text
stringlengths
9
5.77M
timestamp
stringlengths
26
26
url
stringlengths
32
32
/* * This file is part of the Micro Python project, http://micropython.org/ * * The MIT License (MIT) * * Copyright (c) 2013, 2014 Damien P. George * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ #include <stdio.h> #include <unistd.h> #include <fcntl.h> #include <errno.h> #include <sys/stat.h> #include <sys/types.h> #include "mpconfig.h" #include "nlr.h" #include "misc.h" #include "qstr.h" #include "obj.h" #include "runtime.h" #include "stream.h" #ifdef _WIN32 #define fsync _commit #endif /* XXX Marko fixme! */ #define fsync(a) do {} while (0) int * __error(void) { return (&errno); }; typedef struct _mp_obj_fdfile_t { mp_obj_base_t base; int fd; } mp_obj_fdfile_t; #ifdef MICROPY_CPYTHON_COMPAT void check_fd_is_open(const mp_obj_fdfile_t *o) { if (o->fd < 0) { nlr_raise(mp_obj_new_exception_msg(&mp_type_ValueError, "I/O operation on closed file")); } } #else #define check_fd_is_open(o) #endif extern const mp_obj_type_t mp_type_fileio; extern const mp_obj_type_t mp_type_textio; STATIC void fdfile_print(void (*print)(void *env, const char *fmt, ...), void *env, mp_obj_t self_in, mp_print_kind_t kind) { mp_obj_fdfile_t *self = self_in; print(env, "<io.%s %d>", mp_obj_get_type_str(self), self->fd); } STATIC mp_uint_t fdfile_read(mp_obj_t o_in, void *buf, mp_uint_t size, int *errcode) { mp_obj_fdfile_t *o = o_in; check_fd_is_open(o); mp_int_t r = read(o->fd, buf, size); if (r == -1) { *errcode = errno; return MP_STREAM_ERROR; } return r; } STATIC mp_uint_t fdfile_write(mp_obj_t o_in, const void *buf, mp_uint_t size, int *errcode) { mp_obj_fdfile_t *o = o_in; check_fd_is_open(o); mp_int_t r = write(o->fd, buf, size); if (r == -1) { *errcode = errno; return MP_STREAM_ERROR; } return r; } STATIC mp_obj_t fdfile_flush(mp_obj_t self_in) { mp_obj_fdfile_t *self = self_in; check_fd_is_open(self); fsync(self->fd); return mp_const_none; } STATIC MP_DEFINE_CONST_FUN_OBJ_1(fdfile_flush_obj, fdfile_flush); STATIC mp_obj_t fdfile_close(mp_obj_t self_in) { mp_obj_fdfile_t *self = self_in; close(self->fd); #ifdef MICROPY_CPYTHON_COMPAT self->fd = -1; #endif return mp_const_none; } STATIC MP_DEFINE_CONST_FUN_OBJ_1(fdfile_close_obj, fdfile_close); mp_obj_t fdfile___exit__(mp_uint_t n_args, const mp_obj_t *args) { return fdfile_close(args[0]); } STATIC MP_DEFINE_CONST_FUN_OBJ_VAR_BETWEEN(fdfile___exit___obj, 4, 4, fdfile___exit__); STATIC mp_obj_t fdfile_fileno(mp_obj_t self_in) { mp_obj_fdfile_t *self = self_in; check_fd_is_open(self); return MP_OBJ_NEW_SMALL_INT(self->fd); } STATIC MP_DEFINE_CONST_FUN_OBJ_1(fdfile_fileno_obj, fdfile_fileno); STATIC mp_obj_t fdfile_make_new(mp_obj_t type_in, mp_uint_t n_args, mp_uint_t n_kw, const mp_obj_t *args) { mp_obj_fdfile_t *o = m_new_obj(mp_obj_fdfile_t); mp_const_obj_t type = type_in; const char *mode_s; if (n_args > 1) { mode_s = mp_obj_str_get_str(args[1]); } else { mode_s = "r"; } int mode = 0; while (*mode_s) { switch (*mode_s++) { // Note: these assume O_RDWR = O_RDONLY | O_WRONLY case 'r': mode |= O_RDONLY; break; case 'w': mode |= O_WRONLY | O_CREAT | O_TRUNC; break; case 'a': mode |= O_APPEND; break; case '+': mode |= O_RDWR; break; #if MICROPY_PY_IO_FILEIO // If we don't have io.FileIO, then files are in text mode implicitly case 'b': type = &mp_type_fileio; break; case 't': type = &mp_type_textio; break; #endif } } o->base.type = type; if (MP_OBJ_IS_SMALL_INT(args[0])) { o->fd = MP_OBJ_SMALL_INT_VALUE(args[0]); return o; } const char *fname = mp_obj_str_get_str(args[0]); int fd = open(fname, mode, 0644); if (fd == -1) { nlr_raise(mp_obj_new_exception_arg1(&mp_type_OSError, MP_OBJ_NEW_SMALL_INT(errno))); } o->fd = fd; return o; } STATIC const mp_map_elem_t rawfile_locals_dict_table[] = { { MP_OBJ_NEW_QSTR(MP_QSTR_fileno), (mp_obj_t)&fdfile_fileno_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR_read), (mp_obj_t)&mp_stream_read_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR_readall), (mp_obj_t)&mp_stream_readall_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR_readline), (mp_obj_t)&mp_stream_unbuffered_readline_obj}, { MP_OBJ_NEW_QSTR(MP_QSTR_readlines), (mp_obj_t)&mp_stream_unbuffered_readlines_obj}, { MP_OBJ_NEW_QSTR(MP_QSTR_write), (mp_obj_t)&mp_stream_write_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR_flush), (mp_obj_t)&fdfile_flush_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR_close), (mp_obj_t)&fdfile_close_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR___enter__), (mp_obj_t)&mp_identity_obj }, { MP_OBJ_NEW_QSTR(MP_QSTR___exit__), (mp_obj_t)&fdfile___exit___obj }, }; STATIC MP_DEFINE_CONST_DICT(rawfile_locals_dict, rawfile_locals_dict_table); #if MICROPY_PY_IO_FILEIO STATIC const mp_stream_p_t fileio_stream_p = { .read = fdfile_read, .write = fdfile_write, }; const mp_obj_type_t mp_type_fileio = { { &mp_type_type }, .name = MP_QSTR_FileIO, .print = fdfile_print, .make_new = fdfile_make_new, .getiter = mp_identity, .iternext = mp_stream_unbuffered_iter, .stream_p = &fileio_stream_p, .locals_dict = (mp_obj_t)&rawfile_locals_dict, }; #endif STATIC const mp_stream_p_t textio_stream_p = { .read = fdfile_read, .write = fdfile_write, .is_text = true, }; const mp_obj_type_t mp_type_textio = { { &mp_type_type }, .name = MP_QSTR_TextIOWrapper, .print = fdfile_print, .make_new = fdfile_make_new, .getiter = mp_identity, .iternext = mp_stream_unbuffered_iter, .stream_p = &textio_stream_p, .locals_dict = (mp_obj_t)&rawfile_locals_dict, }; // Factory function for I/O stream classes mp_obj_t mp_builtin_open(mp_uint_t n_args, const mp_obj_t *args) { // TODO: analyze mode and buffering args and instantiate appropriate type return fdfile_make_new((mp_obj_t)&mp_type_textio, n_args, 0, args); } MP_DEFINE_CONST_FUN_OBJ_VAR_BETWEEN(mp_builtin_open_obj, 1, 2, mp_builtin_open); const mp_obj_fdfile_t mp_sys_stdin_obj = { .base = {&mp_type_textio}, .fd = STDIN_FILENO }; const mp_obj_fdfile_t mp_sys_stdout_obj = { .base = {&mp_type_textio}, .fd = STDOUT_FILENO }; const mp_obj_fdfile_t mp_sys_stderr_obj = { .base = {&mp_type_textio}, .fd = STDERR_FILENO };
2024-05-07T01:27:04.277712
https://example.com/article/7160
This post is part of our special coverage of Egypt Protests 2011. As the night sky extended over Egypt, protests in Cairo and around the country continued. News was dominated by events in Cairo’s Tahrir Square, where police dispersed a sit-in with tear gas, rubber bullets, and water canons leaving many people wounded. In Suez, three people were reported dead. In Alexandria, a sit-in of thousands began amidst arrests. In El-Mahala, a large industrial and agricultural city, there were reports on Twitter of police thugs destroying public property in El-Shoon square and of further clashes between citizens and police. @Alaa tweeted that doctors were badly needed in Tahrir Square: Try to move ppl to hospitals instead, doctors need medicine & equipment ♻ @husseinelsaid: @alaa doctors needed at Tahrir DESPERATELY pls RT Earlier today, the Egyptian government blocked Twitter, and also cut mobile phone coverage around Tahrir Square, leaving protesters with no means to communicate with the outside world. This led to a spontaneous act by residents in the neighborhood to remove the passwords from their wireless routers so protesters could go online: @Mohrad المواطنين والمحلات لغوا باسوردات شبكات الوايرلس والمعتصمين في التحرير يستطيعون الآن التواصل مع الناس#Jan25 #fb Citizens and shops canceled the passwords of their wireless routers. Protesters in Tahrir square can reach people now. Also, nearby shops began offering protesters food and water. @Mohrad من التحرير: هارديز طلع ساندوتشات صغيرة للمعتصمين والأمن منعهم وطلب منهم يقفلوا ويمشوا ورفضوا يقفلوا ومشاركين الشباب From Tahrir: Hardees gave out free sandwiches to protesters, but the police stopped them and asked them to leave. Shops refused, and joined the people. A few celebrities joined the protests, and were updating their Twitter accounts. Actors Amr Waked and Khaled Aboul Naga, a female television presenter Bouthayna Kamel, director Amr Salama, and politician Ayman Nour. Amr Salama and Khaled Aboul Naga, wrote wrote an update from the protesters to all Egyptians: رسالة من المعتصمين: كلنا موجودين في ميدان التحرير مش هنتحرك، و هنبات و هنكمل مظاهرتنا بكره الصبح رغم كل اللي بيعمله الأمن، اللي يقدر منا ينزل للناس دي ينزل، و اللي يقدر يجيبلهم مية أو أكل يجيب، و اللي مايقدرش ينشر الخبر دا و مايصدقش اللي بيتقال عن إنهم هيمشوا أو هيتحركوا من مكانهم… قوم يا مصري From protesters: We will stay in Tahrir Sq. We will not move. We will stay and continue our demonstration tomorrow morning despite police brutality. Whoever can join us, please do. Whoever can bring us water or food, please do. We will get them out of the country. Believe it. Get involved Egyptians! It was around 10:00PM local Cairo time when Farouk tweeted from Tahrir Square. @farokadel: من التحرير المعنويات مرتفعة بس الامن بيجهز هجوم تقريبا There are high hopes. But the police look like they are preparing something. @Sandmonkey noted: Fun fact of the day: not a single girl was sexually harassed today. Everyone acted with utter respect. #jan25 However, the mood changed abruptly around midnight when police began dispersing protesters in Tahrir Square by force. @Mohamed_A_Ali tweeted from the location of the sit in: الضرب اشتغل الحقونا They started beating. Help us. According to well-known female politician, Gameela Ismail, at least 40 people were arrested by the police and taken to an unknown place, including her son Noor, Dr. Mostafa El Nagar, the general coordinator for the Campaign for Change, journalist Mohamed Abdelfattah, and AbdelRahman Ayyash, an engineering student who was scheduled to take an exam tomorrow in his faculty. There are calls for more protests in different public squares of Egypt tomorrow, but whether demonstrations will actually continue or not in the morning still remains to be seen.
2023-12-24T01:27:04.277712
https://example.com/article/7473
50th Graduating Class Of Watauga High Receives Diplomas On Saturday June 12, 2016 at 7:57 pmby Kenneth Reece “Over 15,000 graduates and 3,000 faculty/staff have been at Watauga High over the past 50 yrs according to Principal Gasperson. #WeAreWatauga‬” That was a tweet sent out by Assistant Superintendent Stephen Martin in marking a milestone for Watauga High. This past Saturday marked the 6th graduating class from the current Watauga High location, which opened in 2010, but the 50th overall for Watauga High School. The original Watauga High open in 1965, and was the result of five high schools merging. They were Appalachian High School (1938-1965), Blowing Rock Union School, Cove Creek, and Watauga Consolidated School. Over 15,000 graduates and 3,000 faculty/staff have been at Watauga High over the past 50 yrs according to Principal Gasperson. #WeAreWatauga
2024-01-16T01:27:04.277712
https://example.com/article/8668
Staring at their second loss in a week, the T.C. Williams Titans are struggling to diagnose a malady largely unknown to a program known for its courtside clover. After falling to W.T. Woodson 48-38 in a Tuesday night game dominated by the Cavaliers, the symptoms are clear. A porous defense and lackluster offense, combined with undisciplined play, have translated into two consecutive home losses for the Titans. The players spoke candidly about what’s gone wrong in the Titans nascent, 3-2 season. Like any mysterious affliction, the trouble’s not in seeing the symptoms, but curing the underlying cause. “We’ve got to go back to the basics,” said senior point guard Daquan Kerman. “We’ve just got to find out what’s wrong.” Pressed for specifics and Kerman paused. It’s a lack of effort and focus, he said. Teammate Landon Moss agreed with Kerman’s assessment that hey need to come back focused and together as a team. That the Titans faced an uphill struggle this year was known long before the season’s first tipoff. Just three seniors returned from the previous year’s playoff-bound squad; experience and leadership were early worries for coach Julian King. While the team roared off to a 3-0 start, the problems evident in their 51-50 loss to West Potomac a week ago spiraled out of control against the Cavaliers. Woodson came to play and fought for every basket, challenged T.C. on every possession and, ultimately, laid down a beating. “They outworked us,” Moss said. Coming to grips with the Titans first loss of the season a week ago, King said the squad’s response would define their team. The coach was less optimistic than normal after T.C.’s second loss. “Bottom line, we don’t have any toughness, individually or as a team,” King said. “We’re not disciplined. We’re at a situation where we’re looking for answers.” The Titans, struggling to come back from behind throughout the matchup with the Cavaliers, showed signs of life. Senior forward T.J. Huggins displayed a bit of the late game prowess made humdrum by last year’s team. He had racked up 15 points alone by the fourth quarter in the Patriot District battle. But, five games in, it’s becoming evident this team is not even close to last year’s team, by King’s assessment. “It’s just not enough,” he said. “[A year ago] we were able to hunker down and rebound. We had players who were tough enough, who believed in themselves.” The Titans have until January 3, when they’re scheduled for a 7:45 p.m. road game against the Lee Lancers, to find an answer. This much is clear: Where last year’s team had the luxury of waiting to get going, this year’s team will have to scramble from the very beginning. “We’ve got to come out and play, it’s as simple as that,” Kerman said. “We don’t have the team to slack off.”
2024-06-18T01:27:04.277712
https://example.com/article/7682
// Copyright 2001-2019 Crytek GmbH / Crytek Group. All rights reserved. #pragma once #include <CrySystem/VR/IHMDDevice.h> #include <CryRenderer/IStereoRenderer.h> struct IUnknown; // Forward declaration of Oculus-specific internal data structures struct ovrTextureSwapChainData; struct ovrMirrorTextureData; namespace CryVR { namespace Oculus { enum class OculusStatus { Success = 0, NotVisible, DeviceLost, UnknownError }; struct TextureDesc { uint32 width; uint32 height; uint32 format; }; // Set of ID3D11Texture2D* (DX11) textures from a singe swap chain to be sent to the Hmd struct STextureSwapChain { ovrTextureSwapChainData* pDeviceTextureSwapChain; // data structure wrapping a texture set for a single image IUnknown** pTextures; // texture set of ID3D11Texture2D* (DX11) / ID3D12Resource* (DX12) inside pDeviceTextureSwapChain uint32 numTextures; // number of textures in the set STextureSwapChain() : pDeviceTextureSwapChain(nullptr) , pTextures(nullptr) , numTextures(0) { } }; struct STexture { ovrMirrorTextureData* pDeviceTexture; // data structure wrapping a single image IUnknown* pTexture; // ID3D11Texture2D* (DX11) / ID3D12Resource* (DX12) inside pDeviceTexture STexture() : pDeviceTexture(nullptr) , pTexture(nullptr) { } }; // Info required render a texture set into a particular device layer // This info is passed across DLL boundaries from the renderer to the Hmd device struct SHmdSwapChainInfo { enum class eye_t : uint8_t { left = 0, right = 1 }; ovrTextureSwapChainData* pDeviceTextureSwapChain; // data structure wrapping a texture set for a single image Vec2i viewportPosition; Vec2i viewportSize; eye_t eye; // only for Scene3D layer (0 left , 1 right) bool bActive; // should this layer be sent to the Hmd? RenderLayer::ELayerType layerType; RenderLayer::TLayerId layerId; QuatTS pose; // only for Quad layers. (in camera space) layer position, orientation and scale }; // Info required to send all device layers to the Hmd // This info is passed across DLL boundaries from the renderer to the Hmd device struct SHmdSubmitFrameData { SHmdSwapChainInfo* pLeftEyeScene3D; SHmdSwapChainInfo* pRightEyeScene3D; SHmdSwapChainInfo* pQuadLayersSwapChains; uint32 numQuadLayersSwapChains; }; // Hmd device specialization for Oculus struct IOculusDevice : public IHmdDevice { public: virtual bool CreateSwapTextureSetD3D12(IUnknown* d3d12CommandQueue, TextureDesc desc, STextureSwapChain* set) = 0; virtual bool CreateMirrorTextureD3D12(IUnknown* d3d12CommandQueue, TextureDesc desc, STexture* texture) = 0; virtual bool CreateSwapTextureSetD3D11(IUnknown* d3d11Device, TextureDesc desc, STextureSwapChain* set) = 0; virtual bool CreateMirrorTextureD3D11(IUnknown* d3d11Device, TextureDesc desc, STexture* texture) = 0; virtual void DestroySwapTextureSet(STextureSwapChain* set) = 0; virtual void DestroyMirrorTexture(STexture* texture) = 0; virtual OculusStatus BeginFrame(uint64_t frameId) = 0; virtual OculusStatus SubmitFrame(const SHmdSubmitFrameData &pData) = 0; virtual void CreateDevice() = 0; virtual int GetCurrentSwapChainIndex(void* pSwapChain) const = 0; protected: virtual ~IOculusDevice() {} }; } // namespace Oculus } // namespace CryVR
2024-03-21T01:27:04.277712
https://example.com/article/1677
Join Us in Welcoming to the Card Trader Stage... The Max Rebo Band! By SWCT Team on 2017-06-09 18:30:00 They’ve made a name for themselves by performing all across the galaxy, and now you can catch them in Card Trader! Put your hands together for The Max Rebo Band! Set Information: 11 inserts + 1 award card (Max Rebo, pictured above). Inserts and award card available in 2 variants. A NEW insert will be released every 24 hours! Available in TWO packs: Max Rebo Band Premium Master Pack Red - 1:3 Gold (limited to 250cc) - 1:10 Also includes a 1:5 chance at pulling Orange Base 4 cards of the band members (Droopy McCool, Max Rebo, Sy Snootles #1, Sy Snootles #2, Umpass-stay #1, & Umpass-stay #2)! Max Rebo Band Pack Red - 1:20 Gold (limited to 250cc) - 1:100 Also contains Band Member base cards (listed above) at the following odds Red - 1:25 Blue - 1:5 White - one guaranteed in every pack! Award Information: Collect all inserts in a parallel by 2:30 PM ET on June 23rd to receive the award card in that parallel! NOTE: Picking up any bundle in the "Credits & Special Offers" tab will grant you Master Access (Master Access only available until 6:00 AM ET the following day after credit bundle purchase)! Collect these inserts today! Head to the Cantina!
2024-07-27T01:27:04.277712
https://example.com/article/5549
A Hamburger Today Serious Entertaining: A Halloween Cocktail Party Tomorrow is Halloween and if you're anything like me, skeletons are dangling, cobwebs are up, the walls are appropriately blood-splattered, and your pumpkins (which you've definitely submitted to our pumpkin carving contest) are merrily casting their eerie, cackling shadows of doom. But...what's on the menu? I mean, hey, no pressure, it's only the holiday with the most potential of all time. I'm genuinely sorry to say that we don't have the keys to the BraveTart haunted castle mansion or these yogurt-inflected illustrations. But for those of you hosting a crowd in the coming days, we've got some appropriate campy finger food projects to get you through your Halloween festivities in style. CAUTION! Bad puns and over-enthused Halloween "humor" lies ahead! Savory Snacks Pumpkin Cheddar Cheese Crackers Don't let the name mislead you—there's nothing "pumpkin" about these flaky, cheddar-packed crackers aside from their appearance. A thematic cookie cutter comes in handy, but you don't actually need anything more than a pairing knife (and some patience) to get the job done. The dough holds its shape, so you can get as intricately creepy as the-bloody-cavity-where-your-heart-once-was desires. Pumpkin Seeds Setting up to carve an awesomely elaborate photograph onto your pumpkin? Be sure to reserve those seeds for a quick and easy roast in the oven. Lemongrass, chili, and toasted coconut; ginger and sage; garlic and Parmesan—the limitless seasoning possibilities will follow you to the grave (and beyond!). Experiment with your own or give one of our combos a shot. Sweets Chocolate Mini Cheesecakes Whipping up a batch of these cakes is an easy, straightforward job. Baked in a standard muffin tin, with a crust of vanilla wafer crumbs and butter, the creamy cheesecake filling gets a rich dose of melted bittersweet chocolate. Finishing them off just requires some piping dexterity with the icing—if spiderwebs seem too complicated, give these skulls a go.
2023-11-06T01:27:04.277712
https://example.com/article/9853
Cassandra Szklarski, The Canadian Press TORONTO - From music festivals to carnivals to big screen blockbusters, COVID-19 has already put the kibosh on several summer highlights that define the season for many Canadians. But while it's likely that even more hot-weather past-times will be cancelled or curtailed, experts say that doesn't mean summer 2020 has to be a dud. Undoubtedly, we're in for a summer like no other, says Matti Siemiatycki, director of the University of Toronto research institution, School of Cities, whose family has embraced videoconferencing and regular walks to cope. COVID-19 restrictions have already cancelled all city-led major events, conferences and cultural programs in Toronto through June 30, including the Pride parade and Toronto Caribbean Carnival - massive street parties that typically draw thousands of revellers. Calgary Stampede organizers have nixed this year's edition of the annual rodeo and exhibition, and Ottawa says its bombastic Canada Day celebrations will be transformed into a virtual show. Meanwhile, popular folk festivals in Edmonton and Winnipeg have been axed, and it's looking increasingly likely that family-friendly fairs including Vancouver's Pacific National Exhibition and Toronto's Canadian National Exhibition will be put on ice. The prospect of a dull summer is better than the alternative, public health officials say, as a hasty move to lift restrictions could increase the rate of infection and deaths, and extend financial hardship throughout the season and beyond. For city-dwellers, the possibility of a summer-long closure of parks, pools, recreation centres and playgrounds “is challenging culturally and psychologically,” says Siemiatycki, noting our long winters make the summer weeks especially precious. “The summer really is festival season here in Canada, and to lose that is a significant cultural loss, as well as a financial loss,” says Siemiatycki, noting restaurants and the tourism sector will especially feel the blow. “Whether it's at sporting events or whether it's at local festivals, there's going to be a whole rethink - in the short term, at least - of how we engage and how we're able to come together. And that has many implications for how our communities are stitched together and the commercial (and) financial dimensions of the recovery.” Political and medical leaders have asked the public for patience while they mull how and when to ease restrictions, with Ontario Premier Doug Ford noting that even his 12-year-old nephew is hounding him for assurances that summer camp will proceed as usual. “I said, 'I can't answer that,”' Ford said earlier this week. “He goes, 'Well, find out and get back to me right away.”' B.C. health officer Dr. Bonnie Henry advised organizers of big events in her province to consider alternatives this year, and she urged individuals to scale back weddings and family reunions. “Large parades, large mass gatherings where we all come together - those will not be happening this summer,” she said. Saskatchewan, meanwhile, suggested looser restrictions could begin as early as May 4 in that province, while Prince Edward Island has said they could ease measures as early as May 1. COVID-19 cases and deaths in both provinces are on the lower end of national statistics. Indeed, the impact of COVID-19 on summer fun will be felt in a myriad of ways. The upheaval of professional sports will be a particular blow to diehard fans who build their social calendar around their favourite athletes' schedules, says Siemiatycki, although even casual fans will likely miss the infectious hoopla that surrounds big events such as Wimbledon, the NBA Finals and of course, the Summer Olympics, which have been postponed to 2021. Keith Dobson, a clinical psychology professor at the University of Calgary, says the loss of these events will impact each person differently, but he expected they would intensify feelings of loss that are already emerging in many households. He pointed to “the paradox” of warm weather coinciding with restrictions that limit our ability to enjoy the weather. “In a season when we should be outside and enjoying ourselves we are going to be frustrated,” says Dobson, who fears that could push some people to break the guidelines and head to the beach, for instance. “You can fairly safely predict that, in fact, rates of depression will go up as the summer comes on.” While large-scale summer events provide a financial boost to many entrepreneurs, they also serve an important role in forging neighbourhood connections and civic pride, Siemiatycki notes. Then there are those events that hold deep personal meaning for some - like a food festival that celebrates one's cultural heritage or an annual charity marathon that honours a loved one. Dobson acknowledges that the notion of summer in general holds an outsized place in the hearts of many adults because it is a frequent backdrop for some of life's sweetest memories - graduations, weddings, family road trips, cottage barbecues and team championships. He cautions parents against letting nostalgia colour their expectations for summer 2020, especially if they had hoped to forge similar memories with their own children this year. “Parents have to be really careful not to grieve publicly in front of their children,” says Dobson, also a researcher for the Mental Health Commission of Canada. He stresses the importance of maintaining a regular sleep schedule, good eating habits and a daily routine to stave off boredom and frustration. Dobson also points to an array of online social events that have emerged to address dwindling public events, such as live streaming music concerts and virtual running races. Look for opportunities to create memories in new ways, Dobson suggests, and don't wallow in what might have been. Many kids are already great at this, he adds. “What they can remember, hopefully, is the positive time spent with their parents in the Summer of 2020.” This report by The Canadian Press was first published April 24, 2020
2023-11-30T01:27:04.277712
https://example.com/article/9870
package com.gcplot.model; import com.gcplot.Identifier; import com.gcplot.model.gc.*; import com.gcplot.model.gc.analysis.GCAnalyse; import org.joda.time.DateTime; import java.util.Map; import java.util.Set; /** * @author <a href="mailto:art.dm.ser@gmail.com">Artem Dmitriev</a> * 2/25/17 */ public class DefaultGCAnalyseFactory implements GCAnalyseFactory { @Override public GCAnalyse create(String id, Identifier accountId, String name, String tz, boolean isContinuous, DateTime start, Set<String> jvmIds, Map<String, DateTime> lastEvent, Map<String, DateTime> firstEvent, Map<String, String> jvmHeaders, Map<String, String> jvmNames, Map<String, VMVersion> jvmVersions, Map<String, GarbageCollectorType> jvmGCTypes, Map<String, MemoryDetails> jvmMemoryDetails, SourceType sourceType, String sourceConfig, Map<String, SourceType> sourceByJvm, Map<String, String> sourceConfigByJvm, String ext) { GCAnalyseImpl analyse = new GCAnalyseImpl(); return analyse.id(id).accountId(accountId).name(name).timezone(tz).isContinuous(isContinuous) .start(start).jvmIds(jvmIds).lastEvent(lastEvent).firstEvent(firstEvent).jvmHeaders(jvmHeaders) .jvmNames(jvmNames).jvmVersions(jvmVersions).jvmGCTypes(jvmGCTypes).jvmMemoryDetails(jvmMemoryDetails) .sourceType(sourceType).sourceConfig(sourceConfig).sourceByJvm(sourceByJvm) .sourceConfigByJvm(sourceConfigByJvm).ext(ext); } @Override public GCAnalyse create(String id, Identifier accountId, String name, String tz, boolean isContinuous, DateTime start, String ext) { GCAnalyseImpl analyse = new GCAnalyseImpl(); return analyse.id(id).accountId(accountId).name(name).timezone(tz).isContinuous(isContinuous) .start(start).sourceType(SourceType.NONE).ext(ext); } @Override public GCAnalyse create(GCAnalyse analyse) { return new GCAnalyseImpl(analyse); } @Override public GCAnalyse create(GCAnalyse analyse, Set<String> jvmIds, Map<String, String> jvmNames, Map<String, VMVersion> jvmVersions, Map<String, GarbageCollectorType> jvmGCTypes) { GCAnalyseImpl na = new GCAnalyseImpl(analyse); return na.jvmIds(jvmIds).jvmNames(jvmNames).jvmVersions(jvmVersions).jvmGCTypes(jvmGCTypes); } }
2023-09-22T01:27:04.277712
https://example.com/article/6141
Common complications and emergencies associated with cancer and its therapy. As the incidence of cancer rises and as physicians treat it more aggressively, more patients will experience complications of cancer or of its therapy. To review the pathogenesis, diagnosis, and treatment of the superior vena cava syndrome, malignant pericardial effusions, the syndrome of inappropriate antidiuretic hormone secretion, hypercalcemia, the tumor lysis syndrome, seizures, spinal cord compression, obstructive uropathy, infections, febrile neutropenia, bleeding, thrombocytopenia, and coagulopathies in patients with cancer. In general, the best treatment for most of the complications of cancer is to successfully treat the cancer itself; if this is not feasible, palliative measures should be taken. The complications of treatment are well known and should be treated promptly when they arise if they cannot be prevented. Although treating the complications associated with cancer cannot always prolong the patient's life, it frequently can improve the quality of life remaining. Therefore, physicians who care for patients with cancer should anticipate these complications and treat them promptly when they occur.
2023-08-06T01:27:04.277712
https://example.com/article/3339
Chinese citizens are masking their flu-like symptoms to make it through airport checkpoints set up around the world to screen for the coronavirus, according to several reports on Thursday citing Chinese social media posts. The symptoms could be a sign that the individuals are carrying a newly identified coronavirus originating in the central Chinese city of Wuhan, which Chinese health officials identified this week and has killed 17 people so far. The South China Morning Post identified the case of one Wuhan woman who claimed to use medication to lower her temperature when traveling to France, then boasted of evading detection. “I had a fever and a cough before I left – I was so scared. I quickly took some medicine and checked my temperature,” the woman, later identified as Ms. Wan, posted along with a photo of herself and a friend. “Luckily the temperature was controlled and I had a smooth journey through the border.” The report about the woman did not say where in France she arrived and where she had subsequently traveled. The Hong Kong broadcaster RTHK identified other similar posts from Chinese social media users claiming they were able to “escape” Wuhan, a city of 11 million people, before the government froze all public transportation and locked the city down late Wednesday. Residents scrambled to leave the epicentre of a deadly Sars-like virus outbreak before a virtual lockdown was imposed on the city on Thursday. Authorities halted flights and trains out of Wuhan from 10am local time. But on social media, people who said they are from Wuhan posted messages saying they left the city before the lockdown was implemented. “Escape from Wuhan” has become a popular hashtag on Weibo, a microblogging website on the mainland. “I escaped in the small hours,” one individual wrote. There were so many cars on the highway.” “We’ve escaped the epidemic zone after taking some fever reducers,” another person wrote. “I’ll visit the doctor in Shanghai if my fever doesn’t go away a week later.” The latter also said a trip to Disneyland was planned. The Chinese government has responded by issuing orders to citizens through its embassies, including in France: Our embassy has received multiple phone calls and emails from Chinese nationals regarding a woman from Wuhan who posted on social media about deliberately taking fever medication in order to evade the airport temperature checks. We attach high importance to this incident and were able to contact Ms. Yan, who is involved in this incident. We have requested that she call the French emergency hotline [for her case] to be handled by the relevant departments. The South China Morning Post reported on the reaction in France and beyond: French authorities meanwhile said they would separate any passengers arriving in the country who had a fever so that they could be assessed by emergency health personnel. Other Chinese embassies, including in the United States, South Korea and Thailand, have issued similar notices to nationals travelling abroad. More than 570 people have now been confirmed as infected with the pneumonia-like virus, with 17 deaths since the outbreak began in late December. Outside mainland China, cases of the new coronavirus have also been reported in Macau, Taiwan, the US, Japan, South Korea and Thailand. Chinese experts have confirmed that human-to-human transmission has played a role in the outbreak, and Wuhan is now in lockdown, with all public transport in and out of the city stopped on Thursday morning as authorities try to limit the spread of infection. The South China Morning Post also reported that the Chinese embassy in Washington said there would be extra quarantine measures for travelers arriving from Wuhan at five U.S. airports – New York, San Francisco, Los Angeles, Atlanta, and Chicago. The South China Morning Post also noted that the health crisis is happening during one of the country’s busiest travel seasons over the weeklong Lunar New Year. Some 6.3 million Chinese traveled over the holiday last year but the virus could change some people’s plans this year. Follow Penny Starr on Twitter
2024-04-06T01:27:04.277712
https://example.com/article/6222
# Detecting unmanaged configuration changes in stack sets<a name="stacksets-drift"></a> Even as you manage your stacks and the resources they contain through CloudFormation, users can change those resources outside of CloudFormation\. Users can edit resources directly by using the underlying service that created the resource\. By performing drift detection on a stack set, you can determine if any of the stack instances belonging to that stack set differ, or have *drifted*, from their expected configuration\. ## How CloudFormation performs drift detection on a stack set<a name="stacksets-drift-how"></a> When CloudFormation performs drift detection on a stack set, it performs drift detection on the stack associated with each stack instance in the stack set\. To do this, CloudFormation compares the current state of each resource in the stack with the expected state of that resource, as defined in the stack's template and and any specified input parameters\. If the current state of a resource varies from its expected state, that resource is considered to have drifted\. If one or more resources in a stack have drifted, then the stack itself is considered to have drifted, and the stack instances that the stack is associated with is considered to have drifted as well\. If one or more stack instances in a stack set have drifted, the stack set itself is considered to have drifted\. Drift detection identifies unmanaged changes; that is, changes made to stacks outside of CloudFormation\. Changes made through CloudFormation to a stack directly, rather than at the stack\-set level, are not considered drift\. For example, suppose you have a stack that is associated with a stack instance of a stack set\. If you use CloudFormation to update that stack to use a different template, that is not considered drift, even though that stack now has a different template than any other stacks belonging to the stack set\. This is because the stack still matches its expected template and parameter configuration in CloudFormation\. For detailed information on how CloudFormation performs drift detection on a stack, see [Detecting unmanaged configuration changes to stacks and resources](using-cfn-stack-drift.md)\. Because CloudFormation performs drift detection on each stack individually, it takes any overridden parameter values into account when determining whether a stack has drifted\. For more information on overriding template parameters in stack instances, see [Override parameters on stack instances](stackinstances-override.md)\. If you perform drift detection [directly on a stack](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html) that is associated with a stack instance, those drift results are not available from the **StackSets** console page\. **To detect drift on a stack set using the AWS Management Console** 1. Open the AWS CloudFormation console at [https://console\.aws\.amazon\.com/cloudformation](https://console.aws.amazon.com/cloudformation/)\. 1. On the **StackSets** page, select the stack set on which you want to perform drift detection\. 1. From the **Actions** menu, select **Detect drifts**\. CloudFormation displays an information bar stating that drift detection has been initiated for the selected stack set\. 1. Optional: To monitor the progress of the drift detection operation: 1. Click the stack set name to display the **Stackset details** page\. 1. Select the **Operations** tab, select the drift detection operation, and then select **View drift details**\. CloudFormation displays the **Operation details** dialog box\. 1. Wait until CloudFormation completes the drift detection operation\. When the drift detection operation completes, CloudFormation updates **Drift status** and **Last drift check time** for your stack set\. These fields are listed on the **Overview** tab of the **StackSet details** page for the selected stack set\. The drift detection operation may take some time, depending on the number of stack instances included in the stack set, as well as the number of resources included in the stack set\. You can only run a single drift detection operation on a given stack set at one time\. CloudFormation continues the drift detection operation even after you dismiss the information bar\. 1. To review the drift detection results for the stack instances in a stack set, select the **Stack instances** tab\. The **Stack name** column lists the name of the stack associated with each stack instance, and the **Drift status** column lists the drift status of that stack\. A stack is considered to have drifted if one or more of its resources have drifted\. 1. To review the drift detection results for the stack associated with a specific stack instances: 1. Note the **AWS account**, **Stack name**, and **AWS region** for the stack instance\. 1. Open the AWS CloudFormation console at [https://console\.aws\.amazon\.com/cloudformation](https://console.aws.amazon.com/cloudformation/)\. Log into the AWS account containing the stack instance\. 1. Select the AWS region containing the stack instance\. 1. From the left\-hand navigation pane, select **Stacks**\. 1. Select the stack you wish to view, and then select **Drifts**\. CloudFormation displays the **Drifts** page for the stack associated with the specified stack instance\. In the **Resource drift status** section, CloudFormation lists each stack resource, its drift status, and the last time drift detection was initiated on the resource\. The logical ID and physical ID of each resource is displayed to help you identify them\. In addition, for resources with a status of **MODIFIED**, CloudFormation displays resource drift details\. You can sort the resources based on their drift status using the **Drift status** column\. 1. To view the details on a modified resource\. 1. With the modified resource selected, select **View drift details**\. CloudFormation displays the drift detail page for that resource\. This page lists the resource's expected and current property values, and any differences between the two\. To highlight a difference, in the **Differences** section select the property name\. + Added properties are highlighted in green in the **Current** column of the **Details** section\. + Deleted properties are highlighted in red in the **Expected** column of the **Details** section\. + Properties whose value have been changed are highlighted in blue in the both **Expected** and **Current** columns\. ![\[The Resource drift status section of the Drift Details page, which contains drift information for each resource in the stack that supports drift detection. Details include drift status and expected and current property values.\]](http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/images/console-stacks-drifts-drift-details-differences-1.png) **To detect drift on a stack set using the AWS CLI** To detect drift on an entire stack using the AWS CLI, use the following `aws cloudformation` commands: + `[detect\-stack\-set\-drift](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/detect-stack-set-drift.html)` to initiate a drift detection operation on a stack\. + `[describe\-stack\-set\-operation](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/describe-stack-set-operation.html)` to monitor the status of the stack drift detection operation\. + Once the drift detection operation has completed, use the following commands to return drift information you want: + Use `[describe\-stack\-set](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/describe-stack-set.html)` to return detailed information about the stack set, including detailed information about the last *completed* drift operation performed on the stack set\. \(Information about drift operations that are in progress is not included\.\) + Use `[list\-stackinstances](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/list-stack-instances.html)` to return a list of stack instances belonging to the stack set, including the drift status and last drift time checked of each instance\. + Use `[describe\-stack\-instance](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/describe-stack-instance.html)` to return detailed information about a specific stack instance, including its drift status and last drift time checked\. 1. Use `detect-stack-set-drift` to detect drift on an entire stack set and its associated stack instances\. The following example initiates drift detection on the stack set `stack-set-drift-example`\. ``` 1. aws cloudformation detect-stack-set-drift --stack-set-name stack-set-drift-example 2. 3. { 4. "OperationId": "c36e44aa-3a83-411a-b503-cb611example" 5. } ``` 1. Because stack set drift detection operations can be a long\-running operation, use `describe-stack-set-operation` to monitor the status of drift operation\. This command takes the stack set operation ID returned by the `detect-stack-set-drift` command\. The following examples uses the operation ID from the previous example to return information on the stack set drift detection operation\. In this example, the operation is still running\. Of the seven stack instances associated with this stack set, one stack instance has already been found to have drifted, two instances are in synch, and drift detection for the remaining four stack instances is still in progress\. Since one instance has drifted, the drift status of the stack set itself is now `DRIFTED`\. ``` 1. aws cloudformation describe-stack-set-operation --stack-set-name stack-set-drift-example --operation-id c36e44aa-3a83-411a-b503-cb611example 2. 3. { 4. "StackSetOperation": { 5. "Status": "RUNNING", 6. "AdministrationRoleARN": "arn:aws:iam::012345678910:role/AWSCloudFormationStackSetAdministrationRole", 7. "OperationPreferences": { 8. "RegionOrder": [] 9. }, 10. "ExecutionRoleName": "AWSCloudFormationStackSetExecutionRole", 11. "StackSetDriftDetectionDetails": { 12. "DriftedStackInstancesCount": 1, 13. "TotalStackInstancesCount": 7, 14. "LastDriftCheckTimestamp": "2019-12-04T20:34:28.543Z", 15. "InSyncStackInstancesCount": 2, 16. "InProgressStackInstancesCount": 4, 17. "DriftStatus": "DRIFTED", 18. "FailedStackInstancesCount": 0 19. }, 20. "Action": "DETECT_DRIFT", 21. "CreationTimestamp": "2019-12-04T20:33:13.673Z", 22. "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22example", 23. "OperationId": "c36e44aa-3a83-411a-b503-cb611example" 24. } 25. } ``` Performing the same command later, this example shows the information returned once the drift detection operation has completed\. Two of the seven total stack instances associated with this stack set have drifted, rendering the drift status of the stack set itself as `DRIFTED`\. ``` 1. aws cloudformation describe-stack-set-operation --stack-set-name stack-set-drift-example --operation-id c36e44aa-3a83-411a-b503-cb611example 2. 3. { 4. "StackSetOperation": { 5. "Status": "SUCCEEDED", 6. "AdministrationRoleARN": "arn:aws:iam::012345678910:role/AWSCloudFormationStackSetAdministrationRole", 7. "OperationPreferences": { 8. "RegionOrder": [] 9. }, 10. "ExecutionRoleName": "AWSCloudFormationStackSetExecutionRole", 11. "EndTimestamp": "2019-12-04T20:37:32.829Z", 12. "StackSetDriftDetectionDetails": { 13. "DriftedStackInstancesCount": 2, 14. "TotalStackInstancesCount": 7, 15. "LastDriftCheckTimestamp": "2019-12-04T20:36:55.612Z", 16. "InSyncStackInstancesCount": 5, 17. "InProgressStackInstancesCount": 0, 18. "DriftStatus": "DRIFTED", 19. "FailedStackInstancesCount": 0 20. }, 21. "Action": "DETECT_DRIFT", 22. "CreationTimestamp": "2019-12-04T20:33:13.673Z", 23. "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22example", 24. "OperationId": "c36e44aa-3a83-411a-b503-cb611example" 25. } 26. } ``` 1. When the stack set drift detection operation is complete, use the `describe-stack-set`, `list-stackinstances`, and `describe-stack-instance` commands to review the results\. The `describe-stack-set` command includes the same detailed drift information returned by the `describe-stack-set-operation` command\. ``` aws cloudformation describe-stack-set --stack-set-name stack-set-drift-example { "StackSet": { "Status": "ACTIVE", "Description": "Demonstration of drift detection on stack sets.", "Parameters": [], "Tags": [ { "Value": "Drift detection", "Key": "Feature" } ], "ExecutionRoleName": "AWSCloudFormationStackSetExecutionRole", "Capabilities": [], "AdministrationRoleARN": "arn:aws:iam::012345678910:role/AWSCloudFormationStackSetAdministrationRole", "StackSetDriftDetectionDetails": { "DriftedStackInstancesCount": 2, "TotalStackInstancesCount": 7, "LastDriftCheckTimestamp": "2019-12-04T20:36:55.612Z", "InProgressStackInstancesCount": 0, "DriftStatus": "DRIFTED", "DriftDetectionStatus": "COMPLETED", "InSyncStackInstancesCount": 5, "FailedStackInstancesCount": 0 }, "StackSetARN": "arn:aws:cloudformation:us-east-1:012345678910:stackset/stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22example", "TemplateBody": [details omitted], "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22ebexample", "StackSetName": "stack-set-drift-example" } } ``` You can use the `list-stack-instances` command to return summary information about the stack instances associated with a stack set, including the drift status of each stack instance\. In this example, executing `list-stack-instances` on the example stack set enables us to identify which two stack instances have a drift status of `DRIFTED`\. ``` aws cloudformation list-stack-instances --stack-set-name stack-set-drift-example { "Summaries": [ { "StackId": "arn:aws:cloudformation:ap-northeast-1:012345678910:stack/StackSet-stack-set-drift-example-29168cdd-e587-4709-8a1f-90f752ec65e1/1a8a98f0-16d4-11ea-9844-060a5example", "Status": "CURRENT", "Account": "012345678910", "Region": "ap-northeast-1", "LastDriftCheckTimestamp": "2019-12-04T20:36:18.481Z", "DriftStatus": "IN_SYNC", "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22eexample" }, { "StackId": "arn:aws:cloudformation:eu-west-1:012345678910:stack/StackSet-stack-set-drift-example-b0fb6083-60c0-4e39-af15-2f071e0db90c/0e4f0940-16d4-11ea-93d8-0641cexample", "Status": "CURRENT", "Account": "012345678910", "Region": "eu-west-1", "LastDriftCheckTimestamp": "2019-12-04T20:37:32.687Z", "DriftStatus": "DRIFTED", "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22eexample" }, { "StackId": "arn:aws:cloudformation:us-east-1:012345678910:stack/StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2988071a/008e6030-16d4-11ea-8090-12f89example", "Status": "CURRENT", "Account": "012345678910", "Region": "us-east-1", "LastDriftCheckTimestamp": "2019-12-04T20:34:28.275Z", "DriftStatus": "DRIFTED", "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22eexample" }, [additional stack instances omitted] ] } ``` The `describe-stack-instance` command also returns this information, but for a single stack instance, as in the example below\. ``` aws cloudformation describe-stack-instance --stack-set-name stack-set-drift-example --stack-instance-account 012345678910 --stack-instance-region us-east-1 { "StackInstance": { "StackId": "arn:aws:cloudformation:us-east-1:012345678910:stack/StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2988071a/008e6030-16d4-11ea-8090-12f89example", "Status": "CURRENT", "Account": "012345678910", "Region": "us-east-1", "ParameterOverrides": [], "DriftStatus": "DRIFTED", "LastDriftCheckTimestamp": "2019-12-04T20:34:28.275Z", "StackSetId": "stack-set-drift-example:bd1f4017-d4f9-432e-a73f-8c22eexample" } } ``` 1. Once you've identified which stack instances have drifted, you can use the information about the stack instances that is returned by the `list-stack-instances` or `describe-stack-instance` commands to execute the [describe\-stack\-resource\-drifts](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/describe-stack-resource-drifts.html)\. This command returns detailed information about which resources in the stack have drifted\. The following example uses the stack ID of one of the drifted stacks, returned by the `list-stack-instances` command in the example above, to return detailed information about the resources that have been modified or deleted outside of CloudFormation\. In this stack, two properties on an `AWS::SQS::Queue` resource, `DelaySeconds` and `maxReceiveCount`, have been modified\. ``` aws cloudformation describe-stack-resource-drifts --stack-name arn:aws:cloudformation:us-east-1:012345678910:stack/StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2988071a/008e6030-16d4-11ea-8090-12f89example --stack-resource-drift-status-filters "MODIFIED" "DELETED" { "StackResourceDrifts": [ { "StackId": "arn:aws:cloudformation:us-east-1:012345678910:stack/StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2988071a/008e6030-16d4-11ea-8090-12f8925a37c4", "ActualProperties": "{\"DelaySeconds\":10,\"RedrivePolicy\":{\"deadLetterTargetArn\":\"arn:aws:sqs:us-east-1:012345678910:StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2-DLQ-1H0SQCOKALBDJ\",\"maxReceiveCount\":20},\"VisibilityTimeout\":60}", "ResourceType": "AWS::SQS::Queue", "Timestamp": "2019-12-04T20:33:57.261Z", "PhysicalResourceId": "https://sqs.us-east-1.amazonaws.com/012345678910/StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2-Queue-6FNDEY4AUEPV", "StackResourceDriftStatus": "MODIFIED", "ExpectedProperties": "{\"DelaySeconds\":20,\"RedrivePolicy\":{\"deadLetterTargetArn\":\"arn:aws:sqs:us-east-1:012345678910:StackSet-stack-set-drift-example-b7fde68e-e541-44c2-b33d-ef2e2-DLQ-1H0SQCOKALBDJ\",\"maxReceiveCount\":10},\"VisibilityTimeout\":60}", "PropertyDifferences": [ { "PropertyPath": "/DelaySeconds", "ActualValue": "10", "ExpectedValue": "20", "DifferenceType": "NOT_EQUAL" }, { "PropertyPath": "/RedrivePolicy/maxReceiveCount", "ActualValue": "20", "ExpectedValue": "10", "DifferenceType": "NOT_EQUAL" } ], "LogicalResourceId": "Queue" } ] } ``` ## Stopping drift detection on a stack set<a name="stacksets-drift-stop"></a> Because drift detection on a stack set can be a long\-running operation, there may be instances when you want to stop a drift detection operation that is currently running on a stack set\. **To stop drift detection on a stack set using the AWS Management Console** 1. Open the AWS CloudFormation console at [https://console\.aws\.amazon\.com/cloudformation](https://console.aws.amazon.com/cloudformation/)\. 1. On the **StackSets** page, select the name of the stack set\. CloudFormation displays the **StackSets details** page for the selected stack set\. 1. On the **StackSets details** page, select the **Operations** tab, and then select the drift detection operation\. 1. Select **Stop operation**\. **To stop drift detection on a stack set using the the AWS CLI** + Use the `[stop\-stack\-set\-operation](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/stop-stack-set-operation.html)` command\. You must supply both the stack set name and the operation ID of the drift detection stack set operation\. ``` 1. aws cloudformation stop-stack-set-operation --stack-set-name stack-set-drift-example --operation-id 624af370-311a-11e8-b6b7-500cexample ```
2024-06-02T01:27:04.277712
https://example.com/article/7111
Joseph Palmer (priest) Joseph Palmer was an Irish Anglican priest in the late 18th century and the first decades of the 19th. A graduate of Trinity College, Dublin, he was Chancellor of Ferns from 1779 to 1802. In 1787 he became Dean of Cashel and in 1802 Precentor of Waterford, holding both posts until his death on 2 May 1829. References Category:Deans of Cashel Category:Alumni of Trinity College Dublin Category:18th-century Anglican priests Category:19th-century Anglican priests Category:1829 deaths
2024-06-07T01:27:04.277712
https://example.com/article/7003
Q: Output input if it doesn't contain specific String I have what seems to be a rather simple problem, but I can't find an answer to it. I'm working on a travis script which validates files. I'm using 3rd party software for this and therefore I have no influence on the development. The Problem: As you may know travis scripts require non-zero exit codes for the build to fail. Unfortunately the software I'm using only outputs error message in stdout but still exists with code 0. My idea was to use grep. Currently I'm using this command: ! echo "SomeInput" | grep -Pzo "\A[^\x{0000}]*error message[^\x{0000}]*\Z" If the error message is printed, it returns with a non-zero exit code and prints the error message. As you may have noticed, the output is not being displayed when no errors show up. This is bad if we want to check if a paricular change introduced warnings. Which will then also not be displayed. Any ideas? A: If I understand correctly, you want to detect errors by grep-ing certain patterns in the output, and at the same time you also want to see the entire output. The tricky part is that grep itself would consume the output. I don't there's an easy clever solution for this. You need to consume the output twice. Once to just print it, and one more time to check for errors. One solution is to save the output to a file first, and then process it. For example: some_command 2>&1 | tee out.log ! grep -Pzo "\A[^\x{0000}]*error message[^\x{0000}]*\Z" out.log
2024-06-19T01:27:04.277712
https://example.com/article/8416
Q: prove arctan(x) is continuous in $\epsilon$-$\delta$ I am trying to prove that $f(x) = \arctan(x)$ is $\epsilon$-$\delta$ continuous. I know I want to show that for all $\epsilon>0$, $x,y \in \mathbb{R}$, there exists $\delta > 0$ such that $|x-y| < \delta$ implies that $|f(x) - f(y)|< \epsilon$ Unforutnately, I cannot get anywhere from here Any help would be greatly appreciated. A: We have $$ \arctan(x) -\arctan(y) =\arctan( ( x - y)/(1 + xy) ), $$ hence, for nonnegative $xy$, $$ |\arctan(x) -\arctan(y)|\leq|\arctan ( x - y)|\leq|x-y| $$ and one can choose $\delta=\varepsilon$. The case $xy<0$ is easy to reduce to the previous one by taking $|x-y|\leq|x-0|+|y-0|$.
2023-08-31T01:27:04.277712
https://example.com/article/2583
HOOPS: Harris "realizes big mistake," seeks redemption GAINESVILLE -- Redshirt junior center Damontre Harris, dismissed from the No. 10 Florida men's basketball team in late December, has been granted a second chance. Following Wednesday's 74-58 win over South Carolina, Gators coach Billy Donovan abruptly announced at the end of his postgame press conference that Harris, a 6-foot-10 transfer from USC, has re-enrolled at Florida in hopes of working his way back onto the team. Donovan said Harris, who has yet to play a single game at Florida, contacted him via text message several times during the holidays, "realizing he'd made a big mistake." "He wants to be here," Donovan said. Harris was suspended indefinitely Nov. 1 for undisclosed violation(s) of team rules. On Dec. 21, the center was officially dismissed from the team and was contacted by various schools as a potential transfer prospect. But the center had a change of heart and Donovan said Harris could resume practicing with the team sometime this spring. Florida's coach was adamant Harris will not play at all this season. "He wants to work his way back," Donovan said. "It's going to be similar to the Scottie Wilbekin situation. He has to meet lots of terms and conditions. Can he make it? I don't know, but if he does it will be a great comeback story."
2024-04-07T01:27:04.277712
https://example.com/article/7098
*** Competition Now Closed *** And the Winner is Alessandro Ditta. Congratulations. To celebrate the launch of our Funky Kit Chinese Edition … We’re giving away a set of Noctua Silent Fans and Goodies worth over USD $150! To enter the competition, please choose the following bonuses to increase your chance of winning! … Win a set of Noctua Silent Fans and Goodies A big thank you to our sponsor Noctua and of course our very own Funky Kit Team! The Prizes! 2 x Noctua NF-A14 IndustrialPPC-2000 PWM fan (140mm) 3 x Noctua NF-S12B REDUX-1200 PWM fan (120mm) 1 x Noctua NF-F12 PWN 120mm Fan (120mm) 1 x Noctua NT-H1 Thermal paste 1 x Notuca Keyring 1 x Noctua Pen Closing date is on 8th April, 2017 at mid-night EST. Good Luck! 🙂
2023-11-07T01:27:04.277712
https://example.com/article/3017
ESPN – not interested in equality! at ALL! Last night Outkick broke the news that Linda Cohn, one of the most respected women to ever work at ESPN and the person who has hosted more SportsCenters over the past 25 years than any other current employee, was called and told by ESPN president John Skipper not to come to work after she went on the radio in New York City this past April and said as follows: “They definitely overpaid for many of these products, whether it’s the NBA or starting up networks like the Pac-12 Network and SEC Network,” she said on WABC’s “Bernie and Sid Show.” “It’s well documented … They [also] did not see that they would lose all these subscribers [to competitors like Netflix.] But it was more than just that. Politics played a part, as did the network’s move away from strictly covering sports. I felt that the old school viewers were put in a corner and not appreciated with all these other changes. And they forgot their core. You can never forget your core and be grateful for your core group.” As comments go, virtually no one could disagree with any of what she said. ESPN did overpay for the NBA and other sports rights, it’s why they are firing hundreds of employees. And ESPN’s ratings have definitely plummeted over the past couple of years at the same time that they have lost over 13 million cable subscribers. Studies have clearly shown that conservatives have felt alienated by ESPN’s leftward turn and have abandoned the network in droves as well. Everything that Cohn said was supported by ample data. But her opinion still wasn’t acceptable to ESPN’s bosses, who have been arguing, and losing the public battle, that ESPN hasn’t adopted a left wing mantra. According to multiple sources inside ESPN — Cohn declined comment when reached by Outkick — ESPN president John Skipper called Cohn and screamed at her for having the gall to share her opinion in public and told her to stay at home instead of coming to work that weekend. Why was Cohn to stay at home? So, according to an irate John Skipper, she could have time to think about what she had said. When Outkick reached out to ESPN seeking comment on the Cohn story, ESPN’s PR staff refused to explain anything about the decision, responding via email: “The last time we responded with an explanation, you called us liars.” Word of Linda Cohn’s suspension raced through ESPN’s corridors with many employees furious over Skipper’s treatment of the longtime legend at the network. Especially when so many at ESPN disagreed with the direction of the network in general and felt compelled to keep their mouths shut lest they also say something that angered their bosses. Posts categorized under "The Real Side" are posted by the Editor because they are deemed worthy of further discussion and consideration, but are not, by default, an implied or explicit endorsement or agreement. The views of guest contributors do not necessarily reflect the viewpoints of The Real Side Radio Show or Joe Messina. By publishing them we hope to further an honest and civilized discussion about the content. The original author and source (if applicable) is attributed in the body of the text. Since variety is the spice of life, we hope by publishing a variety of viewpoints we can add a little spice to your life. Enjoy! Join the conversation! We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.
2024-07-26T01:27:04.277712
https://example.com/article/5153
/* * Anserini: A Lucene toolkit for replicable information retrieval research * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package io.anserini.ltr; import io.anserini.ltr.feature.FeatureExtractor; import io.anserini.ltr.feature.base.SCQFeatureExtractor; import org.junit.Test; import java.io.IOException; import java.util.Arrays; import java.util.List; import java.util.concurrent.ExecutionException; public class SCQFeatureExtractorTest extends BaseFeatureExtractorTest<Integer> { private static FeatureExtractor EXTRACTOR = new SCQFeatureExtractor(); @Test public void testSimpleSingleDocument() throws IOException, ExecutionException, InterruptedException { String testText = "test document"; String testQuery = "document"; //idf = 0.28768 //tf =1 float [] expected = {-0.24590f}; assertFeatureValues(expected, testQuery, testText, EXTRACTOR); } @Test public void testSingleDocumentMultipleQueryToken() throws IOException, ExecutionException, InterruptedException { String testText = "test document more tokens than just two document "; String testQuery = "document missing"; float[] expected = {0.22362f}; assertFeatureValues(expected, testQuery, testText, EXTRACTOR); } @Test public void testSimpleMultiDocument() throws IOException, ExecutionException, InterruptedException { String testQuery = "test document"; // idf = 0.47 // tf = 3 // document: 1.34359 // test : 1 : 0.98064 float[] expected = {1.162115f}; assertFeatureValues(expected, testQuery, Arrays.asList("test document multiple tokens document", "another document for doc freq count", "yet another"), EXTRACTOR, 0); } }
2023-09-14T01:27:04.277712
https://example.com/article/3032
Thoracic ectopic kidney in a child: a case report. Congenital thoracic ectopic kidney is a very rare developmental anomaly and the rarest form of all ectopic kidneys. It is usually asymptomatic and discovered incidentally on a routine chest radiography. We report a thoracic ectopic kidney in a 19-month-old boy, which initially presented as a well demarcated mass at the base of the right lung on chest x-ray. Intravenous pyelography (IVP) and thoraco-abdominal computed tomography (CT) demonstrated a normal functioning transdiaphragmatic thoracic ectopic right kidney, but technetium-99m DTPA and DMSA scintigraphy demonstrated pelvic stasis. We hereby discuss the features of congenital thoracic ectopic kidney and review the literature. Although it is extremely rare, thoracic ectopic kidney should be considered in differential diagnosis of a mass with a well demarcated superior margin in the lower part of the thorax, and renal scintigraphy must be performed even if CT and IVP results are normal.
2023-12-16T01:27:04.277712
https://example.com/article/2214
Q: Write a parabolic equation in kinematics How might I go about writing a parabolic equation in standard form $ax^2 + bx + c$ given all of the following measurements: $X_0, X_f, Y_o, Y_f$: the initial and final x and y positions. $V_{x0}, V_{xf}, V_{y0}, V_{yf}$: the initial and final x and y velocities. $t_x, t_y$: the time it takes for $x_0$ to transition to $x_f$; same for y. These are equal in parabolic equations. $a_x, a_y$: acceleration in x and y. I don't know how I would give the trajectory as a normal parabola from this data because I'm not sure which variables to substitute and where into $ax^2 + bx + c$. A: You may be overthinking it. In general when you need to solve for coefficients you first need to ask what relates the coefficients? In this case it doesn't seem you've written precisely what equation you want. In your post, you've written the parabola in terms of x. Do you mean you want y position as a function of x position? This isn't the standard way to go about it, normally the most useful method is to give x and y in terms of t. If the parabolic equation gives the height of the ball at time t: $y(t)=a t^2+b t+c$ and a linear equation gives the position of the ball at time t: $x(t)=d t$, and if we assume gravity is directed downwards giving an acceleration of $g$ we can clearly see that $d=V_{x0}=V_{xf}=(X_f-X_0)/(t)$. (gravity does not change the horizontal velocity at all) Now, gravity dictates the ball's acceleration completely, which tells us $a=-\frac{g}{2}$. That leaves two constants, and so we need to come up with two equations to solve for them. If we are given the initial and final positions and the time taken to go between the states, we don't need velocities at all. The two equations are: $$Y_0=y(t_0)=a t_0^2+b t_0+c$$ $$Y_f=y(t_f)=a t_f^2+b t_f+c$$ or, written more clearly for our purposes: $$b t_0+c=Y_0-a t_0^2$$ $$b t_f+c=Y_f-a t_f^2$$ (written in this form because it's a standard format in linear algebra for a system of linear equations and helps isolate the unknowns) These simultaneous equations can be solved for $b$ and $c$ in terms of the other components. (try subtracting one equation for the other), giving us all the coefficients. If you wanted to solve for $y$ in terms of $x$, first solve for $t$ in terms of $x$ and then substitute that value of $t$ into the equation for $y$.
