text
stringlengths
9
5.77M
timestamp
stringlengths
26
26
url
stringlengths
32
32
Your shift ends and you head home. You notice less people on the streets, and you see a flickering light on the horizon. A stranger approaches him, seeing the quizzical look on your face. With broad shoulders, and low stature, he wasn't too imposing. "A rich family in the military district had their house burned down. Crazy, huh?" 1. Reply to the stranger (custom responce).2. Ignore him and keep heading home.3. Get closer to the scene.4. Attempt to rob the stranger. As you meander through the shops, you see several typical things: bead necklaces, the occasion 'gem' that will break when you drop it, and knives duller than an old guy with Alzheimers' personality. You come accross a higher end shop, selling various short swords. 1. As the shopkeep about his wares (custom responce).2. Look for a different shop.3. Go home.4. Go back and buy a bead necklace for the hell of it. You turn around slowly, body rigid with tension. As you turn around, you see a dark shape. It slowly steps into the light, you see a little girl holding a teddy bear. She has brown hair, and light blue eyes."Excuse me sir... could I have a glass of water?" she asks shyly. 1. Ask why she's out of bed.2. Get her some water.3. Ask her what her name is.4. Custom responce. As you roam the shops, you are vaguely aware of promoters trying to get your attention. But you just keep staring at the ground. You keep thinking about how your now an orphan, alone in the harsh military. You pull your head up. You see an armor stand. You approach it. 1. Ask the shopkeep about his wares (custom responce).2. Inspect the wares without talking to the shopkeeper.3. Look for another stand to look at.4. Go to the barracks and look for a bed. You head towards the Craftsmen District. You briskly buy the liquor, and begin to wander through the cloak shops. Then something catches your eye. You see a hooded cloak, dropping to ankle length, with an open front, plated shoulders, and 2 subtle pockets on the outside. Combining your money with the money the barkeeper gave you, you could buy it. 1. Ask the shopkeep about that cloak.2. Inspect the cloak.3. Physically check the cloak for other interesting things.4. Ignore the cloak and look for the weapon stands. "Well, my parents aren't here... they have to take care of my siblings at home... and I couldn't fall asleep. My mommy would always give me a glass of water if I couldn't fall asleep." She said quietly. 1. "Well, if you would tell me your name, I could tell the nurses to let you sleep for longer."2. Give her the water, and escort her back to her bed.3. Scream "LEEEEEROY JENKINS!" (filler).4. Custom Responce. After making a shortsword, you quickly bolt together a sheath. The sword has a waving blade with a serated edge. Only having one edge, The blade is slim, and comes to a point at a different angle than the rise of the blade. The handle is inlaid with silver in black iron. Tired, you decide to finish up. 1. Make the blade your weapon of choice, as you feel it's balanced.2. Clean up and go home.3. Go home without cleaning up.4. Wander the roads home. "Excuse me, but could you tell me about this cloak?" you ask. "Well, it is one of a kind. Not another cloak is the same. It also has two hidden pockets in the end of the sleeves. Its the ideal cloak for the assassin. You interested?" You move closer to him. "Who are you? I don't remember seeing you in these parts." As you move closer, you see his breath puff light green in the cold air. He smells of decaying flesh and rotting skin. "I'm.... new...." He replies breathily, a bit too cold. 1. Reach for your knife.2. Agree to play dice with him.3. Find someone else to play dice with.4. Custom Responce. Number Four:"Very interesting. Would you mind trading that to me for all this liquor? It's the real good kind from the brewery, not that nasty sludge at the tavern. One sip of this, and you'll be on top of the world. What do you say?" After going back to the brewery, you look for knives. Not far away from where you got you knew cloak, you see a shop with knives. Ranging from saphires to rubies, each hilt had a unique charm to it, and a dual purpose. Knife Pair 1: Similar to the hidden blade in Assassin's Creed, these blades have a strait double-edged blade. Inlaid within the blade are pieces of obsidian, capable of supporting magic used to blind the opponent. Knife Pair 2: Easily concealed within the sleeves of your cloak, these knives have sliver handles inlaid with emeralds, capable of supporting magic used to increase the speed you strike at for a short period of time. However, each blade only has one sharp edged, and an angled blade, with it being wider at the bottom than at the top. Knife Pair 3: Also similar to the hidden blade in Assassin's Creed, these blades miss the thin center portion of the blade. This makes it easier to fit these into the ribcage of the opponent. These appear with a flick of the wrist, and retract in the same manner. Inlaid in the handle are sapphires capable of summoning a strong frost into the wound your inflicting, as well as being able to throw frost. Sitting down, you pull out your dice. Knowing that their loaded, you raise a decent chunk of cash. After 3 consecutive rounds of losing, the man becomes quite aggitated. "This is so obscene.... you cannot win this much.... I was hoping to avoid this." You and the man get up. 1. Reach for your knife.2. Take a step back.3. Attempt to run away.4. Custom responce. Satisfied with your purchases, you head back to the tavern. "Well, I thought you had stolen my money. I was about to call the authorities. Glad to see your back." The barkeep greets you. You hand him the liquor. 1. Ask to spend the night in the inn above.2. Leave and look for another inn to stay in.3. Have a drink.4. Custom Responce. "No... Thats OK. Thank you ever so much for the water. Oh, and my name is Tamera..." Tamera slowly walks back to her room. "Well that was rather peculiar." You think aloud. Deciding not to follow her, you go home.
2024-02-10T01:27:04.277712
https://example.com/article/6909
Solution to Minesweeper Number Glitch is to do a system restore - rahuldottech https://answers.microsoft.com/en-us/windows/forum/all/minesweeper-number-glitch/ff528c98-9afe-465e-81f1-31c67416b856 ====== masonic (July 2009)
2023-11-24T01:27:04.277712
https://example.com/article/8981
Senators' Brady Tkachuk: Intends to sign pro contract Tkachuk has informed Boston College Head Coach Albie O'Connell of his intentions to sign a pro contract with the Senators, ESPN's John Buccigross reports. Tkachuk, the fourth overall pick in the 2018 NHL Entry Draft, will now set his sights on securing a spot with Ottawa when training camp opens next month. The Senators, with so many questions surrounding key veterans on the roster, could feature a younger roster in 2018-19, which would benefit Tkachuk. His performance in camp will be something to monitor closely.
2024-06-08T01:27:04.277712
https://example.com/article/8415
Archive Via Youtube.comIf you are familiar with summer camping and comfort products for warm weather, you might have realized that, extended stay RV camping in climates which are cold during the winter months, normally presents some difficulties, challenges and before I talk about the DIY RV skirting, it is important to know if your RV is […] When you’ve got a recreational vehicle, there are some questions you may ask yourself. Most revolve on where your RV will be packed when you are not using it for camping. In finding a perfect parking place for your recreational vehicle you can enter your area on Google maps then search for RV Parks. This is […] A water heater is designed to serve you efficiently, but after some time it might get faulty in lighting thereby resulting in poor performance. It is disappointing when you expect your water heater to serve you but fails in doing so. Just like other electronics, water heaters as well are prone to service disruption that arises […]
2023-09-21T01:27:04.277712
https://example.com/article/6159
// This file is generated automatically by `scripts/build/typings.js`. Please, don't change it. import { ja } from 'date-fns/locale' export default ja
2024-07-04T01:27:04.277712
https://example.com/article/9663
Q: YARN error: TaskAttempt killed because it ran on unusable node ... Container released on a *lost* node I am using CDH 5.4 with Pig 0.12. I am getting a lot of this error from all nodes: TaskAttempt killed because it ran on unusable nodename:portnumber Container released on a *lost* node What does this mean? In particular what does "lost" mean here? It doesn't look like the node is really lost in the cluster. Another question (more important question) is how to resolve this issue. Any help would be appreciated. A: This particular case turned out to be a data storage problem. I restarted datanode manager from nodes which were lost with the message of "1/1 local-dirs are bad: /data/hadoop/yarn/local;"
2023-09-26T01:27:04.277712
https://example.com/article/7806
Ohio's 31st senatorial district Ohio's 31st senatorial district has been based in central Ohio since 1982 and currently consists of the counties of Coshocton, Licking, Perry and Tuscarawas along with portions of Holmes county. It encompasses Ohio House districts 71, 72 and 98. It has a Cook PVI of R+6. Its current Ohio Senator is Republican Jay Hottinger. He resides in Newark, a city located in Licking County. List of senators References External links Ohio's 31st district senator at the 130th Ohio General Assembly official website Category:Ohio State Senate districts
2024-01-09T01:27:04.277712
https://example.com/article/2251
Hotels and B&Bs in and aroundStourton, Warwickshire AA rated SHIPSTON ON STOUR Guest Accommodation Located between Oxford and Stratford-upon-Avon and a short walk from the town centre, this immaculate detached house offers bedrooms with lots of thoughtful extras. Accommodation is all you would expe... AA rated KINGHAM Bed and Breakfast This converted barn lies in a peaceful Cotswold village and has splendid country views. Its well-appointed bedrooms either have a jacuzzi or large shower cubicles, one with hydro-massage jets. The att... AA rated The Fuzzy Duck has recently been renovated by the family behind Baylis & Harding, who are renowned for their quality toiletries. This English country pub now offers boutique bed and breakfast. The bed... AA rated Originally built in 975 AD, the Porch House is reputed to be England's oldest inn, and many of the original features can be seen today in the beautifully presented public areas. The inn was sympatheti... AA rated CHIPPING CAMPDEN Bed and Breakfast Set in the heart of the pretty Cotswold village of Ebrington, this late Victorian house offers thoughtfully equipped accommodation. Bedrooms are housed in buildings that were formerly used by the loca... AA rated STOW-ON-THE-WOLD Farm House This charming farmhouse offers superb views over the peaceful Cotswold countryside and has comfortable, well furnished bedrooms located in the main house or an adjoining cottage. The garden with relax... AA rated BANBURY Inn An important part of the community in the pretty village of North Newington, this inn dates from the 17th century and retains many original features including impressive open fires. Straightforward fo... AA rated This charming 18th-century house enjoys superb views across the Windrush Valley and is ideally positioned for a relaxing weekend exploring the Cotswolds. The spacious and thoughtfully equipped bedroom... AA rated In prime position on the delightful village green near the river, this 16th-century inn has spacious public areas with open fires, uneven floors, beams and wood furnishings. The comfortable restaurant... AA rated Dating back to the 16th century, this charming Cotswold coaching inn retains much of its original character, with stone walls, impressive fireplaces and a relaxed, country-house atmosphere. Bedrooms v...
2024-05-07T01:27:04.277712
https://example.com/article/1409
package net.i2p.router; /* * free (adj.): unencumbered; not under the control of others * Written by jrandom in 2003 and released into the public domain * with no warranty of any kind, either expressed or implied. * It probably won't make your computer catch on fire, or eat * your children, but it might. Use at your own risk. * */ import java.io.Writer; import java.util.ArrayList; import java.util.List; import net.i2p.data.Hash; import net.i2p.data.RouterIdentity; import net.i2p.data.i2np.DatabaseLookupMessage; import net.i2p.data.i2np.DatabaseSearchReplyMessage; import net.i2p.data.i2np.DeliveryStatusMessage; import net.i2p.data.i2np.I2NPMessage; import net.i2p.data.i2np.TunnelDataMessage; import net.i2p.data.i2np.TunnelGatewayMessage; import net.i2p.util.I2PThread; import net.i2p.util.Log; /** * Manage a pool of inbound InNetMessages. This pool is filled by the * Network communication system when it receives messages, and various jobs * periodically retrieve them for processing. * * Actually, this doesn't 'pool' anything, since DISPATCH_DIRECT = true. */ public class InNetMessagePool implements Service { private final Log _log; private final RouterContext _context; private final HandlerJobBuilder _handlerJobBuilders[]; /** following 5 unused unless DISPATCH_DIRECT == false */ private final List<I2NPMessage> _pendingDataMessages; private final List<Hash> _pendingDataMessagesFrom; private final List<I2NPMessage> _pendingGatewayMessages; private SharedShortCircuitDataJob _shortCircuitDataJob; private SharedShortCircuitGatewayJob _shortCircuitGatewayJob; private boolean _alive; private boolean _dispatchThreaded; /** Make this >= the max I2NP message type number (currently 24) */ private static final int MAX_I2NP_MESSAGE_TYPE = 31; /** * If set to true, we will have two additional threads - one for dispatching * tunnel data messages, and another for dispatching tunnel gateway messages. * These will not use the JobQueue but will operate sequentially. Otherwise, * if this is set to false, the messages will be queued up in the jobQueue, * using the jobQueue's single thread. * */ public static final String PROP_DISPATCH_THREADED = "router.dispatchThreaded"; public static final boolean DEFAULT_DISPATCH_THREADED = false; /** * If we aren't doing threaded dispatch for tunnel messages, should we * call the actual dispatch() method inline (on the same thread which * called add())? If false, we queue it up in a shared short circuit * job. */ private static final boolean DISPATCH_DIRECT = true; public InNetMessagePool(RouterContext context) { _context = context; _handlerJobBuilders = new HandlerJobBuilder[MAX_I2NP_MESSAGE_TYPE + 1]; if (DISPATCH_DIRECT) { // keep the compiler happy since they are final _pendingDataMessages = null; _pendingDataMessagesFrom = null; _pendingGatewayMessages = null; } else { _pendingDataMessages = new ArrayList<I2NPMessage>(16); _pendingDataMessagesFrom = new ArrayList<Hash>(16); _pendingGatewayMessages = new ArrayList<I2NPMessage>(16); _shortCircuitDataJob = new SharedShortCircuitDataJob(context); _shortCircuitGatewayJob = new SharedShortCircuitGatewayJob(context); } _log = _context.logManager().getLog(InNetMessagePool.class); _context.statManager().createRateStat("inNetPool.dropped", "How often do we drop a message", "InNetPool", new long[] { 60*60*1000l }); _context.statManager().createRateStat("inNetPool.droppedDeliveryStatusDelay", "How long after a delivery status message is created do we receive it back again (for messages that are too slow to be handled)", "InNetPool", new long[] { 60*60*1000l }); _context.statManager().createRateStat("inNetPool.duplicate", "How often do we receive a duplicate message", "InNetPool", new long[] { 60*60*1000l }); //_context.statManager().createRateStat("inNetPool.droppedTunnelCreateStatusMessage", "How often we drop a slow-to-arrive tunnel request response", "InNetPool", new long[] { 60*60*1000l, 24*60*60*1000l }); _context.statManager().createRateStat("inNetPool.droppedDbLookupResponseMessage", "How often we drop a slow-to-arrive db search response", "InNetPool", new long[] { 60*60*1000l }); } /** * @return previous builder for this message type, or null * @throws AIOOBE if i2npMessageType is greater than MAX_I2NP_MESSAGE_TYPE */ public HandlerJobBuilder registerHandlerJobBuilder(int i2npMessageType, HandlerJobBuilder builder) { HandlerJobBuilder old = _handlerJobBuilders[i2npMessageType]; _handlerJobBuilders[i2npMessageType] = builder; return old; } /** * @return previous builder for this message type, or null * @throws AIOOBE if i2npMessageType is greater than MAX_I2NP_MESSAGE_TYPE */ public HandlerJobBuilder unregisterHandlerJobBuilder(int i2npMessageType) { HandlerJobBuilder old = _handlerJobBuilders[i2npMessageType]; _handlerJobBuilders[i2npMessageType] = null; return old; } /** * Add a new message to the pool. * If there is * a HandlerJobBuilder for the inbound message type, the message is loaded * into a job created by that builder and queued up for processing instead * (though if the builder doesn't create a job, it is added to the pool) * * @param messageBody non-null * @param fromRouter may be null * @param fromRouterHash may be null, calculated from fromRouter if null * * @return -1 for some types of errors but not all; 0 otherwise * (was queue length, long ago) */ public int add(I2NPMessage messageBody, RouterIdentity fromRouter, Hash fromRouterHash) { long exp = messageBody.getMessageExpiration(); if (_log.shouldLog(Log.INFO)) _log.info("Received inbound " + " with id " + messageBody.getUniqueId() + " expiring on " + exp + " of type " + messageBody.getClass().getSimpleName()); //if (messageBody instanceof DataMessage) { // _context.statManager().getStatLog().addData(fromRouterHash.toBase64().substring(0,6), "udp.floodDataReceived", 1, 0); // return 0; //} String invalidReason = null; if (messageBody instanceof TunnelDataMessage) { // the IV validator is sufficient for dup detection on tunnel messages, so // just validate the expiration invalidReason = _context.messageValidator().validateMessage(exp); } else { invalidReason = _context.messageValidator().validateMessage(messageBody.getUniqueId(), exp); } if (invalidReason != null) { int level = Log.WARN; //if (messageBody instanceof TunnelCreateMessage) // level = Log.INFO; if (_log.shouldLog(level)) _log.log(level, "Dropping message [" + messageBody.getUniqueId() + " expiring on " + exp + "]: " + messageBody.getClass().getSimpleName() + ": " + invalidReason + ": " + messageBody); _context.statManager().addRateData("inNetPool.dropped", 1); // FIXME not necessarily a duplicate, could be expired too long ago / too far in future _context.statManager().addRateData("inNetPool.duplicate", 1); _context.messageHistory().droppedOtherMessage(messageBody, (fromRouter != null ? fromRouter.calculateHash() : fromRouterHash)); _context.messageHistory().messageProcessingError(messageBody.getUniqueId(), messageBody.getClass().getSimpleName(), "Duplicate/expired"); return -1; } else { if (_log.shouldLog(Log.DEBUG)) _log.debug("Message received [" + messageBody.getUniqueId() + " expiring on " + exp + "] is NOT a duplicate or exipired"); } boolean jobFound = false; int type = messageBody.getType(); boolean allowMatches = true; if (type == TunnelGatewayMessage.MESSAGE_TYPE) { shortCircuitTunnelGateway(messageBody); allowMatches = false; } else if (type == TunnelDataMessage.MESSAGE_TYPE) { shortCircuitTunnelData(messageBody, fromRouterHash); allowMatches = false; } else { // why don't we allow type 0? There used to be a message of type 0 long ago... if ( (type > 0) && (type < _handlerJobBuilders.length) ) { HandlerJobBuilder builder = _handlerJobBuilders[type]; if (_log.shouldLog(Log.DEBUG)) _log.debug("Add message to the inNetMessage pool - builder: " + builder + " message class: " + messageBody.getClass().getSimpleName()); if (builder != null) { Job job = builder.createJob(messageBody, fromRouter, fromRouterHash); if (job != null) { _context.jobQueue().addJob(job); jobFound = true; } else { // ok, we may not have *found* a job, per se, but we could have, the // job may have just executed inline jobFound = true; } } } } if (allowMatches) { int replies = handleReplies(messageBody); if (replies <= 0) { // not handled as a reply if (!jobFound) { // was not handled via HandlerJobBuilder _context.messageHistory().droppedOtherMessage(messageBody, (fromRouter != null ? fromRouter.calculateHash() : fromRouterHash)); if (type == DeliveryStatusMessage.MESSAGE_TYPE) { // Avoid logging side effect from a horrible UDP EstablishmentManager hack // We could set up a separate stat for it but don't bother for now long arr = ((DeliveryStatusMessage)messageBody).getArrival(); if (arr > 10) { long timeSinceSent = _context.clock().now() - arr; if (_log.shouldLog(Log.WARN)) _log.warn("Dropping unhandled delivery status message created " + timeSinceSent + "ms ago: " + messageBody); _context.statManager().addRateData("inNetPool.droppedDeliveryStatusDelay", timeSinceSent); } //} else if (type == TunnelCreateStatusMessage.MESSAGE_TYPE) { // if (_log.shouldLog(Log.INFO)) // _log.info("Dropping slow tunnel create request response: " + messageBody); // _context.statManager().addRateData("inNetPool.droppedTunnelCreateStatusMessage", 1, 0); } else if (type == DatabaseSearchReplyMessage.MESSAGE_TYPE) { if (_log.shouldLog(Log.INFO)) _log.info("Dropping slow db lookup response: " + messageBody); _context.statManager().addRateData("inNetPool.droppedDbLookupResponseMessage", 1); } else if (type == DatabaseLookupMessage.MESSAGE_TYPE) { if (_log.shouldLog(Log.DEBUG)) _log.debug("Dropping netDb lookup due to throttling"); } else { if (_log.shouldLog(Log.WARN)) _log.warn("Message expiring on " + messageBody.getMessageExpiration() + " was not handled by a HandlerJobBuilder - DROPPING: " + messageBody, new Exception("f00!")); _context.statManager().addRateData("inNetPool.dropped", 1); } } else { String mtype = messageBody.getClass().getName(); _context.messageHistory().receiveMessage(mtype, messageBody.getUniqueId(), messageBody.getMessageExpiration(), fromRouterHash, true); return 0; // no queue } } } String mtype = messageBody.getClass().getName(); _context.messageHistory().receiveMessage(mtype, messageBody.getUniqueId(), messageBody.getMessageExpiration(), fromRouterHash, true); return 0; // no queue } public int handleReplies(I2NPMessage messageBody) { List<OutNetMessage> origMessages = _context.messageRegistry().getOriginalMessages(messageBody); if (_log.shouldLog(Log.DEBUG)) _log.debug("Original messages for inbound message: " + origMessages.size()); if (origMessages.size() > 1) { if (_log.shouldLog(Log.DEBUG)) _log.debug("Orig: " + origMessages + " \nthe above are replies for: " + messageBody, new Exception("Multiple matches")); } for (int i = 0; i < origMessages.size(); i++) { OutNetMessage omsg = origMessages.get(i); ReplyJob job = omsg.getOnReplyJob(); if (_log.shouldLog(Log.DEBUG)) _log.debug("Original message [" + i + "] " + omsg.getReplySelector() + " : " + omsg + ": reply job: " + job); if (job != null) { job.setMessage(messageBody); _context.jobQueue().addJob(job); } } return origMessages.size(); } // the following short circuits the tunnel dispatching - i'm not sure whether // we'll want to run the dispatching in jobs or whether it shuold go inline with // others and/or on other threads (e.g. transport threads). lets try 'em both. private void shortCircuitTunnelGateway(I2NPMessage messageBody) { if (DISPATCH_DIRECT) { doShortCircuitTunnelGateway(messageBody); } else { synchronized (_pendingGatewayMessages) { _pendingGatewayMessages.add(messageBody); _pendingGatewayMessages.notifyAll(); } if (!_dispatchThreaded) _context.jobQueue().addJob(_shortCircuitGatewayJob); } } private void doShortCircuitTunnelGateway(I2NPMessage messageBody) { if (_log.shouldLog(Log.DEBUG)) _log.debug("Shortcut dispatch tunnelGateway message " + messageBody); _context.tunnelDispatcher().dispatch((TunnelGatewayMessage)messageBody); } private void shortCircuitTunnelData(I2NPMessage messageBody, Hash from) { if (DISPATCH_DIRECT) { doShortCircuitTunnelData(messageBody, from); } else { synchronized (_pendingDataMessages) { _pendingDataMessages.add(messageBody); _pendingDataMessagesFrom.add(from); _pendingDataMessages.notifyAll(); //_context.jobQueue().addJob(new ShortCircuitDataJob(_context, messageBody, from)); } if (!_dispatchThreaded) _context.jobQueue().addJob(_shortCircuitDataJob); } } private void doShortCircuitTunnelData(I2NPMessage messageBody, Hash from) { if (_log.shouldLog(Log.DEBUG)) _log.debug("Shortcut dispatch tunnelData message " + messageBody); _context.tunnelDispatcher().dispatch((TunnelDataMessage)messageBody, from); } public void renderStatusHTML(Writer out) {} /** does nothing since we aren't threaded */ public synchronized void restart() { shutdown(); try { Thread.sleep(100); } catch (InterruptedException ie) {} startup(); } /** does nothing since we aren't threaded */ public synchronized void shutdown() { _alive = false; if (!DISPATCH_DIRECT) { synchronized (_pendingDataMessages) { _pendingDataMessages.clear(); _pendingDataMessagesFrom.clear(); _pendingDataMessages.notifyAll(); } } } /** does nothing since we aren't threaded */ public synchronized void startup() { _alive = true; _dispatchThreaded = DEFAULT_DISPATCH_THREADED; String threadedStr = _context.getProperty(PROP_DISPATCH_THREADED); if (threadedStr != null) { _dispatchThreaded = Boolean.parseBoolean(threadedStr); } if (_dispatchThreaded) { _context.statManager().createRateStat("pool.dispatchDataTime", "How long a tunnel dispatch takes", "Tunnels", new long[] { 10*60*1000l, 60*60*1000l, 24*60*60*1000l }); _context.statManager().createRateStat("pool.dispatchGatewayTime", "How long a tunnel gateway dispatch takes", "Tunnels", new long[] { 10*60*1000l, 60*60*1000l, 24*60*60*1000l }); I2PThread data = new I2PThread(new TunnelDataDispatcher(), "Tunnel data dispatcher"); data.setDaemon(true); data.start(); I2PThread gw = new I2PThread(new TunnelGatewayDispatcher(), "Tunnel gateway dispatcher"); gw.setDaemon(true); gw.start(); } } /** unused unless DISPATCH_DIRECT == false */ private class SharedShortCircuitDataJob extends JobImpl { public SharedShortCircuitDataJob(RouterContext ctx) { super(ctx); } public String getName() { return "Dispatch tunnel participant message"; } public void runJob() { int remaining = 0; I2NPMessage msg = null; Hash from = null; synchronized (_pendingDataMessages) { if (!_pendingDataMessages.isEmpty()) { msg = (I2NPMessage)_pendingDataMessages.remove(0); from = (Hash)_pendingDataMessagesFrom.remove(0); } remaining = _pendingDataMessages.size(); } if (msg != null) doShortCircuitTunnelData(msg, from); if (remaining > 0) getContext().jobQueue().addJob(SharedShortCircuitDataJob.this); } } /** unused unless DISPATCH_DIRECT == false */ private class SharedShortCircuitGatewayJob extends JobImpl { public SharedShortCircuitGatewayJob(RouterContext ctx) { super(ctx); } public String getName() { return "Dispatch tunnel gateway message"; } public void runJob() { I2NPMessage msg = null; int remaining = 0; synchronized (_pendingGatewayMessages) { if (!_pendingGatewayMessages.isEmpty()) msg = (I2NPMessage)_pendingGatewayMessages.remove(0); remaining = _pendingGatewayMessages.size(); } if (msg != null) doShortCircuitTunnelGateway(msg); if (remaining > 0) getContext().jobQueue().addJob(SharedShortCircuitGatewayJob.this); } } /** unused unless router.dispatchThreaded=true */ private class TunnelGatewayDispatcher implements Runnable { public void run() { while (_alive) { I2NPMessage msg = null; try { synchronized (_pendingGatewayMessages) { if (_pendingGatewayMessages.isEmpty()) _pendingGatewayMessages.wait(); else msg = (I2NPMessage)_pendingGatewayMessages.remove(0); } if (msg != null) { long before = _context.clock().now(); doShortCircuitTunnelGateway(msg); long elapsed = _context.clock().now() - before; _context.statManager().addRateData("pool.dispatchGatewayTime", elapsed); } } catch (InterruptedException ie) { } catch (OutOfMemoryError oome) { throw oome; } catch (Exception e) { if (_log.shouldLog(Log.CRIT)) _log.log(Log.CRIT, "Error in the tunnel gateway dispatcher", e); } } } } /** unused unless router.dispatchThreaded=true */ private class TunnelDataDispatcher implements Runnable { public void run() { while (_alive) { I2NPMessage msg = null; Hash from = null; try { synchronized (_pendingDataMessages) { if (_pendingDataMessages.isEmpty()) { _pendingDataMessages.wait(); } else { msg = (I2NPMessage)_pendingDataMessages.remove(0); from = (Hash)_pendingDataMessagesFrom.remove(0); } } if (msg != null) { long before = _context.clock().now(); doShortCircuitTunnelData(msg, from); long elapsed = _context.clock().now() - before; _context.statManager().addRateData("pool.dispatchDataTime", elapsed); } } catch (InterruptedException ie) { } catch (OutOfMemoryError oome) { throw oome; } catch (Exception e) { if (_log.shouldLog(Log.CRIT)) _log.log(Log.CRIT, "Error in the tunnel data dispatcher", e); } } } } }
2023-09-11T01:27:04.277712
https://example.com/article/7902
The Misfortunes of Arthur The Misfortunes of Arthur, Uther Pendragon's son reduced into tragical notes is a play by the 16th-century English dramatist Thomas Hughes. Written in 1587, it was performed at Greenwich before Queen Elizabeth I on February 28, 1588. The play is based on the Arthurian legend, specifically the story of Mordred's treachery and King Arthur's death as told in Geoffrey of Monmouth's Historia Regum Britanniae. Several of Hughes' fellow members at Gray's Inn participated in The Misfortunes of Arthur’s writing and production. Nicholas Trotte provided the introduction, Francis Flower the choruses of Acts I and II, William Fulbecke wrote two speeches, while Francis Bacon, Christopher Yelverton, John Lancaster, and Flower oversaw the dumb shows. Lancaster and John Penruddocke directed the drama at Court. The play was greatly influenced by Seneca the Younger's tragedies, and was composed according to the Senecan model. The ghost of Gorlois, a duke slain by Uther Pendragon, opens the play with a speech reproducing passages spoken by Tantalus' ghost in Thyestes. All action occurs offstage and is related by a chorus, while a messenger announces the tragic events. W. J. Cunliffe demonstrated the influence of Seneca on Hughes, suggesting the play consists largely of translations of Seneca with occasional original lines. The Misfortunes of Arthur was reprinted in John Payne Collier's supplement to Dodsley's Old Plays, and by Harvey Carson Grumline (Berlin, 1900), who points out that Hughes's source was Geoffrey of Monmouth's Historia Regum Britanniae rather than Thomas Malory's Le Morte d'Arthur. Notes References Cunliffe, W. J. (1893). On the Influence of Seneca on Elizabethan Tragedy. Lacy, Norris J. (1991). The New Arthurian Encyclopedia. New York: Garland. . External links University of Rochester The Misfortunes of Arthur Archive.org The Misfortunes of Arthur Bartleby Category:1588 plays Category:Arthurian theatre Category:English Renaissance plays
2024-06-22T01:27:04.277712
https://example.com/article/2615
Oromucosal midazolam: a review of its use in pediatric patients with prolonged acute convulsive seizures. Oromucosal midazolam (Buccolam™) is a benzodiazepine approved for the treatment of pediatric patients with acute, prolonged, convulsive seizures. This article reviews the pharmacologic properties of oromucosal midazolam and its clinical efficacy and tolerability for the treatment of prolonged acute convulsive seizures in pediatric patients aged 3 months to <18 years. Midazolam exerts its action by enhancing the effects of γ-aminobutyric acid (GABA) on GABA(A) receptors, resulting in neural inhibition. Oromucosal midazolam has a rapid onset (<10 minutes; due to rapid absorption across the buccal membrane and high lipophilicity) and short duration of effect (categorized by the short elimination half-life of midazolam and its active metabolite). The oromucosal administration of the drug avoids first-pass hepatic metabolism; as a result, it has a higher bioavailability than oral midazolam. Oromucosal midazolam is at least as effective at seizure cessation as rectal or intravenous diazepam and appears as well tolerated as these diazepam formulations in pediatric patients with acute convulsive seizures (additionally, midazolam has been available for use for decades in various formulations, and is historically well tolerated). Moreover, oromucosal midazolam was associated with a similar or shorter time to response than rectal diazepam. While the time to response was longer with oromucosal midazolam than with intravenous diazepam, the latter took significantly longer to apply than the former, leading to a significantly shorter overall controlling time with oromucosal midazolam. Respiratory depression occurred at a similar rate in recipients of oromucosal midazolam to that observed in recipients of rectal diazepam. Overall, oromucosal midazolam is at least as effective as rectal diazepam and as effective as intravenous diazepam in the treatment of children with prolonged acute convulsive seizures, and is generally well tolerated in this population. It has several advantages over rectal diazepam, the previous gold standard of treatment, such as having a more socially acceptable administration route and having a likely more predictable absorption profile. Oromucosal midazolam is a promising first-line treatment option for children with prolonged acute convulsive seizures, in particular where intravenous access is precluded.
2024-03-03T01:27:04.277712
https://example.com/article/3901
Neuroprotective Effect of Modified Electroconvulsive Therapy for Schizophrenia: A Proton Magnetic Resonance Spectroscopy Study. The underlying mechanism of modified electroconvulsive therapy (MECT) treatment for drug-resistant and catatonic schizophrenia remains unclear. Here, we aim to investigate whether MECT exerts its antipsychotic effects through elevating N-acetylaspartate (NAA) concentration measured by proton magnetic resonance spectroscopy (H-MRS). Multiple-voxel H-MRS was acquired in the bilateral prefrontal cortex (PFC) and thalamus to obtain measures of neurochemistry in 32 MECT, 34 atypical antipsychotic-treated schizophrenic patients, and 34 healthy controls. We found that both MECT and atypical antipsychotic treatments showed significant antipsychotic efficacy. MECT and atypical antipsychotic treatments reversed the reduced NAA/creatine ratio (NAA/Cr) in the left PFC and left thalamus in schizophrenic patients compared with healthy controls. Furthermore, the NAA/Cr ratio after treatments was significant higher in the MECT group, but not in the medication group. Our findings demonstrate that eight times of MECT elevated the relative NAA concentration to display neuroprotective effect, which may be the underlying mechanism of rapid antipsychotic efficacy.
2023-09-29T01:27:04.277712
https://example.com/article/2606
AstorStore A reliable source of High Quality Mobile Device accessories. We are specialist in Aluminium Metal Case, Leather Case, 3 in 1 Stylus, Screen Protector and more for smartphone, PDA, music device and game player. We sell products in Good Price and Good Service. Worldwide orders are welcome.
2023-12-18T01:27:04.277712
https://example.com/article/9247
Conventional golf balls can be divided into two general types or groups: solid balls and wound balls. The difference in play characteristics resulting from these different types of constructions can be quite significant. Balls having a solid construction are generally most popular with the average recreational golfer because they provide a very durable ball while also providing maximum distance. Solid balls are generally made with a single solid core, usually made of cross-linked rubber, which is encased by a cover material. Typically the solid core is made of polybutadiene which is chemically cross-linked with zinc diacrylate and/or similar cross-linking agents and is covered by a tough, cut-proof blended cover. The cover is generally a material such as SURLYN®, which is a trademark for an ionomer resin produced by DuPont. The combining of the core and cover materials provides a ball that is virtually indestructible by golfers. Further, such a combination imparts a high initial velocity to the ball that results in improved distance. Because these materials are very rigid, two-piece balls have a hard “feel” when struck with a club. Likewise, due to their hardness, these balls have a relatively low spin rate, which provides greater distance. Wound balls typically have either a solid rubber or liquid center core around which many yards of a stretched elastic thread or yarn are wound. The wound core is then covered with a durable cover material such as ionomer or polyurethane. Wound balls are generally softer and provide more spin, which enables a skilled golfer to have control over the ball's flight and final position. Particularly, with approach shots into the green, the high spin rate of soft, wound balls enables the golfer to stop the ball very near its landing position. The design and technology of golf balls has advanced to the point whereby the United States Golf Association has now instituted a rule that prohibits the use, in a USGA sanctioned event, of any golf ball which can achieve an initial velocity of 255 ft/s when struck by an implement having a velocity of 143 ft/s. (Herein referred to as the USGA test.) Manufacturers place a great deal of emphasis on producing golf balls that consistently achieve the highest possible velocity in the USGA test without exceeding the limit, which are available with a range of different properties and characteristics, such as velocity spin and compression. Thus, a variety of different balls are available to meet the needs and desires of a wide range of golfers. Regardless of the form of the ball, players generally seek a golf ball that delivers maximum distance, which requires a high initial velocity upon impact. Therefore, in an effort to meet the demands of the marketplace, manufacturers strive to produce golf balls with high initial velocities. As a result, golf ball manufacturers are continually searching for new ways in which to provide golf balls that deliver the maximum performance for golfers at all skill levels, and seek to discover compositions that provide the performance of a high compression ball with lower compression. The physical characteristics of a golf ball are determined by the combined properties of the core, any intermediate layers, and the cover. These, in turn, are determined by the chemical compositions of each. The composition of some balls will provide for increased distance. Other compositions provide for improved spin. Manufacturers are constantly looking to develop the ideal materials, silicone elastomers for example, have been examined for their innate ability to provide material having fairly high ultimate elongation, which is a very desired property in the make-up of a golf ball. However, they also have only low-moderate tensile strengths. One of the least attractive properties of silicone elastomers in the manufacture of golf balls is that the materials require covalent cross-linking to develop useful properties. This is because linear or branched silicone (polydimethylsiloxane) (PSX) homopolymers are viscous liquids or millable gums at room temperature. Fabrication of these materials must include, or be followed by, cross-linking to form chemical bonds among adjacent polymer chains. The infinite network thus formed gives the polymer its rubber elasticity and characteristic physical-mechanical properties. Cross-linking of extrudable and moldable silicone stock is usually done via peroxide-generated free radicals adding to vinyl groups incorporated along the polymer backbone, or increasingly, by the platinum-catalyzed addition of silane (—Si—H) terminal vinyl groups. Certain low-strength (RTV) silicone adhesives vulcanize at room temperature by condensation reactions, eliminating an acid or alcohol to generate —Si—OH or silanols, followed by the elimination of water as silanols condense to form —Si—O—Si— (siloxane) bonds and create a three-dimensional network. Regardless of how the cross-linking or vulcanization is effected, the resulting thermoset silicone cannot be re-dissolved or re-melted. This severely reduces the number of post-fabrication operations that could be used in the fabrication process of golf balls. Thermal forming, radio frequency welding, heat sealing and solvent bonding are all essentially unavailable when working with conventional silicone elastomers. In contrast to cross-linked silicone rubbers, many polyurethane elastomers are thermoplastic in nature. That is, they can be processed by methods that involve melting or dissolving the polymer to reshape it. The molecular structure of a typical thermoplastic urethane (TPU) consists of alternating high-melting “hard” urethane segments and liquid-like “soft” segments. Hard segments are almost always the reaction product of an aromatic or aliphatic diisocyanate and a low molecular weight, chain-extending dialcohol or diol. The diisocyanates may be selected from the group consisting of alkyl diisocyanates, arylalkyl diisocyanates, cycloalkylalkyl diisocyanates, alkylaryl diisocyanates, cycoalkyl diisicyanates, arly diisocyanates, cycloalkylaryl diisocyanates, all of which may be further substituted with oxygen, and mixtures thereof. The chain extender of the hard segment used in the preparation of the copolymers may be an aliphatic polyol or an aliphatic or aromatic polyamine such as known for preparing polyurethanes and polyureas. The polyol for the hard segment may be preferably selected from the group consisting of alkylene, cycloalkylene, arylene diols, triols, tetraalcohols and pentaalcohols, and mixtures thereof. The polyamine of the hard segment may be selected from the group consisting of alkyl, cycloalkyl, and aryl amines that may be further substituted with nitrogen, oxygen, halogen, complexes thereof with alkali metal salts and mixtures thereof. Soft segments may be built from polyols with terminal hydroxyl (—OH) groups. The hydroxyl creates a urethane group, while the reaction between isocyanates and existing urethane groups will form allophanate groups that can produce minor amounts of covalent cross-linking in TPUs. When a TPU is heated, the hydrogen-bonded hard segments and any allophanate cross-links, both of which hold the polymer together at its use temperature, dissociate to allow the polymer to melt and flow. Dissolution in a polar solvent can also disrupt the hydrogen bonds that hold together the hard segments on adjacent chains. Once these virtual cross-links are broken, the polymer can be fabricated into golf balls. Upon cooling or solvent evaporation, the hard segments de-mix from the soft segments to re-associate by hydrogen bonding. This restores the original mechanical properties of the polyurethane elastomer. Polyether and polycarbonate TPUs generally have excellent physical properties, combining high elongation and high tensile strength, albeit having fairly high-modulus. Varying the hard segment of a TPU during synthesis can produce a whole family of polymers of related chemistry but with a wide range of hardness, modulus, tensile-strength properties and elongation. In the fabrication of golf balls, the use of TPUs of different hardness values within a single family provides considerable versatility in manufacturing. Therefore, there exists a need for a golf ball comprising a thermoplastic silicone-urethane having improved golf ball performance.
