text
stringlengths
7
4.92M
Q: Entity Framework and SQLite, the ultimate how-to I'm trying to get Entity Framework (6.4.4. the newest version in summer 2020) working together with SQLite (1.0.113.1, also latest in summer 2020). I found a lot of information about how to do this, but this information was not always helpful, quite often they contradicted each other. Now that I found out how to do it, I decided to jot down how I did it. The question describes the classes and the tables, the answer will describe how to do it. I describe a database for Schools, where every School has zero or more Students and Teachers (one-to-many), every Student and every Teacher has exactly one Address (one-to-one), Teachers teach zero or more Students, while Students are taught by zero or more teachers (many-to-many) So I have several tables: A simple one: Addresses A simple one: Schools Students with a foreign key to the School they attend Teachers with a foreign key to the School they teach on. TeachersStudents: the junction table to implement the many-to-many relation between Students and Teachers The classes: Address and School: public class Address { public long Id { get; set; } public string Street { get; set; } public int Number { get; set; } public string Ext { get; set; } public string ExtraLine { get; set; } public string PostalCode { get; set; } public string City { get; set; } public string Country { get; set; } } public class School { public long Id { get; set; } public string Name { get; set; } // Every School has zero or more Students (one-to-many) public virtual ICollection<Student> Students { get; set; } // Every School has zero or more Teachers (one-to-many) public virtual ICollection<Teacher> Teachers { get; set; } } Teachers and Students: public class Teacher { public long Id { get; set; } public string Name { get; set; } // Every Teacher lives at exactly one Address public long AddressId { get; set; } public virtual Address Address { get; set; } // Every Teacher teaches at exactly one School, using foreign key public long SchoolId { get; set; } public virtual School School { get; set; } // Every Teacher Teaches zero or more Students (many-to-many) public virtual ICollection<Student> Students { get; set; } } public class Student { public long Id { get; set; } public string Name { get; set; } // Every Student lives at exactly one Address public long AddressId { get; set; } public virtual Address Address { get; set; } // Every Student attends exactly one School, using foreign key public long SchoolId { get; set; } public virtual School School { get; set; } // Every Student is taught by zero or more Teachers (many-to-many) public virtual ICollection<Teacher> Teachers { get; set; } } And finally the DbContext: public class SchoolDbContext : DbContext { public DbSet<Address> Addresses { get; set; } public DbSet<School> Schools { get; set; } public DbSet<Student> Students { get; set; } public DbSet<Teacher> Teachers { get; set; } } When using entity framework you don't need to define the Junction table TeachersStudents in your DbContext. Of course this doesn't mean that you won't need it. If you use Microsoft SQL server this would have been enough to let entity framework identify the tables and the relations between the tables. Alas, with SQLite this is not enough. So: how to get this working. On to the answer! A: So I used Visual Studio to create an empty solution and added a DLL project: SchoolSQLite. To see if this works I also added a console application that would access the database using entity framework. To be complete I added some unit tests. This is out-of-scope of this answer. In the DLL project I used References-Manage NUGET Packages to search for System.Data.SQLite. This is the version that adds both the code needed for Entity Framework and SQLite. If needed: update to the newest version. Add the classes described in the question: Address, School, Teacher, Student, SchoolDbContext. Now comes the part that I found most difficult: the connection string in file App.Config of your console App. To get it working I needed the following parts in App.Config: <?xml version="1.0" encoding="utf-8"?> <configuration> <configSections> <!-- For more information on Entity Framework configuration, visit ... --> <section name="entityFramework" type="System.Data.Entity.Internal.ConfigFile.EntityFrameworkSection, EntityFramework, Version=6.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" requirePermission="false"/> </configSections> Later in App.Config the section EntityFramework: <entityFramework> <providers> <provider invariantName="System.Data.SqlClient" type="System.Data.Entity.SqlServer.SqlProviderServices, EntityFramework.SqlServer"/> <provider invariantName="System.Data.SQLite.EF6" type="System.Data.SQLite.EF6.SQLiteProviderServices, System.Data.SQLite.EF6"/> </providers> </entityFramework> <system.data> <DbProviderFactories> <remove invariant="System.Data.SQLite.EF6" /> <add name="SQLite Data Provider" invariant="System.Data.SQLite.EF6" description=".NET Framework Data Provider for SQLite" type="System.Data.SQLite.SQLiteFactory, System.Data.SQLite" /> </DbProviderFactories> </system.data> And finally the connection string. The file where my database is located is C:\Users\Harald\Documents\DbSchools.sqlite. Of course you can choose your own location. <connectionStrings> <add name="SchoolDbContext" connectionString="data source=C:\Users\Haral\Documents\DbSchools.sqlite" providerName="System.Data.SQLite.EF6" /> (there may be more connection strings to other databases) This should compile, but you can't access the database yet. Summer 2020 Entity Framework does not create the tables, so you'll have to do this yourself. As I thought this was part of the SchoolDbContext I added a method. For this you need a little knowledge of SQL, but I think you get the gist: protected void CreateTables() { const string sqlTextCreateTables = @" CREATE TABLE IF NOT EXISTS Addresses ( Id INTEGER PRIMARY KEY NOT NULL, Street TEXT NOT NULL, Number INTEGER NOT NULL, Ext TEXT, ExtraLine TEXT, PostalCode TEXT NOT NULL, City TEXT NOT NULL, Country TEXT NOT NULL ); CREATE INDEX IF NOT EXISTS indexAddresses ON Addresses (PostalCode, Number, Ext); CREATE TABLE IF NOT EXISTS Schools ( Id INTEGER PRIMARY KEY NOT NULL, Name TEXT NOT NULL ); CREATE TABLE IF NOT EXISTS Students ( Id INTEGER PRIMARY KEY NOT NULL, Name TEXT NOT NULL, AddressId INTEGER NOT NULL, SchoolId INTEGER NOT NULL, FOREIGN KEY(AddressId) REFERENCES Addresses(Id) ON DELETE NO ACTION, FOREIGN KEY(SchoolId) REFERENCES Schools(Id) ON DELETE CASCADE ); CREATE TABLE IF NOT EXISTS Teachers ( Id INTEGER PRIMARY KEY NOT NULL, Name TEXT NOT NULL, AddressId INTEGER NOT NULL, SchoolId INTEGER NOT NULL, FOREIGN KEY(AddressId) REFERENCES Addresses(Id) ON DELETE NO ACTION, FOREIGN KEY(SchoolId) REFERENCES Schools(Id) ON DELETE CASCADE ); CREATE TABLE IF NOT EXISTS TeachersStudents ( TeacherId INTEGER NOT NULL, StudentId INTEGER NOT NULL, PRIMARY KEY (TeacherId, StudentId) FOREIGN KEY(TeacherId) REFERENCES Teachers(Id) ON DELETE NO ACTION, FOREIGN KEY(StudentId) REFERENCES Students(Id) ON DELETE NO ACTION )"; var connectionString = this.Database.Connection.ConnectionString; using (var dbConnection = new System.Data.SQLite.SQLiteConnection(connectionString)) { dbConnection.Open(); using (var dbCommand = dbConnection.CreateCommand()) { dbCommand.CommandText = sqlTextCreateTables; dbCommand.ExecuteNonQuery(); } } } Some things are worth mentioning: Table Address has an extra index, so the search for an address using PostalCode + House Number (+ extension) will be faster. "What is your PostCode?" "Well it is 5473TB, house number 6". The index will immediately show the complete address. Although the SchoolDbcontext doesn't mention the junction table TeachersStudents, I still need to create it. The combination [TeacherId, StudentId] will be unique, so this can be used as primary key If a School is removed, all its Teachers and Students need to be removed: ON DELETE CASCADE Is a Teacher leaves the School, the Students should not be harmed. If a Student leaves the School, the Teachers keep on teaching: ON DELETE NO ACTION When your application executes an entity framework query for the first time after it has been started, method OnModelCreating is called. So that is a good moment to check if the tables exist, and if not, create them. protected override void OnModelCreating(DbModelBuilder modelBuilder) { this.CreateTables(); Of course you should use OnModelCreating to inform entity framework about your tables and the relations between the tables. This can be done after the tables are created. Continuing OnModelCreating: this.OnModelCreatingTable(modelBuilder.Entity<Address>()); this.OnModelCreatingTable(modelBuilder.Entity<School>()); this.OnModelCreatingTable(modelBuilder.Entity<Teacher>()); this.OnModelCreatingTable(modelBuilder.Entity<Student>()); this.OnModelCreatingTableRelations(modelBuilder); base.OnModelCreating(modelBuilder); } For those who know entity framework, modelling these tables is fairly straightforward. Address; example of a simple table private void OnModelCreatingTable(EntityTypeConfiguration<Address> addresses) { addresses.ToTable(nameof(SchoolDbContext.Addresses)).HasKey(address => address.Id); addresses.Property(address => address.Street).IsRequired(); addresses.Property(address => address.Number).IsRequired(); addresses.Property(address => address.Ext).IsOptional(); addresses.Property(address => address.ExtraLine).IsOptional(); addresses.Property(address => address.PostAlCode).IsRequired(); addresses.Property(address => address.City).IsRequired(); addresses.Property(address => address.Country).IsRequired(); // The extra index, for fast search on [PostalCode, Number, Ext] addresses.HasIndex(address => new {address.PostAlCode, address.Number, address.Ext}) .HasName("indexAddresses") .IsUnique(); } Schools is also simple: private void OnModelCreatingTable(EntityTypeConfiguration<School> schools) { schools.ToTable(nameof(this.Schools)) .HasKey(school => school.Id); schools.Property(school => school.Name) .IsRequired(); } Teachers and Students: they have required foreign key to the Schools, every School has zero or more Students / Teachers: private void OnModelCreatingTable(EntityTypeConfiguration<Teacher> teachers) { teachers.ToTable(nameof(SchoolDbContext.Teachers)) .HasKey(teacher => teacher.Id); teachers.Property(teacher => teacher.Name) .IsRequired(); // Specify one-to-many to Schools using foreign key SchoolId teachers.HasRequired(teacher => teacher.School) .WithMany(school => school.Teachers) .HasForeignKey(teacher => teacher.SchoolId); } private void OnModelCreatingTable(EntityTypeConfiguration<Student> students) { students.ToTable(nameof(SchoolDbContext.Students)) .HasKey(student => student.Id); students.Property(student => student.Name) .IsRequired(); // Specify one-to-many to Schools using foreign key SchoolId students.HasRequired(student => student.School) .WithMany(school => school.Students) .HasForeignKey(student => student.SchoolId); } Note: by default: if a School is removed, this will cascade down: all its Teachers and Students will be removed. Only one table relation is left: the junction table. If I wanted I could have defined the one-to-many relations between Schools and Teachers and Schools and Students also here. I already did this when defining the Teachers and the Students. So they are not needed here. I left the code, as example if you want to put them here. private void OnModelCreatingTableRelations(DbModelBuilder modelBuilder) { //// School <--> Teacher: One-to-Many //modelBuilder.Entity<School>() // .HasMany(school => school.Teachers) // .WithRequired(teacher => teacher.School) // .HasForeignKey(teacher => teacher.SchoolId) // .WillCascadeOnDelete(true); //// School <--> Student: One-To-Many //modelBuilder.Entity<School>() // .HasMany(school => school.Students) // .WithRequired(student => student.School) // .HasForeignKey(student => student.SchoolId) // .WillCascadeOnDelete(true); // Teacher <--> Student: Many-to-many modelBuilder.Entity<Teacher>() .HasMany(teacher => teacher.Students) .WithMany(student => student.Teachers) .Map(manyToMany => { manyToMany.ToTable("TeachersStudents"); manyToMany.MapLeftKey("TeacherId"); manyToMany.MapRightKey("StudentId"); }); } The many-to-many mapping is explained here Now we are almost done. All we have to do is make sure that the database will not be dropped and recreated. This is usually done in: Database.SetInitializer<SchoolDbContext>(null); Because I wanted to hide that we use SQLite, so I added this as a method to SchoolDbContext: public class SchoolDbContext : DbContext { public static void SetInitializeNoCreate() { Database.SetInitializer<SchoolDbContext>(null); } public SchoolDbContext() : base() { } public SchoolDbContext(string nameOrConnectionString) : base(nameOrConnectionString) { } // etc: add the DbSets, OnModelCreating and CreateTables as described earlier } I sometimes see that people set the initializer in the constructor: public SchoolDbContext() : base() { Database.SetInitializer<SchoolDbContext>(null); } However, this constructor will be called very often. I thought it a bit of a waste to do this every time. Of course there are patterns to automatically set the initializer once when the SchoolDbContext is constructed for the first time. For simplicity I didn't use them here. The console app static void Main(string[] args) { Console.SetBufferSize(120, 1000); Console.SetWindowSize(120, 40); Program p = new Program(); p.Run(); // just for some need ending: if (System.Diagnostics.Debugger.IsAttached) { Console.WriteLine(); Console.WriteLine("Fin"); Console.ReadKey(); } } Program() { // Set the database initializer: SchoolDbContext.SetInitializeNoCreate(); } And now the fun part: Add a School, add some Teachers, add Some Student and give him some Teachers. void Run() { // Add a School: School schoolToAdd = this.CreateRandomSchool(); long addedSchoolId; using (var dbContext = new SchoolDbContext()) { var addedSchool = dbContext.Schools.Add(schoolToAdd); dbContext.SaveChanges(); addedSchoolId = addedSchool.Id; } Add a Teacher: Teacher teacherToAdd = this.CreateRandomTeacher(); teacherToAdd.SchoolId = addedSchoolId; long addedTeacherId; using (var dbContext = new SchoolDbContext()) { var addedTeacher = dbContext.Teachers.Add(teacherToAdd); dbContext.SaveChanges(); addedTeacherId = addedTeacher.Id; } Add a Student. Student studentToAdd = this.CreateRandomStudent(); studentToAdd.SchoolId = addedSchoolId; long addedStudentId; using (var dbContext = new SchoolDbContext()) { var addedStudent = dbContext.Students.Add(studentToAdd); dbContext.SaveChanges(); addedStudentId = addedStudent.Id; } Almost done: only the many-to-many relation between teachers and students: The student decides to be taught by the Teacher: using (var dbContext = new SchoolDbContext()) { var fetchedStudent = dbContext.Find(addedStudentId); var fetchedTeacher = dbContext.Find(addedTeacherId); // either Add the Student to the Teacher: fetchedTeacher.Students.Add(fetchedStudent); // or Add the Teacher to the Student: fetchedStudents.Teachers.Add(fetchedTeacher); dbContext.SaveChanges(); } I also tried to Remove Teachers from the Schools, and saw that this didn't harm the Students. Also if a Student leaves School, the Teachers keep on teaching. Finally: if I delete a School, all Students and Teachers are deleted. So now I've shown you simple tables, like Addresses and Schools; tables with one-to-many relationships: Teachers and Students; and a many-to-many relationship: StudentsTeachers. There is one relation that I didn't show: self-referencing: a foreign key to another object in the same table. I couldn't come up with a good example for this in the School database. If anyone has a good idea, please edit this answer and add the self-referencing table. Hope this has been useful for you.
Angiopoietin-1, but not platelet-derived growth factor-AB, is a cooperative stimulator of vascular endothelial growth factor A-accelerated endothelial cell scratch closure. Wound healing and the grow-in of free tissue grafts critically depend on blood vessel growth, i.e., on the angiogenic invasion of endothelial cells, which is critically reduced in smokers, in patients suffering from microangiopathies (e.g., in diabetes), or in those who are treated with immunosuppressives. Although several angiogenic factors have been tested to accelerate wound healing in such critically patients, their combinations have not yet been systematically investigated. This study was done to reveal which combination of proangiogenic with promaturating factors is the most effective in an endothelial wound closure assay. Human umbilical vein endothelial cells were isolated, cultured to confluence, and subjected to a scratch wound assay with the addition of vascular endothelial growth factor (VEGF)-A(165), platelet-derived growth factor (PDGF)-AB, angiopoietin-1 (ANG1), or ANG2 and all of their 16 possible combinations. VEGF-A(165) plus ANG1 was most effective at accelerating endothelial scratch closure. Moreover, VEGF-A(165) stimulated wound closure in all combinations tested, while it was attenuated by PDGF-AB. Thus, with respect to their effects on endothelial cells, a combination of VEGF-A with ANG1 is the most promising and is superior to combinations with PDGF-AB.
Q: Parsing MySQL date in JavaScript I want to display the date timestamp retrieved from a MySQL database in a HTML table dynamically. I have an array of dates. I am getting date in the following format: Mar 10, 2014 6:40:45 AM How can I get the date as it is and represent it in my HTML table using JavaScript? A: Assuming that Mar 10, 2014 6:40:45 AM is your input date format, This code will help: var myDate = new Date('Mar 10, 2014 6:40:45 AM'); var reqDate = ((myDate.getMonth() + 1) + "/" + myDate.getDate() + "/" + myDate.getFullYear()); console.log(reqDate); output 3/10/2014
Point of View: Estia It Is, Then After all these years I still don’t know the rules of anything really, and was somewhat tongue in cheek taken to task by a doubles opponent this past week for having served out of turn during a tiebreaker. I pleaded ignorance, which is one of my strong suits. I’m always pleading ignorance and it’s served — ha-ha — me well by and large, though slowly, ever so slowly I am being led by the hand into the technological age, out of the darkness of ignorance into the light of clarity. Clarity is not one of my strong suits, though I do rather like claret. Maybe that explains it. We’ll be drinking some soon, at Estia’s Little Kitchen, celebrating our 29th wedding anniversary. Can you believe it? Twenty-nine years. Time has been kind. “Two happy lovers make one bread / a single moon drop in the grass. / Walking, they cast two shadows that flow together, / waking, they leave one sun empty in their bed. . . .”
A case of ectopic dysplastic kidney and ectopic ureter diagnosed by MRI. A 14-year-old girl with a solitary right kidney had continuous urinary incontinence. Four months previously she had undergone surgical resection of a vaginal septum associated with uterus didelphys, which was causing obstructed menstrual flow. She was toilet trained at the age of 2 years, had a normal voiding pattern, and had no history or family history of incontinence. Pelvic examination, abdominal and pelvic ultrasonography, renal scintigraphy, voiding cystourethrography, abdominal and pelvic MRI, fluoroscopic retrograde vaginography, vaginoscopy, cystourethroscopy after administration of indigo carmine, laparoscopy, and pathologic examination of the excised specimen. Ectopic ureter draining into the vagina associated with a contralateral dysplastic kidney. Laparoscopic nephrectomy of the left renal remnant and ligation of the left distal ureter.
@charset "UTF-8"; /// Generates variables for all buttons. Please note that you must use interpolation on the variable: `#{$all-buttons}`. /// /// @example scss - Usage /// #{$all-buttons} { /// background-color: #f00; /// } /// /// #{$all-buttons-focus}, /// #{$all-buttons-hover} { /// background-color: #0f0; /// } /// /// #{$all-buttons-active} { /// background-color: #00f; /// } /// /// @example css - CSS Output /// button, /// input[type="button"], /// input[type="reset"], /// input[type="submit"] { /// background-color: #f00; /// } /// /// button:focus, /// input[type="button"]:focus, /// input[type="reset"]:focus, /// input[type="submit"]:focus, /// button:hover, /// input[type="button"]:hover, /// input[type="reset"]:hover, /// input[type="submit"]:hover { /// background-color: #0f0; /// } /// /// button:active, /// input[type="button"]:active, /// input[type="reset"]:active, /// input[type="submit"]:active { /// background-color: #00f; /// } /// /// @require assign-inputs /// /// @type List /// /// @todo Remove double assigned variables (Lines 59–62) in v5.0.0 $buttons-list: 'button', 'input[type="button"]', 'input[type="reset"]', 'input[type="submit"]'; $all-buttons: assign-inputs($buttons-list); $all-buttons-active: assign-inputs($buttons-list, active); $all-buttons-focus: assign-inputs($buttons-list, focus); $all-buttons-hover: assign-inputs($buttons-list, hover); $all-button-inputs: $all-buttons; $all-button-inputs-active: $all-buttons-active; $all-button-inputs-focus: $all-buttons-focus; $all-button-inputs-hover: $all-buttons-hover;
/* eslint-env node */ const fs = require('fs') const path = require('path') const mdx = require('@mdx-js/mdx') const babel = require('@babel/core') const exportMeta = require('./lib/export-meta') const componentPath = path.resolve(__dirname, 'pages/components') const components = fs .readdirSync(componentPath) .filter(name => /^\w+$/.test(name)) .map(name => { const mdxText = fs.readFileSync(`${componentPath}/${name}/index.md`, 'utf8') const jsx = mdx.sync(mdxText, { remarkPlugins: [exportMeta] }) const {code} = babel.transform(`import React from 'react';${jsx}`, { presets: ['@babel/preset-env', '@babel/preset-react'], plugins: [ '@babel/plugin-proposal-object-rest-spread', '@babel/plugin-proposal-class-properties' ] }) const execute = new Function('module', 'exports', 'require', code) const module = { exports: {} } execute(module, module.exports, () => { const moduleExports = () => () => void 0 moduleExports.createElement = () => void 0 return moduleExports }) const {meta} = module.exports return { title: meta && meta.title, path: `/components/${name}` } }) module.exports = components
Q: Configure float with decimal in sql or force string to show decimal I have a table in SQl with a column in float type , this table is used to send values to a one fiscal printer, code name price ---------------------------------- 34 cUP 2,5 36 BOOK 2 37 COMET 1,2 38 TOY 1 IS posible configure SQl to show 1,00 o 2,00 when the value have not cents. When i send to the printer i use this line : string preco = vercup.Rows[i]["unitario"].ToString(); how can i force to show 1,00 when the values comes 1. A: How you store the data isn't related to how the data is presented. yes, when you present the data you can force it to display two decimals. select convert(decimal(9,2), price) from table That's just 1 possible solution.
My Wife Went Back to Beijing and Showed Me the Cool Innovation There I lived in Beijing for 10 years and I’ve experienced the fast-moving pace but now innovation is rapidly driving the city forward. My last trip to Beijing was during Chinese New Year in 2016 and back then I’ve already felt how things were being innovated quickly. In the Global Startup Ecosystem Report 2017 by Startup Genome that came out just a few weeks ago, Beijing and Shanghai are now ranked in the Top 10 of the Global Startup Ecosystem, number 4 and 8 respectively for the first time ever. Beijing is in the number 2 spot in terms of performance, just behind Silicon Valley. It is also home to 4,800 to 7,000 startups and has the largest startup ecosystem in Asia in terms of number of startups according to the report. So when my wife Grace who’s originally from Beijing showed me all the innovation and cool stuff that’s happening there, I’m not surprised how accurate the report was. I asked her to take as many photos as possible so that I can write this blog post. 1. Cashless Payment Everywhere When I left China in 2013, cashless payment was still at its infancy but it was already evident that the whole country was going towards it. Now it’s everywhere. You no longer have to bring cash when leaving your home. It’s available at the market. No cash needed when paying for parking. 2. Sharing Economy A country which used to rely on bicycles is trying to encourage people to use them again to overcome extreme traffic congestions and pollution. 2 Comments on “My Wife Went Back to Beijing and Showed Me the Cool Innovation There” Also almost everything in online now, people now use online app order food, almost all the nearby restaurant can do the food delivery, you can check your food status online, and know where the exact location of the deliver man, and when your food will come. The supermarket do the same thing, you can use the app to buy vegetables, food, drinks from your nearby supremarket, and just take half an hour for delivering the stuff.
Genetic engineering of Escherichia coli to produce a 1:1 complex of the anabaena sp. PCC 7120 nuclease NucA and its inhibitor NuiA. A series of T7-promoter based bicistronic expression vectors was constructed in order to produce the complex of the Anabaena sp. PCC 7120 DNA/RNA non-specific nuclease NucA and its inhibitor NuiA. With all constructs, tandem expression of nucA and nuiA results in aggregation and inclusion body formation of NucA, independent of the order of the genes, the relative expression of the two proteins and the temperature applied during expression. Two constructs in which nuiA is the first and nucA the second cistron lead to an approximately one order of magnitude higher expression of nuiA compared with nucA. In these cells inclusion bodies are formed which contain NucA and NuiA in a 1:1 molar ratio. The complex can be solubilized with 6M urea after disruption of the cells by sonication, renatured by dialysis and purified to homogeneity. 2mg of the complex are obtained from 1l Escherichia coli culture. As shown by gel filtration and analytical ultracentrifugation, our system leads to a highly pure and homogeneous complex preparation, as required for biophysical and structural studies. Thus, our new method is a superior alternative for the production of the NucA/NuiA complex in which separately produced nuclease and inhibitor are mixed, and an excess of one or the other component, as well as aggregates of NucA, have to be removed from the preparation.
Vascular depression: overrepresented among African Americans? Our primary aim was to compare the rate of vascular depression among a clinical sample of African American and Caucasian depressed older adults. Secondary aims included characterizing the clinical and neuropsychological profile of vascular depression and comparing antidepressant response rates between patients with vascular and nonvascular depression. This was a two-site, multi-ethnic, open 8-week trial of antidepressant medication in older adults with depression. Men and women 50 years or older meeting DSM-IV criteria for nonpsychotic unipolar depression participated in this trial. Each participant underwent a comprehensive psychiatric and neuropsychological evaluation and a brain MRI, which were performed at baseline. Forty-six patients met inclusion and exclusion criteria. Forty-two of those patients received an MRI at baseline. Sixteen patients met criteria for vascular depression. Patients with vascular depression were significantly more likely to be African American and have a higher likelihood of being female, a higher rate of hypertension and psychomotor retardation, a lower rate of family history of affective illness, and frontal systems dysfunction on neuropsychological testing. The difference in response rates between patients with vascular and nonvascular depression did not reach statistical significance. This is the first study to document high rates of vascular depression in a clinical sample of African Americans and Caucasians. Our findings suggest that vascular depression may be overrepresented among African Americans, which is consistent with the high rates of cardiovascular disease, hypertension, and stroke in this population.
Q: how to save 3 forms of one model in django? models.py class Campaign(models.Model): user = models.ForeignKey(User, on_delete=models.CASCADE) # this is many to one relationship, on_deleting user, profile will also be deleted funds_for = models.CharField(max_length=200) campaign_title = models.CharField(max_length=200, blank=True) amount_required = models.IntegerField(null=True, blank=True) campaign_image = models.ImageField(default="default_campaign.png",upload_to="campaign_pictures") forms.py class RaiseFundsFrom1(forms.ModelForm): class Meta: model = Campaign fields = ['funds_for'] class RaiseFundsFrom2(forms.ModelForm): class Meta: model = Campaign fields = ['campaign_image'] class RaiseFundsFrom3(forms.ModelForm): class Meta: model = Campaign fields = ['campaign_title','amount_required'] views.py @login_required def raise_funds_medical_1(request): if request.method == 'POST': form = RaiseFundsFrom1(request.POST) if form.is_valid(): request.session['funds_for'] = form.cleaned_data.get('funds_for') return redirect('funds:raise_funds_medical_2') else: form = RaiseFundsFrom1(instance=request.user) return render(request,'funds/raise_funds_medical_1.html',{'form':form}) @login_required def raise_funds_medical_2(request): if request.method == 'POST': form = RaiseFundsFrom2(request.POST, request.FILES or None) if form.is_valid(): f = request.FILES['campaign_image'] request.session['campaign_image'] = f.name return redirect('funds:raise_funds_medical_3') else: form = RaiseFundsFrom2(instance=request.user) return render(request,'funds/raise_funds_medical_2.html',{'form':form}) @login_required def raise_funds_medical_3(request): if request.method == 'POST': form = RaiseFundsFrom3(request.POST) if form.is_valid(): request.session['campaign_title '] = form.cleaned_data.get('campaign_title') request.session['amount_required '] = form.cleaned_data.get('amount_required') c = Campaign() c.funds_for = request.session['funds_for'] c.campaign_image = request.session['campaign_image'] c.campaign_title = request.session['campaign_title'] c.amount_required = request.session['amount_required'] c.save() return redirect('core:landing_page') else: form = RaiseFundsFrom3(instance=request.user) return render(request,'funds/raise_funds_medical_3.html',{'form':form}) I need to get details for campaign model in 3 parts. I need to do in a specific order, with the second form requiring to be only an image upload. My plan is to capture the required fields and store temporarily in sessions. when the form is saved, i intend to delete the sessions(not important right now) In the current scenario, when the third form is processed/saved. the contents of first form, third form and image name from second form gets saved. however, the image does not get uploaded to the required folder. A: I do not know whether it is possible to save a file to session with some trick. A workaround I see is to save the file in the required destination in the second view and save the path to that file in the session. Then use this saved path to create the object in the 3rd view. So, create a small function to handle the upload def handle_uploaded_file(f, upload_to): with open(upload_to, 'wb') as destination: for chunk in f.chunks(): destination.write(chunk) and then use it to save the file in your second view def raise_funds_medical_2(request): if request.method == 'POST': form = RaiseFundsFrom2(request.POST, request.FILES or None) if form.is_valid(): f = request.FILES['campaign_image'] f_path_rel = os.path.join("campaign_pictures", f.name) f_path = os.path.join(settings.MEDIA_ROOT, f_path_rel) handle_uploaded_file(f, f_path) request.session['campaign_image'] = f_path_rel return redirect('raise_funds_medical_3') else: form = RaiseFundsFrom2(instance=request.user) return render(request,'funds/raise_funds_medical_2.html',{'form':form}) I think assigning the path to your image field should work, so that you do not need to change your 3rd view. However, be aware of two things: The handle_uploaded_file expects that the correct destination folder exists. If you cannot guarantee this you should add a check for the folder and create it if not existant The handle_uploaded_file will overwrite exisitng files with the same name. If this should be avoided check for existing files before writing and modify the filename accordingly.
Here's your link back to Reddit: r/readyplayerone ________________________________________________________________Okay, so I'm listening to my favourite book again: Ready Player One And while doing so, I automatically started drawing one of my favourite scenes: Parzival, playing Joust against an old, undead king: Acererak. It's beautiful, isn't it? Well, not my drawing, but the sceneOh well, I hope you'll like it. It's probably the first version out of a few, so take is as a sketch
File photo of industrialist Naveen Jindal, named in CBI's coal scam chargesheet Congress leader and industrialist Naveen Jindal, former union minister Dasari Narayan Rao and former Jharkhand Chief Minister Madhu Koda, who appeared in a Delhi court in connection with a coal scam case, were granted protection from arrest but asked not to leave the country.Mr Jindal, Mr Rao, Mr Koda and 12 others were granted bail on a personal bond of Rs one lakh.They were all summoned today over alleged irregularities in the allocation of a coal mining block in Jharkhand.The Central Bureau of Investigation (CBI) had said in a chargesheet that to win a coal block allocation for his firm, Mr Jindal promised support to Madhu Koda, an independent legislator who ruled in 2006-2008 with support from the Congress and other parties.The court has said that Mr Jindal had "manipulated" the entire government machinery to score a coal block allotment in Jharkhand. It also observed that the CBI's charge sheet showed Mr Jindal had played a "pivotal role" in the conspiracy to get a coal block allotted to his firms Jindal Steel and Power Ltd and Gagan Sponge Iron.The company has denied the allegations.The massive irregularities in allocation of coal blocks came to light in 2012 after the national auditor said Rs. 1.86 lakh crore had been lost as the blocks had been distributed without a transparent bidding process. Most of these allocations have been made by the erstwhile UPA government. Former Prime Minister Manmohan Singh, who had also been summoned in one of the cases, received a reprieve from the Supreme Court in April.Last year, the Supreme Court declared nearly 300 coal licenses issued since 1993 as illegal. After coming to power, the Narendra Modi government has auctioned 32 coal blocks.