2024-01-31T01:27:04.277712
https://example.com/article/9686
Gang of Democracies When I hear the word “democracy,” I reach not for my revolver, but for my wallet. I freeze and wait for the next blow to fall: a tax hike, another war, a new form of knavery masquerading as well-intentioned ignorance. Imagining a “League of Democracies,” as a number of foreign-policy mavens have, I reach instead for the history books and recall the many incarnations—and failures, most of them bloody—of this perennial panacea. The League of Nations, Woodrow Wilson’s stillborn brainchild, was supposed to be just such an agency, deterring aggression and enforcing the right of nations to self-determination. The lineage of this idea goes back even farther, originating in the imagination of H.G. Wells, whose 1933 novel, The Shape of Things to Come, projected an idealized portrait of an international brotherhood dedicated to Science, Reason, and Order and to cleaning up the mess of a second global conflict. Yes, Wells predicted World War II, which in his version lasted 100 years and culminated in a worldwide plague. Of course, the “Dictatorship of the Air,” as Wells dubbed his legion of world saviors, subdued retrograde elements by means of sleeping gas, which rendered nationalists and other unsuitable persons helpless. In the real world, it wasn’t sleeping gas that gave would-be saviors their power, but armed force, as Lenin realized. Neoconservative calls for an international federation of designated “democratic” nations, which would act in concert ostensibly to defend and extend democracy worldwide, have a distinctly Soviet flavor. When the Soviet empire was at the height of its expansive phase, advancing into Europe in the wake of Hitler’s defeat, it set up “People’s Democracies” from Warsaw to Sofia. Of course, these weren’t democracies at all but dictatorships coated with the thinnest veneer of “democratic” formalism. When the Communist-dominated “League Against War and Fascism,” which had previously opposed U.S. intervention in the war, turned on a dime on the Kremlin’s orders, this “peace” group of left-wing ministers and hardened Communist cadres changed its name to the “League for Peace and Democracy.” It was the signal that the left-wing “peace” movement was about to defect to the War Party, and, to be sure, the Communists wasted no time in becoming the most ferocious warmongers on the block. Regardless of whether one believes that the war of the “democracies” (including the Soviet Union) against the Axis could have been avoided, the principle holds: when you hear talk of spreading democracy, the beating of war drums is sure to follow. Instead of a war-making machine, the idea of an international league of supposedly free states is presented as a “Concert of Democracies,” but whatever music is produced will no doubt have a distinctly martial tune. This is no symphony but a pro-American version of the Warsaw Pact. What we are witnessing is a twisted replay of the Cold War, with the U.S. taking the part of Russia. Adding to the irony, fears of a “revanchist Russia,” as the phrase goes, play a key role in this push for a more ideological version of NATO. For years, the neocons have been calling for the Russians to be kicked out of the G-8 and forced to suffer diplomatic and trade sanctions. Russia’s repulsion of the Georgian invasion of South Ossertia and Abkhazia has given this argument urgency verging on hysteria. Russia, we are told, is on the march, seeking to reconstitute its lost empire. Never mind that the Russians first need to reconstitute their lost population—their birthrate is decreasing so rapidly that they’ll soon be placed on the endangered species list. Yet the threat-mongers are impervious to truth: they are too immersed in the weaving of their narrative that foretells the transformation of Weimar Russia into a nuclear-armed ideological competitor with the West. To this end, Western news outlets are suddenly fascinated with the obscure figure of Alexander Dugin, the chief theoretician of Russian “National Bolshevism,” the “red-brown” current that venerates both Josef Stalin and Peter the Great. Although his “Eurasianist” movement is marginal, Western journalists are fixated on Dugin, who was recently profiled in the Christian Science Monitor and interviewed by the Washington Times. He is the founder of the tiny Russian National Bolshevik Party, a group of violent skinheads, which has been visible in protesting the leadership of Vladimir Putin. The National Bolsheviks are aligned in the “Other Russia” coalition with Russian chess champion Gary Kasparov, whose aversion to Putin is shared by the Western media, albeit not by the overwhelming majority of the Russian people. Dugin split off from the National Bolsheviks and formed an even smaller, more extremist grouplet in reaction to the party’s alliance with Kasparov, seen by Dugin as one of the despised liberals. Yet Dugin is just as opposed to Putin as his erstwhile National Bolshevik comrades, blames Putin for capitulating to the West, and dreams of a confrontation with America that he implies may end in nuclear Armageddon. The idea that Dugin’s “Eurasianism” has any influence outside a small circle of obscure Russian ideologues, let alone that it poses a challenge to Western liberal democracy, is a fantasy. Yet if Dugin did not exist, it would have been necessary for the Concert of Democracies crowd to invent him, with his extravagant mysticism and grandiose plans for a Russo-Chinese-Iranian military alliance against the U.S.—an axis that, he insists, may even include Israel. The man is clearly a self-promoter, but the prophet of a rising ultra-nationalist movement? Not quite. As Masha Lipman at the Carnegie Center in Moscow says, “It’s a vast exaggeration to suggest that Dugin is the ideologue behind today’s Kremlin leaders. Admittedly, he’s been reasonably prominent lately and, apparently, there are people with money and clout among his supporters. But Dugin is vehemently anti-Western, while Putin and Medvedev never forget to refer to the Western world as Russia’s partners. None of Russia’s leaders wants a new Cold War.” All too many of America’s leaders and would-be leaders do want a new Cold War, however, and the Concert of Democracies is a key weapon in their arsenal. The Russian defense of South Ossertia and Abhkazia against the Georgian invasion has renewed the debate over Georgia’s admission to NATO, but the Europeans are reluctant—they don’t want to go to war for Georgia’s dubious territorial claims, and Abkhazia has a long history as a distinct nation. If NATO as an instrument of the new Cold War isn’t working as the War Party hoped, then the Concert of Democracies is Plan B, one that will have appeal beyond the offices of the American Enterprise Institute and the Weekly Standard. Neoconservative internationalists, such as Robert Kagan, are reaching out to liberal internationalists, such as Ivo Daalder of the Brookings Institution: the two recently authored an op-ed in the Washington Post calling for the establishment of such a league to fulfill “the responsibility to protect.” Daalder is an influential advisor to Barack Obama’s presidential campaign, while Kagan, Newsweek noted, is “McCain’s foreign policy guru.” To protect whom against what? Kagan elaborated on this elsewhere, ripping a few stray phrases out of a speech by Sergei Lavrov to justify the need for an explicitly ideological response to Russia: “For the first time in many years,” Kagan quotes the Russian foreign minister, “a real competitive environment has emerged on the market of ideas” between different “value systems and development models. … the west is losing its monopoly on the globalization process.” “True or not,” Kagan avers, “democracies should not be embarrassed about holding up their side of this competition. Neither Beijing nor Moscow would expect them to do anything else.” But here is what Lavrov really said: It is thanks largely to the strengthening of Russia that, for the first time in the last decade and a half, a real competitive environment has taken shape in the market of ideas for a world pattern adequate to the contemporary stage of world development. The rise of new global centers of influence and growth, and more even distribution of development resources and of control over natural wealth lay down the material basis for a multipolar world order. A multipolar world is not set for confrontation. It’s simply that new power centers are objectively coming into being. They compete, particularly for influence and access to natural resources. Such was always the case and there is nothing fatal about this. In the neoconservative universe, a plea for peace is a declaration of war. Facts that get in the way of good fiction—such as the historical animosities between China and Russia, which prevent the creation of a Sino-Russian Co-Prosperity Sphere—are cast aside. From neoconservatives who long to thrust into the steppes of Central Asia to weepy liberals who attend rallies demanding that the U.S. “do something” about Darfur, the concert concept has the potential to mobilize broad support. If it is implemented, it will be interesting to see how the principals finesse the “democratic” credentials of America’s allies, such as Georgia, where President Mikheil Saakashvili jailed the opposition on charges of treason, ordered his thugs to seize an anti-government TV station, and beat pro-democracy demonstrators, injuring 500. On what grounds will the concert ignore the referenda held in South Ossetia and Abkhazia, which ratified their bids for independence? The Concert of Democracies—it sounds like a television series, and the Hollywood aspect of this project is perhaps its most interesting feature. The idea is to set up a narrative: the brave little democracies of the world backed up by their big brother in Washington, up against the world’s bullies. But will the public buy it? __________________________________________
2024-07-09T01:27:04.277712
https://example.com/article/7293
import 'dart:io'; import 'dart:math'; import 'package:hive/hive.dart'; import 'package:path/path.dart' as path; import 'package:test/test.dart'; Matcher isAHiveError([String contains]) { return allOf( isA<HiveError>(), predicate((HiveError e) => contains == null || e.toString().toLowerCase().contains(contains.toLowerCase()))); } Matcher throwsHiveError([String contains]) { return throwsA(isAHiveError(contains)); } final random = Random(); String tempPath = path.join(Directory.current.path, '.dart_tool', 'test', 'tmp'); String assetsPath = path.join(Directory.current.path, 'test', 'assets'); Future<File> getTempFile([List<int> bytes]) async { var name = random.nextInt(pow(2, 32) as int); var file = File(path.join(tempPath, '$name.tmp')); await file.create(recursive: true); if (bytes != null) { await file.writeAsBytes(bytes); } return file; } Future<RandomAccessFile> getTempRaf(List<int> bytes, {FileMode mode = FileMode.read}) async { var file = await getTempFile(bytes); return await file.open(mode: mode); } Future<Directory> getTempDir() async { var name = random.nextInt(pow(2, 32) as int); var dir = Directory(path.join(tempPath, '${name}_tmp')); if (await dir.exists()) { await dir.delete(recursive: true); } await dir.create(recursive: true); return dir; } File getAssetFile(String part1, [String part2, String part3, String part4]) { return File(path.join(assetsPath, part1, part2, part3, part4)); } Future<File> getTempAssetFile(String part1, [String part2, String part3, String part4]) async { var assetFile = getAssetFile(part1, part2, part3, part4); var tempFile = await getTempFile(); return await assetFile.copy(tempFile.path); } Future<Directory> getAssetDir(String part1, [String part2, String part3, String part4]) async { var assetDir = Directory(path.join(assetsPath, part1, part2, part3, part4)); var tempDir = await getTempDir(); await for (var file in assetDir.list(recursive: true)) { if (file is File) { var relative = path.relative(file.path, from: assetDir.path); var tempFile = File(path.join(tempDir.path, relative)); await tempFile.create(recursive: true); await file.copy(tempFile.path); } } return tempDir; } Future<void> expectDirsEqual(Directory dir1, Directory dir2) { return _expectDirsEqual(dir1, dir2, false); } Future<void> _expectDirsEqual( Directory dir1, Directory dir2, bool round2) async { await for (var entity in dir1.list(recursive: true)) { if (entity is File) { var fileName = path.basename(entity.path); var otherFile = File(path.join(dir2.path, fileName)); var entityBytes = await entity.readAsBytes(); var otherBytes = await otherFile.readAsBytes(); expect(entityBytes, otherBytes); } else if (entity is Directory) { var dir2Entity = Directory(path.join(dir2.path, path.basename(entity.path))); await expectDirsEqual(entity, dir2Entity); } } if (!round2) { await _expectDirsEqual(dir2, dir1, true); } } Future<void> expectDirEqualsAssetDir(Directory dir1, String part1, [String part2, String part3, String part4]) { var assetDir = Directory(path.join(assetsPath, part1, part2, part3, part4)); return expectDirsEqual(dir1, assetDir); }
2024-03-19T01:27:04.277712
https://example.com/article/8701
import { transforms, render_query } from './transform' import { make } from '../items/factory' import Chart from '../items/chart' /** * Focus on a single presentation. */ transforms.register({ name: 'Isolate', display_name: 'Isolate', transform_type: 'presentation', transform: function(item: any) : any { let options = item.options || {} if (item instanceof Chart) { item.set_renderer('flot') } return make('section') .add(make('row') .add(make('cell') .set_span(12) .set_style('well') .add(item.set_height(6)))) .add(make('row') .add(make('cell') .set_span(12) .add(render_query(item.query)))) .add(make('row') .add(make('cell') .set_span(12) .add(make({item_type: 'summation_table', options: { palette: options.palette }, show_color: true, sortable: true, format: ',.3f', query: item.query})))) } })
2023-10-15T01:27:04.277712
https://example.com/article/6428
Jean Paul Leon Jean Paul Leon (born 1955) is a French/Spanish artist, sculptor, writer, known mainly for his work Unisson which assembles three art collections on the three Mediterranean Religions, calling for understanding and dialogue among the people of the three cultures. His book Heritage, prefaced by French Minister Jack Lang and recommended by The Louvre Museum curator Lizzie Boubli is the first of the trilogy. Early years Jean Paul Leon was raised in France and Spain and educated in England in the Classics, Greek, and Latin. At age 7 and a half, Leon met Pablo Ruíz Picasso, a comrade of his grandfather. Meeting the man and visiting his studio had a major and lasting impact on his life. At age 11, Leon won a nationwide writing contest sponsored by Coca-Cola. As a Writer By 16, Jean Paul Leon had published his first article for the newspaper El Norte de Castilla, under the auspices of laureate Miguel Delibes, where years later, he became a columnist. At 19, he began writing as a freelancer for the magazine Triunfo, publishing in-depth interviews with English folk-singer-songwriters John Martyn, Sandy Denny, Nick Drake, and others. His latest publication is Last Judgement, a short story published by Grafein, Barcelona in April 2015 for the benefit of Doctors Without Borders. At 18, he began a series of solo art exhibits curated by Chantal Hinaut through the Alliance Française. Career By 23, Jean Paul Leon had married and moved to New York City, where, on the very first exhibit of his drawings, he was selected as ‘most promising young artist’ at New York's Washington Square Outdoor Art Exhibit. At 24, he had his first one-man-show on Madison Avenue, N.Y.C., at Barbara Walter's Gallery. From there, he continued exhibiting until the 90's when he moved to Hollywood to work in the film and animation industry. In 2003, after 12 years in Los Angeles, he returned to Paris, where he began exhibiting again and continued working on a lifelong choice of subject: Light and Luminaries, their contribution to universal culture. In 2006, Jean Paul Leon's oeuvre, encompassing 30 years of work on the Menorah as conducting wire and symbol of light was assembled in the art book Héritage, prefaced by French Minister of Culture Jack Lang and recommended by The Louvre Museum curator Lizzie Boubli. The book Heritage, which unites the artist's paintings and his writings, in three languages, was edited by Michael Neugebauer, published by MinEdition France and sponsored by the Culture Mission of La Fondation pour la Mémoire de la Shoah, Paris. while presided by French Minister Simone Veil, survivor of Bergen-Belsen and first woman President of the European Parliament. Richard Covington, writer for the Smithsonian, New York Times and International Herald Tribune described the work saying: “There's an incandescent energy here that rewards every viewing with unexpected revelations, keeping the eye and brain off-balance and alive”. During this period, while museum, gallery exhibits and public conferences succeeded one another, Jean Paul Leon started work on a new collection: I.N.R.I. Ieusus Nazarenus Rex Iudeurum (oil on wood panels over large crosses) 33 incisive portraits that depict the figure of Jesus Christ and its varying socio/psychological aspects as His myth travelled through the last 2000 years as explained by Clare McAndrews of Arts Economics in her article, Jean Paul Leon: Portrait of an Artist. In the prologue to the book I.N.R.I. by Jean Paul León, notable British writer Philip Pullman, author of The Dark Materials & The good man Jesus and the scoundrel Christ, observes: ″These pictures represent a formidable attempt to grapple with the legacy of the most strange and enigmatic man who ever lived.″ In 2007, Jean Paul Leon moved his studio to Dublin, starting with an invitation by publisher and founder Noelle Campbell-Sharp for a residency as an artist at the Cill Rialaig Arts Centre, where he created Ulysses, Fate and Destiny, an art collection illustrating the 18 chapters of James Joyce's Ulysses (novel), exploring the subject of Leopold Bloom as the figure of the ever wandering Jew, and Homer's Odysseus as the ultimate hero facing the peril of death at every turn of his journey back home to his kingdom, to his Ithaca. After completing Ulysses, Fate & Destiny in Dublin, Jean Paul Leon settled in Berlin, focusing his energy on a pending collection, Reflections of Islam, started in 1978 when, during his honeymoon in the Sahara, he was given a copy of the Qur'an by a fellow traveller. The work was taken up again in 1991, during the invasion of Kuwait, in another desert, the Sonoran Desert, Arizona, where the bulk of the work was created with 3D objects and mirrors that reflect the viewer and incorporate him/her into the artwork, projecting exterior images and interior reflections. The resulting body of work is based on the readings of the text, on contemplation, on the mirror of the desert, on the oasis, on the sand, on the wind, on his love for calligraphy, on the spell of La Alhambra & its unique tendency to travel with him, not only in the arabesque & the filigree of time but on the most ogival confines of the imagination. The three collections: Hebrew Heritage, I.N.R.I. & Reflections of Islam, conform E.T.C. Espace Three Cultures, supported by the Mayor of Toledo. Three Cultures is the result of Jean Paul Leon's lifelong dedication and his ultimate conviction... considering that when a seeker enters through the threshold of the three monotheistic religions, he secretly expects Maggid – to hear the voice of God – but inevitably stumbles upon the restricted realm of mankind. Ong Namo Guru Dev Namo. In his introduction to the artist, leading Art Appraiser of the City of Paris, Maître Pierre Cornette de St-Cyr, writes: “the light in art, as Jean Paul Leon shows us, will lead us towards intelligence.” External links Official website References Category:1955 births Category:Living people Category:20th-century French painters Category:French male painters Category:21st-century French painters Category:Modern painters Category:Modern sculptors Category:20th-century French sculptors Category:French male sculptors Category:20th-century Spanish painters Category:Spanish male painters Category:21st-century Spanish painters Category:Spanish contemporary artists
2023-12-23T01:27:04.277712
https://example.com/article/1651
The Hammerli Black Out air gun package includes a full power break barrel air rifle with carbine barrel fitted with the Back Draft silencer. The package includes a 3-9x40 scope, mounts and gun bag. Perfect for pest control, hunting or just some back garden plinking. Great value air rifle package. We can supply the full range of airguns along with leading brands including Air Arms, BSA and Weihrauch. Visit us in Melton Mowbray on a Sunday or Tuesday or have your new air rifle delivered to any Leicestershire address for just £9.99. Leicestershire Airguns are the only dedicated airgun dealer in Leicestershire offering a wide range of airguns at competitive prices with friendly, helpful service. Fantastic offer now available on The Lincoln Vogue. This popular deluxe limited edition gun has been resurrected and brought into the 21st century. DISCOUNTS apply for a limited time only so don't miss out!
2024-01-25T01:27:04.277712
https://example.com/article/6460
4C Analysis of 3C, ChIP-Loop, and Control Libraries. The 4C detection method starts with a 3C, ChIP-loop, or control library and then uses inverse polymerase chain reaction (PCR) to amplify all restriction fragments that are ligated to a single restriction fragment of interest. As a result, a genome-wide interaction profile of the restriction fragment of interest is obtained. Before starting a 4C experiment, first assess the quality of the 3C, ChIP-loop, or control library that will be studied by performing semiquantitative PCR with the library as template. This procedure ascertains that ligation products can be readily detected and that nearby restriction fragments become ligated more frequently than more distant fragments. Choice of a restriction enzyme for 4C analysis and determination of interaction frequencies using 4C are described in detail.
2023-10-31T01:27:04.277712
https://example.com/article/8145
Friday, May 23, 2014 In my quick read, these are notes on what people on the Advanced Learning task force are recommending. From the notes, it appears the first two people (Barber and Jenkins) are recommending completely changing APP. Their part of the document states that APP, ALO, and Spectrum end in 2015-15 for 6th grade (pp 8). The following years more grades are eliminated until APP is no longer offered in 2017 in middle school, no longer offered in 2018 in high school, and no longer offered in elementary, middle, and high school in 2019. In its place would be a new HiCap program with both shared and self contained classes and different entry criteria with no appeals process. Most of the other people appear to be recommending much more modest changes, some very few changes at all. But these notes out of the ALTF may come as a surprise to many -- they did to me at least -- as it appears at least some on the committee are advocating completely replacing APP with a different program. Tuesday, May 20, 2014 This from another thread seems controversial, worth highlighting, and worth discussing further. Excerpts: What does seem apparent is SPS is hell-bent on closing the achievement gap by taking away opportunities for advanced learners. ... There is an active effort to keep the top kids in line with the pack in gen ed. Shauna Heath's recently reported pronouncement that Spectrum is one year ahead, no more no less, and APP is two years ahead, no more, no less, is another chilling illustration of this practice. Michael Tolley's recent "realignment" of APP middle school LA/SS scope and sequence with gen ed is another one. I could go on and on, and the parents here could give many more examples of the way their kids were actively held down in gen ed, and even in AL, but the political climate in this district is indeed against too much academic achievement. ... I don't think people would say they want kids to do poorly, but I do think they would say 1) high achiever's higher test scores are evidence that we are giving too many resources to them and should focus more on the bottom half (I disagree and think those high test scores are generally in spite of the district, who owes them much more in terms of learning opportunities. Not more resources, but the ability to move ahead if ready) and 2)it is more important that children be in the same place when they move to the next grade than that they learn something new. I find that statement actually odious, because I believe we should not treat children like completely fungible blocks, and should be able to meet children where they are, but there you go. Please discuss further here. Update: Charlie Mas started a related thread over on the Seattle Schools Community Blog, "Troubling Talk", in which he writes, "Most troubling were the number of people who think the solution is to discontinue honors classes ... Ending service for students working beyond grade level will not help students working below grade level." Friday, May 2, 2014 As other parents mentioned, the big surprise probably is the percentage of all middle school students that are in APP (9.7%), which leaves people wondering why that is and what that might mean for high school. Please discuss that and other thoughts on the numbers here in this thread.
2024-07-19T01:27:04.277712
https://example.com/article/3346
Introduction {#s1} ============ Increasing evidence has indicated up-regulated type I interferon (IFN) signaling in many tumors. For example, transcriptional profiling studies of invasive squamous cell carcinoma of the skin have demonstrated elevated expression of IFN-regulated genes [@pone.0024291-Wenzel1]. Enhanced IFN signaling has also been suggested in a proteomic study of oral squamous cell carcinoma [@pone.0024291-Chi1]. Most notably, ISG15 (interferon-stimulated gene 15), has been shown to be a new tumor marker for many cancers [@pone.0024291-Andersen1]. ISG15, whose expression is controlled by type I interferons, is an ubiquitin-like protein (UBL). Unlike ubiquitin whose expression is more or less constant in all cells, ISG15, which is undetectable in most normal tissues [@pone.0024291-Desai1], is highly expressed, albeit with a high degree of heterogeneity, in both tumor cell lines and tumor biopsies. For example, among a panel of breast cancer cell lines, ISG15 is highly expressed in ZR-75-1 and MDA-MB-231, but not in BT-474 cells [@pone.0024291-Desai1]. In addition, studies of biopsy samples have demonstrated that ISG15 is highly elevated and variably expressed in endometrium tumors, but non-detectable in their normal counterpart tissues [@pone.0024291-Desai1]. Similar analysis has also revealed highly elevated expression of ISG15 in bladder, prostate and oral cancers [@pone.0024291-Chi1], [@pone.0024291-Andersen2], [@pone.0024291-Kiessling1]. Transcriptomic dissection of the head and neck/oral squamous cell carcinoma (HNOSCC) has also identified the ISG15 gene as an up-regulated gene [@pone.0024291-Ye1]. Furthermore, elevated ISG15 expression in bladder cancers shows a positive correlation with the stages of the disease [@pone.0024291-Andersen2]. Significantly, ISG15 has been shown to be a prognostic marker for breast cancer [@pone.0024291-Bektas1]. Elevated ISG15 expression in various tumors suggests up-regulation of type I IFN signaling in these tumors. However, the molecular basis for ISG15 overexpression and activated IFN signaling in tumors remains unclear. One possibility is that elevated expression of ISG15 and hence increased IFN signaling in tumors is linked to oncogene activation. Oncogenes, such as Ras, are known to cause cellular transformation (e.g. morphological changes and anchorage-independent growth) and play a key role in tumorigenesis [@pone.0024291-Karnoub1]. More recently, the involvement of Ras in cancer invasion and metastasis has also been suggested through studies of oncogene-induced epithelial-mesenchymal transition (oncogenic EMT) in several model systems [@pone.0024291-Thiery1], [@pone.0024291-Campbell1]. Tumor cells also appear to acquire EMT characteristics during tumor invasion and metastasis, and many EMT markers such as Snail (a transcription factor) and E-cadherin are known to be dysregulated in metastatic tumors [@pone.0024291-Cano1], [@pone.0024291-Hajra1], [@pone.0024291-Dorudi1], [@pone.0024291-Kowalski1]. In the current studies, we show that oncogenic Ras induces elevated ISG15 expression in human mammary epithelial MCF-10A cells due to IFN-β signaling. Furthermore, we show that IFN-β signaling through ISG15 contributes positively to Ras transformation and oncogenic EMT in MCF-10A cells, supporting the notion that oncogene-induced cytokines play important roles in oncogene transformation. Results {#s2} ======= ISG15 overexpression in breast cancer ZR-75-1 cells is due to elevated IFN-β signaling {#s2a} -------------------------------------------------------------------------------------- Previous studies have demonstrated that ISG15 is highly, but variably, overexpressed in tumor tissues and tumor cell lines [@pone.0024291-Andersen1], [@pone.0024291-Desai1]. As shown in [Fig. 1A](#pone-0024291-g001){ref-type="fig"}, ISG15 is variably expressed in three breast cancer cell lines, with ISG15 expression being the highest in ZR-75-1 as compared to BT474 and T47D. The following observations suggest that ISG15 overexpression in ZR-75-1 cells is due to elevated interferon-β signaling: (1) We found that the ISG15 level (normalized to α-tubulin) in breast cancer ZR-75-1 cells increased with increasing culturing time ([Fig. 1B](#pone-0024291-g001){ref-type="fig"}). The possibility that a cytokine is involved is further suggested from the experiment that the conditioned media from (three-day) cultured ZR-75-1 cells, but not BT474 or T47D cells, were able to elevate ISG15 expression in freshly seeded ZR-75-1 cells ([Fig. 1C](#pone-0024291-g001){ref-type="fig"}). (2) Culturing of ZR-75-1 cells in the presence of IFN-β-, but not IFN-α-, neutralizing antibodies strongly reduced ISG15 expression ([Fig. 1D](#pone-0024291-g001){ref-type="fig"}), suggesting that IFN-β is secreted by ZR-75-1 cells and is responsible for elevated ISG15 expression. This notion was further supported by an interferon antiviral assay which showed the presence of IFN-β, but not IFN-α, in the ZR-75-1 cell-conditioned medium ([Fig. 1E](#pone-0024291-g001){ref-type="fig"}). (3) siRNA-mediated knockdown of IFNAR1 \[interferon (alpha, beta and omega) receptor 1\], one of the two chains of the type I IFN receptor, in ZR-75-1 cells resulted in a significant reduction of ISG15 expression ([Fig. 1F](#pone-0024291-g001){ref-type="fig"}), suggesting that interferon signaling through the receptor is involved in ISG15 overexpression in ZR-75-1 cells. In the aggregate, these results suggest that ISG15 overexpression in ZR-75-1 breast cancer cells is due to elevated IFN-β signaling. ![Elevated ISG15 expression in breast cancer cells is due to interferon-β (IFN-β) secretion.\ Breast cancer ZR-75-1, BT474, and T47D cells were used in the current studies. A. ISG15 is overexpressed in ZR-75-1 cells as compared to BT474 and T47 D cells. Steady-state levels of ISG15 were measured by immunoblotting using anti-ISG15 antibodies. B. Time-dependent increase in ISG15 expression in cultured ZR-75-1 cells. Breast cancer ZR-75-1 cells were harvested at different time intervals after seeding, and cell lysates were analyzed by immunoblotting with anti-ISG15 antibodies. C. Conditioned media from cultured ZR-75-1 cells stimulate ISG15 expression. Breast cancer ZR-75-1, BT474, and T47D cells were seeded at equal density and cultured for 3 days. Conditioned media were collected individually and filtered through 0.2 µm Corning syringe filters. The newly (16 hrs) seeded ZR-75-1 cells were then replenished with the conditioned media. Lysates were collected 3 days later and analyzed by immunoblotting with anti-ISG15 antibodies. D. Antibody neutralization of IFN-β inhibits ISG15 expression in tumor cells. ZR-75-1 cells were cultured for 3 days in the presence of neutralizing antibodies against human IFN-α or human IFN-β (100 NU/ml). Cell lysates were immunoblotted with anti-ISG15 antibodies. E. Elevated IFN-β is present in the conditioned medium from ZR-75-1 cells. Conditioned media from different breast cancer cells, ZR-75-1, BT474, and T47D were individually collected after 3 days of culturing. The media were assayed for IFN-α and IFN-β using the interferon antiviral assay as described in [Materials and Methods](#s4){ref-type="sec"}. F. The interferon receptor is required for elevated ISG15 expression in ZR-75-1 cells. Breast cancer ZR-75-1 cells were transiently transfected with control or IFNAR1 siRNA. Cell lysates were collected 72 hrs post-transfection and immunoblotted with anti-ISG15 antibodies.](pone.0024291.g001){#pone-0024291-g001} Src and Ras oncogenes stimulate ISG15 expression in cultured mammalian cells {#s2b} ---------------------------------------------------------------------------- In order to determine the molecular basis for ISG15 up-regulation in tumor cells, we have evaluated the effect of oncogenes on ISG15 expression in cultured mammalian cells. Temperature-sensitive viral Src (ts-v-Src)-transformed rat intestinal epithelial (RIE) cells were used to determine the effect of the Src oncogene on ISG15 expression. At the permissive temperature (35°C), ts-v-Src cells, which are known to maintain its Src kinase activity and transformation phenotype [@pone.0024291-Nguyen1], expressed a high level of ISG15 as compared to untransformed RIE cells ([Fig. 2A](#pone-0024291-g002){ref-type="fig"}). In addition, at the non-permissive temperature (41°C), ts-v-Src cells expressed a lower level of ISG15, similar to that of the untransformed RIE cells ([Fig. 2A](#pone-0024291-g002){ref-type="fig"}). These results suggest that ISG15 overexpression could be linked to oncogene activation. ![Oncogenic Ras elevates ISG15 expression.\ A. v-Src induces ISG15 expression in rat intestinal epithelial (RIE) cells. The RIE cell line and its ts-v-Src-transformed variant were cultured at different temperatures (35°C and 41°C) for 3 days. Lysates were analyzed by immunoblotting using anti-ISG15 antibodies. B. Oncogenic Ras induces ISG15 expression in transiently transfected NIH 3T3 cells. Murine fibroblast NIH 3T3 cells were transiently transfected with the vector or v-Ha-Ras plasmid using Polyfect (Qiagen) following the manufacturer\'s instructions. Cell lysates were collected 2 days post-transfection and immunoblotted with anti-ISG15 antibodies. C. Elevated ISG15 expression in oncogenic Ras-transformed NIH 3T3 cells. Oncogenic v-Ha-Ras-transformed and control NIH 3T3 cells were cultured for 2 days. Cell lysates were immunoblotted with anti-ISG15 antibodies. D. Elevated ISG15 expression in the H-Ras transformed MCF-10AT cell line. Cells were seeded equally and harvested 2 days later. Lysates were immunoblotted with anti-ISG15 antibodies. E. Transient transfection with Ras oncogenes (H-RasR12 and K-RasV12) induces ISG15 in mammary epithelial cells. Human mammary epithelial MCF-10A cells were transiently transfected with oncogenic Ras-expressing plasmids using FuGene (Roche) as described in [Materials and Methods](#s4){ref-type="sec"}. Two days post-transfection, cell lysates were immunoblotted with anti-ISG15 antibodies. F. Oncogenic Ras-transformed mammary epithelial MCF10A cells overexpress ISG15. The oncogenic Ras-transformed MCF-10A (10A/H-Ras and 10A/K-Ras) were established as described in [Materials and Methods](#s4){ref-type="sec"}. Culturing conditions and Western blotting were performed as described in D.](pone.0024291.g002){#pone-0024291-g002} To further test whether Ras may up-regulate ISG15, NIH 3T3 cells were transiently transfected with either the control vector (pMV-7) or the v-Ha-Ras expression vector (pv-Ha-Ras). As shown in [Fig. 2B](#pone-0024291-g002){ref-type="fig"}, ISG15 is greatly elevated in v-Ha-Ras-transfected NIH 3T3 cells as compared to vector-transfected control cells. In support of the transient transfection results, NIH 3T3 cells stably transfected with v-Ha-Ras (v-Ras) expressed a much higher level of ISG15 as compared to NIH 3T3 control cells ([Fig. 2C](#pone-0024291-g002){ref-type="fig"}). Furthermore, a similar study was performed using human mammary epithelial MCF-10A cells. As shown in [Fig. 2E](#pone-0024291-g002){ref-type="fig"}, MCF-10A cells transiently transfected with either *H-RasR12* (expressing activated H-Ras) or *K-RasV12* (expressing activated K-Ras) expressed higher ISG15 levels as compared to MCF-10A cells transfected with the control vector (pCEV29). Consistent with the transient transfection results, MCF-10A cells stably transfected with either *H-RasR12* (designated 10A/H-Ras cells) or *K-RasV12* (designated 10A/K-Ras cells) expressed much higher levels of ISG15 as compared to MCF-10A cells stably transfected with the control vector pCEV29 (designated 10A/Ct) ([Fig. 2F](#pone-0024291-g002){ref-type="fig"}). In addition, elevated ISG15 expression was also demonstrated in a well characterized H-Ras-transformed MCF-10A (MCF-10AT) cell line [@pone.0024291-Dawson1] as compared to its untransformed control line (MCF-10A) ([Fig. 2D](#pone-0024291-g002){ref-type="fig"}). Taken together, these results strongly suggest that oncogenic Ras stimulates ISG15 expression. Oncogenic Ras-induced ISG15 overexpression requires IFN-β signaling {#s2c} ------------------------------------------------------------------- As demonstrated in [Fig. 1](#pone-0024291-g001){ref-type="fig"}, overexpression of ISG15 in ZR-75-1 cells is due to elevated IFN-β secretion and activation of the type I IFN signaling. To determine whether Ras-induced ISG15 overexpression is also due to elevated IFN-β signaling, IFN-β and IFNAR1 were silenced by their specific siRNAs in Ras-transformed MCF-10A cells (10A/H-Ras and 10A/K-Ras). As shown in [Fig. 3](#pone-0024291-g003){ref-type="fig"}, knocking down either IFN-β ([Fig. 3A](#pone-0024291-g003){ref-type="fig"}) or IFNAR1 ([Fig. 3B](#pone-0024291-g003){ref-type="fig"}) in oncogenic Ras-(H-Ras- or K-Ras-) transformed cells resulted in decreased expression of ISG15. These results suggest that elevated IFN-β signaling is responsible for ISG15 overexpression in oncogenic Ras-transformed MCF-10A cells. ![Identification of the effectors for ISG15 induction in the Ras-dependent signaling pathway.\ A, B. siRNA knock-down of interferon-β and the type I IFN receptor reduces ISG15 induction in the Ras-dependent signaling pathway. The oncogenic Ras-transformed MCF-10A cells (10A/H-Ras and 10A/K-Ras) were transiently transfected with control, IFN-β or IFNAR1 siRNA. Cell lysates were collected 72 hrs post-transfection and immunoblotted with anti-ISG15 and anti-IFNAR1 antibodies. C. The PI3K inhibitor reduces ISG15 expression in oncogenic Ras-transformed cells. 10A/H-Ras and 10A/K-Ras cells were treated with 20 µM LY294002, a PI3K inhibitor, for 3 days. Lysates with equal protein amount were immunoblotted with anti-ISG15 antibodies (L: LY294002). D. The NF-κB inhibitor reduces ISG15 expression in oncogenic Ras-transformed cells. 10A/H-Ras and 10A/K-Ras cells were seeded and cultured overnight. Cells were then treated with or without 40 µM Bay 11-7085, an NF-κB inhibitor, for 24 hrs. Cell lysates were analyzed by immunoblotting using anti-ISG15, phospho-IκBα, and IκBα antibodies.](pone.0024291.g003){#pone-0024291-g003} In addition to the involvement of IFN-β and IFNAR1, the Ras downstream signals necessary for ISG15 overexpression was also investigated using specific inhibitors. Oncogenic Ras-transformed MCF-10A cells were treated with LY294002, a PI3K inhibitor. Interestingly, the ISG15 level was reduced by the PI3K inhibitor (labeled L) in both Ras-transformed lines ([Fig. 3C](#pone-0024291-g003){ref-type="fig"}), suggesting that the PI3K signaling pathway is involved in ISG15 induction in Ras-transformed MCF-10A cells. Since NF-κB is known to regulate IFN-β expression through its binding to the IFN-β promoter, we also investigated the possible involvement of NF-κB in Ras-induced ISG15 overexpression [@pone.0024291-Lenardo1]. As shown in [Fig. 3D](#pone-0024291-g003){ref-type="fig"}, treatment of both H- and K-Ras-transformed MCF-10A cells with the NF-κB inhibitor, Bay 11-7085, resulted in significant reduction of the ISG15 level, suggesting a possible involvement of NF-κB in Ras-induced ISG15 overexpression in MCF-10A cells. Together, these results suggest that PI3K and NF-κB are potential Ras downstream signals necessary for ISG15 overexpression in Ras-transformed MCF-10A cells. IFN-β signaling modulates Ras transformation in MCF-10A cells {#s2d} ------------------------------------------------------------- Ras transformation is known to result in major cell morphology changes and anchorage-independent growth [@pone.0024291-Karnoub1]. To investigate a possible role of IFN-β signaling in Ras transformation, we transiently knocked down IFN-β, IFNAR1 or ISG15, and monitored cellular morphology and colony formation (in both attached and suspended conditions) in K-Ras-transformed MCF-10A cells (10A/K-Ras). As shown in [Fig. 4A](#pone-0024291-g004){ref-type="fig"}, the percentage of spindle-shaped cells in 10A/K-Ras population was around 45% as compared to 5% in 10A/Ct population. The percentage of spindle-shaped cells was reduced to 13, 15, and 22% when IFN-β, IFNAR1 and ISG15 were knocked down by their respective siRNAs in 10A/K-Ras cells. By contrast, the percentage of spindle-shaped cells of control siRNA-transfected 10A/K-Ras cells was nearly unchanged (43%), suggesting that the cell morphology change upon Ras transformation is dependent on IFN-β, IFNAR1 and ISG15. To determine if IFN-β signaling may contribute to anchorage-independent growth in Ras-transformed MCF-10A cells, soft agar colony formation assay was performed. As shown in [Fig. 4B](#pone-0024291-g004){ref-type="fig"}, 10A/K-Ras cells formed about 11 times more colonies in soft agar than 10A/Ct cells. However, siRNA-mediated knockdown of IFN-β, IFNAR1 or ISG15 reduced the colony formation efficiency of 10A/K-Ras cells to 50-70% ([Fig. 4B](#pone-0024291-g004){ref-type="fig"}). We also performed the colony formation assay on plastic surfaces. As shown in [Fig. 4C](#pone-0024291-g004){ref-type="fig"}, sparsely seeded 10A/K-Ras cells clearly formed more colonies than 10A/Ct cells (about 4-fold difference). The colony formation efficiency was reduced to about 70% when IFN-β, IFNAR1 or ISG15 was knocked down in 10A/K-Ras cells. All results are statistically significant (p-value \<0.05, marked by \*) with the possible exception of the IFNAR1 knockdown result (p-value = 0.07) in soft agar assay ([Fig. 4B](#pone-0024291-g004){ref-type="fig"}). These results suggest that IFN-β signaling contributes significantly to Ras-transformation in MCF-10A cells. ![IFN-β autocrine signaling through ISG15 contributes to Ras transformation.\ A. Oncogenic Ras-induced morphological changes are reversed by siRNA-mediated knockdown of IFN-β, IFNAR1 or ISG15. 10A/K-Ras cells were transiently transfected with control, IFN-β, IFNAR1 or ISG15 siRNA. Images of cell morphology were taken three days later. Some of the cells with spindle-shaped morphology are indicated by arrows in 10A/K-ras cells treated with (third panel) and without (second panel) control siRNA (Ct. siRNA). Percentages of spindle-shaped cells (based on counting of 50 cells per field in three randomly selected fields) are shown at the bottom of each panel in parenthesis. B. Ras-induced anchorage-independent growth is reduced by knocking down IFN-β, IFNAR1 or ISG15. 10A/K-Ras cells were transiently transfected with different siRNAs. Three days later, cells were used to perform soft agar colony formation assay as described in [Materials and Methods](#s4){ref-type="sec"}. Results (number of colonies in soft agar/well) were averages of triplicates. C. Ras-enhanced colony formation is reversed by knocking down IFN-β, IFNAR1, or ISG15. 10A/K-Ras cells were transiently transfected with different siRNAs. Three days post-transfection, untreated and transfected cells were trypsinized, counted and seeded in 35 mm plates (500 cells/plate) in triplicates per treatment. After culturing for 10 days, colonies were stained with methylene blue and counted. Results (number of colonies/plate) were averages of triplicates (\* indicates p-value \<0.05). All experiments have been repeated once with similar results.](pone.0024291.g004){#pone-0024291-g004} IFN-β signaling contributes to migratory properties of Ras-transformed MCF-10A cells {#s2e} ------------------------------------------------------------------------------------ Ras is known to confer increased cell migration and oncogenic epithelial-mesenchymal transition (EMT), which have been linked to tumor invasion and metastasis [@pone.0024291-Thiery1]. In order to determine a possible role of IFN-β signaling in oncogenic EMT, we have monitored the effect of IFN-β signaling on increased cell migration and appearance of the EMT marker E-cadherin in 10A/K-Ras cells. Cell migration was assessed by a wound healing assay (see [Materials and Methods](#s4){ref-type="sec"}). As shown in [Fig. 5A](#pone-0024291-g005){ref-type="fig"}, the wound area of 10A/Ct cells was reduced to about 40% 12 hrs post-wounding. By contrast, the wound area of 10A/K-Ras was nearly completely closed (reduced to about 6%), suggesting that 10A/K-Ras cells migrate faster than 10A/Ct cells. When IFN-β, IFNAR1 or ISG15 was knocked down by their respective siRNA in 10A/K-Ras cells, the wound area was reduced to the level of the control 10A/Ct cells (about 50%), suggesting that IFN-β signaling contributes positively to increased cell migration in Ras-transformed cells. ![IFN-β autocrine signaling through ISG15 contributes to migratory properties of Ras-transformed MCF-10A cells.\ A. Oncogenic Ras-elevated cell motility is reversed by knocking down IFN-β, IFNAR1, or ISG15. 10A/K-Ras cells were transiently transfected with different siRNA. 24 hrs post-transfection, cells were trypsinized, seeded and cultured overnight to reach 100% confluence, followed by assaying wound healing efficiency as described in [Materials and Methods](#s4){ref-type="sec"}. The percentage of wound area in the viewing fields from 3 different images per treatment is summarized. B. Cellular E-cadherin expression is restored by knocking down IFN-β, IFNAR1 or ISG15 in Ras-transformed cells. 10A/K-Ras cells were transfected with various siRNAs. Two days post-transfection, cells were trypsinized and seeded onto cover slips pre-coated with poly-L-Lysine and fibronectin. After culturing for one day, cells were processed for E-cadherin staining (in red) as described in [Materials and Methods](#s4){ref-type="sec"}. C. IFN-β autocrine signaling through ISG15 modulates E-cadherin in Ras-transformed cells. 10A/Ct and 10A/K-Ras cells were transfected with various siRNAs for 3 days. Cell lysates were immunoblotted with various antibodies.](pone.0024291.g005){#pone-0024291-g005} We have also assessed the effect of IFN-β signaling on the appearance of the key EMT marker E-cadherin in Ras-transformed MCF-10A cells [@pone.0024291-Cano1], [@pone.0024291-VinasCastells1]. As shown in [Fig. 5C, E](#pone-0024291-g005){ref-type="fig"}-cadherin was shown to be down-regulated in 10A/K-Ras cells and silencing of IFN-β, IFNAR1 or ISG15 resulted in significant restoration of the E-cadherin protein level as evidenced by both immunoblotting ([Fig. 5C](#pone-0024291-g005){ref-type="fig"}) and immunofluorescence ([Fig. 5B](#pone-0024291-g005){ref-type="fig"}, note the red E-cadherin staining on cellular surfaces) using anti-E-cadherin antibodies. In the aggregate, these results suggest that IFN-β signaling through ISG15 contributes to the migratory properties of Ras-transformed MCF-10A cells. Discussion {#s3} ========== The demonstration of ISG15 as a tumor marker immediately suggests that the type I IFN signaling pathway may be up-regulated in tumors. Indeed, transcription profiling studies have demonstrated up-regulation of type I IFN-regulated genes in some tumors [@pone.0024291-Wenzel1]. Our current studies have suggested that the increased secretion of IFN-β with subsequent activation of the type I IFN signaling pathway is responsible for ISG15 overexpression in breast cancer ZR-75-1 cells. We have also asked the question whether the elevated ISG15 expression in tumor cells could be due to oncogene activation. Indeed, we have shown that both Src and Ras can stimulate ISG15 expression in tissue culture cells. Using oncogenic Ras-transformed human mammary epithelial MCF-10A cells, we have further demonstrated that oncogenic Ras up-regulates ISG15 due to activation of IFN-β signaling through the type I IFN receptor, IFNAR. In addition to Src and Ras as demonstrated in the current studies, E1A has previously been shown to cause elevated expression of IFN-β and ISG15 in the adenovirus type 5 (Ad5)-transformed rodent cells [@pone.0024291-Nielsch1]. Taken together, these results suggest that oncogenes can up-regulate ISG15 through elevated expression of IFN-β. In our current studies, we have demonstrated for the first time that IFN-β signaling through ISG15 contributes positively to oncogenic transformation (e.g. changes in cell morphology and anchorage-independent growth) in Ras-transformed MCF-10A cells. Our studies have also demonstrated that elevated IFN-β signaling through ISG15 contributes significantly to cell morphology changes, cell migration properties and reduced expression of the EMT marker E-cadherin. Since oncogenic EMT has been suggested to play an important role in tumor invasion and metastasis [@pone.0024291-Thiery1], our results could implicate a role of IFN-β signaling in tumor progression. In our studies, oncogenic Ras appears to stimulate IFN-β expression and secretion through activation of the PI3K/NF-κB pathway. PI3K, which can be directly activated by Ras, is known to control IRF-3, an important transcription factor regulating IFN-β expression [@pone.0024291-Sarkar1]. However, PI3K is also known to activate NF-κB [@pone.0024291-Sizemore1], a transcription factor which is found active in many types of tumors and associated with tumor phenotypes [@pone.0024291-Karin1]. Among different type I IFN genes, the NF-κB binding site is found on the IFN-β, but not the IFN-α, promoter [@pone.0024291-MacDonald1]. Our results thus suggest that active NF-κB may be an important regulator in this oncogene-induced IFN-β signaling. In this regard, it is interesting to point out that oncogenic Ras has been shown to induce IL-6 and IL-8, both of which are NF-κB-regulated genes and shown to promote Ras transformation and tumor growth [@pone.0024291-Matsusaka1], [@pone.0024291-Sparmann1], [@pone.0024291-Grivennikov1]. Interestingly, the type I IFN, IFN-α, has been shown to induce IL-6 in myeloma cells [@pone.0024291-Jourdan1]. It seems likely that the complex interplay among various oncogene-induced cytokines is critical for oncogene transformation and tumorigenesis. Our results, which demonstrate a positive role of type I IFN signaling in oncogene transformation and oncogenic EMT, could suggest therapeutic strategies for cancer treatment by antagonizing the type I IFN signaling pathway in tumor cells. However, type I IFNs are known to suppress tumor growth and IFN-α (i.e. IFN-α2) has been used for the treatment of several cancers [@pone.0024291-Pestka1]. Several possibilities could explain this apparent paradox: (1) The effect of type I IFNs on tumor cell growth could be concentration-dependent. At high concentrations such as those used in IFN therapy, type I IFNs could suppress tumor growth through stimulation of complex immune responses against the tumors (e.g. up-regulation of tumor antigen presentation through MHC class I molecules) and inhibition of tumor cell proliferation [@pone.0024291-Pestka1]. At lower concentrations, IFNs may contrastingly stimulate tumor growth [@pone.0024291-Ludwig1]. Indeed, only low concentrations of type I IFNs have been shown to stimulate the clonogenic tumor growth *in vitro* in a fraction (6-28%) of human tumor samples tested [@pone.0024291-Ludwig1]. Our current results, which demonstrate a positive role of the IFN-β signaling in oncogenic transformation and EMT, are consistent with the growth stimulatory effect of IFNs at lower concentrations. (2) IFN-α and IFN-β may exhibit different or opposite effects on tumor cell growth, despite the fact that they share the same receptor for signaling. Indeed, it has been reported that the gene expression patterns induced by low concentrations of IFN-α and IFN-β overlap but are not identical [@pone.0024291-daSilva1]. In addition, while IFN-α is used for cancer therapy, IFN-β is used for treatment of multiple sclerosis [@pone.0024291-Yong1]. (3) The effect of type I IFNs on tumor cell growth could be dictated by the genetic makeup of the tumor cells. It is well known that tumor cells can develop various immune escape mechanisms through mutations, including MHC class I deficiencies, to escape from IFN-mediated immune suppression [@pone.0024291-GarciaLora1]. For example, MHC class I deficiencies (e.g. mutations of the HLA genes and defects in the components of the antigen processing machinery) occur at near 100% frequency in some types of tumors [@pone.0024291-GarciaLora1]. It seems possible that tumor cells may also adopt different mechanisms to escape the growth inhibitory activities of type I IFNs (e.g. BT474 cells, which do not express detectable ISG15, could have inactivated the IFN signaling pathway through mutations to escape either the immune suppressive or the growth-inhibitory activities of IFNs). Consequently, many tumors may have escaped the growth suppressive activities of type I IFNs, but retain their dependence on type I IFNs for anchorage-independent growth and metastasis. It is also important to point out that the activities of type I IFN signaling may also involve modulations by the complex cytokine network in the tumor microenvironment. Clearly, further studies are necessary to clarify the role of type I IFN signaling in tumorigenesis. Materials and Methods {#s4} ===================== Cells and cell culture {#s4a} ---------------------- ZR-75-1, BT474 and T47D cells [@pone.0024291-Desai1], [@pone.0024291-Keydar1] were cultured in RPMI supplemented with 10% Fetalplex (Gemini Bio-Products, West Sacramento, CA, USA), L-glutamine (2 mM), penicillin (100 units/ml) and streptomycin (100 µg/ml) in a 37°C incubator with 5% CO~2~. RIE, ts-v-Src transformed RIE, NIH 3T3, and v-Ras-transformed NIH 3T3 cells were cultured similarly except using DMEM instead of RPMI. MCF-10A and MCF-10AT cells were cultured in Advanced DMEM/F12 (Invitrogen, Carlsbad, CA, USA) supplemented with 5% equine serum (Invitrogen), 20 ng/ml recombinant human EGF (Invitrogen), 10 µg/ml insulin (Sigma, St. Louis, MO, USA), 0.5 µg/ml hydrocortisone (Sigma), 100 ng/ml cholera toxin (Sigma), L-glutamine (2 mM), penicillin (100 units/ml) and streptomycin (100 µg/ml) in a 37°C incubator with 5% CO~2~. Immunoblotting {#s4b} -------------- Cells with various treatments were lysed with 6X sample buffer. After boiling for 10 min, cell lysates were analyzed by SDS-PAGE followed by immunoblotting with the appropriate antibody. The following antibodies were used: IFNAR1 (ab45172; Abcam, Cambridge, MA, USA), E-cadherin (\#3195; Cell Signaling Technology), IκBα (\#4814; Cell Signaling Technology), phospho-IκBα (\#9246; Cell Signaling Technology) and β-actin (\#4970; Cell Signaling Technology). Visualization of bands was performed using SuperSignal West Pico Chemiluminescent Substrate (Pierce, Rockford, IL, USA) and Kodak Image Station 2000R. Interferon antiviral assay {#s4c} -------------------------- Antiviral assays were performed as previously described [@pone.0024291-Rubinstein1]. In brief, MDBK (for determining the concentration of IFN-α) or A549 cells (for determining the combined concentration of IFN-α and IFN-β) were plated in 96-well plates containing 2-fold serial-diluted laboratory standard IFN-α, or IFN-β, or conditioned media from different cancer cells. VSV (vesicular stomatitis virus) and EMCV (encephalomyocarditis virus) were later added into MDBK and A549 cells, respectively. When cells in wells containing no interferon were lysed by virus, plates were drained and stained with crystal violet to visualize live cells. Interferon concentrations were determined by comparing results to laboratory standard IFNs. siRNA knockdown {#s4d} --------------- siRNA against IFN-β (s7189, Ambion, Austin, TX, USA), IFNAR1 (s783, Ambion), ISG15 (s228517, Ambion), and control siRNA (SIC001, Sigma) were transfected into cells using Oligofectamine transfection reagent (Invitrogen). The specific conditions for each knockdown experiment are described in the figure legends. Construction of transformed MCF-10A cells {#s4e} ----------------------------------------- MCF-10A cells were transfected with control vector (pCEV29), oncogenic H-Ras (pCEV29-H-RasR12) and oncogenic K-Ras (pCEV29-K-RasV12) expressing vectors using FuGene transfection reagent (Roche) to create 10A/Ct, 10A/H-Ras and 10A/K-Ras cells, respectively. Three days post transfection, cells were replenished with 800 µg/ml G-418 (Invitrogen)-containing fresh medium, and repeated passages were performed in the same media until cells became resistant to G-418. Soft agar colony formation assay {#s4f} -------------------------------- Cells (3×10^3^) were seeded in 2 ml of 0.35% agar (Sigma) supplemented with complete MCF-10A medium. This suspension was layered over 2 ml of 0.6% agar-medium base in each well of a 6-well plate. 2 ml of complete medium was added after the agar was solidified. Cells were replenished with fresh media every week for 3 weeks, followed by staining with 1 mg/ml p-Iodonitrotetrazolium violet. Colonies larger than 0.2 mm in diameter were counted using MiniCount (Imaging Products International). Wound healing assay {#s4g} ------------------- 10A/Ct and 10A/K-Ras cells were transfected with various siRNAs. 24 hrs post-transfection, transfected cells were seeded at a density of 1.3×10^6^ cells/35 mm plate. After another 24 hrs, cells were replenished with 1 µg/ml mitomycin C (Sigma)-containing fresh media. The wound was created by scratching cells with pipette tips (200 µl tips). Images of wound areas were taken at 0 and 12 hr after scratching. Analysis of the wound area (expressed in percentage of the total imaged area) was performed using the ImageJ program. Immunofluorescence and confocal microscopy {#s4h} ------------------------------------------ Various MCF-10A cells were transfected with and without siRNAs (as indicated in the figures) for 48 hrs. Transfected cells were then plated onto poly-L-Lysine- and fibronectin-coated coverslips. 24 hrs after seeding, cells were fixed at room temperature for 10 min in phosphate-buffered saline (pH 7.4) with 4% paraformaldehyde (Electron Microscopy Sciences, Hatfield, PA, USA) and permeabilized in phosphate-buffered saline with 0.2% Triton X-100 (Fisher Scientific, Waltham, MA, USA) followed by treatment with 10% BSA in phosphate-buffered saline for 1 hr. Primary (rabbit) antibodies against E-cadherin were incubated with samples for 8 hrs followed by incubation with a secondary antibody (Cy3 goat antibody against rabbit IgG) (Jackson ImmunoResearch Laboratories, West Grove, PA, USA). The images were captured using a Zeiss LSM 410 confocal microscope with a 568-nm excitation wavelength and a 610-nm band pass emission filter. The pinhole size used was 30 Airy Units, and the contrast/brightness settings were kept the same for all images. We are grateful to Dr. Andrew Chan (Medical College of Wisconsin) for providing us with the plasmids, pCEV29, pCEV29-H-RasR12 and pCEV29-K-RasV12. **Competing Interests:**The authors have declared that no competing interests exist. **Funding:**This work was supported by NIH grants RO1-CA39662 (LFL) and GM080753 (LWR). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. [^1]: Conceived and designed the experiments: Y-CT LFL L-HW. Performed the experiments: Y-CT SP LWR. Analyzed the data: Y-CT. Contributed reagents/materials/analysis tools: SP. Wrote the paper: Y-CT LFL. Discussion: SW YLL.
2024-07-24T01:27:04.277712
https://example.com/article/2160
// Copyright 2018 The gVisor Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package pipe import ( "io" "gvisor.dev/gvisor/pkg/context" "gvisor.dev/gvisor/pkg/sentry/arch" "gvisor.dev/gvisor/pkg/sentry/fs" "gvisor.dev/gvisor/pkg/sentry/fs/fsutil" "gvisor.dev/gvisor/pkg/usermem" ) // ReaderWriter satisfies the FileOperations interface and services both // read and write requests. This should only be used directly for named pipes. // pipe(2) and pipe2(2) only support unidirectional pipes and should use // either pipe.Reader or pipe.Writer. // // +stateify savable type ReaderWriter struct { fsutil.FilePipeSeek `state:"nosave"` fsutil.FileNotDirReaddir `state:"nosave"` fsutil.FileNoFsync `state:"nosave"` fsutil.FileNoMMap `state:"nosave"` fsutil.FileNoSplice `state:"nosave"` fsutil.FileNoopFlush `state:"nosave"` fsutil.FileUseInodeUnstableAttr `state:"nosave"` *Pipe } // Read implements fs.FileOperations.Read. func (rw *ReaderWriter) Read(ctx context.Context, _ *fs.File, dst usermem.IOSequence, _ int64) (int64, error) { return rw.Pipe.Read(ctx, dst) } // WriteTo implements fs.FileOperations.WriteTo. func (rw *ReaderWriter) WriteTo(ctx context.Context, _ *fs.File, w io.Writer, count int64, dup bool) (int64, error) { return rw.Pipe.WriteTo(ctx, w, count, dup) } // Write implements fs.FileOperations.Write. func (rw *ReaderWriter) Write(ctx context.Context, _ *fs.File, src usermem.IOSequence, _ int64) (int64, error) { return rw.Pipe.Write(ctx, src) } // ReadFrom implements fs.FileOperations.WriteTo. func (rw *ReaderWriter) ReadFrom(ctx context.Context, _ *fs.File, r io.Reader, count int64) (int64, error) { return rw.Pipe.ReadFrom(ctx, r, count) } // Ioctl implements fs.FileOperations.Ioctl. func (rw *ReaderWriter) Ioctl(ctx context.Context, _ *fs.File, io usermem.IO, args arch.SyscallArguments) (uintptr, error) { return rw.Pipe.Ioctl(ctx, io, args) }
2024-02-09T01:27:04.277712
https://example.com/article/5268
Languages Bangladesh: Blasphemy, Genocide and Violence Against Women: the case of Bangladesh Source: WLUML When Malala Yousafzai and her companions were shot by the Taliban, the whole of Pakistan expressed outrage. The attack on a young girl fighting for her right to education was shocking to many Pakistanis. What was unusual about this event was, unfortunately, not the targeting of girls, but the fact that there was a national outcry. No such outrage was expressed when Asia Bibi, a poor Christian woman was charged with blasphemy. Asia Bibi is facing the death penalty and there are fears for her safety even if she were acquitted and released, as people charged with blasphemy are often killed or may ‘die’ in custody. They are not only being persecuted by the State but are at grave risk, even while they are in the custody of the state[1]. No-one has yet been brought to justice for the death of the former Prime Minister, Benazir Bhutto, although she herself, had named suspects in the Taliban and clearly predicted that her death would be the result not only of ‘non-state’ fundamentalist forces, but of those in the Pakistani establishment who wanted to get rid of her[2]. What is the link between the complete impunity for the deliberate targeting of women at all levels of Pakistani society, and the trials of alleged war criminals going on today in Bangladesh? The link is the forgotten genocide committed in Bangladesh in 1971. Appeals to violence in the name of religion were a central feature of this conflict as was the systematic targeting and mass rape of women. A military strategy to counter an armed uprising involved the mass murder, impregnation and forced pregnancies of unarmed civilians. But intertwined with it, was a fundamentalist strategy which involved not only fighting for Pakistan but turning it into an Islamist state, while attacking religious minorities and all who were not ‘good’ Muslims. Women, were attacked as professionals, as activists and simply for being women – particularly if they were from religious minorities. Unlike Bangladesh, which is attempting to make good on an election promise to hold war crimes trials, Pakistan reneged on its promise to try its own military for war crimes, even though a Commission of Inquiry recommended that officers should be tried[3]. Instead of containing them, military and civilian leaders have made deals with fundamentalists, and sometimes with the support or acquiescence of Western powers, enormously increased their power. In openDemocracy recently, I argued that Bangladesh was the forgotten template for 20th century war. Long before the killings and mass rape that took place in former Yugoslavia and Rwanda, Bangladesh showed what happens when militias allied to the army are involved in a conflict[4]. Although contemporary witnesses, including a number of US diplomats[5] were convinced that they were witnessing genocide[6] – that is the deliberate destruction of a national, ethnic, racial or religious group; by the twenty first century, the conflict in Bangladesh had largely disappeared from international concern. A BBC website defining genocide, for instance, failed to include Bangladesh even among a list of possible genocidal campaigns. Since 1972, not a single human rights organisation has done any investigation of the conflict, although they have been harsh in their comments about the establishment of an international crimes tribunal to try alleged war criminals. The Pakistan military, one of the chief perpetrators of the conflict, is out of reach of the Bangladeshi authorities. Nine men have been charged and numerous others, including at least two men resident in Western countries, are being investigated. All those charged are Bengalis. They are opposition leaders mostly of the Jamaat e Islami, a transnational fundamentalist political party, allied to the Muslim Brotherhood and often seen by Western governments as ‘moderate Islamists’. In Pakistan, in Britain and in the US, those accused of grave crimes enjoy almost complete impunity[7]. It is only in Bangladesh that there is an attempt at holding them accountable. A mass movement, conducted almost entirely by survivors of the genocide, and energised by a new generation of younger activists, made the trial of alleged war criminals a major issue in the last elections. As Sara Hossain and Bina D’Costa have explained, in their thoughtful discussion of redress for crimes of sexual violence[8], women such as Jahanara Imam[9] were the leading figures in the people’s movement for accountability. Jahanara was a ‘mother’ of the liberation war, like Sufia Kamal[10] whose long career as a writer stretched back to the great Hindu and Muslim writers of Bengali literature – Rabindranath Tagore, Kazi Nazrul Islam and the science fiction writer Roqiaya Sakhawat Hossain. Bengali nationalism grew out of a cultural movement for language and secular identity, in which women were prominent actors. In March 1971, the military in West Pakistan decided on a military crackdown to avoid accepting the results of the elections which would have made the Bengali leader of the Awami League, Sheikh Mujibur Rahman, the Prime Minister of both East Pakistan ( as Bangladesh was known) and West Pakistan. During the course of the conflict, they were politically and militarily supported by the Jamaat e Islami, whose leader Golam Azam is alleged to have incited violence and whose student wing are alleged to have formed the basis for paramilitary death squads. Both the military and their fundamentalist allies carried out actions which could be construed as genocidal in intent. There was a convergence of aims but they were carried out for somewhat different reasons. The Pakistan army, targeted Hindus and other minorities for killing, with large numbers of women raped and forcibly impregnated. Hindus were seen as outside the nation of Pakistan. They were depicted as part of the enemy nation, India, and therefore a legitimate target. West Pakistani soldiers also displayed racialised attitudes to Bengalis, similar to the intra- Muslim conflict seen more recently in Darfur. But there is another aspect to the atrocities and that is the attempt to depict Bengali Muslims as not proper Muslims. General Yahya Khan was said to have said of Bengalis, ‘Make them Muslims’- when he landed in Dhaka. This is interpreted by some as one of the bases for sexual slavery, mass rape and forcible pregnancy. His project would have been given ideological ballast by fundamentalists who hated the common practices of Bengali Islam because it rejoiced in a traditional syncretic culture, fusing the antinomian traditions of Sufi- Bhakti – the devotional aspects of Muslim, Hindu and Buddhist traditions. For fundamentalists, this traditional form of religion, is itself blasphemous and may be tantamount to apostasy. The modern culture of Bengal was also considered un-Islamic. At a filmed meeting of the Centre for Secular Space[11] in London, Asif Munier, son of the playwright, Munier Chowdhury[12], described his father, who had protested against the banning of Tagore, being picked up by masked men, just two nights before the surrender of the Pakistani army. Knowing they were going to lose the war, Islamist death squads travelled around Dhaka picking up journalists, academics, writers, doctors and others, in an incident known as the ‘killing of the intellectuals’. Among those killed was Selina Parvin, a single mother and journalist, whose mutilated body was found in the killing fields of Rayer Bazzar[13]. A survivor of one of the torture centres, described hearing men being tortured for their love of Tagore. Although, US Ambassador Rapp, has argued that only the killings of Hindus might amount to genocide,( as others might fall under the category of political killings), I believe that this view, does not do justice, to the comprehensive assault that was mounted on all Bengalis as a national, ethnic and religious group. It does not take into account the specific ways in which religion was used to shape the targeting of individuals who are born Muslim but refuse to live by fundamentalist tenets. In the case of Malala in Pakistan, the Taliban justified itself by stating, that it was “not just allowed … but obligatory in Islam” to kill such a person involved “in leading a campaign against Shariah and (who) tries to involve a whole community in such campaigns, and that personality becomes a symbol of anti-Shariah campaign.[14]” Note the language of obligation that is used by the Taliban, creating a ‘duty’ to kill. The intellectuals and many thousands of less well known Bengalis were killed simply because by standing for an independent Bangladesh, they were a symbol of an ‘anti-Shariah campaign’. At the time of the conflict, in Bangladesh, it was not simply military orders but fatwas and incitement through the media, which were the means by which killing was justified. Dr Ghayasuddin Siddiqui, a Muslim reformer, who was formerly in the Pakistani student wing of the Jamaat e Islami, told the Centre for Secular Space meeting that he had been trained both to mobilise and disrupt. He agreed that the designation of someone as ‘kuffr’ an infidel or as an apostate, could result in targeting them. Though he has now moved to supporting secular values, he was closely involved in advocating for the fatwa on Rushdie and worked with Choudhury Muenuddin[15], a prominent British Muslim. David Bergman and I investigated him in a film called ‘The War Crimes File’[16], for his involvement with death squads. Whether operating through the law – by making blasphemy a crime punishable by death ( as has happened in Pakistan)[17] or by extra-judicial executions, and illegal fatwas, the blasphemy threat against writers, artists, avowed apostates and the poor and marginalised alike, is key to understanding grave crimes such as genocide as well as violence against women ( particularly activists). A determination of genocide does not rest simply on the acts of violence committed but on the intent behind the acts. Intent to destroy a community may be determined by military orders, but fatwas and other religiously backed declarations which treat infidels and apostates as legitimate targets are also relevant. They need much more examination in genocide studies. In the context of severe threat, it is remarkable that Bangladeshi women, some of whom were themselves survivors of violence, have spoken out about their experiences and helped to develop the international legal concept of sexual slavery. Firdausi Priyabhashini, who participated in the Tokyo Tribunal on the case of the comfort women, said, “I saw that the history of Muktijuddho ( liberation war) was being altered and the torture of women were being forgotten, and then I saw rural women coming from the villages to be witnesses at the public court “( a people’s tribunal which was attacked by the then government). I decided from the civil society I will speak up.” “if I speak of my experiences, a space will open up, women will learn how to fight.[18]” [1] Two powerful men who supported Asia Bibi: Salman Taseer, the Governor of Punjab; and Shahbazz Bhatti, Minister for Minorities and the only Christian in the Cabinet; were both assassinated because they raised concerns about her case and Pakistan’s blasphemy law. Salman Taseer’s killer, his own bodyguard, became a national hero and lawyers lined up for the honour of defending him. [5] Cable from U.S. Consul General, Dacca, East Pakistan, to Secretary of State Henry Kissinger (Apr. 6, 1971), which argued that ‘‘genocide was applicable’’ (quoted in Lawrence Lifshultz, Bangladesh, the Unfinished Revolution (1979). The cable, known as the Blood telegram after the brave US diplomat Archer Blood was signed by twenty U.S. diplomats in Pakistan and nine South Asia hands in the State Department. It represented dissent from the US position of support for Pakistan. [6] The genocide convention defines genocide as “ acts committed with the intent to destroy, in whole or in part, a national, ethnic, racial or religious group, as such": [7] As a result of investigations conducted by the Tribunal, the US government has started an investigation into a suspect in Bangladesh http://www.secularvoiceofbangladesh.org/Killar%20Ashrafuzzaman%20Khan.htm [8] Bina D’Costa and Sara Hossain, REDRESS FOR SEXUAL VIOLENCE BEFORE THE INTERNATIONAL CRIMES TRIBUNAL IN BANGLADESH: LESSONS FROM HISTORY,AND HOPES FOR THE FUTURE, Criminal Law Forum (2010) 21:331–359 _ Springer 2010 [18] Rubaiyat Hossain, ‘Trauma of the Women, Trauma of the Nation: a feminist discourse on Izzat, Liberation War Museum, Dhaka Gita Sahgal is a founder of the Centre for Secular Space. She is a writer and journalist on issues of feminism, fundamentalism, and racism, a director of prize-winning documentary films, and a women's rights and human rights activist.
2023-08-18T01:27:04.277712
https://example.com/article/6032
A permanent, epithelializing stent for the treatment of benign prostatic hyperplasia. Preliminary results. Currently, there is much enthusiasm in the urologic community for the development of alternative treatments to transurethral prostatectomy for management of benign prostatic hyperplasia (BPH). At the Mayo Clinic, the role of a permanently implanted intraurethral stent (UroLume Wallstent) is being examined. It is a biocompatible prosthesis made from a "super" alloy that is woven into a tubular mesh. It is both flexible and self-expanding with no elastic recoil; when fully expanded, it has a large internal diameter of 42 Fr (1.4 cm). Twelve patients (mean age = 67 years; range = 62 to 77 years) with obstructive BPH have been treated with this stent. After 3 months, the decrease in the total symptom score was 65% (mean preoperative score, 13.9 +/- 5.2; mean postoperative score, 4.8 +/- 3.7, P less than 0.001), whereas the increase in peak urinary flow rate was 99% (mean preoperative value, 10.1 +/- 3.3 ml/second; mean postoperative value, 20.1 +/- 6.2 ml/second; P less than 0.001). The postvoid residual urine volume decreased by 76% (mean preoperative value, 133 +/- 68 ml; mean postoperative value, 32 +/- 38 ml, P less than 0.001). There has been no difficulty with infection, encrustation, stent erosion, stent migration, incontinence, or potency. Eight patients (67%), however, did have irritative voiding symptoms after stent placement. These untoward effects subsided markedly during the follow-up period. No patient has required either pain or antispasmodic medications, and as of this time, it has not been necessary to remove any stent because of side effects. These results suggest that the intraurethral stent may be a viable treatment option for patients with BPH.(ABSTRACT TRUNCATED AT 250 WORDS)
2024-01-21T01:27:04.277712
https://example.com/article/7783
MicroScope: an integrated platform for the annotation and exploration of microbial gene functions through genomic, pangenomic and metabolic comparative analysis. Large-scale genome sequencing and the increasingly massive use of high-throughput approaches produce a vast amount of new information that completely transforms our understanding of thousands of microbial species. However, despite the development of powerful bioinformatics approaches, full interpretation of the content of these genomes remains a difficult task. Launched in 2005, the MicroScope platform (https://www.genoscope.cns.fr/agc/microscope) has been under continuous development and provides analysis for prokaryotic genome projects together with metabolic network reconstruction and post-genomic experiments allowing users to improve the understanding of gene functions. Here we present new improvements of the MicroScope user interface for genome selection, navigation and expert gene annotation. Automatic functional annotation procedures of the platform have also been updated and we added several new tools for the functional annotation of genes and genomic regions. We finally focus on new tools and pipeline developed to perform comparative analyses on hundreds of genomes based on pangenome graphs. To date, MicroScope contains data for >11 800 microbial genomes, part of which are manually curated and maintained by microbiologists (>4500 personal accounts in September 2019). The platform enables collaborative work in a rich comparative genomic context and improves community-based curation efforts.
2024-02-28T01:27:04.277712
https://example.com/article/9098
Oh My God, Walt Jr., What Are You Doing? Walt Jr. (RJ Mitte) has become a bit of a rebel over the past five seasons of Breaking Bad - as much as one can be while still wearing polos and plaid, anyway. But hey, can we blame him? His dad's a straight up sociopathic meth cook who calls himself Heisenberg, and his mother is going crazy trying to protect him from finding out that his dad is, well, a sociopathic meth cook who calls himself Heisenberg. It's the sort of situation that would stress any kid out to the point of changing his name to Flynn and cursing at his authority figures. A new photoshoot for the NSFW mag Dark Beauty, though, shows a much darker side to Walt Jr.'s rebel phase - complete with full-on rocker attire, leather, chain accessories, and scantily-clad girls fondling him. Has Walt Jr. finally been pushed over the edge? What happened to that sweet boy who just wanted breakfast food and a happy family (but mostly breakfast food)? OK, so the photoshoot is actually Mitte the actor and not Walt Jr. the character, but still - this is just too weird. Check out the photos above, if you dare. Is that eyeliner?!
2023-08-08T01:27:04.277712
https://example.com/article/3414
Using Documentary Film in the Classroom Doc Academy (DA) is an education programme using the power of documentary film and curriculum-based lessons to develop students’ critical and independent thinking. With our help, teachers can discuss some of the most complex and challenging social issues such as climate change and migration in an unbiased and sensitive way. The session’s speaker, Kate Stockings, has used three of the documentaries and lesson plans developed by DA and will showcase the power of documentary film to engage students in discussing and understanding climate change. Across two days, over 250 sessions will take place at the Festival. A full timetable of sessions will be available from late May 2019. Until this point we will only be announcing the day(s) sessions will be taking place.