2024-01-08T01:27:04.277712
https://example.com/article/9255
Background {#Sec1} ========== MicroRNAs (miRNAs) are endogenously expressed small RNA molecules that mediate posttranscriptional gene silencing through complimentary binding of the 3′untranslated regions (3′UTR) of target genes \[[@CR1]\]. Over half of the human transcriptome is predicted to be under miRNA regulation, embedding this post-transcriptional control pathway within nearly every biological process \[[@CR2]-[@CR4]\]. Thus, miRNAs are involved in almost all aspects of cancer biology, such as proliferation, apoptosis, invasion/metastasis, and angiogenesis \[[@CR5]\]. Over the past few years several studies have shown that miRNAs play an important role in CLL \[[@CR6]-[@CR9]\]. Distinct microRNA signatures are associated with prognosis, disease progression \[[@CR9]-[@CR14]\] and response to treatment \[[@CR15],[@CR16]\]. In CLL, the downregulation of miR-223 is associated with disease aggressiveness and poor prognostic factors \[[@CR13],[@CR14]\], which may become this miRNA a new reliable prognostic predictor. However, unlike other miRNAs with prognostic value in CLL such as miR-181b and miR- 29c, there is no evidence of its pathogenetic role, and no target has so far been proposed or validated for miR-223 in CLL. Over the last decade, several studies have implicated heat shock proteins (HSPs) as major contributors to cancer progression and the development of chemoresistance. HSPs are upregulated in many cancers, including CLL, and may contribute to prolonged tumor cell survival via several mechanisms that remain to be fully described \[[@CR17]-[@CR19]\]. Preclinical studies in CLL have shown that *HSP90* inhibition causes the degradation of ZAP-70 and other proteins associated with poor survival, and this may ultimately lead to apoptosis \[[@CR20]-[@CR24]\]. Targeting *HSP90* is an attractive strategy in CLL as this could represent a therapeutic option to drug resistance in CLL associated with lesions in the *ATM/TP53* pathway \[[@CR25]-[@CR27]\]. Thus, inhibitors of *HSP90* have been proposed as a novel therapeutic option for CLL \[[@CR28]-[@CR30]\]*.* By applying next-generation sequencing (NGS) techniques we have detected a common polymorphism (rs2307842), in 24% of CLL patients, which disrupts the binding site for miR-223 in *HSP90B*1 3′UTR, leading to its overexpression in clonal B lymphocytes. This finding has helped us to identify miR-223 as a regulator of HSP90B1 levels in CLL patients, with therapeutic consequences. Methods {#Sec2} ======= Patients and controls {#Sec3} --------------------- Four patients with CLL were selected for a Targeted Sequence Capture and DNA Sequencing assay. CLL diagnosis was performed according to World Health Organization (WHO) classification \[[@CR31]\] and Working Group of National Cancer Institute (NCI) criteria \[[@CR32]\]. CD19+ fraction cells were used for sequencing and were obtained before administration of any treatment. To determine the clinical impact of *HSP90B1* 3′UTR polymorphism, we expanded the study to 165 additional patients with CLL and 32 healthy controls. FISH studies and *IGHV* mutational status were assessed. Details on the main characteristics of the 169 CLL patients included in the study are reported in Table [1](#Tab1){ref-type="table"} and Additional file [1](#MOESM1){ref-type="media"}: Supplementary Methods. The study was approved by the local ethical committee "Comité Ético de Investigación Clínica, Hospital Universitario de Salamanca". Written informed consent was obtained from each patient before they entered the study.Table 1**Clinical and biological features of the CLL patients included in the study**ParameterCategoryAge (years), median (range)66 (34-90)GenderMale66.0%White blood cells/mL (range)21 545 (7 080-188 020)Lymphocytes/mL (range)15 741 (1 580-180 000)Hemoglobin, g/dL (range)14.1 (4.4-16.8)Platelet count/mL (range)171 500 (23 000-399 000)*IGHV*Unmutated50.3%Binet stageA65.9%B23.2%C10.9%LDHNormal81.6%High18.4%b~2~microglobulinNormal55.9%High44.1%Bone marrow patternDiffuse41.9%Other58.1%HepatomegalyYes10.5%No89.5%SplenomegalyYes26.5%No73.5%B symptomsYes13.5%No86.5%Dead during follow-upYes21.6%No78.4%Therapy during follow-upYes45.7%No78.4%Results expressed as median or percentages.*IGHV*: immunoglobulin heavy variable gene; LDH: lactate dehydrogenase. Cells and culture conditions {#Sec4} ---------------------------- The human cell lines NCI-H929 and MM1S were acquired from the ATCC (American Type Culture Collection). Cell lines identity was confirmed periodically by STR analysis, PowerPlex 16 HS System kit ([www.promega.com](http://www.promega.com)) and online STR matching analysis ([www.dsmz.de/fp/cgi-bin/str.html](http://www.dsmz.de/fp/cgi-bin/str.html)). The human STR profile database includes data sets of 2455 cell lines from ATCC, DSMZ, JCRB and RIKEN. Both cell lines were cultured in RPMI 1640 medium supplemented with 10% of fetal bovine serum and antibiotics (Gibco). Cells were routinely checked for the presence of mycoplasma with MycoAlert kit (Lonza GmBH) and only mycoplasma-free cells were used in the experiments. The phenotypic and cytogenetic identities of the cell lines were verified by flow cytometry and FISH before the experiments. Details on collection and preparation of patients and cell culture samples are available in Additional file [1](#MOESM1){ref-type="media"}: Supplementary Methods. Targeted sequence capture and DNA sequencing assays {#Sec5} --------------------------------------------------- We applied array-based sequence capture (Roche NimbleGen) followed by next-generation sequencing (Roche GS FLX Titanium sequencing platform) to analyze a large panel of genes of relevance in CLL (Additional file [2](#MOESM2){ref-type="media"}: Table S1) and two chromosomal regions: 13q14.3 (50043128--50382849 bp) and 17p13.1 (7500000--7535000). The genes had been selected according to published data and our previous gene expression data and included, for example *HSP90B1, TP53, ATM, PHLPP1, E2F1, RAPGEF2* and *PI3K.* Pyrosequencing assays were performed to analyze the sequence for 3′UTR region of the *HSP90B1* gene. Details of the design of the array, 454 sequencing, coverage statistics and data analysis, as well as the pyrosequencing assays are provided in the Additional file [1](#MOESM1){ref-type="media"}: Supplementary Methods and Additional file [2](#MOESM2){ref-type="media"}: Table S2. The sequencing data are uploaded to the Sequence Read Archive (SRA) (<http://trace.ncbi.nlm.nih.gov/Traces/sra/>) under accession number PRJNA275978. All the information is accessible with the following link <http://www.ncbi.nlm.nih.gov/bioproject/275978>. Luciferase reporter assay {#Sec6} ------------------------- HEK293 cells were transfected with 500 ng of the constructs detailed in the Additional file [1](#MOESM1){ref-type="media"}: Supplementary Methods and Additional file [2](#MOESM2){ref-type="media"}: Table S3, and cotransfected with 25 nM miRNA precursor molecule by nucleofection, using the HEK293 cell line program in the Amaxa II nucleofector system. Cells were collected 24 hours after transfection and Firefly and Renilla luciferase activities were measured using the Dual-Glo® Luciferase Assay System (Promega) according to the manufacturer's protocol. Measurements were performed on a Tekan Infinite® F500 microplate reader. Firefly luciferase activity was normalized with respect to Renilla luciferase activity. Transfection with synthetic miRNAs {#Sec7} ---------------------------------- H929 and MM1S cell lines were transfected with Pre-miR™ miRNA precursors pre-miR-223 or pre-miR™ miRNA-negative, non-targeting control\#1 (Ambion) at 50 nM concentration, using the nucleofector II system with C-16 program and Q-023 program, respectively (Amaxa). Transfection efficiency was assessed with Block-iT™ Fluorescent Oligo (Invitrogen) by flow cytometry. Quantitative real-time polymerase chain reaction analysis and Immunoblotting {#Sec8} ---------------------------------------------------------------------------- This methodology is provided in Additional file [1](#MOESM1){ref-type="media"}: Supplementary Methods. Statistical analysis {#Sec9} -------------------- Statistical analysis was performed using SPSS (v20). The two-sided Student's *t* test was used to analyze differences between means (presented here with SD) of different experiments, based on triplicate determinations. Differences between the results of the qRT-PCR experiments with CLL patients were analyzed with the Mann-Whitney *U*. Kaplan-Meier analysis with the Log Rank test and Cox regression were used for survival analysis examining the impact of *HSP90B1* expression on OS and TFT. Chi-squared and Mann--Whitney U tests were employed when appropriate to correlate a range of biomarkers and clinical data according to rs2307842 status and *HSP90B1* expression. The results were considered statistically significant at *P* \< 0.05. Results {#Sec10} ======= A targeted genome capture and next-generation sequencing strategy identifies a common polymorphism in 3′UTR of *HSP90B1* {#Sec11} ------------------------------------------------------------------------------------------------------------------------ Using a custom NimbleGen array we captured and sequenced 93 genes and two entire chromosomal regions of four CLL patients. The enrichment assay followed by NGS allowed the detection of over 1600 variations/sample (median 1721, range 1618--1823). All putative variants were first compared with published single nucleotide polymorphism (SNP) data (dbSNP build 130; <http://www.ncbi.nlm.nih.gov/projects/SNP>). Most of the variants detected were identified as known SNPs and 226 variants were present in all the patients, so these were discarded. Overall, 10% of variants detected in each sample were not previously described mutations. Seventy-three missense variations affecting 33 genes were detected. Most of the genes had one (70%) or two (12%) variations. Results are summarized in Additional file [2](#MOESM2){ref-type="media"}: Table S4. By applying a custom-made data analysis pipeline, we have annotated the detected variants, including reported single-nucleotide polymorphisms (SNPs), genomic location, predicted miRNA binding sites, consequences of the variant in transcripts (i.e. synonymous, missense) and protein function prediction for those variants that are predicted to result in an aminoacid sustitution. In one out of four CLL patients (25%) we identified a 4-bp insertion/deletion polymorphism (−/GACT) in 3′UTR of *HSP90B1*, filled as rs2307842 (102865778-102865781b) in the NCBI SNP database. Rs2307842 results in the deletion of four nucleotides in 3′UTR sequence, three of them being part of the predicted binding site for miR-223 (Figure [1](#Fig1){ref-type="fig"}A). According to the databases, UCSC Genome Browser, NCBI and Ensembl, the reference genome contains the ′GACT′ sequence. The major allele in the European population, according to the NCBI SNP database, is ′GACT′ (allele frequency: 0.79 ± 0.06), whereas the 4-bp deletion has a minor allele frequency of 0.21 ± 0.06. Thus, we considered the individuals carrying the ′GACT′ sequence as *wild-type* (WT) and the individuals with the 4 bp-deletion as *variants* (VAR). We hypothesized that this deletion disrupts the binding site for miR-223, thereby increasing the translation of *HSP90B1*.Figure 1***HSP90B1*is a direct target of miR-223. (A)** 3′untranslated region (3′UTR) of *HSP90B1* (263 nt length) with a predicted binding site for miR-223 at 204--210 nt (grey box). The figure shows the mature miR-223 sequence (hsa-miR-223) aligned with *HSP90B1* 3′UTR wild type (WT, up), and with the polymorphism (VAR, below). The seed region is shown in bold. The rs2307842 polymorphism (in grey) disrupts the putative binding site for miR-223 by deleting the last three nucleotides of the seed region. **(B)** Luciferase reporter assays to confirm targeting of *HSP90B1* 3′UTR by miR-223. Ectopic miR-223 expression inhibits the wild-type but not the variant *HSP90B1* 3′UTR reporter activity in HEK293 cells. Cells were co-transfected with miR-223 precursor/negative control (NC) miRNA and with either wild-type (WT) or variant (VAR) *HSP90B1* 3′UTR reporter construct. Luciferase activity assay was performed 24 h after transfection. The columns represent normalized relative luciferase activity by means with 95% confidence intervals from 4 independent experiments (Mann--Whitney test, \**P* \< 0.05). **(C)** and **(D)** Ectopic miR-223 expression reduced both HSP90B1 mRNA **(C)** and protein **(D)** expression in H929 cell line (WT) but not in MM1S (VAR). Cells were transfected with miR-223 precursors and negative controls. After 24 h, cells were analyzed for HSP90B1 expression by qRT-PCR **(C)** and western blot **(D)**. The data shown are representative of 3 independent experiments (Mann--Whitney test, \**P* \< 0.05). *HSP90B1* is a direct target gene of miR-223 {#Sec12} -------------------------------------------- We have confirmed that miR-223 regulates *HSP90B1* expression by 3′UTR reporter assays. First, the double-stranded oligonucleotides, corresponding to the wild-type (WT-3'UTR) or variant (VAR-3'UTR) miR-223 binding site in the 3′UTR of *HSP90B1* (NM_003299), were synthesized. PmirGLO Vectors made up of an SV40 promoter, the Renilla luciferase gene, and the 3′UTRs of *HSP90B1* were transfected into HEK293 cells along with miR-223 or negative control (NC) mimics. Relative luciferase activity was measured at 24 h. The relative luciferase activity of the construct with wild-type 3′UTR was significantly repressed following miR-223 transfection (*P* \< 0.05) (Figure [1](#Fig1){ref-type="fig"}B). However, the presence of rs2307842 polymorphism in 3′UTR of *HSP90B1* (VAR-3′UTR) abolished this suppression (Figure [1](#Fig1){ref-type="fig"}B), suggesting that miR-223 directly binds to this site. We also validated *HSP90B1* as a target gene of miR-223 by transfecting MM1S and H929 cell lines with miR-223/NC mimics and then measuring HSP90B1 expression by qRT-PCR and western blot. Sequencing assays showed that H929 cell line has WT-3′UTR, whereas rs2307842 polymorphism was present in *HSP90B1* 3′UTR of MM1S cell line (VAR-3′UTR). All experiments were done in triplicate. Exogenous expression of miR-223 downregulated the expression levels of HSP90B1 in H929 cell line (WT-3′UTR) in both mRNA (*P \<* 0.05) and protein levels (Figure [1](#Fig1){ref-type="fig"}C and D). By contrast, HSP90B1 expression was not modified in the MM1S cell line (VAR-3′UTR) (Figure [1](#Fig1){ref-type="fig"}C and D). Taken together, all these results demonstrate that *HSP90B1* is a *bona fide* target gene of miR-223 and that the rs2307842 polymorphism abolishes the miR-223 regulation on HSP90B1 expression. rs2307842 is a common polymorphism in CLL patients {#Sec13} -------------------------------------------------- To determine the clinical impact of *HSP90B1* 3′UTR polymorphism in CLL, we screened 165 additional patients with CLL and 32 healthy controls for this polymorphism by pyrosequencing. A total of 50 paired DNA samples (CD19+ and non-CD19+ fraction cells) immunomagnetically purified from CLL patients showed complete concordance in their 3′UTR sequence, confirming that rs2307842 was the result of a SNP and not an acquired mutation. The polymorphism was found at a similar frequency in CLLs and healthy controls: 41/169 (24%) in CLL patients and 8/32 (25%) in healthy controls. These results are consistent with the data obtained from NCBI SNP database (<http://www.ncbi.nlm.nih.gov/projects/SNP>). Of note, no major differences regarding clinical, biological and genetic features were found between CLLs cases with the polymorphism (VAR) and wild-type (WT) (Additional file [2](#MOESM2){ref-type="media"}: Table S5). miR-223 is downregulated in CLL patients with IGHV unmutated genes {#Sec14} ------------------------------------------------------------------ In order to corroborate the down-regulation of miR-223 previously reported in CLL patients with IGHV unmutated (UM) genes, 53 samples were subjected to miRNA Taqman qRT-PCR to measure miR-223 expression according to IGHV mutation status. As expected, miR-223 was downregulated in UM CLL patients when compared to mutated IGHV cases (*P* = 0.036). *HSP90B1* overexpression is observed in B lymphocytes from CLL patients with the rs2307842 polymorphism and IGHV-unmutated status {#Sec15} --------------------------------------------------------------------------------------------------------------------------------- To test the hypothesis that *HSP90B1* overexpression may be due to a defective miR-223 regulation in CLL patients, we analyzed *HSP90B1* expression in a subgroup of patients previously characterized for the presence of the polymorphism and IGHV mutation status. We have performed qRT-PCR in a total of 97 CLL samples: 25 out of them were CLL patients with rs2307842 (VAR-CLLs) and 72 were wild-type (WT-CLLs). qRT-PCR results showed that *HSP90B1* was overexpressed in VAR-CLLs (*P* = 0.001) (Figure [2](#Fig2){ref-type="fig"}A). To gain insight into its influence on gene expression, we have measured HSP90B1 mRNA levels in the paired normal fraction of 50 cases (13 VAR-CLLs and 37 WT-CLLs). As expected, the results showed that B lymphocytes (tumor fraction) from VAR-CLLs showed a higher level of *HSP90B1* expression than B lymphocytes from WT-CLLs (*P* = 0.001), and also from the normal cells from the same patients (VAR-CLLs) (*P* \< 0.001) (Additional file [3](#MOESM3){ref-type="media"}: Figure S1). However, no changes in HSP90B1 mRNA expression were observed between tumor and normal fractions in CLLs without the SNP (P = 0.201). Thus, rs2307842 influenced *HSP90B1* overexpression only in the tumor fraction of the CLL patients with the polymorphism. Of note, we also observed overexpression of *HSP90B1* in patients with Figure [2](#Fig2){ref-type="fig"}B). The overexpression was also confirmed in the tumor fraction of the purified paired samples (data not shown).IGHV unmutated genes (UM-CLLs, n = 52) in comparison with mutated cases (MUT-CLLs, n = 45) (*P* = 0.003) (Figure [2](#Fig2){ref-type="fig"}B.Figure 2**Hsp90b1 is upregulated in CLL patients with the rs2307842 polymorphism and*IGHV*-unmutated status, as assessed by qRT-PCR and western blot analysis.** Box plots show the relative upregulation of *HSP90B1* mRNA in CLL patients with **(A)** rs2307842 (VAR) and **(B)** IGHV unmutated genes (UM) compared with wild-type CLL patients (WT) and the mutated cases (MUT), respectively. The thick line inside the box plot indicates the median expression levels and the box shows the 25th and 75th percentiles, while the whiskers show the maximum and minimum values. Outliers are represented by open circles. Statistical significance was determined by the Mann--Whitney *U* test (*P* \< 0.05). **(C)** Representative lysates of purified B lymphocytes from CLL patients were prepared and Hsp90b1 protein levels were analyzed by western blot. B-actin served as loading control. Representative blots from three CLL patients are shown: \#1 patient with IGHV unmutated genes (UM CLL), \#2 wild-type for rs2307842 and with IGHV mutated genes (WT&MUT CLL) and \#3 patient with rs2307842 (VAR CLL). Hsp90b1 protein expression was also measured by Western blot analysis in the B lymphocytes from CLL patients harboring the variant, unmutated IGVH genes and wild-type CLLs (Figure [2](#Fig2){ref-type="fig"}C). As expected, Hsp90b1 expression was higher in CLL with *HSP90B1* the SNP and in unmutated CLL. *HSP90B1* overexpression is associated with a shorter time to treatment {#Sec16} ----------------------------------------------------------------------- The relationship between clinical and biological characteristics of CLL patients and HSP90B1 gene expression was analyzed. A higher *HSP90B1* mRNA *e*xpression was correlated with the presence of rs2307842 (*P* =0.003), unmutated status of the *IGHV* gene (P = 0.008) and need for treatment (P = 0.001) compared to that of patients with lower HSP90B1 mRNA expression levels. A significantly shorter time to first therapy (TFT) was observed in the patients with *HSP90B1* overexpression (median of 17 months; 95% CI: 5--28.9 months) as compared to those cases without *HSP90B1* overexpression (median of 104 months) (p = 0.024) (Figure [3](#Fig3){ref-type="fig"}). Thus, 71% of patients in the group with *HSP90B1* overexpression required treatment vs. 31% of patients in the non-overexpressed group. Other variables associated with shorter TFT were age, non-mutated IGHV, lymphocyte count, adverse cytogenetics and the presence of B symptoms (Table [2](#Fig2){ref-type="fig"}). Multivariate analysis selected *HSP90B1* overexpression as an independent risk factor of TFT (HR: 2.63; 95% CI: 1.15-5.98; P = 0.021), after adjusting for IGHV mutation status, lymphocyte count (\< vs \>30000), cytogenetics (good prognosis *vs* high-risk), age (\< *vs* \> 65 years) and the presence of B symptoms.Figure 3**Kaplan-Meier plot of time to first therapy of CLL patients according to*HSP90B1*expression.** Patients overexpressing HSP90B1 (green line) had a significantly shorter TFT (median = 17 months; 95%CI: 5--28.9 months) as compared to that of patients with lower HSP90B1 expression levels (blue line) (median = 104 months, *P* = 0.024). Discussion {#Sec17} ========== MicroRNAs are known to inhibit gene expression by binding to the 3′UTR of the target transcript. In the present study *HSP90B1* was validated as a miR-223 direct target by 3′UTR reporter assays and transfection with synthetic miR-223 (Figure [1](#Fig1){ref-type="fig"}B and D). Thus HSP90B1 was overexpressed in CLL patients harboring unmutated *IGHV* genes and rs2307842, a common polymorphism located in *HSP90B1* 3′UTR, which disrupts the binding site of miR-223. More importantly, *HSP90B1* overexpression was independently predictive of shorter time to the first therapy. We propose that this overexpression could represent a pathogenic mechanism for miR-223 in CLL. Functional polymorphisms in 3′UTRs of several genes (also known as miRSNPs or miR-polymorphisms) are associated with diseases affecting gene expression. Loss of microRNA function due to defective miRNA-mRNA binding results in overexpression of the target mRNA, which can be involved in key biological processes, oncogenic mechanisms or drug resistance \[[@CR33]-[@CR36]\]. Moreover, the presence of some SNPs has been suggested to influence disease progression and clinical outcome in CLL \[[@CR37]-[@CR42]\], although the results are discrepant \[[@CR43]-[@CR46]\]. Our results showed that the presence of rs2307842, a common polymorphism located in the 3′UTR of *HSP90B1* (Figure [1](#Fig1){ref-type="fig"}A), alters the interaction between the target site in *HSP90B1* and miR-223 in CLL, resulting in HSP90B1 overexpression (Figure [2](#Fig2){ref-type="fig"}A). However, no major differences regarding clinical, biological and genetic features were found between CLLs harbouring rs2307842 and wild-type cases (Additional file [2](#MOESM2){ref-type="media"}: Table S5). We have also performed qRT-PCR using CD19+ peripheral blood lymphocytes from CLL patients displaying the polymorphism and wild-type cases (Additional file [3](#MOESM3){ref-type="media"}: Figure S1). As expected, B lymphocytes from CLL patients with the polymorphism had higher levels of *HSP90B1* than B lymphocytes from wild-type CLL patients. Surprisingly, non-clonal cells from CLL patients with the polymorphism showed levels of HSP90B1 mRNA similar to that of wild-type CLL patients (both CD19+ and non-CD19+ fraction cells). These findings suggest that a regulatory mechanism of *HSP90B1* expression could be present in cells with rs2307842. Further work is needed to understand the relevance and functional consequences of this common polymorphism in CLL patients. Of note, our study shows that the presence of variants that alter the 3′UTR-site targeted by the miRNA could be an alternative mechanism to the presence of mutations inside or surrounding microRNA genetic loci. Although miR-223 has been related to HSP90 in osteosarcoma \[[@CR47]\], miR-223 function is not well characterized in CLL. However the expression levels significantly decrease with the progression of the disease and miR-223 downregulation has been associated with higher tumor burden, disease aggressiveness, and poor prognostic factors, such as IGHV unmutated genes (UM CLL) \[[@CR8],[@CR13],[@CR14]\]. Despite the proven implication of miR-223 expression in CLL prognosis, little is known about the molecular mechanisms that may be responsible for the poor outcome of CLL patients showing miR-223 downregulation and, unlike other miRNAs with prognostic value in CLL, such as miR-181b and miR-29c, the target of miR-223 in CLL is still unknown \[[@CR48],[@CR49]\]. Our results confirmed the down-regulation of miR-223 in IGHV UM CLLs. Moreover, the present results, demonstrating that *HSP90B1* is a direct target gene of miR-223, provide more information about how the downregulation of miR-223 could determine the poor outcome of IGHV UM CLLs, possibly by upregulation of *HSP90B1* expression (Figure [2](#Fig2){ref-type="fig"}B and C). Limited data are available regarding the expression of HSP90 in CLL. In myelodisplastic syndromes, high levels of HSP90 were associated with shorter survival and increased risk of progression into acute myeloid leukemia (AML) \[[@CR50],[@CR51]\]. In AML, the percentage of HSP90-positive cells was correlated with that of Bcl2-positive cells and higher expression of HSPs was associated with lower complete remission rate and poor survival \[[@CR52],[@CR53]\]. Of note, we also observed a correlation between *HSP90B1* and *BCL2* overexpression in CLL patients (data not shown). HSP90 has been proposed to have a role in the modulation of apoptosis and is implicated in the resistance of leukemic cells to chemotherapeutic agents and recent evidence suggests that HSP90 inhibitors such as 17-AAG and 17-DMAG \[[@CR23]\], which have shown preclinical efficacy, could be a therapeutic option in CLL \[[@CR25]\]. More importantly, our data suggest that HSP90B1 overexpression is independently predictive of shorter time to first therapy in CLL (Table [2](#Tab2){ref-type="table"}).Table 2**Univariate and multivariate analysis for time to first therapy (TFT) in this series**Univariate analysisMultivariate analysisCharacteristicsEventsTotalMedianLCIUCI*P*HRLCIUCI*P*HSP9081 expressionNormal1239104.0\-\-\-\-\-\--High283917.05.028.90.0242.71.186.460.026IGVH identity\<98%1560104.011.3196.7\-\-\-\--≥98%395714.06.821.2\<0.0012.341.035.350.043Lymphocyte\<30000359053.035.170.8\-\-\-\--≥3000025378.00.017.5\<0.0014.21.7510.050.001CytogeneticsGood prognosis288257.038.375.7\-\-\-\--Poor prognosis16219.01.716.2\<0.0011.651.9072.540.023Age (years)≥65297142.018.365.7\-\-\-\--\<65295324.06.641.40.040.370.170.830.015B symptomsNo4219449.034.363.7\-\-\-\--Yes15181.00.02.1\<0..0010.170.060.530.002*IGVH*: immunogllobulin heavy variable gene; LCI: 95% lower confidence interval; UCI: 95% upper confidence interval; HR: Hazard ratio.Time to first theraphy (TFT) was defined as the interval between diagnosis and the treatment. Conclusions {#Sec18} =========== Our study highlights the relevance of miRNAs as critical players in the pathogenesis of CLL and shows for the first time that miR-223 modulates HSP90B1 expression in B lymphocytes of CLL. These results provide a plausible explanation of why CLL patients harboring miR-223 downregulation are associated with a poor outcome. Our work also points out HSP90B1 overexpression as a new pathogenic mechanism in CLL and a promising therapeutic target, at least in a subgroup of CLL patients. Additional files {#Sec19} ================ Additional file 1:**Supplementary Method.** Additional file 2: Tables S1-S5.ᅟ Additional file 3: Figure S1.Differential expression of *HSP90B1* in purified paired samples (CD19+ and non- CD19) from CLL patients assessed by qRT-PCR analysis. Box plots show the relative upregulation of *HSP90B1* in B lymphocytes (CD19+ fraction cell, *CD19+*) from CLL patients with rs2307842 (VAR-CLLs) compared with the non- CD19+ fraction cell (*non-CD19*) from the same patients (*P*\<0.001) and the wild-type CLL patients (WT-CLLs) (*P*=0.001). The thick line inside the box plot indicates the median expression levels and the box shows the 25th and 75th percentiles, while the whiskers show the maximum and minimum values. Outliers are represented by open circles. Statistical significance was determined by the Mann-Whitney *U* test (*P*\<0.05). 3′UTR : 3′untranslated region ATCC : American Type Culture Collection Bp : Base pair CI : Confidence interval CLL : Chronic lymphocytic leukemia FISH : Fluorescence in situ hybridization HR : Hazard ratio HSP : Heat shock protein IGHV : Immunoglobulin heavy chain variable MiRNA : MicroRNA MUT : Mutated NCI : National Cancer Institute NGS : Next generation sequencing OS : Overall survival SNP : Single nucleotide polymorphism TFT : Time to first therapy UM : Unmutated VAR : Variant Vs : Versus WT : Wild type **Competing interests** The authors declare that they have no competing interests. **Authors' contributions** A-ERV designed the research, collected and prepared the samples, performed qRT-PCR assays, helped analyze and interpret the data, and wrote the manuscript; DQ and IM performed the miRNA transfections and the luciferase and immunoblotting assays; RB and MHS designed and performed the sequencing assays; AGC, RF and J-MA provided patients' data; CZ, JFP and JMC performed the sequencing data analysis; M-ES performed the Taqman assays; J-LG, J-AH and N-CG collected data, participated in discussions and critically reviewed the manuscript; MG performed the IGHV mutational status analysis and critically reviewed the manuscript and J-MHR designed and supervised the study, did some of the research and wrote the manuscript. All authors read and approved the final manuscript. This work was partially supported by grants from the Spanish Fondo de Investigaciones Sanitarias FIS 09/01543 and PI12/00281, Proyectos de Investigación del SACYL 355/A/09, COST Action EuGESMA (BM0801), Fundación Manuel Solórzano, Obra Social Banca Cívica (Caja Burgos), Fundación Española de Hematología y Hemoterapia (FEHH) and by a grant (RD12/0036/0069) from the Red Temática de Investigación Cooperativa en Cáncer (RTICC), Instituto de Salud Carlos III (ISCIII), Spanish Ministry of Economy and Competitiveness & European Regional Development Fund (ERDF) "Una manera de hacer Europa" (Innocampus). The research leading to these results has received funding from the European Union Seventh Framework Programme \[FP7/2007-2013\] under Grant Agreement n°306242-NGS-PTL. MHS is fully supported by an Ayuda predoctoral de la Junta de Castilla y Leon by the Fondo Social Europeo. ME Sarasquete is supported by Contrato Miguel Servet (CP13/00080). The authors would like to thank Irene Rodríguez, Sara González, Teresa Prieto, Mª Ángeles Ramos, Almudena Martín, Ana Díaz, Ana Simón, María del Pozo and Vanesa Gutiérrez of the Centro de Investigación del Cáncer, Salamanca, Spain, for their technical assistance, and Jesús F. San Miguel for his critical review of the manuscript.
2023-12-20T01:27:04.277712
https://example.com/article/3993
package server import ( "github.com/Sirupsen/logrus" "github.com/docker/docker/api/server/httputils" "github.com/docker/docker/api/server/middleware" ) // handlerWithGlobalMiddlewares wraps the handler function for a request with // the server's global middlewares. The order of the middlewares is backwards, // meaning that the first in the list will be evaluated last. func (s *Server) handlerWithGlobalMiddlewares(handler httputils.APIFunc) httputils.APIFunc { next := handler for _, m := range s.middlewares { next = m.WrapHandler(next) } if s.cfg.Logging && logrus.GetLevel() == logrus.DebugLevel { next = middleware.DebugRequestMiddleware(next) } return next }
2024-02-06T01:27:04.277712
https://example.com/article/7261
Q: Correct way to use JSDoc with anonymous object and functions of this object Currently using Webstorm in a project with Dojo (1.10), and ESRI API Javascript. I have a function that accept a Widget (Object/Class), but the Webstorm show me some warnings because of JSDoc. Code: /** * Init toolbar * * @param {Object} [options] - Toolbar options * @param {string} [options.title=Default title] - Main title * @param {ToolbarWidget} toolbarObj - Toolbar widget to set */ initToolbar: function(options, toolbarObj) { ... toolbarObj.set('title', _title); } The first warning was on 'toolbarObj'. I get a message 'Unresolved variable or type'. This was easy to resolve. Just included the following JSDoc: /** * A dojo widget (toolbar). * @typedef {Object} ToolbarWidget */ Now, the another warning was the 'set' function of toolbarObj. I get a warning with the following message: 'unresolved function or method set()'. Already tried @name, @function (maybe not in the correct way)! I known this is optional (is just a warning), but, I like to document everything in the right way. So, how I can document the 'set' function of a anonymous object/dojo widget?! A: What about /** * A dojo widget (toolbar). * @typedef {Object} ToolbarWidget * @property {function} set */
2024-04-05T01:27:04.277712
https://example.com/article/2436
William O'Doherty William O'Doherty (1868 – 18 May 1905) was an Irish nationalist politician and Member of parliament (MP) in the House of Commons of the United Kingdom of Great Britain and Ireland. He was elected as the Irish Parliamentary Party MP for the North Donegal constituency at the 1900 general election. He died in 1905 and the subsequent by-election was won by John Muldoon. External links Category:1868 births Category:1905 deaths Category:Irish Parliamentary Party MPs Category:Members of the Parliament of the United Kingdom for County Donegal constituencies (1801–1922) Category:UK MPs 1900–1906 Category:People from County Donegal
2024-03-04T01:27:04.277712
https://example.com/article/5772
UPDATE 2-Mexico's Pemex eyes new oilfields after another year of big losses MEXICO CITY, Feb 27 (Reuters) - Mexico’s national oil company Pemex narrowed its multibillion-dollar losses last year, executives said on Wednesday, as it seeks to fast-track the development of 20 new fields this year in a bid to bring new streams of crude online. Long a source of Mexican pride and a potent political symbol, the state-owned company faces an increasingly uncertain future as oil output slides, leaving it with a $7.6 billion loss in 2018. “In 2019, Pemex’s main objective is to stabilize crude oil production,” Ulises Hernandez, a senior executive with the company’s exploration and production arm, told analysts on a conference call after the firm reported last year’s results. Pemex is facing mounting scrutiny from investors after its credit rating was cut two notches by Fitch Ratings in late January, putting it just one level above junk status. The company’s credit woes could extend to the government, requiring it to fund more rescue packages for Pemex, imperiling its own sovereign credit rating and significantly raising financing costs. Justifying its Pemex downgrade, Fitch analysts pointed to a 2018 tax bill of some $27 billion levied by the government on the firm as a major concern, as well as mounting debt levels. President Andres Manuel Lopez Obrador dismissed the downgrade, and doubled down on his support for the struggling giant, pledging a $3.9 billion capital injection to shore up finances, including around $200 million in tax relief. The veteran leftist won a landslide election last year on a promise to boost the company formally known as Petroleos Mexicanos. RISK TO SOVEREIGN Pemex’s $7.6 billion loss in 2018 was significantly narrower than the $14.3 billion it lost in 2017, helped by currency exchange gains and recovering crude prices. The government relies on Pemex to provide around 15 percent of total tax revenue while the company struggles under the weight of nearly $106 billion in debt, the highest of any national oil company in Latin America. If Pemex falls short of its future debt obligations, the burden could quickly bleed over to the government as it implicitly guarantees Pemex finances. Pemex crude output is expected to reach 1.77 million barrels per day (bpd) this year, said Hernandez, a figure that would mark a more than 3 percent drop compared with production last year of 1.83 million bpd. Crude output last year was down by about 6 percent compared to 2017 levels. Beyond growing Pemex’s crude production, Lopez Obrador has also promised to gradually grow Pemex’s refining capacity and wean the country off of growing fuel imports. Pemex’s six domestic refineries have a lot of room for improvement. Crude processing in 2018 stood at just 612,000 bpd, or about 38 percent of their capacity, far below the efficiency rates of the facilities clustered along the U.S. Gulf Coast. Jonathan Cerda, an executive with Pemex’s refining unit, said the company will begin the construction of its new Dos Bocas refinery by the end of this year with site preparations starting from June. SEEKING NEW BARRELS Pemex is looking to 20 promising new discoveries clustered around the southern rim of the Gulf of Mexico to begin to reverse more than a decade of declining production. Those fields should begin pumping new barrels by the end of this year, helped by what the company describes as speedier regulatory approvals averaging around six weeks compared with three years beginning at the end of last year. Pemex has already awarded contracts for the projects’ infrastructure needs, including platforms and pipelines, and since last month began awarding more contracts for the drilling and completion of new wells, said Hernandez. “We are in the process of bidding some other groups of wells which will be happening from March to May,” he said. Hernandez added that new streams of output should begin in April and ramp up after that, though he did not provide an estimate of how much he expects from those fields. Pemex, which saw its decades-long monopoly ended by a 2013 energy overhaul championed by the previous government, also expects to extract more from its onshore Ixachi field. Following appraisal results concluded late last year, the field is now believed to contain around 1 billion barrels of oil equivalent, Hernandez said, up from an estimate of 350 million barrels in proven, probable and possible resources when it was first announced in 2017. Hernandez said Ixachi could eventually contribute 80,000 bpd in condensates, a mix of ultra-light crude and natural gas. ($1 = 19.6650 pesos on Dec. 31)
2023-11-26T01:27:04.277712
https://example.com/article/6953
Q: Intermittent error "a specified logon does not exist" New to Powershell and scripting. I have the following script that intermittently returns the System error 1312 A specified logon does not exist. It may have already been terminated. Get-Content D:\Logbooks.txt | ForEach-Object {Invoke-Command -computername $_ -FilePath "D:\Folder\Script.ps1" if (-not$?){Write-Warning "$_ - SQL SCRIPT FAILED"} else {Write-Host "$_ - SQL SCRIPT SUCCESSFUL"-ForegroundColor "Green"}} I wrote that script to execute this one. net use \computername\D$ password /User:username sqlcmd -S .\SQLEXPRESS -o C:\test.txt -d database -i "\computername\D$\Folder\SQL Script.sql" I am using these to execute a SQL script on remote machines running SQL Express. All computers are running Windows 7. I also created a second admin account on the computer I am running the scripts from and using that login after the net use command. It works fine sometimes but other times I get the error from only a couple of remote computers. A: It was a network issue. I was continually running the script to test every little change. Attempting to reconnect to all the remote computers constantly was too much for our small slow network.
2024-01-07T01:27:04.277712
https://example.com/article/8234
120 B.R. 436 (1990) In re WOODSTOCK ASSOCIATES I, INC., an Illinois corporation, d/b/a Albany House, Woodstock Associates III, Inc., an Illinois corporation, d/b/a The Woodbury of Niles, Woodstock Associates II, Inc., an Illinois corporation, d/b/a The Saratoga of Evanston, Woodstock Associates IV, Inc., an Illinois corporation, d/b/a The Sherwood of Niles, Debtors. (Jointly Administered Cases) HOME SAVINGS ASSOCIATION OF KANSAS CITY, F.A., Plaintiff. v. WOODSTOCK ASSOCIATES I, INC., Woodstock Associates III, Inc., Woodstock Associates II, Inc., Woodstock Associates IV, Inc., Defendants. Bankruptcy Nos. 89 B 08919 to 89 B 08922, Adv. No. 90 A 0145. United States Bankruptcy Court, N.D. Illinois, E.D. October 24, 1990. *437 Norman Newman, Scott N. Schreiber, Much Shelist Freed Denenberg Ament & Eiger, P.C., Chicago, Ill., for debtors. Neil L. Goulden, Katten, Muchin & Zavis, Chicago, Ill., for Caremor, Inc. Ronald R. Peterson, Jay S. Geller, Jenner & Block, Chicago, Ill., for Home Sav. Ass'n of Kansas City, F.A. David E. Cohen, Cohen & Krol, Chicago, Ill., for the Unsecured Creditors Committee. MEMORANDUM OPINION JOHN H. SQUIRES, Bankruptcy Judge. This matter comes to be heard on the joint motion of the Debtors and the Committee for the Unsecured Creditors (the "Committee") for summary judgment pursuant to Federal Rule of Civil Procedure 56. In addition, Home Savings Association of Kansas City, F.A. ("Home Savings") filed a cross motion for partial summary judgment. For the reasons set forth herein, the Court having reviewed the pleadings, affidavits and the exhibits attached *438 thereto, grants in part the motion of the Debtors and the Committee for summary judgment on Counts I, II and III and denies the motion as to Count IV. Moreover, the Court hereby denies the cross motion of Home Savings for summary judgment. I. JURISDICTION AND PROCEDURE The Court has jurisdiction to entertain these motions pursuant to 28 U.S.C. § 1334 and General Rule 2.33(A) of the United States District Court for the Northern District of Illinois. These matters constitute core proceedings under 28 U.S.C. § 157(b)(2)(A), (B), (K) and (0). II. FACTS AND BACKGROUND The matters in dispute arise from the Debtors' operation of four nursing homes. The relevant history and relationships among the parties follows. Ridgeview Pavilion Realty Partnership ("Ridgeview Pavilion") owned and operated a nursing home facility in Evanston, Illinois. On August 13, 1986, Ridgeview Pavilion transferred legal title to the nursing home facility to Amalgamated Trust & Savings Bank ("Amalgamated Bank") as Trustee under Trust No. 5188. Ridgeview House Realty Partnership ("Ridgeview House") owned and operated a nursing home facility in Evanston, Illinois. On September 12, 1986, Ridgeview House transferred legal title to the nursing home facility to Amalgamated Bank as Trustee under Trust No. 5195. Golf Mill Plaza I Realty Partnership ("Golf Mill I") owned and operated a nursing home facility in Niles, Illinois. On September 12, 1986, Golf Mill I transferred legal title to the nursing home facility to Amalgamated Bank as Trustee under Trust No. 5196. Golf Mill Plaza II Realty Partnership ("Golf Mill II") owned and operated a nursing home facility in Niles, Illinois. On September 12, 1986, Golf Mill II transferred legal title to the nursing home facility to Amalgamated Bank as Trustee under Trust No. 5197. On September 25, 1986, Amalgamated Bank as Trustee under said Trusts executed two promissory notes in favor of Home Savings in the principal amounts of $5,000,000.00 and $19,500,000.00. In addition, Amalgamated Bank executed a Mortgage and Security Agreement (the "Mortgage") and a separate Assignment of Rents and Leases (the "Assignment") in favor of Home Savings to secure repayment of the notes. On January 19, 1988, Woodstock Associates, Ltd. ("Woodstock"), an Illinois corporation incorporated on December 31, 1987, as lessee, entered into a lease (the "Lease") with Golf Mill I, Golf Mill II, Ridgeview House and Ridgeview Pavilion, the sole beneficiaries under Amalgamated Bank Trust Nos. 5196, 5197, 5195 and 5188 as lessor to lease all four nursing home facilities and all the fixtures and equipment contained therein. The Lease was for a ten year period, subject to certain rights to terminate the Lease at an earlier time. Paragraph 24.1 of the Lease contained language granting a security interest in Woodstock's accounts receivable to secure the rent payable under the Lease. The Lease was never recorded with the Cook County Recorder of Deeds. On January 19, 1988, Woodstock entered into four separate unrecorded Subleases (the "Subleases") with the Debtors. The Subleases were also for a term of ten years, subject to rights to terminate upon sixty days notice. Collectively, the Debtors are four separate Illinois corporations, incorporated on January 19, 1988. The Debtors and Woodstock have common officers and directors. Thereafter, on June 7, 1988, the Debtors as subtenants, Woodstock as the tenant under the Lease, Home Savings as beneficiary, and Golf Mill I, Golf Mill II, Ridgeview Pavilion and Ridgeview House (hereinafter collectively referred to as either the "Trust Beneficiaries" or the "Lessor") entered into a Non-Disturbance, Attornment, Estoppel and Subordination Agreement (the "Attornment Agreement"). The Attornment Agreement provided that Home Savings would attorn to the Lessor's rights under the Lease upon certain terms and conditions. Pursuant to the Attornment Agreement, upon the Lessor's default under the existing Mortgage, Woodstock and the Debtors were required to pay the rentals *439 reserved under the Lease and Subleases to Home Savings. The Attornment Agreement expressly incorporated the Lease and was recorded on September 2, 1988. By letter dated October 17, 1988, Jack Ehrenhaus, one of the Trust Beneficiaries' partners, directed Woodstock to make all future rent payments under the Lease to the order of Home Savings. In accordance with the letter, Home Savings thereafter received three rental payments in the aggregate amount of $390,000.00. On January 27, 1989, Woodstock notified the Trust Beneficiaries and Home Savings' counsel, in writing, of its intent to terminate the Lease within ninety days pursuant to Article XXI, paragraph 21.8 thereof. The Debtors assert that they then received proper sixty day notices from Woodstock to terminate the Subleases, effective on April 27, 1989. Thereafter, on February 16, 1989, Home Savings filed a complaint in the Circuit Court of Cook County, Illinois (Case No. 88 CH 5219) to foreclose the Mortgage. Subsequently, on March 10, 1989, Home Savings filed a verified petition for appointment of a receiver to replace the Debtors as the operators of the nursing home facilities pursuant to the Illinois Mortgage Foreclosure Law, rather than under the Nursing Home Care Act.[1] On April 26, 1989, Judge Arthur L. Dunne denied the petition. Judge Dunne stated that he was unwilling[2] "to be adventurous and act in contravention of the plain language of the statute." However, he stated that he could consider the appointment of a receiver "at the behest of the State." On April 27, 1989, the State of Illinois filed a petition in the Circuit Court of Cook County, Illinois, (Case No. 89 CH 3415) to place the four nursing home facilities under the control of a receiver pursuant to the Nursing Home Care Act. That day, Judge Robert L. Sklodowski appointed Caremor, Inc. ("Caremor") to act as receiver. On February 21, 1990, Judge Dunne entered an order in the foreclosure action confirming the foreclosure sale and the Uniform Commercial Code sale, conducted pursuant to the case, and entered a deficiency judgment in favor of Home Savings and against Amalgamated Bank as Trustee in the amount of $7,389,095.78. Subsequent to April 27, 1989, both Caremor and the Debtors collected medicaid reimbursements from the State of Illinois. Those medicaid reimbursements collected by Caremor, however, were insufficient to fund the operating expenses of the nursing homes facilities during the period of Caremor's receivership. As a result, Home Savings subsequently advanced funds to Caremor and refrained from collecting rent, which resulted in a claim in excess of $3.4 million for rent and real estate tax payments. Home Savings asserts that it has advanced over $4.5 million to maintain the facilities. On May 26, 1989, the Debtors filed voluntary Chapter 11 petitions. The Debtors formerly operated the four nursing home facilities, but their operations were supplanted pre-petition upon Caremor's appointment as receiver. The Debtors are currently acting as debtors-in-possession pursuant to 11 U.S.C. §§ 1107 and 1108. The cases are being jointly administered. Substantially all of the assets available for distribution from the Debtors' estates in the approximate amount of $779,824.00 plus interest, constitute medicaid reimbursements from the State of Illinois for the care of the elderly and disabled residents of the nursing homes for the pre-receivership, pre-petition period ending April 26, 1989. These medicaid reimbursements are the subject of the instant dispute.[3] *440 The Debtors filed a joint liquidating plan of reorganization and a disclosure statement. The Court approved the Debtors' second amended disclosure statement and set a hearing on confirmation of the plan on March 26, 1990. On that date, the Court continued the hearing on confirmation generally, pending the outcome of the motions at bar. On March 7, 1990, Home Savings filed this adversary proceeding against the Debtors. The four count complaint is premised on the theory that Home Savings succeeded to the Lessor's interests by virtue of the Attornment Agreement. Count I seeks a declaration that Home Savings has a valid and perfected first priority lien on the Debtors' pre-petition medicaid reimbursements as part of their accounts receivable pursuant to the Attornment Agreement and the Assignment entered into between the Lessor and Home Savings. In Count II, Home Savings seeks an administrative claim pursuant to 11 U.S.C. § 503(b) for the deficiency in rent that was owed by Caremor while it operated the nursing home facilities post-petition as receiver. Count III seeks an administrative claim under section 503(b) for reimbursement of amounts paid by Home Savings including payroll, taxes and repairs to operate the nursing home facilities post-petition. Counts II and III assert that the Debtors are liable for such items under various provisions of the Nursing Home Care Act as "owners", notwithstanding the pre-petition appointment of Caremor as receiver. Finally, Count IV objects to confirmation of the Debtors' plan of reorganization. Subsequently, on April 12, 1990, the Debtors filed a joint motion for summary judgment. Thereafter, on June 6, 1990, Home Savings filed a cross motion for summary judgment. Responses and replies thereto were filed by each party. In addition, the requisite Local Rule 12 statements were filed. The matter was then taken under advisement on July 12, 1990. III. ARGUMENTS OF THE PARTIES The joint motion for summary judgment seeks relief in favor of the Debtors on all four counts of the complaint. The Debtors argue that the Attornment Agreement does not provide Home Savings with a security interest in the Debtors' accounts receivables, and thus, Home Savings holds no secured position in the subject medicaid reimbursements. Moreover, the Debtors deny that they are alter egos and mere instrumentalities of Woodstock. Furthermore, the Debtors contend that Home Savings is not entitled to any administrative claim because neither the Subleases nor any interest in the nursing home facilities were part of the Debtors' estates as of the date the Chapter 11 petitions were filed. Additionally, the Debtors argue with respect to the plan of reorganization that it follows the congressionally mandated liquidation distribution scheme, and thus, Home Savings' objections to confirmation lack merit. In the cross motion for summary judgment, Home Savings seeks a determination that it properly perfected the Assignment; that the medicaid reimbursements received by the Debtors are subject to that Assignment; that the Debtors remain liable for post-petition operating deficiencies incurred by Caremor; and that Home Savings is entitled to allowance of an administrative claim for its post-petition maintenance of the nursing home facilities. Home Savings alleges that the joint motion for summary judgment should be denied as there are genuine issues as to material facts. Home Savings claims that those facts are as follows: the Debtors are alter egos and mere instrumentalities of Woodstock and are not separate corporations; the plan of reorganization fails to comply with the applicable provisions of the Bankruptcy Code; and the plan of reorganization was not proposed in good faith, as it is an alleged tax avoidance scheme. Home Savings effectively denies termination of the Subleases. *441 Home Savings further denies that the purported termination of the Subleases extinguished the Debtors' respective alleged liabilities under the Nursing Home Care Act. The Debtors deny that the Attornment Agreement conveyed to Home Savings any security interest in their accounts receivable, but conveyed only interests in Woodstock's rents and receivables inter alia to Home Savings. The Debtors further deny liability for the deficit receivership operations of Caremor or liability for the allegedly owing, but unpaid rents and other expenses claimed by Home Savings. The Debtors assert that advances made by Home Savings during Caremor's receivership were expended to protect its collateral and not the property of the Debtors' estates. IV. STANDARDS FOR SUMMARY JUDGMENT In order to prevail on a motion for summary judgment, the movant must meet the statutory criteria set forth in Rule 56 of the Federal Rules of Civil Procedure, made applicable to adversary proceedings by Federal Rule of Bankruptcy Procedure 7056. Rule 56(c) reads in part: [T]he judgment sought shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law. Fed.R.Civ.P. 56(c); see also Donald v. Polk County, 836 F.2d 376, 378-379 (7th Cir. 1988). In 1986, the Supreme Court decided a trilogy of cases which encourage the use of summary judgment as a means to dispose of factually unsupported claims. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Celotex Corp. v. Catrett, 477 U.S. 317, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Matsushita Electric Industrial Co. v. Zenith Radio Corp., 475 U.S. 574, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). "The primary purpose for granting a summary judgment motion is to avoid unnecessary trials when there is no genuine issue of material fact in dispute." Farries v. Stanadyne/Chicago Div., 832 F.2d 374, 378 (7th Cir.1987) (quoting Wainwright Bank & Trust Co. v. Railroadmens Federal Sav. & Loan Ass'n, 806 F.2d 146, 149 (7th Cir.1986)). The burden is on the moving party to show that no genuine issue of material fact is in dispute. Anderson, 477 U.S. at 256, 106 S.Ct. at 2514; Celotex, 477 U.S. at 322, 106 S.Ct. at 2552; Matsushita, 475 U.S. at 585-586, 106 S.Ct. at 1355-1356. There is no genuine issue for trial if the record, taken as a whole, does not lead a rational trier of fact to find for the non-moving party. Matsushita, 475 U.S. at 587, 106 S.Ct. at 1356. However, "[i]f the evidence is merely colorable or is not significantly probative, summary judgment may be granted." Anderson, 477 U.S. at 249-250, 106 S.Ct. at 2510-2511; see also Valley Liquors, Inc. v. Renfield Importers, Ltd., 822 F.2d 656, 659 (7th Cir.1987), cert. denied, 484 U.S. 977, 108 S.Ct. 488, 98 L.Ed.2d 486 (1987). Once the motion is supported by a prima facie showing that the moving party is entitled to judgment as a matter of law, a party opposing the motion may not rest upon the mere allegations or denials in its pleadings, rather its response must show that there is a genuine issue for trial. Anderson, 477 U.S. at 248, 106 S.Ct. at 2510; Celotex, 477 U.S. at 323, 106 S.Ct. at 2552; Matsushita, 475 U.S. at 587, 106 S.Ct. at 1356. Moreover, all reasonable inferences to be drawn from the underlying facts must be viewed in a light most favorable to the party opposing the motion. Davis v. City of Chicago, 841 F.2d 186, 189 (7th Cir.1988); Marine Bank, Nat. Ass'n v. Meat Counter, Inc., 826 F.2d 1577, 1579 (7th Cir.1987); DeValk Lincoln Mercury, Inc. v. Ford Motor Co., 811 F.2d 326, 329 (7th Cir.1987); Bartman v. Allis-Chalmers Corp., 799 F.2d 311, 312 (7th Cir. 1986), cert. denied, 479 U.S. 1092, 107 S.Ct. 1304, 94 L.Ed.2d 160 (1987); In re Calisoff, 92 B.R. 346, 350-351 (Bankr.N.D.Ill.1988). Furthermore, the existence of a material factual dispute is sufficient only if the disputed fact is determinative of the outcome under the applicable law. Donald v. Polk *442 County, 836 F.2d at 379; Wallace v. Greer, 821 F.2d 1274, 1276 (7th Cir.1987); Egger v. Phillips, 710 F.2d 292, 296 (7th Cir.1983) (en banc), cert. denied, 464 U.S. 918, 104 S.Ct. 284, 78 L.Ed.2d 262 (1983). The parties have filed cross motions for summary judgment. Each motion must be ruled on independently and all motions must be denied if there are genuine issues of material fact. ITT Industrial Credit Co. v. D.S. America, Inc., 674 F.Supp. 1330, 1331 (N.D.Ill.1987). Rule 12 of the General Rules of the United States District Court for the Northern District of Illinois adopted by General Order of the Bankruptcy Court on May 6, 1986, requires that the party moving for summary judgment file a detailed statement of material facts as to which they contend there is no genuine issue. Rule 12 also requires that the party opposing the motion file a statement of material facts as to which there is a genuine issue. If the Rule 12 statement fails to deny the facts set forth in the movant's statement, those facts will be deemed admitted. In the case at bar, each party has filed its requisite Rule 12 statements. V. DISCUSSION 1. COUNT I Pursuant to Count I of the complaint, Home Savings seeks a determination that it possesses a valid and perfected first priority lien on the Debtors' pre-petition accounts receivable which include the collected medicaid reimbursements. In order to reach this conclusion, the Court must find, as Home Savings has conceded: (1) that the medicaid reimbursements constitute rents; (2) that Home Savings properly perfected the Assignment; and (3) that the Debtors are alter egos and mere instrumentalities of Woodstock. A. ARE THE MEDICAID PAYMENTS RENTS OR ACCOUNTS RECEIVABLE AND DID THE DEBTORS CONVEY INTERESTS THEREIN TO HOME SAVINGS The initial threshold issue is whether the medicaid reimbursements are rents derived from real property, subject to the Assignment, the Lease and the Attornment Agreement in favor of Home Savings, or whether they are more in the nature of general intangible personal property interests in which Home Savings has no perfected position. Home Savings argues that the Attornment Agreement references the Assignment and the Lease. These instruments allegedly encompass the medicaid payments. Home Savings relies on paragraph 3 of the Attornment Agreement which provides that: If the interests of Landlord [the Trust Beneficiaries] shall be transferred to and/or owned by Beneficiary [Home Savings] by reason of judicial foreclosure, power-of-sale foreclosure or other proceedings brought by it, or by any other manner, including but not limited to Beneficiary's exercise of its rights under any assignment(s) of leases and rents, and Beneficiary succeeds to the interest of the Landlord under the Lease, Tenant [Woodstock and the Debtors] shall be bound to Beneficiary under all of the terms, covenants and conditions of the Lease for the balance of the remaining term thereof and any extension thereof duly exercised by Tenant with the same force and effect as if Beneficiary were the Landlord under the Lease, and Tenant does hereby attorn to Beneficiary as its landlord, said attornment to be effective and self-operative without the execution of any further instrument on the part of any of the parties hereto immediately upon Beneficiary's succeeding to the interest of the Landlord under the Lease. The respective rights and obligation of Tenant and Beneficiary upon such attornment, to the extent of the then remaining balance of the term of the Lease and any such extension, shall be and are the same as now set forth therein (unless otherwise modified by this Agreement), it being the intention of the parties hereto for this purpose to incorporate the Lease in this Agreement by reference with the same force and effect as if set forth at length herein. In *443 the event of a conflict between the terms and provisions of the Lease and the terms of this Agreement, the terms of this Agreement shall control, and the Lease shall be deemed to have been modified in accordance herewith. Central to Home Savings' argument is its contention that the medicaid reimbursements were nothing more than rental payments made on behalf of the nursing home residents to pay for the beds and living space they occupied. A separately recorded Assignment was given to Home Savings by the Trust Beneficiaries as Lessor. This instrument secured rents reserved under the unrecorded Lease to which Woodstock was a party as lessee. The Lease in turn at Article XXIV, paragraph 24.1 thereof, gives the Lessor a security interest in "the accounts receivable of lessee [Woodstock]" and coupled with the Assignment, gives the Lessor an assignment of rents subject to the right of Woodstock to collect rents as long as Woodstock was not in default under the Lease. Neither the Assignment nor the Lease were executed by the Debtors. Moreover, neither instrument included as part of the collateral securing the Lease payments any of the medicaid payments or other accounts receivable owed to the Debtors, who were subtenants of Woodstock. There is no reference to medicaid payments or other accounts receivable owed to the Debtors in either document by which they granted to Home Savings any interest in the subject medicaid reimbursements. In fact, the Mortgage held by Home Savings specifically excluded from the referenced Assignment the "underlying patients' leases or agreements." (Mortgage p. 8, para. 8). The receivables and rents as to which the Lessor received an assignment, subsequently conveyed to Home Savings, were those of Woodstock as lessee pursuant to paragraph 24.1 of the Lease and not those of the Debtors as sublessees. Hence, standing in the Lessor's shoes, Home Savings was not granted a security interest in the medicaid payments collected by the Debtors, only Woodstock's accounts receivable. The Debtors' execution of the Attornment Agreement is not sufficient to convey any interest therein as required under Illinois real property law. An assignor cannot convey any greater title or interest than he had in the assignment. Angelina County Lumber Co. v. Michigan Central Railroad Co., 252 Ill.App. 82, 89 (1929). An assignee acquires only the title and rights of the assignor. Town & Country Bank v. James M. Canfield Contracting Co., 55 Ill.App.3d 91, 12 Ill.Dec. 826, 370 N.E.2d 630 (4th Dist.1977).