/* Copyright 1993, 1998 The Open Group Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of The Open Group shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from The Open Group. */ #ifdef HAVE_DIX_CONFIG_H #include <dix-config.h> #endif #include "scrnintstr.h" #include "gcstruct.h" #include "pixmapstr.h" #include "windowstr.h" #include "migc.h" /* ARGSUSED */ void miChangeGC(GCPtr pGC, unsigned long mask) { return; } void miDestroyGC(GCPtr pGC) { if (pGC->pRotatedPixmap) (*pGC->pScreen->DestroyPixmap) (pGC->pRotatedPixmap); if (pGC->freeCompClip) RegionDestroy(pGC->pCompositeClip); } void miDestroyClip(GCPtr pGC) { if (pGC->clientClip) RegionDestroy(pGC->clientClip); pGC->clientClip = NULL; } void miChangeClip(GCPtr pGC, int type, void *pvalue, int nrects) { (*pGC->funcs->DestroyClip) (pGC); if (type == CT_PIXMAP) { /* convert the pixmap to a region */ pGC->clientClip = BitmapToRegion(pGC->pScreen, (PixmapPtr) pvalue); (*pGC->pScreen->DestroyPixmap) (pvalue); } else if (type == CT_REGION) { /* stuff the region in the GC */ pGC->clientClip = pvalue; } else if (type != CT_NONE) { pGC->clientClip = RegionFromRects(nrects, (xRectangle *) pvalue, type); free(pvalue); } pGC->stateChanges |= GCClipMask; } void miCopyClip(GCPtr pgcDst, GCPtr pgcSrc) { if (pgcSrc->clientClip) { RegionPtr prgnNew = RegionCreate(NULL, 1); RegionCopy(prgnNew, (RegionPtr) (pgcSrc->clientClip)); (*pgcDst->funcs->ChangeClip) (pgcDst, CT_REGION, prgnNew, 0); } else { (*pgcDst->funcs->ChangeClip) (pgcDst, CT_NONE, NULL, 0); } } /* ARGSUSED */ void miCopyGC(GCPtr pGCSrc, unsigned long changes, GCPtr pGCDst) { return; } void miComputeCompositeClip(GCPtr pGC, DrawablePtr pDrawable) { if (pDrawable->type == DRAWABLE_WINDOW) { WindowPtr pWin = (WindowPtr) pDrawable; RegionPtr pregWin; Bool freeTmpClip, freeCompClip; if (pGC->subWindowMode == IncludeInferiors) { pregWin = NotClippedByChildren(pWin); freeTmpClip = TRUE; } else { pregWin = &pWin->clipList; freeTmpClip = FALSE; } freeCompClip = pGC->freeCompClip; /* * if there is no client clip, we can get by with just keeping the * pointer we got, and remembering whether or not should destroy (or * maybe re-use) it later. this way, we avoid unnecessary copying of * regions. (this wins especially if many clients clip by children * and have no client clip.) */ if (!pGC->clientClip) { if (freeCompClip) RegionDestroy(pGC->pCompositeClip); pGC->pCompositeClip = pregWin; pGC->freeCompClip = freeTmpClip; } else { /* * we need one 'real' region to put into the composite clip. if * pregWin the current composite clip are real, we can get rid of * one. if pregWin is real and the current composite clip isn't, * use pregWin for the composite clip. if the current composite * clip is real and pregWin isn't, use the current composite * clip. if neither is real, create a new region. */ RegionTranslate(pGC->clientClip, pDrawable->x + pGC->clipOrg.x, pDrawable->y + pGC->clipOrg.y); if (freeCompClip) { RegionIntersect(pGC->pCompositeClip, pregWin, pGC->clientClip); if (freeTmpClip) RegionDestroy(pregWin); } else if (freeTmpClip) { RegionIntersect(pregWin, pregWin, pGC->clientClip); pGC->pCompositeClip = pregWin; } else { pGC->pCompositeClip = RegionCreate(NullBox, 0); RegionIntersect(pGC->pCompositeClip, pregWin, pGC->clientClip); } pGC->freeCompClip = TRUE; RegionTranslate(pGC->clientClip, -(pDrawable->x + pGC->clipOrg.x), -(pDrawable->y + pGC->clipOrg.y)); } } /* end of composite clip for a window */ else { BoxRec pixbounds; /* XXX should we translate by drawable.x/y here ? */ /* If you want pixmaps in offscreen memory, yes */ pixbounds.x1 = pDrawable->x; pixbounds.y1 = pDrawable->y; pixbounds.x2 = pDrawable->x + pDrawable->width; pixbounds.y2 = pDrawable->y + pDrawable->height; if (pGC->freeCompClip) { RegionReset(pGC->pCompositeClip, &pixbounds); } else { pGC->freeCompClip = TRUE; pGC->pCompositeClip = RegionCreate(&pixbounds, 1); } if (pGC->clientClip) { if (pDrawable->x || pDrawable->y) { RegionTranslate(pGC->clientClip, pDrawable->x + pGC->clipOrg.x, pDrawable->y + pGC->clipOrg.y); RegionIntersect(pGC->pCompositeClip, pGC->pCompositeClip, pGC->clientClip); RegionTranslate(pGC->clientClip, -(pDrawable->x + pGC->clipOrg.x), -(pDrawable->y + pGC->clipOrg.y)); } else { RegionTranslate(pGC->pCompositeClip, -pGC->clipOrg.x, -pGC->clipOrg.y); RegionIntersect(pGC->pCompositeClip, pGC->pCompositeClip, pGC->clientClip); RegionTranslate(pGC->pCompositeClip, pGC->clipOrg.x, pGC->clipOrg.y); } } } /* end of composite clip for pixmap */ } /* end miComputeCompositeClip */
Schematic illustration of the experiment. For more details, see the original publication. Image credit: Nature Physics, doi:10.1038/nphys1821 (PhysOrg.com) -- Scientists in Japan are the first to have succeeded in converting information into free energy in an experiment that verifies the "Maxwell demon" thought experiment devised in 1867. Maxwell's demon was the invention of Scottish mathematician and theoretical physicist James Clerk Maxwell, who wanted to contradict the second law of thermodynamics (although the name was given to the imaginary being later). This law implies it is not possible to invent a perfect heat engine able to extract heat from a hot reservoir and use all the heat to perform work, because some of the heat must be lost to a cold reservoir. Maxwell imagined a box containing a gas at a particular temperature (or pressure). In any gas some molecules are hotter (moving faster) and some are cooler (moving slower) than the average. In Maxwell’s thought experiment a partition with a small trapdoor is placed in the box, and the trapdoor is guarded by the imaginary being who, without expending energy, selects which molecules go through to the other side. The demon, for example, could allow only hotter molecules to remain on the right side, or pass through to the right side, while the cooler than average molecules are allowed into the left side. The end result is that all the hot molecules end up on one side of the box, which is therefore warmer than the other side containing only cool molecules. The demon has essentially converted a mixed gas (disordered state or higher entropy) to separated gases (ordered state or lower entropy), apparently violating the second law of thermodynamics which also says entropy in an isolated system should not decrease. In Maxwell’s thought experiment the demon creates a temperature difference simply from information about the gas molecule temperatures and without transferring any energy directly to them. The temperature difference in the box could then be used to run a heat engine, with heat flowing from the hot end to the cold end, which also appears to violate the second law of thermodynamics. In a now-classic 1929 paper on Maxwell’s demon, Hungarian physicist Leo Szilard showed that the thought experiment does not actually violate the laws of physics because the demon must exert some energy in determining whether molecules were hot or cold. Until now, demonstrating the conversion of information to energy has been elusive, but University of Tokyo physicist Masaki Sano and colleagues have succeeded in demonstrating it in a nano-scale experiment. In a paper published in Nature Physics they describe how they coaxed a Brownian particle to travel upwards on a "spiral-staircase-like" potential energy created by an electric field solely on the basis of information on its location. The team observed the particle using a high-speed camera. The particle had some thermal energy and moved in random directions. When it was moving up the staircase they allowed it to move freely, but when it moved down the staircase they blocked its movement via a virtual wall created by an electric field. The virtual wall therefore acted like a Maxwell’s demon, only allowing the particle to move in one direction, but not forcing or pushing it. As the particle traveled up the staircase it gained energy from moving to an area of higher potential, and the team was able to measure precisely how much energy had been converted from information. The experiment did not violate the second law of thermodynamics because energy was consumed in the experiment by the apparatus used, and by the experimenters themselves, who did work in monitoring the particle and adjusting the voltage, but Sano said the experiment does demonstrate that information can be used as a medium for transferring energy. The results also verified the generalized Jarzynski equation, which was formulated in 1997 by statistical chemist Christopher Jarzynski of the University of Maryland. The equation defines the amount of energy that could theoretically be converted from a unit of information. More information: Experimental demonstration of information-to-energy conversion and validation of the generalized Jarzynski equality, Nature Physics, Published online: 14 November 2010. Experimental demonstration of information-to-energy conversion and validation of the generalized Jarzynski equality,, Published online: 14 November 2010. doi:10.1038/nphys1821 © 2010 PhysOrg.com
config DRIVERS_INTEL_WIFI bool "Support Intel PCI-e WiFi adapters" depends on PCI default y if PCIEXP_PLUGIN_SUPPORT select DRIVERS_WIFI_GENERIC if HAVE_ACPI_TABLES help When enabled, add identifiers in ACPI and SMBIOS tables to make OS drivers work with certain Intel PCI-e WiFi chipsets.
The illegal immigrant charged with murdering University of Iowa student Mollie Tibbetts asked for his trial to be moved to a more diverse county in a motion filed Friday. Cristhian Bahena Rivera, 24, pleaded not guilty to murder charges in September, about a month after Tibbetts’ body was found in a field near Brooklyn, Iowa. “Without venue where a minority population is substantially represented, (Rivera) cannot be fairly tried and any jury pool chosen will have to be stricken,” Rivera’s lawyers wrote in the motion, according to Fox News. His lawyers also say the trial should be moved because publicity surrounding the case could affect its outcome. “The pretrial publicity surrounding this case has been extensive and pervasive,” they wrote, according to the Des Moines Register. TRENDING: Watch: GOP Candidate Klacik Gets Kicked Off of 'The View' for Calling Out Behar's Blackface Scandal “News crews from local and national news outlets descended upon the area interviewing family members and numerous community members. Stories, of all types, were aired on television, internet and radio concerning Ms. Tibbetts’ disappearance and how it impacted the Poweshiek county community. That request is not without precedent. For example, Jason Carter, who was charged with killing his mother, had his trial moved out of Iowa’s Marion County for publicity reasons, the Register reported. Rivera’s lawyers cited threatening online comments about his request for a trial delay in their motion for a different venue. Should this change of venue be granted? Yes No Completing this poll entitles you to The Western Journal news updates free of charge. You may opt out at anytime. You also agree to our Privacy Policy and Terms of Use You're logged in to Facebook. Click here to log out. 8% (45 Votes) 92% (504 Votes) His trial is scheduled to start Sept. 3. Tibbetts was a rising sophomore studying psychology at the University of Iowa in Iowa City. She enjoyed reading and public speaking and was a member of the Catholic Church. Her father, Rob Tibbetts, spoke out on the debate his daughter’s death sparked. “The person who is accused of taking Mollie’s life is no more a reflection of the Hispanic community as white supremacists are of all white people. To suggest otherwise is a lie,” he wrote in an Op-Ed for the Register in September. RELATED: Father Gets 30 Years for Hiding Body of 5-Year-Old Son Slain by Mother Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact [email protected]. A version of this article appeared on The Daily Caller News Foundation website. We are committed to truth and accuracy in all of our journalism. Read our editorial standards.
[Bone transplant]. We describe the methodology of the Bone and Soft Tissue Bank, from extraction and storage until use. Since the year 1986, with the creation of the Bone Bank in the University Clinic of Navarra, more than 3,000 grafts have been used for very different types of surgery. Bone grafts can be classified into cortical and spongy; the former are principally used in surgery to save tumour patients, in large post-traumatic reconstructions and in replacement surgery where there are massive bone defects and a structural support is required. The spongy grafts are the most used due to their numerous indications; they are especially useful in filling cavities that require a significant quantity of graft when the autograft is insufficient, or as a complement. They are also of special help in treating fractures when there is bone loss and in the treatment of delays in consolidation and pseudoarthrosis in little vascularized and atrophic zones. They are also used in prosthetic surgery against the presence of cavity type defects. Allografts of soft tissues are specially recognised in multiple ligament injuries that require reconstructions. Nowadays, the most utilised are those employed in surgery of the anterior cruciate ligament although they can be used for filling any ligament or tendon defect. The principal difficulties of the cortical allografts are in the consolidation of the ends with the bone itself and in tumour surgery, given that these are patients immunodepressed by the treatment, the incidence of infection is increased with respect to spongy grafts and soft tissues, which is irrelevant. In short, the increasingly widespread use of allografts is an essential therapeutic weapon in orthopaedic surgery and traumatology. It must be used by expert hands.
1. Field of Invention This invention relates to novel isolated Pseudomonas fluorescens strains that have been isolated, selected, and characterized from the naturally occurring soil bacterial populations because they inhibit the growth of annual bluegrass (Poa annua L.) or inhibit the growth of both annual bluegrass (Poa annua L.) and rough bluegrass (Poa trivialis), but do not inhibit the growth of desired grasses, such as turfgrasses, cereal crops, and native plants. This invention also relates to novel compositions that contain the novel Pseudomonas fluorescens strains described herein. In addition this invention relates to methods of using the novel, isolated P. fluorescens strains and the novel compositions, alone or in combination with other P. fluorescens strains, herbicides, and/or fertilizers. 2. Description of the Prior Art Annual bluegrass (Poa annua L.) is a cool-season annual grass that is a major weed species in turf, turfgrass seed production, and golf courses of the western United States (Webster and Nichols, 2012 Weed Science 60(2):145-157). Annual bluegrass germinates in late summer or fall as soil temperatures fall below 70° F. It continues to germinate throughout winter, allowing several flushes of germination at any one site throughout the season. The life cycles of annual bluegrass and turfgrass are very similar, and annual bluegrass is often more competitive than most turfgrasses. Because annual bluegrass is a grass weed growing with turfgrass, selective control is difficult. Pre-emergent herbicides, such as benefin, bensulide, dithiopyr, oryzalin, oxadiazon, pendimethalin, prodiamine, and benefin/oryzalin, are successful in limiting germination of annual bluegrass. A few post-emergent herbicides reduce Poa annua L. growth, but they could also kill desirable turfgrasses. As such, usage of these post-emergent herbicides are limited. For example, foramsulfuron, sulfosulfuron, and trifloxysulfuron can be used only on warm-season turfgrass. Ethofumesate can be used in dormant bermudagrass, creeping bentgrass, Kentucky bluegrass, tall fescue, perennial ryegrass, and St. Augustine to reduce annual bluegrass infestations. Pronamide can be used in warm-season turfgrass for established annual bluegrass, but it is slow acting. Golf-course managers have few tools to combat Poa annua L. and the invasion of this weed often means that greens must be ripped out and replaced every ten years. Rough bluegrass (Poa trivialis) is also a cool-season annual grass that is a major weed species. Similar to annual bluegrass, rough bluegrass can outcompete turfgrasses and native plants. Use of antagonistic microorganisms as bioherbicides against some weeds has been previously reported (Kennedy, et al., 1991, Soil Sci. Soc. Amer. J. 55:722-727; Kennedy, et al., 2001, Weed Sci. 49:792-797; Makowski and Mortensen, 1998, Mycol. Res. 102(12):1545-1552). Xanthomonas campestris pv. poannua is sprayed on plant leaves during mowing and reduces annual bluegrass in bermudagrass. The bacterium enters the plant through the cut leaf and causes systemic wilt, which kills the plant (Johnson, et al., 1996, Weed Technology, 10(3):621-624). A germination arrest factor (GAF) produced by Pseudomonas fluorescens strain WH6 and other related species produce a compound that in-vitro reduced germination of grassy weed species including annual bluegrass (Banowetz, et al., 2008, Biological Control 46:380-390; Banowetz, et al., 2009, Biological Control 50:103-110.) However, P. fluorescens strain WH6 and other related species failed to reduce germination of annual bluegrass in the field. GAF failed to inhibit germination of grassy weed species in the field and the selectivity of GAF is not known. The physiological characteristics required for a bacterial strain to suppress annual weeds are specific as to (1) the weed growth to be controlled; (2) the specificity of the inhibition is limited to that weed or similar weeds and lack activity against crops or economically important plants; (3) the mode of action of weed control; (4) the activity and ecological niche of the microorganism; and (5) cultural practices and soil and climatic conditions must be favorable for suppressive. Thus, information about microbial treatments for control of weeds other than annual bluegrass cannot be used to predict strains of microorganisms that would reduce annual bluegrass under field conditions or predict criteria for selecting such strains.
Ask HN: Should Founders/CEO's read non-fiction or fiction works? - chrisherd ====== itamarst If the only way you define yourself is "CEO" or "founder" you are limiting your identity to your job. But you also have friends, and family, and a society you live in. You have a body that has needs ("should founders eat good food or bad food?" "should founders exercise in the morning or the evening?"). You are not your job. Your job will go away eventually. Your company might fail. Read whatever makes you happier, or teaches you more, or entertains you. You don't have to spend your whole life being a "founder". (I wrote a longer variant of this, coincidentally also talking about what books to read, in the context of "what technologies should I learn?" \- [https://codewithoutrules.com/2018/02/01/too-much-to- learn/](https://codewithoutrules.com/2018/02/01/too-much-to-learn/)).
CT-detected traumatic small artery extremity injuries: surgery, embolize, or watch? A 10-year experience. Advances in computed tomography (CT) angiography have increased the sensitivity and specificity of detecting small branch arterial injuries in the extremities of trauma patients. However, it is unclear whether these patients should undergo surgery, angioembolization, or conservative watchful waiting. We hypothesized that uncomplicated small arterial branch injuries can be managed successfully with watchful waiting. A 10-year retrospective review of extremity CT angiograms with search findings of arterial "active extravasation" or "pseudoaneurysm" was performed at a level 1 county trauma center. Subgroup analysis was performed on those with isolated extremity injury and those with concurrent injuries. A total of 31 patients had CT-detected active extravasation (84 %) or pseudoaneurysm (16 %), 71 % of which were isolated vascular injuries. Of the patients evaluated, 71 % (n = 22) were managed with watchful waiting, 19 % (n = 6) with angioembolization, and 10 % (n = 3) with surgery. Watchful waiting complications included progression to alternative treatment (n = 1) and blood transfusions (n = 2). Complications of surgery included the inability to find active bleeding (n = 1) and postoperative psychosis (n = 1). Complications of angioembolization were limited to a postprocedure blood transfusion (n = 1). Patients with isolated vascular injuries had an average length of stay of 2.9 days, with management averages of the following: 2.7 days with watchful waiting (n = 16), 3.3 days with angioembolization (n = 3), and 3.7 days with surgery (n = 3). CT angiography has greatly increased the reported incidence of traumatic arterial injury in the extremity. We propose that small branch arterial injuries in the extremities can be managed successfully with watchful waiting and do not often require immediate embolization.
Politics Prohibitionists’ Poll Backfires, Reveals 83% Support for Cannabis Reform Bruce Barcott January 19, 2018 Share Twitter Facebook Share Print Closeup shot of a woman writing on a piece of paper Trial lawyers have a well-known rule of thumb about witnesses: Never ask them a question you don’t already know the answer to. The ardent prohibitionists over at Project SAM, headed by Kevin Sabet and Patrick Kennedy, may want to consider that advice the next time they commission a poll. Vox reported earlier today that the anti-cannabis advocacy group hired Mason-Dixon Polling & Strategy, of Jacksonville, Florida, to ask 1,000 registered voters around the nation about their views on marijuana legalization. The question put to the voters was as follows: QUESTION: I want to ask a few questions about marijuana policy in the United States. Currently, possessing and using marijuana is against federal law. Which one of the following best describes your preference on national marijuana policy? Keep the current policy Keep the current policy, but legalize the use of marijuana for physician-supervised medical use Decriminalize marijuana use by removing the possibility of jail time for possession and also allowing for medical marijuana, but keep the sale of marijuana illegal. Legalize the commercial production, use and sale of marijuana for recreational use, as they have done recently in several states. The public responded with a loud and overwhelming vote in favor of change. In all, 83% of respondents said they want to see some form of federal cannabis legal reform, which is exactly what Project SAM is working against. Here’s how the numbers broke down: What is your preference on national marijuana policy? Gender, Age, and Political Differences Some of the poll’s most interesting findings came in the areas of gender, age, and political affiliation. There’s still a minor gap between men and women when it comes to adult-use legalization, with 53% of men favoring it compared to only 46% of women. The gender gap was virtually nonexistent when it came to keeping prohibition and legalizing medical only. People under 50 were much more likely to favor legalization of all types compared to people over 50. Only 8% of the younger demographic wanted to keep cannabis federally illegal, while 25% of people over 50 favored the current policy. On full adult-use legalization, 54% of the younger set favored it, compared to only 44% of the 50+ crowd. Democrats overwhelmingly supported various forms of legal reform, while one-quarter of Republicans wanted to keep cannabis fully illegal. Interestingly, more Independents expressed a preference for full adult-use (57%) than those who identified as Democrats (55%). Only 36% of Republicans opted for full adult-use legalization. It’s… a Victory! Kind of. Officials at SAM spun the poll results as best they could. “New National Poll Shows Support for Marijuana Legalization Dips Below 50% When Voters Are Given Other Policy Choices,” read the headline on their media release. Well… that’s just not so. Project SAM continues to oppose all forms of cannabis legalization, and has always considered medical legalization as “legalization.” So by their own definition, the poll shows 78% support for exactly the kind of legalization they spend their days opposing. Share Twitter Facebook Share Print Bruce Barcott Leafly Senior Editor Bruce Barcott oversees news, investigations, and feature projects. He is a Guggenheim Fellow and author of Weed the People: The Future of Legal Marijuana in America. View Bruce Barcott's articles
Q: Can I use maven archetype if that archetype is in Maven repo but not listed in interactive mode I have a working archetype for some open source project, I can install it and then use when mvn archetype:generate using local catalog. I would like to share it so anybody can use it in his/her project. Project is already on Maven public repository using OSS Sonatype. Sonatype packages archetype in jar file and says that its normal dependency, so here is my question: Is it possible for user to use my archetype when I use traditional releasing process in OSS Sonatype in this way: mvn archetype:generate -DarchetypeGroupId=pl.bristleback -DarchetypeArtifactId=webapp-archetype A: The Generate project using an alternative catalog told us as It is possible to use an alternative catalog as the internal one by defining the archetypeCatalog property to a specific value which can be one of: internal to use the internal catalog only. local to use the local catalog only. remote to use the maven's remote catalog. No catalog is currently provided. file://path/to/archetype-catalog.xml to use a specific local catalog. When the catalog file is named archetype-catalog.xml, it can be omitted. http://url/to/archetype-catalog.xml to use a specific remote catalog. When the catalog file is named archetype-catalog.xml, it can be omitted. The you may try to create by using the following command: - mvn archetype:generate -DarchetypeCatalog=http://path/to/your/sonartype -DarchetypeGroupId=pl.bristleback -DarchetypeArtifactId=webapp-archetype I hope this may help.
import tensorflow as tf # DISCLAIMER: # Parts of this code file were originally forked from # https://github.com/tkipf/gcn # which itself was very inspired by the keras package def masked_logit_cross_entropy(preds, labels, mask): """Logit cross-entropy loss with masking.""" loss = tf.nn.sigmoid_cross_entropy_with_logits(logits=preds, labels=labels) loss = tf.reduce_sum(loss, axis=1) mask = tf.cast(mask, dtype=tf.float32) mask /= tf.maximum(tf.reduce_sum(mask), tf.constant([1.])) loss *= mask return tf.reduce_mean(loss) def masked_softmax_cross_entropy(preds, labels, mask): """Softmax cross-entropy loss with masking.""" loss = tf.nn.softmax_cross_entropy_with_logits(logits=preds, labels=labels) mask = tf.cast(mask, dtype=tf.float32) mask /= tf.maximum(tf.reduce_sum(mask), tf.constant([1.])) loss *= mask return tf.reduce_mean(loss) def masked_l2(preds, actuals, mask): """L2 loss with masking.""" loss = tf.nn.l2(preds, actuals) mask = tf.cast(mask, dtype=tf.float32) mask /= tf.reduce_mean(mask) loss *= mask return tf.reduce_mean(loss) def masked_accuracy(preds, labels, mask): """Accuracy with masking.""" correct_prediction = tf.equal(tf.argmax(preds, 1), tf.argmax(labels, 1)) accuracy_all = tf.cast(correct_prediction, tf.float32) mask = tf.cast(mask, dtype=tf.float32) mask /= tf.reduce_mean(mask) accuracy_all *= mask return tf.reduce_mean(accuracy_all)
Q: Download File from File-Server via Script I have e.g. three file-servers and want to add a "Transparency-Layer" for filedownloads (one single script which is executed, fetches the file and sends it directly to the user). Users should only use one link to access a file e.g.: www.mysite.com/download/<UUID_WITH_correctFileServer> The questions I am asking now are: Is it possible to offer the users a single access-url (e.g. above) with good performance? I think that using just one java-servlet or php-script is not as performant as having one script on each fileserver -> my speculation: file is sent from fileserver to central script and from there to the user. correct? How do other cloud-storage-providers have solved this issue? A: Oh boy... will try... only the first file in the examples will actually work ok? (real file in a real server). If you don't care about navigating away you could do something like: test.php <?php if(isset($_GET['fname']) and $_GET['fname']){ // do something with filename to decide from where to donwload if($_GET['fname']=="DWSM_Domain.png") header("Location: ftp://anonymous:[email protected]@ftp.swfwmd.state.fl.us/pub/CFWI_HAT/DWSM_Domain.png"); if($_GET['fname']=="file1") header("Location: ftp://someuser:[email protected]/somepath/file1"); if($_GET['fname']=="file2") header("Location: ftp://someuser:[email protected]/somepath/file2"); exit; } ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Untitled Document</title> </head> <body> <p><a href="/test.php?fname=DWSM_Domain.png">DWSM_Domain.png</a></p> <p><a href="/test.php?fname=file1">file1</a></p> <p><a href="/test.php?fname=file2">file2</a></p> </body> If you do want the user to open another window you will need two php files. test1.php <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <script type="text/javascript" src="/js/jquery.js"></script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Untitled Document</title> </head> <body> <p><label onclick="get_file('DWSM_Domain.png')">DWSM_Domain.png</label></p> <p><label onclick="get_file('file1')">file1</label></p> <p><label onclick="get_file('file2')">file2</label></p> <script> function get_file(thisfile) { if(thisfile){ var content; var page = "/test2.php?fname="; var address = page.concat(thisfile); $.get(address, function (data) { content = data; var newWindow = window.open("","_blank"); newWindow.location.href = content; }); } } </script> </body> test2.php <?php if(isset($_GET['fname']) and $_GET['fname']){ // do something with filename to decide from where to donwload if($_GET['fname']=="DWSM_Domain.png") $targetfile ="ftp://anonymous:[email protected]@ftp.swfwmd.state.fl.us/pub/CFWI_HAT/DWSM_Domain.png"; if($_GET['fname']=="file1") $targetfile ="ftp://someuser:[email protected]/somepath/file1"; if($_GET['fname']=="file2") $targetfile ="ftp://someuser:[email protected]/somepath/file2"; echo $targetfile; } ?> You certainly will need to tame it to get your exact behaviour but I hope is a good start. Fair winds
"Why fit in - when you were born to stand out." Dr. SeussWe are all different. We are all special. And we are all unique. We all have unique gifts and talents and I believe that when we recognize and share those gifts and talents something special happens not only for us but for those around us. Knowing who we are and appreciating the uniqueness that makes us special is truly a gift that we should accept and treasure. Some people love the spotlight. They thrive on being seen and heard. Others with just as much talent turn away from it. You know who you are. In my other life we had to attend meetings, lots of meetings. Eventually you got to know all of the people who were also attending. There was a group that came to be known as the head nodders. They were the people who nodded no matter what was said, They wanted to give the impression that they were doing it all, and noone was doing it better. Then there was the group who sat quietly and said very little although everyone knew that they were actually doing it all and not just doing the work but doing a great job. I always wished that the head nodders would do what they were saying they were doing and that the silent majority would actually share what they were experiencing so we could all learn from them.Only you know what makes you shine. Only you know what gifts you have to offer the world. But I do know that you have a gift that we are all waiting to receive. It may be a book you want to write and we need to read. It may be a painting that will make someone feel good or evoke a memory that is important. It make be a piece of jewelry that you make that will make someone feel special everytime she wears it. Or it could be the perfect cup of coffee to start the day, the garden that makes the neighborhood beautiful, the welcoming smile on your face everytime you say "hello" or the hug you give to friends and strangers alike that makes them feel safe. You have a gift. Recognize it. Celebrate it. Share it. "Why fit in - when you were born to stand out." The world is waiting to get to know you!Remember: When you share your gifts and talents with the world, magic happens. Let the magic begin. Your post really spoke to me too. Self doubt creeps in so often and that ends up causing an art block for me. I've started joining in on Art Blog projects though, where I'm committing to having something ready each day or week. This was a big step for me but I look forward to getting something ready to post for each deadline.
Breast cancer surgery volume-cost associations: hierarchical linear regression and propensity score matching analysis in a nationwide Taiwan population. No outcome studies have longitudinally and systematically compared the effects of hospital and surgeon volume on breast cancer surgery costs in an Asian population. This study purposed to evaluate the use of hospital and surgeon volume for predicting breast cancer surgery costs. This cohort study retrospectively analyzed 97,215 breast cancer surgeries performed from 1996 to 2010. Relationships between volumes and costs were analyzed by propensity score matching and by hierarchical linear regression. The mean breast cancer surgery costs for all breast cancer surgeries performed during the study period was $1485.3 dollars. The average breast cancer surgery costs for high-volume hospitals and surgeons were 12% and 26% lower, respectively, than those for low-volume hospitals and surgeons. Propensity score matching analysis showed that the average breast cancer surgery costs for breast cancer surgery procedures performed by high-volume hospitals ($1428.6 dollars) significantly differed from the average breast cancer surgery costs of those performed by low-/medium-volume hospitals ($1514.0 dollars) and that the average breast cancer surgery costs of procedures performed by high-volume surgeons ($1359.0 dollars) significantly differed from the average breast cancer surgery costs of those performed by low-/medium-volume surgeons ($1550.3 dollars) (P < 0.001). The factors significantly associated with hospital resource utilization for this procedure included age, surgical type, Charlson co-morbidity index score, hospital type, hospital volume, and surgeon volume. The data indicate that analyzing and emulating the treatment strategies used by high-volume hospitals and by high-volume surgeons may reduce overall breast cancer surgery costs.
