetries in contextual modulation of mechanisms mediating fine spatial discriminations; (3) that the modulation process can be characterized by at least one of three quantitative models of gain control; (4) that apparently contradictory results in the psychophysical literature can be resolved within the context of a relatively simple neural model of contextual modulation; and (5) that contextual influences are both qualitatively and quantitatively altered by changes in apparent figure-ground relationships. We propose to begin to characterize these properties quantitatively. | {
"pile_set_name": "NIH ExPorter"
} |
Reconstruction of the maxilla and midface--surgical management, outcome, and prognostic factors.
Loss of the maxilla due to tumor ablation has both functional and aesthetic consequences. Even small defects become obvious because of missing bone and soft tissue. Reconstruction of the maxilla and midface in these patients presents a challenge to the surgeon although several possibilities are available for this purpose. The long term benefit to patients of the different modalities remains unclear due to wide individual variation. One hundred and twenty-one patients with maxillary oral squamous cell carcinoma were treated with curative intent. One hundred and five patients were surgically reconstructed using local or free microsurgical flaps. All parameters were collected from case records. Kaplan-Meier plots and univariate log-rank test and multivariate Cox proportional hazards regression models were used to determine the association between possible predictor variables and survival time of patients suffering from oral squamous cell carcinomas. After controlling for age, resection margins, nodal stage, and surgical management, which were independent and dependent predictors of survival, the type of reconstruction and involvement of surgical margins were associated with survival (HR=0.50, p=0.044, 95% CI, 0.25-0.98 and HR=3.16, p=0.007, 95% CI, 1.38-7.25). Various types of maxillary defects can be reconstructed successfully using different reconstructive techniques. The size and complexity of defects does not correlate with prognosis in oral squamous cell carcinoma patients. The criteria for reconstruction with a free flap were based on extensive defects in which local flaps were insufficient, on medical co-morbidities, and previous treatment. | {
"pile_set_name": "PubMed Abstracts"
} |
Fort Hood Shooter Is Seeking Death Penalty
Tags
FORT HOOD, Texas (AFP) – The army psychiatrist who has admitted to opening fire on fellow soldiers in the Fort Hood massacre is deliberately seeking the death penalty, his stand-by defense attorney said Wednesday.
Lieutenant Colonel Kris Poppe urged a military judge to either prevent Major Nidal Hasan from representing himself at the high-profile trial or allow the court-appointed lawyers tasked with assisting him to be removed from the case.
“It became clear his goal is to remove impediments and obstacles to the death penalty,” Poppe told the court as the second day of Hasan’s trial got underway. “Should he decide he wants to fight the death penalty, then we are here and ready to defend him.”
Hasan interrupted Poppe, declaring “this is a twist of the facts” and insisting he was not trying to martyr himself.
Military judge Colonel Tara Osborn cleared the courtroom to discuss the matter privately with Hasan and then called an early end to the day’s proceedings.
Hasan has repeatedly attempted to plead guilty to killing 13 people and wounding dozens more in the 2009 attack at a Texas military base.
Military law prohibits Hasan from pleading guilty to a capital offense. So he has been given the opportunity to try to convince the jury that he does not deserve death for his actions.
Now aged 42, Hasan was due to deploy to Afghanistan weeks after the attack. He has said he shot the soldiers to protect his fellow Muslims from an “illegal” war.
“The evidence will clearly show I am the shooter,” Hasan declared in his opening statements Tuesday.
The statement, which lasted just a couple minutes, reiterated his radical views.
“We, the mujahedeen, are imperfect Muslims trying to establish a perfect religion in the land of the supreme God,” Hasan said. “I apologize for any mistakes that I made in this endeavor.” | {
"pile_set_name": "Pile-CC"
} |
Lisnadill
Lisnadill () is a hamlet, townland and civil parish in County Armagh, Northern Ireland. In the 2001 Census it had a population of 54 people. It lies about 3 miles south of Armagh and is within the Armagh City and District Council area.