[4] If the funds are considered personal property, critically fatal to Home Savings' argument is the lack of any written security agreement and filed financing statement signed by the Debtors covering the medicaid reimbursements owing to the Debtors as required by Ill.Rev.Stat. ch. 26, paras. 9-201, 9-203, 9-204, 9-302, 9-303, and 9-306 (1989). From the documents furnished, the Debtors never expressly or impliedly granted Home Savings a security interest as required by paragraph 9-203(1) in their account receivables, as defined by paragraph 9-106. At best, Home Savings argues that when the Debtors signed the Attornment Agreement which referenced the Lease, they therefore impliedly granted a security interest in their receivables as Woodstock expressly did under paragraph 24.1 of the Lease. The Court will not impliedly find such a security interest granted by the Debtors as a result of the mere execution of the Attornment Agreement. Even this tenuous construction fails because none of the Debtors executed a financing statement filed at any time perfecting such a security interest in favor of Home Savings. Rent is defined in Black's Law Dictionary as: "[c]onsideration paid for use or occupation of property. . . . Compensation or return of value given at stated times for the possession of lands and tenements corporeal." If the medicaid payments constitute rents payable under a lease of real estate, they are expressly excluded from *444 the scope of Article 9 of the Uniform Commercial Code. Ill.Rev.Stat. ch. 26, para. 9-104(j). See generally Clark, The Law of Secured Transactions Under the Uniform Commercial Code, ¶ 1.8[10][b] (1980 and 1988 Cum.Supp.) (collecting cases and noting that a prudent lender will take no chances and perfect an assignment of rents under local real estate law and Article 9); see also 2 J. White and R. Summers, Uniform Commercial Code, §§ 23-7 and 23-8 (3d ed. 1988 and 1990 Supp.). Under Illinois law, the rents and profits derived from the use of mortgaged real property are an incident of the equity of redemption and belong to the mortgagor until the mortgagee has taken affirmative steps to enforce his rights in such respect. See generally 27 Illinois Law and Practice, Mortgages, § 117-120 (1956 and 1990 Supp.). No evidence has been furnished the Court, however, that the medicaid reimbursements received by the Debtors are truly in the nature of compensation paid for patient use and occupancy of the underlying real estate, subject to the Mortgage, the Assignment, the Attornment Agreement and leasehold interests assigned to Home Savings under which the Debtors were subtenants. By contrast, paragraph 9-106 of the Illinois version of the Uniform Commercial Code defines "account" as any right to payment for services rendered, which is included within that section's definition of a "general intangible", a personal property interest. The Debtors' rights to receive medicaid reimbursement payments from the State of Illinois for the various nursing home services rendered to patients, seems more in the nature of a personal property right constituting "accounts receivable" in the nature of "general intangibles", rather than interests in real property constituting rentals received from use and occupancy of an estate or interest in real property. No showing has been made that either the residents of the nursing homes (or for that matter the State of Illinois) had any subsubtenancies in the real property leased by the Debtors. Thus, the medicaid reimbursements owed by the State of Illinois to the Debtors appear more properly characterized as personal property and subject to the requirements of Article 9, rather than appropriately considered as real estate rentals. This conclusion is buttressed by a recent decision discussing the current manner in which state agencies administering medicaid reimbursement programs contract with nursing homes who supply the services to eligible medicaid recipient patients. In In re Wayne Manor, Inc., 117 B.R. 12 (D.Mass.1990) the district court in Massachusetts explained how the medicaid system works: The plaintiff is a nursing home participating in the Medicaid program. Under the Medicaid system, the defendant Department of Public Welfare (DPW) pays funds to nursing homes based on an interim rate established by the Rate Setting Commission. At the end of any given year, a final rate is established for each participating nursing home. If the final rate is lower than the interim rate at which funds were paid out, then the nursing home owes the difference to the DPW. Conversely, if the final rate is higher than the interim rate, then the DPW owes the nursing home the difference. Id. at 13. Hence, Wayne Manor appears to summarize the way in which the medicaid reimbursement program presently functions, at least in Massachusetts. It does not appear to involve, depend on, or relate to conveyance of interests in real property from participating nursing homes to either the administering state agency disbursing the funds or the patient recipients who receive nursing home services for which the payments from the agency pay in whole or in part. The "medicaid program" is the popular name of Title XIX of the Social Security Act. See 42 U.S.C. § 1396 et seq. The medicaid program, enacted in 1965, provides federal grants to the states to furnish medical assistance to families with dependent children and to the aged, blind or permanently disabled, whose income and resources *445 are insufficient to meet the costs of necessary medical services. The medicaid program also furnishes rehabilitation and other services to help the eligible participants to attain or retain the capability for independence or self-care. Unlike the medicare program, which is a joint federal-state program, the states have considerable latitude in determining the eligibility requirements and the scope of services provided. Medicaid assistance in the form of direct payments to suppliers of medical care and services is thus provided by the respective states, with federal financial participation for eligible recipients. The states participating under the medicaid program must provide certain inpatient and out patient hospital services, laboratory services, skilled nursing home care and various other related medical services. A participating state medicaid plan under prescribed rules must specify the amount and duration of each item of the medical and remedial care and services that will be provided to the eligible patients. The statute provides a comprehensive list of the services and sets forth the minimum requirements that a state must meet, and those that a state may include under a medicaid plan. 42 U.S.C. § 1396a. The items of services include skilled nursing facility services, among other related medical, dental and clinical services. A state medicaid plan must provide, inter alia, for the establishment or designation of a state authority to be responsible for establishing and maintaining standards for private or public institutions in which recipients of medicaid assistance under the state plan receive care or services. 42 U.S.C. § 1396a(a)(9). Furthermore, it must provide for certain levels of duration and assistance to eligible recipients. 42 U.S.C. § 1396a(a)(10). Moreover, medical assistance must include reasonable eligibility standards. 42 U.S.C. § 1396a(a)(17). Additionally, it must also provide that any skilled nursing facility which receives payments under the state plan must satisfy various requirements. 42 U.S.C. § 1396a(a)(28) and § 1395x(j). The state plan must include a program which sets forth requirements for licensing of administrators of nursing homes. 42 U.S.C. § 1396g.[5] Consequently, the payments from the State of Illinois to the Debtors pursuant to the State's medicaid reimbursement plan more closely correspond to the definition of "accounts" and "general intangibles" under the Illinois version of the UCC, rather than "rents" for use and occupancy of real property. Home Savings cites and relies upon one decision which characterized medicaid reimbursements to a nursing home as rents. In In re Flower City Nursing Home, Inc., 38 B.R. 642 (Bankr.W.D.N.Y.1984), the court found that medicaid reimbursement were rents which were subject to the mortgagee's assignment of rents. The mortgagee commenced a foreclosure action and obtained the appointment of a receiver. On the next day, a bankruptcy petition was filed. The bankruptcy court enjoined and restrained the continuation of the foreclosure action and restrained the receiver from taking possession. The debtor-in-possession failed to comply with a compromise of stay litigation and subsequently the bankruptcy trustee entered into an agreement with the New York State Department of Health pursuant to which a receiver was appointed to operate the nursing home facility. The receiver collected medicaid reimbursements, to which both the bankruptcy trustee and the mortgagee claimed an interest. The Flower City court stated with respect to the medicaid reimbursements: These funds were reimbursement for the use and occupation of the realty and not for the daily operation of the nursing home business. Generally, rents and profits are income generated from the occupation or use of the realty and not income generated from general business operations. (citation omitted). 38 B.R. at 644. The court concluded that the medicaid reimbursements constituted rent which was subject to the mortgagee's security documents. The Flower City case is not dispositive *446 on the issue of whether the instant medicaid reimbursements constitute rent. The parties in that case "agreed the funds on hand are reimbursement for capital rather than operating costs." Id. at 643. Such factor appears to be critical and outcome determinative of that case. No such agreement is present between the Debtors and Caremor or the Debtors and the State of Illinois. Accordingly, Flower City does not stand for the proposition that all medicaid reimbursements are rent. Moreover, Flower City was decided under the former Bankruptcy Act and its holding is based upon New York real property law, and therefore is not controlling here. Thus, in the final analysis, if the medicaid reimbursements are characterized as real property rentals, the record is devoid of any evidence by which the Debtors clearly conveyed any interest in same to Home Savings to secure the leasehold payments owed by Woodstock. If, on the other hand, the medicaid reimbursements are more appropriately characterized as personal property interests in the nature of accounts receivable, there is no written security agreement executed by the Debtors in Home Savings' favor, nor any filed financing statement perfecting a security interest in same by Home Savings. Either way, Home Savings loses on this issue. B. HOME SAVINGS FAILED TO PERFECT THE ASSIGNMENT OF RENTS The next issue is whether Home Savings perfected its lien on the rents under the terms of the Mortgage, the other security instruments and Illinois law. Illinois law allows a mortgagee to take collateral security in rents. However, in order to be entitled to the rents, the mortgagee must obtain possession of the property or the appointment of a receiver. See Ill.Rev. Stat. ch. 110, paras. 15-1215, 15-1702(b) and 15-1704; see also Taylor v. Osman, 239 Ill.App. 569, 574 (1926); Freedman's Saving & Trust Co. v. Shepherd, 127 U.S. 494, 502-503, 8 S.Ct. 1250, 1254, 32 L.Ed. 163 (1988) ("the mortgagee is not entitled to the rents and profits of the mortgaged premises until he takes actual possession, or until actual possession is taken, in his behalf, by a receiver . . . or until, in proper form, he demands and is refused possession"). Once a mortgagee has obtained possession of the property or appointment of a receiver, he is entitled to future rents. Under the current Illinois Mortgage Foreclosure Law, a mortgagee shall be entitled to designate the receiver (paragraph 15-1702(b)); the receiver so appointed shall have possession of the mortgaged real estate (paragraph 15-1704(b)), and the power to collect the rents, issues, and profits from the mortgaged real estate (paragraph 15-1704(b)(2)). When a bankruptcy petition is filed, a secured creditor's interest is limited to his interest in the debtor's property on the date of the filing. Section 552(a) of the Bankruptcy Code cuts off the effect of after-acquired property clauses contained in security documents. Section 552(b) provides as an exception, a security interest in proceeds, profits and rents of secured property continues in effect to the extent that the security document and applicable non-bankruptcy law allow. Sections 552 and 546(b) potentially support the position that Home Savings has a perfected security interest in rents owed by Woodstock as lessee to its Lessor. Section 552(b) provides as follows: Except as provided in section 363, 506(c), 522, 544, 545, 547, and 548 of this title, if the debtor and an entity entered into a security agreement before the commencement of the case and if the security interest created by such security agreement extends to property of the debtor acquired before the commencement of the case and to proceeds, product, offspring, rents, or profits of such property, then such security interest extends to such proceeds, product, offspring, rents, or profits acquired by the estate after the commencement of the case to the extent provided by such security agreement and by applicable non-bankruptcy law, except to any extent that the court, after notice and a hearing and based on the equities of the case, orders otherwise. 11 U.S.C. § 552(b). Notwithstanding Illinois law, section 546(b) permits perfection of certain liens by *447 lesser means where the automatic stay would prevent the usual manner of perfecting a lien. Section 546(b) provides in relevant part: The rights and powers of a trustee . . . are subject to any generally applicable law that permits perfection of an interest in property to be effective against an entity that acquires rights in such property before the date of such perfection. If such law requires seizure of such property or commencement of an action to accomplish such perfection, and such property has not been seized or such action has not been commenced before the date of the filing of the petition, such interest in such property shall be perfected by notice within the time fixed by such law for such seizure or commencement. 11 U.S.C. § 546(b). The purpose of the subsection is to protect those whom state law protects by allowing them to perfect their liens or interests as of an effective date that is earlier than the date of perfection. It is not designed to give the states an opportunity to enact disguised priorities in the form of liens that apply only in bankruptcy cases. H.R.Rep. No. 595, 95th Cong., 1st Sess. 371 (1977), U.S.Code Cong. & Admin.News, p. 6327; S.Rep. No. 989, 95th Cong., 2d Sess. 86 (1978), U.S.Code Cong. & Admin.News, p. 5872. The Bankruptcy Code has changed the manner in which security interests can be perfected post-petition. Although non-bankruptcy law is vital, the second sentence of section 546(b) modifies applicable nonbankruptcy law to the extent that if an inchoate lien may be perfected as against prior lien holders and seizure or possession is required for perfection, notice of the intent to seize or gain possession is sufficient. For section 546(b) to be applicable, state law must provide that perfection relates back to a pre-petition event. See In re Westport-Sandpiper Ass'n Ltd., 116 B.R. 355, 358 (Bankr.D.Conn.1990) (collecting cases and noting that the applicable state law must specifically authorize the relation back). This follows the principle that bankruptcy courts first look to applicable state law to determine interests in property and the perfection of claimed liens, security interest or other encumbrances therein. See, e.g., Butner v. United States, 440 U.S. 48, 54, 99 S.Ct. 914, 917, 59 L.Ed.2d 136 (1979); In re Brass Kettle Restaurant, Inc., 790 F.2d 574, 575 (7th Cir.1986); In re Kaiser, 791 F.2d 73, 74 (7th Cir.1986), cert. denied, 479 U.S. 1011, 107 S.Ct. 655, 93 L.Ed.2d 710 (1986); In re K & L, Ltd., 741 F.2d 1023, 1030 n. 7 (7th Cir.1984). The majority of courts that have addressed the issue of whether section 546(b) may be used to perfect an interest in post-petition rents have answered in the affirmative. In re Gelwicks, 81 B.R. 445 (Bankr. N.D.Ill.1987) (a motion for relief from the automatic stay was sufficient); In re Village Properties, Ltd., 723 F.2d 441 (5th Cir.1984), cert. denied, 466 U.S. 974, 104 S.Ct. 2350, 80 L.Ed.2d 823 (1984) (relief from the automatic stay to begin foreclosure proceedings was sufficient); In re National Real Estate Ltd. Partnership-II, 104 B.R. 968 (Bankr.E.D.Wis.1989) (notice of claim to rents sufficient); In re Rief, 83 B.R. 626 (Bankr.S.D.Iowa 1988) (application for sequestration of rents and profits deemed adequate notice); In re Morning Star Ranch Resorts, 64 B.R. 818 (Bankr.D. Colo.1986) (a complaint to prohibit use of the rents was proper notice); In re Sampson, 57 B.R. 304 (Bankr.E.D.Tenn.1986) (a complaint to determine the validity of a lien in rents was deemed proper notice); In re Fluge, 57 B.R. 451 (Bankr.D.N.D.1985) (an objection to the trustee's notice of intent to lease the property was sufficient). Home Savings makes no assertion that it gave pre-petition notice pursuant to section 546 of its intention to perfect its security interest in rents. It was not until the filing of the present action that Home Savings effectively gave notice in these bankruptcy proceedings, long after the Debtors' collection of the medicaid funds. Late perfection under section 546 does not give a creditor any rights over amounts collected prior to the late perfection. In re Southern Gardens, Inc., 39 B.R. 671 (Bankr.S.D.Ill.1982) (secured creditor found entitled to post-petition rents, but only after time of demand *448 for sequestration). Consequently, the filing of this adversary proceeding is insufficient, standing alone, to perfect the security interest in the funds collected post-petition by the Debtors. Instead, Home Savings claims that its pre-petition action in asking for a receiver in the state court proceedings was sufficient to perfect the Assignment from Woodstock under paragraph 24.2 of the Lease. Several courts have discussed the type of affirmative action that must be taken by a mortgagee to perfect an assignment of rents when the mortgagor has filed a bankruptcy petition. In a leading case under the former Bankruptcy Act, Judge Merrick stated in In re Michigan Avenue Nat. Bank, 2 B.R. 171 (Bankr.N.D. Ill.1980): We hold that the Illinois law is, and for some time has been, that the mortgagee must be in actual possession in order to be entitled to rents.62 62. As used here actual possession is intended to include actual possession by the mortgagee and any of his agents as well as a receiver appointed with power to collect rents. This possession would commence with the entry of an appropriate order of court and would not be dependent upon physical presence on the premises. 2 B.R. at 185. Judge Merrick held that a mortgagee with an interest in property would have to obtain relief from the automatic stay and obtain possession of the realty before he would be entitled to rents. In addition, the court in Gelwicks, stated, "in order to be entitled to the rents, the mortgagee must obtain possession of the property or the appointment of a receiver." (citation omitted). Id. at 447. The Gelwicks court went on to further note, "[i]n this case, Illinois law requires either actual possession or actual appointment of a receiver to perfect a security interest in rents. Therefore, pursuant to Section 546(b), a mortgagee may perfect a security interest in rents, post-petition, by giving proper notice." Id. at 448. The Gelwicks court found that the secured creditor was entitled to all rents collected from property after the date its post-petition motion for relief from the automatic stay was filed. In De Kalb Bank v. Purdy, 166 Ill.App.3d 709, 117 Ill.Dec. 606, 520 N.E.2d 957 (2d Dist.1988) the court held that a mortgagee is not entitled to rents until he takes actual possession of the property or until possession is taken on his behalf by a receiver. Id. at 715, 117 Ill.Dec. 606, 520 N.E.2d 957. Home Savings contends that the Nursing Home Care Act created a statutory obstruction to its petition for the appointment of a receiver, and therefore its request for a receiver constituted "affirmative action" sufficient under section 546(b) to perfect the Assignment. It analogizes its steps taken to those of a mortgagee who files a motion for relief from the stay or for sequestration of cash collateral. Home Savings commenced the foreclosure action on February 16, 1989, and sought appointment of a receiver prior to the date of the filing of the bankruptcy petition. However, Home Savings' request for the appointment of a receiver under the Illinois Mortgage Foreclosure Law was denied. Home Savings confuses the post-petition actions which would otherwise perfect an inchoate lien pursuant to section 546 and the pre-petition actions necessary to perfect an assignment of rents under Illinois law, in conjunction with its foreclosure action. For the period prior to the filing of a bankruptcy case, Illinois law clearly requires the appointment of a receiver on the mortgagee's behalf, or that the mortgagee be in actual possession of the mortgaged property in order to perfect an assignment of rents. Taylor, 239 Ill.App. at 574; Gelwicks, 81 B.R. at 445; Southern Gardens, 39 B.R. at 673. Michigan Avenue National Bank, 2 B.R. at 185. Home Savings had the opportunity pre-petition to perfect the Assignment and failed to do so when it unsuccessfully attempted to have a receiver appointed. Caremor was appointed receiver in a separate action for the protection of the nursing home residents, not for Home Savings' benefit to collect rents from the subject real property to reduce its indebtedness. The Court will not allow *449 Home Savings to bootstrap itself to a perfected secured status by claiming that its unsuccessful pre-petition attempt to perfect the Assignment constituted the requisite incident to perfect same. Similarly, its post-petition actions in filing the instant adversary proceeding long after the Debtors collected the funds are equally unavailing. Accordingly, the Court finds that Home Savings failed to timely perfect the Assignment. C. THE DEBTORS HAVE NOT BEEN SHOWN TO BE ALTER EGOS OF WOODSTOCK Home Savings concedes that it must also demonstrate that the Debtors and Woodstock are alter egos in order to prevail on Count I. The Seventh Circuit has articulated a two-part test to determine whether a court should pierce a corporate veil and disregard that corporation's separate legal identity: Generally, before the separate corporate identity of one corporation will be disregarded and treated as the alter ego of another, it must be shown that it is so controlled and its affairs so conducted that it is a mere instrumentality of another, and it must further appear that observance of the fiction of separate existence would, under the circumstances, sanction a fraud or promote injustice. Van Dorn Co. v. Future Chemical & Oil Corp., 753 F.2d 565, 570 (7th Cir.1985) (quoting Main Bank of Chicago v. Baker, 86 Ill.2d 188, 205, 56 Ill.Dec. 14, 427 N.E.2d 94 (1981)). Application of this two-prong test includes consideration of other factors such as: (1) whether the corporations have maintained adequate corporate records and complied with corporate formalities; (2) whether the corporations have commingled funds or assets; (3) whether one of the corporations was undercapitalized; and (4) whether one of the corporations treated the other's assets as its own. Id. Notwithstanding its cross motion for summary judgment, Home Savings contends that summary judgment is not appropriate for the determination of such alter ego theory, as the Court must engage in an extensive factual analysis in determining whether to disregard a corporation's presumed separate legal identity. The Debtors, on the other hand, claim that Home Savings has failed to come forward with any evidence showing that the Debtors are alter egos and instrumentalities of Woodstock. Mere assertion of the alter ego theory alone is insufficient to elevate Home Savings to secured status with respect to the Debtors' accounts receivable. The Debtors submitted an affidavit from Melvin W. Seigel ("Seigel"), a director and the president of Woodstock and the Debtors. According to Seigel, the Debtors and Woodstock were incorporated within three weeks of one another, have identical officers and directors, but throughout their histories have had separate meetings, by-laws, minute books and bank accounts. Home Savings, on the other hand, submitted an affidavit from Clay E. Coburn ("Coburn") the vice president of Home Savings. Coburn states that he was informed that Seigel and three other individuals would operate the nursing homes. He further states he was not informed of the existence of either the Debtors or of the Subleases between the Debtors and Woodstock. Coburn conclusively states as his personal opinion that at no time has he considered Woodstock and the Debtors to be "truly independent entities." If this is the only evidence of Home Savings to support its alter ego theory, it is patently insufficient. Speculative statements are not sufficient to counter affidavits and other evidence put forward by the moving party. Zayre Corp. v. S.M. & R. Co., 882 F.2d 1145, 1151-1152 (7th Cir.1989); Pallucki v. Sears, Roebuck & Co., 879 F.2d 1568, 1572 (7th Cir.1989) ("[a] party to a lawsuit cannot ward off summary judgment with an affidavit or deposition based on rumor or conjecture"); see also 10A C. Wright, A. Miller and M. Kane, Federal Practice and Procedure, § 2739 at 521-522 (2d ed. 1983). Home Savings raised the alter ego spectre, but has failed to furnish any evidence showing that the Debtors did not maintain separate corporate records or observe corporate formalities as separate Illinois corporations. No showing of commingled *450 funds or under capitalization has been proffered. Home Savings has given no evidence of other disregard of the legal fiction of separate corporate existence for any of the Debtors that make them mere alter egos of Woodstock, or vice versa. 2. COUNTS II AND III Pursuant to Counts II and III, Home Savings asserts administrative claims against the Debtors' estates. Count II seeks recovery of an unspecified amount for the shortfall of the post-petition rent for the nursing home facilities which Caremor did not pay. Count III seeks to recover post-petition operating expenses in the sum of $2,527,000.00 Home Savings expended in maintaining those facilities. Those expenses allegedly include real estate property taxes, payroll and repairs. Home Savings relies upon 28 U.S.C. § 959 and certain provisions of the Nursing Home Care Act, namely paragraphs 4153-516(b), 4153-517 and 4151-119 in support of its claims for administrative priority. In addition, Home Savings contends that its claims are entitled to administrative expense status as a matter of public policy and under subrogation principles. Furthermore, Home Savings contends that its claim for post-petition rent is an actual, necessary cost of preserving the estate, for which the Debtors remain liable as "owners" of the nursing home facilities. Pursuant to 28 U.S.C. § 959: a trustee, receiver or manager appointed in any cause pending in any court of the United States, including a debtor in possession, shall manage and operate the property in his possession as such trustee, receiver or manager according to the requirements of the valid laws of the State in which such property is located, in the same manner that the owner or possessor thereof would be bound to do if in possession thereof. 28 U.S.C. § 959. It is uncontested and undisputed that Caremor, at all times post-petition, operated the nursing home facilities prior to the subsequent foreclosure sale. Additionally, paragraph 4153-517 of the Nursing Home Care Act provides that nothing in the Nursing Home Care Act shall be "construed to suspend during the receivership an obligation of the owner, administrator, or employee for payment of taxes or other operating and maintenance expenses of the facility nor of the owner, administrator, employee or any other person for the payment of mortgages or liens." Moreover, pursuant to paragraph 4153-516(b) thereof, "[i]f the operating funds are insufficient to cover the reasonable expenses of the receivership, the owner shall be liable for the deficiency." Paragraph 4151-119 further states that "in the event a facility is operated by a person who leases the physical plant, which is owned by another person, "owner" means the person who operates the facility. . . ." Thus, Home Savings concludes that the Debtors are therefore "owners" under the statute and accordingly liable. It is the Bankruptcy Code, however, not the Nursing Home Care Act, which establishes priorities among claimants seeking relief before the bankruptcy court. Furthermore, even uncontested liability of the Debtors under Home Savings' cited authorities and subrogation arguments would not elevate its claims to administrative priority status. Laws of the United States are the supreme law of the land, notwithstanding contrary laws of any state, under the United States Constitution, Article VI, Section 2, the supremacy clause. Pursuant to Article 1, Section 8 of the Constitution, the Congress is vested with power to establish uniform laws on the subject of bankruptcies. The Bankruptcy Code therefore controls in the event of any conflict in its provisions with that of the Nursing Home Care Act, especially in terms of priorities in payment of claims in bankruptcy cases. Pursuant to 11 U.S.C. § 503(b)(1)(A), post-petition costs and expenses of preserving the estate are allowed as administrative expenses. Section 503 provides: (b) After notice and a hearing, there shall be allowed administrative expenses, other than claims allowed under section 502(f) of this title, including — *451 (1)(A) the actual necessary costs and expenses of preserving the estate, including wages, salaries, or commissions for services rendered after the commencement of the case: . . . . 11 U.S.C. § 503(b)(1)(A). Priority statutes such as section 503 are to be strictly construed. In re Sinclair, 92 B.R. 787, 788 (Bankr.S.D.Ill.1988). The burden of proving entitlement to an administrative expense is on the claimant and the standard of proof is a preponderance of the evidence. Sinclair, 92 B.R. at 788; In re 1 Potato 2, Inc., 71 B.R. 615, 618 (Bankr.D. Minn.1987). The Seventh Circuit set forth a two-prong test for determining an administrative claim pursuant to section 503(b)(1)(A). A claim will be afforded such priority if the debt both (1) arises from a transaction with the Debtors and (2) that transaction benefited the estates in the operation of post-petition business. In re Jartran, Inc., 732 F.2d 584, 587 (7th Cir. 1984). Claims should be granted administrative priority status only if the claim comports with the language and underlying purposes of section 503. Jartran, 732 F.2d at 588; In re Chicago, Milwaukee, St. Paul & Pacific Railroad Co., 658 F.2d 1149, 1163 (7th Cir.1981), cert. denied, 455 U.S. 1000, 102 S.Ct. 1632, 71 L.Ed.2d 867 (1982) (general rule is equality of distribution; deviation must appear in the statute). In Jartran, the Seventh Circuit held that when third parties are induced to supply goods or services to the debtor, and the estate is benefited, the claims of those entities should be afforded priority so as to provide incentive to third parties to furnish credit necessary for the debtor's reorganization. It cannot be said that providing administrative priority to a pre-petition claim would further this policy. Id. at 588-589. In order to qualify as "actual" and "necessary" administrative expenses, expenditures must benefit the estate as a whole rather than just the creditor claimant. In re Jartran, Inc., 886 F.2d 859, 871 (7th Cir.1989); In re Jartran, Inc., 71 B.R. 938, 945 (Bankr.N.D.Ill.1987), aff'd, 886 F.2d 859 (7th Cir.1989); see also In re Patch Graphics, 58 B.R. 743, 746 (Bankr. W.D.Wis.1986); In re McK, Ltd., 14 B.R. 518, 520 (Bankr.D.Colo.1981). In the case of In re Subscription Television of Greater Atlanta, 789 F.2d 1530 (11th Cir.1986), the court noted that the inclusion of the words "actual" and "necessary" in section 503(b)(1) mean that the estate must accrue a real benefit from the transaction, as opposed to mere potential benefit, for administrative expense priority to be granted on claims against the estate. The use of the terms "actual" and "necessary" were not accidental, but were included to impose the requirement that the estate is actually benefitted. In re Carmichael, 109 B.R. 849, 851 (Bankr.N.D.Ill.1990). The language of section 503 continues the rule under the former Bankruptcy Act that a creditor's right to payment will be afforded priority only to the extent the estate was benefited in fact from the consideration supporting the creditor's claim. See In re Mammoth Mart, Inc., 536 F.2d 950 (1st Cir.1976); American Anthracite & Bituminous Coal Corp. v. Leonardo Arrivabene, S.A., 280 F.2d 119 (2nd Cir.1960). Creditors are presumed to act primarily in their own interests and not for the benefit of the estate as a whole, In re United States Lines, Inc., 103 B.R. 427, 430 (Bankr.S.D.N.Y.1989), and the case law is clear that "[e]fforts undertaken by a creditor solely to further his own self-interest . . . will not be compensable, notwithstanding any incidental benefit accruing to the bankruptcy estate." In re Lister, 846 F.2d 55, 57 (10th Cir. 1988). When the claimant has established that the estate actually benefited from the transaction, then the Court can estimate the amount of the benefit by considering the reasonable use of the property. Carmichael, 109 B.R. at 851; In re Pickens-Bond Constr. Co., 83 B.R. 581 (Bankr.E.D. Ark.1988); In re N-Ren Corp., 68 B.R. 404 (Bankr.S.D.Ohio 1986); In re Intran Corp., 62 B.R. 435 (Bankr.D.Minn.1986). The bankruptcy courts have broad discretion in determining whether to award administrative *452 expense priority. That discretion is limited by the clear intent of section 503(b)(1)(A): the actual and necessary costs of preserving the estate. See Jartran, 732 F.2d at 586. The Court finds that Home Savings' claims are not entitled to administrative expense priority for several reasons. First, the Debtors ceased operation of all four of the nursing homes prior to the filing of these cases. Home Savings disputes the Debtors' alleged pre-petition termination of the Subleases. Judge Sklodowski, however, appointed Caremor pre-petition to operate the facilities. This is undisputed as is the fact that Caremor, not the Debtors, operated all the facilities at all times post-petition prior to the subsequent state court foreclosure sale and presumed termination of Caremor's receivership. Home Savings, as assignee of the mortgagee, did not perform the statutory duties of a receiver appointed under the Nursing Home Care Act. Caremor was operating all nursing home facilities approximately one month before the voluntary Chapter 11 petitions were filed and at all times thereafter, not the Debtors. Thus, Home Savings claims for unpaid rentals and other operational expenses did not arise from the Debtors' operation of any post-petition business. Neither Home Savings' pre-petition claims or the post-petition transactions between Caremor and Home Savings are afforded administrative priority against these Debtors' estates. Home Savings argues that an exception to the Jartran rule has been recognized with respect to laws that protect the public health and safety and cites several cases regarding clean up of contaminated or hazardous waste sites. Home Savings correctly states that in these cases the actual and necessary requirement of section 503(b) is subordinated to "governmental interests in health and safety, which includes using assets of the estate for the necessary cleanup." See In re Mowbray Engineering Co., 67 B.R. 34 (Bankr.M.D.Ala.1986); see also Midlantic Nat. Bank v. New Jersey Dept. of Environmental Protection, 474 U.S. 494, 106 S.Ct. 755, 88 L.Ed.2d 859 (1986). Home Savings further asserts that the Nursing Home Care Act is a police power regulation intended to protect the health and safety of the citizens of the State of Illinois. Home Savings argues that during the pre-petition period in which the Debtors operated the nursing homes, they allowed the premises and the care offered to deteriorate. Home Savings contends that as a matter of public policy, and by analogy to the above-noted decisions, the Debtors should not be permitted to abandon their obligations to care for the residents of the facilities and transfer those obligations to innocent parties such as Caremor and Home Savings. The Court finds that Home Savings is not entitled to an administrative expense priority under this theory. This exception is a judicially created abandonment exception that was first established when a debtor's real property was being abandoned pursuant to 11 U.S.C. § 554 and there was a risk to society as a whole from hazardous wastes left on the property, which was property of the bankruptcy estate under section 541. Unlike those cases, the Debtors' estates have received no benefit from Home Savings' expenditures and the shortfall from Caremor's receivership operations. The Debtors did not seek to abandon the Subleases in these proceedings. Rather, they were displaced by Caremor's appointment as receiver after Woodstock purportedly noticed them of the termination of the Subleases, effective on a date pre-petition. Home Savings' efforts conferred benefits upon a much smaller group, namely itself as holder of the Mortgage, and the residents of the nursing home facilities. The Debtors' estates derived no post-petition benefit from any of the expenditures. Thus, the situation at hand cannot be truly or fairly analogized to the magnitude and level of concerns relative to post-petition abandonment of sites which are part of bankruptcy estates polluted with environmentally hazardous waste materials. The court declines to extend the Midlantic exception to these cases. Home Savings' claims under Counts II and III are not properly afforded administrative priority. *453 Rather, the claims are more appropriately classified as unsecured claims. 3. COUNT IV Pursuant to Count IV of the complaint, Home Savings objects to the Debtors' plan of reorganization on several grounds. Among the objections are that the plan was not proposed in good faith; it does not comply with all Title 11 requirements; and is a scheme to have unpaid withholding tax trust fund claims paid by the estates rather than by the former owners of the Debtors. In particular, Home Savings asserts that the Debtors have failed to pursue contribution claims against Woodstock and that the plan is a mere subterfuge by which the Debtors' principals seek to avoid liability for their embezzlement of monies from the estates. The Debtors deny all such allegations. Both parties seek summary judgment on this count. The Court hereby denies both motions as no proof as to confirmation of the plan has been submitted and there are many genuine issues of material facts that preclude the entry of summary judgment. Pursuant to 11 U.S.C. § 1128, the Court is required to conduct a hearing on confirmation, even absent objections. No such hearing has been completed. Some courts hold that an evidentiary hearing of some form is a mandatory prerequisite to confirmation. In re Williams, 850 F.2d 250, 253 (5th Cir.1988); In re Acequia, Inc., 787 F.2d 1352, 1358 (9th Cir.1986); In re Future Energy Corp., 83 B.R. 470, 481 (Bankr.S.D.Ohio 1988); In re Agawam Creative Marketing Associates, Inc., 63 B.R. 612, 618-619 (Bankr.D.Mass.1986). Even absent the filing of an objection, the proponent of the plan must affirmatively demonstrate that the plan is confirmable. In re Nikron, Inc., 27 B.R. 773, 777 (Bankr.E.D.Mich.1983). Any party in interest may appear and object to confirmation. The Court is authorized to confirm a plan of reorganization only if all the requirements enumerated in section 1129 and other related sections are met. The proponent of the plan has the burden of demonstrating by at least a preponderance of the evidence that the plan satisfies all of the requirements of section 1129(a)(1) through (13) inclusive, except section 1129(a)(8). In re Rusty Jones, Inc., 110 B.R. 362, 373 (Bankr.N.D.Ill.1990). In cases where one or more classes of impaired claims or interest holders have not accepted the plan, confirmation by cram-down pursuant to section 1129(b) is possible. The proponents of the plan have not had the opportunity to meet their burden of proof. The Court is required to conduct a confirmation hearing in order to determine if the plan complies with the Bankruptcy Code. A confirmation hearing, conducted simultaneously with a trial on Count IV of the complaint, is the proper avenue for determination of whether the plan at bar is properly confirmable, not on cross motions for summary judgment. No real evidence on these issues has been submitted by either the plan proponents or Home Savings in support of its various objections to confirmation. At trial, both the proponents and the objectors will be afforded an opportunity to put on any evidence to establish whether or not the plan meets the requirements of section 1129. Accordingly, the Court hereby denies both motions for summary judgment as to Count IV. VI. CONCLUSION For the foregoing reasons, the Court hereby grants in part the Debtors' and the Committee's joint motion for summary judgment pursuant to Counts I, II and III of the complaint and denies same as to Count IV. The Court hereby denies the cross motion of Home Savings for summary judgment. Homes Savings' claims are unsecured and contested. A trial on Count IV of the complaint, combined with the contested hearing on confirmation of the plan will be set at the pretrial and prehearing conference scheduled on November 14, 1990 at 9:00 a.m. Final Pretrial and Prehearing Orders are concurrently entered herewith. This Opinion is to serve as findings of fact and conclusions of law pursuant to Federal Rule of Bankruptcy Procedure 7052. See written Order. *454 ORDER For the reasons set forth in a Memorandum Opinion dated the 24th day of October, 1990, the Court hereby grants in part the motion of the Debtors and the Committee for the Unsecured Creditors for summary judgment on Counts I, II and III and denies the motion as to Count IV. In addition, the Court hereby denies the cross motion of Home Savings Association of Kansas City, F.A. for summary judgment. NOTES [1] Under the Nursing Home Care Act, as amended, only the State of Illinois, a nursing home resident, or a resident's representative or next of kin may petition to obtain the appointment of a receiver. Ill.Rev.Stat. ch. 111½, para. 4153-501, 4153-503 (1989). Thus, Home Savings lacked standing under the Nursing Home Care Act to obtain the appointment of a receiver and accordingly had to proceed under the Illinois Mortgage Foreclosure Law Ill.Rev.Stat. ch. 110, para. 15-1101 to 15-1706 (1989). [2] The original transcript of the hearing incorrectly referenced the word willing. Neither party contests the fact that the word Judge Dunne used was unwilling. [3] On August 2, 1989, the Court entered an order directing the Debtors to endorse certain other medicaid reimbursements to Caremor, which are not at issue for purposes of the instant motions. Under the Nursing Home Care Act, Caremor, as receiver, from the date of its appointment had the statutory power and duty to operate the nursing home "facilities" (as defined in ¶ 4151-113) and to collect payment for all goods and services provided to residents during the receivership (¶ 4153-508(d)). [4] Home Savings admits that it must prove that the Debtors are alter-egos of Woodstock. The Court will address this issue further on in the discussion. [5] An extended discussion of the medicaid program is contained in 2 H. McCormick, Medicare and Medicaid Claims and Procedures, Ch. 20-26 (2d. ed.1986 and 1988 Supp.).
2023-11-19T01:27:04.277712
https://example.com/article/3727
2015 Rutgers Scarlet Knights football team The 2015 Rutgers Scarlet Knights football team represents Rutgers University in the 2015 NCAA Division I FBS football season. It is the Scarlet Knights' second season as a member of the Big Ten Conference, and second as a member of the East Division. The team was led by Kyle Flood, in his fourth year as head coach, and play its home games at High Point Solutions Stadium in Piscataway, New Jersey. The season began with controversies over an investigation into violations of NCAA regulations and school policy concerning coach Flood's improper contacting of a professor concerning a student's academic status; and the arrests and dismissal of several football players on violent felony charges connected to an April 2015 home invasion robbery in New Brunswick. Coach Flood was suspended for three games after the investigation found improper contact was made. Before the season Previous season The 2014 Rutgers Scarlet Knights football team finished the regular season 7–5, with a highlight win against Michigan for the team's first Big Ten Conference win. After defeating Indiana the Scarlet Knights become bowl eligible and were invited to play in the Quick Lane Bowl against North Carolina of the Atlantic Coast Conference. Rutgers defeated the Tar Heels in Detroit, Michigan 40–21 finishing their 2014 Season at 8–5. Controversies and legal issues The 2015 football season began with the shadow of several incidents of alleged misconduct and criminal charges. On May 24, 2015, redshirt freshman defensive back Darian Dailey was arrested in Florida on felony robbery charges. In late August 2015, head coach Kyle Flood suspended five players from the first half of the season opener for violating team policies on breaking curfews. These players were Ruhann Peele (cornerback), Leonte Carroo (receiver), Tim Gleeson (punter), Chris Laviano (quarterback) and Kevin Marquez (linebacker).<ref>Josh Newman, "Rettig to start Rutgers opener; Carroo, Laviano suspended for first half", The Asbury Park Press, August 25, 2015. Retrieved September 11, 2015.</ref> There were doubts that Flood would be coaching the season opener and some speculation amongst news media and fans about the possibility of Flood's firing or resignation.Associated Press, "Rutgers' Kyle Flood will coach opener despite ongoing academic probe", The New York Daily News, September 3, 2015. Retrieved September 11, 2015. Flood suspended wide receiver Leonte Carroo indefinitely after his arrest on September 13, 2015. Carroo was arrested by the Rutgers University Police Department and charged with simple assault stemming from a domestic violence incident that occurred on campus shortly after the end of the game against Washington State. Carroo was the seventh Rutgers player arrested in ten days.Ryan Dunleavy, "Rutgers Leonte Carooo suspended indefinitely", Asbury Park Press, September 14, 2015. Retrieved September 14, 2015. Star-Ledger and New Jersey Advance Media'' sports columnist Steve Politi described Carroo as "another casualty of the season from hell" and called the incident further proof that Flood had lost control of the team. Politi mused, "you wonder how soon before his head coach joins him on the list"—implying that Flood's tenure as coach should be ending with his termination. The 15-member Rutgers Board of Governors, one of the school's two governing bodies, and university president Robert Barchi met on September 11 in a closed-door emergency session to discuss ongoing "athletic matters" and the potential for litigation in the wake of these controversies and arrests. On September 16, 2015, after the conclusion of a university-led investigation into his conduct determined he improperly contacted a professor to get Barnwell's grade changed, Flood was suspended for three games and fined $50,000 by Rutgers president Robert Barchi. Flood would be suspended during and miss an away game against Penn State (September 19, 2015), and home games against Kansas (September 26) and Michigan State (October 10). Associate head coach Norries Wilson would fill-in as head coach for those three games during Flood's suspension. After Flood's reinstatement, questions continued to circulate about possible drug problems within the program in the wake of former Scarlet Knights' fullback Lloyd Terry telling police that "he failed multiple drug tests while on the football team". Flood, along with athletic director Julie Herman, was fired at the end of the season. Coaching staff Coaching changes 2014 offensive coordinator Ralph Friedgen relinquished his position as offensive coordinator due to age and stayed on as a special assistant to the head coach. Ben McDaniels, 2014 wide receiver coach and brother of former Denver Broncos head coach and current New England Patriots offensive coordinator Josh McDaniels, was promoted to offensive coordinator. 2014 graduate assistant and former Rutgers defensive lineman Charlie Noonan was hired as defensive line coach at Holy Cross. Graduate assistant Sam Williams' two years of graduate assistant-ship expired and was hired by Penn State working with special teams and recruiting quality control. 2014 Graduate assistant and former Rutgers quarterback Mike Teel was hired by his alma mater Don Bosco Preparatory High School as offensive coordinator 2014 undergraduate student assistant Sean Barowski stayed on as a graduate assistant upon graduating. 2015 staff Schedule Rutgers announced their 2015 football schedule on June 3, 2013. The 2015 schedule consist of 7 home, and 5 away games in the regular season. The Scarlet Knights will host Big Ten foes Maryland, Michigan State, Ohio State, and Nebraska and will travel to Indiana, Michigan, Penn State, and Wisconsin. The Scarlet Knights hosted three of their four non conference games against Kansas, Norfolk State and Washington State. Rutgers will match up against Army on November 21 at Michie Stadium at West Point. Schedule Source: Game summaries Home against Norfolk State On September 5, 2015, the Rutgers Scarlet Knights met the Norfolk State Spartans, a Football Championship Subdivision team in the Mid-Eastern Athletic Conference, for the fourth game in their series. Rutgers had won the previous three games against Norfolk State in which the Scarlet Knights outscored the Spartans 128–0. Home against Washington State After last season's 41–38 victory against Washington State (Pac-12 Conference) on August 28, 2014, this was the second meeting between the Scarlet Knights and the Cougars. Rutgers lost after a penalty-prone fourth quarter (ending with a spike on 4th down), 34–37. Away at Penn State In the first game of head coach Kyle Flood's three-game suspension, associate head coach Norries Wilson filled in as head coach for the Rutgers and Penn State conference opener. Rutgers' only score was posted with 10:35 remaining in the fourth quarter by kicker Kyle Federico who made 34 yard field goal. Home against Kansas This was the first meeting between the Kansas Jayhawks (Big-12 Conference) and the Scarlet Knights. In 2012, Rutgers and Kansas announced two home-and-home series games this season and the 2018 season. Home against Michigan State Rutgers hosted the undefeated Michigan State Spartans for their sixth meeting. With Michigan State ranked number 4 in national polls, it was the first time in 6 seasons that Rutgers met a team ranked the top 25 (beating No 23-ranked USF 31–0 on November 12, 2009) and 8 seasons since they upset a No. 2-ranked South Florida in 2007. This was the last game that interim head coach Norries Wilson coached during head coach Kyle Flood's three-game suspension. Away at Indiana Despite a 52–27 Indiana lead in the third quarter, the Scarlet Knights erased the 25-point deficit by converting three fourth-quarter turnovers into touchdowns and took the lead in the game's final seconds with a 26-yard field goal from Kyle Federico. Leonte Carroo caught seven passes, for 157 yards and three touchdowns before leaving in the second half with an injured right leg. Home against Ohio State Away at Wisconsin Away at Michigan Home against Nebraska Away at Army Home against Maryland Roster References Rutgers Category:Rutgers Scarlet Knights football seasons Rutgers
2024-04-30T01:27:04.277712
https://example.com/article/4663
.Opportunities Jazz Dance Jazz Dance at the University of Southampton is an expanding and diverse society which provides fun and challenging classes, aimed at 3 different abilities: beginner, intermediate and advanced. Our objective is to ensure that our members enjoy themselves whilst being able to participate in a wide variety of dance styles: from traditional jazz, to contemporary jazz and commercial routines, we endeavour to appeal to everyone – if not, we always welcome suggestions and improvements so that we can extend our programme. Not only do we have 3 weekly classes, but we also perform 3 routines in the annual Pure Dance Show which is always a highlight of the dance calendar. Furthermore, there is an opportunity to audition and be a part of the Novice or Advanced Dance Squads who compete at competitions all over the country. This is an amazing experience and gives our dancers a chance to perform in a completely different environment. Additionally, every year we try to organise 2 workshops, taught by professionals from the industry which are very popular and inspiring. With classes, squads and Pure Dance, there are so many opportunities to make new friends and meet people from the other societies within USD. Most importantly, we are a friendly society, offering a range of socials throughout the year, from nights out to movie and pizza nights in, so hopefully there is something for everyone! . About Jazz Dance Membership Fee Information These are the current membership fees offered by Jazz Dance, although many clubs and societies offer a free period for new members to try out their activities. Name Cost Valid Period Details Join Year Membership £10 26/09/2018 - 15/06/2019 Membership to the Jazz Dance Society costs £10 and is valid for the duration of the academic year 2018-2019. Members can expect to receive the following benefits: 1. £1 off all Jazz dance class prices 2. The opportunity to be involved in our annual Pure Dance routines (membership is required to take part in Pure Dance) 3. The chance to be a part of our Novice and Advanced Dance Squads for competitions. (membership is essential, if successful after audition) However, membership is not necessary in order to participate in our classes but is worth purchasing because it will definitely save you money in the long run!