2024-04-14T01:27:04.277712
https://example.com/article/7937
Kamis, 13 Juni 2013 .... TOO GOOD..TO BE..TRUE..??? >> BUT LET IT CHECK...??? >>....... Tax-Free Income ....... ??? Details below on how YOU could tap into this 100% legal "trick" and turn every $10,000 stake into $220,425.....???>> ...The most incredible thing is you can take your payouts, reinvest them, and you still won't be taxed, no matter how much more you make — EVER! I'm not talking about some type of CD or annuity here, either... The loophole I'm sharing with you today is very different — and far more profitable. In fact, it's crushed stock market favorites like Google and Amazon over the past ten years: ...???>> ...Not one of them could've turned $10,000 into $220,425 — or 22x your money. And none of them would've paid you $18,720 a year on top of those profits. But here's where things get really good....???.>> Collect $3,195 Per Month in GUARANTEED Tax-Free Income Details below on how YOU could tap into this 100% legal "trick" and turn every $10,000 stake into $220,425 Dear Reader, http://www.angelnexus.com/o/web/47075?r=1 On August 5, 1997, a Republican Congress partnered with a Democratic president to pass a powerful (and largely swept-under-the-rug) tax loophole. What they devised makes it possible for people to collect large amounts of extra income without paying a single dime in tax. And now, as more and more sources are reporting on this loophole, the amount of folks who've begun collecting huge amounts of tax-free cash has grown exponentially...They're getting paid hundreds upon hundreds — even thousands — of dollars. And it's ALL completely tax-free. Even better, these untaxed payouts are 100% guaranteed. And you can collect them year-round, like some of the folks I've come across that I'll introduce you to in a moment. Crazy enough, this isn't even the best part... The most incredible thing is you can take your payouts, reinvest them, and you still won't be taxed, no matter how much more you make — EVER! I'm not talking about some type of CD or annuity here, either... The loophole I'm sharing with you today is very different — and far more profitable. In fact, it's crushed stock market favorites like Google and Amazon over the past ten years: It beat out Wal-Mart by a factor of 10: And it makes gold earnings look pretty tiny, too... Had you known about this tax-free secret, you could have already turned every $10,000 stake into a GUARANTEED $220,425 — PLUS you'd be getting $18,720 in annual tax-free income on top of that. And this isn't a one-time deal. You can use this loophole over and over again to bank large sums of guaranteed, tax-free cash for as long as you want. No matter what's happening in the markets (or to the economy), your tax-free income stream will continue to increase. There's no other retirement savings "program" like it on the planet. In my 20 years of market research, I've come across a number of sure-fire ways to stockpile cash...Not one of them could've turned $10,000 into $220,425 — or 22x your money. And none of them would've paid you $18,720 a year on top of those profits. But here's where things get really good... I'm going to show you how to set up your own personal jet stream of tax-free income right now. It takes just a few minutes, there's no approval process, there are no income requirements and no investment minimums (though, of course, the more you have on hand to put into this tax-free loophole, the more guaranteed income you'll be able to collect while you're just starting out). To show you what I mean, let me introduce you to my friend, Bert... $3,195 in Guaranteed, Tax-Free Income Bert Hoff is a native of Seattle, Washington. He learned about this tax loophole just recently, and he began using it without hesitation. Even though he's brand-new to the whole process, Bert's already picking up an extra $800 every few months in guaranteed, tax-free cash. In his first full year, Bert will take in a little more than $3,195. In his second year, he's set to bank upwards of $4k. I realize that may not seem like a mountain of cash... but consider the fact that Bert just began using this loophole — and he invested next to nothing to start with. In ten short years, Bert could be sitting on a six-figure fortune. One that pays him over $10,000 in tax-free income every year. He didn't have to do anything special to earn this extra money. And it's all 100% legal. Like anyone, he's simply using the best strategy he's come across to maximize his retirement investments. Much like my friend Harold Shiels is doing... Harold told me he recently started using this tax-free loophole just a few months ago. His first income payment totaled $319. That adds up to $1,276 in his first year. In a couple of years, his checks could nearly double. And they'll double again a few years after that. In no time at all, both Bert and Harold will have pretty nice nest eggs for themselves... And they're living proof that you don't have to have $100,000 to get started. You can start with whatever you have — even if it's just $100 bucks, it's enough to get you on board with this tax-free loophole. Plus, you can always add more whenever you wish. And today — in less than ten minutes — you'll have the chance to safely join Bert, Harold, and thousands of other investors who are using this tax-free loophole. Just like them, you can use this income secret to collect hundreds (or even thousands) of dollars in tax-free payments every few months. I talk to plenty of individual investors, and it's pretty clear that not much is working on Wall Street these days... The economy is soft, unemployment is still way too high, and the Fed's interest rate policy has pulled the rug out from under traditional retirement investments. That's why I've put this report together: because locking in your own steady, reliable tax-free income stream may be the easiest way to shore up your retirement savings or add cash to your household budget. And like I say, there are no restrictions or waiting periods of any kind. You could be getting your first tax-free payout in as little as 30 days. Where is all this tax-free income coming from? When I share this secret with folks, the first thing most of them want to know is where, exactly, this cash is coming from. Well, the fact is I showed Bert and Harold how they could get started making hundreds and thousands of tax-free dollars by owning a profit share in oil and natural gas wells. The folks who take advantage of this secret are legally guaranteed to collect regular payments as the oil or gas these wells produce is sold on the open market. Now, I want to be clear that these aren't dividends that Bert and others are collecting. This is ownership. Bert actually owns a guaranteed, tax-free profit share in some of America's best producing oil and natural gas wells. As prices for these commodities jump higher, the payments get bigger. Because of a Ronald Reagan-era legal guarantee, anybody who wants to lock in a safe and steady income stream can do so by owning oil and natural gas production. It's the easiest and safest way yet to save your retirement, earn steady income, and secure the financial freedom you deserve. And the financial media is only slowly waking up to this opportunity. BusinessWeek recently wrote that: "[Oil well profit sharing] provides investors with steady income in unsteady times." Kiplinger's points out that: "[Oil well profit sharing] is a hidden asset class that Wall Street has yet to wake up to." It's simple, powerful, and completely hassle-free. Bert and Harold didn't have to go looking for the oil... Nobody asked them to travel to the middle of nowhere and help drill the wells... They're free to go about their daily lives as normal. Bert's oil wells sit on one of America's oldest and most reliable oil fields, El Dorado. About 20 miles northeast of Wichita, just off the Kansas Turnpike, you can find Bert's oil wells as they operate 24 hours per day. Oil has flowed freely from this field ever since the first well, Stapleton #1, was completed on October 6, 1915. By 1919, El Dorado was one of the biggest oil fields in the world... It had 1,800 wells covering 22,300 acres. It pumped 29 million barrels a year at its height. That was good for 9% of global production. As the largest producing field in the United States at the time, some say it was the El Dorado field that won World War I. Today the El Dorado field doesn't capture headlines anymore. But oil is still the lifeblood of this part of Kansas. Oil production here has been steady for decades. And that's fine for a savvy "oil baron" like Bert — because, as I'll show you in a minute, his payments get larger when oil prices rise... It doesn't matter where the oil actually comes from. And these payments are guaranteed by law... no matter how bad the economy gets or what happens in the stock market, they keep coming month after month, year after year. As for Harold, his oil wells are in West Texas. The first oil well was drilled there in 1921. Since then, this field has produced around 16 billion barrels of oil. And it's estimated to hold another 30 billion barrels of recoverable oil. So, Harold can keep collecting on his profit-sharing agreement for years to come. Become an oil baron...and beat the taxman, too! In 1997, Democratic President Bill Clinton got together with a Republican Congress and passed a bill that included a very powerful tax-law loophole. This was the bill that lowered the top capital gains tax rate from 28% to 20%. But not many investors realize this bill also made it possible to pay exactly ZERO in taxes on your oil and natural gas profit-sharing agreements — no matter how long you share in the profits or how much money you make! Folks, this is as close to free money as it gets. If you can avoid taxes, you can make tens of thousands more in profits than you would otherwise. Earlier, I told you this tax-free income secret could have turned a $1,000 investment into $220,425, and you'd also be getting annual payments of $18,720... Look how much extra money you make by simply avoiding the taxes: See? You'd have missed out on thousands of dollars in income and profits. There's simply no reason not to use my tax-free income secret and get 33% more on your investments, just by avoiding the tax bill. And don't worry; this secret is SUPER easy to use. First-timers like Bert and Harold have had no issues whatsoever setting up their profit shares. If you can follow a couple of simple instructions, you're on your way. The best part is you're becoming an owner. And that means you can do whatever you want with the income you receive: take a trip around the world... pay off the house... anything you wish! Though, I can tell you now that some of the savviest owners simply take the cash and buy into more wells. They're growing their tax-free fortune as fast as possible. These payments have been coming like clockwork every few months for the last 26 years. That's 104 consecutive payments that regular Americans like you have been paid from their oil wells. And these checks will keep coming, no matter what happens to the economy or the stock market. It may be the easiest, safest way to create your own wealth I've ever seen... Tax-Free Oil Wealth: The Perfect Retirement Plan When it comes to planning for retirement, investors want stability, safety, and reliability. You need to know, without a doubt, that your money is going to grow, year in and year out. Let me ask you something... Can you imagine not making money with a tax-free, oil well profit share? No way. After all, oil and natural gas are among the most reliable and consistent millionaire-makers the United States has ever seen. This industry has created more American millionaires than Wall Street or Silicon Valley. Oil has made countless millionaires over the last 130 years. Even today, this industry is creating 2,000 millionaires a year in some parts of the country... And more recently, natural gas has made countless millionaires in Louisiana and Pennsylvania, Texas and Arkansas... I'm talking about regular Americans like Oscar and Lorene Stohler from Williston, North Dakota. They are now worth over $1 million after Bakken oil was found on their land. Or take David Brodsky, whose millionaire dreams came true when he leased over 100 acres of his land in Texas' Eagle Ford Shale basin. Then there's former Pennsylvania auto mechanic Chris Sutton, who thanked his lucky stars when he leased his 154 acres of land to Talisman Energy for a $900,000 check, paid up front.This tax-free income loophole I'm telling you about today can help you join the ranks of investors who are growing wealthy from America's most vital resource. And you don't even have to own the land that has the oil to be in line for this tax-free money! Reliable income from oil and natural gas wells — and a way to get that income without paying any taxes on it — may be the best thing to ever happen to your retirement account. There may be no easier way to generate hundreds or thousands of dollars a month than to own your own oil well. It's actually a very simple arrangement: As a profit share owner in these wells, you get a share of the profits. When you can get this steady income without paying any taxes on it, you'll grow your nest egg nearly twice as fast. But the best part of this tax-free income loophole is how reliable it is. After all, you can own a profit-sharing agreement in some of America's hottest oil fields — like the Permian Basin in Texas, the Niobrara in Colorado, and the Marcellus Shale natural gas field under the Appalachian Mountains. The profit margins for these profit-sharing agreements are typically around 80% — which means $.80 cents on every dollar is paid out to the profit share owners. And I'll reiterate: Anybody can do this. There's no approval process, no investment minimums, no restrictions of any kind that can keep you from becoming a modern-day oil baron.The New York Times acknowledged: "The United States [oil & gas profit-sharing agreements]... are much like the family trusts that cut checks for the descendants of oil barons." And as I've said, you can enter into an oil and gas profit-sharing agreement and never pay taxes on the payments you receive.One of the Midwest's biggest newspapers gets it: "A [profit-sharing agreement that] give[s] off a steady flow of income... is basically a device for avoiding taxes. " Now, at this point, I expect you might be wondering... Why you haven't heard about the easy, tax-free cash you could be making I can imagine you might be wondering why you've never heard of this ultra-reliable tax-free income secret. After all, given the size of the checks that are being sent out right now, you can easily make your money back in a very short time. And after that, it's all gravy — your checks will keep coming month after month, year after year. Fact is Wall Street heavyweights routinely get their best clients into oil and natural gas well profit-sharing agreements. But not surprisingly, they don't like to talk about it in public. For instance, a few months ago, Barron's caught up with a wealthy insider from Goldman Sachs... His name is Kyri Loupis. He's a managing director and portfolio manager at Goldman. He is responsible for billions in investment dollars. Loupis doesn't like to share the details of these oil and natural gas profit-sharing agreements. When Barron's asked him how much money Goldman's top clients were making, he would only say, "... the strategy has been well received by our clients." Why so secretive? Well, if Goldman's millionaire clients knew how easy it was to grow their wealth with tax-free oil and natural gas profit-share deals, they wouldn't pay outrageous fees to the likes of Goldman Sachs! Goldman doesn't think twice about pulling the wool over people's eyes while they gouge their own customers. Nice way to do business, right? They make the big bucks, and average investors get left out in the cold. Goldman Sachs has paid hundreds of millions in fines for this outrageous behavior, but they've never had to admit to any wrongdoing... even though we know the truth. I don't know anyone who believes Goldman will ever change how it treats the average investor. And it's been this way for decades. How to Beat Wall Street's "Rich Get Richer" Game Wall Street always favors the wealthiest investors. Leeches like Goldman Sachs will tell average investors like you and me to "buy" while their best clients are dumping the same shares hand over fist. But the quest to exclude individual investors from the very best moneymaking opportunities goes much deeper... It's a long-standing tradition that's even been made legal by securities laws. In 1933, after the historic stock market crash wiped out thousands of investors, Congress went to work to clean up Wall Street and protect individual investors... But when the Securities Act of 1933 was finally passed, it pushed approximately 98% of Americans out of the best — and safest — investment opportunities. Another gift to Wall Street. But seriously, the Securities Act of 1933 included rules that said only "accredited investors" could participate in highly-profitable deals like private equity, pre-IPO stock sales, secondary stock offerings, and (you guessed it) oil well ownership. In other words, unless you are a millionaire, you've been legally forbidden from owning one of America's most time-tested and proven investments for decades. And you probably didn't even know it. Fortunately, there's a way to get around this "accredited investor" rule... Halfway through his second term, president Ronald Reagan passed the Tax Reform Act of 1986. Among other things, this act made it possible for partnerships to be formed between the owners of natural resources and average investors. At the time, this new act was revolutionary. It meant that average, everyday investors could own a share of oil well profits for the first time in over 50 years. Still, many investors assume that oil wells are only for "oil men," that you need a special geology degree to discover oil wealth... That you have to already be wealthy to take the risk of not finding oil.None of these things is true. The facts are quite different. Oil wealth isn't just for "oil men" anymore. Thousands of American investors now own a profit share in individual oil and gas wells around the country — in Texas, in Kansas, in Alaska and Oklahoma. Heck, you could even take a trip and see with your own two eyes the very wells that are padding your bank account if you wanted to!The bottom line is: You don't have to discover oil to strike it rich. You don't have to be rich to get richer. The know-how to discover oil, bring it up out of the ground, and sell it to the highest bidder is already baked into these profit-sharing agreements. And the agreement that guarantees your payments has already been certified by top lawyers and regulators. You seal the deal when you get on board. Finally, there is no risk that you will go belly-up from a bogus oil discovery. The fields included in my tax-free income secret are verified. The reserves are proven. And in most cases, you can own a profit share in wells that are pumping oil right now.There's no guesswork and no fine print. And yet even now — 26 years after this oil well wealth became available to every citizen of the United States — the vast majority of investors are still not building their fortune with this reliable, proven moneymaker. I'm going to change that. What's more, I'm showing investors how they can secure their oil and gas well fortunes without paying one penny in taxes. Your payments could grow25% BIGGER every year. Now, I need to make something very clear: There are certain SEC rules in place that prevent me from telling you exactly how much I expect you can make from my tax-free income secret. I'm allowed to tell you how you can secure your own tax-free oil or natural gas well profit share. I can give you the specifics on how to lock in the kind of reliable income that can make you wealthy, no matter where you live. I can even tell you that your payments are guaranteed by law and will not be taxed... However, I'm not allowed to tell you that your profit share payments will grow by 25% every year. But I can certainly show you why 25% growth a year is very likely a conservative estimate... First, these are fossil fuels we're talking about — the single most valuable commodity in the entire world. You won't find many energy experts who think oil prices are headed lower. I mean, with ever-rising demand, dwindling global supplies, and constant unrest in the Middle East, there's never been a more reliable and consistent market than what there is for oil... If you have it, you can sell it. And you'll always get the best price, too. Second, these oil and natural gas well profit-sharing agreements require by law the owners (that's you) receive as much as 80% of the money that comes from the sale of oil from your oil wells. MSN Money will tell you: "Often the payments grow as much as 7% a year. And they do all this in a way that lets you defer taxes." These days, anything that reliably grows 7% a year is pretty darn good. But the fact is you can expect to do a lot better than 7% here... Because this is oil we're talking about. The price is all but certain to move higher. In fact, if you recall Bert Hoff, the man I told you about earlier, well, the payments from his profit-sharing agreement have done extremely well... In 2009 these oil well profit-share owners split $17.9 million amongst themselves. The very next year, in 2010, they divvied up $31.7 million. The pool of cash grew to $39.7 million in 2011... In just three short years, oil profit share owners like Bert more than doubled their income. It's not at all uncommon to see the pool of oil well profits you share in grow by millions every year. Not only that, but the value of the profit-sharing agreement went from around $10 per unit to over $40 as the cash payments increased. Best of all, though, this tax-free income secret is easy and virtually worry-free. Because you don't have to worry about a well hitting a "dry hole"; these are producing wells with verified reserves. You will never be billed for maintenance costs... heck, you don't even have to own oil-rich land where the wells are located. And if you ever get tired of getting your oil and gas payments, you can sell your profit-sharing agreement to the highest bidder in about five minutes. You can get started in just a few minutes — regardless of where you live or how much money you have to put down. I'll show you how you can become a modern-day oil baron in the blockbuster Special Report called, "The Tax-Free Millionaire: Tax-Free Income from America's Oil & Gas Boom." This report will show you step by step how to set up your own tax-free oil well income stream. I've shared this research with several thousand investors just like you. Many of them are already getting paid as owners. You can easily double your money in three years — and double it again in five — with this simple yet powerful oil well profit-sharing agreement. Indeed, this is a huge opportunity for you to shave off years to your retirement... to grow your wealth, so that you won't have to work until you're 70... and to live a lifestyle you've never thought was possible since the financial crisis shredded the 401(k)s of millions of everyday Americans. Few people know these unique tax-free profit share opportunities even exist... yet they've been one of the greatest ways to make substantial, tax-free income without breaking a sweat. Your Ultimate Source for Reliable Monthly Income To help you get in right away on this unique, low-risk investment, I want to give you a copy of my brand-new research report called, "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom." In it, I'll show you how this investment works — and why it's poised to make you more money in the coming months than you've ever thought possible... But before I tell you how to claim it, first, please allow me a proper introduction. "... You've more than paid for my daughter's college education." I'm Brian Hicks. Twenty years ago, I realized my calling in life: to provide top-quality, actionable, and profitable investment research to individual investors. That may not sound glamorous, and I'm certainly no Gandhi or Mother Theresa... Simply put, I love the financial markets. But I learned long ago that the only one Wall Street helps make money is... Wall Street. Since I started Angel Publishing in 2004, my analysts and I have helped tens of thousands of individual investors — investors just like you — make life-changing wealth in the stock market. "[I]bought the wife a new car." In 2006 gold was trading below $600 an ounce. But our research clearly showed that currency devaluation was an inevitable outcome of globalization... So we began aggressively recommending precious metals and mining stocks. Stocks like: Capital Gold: recommended at $0.34... sold at $4.54 Fortuna Silver: recommended at $0.75... recent high above $7 Allied Nevada Gold: recommended at $2.75... currently $26 a share Ventana Gold: Recommended at $0.50... acquired by EBX Group at $12.65 In 2004 we were among the first research teams to recognize the era of cheap oil was over... My book, Profit from the Peak: The End of Oil and the Greatest Investment Opportunity of the Century, was published in 2007, just a few months before oil made its historic run to $147 a barrel. On October 29, 2007, I was invited on CNN to explain how Peak Oil would drive the price of petroleum higher and higher. Another analyst called me a "Peak Freak" — but my conviction on oil led me to uncover the incredible opportunities in domestic shale oil that was just then being pioneered in the North Dakota's Bakken Formation. "Two and a half years later, I wrote a check to [pay off my house]." If you've heard of the Bakken, then you know my early recommendations for Bakken companies were incredibly profitable... Yes, my firm's success with investment research like I've shown you has attracted a lot of attention... Angel is one of the world's fastest-growing independent financial research firms, with over 500,000 subscribers in more than 177 countries. I've been asked to share my ideas on CNBC, Bloomberg, and Fox News. And I've spoken at conferences around the country. But I'm most proud of the "thanks" we get from individual investors who have used our research to build life-changing wealth... "I'm just sorry that I didn't act on your information sooner, but I guess I can't be too upset with a 250% boost in one week. Keep up the good work!" — Sarah H. "I subscribed about six months ago and wish I did it sooner. I'm up 336%. Yesterday alone my portfolio went up 23%." — Paul S. "I had $8,000 dollars... This week, I'm going to walk away with $85,000!!! I'm proud to say you've more than paid for my daughter's college education. I can't thank you enough." — Matt K. "Just wanted you to know how much I appreciate the hard work you do in finding the great companies for your readers. Currently I am up 252%, 165%, and 101% respectively. You made a believer out of me. Regards." — N.W. "I'd like you to know exactly how much I've appreciated your Bakken coverage over the years: I sold my position in NOG in Feb. 2010 for long-term gains of 261%, 1/3 of my position in BEXP in Apr. 2011 for long-term gains of 361% (and bought the wife a new car), and sold the rest of BEXP in Oct. 2011 for long-term gains of 743%. Now holding a large position in your newest pick with unrealized long-term gains of 365%. Thanks again!" — Mike L. "When I first met you, you told me I could use the profits I would make in the junior mining stocks to pay off my house. I didn't really believe you. Two and a half years later, I wrote a check to do just that. I never thought this would be possible. Thank you so much for your wise guidance." — Robert C. "My portfolio is now worth many, many times what I originally invested. I have never made this kind of money with my investments. I recommend him to all of my friends, family and associates." — Jim M. "... I missed your first round of trades on Brigham, but thankfully took your advice and bought BEXP in April 2009. Since then, it went up 12 fold for me... So thanks a lot! Best regards." — Henry R. I'm not telling you all this to brag. I just want you to see firsthand that our high-level research and investment insight gets results... very profitable results. Our research has helped individual investors just like you pay off their homes, pay for their kids' college, and live the life they want. But right now, strong profitable results may be more important then ever...Because there's a frightening new trend developing in America. You see, in the wake of the financial crisis, the majority of Americans simply do not have enough retirement savings. The numbers are scary. Studies show 56% of American workers have less than $25,000 in savings. And it gets worse: 54% of retirees have less than $25,000 in savings. So much for those "Golden Years"...50 million retirement-age Americans know they can't retire — and will have to keep working past age 70. And when you consider that Congress is likely to cut Social Security along with Medicare and Medicaid benefits, well, we could be in the first stages of a serious American retirement crisis.But you don't have to be one of the Americans who struggles in retirement. In less time than you think, you could have all the funds you'll need for the retirement of your dreams... With "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom," you can get the reliable tax-free income you need to live the life you want. Period. It's been proven time and again that assets that pay you regular income always perform than any other asset class.Ned Davis Research revealed how income investments do 250% better than non-income paying investments.Another study by Milwaukee-based Heartland Advisors revealed between 1928 and 2010, investors who reinvested dividends of 3%-6% could have gotten paid potent returns of 13.75% a year (on average). My favorite study on the matter was conducted by acclaimed investor and researcher Robert Arnott... In one if the most comprehensive market research projects ever, Arnott compiled stock market data for 200 years (1802-2002) to see what the best way to profit was. What he found was amazing — and should revolutionize the way you invest...Only 8% of stock market gains come from rising valuations; 74% of investment returns from the stock market have come from dividends! The wealth-generating power of income is impossible to ignore. And when you can get that income tax-free, you automatically make as much as 43% more... That's why I've prepared a research report featuring the very best dividend opportunity I've ever uncovered. I'm prepared to send you a copy of "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom"absolutely free today. There's nothing complicated here at all... No tricks, no gimmicks. You'll receive access to the report and instantly have the information you need to collect tax-free income that could fund your dream retirement — and then some.All you have to do to receive these instructions is respond to this letter. There's no risk or obligation at all. Let me explain... You see, every month I share my investment research in a monthly newsletter called The Wealth Advisory. When you take a no-risk trial subscription, the first thing you'll receive is my new report, "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom." The Wealth Advisory: A Systematic Plan for Building Wealth You see, at The Wealth Advisory, my investment philosophy is simple: You can do better than Wall Street. It's outrageous that Wall Street will charge you 2%-3% for a mutual fund that may only return 8% a year. Poor performance has never been so expensive. So why not skip Wall Street and simply own top-quality investments that pay you consistent market-beating income? The Wealth Advisory gives you a proven strategy to ensure that you get paid more income more often from your investments. I don't recommend risky micro cap stocks, or try to predict which way the stock market will turn tomorrow or next week...If that's what you want, then you might as well stop reading and toss this letter aside right now. BecauseThe Wealth Advisory is not for you. Because investing for retirement isn't about latching onto the next hot stock or timing the market. The true path to wealth is a proven, systematic plan for compounding dividend income. Whether you're a long way from retirement... preparing for the big day... or enjoying your freedom now, you can easily and safely generate thousands in extra monthly income, all from the comfort of your own home.There's no reason you can't be free to live better and more worry-free than ever before! My unique income investments do all of the work for you, so you have more time to spend with the kids and grandkids, playing golf, and traveling... Will YOU be among the 1% who retire wealthy? Most investors don't take advantage of the market's best income plays... Too many people think they can only get safe income through Treasury bills, bonds, and CDs from their local bank. But right now, CDs are paying nearly next to nothing: a wimpy 2.8% for 10 years. That doesn't even beat inflation. In fact, you're technically losing money. And Treasury bonds aren't faring any better. It would take you decades to double your money with these low-paying investments. That's no way to build real wealth. It's crazy that any investor would prefer these low-yield investments — especially when you can get 8%-13% a year with rock-solid income... like you'll get with "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom." For The Wealth Advisory, I target bigger income and faster payouts, but without the usual risk you might expect with these kind of high-yield investments. (That's why I'm currently recommending investments that are focused on the American and Canadian economies. There's simply too much risk in Europe and the rest of the world.) And none of these investments force you to tie up your money for any period of time like you would with an annuity or CD... You can withdraw your cash... or put money in... whenever you feel like it. In today's rocky economy, with the global financial markets in turmoil, nothing beats getting paid a dependable, substantial check from your investments. And that's the point: You're putting money into solid companies — becoming an owner — and getting paid for it. You're banking on a solid history of continuous — and increasing payments — to make you money. Bull or bear market? It doesn't matter... I can help you generate real, sustainable wealth in every market condition — so you can live the rich retirement you've always deserved. I recommending the best dividend-paying companies... companies that are: Loaded with cash Well-established Focused on the U.S. and Canada (to avoid emerging market problems) Fundamentally solid In the right industries at the right time With a long history of doing good business, paying out cash as steady dividends, raising their dividends continuously over time, and looking out for their stockholders By now, you're probably wondering whether The Wealth Advisory is right for you... Well, there's just one way to find out.Give it a try — at no risk whatsoever. When you agree to test-drive a subscription to The Wealth Advisory, I'll immediately rush you a copy of "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom." This report details three of America's top oil and natural gas profit shares... Profit Share #1: This all-oil profit share has been paying 80% of its total revenue to profit share owners for the last six years. The wells are producing, and the oil reserves are verified. All you have to do is sign up — and hundreds or thousands in annual tax-free income can be yours. Profit Share #2: This all-natural gas profit share gives you tremendous upside as natural gas prices rise. I expect revenues to double in the next two years — and that means your checks will double, too. And don't worry, I'll show how to make your payouts tax-free, so you get every penny. Profit Share #3: This profit share arrangement will pay you for both oil and natural gas sales. The wells are located in one of America's bets producing fields in West Texas. And this profit share arrangement has paid out significantly higher-than-expected payments for the last year and a half — a great way to start your oil and natural gas profit shares! And that's just the beginning... How to Safely Generate Thousands inExtra Income Every Month — for Just 14 Cents a Day In addition to your copy of "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom," I'd like to rush you your FREE copies of all my latest wealth-building Special Reports... Research Report #1: "Best Dividend Growth Stocks for the Next 10 Years" It's been proven that 74% of all stock market gains come from dividends. But if you get the right combination of dividend growth and stock price appreciation, you can grow truly wealthy. In the last 15 years, Coca-Cola has raised its dividend more than 400%. And McDonald's dividend is up 1,511%! Here are our top choices for huge dividend growth over the next 10 years. Our top pick is a bank that has more earnings growth potential than any other bank in the world. Its dividend could grow more than 1,000% in ten years! You'll get all the details about the company with the 88th best brand name in the world. It's on the verge of a major global expansion that will push the dividend and share price much higher... This Special Report can help you secure a lifetime's worth of income! Research Report #2: "'Wal-Lord': How the Retail King's Landlord Could Pay You Monthly Rental Dividends" Every month for the past nine years, this little-known landlord has sent out "rent checks" collected from Wal-Mart to his partners. And these checks have grown bigger every single year. Now I've found a way for you to become a partner for as little as $27. This report will tell you everything you need to know to do so. Here's a little-known financial secret of America's fast-food industry that could pay you thousands every single month — for life... This company has paid a dividend every single month to shareholders, and they're still sending them out today! That's 498 months of consecutive paychecks to shareholders. Even more amazing is that the checks have grown bigger, every single year, for the past 16 years. Research Report #4: "The $4.8 Trillion Health Care Superboom: 3 Stocks You Can Ride to Generations of Lasting Wealth" 11,000 baby boomers turn 65 every day. It's the biggest shift in demographics in U.S. history. And it will continue for the next 17 years — until 77 million people hit retirement age. The aging U.S. population is a rock-solid trend for the income investor... Our top pharma play pays a 4% dividend and may have as much 86% upside coming. Plus we've got an REIT that owns senior housing facilities that pays a reliable 7% a year. Of course, "Tax-Free Millionaire: Easy Income from America's Oil & Gas Boom" will be the first thing you should read when you test-drive my monthly newsletter, The Wealth Advisory. Over the course of the next year, you'll also receive: One Full Year of The Wealth Advisory Service (12 issues total): You'll receive a new issue on the third Friday of each month. In each new issue, I'll share details on stocks that will pay you the most extra income with the least possible risk. "Real-Time" Wealth Advisory Alerts: Stocks don't always trade on a schedule. Optimum entry or exit prices can come at any time. With Real-Time Alerts sent directly to your email or smartphone, you'll never miss the details and clear instructions on every recommendation I make. Clear and Concise Trading Instructions: My service is so easy to follow, you can simply read the instructions verbatim over the phone to your broker, or do it yourself in just a few minutes with your online service... Complete Monthly Portfolio Review: Every month, you'll get a thorough discussion of every stock in The Wealth Advisory portfolio. You'll always know what news is moving a stock and what to watch for in the future. Full Access to The Wealth Advisory Members-Only Website: You'll have password-protected access to all of my Special Reports, the complete archive of issues, and the entire Wealth Advisory Portfolio — all of our picks, past and present. And finally... Live Customer Support: If you ever have any questions or concerns, call our lovely Customer Support agents any time between 9 a.m. and 5 p.m. (EST). They'll be happy to answer your questions and assist you with your membership. Best of all, I'd like you to take the next 180 days to decide whether or not you want to keep your subscription. That should give you plenty of time to see my work firsthand... collect your first few checks... and take advantage of these income secrets yourself. And you can get it all for less than 14 cents a day. That's not just a bargain — it's a downright steal for top-quality moneymaking investment research and recommendations. Not only that, but if you decide The Wealth Advisory isn't right for you, just give us a call on our toll-free number... I'll send you a full refund. The reports you receive when you join are yours to keep no matter what. I want you to be 100% satisfied. And I'm pretty confident you will be if you give The Wealth Advisory a try, just like the thousands of individual investors who are securing their financial future with me... "You seem like you're unfettered from the world of big money, and I like the viewpoint you bring to the big picture. I like that you still believe big time in America!!" — Kent Michitsch, San Diego, CA "I like that The Wealth Advisory gives real stock picks that are likely to be winners, and that you explain why they are going to be winners using charts and earnings and things that most of us newbies don't understand." — Shayla Fargnoli, RI "The Wealth Advisory gathers a collection of knowledge about economy, markets, trends, future and companies that the common citizen cannot get easily or without much effort. You inform about opportunities way ahead of others!!!" — Luis Gil, Portugal/Germany "I find The Wealth Advisory to be a very interesting and valuable investment tool giving perspective to various sectors which is completely different than a mere recommendation to invest in such or such stock." — Eric Sheridan, Belgium Once you see firsthand how The Wealth Advisory can improve your financial future, you'll be glad you gave it a try. Here's how to get started right away... Join Now and Save 50% Thousands of individual investors happily pay $99 a year for The Wealth Advisory. But as I said before, I want you to try my work for yourself — risk-free — for the next six months. That way, you have plenty of time to decide if The Wealth Advisory is right for you. And I want this to be as easy for you as possible... So I'm willing to cut the regular price in HALF. Sign up right now for The Wealth Advisory and you'll pay just half the regular rate. In other words: You'll pay just $49. That breaks down to a measly 14 cents a day. How can I afford to charge so little? Once you see how quickly The Wealth Advisory can grow your wealth, I'm confident you'll stick with me for years to come... You see, I've helped thousands of independent investors make life-changing wealth over the course of my career. And I'm certain that the rock-solid income opportunities I uncover in each monthly issue of The Wealth Advisory can provide you with all of the income you'll need for life... Like the income-generating secrets I share in "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom." I highly doubt other financial advisors and investment "gurus" are telling investors they can get virtually guaranteed income from their ownership of oil well profits — an investment that could also give you as much as much as 42% on your initial investment in just the next 12 months... That's the type of research that makes The Wealth Advisory one of America's fastest-growing investment newsletters. The fact is our subscribers stick with us year after year for one reason: results. Very profitable results. Isn't it time you found the powerful income investments you've been missing? If you decide during your 180-day trial period that The Wealth Advisory is not for you, that's fine... I guarantee your money back, no matter what, no questions asked. Heck, even if you cancel after the 180-day period, you'll still get money back for the unused portion of your subscription. It's that simple. Sign up today and you'll get instant access (within the next 10 minutes) to all of these reports, including "The Tax-Free Millionaire: Tax Free Income from America's Oil & Gas Boom," on our exclusive Members-Only Website. You'll start receiving your monthly issue of The Wealth Advisory on the third Friday of each month. I hope you'll join us and start collecting all the income you'll ever need, for as long as you need it... no matter what happens to the economy or the financial markets. The quicker you begin, the quicker you'll be on your way to the worry-free retirement you've dreamed of... To get started immediately, simply click the button below this presentation. You'll be glad you did. I guarantee it. Here's to more income more often, Brian Hicks Publisher, The Wealth Advisory
2024-07-11T01:27:04.277712
https://example.com/article/9657
What made the Punjab and Maharashtra Cooperative Bank trust a shantytown developer with almost 70% of its loan book?Even as the Mumbai Police on Monday filed an FIR against the PMC Bank, a confession letter by suspended managing director Joy Thomas has exposed just how comfortable the relationship between the bank and Wadhawan family had become over the years.According to the reports, PMC Bank did not report its exposure to Housing Development and Infrastructure Limited (HDIL) for six to seven years. How the auditors could be hoodwinked for such a long time is a case ripe for investigation.PMC Bank’s cozy relationship with Mumbai-based slum developer HDIL goes much beyond the location of its corporate office on the third floor of Dreams Mall, a landmark building, developed by the Wadhawan-promoted firm.In a five-page letter, Thomas revealed how the bank virtually acted as the in-house banker of the company, even when it was facing insolvency proceedings in the National Company Law Tribunal (NCLT).The relationship between the Wadhawan family and the PMC Bank can be traced back to the mid-1980s, when the late Rajesh Kumar Wadhwan - the then director of Land Development Corporation - rescued the bank multiple times. This was also when the family started banking with the PMC Bank and infused family capital into it to help bring the bank's net worth from negative to positive.In his letter to the RBI, Thomas has given a detailed account of the growing relationship between the lender and the Wadhwan family, which eventually took the bank down.In 2004, when the bank faced another liquidity crunch, Wadhawan once again deposited Rs 100 crore to tide the bank over. Soon, more that 60% of the bank's transactions were with the HDIL group alone. Thomas, in his letter, said: "Since the time Rakesh Kumar Wadhawan started banking with the bank, and the performance of all his accounts was good, more than 60 percent transactions of the bank were from this group."He added that from time to time these accounts would be overdrawn but would get regularised in "due course of time.” During this process, PMC used to charge 18-24% interest from these accounts paving the way for a "very good profit", he wrote.The tables turned around on the bank, when in 2012-2013 the group started facing liquidity pressures after the cancellation of their slum rehabilitation project near the Mumbai airport. According to Thomas, this was also the time when HDIL started to default on its dues.How did PMC’s board, its auditors, and the central bank remain clueless for so long?The bank started to look the other way on these defaults due to the fear of risking their reputation, Thomas admitted."As the outstandings (loans) were huge and if these were classified as NPA, it would have affected the bank's profitability and the bank would have faced regulatory action from RBI," Thomas said in his letter.Thomas' confession letter to RBI revealed that the bank's exposure to bankrupt HDIL was pegged at Rs 6,500 crore, which is over 70% of the bank's total assets.It took six senior bank officials, almost 21,049 dummy accounts and over ten years of misreporting to execute what is probably the biggest case of swindling at any cooperative bank in the country.Typically, a bank's transactions go through five layers of scrutiny, including internal checks. But the management found ways to keep the loans from being detected. The bank’s statutory auditor Lakdawala & Co validated only incremental loans and not all the accounts of the bank, which further helped the management to cover up the defaults."Since the bank was growing, the Statutory auditors, due to their time constraints, were checking only the incremental advances and not the entire operations in all the accounts. They validated the incremental loans and advances and scrutinised the accounts which were shown by us. Loans to HDIL, which were across multiple entities, did not figure in these accounts," wrote Thomas.The Pandora's box opened when the Reserve Bank of India clamped down on the bank's operations after receiving a letter from a whistle-blower on September 17.Thomas wrote that over time the concealment of the true state of accounts was becoming overwhelming for the six employees who were in the know. This prompted them to approach the RBI. "Every year during the course of RBI inspection we undergo into a lot of stress due to concealment of information from RBI. It was worrying each one of us."He closed his letter saying the bank was still optimistic about the repayment of loans by the group.The default at the PMC bank comes a year after a mega default rocked another national bank.When state-run Punjab National Bank was scammed out of over Rs 14,000 crore, it emerged that the lender was incurring liabilities on behalf of jeweller Nirav Modi and his uncle Mehul Choksi. It was doing so by sending instructions to overseas branches of other Indian banks over Swift - the global system used by banks to transmit payments. But the liabilities weren’t getting captured in PNB’s internal accounts.The PMC saga, in contrast, points to the possibility that the very core of the cooperative bank’s operations was rotten.
2023-11-13T01:27:04.277712
https://example.com/article/1040
--- -api-id: M:Windows.Web.Http.Headers.HttpLanguageRangeWithQualityHeaderValueCollection.SetAt(System.UInt32,Windows.Web.Http.Headers.HttpLanguageRangeWithQualityHeaderValue) -api-type: winrt method --- <!-- Method syntax public void SetAt(System.UInt32 index, Windows.Web.Http.Headers.HttpLanguageRangeWithQualityHeaderValue value) --> # Windows.Web.Http.Headers.HttpLanguageRangeWithQualityHeaderValueCollection.SetAt ## -description Sets the [HttpLanguageRangeWithQualityHeaderValue](httplanguagerangewithqualityheadervalue.md) at the specified index in the collection. ## -parameters ### -param index The zero-based index at which to set the [HttpLanguageRangeWithQualityHeaderValue](httplanguagerangewithqualityheadervalue.md). ### -param value The item to set. ## -remarks ## -examples ## -see-also
2023-10-30T01:27:04.277712
https://example.com/article/5748
Q: How to resize root to increase home partition size in ubuntu 16.04 with gparted I am using a dual boot windows 7 64-bit with Ubuntu 16.04 64-bit. I am new to Ubuntu as well as Linux. I am getting a warning as I log in on Ubuntu about low space in home. Here is my disk space when checking through gparted. Now what I want to do is reallocate some space from / to /home, since as you can see I have 59.66 GB space free in /. I want to know how to do this - the articles I read suggest it can be risky, and since I'm new I need detailed help. I am also confused about the warning as in gparted I see that I have 1.75GB unused space in home but the warning says your home has just some 600+MB remaining. Why is that? A: BACKUP IMPORTANT DATA BEFORE PROCEEDING Even though the chances of losing data is slim but still BACKUP IMPORTANT DATA BEFORE PROCEEDING Boot to a live environment using Ubuntu CD/DVD/USB. Open Gparted. Delete linux-swap (we will create it later). Resize /dev/sda5 to your desired size. See this answer for more information. Resize /dev/sda7 using the newly created unallocated space. Leave 4096 MB at the end for swap. Create new swap with the left out 4096 MB. Finally, apply all changes. Mount your / partition: sudo mkdir -p /media/dev && sudo mount /dev/sda5 /media/dev Edit /etc/fstab and change the UUID of the swap partition in the file: sudo gedit /etc/fstab You can get the UUID of your swap partition from the command: sudo blkid Close everything and unmount mounted partition: sudo umount -R /media Reboot.
2023-11-18T01:27:04.277712
https://example.com/article/9251
+ -1.2. Let k = -4.999965 - r. What is k rounded to 5 dps? 0.00004 Let q = -273111.50000074 - -273111.18. Let h = -13 + 12.68. Let z = q - h. What is z rounded to seven dps? -0.0000007 Let o = -76 - -76.000039. Round o to 5 dps. 0.00004 Let f be (-79279805)/(-4) - (-1)/(-4). Suppose 0 = 5*p + 3*j + f, p - 5*j = -4*p - 19819935. Let w = 2363989 + p. What is w rounded to the nearest one million? -2000000 Let m = -1.74 - -1.7400142. What is m rounded to six decimal places? 0.000014 Let d = 1.444 + -0.004. Round d to 1 dp. 1.4 Let a = -25 - -2. Let c = -22.2564734 + -0.7434416. Let w = c - a. Round w to 5 dps. 0.00009 Let r = -125 - -125.00295. What is r rounded to 4 decimal places? 0.003 Let l = 5 + -7. Let d be -1 + 51003 - (l + 4). Round d to the nearest ten thousand. 50000 Let w = -5507406202 + 5507404028.85999936. Let p = 2172.94 + w. Let k = p - -0.2. Round k to seven decimal places. -0.0000006 Let r = 1728 - 1728.00741. What is r rounded to 3 dps? -0.007 Let x = 4.982 - 5. Let t = 0.78030603 + -0.798307. Let a = x - t. What is a rounded to 7 dps? 0.000001 Let l = -35.3 + 33. Let a = l + 2.29999901. Round a to 7 dps. -0.000001 Let b be 10/(-150)*3 + 20800002/10. What is b rounded to the nearest one hundred thousand? 2100000 Let w = -14602.8013 + 14604. Let k = w + -1.2. What is k rounded to three dps? -0.001 Let k = 18.984 - 19. Round k to 2 dps. -0.02 Let o = 0.02 - -0.48. Let x = -0.5009 + o. Round x to three decimal places. -0.001 Let k(m) = m**2 - m + 238822. Let j be k(0). Suppose -2*w + 938822 - j = 0. Round w to the nearest 100000. 400000 Suppose 0 = 5*t + 5*a + 48054645, 3*t - 3*a = -4*a - 28832789. Let j = -4910930 - t. What is j rounded to the nearest 1000000? 5000000 Let y = -5.98 + 6. Let g = -0.32 + y. Let d = 0.168 + g. What is d rounded to 2 dps? -0.13 Let q = 474.99 + -479. Let l = 4 + q. Let k = l + 0.0100032. Round k to six dps. 0.000003 Let h = -5015.0048 + 5019. Let k = h + -4. What is k rounded to three decimal places? -0.005 Suppose -2*l - 40 = 262. Let o = -599 + l. Round o to the nearest 100. -800 Let q = 51.2 + -51.851. Let r = q - 0.089. Round r to one dp. -0.7 Let o = -16.1 - -2.5. Let s = o + 9. What is s rounded to the nearest integer? -5 Let u = -13106.4074 + 13185.4. Let v = -79 + u. Round v to three decimal places. -0.007 Let r be (-4)/6 - 3/9. Let y(i) be the third derivative of -3*i**5/20 + i**4/24 + 23*i**2. Let z be y(r). Round z to the nearest ten. -10 Suppose -6*t + 2*t - 521068 = 0. Let p = -229267 - t. Round p to the nearest 10000. -100000 Let m = -3.5 - -4. Let s = 0.49992 - m. Round s to four dps. -0.0001 Let k = -5.6 - 24.4. Let f = k + 30.00065. What is f rounded to four decimal places? 0.0007 Let u(l) = 954*l - 4. Let s(j) = 1907*j - 7. Let t(p) = 4*s(p) - 7*u(p). Let h be t(2). Round h to the nearest one thousand. 2000 Let h = 37.1637 - 25.16365. Let f = h - 12. What is f rounded to four dps? 0.0001 Let r = 6645.1699 + -6644. Let z = -6.9636 + r. Let m = -5.8 - z. What is m rounded to three dps? -0.006 Let p = 183.7 - 22.7. Let s = 161.000158 - p. Round s to five decimal places. 0.00016 Suppose -5 + 11 = 2*r. Suppose r*w - 624007 + 219007 = 0. What is w rounded to the nearest 10000? 140000 Let l = 4.73 + -4. Let n = 0.7 - l. What is n rounded to 2 dps? -0.03 Let m = -549836.867 + 549516. Let u = 652 + -331. Let b = m + u. What is b rounded to two dps? 0.13 Let b = 0.2 + -0.28. Round b to 1 dp. -0.1 Let g be (-3 + 6)*1540/(-6). Round g to the nearest 100. -800 Let z = -12 + 5. Let n = z + 6.9999912. What is n rounded to 6 decimal places? -0.000009 Suppose 12 = k + 2. Suppose -5*n - 114990 = 2*u + 3*u, -k = -5*n. Round u to the nearest 10000. -20000 Suppose 5*n + 4*q = 8, 4*q = -4*n + 6 - 2. Let h(s) = -n - s - s + 15*s**2 + 2. Let p be h(-2). What is p rounded to the nearest 10? 60 Suppose y - 3*t - 3 = -0, 4*y + 14 = -t. Suppose 4 + 0 = -k. Let j be 2339998/y + k/6. What is j rounded to the nearest 100000? -800000 Let s = 0.055 - 46.055. Let r = s - -46.00141. Round r to four dps. 0.0014 Let n = 0.1 + -0.05. Let a = n - 0.13. What is a rounded to one decimal place? -0.1 Let b be -318750*((-7)/(-21) - 47/(-3)). What is b rounded to the nearest one million? -5000000 Let j = 4610453 - 4610453.02000049. Let b = j - -0.02. Round b to 7 decimal places. -0.0000005 Let i = -29 - -29.011. What is i rounded to 3 dps? 0.011 Let x be 2 - (-14)/(2 - 1). Let p be x/24 + (-3604)/6. Round p to the nearest one hundred. -600 Let w = 3.09 + 0.21. Let f = w - 20.3. Let l = f - -17.00007. Round l to 4 dps. 0.0001 Let l = 2568233841.00000029 - 2568233827. Let o = l + -14. What is o rounded to 7 dps? 0.0000003 Let n = -45154 + 10454. Round n to the nearest one thousand. -35000 Suppose -j = -2*i - 10500002, 0*j = -2*j - 5*i + 20999995. Round j to the nearest 1000000. 11000000 Suppose -21*o + 4788 = -23205. Round o to the nearest 100. 1300 Let u = 0.21 + -10.21. Let l = -15.07062 + 5.07139. Let c = u - l. What is c rounded to 4 decimal places? -0.0008 Let x(w) = -9*w + 11*w - 7 + 15*w + 12*w. Let v be x(-7). What is v rounded to the nearest 10? -210 Let n = 59.033 + -59. Let c = n + -0.03. What is c rounded to three dps? 0.003 Let n = 764.383 - 764. Round n to 2 dps. 0.38 Let l be -1105*9*(-24)/(-20). Let g = l + 7534. Round g to the nearest 1000. -4000 Suppose 9*d - 4*d = -2*y + 98028, 49014 = y + d. Suppose -a - y = 54986. What is a rounded to the nearest ten thousand? -100000 Let x = 17 + -17.0000013. What is x rounded to six decimal places? -0.000001 Let y = -22.8 + 29. What is y rounded to the nearest integer? 6 Let h = -0.09 + 4.09. Let j = h + -4.02. Let m = -0.02000048 - j. Round m to 7 decimal places. -0.0000005 Suppose -10 = h - 1. Let u be 6/h + (-10796)/6. What is u rounded to the nearest 1000? -2000 Suppose 3*x + 5*a - 347980 = 5*x, 5*a - 173980 = x. Round x to the nearest 10000. -170000 Let u = -0.007298955 - -0.0073. What is u rounded to 7 decimal places? 0.000001 Suppose -12*n = -2*n - 13700000. What is n rounded to the nearest one hundred thousand? 1400000 Let l = -0.04943 - -0.052. Round l to 4 dps. 0.0026 Let f = 12 + -14. Let j = 1.993 + f. What is j rounded to 2 dps? -0.01 Suppose b - 7 = -2*u + 2*b, -4*u - 4*b - 16 = 0. Let z be -3 - u*(-2260006)/2. Round z to the nearest one hundred thousand. 1100000 Suppose -3*n = 4*q + 20, -6*n + 10 = -3*n - 2*q. Let o = -10 + n. What is o rounded to the nearest 100? 0 Let x = 439534 + -439516.00027. Let v = x - 18. Round v to four decimal places. -0.0003 Let z = 8 + -7.7. Let r = z + -0.6. Let m = 0.30000032 + r. What is m rounded to seven decimal places? 0.0000003 Let l = 19 - 19.046. Let y = -0.04600046 - l. Round y to seven decimal places. -0.0000005 Let u = -3.6 + 3.6101. What is u rounded to three dps? 0.01 Suppose n = -1, -3*c + 4 = -0*c + 5*n. Suppose 0*f + c = -f. Let y be (-2)/3 + (-10802)/f. What is y rounded to the nearest 1000? 4000 Let a = -124 + 292. Let f = 168.00137 - a. Round f to 4 decimal places. 0.0014 Let x be (3/(-2))/(3/(-4)). Suppose x*z - 5*a = 3*z - 1699985, 0 = 5*z + a - 8499997. Round z to the nearest one hundred thousand. 1700000 Let q = 2.31 - -0.32. Round q to one dp. 2.6 Let k(h) = 8*h**2 - 4*h - 4. Suppose 56 = -u - 3*u. Let b be k(u). What is b rounded to the nearest one hundred? 1600 Suppose -3*m + 35 = 4*a, a + 5 = 3*m - 5. Suppose 2*q = -4*c - 722406, m*q = q + 20. Let s be c/(-14) + 6/(-21). What is s rounded to the nearest 1000? 13000 Let s(a) be the first derivative of -3*a**2 - 2. Let l(q) = -q. Let h(b) = -11*l(b) + 2*s(b). Let j be h(1). What is j rounded to the nearest 10? 0 Let c(p) = -417*p**3 + 2*p**2 - 2*p + 1. Suppose -3*r + 1 = -3*y - 2, -3*y + 4 = 4*r. Let b be c(r). Let l be (50*30)/((-6)/b). Round l to the nearest 10000. 100000 Let q(y) = -2*y**3 - 6*y**2 - 3*y - 3. Let n(m) = -m**3 + m**2 + m - 1. Let x(w) = -n(w) + q(w). Let f be x(-3). Round f to the nearest ten. -30 Let d = 0.189 - 0.18. What is d rounded to 3 dps? 0.009 Let l = -50.923 + -0.077. Let q = -50.999852 - l. Round q to 5 dps. 0.00015 Suppose -2*s + 30406 = -0*s. Let l be (-1)/(-1) + (s - 4). What is l rounded to the nearest 1000? 15000 Let d = -346 - -345.99999771. Round d to six dps. -0.000002 Let i = -10 + 1. Let r be (-2698)/3 + 6/i. W
2024-01-20T01:27:04.277712
https://example.com/article/8854
Q: null object in HashTable When i try map.get(k) the index in my hashtable it returns null and was wondering if it was my csv to hashtable code. public static void main(String[] args) throws ParseException, IOException { BufferedReader br = new BufferedReader(new FileReader("primes.csv")); String line = null; Hashtable<String, String> map = new Hashtable<String, String>(100); while((line = br.readLine()) != null){ String str[] = line.split(","); map.put(str[0], str[1]); } br.close(); System.out.println(map); int k; k = Integer.parseInt(JOptionPane.showInputDialog(f,"Enter an integer k whee" + " 3 < k < 1229: ")); while (k <= 3 || k >= 1229){ k = Integer.parseInt(JOptionPane.showInputDialog(f,"Sorry try again: ")); } JOptionPane.showMessageDialog(f, "The "+ k +"th prime number is " + map.get(k)); } Also my csv file contains 1, 1 (next line) 2, 2 (next line) 3, 3 (next line) 4, 5 (next line) 5, 7 and so on A: You use String keys in your map and you want to retrieve objects from it with Integer keys : String str[] = line.split(","); ... map.put(str[0], str[1]); ... int k; ... map.get(k); It is not possible. These are not equals in terms of equals(). So, use the same type as key in both cases. For example to use String in both cases, change the get() invocation in this way : map.get(String.valueOf(k)); Besides, Hashtable is a thread safe class (not efficient too). You don't need to this feature in your code sample. A HashMap is enough.
2023-12-14T01:27:04.277712
https://example.com/article/4946
Vince's elegant, minimal designs are adored by the A-list, and this light-taupe silk tunic is a perfect example of the aesthetic. As comfortable as it is stylish, wear this relaxed piece with bare legs and flat sandals for effortless summer chic.
2024-02-24T01:27:04.277712
https://example.com/article/2575
Congressman John Sarbanes (D-Md.) today announced that the Howard County Department of Fire Rescue Service and the City of Annapolis Fire Department will receive a total of more than $100,000 in grants from the Federal Emergency Management Agency (FEMA) to improve fire prevention and safety efforts in Maryland communities. The grant funding comes from FEMA's Fire Prevention and Safety (FP&S) Program, which helps city and county fire departments educate local residents about fire prevention and hazard mitigation in an effort to reduce fire-related deaths and injuries. "Expanding access to life-saving information about fire safety will go a long way toward making our homes and our neighborhoods safer," said Congressman Sarbanes. "This important federal investment in Howard County and Annapolis will help our first responders better serve and protect local communities." FEMA's FP&S program will provide the Howard County Department of Fire Rescue Services with more than $96,000 in grant funding and the City of Annapolis Fire Department with more than $19,000 in grant funding.