Places of interest
The Drumconwell Ogham Stone stood in the neighbouring townland of Drumconwell, on the ancient routeway to Eamhain Mhacha. It can now be seen in the Robinson Library in Armagh.
People
Frederick Francis Maude, born in Lisnadill on 20 December 1821, was an Irish recipient of the Victoria Cross.
Education
Lisnadill Primary School
See also
List of civil parishes of County Armagh
References
NI Neighbourhood Information System
Drumconwell Ogham Stone
Category:Villages in County Armagh
Category:Townlands of County Armagh
Category:Civil parishes of County Armagh | {
"pile_set_name": "Wikipedia (en)"
} |
Clinician compliance with laboratory regulations requiring submission of relevant clinical data: A one year retrospective analysis.
The College of American Pathologists (CAP) recognizes the need for clinical data in the interpretation of specimens submitted for histopathologic evaluation. Anecdotal evidence indicates that clinician compliance with requests for clinical history is variable. Quality assurance data from August 1, 2010 to September 31, 2011 were searched for all cases listing no clinical history. Four consecutive weeks of surgical pathology request forms were also reviewed for the presence or absence of clinical history and its accuracy. 21,700 cases were accessioned in the study period and 1293 (5.9%) requisitions contained no clinical history. The four-week review documented that 143 of 1698 (8.4%) requisitions had no clinical history and 12 cases contained incorrect history (0.7%). Between 5.9% and 8.4% of requisitions contain no clinical history. In 0.2% of cases, clinical history was incorrect. Compliance with the CAP policy for clinical history appears poor. | {
"pile_set_name": "PubMed Abstracts"
} |
using System;
using System.Text;
using System.Collections.Generic;
using System.IO;
using System.Windows.Forms;
using DotSpatial.Positioning;
namespace Diagnostics
{
static class Program
{
/// <summary>
/// The main entry point for the application.
/// </summary>
[STAThread]
static void Main()
{
Application.EnableVisualStyles();
Application.SetCompatibleTextRenderingDefault(false);
Application.Run(new MainForm());
}
}
} | {
"pile_set_name": "Github"
} |
Tenerife Norte-Ciudad de La Laguna Airport
AENA INFORMS
REMEMBER:If thiyour are travelling, check
with
your
airline before going to the airport and remember that the use of a
mask
is
compulsory for indoor public spaces and outdoors when impossible to
keep
the safety distance. Follow the hygiene measures at all times, keep a
distance with anyone and collect your baggage once the person in
front
of you has left the area. | {
"pile_set_name": "Pile-CC"
} |
Poly(alkylcyanoacrylate) nanocapsules: physicochemical characterization and mechanism of formation.
Nanocapsules of poly(isobutylcyanoacrylate) and poly(isohexylcyanoacrylate) were prepared by addition of the monomer to an organic phase and subsequent mixing of the organic phase to an aqueous phase containing poloxamer 188, 238 or 407. Gel permeation chromatography indicated that in contrast to literature reports, polymerization occurred in the organic phase and nanocapsules were obtained by interfacial precipitation of the polymer without any significant change of the molecular weight. Addition of SO2 to the organic phase before the introduction of the monomer allowed preparation of nanocapsules with a lower molecular weight. Nanospheres were prepared in a similar way albeit using an organic phase that was completely miscible within the aqueous phase so that solid spheres were obtained. Density gradient centrifugation revealed that nanocapsules had a density intermediate between nanospheres and an emulsion prepared in the same way without addition of monomer to the organic phase. Further, the process used to prepare nanocapsules had a high yield since no oil droplets or nanospheres were obtained by this process. Zeta potential of the nanocapsules and spheres was found to be related to the molecular weight of the polymer: values as high as approximately -42 mV were obtained for low molecular weight nanocapsules (MW approximately 1000) compared to approximately -10mV for the emulsion and the high molecular weight nanocapsules (MW approximately 100,000). Surface charge of the nanocapsules and molecular weight of their polymeric wall conditioned the adsorption capacity of poloxamers. Moreover, the highest adsorption was measured with the most hydrophobic poloxamer. These observations agree with previous work conducted on hydrophobic surfaces. | {
"pile_set_name": "PubMed Abstracts"
} |
Windows 8 can initially prove tough for consumers to use when sober, so it’s no surprise that getting hammered on tequila doesn’t make it any easier. But the good people at Three Sheets Market Research decided they’d give it a shot (or several shots, more accurately) by feeding tequila to an active computer user and self-described “cyborg” named Jennifer and having her try out Windows 8. The results, needless to say, were rather blurry.