2024-04-20T01:27:04.277712
https://example.com/article/9999
+1 Pin It reality-is-a-creation-of-your-mind Reality is a creation of your mind, so think positive Reality is a creation of your mind, so think positive : count(): Parameter must be an array or an object that implements Countable inon line
2024-02-21T01:27:04.277712
https://example.com/article/4802
1. In a saucepan over medium heat, combine the vinegar, water, sugar, and salt. Bring to a boil, stirring occasionally to dissolve the sugar. Add the jalapenos and onion and return to a boil; simmer for 30 seconds. 4. Transfer to a cutting board and tent with foil; rest 10 minutes. Set aside 1 pork tenderloin for the tacos. Slice the remaining pork on the diagonal. Drain the cabbage mixture and serve with the pork. Sally Pasley Vargas BostonGlobe.com complimentary digital access has been provided to you, without a subscription, for free starting today and ending in 14 days. After the free trial period, your free BostonGlobe.com digital access will stop immediately unless you sign up for BostonGlobe.com digital subscription. Current print and digital subscribers are not eligible for the free trial. Thanks & Welcome to Globe.com You now have unlimited access for the next two weeks. BostonGlobe.com complimentary digital access has been provided to you, without a subscription, for free starting today and ending in 14 days. After the free trial period, your free BostonGlobe.com digital access will stop immediately unless you sign up for BostonGlobe.com digital subscription. Current print and digital subscribers are not eligible for the free trial.
2023-08-12T01:27:04.277712
https://example.com/article/8635
/* CC0 (Public domain) - see LICENSE file for details */ #ifndef CCAN_TCON_H #define CCAN_TCON_H #include "config.h" #include <stddef.h> /** * TCON - declare a _tcon type containing canary variables. * @decls: the semi-colon separated list of type canaries. * * This declares a _tcon member for a structure. It should be the * last element in your structure; with sufficient compiler support it * will not use any actual storage. tcon_check() will compare * expressions with one of these "type canaries" to cause warnings if * the container is misused. * * A type of "void *" will allow tcon_check() to pass on any (pointer) type. * * Example: * // Simply typesafe linked list. * struct list_head { * struct list_head *prev, *next; * }; * * struct string_list { * struct list_head raw; * TCON(char *canary); * }; * * // More complex: mapping from one type to another. * struct map { * void *contents; * }; * * struct int_to_string_map { * struct map raw; * TCON(char *charp_canary; int int_canary); * }; */ #if HAVE_FLEXIBLE_ARRAY_MEMBER #define TCON(decls) struct { decls; } _tcon[] #else #define TCON(decls) struct { decls; } _tcon[1] #endif /** * TCON_WRAP - declare a wrapper type containing a base type and type canaries * @basetype: the base type to wrap * @decls: the semi-colon separated list of type canaries. * * This expands to a new type which includes the given base type, and * also type canaries, similar to those created with TCON. * * The embedded base type value can be accessed using tcon_unwrap(). * * Differences from using TCON() * - The wrapper type will take either the size of the base type, or * the size of a single pointer, whichever is greater (regardless of * compiler) * - A TCON_WRAP type may be included in another structure, and need * not be the last element. * * A type of "void *" will allow tcon_check() to pass on any (pointer) type. * * Example: * // Simply typesafe linked list. * struct list_head { * struct list_head *prev, *next; * }; * * typedef TCON_WRAP(struct list_head, char *canary) string_list_t; * * // More complex: mapping from one type to another. * struct map { * void *contents; * }; * * typedef TCON_WRAP(struct map, char *charp_canary; int int_canary) * int_to_string_map_t; */ #define TCON_WRAP(basetype, decls) \ union { \ basetype _base; \ struct { \ decls; \ } *_tcon; \ } /** * TCON_WRAP_INIT - an initializer for a variable declared with TCON_WRAP * @...: Initializer for the base type (treated as variadic so commas * can be included) * * Converts converts an initializer suitable for a base type into one * suitable for that type wrapped with TCON_WRAP. * * Example: * TCON_WRAP(int, char *canary) canaried_int = TCON_WRAP_INIT(17); */ #define TCON_WRAP_INIT(...) \ { ._base = __VA_ARGS__, } /** * tcon_unwrap - Access the base type of a TCON_WRAP * @ptr: pointer to an object declared with TCON_WRAP * * tcon_unwrap() returns a pointer to the base type of the TCON_WRAP() * object pointer to by @ptr. * * Example: * TCON_WRAP(int, char *canary) canaried_int; * * *tcon_unwrap(&canaried_int) = 17; */ #define tcon_unwrap(ptr) (&((ptr)->_base)) /** * tcon_check - typecheck a typed container * @x: the structure containing the TCON. * @canary: which canary to check against. * @expr: the expression whose type must match the TCON (not evaluated) * * This macro is used to check that the expression is the type * expected for this structure (note the "useless" sizeof() argument * which contains this comparison with the type canary). * * It evaluates to @x so you can chain it. * * Example: * #define tlist_add(h, n, member) \ * list_add(&tcon_check((h), canary, (n))->raw, &(n)->member) */ #define tcon_check(x, canary, expr) \ (sizeof((x)->_tcon[0].canary == (expr)) ? (x) : (x)) /** * tcon_check_ptr - typecheck a typed container * @x: the structure containing the TCON. * @canary: which canary to check against. * @expr: the expression whose type must match &TCON (not evaluated) * * This macro is used to check that the expression is a pointer to the type * expected for this structure (note the "useless" sizeof() argument * which contains this comparison with the type canary), or NULL. * * It evaluates to @x so you can chain it. */ #define tcon_check_ptr(x, canary, expr) \ (sizeof(&(x)->_tcon[0].canary == (expr)) ? (x) : (x)) /** * tcon_type - the type within a container (or void *) * @x: the structure containing the TCON. * @canary: which canary to check against. */ #if HAVE_TYPEOF #define tcon_type(x, canary) __typeof__((x)->_tcon[0].canary) #else #define tcon_type(x, canary) void * #endif /** * tcon_sizeof - the size of type within a container * @x: the structure containing the TCON. * @canary: which canary to check against. */ #define tcon_sizeof(x, canary) sizeof((x)->_tcon[0].canary) /** * TCON_VALUE - encode an integer value in a type canary * @canary: name of the value canary * @val: positive integer compile time constant value * * This macro can be included inside the declarations in a TCON() or * TCON_WRAP(), constructing a special "type" canary which encodes the * integer value @val (which must be a compile time constant, and a * positive integer in the range of size_t). */ #define TCON_VALUE(canary, val) char _value_##canary[val] /** * tcon_value - retrieve the value of a TCON_VALUE canary * @x: the structure containing the TCON * @canary: name of the value canary * * This macros expands to the value previously encoded into a TCON * using TCON_VALUE(). */ #define tcon_value(x, canary) tcon_sizeof(x, _value_##canary) /** * tcon_ptr_type - pointer to the type within a container (or void *) * @x: the structure containing the TCON. * @canary: which canary to check against. */ #if HAVE_TYPEOF #define tcon_ptr_type(x, canary) __typeof__(&(x)->_tcon[0].canary) #else #define tcon_ptr_type(x, canary) void * #endif /** * tcon_cast - cast to a canary type for this container (or void *) * @x: a structure containing the TCON. * @canary: which canary to cast to. * @expr: the value to cast * * This is used to cast to the correct type for this container. If the * platform doesn't HAVE_TYPEOF, then it casts to void * (which will * cause a warning if the user doesn't expect a pointer type). */ #define tcon_cast(x, canary, expr) ((tcon_type((x), canary))(expr)) #define tcon_cast_ptr(x, canary, expr) ((tcon_ptr_type((x), canary))(expr)) /** * TCON_CONTAINER - encode information on a specific member of a * containing structure into a "type" canary * @canary: name of the container canary * @container: type of the container structure * @member: name of the member * * Used in the declarations in TCON() or TCON_WRAP(), encode a * "container canary". This encodes the type of @container, the type * of @member within it (with sufficient compiler support) and the * offset of @member within @container. */ #if HAVE_TYPEOF #define TCON_CONTAINER(canary, container, member) \ container _container_##canary; \ typeof(((container *)0)->member) _member_##canary; \ TCON_VALUE(_offset_##canary, offsetof(container, member)) #else #define TCON_CONTAINER(canary, container, member) \ container _container_##canary; \ TCON_VALUE(_offset_##canary, offsetof(container, member)) #endif /** * tcon_container_check * tcon_container_check_ptr * tcon_container_type * tcon_container_ptr_type * tcon_container_sizeof * tcon_container_cast * tcon_container_cast_ptr * @x: the structure containing the TCON. * @canary: which container canary to check against. * * As tcon_check / tcon_check_ptr / tcon_type / tcon_ptr_type / * tcon_sizeof / tcon_cast / tcon_cast_ptr, but use the type of the * "container" type declared with TCON_CONTAINER, instead of a simple * canary. */ #define tcon_container_check(x, canary, expr) \ tcon_check(x, _container_##canary, expr) #define tcon_container_check_ptr(x, canary, expr) \ tcon_check_ptr(x, _container_##canary, expr) #define tcon_container_type(x, canary) \ tcon_type(x, _container_##canary) #define tcon_container_ptr_type(x, canary) \ tcon_ptr_type(x, _container_##canary) #define tcon_container_sizeof(x, canary) \ tcon_sizeof(x, _container_##canary) #define tcon_container_cast(x, canary, expr) \ tcon_cast(x, _container_##canary, expr) #define tcon_container_cast_ptr(x, canary, expr) \ tcon_cast_ptr(x, _container_##canary, expr) /** * tcon_member_check * tcon_member_check_ptr * tcon_member_type * tcon_member_ptr_type * tcon_member_sizeof * tcon_member_cast * tcon_member_cast_ptr * @x: the structure containing the TCON. * @canary: which container canary to check against. * * As tcon_check / tcon_check_ptr / tcon_type / tcon_ptr_type / * tcon_sizeof / tcon_cast / tcon_cast_ptr, but use the type of the * "member" type declared with TCON_CONTAINER, instead of a simple * canary. */ #define tcon_member_check(x, canary, expr) \ tcon_check(x, _member_##canary, expr) #define tcon_member_check_ptr(x, canary, expr) \ tcon_check_ptr(x, _member_##canary, expr) #define tcon_member_type(x, canary) \ tcon_type(x, _member_##canary) #define tcon_member_ptr_type(x, canary) \ tcon_ptr_type(x, _member_##canary) #define tcon_member_sizeof(x, canary) \ tcon_sizeof(x, _member_##canary) #define tcon_member_cast(x, canary, expr) \ tcon_cast(x, _member_##canary, expr) #define tcon_member_cast_ptr(x, canary, expr) \ tcon_cast_ptr(x, _member_##canary, expr) /** * tcon_offset - the offset of a member within a container, as * declared with TCON_CONTAINER * @x: the structure containing the TCON. * @canary: which container canary to check against. */ #define tcon_offset(x, canary) \ tcon_value((x), _offset_##canary) /** * tcon_container_of - get pointer to enclosing structure based on a * container canary * @x: the structure containing the TCON * @canary: the name of the container canary * @member_ptr: pointer to a member of the container * * @member_ptr must be a pointer to the member of a container * structure previously recorded in @canary with TCON_CONTAINER. * * tcon_container_of() evaluates to a pointer to the container * structure. With sufficient compiler support, the pointer will be * correctly typed, and the type of @member_ptr will be verified. * Note that const is discarded; a const @member_ptr still yields a * non-const container (unless @canary is const). * * Returns NULL if @member_ptr is NULL. */ #define tcon_container_of(x, canary, member_ptr) \ tcon_container_cast_ptr( \ tcon_member_check_ptr((x), canary, (member_ptr)), \ canary, tcon_container_of_((member_ptr), \ tcon_offset((x), canary))) static inline void *tcon_container_of_(const void *member_ptr, size_t offset) { return member_ptr ? (char *)member_ptr - offset : NULL; } /** * tcon_member_of - get pointer to enclosed member structure based on a * container canary * @x: the structure containing the TCON * @canary: the name of the container canary * @container_ptr: pointer to a container * * @container_ptr must be a pointer to a container structure * previously recorded in @canary with TCON_CONTAINER. * * tcon_member_of() evaluates to a pointer to the member of the * container recorded in @canary. With sufficient compiler support, * the pointer will be correctly typed, and the type of @container_ptr * will be verified. * * Returns NULL if @container_ptr is NULL. */ #define tcon_member_of(x, canary, container_ptr) \ tcon_member_cast_ptr( \ tcon_container_check_ptr((x), canary, (container_ptr)), \ canary, tcon_member_of_((container_ptr), \ tcon_offset((x), canary))) static inline void *tcon_member_of_(void *container_ptr, size_t offset) { return container_ptr ? (char *)container_ptr + offset : NULL; } #endif /* CCAN_TCON_H */
2023-12-18T01:27:04.277712
https://example.com/article/3699
Current Status The sun4v (UltraSPARC-T1) code was removed from -HEAD in May 2011. The reason was due to lack of stability somewhere in the VM system, combined with lack of interest from other developers once the initial developer ceased working on it. Because of the latter, the codebase was not keeping up with changes in -HEAD, leading to bitrot. If someone wishes to pick up sun4v, there are still machines available for them to access [contact MarkLinimon], and the code is still in the repository.
2024-02-26T01:27:04.277712
https://example.com/article/4053
Restaurant/Cafe Fit-Out Location: Newtown, Sydney, NSW The Tram Stop delivers a healthy dose of US-diner styling to Newtown’s busy King Street. Featuring polished concreted floors and high quality wooden paneling and bench tops throughout, the Tram Stop offers a friendly place for diners to enjoy a coffee or something a little more hearty. Keedah’s fit-out and joinery skills are on full display at The Tram Stop. Custom-built bench tops and seating areas show off our professional joinery work, whilst providing high quality functional areas for customers and staff alike making this a very proud retail cafe fit out for the Keedah team.
2024-05-12T01:27:04.277712
https://example.com/article/7030
Q: App graphic making (transparent and no extra spaces) I am a coder but not a graphic maker. I can decently produce graphics that meet the quality standards visually although I cannot produce graphics that will technically "work." This is what I mean: I am using CGRectIntersectsRect for colliding images. My image has SOME extra space which I have made completely transparent using Adobe PhotoShop but even if this extra transparent space is not visible, when the two images collide, it will look like you will be hitting nothing as this extra invisible transparent space is PART of the image and when CGRectIntersectsRect is called it detects touch between two images. So if the other image touches the transparent space, CGRectIntersectsRect is called and my code is executed. I only want my code to be executed if it hits the actual COLOR space of the image. Here is two things that could help me through that, they follow through with questions. Learn how to make NO EXTRA SPACE on an image in photoshop. How could I do this, tutorials? CGRectIntersectsRect only called when touching a color part of an image. A way to do this? Thank you guys! A: Learn how to make NO EXTRA SPACE on an image in photoshop. How could I do this, tutorials? You can manually select an area using the Rectangular Marquee Tool and Image > Crop or automatically trim the image based on an edge pixel color using Image > Trim. CGRectIntersectsRect only called when touching a color part of an image. A way to do this? You can use pixel-perfect collisions or create better bounding shapes for your game objects. For example, instead of using pixel-perfect collision for a spaceship like this one, you could use a triangle for the wings, a rectangle for the body, and a triangle for the head. Pixel-perfect collision One way you could implement it would be to Have an blank image in memory. Draw visible pixels from one image in blue (#0000ff). Draw visible pixels from the other image in red (#ff0000). If there's any purple pixels in the image (#ff00ff), then there's an intersection. Alternative collision detection solution If your game is physics-based, then you can use a physics engine like Box2D. You can use circles, rectangles, and polygons to represent all of your game objects and it'll give you accurate results without unnecessary overhead.
2024-06-30T01:27:04.277712
https://example.com/article/7951
Audley Gillespie-Jones Audley Gillespie-Jones (1 July 1914 – 7 May 2000) was an Australian rules footballer who played for the Melbourne Football Club and Fitzroy Football Club in the Victorian Football League (VFL). Notes External links Category:1914 births Category:Australian rules footballers from Victoria (Australia) Category:Melbourne Football Club players Category:Fitzroy Football Club players Category:Old Melburnians Football Club players Category:2000 deaths
2024-02-03T01:27:04.277712
https://example.com/article/7543
1UP has whipped together a nifty little "20 Facts From 20 Games You Don't Already Know" feature that includes twenty small developer-provided factoids for - you guessed it - twenty upcoming games. Deus Ex: Human Revolution, Mass Effect 3, The Lord of the Rings: War in the North, BioShock Infinite, and The Elder Scrolls V: Skyrim are all spotlighted: The Elder Scrolls V: Skyrim: There is a story to go along with the creation of the dovahkiin (the dragon language, fully developed with a font, dictionary, and everything): According to game director Todd Howard, he told lead designer Emil Pagliarulo to come up with the dragon language. Pagliarulo had a small bit of writer's block, and over one weekend, had brewed some mead (an alcoholic beverage created with fermented honey). "Maybe it was the process of brewing mead; maybe it was from drinking all that mead. Whatever the case, I can say that after a mead-filled weekend, Emil came into the office on Monday with the dovahkiin language completely mapped out." ... Mass Effect 3: Producer Jesse Houston points out a small detail that makes us want to verify this in previous games: Mass Effect 3 will be the first installment to portray a proper handshake. "Handshakes are more complicated than you think -- making sure the hands actually mesh with each other correctly and everything. In past games, we always cut the shot or change the perspective -- but you'll finally see one in ME3."
2024-05-28T01:27:04.277712
https://example.com/article/1915
Previews Broken Steel: What You Need to Know The third Fallout 3 DLC pack is nearly upon us, but are you ready for it? Spiffy: Removes the endgame; increases the level cap to 30; new weapons, enemies, and perks. Iffy: Will the content be any longer than the other DLC packs? How long will it really take to get to level 30? I've played a ton of Fallout 3 since its release last year (I'm pretty sure the scientific term is actually a "shitload"), both the main game and each of its DLC packs. While Operation: Anchorage and The Pitt were both well-received by critics and fans alike, many Fallout 3 fanatics have been waiting for the release of Fallout 3: Broken Steel to finish the main game's storyline and take a whack at the rest of the DLC. This is largely due to the fact that Broken Steel will remove not only the game's level cap, but also get rid of the current endgame. Until this week that was all I really knew about this third and possibly final DLC pack, which is currently slated for a May 5th release on the Xbox 360 and PC. But yesterday I attended Bethesda's press event in London, where journalists from around the world were finally given a first look at Broken Steel. While to the uninitiated it might just look like more Fallout 3, there were a number of things that immediately stood out to yours truly. Home Sweet Home While The Pitt and Operation: Anchorage both took place outside of the Capital Wasteland, the entirety of Broken Steel unfolds in various locales around the world map. After waking up in The Citadel nearly two weeks after the events that originally marked the end of the game (all we'll say about that is that you can now send some companions into the reactor instead of doing it yourself), you'll be able to head right out and return to doing whatever it was your character did in his or her spare time, be it completing side missions or just terrorizing the local populace of ghouls and raiders. Project Purity achieves its ultimate goal: a really fun water slide. If you visit the location of Project Purity, you'll now notice clean water flowing from the pipes, and a quick trip inside will prove that, despite the fact that you've changed the future of the region, things still aren't perfect. You'll be able to take some side missions that involve actually getting said water to the denizens of the Wasteland, but this isn't the main quest of Broken Steel. No, the main quest revolves around the ever-escalating war between The Enclave and the Brotherhood of Steel, a struggle that the Brotherhood wants to end decisively. You'll be tasked with infiltrating an electrical substation of some type, where you'll need to find a tesla coil to build a new super-weapon called a Tesla Cannon. The Brotherhood believes that this is the key to victory, and finding it will allow you to launch into the second part of the quest: finding the last Enclave stronghold. It turns out that said stronghold is actually [possible spoiler alert] in the remains of Adams Air Force base, a new location in the existing world (it's located in the southwest corner of the map). The base offers up some of the toughest combat scenarios I've seen in my entire run of Fallout 3. More good news: Beating Broken Steel still won't end the game. You bitched and moaned, Bethesda listened!
2024-06-24T01:27:04.277712
https://example.com/article/7343
High throughput screening for cyanovirin-N mimetics binding to HIV-1 gp41. The human immunodeficiency virus type-1 (HIV-1) envelope glycoprotein gp41 is an important mediator of viral entry into host cells. Previous studies showed that the virucidal protein cyanovirin-N (CV-N) bound to both gp120 and gp41, and that this binding was associated with its antiviral activity. We constructed an HTS assay based on the interaction of europium-labeled CV-N with recombinant glycosylated gp41 ectodomain to support identification of small-molecule mimetics of CV-N that might be developed as antiviral drug leads. Primary screening of over 107,000 natural product extracts in the assay yielded 347 confirmed hits. Secondary assays eliminated extracts that bound directly to labeled CV-N or for which the simple sugars mannose and N-acetylglucosamine blocked the interaction with gp41 (lectin activity). Extracts were further prioritized based on anti-HIV activity and other biological, biochemical, and chemical criteria. The distribution of source organism taxonomy of active extracts was analyzed, as was the cross-correlation of activity between the CV-N-gp41 binding competition assay and the previously reported CV-N-gp120 binding competition assay. A limited set of extracts was selected for bioassay-guided fractionation.
2023-12-29T01:27:04.277712
https://example.com/article/7928
Another creepy visitor The wildlife on our back porch has been pretty quiet since winter hit. None of those visitors I saw on Halloween. But this morning, I went out back to find this bird of prey enjoying his breakfast on a limb about five feet away from the deck. (And by breakfast, I mean another bird.) The beauty of nature... being eaten by a hawk. And if you want to see the feathers fly, check this out. It’s HD, so go ahead and fill your screen. Maybe you’ve seen this, but a Purdue library science professor and government documents librarian has blogged An Economic Case Against Homosexuality. Yes, it’s as ludicrous as it sounds. I’m leaving this off my professional blog, as it has little to do with librarianship, other than the fact that Professor Bert Chapman displays no traits of a librarian, despite his blog title “Conservative Librarian.” You’ll see a comment by me… two, if they approve my last one. Not that I doubt it’s rationality, but it’s close to the 2,000 character limit they put on comments, so it may be held in moderation. Or then again, it may have been flushed down the toilet. It’s in response to a commenter named Adriana who takes me to task for bringing up the taboo of the “facts” Prof. Chapman’s economic publication lacks. Here is my follow up, in case they don’t publish it: Adriana, The facts Prof. Chapman presents, but does not cite are: 1. Not only does he not cite his source of data, but Prof. Chapman attributes US Government expenditures on AIDS to a support of what he deems “a homosexual lifestyle.” Though he recognizes that the disease is spread by many means, he still presents it as a moral issue. But regardless, a librarian must state where his numbers come from and what “expenditures on this disease” encompass. 2. He cites as fact that behavior he deems immoral taints our blood supply without support of fact. 3. Chapman also claims that rape of male inmates by fellow males is a drain on taxpayer dollars. Does he cite how many of the offenders are homosexual? It may seem unthinkable to you, but heterosexual males rape men. I see no citations to established facts to support his claims that homosexual men are draining US tax dollars in this way. 4. At long last, the educated librarian cites an external work, “Do Domestic Partner Benefits Make Good Economic Sense?” by The Corporate Resource Center. He claims that it is available on a web site, but does not provide a URL. He does not even qualify where this center is or what affiliation it has, if any, to a larger organization. I challenge anyone to find this work available on the web. For this fraud alone, Prof. Chapman should be censured, at the very least. 5. Finally, the learned professor closes with a long list of ways that heterosexual entitlements may be diminished by the acknowledgment of same-sex relationships. There are no numbers given. There are no longitudinal studies cited. There is only the fear, uncertainty, and doubt (FUD) tactics of a frightened man with no other defense. The last paragraph reminds me of the FUD tactics of white families in the 1960’s who would incite neighborhood hatred against black families moving in, in the name of “decreased property values.” Update: I totally forgot to thank the dude who alerted me to this fiasco! Rob at wakingupnow.com is a really great blogger who has a fierce, but reasoned approach to civil action. Thank you, Rob. You set a good example. Michael lost our digital camera during a recent business trip to San Francisco. Perfect excuse to whip out the Best Buy card and upgrade. I don’t normally take many pictures, but felt inspired when I discovered our new neighbor on the back porch this afternoon. Not so itsy-bitsy. More nickel-sized. He/she was up near the top of the covering of our back porch. You can just barely make out the web from the other side. Up near the corner. Quite by accident, I found myself watching a Canadian, computer-generated children’s cartoon called Turbo Dogs this afternoon. I’m a little concerned about the behavior of these professional race car-driving pooches. In the segment I watched, one pup, appropriately named Stinkbert, is disturbed to realize that he may have put the damper on a fellow cur’s birthday celebration because of his foul smell. See, Stinkbert’s got a rather significant problem, not only with hygeine, but with behavior. His offensive odor is not caused by, you know, anything internal, but rather because of his compulsive need to roll in refuse. Yes. Stinkbert is a garbage addict. Once he realizes the apparent effect his problem has on his dear friends, Stinbert — to his credit — decides to get clean. Literally. He learns to bathe, disinfect his home, and with much difficulty, even withstand violent compulsive urges to roll around in the trash. However, since no one helps him with behavior modification, he’s left with nothing to do but sit bored, contemplating the satisfaction he’s denying himself every second. Eventually, Stinkbert overhears his friends’ plans to meet at the municipal dump. Unable to restrain himself any longer, he speeds off in his convertible, intent on a full hedonistic waste binge. Though one canine races alongside him pleading with him to come to his senses and reconsider, he blasts off in a dangerous burst of speed and reaches the junk pile where his remaining friends are urging him not to enter. Obviously distraught by his conflicting desires, he implores them to stand aside, claiming “I am sorry. I tried to get clean for you, but I’ve just gotta be me!” His comrades eventually relent because they say that they never wanted him to change. In fact, they have been at the dump setting up a “stink party” for Stinkbert to celebrate his valiant attempts to get clean. Stinkbert immediately commences rolling in discarded fish parts vowing to get clean once again, but not for his or his friends’ well being. Rather, he wants to repeat the torturous exercise again because it makes the high of getting smelly all the more potent. The vignette ends with the enabling pooches placing clothespins on their snouts so they may continue to ignore their loved one’s serious problem. Sad. That’s all I can say. I wish Stinkbert well and hope that some day he finds within himself the courage and strength to overcome his addiction. Denial ain’t just a river in Egypt. Under the category of WTF-ness I’ve missed is this lovely story about how some teachers in Texas can bring guns to school. You know, for protection. I’m sure the added firearms will make it more difficult for students to go on murder-suicide rampages. Ever wonder what you would look like after a face lift? Don’t. Below are my before-and-after results from LiftMagic.com. I look like a frickin alien, no? To be fair, I did crank up every possible “enhancement” to 100%, but this confirmed one thing for me. You cannot improve on the perfection of my beautiful face. (Ha.)
2023-10-28T01:27:04.277712
https://example.com/article/6900
Q: my sender.tag is returning nil I have 2 buttons on my annotations one for navigation and one for calling. But when I click the button it doesn't work at all because sender.tag returns nil. I can't find anywhere online how to set up the sender.tag for a annotation in the right way. func mapView(_ mapView: MKMapView, viewFor annotation: MKAnnotation) -> MKAnnotationView? { if annotation is MKUserLocation {return nil} let reuseId = "Pin" var pinView = mapView.dequeueReusableAnnotationView(withIdentifier: reuseId) as? MKPinAnnotationView let annotitle = annotation.title ?? "" let annosubtitle = annotation.subtitle ?? "" let title = annotitle ?? "" let phone = annosubtitle ?? "" let type = annotation.description let hostel = Hostel(location: annotation.coordinate, title: title, phone: phone, type: type) let hostelTag = hostelsHelper.getTagForHostel(hostel) if pinView == nil { pinView = MKPinAnnotationView(annotation: annotation, reuseIdentifier: reuseId) pinView!.canShowCallout = true pinView!.animatesDrop = true pinView!.pinTintColor = UIColor.black let mapsButton = UIButton(frame: CGRect(origin: CGPoint.zero, size: CGSize(width: 30, height: 30))) mapsButton.setBackgroundImage(UIImage(named: "Maps-icon"), for: UIControlState()) mapsButton.tag = hostelTag pinView!.leftCalloutAccessoryView = mapsButton pinView!.leftCalloutAccessoryView?.tintColor = UIColor.black mapsButton.addTarget(self, action: #selector (MapViewController.didClickRouteButton(sender: )), for: .touchUpInside) if !phone.isEmpty { let callButton = UIButton(frame: CGRect(origin: CGPoint.zero, size: CGSize(width: 30, height: 30))) callButton.setBackgroundImage(UIImage(named: "call icon round"), for: UIControlState()) callButton.tag = hostelTag pinView!.rightCalloutAccessoryView = callButton pinView!.rightCalloutAccessoryView?.tintColor = UIColor.black callButton.addTarget(self, action: #selector (MapViewController.didClickCallButton(sender: )), for: .touchUpInside) } pinView!.sizeToFit() } else { pinView!.annotation = annotation } return pinView } // pinButton actions @objc func didClickRouteButton(sender: UIButton) { let placemark : MKPlacemark = MKPlacemark(coordinate: hostelsHelper.getLocationFor(sender.tag)) let mapItem:MKMapItem = MKMapItem(placemark: placemark) mapItem.name = hostelsHelper.getTitleFor(sender.tag) mapItem.phoneNumber = hostelsHelper.getPhoneFor(sender.tag) let launchOptions:NSDictionary = NSDictionary(object: MKLaunchOptionsDirectionsModeDriving, forKey: MKLaunchOptionsDirectionsModeKey as NSCopying) let currentLocationMapItem:MKMapItem = MKMapItem.forCurrentLocation() MKMapItem.openMaps(with: [currentLocationMapItem, mapItem], launchOptions: launchOptions as? [String : Any]) print ("Navigation to:\(hostelsHelper.getTitleFor(sender.tag))") } @objc func didClickCallButton(sender: UIButton) -> Void { if let url = URL(string: "tel://\(hostelsHelper.getPhoneFor(sender.tag))") { UIApplication.shared.open(url, options: [:]) } print ("calling:\(hostelsHelper.getTitleFor(sender.tag))") } If someone could help me out would be amazing! My hostelHelper function looks like so: import Foundation import MapKit struct Hostel { var location: CLLocationCoordinate2D var title: String var phone: String var type: String } extension Hostel: Equatable {} func ==(lhs: Hostel, rhs: Hostel) -> Bool { return lhs.location.latitude == rhs.location.latitude && lhs.location.longitude == rhs.location.longitude && lhs.title == rhs.title && lhs.phone == rhs.phone && lhs.type == rhs.type } class HostelsHelper { private var hostels: [Hostel] init() { hostels = [Hostel]() if let cityDetailsPath = Bundle.main.path(forResource: "Hostels", ofType: "plist") { guard let cityDetails = NSArray(contentsOfFile: cityDetailsPath) as? [[String: String]] else {return} for city in cityDetails { guard let latStr = city["latitude"] else { continue } guard let lonStr = city["longitude"] else { continue } guard let titleStr = city["title"] else { continue } guard let phoneStr = city["subTitle"] else { continue } guard let typeStr = city["type"] else { continue } if let lat = Double(latStr) { if let lon = Double(lonStr) { let coordinate = CLLocationCoordinate2DMake(lat,lon) hostels.append(Hostel(location: coordinate, title: titleStr, phone: phoneStr, type: typeStr)) } } } } } func getTagForHostel(_ hostel: Hostel) -> Int { return hostels.index(of: hostel ) ?? -1 } func getHostelsCount() -> Int { return hostels.count } func getPhoneFor(_ tag: Int) -> String { return tag != -1 ? hostels[tag].phone : "" } func getTypeFor(_ tag: Int) -> String { return tag != -1 ? hostels[tag].type : "" } func getTitleFor(_ tag: Int) -> String { return tag != -1 ? hostels[tag].title : "" } func getLocationFor(_ tag: Int) -> CLLocationCoordinate2D { return tag != -1 ? hostels[tag].location : kCLLocationCoordinate2DInvalid } } and the hostels are loaded from a .plist which works because the annotations are loaded into the map A: For setting the tag to a UIButton following steps are needed. In my case i am setting the tag to my button in viewDidLoad() you can set it anywhere. @IBOutlet weak var btnAgenda: UIButton! override func viewDidLoad() { super.viewDidLoad() btnAgenda.tag = 5 // Do any additional setup after loading the view. } @IBAction func btnAgendaClicked(_ sender: UIButton) { print(sender.tag) // 5 } Output: After conforming all the steps above, conform that in your line: let hostelTag = hostelsHelper.getTagForHostel(hostel) print(hostelTag) You are getting an Int value and if not do conform you convert that into a proper format. I guess it is coming nil so no tag is passed to button and you are getting nil as Output. In Future keep habit of checking for null conditions like this: if let hostelTag = hostelsHelper.getTagForHostel(hostel){ mapsButton.tag = hostelTag as? Int } This will prevent you from assigning it a nil value Hope this helps.
2024-07-16T01:27:04.277712
https://example.com/article/7974
News & Events Today, the 28th December 2010, is Liu Xiaobo's birthday and there seems to be no prospect either of his release or of an end to the indefinite house arrest of his wife, Liu Xia, who remains isolated without charge. Read our collection of writing from and about Korea, previously published in the Asia Literary Review featuring material from the archive and our two issues specially dedicated to Korea: ALR23 (Spring 2012) and ALR30(Spring 2016). In Issue 25, we highlighted the plight of Paco Larrañaga, still in prison after a deeply flawed trial and sentence in the Philippines. Grammy-nominated musician Bob Regan is on video to explain why he was moved to write a song dedicated to Paco and to the need for his release. There's also a petition for Paco, and the Give Up Tomorrow website offers ways to help the Philippines recover from the devastation of Typhoon Haiyan. Re-read Luis Francia's moving article for the ALR on Give Up Tomorrow, the award-winning documentary about Paco Larrañaga.
2024-05-24T01:27:04.277712
https://example.com/article/4791
Q: UTF-8 encoding with Spring Boot 1.1.1 How can I "say" Spring Boot to use the UTF-8 encoding, to show and save German umlauts correctly? We are programming a Java-Webapplication using Sping-Boot 1.1.1 (Release) and as webserver a TomCat7 or Jetty. The database is postgresql or h2 for testing. Edit: I tried it with the properties file (thanks for the answer), but no changes are visible. The database is also UTF-8... Especially the problem comes, when we send a POST-Request to the Webserver. The Spring-Request-Handler gets already the broken encoded values. In the following you can see a part of the code: (It shows a snippet of the Thymeleaf-Template) <form accept-charset="utf-8" method="post"> <div class="row"> <fieldset th:object="${model}"> <!-- CSRF token --> <th:block th:replace="makros :: csrf" /> <div class="col-sm-4 form-group" > <label for="firstname" th:text="#{edit_user.first_name}">Given Name</label> <input class="form-control required" type="text" required="required" id="firstname" name="firstname" th:field="*{firstName}" /> </div> <div class="col-sm-4 form-group"> <label for="firstname" th:text="#{edit_user.last_name}">Family Name</label> <input class="form-control required" type="text" required="required" id="lastname" name="lastname" th:field="*{lastName}" /> </div> </fieldset> </div> </form> And this is the request handler for that: @RequestMapping(method = RequestMethod.POST) public String handleUserUpdate(@ModelAttribute(MODEL) UpdateUserCommand command) { //here we cut the broken encoded values } Greetings Stef A: This helped: spring.datasource.url=jdbc:mysql://localhost:3306/securitydb?useUnicode=yes&characterEncoding=UTF-8 A: What is wrongly encoded? The request or the response? server.tomcat.uri-encoding is switching the URI decoding to UTF-8 (this is already the case for Jetty). But that does not do anything for the request body. By default, Spring MVC decodes that with ISO-8859-1 (that is the default per the servlet spec). You need to specify a body encoding in your request if you want it to be decoded using UTF-8. Most users are actually using the CharacterEncodingFilter to achieve the same thing (and ensure consistency). If that fixes your issue, watch out for #1182 that is meant to provide an auto-configuration for that.
2023-08-15T01:27:04.277712
https://example.com/article/3540
This invention relates to devices for enabling an operator to center a work piece with respect to the drive member of a machine tool, such as a vertical mill, a horizontal mill or a horizontal boring mill. It commonly takes a great deal of time and effort to perform the centering operation, and devices which facilitate that operation are therefore of great utility. The usual manner of centering a work piece on the work platform of a machine such as a vertical mill is to employ a holding bar assembly which is affixed to the machine spindle and to which is attached an indicator. The structure and function of such holding bars and indicators are well-known, as evidenced by the radially-adjustable indicator disclosed by Bradley, U.S. Pat. No. 3,129,918. Such combinations can, depending on the characteristics of the work area of the machine, be utilized to center a work piece in either of two ways. One manner of centering the work piece while using such a holding bar and indicator arrangement is to first secure the work piece to the work platform and then adjust the indicator so that it engages one of the outer edges (first edge) of the work piece. The radial position of the indicator on the holding bar having been noted, the indicator is then moved radially away from the machine spindle so as to clear the first edge of the work piece, and the spindle is rotated approximately one-half turn so that the indicator is now in proximity with the opposite edge (second edge) of the work piece. The indicator is then returned to its previous position on the holding bar, and by reference to the distance between the indicator and the second edge of the work piece, the work piece is moved relative to the spindle so that its position more closely approximates the desired centered position with respect to the axis of the work piece which lies between the first and second edges. The indicator is then moved along the holding bar so that it engages the second edge of the work piece and its radial position is noted. Next, the indicator is moved radially outward to clear the second edge of the work piece, and the machine spindle is again rotated approximately one-half turn. The above procedure is then alternately repeated on the first and second edges of the work piece until no adjustment of the position of the work piece is required to permit the indicator to engage each of the first and second edges of the work piece while the indicator is at one particular radial position. When these steps are completed, the axis of the work piece which lies between the first and second edges will be centered with respect to the machine spindle. The entire procedure is then duplicated in order to center the axis of the work piece which lies between the third and fourth edges with respect to the machine spindle. When both axes of the work piece are simultaneously centered with respect to the machine spindle, the work piece itself will be centered with respect to the machine spindle. The second way of centering the work piece is in principle the same as the first, the difference being that the work platform of the machine with the work piece clamped thereto, rather than the machine spindle, is rotated. Both centering procedures consume a great deal of the operator's time, inasmuch as they require numerous approximations of the desired position of the work piece due to the trial-and-error nature of the procedures. Moreover, because the operator centers the work piece by visually approximating a one-half rotation of either the work center or the machine spindle, these procedures have inherent inaccuracies and cannot be relied upon to locate the exact center of the work piece.
2023-12-11T01:27:04.277712
https://example.com/article/2638
This article is more than 5 years old This article is more than 5 years old Israel has halted transfers of the tax revenue it collects on behalf of the Palestinians in retaliation for their move to join the international criminal court in the Hague, according to Israeli media. The Palestinians announced earlier this week that they are joining the international criminal court in the Hague to pursue war-crimes charges against Israel. The move is meant to pressure Israel into withdrawing from the territories that Palestinians demand for a future state. The move drew threats of retaliation from Israel and criticism from the US government, which called it “counterproductive”. The daily newspaper Haaretz reported on Saturday that Israel had decided to withhold the taxes it collects for the Palestinians under the current interim peace accords and transfers each month to the Palestinian Authority. December’s tax transfer is about $127m, according to Haaretz. An unnamed Israeli government official confirmed the substance of the reports but refused to elaborate. Senior Palestinian negotiator Saeb Erekat lashed out at the Israeli manoeuvre, calling it an act of piracy and a “collective punishment” against the Palestinian people. “If Israel thinks that through economic pressure it will succeed in diverting our approach from freedom and independence, then it is wrong,” Erekat told the Associated Press. “This is the money of the Palestinian people and Israel is not a donor country.” Israel has stopped tax transfers before but such freezes have been short-lived. Withholding the funds is just one of several actions Israel could take against the Palestinians, including expanding West Bank settlement construction and curbing certain privileges. Israel’s Channel 2 news reported on Saturday night that prime minister Benjamin Netanyahu would convene his cabinet in the coming days to discuss further retaliatory steps. The US government has not said how it will react, but it provides hundreds of millions of dollars in aid to the Palestinians. Turning to the international court at the Hague marks a major policy shift, transforming Palestinian president Mahmoud Abbas’s relations with Israel from tense to openly hostile. Abbas has been under heavy domestic pressure to take stronger action against Israel amid months of rising tensions over the collapse of US-brokered peace talks last spring, a 50-day war between Israel and Palestinian militants in Gaza over the summer, a recent spate of deadly Palestinian attacks on Israelis, and unrest over access to a key holy site in Jerusalem.
2024-06-04T01:27:04.277712
https://example.com/article/6060
Free radical reactions of peroxidizing lipids with amino acids and proteins: an ESR study. Free radical transfer from oxidizing methyl linoleate to amino acids and proteins was studied in dry model systems incubated for periods up to 20 days. Electron spin resonance was used to study free radical production. Free radicals were detectable in the amino acids lysine, arginine, histidine, tryptophan, and cysteine. Reduced glutathione and, to a limited extent, cystine also gave free radical signals. Free radicals produced in proteins primarily showed central singlet lines, attributable to carbon-centered radicals, with g= 2.004+/- 0.001. Sulfhydryl proteins also exhibited downfield shoulders at g approximately equal to 2.015 and 2.023 that were essentially identical to peaks observed in cysteine and reduced gluathione. The field positions of sulfur resonace in cysteine and proteins suggested a sulfur-oxygen complex rather than thiyl radicals.
2023-10-07T01:27:04.277712
https://example.com/article/1476
Incompatible Kidney Transplant Program Every year, thousands of patients in need of a kidney transplant find a live donor but are relegated to forego the benefits of live donor transplantation because of ABO or HLA incompatibilities. They can participate in kidney paired donation (KPD, also called kidney exchanges or chains), but >50% will not find a compatible match through KPD due to broad HLA sensitization or hard-to-match blood types. Without incompatible live donor kidney transplantation (ILDKT), the only option for these patients is the 90,000-patient deceased donor waiting list, where waiting times average 5-8 years and death rates average 5-10% per year. ILDKT is an emerging practice in which patients can receive transplants across antibody barriers through the use of various pre- and post-operative desensitization strategies. We recently showed that close to 100 centers perform ILDKT in the US, although few have studied or reported their outcomes. While great gains have been recently made in this field, future growth is currently limited by inferences from single-center reports which suffer from publication bias, lack of statistical power, inability to compare protocol effectiveness within a single-center (because of protocol homogeneity within a given center), and lack of generalizability. The only way to move this field forward is for centers to study outcomes collaboratively, but data collection burden is an obvious concern. A mandated, national transplant registry does exist, but data relevant to ILDKT are not collected. We propose a large, highly efficient, mixed retrospective/prospective multi-center linkage of minimal-burden ILDKT-specific primary data to rich, longitudinal national registry data, through which we can: (1) quantify patient, antibody, and treatment protocol factors associated with ILDKT outcomes; (2) identify patients who derive survival benefit from ILDKT compared with other available options; and (3) explore center-level associations with ILDKT outcomes, including center-volume relationships. No single-center studies have been powered to study risk prediction in ILDKT. We will collect ILDKT- specific data of approximately 5800 recipients and link to the national registry for multivariate analyses of factors associated with outcomes. To compare ILDKT with the other available options, i.e. waiting for a compatible deceased donor or KPD, we will use a Markov decision process model that combine inferences drawn from observational data of the waiting list with inferences drawn from simulations of KPD. We will use interaction term analysis to identify factors that amplify or attenuate the effect of ILDKT on survival benefit. This research will establish a framework for patient selection and counseling for ILDKT that is evidence- based and in the best interest of patients. Robust quantification of the risk and survival benefit associated with ILDKT is novel and will be immediately useable clinically throughout the country. A better understanding of this emerging modality at a national, generalizable level will help improve the feasibility, availability, and quality of ILDKT for the thousands of patients each year who could potentially benefit from it.
2023-11-11T01:27:04.277712
https://example.com/article/7992
Q: What is HEX STRING representation of BITS datatype? How to convert BITS datatype to HEX STRING datatype? (like 0x80) What is HEX STRING representation of (0), (1), (2) BITS respectively? The DEFVAL is '00'h. Composed Type: Bits Base Type: BITS Value List: large (0) mid-size (1) compact (2) A: You've probably found the correct syntax for hex and Bits data on the man page of "snmpset": http://www.net-snmp.org/docs/man/snmpset.html So, setting the Bits value large (0) is done like with the syntax snmpset <flags,host etc> <oid> b 0 And to set multiple flags, like both mid-size and compact, use snmpset <flags,host etc> <oid> b 1,2 The latter syntax is not well-documented, I think. I found it in the mailing list archives for net-snmp. Like I wrote in the comments, there is no "HEX STRING" datatype in SNMP. If you want to transmit binary data, such as an OCTET STRING value, then you will need to represent it somehow on the command line. Net-snmp provides an input format called "HEX STRING" which will accept hexadecimal input using the following syntax: snmpset <flags,host etc> <oid> x 60 Incidentally, "60" in hexadecimal is identical to how SNMP would encode "bits 1,2" (the second and third bits, MSB first). A description of how SNMP encodes and decodes BITS values is found in RFC1906 section 8. Having that knowledge, you just need to learn how hexadecimal conversion works, which is readily googleable. Edit: I guess this is what you're looking for: 0 -> 0x80 1 -> 0x40 2 -> 0x20 This is a bit backwards compared to normal (LSB) byte encoding, but again read RFC1906 for a description of how it works. It should be noted that if you try to set an OCTET STRING value on a BITS variable, you might expect the SNMP agent return a type error. However, since BITS is just an SMI macro based on the OCTET STRING type, they are actually encoded the same way. So, the agent should happily set the value.
2024-05-24T01:27:04.277712
https://example.com/article/5590
Q: Object conversion in android I have one server URL, when i send request to server URL, Get data in Ajax Servlet format. so i want to store this responded data in json object format in mobile side. How is it possible Please guide me The responded data have multiple city name A: This is xml format. So you have to convert xml to json. You can use java json library to do it. It provides api to do so. JSONObject jsonObj = XML.toJSONObject(yourXmlString);
2024-04-03T01:27:04.277712
https://example.com/article/6214
Interfacing liquid chromatography with atmospheric pressure MALDI-MS. Two different strategies for coupling liquid chromatography with atmospheric pressure matrix assisted laser desorption/ionization (AP MALDI) are presented. The first method is flow-injection liquid AP UV-MALDI. Compared with previous similar research, the detection limit was improved 10 times to 8.3 fmol using a solution of 50 nM peptide with 25 mM alpha-cyano-4-hydroxycinnamic acid. The applicability of this method to measure oligosaccharides, actinomycin antibiotics, antibiotics, phosphopeptides, and proteins is demonstrated. The upper mass limit achieved with the current instrumentation is 6,500 Da (doubly charged cytochrome c). The feasibility of a second strategy based on single-droplet IR AP MALDI is demonstrated here. Aqueous peptide solutions were successfully measured by this method.