Background {#Sec1} ========== Cardiovascular events (CVEs) are the leading causes of death among dialysis patients, with mortality rates 7 to 30 times higher than in the general population \[[@CR1], [@CR2]\]. Observational studies to date in dialysis patients have reported an association between progressive loss of residual glomerular filtration rate (GFR) and increased mortality \[[@CR3], [@CR4]\]; Causality has not been established with dialysis patient survival and residual renal function (RRF). Treatment with angiotensin-converting enzyme inhibitors (ACEIs) and angiotensin receptor blockers (ARBs) has provided significant cardiovascular protection and preserved RRF for chronic kidney disease (CKD) patients \[[@CR5]--[@CR7]\]. Unfortunately, most trials excluded patients with end stage renal disease (ESRD) receiving maintenance dialysis, the beneficial effects of ACEI/ARBs on CVEs and RRF in dialysis patients remain uncertain. Some large-scale trials tested the effects of ACEIs/ARBs therapy in dialysis patients provided inconsistent results, and much uncertainty persists regarding the protective effects of this agent \[[@CR8]--[@CR11]\]. We therefore undertook a meta-analysis to evaluate the effect of ACEIs and ARBs on cardiovascular events and residual renal function decline in patients receiving dialysis. Methods {#Sec2} ======= Date sources, search strategy and selection criteria {#Sec3} ---------------------------------------------------- We undertook a systematic review of the literature according to the approach recommended by the statement for the conducting of meta-analysis of intervention studies \[[@CR12]\]. Relevant studies were identified by searching the following data sources: MEDLINE (OVID) (from 1950 to December 2016), Embase (from 1970 to December 2016), the Cochrane Library database (Cochrane Central Register of Active controlled Trials; no date restriction), and Wanfang database. We used the MeSH headings and text words of all spellings of known ACE inhibitors and ARBs, dialysis, cardiovascular events, and kidney failure (see Additional files [1](#MOESM1){ref-type="media"}). Trials were limited to randomized controlled trials (RCTs) without language restriction. Reference lists from identified trials and review articles were searched manually to identify any other relevant studies. We also searched the Clinical [Trials.gov](http://trials.gov) website for randomized trials that were registered as completed but not yet published. All completed RCTs that assessed the effects of ACE-Is or ARBs compared with placebo or other antihypertensive drugs in dialysis patients, and which reported cardiovascular, renal or adverse outcomes, were eligible for inclusion. Data extraction and quality assessment {#Sec4} -------------------------------------- Published reports were obtained for each eligible trial, and relevant information extracted into a spreadsheet. The data sought included dialysis modality, number of patients, country in which the study was performed, patient age, mean baseline systolic and diastolic blood pressure values, residual GFR, Kt/v, mean duration on dialysis, follow-up duration, change in blood pressure, outcome events (including CVEs, all-cause death, and RRF). Major cardiovascular events were defined as a composite of fatal or non-fatal myocardial infarction, fatal or non-fatal stroke, heart failure, or comparable definitions used by individual authors or cardiovascular mortality. Residual renal function was measured by GFR or endogenous creatinine clearance (CrCl), or urine volume, and drug-related adverse events if sufficient data were available. The literature were searched and identified by two investigators (LYX and MXX) independently. Data extraction and quality assessment (Grading of Recommendations Assessment, Development and Evaluation system) \[[@CR13]\] was undertaken independently by two investigators (ZJ and MXX) using a standardized approach. Any disagreement between the two investigators in the abstracted data was adjudicated by a third reviewer (JJY). Statistical analysis {#Sec5} -------------------- The relative risk (RR) and 95% confidence interval (CI) for each outcome was calculated before pooling by the random-effects model. For the continuous measurement of change of GFR, blood pressure and urine volume, we used the weighted mean difference between groups. Heterogeneity across the included studies was analyzed using the I^2^ to describe the percentage of variability. We made graphic representations of potential publication bias using Begg Funnel plots of the natural logarithm of the RR versus its standard error (SE) and assessed them visually. A 2-sided *p* value less than 0.05 was considered statistically significant, and statistical analyses were performed using STATA, version 12.0 and Review Manager 5.1. Results {#Sec6} ======= Our literature search yielded 2502 relevant articles, of which 49 were reviewed in full text (Fig. [1](#Fig1){ref-type="fig"}). A total of 11 relevant RCTs with 1856 patients were included for further analysis \[[@CR8]--[@CR11], [@CR14]--[@CR20]\]. The characteristics of the included studies are presented in Table [1](#Tab1){ref-type="table"}. One trial (*n* = 397) compared ACE-Is with placebo \[[@CR9]\], one compared ARBs with placebo (*n* = 82) \[[@CR11]\], three studies (*n* = 352) compared ACE-Is with active control \[[@CR14], [@CR18], [@CR20]\], and 6 studies (*n* = 1025) compared ARBs with active control \[[@CR8], [@CR10], [@CR15]--[@CR17], [@CR19]\]. These studies were performed between 2003 to 2014 with sample sizes ranging from 32 to 469, and the mean follow-up was 3.8 years. Seven trials with 1686 patients undergoing hemodialysis and four trials including 170 patients with peritoneal dialysis were included.Fig. 1Process for identifying studies eligible for the meta-analysis Table 1Characteristics of studies in meta-analysisTrialsTreatmentDialysis modalityCountryNo. patientsAge,yearsMean Baseline SBP,mmHgMean Baseline DBP,mmHgResidual GFR,mL/min per 1.73 m2Kt/VMean Duration on dialysis,monthsfollow-up, yearsACE-Is vs. placebo FOSIDIAL 2006 \[[@CR9]\]ACE-I/PlaceboHDFrance39767146771.349.22ARBs vs. placebo SAFIR 2014 \[[@CR11]\]ARB/PlaceboHDDenmark8261146765.24.61ACE-Is vs. active control Yilmaz 2010 \[[@CR18]\]ACE-I/CCBHDTurkey9253.8157881.4471 Philip 2003 \[[@CR14]\]ACE-I/Conventional ahtihypertensive agentsPDChina Kong Hong605815183.53.552.0810.51 HDPAL 2014 \[[@CR20]\]ACE-I/atenololHDUSA20053.115187.11ARBs vs. active control Suzuki 2008 \[[@CR10]\]ARB/Conventional ahtihypertensive agentsHDJapan36659.5155811.144.43 Takahashi 2006 \[[@CR8]\]ARB/CCBHDJapan80611538233.11.6 OCTOPUS 2013 \[[@CR19]\]ARB/Conventional ahtihypertensive agentsHDJapan46959159801.2883.5 Suzuki 2004 \[[@CR10]\]ARB/CCBPDJapan3463.5165764.31.9724 Wang JARB/Conventional ahtihypertensive agentsPDChina32421581024.82.09292.4 Zhong HARB/CCBPDChina4445134834.51.971Abbreviations: ACEI, angiotensin-converting enzyme inhibitors; ARB, angiotensin receptor blockers; CCB, calcium channel blockers; GFR, glomerular filtration rate; HD, hemodialysis; PD, peritoneal dialysis The quality of the included studies was estimated using the Cochrane Collaboration tool for assessing the risk of bias; low versus high risk of bias is indicated for each study in Table [2](#Tab2){ref-type="table"}.Table 2Quality assessment for included trialsTrialSequence generationAllocation concealmentBlindingIncomplete outcome dataSelective outcome reportingOther source of biasparticipantspersonneloutcome assessorsFOSIDIAL 2006 \[[@CR9]\]LOWLOWLOWLOWLOWLOWLOWLOWSAFIR 2014 \[[@CR11]\]LOWUNCLEARLOWLOWUNCLEARLOWLOWLOWYilmaz 2010 \[[@CR18]\]UNCLEARUNCLEARHIGHHIGHHIGHLOWLOWLOWPhilip 2003 \[[@CR14]\]LOWLOWHIGHHIGHHIGHLOWLOWLOWHDPAL 2014 \[[@CR20]\]LOWLOWHIGHHIGHHIGHLOWLOWLOWSuzuki 2008 \[[@CR10]\]LOWLOWHIGHHIGHHIGHLOWLOWLOWTakahashi 2006 \[[@CR8]\]LOWLOWHIGHHIGHLOWLOWUNCLEARUNCLEAROCTOPUS 2013 \[[@CR19]\]UNCLEARUNCLEARHIGHHIGHLOWLOWLOWLOWSuzuki 2004 \[[@CR15]\]LOWLOWHIGHHIGHHIGHLOWLOWLOWWang J \[[@CR16]\]UNCLEARUNCLEARUNCLEARUNCLEARUNCLEARLOWLOWUNCLEARZhong H \[[@CR17]\]UNCLEARUNCLEARUNCLEARUNCLEARUNCLEARLOWLOWUNCLEARAssessment of risk bias according to the Cochrane Collaboration's tool, low risk of bias was represented as "LOW" and high risk of bias was "HIGH" There was no significant difference in blood pressure over time between patients treated with ACEI/ARB and those treated with placebo or other antihypertensive drugs (MD −1.11 mmHg, 95% CI -2.55 to 0.32 mmHg; *p =* 0.13; and MD 0.83 mmHg, 95% CI -0.68 to 2.35 mmHg; *p =* 0.28; for systolic and diastolic blood pressure, respectively). Cardiovascular events {#Sec7} --------------------- Seven studies reported 455 cardiovascular events \[[@CR8]--[@CR11], [@CR14], [@CR19], [@CR20]\]. Of the 828 patients treated with ACEI/ARB there were 218 cardiovascular events (26.3%) and 237 events occurred in 826 patients treated with placebo or active agents (28.7%). Overall, ACE-Is and ARBs did not reduce cardiovascular events versus placebo or other antihypertensive agents (RR 0.92, 95% CI 0.79 to 1.08, Fig. [2](#Fig2){ref-type="fig"}). There was evidence of significant heterogeneity for effect of CVEs across included studies (I^2^ = 71.6%, *p =* 0.002). Subgroup analysis indicated that the presence of heterogeneity was due to the different RASI category (ACEI or ARB), shown in Fig. [3](#Fig3){ref-type="fig"}. Indirect comparison suggested that ARB seemed to provided a higher probability of being beneficial for CVEs in dialysis patients (0.77, 0.63 to 0.94), while ACEI did not (1.24, 0.96 to 1.61). Subgroup analysis detected no significant difference between the two groups with regard to different control group (placebo or active agents), the dialysis mode, follow-up year, sample size and patient age. Data for heart failure events were available from 4 trials including 1115 patients in whom 132 events were recorded \[[@CR8], [@CR10], [@CR19], [@CR20]\]. ACEI/ARB therapy in dialysis patients reduced the risk of heart failure events by 33% (0.67, 0.47 to 0.93) with extensive heterogeneity in the results of individual trials (I^2^ = 74.6%, *p =* 0.008, Fig. [4](#Fig4){ref-type="fig"}). In order to diminish the heterogeneity, a subgroup analysis was performed based on different type of RASI for comparison which led to a nearly 70% decrease of I^2^ while did not affect the association of ACEI/ARB with lower risk of heart failure events (0.22, 0.38 to 0.78; *p =* 0.001; I^2^ = 0.0%, *p =* 0.51). There were no significant differences between ACEI/ARB and placebo or active agents therapy on the outcomes of myocardial infarction (1.0, 0.45 to 2.22; I^2^ = 0%, *p =* 0.71), stroke (1.16, 0.69 to 1.96; I^2^ = 0%, *p =* 0.60) and cardiovascular death (0.89, 0.64 to 1.26; I^2^ = 0%, *p =* 0.81) (Fig. [5](#Fig5){ref-type="fig"}).Fig. 2Effect of ACE-Is or ARBs compared with placebo or other active agents on cardiovascular events Fig. 3Subgroup analysis for the relationship between CVE and the use of ACEI/ARB Fig. 4Effect of ACE-Is or ARBs compared with placebo or other active agents on heart failure Fig. 5Effect of ACE-Is or ARBs compared with placebo or other active agents on myocardial infarction, stroke, CV motality and total mortality All-cause death {#Sec8} --------------- Eight studies reported 122 deaths in 873 patients with ACEI/ARB treatment (14.0%) and 143 deaths of the 873 patients with placebo or active agents therapy (16.4%) \[[@CR8]--[@CR11], [@CR14], [@CR18]--[@CR20]\]. Overall, ACEI/ARB therapy did not reduce all-cause mortality of dialysis patients (0.94, 0.75--1.17) (Fig. [5](#Fig5){ref-type="fig"}). Subgroup analyses showed that the association between ACEI/ARB therapy and risk of all-cause mortality was not modified by different control group, RASI category, dialysis mode, follow-up year, sample size and patient age (all *p* for heterogeneity \>0.05, Additional file [1](#MOESM1){ref-type="media"}: Figure S1). Decline of residual renal function {#Sec9} ---------------------------------- Data regarding the effects of ACEI/ARB on renal function were available from 5 trials \[[@CR11], [@CR14]--[@CR17]\], including 1 trial (*n* = 82) conducted in hemodialysis patients and 4 in peritoneal dialysis patients (*n* = 170). The average residual GFR declined by 1.44 ml/min per 1.73 m^2^ in the ACEI/ARB group versus 2.37 ml/min per 1.73 m^2^ in the placebo or active control group. The average decline in residual GFR was 0.93 ml/min per 1.73 m^2^ (95% CI, 0.38 to 1.47 ml/min per 1.73 m^2^) less in patients receiving ACEI/ARB than in placebo or active control group patients (*p* \< 0.001) with no evidence of heterogeneity (I^2^ = 0%, *p =* 0.65) (Fig. [6](#Fig6){ref-type="fig"}).Fig. 6Change of GFR in ACEI/ARB group versus placebo or other active agents group Three studies including 158 participants reported the changes in urine volume between ACEI/ARB and placebo or active control therapy \[[@CR11], [@CR17], [@CR18]\], and found ACEI/ARB treatment was a borderline significant factor in delaying the decline in urine volume: MD 167 ml, 95% CI 21 ml to 357 ml; *p =* 0.08) (Additional file [2](#MOESM2){ref-type="media"}: Figure S2). Adverse events {#Sec10} -------------- Data on adverse events potentially associated with treatment were collected from these studies but were inconsistently reported (Table [3](#Tab3){ref-type="table"}). Overall, ten trials reported at least 1 adverse event. Compared with control, ACE-I/ARBs therapy did not clearly increase the risk of hyperkalemia (1.29, 0.76 to 2.17), hypotension (1.03, 0.73 to 1.45) or cough (2.63, 0.00 to 39,507).Table 3Adverse events reported in the included RCTsAdverse EventsStudies Reporting (n)ACEI/ARB Group (n/n)Control Group (n/n)RR (95% CI)*P* ValueHyperkalemia533/60424/6051.29 (0.76,2.17)0.34Hypotension554/60454/6051.03 (0.73,1.45)0.87Cough23/750/772.63 (0.00,39,507.62)0.84 Risk of bias {#Sec11} ------------ Formal statistical testing showed no evidence of publication bias for major cardiovascular events (Begg's test *p =* 0.87), which was displayed in Additional file [1](#MOESM1){ref-type="media"}: Figure S3. Discussion {#Sec12} ========== The management of ACEI or ARB in dialysis patients has been an area of intense debate over recent years. In this large quantitative systematic review comprising of 11 trials and 1856 individuals, we demonstrated RAS-Is' renoprotective effect in patients undergoing dialysis, especially in peritoneal dialysis patients. Subgroup analysis showed ARB treatment exhibited an effect of cardiovascular protection and reduced the risk of heart failure in this population, which appeared to be independent of BP control. No significant difference was observed on the risk of adverse events. Our study provides evidence supporting the protective effect of ACEI or ARB in dialysis patients, especially ARB therapy. Recent studies have indicated that ACEI or ARB may reduce the rate of CVEs in patients with dialysis, but evidence provided by some studies were underpowered and yielded inconsistent results \[[@CR8]--[@CR10]\]. A large RCT by Suzuki suggested that patients undergoing long-term hemodialysis with ARB have fewer CVEs \[[@CR10]\]. In contrast to these beneficial effects of ACEI or ARB on the prevention of CVEs, FOSIDIAL study and OCTOPUS study showed the use of ACEI/ARB did not reduce the incidence of CVEs \[[@CR9], [@CR19]\]. In this meta-analysis, no association between ACEI or ARB treatment and fewer CVEs or lower mortality was found. The reason for the decreased relative risk reduction in dialysis patients compared to those with varying degrees of impaired kidney function but not yet dialysis dependent may reflect differences in the distribution of CVEs \[[@CR21], [@CR22]\]. Some cardiovascular risk factors in patients on dialysis include disorders of calcium-phosphate and parathyroid hormone, fluid volume overload, anemia, hyperkalemia, increased oxidative stress, and chronic inflammation \[[@CR23]--[@CR27]\]. Many dialysis patients have more than one of these risk factors, leading to an even higher risk of adverse outcomes. These confounding factors could modify the beneficial effect of RAS blockade. These may explain the observations made regarding the negative effect of the ACEI and ARB on cardiovascular disease which was the major determinant of mortality in patients with dialysis. Subgroup analysis did show that ARB clearly reduced the risk of CVEs including heart failure, suggesting ARB use may still confer benefits to these individuals. Effectiveness of ACEi and ARB in reducing heart failure was only assessed in 4 studies, two of which were negative, thus whether ARB is superior to ACEI in reducing cardiovascular event rates couldn't be conclusively determined. So far only one head to head study, comparing the effect of ARB and ACEI, did not find ARB to be preferred in dialysis patients at high risk of CVEs \[[@CR28]\], however the sample size was relative small. Also, the large study of Fosinopril in Dialysis (FOSIDIAL) evaluated the effect of ACEI on CVEs in our analysis included nearly 400 patients on hemodialysis with relative higher prevalence of left ventricular hypertrophy at baseline in the ACEI group compared with the control group \[[@CR9]\]. There was not a significant reduction of CVEs risk by fosinopril detected in the FOSIDIAL study. Therefore, studies with large samples are strongly recommended to confirm the effect of ACEI or ARB on cardiovascular events. This large and comprehensive meta-analysis in people undergoing dialysis has confirmed the residual renal function protective effects of RAS-Is, especially in patients with peritoneal dialysis. Evidence from Lavoie et al. shows that ARB plays an important role in the amelioration of the development of fibrosis and increasement of peritoneal transport in PD patients, which is in line with reports from some individual studies \[[@CR29]\]. Of note, these results are mainly driven by the studies with PD patients, only one study conducted in HD patients \[[@CR11]\]. Differences in hydration potentially have impacted the RRF in HD patients. PD and HD may have different effects in terms of fluid volume changes, cardiovascular stability, hydration, and inflammation, which potentially could modify the renoprotective effects of RAAS blockade. Safety is an important concern with the use of ACEI/ARB in dialysis patients. Previous studies in patients on dialysis showed RAAS-blocking agents therapy was associated with higher risk of developing hyperkalemia and experiencing symptomatic hypotension \[[@CR30], [@CR31]\]. Importantly, in the present meta-analysis, we found the incidence of hyperkalemia was not increased in the ACEI/ARB therapy group.In addition the adverse events including hypotension and cough were distributed evenly between ACEI /ARB and control groups. Hence, it seems safe to use ACEI or ARB agents in this patient population. Our review had a number of strengths. We compared not only cardiovascular outcomes but also residual renal function progression in dialysis patients, including patients on hemodialysis and peritoneal dialysis. Several reviews have evaluated the effect of RASI in dialysis patients. However, these overviews were conducted a few years before without the new trials. A previous systematic review conducted 7 years ago by Davina et al. assessed the cardiovascular outcomes only in 837 hemodialysis patients \[[@CR32]\]. Another one conducted by Akbari et al. in patients receiving peritoneal dialysis lacked statistical power to make a definitely determine the effect of RASI with on hard endpoints \[[@CR33]\]. Our study does, however, have limitations. Firstly, the majority of studies have been conducted in China or Japan, which has limited the possibility to generalize the results. Secondly, the sample sizes of trials of direct comparison for ACE inhibitors or ARBs were too small to detect a significant difference. The observed different effect between ACEIs and ARBs by indirect comparison should be interpreted with some caution. Thirdly, existence of potential confounding factors could not be excluded. For example, the control group is not homogeneous as it consists by other active agents or placebo, so that different agents might not have the same risk-benefit ratio in patients with dialysis. The limitations of the current study mean that high-quality RCTs with a large sample size are still needed to reliably emphasis the efficacy of ACEIs and ARBs in patients on dialysis. Conclusion {#Sec13} ========== This study demonstrates that ACEIs and ARBs therapies decrease the loss of residual renal function, mainly for patients with peritoneal dialysis. Overall, ACE-Is and ARBs do not reduce cardiovascular events in dialysis patients, however, treatment with ARB seems to reduce cardiovascular events including heart failure. ACE-Is and ARBs do not induce an extra risk of side effects. The clinical significance of the results requires confirmation with further studies. Additional files ================ {#Sec14} Additional file 1: Figure S1.Subgroup analysis for the relationship between all-cause mortality and the use of ACEI/ARB. (PPTX 73 kb) Additional file 2: Figure S2.Change of urine volume in ACEI/ARB group versus placebo or other active agents group. (PPTX 70 kb) Additional file 3: Figure S3.Funnel plots with pseudo 95% confidence limits for CVEs among the included trials. (PPTX 48 kb) Additional file 4:Search strategy. (DOCX 18 kb) ACEIs : Angiotensin-converting enzyme inhibitors ARBs : Angiotensin receptor blockers CI : 95% confidence intervals CKD : Chronic kidney disease CVE : Cardiovascular event ESRD : End-stage renal disease GFR : Glomerular filtration rate HD : Hemodialysis HR : Hazard ratio PD : Peritoneal dialysis RCTs : Randomised controlled trials RR : Risk ratio RRF : Residual renal Function **Electronic supplementary material** The online version of this article (doi:10.1186/s12882-017-0605-7) contains supplementary material, which is available to authorized users. Not applicable. Funding {#FPar1} ======= This study is supported by the National Natural Science Foundation (81600553) and the General Hospital of Tianjin Medical University Youth Incubation Foundation (ZYYFY2015001). Availability of data and materials {#FPar2} ================================== All datasets analyzed in this systematic review are referenced in the manuscript, its Additional files [1-](#MOESM1){ref-type="media"} [3](#MOESM3){ref-type="media"} Figures S1-S3 and Additional file [4](#MOESM4){ref-type="media"}. Authors' contributions {#FPar3} ====================== YTK conceived and designed the study. LYX and MXX screened the full text, performed statistical analyses, and drafted the manuscript. ZJ and JJY performed data extraction and quality assessment. All authors read the manuscript and approved the final version. Competing interests {#FPar4} =================== The authors declare that they have no competing interests. Consent for publication {#FPar5} ======================= Not applicable. Ethics approval and consent to participate {#FPar6} ========================================== Not applicable. Publisher's Note {#FPar7} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
875 F.2d 857 Mayv.Hoke (Robert) NO. 88-2520 United States Court of Appeals,Second Circuit. APR 13, 1989 Appeal From: E.D.N.Y., 711 F.Supp. 703 1 AFFIRMED.
Q: Why is "ailer" not a word? I was playing Scrabble recently and the word ail was on the table. I tried to add an -er to the word to make the word "ailer." My reasoning was that since ail is a verb, one could add a suffix to the word to describe "one who ails." The word was challenged and removed since it is apparently not a word. A "jumper" is one that jumps. A "renter" is one that rents. A "maker" is one that makes. Why is "ailer" not someone that ails? A: Scrabble's standard for what constitutes a word, as Janus Bahs Jacquet notes in a comment, is whether or not it appears in a dictionary. For organized play, specifically, the word must appear in an official dictionary currently published by Merriam-Webster; various other dictionaries have been used in the past. This is rather different from a writer's definition, or a grammarian or other linguist's definition of what constitutes a word. No dictionary can contain every possible variation of every possible valid word. Modern dictionaries do attempt to include words and meanings as they are commonly used; there is a long editorial process of identifying new words, finding evidence for their meanings, and choosing whether or not to include them. But while ailer is superficially analogous to, say, wailer, it is not in common use. I did not turn up a single example in COCA or the BNC, and the only examples I found in Google Books after 1900 are names or transcription errors. Given publishing constraints, a word that may be understood in context, but is rarely ever encountered, may be excluded from dictionaries uncontroversially. Lastly, as John Lawler alludes, the fact that jumper or maker exists does not require that ailer also be accepted universally. One may be a sufferer, but not really a convalescer. Or someone who was ailing and is recovering may be a survivor, which brings up the point that the same sound may be represented differently in the written word; see What’s the rule for adding “-er” vs. “-or” when nouning a verb?, Pedlar vs. peddler and other questions tagged as agent-noun-suffix. Perhaps the Official Scrabble Players Dictionary does list it— but as ailor. [Rhetorical point. It doesn't.] A: Ail, like itch, cannot be turned into a noun by tacking on the -er suffix, because the verbs express 'being passively in a state', whereas the core idea of '-er' is 'engaged in, doing'. P.S. But how about sufferer? I think the occupational or vocational meaning of the -er suffix has been broadened to mean 'one who is a member of a group with a defining characteristic'. Consider the American neologism birther, i.e. "one who claims that President Obama was not born on US soil." Thus, a sufferer is not simply "*one who suffers" but one who is a member of a group with a particular disease, a gout-sufferer, a shingles-sufferer. We do not hear the word unaccompanied by the condition suffered. Consider also that there is no ambiguity with the word freezer among native speakers. A freezer is an appliance that causes other things to become frozen, not "*a thing which becomes frozen".
HARTFORD, CT—Admitting that he was unlikely to accomplish anything despite giving his best effort, local claims adjuster David Furman told reporters Thursday that he had effectively chalked up the day as a loss by 10:15 this morning. “I took a decent crack at it, but ultimately I’m gonna have to write today off,” said Furman, who reportedly started losing hope for the day approximately 45 minutes after arriving at work. “I did all I could to get some momentum going, but after 15 minutes of answering emails at my desk I just knew this day was beyond salvaging. Oh, well, there’s always tomorrow. I’ve done all I can.” Furman confirmed that he wasn’t overly discouraged, however, as he had already chalked up the entire week as a loss by Tuesday afternoon. Advertisement
/*============================================================================= Copyright (c) 2001-2008 Joel de Guzman Copyright (c) 2001-2008 Hartmut Kaiser http://spirit.sourceforge.net/ Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) =============================================================================*/ #ifndef BOOST_SPIRIT_DEPRECATED_INCLUDE_META #define BOOST_SPIRIT_DEPRECATED_INCLUDE_META #include <boost/version.hpp> #if BOOST_VERSION >= 103800 #if defined(_MSC_VER) || defined(__BORLANDC__) || defined(__DMC__) # pragma message ("Warning: This header is deprecated. Please use: boost/spirit/include/classic_meta.hpp") #elif defined(__GNUC__) || defined(__HP_aCC) || defined(__SUNPRO_CC) || defined(__IBMCPP__) # warning "This header is deprecated. Please use: boost/spirit/include/classic_meta.hpp" #endif #endif #if !defined(BOOST_SPIRIT_USE_OLD_NAMESPACE) #define BOOST_SPIRIT_USE_OLD_NAMESPACE #endif #include <boost/spirit/include/classic_meta.hpp> #endif
package com.wjx.android.wanandroidmvvm.common.callback import com.kingja.loadsir.callback.Callback import com.wjx.android.wanandroidmvvm.R /** * Created with Android Studio. * Description: * @author: Wangjianxian * @date: 2020/02/25 * Time: 19:26 */ class EmptyCallBack : Callback() { override fun onCreateView(): Int = R.layout.layout_empty }
A. J. S. Lakshmi Shree A. J. S. Lakshmi Shree is a Bangalore-based Indian visual artist. A child prodigy, Lakshmi started painting at the age of two. Aged five, approximately 100 of her paintings were displayed at 2001 Bangalore Festival of Art. Lakshmi was congratulated by then Prime Minister of India Dr Manmohan Singh in 2007. Early life Lakshmi, born to Mr Jayaprakash A.G.K and Mrs A. Suma Prakash received early recognition. With support from her parents, she exhibited her work at the Kannada Bhavan, the Venkatappa Art Gallery, Ravindra Kalakshetra and the Gandhi Bhavan at a very early age. She has received over 340 medals, trophies and citations at local, regional, national and international level. Awards and recognition National level “ Balashree" award by National Bal bhavan Delhi 2012,Vigyan Bhavan, New Delhi. 29 January 2015. Given by HRD Minister Smt.Smriti Zubin Irani Winner for Paint For the Planet Competition at age of 12. Her painting was exhibited at an exhibition at UN Headquarters ART Center for Children and young people, HYVINKAA,FINLAND – seelcted for international art exhibition, Diploma award – 2014 Third prize in an international children's painting competition supported by the UNEP at age of 8 Regional Winner at Be The Inspiration Painting Contest Young Achievers Award by Infosys in Arts Third prize at DH PV Painting Contest FAI Switzerland young artist winner in 2005 Winner at Dino Art Contest by Sam Noble Oklahoma Museum of Natural History First Runner up at Westminster's International Design Challenge 2015–2016 for 'A collective challenge to transform 100 public spaces' Director of Goleniow Culture House prize at international painting competition organised by UNESCO and Goleniowski Dom Kultury, Poland References Category:21st-century Indian artists Category:Artists from Bangalore Category:Living people Category:1996 births
DESCRIPTION (Adapted from the application) The Cell Biology Core is designed to carry provide a number of services. First, it will provide fluorescent microscopy facilities for study of living cells using digital imaging and confocal microscopy. Second, it will provide electrophysiology facilities including single cell recordings and patch clamp facilities. Third, it will provide isolated single cell preparations for investigators. Fourth, it will facilitate access to flow cytometry through an arrangement with a shared flow cytometry resource. The overall aims are to provide access to highly specialized techniques and equipment, to train center personnel in the use of these techniques, to promote collaborative arrangements, and to devise new techniques.
(1). Field of the Invention This invention relates to a data transfer apparatus or a data transfer system for arbitrating a plurality of I/O ports in data transfers, specifically to a data transfer apparatus or a data transfer system which transfers stream data in certain units between a plurality of I/O ports and a plurality of corresponding storage areas with the DMA (Direct Memory Access) method. (2). Description of the Prior Art Data transfer systems, which input/output stream data such as video data to/from a plurality of users, provide a demand-type service in which specified pieces of stream data are transferred based on transfer requests specifying users. Such data transfer systems include mass storages such as HDDs (Hard Disk Drives) or optical disk drives for storing large amounts of stream data. A piece of stream data specified by a user is transferred from the mass storages via a channel, or vice versa. The channels are achieved by I/O ports which are respectively assigned to the users and used for transferring the stream data. FIG. 1 is a block diagram showing a conventional data transfer system. The conventional data transfer system is composed of CPU 10, memory 11, system bus 12, SCSI interface 13, HDDs 14a, 14b, 14c, and 14d, and stream interfaces 50a, 50b, 50c, and 50d. The drawing also shows external units: video monitors 16a, 16b, and 16c, and video cassette recorder 17. CPU 10 generates commands required for transferring specified pieces of stream data based on the transfer requests for respective users and stores the commands in memory 11. CPU 10 also transfers the commands from memory 11 to stream interface 50a, 50b, 50c, or 50d. Memory 11 stores the commands generated by CPU 10 and temporarily stores stream data during data transfers. System bus 12 is connected to CPU 10, memory 11, system bus 12, SCSI interface 13, and stream interfaces 50a, 50b, 50c, and 50d and is used for transferring the stream data and the commands between these units. System bus 12 is achieved, for example, by a PCI (Peripheral Component Interconnect) bus which is a local bus standard. The bus width of the PCI bus is 32 bits or 64 bits and the operating frequency is 33 MHz. When the bus width is 32 bits and the operating frequency is 33 MHz, for example, the data transfer performance of the PCI bus is 133 MB/s. SCSI interface 13 is connected to system bus 12 and HDDs 14a, 14b, 14c, and 14d. SCSI interface 13, on receiving a command from CPU 10 which is required for transferring stream data, transfers the stream data between memory 11 and each HDD via system bus 12, based on the command. HDDs 14a, 14b, 14c, and 14d store stream data. Stream interface 50a is connected to system bus 12 and video monitor 16a. Stream interface 50b is connected to system bus 12 and video monitor 16b. Stream interface 50c is connected to system bus 12 and video monitor 16c. Stream interface 50d is connected to system bus 12 and video monitor 16d. Each stream interface, on receiving a command required for transferring the stream data from CPU 10, transfers the stream data between memory 11 and each external unit via system bus 12, based on the command. The connection between each stream interface and each external unit conforms to, for example, IEEE1394 which is a standard for serial digital transfer. The IEEE standard allows data transfer at a rate of 100 Mbps at the maximum. That means, it has enough capacity for transferring image information at a rate of 30 Mbps. In general, the SCSI interface 13 and the stream interfaces use the DMA transfer method for transferring data. Japanese Laid-Open Patent Application No.5-151146 ("DMA Transfer Method") discloses a DMA transfer method. This conventional technique includes a means for tracing an address and a data length for the data transfer next in order so that a plurality of DMA transfers are executed with only one activation of CPU. Such a "chained" DMA transfer is suitable for sequentially transferring a large amount of high bit-rate stream data, such as image information. Japanese Laid-Open Utility Model No.3-54058 ("DMA Control Circuit") discloses a method for DMA-transferring data between an input/output unit and a memory which is managed with the virtual storage method. Note that the term "DMA-transferring" used in the present description indicates transferring data with the DMA (Direct Memory Access) method. This conventional technique discloses executing a "chained" DMA transfer which enables a sequential transfer of data stored in the memory managed by the virtual storage method. Japanese Laid-Open Patent Application No.6-250965 ("Input/Output Control Apparatus") discloses a method for DMA-transferring data between a plurality of input/output units and a memory. This conventional technique discloses holding of a plurality of commands and a status, which improves the effectiveness of the process. Japanese Laid-Open Patent Application No.5-334232 ("DMA Transfer Control Apparatus") discloses a method for DMA-transferring data between a plurality of input/output units and a memory achieved by a DRAM (Dynamic Random Access Memory device). This conventional technique discloses presetting of the number of accesses, which balances the amounts of data transferred by the plurality of input/output units and the memory, increasing the memory accesses in the high-speed access mode which is provided by the DRAM, and improving the effectiveness of the data transfer. The above conventional data transfer system has the following characteristics. Firstly, for the data transfers between an HDD and a memory or between a memory and a stream interface, the stream data, which is stored in sequence, is read in units of blocks. This increases the effectiveness in data reading, increases the amount of data processed for each data reading, and increases the data transfer rate as a whole, where the data transfer rate indicates the amount of data transferred per unit time. For example, data transfer rate of 20 MB/s is achieved by an HDD with an interface conforming to the Fast Wide SCSI standard. Accordingly, the above effects reduce the time period during which the system bus is occupied by a data transfer, resulting in an effective use of the system bus. Secondly, the data transfer rate in each channel is lower than that for data transfer between an HDD and a memory or between a memory and a stream interface. For example, the data transfer rate for image information compressed under the MPEG1 standard is 1.5 Mbps (=0.1875 MB/s). Also, the data transfer rate for compressed high-quality image information is about 30 Mbps (=3.75 MB/s). The above data transfer rates indicate that a plurality of pieces of image information can be transferred in parallel by one data transfer system. Such image information is managed in units of frames. Generally 30 frames of image information correspond to the images reproduced in one second. Also, frame pulses are used for indicating each separated frame. However, the above conventional technique has a few problems. That is, it is impossible for the conventional technique to secure that each piece of the stream data is output to each of a plurality of I/O ports in real time. Also, a display image is disturbed if the transferred image information is broken for more than a certain time period. Especially, this tends to happen when a plurality of pieces of image information are output.
Exposing a longstanding lie blunt even by his standards, President Trump on Sunday confessed by tweet that the purpose of the June 9, 2016 Trump Tower meeting between his campaign and a Kremlin-linked lawyer was “to get information on an opponent, totally legal and done all the time in politics.” It was left to his lawyer Jay Sekulow to try to clean up the mess. Addressing whether the meeting constituted a criminal violation, Sekulow told George Stephanopoulos on ABC’s “This Week” that “you have to look at what laws, rules, regulations, statutes are purportedly violated here.” So let’s do that. Meeting with a foreign power to get assistance with a presidential campaign is not totally legal; special counsel Robert S. Mueller III almost certainly could indict Donald Trump Jr. today for what is publicly known about the meeting; and the president should be deeply concerned about his own liability. Mueller’s February indictment of the Internet Research Agency, and associated Russian entities and individuals, charged a conspiracy to influence the election to damage Hillary Clinton, Sens. Ted Cruz and Marco Rubio, and support Bernie Sanders and Donald Trump — let’s call it an electioneering conspiracy. The indictment charged violations of 18 U.S. Code § 371 — conspiracy to commit an offense against, or to defraud United States. The Trump Tower meeting clearly fits established definitions of “conspiracy to defraud the United States.” Under the “defraud clause,” as precedent and the U.S. Attorneys’ Manual make clear, the statute criminalizes “any conspiracy for the purpose of impairing, obstructing or defeating the lawful function of any department of government,” even if the object of the conspiracy is not a criminal offense. According to Mueller’s indictment, the conspiracy sought to defraud the Federal Election Commission and the Department of Justice — the agencies charged with preventing foreign nationals from making contributions, donations or expenditures (which can include not just money, but any “thing of value”) that would influence U.S. elections. Conspiracy law, it’s important to note, punishes the act of agreeing to a forbidden goal regardless of whether that goal is achieved. So long as the government can establish that targets agreed to pursue the conspiratorial objective, they may be prosecuted as co-conspirators. Conspirators need only agree to help bring about the object of a conspiracy even if they are not aware of all the details of the conspiracy itself. For example, in “chain-conspiracies” usually involving narcotics, lower-level buyers and sellers are included in larger distribution conspiracy so long as they have some understanding of the existence of the larger plot. The Trump Tower meeting clearly fits established definitions of “conspiracy to defraud the United States.” In early June, Trump Jr. received an email explaining that a Russian government official wanted to provide his father’s campaign with incriminating documents and information about Clinton as part of “Russia and its government’s support for Mr. Trump.” Trump Jr. replied, “if it’s what you say I love it especially later in the summer.” The June 9 meeting was confirmed two days earlier, on June 7. That night, Trump announced that he would “give a major speech” in the next week to discuss “all of the things that have taken place with the Clintons.” On the face of it, Trump Jr. was approached by a foreign government seeking to influence an American election. Trump Jr. welcomed the possibility of influence, and candidate Trump’s actions, while circumstantial, indicate that he intended to make use of that information. It is irrelevant, in conspiracy law, that Trump Jr. found the information ultimately worthless, or as Trump said, that “it went nowhere.” Enter the Fray: First takes on the news of the minute from L.A. Times Opinion » Michael Cohen’s allegations last week must have deeply terrified the president and those looking out for his legal interests. Cohen, the president’s former lawyer and “fixer,” reportedly is willing to tell Mueller that he was in the room when Trump heard about and approved the June 9 meeting. That would potentially place the president at the center of the decision to join the electioneering conspiracy. Trump’s later documented effort to dictate a false statement about the meeting looks like an attempt to cover up his culpability. A prosecutor and jury are entitled to view a cover-up as evidence of participation in the conspiracy. More than one year after telling the world that the June 2016 meeting was about adoptions, Trump and his eldest son stand stripped of their false cover. There is no more denying that the meeting sought to enlist the help of a hostile power to swing the election Trump’s way. The effort and the false statements about it were plainly deplorable. Whether they also were illegal turns on questions of law that Trump cannot obfuscate or control. They are what they are. Mueller already has laid the legal predicate for the Trumps’ guilt. Trump is at last playing in a legit game, and his hand is weak. Harry Litman, a former deputy assistant attorney general, teaches constitutional law at UC San Diego. David Lieberman, a former Massachusetts assistant attorney general, is a lawyer with the Whistleblower Law Collaborative. Follow the Opinion section on Twitter @latimesopinionand Facebook
Detection of loco-regional recurrence after breast-conserving surgery and radiotherapy. This study evaluates the incidence, pattern and mode of detection of loco-regional recurrence (LRR) after conservative surgery for invasive breast cancer. Over an 11-year period, 354 patients were treated with wide local excision, axillary sampling and radiotherapy to the remaining breast. LRR occurred in 33 patients (9.3%). Local recurrence (LR) in the conserved breast occurred in 73% (24/33)of the patients while regional recurrence (RR) accounted for 9% (3/33). There were 6 (18%) patients with both local and regional recurrence. Recurrence was detected clinically in 85% (28/33) and mammographically in 15% (5/33) Of those patients who have had their recurrences detected clinically 61% (17/28) have died. None of the 5 patients with mammographic recurrences have died. Patients who develop LR after conservative surgery do better if the lesion is detected mammographically compared with those detected clinically (P < 0.03, Fisher's exact test). Mammography, in addition to regular clinical review, is an important aspect of the follow-up protocol after breast conserving surgery.