2024-05-26T01:27:04.277712
https://example.com/article/6730
Cindy Gladue (left-centre) with her three daughters. (Facebook) The death and life of Cindy Gladue We know about her tragic death in a motel bathroom, but she was more than a headline. Kathryn Blaze Carlson reports South of the Alberta town where she was born, a teenaged Cindy Gladue and two friends found themselves stranded one summer night when the Edmonton transit train they were riding unexpectedly went out of service several kilometres from home. Ms. Gladue had lived in the prairie capital since she was young and knew they were in a precarious situation: It was dark, they had no taxi fare and they were at the eastern edge of the so-called stroll, a stretch of an avenue north of downtown where johns seek out prostitutes. She feared she and her indigenous girlfriends would either be mistaken for sex workers, assaulted, or picked up by police and returned to angry, worried parents. The trio ultimately made it home safely, crossing the Yellowhead Highway, a popular trucking route, along the way. This was the late 1980s, when Ms. Gladue had big hair and big dreams. She wanted to beat the odds in her family and go to university. She didn’t know what she wanted to study, but she knew she wanted the school to be somewhere beautiful. She wanted to become a mother, and she knew, even then, what she hoped to call her children, having jotted down a list of her favourite names while nestled with a friend under a tree along the North Saskatchewan River. Cindy Gladue in grade nine. (Facebook) Ms. Gladue did become a mother, and she did put one of those scribbled names to use – Cheyanne. But the Métis woman’s other dreams were never realized. On June 22, 2011, Ms. Gladue, a 36-year-old sex worker who abused drugs and alcohol, was found lifeless in a bathtub at a motel on the Yellowhead Highway. She had bled out from an 11-centimetre-long wound to her vaginal wall. Two days later, a trucker named Bradley Barton was arrested in connection with the death – a stunning development for Ms. Gladue’s mother, Donna McLeod, who said police initially left her with the impression her daughter may have died from natural causes. The next four years proved hellish for Ms. McLeod, who recently sat down with The Globe and Mail for an exclusive interview. She lost her eldest child, who had three daughters, all teenagers. She sat through the murder trial earlier this year and, although she did everything she could to avoid seeing graphic images in court, a photo was accidentally flashed on a screen during the proceedings. The image of her daughter’s naked, blood-soaked body was forever burned into her brain. Cindy Gladue's mother Donna McLeod remembers her daughter. (Amber Bracken for The Globe and Mail) In an unprecedented move regarded by many as an affront to Ms. Gladue’s dignity, the judge allowed her vaginal tissue to be brought into court as evidence. The case had turned on what caused the wound, with the Crown arguing Mr. Barton either inserted a sharp object or recklessly fisted her vagina, and the defence asserting the wound was the result of consensual, manual stimulation. Then, on March 18, an 11-person jury – nine men and two women, none of them native – acquitted Mr. Barton of first-degree murder and chose not to convict him of the lesser offence of manslaughter. The Crown has filed an appeal and will present its case to a panel of judges, likely next year. “The Crown appealed the acquittal, after careful review of the case, on the basis of legal errors in the charge to the jury,” an Alberta Justice spokeswoman said in an e-mail, referring to the judge’s instructions to the jury before deliberations. Mr. Barton did not respond to an interview request made through his lawyer, Dino Bottos, who said he has advised his client not to speak publicly about the case. Other attempts to reach Mr. Barton were unsuccessful. This spring, rallies were held from coast to coast by protesters crying foul, saying Ms. Gladue has been the victim, in her death, of racism and injustice. The case has raised questions about the jury system, about consent (Ms. Gladue had a blood-alcohol level roughly four times the legal driving limit around the time she died) and about the treatment of indigenous women by the criminal justice system. “It almost seemed like she didn’t matter,” said Vanessa Day, one of Ms. Gladue’s best friends as a teen. “That spoke volumes to us as aboriginal women.” Protestors march against the acquittal of Bradley Barton in the death of Cindy Gladue in Edmonton on April 2, 2015. (Amber Bracken for The Globe and Mail) Those close to her believe that had it been a white woman in the tub – sex worker or not – and a native man on trial, the accused would have been found guilty and the victim’s vagina would never have been displayed on a courtroom overhead projector. Her family and friends want Canadians to know Cindy Gladue was more than a statistic, more than an addict and more than a piece of tissue. “She’s still human,” Ms. McLeod said. “She still has a name, not just ‘prostitute.’” Ms. Gladue was a mother to Cheyanne Kelly, Brandy Sierra and Brianne Nicole, who recently had her first child. She loved cooking shows and was known for her hearty breakfasts, ribs and apple crisp. She loved to draw. She celebrated Christmas and made summer pilgrimages to Lac Ste. Anne, west of Edmonton, with her family as part of a native Catholic tradition. She listened to Mötley Crüe. Although she was close with her two stepfathers, calling them both “dad,” she longed for a relationship with her biological father and started getting to know him shortly before she died. The eldest of four children, Ms. Gladue leaves behind siblings Jeffrey, Kevin and Marilyn, who said her sister was a loving aunt to her children. Cindy Gladue, back-centre, with her three daughters. (Facebook) Those who knew Ms. Gladue concede she also had her struggles. She was an alcoholic, used crack cocaine, sold her body to support her habit, and, for at least a time, it seems, lived on the streets with her boyfriend of roughly two years, Steven Reid. He testified during the preliminary inquiry that he was the one who connected Ms. Gladue with Mr. Barton after the trucker said he wanted to “be with a woman.” His brother, Jordan Reid, who was a friend of Ms. Gladue, said she used to work the stroll. She tried to care for her girls, but they were mostly raised by Ms. McLeod and Cheyanne’s father, a Ukrainian-Canadian construction worker who, by several accounts, treats all three girls as his own even though Brianne and Brandy are not. Brandy said she prays to her mother sometimes, looks up and tells her how life is going. She misses her mom’s voice singing Sarah McLachlan’s In The Arms of An Angel as a bedtime lullaby; she dreams she is still alive. “She would come to me and I’d be like, ‘Mom, I thought you were gone,’” Brandy, a soft-spoken, petite 15-year-old, said through tears. “And she’d say, ‘No, no, I’m right here.’” A four-plex where Cindy Gladue lived with her daughters in Edmonton. (Amber Bracken for The Globe and Mail) From Athabasca to the streets of Edmonton Cindy Ivy Gladue was born July 23, 1974, at a small, since-shuttered hospital in Athabasca, a northern Alberta town set along the river of the same name. Her parents had a one-night stand, and her father was absent from her life until a couple years before her death, Ms. McLeod said. Cindy was a good and healthy baby – an only child until the age of about five, when her mother, then married to a man named Henry Houle and living in Calling Lake, Alta., had the first of three more children. Mr. Houle, who drowned in 2012, treated Cindy as his own, but his alcoholism and temper, Ms. McLeod said, eventually forced her and the children out the door to Edmonton, 150 kilometres to the south. “I never really liked the city, but I had to get away from Calling Lake,” said Ms. McLeod, a bingo-loving 58-year-old who wears her brown hair in a ponytail. “My husband drank a lot and there was a lot of abuse [toward me], so I decided to go.” Ms. Gladue was nine years old when she started life anew in Edmonton, home to the country’s second-largest Métis population and the second-largest urban aboriginal population. It is also a place where 20 per cent of the sex trade takes place on the streets, primarily on the stroll along 118th Avenue, said Staff Sergeant James Clover, head of the Edmonton Police Service vice unit; of those workers, the majority are native, he said. A 2014 RCMP report found 1,181 indigenous women were killed or went missing in Canada between 1980 and 2012; of the 1,017 homicide victims, 206 were in Alberta. The report determined that aboriginal women are several times more likely to die a violent death or disappear than non-aboriginal women. Last month, remains discovered south of Edmonton – near where Ms. Gladue had her first job, as a hotel cleaning staff – were linked to an indigenous sex worker who had gone missing a decade ago. Ms. Gladue spent much of her youth in northeast Edmonton, going on bike rides with her siblings, drawing and playing Nintendo and volleyball. “She seemed more happy and less worried about when I was going to get the next licking,” Ms. McLeod said. Ms. Gladue attended St. Francis of Assisi Catholic School and lived in a nearby home described by those who knew her then as spacious and well-kept. Growing up, it seems, Ms. Gladue never had much but always enough. She had her own bedroom, food on the table and a hard-working mother to raise her. For years, while the children were sleeping and under the overnight care of a relative, Ms. McLeod and her second husband, Lawrence McLeod, drove vans delivering a local newspaper on a route that took them hours north of the city. “They tried to give them the best life they could,” said Kathy Krywohyza, a family friend who sometimes babysat Ms. Gladue and her siblings while Ms. McLeod was at bingo. Witty and strong-headed, Ms. Gladue had a small but tight-knit group of friends who looked up to her and were convinced that she, of all of them, would make the most of her life. After her Grade 9 prom, where she wore a light-blue gown she picked out at the mall with her mother, Ms. Gladue made a pact with Ms. Day and another close friend, Tania Scott: They would stick together at W.P. Wagner High School, earn their diplomas and stay friends until they were grey. Ms. Scott remembers Ms. Gladue helping her with her homework, especially math. “I always thought she would make more thoughtful decisions than me or Vanessa,” she said. “I understood already that being a young native girl, away from home in a big city like that, it meant either I have to get my act together or it’s going to consume me.” Cindy Gladue. (Handout) For Ms. Gladue, graduation day never came. A few months into Grade 10, she started drinking and hanging out with the “wrong crowd,” in her mother’s words. She did not finish the school year. In her late teens, Ms. Gladue worked the hotel cleaning gig, but she is not known to have held down a job otherwise, Ms. McLeod said; instead, she relied on social assistance and help from family and friends. Her most important job – motherhood – came with the birth of Brianne in 1996 at the Royal Alexandra Hospital in inner-city Edmonton. She was scared but excited to become a mother, getting her own place and furnishing it with the help of Ms. McLeod. One of the first of her friends to come over to congratulate her was an indigenous woman named Ginger Bellerose. About five years later, Ms. Bellerose was found beaten to death on the grounds of a derelict Edmonton hotel; the death deeply affected Ms. Gladue, Ms. McLeod said. In 1999, after a short time back up in Calling Lake, Ms. Gladue gave birth to Brandy. She fell into heavy drinking and briefly lost her children to the province, but her mother helped her regain custody and together they cared for Brianne and Brandy and, later, Cheyanne, born in 2001. Several years later, Ms. Gladue ended her relationship with Cheyanne’s father, Kelly Yakubowski, said his brother, Clinton. By 2010 or so, she had been kicked out of her mother’s home because she was drinking too much and smoking marijuana. “She could’ve done a lot better for herself,” Clinton Yakubowski said. “If she got clean, she’d be working, doing more for herself. She’d probably be with Kelly.” A couple of years before her death, Ms. Gladue started dating Steven Reid. In a Facebook post dated March 30, 2012, he described a relationship with a woman who had been killed, writing that she had loved him even when he was broke. He said they lived on the streets of “ETown” and that “things were looking up” before she died. According to Steven Reid’s brother, Ms. Gladue had been on the streets “a long time” and at one point worked the stroll. In an online exchange with The Globe from jail, Jordan Reid described her as having a “big heart” – a generous woman who sometimes bought him clothes. Steven Reid, who testified during the preliminary inquiry that he was once charged with assaulting Ms. Gladue, told the court the two of them had lived for a time at the Patricia Motel and then at his cousin’s house, about 10 blocks from the Yellowhead Inn, where she died. They drank Black Label beer and did crack together, he testified. While they were dating, Ms. Gladue had a “sugar daddy” named Joe, he said. He also testified they fed their addiction by scrounging through garbage cans and dumpsters for bottles and containers they could return to provincial recycling depots for a fee. “We were alcoholics, hey,” he said matter-of-factly. When the Crown asked him if he had anything to do with Ms. Gladue’s death, he said, “yes” – that he had introduced her to Mr. Barton. “He wanted to be with a woman,” Mr. Reid had earlier told the court, “and I suggested I knew someone.” Room 139 in the Yellowhead Inn in Edmonton where Cindy Gladue was found dead. (Amber Bracken for The Globe and Mail) Bradley Barton and Room 139 In the days before Ms. Gladue encountered Mr. Barton outside the Yellowhead Inn, the Ontario trucker was more than 1,500 kilometres south of Edmonton, in Soda Springs, Idaho. He and two other men had been assigned to pack and load a house and then drive the shipment to Edmonton. But the trip did not go as planned, and the delivery was waylaid by a pair of mishaps that changed the course of his journey, and Ms. Gladue’s life. According to preliminary-inquiry testimony, the movers neared Edmonton around 5 p.m. on June 19, 2011, and stayed at a hotel south of the city. When the shipment failed to clear Canadian customs for delivery the next morning, the job was put on hold and the men rented rooms at the Yellowhead Inn – an establishment with a lounge, which at the time was called Lady Luck. Mr. Reid testified at the preliminary inquiry that it was outside the bar on June 20 that he first met Mr. Barton and learned of his desire to “be with a woman.” Mr. Reid said he went home and told Ms. Gladue about the trucker. Back at the inn a short time later, he waited outside for about an hour while Ms. Gladue earned $60. She and Mr. Barton emerged and hugged goodbye. Mr. Reid, who was not called as a witness at trial, told the court he and Ms. Gladue then bought a six-pack of beer, a half-gram of crack cocaine and went home. “Looks to me like things went well for night number one,” Mr. Bottos, Mr. Barton’s lawyer, said in his closing arguments at trial. “And by the way, she’s a prostitute. She’s there for a good time, not a long time, and proof positive is she’s there on night number one for less than an hour.” Mr. Barton’s delivery was stymied again on June 21 because the moving truck was too large to reach its residential destination. A smaller shuttle was arranged for the next day. Mr. Barton, who at the time had been in a common-law relationship for several years, was back at the Yellowhead Inn for a second night and made arrangements to see Ms. Gladue again. This time, though, Mr. Reid was apprehensive about the transaction. After his girlfriend, who had been drinking that day, jumped in a taxi bound for the inn, he followed her on his bike, he told the court. He said he saw Ms. Gladue with Mr. Barton and another man, and “tried to take her from them.” “I was going to fight them,” he said, according to the preliminary inquiry transcript. “I wanted her to come home. Like, let’s just go. To hell this with this … But, [Mr. Barton said] ‘Oh, I promise you, she’ll come home. She’ll be safe,’ you know?” He said he took $5 from Mr. Barton to buy a beer, went inside, kissed Ms. Gladue and told her to come home. “That was the last time I seen her,” he said. The hallway outside room 139 in the Yellowhead Inn. (Amber Bracken for The Globe and Mail) Ms. Gladue and Mr. Barton had some drinks in the lounge – Smirnoff Ice for her, Molson Canadian for him, to the best of the bartender’s recollection, as stated at the inquiry. They were drinking with a few other people, including one of Mr. Barton’s co-workers, Kevin Atkins, who told the court Mr. Barton was showing affection for Ms. Gladue. Surveillance footage shows Mr. Barton, Ms. Gladue and Mr. Atkins walking toward their rooms at 12:42 a.m. “He asked me if I would like to have a piece of this young lady,” Mr. Atkins said during the preliminary inquiry. “And I said, ‘No, I’m going to eat my food and go to bed.’” He said Mr. Barton then told him something along the lines of, “What happens on the road stays on the road.” What happened in Room 139 was for the jury to decide. The room, near the end of a dimly lit hallway and next to an exit door, has a view of the parking lot and smells of stale cigarettes. The carpet, bedspread and one of the walls are burgundy red. There is a small closet to the left of the entrance, a queen-sized bed, a little fridge, a coffee maker, a television, a lamp, an ashtray on a small table with two chairs, a bathroom with a tub and shower curtain. When investigators arrived at the scene on June 22, they found Ms. Gladue on her back in the tub, the shower curtain red with blood. There was blood on the walls, the tile floor, the sides of the toilet and smeared on the faucets. One officer testified during the preliminary inquiry that blood had “pooled over the side of the tub.” Ms. Gladue’s clothing and purse were found underneath the bathroom counter. The duvet was on the floor beside bed. There was an empty beer box and a couple of beer cans in the room. The bathtub in room 139 in the Yellowhead Inn, where Cindy Gladue was found dead. (Amber Bracken for The Globe and Mail) The Crown argued Mr. Barton had intended to kill Ms. Gladue by inserting a sharp object into her vagina, carried her from the bed to the bathroom and left her in the bathtub to die. The Crown also presented an alternate theory that said Mr. Barton intentionally harmed an intoxicated Ms. Gladue by forcefully thrusting his hand inside her vagina. Then there was Mr. Barton’s account. Over the course of two days of testimony, he told the court Ms. Gladue had been performing oral sex while he manually stimulated her. When he pulled out his hand to have sex, he saw blood, he said. He asked if she was having her period, refused to pay her, washed up and went to bed as she then went to use the washroom. He said he did not discover her body until later that morning, when he apparently panicked, cleaned up the bathroom a little, prepared for work, checked out and got into a van with a co-worker. “I said, ‘We’re gonna have a good day today,’” said the co-worker, John Sullivan, according to the inquiry transcript. “Then he said, ‘Well, not until the police show up.’ So I looked at him and I says, ‘What do you mean?’ And he said to me, ‘Well, there’s a girl in my room bleeding.’” It was at Mr. Sullivan’s urging that Mr. Barton called police, whom he then lied to about the nature of his relationship with Ms. Gladue (his cover story was described by his lawyer as “half-baked” and “pathetically inept”). He told police in the 8:03 a.m. call something to the effect that “I’m still friggin’ shook up here, I don’t know what to do,” the Crown said during closing arguments. When officers arrived at the inn at 8:08 a.m., the court heard, the smell of a corpse was evident before they even got to Room 139. Ms. Gladue’s body was cold. Mr. Barton was interviewed but released; the cause of death had not yet been determined. He made his way to Calgary on a job, but was arrested there on June 24. During his transport back to Edmonton, he lied to an undercover officer, blaming the death on fictitious movers for whom he said he had rented a room at the inn. “What’s the truth?” Crown prosecutor Carrie-Ann Downey said in her closing arguments. “The truth is he knew a lot about Ms. Gladue. She was a prostitute. Her name was Cindy. She had children.” Mr. Barton was released on $15,000 bail and ordered to abide by a curfew at his Mississauga home when not in Edmonton for court proceedings. He was ordered to avoid contact with sex workers. The preliminary inquiry took place during the spring of 2012 and the trial lasted from Feb. 17 to March 18 of this year. The proceedings shook up some of the court staff, including one woman who recalled having nightmares of people with missing body parts and another who pretended the transcript was fictional in order to distance herself from it. No weapon was ever found. No motive was presented, Mr. Bottos pointed out to the jury. A laptop belonging to Mr. Barton that contained a search history of what the judge described as pornography depicting “gaping vaginas and extreme penetration and torture” was not admitted as evidence because both sides agreed it was unlawfully obtained by police, Mr. Bottos told The Globe. It is unclear what time Ms. Gladue died because it is not known when she started bleeding or how long it took for her to die. The forensic pathologist who performed her autopsy determined the cause of death to be a perforating, sharp injury to the vagina; the Crown’s expert agreed, but the defence’s expert testified that blunt-force trauma caused the 11-cm wound. They were in a medical “no-man’s land,” Mr. Bottos said during his closing arguments. Mr. Bottos said in an interview he was relieved at the verdict but “dismayed” at how the case has been portrayed since, saying onlookers would have a different view if they had heard the testimony. He asked jurors not to let the graphic nature of the case – or the presence of human tissue in court – “poison” them against his client. “I want to make something very clear: Cindy Gladue lost her life, and nothing I’m going to say should take away from the dignity of her life,” he told the court. “We understand that she was loved and would have loved and that her death was tragic. It would have been an awful final hour of her life … All I’m asking you is not to let that poison you against Mr. Barton. You have got a job to do. We all do … Ms. Gladue was a human being, and there is inherent value in every human being’s life.” Cindy Gladue's mother, Donna McLeod, and daughter, Brandy Sierra Gladue, 15, in Edmonton. (Amber Bracken for The Globe and Mail) ‘Some day we’ll find peace … but not now’ Ms. Gladue’s ashes are kept in an urn in her mother’s bedroom, where Ms. McLeod often lies awake at night, praying to her daughter and trying desperately to block out the image she saw of her in the bathtub. “It’s hard to let go,” Ms. McLeod said, breaking down into a quiet cry. “The other day, I went to bed and told her, ‘Cindy, there’s so much going on here right now. I don’t know what to do any more.’” She remembers the last conversation she had with her daughter, two days before her death. Ms. Gladue had stayed overnight and said she could not make breakfast this time because she had to rush to a doctor’s appointment. “I said to her, ‘Cindy, when you’re gone, who’s going to cook for me?’ I didn’t know those would be my last words to her.” They will never celebrate another New Year’s Eve together. Ms. Gladue will never meet her first grandchild, Angel Ameliano, born in January to Brianne, who cried at her mother’s absence right after labour. Cindy Gladue, centre, with family. (Facebook) She will not celebrate any more Christmases around the tree, any more birthdays with her girls. Brandy has the leather jacket her mother gave her for her birthday a week before she died, but she lost the card. It bothers her still. She has stopped going to school because she was being bullied for reasons she does not know, but hopes to graduate to make her mother proud. She now sees herself as a mother-figure to Cheyanne, who lives with her father and wakes up with nightmares. “How can I kill myself when I’m already dead,” Cheyanne wrote on Facebook on April 2, the day supporters rallied in Edmonton and across the country in honour of her mother. She explained the comment to concerned friends online, saying, “It’s a quote and I do feel broken and I don’t know what to do about it half the time I wanna talk to someone but every time I try it’s like the words wont [sic] come out or I don’t know what to say thanks for standin by my side today.” Cindy Gladue's mother Donna McLeod, second left, comforts Gladue's daughters Brandy, 15, and Cheyanne, now 14, right as protestors demonstrate against the acquittal of Bradley Barton. (Amber Bracken for The Globe and Mail) Last Sunday, she wrote: “Happy Mother’s Day mum rest in paradise.” This summer, Ms. McLeod plans to spill Ms. Gladue’s ashes over a family grave site in Athabasca, the town where her daughter’s life began four decades ago. Her heart is closed to forgiveness, at least for now. She harbours too much anger, feels too much pain, has too many questions. “I’m a forgiving person, but I really need to know what went on in that room,” Ms. McLeod said. Mr. Barton, meantime, lives across the country, in Ontario, with his common-law spouse of about a decade, Mr. Bottos said. He said his client lost his long-distance trucking job but then managed to find other work. According to Industry Canada records, Mr. Barton, 46, filed for bankruptcy in March of 2012, was responsible for monthly child-support payments and recently worked at a plywood company. A manager there said he is no longer an employee. He also no longer resides at the Mississauga address listed in his 2011 bail conditions, having moved from the rental unit a couple years ago, the property manager said. Ms. McLeod thought the verdict would be the end of the public saga – that she would go home and it would all be over. Instead, strangers turned out in droves to denounce the acquittal and call for an appeal. Instead, she anxiously awaits the next round of legal proceedings and tries to quiet the fear that, no matter what happens, her family will never be free from the weight of their grief. “I guess some day we’ll find peace,” she said. “But not now.” Kathryn Blaze Carlson is a national reporter with The Globe and Mail. With a report from Stephanie Chambers
2024-07-10T01:27:04.277712
https://example.com/article/1448
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --><html><head><meta http-equiv="Content-Type" content="text/html;charset=iso-8859-1"> <title>Apache log4cxx: Member List</title> <link href="doxygen.css" rel="stylesheet" type="text/css"> <link href="tabs.css" rel="stylesheet" type="text/css"> </head><body> <!-- Generated by Doxygen 1.4.6 --> <div class="tabs"> <ul> <li><a href="main.html"><span>Main&nbsp;Page</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li id="current"><a href="classes.html"><span>Classes</span></a></li> <li><a href="files.html"><span>Files</span></a></li> </ul></div> <div class="tabs"> <ul> <li><a href="classes.html"><span>Alphabetical&nbsp;List</span></a></li> <li><a href="annotated.html"><span>Class&nbsp;List</span></a></li> <li><a href="hierarchy.html"><span>Class&nbsp;Hierarchy</span></a></li> <li><a href="functions.html"><span>Class&nbsp;Members</span></a></li> </ul></div> <h1>ManualTriggeringPolicy Member List</h1>This is the complete list of members for <a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html">ManualTriggeringPolicy</a>, including all inherited members.<p><table> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html#580abdcb8fd42d07eaf679166f77bc34">activateOptions</a>(log4cxx::helpers::Pool &amp;)</td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html">ManualTriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html#0198815940c2715c84b0e04828cf8dfa">addRef</a>() const </td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html">TriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#5a7744a4efdb699356cef215613903c3">cast</a>(const Class &amp;clazz) const =0</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [pure virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#e7b62e37794f297c0cede40ed0e84fcd">getClass</a>() const </td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#0bdbda4effe8938c1aca6d4397e5a39d">getStaticClass</a>()</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [static]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#3604a5fb08f7048d41b51a3943740b96">instanceof</a>(const Class &amp;clazz) const =0</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [pure virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html#d1465d1456055bf68fc9c3a7416bb862">isTriggeringEvent</a>(Appender *appender, const log4cxx::spi::LoggingEventPtr &amp;event, const LogString &amp;filename, size_t fileLength)</td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html">ManualTriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html#98127eb72b279fd87b42ced604a61565">ManualTriggeringPolicy</a>()</td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html">ManualTriggeringPolicy</a></td><td></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html#5e6e9fc30dc1f098fee72d516ea0bad0">ObjectImpl</a>()</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html">ObjectImpl</a></td><td></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html#88f2ae00c84f3f309965e6588ed158d4">ref</a></td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html">ObjectImpl</a></td><td><code> [mutable, protected]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#50ec9288d0b7e3140dee8e24ee74a212">registerClass</a>()</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [static]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html#55c31efee1904916b999395fa4d46a24">releaseRef</a>() const </td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html">TriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html#c1d269357907e0809687a2bec962e1c8">setOption</a>(const LogString &amp;option, const LogString &amp;value)</td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_manual_triggering_policy.html">ManualTriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html#b5cc4f9ba1ea5c2f25bc4b1f0dac5dc5">~Object</a>()</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object.html">Object</a></td><td><code> [inline, virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html#bb974728bb3cb991285140c1aa57eed7">~ObjectImpl</a>()</td><td><a class="el" href="classlog4cxx_1_1helpers_1_1_object_impl.html">ObjectImpl</a></td><td><code> [virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1spi_1_1_option_handler.html#d773ac49843844af53fe553912ed63e5">~OptionHandler</a>()</td><td><a class="el" href="classlog4cxx_1_1spi_1_1_option_handler.html">OptionHandler</a></td><td><code> [inline, virtual]</code></td></tr> <tr class="memlist"><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html#2a10a93bd44a9b87f3d7356c1d3aea68">~TriggeringPolicy</a>()</td><td><a class="el" href="classlog4cxx_1_1rolling_1_1_triggering_policy.html">TriggeringPolicy</a></td><td><code> [virtual]</code></td></tr> </table><!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> </BODY> </HTML>
2023-11-07T01:27:04.277712
https://example.com/article/8618
Oh well. A real head scratcher this one. Usually these head scratchers end up being some odd back end configuration issue with your account. That's the worse kind of problem as CSRs don't have any exposure to that and can't help you. - Tried playing with uPnP. Nothing seemed to make a difference - Tried basically making my Verizon Router wide open all TCP/UDP ports any to any open. Yeah, didn't leave it that way for long but did force TiVO and Stream service connections - Tried an earlier suggestion and changed the name of the Roamio at TiVo Account/Device preferences (also unchecked all the boxes) waited, forced TiVo connection and service call. Made sure that the TiVo name changed in system info and the TTG changed from a,a,a,a to i,i,i,a (not sure if this last a is telling) I am assuming since the 4th "a" is new to the Roamio systems (not on my HD's) that this related to the Stream being active or inactive. Anyone know? Could this be indicative of the Stream not getting its state toggled? I think I am done. There were many restarts/reboots in all of this. What I NEED is some knowledgable engineer at TiVo to give me a call...HINT, HINT! I am afraid I am going to have to do the same thing as my window for return is ending. The part that sucks is we have already taken advantage of the expanded recording space and I have to transfer all the things on it to somewhere else. Grrr. In the end, she finally suggested that I return the box to Best Buy and get a new one. Well that's lame... Did you ever hear back from anyone in the engineering department? or did you just go through the motions with support? As helpful as they can try to be, there's only so much that can be done without know what in the code casuses the status values to be printed. At least it will be a useful data point to know if a replacement unit works for you. __________________ 1 Roamio Plus 2 Lifetime Premieres, 2 HDs, 2 S2DTs 1 Original Philips S1 from all the way back in 1999! I am afraid I am going to have to do the same thing as my window for return is ending. The part that sucks is we have already taken advantage of the expanded recording space and I have to transfer all the things on it to somewhere else. Grrr. Is there a way of doing a bulk transfer of the recorded shows to another device? Did you ever hear back from anyone in the engineering department? or did you just go through the motions with support? As helpful as they can try to be, there's only so much that can be done without know what in the code casuses the status values to be printed. At least it will be a useful data point to know if a replacement unit works for you. No - never heard back from anyone in the engineering department. I asked several times for this to be escalated, but that went nowhere. Others on the forum have sent emails to TivoMargret but that channel has gone un-answered as well. For what it's worth, I also own a standalone stream, which I've had unplugged ever since the Roamio arrived. Today, I plugged it back in. 1) The iPad APP is smart enough to recognize there are two streams and let me choose which one I want. 2) The standalone stream works fine, and streams content from the Roamio. That's a very interesting data point that eliminates any contention by TiVo that somehow your network setup is to blame. Since the Roamio Stream is same hardware and has same software as the standalone, this even more heavily suggests some kind of account back end configuration issue related to the Roamio. Replacing the Roamio could possibly fix the issue due to getting a renewed back end configuration to go along with new unit, but seems like overkill if that is indeed the only issue. No - never heard back from anyone in the engineering department. I asked several times for this to be escalated, but that went nowhere. Others on the forum have sent emails to TivoMargret but that channel has gone un-answered as well. Excellent way to frustrate your customers, Tivo. Over at ExplorerForum.com, they have a few dedicated Ford representatives that will field calls for problems like this. This works very well and the customer feels taken care of. At this point, I would return before time runs out. Reactivate and see if it works. Nothing changed on my network and everything is working fine now. That's a very interesting data point that eliminates any contention by TiVo that somehow your network setup is to blame. Well, yes and no... I've had the standalone stream since the pre-sale contest, so I set it up a long time ago, and the software has probably changed a lot during that time. Given that the Roamio's stream is failing during the setup phase and the standalone stream is already set up, it's not a direct apples-to-apples comparison. I tend to agree with you that it's probably an account database issue on Tivo's end, and we're all stuck in a holding pattern because apparently the proper procedure to escalate an issue to engineering doesn't exist (or isn't dealt with in a timely manner). I would also suspect those who return their Roamios are 'sovling' the problem simply by virtue of getting a fresh new database record for a new TSN. __________________ 1 Roamio Plus 2 Lifetime Premieres, 2 HDs, 2 S2DTs 1 Original Philips S1 from all the way back in 1999! I just used KMTTG to move all the files in the native TiVo format over to my NAS box. The NAS box has a DLNA server which makes moving things back a snap. The TiVo sees the server and everything comes back with all the metadata and all. GigE between the TiVo and the NAS means it did not take very long to move a hundred or so Gig of files. My Roamio is going back tomorrow. Now I am just fighting with moving the Season Passes as the TiVo site does not seem to see the 60 or so Season Passes on the Roamio (oh joy!) it did when I moved them from the HD Tivos to the Roamio. I just used KMTTG to move all the files in the native TiVo format over to my NAS box. The NAS box has a DLNA server which makes moving things back a snap. The TiVo sees the server and everything comes back with all the metadata and all. GigE between the TiVo and the NAS means it did not take very long to move a hundred or so Gig of files. My Roamio is going back tomorrow. Now I am just fighting with moving the Season Passes as the TiVo site does not seem to see the 60 or so Season Passes on the Roamio (oh joy!) it did when I moved them from the HD Tivos to the Roamio. Just curious because I'm in the market for one....what's your NAS box? I just used KMTTG to move all the files in the native TiVo format over to my NAS box. The NAS box has a DLNA server which makes moving things back a snap. The TiVo sees the server and everything comes back with all the metadata and all. GigE between the TiVo and the NAS means it did not take very long to move a hundred or so Gig of files. My Roamio is going back tomorrow. Now I am just fighting with moving the Season Passes as the TiVo site does not seem to see the 60 or so Season Passes on the Roamio (oh joy!) it did when I moved them from the HD Tivos to the Roamio. Must be Netgear Ready DLNA which includes TiVo ToGo under the hood. Most DLNA implementations out there do not support TiVo ToGo. You chose well. I just used KMTTG to move all the files in the native TiVo format over to my NAS box. The NAS box has a DLNA server which makes moving things back a snap. The TiVo sees the server and everything comes back with all the metadata and all. Does it keep the Closed Caption after you move back to TiVo? I used ReadyTiVo and I don't have CC anymore after move out and back in TiVo. Not sure about the CC, but as far as I know it is just moving the original .tivo file out and back, no decrypting, decoding or re-encoding. So I would think yes. I will test it when I move something back later tonight or tomorrow. Does it keep the Closed Caption after you move back to TiVo? I used ReadyTiVo and I don't have CC anymore after move out and back in TiVo. That problem is a TiVo bug with series 4 and later units. The captions are present in the stream following TTG transfer. The problem is for series 4 and later units if you transfer back in mpeg2 program stream container then TiVo wipes out the captions. You have to transfer back in mpeg2 transport stream container to preserve captions. pyTivo has a "ts=on" property you can enable to make sure when you transfer back that it remuxes to transport stream container when necessary. In general if the goal is just to move everything back to TiVo and you want to preserve captions, you should download in TS container mode (TiVo Desktop and kmttg have options to turn that mode on/off). But even if you haven't done that, you can force it to transfer back and preserve captions using recent pyTivo with the above setting on. Anyway, I think this discussion is getting way too far off topic for this thread. Well, I got a new Roamio Plus today at Best Buy and brought it home and set it up and BAM everything works. Here is my process: - Picked a new one that had a substantially different TSN (just in case) - Called TiVo and gave them the new TSN and told them it was an exchange for the old one - Checked the TiVo site to be sure the new TSN was in my account - Attached the cable, network and HDMI first, then power (no CableCard installed) - Powered up the Tivo - Took it through guided set-up and said I will install CableCard later - Waited for it to do all updates and boot into operational status - Slide in the CableCard and went online to Verizon Live Chat and gave them the CableCard ID, Host and Data information - Informed them they needed to do "Manually Validate Set Top Box" (all info was right in conditional access - ask me if you need more info on this) - Tested all the channels including HBO and Cinemax, which were an issue on the activation of the first Roamio - Went into the Netflix app which fired right up and entered my Netflix info, all good! - Used KMTTG to move my season passes back to the new Roamio from my previous save, all good! - Fired up my TiVo app on my iPhone, checked the box for in-house and out of house and it ran the set-up without error!!!! OMG!!!! - Tested in-house, will have to wait for OOH until tomorrow, all good!!!! - Forced a connection to TiVo service to get the guide info it did not seem to quite have until the CableCard was fully and properly paired - Used my ReadyNAS DLNA with TTG support to move all my .tivo files back to the Roamio. Ok, it is still doing that at the moment, but progressing nicely. Pretty psyched at this point! No idea why it works now, but I can tell you for sure it has NOTHING to do with network configuration as I put my network back exactly the way it was before I started all this. It is either a hardware or an activation issue.
2023-09-24T01:27:04.277712
https://example.com/article/3804
Social Icons Pages During his time in office, President Barack Obama has made 39 international trips to 48 different countries. What’s interesting is that the President of the United States hasn’t actually been to all 50 states. Research destination guides, get inspirational world travel guide recommendations, see photos, videos, trip plans, and more....
2024-06-16T01:27:04.277712
https://example.com/article/3574
ABOUT US OUR ACTIVITY ABOUT PROGRAM Our Non-formal civic education program work at North Caucasus from 2012 year. Goal of program – promotion of personal and professional development of the youth for its involvement in the life of local communities.
2024-05-22T01:27:04.277712
https://example.com/article/9903
Adenosine: an effective and safe antiarrhythmic drug in pediatrics. Adenosine is an effective, safe drug for the diagnosis and treatment of paroxysmal tachycardias in adult and pediatric patients. A starting dose of 0.05-0.10 mg/kg as a rapid bolus injection is recommended for infants and children. An electrophysiologic effect can be expected within 20 seconds after injection. Dosage may be increased up to 0.3 mg/kg in steps of 0.05-0.10 mg/kg or until conversion to sinus rhythm is reached. Due to its basic electrophysiologic properties of slowing conduction in the atrioventricular (AV) node, which may result in transient AV block, adenosine is almost always effective in terminating supraventricular tachycardias in which the AV node forms a critical part of the reentrant circuit (i.e., AV nodal reentrant tachycardia and AV reciprocating tachycardia). Based on its properties, adenosine is also advocated as a useful diagnostic tool for unmasking primary atrial tachycardias by inducing transient high grade AV block. Advantages over other antiarrhythmic agents include the agent's short half-life (<2 seconds) and minimal or no negative influence on blood pressure. Because of its short half-life, however, early recurrence of the tachycardia is observed in up to one-third of patients treated. Based on rare but serious unwanted side effects, patients with known or suspected irritable airways and sinus node dysfunction and those who have undergone orthotopic cardiac transplantation should probably not be given adenosine. Adenosine may be recommended as the drug of choice for treatment of paroxysmal tachycardia in young patients. Primary success rates range between 85% and 100% of all the tachycardia episodes treated. Termination of the tachydysrhythmia, however, does not always mean that the underlying dysrhythmia was of supraventricular origin with the AV node as a critical part of the tachycardia mechanism. Rare but possible life-threatening side effects (prolonged sinus arrest and complete AV block, atrial fibrillation, acceleration of ventricular tachycardia, apnea) necessitate proper monitoring of the patients.
2024-03-30T01:27:04.277712
https://example.com/article/8560
We are having a little problem on a server. We want that some users should be able to do e.g. sudo and become root, but with the restriction that the user can't change root password. That is, a guarantee that we still can login to that server and become root no matter of what the other users will do. You can use sudo to grant permission for specific root-privileged application only. In that way, user will not be allowed to change the root password – SHWDec 16 '13 at 8:48 24 WHY do you need sudo for these users. If you don't trust them, don't give them sudo access in the first place. Also note that ideally, root should not have a password at all, but you should use other means of authenticating. (Which the user will still be able to "hack", even if you would protext /etc/passwd) – Anony-MousseDec 16 '13 at 11:48 3 What do those users need to do exactly? – Olivier DulacDec 16 '13 at 14:20 4 What are they going to be doing with their root-privileges? There might be a better solution than what you are thinking of. – sparticvsDec 16 '13 at 14:24 21 This is one of those "Can God make a boulder so large he himself cannot lift it?" type questions. If you have root access, you can do anything, which is why root access is best given judiciously. sudo and setuid can solve most problems. – bdowningDec 16 '13 at 16:58 19 Answers 19 We want that some users should be able to do e.g. sudo and become root, Well, that's the problem sudo is designed to solve, so that part is easy enough. but with the restriction that the user can't change root password. You can, as SHW pointed out in a comment, configure sudo to only allow certain actions to be taken as root by certain users. That is, you can allow user1 to do sudo services apache2 restart, allow user2 to do sudo reboot but nothing else, while allowing the hired-as-system-administrator user3 to do sudo -i. There are howtos available on how to set up sudo like that, or you can search (or ask) here. That is a solvable problem. However, a user that has been granted the ability to sudo -i or sudo into a shell (sudo bash, for example) can do anything. That is because by the time sudo launches the shell, sudo itself is out of the picture. It provides the security context of a different user (most often root), but has no say in what the executed application does. If that application in turn launches passwd root there is nothing sudo can do about it. Note that this can be done through other applications, too; for example, many of the more advanced editors provide facilities to execute a command through the shell, a shell which will be executed with the effective uid of that editor process (that is, root). That is, a guarantee that we still can login to that server and become root no matter of what the other users will do. Sorry; if you really do mean "ensure we'll be able to log in and use the system no matter what someone with root access does to it", that (for all intents and purposes) cannot be done. A quick "sudo rm /etc/passwd" or "sudo chmod -x /bin/bash" (or whatever shell root uses) and you are pretty much hosed anyway. "Pretty much hosed" meaning "you'll need to restore from backup and hope they didn't do anything worse than a slip of fingers". You can take some steps to reduce the risk of an accidental mishap leading to an unusable system, but you cannot prevent malice from causing very serious problems up to and including the point of needing to rebuild the system from scratch or at the very least from known good backups. By giving unfettered root access on a system to a user, you trust that user (including any software they might choose to execute, even something as mundane as ls) to not have malicious intent, and to not mess up by accident. That's the nature of root access. Limited root access through e.g. sudo is a bit better, but you still have to be careful to not open up any attack vectors. And with root access, there are plenty of possible attack vectors for privilege escalation attacks. If you can't trust them with the level of access that being root entails, you'll need either a very tightened down sudo configuration, or to simply not grant the user in question root access at all through any means, sudo or otherwise. @DavidCowden Yeah, it seems this is the case here... – Joseph R.Dec 17 '13 at 10:48 1 @JosephR. No worries for me. The Stack Exchange community isn't always predictable, and questions that already have lots of upvotes do tend to attract more. Thanks for the upvote, though. :) – Michael KjörlingDec 17 '13 at 11:55 Thanks, I used the info you gave here, but forgot to accept the answer. – 244anMar 14 at 12:09 This is practically impossible. First of all, if you grant them the power of becoming root, then there's nothing you can do to prevent them from doing anything. In your use case, sudo should be used to grant your users some root powers while restricting others without allowing them to become root. In your scenario, you would need to restrict access to the su and passwd commands and open access to pretty much everything else. The problem is, there's nothing you can do to prevent your users from editing /etc/shadow (or /etc/sudoers for that matter) directly and dropping in a replacement root password to hijack root. And this is just the most straightforward "attack" scenario possible. Sudoers with unrestricted power except for one or two commands can work around the restrictions to hijack full root access. The only solution, as suggested by SHW in the comments is to use sudo to grant your users access to a restricted set of commands instead. Update There might be a way to accomplish this if you use Kerberos tickets for authentication. Read this document explaining the use of the .k5login file. I quote the relevant parts: Suppose the user alice had a .k5login file in her home directory containing the following line:bob@FOOBAR.ORG This would allow bob to use Kerberos network applications, such as ssh(1), to access alice‘s account, using bob‘s Kerberos tickets. ... Note that because bob retains the Kerberos tickets for his own principal, bob@FOOBAR.ORG, he would not have any of the privileges that require alice‘s tickets, such as root access to any of the site’s hosts, or the ability to change alice‘s password. I might be mistaken, though. I'm still wading through the documentation and have yet to try Kerberos out for myself. How did you do that cool reference to a comment? I looked at the source for your answer and saw () surrounding it. Cool secret hat! – JoeDec 20 '13 at 23:24 @Joe The time a comment was posted is actually a link to the comment itself. – Joseph R.Dec 20 '13 at 23:33 @Joe Find the id (<tr id="thisistheid"...) to the comment (e.g. in Chrome right-click and Inspect element), then append it to the thread link with a preceding #. In your case (id = comment-162798) it looks like this: unix.stackexchange.com/questions/105346/… – polymJul 27 '14 at 9:53 1 Thanks for the answer, I didn't know if I should accept this or that from @Michael Kjörling, I chose his because that has more description - needed by a noob like me :) However, yours was also helpful – 244anMar 14 at 12:17 I'm assuming you want to make sure you have an "emergency admin" access, even if your actual administrator screws up (but other than that, you trust the main administrator fully). A popular approach (although very hackish) is to have a second user with uid=0, commonly named toor (root backwards). It has a different password, and can serve as a backup access. To add, you'll likely need to edit /etc/passwd and /etc/shadow (copy the root lines). It's all but fail-safe, but if you just need to safeguard against the "main administrator" changing the password without notice, then it will work. It's trivial to disable, by removing the toor account; so the sole benefit is having a separate password. Note that the admin can still screw up badly. For example, by blocking the firewall. If you want to have a very secure system, consider using SELinux, where the unix user (e.g. root) is also coming with a role, which can be much more fine grained. You may want to give your admin root access, but only a restricted role (e.g. to administrate apache only). But this will require quite a lot of effort on your side to correctly configure the policy. This doesn't actually prevent user toor from changing the root password; it only provides a second password to become root with. – alexisDec 16 '13 at 12:30 2 -1, then. You're suggesting a backdoor password so that the admins can recover root access after they lose it??? That's just wrongheaded, and besides the pesky users could easily disable it, as you say. There are much more reliable ways to set up a backdoor. – alexisDec 16 '13 at 14:03 2 @alexis That is what IMHO the author of the question asked for. Why give -1 for this? toor recovery accounts has been a common practise (although frowned upon) on Unix for decades. – Anony-MousseDec 16 '13 at 17:08 9 If the only goal is to prevent against accidental password changes, this is a good answer. If the goal is to prevent anything malicious, this isn't much help. Since the OP didn't say what the goal was, we don't know. – BobsonDec 16 '13 at 17:18 2 Which is why I stated that in my first sentence: "screws up ... other than that, you trust ... fully". This is really only a "support access" solution; not a security feature. Using additional root ssh keys achieves the same, without being hackish. – Anony-MousseDec 17 '13 at 8:47 You can probably do this using SELinux. This allows you to set up much more precise rules about what a user or process is or isn't allowed to do. Even with SELinux, it may be tricky to make it impossible for a user to change the root password, but still able to do whatever they may need to do. Really it depends on what the user who isn't allowed to change the root password actually does need to be able to do. It would probably be easier and safer to just work out what that is, and grant those permissions specifically using sudo. While doing this with SELinux may in theory be possible (and I'm not convinced), claiming that it is without showing actual rules isn't going to help anyone. – GillesDec 16 '13 at 22:00 @Gilles well actually, this is what SELinux was designed for. SELinux is a layer of permissions required in addition to standard POSIX permissions. On a properly configured SELinux machine, root access is meaningless since your true permissions are determined by the security context and object labeling. – tylerlDec 21 '13 at 17:51 Theoretically, it may still be doable with SELinux; however, the setup of something like that would need to be more complex, to ensure a robust separation for ALL SELinux-related config files from the "normal" file-system (to which the root user has full access). In the end, the "easiest" method for such separation (with or without SELinux) would be to go with something like Kerberos, as mentioned by Joseph R. – ILMostro_7Oct 14 '14 at 9:12 The essence of root is to have unrestricted command of the system. You could tweak it with SELinux (there used to be a demo site where anyone could log on as root, but its power was crippled through the access system), but that's not the point. The point is that this is the wrong solution to your problem. Now, you haven't said what your problem is, but if you don't trust these users to keep their hands off the root password, they have no business being root. If they need to administer the webserver, or various hardware devices, or the warp drive or whatever, set up a solution for that. Create a super-powered group, give it all the access it needs, and add them to it. If they need to execute root-only system calls, write some setuid programs. Of course a user with that kind of access (and a bit of knowledge) could probably easily hack the system, but at least you're working with the OS security model, not against it. PS. There are many ways to arrange root access for yourself without the password; for one, if you're in /etc/sudoers (without restrictions) you only need your own password to become root, e.g. with sudo bash. But you simply shouldn't need to go there. Perhaps you should consider letting the users have root access to a virtual machine or LXC container. That would allow them to have full root access to a system, without letting them prevent you from logging into the host or taking administrative actions. There's always the possibility that a malicious user will read this script and nuke the backup copy. – Joseph R.Dec 16 '13 at 9:07 This is also pretty much what vipw and friends do already. – Michael KjörlingDec 16 '13 at 9:10 Consider it program, and having only root access – SHWDec 16 '13 at 9:11 @SHW Then the malicious user can probably strace it or even (with enough perseverance) disassemble it and reverse engineer it. – Joseph R.Dec 16 '13 at 9:48 4 Why would you GRANT root access to a potentially malicious user??? As root, it is trivial to install a back door that does not depend on going through sudo and/or the wrapper... – alexisDec 16 '13 at 20:34 "The statement that sudo is just for granting root and there is no protection after that is blatantly false." Let's say I grant sudo vi access to a user because I want them to be able to edit system configuration files. That user then does :!/bin/bash inside a sudo vi session. How does sudo's ability to restrict what commands a user can execute through sudo help protect my system under those circumstances? (Nobody has said sudo can't be configured more tightly than an all-or-nothing sudo -i approach.) – Michael KjörlingDec 16 '13 at 9:09 5 Understanding the limitations of an approach is easily as important as knowing how to perform a task. – Michael KjörlingDec 16 '13 at 9:15 1 @MichaelKjörling, I think this is just an example. But to be clear, the right way to let users edit system config files is to let them run sudoedit. You can specifically identify which files they should be able to sudoedit. This is in man sudoers. – Matthew FlaschenDec 17 '13 at 5:09 (I don't know ubuntu, but it should be similar to Fedora/Red-Hat) The only thing I can imagine restricting access to changing the root password is not giving full root access, maybe with sudo, or using SElinux to restrict access to the password file... but I would not trust either with much access as root generally has unrestricted access and could update SElinux, or relabel the password file, or run some pre-prepred program to change the password. If you don't trust them enough to not change the password you probably shouldn't be giving them root access. Otherwise I would guess you are trying to avoid accidents. If you are only trying to protect your access to root, setup a program that can restore the root password, so even if it's changed it can be restored with minimal access. (sudo does well on it's own) We are having a little problem on a server [...] that is, a guarantee that we still can login to that server and become root no matter of what the other users will do. From your question it seems as though you are not facing random malicious users intent on destroying your system, but instead have semi-trusted users who may cause mischief now and then (students perhaps?). My suggestions address that situation, not an all-out assault by malicious users. Run the server inside a virtual environment. You will be able to mount the server's filesystem and replace altered files with known-good versions. Depending on the possible damage you anticipate, you could take a snapshot of all critical directories (/bin, /sbin, /etc, /usr, /var, etc.) and expand the snapshot to overwrite damaged files while leaving the rest of the system intact. Run the system read-only, e.g. from a DVD-R. If you can live with most parts of the system being static until the next reboot, this is a good option. You could also use a read-only backing store with a virtual environment or load the base system over the network, making changes between reboots much easier than writing a new DVD-R. Kernel modules. The kernel's Linux Security Modules (LSM) provide the basis for creating secure modules. LSM is used by SELinux, but is also used by a number of lesser-known and simpler systems, such as Smack, TOMOYO, and AppArmor. This article has a good overview of the options. Chances are one of those can be configured out-of-the-box to prevent write access to /etc/passwd, /etc/shadow, or any other file(s) you want, even by root. The same idea as #1, but when the server isn't in a virtual environment. You could have the server chain-load into a read-only OS such as a live CD, which would automatically mount the server's filesystem and overwrite the base system on each boot with known-good copies. The read-only OS would then boot into the main OS. Again, assuming these are semi-trusted users who are accountable to a higher-up (teacher/boss), the best answer may be Linux Audit. This way you'll know every security-relevant action taken and who took it (you'll know who took it because even if all users share the root account, they will have sudo'ed from their user account first). In fact you might even be able to parse the audit log in realtime and replace damaged files. /etc/shadow overwritten? No problem, just have the monitoring server instantly replace it with a known-good version. To complement the other answers, I'm going to assume the scenario is that you perceive losing control of root a rare situation, and that in those cases a server reboot is allowed. (After all, if you believe the machine has been compromised you will want to take it offline anyway.) The great advantage of this is that there is nothing to configure. Your question becomes: "I've forgotten root password, how do I get back in?" And the answer to that is to reboot, and choose single-user mode when the machine comes up. That gives you a root shell without needing to know the password. At that point you can set a new password. (As well as go and repair any damage...) No. As Michael so aptly noted, a malicious user can prevent root access without necessarily hijacking the password by simply messing up the binaries. Even the init=... approach may be prevented removing execute permissions from pertinent binaries. I think a better solution in this case, is to mount your root filesystem via LiveCD and (try to) fix the damage. Then again, if you believe the system has been compromised, you're better off restoring from backup anyway. – Joseph R.Dec 16 '13 at 23:46 Agreed @JosephR; discovering and fixing damage is complicated, and I'd just reinstall too. But I'm guessing the OP's concern was more about someone accidentally locking them out... deliberately hacking in a work or school situation is a bit suicidal. ;-) – Darren CookDec 16 '13 at 23:56 Not necessarily. A truly malicious user combined with a careless/clueless sysadmin can escalate privileges undetected. I do agree that the OP's original intent was probably to ward off innocent mistakes rather than to guard against malicious intent, but the question was tagged "security" and we just ran with it, I guess :) – Joseph R.Dec 16 '13 at 23:59 If you clone your server into a VM (such as VirtualBox), you can give unfettered root access to people and still guarantee that you'll always have direct access to the guest operating system's partition(s), and therefore maintain final control over /etc/passwd and the like, since you will have root on the host system. Of course, giving unfettered root access may still not be the right solution: if data security is at all an issue or your responsibility, you can't give root access away. The requirement is not technically possible. As already eloquently commented, granting unlimited or even more limited sudo rights to a user means you trust that user. Somebody having evil intentions and enough technical ability and perseverance can go through any obstacles that are put in place. However, assuming you can trust your users to not be evil-intentioned, you can make the restriction on password changing a matter of policy. You can create a wrapper for passwd program that will remind them "please do not change the root password". This assumes the source of the problem is that the users that are changing the root password are doing it due to a misunderstanding (like maybe thinking they are changing their own password after having done sudo bash). Under special (rare) circumstances, if complete trust is not possible and it is not possible to break the sudo access to adequate but reasonably safe chunks, you might consider establishing organizational sanctions against password changing (or any other specified form of system tampering), arrange monitoring of critical resources so that it is not easy to go undetected to get around the set policies - and be public and transparent about the usage rules and monitoring. The monitoring and discovery aspect is hard technical problem benefiting from another question should you choose to walk that path. It seems to me we would need to detect when a user changes identity to root and keep track of any created processes; log the process creations from then on to see who is the original user responsible for each process, and using remote host where the half-trusted users do not have access to send the logs; use some kind of system tracing to log what is happening and to later be able to discover who was behind the policy violation. We would at least need to log opening of other than safe set of files for writing, process creation, exec(), and of course any attempt to change networking. Implementation could be done by modified libc or (much better) system call tracing. Of course, it is impossible to make such tracing and logging work 100% correctly, it is not easy to implement, and it also requires additional resources to operate. This would not stop the password change or other unwelcome system tampering, but it would make it (more likely) possible to find the guilty user or at least create an illusion that there is monitoring and make it less inviting for some evil minded users (but some problem loving hackers who see the fundamental futility of the technical measures put in place might feel encouraged to embrace the challenge and try to circumvent the system just for the fun of it). The originaly formulated question is useless. It looks like the main goal is "still have login" so speaking about some emergency enter which keeps working for sure even with root access granted to another person. Cheers to Anony-Mousse who first noted It explicitly. The problem is: If the owner has physical access to the box It can easily recover logical acces to the system (providing It is still alive:). If not - keeping root password will not rescue from e.g. sshd down or bad networks setup, thus the system is still not accessible anyway. The topic about how to prevent the system from damage by a person with administrative privileges seems too broad to fit SE question format. Speaking about remote emergency enter solution the best way is IPMI (I think) if It is available. The system owner can attache virtual drive anytime, boot from It and procced with system recovery. If IPMI is not available any suitable virtualization technology can to be work-around, as have already been proposed above. To fully explain the syntax of /etc/sudoers, we will use a sample rule and break down each column: jorge ALL=(root) /usr/bin/find, /bin/rm The first column defines what user or group this sudo rule applies to. In this case, it is the user jorge. If the word in this column is preceded by a % symbol, it designates this value as a group instead of a user, since a system can have users and groups with the same name. The second value (ALL) defines what hosts this sudo rule applies to. This column is most useful when you deploy a sudo environment across multiple systems. For a desktop Ubuntu system, or a system where you don't plan on deploying the sudo roles to multiple systems, you can feel free to leave this value set to ALL, which is a wildcard that matches all hosts. The third value is set in parentheses and defines what user or users the user in the first column can execute a command as. This value is set to root, which means that jorge will be allowed to execute the commands specified in the last column as the root user. This value can also be set to the ALL wildcard, which would allow jorge to run the commands as any user on the system. The last value (/usr/bin/find, /bin/rm) is a comma-separated list of commands the user in the first column can run as the user(s) in the third column. In this case, we're allowing jorge to run find and rm as root. This value can also be set to the ALL wildcard, which would allow jorge to run all commands on the system as root. With this in mind, you can allow X commands in a comma delimited fashion and as long as you do not add passwd to this you should be fine FreeBSD Jails can help with this, maybe is not exactly what you want, but give you the flexibility to have multiple root users within a host inside a Jail and basically can do anything with out compromising the main host. (note that this is not virtualization) Try adding a wheel group rather than using sudo. sudo allows a user to execute as though they are root which means it isn't any different than running: su - to become root. The root uid=0; the wheel uid=10. People use the names but the OS uses the uid. Certain commands cannot be run by a member of the wheel group. (If you use wheel don't make the mistake of adding root as a wheel group member). Take a look at Red Hat documentation if you don't know what wheel is. Another option is to use an ssh key rather than a password. Assuming you can be sure the folks using sudo don't add their public keys to the ~/.ssh/authorizedkeys file this gets around any concern of the root password changing because root password is effectively ignored. If you'd rather get around extending trust to these users (to not add their own public key) try using extended file attributes and using the Immutable bit. After creating your ~/.ssh/authorizedkeys file, and after configuring /etc/ssh/sshd_config and /etc/ssh/ssh_config as you like, set the Immutable bit. Sure, there're ways to screw with that too -- nothing is perfect. In any system, insiders are the highest risk. The person who runs the show is at the top of the pile. A related thought pertains to contracts. Lawyers will tell you, "Never do business with someone you need a contract to do business with". Common sense tells us, "Never do business without a contract". When you find someone you trust enough to do business with, write the contract based on each other's needs. All the submitted answers, including mine, fail to address physical access. Whomever has it, has control. If it isn't you then there's likely a way for you to get the person who does to physically access the machine in the event someone finds a way to prevent you from logging in, or if they find a way to log in even after you've attempted to prevent that from happening. Of course, if you've got physical access than there may not be a need for any of these things although implementing a couple should be considered anyway, if you're interested in NOT being inconvenienced. sudo is hugely different from su -. This has been pointed out repeatedly, for example by SHW, Joseph R., myself, hbdgaf and quite possibly several more the comment field is too short to include... – Michael KjörlingDec 17 '13 at 16:05 All true, but irrelevant. You're discussing alternate ways to become root, and risks of granting root access, but nothing that has any bearing on “root access that can't change root password”. – GillesDec 17 '13 at 16:11 True. The question is a logical oxymoron; It can't exist unless the installation is broken. What good is a user login/account where that user can't change their password, yet they have root access? Therefore the suggestions offered apply to what the questioner may have meant; not to the way they wrote the question. Any access control method has inherent risk. – John CroutApr 13 '14 at 18:53 One way would be to ensure that /etc is not writable. By nobody, as long as there could be a sudoer around. That could be done by mounting it over the network and ensure on the other side that the device can't be written. That could be done by using a local device that prevents write access to it. (Lookup the write blocker hardware) The important part is that the restriction has to apply outside of the root concept of that machine. A creative hacker will find its way around all obstacles you place on em within the environment he could control. So if root could change its password, so can a sudoer. To be certain that the user also can't screw up your login abilities you have to have read-only mounted /bin and /sbin. And you will have to have a script that periodically restores the network connection. (As a sidenote: If you allow the sudoer only a very limited set of commands and for each of them secure that they can't break out of them / replace them etc., then you can prevent it while having /etc writable..) Mounting /etc read-only, while perhaps possible (you'd have to be careful during the pivot-root in the initrd's boot scripts, for example), runs the risk of being a rather fragile setup. Also, there are many things a user with root access can do which cripples other users' ability to attain root privileges which do not involve making modifications in /etc. – Michael KjörlingDec 16 '13 at 11:57 @MichaelKjörling The setup is not fragile, I use it often (as read-only local mounts). – Angelo FuchsDec 16 '13 at 12:00 @MichaelKjörling I added some other elements you'll want to have read-only if you want to ensure you can still log in. So, the list of actions that have to be done if you go down that road is not so short, but its the only way that "is, a guarantee that we still can login to that server and become root no matter of what the other users will do." – Angelo FuchsDec 16 '13 at 12:03 I'll admit I've never seen the need to try it, but one thing I can definitely see that would be risky is how init is going to handle /etc/inittab being replaced under its feet. Or what the system will do if the initial and after-remounting /etc/fstab are different. And there's /etc/mtab. Other users may want to change their own passwords, which involves writing to /etc/shadow and possibly /etc/passwd. And mounting /etc read-only is still only a partial solution. I'm not saying it cannot be part of a solution, but it certainly isn't the first step I'd take in the OP's situation. – Michael KjörlingDec 16 '13 at 12:06 1 Yes. Doing this is dangerous and has severe problems if done wrong. Still as far as I can see its the only viable way to solve the OPs request for users who should be allowed to become root. – Angelo FuchsDec 16 '13 at 13:30
2024-05-11T01:27:04.277712
https://example.com/article/8831
Q: Hyperledger-Composer. Modify the ledger via remote access So far I have followed the hyperledger developer tutorial, but I have a couple of questions basically the same I pressume. Let us assume that I have running my application as stated in the developer tutorial in machine A. The first question is: How can I modify the ledger in machine A from B when they are in the same network?. The second is: How can I modify the ledger in machine A from B when they are in different networks?. A: The Composer Developer tutorial (and in fact all of the Compose tutorials) focus on the Composer aspects of developing and deploying a Business Network. They do not focus much on the Fabric issues of multi-org and multi machine. The Developer tutorial uses a very simple development Fabric of 1 Peer in 1 Organisation, and some automated scripts set this up for the developer to concentrate on the Model and the code. For background on Hyperledger Fabric and experimentation with multi peer, multi org Fabrics I would suggest looking at the Fabric tutorials. To get more of a view of Multi-Org from a Composer perspective I would suggest looking at the Composer Multi-Org Tutorial. Be aware that the above 2 references simulate multi-org Fabrics, but actually run on a single machine for simplicity. There are other tutorials and blogs available in various places for running on multi-machine configurations e.g. https://www.skcript.com/svr/setting-up-a-blockchain-business-network-with-hyperledger-fabric-and-composer-running-in-multiple-physical-machine/
2024-03-21T01:27:04.277712
https://example.com/article/9967
Many membrane proteins undergo relatively rapid rotational diffusion (Tau = 1-10 musec) in membrane systems. This rotational motion can lead to partial narrowing of carbon 13 and nitrogen 15 nuclear magnetic resonance spectra of the membrane protein. In principle, the motionally narrowed spectra contain sufficient information to deduce the orientation of the rotation axis relative to the molecular frame for ech of many independent positions in the protein. This in turn can allow the structure of elected regions ouf theprotein to be determined with resolution comparable to that of X-ray crystallography in favorable cases. This proposal addresses one approach to extracting this information. The approach involves the production of peptide bonds which contain both a carbon 13 carbonyl group and a nitrogen 15 amino group label. Using biosynthetic incorporation of the two labels with different amino acids, a unique dipeptide sequence can be labeled which will usually occur at a single position in proteins of moderate size. Thus single residue resolution can be obtained. In addition, at last three perameters cans be measured cabon 13 shift, nitrogen 15 shift and C-N dipolar coupling) which can fix the orientation of the rotation axis in the peptide plane. By labeling sequential positions along the amino acid sequence, the relative orientations of adjacent peptide planes can be established, allowing the Ramachandran angles between the planes to be measured with precision of a few degrees in favorable cases. A series of experiments are proposed to establish the variation in carbon 13 and nitrogen 15 amide chemical shift tensors with microenvironment using a protein with a known crystal structure, T4 lysozyme. The use of the proposed approach to probe the structure in the membrane of M13 coat protein and the light harvesting proteins of photosynthetic bacteria is suggested.
2024-02-17T01:27:04.277712
https://example.com/article/6636
Lowe notches rare road win as Dodgers handle Reds again CINCINNATI -- So many times on the road, Derek Lowe deserved to win. In each of his last 11 tries, he came up short for one reason or another -- no run support, no help from the bullpen, no breaks. On a night when he felt awful, everything finally went his way. Lowe earned his first road win since last August by pitching into the sixth inning, and the Los Angeles Dodgers extended their season-long domination of the Cincinnati Reds with a 6-1 victory on Wednesday night. James Loney had a solo homer and a run-scoring double off Bronson Arroyo (4-6), sending the Dodgers to their sixth victory in seven games against the Reds this season. Juan Pierre broke the game open with a two-run triple in the seventh. "I don't know what it is about the Dodgers," Reds manager Dusty Baker said. "They beat us pretty good." Lowe (5-6) hadn't beaten anybody on the road since Aug. 22 in Philadelphia. He went 0-6 in his next 11 starts away from Dodger Stadium. It wasn't entirely his fault. Lowe often has pitched well enough, but the offense has let him down. This time, he knew he'd need a little help and a little luck. Hiroki Kuroda was scheduled to start on Wednesday, but told the team a day earlier that he had a sore pitching shoulder. By that point, Lowe had already done a strenuous off-day workout. He was moved up a day and took Kuroda's place, but knew not to expect much. Lowe gave up three hits, including Edwin Encarnacion's solo homer, and matched his season high with six strikeouts. Manager Joe Torre took him out after his 85th pitch in the sixth inning with Los Angeles ahead 4-1. "I may be prouder of this game than any," Lowe said. "It was an absolute struggle from the first pitch. You go out there and go as far as you can." He finally broke through on the road against Arroyo, one of his teammates on Boston's 2004 World Series championship team. "He pitched a great game," Arroyo said. "Once we got behind, you knew we weren't going to catch up." Arroyo is in his own slump, going 0-2 in his last four starts with a 6.33 ERA. He gave up seven hits and six runs in 6 1/3 innings, and threw a wild pitch that let in a run. The Reds lost for the 11th time in 16 games, a slump set up by their all-or-nothing offense. Cincinnati is 2-6 on a homestand that concludes Thursday, scoring a total of 17 runs. They're batting .179 on the homestand and are hitless in their last 17 at-bats with runners in scoring position. "We've been a Dr. Jekyll and Mr. Hyde team offensively," Baker said. "We score a lot of runs, then we don't score any. We need Dr. Jekyll to show up." Loney has been a big problem for the Reds all season, batting .400 with a pair of homers and seven RBI. The first baseman is having a big month overall, batting .396 in June. He hit his sixth homer in the fourth inning, then doubled home a run that made it 4-1 in the sixth. Loney has become more selective and worked deeper into counts during his at-bats this month. "When I see a good pitch come, I should swing," Loney said. "That's the way I like to think about it. I might only get one good pitch per at-bat. I don't want to miss it." Andre Ethier, who brought a 2-for-20 slump into the game, had a run-scoring single among his three hits. Pierre's two-run triple in the seventh off reliever Jeremy Affeldt made it 6-1. "It's what managers like to see, when you score in one inning and another inning and another inning," Torre said. "It's something we haven't done in a while, sustain some offense." Ken Griffey Jr. was out of the Reds' lineup for a second consecutive game because of illness. Rookie Jay Bruce took his spot in right field and made two of the game's two best defensive plays. Bruce made a diving catch on Pierre's liner in the third, then an over-the-shoulder catch of Blake DeWitt's drive to the warning track. Notes Kuroda was diagnosed with inflammation in the shoulder, received a cortisone shot and will miss his next start. Chan Ho Park will take his place Saturday against Cleveland. SS Angel Berroa dived into the stands to catch a foul ball in the ninth. The Reds sent RHP Homer Bailey back to the minors and activated OF Norris Hopper from the DL. Bailey was 0-3 in his three starts this season. With Corey Patterson struggling, Reds 1B Joey Votto in the leadoff spot for the first time in his career. He went 1-for-4. Bruce singled in the sixth inning, ending an 0-for-16 streak. Copyright 2015 by STATS LLC and The Associated Press. Any commercial use or distribution without the express written consent of STATS LLC and The Associated Press is strictly prohibited.