2023-10-24T01:27:04.277712
https://example.com/article/7805
To use the full functionality of this page, JavaScript is required. Either enable it in your browser’s settings or, if that's not possible, please call us at 877.677.4327 and we'd be happy to help you place an order over the phone. Hand Pumps Sort Items By: Showing 1 to 16 of 16 Commercial outfitters swear that NRS Barrel Pumps are built to last, get wet, and get used. This model of this rugged, high-volume pump works with all valves, such as Leafield and Halkey Roberts, that...
2023-12-12T01:27:04.277712
https://example.com/article/2150
Qualitative research in nutrition and dietetics: data analysis issues. Although much of the analysis conducted in qualitative research falls within the broad church of thematic analysis, the wide scope of qualitative enquiry presents the researcher with a number of choices regarding data analysis techniques. This review, the third in the series, provides an overview of a number of techniques and practical steps that can be taken to provide some structure and focus to the intellectual work of thematic analysis in nutrition and dietetics. Because appropriate research methods are crucial to ensure high-quality research, it also describes a process for choosing appropriate analytical methods that considers the extent to which they help answer the research question(s) and are compatible with the philosophical assumptions about ontology, epistemology and methodology that underpin the overall design of a study. Other reviews in this series provide a model for embarking on a qualitative research project in nutrition and dietetics, an overview of the principal techniques of data collection, sampling and quality assessment of this kind of research and some practical advice relevant to nutrition and dietetics, along with glossaries of key terms.
2023-08-28T01:27:04.277712
https://example.com/article/4689
ve prob of sequence ou. 21/80 What is prob of sequence aaa when three letters picked without replacement from aaaaaa? 1 What is prob of sequence dk when two letters picked without replacement from dkdddkdddkdddddkkkk? 14/57 Three letters picked without replacement from {k: 3, x: 3, t: 1, u: 6}. What is prob of sequence kuk? 3/143 Two letters picked without replacement from {b: 10, n: 9}. What is prob of sequence bb? 5/19 Four letters picked without replacement from {v: 9, q: 2}. Give prob of sequence vqvv. 7/55 Two letters picked without replacement from ototttttottttt. Give prob of sequence oo. 3/91 Three letters picked without replacement from mnmnmmmmmmmmm. What is prob of sequence mnn? 1/78 Calculate prob of sequence lee when three letters picked without replacement from {l: 1, r: 1, g: 2, e: 1}. 0 Calculate prob of sequence ib when two letters picked without replacement from {i: 4, g: 2, b: 7}. 7/39 Three letters picked without replacement from {k: 1, q: 2}. Give prob of sequence kqq. 1/3 Two letters picked without replacement from {x: 1, c: 2, w: 2}. Give prob of sequence cw. 1/5 Calculate prob of sequence gyyy when four letters picked without replacement from jgygjyjgjjjygyy. 2/273 Two letters picked without replacement from rav. What is prob of sequence ar? 1/6 What is prob of sequence xxv when three letters picked without replacement from {v: 5, h: 6, x: 4}? 2/91 Two letters picked without replacement from {k: 4, z: 6, v: 4}. Give prob of sequence zk. 12/91 Four letters picked without replacement from xmmmmxmmmxmmmmmmmmx. Give prob of sequence xxmm. 35/1292 Calculate prob of sequence dd when two letters picked without replacement from {h: 1, d: 2}. 1/3 Four letters picked without replacement from {d: 5, g: 3}. What is prob of sequence gddd? 3/28 Two letters picked without replacement from {w: 2, p: 1, m: 1, o: 1, y: 4}. What is prob of sequence mp? 1/72 What is prob of sequence opom when four letters picked without replacement from kmnpmoopoonnmnomnm? 5/1836 Two letters picked without replacement from {y: 1, c: 2, r: 1, v: 1, f: 2, i: 2}. What is prob of sequence fy? 1/36 Calculate prob of sequence en when two letters picked without replacement from {e: 1, r: 1, i: 1, n: 2, a: 1, d: 1}. 1/21 Two letters picked without replacement from ykeeykbbykk. Give prob of sequence bk. 4/55 What is prob of sequence ei when two letters picked without replacement from eaaeeia? 1/14 Three letters picked without replacement from qxqqqxttqqll. What is prob of sequence xtl? 1/165 Calculate prob of sequence ccll when four letters picked without replacement from {c: 5, l: 13}. 13/306 Four letters picked without replacement from {c: 1, j: 2, r: 5, e: 8, q: 3}. Give prob of sequence qjqq. 1/7752 Three letters picked without replacement from {k: 5, d: 4, u: 2, i: 2}. What is prob of sequence kkd? 20/429 What is prob of sequence euei when four letters picked without replacement from iieueeiee? 5/252 Four letters picked without replacement from tayytytyultuutu. Give prob of sequence alty. 1/1638 Four letters picked without replacement from {g: 5, b: 5}. What is prob of sequence bbgg? 5/63 Calculate prob of sequence hya when three letters picked without replacement from {a: 12, h: 2, y: 2, n: 1, w: 1}. 1/102 Two letters picked without replacement from {y: 1, d: 1, h: 1, m: 2}. What is prob of sequence dy? 1/20 Two letters picked without replacement from {s: 1, h: 1, n: 1, b: 2, y: 1, v: 2}. What is prob of sequence hn? 1/56 Two letters picked without replacement from {f: 1, s: 1, u: 11}. Give prob of sequence us. 11/156 Calculate prob of sequence lq when two letters picked without replacement from {l: 2, c: 4, i: 1, t: 3, u: 2, q: 2}. 2/91 Four letters picked without replacement from {u: 11, v: 2}. Give prob of sequence uvuu. 3/26 What is prob of sequence ili when three letters picked without replacement from yyojeoiylijjlj? 1/546 What is prob of sequence nbh when three letters picked without replacement from {p: 2, k: 2, c: 6, b: 2, n: 4, h: 4}? 4/855 Three letters picked without replacement from {u: 2, a: 2, h: 9}. Give prob of sequence huu. 3/286 Two letters picked without replacement from wjo. Give prob of sequence jw. 1/6 Calculate prob of sequence cdcd when four letters picked without replacement from {c: 2, m: 2, d: 2, n: 1, v: 1, f: 1}. 1/756 Two letters picked without replacement from {p: 4, z: 6}. Give prob of sequence pz. 4/15 Four letters picked without replacement from {l: 3, n: 5}. What is prob of sequence nnln? 3/28 What is prob of sequence ctb when three letters picked without replacement from hhcbfht? 1/210 What is prob of sequence yp when two letters picked without replacement from yllplypyly? 4/45 Two letters picked without replacement from hxtvxic. Give prob of sequence vx. 1/21 Three letters picked without replacement from itbtxxxttb. What is prob of sequence xbb? 1/120 Calculate prob of sequence vecc when four letters picked without replacement from {x: 3, v: 3, z: 1, c: 2, j: 3, e: 4}. 1/1820 Three letters picked without replacement from {u: 2, a: 4}. Give prob of sequence uau. 1/15 Calculate prob of sequence xv when two letters picked without replacement from ggxxvxggvxx. 1/11 Two letters picked without replacement from {t: 7, k: 5}. What is prob of sequence kt? 35/132 Two letters picked without replacement from {b: 1, k: 4, f: 2, a: 1, z: 1}. Give prob of sequence fz. 1/36 What is prob of sequence ddud when four letters picked without replacement from {d: 7, u: 2}? 5/36 Three letters picked without replacement from eeeeeeweeeeeeeeeeee. What is prob of sequence wee? 1/19 Calculate prob of sequence xxtx when four letters picked without replacement from txtxxxx. 1/7 Calculate prob of sequence ii when two letters picked without replacement from {c: 8, n: 5, o: 1, i: 2, t: 1}. 1/136 Calculate prob of sequence ni when two letters picked without replacement from noovtnnvnvnnononi. 1/34 Calculate prob of sequence qi when two letters picked without replacement from {d: 3, i: 3, q: 2, e: 1, o: 5, s: 1}. 1/35 What is prob of sequence ede when three letters picked without replacement from {e: 2, d: 7}? 1/36 Two letters picked without replacement from {n: 1, u: 3, b: 3, x: 2, j: 6}. Give prob of sequence xu. 1/35 Two letters picked without replacement from ntpqqt. What is prob of sequence tp? 1/15 What is prob of sequence ay when two letters picked without replacement from {a: 9, y: 2}? 9/55 Three letters picked without replacement from khohohddoskshshsoko. What is prob of sequence sos? 10/969 What is prob of sequence wef when three letters picked without replacement from {w: 1, f: 4, e: 2, j: 5, m: 4}? 1/420 Two letters picked without replacement from wxqqaqbwwaaqw. Give prob of sequence xw. 1/39 Three letters picked without replacement from {t: 7}. What is prob of sequence ttt? 1 Calculate prob of sequence vjv when three letters picked without replacement from vjjjjvjjj. 1/36 Three letters picked without replacement from {t: 2, x: 2, d: 1, l: 1, y: 2}. What is prob of sequence xtt? 1/84 Two letters picked without replacement from xxqeexqejjxxxcu. What is prob of sequence ej? 1/35 What is prob of sequence ez when two letters picked without replacement from {l: 2, z: 3, q: 1, e: 1}? 1/14 What is prob of sequence mmu when three letters picked without replacement from muumummmmm? 7/40 Calculate prob of sequence jj when two letters picked without replacement from pcpppjcpjppjcj. 6/91 What is prob of sequence ttv when three letters picked without replacement from raraarvtrtvtvav? 4/455 Two letters picked without replacement from jtvuququvqu. What is prob of sequence qu? 6/55 Three letters picked without replacement from {v: 4, w: 7, r: 5}. Give prob of sequence wvv. 1/40 What is prob of sequence xnhl when four letters picked without replacement from ahnwlxwlhwhxhwnhxh? 1/1020 What is prob of sequence wiw when three letters picked without replacement from {l: 1, w: 1, i: 2}? 0 Calculate prob of sequence kxyk when four letters picked without replacement from wykkykxwyxxxxxx. 1/260 What is prob of sequence mff when three letters picked without replacement from xmffmfm? 3/35 Two letters picked without replacement from xqttg. What is prob of sequence gq
2024-05-08T01:27:04.277712
https://example.com/article/2353
Blending and Morphology Control To Turn Hydrophobic SEBS Electrospun Mats Superhydrophilic. Thermoplastic elastomer SEBS, a triblock copolymer composed of styrene (S) and ethylene-co-butylene (EB) blocks, can be dissolved and processed by electrospinning to produce flexible nonwoven mats that can be interesting for applications like filtration or separation membranes. Controlling surface properties such as hydrophobicity/hydrophilicity is critical to achieving a desired performance. In this study, hydrophobic electrospun SEBS mats were obtained, following which an amphiphilic molecule (Pluronic F127) was solution-blended with SEBS prior to electrospinning, in a bid to produce a hydrophilic membrane. The result was a fast-spreading superhydrophilic mat with thinner fibers that preserved the flexibility of the SEBS. The morphologies of nonwoven mats, flat films (prepared by dip-coating using identical solutions) and of the surface of individual fibers were characterized using different microscopy techniques (optical, scanning electron microscopy and atomic force microscopy). Chemical analysis by X-ray photoelectron spectroscopy (XPS) revealed a large F127 concentration in the outermost surface layer. In addition, an analysis of dip-coated flat films revealed that for 20 wt % of F127, there was a change in the blend morphology from dispersed F127-rich regions in the SEBS matrix to an interconnected phase homogeneously distributed across the film that resembled grain boundaries of micellar crystals. Our results indicated that this morphology change at 20 wt % of F127 also occurred to some extent in the electrospun fibers and this, combined with the large surface area of the mats, led to a drastic reduction in the contact angle and fast water absorption, turning hydrophobic electrospun mats superhydrophilic.
2024-05-07T01:27:04.277712
https://example.com/article/7685
A radiotherapeutic experience for localized extranodal non-Hodgkin's lymphoma: prognostic factors and re-evaluation of treatment modality. Between 1966 and 1988, 149 patients were treated with radiotherapy for localized extranodal lymphoma. The average total dose given was 39.8 Gy for low grade disease and 48.7 Gy for all other disease. Of the 149 patients, 60 also received adjuvant chemotherapy. Twenty-four had low grade lymphoma, 109 had intermediate grade disease, and 16 had high grade disease, histologically. The distribution of histological grade and T/B phenotype varied with the primary site. Low grade lymphomas were found mainly in the orbit, and T-cell lymphomas were found in the nasal cavity and nasopharynx. The 5-year survival rates according to tumor location were 89% for oral cavity, 86% for paranasal sinus, 83% for thyroid, 69% for orbit, 47% for Waldeyer's ring (WAR), 44% for testis, 23% for CNS, 21% for nasal cavity and 60% for other sites. Histological grade and T/B phenotype both had prognostic importance. Combined chemotherapy significantly improved the survival rate only for disease with intermediate or high grade histology. Other prognostic factors according to the primary site were the bulk of lymph node for WAR disease, the radiation dose for CNS disease, bone erosion for orbital disease, stridor for disease of the thyroid, and the tumor stage for disease of both the testis and the thyroid.
2024-05-05T01:27:04.277712
https://example.com/article/6977
<Type Name="NSNumberFormatterRoundingMode" FullName="MonoMac.Foundation.NSNumberFormatterRoundingMode"> <TypeSignature Language="C#" Value="public enum NSNumberFormatterRoundingMode" /> <TypeSignature Language="ILAsm" Value=".class public auto ansi sealed NSNumberFormatterRoundingMode extends System.Enum" /> <AssemblyInfo> <AssemblyName>MonoMac</AssemblyName> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <Base> <BaseTypeName>System.Enum</BaseTypeName> </Base> <Docs> <summary>To be added.</summary> <remarks>To be added.</remarks> </Docs> <Members> <Member MemberName="Ceiling"> <MemberSignature Language="C#" Value="Ceiling" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode Ceiling = int32(0)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="Down"> <MemberSignature Language="C#" Value="Down" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode Down = int32(2)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="Floor"> <MemberSignature Language="C#" Value="Floor" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode Floor = int32(1)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="HalfDown"> <MemberSignature Language="C#" Value="HalfDown" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode HalfDown = int32(5)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="HalfEven"> <MemberSignature Language="C#" Value="HalfEven" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode HalfEven = int32(4)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="HalfUp"> <MemberSignature Language="C#" Value="HalfUp" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode HalfUp = int32(6)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> <Member MemberName="Up"> <MemberSignature Language="C#" Value="Up" /> <MemberSignature Language="ILAsm" Value=".field public static literal valuetype MonoMac.Foundation.NSNumberFormatterRoundingMode Up = int32(3)" /> <MemberType>Field</MemberType> <AssemblyInfo> <AssemblyVersion>0.0.0.0</AssemblyVersion> </AssemblyInfo> <ReturnValue> <ReturnType>MonoMac.Foundation.NSNumberFormatterRoundingMode</ReturnType> </ReturnValue> <Docs> <summary>To be added.</summary> </Docs> </Member> </Members> </Type>
2024-07-15T01:27:04.277712
https://example.com/article/7234
Q: 4-vector velocity to Newtonian? The four-vector condition for a particle free of forces is: $\frac{du}{dτ} = 0$ and the equivalence of this to the statement of newton's first law follows from the expression for four-velocity: Then I came across this part in my lecture notes: Now this got me curious. How exactly does one get to the Newtonian statement i.e. what algebra steps are involved? Thank you to anyone who can enlighten me~ A: First consider the spatial component of the equation above, you get $$ \frac{d}{d\tau} \left( \gamma(v)\overrightarrow{v} \right) = 0 $$ But $\gamma(v) = \frac{dt}{d\tau}$ so you have $$ \frac{d^2 t}{d\tau^2} v + \gamma(v) \frac{d\, \overrightarrow{v}}{d\tau} = 0 $$ Now since $$ \frac{d \, u}{d\tau} = 0 \implies \frac{du^0}{d\tau} = \frac{d^2 t}{d\tau^2} = 0 $$ we finally get $$ \frac{d \, \overrightarrow{v}}{d\tau} = 0 \implies \frac{d \, \overrightarrow{v}}{dt} = 0 $$ Which is your result. Of course, we should remember that $\gamma(v) = \frac{1}{\sqrt{1-\frac{v^2}{c^2}}}$
2023-09-18T01:27:04.277712
https://example.com/article/8791
{ "version": 8, "metadata": { "test": { "width": 64, "height": 64 } }, "center": [ -113.26903, 35.9654 ], "zoom": 11, "sources": { "hillshade": { "type": "raster-dem", "tiles": [ "local://tiles/{z}-{x}-{y}.terrain.png" ], "maxzoom": 15, "tileSize": 256 } }, "layers": [ { "id": "hillshade-translucent", "type": "hillshade", "source": "hillshade", "paint": { "hillshade-exaggeration": 1 } }, { "id": "background-translucent", "type": "background", "paint": { "background-opacity": 0.5, "background-color": "blue" } } ] }
2024-03-04T01:27:04.277712
https://example.com/article/1999
Image copyright Andy Luck Image caption Di Gilpin (right) creates couture knitwear in her sheep-scented bothy "There is hardly anything in the world that some man cannot make a little worse and sell a little cheaper," said Victorian art critic John Ruskin. At the other end of the spectrum, there are plenty of people making goods a little better, and more expensively. And most of these goods come with a big, luxury-brand label attached. Di Gilpin's knitwear doesn't. The prices are high, although not eye-poppingly so - in the region of £400 ($600, €550) for a sweater. From her 15th Century bothy [one room stone cottage], near St Andrews in eastern Scotland, she has also created £4,000 knitted couture pieces for the catwalk. It's anything other than a sleek, commercial machine: "The bothy sometimes smells quite woody or peaty. Its like walking into a woolly, sheepy environment - a nostalgic smell, comforting and inclusive and homey." She says her creations also have a strong identity: "When you see a piece walking down the street people recognise what it is. "Hand-knits become you in a sense. As you wear them they take on you as a personality - you might get recognised in the distance for the garment you're wearing." Our approach has been to take care of our makers, keep the customers happy and the growth takes care of itself Seth Rosen, CustomMade Finding quality items with individual personality can be tricky as luxury-branded goods become more ubiquitous. Uche Pezard, founder of luxury goods management consultancy Luxe Corp, illustrates this: "I was in Dubai last week. I could have been in New York or Shanghai - the malls all look the same. "Homogenisation of the luxury model is good in a way because it keeps consistency. But it becomes tiring - and boring." Unique There's little homogeneity about US firm CustomMade.com, a website that claims to connect 12,000 makers with 100,000 buyers. Customers effectively put their orders out to tender, so typically, these are one-offs. You tell the site what you want, outline a budget, post an image if it helps, and designers and manufacturers will then offer their suggestions. Image copyright Custommade Image caption A bespoke Quidditch set anyone? Its range of goods is almost limitless. It even made a Quidditch set for one couple. CustomMade's president and chief executive, Seth Rosen, says: "There are a lot of companies that connect people to existing products - things that are already made. "We are unique in that we seek to connect people who want to get something that is not yet made, made." Shiny If there's one item that defines consistent luxury - but also individuality - perhaps it is the diamond. In its pure form, this simple piece of rock doesn't come with a luxury brand label attached. Its appearance - and value - is enhanced by cutting and polishing. Image caption Look closely - there's an £18,000 diamond in there somewhere... At the SB Jewellery workshop in the UK's jewellery trade centre of Hatton Garden, London, Eddie Taylor is setting a diamond. The stunningly beautiful stone is worth £18,000. Part of the point of a diamond is its intrinsic value, he says. But even on a rock, sticking a well-known name on it can dramatically increase its perceived worth. "If it's a Cartier, or a Tiffany, it will leap in price," he says. "You can easily pay 150% more for a diamond with one of those labelled boxes." Control And even without the might of a big brand name, the value of a diamond is not set in stone, so to speak. Eddie Taylor says that as mining giant De Beers tightly controls the supply of the precious stones, this underpins prices. "De Beers has six skip loads of diamonds sitting about. Six skip loads. Imagine what that would do to prices if it were suddenly let on to the market. It would kill it." De Beers' released its diamonds in strictly controlled sales that take place just 10 times a year to specially invited customers. But it says that's not an artificial restriction. It says it only has enough ready to sell to supply two of these sales. Image copyright Eddie Taylor Image caption Eddie Taylor's £18,000 stone ready for its close up Whatever the case, restricting supply is certainly one of the best-used tricks in the book, says Uche Pezard: "A Birkin or Kelly bag by Hermes costs about €10,000 (£7,200, $10,600). But they are simply not regularly stocked and you cannot go on a waiting list. You have to turn up at the shop and hope they have one on that day and you're in time to buy it." Sometimes people come to us via quite odd routes. Nike came to us looking for an expert in gansey knitting [a type of stitch favoured for fishermen's jumpers] Di Gilpin, Knitwear designer That means, she says, their resale price far outstrips the original retail. "In the UAE [United Arab Emirates] it is considered a sign of the most serious intent if the man presents one on a first date. To do that, he has to pay €50,000. "You know why? He doesn't have time to buy one himself, so he has to go to someone who already has one." Word of mouth Limiting supply is not a trick open to most smaller craft manufacturers. It is something Di Gilpin's small bothy does well enough in itself. But getting her name out there is also hampered by its scale - and location. There a limit to the number of people who are going to pop in to browse in rural Fife. So what do manufacturers do when they don't have the resources of a De Beers, an Hermes, or the other super-luxury brands? Image copyright Andy Luck Image caption Di Gilpin's stitch craft has hooked some surprising visitors But being the best can sometimes mean you get hunted out regardless. CustomMade's Seth Rosen says word gets around: "Our approach has been to take care of our makers, keep the customers happy, and the growth takes care of itself. "Our product is good enough if you just execute really well every day. That's what makes the difference." Fishing to feet When asked about her marketing budget, Di Gilpin laughs. It's so small it barely exists, she says. She will send you a USB stick loaded with films about the work, if you ask. And that word-of-mouth can bring some impressive connections. "Sometimes people come to us via quite odd routes," says Ms Gilpin. "Nike came to us looking for an expert in gansey knitting [a type of stitch favoured for fishermen's jumpers]. Image copyright Nike Image caption Some Nike trainers now feature knot stitched fabrics "It was interested in exploring the concept of knitting to create their running shoes. We discussed why knot [stitch] was better for making those than weaving. The nature of the knot stitch allows the shoe to move with the foot - like a second skin. "Now, a lot of Nike shoes are knitted rather than woven - and that was through them coming to us." Read more features in our Life of Luxury series here.
2023-10-18T01:27:04.277712
https://example.com/article/5863
Friday, December 9, 2016 (Treasure Island, San Francisco, CA)- Travis Lund, Executive Director at Treasure Island Sailing Center (TISC), offers an example of how sailing J/24s (and dinghies) on San Francisco Bay can provide a helpful distraction to life. He comments, “I’m often asked what the TISC is or what we do here in San Francisco, CA. I’ll admit it is sometimes difficult to accurately describe what a youth-driven sailing center does and harder yet to transmit why my staff and I are so dedicated to the mission of TISC. For most of us who sail, we typically don’t ponder how sailing has affected our lives…we just know it has. Most of us seldom think about what our lives would be like if we never learned to or had the enjoyment of sailing. Growing up in a small industrial town of 23,000 people in Northern Michigan, there were few entertainment options. I really didn’t know much else other than playing in the water in the summer and playing in the snow in the winter. My parents owned a small sailboat and I somehow found ways to sail and race and eventually got good at it. I have been able to make a living at it for most of my life, and yet I still find it difficult to articulate how and why it has become so important to whom I am. I think the best way to answer this question is to envision my life without it. And, I cannot. However, a recent event has helped provide some clarity. On November 9th, TISC ran a recruitment event to help our Envision Academy Sailing Team (EAST) gain new members. Envision Academy (EA) is a tuition free charter high school in downtown Oakland whose population is mostly underserved. About a year and a half ago, with the help of Anthony Sandberg, owner of OCSC Sailing, we formed a sailing team for this school. With the financial support of the St. Francis Sailing Foundation, we’ve been providing boats, transportation and instructors for the team at no cost to the students and their families. The current team is all upper level students and we wanted to bolster the team numbers. We had the day planned for weeks and didn’t really think about the actual date as we had enough on our plates to simply organize the event. But the morning of the event, I received a call from EA’s Athletic Director, Coach Henry, to inform me that he was going to do what he could to get the kids on the bus as quickly as he could. As it was the day after the U.S. national and local elections, the school was in a state of pandemonium. He explained that kids were looking like they were leaving school, that parents were coming to pick their kids up, and that helicopters were flying overhead in wake of what might be either protests or riots later in the day. He warned me that we would not have the 42 kids we had hoped for, and that I should prepare the staff for what might be a sullen, scared or confused group of kids. Anthony Sandberg chipped in and we chartered a bus to bring what became 27 freshmen and sophomore students out for a 3-hour introductory sail. As they arrived it was clear that Henry’s call was right. What should have been an excited, frenzied group of 14 and 15 year olds was replaced with some very quiet and reserved children while others were wrought with anger. The regular team was also there, and was also visibly distraught. We provided the kids with pizza and snacks, and they were feeling a bit better when they hit the water. Before EA’s arrival we had launched four J/24s and as many RS Ventures. We had several volunteers who were instructed to show the kids a good time, introduce them to sailing, and relay their experiences with sailing. I had prepared everyone for what might be the attitude of the group and so everyone was a bit on edge. While the EA student body is very diverse, our staff and volunteers were not, and I was concerned how the day might play out. Once the kids got into life jackets and began to load onto the boats something unexpected happened. Faces went from frowns to looks of interest and investigation. The loud and frank talk of the election results turned to questions and quiet. We loaded kids one by one onto the boats and off they went. There were four girls who stayed together, all wearing Hijabs. I have never seen anyone wear one while sailing and was surprised when these girls were completely unaffected by the wind and more affected by the sail. I hopped into our chase boat and went out on Clipper Cove with our Program Manager to take pictures. What we saw as we went from boat to boat brightened our day. The kids’ demeanor had changed. Right there before our eyes in the span of a few moments these kids, all of them, were either engaged with their coach, dipping their hands in the water or sitting on the decks with the wind in their faces looking skyward. They marveled at the older EA students who were practicing around buoys in their FJ’s for an upcoming regatta. We could tell many of them were envious. As we went from boat to boat the kids each took a turn giving us their best pose or goofy look, each one trying to outdo the other. Eventually the kids came in and switched boats from keelboat to dinghy and vice versa after a very short break. During this second sail, I radioed the coaches and volunteers to come in. I had received another call from Coach Henry who now informed me that I had better get the kids back a bit early as some streets near the school were being closed due to protesting! We could not imagine, nor believe, that some adults were behaving like impetuous, petulant teenagers! God, help us!! While I hastened the boats back to the dock, it was difficult to organize the group to leave. They needed to get a group photo (several really, with different poses and funny looks) and were chatting up their coaches and my staff. The mood and the voices were boisterous, giddy and loud; like kids. Before they left, 22 out of the 27 signed up as being interested to join the sailing team! While I do not know what they went home to, I do know that while they were here, for those brief moments on the water, they were at peace. And not just them, all the staff and volunteers became one group, united for a purpose and connected by the water and the sport of sailing. That is what we do at Treasure Island Sailing Club! And, while I still have a difficult time describing how sailing has affected my own life, I can tell you it has, it does, and so long as I’m in this position and likely still breathing, it will! I hope in some small way that day that it affected these kids, too. I think it did!”
2023-11-05T01:27:04.277712
https://example.com/article/2474
About This Game CHANGE is an emotional homeless survival experience set in a randomly generated city with rogue-like elements. Explore, survive, earn perks, find items and more to develop your character and escape to a new life.
2023-11-29T01:27:04.277712
https://example.com/article/3619
These are from the weekend paper. Actual quotes from South Africa’s minister of foreign affairs, Nkosazana Dlamini-Zuma (Jacob Zuma’s ex-wife, and the ex-ex-minister of health who introduced the idea that AIDS is simply a disease of poverty, easily cured with garlic and African potatoes)… “A judge is not supposed to do that. It’s not for judges to decide on foreign policy. They don’t run government and they don’t run foreign policy. There is separation of powers. They run the judiciary. I don’t comment on the judiciary.” (This after a judge in SA’s constitutional court sided with the current minister of health that it was unadvised to prevent the Dalai Lama from visiting). “Tutu does not run government. Remember, he said he was not going to vote. If it were up to him, there would be no elections next month.” (In response to Archbishop Desmond Tutu declaring that he would now boycott the conference.) Which got even the usually intelligent finance minister, Trevor Manuel, involved: “Is he just the spiritual leader of the Buddhists in Tibet or is he the one who on March 28 1959 established the government of Tibet in exile in the same way Taiwan was established to counter the legality of a single China?” “The reason why the Dalai Lama wants to be here is to make a big global political statement about the secession of Tibet from China. He wants to do it on the free soil of SA,” Manuel said. “I am sure he is welcome to come at any other time but we should not allow him to raise the global issue that will impact on the standing of SA. Quite frankly this has nothing to do with the PSL (Professional Soccer League). It is a matter of the relationship between states and that is what we have to stand up for.” But, back to the continuing lunacy of the foreign minister: “Foreign policy has to be discussed and has to be understood. But at the end of the day we can’t all conduct foreign policy. I’m not casting any aspersions on anyone. But the truth of the matter that foreign policy has to be conducted at one level and has to be co-ordinated.” “China cannot bully us. But of course, they also have their own interests. As a country, they will further their own interests. But we are not hiding the fact that we want to have good relations with China – like everybody else in the world.” “Human rights are also about jobs, education and shelter. You can’t divorce economic interest from human rights. Our [Bill] of rights is much more broader than that of many countries.” “But when we took a decision on his visit we looked at what is the national interest -which includes making sure that the country runs, human rights, in the broad sense, are protected, people have food, shelter and jobs. What brings stability is the combination of each of all these rights.” Which earned the following response from Professor Geir Lundestad, director of the Norwegian Nobel Institute: “We are disappointed that the South African government did not stand up to Chinese pressure, particularly bearing in mind the strong support the ANC got from abroad and the Norwegian Nobel Committee in its historic struggle against apartheid.” And my take: claiming that denying the Dalai Lama entrance to a conference to discuss peace and global harmony is actually in the DEFENCE of human rights is the sort of double-speak gobbledygook you’d expect from a government with absolutely no respect for human rights. Claiming that Desmond Tutu, one of the greatest humanists alive, is in favour of the destruction of democracy because he WON’T vote in a political system that has become nothing but a collection of favouritism and corruption is just spurious bullshit. About the only ANC/government representative who has said anything approaching sense is the current Health Minister, Barbara Hogan (who has now earned the ire of the unsackable Dlamini-Zuma): “Just the very fact that this government has refused entry to the Dalai Lama is an example of a government who is dismissive of human rights. I believe [the government] needs to apologise to the citizens of this country, because it is in your name that this great man who has struggled for the rights of his country… has been denied access.” The government decision was, said the Dalai Lama, “another manifestation of one of the fundamental challenges to world peace as a whole: namely, a lack of understanding and mutual respect”. “I believe religious, social and political leaders throughout the world have a responsibility to ensure principles triumph over the obsession with money and power.” Except for the missing word “unearned” in front of “money and power”, I have no problem with those sentiments.
2024-06-28T01:27:04.277712
https://example.com/article/4629
The special counsel's office spent $3.2 million in its first four months probing ties between President Donald Trump's top advisors and Russia, according to a release issued Tuesday by the Department of Justice. The greatest expense was for the temporary reassignment of Justice Department employees, the report said, which totaled $1.2 million in the period. Payrolls for special counsel employees totaled about $500,000. The expenses are those incurred between the May 17 appointment of Robert Mueller as special counsel and Sept. 30. The special prosecutor's investigation of President Richard Nixon during the Watergate scandal cost about $16.5 million in inflation-adjusted dollars, according to data made available by The Nixon Library and Museum. That amounts to more than $3 million a month between the appointment of special prosecutor Archibald Cox in May 1973 and his firing in the "Saturday Night Massacre" on Oct. 20 of that year. The Whitewater investigation, which lasted much longer, was more costly. The independent counsel spent more than $60 million over the course of that six-year inquiry into then-President Bill Clinton. Spending on the probe escalated rapidly as the investigation concluded, Government Accountability Office figures showed at the time. It is likely that Mueller's investigation could last for years, according to an analysis of previous special counsel probes conducted by the data analysis website FiveThirtyEight. That analysis also found that Mueller's investigation is accelerating more rapidly than previous inquiries. On average, according to FiveThirtyEight, previous special counsel investigations that have filed criminal charges have taken more than a year to do so. Mueller's investigation has already charged four individuals with criminal wrongdoing. Two have pleaded guilty. The special counsel spent more than $700,000 acquiring equipment, according to the filing. It noted that the equipment would remain the property of the government at the end of the investigation. Among other expenses included in the filing are $111,245 spent on IT services, $24,456 on transcripts and $867 on "Investigative Reports/Information." The special counsel said in the filing that it asked Justice Department components, including groups such as the FBI, to track any expenditures that could be attributed to the investigation. The filing noted that tracking those costs are "neither legally required nor reported in prior Special Counsels' Statements of Expenditures." Those costs totaled about $3.5 million in addition to the $3.2 million spent from funds appropriated for the special counsel. Read the special counsel's full expense report:
2024-04-26T01:27:04.277712
https://example.com/article/1164
{ "name": "chromy", "version": "0.5.11", "description": "The library for manipulating headless chrome with Nightmare.js like API.", "main": "dist/index.js", "directories": { "test": "test" }, "scripts": { "pretest": "babel test --source-maps --out-dir dist_test", "test": "WITH_BABEL=1 mocha dist_test --compilers js:babel-core/register --require babel-polyfill", "document": "jsdoc ./src/ -c ./build/document.json", "clean": "reduce-blank ./docs/", "compile": "babel src --source-maps --out-dir dist --ignore '**/*.test.js'", "build": "npm run compile && npm run document && npm run clean", "lint": "eslint --ext .js src examples" }, "repository": { "type": "git", "url": "https://github.com/OnetapInc/chromy.git" }, "bugs": "https://github.com/OnetapInc/chromy/issues", "author": "shinji <dotneet@gmail.com>", "license": "MIT", "dependencies": { "async-chain-proxy": "^0.1.5", "babel-runtime": "^6.26.0", "chrome-launcher": "^0.10.2", "chrome-remote-interface": "^0.25.5", "jimp": "^0.2.28", "uuid": "^3.2.1" }, "devDependencies": { "babel-cli": "^6.24.1", "babel-plugin-syntax-async-functions": "^6.13.0", "babel-plugin-transform-builtin-extend": "^1.1.2", "babel-plugin-transform-runtime": "^6.23.0", "babel-preset-es2015": "^6.24.1", "docdash": "^0.4.0", "eslint": "^3.14.1", "eslint-config-standard": "^6.2.1", "eslint-friendly-formatter": "^2.0.7", "eslint-plugin-promise": "^3.6.0", "eslint-plugin-standard": "^2.0.1", "jsdoc": "^3.5.5", "marked": "^0.3.9", "mocha": "^3.3.0", "reduce-blank": "^0.2.0" } }
2024-01-09T01:27:04.277712
https://example.com/article/8196
It looks like this video doesn't exist! The broadcaster may have deleted this video.
2024-04-23T01:27:04.277712
https://example.com/article/1864
/** B80_ZK_2799Test.java. Purpose: Description: History: 2:58:35 PM Jul 6, 2015, Created by jumperchen Copyright (C) 2015 Potix Corporation. All Rights Reserved. */ package org.zkoss.zktest.zats.test2; import static org.junit.Assert.assertEquals; import java.util.Arrays; import org.junit.Test; import org.zkoss.zats.mimic.ComponentAgent; import org.zkoss.zats.mimic.DesktopAgent; import org.zkoss.zktest.zats.ZATSTestCase; import org.zkoss.zul.Label; /** * @author jumperchen * */ public class B80_ZK_2799Test extends ZATSTestCase { @Test public void test() { DesktopAgent desktop = connect(); ComponentAgent result = desktop.query("#result"); ComponentAgent testLabel = desktop.query("#testLabel"); ComponentAgent next = result.getNextSibling().getNextSibling(); int index = 0; for (String val : Arrays.asList("0", "1", "2", "3", "4", "5")) { assertEquals(val, result.getChild(index++).as(Label.class).getValue()); } assertEquals("[0, 1, 2, 3, 4, 5]", testLabel.as(Label.class).getValue().trim()); next.click(); index = 0; for (String val : Arrays.asList("0", "1", "102", "103", "2", "3", "4", "5")) { assertEquals(val, result.getChild(index++).as(Label.class).getValue()); } assertEquals("[0, 1, 102, 103, 2, 3, 4, 5]", testLabel.as(Label.class).getValue().trim()); next = next.getNextSibling(); next.click(); index = 0; for (String val : Arrays.asList("0", "1", "1022", "1021", "102", "103", "2", "3", "4", "5")) { assertEquals(val, result.getChild(index++).as(Label.class).getValue()); } assertEquals("[0, 1, 1022, 1021, 102, 103, 2, 3, 4, 5]", testLabel.as(Label.class).getValue().trim()); } }
2024-01-02T01:27:04.277712
https://example.com/article/5813
On the orienting value of attitudes: attitude accessibility as a determinant of an object's attraction of visual attention. Four experiments tested the hypothesis that objects toward which individuals hold attitudes that are highly accessible from memory (i.e., attitude-evoking objects) are more likely to attract attention when presented in a visual display than objects involving less accessible attitudes. In Experiments 1 and 2, Ss were more likely to notice and report such attitude-evoking objects. Experiment 3 yielded evidence of incidental attention; Ss noticed attitude-evoking objects even when the task made it beneficial to ignore the objects. Experiment 4 demonstrated that inclusion of attitude-evoking objects as distractor items interfered with Ss' performance of a visual search task. Apparently, attitude-evoking stimuli attract attention automatically. Thus, accessible attitudes provide the functional benefit of orienting an individual's visual attention toward objects with potential hedonic consequences.