Otakar Votík Otakar Votík was a Czechoslovak rower. He competed at the 1920 Summer Olympics in Antwerp with the men's eight where they were eliminated in round one. References Category:Year of birth missing Category:Year of death missing Category:Czechoslovak male rowers Category:Olympic rowers of Czechoslovakia Category:Rowers at the 1920 Summer Olympics
Greek-Turkish borders: Video shows Turkish soldiers beating immigrants who try to go back As new clashes take place in the Kastanies of Evros, with the Turkish police throwing tear gas grenades into the Greek side, a new video comes to light. This video shows Turkish soldiers beating illegal immigrants who want to return to Turkey and they are pushing them to the border.
Q: Typing on input field in an iframe causes the iframe to scroll to the bottom I have to display a full-screen modal containing an iframe with a form with input text fields. I already got the iframe to display and scroll correctly. However, when I start typing on the input fields, the whole iframe scrolls all the way to the bottom, so you can't see what you're typing on the fields. It only scrolls when you start typing, not on focus. This occurs on iOS Safari or Chrome and not on Android devices. Also note that the issue doesn't occur if I scroll to the bottom a bit, so that the input field is at around the vertical center of the screen (i.e. upper half of the screen), before tapping and typing on the field. <body> <!-- some contents --> <div class="wrapper"> <iframe src="http://iframe.com" /> </div> </body> body { position: fixed; // I only set this to fixed via JS when modal pops-up } .wrapper { -webkit-overflow-scrolling: touch; position: fixed; overflow-y: scroll; left: 0; right: 0; top: 0; bottom: 0; } iframe { width: 100%; height: 100%; z-index: 99999; } Any help and pointers is appreciated. Thanks! A: Fixed it by setting the wrapper to position: absolute instead of fixed, and setting the following CSS to html and body. html, body { margin: 0; height: 100%; overflow: hidden; } Wrapper CSS now looks like this: .wrapper { position: absolute; top: 0; left: 0; width: 100%; }
null null
Rifle and Reel Adventures in Middletown, MD Bird hunt with Rifle & Reel Adventures in Frederick Maryland on our own private farm. Enjoy a day of hunting rolling hills, open fields, timber cover - a traditional upland game terrain found just a short distance away from Washington, D.C. Intro to Upland Game Instructional Package This upland game package is great for kids and adults who want an introduction to the sport of upland game hunting. Learn about the game birds and their habitat, how to navigate a field, shooting etiquette, field dog safety, in-field shooting instruction, and cleaning of birds. Package includes four (4) hours of instruction and field time, five released birds (per hunter), instructor and field dog. Groups do not exceed four hunters. Sunday hunting permitted. COST $250.00 instruction / field fee + the cost of birds Additional Hunters $150.00 Additional birds available for purchase Guided Hunt Packages This package includes a guide, field dog, and cleaning of birds. Groups do not exceed four hunters. Sunday hunting permitted. Package No. 1 Includes 30 Quail and one or two Hunters. $400.00 Additional Hunter add $40.00 Package No. 2 Includes 20 Chukar and one or two Hunters. $420.00 Additional Hunters add $40.00 Guided Hunts Make your own package This package includes a guide, field dog, and cleaning of birds. Groups do not exceed four hunters. Sunday hunting permitted. COST $125.00 one or two Hunters Cost includes guide. Birds additional. Additional Hunters add $40.00 When booking your hunt, please indicate the number of birds you would like from the selection below.
The generation of energy in a clean, renewable and readily available manner is a substantial concern to governments, individuals and research bodies around the world because of the difficulty in securing sufficient fuels to meet rising energy demand and the many environmental hazards associated with the generation of power and the acquisition of fuel stocks. One need only consider the Middle East or the tailpipe of an automobile to begin to appreciate the problems involved with the current approach to energy generation. Solar energy has for decades been of great interest to scientists and politicians in search of a clean, safe energy supply. It has been estimated that the energy supplied by the Sun to the Earth each year is approximately 3×1024 joules of energy, or 10,000 times more than humanity's current energy use. The ability to harness just a fraction of that energy would create a sea-change in our energy markets and our environmental outlook. Solar power, however, has not proved the panacea it perhaps at first appeared. Beginning with the Shockley-Queisser limit, first calculated in 1961, scientists have found that the Sun gives up her energy to man—at least for conversion to electricity—rather stubbornly. The history of solar energy is one of expensive manufacturing techniques and low quantum efficiency. Some impressive innovations have occurred though. Professor Gratzel's 1990 dye-sensitized solar cell, for example, showed that the conversion of solar energy to electrical energy could at least be done using inexpensive materials and safe manufacturing processes, albeit at relatively small quantum efficiencies. There is still, however, a significant need for innovations that improve upon the current techniques used to convert sunlight to electricity. Most efforts directed to developing such innovations have so far been directed toward investigating new materials or manufacturing techniques that would increase the quantum efficiency of solar cells. But these have experienced only limited success, and in any event have heretofore resulted in the use of costly, exotic materials, raising their own environmental concerns, and that are unlikely to improve significantly upon the price per watt of current solar cells or be capable of mass commercialization. While such research may eventually result in useful advances, new directions of innovation are needed.
Steven Crowder takes to the streets once again to have real conversations with real people on hot-button issues. In his most triggering edition yet, Steven dispels the myth of "Rape Culture." So many feathers ruffled over this one. But sorry not sorry, rape culture isn't real. Maybe we'd believe people when they said "rape culture is real!" if they didn't make everything about rape, then ignore actual rape culture in other countries. Or if they had, like, facts and stuff. Like this video? Check out other Change My Mind episodes: NOT SUBSCRIBED TO THE PODCAST? FIX THAT! IT’S COMPLETELY FREE ON BOTH ITUNES HERE AND SOUNDCLOUD HERE.
Burris fullfield e1 3-9x40 manual treadmill The 39x40 has been Rated 5 out of 5 by Danny from I have used this particular Fullfield E1 Riflescope 6. 520x50mm burris Fullfield E1 Riflescope 6. 5 Check great and honest reviews! LOW PRICE on Burris 3x9x40mm Fullfield II Ballistic Plex E1 Riflescope ON SALE,. Burris Rifle Scopes. Find great deals on eBay for burris 39x50. Shop with confidence. Skip to main content. Plus, learn how is it different to the new Fullfield E1. Jul 11, 2016 Buy Now Burris 39 x 40mm Fullfield II Ballistic Plex Rifle Scope promo. Find LOW PRICE on Burris 3x9x40mm Fullfield II Ballistic Plex E1 Riflescope ON SALE,. Burris Rifle Scopes. Rated 5 out of 5 by spch from fullfield E1 39x40 i I bought a rifle with the Burris Fullfield E1 scope I was wondering if I can get an owners manual for Burris Fullfield II 39x40mm review. This is an older review of a Burris scope that was one of the earlier scopes to incorporate a BDC into the reticle. 116 of 31 results for" Burris Fullfield E1" Showing most relevant results. See all results for Burris Fullfield E1. Burris Fulfield E1 Riflescopes: 39x40. by Burris Fullfield E1 Rifle Scope Review. Posted on:. A popular hunting rifle scope over the years has been Burris' Fullfield II series of rifle scopes. The Burris Fullfield scopes were gamechanging when they first hit The Burris Fullfield E1 is the continuation of 27x35, 39x40, 39x50, 4. 514x42.
Q: Typescript Property does not exist on enum type I try to upgrade the typescript syntax of this lesson: https://medium.com/@martin_hotell/improved-redux-type-safety-with-typescript-2-8-2c11a8062575 . I want to get specific type from union type. I have such syntax: Actions['type'][ActionTypes.FEED_CREATE_POST] Type actions: type Actions = IActionWithPayload<ActionTypes.FEED_CREATE_POST, { text: string; files: any; }> | IActionWithPayload<ActionTypes.FEED_GET_NEWS, { loadMore: boolean; }> Property 'type': (property) type: ActionTypes.FEED_GET_NEWS | ActionTypes.FEED_CREATE_POST And the mistake is: Property 'FEED_CREATE_POST' does not exist on type 'ActionTypes.FEED_GET_NEWS | ActionTypes.FEED_CREATE_POST'. What's the problem and how can i change that? Typescript version 3.1.3 A: To get a specific type from a union you can't use a type query , you need to use the conditional type Extract type FeedCreate = Extract<Actions, IActionWithPayload<ActionTypes.FEED_CREATE_POST, unknown>>
EDIBLE WOMAN the key-references here are FUGAZI, KEPONE and most of all SHELLAC – but with their own identity and character in their sound (and not only because they use a saxophone as an additional element). www.ediblewoman.it
Shipping Information By law, Winetasting.com cannot currently ship wine to the following states: Alabama, Alaska, Arkansas, Delaware, Hawaii, Kentucky, Mississippi, Oklahoma, Rhode Island, South Dakota, Utah, Vermont and West Virginia. In most states, please allow 5-7 business days for processing and delivery. By law, we can only ship our house brands to Colorado, New York and Texas. Because individual state legal compliance is maintained on a per-product level, not all wines may be available in all states. Any applicable state taxes will be added. In some states, we are prohibited from offering any inducements or offers. Important Shipping Info By law, all wine deliveries must be signed for by an adult over the legal drinking age (21+). Therefore, we cannot leave packages on your doorstep, and we cannot ship to PO boxes. Standard delivery hours are Monday through Friday, 9 a.m. to 5 p.m. If it's difficult for you to be home during this time, we recommend shipping your order to your local UPS Store or FedEx Office. You may also consider having your order shipped to your business address or to a neighbor's home. The courier will make 3 attempts to deliver your order (once per day). After 3 attempts, the order will be returned to us. Shipping Rates Shipping charges are calculated separately for each delivery address. Standard shipping charges (FedEx Ground and UPS Ground) apply to all states where we can legally ship wine. Shipping Times New orders are typically processed within 1-2 business days. Once processed, standard ground shipping to most states takes about 5-7 business days. Except as noted below, we ship directly to the consumer via our Ohio and California warehouses, using common carriers UPS or FedEx. These carriers typically deliver during normal business hours (Monday through Friday from 9 a.m. to 5 p.m.). Two-Day Express and Overnight delivery may be available for additional fees; call for details. Items with stated longer delivery times cannot be expedited. Certain fine wines, including aged Cabernet and Bordeaux, are available in limited quantities and stored in our temperature-controlled Napa warehouse. To ensure that this wine reaches your doorstep in top condition, we may ship other wines in your order separately, over multiple days, from multiple warehouses. We appreciate your understanding of the time and care we take in assuring the provenance of your fine wine order. Substitutions Due to the nature of the fine wine business and the high quality of our wine selections, there is sometimes a finite amount of each wine produced. If your selected wine is sold out, we will contact you to assist in finding a comparable substitute of similar type and price. In the event you order a collection or promotional kit and an item is sold out, we reserve the right to substitute with a comparable wine in terms of taste and price. We will also make every effort to indicate this policy at the product level and indicate which items have been substituted. Shipping Limits by State State Limit District of Columbia 1 case/month Georgia 12 cases/year Idaho 24 cases/year Illinois 12 cases/year Indiana 24 cases/year Iowa 2 cases/month Louisiana 12 cases/year Minnesota 2 cases/year Missouri 2 cases/month Nebraska 1 case per month Nevada 12 cases/year New Mexico 2 cases/month New York 36 cases/year North Carolina 2 cases/month North Dakota 3 cases/month Ohio 24 cases/year Oregon 2 cases/month South Carolina 2 cases/month Virginia 2 cases/month Wisconsin 12 cases/year Wyoming 2 cases/year Other State Restrictions Florida: Florida sales tax to be remitted to state by purchaser. Click here for PDF of tax form. Michigan: Due to state regulations, we are prohibited from accepting any returns on wine delivered to Michigan. Required Legal Notice You must be 21 years of age or older to order. By placing your order with Winetasting.com, you certify under penalty of perjury that you and the recipient are at least 21 years old. The willful misrepresentation of your age or the age of the recipient is a crime in most states, and if you willfully misrepresent your age or the age of the recipient, Winetasting.com will cooperate with authorities to prosecute you to the fullest extent of the law. All deliveries of alcohol will require a signature and ID verification by an adult 21 years or older. Select wine products listed on Winetasting.com are sold and/or delivered by Ambrosia/WTN Cellars or a winery partner or an in-state licensee, and orders for such products are subject to the designated and permitted vendors' acceptance. All terms and conditions of sale, depending on the product purchased or the state in which the product is delivered to, are established by Ambrosia/WTN Cellars or the in state licensee and are binding on the purchaser. Due to various state regulations, we cannot ship to all 50 states. We are constantly adding new states as the laws changes and regulations permit. So if we don't ship to your state now, come back and check soon. By placing an order, you authorize us to act on your behalf to engage a common carrier to deliver your order to your selected destination via common carrier from the licensed entity.
Benvenuto Presidente Desidero porgere il benvenuto a Sua Santità Satguru Baba Ji e alla sua delegazione, presenti in tribuna d'onore. Sua Santità è la guida spirituale della Sant Nirankari Mission, nota anche come Fratellanza universale. La missione si fonda sulla convinzione che la vera religione unisca e non divida mai. Sua Santità è in visita in Europa e sta diffondendo il messaggio di umanità della missione come unica religione. La sua visita odierna al Parlamento e il suo incontro con il Presidente Pöttering rientrano nell'ambito dell'attuale missione di Sua Santità di costruire armonia e comprensione tra le culture e le religioni. Gli porgiamo il benvenuto e gli auguriamo un proficuo lavoro. (Applausi)
Q: Best way of filtering "what's new" data based on the version I'm creating a What's New page for a program that will show the user what's new only for the updates not already installed. For this I'm passing the program build date and version to an asp page that in turn will display the what's new text. My initial idea was to use a xml file and filter the results based on the version I get from the client but I would like to run by you guys this question to see if there's any more "elegant" solution available. Using a database is probably overkill and more difficult to update when a new version is released. Here's an example xml that shows how I might store the data. <?xml version="1.0"?> <whatsnew> <item version="6.0.0.100" date="19/02/2010"> <subitem> First public beta version. Blah blah blah.... </subitem> </item> <item version="6.0.0.200" date="21/02/2010"> <subitem> Second public beta version. Blah blah blah.... </subitem> </item> </whatsnew> What do you guys think would be the best way to store/display this what's new data, am I on the right track using xml? A: Your solution should work fine and is easy to understand and maintain. XML parsing/querying libraries are ubiquitous. I see no reason to over-complicate this with a database or a custom file format.
Deluxe Room, 2 Queen Beds, Accessible Hotel near Griffith Park, Greek Theater and Hollywood Sign A stay at Hollywood Hotel-The Hotel of Hollywood places you in the heart of Los Angeles, convenient to Barnsdall Art Park and Hollywood Walk of Fame. This hotel is close to Dolby Theater and TCL Chinese Theatre. Make yourself at home in one of the 127 individually furnished guestrooms, featuring refrigerators and LCD televisions. Your room comes with a pillowtop bed. Rooms have private patios. Wired and wireless Internet access is complimentary, while video-game consoles and satellite programming provide entertainment. Private bathrooms with shower/tub combinations feature designer toiletries and complimentary toiletries. Enjoy a range of recreational amenities, including an outdoor pool, a sauna, and a fitness center. This hotel also features complimentary wireless Internet access, concierge services, and gift shops/newsstands. If you're planning a day at a nearby theme park, you can hop on the shuttle (surcharge). Grab a bite from a grocery/convenience store serving guests of Hollywood Hotel-The Hotel of Hollywood. Quench your thirst with your favorite drink at a bar/lounge. Featured amenities include complimentary high-speed (wired) Internet access, a 24-hour business center, and limo/town car service. Event facilities at this hotel consist of a conference center, conference space, and meeting rooms. For a surcharge, guests may use a roundtrip airport shuttle (available on request) and a cruise ship terminal shuttle. Hotel Amenities Hotel Amenities Thoroughly renovated in 2011, the Hollywood Hotel-The Hotel of Hollywood near Universal Studio features a European-style lobby, lower-level lounge, a sauna on each guestroom floor, an outdoor pool, and a courtyard with a fountain. Roundtrip airport and cruise terminal shuttles are provided for a surcharge, on request. Complimentary breakfast, served each morning, includes eggs, sausage, pancakes, and cereal. A lobby kiosk offers high-speed Internet access (surcharge). The pool area is open all seasons. Hours of operation vary. The pool area is closed for approximately one month each year, typically one month between December and February, for scheduled maintenance. The pool is not heated year-round. Pool access is restricted to registered guests. The Hollywood Hotel-The Hotel of Hollywood near Universal Studio does not have its own restaurant, but there are several dining options within the surrounding area. The hotel director recommends the restaurants listed below. Entertainment The Hollywood Hotel has complimentary comedy nights in the bar/lounge for hotel guests. Check front desk for schedule. Nearby Things to Do An outdoor pool is on site. The outdoor pool is typically open year-round, however hours of operation or closures vary according to season, weather, or maintenance. This hotel also has a fitness center with Nautilus machines and free weights. Scenic Griffith Park, 3 miles from the hotel, offers horseback riding, numerous hiking/biking trails, a golf course, and playing fields. The recreational activities listed below are available either on site or near the hotel; fees may apply. We should mention This property offers transfers from the cruise terminal and airport (surcharges may apply). Guests must contact the property with arrival details before travel, using the contact information on the booking confirmation. A resort fee is included in the total price displayed. Children 17 years old and younger stay free when occupying the parent or guardian's room, using existing bedding. Only registered guests are allowed in the guestrooms.
Can technology make the Herculaneum scrolls legible after 2,000 years? (2015) - diodorus https://www.newyorker.com/magazine/2015/11/16/the-invisible-library ====== userbinator Interesting to contrast this with the previous (far more optimistic) article discussed 3 years ago at [https://news.ycombinator.com/item?id=9585552](https://news.ycombinator.com/item?id=9585552) ------ hnburnsy Betteridge's law of headlines proven correct yet again... "“I do not expect this scroll will be read during my lifetime,” Delattre said, finally. He closed the lid of the small box with both hands, his shoulders slumped in defeat." ~~~ ComputerGuru Not really. The answer is “Yes it can, but politics, legal obstacles, and some slightly valid concerns about damaging the samples might stop them.”
Q: What happened in R' Chananya's penthouse (18 Dvarim)? Speaking of Beyt Shamai, Yerushalmi Shabbat 9a also here: Background: "ואלו הן ההלכות שאמרו בעליית חנניה בן חזקיה בן גרון שעלו לבקרו ונמנו ורבו ב"ש על ב"ה ושמנה עשר דברים גזרו בו ביום:" These are the halachos that were taught in the attic of Chaninah ben Chizkiya ben Garon: When they went up to visit him and voted, Beis Shamay held the majority over Beis Hillel. Eighteen decrees were enacted on that very day. Action: "אותו היום היה קשה לישראל כיום שנעשה בו העגל. רבי אליעזר אומר בו ביום גדשו את הסאה. רבי יהושע אומר בו ביום מחקו אותה. ... תנא ר' יהושע אונייא תלמידי ב"ש עמדו להן מלמטה והיו הורגין בתלמידי ב"ה. תני ששה מהן עלו והשאר עמדו עליהן בחרבות וברמחים. תני שמונה עשרה דבר גזרו ובשמונה עשרה רבו." That day was as difficult for Israel as the day the Golden Calf was made. Rebi Eliezer says, on that day they overfilled the measure. Rebi Yehoshua says, on that day they emptied it. It was taught: R. Yehoshua taught, "The students of Beis Shamai stood bellow and were killing the students of Beis Hillel." It was taught: Six of them went up and the rest stood over them with swords and spears. It was taught: Eighteen decrees were enacted on that day.... Please explain what was going on in that penthouse and how those 18 regulations were ruled. Is that the accepted way of resolving Halochos, forcing the other side into the minority? A: According to this article: The Korban HaEida explains that the students of Shamai stood outside the house and prevented most of the students of Hillel from entering in order to sway the halacha. Rambam (Pirush Hamishnah) says that all of the leaders of the generation were there, and there was no one fit to rule that was not present. Yet, because most of the sages in that place were from Beis Shamai the halacha was decided like Beis Shamai, who were the majority. The Chasam Sofer (on Shabbos 17a) explains that although Beis Hillel was the majority, the students of Beis Shamai compelled them to rule their way through arguments. Some of the students of Hillel wanted leave to prevent a ruling, but the some of the students of Shamai stood at the door and did not allow the students of Hillel to leave. Meanwhile, six of the great sages of Beis Shamai went up and convinced the assembled with their arguments to rule like them. (Added to address OP's comment:) My understanding of this: The Golden Calf was made due to the fear and void created when they thought Moshe was not going to return. In a similar way, this event was in response to the Roman persecution and leaders of Beis Shamai felt that it was imperative to make decrees distancing the Jews from the Romans to preserve the Jewish People. As is often the case, during desperate times people that otherwise would not agree, go along with desperate measures. And so some of Beis Hillel went along with the decrees.
No Turning Back (Out of Eden album) No Turning Back is the third album from Christian R&B/Urban-Pop group Out of Eden. It was released in 1999 by Gotee Records. Track listing Lookin' For Love River Spirit Moves Here's My Heart (feat. The Katinas) Window If You Really Knew Tomorrow Open Up Your Heart Draw You Near No Turning Back Sarah Jane Charts References Category:1999 albums Category:Out of Eden albums
A new app called Pocket Points is encouraging students to shelve their smartphones while in class by offering up rewards. The way it works is simple: before beginning class, students will open the app, lock their phone, and as long as the phone stays locked, they’ll rack up points. These points can be redeemed at partner businesses and restaurants for discounts or free food. So far the app is available at a few colleges but may soon be available on campuses nationwide.
Even after I finished the instructions, I can't stop building/modifying this set. In fact, in between the time I made the photos and writing the review, I've spent about 45 more minutes modifying Jasper's market. Every time I look at it, I see more things I want to do, so the play keeps going. That being said, the set is fragile and the side buildings are hard to get into. I have a hard time manipulating anything without knocking off parts. (tree branches, swap grass, Yang statue, temple rail, etc), so I have a hard time imagining someone being able to pretend-play with the figures and set without constantly knocking parts off. There an many nifty details in the set that I hope are plot points in the next television season of Ninjago. Aside from the figures and frosted windows/panels, all the graphics are stickers. Fifteen stickers total. I don't care for stickers because i don't like putting them on, and they never wear or age well. I would love it if translations were included for all the Japanese writing on the graphics. I can't imagine it would be much more expensive to include that on the sticker sheet or on the instructions, or maybe include a QR code to a website to accommodate translations into multiple languages. In addition to the instructions, the book contains ten pages of interesting lore/content repeated in three different languages. (so there is/was plenty of room to include information about the writing on the graphics) Color matching for additional building has been a challenge--Especially the blue walls of the smithy. All in all, living long enough to have bricks in older colors that don't quite match the new colors is a great problem to have. Three shades of light blue, not so much.
export default function () {}
Q: weird grey square in extjs layout (ie7 & 8 only) I have weird grey square in extjs layout (ie7 & 8 only). I applyed css code to all doc in hope to see borders of gray element but... There are NO BORDER ON IT. please tell me what to do or check next. *{ border:1px red solid !important; } ie7 & ie 8 normal browser A: Looks like IE isn't rendering things correctly. Something was at that position and when the form was rendered, IE didn't keep up with the redraw.
""One Missed Call"" "Direct subs by Daimag" "Tomoka!" " Dad!" "Put down that knife." "No!" "Dad?" " No" "It's not me!" "Sendo-san!" "Don't." "Why are you doing this?" "Tomoka!" "Run!" "Akino-san!" " Dad no!" "Don't shoot!" "Its 10 seconds left!" "Dad!" "Don't shoot!" "It's time!" "Akino-san!" "Akino-san?" " Hey!" "This is not good." "He bites his tongue!" "Hang on!" "Get the ambulance!" " I got it." "Why?" "Satsuki, no!" "Principal!" "No." "Akino!" "Tell me the truth if you want her alive." "You all had killed my family?" "Did you?" "It's not true..." " What would you know!" "?" "You father had killed my beloved family!" "Your father doesn't deserve to live!" "This is wrong." "Don't get in my way." "Do you expect me to forgive him after he killed my family?" "Don't talk to me like you understand me!" " I do." "But your dead parents and sister will be upset if you do this." "If you pull that trigger..." "You will be a murderer like him too." "Quiet!" "Your parents, your sister..." "Nobody wants you to take the revenge!" "Stop it." "You are the only one beloved daughter who still alive." "Don't come closer!" "I'll shoot you if you come any nearer!" " Enough!" "You are not the only one who keeps thinking about your dead family." "I will settle this for you." "Trust me." "Dad!" "Dad!" "Why?" "Dad!" "Why?" "Dad!" "Please don't go." "The school will be in trouble again." "But I don't believe that Sendo-san will settle everything." "What you mean?" "My editor had said..." "Among them there might be a person who are connected to the police" "So that's the reason..." "Aside of that, Akino and his friends indeed killed the family." "10 years ago in Christmas Eve," "Sakaki-san had called Akino who was at the school, telling him he was heading to the school." "10 years ago in Christmas Eve?" "It's Ami's..." "It's the day my sister disappeared." "Is my sister disappearance and the Sakakis case somehow connected?" "I'm afraid she would end up like the Sakakis..." "Where are you going?" "This is him." "He is the last one." "Sanada?" "Why you so sure?" "I will ask the officer about this picture." "You mean Sendo-san?" " Yes." "No matter how hard he tries to cover this guy, he won't be able to if I show him this picture." "What?" "Can you leave it to me?" "Please." "What's going on?" "You woke so early though you don't look to be such person." "I'd read this morning news paper." "No story about the case." "I bet you still don't tell the police about Sakaki-san case." "You woke up early to tell me that?" " Don't twist it!" "Why you really wanna hide it?" "Is it because one of them is a police?" "Where did you find this?" "If you are not gonna tell anything, I will release this picture." "You are so determine." " Sendo-san!" "I guess you already know about it from the beginning" "About my sister disappearance 10 years ago." "You think that my sister is connected to the case." "That's why you get me involved." "Am I wrong?" ""Because you are part of the puzzle"" "What if I say yes?" "Use whatever you gotta use." "That's the rule of investigation." "I won't apologize." "It's not like that!" "That's not my meaning..." "Are you crying...?" "Why you don't tell me at the beginning?" "What you mean?" "It could be my sister who will be standing here." "Huh?" "That day..." "I'm supposed to spend a night at school." "It wasn't my sister." "10 years ago, the one who was selected to be the sacrifice... was me." "But..." "I was so scared that time and I don't have the guts." "Yumi." "Let me take your place." "I will stay overnight at the school for you." "But the folklore says that disaster to who break the rule." "I'll be Nakamura Yumi from now on." "Ami..." "From that day, my sister disappeared." "I never see her again." "Though I don't believe the folklore now..." "I feel responsible for her disappearance." "She deserves to live rather then me." "That's why I feel so..." "I got it now." "Get in." "Huh?" "You wanted to know everything, don't you?" "Are you coming with me or not?" "Is it okay?" "Jeez..." "I can't stand woman tears." ""Unread Messages" "One Missed Call"" "Come in." "Excuse me." " It's Sendo-kun." "You come again." "Who's that girl?" "It's very rare of you to come with a girl." "I guess I can't overlook you." "No." "We are just friend!" "Let it be that way for now." "Oh Ritsuko!" "You got visitors." "You..." "You..." " Sanada-san, let me introduce her to you." "You're Nakamura Yumi at the Tokumei Watch." "Are you?" "Yes." "I'd know this day would come." "So you are the last person among the survivors, aren't you?" "Yes I am." "Then, let me ask you about the Sakakis..." "I know what you're up to." "You don't have to mention it." "I am the police department head." "But I can't admit what I did... not for now." "Why?" "You really afraid to lose your title?" " Don't put it like that!" "I understand your intention." "But I can't." "Not after six months, no... at least three months" "Three months?" "My wife won't live any longer." "I want her to die in peace." "In return, after she die..." "I will tell everything." "I won't go anywhere." "I will justify my sins by myself." "You are so selfish!" "Is that why you try to stop my investigation?" "Ritsuko has suffered a lot by the disease she had." "I don't wanna make her suffers more!" "I beg you..." "Pease!" "But..." "What you gonna do if the curse messages come to you?" "If you don't stop the curse by admitting what you had done, you and your wife would suffer more!" "Ritsuko never had a cell phone... but I appreciate your thoughtfulness." "Give me more time." "What's wrong?" "Nothing..." "I just feel like being watched by somebody." "Do you smoke?" "I used to..." "This guy Sanada-san, how you regard him?" "Hard to explain though, it's kinda my benefactor." "Benefactor?" "I used to get pressure from politician while running an investigation," "He sacrifices everything to defend me." "He told me, 'Sendo, you must keep on pursue the justice'" "If not because of him, I won't be like I am now." "If you thought about him a lot, why don't you persuade him from the beginning?" " I did!" "But I failed." "I secretly keep working on the case for 10 years but when it eventually leads to Sanada and his friends..." "The curse is started." "After her wife die, do you think he would admit it and tells everything?" "He is not the guy who doesn't keep his words!" "I trust him!" "no..." "I want to trust him." "Are you going now?" "I am a career guy, I don't have plenty of time like y'all do." "He looks so lonely today." "But he's kinda cool like that..." " Huh?" "Really?" "You got it Sendo?" "No matter what will happen, don't quit pursue the justice." "Sanada-san..." "Dad?" "Calm down." "It's me." "You must've a bad dream." "Don't be worry." "I'll be by your side." "Excuse me." "Let me have some comments." "Yamashita-sensei." "Sorry to interrupt you." "You have a visitor." "There some agitated parents who had listened to the rumor." "At this rate, it will affect the school." "I don't care about the school." "The problem is to the students." "They only have us to protect them." "What's so funny?" "I am glad." "You haven't change from being you long time ago." "He wants time...?" "Then?" "What you gonna do?" "What I'm gonna do?" "Since Akino is like that now, we have to wait for Sanada's..." "Is that your thought?" " Huh?" "You've been saying like you worry a lot about your sister Ami." "Deep down inside your heart, you are afraid to know the truth, aren't you?" "Teacher..." " Or it would be better for Ami to disappear forever?" "It is not like that." " Then why you are so timid now?" "Ami?" "Stop it." "Why you look at me with those eyes?" "Nakamura!" "Are you okay?" "What are you doing!" "?" "You gotta be careful!" "It was close." "I am sorry." "Ami..." "Why...?" "And the last one is a police department head." "The editor had got it right at the first place!" "I can't wait for him to tell the truth..." "I wanna see it explode right here right now." "A bloody past..." "A hidden faces of an elite career man." "I like that." "I feel like the stock is rising..." "How is it, editor?" "Huh?" " 'Huh?" "'... you are not happy?" "I feel like I'm being used." "I mean Sendo." "May be he knows it could end like this and that's why he get us involved." "Are you saying I'm a fool?" "Whatever..." "Let's work harder!" "You've been saying like you worry about your sister, deep down inside your heart..." "You are afraid to know the truth!" ""Curse"" ""Unread Message:" "One Missed Call"" "Ritsuko!" "are you okay?" "It's nothing." "Honey..." "Can I make a wish?" "What is it?" "I feel like wanna eat Kaki (Japanese persimmon)" "Kaki?" "All the memory of the past had come to me lately." "Do you remember when we just got married?" "We used to eat it at our mountain villa." "Aahh..." "I still remember that." "I want to peel it for you but you... don't like the way I peel and you refuse to eat it." "When I flash back that moment... suddenly I feel like to eat it again." "I got it." "You wait here, I'll be back soon." "Honey!" "Thank you." "It's Sendo." "Ritsuko-san?" ""Please look after my husband"" "Ritsuko-san, what are you saying?" "Why is it?" "You mean Ritsuko-san?" "I got no idea." "Let's go to the hospital." "" Sanada Ritsuko "" "Ritsuko-san!" "Ritsuko-san?" "Sendo-san!" "" Sanada Ritsuko, Time: 15:30 "" "Is this..." "We still could make it." "It's the curse message." "You two!" "What's going on?" " Sanada-san, please be calm" "I'd received a call from Ritsuko-san few moments ago." "Ritsuko..." "Ritsuko!" "Ritsuko!" "Ritsuko!" "Ritsuko!" "Ritsuko..." "Ritsuko!" "Ritsuko!" "Hey!" "Get the ambulance!" " It already late." "She's dead." "Teacher..." "Why are you here?" " Who are you?" "Are you who kill Ritsuko?" " No." "She's already dead when I got here." "Your wife seems to accept her faith." " What are you saying?" "Honey." "This would be my last love letter to you." "I realized long time ago that you are going through a tough time." "But you always thinking of my disease." "You keep it to yourself." "You've been suffered alone." "But it's all over now." "You had enough." "It's time for you to offload the burden and get eased." "The mistake you'd done cannot be forgiven though... for me..." "You are still my husband and it will never change." "Now and forever." "I am happy to be with you." "I am so..." "Grateful." "Bye then." "Little bit early though, I'm leaving now." "Let's listen to you now." "10 years ago." "What really happened?" "As your presumption" "The Sakakis killer... were us." "Sakaki felt suspicious about the accident," "He suspects us and keeps searching for clues." "But he failed to find any evidence, he grew impatient." "One day, he visited Akino at his house." "He urged Akino to tell the truth with a thing." "A thing?" ""This what I found at the accident plot"" " Sakaki told him..." "Guess he was not only tried to find his wife and daughter." "He swears to discover the truth no matter how many years it would take." "After look at the way Sakaki was..." "He could not deny his conscience" "He invited Sakaki to the school and promised him to tell everything." "But..." "After the rest of my friends heard about it, they used it to take him down." ""What are you doing?" "Get off of me!"" "Stop it." "Hey Mizuno!" "Stop it!" "Hey." "We had sworn to ourselves, hadn't we?" "We won't pile up another sin!" "Stop!" "Stop it!" "Those were our sins." "You aren't finish it yet, are you?" "Teacher." "There is something else you need to confess." "At the same night..." "One of the student disappeared from the school." "All of you must know something about where she might go." "A student?" "Nakamura Ami." "The twin sister to the girl sitting in front of you now." "It can't be!" "You are her...?" "So you must know something." "Say it!" "What happened to her?" "What you all have done?" "He doesn't need to be killed." "If we don't kill him, we all finished." "You should know what will happen to us if we let him alive." "But!" "Damn it!" "Sanada... you're complicity in this." "You should bare the sins too." "It's over there." "Sis..." "That's why you killed her?" "No!" "We didn't kill her!" "Or I should say we failed to kill her." "Failed to kill her?" " What you mean?" "We all panic after knowing she had witnessed the murder scene." "We wanted to kill her." "No!" "Don't!" "Hey!" "All of you." "Stop!" "Shut up!" "What's going on?" " Put on the light!" "Find the switch!" "She had run away!" "Let's get her!" "She's gone!" "Where are you?" "She's not here!" "Damn!" "She gets away!" "We all scared for our crime to be known." "But to our surprise, what happened that night never been an issue the following days." "Nonsense!" "If it true, where would she be now!" "?" "Stop it" " Hey!" "Answer me!" "I am sorry." "That was all what had happened." "Sis..." "Sendo..." "It's 10.24p.m." "Sanada Kazuma!" "I'm arresting you for homicide." "Sanada-san." "About Ritsuko-san's funeral..." "Leave it to me." "Please." ""The police department was shocked by the crime..."" ""and promise to carry out justice as to regain back the public trust"" "Dad..." "Mom..." "Sister..." "It's over now." "There you are." "I know you would come." "Take a sit." "The Sakakis' corpses were found as described by Sanada-san." "The justice has been done, there won't be anymore curse." "I have fun working with you." "Is this gonna be the end?" "Hmm?" "For me, the case is not over yet." "It's about your sister?" "I am sorry for you but the more you know the more you hurt." "You should forget her." "How can I forget her?" "She's my only sister!" "Is she gonna alright?" "It's alright." "Sis..." ""Wait you at school GFag." "Q"" "Ami...!" "How it could be here?" "Ritsuko..." "I guess this is it." "Finally it's over." "At last..." "It is not over yet...!" "What is this?" "At that time I still didn't realize..." "The curse is not over yet." "The real horror is just about to start." "Direct subs by Daimag" "Yumi disappeared." "There are several people witnessed a young girl leaving the place." "I know where Yumi's sister had been buried." "I cannot forgive all of them." "It is not over yet." "You wouldn't mind if she dead!" " She is not dead, she still alive!" "You are connected to Ami's disappearance, aren't you?" "I'd received it too." "Death notice call."