2023-10-25T01:27:04.277712
https://example.com/article/4106
////////////////////////////////////////////////////////////////////////////////////// // This file is distributed under the University of Illinois/NCSA Open Source License. // See LICENSE file in top directory for details. // // Copyright (c) 2019 QMCPACK developers. // // File developed by: Ye Luo, yeluo@anl.gov, Argonne National Laboratory // // File created by: Ye Luo, yeluo@anl.gov, Argonne National Laboratory ////////////////////////////////////////////////////////////////////////////////////// /** @file * * derived from SplineSetReader */ #ifndef QMCPLUSPLUS_HYBRIDREP_READER_H #define QMCPLUSPLUS_HYBRIDREP_READER_H #include <Numerics/Quadrature.h> #include <Numerics/Bessel.h> #include <QMCWaveFunctions/BsplineFactory/HybridRepCenterOrbitals.h> #include "OhmmsData/AttributeSet.h" #include <config/stdlib/math.hpp> //#include <QMCHamiltonians/Ylm.h> //#define PRINT_RADIAL namespace qmcplusplus { template<typename ST, typename LT> struct Gvectors { typedef TinyVector<ST, 3> PosType; typedef std::complex<ST> ValueType; const LT& Lattice; std::vector<PosType> gvecs_cart; //Cartesian. std::vector<ST> gmag; const size_t NumGvecs; Gvectors(const std::vector<TinyVector<int, 3>>& gvecs_in, const LT& Lattice_in, const TinyVector<int, 3>& HalfG, size_t first, size_t last) : Lattice(Lattice_in), NumGvecs(last - first) { gvecs_cart.resize(NumGvecs); gmag.resize(NumGvecs); #pragma omp parallel for for (size_t ig = 0; ig < NumGvecs; ig++) { TinyVector<ST, 3> gvec_shift; gvec_shift = gvecs_in[ig + first] + HalfG * 0.5; gvecs_cart[ig] = Lattice.k_cart(gvec_shift); gmag[ig] = std::sqrt(dot(gvecs_cart[ig], gvecs_cart[ig])); } } template<typename YLM_ENGINE, typename VVT> void calc_Ylm_G(const size_t ig, YLM_ENGINE& Ylm, VVT& YlmG) const { PosType Ghat(0.0, 0.0, 1.0); if (gmag[ig] > 0) Ghat = gvecs_cart[ig] / gmag[ig]; Ylm.evaluateV(Ghat[0], Ghat[1], Ghat[2], YlmG.data()); } template<typename VVT> inline void calc_jlm_G(const int lmax, ST& r, const size_t ig, VVT& j_lm_G) const { bessel_steed_array_cpu(lmax, gmag[ig] * r, j_lm_G.data()); for (size_t l = lmax; l > 0; l--) for (size_t lm = l * l; lm < (l + 1) * (l + 1); lm++) j_lm_G[lm] = j_lm_G[l]; } template<typename PT, typename VT> inline void calc_phase_shift(const PT& RSoA, const size_t ig, VT& phase_shift_real, VT& phase_shift_imag) const { const ST* restrict px = RSoA.data(0); const ST* restrict py = RSoA.data(1); const ST* restrict pz = RSoA.data(2); ST* restrict v_r = phase_shift_real.data(); ST* restrict v_i = phase_shift_imag.data(); const ST& gv_x = gvecs_cart[ig][0]; const ST& gv_y = gvecs_cart[ig][1]; const ST& gv_z = gvecs_cart[ig][2]; #pragma omp simd aligned(px, py, pz, v_r, v_i) for (size_t iat = 0; iat < RSoA.size(); iat++) qmcplusplus::sincos(px[iat] * gv_x + py[iat] * gv_y + pz[iat] * gv_z, v_i + iat, v_r + iat); } template<typename PT> ValueType evaluate_psi_r(const Vector<std::complex<double>>& cG, const PT& pos) { assert(cG.size() == NumGvecs); std::complex<ST> val(0.0, 0.0); for (size_t ig = 0; ig < NumGvecs; ig++) { ST s, c; qmcplusplus::sincos(dot(gvecs_cart[ig], pos), &s, &c); ValueType pw0(c, s); val += cG[ig] * pw0; } return val; } template<typename PT> void evaluate_psi_r(const Vector<std::complex<double>>& cG, const PT& pos, ValueType& phi, ValueType& d2phi) { assert(cG.size() == NumGvecs); d2phi = phi = 0.0; for (size_t ig = 0; ig < NumGvecs; ig++) { ST s, c; qmcplusplus::sincos(dot(gvecs_cart[ig], pos), &s, &c); ValueType pw0(c, s); phi += cG[ig] * pw0; d2phi += cG[ig] * pw0 * (-dot(gvecs_cart[ig], gvecs_cart[ig])); } } double evaluate_KE(const Vector<std::complex<double>>& cG) { assert(cG.size() == NumGvecs); double KE = 0; for (size_t ig = 0; ig < NumGvecs; ig++) KE += dot(gvecs_cart[ig], gvecs_cart[ig]) * (cG[ig].real() * cG[ig].real() + cG[ig].imag() * cG[ig].imag()); return KE / 2.0; } }; /** General HybridRepSetReader to handle any unitcell */ template<typename SA> struct HybridRepSetReader : public SplineSetReader<SA> { typedef SplineSetReader<SA> BaseReader; using BaseReader::bspline; using BaseReader::mybuilder; using BaseReader::rotate_phase_i; using BaseReader::rotate_phase_r; using typename BaseReader::DataType; HybridRepSetReader(EinsplineSetBuilder* e) : BaseReader(e) {} /** initialize basic parameters of atomic orbitals */ void initialize_hybridrep_atomic_centers() override { OhmmsAttributeSet a; std::string scheme_name("Consistent"); std::string s_function_name("LEKS2018"); a.add(scheme_name, "smoothing_scheme"); a.add(s_function_name, "smoothing_function"); a.put(mybuilder->XMLRoot); // assign smooth_scheme if (scheme_name == "Consistent") bspline->smooth_scheme = SA::smoothing_schemes::CONSISTENT; else if (scheme_name == "SmoothAll") bspline->smooth_scheme = SA::smoothing_schemes::SMOOTHALL; else if (scheme_name == "SmoothPartial") bspline->smooth_scheme = SA::smoothing_schemes::SMOOTHPARTIAL; else APP_ABORT("initialize_hybridrep_atomic_centers wrong smoothing_scheme name! Only allows Consistent, SmoothAll or " "SmoothPartial."); // assign smooth_function if (s_function_name == "LEKS2018") bspline->smooth_func_id = smoothing_functions::LEKS2018; else if (s_function_name == "coscos") bspline->smooth_func_id = smoothing_functions::COSCOS; else if (s_function_name == "linear") bspline->smooth_func_id = smoothing_functions::LINEAR; else APP_ABORT( "initialize_hybridrep_atomic_centers wrong smoothing_function name! Only allows LEKS2018, coscos or linear."); app_log() << "Hybrid orbital representation uses " << scheme_name << " smoothing scheme and " << s_function_name << " smoothing function." << std::endl; bspline->set_info(*(mybuilder->SourcePtcl), mybuilder->TargetPtcl, mybuilder->Super2Prim); auto& centers = bspline->AtomicCenters; auto& ACInfo = mybuilder->AtomicCentersInfo; // load atomic center info only when it is not initialized if (centers.size() == 0) { bool success = true; app_log() << "Reading atomic center info for hybrid representation" << std::endl; for (int center_idx = 0; center_idx < ACInfo.Ncenters; center_idx++) { const int my_GroupID = ACInfo.GroupID[center_idx]; if (ACInfo.cutoff[center_idx] < 0) { app_error() << "Hybrid orbital representation needs parameter 'cutoff_radius' for atom " << center_idx << std::endl; success = false; } if (ACInfo.inner_cutoff[center_idx] < 0) { const double inner_cutoff = std::max(ACInfo.cutoff[center_idx] - 0.3, 0.0); app_log() << "Hybrid orbital representation setting 'inner_cutoff' to " << inner_cutoff << " for group " << my_GroupID << " as atom " << center_idx << std::endl; // overwrite the inner_cutoff of all the atoms of the same species for (int id = 0; id < ACInfo.Ncenters; id++) if (my_GroupID == ACInfo.GroupID[id]) ACInfo.inner_cutoff[id] = inner_cutoff; } else if (ACInfo.inner_cutoff[center_idx] > ACInfo.cutoff[center_idx]) { app_error() << "Hybrid orbital representation 'inner_cutoff' must be smaller than 'spline_radius' for atom " << center_idx << std::endl; success = false; } if (ACInfo.cutoff[center_idx] > 0) { if (ACInfo.lmax[center_idx] < 0) { app_error() << "Hybrid orbital representation needs parameter 'lmax' for atom " << center_idx << std::endl; success = false; } if (ACInfo.spline_radius[center_idx] < 0 && ACInfo.spline_npoints[center_idx] < 0) { app_log() << "Parameters 'spline_radius' and 'spline_npoints' for group " << my_GroupID << " as atom " << center_idx << " are not specified." << std::endl; const double delta = std::min(0.02, ACInfo.cutoff[center_idx] / 4.0); const int n_grid_point = std::ceil((ACInfo.cutoff[center_idx] + 1e-4) / delta) + 3; for (int id = 0; id < ACInfo.Ncenters; id++) if (my_GroupID == ACInfo.GroupID[id]) { ACInfo.spline_npoints[id] = n_grid_point; ACInfo.spline_radius[id] = (n_grid_point - 1) * delta; } app_log() << " Based on default grid point distance " << delta << std::endl; app_log() << " Setting 'spline_npoints' to " << ACInfo.spline_npoints[center_idx] << std::endl; app_log() << " Setting 'spline_radius' to " << ACInfo.spline_radius[center_idx] << std::endl; } else { if (ACInfo.spline_radius[center_idx] < 0) { app_error() << "Hybrid orbital representation needs parameter 'spline_radius' for atom " << center_idx << std::endl; success = false; } if (ACInfo.spline_npoints[center_idx] < 0) { app_error() << "Hybrid orbital representation needs parameter 'spline_npoints' for atom " << center_idx << std::endl; success = false; } } // check maximally allowed cutoff_radius double max_allowed_cutoff = ACInfo.spline_radius[center_idx] - 2.0 * ACInfo.spline_radius[center_idx] / (ACInfo.spline_npoints[center_idx] - 1); if (success && ACInfo.cutoff[center_idx] > max_allowed_cutoff) { app_error() << "Hybrid orbital representation requires cutoff_radius<=" << max_allowed_cutoff << " calculated by spline_radius-2*spline_radius/(spline_npoints-1) for atom " << center_idx << std::endl; success = false; } } else { // no atomic regions for this atom type ACInfo.spline_radius[center_idx] = 0.0; ACInfo.spline_npoints[center_idx] = 0; ACInfo.lmax[center_idx] = 0; } } if (!success) BaseReader::myComm->barrier_and_abort("initialize_hybridrep_atomic_centers Failed to initialize atomic centers " "in hybrid orbital representation!"); for (int center_idx = 0; center_idx < ACInfo.Ncenters; center_idx++) { AtomicOrbitals<DataType> oneCenter(ACInfo.lmax[center_idx]); oneCenter.set_info(ACInfo.ion_pos[center_idx], ACInfo.cutoff[center_idx], ACInfo.inner_cutoff[center_idx], ACInfo.spline_radius[center_idx], ACInfo.non_overlapping_radius[center_idx], ACInfo.spline_npoints[center_idx]); centers.push_back(oneCenter); } } } /** initialize construct atomic orbital radial functions from plane waves */ inline void create_atomic_centers_Gspace(Vector<std::complex<double>>& cG, Communicate& band_group_comm, int iorb) override { band_group_comm.bcast(rotate_phase_r); band_group_comm.bcast(rotate_phase_i); band_group_comm.bcast(cG); //distribute G-vectors over processor groups const int Ngvecs = mybuilder->Gvecs[0].size(); const int Nprocs = band_group_comm.size(); const int Ngvecgroups = std::min(Ngvecs, Nprocs); Communicate gvec_group_comm(band_group_comm, Ngvecgroups); std::vector<int> gvec_groups(Ngvecgroups + 1, 0); FairDivideLow(Ngvecs, Ngvecgroups, gvec_groups); const int gvec_first = gvec_groups[gvec_group_comm.getGroupID()]; const int gvec_last = gvec_groups[gvec_group_comm.getGroupID() + 1]; // prepare Gvecs Ylm(G) typedef typename EinsplineSetBuilder::UnitCellType UnitCellType; Gvectors<double, UnitCellType> Gvecs(mybuilder->Gvecs[0], mybuilder->PrimCell, bspline->HalfG, gvec_first, gvec_last); // if(band_group_comm.isGroupLeader()) std::cout << "print band=" << iorb << " KE=" << Gvecs.evaluate_KE(cG) << std::endl; std::vector<AtomicOrbitals<DataType>>& centers = bspline->AtomicCenters; app_log() << "Transforming band " << iorb << " on Rank 0" << std::endl; // collect atomic centers by group std::vector<int> uniq_species; for (int center_idx = 0; center_idx < centers.size(); center_idx++) { auto& ACInfo = mybuilder->AtomicCentersInfo; const int my_GroupID = ACInfo.GroupID[center_idx]; int found_idx = -1; for (size_t idx = 0; idx < uniq_species.size(); idx++) if (my_GroupID == uniq_species[idx]) { found_idx = idx; break; } if (found_idx < 0) uniq_species.push_back(my_GroupID); } // construct group list std::vector<std::vector<int>> group_list(uniq_species.size()); for (int center_idx = 0; center_idx < centers.size(); center_idx++) { auto& ACInfo = mybuilder->AtomicCentersInfo; const int my_GroupID = ACInfo.GroupID[center_idx]; for (size_t idx = 0; idx < uniq_species.size(); idx++) if (my_GroupID == uniq_species[idx]) { group_list[idx].push_back(center_idx); break; } } for (int group_idx = 0; group_idx < group_list.size(); group_idx++) { const auto& mygroup = group_list[group_idx]; const double spline_radius = centers[mygroup[0]].getSplineRadius(); const int spline_npoints = centers[mygroup[0]].getSplineNpoints(); const int lmax = centers[mygroup[0]].getLmax(); const double delta = spline_radius / static_cast<double>(spline_npoints - 1); const int lm_tot = (lmax + 1) * (lmax + 1); const size_t natoms = mygroup.size(); const int policy = lm_tot > natoms ? 0 : 1; std::vector<std::complex<double>> i_power(lm_tot); // rotate phase is introduced here. std::complex<double> i_temp(rotate_phase_r, rotate_phase_i); for (size_t l = 0; l <= lmax; l++) { for (size_t lm = l * l; lm < (l + 1) * (l + 1); lm++) i_power[lm] = i_temp; i_temp *= std::complex<double>(0.0, 1.0); } std::vector<Matrix<double>> all_vals(natoms); std::vector<std::vector<aligned_vector<double>>> vals_local(spline_npoints * omp_get_max_threads()); VectorSoaContainer<double, 3> myRSoA(natoms); for (size_t idx = 0; idx < natoms; idx++) { all_vals[idx].resize(spline_npoints, lm_tot * 2); all_vals[idx] = 0.0; myRSoA(idx) = centers[mygroup[idx]].getCenterPos(); } #pragma omp parallel { const size_t tid = omp_get_thread_num(); const size_t nt = omp_get_num_threads(); for (int ip = 0; ip < spline_npoints; ip++) { const size_t ip_idx = tid * spline_npoints + ip; if (policy == 1) { vals_local[ip_idx].resize(lm_tot * 2); for (size_t lm = 0; lm < lm_tot * 2; lm++) { auto& vals = vals_local[ip_idx][lm]; vals.resize(natoms); std::fill(vals.begin(), vals.end(), 0.0); } } else { vals_local[ip_idx].resize(natoms * 2); for (size_t iat = 0; iat < natoms * 2; iat++) { auto& vals = vals_local[ip_idx][iat]; vals.resize(lm_tot); std::fill(vals.begin(), vals.end(), 0.0); } } } const size_t size_pw_tile = 32; const size_t num_pw_tiles = (Gvecs.NumGvecs + size_pw_tile - 1) / size_pw_tile; aligned_vector<double> j_lm_G(lm_tot, 0.0); std::vector<aligned_vector<double>> phase_shift_r(size_pw_tile); std::vector<aligned_vector<double>> phase_shift_i(size_pw_tile); std::vector<aligned_vector<double>> YlmG(size_pw_tile); for (size_t ig = 0; ig < size_pw_tile; ig++) { phase_shift_r[ig].resize(natoms); phase_shift_i[ig].resize(natoms); YlmG[ig].resize(lm_tot); } SoaSphericalTensor<double> Ylm(lmax); #pragma omp for for (size_t tile_id = 0; tile_id < num_pw_tiles; tile_id++) { const size_t ig_first = tile_id * size_pw_tile; const size_t ig_last = std::min((tile_id + 1) * size_pw_tile, Gvecs.NumGvecs); for (size_t ig = ig_first; ig < ig_last; ig++) { const size_t ig_local = ig - ig_first; // calculate phase shift for all the centers of this group Gvecs.calc_phase_shift(myRSoA, ig, phase_shift_r[ig_local], phase_shift_i[ig_local]); Gvecs.calc_Ylm_G(ig, Ylm, YlmG[ig_local]); } for (int ip = 0; ip < spline_npoints; ip++) { double r = delta * static_cast<double>(ip); const size_t ip_idx = tid * spline_npoints + ip; for (size_t ig = ig_first; ig < ig_last; ig++) { const size_t ig_local = ig - ig_first; // calculate spherical bessel function Gvecs.calc_jlm_G(lmax, r, ig, j_lm_G); for (size_t lm = 0; lm < lm_tot; lm++) j_lm_G[lm] *= YlmG[ig_local][lm]; const double cG_r = cG[ig + gvec_first].real(); const double cG_i = cG[ig + gvec_first].imag(); if (policy == 1) { for (size_t lm = 0; lm < lm_tot; lm++) { double* restrict vals_r = vals_local[ip_idx][lm * 2].data(); double* restrict vals_i = vals_local[ip_idx][lm * 2 + 1].data(); const double* restrict ps_r_ptr = phase_shift_r[ig_local].data(); const double* restrict ps_i_ptr = phase_shift_i[ig_local].data(); double cG_j_r = cG_r * j_lm_G[lm]; double cG_j_i = cG_i * j_lm_G[lm]; #pragma omp simd aligned(vals_r, vals_i, ps_r_ptr, ps_i_ptr) for (size_t idx = 0; idx < natoms; idx++) { const double ps_r = ps_r_ptr[idx]; const double ps_i = ps_i_ptr[idx]; vals_r[idx] += cG_j_r * ps_r - cG_j_i * ps_i; vals_i[idx] += cG_j_i * ps_r + cG_j_r * ps_i; } } } else { for (size_t idx = 0; idx < natoms; idx++) { double* restrict vals_r = vals_local[ip_idx][idx * 2].data(); double* restrict vals_i = vals_local[ip_idx][idx * 2 + 1].data(); const double* restrict j_lm_G_ptr = j_lm_G.data(); double cG_ps_r = cG_r * phase_shift_r[ig_local][idx] - cG_i * phase_shift_i[ig_local][idx]; double cG_ps_i = cG_i * phase_shift_r[ig_local][idx] + cG_r * phase_shift_i[ig_local][idx]; #pragma omp simd aligned(vals_r, vals_i, j_lm_G_ptr) for (size_t lm = 0; lm < lm_tot; lm++) { const double jlm = j_lm_G_ptr[lm]; vals_r[lm] += cG_ps_r * jlm; vals_i[lm] += cG_ps_i * jlm; } } } } } } #pragma omp for collapse(2) for (int ip = 0; ip < spline_npoints; ip++) for (size_t idx = 0; idx < natoms; idx++) { double* vals = all_vals[idx][ip]; for (size_t tid = 0; tid < nt; tid++) for (size_t lm = 0; lm < lm_tot; lm++) { double vals_th_r, vals_th_i; const size_t ip_idx = tid * spline_npoints + ip; if (policy == 1) { vals_th_r = vals_local[ip_idx][lm * 2][idx]; vals_th_i = vals_local[ip_idx][lm * 2 + 1][idx]; } else { vals_th_r = vals_local[ip_idx][idx * 2][lm]; vals_th_i = vals_local[ip_idx][idx * 2 + 1][lm]; } const double real_tmp = 4.0 * M_PI * i_power[lm].real(); const double imag_tmp = 4.0 * M_PI * i_power[lm].imag(); vals[lm] += vals_th_r * real_tmp - vals_th_i * imag_tmp; vals[lm + lm_tot] += vals_th_i * real_tmp + vals_th_r * imag_tmp; } } } //app_log() << "Building band " << iorb << " at center " << center_idx << std::endl; for (size_t idx = 0; idx < natoms; idx++) { // reduce all_vals band_group_comm.reduce_in_place(all_vals[idx].data(), all_vals[idx].size()); if (!band_group_comm.isGroupLeader()) continue; #pragma omp parallel for for (int lm = 0; lm < lm_tot; lm++) { auto& mycenter = centers[mygroup[idx]]; aligned_vector<double> splineData_r(spline_npoints); UBspline_1d_d* atomic_spline_r; for (size_t ip = 0; ip < spline_npoints; ip++) splineData_r[ip] = all_vals[idx][ip][lm]; atomic_spline_r = einspline::create(atomic_spline_r, 0.0, spline_radius, spline_npoints, splineData_r.data(), ((lm == 0) || (lm > 3))); if (!bspline->is_complex) { mycenter.set_spline(atomic_spline_r, lm, iorb); einspline::destroy(atomic_spline_r); } else { aligned_vector<double> splineData_i(spline_npoints); UBspline_1d_d* atomic_spline_i; for (size_t ip = 0; ip < spline_npoints; ip++) splineData_i[ip] = all_vals[idx][ip][lm + lm_tot]; atomic_spline_i = einspline::create(atomic_spline_i, 0.0, spline_radius, spline_npoints, splineData_i.data(), ((lm == 0) || (lm > 3))); mycenter.set_spline(atomic_spline_r, lm, iorb * 2); mycenter.set_spline(atomic_spline_i, lm, iorb * 2 + 1); einspline::destroy(atomic_spline_r); einspline::destroy(atomic_spline_i); } } } #ifdef PRINT_RADIAL char fname[64]; sprintf(fname, "band_%d_center_%d_pw.dat", iorb, center_idx); FILE* fout_pw = fopen(fname, "w"); sprintf(fname, "band_%d_center_%d_spline_v.dat", iorb, center_idx); FILE* fout_spline_v = fopen(fname, "w"); sprintf(fname, "band_%d_center_%d_spline_g.dat", iorb, center_idx); FILE* fout_spline_g = fopen(fname, "w"); sprintf(fname, "band_%d_center_%d_spline_l.dat", iorb, center_idx); FILE* fout_spline_l = fopen(fname, "w"); fprintf(fout_pw, "# r vals(lm)\n"); fprintf(fout_spline_v, "# r vals(lm)\n"); fprintf(fout_spline_g, "# r grads(lm)\n"); fprintf(fout_spline_l, "# r lapls(lm)\n"); // write to file for plotting for (int ip = 0; ip < spline_npoints - 1; ip++) { double r = delta * static_cast<double>(ip); mycenter.SplineInst->evaluate_vgl(r, mycenter.localV, mycenter.localG, mycenter.localL); fprintf(fout_pw, "%15.10lf ", r); fprintf(fout_spline_v, "%15.10lf ", r); fprintf(fout_spline_g, "%15.10lf ", r); fprintf(fout_spline_l, "%15.10lf ", r); for (int lm = 0; lm < lm_tot; lm++) { fprintf(fout_pw, "%15.10lf %15.10lf ", all_vals[center_idx][ip][lm].real(), all_vals[center_idx][ip][lm].imag()); fprintf(fout_spline_v, "%15.10lf %15.10lf ", mycenter.localV[lm * mycenter.Npad + iorb * 2], mycenter.localV[lm * mycenter.Npad + iorb * 2 + 1]); fprintf(fout_spline_g, "%15.10lf %15.10lf ", mycenter.localG[lm * mycenter.Npad + iorb * 2], mycenter.localG[lm * mycenter.Npad + iorb * 2 + 1]); fprintf(fout_spline_l, "%15.10lf %15.10lf ", mycenter.localL[lm * mycenter.Npad + iorb * 2], mycenter.localL[lm * mycenter.Npad + iorb * 2 + 1]); } fprintf(fout_pw, "\n"); fprintf(fout_spline_v, "\n"); fprintf(fout_spline_g, "\n"); fprintf(fout_spline_l, "\n"); } fclose(fout_pw); fclose(fout_spline_v); fclose(fout_spline_g); fclose(fout_spline_l); #endif } } }; } // namespace qmcplusplus #endif
2023-08-09T01:27:04.277712
https://example.com/article/2600
Persistence of humoral immunity to tetanus and diphtheria in hematopoietic stem cell transplant recipients after post-transplant immunization. Persistence of humoral immunity was evaluated in 82 hematopoietic stem cell transplant recipients up to 12.5 years after post-transplant immunization against tetanus and diphtheria. New immunization, initiated at least 12 months after transplantation, consisted of an average three-dose schedule of vaccine administration on day 1, month 3, and month 12. Serological data were collected at pre-transplant, post-transplant, vaccination, and post-vaccination time points. The first vaccination dose elicited a seroprotective response in most recipients, but the complete vaccine series (usually three-dose schedule) reinforced the specific immunity in most vaccinated cases, that is, 100% and 95.8% seroprotection against tetanus and diphtheria, respectively. Geometric mean concentration post-vaccination tetanus and diphtheria antibody levels persisted at 1.9 IU (95% CI: 1.23-2.94 IU/ml) and 0.20 IU (95% CI: 0.11-0.38 IU/ml) for 7 years, respectively. However, diphtheria antibodies were lost not significantly but much faster and more often than tetanus antibodies, though the seroprotection rates against tetanus and diphtheria remained favorable, that is, 100% (95% CI: 85.2-100%) and 87% (95% CI: 59.5-98.3%), respectively. Full post-transplant revaccination resulted in long-term persistence of humoral immunity against tetanus and diphtheria in SCT recipients, for an average of 8.6 and 9.0 years, respectively.
2024-07-18T01:27:04.277712
https://example.com/article/6542
This is an ongoing archive and blog of reviews and commentary by W.L. Swarts! Wednesday, June 26, 2013 The Gay Community’s Struggle Will Only Get Worse Unless They Learn From The Mistakes Of The Women’s Rights Movement. | | | The Basics: With the Supreme Court striking down the Defense Of Marriage Act, gays, lesbians and transgender individuals need to unify and get a civil rights bill passed or today’s ruling means nothing. I am the dark cloud on this very bright day, but the gay, lesbian, and transgendered community needs one today. I have been eagerly waiting for the Defense Of Marriage Act to be struck down since President Clinton signed it into law in 1996. During the brief time I spent running for the U.S. House Of Representatives, I vocally spoke in favor of gay, lesbian, bisexual, and transgendered rights and promised that I would do what I could to help end “don’t ask, don’t tell,” and repeal DOMA, should I make it to office. So, then, why am I not celebrating today as millions are elated by the news that the Supreme Court has struck down key elements of the Defense Of Marriage Act and paved the way for gay, lesbian, and bisexuals to marry? Because history has provided us with more than enough information to illustrate that today’s ruling is not the end of the fight and, odds are, there are worse things in the store for the gay, lesbian, and bisexual community coming for the next few decades. Sorry, there it is, that’s me and this is the dark cloud moment. If you don’t believe me, just ask a woman who wants an abortion in Mississippi. How are the two related? It’s simple; after every major Civil Rights ruling by the Supreme Court, the affected group has gotten lazy and their supporters feel like their work is done and they move on to their next cause. After almost every major Civil Rights ruling, Congress fails to follow the Constitutionally prescribed remedy when a law is determined to be unconstitutional, which is to pass a new law. That is why, after the slaves were freed, the United States suffered through a reactionary Reconstruction and decades of heinous actions in the years of legally sanctified segregation. That is why, after forty years, when talking about abortion rights, we still refer to Roe V. Wade instead of the Abortion Rights Protection Act. After the Supreme Court determined that women have a right to privacy under the 14th Amendment and that right to privacy extends to their right to have an abortion, there was . . . no successful follow-up. In fact, the Equal Rights Amendment failed . . . and women and liberals gave up on trying again to pass it. In the years since, states have worked to undermine the rights acknowledged in that ruling and now many have laws that specifically undermine a woman’s ability to get an abortion in those states. So, while most liberals, gays, lesbians, sensible conservatives, and others who value civil rights are celebrating today, I am not. Right now, throughout the United States, there are conservative think tanks with obscene amounts of money who have their legal teams combing over the language of the decision in United States v. Windsor. Those lawyers are hired to draft laws for every state where conservatives think they can get enough support which will dismantle the ability for gays, lesbians, and transgendered people to marry or have their marriages from other states legally acknowledged at the state level. You will see such laws by 2014 when the Tea Party will use them to win votes and Congressional seats and the fight will be that much harder to win. I will celebrate when the gay, lesbian, bisexual, and transgendered Civil Rights movement proves me wrong and organizes enough to stop history from repeating itself yet again and gets an Equal Rights Amendment passed.
2024-06-24T01:27:04.277712
https://example.com/article/3949
USS Princeton USS Princeton may refer to: , a screw sloop, launched and commissioned in 1843, the first screw-driven vessel in the Navy and the subject of a fatal gun explosion in 1844 , a transport and training ship, launched in 1851 and commissioned in 1852 , a gunboat launched in 1897 and commissioned in 1898 , a light aircraft carrier, commissioned in 1943, sunk at Leyte Gulf in 1944 , an aircraft carrier commissioned in 1945, serving in the Korean War and Vietnam War, reclassified LPH-5 in 1959, decommissioned 1970 , a guided missile cruiser commissioned in 1989, currently in active service Category:United States Navy ship names
2024-04-26T01:27:04.277712
https://example.com/article/9061
Q: Let $o_p(a) = 3$, show that $o_p(1+a) = 6$ The question is : let $o_p(a) = 3$. Show that $o_p(1+a) = 6.$ I'm not sure of how to solve this question and would appreciate any help. Thank you in advance. A: I will assume $p$ is prime. Since $ord_p(a)=3$ we have $p\mid a^3 -1 = (a-1)(a^2+a+1)$. Since $ord_p(a) >1$ we have $p\nmid a-1$ and thus $p\mid a^2+a+1$. Now $$(a+1)^6-1 \equiv_p21(a^2+a+1)\equiv_p 0$$ so $ord_p(1+a) \mid 6$. Now show $ord_p(1+a) >3$...
2024-06-05T01:27:04.277712
https://example.com/article/9962
Three Things to Know About Solar Power on WCAI Solar power installations in Massachusetts have increased 80-fold in just six years, outstripping state officials’ goals and surprising many. If you’ve ever thought solar power was only for the tropics or desserts, think again. In May of this year, Governor Deval Patrick announced that solar installations in Massachusetts – photovoltaic, the electricity-generating panels, not solar hot water – had already reached the goal his administration set for 2017. He then proceeded to raise the goal to 1,600 MW installed by 2020.
2023-12-02T01:27:04.277712
https://example.com/article/1581
0 Sort 1/20, 280, 5, 0.2, -0.4, -2 in increasing order. -2, -0.4, 1/20, 0.2, 5, 280 Put -1, 329, 0, -1099, 4 in increasing order. -1099, -1, 0, 4, 329 Sort 3, -1, 205, 2, -11, 20. -11, -1, 2, 3, 20, 205 Sort 3/7, -5/6, 126, -0.2288 in descending order. 126, 3/7, -0.2288, -5/6 Put -323, -134.7, -222 in decreasing order. -134.7, -222, -323 Sort 3, -157, -3, -9, -1, 1, 5. -157, -9, -3, -1, 1, 3, 5 Sort 4, 81, 200, 4/35 in increasing order. 4/35, 4, 81, 200 Put -5, 5, 2759, -99, 3, -1 in increasing order. -99, -5, -1, 3, 5, 2759 Sort -13, -42, -19, -5, -1, -618. -618, -42, -19, -13, -5, -1 Sort -127, 132, 1, -8, -64 in ascending order. -127, -64, -8, 1, 132 Sort -3, 5, -10, 16/151, 4, 3, 2/79 in decreasing order. 5, 4, 3, 16/151, 2/79, -3, -10 Sort -69, -93, 3, 24, 0, -2. -93, -69, -2, 0, 3, 24 Sort 3, -270, -7, -92, 5 in increasing order. -270, -92, -7, 3, 5 Put 5, 6, -141891, 4 in ascending order. -141891, 4, 5, 6 Put 3, 50, -2143, 7, 4 in descending order. 50, 7, 4, 3, -2143 Put -3, 4.95, 2, -5, -6 in increasing order. -6, -5, -3, 2, 4.95 Put 1/29, 13.28, -3, -2/7 in ascending order. -3, -2/7, 1/29, 13.28 Sort 69/118, -1/5, 0, -6/11, 0.1. -6/11, -1/5, 0, 0.1, 69/118 Sort -20, -1241, -13, -17 in descending order. -13, -17, -20, -1241 Sort 31, -4, -3, -144, -2978 in ascending order. -2978, -144, -4, -3, 31 Put -0.19, 3/2, -106, -100/13 in descending order. 3/2, -0.19, -100/13, -106 Sort -14, -2, -1561, 144 in decreasing order. 144, -2, -14, -1561 Put -469, -2, -5, 54, -1, 3, 0 in ascending order. -469, -5, -2, -1, 0, 3, 54 Sort 4, 311, 3, -5103 in descending order. 311, 4, 3, -5103 Sort 72829, 1, 18. 1, 18, 72829 Put 38886, 0.1, -3/4, -2588 in increasing order. -2588, -3/4, 0.1, 38886 Sort 82, 15, 6, -338, 5, 0. -338, 0, 5, 6, 15, 82 Sort -1/2, 5, -80, -8, 4, 3, -2/9 in descending order. 5, 4, 3, -2/9, -1/2, -8, -80 Sort 0, -1, -2, 2, -111, -21, 6 in decreasing order. 6, 2, 0, -1, -2, -21, -111 Put 0.4, 10407339, -2 in decreasing order. 10407339, 0.4, -2 Sort -1, -63, 4, 155, 5, -4. -63, -4, -1, 4, 5, 155 Put -827, -2, -1, -26, 7, 3, -4 in descending order. 7, 3, -1, -2, -4, -26, -827 Put 0, -207, -1, -22, 8, -8 in decreasing order. 8, 0, -1, -8, -22, -207 Put -0.3, -3.6, -3, 0.0033, 0.2, 8 in decreasing order. 8, 0.2, 0.0033, -0.3, -3, -3.6 Put -2, -10, 41936, 2 in descending order. 41936, 2, -2, -10 Sort 0.4967, -13, 107 in decreasing order. 107, 0.4967, -13 Put -0.13, 47, -0.4, -41, 1/12 in descending order. 47, 1/12, -0.13, -0.4, -41 Sort -1049, -0.3, -5, 7363, 2/9, -2 in descending order. 7363, 2/9, -0.3, -2, -5, -1049 Put 0.4, 702, -9, 9, 2/19 in descending order. 702, 9, 0.4, 2/19, -9 Put 7, 26673, -4 in descending order. 26673, 7, -4 Sort -3, 4, -2, -32, 8, -6 in increasing order. -32, -6, -3, -2, 4, 8 Sort -6046, -3, -5, 0, 19, 3 in descending order. 19, 3, 0, -3, -5, -6046 Sort -0.79327, 0.2, -1, 51 in ascending order. -1, -0.79327, 0.2, 51 Sort -2, 318, -7, 5, 215. -7, -2, 5, 215, 318 Put -15, -33, 4577, -9 in ascending order. -33, -15, -9, 4577 Sort 9, 8, -13000, 1, 4 in descending order. 9, 8, 4, 1, -13000 Sort -12221, -242, -1, -4, 3, 0, 1 in ascending order. -12221, -242, -4, -1, 0, 1, 3 Put -52, 4, 0, -1, 1, 7/6, 0.1 in increasing order. -52, -1, 0, 0.1, 1, 7/6, 4 Put 1, -4595176, -4 in increasing order. -4595176, -4, 1 Sort 3, -573, -5, 6, 286 in increasing order. -573, -5, 3, 6, 286 Put 4, 137, -2, -575, 2 in decreasing order. 137, 4, 2, -2, -575 Put 2, 3/5, -1/17, -4, 130, 1/37 in decreasing order. 130, 2, 3/5, 1/37, -1/17, -4 Sort 520, 442, -594. -594, 442, 520 Sort 2, -3, -12, 4678, -0.06, 2/11 in increasing order. -12, -3, -0.06, 2/11, 2, 4678 Put 6/7, 455790, 18, -0.5 in ascending order. -0.5, 6/7, 18, 455790 Put 30, 50, 8, -3, -1, 5 in ascending order. -3, -1, 5, 8, 30, 50 Put -10412, 2, -1, -97 in decreasing order. 2, -1, -97, -10412 Put -783, -2, -217 in descending order. -2, -217, -783 Sort 0.005441, -4, 2/5. -4, 0.005441, 2/5 Sort 12/17, 23, 75361 in descending order. 75361, 23, 12/17 Put 4, -19744, 3, 19 in descending order. 19, 4, 3, -19744 Put -3, -0.1, 7/5, -554/7 in descending order. 7/5, -0.1, -3, -554/7 Sort -2298, 32, 5, -4, -3 in descending order. 32, 5, -3, -4, -2298 Sort 524.928, -0.5, 276 in decreasing order. 524.928, 276, -0.5 Sort 1/8, -29/866, 28 in increasing order. -29/866, 1/8, 28 Sort 4, -43, -5, 118, -2, -1 in descending order. 118, 4, -1, -2, -5, -43 Put -10, -31, 3, 1776, 1 in decreasing order. 1776, 3, 1, -10, -31 Put 30, -12, -4/25, 5, 1/4 in decreasing order. 30, 5, 1/4, -4/25, -12 Put 0, 0.0579, 4, -2/5, 1/686, -5 in ascending order. -5, -2/5, 0, 1/686, 0.0579, 4 Put 4, 0, 926, 3, -1, 60, -3 in increasing order. -3, -1, 0, 3, 4, 60, 926 Sort -786, 675, 40 in decreasing order. 675, 40, -786 Put 2, -4, 16, 7548, 5, -1 in decreasing order. 7548, 16, 5, 2, -1, -4 Sort -0.078, -6, 2/3, 0.3, 4/133 in descending order. 2/3, 0.3, 4/133, -0.078, -6 Sort -1598, -39, -1, 91, -5 in descending order. 91, -1, -5, -39, -1598 Put 0, 83, 3, 35, -3, 5, -32 in ascending order. -32, -3, 0, 3, 5, 35, 83 Sort 0, -205.86, 8.2 in increasing order. -205.86, 0, 8.2 Sort 3, 4, 15449, -2, -19 in descending order. 15449, 4, 3, -2, -19 Sort 5, -5, 9, -1, -672, 4 in descending order. 9, 5, 4, -1, -5, -672 Put 7, -151, -95248 in decreasing order. 7, -151, -95248 Sort -72, -5, 29706, 0, 3 in descending order. 29706, 3, 0, -5, -72 Sort -3, 30412, -4, 565 in descending order. 30412, 565, -3, -4 Put -38, -26585.23, -0.4 in increasing order. -26585.23, -38, -0.4 Sort 3/34, 1, 2066.3 in decreasing order. 2066.3, 1, 3/34 Put -3, -25, 3, 14, 199, -2, -31 in ascending order. -31, -25, -3, -2, 3, 14, 199 Sort 3849, -4, -2, 6, -193. -193, -4, -2, 6, 3849 Put 6, 5/16, 52.3, 0.1, 2, -0.3 in descending order. 52.3, 6, 2, 5/16, 0.1, -0.3 Sort 2/7, 13/6, -483441 in descending order. 13/6, 2/7, -483441 Sort 6, -0.16, 14, -24, -9, -0.3 in decreasing order. 14, 6, -0.16, -0.3, -9, -24 Sort 5, -0.1, -2822, 54/173. -2822, -0.1, 54/173, 5 Sort -2, 199, 10, 6, -5, 5 in descending order. 199, 10, 6, 5, -2, -5 Sort -3, -2, -59, 8, 4, 35, 1. -59, -3, -2, 1, 4, 8, 35 Put 0, -2, 5, -92, -3, -8, 10 in descending order. 10, 5, 0, -2, -3, -8, -92 Put -37, 0.2, -0.4, 269, 2, 0.3 in increasing order. -37, -0.4, 0.2, 0.3, 2, 269 Sort -3, -1, 0, 201078, -5 in ascending order. -5, -3, -1, 0, 201078 Sort -4, 7, -3, -13, 5, -15285, 1. -15285, -13, -4, -3, 1, 5, 7 Put 2, -0.11435798, 2/7 in descending order. 2, 2/7, -0.11435798 Put 6, 5568, -1039 in increasing order. -1039, 6, 5568 Put 2, -38, 201.664, -0.5 in decreasing order. 201.664, 2, -0.5, -38 Sort 0.3803, -270, -8 in ascending order. -270, -8, 0.3803 Sort 3, 114342, 2, -9, -2, -4 in increasing order. -9, -4, -2, 2, 3, 114342 Sort -7, 8, 2, -6, 1, -129 in descending order. 8, 2, 1, -6, -7, -129 Sort -23192, -0.3, 0.5, 2, 0.09 in decreasing order. 2, 0.5, 0.09, -0.3, -23192 Sort -29, -323, 4, 1.2, 5. -323, -29, 1.2, 4, 5 Put 0.3, 3, 33/5, -2, -4, 15 in decreasing order. 15, 33/5, 3, 0.3, -2, -4 Sort 2, -46, 1104, -116 in descending order. 1104, 2, -46, -116 Put 517.827, 20, 1/13 in increasing order. 1/13, 20, 517.827 Put -1/5, -1/4, 25869791 in descending order. 25869791, -1/5, -1/4 Sort -39, 4371, 2, 95 in increasing order. -39, 2, 95, 4371 Sort 0, -0.5, -6, -0.2, 0.5, 4250 in descending order. 4250, 0.5, 0, -0.2, -0.5, -6 Put -2596, 5166, 0.2 in descending order. 5166, 0.2, -2596 Sort -0.577, -0.25, 1, -1, 191 in decreasing order. 191, 1, -0.25, -0.577, -1 Put 3130, 5, 190, 1 in decreasing order. 3130, 190, 5, 1 Put 93, 0, -15462, 3, -1 in decreasing order. 93, 3, 0, -1, -15462 Put -10826329, 3, 2 in descending order. 3, 2, -10826329 Put 5, 140, -4, -1, -28, 15, -8 in increasing order. -28, -8, -4, -1, 5, 15, 140 Put -935, 31, -20 in decreasing order. 31, -20, -935 Sort 2, -11010, -70 in increasing order. -11010, -70, 2 Put 0.3, -4, 0, 8.39, 0.55, 4, 1/6 in descending order. 8.39, 4, 0.55, 0.3, 1/6, 0, -4 Sort 24190, 2, -5, 5, 1580 in descending order. 24190, 1580, 5, 2, -5 Put 0, -5075, -62 in descending order. 0, -62, -5075 Sort -1, -7, -75, 2, 62 in decreasing order. 62, 2, -1, -7, -75 Sort -0.09, -0.1, 2/5, 5, -848. -848, -0.1, -0.09, 2/5, 5 Sort -5, 596665, -2, 0 in ascending order. -5, -2, 0, 59
2023-12-13T01:27:04.277712
https://example.com/article/5951
Q: Frenet frame of a curve on the surface of a torus Let $\gamma(t)=[cos(at),sin(at),cos(bt),sin(bt)]$ be a curve in $\mathbb{R}^4$. We can think of the image of this curve to be a curve in $\mathbb{R}^3$, as a helix swirling about the z-axis, or rather, on the surface or a torus. I want to find the Frenet frame of $\gamma(t)$. Because the curve is defined to be in $\mathbb{R}^4$, the standard method of finding a frenet frame in terms of $\{T,N,B\}$ will not work. We will have to used the generalized method of finding a frenet frame, which involves the gramm-schmidt process. I have tried to make this calculation and things got extremly awful, which made me think that perhaps there is a way of calculating the frenet frame using the fact that we know it's on the surface of a torus, thus it will be contained in $\mathbb{R}^3$. I'm a little afraid to try to make this calculation by brute force again, if anyone has any insights to help me out here it would be much appreciated!! Clarification: Well, in $\mathbb{R}^4$ we can think of this curve as parameterizing two circles in $\mathbb{R}^2 \times \mathbb{R}^2$. But we can think of $S^1 \times S^1$ as a Torus, which can be imbedded into $\mathbb{R}^3$ A: By definition, the Frenet frame of a curve in $\Bbb R^4$ (and this will generalize to higher dimensions) satisfying certain generic conditions is defined as follows. Start with an arclength parametrization $\alpha(s)$. Define an orthonormal frame $e_1,e_2,e_3,e_4$, depending on $s$, by \begin{alignat*}{4} \alpha' &= e_1 &&& \\ e_1' &= &\kappa_1 e_2 \\ e_2' &= -\kappa_1 e_1 & & &+\kappa_2 e_3 \\ e_3' &= & -\kappa_2 e_2 & && +\kappa_3 e_4 \\ e_4' &= &&&-\kappa_3 e_3 \end{alignat*} Note that for the Frenet frame of a curve in $\Bbb R^3$ to be well-defined, we must have $\kappa$ everywhere nonzero. For a curve in $\Bbb R^4$, we need $\kappa_1$ and $\kappa_2$ everywhere nonzero.
2023-12-29T01:27:04.277712
https://example.com/article/9829
University of Antelope Valley The University of Antelope Valley (UAV) is a private, for-profit university in Lancaster, California. It offers masters, bachelors, and associate degrees as well as certificate programs and continuing education courses. History The school was founded as Antelope Valley Medical College in 1997 by retired Los Angeles City firefighter / paramedic Marco Johnson and his wife Sandra as a school teaching community CPR, first aid, EMT and other medical training. In 2009 the school was accredited by the United States Department of Education and the Accrediting Council for Independent Colleges and Schools and began granting associate's, bachelor's, and master's degrees and became the University of Antelope Valley. In 2016 the University of Antelope Valley received its regional accreditation with WASC Western Association of Schools and Colleges. Academics UAV offers five associate degrees, eight bachelor's degree programs, and three master's degree programs. A variety of certificate programs are also available. UAV is accredited by the Western Association of Schools and Colleges (WSCUC) and Commission on Accreditation of Allied Health Education Programs (CAAHEP). It is also approved by California's Bureau for Private Postsecondary Education (BPPE). UAV's Paramedic Program is only 1 of 4 programs approved in Los Angeles County. Athletics The University of Antelope Valley's athletic teams are known as the Pioneers. The UAV Pioneers started competing as an independent in the National Association of Intercollegiate Athletics during the 200405 school year, and joined the California Pacific Conference (Cal Pac) for the 2015-16 school year. The school currently offers men's and women's cross country, soccer, and basketball; women's softball, women's volleyball, and men's baseball. References External links Official website Category:1997 establishments in California Category:Private universities and colleges in California Category:Education in Lancaster, California Category:Educational institutions established in 1997 Category:California Pacific Conference schools
2023-10-16T01:27:04.277712
https://example.com/article/2763
Functional coatings are very important in industry and the consumer marketplace today. There can be many reasons for coatings, ranging from performance for intended applications, to safety considerations, to total part costs (e.g., utilizing specialized materials for exposed surfaces rather than entire bulk objects). Functional performance properties that are currently desired include anti-reflective, anti-icing, superhydrophobic, superhydrophilic, de-wetting, and self-cleaning properties. Anti-icing (or ice-repellent) coatings can have significant impact on improving safety in many infrastructure, transportation, and cooling systems. Among numerous problems caused by icing, many are due to striking of supercooled water droplets onto a solid surface. Such icing caused by supercooled water, also known as freezing rain, atmospheric icing, or impact ice, is notorious for glazing roadways, breaking tree limbs and power lines, and stalling airfoil of aircrafts. When supercooled water impacts surfaces, icing may occur through a heterogeneous nucleation process at the contact between water and the particles exposed on the surfaces. Icing of supercooled water on surfaces is a complex phenomenon, and it may also depend on ice adhesion, hydrodynamic conditions, the structure of the water film on the surface, and the surface energy of the surface (how well the water wets it). Melting-point-depression fluids are well-known as a single-use approach that must be applied either just before or after icing occurs. These fluids (e.g., ethylene or propylene glycol) naturally dissipate under typical conditions of intended use (e.g. aircraft wings, roads, and windshields). These fluids do not provide extended (e.g., longer than about one hour) deicing or anti-icing. Similarly, sprayed Teflon® or fluorocarbon particles affect wetting but are removed by wiping the surface. These materials are not durable. Recent efforts for developing anti-icing or ice-phobic surfaces have been mostly devoted to utilize lotus leaf-inspired superhydrophobic surfaces. These surfaces fail in high humidity conditions, however, due to water condensation and frost formation, and even lead to increased ice adhesion due to a large surface area. Superhydrophobicity, characterized by the high contact angle and small hysteresis of water droplets, on surfaces has been attributed to a layer of air pockets formed between water and a rough substrate. Many investigators have thus produced high contact angle surfaces through combinations of hydrophobic surface features combined with roughness or surface texture. One common method is to apply lithographic techniques to form regular features on a surface. This typically involves the creation of a series of pillars or posts that force the droplet to interact with a large area fraction of air-water interface. However, surface features such as these are not easily scalable due to the lithographic techniques used to fabricate them. Also, such surface features are susceptible to impact or abrasion during normal use. Other investigators have produced coatings capable of freezing-point depression of water. This typically involves the use of small particles which are known to reduce freezing point. Many of these coatings can actually be removed by simply wiping the surface, or through other impacts. Others have introduced melting depressants (salts or glycols) that leech out of surfaces. Once the leeching is done, the coatings do not work as anti-icing surfaces. Nanoparticle-polymer composite coatings can provide melting-point depression and enable anti-icing, but they do not generally resist wetting of water on the surface. When water is not repelled from the surface, ice layers can still form that are difficult to remove. Even when there is some surface roughness initially, following abrasion the nanoparticles will no longer be present and the coatings will not function effectively as anti-icing surfaces. Generally, surfaces with anti-reflective, anti-icing, superhydrophobic, superhydrophilic, de-wetting, and self-cleaning properties rely on structural features (ordered or disordered) in the size range of a few nanometers to tens of micrometers. There are various approaches to achieve such surface structural features. Conventional approaches using light to create polymer surface patterns with anti-reflective, anti-icing, de-wetting, self-cleaning, and superhydrophobic/superhydrophilic properties require either a patterned exposure of light (patterning light intensity or polarization) or filler particles that provide the surface topology. Reactive ion etching methods can be used to create nanopillars on a silicon wafer. A pattern is first formed by using patterned light and/or interference lithography. Pillars are then etched using a reactive ion beam. This method is very expensive and time consuming. Self-assembly methods are known to form colloidal sphere crystals and inverse crystals. These are multi-step fabrication methods with expensive colloidal spheres as essential building blocks. Nanoparticle-polymer composite coatings can be fabricated through co-assembly. Nanoparticles need to be pre-fabricated, and the technique is time-consuming and expensive. There is little control over surface structure. Solvent-based coatings with filler particles are well-known in the coating industry. A surface texture that provides a matte finish is achieved when the solvent evaporates. Filler particles create the surface texture. There is a need in the art for surface-textured coatings that can be conveniently produced without requiring patterned light during production or filler particles in the final coating product. Such coatings preferably utilize low-cost, lightweight, and environmentally benign materials that can be rapidly (minutes or hours, not days) produced over large areas. These surface-structured coatings should be able to be modified with various chemistries for use in anti-reflective, anti-icing, superhydrophobic, superhydrophilic, de-wetting, and self-cleaning applications.
2023-10-18T01:27:04.277712
https://example.com/article/5857
Q: How do I compare multiple vector of structs for similar names efficiently? I am writing a program for my wife to help us try to decide which medical schools that she should apply for. However, I have run into a problem where I am trying to extract schools that show up in the top 20 results in 4 different cases. For example, in one of those cases I take the median income of the city, and divide it by the average house price in the city. That returns a double, and then I create a new vector and then sort that vector based on that number from highest to lowest. And I do similar actions to the 3 other vectors in my pool with different cases applied. I know I can just brute force this and extract the names with nested for loops, but I am curious to know if there is a way to do it quickly and efficiently. This is my attempt so far. (Note, this is just an example, my actual code has 30 schools in it). #include <algorithm> #include <iterator> #include <iostream> #include <memory> #include <string> #include <vector> struct Schools { Schools(std::string n = "", double h = 0.0, double t = 0.0, int r = 0, int w = 0) : name(n), housing(h), tuition(t), rank(r), weight(w){}; std::string name; double housing; double tuition; int rank; int weight; }; void load(std::vector<std::shared_ptr<Schools>> &v, std::string n, double h, double t, int r, int w) { auto newSchool = std::make_shared<Schools>(n,h,t,r,w); v.emplace_back(newSchool); } void init(std::vector<std::shared_ptr<Schools>> &schools) { load(schools,"School1",40.3,20.0,3,6); load(schools,"School2",10.3,10.4,5,1); load(schools,"School3",33.3,23.5,1,2); load(schools,"School4",8.5,15.5,4,8); } auto findIntersection(auto &a, auto &b) { std::vector<std::shared_ptr<Schools>> in; std::set_intersection(begin(a),end(a),begin(b),end(b),std::back_inserter(in)); return in; } auto findCommon(auto &housing, auto &tuition, auto &rank, auto &weight) { std::vector<std::shared_ptr<Schools>> inCommon; inCommon = findIntersection(housing,tuition); inCommon = findIntersection(inCommon,rank); inCommon = findIntersection(inCommon,weight); return inCommon; } bool compareHM(const std::shared_ptr<Schools> &a, const std::shared_ptr<Schools> &b) { return a->housing < b->housing; } bool compareT(const std::shared_ptr<Schools> &a, const std::shared_ptr<Schools> &b) { return a->tuition < b->tuition; } bool compareRank(const std::shared_ptr<Schools> &a, const std::shared_ptr<Schools> &b) { return a->rank > b->rank; } bool compareWeight(const std::shared_ptr<Schools> &a, const std::shared_ptr<Schools> &b) { return a->weight > b->weight; } int main() { std::vector<std::shared_ptr<Schools>> schools; init(schools); std::vector<std::shared_ptr<Schools>> sortByHousing = schools; std::vector<std::shared_ptr<Schools>> sortByTuition = schools; std::vector<std::shared_ptr<Schools>> sortByRank = schools; std::vector<std::shared_ptr<Schools>> sortByWeight = schools; std::sort(begin(sortByHousing),end(sortByHousing), compareHM); std::sort(begin(sortByTuition),end(sortByTuition), compareT); std::sort(begin(sortByRank),end(sortByRank), compareRank); std::sort(begin(sortByWeight),end(sortByWeight), compareWeight); std::vector<std::shared_ptr<Schools>> commonSchools = findCommon(sortByHousing,sortByTuition,sortByRank,sortByWeight); for (auto && e: commonSchools) { std::cout << e->name << std::endl; } } I run into a problem when I try to use std::set_intersection, and then I quickly realized that I cannot do something like begin(a)->name. Again, I am trying to extract common names that show up in each of the 4 cases that I have. How do I go about implementing this? Is my idea of std::set_intersection not too far off? Thanks! EDIT: This is an example of one of my functionThatCompares bool compareTuition(const std::shared_ptr<Schools> &a, const std::shared_ptr<Schools> &b) { return a->tuition < b->tuition; } EDIT 2: Example Output The top 20 sorted by Median/House are: Name of Institution Median/House Price Tuition Over 8 Years Has Space Industry? Score University of Alabama 0.463577 0.722279 1 0.641825 University of Maryland 0.38124 0.722617 1 0.527583 Johns Hopkins Univerty School of Medicine 0.38124 0.606103 1 0.629002 Indiana University 0.335939 0.501944 0 0.669276 Ohio State University 0.32499 0.610704 1 0.532156 Perelman School of Medicine 0.26908 0.653143 1 0.411977 Duke University School of Medicine 0.246991 0.66683 1 0.370395 University of Wisconsin 0.226581 0.64686 0 0.350278 Chicago Medical School 0.221883 0.648157 0 0.342329 Northwestern University 0.221883 0.677341 0 0.32758 Case Western Reserve 0.211817 0.536384 1 0.394898 Emory University 0.206169 0.576814 1 0.357427 Geisel School of Medicine 0.205529 0.71526 0 0.287349 University of Massachusetts 0.19562 0.64686 1 0.302414 Medical University of SC 0.185816 0.354728 0 0.523827 University of North Carolina 0.176684 0.6637 0 0.26621 University of Michigan Medical School 0.158465 0.637237 1 0.248675 Rutgers New Jersey Medical School 0.140412 0.722115 0 0.194446 University of Utah 0.140142 0.311285 0 0.450205 Georgetown University 0.128883 0.604001 1 0.213382 The top 20 sorted by Tuition are: Name of Institution Median/House Price Tuition Over 8 Years Has Space Industry? Score University of Utah 0.140142 0.311285 0 0.450205 Medical University of SC 0.185816 0.354728 0 0.523827 University of California, LA 0.07633 0.47547 1 0.160536 Indiana University 0.335939 0.501944 0 0.669276 University of California, SD 0.109214 0.531397 1 0.205523 Case Western Reserve 0.211817 0.536384 1 0.394898 Emory University 0.206169 0.576814 1 0.357427 Icahn School of Medicine 0.0822029 0.585946 1 0.140291 Georgetown University 0.128883 0.604001 1 0.213382 Johns Hopkins Univerty School of Medicine 0.38124 0.606103 1 0.629002 Ohio State University 0.32499 0.610704 1 0.532156 University of Virgina School of Medicine 0.123755 0.630067 1 0.196415 University of Michigan Medical School 0.158465 0.637237 1 0.248675 NY University School of Medicine 0.0822029 0.642516 1 0.127939 Tufts University School of Medicine 0.100302 0.644314 1 0.155672 University of Massachusetts 0.19562 0.64686 1 0.302414 University of Wisconsin 0.226581 0.64686 0 0.350278 Chicago Medical School 0.221883 0.648157 0 0.342329 Perelman School of Medicine 0.26908 0.653143 1 0.411977 Standford University School of Medicine 0.0780054 0.656658 1 0.118791 The top 20 sorted by Median/House and Loweset Tution are: Name of Institution Median/House Price Tuition Over 8 Years Has Space Industry? Score University of Maryland 0.38124 0.722617 1 0.527583 Chicago Medical School 0.221883 0.648157 0 0.342329 University Of Washington 0.0973689 0.761413 1 0.127879 University of Alabama 0.463577 0.722279 1 0.641825 Rutgers New Jersey Medical School 0.140412 0.722115 0 0.194446 Geisel School of Medicine 0.205529 0.71526 0 0.287349 Ohio State University 0.32499 0.610704 1 0.532156 Harvard Medical School 0.100302 0.710787 1 0.141114 Duke University School of Medicine 0.246991 0.66683 1 0.370395 Boston University School of Medicine 0.100302 0.710787 1 0.141114 Perelman School of Medicine 0.26908 0.653143 1 0.411977 University of Wisconsin 0.226581 0.64686 0 0.350278 University of North Carolina 0.176684 0.6637 0 0.26621 Standford University School of Medicine 0.0780054 0.656658 1 0.118791 Johns Hopkins Univerty School of Medicine 0.38124 0.606103 1 0.629002 Northwestern University 0.221883 0.677341 0 0.32758 Indiana University 0.335939 0.501944 0 0.669276 Case Western Reserve 0.211817 0.536384 1 0.394898 Emory University 0.206169 0.576814 1 0.357427 University of Massachusetts 0.19562 0.64686 1 0.302414 The top 20 sorted by Score (Median/House * Tuition/Salary) are: Name of Institution Median/House Price Tuition Over 8 Years Has Space Industry? Score Indiana University 0.335939 0.501944 0 0.669276 University of Alabama 0.463577 0.722279 1 0.641825 Johns Hopkins Univerty School of Medicine 0.38124 0.606103 1 0.629002 Ohio State University 0.32499 0.610704 1 0.532156 University of Maryland 0.38124 0.722617 1 0.527583 Medical University of SC 0.185816 0.354728 0 0.523827 University of Utah 0.140142 0.311285 0 0.450205 Perelman School of Medicine 0.26908 0.653143 1 0.411977 Case Western Reserve 0.211817 0.536384 1 0.394898 Duke University School of Medicine 0.246991 0.66683 1 0.370395 Emory University 0.206169 0.576814 1 0.357427 University of Wisconsin 0.226581 0.64686 0 0.350278 Chicago Medical School 0.221883 0.648157 0 0.342329 Northwestern University 0.221883 0.677341 0 0.32758 University of Massachusetts 0.19562 0.64686 1 0.302414 Geisel School of Medicine 0.205529 0.71526 0 0.287349 University of North Carolina 0.176684 0.6637 0 0.26621 University of Michigan Medical School 0.158465 0.637237 1 0.248675 Georgetown University 0.128883 0.604001 1 0.213382 University of California, SD 0.109214 0.531397 1 0.205523 EDIT 3: I Greatly Apologize for those who tried to compile this program. It now compiles and runs. A: When you do something like a sort or a set_intersection, you can specify how comparison should be done. If you don't specify anything, operator< for the type will be used (if it's defined). In this case, it seems like you probably want to use partial_sort_copy instead of sort. This will let you get (for example) the top 10 schools by each sorting. Then you'll have to re-sort those by name to do the set_intersection. Then you'll do the set_intersection to get the schools that are common between those collections. Here's some demo code: #include <iostream> #include <algorithm> #include <vector> #include <memory> struct School { std::string name; double housing; double tuition; int rank; int weight; // default comparison to use if nothing else is specified: bool operator<(School const &other) const { return name < other.name; } }; int main() { std::vector<School> schools{ {"School1", 40.3, 20.0, 3, 6}, {"School2", 10.3, 10.4, 5, 1}, {"School3", 33.3, 23.5, 1, 2}, {"School4", 8.5, 15.5, 4, 8} }; // We specify the size of each of these as 3, so when we do the // partial_sort_copy, it'll fill in the top 3 for that category. std::vector<School> byHousing(3); std::vector<School> byRank(3); std::vector<School> byWeight(3); std::partial_sort_copy(schools.begin(), schools.end(), byHousing.begin(), byHousing.end(), [](School const &a, School const &b) { return a.housing < b.housing; }); std::partial_sort_copy(schools.begin(), schools.end(), byRank.begin(), byRank.end(), [](School const &a, School const &b) { return a.rank < b.rank; }); std::partial_sort_copy(schools.begin(), schools.end(), byWeight.begin(), byWeight.end(), [](School const &a, School const &b) { return a.weight < b.weight; }); std::sort(byHousing.begin(), byHousing.end()); std::sort(byRank.begin(), byRank.end()); std::sort(byWeight.begin(), byWeight.end()); std::vector<School> temp, commonSchools; std::set_intersection(byHousing.begin(), byHousing.end(), byRank.begin(), byRank.end(), std::back_inserter(temp)); std::set_intersection(temp.begin(), temp.end(), byWeight.begin(), byWeight.end(), std::back_inserter(commonSchools)); std::cout << "Common Schools\n"; for (auto const & e: commonSchools) { std::cout << e.name << "\n"; } } Result: Common Schools School3 As an aside, it looked to me like making code using shared_ptr was going to add some extra work (and probably not gain enough to care about) so I didn't bother. I also left out the screening/sorting by tuition--it's pretty much just more of the same.
2024-05-23T01:27:04.277712
https://example.com/article/5817
Doug McAvoy Doug McAvoy (2 January 1939 – 12 May 2019) was a British trade union leader. He was General Secretary of the National Union of Teachers from 1989 to 2004. A teacher, McAvoy was secretary of Newcastle-upon-Tyne NUT and became a member of the National Executive of the Union in 1970. He was appointed Deputy General-Secretary designate in 1974, a post he held until 1989 when he became the first directly elected General Secretary in 1989. References External links Interview: Teachers' leader Doug McAvoy BBC News 22 April 2000 'McAvoy warns over union militants' BBC News June 23, 1999 'Furious McAvoy walks out of NUT meeting' The Independent 29 May 2004 Category:1939 births Category:2019 deaths Category:General Secretaries of the National Union of Teachers Category:Schoolteachers from Northumberland Category:English trade unionists Category:Members of the General Council of the Trades Union Congress
2024-07-21T01:27:04.277712
https://example.com/article/6234
--- bibliography: - 'solenoid.bib' - 'physics.bib' --- Introduction {#sec:intro} ============ The Magnetic Field of a Single Finite Continuous Solenoid {#sec:single-solenoid} ========================================================= The Magnetic Field of a Ring of Identical Parallel Finite Continuous Solenoids {#sec:ring-of-solenoids} ============================================================================== The Magnetic Field of an Hexagonal Array of Identical Parallel Continuous Solenoids {#sec:hex-array-of-solenoids} =================================================================================== Conclusions {#sec:conclusions} =========== Validation of the numerical calculations {#app-validation} ======================================== Adding up radial components $B_r$ from different solenoids {#app-adding-radial-components} ========================================================== We thank Stephen Teithsworth for helpful discussions.
2024-03-04T01:27:04.277712
https://example.com/article/5076
import React from "react"; import Backspace from "./Backspace"; import Delay from "./Delay"; export const sleep = (val) => new Promise((resolve) => ( val != null ? setTimeout(resolve, val) : resolve() )); export function gaussianRnd(mean, std) { const times = 12; let sum = 0; for (let idx = 0; idx < times; idx++) { sum += Math.random(); } sum -= (times / 2); return Math.round((sum) * std) + mean; } export function eachPromise(arr, iterator, ...extraArgs) { const promiseReducer = (prev, current, idx) => ( prev.then(() => iterator(current, idx, ...extraArgs)) ); return Array.from(arr).reduce(promiseReducer, Promise.resolve()); } export function exclude(obj, keys) { const res = {}; for (const key in obj) { if (keys.indexOf(key) === -1) { res[key] = obj[key]; } } return res; } export function isElementType(element, component, name) { const elementType = element && element.type; if (!elementType) { return false; } return ( elementType === component || elementType.componentName === name || elementType.displayName === name ); } export function isBackspaceElement(element) { return isElementType(element, Backspace, "Backspace"); } export function isDelayElement(element) { return isElementType(element, Delay, "Delay"); } export function extractTextFromElement(element) { const stack = element ? [element] : []; const lines = []; while (stack.length > 0) { const current = stack.pop(); if (React.isValidElement(current)) { if (isBackspaceElement(current) || isDelayElement(current)) { // If it is a `Backspace` or `Delay` element, we want to keep it in our // `textLines` state. These will serve as markers when updating the // state of the text lines.unshift(current); } else { React.Children.forEach(current.props.children, (child) => { stack.push(child); }); } } else if (Array.isArray(current)) { for (const el of current) { stack.push(el); } } else { lines.unshift(current); } } return lines; } export function cloneElement(element, children) { const tag = element.type; const props = exclude(element.props, ['children']); const getMilliseconds = new Date().getUTCMilliseconds(); const randomStamp = getMilliseconds + Math.random() + Math.random(); // eslint-disable-next-line props.key = `Typist-element-${tag}-${randomStamp}`; return React.createElement(tag, props, ...children); } function cloneElementWithSpecifiedTextAtIndex(element, textLines, textIdx) { if (textIdx >= textLines.length) { return [null, textIdx]; } let idx = textIdx; const recurse = (el) => { const [child, advIdx] = cloneElementWithSpecifiedTextAtIndex( el, textLines, idx ); idx = advIdx; return child; }; const isNonTypistElement = ( React.isValidElement(element) && !(isBackspaceElement(element) || isDelayElement(element)) ); if (isNonTypistElement) { const clonedChildren = React.Children.map(element.props.children, recurse) || []; return [cloneElement(element, clonedChildren), idx]; } if (Array.isArray(element)) { const children = element.map(recurse); return [children, idx]; } // Anything that isn't a React element or an Array is interpreted as text return [textLines[idx], idx + 1]; } export function cloneElementWithSpecifiedText({ element, textLines }) { if (!element) { return undefined; } return cloneElementWithSpecifiedTextAtIndex(element, textLines, 0)[0]; }
2023-11-23T01:27:04.277712
https://example.com/article/8402
The invention lies in the electronics field. More specifically, the invention relates to frequency-stabilized circuit configurations, in particular to a transmitting/receiving configuration with a high-frequency section with a reception mixing stage, which receives an RF received signal and converts the RF received signal to an analog IF received signal by down-mixing with an adjustable mixing frequency, and a signal processing circuit. The latter includes an A/D converter which converts the analog IF received signal to a digital received signal, a digital filter which is connected downstream of the A/D converter and emits a filtered digital received signal, and a frequency estimator which receives the filtered digital received signal. Circuit configurations of this type are used in communications terminals (base station and mobile station) in mobile communications systems. In practice, only a tightly constrained bandwidth range is generally available for the transmission of messages. In order to allow as many messages as possible to be transmitted, it is necessary to utilize the available bandwidth range as efficiently as possible. Firstly, multiple access methods such as time-division multiplex (TDMA, time division multiple access), frequency division multiplex (FDMA, frequency division multiple access), code division multiplex (CDMA, code division multiple access), and space division multiplex (SDMA, space division multiple access), as well as combinations of the multiple access methods allow flexible, requirement-oriented utilization of the available bandwidth. Secondly, best-possible utilization of the available bandwidth range must also be ensured in the hardware. In mobile radio technology, the available total bandwidth is subdivided into traffic channels with a predetermined channel bandwidth, with a subscriber being assigned a specific traffic channel when dialing into the mobile radio network. The radio-frequency section of the mobile communications terminal (referred to as the mobile station from here on) is tuned to the assigned channel (mid-)frequency by means of the reception mixing stage, and signal components which are outside the channel bandwidth range are removed from the received signal by means of suitable filters (bandpass filters or low-pass filters) in the intermediate frequency (IF) or baseband range. There is a risk during filtering, that frequency regions of the received signal in which information is carried may be filtered out inadvertently. The reasons for this are as follows: When the mobile station is moving relative to the stationary base station, the Doppler effect results in a frequency shift between the RF received signal received by the mobile station and the radio signal transmitted by the base station at the predetermined channel frequency. This Doppler frequency shift is transferred by the down-mixing process to the analog IF received signal and to the digital received signal, where it results in a mismatch between these signals and the spectral pass band of the downstream filter. Furthermore, slow drifts and rapid time fluctuations in the mixing frequency used for down-mixing the RF received signal in the reception mixing stage contribute to undesirable signal losses. Such drifts and fluctuations in the mixing frequency are caused by temperature drifts and phase noise in the oscillator that is used. It has already been known from the prior art for frequency correction bursts (FCB) to be transmitted at regular time intervals in the radio signal transmitted by the base station. The FCB is searched for in the radio-frequency section of the mobile station using a frequency pattern with a pattern width of, for example, 20 kHz. The FCB can be determined to the accuracy of the pattern width by tuning to that pattern frequency which has the maximum FCB received signal strength. The mixing frequency is then readjusted as a function of the determined pattern frequency. This makes it possible to compensate for relatively slow frequency shifts caused by the Doppler effect and drifts in the mixing frequency. It has already been known for oscillators with low phase noise to be used in order to reduce rapid frequency fluctuations. However, these have the disadvantage that low-noise oscillators are relatively expensive. U.S. Pat. No. 5,241,688 describes a circuit for frequency synchronization of a mobile radio receiver. On detection of an FCB, an I/Q decoder in the digital signal processing section of the mobile radio receiver produces a control signal, which is supplied to a local oscillator where it compensates for the frequency offset. This control signal is produced in the I/Q decoder by estimating the signal energy downstream from adaptive bandpass filtering. The object of the present invention is to provide a circuit configuration which overcomes the above-noted deficiencies and disadvantages of the prior art devices and methods of this general kind, and which is suitable for use in a communications terminal, can be produced economically, and allows good spectral utilization of a traffic channel with a predetermined bandwidth. With the above and other objects in view there is provided, in accordance with the invention, a circuit configuration, comprising: a radio-frequency section having a reception mixing stage configured to receive an RF received signal and to convert the RF received signal to an analog IF received signal by down-mixing with an adjustable mixing frequency; and a signal processing circuit connected to the radio-frequency section and having an A/D converter for converting the analog IF received signal to a digital received signal; a digital filter connected to receive the digital received signal from the A/D converter, the digital filter having a given pass band and outputting a filtered digital received signal; a channel estimator for estimating a transfer function of a radio channel connected to the digital filter; and a frequency estimator contained in the channel estimator and connected to receive the filtered digital received signal from the digital filter, the frequency estimator continuously determining a first frequency correction control signal representative of a frequency offset between a frequency of the analog IF received signal and a frequency characteristic of the pass band of the digital filter, and the frequency estimator outputting the first frequency correction control signal for readjusting the mixing frequency in the radio-frequency section. In other words, the first frequency correction control signal, which is required for readjustment of the mixing frequency, is not generated, as is normally done in the prior art, in the radio-frequency section, but is determined by calculation in the frequency estimator. The frequency estimator is implemented in the channel estimator. The invention is thus dependent only on appropriate programming of the channel estimator (which is required in any case for mobile radio applications), and can thus be implemented economically and in a hardware-efficient manner in the circuit configuration. The reception mixing stage can down-mix to a frequency range at a reduced frequency, or else directly to baseband (direct down-conversion). The term IF frequency used herein is intended to refer to any frequency below the carrier frequency, including baseband. The circuit configuration is preferably designed not only as a receiver but also as a transmitter. The signal processing circuit then, furthermore, has a digital modulator and a D/A converter, and the radio-frequency section is equipped with a transmission mixing stage. An analog transmission signal which is produced by the digital modulator and is emitted by the D/A converter is supplied to the radio-frequency section and is converted in the transmission mixing stage, by up-mixing, to an RF transmission signal, using a further mixing frequency which is set as a function of the first frequency correction control signal. The advantages stated with respect to the receiving section of the circuit configuration according to the invention apply equally to the transmission section. In accordance with an added feature of the invention, the signal processing circuit further includes a digital modulator and a D/A converter; the radio-frequency section has a transmission mixing stage; and an analog transmission signal produced by the digital modulator and output by the D/A converter, is supplied to the radio frequency section and is converted to an RF transmission signal in the transmission mixing stage by up-mixing with a further mixing frequency set in dependence on the first frequency correction control signal. In accordance with an additional feature of the invention, there is provided an oscillator having a controllable oscillator frequency, the oscillator receiving the first frequency correction control signal for controlling the oscillator frequency, and wherein at least one of the mixing frequency and the further mixing frequency is derived from the controlled oscillator frequency. In other words, the mixing frequency and/or the further mixing frequency is derived from the oscillator frequency. In accordance with another feature of the invention, a radio received signal, transmitted by a base station, contains a cyclically recurring frequency correction burst signal component, in the form of a sinusoidal oscillation; and the frequency estimator estimates the frequency offset by evaluating a signal component of the filtered digital received signal, on which the frequency correction burst signal component of the radio received signal is based. In order, therefore, to determine the frequency offset, a radio signal transmitted by a base station preferably contains a frequency correction burst signal component (FCB), which recurs cyclically, in the form of a sinusoidal oscillation, and the frequency estimator estimates the frequency offset from an evaluation of a signal component of the filtered digital received signal, on which the frequency correction burst signal component (FCB) of the radio signal is based. The frequency correction burst signal component (FCB) is preferably transmitted by the base station every 10 to 100 ms. The first frequency correction control signal can then be determined at the same rate, that is to say likewise every 10 to 100 ms. This rate is sufficient to correct slow frequency shifts, such as those which result from drift of the oscillator crystal as a result of temperature changes. With the above and other objects in view there is also provided, in accordance with the invention, a circuit configuration, comprising: a radio-frequency section with a reception mixing stage connected to receive an RF received signal and converting the RF received signal by downmixing to an analog IF received signal; and a signal processing circuit having an A/D converter converting the analog IF received signal to a digital received signal; a digital filter connected downstream of the A/D converter, the digital filter having a given pass band, and outputting a filtered digital received signal; and a frequency estimator connected to receive the filtered digital received signal, the frequency estimator continuously determining a second frequency correction control signal representative of a frequency offset between a frequency of the analog IF received signal and a frequency characteristic of the pass band of the digital filter; and wherein the second frequency correction control signal is used for at least one of a spectral reprocessing of the digital received signal upstream of the digital filter and a readjustment of the pass band of the digital filter. Similarly to the configuration summarized above, a (second) frequency correction control signal is also determined here by calculation in the frequency estimator, and this signal is representative of the frequency offset between the analog IF received signal and a frequency that is characteristic of the pass band of the digital filter. In contrast to the situation in the first-outlined solution, the second frequency correction control signal is, however, not used for readjustment of the mixing frequency, but either for spectral reprocessing of the digital received signal upstream of the digital filter, or for readjustment of the pass band of the digital filter. In this solution as well, the measures according to the invention are carried out by calculation, without any need for additional complexity in the hardware area. The circuit configuration is preferably likewise equipped with further circuit devices for transmitting a radio signal. In this case, the signal processing circuit furthermore has a digital modulator and a D/A converter, with a modulated digital transmission signal, which is provided by the digital modulator, then converted by the D/A converter to an analog transmission signal. The second frequency correction control signal is supplied to the digital modulator, with the digital modulator changing the frequency of the modulated digital transmission signal as a function of the second frequency correction control signal. According to one preferred embodiment of the invention, the frequency estimator uses the moment calculation method in order to estimate the frequency offset. It has been found that this method allows the frequency offset to be determined particularly accurately and with little complexity. The invention can provide for the frequency estimator to in each case redetermine the second frequency correction control signal for each of the data symbols in the filtered digital received signal. This determination of the second frequency correction control signal symbol-by-symbol results in the best possible time resolution. High time resolution allows effective correction for rapid frequency fluctuations which are caused by phase noise in the oscillator. Other features which are considered as characteristic for the invention are set forth in the appended claims. Although the invention is illustrated and described herein as embodied in a frequency stabilized transmitting/receiving configuration, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims. The construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments when read in connection with the accompanying drawings.
2023-09-07T01:27:04.277712
https://example.com/article/3289
[Invasive inflammatory pseudotumor of the lung]. Inflammatory pseudotumor of the lung is an uncommon nonneoplastic tumor of unknown origin. It can mimic lung carcinoma. We report a 65-year-old man who presented with productive cough, weight loss, and a heterogeneous right apical lung condensation. This clinical and radiographic presentation suggested a malignant lung tumor. Surgery was performed and the histological examination of the surgical specimen concluded to an inflammatory pseudotumor. A pneumonectomy was performed because of the tumor extension towards the lower lobe and the mediastinum. No recurrence was observed after a 2-year follow-up. Surgery is essential to confirm the diagnosis of inflammatory pseudotumor. Complete resection is the only guarantee to prevent recurrence.
2024-07-17T01:27:04.277712
https://example.com/article/6706
[Experiment studies on viscoelastic properties of erythrocyte membrane in patients with pulmonale during acute exacerbation]. The membrane viscoelasticity of erythrocyte taken from both normal subjects and patients with cor pulmonale during acute exacerbation was investigated using a micropipette aspiration technique. Experimental results were analysed with vogit viscoelaticity model based on pioneering theory of Chein et al. The results showed that the erythrocyte membrane elastic moduli ((6.970 +/- 1.050) x 10(-3) dyn/cm) and viscous coefficients ((0.936 +/- 0.242) x 10(-4) dyn x s/cm) of the cor pulmonale patients was significantly higher than those of the normal subjects ((5.203 +/- 1.051) X 10(-3) dyn/cm, (0.620 +/- 0.053) x 10(-4) dyn x s/cm). The membrane elastic moduli, viscous coefficients, rigidity of erythrocyte, and viscosity were all increased. It may be the important subcellular mechanism to cause the decrease of erythrocyte deformability and hyperviscosity of blood in these patients.