In particular, Jennifer had a very tough time finding a cute dog picture on her hard drive and would frequently bang on her keyboard’s escape key hoping to return to a start menu. When asked if she knew how to go on the Internet with Windows 8, she merely said, “PFFFFFT!” and started laughing uncontrollably.
All in all, Windows 8 doesn’t seem to be a good operating system for the heavily inebriated. The full video is posted below. | {
"pile_set_name": "OpenWebText2"
} |
A Michigan elector responded to a video put out by a group of C-rate actors imploring members of the electoral college to not cast their vote for Donald Trump by reminding them that celebrities are not smarter than the American people.
The video itself, introduced by Martin Sheen, has failed miserably, receiving ten times the amount of ‘thumbs down’ compared to ‘thumbs up’ (before the ability to do so was removed altogether).
Fairbrother echoed the sentiment shared by other Republican electors, that the deluge of letters and emails from Hillary voters has been nothing but an irritant.
“Yesterday alone I received 250 letters urging me not to support Donald Trump. On a daily basis I receive over a thousand votes….it’s almost overwhelming sometimes,” added Fairbrother, noting that it hadn’t changed his resolve “to fully support Donald Trump”.
“Celebrities are not smarter than the American people, I don’t care how many celebrities think they are, they’re not smarter than the American people or the people of Michigan,” he emphasized.
Fairbrother reacted to the effort to sway electors, some of whom have received death threats, by founding ElectorsForTrump.com and urging Trump supporters to show solidarity with Republican electors.
As we reported earlier, another Republican elector, Alan Braun, vowed to reject the left’s collective temper tantrum and vote for Trump anyway, labeling the move an attempt to “overturn a fair and legal election”.
The effort is destined to fail – miserably. As we reported yesterday, the Associated Press directly contacted more than 330 Republican electors and found just one who said he wouldn’t cast his vote for Trump.
Even if enough electors were convinced not to vote for Trump, the choice would be tossed to the House of Representatives, which would pick Donald Trump anyway.
Fox News’ Howard Kurtz skewered journalists for even entertaining the notion that the electoral college vote is anything but a formality, accusing them of having developed “Trump derangement syndrome”.
SUBSCRIBE on YouTube:
Follow on Twitter: Follow @PrisonPlanet
Facebook: https://www.facebook.com/paul.j.watson.71
*********************
Paul Joseph Watson is the editor at large of Infowars.com and Prison Planet.com.
The Emergency Election Sale is now live! Get 30% to 60% off our most popular products today! | {
"pile_set_name": "OpenWebText2"
} |
Evaluation of cellular and humoral systemic immune response against Giardia duodenalis infection in cattle.