John McCain’s memory haunts Donald Trump. The president would like to pretend as though his antipathy toward the late senator from Arizona is based on McCain’s vote against one of several iterations of the GOP’s ObamaCare replacement bills or the fact that he provided the troubling but unverified Steele Dossier to the proper authorities, as though that was a breach of decorum. But that’s a smokescreen. Their mutual antipathy dates to the earliest days of the president’s campaign, in part, because McCain always had Trump pegged for what he was. “When Mexico sends its people, they’re not sending their best,” Trump said just weeks after launching his campaign for the White House. “They’re bringing drugs. They’re bringing crime. They’re rapists.” To his credit, McCain rejected these comments and, along with former Sen. Jeff Flake, boycotted Trump’s appearance in Arizona. At that event, Trump trained his fire not just on Mexico but McCain as well. “We have incompetent politicians, not only the president,” Trump said. “I mean, right here, in your own state, you have John McCain.” McCain called the remarks “hurtful” and irresponsible “because what he did was, he fired up the crazies.” Trump replied by feigning offense on behalf of his supporters, calling for McCain to be primaried, and demeaning the senator’s service in the Navy by dismissing his time as a captive of the North Vietnamese as a sort of personal failing. Thus, a feud began that now rages from beyond the grave. Trump has continued to fire volley after volley at the statesman, indifferent to the late senator’s inability to respond. In a speech at CPAC upon his return from Hanoi, where McCain spent years as a hostage in intolerable conditions, Trump issued a veiled attack on the Senator. “He wrote a book and the book bombed,” Trump told reporters last month. And over the weekend, the president tore into John “last in his class” McCain for giving the unverified intelligence about Trump to which he was privy to the appropriate authorities. “I was never a fan of John McCain, and I never will be,” the president told reporters in the Oval Office. In 2015, Trump’s attacks on the late senator prompted a deluge of searing rebukes from Republicans. Today, however, the response from the GOP is far more muted. Mitt Romney criticized the president. Johnny Isakson is reportedly preparing a “whipping” for the president. But the only Republican facing voters again in 2020 to muster a tweeted response, Lindsey Graham, was utterly devoid of the kind of passion he frequently summons in defense of principles far less essential than the respect for national service. In the following Tweet, Graham announced that he would kick off of his 2020 campaign bid alongside Vice President Mike Pence. If, as it seems, electoral politics is compelling Republicans to compromise on yet another essential value to court Trump and the cult of personality that surrounds him, it’s a choice Republicans will regret. It will not ingratiate them with the broader American electorate. Nor it will yield them special considerations from Trump. No amount of flattery or deference from his fellow Republicans satisfies him. The same political considerations seemed to be what led some Republicans to stow their objections to Donald Trump’s dubious assumption of legislative powers in declaring a national emergency to build his long-sought wall along the border with Mexico. “I can’t imagine one vote changes things too much for him,” a source close to Trump told National Review’s John McCormack when asked if Sen. Ben Sasse’s vote with the president had won him any goodwill in the West Wing. “Or changes the White House’s view of him to any great extent.” Sasse has earned the benefit of the doubt more than some of his colleagues, but the GOP’s electoral concerns cannot be dismissed as a motivating factor. And if it is a factor, it’s a cheap rationalization. Republicans who consider themselves the more responsible stewards of the party can be forgiven for convincing themselves that whatever actions they take to keep their office are justified. After all, how would it benefit their constituents, their principles, or their ideological convictions if they were to lose? There is always someone more unscrupulous, more willing to prostrate themselves before Trump waiting in the wings. Why give them an opening? A minor compromise here, a forgivable sacrifice there; whatever it takes to keep power in the responsible hands of those who respect it. This is a noble impulse, but a misguided one. One can make only so many compromises of principle in service to power before all that’s left is service to power. It avails no cause or constituency to bend before the demands of a demagogue. No principle can be preserved if its preservation requires the sacrifice of such basic graces as respect for our colleagues and friends who are gone. Down that road lies corruption, and the corrupted are only of value to the already corrupt. Nothing is worth that kind of accommodation, not even a seat in the U.S. Senate.
When more isn't merrier: pharmaceutical alliance networks and breakthrough innovation. Strategic alliances, in particular strategic alliances with universities, are widely thought to be beneficial to the drug discovery process. However, the discussion of alliances and their effect has tended to focus on single alliances and has ignored the fact that firms tend to participate in multiple alliances simultaneously. Here, we show the importance of adopting a portfolio perspective of strategic alliances. We build a model of the U.S. pharmaceutical industry, and show how 2298 alliances, announced over a 15-year period, impact the alliance portfolios of 324 pharmaceutical firms, and how that, in turn, impacts the breakthrough innovations that these firms produce. In doing so, we show the stengths and benifits of strategic alliances, but we also show the dangers of adopting a more the merrier approach to strategic alliance making.
Q: Delphi XE2 - Unable to connect to Gmail smtp server via SSL Using Delphi XE2, Indy 10 that ships with it and OpenSSL dll's version 1.0.1c. We are in the final stages of converting our Delphi 6 project to Delphi XE2. We have solved every show stopper so far but I am running into one trying to connect to Gmail smtp server. Our Delphi 6 app works fine using SSL v2.3 and SSL v3 and Indy 9 components connecting to port 465 per Google's own documentation. Google Support Our Delphi XE2 app does not connect at all. The call to connect goes into the ether and nothing happens for some 7 minutes until I get bored waiting for the thing to timeout and kill it off. I actually traced the program execution all the way to the IdWinsock2 funcion here: function Stub_select(nfds: Integer; readfds, writefds, exceptfds: PFDSet; timeout: PTimeVal): Integer; stdcall; begin @select := FixupStub(hWinSockDll, 'select'); {Do not Localize} Result := select(nfds, readfds, writefds, exceptfds, timeout);//<-this line never returns and timeout is always nil end; I need to maintain the old SSL connectivity for existing users' configurations. New users will be able to connect using TLS (to port 587) and that DOES work!?!? I am at a loss as to why the non-TLS SSL options do not work and do not report any error and do not time out but just go off to Never-Never Land. Please help! TJ Here is the code: SMTPClient.Host := trim(EditSMTPServer.Text); SMTPClient.Port := EditSMTPServerPort.AsInteger;//<- value from custom edit box SMTPClient.Username := trim(EditSMTPLogon.Text); SMTPClient.Password := trim(EditSMTPPassword.Text); SMTPClient.AuthType := satDefault; if CheckBoxUseSSL.Checked then begin SMTPClient.IOHandler := IdSSLIOHandlerSocket1; IdSSLIOHandlerSocket1.ReadTimeout := 30000;//30 second timeout which does not appear to work case ComboBoxSSLMode.ItemIndex of 0 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv2; 1 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv23; 2 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv3; 3 : begin IdSSLIOHandlerSocket1.SSLOptions.Method := sslvTLsv1; SMTPClient.UseTLS := utUseImplicitTLS; end; end;//case IdSSLIOHandlerSocket2.SSLOptions.Method := IdSSLIOHandlerSocket1.SSLOptions.Method; IdSSLIOHandlerSocket2.PassThrough := False; end else begin SMTPClient.IOHandler := nil; end; try SMTPClient.Connect; if SMTPClient.Connected then begin if SMTPClient.Authenticate then begin ... do some work ... end; end; except on e:Exception do begin showmessage(e.message); end; end; EDIT: As usual, after I post a question I have stumbled across a workaround. If I set the UsetTLS property to utUseImplicitTLS for all NON-SSL transactions and set it to utUseExplicitTLS for TLS transactions my connections appear to work in a timely manner. Hopefully this helps someone out. updated code: if CheckBoxUseSSL.Checked then begin SMTPClient.IOHandler := IdSSLIOHandlerSocket1; SMTPClient.UseTLS := utUseImplicitTLS; case ComboBoxSSLMode.ItemIndex of 0 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv2; 1 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv23; 2 : IdSSLIOHandlerSocket1.SSLOptions.Method := sslvSSLv3; 3 : begin IdSSLIOHandlerSocket1.SSLOptions.Method := sslvTLsv1; SMTPClient.UseTLS := utUseExplicitTLS; end; end;//case IdSSLIOHandlerSocket2.SSLOptions.Method := IdSSLIOHandlerSocket1.SSLOptions.Method; IdSSLIOHandlerSocket2.PassThrough := False; end else begin SMTPClient.UseTLS := utNoTLSSupport;//reset TLS support flag SMTPClient.IOHandler := nil; end; A: What you discovered is what you are supposed to be doing. SSL and TLS have different semantics, so you have to set UseTLS accordingly. For SSL on port 465, the server expects your client to initiate an SSL handshake immediately upon connecting, before the server then sends an encrypted Greeting. UseTLS=utUseImplicitTLS does that, but UseTLS=utUseExplicitTLS does not. When UseTLS=utUseExplicitTLS, TIdSMTP will expect the server to send an unencrypted Greeting immediately, which would explain the hang in select() - the server is not sending any data! For TLS on port 587, the server is expecting the client to connect initially unencrypted and then send an explicit STARTTLS command when it is ready to initiate encryption. UseTLS=utUseExplicitTLS does that, but UseTLS=utUseImplicitTLS does not.
1. Field of the Invention The present invention relates to an image pickup lens for forming an image of an object on a solid imaging element such as a CCD sensor or a C-MOS sensor adopted in small-sized imaging devices. More specifically, the present invention relates to an image pickup lens composed of five lenses, which is built into an imaging device mounted on portable terminals such as cellular phones and smartphones, PDAs (Personal Digital Assistances), and game machines or information terminals such as personal computers and the like, where downsizing and thinning are pursued. 2. Description of the Related Art Recently, the market of portable terminals having imaging devices is expanding more and more. Most portable terminals are equipped with a camera function, and currently, the majority of such camera functions has a large number of pixels comparable to that of digital cameras. Along with the increasing demands for thinning of portable terminals for reasons such as user-friendliness and design, demands for downsizing and thinning of the imaging devices built therein are also becoming severe. Further, for the image pickup lens mounted on imaging devices adopting such imaging elements having a large number of pixels, it is demanded to be even higher resolution, downsized, thinner and brighter (that is, with a small F-value). Also, it is strongly demanded for an imaging lens to have a wide angle of field suitable for taking an image in a wide area. In order to answer to the trend of downsizing, thinning and enhanced performance, the image pickup lens is usually composed of multiple lenses. Conventionally, image pickup lenses having a two or three lens configuration have been widely adopted for a VGA class to one-megapixel-class lens, because of an advantage in terms of its size and cost. Further, in order to adapt for increasing the number of pixels, many four-lens configuration image pickup lenses have been proposed. However, in order to cope with further downsizing and increase in the number of pixels, many image pickup lenses having a five-lens configuration, achievable a higher performance than the four-lens configuration, have been proposed. The present invention corresponds to such five-lens configuration. For example, Japanese Patent Laid-Open No. 2009-294528 (Patent Document 1) discloses an image pickup lens having a five-lens configuration composed of, in order from an object side, a first lens having a positive power with an object side surface formed as a convex surface, a stop, a second lens having a meniscus shape near an optical axis, a third lens having an image side surface formed to have a convex shape near the optical axis, a fourth lens having both sides thereof formed as aspheric surfaces and where a circumference portion of an image-side surface is formed to have a convex shape, and a fifth lens having both sides thereof formed as aspheric surfaces and where a circumference portion of an image-side surface is formed to have a convex shape, wherein only one of the second to fifth lenses is a negative lens having an Abbe number of 30 or smaller. Further, Japanese Patent Laid-Open No. 2010-026434 (Patent Document 2) discloses an image pickup lens having a five-lens configuration composed of, in order from an object side, a positive first lens, a positive second lens, a negative third lens, a positive fourth lens, and a negative fifth lens. According to the image pickup lens disclosed in Patent Document 1, a ratio (TTL/2IH) of a total track length (TTL) to a maximum image height (IH) is approximately 1.0, so that relative downsizing of the lens is realized. However, the F-value of the lenses is approximately 3.0, which cannot be recognized as ensuring a sufficient brightness for imaging elements having increased number of pixels. As for the image pickup lens disclosed in Patent Document 2, it realizes a lens system having an F-value as bright as 2.05 to 2.5 and high aberration correction ability, but since the power of the first lens is weak, the configuration is disadvantageous for realizing a thinner lens.
# SPDX-License-Identifier: GPL-2.0 obj-$(CONFIG_USB_BDC_UDC) += bdc.o bdc-y := bdc_core.o bdc_cmd.o bdc_ep.o bdc_udc.o ifneq ($(CONFIG_USB_GADGET_VERBOSE),) bdc-y += bdc_dbg.o endif obj-$(CONFIG_USB_BDC_PCI) += bdc_pci.o
Sky Moguls - http://skymoguls.blogspot.com/ - What Is Sky Moguls? We have a strong customer base and a great relationship with our clients. Simple tasks will be completed each day and closers are already in place so that you will not be required to do any selling. Our proprietary webinar technology will do the heavy lifting for you. (This is where the market is headed) Our sales process is responsible for tens of thousands of dollars in profits (and counting) to our reps. We are expanding rapidly and have grown by more than 300%. We are looking for top producers. No one is doing what we are doing. We've spent countless hours and financial resources testing and tracking our tools, systems and processes. If you can follow specific instructions and are teachable... we might have a spot for you. If you think you qualify, visit: http://skymoguls.blogspot.com/ Average reps right now are earning between $800 - $1200 per week and are paid every Friday via direct deposit. Above average reps do much better. Serious Inquiries Only: http://skymoguls.blogspot.com/
Hello and welcome to the 45th episode of the show. This time around, Steve and Andy are once again joined by Christine Hanefalk of The Other Murdock Papers to examine the guest appearances of Daredevil in the Fantastic Four. Well, half a guest-appearance at least. In Fantastic Four #40, the team,... Hello and welcome to the 44th episode of the show. This week, Andy and Steve are joined by Christine Hanefalk, writer of the The Other Murdock Papers blog and host of The Other Murdock Paper podcast. Why do we have such an incredibly awesome co-host who has dedicated... About the Podcast Stephen Lacey and Andrew Leyland are your guide to Marvel's First Family, The Fantastic Four. Starting at the very beginning of the Marvel Age of Comics, they cover every issue of The Fantastic Four, every spinoff title (Strange Tales, Marvel Two-In-One, and more), every guest appearance and every cameo, in order of publication. IMPORTANT: The show has moved to TheFantasticast.com - find us there! Feedback can be sent to [email protected], or left in the comments for each show's posting.
Q: Cannot call method Java I tried to write a generic SelectionSort, but there are error suggesting in my sort(), I cannot call findMinIndex(int,int) or swap() though I can call in main(). How can I modify my code to rectify this problem? public class SelectionSort<T extends Comparable<T>>{ T[] result = null; static int size = 0; SelectionSort(T[] a){ result = a; size = a.length; } public int findMinIndex(int begin, int end){ T min = result[begin]; int index = begin; while(begin<=end){ if(result[begin].compareTo(min)<0){ min = result[begin]; index = begin; } begin++; } return index; } public void swap(int i, int j){ T temp = result[i]; result[i]=result[j]; result[j]=temp; } private int getSize(){ return size; } public void sort(){ int have_sorted_till = -1; int index = -1; while(have_sorted_till<size){ index = result.findMinIndex(have_sorted_till+1,size-1); result.swap(index, have_sorted_till+1); have_sorted_till++; } } public String toString(){ String s = ""; for(int i=0; i<size; i++){ s = s + result[i]+","; } return s; } public static void main(String[] args){ Double[] a = new Double[]{2.2,5.7,2.8,9.7,3.9,12.3}; SelectionSort<Double> b = new SelectionSort<Double>(a); b.swap(0,5); System.out.print(b.toString()); } } A: Because you are trying to call a class method on an array. This does not work. index = result.findMinIndex(have_sorted_till+1,size-1); result.swap(index, have_sorted_till+1); result is your generic array. Just call the method directly index = findMinIndex(have_sorted_till+1,size-1); swap(index, have_sorted_till+1);
Pyridine-based lanthanide complexes combining MRI and NIR luminescence activities. A series of novel triazole derivative pyridine-based polyamino-polycarboxylate ligands has been synthesized for lanthanide complexation. This versatile platform of chelating agents combines advantageous properties for both magnetic resonance (MR) and optical imaging applications of the corresponding Gd(3+) and near-infrared luminescent lanthanide complexes. The thermodynamic stability constants of the Ln(3+) complexes, as assessed by pH potentiometric measurements, are in the range log K(LnL)=17-19, with a high selectivity for lanthanides over Ca(2+), Cu(2+), and Zn(2+). The complexes are bishydrated, an important advantage to obtain high relaxivities for the Gd(3+) chelates. The water exchange of the Gd(3+) complexes (k(ex)(298)=7.7-9.3×10(6) s(-1)) is faster than that of clinically used magnetic resonance imaging (MRI) contrast agents and proceeds through a dissociatively activated mechanism, as evidenced by the positive activation volumes (ΔV(≠)=7.2-8.8 cm(3) mol(-1)). The new triazole ligands allow a considerable shift towards lower excitation energies of the luminescent lanthanide complexes as compared to the parent pyridinic complex, which is a significant advantage in the perspective of biological applications. In addition, they provide increased epsilon values resulting in a larger number of emitted photons and better detection sensitivity. The most conjugated system PheTPy, bearing a phenyl-triazole pendant on the pyridine ring, is particularly promising as it displays the lowest excitation and triplet-state energies associated with good quantum yields for both Nd(3+) and Yb(3+) complexes. Cellular and in vivo toxicity studies in mice evidenced the non-toxicity and the safe use of such bishydrated complexes in animal experiments. Overall, these pyridinic ligands constitute a highly versatile platform for the simultaneous optimization of both MRI and optical properties of the Gd(3+) and the luminescent lanthanide complexes, respectively.
Show Details Comedian and social critic Lewis Black is renowned for his hilariously angry face and simulated mental breakdowns. At his quick-witted live shows, Black skewers the absurdities of history, religion, and politics with impassioned rants that are as funny as they are eye-opening. Whether he's feigning befuddlement with current social trends or making light of pop culture's bloated landscape, Black has made clear that fans at his 2014 tour dates can only expect one thing: the unexpected. SNAPSHOT BACKGROUND: A brainy kid born into a blue collar household, Lewis Black was raised in the Washington D.C. suburb of Silver Spring, Maryland. It was there that he developed the absurd but adroit insights that would later serve his comedic talents. Initially working as a playwright out of the renowned Yale School of Drama, Black found his calling in the roasts he would give plays during his personal introductions of new works to audiences. From there he honed his craft with bit parts in films and TV, eventually earning the respect of New York's funny underbelly. Since then, he's become a Comedy Central staple, both on his own show Lewis Black's Root of All Evil and on The Daily Show with Jon Stewart. Hot on the heels of a new live CD/DVD released in 2013, Black will hit the road for another round of laugh-filled nights on his 2014 tour. FANS WHO BOUGHT TICKETS SAY: "Laughed so hard, I had tears in my eyes! Everyone around us was just having great fun...Such a great mix of people. Can't wait to see him again." "Lewis Black captivated the audience from beginning to end. His political stance is righteously hysterical! He says aloud just what you've been thinking all along. Funnier than you can imagine!" "I had a great time. Lewis was funny as always. I enjoy when he rocks the government! Keep on doing what you're doing!"
The two-time All-Star announced that he would retire today as a member of the Brewers, before having his plaque installed at Miller Park during a pregame ceremony on Friday. The Wall, established in 2014, commemorates the careers of players and broadcasters who were influential to the team’s history and success. The former outfielder/first baseman last played for the Brewers in 2012, amassing career numbers with the club that include a .276 batting average with 154 home runs and 508 RBIs. Five times as a Brewer, Hart logged seasons of 20 or more home runs. He also ranks sixth all-time with a .491 slugging percentage. The Milwaukee Brewers will add two new names to the Miller Park “Walls of Honor” this season. The team, in conjunction with the Milwaukee Braves Historical Association, announced Tuesday that former Brewers outfielder Corey Hart will be inducted into the “Brewers Wall of Honor” and former Milwaukee Braves pitcher Lew Burdette will be inducted into the “Braves Wall of Honor.” Hart, a two-time All-Star, was in Milwaukee for nine years and batted .276 with 154 home runs and 508 RBIs. “My life has been a complete blessing because I was a Brewer,” Hart in a statement released by the team. “My family and I will always be in forever debt because of the unbelievable experiences we had at Miller Park and the lifelong relationships we made at the park and in the community. Thank you from the bottom of my heart; I am truly honored to be inducted into the Brewers Wall of Honor.” Burdette, the MVP of the 1957 World Series, passed away in 2007. Over his 13 years with the Braves — first in Boston and then in Milwaukee, he had an ERA of 3.53 and posted a record 179-120. “We are very appreciative of this honor and would like to thank the Brewers and the Braves Historical Association,” said Mary Lou Burdette-Wieloszynski, daughter of Lew Burdette. “My father loved playing in Milwaukee and the encouragement from the fans meant the world to him. He often talked about the special camaraderie with his Milwaukee teammates, and he was very proud of helping bring a World Series championship to Milwaukee.” Burdette will be inducted on Friday, May 26 when Milwaukee hosts the Arizona Diamondbacks, while Hart will be enshrined on Friday, June 30 when the Brewers welcome the Miami Marlins to town.
Senators, Your presence is requested for a State of the Empire Address on 18 February, 1846. Any requests for information should be sent in advance to the Blachernae palace. The following newspapers were considered significant by the archivists. As well, the Senate’s world map is being updated even now. Russia’s aggression knows no bounds. It is obvious at this time that war with them is inevitable. We cannot let these barbarians threaten Europe for much longer. – Michelangelo Favero I concurr with Senator Favero. Russia is continuing is unprovoked aggression against Pax Romana and her interests, that is why I would fully support War between us and Russia. The sooner the better.” – Potitus Caristanius Gallio Senators, Based on your recommendations, We formed an alliance with Poland immediately after the last address. Scandinavia was disinclined to sign an alliance, as they had already signed one with Germany. This proved ill for them when Russia declared war on them for the Kola peninsula. As well, We set to publish anonymous papers demonstrating that the Spice Islands would be better under Imperial control than under Iraqi control. These papers were traced to Blachernae within a few months, mildly damaging Our reputation. As research into different forms of ideological thought became firmly established, We sought to make up for the lack of admirals by having the Admiralty develop a set of naval plans for various scenarios. In October of 1843, UTA declared war on new England and requested our aid. Mexihco, who now sought to be called ‘The Empire of Mexico’ had come to New England’s aid. We accepted the call from our allies. It was at this time that our propaganda had swayed the world enough for Us to declare war on Iraq. Not wishing to miss the opportunity, We did so, claiming Dili for the Empire. Khiva came to their defense. The Iraqi was opened with Iraq’s 2nd Army assaulting the border province of Hakkari. I. Legio frightened them back over the border, then chased them to Arbil and Kirkuk, completely destroying them. They then chased down and defeated another Iraqi force who had fled as far as Homs, and then defeated any remaining forces that had crossed the border before besieging the Iraqi homeland, driving for the Persian Gulf. In the north, II. Legio defeated a Khivan force assaulting Stavropol, proving to themselves that they could defend the border there. They then marched on Khiva itself. In the east, XI. Legio captured island after island, fighting a few small battles on the way. This was far more than was needed for the eventual peace, but it provided good training for the legions and weakened Iraq. In Hungary, reactionary rebels were able to impose their will on the nation. During this war, We waited for the fleets to organize themselves before intervening in the UTA’s war. This was unwise, as Mexihco used the opportunity to begin a mass invasion. When XV. Legio arrived in Texas, they were defeated at Dallas and forced to retreat to Houston. This defeat was startling, as on paper the legion should have been able to smash the Mexican forces. It was surely the abilities of the Mexican general that turned the tide. Once XV. Legio recovered, they began assisting American lands under Mexican occupation, avoiding the Mexican armies. Meanwhile, VI. Legio was transported to New England, where they completely destroyed the New English army that had been causing the American 1st Army to hesitate. They then boarded their transports and sailed for the gulf coast. The UTA would be left to recapture their lands and occupy New England. IX. Legio was more bold, and had set sail for Veracruz, intending to march on Mexico City. And once VI. Legio landed in Houston, both they and XV. Legio marched north to sweep the Mexicans from American lands. Before long, XV. Legio had revenged themselves on the Mexicans, and VI. Legio proved they were to be feared. Once Mexihco was thoroughly beaten and We were sure the UTA were unlikely to demand more for the war, we agreed to one of Mexihco’s desperate pleas for peace. Once the naval plans were completed, We directed the bureaucracy to draft better legislation for the small businesses springing up throughout the Empire in the hopes that more resources could be extracted for the factories. And of course, past research continued to give the Empire further developments. While the legions returned over the Atlantic, we commissioned a new legion (XV. Legio) and prepared Our justifications for war against Russia. Before long, the justifications were ready, if the legions still needed a little time to prepare. Do you still agree that war with Russia is desirable? Domestically, We could pass reforms in the Empire. We are strongly disinclined to allow greater political rights, but We would welcome your insight, especially as there are various movements organizing in the Empire. Once the army is ready, we must make all haste to cripple the Russian beast before it strikes down another European nation. I see no need for political reform when the Empire is led by Your Empress. The Empire thrives, as it is, under Your benevolent rule. – Michelangelo Favero Your Emperess, it is surely heresy to even suggest that we should allow other inferiors to challenge your divine right to rule. However it has always been the Empires way to improve the lot of our subjects and any trinkets we can bring to the mob binds them closer to us. I would be of the opinion that forcing the release of a full nation would be the best course of action, assuming the war goes as we expect we can look to add our cores as a war goal later. All hail the might of the Empire and it’s Emperess! – Senator Γκρέυ Senators Favero and Γκρέυ, We are pleased that we are in agreement regarding both Russia and reforms. Do any other Senators have concerns or thoughts? Very well, Senators. We thank you for your time.
Concurrent use of cyclophosphamide and prednisolone in childhood nephrotic syndrome in South-East Nigeria; a report of 5 cases. Nephrotic syndrome is a chronic renal disease that can lead to end stage renal disease. There are different histological types with global variations in frequency. Literatures reviewed showed that the African variant is less likely to be minimal change variant. No clear treatment protocol for it has been most beneficial. This paper aims to evaluate the outcome of a treatment protocol using cyclophosphamide and prednisolone concurrently. A low dose and short duration concurrent use of cyclophosphamide and prednisolone was used for treating children with nephrotic syndrome who had not developed derangements of their renal function. The case files of those that were treated and followed up over a 10 year period or until they were above 18 years of age were analysed for their clinical parameters. Five cases were treated and all have been in clinical remission for more than 4 years as at the time of the review, though 2 of them relapsed twice initially. They were all aged above 6 years and had microscopic hematuria. The 3 cases whose ESRs were done had high levels. Two cases that presented 1 yr after the onset of their symptoms resolved without relapse while 2 out of the remaining 3 in whom this interval was less than 6 months relapsed. This treatment protocol appears beneficial to childhood nephrotics in this environment and should be used.
Four styles of analysis: How to pick the right type Today's feature explores the different styles of analysis within a business analytics deployment: their specific advantages, purposes and typical users. In the past, organizations have typically implemented analysis capabilities as a one-size-fits-all solution that fails to understand the unique needs of each audience within the organization. The net impact of this imprecise deployment strategy can include: Casual users may be overwhelmed with irrelevant, overly detailed information. Today, people in organizations want information in different ways. By tailoring these analytical tools and processes toward each audience, companies of all sizes and in all sectors can leverage business intelligence (BI) in a way that facilitates optimal performance within that given role. Executives can see at a glance how the organization is performing, and then quickly drill down to an appropriate level of detail, allowing them to make fast, effective decisions. Business and financial analysts can dig deeper and turn analyses around with greater speed and precision to improve the quality of data they’re producing for themselves and for others. Business users, who have relied on specialists for analytical exper­tise, can increasingly take control of the tools and pursue business-specific analysis on their own. Different styles of analysis By understanding the major types of analysis and relating them to specific roles within the organization, companies can avoid the common pitfalls that derail more traditional approaches to BI implementation. IBM Cognos 8 BI is based on an architecture that internalizes these styles of analysis and ensures appropriate tools are available to fit the workflows of each target role. IBM Cognos solutions support all different styles of analysis to fit the needs of all users. Analytical reporting for all users IBM Cognos 8 BI takes tools previously reserved for power users and makes them accessible in the organization’s mainstream. Putting greater analytical capability into the hands of all users empowers them to deliver more effectively within the context of their respective roles and frees up specialists for more value-added contributions. Simple analysis performed by a wide range of stakeholders throughout the organization, many of whom would not typically view themselves as fully trained users of traditional BI solutions. Provide a basic level of additional insight to a particular performance metric, to answer a straightforward question that doesn’t necessarily require invasive analysis. By leveraging guided analysis that allows straightforward drill-through, the user can understand what’s driving these results – and can more effectively explain this to leaders and other stakeholders. Additional analysis can be managed without significant additional overhead, and questions can be answered more quickly and precisely. IBM Cognos 8 BI gives business and financial analysts the ability to bridge the needs of business and technical teams and provide an optimal level of business-driven analysis. Streamlined report generation capabilities allow and financial analysts to spend less time building different reports for different audiences – which frees them to allocate more time to communicating the results to their various stakeholders. Analysis performed by a broad range of business managers and business and financial analysts that is somewhat more advanced than the simple answers sought by regular users across the organization. Allows business managers to better understand how they are performing relative to baseline, where variances may be occurring, and why they may be occurring. Trending examines the underlying factors that drive organizational performance, and requires improved access to a wider range of data resources. By comparing the results against other product lines from elsewhere in the organization – as well as against industry figures from external data sources – the manager can place the performance in context and better understand what the figures mean, and what that meaning implies for a potential organizational response. Greater capability to examine a wider range of data drivers to better explain organizational performance can significantly enhance the average business manager’s ability to manage resources to a given plan. Enhanced ability to independently analyze why certain results are being realized allows more precise management over time and reduces the risk that sub-par performance will be missed until it is too late to resolve. IBM Cognos BI streamlines the analytical process and empowers the analyst to conduct more iterations more quickly – which increases analytical precision – and allows more relevant comparison with similar scenarios thanks to greater access to data stores wherever they may live and whatever form they’re in. A more specialized level of analysis performed by business and financial analysts. Incorporates analysis of a broader range of alternative scenarios to help analysts begin building what-if-type projections. Allows “what-if” analysis, side-by-side comparisons of a variety of tactics that could include modifying the existing product mix, pursuing new geographic markets, introducing a new marketing campaign or even tweaking the supply chain to better match supply to demand Increases the depth of analysis, reduces turnaround time by improving access to existing and new sources of internal and external data will drive their effectiveness in these pivotal roles. Deeper analysis of past performance is emerging as a key means of understanding future performance – and of organizational planning. The level of analysis required to tighten this planning process is rapidly deepening and broadening. Analysts must assess larger pools of historical data and they must do so across silos that formerly limited the breadth and depth of analysis. Analyze past performance at a detail level to more effectively plan future strategies and tactics. E-mail this page Note: IBM will not use information collected here for marketing or promotional purposes beyond the scope of this transaction. --> Tags A tag is a keyword you assign to make a blog or blog content easier to find. Click a tag to find content that has been assigned that keyword. Click another tag to refine the search further. Click Find a tag to search for a tag that is not displayed in the collection.
Unilateral fourth, fifth, sixth, and seventh molar in a nonsyndromic patient: A rare and unusual case report. Multiple supernumerary teeth are rare developmental anomalies which are often associated with syndromes. Only few examples of nonsyndromic supernumerary teeth have been reported with fourth, fifth, sixth, and seventh molar rarest of all. The cause, frequency, complications, and surgical operation of supernumerary teeth are always interesting subjects for study and research. Literature reports increased occurrence of the supernumeraries in the maxilla, but here, a unique and unusual case report of 12-year-old female patient with unilateral multiple impacted supernumerary teeth in the mandible in otherwise healthy individual has been presented.