2024-01-05T01:27:04.277712
https://example.com/article/5971
Chelsea Outfoxed By Ranieri’s Table-Topping Leicester An abject and directionless first half gave Chelsea too much of a mountain to climb against high-flying Leicester in Monday night’s Premier League encounter. The match finished 2-1 to the East Midlands team, who are now back in the position that Chelsea occupied for so much of last season. In a tense yet open game Riyad Mahrez and Jamie Vardy showed why they are the league’s two deadliest weapons with a goal each against a Blues team who can see the fourth place finish they’re hoping for drift further and further away. By contrast, Claudio Ranieri’s Foxes showed what a powerful force a high level of confidence is. The Chelsea team that started at the King Power Stadium lined up as they did in midweek against Porto, with Courtois in goal behind a defensive line of Ivanovic, Zouma, Terry and Azpilicueta; Ramires and Matic started in midfield just behind Willian, Oscar and Hazard; with Costa up front. The home team started with Schmeichel in goal behind Simpson, Morgan, Huth and Fuchs; Mahrez, Drinkwater, Kante and Albrighton started behind the front two of Vardy and Ulloa. With Leicester in such a rich vein of form, Chelsea would have known that the only route to three points would have been to match the energy levels of their opponents. That high level was not applied at any point in the first half, however. Mahrez began brightest as he danced his way through the Chelsea midfield and tested Courtois with an early shot. The Algerian midfielder continued to make life difficult for the Blues and Courtois was again called upon to block one of his efforts 20 minutes in. Both teams suffered casualties in the first half with Danny Drinkwater going off due to a thigh injury before Eden Hazard was swapped with Pedro – the Belgian seemingly unable to continue after getting up from a relatively innocuous challenge. Chelsea would have been well aware of the danger of Leicester’s counter attack, yet they continued to knock the ball around with no purpose in the home team’s half, leaving themselves well open to the pace of Vardy & co. With Ramires providing a little more stability next to Matic though, Chelsea coped and the game looked set to drop in to an equilibrium. That was until the thirty-third minute, when the Premier League’s record breaking striker Vardy darted in behind Terry to knock in a simple yet effective Mahrez cross. The forward’s run was not tracked by Zouma and Terry, for reasons only known to him, chose not to head the ball away when it looked as though he could have. Chelsea still hadn’t got into gear by the time the whistle blew for the break. With Diego Costa looking clumsy and average against centre-backs Morgan and former-blue Huth, Chelsea’s attack stalled whenever it got near the box. Jose Mourinho’s half time team talk seemed to fall on deaf ears, and three minutes after the break they were 2-0 down. A looped cross found Mahrez on the back post, whose feet then turned Azpilicueta inside and out before he curled a fantastic finish past Courtois. It was a goal that Chelsea fans could only dream of seeing one of their players score this season, made possible only due to the immense belief that Leicester’s players currently have. The second goal did spark some life into Chelsea, and after Fabregas and Remy were brought on for Oscar and Terry the Blues looked like they could finally find a way to goal. Diego Costa should have pulled one back after he went through one-on-one with Schmeichel, but the Spanish striker could only kick it at the keeper’s outstretched legs. The resulting corner flashed across the goal and Ivanovic couldn’t seem to knock it into an empty net. Chelsea were getting frustrated, and as they pushed further forward the game opened up more. Leicester then had a penalty shout turned down when the ball struck Costa’s arm in the away team’s box, but replays showed it would have been a harsh penalty to give. Chelsea’s forays forward were rewarded though when they got a goal back on 77 minutes. The ball was worked out to the left flank and Pedro whipped in a fantastic cross that Remy headed in from a couple of yards out. Remy’s goal and his energy will have Chelsea fans wondering how different their season would have been if he was on the pitch more often, as he is clearly one of the few players who is a natural finisher. After the goal Chelsea never really got in behind Leicester again to find the equaliser, and the Foxes didn’t struggle too much in holding on to their lead – their hard work being enough to see them over the line. It was a period of play for Chelsea though that showcased the energy levels they should have started the game with, rather than waiting until they were all but beaten. With Mourinho stating after the game that a top-four finish is no longer on the cards, Chelsea’s season can only be salvaged with a decent run in the Champions League or FA Cup. Having drawn PSG in the last 16 again though, it’s going to take a monumental shift in momentum between now and February to have anything to cheer about come May.
2024-07-24T01:27:04.277712
https://example.com/article/6355
/******************************************************************************* * ___ _ ____ ____ * / _ \ _ _ ___ ___| |_| _ \| __ ) * | | | | | | |/ _ \/ __| __| | | | _ \ * | |_| | |_| | __/\__ \ |_| |_| | |_) | * \__\_\\__,_|\___||___/\__|____/|____/ * * Copyright (c) 2014-2019 Appsicle * Copyright (c) 2019-2020 QuestDB * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ package io.questdb.griffin.engine.functions.math; import io.questdb.griffin.FunctionFactory; import io.questdb.griffin.SqlException; import io.questdb.griffin.engine.AbstractFunctionFactoryTest; import org.junit.Test; public class AbsDoubleFunctionFactoryTest extends AbstractFunctionFactoryTest { @Test public void testPositive() throws SqlException { call(13.1).andAssert(13.1, 0.0000000001); } @Test public void testNegative() throws SqlException { call(-13.1).andAssert(13.1, 0.0000000001); } @Override protected FunctionFactory getFunctionFactory() { return new AbsDoubleFunctionFactory(); } }
2024-04-16T01:27:04.277712
https://example.com/article/1058
Ministry of Defence staff recorded sightings of alien craft over Wallasey Town Hall and a saucer-shaped Unidentified Flying Object (UFO) hovering over Waterloo Bridge, it has been revealed. Files detailing hundreds of sightings of unexplained objects in the skies above Britain have been opened to the public for the first time. The information was considered sufficiently important for a form to be produced which is kept by police stations and airbases ready to record details of such reports. Briefing documents for government ministers facing questions about policy on unidentified flying objects also form part of the release at the National Archives in Kew. But the Ministry of Defence (MoD) was not investigating the possibility of visitors from outer space making a stop at Earth. Defence intelligence staff were more interested in checking that UFOs were not in fact signs of earthly covert spying missions by other countries. Nick Pope, who worked for the MoD for 21 years and was responsible for investigating the sightings said: “While there’s no evidence of little green men in these files, they should be of immense interest to sceptics and believers. “Most of the UFO sightings here are probably misidentifications of aircraft lights and meteors, but some are more difficult to explain, and include UFOs seen by police officers and pilots, and cases where UFOs have been tracked on radar.” Eight files have been released after a Freedom of Information request by UFO researchers. Over the next four years more than 150 files will be thrown open. But those hoping for proof of little green men will be disappointed. An MoD memo, written in 1983, sets out their position very clearly. “The sole interest of the Ministry of Defence in UFO reports is to establish whether they reveal anything of defence interest (e.g intruding aircraft). Reports are passed to operations staff who examine them as part of their normal duties.”
2024-01-18T01:27:04.277712
https://example.com/article/6277
"use strict"; const ReportBuilder = require('../lib/fluentReportsBuilder').ReportBuilder; const displayReport = require('./reportDisplayer'); const data = [ { "date": "01/01/2020", "items": [ { "group": 1, "number": 1, "blah": [ {"hi": 11}, {"hi": 12} ] }, { "group": 2, "number": 2, "blah": [ {"hi": 22}, {"hi": 23} ] } ], "itemsold": [ { "group": 3, "number": 3, "blah2": [ {"hi": 33}, {"hi": 34} ] }, { "group": 4, "number": 4, "blah2": [ {"hi": 44}, {"hi": 45} ] } ] } ]; // Reports can have multiple States; by default they have one State, so all states will be directed to this value // However, a specific "type" can have its own state; called "state: <number>" // All functions that are created should be "function (report, data, state, vars)" let reportData = { "type": "report", "dataUUID": 10002, "fontSize": 0, "autoPrint": false, "name": "demo23.pdf", "paperSize": "letter", "paperOrientation": "portrait", "fonts": [], "variables": { "test": "1", "temp": "5" }, "subReports": [ { "dataUUID": 10003, "dataType": "parent", "data": "items", "subReports": [ { "dataUUID": 10004, "dataType": "parent", "data": "blah", "type": "report", "detail": [ { "text": "Subreport items/blah Data", "settings": { "align": 0, "absoluteY": 0, }, "type": "print" }, { "type": "print", "settings": { "absoluteX": 210, "absoluteY": 0, "align": 0 }, "field": "hi" }, { "type": "print", "settings": { "absoluteX": 190, "absoluteY": 0, "align": 0 }, "variable": "temp" } ] } ], "calcs": { "sum": [ "group" ] } }, { "dataUUID": 10005, "dataType": "parent", "data": "itemsold", "subReports": [ { "dataUUID": 10006, "dataType": "parent", "data": "blah2", "type": "report", "detail": [ { "text": "Subreport itemsold/blah2 Data", "settings": { "align": 0 }, "type": "print" } ] } ], "calcs": { "sum": [ "group" ] } } ], "header": [ { "type": "raw", "values": [ "Sample Header" ] } ], "footer": [ { "type": "raw", "values": [ "Sample Footer" ] } ] }; let rpt = new ReportBuilder(reportData, data); // These two lines are not normally needed for any normal reports unless you want to use your own fonts... // We need to add this because of TESTING and making the report consistent for CI environments rpt.registerFont("Arimo", {normal: __dirname+'/Fonts/Arimo-Regular.ttf', bold: __dirname+'/Fonts/Arimo-Bold.ttf', 'italic': __dirname+'/Fonts/Arimo-Italic.ttf'}) .font("Arimo"); if (typeof process.env.TESTING === "undefined") { rpt.printStructure(); } console.time("Rendered"); rpt.render().then((name) => { console.timeEnd("Rendered"); const testing = {images: 1, blocks: ["120,130,300,100"]}; displayReport(null, name, testing); }).catch((err) => { console.error("Your report had errors while running", err); });
2023-10-19T01:27:04.277712
https://example.com/article/9329
Barbara Murphy Latest Publications April 15th is fast approaching. This is the time of year when many of our clients ask us how to properly document charitable contributions. In several recent cases, donors have been denied all or a portion of their...more You have been asked to serve on the board of a nonprofit organization. Should you accept? Prospective board members should carefully consider an invitation to join a board. Before accepting, a potential board member should...more The holiday season is often a time for charitable gift giving. Here is a list of tax rules to follow to ensure your charitable deduction is respected by the IRS: - Qualified Charities. You can only deduct gifts to...more For tax-exempt organizations operating on a calendar year, the May 15, 2014 filing due date for the 2013 Form 990 is fast approaching. Each year the IRS issues a new Form 990 with corresponding instructions. It is important...more The American Taxpayer Relief Act of 2012 (the “Act”), signed into law by President Obama on January 2, 2013, extends favorable tax treatment for qualified charitable distributions made from IRAs (”Individual Retirement...more *With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
2024-01-11T01:27:04.277712
https://example.com/article/8268
Phase I trial of 5-fluorouracil, leucovorin, and cisplatin in combination. The ongoing evaluation of combination chemotherapy with 5-fluorouracil (5-FU) and cisplatin in several tumors prompted a phase I clinical trial of cisplatin with 5-FU modulated by leucovorin. A total of 26 patients were treated with varying doses of 5-FU by continuous i.v. infusion for 5 days; 200 mg/m2 leucovorin was given by daily bolus injection for 5 days; and 20 mg/m2 cisplatin was infused over 2 h on each day of treatment. Courses were repeated every 21-28 days. The starting dose of 5-FU was 300 mg/m2. Poor-risk patients (extensive prior radiation, performance status of 2 or worse) did not tolerate the initial dose; the maximum tolerated dose of 5-FU in this group was 200 mg/m2 daily. Good-risk patients tolerated 300 mg/m2, but a majority had excessive toxicity at higher doses. The dose-limiting toxicity was gastrointestinal (mucositis/diarrhea) and/or myelosuppression; additional side effects included were nausea and vomiting (less than or equal to grade 2) and ataxia (one patient). Among 13 patients with colorectal cancer, 4 partial responses were observed. The marked reduction in the tolerable dose of 5-FU occasioned by the addition of modulating doses of leucovorin is noteworthy. The responses observed support further investigation of this regimen in phase II trials.
2024-02-02T01:27:04.277712
https://example.com/article/5300
Q: f2py with OMP: can't import module, undefined symbol GOMP_* I was hoping to use openmp to speed up my Fortran code that I run through f2py. However, after compiling succesfully, I can't import the module in Python. For a Fortran95 module like this: module test implicit none contains subroutine readygo() real(kind = 8), dimension(10000) :: q !$OMP WORKSHARE q = 7 !$OMP END WORKSHARE end subroutine end module Compiled and imported with these commands: f2py -m SOmod --fcompiler=gnu95 --f90flags='-march=native -O3 -fopenmp' -c SOtest.f95 python2 -c "import SOmod" I get an error. The error is for the import - compiling works fine both with f2py or gfortran directly (only get a warning about 'Using deprecated NumPy API'). Traceback (most recent call last): File "<string>", line 1, in <module> ImportError: ./SOmod.so: undefined symbol: GOMP_barrier I get different GOMP_* errors for different OMP directives. Without directives (but with -openmp flag) it works. Any help would be greatly appreciated. A: I was able to reproduce the error on Mac OS X (10.9.5), with gfortran installed using homebrew, and I was able to fix it by adding -lgomp to the command: f2py -m SOmod --fcompiler=gnu95 --f90flags='-march=native -O3 -fopenmp' -lgomp -c SOtest.f95 Added by @Mark: Note that -lgomp is an argument for f2py, not gfortran. Although it compiles with just -gomp, both -gomp and -fopenmp are needed for it to be parallel, as described here. GOMP is the GNU openMP implementation.
2024-05-16T01:27:04.277712
https://example.com/article/1203
158 F.3d 492 98 CJ C.A.R. 4783 UNITED STATES of America, Plaintiff-Appellant,v.David Yazzie JONES, Jr., Defendant-Appellee. Nos. 97-2341, 97-2342. United States Court of Appeals,Tenth Circuit. Sept. 8, 1998. Richard A. Friedman (John J. Kelly, United States Attorney, and Kathleen Bliss, Assistant United States Attorney, Albuquerque, New Mexico, with him on the briefs), Department of Justice, Washington, D.C., for Plaintiff-Appellant. Thomas B. Jameson, Assistant Federal Public Defender, Albuquerque, New Mexico, for Defendant-Appellee. Before BRORBY, HOLLOWAY, and EBEL, Circuit Judges. BRORBY, Circuit Judge. 1 David Yazzie Jones pled guilty to one count of possession of a firearm by a prohibited person, in violation of 18 U.S.C. § 922(g)(8), and one count of providing false information to obtain a firearm, in violation of 18 U.S.C. § 922(a)(6). After departing downward three levels under the United States Sentencing Guidelines (U.S.S.G.),1 the district court sentenced Mr. Jones to six months of home confinement and three years of probation. Pursuant to 18 U.S.C. § 3742(b), the Government now appeals Mr. Jones' sentence.2 The Government variously challenges the permissibility and the adequacy of the grounds identified by the district court as the basis for the departure. We have jurisdiction pursuant to 28 U.S.C. § 1291 and we affirm. BACKGROUND 2 Mr. Jones married Janice Begay in 1979, eventually establishing a homestead with her in New Mexico. After their union produced three children, the marriage began to unravel. By 1995, Mr. Jones and his wife were estranged, and he had left their marital home. Ms. Begay obtained a series of restraining orders against Mr. Jones. The first order restraining Mr. Jones was issued by the Family Court of the Navajo Nation in June 1995. For reasons not clear from the record, Ms. Begay then moved her case to the New Mexico state district court. The state district court issued its first restraining order in September 1995. 3 On September 15, 1995, while under a restraining order issued at Ms. Begay's behest, Mr. Jones allegedly approached his estranged wife's residence, located in Indian country, while carrying a handgun. Mr. Jones was arrested a few hours later in the early morning hours of September 16, 1995, on a rural road near Ms. Begay's residence. A handgun was found in the vehicle in which he was riding. Mr. Jones was convicted in state magistrate court of negligent use of a deadly weapon and fined $100. 4 By March 1996, the Federal Bureau of Investigation had begun investigating Mr. Jones. On November 7, 1996, a federal grand jury indicted Mr. Jones. The indictment charged Mr. Jones with four counts of interstate violation of a protection order, in violation of 18 U.S.C. §§ 2262(a)(1), (b)(3), and (b)(5). Based on the September 15, 1995 incident, the indictment also charged one count of possession in or affecting commerce of a firearm and ammunition by a prohibited person, in violation of 18 U.S.C. §§ 922(g)(8) and 924(a)(2). 5 On November 14, 1996, Mr. Jones was arrested for the charges in the federal indictment. After his arraignment, he was released on personal recognizance on November 18, 1996. As a general condition of his release, Mr. Jones was not to commit any criminal offenses. Additional conditions of release prohibited Mr. Jones from possessing firearms, and from traveling, except for limited, specified purposes (e.g., work, church, grocery shopping). 6 Prior to his indictment on federal charges, Mr. Jones had been making installment payments toward the purchase of a firearm from Kirtland Pawn and Sporting Goods, located in Kirtland, New Mexico. On January 23, 1997, Mr. Jones traveled with a friend to Kirtland to make the final payment on the weapon. In filling out the requisite Bureau of Alcohol, Tobacco and Firearms form, Mr. Jones falsely indicated he was not under indictment for a crime punishable by more than one year of imprisonment, and misstated his date of birth. Store employees stated Mr. Jones claimed to be a police officer and wanted to take possession of the weapon without a so-called "Brady" clearance. Mr. Jones never attempted to claim the weapon after the mandatory five-day waiting period. 7 During this period, Ms. Begay had informed Federal Bureau of Investigation agents that she had discovered a receipt belonging to Mr. Jones for the purchase of a firearm. On February 11, 1997, Bureau agents filed a criminal complaint against Mr. Jones arising from his attempted purchase of the firearm from the Kirtland store. On March 5, 1997, Mr. Jones was indicted for making false statements in connection with acquisition of a firearm, in violation of 18 U.S.C. §§ 922(a)(6) and 924(a)(2). 8 On May 14, 1997, pursuant to a plea agreement under Rule 11(e)(2) of the Federal Rules of Criminal Procedure, Mr. Jones pled guilty to the firearm-possession count of the initial indictment and to the false-statement count of the second indictment. Under the terms of the plea agreement, the Government agreed to dismiss the other four counts contained in the first indictment and to stipulate to a three-level decrease under the Sentencing Guidelines for acceptance of responsibility, contingent on an appropriate culpability statement from Mr. Jones. See U.S.S.G. § 3E1.1(a) and (b)(2). 9 The initial presentence report placed Mr. Jones in criminal history category I, and assigned him an adjusted base offense level of 16.3 The probation office deducted a total of three levels for Mr. Jones' acceptance of responsibility, resulting in a total offense level of 13. See U.S.S.G. §§ 3E1.1(a) and (b)(2). Based on these computations, the guideline range for Mr. Jones' offense was twelve to eighteen months imprisonment. See U.S.S.G. Ch. 5 Pt. A. 10 Following preparation of the presentence report, Mr. Jones moved for a three-level downward departure to offense level 10, which would allow the district court to impose a sentence of probation with home detention. Mr. Jones raised multiple grounds for departure, which the probation office summarized as his exemplary employment history; the harm to his children if he was unable to provide child support; and the aberrant nature of his criminal conduct. The probation office opined that none of the factors proffered by Mr. Jones would individually warrant a downward departure, but the combination of factors might suffice. The probation office concluded that "a departure would not be inappropriate." 11 On August 27, 1997, the district court conducted a sentencing hearing. At the hearing, the district court adopted the factual findings of the presentence report, as amended. The court also referenced receipt of twelve letters and statements praising Mr. Jones' character and past conduct, and heard from Ms. Begay. The district court entertained lengthy arguments from both sides on the appropriateness of a downward departure. In the end, the district court granted Mr. Jones' motion for a three-level downward departure under U.S.S.G. § 5K2.0. The court cited eleven factors which, in combination, warranted the downward departure.4 12 The three-level downward departure reduced Mr. Jones' offense level to 10, resulting in a guideline imprisonment range of six to twelve months, thus allowing for a sentence of probation with home confinement under U.S.S.G. § 5C1.1(c)(3). Accordingly, the district court sentenced Mr. Jones to three years probation with special conditions, including a six-month period of home confinement under electronic monitoring, and forty hours of community service. These appeals followed. ANALYSIS 13 As a general rule, if the case before the district court is a typical one, the court must impose a sentence within the applicable Sentencing Guidelines range. 18 U.S.C. § 3553(a); see also Koon v. United States, 518 U.S. 81, 85, 116 S.Ct. 2035, 135 L.Ed.2d 392 (1996). However, the Sentencing Commission recognized that unusual or atypical cases would arise, and explicitly reserved some degree of flexibility to the sentencing court: 14 The Commission intends the sentencing courts to treat each guideline as carving out a "heartland," a set of typical cases embodying the conduct that each guideline describes. When a court finds an atypical case, one to which a particular guideline linguistically applies but where conduct significantly differs from the norm, the court may consider whether a departure is warranted. 15 U.S.S.G. Ch. 1, Pt. A, intro. comment. 4(b). See also Koon, 518 U.S. at 98, 116 S.Ct. 2035 (recognizing departure decisions as "embod[ying] the traditional exercise of discretion by a sentencing court"). Thus, district courts may depart from the applicable guideline range if "the court finds that there exists an aggravating or mitigating circumstance of a kind, or to a degree, not adequately taken into consideration by the Sentencing Commission in formulating the guidelines that should result in a sentence different from that described." 18 U.S.C. § 3553(b). In determining whether a circumstance was adequately taken into consideration by the Sentencing Commission, our inquiry is limited to the Sentencing Guidelines, policy statements, and official commentary of the Commission. Id. 16 Since the Supreme Court's watershed decision in Koon, this court has employed a four-prong analysis in reviewing decisions to depart from the applicable guideline sentencing range. See United States v. Collins, 122 F.3d 1297, 1303 (10th Cir.1997). We evaluate "whether the factual circumstances supporting a departure are permissible departure factors." Id. "Impermissible factors include forbidden factors, discouraged factors that are not present to some exceptional degree, and encouraged factors already taken into account by the applicable guideline that are not present to some exceptional degree."5 Id. This inquiry, "whether a factor is a permissible departure factor under any circumstances" is "essentially legal," and our review is plenary. Id. We also evaluate "whether the departure factors relied upon by the district court remove the defendant from the applicable Guideline heartland thus warranting a departure." Id. This second inquiry is "essentially factual," and our review is "at its most deferential." Id. Finally, we evaluate "whether the record sufficiently supports the factual basis underlying the departure," and "whether the degree of departure is reasonable." Id. In keeping with the guidance of Koon, all four aspects of our departure review are subject to a unitary abuse of discretion standard. Id.; see also Koon, 518 U.S. at 99-100, 116 S.Ct. 2035 (providing rationale for unitary abuse of discretion standard). 17 Here, the district court granted a three-level departure under U.S.S.G. § 5K2.0, which authorizes a departure if the court finds a mitigating or aggravating circumstance not adequately taken into account by the Sentencing Commission. See also 18 U.S.C. § 3553(b). The district court based its departure on a combination of eleven factors. See U.S.S.G. § 5K2.0, comment. (recognizing that combination of circumstances or offender characteristics may remove a case from the heartland). The Government contends the district court abused its discretion in departing from the guideline sentencing range because each of the individual grounds is an impermissible basis for departure under the circumstances of this case, thus, "[n]o combination of the wholly inadequate factors in this case could remove the defendant's case from the heartland and justify a departure." 18 In reviewing the decision to depart, pursuant to Collins, we must first determine whether the district court relied on permissible departure factors. If the eleven factors relied on by the district court are permissible, we then ask whether the combination of factors removes Mr. Jones from the heartland of the Sentencing Guidelines, giving substantial deference to the district court's conclusion that the facts of this case made it atypical. See Collins, 122 F.3d at 1305. If we determine the district court based its decision to depart on both permissible and impermissible factors, we are required to remand the case unless it is clear the district court "would have imposed the same sentence absent reliance on the invalid factors." Koon, 518 U.S. at 113, 116 S.Ct. 2035 (citing Williams v. United States, 503 U.S. 193, 203, 112 S.Ct. 1112, 117 L.Ed.2d 341 (1992)). 19 As its first ground for departure, the district court pointed to "the defendant's long, impressive work history in a situation where good jobs are scarce," finding "specifically that he has been employed in a very good position for 14 years, earning a very high income for the community in which he lives, which is in an economically depressed area with few job opportunities." The Government reduces the district court's finding to Mr. Jones' "good employment history," a factor "not ordinarily relevant in determining whether a sentence should be outside the applicable guideline range." U.S.S.G. § 5H1.5, p.s. In support of its contention that employment history is not a permissible factor under the circumstances of this case, the Government points to this court's prior rejection of a defendant's "reliable employment record replete with positive comments from employers" as a basis for departure in United States v. Ziegler, 39 F.3d 1058, 1062 (10th Cir.1994) (internal quotation marks and citation omitted). 20 Employment history ordinarily is a discouraged basis for departure.6 See U.S.S.G. § 5H1.5, p.s. However, neither the Sentencing Guidelines nor Tenth Circuit precedent categorically precludes the district court's consideration of employment history in making its departure decision. As the Supreme Court has made clear, the Sentencing Commission "chose to prohibit consideration of only a few factors, and not otherwise to limit, as a categorical matter, the considerations which might bear upon the decision to depart."7 See Koon, 518 U.S. at 94, 116 S.Ct. 2035; see also U.S.S.G. Ch. 1, Pt. A, intro. comment. 4(b) (indicating Commission "does not intend to limit the kinds of factors, whether or not mentioned anywhere else in the guidelines, that could constitute grounds for departure in an unusual case"). While this court rejected reliance on employment history, along with five other considerations, as evidence of an "extraordinary acceptance of responsibility" in Ziegler, 39 F.3d at 1062, elsewhere we have affirmed downward departures based in part on this factor. See United States v. Tsosie, 14 F.3d 1438, 1441-42 (10th Cir.1994) (using defendant's long-term employment as one factor demonstrating offense conduct was aberrational). 21 Moreover, the Government has attributed an unnecessarily cramped interpretation to the district court's finding. By it terms, the court's finding is not limited to Mr. Jones' exemplary employment history solely as a personal characteristic. The district court considered Mr. Jones' employment history and the impact of incarceration on his prospects for future employment in light of the community in which he lives, an economically depressed area. While rejecting their application under the facts of Koon, the Supreme Court gave its approval to the district court's consideration of collateral employment consequences in the decision to depart. See Koon, 518 U.S. at 109-11, 116 S.Ct. 2035. We find nothing in the Guidelines to suggest the Sentencing Commission either intended to proscribe consideration of or fully considered such factors. See id. at 109, 116 S.Ct. 2035 (concluding reviewing court's role "is limited to determining whether the Commission has proscribed, as a categorical matter, consideration of the factor"). 22 When a factor is not fully considered by the Sentencing Guidelines, "the court must, after considering the 'structure and theory of both relevant individual guidelines and the Guidelines taken as a whole,' ... decide whether it is sufficient to take the case out of the Guideline's heartland." Id. at 96, 116 S.Ct. 2035 (quoting United States v. Rivera, 994 F.2d 942, 949 (1st Cir.1993)). However, in this instance the district court did not rely on collateral employment consequences as a discrete basis for departure. Accordingly, we need consider this factor as only one of the eleven factors supporting the court's decision to grant a departure under U.S.S.G. 5K2.0. See Collins, 122 F.3d at 1305 n. 6 (noting appellate court's consideration of guideline factor as one of multiple reasons supporting departure decision rather than as sole basis of departure). A factor may be considered in the aggregate if it is "atypical," even though it may not be sufficient, in and of itself, to support a departure. 23 After reviewing the record, we conclude the district court did not abuse its discretion in determining the collateral employment consequences Mr. Jones would suffer as a result of incarceration were atypical. While it is not unusual for any individual to suffer employment consequences as a result of incarceration, the economically depressed area in which Mr. Smith lived would attach unique burdens to his incarceration. 24 The second ground for departure cited by the district court was the economic hardship Mr. Jones' incarceration would inflict on his three children and estranged wife due to his decreased ability to pay child support.8 Under U.S.S.G. § 5H1.6, p.s., "[f]amily ties and responsibilities ... are not ordinarily relevant in determining whether a sentence should be outside the applicable guideline range." Family ties and responsibilities are specific offender characteristics, ordinarily a discouraged basis for departure. See U.S.S.G. Ch. 5, Pt. H, intro. comment. However, § 5K2.0 makes it clear such factors can be the basis of a departure in atypical cases: 25 An offender characteristic ... that is not ordinarily relevant in determining whether a sentence should be outside the applicable guideline range may be relevant to this determination if such characteristic ... is present to an unusual degree and distinguishes the case from the "heartland" cases covered by the guidelines in a way that is important to the statutory purposes of sentencing. 26 U.S.S.G. § 5K2.0, p.s.; see also Koon, 518 U.S. at 96, 116 S.Ct. 2035 (concluding district court may depart "if the [discouraged] factor is present to an exceptional degree or in some other way makes the case different from the ordinary case"). Thus, a district court may rely on offender characteristics such as family ties and responsibilities in making a decision to depart from the Guidelines. 27 When used as the sole basis for departure, family circumstances must be "extraordinary." United States v. Rodriguez-Velarde, 127 F.3d 966, 968-69 (10th Cir.1997). To warrant a departure on this basis, "a defendant must demonstrate that 'the period of incarceration set by the Guidelines would have an effect on the family or family members beyond the disruption to family and parental relationships that would be present in the usual case.' " Id. at 968 (quoting United States v. Canoy, 38 F.3d 893, 907 (7th Cir.1994)). However, in this case, we consider Mr. Jones' family responsibilities not as the sole basis for departure, but in conjunction with ten other factors identified by the district court. 28 Even considered as one factor supporting a composite mitigating circumstance, we are not convinced Mr. Jones' family responsibilities are sufficiently unusual to render this discouraged factor a permissible basis for departure. While Mr. Jones provides substantial child support, Ms. Begay, the custodial parent, is employed and capable of providing for the children. The district court erred when it relied on Mr. Jones' family circumstances as one ground for departure. 29 As the third ground for departure, the district court concluded Mr. Jones' offense conduct was aberrational, making the following finding: 30 [T]he defendant's offense conduct was out of character for the defendant, who basically had been law-abiding until age 35, when his marriage disintegrated. The defendant's offense conduct was an aberration ... related to the turmoil involved in marital separation. 31 The Sentencing Guidelines indicate the Commission "has not dealt with the single acts of aberrant behavior that still may justify probation at higher offense levels through departures." U.S.S.G. ch. 1, pt. A, intro. 4(d). The Government does not challenge directly the permissibility of this factor, but does argue Mr. Jones' offense conduct does not qualify as aberrant behavior under the Guidelines because it is neither a single act nor truly aberrant. 32 Under our case law, the aberrant nature of a criminal defendant's offense conduct may properly be considered as a mitigating factor in a downward departure decision. See Tsosie, 14 F.3d at 1441 (holding aberrational conduct combined with steady employment and economic support of family warranted departure); United States v. Pena, 930 F.2d 1486, 1495 (10th Cir.1991) (holding extraordinary family responsibilities combined with aberrational nature of conduct warranted departure). In Pena, we focused our departure analysis not on the number of discrete acts undertaken by the defendant, but on "[t]he aberrational character of her conduct." Pena, 930 F.2d at 1495. More recently, this court suggested a district court's reliance on Pena was undermined by its failure to make a finding that the defendant's "criminal acts constituted a single aberrant episode or were utterly inconsistent with his character." United States v. Archuleta, 128 F.3d 1446, 1450 (10th Cir.1997) (emphasis added). Nothing in the Sentencing Guidelines or our case law indicates it is impermissible for a district court to consider a single aberrant episode in making a decision to depart. See Tsosie, 14 F.3d at 1441-42 (examining totality of the circumstances); Pena, 930 F.2d at 1494-95 (same). 33 In reviewing the district court's characterization of Mr. Jones' offense conduct as aberrant behavior under the abuse of discretion standard we must determine how much deference is due. The Supreme Court has indicated deference is owed to the "judicial actor better positioned than another to decide the issue in question." Koon, 518 U.S. at 99, 116 S.Ct. 2035 (quotation marks, omission, and citations omitted). The Supreme Court has further indicated the district court has a "special competence" in making the fact-specific assessments necessary to determine whether a particular case is sufficiently unusual to warrant departure. Id. In such instances, deferential appellate review facilitates the district court's resolution of questions involving "multifarious, fleeting, special, narrow facts that utterly resist generalization." Id. (quotation marks and citation omitted). 34 We are convinced the determination of whether an individual defendant's offense conduct is aberrational, like the decision to depart, requires consideration of unique factors not readily susceptible of useful generalization. The district court is in the better position to determine whether the defendant's offense conduct is out of character for that individual. Accordingly, the district court's resolution of this largely factual question is due substantial deference. After reviewing the record here, we conclude the district court did not abuse its discretion when it found Mr. Jones' offense conduct to be aberrational in light of his personal history. 35 The fourth and fifth grounds for departure cited by the district court were, respectively, Mr. Jones' long history of community service, and his strong support in the community, even among the family of the victim. The Sentencing Guidelines treat "good works" and community ties as specific offender characteristics, not ordinarily relevant to sentencing. U.S.S.G. §§ 5H1.6, p.s. and 5H1.11, p.s. The Government contends there is "nothing" in the record to support departure on these bases. We disagree. The sentencing court specifically found the number of letters from Ms. Begay's close relatives written in support of Mr. Jones, extolling his past "good works" and opposing his incarceration "very unusual." Community leaders also wrote similar letters on Mr. Jones' behalf. 36 While criticizing the district court for not reviewing Mr. Jones' community service in detail, the Government points to nothing in the record that would lead us to second-guess the district court's assessment. The district court had reviewed twelve letters written on Mr. Jones' behalf, detailing his good works. While the district court could have done a more thorough job of explaining its reasoning, and we would be reluctant to sustain a departure solely on this basis, we cannot conclude the district court abused its discretion by aggregating this factor in support of a downward departure. See United States v. Rioux, 97 F.3d 648, 663 (2d Cir.1996) (affirming downward departure based on defendant's medical condition and good deeds). 37 The Government contends Mr. Jones' support in the community, most notably among Ms. Begay's family, is irrelevant to sentencing. The Government, in reliance on United States v. Meacham, 115 F.3d 1488 (10th Cir.1997), argues that the views of Ms. Begay's relatives have no relevance. Meacham, a case in which the district court relied for its departure on the twelve-year-old victim's "utter forgiveness" of the adult relative who sexually abused her is simply inapposite. See Meacham, 115 F.3d at 1497. The basis of the departure here is not the victim's forgiveness, but Mr. Jones' support in the community. See United States v. Big Crow, 898 F.2d 1326, 1332 (8th Cir.1990) (affirming downward departure based in part on "solid community ties"). While Mr. Jones' support in the community is insufficiently "extraordinary" to support a departure on this basis alone, the district court did not abuse its discretion by relying on this factor as one of several grounds supporting a departure. 38 The sixth ground for departure cited by the district court was Mr. Jones' lack of notice that he could not possess a firearm because he was subject to a domestic restraining order. See 18 U.S.C. § 922(g)(8). The court specifically found that Mr. Jones lacked notice of the criminality of his conduct, and was "unaware that it was an offense at the time it was committed." The record indicates Mr. Jones was the first person in the district prosecuted as a prohibited person under the domestic relations order provision. 39 The Government argues persuasively that "[t]here is no requirement that defendant be aware of the law or even act 'willfully' in order to be lawfully convicted under Section 922(g)." But Mr. Jones' conviction is not at issue here; the issue is whether the Guidelines provide us with guidance on the use of a defendant's lack of notice as a basis for departure. 40 Lack of notice is not addressed specifically by the Sentencing Guidelines. When a factor is unmentioned by the Guidelines, we look to the "structure and theory of both relevant individual guidelines and the Guidelines taken as a whole." Koon, 518 U.S. at 96, 116 S.Ct. 2035 (quotation marks and citation omitted). The applicable individual guideline is U.S.S.G. § 2K2.1(a)(6), covering offenses involving the unlawful possession of firearms or ammunition by a prohibited person. The specific offense characteristics for this guideline provide for a downward departure if a prohibited person possessed the firearm for "lawful sporting purposes or collection, and did not unlawfully discharge or otherwise unlawfully use" the weapon. Id. § 2K2.1(b)(2). There is a specific enhancement if the weapon is used or intended to be used in another felony offense. Id. § (b)(5). 41 While Mr. Jones claims his possession of a firearm was innocent, the fact remains the charge was rooted in his conduct on September 15-16, 1995. On that occasion, Mr. Jones was accused of violating a domestic restraining order by approaching his estranged wife's home while carrying a handgun, was arrested while in a vehicle with a handgun determined to be his, and was convicted in state magistrate court of negligent use of a deadly weapon. Under these circumstances, Mr. Jones' claim that he is "less culpable" because he lacked notice of the specifics of 18 U.S.C. § 922(g)(8) rings hollow. While he did not use the weapon in a felony offense, he did negligently misuse the weapon. The relevant guideline clearly intended to punish innocent possession and use of a firearm less severely, and improper use more severely. Consequently, we conclude Mr. Jones' lack of notice was not a permissible basis for departure under the facts of this case. 42 The seventh ground for departure identified by the district court was Mr. Jones' "highly unusual" disclosure of the facts underlying his false-statement offense to his pretrial service officer. The Government contends Mr. Jones' voluntary disclosure is an impermissible basis for departure because the ongoing federal investigation eventually would have discovered the offense, and because he received an acceptance of responsibility adjustment under the terms of the plea agreement. 43 In discussing grounds for departure, the Sentencing Guidelines state that "[i]f the defendant voluntarily discloses to authorities the existence of, and accepts responsibility for, the offense prior to the discovery of such offense, and if such offense was unlikely to have been discovered otherwise, a departure below the applicable guideline range for that offense may be warranted." U.S.S.G. § 5K2.16, p.s. However, disclosures motivated by "the defendant's knowledge that discovery of the offense is likely or imminent, or where the defendant's disclosure occurs in connection with the investigation or prosecution of the defendant for related conduct" are excluded. Id. Mr. Jones' disclosure appears to fall between the express provisions of the Guidelines, i.e., his disclosure does not appear to have been motivated by fear of detection, but the offense was likely to be discovered. While not falling squarely within the departure provision, we cannot conclude the inevitable discovery of Mr. Jones' offense somehow transforms his nonetheless voluntary disclosure into an impermissible basis for departure. Moreover, there is nothing in the record to indicate Mr. Jones was aware the Federal Bureau of Investigation had received a lead and was looking into his purchase of a firearm. Consequently, his disclosure to the pretrial services officer did not occur "in connection with" that investigation and is not excluded as a ground for departure under § 5K2.16. 44 Prior to the district court's downward departure, Mr. Jones received a three-level deduction for acceptance of responsibility. See U.S.S.G. §§ 3E1.1(a) and (b)(2). While not a matter of right, this deduction is quite common in cases where the defendant enters a timely plea of guilty. See U.S.S.G. § 3E1.1, comment. (n.1-2), (backg'd.); see also United States v. Core, 125 F.3d 74, 78 (2d Cir.1997) (noting standard acceptance of responsibility reduction is "easily achieved and is accordingly of relatively low value"), cert. denied, --- U.S. ----, 118 S.Ct. 735, 139 L.Ed.2d 672 (1998). Without elaboration, the Government asserts this "is all that is legally permissible." We disagree. First, the grounds cited by the district court focus on the voluntariness of Mr. Jones' disclosure, not simply his acceptance of responsibility. Second, the Sentencing Commission specifically acknowledged that the district court is in a "unique position to evaluate a defendant's acceptance of responsibility." U.S.S.G. § 3E1.1, comment. (n.5). "For this reason, the determination of the sentencing judge is entitled to great deference on review." Id. By this same logic, we must accord the district court's decision that Mr. Jones' conduct was "highly unusual" and went beyond the scope of U.S.S.G. § 3E1.1 due deference. Accordingly, we cannot say the district court abused its discretion when it relied, in part, on Mr. Jones' early, voluntary disclosure of the facts underlying one of the charges against him as one of several bases for departure. 45 The eighth and ninth grounds for departure cited by the district court were, respectively, Mr. Jones' adherence to the conditions of his release, and improvement in his post-offense conduct. Treating both grounds as post-offense rehabilitation, the Government contends that this factor is not a permissible ground for departure under Tenth Circuit precedent, and that the Sentencing Guidelines have already taken such efforts into account under the acceptance of responsibility guideline. 46 The Government points to this court's decision in Ziegler, and its progeny, for the proposition that post-offense rehabilitation "is an improper ground[ ] for departure beyond that authorized by the acceptance of responsibility provision" of the Guidelines. Ziegler, 39 F.3d at 1061; see also U.S.S.G. § 3E1.1, comment. (n.1(g)). However, another panel of this court recently determined our decision in Ziegler was "effectively overruled by Koon." United States v. Whitaker, 152 F.3d 1238, 1241, 1998 WL 480091, * 1 (10th Cir.1998). The Supreme Court's holding in Koon makes it clear the district court has the authority to consider post-offense rehabilitation as a basis for downward departure. Koon, 518 U.S. at 94-96, 108-09, 116 S.Ct. 2035 (holding district court may consider any factor not specifically prohibited by the Sentencing Guidelines); see also United States v. Sally, 116 F.3d 76, 80 (3d Cir.1997) (holding downward departure may be warranted by exceptional post-offense rehabilitation efforts); United States v. Brock, 108 F.3d 31, 34 (4th Cir.1997) (overruling, in light of Koon, earlier holding that post-offense rehabilitation can never be the basis of departure). 47 The Sentencing Guidelines have taken post-offense rehabilitation efforts into consideration. See U.S.S.G. § 3E1.1, comment. (n.1(g)). One of the "appropriate considerations" in determining whether a defendant qualifies for the acceptance of responsibility reduction is post-offense rehabilitation, including counseling or drug treatment. Id. (n.1). When an encouraged factor has been taken into consideration by the Guidelines, it may serve as the basis for departure only when present to some "exceptional degree." Collins, 122 F.3d at 1303. However, we remain mindful of the fact that the district court is better situated to make this determination and is, therefore, entitled to "great deference on review." U.S.S.G. § 3E1.1, comment. (n. 5). 48 In describing Mr. Jones' post-offense conduct, the district court specifically noted Mr. Jones had "scrupulously followed the conditions of release," including refraining from contact with Ms. Begay, his estranged wife. Mr. Jones had "worked regularly," supported his three children, and had daily contact and regular consultations with a psychologist, resulting in a "significant improvement in [Mr. Jones'] understanding and attitude." The district court found Mr. Jones had changed both his "attitude and conduct" during his post-arrest release. In deciding to depart downward, the sentencing court concluded Mr. Jones' post-arrest improvement was "significant." 49 The fact-based assessment of whether Mr. Jones' post-offense rehabilitation efforts are exceptional falls squarely within the realm of the district court's "special competence." Koon, 518 U.S. at 99, 116 S.Ct. 2035. The record supports the district court's finding Mr. Jones' efforts were atypical. Therefore, the district court did not abuse its discretion relying on Mr. Jones' post-offense conduct as a basis for its downward departure. 50 The tenth ground for departure supplied by the district court was the negative effect incarceration would have on both the quality and quantity of Mr. Jones' rehabilitative counseling. The Government contends a defendant's mental and emotional conditions are not ordinarily relevant to sentencing, and that there was "nothing life-threatening or otherwise exceptional about the deprivation" of counseling services in Mr. Jones' case. 51 Mental and emotional conditions are specific offender characteristics. U.S.S.G. § 5H1.3, p.s. As such, they ordinarily are discouraged bases for departure. U.S.S.G. ch.5, pt. H, intro. comment. However, the Guidelines clearly provide that a sentencing court may consider specific offender characteristics in determining whether to depart if the characteristic "is present to an unusual degree and distinguishes the case from the 'heartland' cases covered by the guidelines in a way that is important to the purposes of sentencing." Id. § 5K2.0, p.s. One of the purposes of sentencing is "to provide the defendant with needed education or vocational training, medical care, or other correctional treatment in the most effective manner." 18 U.S.C. § 3553(a)(2)(D). 52 The district court found Mr. Jones' employment at a public health facility afforded him the opportunity for daily contact with his psychologist, putting Mr. Jones "in a very special position to receive the most effective counseling for rehabilitation." The sentencing court also found incarceration would sever Mr. Jones' connection to a counselor the court determined to be "beneficial" to him. Id. The court concluded the "unusual situation" of Mr. Jones' employment provided the "very best place" for him to receive rehabilitative counseling. 53 Contrary to the Government's assertions, there was something "exceptional" about Mr. Jones' circumstances: his unique access to rehabilitative counseling in his work setting. Maximizing the effectiveness of rehabilitative counseling clearly serves one of the primary purposes of sentencing, correctional treatment. Under these circumstances, we conclude the district court did not abuse its discretion when it considered access to rehabilitative counseling as one factor supporting its decision to depart downward. 54 As its eleventh reason for departure, the district court indicated it was "impressed by the fact that the United States Probation Office has concluded that it is appropriate to depart downward in this instance." The Government contends this was not a permissible ground for departure, because "[i]f a departure is not based on a lawful ground, support for it by the probation officer has no legal consequence." While we agree with the Government that the unsupported opinion of a probation officer cannot serve as the basis for a departure, we are of the opinion the Government may be reading too much into the observation of the sentencing court. 55 In this case, the probation officer reviewed Mr. Jones' motion for a downward departure. In an addendum to the presentence report, the probation officer considered the factual basis of the departure factors identified by Mr. Jones, and whether those factors could support a departure under the Sentencing Guidelines. Sentencing courts typically rely, both explicitly and implicitly, on the expertise and recommendations of the probation office in working with the Sentencing Guidelines. In this instance the district court simply indicated that it had favorably considered the probation officer's opinion. As we have discussed elsewhere, it is important for sentencing courts to be precise in making sentencing comments, particularly in relation to departure decisions. See United States v. Haggerty, 4 F.3d 901, 904 (10th Cir.1993). We will not fault the district court here for thoroughly reporting its reasons for departure. While it would be inappropriate for a sentencing court to rely solely on the unsubstantiated opinion of a probation officer, it is not impermissible for the district court to consider the probation officer's opinion on the appropriateness of a departure. However, we do not consider this "factor" on a par with the other grounds for departure articulated by the district court. 56 Having reviewed the eleven grounds for departure considered by the sentencing court, we conclude the district court relied on both valid and invalid factors. Permissible factors considered by the district court included collateral employment consequences, aberrant nature of the offense conduct, community service, support in the community, voluntary disclosure of offense conduct, post-offense rehabilitation, and access to rehabilitative counseling. Only family responsibilities and lack of notice of the criminality of his offense conduct were impermissible factors under the circumstances of this case. 57 We move to the second inquiry in our departure analysis, whether the combination of permissible factors considered by the district court removes Mr. Jones' case from the heartland of the Sentencing Guidelines. Collins, 122 F.3d at 1303. This inquiry is essentially factual and the assessments of the district court are entitled to substantial deference. Id. Of necessity then, we simultaneously consider whether the record sufficiently supports the factual basis of the departure. Id. 58 The Sentencing Commission explicitly left open "the possibility of an extraordinary case that, because of a combination of such characteristics or circumstances [not ordinarily relevant to a departure], differs significantly from the 'heartland' cases covered by the guidelines in a way that is important to the statutory purposes of sentencing." U.S.S.G. § 5K2.0, comment. While recognizing that such an atypical case might warrant a departure, the Government summarily asserts that "[n]o combination of the wholly inadequate factors in this case could remove defendant's case from the heartland and justify a departure." 59 The record before us leaves no doubt the sentencing court found this case sufficiently atypical to warrant departure, without recourse to the two impermissible factors. First, the district court made a global assessment that "all of these factors," not in combination, but individually, "are present to an exceptional degree." Second, the court's discussion of the various individual grounds for departure indicates the permissible factors were present to an exceptional degree. By way of illustration, the court referred to Mr. Jones' "highly unusual" disclosure of the facts underlying his offense conduct; his "significant post-arrest improvement" and "scrupulous[ ]" adherence to the conditions of release; his "significant improvement" in understanding and attitude; and his "very special position to receive the most effective counseling for rehabilitation" at his job site, making it "the very best place" for Mr. Jones to be counseled. Third, the court characterized Mr. Jones' entire criminal episode as an "aberration," again pointing up the unusualness of the case. 60 Finally, the record indicates the district considered its decision to depart in light of the statutory purposes of sentencing. See 18 U.S.C. § 3553(a)(2). Those purposes include both the need to provide the defendant with the most effective correctional treatment and the need to protect the public. Id. We have already discussed the district court's careful consideration of where Mr. Jones would receive superior rehabilitation counseling. However, prior to granting Mr. Jones' motion for a downward departure, the district court also satisfied itself that Mr. Jones had observed the conditions of his release and that Ms. Begay, his former spouse, would enjoy peace of mind if Mr. Jones was placed on probation. 61 In view of the district court's special competence in making the refined comparative factual assessments necessary to determine if a circumstance is unusual or a characteristic is present to an exceptional degree, see Koon, 518 U.S. at 98-99, 116 S.Ct. 2035, we are not inclined to substitute our judgment for that of the sentencing court. The district court did not abuse its discretion when it found the circumstances of this case atypical. The permissible departure factors available to the district court, in the aggregate, provided a proper basis for departure, and are supported adequately in the record.9 62 When a departure is warranted, as it is here, we finally must determine whether the degree of departure from the guideline sentencing range was reasonable. Id.; see 18 U.S.C. § 3742(e)(3). A sentencing court must explain, inter alia, why the specific degree of departure granted or imposed is reasonable. United States v. Jackson, 921 F.2d 985, 989 (10th Cir.1990). We consider the district court's reasons for imposing a particular sentence in light of the purposes of sentencing. United States v. Smith, 133 F.3d 737, 752 (10th Cir.1997), cert. denied, --- U.S. ----, 118 S.Ct. 2306, 141 L.Ed.2d 165 (1998); see also 18 U.S.C. 3553(a)(2) (detailing purposes of sentencing). 63 In sentencing Mr. Jones, the district court explicitly considered "the sentencing goals of punishment, deterrence and protection of the public." The district court also noted the extent and seriousness of Mr. Jones' offense conduct. The district court departed downward three levels because that was exactly the extent of downward departure required under the Sentencing Guidelines to "reach Zone B [of the sentencing table], which would allow a sentence of probation with stringent conditions," which the district court determined was "the most appropriate sentence under the circumstances" of Mr. Jones' case. The district court also explicitly considered the magnitude of the departure relative both to Mr. Jones' offense level under the Sentencing Guidelines and to guidance provide by our case law. 64 In reviewing the degree of departure in this case, we note that only a sentence of probation would address the district court's explicit concern with maintaining the ongoing, and apparently effective, rehabilitative counseling relationship Mr. Jones had through his employment at the public health facility, while simultaneously avoiding the collateral employment consequences of incarceration. The district court concluded a sentence consisting of probation and home confinement was "[i]n the interest of justice." 65 A sentencing court is charged with the task of imposing a sentence "sufficient, but not greater than necessary," to accomplish the goals of sentencing. 18 U.S.C. 3553(a). Departures are authorized by the Sentencing Guidelines for the express purpose of addressing unusual circumstances and unusual cases. See U.S.S.G. Ch. 1, Pt. A, intro. comment 4(b). As the Supreme Court reminds us, "[i]t has been uniform and constant in the federal judicial tradition for the sentencing judge to consider every convicted person as an individual and every case as a unique study in the human failings that sometimes mitigate, sometimes magnify, the crime and punishment to ensue." Koon, 518 U.S. at 113, 116 S.Ct. 2035. Under the circumstances of this case, we conclude the district court's decision to depart downward three levels was reasonable. 66 However, because the district court based its decision to depart on both permissible and impermissible factors in this case, we must determine whether a remand is required. See 18 U.S.C. § 3742(f); Koon, 518 U.S. at 113, 116 S.Ct. 2035. When a district court bases a departure, in part, on improper grounds, the reviewing court should remand the case unless it concludes, on the record as a whole, the district court "would have imposed the same sentence absent reliance on the invalid factors." Koon, 518 U.S. at 113, 116 S.Ct. 2035 (citing Williams, 503 U.S. at 203, 112 S.Ct. 1112). We so conclude. Based on our review of the record, we are convinced the district court would impose the same sentence on remand. 67 Accordingly, the decision of the district court to depart downward in sentencing Mr. Jones is AFFIRMED. 1 Mr. Jones was sentenced under the 1995 edition of the United States Sentencing Commission's Guidelines Manual. All references are to that edition 2 Mr. Jones' sentence arises from separate judgments of conviction entered for one count from each of two indictments, bearing distinct docket numbers. These consolidated appeals followed 3 Each of the two offenses to which Mr. Jones pled guilty had a base offense level of 14. The base offense level was enhanced by 2 levels to reflect the existence of two non-grouped offenses. See U.S.S.G. § 3D1.4 4 Briefly stated, the following factors were cited by the district court: (1) the employment consequences Mr. Jones would face if he was incarcerated; (2) the financial hardship his incarceration would impose on his children; (3) the aberrational character of his offense conduct; (4) his long history of community service; (5) his support in the community, even among Ms. Begay's family; (6) his lack of notice of the criminality of his conduct as a prohibited person in possession of a firearm; (7) his early disclosure of the facts underlying the false-statement offense to his pretrial services officer; (8) his scrupulous compliance with the conditions of his release; (9) his significant post-arrest improvement; (10) his unique access to rehabilitative counseling in his work setting; and (11) the probation office's conclusion that a departure would be appropriate 5 In Collins, the sentencing court provided three grounds for its downward departure, two of which, the defendant's age and infirmity, are considered discouraged factors. See Collins, 122 F.3d at 1305; U.S.S.G. § 5H1.1, p.s.; id. § 5H1.4, p.s. The reviewing panel's analysis makes it clear that a discouraged factor aggregated with other factors as grounds for a departure need not rise to the same level of atypicality as would be required were that factor the sole basis for the departure. Collins, 122 F.3d at 1305 n. 6, 1305-07 6 A defendant's employment record is categorized in the Sentencing Guidelines with other specific offender characteristics, ordinarily discouraged bases for departure. See U.S.S.G. Ch. 5, Pt. H, intro. comment. While discouraged factors are not "necessarily inappropriate" bases for departure, they are to be relied on only "in exceptional cases." Id 7 The Fourth Circuit identified the following factors as categorically impermissible bases for departure under the Sentencing Guidelines: "drug or alcohol dependence or abuse; race, sex, national origin, creed, religion, or socioeconomic status; lack of youthful guidance or similar circumstances indicating a disadvantaged upbringing; personal financial difficulties or economic pressure on a trade or business." United States v. Brock, 108 F.3d 31, 34 (4th Cir.1997) (citations omitted) 8 At the time of sentencing, Mr. Jones' children were aged seventeen, twelve and nine; he was paying approximately $690 per month in child support 9 The Government expresses concern that sentencing departures based on multiple factors might lead to unwarranted departures, supported by nothing more than a "laundry list" of details. This is so, the Government contends, because every case and offender, examined in sufficient detail, is unique. The Government's concern is overstated. While every case or offender is unique, not every set of circumstances is atypical in a manner consistent with the theory and structure of the Sentencing Guidelines. Moreover, we are confident the district courts will continue to depart from the Guidelines based on substantive aspects of the cases before them, rather than on mere details; departures, whether upward or downward, will remain the exception rather than the rule in sentencing. Finally, should a problem actually arise, it is the role of the Sentencing Commission, not the courts, to monitor departure decisions and revise the Guidelines as needed. See U.S.S.G. Ch. 1, Pt. A, intro. comment. 4(b); Koon, 518 U.S. at 108-09, 116 S.Ct. 2035
2023-11-28T01:27:04.277712
https://example.com/article/7458
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- NewPage --> <html lang="en"> <head><link rel="apple-touch-icon" sizes="180x180" href="/glide/apple-touch-icon.png"><link rel="icon" type="image/png" sizes="32x32" href="/glide/favicon-32x32.png"><link rel="icon" type="image/png" sizes="16x16" href="/glide/favicon-16x16.png"><link rel="manifest" href="/glide/manifest.json"> <!-- Generated by javadoc (1.8.0_144) on Mon Nov 06 12:47:30 PST 2017 --> <title>BitmapDrawableTransformation (glide API)</title> <meta name="date" content="2017-11-06"> <link rel="stylesheet" type="text/css" href="../../../../../../stylesheet.css" title="Style"> <script type="text/javascript" src="../../../../../../script.js"></script> </head> <body> <script type="text/javascript"><!-- try { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="BitmapDrawableTransformation (glide API)"; } } catch(err) { } //--> var methods = {"i0":42,"i1":42,"i2":42,"i3":42}; var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"],32:["t6","Deprecated Methods"]}; var altColor = "altColor"; var rowColor = "rowColor"; var tableTab = "tableTab"; var activeTableTab = "activeTableTab"; </script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a name="navbar.top"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.top.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../../index-all.html">Index</a></li> <li><a href="../../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableResource.html" title="class in com.bumptech.glide.load.resource.bitmap"><span class="typeNameLink">Prev&nbsp;Class</span></a></li> <li><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapEncoder.html" title="class in com.bumptech.glide.load.resource.bitmap"><span class="typeNameLink">Next&nbsp;Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../../index.html?com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html" target="_top">Frames</a></li> <li><a href="BitmapDrawableTransformation.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_top"> <li><a href="../../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_top"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.summary">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.detail">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.detail">Method</a></li> </ul> </div> <a name="skip.navbar.top"> <!-- --> </a></div> <!-- ========= END OF TOP NAVBAR ========= --> <!-- ======== START OF CLASS DATA ======== --> <div class="header"> <div class="subTitle">com.bumptech.glide.load.resource.bitmap</div> <h2 title="Class BitmapDrawableTransformation" class="title">Class BitmapDrawableTransformation</h2> </div> <div class="contentContainer"> <ul class="inheritance"> <li><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">java.lang.Object</a></li> <li> <ul class="inheritance"> <li>com.bumptech.glide.load.resource.bitmap.BitmapDrawableTransformation</li> </ul> </li> </ul> <div class="description"> <ul class="blockList"> <li class="blockList"> <dl> <dt>All Implemented Interfaces:</dt> <dd><a href="../../../../../../com/bumptech/glide/load/Key.html" title="interface in com.bumptech.glide.load">Key</a>, <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</dd> </dl> <hr> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp; <div class="block"><span class="deprecationComment">Use <a href="../../../../../../com/bumptech/glide/load/resource/bitmap/DrawableTransformation.html" title="class in com.bumptech.glide.load.resource.bitmap"><code>DrawableTransformation</code></a> instead.</span></div> </div> <br> <pre><a href="http://d.android.com/reference/java/lang/Deprecated.html?is-external=true" title="class or interface in java.lang">@Deprecated</a> public class <span class="typeNameLabel">BitmapDrawableTransformation</span> extends <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a> implements <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</pre> <div class="block">Transforms <a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable"><code>BitmapDrawable</code></a>s.</div> </li> </ul> </div> <div class="summary"> <ul class="blockList"> <li class="blockList"> <!-- =========== FIELD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="field.summary"> <!-- --> </a> <h3>Field Summary</h3> <ul class="blockList"> <li class="blockList"><a name="fields.inherited.from.class.com.bumptech.glide.load.Key"> <!-- --> </a> <h3>Fields inherited from interface&nbsp;com.bumptech.glide.load.<a href="../../../../../../com/bumptech/glide/load/Key.html" title="interface in com.bumptech.glide.load">Key</a></h3> <code><a href="../../../../../../com/bumptech/glide/load/Key.html#CHARSET">CHARSET</a>, <a href="../../../../../../com/bumptech/glide/load/Key.html#STRING_CHARSET_NAME">STRING_CHARSET_NAME</a></code></li> </ul> </li> </ul> <!-- ======== CONSTRUCTOR SUMMARY ======== --> <ul class="blockList"> <li class="blockList"><a name="constructor.summary"> <!-- --> </a> <h3>Constructor Summary</h3> <table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Constructor Summary table, listing constructors, and an explanation"> <caption><span>Constructors</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colOne" scope="col">Constructor and Description</th> </tr> <tr class="altColor"> <td class="colOne"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-android.content.Context-com.bumptech.glide.load.engine.bitmap_recycle.BitmapPool-com.bumptech.glide.load.Transformation-">BitmapDrawableTransformation</a></span>(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/engine/bitmap_recycle/BitmapPool.html" title="interface in com.bumptech.glide.load.engine.bitmap_recycle">BitmapPool</a>&nbsp;bitmapPool, <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp; <div class="block"><span class="deprecationComment">use <a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-"><code>BitmapDrawableTransformation(Transformation)</code></a>}</span></div> </div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-android.content.Context-com.bumptech.glide.load.Transformation-">BitmapDrawableTransformation</a></span>(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp; <div class="block"><span class="deprecationComment">use <a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-"><code>BitmapDrawableTransformation(Transformation)</code></a>}</span></div> </div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-">BitmapDrawableTransformation</a></span>(<a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> &nbsp;</td> </tr> </table> </li> </ul> <!-- ========== METHOD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="method.summary"> <!-- --> </a> <h3>Method Summary</h3> <table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation"> <caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd">&nbsp;</span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd">&nbsp;</span></span><span id="t4" class="tableTab"><span><a href="javascript:show(8);">Concrete Methods</a></span><span class="tabEnd">&nbsp;</span></span><span id="t6" class="tableTab"><span><a href="javascript:show(32);">Deprecated Methods</a></span><span class="tabEnd">&nbsp;</span></span></caption> <tr> <th class="colFirst" scope="col">Modifier and Type</th> <th class="colLast" scope="col">Method and Description</th> </tr> <tr id="i0" class="altColor"> <td class="colFirst"><code>boolean</code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#equals-java.lang.Object-">equals</a></span>(<a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a>&nbsp;o)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block">For caching to work correctly, implementations <em>must</em> implement this method and <a href="../../../../../../com/bumptech/glide/load/Transformation.html#hashCode--"><code>Transformation.hashCode()</code></a>.</div> </td> </tr> <tr id="i1" class="rowColor"> <td class="colFirst"><code>int</code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#hashCode--">hashCode</a></span>()</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block">For caching to work correctly, implementations <em>must</em> implement this method and <a href="../../../../../../com/bumptech/glide/load/Transformation.html#equals-java.lang.Object-"><code>Transformation.equals(Object)</code></a>.</div> </td> </tr> <tr id="i2" class="altColor"> <td class="colFirst"><code><a href="../../../../../../com/bumptech/glide/load/engine/Resource.html" title="interface in com.bumptech.glide.load.engine">Resource</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#transform-android.content.Context-com.bumptech.glide.load.engine.Resource-int-int-">transform</a></span>(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/engine/Resource.html" title="interface in com.bumptech.glide.load.engine">Resource</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;&nbsp;drawableResourceToTransform, int&nbsp;outWidth, int&nbsp;outHeight)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block">Transforms the given resource and returns the transformed resource.</div> </td> </tr> <tr id="i3" class="rowColor"> <td class="colFirst"><code>void</code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#updateDiskCacheKey-java.security.MessageDigest-">updateDiskCacheKey</a></span>(<a href="http://d.android.com/reference/java/security/MessageDigest.html?is-external=true" title="class or interface in java.security">MessageDigest</a>&nbsp;messageDigest)</code> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block">Adds all uniquely identifying information to the given digest.</div> </td> </tr> </table> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.java.lang.Object"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.<a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a></h3> <code><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#clone--" title="class or interface in java.lang">clone</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#finalize--" title="class or interface in java.lang">finalize</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#getClass--" title="class or interface in java.lang">getClass</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#notify--" title="class or interface in java.lang">notify</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#notifyAll--" title="class or interface in java.lang">notifyAll</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#toString--" title="class or interface in java.lang">toString</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#wait--" title="class or interface in java.lang">wait</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#wait-long-" title="class or interface in java.lang">wait</a>, <a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#wait-long-int-" title="class or interface in java.lang">wait</a></code></li> </ul> </li> </ul> </li> </ul> </div> <div class="details"> <ul class="blockList"> <li class="blockList"> <!-- ========= CONSTRUCTOR DETAIL ======== --> <ul class="blockList"> <li class="blockList"><a name="constructor.detail"> <!-- --> </a> <h3>Constructor Detail</h3> <a name="BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>BitmapDrawableTransformation</h4> <pre>public&nbsp;BitmapDrawableTransformation(<a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> </li> </ul> <a name="BitmapDrawableTransformation-android.content.Context-com.bumptech.glide.load.Transformation-"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>BitmapDrawableTransformation</h4> <pre><a href="http://d.android.com/reference/java/lang/Deprecated.html?is-external=true" title="class or interface in java.lang">@Deprecated</a> public&nbsp;BitmapDrawableTransformation(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;<span class="deprecationComment">use <a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-"><code>BitmapDrawableTransformation(Transformation)</code></a>}</span></div> </li> </ul> <a name="BitmapDrawableTransformation-android.content.Context-com.bumptech.glide.load.engine.bitmap_recycle.BitmapPool-com.bumptech.glide.load.Transformation-"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>BitmapDrawableTransformation</h4> <pre><a href="http://d.android.com/reference/java/lang/Deprecated.html?is-external=true" title="class or interface in java.lang">@Deprecated</a> public&nbsp;BitmapDrawableTransformation(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/engine/bitmap_recycle/BitmapPool.html" title="interface in com.bumptech.glide.load.engine.bitmap_recycle">BitmapPool</a>&nbsp;bitmapPool, <a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/Bitmap.html?is-external=true" title="class or interface in android.graphics">Bitmap</a>&gt;&nbsp;wrapped)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;<span class="deprecationComment">use <a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html#BitmapDrawableTransformation-com.bumptech.glide.load.Transformation-"><code>BitmapDrawableTransformation(Transformation)</code></a>}</span></div> </li> </ul> </li> </ul> <!-- ============ METHOD DETAIL ========== --> <ul class="blockList"> <li class="blockList"><a name="method.detail"> <!-- --> </a> <h3>Method Detail</h3> <a name="transform-android.content.Context-com.bumptech.glide.load.engine.Resource-int-int-"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>transform</h4> <pre>public&nbsp;<a href="../../../../../../com/bumptech/glide/load/engine/Resource.html" title="interface in com.bumptech.glide.load.engine">Resource</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;&nbsp;transform(<a href="http://d.android.com/reference/android/content/Context.html?is-external=true" title="class or interface in android.content">Context</a>&nbsp;context, <a href="../../../../../../com/bumptech/glide/load/engine/Resource.html" title="interface in com.bumptech.glide.load.engine">Resource</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;&nbsp;drawableResourceToTransform, int&nbsp;outWidth, int&nbsp;outHeight)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block"><span class="descfrmTypeLabel">Description copied from interface:&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#transform-android.content.Context-com.bumptech.glide.load.engine.Resource-int-int-">Transformation</a></code></span></div> <div class="block">Transforms the given resource and returns the transformed resource. <p>If the original resource object is not returned, the original resource will be recycled and it's internal resources may be reused. This means it is not safe to rely on the original resource or any internal state of the original resource in any new resource that is created. Usually this shouldn't occur, but if absolutely necessary either the original resource object can be returned with modified internal state, or the data in the original resource can be copied into the transformed resource. <p>If a Transformation is updated, <a href="../../../../../../com/bumptech/glide/load/Transformation.html#equals-java.lang.Object-"><code>Transformation.equals(Object)</code></a>, <a href="../../../../../../com/bumptech/glide/load/Transformation.html#hashCode--"><code>Transformation.hashCode()</code></a>, and <a href="../../../../../../com/bumptech/glide/load/Key.html#updateDiskCacheKey-java.security.MessageDigest-"><code>Key.updateDiskCacheKey(java.security.MessageDigest)</code></a> should all change. If you're using a simple String key an easy way to do this is to append a version number to your key. Failing to do so will mean users may see images loaded from cache that had the old version of the Transformation applied. Changing the return values of those methods will ensure that the cache key has changed and therefore that any cached resources will be re-generated using the updated Transformation. <p>During development you may need to either using <a href="../../../../../../com/bumptech/glide/load/engine/DiskCacheStrategy.html#NONE"><code>DiskCacheStrategy.NONE</code></a> or make sure <a href="../../../../../../com/bumptech/glide/load/Key.html#updateDiskCacheKey-java.security.MessageDigest-"><code>Key.updateDiskCacheKey(java.security.MessageDigest)</code></a> changes each time you make a change to the Transformation. Otherwise the resource you request may be loaded from disk cache and your Transformation may not be called.</div> <dl> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#transform-android.content.Context-com.bumptech.glide.load.engine.Resource-int-int-">transform</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</code></dd> <dt><span class="paramLabel">Parameters:</span></dt> <dd><code>context</code> - The Application context</dd> <dd><code>drawableResourceToTransform</code> - The resource to transform.</dd> <dd><code>outWidth</code> - The width of the view or target the resource will be displayed in, or <a href="../../../../../../com/bumptech/glide/request/target/Target.html#SIZE_ORIGINAL"><code>Target.SIZE_ORIGINAL</code></a> to indicate the original resource width.</dd> <dd><code>outHeight</code> - The height of the view or target the resource will be displayed in, or <a href="../../../../../../com/bumptech/glide/request/target/Target.html#SIZE_ORIGINAL"><code>Target.SIZE_ORIGINAL</code></a> to indicate the original resource height.</dd> <dt><span class="returnLabel">Returns:</span></dt> <dd>The transformed resource.</dd> </dl> </li> </ul> <a name="equals-java.lang.Object-"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>equals</h4> <pre>public&nbsp;boolean&nbsp;equals(<a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a>&nbsp;o)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block"><span class="descfrmTypeLabel">Description copied from interface:&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#equals-java.lang.Object-">Transformation</a></code></span></div> <div class="block">For caching to work correctly, implementations <em>must</em> implement this method and <a href="../../../../../../com/bumptech/glide/load/Transformation.html#hashCode--"><code>Transformation.hashCode()</code></a>.</div> <dl> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Key.html#equals-java.lang.Object-">equals</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Key.html" title="interface in com.bumptech.glide.load">Key</a></code></dd> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#equals-java.lang.Object-">equals</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</code></dd> <dt><span class="overrideSpecifyLabel">Overrides:</span></dt> <dd><code><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#equals-java.lang.Object-" title="class or interface in java.lang">equals</a></code>&nbsp;in class&nbsp;<code><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a></code></dd> </dl> </li> </ul> <a name="hashCode--"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>hashCode</h4> <pre>public&nbsp;int&nbsp;hashCode()</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block"><span class="descfrmTypeLabel">Description copied from interface:&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#hashCode--">Transformation</a></code></span></div> <div class="block">For caching to work correctly, implementations <em>must</em> implement this method and <a href="../../../../../../com/bumptech/glide/load/Transformation.html#equals-java.lang.Object-"><code>Transformation.equals(Object)</code></a>.</div> <dl> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Key.html#hashCode--">hashCode</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Key.html" title="interface in com.bumptech.glide.load">Key</a></code></dd> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Transformation.html#hashCode--">hashCode</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Transformation.html" title="interface in com.bumptech.glide.load">Transformation</a>&lt;<a href="http://d.android.com/reference/android/graphics/drawable/BitmapDrawable.html?is-external=true" title="class or interface in android.graphics.drawable">BitmapDrawable</a>&gt;</code></dd> <dt><span class="overrideSpecifyLabel">Overrides:</span></dt> <dd><code><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true#hashCode--" title="class or interface in java.lang">hashCode</a></code>&nbsp;in class&nbsp;<code><a href="http://d.android.com/reference/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a></code></dd> </dl> </li> </ul> <a name="updateDiskCacheKey-java.security.MessageDigest-"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>updateDiskCacheKey</h4> <pre>public&nbsp;void&nbsp;updateDiskCacheKey(<a href="http://d.android.com/reference/java/security/MessageDigest.html?is-external=true" title="class or interface in java.security">MessageDigest</a>&nbsp;messageDigest)</pre> <div class="block"><span class="deprecatedLabel">Deprecated.</span>&nbsp;</div> <div class="block"><span class="descfrmTypeLabel">Description copied from interface:&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Key.html#updateDiskCacheKey-java.security.MessageDigest-">Key</a></code></span></div> <div class="block">Adds all uniquely identifying information to the given digest. <p> Note - Using <a href="http://d.android.com/reference/java/security/MessageDigest.html?is-external=true#reset--" title="class or interface in java.security"><code>MessageDigest.reset()</code></a> inside of this method will result in undefined behavior. </p></div> <dl> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../../com/bumptech/glide/load/Key.html#updateDiskCacheKey-java.security.MessageDigest-">updateDiskCacheKey</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../../com/bumptech/glide/load/Key.html" title="interface in com.bumptech.glide.load">Key</a></code></dd> </dl> </li> </ul> </li> </ul> </li> </ul> </div> </div> <!-- ========= END OF CLASS DATA ========= --> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a name="navbar.bottom"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.bottom.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../../index-all.html">Index</a></li> <li><a href="../../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapDrawableResource.html" title="class in com.bumptech.glide.load.resource.bitmap"><span class="typeNameLink">Prev&nbsp;Class</span></a></li> <li><a href="../../../../../../com/bumptech/glide/load/resource/bitmap/BitmapEncoder.html" title="class in com.bumptech.glide.load.resource.bitmap"><span class="typeNameLink">Next&nbsp;Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../../index.html?com/bumptech/glide/load/resource/bitmap/BitmapDrawableTransformation.html" target="_top">Frames</a></li> <li><a href="BitmapDrawableTransformation.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_bottom"> <li><a href="../../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_bottom"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.summary">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.detail">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.detail">Method</a></li> </ul> </div> <a name="skip.navbar.bottom"> <!-- --> </a></div> <!-- ======== END OF BOTTOM NAVBAR ======= --> </body> </html>
2023-11-23T01:27:04.277712
https://example.com/article/4078
KUALA LUMPUR: A motorcyclist was injured after a car knocked him down while trying to overtake his motorcycle on the road. City Traffic Investigation and Enforcement chief Asst Comm Zulkefly Yahya said that the motorcyclist was injured following the collision Sunday morning. “Early investigations showed that the driver had tried to overtake the victim along Jalan Pahang. However the car was too near, which led to the collision. “The victim sustained injuries at the knee, hand and leg areas. A report was made by the victim after he was treated at the hospital. The police has also recorded statements from the car driver as well,” he said when contacted on Sunday. The case is being investigated under Section 43 of the Road Transport Act 1987, for careless and inconsiderate driving. A video of the incident, which was verified by ACP Zulkefly, had also been uploaded on social media. The short video showed the collision as the car, which was at speed, was moving between the lanes.