Giardia duodenalis causes diarrhoea in humans and a wide range of mammals, including cattle. In cattle, the infection often has a chronic character. Infected calves may excrete cysts for several months, suggesting that Giardia is able to suppress and evade the immune response. In this study six calves were infected with G. duodenalis assemblage A and E and housed in an environment that allowed reinfection. Cyst excretion was monitored twice a week and blood was collected every 2 weeks, until decreasing cyst counts indicated the development of protective immunity. The kinetics of the circulating memory cells and serum antibodies were followed up throughout this period. Cyst excretion started 1 week post-infection and remained high until week 14. Low cyst counts from week 15 p.i. onwards indicated that the calves had developed immunity. From week 5 p.i. significant proliferation of CD4(+) αβ T-cells was observed after in vitro stimulation with G. duodenalis antigen. Characterisation of the proliferating CD4(+) T-cells using real time qPCR showed that at the peak of antigen driven PBMC proliferation the majority of cells were CD4(+) T-cells expressing IL-17 and to a lesser extent FoxP3. The cell proliferation was strongly reduced after plastic adhesion of the PBMC, suggesting a role for antigen-presenting cells. Failure to restore proliferation of depleted PBMC with Giardia-stimulated monocyte-derived dendritic cells (MoDC) and unchanged proliferation after depletion of CD21(+) B-cells showed that other antigen-presenting cells than MoDC and B-cells were important for T-cell proliferation. Analysis of the antibody response indicated that serum IgG1 and IgA levels against G. duodenalis assemblage A and E increased from week 11 post-infection. From the start of the antibody response, all trophozoites stained positive in an immunofluorescence assay with serum antibodies, indicating that a broad repertoire of antibodies was produced against all variant-specific surface proteins. Further research is necessary to determine which effector T-cell subset produces IL-17 and which cells play a role in antigen presentation. | {
"pile_set_name": "PubMed Abstracts"
} |
Gas chromatographic evaluation of trapidil and its desethyl metabolite in biological fluids for pharmacokinetic and bioavailability investigations.
This paper describes a suitable and cost-saving method for quantitative analysis of trapidil (5-methyl-7-diethylamino-s-triazolo [1,5-a]pyrimidine) and its desethyl metabolite in plasma and urine for pharmacokinetic and bioavailability investigations. Trapidil and desethyl-trapidil were extracted from plasma, concentrated and injected into the gas chromatography without any derivatization process. The authors suggest a series of internal standards. A thermoionic specific detector enables high sensitivity to be achieved, i.e. 20 ng/ml, and good specificity. The method is cost-saving in that it allows about 30 analyses a day to be performed without automatic integrators, and about 50 analyses a day with these integrators. | {
"pile_set_name": "PubMed Abstracts"
} |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
I get that. And look, I'm a former Chicago guy and my Kim is a former Nebraska gal, so we don't eat anything that didn't have parents. I suppose it's subjective to a degree. But tripe...?! Jeez. My last post on this matter as I'm going waaaaay off-thread. But I can't resist. As my mother would have said, "Gross!" http://en.wikipedia.org/wiki/Tripe Mmmmmmm... McRib!
Originally Posted by MOTU_Maniac
I love the McRib, but don't want to know what it is made of. I learned long ago to NEVER question the food you eat or you won't eat anything that you don't personally grow in your own garden. lol.
End of every year I like to compile a list of my favorite films and ones I'd recommend plus I like to read everyone else's picks as well.
One of those rare years where I could make a top ten I feel good about, usually I make a top 5. Really confident in my top two. Loved Zero Dark Thirty, extremely well put together and acted. The Dark Knight Rises people can pick apart to death, but I loved the story telling, Bane's voice and eye acting, Catwoman, Alfred, Gordon, Blake, Batman's goodbye, all of it. The rest are interchangeable.
Contraband
Haywire (only if you love Gina Carano)
Underworld: Awakening (best of the series)
The Grey
Chronicle (surprisingly good superhero film using found footage)
Project X (Chronicle meets Risky business on steroids and ecstasy)
Safe House
Gone (surprisingly good)
John Carter
21 Jump Street (made me a Channing Tatum fan)
ATM
Lockout
Safe (one of the better Statham movies)
The Dictator
Men in Black 3
Mansome
Prometheus
Safety Not Guaranteed
Ted
People Like Us
The Amazing Spiderman
The Bourne Legacy
Premium Rush
Resident Evil: Retribution (if you liked all the others)
End of Watch
Looper
V/H/S
Flight
The Bay
Hitchcock
Killing Them Softly
The Collection (2nd best horror movie of the year)
The Hobbit: An Unexpected Journey (wanted to love it, but it's no LOTR)
Jack Reacher
I'll probably be the only one (and so be it!) but Expendables 2 was the best for me. I'm an Action movie fan to the core and seeing these guys together (i don't care if they're old timers LoL) in the one film was cool. The Hobbit & The Avengers are another couple that deserve notable mentions. 2012 wasn't a great year for outings to the cinema. Haven't seen Skyfall yet but will try to get to that one so can't obviously include that for 2012.