2024-03-06T01:27:04.277712
https://example.com/article/2965
Q: How to get the user ID if the user is exist in the database? I have a database consists of 2 tables with one to many relationship between them . The first table "data" has (name , phone , personid) columns. The second table "links" has (linkid , link , personid) columns. I want to insert a new link to the links of a person if he already exists in the data table . $statement = $connect->prepare("SELECT * FROM data WHERE name = :sname AND phone = :sphone"); $statement->execute(array('sname' => $name , 'sphone' => $phone)); $count = $statement->rowCount(); if($count > 0){ $st = $connect->prepare("SELECT personid FROM data WHERE name = :sname AND phone = :sphone"); $id = $st->execute(array('sname' => $name , 'sphone' => $phone)); I want to get the ID if the user if he exist to use it to insert a new link to his links , So how could I get the ID? A: If you are expecting one column only, you can use fetchColumn(): $st = $connect->prepare("SELECT personid FROM data WHERE name = :sname AND phone = :sphone"); $st->execute(array('sname' => $name , 'sphone' => $phone)); $personID = $st->fetchColumn(); You can also use fetch() if you are expecting a single row return: $st = $connect->prepare("SELECT personid FROM data WHERE name = :sname AND phone = :sphone"); $st->execute(array('sname' => $name , 'sphone' => $phone)); $row= $st->fetch(PDO::FETCH_ASSOC); $personID = $row['personid']; $personID should hold the data from personid column returned from the query Note: If you already set the fetch style in your connection, you can omit PDO::FETCH_ASSOC
2023-10-16T01:27:04.277712
https://example.com/article/4385
772 N.W.2d 459 (2009) STATE of Minnesota, Respondent, v. Myon Demarlo BURRELL, Appellant. No. A08-1271. Supreme Court of Minnesota. August 20, 2009. Rehearing Denied October 5, 2009. *461 Lori Swanson, Minnesota Attorney General, St. Paul, MN, and; Michael O. Freeman, Hennepin County Attorney, Michael Richardson, Assistant County Attorney, Minneapolis, MN, for respondent. Benjamin J. Butler, Assistant State Public Defender, St. Paul, MN, for appellant. OPINION MAGNUSON, Chief Justice. Appellant Myon Demarlo Burrell was twice convicted of first-degree murder and attempted first-degree murder and sentenced to life in prison for the shooting death of Tyesha Edwards, an 11-year-old girl who was struck and killed by a stray bullet in her south Minneapolis home. On appeal from his second trial, Burrell challenges his conviction and sentence, arguing that the district court erred in (1) admitting evidence of prior bad acts, (2) admitting the testimony of a gang expert, (3) admitting the grand jury testimony of a deceased witness, and (4) imposing a harsher sentence than the sentence Burrell received after his first trial. We affirm in part, reverse in part, and remand. On November 22, 2002, Timothy Oliver was standing in the front yard of his aunt's house in south Minneapolis. Oliver belonged to a gang known as the Gangster Disciples. At approximately 3 p.m., a maroon Chevy Malibu drove toward the house where Oliver was standing. Oliver believed the car belonged to "Hans," who *462 belonged to a rival gang, the Bloods. Oliver observed a man he knew as "Ike" driving the car, and a man whom Oliver knew as "Little Skits" riding in the front passenger seat. Oliver testified that he and Ike "mean-mugged" each other before the car sped away. Minutes later, Oliver was standing on the front porch of his aunt's house when he heard gunshots from across the street. Oliver testified that he heard nine to ten gunshots and then ran to the side of the house. After the shooting ceased, Oliver returned to the front of the house and looked across the street. Oliver testified that he saw Little Skits standing between two houses, pointing a gun at him and pulling the trigger. Oliver further testified that he was not harmed in the shooting but his pants had a bullet hole in them. Shortly after 3 p.m. on November 22, police responded to a report of a shooting at the house next door to Oliver's aunt's home. When the police arrived, they found Tyesha Edwards lying on the dining room floor of her home. Edwards had been struck in the chest and killed by a .40 caliber bullet that had penetrated the wall of her home. The police recovered seven .40 caliber shell casings on the ground across the street from Edwards' and Oliver's aunt's houses. All seven shell casings were fired from the same gun. On November 25, 2002, the police arrested Oliver. Oliver told the police that Little Skits had shot at him, but that he did not know Little Skits' real name. Oliver correctly identified photos of Ike Tyson and Hans Williams. Oliver also identified a photo of appellant Myon Burrell as Little Skits. Later on November 25, the police arrested Tyson and Williams. Tyson told the police that Little Skits often stayed in Bemidji. When the police contacted the authorities in Bemidji, they learned that Little Skits was 16-year-old Myon Burrell. Tyson identified photos of Burrell as Little Skits. The police arrested Burrell on November 26, 2002. A Hennepin County grand jury indicted Burrell on eight counts: premeditated first-degree murder, Minn.Stat. § 609.185(a)(1) (2008); premeditated first-degree murder committed for the benefit of a gang, Minn.Stat. § 609.229, subd. 2 (2008); first-degree murder committed during a drive-by shooting, Minn.Stat. § 609.185(a)(3); first-degree murder committed during a drive-by shooting and committed for the benefit of a gang, Minn. Stat. § 609.229, subd. 2; attempted premeditated first-degree murder, Minn.Stat. § 609.185(a)(1); attempted premeditated first-degree murder committed for the benefit of a gang, Minn.Stat. § 609.229, subd. 2; attempted first-degree murder committed during a drive-by shooting, Minn.Stat. § 609.185(a)(3); and attempted first-degree murder committed during a drive-by shooting and committed for the benefit of a gang, Minn.Stat. § 609.229, subd. 2. After a jury trial before Hennepin County District Court Judge Steven A. Pihlaja, Burrell was found guilty as charged and sentenced to life in prison plus 198 months. On direct appeal, we reversed Burrell's convictions and remanded for a new trial on the grounds that (1) Burrell's Miranda waiver was ineffective, (2) expert testimony vouching for a witness's credibility was error, and (3) the district court erred by refusing to compel discovery of the State's plea negotiations with Burrell's codefendants. State v. Burrell, 697 N.W.2d 579, 597, 601, 605 (Minn.2005). On remand, Burrell's case was reassigned to Hennepin County District Court Judge Charles A. Porter. The State pursued *463 the same eight charges handed up by the grand jury and tried at Burrell's first trial. Before the second trial, over Burrell's objection, the district court issued an order admitting prior bad act and gang-related evidence.[1] At Burrell's second trial, the State elicited the following evidence implicating Burrell in the shooting. Esque Dickerson, a friend of Burrell's, testified that she spoke with Burrell shortly after his arrest. She admitted that she told her boyfriend that Burrell told her he was present at the "shooting [where] that little girl got killed." Dickerson also told her boyfriend that Burrell said that he and Tyson were in a red car, the model of which began with an "M." James Turner was housed in a jail cell adjacent to Burrell's while Burrell was awaiting trial. According to Turner, Burrell admitted to him that he was in jail because he had shot someone. Turner claimed that Burrell stated that he was shooting at a rival gang member but shot and killed "the little girl." Defense counsel impeached Turner with evidence that he is a paranoid-schizophrenic sex-offender who suffers from hallucinations. Dameon Leake is a member of the Rolling 60s Crips, a rival gang to the Gangster Disciples. Leake was a friend of Oliver's. According to Leake, while in jail, Burrell told him that he was "trying to smoke Little Timmy" when the "little girl" got killed. Defense counsel impeached Leake, arguing that Leake was hoping to receive a downward departure on an unrelated drug charge in exchange for his testimony. Terry Arrington is a member of the Black Stones, a gang which is affiliated with the Family Mob. Arrington testified that Burrell told him in jail that the bullet that hit Edwards went through "your boy" before it hit the house. Defense counsel elicited testimony on cross-examination that Arrington could reduce his own prison sentence by testifying against Burrell and others. Kiron Williams is a member of the Family Mob. He testified that while in jail in 2005, he accused Burrell of "killing kids." According to Williams, Burrell responded that the intended target was Williams' "homeboy." Williams interpreted this to refer to Oliver. Burrell's defense counsel elicited testimony from Williams that he received a downward departure on his sentence for testifying against Burrell and others. The State also introduced several incidents of Burrell's prior bad acts, pursuant to the district court's pre-trial ruling. During Leake's testimony, he claimed that in 2002, Burrell shot at him and three other men as they stood on the corner of Portland and Franklin in south Minneapolis. *464 Leake stated that Burrell yelled "Rolling 30s Bloods gang" while shooting. No one was hurt in the incident. Arrington testified that at some point before the Edwards shooting, Burrell shot from a car at Arrington, Oliver, and two other men as the men sat in Peavey Park in south Minneapolis. Arrington testified that Burrell wore a red rag on his hand and said "What up; Blood." as he fired. Deleon Walker, who was friends with Oliver and other members of the Family Mob and Gangster Disciples, testified that Burrell shot at him on November 25, 2002. Walker said that Burrell and another man walked past him and others in front of a Lake Street coffeehouse in south Minneapolis. According to Walker, Burrell shot at him, missed, and hit a Somali man. Brady Bell is Burrell's ex-girlfriend. She testified that at some point in 2000, Burrell shot at a car. According to Bell, she, Burrell, and two others were walking on a sidewalk. When a suspicious car approached the group, Bell became nervous that the occupants of the car would open fire on the group. Bell stated that she did not know who was in the car, but testified that the occupants of the car fired shots at the group and that Burrell shot at the car. During Burrell's second trial, the State called Isaac Hodge as its primary gang expert. Hodge has been a gang member since 1992, and described himself as the leader of the Family Mob beginning 1996. Hodge testified generally about the culture, colors, and territory of the Rolling 30s Bloods. Hodge stated that Bloods commit crimes, including drive-by shootings and drug sales. Hodge also described the violent rivalry between the Family Mob and the Bloods. Hodge stated that in gang culture, "[r]etaliation is a must." Hodge also testified that when someone joins a gang, that person is expected to "earn his stripes." According to Hodge, a gang member earns his stripes by becoming a rider, a person whose job is to ride around in vehicles and shoot at members of rival gangs. Hodge testified that Oliver was a rider and that Oliver had "shot the most Bloods out of everybody in our whole neighborhood." Hodge also claimed that some "older Bloods" had told him that a standing order existed among the Bloods to "blast [Oliver] on sight." Hodge gave his opinion that killing Oliver would have earned stripes for a young Blood. Finally, Hodge testified that it was common for gang members to "take" a case for a fellow gang member, meaning one gang member will take the fall for a crime committed by another, and that gang members do not cooperate with the police. Between Burrell's first and second trials, Oliver was killed. In a pretrial ruling, the district court ruled that Oliver's testimony from Burrell's first trial was admissible as substantive evidence and that Oliver's testimony before the grand jury was admissible only to the extent necessary to impeach his trial testimony. At the conclusion of Burrell's second trial, the district court found Burrell guilty of premeditated first-degree murder, Minn.Stat. § 609.185(a)(1); premeditated first-degree murder committed for the benefit of a gang, Minn.Stat. § 609.229, subd. 2; attempted premeditated first-degree murder, Minn.Stat. § 609.185(a)(1); and attempted premeditated first-degree murder committed for the benefit of a gang, Minn.Stat. § 609.229, subd. 2. The district court found Burrell not guilty of the four counts relating to committing a crime in the course of a drive-by shooting. The court entered a judgment of conviction for premeditated first-degree murder committed for the benefit of a gang, and attempted premeditated first-degree murder committed for the benefit of a gang. The *465 court sentenced Burrell to life plus 60 months in prison for the first conviction and to a consecutive term of 186 months in prison for the second conviction. Burrell appealed his conviction and sentence. I. Burrell argues that the district court erred in admitting evidence of four prior shooting incidents. We review a district court's evidentiary rulings for abuse of discretion. State v. Kennedy, 585 N.W.2d 385, 389 (Minn.1998). A defendant appealing the admission of evidence has the burden to show it was erroneous and prejudicial. Id. Generally, evidence is admissible only if it is relevant. Minn. R. Evid. 402. Evidence of a defendant's other crimes or bad acts is not admissible to prove the defendant's character for committing crimes. Minn. R. Evid. 404(b). Such evidence, often referred to as Spreigl evidence, may be admissible to show motive, intent, absence of mistake, identity, or a common scheme or plan. State v. Gomez, 721 N.W.2d 871, 877 (Minn.2006); see State v. Spreigl, 272 Minn. 488, 491, 139 N.W.2d 167, 169 (1965); Minn. R. Evid. 404(b). For Spreigl evidence to be admissible, the State must first provide notice of its intent to use the evidence. State v. Ness, 707 N.W.2d 676, 686 (Minn.2006). The State must also clearly indicate what the evidence is being offered to prove. Id. In addition, there must be clear and convincing evidence that the defendant was involved in the other crime or bad act, the evidence must be relevant and material to the State's case, and the probative value of the evidence must not be outweighed by the potential for unfair prejudice to the defendant. Id. If it is "a close call" whether the evidence should be admitted, the trial court should exclude it. Id. at 685. In this case, the district court ruled that Burrell's prior bad acts were relevant and material to Burrell's motive, and that the probative value of the evidence was not outweighed by the risk of unfair prejudice to Burrell. The court relied extensively on our decision in State v. Ness, 707 N.W.2d 676 (Minn.2006), where we stated that "[m]otive is not an element of most crimes, but the state is usually entitled to prove motive because `motive explains the reason for an act and can be important to a required state of mind.'" Id. at 687 (citing 8 Henry W. McCarr & Jack S. Nordby, Minnesota Practice-Criminal Law and Procedure § 32.19 at 451 (3d ed. 2001)). The court also found that although admitting the evidence of the bad acts created a risk of unfair prejudice to Burrell, the prior acts would be "highly probative" of Burrell's motive, "why a person would have been at the scene," and the "nature of the relationship between the Bloods gang" and Oliver. Burrell concedes that Minn. R. Evid. 404(b) allows for the admission of prior bad acts showing motive. But, according to Burrell, the only facts relevant to showing that the motive for the crime was gang retaliation were: (1) Burrell's membership in the Bloods, (2) Oliver's membership in the Family Mob, and (3) the ongoing rivalry between the two gangs. The prior acts of shooting at Leake, Arrington, Walker, or Oliver did not provide the "reason for [the] act" of shooting at Oliver, according to Burrell. Thus, according to Burrell, his prior bad acts were not relevant and material to the State's case, and the probative value of the evidence was outweighed by the potential for unfair prejudice. Burrell cites a handful of cases for the proposition that in order for a prior bad *466 act to demonstrate motive, the prior act must show a clear, non propensity-based motive theory for why the defendant committed the prior bad acts: "if not for the bad acts, the defendant would have had no reason to commit the charged offense." See State v. Kendell, 723 N.W.2d 597, 608 n. 8 (Minn.2006) (holding that evidence of prior murder was admissible to prove motive for a defendant who subsequently killed a witness to the original murder); State v. Ferguson, 581 N.W.2d 824, 834 (Minn.1998) (holding graffiti evidence admissible to show that gang affiliation was motive for murder was proper); State v. Nunn, 561 N.W.2d 902, 907-08 (Minn. 1997) (holding prior kidnapping conviction admissible where kidnapping victim told the defendant that the subsequent murder victim had stolen drugs and money from the defendant); State v. Scruggs, 421 N.W.2d 707, 715 (Minn.1988) (approving the admission of prior bad acts where State proved that the defendant killed the witness to prevent the witness from providing the police with information regarding the defendant's involvement in the crime). Burrell also relies on State v. Ness, 707 N.W.2d 676 (Minn.2006). In Ness, we held that a prior sex offense was not relevant to show the defendant's motive for committing a subsequent child sex abuse crime. Id. at 687. We said that Ness' motive for committing the subsequent crime was a desire for sexual gratification — not the commission of a prior sex crime. Id. In defending the district court' order allowing the evidence of Burrell's prior bad acts, the State relies heavily on Ferguson, 581 N.W.2d at 834. As noted, Ferguson upheld the admission of prior gang graffiti to show that the defendant's gang affiliation was the motive for the charged crime. Id. Here, according to the State, the prior bad acts are "even more compelling." We reject Burrell's argument. As a threshold matter, we do not agree that a prior bad act must provide the but-for reason for committing the charged offense. The touchstone of the inquiry is simply an evaluation of whether the evidence is material and relevant and whether the probative value of the evidence weighed against the potential for unfair prejudice. In cases where the prior bad act provides a clear motive for committing the charged offense, see, e.g., State v. Scruggs, 421 N.W.2d 707, 715 (Minn.1988), the evidence could be characterized as highly probative. In such a case, the likelihood that the risk of unfair prejudice outweighs the probative value of the evidence is diminished. Here, although the value of Burrell's prior bad acts is not overwhelming, we cannot say that these prior shooting incidents are irrelevant or immaterial to Burrell's motive. Rather, the prior shooting incidents shed light on why Burrell shot at Oliver on November 22, 2002. The pattern of shooting incidents shows a young man caught up in a violent rivalry with another street gang. This rivalry, illustrated by the prior shooting incidents, helps explain why Burrell would have shot at Oliver. Having concluded that the prior shootings are probative of Burrell's motive, we must next examine whether the probative value of the evidence was outweighed by the risk of unfair prejudice to Burrell. The evidence offered by the State was prejudicial. The evidence, although relevant to Burrell's motive, could also be used improperly to establish that Burrell has a propensity for committing violent crimes. In addition, the evidence could distort the integrity of the fact-finding *467 process by appealing to emotion and passion over reason. In Burrell's second trial, however, the evidence was presented to Judge Porter, and not to a jury. The distinction between a jury trial and a bench trial is important. The risk of unfair prejudice to Burrell is reduced because there is comparatively less risk that the district court judge, as compared to a jury of laypersons, would use the evidence for an improper purpose or have his sense of reason overcome by emotion. Cf. Schultz v. Butcher, 24 F.3d 626, 631-32 (4th Cir.1994) (holding that evidence should not have been excluded from a bench trial on the grounds of unfair prejudice); United States v. J.H.H., 22 F.3d 821, 829 (8th Cir.1994) ("[I]n a bench trial the prejudicial impact of erroneously admitted evidence, if any error there may be, `is presumed to be substantially less than it might have been in a jury trial'") (quoting United States v. Cardenas, 9 F.3d 1139, 1156 (5th Cir.1993)). Indeed, excluding relevant evidence at a bench trial on the grounds of unfair prejudice "is in a sense ridiculous." 4 Christopher B. Mueller & Laird C. Kirkpatrick, Federal Evidence § 4:13, at 655 (3d ed. 2007). After all, it is the district court judge who is called upon in the first instance to rule on the admissibility of the evidence. This is not to suggest that judges are immune from emotional appeals or the temptation to misuse evidence — they are not. But, taking into account the district court judge's experience and familiarity with the operation of the rules of evidence, the risk of unfair prejudice is lessened. Cf. State v. Sailer, 587 N.W.2d 756, 764 (Iowa 1998) (stating that a reviewing court should place "great confidence" in judges' ability to follow the law and should not assume that evidence was considered for an improper purpose without a clear showing). While the probative value of Burrell's prior shooting incidents is not great, the risk of unfair prejudice to Burrell in the context of a bench trial is similarly small. Therefore, we conclude that the district court acted within its discretion in admitting the evidence of Burrell's prior bad acts. II. Burrell next argues that the district court erred in admitting the expert testimony of Isaac Hodge as the State's "primary gang expert," and that this error was not harmless. Minnesota Rules of Evidence 702 allows expert testimony if the testimony will assist the jury in evaluating evidence or resolving factual issues. State v. Grecinger, 569 N.W.2d 189, 195 (Minn. 1997). The admissibility of expert testimony generally rests within the sound discretion of the district court. State v. Lopez-Rios, 669 N.W.2d 603, 613 (Minn.2003); State v. Koskela, 536 N.W.2d 625, 629 (Minn.1995). The district court's decision on whether to admit expert testimony is reviewed for a clear abuse of discretion. State v. Ritt, 599 N.W.2d 802, 810 (Minn. 1999). In State v. DeShay and in Lopez-Rios, we stated that gang-expert testimony should be admitted only if it is helpful to the jury in making the specific factual determinations that jurors are required to make. State v. DeShay, 669 N.W.2d 878, 884 (Minn.2003); Lopez-Rios, 669 N.W.2d at 613. We added that, in order to be admissible, gang-expert testimony must add precision or depth to the jury's ability to reach conclusions about matters that are not within its experience. Moreover, this testimony must be carefully monitored by the [district] court so that the testimony will not unduly influence *468 the jury or dissuade it from exercising its independent judgment. Even if acceptable under Rule 702, expert testimony should be excluded if its probative value is substantially outweighed by the danger of unfair prejudice. DeShay, 669 N.W.2d at 888 (citing Minn. R. Evid. 403). In DeShay and Lopez-Rios, we held that the admission of expert testimony on general gang activities and gang affiliation was error. DeShay, 669 N.W.2d at 888; Lopez-Rios, 669 N.W.2d at 613. In DeShay, we held that much of the gang expert's testimony was admitted erroneously because the testimony was duplicative of other lay testimony, giving little assistance to the jury in evaluating the evidence. 669 N.W.2d at 888. In Lopez-Rios, we held that much of the gang expert's testimony on general gang activities and gang affiliation was similarly erroneously admitted as the testimony was duplicative of previous witness testimony. 669 N.W.2d at 612-13. We also expressed our concern over the expert's testimony that the defendant was a member of a criminal gang. Id. In addition, we cautioned that expert testimony should not be used as a means to launder otherwise inadmissible hearsay. DeShay, 669 N.W.2d at 886. Despite our concerns, in both cases, we concluded that any error in admitting the evidence was harmless because the key facts — the defendant's involvement in a gang and the rivalry between two rival gangs — was thoroughly proved by other competent evidence. Id. at 888; Lopez-Rios, 669 N.W.2d at 612-14. See also State v. Blanche, 696 N.W.2d 351, 362, 374 (Minn. 2005) (disapproving of gang expert testimony that gang members sho[o]t at each other, gang members have to retaliate, and that gang members are not cooperative with the police.). We have not always rejected gang expert testimony. In State v. Jackson, 714 N.W.2d 681 (Minn.2006), we upheld the admission of certain aspects of the State's gang expert's testimony. In Jackson, the State's gang expert testified about the Bloods gang generally, discussing the gang's identifying hand signs and colors and the criminal activities in which Bloods gang members are involved. The expert also testified about the role of respect in Bloods culture. In addition, he stated that the defendant was associated with the Bloods gang and that, in his opinion, the victim was "murdered for the sake of the Bloods, [for] showing disrespect." Id. at 692. We held that the expert's testimony "about the general criminal activities of Bloods gang members was admissible because it assisted the jury in deciding whether the commission of crimes is one of the primary activities of the Bloods gang, a prerequisite for proving that the Bloods gang meets the statutory definition of a `criminal gang'" under Minn.Stat. § 609.229. Id. Further, we held that the testimony was helpful in proving motive and neither "belabored nor excessive," id., and noted that none of the expert's testimony relied on otherwise inadmissible hearsay. Id. at 692-93. Burrell contends that the district court erroneously admitted Hodge's testimony that "[r]etaliation is a must," that gang members are expected to "earn their stripes," do not cooperate with the police, and commit crimes, including drive-by shootings and drug sales. In addition, Burrell argues that Hodge's statement that a gang member will take a case for another gang member was inadmissible because it potentially vouched for the veracity of certain witnesses. Finally, Burrell argues that Hodge's testimony that "a couple [of] older Bloods" told him that an *469 order had gone out to kill Oliver was inadmissible hearsay. See DeShay, 669 N.W.2d at 886. We assume, without deciding that Burrell is correct in his assertion, that portions of Hodge's testimony were inadmissible under DeShay, Lopez-Rios, and Blanche. However, at Burrell's trial, it was largely uncontested that the Bloods and the Family Mob were engaged in a violent rivalry, and that Burrell and Oliver were gang members. Instead, Burrell took the position at trial that he was not the shooter. Given that the identity of the shooter was the primary contested issue at trial, the potential prejudicial effect of Hodge's expert testimony is lessened. Because none of Hodge's testimony directly implicated Burrell as the shooter, we conclude that the admission of Hodge's expert testimony, if error, was harmless beyond a reasonable doubt. III. Burrell argues that the district court committed reversible error by including in its findings of fact two facts drawn from Oliver's grand jury testimony: (1) testimony that Burrell was a member of the Bloods gang, and (2) testimony that Burrell was the shooter. Burrell alleges that this testimony is inadmissible hearsay. As previously discussed, in a pretrial ruling, the district court ruled that Oliver's testimony from Burrell's first trial was admissible as substantive evidence and that Oliver's testimony before the grand jury was admissible only to the extent necessary to impeach his trial testimony. A statement is hearsay if it was made outside of court and is offered in evidence to prove what it asserts. Minn. R. Evid. 801(c). Evidentiary rulings on hearsay statements are reviewed for clear abuse of discretion. State v. Henderson, 620 N.W.2d 688, 696 (Minn.2001). Burrell asserts that the district court violated its own pretrial ruling when it made the factual finding that "Oliver[] testified that he knew Skits was a member of the Bloods gang," because the testimony came from Oliver's grand jury testimony and not from Oliver's testimony at Burrell's first trial. Burrell makes the same objection to Oliver's grand jury testimony identifying Burrell as the shooter. We reject Burrell's argument that the admission of the grand jury testimony prejudiced him. First, there was no dispute that Burrell was a member of the Bloods, as five witnesses testified to this point at Burrell's trial. Further, Oliver testified at Burrell's first trial that the shooter was Little Skits, and correctly identified a photo of Burrell as Little Skits. Therefore, to the extent that the district court relied on Oliver's grand jury testimony as substantive evidence, Burrell's claim that he was prejudiced fails. IV. Finally, Burrell argues that the district court erred in imposing a longer sentence than the sentence imposed following Burrell's first trial. After his first trial, Burrell received a sentence of life plus 12 months in prison for committing first-degree murder. After his second conviction, the district court sentenced Burrell to life plus 60 months in prison for committing first-degree murder. The longer sentence is unlawful under State v. Holmes, 281 Minn. 294, 296, 161 N.W.2d 650, 652 (1968). As a matter of judicial policy in Minnesota, "a court cannot `impose on a defendant who has secured a new trial a sentence more onerous than the one he initially received.'" Hankerson v. State, 723 N.W.2d 232, 241 (Minn.2006) (quoting State v. Holmes, 281 Minn. 294, 296, 161 N.W.2d 650, 652 *470 (1968)). See also State v. Jackson, 749 N.W.2d 353, 358 (Minn.2008). The State concedes that Burrell's sentence violates the rule we adopted in Holmes. We therefore vacate Burrell's sentence for his first-degree murder conviction, and remand for resentencing with instructions to the district court to impose a sentence of no longer than life plus 12 months for Burrell's first-degree murder conviction. Affirmed in part, reversed in part, and remanded. NOTES [1] Prior to Burrell's second trial, Judge Porter ruled on a number of pretrial motions, two of which resulted in lengthy appellate review. The State made a motion to admit the expert testimony of police officers who specialized in criminal gangs. The district court denied the State's motion, but certified the question as important and doubtful, warranting interlocutory review. See Minn. R.Crim. P. 28.03. The court of appeals dismissed the State's appeal and we denied further review. State v. Burrell, No. A06-149, 2006 WL 2807166, at *5 (Minn.App. Oct. 3, 2006), rev. denied (Minn. Dec. 20, 2006). On March 26, 2007, the district court accepted Burrell's waiver of his right to a jury trial. Believing Judge Porter had made statements prejudicial to its case, the State requested that Judge Porter recuse himself. Judge Porter declined to recuse himself. The State petitioned the court of appeals for a writ of mandamus directing Porter's removal from the case. The court of appeals denied the State's petition and we affirmed. State v. Burrell, 743 N.W.2d 596, 598 (Minn.2008).
2023-11-12T01:27:04.277712
https://example.com/article/1676
Obesity is a chronic disease that has reached global epidemic proportions with over 1 billion adults being overweight (BMI 25-29.9) or obese (BMI>30). In the U.S.A. alone, the number of adults who are either overweight or obese is estimated to be over 150 million and is still on the rise. Currently marketed therapies (orlistat, sibutramine) have demonstrated sub-optimal efficacy (only 5-10% weight loss when used in combination with diet and exercise plans) and/or poor tolerability profiles. More recently, Sanofi Aventis' CB1 receptor antagonist, rimonabant, was withdrawn from the market due to adverse psychiatric side effects. The success of future obesity treatments will depend on their ability to elicit sustained and robust weight loss with improved safety/tolerability profiles. Obesity (BMI>30) is the long term consequence of an imbalance between energy intake and energy expenditure (Hill et al., 2000). Further, obesity is associated with decreased life span due to numerous co-morbidities that include coronary artery disease, hypertension, stroke, diabetes, hyperlipidemia, osteoarthritis and some cancers. Adiposity is a hallmark of obesity that results from the excessive deposition of the energy storage molecule triacylglycerol (TAG) in all tissues as well as an increase in overall adipose tissue mass due to increased adipocyte size and number. Increases in intracellular TAG and/or TAG precursors in non-adipocyte cell types, adipocyte invasion of non-adipose tissues, and increase in adipose mass are the causative factors of co-morbidities associated with obesity (Van Herpen et al., 2008). Recent studies suggest that the inhibition of diacylglycerol O-acyltransferase 1 (DGAT-1) may be an effective strategy to treat obesity and obesity associated co-morbidities (Chen et al., 2005; Shi et al., 2004). DGATs are membrane-bound enzymes that catalyze the terminal step of TAG biosynthesis (Yen et al., 2008). Two enzymes, which catalyze the acylation of diacylglycerol (DAG) to form TAG, have been identified and are designated DGAT-1 and DGAT-2. Importantly, the DGAT-1 and DGAT-2 enzymes have no significant protein sequence homology. In addition to catalyzing the acylation of DAG to form TAG, DGAT-1 has also been shown to catalyze the acylation of monoacylglycerol to form DAG (Yen et al., 2005). DGAT-1 and DGAT-2 null mice have been generated and extensively characterized (Smith eta l., 2000; Stone eta l., 2004). In detail, DGAT-2 null mice are lipopenic and die soon after birth from reductions in substrates for energy metabolism and from impaired permeability barrier function. In contrast, DGAT-1 mice are fertile and viable with a normal life span and do not become obese when fed a TAG rich diet. DGAT-1 null mice exhibit both reduced postprandial plasma TAG levels and increased energy expenditure, but have normal levels of circulating free fatty acids. Conversely, transgenic mice that over-express DGAT-1 in adipose tissue are predisposed to obesity when fed a TAG rich diet and have elevated levels of circulating free fatty acids (Chen et al., 2002). In humans, DGAT-1 is highly expressed in several tissue types that are relevant to obesity, such as intestine, liver and adipose (Yen et al., 2008). Further, DGAT-1 is predominantly localized to the lumen of the endoplasmic reticulum (Yamazaki et al., 2005). Thus, there are several sites of action for a DGAT-1 inhibitor that can lead to both a reduction in adiposity and body weight. First, blocking DGAT-1 activity in the intestine or liver will inhibit the export of chylomicron and VLDL particles, respectively, thereby reducing peripheral TAG deposition that originates either from dietary TAG re-esterification or from de novo lipogenesis. Second, blocking DGAT-1 activity in adipose tissue will decrease both adipocyte size and number. In both cases, non-esterified fatty acids will be mobilized for use as an energy source rather than used for storage. DGAT-1 inhibition may also generate a peripheral satiety signal resulting in an anorexigenic effect. The phenotype of the DGAT-1 null mice, coupled with DGAT-1's role in human whole body TAG homeostasis, provides a compelling rationale for the investigation of DGAT-1, as a target for the treatment of obesity. Recently, the in vivo pharmacology of a potent orally bioavailable DGAT-1 inhibitor was disclosed (Zhao et al., 2008). Proof of concept studies in rodent models of obesity with this inhibitor demonstrated target engagement, weight loss and reductions in adiposity. This inhibitor showed high oral bioavailability and high systemic exposure. High systemic exposure of a DGAT-1 inhibitor can potentially result in undesirable side effects such as reduced lactation in nursing females, reduced sebum production, and exacerbation of myocardial injury during ischemia. In detail, human milk TAGs are a major source of nutrition to the nursing infant and systemic inhibition of DGAT-1 would reduce milk TAG production. Female DGAT-1 null mice are unable to nurse their pups due to reduced lactation. Triglycerides are also a major component of human sebum, which is an important skin lubricant. Systemic inhibition of DGAT-1 would reduce sebum production and may result in skin and hair disorders as observed in DGAT-1 null mice. Finally, the systemic inhibition of DGAT-1 could substantially increase free fatty acid availability and utilization by the heart. During ischemia, the utilization of a less efficient fuel source such as fatty acids rather than glucose may enhance myocardial injury. One approach to improve the therapeutic index of DGAT-1 inhibitors is to exclusively target DGAT-1 expressed in the enterocyte by restricting drug exposure primarily to enterocytes. DGAT-1 inhibitors with low systemic exposure and good oral bioavailability specifically targeted to enterocytes would avoid safety issues potentially associated with compounds that reach high levels in the systemic circulation.
2024-06-22T01:27:04.277712
https://example.com/article/4108
Story highlights The U.S. Coast Guard says 12 Cubans were picked up at sea They were taken aboard the "Disney Wonder" cruise ship The suspected migrants will be handed over to authorities in Grand Cayman (CNN) A Disney cruise ship stopped on its way to the Cayman Islands to pick up 12 suspected migrants southeast of Cuba, the U.S. Coast Guard said Sunday. Disney Wonder was heading from Miami to Grand Cayman when the group of suspected migrants was spotted around 8 p.m. Saturday, according to a source with knowledge of the incident. The migrants were brought aboard the boat, which boasts "11 decks overflowing with restaurants, pools, recreation and more." Disney Wonder won for "best entertainment" and "best service" in the 2016 Cruisers' Choice Awards from CruiseCritic.com. The 12 suspected migrants, who were all Cuban, were on a "rustic" vessel, U.S. Coast Guard 7th District spokesman Jon-Paul Rios said. "Rustic" is a term authorities use to describe dangerous, unseaworthy vessels, Rios said. JUST WATCHED 2015: Passing Disney cruise rescues man in water Replay More Videos ... MUST WATCH 2015: Passing Disney cruise rescues man in water 01:03 The suspected migrants are being turned over to Grand Cayman authorities, Rios said.
2024-01-15T01:27:04.277712
https://example.com/article/9521
Get everything you need to homeschool, for less
2024-05-12T01:27:04.277712
https://example.com/article/5464
It is possible that Stephen Bannon is the most powerful person in a Republican Party that is in danger of no longer being the Republican Party and ultimately losing an epic landslide to the Democratic Party in the midterm elections of 2018. In an interview with the New York Times days before Virginia voted, Bannon said his candidate for governor, Ed Gillespie, would run so strongly that Democrats should be fearful of the prospect of Trumpism without Trump. “He’s closed an enthusiasm gap by rallying around the Trump agenda,” Bannon said. ADVERTISEMENT Bannon was right about one thing: Ed Gillespie, the Washington insider who ran as a Trump-style populist, implementing racially divisive, culture-warrior politics, sure did close the enthusiasm gap. Before the Virginia voting, it was widely thought by political insiders and widely discussed in political media that it was the Democrats who suffered from an enthusiasm gap. After the Virginia vote, the political world was stunned by the magnitude of enthusiasm and voter turnout by liberals, moderates, minorities, gays, women and independents who are appalled and alarmed by what Trump is doing to America. It is indeed possible that Bannon succeeds in his all-out war against the Republican establishment, which he continued shortly after the Virginia voting by calling for the resignation of Senate Majority Leader Mitch McConnell (R-Ky.). If Bannon succeeds, he could be viewed as the most powerful Republican in America, though after the Virginia vote, a growing number of Republicans may belatedly join the Trump resistance. Most likely, the Republicans will become neither the party of Trump nor the party of Bannon. Rather, they will become the party of Ed Gillespie-type candidates — weak-willed leaders who fail to stand up to Trump when it counts and pretend to be sympathetic to Trump policies and practices they privately deplore, from a president they privately view with disdain. To the degree Bannon is a political king or kingmaker, he presides over a small and shrinking kingdom, composed of some 35 percent of the nation, surrounded by a majority of the nation that is hostile to his vision, alarmed by his plans and determined to vote in humongous numbers. In the political empire of Trump, the emperor has no clothes. Few Americans want to wake up every morning and learn who their president has insulted that day. Most Americans do not want culture wars or racial conflicts to divide their country or deform our politics. Patriotic Americans do not want their president supported by a foreign dictator who attacks our democracy, and they do not want a president who has too often praised foreign dictators for reasons that are unfathomable. Americans do not want a president who promises to drain the swamp, as Trump did, and governs as a crony capitalist, as Trump does. Whatever the size of the kingdom that Trump or Bannon may command, it is small by the standards of our great nation, and shrinking by the standards of approval ratings that repeatedly fall to new all-time lows. First, Republicans called liberals Republicans in name only and chased them out of the GOP. Then, the "true believers" made moderate Republicans their targets and began to treat them with contempt. Now, both the GOP health-care policy fiasco and the GOP tax plans could destroy the political careers of Republicans who represent blue states, while Bannon wages his political wars against moderately conservative Republicans and GOP leaders in Congress. American politics has reached a cruel and unusual political state. Former DNC Chairwoman Donna Brazile is becoming the favorite Democrat of Republicans, after her appalling book made news days before the 2017 elections. Meanwhile, Steve Bannon has become the favorite Republican of Democrats following the GOP debacle on election day. Brent Budowsky was an aide to former Sen. Lloyd Bentsen (D-Texas) and former Rep. Bill Alexander (D-Ark.), who was chief deputy majority whip of the U.S. House of Representatives. He holds an LLM in international financial law from the London School of Economics.
2024-02-18T01:27:04.277712
https://example.com/article/6080
"Free Roxana" protest in Paris Members of Reporters Without Borders, including its Secretary-General Jean-Francois Julliard, amassed on a sidewalk Tuesday outside the Paris offices of Iran Air to protest Roxana’s imprisonment, the Associated Press reported. Read it here
2023-11-04T01:27:04.277712
https://example.com/article/7868
In the interest of full disclosure, I need to say that I love the Punch Line anime. When this game was first announced, I was extremely excited to get more. But that excitement immediately led to disappointment. No way would they bring a visual novel based off an anime that flew under the radar to the West, right? Well, to my pleasant surprise, it turns out that they would. When it launched late last year, two-and-a-half years after its Japanese release, the PC version was listed as launching alongside its console counterparts. Come release day, however, it was mysteriously absent from any storefronts. Now, another half a year or so later and here we are. It took three years for me to finally be able to play this game. And while Punch Line probably won’t mean nearly as much to anyone who wasn’t already totally sold by the anime, I’m happy with it overall. Punching weight At first blush, it’s perfectly understandable to look at Punch Line and assume it’s one of “those” games. You know, ones meant for simple titillation and not much else. I thought the same thing back when I first heard about the anime. But then I saw that it was being written by Koutarou Uchikoshi, the man behind the Zero Escape series. That made it clear to me that it was unlikely to be the sleazy panderfest I initially assumed. All-in-all, it actually has an intriguing story with a lot of mysteries and a fair amount of depth. Punch Line tells the story of Yuta Iridatsu, a resident of a boarding house called Korai House. Yuta and his housemate, Rabura Chichibu, are returning home on a bus from seeing Yuta’s sister, Akina, off at the airport. But then their bus is hijacked by armed members of the Qmay group, a doomsday cult. Before things get too out of a hand, a superhero known only as Strange Juice arrives on the scene and fights off the cultists before being caught off guard by their leader, Ryuto Teruoka. But Yuta has a secret. Seeing a woman’s undergarments causes his hair to turn red and gives him superpowers. Hey, I didn’t say it was a good secret. After transforming due to inadvertently catching an eyeful, he lunges at Teruoka, taking the two of them through a window and into the ocean. Upon being rescued by Strange Juice, however, Yuta is forced out of his body by an unseen assailant. When he wakes up at Korai House, he’s an astral projection that no one can see and his bodysnatcher has holed themselves up in his room and warded it off with talismans. Gotta scare ’em all The plot gets waaaaay more complicated, as Uchikoshi fans might expect. But this setup is where the central gameplay hook comes into focus. Yuta needs to get his body back but can’t do much in spirit form. Luckily, he gets some guidance from a spirit cat named Chiranosuke. The cat tells him that he can get his body back, but he needs to find a book known as the Nandara Gandara. In order to get it, he’ll need to raise his spirit level by collecting soul fragments from the residents of Korai House. As Yuta is in spirit form, he can travel through walls and floors and go into the rooms of his housemates. At first, he only has very limited spirit abilities that allow him to freeze time and manipulate things. He needs to scare the others, which causes him to gain soul fragments, which allow him to level up. Once his spirit level is high enough, he then needs to set up a trick chain in order to achieve a goal. During trick segments, Yuta can choose which room to visit in whatever order he wants, which adds a bit of freedom. This is fairly similar in concept to the classic game Ghost Trick. An early chain requires Yuta to get his housemate Mikatan Narugino to find a key to open her locked desk drawer. The key is in the room of Meika Daihatsu, Korai House’s landlady. Each trick and trick chain are extremely basic gameplay-wise. You can’t move around freely, unfortunately. Instead, you get access to a few camera angles which allow you to look around the other rooms. Certain objects have a prompt next to them that Yuta can activate to scare the inhabitant or set up part of a chain. That’s the spirit These are really simple and self-explanatory in the early part of Punch Line. Yuta can only use his spirit abilities a few times, however, and using them all without leveling up or successfully completing the chain will cause him to fail his mission. When he fails, a meteor destroys the entire planet. There’s a good reason for that, I promise. The main challenge in these segments is picking the right prompts, but it’s generally really obvious. For the chain segments, events are set in motion by selecting the prompt with the word “go” written above it. The main obstacle in these segments ties into the game’s undergarment obsession. The right side of the screen has a gauge. When Yuta sees his housemates’ underwear, this gauge increases. If it goes up all the way? You guessed it. Meteor destroys the planet again. Luckily, Yuta can use his spirit abilities to rewind time to before his latest error. Later trick segments add really strict timers and harder-to-find prompts, so you’ll likely end up destroying the world a few times before all is said and done. Partway through the game, there’s a major story development and these sections dry up, leaving the latter parts of Punch Line as a straight visual novel. Narratively, it has to be this way, but it still feels a little weird to be told that you’re about to pull off your final trick when there’s still hours of stuff left to see. Still, the gameplay segments aren’t all that great to begin with. Punch Line‘s strengths definitely lie in its story. Catch a glimpse Visually, Punch Line is very dated. Not only is this a three-year-old game, but it’s also a port of a Vita game. Therefore, it looks like a game that could have come out in the late ’00s or even earlier. Most of the game’s events are told in full 3D, though. All of the major characters have character models and a host of animations. They also have mouth movements that sync up with the voices. The character models look okay, but their animations are kind of rough and very, very repetitive. The game’s environments fare much worse. Everything is low resolution and lacking a certain amount of detail. One thing’s for sure, though – this game definitely doesn’t require the GTX 1080 that the store page recommends. Punch Line also uses footage from the anime for certain scenes and stills for others. Some of these are still shots from the anime that even have mouth flaps and minor animations, which is cool to see. The audio, naturally, is much better. Punch Line has a fantastic voice cast, including such favorites as Haruka Tomatsu and Rie Kugimiya. Since this is a visual novel, there’s a ton of spoken dialogue. Fans of the show will likely love hearing all the new conversations delivered by these excellent performers. However, as people familiar with visual novels would expect, there’s no English dub at all. So, if that’s a dealbreaker for you, you’ll want to steer clear. Port problems Unfortunately, this port has a major issue that I find fairly detrimental. When set to full-screen, the game defaults at 60 FPS. The problem is that the game’s logic is locked at 30, so all animations run at double speed. The only way to solve this is to run the game in windowed mode or use an application to limit the FPS. There also aren’t any resolution options. On top of that, there are still several typos or grammatical errors. Each of the game’s 22 “episodes” starts with a little music video, and each one of these spells the word “director” as “directer.” Plus, sometimes the text refers to characters by the wrong name. Punch Line is a decent length and is a lot longer to get through than the four-hour anime that preceded it. Most of the expanded material takes place during the timeline of the first 6 episodes of the show. Once it gets past that point, though, the episodes get much, much shorter. Earlier episodes can take a couple of hours each, but later ones are sometimes only about 20 minutes. The penultimate episode is also just basically the final episode of the anime, which might disappoint some. Overall, I really enjoyed this game. As a big fan of the anime, Punch Line delivered most of what I wanted. The visuals are very dated, the gameplay dispersion is uneven, and some of the later episodes seem too brief, but it’s definitely an example of a solid visual novel. Despite the way it appears initially, the story is a rollercoaster that is oftentimes very funny, tragic, and bittersweet. This version could use some fixing, but I’m really quite glad about how it turned out and even more glad that I got to play it.
2023-12-22T01:27:04.277712
https://example.com/article/5788
“We are not there yet so we are not going to think about it at the moment. But it is an interesting proposition and when the time comes, we will sit down and talk.” Franco Morbidelli will also be added to the equation as he looks to retain his spot on the MotoGP grid with Petronas Yamaha, while the team will be a very attractive option for up-and-coming riders given the M1 package is considered the easiest to adapt to in the premier class. “Of course we have a number of young riders in our view for 2021 and riders who perform well this year will definitely be considered in 2021,” he said. The Petronas Yamaha chief also sees Quartararo’s rapid rise as a strong compliment to his team’s efforts in MotoGP having only made its top-class debut last year. Quartararo made a strong start to 2020 by topping the Sepang pre-season test. But rather than resting on its success, Razali says the satellite Yamaha squad remains fully fixated on achieving its 2020 targets. “We are very proud that he [Quartararo] has secured his career with Yamaha for an additional two years,” he explained. “I think it is only natural for a rider from the satellite team to go to the factory team, that is a natural progression and we are very happy for him. “At the same time, to focus on 2020 we expect him to continue with his good work from last year and to better this year. It is a defining year for him with higher expectations on him this year so we hope that we will continue with his good work from 2019 into 2020.” Given Rossi’s intention to make a call on his MotoGP future after gauging his competitiveness with the 2020 Yamaha M1 from the opening races, Petronas Yamaha won’t be expected to finalise its 2021 rider line-up until the summer.
2024-01-30T01:27:04.277712
https://example.com/article/3702
Search form Deeplinks Blog Deeplinks Blog Last week we warned you about a new stealth PATRIOT-expansion bill that the Senate Intelligence Committee will consider in closed session later this week. In addition to renewing many of the USA PATRIOT Act's most troubling provisions, the new bill would give the FBI the power to issue... Bill Gives Justice Department More Power to Demand Private Records On Thursday, May 26, the Senate Select Committee on Intelligence will consider in closed session a draft bill that would both renew and expand various USA PATRIOT Act powers. The Electronic Frontier Foundation (EFF) has obtained a copy of the... The most recent edition of Regulation, a magazine published by the Cato Institute, includes an excellent article entitled "Against ISP Liability" [PDF] by Cato's own Jim Harper. Jim's article responds to an earlier article by Professor Douglas Lichtman, "Holding Internet Service Providers Accountable" [PDF], in which Doug... NOTE: THIS RELEASE COMES FROM THE ACLU OF NORTHERN CALIFORNIA. EFF IS RECIRCULATING IT FOR YOUR INFORMATION. Bill to Protect Californians' Privacy, Personal Safety, and Financial Security Advances in State Senate Sacramento - The State Senate yesterday approved a bill with broad bipartisan support (29:7) that would prohibit state and... Response to EFF's white paper on how to blog anonymously has been overwhelming. While there have been plenty of positive reactions, there are also a few basic criticisms we'd like to respond to. They boil down to two questions: (1) why didn't you mention more/better ways to be... Ruling Is a Victory for Innovation, Fair Use Washington, DC - In a landmark case, the US Court of Appeals for the DC Circuit today struck down the "Broadcast Flag," an FCC rule that would have crippled digital television receivers beginning on July 1st. The Broadcast Flag rule... In a unanimous decision, the DC Circuit Court of Appeals tossed out the broadcast flag, the FCC rule that would have crippled digital television receivers starting July 1. The ruling came in ALA v. FCC, a challenge brought by Public Knowledge, EFF, Consumers Union, the Consumer Federation of... Writer Danny O'Brien Will Join Staff and Lead Grassroots Campaigns San Francisco, CA - The Electronic Frontier Foundation (EFF) is pleased to announce that Danny O'Brien will be joining the organization as its new Activism Coordinator. Current Activism Coordinator Ren Bucholz will be moving to Canada later this month and... On April 14-15 (after the three-day WIPO Development Agenda meeting, a.k.a. IIM), the WIPO Permanent Committee for Co-operation for Development Related to Intellectual Property (the PCIPD) met for its fourth session. The PCIPD is a pre-existing WIPO sub-committee, formed in 1998. There's no formal relationship between the Development... Creators of Tor, an Anonymous Communication System, Discuss Their Work at May 10 BayFF San Francisco, CA - On Tuesday, May 10, the Electronic Frontier Foundation (EFF) will host another "BayFF," a free event series for the general public. This month, the subject is anonymous Internet communication. Roger Dingledine, principal... The New York State Attorney General's office today announced it has filed a lawsuit against Intermix Media for deceiving users into installing and using spyware. The complaint charges Intermix civilly with several violations of New York statute and common law. The lawsuit is a step forward for end-users... A California bill (SB 682) that would bar the use of radio frequency identification (RFID) tags in state-issued ID cards yesterday cleared the Senate Judiciary Committee -- the first major hurdle on the way to becoming law. The good news comes in the wake of a ...