Associations between body weight status, psychological well-being and disordered eating with intuitive eating among Malaysian undergraduate university students. Intuitive eating, which can be defined as reliance on physiological hunger and satiety cues to guide eating, has been proposed as a healthy weight management strategy. To date, there has not been a published study on intuitive eating in the context of Malaysia. Therefore, this cross-sectional study aims to determine associations between body weight status, psychological well-being and disordered eating behaviors with intuitive eating among undergraduate university students. A total of 333 undergraduate respondents (21.3% males and 78.7% females) from three randomly selected faculties in a public university in Malaysia participated in this study. Respondents completed a self-administered questionnaire which featured socio-demographic characteristics, intuitive eating, self-esteem, body appreciation, general unconditional acceptance, body acceptance by others, body function and disordered eating. Body weight, height, body fat percentage and waist circumference were measured. The results from this study revealed that there was no difference (t = 0.067, p = 0.947) in intuitive eating scores between males (75.69 ± 7.16) and females (75.62 ± 7.90). Multiple linear regression results have shown that body appreciation (β = 0.385, p < 0.001) and disordered eating (β = -0.168, p = 0.001) were significant predictors of intuitive eating, which accounted for 19.6% of the variance in intuitive eating. Health promotion programs should highlight the importance of enhancing body appreciation and preventing disordered eating behaviors among university students in order to promote intuitive eating as one of the healthy weight management approaches.
239 Wis.2d 296 (2000) 2000 WI 125 619 N.W.2d 530 IN the MATTER OF the REINSTATEMENT OF the LICENSE OF Donald S. EISENBERG to Practice Law in Wisconsin. Nos. 82-1914-D, 89-0596-D. Supreme Court of Wisconsin. Filed December 7, 2000. *297 ¶ 1. PER CURIAM. On May 18, 2000, the Board of Attorneys Professional Responsibility (Board)[1] filed its report recommending that Donald S. Eisenberg's petition for reinstatement of his license to practice law in Wisconsin be granted upon the following conditions: (1) that Mr. Eisenberg pay interest of $4583 on the amount of a fee he was previously required to repay to a former client; (2) that he be barred from having signature authority on any trust account; (3) that he complete continuing legal education credits required for reinstatement; (4) that if he returns to the practice of law, his practice be restricted to a law firm setting; (5) that he file an annual report with the Board regarding his employment status and promptly notify the Board if he changes employment; and (6) that if he returns to the practice of law, all lawyers responsible for the trust account at the firm at which he is employed be required to execute affidavits certifying that Mr. Eisenberg will exercise no management or control over the law firm's trust account. *298 ¶ 2. The Board's recommendation for reinstatement followed its review of the report filed by a subcommittee of the District 9 Professional Responsibility Committee (DPRC), which after a reinstatement hearing, issued its report recommending reinstatement of Mr. Eisenberg's license to practice law. In addition, the Board of Bar Examiners has recommended that Mr. Eisenberg's reinstatement petition be granted, having determined that he has satisfied the continuing legal education requirements for reinstatement. ¶ 3. We determine, based on the unconditional recommendation of the subcommittee of the DPRC, the conditional recommendation of the Board, and the recommendation of the Board of Bar Examiners, that Mr. Eisenberg's license to practice law in this state be reinstated upon conditions identified above.[2] This court informs Mr. Eisenberg that the practice of law in this state is a privilege, not a right; we expect and demand that he not deviate from these conditions. In the past, this court has, for good reasons, denied Mr. Eisenberg's numerous petitions for reinstatement. We now grant this, his seventh, petition for reinstatement warning *299 him in the strongest terms possible that any future violation of the Rules of Professional Conduct or deviation from these conditions will not be countenanced. ¶ 4. Mr. Eisenberg's license to practice law was suspended in 1984 for six months as discipline for having represented two criminal defendants whose interests were adverse and for failing to protect the interest of one of those clients in a case in which that client's liberty was at stake.[3] ¶ 5. Mr. Eisenberg's first two applications for reinstatement were denied: the first, on the ground that he had engaged in the practice of law while his license was suspended;[4] and the second, because he had continued to practice law while his license was suspended and he had failed to fully describe all his business activities during the suspension.[5] Thereafter, Mr. Eisenberg's third petition for reinstatement was withdrawn. His fourth petition was remanded to the Board for further consideration because of a pending investigation into his handling of trust account funds. That fourth petition became moot when the trust account investigation resulted in a disciplinary proceeding culminating in revocation of Mr. Eisenberg's license to practice law.[6] ¶ 6. Mr. Eisenberg's fifth reinstatement petition — his first following license revocation — was denied on the ground that he had not made restitution to the *300 client whose criminal case he handled while simultaneously representing another criminal defendant with conflicting interests and on the ground Mr. Eisenberg had made statements on a television program concerning his belief in the guilt of a criminal defendant he had represented.[7] ¶ 7. Mr. Eisenberg's sixth reinstatement petition was denied because he had failed to make restitution to or settle claims of persons injured or harmed by his misconduct, because he had expressed willingness to comply with the continuing legal education requirements for reinstatement only if he were assured that, having met those requirements, his license would be reinstated, and because he intended to practice law in Wisconsin only occasionally but maintain a trust account on his own, rather than in association with another lawyer or law firm in this state.[8] ¶ 8. Mr. Eisenberg currently resides in the City of Orlando, Orange County, Florida, where he owns a process serving business. He intends to remain in Florida and may take the Florida bar examination or practice law there on a pro hac vice basis. He would like to practice law in Wisconsin occasionally with his two sons, who are Madison attorneys, and be "of counsel" to their law firm. ¶ 9. After Mr. Eisenberg filed his seventh petition for reinstatement, the matter was referred to the DPRC for investigation; the DPRC referred the matter to a subcommittee for a public hearing and report. See SCR 22.28(5).[9] During the public hearing on the reinstatement *301 petition on September 1, 1999, the subcommittee focused its inquiry on restitution, Mr. Eisenberg's understanding and attitude toward the standards that are imposed upon members of the bar, and whether he could be safely recommended to the legal profession, the courts and the public as a person fit to be consulted by others and to represent them and otherwise act in matters of trust and confidence. ¶ 10. The restitution issue arose when Mr. Eisenberg was hired in September of 1977 to defend a client on three criminal counts; he was paid an advance fee of $10,000 for that representation. However, Mr. Eisenberg represented that client while he was also representing another client whose interests conflicted with the first client's. That conflict was the subject of the disciplinary proceeding against Mr. Eisenberg in 1984, but the issue of restitution of the $10,000 fee was not addressed in that proceeding. ¶ 11. Mr. Eisenberg's failure to make restitution of that $10,000 fee to the first client was one of the grounds upon which the Board made its adverse recommendation regarding Mr. Eisenberg's fourth *302 reinstatement petition; this court, however, did not address that restitution issue at that time because the reinstatement proceeding had been rendered moot by the revocation of Mr. Eisenberg's license in 1989 for trust account violations. ¶ 12. This court denied Mr. Eisenberg's fifth petition for reinstatement in 1996, in part, because of his failure to repay the $10,000 fee to the first client or the client's family after that client died. ¶ 13. During the sixth reinstatement proceeding, Mr. Eisenberg paid the sum of $10,000 in restitution to the client's family; however, Mr. Eisenberg took the position that he would pay interest on that restitution only if this court ordered him to do so. This court concluded that in declining to pay any interest to the client's family on the $10,000 fee unless ordered to do so, Mr. Eisenberg failed to display a proper attitude toward the standards that are imposed on the members of the bar. SCR 22.28(4)(f).[10] ¶ 14. Following the denial of his sixth petition for reinstatement, Mr. Eisenberg offered to pay interest in the amount of $5,000 to the family. The family, however, requested a payment of $8,000 in accumulated interest. ¶ 15. At the public hearing on this most recent petition for reinstatement, Mr. Eisenberg testified that he was sorry that he had hurt his client's family and that it had not been his intention to do so. Mr. Eisenberg indicated a willingness to pay interest to the family at the statutory interest rate of 5%; however, *303 there was uncertainty as to the correct starting date for the interest calculation. The DPRC subcommittee calculated that the sum of $4583 was due as interest to the family accruing from the date this court stayed a prior reinstatement proceeding to the date when Mr. Eisenberg had repaid the entire principal sum of $10,000. ¶ 16. Based on Mr. Eisenberg's testimony at the public hearing that he now understands the standards that are imposed on lawyers in this state and his acknowledgement that it has taken him a long time to conquer his pride, the DPRC subcommittee concluded that Mr. Eisenberg's attitude had significantly changed, that he now appears to be truly remorseful for his past actions and is willing to subject himself to the rules of professional conduct for attorneys adopted by this court. ¶ 17. The DPRC subcommittee recommended that Mr. Eisenberg's license be reinstated citing his effort to resolve the interest issue with the client's family; his candor regarding his behavior since his license revocation, his efforts to fulfil continuing legal education requirements, and his stated intention to have only a limited law practice and no signature authority over his sons' law firm trust account. ¶ 18. The Board, upon reviewing the DPRC subcommittee's report and recommendation, concluded that Mr. Eisenberg had satisfied the requirements of SCR 22.28(4)[11] for reinstatement of his license to practice *304 law in this state. The Board determined that Mr. Eisenberg had demonstrated by clear and convincing evidence that he has the moral character to practice law in this state subject to the conditions identified above. Unlike the DPRC subcommittee's recommendation to reinstate Mr. Eisenberg's license without conditions, the Board recommended that his petition for reinstatement of his license to practice law be granted subject to the above conditions. The Board also determined that Mr. Eisenberg has currently paid all costs of these pending proceedings. ¶ 19. This court now grants Attorney Eisenberg's petition to reinstate his license to practice law in this state reiterating all the conditions identified by the *305 Board in its report. For purposes of emphasis, we again caution Attorney Eisenberg that his absolute compliance with those conditions and with all rules adopted by this court governing attorneys' professional responsibility is demanded and expected. Any deviation from the conditions or the rules will not be countenanced. ¶ 20. IT IS ORDERED that the petition for the reinstatement of the license of Donald S. Eisenberg to practice law in Wisconsin is granted upon the following conditions: (1) that he pay interest of $4583 on the amount of a fee he was previously required to repay to a former client; (2) that he be barred from having signature authority on any trust account; (3) that he complete continuing legal education credits required for reinstatement; (4) that if he returns to the practice of law, his practice be restricted to a law firm setting; (5) that he file an annual report with the Board regarding his employment status and promptly notify the Board if he changes employment; and (6) that if he returns to the practice of law, all lawyers responsible for the trust account at the firm at which he is employed be required to execute affidavits certifying that Attorney Eisenberg will exercise no management or control over the law firm's trust account. ¶ 21. SHIRLEY S. ABRAHAMSON, C.J., did not participate. NOTES [1] Effective October 1, 2000, Wisconsin's attorney disciplinary process underwent a substantial restructuring. The name of the body responsible for investigating and prosecuting cases involving attorney misconduct was changed to the Office of Lawyer Regulation and the Supreme Court Rules applicable to the lawyer regulation system were also revised. Since the conduct underlying this case arose prior to October 1, 2000, the body will be referred to as "the Board" and all references to Supreme Court Rules will be to those in effect prior to October 1, 2000. [2] A violation of these conditions to practice law, whether it occurs in this state or elsewhere, will subject Mr. Eisenberg to the disciplinary authority of this state. See SCR 20:8.5(a). SCR 20:8.5(a) provides: (a) Disciplinary Authority. A lawyer admitted to the bar of this state is subject to the disciplinary authority of this state regardless of where the lawyer's conduct occurs. A lawyer allowed by a court of this state to appear and participate in a proceeding in that court is subject to the disciplinary authority of this state for conduct that occurs in connection with that proceeding. For the same conduct, a lawyer may be subject to the disciplinary authority of both this state and another jurisdiction where the lawyer is admitted to the bar or allowed to appear in a court proceeding. [3] Disciplinary Proceedings Against Eisenberg, 117 Wis. 2d 332, 344 N.W.2d 169 (1984). [4] Disciplinary Proceedings Against Eisenberg, 122 Wis. 2d 627, 363 N.W.2d 430 (1985). [5] Disciplinary Proceedings Against Eisenberg, 126 Wis. 2d 435, 377 N.W.2d 160 (1985). [6] Disciplinary Proceedings Against Eisenberg, 152 Wis. 2d 91, 447 N.W.2d 54 (1989). [7] Reinstatement of Eisenberg, 206 Wis. 2d 264, 556 N.W.2d 749 (1996). [8] Reinstatement of License of Eisenberg, 217 Wis. 2d 526, 577 N.W.2d 626 (1998). [9] Former SCR 22.28(5) provided: (5) The administrator shall investigate the eligibility of the petitioner for reinstatement and file a report and recommendation with the board. At least 30 days prior to the hearing on the petition before a professional responsibility committee, the administrator shall publish a notice in a newspaper of general circulation in any county in which the petitioner maintained an office prior to suspension or revocation and in the county of the petitioner's residence during the suspension or revocation and in an official publication of the state bar. The notice shall contain a brief statement of the nature and date of suspension or revocation, the matters required to be proved for reinstatement and the date on which a hearing on the petition will be held before a professional responsibility committee. In the case of a license suspension, the hearing shall not be held prior to the expiration of the period of suspension. [10] Former SCR 22.28(4)(f) provided: (4) The petition for reinstatement shall show that: (f) The petitioner has a proper understanding of and attitude toward the standards that are imposed upon members of the bar and will act in conformity with the standards. [11] Former SCR 22.28(4) provided: (4) The petition for reinstatement shall show that: (a) The petitioner desires to have the petitioner's license reinstated. (b) The petitioner has not practiced law during the period of suspension or revocation. (c) The petitioner has complied fully with the terms of the order and will continue to comply with them until the petitioner's license is reinstated. (d) The petitioner has maintained competence and learning in the law, including a list of specific activities pursued. (e) The petitioner's conduct since the suspension or revocation has been exemplary and above reproach. (f) The petitioner has a proper understanding of and attitude toward the standards that are imposed upon members of the bar and will act in conformity with the standards. (g) The petitioner can safely be recommended to the legal profession, the courts and the public as a person fit to be consulted by others and to represent them and otherwise act in matters of trust and confidence and in general to aid in the administration of justice as a member of the bar and as an officer of the courts. (h) The petitioner has fully complied with the requirements of SCR 22.26. (i) The petitioner indicates the proposed use of the license if reinstated. (j) The petitioner has fully described all business activities during the period of suspension or revocation. (k) The petitioner has made restitution or settled all claims from persons injured or harmed by petitioner's misconduct or, if the restitution is not complete, petitioner's explanation of the failure or inability to do so.
861 F.2d 714 Abdullah (Saleem Nuriddin)v.Chepko (Julius Dr.) NO. 88-6730 United States Court of Appeals,Fourth Circuit. OCT 03, 1988 1 Appeal From: D.Md. 2 REMANDED.
Amateur Slut On A Bubbly Chair Topless And SexyURL: http://www.sexzie.com/chanelle_shows/mgp20/set05/MTA3OTozOjEwMQ,0,0,0,/ Hot Amateur Blonde Slowly Taking Off Her Bikini Style Lingerie I love being sexy and flirty and dirty in front of the camera. I just turned 18 so of course I haven't moved out yet, and my Dad doesn't let me go out much, but my loss is your gain! When I'm ... Niches: Teens, Panties, Blondes, Amateurs, Americans, Solo Girl Site: Chanelle Shows/ Model: Chanelle Shows Amateur Young Babe Strips Down Nakey And Lets Us Have A LookURL: http://www.sexzie.com/madison_sweet/tgp09/set04/MTA3OTozOjExNA,0,0,0,/ Sexy Brunette Amateur Madison Sweet Waiting For Some Hard Dick!!!! Smooth Nighties Feel Just SO Good On This Tight Little Body Click Here And You Can Watch Me Take It Off! Check Out Newest Updates On Our Network Sign Up For One Of Our Solo Girl Sites And ... Niches: Teens, Panties, Amateurs, Innocent, Brown, Babes, Solo Girl Site: Madison Sweet/ Model: Madison Sweet Amateur Babe Takes Off Her Slinky Nightgown For UsURL: http://www.sexzie.com/chanelle_shows/tgp23/set03/MTA3OTozOjEwMQ,0,0,0,/ sexy amateur teen chanelle shows wearing a smoking hot red and white lace nightie My name is Chanelle. I just love to strip. While i strip i take pictures so i can share them all with you. Want to see me more but in less? :) Enter Here! Watch Tons Of My ... Niches: Teens, Panties, Blondes, Amateurs, Americans, Solo Girl Site: Chanelle Shows/ Model: Chanelle Shows Tanned Teen Amateur With A Very Round Perky AssURL: http://www.sexzie.com/chanelle_shows/mgp18/set03/MTA3OTozOjEwMQ,0,0,0,/Amateur Blonde Takes Off Bra And Displays Her Beautiful Breasts I love being sexy and flirty and dirty in front of the camera. I just turned 18 so of course I haven't moved out yet, and my Dad doesn't let me go out much, but my loss is your gain! When ... Niches: Teens, Panties, Blondes, Amateurs, Americans, Solo Girl Site: Chanelle Shows/ Model: Chanelle Shows Sexy Young Amateur In A Pretty Pink Lingerie SetURL: http://www.sexzie.com/claire_michaels/tgp18/set03/MTA3OTozOjExMg,0,0,0,/ :: ClaireMichaels.com :: My name is Claire. I just realy love this sexy pink lingerie outfit. The best part is when i slowly take it off for you to see. ;) See lots more of me Click Here! CLICK HERE TO SEE MY HIGH QUALITY PHOTOS! <<< CHECK OUT ... Niches: Teens, Panties, Amateurs, Small Tits, Americans, Solo Girl Site: Claire Michaels/ Model: Claire Michaels Amateur Babe With A Juicy Tight Round AssURL: http://www.sexzie.com/chanelle_shows/tgp07/set02/MTA3OTozOjEwMQ,0,0,0,/ Welcome To ChanelleShows.com Watch Tons Of My Videos Now! Click Here! I just turned 18 so of course I haven't moved out yet, and my Mom doesn't let me go out much, but she did buy me a new camera. I just love to take photos of myself. See me take lots ... Niches: Teens, Panties, Blondes, Amateurs, Americans, Solo Girl Site: Chanelle Shows/ Model: Chanelle Shows Amateur Teen In A Tiny Green Bikini Gets Topless And Lotions ... URL: http://www.sexzie.com/claire_michaels/tgp16/set01/MTA3OTozOjExMg,0,0,0,/ sexy brunette teen claire michaels in a green bikini in the shower My name is Claire. I just got a new digital camera. I am trying it out by geting dressed in sexy outfits and taking pictures while i take the outfits off. ;) CUM AND SEE ME INSIDE! CLICK ... Niches: Teens, Panties, Amateurs, Small Tits, Americans, Solo Girl Site: Claire Michaels/ Model: Claire Michaels Amateur Blonde Reveals A Couple Of Beautiful Perky TitsURL: http://www.sexzie.com/chanelle_shows/mgp05/set05/MTA3OTozOjEwMQ,0,0,0,/ Welcome To ChanelleShows.com I love being sexy and flirty and dirty in front of the camera. I just turned 18 so of course I haven't moved out yet, and my Dad doesn't let me go out much, but my loss is your gain! When I'm bored I just turn the camera on ... Niches: Teens, Panties, Blondes, Amateurs, Americans, Solo Girl Site: Chanelle Shows/ Model: Chanelle Shows Young Amateur Jana Soaping Up Her Sexy Tight BodyURL: http://www.sexzie.com/jana_harlot/mgp03/set03/MTA3OTozOjEwMg,0,0,0,/ :: www.JanaHarlot.com :: I'm Jana! I may look innocent but that's just about the last word I'd use to describe myself! I love trying all sorts of new things but I always end up going back to my favorite toys - handcuffs, whips, you name it and I have it ... Niches: Teens, Panties, Blondes, Amateurs, Innocent, European, Small Tits, Babes, Solo Girl Site: Jana Harlot/ Model: Jana Harlot For Search feature please to enable JavaScript or to put this site in Trusted Sites zone in your browser Parents please protect your kids from accessing porn by simply using your browser's surfing preferences. All models appearing on this site are 18 years or older. For 2257 related inquiries please contact each gallery site owner individually. We do not produce pornographic content ourselves. Reproduction of our site design, as well as part or totality of our links is prohibited. Abuse email
Q: Javascript overhead associated with Class versus object I was wondering if the overhead associated with creating a new class instead of a new object of that class was small or large. I am using dojo, but I will provide versus examples for pure JS. I will be creating between 10 and 100 objects once at start up, I don't think this will be a serious issue, but I want to cover all my bases. Case 1: Javascript object function Person(name){ this.name = name; } var p1 = new Person('Caine'); var p2 = new Person('Seth'); var p3 = new Person('Abel'); Versus Case 2: Javascript Classes function Person1(){ this.name = 'Caine'; } function Person2(){ this.name = 'Seth'; } function Person3(){ this.name = 'Abel'; } var p1 = new Person1(); var p2 = new Person2(); var p3 = new Person3(); EDIT : people want to know why I would ever take this approach. I'm implementing a modular program where the user creates and/or loads objects as desired, and rather than having one Person/Shape/Text... class and calling it with 50,000,000 arguments (name, age, sex, label, font, x , y , w , h...) I want to create a single class with all the values. This will also simplify editing the code as I want to allow the user to view and modify the code from within the browser. I am not new to OOP, and I do realize this is a departure from standard programing procedure, so have a little faith in that i know what i am doing =) A: Not really classes as such (JS doesn't have 'em), but what you've got in the second example is two additional constructor functions. Each will necessarily have an additional prototype property object of its own. So your second approach is marginally less efficient in terms of objects created and stored. If you had lots of instances of Person1, though, the second approach could save (a tiny amount of) space by putting the shared property on the prototype instead of separately on each new instance: function Person1() {} Person1.prototype.name= 'Caine'; saving one String instance per Person1 instance. In reality it's not going to make any practical difference and you should write whichever is the cleanest expression of the idea your code encapsulates. (Personally I think it'd be unusual to have a different class for each first name...)
I won’t mention Mark Zuckerberg by name. But, honestly, young man, you’re almost 35 years old, worth $72 billion, and you’re wearing your underwear in public. Yes, I’m also going around in an untucked “My Kid Went to College and All I Got Was This Lousy . . .” But I’ve earned it. Or, rather, I haven’t. I can’t afford a Savile Row morning suit, Turnbull & Asser dress shirt, Hermès cravat and pair of bespoke John Lobb Oxfords. And — taking out the trash, gassing up the car and ordering an Egg McMuffin at the drive-through window — I wouldn’t be comfortable wearing them. AD AD But Zuckerberg in his Fruit of the Looms seems too comfortable. And this makes us mad. There was a time when wealth was distributed far less equitably, but we weren’t as resentful of the rich. We resented our poverty, but we were relieved that we didn’t have to put on striped pants and spats to have breakfast. Being rich looked very uncomfortable. Rich people’s clothes were stiff and starchy, and they wore lots of them. Rich men were choked by tall collars and pinched by high-button shoes. Rich women were corseted to the point of kidney failure, constrained in so much crinoline and brocade that they might as well have been wearing off-the-shoulder burqas, and encumbered by bustles large enough that they couldn’t turn sideways without knocking over a footman and the parlor maid. AD Now we have Jeff Bezos in a New Kids on the Block bomber jacket, Bill Gates outfitted in Mister Rogers’s sweaters and Gloria Steinem’s old aviators and cutting his own hair, Elon Musk smoking pot on a live Internet show, and Richard Branson looking like the guy at the end of the bar muttering lines from “The Big Lebowski.” That’s not counting the various plutocrats caught in Us and Star magazines wearing nothing much at all. If rich people start getting any more comfortable, police will be shooing them off park benches. AD Rich people are also having fun — launching their own rocket ships, sending lewd selfies, buying private islands (Manhattan, for example). Having fun was something rich people didn’t used to do, at least not as far as we poor people could tell. AD They went to the opera. It was like vaudeville except without the tap dancing, acrobatics, magic tricks, jokes or entertainment. Rich people — and there were supposedly only Four Hundred of them — gathered in Mrs. Astor’s ballroom. They waltzed like sticks in the mud to music that would put the dead to sleep, and ate and drank tiny things from tiny plates and glasses. They never knocked the bung out of the beer keg or danced a polka. Being rich meant living in a big drafty house with no privacy because the footman and parlor maid you clobbered with your bustle were always poking around. AD You had to wait to eat dinner until 8 p.m. Table manners were complicated. Which knife do you use to eat peas? And strange foods were served — terrapin soup (boiled turtle), shad roe (eggs that not only weren’t fried but came from a fish) and pheasant under glass (dangerously breakable). AD Rich people trying to have fun didn’t look like much fun, either. They got soaked in their yachts, broke their necks on their polo ponies and wore themselves to a frazzle walking all over tarnation hitting little white balls with a stick for no reason. Even when relaxing they had to get dressed up according to strict social protocol. If you arrived at a yacht race wearing plus-fours and a tam o’shanter, Commodore Vanderbilt would dunk you. These days rich people are behaving just like the rest of us. Or just like the rest of us would if we were rich. The trouble is we can’t afford to be rich slobs the way rich slobs can. (The wash-that-gray-away skivvies Zuckerberg sports are actually custom ordered from Brunello Cucinelli for upwards of $300.) AD AD The rich aren’t satisfied with having all the money. They want all the fun, too. And that’s not fair. Let’s make rich people uncomfortable again. Maybe tax the dickens out of them. But somehow taxation never enriches me. Let’s require everyone with a net worth over $100 million to wear a top hat at all times. This does nothing to fix income inequality — but what a swell target for snowballs, brickbats and rotten fruit.
Improved expression of a soluble single chain antibody fusion protein containing tumor necrosis factor in Escherichia coli. The immunocytokine scFvMEL/TNF is a fusion protein composed of tumor necrosis factor (TNF-alpha) and a single-chain Fv antibody scFvMEL targeting the melanoma-associated gp240 antigen. The fusion protein containing thioredoxin and a hexa-histidine tag was expressed in two Escherichia coli host cells, AD494 (DE3) pLysS and T7 Express I (q). The cell growth and expression level of target protein, His-tagged scFvMEL/TNF, were highly dependent on the induction temperature, inducer types and host strains. The ratio of insoluble to soluble target proteins was found to be controllable and could be minimized using cold shock conditions at less than 18 degrees C. The total productivity of soluble target protein was further improved by high cell density cultivation using a DO-STAT feeding strategy. The scFvMEL/TNF purified under their conditions was specifically cytotoxic to gp240-antigen positive melanoma A375-M cells as previously described.
Q: Inserting in the middle of LinkedList in Java Imagine you have a LinkedList insert elements {A, B, C, D, E, F}, these operation are O(1) now I want to go back to the beginning and add {G, H, I} so the final LinkedList would look like: {G, H, I, A, B, C, D, E, F}. I could do this using list.add(index, content), however this is vastly inefficient since each operation would be O(N). Later I would like to continue adding at the tail. I'm sure there is a way to do all these operation in O(1) time, without making my own linked list, I just don't know how. Edit: So what I really want to know if Java have some sort iterator/pointer, i, where a can insert from there in O(1), example to i=3 {A, B, C, ^ D, E, F}, insert {G}, {H}, {I} would make the list looks like {A, B, C, G, H, I, D, E, F}. list.addAll works but then I have to create a list first. Any way if such method exist I don't want to carry on without knowing it. Lastly I'm asking this question to solve this Uva judge problem I know how solve it, but if can't generalized other scenarios I'm learning nothing. A: According to the Javadoc: Doubly-linked list implementation of the List and Deque interfaces. All of the operations perform as could be expected for a doubly-linked list. Operations that index into the list will traverse the list from the beginning or the end, whichever is closer to the specified index. Regarding your concern: I could do this using list.add(index, content) however this is vastly inefficient since each operation would be O(N). Later I would like to continue adding at the tail. This is not true. Inserting elements at the beginning or the end of the list is designed to have O(1) running time. Hence there is nothing to worry about. Edit: After reading the UVa problem description, my answer above still stands. Furthermore, I'd like to add that a good way to solve the problem is to add entire strings of text at a time, not a character at a time. All the characters between two home/end keypresses should be treated as a single unbreakable string. Then we add these strings to the beginning or end of a LinkedList<String>, not LinkedList<Character>. There is still no need to worry about inserting in the middle, nor is it necessary to have an imaginary insertion iterator.
Network challenges and responses 2017 Global Impact ReportAre you ready? Deloitte’s reputation is influenced significantly by our ability to deliver consistently high-quality audits in every market and to every client, and to responsibly remedy instances when applicable standards are not met. During fiscal year 2017, Deloitte made significant efforts to enhance audit quality and address certain inappropriate conduct from past years that were wholly incompatible with Deloitte’s culture and our commitment to the highest professional standards. In December 2016, Deloitte Brazil and the US Public Company Accounting Oversight Board (PCAOB) settled a matter related to audits of two companies and certain inappropriate conduct in the course of a PCAOB inspection and investigation. As soon as Deloitte Brazil became aware of inappropriate conduct, each of the individuals at issue was suspended and subsequently separated from the firm. Deloitte Brazil is implementing a robust remediation plan that addresses the identified issues and strengthens the firm’s ability to deliver consistent, high-quality audits that comply with the highest professional standards going forward. Other matters addressed in fiscal year 2017 in the Deloitte network included matters related to the timely archiving of work papers and certain deficiencies involving independence. Technological enhancements have been put in place throughout the network to protect the integrity of archived working papers, and significant changes and improvements in systems of quality controls related to independence have been made. In addition to changes implemented at local levels: Deloitte Global Audit imperatives have been adopted across the Deloitte network. They include actions and considerations that should be taken on all engagements to help achieve the highest standard of professional excellence. An enhanced, comprehensive approach to the monitoring and measurement of audit quality has been developed and adopted by all member firms. The program includes executing a number of interrelated activities which results in a globally consistent level of rigor in the assessment of audit quality and the approach to address and remedy any noted deviations from professional standards. We remain committed to working with regulators around the world to ensure Deloitte professionals are operating in accordance with the highest professional standards and delivering the highest-quality service to our clients. We also continue to proactively strengthen our culture of integrity, stressing quality and consistency across the network. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UdK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see About Deloitte to learn more about our global network of member firms.