2024-07-20T01:27:04.277712
https://example.com/article/9110
Computerized maintenance management systems: how to match your department's needs with commercially available products. Computerized maintenance management systems (CMMS) are used by clinical engineering departments to collect, store, analyze and report data on the repair and maintenance performed on medical devices and other equipment. Evaluation of commercial CMMS require a careful requirements analysis and then a comprehensive evaluation of the products available in the marketplace that can come the closest to meeting those requirements. This paper provides a comprehensive list of evaluation questions to use to determine the best software system for a clinical engineering department's needs.
2024-06-29T01:27:04.277712
https://example.com/article/9756
How to reduce your Capital Gains Tax bill Brits paid more than £5bn of Capital Gains Tax in the last year, that’s more than the UK's total Inheritance Tax bill. But there are a number of steps you can take to reduce your CGT bill. It’s easy to believe Capital Gains Tax (CGT) is a tax that only the wealthiest investors pay but, in fact, HMRC raises more money from it than from Inheritance Tax. If you sell any investments that were not held in a pension fund or an ISA, you could be liable for CGT on the profits you earned. The same goes for sales of buy-to-let property or any property which is not your main residence. If you sell valuable belongings such as artworks, jewellery or furniture for £6,000 or more, those gains too might be liable to CGT. It’s levied at the rate of 18% if you’re a basic rate taxpayer, and 28% for higher rate taxpayers. However, not all gains are taxed. Every individual can take the first £11,100 of any gains in the current tax year tax-free. If your spouse is not using their allowance, you can transfer assets to them. If both then sell assets before the end of the year, you can effectively double the allowance to £22,200. You don’t necessarily have to part with the assets forever. In the past, investors could use a technique called ‘bed and breakfasting’ to create a disposal of an asset for CGT purposes (and therefore a gain or a loss), followed by the prompt repurchase of the same asset. Today, however, HMRC carries out ‘share matching’ – if the same shares are bought back less than 30 days after they were sold, the sale does not give rise to a CGT profit or loss. Investors can wait 30 days before repurchasing the stocks, though the market may have moved, potentially forcing investors to pay a higher price. So before selling simply to realise a gain for tax purposes, consider whether running this ‘market risk’ would be worth the tax savings. The ban on bed and breakfasting doesn’t apply to investments that are repurchased inside an ISA or a self-invested pension plan (SIPP). So for those selling specifically to realise tax gains, it might be worth buying them back inside one of these tax wrappers – in which case, this can be done immediately. This is known as ‘Bed and ISA’ or ‘Bed and SIPP’. There are costs involved, so investors should take advice. Selling investments can lead to losses as well as gains, and these losses can be offset against gains. So, if the gains are going to exceed the annual allowance, investors could sell a losing investment. This would crystallise a loss that could bring the gains back down below the limit. These are simple steps that can be taken to reduce the burden of CGT, but which also underline the value of wrappers such as ISAs, which offer a permanent shelter from the threat of tax. Tony Mudd is a divisional director at wealth management firm St. James’s Place
2023-08-17T01:27:04.277712
https://example.com/article/9543
George Eliot's Allusion to Keble — a note to Victorian Types In "Janet's Repentance" George Eliot alludes to Keble's Tractarian attacks on dissenting Protestantism when she remarks that "Milby, in those uninstructed days, had not yet heard that the schismatic ministers of Salem were obviously typified by Korah, Dathan, and Abiram; and many Church people there were of opinion that Dissent might be a weakness, but, after all, had no great harm in it" (ch.2). She alludes to the political use of this type again in her essay "The Modern Hep! Hep! Hep!"
2023-10-03T01:27:04.277712
https://example.com/article/4602
GNIT College of Management placements The long and arduous hard work bears fruit when one gets to the heights one had ambitioned. At GNIOT we make sure that our students are placed in the finest organizations as a first step towards a longer and successful career. To enhance students’ chances for a smooth transition from a student to an executive, the placement cell successfully brings the best of national and international organizations to the campus. Below are a few opportunities, in placement cell which helps in building their future:
2024-02-06T01:27:04.277712
https://example.com/article/1110
// Code generated by smithy-go-codegen DO NOT EDIT. package types type Distribution string // Enum values for Distribution const ( DistributionRandom Distribution = "Random" DistributionBylogstream Distribution = "ByLogStream" ) type ExportTaskStatusCode string // Enum values for ExportTaskStatusCode const ( ExportTaskStatusCodeCancelled ExportTaskStatusCode = "CANCELLED" ExportTaskStatusCodeCompleted ExportTaskStatusCode = "COMPLETED" ExportTaskStatusCodeFailed ExportTaskStatusCode = "FAILED" ExportTaskStatusCodePending ExportTaskStatusCode = "PENDING" ExportTaskStatusCodePending_cancel ExportTaskStatusCode = "PENDING_CANCEL" ExportTaskStatusCodeRunning ExportTaskStatusCode = "RUNNING" ) type OrderBy string // Enum values for OrderBy const ( OrderByLogstreamname OrderBy = "LogStreamName" OrderByLasteventtime OrderBy = "LastEventTime" ) type QueryStatus string // Enum values for QueryStatus const ( QueryStatusScheduled QueryStatus = "Scheduled" QueryStatusRunning QueryStatus = "Running" QueryStatusComplete QueryStatus = "Complete" QueryStatusFailed QueryStatus = "Failed" QueryStatusCancelled QueryStatus = "Cancelled" )
2023-11-14T01:27:04.277712
https://example.com/article/7842
Homeland Security announced an aggressive new policy Monday to fast-track deportations of recent immigrants caught in the living in the U.S. illegally, looking to expand a tool that’s been used successfully at the border for years. Expedited removal allows immigration officers to order a deportation without the extensive immigration court proceedings and appeals that accompany other removals. For years, it’s been applied to immigrants caught within 100 miles of the border who illegally entered in recent weeks. Under the policy, which acting Homeland Security Secretary Kevin McAleenan announced in a notice published online, immigrants who entered illegally within the last two years, and were caught anywhere in the U.S., can face expedited removal. Mr. McAleenan cast the move in part as a response to the migrant surge, which has overwhelmed his agents at the border, allowing more people to sneak by and into the interior. “The volume of illegal entries, and the attendant risks to national security and public safety presented by these illegal entries, warrants this immediate implementation of DHS’s full statutory authority over expedited removal,” the secretary wrote. Immigrant-rights groups, though, vowed lawsuits to try to stop the new policy. “Under this unlawful plan, immigrants who have lived here for years would be deported with less due process than people get in traffic court,” said Omar Jadwat at the American Civil Liberties Union. Tens of thousands of immigrants could be subject to expedited removal. Mr. McAleenan said that could help clear the massive backlog in the immigration courts, since the cases would be decided by immigration officers rather than administrative law judges. It also means having to hold people in detention at U.S. Immigration and Customs Enforcement for a shorter time. The average custody period for someone in full removal proceedings in 2018 was more than 50 days. For expedited removal cases, it was just 11 days. Expedited removal was part of a 1996 law passed by Congress and signed by then-President Clinton — though it was the Bush administration that set the old rules, applying it to within 100 miles of the border and within the first two weeks of someone illegally crossing. Steve Vladeck, a professor at the University of Texas School of Law, said courts have generally upheld expedited removal powers, finding that they were sufficiently limited by time and geography. He predicted on Twitter that nationwide expansion “is going to provoke massive relitigation of those claims.” Mr. McAleenan, in the new notice, said the 100-mile policy ignores some obvious cases where expedited removal would be appropriate. He pointed out that major cities in border states are often more than 100 miles from the border itself — such as Roswell, New Mexico, where 67 immigrants were found living illegally in the U.S. at a stash house earlier this year. Under expedited removal, the burden is on the target to prove they didn’t enter illegally within the last two years. Migrants could still apply for asylum or other protections under the same rules that apply at the border for expedited removal, the secretary said. Still, immigration activists said expanding the policy creates a “show your papers” situation where even U.S. citizens could be snared and struggle to prove their bona fides. “How are people supposed to prepare for this?” wondered David Leopold, a former president of the American Immigration Lawyers Association. “This designation contains nothing about how a lawful permanent resident should prepare. Should they be carrying passports and immigration papers at all times? How do we answer the question ‘papers please?’ We don’t know.” He also said the new policy could also be used by unscrupulous employers who have immigrants living in the U.S. illegally in their workforce. If those workers are unruly, employers can now threaten a call to ICE. “And among the bad actor employers is Donald Trump at his golf clubs,” Mr. Leopold said, referring to a number of current and former immigrants living in the U.S. illegally who have come forward to say they’d been employed at Trump properties. Sign up for Daily Newsletters Manage Newsletters Copyright © 2020 The Washington Times, LLC. Click here for reprint permission.
2024-03-02T01:27:04.277712
https://example.com/article/8948
The Massachusetts consumer affairs office on Tuesday issued a consumer alert about the bitcoin virtual currency. The alert was sparked by the crash of bitcoin exchange Mt. Gox and the bitcoin ATM that recently opened in Boston’s South Station. The office said it’s reviewing the Liberty Teller bitcoin ATM to determine if it requires licensing. Meanwhile, a second bitcoin ATM made by the company, in Cambridge’s Harvard Square, opened this week. The state’s warning itself probably contains no new information for the tech savvy, but I’m assuming that’s not who the alert is targeted at. This wasn’t exactly a rapid response from the state, either — bitcoin has been growing in popularity for years, while the South Station ATM and the Mt. Gox meltdown are weeks old at this point. But it’s still perhaps notable, from a tech sector perspective, that the state decided to say anything at all. Many in the tech community have heralded bitcoin and digital currency overall as an emerging front; Jeremy Allaire, founder of Boston digital currency startup Circle (and formerly founder of Brightcove), is among those entrepreneurs seeking to bring bitcoin into the mainstream. Here is a portion of the alert from the state:
2024-05-31T01:27:04.277712
https://example.com/article/9501
Archangel by TM Smith Cover Reveal For centuries Gabriel, Michael and Lucifer have worked together, coexisting in the same universe. Gabriel chooses to remain silent and secluded, preferring the garden in the Hall of Souls. He dances beneath the Tree of Life, barefoot and with reckless abandon…until the day he looks into the eyes of another angel and sees the dreams he’s kept silent mirrored there. Eons have passed since the moment Michael came to be the general of the All Father’s army in heaven, the protector of mankind. Michael has been in love with Lucifer for as long as he can remember, their relationship second only to his bond with the All Father. But lately, Michael has begun to notice cracks in the surface of their love, sensing that his lover is not as angelic as he seems. Lucifer was the All Father’s first creation, the bringer of light, his Morning Star. He has sat to the right of the throne every day since the dawn of time. Two things were tasked to the Archangels from the start: put no other before the All Father, and protect the humans he cherishes. Lucifer challenges both sacred rules. He puts his love for Michael before his love for his creator, and he questions his creator’s wisdom when it comes to the atrocities he has seen committed by mankind. One will fall while two remain and grow stronger. A battle of wills is on the horizon, and not only mankind, but the fate of all beings will hang in the balance. NOTE: this is an excerpt from a book that is still in the writing process and has yet to be edited. Prologue… “Lu, please, don’t do this.” Michael begged. Collapsing to his knees, he reached for Lucifer’s face, only to have his hand knocked away. The look of love and tenderness he’d once seen in the darker Angels silver eyes was gone, replaced with anger and hatred, the normally shining orbs bleeding into a dull gray with pulsing coal black slits. Standing, the pissed off Angel shoved Michael aside, advancing on Gabriel. “You did this!” Lucifer let his wings unfurl and the All Father gasped. An Angels wings were liken to their limbs, an extension of their soul as much as bones and skin. Lucifer’s normally black and silver marbled feathers loomed over him, awash in a darkness that resembled brimstone and ash, the tips a dull, lifeless gray that matched his now dead, slitted eyes. In a blur of movement that none of them expected, the dark Angel flew into the air, spinning and knocking Gabriel off his feet with the suddenly massive appendages jutting out of his shoulder blades. “I will destroy you Messenger. Much like you’ve done to the love he once felt for me, only for me!” “Enough!” The All Father’s voice boomed, the heavens shaking, a brilliant white light momentarily blinding all his Angels. Blinking, Gabriel stood and moved over to where Michael sat crouched, staring up at Lucifer, confusion and pain dotting his vibrant blue eyes. “Angel of light, my son and most trusted advisor, I beg you to stop this madness. You know what the consequence will be.” Lucifer glared at the All Father, chest heaving, breathing labored, senselessly fighting against the band of light wrapped around his middle like the sheath of a knife. “Father, please don’t…” God raised his hand silencing Michael. “I am sorry, Michael, but he has made his choice which leaves me no alternative.” The band around Lucifer tightened, the floor beneath him opening up, exposing clouds of thunder and rain. “Star of the Morning, bringer of light, you are stripped of your titles, your wings forfeit. You shall now be known as Satan, the serpent, the prince of darkness.” Lucifer howled in agony as the strong coal-black feathers were stripped away from his being. “I cast you out of heaven and forbade your return.” The iridescent tears cascading down the All Father’s cheeks formed a river beneath the writhing Angel. Michael cried out, turning and burying his face in Gabriel’s bronze robe, the silky fabric soon soaked through with fresh, warm tears. He wrapped his arms around Michael, shielding him from Lucifer’s violent, turbulent eyes. In the eons to come, the slow passage of time he and Michael would face together, Gabriel would always question his role in the events of that day. Could it have been avoided? Of course it could have, but that would have meant walking away from the Angel that he loved second only to the All Father. He asked himself for the millionth time as he held Michael’s head so he wouldn’t see the clouds open up and swallow Lucifer, dragging him down to bowels of the earth, face a mask of agony and pain, forever exiled to the pit and doomed to watch over and judge only the evil of mankind… what have I done? A military brat born and raised at Ft. Benning Georgia; TM Smith is an avid reader, reviewer and writer. A Texas transplant, she now calls DFW her home. Most days she can be found curled up with a good book, or ticking away on her next novel. Smith is a single mom of three disturbingly outspoken and decidedly different kids, one of which is Autistic. Besides her writing, she is passionate about Autism advocacy and LGBT rights. Because, seriously people, Love is Love!
2023-10-13T01:27:04.277712
https://example.com/article/8149
I. Background ============= Contemporary informatics and genomic research require efficient, flexible and robust management of large heterogeneous data \[[@B1],[@B2]\], advanced computational tools \[[@B3]\], powerful visualization \[[@B4]\], reliable hardware infrastructure \[[@B5]\], interoperability of computational resources \[[@B6],[@B7]\], and provenance of data and protocols \[[@B8]-[@B10]\]. There are several alternative approaches for high-throughput analysis of large amounts of data such as using various types of shell-scripts \[[@B11],[@B12]\] and employing tool-specific graphical interfaces \[[@B13]-[@B15]\]. The large-scale parallelization, increased network bandwidth, need for reproducibility, and wide proliferation of efficient and robust computational and communication resources are the driving forces behind this need for automation and high-throughput analysis. There is a significant push to increase and improve resource development, enable the expansion of integrated databases and vibrant human/machine communications, and increase the distributed grid and network computing bandwidth \[[@B16],[@B17]\]. To meet these needs we present a new visual language programming framework for genomics and bioinformatics research based on heterogeneous graphical workflows. We demonstrate the construction, validation and dissemination of several analysis protocols using a number of independent informatics and genomics software suites - miBLAST \[[@B18]\], EMBOSS \[[@B19]\], mrFAST \[[@B20]\], GWASS \[[@B21]\], MAQ \[[@B22]\], SAMtools \[[@B23]\], Bowtie \[[@B24],[@B25]\], etc. These types of genomics and informatics tools were chosen as they span a significant component of the informatics research and, at the same time, they have symbiotic relations which enable their interoperability and integration. The continual evolution and considerable variability of informatics and genomics data, software tools and web-service present challenges in the design, management, validation and reproducibility of advanced biomedical computing protocols. There are a number of graphical environments for visual design of computational protocols (pipelines), tool integration, interoperability and meta-analysis \[[@B15],[@B26]\]. Most of them aim to enable new types of analyses, facilitate new applications, promote interdisciplinary collaborations, and simplify tool interoperability \[[@B27]\]. Compared to other environments, the Pipeline offers several advantages, including a distributed grid-enabled, client-server, and fail-over-safe infrastructure, quick embedding of new tools within the Pipeline computational library, and efficient dissemination of new protocols to the community. Table [1](#T1){ref-type="table"} provides a summary of the synergies and differences between the LONI Pipeline and several alternative graphical workflow environments. Additional comparisons between the LONI Pipeline and various alternative environments for software tool integration and interoperability are presented here \[[@B15]\]. ###### Comparison of common graphical workflow environments --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Workflow Environment Requires Tool Recompiling Data Storage Platform Independent Client-Server Model Grid Enabled Application Area URL -------------------------- --------------------------- ------------------------- ---------------------- --------------------- -------------- ----------------------------- ------------------------------------------------ LONI Pipeline \[[@B15]\] N External Y Y Y\ Area agnostic <http://Pipeline.loni.ucla.edu> (DRMAA) Taverna \[[@B35]\] Y\ Internal (MIR) Y N Y\ Bioinformatics <http://www.taverna.org.uk> (via API) (myGRID) Kepler \[[@B14]\] Y\ Internal (actors) Y N Y\ Area agnostic <http://kepler-project.org> (via API) (Ecogrid) Triana \[[@B36]\] Y Internal data structure Y N Y\ Hetero-geneous Apps <http://www.trianacode.org> (gridLab) Galaxy \[[@B37]\] N External N\ Y N\ Bioinformatics <http://usegalaxy.org> (Linux, Mac) (Cloud EC2) Pipeline Pilot Y Internal Y N N Biochemistry <http://accelrys.com/products/pipeline-pilot/> AVS \[[@B38]\] Y Internal Y\ N N Advanced Visualization <http://www.avs.com> (platform build) VisTrails \[[@B39]\] Y Internal N N N Scientific Visualization <http://www.vistrails.org> Bioclipse \[[@B40]\] N\ Internal Y N N Biochemistry Bioinformatics <http://www.bioclipse.net> (plug-ins) --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Y = yes, N = no; Taverna MIR plug-in, MIR = myGrid Information Repository; DRMAA = Distributed Resource Management Application API. Previously, we have demonstrated a number of imaging \[[@B15],[@B28]\], brain mapping \[[@B29],[@B30]\] and neuroscientific \[[@B31],[@B32]\] applications using the Pipeline environment. One shape morphometry analysis protocol, using BrainParser \[[@B33]\] several shape manifold models of regional boundary \[[@B2],[@B3]\] implemented via the Pipeline environment is illustrated on Figure [1](#F1){ref-type="fig"}. This is a complete neuroimaging solution (available within the Pipeline core computational library) which automatically extracts, models and statistically analyzes local and regional shape differences between several cohorts based on raw magnetic resonance imaging data. The **Results**section below includes hands-on examples demonstrating specific informatics and genomics computing protocols for sequence data analysis and interoperability of heterogeneous bioinformatics resources. ![**An example of a completed Pipeline workflow (Local Shape Analysis) representing an end-to-end computational solution to a specific brain mapping problem**. This pipeline protocol starts with the raw magnetic resonance imaging data for 2 cohorts (11 Alzheimer\'s disease patients and 10 age-matched normal controls). For each subject, the workflow automatically extracts a region of interest (left superior frontal gyrus, LSFG. using BrainParser \[[@B1]\]) and generates a 2D shape manifold model of the regional boundary \[[@B2],[@B3]\]. Then the pipeline computes a mean LSFG shape using the normal subjects LSFG shapes, coregisters the LSFG shapes of all subjects to the mean (atlas) LSFG shape, and maps the locations of the statistically significant differences of the 3D displacement vector fields between the 2 cohorts. The insert images illustrate the mean LSFG shape (top-right), the LSFG for one subject (bottom-left), and the between-group statistical mapping results overlaid on the mean LSFG shape (bottom-right), red color indicates p-value \< 0.01.](1471-2105-12-304-1){#F1} II. Implementation ================== As an external inter-resource mediating layer, the Pipeline environment \[[@B15]\] utilizes a distributed infrastructure model for mediating disparate data resources, software tools and web-services. No software redesign or rebuilding modifications of the existing resources are necessary for their integration with other computational components. The Pipeline eXtensible Markup Language (XML) schema enables the inter-resource communication and mediation layer. Each XML resource description contains important information about the tools location, the proper invocation protocol (i.e., input/output types, parameter specifications, etc.), run-time controls and data-types. The Pipeline XML schema <http://pipeline.loni.ucla.edu/support/xml-overview/> also includes auxiliary metadata about the resource state, specifications, history, authorship, licensing, and bibliography. Using this resource metadata, the Pipeline infrastructure facilitates the integration of disparate resources and provides a complete and comprehensive protocol provenance \[[@B15]\] for the data, tools, hardware and results. Individual module descriptions and entire protocol XML objects are managed as .PIPE files, facilitate the broad dissemination of resource metadata descriptions via web services, and promote constructive utilization of multidisciplinary tools and expertise by professionals, novice users and trainees. In this paper we demonstrate the concrete details for utilizing several informatics and genomics suites of tools and show how such disparate resources may be integrated within the Pipeline environment. Many additional resources (data, tools and protocols) are also available within the core Pipeline computational library (e.g., R statistical computing, image analysis, and statistical inference) and more can easily be added to (local or remote) Pipeline server libraries following the protocols described below. In addition to presenting a number of bioinformatics and genomics applications using the Pipeline environment, this manuscript described some improvements of Pipeline version 5.2 over previous versions \[[@B15]\], e.g., enhanced user-management, client-server pipeline web-start (PWS) interface, directory access control, and improved Java authentication and authorization service interface. Pipeline Architecture --------------------- The Pipeline software architecture design is domain and hardware independent which makes the environment useful in different computational disciplines and on diverse hardware infrastructures. The Pipeline environment may be utilized in three synergistic mechanisms \[[@B15]\]. The first one <http://pipeline.loni.ucla.edu/downloads> involves the local use of the Pipeline client via connection to a remote server running natively on a hardware system which includes all appropriate plug-ins for system-specific grid managers, file systems, network, and communication protocols. The second type of Pipeline server distribution relies on virtualization technology. The virtualized Pipeline infrastructure provides end-users with the latest stable pre-compiled environment including all pre-installed open-source informatics tools. The resulting Pipeline Virtual Environment (PNVE, <http://pipeline.loni.ucla.edu/PNVE>), contains the complete self-contained execution environment that can be run locally or on remote grid computing environment. Because the Pipeline virtualization environment tightly mirrors that of the LONI grid <http://www.loni.ucla.edu/twiki/bin/view/Infrastructure/GridComputing>, users gain access to all LONI image processing, brain mapping and informatics tools and services. Version 1.0 of the virtual Pipeline environment is based on Ubuntu <http://www.ubuntu.com> and VMware <http://www.vmware.com> technologies. The third Pipeline distribution mechanism is called Distributed Pipeline Server (DPS, <http://pipeline.loni.ucla.edu/DPS>). This distribution includes a user-friendly graphical user interface (GUI) for automated native system configuration, installation and deployment of the Pipeline server, the available XML computational library, and back-end software tools. The Pipeline environment uses a client-server architecture, but each Pipeline client may also act as a local server and manage job submission and execution. Following proper authentication, the process of a client submitting a workflow for execution to a specified server prompts the server to translate (break) the workflow into parallel jobs and send them to the grid resource manager which in turn farms these to the back-end grid (or multiple cores). When a job is complete, the server retrieves the results from the grid resource manager and sends out subsequent jobs from the active workflow. The client receives status updates from the server at regular intervals, Figure [2](#F2){ref-type="fig"}. Currently, the Pipeline server supports Distributed Resource Management Application API (DRMAA, <http://www.DRMAA.org>) interface and Java Gridengine Database Interface (JGDI) to communicate to the grid resource manager. These include many of the popular grid resource managers, including Sun/Oracle Grid Engine <http://en.wikipedia.org/wiki/Oracle_Grid_Engine>, GridWay <http://www.gridway.org>, PBS/Torque <http://www.ClusterResources.com>. ![**High-level schematic representation of the communication between multiple local Pipeline clients connected to multiple remote Pipeline servers**.](1471-2105-12-304-2){#F2} Software Implementation ----------------------- The entire Pipeline source code is in Java, including the client, server, network, execution and database components. The Pipeline server has a grid plug-in component, which provides communication between the Pipeline server and grid resource manager. In addition to JGDI and DRMAA support, it supports custom plug-in of grid resource managers. The API for grid plug-in is available on the Pipeline website <http://pipeline.loni.ucla.edu/support/server-guide/pipeline-grid-plugin-api-developers-guide/>. II.1 Software Development ========================= User-management --------------- As the hardware resources (e.g., storage, CPU, memory) are generally limited and the available Pipeline servers are finite, a handful of heavy users may disproportionately monopolize the Pipeline services and the underlying hardware infrastructure. To prevent this from occurring, a fair-usage policy is implemented to manage the sharing of these limited resources. This policy, referred to as \"User Management,\" ensures that no users may utilize more than a predefined percent (which is specified as a preference by the server administrator) of the available resources at a fixed time. Different pipeline servers may have different usage percentage values. The number submissions allowed is dynamic and changes after each new job is submitted, as it depends on the number of available nodes/slots and the number of user-specific jobs already scheduled. For instance, a running Pipeline server which has only 100 slots available where the limit percent value is set to 50 would allow the first user to utilize no more than 50 slots. The Pipeline user-manager calculates the number of slots the user can use with the following formula: where: **T**is the total number of available slots, **U**is the number of currently used slots by all the users, **UC**is the number of used slots by current user only, and **P**is the limit percent value specified by the Pipeline server administrator. This user management protocol significantly improves the server usability and allows each user to submit at least part of their jobs in real time, although it slightly reduces the optimal usage of the server. Directory Access Control ------------------------ The Pipeline server allows administrator control over the user access to binary executables, workflows/modules and server files (browseable via the Pipeline Remote File Browser GUI). Server administrators may also specify a list of users who can, or cannot, access a list of directories. This is a convenient feature when a Pipeline server supports several different categories of groups of users and some server files should not be visible or executable by various users or groups. User Authentication using JAAS ------------------------------ The Pipeline authenticates users using the Java Authentication and Authorization Service <http://java.sun.com/javaee/security/>, which allows the server operator to authenticate usernames and passwords against any type of system. When a user connects to a Pipeline server, the Pipeline tries to create a new JAAS Object called LoginContext and if the creation is successful, attempts to call the object\'s login method. If the method returns \"true\", then the Pipeline allows the user to continue. Otherwise the user is disconnected from the server with an \"Authentication rejected\" message. File Permission on Shared Temporary Directories ----------------------------------------------- Each Pipeline server has one directory where all the temporary files are stored. Files located in this directory need to be accessible only by the Pipeline server administrator and by the user who started the workflow. Pipeline server has a special flag in its preferences file which enables this feature and creates special permissions for each file in the temporary directory, which enables safe and secure management of files in the temporary directory. Stability --------- The performance of the Pipeline server (V.5.0+) has significantly improved over V.4 \[[@B34]\] in terms of client-server communication, server reliability and stability. This was accomplished by introducing architectural changes, bug-fixes (e.g., resolving memory leaks), and additional new features like failover, Grid plug-ins and array job-submission. **Failover**: The server failover feature improves robustness and minimizes service disruptions in the case of a single Pipeline server failure. It is available on servers running Linux or other UNIX operating systems. The core of failover is running two actual Pipeline servers in parallel, a primary and a secondary, a virtual Pipeline Server name, and de-coupling and running the persistence database on a separate system. Each of the two servers monitors the state of its counterpart. In the event that the primary server with the virtual Pipeline server name has a catastrophic failure, the secondary server will assume the virtual name, establish a connection to the persistence database, take ownership of all current Pipeline jobs dynamically, and restart the formerly primary server as secondary. **Grid plug-ins**: This feature allows Pipeline to run a new Grid plug-in process instead of attaching the plug-in to the actual Pipeline process. This makes Grid plug-ins and resource management libraries isolated from the Pipeline server and prevents server crashes if any of the lower level libraries crash. After having this feature, the server up time has been dramatically increased. **Array Jobs**: The Pipeline server now supports array job submission which improves the total processing time of a workflow by combining repeated jobs into one array job. Each job in the array has its own output stream and error stream. This feature increases the speed of job submission especially for modules with multiple instances (e.g., 100-10,000 subjects). Depending of the module\'s number of instances, there is 10-65% speed improvement when using array jobs versus sequential individual job submissions. This feature is configurable and server administrator may set preferences about how array jobs will be submitted on each Pipeline server. II.2 Implementation of Genomics and Informatics Pipeline Protocols ================================================================== The following steps are necessary to develop a complete Pipeline biomedical solution to a well-defined computational challenge - *protocol design, tool installation, module definition, workflow implementation, workflow validation*, and *dissemination*of the resulting workflow for broader community-based testing and utilization. Each of these steps is described in detail below and screencasts and videos demonstrating these steps are available online <http://pipeline.loni.ucla.edu/support/>. Protocol design --------------- This is the most important step in the design of a new Pipeline graphical workflow to solve a specific informatics or genetics problem and typically involves multidisciplinary expert users with sufficient scientific and computational expertise. In practice, most genomics challenges may be approached in several different ways and the final Pipeline XML workflow will greatly depend on this initial step. In this step, it may be most appropriate to utilize a top-down approach for outlining the general classes of sequence data analysis, then the appropriate sub-classes of analyses, specific tools, test-data, invocation of concrete tools, and a detailed example of executable syntax for each step in the protocol. Below is a hierarchical example of a discriminative design for a sequence alignment and assembly protocol demonstrated in the **Results**section. These steps are not different from other approaches for developing and validating informatics and genomics protocols, however the explicit hierarchical formulation of these steps is only done once by the expert user(s). All subsequent protocol redesigns, modifications and extensions may be accomplished (by all types of users) directly on the graphical representation of the protocol with the Pipeline graphical user interface (GUI). Table [2](#T2){ref-type="table"} contains an example of the specification of an alignment and assembly protocol, which is also demonstrated as a complete Pipeline genomics solution on Figure [3](#F3){ref-type="fig"}. ###### An example of a hierarchical alignment and assembly protocol specification --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ***Alignment and Assembly***  *A preprocessing step*: Extracting a sub-sequence of the genomic sequence. This step is not required, but may be useful for some preliminary tests and protocol validation. It restricts the size of the sequences and expedites the computation   *Input*: reads files output of Illumina sequencing pipeline (sequence.txt files)   *Tool*: LONI Sub-Sequence extractor   *Server Location*:/projects1/idinov/projects/scripts/extract_lines_from_Textfile.sh   *Output*: Shorter sequence.fastq file  *Data conversion*: File conversion of solexa fastq in sanger fastq format   *Input*: reads files output of Illumina sequencing pipeline (sequence.txt files)   *Tool*: MAQ (sol2sanger option): Mapping and Assembly with Quality   *Server Location*:/applications/maq   *Output*: sequence.fastq file  *Binary conversion*: Conversion of fastq in a binary fastq file (bfq)   *Input*: sequence.fastq file   *Tool*: MAQ (fastq2bfq option)   *Server Location*:/applications/maq   *Output*: sequence.bfq file  *Reference conversion*: Conversion of the reference genome (fasta format) in binary fasta   *Input*: reference.fasta file (to perform the alignment)   *Tool*: MAQ (fasta2bfa option)   *Server Location*:/applications/maq   *Output*: reference.bfa file  *Sequence alignment*: Alignment of data sequence to the reference genome   *Using MAQ:*    *Input*: sequence.bfq, reference.bfa    *Tool*: MAQ (map option)    *Server Location*:/applications/maq    *Output*: alignment.map file   *Using Bowtie:*    *Input*: reference.fai, sequence.bfq,    *Tool*: Bowtie (map option)    *Server Location*:/applications/bowtie    *Output*: alignment.sam file  *Indexing*: Indexing the reference genome   *Input*: reference.fa   *Tool*: samtools (faidx option)   *Server Location*:/applications/samtools-0.1.7_x86_64-linux   *Output*: reference.fai  *Mapping conversion:*   *MAQ2SAM*:    *Input*: alignment.map file    *Tool*: samtools (maq2sam-long option)    *Server Location*:/applications/samtools-0.1.7_x86_64-linux    *Output*: alignment.sam file   *SAM to full BAM*:    *Input*: alignment.sam, reference.fai file    *Tool*: samtools (view -bt option)    *Server Location*:/applications/samtools-0.1.7_x86_64-linux    *Output*: alignment.bam file  *Removal of duplicated reads*:   Input: alignment.bam file   Tool: samtools (rmdup)   Server Location:/applications/samtools-0.1.7_x86_64-linux   Output: alignment.rmdup.bam file  *Sorting*:   *Input*: alignment. rmdup.bam file   *Tool*: samtools (sort option)   *Server Location*:/applications/samtools-0.1.7_x86_64-linux   *Output*: alignment. rmdup.sorted.bam file  *MD tagging*:   *Input*: alignment. rmdup.sorted.bam file and reference REF.fasta file   *Tool*: samtools (calmd option)   *Server Location*:/applications/samtools-0.1.7_x86_64-linux   *Output*: alignment. rmdup.sorted.calmd.bam file  *Indexing*:   *Input*: alignment.rmdup.sorted.calmd.bam file   *Tool*: samtools (index option)   *Server Location*:/applications/samtools-0.1.7_x86_64-linux   *Output*: alignment. rmdup.sorted.calmd.bam.bai file --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- This protocol is implemented as a Pipeline graphical workflow and demonstrated in the Results section. Figure 3 shows the corresponding Pipeline graphical workflow implementing this genomics analysis protocol. ![**A high-level group-folded representation of the alignment and assembly protocol, Table 2, as a Pipeline graphical workflow**.](1471-2105-12-304-3){#F3} Tool installation ----------------- Once the protocol is finalized, the workflow designer and the administrator of the Pipeline server need to ensure that all tools (which are not already deployed with the Pipeline server installation) are available at the specified server locations. Note that tools are installed in specific locations which may be varying for different hardware platforms and sites. The Pipeline Library manager <http://pipeline.loni.ucla.edu/support/server-guide/configuration/> facilitates the portability of the XML-based Pipeline graphical workflows by defining a hash-map between different software suites, computational tools, versions and executable locations. Thus a well-defined Pipeline graphical workflow only references the software suite, its version and the specific tool necessary for the specific computational task. The Pipeline server then interprets, maps and constructs the specific executable commands which are relayed to the grid manager as concrete jobs and scheduled for execution. Module definition ----------------- The module definition is accomplished via the Pipeline GUI. Each of the executable processes needs to be described individually and independently as a node (or a module) in the workflow graph <http://pipeline.loni.ucla.edu/support/user-guide/creating-modules/>. This step also includes the independent testing and validation of the execution of each of the individual nodes (modules) using appropriate data. The result of this module definition step is an XML file (\*.pipe) representing the tool invocation syntax, which can be broadly used, shared, modified, extended and integrated with other module descriptions to form complex graphical workflow protocols. Workflow implementation ----------------------- This protocol skeletonization process is important as it lays out the flow of the data and indicates the complete data analysis provenance <http://pipeline.loni.ucla.edu/support/user-guide/building-a-workflow/>. After all necessary modules are independently defined and validated, we need to integrate them into a coherent and scientifically-valid pipeline workflow. Frequently the developer(s) makes use of module groupings to abstract computational complexity, conditional and looping modules to direct the processing flow, and specify data sources (inputs) and data sinks (results). In addition, workflow-wide and module-specific meta-data documentation is also provided in this step. These include appropriate workflow preferences, variables, references/citations (using PMCIDs), URLs, licenses, required vs. optional parameters, inputs, outputs and run-time controls, etc. Workflow validation ------------------- The workflow validation step involves the testing and fine-tuning of the implemented workflow to ensure the results of each intermediate step as well as the final results are reasonable, appropriately captured and saved, and tested against alternative protocols (e.g., outputs of analogous scripts). This automated workflow validation step ensures that input datasets and the output results are well-defined, verifies the provenance information about the pipeline workflow, as well as provides user documentation, limitations, assumptions, potential problems and solutions, usability and support annotation. Dissemination ------------- Validated pipeline workflows may be disseminated as XML documents via email, web-sites and pipeline server libraries, as well as Biositemaps objects \[[@B27]\] in XML or RDF format <http://www.Biositemaps.org>. Any valid pipeline workflow may be loaded by any remote Pipeline client. However, execution of a particular workflow may require access to a Pipeline server where all tools referenced in the workflow are available for execution, the user has the appropriate credentials to access the remote Pipeline servers, data, software tools and services. In addition, some minor workflow modifications may be necessary prior to the execution of the pipeline workflow (e.g., server changes, data input and result output specifications, re-referencing to executable tools, variable specifications, review of protocol documentation, etc.) Although, each Pipeline client is itself a server, typical users would not run workflows on the same (client) machine but rather remotely login to a Pipeline server to outsource the computing-intensive tasks. Pipeline clients can disconnect and reconnect frequently to multiple Pipeline servers to submit workflows and monitor the status of running workflows in real time. III. Results and Discussion =========================== We now demonstrate the complete process of installing, XML-wrapping (metadata describing), employing and integrating tools from several informatics software suites - **miBLAST**(Basic Local Alignment Search Tool for nucleotide sequence queries) \[[@B18]\], **EMBOSS**(European Molecular Biology Open Software Suite) \[[@B19]\], **mrFAST**(micro-read Fast Alignment Search Tool) \[[@B20]\], **GWASS**(Genome-Wide Association Study Software) \[[@B21]\], **MAQ**(Mapping and Assembly with Qualities) \[[@B22]\], **SAMtools**(Sequence Alignment and Mapping Tools) \[[@B23]\], and **Bowtie**\[[@B24],[@B25]\]. Each of these packages includes a large number of tools and significant capabilities. The Pipeline XML module definitions for some of the tools within these packages may not yet be implemented, or may be incompletely defined within the Pipeline library. However, following this step-by-step guideline, the entire community may extend and improve the existing, as well as describe and distribute additional, Pipeline XML module wrappers for other tools within these suites. Additional genomics and informatics suites and resources may also be similarly described in the Pipeline XML syntax and made available to the community, as needed. III.1 miBLAST ============= ◦ **URL**: <http://www.eecs.umich.edu/~jignesh/miblast/> ◦ **Description**: miBLAST is a tool for efficiently BLASTing a batch of nucleotide sequence queries. Such batch workloads contain a large number of query sequences (for example, consider BLASTing a library of oligonucleotide probe set against an EST database, <http://www.ncbi.nlm.nih.gov/nucest>). These batch workloads can be evaluated by BLASTing each individual query one at time, but this method is very slow for large batch sizes. ◦ **Installation**: The downloading, installation and configuration of the miBLAST suite on Linux OS kernel takes only 10 minutes following these instructions: <http://www.eecs.umich.edu/~jignesh/miblast/installation.html>. ◦ **Pipeline Workflow** ▪ *XML Metadata description*: The module descriptions for each of the nodes in the Pipeline workflow took about 30 minutes each. The design of the complete workflow took 8 hours because this suite generates many implicit outputs and is intended to be run each time from the core build directory. This presents a challenge for multiple users using the same routines and generating the same implicit filenames (results). To circumvent this problem, we added several auxiliary modules in the beginning (to copy the entire distribution to a tem space) and at the end (to clean up the intermediate results). Notice that wrapper shell-scripts had to also be developed to address the problems with implicit output filenames. Finally, flow-of-control connections, in addition to standard data-passing connections, were utilized to direct the execution of the entire protocol. ▪ *Name*: miBLAST_Workflow.pipe ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfoBLAST> ▪ *Screenshots*: • Input: Figure [4](#F4){ref-type="fig"} shows a snapshot of the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters (data-sinks) for the miBLAST Pipeline workflow**.](1471-2105-12-304-4){#F4} • Pipeline Execution: Figure [5](#F5){ref-type="fig"} shows the completed miBLAST pipeline workflow and a fragment of the output alignment result. ![**A snapshot of the completed miBLAST Pipeline workflow**. The insert image illustrates the final output result, see Table 3.](1471-2105-12-304-5){#F5} • Output: Table [3](#T3){ref-type="table"} contains the beginning of the output result from the miBLAST workflow. ###### A fragment of the output result from the miBLAST pipeline workflow, see Figure 5 ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------- ----------- `BLASTN 2.2.8 [Jan-05-2004]` `Reference: Altschul, Stephen F., Thomas L. Madden, Alejandro A. Schaffer, Jinghui Zhang, Zheng Zhang, Webb Miller, and David J. Lipman (1997), "Gapped BLAST and PSI-BLAST: a new generation of protein database search programs", Nucleic Acids Res. 25:3389-3402.` `Query=probe:HG-U133A:1007_s_at:467:181; Interrogation_Position=3330; Antisense;`  `(25 letters)` `Database:/ifs/ccb/CCB_SW_Tools/others/Bioinformatics/Blast/miBLAST/miblast/src/example/ecoli.nt`  `400 sequences; 4,662,239 total letters` `Searching.done` `Sequences producing significant alignments:` `Score (bits)` `E Value` `gi|1790777|gb|AE000503.1|AE000503 Escherichia coli K-12 MG1655 s...` `26` `0.69` `gi|2367246|gb|AE000436.1|AE000436 Escherichia coli K-12 MG1655 s...` `26` `0.69` `gi|1788338|gb|AE000294.1|AE000294 Escherichia coli K-12 MG1655 s...` `26` `0.69` `gi|1786819|gb|AE000166.1|AE000166 Escherichia coli K-12 MG1655 s...` `26` `0.69` `gi|1788310|gb|AE000292.1|AE000292 Escherichia coli K-12 MG1655 s...` `24` `2.7 ` ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------- ----------- ▪ *Approximate time to complete*: 20-30 minutes. III.2 EMBOSS ============ ◦ **URL**: <http://EMBOSS.sourceforge.net/> ◦ **Tool**: EMBOSS *Matcher* ◦ **Description**: Finds the best local alignments between two sequences. It can be used to compare two sequences looking for local sequence similarities using a rigorous algorithm. ◦ **Installation**: The downloading, installation and configuration of the entire EMBOSS suite on Linux OS kernel takes 15 minutes following these instructions: <http://emboss.sourceforge.net/docs/faq.html>. ◦ **Pipeline Workflow** ▪ *XML Metadata description*: The Pipeline XML for a number of EMBOSS tools are available. Each of these metadata module descriptions was complete via the Pipeline module GUI and took about 30-45 minutes. As a demonstration, only the EMBOSS Matcher module is presented here. ▪ *Name*: EMBOSS_Matcher.pipe ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfoEMBOSS> ▪ *Screenshots*: • Input: Figure [6](#F6){ref-type="fig"} shows the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters for the EMBOSS Matcher Pipeline workflow**.](1471-2105-12-304-6){#F6} • Pipeline Execution: Figure [7](#F7){ref-type="fig"} demonstrates the completed execution of this EMBOSS module. ![**A snapshot of the completed EMBOSS Matcher Pipeline workflow**. The Insert image shows the output result of the local sequence alignment of *hba_human*and *hbb_human*.](1471-2105-12-304-7){#F7} • Output: Table [4](#T4){ref-type="table"} contains the beginning of the output result from the EMBOSS Matcher alignment. ###### A fragment of the text output of EMBOSS Matcher (see Figure 7) ---------------------------------------------------------------------------------------------------------- \#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\# \# Program: matcher \# Rundate: Tue 2 Nov 2010 15:50:56 \# Commandline: matcher \# -asequence tsw:hba_human \# -bsequence tsw:hbb_human \# -outfile/panfs/tmp/pipeline-edu/pipelnvr/2010November02_15h50m48s631ms/Matcher_1.Output-1.matcher \# Align_format: markx0 \# Report_file:/panfs/tmp/pipeline-edu/pipelnvr/2010November02_15h50m48s631ms/Matcher_1.Output-1.matcher \#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\#\# \#======================================= \# \# Aligned_sequences: 2 \# 1: HBA_HUMAN \# 2: HBB_HUMAN \# Matrix: EBLOSUM62 \# Gap_penalty: 14 \# Extend_penalty: 4 ---------------------------------------------------------------------------------------------------------- ▪ *Approximate time to complete*: 2 minutes. III.3 mrFAST (micro-read Fast Alignment Search Tool) ==================================================== ◦ **URL**: <http://mrFAST.sourceforge.net> ◦ **Description**: mrFAST is designed to map short (micro) reads generated with the Illumina platform to reference genome assemblies in a fast and memory-efficient manner. ◦ **Installation**: The downloading, installation and configuration of the mrFAST suite on Linux OS kernel takes only 10 minutes following these instructions: <http://mrfast.sourceforge.net/manual.html>. ◦ **Pipeline Workflow** ▪ *XML Metadata description*: The example includes Pipeline module descriptions of the mrFAST Fasta-Indexing (indices can be generated in single or batch modes) and Fasta-Mapping (map single-end reads and paired-end reads to a reference genome) tools. Each of these metadata module descriptions was complete via the Pipeline module GUI and took about 10-15 minutes. ▪ *Name*: mrFAST_Indexing_Mapping.pipe ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfoMRFAST> ▪ *Screenshots*: • Input: Figure [8](#F8){ref-type="fig"} shows the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters for the mrFAST Indexing Pipeline workflow**.](1471-2105-12-304-8){#F8} • Pipeline Execution: Figure [9](#F9){ref-type="fig"} demonstrates the completed execution of this mrFAST workflow. ![**A snapshot of the completed mrFAST Indexing Pipeline workflow**.](1471-2105-12-304-9){#F9} • Output: Table [5](#T5){ref-type="table"} contains the beginning of the output result from the mrFAST workflow. ###### A fragment of the text output of mrFAST Indexing workflow (see Figure 9) ----------------------------- **mrFAST unmapped output:** `>blue` `CUGUCUGUCUUGAGACA` ----------------------------- ▪ *Approximate time to complete*: 2 minutes. III.4 GWASS =========== ◦ **URL**: <http://www.stats.ox.ac.uk/~marchini/software/gwas/gwas.html> ◦ **Description**: The Genome-wide Association Study Software (GWASS) is a suite of tools facilitating the analysis of genome-wide association studies. These tools were used in the design and analysis of the 7 genome-wide association studies carried out by the Wellcome Trust Case-Control Consortium (WTCCC). One specific example of a GWASS tool is **IMPUTE**V.2 (IMPUTE2) which is used for genotype imputation and phasing <https://mathgen.stats.ox.ac.uk/impute/impute_v2.html>. ◦ **Installation**: The downloading, installation and configuration of the GWASS suite on Linux OS kernel takes about 15 minutes. ▪ *XML Metadata description*: Here we demonstrate the pipeline module description of Impute, which is a program for genotype imputation in genome-wide association studies and provides fine-mapping based on a dense set of marker data (such as HapMap). ▪ *Name*: GWASS_Impute.pipe ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfGWASS> ▪ *Screenshots*: • Input: Figure [10](#F10){ref-type="fig"} shows the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters for the GWASS Impute Pipeline workflow**.](1471-2105-12-304-10){#F10} • Pipeline Execution: Figure [11](#F11){ref-type="fig"} demonstrates the completed execution of this GWASS Impute module. ![**A snapshot of the completed GWASS Impute Pipeline workflow**.](1471-2105-12-304-11){#F11} • Output: Table [6](#T6){ref-type="table"} contains the beginning of the output result from the GWASS Impute module. ###### A fragment of the text output of GWASS Impute workflow (see Figure 11) ------- ------------- ------------ ------- --------- --------- --------- --------- --------- --------- --------- --------- --------- --------- --------- ----- `---` `rs5754787` `20400130` `A G` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.004` `0.996` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.003` `0.997` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.003` `0.997` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.003` `0.997` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` `0.002` `0.998` `0` \... ------- ------------- ------------ ------- --------- --------- --------- --------- --------- --------- --------- --------- --------- --------- --------- ----- ▪ *Approximate time to complete*: 2-3 minutes. III.5 Interoperabilities between independently developed informatics resources ============================================================================== There are 100\'s of examples of heterogeneous Pipeline graphical workflows that illustrate the interoperability between imaging tools independently developed for different purposes by different investigators at remote institutions. These can be found under the Workflows section of the Pipeline library, Figure [12](#F12){ref-type="fig"}, as well as on the web at: <http://www.loni.ucla.edu/twiki/bin/view/LONI/Pipeline_GenomicsInformatics.> ![**Pipeline Server Library**.](1471-2105-12-304-12){#F12} Similarly, bioinformatics and genomics investigators can construct novel computational sequence analysis protocols using the available suites of informatics resources (data, tools and services). Below is one example of integrating the informatics tools described above. III.5.1 Indexing and Mapping ---------------------------- In this example, we illustrate how to integrate mrFAST and EMBOSS Water informatics tools. The left branch of the Pipeline workflow uses EMBOSS to align 2 sequences (**tsw:hba_human**&**tsw:hbb_human**) using Water. The right branch of the workflow does Fast Alignment using 2 independent datasets (EMBOSS Water-computed: **Water_1.Output-1.fasta**& mrFAST:**cofold-blue.fasta**) and 2 separate mrFAST references (**query.fasta**&**dna.fasta**). The interesting demonstration here is that the EMBOSS Water output (of the **tsw:hba_human**&**tsw:hbb_human**registration) is later directly used as *derived data sequence*which is re-aligned to the 2 mrFAST reference sequences. ◦ Pipeline Workflow ▪ *Design*: This tool-interoperability example illustrates feeding the output of the EMBOSS Water module (fasta file) as in input in mrFAST Indexing module and subsequent mapping using mrFAST. ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfoMRFAST> ▪ *Name*: BioInfo_IntegratedWorkflow_EMBOSS_Water_mrFAST.pipe ▪ *Screenshots*: • Inputs: Figure [13](#F13){ref-type="fig"} shows the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters for this heterogeneous Pipeline workflow**: EMBOSS: tsw:hba_human, tsw:hbb_human mrFAST: cofold-blue.fasta, query.fasta, dna.fasta.](1471-2105-12-304-13){#F13} • Pipeline Execution: Figure [14](#F14){ref-type="fig"} demonstrates the completed execution of this EMBOSS/mrFAST workflow. ![**A snapshot of the completed heterogeneous (EMBOSS/mrFAST) Pipeline workflow**.](1471-2105-12-304-14){#F14} ▪ Output: Table [7](#T7){ref-type="table"} contains the beginning of the output result from this heterogeneous workflow. ###### A fragment of the text output of this heterogeneous pipeline workflow (see Figure 14) ----------------------------------------------------------------------------------------------------- `                   FASTAReadsMappingtoReferenceGenome_2.OutputUnmapped-1.map` `>HBA_HUMAN P69905 Hemoglobin subunit alpha (Hemoglobin alpha chain) (Alpha-globin)` `LSPADKTNVKAAWGKVGAHAGEYGAEALERMFLSFPTTKTYFPHF-DLS-----HGSAQV` `>GHGKKVADALTNAVAHVDDMPNALSALSDLHAHKLRVDPVNFKLLSHCLLVTLAAHLPA` `EFTPAVHASLDKFLASVSTVLTSKY` `>HBB_HUMAN P68871 Hemoglobin subunit beta (Hemoglobin beta chain) (Beta-globin) (LVV-hemorphin-7)` `LTPEEKSAVTALWGKV--NVDEVGGEALGRLLVVYPWTQRFFESFGDLSTPDAVMGNPKV` `>AHGKKVLGAFSDGLAHLDNLKGTFATLSELHCDKLHVDPENFRLLGNVLVCVLAHHFGK` `EFTPPVQAAYQKVVAGVANALAHKY` ----------------------------------------------------------------------------------------------------- ▪ *Approximate time to complete*: 6 minutes. III.5.2 Alignment and Assembly ------------------------------ Another interesting example illustrating the power of tool interoperability using the Pipeline environment involved the Alignment and Assembly computational genomics protocol we presented in the **Implementation**section. In this example, we demonstrate the interoperability between MAQ, SAMtools, and Bowtie tools. ◦ Pipeline Workflow ▪ *Design*: This genomics pipeline workflow begins with an optional preprocessing step extracting a sub-sequence of the genomic sequence (for both the forward and reverse sequences). Then, the Illumina sequencing data (sequence.txt) are converted first to fastq and later (together with the reference genome fasta file) to binary fastq file (bfq) format. The data is then aligned to a reference genome, the MAP file is converted to BAM file and the reference genome is indexed. The alignment MAP file is converted to SAMtools (SAM) format first and then to a binary BAM file. Next, duplicated reads are removed, the BAM file is sorted, MD tagged and indexed. In addition the MAQ-based alignment, Bowtie was used (in parallel) to align the data to the reference sequence. Such alternative paths in the data processing protocol are easily constructed and modified in the Pipeline environment. ▪ *URL*: <http://www.loni.ucla.edu/twiki/bin/view/CCB/PipelineWorkflows_BioinfoMAQ> ▪ *Name*: MAQ_SAMtools_Bowtie_Integrated_Cranium.pipe ▪ *Screenshots*: • Inputs: Figure [15](#F15){ref-type="fig"} shows the input parameters (data-sources) for the corresponding Pipeline workflow. ![**A snapshot of the input parameters for this heterogeneous Pipeline workflow**.](1471-2105-12-304-15){#F15} • Pipeline Execution: Figure [16](#F16){ref-type="fig"} demonstrates the completed execution of this heterogeneous pipeline workflow. ![**A snapshot of the completed heterogeneous Pipeline workflow**. The image shows the expanded (raw, unfolded) version of the protocol which is analogous to the folded version of the same pipeline workflow illustrated on Figure 3. The folded version only demonstrates the major steps in the protocol and abstracts away some of the technical details, however, both versions of this protocol perform identical analyses.](1471-2105-12-304-16){#F16} ▪ Output: Table [8](#T8){ref-type="table"} contains the beginning of the output result from this heterogeneous workflow. ###### A fragment of the text output of this heterogeneous pipeline workflow (see Figure 16) --------------------------------------------------------------------------- --------------------------------------- ----------- ------------------- `SamToolsCamldMDtag_1.OutputNo-DuplicatesBAMfile-1.bam.bai (Binary file)` `SamToolsCamldMDtag_1.OutputNo-DuplicatesBAMfile-1.bam (Binary file)` `...` `BowtieEcoli_1.OutputMAPfile-1.map (ASCII file)` `r0` `- gi|110640213|ref|NC_008253.1|` `3658049` `ATGCTGGAATGGCGATAGTTGGGTGGGTATCGTTC` `45567778999:9;;<===>?@@@@AAAABCCCDE` `0` `32:T>G,34:G > A` `r1` `- gi|110640213|ref|NC_008253.1|` `1902085` `CGGATGATTTTTATCCCATGAGACATCCAGTTCGG` `45567778999:9;;<===>?@@@@AAAABCCCDE` `0` `r2` `- gi|110640213|ref|NC_008253.1|` `3989609` `CATAAAGCAACAGTGTTATACTATAACAATTTTGA` `45567778999:9;;<===>?@@@@AAAABCCCDE` `0` `r5` `+ gi|110640213|ref|NC_008253.1|` `4249841` `CAGCATAAGTGGATATTCAAAGTTTTGCTGTTTTA` `EDCCCBAAAA@@@@?>===<;;9:99987776554` `0` `...` --------------------------------------------------------------------------- --------------------------------------- ----------- ------------------- ▪ *Approximate time to complete*: 4-5 minutes. IV. Conclusions =============== This paper reports on the applications of the Pipeline environment \[[@B15],[@B34]\] to address two types of computational genomics and bioinformatics challenges - graphical management of diverse suites of tools, and the interoperability of heterogeneous software. Specifically, this manuscript presents the concrete details of deploying general informatics suites and individual software tools to new hardware infrastructures, the design, validation and execution of new visual analysis protocols via the Pipeline graphical interface, and integration of diverse informatics tools via the Pipeline XML syntax. We demonstrate each of these three protocols using several established informatics packages - miBLAST (a tool for efficient Basic Local Alignment Search Tool of a batch of nucleotide sequence queries), EMBOSS (European Molecular Biology Open Software Suite), mrFAST (micro-read Fast Alignment Search Tool), GWASS (Genome-wide Association Study Software), MAQ (Mapping and Assembly with Qualities), SAMtools (Sequence Alignment and Mapping Tools), and Bowtie. These examples demonstrate informatics and genomics applications using the Pipeline graphical workflow environment. The Pipeline is a platform-independent middleware infrastructure enabling the description of diverse informatics resources with well-defined invocation protocol - syntax for dynamic specification of the inputs, outputs and run-time control parameters. These resource XML descriptions may be provided using the Pipeline graphical user interface or using machine code according to the Pipeline XSD schema. The Pipeline environment provides a powerful and flexible infrastructure for efficient biomedical computing and distributed informatics research. The interactive Pipeline resource management enables the utilization and interoperability of diverse types of informatics resources. The Pipeline client-server model provides computational power to a broad spectrum of informatics investigators - experienced developers and novice users, the computational-resources haves and have-nots, as well as between basic and translational scientists. The open development, validation and dissemination of computational networks (pipeline workflows) facilitates the sharing of knowledge, tools, protocols and best practices, and enables the unbiased validation and replication of scientific findings by the entire community. For specific research domains, applications and needs, there are pros and cons for using the Pipeline environment or any of the alternative tools and infrastructures for visual informatics and computational genomics. Examples of powerful alternatives include Taverna \[[@B35]\], Kepler \[[@B14]\], Triana \[[@B36]\], Galaxy \[[@B37]\], AVS \[[@B38]\], VisTrails \[[@B39]\], Bioclipse \[[@B40]\], KNIME \[[@B41]\], and others. The main advantages of the Pipeline environment are the distributed client-server architecture with diverse arrays of grid plug-ins, the lightweight data, tools and services utilization and the dynamic workflow design, validation, execution, monitoring and dissemination of complete end-to-end computaitonal solutions. V. Availability and requirements ================================ • **Project name**: Pipeline Environment • Project home pages: ◦ LONI: <http://pipeline.loni.ucla.edu> ◦ NITRC: <http://www.nitrc.org/projects/pipeline> ◦ BIRN: <http://www.birncommunity.org/tools-catalog/loni-pipeline> ◦ Bioinformatics.org: <http://www.bioinformatics.org/pipeline> ◦ Try the LONI Pipeline Informatics and Genomics Workflows online without any software installation using anonymous guest account: <http://pipeline.loni.ucla.edu/PWS> • **Operating system(s)**: Pipeline **clients**and **servers**are platform-independent, while some features (e.g. privilege escalation, failover) require the server run on Linux/UNIX OS. The Distributed Pipeline Server (DPS) graphical user interface, which installs the Pipeline server, Grid Engine, and computational imaging and informatics software tools, require standard Linux OS kernels. The Pipeline Web Start (PWS) allows users to start the Pipeline application directly from the web browser and run it locally without any installation. It has all the features and functionality of the downloadable stand-alone Pipeline application and allows anonymous guest access or user-authentication to connect to remote Pipeline servers. • **Programming language**: Pure Java. • **Other requirements:** ◦ Requirements Summary: The Pipeline client and server can run on any system that is supported by Java Runtime Environment (JRE) 1.5 or higher. Windows Pipeline servers will not be able to use privilege escalation. Three-tier Failover feature is only supported by Unix/Linux systems. All other features are available for all platforms. Most Distributed Pipeline Servers require 300-1,000MB memory, which may depend on the load and garbage collection preferences. ◦ For distributed multicore deployment, the Distributed Pipeline Server (DPS) requires a Grid manager (e.g., Distributed Resource Management Application API, DRMAA), which is provided with the DPS distribution. The Pipeline server will still work on a platform without a Grid manager, however, jobs may not be processed in parallel and performance on multicore machines may be suboptimal. ◦ Complete requirements: ▪ Client: <http://pipeline.loni.ucla.edu/support/user-guide/installation/> ▪ Server: <http://pipeline.loni.ucla.edu/support/server-guide/installation/> ▪ DPS: <http://pipeline.loni.ucla.edu/DPS> ▪ PWS: <http://pipeline.loni.ucla.edu/PWS> • **License**: Apache-derived software license <http://www.loni.ucla.edu/Policies/LONI_SoftwareAgreement.shtml>. • **Caution**: There are some potential limitations of the Pipeline environment and its current collection of data, tools services and computational library (module XML meta-data descriptions): ◦ Each new informatics tool which needs to be accessible as a processing module within the Pipeline environment needs to be **described manually by an expert using the Pipeline GUI or automatically using a properly configured XML exporter**(e.g., <http://www.loni.ucla.edu/twiki/bin/view/MAST/TranslateTo>). Then the Pipeline XML module description can be shared with other users. ◦ To run available Pipeline workflows (\*.pipe workflow files) on **remote Pipeline-servers**, users need to have accounts on the remote Pipeline servers. In addition, 2 types of updates may be necessary in the PIPE files - the server-name references of data sources (inputs), data sinks (results), and executables, as well as the path references to the data sources, sinks and executables. The server-name can be easily updated using server changer tool in Pipeline (Tools menu → Server Changer). User has to edit path references on some or all of the data sources, sinks and executables for their server. No workflow modifications are necessary for executing these pipeline workflows on the LONI Pipeline Cranium server; however this requires a LONI Pipeline user-account <http://www.loni.ucla.edu/Collaboration/Pipeline/Pipeline_Application.jsp>. A proper administrator configuration of the Distributed Pipeline Server (DPS, <http://pipeline.loni.ucla.edu/DPS>) will resolve the need for such revisions by the user. ◦ Some computational tools **may require wrapper scripts**that call the raw executable binaries. These scripts (not the raw binaries) are then invoked via the Pipeline environment. Example situations include tools that have implicit outputs, or if the tools routinely return non-trivial exit codes, distinct from zero. Such problems may cause the Pipeline environment to halt execution of subsequent modules, because of a broken module-to-module communication protocol. ◦ Smartlines, which **auto-convert between different informatics data formats**, need to be extended to handle informatics and genomics data (currently, smartlines handle mostly image file format conversions). ◦ **Access to external informatics databases**may need to be customized - e.g., PDB <http://www.rcsb.org>, SCOP <http://scop.mrc-lmb.cam.ac.uk/scop>, GenBank <http://www.ncbi.nlm.nih.gov/genbank>, etc. ◦ Native vs. Virtual Pipeline server: The fully **distributed pipeline server**(**DPS**) architecture (which allows anyone to locally download, configure and deploy the complete Pipeline server) provides (natively) both the Pipeline middleware as well as installers for all computational tools available on the LONI Cranium Pipeline Grid Server <http://pipeline.loni.ucla.edu/support/user-guide/interface-overview/>. The virtual Pipeline server and pipeline clients also provide the complete Pipeline environment for a virtual VMware invocation <http://pipeline.loni.ucla.edu/PNVE>. • **Any restrictions to use by non-academics**: Free for non-commercial research purposes. Competing interests =================== The authors declare that they have no competing interests. Authors\' contributions ======================= All authors have read and approved the final manuscript. All authors made substantive intellectual contributions to this research and development effort and the drafting of the manuscript. Specifically, the authors contributed as follows: IDD article conception, study design, workflow implementation and applications, data processing, drafting and revising the manuscript; FT study design, workflow implementation, data processing, drafting the manuscript; FM study design, workflow implementation, drafting the manuscript; PP pipeline software implementation, workflow design and drafting the manuscript; ZL pipeline software implementation, workflow design and drafting the manuscript; AZ pipeline software implementation, study design, workflow development and drafting the manuscript; PE pipeline software engineering, workflow design and drafting the manuscript; JP pipeline server Grid implementation and management, workflow development and drafting the manuscript; AG study design, workflow implementation and drafting the manuscript, JAK and APC study design protocol, data processing, workflow development and drafting the manuscript; JDVH study design protocol and drafting the manuscript; JA workflow applications and drafting the manuscript; CK study design, workflow applications and drafting the manuscript; AWT study design, engineering of the pipeline environment, and drafting the manuscript. Acknowledgements and Funding ============================ This work was funded in part by the National Institutes of Health through Grants U54 RR021813, P41 RR013642, R01 MH71940, U24-RR025736, U24-RR021992, U24-RR021760 and U24-RR026057. We are also indebted to the members of the Laboratory of Neuro Imaging (LONI), the Biomedical Informatics Research Network (BIRN), the National Centers for Biomedical Computing (NCBC) and Clinical and Translational Science Award (CTSA) investigators, NIH Program officials, and many general users for their patience with beta-testing the Pipeline and for providing useful feedback about its state, functionality and usability. Benjamin Berman and Zack Ramjan from the USC Epigenome Center, University of Southern California, provided help with definition of sequence pre-processing. For more information on LONI and the LONI Pipeline, please go to <http://www.loni.ucla.edu> and <http://pipeline.loni.ucla.edu>.