2023-11-17T01:27:04.277712
https://example.com/article/1086
/* * Copyright 2019 Red Hat, Inc. and/or its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.drools.modelcompiler.builder.generator.visitor.pattern; import java.util.ArrayList; import java.util.List; import java.util.Optional; import java.util.Set; import com.github.javaparser.ast.expr.Expression; import com.github.javaparser.ast.expr.MethodCallExpr; import com.github.javaparser.ast.expr.StringLiteralExpr; import org.drools.compiler.lang.descr.BaseDescr; import org.drools.compiler.lang.descr.PatternDescr; import org.drools.modelcompiler.builder.PackageModel; import org.drools.modelcompiler.builder.generator.DeclarationSpec; import org.drools.modelcompiler.builder.generator.RuleContext; import org.drools.modelcompiler.builder.generator.drlxparse.DrlxParseSuccess; import org.drools.modelcompiler.builder.generator.visitor.DSLNode; import static org.drools.modelcompiler.builder.generator.DrlxParseUtil.findLastMethodInChain; import static org.drools.modelcompiler.builder.generator.DrlxParseUtil.findRootNodeViaScope; import static org.drools.modelcompiler.builder.generator.DslMethodNames.PATTERN_CALL; import static org.drools.modelcompiler.builder.generator.DslMethodNames.WATCH_CALL; class PatternDSLPattern extends PatternDSL { protected PatternDSLPattern(RuleContext context, PackageModel packageModel, PatternDescr pattern, List<? extends BaseDescr> constraintDescrs, Class<?> patternType) { super(context, packageModel, pattern, constraintDescrs, patternType); } @Override protected void buildPattern(DeclarationSpec declarationSpec, List<PatternConstraintParseResult> patternConstraintParseResults) { MethodCallExpr patternExpression = createPatternExpression(pattern, declarationSpec); List<Expression> exprs = new ArrayList<>(); context.pushExprPointer(exprs::add); buildConstraints(pattern, patternType, patternConstraintParseResults); context.popExprPointer(); List<Expression> additionalPatterns = new ArrayList<>(); for (Expression expr : exprs) { Optional<Expression> rootScope = findRootNodeViaScope(expr ); if ( rootScope.isPresent() && (( MethodCallExpr ) rootScope.get()).getNameAsString().equals( PATTERN_CALL ) ) { additionalPatterns.add( expr ); } else { MethodCallExpr currentExpr = ( MethodCallExpr ) expr; findLastMethodInChain( currentExpr ).setScope( patternExpression ); patternExpression = currentExpr; } } context.addExpression( addWatchToPattern( patternExpression ) ); additionalPatterns.forEach( context::addExpression ); } @Override public MethodCallExpr input(DeclarationSpec declarationSpec) { return addWatchToPattern( createPatternExpression(pattern, declarationSpec) ); } private MethodCallExpr addWatchToPattern( MethodCallExpr patternExpression ) { if (context.isPropertyReactive(patternType)) { Set<String> settableWatchedProps = getSettableWatchedProps(); if ( !settableWatchedProps.isEmpty() ) { patternExpression = new MethodCallExpr( patternExpression, WATCH_CALL ); settableWatchedProps.stream().map( StringLiteralExpr::new ).forEach( patternExpression::addArgument ); } } return patternExpression; } private MethodCallExpr createPatternExpression(PatternDescr pattern, DeclarationSpec declarationSpec) { MethodCallExpr dslExpr = new MethodCallExpr(null, PATTERN_CALL); dslExpr.addArgument( context.getVarExpr( pattern.getIdentifier()) ); if (context.isQuery()) { Optional<Expression> declarationSource = declarationSpec.getDeclarationSource(); declarationSource.ifPresent(dslExpr::addArgument); } return dslExpr; } private void buildConstraints(PatternDescr pattern, Class<?> patternType, List<PatternConstraintParseResult> patternConstraintParseResults) { for (PatternConstraintParseResult patternConstraintParseResult : patternConstraintParseResults) { buildConstraint(pattern, patternType, patternConstraintParseResult); } } @Override protected DSLNode createSimpleConstraint( DrlxParseSuccess drlxParseResult, PatternDescr pattern ) { return new PatternDSLSimpleConstraint( context, pattern, drlxParseResult ); } }
2023-09-16T01:27:04.277712
https://example.com/article/3705
{ "cells": [ { "cell_type": "markdown", "metadata": { "id": "MhoQ0WE77laV" }, "source": [ "##### Copyright 2019 The TensorFlow Authors." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "cellView": "form", "id": "_ckMIh7O7s6D" }, "outputs": [], "source": [ "#@title Licensed under the Apache License, Version 2.0 (the \"License\");\n", "# you may not use this file except in compliance with the License.\n", "# You may obtain a copy of the License at\n", "#\n", "# https://www.apache.org/licenses/LICENSE-2.0\n", "#\n", "# Unless required by applicable law or agreed to in writing, software\n", "# distributed under the License is distributed on an \"AS IS\" BASIS,\n", "# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n", "# See the License for the specific language governing permissions and\n", "# limitations under the License." ] }, { "cell_type": "markdown", "metadata": { "id": "jYysdyb-CaWM" }, "source": [ "# 훈련 루프와 함께 tf.distribute.Strategy 사용하기" ] }, { "cell_type": "markdown", "metadata": { "id": "S5Uhzt6vVIB2" }, "source": [ "<table class=\"tfo-notebook-buttons\" align=\"left\">\n", " <td>\n", " <a target=\"_blank\" href=\"https://www.tensorflow.org/tutorials/distribute/custom_training\"><img src=\"https://www.tensorflow.org/images/tf_logo_32px.png\" />TensorFlow.org에서 보기</a>\n", " </td>\n", " <td>\n", " <a target=\"_blank\" href=\"https://colab.research.google.com/github/tensorflow/docs-l10n/blob/master/site/ko/tutorials/distribute/custom_training.ipynb\"><img src=\"https://www.tensorflow.org/images/colab_logo_32px.png\" />구글 코랩(Colab)에서 실행하기</a>\n", " </td>\n", " <td>\n", " <a target=\"_blank\" href=\"https://github.com/tensorflow/docs-l10n/blob/master/site/ko/tutorials/distribute/custom_training.ipynb\"><img src=\"https://www.tensorflow.org/images/GitHub-Mark-32px.png\" />깃허브(GitHub) 소스 보기</a>\n", " </td>\n", " <td>\n", " <a href=\"https://storage.googleapis.com/tensorflow_docs/docs-l10n/site/ko/tutorials/distribute/custom_training.ipynb\"><img src=\"https://www.tensorflow.org/images/download_logo_32px.png\" />Download notebook</a>\n", " </td>\n", "</table>" ] }, { "cell_type": "markdown", "metadata": { "id": "tUP8LMdYtWPz" }, "source": [ "Note: 이 문서는 텐서플로 커뮤니티에서 번역했습니다. 커뮤니티 번역 활동의 특성상 정확한 번역과 최신 내용을 반영하기 위해 노력함에도\n", "불구하고 [공식 영문 문서](https://www.tensorflow.org/?hl=en)의 내용과 일치하지 않을 수 있습니다.\n", "이 번역에 개선할 부분이 있다면\n", "[tensorflow/docs-l10n](https://github.com/tensorflow/docs-l10n/) 깃헙 저장소로 풀 리퀘스트를 보내주시기 바랍니다.\n", "문서 번역이나 리뷰에 참여하려면\n", "[docs-ko@tensorflow.org](https://groups.google.com/a/tensorflow.org/forum/#!forum/docs-ko)로\n", "메일을 보내주시기 바랍니다." ] }, { "cell_type": "markdown", "metadata": { "id": "FbVhjPpzn6BM" }, "source": [ "이 예제는 사용자 정의 훈련 루프(custom training loops)와 함께 [`tf.distribute.Strategy`](https://www.tensorflow.org/guide/distributed_training)를 사용하는 법을 보여드립니다. 우리는 간단한 CNN 모델을 패션 MNIST 데이터셋에 대해 훈련을 할 것입니다. 패션 MNIST 데이터셋은 60000개의 28 x 28 크기의 훈련 이미지들과 10000개의 28 x 28 크기의 테스트 이미지들을 포함하고 있습니다.\n", "\n", "이 예제는 유연성을 높이고, 훈련을 더 잘 제어할 수 있도록 사용자 정의 훈련 루프를 사용합니다. 또한, 사용자 훈련 루프를 사용하는 것은 모델과 훈련 루프를 디버깅하기 쉬워집니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "dzLKpmZICaWN" }, "outputs": [], "source": [ "# Import TensorFlow\n", "import tensorflow as tf\n", "\n", "# 헬퍼 라이브러리들\n", "import numpy as np\n", "import os\n", "\n", "print(tf.__version__)" ] }, { "cell_type": "markdown", "metadata": { "id": "MM6W__qraV55" }, "source": [ "## 패션 MNIST 데이터셋 다운로드" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "7MqDQO0KCaWS" }, "outputs": [], "source": [ "fashion_mnist = tf.keras.datasets.fashion_mnist\n", "\n", "(train_images, train_labels), (test_images, test_labels) = fashion_mnist.load_data()\n", "\n", "\n", "# 하나의 차원을 배열에 추가 -> 새로운 shape == (28, 28, 1)\n", "# 이렇게 하는 이유는 우리의 모델에서 첫 번째 층이 합성곱 층이고\n", "# 합성곱 층은 4D 입력을 요구하기 때문입니다.\n", "# (batch_size, height, width, channels).\n", "# batch_size 차원은 나중에 추가할 것입니다.\n", "\n", "train_images = train_images[..., None]\n", "test_images = test_images[..., None]\n", "\n", "# 이미지를 [0, 1] 범위로 변경하기.\n", "train_images = train_images / np.float32(255)\n", "test_images = test_images / np.float32(255)" ] }, { "cell_type": "markdown", "metadata": { "id": "4AXoHhrsbdF3" }, "source": [ "## 변수와 그래프를 분산하는 전략 만들기" ] }, { "cell_type": "markdown", "metadata": { "id": "5mVuLZhbem8d" }, "source": [ "`tf.distribute.MirroredStrategy` 전략이 어떻게 동작할까요?\n", "* 모든 변수와 모델 그래프는 장치(replicas, 다른 문서에서는 replica가 분산 훈련에서 장치 등에 복제된 모델을 의미하는 경우가 있으나 이 문서에서는 장치 자체를 의미합니다)에 복제됩니다.\n", "* 입력은 장치에 고르게 분배되어 들어갑니다.\n", "* 각 장치는 주어지는 입력에 대해서 손실(loss)과 그래디언트를 계산합니다.\n", "* 그래디언트들을 전부 더함으로써 모든 장치들 간에 그래디언트들이 동기화됩니다.\n", "* 동기화된 후에, 동일한 업데이트가 각 장치에 있는 변수의 복사본(copies)에 동일하게 적용됩니다.\n", "\n", "노트: 하나의 범위를 지정해서 모든 코드를 집어넣을 수 있습니다. 자, 같이 살펴보시죠!" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "F2VeZUWUj5S4" }, "outputs": [], "source": [ "# 만약 장치들의 목록이 `tf.distribute.MirroredStrategy` 생성자 안에 명시되어 있지 않다면,\n", "# 자동으로 장치를 인식할 것입니다.\n", "strategy = tf.distribute.MirroredStrategy()" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "ZngeM_2o0_JO" }, "outputs": [], "source": [ "print ('장치의 수: {}'.format(strategy.num_replicas_in_sync))" ] }, { "cell_type": "markdown", "metadata": { "id": "k53F5I_IiGyI" }, "source": [ "## 입력 파이프라인 설정하기" ] }, { "cell_type": "markdown", "metadata": { "id": "0Qb6nDgxiN_n" }, "source": [ "그래프와 변수를 플랫폼과 무관한 SavedModel 형식으로 내보냅니다. 모델을 내보냈다면, 모델을 불러올 때 범위(scope)를 지정해도 되고 하지 않아도 됩니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "jwJtsCQhHK-E" }, "outputs": [], "source": [ "BUFFER_SIZE = len(train_images)\n", "\n", "BATCH_SIZE_PER_REPLICA = 64\n", "GLOBAL_BATCH_SIZE = BATCH_SIZE_PER_REPLICA * strategy.num_replicas_in_sync\n", "\n", "EPOCHS = 10" ] }, { "cell_type": "markdown", "metadata": { "id": "J7fj3GskHC8g" }, "source": [ "분산 데이터셋들을 `strategy.scope` 내에 생성합니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "WYrMNNDhAvVl" }, "outputs": [], "source": [ "with strategy.scope():\n", "\n", " train_dataset = tf.data.Dataset.from_tensor_slices((train_images, train_labels)).shuffle(BUFFER_SIZE).batch(GLOBAL_BATCH_SIZE) \n", " train_dist_dataset = strategy.experimental_distribute_dataset(train_dataset)\n", " \n", " test_dataset = tf.data.Dataset.from_tensor_slices((test_images, test_labels)).batch(GLOBAL_BATCH_SIZE) \n", " test_dist_dataset = strategy.experimental_distribute_dataset(test_dataset)" ] }, { "cell_type": "markdown", "metadata": { "id": "bAXAo_wWbWSb" }, "source": [ "## 모델 만들기\n", "\n", "`tf.keras.Sequential`을 사용해서 모델을 생성합니다. Model Subclassing API로도 모델 생성을 할 수 있습니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "9ODch-OFCaW4" }, "outputs": [], "source": [ "def create_model():\n", " model = tf.keras.Sequential([\n", " tf.keras.layers.Conv2D(32, 3, activation='relu'),\n", " tf.keras.layers.MaxPooling2D(),\n", " tf.keras.layers.Conv2D(64, 3, activation='relu'),\n", " tf.keras.layers.MaxPooling2D(),\n", " tf.keras.layers.Flatten(),\n", " tf.keras.layers.Dense(64, activation='relu'),\n", " tf.keras.layers.Dense(10, activation='softmax')\n", " ])\n", "\n", " return model" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "9iagoTBfijUz" }, "outputs": [], "source": [ "# 체크포인트들을 저장하기 위해서 체크포인트 디렉토리를 생성합니다.\n", "checkpoint_dir = './training_checkpoints'\n", "checkpoint_prefix = os.path.join(checkpoint_dir, \"ckpt\")" ] }, { "cell_type": "markdown", "metadata": { "id": "e-wlFFZbP33n" }, "source": [ "## 손실 함수 정의하기\n", "\n", "일반적으로, GPU/CPU 비율이 1인 단일 장치에서 손실은 입력 배치(batch)의 샘플 개수로 나누어집니다.\n", "\n", "*그렇다면, `tf.distribute.Strategy`를 사용할 때, 손실은 어떻게 계산되어야 할까요?*\n", "\n", "* 예를들면, 4개의 GPU가 있고 입력 배치 크기가 64라고 하죠. 입력 배치 하나가 여러 개의 장치(4개의 GPU)에 분배됩니다. 각 장치는 크기가 16인 입력을 받습니다.\n", "\n", "* 각 장치에 있는 모델은 해당 입력에 대해 정방향 계산(forward pass)을 수행하고 손실을 계산합니다. 손실을 장치에 할당된 입력 샘플의 수(BATCH_SIZE_PER_REPLICA = 16)로 나누는 것이 아니라 GLOBAL_BATCH_SIZE(64)로 나누어야 합니다.\n", "\n", "*왜 이렇게 할까요?*\n", "\n", "* 위와 같이 계산하는 이유는 그래디언트들이 각 장치에서 계산된 다음, 모든 장치를 동기화하기 위해 이 그래디언트 값들을 전부 **더하기** 때문입니다.\n", "\n", "*이 것을 텐서플로에서는 어떻게 할까요?*\n", "\n", "\n", "* 만약 이 **예제처럼** 사용자 정의 훈련 루프를 **작성한다면**, **다음과 같이 샘플당** 손실을 더하고 GLOBAL_BATCH_SIZE로 **나누어야** 합니다.\n", "`scale_loss = tf.reduce_sum(loss) * (1. / GLOBAL_BATCH_SIZE)`\n", "또는 `tf.nn.compute_average_loss` **함수를** 사용할 수도 있습니다. 이 함수는 **샘플당 손실과 선택적으로 샘플 가중치, GLOBAL_BATCH_SIZE를 매개변수 값으로 받고** 스케일이 조정된 손실을 반환합니다.\n", "\n", "* 만약 규제 손실을 사용하는 모델이라면, 장치 개수로 손실 값을 스케일 조정해야 합니다. 이는 `tf.nn_scale_regularization_loss` 함수를 사용하여 처리할 수 있습니다.\n", "\n", "* `tf.reduce_mean`을 사용하는 것은 추천하지 않습니다. 이렇게 하는 것은 손실을 실제 장치당 배치 크기로 나눕니다. 이 실제 장치당 배치 크기는 아마 각 단계(step)마다 크기가 다를 수 있습니다.\n", "\n", "* 이런 축소(`reduction`)와 스케일 조정은 케라스의 `model.compile`과 `model.fit`에서 자동적으로 수행됩니다.\n", "\n", "* 만약 `tf.keras.losses` 클래스(아래의 예제에서처럼)를 사용한다면, reduction 매개변수를 명시적으로 `NONE` 또는 `SUM` 중 하나로 표시해야 합니다. `AUTO`가 허용되지 않는 것은 사용자가 분산 모드에서 어떻게 축소할지 명시적으로 지정하는 것이 바람직하기 때문입니다.\n", "현재 `SUM_OVER_BATCH_SIZE`가 장치당 배치 크기로만 나누고 장치 개수로 나누는 것은 사용자에게 위임하기 때문입니다. 그래서 이렇게 하는 것 대신에 사용자가 명시적으로 축소를 수행하도록 만드는 것이 좋습니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "R144Wci782ix" }, "outputs": [], "source": [ "with strategy.scope():\n", " # reduction을 `none`으로 설정합니다. 그래서 우리는 축소를 나중에 하고,\n", " # GLOBAL_BATCH_SIZE로 나눌 수 있습니다.\n", " loss_object = tf.keras.losses.SparseCategoricalCrossentropy(\n", " reduction=tf.keras.losses.Reduction.NONE)\n", " # 또는 loss_fn = tf.keras.losses.sparse_categorical_crossentropy를 사용해도 됩니다.\n", " def compute_loss(labels, predictions):\n", " per_example_loss = loss_object(labels, predictions)\n", " return tf.nn.compute_average_loss(per_example_loss, global_batch_size=GLOBAL_BATCH_SIZE)" ] }, { "cell_type": "markdown", "metadata": { "id": "w8y54-o9T2Ni" }, "source": [ "## 손실과 정확도를 기록하기 위한 지표 정의하기\n", "\n", "이 지표(metrics)는 테스트 손실과 훈련 정확도, 테스트 정확도를 기록합니다. `.result()`를 사용해서 누적된 통계값들을 언제나 볼 수 있습니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "zt3AHb46Tr3w" }, "outputs": [], "source": [ "with strategy.scope():\n", " test_loss = tf.keras.metrics.Mean(name='test_loss')\n", "\n", " train_accuracy = tf.keras.metrics.SparseCategoricalAccuracy(\n", " name='train_accuracy')\n", " test_accuracy = tf.keras.metrics.SparseCategoricalAccuracy(\n", " name='test_accuracy')" ] }, { "cell_type": "markdown", "metadata": { "id": "iuKuNXPORfqJ" }, "source": [ "## 훈련 루프" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "OrMmakq5EqeQ" }, "outputs": [], "source": [ "# 모델과 옵티마이저는 `strategy.scope`에서 만들어져야 합니다.\n", "with strategy.scope():\n", " model = create_model()\n", "\n", " optimizer = tf.keras.optimizers.Adam()\n", "\n", " checkpoint = tf.train.Checkpoint(optimizer=optimizer, model=model)" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "3UX43wUu04EL" }, "outputs": [], "source": [ "with strategy.scope():\n", " def train_step(inputs):\n", " images, labels = inputs\n", "\n", " with tf.GradientTape() as tape:\n", " predictions = model(images, training=True)\n", " loss = compute_loss(labels, predictions)\n", "\n", " gradients = tape.gradient(loss, model.trainable_variables)\n", " optimizer.apply_gradients(zip(gradients, model.trainable_variables))\n", "\n", " train_accuracy.update_state(labels, predictions)\n", " return loss \n", "\n", " def test_step(inputs):\n", " images, labels = inputs\n", "\n", " predictions = model(images, training=False)\n", " t_loss = loss_object(labels, predictions)\n", "\n", " test_loss.update_state(t_loss)\n", " test_accuracy.update_state(labels, predictions)" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "gX975dMSNw0e" }, "outputs": [], "source": [ "with strategy.scope():\n", " # `experimental_run_v2`는 주어진 계산을 복사하고,\n", " # 분산된 입력으로 계산을 수행합니다.\n", " \n", " @tf.function\n", " def distributed_train_step(dataset_inputs):\n", " per_replica_losses = strategy.experimental_run_v2(train_step,\n", " args=(dataset_inputs,))\n", " return strategy.reduce(tf.distribute.ReduceOp.SUM, per_replica_losses,\n", " axis=None)\n", " \n", " @tf.function\n", " def distributed_test_step(dataset_inputs):\n", " return strategy.experimental_run_v2(test_step, args=(dataset_inputs,))\n", "\n", " for epoch in range(EPOCHS):\n", " # 훈련 루프\n", " total_loss = 0.0\n", " num_batches = 0\n", " for x in train_dist_dataset:\n", " total_loss += distributed_train_step(x)\n", " num_batches += 1\n", " train_loss = total_loss / num_batches\n", "\n", " # 테스트 루프\n", " for x in test_dist_dataset:\n", " distributed_test_step(x)\n", "\n", " if epoch % 2 == 0:\n", " checkpoint.save(checkpoint_prefix)\n", "\n", " template = (\"에포크 {}, 손실: {}, 정확도: {}, 테스트 손실: {}, \"\n", " \"테스트 정확도: {}\")\n", " print (template.format(epoch+1, train_loss,\n", " train_accuracy.result()*100, test_loss.result(),\n", " test_accuracy.result()*100))\n", "\n", " test_loss.reset_states()\n", " train_accuracy.reset_states()\n", " test_accuracy.reset_states()" ] }, { "cell_type": "markdown", "metadata": { "id": "Z1YvXqOpwy08" }, "source": [ "위의 예제에서 주목해야 하는 부분\n", "* 이 예제는 `train_dist_dataset`과 `test_dist_dataset`을 `for x in ...` 구조를 통해서 반복합니다.\n", "* 스케일이 조정된 손실은 `distributed_train_step`의 반환값입니다. `tf.distribute.Strategy.reduce` 호출을 사용해서 장치들 간의 스케일이 조정된 손실 값을 전부 합칩니다. 그리고 나서 `tf.distribute.Strategy.reduce` 반환 값을 더하는 식으로 배치 간의 손실을 모읍니다.\n", "* `tf.keras.Metrics`는 `tf.distribute.Strategy.experimental_run_v2`에 의해서 실행되는 `train_step`과 `test_step` 함수 안에서 업데이트 되어야 합니다.\n", "* `tf.distribute.Strategy.experimental_run_v2`는 그 전략안에 포함된 각 지역 복제 모델로부터 결과값을 반환해 줍니다. 그리고 이 결과를 사용하는 몇 가지 방법들이 있습니다. `tf.distribute.Strategy.reduce`를 이용하여 값들을 합칠 수 있습니다. `tf.distribute.Strategy.experimental_local_results`를 사용해서 결과값(지역 복제 모델 당 하나의 결과값)에 들어있는 값들의 리스트를 얻을 수도 있습니다." ] }, { "cell_type": "markdown", "metadata": { "id": "-q5qp31IQD8t" }, "source": [ "## 최신 체크포인트를 불러와서 테스트하기" ] }, { "cell_type": "markdown", "metadata": { "id": "WNW2P00bkMGJ" }, "source": [ "`tf.distribute.Strategy`를 사용해서 체크포인트가 만들어진 모델은 전략 사용 여부에 상관없이 불러올 수 있습니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "pg3B-Cw_cn3a" }, "outputs": [], "source": [ "eval_accuracy = tf.keras.metrics.SparseCategoricalAccuracy(\n", " name='eval_accuracy')\n", "\n", "new_model = create_model()\n", "new_optimizer = tf.keras.optimizers.Adam()\n", "\n", "test_dataset = tf.data.Dataset.from_tensor_slices((test_images, test_labels)).batch(GLOBAL_BATCH_SIZE)" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "7qYii7KUYiSM" }, "outputs": [], "source": [ "@tf.function\n", "def eval_step(images, labels):\n", " predictions = new_model(images, training=False)\n", " eval_accuracy(labels, predictions)" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "LeZ6eeWRoUNq" }, "outputs": [], "source": [ "checkpoint = tf.train.Checkpoint(optimizer=new_optimizer, model=new_model)\n", "checkpoint.restore(tf.train.latest_checkpoint(checkpoint_dir))\n", "\n", "for images, labels in test_dataset:\n", " eval_step(images, labels)\n", "\n", "print ('전략을 사용하지 않고, 저장된 모델을 복원한 후의 정확도: {}'.format(\n", " eval_accuracy.result()*100))" ] }, { "cell_type": "markdown", "metadata": { "id": "EbcI87EEzhzg" }, "source": [ "## 데이터셋에 대해 반복작업을 하는 다른 방법들\n", "\n", "### 반복자(iterator)를 사용하기\n", "\n", "만약 주어진 스텝의 수에 따라서 반복하기 원하면서 전체 데이터셋을 보는 것을 원치 않는다면, `iter`를 호출하여 반복자를 만들 수 있습니다. 그 다음 명시적으로 `next`를 호출합니다. 또한, `tf.funtion` 내부 또는 외부에서 데이터셋을 반복하도록 설정 할 수 있습니다. 다음은 반복자를 사용하여 `tf.function` 외부에서 데이터셋을 반복하는 코드 예제입니다.\n" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "7c73wGC00CzN" }, "outputs": [], "source": [ "with strategy.scope():\n", " for _ in range(EPOCHS):\n", " total_loss = 0.0\n", " num_batches = 0\n", " train_iter = iter(train_dist_dataset)\n", "\n", " for _ in range(10):\n", " total_loss += distributed_train_step(next(train_iter))\n", " num_batches += 1\n", " average_train_loss = total_loss / num_batches\n", "\n", " template = (\"에포크 {}, 손실: {}, 정확도: {}\")\n", " print (template.format(epoch+1, average_train_loss, train_accuracy.result()*100))\n", " train_accuracy.reset_states()" ] }, { "cell_type": "markdown", "metadata": { "id": "GxVp48Oy0m6y" }, "source": [ "### tf.function 내부에서 반복하기\n", "전체 입력 `train_dist_dataset`에 대해서 `tf.function` 내부에서 `for x in ...` 생성자를 사용함으로써 반복을 하거나, 위에서 사용했던 것처럼 반복자를 사용함으로써 반복을 할 수 있습니다. 아래의 예제에서는 `tf.function`로 한 훈련의 에포크를 감싸고 그 함수에서 `train_dist_dataset`를 반복하는 것을 보여 줍니다." ] }, { "cell_type": "code", "execution_count": null, "metadata": { "id": "-REzmcXv00qm" }, "outputs": [], "source": [ "with strategy.scope():\n", " @tf.function\n", " def distributed_train_epoch(dataset):\n", " total_loss = 0.0\n", " num_batches = 0\n", " for x in dataset:\n", " per_replica_losses = strategy.experimental_run_v2(train_step,\n", " args=(x,))\n", " total_loss += strategy.reduce(\n", " tf.distribute.ReduceOp.SUM, per_replica_losses, axis=None)\n", " num_batches += 1\n", " return total_loss / tf.cast(num_batches, dtype=tf.float32)\n", "\n", " for epoch in range(EPOCHS):\n", " train_loss = distributed_train_epoch(train_dist_dataset)\n", "\n", " template = (\"Epoch {}, Loss: {}, Accuracy: {}\")\n", " print (template.format(epoch+1, train_loss, train_accuracy.result()*100))\n", "\n", " train_accuracy.reset_states()" ] }, { "cell_type": "markdown", "metadata": { "id": "MuZGXiyC7ABR" }, "source": [ "### 장치 간의 훈련 손실 기록하기\n", "\n", "노트: 일반적인 규칙으로, `tf.keras.Metrics`를 사용하여 샘플당 손실 값을 기록하고 장치 내부에서 값이 합쳐지는 것을 피해야 합니다.\n", "\n", "`tf.metrics.Mean`을 사용하여 여러 장치의 훈련 손실을 기록하는 것을 추천하지 *않습니다*. 왜냐하면 손실의 스케일을 조정하는 계산이 수행되기 때문입니다.\n", "\n", "예를 들어, 다음과 같은 조건의 훈련을 수행한다고 합시다.\n", "* 두개의 장치\n", "* 두개의 샘플들이 각 장치에 의해 처리됩니다.\n", "* 손실 값을 산출합니다: 각각의 장치에 대해 [2, 3]과 [4, 5]\n", "* Global batch size = 4\n", "\n", "손실의 스케일 조정을 하면, 손실 값을 더하고 GLOBAL_BATCH_SIZE로 나누어 각 장치에 대한 샘플당 손실값을 계산할 수 있습니다. 이 경우에는 (2 + 3) / 4 = 1.24와 (4 + 5) / 4 = 2.25입니다.\n", "\n", "만약 `tf.metrics.Mean`을 사용해서 두 개의 장치에 대해 손실값을 계산한다면, 결과값이 다릅니다. 이 예제에서는, 측정 지표의 `result()`가 메서드가 호출될 때 `total`이 3.50이고 `count`가 2입니다. 결과값은 `total/count`가 1.75가 됩니다. `tf.keras.Metrics`를 이용해서 계산한 손실값이 추가적인 요인에 의해서 크기조정되며, 이 추가적인 요인은 동기화되는 장치의 개수입니다." ] }, { "cell_type": "markdown", "metadata": { "id": "xisYJaV9KZTN" }, "source": [ "### 예제와 튜토리얼\n", "사용자 정의 훈련루프를 포함한 분산 전략을 사용하는 몇 가지 예제가 있습니다.\n", "\n", "1. `MirroredStrategy`를 사용해서 MNIST를 훈련하는 [Tutorial](custom_training.ipynb)\n", "2. `MirroredStrategy`를 사용하는 [DenseNet](https://github.com/tensorflow/examples/blob/master/tensorflow_examples/models/densenet/distributed_train.py) 예제.\n", "1. `MirroredStrategy`와 `TPUStrategy`를 사용해서 훈련하는 [BERT](https://github.com/tensorflow/models/blob/master/official/nlp/bert/run_classifier.py) 예제. 이 예제는 분산 훈련 중에 어떻게 체크포인트로부터 불러오는지와 어떻게 주기적으로 체크포인트들을 생성해 내는지를 이해하기에 정말 좋습니다.\n", "2. `keras_use_ctl flag`를 사용해서 활성화 할 수 있는 MirroredStrategy를 이용해서 훈련되는 [NCF](https://github.com/tensorflow/models/blob/master/official/recommendation/ncf_keras_main.py) 예제\n", "3. `MirroredStrategy`을 사용해서 훈련되는 [NMT](https://github.com/tensorflow/examples/blob/master/tensorflow_examples/models/nmt_with_attention/distributed_train.py) 예제.\n", "\n", "더 많은 예제는 여기에 있습니다. [Distribution strategy guide](../../guide/distributed_training.ipynb#examples_and_tutorials)" ] }, { "cell_type": "markdown", "metadata": { "id": "6hEJNsokjOKs" }, "source": [ "## 다음단계\n", "\n", "새로운 `tf.distribute.Strategy` API를 모델에 적용해 보세요." ] } ], "metadata": { "colab": { "collapsed_sections": [], "name": "custom_training.ipynb", "toc_visible": true }, "kernelspec": { "display_name": "Python 3", "name": "python3" } }, "nbformat": 4, "nbformat_minor": 0 }
2023-11-24T01:27:04.277712
https://example.com/article/1395
Load management systems can process the assignment of access rights to user devices. For example, an access right can be configured to grant a user device access to a resource. Generally, assigning access rights to user devices occurs on a first-come-first-served basis. However, unauthorized activity, such as by hackers or bot scripts, has increased. For instance, bot scripts can be configured to mimic user devices to obtain access to resources in an unauthorized manner. As the load of user requests increases in scale (e.g., to big-data levels), securing load management systems against unauthorized activity becomes more challenging. Automatically detecting unauthorized activity at a large scale and controlling workflows to manage or block the unauthorized activity has been inefficient and burdensome on network resources.
2024-07-07T01:27:04.277712
https://example.com/article/9366
Youth crime changes urged Date: February 28 2013 Jane Lee THE age of criminal responsibility should be raised from 10 to 12 years to better fight youth crime, a study recommends. Jesuit Social Services' study on alternatives to remand found that children who were 14 or younger when they first entered the criminal justice system were more likely to come from disadvantaged communities than older children. The group's chief executive, Julie Edwards, said that diverting children away from the system, for example through mediation and group conferencing, had proved to be more effective at preventing them from re-offending than putting them in custody. ''Detention is no place for primary school children and we must raise the age of criminal responsibility to 12 in order to keep them out,'' she said. Ms Edwards said that early intervention services should be better funded to support children and their families early in life to prevent crime. The study, launched by Children's Court president Judge Paul Grant, analysed data from the Department of Human Services and Victoria Police and included interviews with children. It said that all child protection services knew of all the children aged between 10 to 12 who were in remand in 2010. A disproportionate number of children in detention were found to be Aboriginal, with indigenous children more likely to have come into contact with police at younger ages than non-indigenous children. The number of children in remand jumped 67 per cent from 2007 to 2010, the study said. It called for support services to be expanded outside of business hours, which is when 80 per cent of youth arrests occur. A spokesman for state Attorney-General Robert Clark said the government had no current plans to introduce these changes. A spokesman for the Department of Human Services said the department ''welcomes the contribution of the Jesuits to the development of policy in this important area''. Judge Grant said the report's arguments for reform were compelling. He said more empathy and support was needed for young people in the criminal justice system because they came from disadvantaged backgrounds of neglect and abuse that many people could not understand. ''You can't help but feel sorry for some young people who come into the court who haven't had the sort of opportunities that most of us have had in our lives,'' he said. With AAP An earlier version of this story attributed a quote from the Department of Human Services to a spokesman for Community Services Minister Mary Wooldridge. This was incorrect. The mistake was made by the reporter.
2024-03-18T01:27:04.277712
https://example.com/article/3486
Q: `xhr`, `status` and `ex` variables in a jQuery AJAX request I am using jQuery 1.6 and I would like to know and understand how I can access response xhr, status and ex variables in the following code: $jQuery.ajax({ type: "POST", url: "<some_url>", error: function(xhr, status, ex) { var msg = ""; if (xhr) { msg = "readyState is " + xhr.readyState + ". "; } if (ex) { msg += ex.name + ' - ' + ex.message; } alert("ERROR " + msg); } success: function(jqXHR, status, ex) { ... } }); How can I know the full list of all them "accessible" values like, for example, readyState for the xhr (xhr.readyState), name and message for the ex (ex.name and ex.message)? Moreover, what xhr and ex variables represent (I think status refers to the HTTP status code)? A: I strongly suggest you to have a look at the docs. Here an example. error(jqXHR, textStatus, errorThrown)Function A function to be called if the request fails. The function receives three arguments: The jqXHR (in jQuery 1.4.x, XMLHttpRequest) object, a string describing the type of error that occurred and an optional exception object, if one occurred. Possible values for the second argument (besides null) are "timeout", "error", "abort", and "parsererror". When an HTTP error occurs, errorThrown receives the textual portion of the HTTP status, such as "Not Found" or "Internal Server Error." As of jQuery 1.5, the error setting can accept an array of functions. Each function will be called in turn. Note: Prior to jQuery 1.5, this handler was not called for cross-domain script and JSONP requests. This is an Ajax Event jQuery has a very good documentation. The docs should be the first place to look at, for questions like yours. If you encounter problems while implementing jQuery you are welcome to ask at SO.
2024-03-24T01:27:04.277712
https://example.com/article/9077
Glenwood Chest Sleek and urban The Glenwood Chest brings reclaimed style to your space. Whether your home design is rustic and charming, or sleek and urban, this furnishing is crafted to be a wonderful addition. Made of tropical sengon solids, the Glenwood Chest features a river wash finish that is applied using a six step hand-rubbed process. This piece has five English dovetail drawers with full extention, solid wood sides, nickle plated hardware pulls, and deluxe double ball bearing guides. The Glenwood Chest is a timeless home accent you're sure to enjoy for years to come. Additional Information 41" L x 19" D x 55" H Construction tropical sengon tekik solids six step hand rubbed river wash finish corner blocked quality, 4 sided cases four-sided English dovetail drawers, full extension deluxe double ball bearing drawer glides solid wood drawer sides Other Pieces in this Group Glenwood Nightstand Glenwood Dresser Glenwood Mirror Glenwood Panel Bed Glenwood Media Chest Glenwood Panel Bedroom Set Other Pieces in this Group 7 Years No Interest1 On purchases of $3999 or more made with your Furniture Row Platinum Credit Card through 09/19/19.Equal monthly payments required for 84 months. No down payment except amount equal to sales tax and delivery. Don't have a Furniture Row® Credit Card? No Problem. Apply in just minutes. Lavish your guests with luxurious padding $199 Related Products Playful in cottage cream $79 Rated 5 out of 5 by Piff1784 from I bought 2 of these to go with my sons 2 new Glenwood beds. The beds so far has been good. Chests seem to be made of good quality. Only complaint I had was that one knob for the drawer did not have the correct length screw. So now I will ha e to contact the store to see if I can receive another one. With the 5 year extended warranty I would think this would not be a problem! Date published: 2019-01-12 Rated 5 out of 5 by Piff1784 from Bought 2 of these beds for my son's and these beds are very well made. Design is modern and will remain in style for a long period of time. I feel these beds will last my kids for as long as they are at home. This is my second big purchase with furniture row and I will continue to keep them in my line for my furniture needs. My first experience was 10 years ago with living room furniture that I am still currently using! Date published: 2019-01-12 Rated 4 out of 5 by Frostie from Looks nice but would have been nice to have an instructions book to know what all the extra pieces are for Date published: 2018-11-25 Rated 2 out of 5 by JCVV from WARNINGI bought two of these dressers for my kids rooms, one of my kids was putting away their clothes and it tipped on top of them with only one drawer open. The dresser design and weight of the drawers makes it tip SO easily it's scary. We have since installed the tipping hardware and hopefully it will work fine now. Just be warned, install the tipping mounts RIGHT AWAY before using! They are beautiful heavy dressers, just still very leery to use them. My child is so scared I have to stand there holding it while he gets his clothes out. Return Policy Furniture Row General Policies 1. Once the product has been received by the customer, there will be no returns. Product may be exchanged only; No refund will be given.* *If your order was a Special Order, this will follow the Terms and Conditions that you were presented at the time of your purchase. These can be viewed with this link: Special Order Terms & Conditions 2. In the event of damaged merchandise due to Furniture Row's handling, or defective merchandise as described in the manufacturer's warranty, the seller will, at their option, choose to repair or replace in order to correct the damage or defect. Damage caused by the customer's handling, transportation or use will not be covered. 3. It is the customer's responsibility to ensure that the product(s) purchased will fit into the desired room. Any charges incurred in transportation or delivery back to the store will be the customer's responsibility. If Picking Product Up 1. No product will be released without the gold copy of your invoice. 2. Make sure the product will fit in your vehicle prior to attempting pick-up. Bring rope, adequate wraps and blankets to protect product. 3. We will assist in loading product into your vehicle, but you are responsible for tying and securing of load. Please note, due to insurance reasons, we are not authorized to tie down loads. 5. An imperfect or incorrect item could be shipped to us by the vendor. Please check your merchandise prior to loading; it is your responsibility to return any imperfect or incorrect product for exchange. If Having Product Delivered 1. We regret that we cannot schedule specific times for delivery. However, you will be contacted the morning of the day of delivery before 10:00 am to inform you of the approximate time. 2. To change a delivery date, you must call a minimum of 24 hours prior to the scheduled date. Please allow up to one week for rescheduling. 3. Please check to ensure the delivery address, phone number and directions are correct on the invoice. 4. An adult over the age of 18 must be on hand with the gold copy of the invoice to sign for the delivery. 5. Please ensure that the room in which you want the merchandise placed is empty. Please note, due to insurance reasons, we are not authorized to rearrange or move existing personal property.
2023-09-09T01:27:04.277712
https://example.com/article/2635
나는 신창다. [12.07.25] “Oppas are back!” The reason why we wait for ‘Shinhwa Broadcast’ The original article covers Infinity Challenge, 1 Night 2 Days and Shinhwa Broadcast, but I’m only translating parts related to Shinhwa Broadcast. It’s pretty amazing how the show is being placed alongside such established variety shows although it’s only been around for less than half a year^^ *proud* =============================================== “Oppas are back” There has indeed been a dark cloud cast over variety shows in the first half of this year, as variety shows have been experiencing a troubled period due to reasons such as labor strikes and changes to the cast lineup. Viewers’ remote controllers have been just as confused as the confusing state of variety shows. But now we can finally bid a long overdue farewell to this ‘loneliness’. Because the ‘oppas’ of the viewers are back. From MBC’s ‘Infinity Challenge’ that has finally returned after a 6-month hiatus, to KBS’ ‘1 Night 2 Days’ that has experienced changes to the member lineup, and jTBC’s ‘Shinhwa Broadcast’ starring the original idols themselves. What in particular is there to look out for about these returning oppas? Let’s look at the reasons why viewers simply have no choice but to wait for them. Really. The real ‘oppas’ have appeared. Even mountains and rivers can change in 10 years, but Shinhwa continue to demonstrate their majestic presence as ‘idol stars’. In the past 14 years, the government has already changed hands three times, rookie singers have already become veteran singers, and original idols have already become fathers. In the midst of the many changes that have taken place, Shinhwa has still returned as ‘Shinhwa’. Upon their return, Shinhwa has chosen to go with variety programs. ‘Real variety’ that features current programme formats. Disregarding concerns whether they are lifting directly off current programme formats, Shinhwa is creating a new type of ‘real variety’ with their unique sense of variety. The slipshod and trivial missions assigned to the members are the distinctive features of ‘Shinhwa Broadcast’, and being able to draw the maximum value of laughter with their outstanding variety sense is Shinhwa’s specialty. But what’s the reason behind their success in variety with these seemingly common elements? ▲ [photo=JTBC] The Shinhwa members have been together for 14 years, and the group is the longest-running and oldest idol group. Viewers, while looking at Shinhwa now, are bound to reminisce about past memories too. When the viewers were watching Shinhwa competing against Shinee in a vaulting competition, surely they would have recalled Junjin in ‘Dream Team’ 10 years ago, Kim Dongwan as part of the ‘Embarrassing Brothers’ in ‘Love Mansae’, and ‘Kiwi Prince’ Andy, when they were all around the same age as the Shinee members now. The Shinhwa members don’t try to forcibly create new characters. They have moved the viewers’ hearts with their own personalities and characters that have naturally been formed over the past 14 years. In this respect, ‘Shinhwa Broadcast’ is just like an old friend. They have used their own ‘dark history’ as a laughter code and to get viewers to think about their memories. This is the best kind of harmony that can only be seen between old friends. But the interesting part of ‘Shinhwa Broadcast’ does not lie in Shinhwa fulfilling these entertainment missions. They may choose to embarrass themselves without any reservations, but they still retain their unchanging ‘idol-ness’ and their boyish innocence. At the end of the day, what makes ‘Shinhwa Broadcast’ complete is not their mature variety skills, but is perhaps the memories they share with the viewers and their unchanging youthful spirit. Related 3 thoughts on “[12.07.25] “Oppas are back!” The reason why we wait for ‘Shinhwa Broadcast’” “…draw the maximum value of laughter…”, that is so true!! Haha.. at least that is exactly what shinhwa broadcast is doing to me every week!! Shinhwa itself is already so funny and always brings me so much happiness and satisfaction, but i also have this little dream of seeing the shinhwa boys with yoo jae-suk or kang ho-dong again like in the glorious days of x-man!! I love their songs and want to know more about them, so I did some search.They are fantastic together which it is confirmed deeply in me as I watch perform together.Shinhwa Broadcast introduced to me during their Comeback= its entertaining,amusing it make me burst into laughter each time I watched. I am not able to comapre with their past shows but they are “natural” in the broadcast.They are together for 14 years and that count as to know each other characteristics,charms and habits.there is no holding back in the shows. 14 years past ,we age ,we grow but we are young at heart similiarly with the Shinhwa guys.Many other groups had disband as they think what will happen to “idols” in 30s/40s/50s on on…Eric,Minwoo,Hyesung,Dongwan,Junjin and Andy have prove age does not matter…its just grow better,wiser,matured,experienced and more charismartic.Yes the Oppas are back with more charms and love to the fans…..Shinhwa thanks for coming back and keep going !!!!!!
2023-10-12T01:27:04.277712
https://example.com/article/7501
The fact that Christopher Nolan helped craft the story for Man of Steelhas never been more evident than in the latest poster, just revealed on Facebook. His Dark Knight films famously turned Batman into a public villain and it seems Zack Snyder‘s Superman film, scheduled for release June 14, could do the same. The poster features the Man of Steel (Henry Cavill) in handcuffs, accompanied by soliders. Check it out below. Thanks to Facebook for this image, which is the reveal for that Dark Knight Rises clock that was running the past few weeks. The image of Superman as a bad guy certainly sends a message about what this film is going to feature. Expect to see this scene in the new trailer (attached to The Hobbit), as it was in the footage shown at Comic-Con in July. What are you thoughts on the poster? In the pantheon of superheroes, Superman is the most recognized and revered character of all time. Clark Kent/Kal-El (Cavill) is a young twentysomething journalist who feels alienated by powers beyond anyone’s imagination. Transported to Earth years ago from Krypton, an advanced alien planet, Clark struggles with the ultimate question – Why am I here? Shaped by the values of his adoptive parents Martha (Lane) and Jonathan Kent (Costner), Clark soon discovers that having super abilities means making very difficult decisions. But when the world needs stability the most, it comes under attack. Will his abilities be used to maintain peace or ultimately used to divide and conquer? Clark must become the hero known as “Superman,” not only to shine as the world’s last beacon of hope but to protect the ones he loves.
2024-02-26T01:27:04.277712
https://example.com/article/6816
Ex-Portales resident charged in 1976 Colorado homicide February 7, 2008 Karl Terry A former Portales man was arrested in Colorado on Friday after a cold-case homicide lead was developed through a DNA database. Officers from the Colorado Bureau of Investigation and Clear Creek County, Colo., deputies arrested Ricky Lee Harnish, 52, in connection with the 1976 death of 16-year-old Holly Marie Andrews, a majorette at Columbine High School in Littleton, Colo. Harnish lived in Portales from approximately 1988 to 1995, according to Roosevelt County Sheriff Darren Hooker. “Right now we’re just assisting CBI by conducting interviews here,” Hooker said. Hooker said one interview was conducted with Harnish’s ex-wife. Sarah Meyer of Portales said she married Harnish in 1990 and he left Portales shortly before they were divorced in 1995. She said she learned of his arrest last week from a friend of a friend. She said it came as a surprise and she had never heard him talk of a crime. “I never saw anything that would lead me to believe he would be capable of doing something like that,” Meyer said. Meyer moved to Tucumcari in 1997 and then to Los Alamos and Santa Fe before she returned to Portales about a year-and-a-half ago. She is a reporter at the Clovis News Journal. Andrews left her mother’s Littleton home the day after Christmas in 1976 and disappeared, according to a story last week in the Rocky Mountain News. Her nearly nude and battered body was found the next day by cross-country skiers near Bakerville, west of Denver. She had been stabbed in the back six times and her chest was slashed. The case went cold until Henry Lee Lucas confessed to killing Andrews, according to the Rocky Mountain News. Lucas confessed to hundreds of murders, some of which evidence suggests he didn’t commit. Andrews’ killing was one of those in which officials doubted Lucas’ involvement. Police chalked Harnish’s arrest up to a growing DNA database in Colorado, which produced a hit after Harnish submitted to a DNA test following a felony conviction in a 2005 drug case in Colorado. That DNA sample was matched to a genetic fingerprint left on Andrews’ body, according to authorities. According to the Rocky Mountain News, in 1976, Harnish’s parents lived less than 1 1/2 miles from Andrews’ mother. Harnish was arrested at a halfway house in Aurora, Colo., where he was working off the 2005 drug case sentence. He remains in a Clear Creek County jail without bail.
2023-10-30T01:27:04.277712
https://example.com/article/9817
Quantifying sesquiterpene and oxygenated terpene emissions from live vegetation using solid-phase microextraction fibers. Biogenic terpenes play important roles in ecosystem functioning and atmospheric chemistry. Some of these compounds are semi-volatile and highly reactive, such as sesquiterpenes and oxygenated terpenes, and are thus difficult to quantify using traditional air sampling and analysis methods. We developed an alternative approach to quantify emissions from live branches using a flow through enclosure and sample collection on solid-phase microextraction (SPME) fibers. This method allows for collection and analysis of analytes with minimal sample transfer through tubing to reduce the potential for losses. We characterized performance characteristics for 65 microm polydimethylsiloxane-divinylbenzene (PDMS/DVB) fibers using gas chromatography followed by mass spectrometry and optimized experimental conditions and procedures for field collections followed by laboratory analysis. Using 10-45 min sampling times and linear calibration curves created from mixtures of terpenes, emissions of methyl chavicol, an oxygenated terpene, and an array of sesquiterpenes were quantified from a Ponderosa pine branch. The detection limit was 4.36 pmol/mol (ppt) for methyl chavicol and 16.6 ppt for beta-caryophyllene. Concentrations determined with SPME fibers agreed with measurements made using proton transfer reaction mass spectrometry (PTR-MS) within the estimated error of the method for well calibrated compounds. This technique can be applied for quantification of biogenic oxygenated terpene and sesquiterpene emissions from live branches in the field.
2023-10-27T01:27:04.277712
https://example.com/article/3112
Roadrunners Meet Roadrunners will be hosting a track meet type of event at the outside track around the ball fields. We will have various distances including: 400m, 1km, 5km, 5km relay, and 10km relay. People are encouraged to participate in multiple events. The relays can have up to 5 people and those 5 can split the distance however they would like as long as they each only run once in that event. Registration will be $5 per person to help cover snack costs for runners(bananas, granola bars, water, etc). Members of Roadrunners will be in the Great Court in the weeks leading up to the event to get people signed up. We are also coming up with some kind of prize for the winner of each event. If you have any questions about the event, please contact the Roadrunners Club President at kirb0151@kettering.edu
2023-11-01T01:27:04.277712
https://example.com/article/9158
Postoperative staging of the neck dissection using extracapsular spread and lymph node ratio as prognostic factors in HPV-negative head and neck squamous cell carcinoma patients. The presence of nodes with extracapsular spread (ECS) and the lymph node ratio (LNR) have prognostic competence in the pathologic evaluation of patients with a head and neck squamous cell carcinoma (HNSCC) treated with a neck dissection. The purpose of this study is to assess the effect of ECS & LNR on prognosis of HPV negative HNSCC patients treated with neck dissection and to compare to 8th edition TNM/AJCC classification. We carried out a retrospective study of 1383 patients with HNSCC treated with a neck dissection between 1985 and 2013. We developed a classification of the patients according to the presence of nodes with ECS and the LNR value with a recursive partitioning analysis (RPA) model. We obtained a classification tree with four terminal nodes: for patients without ECS (including patients pN0) the cut-off point for LNR was 1.6%, while for patients with lymph nodes with ECS it was 11.4%. The 5-year disease-specific survival for patients without ECS/LNR < 1.6% was 83.3%; for patients without ECS/LNR ≥ 1.6% it was 61.5%; for patients with ECS/LNR < 11.4% it was 33.7%; and for patients with ECS/LNR ≥ 11.4% it was 18.5%. The classification obtained with RPA had better discrimination between categories than the 8th edition of the TNM/AJCC classification. ECS status and LNR value proved high prognostic capacity in the pathological evaluation of the neck dissection. The combination of ECS and LNR improved the predictive capacity of the 8th edition of the TNM/AJCC classification in HPV-negative HNSCC patients.
2024-05-01T01:27:04.277712
https://example.com/article/6252
One Question About the Tunnel One question for the state DOT about the stalled deep-bore tunnel. The Washington State Department of Transportation (WSDOT) announced today that the downtown deep-bore tunnel machine, Bertha, is damaged and will require repairs before it moves forward again—the seal around the machine's main bearing is damaged, leaking oil, and needs to be repaired (which is to say—surprise!—the real problem wasn't the infamous pipe.) To quote WSDOT program manager Todd Trempanier, from a conference call with reporters this afternoon: "The issue right now is there’s heat that is being generated because of what has been confirmed as failures of the seal system [which] is important to protect the main bearing. The design-build contractor, Seattle Tunnel Partners, is working to figure out exactly the best way to repair that … and why this may have occurred." Trempanier said WSDOT currently has "no way of knowing" how much the delay will ultimately cost (so far, since its initial stoppage on December 6, the machine has only moved about four feet), how long the delay will last, or "exactly the best way to fix and repair this problem." Image via WSDOT. However, given the fact that WSDOT and Seattle Tunnel Partners project manager Chris Dixon have been at loggerheads in recent weeks—with Dixon and WSDOT director Lynn Peterson exchanging angry letters about who was blaming whom for tunnel delays—our main (One) Question for Trempanier was this: At what point does this become a lawsuit? And if Seattle Tunnel Partners is still WSDOT's "partner" on the project, why were they, unlike at previous press conferences (which included deputy administrator Matt Preedy as well as Dixon?), not included on today's conference call? Trempanier's response: "Right now, there’s just a lot of things we’re trying to cover really fast, and we’re trying to allow the Seattle Tunnel Partners folks the opportunity of dealing with the issue. And it would be no indication of any sort of an issue with Seattle Tunnel Partners [that STP is no longer included in WSDOT's press briefings.] "That is no implication from anyone who’s involved with the project [that there will be a lawsuit]. I know you have spokesn with Matt Preedy in the past but we’re trying to go forward with this as fast as possible, and Matt is talking to other folks in the media. It is no indication of any issue between Seattle Tunnel Partners and the agency." Preedy also said it "would be premature" to suggest that the state will have to dig up the machine, which is currently 60 feet underground, to fix the problems with the seal.