Miniscrew-supported coil spring for molar uprighting: description. Since the beginning of miniscrews as orthodontic anchorage, many applications have been described in the literature. Among these, one is the uprighting of mesially inclined molars. In regard to the mechanical aspects, however, there is little information about the application of orthodontic forces using such devices. The objective of this study was to describe a miniscrew supported spring for uprighting of mesially inclined molars. With this device, one can achieve the correct use of orthodontic biomechanics, thus favoring more predictable tooth movements and preventing unwanted movements from occurring.
set global innodb_file_per_table=on; set global innodb_file_format='Barracuda'; CREATE TABLE t1_purge ( A INT, B BLOB, C BLOB, D BLOB, E BLOB, F BLOB, G BLOB, H BLOB, PRIMARY KEY (B(767), C(767), D(767), E(767), A), INDEX (A) ) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; INSERT INTO t1_purge VALUES (1, REPEAT('b', 766), REPEAT('c', 766), REPEAT('d', 766), REPEAT('e', 766), REPEAT('f', 766), REPEAT('g', 766), REPEAT('h', 766)); CREATE TABLE t2_purge ( A INT PRIMARY KEY, B BLOB, C BLOB, D BLOB, E BLOB, F BLOB, G BLOB, H BLOB, I BLOB, J BLOB, K BLOB, L BLOB, INDEX (B(767))) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; INSERT INTO t2_purge VALUES (1, REPEAT('b', 766), REPEAT('c', 766), REPEAT('d', 766), REPEAT('e', 766), REPEAT('f', 766), REPEAT('g', 766), REPEAT('h', 766), REPEAT('i', 766), REPEAT('j', 766), REPEAT('k', 766), REPEAT('l', 766)); CREATE TABLE t3_purge ( A INT, B VARCHAR(800), C VARCHAR(800), D VARCHAR(800), E VARCHAR(800), F VARCHAR(800), G VARCHAR(800), H VARCHAR(800), PRIMARY KEY (B(767), C(767), D(767), E(767), A), INDEX (A) ) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; INSERT INTO t3_purge SELECT * FROM t1_purge; CREATE TABLE t4_purge ( A INT PRIMARY KEY, B VARCHAR(800), C VARCHAR(800), D VARCHAR(800), E VARCHAR(800), F VARCHAR(800), G VARCHAR(800), H VARCHAR(800), I VARCHAR(800), J VARCHAR(800), K VARCHAR(800), L VARCHAR(800), INDEX (B(767))) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; INSERT INTO t4_purge SELECT * FROM t2_purge; DELETE FROM t1_purge; DELETE FROM t2_purge; DELETE FROM t3_purge; DELETE FROM t4_purge; SET @r=REPEAT('a',500); CREATE TABLE t12637786(a INT, v1 VARCHAR(500), v2 VARCHAR(500), v3 VARCHAR(500), v4 VARCHAR(500), v5 VARCHAR(500), v6 VARCHAR(500), v7 VARCHAR(500), v8 VARCHAR(500), v9 VARCHAR(500), v10 VARCHAR(500), v11 VARCHAR(500), v12 VARCHAR(500), v13 VARCHAR(500), v14 VARCHAR(500), v15 VARCHAR(500), v16 VARCHAR(500), v17 VARCHAR(500), v18 VARCHAR(500) ) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; CREATE INDEX idx1 ON t12637786(a,v1); INSERT INTO t12637786 VALUES(9,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r,@r); UPDATE t12637786 SET a=1000; DELETE FROM t12637786; create table t12963823(a blob,b blob,c blob,d blob,e blob,f blob,g blob,h blob, i blob,j blob,k blob,l blob,m blob,n blob,o blob,p blob) engine=innodb row_format=dynamic; SET @r = repeat('a', 767); insert into t12963823 values (@r,@r,@r,@r, @r,@r,@r,@r, @r,@r,@r,@r, @r,@r,@r,@r); create index ndx_a on t12963823 (a(500)); create index ndx_b on t12963823 (b(500)); create index ndx_c on t12963823 (c(500)); create index ndx_d on t12963823 (d(500)); create index ndx_e on t12963823 (e(500)); create index ndx_f on t12963823 (f(500)); create index ndx_k on t12963823 (k(500)); create index ndx_l on t12963823 (l(500)); SET @r = repeat('b', 500); update t12963823 set a=@r,b=@r,c=@r,d=@r; update t12963823 set e=@r,f=@r,g=@r,h=@r; update t12963823 set i=@r,j=@r,k=@r,l=@r; update t12963823 set m=@r,n=@r,o=@r,p=@r; alter table t12963823 drop index ndx_a; alter table t12963823 drop index ndx_b; create index ndx_g on t12963823 (g(500)); create index ndx_h on t12963823 (h(500)); create index ndx_i on t12963823 (i(500)); create index ndx_j on t12963823 (j(500)); create index ndx_m on t12963823 (m(500)); create index ndx_n on t12963823 (n(500)); create index ndx_o on t12963823 (o(500)); create index ndx_p on t12963823 (p(500)); show create table t12963823; Table Create Table t12963823 CREATE TABLE `t12963823` ( `a` blob, `b` blob, `c` blob, `d` blob, `e` blob, `f` blob, `g` blob, `h` blob, `i` blob, `j` blob, `k` blob, `l` blob, `m` blob, `n` blob, `o` blob, `p` blob, KEY `ndx_c` (`c`(500)), KEY `ndx_d` (`d`(500)), KEY `ndx_e` (`e`(500)), KEY `ndx_f` (`f`(500)), KEY `ndx_k` (`k`(500)), KEY `ndx_l` (`l`(500)), KEY `ndx_g` (`g`(500)), KEY `ndx_h` (`h`(500)), KEY `ndx_i` (`i`(500)), KEY `ndx_j` (`j`(500)), KEY `ndx_m` (`m`(500)), KEY `ndx_n` (`n`(500)), KEY `ndx_o` (`o`(500)), KEY `ndx_p` (`p`(500)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 ROW_FORMAT=DYNAMIC create table t1(a varchar(2) primary key) engine=innodb; insert into t1 values(''); create index t1a1 on t1(a(1)); drop table t1; set global innodb_file_per_table=0; set global innodb_file_format=Antelope; create table t1(a int not null, b int, c char(10) not null, d varchar(20)) engine = innodb; insert into t1 values (5,5,'oo','oo'),(4,4,'tr','tr'),(3,4,'ad','ad'),(2,3,'ak','ak'); commit; alter table t1 add index b (b), add index b (b); ERROR 42000: Duplicate key name 'b' alter table t1 add index (b,b); ERROR 42S21: Duplicate column name 'b' alter table t1 add index d2 (d); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, KEY `d2` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 explain select * from t1 force index(d2) order by d; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL d2 23 NULL 4 select * from t1 force index (d2) order by d; a b c d 3 4 ad ad 2 3 ak ak 5 5 oo oo 4 4 tr tr alter table t1 add unique index (b); ERROR 23000: Duplicate entry '4' for key 'b' show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, KEY `d2` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add index (b); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, KEY `d2` (`d`), KEY `b` (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add unique index (c), add index (d); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, UNIQUE KEY `c` (`c`), KEY `d2` (`d`), KEY `b` (`b`), KEY `d` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 10 NULL 4 alter table t1 add primary key (a), drop index c; show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), KEY `d2` (`d`), KEY `b` (`b`), KEY `d` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add primary key (c); ERROR 42000: Multiple primary key defined alter table t1 drop primary key, add primary key (b); ERROR 23000: Duplicate entry '4' for key 'PRIMARY' create unique index c on t1 (c); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `c` (`c`), KEY `d2` (`d`), KEY `b` (`b`), KEY `d` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 10 NULL 4 select * from t1 force index(c) order by c; a b c d 3 4 ad ad 2 3 ak ak 5 5 oo oo 4 4 tr tr alter table t1 drop index b, add index (b); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `c` (`c`), KEY `d2` (`d`), KEY `d` (`d`), KEY `b` (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 insert into t1 values(6,1,'ggg','ggg'); select * from t1; a b c d 2 3 ak ak 3 4 ad ad 4 4 tr tr 5 5 oo oo 6 1 ggg ggg select * from t1 force index(b) order by b; a b c d 6 1 ggg ggg 2 3 ak ak 3 4 ad ad 4 4 tr tr 5 5 oo oo select * from t1 force index(c) order by c; a b c d 3 4 ad ad 2 3 ak ak 6 1 ggg ggg 5 5 oo oo 4 4 tr tr select * from t1 force index(d) order by d; a b c d 3 4 ad ad 2 3 ak ak 6 1 ggg ggg 5 5 oo oo 4 4 tr tr explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 5 NULL 5 explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 10 NULL 5 explain select * from t1 force index(d) order by d; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL d 23 NULL 5 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) NOT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `c` (`c`), KEY `d2` (`d`), KEY `d` (`d`), KEY `b` (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int, c char(10), d varchar(20), primary key (a)) engine = innodb; insert into t1 values (1,1,'ab','ab'),(2,2,'ac','ac'),(3,3,'ad','ad'),(4,4,'afe','afe'); commit; alter table t1 add index (c(2)); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), KEY `c` (`c`(2)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add unique index (d(10)); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `d` (`d`(10)), KEY `c` (`c`(2)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 insert into t1 values(5,1,'ggg','ggg'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 3 ad ad 4 4 afe afe 5 1 ggg ggg select * from t1 force index(c) order by c; a b c d 1 1 ab ab 2 2 ac ac 3 3 ad ad 4 4 afe afe 5 1 ggg ggg select * from t1 force index(d) order by d; a b c d 1 1 ab ab 2 2 ac ac 3 3 ad ad 4 4 afe afe 5 1 ggg ggg explain select * from t1 order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 5 Using filesort explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 5 Using filesort explain select * from t1 force index(d) order by d; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 5 Using filesort show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `d` (`d`(10)), KEY `c` (`c`(2)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 drop index d; insert into t1 values(8,9,'fff','fff'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 3 ad ad 4 4 afe afe 5 1 ggg ggg 8 9 fff fff select * from t1 force index(c) order by c; a b c d 1 1 ab ab 2 2 ac ac 3 3 ad ad 4 4 afe afe 8 9 fff fff 5 1 ggg ggg explain select * from t1 order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 6 Using filesort explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 6 Using filesort explain select * from t1 order by d; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 6 Using filesort show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), KEY `c` (`c`(2)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int, c char(10), d varchar(20), primary key (a)) engine = innodb; insert into t1 values (1,1,'ab','ab'),(2,2,'ac','ac'),(3,2,'ad','ad'),(4,4,'afe','afe'); commit; alter table t1 add unique index (b,c); insert into t1 values(8,9,'fff','fff'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff select * from t1 force index(b) order by b; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 16 NULL 5 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `b` (`b`,`c`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add index (b,c); insert into t1 values(11,11,'kkk','kkk'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 11 11 kkk kkk select * from t1 force index(b) order by b; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 11 11 kkk kkk explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 16 NULL 6 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `b` (`b`,`c`), KEY `b_2` (`b`,`c`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t1 add unique index (c,d); insert into t1 values(13,13,'yyy','aaa'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 11 11 kkk kkk 13 13 yyy aaa select * from t1 force index(b) order by b; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 11 11 kkk kkk 13 13 yyy aaa select * from t1 force index(c) order by c; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 11 11 kkk kkk 13 13 yyy aaa explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 16 NULL 7 explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 34 NULL 7 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `b` (`b`,`c`), UNIQUE KEY `c` (`c`,`d`), KEY `b_2` (`b`,`c`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int not null, c int, primary key (a), key (b)) engine = innodb; create table t3(a int not null, c int not null, d int, primary key (a), key (c)) engine = innodb; create table t4(a int not null, d int not null, e int, primary key (a), key (d)) engine = innodb; create table t2(a int not null, b int not null, c int not null, d int not null, e int, foreign key (b) references t1(b) on delete cascade, foreign key (c) references t3(c), foreign key (d) references t4(d)) engine = innodb; alter table t1 drop index b; ERROR HY000: Cannot drop index 'b': needed in a foreign key constraint alter table t3 drop index c; ERROR HY000: Cannot drop index 'c': needed in a foreign key constraint alter table t4 drop index d; ERROR HY000: Cannot drop index 'd': needed in a foreign key constraint alter table t2 drop index b; ERROR HY000: Cannot drop index 'b': needed in a foreign key constraint alter table t2 drop index b, drop index c, drop index d; ERROR HY000: Cannot drop index 'b': needed in a foreign key constraint create unique index dc on t2 (d,c); create index dc on t1 (b,c); alter table t2 add primary key (a); insert into t1 values (1,1,1); insert into t3 values (1,1,1); insert into t4 values (1,1,1); insert into t2 values (1,1,1,1,1); commit; alter table t4 add constraint dc foreign key (a) references t1(a); show create table t4; Table Create Table t4 CREATE TABLE `t4` ( `a` int(11) NOT NULL, `d` int(11) NOT NULL, `e` int(11) DEFAULT NULL, PRIMARY KEY (`a`), KEY `d` (`d`), CONSTRAINT `dc` FOREIGN KEY (`a`) REFERENCES `t1` (`a`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t3 add constraint dc foreign key (a) references t1(a); ERROR HY000: Can't create table '#sql-temporary' (errno: 121) show create table t3; Table Create Table t3 CREATE TABLE `t3` ( `a` int(11) NOT NULL, `c` int(11) NOT NULL, `d` int(11) DEFAULT NULL, PRIMARY KEY (`a`), KEY `c` (`c`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 alter table t2 drop index b, add index (b); ERROR 42000: Incorrect index name 'b' show create table t2; Table Create Table t2 CREATE TABLE `t2` ( `a` int(11) NOT NULL, `b` int(11) NOT NULL, `c` int(11) NOT NULL, `d` int(11) NOT NULL, `e` int(11) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `dc` (`d`,`c`), KEY `b` (`b`), KEY `c` (`c`), CONSTRAINT `t2_ibfk_1` FOREIGN KEY (`b`) REFERENCES `t1` (`b`) ON DELETE CASCADE, CONSTRAINT `t2_ibfk_2` FOREIGN KEY (`c`) REFERENCES `t3` (`c`), CONSTRAINT `t2_ibfk_3` FOREIGN KEY (`d`) REFERENCES `t4` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 delete from t1; ERROR 23000: Cannot delete or update a parent row: a foreign key constraint fails (`test`.`t4`, CONSTRAINT `dc` FOREIGN KEY (`a`) REFERENCES `t1` (`a`)) drop index dc on t4; ERROR 42000: Can't DROP 'dc'; check that column/key exists alter table t3 drop foreign key dc; ERROR HY000: Error on rename of './test/t3' to '#sql2-temporary' (errno: 152) alter table t4 drop foreign key dc; select * from t2; a b c d e 1 1 1 1 1 delete from t1; select * from t2; a b c d e drop table t2,t4,t3,t1; create table t1(a int not null, b int, c char(10), d varchar(20), primary key (a)) engine = innodb default charset=utf8; insert into t1 values (1,1,'ab','ab'),(2,2,'ac','ac'),(3,2,'ad','ad'),(4,4,'afe','afe'); commit; alter table t1 add unique index (b); ERROR 23000: Duplicate entry '2' for key 'b' insert into t1 values(8,9,'fff','fff'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 alter table t1 add index (b); insert into t1 values(10,10,'kkk','iii'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii select * from t1 force index(b) order by b; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 5 NULL 6 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), KEY `b` (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 alter table t1 add unique index (c), add index (d); insert into t1 values(11,11,'aaa','mmm'); select * from t1; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii 11 11 aaa mmm select * from t1 force index(b) order by b; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii 11 11 aaa mmm select * from t1 force index(c) order by c; a b c d 11 11 aaa mmm 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii select * from t1 force index(d) order by d; a b c d 1 1 ab ab 2 2 ac ac 3 2 ad ad 4 4 afe afe 8 9 fff fff 10 10 kkk iii 11 11 aaa mmm explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 5 NULL 7 explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 31 NULL 7 explain select * from t1 force index(d) order by d; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL d 63 NULL 7 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `c` (`c`), KEY `b` (`b`), KEY `d` (`d`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 check table t1; Table Op Msg_type Msg_text test.t1 check status OK drop table t1; create table t1(a int not null, b int) engine = innodb; insert into t1 values (1,1),(1,1),(1,1),(1,1); alter table t1 add unique index (a); ERROR 23000: Duplicate entry '1' for key 'a' alter table t1 add unique index (b); ERROR 23000: Duplicate entry '1' for key 'b' alter table t1 add unique index (a), add unique index(b); ERROR 23000: Duplicate entry '1' for key 'a' show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, c int not null,b int, primary key(a), unique key(c), key(b)) engine = innodb; alter table t1 drop index c, drop index b; show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `c` int(11) NOT NULL, `b` int(11) DEFAULT NULL, PRIMARY KEY (`a`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int, primary key(a)) engine = innodb; alter table t1 add index (b); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, PRIMARY KEY (`a`), KEY `b` (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int, c char(10), d varchar(20), primary key (a)) engine = innodb; insert into t1 values (1,1,'ab','ab'),(2,2,'ac','ac'),(3,3,'ac','ac'),(4,4,'afe','afe'),(5,4,'affe','affe'); alter table t1 add unique index (b), add unique index (c), add unique index (d); ERROR 23000: Duplicate entry '4' for key 'b' alter table t1 add unique index (c), add unique index (b), add index (d); ERROR 23000: Duplicate entry 'ac' for key 'c' show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) DEFAULT NULL, `c` char(10) DEFAULT NULL, `d` varchar(20) DEFAULT NULL, PRIMARY KEY (`a`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 drop table t1; create table t1(a int not null, b int not null, c int, primary key (a), key(c)) engine=innodb; insert into t1 values (5,1,5),(4,2,4),(3,3,3),(2,4,2),(1,5,1); alter table t1 add unique index (b); insert into t1 values (10,20,20),(11,19,19),(12,18,18),(13,17,17); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) NOT NULL, `c` int(11) DEFAULT NULL, PRIMARY KEY (`a`), UNIQUE KEY `b` (`b`), KEY `c` (`c`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 check table t1; Table Op Msg_type Msg_text test.t1 check status OK explain select * from t1 force index(c) order by c; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL c 5 NULL 9 explain select * from t1 order by a; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL PRIMARY 4 NULL 9 explain select * from t1 force index(b) order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL b 4 NULL 9 select * from t1 order by a; a b c 1 5 1 2 4 2 3 3 3 4 2 4 5 1 5 10 20 20 11 19 19 12 18 18 13 17 17 select * from t1 force index(b) order by b; a b c 5 1 5 4 2 4 3 3 3 2 4 2 1 5 1 13 17 17 12 18 18 11 19 19 10 20 20 select * from t1 force index(c) order by c; a b c 1 5 1 2 4 2 3 3 3 4 2 4 5 1 5 13 17 17 12 18 18 11 19 19 10 20 20 drop table t1; create table t1(a int not null, b int not null) engine=innodb; insert into t1 values (1,1); alter table t1 add primary key(b); insert into t1 values (2,2); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, `b` int(11) NOT NULL, PRIMARY KEY (`b`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 check table t1; Table Op Msg_type Msg_text test.t1 check status OK select * from t1; a b 1 1 2 2 explain select * from t1; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 2 explain select * from t1 order by a; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 ALL NULL NULL NULL NULL 2 Using filesort explain select * from t1 order by b; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL PRIMARY 4 NULL 2 checksum table t1; Table Checksum test.t1 582702641 drop table t1; create table t1(a int not null) engine=innodb; insert into t1 values (1); alter table t1 add primary key(a); insert into t1 values (2); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL, PRIMARY KEY (`a`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 check table t1; Table Op Msg_type Msg_text test.t1 check status OK commit; select * from t1; a 1 2 explain select * from t1; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL PRIMARY 4 NULL 2 Using index explain select * from t1 order by a; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 index NULL PRIMARY 4 NULL 2 Using index drop table t1; create table t2(d varchar(17) primary key) engine=innodb default charset=utf8; create table t3(a int primary key) engine=innodb; insert into t3 values(22),(44),(33),(55),(66); insert into t2 values ('jejdkrun87'),('adfd72nh9k'), ('adfdpplkeock'),('adfdijnmnb78k'),('adfdijn0loKNHJik'); create table t1(a int, b blob, c text, d text not null) engine=innodb default charset = utf8; insert into t1 select a,left(repeat(d,100*a),65535),repeat(d,20*a),d from t2,t3; drop table t2, t3; select count(*) from t1 where a=44; count(*) 5 select a, length(b),b=left(repeat(d,100*a),65535),length(c),c=repeat(d,20*a),d from t1; a length(b) b=left(repeat(d,100*a),65535) length(c) c=repeat(d,20*a) d 22 22000 1 4400 1 adfd72nh9k 22 35200 1 7040 1 adfdijn0loKNHJik 22 28600 1 5720 1 adfdijnmnb78k 22 26400 1 5280 1 adfdpplkeock 22 22000 1 4400 1 jejdkrun87 33 33000 1 6600 1 adfd72nh9k 33 52800 1 10560 1 adfdijn0loKNHJik 33 42900 1 8580 1 adfdijnmnb78k 33 39600 1 7920 1 adfdpplkeock 33 33000 1 6600 1 jejdkrun87 44 44000 1 8800 1 adfd72nh9k 44 65535 1 14080 1 adfdijn0loKNHJik 44 57200 1 11440 1 adfdijnmnb78k 44 52800 1 10560 1 adfdpplkeock 44 44000 1 8800 1 jejdkrun87 55 55000 1 11000 1 adfd72nh9k 55 65535 1 17600 1 adfdijn0loKNHJik 55 65535 1 14300 1 adfdijnmnb78k 55 65535 1 13200 1 adfdpplkeock 55 55000 1 11000 1 jejdkrun87 66 65535 1 13200 1 adfd72nh9k 66 65535 1 21120 1 adfdijn0loKNHJik 66 65535 1 17160 1 adfdijnmnb78k 66 65535 1 15840 1 adfdpplkeock 66 65535 1 13200 1 jejdkrun87 alter table t1 add primary key (a), add key (b(20)); ERROR 23000: Duplicate entry '22' for key 'PRIMARY' delete from t1 where a%2; check table t1; Table Op Msg_type Msg_text test.t1 check status OK alter table t1 add primary key (a,b(255),c(255)), add key (b(767)); select count(*) from t1 where a=44; count(*) 5 select a, length(b),b=left(repeat(d,100*a),65535),length(c),c=repeat(d,20*a),d from t1; a length(b) b=left(repeat(d,100*a),65535) length(c) c=repeat(d,20*a) d 22 22000 1 4400 1 adfd72nh9k 22 35200 1 7040 1 adfdijn0loKNHJik 22 28600 1 5720 1 adfdijnmnb78k 22 26400 1 5280 1 adfdpplkeock 22 22000 1 4400 1 jejdkrun87 44 44000 1 8800 1 adfd72nh9k 44 65535 1 14080 1 adfdijn0loKNHJik 44 57200 1 11440 1 adfdijnmnb78k 44 52800 1 10560 1 adfdpplkeock 44 44000 1 8800 1 jejdkrun87 66 65535 1 13200 1 adfd72nh9k 66 65535 1 21120 1 adfdijn0loKNHJik 66 65535 1 17160 1 adfdijnmnb78k 66 65535 1 15840 1 adfdpplkeock 66 65535 1 13200 1 jejdkrun87 show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` int(11) NOT NULL DEFAULT '0', `b` blob NOT NULL, `c` text NOT NULL, `d` text NOT NULL, PRIMARY KEY (`a`,`b`(255),`c`(255)), KEY `b` (`b`(767)) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 check table t1; Table Op Msg_type Msg_text test.t1 check status OK explain select * from t1 where b like 'adfd%'; id select_type table type possible_keys key key_len ref rows Extra 1 SIMPLE t1 range b b 769 NULL 11 Using where drop table t1; set global innodb_file_per_table=on; set global innodb_file_format='Barracuda'; create table t1(a blob,b blob,c blob,d blob,e blob,f blob,g blob,h blob, i blob,j blob,k blob,l blob,m blob,n blob,o blob,p blob, q blob,r blob,s blob,t blob,u blob) engine=innodb row_format=dynamic; create index t1a on t1 (a(767)); create index t1b on t1 (b(767)); create index t1c on t1 (c(767)); create index t1d on t1 (d(767)); create index t1e on t1 (e(767)); create index t1f on t1 (f(767)); create index t1g on t1 (g(767)); create index t1h on t1 (h(767)); create index t1i on t1 (i(767)); create index t1j on t1 (j(767)); create index t1k on t1 (k(767)); create index t1l on t1 (l(767)); create index t1m on t1 (m(767)); create index t1n on t1 (n(767)); create index t1o on t1 (o(767)); create index t1p on t1 (p(767)); create index t1q on t1 (q(767)); create index t1r on t1 (r(767)); create index t1s on t1 (s(767)); create index t1t on t1 (t(767)); create index t1u on t1 (u(767)); ERROR HY000: Too big row create index t1ut on t1 (u(767), t(767)); ERROR HY000: Too big row create index t1st on t1 (s(767), t(767)); show create table t1; Table Create Table t1 CREATE TABLE `t1` ( `a` blob, `b` blob, `c` blob, `d` blob, `e` blob, `f` blob, `g` blob, `h` blob, `i` blob, `j` blob, `k` blob, `l` blob, `m` blob, `n` blob, `o` blob, `p` blob, `q` blob, `r` blob, `s` blob, `t` blob, `u` blob, KEY `t1a` (`a`(767)), KEY `t1b` (`b`(767)), KEY `t1c` (`c`(767)), KEY `t1d` (`d`(767)), KEY `t1e` (`e`(767)), KEY `t1f` (`f`(767)), KEY `t1g` (`g`(767)), KEY `t1h` (`h`(767)), KEY `t1i` (`i`(767)), KEY `t1j` (`j`(767)), KEY `t1k` (`k`(767)), KEY `t1l` (`l`(767)), KEY `t1m` (`m`(767)), KEY `t1n` (`n`(767)), KEY `t1o` (`o`(767)), KEY `t1p` (`p`(767)), KEY `t1q` (`q`(767)), KEY `t1r` (`r`(767)), KEY `t1s` (`s`(767)), KEY `t1t` (`t`(767)), KEY `t1st` (`s`(767),`t`(767)) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 ROW_FORMAT=DYNAMIC create index t1u on t1 (u(767)); ERROR HY000: Too big row alter table t1 row_format=compact; create index t1u on t1 (u(767)); drop table t1; CREATE TABLE bug12547647( a INT NOT NULL, b BLOB NOT NULL, c TEXT, PRIMARY KEY (b(10), a), INDEX (c(767)), INDEX(b(767)) ) ENGINE=InnoDB ROW_FORMAT=DYNAMIC; INSERT INTO bug12547647 VALUES (5,repeat('khdfo5AlOq',1900),repeat('g',7751)); COMMIT; UPDATE bug12547647 SET c = REPEAT('b',16928); ERROR HY000: Undo log record is too big. DROP TABLE bug12547647; set global innodb_file_per_table=0; set global innodb_file_format=Antelope; set global innodb_file_format_max=Antelope; SET @OLD_UNIQUE_CHECKS=@@UNIQUE_CHECKS, UNIQUE_CHECKS=0; SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0; CREATE TABLE t1( c1 BIGINT(12) NOT NULL, PRIMARY KEY (c1) ) ENGINE=InnoDB DEFAULT CHARSET=latin1; CREATE TABLE t2( c1 BIGINT(16) NOT NULL, c2 BIGINT(12) NOT NULL, c3 BIGINT(12) NOT NULL, PRIMARY KEY (c1) ) ENGINE=InnoDB DEFAULT CHARSET=latin1; ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3) REFERENCES t1(c1); SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS; SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS; SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `fk_t2_ca` (`c3`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 CREATE INDEX i_t2_c3_c2 ON t2(c3, c2); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `i_t2_c3_c2` (`c3`,`c2`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS; SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS; INSERT INTO t2 VALUES(0,0,0); ERROR 23000: Cannot add or update a child row: a foreign key constraint fails (`test`.`t2`, CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`)) INSERT INTO t1 VALUES(0); INSERT INTO t2 VALUES(0,0,0); DROP TABLE t2; CREATE TABLE t2( c1 BIGINT(16) NOT NULL, c2 BIGINT(12) NOT NULL, c3 BIGINT(12) NOT NULL, PRIMARY KEY (c1,c2,c3) ) ENGINE=InnoDB DEFAULT CHARSET=latin1; ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3) REFERENCES t1(c1); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`,`c2`,`c3`), KEY `fk_t2_ca` (`c3`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 CREATE INDEX i_t2_c3_c2 ON t2(c3, c2); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`,`c2`,`c3`), KEY `i_t2_c3_c2` (`c3`,`c2`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 INSERT INTO t2 VALUES(0,0,1); ERROR 23000: Cannot add or update a child row: a foreign key constraint fails (`test`.`t2`, CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`)) INSERT INTO t2 VALUES(0,0,0); DELETE FROM t1; ERROR 23000: Cannot delete or update a parent row: a foreign key constraint fails (`test`.`t2`, CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`) REFERENCES `t1` (`c1`)) DELETE FROM t2; DROP TABLE t2; DROP TABLE t1; CREATE TABLE t1( c1 BIGINT(12) NOT NULL, c2 INT(4) NOT NULL, PRIMARY KEY (c2,c1) ) ENGINE=InnoDB DEFAULT CHARSET=latin1; CREATE TABLE t2( c1 BIGINT(16) NOT NULL, c2 BIGINT(12) NOT NULL, c3 BIGINT(12) NOT NULL, PRIMARY KEY (c1) ) ENGINE=InnoDB DEFAULT CHARSET=latin1; ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3,c2) REFERENCES t1(c1,c1); ERROR HY000: Can't create table '#sql-temporary' (errno: 150) ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3,c2) REFERENCES t1(c1,c2); ERROR HY000: Can't create table '#sql-temporary' (errno: 150) ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3,c2) REFERENCES t1(c2,c1); ERROR HY000: Can't create table '#sql-temporary' (errno: 150) ALTER TABLE t1 MODIFY COLUMN c2 BIGINT(12) NOT NULL; ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3,c2) REFERENCES t1(c1,c2); ERROR HY000: Can't create table '#sql-temporary' (errno: 150) ALTER TABLE t2 ADD CONSTRAINT fk_t2_ca FOREIGN KEY (c3,c2) REFERENCES t1(c2,c1); SHOW CREATE TABLE t1; Table Create Table t1 CREATE TABLE `t1` ( `c1` bigint(12) NOT NULL, `c2` bigint(12) NOT NULL, PRIMARY KEY (`c2`,`c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `fk_t2_ca` (`c3`,`c2`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`, `c2`) REFERENCES `t1` (`c2`, `c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 CREATE INDEX i_t2_c2_c1 ON t2(c2, c1); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `fk_t2_ca` (`c3`,`c2`), KEY `i_t2_c2_c1` (`c2`,`c1`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`, `c2`) REFERENCES `t1` (`c2`, `c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 CREATE INDEX i_t2_c3_c1_c2 ON t2(c3, c1, c2); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `fk_t2_ca` (`c3`,`c2`), KEY `i_t2_c2_c1` (`c2`,`c1`), KEY `i_t2_c3_c1_c2` (`c3`,`c1`,`c2`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`, `c2`) REFERENCES `t1` (`c2`, `c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 CREATE INDEX i_t2_c3_c2 ON t2(c3, c2); SHOW CREATE TABLE t2; Table Create Table t2 CREATE TABLE `t2` ( `c1` bigint(16) NOT NULL, `c2` bigint(12) NOT NULL, `c3` bigint(12) NOT NULL, PRIMARY KEY (`c1`), KEY `i_t2_c2_c1` (`c2`,`c1`), KEY `i_t2_c3_c1_c2` (`c3`,`c1`,`c2`), KEY `i_t2_c3_c2` (`c3`,`c2`), CONSTRAINT `fk_t2_ca` FOREIGN KEY (`c3`, `c2`) REFERENCES `t1` (`c2`, `c1`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 DROP TABLE t2; DROP TABLE t1; SELECT SLEEP(10); SLEEP(10) 0 DROP TABLE t1_purge, t2_purge, t3_purge, t4_purge; DROP TABLE t12637786; DROP TABLE t12963823;
Tim Murphy already mentioned in his introduction to Dick Davis as Visiting Lariat that Dick has a new poetry collection forthcoming, but I wanted to give the news a little more prominence. The book is titled <u>Belonging</u> and is available by the end of this month from Ohio University Press/Swallow Press. It can be ordered directly from OUP at (740)593-1158, through your local bookstore, or through Amazon. It is also being published by Anvil Press in the U.K. I've had the pleasure and privilege of reading <u>Belonging</u> in manuscript, and I am not alone in the opinion that it contains some of Dick's finest poems to date. Another member recently lamented elsewhere how difficult it was to get hold of <u>Devices and Desires</u>. I propose that the Davis fans among us do our best to help keep this new book in print for a long time. I share Catherine's assessment, and like Catherine I possess a treasured copy of the manuscript. It is very inspiring for a young whipper-snapper like Tim to see a grand old man like Davis doing his best work at so advanced an age. Although Dick's American Selected, A Kind of Love, is out of print, the English version, Devices and Desires, one of the few really indispensable volumes of contemporary poetry I have, can be ordered from amazon.co.uk. A Kind of Love is also available secondhand through those invaluable sites, Advanced Book Exchange and Alibris, which for some Spherians might be cheaper than importing from the UK - though no doubt Dick would do less well out of the deal! Yes, Belonging is a brilliant and immensely gratifying book. It's difficult to imagine other living persons writing such plangent, technically right-on, and engaging poems as constitute roughly half the book. And I say this uncomfortably well aware that I'm preaching to the converted. A review of Belonging is featured on Poetry Daily in their news section, from the Columbus Dispatch . It is not the most articulate or well-versed review (partly perhaps because aimed at a general audience?), and doesn't do justice to this delightful and satisfying book. But it is nice to see the book getting the attention.