2024-03-23T01:27:04.277712
https://example.com/article/1651
Latest News The Winnipeg Blue Bombers may be interested in acquiring return specialist Bashir Levingston from Toronto if the price is right. Winnipeg general manager Brendan Taman said yesterday he had received permission from Argos general manager Adam Rita to talk to Levingston's agent. The Argos are trying to trade Levingston, who became expendable when the team signed free-agent returner/receiver Keith Stokes last Sunday. Stokes played the past two years in Winnipeg and augmented his return skills as a capable receiver. Levingston is arguably the best return specialist in the Canadian Football League but couldn't prove his versatility to Toronto as an offensive or defensive player. Levingston is scheduled to receive $125,000 this year -- a hefty amount for a player considered one-dimensional -- and is scheduled to receive a bonus of $20,000 on March 1. The Argos may opt to eat part of the contract to facilitate a trade. "If (Levingston) wants to agree to a reduction (in salary) and Toronto pays a portion of it, I may be interested," Taman said last night. "We've talked about it (in the organization). "It could happen but there's a lot of things that need to happen before it develops. I can probably stomach if I'm lucky (paying) $100,000, maybe. We'll see what happens." Taman was scheduled to pay Stokes a base pay of $100,000, but the deal included a $30,000 provision in bonus incentives. Stokes received a base pay of $80,000 last year and incentives that pushed it up to $100,000. The Argos would prefer to trade Levingston to a West Division team rather than see him play for an East Division team. Still, Rita has apparently also talked to representatives of Hamilton and Montreal. Hamilton may have an interest, but there may be concerns about Levingston's salary, his reputation as a one-dimensional player plus the fact he threw a helmet into the crowd last year at Ivor Wynne Stadium and injured a young boy. Levingston publicly apologized, was fined by the Argos and suspended for one game by the league. Montreal has a pure return specialist in 5-foot-4 Ezra Landry. Crumb accepts trade Versatile backup defensive back/linebacker Mike Crumb found out he had been traded to Winnipeg yesterday shortly after his wife gave birth to the couple's second child, a boy. The Argos dealt Crumb and a second-round draft pick in 2006 for quarterback Spergon Wynn. "I didn't think a 35-year-old is worth anything, particularly a quarterback," Crumb said jokingly. "I guess Winnipeg was looking for what I bring to the table, possibly to be playing again as a starter."
2024-02-21T01:27:04.277712
https://example.com/article/1684
New Zealand's Supreme Court found the U.S. does not have to provide full documents in its extradition bid U.S. prosecutors do not have to provide defendants in a high-profile criminal copyright case full copies of documents it references in its extradition request, New Zealand's Supreme Court ruled Friday. The U.S. is seeking extradition of Kim Dotcom and three of his colleagues who ran Megaupload, a file-sharing site prosecutors allege unfairly profited by allowing its users to trade content it knew was subject to copyright protection. A District Court granted Megaupload's request to see such evidence, a ruling that was upheld by the High Court. The Court of Appeal then reversed the decision, and Megaupload appealed to the Supreme Court. "It's disappointing that we lost in the Supreme Court by majority decision," Dotcom wrote on Twitter. "But great that Chief Justice of NZ would have allowed our appeal." In order to make an extradition request, the U.S. provides a summary of evidence used to establish a prima facie case that is used to determine eligibility for extradition, according to a news release from the Supreme Court. In a 4-1 decision, the Supreme Court panel found that requirement does not mean the U.S. must provide "copies of all documents it summarizes." The U.S., however, is bound to disclose information "that would render worthless or seriously undermine the evidence upon which it relies," the court's news release said. The ruling could prove a setback for Dotcom and Megaupload, whose legal team may now have less ground to challenge extradition. Dotcom along with Finn Batato, Mathias Ortmann and Bram van der Kolk were indicted in January 2012 in U.S. District Court for the Eastern District of Virginia on charges of criminal copyright infringement, money laundering, racketeering and wire fraud. U.S. prosecutors allege Megaupload encouraged its users to share content that is copyright protected and netted US$175 million in criminal proceeds. Megaupload contends it removed content when requested and did not sanction copyright infringement.
2024-01-02T01:27:04.277712
https://example.com/article/3973
Buchenwald: History & Overview Buchenwald was one of the largest concentration camps established by the Nazis. The camp was constructed in 1937 in a wooded area on the northern slopes of the Ettersberg, about five miles northwest of Weimar in east-central Germany. Before the Nazi takeover of power, Weimar was best known as the home of Johann Wolfgang von Goethe, who embodied the German enlightenment of the eighteenth century, and as the birthplace of German constitutional democracy in 1919, the Weimar Republic. During the Nazi regime, “Weimar” became associated with the Buchenwald concentration camp. Buchenwald first opened for male prisoners in July 1937. Women were not part of the Buchenwald camp system until 1944. Prisoners were confined in the northern part of the camp in an area known as the main camp, while SS guard barracks and the camp administration compound were located in the southern part. The main camp was surrounded by an electrified barbed-wire fence, watchtowers, and a chain of sentries outfitted with automatically activated machine guns. The jail, also known as the Bunker, was located at the entrance to the main camp. The SS carried out shootings in the stables and hangings in the crematorium area. Most of the early inmates at Buchenwald were political prisoners. However, in 1938, in the aftermath of Kristallnacht, German SS and police sent almost 10,000 Jews to Buchenwald where they were subjected to extraordinarily cruel treatment. 600 prisoners died between November 1938 and February 1939. Beginning in 1941, a varied program of involuntary medical experiments on prisoners took place at Buchenwald in special barracks in the northern part of the main camp. Medical experiments involving viruses and contagious diseases such as typhus resulted in hundreds of deaths. In 1944, SS Dr. Carl Vaernet began a series of experiments that he claimed would “cure” homosexual inmates. Also in 1944, a “special compound” for prominent German political prisoners was established near the camp administration building in Buchenwald. Ernst Thaelmann, chairman of the Communist Party of Germany before Hitler's rise to power in 1933, was murdered there in August 1944. During World War II, the Buchenwald camp system became an important source of forced labor. The prisoner population expanded rapidly, reaching 110,000 by the end of 1945. Buchenwald prisoners were used in the German Equipment Works (DAW), an enterprise owned and operated by the SS; in camp workshops; and in the camp's stone quarry. In March 1943 the Gustloff firm opened a large munitions plant in the eastern part of the camp. A rail siding completed in 1943 connected the camp with the freight yards in Weimar, facilitating the shipment of war supplies. Buchenwald administered at least 87 subcamps located across Germany, from Duesseldorf in the Rhineland to the border with the Protectorate of Bohemia and Moravia in the east. Prisoners in the satellite camps were put to work mostly in armaments factories, in stone quarries, and on construction projects. Periodically, prisoners throughout the Buchenwald camp system underwent selection. The SS staff sent those too weak or disabled to continue working to the Bernburg or Sonnenstein euthanasia killing centers, where they were killed by gas. Other weakened prisoners were killed by phenol injections administered by the camp doctor. As Soviet forces swept through Poland, the Germans evacuated thousands of concentration camp prisoners from western Poland. After long, brutal marches, more than 10,000 weak and exhausted prisoners from Auschwitz and Gross-Rosen, most of them Jews, arrived in Buchenwald in January 1945. In early April 1945, as American forces approached the camp, the Germans began to evacuate some 28,000 prisoners from the main camp and an additional 10,000 prisoners from the subcamps of Buchenwald. About a third of these prisoners died from exhaustion en route or shortly after arrival, or were shot by the SS. Many lives were saved by the Buchenwald resistance, whose members held key administrative posts in the camp. They obstructed Nazi orders and delayed the evacuation. On April 11, 1945, starved and emaciated prisoners stormed the watchtowers, seizing control of the camp. Later that afternoon, American forces entered Buchenwald. Soldiers from the Third U.S. Army division found more than 20,000 people in the camp, 4,000 of them Jews. Approximately 56,000 people were murdered in the Buchenwald camp system, the majority of them after 1942.
2023-11-13T01:27:04.277712
https://example.com/article/3183
Man kennt sich gut aus Mainzer Zeiten. Ein Jahr und 29 Pflichtspiele (27 in der Liga, zwei im DFB-Pokal) erlebten Thomas Tuchel und Joo-Ho Park in der Saison 2013/14 gemeinsam. Finden Trainer und Spieler jetzt wieder zusammen? Sky berichtet, dass Borussia Dortmund über eine Verpflichtung des Linksverteidigers noch in dieser Transferperiode nachdenkt. Fakt ist, dass der Bundesliga-Tabellenführer auf dieser Abwehrposition dünn besetzt ist. Hinter dem derzeit famos aufspielenden Marcel Schmelzer fehlen die Alternativen. Erik Durm pausiert seit mittlerweile einem Monat mit nicht näher definierten "Knieproblemen". Seine Rückkehr: ungewiss. Jeremy Dudziak, der erst im Frühjahr einen Profivertrag bis 2018 signierte, hat sich unter Tuchel (zumal in einer offensiveren Rolle) bisher nicht empfehlen können. Zuletzt durfte er am 1. August 45 Minuten im Test gegen Betis Sevilla (2:0) mitwirken. Beseitigt, wie seit heute spekuliert wird, nun Park den Engpass auf der linken Seite? Dafür spricht, dass Tuchel den Südkoreaner in seiner letzten Saison als Mainzer Trainer schätzen gelernt hat. Park kam 2013 für 500.000 Euro vom FC Basel an den Bruchweg - und wurde unter Tuchel gleich Stammspieler. Bisher 44-mal spielte Park in der Bundesliga (ein Tor, drei Assists), zuletzt am Sonntag beim 2:1-Sieg in Mönchengladbach. Mit einer Passquote von 92,1 Prozent erzielte Park den Bestwert in seiner Mannschaft. Ähnlich dünn ist Borussia rechts hinten besetzt: Ohne Lukasz Piszczek (Hüftverletzung) und Durm musste sich Tuchel zuletzt mit Notlösungen behelfen: Was mit Gonzalo Castro bei Odds BK (4:3) überhaupt nicht funktionierte, führte bei Matthias Ginter in Ingolstadt (4:0) zu der Erkenntnis, dass er eine seriöse Alternative auf dieser Position ist. Links jedoch gähnt hinter Schmelzer ein Loch.
2023-11-05T01:27:04.277712
https://example.com/article/2750
Entries in Jordan (67) Feeds came back right after 9pm and we pretty quickly figured out what was up. Adam nominated Porsche and Jordan - which didn't really matter as you will see. Some time today they did the Power of Veto competition - all we know about it is that it WASN'T an endurance competition. We also know Porsche won it. That means Porsche will use it on Thursday's live show and Rachel will go up in her place. As of this writing Porsche has implied to Adam that she will be voting out Jordan. Flash Back to 9:52pm on Wednesday night if you want to hear it. And there you have it, tomorrow night the final three will begin the last HoH competition with part one of three - the endurance portion. I'd say if it is indeed Rachel joining Porsche and Adam it should be a pretty good one. I think Porsche, if she were wise, would want to go up against Adam and not Rachel in the final two. Then again if she were REALLY wise she would vote out Rachel tomorrow night but I don't think that will be the case. Greetings one and all - unless you ONLY come to Big Brother Gossip for your Big Brother news you most likely already know that the word on the street is Kalia was indeed voted out on tonight's taped eviction show and Adam won the HoH competition beating out Jordan by one question. The news was broadcast to the twitter universe as I expect it would be and I trust the source I am quoting (MissCleoBB13). Here are a few other tidbits from that source and one other....... Kalia apparently told Adam to start playing like an all star and not a fan in her eviction speech <POW!> Adam was 6 for 6 in the questions - Jordan 5 for 6. The questions were indeed based on the Fortune Tellers quotes. Julie wore a "leopard one piece dress" on the show. Shelly entering the Jury House was shown and things were very uncomfortable. Rachel left a nasty goodbye message to Kalia and her jaw dropped. She called her a cow. Kalia was not happy. Now that we know Adam has won, the question is, what will he do? His nominations really mean nothing as the real holder of power this "week" (ok its only 2 days) is the Power of Veto winner who will both get to decide who is nominated and cast the one vote to evict (Unless Adam also wins the POV). In all likelyhood I THINK Porsche needs to win the POV to stay - but some feel if he wins it, Adam will want Rachel evicted. Adam has been closer to Porsche than Rachel but I don't think he wants the blood on his hands and so may either throw the POV competition or if he wins it he might evict Porsche by letting Jordan or Rachel cast the vote to evict. The feeds have been off since 2pm and at the very least will stay off until after the show airs on Wednesday - when they return we may find out who the POV winner is - unless it hasn't been played yet. Saturday we had the Power of Veto competition, Kalia and Porsche were nominated for eviction by Rachel and both would of course want to win it to ensure them safety. While we haven't seen the POV competition and won't until Wednesday's show, we know what it was and we know who won. The competition was the same one that has been done for several seasons involving the 'god' or 'idol' OTEV (veto backwards). Below is the OTEV competition from last season. Notice it is a very physical competition This time the house guests have described finding things in pies - or perhaps in one big pie. Adam ended up winning the POV and it sounds like Porsche was second. As of now Adam has no plans to use the POV which if he did would force Rachel to put up Jordan in the place of whomever he saved. Kalia has been campaigning VERY hard to stay already but I don't think it will work. Adam probably can't win against Jordan or Rachel but he seems to have convinced himself that that is the best route for him to take. One of us will make another post soon about the upcoming week - with only 4 shows left (including tonight's), Big Brother has to pick up the pace - we will see an eviction on both Wednesday and Thursday's shows. Yes, there was a Pandora's Box. The HGs were told to dress up for some reason and then the feeds cut to trivia. When they came back on we found out the following... If Rachel is telling the truth, she was presented a Pandora's Box and could see Tori Spelling in a video. She opened it (of course) and ended up being locked with Jesse from Big Brother 10 & 11 for some period of time while Tori Spelling hung out with the other HGs and they had a 'shopping spree' where they had 3 minutes to grab as many items of clothing as they could from some type of set up in the backyard. As far as I know Rachel didn't get any money but since she is the only one that knows for certain what went on we won't know until it is shown on TV (for example I don't think anyone but Kalia and Porsche knows Kalia got $5k with Porsche's Pandora's Box). The other thing to happen today was nominations. In a SHOCKING move Rachel decided to nominate......... Porsche and Kalia. Ok it wasn't shocking at all. Rachel's target appears to be Kalia. Of course if either Porsche or Kalia win the POV tomorrow, Adam will have to go up in their place. If Adam wins it he probably will not use it because it would mean Rachel would have to put up Jordana and I just can't see him doing that.
2023-08-30T01:27:04.277712
https://example.com/article/3194
Mr Kimbob Korean Restaurant I was at SM Masinag last Monday to buy our 5th rice cooker in 8 years of marriage. The previous 4 rice cookers were all wedding gifts. They only had an average useful life of 2 years. Either I don't know how to cook rice or the cookers were of low quality. We went to the foodcourt to eat breakfast. My usual choice is Bodhi Vegetarian Restaurant. But when I saw a group of Koreans lining up at Mr Kimbob, I decided to try this Korean Health Food Restaurant. The prices of the food in their menu are very affordable. I am not familiar with Korean food. I ordered the same meal the Koreans ordered. Well, they know better! I ordered bibimbob. I started eating it like the way you would eat a tapsilog. Then I noticed the instruction written on the paper wrapped around the sizzling plate on how to eat it. ;p The serving is generous. If I remember it right, this meal only costs P99 ($2). I love the taste especially the beef. You can actually choose if you want beef, chicken or pork. I like this so much I'm craving as I write this blog.
2024-02-20T01:27:04.277712
https://example.com/article/4076
import {MutationObserverFactory} from '@angular/cdk/observers'; import {dispatchFakeEvent} from '@angular/cdk/testing/private'; import {Component} from '@angular/core'; import { ComponentFixture, fakeAsync, flush, flushMicrotasks, TestBed, tick, inject, } from '@angular/core/testing'; import {FormControl, FormsModule, NgModel, ReactiveFormsModule} from '@angular/forms'; import {By} from '@angular/platform-browser'; import {FocusMonitor} from '@angular/cdk/a11y'; import {MatSlideToggle, MatSlideToggleChange, MatSlideToggleModule} from './index'; import {MAT_SLIDE_TOGGLE_DEFAULT_OPTIONS} from './slide-toggle-config'; describe('MatSlideToggle without forms', () => { let mutationObserverCallbacks: Function[]; let flushMutationObserver = () => mutationObserverCallbacks.forEach(callback => callback()); beforeEach(fakeAsync(() => { mutationObserverCallbacks = []; TestBed.configureTestingModule({ imports: [MatSlideToggleModule], declarations: [ SlideToggleBasic, SlideToggleWithTabindexAttr, SlideToggleWithoutLabel, SlideToggleProjectedLabel, TextBindingComponent, SlideToggleWithStaticAriaAttributes, ], providers: [ { provide: MutationObserverFactory, useValue: { create: (callback: Function) => { mutationObserverCallbacks.push(callback); return {observe: () => {}, disconnect: () => {}}; } } } ] }); TestBed.compileComponents(); })); describe('basic behavior', () => { let fixture: ComponentFixture<any>; let testComponent: SlideToggleBasic; let slideToggle: MatSlideToggle; let slideToggleElement: HTMLElement; let labelElement: HTMLLabelElement; let inputElement: HTMLInputElement; beforeEach(fakeAsync(() => { fixture = TestBed.createComponent(SlideToggleBasic); // Enable jasmine spies on event functions, which may trigger at initialization // of the slide-toggle component. spyOn(fixture.debugElement.componentInstance, 'onSlideChange').and.callThrough(); spyOn(fixture.debugElement.componentInstance, 'onSlideClick').and.callThrough(); // Initialize the slide-toggle component, by triggering the first change detection cycle. fixture.detectChanges(); const slideToggleDebug = fixture.debugElement.query(By.css('mat-slide-toggle'))!; testComponent = fixture.debugElement.componentInstance; slideToggle = slideToggleDebug.componentInstance; slideToggleElement = slideToggleDebug.nativeElement; inputElement = fixture.debugElement.query(By.css('input'))!.nativeElement; labelElement = fixture.debugElement.query(By.css('label'))!.nativeElement; })); it('should apply class based on color attribute', () => { testComponent.slideColor = 'primary'; fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-primary'); testComponent.slideColor = 'accent'; fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-accent'); }); it('should correctly update the disabled property', () => { expect(inputElement.disabled).toBeFalsy(); testComponent.isDisabled = true; fixture.detectChanges(); expect(inputElement.disabled).toBeTruthy(); }); it('should correctly update the checked property', () => { expect(slideToggle.checked).toBeFalsy(); expect(inputElement.getAttribute('aria-checked')).toBe('false'); testComponent.slideChecked = true; fixture.detectChanges(); expect(inputElement.checked).toBeTruthy(); expect(inputElement.getAttribute('aria-checked')).toBe('true'); }); it('should set the toggle to checked on click', () => { expect(slideToggle.checked).toBe(false); expect(inputElement.getAttribute('aria-checked')).toBe('false'); expect(slideToggleElement.classList).not.toContain('mat-checked'); labelElement.click(); fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-checked'); expect(slideToggle.checked).toBe(true); expect(inputElement.getAttribute('aria-checked')).toBe('true'); }); it('should not trigger the click event multiple times', () => { // By default, when clicking on a label element, a generated click will be dispatched // on the associated input element. // Since we're using a label element and a visual hidden input, this behavior can led // to an issue, where the click events on the slide-toggle are getting executed twice. expect(slideToggle.checked).toBe(false); expect(slideToggleElement.classList).not.toContain('mat-checked'); labelElement.click(); fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-checked'); expect(slideToggle.checked).toBe(true); expect(testComponent.onSlideClick).toHaveBeenCalledTimes(1); }); it('should trigger the change event properly', () => { expect(inputElement.checked).toBe(false); expect(slideToggleElement.classList).not.toContain('mat-checked'); labelElement.click(); fixture.detectChanges(); expect(inputElement.checked).toBe(true); expect(slideToggleElement.classList).toContain('mat-checked'); expect(testComponent.onSlideChange).toHaveBeenCalledTimes(1); }); it('should not trigger the change event by changing the native value', fakeAsync(() => { expect(inputElement.checked).toBe(false); expect(slideToggleElement.classList).not.toContain('mat-checked'); testComponent.slideChecked = true; fixture.detectChanges(); expect(inputElement.checked).toBe(true); expect(slideToggleElement.classList).toContain('mat-checked'); tick(); expect(testComponent.onSlideChange).not.toHaveBeenCalled(); })); it('should not trigger the change event on initialization', fakeAsync(() => { expect(inputElement.checked).toBe(false); expect(slideToggleElement.classList).not.toContain('mat-checked'); testComponent.slideChecked = true; fixture.detectChanges(); expect(inputElement.checked).toBe(true); expect(slideToggleElement.classList).toContain('mat-checked'); tick(); expect(testComponent.onSlideChange).not.toHaveBeenCalled(); })); it('should add a suffix to the inputs id', () => { testComponent.slideId = 'myId'; fixture.detectChanges(); expect(slideToggleElement.id).toBe('myId'); expect(inputElement.id).toBe(`${slideToggleElement.id}-input`); testComponent.slideId = 'nextId'; fixture.detectChanges(); expect(slideToggleElement.id).toBe('nextId'); expect(inputElement.id).toBe(`${slideToggleElement.id}-input`); testComponent.slideId = null; fixture.detectChanges(); // Once the id binding is set to null, the id property should auto-generate a unique id. expect(inputElement.id).toMatch(/mat-slide-toggle-\d+-input/); }); it('should forward the tabIndex to the underlying input', () => { fixture.detectChanges(); expect(inputElement.tabIndex).toBe(0); testComponent.slideTabindex = 4; fixture.detectChanges(); expect(inputElement.tabIndex).toBe(4); }); it('should forward the specified name to the input', () => { testComponent.slideName = 'myName'; fixture.detectChanges(); expect(inputElement.name).toBe('myName'); testComponent.slideName = 'nextName'; fixture.detectChanges(); expect(inputElement.name).toBe('nextName'); testComponent.slideName = null; fixture.detectChanges(); expect(inputElement.name).toBe(''); }); it('should forward the aria-label attribute to the input', () => { testComponent.slideLabel = 'ariaLabel'; fixture.detectChanges(); expect(inputElement.getAttribute('aria-label')).toBe('ariaLabel'); testComponent.slideLabel = null; fixture.detectChanges(); expect(inputElement.hasAttribute('aria-label')).toBeFalsy(); }); it('should forward the aria-labelledby attribute to the input', () => { testComponent.slideLabelledBy = 'ariaLabelledBy'; fixture.detectChanges(); expect(inputElement.getAttribute('aria-labelledby')).toBe('ariaLabelledBy'); testComponent.slideLabelledBy = null; fixture.detectChanges(); expect(inputElement.hasAttribute('aria-labelledby')).toBeFalsy(); }); it('should set the `for` attribute to the id of the input element', () => { expect(labelElement.getAttribute('for')).toBeTruthy(); expect(inputElement.getAttribute('id')).toBeTruthy(); expect(labelElement.getAttribute('for')).toBe(inputElement.getAttribute('id')); }); it('should emit the new values properly', fakeAsync(() => { labelElement.click(); fixture.detectChanges(); tick(); // We're checking the arguments type / emitted value to be a boolean, because sometimes the // emitted value can be a DOM Event, which is not valid. // See angular/angular#4059 expect(testComponent.lastEvent.checked).toBe(true); })); it('should support subscription on the change observable', fakeAsync(() => { const spy = jasmine.createSpy('change spy'); const subscription = slideToggle.change.subscribe(spy); labelElement.click(); fixture.detectChanges(); tick(); expect(spy).toHaveBeenCalledWith(jasmine.objectContaining({checked: true})); subscription.unsubscribe(); })); it('should forward the required attribute', () => { testComponent.isRequired = true; fixture.detectChanges(); expect(inputElement.required).toBe(true); testComponent.isRequired = false; fixture.detectChanges(); expect(inputElement.required).toBe(false); }); it('should focus on underlying input element when focus() is called', () => { expect(document.activeElement).not.toBe(inputElement); slideToggle.focus(); fixture.detectChanges(); expect(document.activeElement).toBe(inputElement); }); it('should focus on underlying input element when the host is focused', () => { expect(document.activeElement).not.toBe(inputElement); slideToggleElement.focus(); fixture.detectChanges(); expect(document.activeElement).toBe(inputElement); }); it('should not manually move focus to underlying input when focus comes from mouse or touch', inject([FocusMonitor], (focusMonitor: FocusMonitor) => { expect(document.activeElement).not.toBe(inputElement); focusMonitor.focusVia(slideToggleElement, 'mouse'); fixture.detectChanges(); expect(document.activeElement).not.toBe(inputElement); focusMonitor.focusVia(slideToggleElement, 'touch'); fixture.detectChanges(); expect(document.activeElement).not.toBe(inputElement); })); it('should set a element class if labelPosition is set to before', () => { expect(slideToggleElement.classList).not.toContain('mat-slide-toggle-label-before'); testComponent.labelPosition = 'before'; fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-slide-toggle-label-before'); }); it('should show ripples on label mousedown', () => { const rippleSelector = '.mat-ripple-element:not(.mat-slide-toggle-persistent-ripple)'; expect(slideToggleElement.querySelectorAll(rippleSelector).length).toBe(0); dispatchFakeEvent(labelElement, 'mousedown'); dispatchFakeEvent(labelElement, 'mouseup'); expect(slideToggleElement.querySelectorAll(rippleSelector).length).toBe(1); }); it('should not show ripples when disableRipple is set', () => { const rippleSelector = '.mat-ripple-element:not(.mat-slide-toggle-persistent-ripple)'; testComponent.disableRipple = true; fixture.detectChanges(); expect(slideToggleElement.querySelectorAll(rippleSelector).length).toBe(0); dispatchFakeEvent(labelElement, 'mousedown'); dispatchFakeEvent(labelElement, 'mouseup'); expect(slideToggleElement.querySelectorAll(rippleSelector).length).toBe(0); }); it('should have a focus indicator', () => { const slideToggleRippleNativeElement = slideToggleElement.querySelector('.mat-slide-toggle-ripple')!; expect(slideToggleRippleNativeElement.classList.contains('mat-focus-indicator')).toBe(true); }); }); describe('custom template', () => { it('should not trigger the change event on initialization', fakeAsync(() => { const fixture = TestBed.createComponent(SlideToggleBasic); fixture.componentInstance.slideChecked = true; fixture.detectChanges(); expect(fixture.componentInstance.lastEvent).toBeFalsy(); })); it('should be able to set the tabindex via the native attribute', fakeAsync(() => { const fixture = TestBed.createComponent(SlideToggleWithTabindexAttr); fixture.detectChanges(); const slideToggle = fixture.debugElement .query(By.directive(MatSlideToggle))!.componentInstance as MatSlideToggle; expect(slideToggle.tabIndex) .toBe(5, 'Expected tabIndex property to have been set based on the native attribute'); })); it('should set the tabindex of the host element to -1', fakeAsync(() => { const fixture = TestBed.createComponent(SlideToggleWithTabindexAttr); fixture.detectChanges(); const slideToggle = fixture.debugElement.query(By.directive(MatSlideToggle))!.nativeElement; expect(slideToggle.getAttribute('tabindex')).toBe('-1'); })); it('should remove the tabindex from the host element when disabled', fakeAsync(() => { const fixture = TestBed.createComponent(SlideToggleWithTabindexAttr); fixture.componentInstance.disabled = true; fixture.detectChanges(); const slideToggle = fixture.debugElement.query(By.directive(MatSlideToggle))!.nativeElement; expect(slideToggle.hasAttribute('tabindex')).toBe(false); })); }); describe('custom action configuration', () => { it('should not change value on click when click action is noop', () => { TestBed .resetTestingModule() .configureTestingModule({ imports: [MatSlideToggleModule], declarations: [SlideToggleBasic], providers: [ {provide: MAT_SLIDE_TOGGLE_DEFAULT_OPTIONS, useValue: {disableToggleValue: true}}, ] }); const fixture = TestBed.createComponent(SlideToggleBasic); fixture.detectChanges(); const testComponent = fixture.debugElement.componentInstance; const slideToggleDebug = fixture.debugElement.query(By.css('mat-slide-toggle'))!; const slideToggle = slideToggleDebug.componentInstance; const inputElement = fixture.debugElement.query(By.css('input'))!.nativeElement; const labelElement = fixture.debugElement.query(By.css('label'))!.nativeElement; expect(testComponent.toggleTriggered).toBe(0); expect(testComponent.dragTriggered).toBe(0); expect(slideToggle.checked).toBe(false, 'Expect slide toggle value not changed'); labelElement.click(); fixture.detectChanges(); expect(slideToggle.checked).toBe(false, 'Expect slide toggle value not changed'); expect(testComponent.toggleTriggered).toBe(1, 'Expect toggle once'); expect(testComponent.dragTriggered).toBe(0); inputElement.click(); fixture.detectChanges(); expect(slideToggle.checked).toBe(false, 'Expect slide toggle value not changed'); expect(testComponent.toggleTriggered).toBe(2, 'Expect toggle twice'); expect(testComponent.dragTriggered).toBe(0); }); }); describe('without label', () => { let fixture: ComponentFixture<SlideToggleWithoutLabel>; let testComponent: SlideToggleWithoutLabel; let slideToggleBarElement: HTMLElement; beforeEach(() => { fixture = TestBed.createComponent(SlideToggleWithoutLabel); const slideToggleDebugEl = fixture.debugElement.query(By.directive(MatSlideToggle))!; testComponent = fixture.componentInstance; slideToggleBarElement = slideToggleDebugEl .query(By.css('.mat-slide-toggle-bar'))!.nativeElement; }); it('should remove margin for slide-toggle without a label', () => { fixture.detectChanges(); expect(slideToggleBarElement.classList) .toContain('mat-slide-toggle-bar-no-side-margin'); }); it('should not remove margin if initial label is set through binding', fakeAsync(() => { testComponent.label = 'Some content'; fixture.detectChanges(); expect(slideToggleBarElement.classList) .not.toContain('mat-slide-toggle-bar-no-side-margin'); })); it('should re-add margin if label is added asynchronously', fakeAsync(() => { fixture.detectChanges(); expect(slideToggleBarElement.classList) .toContain('mat-slide-toggle-bar-no-side-margin'); testComponent.label = 'Some content'; fixture.detectChanges(); flushMutationObserver(); fixture.detectChanges(); expect(slideToggleBarElement.classList) .not.toContain('mat-slide-toggle-bar-no-side-margin'); })); }); describe('label margin', () => { let fixture: ComponentFixture<SlideToggleProjectedLabel>; let slideToggleBarElement: HTMLElement; beforeEach(() => { fixture = TestBed.createComponent(SlideToggleProjectedLabel); slideToggleBarElement = fixture.debugElement .query(By.css('.mat-slide-toggle-bar'))!.nativeElement; fixture.detectChanges(); }); it('should properly update margin if label content is projected', () => { // Do not run the change detection for the fixture manually because we want to verify // that the slide-toggle properly toggles the margin class even if the observe content // output fires outside of the zone. flushMutationObserver(); expect(slideToggleBarElement.classList).not .toContain('mat-slide-toggle-bar-no-side-margin'); }); }); it('should clear static aria attributes from the host node', () => { const fixture = TestBed.createComponent(SlideToggleWithStaticAriaAttributes); fixture.detectChanges(); const host: HTMLElement = fixture.nativeElement.querySelector('mat-slide-toggle'); expect(host.hasAttribute('aria-label')).toBe(false); expect(host.hasAttribute('aria-labelledby')).toBe(false); }); }); describe('MatSlideToggle with forms', () => { beforeEach(fakeAsync(() => { TestBed.configureTestingModule({ imports: [MatSlideToggleModule, FormsModule, ReactiveFormsModule], declarations: [ SlideToggleWithForm, SlideToggleWithModel, SlideToggleWithFormControl, SlideToggleWithModelAndChangeEvent, ] }); TestBed.compileComponents(); })); describe('using ngModel', () => { let fixture: ComponentFixture<SlideToggleWithModel>; let testComponent: SlideToggleWithModel; let slideToggle: MatSlideToggle; let slideToggleElement: HTMLElement; let slideToggleModel: NgModel; let inputElement: HTMLInputElement; let labelElement: HTMLLabelElement; // This initialization is async() because it needs to wait for ngModel to set the initial value. beforeEach(fakeAsync(() => { fixture = TestBed.createComponent(SlideToggleWithModel); fixture.detectChanges(); const slideToggleDebug = fixture.debugElement.query(By.directive(MatSlideToggle))!; testComponent = fixture.debugElement.componentInstance; slideToggle = slideToggleDebug.componentInstance; slideToggleElement = slideToggleDebug.nativeElement; slideToggleModel = slideToggleDebug.injector.get<NgModel>(NgModel); inputElement = fixture.debugElement.query(By.css('input'))!.nativeElement; labelElement = fixture.debugElement.query(By.css('label'))!.nativeElement; })); it('should be initially set to ng-pristine', () => { expect(slideToggleElement.classList).toContain('ng-pristine'); expect(slideToggleElement.classList).not.toContain('ng-dirty'); }); it('should update the model programmatically', fakeAsync(() => { expect(slideToggleElement.classList).not.toContain('mat-checked'); testComponent.modelValue = true; fixture.detectChanges(); // Flush the microtasks because the forms module updates the model state asynchronously. flushMicrotasks(); fixture.detectChanges(); expect(slideToggleElement.classList).toContain('mat-checked'); })); it('should have the correct control state initially and after interaction', fakeAsync(() => { // The control should start off valid, pristine, and untouched. expect(slideToggleModel.valid).toBe(true); expect(slideToggleModel.pristine).toBe(true); expect(slideToggleModel.touched).toBe(false); // After changing the value from the view, the control should // become dirty (not pristine), but remain untouched if focus is still there. slideToggle.checked = true; // Dispatch a change event on the input element to fake a user interaction that triggered // the state change. dispatchFakeEvent(inputElement, 'change'); expect(slideToggleModel.valid).toBe(true); expect(slideToggleModel.pristine).toBe(false); expect(slideToggleModel.touched).toBe(false); // Once the input element loses focus, the control should remain dirty but should // also turn touched. dispatchFakeEvent(inputElement, 'blur'); fixture.detectChanges(); flushMicrotasks(); expect(slideToggleModel.valid).toBe(true); expect(slideToggleModel.pristine).toBe(false); expect(slideToggleModel.touched).toBe(true); })); it('should not throw an error when disabling while focused', fakeAsync(() => { expect(() => { // Focus the input element because after disabling, the `blur` event should automatically // fire and not result in a changed after checked exception. Related: #12323 inputElement.focus(); // Flush the two nested timeouts from the FocusMonitor that are being created on `focus`. flush(); slideToggle.disabled = true; fixture.detectChanges(); flushMicrotasks(); }).not.toThrow(); })); it('should not set the control to touched when changing the state programmatically', fakeAsync(() => { // The control should start off with being untouched. expect(slideToggleModel.touched).toBe(false); slideToggle.checked = true; fixture.detectChanges(); expect(slideToggleModel.touched).toBe(false); expect(slideToggleElement.classList).toContain('mat-checked'); // Once the input element loses focus, the control should remain dirty but should // also turn touched. dispatchFakeEvent(inputElement, 'blur'); fixture.detectChanges(); flushMicrotasks(); expect(slideToggleModel.touched).toBe(true); expect(slideToggleElement.classList).toContain('mat-checked'); })); it('should not set the control to touched when changing the model', fakeAsync(() => { // The control should start off with being untouched. expect(slideToggleModel.touched).toBe(false); testComponent.modelValue = true; fixture.detectChanges(); // Flush the microtasks because the forms module updates the model state asynchronously. flushMicrotasks(); // The checked property has been updated from the model and now the view needs // to reflect the state change. fixture.detectChanges(); expect(slideToggleModel.touched).toBe(false); expect(slideToggle.checked).toBe(true); expect(slideToggleElement.classList).toContain('mat-checked'); })); it('should update checked state on click if control is checked initially', fakeAsync(() => { fixture = TestBed.createComponent(SlideToggleWithModel); slideToggle = fixture.debugElement.query(By.directive(MatSlideToggle))!.componentInstance; labelElement = fixture.debugElement.query(By.css('label'))!.nativeElement; fixture.componentInstance.modelValue = true; fixture.detectChanges(); // Flush the microtasks because the forms module updates the model state asynchronously. flushMicrotasks(); // Now the new checked variable has been updated in the slide-toggle and the slide-toggle // is marked for check because it still needs to update the underlying input. fixture.detectChanges(); expect(slideToggle.checked) .toBe(true, 'Expected slide-toggle to be checked initially'); labelElement.click(); fixture.detectChanges(); tick(); expect(slideToggle.checked) .toBe(false, 'Expected slide-toggle to be no longer checked after label click.'); })); it('should be pristine if initial value is set from NgModel', fakeAsync(() => { fixture = TestBed.createComponent(SlideToggleWithModel); fixture.componentInstance.modelValue = true; fixture.detectChanges(); const debugElement = fixture.debugElement.query(By.directive(MatSlideToggle))!; const modelInstance = debugElement.injector.get<NgModel>(NgModel); // Flush the microtasks because the forms module updates the model state asynchronously. flushMicrotasks(); expect(modelInstance.pristine).toBe(true); })); it('should set the model value when toggling via the `toggle` method', fakeAsync(() => { expect(testComponent.modelValue).toBe(false); fixture.debugElement.query(By.directive(MatSlideToggle))!.componentInstance.toggle(); fixture.detectChanges(); flushMicrotasks(); fixture.detectChanges(); expect(testComponent.modelValue).toBe(true); })); }); describe('with a FormControl', () => { let fixture: ComponentFixture<SlideToggleWithFormControl>; let testComponent: SlideToggleWithFormControl; let slideToggle: MatSlideToggle; let inputElement: HTMLInputElement; beforeEach(() => { fixture = TestBed.createComponent(SlideToggleWithFormControl); fixture.detectChanges(); testComponent = fixture.debugElement.componentInstance; slideToggle = fixture.debugElement.query(By.directive(MatSlideToggle))!.componentInstance; inputElement = fixture.debugElement.query(By.css('input'))!.nativeElement; }); it('should toggle the disabled state', () => { expect(slideToggle.disabled).toBe(false); expect(inputElement.disabled).toBe(false); testComponent.formControl.disable(); fixture.detectChanges(); expect(slideToggle.disabled).toBe(true); expect(inputElement.disabled).toBe(true); testComponent.formControl.enable(); fixture.detectChanges(); expect(slideToggle.disabled).toBe(false); expect(inputElement.disabled).toBe(false); }); }); describe('with form element', () => { let fixture: ComponentFixture<any>; let testComponent: SlideToggleWithForm; let buttonElement: HTMLButtonElement; let inputElement: HTMLInputElement; // This initialization is async() because it needs to wait for ngModel to set the initial value. beforeEach(fakeAsync(() => { fixture = TestBed.createComponent(SlideToggleWithForm); fixture.detectChanges(); testComponent = fixture.debugElement.componentInstance; buttonElement = fixture.debugElement.query(By.css('button'))!.nativeElement; inputElement = fixture.debugElement.query(By.css('input'))!.nativeElement; })); it('should prevent the form from submit when being required', () => { if (typeof (inputElement as any).reportValidity === 'undefined') { // If the browser does not report the validity then the tests will break. // e.g Safari 8 on Mobile. return; } testComponent.isRequired = true; fixture.detectChanges(); buttonElement.click(); fixture.detectChanges(); expect(testComponent.isSubmitted).toBe(false); testComponent.isRequired = false; fixture.detectChanges(); buttonElement.click(); fixture.detectChanges(); expect(testComponent.isSubmitted).toBe(true); }); it('should have proper invalid state if unchecked', () => { testComponent.isRequired = true; fixture.detectChanges(); const slideToggleEl = fixture.nativeElement.querySelector('.mat-slide-toggle'); expect(slideToggleEl.classList).toContain('ng-invalid'); expect(slideToggleEl.classList).not.toContain('ng-valid'); // The required slide-toggle will be checked and the form control // should become valid. inputElement.click(); fixture.detectChanges(); expect(slideToggleEl.classList).not.toContain('ng-invalid'); expect(slideToggleEl.classList).toContain('ng-valid'); // The required slide-toggle will be unchecked and the form control // should become invalid. inputElement.click(); fixture.detectChanges(); expect(slideToggleEl.classList).toContain('ng-invalid'); expect(slideToggleEl.classList).not.toContain('ng-valid'); }); }); describe('with model and change event', () => { it('should report changes to NgModel before emitting change event', () => { const fixture = TestBed.createComponent(SlideToggleWithModelAndChangeEvent); fixture.detectChanges(); const labelEl = fixture.debugElement.query(By.css('label'))!.nativeElement; spyOn(fixture.componentInstance, 'onChange').and.callFake(() => { expect(fixture.componentInstance.checked) .toBe(true, 'Expected the model value to have changed before the change event fired.'); }); labelEl.click(); expect(fixture.componentInstance.onChange).toHaveBeenCalledTimes(1); }); }); }); @Component({ template: ` <mat-slide-toggle [required]="isRequired" [disabled]="isDisabled" [color]="slideColor" [id]="slideId" [checked]="slideChecked" [name]="slideName" [aria-label]="slideLabel" [aria-labelledby]="slideLabelledBy" [tabIndex]="slideTabindex" [labelPosition]="labelPosition" [disableRipple]="disableRipple" (toggleChange)="onSlideToggleChange()" (dragChange)="onSlideDragChange()" (change)="onSlideChange($event)" (click)="onSlideClick($event)"> <span>Test Slide Toggle</span> </mat-slide-toggle>`, }) class SlideToggleBasic { isDisabled: boolean = false; isRequired: boolean = false; disableRipple: boolean = false; slideChecked: boolean = false; slideColor: string; slideId: string | null; slideName: string | null; slideLabel: string | null; slideLabelledBy: string | null; slideTabindex: number; lastEvent: MatSlideToggleChange; labelPosition: string; toggleTriggered: number = 0; dragTriggered: number = 0; onSlideClick: (event?: Event) => void = () => {}; onSlideChange = (event: MatSlideToggleChange) => this.lastEvent = event; onSlideToggleChange = () => this.toggleTriggered++; onSlideDragChange = () => this.dragTriggered++; } @Component({ template: ` <form ngNativeValidate (ngSubmit)="isSubmitted = true"> <mat-slide-toggle name="slide" ngModel [required]="isRequired">Required</mat-slide-toggle> <button type="submit"></button> </form>` }) class SlideToggleWithForm { isSubmitted: boolean = false; isRequired: boolean = false; } @Component({ template: `<mat-slide-toggle [(ngModel)]="modelValue"></mat-slide-toggle>` }) class SlideToggleWithModel { modelValue = false; } @Component({ template: ` <mat-slide-toggle [formControl]="formControl"> <span>Test Slide Toggle</span> </mat-slide-toggle>`, }) class SlideToggleWithFormControl { formControl = new FormControl(); } @Component({template: `<mat-slide-toggle tabindex="5" [disabled]="disabled"></mat-slide-toggle>`}) class SlideToggleWithTabindexAttr { disabled = false; } @Component({ template: `<mat-slide-toggle>{{label}}</mat-slide-toggle>` }) class SlideToggleWithoutLabel { label: string; } @Component({ template: `<mat-slide-toggle [(ngModel)]="checked" (change)="onChange()"></mat-slide-toggle>` }) class SlideToggleWithModelAndChangeEvent { checked: boolean; onChange: () => void = () => {}; } @Component({ template: `<mat-slide-toggle><some-text></some-text></mat-slide-toggle>` }) class SlideToggleProjectedLabel {} @Component({ selector: 'some-text', template: `<span>{{text}}</span>` }) class TextBindingComponent { text: string = 'Some text'; } @Component({ template: ` <mat-slide-toggle aria-label="Slide toggle" aria-labelledby="something"></mat-slide-toggle> ` }) class SlideToggleWithStaticAriaAttributes {}
2024-01-05T01:27:04.277712
https://example.com/article/2465
/* Copyright 2009-(CURRENT YEAR) Igor Polevoy Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package org.javalite.activeweb.annotations; import java.lang.annotation.ElementType; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; /** * Mark an action of a controller with this annotation to receive an HTTP OPTIONS request. * * @author Igor Polevoy */ @Retention(RetentionPolicy.RUNTIME) @Target(ElementType.METHOD) public @interface OPTIONS {}
2024-05-03T01:27:04.277712
https://example.com/article/3228
Introduction {#sec1-1} ============ Case-Control study design is a type of observational study design. In an observational study, the investigator does not alter the exposure status. The investigator measures the exposure and outcome in study participants, and studies their association. Design {#sec1-2} ====== In a case-control study, participants are selected for the study based on their outcome status. Thus, some participants have the outcome of interest (referred to as cases), whereas others do not have the outcome of interest (referred to as controls). The investigator then assesses the exposure in both these groups. Thus, by design, in a case-control study the outcome has to occur in some of the participants that have been included in the study. As seen in [Figure 1](#F1){ref-type="fig"}, at the time of entry into the study (sampling of participants), some of the study participants have the outcome (cases) and others do not have the outcome (controls). During the study procedures, we will examine the exposure of interest in cases as well as controls. We will then study the association between the exposure and outcome in these study participants. ![Example of a case-control study](IJD-61-146-g001){#F1} Examples of Case-Control Studies {#sec1-3} ================================ {#sec2-1} ### Smoking and lung cancer study {#sec3-1} In their landmark study, Doll and Hill (1950) evaluated the association between smoking and lung cancer. They included 709 patients of lung carcinoma (defined as cases). They also included 709 controls from general medical and surgical patients. The selected controls were similar to the cases with respect to age and sex. Thus, they included 649 males and 60 females in cases as well as controls. They found that only 0.3% of males were non-smokers among cases. However, the proportion of non-smokers among controls was 4.2%; the different was statistically significant (*P* = 0.00000064). Similarly they found that about 31.7% of the female were non-smokers in cases compared with 53.3% in controls; this difference was also statistically significant (0.01\< *p* \<0.02). ### Melanoma and tanning (Lazovic *et al*., 2010) {#sec3-2} The authors conducted a case-control study to study the association between melanoma and tanning. The 1167 cases - individuals with invasive cutaneous melanoma -- were selected from Minnesota Cancer Surveillance System. The 1101 controls were selected randomly from Minnesota State Driver\'s License list; they were matched for age (+/- 5 years) and sex. The data were collected by self administered questionnaires and telephone interviews. The investigators assessed the use of tanning devices (using photographs), number of years, and frequency of use of these devices. They also collected information on other variables (such as sun exposure; presence of freckles and moles; and colour of skin, hair, among other exposures. They found that melanoma was higher in individuals who used UVB enhances and primarily UVA-emitting devices. The risk of melanoma also increased with increase in years of use, hours of use, and sessions. ### Risk factors for erysipelas (Pitché et al, 2015) {#sec3-3} Pitché *et al* (2015) conducted a case-control study to assess the factors associated with leg erysipelas in sub-Saharan Africa. This was a multi-centre study; the cases and controls were recruited from eight countries in sub-Saharan Africa. They recruited cases of acute leg cellulitis in these eight countries. They recruited two controls for each case; these were matched for age (+/- 5 years) and sex. Thus, the final study has 364 cases and 728 controls. They found that leg erysipelas was associated with obesity, lympoedema, neglected traumatic wound, toe-web intertrigo, and voluntary cosmetic depigmentation. We have provided details of all the three studies in the bibliography. We strongly encourage the readers to read the papers to understand some practical aspects of case-control studies. Selection of Cases and Controls {#sec1-4} =============================== Selection of cases and controls is an important part of this design. Wacholder and colleagues (1992 a, b, and c) have published wonderful manuscripts on design and conduct of case-control of studies in the American Journal of Epidemiology. The discussion in the next few sections is based on these manuscripts. {#sec2-2} ### Selection of case {#sec3-4} The investigator should define the cases as specifically as possible. Sometimes, definition of a disease may be based on multiple criteria; thus, all these points should be explicitly stated in case definition. For example, in the above mentioned Melanoma and Tanning study, the researchers defined their population as any histologic variety of invasive cutaneous melanoma. However, they added another important criterion -- these individuals should have a driver\'s license or State identity card. This probably is not directly related to the clinic condition, so why did they add this criterion? We will discuss this in detail in the next few paragraphs. ### Selection of a control {#sec3-5} The next important point in designing a case-control study is the selection of control patients. In fact, Wacholder and colleagues have extensively discussed aspects of design of case control studies and selection of controls in their article. According to them, an important aspect of selecting a control is that they should be from the same 'study base' as that of the cases. Thus, the pool of population from which the cases and controls will be enrolled should be same. For instance, in the Tanning and Melanoma study, the researchers recruited cases from Minnesota Cancer Surveillance System; however, it was also required that these cases should either have a State identity card or Driver\'s license. This was important since controls were randomly selected from Minnesota State Driver\'s license list (this also included the list of individuals who have the State identity card). Another important aspect of a case-control study is that we should measure the exposure similarly in cases and controls. For instance, if we design a research protocol to study the association between metabolic syndrome (exposure) and psoriasis (outcome), we should ensure that we use the same criteria (clinically and biochemically) for evaluating metabolic syndrome in cases and controls. If we use different criteria to measure the metabolic syndrome, then it may cause information bias. Types of Controls {#sec1-5} ================= We can select controls from a variety of groups. Some of them are: General population; relatives or friends; or hospital patients. {#sec2-3} ### Hospital controls {#sec3-6} An important source of controls is patients attending the hospital for diseases other than the outcome of interest. These controls are easy to recruit and are more likely to have similar quality of medical records. However, we have to be careful while recruiting these controls. In the above example of metabolic syndrome and psoriasis, we recruit psoriasis patients from the Dermatology department of the hospital as controls. We recruit patients who do not have psoriasis and present to the Dermatology as controls. Some of these individuals have presented to the Dermatology department with tinea pedis. Do we recruit these individuals as controls for the study? What is the problem if we recruit these patients? Some studies have suggested that diabetes mellitus and obesity are predisposing factors for tinea pedis. As we know, fasting plasma glucose of \>100 mg/dl and raised trigylcerides (\>=150 mg/dl) are criteria for diagnosis of metabolic syndrome. Thus, it is quite likely that if we recruit many of these tinea pedis patients, the exposure of interest may turn out to be similar in cases and controls; this exposure may not reflect the truth in the population. ### Relative and friend controls {#sec3-7} Relative controls are relatively easy to recruit. They can be particularly useful when we are interested in trying to ensure that some of the measurable and non-measurable confounders are relatively equally distributed in cases and controls (such as home environment, socio-economic status, or genetic factors). Another source of controls is a list of friends referred by the cases. These controls are easy to recruit and they are also more likely to be similar to the cases in socio-economic status and other demographic factors. However, they are also more likely to have similar behaviours (alcohol use, smoking etc.); thus, it may not be prudent to use these as controls if we want to study the effect of these exposures on the outcome. ### Population controls {#sec3-8} These controls can be easily conducted the list of all individuals is available. For example, list from state identity cards, voter\'s registration list, etc., In the Tanning and melanoma study, the researchers used population controls. They were identified from Minnesota state driver\'s list. We may have to use sampling methods (such as random digit dialing or multistage sampling methods) to recruit controls from the population. A main advantage is that these controls are likely to satisfy the 'study-base' principle (described above) as suggested by Wacholder and colleagues. However, they can be expensive and time consuming. Furthermore, many of these controls will not be inclined to participate in the study; thus, the response rate may be very low. Matching in a Case-Control Study {#sec1-6} ================================ Matching is often used in case-control control studies to ensure that the cases and controls are similar in certain characteristics. For example, in the smoking and lung cancer study, the authors selected controls that were similar in age and sex to carcinoma cases. Matching is a useful technique to increase the efficiency of study. 'Individual matching' is one common technique used in case-control study. For example, in the above mentioned metabolic syndrome and psoriasis, we can decide that for each case enrolled in the study, we will enroll a control that is matched for sex and age (+/- 2 years). Thus, if 40 year male patient with psoriasis is enrolled for the study as a case, we will enroll a 38-42 year male patient without psoriasis (and who will not be excluded for other reason) as controls. If the study has used 'individual matching' procedures, then the data should also reflect the same. For instance, if you have 45 males among cases, you should also have 45 males among controls. If you show 60 males among controls, you should explain the discrepancy. Even though matching is used to increase the efficiency in case-control studies, it may have its own problems. It may be difficult to fine the exact matching control for the study; we may have to screen many potential enrollees before we are able to recruit one control for each case recruited. Thus, it may increase the time and cost of the study. Nonetheless, matching may be useful to control for certain types of confounders. For instance, environment variables may be accounted for by matching controls for neighbourhood or area of residence. Household environment and genetic factors may be accounted for by enrolling siblings as controls. If we use controls from the past (time period when cases did not occur), then the controls are sometimes referred to historic controls. Such controls may be recruited from past hospital records. Strengths of a Case-Control Study {#sec1-7} ================================= Case-Control studies can usually be conducted relatively faster and are inexpensive -- particularly when compared with cohort studies (prospective)It is useful to study rare outcomes and outcomes with long latent periods. For example, if we wish to study the factors associated with melanoma in India, it will be useful to conduct a case-control study. We will recruit cases of melanoma as cases in one study site or multiple study sites. If we were to conduct a cohort study for this research question, we may to have follow individuals (with the exposure under study) for many years before the occurrence of the outcomeIt is also useful to study multiple exposures in the same outcome. For example, in the metabolic syndrome and psoriasis study, we can study other factors such as Vitamin D levels or genetic markersCase-control studies are useful to study the association of risk factors and outcomes in outbreak investigations. For instance, Freeman and colleagues (2015) in a study published in 2015 conducted a case-control study to evaluate the role of proton pump inhibitors in an outbreak of non-typhoidal salmonellosis. Limitations of a Case-control Study {#sec1-8} =================================== The design, in general, is not useful to study rare exposures. It may be prudent to conduct a cohort study for rare exposuresWe are not able to estimate the incidence or prevalence in a case-control study**Why can't we comment on the incidence or prevalence of the disease?**Since the investigator chooses the number of cases and controls, the proportion of cases may not be representative of the proportion in the population. For instance if we choose 50 cases of psoriasis and 50 controls, the prevalence of proportion of psoriasis cases in our study will be 50%. This is not true prevalence. If we had chosen 50 cases of psoriasis and 100 controls, then the proportion of the cases will be 33%.The design is not useful to study multiple outcomes. Since the cases are selected based on the outcome, we can only study the association between exposures and that particular outcomeSometimes the temporality of the exposure and outcome may not be clearly established in case-control studiesThe case-control studies are also prone to certain biases In general, individuals may not be able to recall all exposures accurately. Furthermore, cases are more likely to remember detailed exposure history (particularly behaviours such as dietary habits) compared with controls -- particularly population based controls. Thus, this may lead to recall biasIf the cases and controls are not selected similarly from the study base, then it will lead to selection bias. Analysis {#sec1-9} ======== **Odds Ratio:** We are able to calculate the odds ratios (OR) from a case-control study. Since we are not able to measure incidence data in case-control study, an odds ratio is a reasonable measure of the relative risk (under some assumptions). Additional details about OR will be discussed in the biostatistics section. The OR in the above study is 3.5. Since the OR is greater than 1, the outcome is more likely in those exposed (those who are diagnosed with metabolic syndrome) compared with those who are not exposed (those who do are not diagnosed with metabolic syndrome). However, we will require confidence intervals to comment on further interpretation of the OR (This will be discussed in detail in the biostatistics section). **Other analysis**: We can use logistic regression models for multivariate analysis in case-control studies. It is important to note that conditional logistic regressions may be useful for matched case-control studies. ###### Calculating an Odds Ratio (OR) ![](IJD-61-146-g002) ###### Hypothetical study of metabolic syndrome and psoriasis ![](IJD-61-146-g003) Additional Points in A Case-Control Study {#sec1-10} ========================================= {#sec2-4} ### How many controls can I have for each case? {#sec3-9} The most optimum case-to-control ratio is 1:1. Jewell (2004) has suggested that for a fixed sample size, the chi square test for independence is most powerful if the number of cases is same as the number of controls. However, in many situations we may not be able recruit a large number of cases and it may be easier to recruit more controls for the study. It has been suggested that we can increase the number of controls to increase statistical power (if we have limited number of cases) of the study. If data are available at no extra cost, then we may recruit multiple controls for each case. However, if it is expensive to collect exposure and outcome information from cases and controls, then the optimal ratio is 4 controls: 1 case. It has been argued that the increase in statistical power may be limited with additional controls (greater than four) compared with the cost involved in recruiting them beyond this ratio. ### I have conducted a randomised controlled trial. I have included a group which received the intervention and another group which did not receive the intervention. Can I call this a case-control study? {#sec3-10} A randomised controlled trial is an experimental study. In contrast, case-control studies are observational studies. These are two different groups of studies. One should not use the word case-control study for a randomised controlled trial (even though you have a control group in the study). Every study with a control group is not a case-control study. For a study to be classified as a case-control study, the study should be an observational study and the participants should be recruited based on their outcome status (some have the disease and some do not). ### Should I call case-control studies prospective or retrospective studies? {#sec3-11} In 'The Dictionary of Epidemiology' by Porta (2014), the authors have suggested that even though the term 'retrospective' was used for case-control studies, the study participants are often recruited prospectively. In fact, the study on risk factors for erysipelas (Pitché *et al*., 2015) was a prospective case case-control study. Thus, it is important to remember that the nature of the study (case-control or cohort) depends on the sampling method. If we sample the study participants based on exposure and move towards the outcome, it is a cohort study. However, if we sample the participants based on the outcome (some with outcome and some do not) and study the exposures in both these groups, it is a case-control study. Summary {#sec1-11} ======= In case-control studies, participants are recruited on the basis of disease status. Thus, some of participants have the outcome of interest (referred to as cases), whereas others do not have the outcome of interest (referred to as controls). The investigator then assesses the exposure in both these groups. Case-control studies are less expensive and quicker to conduct (compared with prospective cohort studies at least). The measure of association in this type of study is an odds ratio. This type of design is useful for rare outcomes and those with long latent periods. However, they may also be prone to certain biases -- selection bias and recall bias. {#sec2-5} ### Financial support and sponsorship {#sec3-12} Nil. ### Conflicts of interest {#sec3-13} There are no conflicts of interest.
2023-12-31T01:27:04.277712
https://example.com/article/4179
# @ 2017 Akretion - www.akretion.com.br - # Clément Mombereau <clement.mombereau@akretion.com.br> # License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl.html). from odoo.tests.common import TransactionCase class L10nBrBaseOnchangeTest(TransactionCase): def setUp(self): super(L10nBrBaseOnchangeTest, self).setUp() self.company_01 = self.env["res.company"].create( { "name": "Company Test 1", "cnpj_cpf": "02.960.895/0001-31", "city_id": self.env.ref("l10n_br_base.city_3205002").id, "zip": "29161-695", } ) self.bank_01 = self.env["res.bank"].create( {"name": "Bank Test 1", "zip": "29161-695"} ) self.partner_01 = self.env["res.partner"].create( {"name": "Partner Test 01", "zip": "29161-695"} ) def test_onchange(self): """ Call all the onchange methods in l10n_br_base """ self.company_01._onchange_cnpj_cpf() self.company_01._onchange_city_id() self.company_01._onchange_zip() self.company_01._onchange_state() self.partner_01._onchange_cnpj_cpf() self.partner_01._onchange_city_id() self.partner_01._onchange_zip() def test_inverse_fields(self): self.company_01.inscr_mun = "692015742119" self.assertEquals( self.company_01.partner_id.inscr_mun, "692015742119", "The inverse function to field inscr_mun failed.", ) self.company_01.suframa = "1234" self.assertEquals( self.company_01.partner_id.suframa, "1234", "The inverse function to field suframa failed.", ) def test_display_address(self): partner = self.env.ref("l10n_br_base.res_partner_akretion") partner._onchange_city_id() display_address = partner._display_address() self.assertEquals( display_address, "Rua Paulo Dias, 586 \nCentro" "\n18125-000 - Alumínio-SP\nBrazil", "The function _display_address failed.", ) def test_display_address_parent_id(self): partner = self.env.ref("l10n_br_base.res_partner_address_ak2") partner._onchange_city_id() display_address = partner._display_address() self.assertEquals( display_address, "Akretion Sao Paulo\n" "Rua Acre, 47 sala 1310\nCentro" "\n20081-000 - Rio de Janeiro-RJ\nBrazil", "The function _display_address with parent_id failed.", ) def test_other_country_display_address(self): partner = self.env.ref("base.res_partner_12") display_address = partner._display_address() self.assertEquals( display_address, "Camptocamp\n3404 Edgewood" " Road\n\nJonesboro" " AR 72401\nUnited States", "The function _display_address for other country failed.", ) def test_display_address_without_company(self): partner = self.env.ref("l10n_br_base.res_partner_akretion") partner._onchange_city_id() display_address = partner._display_address(without_company=False) self.assertEquals( display_address, "Rua Paulo Dias, 586 \nCentro" "\n18125-000 - Alumínio-SP\nBrazil", "The function _display_address with parameter" " without_company failed.", )
2023-08-18T01:27:04.277712
https://example.com/article/7559
A recent traffic restriction that limited driving in China’s capital city during the four-day “Good Luck Beijing”Ł Olympic test games initially resulted in a measurable improvement in the city’s haze, according to Beijing officials. But over the full period of the restriction, air pollution levels in fact showed a slight increase, The Washington Post reported. Zhao Yue, vice director of the Beijing Environmental Protection Bureau, noted on the agency’s Web site that humid, windless conditions had trapped particulate matter in the city, preventing greater improvement. Under the restriction, effective August 17 to 20, car owners with license plates ending in an even number were permitted to drive only on even-numbered dates, and vice versa. The partial ban resulted in the removal of hundreds of thousands of cars from Beijing’s streets each day. Violators of the ruling were subjected to a fine equivalent to US$15 and required to return home with their vehicles. On the first day of the restriction, Beijing’s air quality improved from the previous day’s “Level 3”Ł rating (slightly polluted) to a “Level 2”Ł rating (fairly good), People’s Daily reported. But the index of particulate matter was ultimately higher on Day 4 than on Day 1. Even so, the Day 4 index, at 95”ô100, was better than the index of 116 measured the day before the partial ban began. On the final day of the restriction, Beijing’s skies remained hazy. Car ownership in China is growing by 26 percent a year, and some forecasts say automobile sales could reach 10 million a year by 2010. Together with coal burning for industrial and household uses, auto emissions are considered one of the biggest sources of air pollution in the country’s rapidly expanding cities. Beijing alone has been adding cars at the rate of about 1,000 new vehicles a day, according to the Wall Street Journal. In a model simulation, city officials had projected that taking some 130 million vehicles off the road each day would lead to a 40 percent reduction in the capital’s auto emissions. Ever since Beijing promised to host the ”śgreenest’ Olympics ever in 2008, the local government has plowed a fortune into major measures to tackle the capital’s long-standing air pollution problem. These include switching Beijing’s primary energy usage from coal to natural gas, relocating highly polluting industries outside of city limits, adopting stricter auto emissions standards, using cleaner fuels for public buses, and replacing coal boilers with electric or gas boilers. ADVERTISEMENT The city has also been planting trees on a large scale. According to China’s State Forestry Administration, more than half of Beijing’s urban areas are now covered with trees, and nearly 70 percent of its mountain areas are forested. In addition, three large-scale tree belts have been developed around the city to protect it from destructive sandstorms. The traffic restriction is the latest effort to correct the city’s worsening air quality. In 2006, for the first time in eight years, Beijing experienced a record 241 “blue sky”Ł days, or days with good air quality (Levels 1 or 2). However, the city still encountered an increasing number of days with poor air quality, triggered mainly by severe sandstorms and extreme meteorological conditions. “We must realize that even we have been achieving the goal of improving air quality during the past eight years, the target for 65 percent ”śblue sky’ days a year is comparatively low,”Ł said Du Shaozhong, vice president of the Beijing Environmental Protection Bureau. Du noted that Beijing’s air quality still lags behind the national standard as well as the standard set for the upcoming Olympic Games, and it does not yet meet residents’ expectations for a “livable”Ł city. This story was produced by Eye on Earth, a joint project of the Worldwatch Institute and the blue moon fund. View the complete archive of Eye on Earth stories, or contact Staff Writer Alana Herro at aherro [AT] worldwatch [DOT] org with your questions, comments, and story ideas.
2023-11-24T01:27:04.277712
https://example.com/article/8333