2024-01-27T01:27:04.277712
https://example.com/article/5802
ENVIRONMENTAL ASSESSMENTTHE STUDYThe City of Hamilton has initiated a Municipal Class Environmental Assessment (EA) process to examine infrastructure improvements to Highway 8 between Park Avenue and Bond Street (see Location Map). This study is building on the recommendations made in the City’s Transportation Master Plan (May 2007), and the Cycling Master Plan (December 1999, update ongoing). The purpose of this study is to examine roadway improvement alternatives from Hillcrest Avenue to Park Avenue (shown in dark hatching), such as bike lanes and sidewalks, and including intersection improvements at Highway 8 and Brock Road. From Park Avenue to Bond Street (shown in light hatching), the improvements to examine include cyclist facilities and repairs to culvert deficiencies. LOCATION THE PROCESSThis project is being planned as a Schedule C project under the Municipal Engineers Association Municipal Class Environmental Assessment (October 2000, as amended in 2007). Project Schedule will be confirmed, and refined if required, once a preferred alternative is identified. A Public Information Centre (PIC) has been scheduled to present the existing conditions and constraints, infrastructure alternatives, evaluation criteria and next steps. At the completion of this study, an Environmental Study Report, or Project File Report will be prepared and made available for public review. PUBLIC INFORMATION CENTREThe following PIC will be held to provide further information and to receive public input:DATE: Thursday, February 11, 2010TIME: 7:00 – 9:00 p.m.LOCATION: Christ Church Flamboro, 92 Hwy 8, Greensville ON PUBLIC COMMENTS INVITEDThere is an opportunity at any time during this process for interested persons to review outstanding issues and bring concerns to the attention of the Project Managers. If you have any questions or comments or wish to be added to the study mailing list, please contact: Information will be collected in accordance with the Freedom of Information and Protection of Privacy Act. With the exception of personal information, all comments will become part of the public record. I am writing on behalf of Transportation for Liveable Communities (TLC) to comment about the class EA for the Downtown Dundas Transportation Master Plan (DDTMP). TLC members have followed closely the long process of the Downtown Dundas Transportation Master Plan, attended the public open houses and commented on the process over the past two years. We found it extremely frustrating that the recommendations included in the DDTMP are not in keeping with the Vision 2020, GRIDS and Hamilton TMP principles that supposedly guide the process."expand transportation options that encourage travel by foot, bike, and transit and enhance efficient inter-regional transportation connections" Rather, we see changes that would increase the volume and speed of automobile travel in Dundas are prioritized over the stated goal of "[a] better choice of integrated travel modes, emphasizing active transportation and public transit." (Dec. 9, 2009 www.hamilton.ca/CityDepartments/PublicWorks/CapitalPlanning/StrategicPlanning/StrategicEnvironmentalPlanningProjects/Downtown+Dundas+TMP.htm) TLC feels that the plan, with its current emphasis, places pedestrians, cyclists, and the small town character of Dundas, in jeopardy. Importantly, the DDTMP bluntly violates the 2007 city wide Transportation Master Plan's calls for identifying policies that reduce automobile trips, promote walking and cycling, and encourage use of public transit and ride sharing. Our concern is based on the fact that all the outlined short term action plans in the DDTMP include road changes like widening that promote increased automobile trips and speed and that not one of the short term projects address the immediate needs of pedestrian, cycling and transit improvements. Indeed, the alternative transportation components that are included in the DDTMP are presented as vague suggestions for future studies, and, at best, minor tweaking and subtle dismissal of residents’ expressed desires and concerns. We focus here on three key issues. First, the DDTMP fails to develop a transportation vision which recognizes and enhances Dundas' strengths, such as natural features and a compact and walkable heritage core. By prioritizing automobile "improvements" like road widening and adding vehicle lanes, not only are pedestrians and cyclists further endangered, the Valley Town risks losing its unique identity which sets it apart from surrounding suburban sprawl. The plan should closely examine the origins and destinations of current automobile, pedestrian, bike and bus trips, and then delineate the desired modal split for the area following city guidelines (e.g. Vision 2020 and the citywide TMP). Where Dundas deserves a clear and distinctive vision for achieving such goals, the plan takes a passive, reactive attitude, against city policy, by obsessively focusing on, assuming, and providing for, increased automobile traffic. Second, we are disappointed that the DDTMP further delays the promise of the visionary “Urban Design Study for Hatt Street in Dundas”. The 2005 study, which was supposed to guide future development of the Hatt St area, highlighted the need for strengthening pedestrian connectivity and accessibility. Unfortunately, the DDTMP fails to accommodate that practical need and leaves it to a still future study. Moreover, the DDTMP dismissed resident calls for improved pedestrian crossing along the Hatt St section between Ogilvie St and Market St. This ~1500 m stretch of six city blocks currently provides no protected pedestrian crossings. The DDTMP notes that the stretch does not “warrant” a protected pedestrian crossing, but we find this conclusion misleading. First, the DDTMP is supposed to provide for increased pedestrian traffic into the downtown core rather than observe current traffic and then conclude that it does not warrant safe pedestrian crossing. Second, a perceptive look at the character of the Hatt St area, including the 600 new housing units at the newly developed Creekside area and the newly developed commercial area just west of the new development, would indicate that there is a substantial opportunity for diverting automobile trips by creating opportunities to support an increase in pedestrian traffic in this area. Finally, the DDTMP does not provide the necessary global vision for pedestrian traffic issues on King St. Currently, King St is optimized for serving as a highway even though it is the commercial and social heart of the Valley town. The DDTMP must consider it and provide explicit immediate plans for improving safe pedestrian movements along and between the north and south side of King St. Although two new pedestrian traffic lights were installed recently at Ogilvie St and Foundry St, they were rendered ineffective by programming the signal response times to prioritize automobiles movement over the need of pedestrians. Compare this ill advised approach to the visionary leadership of neighbouring councillor Brian McHattie and responsive city public works dept staff, who optimized the pedestrian operated traffic light at Cootes Drive near McMaster. While the light is synchronized with the nearby light at Main St and is slow to respond to pedestrian needs during rush hours, it provides almost instantaneous green pedestrian light on demand at off peak hours. Hence pedestrian can cross the street always safely and quickly much of the time. This compromise approach, which is also used widely in other Canadian cities, should be adopted in downtown Dundas as well. There are many more specifics we could include, but suffice to say we think that the DDTMP requires substantial revision and intend to take immediate further actions to ensure that the Valley town receives the transportation master plan it deserves. Monday, January 11, 2010 City council voted today to double parking meter rates to $1 per hour across the city and install paid parking on Locke Street, and in Stoney Creek (King Street), Ancaster (Wilson Street) and Waterdown (Dundas Street). The move, which will be implemented July 1, is expected to bring in an extra $1.45 million each year. The decision didn’t come without a fight. Councillor Brian McHattie moved to delay installing parking machines on Locke Street until a city-owned parking lot is up and running in the area. That motion lost on a tie vote after council learned it could take up to two years to open the new lot — a decision McHattie called “very, very disappointing.” “Any time you work hard as the ward councillor to find a compromise solution and your colleagues don’t support you, you feel betrayed,” he said. The city is still moving forward with plans for at least one parking lot off Locke. Council also voted against a motion from Councillor Margaret McCarthy, who argued that paid parking shouldn't be implemented in Waterdown until its development freeze is lifted. Yesterday's decision ended a long-running debate about Hamilton's parking rates. In December 2008, council rejected a similar increase, arguing it wouldn't be fair to merchants to risk driving customers away during a recession. This year, many council members instead said paid street parking will be positive for businesses as it will encourage more turnover of parking spaces. They also argued it will encourage more people to walk or take public transit. Sunday, January 03, 2010 Over the next ten years, the city is budgetting to complete only about one-fifth of the cycling improvements endorsed by council last summer. Thanks to a volunteer community group, the full plans can now be viewed on-line. Transportation for Liveable Communities (TLC) hopes their on-line map will encourage residents to lobby councillors to speed up implementation. “We decided to make the map available online so people can see where the new bike lanes and multi-use trails will be and think about how the new routes can be used in their day-to-day routines.” said Nicholas Ellens of TLC in a media release last month. “We encourage people to pick up the phone and let their councillors know that they support the plan". The city’s long-term plans were approved in principle last June and call for 223 projects to improve Hamilton’s cycling network in the urban area plus 49 in the rural region. The projected total cost is $51.5 million – somewhat less than the $55 million council has decided to take from the Future Fund to cover the city’s contribution to the 2015 Pan Am Games. For 2010, the city has approved capital budget spending of $1.3 million to complete eight bike lane projects. But the expected expenditures over the rest of the decade average just $950,000 a year for new cycling infrastructure. New lanes are to be established this year on Woodward Avenue, Burlington Street, Queensdale Avenue, York Boulevard, and Wilson Street at a total cost of just over $1 million. The remaining $250,000 will go to rehabilitating existing cycling facilities on Longwood Road and Stone Church Road. The Woodward project is the most expensive at $400,000 and will add bike lanes between Melvin and Brampton as part of a $3.5 million road reconstruction project. This year’s new lanes on Burlington Street will run from Birch to east of Ottawa – the first phase of a planned bike route all the way from Ferguson Avenue to Parkdale. A multi-use bridge over the QEW near the Red Hill Parkway for the use of both cyclists and pedestrians is also expected to be opened in 2010. That’s being paid for by a provincial government grant. TLC argues more bike lanes will help reduce auto dependency and encourage increased numbers of commuters to cycle. “Cycling is a healthy, clean, efficient, and affordable alternative to driving,” said Ellens. “A connected network of lanes, paths, and in some places bridges will make cycling in the city a much safer option, overcoming a major obstacle that discourages many from participating.” Last month Reuters reported that cycling to work in the United States has increased 43 percent in the last decade. The US Census Bureau figures put Portland Oregon at the top of the list with 6 percent of commutes carried out by bicycle, but these numbers are still far below European cities. More than a third of the residents of Greater Copenhagen, for example, use a bike to get to work or school and that number climbs to 55 percent if you only count those within the city limits, reports Globe and Mail columnist Gary Mason. “Bikes are everywhere: in vast lots outside train stations, leaning against buildings, locked to racks that are as ubiquitous as Carlsberg signs,” he observed. “The people riding them are dressed for all occasions. You see men in pin-striped suits and women in skirts and high heels. Few ride anything but old, traditional one-speeds.” Copenhagen’s efforts to build a “bike culture” have included setting traffic signal coordination for cycling speeds instead of car, stop lines for bikes five metres ahead of cars, and giving cyclists a green light several seconds ahead of cars. In Canadian developments, Montreal added 104 kilometres of bike lanes in the last two years to bring their total to over 500 km. And last spring they joined Paris, London and New York in putting thousands of rental bikes on the streets, a move described as “huge boost to cycling” in the Quebec city. CATCH (Citizens at City Hall) updates use transcripts and/or public documents to highlight information about Hamilton civic affairs that is not generally available in the mass media. Detailed reports of City Hall meetings can be reviewed at www.hamiltoncatch.org. You can receive all CATCH free updates by sending an email to info@HamiltonCATCH.org.
2024-01-11T01:27:04.277712
https://example.com/article/6436
The goal of this project is to cross reference the functional information known about yeast genes with genetic maps of the human and mouse genomes. Rapidly expanding human EST databases will serve as a source of novel human transcribed sequences that win be searched using yeast protein sequences as queries. Human cDNA sequences from which the ESTs were derived will be mapped to human chromosomes and their positions determined precisely in the mouse genome. The comparative mapping information will directly link functional information among yeast, mouse, and human gene loci. Specific experimental aims are: l. Search the EST database for human homologs of yeast genes. All available yeast gene sequence information will be used to search the EST database repeatedly. 2. Further refine computer search protocols for identifying ESTs corresponding to yeast genes. Periodically, the search parameters will be evaluated (both prospectively and retrospectively) to optimize the success rate in identifying true yeast/human homologies. 3. Map ESTs on human and mouse chromosomes. ESTs will be assigned to specific human chromosomes using somatic cell hybrids and positionally mapped on mouse chromosomes using a highly informative interspecific hybrid backcross panel. 4 Facilitate the collection of sequence information from the yeast community. An informal arrangement has arisen in the yeast community to collect gene sequences at a central source. Approximately one half of the 1500 yeast genes sequenced to date are unpublished and therefore not in public databases. All yeast researchers will be informed of this project and encouraged to submit prepublication protein sequences. Mapping reagents generated by the Human Genome Project are facilitating positional mapping of mutations in genes responsible for human disease. At present, yeast genetic information is not cross referenced to mammalian genomes. A wealth of biological information has been obtained about a large percentage of the yeast gene repertoire. This project will facilitate progress in the understanding of gene action in normal and disease processes in mammals.
2024-01-13T01:27:04.277712
https://example.com/article/8827
At the Foot of the Ladder At the Foot of the Ladder is a 1912 American silent short romantic comedy written by Lloyd Lonergan. The film starred Mignon Anderson, William Garwood, Carey L. Hastings, Harry Chamberlain, and Riley Chamberlain. Cast Mignon Anderson as The Debutante William Garwood as The Society Leader Carey L. Hastings as The Debutante's Mother Riley Chamberlain as The Debutante's Father Harry Chamberlain as The Reporter External links Category:1910s romantic comedy films Category:Thanhouser Company films Category:1912 films Category:American romantic comedy films Category:American silent short films Category:American films Category:American black-and-white films Category:1910s short films
2024-02-25T01:27:04.277712
https://example.com/article/7794
There are many applications in academic, industrial, and medical fields that benefit from devices and methods that are capable of accurately and controllably delivering fluids, such as liquids and gases, that have a beneficial effect when administered in known and controlled quantities. Such devices and methods can be particularly useful in the medical field where treatments for many patients include the administration of a known amount of a substance at predetermined intervals. One category of devices for delivering such fluids is that of pumps that have been developed for the administration of insulin and other medicaments for those suffering from both type I and type II diabetes. Some pumps configured as portable infusion devices can provide continuous subcutaneous medicament injection and/or infusion therapy for the treatment of diabetes. Such therapy may include, e.g., the regular and/or continuous injection or infusion of insulin into the skin of a person suffering from diabetes and offer an alternative to multiple daily injections of insulin by an insulin syringe or an insulin pen. Such pumps can be ambulatory/portable infusion pumps that are worn by the user and may use replaceable cartridges. Examples of such pumps and various features that can be associated with such pumps include those disclosed in U.S. Patent Application Publication No. 2013/0053816; U.S. Pat. Nos. 8,573,027; 8,986,253; U.S. Patent Application Publication No. 2013/0324928; U.S. Patent Application Publication No. 2013/0331790; U.S. Pat. No. 8,287,495; U.S. patent application Ser. No. 15/241,257 (filed Aug. 19, 2016); and U.S. patent application Ser. No. 15/158,125 (filed May 18, 2016), each of which is hereby incorporated herein by reference in its entirety. One type of pump that has been developed is a patch pump, or micro pump. Patch pumps are small pumps, typically ambulatory, that may be carried directly on the skin under the user's clothing. In some cases, the pumps are situated directly on, or very near to, the injection site such that little or no tubing is required to deliver the insulin or other medicament to the patient. Some patch pumps include a single button on the pump to initiate delivery of medicament and do not include a built-in display or user interface. These pumps are therefore primarily remote-controlled. Having only a single button on the pump provides the advantage of being more robust for waterproofing and resistance to external contaminants. However, a disadvantage is that the functionality of a pump with a single button is limited without the use of a remote control apparatus, typically including a user interface.
2023-11-01T01:27:04.277712
https://example.com/article/9940
<!--title:Message Storage Management--> ## From the Command Line As of Jasper v0.9.5, Jasper comes with a built in command for adminstering database backed persistence. Assuming that you're using <[linkto:documentation/console;title=Jasper's command line support]>, you have the command `storage` with several options. At the command line in the root of your application, you can rebuild the message storage schema objects with: ``` dotnet run -- storage rebuild ``` You can also query the current counts of persisted input, output, and scheduled messages with: ``` dotnet run -- storage counts ``` You can dump the SQL to create the necessary database objects to a file for usage in database migration scripts with: ``` dotnet run -- storage script --file SomeFilePath.sql ``` And lastly, if you just want to clear out any persisted incoming, outgoing, or scheduled messages in your application's database, use: ``` dotnet run -- storage clear ``` ## Message Storage in Testing Let's say that we're all good developers who invest in automated testing of our applications. Now, let's say that we're building a Jasper application that uses Sql Server backed message persistence like so: <[sample:SqlServerPersistedMessageApp]> If we write integration tests for our application above, we need to guarantee that as part of the test setup the necessary Sql Server schema objects have been created in our test database before we run any tests. If you notice in the code above, there's a property called `JasperOptions.Advanced.StorageProvisioning` that is defaulted to `None`, but can be overridden to either `Clear` to delete any persisted messages on application startup or `Rebuild` to completely drop and rebuild all message persistence storage objects in the database upon application startup. In addition to the `StorageProvisioning` property, there is also an extension method hanging off of `IJasperHost` called `RebuildMessageSchema()` that will completely rebuild all the necessary schema objects for message persistence. Below is an example of using an [xUnit shared fixture](https://xunit.github.io/docs/shared-context) approach for integration tests of the `MyJasperApp` application. <[sample:MyJasperAppFixture]>
2024-03-15T01:27:04.277712
https://example.com/article/7854
Examples showing our UV penlight and UV Ink Below are some real life examples showing the UV penlight illuminating special features on packaging, papers, bills and powders. The actual visual appearance is even brighter than these pictures suggest as it is difficult to accurately photograph UV light and fluorescing materials. Security stripe on shrink wrap packing US Certified Mail identification square Bill security strip Theft detection powder Crowd and access control Invisible security marking Blacklight / Ultraviolet (UV) Viewable - Isopropyl Alcohol Based Our Invisible Ink uses special High-Brightness Ultraviolet (UV) Blacklight Viewable compounds. The Invisible glows a bright blue and UV or Blacklight including our special UV flashlight. Under normal light, this ink is completely invisible. This ink can only be seen when illuminated by a UV or Blacklight emitting in the 350nm - 385nm light range. The ink is permanent and can be applied to paper, some plastics, skin, wood and almost any substance. The ink does not wash off, but will eventually wear off if applied to skin. The ink may smear when rubbed on some glossy materials such as glass and some plastics. The ink will fade if left exposed to sunlight for about 1 week. If the ink is not left exposed to the sun, the ink will last indefinitely. If you are marking plastic, you may want to try the invisible red acetone based ink or the invisible yellow MEK based ink. Different types of plastics and different types of surface finishes after if an ink can be smeared when rubbed after drying. Depending on the light used, this ink will appear a blue or white depending on UV light used. Please see pictures below for color appearance. Applications Access Control At Parties, Nightclubs, Dances, Special Events Security Codes Use to mark personal belongings invisibly Beverage Hand Stamps Permanently mark or sign documents to prevent forgery and fraud Ink can be seen under an ultraviolet lamp by police departments The ink used in our ink pads our a special slow evaporation invisible ink. Because pads have a large surface area when open, we use a slower drying ink than our normal quick dry ink. To replenish pad, use our special UV Stamp Pad ink. Ink pad is delivered in a sealed zip lock bag. When pad is not in use, pad should be kept in sealed bag to prevent ink evaporation. Ultraviolet lamps to fluoresce invisible inks is a popular method of readmitting patrons to amusement parks and other establishments where re-entry control is required. LDP High-Visibility Inks can be applied to the patron's hand when exiting the park. When re-entering the park, the patron passes the stamped hand under the ultraviolet lamp to fluoresce the ink Our Jumbo UV invisible ink pens are available in regular fast dry and slow dry ink. The fast dry ink becomes invisible within a few seconds. The slow dry ink leaves a visible mark for about 15 minutes. The slow dry ink is useful were you want to temporarily see the mark to verify its application. Re-admittance type inks are designed for use at amusement parks, swimming pools, social gatherings, bars/night clubs and sporting events. Inks are fast-drying and non-transferable. High Brightness Blue Inks are sold in the following sized bottles: 1/4 ounce 1/2 Ounce 1 Ounce 2 Ounces 500ml Ultraviolet Ink Pad Invisible Ink Stamp Pad. High-Brightness Blue UV Ink Pad can be re-inked with our bottled UV Ink Felt pad holds a large quantity of ink and wears much longer We recommend that when ordering the Stamp Pad that you also order replacement UV Stamp Pad Ink. The UV Ink used is alcohol based and evaporates more quickly than traditional oil based visible inks. UV Stamp Pad Ink is only available in 2 size or 500ml size. Ultraviolet Bottled Ink 1/4 Ounce Bottle High Visibility Bright Blue Invisible Ink Glass Bottle Teflon Lined Cap Ultraviolet Powder Non-Toxic Invisible when mixed Non-reactive Long Term Stability Highly Fluorescent Send mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with questions or comments about this web site.
2024-06-07T01:27:04.277712
https://example.com/article/3337
Baoji () is a prefecture-level city in western Shaanxi province, People's Republic of China. Since the early 1990s, Baoji has been the second largest city in Shaanxi. Geography The prefecture-level city of Baoji has a population of 3,716,731 according to the 2010 Chinese census, inhabiting an area of . The built-up area made of 3 urban districts had a population of approximately 1,437,802 inhabitants as of the 2010 census. Surrounded on three sides by hills, Baoji is in a valley opening out to the east. Its location is strategic, controlling a pass on the Qin Mountains between the Wei River valley and the Jialing River. Passing through Baoji is the ancient Northern Silk Road, the northernmost route of about in length, which connected the ancient Chinese capital of Xi'an to the West over the Wushao Ling Mountain to Wuwei and emerging in Kashgar before linking to ancient Parthia. History Thriving early in the Tang dynasty, it has roots to 2000 BC. Today it is a large industrial center. Railways first reached Baoji in 1937 and have been key to its modern growth. Baoji is considered the gateway between western and eastern China since most trains from Beijing, Shanghai and Xi'an pass through here on their way to Gansu, Sichuan, Xinjiang and Tibet (Lhasa). Fa Men Si (Famen temple), home to one of Buddha's finger bones, is in Baoji County. The Baoji area was home to the legendary Yandi, one of the Han Chinese forefathers. His tomb is in the southern part of the city and his temple is in the north. People who are interested in the Three Kingdoms of ancient China can visit Zhuge Liang's Memorial Temple, about from Baoji. Ancient trackways Mount Taibai still has some remaining traces of roadways built during the Three Kingdoms Period (220−280 CE) which are all generally unusable due to decay. They remain a popular attraction because they were built by making wood plank bridges along the side of the mountain. To the South of Baoji lies the beginning of the plank road into the Qin Mountains. There are also several natural sites such as the Jialing Jiang Fountainhead with its small waterfalls and forests. To the north is Bei Puo, a giant hill made of loess with a panoramic view of the city and a landscape dotted with small farming villages that offer local cuisine. A number of Longshan archaeological sites have been found north of the Wei River near the North Silk Road. Baoji Bronze Museum Baoji is home to the Baoji Bronze Museum which holds more than 120,000 pieces of cultural relics, primarily of Zhou dynasty descent. The museum ranked No.1 on TripAdvisor among 41 attractions in Baoji. Administrative divisions Climate Economy Industrial Zone Baoji Hi-Tech Industrial Development Zone Established in 1992, Baoji Hi-Tech Industrial Development Zone was approved as a national hi-tech zone by State Council. It has a long-term planned area of . The transportation system around the zone includes Xi'an-Xianyang International Airport and National Highway 310. Its encouraged industries are auto parts, electronics, IT, pharmaceutical and bioengineering industry and new materials. Military Baoji is the headquarters of the 21st Group Army of the People's Liberation Army, one of the two group armies that comprise the Lanzhou Military Region responsible for defending China's northwest borders. Transportation The G85 Yinchuan-Kunming Expressway, China National Highway 310, and G30 Lianyungang-Khorgas Expressway are major highways that run through Baoji. The city is serviced by the Baoji South on the Xi'an-Baoji and Baoji-Lanzhou sections of the Xuzhou-Xinjiang high speed railway. The Longhai, Baocheng and Baozhong railways also call at Baoji railway station. A metro system is in the planning stages. See also List of twin towns and sister cities in China References External links Baoji City Government Website Category:Cities in Shaanxi Category:National Forest Cities in China
2024-07-19T01:27:04.277712
https://example.com/article/1554
The ethereum community has broken its silence over a move to better facilitate the return of funds lost on the platform. In wake of the departure of ethereum developer Yoichi Hirai, who resigned from his role supervising the software’s changes Thursday, community members have stormed Github in resounding rejection of the controversial proposal over which he left his post. In the last 24 hours, over 80 comments have been posted to the blockchain network’s official GitHub, with most stating they “do not support” or are “strongly opposed” to ethereum improvement proposal (EIP) 867, which details a method to standardize the use of system-wide software upgrades to return funds lost on the platform. Often occurring as a result of faulty code, fund recovery is a sensitive topic for the platform, having previously led to the development of a rival cryptocurrency named ethereum classic. The heated response, in which many are coming forward to express support for the developer, marks a sharp contrast to the silence earlier in the week, with some even writing that the proposal is a “complete disgrace to the ethereum community.” Speaking on the thread, developer William Entriken warned about the potential consequences of normalizing lost fund recovery in comments that showcased the emerging sentiment. “Here’s the unintended consequence of having a readily available, well documented, and standardized tool like this available,” he wrote. Others dismissed the proposal as “very damaging” as well as “scary, and an absolute joke,” while another wrote that it “goes against everything I thought this movement was for.” The outrage also mirrors reaction observed in a core developer meeting last week, where ethereum developer Vlad Zamfir spoke of the necessity for community feedback on the matter, stating that EIP 867 was perhaps too important to undergo the usual EIP process. Adding to the issue is that confusion has emerged over the status of the proposal, which was formally entered into GitHub, first as an “issue” (or an early-stage sketch), and later as a “pull request,” a formal software outline that code become merged with the platform’s live code. James Levy from Tap Trust, one of the three developers leading the proposal, closed the Github issue in the midst of the activity last night, sparking confusion that EIP 867 is no longer active. However, to date, the corresponding pull request remains open, and at press time, continues to generate feedback. Smashed keyboard via Shutterstock
2023-09-12T01:27:04.277712
https://example.com/article/1161
An antibiotic overlooked since its discovery 40 years ago could help develop new drugs against life-threatening infections caused by some of the world’s most dangerous superbugs. University of Queensland Institute for Molecular Bioscience (IMB) researchers synthesised the antibiotic, and increased its effectiveness against extensively drug-resistant bacteria, then collaborated with Monash University to evaluate the drug using animal models of infection. Professor Matt Cooper, Director of IMB’s Centre for Superbug Solutions, said the study was prompted by the urgent need for new drugs to counter widespread resistance to last-resort treatments. “Octapeptins were discovered in the late 1970s but were not selected for development at the time, as there was an abundance of new antibiotics with thousands of people working in antibiotic research and development,” Professor Cooper said. “Given the very few researchers left in this field now, and the sparse pipeline for new antibiotics, we’ve used modern drug discovery procedures to re-evaluate its effectiveness against superbugs.” Professor Cooper said there were no new classes of antibiotics available for Gram-negative bacteria, with increasing incidence of extensive drug resistance around the world. “Gram-negative bacteria are harder to kill as disease organisms, because they have an extra membrane to penetrate that is often hidden by a capsule or slime layer which acts to camouflage them from drugs and our immune system,” he said. “The emergence of resistance to meropenem, and now colistin, the antibiotic of last resort, means multi-drug and extensively drug-resistant bacteria are now a reality confronting clinicians. “Octapeptin showed superior antimicrobial activity to colistin against extensively resistant Gram-negative bacteria in early pre-clinical testing. “In addition, octapeptin was shown to be potentially less toxic to the kidneys than colistin.” Professor Cooper said the study laid the foundation for the development of a new generation of antibiotics to treat life-threatening infections. Researchers from Wayne State University in Detroit, the University of Melbourne, Germany’s EMBL, and Victoria University in New Zealand collaborated on the project. IMB research was supported by the National Health and Medical Research Council, and the US National Institute of Allergy and Infection Disease, part of the US National Institutes of Health. The study is published in Cell Chemical Biology. Media: Professor Matt Cooper, m.cooper@uq.edu.au, +61 7 334 62044; IMB Communications, communications@imb.uq.edu.au, +61 7 3346 2155, +61 427 530647.
2024-01-28T01:27:04.277712
https://example.com/article/7047
Hypnosis & Sport by Jeffrey Hodges B.Sc. M.Sc(Hons) IntroductionIf you've ever watched a stage hypnotist have someone act like a chicken, or stand on their head, or do some other equally stupid or frivolous behaviour, you may have wondered whether hypnosis could be used in more useful and constructive ways. You may perhaps have heard of hypnosis being used to stop smoking, lose weight or change some other unwanted behaviour, but could it be used to do better what you already do well? Can hypnosis, for instance, assist sportspeople to improve their performances? The answer is a resounding 'YES!' Through the use of SPORTS HYPNOSIS techniques, not only can an athlete successfully change an unwanted behaviour or habit, but limiting perceptions and beliefs can be released; pain controlled and injuries healed more rapidly; self confidence increased; and sports performances significantly improved. What is Hypnosis? There are many myths, misunderstandings and half truths about hypnosis - due no doubt to the fact that very little is understood about how or why hypnosis works, and even among experienced hypnotists there is significant disagreement about hypnosis. So exactly what is hypnosis, and how can it improve my game? One way to talk about hypnosis is to say that it is a process in which a person induces in themselves a state of mind, (often called a 'trance'), in which their perceptions are significantly altered from those normally experienced in the usual waking state, and in which they have access to a greater range of personal resources and abilities. The resources and abilities of their unconscious mind. It's important to realise that while some students of hypnosis disagree, many hypnotists understand that it is impossible to have someone follow a suggestion that the person doesn't want to follow. The role of the hypnotist then is not to 'put someone into a trance', but rather the hypnotist helps to create an environment in which the person themselves changes their ordinary 'conscious' perceptions and accesses more 'unconscious' perceptions and resources - and so changes themselves. No-one can hypnotise you - but you can choose to hypnotise yourself! In fact, this is essentially what you are doing every minute of the day - self hypnosis! When you say to yourself, "I've got a weak backhand"; or "I always slice"; or "I never play bunkers well"; or "We never play well at that venue", then you're just hypnotising yourself to making it come true! Many of the currently accepted limitations in sport - for example, the supposed 'home advantage' - are simply instances of mass hypnosis, perpetuated by the media, coaches, team mates, etc, and not really 'true' at all. Hypnosis and Sport Hypnosis works because of the existence of the 'conscious' and 'unconscious' minds. Our conscious mind represents only a small fraction of the mind's total potential, and the ability to tap into the unconscious parts of the mind and its resources allows an individual to significantly enhance their performance. Excellence in sport is a combination of unconscious competence, and unconscious confidence. Unconscious competence in the skills of your sport is developed through hours of practice and repetition until the skills are natural and automatic, and most sportspeople spend much of their time training in this way. Every sportsperson knows that you play best when you play 'unconsciously' - when you 'just do it', without conscious trying or striving .... when you are unconsciously competent. So hypnosis - being a method by which one becomes more familiar with the unconscious mind and its resources and abilities - is something sportspeople can greatly benefit from. Further, the 'peak' experience in sport - those times when you are so in the 'zone' you are unbeatable - is essentially a 'trance' state. Through the use of hypnosis, sportspeople can consistently create these type of peak experiences by choice and design, rather than have them happen by chance or accident. On the other hand, unconscious confidence is a result of parental and social conditioning, and determines your habitual and automatic emotional responses to what others say to you, or about you. Hypnosis can be used to positively program unconscious confidence to replace negative conditioning, or to fill in gaps where there was no positive encouragement as a younger person, and to enhance and amplify the existing positive conditioning. I've identified five main areas where hypnosis may be of benefit to sportspeople and coaches: Performance Enhancement Hypnosis may be used in the following ways to enhance athletic performance: - Increased sensory perception. In hypnosis, sensory perceptions are enhanced and this improved sensory capacity can be transferred to sporting contexts. - Change unwanted behaviours and habits. Inappropriate and unwanted behaviours that are preventing an athlete from achieving their full potential can be influenced with hypnosis. For example: eating disorders, smoking, alcohol or drug addictions, overly aggressive or disruptive behaviours, and even learning difficulties. - Unlock latent abilities and reprogram limiting beliefs. One of the most commonly experienced positive consequences of the experience of hypnosis is a changed perception of what is possible, and the surprise of tapping into hitherto unknown resources and abilities, leading to a greater sense of personal confidence and self esteem. - Role model identification. Trance states may also be utilised to model the skills and behaviours of top players in a given sport, and through this modelling allow an individual to acquire those specific skills and behaviours at an accelerated rate. Time Distortion Time distortion is the ability to 'stop' or 'stretch' time - similar to what happens when you experience a life threatening incident and everything, apparently, slows down. I'm sure you've recognised the ability of elite sportspeople to apparently have so much time to get into position and play their shots. Essentially what they're doing is 'stopping' or slowing their perception of time. This can be taught and trained through hypnosis. Confidence and Self Esteem Truly it's not what others say to you, but rather, what you say to yourself after they stop talking. The kind of unconscious confidence that we see in champions is a result of not having to think about being confident or trying to talk yourself up - it's a result of having deeply ingrained at an unconscious level an unshakable positive self image and powerful positive self talk that isn't affected by what others say. This can be strengthened through the use of hypnosis. Pain Control and Healing Likewise, athletes can be taught pain control techniques to use when under duress, and body healing techniques to speed recovery from both injuries and heavy workouts. Two relatively well known uses for hypnosis in pain control are in dentistry and obstetrics where a trance is induced to allow the dentist to drill a filling, or the mother to give birth, with little or no pain. Surgical operations have even been performed without anaesthetic drugs - the only pain control method used being hypnosis. Further, recent work in hypnosis has shown that it may be of assistance in healing both chronic diseases such as cancer and heart disease, and in recovering from injuries. Like all hypnotic skills, both pain control and healing require considerable hypnotic training and practice to achieve, but may be learned by anyone with dedicated effort and consistent practice. About Jeffrey Hodges B.Sc.(AES) M.Sc.(Hons) Jeffrey Hodges is a performance consultant to elite athletes, sporting teams and corporate clients. He is the author of the widely acclaimed "Sportsmind - An Athlete's Guide to Superperformance Through Mental & Emotional Training" and "Champion Thoughts, Champion Feelings"; creator of the Sportsmind performance enhancement workshops and audio tapes; and Director of the Sportsmind Institute for Human Performance Research. He is a NLP Master Practitioner and Associate Trainer, and his Sportsmind programs have been endorsed by the NSW Dept Sport & Recreation, and recommended by top sportsclubs and successful athletes. Jeffrey has competed in many sports, notably Volleyball, Squash, Soccer and Golf, and currently trains in Aikido, holding a black belt. Some of his clients to date include : Australian Rugby Union St. Joseph's College Woodlands Golf Club Financial Institutions Remuneration Group (FIRG) Societe Generale Qld. Swimming Network for Fitness Professionals North Sydney and Penrith Rugby League Clubs Qld. Athletics Assn NSW Netball Assn Northern Inland Academy of Sport Victorian Soaring Assn Orange Agricultural College Equestrian School Qld and NSW Departments of Sport and Recreation Qld Academy of Sport and the RAAF.
2024-02-06T01:27:04.277712
https://example.com/article/1962
Aside from a problematic phrase about Guilfoyle picking grapes, Stasi’s piece was also stupid because Guilfoyle is not a reporter, and no one who is remotely familiar with her work at FNC would believe otherwise. Imagine writing 400 words on this concept, without googling and discovering that Guilfoyle isn't a reporter https://t.co/DqtCyWK1Wp But if we’re going to start calling for networks to sever ties with pundits over romantic relationships with political power players, shouldn’t Stasi be more concerned about perhaps the most egregious offender? Earlier this month, Ben Rhodes joined NBC and MSNBC as a political contributor, and as tweeter @AG_Conservative points out, Rhodes has been carrying on a politically troubling sexual relationship for some time now: NBC should fire Ben Rhodes. He can’t possibly stay neutral while he’s still having sexual relations with Obama’s legacy.
2024-07-08T01:27:04.277712
https://example.com/article/3055
Q: At the last day When Jesus spoke of the resurrection in John 6:39,40,44,54 he said the resurrection would occur "at" the last day. Is there any significance to the use of the word at rather than the word on. A: This is a question about English usage. The Greek original has “en”, which can be translated as “in, on, at” depending on the context. In modern English we normally say “at” a certain time, “on” a given date, but in Early Modern English one often finds “at” where today we would say “in” or “on”. The Oxford English Dictionary, entry “at” IV 29 a, has a quotation for “ate grete day of Jugement” from 1477, and “From 3 at after noone” from 1586.
2024-01-01T01:27:04.277712
https://example.com/article/4490
Measurement of sexual disinhibition in dementia: A systematic review. Sexual disinhibition in dementia is correlated with multiple negative care recipient and caregiver outcomes but remains largely overlooked in the literature. Its prevalence is not well understood, with studies reporting between 1.8% and 25% presence of sexual disinhibition in dementia samples. One reason for the variability in the reported presence of sexual disinhibition may be lack of standardized methods for assessment. Several widely used measures for neuropsychiatric symptoms do not include items to assess sexual disinhibition. When measures do include sexual disinhibition, it is not addressed in a consistent manner. Inconsistency in how questions about sexual disinhibition are phrased is problematic, given that recent work shows it can differentially influence endorsement. Working toward a gold standard of sexual disinhibition measurement in dementia is needed. To this end, a systematic review of the literature to identify potentially appropriate instruments for measurement of sexual disinhibition in this population was conducted through the Web of Science and PubMed databases between January 2019 and February 2019. An overview of the 20 measures identified in this search is provided. Each measure is evaluated for appropriateness of use in dementia samples through broad examination of psychometric properties, structure, and format and the extent to which measure content overlaps with current conceptualizations of sexual disinhibition in dementia. Five common content domains were identified: hypersexuality, lewd/aberrant sexual behavior, inappropriate sexual advances, inappropriate sexual comments, and socially disruptive sexual behavior. No single measure addressed all content domains. Directions for future research are identified and discussed.
2023-09-03T01:27:04.277712
https://example.com/article/8263
Introduction {#s1} ============ Humans follow a roughly 24-hour rhythm of sleep and wake. This rhythm is generated by a master pacemaker located in the suprachiasmatic nucleus of the hypothalamus. This internal clock maintains an intrinsic circadian rhythm of approximately, but not exactly, 24 hours. To ensure this internal circadian rhythm matches the 24-hour day, the internal circadian rhythm is entrained to 24 hours by external factors. These external factors are referred to as zeitgeibers (German for "time givers"). A variety of factors can serve as zeitgeibers such as social schedule or temperature. The most important zeitgeiber is light. Photo-sensitive retinal ganglion cells provide direct input and regulation of the suprachiasmatic nucleus. Non-24 hour sleep-wake disorder (N24) is a rare circadian rhythm disorder in which circadian entrainment to the 24-hour day is lost \[[@R1]\]. This results in a progressive desynchrony between internal circadian rhythm and external clock time. Over time the circadian rhythm of sleep and wake drifts in and out of phase with the external environment. This results in nighttime awakenings and daytime sleepiness when the rhythm is out of phase and normal sleep when the rhythm is in phase, thus creating a pattern of cyclical insomnia. The most common cause of N24 is total blindness, as loss of visual input prevents entrainment to light \[[@R2]\]. Melatonin is capable of regulating the pacemaker by shifting the circadian rhythm to proper alignment with the rhythm of day and night. Melatonin receptor agonists have been used to re-entrain the pacemaker \[[@R2]\]. Tasimelteon, a dual MT1 and MT2 receptor agonist, is the only Food and Drug Administration approved treatment for N24 and has been shown to be effective in phase III clinical trials \[[@R2],[@R3]\]. Tasimelteon is currently only approved for individuals with N24 who are 18 years and older, thus limiting access to children and adolescents with N24. We present a case report of a totally blind adolescent with severe insomnia due to a combination of N24 and restless leg syndrome that was successfully treated with tasimelteon, iron replacement, and gabapentin. Case Presentation {#s2} ================= The patient is a 17-year-old blind female who presented to the sleep medicine clinic with four years of treatment-resistant insomnia. At her initial appointment, the patient reported no current difficulty with sleep initiation, but consistently awakens during the night and is unable to return to sleep. Sleep difficulties tend to wax and wane across months, such that there are periods of no disturbance alternating with periods of progressively worse sleep. The patient had tried melatonin (including immediate as well as sustained release formulations), eszopiclone, zolpidem, sublingual vitamin B12, clonidine, trazodone, valerian root, and gabapentin, all of which were either temporarily effective or completely ineffective. Her medications at the initial evaluation included naproxen, topiramate and magnesium for migraines, in addition to 5 mg immediate release melatonin and gabapentin 100 to 300 mg for insomnia. The patient's social history was remarkable for attending high school full time and maintaining a consistent routine including a consistent bedtime of 10 PM and waketime of 6AM on weekdays and weekends. She was not employed outside of school. She reported a history of multiple years of having an urge to move her legs that is worse at night, better with movement, and keeps her awake several nights out of the week. She was taking 100 to 300 mg gabapentin nightly for restless leg syndrome, which she reports has helped intermittently, but still complains of urge to move her legs some nights that awakens her at night after initially having fallen asleep. She was unable to tolerate gabapentin doses higher than 300 mg secondary to residual daytime sleepiness the following morning. She also tried magnesium for her restless leg syndrome, but it did not help. She did report a history of heavy menses which started at age 12 but denied a previous diagnosis of anemia. The patient was diagnosed at one year of age with bilateral retinoblastoma, which was treated with bilateral enucleation. At age 13, patient underwent polysomnography, which showed wake time after sleep onset of 83 minutes and a sleep efficiency of 76 percent. Periodic limb movement index was elevated at 12/hour (normal is \<5 in children). The periodic limb movement with associated arousal index was 8/hour and there was an association with nocturnal awakenings. Respiratory parameters were normal, with no evidence of central or obstructive sleep apnea. Based on the history of cyclical insomnia and total blindness, the patient was evaluated for N24 using actigraphy. Example actigraphic data is presented in [Figure 1](#F1){ref-type="fig"}. Over the 14-day recording period, the patient exhibited a pattern of progressively delayed bed times followed by a compensatory night of going to bed early, which is consistent with N24. This was initially managed with 5 mg continuous release melatonin nightly to treat her sleep maintenance insomnia based on previous studies in adolescents \[[@R4],[@R5]\] as well as the reported previous lack of efficacy of immediate release melatonin. Given the patient's elevated periodic limb movement index as well as reported restless leg syndrome symptoms, serum ferritin was checked and reported to be 19 ng/ml. She was started on 325 mg ferrous sulfate daily and continued on gabapentin. At follow-up four months later, the patient reported improvement of her restless leg syndrome symptoms after iron replacement. However, for the past several weeks, she was taking 2 to 3 hours to fall asleep nightly, as well as falling asleep during the daytime. This was thought to be secondary to her N24 given she no longer reported symptoms of restless leg syndrome. Given her persistent symptoms on continuous release melatonin, and her previous lack of response to immediate release melatonin, tasimelteon 20 mg nightly was started for her N24. Three months after starting tasimelteon, family reported that she was sleeping well and had no concerns at that time. She was able to reduce her gabapentin dose to 100 mg nightly. At her next follow-up two months later, patient reported tasimelteon made her sleepy in the evening without needing other medications or supplements. She was taking tasimelteon at 11 pm with sleep initiation shortly afterwards and would wake at 6 am. She denied any daytime sleepiness. She did note that her sleep was worse in the last two weeks following discontinuation of ferrous sulfate. Patient endorsed urge to move legs at night and that this was disrupting sleep. Serum ferritin was retested and reported at 25 ng/ml. Patient was instructed to resume iron supplementation and to continue gabapentin for restless leg syndrome, in addition to continuing to take 20mg tasimelteon for N24. Discussion {#s3} ========== We present an adolescent with multifactorial insomnia due to N24 and restless leg syndrome with symptom improvement after treatment for both underlying disorders. To our knowledge, this is the first published report of treatment of N24 with tasimelteon in an adolescent. In addition, this case highlights the importance of recognizing and treating multifactorial causes of insomnia. This is particularly important in children, as insomnia in children is frequently multifactorial \[[@R6]\]. Tasimelteon is currently approved to treat N24 in adults. Using markers of melatonin production, two phase III clinical trials demonstrated that after 1 month of treatment, 20 percent of N24 patients receiving tasimelteon were entrained, while 3 percent of the patients receiving placebo were entrained. Moreover, continued administration of tasimelteon maintained entrainment in 90 percent of patients, compared to only 20 percent in the placebo group \[[@R3]\]. However, there are no current data to support the use of tasimelteon in children. This is problematic because the highest prevalence of N24 is in non-sighted teenagers and young adults, who often have rigid school or work schedules and who are the most vulnerable to the negative impact of disrupted sleep \[[@R1]\]. Effective treatment of N24 in children and adolescents is critical to prevent impaired daytime functioning, social distress, and psychiatric disorders \[[@R1]\]. It should be noted that tasimelteon is costly, with a retail price of over \$100,000 per year, although this is subsidized by the manufacturer and the actual cost to patients may be much less than this. Prior studies have shown that immediate release melatonin at doses of 0.5 to 5 mg can be effective in phase-entraining the circadian rhythm in totally blind individuals, although it may take months to successfully entrain the patient as the effects of melatonin vary depending on administration time relative to an individual's circadian rhythm \[[@R7],[@R8]\]. Doses of 10 mg or higher may be ineffective \[[@R7]\], possibly due to a "washout" effect of the relatively high dose of melatonin preventing establishment of a normal increasing and decreasing level of endogenous melatonin. Given this, a trial of melatonin should be considered prior to use of tasimelteon. Unfortunately, no studies have performed a direct comparison of tasimelteon to melatonin to determine if tasimelteon is more effective than melatonin. In our case, the patient had used various doses of both immediate and continuous release melatonin without persistent improvement of her symptoms, therefore the family was very interested in use of tasimelteon. This case also highlights the frequent multi-factorial nature of insomnia in children \[[@R6]\]. In this case, treatment of both her N24 as well as her restless leg syndrome was necessary to resolve the patient's insomnia. Over the course of her treatment, adequate control of restless leg syndrome without control of N24 was associated with continued insomnia. Similarly, adequate control of her N24 with recurrence of her restless leg syndrome was associated with persistent insomnia. In this case, the patient's restless leg syndrome was associated with iron deficiency, a well-described association \[[@R9]\]. Given this association, for children with a serum ferritin \<50, oral iron therapy (along with vitamin C to improve absorption) is the recommended first line therapy for restless leg syndrome \[[@R10]\]. In cases where additional pharmacotherapy for restless leg syndrome is indicated, gabapentin is typically used as a first line agent in children due to the potential risk of increased impulsive behaviors with dopamine agonists such as pramipexole or ropinirole \[[@R11],[@R12]\]. The patient only had resolution of her insomnia when her N24 was treated with tasimelteon and her restless leg syndrome was treated with iron replacement and gabapentin. Conclusion {#s4} ========== This case of N24 in an adolescent demonstrates that tasimelteon was effective in a non-sighted adolescent, and additionally highlights the importance of recognizing and treating multiple underlying disorders in adolescents with insomnia. AST and DC wrote the initial case report. MAG edited the manuscript, analyzed the actigraphy data, and created the figure. All authors reviewed and approved the final manuscript. N24 : Non-24 hour sleep-wake disorder ![**Actigraphy results**. Light blue represents rest, while dark blue represents sleep. Over the course of the week, the patient progressively falls asleep later and later, while morning awakening occurs at the same time due to schedule constraints.](yjbm_92_2_201_g01){#F1}
2024-05-14T01:27:04.277712
https://example.com/article/5591
Dynamics of surface reactions studied by field emission microscopy and atom-probe mass spectrometry. Recent progress in imaging surface chemical reactions and adsorbate-induced reconstruction by means of field ion microscopy is reviewed. Achievements and prospects of a local chemical analysis during imaging are also presented and discussed. Major shape transformation is reported to occur during the field-free interaction of oxygen with Rh crystal tips. Rather than hemispherical when clean they appear polyhedral after reaction at temperatures between 500 and 550 K. Kinetic non-linearities are found in both the NO and NO2 reaction with hydrogen on the surface of a pyramidal Pt crystal tip. Oscillatory reaction behavior is observed for both reactions. In the NO2-H2 case explosive ignition in [0 1 2] planes is followed by one-dimensional chemical wave propagation along the <1 0 0> zone lines. Atom-probe time-of-flight mass spectrometry demonstrates that water (field ionized as H2O+ and H3O+) is the product of the catalytic reaction. During the NO/H2 reaction, dynamic formation and motion of small islands are observed. These islands appear on the (0 0 1) pole and are interpreted as being due to adsorbed hydroxyl species. Island sizes are confined to the equivalent of 10-30 Pt atoms.
2024-04-01T01:27:04.277712
https://example.com/article/9579
Q: Ninject injection in controller is null I have a web api and I have to use Ninject to do the DI. I followed the steps in the following tutorial, but still didn't manage to get it to work. Most of the solutions I found were for old ASP.Net, which didn't work in ASP.Net Core. And I understand that there's a difference between MVC projects and web-API projects. https://dev.to/cwetanow/wiring-up-ninject-with-aspnet-core-20-3hp The startup public class Startup { private readonly AsyncLocal<Scope> scopeProvider = new AsyncLocal<Scope>(); public IKernel Kernel { get; set; } private object Resolve(Type type) => Kernel.Get(type); private object RequestScope(IContext context) => scopeProvider.Value; public Startup(Microsoft.Extensions.Configuration.IConfiguration configuration) { Configuration = configuration; } public Microsoft.Extensions.Configuration.IConfiguration Configuration { get; } // This method gets called by the runtime. Use this method to add services to the container. public void ConfigureServices(IServiceCollection services) { services.AddMvc().SetCompatibilityVersion(CompatibilityVersion.Version_2_2); services.AddSingleton<IHttpContextAccessor, HttpContextAccessor>(); services.AddRequestScopingMiddleware(() => scopeProvider.Value = new Scope()); services.AddCustomControllerActivation(Resolve); services.AddCustomViewComponentActivation(Resolve); services.AddMvc(); } // This method gets called by the runtime. Use this method to configure the HTTP request pipeline. public void Configure(IApplicationBuilder app, IHostingEnvironment env) { Kernel = RegisterApplicationComponents(app); if (env.IsDevelopment()) { app.UseDeveloperExceptionPage(); } else { app.UseExceptionHandler("/Error"); // The default HSTS value is 30 days. You may want to change this for production scenarios, see https://aka.ms/aspnetcore-hsts. app.UseHsts(); } app.UseHttpsRedirection(); app.UseMvc(); } private IKernel RegisterApplicationComponents(IApplicationBuilder app) { // IKernelConfiguration config = new KernelConfiguration(); Kernel = new StandardKernel(new ApplicationBusinessLogicModule(), new DataAccessModule()); // Register application services foreach (var ctrlType in app.GetControllerTypes()) { Kernel.Bind(ctrlType).ToSelf().InScope(RequestScope); } // Here i do some more bindings Kernel.BindToMethod(app.GetRequestService<IViewBufferScope>); return Kernel; } private sealed class Scope : DisposableObject { } } public static class BindingHelpers { public static void BindToMethod<T>(this IKernel config, Func<T> method) => config.Bind<T>().ToMethod(c => method()); } The controller: [ApiController] public class GpsController : Controller { [Inject] public IGPSProcessor Processor; [HttpPost("[Action]")] public XmlDocument Gpsehi([FromBody]string message) { return Processor.Run(message); } } The property in the controller is always null, it shouldn't be null. A: As per documentation Ninject no longer supports field injections. Convert your field to property with a public setter and you should be good to go [Inject] public IGPSProcessor Processor { private get; set; }
2023-11-26T01:27:04.277712
https://example.com/article/2001