Looking forward to some films in 2013 a bit more (hopefully they don't let me down...) such as Jack Reacher, Pain & Gain, GI Joe, Stand Up Guys, Movie 43, World War Z, Man of Steel, The Last Stand, Snitch... Geez that's a fare few! Pretty sure there will be more... | {
"pile_set_name": "Pile-CC"
} |
Long Summer Light, Epic Landscapes, Wildlife Action!
Southeast Alaska is a land of photo superlatives, from colorful sunrise to magical sunset, the endless opportunities in between will leave even the most seasoned photographer breathless. Every week as the Saltery “C” embarks on a new adventure with a fresh group, the trip script writes itself as we cruise deep into wilderness with no 2 trips being exactly the same in every way. Around every turn of the coastline, behind the next point of land, there is the potential for extraordinary photographic experiences that can’t always be planned, and often exceeds expectations. The excitement never ceases when the scenery changes constantly and wildlife action can appear at any moment! Because Classic Alaska Charters is an overnight charter service we are in no hurry to go anywhere other than where the photographic opportunities, the light, and wildlife, present themselves.
Mountains Rise And Waterfalls Pour!
Standing on the bow of the Saltery “C” you’ll marvel at the geologic landscape that has been created by volcano’s, heaved by tectonics, weathered by glaciers into sculpted valleys of rock granite walls thousands of feet vertical from saltwater! Waterfalls are gushing from the cliff sides everywhere you look, even more when it rains, and that’s often. Several places there’s chances to pull the boat up and under one of these waterfalls for a unique perspective or to just get wet with the purest water on the planet. The dramatic landscape provides amazing light and shadow shows along with the obvious awe inspiring panorama of a safe anchor spot. Kayaking, exploring a snow cave (early summer) and hiking, provide magnificent views and vistas throughout the day. At night, the stars come out and the sky beckons to night photographers eager to capture the Milky Way, a Blue Moon, or the Aurora Borealis, and perhaps even a meteor shower, typically in August. Some of these events ARE predictable, however, like any great photo shoot it all depends on the weather!
Whales, Bald Eagles, And Bears!
Humpback whales by the hundreds arrive in the Ketchikan area in early Spring bubble net feeding along the coastline, often breaching playfully, females with calves close to their side, larger groups coordinating their all day feeding frenzy. Just because we anchor up for the night doesn’t mean the photographic action is over either! Often whales come into the secluded coves we nestle the Saltery “C” in and give us a show. Killer whales are frequent visitors to the Southeast Alaska coastal waters too. Following the migrating salmon they forage and feast right up to river mouths in packs often as many as a dozen. Many an encounter with Orca’s (and humpback whales too!) offer jaw dropping once in a lifetime experiences. For professional photographers it could mean a pay day! Amateurs and the novice photographers with camera’s filling the digital albums would be the envy of their peers.Bald eagles are essentially everywhere and any given hour of any day Captain Rob can make a soaring, diving, swooping bald eagle photo shoot happen. There’s hundreds of species of other magnificent birds to photograph that inhabit the wilderness waters we ply. Pacific and red throated loons, marbeled murrelet, pigeon guillemot, rhinoceros auklet, common murre, are frequent sightings for seabirds. Shore, tidal, and upland birds include belted kingfisher, black bellied plover, harlequin duck, water dipper, hummingbirds, thrushes and swallows. Of course, the list goes on… For serious birders we can supply a complete check list upon your arrival to keep track of your amazing sightings.