OTTAWA—Mississauga MP Eve Adams stands accused of abusing Conservative Party and Commons resources in her bid to grab a new seat; of insulting and bullying board members in the new riding, and of threatening the riding association’s 2015 election plans. Yet it may be news of her December tantrum over a $6 car wash at an Ottawa gas station that will turn out to be her political career tipping point. John Newcombe, a Conservative supporter and the owner of the Island Park Esso station in Ottawa’s west end, said he contacted the Prime Minister’s Office in January to complain about an incident with Adams in December 2013. Related: · Stephen Harper mum on Eve Adams controversy According to Newcombe, Adams was upset about a car wash she felt was unsatisfactory, and parked directly in front of a pump lane at the busy station, backing up traffic behind it on a busy Ottawa street. Newcombe said the dispute centered on a thin layer of ice that remained on Adams’ vehicle’s rear bumper. “I have never experienced anything like this,” Newcombe, who has been in the business for 40 years, said in an interview Wednesday evening. “Ms. Adams just was adamant in refusing to communicate. It was the rolled up window, I’m staying put until I get my refund.” “And she said, ‘By the way, I’m timing how long it takes before I get my refund,’ ” Newcombe told the Star’s Alex Boutilier. Newcombe said after the incident he was visited by PMO staff, and Adams contacted him and apologized — an apology he felt was insincere. But after news of Adams’ alleged bullying tactics in her bid for the Conservative nomination in the new Oakville North-Burlington riding, Newcombe said he decided to release security camera footage of the incident to The Canadian Press. In an interview with CP, Adams disputes Newcombe’s version of the events. She said she moved her car twice at the request of attendants before parking where she did, and that she regrets the incident and portrayed it as a misunderstanding. “The entire time I simply said, look, if I could simply go through the wash a second time, or if not, could they kindly refund the unused car washes I had just bought moments ago,” Adams told CP. Adams has also denied any inappropriate actions in her push for the Conservative nomination in Oakville North-Burlington. And yet, Prime Minister Stephen Harper has now ordered an investigation by the Conservative Party’s national council into Adams’ behavior, after receiving a damning letter of complaint by Mark Fedak, president of that riding association. It all comes just days after Harper fired Adams’ fiancé Dimitri Soudas as executive director of the Conservative Party over meddling in the riding on her behalf, contrary to Soudas’ employment contract. But Adams’ immediate problem is the antagonism she’s stirred up with members of the riding association of Oakville North-Burlington. A letter sent to Harper, senior party figures, and the Ontario Conservative caucus by Fedak outlines five allegations of improper behaviour in a nomination race that hasn’t formally begun. The letter, obtained by the Star, specifically alleges that Adams: “Vetoed” the new riding association’s pre-election plans to hire a private company to provide a poll-by-poll demographic map of the seat as part of its 2015 campaign strategy. Improperly used her Commons mail-out privileges to send a “constant flow of mail” into the riding to solicit support, possibly “wasting taxpayers’ money” for personal gain, if not violating Elections Canada rules for nomination races. Improperly used the party’s database known as CIMS to contact board members in a riding she does not yet represent. Loading... Loading... Loading... Loading... Loading... Loading... Launched personal attacks against board members at a March 19 meeting, to which she wasn’t invited, and proceeded to “filibuster” despite nine requests to leave. Was the real reason behind the dismissal of longtime regional organizer Wally Butts after Fedak asked Butts to intervene for the riding. Adams has said accounts of the meeting have been exaggerated by board members who support nomination bid by rival Natalia Lishchyna. As for the allegation about mail-outs, Adams and her campaign manager insist she has followed all the rules, and has verified with Elections Canada that the mailings were allowed. Fedak warned Adams’ actions are hurting party morale and the Conservative brand, and may amount to violations of the party’s constitution if not Elections Canada rules for nomination campaigns. In a statement, Harper’s spokesman Jason MacDonald said Harper “has asked National Council to review the letter and to follow up with the riding association.” “Until that review has happened we won’t speculate about possible outcomes.” In an interview with the Star, Jeff Knoll, one of 14 members who signed Fedak’s letter of complaint about Adams, said most on the Oakville executive felt they had nowhere else to turn but to the prime minister to rein Adams in. But he does not believe Adams should be should be prevented from running. Knoll said if it turns out that Adams was breaking Commons rules and using tax dollars inappropriately, it might be an argument to bar Adams’ candidacy but stressed his goal was to level the playing field for all comers, including Lishchyna, whom he supports. The allegations raise tough questions for a Conservative Party anxious to show it is running fair nomination contests for the 2015 election. That campaign will be run on a redrawn electoral map of 338 ridings, with the creation of 30 new ridings now forcing many MPs to seek new support within changed riding boundaries. It is the first time the party has not protected incumbent MPs in its 10-year history since the Canadian Alliance and Progressive Conservatives merged. Adams represents Mississauga-Brampton South, but last year moved to Oakville with Soudas, her common-law partner. She wants to run there instead. With files from Alex Boutilier, The Canadian Press Read more about:
<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003" ToolsVersion="3.5"> <PropertyGroup> <Configuration Condition=" '$(Configuration)' == '' ">Debug</Configuration> <Platform Condition=" '$(Platform)' == '' ">AnyCPU</Platform> <ProductVersion>9.0.21022</ProductVersion> <SchemaVersion>2.0</SchemaVersion> <ProjectGuid>{90CBF2D3-767E-4E3C-AF8C-AB3E5F17BE18}</ProjectGuid> <OutputType>Library</OutputType> <AppDesignerFolder>Properties</AppDesignerFolder> <RootNamespace>Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.WCF</RootNamespace> <AssemblyName>Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.WCF</AssemblyName><AssemblyOriginatorKeyFile></AssemblyOriginatorKeyFile> <DelaySign>false</DelaySign> <SignAssembly>false</SignAssembly> <FileUpgradeFlags> </FileUpgradeFlags> <OldToolsVersion>2.0</OldToolsVersion> <UpgradeBackupLocation> </UpgradeBackupLocation> <TargetFrameworkVersion>v3.5</TargetFrameworkVersion> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Debug|AnyCPU' "> <DebugSymbols>true</DebugSymbols> <DebugType>full</DebugType> <Optimize>false</Optimize> <OutputPath>bin\Debug\</OutputPath> <DefineConstants>DEBUG;TRACE;WMINET10</DefineConstants> <ErrorReport>prompt</ErrorReport> <WarningLevel>4</WarningLevel> <TreatWarningsAsErrors>true</TreatWarningsAsErrors> <RunCodeAnalysis>false</RunCodeAnalysis> <CodeAnalysisRules>-Microsoft.Design#CA1012;-Microsoft.Design#CA2210;-Microsoft.Design#CA1040;-Microsoft.Design#CA1005;-Microsoft.Design#CA1020;-Microsoft.Design#CA1021;-Microsoft.Design#CA1010;-Microsoft.Design#CA1011;-Microsoft.Design#CA1009;-Microsoft.Design#CA1050;-Microsoft.Design#CA1026;-Microsoft.Design#CA1019;-Microsoft.Design#CA1031;-Microsoft.Design#CA1047;-Microsoft.Design#CA1000;-Microsoft.Design#CA1048;-Microsoft.Design#CA1051;-Microsoft.Design#CA1002;-Microsoft.Design#CA1061;-Microsoft.Design#CA1006;-Microsoft.Design#CA1046;-Microsoft.Design#CA1045;-Microsoft.Design#CA1038;-Microsoft.Design#CA1008;-Microsoft.Design#CA1028;-Microsoft.Design#CA1004;-Microsoft.Design#CA1035;-Microsoft.Design#CA1063;-Microsoft.Design#CA1032;-Microsoft.Design#CA1023;-Microsoft.Design#CA1033;-Microsoft.Design#CA1039;-Microsoft.Design#CA1016;-Microsoft.Design#CA1014;-Microsoft.Design#CA1017;-Microsoft.Design#CA1018;-Microsoft.Design#CA1027;-Microsoft.Design#CA1059;-Microsoft.Design#CA1060;-Microsoft.Design#CA1034;-Microsoft.Design#CA1013;-Microsoft.Design#CA1036;-Microsoft.Design#CA1044;-Microsoft.Design#CA1041;-Microsoft.Design#CA1025;-Microsoft.Design#CA1052;-Microsoft.Design#CA1053;-Microsoft.Design#CA1057;-Microsoft.Design#CA1058;-Microsoft.Design#CA1001;-Microsoft.Design#CA1049;-Microsoft.Design#CA1054;-Microsoft.Design#CA1056;-Microsoft.Design#CA1055;-Microsoft.Design#CA1030;-Microsoft.Design#CA1003;-Microsoft.Design#CA1007;-Microsoft.Design#CA1043;-Microsoft.Design#CA1024;-Microsoft.Design#CA1062;-Microsoft.Interoperability#CA1403;-Microsoft.Interoperability#CA1406;-Microsoft.Interoperability#CA1413;-Microsoft.Interoperability#CA1402;-Microsoft.Interoperability#CA1407;-Microsoft.Interoperability#CA1404;-Microsoft.Interoperability#CA1410;-Microsoft.Interoperability#CA1411;-Microsoft.Interoperability#CA1405;-Microsoft.Interoperability#CA1409;-Microsoft.Interoperability#CA1415;-Microsoft.Interoperability#CA1408;-Microsoft.Interoperability#CA1414;-Microsoft.Interoperability#CA1412;-Microsoft.Interoperability#CA1400;-Microsoft.Interoperability#CA1401;-Microsoft.Maintainability#CA1502;-Microsoft.Maintainability#CA1501;-Microsoft.Maintainability#CA1500;-Microsoft.Mobility#CA1600;-Microsoft.Mobility#CA1601;-Microsoft.Naming#CA1718;-Microsoft.Naming#CA1720;-Microsoft.Naming#CA1700;-Microsoft.Naming#CA1712;-Microsoft.Naming#CA1713;-Microsoft.Naming#CA1709;-Microsoft.Naming#CA1708;-Microsoft.Naming#CA1715;-Microsoft.Naming#CA1710;-Microsoft.Naming#CA1707;-Microsoft.Naming#CA1722;-Microsoft.Naming#CA1711;-Microsoft.Naming#CA1716;-Microsoft.Naming#CA1705;-Microsoft.Naming#CA1725;-Microsoft.Naming#CA1719;-Microsoft.Naming#CA1721;-Microsoft.Naming#CA1706;-Microsoft.Naming#CA1724;-Microsoft.Naming#CA1726;-Microsoft.Performance#CA1809;-Microsoft.Performance#CA1811;-Microsoft.Performance#CA1812;-Microsoft.Performance#CA1807;-Microsoft.Performance#CA1813;-Microsoft.Performance#CA1823;-Microsoft.Performance#CA1816;-Microsoft.Performance#CA1817;-Microsoft.Performance#CA1800;-Microsoft.Performance#CA1818;-Microsoft.Performance#CA1805;-Microsoft.Performance#CA1810;-Microsoft.Performance#CA1822;-Microsoft.Performance#CA1815;-Microsoft.Performance#CA1814;-Microsoft.Performance#CA1819;-Microsoft.Performance#CA1804;-Microsoft.Performance#CA1820;-Microsoft.Performance#CA1802;-Microsoft.Portability#CA1901;-Microsoft.Portability#CA1900;-Microsoft.Reliability#CA2000;-Microsoft.Reliability#CA2002;-Microsoft.Reliability#CA2003;-Microsoft.Reliability#CA2004;-Microsoft.Reliability#CA2006;-Microsoft.Security#CA2116;-Microsoft.Security#CA2117;-Microsoft.Security#CA2105;-Microsoft.Security#CA2115;-Microsoft.Security#CA2104;-Microsoft.Security#CA2122;-Microsoft.Security#CA2114;-Microsoft.Security#CA2123;-Microsoft.Security#CA2111;-Microsoft.Security#CA2108;-Microsoft.Security#CA2107;-Microsoft.Security#CA2103;-Microsoft.Security#CA2100;-Microsoft.Security#CA2118;-Microsoft.Security#CA2109;-Microsoft.Security#CA2119;-Microsoft.Security#CA2106;-Microsoft.Security#CA2112;-Microsoft.Security#CA2110;-Microsoft.Security#CA2120;-Microsoft.Security#CA2101;-Microsoft.Security#CA2121;-Microsoft.Security#CA2126;-Microsoft.Security#CA2124;-Microsoft.Usage#CA2209;-Microsoft.Usage#CA2236;-Microsoft.Usage#CA2227;-Microsoft.Usage#CA2213;-Microsoft.Usage#CA2216;-Microsoft.Usage#CA2215;-Microsoft.Usage#CA2214;-Microsoft.Usage#CA2222;-Microsoft.Usage#CA2202;-Microsoft.Usage#CA1806;-Microsoft.Usage#CA2217;-Microsoft.Usage#CA2212;-Microsoft.Usage#CA2219;-Microsoft.Usage#CA2201;-Microsoft.Usage#CA2228;-Microsoft.Usage#CA2221;-Microsoft.Usage#CA2220;-Microsoft.Usage#CA2240;-Microsoft.Usage#CA2229;-Microsoft.Usage#CA2238;-Microsoft.Usage#CA2207;-Microsoft.Usage#CA2208;-Microsoft.Usage#CA2235;-Microsoft.Usage#CA2237;-Microsoft.Usage#CA2232;-Microsoft.Usage#CA2223;-Microsoft.Usage#CA2211;-Microsoft.Usage#CA2233;-Microsoft.Usage#CA2225;-Microsoft.Usage#CA2226;-Microsoft.Usage#CA2231;-Microsoft.Usage#CA2224;-Microsoft.Usage#CA2218;-Microsoft.Usage#CA2234;-Microsoft.Usage#CA2241;-Microsoft.Usage#CA2239;-Microsoft.Usage#CA2200;-Microsoft.Usage#CA1801;-Microsoft.Usage#CA2205;-Microsoft.Usage#CA2230;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00004;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00003;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00005;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00010;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00001;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00002;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00006;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00009;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00007;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00011;-Microsoft.Practices.FxCop.Rules.WcfSecurity#WCFS00008</CodeAnalysisRules> <DocumentationFile>bin\Debug\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.WCF.XML</DocumentationFile> </PropertyGroup> <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Release|AnyCPU' "> <DebugType>full</DebugType> <Optimize>true</Optimize> <OutputPath>bin\Release\</OutputPath> <DefineConstants>TRACE;WMINET10</DefineConstants> <ErrorReport>prompt</ErrorReport> <WarningLevel>4</WarningLevel> <TreatWarningsAsErrors>true</TreatWarningsAsErrors> <DocumentationFile>bin\Release\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.WCF.XML</DocumentationFile> <DebugSymbols>true</DebugSymbols> </PropertyGroup> <ItemGroup> <Reference Include="Microsoft.Practices.ObjectBuilder2, Version=2.0.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35, processorArchitecture=MSIL"> <SpecificVersion>False</SpecificVersion> <HintPath>..\..\..\..\Lib\Microsoft.Practices.ObjectBuilder2.dll</HintPath> </Reference> <Reference Include="System" /> <Reference Include="System.configuration" /> <Reference Include="System.Configuration.Install" /> <Reference Include="System.Core"> <RequiredTargetFramework>3.5</RequiredTargetFramework> </Reference> <Reference Include="System.Data" /> <Reference Include="System.Management" /> <Reference Include="System.Management.Instrumentation"> <RequiredTargetFramework>3.5</RequiredTargetFramework> </Reference> <Reference Include="System.Runtime.Serialization, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=MSIL" /> <Reference Include="System.ServiceModel, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=MSIL" /> <Reference Include="System.Web.Services" /> <Reference Include="System.Xml" /> </ItemGroup> <ItemGroup> <Compile Include="..\..\..\GlobalAssemblyInfo.cs"> <Link>GlobalAssemblyInfo.cs</Link> </Compile> <Compile Include="Configuration\FaultContractExceptionHandlerMappingData.cs" /> <Compile Include="Configuration\Manageability\FaultContractExceptionHandlerDataWmiMapper.cs" /> <Compile Include="Configuration\Manageability\Installer.cs"> <SubType>Component</SubType> </Compile> <Compile Include="Configuration\Manageability\FaultContractExceptionHandlerDataManageabilityProvider.cs" /> <Compile Include="Configuration\Manageability\FaultContractExceptionHandlerSetting.cs" /> <Compile Include="Configuration\Manageability\Properties\AssemblyInfo.cs" /> <Compile Include="Configuration\Manageability\Properties\Resources.Designer.cs"> <AutoGen>True</AutoGen> <DesignTime>True</DesignTime> <DependentUpon>Resources.resx</DependentUpon> </Compile> <Compile Include="Configuration\Unity\FaultContractExceptionHandlerPolicyCreator.cs" /> <Compile Include="ExceptionShielding.cs" /> <Compile Include="ExceptionShieldingAttribute.cs" /> <Compile Include="ExceptionShieldingBehavior.cs" /> <Compile Include="ExceptionShieldingElement.cs" /> <Compile Include="ExceptionShieldingErrorHandler.cs" /> <Compile Include="ExceptionUtility.cs" /> <Compile Include="FaultContractExceptionHandler.cs" /> <Compile Include="Configuration\FaultContractExceptionHandlerData.cs" /> <Compile Include="FaultContractWrapperException.cs" /> <Compile Include="Properties\AssemblyInfo.cs" /> <Compile Include="Properties\Resources.Designer.cs"> <AutoGen>True</AutoGen> <DesignTime>True</DesignTime> <DependentUpon>Resources.resx</DependentUpon> </Compile> </ItemGroup> <ItemGroup> <EmbeddedResource Include="Configuration\Manageability\Properties\Resources.resx"> <SubType>Designer</SubType> <Generator>ResXFileCodeGenerator</Generator> <LastGenOutput>Resources.Designer.cs</LastGenOutput> </EmbeddedResource> <EmbeddedResource Include="Properties\Resources.resx"> <SubType>Designer</SubType> <Generator>ResXFileCodeGenerator</Generator> <LastGenOutput>Resources.Designer.cs</LastGenOutput> </EmbeddedResource> </ItemGroup> <ItemGroup> <Service Include="{B4F97281-0DBD-4835-9ED8-7DFB966E87FF}" /> </ItemGroup> <ItemGroup> <ProjectReference Include="..\..\..\Common\Src\Common.csproj"> <Project>{A09297C8-2C40-470B-8856-D856676DDFFA}</Project> <Name>Common</Name> </ProjectReference> <ProjectReference Include="..\..\..\Logging\Src\Logging\Logging.csproj"> <Project>{6AC97717-899D-4F72-BC5B-2C37959CD4FF}</Project> <Name>Logging</Name> </ProjectReference> <ProjectReference Include="..\ExceptionHandling\ExceptionHandling.csproj"> <Project>{2DB0AD6D-BF59-4EBB-9F99-49ABD8539FD2}</Project> <Name>ExceptionHandling</Name> </ProjectReference> </ItemGroup> <Import Project="$(MSBuildBinPath)\Microsoft.CSharp.targets" /> <!-- To modify your build process, add your task inside one of the targets below and uncomment it. Other similar extension points exist, see Microsoft.Common.targets. <Target Name="BeforeBuild"> </Target> <Target Name="AfterBuild"> </Target> --> </Project>
Coupling between chemical kinetics and mechanics that is both nonlinear and compatible with thermodynamics. Motivated by biological applications (e.g., bone tissue development and regeneration) we investigate coupling between mesoscopic mechanics and chemical kinetics. Governing equations of both dynamical systems are first written in a form expressing manifestly their compatibility with microscopic mechanics and thermodynamics. The same form is then required from governing equations of the coupled dynamics. The main result of the paper is an admissible form of the coupled dynamics.
"Krome Iphone 4 & 5 Wallet" is under review. It is not accepting contributions.
384 Pa. 316 (1956) Hyzy, Appellant, v. Pittsburgh Coal Company. Supreme Court of Pennsylvania. Argued September 30, 1955. March 13, 1956. *317 Before STERN, C.J., STEARNE, JONES, BELL, CHIDSEY, MUSMANNO and ARNOLD, JJ. Harry Alan Sherman, for appellant. Harold R. Schmidt, with him Ralph H. German, and Rose, Rose & Houston, for appellee. OPINION PER CURIAM, March 13, 1956: The plaintiff, as administratrix of the estate of her deceased husband, brought the present action against the defendant company, the husband's employer, for damages for his allegedly wrongful death. The defendant filed preliminary objections, in the nature of a demurrer, to the complaint on the ground that the plaintiff's exclusive remedy was under the Workmen's Compensation Act. The learned court below sustained the objections and dismissed the complaint in an order from which the plaintiff has brought this appeal. The opinion of the learned court below disposed of the plaintiff's contention so completely that the order will be affirmed on the following excerpts therefrom. *318 ". . . The complaint recites that the decedent was a coal miner employed by defendant and was fatally injured by a roof fall in the mine while in the course of his employment. Clearly then, since the pleadings establish an employer-employee relationship, the Workmen's Compensation Act would seem to be applicable. "Plaintiff seeks to avoid the application of the act by a showing that the accident resulted from defendant's neglect of a statutory duty. However, this court can perceive no such distinction in the act. Article III, section 302 (a), 77 P.S. Sec. 461, provides that `In every contract of hiring . . . expressed or implied . . ., it shall be conclusively presumed that the parties have accepted the provisions' of the act unless written notice is given to the contrary. And section 303 of the act provides that acceptance of the act `shall operate as a surrender by the parties thereto of their rights to any form or amount of compensation or damages for any injury or death occurring in the course of the employment, or to any method of determination thereof, other than as provided in Article III of this act. Such agreement shall bind the employer and his personal representatives, and the employee, his or her wife or husband, widow or widower, next of kin, and other dependents.' "The statute contains no provisions which qualify those quoted above; hence, since plaintiff has not averred that decedent took any action to exclude his employment from falling under the act's provisions, it necessarily follows that he was subject thereto. See Capozzoli v. Stone & Webster Eng. Co., 352 Pa. 183 (1945). The courts have been consistent in holding that the remedy provided by the Workmen's Compensation Act is exclusive of all common law actions. Jackson v. Gleason, 320 Pa. 545; McIntyre v. Strausser, 365 Pa. 507. *319 "Plaintiff relies on several cases as authority for his contention that an action for Wrongful Death lies. However, even a cursory examination of these cases reveals their inapplicability to the present controversy. In Broch v. Bowser, 376 Pa. 209, a trespass action was permitted because the court found an employer-employee relationship did not exist. The cases of Lincoln v. National Tube Co., 268 Pa. 504, Walkofski v. Lehigh Valley R.R. Co., 278 Pa. 84, and King v. Darlington Brick & Mine Co., 284 Pa. 277, all cited by plaintiff, are clearly distinguished in Welsch v. Pittsburgh Terminal Coal Co., 303 Pa. 405, where the court reiterates the general rule that an employee who had been injured in the course of his employment can recover from his employer only in the manner provided by the Workmen's Compensation Act. "Neither the Act of May 29, 1901, P.L. 342, 52 P.S. § 598 nor the Act of June 2, 1891, P.L. 176, 52 P.S. § 71 and its supplements gives any aid to plaintiff's position, since these acts only apply to anthracite coal mines. Since the defendant's mine here in question is located in Library, Pennsylvania, this court takes judicial notice of the fact that it is a bituminous coal mine. "The controversy here is clearly governed by Welsch v. Pittsburgh Terminal Coal Co., supra, where, although neglect of a statutory duty was alleged, the court held that plaintiff's only remedy was under the Workmen's Compensation Act. Plaintiff's failure to plead that the act had been duly rejected was tantamount to pleading that the parties had accepted the act as a part of the employment contract. Cappozzoli v. Stone & Webster Eng. Co., supra." Order affirmed at appellant's costs. Mr. Chief Justice HORACE STERN dissents. *320 DISSENTING OPINION BY MR. JUSTICE MUSMANNO: Joseph E. Hyzy, the deceased husband of the plaintiff, worked in the coal mine of the defendant Pittsburgh Coal Company as motorman of a Joy-loading machine. On January 8, 1953, he was crushed to death by a roof-fall and cave-in. In an action for damages, the Administratrix of his estate charged the defendant with negligence: "(a) In assigning decedent to work under an untimbered, loose, and deteriorated roof, in violation of the Mine Safety Acts of the Commonwealth of Pennsylvania, forbidding assignments of work in hazardous areas. (b) In knowingly directing and permitting the operation of a bull-dozing machine in a section where no timbering or adequate timbering were installed to support the loose and danger roof. . . . (e) In wilfully, wantonly and negligently instructing decedent to operate the said bull-dozing machine in the area in violation of law and to his great hazard, injury and death." Section 873 of the Bituminous Coal Mines Law (1911, June 9, P.L. 756), 52 PS provides: "The mine foreman shall direct and see that every working place is properly secured by props or timbers, and shall see that no person is directed or permitted to work in an unsafe, place, unless it be for the purpose of making it safe." Section 1341 of the same Act makes violation of the Act a misdemeanor. The lower Court held, and the majority of this Court affirms, that the plaintiff may not recover in a trespass action as her remedy is limited to the provisions of the Workmen's Compensation Act. In the case of King v. Darlington, 284 Pa. 277, 280, this Court held that "the Workmen's Compensation Act does not debar an action of trespass, where the injury results from *321 the employer's violation of a statutory command: Lincoln v. National Tube Co., 268 Pa. 504."[1] In Lincoln v. National Tube Co., 268 Pa. 504, this Court allowed a recovery where a minor employee was injured when he was assigned to operate a hoisting machine in express violation of a statute. It was argued by the employer there that it was liable only under the Workmen's Compensation Act because the Act applied to "those employers who `shall by agreement, either expressed or implied . . . accept the provisions' thereof." But we held that: "Since no legal contract could be made by or for the minor to do this kind of work, and as such contract could not be legally `renewed or extended by mutual consent, expressed or implied,' it is clear the workmen's compensation law does not cover the case."[2] If the employer in the case at bar ordered the decedent to work in an area of the mine which, under the Mine Safety Law, was so dangerous as to be prohibited territory, the employer is responsible in trespass as much as where an employer orders a minor to work at prohibited machinery. In Walcofski v. Lehigh Val. Coal Co., 278 Pa. 84, 88, this Court denied compensation to a claimant who of his own volition entered into an area of the mine he was ordered to avoid. Although barring recovery, we laid down rules there which apply to employers as well as to employees: "There can be no legal excuse for failure to obey an absolute statutory requirement. . . We have consistently followed a public policy announced long ago by this court; it will not aid a man who grounds his cause on an immoral or illegal *322 act . . . And as we have unhesitatingly held employers to a strict rule for failure to obey social welfare acts in the interest of safety to other workmen, so also the law as it relates to employees mining coal under these circumstances must be enforced . . ." Although it is generally assumed that the Workmen's Compensation Law assures compensation to injured workmen regardless of the manner in which their injuries were incurred, the appellate courts have often denied recovery on the ground that the claimant was violating some law at the time of his accident. In Yowkoski v. Hudson Coal Co., 159 Pa. Superior Ct. 256, the claimant was refused compensation because at the time of the mishap he was using matches in violation of Rule 10, Art. XII of the Pennsylvania Anthracite Mining Law of June 2, 1891. In the case of Beshenick v. Pittsburgh Terminal Coal Corp., 110 Pa. Superior Ct. 156, it was held that the claimant could not recover when he violated a law, even though the violation did not amount to a misdemeanor. In Demuzzio v. Lattimer Coal Corporation, 157 Pa. Superior Ct. 459, compensation was disallowed because the decedent was working in that part of the mine "where he was ordered not to work." In Dickey v. Pittsburgh & Lake Erie R.R. Co., 297 Pa. 172, no compensation was permitted because the decedent used a short cut, this Court saying: "Where an employee violates a positive rule as to entering forbidden parts of the owner's premises about which he has no duty to perform, or disobeys instructions against starting machinery or other dangerous agencies with which his work is not connected, and with which he has no business, and an injury results, he not only violates the orders of his employer, but is in the position of a trespasser, who without right authority or permission, enters forbidden ground." *323 It is not likely that the Legislature, in passing the Workmen's Compensation Act, intended to bar from compensation employees who violate safety laws and yet immunize employers from liability in trespass actions when they ignore the same safety laws. If violation of a safety law drives the claimant into an area not covered by the Workmen's Compensation Law, a disregarding of statutory requirements by the employer should and must remove from him the protecting umbrella of that same law. The Superior Court well said in the case of Morell v. B. & S. & C. Co., 103 Pa. Superior Ct. 316, 324: "The defendant should not be permitted to play fast and loose with the rules — condone their infraction by the officials charged with their enforcement and then set them up as a bar against recovery of compensation by the dependents of an employe killed while traveling from his work in a manner to which they had given their assent and approval." NOTES [1] Boal v. Electric Storage Battery Co., 98 F. 2nd 815, is another case covering a situation where the Workmen's Compensation Act does not apply, despite the employer-employee relationship. [2] Italics throughout, mine.
Recombinant AAV-2 harboring gfp-antisense/ribozyme fusion sequences monitor transduction, gene expression, and show anti-HIV-1 efficacy. Vector-mediated delivery of potentially antivirally active genes is a key step in somatic gene therapy including therapeutic approaches against AIDS. A crucial technical prerequisite is to monitor DNA transfer into target cells. Here, we describe recombinant infectious particles derived from the adeno-associated virus type 2 (AAV-2) that are suitable to deliver effective HIV-1-directed antisense and ribozyme genes into target cells. To monitor transduction, we designed and tested a number of fusions between indicator-coding sequences of luciferase or gfp with effective HIV-1-directed antisense or ribozyme sequences. The combination of an indicator function and an antiviral func- tion in cis allows successful identification of transduced cells and measurement of effects on the replication of HIV-1 in antisense/ribozyme-expressing cells only. The fusion genes were shown to express the indicator genes. Inhibition of HIV-1 replication mediated by the antisense/ribozyme portion of the fusion transcripts was similar to parental constructs and neither acute nor long-term toxicity of fusion genes and their gene products was observed. These results suggest the use of rAAV constructs described here as tools to study the transducibility of target cells, gene expression and efficacy of HIV-1-directed antisense and ribozyme genes.
Q: Java + jar file I have written a quick Java wrapper that fires off the NMAP executable and waits for it to finish. I am using Eclipse. I would like to include the NMAP source/executable in my Java jar file so that I have a self-contained package. Within Eclipse I have added the NMAP folder hierarchy. Within Eclipse I can see Java firing off the NMAP utility correctly, and waiting for the utility to end before exiting. So far, so good. I then export a JAR file for with eclipse. I can see the NMAP folder hierarchy present. However when I try to run the JAR file it is having trouble finding nmap.exe. Can a foreign executable be called from with a jar file? if not, what are my options? If so, why can't it find it within the jar file when it could find it within Eclipse? Thanks. A: You will need extract the .exe and its required support files onto the disk before you can access them as regular files (which execution through standard methods requires, I believe). You can look up examples of how to copy a resource from a jar to a file using getResourceAsStream() on one of your class files in the jar. Once extracted, you can execute is as you are doing now (you might need to ensure execution rights, etc. based on your OS)
× Thanks for reading! Log in to continue. Enjoy more articles by logging in or creating a free account. No credit card required. Log in Sign up {{featured_button_text}} A top Republican said GOP leaders are planning to include a $400 million middle-class tax cut in the final version of their budget package. Senate Majority Leader Scott Fitzgerald, R-Juneau, told the State Journal in a brief interview Monday that Republican leaders are keeping a tax cut in mind as they wrap up work on the state’s two-year budget, which will be sent to Democratic Gov. Tony Evers this summer. “We’re conscious of the idea that at the end of the day, we want to hit that tax cut number,” Fitzgerald said, referring to the roughly $400 million figure. Spending levels set by the Republican-controlled budget committee in the coming days could change the size of the tax cut. Fitzgerald didn’t say how Republicans would fund the measure, and a Fitzgerald spokesman declined to provide further details. A plan could be introduced as early as Tuesday. The Juneau Republican said their tax cut plan would be similar to the one the Legislature passed in January. That proposal would have cut $170 in taxes, on average, for nearly 2 million qualifying, mostly middle-income tax filers. To fund it, Republicans had planned to use one-time surplus funds, prompting Evers to veto it, saying it was fiscally irresponsible.
John Healy (bishop) The Most Rev. Dr John Healy, D.D., LL.D., M.R.I A. (1841–1918), was an Irish clergyman of the Roman Catholic Church. He served as Bishop of Clonfert from 1896 to 1903 and Archbishop of Tuam from 1903 to 1918. Born on 2 January 1841 in Ballinafad, County Sligo, Ireland, Healy was educated at Maynooth College, where he was ordained a priest in September 1867. He then served as a curate and parish priest in the diocese of Elphin, before being offered two professorial chairs at Maynooth, those of Theology and Classics. He accepted the first and held it until 1883, when he became Prefect of Maynooth. He was appointed Coadjutor Bishop of the Diocese of Clonfert and Titular Bishop of Macri on 26 June 1884. His episcopal ordination took place on 31 August 1884. He succeeded as the Diocesan Bishop of Clonfert on 15 August 1896. He translated to the archbishopric of Tuam on 13 February 1903, where he reestablished pilgrimage to Croagh Patrick. He was also a Senator of the National University of Ireland (having been part of the campaign to establish it), a governor of University College, Galway, and a member of the Board of Agriculture. He once told Irish Nationalists that before demanding self-government they should make themselves fit for it. Archbishop Healy died in office on 19 March 1918, aged 77. A biography of his life was published by The Rev. P.J. Joyce in 1931, titled John Healy, Archbishop of Tuam (H. Gill and Sons, Dublin 1931). Healy was a noted academic, and published a number of works on Irish and church history, with a particular emphasis on Early Christian Ireland. Works The ancient Irish church (1892) Insula Sanctorum et Doctorum, 91912) Ireland's Ancient Schools and Scholars (1890) A revised and expanded second edition was issued in 1893. A fourth edition was published in 1902. References External links Category:1841 births Category:1918 deaths Category:Alumni of St Patrick's College, Maynooth Category:Roman Catholic archbishops of Tuam Category:Roman Catholic bishops of Clonfert
House of Mercure The House of Mercure or (anglicization) "Mercury" is a family from Scotland, which provided a viceroy of Tangier on the Barbary Coast, wore the Earldom of Viot Théviot or before the wars Civil Britain had not forced to migrate in France, where they settled in d'Orléans. Members Jacques Viot, lord Mercure was policeman the body-guard of (Latinisation) Jacques V, King of Scotland, he was in France in 1549, and married Mathilde de Barres. From this marriage came Jean Viot, lord Mercury was chamber page of Mary Stuart, wife of François II, King of France and cavalry captain in 1585. He distinguished himself at the battle of Coutras in 1587. The king to reward services gave him a loads of chamber valets, and the direction and control of all glass factories of the kingdom of France. He married Elizabeth le Gros. From this marriage came John Henry cavalry captain in the regiment of Espenan, killed at the Battle of Lentz; Maximilian, captain of cavalry regiment Conde, who was killed at the battle of Rocroy; Pierre. Pierre Viot Mercury ordinary doctor to the King, married Marie Menard. From this marriage came. Florent Viot Mercury, who was first cadet gentleman in the regiment of Languedoc and gendarme in the Scottish Guard, and he made all campaigns Flanders, and was present at the siege of Thionville in 1676, in as deputy aide-de-camp of M. de Lahaye, Lieutenant general of the armies of the king. Having retired in Pithiviers, he was appointed counselor, physician to the King, and Public Prosecutor of said city Pithiviers in 1689, married on 13 February 1685, Marie Humery from this marriage came Florent-Jean-Charles Viot Mercury, born 29 October 1694, married Marie Trézin from this marriage came (1) Mercury _ Viot, a lawyer parliament died without issue; (2) Etienne-Aignan, from this marriage came Etienne-Aignan Viot Mercury, born July 14, 1739, an officer in the regiment of Conflans, who had a broken arm Triche Napaly at the siege of in India, and which received other honorable wounds in the service of the king he married Jeanne Gentil, from this marriage came Etienne Pascal Viot-Aignan-Mercury, Esquire, born 3 March 1, 1785. He married Marie-Marguerite Beaulu, from this marriage came Olympe Marie-Julie, born October 9, 1811. Coat of Arms Coat of Arms: Viot de Mercure : D'or, à la fasce d'azur, chargée d'un caducée du champ, accosté de deux roses d'argent. (Orléanais) Azure, a golden caduceus, two roses argent asked chief two unicorns for supports and A helmet stamped grilled front References External links page 447 (French text) Category:Scottish families
Single dose cefazolin is safe and effective for pre-operative prophylaxis in orthopaedic oncology. Surgical site infections (SSI) are a common potentially preventable complication after surgical procedures. A standardized antibiotic prophylaxis in elective orthopaedic surgery plays a major role in lowering SSI. At present, there is little published evidence regarding standardized antibiotic prophylaxis in orthopaedic oncological surgery. We introduced a prophylactic antibiotic protocol for orthopaedic oncological surgery in our hospital. The proposed protocol consists in "one-shot" intravenous administration of Cefazolin 2g, 30 min before surgery. In our setting, this preoperative antibiotic prophylaxis regimen was associated with a markedly lower rate of SSI's. There is no current evidence in favour of greater effectiveness of prophylaxis beyond 24/48 h after surgery compared to our pre-surgical "one-shot" administration; by contrast, prolonged post-surgical prophylaxis is likely to undermine the patient's bacterial flora and select resistant pathogens. These results are preliminary and should be used to start planning a standardised prophylactic protocol to prevent SSI's after orthopaedic oncological surgery.
Q: Dell Latitude E5540 doesn't recognize external display I stumbled over this problem when I connected a projector to my E5540's VGA port and the laptop simply failed to detect it. Even restarting the laptop did not make it recognize the external display. The projector didn't receive any signal from the laptop and the laptop didn't show any signs of recognizing an external display. Instead of showing the projector, the Intel HD Grafics utility insisted on a Digital Display VMM2300 ROM being connected to the laptop, regardless of whether the projector was plugged in or not. I did some more tests and came to the result, that monitors attached to the laptop's VGA or the docking station's VGA and DVI ports were not recognized. A monitor plugged into the laptop's HDMI port showed up in Intel HD Grafics utility and was usable. None of the above made that misterious VMM2300 ROM monitor disappear. Doing a driver update did not change the behaviour. Mostly by accident I did then discover that the external monitors do work when the are already connected when the laptop powers up. This requires a true shutdown and fresh power up, so only using Windows Restart option or putting it to sleep and waking it up doesn't do the trick. Anyway, there still appears to be a VMM2300 ROM attached to the laptop in addition to any devices that are really present. Now it is possible to use external display(s), at least as long as I'm prepared to shut the laptop down, let it switch off, connect the displays, switch it back on and wait for Windows to boot. A: Dell Pro support quickly came up with this being a hardware problem, offering to replace the Motherboard of the laptop. But as the external displays worke flawlessly when connected before powering the laptop, I couldn't agree with this explanation. A web search for VMM2300 returns one hit from superuser, but this one is for Latitude E7440. The solution however is very similar: Downgrade the Synaptics VMM2320 MST HUB Firmware to a version lower than the (pre-installed) A05 / 2.22. In the beginning, I installed A01 / 2.15, which already solved the problem for me. I did then upgrade step by step to A02 / 2.17 and A03 / 2.21, which do also work. Installing A05 / 2.22 brings the error back. So my conclusion for now is: Use the A03 / 2.21 version of the firmware. With this one, I can connect and disconnect external monitors, dock and undock the laptop, restart it and it does reliably recognize each change to the display devices. Note: The Dell Support pages have quite detailed installation instructions. For each of the firmware installations, it is required to shut down the laptop, either dock it or connect an external monitor to the laptop itself (it depends on which firmware you are going to install whether dock or external monitor is required) and then start the installation.