Bears! Black and brown bear are plentiful in the remote wilderness areas of Misty Fiords National Monument Wilderness Area with sightings of them nearly every week. For some serious bear photography Captain Rob can make it happen. Along with the bears wandering the tideflats and estuaries, there’s the Alexander Archipelago Wolves that have emerged from the old growth forest more frequently the last few years. Sitka black tailed deer, harbor seals, and Dall porpoise round out the most frequent cooperating subjects. | {
"pile_set_name": "Pile-CC"
} |
TNF Block Gene Variants Associate With Pain Intensity in Black Southern Africans With HIV-associated Sensory Neuropathy.
HIV-associated sensory neuropathy (HIV-SN) is a common neurological complication of HIV infection, and it is often painful. Tumor necrosis factor (TNF)-α is implicated in neuropathic pain, but associations between neuropathic pain and polymorphisms in the TNFA gene have not been identified. The "TNF block" is a region of high linkage disequilibrium within the central major histocompatability complex that contains several genes involved in the regulation of inflammation, including TNFA. Polymorphisms in the block have been associated with an altered risk of HIV-SN, but no investigations into whether this region is associated with the painful symptoms of neuropathy have been undertaken. Therefore, we investigated whether polymorphisms in the TNF block are associated with pain intensity in black Southern Africans with HIV-SN. Single-nucleotide polymorphisms (SNPs) defining TNF block haplotypes and African-specific tagSNPs were genotyped in samples from 150 black Southern Africans with HIV-SN. One SNP allele, rs28445017*A, was significantly associated with an increased pain intensity after correction for age, sex, and the CD4 T-cell count. A common 3-SNP haplotype containing rs28445017*G remained associated with a reduced pain intensity after correction for covariates and multiple comparisons. We identified a novel genetic association between polymorphisms in the TNF block and the pain intensity in black Southern Africans with HIV-SN. Our study implicates rs28445017 in painful HIV-SN, although its precise role and whether it may be causative is unclear. rs28445017 was not associated with the risk for HIV-SN as such, highlighting potential differences between the pathophysiology of the neuropathy and the painful features of the neuropathy. | {
"pile_set_name": "PubMed Abstracts"
} |
Inhibition of glycoprotein catabolism in vivo and in the perfused rat liver.
Leupeptin is a peptide which inhibits several of the lysosomal proteases. When this compound was added in low concentrations to a perfused liver, the degradation of 125I-asialo-fetuin by the liver was dramatically slowed. When 5 mg leupeptin were added to the perfusate 1 h prior to the radioactive glycoprotein, the liver retained from 70 to 90% or the radioisotope 60 min after infusing 125I-asialo-fetuin. However, untreated livers contained less than 20% of the radioactivity at that time. Subcellular fractionation experiments showed that the radioactivity accumulated in the heavy and light mitochondrial fractions (ML) of the homogenate. At 80 min after the glycoprotein was added, almost 40% of the radioactivity was still located with these fractions. Very similar inhibitory effects were seen upon treating rats intravenously with 5 mg of leupeptin 60 min prior to injection of 125I-labelled asialo-fetuin. A 7 fold increase in liver radioactivity was observed 6 hrs after the glycoprotein had been given to the treated animals. Purified human liver cathepsin B digested fetuin to about 3% of total hydrolysis and the major peptide fragment produced had an SDS-electrophoretic mobility equivalent to that of ovalbumin. | {
"pile_set_name": "PubMed Abstracts"
} |
Fighters from the last rebel-held town in Eastern Ghouta leave for Idlib province after weeks of uncertainty.
Syrian government forces are on the verge of recapturing the last remaining rebel stronghold in Syria’s Eastern Ghouta, according to state media reports.
A Russian military chief announced on Wednesday that it was only a matter of time until the last rebel “bastion” came under government control, the government affiliated el-Watan newspaper reported on Thursday.
“The militants are being evacuated from Douma, their last bastion in Eastern Ghouta, and within a few days the humanitarian operation in Eastern Ghouta must be completed”, Lieutenant General Sergei Rudskoi said.
Rebel fighters are expected to hand over medium to heavy weaponry in exchange for safe passage to Jarablus, a town in the predominantly rebel-controlled north.
Bus convoys have evacuated some 2,350 Jaish al-Islam rebel fighters and their families from Douma since Tuesday, according the UK-based Syrian Observatory for Human Rights.
Today’s departures – already under way – will leave government forces in control of the enclave for the first time in nearly five years.
Government forces along with its Russian ally launched a relentless ground and aerial offensive in February 18 to retake the Damascus suburb it had lost in mid-2013.
On Sunday, Iyad Abdelaziz, a council member from Douma, countered Syrian government claims an agreement was reached with Jaish al-Islam to leave the town, stressing that this only applied to the wounded.
A video posted on Jaish al-Islam’s social media accounts on Wednesday, however, showed its religious committee’s chairperson, Abu Abdelrahman Kaaka, confirm the deal
Kaaka denied the existence of a disagreement between the group’s leadership and its fighters after reports of insubordination had surfaced following the deal, stressing that it is incumbent on the latter to obey the orders of their guardian.
Earlier in march, the two rebel groups of Faylaq al-Rahman and Ahrar al-Sham reached an evacuation deal with the Russian army which resulted in an approximate 19,000 residents leaving the suburb.
To date, an estimated 150,000 residents of Eastern Ghouta have evacuated to northern Syria. | {
"pile_set_name": "OpenWebText2"
} |
RIGHT STEP SIDE, LEFT BEHIND, RIGHT STEP SIDE, LEFT HEEL, LEFT STEP BACK, RIGHT CROSS
1-2 Step right to side, step left behind right &3Step right to side, touch left heel forward &4 Step left back, step right across in front of left
LEFT STEP SIDE, RIGHT HEEL, RIGHT STEP BACK, LEFT CROSS, RIGHT STEP SIDE 5-6 Step left to side, touch right heel forward &7 Step right back, step left across in front of right 8-1 Step right to side, Step LEFT behind right
LEFT BEHIND, RIGHT STEP SIDE, LEFT HEEL, LEFT STEP BACK, RIGHT CROSS, LEFT TOUCH &2 Step right to side, touch left heel forward &3 Step left back, step right across in front of left 4 Touch left beside right | {
"pile_set_name": "Pile-CC"
} |
A British tabloid made an embarrassing error Friday, writing a hysterical piece that incorrectly reported the Defence Ministry had paid hundreds of millions of pounds to buy a five-inch-long gun.
“We just blew £183m on a five-inch gun, but it’s ‘a good value for taxpayers,’” read the outraged headline from The Daily Star. The subheadline also reinforced that the author believed the gun was literally five inches, calling it “the length of a toothbrush.”
The only problem? Five-inch guns are named after their caliber, not their length. They shoot munitions that are five inches in diameter, meaning the guns themselves are necessarily huge.
The piece quickly attracted the mockery of those who were more familiar with military terminology.
This is amazing. The Star thinks a five-“inch gun is literally five inches long. pic.twitter.com/Uv2BFnlfc3 — (((Tomos))) (@portraitinflesh) July 29, 2016
Um, I’m not sure this is how gun measurement works, Daily Star: https://t.co/hs7CTm1eW1 — Wings Over Scotland (@WingsScotland) July 29, 2016
Honestly, the low-calibre of journalism graduates these days…:) pic.twitter.com/YqH6alBGBQ — Willard Foxton (@WillardFoxton) July 29, 2016
Here’s the Daily Star page that thinks the Navy’s new five-inch gun is only five inches long (ht@UKDefJournal) pic.twitter.com/T8s66GMmfl — Alistair Coleman (@alistaircoleman) July 29, 2016
The article has since been corrected, and now reads as a sort of mundane examination of a fairly routine naval purchase.
Read More: Mediaite
Featured Image –The crew of the Arleigh Burke-class guided-missile destroyer USS Stethem (DDG 63) conduct a firing exercise of the MK 45 5-inch lightweight gun at a surface target during Cooperation Afloat Readiness and Training (CARAT) Singapore 2016, July 24 –DVIDS | {
"pile_set_name": "OpenWebText2"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.